nixos-wiki-infra/modules/nixos-wiki/default.nix

160 lines
5.4 KiB
Nix
Raw Normal View History

{ config, pkgs, lib, ... }:
let
cfg = config.services.nixos-wiki;
in
{
options = {
services.nixos-wiki = {
hostname = lib.mkOption {
type = lib.types.str;
description = "The hostname of the wiki";
};
adminPasswordFile = lib.mkOption {
type = lib.types.path;
description = "The password file for the wiki admin";
};
githubClientId = lib.mkOption {
type = lib.types.str;
description = "The github client id for the wiki";
};
githubClientSecretFile = lib.mkOption {
type = lib.types.path;
description = "The github client secret for the wiki";
};
emergencyContact = lib.mkOption {
type = lib.types.str;
description = "The emergency contact for the wiki";
};
passwordSender = lib.mkOption {
type = lib.types.str;
description = "default FROM address in emails";
};
noReplyAddress = lib.mkOption {
type = lib.types.str;
description = "default Reply-To address in emails";
};
};
};
config = {
services.mediawiki = {
2024-04-01 14:33:59 +02:00
name = "NixOS Wiki";
enable = true;
webserver = "nginx";
database.type = "postgres";
nginx.hostName = config.services.nixos-wiki.hostname;
uploadsDir = "/var/lib/mediawiki-uploads/";
passwordFile = cfg.adminPasswordFile;
extensions = {
SyntaxHighlight_GeSHi = null; # provides <SyntaxHighlight> tags
ParserFunctions = null;
Cite = null;
VisualEditor = null;
AuthManagerOAuth = pkgs.fetchzip {
url = "https://github.com/mohe2015/AuthManagerOAuth/releases/download/v0.3.2/AuthManagerOAuth.zip";
hash = "sha256-hr/DLyL6IzQs67eA46RdmuVlfCiAbq+eZCRLfjLxUpc=";
}; # Github login
ConfirmEdit = null; # Combat SPAM with a simple Captcha
# https://www.mediawiki.org/wiki/Extension:MobileFrontend/
} // pkgs.callPackages ./extensions.nix {};
extraConfig = ''
#$wgDebugLogFile = "/var/log/mediawiki/debug.log";
# allow local login
$wgAuthManagerOAuthConfig = [
'github' => [
'clientId' => '${cfg.githubClientId}',
'clientSecret' => file_get_contents("${cfg.githubClientSecretFile}"),
'urlAuthorize' => 'https://github.com/login/oauth/authorize',
'urlAccessToken' => 'https://github.com/login/oauth/access_token',
'urlResourceOwnerDetails' => 'https://api.github.com/user'
],
];
# Enable account creation globally
$wgGroupPermissions['*']['createaccount'] = true;
$wgGroupPermissions['*']['autocreateaccount'] = true;
# Disable anonymous editing
$wgGroupPermissions['*']['edit'] = false;
# Allow svg upload
$wgFileExtensions[] = 'svg';
$wgSVGConverterPath = "${pkgs.imagemagick}/bin";
# Pretty URLs
$wgUsePathInfo = true;
# cache pages with db
$wgMainCacheType = CACHE_DB;
#$wgFavicon = "/favicon.ico";
$wgDefaultSkin = 'vector-2022';
# configure logos for vector-2022: https://www.mediawiki.org/wiki/Manual:$wgLogos
$wgLogos = [
'1x' => '/nixos.png',
'icon' => '/nixos.png',
];
# Combat SPAM with IP-Blocklists (StopForumSpam extension)
2024-04-01 14:19:59 +02:00
#$wgEnableDnsBlacklist = true;
#$wgDnsBlacklistUrls = array(
# 'dnsbl.dronebl.org'
#);
# required for fancy VisualEditor extension
$wgGroupPermissions['user']['writeapi'] = true;
# Enable content security policy
$wgCSPHeader = true;
# Disallow framing
$wgEditPageFrameOptions = "DENY";
$wgEnableEmail = true;
# FIXME: we cannot enable this because of github login
$wgEmailConfirmToEdit = false;
$wgAllowHTMLEmail = false;
$wgEmergencyContact = "${cfg.emergencyContact}";
$wgPasswordSender = "${cfg.passwordSender}";
$wgNoReplyAddress = "${cfg.noReplyAddress}";
2023-11-15 17:24:07 +01:00
# To purge all page cache increase this using: date +%Y%m%d%H%M%S
$wgCacheEpoch = 20231115172319;
2024-04-01 14:19:45 +02:00
$wgPygmentizePath = "${pkgs.python3Packages.pygments}/bin/pygmentize";
2024-04-02 15:13:01 +02:00
2024-04-02 15:24:20 +02:00
# add extra groups
## add trusted group
2024-04-02 15:13:01 +02:00
$wgGroupPermissions['trusted'] = $wgGroupPermissions['user'];
$wgGroupPermissions['trusted']['delete'] = true;
2024-04-02 15:24:20 +02:00
## add moderator group
$wgGroupPermissions['moderator'] = $wgGroupPermissions['user'];
$wgGroupPermissions['moderator']['delete'] = true;
$wgGroupPermissions['moderator']['blockusers'] = true;
$wgGroupPermissions['moderator']['rollback'] = true;
$wgGroupPermissions['moderator']['viewdeleted'] = true;
$wgGroupPermissions['moderator']['oversight'] = true;
$wgGroupPermissions['moderator']['protect'] = true;
2024-04-04 21:45:15 +02:00
## remove restrictions on display titles
$wgRestrictDisplayTitle = false;
'';
};
2024-04-01 13:25:32 +02:00
services.postgresql.package = pkgs.postgresql_16;
2023-10-24 18:59:19 +02:00
networking.firewall.allowedTCPPorts = [ 443 80 ];
security.acme.acceptTerms = true;
services.nginx.virtualHosts.${config.services.mediawiki.nginx.hostName} = {
enableACME = lib.mkDefault true;
forceSSL = lib.mkDefault true;
locations."=/nixos.png".alias = ./nixos.png;
2024-04-01 22:28:47 +02:00
locations."=/favicon.ico".alias = ./favicon.ico;
};
};
}