infrastructure/machines/web01/netbox.nix

80 lines
1.9 KiB
Nix
Raw Normal View History

{
config,
lib,
2024-04-03 19:31:46 +02:00
mkNixpkgs,
...
}:
let
EnvironmentFile = [ config.age.secrets."netbox-environment_file".path ];
in
{
services = {
netbox = {
enable = true;
2024-04-03 19:31:46 +02:00
package = (mkNixpkgs "nixos-unstable").netbox_3_7;
2024-02-23 00:57:26 +01:00
secretKeyFile = "/dev/null";
listenAddress = "127.0.0.1";
2024-04-03 19:31:46 +02:00
plugins = p: [ p.netbox-qrcode ];
settings = {
2024-02-23 00:57:26 +01:00
ALLOWED_HOSTS = [ "netbox.dgnum.eu" ];
REMOTE_AUTH_BACKEND = "social_core.backends.open_id_connect.OpenIdConnectAuth";
2024-04-03 19:31:46 +02:00
PLUGINS = [ "netbox_qrcode" ];
PLUGINS_CONFIG = {
netbox_qrcode = {
custom_text = "DGNum. contact@dgnum.eu";
text_location = "down";
};
};
};
2024-02-23 00:57:26 +01:00
extraConfig = lib.mkForce ''
from os import environ as env
2024-02-23 00:57:26 +01:00
SECRET_KEY = env["SECRET_KEY"]
SOCIAL_AUTH_OIDC_OIDC_ENDPOINT = env["NETBOX_OIDC_URL"]
SOCIAL_AUTH_OIDC_KEY = env["NETBOX_OIDC_KEY"]
SOCIAL_AUTH_OIDC_SECRET = env["NETBOX_OIDC_SECRET"]
'';
};
nginx = {
enable = true;
2024-02-23 00:57:26 +01:00
virtualHosts."netbox.dgnum.eu" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://${config.services.netbox.listenAddress}:${builtins.toString config.services.netbox.port}";
locations."/static/".alias = "${config.services.netbox.dataDir}/static/";
};
};
};
systemd.services = {
netbox.serviceConfig = {
inherit EnvironmentFile;
TimeoutStartSec = 600;
};
netbox-housekeeping.serviceConfig = {
inherit EnvironmentFile;
};
netbox-rq.serviceConfig = {
inherit EnvironmentFile;
};
};
users.users.nginx.extraGroups = [ "netbox" ];
networking.firewall.allowedTCPPorts = [
443
80
];
2024-03-13 20:21:45 +01:00
2024-03-13 20:34:17 +01:00
dgn-backups.jobs.netbox.settings.paths = [ "/var/lib/netbox" ];
2024-03-13 20:21:45 +01:00
dgn-backups.postgresDatabases = [ "netbox" ];
}