katzen-cafe/modules/hedgedoc.nix

44 lines
1.3 KiB
Nix
Raw Permalink Normal View History

{ ... }:
{
services.hedgedoc = {
enable = true;
settings = {
2023-11-21 10:19:35 +01:00
domain = "pad.katzen.cafe";
port = 3001;
protocolUseSSL = true;
allowFreeURL = true;
requireFreeURLAuthentication = true;
2023-11-23 18:41:22 +01:00
allowEmailRegister = false;
email = false;
allowAnonymous = false;
allowAnonymousEdits = true;
oauth2 = {
2023-11-21 10:19:35 +01:00
userProfileURL = "https://auth.katzen.cafe/realms/katzen.cafe/protocol/openid-connect/userinfo";
userProfileUsernameAttr = "preferred_username";
userProfileDisplayNameAttr = "name";
userProfileEmailAttr = "email";
tokenURL = "https://auth.katzen.cafe/realms/katzen.cafe/protocol/openid-connect/token";
authorizationURL = "https://auth.katzen.cafe/realms/katzen.cafe/protocol/openid-connect/auth";
clientID = "hedgedoc";
providerName = "Keycloak";
# the envfile should overwrite this?
clientSecret = "none";
scope = "openid email profile";
};
2023-11-21 10:19:35 +01:00
db = {
dialect = "postgres";
host = "/run/postgresql";
database = "catpad";
};
};
environmentFile = "/var/lib/secrets/hedgedoc.env";
};
deployment.keys = {
"hedgedoc.env" = {
keyCommand = [ "pass" "hedgedoc/envfile" ];
destDir = "/var/lib/secrets";
permissions = "0604";
};
};
}