diff --git a/nixos/hosts/olympus/nginx/configuration.nix b/nixos/hosts/olympus/nginx/configuration.nix index 457ab4a..a78bdf8 100644 --- a/nixos/hosts/olympus/nginx/configuration.nix +++ b/nixos/hosts/olympus/nginx/configuration.nix @@ -96,7 +96,7 @@ in # forceSSL = true; # root = pkgs.synapse-admin; #}; - virtualHosts."books.meowy.tech" = proxy "http://bookwyrm:8001"; + virtualHosts."books.meowy.tech" = proxy "http://bookwyrm.olympus:8001"; # Kubernetes endpoints virtualHosts."0x76.dev" = k8s_proxy; diff --git a/nixos/hosts/olympus/outline/configuration.nix b/nixos/hosts/olympus/outline/configuration.nix index c17d004..93e7e96 100644 --- a/nixos/hosts/olympus/outline/configuration.nix +++ b/nixos/hosts/olympus/outline/configuration.nix @@ -22,7 +22,10 @@ let vs = config.vault-secrets.secrets; in config.services.outline.port ]; - vault-secrets.secrets.outline = { }; + vault-secrets.secrets.outline = { + user = config.services.outline.user; + group = config.services.outline.group; + }; services.outline = { enable = true; @@ -40,5 +43,13 @@ let vs = config.vault-secrets.secrets; in uploadBucketName = "outline"; region = "us-east-1"; # fake }; + oidcAuthentication = { + userinfoUrl= "https://git.0x76.dev/login/oauth/userinfo"; + tokenUrl = "https://git.0x76.dev/login/oauth/access_token"; + displayName = "Gitea"; + clientId = "db58b9f0-aed1-4a60-a9bb-56077a790f5b"; + authUrl = "https://git.0x76.dev/login/oauth/authorize"; + clientSecretFile = "${vs.outline}/giteaClientSecret"; + }; }; }