mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-04 21:03:15 +00:00
fc614c37c6
most modules can be evaluated for their documentation in a very restricted environment that doesn't include all of nixpkgs. this evaluation can then be cached and reused for subsequent builds, merging only documentation that has changed into the cached set. since nixos ships with a large number of modules of which only a few are used in any given config this can save evaluation a huge percentage of nixos options available in any given config. in tests of this caching, despite having to copy most of nixos/, saves about 80% of the time needed to build the system manual, or about two second on the machine used for testing. build time for a full system config shrank from 9.4s to 7.4s, while turning documentation off entirely shortened the build to 7.1s.
233 lines
8.1 KiB
Nix
233 lines
8.1 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.matrix-appservice-irc;
|
|
|
|
pkg = pkgs.matrix-appservice-irc;
|
|
bin = "${pkg}/bin/matrix-appservice-irc";
|
|
|
|
jsonType = (pkgs.formats.json {}).type;
|
|
|
|
configFile = pkgs.runCommand "matrix-appservice-irc.yml" {
|
|
# Because this program will be run at build time, we need `nativeBuildInputs`
|
|
nativeBuildInputs = [ (pkgs.python3.withPackages (ps: [ ps.pyyaml ps.jsonschema ])) ];
|
|
preferLocalBuild = true;
|
|
|
|
config = builtins.toJSON cfg.settings;
|
|
passAsFile = [ "config" ];
|
|
} ''
|
|
# The schema is given as yaml, we need to convert it to json
|
|
python -c 'import json; import yaml; import sys; json.dump(yaml.safe_load(sys.stdin), sys.stdout)' \
|
|
< ${pkg}/lib/node_modules/matrix-appservice-irc/config.schema.yml \
|
|
> config.schema.json
|
|
python -m jsonschema config.schema.json -i $configPath
|
|
cp "$configPath" "$out"
|
|
'';
|
|
registrationFile = "/var/lib/matrix-appservice-irc/registration.yml";
|
|
in {
|
|
options.services.matrix-appservice-irc = with types; {
|
|
enable = mkEnableOption "the Matrix/IRC bridge";
|
|
|
|
port = mkOption {
|
|
type = port;
|
|
description = "The port to listen on";
|
|
default = 8009;
|
|
};
|
|
|
|
needBindingCap = mkOption {
|
|
type = bool;
|
|
description = "Whether the daemon needs to bind to ports below 1024 (e.g. for the ident service)";
|
|
default = false;
|
|
};
|
|
|
|
passwordEncryptionKeyLength = mkOption {
|
|
type = ints.unsigned;
|
|
description = "Length of the key to encrypt IRC passwords with";
|
|
default = 4096;
|
|
example = 8192;
|
|
};
|
|
|
|
registrationUrl = mkOption {
|
|
type = str;
|
|
description = ''
|
|
The URL where the application service is listening for homeserver requests,
|
|
from the Matrix homeserver perspective.
|
|
'';
|
|
example = "http://localhost:8009";
|
|
};
|
|
|
|
localpart = mkOption {
|
|
type = str;
|
|
description = "The user_id localpart to assign to the appservice";
|
|
default = "appservice-irc";
|
|
};
|
|
|
|
settings = mkOption {
|
|
description = ''
|
|
Configuration for the appservice, see
|
|
<link xlink:href="https://github.com/matrix-org/matrix-appservice-irc/blob/${pkgs.matrix-appservice-irc.version}/config.sample.yaml"/>
|
|
for supported values
|
|
'';
|
|
default = {};
|
|
type = submodule {
|
|
freeformType = jsonType;
|
|
|
|
options = {
|
|
homeserver = mkOption {
|
|
description = "Homeserver configuration";
|
|
default = {};
|
|
type = submodule {
|
|
freeformType = jsonType;
|
|
|
|
options = {
|
|
url = mkOption {
|
|
type = str;
|
|
description = "The URL to the home server for client-server API calls";
|
|
};
|
|
|
|
domain = mkOption {
|
|
type = str;
|
|
description = ''
|
|
The 'domain' part for user IDs on this home server. Usually
|
|
(but not always) is the "domain name" part of the homeserver URL.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
database = mkOption {
|
|
default = {};
|
|
description = "Configuration for the database";
|
|
type = submodule {
|
|
freeformType = jsonType;
|
|
|
|
options = {
|
|
engine = mkOption {
|
|
type = str;
|
|
description = "Which database engine to use";
|
|
default = "nedb";
|
|
example = "postgres";
|
|
};
|
|
|
|
connectionString = mkOption {
|
|
type = str;
|
|
description = "The database connection string";
|
|
default = "nedb://var/lib/matrix-appservice-irc/data";
|
|
example = "postgres://username:password@host:port/databasename";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
ircService = mkOption {
|
|
default = {};
|
|
description = "IRC bridge configuration";
|
|
type = submodule {
|
|
freeformType = jsonType;
|
|
|
|
options = {
|
|
passwordEncryptionKeyPath = mkOption {
|
|
type = str;
|
|
description = ''
|
|
Location of the key with which IRC passwords are encrypted
|
|
for storage. Will be generated on first run if not present.
|
|
'';
|
|
default = "/var/lib/matrix-appservice-irc/passkey.pem";
|
|
};
|
|
|
|
servers = mkOption {
|
|
type = submodule { freeformType = jsonType; };
|
|
description = "IRC servers to connect to";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
config = mkIf cfg.enable {
|
|
systemd.services.matrix-appservice-irc = {
|
|
description = "Matrix-IRC bridge";
|
|
before = [ "matrix-synapse.service" ]; # So the registration can be used by Synapse
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
preStart = ''
|
|
umask 077
|
|
# Generate key for crypting passwords
|
|
if ! [ -f "${cfg.settings.ircService.passwordEncryptionKeyPath}" ]; then
|
|
${pkgs.openssl}/bin/openssl genpkey \
|
|
-out "${cfg.settings.ircService.passwordEncryptionKeyPath}" \
|
|
-outform PEM \
|
|
-algorithm RSA \
|
|
-pkeyopt "rsa_keygen_bits:${toString cfg.passwordEncryptionKeyLength}"
|
|
fi
|
|
# Generate registration file
|
|
if ! [ -f "${registrationFile}" ]; then
|
|
# The easy case: the file has not been generated yet
|
|
${bin} --generate-registration --file ${registrationFile} --config ${configFile} --url ${cfg.registrationUrl} --localpart ${cfg.localpart}
|
|
else
|
|
# The tricky case: we already have a generation file. Because the NixOS configuration might have changed, we need to
|
|
# regenerate it. But this would give the service a new random ID and tokens, so we need to back up and restore them.
|
|
# 1. Backup
|
|
id=$(grep "^id:.*$" ${registrationFile})
|
|
hs_token=$(grep "^hs_token:.*$" ${registrationFile})
|
|
as_token=$(grep "^as_token:.*$" ${registrationFile})
|
|
# 2. Regenerate
|
|
${bin} --generate-registration --file ${registrationFile} --config ${configFile} --url ${cfg.registrationUrl} --localpart ${cfg.localpart}
|
|
# 3. Restore
|
|
sed -i "s/^id:.*$/$id/g" ${registrationFile}
|
|
sed -i "s/^hs_token:.*$/$hs_token/g" ${registrationFile}
|
|
sed -i "s/^as_token:.*$/$as_token/g" ${registrationFile}
|
|
fi
|
|
# Allow synapse access to the registration
|
|
if ${getBin pkgs.glibc}/bin/getent group matrix-synapse > /dev/null; then
|
|
chgrp matrix-synapse ${registrationFile}
|
|
chmod g+r ${registrationFile}
|
|
fi
|
|
'';
|
|
|
|
serviceConfig = rec {
|
|
Type = "simple";
|
|
ExecStart = "${bin} --config ${configFile} --file ${registrationFile} --port ${toString cfg.port}";
|
|
|
|
ProtectHome = true;
|
|
PrivateDevices = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectKernelModules = true;
|
|
ProtectControlGroups = true;
|
|
StateDirectory = "matrix-appservice-irc";
|
|
StateDirectoryMode = "755";
|
|
|
|
User = "matrix-appservice-irc";
|
|
Group = "matrix-appservice-irc";
|
|
|
|
CapabilityBoundingSet = [ "CAP_CHOWN" ] ++ optional (cfg.needBindingCap) "CAP_NET_BIND_SERVICE";
|
|
AmbientCapabilities = CapabilityBoundingSet;
|
|
NoNewPrivileges = true;
|
|
|
|
LockPersonality = true;
|
|
RestrictRealtime = true;
|
|
PrivateMounts = true;
|
|
SystemCallFilter = "~@aio @clock @cpu-emulation @debug @keyring @memlock @module @mount @obsolete @raw-io @setuid @swap";
|
|
SystemCallArchitectures = "native";
|
|
# AF_UNIX is required to connect to a postgres socket.
|
|
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
|
};
|
|
};
|
|
|
|
users.groups.matrix-appservice-irc = {};
|
|
users.users.matrix-appservice-irc = {
|
|
description = "Service user for the Matrix-IRC bridge";
|
|
group = "matrix-appservice-irc";
|
|
isSystemUser = true;
|
|
};
|
|
};
|
|
|
|
# uses attributes of the linked package
|
|
meta.buildDocsInSandbox = false;
|
|
}
|