pocket-id service
This commit is contained in:
@@ -1,6 +1,14 @@
|
||||
{ inputs, self, ... }:
|
||||
{
|
||||
inputs,
|
||||
self,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
{
|
||||
clan = {
|
||||
modules = {
|
||||
pocket-id = ../modules/clan/pocket-id;
|
||||
};
|
||||
inventory = {
|
||||
|
||||
instances = {
|
||||
@@ -21,6 +29,14 @@
|
||||
roles.default.machines = [ "b4l" ];
|
||||
};
|
||||
};
|
||||
|
||||
instances.pocket-id = {
|
||||
module = {
|
||||
name = "pocket-id";
|
||||
input = "self";
|
||||
};
|
||||
roles.default.machines.b4l = { };
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
69
modules/clan/pocket-id/default.nix
Normal file
69
modules/clan/pocket-id/default.nix
Normal file
@@ -0,0 +1,69 @@
|
||||
{ lib, ... }:
|
||||
{
|
||||
_class = "clan.service";
|
||||
manifest.name = "pocket-id";
|
||||
manifest.description = "A simple and easy-to-use OIDC provider that allows users to authenticate with their passkeys to your services.";
|
||||
manifest.categories = [ "System" ];
|
||||
|
||||
roles.default = {
|
||||
interface.options = {
|
||||
domain = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "auth";
|
||||
description = "";
|
||||
};
|
||||
};
|
||||
|
||||
perInstance =
|
||||
{
|
||||
settings,
|
||||
...
|
||||
}:
|
||||
{
|
||||
nixosModule =
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
let
|
||||
domain = "${settings.domain}.${config.networking.fqdn}";
|
||||
in
|
||||
{
|
||||
clan.core.vars.generators.pocket-id = {
|
||||
files = {
|
||||
encryption-key = {
|
||||
owner = "${config.services.pocket-id.user}";
|
||||
group = "${config.services.pocket-id.group}";
|
||||
secret = true;
|
||||
};
|
||||
};
|
||||
runtimeInputs = [ pkgs.pwgen ];
|
||||
script = ''
|
||||
pwgen -s 32 1 > $out/encryption-key
|
||||
'';
|
||||
};
|
||||
services.pocket-id = {
|
||||
enable = true;
|
||||
settings = {
|
||||
ENCRYPTION_KEY_FILE = config.clan.core.vars.generators.pocket-id.files.encryption-key.path;
|
||||
APP_ENV = "production";
|
||||
APP_URL = "https://${domain}";
|
||||
TRUST_PROXY = true;
|
||||
PORT = 1411;
|
||||
|
||||
UI_CONFIG_DISABLED = true;
|
||||
};
|
||||
};
|
||||
services.nginx.virtualHosts."${domain}" = {
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${builtins.toString config.services.pocket-id.settings.PORT}";
|
||||
};
|
||||
};
|
||||
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
@@ -3,4 +3,4 @@
|
||||
"publickey": "age1sg0rvgyetdcqw7j2x983fh69kdkvqsngpe5x36e5920qa7fze3cqhj4wgx",
|
||||
"type": "age"
|
||||
}
|
||||
]
|
||||
]
|
||||
|
@@ -1 +1 @@
|
||||
$6$GInixVejze2Ixdeu$a4.DpQd9c8A86ea/OGcHXxcJTIvpYYgItR1vBN7XtURfVgTXGZQuSz5t59qxNwWVHZZivhH97xPAuoHjwztQx/
|
||||
$6$GInixVejze2Ixdeu$a4.DpQd9c8A86ea/OGcHXxcJTIvpYYgItR1vBN7XtURfVgTXGZQuSz5t59qxNwWVHZZivhH97xPAuoHjwztQx/
|
||||
|
Reference in New Issue
Block a user