infrastructure/machines/compute01/outline.nix
Tom Hubrecht 4716f8a398
All checks were successful
build configuration / build_compute01 (push) Successful in 1m6s
build configuration / build_storage01 (push) Successful in 44s
build configuration / build_web01 (push) Successful in 57s
npins update / npins_update (push) Successful in 46s
feat(modules): Replace dgn-secrets by age-secrets
2024-01-09 14:48:33 +01:00

55 lines
1.3 KiB
Nix

{ config, ... }:
let host = "docs.dgnum.eu";
in {
services.outline = {
enable = true;
storage.storageType = "local";
smtp = {
username = "web-services@infra.dgnum.eu";
port = 465;
host = "kurisu.lahfa.xyz";
fromEmail = "docs@infra.dgnum.eu";
replyEmail = "web-services@infra.dgnum.eu";
passwordFile = config.age.secrets."outline-smtp_password_file".path;
};
redisUrl = "local";
publicUrl = "https://${host}";
oidcAuthentication = {
clientId = "outline_dgn";
authUrl = "https://sso.dgnum.eu/ui/oauth2";
tokenUrl = "https://sso.dgnum.eu/oauth2/token";
userinfoUrl = "https://sso.dgnum.eu/oauth2/openid/outline_dgn/userinfo";
displayName = "DGNum SSO";
clientSecretFile =
config.age.secrets."outline-oidc_client_secret_file".path;
};
defaultLanguage = "fr_FR";
forceHttps = false;
port = 3003;
};
services.nginx.virtualHosts.${host} = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:3003";
proxyWebsockets = true;
};
locations."/robots.txt" = {
return = ''200 "User-agent: *\nDisallow: /s/demarches-normaliennes/\n"'';
};
};
age-secrets.matches."^outline-.*$" = { owner = "outline"; };
}