mirror of
https://github.com/oddlama/nix-config.git
synced 2025-10-10 14:50:40 +02:00
feat: add mealie
This commit is contained in:
parent
825babc919
commit
af4c7db8c1
26 changed files with 211 additions and 0 deletions
|
@ -18,6 +18,7 @@ let
|
|||
"cast.photos.${globals.domains.me}"
|
||||
"photos.${globals.domains.me}"
|
||||
"s3.photos.${globals.domains.me}"
|
||||
globals.services.mealie.domain
|
||||
globals.services.immich.domain
|
||||
globals.services.influxdb.domain
|
||||
globals.services.loki.domain
|
||||
|
|
|
@ -20,6 +20,7 @@ let
|
|||
"cast.photos.${globals.domains.me}"
|
||||
"photos.${globals.domains.me}"
|
||||
"s3.photos.${globals.domains.me}"
|
||||
globals.services.mealie.domain
|
||||
globals.services.immich.domain
|
||||
globals.services.influxdb.domain
|
||||
globals.services.loki.domain
|
||||
|
@ -142,6 +143,7 @@ in
|
|||
// mkMicrovm "adguardhome"
|
||||
// mkMicrovm "forgejo"
|
||||
// mkMicrovm "kanidm"
|
||||
// mkMicrovm "mealie"
|
||||
// mkMicrovm "radicale"
|
||||
// mkMicrovm "vaultwarden"
|
||||
// mkMicrovm "web-proxy"
|
||||
|
|
|
@ -118,6 +118,7 @@ in
|
|||
"cast.photos.${globals.domains.me}"
|
||||
"photos.${globals.domains.me}"
|
||||
"s3.photos.${globals.domains.me}"
|
||||
globals.services.mealie.domain
|
||||
globals.services.immich.domain
|
||||
globals.services.influxdb.domain
|
||||
globals.services.loki.domain
|
||||
|
|
|
@ -39,6 +39,7 @@ in
|
|||
age.secrets.kanidm-oauth2-grafana = mkRandomSecret;
|
||||
age.secrets.kanidm-oauth2-immich = mkRandomSecret;
|
||||
age.secrets.kanidm-oauth2-firezone = mkRandomSecret;
|
||||
age.secrets.kanidm-oauth2-mealie = mkRandomSecret;
|
||||
age.secrets.kanidm-oauth2-paperless = mkRandomSecret;
|
||||
age.secrets.kanidm-oauth2-web-sentinel = mkRandomSecret;
|
||||
|
||||
|
@ -155,6 +156,29 @@ in
|
|||
];
|
||||
};
|
||||
|
||||
# Mealie
|
||||
groups."mealie.access" = { };
|
||||
groups."mealie.admins" = { };
|
||||
systems.oauth2.mealie = {
|
||||
displayName = "Mealie";
|
||||
originUrl = "https://${globals.services.mealie.domain}/login";
|
||||
originLanding = "https://${globals.services.mealie.domain}/";
|
||||
basicSecretFile = config.age.secrets.kanidm-oauth2-mealie.path;
|
||||
preferShortUsername = true;
|
||||
scopeMaps."mealie.access" = [
|
||||
"openid"
|
||||
"email"
|
||||
"profile"
|
||||
];
|
||||
claimMaps.groups = {
|
||||
joinType = "array";
|
||||
valuesByGroup = {
|
||||
"mealie.access" = [ "user" ];
|
||||
"mealie.admins" = [ "admin" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# Paperless
|
||||
groups."paperless.access" = { };
|
||||
systems.oauth2.paperless = {
|
||||
|
|
79
hosts/ward/guests/mealie.nix
Normal file
79
hosts/ward/guests/mealie.nix
Normal file
|
@ -0,0 +1,79 @@
|
|||
{
|
||||
config,
|
||||
globals,
|
||||
nodes,
|
||||
...
|
||||
}:
|
||||
let
|
||||
mealieDomain = "mealie.${globals.domains.personal}";
|
||||
in
|
||||
{
|
||||
wireguard.proxy-home = {
|
||||
client.via = "ward";
|
||||
firewallRuleForNode.ward-web-proxy.allowedTCPPorts = [ config.services.mealie.port ];
|
||||
};
|
||||
|
||||
# Mirror the original oauth2 secret
|
||||
age.secrets.mealie-oauth2-client-secret = {
|
||||
inherit (nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-mealie) rekeyFile;
|
||||
mode = "440";
|
||||
};
|
||||
|
||||
globals.services.mealie.domain = mealieDomain;
|
||||
globals.monitoring.http.mealie = {
|
||||
url = "https://${mealieDomain}";
|
||||
# FIXME: todooooooooooo
|
||||
expectedBodyRegex = "TODO";
|
||||
network = "internet";
|
||||
};
|
||||
|
||||
environment.persistence."/persist".directories = [
|
||||
{
|
||||
directory = "/var/lib/private/mealie";
|
||||
mode = "0700";
|
||||
}
|
||||
];
|
||||
|
||||
services.mealie = {
|
||||
enable = true;
|
||||
settings = rec {
|
||||
ALLOW_SIGNUP = "false";
|
||||
BASE_URL = "https://${mealieDomain}";
|
||||
TZ = config.time.timeZone;
|
||||
|
||||
TOKEN_TIME = 87600; # 10 years session time - this is only internal so who cares
|
||||
OIDC_AUTH_ENABLED = "true";
|
||||
OIDC_AUTO_REDIRECT = "true";
|
||||
OIDC_CLIENT_ID = "mealie";
|
||||
OIDC_CONFIGURATION_URL = "https://${globals.services.kanidm.domain}/oauth2/openid/${OIDC_CLIENT_ID}/.well-known/openid-configuration";
|
||||
OIDC_SIGNUP_ENABLED = "true";
|
||||
OIDC_USER_GROUP = "user";
|
||||
OIDC_ADMIN_GROUP = "admin";
|
||||
};
|
||||
};
|
||||
|
||||
nodes.ward-web-proxy = {
|
||||
services.nginx = {
|
||||
upstreams.mealie = {
|
||||
servers."${config.wireguard.proxy-home.ipv4}:${config.services.mealie.port}" = { };
|
||||
extraConfig = ''
|
||||
zone mealie 64k;
|
||||
keepalive 2;
|
||||
'';
|
||||
monitoring = {
|
||||
enable = true;
|
||||
# FIXME: todooooooooooo
|
||||
expectedBodyRegex = "TODO";
|
||||
};
|
||||
};
|
||||
virtualHosts.${mealieDomain} = {
|
||||
forceSSL = true;
|
||||
useACMEWildcardHost = true;
|
||||
extraConfig = ''
|
||||
client_max_body_size 128M;
|
||||
'';
|
||||
locations."/".proxyPass = "http://mealie";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
1
hosts/ward/secrets/mealie/host.pub
Normal file
1
hosts/ward/secrets/mealie/host.pub
Normal file
|
@ -0,0 +1 @@
|
|||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHmfHyKfCoAUflxiWZF4IBLMxLtTZexaAfwVwzFJIlqH
|
Loading…
Add table
Add a link
Reference in a new issue