feat(selfhost/authentik): adding the authentik modules

This commit is contained in:
Raphael 2025-10-17 16:35:20 +02:00
parent c36d15318c
commit edbe524048
No known key found for this signature in database
7 changed files with 140 additions and 3 deletions

View file

@ -12,6 +12,7 @@
minecraft.url = "github:Infinidoge/nix-minecraft"; minecraft.url = "github:Infinidoge/nix-minecraft";
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
nixvim.url = "github:EniumRaphael/nixvim"; nixvim.url = "github:EniumRaphael/nixvim";
authentik-nix.url = "github:nix-community/authentik-nix";
zen-browser.url = "github:0xc000022070/zen-browser-flake"; zen-browser.url = "github:0xc000022070/zen-browser-flake";
catppuccin = { catppuccin = {
url = "github:catppuccin/nix"; url = "github:catppuccin/nix";
@ -25,6 +26,7 @@
nixpkgs, nixpkgs,
flake-utils, flake-utils,
agenix, agenix,
authentik-nix,
home-manager, home-manager,
hm-config, hm-config,
catppuccin, catppuccin,
@ -64,6 +66,7 @@
./hosts/server/configuration.nix ./hosts/server/configuration.nix
home-manager.nixosModules.home-manager home-manager.nixosModules.home-manager
agenix.nixosModules.default agenix.nixosModules.default
authentik-nix.nixosModules.default
{ {
home-manager.sharedModules = [ catppuccin.homeModules.catppuccin ]; home-manager.sharedModules = [ catppuccin.homeModules.catppuccin ];
home-manager.useGlobalPkgs = true; home-manager.useGlobalPkgs = true;

View file

@ -41,6 +41,7 @@
mail = true; mail = true;
monitor = true; monitor = true;
nextcloud = true; nextcloud = true;
sso = true;
}; };
forty_two.irc = true; forty_two.irc = true;
web.portefolio = true; web.portefolio = true;

View file

@ -1,4 +1,5 @@
{ config, pkgs, inputs, ... }: { inputs, ... }:
{ {
imports = [ inputs.agenix.nixosModules.default ]; imports = [ inputs.agenix.nixosModules.default ];
@ -10,11 +11,30 @@
group = "root"; group = "root";
mode = "0400"; mode = "0400";
}; };
age.secrets."mailjet-pass" = { age.secrets."mailjet-pass" = {
file = ../../secrets/mailjet-pass.age; file = ../../secrets/mailjet-pass.age;
owner = "root"; owner = "root";
group = "root"; group = "root";
mode = "0400"; mode = "0400";
}; };
age.secrets."authentik-env" = {
file = ../../secrets/authentik-env.age;
owner = "root";
group = "root";
mode = "0400";
};
age.secrets."auth-grafana-id" = {
file = ../../secrets/auth-grafana-id.age;
owner = "root";
group = "grafana";
mode = "0440";
};
age.secrets."auth-grafana-secret" = {
file = ../../secrets/auth-grafana-secret.age;
owner = "root";
group = "grafana";
mode = "0440";
};
} }

View file

@ -0,0 +1,9 @@
age-encryption.org/v1
-> ssh-ed25519 eRdPLg N3Qw3twIzp6k1j+P0bHMQsK3jruPyQ1glFPm3EjECFQ
WJxonlFtrzgrk+iFI+SAo/I7wG18+HcKRDti6EVRl9w
-> ssh-ed25519 KUgDMA mbkaxEH5MeHQakCD0EalLGY9EjbX3FqpCcN/APqiLSk
yQodnc7KiffYmmHbXi8Z41CkKmbBcPQQfrwZXPmrX+0
--- RBFbw55F+eBIbdopQ1kyFcG65j0RL4jxP6d4R5nNg5U
¿:)zéó®¦öE3ˆåÅ[rêaÖÏεV!¥«A¼5¡“ †Nd¬œ.¹y;±
JÿåÆÓ¤J[}Bgúãì ÷&´þ$h9?Ç”zeÐР絞Á<17>ºXÅRøQxe£š»òsàíÁ¡Ê޹Cϴ¡PûÊßûîóˆÌ1ŽŒQj²
ó£¬Ó“‡Xf'ƒ¹“b„ýÊ4²\螀 %¼Ø$F0Q»š£þ)ñûÆRƒ&}3ÑT8tI¨üïÛÚ25űb>•@VSwb!]tõmݰ §vódÂ>îZÜŒX4<58>ä)@±¬8o'ìâ)"çœ}ªEûx/OE<4F>á ¾3_û¡ÿ`¶R»Ó¿Õ¹¹škð·<C3B0>.ju1ªÀ° „b†«¤óŽ

View file

@ -1,4 +1,3 @@
{ config, pkgs, inputs, ... }:
let let
main-server = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFEEuBgdANmzr69bapLdSxu6gnsLHGUQUBatS2dQsdOU root@nixos"; main-server = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFEEuBgdANmzr69bapLdSxu6gnsLHGUQUBatS2dQsdOU root@nixos";
systems = [ systems = [
@ -13,4 +12,7 @@ in
{ {
"mailjet-user.age".publicKeys = users ++ systems; "mailjet-user.age".publicKeys = users ++ systems;
"mailjet-pass.age".publicKeys = users ++ systems; "mailjet-pass.age".publicKeys = users ++ systems;
"authentik-env.age".publicKeys = users ++ systems;
"auth-grafana-id.age".publicKeys = users ++ systems;
"auth-grafana-secret.age".publicKeys = users ++ systems;
} }

View file

@ -47,6 +47,14 @@ let
lib lib
; ;
}; };
sso = import ./self_host/sso.nix {
inherit
inputs
config
pkgs
lib
;
};
cfg = config.service.selfhost; cfg = config.service.selfhost;
in in
{ {
@ -56,6 +64,7 @@ in
htop htop
ollama ollama
monitor monitor
sso
]; ];
config = { config = {
@ -89,5 +98,10 @@ in
default = false; default = false;
description = "Enable the nextcloud"; description = "Enable the nextcloud";
}; };
sso = lib.mkOption {
type = lib.types.bool;
default = false;
description = "Enable the nextcloud";
};
}; };
} }

View file

@ -0,0 +1,88 @@
{
config,
pkgs,
lib,
...
}:
let
cfg = config.service.selfhost.sso;
envFile = config.age.secrets."authentik-env".path;
envDst = "/run/authentik/env";
in
{
config = lib.mkIf cfg {
systemd.tmpfiles.rules = [
"d /run/authentik 0750 authentik authentik - -"
];
systemd.services.authentik-env = {
description = "Prepare Authentik environment file";
before = [
"authentik.service"
"authentik-migrate.service"
"authentik-worker.service"
];
wantedBy = [
"authentik.service"
"authentik-migrate.service"
"authentik-worker.service"
];
after = [
"systemd-sysusers.service"
];
serviceConfig = {
Type = "oneshot";
ExecStart = "${pkgs.coreutils}/bin/install -D -m0400 ${envFile} ${envDst}";
ExecStartPost = "${pkgs.coreutils}/bin/chown authentik:authentik ${envDst}";
};
};
systemd.services.authentik = {
after = [ "authentik-env.service" "postgresql.service" "redis-authentik.service" ];
requires = [ "authentik-env.service" "postgresql.service" "redis-authentik.service" ];
};
services = {
authentik = {
enable = true;
environmentFile = envDst;
settings = {
AUTHENTIK_LISTEN__HTTP = "127.0.0.1:9000";
AUTHENTIK_POSTGRESQL__HOST = "/run/postgresql";
AUTHENTIK_POSTGRESQL__USER = "authentik";
AUTHENTIK_POSTGRESQL__NAME = "authentik";
AUTHENTIK_REDIS__HOST = "127.0.0.1";
AUTHENTIK_REDIS__DB = 0;
AUTHENTIK_REDIS__PORT = 6380;
};
};
redis.servers.authentik.port = lib.mkForce 6380;
postgresql = {
enable = true;
ensureDatabases = [
"authentik"
];
ensureUsers = [
{
name = "authentik";
ensureDBOwnership = true;
}
];
initialScript = pkgs.writeText "init-authentik-db.sql" ''
ALTER USER authentik WITH PASSWORD '$(grep AUTHENTIK_POSTGRESQL__PASSWORD ${envFile} | cut -d= -f2)';
'';
};
nginx = {
virtualHosts."auth.enium.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:9000";
proxyWebsockets = true;
};
};
};
};
};
}