Changes to komga and kanidm

This commit is contained in:
Lyes Saadi 2025-10-27 17:08:50 +01:00
parent acca790a97
commit 526e760eee
Signed by: lyes
GPG key ID: 55A1D803917CF39A
7 changed files with 40 additions and 31 deletions

36
flake.lock generated
View file

@ -173,11 +173,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1760929667, "lastModified": 1761574406,
"narHash": "sha256-nZh6uvc71nVNaf/y+wesnjwsmJ6IZZUnP2EzpZe48To=", "narHash": "sha256-MoqeKxVuql6Bnj6CE/CG2CKcC0GJ2EgqYxUrYPRABdY=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "189c21cf879669008ccf06e78a553f17e88d8ef0", "rev": "aa888ffc10cad3ab6595039342f97d524fd620bf",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -248,11 +248,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1760106635, "lastModified": 1760958188,
"narHash": "sha256-2GoxVaKWTHBxRoeUYSjv0AfSOx4qw5CWSFz2b+VolKU=", "narHash": "sha256-2m1S4jl+GEDtlt2QqeHil8Ny456dcGSKJAM7q3j/BFU=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "9ed85f8afebf2b7478f25db0a98d0e782c0ed903", "rev": "d6645c340ef7d821602fd2cd199e8d1eed10afbc",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -296,11 +296,11 @@
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1760862643, "lastModified": 1761468971,
"narHash": "sha256-PXwG0TM7Ek87DNx4LbGWuD93PbFeKAJs4FfALtp7Wo0=", "narHash": "sha256-vY2OLVg5ZTobdroQKQQSipSIkHlxOTrIF1fsMzPh8w8=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "33c6dca0c0cb31d6addcd34e90a63ad61826b28c", "rev": "78e34d1667d32d8a0ffc3eba4591ff256e80576e",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -312,11 +312,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1760878510, "lastModified": 1761373498,
"narHash": "sha256-K5Osef2qexezUfs0alLvZ7nQFTGS9DL2oTVsIXsqLgs=", "narHash": "sha256-Q/uhWNvd7V7k1H1ZPMy/vkx3F8C13ZcdrKjO7Jv7v0c=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5e2a59a5b1a82f89f2c7e598302a9cacebb72a67", "rev": "6a08e6bb4e46ff7fcbb53d409b253f6bad8a28ce",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -328,11 +328,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1760878510, "lastModified": 1761373498,
"narHash": "sha256-K5Osef2qexezUfs0alLvZ7nQFTGS9DL2oTVsIXsqLgs=", "narHash": "sha256-Q/uhWNvd7V7k1H1ZPMy/vkx3F8C13ZcdrKjO7Jv7v0c=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5e2a59a5b1a82f89f2c7e598302a9cacebb72a67", "rev": "6a08e6bb4e46ff7fcbb53d409b253f6bad8a28ce",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -393,11 +393,11 @@
"nixpkgs": "nixpkgs_3" "nixpkgs": "nixpkgs_3"
}, },
"locked": { "locked": {
"lastModified": 1760934351, "lastModified": 1761535208,
"narHash": "sha256-RehxVjBRC9EiBO36EPZROLHhVVSWFe3KEROhaEapboM=", "narHash": "sha256-E1PobJMiFmVUX2YdqYk/MpKb0LXavOYvlg8DCBBzlHc=",
"owner": "0xc000022070", "owner": "0xc000022070",
"repo": "zen-browser-flake", "repo": "zen-browser-flake",
"rev": "596c3ac14be576b93f5db9252a1b0581e453ec9f", "rev": "79a94872a3e6993a051c4e22a2dcb02c1d088acf",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -16,6 +16,7 @@
../../modules/desktop/gaming ../../modules/desktop/gaming
../../modules/desktop/gnome ../../modules/desktop/gnome
../../modules/desktop/sway ../../modules/desktop/sway
../../modules/server/link/client.nix
nix-flatpak.nixosModules.nix-flatpak nix-flatpak.nixosModules.nix-flatpak
nixos-hardware.nixosModules.framework-16-7040-amd nixos-hardware.nixosModules.framework-16-7040-amd

View file

@ -12,8 +12,8 @@
nameservers = [ nameservers = [
"9.9.9.9" "9.9.9.9"
"149.112.112.112" "149.112.112.112"
"1.1.1.1#one.one.one.one" "1.1.1.1"
"1.0.0.1#one.one.one.one" "1.0.0.1"
]; ];
firewall = { firewall = {

View file

@ -12,8 +12,8 @@
networking.nameservers = [ networking.nameservers = [
"9.9.9.9" "9.9.9.9"
"149.112.112.112" "149.112.112.112"
"1.1.1.1#one.one.one.one" "1.1.1.1"
"1.0.0.1#one.one.one.one" "1.0.0.1"
"2620:fe::fe" "2620:fe::fe"
"2620:fe::9" "2620:fe::9"
]; ];
@ -25,8 +25,8 @@
fallbackDns = [ fallbackDns = [
"9.9.9.9" "9.9.9.9"
"149.112.112.112" "149.112.112.112"
"1.1.1.1#one.one.one.one" "1.1.1.1"
"1.0.0.1#one.one.one.one" "1.0.0.1"
"2620:fe::fe" "2620:fe::fe"
"2620:fe::9" "2620:fe::9"
]; ];

View file

@ -0,0 +1,11 @@
{ ... }:
{
services.kanidm = {
enableClient = true;
clientSettings = {
uri = "https://auth.lyes.eu";
};
};
}

View file

@ -5,6 +5,10 @@ let
port = "44300"; port = "44300";
in in
{ {
import = [
./client.nix
];
users.users.kanidm.extraGroups = [ "nginx" ]; users.users.kanidm.extraGroups = [ "nginx" ];
services.kanidm = { services.kanidm = {
package = pkgs.kanidmWithSecretProvisioning_1_7; package = pkgs.kanidmWithSecretProvisioning_1_7;
@ -25,13 +29,6 @@ in
}; };
}; };
enableClient = true;
clientSettings = {
uri = "https://127.0.0.1:${port}";
verify_ca = false;
};
provision = { provision = {
enable = true; enable = true;
adminPasswordFile = config.age.secrets.kanidm-admin-password.path; adminPasswordFile = config.age.secrets.kanidm-admin-password.path;

Binary file not shown.