commit e16cf40dfbaf4cb1100f8e9e1b15da709393c277
parent dcc51eb273d462b467d58c3fd150b07e096b53d9
Author: decentral1se <decentral1se@web>
Date: Sat, 4 Apr 2026 11:21:11 +0200
feat: moar rauthy docs
Diffstat:
| M | eik.mdwn | | | 29 | ++++++++++++++++++++++++++--- |
1 file changed, 26 insertions(+), 3 deletions(-)
diff --git a/eik.mdwn b/eik.mdwn
@@ -36,6 +36,7 @@ We use `acme.sh` for handling certs, however expanding certs with a new domain i
-d rotterdam.permacomputing.net \
-d ireland.permacomputing.net \
-d brewing.permacomputing.net \
+ -d enter.permacomputing.net \
-d newdomain.permacomputing.net
acme.sh --install-cert \
@@ -49,6 +50,7 @@ We use `acme.sh` for handling certs, however expanding certs with a new domain i
-d rotterdam.permacomputing.net \
-d ireland.permacomputing.net \
-d brewing.permacomputing.net \
+ -d enter.permacomputing.net \
-d newdomain.permacomputing.net \
--key-file /etc/nginx/certs/key.pem \
--fullchain-file /etc/nginx/certs/cert.pem \
@@ -191,7 +193,16 @@ You cand send a test mail with the following:
echo "Subject: test from eik" | /usr/sbin/sendmail -v some@where.nice
-rauthy
+Creating system users
+---------------------
+
+We seem to be doing this.
+
+ useradd --system --shell /sbin/nologin <username>
+
+And then using these in `systemd` files to run services with users with limited permissions. This is at least the case for `cerca` and `rauthy`. Documenting this in case we choose to do it differently in the future.
+
+Rauthy
------
### Build
@@ -204,8 +215,20 @@ You can build a binary for eik with the following. Make sure to check out a tag
rustup target add x86_64-unknown-linux-musl
cargo build --target=x86_64-unknown-linux-musl
-### Configuration
+You can transfer to eik like so.
+
+ scp target/x86_64-unknown-linux-musl/release/rauthy eik.permacomputing.net:
-The Rauthy binary lives in /usr/bin/rauthy and it's configuration is to be found in /etc/rauthy/config.toml. Here are the [configuration reference docs](https://sebadob.github.io/rauthy/config/config.html).
+Don't forget to `mv` it to `/usr/local/bin` and `chown rauthy:rauthy` on the binary. You should also make sure `rauthy` is stopped on eik before replacing the binary.
+
+### Configure
+
+The `rauthy` binary lives in /usr/local/bin/rauthy and it's configuration and data is to be found in /etc/rauthy/config.toml. Here are the [configuration reference docs](https://sebadob.github.io/rauthy/config/config.html).
You can `journalctl -fu rauthy` to follow along with the logs and the usual `systemctl restart rauthy` will restart Rauthy.
+
+Rauthy runs under the `rauthy` user, please prefix your commands with `sudo -su rauthy` if running commands directly on the configuration or data to avoid borking permissions.
+
+### Admin
+
+See the config.toml for the fallback admin email. Ask in Toolshed for the password. You can also create an account and be upgraded to administrator by applying the "rauthy_admin" role on user creation.