diff --git a/modules/tt-rss/default.nix b/modules/tt-rss/default.nix new file mode 100644 index 0000000..2af5d11 --- /dev/null +++ b/modules/tt-rss/default.nix @@ -0,0 +1,83 @@ +{ + flake, + config, + lib, + pkgs, + ... +}: let + ttrss-auth-oidc = pkgs.stdenv.mkDerivation { + name = "ttrss-auth-oidc"; + version = "7ebfbc91e92bb133beb907c6bde79279ee5156df"; + src = fetchGit { + url = "https://gitlab.tt-rss.org/tt-rss/plugins/ttrss-auth-oidc.git"; + hash = ""; + }; + }; +in { + age.secrets.tt-rss-database-password = { + file = "${flake.self}/secrets/tt-rss-database-password.age"; + owner = "tt_rss"; + mode = "600"; + }; + age.secrets.tt-rss-keycloak-client-secret = { + file = "${flake.self}/secrets/tt-rss-keycloak-client-secret.age"; + owner = "tt_rss"; + mode = "600"; + }; + age.secrets.tt-rss-smtp-password = { + file = "${flake.self}/secrets/tt-rss-smtp-password.age"; + owner = "tt_rss"; + mode = "600"; + }; + age.secrets.tt-rss-feed-crypt-key = { + file = "${flake.self}/secrets/tt-rss-feed-crypt-key.age"; + owner = "tt_rss"; + mode = "600"; + }; + + services.nginx.virtualHosts."rss.${config.pub-solar-os.networking.domain}" = { + enableACME = true; + forceSSL = true; + + locations."/".extraConfig = '' + uwsgi_pass unix:/run/searx/searx.sock; + ''; + }; + + users.users.nginx.extraGroups = [ "searx" ]; + + services.tt-rss = { + enable = true; + feedCryptKey = ""; + selfUrlPath = "https://rss.${config.pub-solar-os.networking.domain}"; + root = "/var/lib/tt-rss"; + plugins = [ + "auth_internal" + "note" + "ttrss-auth-oidc" + ]; + pluginPackages = [ + ttrss-auth-oidc + ]; + email = { + server = "mail.pub.solar"; + security = "tls"; + login = "admins@pub.solar"; + fromName = "pub.solar RSS server"; + fromAddress = "rss@pub.solar"; + digestSubject = "[RSS] New headlines for last 24 hours"; + }; + database = { + passwordFile = config.age.secrets.tt-rss-database-password.path; + createLocally = true; + }; + extraConfig = '' + putenv('TTRSS_SMTP_PASSWORD=' . file_get_contents('${config.age.secrets.tt-rss-smtp-password.path}')); + putenv('TTRSS_AUTH_OIDC_NAME=Keycloak'); + putenv('TTRSS_AUTH_OIDC_URL=https://auth.${config.pub-solar-os.networking.domain}/realms/${config.pub-solar-os.auth.realm}/'); + putenv('TTRSS_AUTH_OIDC_CLIENT_ID=tt-rss'); + putenv('TTRSS_AUTH_OIDC_CLIENT_SECRET=' . file_get_contents('${config.age.secrets.tt-rss-keycloak-client-secret}')); + putenv('TTRSS_FEED_CRYPT_KEY=' . file_get_contents('${config.age.secrets.tt-rss-feed-crypt-key}')); + ''; + }; +}