mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 09:07:21 +01:00
106 lines
3.3 KiB
Nix
106 lines
3.3 KiB
Nix
{ self, lib, config, globals, ... }:
|
|
let
|
|
servicePort = 80;
|
|
serviceName = "freshrss";
|
|
serviceUser = "freshrss";
|
|
serviceGroup = serviceName;
|
|
serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
|
|
serviceAddress = globals.networks.home.hosts.${config.node.name}.ipv4;
|
|
|
|
inherit (config.swarselsystems) sopsFile;
|
|
in
|
|
{
|
|
options.swarselmodules.server.${serviceName} = lib.mkEnableOption "enable ${serviceName} on server";
|
|
config = lib.mkIf config.swarselmodules.server.${serviceName} {
|
|
|
|
users.users.${serviceUser} = {
|
|
extraGroups = [ "users" ];
|
|
group = serviceGroup;
|
|
isSystemUser = true;
|
|
};
|
|
|
|
users.groups.${serviceGroup} = { };
|
|
|
|
sops = {
|
|
secrets = {
|
|
freshrss-pw = { inherit sopsFile; owner = serviceUser; };
|
|
kanidm-freshrss-client = { inherit sopsFile; owner = serviceUser; group = serviceGroup; mode = "0440"; };
|
|
# freshrss-oidc-crypto-key = { owner = serviceUser; group = serviceGroup; mode = "0440"; };
|
|
};
|
|
|
|
# templates = {
|
|
# "freshrss-env" = {
|
|
# content = ''
|
|
# DATA_PATH=${config.services.freshrss.dataDir}
|
|
# OIDC_ENABLED=1
|
|
# OIDC_PROVIDER_METADATA_URL=https://${kanidmDomain}/.well-known/openid-configuration
|
|
# OIDC_CLIENT_ID=freshrss
|
|
# OIDC_CLIENT_SECRET=${config.sops.placeholder.kanidm-freshrss-client}
|
|
# OIDC_CLIENT_CRYPTO_KEY=${config.sops.placeholder.oidc-crypto-key}
|
|
# OIDC_REMOTE_USER_CLAIM=preferred_username
|
|
# OIDC_SCOPES=openid groups email profile
|
|
# OIDC_X_FORWARDED_HEADERS=X-Forwarded-Host X-Forwarded-Port X-Forwarded-Proto
|
|
# '';
|
|
# owner = "freshrss";
|
|
# group = "freshrss";
|
|
# mode = "0440";
|
|
# };
|
|
# };
|
|
};
|
|
|
|
topology.self.services.${serviceName} = {
|
|
name = "FreshRSS";
|
|
info = "https://${serviceDomain}";
|
|
icon = "${self}/files/topology-images/${serviceName}.png";
|
|
};
|
|
|
|
globals.services.${serviceName}.domain = serviceDomain;
|
|
|
|
services.${serviceName} =
|
|
let
|
|
inherit (config.repo.secrets.local.freshrss) defaultUser;
|
|
in
|
|
{
|
|
inherit defaultUser;
|
|
enable = true;
|
|
virtualHost = serviceDomain;
|
|
baseUrl = "https://${serviceDomain}";
|
|
authType = "form";
|
|
dataDir = "/Vault/data/tt-rss";
|
|
passwordFile = config.sops.secrets.freshrss-pw.path;
|
|
};
|
|
|
|
# systemd.services.freshrss-config.serviceConfig.EnvironmentFile = [
|
|
# config.sops.templates.freshrss-env.path
|
|
# ];
|
|
|
|
nodes.moonside.services.nginx = {
|
|
upstreams = {
|
|
${serviceName} = {
|
|
servers = {
|
|
"${serviceAddress}:${builtins.toString servicePort}" = { };
|
|
};
|
|
};
|
|
};
|
|
virtualHosts = {
|
|
"${serviceDomain}" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
acmeRoot = null;
|
|
oauth2.enable = true;
|
|
oauth2.allowedGroups = [ "ttrss_access" ];
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://${serviceName}";
|
|
};
|
|
"/api" = {
|
|
proxyPass = "http://${serviceName}";
|
|
setOauth2Headers = false;
|
|
bypassAuth = true;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
}
|