yep, more dotfiles

server: add lldap

wiro.world 819b7973 1f6edcdf

verified
Changed files
+21
nixos
profiles
secrets
+19
nixos/profiles/server.nix
···
headscale-port = 3005;
headscale-hostname = "headscale.wiro.world";
grafana-port = 9000;
grafana-hostname = "console.wiro.world";
prometheus-port = 9001;
···
virtualHosts.${headscale-hostname}.extraConfig = ''
reverse_proxy http://localhost:${toString headscale-port}
'';
};
security.sudo.wheelNeedsPassword = false;
···
oidc = { };
};
};
# port used is 6567
···
headscale-port = 3005;
headscale-hostname = "headscale.wiro.world";
+
lldap-port = 3006;
+
lldap-hostname = "ldap.wiro.world";
+
grafana-port = 9000;
grafana-hostname = "console.wiro.world";
prometheus-port = 9001;
···
virtualHosts.${headscale-hostname}.extraConfig = ''
reverse_proxy http://localhost:${toString headscale-port}
'';
+
+
virtualHosts.${lldap-hostname}.extraConfig = ''
+
reverse_proxy http://localhost:${toString lldap-port}
+
'';
};
security.sudo.wheelNeedsPassword = false;
···
oidc = { };
};
+
};
+
+
age.secrets.lldap-env.file = ../../secrets/lldap-env.age;
+
services.lldap = {
+
enable = true;
+
settings = {
+
http_url = "https://${lldap-hostname}";
+
http_port = lldap-port;
+
+
ldap_base_dn = "dc=wiro,dc=world";
+
};
+
environmentFile = config.age.secrets.lldap-env.path;
};
# port used is 6567
secrets/lldap-env.age

This is a binary file and will not be displayed.

+2
secrets/secrets.nix
···
# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
"pds-env.age".publicKeys = deploy;
# Not used in config but useful
"pgp-ca5e.age".publicKeys = users;
···
# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
"pds-env.age".publicKeys = deploy;
+
# Defines `LLDAP_JWT_SECRET`, `LLDAP_KEY_SEED`.
+
"lldap-env.age".publicKeys = deploy;
# Not used in config but useful
"pgp-ca5e.age".publicKeys = users;