about summary refs log tree commit diff
path: root/irc.nix
diff options
context:
space:
mode:
authorNguyễn Gia Phong <mcsinyx@disroot.org>2023-02-21 07:00:38 +0900
committerNguyễn Gia Phong <mcsinyx@disroot.org>2023-02-21 07:01:00 +0900
commitac30f18118da23914a6f88134f39f2199d6213bb (patch)
tree76bb0d20f48ec5b42ebfe02d9adfd503e52b30e9 /irc.nix
parent2ce14f17f2700f3188e3467d35fa218c018e9c73 (diff)
downloadnixos-conf-ac30f18118da23914a6f88134f39f2199d6213bb.tar.gz
Enable 소주
Diffstat (limited to 'irc.nix')
-rw-r--r--irc.nix48
1 files changed, 48 insertions, 0 deletions
diff --git a/irc.nix b/irc.nix
new file mode 100644
index 0000000..e8592c9
--- /dev/null
+++ b/irc.nix
@@ -0,0 +1,48 @@
+# IRC services
+# Copyright (C) 2023  Nguyễn Gia Phong
+#
+# This file is part of loang configuration.
+#
+# Loang configuration is free software: you can redistribute it and/or modify
+# it under the terms of the GNU Affero General Public License as published
+# by the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Loang configuration is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU Affero General Public License for more details.
+#
+# You should have received a copy of the GNU Affero General Public License
+# along with loang configuration.  If not, see <https://www.gnu.org/licenses/>.
+
+{ config, pkgs, ... }:
+let
+  inherit (config.networking) domain;
+  cert = config.security.acme.certs.${domain};
+  port = 6697;
+in {
+  environment.systemPackages = [ (pkgs.writeTextFile rec {
+    name = "sojupw";
+    text = ''
+      #!/bin/sh
+      read password
+      ${pkgs.apacheHttpd}/bin/htpasswd -bnBC 10 "" $password | tr -d ':\n'
+      echo
+    '';
+    executable = true;
+    destination = "/bin/${name}";
+  }) ];
+
+  networking.firewall.allowedTCPPorts = [ 6697 ];
+  services = {
+    soju = {
+      enable = true;
+      hostName = domain;
+      tlsCertificate = "${cert.directory}/cert.pem";
+      tlsCertificateKey = "${cert.directory}/key.pem";
+    };
+  };
+
+  systemd.services.soju.serviceConfig.SupplementaryGroups = [ cert.group ];
+}