nix-config/hosts/hedgedoc/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

103 lines
2.7 KiB
Nix
Raw Normal View History

2023-01-03 03:04:24 +01:00
{ config, pkgs, ... }:
2022-06-21 22:00:17 +02:00
{
c3d2.deployment.server = "server10";
2022-06-21 22:00:17 +02:00
microvm.mem = 1024;
networking.hostName = "hedgedoc";
2022-06-21 22:00:17 +02:00
services = {
2023-05-18 18:36:16 +02:00
backup.paths = [ "/var/lib/hedgedoc" ];
2022-06-21 22:00:17 +02:00
hedgedoc = {
enable = true;
settings = {
2022-06-21 22:00:17 +02:00
allowAnonymousEdits = true;
allowFreeURL = true;
allowOrigin = [ "hedgedoc.c3d2.de" ];
2022-06-21 22:00:17 +02:00
csp = {
enable = true;
addDefaults = true;
upgradeInsecureRequest = "auto";
};
db = {
dialect = "postgres";
2022-06-22 00:52:07 +02:00
host = "/run/postgresql/";
2022-06-21 22:00:17 +02:00
};
defaultPermission = "freely";
domain = "hedgedoc.c3d2.de";
2023-03-24 01:56:11 +01:00
# TODO: move to nixos-modules
ldap = {
url = "ldaps://auth.c3d2.de";
bindDn = "uid=search,ou=users,dc=c3d2,dc=de";
bindCredentials = "$bindCredentials";
searchBase = "ou=users,dc=c3d2,dc=de";
searchFilter = "(&(objectclass=person)(uid={{username}}))";
tlsca = "/etc/ssl/certs/ca-certificates.crt";
useridField = "uid";
};
loglevel = "warn";
2022-06-22 00:52:07 +02:00
protocolUseSSL = true;
2022-06-22 00:42:06 +02:00
sessionSecret = "$sessionSecret";
2022-06-21 22:00:17 +02:00
};
2022-06-22 01:24:40 +02:00
environmentFile = config.sops.secrets."hedgedoc".path;
2022-06-21 22:00:17 +02:00
};
2022-06-21 22:00:17 +02:00
nginx = {
enable = true;
enableReload = true;
virtualHosts = {
"codimd.c3d2.de" = {
forceSSL = true;
enableACME = true;
locations."/".return = "301 https://hedgedoc.c3d2.de$request_uri";
};
2022-09-01 23:56:14 +02:00
"hackmd.c3d2.de" = {
forceSSL = true;
enableACME = true;
locations."/".return = "301 https://hedgedoc.c3d2.de$request_uri";
};
"hedgedoc.c3d2.de" = {
default = true;
forceSSL = true;
enableACME = true;
locations = {
"^~ /robots.txt".return = "200 'User-agent: *\\nDisallow: /'";
"/".proxyPass = "http://localhost:${toString config.services.hedgedoc.settings.port}";
};
2022-06-21 22:00:17 +02:00
};
};
};
portunus.addToHosts = true;
2022-06-21 22:00:17 +02:00
postgresql = {
enable = true;
ensureDatabases = [
"hedgedoc"
];
ensureUsers = [ {
name = "hedgedoc";
ensurePermissions = {
"DATABASE \"hedgedoc\"" = "ALL PRIVILEGES";
};
}];
2023-01-06 21:09:14 +01:00
package = pkgs.postgresql_15;
upgrade.stopServices = [ "hedgedoc" ];
2022-06-21 22:00:17 +02:00
};
};
2022-06-22 00:42:06 +02:00
sops = {
age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
2022-07-31 18:13:03 +02:00
defaultSopsFile = ./secrets.yaml;
2022-06-22 00:42:06 +02:00
secrets = {
"hedgedoc".owner = config.systemd.services.hedgedoc.serviceConfig.User;
2023-05-18 18:36:16 +02:00
"restic/password".owner = "root";
"restic/repository/server8".owner = "root";
2022-06-22 00:42:06 +02:00
};
};
2022-10-31 22:14:16 +01:00
system.stateVersion = "22.11";
2022-06-21 22:00:17 +02:00
}