yep, more dotfiles

server: fix authelia ldap mappings

wiro.world 95fa5988 d39b5ba5

verified
Changed files
+17 -9
nixos
profiles
+17 -9
nixos/profiles/server.nix
···
port = headscale-port;
settings = {
server_url = "https://${headscale-hostname}";
+
# TODO: prometheus scrape headscale metrics
metrics_listen_addr = "127.0.0.1:${toString headscale-metrics-port}";
# disable TLS
···
server.address = "localhost:${toString authelia-port}";
storage.local.path = "/var/lib/authelia-main/db.sqlite3";
+
# TODO: prometheus scrape authelia metrics
+
session = {
cookies = [{
domain = "wiro.world";
···
# password = "";
base_dn = "dc=wiro,dc=world";
-
users_filter = "(&({username_attribute}={input})(objectClass=person))";
+
users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";
+
additional_users_dn = "ou=people";
groups_filter = "(&(member={dn})(objectClass=groupOfNames))";
+
additional_groups_dn = "ou=groups";
-
# attributes = {
-
# # username = "user_id";
-
# username = "uid";
-
# display_name = "display_name";
-
# mail = "mail";
-
# group_name = "cn";
-
# };
+
attributes = {
+
username = "uid";
+
display_name = "cn";
+
given_name = "givenname";
+
family_name = "last_name";
+
mail = "mail";
+
picture = "avatar";
+
+
group_name = "cn";
+
};
};
access_control = {
···
identity_providers.oidc = {
-
# enforce_pkce = "always";
+
enforce_pkce = "always";
clients = [
{
client_name = "Headscale";