Test traefik, arcane and immich on vServer
This commit is contained in:
parent
cb0408abd4
commit
5115744f46
2 changed files with 47 additions and 0 deletions
|
|
@ -17,6 +17,8 @@
|
||||||
../../modules/docker.nix
|
../../modules/docker.nix
|
||||||
../../modules/teleport.nix
|
../../modules/teleport.nix
|
||||||
../../modules/portainer_agent.nix
|
../../modules/portainer_agent.nix
|
||||||
|
../../modules/arcane.nix
|
||||||
|
../../modules/traefik.nix
|
||||||
../../modules/auto-upgrade.nix
|
../../modules/auto-upgrade.nix
|
||||||
# Include the results of the hardware scan.
|
# Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
|
@ -33,6 +35,45 @@
|
||||||
|
|
||||||
virtualisation.oci-containers.containers.portainer_agent.environmentFiles = [ config.age.secrets."portainer-join_token".path ];
|
virtualisation.oci-containers.containers.portainer_agent.environmentFiles = [ config.age.secrets."portainer-join_token".path ];
|
||||||
|
|
||||||
|
services.traefik-docker = {
|
||||||
|
enable = true;
|
||||||
|
dashboardUrl = "traefik.juliusfr.eu";
|
||||||
|
dnsSecrets = [
|
||||||
|
config.age.secrets."netcup-dns"
|
||||||
|
];
|
||||||
|
mTLSCaCertSecret = config.age.secrets."step-ca-crt";
|
||||||
|
oidcAuthProviderUrl = "https://login.juliusfr.eu";
|
||||||
|
oidcClients = {
|
||||||
|
traefik-dashboard = {
|
||||||
|
secret = config.age.secrets."traefik-oidc-auth";
|
||||||
|
};
|
||||||
|
immich = {
|
||||||
|
secret = config.age.secrets."immich-oidc-auth";
|
||||||
|
scopes = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
enableBypassUsingClientCertificate = true;
|
||||||
|
};
|
||||||
|
arcane = {
|
||||||
|
secret = config.age.secrets."arcane-oidc-auth";
|
||||||
|
scopes = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
"groups"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.arcane = {
|
||||||
|
enable = true;
|
||||||
|
appUrl = "arcane.juliusfr.eu";
|
||||||
|
secretFile = config.age.secrets."arcane-secrets";
|
||||||
|
};
|
||||||
|
|
||||||
systemd.network = {
|
systemd.network = {
|
||||||
enable = true;
|
enable = true;
|
||||||
networks."10-wan" = {
|
networks."10-wan" = {
|
||||||
|
|
|
||||||
|
|
@ -4,5 +4,11 @@
|
||||||
teleport-ca_pin.file = "${inputs.secrets}/secrets/teleport/ca_pin";
|
teleport-ca_pin.file = "${inputs.secrets}/secrets/teleport/ca_pin";
|
||||||
teleport-join_token.file = "${inputs.secrets}/secrets/srv01-hf/teleport_auth_token";
|
teleport-join_token.file = "${inputs.secrets}/secrets/srv01-hf/teleport_auth_token";
|
||||||
portainer-join_token.file = "${inputs.secrets}/secrets/srv01-hf/portainer_join_token";
|
portainer-join_token.file = "${inputs.secrets}/secrets/srv01-hf/portainer_join_token";
|
||||||
|
netcup-dns.file = "${inputs.secrets}/secrets/dns-management/netcup";
|
||||||
|
traefik-oidc-auth.file = "${inputs.secrets}/secrets/srv01-hf/traefik-oidc-auth";
|
||||||
|
immich-oidc-auth.file = "${inputs.secrets}/secrets/srv01-hf/immich-oidc-auth";
|
||||||
|
arcane-oidc-auth.file = "${inputs.secrets}/secrets/srv01-hf/arcane-oidc-auth";
|
||||||
|
arcane-secrets.file = "${inputs.secrets}/secrets/srv01-hf/arcane-secrets";
|
||||||
|
step-ca-crt.file = "${inputs.secrets}/secrets/step-ca/step-ca-crt";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue