diff --git a/flake.lock b/flake.lock index 3e4bf7f..6399d42 100644 --- a/flake.lock +++ b/flake.lock @@ -173,11 +173,11 @@ ] }, "locked": { - "lastModified": 1760929667, - "narHash": "sha256-nZh6uvc71nVNaf/y+wesnjwsmJ6IZZUnP2EzpZe48To=", + "lastModified": 1761574406, + "narHash": "sha256-MoqeKxVuql6Bnj6CE/CG2CKcC0GJ2EgqYxUrYPRABdY=", "owner": "nix-community", "repo": "home-manager", - "rev": "189c21cf879669008ccf06e78a553f17e88d8ef0", + "rev": "aa888ffc10cad3ab6595039342f97d524fd620bf", "type": "github" }, "original": { @@ -248,11 +248,11 @@ }, "nixos-hardware": { "locked": { - "lastModified": 1760106635, - "narHash": "sha256-2GoxVaKWTHBxRoeUYSjv0AfSOx4qw5CWSFz2b+VolKU=", + "lastModified": 1760958188, + "narHash": "sha256-2m1S4jl+GEDtlt2QqeHil8Ny456dcGSKJAM7q3j/BFU=", "owner": "NixOS", "repo": "nixos-hardware", - "rev": "9ed85f8afebf2b7478f25db0a98d0e782c0ed903", + "rev": "d6645c340ef7d821602fd2cd199e8d1eed10afbc", "type": "github" }, "original": { @@ -296,11 +296,11 @@ }, "nixpkgs-stable": { "locked": { - "lastModified": 1760862643, - "narHash": "sha256-PXwG0TM7Ek87DNx4LbGWuD93PbFeKAJs4FfALtp7Wo0=", + "lastModified": 1761468971, + "narHash": "sha256-vY2OLVg5ZTobdroQKQQSipSIkHlxOTrIF1fsMzPh8w8=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "33c6dca0c0cb31d6addcd34e90a63ad61826b28c", + "rev": "78e34d1667d32d8a0ffc3eba4591ff256e80576e", "type": "github" }, "original": { @@ -312,11 +312,11 @@ }, "nixpkgs-unstable": { "locked": { - "lastModified": 1760878510, - "narHash": "sha256-K5Osef2qexezUfs0alLvZ7nQFTGS9DL2oTVsIXsqLgs=", + "lastModified": 1761373498, + "narHash": "sha256-Q/uhWNvd7V7k1H1ZPMy/vkx3F8C13ZcdrKjO7Jv7v0c=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "5e2a59a5b1a82f89f2c7e598302a9cacebb72a67", + "rev": "6a08e6bb4e46ff7fcbb53d409b253f6bad8a28ce", "type": "github" }, "original": { @@ -328,11 +328,11 @@ }, "nixpkgs_2": { "locked": { - "lastModified": 1760878510, - "narHash": "sha256-K5Osef2qexezUfs0alLvZ7nQFTGS9DL2oTVsIXsqLgs=", + "lastModified": 1761373498, + "narHash": "sha256-Q/uhWNvd7V7k1H1ZPMy/vkx3F8C13ZcdrKjO7Jv7v0c=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "5e2a59a5b1a82f89f2c7e598302a9cacebb72a67", + "rev": "6a08e6bb4e46ff7fcbb53d409b253f6bad8a28ce", "type": "github" }, "original": { @@ -393,11 +393,11 @@ "nixpkgs": "nixpkgs_3" }, "locked": { - "lastModified": 1760934351, - "narHash": "sha256-RehxVjBRC9EiBO36EPZROLHhVVSWFe3KEROhaEapboM=", + "lastModified": 1761535208, + "narHash": "sha256-E1PobJMiFmVUX2YdqYk/MpKb0LXavOYvlg8DCBBzlHc=", "owner": "0xc000022070", "repo": "zen-browser-flake", - "rev": "596c3ac14be576b93f5db9252a1b0581e453ec9f", + "rev": "79a94872a3e6993a051c4e22a2dcb02c1d088acf", "type": "github" }, "original": { diff --git a/hosts/piaf/default.nix b/hosts/piaf/default.nix index 94573a5..c92a4fe 100644 --- a/hosts/piaf/default.nix +++ b/hosts/piaf/default.nix @@ -16,6 +16,7 @@ ../../modules/desktop/gaming ../../modules/desktop/gnome ../../modules/desktop/sway + ../../modules/server/link/client.nix nix-flatpak.nixosModules.nix-flatpak nixos-hardware.nixosModules.framework-16-7040-amd diff --git a/hosts/zora/networking.nix b/hosts/zora/networking.nix index 973bf33..0bfcbe9 100644 --- a/hosts/zora/networking.nix +++ b/hosts/zora/networking.nix @@ -12,8 +12,8 @@ nameservers = [ "9.9.9.9" "149.112.112.112" - "1.1.1.1#one.one.one.one" - "1.0.0.1#one.one.one.one" + "1.1.1.1" + "1.0.0.1" ]; firewall = { diff --git a/modules/desktop/networking.nix b/modules/desktop/networking.nix index 5c5a567..07220d5 100644 --- a/modules/desktop/networking.nix +++ b/modules/desktop/networking.nix @@ -12,8 +12,8 @@ networking.nameservers = [ "9.9.9.9" "149.112.112.112" - "1.1.1.1#one.one.one.one" - "1.0.0.1#one.one.one.one" + "1.1.1.1" + "1.0.0.1" "2620:fe::fe" "2620:fe::9" ]; @@ -25,8 +25,8 @@ fallbackDns = [ "9.9.9.9" "149.112.112.112" - "1.1.1.1#one.one.one.one" - "1.0.0.1#one.one.one.one" + "1.1.1.1" + "1.0.0.1" "2620:fe::fe" "2620:fe::9" ]; diff --git a/modules/server/link/client.nix b/modules/server/link/client.nix new file mode 100644 index 0000000..d96fee5 --- /dev/null +++ b/modules/server/link/client.nix @@ -0,0 +1,11 @@ +{ ... }: + +{ + services.kanidm = { + enableClient = true; + + clientSettings = { + uri = "https://auth.lyes.eu"; + }; + }; +} diff --git a/modules/server/link/default.nix b/modules/server/link/default.nix index 2ea976c..a9164df 100644 --- a/modules/server/link/default.nix +++ b/modules/server/link/default.nix @@ -5,6 +5,10 @@ let port = "44300"; in { + import = [ + ./client.nix + ]; + users.users.kanidm.extraGroups = [ "nginx" ]; services.kanidm = { package = pkgs.kanidmWithSecretProvisioning_1_7; @@ -25,13 +29,6 @@ in }; }; - enableClient = true; - - clientSettings = { - uri = "https://127.0.0.1:${port}"; - verify_ca = false; - }; - provision = { enable = true; adminPasswordFile = config.age.secrets.kanidm-admin-password.path; diff --git a/secrets/zora/services/nayru-conf.age b/secrets/zora/services/nayru-conf.age index a8ce77d..0b61ae0 100644 Binary files a/secrets/zora/services/nayru-conf.age and b/secrets/zora/services/nayru-conf.age differ