Compare commits

...

3 commits

Author SHA1 Message Date
717c25ea9b Merge pull request 'Remove keycloak' (#10) from remove-keycloak into main
Some checks are pending
/ check (push) Waiting to run
Reviewed-on: #10
2024-05-25 16:09:37 +00:00
4f52400396 Revert "Merge pull request 'feat: setup keycloak' (#7) from setup-keycloak into main"
All checks were successful
/ check (pull_request) Successful in 2m17s
This reverts commit ea6bbee518, reversing
changes made to 876c0b8e4d.
2024-05-25 18:08:12 +02:00
b4d756770e Revert "Merge pull request 'feat: temporarily enable hostname debug' (#9) from kc-hostname-debug into main"
This reverts commit b5111a4696, reversing
changes made to ec511d5c22.
2024-05-25 18:03:02 +02:00
4 changed files with 0 additions and 49 deletions

View file

@ -15,7 +15,6 @@
./borg.nix ./borg.nix
./disk-config.nix ./disk-config.nix
./forgejo.nix ./forgejo.nix
./keycloak.nix
./murmur.nix ./murmur.nix
./msmtp.nix ./msmtp.nix
./upgrade.nix ./upgrade.nix

View file

@ -1,42 +0,0 @@
{
config,
pkgs,
...
}: let
port = 11328;
in {
age.secrets.keycloak-db-pass.file = ../../secrets/keycloak-db-pass.age;
services.keycloak = {
enable = true;
package = pkgs.unstable.keycloak;
database.passwordFile = config.age.secrets.keycloak-db-pass.path;
settings = {
hostname = "https://kc.buffet.sh/";
http-port = port;
proxy = "edge";
hostname-debug = "true";
};
};
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts."kc.buffet.sh" = {
useACMEHost = "buffet.sh";
forceSSL = true;
locations = {
"/" = {
proxyPass = "http://localhost:${toString port}";
};
};
};
};
}

View file

@ -4,7 +4,6 @@ in {
"secrets/bitwarden.age".publicKeys = [buffet]; "secrets/bitwarden.age".publicKeys = [buffet];
"secrets/borgpassword.age".publicKeys = [buffet]; "secrets/borgpassword.age".publicKeys = [buffet];
"secrets/hetzner-dns.age".publicKeys = [buffet]; "secrets/hetzner-dns.age".publicKeys = [buffet];
"secrets/keycloak-db-pass.age".publicKeys = [buffet];
"secrets/kitchen-runner-token.age".publicKeys = [buffet]; "secrets/kitchen-runner-token.age".publicKeys = [buffet];
"secrets/msmtppassword.age".publicKeys = [buffet]; "secrets/msmtppassword.age".publicKeys = [buffet];
} }

View file

@ -1,5 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 zRvPWg dBE7+zBtxSbFggJdrs22PDU/rMaVJ8tV6FLPmSwOzA0
mAmmY0WFFzntI+uVOFaDZixtBPkAflllANFlcupM8sc
--- 8rVOupXTyOinTaMRntA+rBjr2xZ9FT0xzmNQReEZb1Q
Ñr84¦y„ó% Ó„Ñ ÓLkº|½ª®]è~£:œön¬ëÇÞÂd½mC2£\­$¯Áör†#ì•D)PöBàÀm-R¹Ukƒ°0Æ…Cò$`ê|U