nixos-config/machines/renge/services/hedgedoc.nix

63 lines
1.5 KiB
Nix
Raw Permalink Normal View History

2021-03-10 15:40:55 +01:00
{ config, lib, pkgs, ... }:
let
cfg = config.services.hedgedoc;
in
{
services.postgresql = {
enable = true;
ensureDatabases = [ "hedgedoc" ];
ensureUsers = lib.singleton {
2022-03-23 17:27:55 +01:00
name = "hedgedoc";
2021-03-10 15:40:55 +01:00
ensurePermissions = {
"DATABASE hedgedoc" = "ALL PRIVILEGES";
};
};
};
services.hedgedoc = {
enable = true;
settings = {
2021-03-10 15:40:55 +01:00
host = "127.0.0.1";
port = 3001;
db = {
dialect = "postgres";
host = "/run/postgresql";
2022-03-23 17:27:55 +01:00
user = "hedgedoc";
2021-03-10 15:40:55 +01:00
database = "hedgedoc";
};
domain = "pad.sbruder.de";
protocolUseSSL = true;
csp.enable = true;
imageUploadType = "filesystem";
};
};
systemd.services.hedgedoc = {
2021-03-30 16:13:20 +02:00
after = [ "postgresql.service" ];
2021-03-10 15:40:55 +01:00
preStart = toString (pkgs.writeShellScript "hedgedoc-generate-session-secret" ''
if [ ! -f ${cfg.workDir}/session_secret_env ]; then
echo "CMD_SESSION_SECRET=$(${pkgs.pwgen}/bin/pwgen -s 32 1)" > ${cfg.workDir}/session_secret_env
fi
'');
serviceConfig = {
Environment = [
"CMD_LOGLEVEL=warn"
];
EnvironmentFile = [
"-${cfg.workDir}/session_secret_env" # - ensures that it will not fail on first start
];
};
};
systemd.tmpfiles.rules = [
"d ${cfg.settings.uploadsPath} 0700 hedgedoc hedgedoc - -"
2021-03-10 15:40:55 +01:00
];
services.nginx.virtualHosts."pad.sbruder.de" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://${cfg.settings.host}:${toString cfg.settings.port}";
2021-03-10 15:40:55 +01:00
};
}