Add Taiga

Taiga is a project management software, and we desperately need a system
to manage our tasks. After trying several others (OpenProject, Redmine,
leantime) we decided to use Taiga as it appears to be the only system
that provides the possibility of OIDC without an Enterprise subscription.

Having said that, we haven't set up OIDC yet, as the plugin to set it up
appears to be unmaintained and does not support our version of postgres.

This is not the final state of Taiga. After Jenkins and Quay (or
alternatives) are up we will be revisiting Taiga to create an updated
version of the plugin and set up OIDC. For now, only the infrastructure
tasks will be on Taiga.

Change-Id: Iaccc3cd8a2d94762a70b8e6f96a516ca241b552d
Reviewed-on: https://git.clicks.codes/c/Clicks/NixFiles/+/83
Reviewed-by: Samuel Shuert <coded@clicks.codes>
Tested-by: Skyler Grey <minion@clicks.codes>
diff --git a/modules/common/nginx-routes.nix b/modules/common/nginx-routes.nix
index 865a171..e94d30f 100644
--- a/modules/common/nginx-routes.nix
+++ b/modules/common/nginx-routes.nix
@@ -13,6 +13,7 @@
       (ReverseProxy "127.0.0.1:3000")
     ]))
     (Hosts [ "vaultwarden.clicks.codes" "passwords.clicks.codes" ] (ReverseProxy "generic:1028"))
+    (Hosts [ "taiga.clicks.codes" "projects.clicks.codes" "tasks.clicks.codes" "issues.clicks.codes" "kanban.clicks.codes" ] (ReverseProxy "generic:1029"))
     (Host "login.clicks.codes" (ReverseProxy "127.0.0.1:9083"))
     (Hosts [ "gerrit.clicks.codes" "git.clicks.codes" ]
       (ReverseProxy "generic:1024"))
diff --git a/modules/common/postgres.nix b/modules/common/postgres.nix
index f77346a..30103e8 100644
--- a/modules/common/postgres.nix
+++ b/modules/common/postgres.nix
@@ -4,7 +4,7 @@
 
     package = pkgs.postgresql;
     settings = {
-      listen_addresses = lib.mkForce "standard";
+      listen_addresses = lib.mkForce "standard, 172.20.0.1";
       log_connections = true;
       logging_collector = true;
       log_disconnections = true;
@@ -12,7 +12,7 @@
     };
 
     ensureDatabases =
-      [ "vaultwarden" "gerrit" "privatebin" "keycloak" "nextcloud" "synapse" ];
+      [ "vaultwarden" "gerrit" "privatebin" "keycloak" "nextcloud" "synapse" "taiga" ];
 
     ensureUsers = [
       {
@@ -42,11 +42,17 @@
         name = "nextcloud";
         ensurePermissions = { "DATABASE nextcloud" = "ALL PRIVILEGES"; };
       }
+      {
+        name = "taiga";
+        ensurePermissions = { "DATABASE taiga" = "ALL PRIVILEGES"; };
+      }
     ] ++ (map (name: ({
       inherit name;
       ensurePermissions = { "ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES"; };
     })) [ "minion" "coded" "pineafan" ]);
 
+    #                 method database user address auth-method
+    authentication = "host   all      all  samenet scram-sha-256";
   };
 
   systemd.services.postgresql.postStart = lib.mkMerge [
@@ -85,6 +91,10 @@
         user = "nextcloud";
         passwordFile = config.sops.secrets.clicks_nextcloud_db_password.path;
       }
+      {
+        user = "taiga";
+        passwordFile = config.sops.secrets.clicks_taiga_db_password.path;
+      }
     ] [
       (map (userData: ''
         $PSQL -tAc "ALTER USER ${userData.user} PASSWORD '$(cat ${userData.passwordFile})';"
@@ -99,6 +109,7 @@
     "clicks_vaultwarden_db_password"
     "clicks_privatebin_db_password"
     "clicks_nextcloud_db_password"
+    "clicks_taiga_db_password"
   ] [
     (map (name: {
       inherit name;
diff --git a/modules/common/taiga.nix b/modules/common/taiga.nix
new file mode 100644
index 0000000..0f64fb3
--- /dev/null
+++ b/modules/common/taiga.nix
@@ -0,0 +1,169 @@
+{ config, pkgs, ... }: let
+  openid_environment = {
+    ENABLE_OPENID = "True";
+    OPENID_USER_URL = "https://login.clicks.codes/realms/master/protocol/openid-connect/userinfo";
+    OPENID_TOKEN_URL = "https://login.clicks.codes/realms/master/protocol/openid-connect/token";
+    OPENID_CLIENT_ID = "taiga";
+    OPENID_NAME = "Clicks Keycloak";
+
+    # PUBLIC_REGISTER_ENABLED = "True";
+
+    OPENID_ID_FIELD = "sub";
+    OPENID_USERNAME_FIELD = "preferred_username";
+    OPENID_FULLNAME_FIELD = "name";
+    OPENID_EMAIL_FIELD = "email";
+    OPENID_SCOPE="openid email";
+
+    OPENID_FILTER = "enabled";
+    OPENID_FILTER_FIELD = "taiga_access";
+  };
+  backend_environment = openid_environment // {
+    POSTGRES_DB = "taiga";
+    POSTGRES_USER = "taiga";
+    POSTGRES_HOST = "172.20.0.1";
+
+    TAIGA_SCHEME = "https";
+    TAIGA_DOMAIN = "taiga.clicks.codes";
+    TAIGA_SUBPATH = "";
+
+    EMAIL_BACKEND = "django.core.mail.backends.smtp.EmailBackend";
+    DEFAULT_FROM_EMAIL = "taiga@clicks.codes";
+    EMAIL_USE_TLS = "True";
+    EMAIL_USE_SSL = "False"; # not needed when using TLS
+    EMAIL_HOST = "mail.clicks.codes";
+    EMAIL_PORT = "587";
+    EMAIL_HOST_USER = "taiga@clicks.codes";
+
+    RABBITMQ_USER = "taiga";
+
+    ENABLE_TELEMETRY = "False";
+  };
+  credential_environment_files = [
+    config.sops.secrets.taiga_credentials_env.path
+    # TODO: OPENID_CLIENT_SECRET
+  ];
+
+  backend_volumes = [
+    "/var/taiga/back/static:/taiga-back/static"
+    "/var/taiga/back/media:/taiga-back/media"
+  ];
+
+  taiga_version = "latest";
+  taiga_base_version = "latest";  # events, etc. only have X.X.0 versions
+in {
+  sops.secrets.taiga_credentials_env = {
+    mode = "0660";
+    owner = config.users.users.root.name;
+    group = config.users.users.root.group;
+    sopsFile = ../../secrets/taiga.env.bin;
+    format = "binary";
+  };
+
+  networking.firewall.interfaces.taiga.allowedTCPPorts = [ 5432 ];
+
+  systemd.services = {
+    "docker-network-taiga" = {
+      serviceConfig.Type = "oneshot";
+      wantedBy = [
+        "docker-taiga-back.service"
+        "docker-taiga-async.service"
+        "docker-taiga-async-rabbitmq.service"
+        "docker-taiga-front.service"
+        "docker-taiga-events.service"
+        "docker-taiga-events-rabbitmq.service"
+        "docker-taiga-protected.service"
+        "docker-taiga-gateway.service"
+      ];
+      script = ''
+        ${pkgs.docker}/bin/docker network inspect taiga > /dev/null 2>&1 || ${pkgs.docker}/bin/docker network create taiga --gateway 172.20.0.1 --subnet 172.20.0.0/16 --opt com.docker.network.bridge.name=taiga
+      '';
+    };
+    docker-taiga-back.requires = [
+      "docker-taiga-events-rabbitmq.service"
+      "docker-taiga-async-rabbitmq.service"
+      "postgresql.service"
+    ];
+    docker-taiga-async.requires = [
+      "docker-taiga-events-rabbitmq.service"
+      "docker-taiga-async-rabbitmq.service"
+      "postgresql.service"
+    ];
+    docker-taiga-gateway.requires = [
+      "docker-taiga-front.service"
+      "docker-taiga-back.service"
+      "docker-taiga-events.service"
+    ];
+    docker-taiga-events.requires = [
+      "docker-taiga-events-rabbitmq.service"
+    ];
+  };
+  virtualisation.oci-containers.containers = {
+    taiga-back = {
+      image = "taigaio/taiga-back:${taiga_version}";
+      environment = backend_environment;
+      environmentFiles = credential_environment_files;
+      volumes = backend_volumes;
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-async = {
+      image = "taigaio/taiga-back:${taiga_version}";
+      environment = backend_environment;
+      environmentFiles = credential_environment_files;
+      volumes = backend_volumes;
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-async-rabbitmq = {
+      image = "rabbitmq:3.8-management-alpine";
+      environment = {
+        RABBITMQ_DEFAULT_USER = "taiga";
+        RABBITMQ_DEFAULT_VHOST = "taiga";
+      };
+      environmentFiles = credential_environment_files;
+      volumes = [ "/var/taiga/rabbitmq/async:/var/lib/rabbitmq" ];
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-front = {
+      image = "taigaio/taiga-front:${taiga_version}";
+      environment = openid_environment // {
+        TAIGA_URL = "https://taiga.clicks.codes";
+        TAIGA_WEBSOCKETS_URL = "wss://taiga.clicks.codes";
+        TAIGA_SUBPATH = "";
+      };
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-events = {
+      image = "taigaio/taiga-events:${taiga_base_version}";
+      environment = {
+        RABBITMQ_USER = "taiga";
+      };
+      environmentFiles = credential_environment_files;
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-events-rabbitmq = {
+      image = "rabbitmq:3.8-management-alpine";
+      environment = {
+        RABBITMQ_DEFAULT_USER = "taiga";
+        RABBITMQ_DEFAULT_VHOST = "taiga";
+      };
+      environmentFiles = credential_environment_files;
+      volumes = [ "/var/taiga/rabbitmq/events:/var/lib/rabbitmq" ];
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-protected = {
+      image = "taigaio/taiga-protected:${taiga_base_version}";
+      environment = {
+        MAX_AGE = "600";
+      };
+      environmentFiles = credential_environment_files;
+      extraOptions = [ "--network=taiga" ];
+    };
+    taiga-gateway = {
+      image = "nginx:1.19-alpine";
+      ports = [ "127.0.0.255:1029:80/tcp" ];
+      volumes = [
+        "${./taiga/taiga-gateway.conf}:/etc/nginx/conf.d/default.conf"
+      ] ++ backend_volumes;
+      extraOptions = [ "--network=taiga" ];
+    };
+  };
+}
diff --git a/modules/common/taiga/taiga-gateway.conf b/modules/common/taiga/taiga-gateway.conf
new file mode 100644
index 0000000..ebaeb68
--- /dev/null
+++ b/modules/common/taiga/taiga-gateway.conf
@@ -0,0 +1,75 @@
+server {
+    listen 80 default_server;
+
+    client_max_body_size 100M;
+    charset utf-8;
+
+    # Frontend
+    location / {
+        proxy_pass http://taiga-front/;
+        proxy_pass_header Server;
+        proxy_set_header Host $http_host;
+        proxy_redirect off;
+        proxy_set_header X-Real-IP $remote_addr;
+        proxy_set_header X-Scheme $scheme;
+    }
+
+    # API
+    location /api/ {
+        proxy_pass http://taiga-back:8000/api/;
+        proxy_pass_header Server;
+        proxy_set_header Host $http_host;
+        proxy_redirect off;
+        proxy_set_header X-Real-IP $remote_addr;
+        proxy_set_header X-Scheme $scheme;
+    }
+
+    # Admin
+    location /admin/ {
+        proxy_pass http://taiga-back:8000/admin/;
+        proxy_pass_header Server;
+        proxy_set_header Host $http_host;
+        proxy_redirect off;
+        proxy_set_header X-Real-IP $remote_addr;
+        proxy_set_header X-Scheme $scheme;
+    }
+
+    # Static
+    location /static/ {
+        alias /taiga/static/;
+    }
+
+    # Media
+    location /_protected/ {
+        internal;
+        alias /taiga/media/;
+        add_header Content-disposition "attachment";
+    }
+
+    # Unprotected section
+    location /media/exports/ {
+        alias /taiga/media/exports/;
+        add_header Content-disposition "attachment";
+    }
+
+    location /media/ {
+        proxy_set_header Host $http_host;
+        proxy_set_header X-Real-IP $remote_addr;
+        proxy_set_header X-Scheme $scheme;
+        proxy_set_header X-Forwarded-Proto $scheme;
+        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
+        proxy_pass http://taiga-protected:8003/;
+        proxy_redirect off;
+    }
+
+    # Events
+    location /events {
+        proxy_pass http://taiga-events:8888/events;
+        proxy_http_version 1.1;
+        proxy_set_header Upgrade $http_upgrade;
+        proxy_set_header Connection "upgrade";
+        proxy_connect_timeout 7d;
+        proxy_send_timeout 7d;
+        proxy_read_timeout 7d;
+    }
+}
diff --git a/secrets/postgres.json b/secrets/postgres.json
index 7f1be44..ed8fc23 100644
--- a/secrets/postgres.json
+++ b/secrets/postgres.json
@@ -4,6 +4,7 @@
 	"clicks_vaultwarden_db_password": "ENC[AES256_GCM,data:oYeRdwSP7EmQwdJRd1tRFwcRTL4uHpCCp/xVYZb1jTIsOlXHE9ccAMkDPIs/BMa0GhlNSMQymPx8+r4xR9c1lhMQL863ye9tRLK6V/eYqkKJqZ9u4fJ4T+k7bl6xPXy1omq3gQ==,iv:AjOti3ZkPOPYt0bgfaYWReY3SY/rnp8zQ3BAlbCfcdU=,tag:RO4KlycbR2uECfwG+/AX3w==,type:str]",
 	"clicks_privatebin_db_password": "ENC[AES256_GCM,data:T+NIe961xTXO/B9RCr/KlhlOLHcz8RfVnCn/+PexGUSeQ9suQ1wdILt14GvEuAUczN3bTT1sy9wRM656lAwWA/nsF3yML+5VwQo/aKo2R66Ga9Lnslg8tquQuwEpWb2tRg6BDEwUl0iLrvGKODAKuu3ClXJEJTASeTCZMv0jUQY=,iv:NFsZbKKCfji9DGDRQHFfH+insWGxbS6xqsng40ckC4M=,tag:LR5Ay8ZowkD7s3pEHjws2w==,type:str]",
 	"clicks_nextcloud_db_password": "ENC[AES256_GCM,data:Tu4BRo0qkpp+RXYlQO7PIfZM40tquvQUt9hbtZdKRotrOg81CGjZLISjNELr8pLCQK4AAfCJ7UPdR0ZztJfhrj5vPnaQM/2nHO4aMuhfnkOX00MDJhum/j1I0Adx/Au9zAaIONaKMBXLmX/g3FU2s6Yp7OtZ7/4FoWAYbG4zSbY=,iv:LjlkKkVNybg9EU9pytsmyYJrFMym0RmSvIFI/KKcpyc=,tag:rPyOh+KtAmo9OeY0Wm1sCQ==,type:str]",
+	"clicks_taiga_db_password": "ENC[AES256_GCM,data:z6XN0q7pGnaevH2WHd8Cjin8HwmhgZUwsZXYBAJBvvDYGWKOZAkkb6uDwdkEF7ZGtRwvjPTxH2VNoncNJJOYDngbRIQz+ntkVTKfmsbdBjKBWDKHbho5+IImeuetMFRkpwsCCyoRgu7r/3JVsW+rzIaOXvw4FjFTknadA+nFN2Q=,iv:KVJdVp3jSiGrpD1bl+S4H+iIklHp7W4zo0niq02mUMc=,tag:g/12Hjro169Kr41WhS0kSg==,type:str]",
 	"sops": {
 		"kms": null,
 		"gcp_kms": null,
@@ -27,8 +28,8 @@
 				"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA3clFVS0JZSkhmNElLa3N2\nNFdkT091dzZPdXUyOXNUNkk1QzNMS0hJengwCjcya01LanZhTXNsaGpQdVIvNlRl\nZnljZkhZYWVUR2xJckJPbUpnOSt4SmMKLS0tIElMcGNRTVJudXFORG4zZ3drdG1C\nYTZPcDh4OGwzUTZDVlhWNk55bDZMd2sK/F5ZGw6Kf8nWRXDobOonFDtPlSSU5c4u\nAEvihsNSDR3MwvQgu5jJCuCeRGLdXaOqBBEYrIamIcAlVKGeT6y/UA==\n-----END AGE ENCRYPTED FILE-----\n"
 			}
 		],
-		"lastmodified": "2023-11-19T19:03:46Z",
-		"mac": "ENC[AES256_GCM,data:mxck3eyWvBSN6Um9lEwJYAS83FZYaZB6J1h02pyYpzEC2QDDVd0auS+wKZ7pc9OlyquramOOmhrh/+NlMwbRocQZzxt/TQdLx4J9myxIY6UYOjf0u7F/6rsCzCvXghF4wVw3QajJxOijBcYlkN9LG5SjsCa5YO6Hq7+vVjF4Xsk=,iv:GNhfVLrVkzU806Sgrd1rR52I0Vu9jkR4Zzv7airX64o=,tag:NXeJra1xW2/xBUelYICJcA==,type:str]",
+		"lastmodified": "2023-12-03T00:26:13Z",
+		"mac": "ENC[AES256_GCM,data:TuCOR3a2Ee3+YynXhLhuAALagisAoyoJmvlMK45R/iCK3p9kyWNpH1NkNgmA1Ye493uxGKn0Qz5aU5pQFjRkZL2voNU5m+mg0BhwGDNuD9DMTriDcEPmj+MVccK0cSN3pk60r5Mm9qstnCu/ICI3Vudo0V2OHA9YU/ov2i/JT6U=,iv:d/JNr+sa0GLBRF3s7vwIfZjNv+G4/QPdj6Z0GRNK/+I=,tag:VQQF9fRmcAOL9p61gMUEuA==,type:str]",
 		"pgp": null,
 		"unencrypted_suffix": "_unencrypted",
 		"version": "3.7.3"
diff --git a/secrets/taiga.env.bin b/secrets/taiga.env.bin
new file mode 100644
index 0000000..dee7f18
--- /dev/null
+++ b/secrets/taiga.env.bin
@@ -0,0 +1,32 @@
+{
+	"data": "ENC[AES256_GCM,data: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,iv:wczkMMplEzIFQKL2Kh0+LU4sTqk8VlM2Zzm3gbteq3Y=,tag:0tSDwnX283CL8vpp1OmLBg==,type:str]",
+	"sops": {
+		"kms": null,
+		"gcp_kms": null,
+		"azure_kv": null,
+		"hc_vault": null,
+		"age": [
+			{
+				"recipient": "age15mv77dpnh5762gk5rsw2u79uza4tg8cu6r3nlwjudlzmdqqck3ss6mg9dy",
+				"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBXaGUzMGRBZE5aZDVmTHU1\nVjYxVE5nTEZidk9mZG1aczhwRGl3ak54QWdnCkErZWY5enh1YkFuVWNGNit4d1I5\nc1FVeXJCM294K3huMFVkZlI3U00xT28KLS0tIEpOandWRFRNd0hmem5XdmtWTytM\nUEttS2h6K0ZLS1FDMnBXQkRSTnpkMzAKvhQkN9E45mAVSkzutOmqh5X0lOrfgvcz\nUbg7v7JGzqRoPS+oRpphJoSVQ47Q+xAWh098W/f8BiOpU7geyClJIw==\n-----END AGE ENCRYPTED FILE-----\n"
+			},
+			{
+				"recipient": "age1m7k864feyuezllp2hj4edkccn36rthrvfw969j6f0l3c0mhh5emsnfx6pd",
+				"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBtaGZmN1dkL29aOVIzK05n\ndzJxQlYzblRGNE1CZzRrU0VKM3AwUUFKQ0hBCkZQcWhCUm83RkNxNWdzL29SV2Fw\ndDAzVE1XVkZWSE1JNTFrSzh0ZTRoc0EKLS0tIDJtSVJXMWlIRktkektrcFJjZFhl\nbndETWNuSkZNT2FzZEl0N3dYdDVpU2cKTf3pnGSircmaFT2XAx01YslFLqVtHmWd\niFYenwkM2SwcDUKI3bU8+1dYfafdkFMesr2IMixk9hDvMZEvaA5LpA==\n-----END AGE ENCRYPTED FILE-----\n"
+			},
+			{
+				"recipient": "age1fxxnmkeuqhhct93c43pwkzhuzzq8857s5hye6pgfpku70kjn4ecqtamfqr",
+				"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBkbllQZ0R1K3RvbXJtc2l0\naEpDVzZaR085STM5Q0tvY1UvRCsvTERMZlNnClJlSUV0eTRick52dExJRXBuMWJD\nKzR0YVRLRStPWVp5eFB2TVAvdUFhQVEKLS0tIEwwdWhRY0hMd3M0VWhObExsWGdp\nZnZpclp1dXdQMFdOdjRLM3gzbHJPSW8KqbRZdQNfDEK6m34d06Nb1zOTZ394iTq3\nv0jN33dOUX6Km9d6eC+S4f2lbosDRZrN9kPdqg1w4f25RLkUnkinhQ==\n-----END AGE ENCRYPTED FILE-----\n"
+			},
+			{
+				"recipient": "age1zunqahfz404x7v8x0gs4hv5kq2xlyvqmukhlwvpymj74805jcunq4r7ugv",
+				"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBVVEllOW44TUprNy83VnJz\nd0xCYWREd0ZJbG9ic1d2SGtpU2IxeFBTckhBCkM4UHJmVjVSK3gweWtTRXJlMmFC\nNXVqUG0raVlHK215TnR5cjNuWUJnUXMKLS0tIG9yT3IvakJhRVpHOXEwNVhhV2FO\nMWdJcmMwYzJtRzVRZUNQSW9xRkUwZkUKkK+JXUXuXCuU4j284J3OHn6mLZdaStxa\nj9UcALBgoCkevBF0WbMW23ddoazmTrIlxsEwUyE8yy8mjHuGvFQcpg==\n-----END AGE ENCRYPTED FILE-----\n"
+			}
+		],
+		"lastmodified": "2023-12-03T01:55:13Z",
+		"mac": "ENC[AES256_GCM,data:q3hpaUvGIiIpaBAzHPykK1FGi7xG6pdwrOrMo1U21GUgLqAvpuwYJpKTxOK81ovT3aWUDL9SVF+fDpElgT3fa9zWZbc/SjDCwGq38THgzp7K3tcMz4siJD8imrBbcisMmrAXGnDdIB8pC1NRi1Tk36zBb4QkORyxW2GtFBCtLKw=,iv:WUpKRgaDJj3aXayi2EVMYYskGQNhAJLWGFY5xM0X53k=,tag:QQIX7uxqfmFfuWCQ01sk+w==,type:str]",
+		"pgp": null,
+		"unencrypted_suffix": "_unencrypted",
+		"version": "3.7.3"
+	}
+}
\ No newline at end of file