2024-09-19 17:39:18 +03:00
|
|
|
{ abs, pkgs, config, ... }@inputs:
|
|
|
|
|
|
|
|
let
|
|
|
|
secrets = import (abs "lib/secrets.nix");
|
|
|
|
trivial = import (abs "lib/trivial.nix") inputs;
|
|
|
|
|
|
|
|
UID = 1113;
|
|
|
|
context = trivial.storeDirectory ./image;
|
|
|
|
in {
|
|
|
|
imports = [
|
|
|
|
(secrets.declare [{
|
2024-10-26 22:44:01 +03:00
|
|
|
name = "siyuan-teidesu-proxy-env";
|
2024-09-19 17:39:18 +03:00
|
|
|
owner = "siyuan-teidesu";
|
|
|
|
}])
|
|
|
|
];
|
|
|
|
users.users.siyuan-teidesu = {
|
|
|
|
isNormalUser = true;
|
|
|
|
uid = UID;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.docker-siyuan-teidesu.serviceConfig.ExecStartPre = [
|
|
|
|
(pkgs.writeShellScript "build-siyuan" ''
|
|
|
|
docker build -t local/siyuan ${context}
|
|
|
|
'')
|
|
|
|
];
|
|
|
|
virtualisation.oci-containers.containers.siyuan-teidesu = {
|
|
|
|
image = "local/siyuan";
|
|
|
|
volumes = [
|
|
|
|
"/srv/siyuan-teidesu:/data"
|
|
|
|
];
|
|
|
|
cmd = [ "--workspace=/data" ];
|
|
|
|
environment = {
|
2024-10-26 22:44:01 +03:00
|
|
|
# we manage auth via openid-proxy
|
2024-09-19 17:39:18 +03:00
|
|
|
SIYUAN_ACCESS_AUTH_CODE_BYPASS = "true";
|
|
|
|
};
|
|
|
|
user = builtins.toString UID;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
"d /srv/siyuan-teidesu 0700 ${builtins.toString UID} ${builtins.toString UID} -"
|
|
|
|
];
|
|
|
|
|
2024-10-26 22:44:01 +03:00
|
|
|
desu.openid-proxy.services.siyuan-teidesu = {
|
|
|
|
clientId = "teidesu-siyuan";
|
|
|
|
domain = "siyuan.tei.su";
|
|
|
|
upstream = "http://siyuan-teidesu.docker:6806";
|
|
|
|
envSecret = "siyuan-teidesu-proxy-env";
|
|
|
|
uid = UID;
|
|
|
|
};
|
|
|
|
|
2024-09-19 17:39:18 +03:00
|
|
|
services.nginx.virtualHosts."siyuan.tei.su" = {
|
|
|
|
forceSSL = true;
|
|
|
|
useACMEHost = "tei.su";
|
|
|
|
|
|
|
|
locations."/" = {
|
2024-10-26 22:44:01 +03:00
|
|
|
proxyPass = "http://siyuan-teidesu-oidc.docker$request_uri";
|
2024-09-19 17:39:18 +03:00
|
|
|
proxyWebsockets = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|