mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-rest-api.git
synced 2024-11-22 12:11:26 +00:00
166 lines
4.6 KiB
Nix
166 lines
4.6 KiB
Nix
|
{ pkgs, config, ... }:
|
||
|
{
|
||
|
nixpkgs.overlays = [(self: super: {
|
||
|
updateScript = pkgs.writeScriptBin "updateScript" ''
|
||
|
#!${pkgs.stdenv.shell}
|
||
|
|
||
|
/run/wrappers/bin/sudo ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch --upgrade
|
||
|
'';
|
||
|
|
||
|
rollbackScript = pkgs.writeScriptBin "rollbackScript" ''
|
||
|
#!${pkgs.stdenv.shell}
|
||
|
|
||
|
/run/wrappers/bin/sudo ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch --rollback
|
||
|
'';
|
||
|
|
||
|
applyConfigScript = pkgs.writeScriptBin "applyConfigScript" ''
|
||
|
#!${pkgs.stdenv.shell}
|
||
|
|
||
|
/run/wrappers/bin/sudo ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch
|
||
|
'';
|
||
|
|
||
|
setupConfigsScript = pkgs.writeScriptBin "setupConfigsScript" ''
|
||
|
#!${pkgs.stdenv.shell}
|
||
|
export DOMAIN=$1
|
||
|
export USER=$2
|
||
|
export PASSWORD=$3
|
||
|
|
||
|
${pkgs.wget}/bin/wget https://bitbucket.org/ilchub/serverdata/raw/b297b4026794c5420da97d7d06a393a5bf7e0819/configuration.nix
|
||
|
${pkgs.wget}/bin/wget https://bitbucket.org/ilchub/serverdata/raw/b297b4026794c5420da97d7d06a393a5bf7e0819/mailserver.nix
|
||
|
${pkgs.wget}/bin/wget https://bitbucket.org/ilchub/serverdata/raw/b297b4026794c5420da97d7d06a393a5bf7e0819/restic.nix
|
||
|
|
||
|
sed -i '17s/.*/ fqdn = "'"$DOMAIN"'";/' mailserver.nix
|
||
|
sed -i '18s/.*/ domains = [ "'"$DOMAIN"'" ];/' mailserver.nix
|
||
|
sed -i '23s/.*/\t"'"$USER"'@'"$DOMAIN"'" = {/' mailserver.nix
|
||
|
sed -i "24s,.*,\t\ hashedPassword = \"$PASSWORD\";," mailserver.nix
|
||
|
sed -i '33s/.*/\t\t"'"$DOMAIN"'"/' mailserver.nix
|
||
|
sed -i '50s/.*/\t "admin@'"$DOMAIN"'" = "'"$USER"'@'"$DOMAIN"'";/' mailserver.nix
|
||
|
sed -i '72s/.*/ email = "'"$USER"'@'"$DOMAIN"'";/' mailserver.nix
|
||
|
|
||
|
# System Configuration
|
||
|
sed -i "16s,.*,\t\"$sshKey\"," configuration.nix
|
||
|
|
||
|
# Restic
|
||
|
#sed -i '14s/.*/\t\tEnvironment = [ "AWS_ACCESS_KEY_ID='"$AWS_TOKEN_ID"'" "AWS_SECRET_ACCESS_KEY='"$AWS_TOKEN"'" ];/' restic.nix
|
||
|
#sed -i "17s,.*,\t restic -r s3:s3.amazonaws.com/$AWS_BUCKET_NAME backup /var/vmail /var/vmail ," restic.nix
|
||
|
|
||
|
#FIXME: Give access to system environment
|
||
|
#cp configuration.nix /etc/nixos/configuration.nix
|
||
|
#cp mailserver.nix /etc/nixos/mailserver.nix
|
||
|
#cp restic.nix /etc/nixos/restic.nix
|
||
|
|
||
|
#rm configuration.nix
|
||
|
#rm mailserver.nix
|
||
|
#rm restic.nix
|
||
|
|
||
|
/run/wrappers/bin/sudo ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch
|
||
|
'';
|
||
|
|
||
|
getDKIMScript = pkgs.writeScriptBin "getDKIMScript" ''
|
||
|
#!${pkgs.stdenv.shell}
|
||
|
|
||
|
export dkim=$( cat "$1".selector.txt )
|
||
|
'';
|
||
|
})];
|
||
|
|
||
|
environment.etc."webhook.conf".text = ''
|
||
|
[
|
||
|
{
|
||
|
"id": "update",
|
||
|
"execute-command": "${pkgs.updateScript}/bin/updateScript",
|
||
|
"command-working-directory": "/tmp",
|
||
|
"response-message": "Updating system..."
|
||
|
},
|
||
|
|
||
|
{
|
||
|
"id": "rollback",
|
||
|
"execute-command": "${pkgs.rollbackScript}/bin/rollbackScript",
|
||
|
"command-working-directory": "/tmp"
|
||
|
},
|
||
|
|
||
|
{
|
||
|
"id": "apply",
|
||
|
"execute-command": "${pkgs.applyConfigScript}/bin/applyConfigScript",
|
||
|
"command-working-directory": "/tmp"
|
||
|
},
|
||
|
|
||
|
{
|
||
|
"id": "setupConfigs",
|
||
|
"execute-command": "${pkgs.setupConfigsScript}/bin/setupConfigsScript",
|
||
|
"command-working-directory": "/tmp",
|
||
|
"pass-arguments-to-command":
|
||
|
[
|
||
|
{
|
||
|
"source": "header",
|
||
|
"name": "X-Domain"
|
||
|
},
|
||
|
{
|
||
|
"source": "header",
|
||
|
"name": "X-User"
|
||
|
},
|
||
|
{
|
||
|
"source": "header",
|
||
|
"name": "X-Password"
|
||
|
}
|
||
|
],
|
||
|
"trigger-rule":
|
||
|
{
|
||
|
"and":
|
||
|
[
|
||
|
"match":
|
||
|
{
|
||
|
"type": "value",
|
||
|
"value": "eemioqu5ohgu9eif6ahzo0shaiqu0caezaj0feel0quahp5u",
|
||
|
"parameter":
|
||
|
{
|
||
|
"source": "header",
|
||
|
"name": "X-Signature"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
|
||
|
{
|
||
|
"id": "getdkim",
|
||
|
"execute-command": "${getDKIMScript}/bin/getDKIMScript",
|
||
|
"command-working-directory": "/var/dkim",
|
||
|
"pass-arguments-to-command":
|
||
|
[
|
||
|
{
|
||
|
"source": "header",
|
||
|
"name": "X-Domain"
|
||
|
}
|
||
|
],
|
||
|
"response-headers":
|
||
|
[
|
||
|
{
|
||
|
"name": "DKIM-Signature",
|
||
|
"value": "{{ getenv "dkim" }}"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
'';
|
||
|
|
||
|
users.users.webhook = {
|
||
|
isNormalUser = false;
|
||
|
extraGroups = [ "wheel" ];
|
||
|
};
|
||
|
|
||
|
systemd.services.webhook = {
|
||
|
path = with pkgs; [
|
||
|
man
|
||
|
config.nix.package.out
|
||
|
sudo
|
||
|
git
|
||
|
wget
|
||
|
];
|
||
|
enable = true;
|
||
|
serviceConfig = {
|
||
|
User = "webhook";
|
||
|
ExecStart = "${pkgs.webhook}/bin/webhook -hooks /etc/webhook.conf -secure -cert /var/lib/acme/ilchub.net/fullchain.pem -key /var/lib/acme/ilchub.net/key.pem -verbose";
|
||
|
};
|
||
|
};
|
||
|
}
|