76 lines
1.7 KiB
Nix
76 lines
1.7 KiB
Nix
|
rec {
|
||
|
test1 = { system
|
||
|
, pkgs
|
||
|
, lib
|
||
|
, ... }:
|
||
|
let
|
||
|
domain = "local";
|
||
|
|
||
|
utils = pkgs.lib.callPackageWith pkgs ../../../utils.nix { };
|
||
|
|
||
|
customPkgs = import ../../../pkgs/all-packages.nix {
|
||
|
inherit system pkgs utils;
|
||
|
};
|
||
|
in
|
||
|
rec {
|
||
|
users.groups = {
|
||
|
keycloak = {
|
||
|
name = "keycloak";
|
||
|
};
|
||
|
};
|
||
|
users.users = {
|
||
|
keycloak = {
|
||
|
name = "keycloak";
|
||
|
group = "keycloak";
|
||
|
isSystemUser = true;
|
||
|
};
|
||
|
};
|
||
|
|
||
|
deployment.keys = {
|
||
|
keycloakinitialadmin.text = ''
|
||
|
KEYCLOAK_ADMIN_PASSWORD="${builtins.extraBuiltins.pass "keycloak.${domain}/admin"}"
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
services = {
|
||
|
openssh = {
|
||
|
enable = true;
|
||
|
};
|
||
|
|
||
|
disnix = {
|
||
|
enable = true;
|
||
|
# useWebServiceInterface = true;
|
||
|
};
|
||
|
|
||
|
postgresql = {
|
||
|
enable = true;
|
||
|
package = pkgs.postgresql_14;
|
||
|
|
||
|
port = 5432;
|
||
|
enableTCPIP = true;
|
||
|
authentication = pkgs.lib.mkOverride 10 ''
|
||
|
local all all trust
|
||
|
host all all 127.0.0.1/32 trust
|
||
|
host all all ::1/128 trust
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
|
||
|
dysnomia = {
|
||
|
enable = true;
|
||
|
enableLegacyModules = false;
|
||
|
extraContainerProperties = {
|
||
|
system = {
|
||
|
inherit domain;
|
||
|
};
|
||
|
postgresql-database = {
|
||
|
service_name = "postgresql.service";
|
||
|
port = builtins.toString services.postgresql.port;
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
networking.firewall.allowedTCPPorts = [ services.postgresql.port ];
|
||
|
};
|
||
|
}
|