Tom Hubrecht
2f06f22ac7
All checks were successful
Check meta / check_meta (pull_request) Successful in 18s
Check meta / check_dns (pull_request) Successful in 16s
build configuration / build_and_cache_storage01 (pull_request) Successful in 1m22s
build configuration / build_and_cache_rescue01 (pull_request) Successful in 1m20s
build configuration / build_and_cache_compute01 (pull_request) Successful in 1m40s
build configuration / build_and_cache_geo01 (pull_request) Successful in 1m4s
build configuration / build_and_cache_krz01 (pull_request) Successful in 2m2s
lint / check (pull_request) Successful in 25s
build configuration / build_and_cache_geo02 (pull_request) Successful in 1m4s
build configuration / build_and_cache_web02 (pull_request) Successful in 1m16s
build configuration / build_and_cache_bridge01 (pull_request) Successful in 1m9s
build configuration / build_and_cache_vault01 (pull_request) Successful in 1m23s
build configuration / build_and_cache_web01 (pull_request) Successful in 1m54s
build configuration / build_and_cache_storage01 (push) Successful in 1m14s
build configuration / build_and_cache_compute01 (push) Successful in 1m33s
build configuration / build_and_cache_krz01 (push) Successful in 2m1s
build configuration / build_and_cache_rescue01 (push) Successful in 1m15s
build configuration / build_and_cache_geo01 (push) Successful in 1m0s
build configuration / build_and_cache_geo02 (push) Successful in 1m4s
build configuration / build_and_cache_vault01 (push) Successful in 1m21s
lint / check (push) Successful in 24s
build configuration / build_and_cache_web02 (push) Successful in 1m7s
build configuration / build_and_cache_bridge01 (push) Successful in 1m5s
build configuration / build_and_cache_web01 (push) Successful in 1m41s
70 lines
1.6 KiB
Nix
70 lines
1.6 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
nixpkgs,
|
|
...
|
|
}:
|
|
|
|
let
|
|
EnvironmentFile = [ config.age.secrets."netbox-environment_file".path ];
|
|
in
|
|
|
|
{
|
|
services = {
|
|
netbox = {
|
|
enable = true;
|
|
package = nixpkgs.unstable.netbox_3_7;
|
|
secretKeyFile = "/dev/null";
|
|
listenAddress = "127.0.0.1";
|
|
plugins = p: [ p.netbox-qrcode ];
|
|
settings = {
|
|
ALLOWED_HOSTS = [ "netbox.dgnum.eu" ];
|
|
REMOTE_AUTH_BACKEND = "social_core.backends.open_id_connect.OpenIdConnectAuth";
|
|
PLUGINS = [ "netbox_qrcode" ];
|
|
PLUGINS_CONFIG = {
|
|
netbox_qrcode = {
|
|
custom_text = "DGNum. contact@dgnum.eu";
|
|
font = "Tahoma";
|
|
};
|
|
};
|
|
};
|
|
|
|
extraConfig = lib.mkForce ''
|
|
from os import environ as env
|
|
|
|
SECRET_KEY = env["SECRET_KEY"]
|
|
|
|
SOCIAL_AUTH_OIDC_OIDC_ENDPOINT = env["NETBOX_OIDC_URL"]
|
|
SOCIAL_AUTH_OIDC_KEY = env["NETBOX_OIDC_KEY"]
|
|
SOCIAL_AUTH_OIDC_SECRET = env["NETBOX_OIDC_SECRET"]
|
|
'';
|
|
};
|
|
};
|
|
|
|
systemd.services = {
|
|
netbox.serviceConfig = {
|
|
inherit EnvironmentFile;
|
|
|
|
TimeoutStartSec = 600;
|
|
};
|
|
|
|
netbox-housekeeping.serviceConfig = {
|
|
inherit EnvironmentFile;
|
|
};
|
|
|
|
netbox-rq.serviceConfig = {
|
|
inherit EnvironmentFile;
|
|
};
|
|
};
|
|
|
|
users.users.nginx.extraGroups = [ "netbox" ];
|
|
|
|
dgn-web.simpleProxies.netbox = {
|
|
inherit (config.services.netbox) port;
|
|
host = "netbox.dgnum.eu";
|
|
vhostConfig.locations."/static/".alias = "${config.services.netbox.dataDir}/static/";
|
|
};
|
|
|
|
dgn-backups.jobs.netbox.settings.paths = [ "/var/lib/netbox" ];
|
|
dgn-backups.postgresDatabases = [ "netbox" ];
|
|
}
|