diff options
| author | Max Audron <audron@cocaine.farm> | 2025-07-30 19:27:33 +0200 |
|---|---|---|
| committer | Max Audron <audron@cocaine.farm> | 2025-07-30 19:27:33 +0200 |
| commit | b5377b6e970968af13fa22e6728f90ff052ee848 (patch) | |
| tree | 5b0df06c8747a2533f8ceaa6f7605e80d8d29eb0 /modules/authentik/default.nix | |
| parent | more metrics (diff) | |
try to run authentik natively
Diffstat (limited to '')
| -rw-r--r-- | modules/authentik/default.nix | 35 |
1 files changed, 30 insertions, 5 deletions
diff --git a/modules/authentik/default.nix b/modules/authentik/default.nix index 03e58f2..bc9d4e0 100644 --- a/modules/authentik/default.nix +++ b/modules/authentik/default.nix @@ -59,14 +59,39 @@ in }; }; - # Allow binding of root ports for the ldap container - # systemd.services.podman-authentik-ldap = { - # serviceConfig = { - # AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; + # services.authentik = { + # enable = true; + # createDatabase = false; + # + # # The environmentFile needs to be on the target host! + # # Best use something like sops-nix or agenix to manage it + # environmentFile = "/etc/secrets/authentik/container.env"; + # settings = { + # # email = { + # # host = "smtp.example.com"; + # # port = 587; + # # username = "authentik@example.com"; + # # use_tls = true; + # # use_ssl = false; + # # from = "authentik@example.com"; + # # }; + # disable_startup_analytics = true; + # avatars = "initials"; # }; # }; + # + # + # services.authentik-ldap = { + # enable = true; + # environmentFile = "/etc/secrets/authentik/ldap.env"; + # }; + # + # services.authentik-proxy = { + # enable = true; + # environmentFile = "/etc/secrets/authentik/proxy.env"; + # }; - networking.firewall.allowedTCPPorts = [ 389 636 ]; + # networking.firewall.allowedTCPPorts = [ 389 636 ]; security.acme.certs = { "vapor.systems" = { |
