forked from pub-solar/infra
Benjamin Yule Bädorf
68278ad983
This works towards having reusable modules * `config.pub-solar-os.networking.domain` is used for the main domain * `config.pub-solar-os.privacyPolicUrl` links towards the privacy policy * `config.pub-solar-os.imprintUrl` links towards the imprint * `config.pub-solar-os.auth.enable` enables the keycloak installation. This is needed because `config.pub-solar-os.auth` has to be available everywhere, but we do not want to install keycloak everywhere. * `config.pub-solar-os.auth.realm` sets the keycloak realm name
109 lines
2.9 KiB
Nix
109 lines
2.9 KiB
Nix
{ flake
|
|
, config
|
|
, lib
|
|
, pkgs
|
|
, ...
|
|
}: {
|
|
options.pub-solar-os.auth = with lib; {
|
|
enable = mkEnableOption "Enable keycloak to run on the node";
|
|
|
|
realm = mkOption {
|
|
description = "Name of the realm";
|
|
type = types.str;
|
|
default = config.pub-solar-os.networking.domain;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf config.pub-solar-os.auth.enable {
|
|
age.secrets.keycloak-database-password = {
|
|
file = "${flake.self}/secrets/keycloak-database-password.age";
|
|
mode = "600";
|
|
#owner = "keycloak";
|
|
};
|
|
|
|
services.nginx.virtualHosts."auth.${config.pub-solar-os.networking.domain}" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
|
|
locations = {
|
|
"= /" = {
|
|
extraConfig = ''
|
|
return 302 /realms/${config.pub-solar-os.auth.realm}/account;
|
|
'';
|
|
};
|
|
|
|
"/" = {
|
|
extraConfig = ''
|
|
proxy_pass http://127.0.0.1:8080;
|
|
proxy_buffer_size 8k;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
# keycloak
|
|
services.keycloak = {
|
|
enable = true;
|
|
database.passwordFile = config.age.secrets.keycloak-database-password.path;
|
|
settings = {
|
|
hostname = "auth.${config.pub-solar-os.networking.domain}";
|
|
http-host = "127.0.0.1";
|
|
http-port = 8080;
|
|
proxy = "edge";
|
|
features = "declarative-user-profile";
|
|
};
|
|
themes = {
|
|
"pub.solar" = flake.inputs.keycloak-theme-pub-solar.legacyPackages.${pkgs.system}.keycloak-theme-pub-solar;
|
|
};
|
|
};
|
|
|
|
services.restic.backups.keycloak-droppie = {
|
|
paths = [
|
|
"/tmp/keycloak-backup.sql"
|
|
];
|
|
timerConfig = {
|
|
OnCalendar = "*-*-* 02:00:00 Etc/UTC";
|
|
# droppie will be offline if nachtigall misses the timer
|
|
Persistent = false;
|
|
};
|
|
initialize = true;
|
|
passwordFile = config.age.secrets."restic-repo-droppie".path;
|
|
repository = "sftp:yule@droppie.b12f.io:/media/internal/pub.solar";
|
|
backupPrepareCommand = ''
|
|
${pkgs.sudo}/bin/sudo -u postgres ${pkgs.postgresql}/bin/pg_dump -d keycloak > /tmp/keycloak-backup.sql
|
|
'';
|
|
backupCleanupCommand = ''
|
|
rm /tmp/keycloak-backup.sql
|
|
'';
|
|
pruneOpts = [
|
|
"--keep-daily 7"
|
|
"--keep-weekly 4"
|
|
"--keep-monthly 3"
|
|
];
|
|
};
|
|
|
|
services.restic.backups.keycloak-storagebox = {
|
|
paths = [
|
|
"/tmp/keycloak-backup.sql"
|
|
];
|
|
timerConfig = {
|
|
OnCalendar = "*-*-* 04:10:00 Etc/UTC";
|
|
};
|
|
initialize = true;
|
|
passwordFile = config.age.secrets."restic-repo-storagebox".path;
|
|
repository = "sftp:u377325@u377325.your-storagebox.de:/backups";
|
|
backupPrepareCommand = ''
|
|
${pkgs.sudo}/bin/sudo -u postgres ${pkgs.postgresql}/bin/pg_dump -d keycloak > /tmp/keycloak-backup.sql
|
|
'';
|
|
backupCleanupCommand = ''
|
|
rm /tmp/keycloak-backup.sql
|
|
'';
|
|
pruneOpts = [
|
|
"--keep-daily 7"
|
|
"--keep-weekly 4"
|
|
"--keep-monthly 3"
|
|
];
|
|
};
|
|
};
|
|
}
|