feat: Integrate Authentik OIDC into Semaphore and enhance Proxmox VM template creation with image list selection and SSH key management.

This commit is contained in:
Nikholas Pcenicni
2026-01-19 02:35:33 -05:00
parent 91cb5ba36f
commit 75b2702c9a
6 changed files with 192 additions and 75 deletions

View File

@@ -17,3 +17,7 @@ SEMAPHORE_EMAIL_PASSWORD=smtp_password
SEMAPHORE_EMAIL_SECURE=false
AUTHENTIK_URL=https://authentik.example.com/application/o/<slug>/
AUTHENTIK_CLIENT_ID=your_client_id
AUTHENTIK_CLIENT_SECRET=your_client_secret
AUTHENTIK_REDIRECT_URI=https://semaphore.example.com/api/auth/oidc/authentik/redirect/

View File

@@ -34,6 +34,18 @@ services:
SEMAPHORE_EMAIL_USERNAME: ${SEMAPHORE_EMAIL_USERNAME}
SEMAPHORE_EMAIL_PASSWORD: ${SEMAPHORE_EMAIL_PASSWORD}
SEMAPHORE_EMAIL_SECURE: ${SEMAPHORE_EMAIL_SECURE}
SEMAPHORE_OIDC_PROVIDERS: '{
"authentik": {
"display_name": "Sign in with Authentik",
"provider_url": ${AUTHENTIK_URL},
"client_id": ${AUTHENTIK_CLIENT_ID},
"client_secret": ${AUTHENTIK_CLIENT_SECRET},
"redirect_uri": ${AUTHENTIK_REDIRECT_URI},
"scopes": ["openid", "profile", "email"],
"username_claim": "preferred_username",
"name_claim": "preferred_username"
}
}'
volumes:
- semaphore_data:/var/lib/semaphore
- semaphore_config:/etc/semaphore