WIP kanidm deployment
This commit is contained in:
parent
63047aec55
commit
ab03e929d4
6 changed files with 47 additions and 0 deletions
2
modules/nixos/kanidm/client.toml
Normal file
2
modules/nixos/kanidm/client.toml
Normal file
|
@ -0,0 +1,2 @@
|
|||
uri = "https://idm.foxtrot.hare-cod.ts.net:8443"
|
||||
ca_path = "/tmp/cert.pem"
|
BIN
modules/nixos/kanidm/kanidm.db
Normal file
BIN
modules/nixos/kanidm/kanidm.db
Normal file
Binary file not shown.
10
modules/nixos/kanidm/server.toml
Normal file
10
modules/nixos/kanidm/server.toml
Normal file
|
@ -0,0 +1,10 @@
|
|||
bindaddress = "[::]:8443"
|
||||
db_path = "/home/daniel/code/nix/modules/nixos/kanidm/kanidm.db"
|
||||
tls_chain = "/tmp/cert.pem"
|
||||
tls_key = "/tmp/key.pem"
|
||||
domain = "idm.foxtrot.hare-cod.ts.net"
|
||||
origin = "https://idm.foxtrot.hare-cod.ts.net:8443"
|
||||
|
||||
[online_backup]
|
||||
path = "/tmp/kanidm/backups/"
|
||||
schedule = "00 22 * * *"
|
|
@ -999,6 +999,38 @@ sudo nix run nixpkgs#ipmitool -- raw 0x30 0x30 0x02 0xff 0x00
|
|||
26966
|
||||
];
|
||||
}
|
||||
{
|
||||
# kanidm
|
||||
services.kanidm = {
|
||||
enableClient = true;
|
||||
enablePam = true;
|
||||
enableServer = true;
|
||||
|
||||
serverSettings = {
|
||||
bindaddress = "[::]:8443";
|
||||
db_path = "/storage/kanidm/data/kanidm.db";
|
||||
# TODO: these will need permissions?
|
||||
tls_chain = "/var/lib/caddy/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/idm.h.lyte.dev.crt";
|
||||
tls_key = "/var/lib/caddy/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/idm.h.lyte.dev.key";
|
||||
domain = "idm.foxtrot.hare-cod.ts.net";
|
||||
origin = "https://idm.h.lyte.dev:8443";
|
||||
|
||||
online_backup = {
|
||||
path = "/storage/kanidm/backups/";
|
||||
schedule = "00 22 * * *";
|
||||
};
|
||||
};
|
||||
|
||||
clientSettings = {
|
||||
uri = "https://idm.h.lyte.dev";
|
||||
# ca_path = "/tmp/cert.pem";
|
||||
};
|
||||
};
|
||||
|
||||
services.caddy.virtualHosts."idm.h.lyte.dev" = {
|
||||
extraConfig = ''reverse_proxy :8443'';
|
||||
};
|
||||
}
|
||||
];
|
||||
|
||||
# TODO: non-root processes and services that access secrets need to be part of
|
||||
|
|
|
@ -46,6 +46,7 @@
|
|||
additionalHosts = [
|
||||
".beefcake.lan"
|
||||
"nix.h.lyte.dev"
|
||||
"idm.h.lyte.dev"
|
||||
"git.lyte.dev"
|
||||
"video.lyte.dev"
|
||||
"a.lyte.dev"
|
||||
|
|
|
@ -52,6 +52,8 @@
|
|||
src = ./.;
|
||||
hash = pkgs.lib.fakeHash;
|
||||
cargoHash = "sha256-W7VQlMktGsRPQL9VGVmxYV6C5u2eJ48S7eTpOM+3n8U=";
|
||||
|
||||
RUSTFLAGS = pkgs.lib.optionalString pkgs.stdenv.isLinux "-C link-arg=-fuse-ld=mold";
|
||||
};
|
||||
|
||||
default = outputs.packages.${pkgs.system}.my-package;
|
||||
|
|
Loading…
Reference in a new issue