init karakeep (hoarder)
This commit is contained in:
parent
f7157a11ed
commit
895052fb20
6 changed files with 145 additions and 11 deletions
|
@ -49,6 +49,11 @@ in
|
|||
webauthn = {
|
||||
enable_passkey_login = true;
|
||||
};
|
||||
identity_providers.oidc.claims_policies = {
|
||||
# https://github.com/karakeep-app/karakeep/issues/410
|
||||
# https://www.authelia.com/integration/openid-connect/openid-connect-1.0-claims/#restore-functionality-prior-to-claims-parameter
|
||||
karakeep.id_token = [ "email" ];
|
||||
};
|
||||
identity_providers.oidc.clients = [
|
||||
{
|
||||
client_id = "immich";
|
||||
|
@ -94,6 +99,17 @@ in
|
|||
audience = [];
|
||||
token_endpoint_auth_method = "client_secret_post";
|
||||
}
|
||||
{
|
||||
client_id = "0SbsGvw5APYJ4px~dv38rCVgXtK2XWrF1QvyuaFz48cgsNm-rAXkSgNOctfxS21IWOFSfsm5";
|
||||
client_name = "Karakeep";
|
||||
client_secret = "$pbkdf2-sha512$310000$4UanDZq.6oholJW3CmKwtQ$9e3hqR8qGU4LoneR/Y9jtJTx0iSzATI4iXymrs8QrmGw4JY1BPF4.IJ9Jbc.8cikU4qpfUIFO6r2dG7JHznCnw";
|
||||
public = false;
|
||||
authorization_policy = "two_factor";
|
||||
redirect_uris = [ "https://keep.cy7.sh/api/auth/callback/custom" ];
|
||||
scopes = [ "openid" "profile" "email" ];
|
||||
userinfo_signed_response_alg = "none";
|
||||
claims_policy = "karakeep";
|
||||
}
|
||||
];
|
||||
};
|
||||
secrets = {
|
||||
|
|
|
@ -10,5 +10,6 @@
|
|||
./searx.nix
|
||||
./attic.nix
|
||||
./authelia.nix
|
||||
./karakeep.nix
|
||||
];
|
||||
}
|
||||
|
|
81
modules/karakeep.nix
Normal file
81
modules/karakeep.nix
Normal file
|
@ -0,0 +1,81 @@
|
|||
{ config, lib, ... }:
|
||||
let
|
||||
cfg = config.my.karakeep;
|
||||
in
|
||||
{
|
||||
options.my.karakeep = {
|
||||
enable = lib.mkEnableOption "karakeep";
|
||||
dataDir = lib.mkOption {
|
||||
type = lib.types.path;
|
||||
};
|
||||
port = lib.mkOption {
|
||||
default = 3002;
|
||||
description = "port for the web service";
|
||||
type = lib.types.port;
|
||||
};
|
||||
domain = lib.mkOption {
|
||||
default = "keep.cy7.sh";
|
||||
type = lib.types.str;
|
||||
};
|
||||
environmentFile = lib.mkOption {
|
||||
default = config.sops.secrets."karakeep/env".path;
|
||||
type = lib.types.path;
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
virtualisation.oci-containers.containers = {
|
||||
karakeep-web = {
|
||||
image = "ghcr.io/karakeep-app/karakeep:release";
|
||||
pull = "newer";
|
||||
volumes = [ "${cfg.dataDir}:/data" ];
|
||||
ports = [ "${toString cfg.port}:3000"];
|
||||
dependsOn = [
|
||||
"karakeep-chrome"
|
||||
"karakeep-meilisearch"
|
||||
];
|
||||
environment = {
|
||||
MEILI_ADDR = "http://karakeep-meilisearch:7700";
|
||||
BROWSER_WEB_URL = "http://karakeep-chrome:9222";
|
||||
DATA_DIR = "/data";
|
||||
NEXTAUTH_URL = "https://${cfg.domain}";
|
||||
DISABLE_PASSWORD_AUTH = "true";
|
||||
OAUTH_WELLKNOWN_URL = "https://auth.cy7.sh/.well-known/openid-configuration";
|
||||
OAUTH_CLIENT_ID = "0SbsGvw5APYJ4px~dv38rCVgXtK2XWrF1QvyuaFz48cgsNm-rAXkSgNOctfxS21IWOFSfsm5";
|
||||
OAUTH_PROVIDER_NAME = "Authelia";
|
||||
OAUTH_ALLOW_DANGEROUS_EMAIL_ACCOUNT_LINKING = "true";
|
||||
};
|
||||
# needs NEXTAUTH_SECRET
|
||||
environmentFiles = [ "${cfg.environmentFile}" ];
|
||||
};
|
||||
|
||||
karakeep-chrome = {
|
||||
image = "ghcr.io/zenika/alpine-chrome:latest";
|
||||
pull = "newer";
|
||||
cmd = [
|
||||
"--no-sandbox"
|
||||
"--disable-gpu"
|
||||
"--disable-dev-shm-usage"
|
||||
"--remote-debugging-address=0.0.0.0"
|
||||
"--remote-debugging-port=9222"
|
||||
"--hide-scrollbars"
|
||||
];
|
||||
};
|
||||
|
||||
karakeep-meilisearch = {
|
||||
image = "getmeili/meilisearch:latest";
|
||||
volumes = [ "meilisearch:/meili_data" ];
|
||||
environment = {
|
||||
MEILI_NO_ANALYTICS = "true";
|
||||
};
|
||||
# needs MEILI_MASTER_KEY
|
||||
environmentFiles = [ "${cfg.environmentFile}" ];
|
||||
};
|
||||
};
|
||||
|
||||
services.caddy.virtualHosts.${cfg.domain}.extraConfig = ''
|
||||
import common
|
||||
reverse_proxy localhost:${toString cfg.port}
|
||||
'';
|
||||
};
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue