nixpkgs-suyu/nixos/modules/services/editors/haste.nix
2022-03-07 23:38:23 +01:00

86 lines
2 KiB
Nix

{ config, lib, pkgs, ... }:
with lib;
let
pkg = pkgs.haste-server;
cfg = config.services.haste-server;
format = pkgs.formats.json {};
in
{
options.services.haste-server = {
enable = mkEnableOption "haste-server";
openFirewall = mkEnableOption "firewall passthrough for haste-server";
settings = mkOption {
description = ''
Configuration for haste-server.
For documentation see <link xlink:href="https://github.com/toptal/haste-server#settings">project readme</link>
'';
type = format.type;
};
};
config = mkIf (cfg.enable) {
networking.firewall.allowedTCPPorts = mkIf (cfg.openFirewall) [ cfg.settings.port ];
services.haste-server = {
settings = {
host = mkDefault "::";
port = mkDefault 7777;
keyLength = mkDefault 10;
maxLength = mkDefault 400000;
staticMaxAge = mkDefault 86400;
recompressStaticAssets = mkDefault false;
logging = mkDefault [
{
level = "verbose";
type = "Console";
colorize = true;
}
];
keyGenerator = mkDefault {
type = "phonetic";
};
rateLimits = {
categories = {
normal = {
totalRequests = mkDefault 500;
every = mkDefault 60000;
};
};
};
storage = mkDefault {
type = "file";
};
documents = {
about = mkDefault "${pkg}/share/haste-server/about.md";
};
};
};
systemd.services.haste-server = {
wantedBy = [ "multi-user.target" ];
requires = [ "network.target" ];
after = [ "network.target" ];
serviceConfig = {
User = "haste-server";
DynamicUser = true;
StateDirectory = "haste-server";
WorkingDirectory = "/var/lib/haste-server";
ExecStart = "${pkg}/bin/haste-server ${format.generate "config.json" cfg.settings}";
};
path = with pkgs; [ pkg coreutils ];
};
};
}