replace snips.sh with rustypaste
This commit is contained in:
committed by
Joakim Repomaa
parent
6a5789d45b
commit
0b4e55e0b4
@@ -1,4 +1,4 @@
|
|||||||
{ config, lib, pkgs, bin, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
{
|
{
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
imports = [ ../gnome ../custom-programs ./neovim ];
|
imports = [ ../gnome ../custom-programs ./neovim ];
|
||||||
@@ -236,7 +236,6 @@
|
|||||||
hostname = "apu.tempel-vibes.ts.net";
|
hostname = "apu.tempel-vibes.ts.net";
|
||||||
user = "root";
|
user = "root";
|
||||||
};
|
};
|
||||||
"bin.freun.dev".port = bin.sshPort;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
spotify-player = {
|
spotify-player = {
|
||||||
|
|||||||
@@ -1,11 +1,11 @@
|
|||||||
{ inputs, bin, ... }:
|
{ inputs, ... }:
|
||||||
{
|
{
|
||||||
home-manager = {
|
home-manager = {
|
||||||
users = {
|
users = {
|
||||||
jokke = import ./jokke;
|
jokke = import ./jokke;
|
||||||
moco = import ./moco;
|
moco = import ./moco;
|
||||||
};
|
};
|
||||||
extraSpecialArgs = { inherit inputs bin; };
|
extraSpecialArgs = { inherit inputs; };
|
||||||
sharedModules = [ (import ./common) ];
|
sharedModules = [ (import ./common) ];
|
||||||
useUserPackages = true;
|
useUserPackages = true;
|
||||||
useGlobalPkgs = true;
|
useGlobalPkgs = true;
|
||||||
|
|||||||
73
hosts/freun.dev/services/bin.nix
Normal file
73
hosts/freun.dev/services/bin.nix
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
{ pkgs, ... }:
|
||||||
|
let
|
||||||
|
fqdn = "bin.freun.dev";
|
||||||
|
port = 3600;
|
||||||
|
config = (pkgs.formats.toml { }).generate "rustypaste-config.toml" {
|
||||||
|
server = {
|
||||||
|
address = "[::1]:${toString port}";
|
||||||
|
max_content_length = "1GB";
|
||||||
|
upload_path = "/var/lib/rustypaste/uploads";
|
||||||
|
timeout = "5m";
|
||||||
|
};
|
||||||
|
|
||||||
|
landing_page = {
|
||||||
|
text = ''
|
||||||
|
┬─┐┬ ┬┌─┐┌┬┐┬ ┬┌─┐┌─┐┌─┐┌┬┐┌─┐
|
||||||
|
├┬┘│ │└─┐ │ └┬┘├─┘├─┤└─┐ │ ├┤
|
||||||
|
┴└─└─┘└─┘ ┴ ┴ ┴ ┴ ┴└─┘ ┴ └─┘
|
||||||
|
|
||||||
|
Submit files via HTTP POST here:
|
||||||
|
curl -F 'file=@example.txt' https://${fqdn}
|
||||||
|
This will return the URL of the uploaded file.
|
||||||
|
|
||||||
|
The server administrator might remove any pastes that they do not personally
|
||||||
|
want to host.
|
||||||
|
|
||||||
|
If you are the server administrator and want to change this page, just go
|
||||||
|
into your config file and change it! If you change the expiry time, it is
|
||||||
|
recommended that you do.
|
||||||
|
|
||||||
|
By default, pastes expire every hour. The server admin may or may not have
|
||||||
|
changed this.
|
||||||
|
|
||||||
|
Check out the GitHub repository at https://github.com/orhun/rustypaste
|
||||||
|
Command line tool is available at https://github.com/orhun/rustypaste-cli
|
||||||
|
'';
|
||||||
|
content_type = "text/plain; charset=utf-8";
|
||||||
|
};
|
||||||
|
|
||||||
|
paste = {
|
||||||
|
default_extension = "txt";
|
||||||
|
random_url = { type = "petname"; words = 2; separator = "-"; };
|
||||||
|
delete_expirted_files = { enabled = true; interval = "1h"; };
|
||||||
|
default_expiry = "100y";
|
||||||
|
mime_override = [
|
||||||
|
{ mime = "text/plain"; regex = "^.*\.(log|txt|diff|sh|rs|toml|cr|nix|rb|js|tsx|ts|jsx)$"; }
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
{
|
||||||
|
systemd.services.rustypaste = {
|
||||||
|
enable = true;
|
||||||
|
description = "Rustypaste pastebin";
|
||||||
|
environment = {
|
||||||
|
CONFIG = config;
|
||||||
|
AUTH_TOKENS_FILE = "/var/secrets/rustypaste-tokens";
|
||||||
|
};
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.rustypaste}/bin/rustypaste";
|
||||||
|
WorkingDirectory = "/var/lib/rustypaste";
|
||||||
|
StateDirectory = "rustypaste";
|
||||||
|
DynamicUser = true;
|
||||||
|
BindReadOnlyPaths = [ "/var/secrets/rustypaste-tokens" ];
|
||||||
|
};
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
confinement = {
|
||||||
|
enable = true;
|
||||||
|
packages = [ config ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
modules.webserver.vHosts.${fqdn}.locations."/".proxyPort = port;
|
||||||
|
}
|
||||||
@@ -33,6 +33,6 @@
|
|||||||
./tailscale.nix
|
./tailscale.nix
|
||||||
./workout-tracker.nix
|
./workout-tracker.nix
|
||||||
./gotosocial.nix
|
./gotosocial.nix
|
||||||
./snips.nix
|
./bin.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,44 +0,0 @@
|
|||||||
{ pkgs, bin, ssh, ... }:
|
|
||||||
let
|
|
||||||
fqdn = "bin.freun.dev";
|
|
||||||
port = 3600;
|
|
||||||
sshPort = bin.sshPort;
|
|
||||||
authorizedKeys = pkgs.writeTextFile {
|
|
||||||
name = "authorized_keys";
|
|
||||||
text = ssh.publicKeys.yubikey;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
|
||||||
nixpkgs.config.snips-sh.withTensorflow = true;
|
|
||||||
|
|
||||||
systemd.services.snips = {
|
|
||||||
enable = true;
|
|
||||||
description = "Snips pastebin";
|
|
||||||
environment = {
|
|
||||||
SNIPS_HTTP_INTERNAL = "http://[::1]:${toString port}";
|
|
||||||
SNIPS_HTTP_EXTERNAL = "https://${fqdn}";
|
|
||||||
SNIPS_SSH_INTERNAL = "ssh://[::0]:${toString sshPort}";
|
|
||||||
SNIPS_SSH_EXTERNAL = "ssh://${fqdn}:${toString sshPort}";
|
|
||||||
SNIPS_HOST_KEY_PATH = "/var/lib/snips/keys/snips";
|
|
||||||
SNIPS_DB_FILEPATH = "/var/lib/snips/snips.db";
|
|
||||||
SNIPS_SSH_AUTHORIZEDKEYSPATH = authorizedKeys;
|
|
||||||
};
|
|
||||||
serviceConfig = {
|
|
||||||
EnvironmentFile = "/var/secrets/snips.env";
|
|
||||||
StateDirectory = "snips";
|
|
||||||
ExecStart = "${pkgs.snips-sh}/bin/snips.sh";
|
|
||||||
WorkingDirectory = "/var/lib/snips";
|
|
||||||
ConfigurationDirectory = "snips";
|
|
||||||
DynamicUser = true;
|
|
||||||
};
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
confinement = {
|
|
||||||
enable = true;
|
|
||||||
packages = [ authorizedKeys ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
modules.webserver.vHosts.${fqdn}.locations."/".proxyPort = port;
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ sshPort ];
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user