infrastructure/machines/compute01/hedgedoc.nix

64 lines
1.1 KiB
Nix
Raw Permalink Normal View History

{ config, lib, ... }:
let
host = "pads.dgnum.eu";
port = 3007;
in
{
services = {
hedgedoc = {
enable = true;
environmentFile = config.age.secrets."hedgedoc-environment_file".path;
settings = {
inherit port;
domain = host;
host = "127.0.0.1";
allowOrigin = [ host ];
protocolUseSSL = true;
2023-12-04 18:44:59 +01:00
allowFreeURL = true;
2023-12-03 13:24:22 +01:00
db = {
dialect = "postgres";
host = "/run/postgresql";
};
};
};
nginx.virtualHosts.${host} = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${builtins.toString port}";
proxyWebsockets = true;
};
};
postgresql = {
enable = true;
ensureDatabases = [ "hedgedoc" ];
ensureUsers = [
{
name = "hedgedoc";
ensureDBOwnership = true;
}
];
};
};
systemd.services.hedgedoc.serviceConfig.StateDirectory = lib.mkForce [
"hedgedoc"
"hedgedoc/uploads"
];
2024-02-21 17:18:14 +01:00
dgn-backups.jobs.hedgedoc.settings.paths = [ "/var/lib/hedgedoc" ];
2024-02-21 22:49:20 +01:00
dgn-backups.postgresDatabases = [ "hedgedoc" ];
}