Compare commits

...

2 Commits

Author SHA1 Message Date
Renovate Bot
3207a692fd Lock file maintenance 2023-12-01 14:10:28 +00:00
soraefir
7a3a2a9f69 [m] Server: adding docker 2023-12-01 12:54:30 +01:00
6 changed files with 140 additions and 34 deletions

44
flake.lock generated
View File

@ -39,11 +39,11 @@
}, },
"hardware": { "hardware": {
"locked": { "locked": {
"lastModified": 1700559156, "lastModified": 1701250978,
"narHash": "sha256-gL4epO/qf+wo30JjC3g+b5Bs8UrpxzkhNBBsUYxpw2g=", "narHash": "sha256-ohu3cz4edjpGxs2qUTgbs0WrnewOX4crnUJNEB6Jox4=",
"owner": "nixos", "owner": "nixos",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "c3abafb01cd7045dba522af29b625bd1e170c2fb", "rev": "8772491ed75f150f02552c60694e1beff9f46013",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -59,11 +59,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1700900274, "lastModified": 1701433070,
"narHash": "sha256-KWoKDP5I1viHR4bG3ENnJ7H1DD16tXWH4ROvS0IfXw8=", "narHash": "sha256-Gf9JStfENaUQ7YWFz3V7x/srIwr4nlnVteqaAxtwpgM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "a462e7315deaa8194b0821f726709bb7e51a850c", "rev": "4a8545f5e737a6338814a4676dc8e18c7f43fc57",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -83,11 +83,11 @@
"xdph": "xdph" "xdph": "xdph"
}, },
"locked": { "locked": {
"lastModified": 1700967537, "lastModified": 1701393128,
"narHash": "sha256-TzyP5xNGF+rCj2ko+E+VOpQTtzlQ4TfDLuObEPbRX6g=", "narHash": "sha256-SYTztE8kHHpUVmVdHlQQVi2qhDi5oPQiXQ+K4/bc1nA=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "Hyprland", "repo": "Hyprland",
"rev": "cd96ceecc551c25631783499bd92c6662c5d3616", "rev": "8440a30231ea41a6b1dacc60a28837b265a6efec",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -142,11 +142,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1700794826, "lastModified": 1701253981,
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=", "narHash": "sha256-ztaDIyZ7HrTAfEEUt9AtTDNoCYxUdSd6NrRHaYOIxtk=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8", "rev": "e92039b55bcd58469325ded85d4f58dd5a4eaf58",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -173,11 +173,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1700999123, "lastModified": 1701437187,
"narHash": "sha256-cHUigiOX70G8tZ6Utdl7IkYZ879GDeUkdoI9urX2WcM=", "narHash": "sha256-oL2aDfzdUv2dKH01OIapTMmzayyQzgfrOYlEoh139Nk=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nur", "repo": "nur",
"rev": "95f618e3eaf6156578985fb5d14da500b811c52e", "rev": "da2d107831df50c8935dfb08999adf06834bea19",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -208,11 +208,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1700967639, "lastModified": 1701127353,
"narHash": "sha256-uuUwD/O1QcVk+TWPZFwl4ioUkC8iACj0jEXSyE/wGPI=", "narHash": "sha256-qVNX0wOl0b7+I35aRu78xUphOyELh+mtUp1KBx89K1Q=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "4be58d802693d7def8622ff34d36714f8db40371", "rev": "b1edbf5c0464b4cced90a3ba6f999e671f0af631",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -240,18 +240,18 @@
"flake": false, "flake": false,
"locked": { "locked": {
"host": "gitlab.freedesktop.org", "host": "gitlab.freedesktop.org",
"lastModified": 1700734054, "lastModified": 1701368958,
"narHash": "sha256-SBu1y01WjCSrcCKvgfCDDckrZjU/OmCJT8Xc+hPow7E=", "narHash": "sha256-7kvyoA91etzVEl9mkA/EJfB6z/PltxX7Xc4gcr7/xlo=",
"owner": "wlroots", "owner": "wlroots",
"repo": "wlroots", "repo": "wlroots",
"rev": "2eb225236eb72f27beec921e9f37ddf58e874fba", "rev": "5d639394f3e83b01596dcd166a44a9a1a2583350",
"type": "gitlab" "type": "gitlab"
}, },
"original": { "original": {
"host": "gitlab.freedesktop.org", "host": "gitlab.freedesktop.org",
"owner": "wlroots", "owner": "wlroots",
"repo": "wlroots", "repo": "wlroots",
"rev": "2eb225236eb72f27beec921e9f37ddf58e874fba", "rev": "5d639394f3e83b01596dcd166a44a9a1a2583350",
"type": "gitlab" "type": "gitlab"
} }
}, },

View File

@ -26,8 +26,8 @@
padding = "12"; padding = "12";
horizontal_padding = "15"; horizontal_padding = "15";
text_icon_padding = "0"; text_icon_padding = "0";
frame_width = "2"; frame_width = "${config.colorScheme.colors.border-width}";
frame_color = "#${config.colorScheme.colors.base03}"; frame_color = "#${config.colorScheme.colors.base04}";
separator_color = "auto"; separator_color = "auto";
sort = "yes"; sort = "yes";
font = "IBM Plex Mono 14"; font = "IBM Plex Mono 14";
@ -69,23 +69,23 @@
}; };
urgency_low = { urgency_low = {
background = "#${config.colorScheme.colors.base00}"; background = "#${config.colorScheme.colors.base01}";
foreground = "#${config.colorScheme.colors.base07}"; foreground = "#${config.colorScheme.colors.base07}";
frame_color = "#${config.colorScheme.colors.base03}"; frame_color = "#${config.colorScheme.colors.base03}";
timeout = "3"; timeout = "3";
highlight = "#${config.colorScheme.colors.base0B}"; highlight = "#${config.colorScheme.colors.base0B}";
}; };
urgency_normal = { urgency_normal = {
background = "#${config.colorScheme.colors.base00}"; background = "#${config.colorScheme.colors.base01}";
foreground = "#${config.colorScheme.colors.base07}"; foreground = "#${config.colorScheme.colors.base07}";
frame_color = "#${config.colorScheme.colors.base03}"; frame_color = "#${config.colorScheme.colors.base04}";
timeout = "5"; timeout = "5";
highlight = "#${config.colorScheme.colors.base0C}"; highlight = "#${config.colorScheme.colors.base0C}";
}; };
urgency_critical = { urgency_critical = {
background = "#${config.colorScheme.colors.base00}"; background = "#${config.colorScheme.colors.base01}";
foreground = "#${config.colorScheme.colors.base0F}"; foreground = "#${config.colorScheme.colors.base0F}";
frame_color = "#${config.colorScheme.colors.base03}"; frame_color = "#${config.colorScheme.colors.base0F}";
timeout = "10"; timeout = "10";
highlight = "#${config.colorScheme.colors.base0E}"; highlight = "#${config.colorScheme.colors.base0E}";
}; };

View File

@ -1,6 +1,4 @@
{ config, pkgs, ... }: { config, pkgs, ... }: {
{
imports = [ ]; imports = [ ];
users.users.sora = { users.users.sora = {

View File

@ -1,6 +1,4 @@
{ ... }: { { ... }: {
imports = [ ./display.nix ];
config.homecfg = { config.homecfg = {
username = "sora"; username = "sora";
make = { make = {

View File

@ -0,0 +1,4 @@
{ ... }:
{
}

View File

@ -0,0 +1,106 @@
{ pkgs, ... }:
let
HOST_DOMAIN = "helcel.net";
MAIL_HOST_DOMAIN = "norereply.${HOST_DOMAIN}";
MAIL_SERVER_DOMAIN = "mail.infomaniak.com";
in {
project.name = "Authentik";
networks = {
internal = {
internal = true;
external = false;
};
external = { external = true; };
};
services = {
auth_postgresql.service = {
image = "postgres:14-alpine";
container_name = "auth_postgresql";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ ];
environment = {
POSTGRES_PASSWORD = "/run/secrets/AUTHENTIK_POSTGRESQL__PASSWORD";
POSTGRES_USER = "authentik";
POSTGRES_DB = "authentik";
};
};
auth_redis.service = {
image = "redis:alpine";
container_name = "auth_redis";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ ];
environment = { };
labels = { "traefik.enable" = "false"; };
};
auth_server.service = {
image = "ghcr.io/goauthentik/server:latest";
container_name = "auth_server";
restart = "unless-stopped";
networks = [ "internal" "external" ];
volumes = [
"/media/data/authentik/media:/media"
"/media/data/authentik/templates:/templates"
];
environment = {
"AUTHENTIK_REDIS__HOST" = "auth_redis";
"AUTHENTIK_POSTGRESQL__HOST" = "auth_postgresql";
"AUTHENTIK_POSTGRESQL__USER" = "authentik";
"AUTHENTIK_POSTGRESQL__NAME" = "authentik";
"AUTHENTIK_POSTGRESQL__PASSWORD" =
"/run/secrets/AUTHENTIK_POSTGRESQL__PASSWORD";
"AUTHENTIK_SECRET_KEY" = "/run/secrets/AUTHENTIK_SECRET_KEY";
"AUTHENTIK_EMAIL__HOST" = "${MAIL_SERVER_DOMAIN}";
"AUTHENTIK_EMAIL__PORT" = "587";
"AUTHENTIK_EMAIL__USERNAME" = "noreply@${MAIL_HOST_DOMAIN}";
"AUTHENTIK_EMAIL__PASSWORD" = "/run/secrets/AUTHENTIK_EMAIL__PASSWORD";
"AUTHENTIK_EMAIL__USE_TLS" = "true";
"AUTHENTIK_EMAIL__USE_SSL" = "false";
"AUTHENTIK_EMAIL__TIMEOUT" = "10";
"AUTHENTIK_EMAIL__FROM" = "sso@noreply.${MAIL_HOST_DOMAIN}";
};
labels = {
"traefik.enable" = "true";
"traefik.http.routers.sso.entrypoints" = "web-secure";
"traefik.http.routers.sso.rule" = "Host(`sso.${HOST_DOMAIN}`)";
"traefik.http.routers.sso.tls" = "true";
"traefik.http.services.sso.loadbalancer.server.port" = "9000";
"traefik.docker.network" = "external";
};
command = "server";
service.ports = [
"9999:9000" # host:container
];
};
auth_worker.service = {
image = "ghcr.io/goauthentik/server:latest";
container_name = "auth_worker";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [
"/media/data/authentik/media:/media"
"/media/data/authentik/templates:/templates"
"/var/run/docker.sock:/var/run/docker.sock"
];
environment = {
"AUTHENTIK_REDIS__HOST" = "auth_redis";
"AUTHENTIK_POSTGRESQL__HOST" = "auth_postgresql";
"AUTHENTIK_POSTGRESQL__USER" = "authentik";
"AUTHENTIK_POSTGRESQL__NAME" = "authentik";
"AUTHENTIK_POSTGRESQL__PASSWORD" =
"/run/secrets/AUTHENTIK_POSTGRESQL__PASSWORD";
"AUTHENTIK_SECRET_KEY" = "/run/secrets/AUTHENTIK_SECRET_KEY";
};
labels = { "traefik.enable" = "false"; };
command = "worker";
user = "root";
};
};
}