@@ -18879,7 +19082,7 @@ sync USER HOST:
Author: Leon Schwarzäugl
-
Created: 2025-06-09 Mo 19:11
+
Created: 2025-06-10 Di 00:09
Validate
diff --git a/modules/nixos/server/freshrss.nix b/modules/nixos/server/freshrss.nix
index 9687b0f..3f5c946 100644
--- a/modules/nixos/server/freshrss.nix
+++ b/modules/nixos/server/freshrss.nix
@@ -11,24 +11,91 @@
users.groups.freshrss = { };
- sops.secrets.fresh = { owner = "freshrss"; };
+ sops = {
+ secrets = {
+ fresh = { owner = "freshrss"; };
+ "kanidm-freshrss-client" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
+ "oidc-crypto-key" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
+ };
+
+ # templates = {
+ # "freshrss-env" = {
+ # content = ''
+ # DATA_PATH=${config.services.freshrss.dataDir}
+ # OIDC_ENABLED=1
+ # OIDC_PROVIDER_METADATA_URL=https://sso.swarsel.win/.well-known/openid-configuration
+ # OIDC_CLIENT_ID=freshrss
+ # OIDC_CLIENT_SECRET=${config.sops.placeholder.kanidm-freshrss-client}
+ # OIDC_CLIENT_CRYPTO_KEY=${config.sops.placeholder.oidc-crypto-key}
+ # OIDC_REMOTE_USER_CLAIM=preferred_username
+ # OIDC_SCOPES=openid groups email profile
+ # OIDC_X_FORWARDED_HEADERS=X-Forwarded-Host X-Forwarded-Port X-Forwarded-Proto
+ # '';
+ # owner = "freshrss";
+ # group = "freshrss";
+ # mode = "0440";
+ # };
+ # };
+ };
services.freshrss = {
enable = true;
virtualHost = "signpost.swarsel.win";
baseUrl = "https://signpost.swarsel.win";
- # authType = "none";
+ authType = "none";
dataDir = "/Vault/data/tt-rss";
defaultUser = "Swarsel";
passwordFile = config.sops.secrets.fresh.path;
};
+ # systemd.services.freshrss-config.serviceConfig.EnvironmentFile = [
+ # config.sops.templates.freshrss-env.path
+ # ];
+
services.nginx = {
virtualHosts = {
"signpost.swarsel.win" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
+ locations = {
+ "/" = {
+ extraConfig = ''
+ auth_request /oauth2/auth;
+ error_page 401 = /oauth2/sign_in;
+
+ # pass information via X-User and X-Email headers to backend,
+ # requires running with --set-xauthrequest flag (done by NixOS)
+ auth_request_set $user $upstream_http_x_auth_request_preferred_username;
+ # Set the email to our own domain in case user change their mail
+ auth_request_set $email "''${upstream_http_x_auth_request_preferred_username}@swarsel.win";
+ proxy_set_header X-User $user;
+ proxy_set_header X-Email $email;
+
+ # if you enabled --cookie-refresh, this is needed for it to work with auth_request
+ auth_request_set $auth_cookie $upstream_http_set_cookie;
+ add_header Set-Cookie $auth_cookie;
+ '';
+ };
+ "/oauth2/" = {
+ proxyPass = "http://oauth2-proxy";
+ extraConfig = ''
+ proxy_set_header X-Scheme $scheme;
+ proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
+ '';
+ };
+ "= /oauth2/auth" = {
+ proxyPass = "http://oauth2-proxy/oauth2/auth";
+ extraConfig = ''
+ internal;
+
+ proxy_set_header X-Scheme $scheme;
+ # nginx auth_request includes headers but not body
+ proxy_set_header Content-Length "";
+ proxy_pass_request_body off;
+ '';
+ };
+ };
};
};
};
diff --git a/modules/nixos/server/kanidm.nix b/modules/nixos/server/kanidm.nix
index c2d60d0..4926573 100644
--- a/modules/nixos/server/kanidm.nix
+++ b/modules/nixos/server/kanidm.nix
@@ -2,7 +2,9 @@
let
certsSopsFile = self + /secrets/certs/secrets.yaml;
kanidmDomain = "sso.swarsel.win";
+ oauth2ProxyDomain = "soauth.swarsel.win";
kanidmPort = 8300;
+ oauth2ProxyPort = 3004;
in
{
options.swarselsystems.modules.server.kanidm = lib.mkEnableOption "enable kanidm on server";
@@ -15,164 +17,280 @@ in
users.groups.kanidm = { };
- sops.secrets = {
- "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
- "kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ sops = {
+ secrets = {
+ "oauth2-cookie-secret" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
+ "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-freshrss" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-oauth2-proxy" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-oauth2-proxy-client" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
+ };
+
+ templates = {
+ "kanidm-oauth2-proxy-client-env" = {
+ content = ''
+ OAUTH2_PROXY_CLIENT_SECRET="${config.sops.placeholder.kanidm-oauth2-proxy-client}"
+ OAUTH2_PROXY_COOKIE_SECRET=${config.sops.placeholder.oauth2-cookie-secret}
+ '';
+ owner = "oauth2-proxy";
+ group = "oauth2-proxy";
+ mode = "0440";
+ };
+ };
};
- services.kanidm = {
- package = pkgs.kanidmWithSecretProvisioning;
- enableServer = true;
- serverSettings = {
- domain = kanidmDomain;
- origin = "https://${kanidmDomain}";
- tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
- tls_key = config.sops.secrets.kanidm-self-signed-key.path;
- bindaddress = "0.0.0.0:${toString kanidmPort}";
- trust_x_forward_for = true;
+ services = {
+ kanidm = {
+ package = pkgs.kanidmWithSecretProvisioning;
+ enableServer = true;
+ serverSettings = {
+ domain = kanidmDomain;
+ origin = "https://${kanidmDomain}";
+ tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
+ tls_key = config.sops.secrets.kanidm-self-signed-key.path;
+ bindaddress = "0.0.0.0:${toString kanidmPort}";
+ trust_x_forward_for = true;
+ };
+ enableClient = true;
+ clientSettings = {
+ uri = config.services.kanidm.serverSettings.origin;
+ verify_ca = true;
+ verify_hostnames = true;
+ };
+ provision = {
+ enable = true;
+ adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
+ idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
+ groups = {
+ "immich.access" = { };
+ "paperless.access" = { };
+ "forgejo.access" = { };
+ "forgejo.admins" = { };
+ "grafana.access" = { };
+ "grafana.editors" = { };
+ "grafana.admins" = { };
+ "grafana.server-admins" = { };
+ "nextcloud.access" = { };
+ "nextcloud.admins" = { };
+ "navidrome.access" = { };
+ "freshrss.access" = { };
+ };
+ persons = {
+ swarsel = {
+ present = true;
+ mailAddresses = [ "leon@swarsel.win" ];
+ legalName = "Leon Schwarzäugl";
+ groups = [
+ "immich.access"
+ "paperless.access"
+ "grafana.access"
+ "forgejo.access"
+ "nextcloud.access"
+ "freshrss.access"
+ "navidrome.access"
+ ];
+ displayName = "Swarsel";
+ };
+ };
+ systems = {
+ oauth2 = {
+ immich = {
+ displayName = "Immich";
+ originUrl = [
+ "https://shots.swarsel.win/auth/login"
+ "https://shots.swarsel.win/user-settings"
+ "app.immich:///oauth-callback"
+ "https://shots.swarsel.win/api/oauth/mobile-redirect"
+ ];
+ originLanding = "https://shots.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-immich.path;
+ preferShortUsername = true;
+ enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
+ scopeMaps."immich.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ };
+ paperless = {
+ displayName = "Paperless";
+ originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
+ originLanding = "https://scan.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-paperless.path;
+ preferShortUsername = true;
+ scopeMaps."paperless.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ };
+ forgejo = {
+ displayName = "Forgejo";
+ originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
+ originLanding = "https://swagit.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
+ scopeMaps."forgejo.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ # XXX: PKCE is currently not supported by gitea/forgejo,
+ # see https://github.com/go-gitea/gitea/issues/21376.
+ allowInsecureClientDisablePkce = true;
+ preferShortUsername = true;
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup."forgejo.admins" = [ "admin" ];
+ };
+ };
+ grafana = {
+ displayName = "Grafana";
+ originUrl = "https://status.swarsel.win/login/generic_oauth";
+ originLanding = "https://status.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-grafana.path;
+ preferShortUsername = true;
+ scopeMaps."grafana.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup = {
+ "grafana.editors" = [ "editor" ];
+ "grafana.admins" = [ "admin" ];
+ "grafana.server-admins" = [ "server_admin" ];
+ };
+ };
+ };
+ nextcloud = {
+ displayName = "Nextcloud";
+ originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
+ originLanding = "https://stash.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
+ allowInsecureClientDisablePkce = true;
+ scopeMaps."nextcloud.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ preferShortUsername = true;
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup = {
+ "nextcloud.admins" = [ "admin" ];
+ };
+ };
+ };
+ # freshrss = {
+ # displayName = "FreshRSS";
+ # originUrl = "https://signpost.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
+ # originLanding = "https://signpost.swarsel.win/";
+ # basicSecretFile = config.sops.secrets.kanidm-freshrss.path;
+ # allowInsecureClientDisablePkce = true;
+ # scopeMaps."freshrss.access" = [
+ # "openid"
+ # "email"
+ # "profile"
+ # ];
+ # preferShortUsername = true;
+ # };
+ oauth2-proxy = {
+ displayName = "Oauth2-Proxy";
+ originUrl = "https://${oauth2ProxyDomain}/oauth2/callback";
+ originLanding = "https://${oauth2ProxyDomain}/";
+ basicSecretFile = config.sops.secrets.kanidm-oauth2-proxy.path;
+ scopeMaps."freshrss.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ scopeMaps."navidrome.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ preferShortUsername = true;
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup."freshrss.access" = [ "ttrss_access" ];
+ valuesByGroup."navidrome.access" = [ "navidrome_access" ];
+ };
+ };
+ };
+ };
+ };
};
- enableClient = true;
- clientSettings = {
- uri = config.services.kanidm.serverSettings.origin;
- verify_ca = true;
- verify_hostnames = true;
- };
- provision = {
+ oauth2-proxy = {
enable = true;
- adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
- idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
- groups = {
- "immich.access" = { };
- "paperless.access" = { };
- "forgejo.access" = { };
- "forgejo.admins" = { };
- "grafana.access" = { };
- "grafana.editors" = { };
- "grafana.admins" = { };
- "grafana.server-admins" = { };
- "nextcloud.access" = { };
- "nextcloud.admins" = { };
+ cookie = {
+ domain = ".swarsel.win";
+ secure = true;
+ expire = "900m";
+ secret = null; # set by service EnvironmentFile
};
- persons = {
- swarsel = {
- present = true;
- mailAddresses = [ "leon@swarsel.win" ];
- legalName = "Leon Schwarzäugl";
- groups = [
- "immich.access"
- "paperless.access"
- "grafana.access"
- "forgejo.access"
- "nextcloud.access"
- ];
- displayName = "Swarsel";
- };
- };
- systems = {
- oauth2 = {
- immich = {
- displayName = "Immich";
- originUrl = [
- "https://shots.swarsel.win/auth/login"
- "https://shots.swarsel.win/user-settings"
- "app.immich:///oauth-callback"
- "https://shots.swarsel.win/api/oauth/mobile-redirect"
- ];
- originLanding = "https://shots.swarsel.win/";
- basicSecretFile = config.sops.secrets.kanidm-immich.path;
- preferShortUsername = true;
- enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
- scopeMaps."immich.access" = [
- "openid"
- "email"
- "profile"
- ];
- };
- paperless = {
- displayName = "Paperless";
- originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
- originLanding = "https://scan.swarsel.win/";
- basicSecretFile = config.sops.secrets.kanidm-paperless.path;
- preferShortUsername = true;
- scopeMaps."paperless.access" = [
- "openid"
- "email"
- "profile"
- ];
- };
- forgejo = {
- displayName = "Forgejo";
- originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
- originLanding = "https://swagit.swarsel.win/";
- basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
- scopeMaps."forgejo.access" = [
- "openid"
- "email"
- "profile"
- ];
- # XXX: PKCE is currently not supported by gitea/forgejo,
- # see https://github.com/go-gitea/gitea/issues/21376.
- allowInsecureClientDisablePkce = true;
- preferShortUsername = true;
- claimMaps.groups = {
- joinType = "array";
- valuesByGroup."forgejo.admins" = [ "admin" ];
- };
- };
- grafana = {
- displayName = "Grafana";
- originUrl = "https://status.swarsel.win/login/generic_oauth";
- originLanding = "https://status.swarsel.win/";
- basicSecretFile = config.sops.secrets.kanidm-grafana.path;
- preferShortUsername = true;
- scopeMaps."grafana.access" = [
- "openid"
- "email"
- "profile"
- ];
- claimMaps.groups = {
- joinType = "array";
- valuesByGroup = {
- "grafana.editors" = [ "editor" ];
- "grafana.admins" = [ "admin" ];
- "grafana.server-admins" = [ "server_admin" ];
- };
- };
- };
- nextcloud = {
- displayName = "Nextcloud";
- originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
- originLanding = "https://stash.swarsel.win/";
- basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
- allowInsecureClientDisablePkce = true;
- scopeMaps."nextcloud.access" = [
- "openid"
- "email"
- "profile"
- ];
- preferShortUsername = true;
- claimMaps.groups = {
- joinType = "array";
- valuesByGroup = {
- "nextcloud.admins" = [ "admin" ];
- };
- };
- };
- };
+ clientSecret = null; # set by service EnvironmentFile
+ reverseProxy = true;
+ httpAddress = "0.0.0.0:${builtins.toString oauth2ProxyPort}";
+ redirectURL = "https://${oauth2ProxyDomain}/oauth2/callback";
+ setXauthrequest = true;
+ extraConfig = {
+ code-challenge-method = "S256";
+ whitelist-domain = ".swarsel.win";
+ set-authorization-header = true;
+ pass-access-token = true;
+ skip-jwt-bearer-tokens = true;
+ upstream = "static://202";
+ oidc-issuer-url = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy";
+ provider-display-name = "Kanidm";
};
+ provider = "oidc";
+ scope = "openid email";
+ loginURL = "https://${kanidmDomain}/ui/oauth2";
+ redeemURL = "https://${kanidmDomain}/oauth2/token";
+ validateURL = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy/userinfo";
+ clientID = "oauth2-proxy";
+ email.domains = [ "*" ];
};
};
- systemd.services.kanidm.serviceConfig.RestartSec = "30";
+ systemd.services = {
+ kanidm.serviceConfig.RestartSec = "30";
+ oauth2-proxy = {
+ after = [ "kanidm.service" ];
+ serviceConfig = {
+ RuntimeDirectory = "oauth2-proxy";
+ RuntimeDirectoryMode = "0750";
+ UMask = "007"; # TODO remove once https://github.com/oauth2-proxy/oauth2-proxy/issues/2141 is fixed
+ RestartSec = "60"; # Retry every minute
+ EnvironmentFile = [
+ config.sops.templates.kanidm-oauth2-proxy-client-env.path
+ ];
+ };
+ };
+ };
services.nginx = {
+ upstreams = {
+ kanidm = {
+ servers = {
+ "192.168.1.2:${builtins.toString kanidmPort}" = { };
+ };
+ };
+ oauth2-proxy = {
+ servers = {
+ "192.168.1.2:${builtins.toString oauth2ProxyPort}" = { };
+ };
+ };
+ };
virtualHosts = {
"${kanidmDomain}" = {
enableACME = true;
@@ -180,13 +298,27 @@ in
acmeRoot = null;
locations = {
"/" = {
- proxyPass = "https://localhost:${toString kanidmPort}";
+ proxyPass = "https://kanidm";
};
};
extraConfig = ''
proxy_ssl_verify off;
'';
};
+ "${oauth2ProxyDomain}" = {
+ enableACME = true;
+ forceSSL = true;
+ acmeRoot = null;
+ locations = {
+ "/" = {
+ proxyPass = "http://oauth2-proxy";
+ };
+ };
+ extraConfig = ''
+ proxy_set_header X-Scheme $scheme;
+ proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
+ '';
+ };
};
};
};
diff --git a/secrets/winters/secrets.yaml b/secrets/winters/secrets.yaml
index cd73b9b..8ace1fd 100644
--- a/secrets/winters/secrets.yaml
+++ b/secrets/winters/secrets.yaml
@@ -42,6 +42,8 @@ kanidm-grafana-client: ENC[AES256_GCM,data:tV25k0XoFZ9wLF0UWvAabgigayowr3wo0g==,
prometheusadminpass: ENC[AES256_GCM,data:NYUbSnAl0f3FUtvCjvJHFr2wMRsVsbVIeg==,iv:TP4NMwJsft8aEixxJBJCX/0I6BJVBnltFYJDKuXq1hM=,tag:yMY+KZsRjbn8ItgKgjzqSA==,type:str]
#ENC[AES256_GCM,data:QnIF/xhWguX5tw==,iv:yTUBtPaZk6BXi+SC1P/OOtnc2x9UZ/jXirD5oaxhyQY=,tag:c33L5r5BaPZN6zkwduBCwQ==,type:comment]
fresh: ENC[AES256_GCM,data:aPF8D96BvgDXhcc=,iv:Ubq3/sUmBipRanLgkAXXeAfXAz51AuR+NojMifsy8S0=,tag:mHf0YYYxulLXAIByqmnOsA==,type:str]
+kanidm-freshrss-client: ENC[AES256_GCM,data:jBplXWOX/mRTQf6cKmP3C5PZJoBAmb3mhg==,iv:5hcLNGuEQ0T9FiczznGKMul38Ftv8PmG3q0Vaao10oI=,tag:tpx+EDvA31HCnG1/XJOBWg==,type:str]
+oidc-crypto-key: ENC[AES256_GCM,data:O48Va8j2L/GDdTZRQEtVsoy1jsZSCLx0IxFYnCBGhoGRwDW+t0LKPw==,iv:DLCeGhRqRp/JfFaY3vva86OzMwGlcXxiBbQ4Tayjyq4=,tag:We5W8cIntW3D/5vdC/t8IA==,type:str]
#ENC[AES256_GCM,data:+lbLElpVOYo=,iv:DaVuudlnW+vy2PZOs9eiwZhOyILnqEX9KUehFlX2gWE=,tag:lvM6r0JM0DZir4y7iVTeKg==,type:comment]
kanidm-forgejo-client: ENC[AES256_GCM,data:pitJ6re5xm2w1MSs5Ul7Tl1/H1KSR7Ps7w==,iv:4k8/cxpLqWxCgJuk/y9K3OAMCkzu8gb8CDxY+gUuOvg=,tag:OocTFS54teDUfHaHAHZiHw==,type:str]
#ENC[AES256_GCM,data:Ur0/rfBv5g==,iv:eH+KbbkmtBWbobqAIUFF0jIrGhbHnk9g8hLZoxE3swI=,tag:3dnoA+O5GXW5Dvxcx4jiTw==,type:comment]
@@ -56,6 +58,11 @@ kanidm-paperless: ENC[AES256_GCM,data:bJJC20q8aJVzmIMXAHWvOoH652lSCFXDNg==,iv:0c
kanidm-forgejo: ENC[AES256_GCM,data:zw0LcfNJw4q28l1E9q58D9bTKtl/CjGA3w==,iv:fYRGasFiM7PXeP5sWW6whj10CUKIqCfhIYQCNZjxQGo=,tag:sxQJa+ItPA+L3keWZ34SJA==,type:str]
kanidm-grafana: ENC[AES256_GCM,data:61PEA1fBcaRy8+x0dn9WrH9P0D+NOkbeZw==,iv:kbR3JWzHsmsef+VlFGciZmyforxJCdvzHijvGFvFwpk=,tag:K+6baLIKy0L37KrJEQUgPg==,type:str]
kanidm-nextcloud: ENC[AES256_GCM,data:9FjsOzBos18ouHBeuzrzHIpCDowFt0Aktw==,iv:iqUQUsWsO5N+KZqHyqNxMxSija/yPrrrAqvz4b1NG1M=,tag:/WC3wg/eYXV3hLJPRVWLog==,type:str]
+kanidm-oauth2-proxy: ENC[AES256_GCM,data:DQ5tj7N+P1b8vFnF+MGhaUBvbVQoE4sVhQ==,iv:Xy4bdi8fSFuFHsQKgZ3PswFFYsqtiAeqeSRam1k/H0E=,tag:9W4LRPPYtDOrSpxRDK/7sg==,type:str]
+kanidm-freshrss: ENC[AES256_GCM,data:4y0X3sSOfs5pKNCmZGJhxlAKH7GD1UACdw==,iv:LuQQCfOpsTqglwQvohHMFpNGaOjoZ8PKDgG50qBP02k=,tag:Z5mVYP/9nToerQ1qui1eWQ==,type:str]
+#ENC[AES256_GCM,data:8eDo+FQoBEKMTRY2,iv:ZSrV+Z+1S5AoW+jq49LBFzSwd/NJl3aZYHe7oUvGriU=,tag:3cw3hUigrPViQ+XsuMiksg==,type:comment]
+oauth2-cookie-secret: ENC[AES256_GCM,data:l8BPYA7t9NG9MPFs/LDlFHqwbnwsvie7FM5v613358E+jLf2wD+tipyUb6c=,iv:1kZ6G6Z0cSQS53kc/hygh/1Ke491agWDlYHR9Yq0jT0=,tag:mi7Un2JBnrq1dnP3jZX4ng==,type:str]
+kanidm-oauth2-proxy-client: ENC[AES256_GCM,data:+mcA/sz3AZuw+I44iIdOEfDmtjEVdxi2fg==,iv:m4NpieUicS7xsR+F5AgPqkcUFRF+CGOA8IK6GeS9tgM=,tag:1wypxpiHPdQBD8Td/PSdMw==,type:str]
sops:
age:
- recipient: age1h72072slm2pthn9m2qwjsyy2dsazc6hz97kpzh4gksvv0r2jqecqul8w63
@@ -67,8 +74,8 @@ sops:
MEZ1UWw3alF1WnJZMFZvMFBpbDFJZlUKGRnoEEgjgJ9SSblmldtY6d8MdAy01yxl
qkvEIoXbL+ky2ira7EgjD0legThzCnmlXUlcSn3SpwbkAGgcfd2kWA==
-----END AGE ENCRYPTED FILE-----
- lastmodified: "2025-06-09T16:04:54Z"
- mac: ENC[AES256_GCM,data:ggq/mHOw4kaIalgVNI9YASGewzOwR8+DxhvuuOLo3L4Qnn71/HtXkYnKPMm+Ip58AJi7yH5adNOP2q7MZ/wlG/Ygg95PiM/dBso7l79suycrBo+Zz2bGwUjnT6d35Sz2lqsAIDZgpSwk2M51FjivVXD+Un0aWlt/dj5XOwBhlnU=,iv:WRuIlZ1zc+ITNC4R4Zn2ORy7G2hRFnlEBvnjts4n+RE=,tag:wduo+u6Kjm3LyvkLO8OG+w==,type:str]
+ lastmodified: "2025-06-09T19:50:17Z"
+ mac: ENC[AES256_GCM,data:Cx7bI5HRkVVmZTcs/Q3uPtLZaaGd28ZqUsyPRcqd8yEaRxNN0JU6EcQ2ZjU5Zi9jLRLDiR/PxuWsWcmDWH8vW0UZGh6ao75Cw3UO7QhKZHfM5cHqnleo/RIIl5d/Q0hnS9EQmcEPA3qKLQUIrOa+MAgMCkti50ZuNcZnkywLn54=,iv:QPDj4K22G6Go6RDE5ZGbCntmC+mn/5mMyH6ohyQYNuY=,tag:NJ3mjmo2LRmJRXKrYIJZKg==,type:str]
pgp:
- created_at: "2024-12-17T16:24:32Z"
enc: |-