Compare commits
3 Commits
0e7b17b468
...
4834639add
Author | SHA1 | Date | |
---|---|---|---|
4834639add | |||
d273c9a515 | |||
36cd5d3d16 |
@ -3,13 +3,12 @@
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
nix = {
|
||||
gc = {
|
||||
nix.gc = {
|
||||
automatic = true;
|
||||
options = "--delete-older-than 30d";
|
||||
};
|
||||
optimise.automatic = true;
|
||||
settings = {
|
||||
nix.optimise.automatic = true;
|
||||
nix.settings = {
|
||||
extra-experimental-features = [
|
||||
"flakes"
|
||||
"nix-command"
|
||||
@ -22,16 +21,7 @@
|
||||
config.my.user
|
||||
];
|
||||
};
|
||||
package = pkgs.nix;
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
unstable.nh
|
||||
];
|
||||
|
||||
# TODO: make sure hostnames always match flake output name
|
||||
environment.variables."NH_FLAKE" = ''${config.hm.home.homeDirectory}/Projects/nix-dots'';
|
||||
|
||||
nix.package = pkgs.nix;
|
||||
programs.zsh.enable = true;
|
||||
time.timeZone = "America/New_York";
|
||||
}
|
||||
|
@ -16,7 +16,7 @@ in {
|
||||
hm.my.sketchybar.enable = true;
|
||||
|
||||
fonts.packages = with pkgs; [
|
||||
unstable.sketchybar-app-font
|
||||
sketchybar-app-font
|
||||
];
|
||||
};
|
||||
}
|
||||
|
@ -30,7 +30,7 @@
|
||||
);
|
||||
in {
|
||||
flake.darwinConfigurations = {
|
||||
neptune = mkDarwin {
|
||||
mac = mkDarwin {
|
||||
modules = [
|
||||
{
|
||||
hm = import ../user/environments/mac/home.nix;
|
||||
|
@ -51,6 +51,12 @@
|
||||
|
||||
programs.zsh.enable = true;
|
||||
|
||||
my.server = {
|
||||
domain = "thomasfmly.org";
|
||||
firewallInterface = "enp1s0";
|
||||
};
|
||||
|
||||
my.services.keycloak.enable = true;
|
||||
my.services.mealie.enable = true;
|
||||
my.services.nextcloud.enable = true;
|
||||
|
||||
|
@ -31,12 +31,13 @@ in {
|
||||
|
||||
# OIDC
|
||||
OIDC_AUTH_ENABLED = true;
|
||||
OIDC_CONFIGURATION_URL = "https://authentik.thomasfmly.org/application/o/mealie/.well-known/openid-configuration";
|
||||
OIDC_CLIENT_ID = "FLFfJCP0nWsxGfHpAf26XfoqMaIoUuaVdODJLW28";
|
||||
OIDC_CLIENT_SECRET = "YSEfBhGQUmzAKnrAEi9413NM4m8juF8u7e8zOLzfCA1JXZdRsgj8WWXTKLqEeGhCiQsVvD1iX52sFcWqOWo2r7tpolpUUVymj8O4kfMWampO1Nn65K2aPFtuXu3soUwB";
|
||||
OIDC_ADMIN_GROUP = "Administrators";
|
||||
OIDC_CONFIGURATION_URL = "https://auth.thomasfmly.org/realms/gringotts/.well-known/openid-configuration";
|
||||
OIDC_CLIENT_ID = "mealie";
|
||||
OIDC_CLIENT_SECRET = "cBh876vWKoMgJSWLVJkVv6kPvUoNkvxD";
|
||||
OIDC_GROUPS_CLAIM = "roles";
|
||||
OIDC_ADMIN_GROUP = "admin";
|
||||
OIDC_AUTO_REDIRECT = true;
|
||||
OIDC_PROVIDER_NAME = "Authentik";
|
||||
OIDC_PROVIDER_NAME = "Keycloak";
|
||||
};
|
||||
};
|
||||
|
||||
|
53
nixos/keycloak/default.nix
Normal file
53
nixos/keycloak/default.nix
Normal file
@ -0,0 +1,53 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
with lib; let
|
||||
cfg = config.my.services.keycloak;
|
||||
inherit (config.my.server) domain firewallInterface;
|
||||
keycloakDomain = "auth.${domain}";
|
||||
keycloakUrl = "https://${keycloakDomain}";
|
||||
in {
|
||||
options.my.services.keycloak = {
|
||||
enable = mkEnableOption "Keycloak";
|
||||
proxy = mkEnableOption "Keycloak reverse proxy entry";
|
||||
port = mkOption {
|
||||
type = types.port;
|
||||
default = 7654;
|
||||
example = 8080;
|
||||
description = "HTTP port for the Keycloak service.";
|
||||
};
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable {
|
||||
age.secrets.keycloakDb.file = ../../secrets/keycloak-db.age;
|
||||
services.keycloak = {
|
||||
enable = true;
|
||||
package = pkgs.keycloak;
|
||||
settings = {
|
||||
hostname = keycloakUrl;
|
||||
hostname-admin = keycloakUrl;
|
||||
hostname-strict = false;
|
||||
hostname-strict-https = false;
|
||||
proxy-headers = "xforwarded";
|
||||
http-enabled = true;
|
||||
http-port = cfg.port;
|
||||
};
|
||||
database.passwordFile = config.age.secrets.keycloakDb.path;
|
||||
themes = with pkgs; {
|
||||
keywind = keycloak-theme-keywind;
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.interfaces."${firewallInterface}".allowedTCPPorts = [cfg.port];
|
||||
})
|
||||
(mkIf cfg.proxy {
|
||||
services.caddy.virtualHosts."${keycloakDomain}".extraConfig = ''
|
||||
reverse_proxy http://${proxyIP}:${toString cfg.port}
|
||||
'';
|
||||
})
|
||||
];
|
||||
}
|
@ -1,4 +1,7 @@
|
||||
{inputs, ...}: {
|
||||
rust-overlay = inputs.rust-overlay.overlays.default;
|
||||
vscode-extensions = inputs.nix-vscode-extensions.overlays.default;
|
||||
|
||||
# This one brings our custom packages from the 'pkgs' directory
|
||||
additions = final: prev:
|
||||
{
|
||||
@ -14,18 +17,13 @@
|
||||
# This one contains whatever you want to overlay
|
||||
# You can change versions, add patches, set compilation flags, anything really.
|
||||
# https://nixos.wiki/wiki/Overlays
|
||||
modifications = final: prev: {
|
||||
# address build failure on darwin, remove after 25.05
|
||||
nodejs_20-slim = prev.nodejs-slim_22;
|
||||
nodejs_20 = prev.nodejs_22;
|
||||
nodejs-slim = prev.nodejs-slim_22;
|
||||
nodejs = prev.nodejs_22;
|
||||
};
|
||||
|
||||
# External overlays
|
||||
# Included after the above to ensure modifications are applied
|
||||
rust-overlay = inputs.rust-overlay.overlays.default;
|
||||
vscode-extensions = inputs.nix-vscode-extensions.overlays.default;
|
||||
modifications = final: prev:
|
||||
if prev.stdenv.isDarwin
|
||||
then {
|
||||
# avoid build failure on darwin
|
||||
inherit (final.unstable) ghostscript;
|
||||
}
|
||||
else {};
|
||||
|
||||
# When applied, the unstable nixpkgs set (declared in the flake inputs) will
|
||||
# be accessible through 'pkgs.unstable'
|
||||
|
@ -8,7 +8,7 @@
|
||||
icons = import ./config/icons.nix;
|
||||
pkgsMaster = inputs.master.legacyPackages.${system};
|
||||
nixvimModule = {
|
||||
inherit pkgs;
|
||||
pkgs = inputs.nixpkgs.legacyPackages.${system};
|
||||
module = import ./config;
|
||||
extraSpecialArgs = {inherit icons pkgsMaster;};
|
||||
};
|
||||
|
@ -17,7 +17,7 @@
|
||||
userName = "Michael Thomas";
|
||||
extraConfig = {
|
||||
credential.helper = lib.mkDefault "store";
|
||||
pull.rebase = "false";
|
||||
pull.rebase = "true";
|
||||
init.defaultBranch = "main";
|
||||
};
|
||||
};
|
||||
|
Loading…
x
Reference in New Issue
Block a user