Completely disable OIDC provider temporarily - Comment out all OIDC configuration in identity providers and clients - Remove OIDC secrets from stack to eliminate template processing issues - This should get Authelia running with basic auth only
ci/woodpecker/push/woodpecker Pipeline failed Details

This commit is contained in:
colin 2025-06-11 16:13:51 -04:00
parent f062eeb40d
commit b3e748477d
4 changed files with 101 additions and 97 deletions

BIN
authelia-config.tar.gz Normal file

Binary file not shown.

View File

@ -1,19 +1,20 @@
identity_providers:
oidc:
lifespans:
access_token: 1h
authorize_code: 1m
id_token: 1h
refresh_token: 90m
enable_client_debug_messages: false
enforce_pkce: public_clients_only
cors:
endpoints:
- authorization
- token
- revocation
- introspection
- userinfo
allowed_origins:
- "*"
allowed_origins_from_client_redirect_uris: false
# TEMPORARILY DISABLED - OIDC provider causing startup issues
# identity_providers:
# oidc:
# lifespans:
# access_token: 1h
# authorize_code: 1m
# id_token: 1h
# refresh_token: 90m
# enable_client_debug_messages: false
# enforce_pkce: public_clients_only
# cors:
# endpoints:
# - authorization
# - token
# - revocation
# - introspection
# - userinfo
# allowed_origins:
# - "*"
# allowed_origins_from_client_redirect_uris: false

View File

@ -1,60 +1,61 @@
identity_providers:
oidc:
hmac_secret: {{ secret "/run/secrets/IDENTITY_PROVIDERS_OIDC_HMAC_SECRET" }}
jwks:
- key: {{ secret "/run/secrets/IDENTITY_PROVIDERS_OIDC_JWKS_KEY" | mindent 10 "|" | msquote }}
authorization_policies:
headscale:
default_policy: deny
rules:
- policy: one_factor
subject: group:headscale
# To generate secrets:
# docker exec -it authelia authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986
clients:
- client_id: headscale
client_name: Headscale
client_secret: {{ secret "/run/secrets/CLIENT_SECRET_HEADSCALE" }}
public: false
authorization_policy: headscale
consent_mode: implicit
scopes:
- openid
- email
- profile
redirect_uris:
- https://headscale.{{ env "TRAEFIK_DOMAIN" }}/oidc/callback
- https://headscale.{{ env "TRAEFIK_DOMAIN" }}/admin/oidc/callback # headplane on same domain as headscale
# - https://headplane.{{ env "TRAEFIK_DOMAIN" }}/admin/oidc/callback # headplane on it's own domain
userinfo_signed_response_alg: none
- client_id: headadmin
client_name: headadmin
client_secret: {{ secret "/run/secrets/CLIENT_SECRET_HEADADMIN" }}
public: false
authorization_policy: one_factor
consent_mode: implicit
scopes:
- openid
- email
- profile
redirect_uris:
- https://headadmin.{{ env "TRAEFIK_DOMAIN" }}/oidc_callback
userinfo_signed_response_alg: none
- client_id: portainer
client_name: Portainer
client_secret: {{ secret "/run/secrets/CLIENT_SECRET_PORTAINER" }}
public: false
authorization_policy: one_factor
consent_mode: implicit
scopes:
- openid
- email
- profile
- groups
redirect_uris:
- https://portainer.{{ env "TRAEFIK_DOMAIN" }}/
userinfo_signed_response_alg: none
# TEMPORARILY DISABLED - OIDC clients causing template processing issues
# identity_providers:
# oidc:
# hmac_secret: {{ secret "/run/secrets/IDENTITY_PROVIDERS_OIDC_HMAC_SECRET" }}
# jwks:
# - key: {{ secret "/run/secrets/IDENTITY_PROVIDERS_OIDC_JWKS_KEY" | mindent 10 "|" | msquote }}
#
# authorization_policies:
#
# headscale:
# default_policy: deny
# rules:
# - policy: one_factor
# subject: group:headscale
# # To generate secrets:
# # docker exec -it authelia authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986
# clients:
#
# - client_id: headscale
# client_name: Headscale
# client_secret: {{ secret "/run/secrets/CLIENT_SECRET_HEADSCALE" }}
# public: false
# authorization_policy: headscale
# consent_mode: implicit
# scopes:
# - openid
# - email
# - profile
# redirect_uris:
# - https://headscale.{{ env "TRAEFIK_DOMAIN" }}/oidc/callback
# - https://headscale.{{ env "TRAEFIK_DOMAIN" }}/admin/oidc/callback # headplane on same domain as headscale
# # - https://headplane.{{ env "TRAEFIK_DOMAIN" }}/admin/oidc/callback # headplane on it's own domain
# userinfo_signed_response_alg: none
# - client_id: headadmin
# client_name: headadmin
# client_secret: {{ secret "/run/secrets/CLIENT_SECRET_HEADADMIN" }}
# public: false
# authorization_policy: one_factor
# consent_mode: implicit
# scopes:
# - openid
# - email
# - profile
# redirect_uris:
# - https://headadmin.{{ env "TRAEFIK_DOMAIN" }}/oidc_callback
# userinfo_signed_response_alg: none
#
# - client_id: portainer
# client_name: Portainer
# client_secret: {{ secret "/run/secrets/CLIENT_SECRET_PORTAINER" }}
# public: false
# authorization_policy: one_factor
# consent_mode: implicit
# scopes:
# - openid
# - email
# - profile
# - groups
# redirect_uris:
# - https://portainer.{{ env "TRAEFIK_DOMAIN" }}/
# userinfo_signed_response_alg: none

View File

@ -10,24 +10,26 @@ secrets:
external: true
IDENTITY_VALIDATION_RESET_PASSWORD_JWT_SECRET:
external: true
IDENTITY_PROVIDERS_OIDC_HMAC_SECRET:
external: true
IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY:
external: true
IDENTITY_PROVIDERS_OIDC_JWKS_KEY:
external: true
# TEMPORARILY DISABLED - OIDC provider disabled
# IDENTITY_PROVIDERS_OIDC_HMAC_SECRET:
# external: true
# IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY:
# external: true
# IDENTITY_PROVIDERS_OIDC_JWKS_KEY:
# external: true
NOTIFIER_SMTP_PASSWORD:
external: true
SESSION_SECRET:
external: true
STORAGE_ENCRYPTION_KEY:
external: true
CLIENT_SECRET_HEADSCALE:
external: true
CLIENT_SECRET_HEADADMIN:
external: true
CLIENT_SECRET_PORTAINER:
external: true
# TEMPORARILY DISABLED - OAuth clients disabled
# CLIENT_SECRET_HEADSCALE:
# external: true
# CLIENT_SECRET_HEADADMIN:
# external: true
# CLIENT_SECRET_PORTAINER:
# external: true
# TEMPORARILY DISABLED - Gitea OAuth (not ready yet)
# CLIENT_SECRET_GITEA:
# external: true
@ -63,15 +65,15 @@ services:
secrets:
- AUTHENTICATION_BACKEND_LDAP_PASSWORD
- IDENTITY_VALIDATION_RESET_PASSWORD_JWT_SECRET
- IDENTITY_PROVIDERS_OIDC_HMAC_SECRET
- IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY
- IDENTITY_PROVIDERS_OIDC_JWKS_KEY
# - IDENTITY_PROVIDERS_OIDC_HMAC_SECRET
# - IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY
# - IDENTITY_PROVIDERS_OIDC_JWKS_KEY
- NOTIFIER_SMTP_PASSWORD
- SESSION_SECRET
- STORAGE_ENCRYPTION_KEY
- CLIENT_SECRET_HEADSCALE
- CLIENT_SECRET_HEADADMIN
- CLIENT_SECRET_PORTAINER
# - CLIENT_SECRET_HEADSCALE
# - CLIENT_SECRET_HEADADMIN
# - CLIENT_SECRET_PORTAINER
environment: *authelia-env
dns:
- 1.1.1.1 # Cloudflare