rename everywhere
This commit is contained in:
parent
5052d16d64
commit
12b9923443
6 changed files with 15 additions and 15 deletions
|
|
@ -467,7 +467,7 @@ shb.hledger = {
|
|||
enable = true;
|
||||
subdomain = "hledger";
|
||||
domain = "example.com";
|
||||
oidcEndpoint = "https://authelia.example.com";
|
||||
authEndpoint = "https://authelia.example.com";
|
||||
localNetworkIPRange = "192.168.1.0/24";
|
||||
};
|
||||
shb.backup.instances.hledger = # Same as the examples above
|
||||
|
|
@ -493,7 +493,7 @@ shb.jellyfin = {
|
|||
ldapHost = "127.0.0.1";
|
||||
ldapPort = 3890;
|
||||
dcdomain = config.shb.ldap.dcdomain;
|
||||
oidcEndpoint = "https://${config.shb.authelia.subdomain}.${config.shb.authelia.domain}";
|
||||
authEndpoint = "https://${config.shb.authelia.subdomain}.${config.shb.authelia.domain}";
|
||||
oidcClientID = "jellyfin";
|
||||
oidcUserGroup = "jellyfin_user";
|
||||
oidcAdminUserGroup = "jellyfin_admin";
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ in
|
|||
example = "/srv/torrents";
|
||||
};
|
||||
|
||||
oidcEndpoint = lib.mkOption {
|
||||
authEndpoint = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
description = "OIDC endpoint for SSO";
|
||||
example = "https://authelia.example.com";
|
||||
|
|
@ -172,7 +172,7 @@ in
|
|||
|
||||
shb.nginx.autheliaProtect = [
|
||||
{
|
||||
inherit (cfg) subdomain domain oidcEndpoint;
|
||||
inherit (cfg) subdomain domain authEndpoint;
|
||||
upstream = "http://127.0.0.1:${toString config.services.deluge.web.port}";
|
||||
autheliaRules = [{
|
||||
domain = fqdn;
|
||||
|
|
|
|||
|
|
@ -34,7 +34,7 @@ in
|
|||
example = "192.168.1.1/24";
|
||||
};
|
||||
|
||||
oidcEndpoint = lib.mkOption {
|
||||
authEndpoint = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
description = "OIDC endpoint for SSO";
|
||||
example = "https://authelia.example.com";
|
||||
|
|
@ -74,7 +74,7 @@ in
|
|||
|
||||
shb.nginx.autheliaProtect = [
|
||||
{
|
||||
inherit (cfg) subdomain domain oidcEndpoint;
|
||||
inherit (cfg) subdomain domain authEndpoint;
|
||||
upstream = "http://${toString config.services.hledger-web.host}:${toString config.services.hledger-web.port}";
|
||||
autheliaRules = [{
|
||||
domain = fqdn;
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ in
|
|||
default = "Authelia";
|
||||
};
|
||||
|
||||
oidcEndpoint = lib.mkOption {
|
||||
authEndpoint = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
description = "OIDC endpoint for SSO";
|
||||
example = "https://authelia.example.com";
|
||||
|
|
@ -287,7 +287,7 @@ in
|
|||
</key>
|
||||
<value>
|
||||
<PluginConfiguration>
|
||||
<OidEndpoint>${cfg.oidcEndpoint}</OidEndpoint>
|
||||
<OidEndpoint>${cfg.authEndpoint}</OidEndpoint>
|
||||
<OidClientId>${cfg.oidcClientID}</OidClientId>
|
||||
<OidSecret>%SSO_SECRET%</OidSecret>
|
||||
<Enabled>true</Enabled>
|
||||
|
|
@ -324,7 +324,7 @@ in
|
|||
<a href="https://${cfg.subdomain}.${cfg.domain}/SSOViews/linking" class="raised cancel block emby-button authentik-sso">
|
||||
Link ${cfg.oidcProvider} config&nbsp;
|
||||
</a>
|
||||
<a href="${cfg.oidcEndpoint}" class="raised cancel block emby-button authentik-sso">
|
||||
<a href="${cfg.authEndpoint}" class="raised cancel block emby-button authentik-sso">
|
||||
${cfg.oidcProvider} config&nbsp;
|
||||
</a>
|
||||
</LoginDisclaimer>
|
||||
|
|
|
|||
|
|
@ -45,7 +45,7 @@ in
|
|||
example = "ldap.example.com";
|
||||
};
|
||||
|
||||
oidcEndpoint = lib.mkOption {
|
||||
authEndpoint = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
description = "OIDC endpoint for SSO";
|
||||
example = "https://authelia.example.com";
|
||||
|
|
@ -162,7 +162,7 @@ in
|
|||
|
||||
shb.nginx.autheliaProtect = [
|
||||
{
|
||||
inherit (cfg) subdomain domain oidcEndpoint;
|
||||
inherit (cfg) subdomain domain authEndpoint;
|
||||
upstream = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
|
||||
autheliaRules = [
|
||||
{
|
||||
|
|
|
|||
|
|
@ -84,7 +84,7 @@ in
|
|||
}
|
||||
];
|
||||
domain = "example.com";
|
||||
oidcEndpoint = "https://oidc.example.com";
|
||||
authEndpoint = "https://oidc.example.com";
|
||||
subdomain = "radarr";
|
||||
upstream = "http://127.0.0.1:7001";
|
||||
}
|
||||
|
|
@ -111,7 +111,7 @@ in
|
|||
subdomain = "radarr";
|
||||
domain = "example.com";
|
||||
enable = true;
|
||||
oidcEndpoint = "https://oidc.example.com";
|
||||
authEndpoint = "https://oidc.example.com";
|
||||
settings = {
|
||||
APIKeyFile = "/run/radarr/apikey";
|
||||
};
|
||||
|
|
@ -158,7 +158,7 @@ in
|
|||
}
|
||||
];
|
||||
domain = "example.com";
|
||||
oidcEndpoint = "https://oidc.example.com";
|
||||
authEndpoint = "https://oidc.example.com";
|
||||
subdomain = "radarr";
|
||||
upstream = "http://127.0.0.1:7001";
|
||||
}
|
||||
|
|
@ -185,7 +185,7 @@ in
|
|||
subdomain = "radarr";
|
||||
domain = "example.com";
|
||||
enable = true;
|
||||
oidcEndpoint = "https://oidc.example.com";
|
||||
authEndpoint = "https://oidc.example.com";
|
||||
settings = {
|
||||
APIKeyFile = "/run/radarr/apikey";
|
||||
};
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue