65 lines
1.5 KiB
Nix
65 lines
1.5 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
inputs,
|
|
pkgs,
|
|
self,
|
|
...
|
|
}: let
|
|
pubsolarDomain = import ./pubsolar-domain.nix;
|
|
in {
|
|
age.secrets.keycloak-database-password = {
|
|
file = "${self}/secrets/keycloak-database-password.age";
|
|
mode = "770";
|
|
group = "keycloak";
|
|
};
|
|
|
|
systemd.tmpfiles.rules = [
|
|
"d '/data/keycloak/db' 0770 root postgres - -"
|
|
];
|
|
|
|
users.groups.postgres = {};
|
|
users.groups.keycloak = {};
|
|
ids.uids.keycloak = 993;
|
|
ids.gids.keycloak = 993;
|
|
|
|
containers.keycloak = {
|
|
autoStart = true;
|
|
privateNetwork = true;
|
|
hostAddress = "192.168.101.0";
|
|
localAddress = "192.168.104.0";
|
|
hostAddress6 = "fc00::1";
|
|
localAddress6 = "fc00::4";
|
|
|
|
bindMounts = {
|
|
"/var/lib/postgresql/14" = {
|
|
hostPath = "/data/keycloak/db";
|
|
isReadOnly = false;
|
|
};
|
|
|
|
"${config.age.secrets.keycloak-database-password.path}" = {
|
|
hostPath = "${config.age.secrets.keycloak-database-password.path}";
|
|
isReadOnly = true;
|
|
};
|
|
};
|
|
|
|
config = {
|
|
networking.nameservers = ["1.1.1.1"];
|
|
|
|
services.keycloak = {
|
|
enable = true;
|
|
database.passwordFile = config.age.secrets.keycloak-database-password.path;
|
|
settings = {
|
|
hostname = "auth.${pubsolarDomain}";
|
|
http-host = "0.0.0.0";
|
|
http-port = 8080;
|
|
proxy = "edge";
|
|
};
|
|
themes = {
|
|
"pub.solar" = inputs.keycloak-theme-pub-solar.legacyPackages.${pkgs.system}.keycloak-theme-pub-solar;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
}
|