Skip to content

Commit

Permalink
rename oidcEndpoint option to authEndpoint
Browse files Browse the repository at this point in the history
  • Loading branch information
ibizaman authored Nov 30, 2023
1 parent 54ce26e commit 0ae7220
Show file tree
Hide file tree
Showing 8 changed files with 25 additions and 24 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -467,7 +467,7 @@ shb.hledger = {
enable = true;
subdomain = "hledger";
domain = "example.com";
oidcEndpoint = "https://authelia.example.com";
authEndpoint = "https://authelia.example.com";
localNetworkIPRange = "192.168.1.0/24";
};
shb.backup.instances.hledger = # Same as the examples above
Expand All @@ -493,7 +493,7 @@ shb.jellyfin = {
ldapHost = "127.0.0.1";
ldapPort = 3890;
dcdomain = config.shb.ldap.dcdomain;
oidcEndpoint = "https://${config.shb.authelia.subdomain}.${config.shb.authelia.domain}";
authEndpoint = "https://${config.shb.authelia.subdomain}.${config.shb.authelia.domain}";
oidcClientID = "jellyfin";
oidcUserGroup = "jellyfin_user";
oidcAdminUserGroup = "jellyfin_admin";
Expand Down
13 changes: 7 additions & 6 deletions modules/blocks/nginx.nix
Original file line number Diff line number Diff line change
Expand Up @@ -19,9 +19,10 @@ let
example = "mydomain.com";
};

oidcEndpoint = lib.mkOption {
type = lib.types.str;
description = "OIDC endpoint for SSO.";
authEndpoint = lib.mkOption {
type = lib.types.nullOr lib.types.str;
description = "Auth endpoint for SSO.";
default = null;
example = "https://authelia.example.com";
};

Expand Down Expand Up @@ -142,16 +143,16 @@ in
# proxy_set_header Cookie $new_cookie;
auth_request_set $redirect $scheme://$http_host$request_uri;
error_page 401 =302 ${c.oidcEndpoint}?rd=$redirect;
error_page 403 = ${c.oidcEndpoint}/error/403;
error_page 401 =302 ${c.authEndpoint}?rd=$redirect;
error_page 403 = ${c.authEndpoint}/error/403;
proxy_pass ${c.upstream};
'';

# Virtual endpoint created by nginx to forward auth requests.
locations."/authelia".extraConfig = ''
internal;
proxy_pass ${c.oidcEndpoint}/api/verify;
proxy_pass ${c.authEndpoint}/api/verify;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Original-URI $request_uri;
Expand Down
6 changes: 3 additions & 3 deletions modules/services/arr.nix
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ let
default = "/var/lib/${name}";
};

oidcEndpoint = lib.mkOption {
authEndpoint = lib.mkOption {
type = lib.types.nullOr lib.types.str;
default = null;
description = "Endpoint to the SSO provider. Leave null to not have SSO configured.";
Expand Down Expand Up @@ -297,8 +297,8 @@ config.xml" templatedSettings) "${config.services.radarr.dataDir}/config.xml" (
let
c = cfg.${name};
in
lib.mkIf (c.oidcEndpoint != null) {
inherit (c) subdomain domain oidcEndpoint;
lib.mkIf (c.authEndpoint != null) {
inherit (c) subdomain domain authEndpoint;
upstream = "http://127.0.0.1:${toString c.port}";
autheliaRules = [
{
Expand Down
4 changes: 2 additions & 2 deletions modules/services/deluge.nix
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ in
example = "/srv/torrents";
};

oidcEndpoint = lib.mkOption {
authEndpoint = lib.mkOption {
type = lib.types.str;
description = "OIDC endpoint for SSO";
example = "https://authelia.example.com";
Expand Down Expand Up @@ -172,7 +172,7 @@ in

shb.nginx.autheliaProtect = [
{
inherit (cfg) subdomain domain oidcEndpoint;
inherit (cfg) subdomain domain authEndpoint;
upstream = "http://127.0.0.1:${toString config.services.deluge.web.port}";
autheliaRules = [{
domain = fqdn;
Expand Down
4 changes: 2 additions & 2 deletions modules/services/hledger.nix
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ in
example = "192.168.1.1/24";
};

oidcEndpoint = lib.mkOption {
authEndpoint = lib.mkOption {
type = lib.types.str;
description = "OIDC endpoint for SSO";
example = "https://authelia.example.com";
Expand Down Expand Up @@ -74,7 +74,7 @@ in

shb.nginx.autheliaProtect = [
{
inherit (cfg) subdomain domain oidcEndpoint;
inherit (cfg) subdomain domain authEndpoint;
upstream = "http://${toString config.services.hledger-web.host}:${toString config.services.hledger-web.port}";
autheliaRules = [{
domain = fqdn;
Expand Down
6 changes: 3 additions & 3 deletions modules/services/jellyfin.nix
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ in
default = "Authelia";
};

oidcEndpoint = lib.mkOption {
authEndpoint = lib.mkOption {
type = lib.types.str;
description = "OIDC endpoint for SSO";
example = "https://authelia.example.com";
Expand Down Expand Up @@ -287,7 +287,7 @@ in
</key>
<value>
<PluginConfiguration>
<OidEndpoint>${cfg.oidcEndpoint}</OidEndpoint>
<OidEndpoint>${cfg.authEndpoint}</OidEndpoint>
<OidClientId>${cfg.oidcClientID}</OidClientId>
<OidSecret>%SSO_SECRET%</OidSecret>
<Enabled>true</Enabled>
Expand Down Expand Up @@ -324,7 +324,7 @@ in
&lt;a href="https://${cfg.subdomain}.${cfg.domain}/SSOViews/linking" class="raised cancel block emby-button authentik-sso"&gt;
Link ${cfg.oidcProvider} config&amp;nbsp;
&lt;/a&gt;
&lt;a href="${cfg.oidcEndpoint}" class="raised cancel block emby-button authentik-sso"&gt;
&lt;a href="${cfg.authEndpoint}" class="raised cancel block emby-button authentik-sso"&gt;
${cfg.oidcProvider} config&amp;nbsp;
&lt;/a&gt;
</LoginDisclaimer>
Expand Down
4 changes: 2 additions & 2 deletions modules/services/vaultwarden.nix
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ in
example = "ldap.example.com";
};

oidcEndpoint = lib.mkOption {
authEndpoint = lib.mkOption {
type = lib.types.str;
description = "OIDC endpoint for SSO";
example = "https://authelia.example.com";
Expand Down Expand Up @@ -162,7 +162,7 @@ in

shb.nginx.autheliaProtect = [
{
inherit (cfg) subdomain domain oidcEndpoint;
inherit (cfg) subdomain domain authEndpoint;
upstream = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
autheliaRules = [
{
Expand Down
8 changes: 4 additions & 4 deletions test/modules/arr.nix
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ in
}
];
domain = "example.com";
oidcEndpoint = "https://oidc.example.com";
authEndpoint = "https://oidc.example.com";
subdomain = "radarr";
upstream = "http://127.0.0.1:7001";
}
Expand All @@ -111,7 +111,7 @@ in
subdomain = "radarr";
domain = "example.com";
enable = true;
oidcEndpoint = "https://oidc.example.com";
authEndpoint = "https://oidc.example.com";
settings = {
APIKeyFile = "/run/radarr/apikey";
};
Expand Down Expand Up @@ -158,7 +158,7 @@ in
}
];
domain = "example.com";
oidcEndpoint = "https://oidc.example.com";
authEndpoint = "https://oidc.example.com";
subdomain = "radarr";
upstream = "http://127.0.0.1:7001";
}
Expand All @@ -185,7 +185,7 @@ in
subdomain = "radarr";
domain = "example.com";
enable = true;
oidcEndpoint = "https://oidc.example.com";
authEndpoint = "https://oidc.example.com";
settings = {
APIKeyFile = "/run/radarr/apikey";
};
Expand Down

0 comments on commit 0ae7220

Please sign in to comment.