hedgedoc: switch from email auth to gitLab oauth

This commit is contained in:
SebastianStork 2025-08-01 12:04:56 +02:00
parent 57097a2e7b
commit f9b25dd455

View file

@ -6,11 +6,6 @@
}: }:
let let
cfg = config.custom.services.hedgedoc; cfg = config.custom.services.hedgedoc;
user = config.users.users.hedgedoc.name;
dataDir = "/var/lib/hedgedoc";
manageUsers = "CMD_CONFIG_FILE=/run/hedgedoc/config.json NODE_ENV=production ${lib.getExe' pkgs.hedgedoc "manage_users"}";
in in
{ {
options.custom.services.hedgedoc = { options.custom.services.hedgedoc = {
@ -32,58 +27,51 @@ in
ports.list = [ cfg.port ]; ports.list = [ cfg.port ];
}; };
sops = { sops =
let
owner = config.users.users.hedgedoc.name;
in
{
secrets = { secrets = {
"hedgedoc/seb-password".owner = user; "hedgedoc/seb-password".owner = owner;
# "hedgedoc/gitlab-auth-secret".owner = user; "hedgedoc/gitlab-auth-secret".owner = owner;
};
templates."hedgedoc/environment" = {
inherit owner;
content = "GITLAB_CLIENTSECRET=${config.sops.placeholder."hedgedoc/gitlab-auth-secret"}";
}; };
# templates."hedgedoc/environment" = {
# owner = user;
# content = "GITLAB_CLIENTSECRET=${config.sops.placeholder."hedgedoc/gitlab-auth-secret"}";
# };
}; };
services.hedgedoc = { services.hedgedoc = {
enable = true; enable = true;
# environmentFile = config.sops.templates."hedgedoc/environment".path; environmentFile = config.sops.templates."hedgedoc/environment".path;
settings = { settings = {
inherit (cfg) domain port; inherit (cfg) domain port;
protocolUseSSL = true; protocolUseSSL = true;
allowAnonymous = false; allowAnonymous = false;
allowEmailRegister = false; email = false;
defaultPermission = "limited"; defaultPermission = "limited";
sessionSecret = "$SESSION_SECRET"; sessionSecret = "$SESSION_SECRET";
# gitlab = { gitlab = {
# baseURL = "https://code.fbi.h-da.de"; baseURL = "https://code.fbi.h-da.de";
# clientID = "dc71d7ec1525ce3b425d7d41d602f67e1a06cef981259605a87841a6be62cc58"; clientID = "dc71d7ec1525ce3b425d7d41d602f67e1a06cef981259605a87841a6be62cc58";
# clientSecret = "$GITLAB_CLIENTSECRET"; clientSecret = "$GITLAB_CLIENTSECRET";
# }; };
}; };
}; };
systemd.services.hedgedoc = {
# Ensure session-secret # Ensure session-secret
preStart = lib.mkBefore '' systemd.services.hedgedoc.preStart =
if [ ! -f ${dataDir}/session-secret ]; then
${lib.getExe pkgs.pwgen} -s 64 1 > ${dataDir}/session-secret
fi
export SESSION_SECRET=$(cat ${dataDir}/session-secret)
'';
postStart =
let let
manageUserSeb = sessionSecret = "/var/lib/hedgedoc/session-secret";
mode:
"${manageUsers} --${mode} sebastian.stork@pm.me --pass \"$(cat ${
config.sops.secrets."hedgedoc/seb-password".path
})\"";
in in
"${manageUserSeb "add"} || ${manageUserSeb "reset"}"; lib.mkBefore ''
}; if [ ! -f ${sessionSecret} ]; then
${lib.getExe pkgs.pwgen} -s 64 1 > ${sessionSecret}
environment.shellAliases.hedgedoc-manage-users = "sudo --user=${user} ${manageUsers}"; fi
export SESSION_SECRET=$(cat ${sessionSecret})
'';
custom.services.resticBackups.hedgedoc = lib.mkIf cfg.doBackups { custom.services.resticBackups.hedgedoc = lib.mkIf cfg.doBackups {
conflictingService = "hedgedoc.service"; conflictingService = "hedgedoc.service";