nixfiles/hosts/koi/containers/kanidm/default.nix

49 lines
1.2 KiB
Nix
Raw Normal View History

2024-11-23 16:37:34 +03:00
{ config, ... }:
2024-10-26 22:44:01 +03:00
let
UID = 1111;
in {
imports = [
./proxy.nix
];
2024-11-23 16:37:34 +03:00
desu.secrets.kanidm-tls-key.owner = "kanidm";
desu.secrets.kanidm-tls-cert.owner = "kanidm";
2024-10-26 22:44:01 +03:00
users.users.kanidm = {
isNormalUser = true;
uid = UID;
};
virtualisation.oci-containers.containers.kanidm = {
image = "kanidm/server:1.4.2";
2024-10-26 22:44:01 +03:00
volumes = [
2024-12-11 09:11:31 +03:00
# "/srv/kanidm/data:/data/db"
2024-10-26 22:44:01 +03:00
"${./server.toml}:/data/server.toml"
"${./style.css}:/hpkg/style.css"
"${./fish.png}:/hpkg/img/fish.png"
2024-10-26 22:44:01 +03:00
];
2024-10-26 23:35:48 +03:00
user = "${builtins.toString UID}";
2024-12-11 09:11:31 +03:00
extraOptions = [
"--mount=type=bind,source=/srv/kanidm/data,target=/data/db"
"--mount=type=bind,source=${config.desu.secrets.kanidm-tls-key.path},target=/data/key.pem,readonly"
"--mount=type=bind,source=${config.desu.secrets.kanidm-tls-cert.path},target=/data/chain.pem,readonly"
];
2024-10-26 22:44:01 +03:00
};
systemd.tmpfiles.rules = [
"d /srv/kanidm/data 0700 ${builtins.toString UID} ${builtins.toString UID} -"
];
services.nginx.virtualHosts."id.stupid.fish" = {
forceSSL = true;
useACMEHost = "stupid.fish";
locations."/" = {
proxyPass = "https://kanidm.docker:8443$request_uri";
proxyWebsockets = true;
};
};
}