mirror of
https://github.com/SebastianStork/nixos-config.git
synced 2026-01-21 17:31:34 +01:00
Enable hedgedoc on alto
This commit is contained in:
parent
7c1275b0de
commit
6d9652bcc2
4 changed files with 117 additions and 7 deletions
|
|
@ -1,7 +1,8 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
let
|
let
|
||||||
myCfg = config.myConfig;
|
myCfg = config.myConfig;
|
||||||
in
|
caddyServe = myCfg.tailscale.caddyServe;
|
||||||
|
in
|
||||||
{
|
{
|
||||||
system.stateVersion = "24.11";
|
system.stateVersion = "24.11";
|
||||||
|
|
||||||
|
|
@ -13,16 +14,27 @@ let
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
exitNode.enable = true;
|
exitNode.enable = true;
|
||||||
|
|
||||||
caddyServe.nextcloud = {
|
caddyServe = {
|
||||||
subdomain = "cloud";
|
nextcloud = {
|
||||||
inherit (myCfg.nextcloud) port;
|
subdomain = "cloud";
|
||||||
|
inherit (myCfg.nextcloud) port;
|
||||||
|
};
|
||||||
|
hedgedoc = {
|
||||||
|
subdomain = "docs";
|
||||||
|
inherit (myCfg.hedgedoc) port;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
nextcloud = {
|
nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
backups.enable = true;
|
backups.enable = true;
|
||||||
inherit (myCfg.tailscale.caddyServe.nextcloud) subdomain;
|
inherit (caddyServe.nextcloud) subdomain;
|
||||||
|
};
|
||||||
|
hedgedoc = {
|
||||||
|
enable = true;
|
||||||
|
backups.enable = true;
|
||||||
|
inherit (caddyServe.hedgedoc) subdomain;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -4,6 +4,8 @@ service-tailscale-auth-key: ENC[AES256_GCM,data:9tcgzoRvxKaop1wztCIQmyej7mhou/wG
|
||||||
nextcloud:
|
nextcloud:
|
||||||
admin-password: ENC[AES256_GCM,data:TepYe5rZox6aoa3jeIhmBxaZIQGpjjf+SAG8E39y,iv:cAanc3a5e3PF+BkiFjcME+PiTSRaNj/e78kT/RTbaxY=,tag:wbn4vWeDnSJH7jWu7hutVw==,type:str]
|
admin-password: ENC[AES256_GCM,data:TepYe5rZox6aoa3jeIhmBxaZIQGpjjf+SAG8E39y,iv:cAanc3a5e3PF+BkiFjcME+PiTSRaNj/e78kT/RTbaxY=,tag:wbn4vWeDnSJH7jWu7hutVw==,type:str]
|
||||||
gmail-password: ENC[AES256_GCM,data:4NVrKWXcAA8OCxMx31ZnVYOnLbw=,iv:OlAtnSor7GDaqJSBHK+b0uFzweVnbc/9EdKxWarGt2c=,tag:UoOTTN8pM0tyYd59k1A+BA==,type:str]
|
gmail-password: ENC[AES256_GCM,data:4NVrKWXcAA8OCxMx31ZnVYOnLbw=,iv:OlAtnSor7GDaqJSBHK+b0uFzweVnbc/9EdKxWarGt2c=,tag:UoOTTN8pM0tyYd59k1A+BA==,type:str]
|
||||||
|
hedgedoc:
|
||||||
|
seb-password: ENC[AES256_GCM,data:+pejm+Ju9l1jqY/8gpWRR6I5z3VEFzPxzw==,iv:0ji6ayKljy7LoZW423xcMmKJqsbon3JGzEb8KlbR2zs=,tag:sz8Szb8wA00U9Es0q0N/tw==,type:str]
|
||||||
restic:
|
restic:
|
||||||
environment: ENC[AES256_GCM,data:v1Ui5mG7Q98CFEpq7sSpzEf86cJAcRi+sqFdvy6ZPuY9dukJD2wAGt5fuNQkMzBCKAUTHb46ga1WYf9fZ5AUOPdA1MNrJWKrXlrsYh8ZJYKOgfEVBBYPUKKGcajILNQ5SzU=,iv:Asg4CWJbGqSZh8YaxcWA0Yxau1dE4ZV9JBJSiDHufGI=,tag:46pNMWoCbciEv4cIHo7KFQ==,type:str]
|
environment: ENC[AES256_GCM,data:v1Ui5mG7Q98CFEpq7sSpzEf86cJAcRi+sqFdvy6ZPuY9dukJD2wAGt5fuNQkMzBCKAUTHb46ga1WYf9fZ5AUOPdA1MNrJWKrXlrsYh8ZJYKOgfEVBBYPUKKGcajILNQ5SzU=,iv:Asg4CWJbGqSZh8YaxcWA0Yxau1dE4ZV9JBJSiDHufGI=,tag:46pNMWoCbciEv4cIHo7KFQ==,type:str]
|
||||||
password: ENC[AES256_GCM,data:NVeqrWqtdgbhu3U7dAgwFeNLS9oPtnAPSrkGtvYD,iv:3l+9+bZfOpZdSCBKzXn5PqJvqo7mz/rj1tkihJqMHIs=,tag:JXigRR1adGlm8ehRv5wzIA==,type:str]
|
password: ENC[AES256_GCM,data:NVeqrWqtdgbhu3U7dAgwFeNLS9oPtnAPSrkGtvYD,iv:3l+9+bZfOpZdSCBKzXn5PqJvqo7mz/rj1tkihJqMHIs=,tag:JXigRR1adGlm8ehRv5wzIA==,type:str]
|
||||||
|
|
@ -32,8 +34,8 @@ sops:
|
||||||
dEhnSkQ5SDlnbmhGSVdYaDNuc3ZkM00K7WPEZRYWAd7uGY0IcDwGgQVPrpkF/tnz
|
dEhnSkQ5SDlnbmhGSVdYaDNuc3ZkM00K7WPEZRYWAd7uGY0IcDwGgQVPrpkF/tnz
|
||||||
ncj03JXM4BXwvEQOmD/i6wS4U4WCwkh9EauGJljVFTeu6TciomDULQ==
|
ncj03JXM4BXwvEQOmD/i6wS4U4WCwkh9EauGJljVFTeu6TciomDULQ==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2025-04-07T22:05:28Z"
|
lastmodified: "2025-04-10T21:05:17Z"
|
||||||
mac: ENC[AES256_GCM,data:HuoqNVicXopTQPJcaXhlCpZBhSqAIhVmhL3Pwxe+L0XE6SB08wJZkdI44Tc9QpfyzU/tAFQQqR85Y8cPODCena/RCDHPPNsYmi38DTf+zQkZEfTgC7PBpeyPeLy4StMPC2MCAyEEnwqx6Lfel0qGrwMJYP3K9C+wZhAfEnlLObY=,iv:mrRXbC3ce2JVswIZOBsevPc894yPWd0hJ783f+JGASA=,tag:m8kpzfGq063NVShMG/67bw==,type:str]
|
mac: ENC[AES256_GCM,data:FnKhhgp+UMy5LAgrDi33bkBtPr3vLMe5ocrxyP6Fu6q9hCG2onruetlp7NzSIaWcTiZqkSJ79RTDhEeZ1cALF0BY6PkvmbkiTF/wxhTk88q2AcC+AvdW3U7s7W9RQoZS1Vg2t4gCNv0j7f/1lZZ/p3z16NQ/XRZm1pYzpGy+ZNM=,iv:RrnkosL4nH/zIOEGIynPb70BXnLa254ueJXSbG29OQQ=,tag:nWtfIuj9jaqGC8dbXNvuag==,type:str]
|
||||||
pgp: []
|
pgp: []
|
||||||
unencrypted_suffix: _unencrypted
|
unencrypted_suffix: _unencrypted
|
||||||
version: 3.9.4
|
version: 3.9.4
|
||||||
|
|
|
||||||
36
modules/system/hedgedoc/backups.nix
Normal file
36
modules/system/hedgedoc/backups.nix
Normal file
|
|
@ -0,0 +1,36 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
options.myConfig.hedgedoc.backups.enable = lib.mkEnableOption "";
|
||||||
|
|
||||||
|
config = lib.mkIf config.myConfig.hedgedoc.backups.enable {
|
||||||
|
myConfig.resticBackup.hedgedoc = {
|
||||||
|
healthchecks.enable = true;
|
||||||
|
|
||||||
|
extraConfig = {
|
||||||
|
backupPrepareCommand = ''
|
||||||
|
${lib.getExe' pkgs.systemd "systemctl"} stop hedgedoc.service
|
||||||
|
'';
|
||||||
|
backupCleanupCommand = ''
|
||||||
|
${lib.getExe' pkgs.systemd "systemctl"} start hedgedoc.service
|
||||||
|
'';
|
||||||
|
paths = [ "/var/lib/hedgedoc" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [
|
||||||
|
(pkgs.writeShellApplication {
|
||||||
|
name = "hedgedoc-restore";
|
||||||
|
text = ''
|
||||||
|
sudo systemctl stop hedgedoc.service
|
||||||
|
sudo restic-hedgedoc restore --target / latest
|
||||||
|
sudo systemctl start hedgedoc.service
|
||||||
|
'';
|
||||||
|
})
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
60
modules/system/hedgedoc/default.nix
Normal file
60
modules/system/hedgedoc/default.nix
Normal file
|
|
@ -0,0 +1,60 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
cfg = config.myConfig.hedgedoc;
|
||||||
|
|
||||||
|
user = config.users.users.hedgedoc.name;
|
||||||
|
inherit (config.users.users.hedgedoc) group;
|
||||||
|
|
||||||
|
manage_users = "CMD_CONFIG_FILE=/run/hedgedoc/config.json NODE_ENV=production ${lib.getExe' pkgs.hedgedoc "manage_users"}";
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.myConfig.hedgedoc = {
|
||||||
|
enable = lib.mkEnableOption "";
|
||||||
|
subdomain = lib.mkOption {
|
||||||
|
type = lib.types.nonEmptyStr;
|
||||||
|
default = "";
|
||||||
|
};
|
||||||
|
port = lib.mkOption {
|
||||||
|
type = lib.types.port;
|
||||||
|
default = 3000;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.hedgedoc = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
domain = "${cfg.subdomain}.${config.networking.domain}";
|
||||||
|
port = cfg.port;
|
||||||
|
protocolUseSSL = true;
|
||||||
|
|
||||||
|
allowAnonymous = false;
|
||||||
|
allowEmailRegister = false;
|
||||||
|
defaultPermission = "limited";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.secrets."hedgedoc/seb-password" = {
|
||||||
|
owner = user;
|
||||||
|
inherit group;
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.hedgedoc.postStart =
|
||||||
|
let
|
||||||
|
manageUserSeb =
|
||||||
|
mode:
|
||||||
|
"${manage_users} --${mode} sebastian.stork@pm.me --pass \"$(cat ${
|
||||||
|
config.sops.secrets."hedgedoc/seb-password".path
|
||||||
|
})\"";
|
||||||
|
in
|
||||||
|
"${manageUserSeb "add"} || ${manageUserSeb "reset"}";
|
||||||
|
|
||||||
|
environment.shellAliases.hedgedoc-manage-users = "sudo --user=${user} ${manage_users}";
|
||||||
|
};
|
||||||
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue