nixfiles/hosts/koi/containers/siyuan/default.nix

52 lines
1.3 KiB
Nix
Raw Normal View History

2024-11-23 16:37:34 +03:00
{ pkgs, ... }:
2024-09-19 17:39:18 +03:00
let
UID = 1113;
2024-11-23 16:37:34 +03:00
context = pkgs.copyPathToStore ./image;
2024-09-19 17:39:18 +03:00
in {
users.users.siyuan-teidesu = {
isNormalUser = true;
uid = UID;
};
systemd.services.docker-siyuan-teidesu.serviceConfig.ExecStartPre = [
(pkgs.writeShellScript "build-siyuan" ''
docker build -t local/siyuan ${context}
'')
];
virtualisation.oci-containers.containers.siyuan-teidesu = {
image = "local/siyuan";
cmd = [ "--workspace=/data" ];
environment = {
2024-10-26 22:44:01 +03:00
# we manage auth via openid-proxy
2024-09-19 17:39:18 +03:00
SIYUAN_ACCESS_AUTH_CODE_BYPASS = "true";
};
user = builtins.toString UID;
2024-12-11 09:11:31 +03:00
extraOptions = [
"--mount=type=bind,source=/srv/siyuan-teidesu,target=/data"
];
2024-09-19 17:39:18 +03:00
};
systemd.tmpfiles.rules = [
"d /srv/siyuan-teidesu 0700 ${builtins.toString UID} ${builtins.toString UID} -"
];
2024-11-23 16:37:34 +03:00
desu.secrets.siyuan-teidesu-proxy-env.owner = "siyuan-teidesu";
2024-10-26 22:44:01 +03:00
desu.openid-proxy.services.siyuan-teidesu = {
clientId = "teidesu-siyuan";
domain = "siyuan.tei.su";
upstream = "http://siyuan-teidesu.docker:6806";
envSecret = "siyuan-teidesu-proxy-env";
uid = UID;
};
2024-09-19 17:39:18 +03:00
services.nginx.virtualHosts."siyuan.tei.su" = {
forceSSL = true;
useACMEHost = "tei.su";
locations."/" = {
2024-10-26 22:44:01 +03:00
proxyPass = "http://siyuan-teidesu-oidc.docker$request_uri";
2024-09-19 17:39:18 +03:00
proxyWebsockets = true;
};
};
}