Merge pull request 'Remove keycloak' (#10) from remove-keycloak into main
Some checks are pending
/ check (push) Waiting to run
Some checks are pending
/ check (push) Waiting to run
Reviewed-on: #10
This commit is contained in:
commit
717c25ea9b
4 changed files with 0 additions and 49 deletions
|
@ -15,7 +15,6 @@
|
||||||
./borg.nix
|
./borg.nix
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
./forgejo.nix
|
./forgejo.nix
|
||||||
./keycloak.nix
|
|
||||||
./murmur.nix
|
./murmur.nix
|
||||||
./msmtp.nix
|
./msmtp.nix
|
||||||
./upgrade.nix
|
./upgrade.nix
|
||||||
|
|
|
@ -1,42 +0,0 @@
|
||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
port = 11328;
|
|
||||||
in {
|
|
||||||
age.secrets.keycloak-db-pass.file = ../../secrets/keycloak-db-pass.age;
|
|
||||||
|
|
||||||
services.keycloak = {
|
|
||||||
enable = true;
|
|
||||||
package = pkgs.unstable.keycloak;
|
|
||||||
database.passwordFile = config.age.secrets.keycloak-db-pass.path;
|
|
||||||
|
|
||||||
settings = {
|
|
||||||
hostname = "https://kc.buffet.sh/";
|
|
||||||
http-port = port;
|
|
||||||
proxy = "edge";
|
|
||||||
hostname-debug = "true";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx = {
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
recommendedGzipSettings = true;
|
|
||||||
recommendedOptimisation = true;
|
|
||||||
recommendedProxySettings = true;
|
|
||||||
recommendedTlsSettings = true;
|
|
||||||
|
|
||||||
virtualHosts."kc.buffet.sh" = {
|
|
||||||
useACMEHost = "buffet.sh";
|
|
||||||
forceSSL = true;
|
|
||||||
|
|
||||||
locations = {
|
|
||||||
"/" = {
|
|
||||||
proxyPass = "http://localhost:${toString port}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -4,7 +4,6 @@ in {
|
||||||
"secrets/bitwarden.age".publicKeys = [buffet];
|
"secrets/bitwarden.age".publicKeys = [buffet];
|
||||||
"secrets/borgpassword.age".publicKeys = [buffet];
|
"secrets/borgpassword.age".publicKeys = [buffet];
|
||||||
"secrets/hetzner-dns.age".publicKeys = [buffet];
|
"secrets/hetzner-dns.age".publicKeys = [buffet];
|
||||||
"secrets/keycloak-db-pass.age".publicKeys = [buffet];
|
|
||||||
"secrets/kitchen-runner-token.age".publicKeys = [buffet];
|
"secrets/kitchen-runner-token.age".publicKeys = [buffet];
|
||||||
"secrets/msmtppassword.age".publicKeys = [buffet];
|
"secrets/msmtppassword.age".publicKeys = [buffet];
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 zRvPWg dBE7+zBtxSbFggJdrs22PDU/rMaVJ8tV6FLPmSwOzA0
|
|
||||||
mAmmY0WFFzntI+uVOFaDZixtBPkAflllANFlcupM8sc
|
|
||||||
--- 8rVOupXTyOinTaMRntA+rBjr2xZ9FT0xzmNQReEZb1Q
|
|
||||||
Ñr84¦y„ó% Ó„ÑÓLkº|½ª®]è~£:œö–‹n¬ëÇÞÂd½mC2£\‘‘$¯Áör†#‹u°ì•D)PöBàÀm-R¹Ukƒ°0Æ…Cò$`ê|U
|
|
Loading…
Reference in a new issue