nixos/machines/kitt.nix
Brendan Golden 69ec3abb3b
Some checks failed
Build_Deploy / linter (push) Successful in 11s
Build_Deploy / build (push) Successful in 47s
Build_Deploy / deploy_dns (push) Successful in 1m29s
Build_Deploy / deploy_active (active) (push) Successful in 1m36s
Build_Deploy / deploy_active (active-ext) (push) Failing after 44s
Build_Deploy / deploy_active (active-core) (push) Successful in 6m43s
feat: we now have a sso/oauth server ther we can use to connect services to
Currently works with Proxmox (VE and MG) and Forgejo
2025-03-23 00:06:29 +00:00

61 lines
1.1 KiB
Nix

/*
Name: https://en.wikipedia.org/wiki/KITT
Why: Kitt used to have this role before (as well as email and dns)
Type: VM
Hardware: -
From: 2023
Role: LDAP Server
Notes:
*/
{
config,
pkgs,
lib,
nodes,
...
}: let
# name of the server, sets teh hostname and record for it
name = "kitt";
ip_pub = "193.1.99.74";
hostname = "${name}.skynet.ie";
host = {
ip = ip_pub;
name = name;
hostname = hostname;
};
in {
imports = [
../applications/ldap/server.nix
../applications/ldap/backend.nix
../applications/discord.nix
../applications/bitwarden/vaultwarden.nix
../applications/bitwarden/bitwarden_sync.nix
../applications/sso.nix
];
deployment = {
targetHost = hostname;
targetPort = 22;
targetUser = null;
tags = ["active-core"];
};
services.skynet = {
host = host;
backup.enable = true;
# ldap setup
ldap.enable = true;
ldap_backend.enable = true;
# private member services
discord_bot.enable = true;
# committee/admin services
vaultwarden.enable = true;
sso.enable = true;
};
}