forked from pub-solar/infra
teutat3s
bc9ac6011e
Fix warnings: trace: warning: The option `services.nextcloud.extraOptions' defined in `/nix/store/a53lc1l5wy9vbv1d3n93903dq0wjgvfj-source/flake.nix#nixosModules.nextcloud' has been renamed to `services.nextcloud.settings'. trace: warning: The option `services.nextcloud.skeletonDirectory' defined in `/nix/store/a53lc1l5wy9vbv1d3n93903dq0wjgvfj-source/flake.nix#nixosModules.nextcloud' has been renamed to `services.nextcloud.settings.skeletondirectory'. trace: warning: The option `services.nextcloud.config.overwriteProtocol' defined in `/nix/store/a53lc1l5wy9vbv1d3n93903dq0wjgvfj-source/flake.nix#nixosModules.nextcloud' has been renamed to `services.nextcloud.settings.overwriteprotocol'. trace: warning: The option `services.matrix-synapse.sliding-sync' defined in `/nix/store/a53lc1l5wy9vbv1d3n93903dq0wjgvfj-source/flake.nix#nixosModules.matrix' has been renamed to `services.matrix-sliding-sync'. Fix errors: loki: fix config for version 3+ keycloak: declarative-user-profile feature is now enabled by default error: A definition for option `programs.gnupg.agent.pinentryPackage' is not of type `null or package'. Definition values: - In `/nix/store/a53lc1l5wy9vbv1d3n93903dq0wjgvfj-source/flake.nix#nixosModules.forgejo': "curses"
84 lines
2.1 KiB
Nix
84 lines
2.1 KiB
Nix
{
|
|
flake,
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
{
|
|
options.pub-solar-os.auth = {
|
|
enable = lib.mkEnableOption "Enable keycloak to run on the node";
|
|
|
|
realm = lib.mkOption {
|
|
description = "Name of the realm";
|
|
type = lib.types.str;
|
|
default = config.pub-solar-os.networking.domain;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf config.pub-solar-os.auth.enable {
|
|
age.secrets.keycloak-database-password = {
|
|
file = "${flake.self}/secrets/keycloak-database-password.age";
|
|
mode = "600";
|
|
#owner = "keycloak";
|
|
};
|
|
|
|
services.nginx.virtualHosts."auth.${config.pub-solar-os.networking.domain}" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
|
|
locations = {
|
|
"= /" = {
|
|
extraConfig = ''
|
|
return 302 /realms/${config.pub-solar-os.auth.realm}/account;
|
|
'';
|
|
};
|
|
|
|
"/" = {
|
|
extraConfig = ''
|
|
proxy_pass http://127.0.0.1:8080;
|
|
proxy_buffer_size 8k;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
# keycloak
|
|
services.keycloak = {
|
|
enable = true;
|
|
database.passwordFile = config.age.secrets.keycloak-database-password.path;
|
|
settings = {
|
|
hostname = "auth.${config.pub-solar-os.networking.domain}";
|
|
http-host = "127.0.0.1";
|
|
http-port = 8080;
|
|
proxy = "edge";
|
|
};
|
|
themes = {
|
|
"pub.solar" =
|
|
flake.inputs.keycloak-theme-pub-solar.legacyPackages.${pkgs.system}.keycloak-theme-pub-solar;
|
|
};
|
|
};
|
|
|
|
services.restic.backups.keycloak-storagebox = {
|
|
paths = [ "/tmp/keycloak-backup.sql" ];
|
|
timerConfig = {
|
|
OnCalendar = "*-*-* 03:00:00 Etc/UTC";
|
|
};
|
|
initialize = true;
|
|
passwordFile = config.age.secrets."restic-repo-storagebox".path;
|
|
repository = "sftp:u377325@u377325.your-storagebox.de:/backups";
|
|
backupPrepareCommand = ''
|
|
${pkgs.sudo}/bin/sudo -u postgres ${pkgs.postgresql}/bin/pg_dump -d keycloak > /tmp/keycloak-backup.sql
|
|
'';
|
|
backupCleanupCommand = ''
|
|
rm /tmp/keycloak-backup.sql
|
|
'';
|
|
pruneOpts = [
|
|
"--keep-daily 7"
|
|
"--keep-weekly 4"
|
|
"--keep-monthly 3"
|
|
];
|
|
};
|
|
};
|
|
}
|