Greg greg
  • Joined on 2018-11-05
greg commented on issue kosmos/chef#110 2019-10-28 10:09:48 +00:00
kosmos.social cert renewal failed due to auth error

I found the issue, it was caused by this addition: 10b6f63

greg commented on issue kosmos/chef#107 2019-10-24 11:22:31 +00:00
Set up LDAP server for central account management

That's correct, I still don't understand your question.

greg commented on issue kosmos/chef#107 2019-10-24 09:04:01 +00:00
Set up LDAP server for central account management

If that’s the case, then how are accounts the same between Mastodon and other services?

greg commented on issue kosmos/chef#107 2019-10-23 10:48:07 +00:00
Set up LDAP server for central account management

I’m pretty sure we do not want to create users from Mastodon. It would mean that when you already have an LDAP user for e.g. XMPP or Gitea, you then have an additional one, no?

greg commented on issue kosmos/chef#107 2019-10-23 09:52:34 +00:00
Set up LDAP server for central account management

Existing accounts will work after we enable LDAP in Mastodon. Accounts created by logging in with an LDAP user do not have an encrypted_password set in the Mastodon database, the password is checked on the LDAP account and they have the external flag set. Existing accounts that have an encrypted_password set will still work if they do not exist in LDAP.

greg commented on issue kosmos/chef#107 2019-10-22 11:53:53 +00:00
Set up LDAP server for central account management

I got Mastodon to work with LDAP in a VM.

greg commented on issue kosmos/chef#107 2019-10-18 12:52:29 +00:00
Set up LDAP server for central account management

Good idea, that works.

greg commented on issue kosmos/chef#107 2019-10-18 11:44:55 +00:00
Set up LDAP server for central account management

Got it, using extensibleObject as objectClass we can used arbitrary attributes:

greg pushed to feature/18-akkounts-api at kosmos/chef 2019-10-18 11:27:26 +00:00
2c20fa4a2f Fix the nginx vhost for akkounts-api
greg commented on issue kosmos/chef#107 2019-10-18 10:35:42 +00:00
Set up LDAP server for central account management
greg pushed to feature/18-akkounts-api at kosmos/chef 2019-10-18 10:31:01 +00:00
2104e81250 Add the kosmos-akkounts::nginx recipe to kosmos-akkounts::default
greg pushed to feature/18-akkounts-api at kosmos/chef 2019-10-18 10:27:45 +00:00
6bb93eb5f5 Fix the path to index.js
greg pushed to feature/18-akkounts-api at kosmos/chef 2019-10-18 10:26:40 +00:00
c5eeab3606 Remove typescript and the compilation step
greg commented on issue kosmos/chef#107 2019-10-17 17:04:58 +00:00
Set up LDAP server for central account management

I got ejabberd working with LDAP auth in a VM. ejabberd itself, like GitLab, only has read-only support for LDAP, so you can't create users on LDAP through ejabberdctl. I created an ldif file and used ldapadd to add a group and a user:

greg commented on issue kosmos/chef#109 2019-10-17 13:03:18 +00:00
Deploy akkounts-api behind an nginx reverse proxy with a TLS cert

To replace the data bag secrets:

greg created pull request kosmos/chef#109 2019-10-17 13:00:55 +00:00
Deploy akkounts-api behind an nginx reverse proxy with a TLS cert
greg pushed to feature/18-akkounts-api at kosmos/chef 2019-10-17 12:59:02 +00:00
9ecf40e72a Add dummy encrypted data bag secret
185982ff9f Add the initial kosmos-akkounts cookbook to deploy akkounts-api
greg commented on issue kosmos/chef#20 2019-10-17 11:24:46 +00:00
Nginx config for akkounts-api

What about the domain? akkounts-api.kosmos.org, something else?

greg merged pull request kosmos/chef#108 2019-10-16 10:34:33 +00:00
Fix Mastodon Web systemd service