From 9d7fa8ec7d82c8d71bf15de11cb7867dbac8cd87 Mon Sep 17 00:00:00 2001 From: Alexander Tomokhov Date: Fri, 11 Apr 2025 20:59:02 +0400 Subject: [PATCH] clean auth/auth.nix and auth/auth-module.nix --- auth/auth-module.nix | 2 -- auth/auth.nix | 8 ++++---- 2 files changed, 4 insertions(+), 6 deletions(-) diff --git a/auth/auth-module.nix b/auth/auth-module.nix index fa29470..bd89edb 100644 --- a/auth/auth-module.nix +++ b/auth/auth-module.nix @@ -204,7 +204,6 @@ in ); }; }; - # (lib.debug.traceValSeq config = lib.mkIf config.selfprivacy.sso.enable ( let clientsAttrsList = lib.attrsets.mapAttrsToList @@ -299,7 +298,6 @@ in , originUrl , scopeMaps , useShortPreferredUsername - , subdomain , usersGroup , ... }: { diff --git a/auth/auth.nix b/auth/auth.nix index 75da8f5..5753bfe 100644 --- a/auth/auth.nix +++ b/auth/auth.nix @@ -246,10 +246,10 @@ lib.mkIf config.selfprivacy.sso.enable { (lib.strings.splitString "." domain); # TODO consider to pass a value or throw exception if token is not generated - mkServiceAccountTokenFP = oauthClientID: - "${keys-path}/${oauthClientID}/kanidm-service-account-token"; + mkServiceAccountTokenFP = linuxGroup: + "${keys-path}/${linuxGroup}/kanidm-service-account-token"; - mkOAuth2ClientSecretFP = oauthClientID: - "${keys-path}/${oauthClientID}/kanidm-oauth-client-secret"; + mkOAuth2ClientSecretFP = linuxGroup: + "${keys-path}/${linuxGroup}/kanidm-oauth-client-secret"; }; }