about summary refs log tree commit diff
path: root/irc.nix
blob: 671b8725675a9d7a76d2e426d798be7d336aeee3 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
# IRC services
# Copyright (C) 2023  Nguyễn Gia Phong
#
# This file is part of loang configuration.
#
# Loang configuration is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published
# by the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Loang configuration is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with loang configuration.  If not, see <https://www.gnu.org/licenses/>.

{ config, pkgs, ... }:
let
  inherit (config.networking) domain;
  cert = config.security.acme.certs.${domain};
in {
  environment.systemPackages = [ (pkgs.writeTextFile rec {
    name = "sojupw";
    text = let htpasswd = "${pkgs.apacheHttpd}/bin/htpasswd";
    in ''
      #!/bin/sh
      set -e
      printf 'soju password: '
      read -rs password
      printf '\nretype soju password: '
      read -rs confirmation

      file=$(mktemp)
      trap 'rm $file' EXIT
      ${htpasswd} -bBC 10 $file "" $password 2> /dev/null
      if ${htpasswd} -bv $file "" $confirmation 2> /dev/null
      then
        printf '\nbcrypt: '
        cat $file | tr -d ':\n'
        echo
        exit 0
      else
        printf '\nsorry, passwords do not match\n'
        exit 1
      fi
    '';
    executable = true;
    destination = "/bin/${name}";
  }) ];

  networking.firewall.allowedTCPPorts = [ 6697 ];

  services = {
    postgresql = {
      ensureDatabases = [ "soju" ];
      ensureUsers = [ {
        name = "soju";
        ensurePermissions."DATABASE soju" = "ALL PRIVILEGES";
      } ];
    };

    soju = {
      enable = true;
      extraConfig = ''
        db postgres "host=/run/postgresql dbname=soju"
      '';
      hostName = domain;
      tlsCertificate = "${cert.directory}/cert.pem";
      tlsCertificateKey = "${cert.directory}/key.pem";
    };
  };

  systemd.services.soju.serviceConfig.SupplementaryGroups = [ cert.group ];
}