mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-30 19:02:57 +00:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
94 lines
3.0 KiB
Nix
94 lines
3.0 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
cfg = config.services.microbin;
|
|
in
|
|
{
|
|
options.services.microbin = {
|
|
enable = lib.mkEnableOption "MicroBin is a super tiny, feature rich, configurable paste bin web application";
|
|
|
|
package = lib.mkPackageOption pkgs "microbin" { };
|
|
|
|
settings = lib.mkOption {
|
|
type = lib.types.submodule { freeformType = with lib.types; attrsOf (oneOf [ bool int str ]); };
|
|
default = { };
|
|
example = {
|
|
MICROBIN_PORT = 8080;
|
|
MICROBIN_HIDE_LOGO = false;
|
|
};
|
|
description = ''
|
|
Additional configuration for MicroBin, see
|
|
<https://microbin.eu/docs/installation-and-configuration/configuration/>
|
|
for supported values.
|
|
|
|
For secrets use passwordFile option instead.
|
|
'';
|
|
};
|
|
|
|
dataDir = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "/var/lib/microbin";
|
|
description = "Default data folder for MicroBin.";
|
|
};
|
|
|
|
passwordFile = lib.mkOption {
|
|
type = lib.types.nullOr lib.types.path;
|
|
default = null;
|
|
example = "/run/secrets/microbin.env";
|
|
description = ''
|
|
Path to file containing environment variables.
|
|
Useful for passing down secrets.
|
|
Variables that can be considered secrets are:
|
|
- MICROBIN_BASIC_AUTH_USERNAME
|
|
- MICROBIN_BASIC_AUTH_PASSWORD
|
|
- MICROBIN_ADMIN_USERNAME
|
|
- MICROBIN_ADMIN_PASSWORD
|
|
- MICROBIN_UPLOADER_PASSWORD
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
services.microbin.settings = with lib; {
|
|
MICROBIN_BIND = mkDefault "0.0.0.0";
|
|
MICROBIN_DISABLE_TELEMETRY = mkDefault true;
|
|
MICROBIN_LIST_SERVER = mkDefault false;
|
|
MICROBIN_PORT = mkDefault "8080";
|
|
};
|
|
|
|
systemd.services.microbin = {
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
environment = lib.mapAttrs (_: v: if lib.isBool v then lib.boolToString v else toString v) cfg.settings;
|
|
serviceConfig = {
|
|
CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ];
|
|
DevicePolicy = "closed";
|
|
DynamicUser = true;
|
|
EnvironmentFile = lib.optional (cfg.passwordFile != null) cfg.passwordFile;
|
|
ExecStart = "${cfg.package}/bin/microbin";
|
|
LockPersonality = true;
|
|
MemoryDenyWriteExecute = true;
|
|
PrivateDevices = true;
|
|
PrivateUsers = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectProc = "invisible";
|
|
ReadWritePaths = cfg.dataDir;
|
|
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
StateDirectory = "microbin";
|
|
SystemCallArchitectures = [ "native" ];
|
|
SystemCallFilter = [ "@system-service" ];
|
|
WorkingDirectory = cfg.dataDir;
|
|
};
|
|
};
|
|
};
|
|
|
|
meta.maintainers = with lib.maintainers; [ surfaceflinger ];
|
|
}
|