flake/hosts/vultr/sin0/services/ip-checker.nix

73 lines
1.9 KiB
Nix
Raw Normal View History

2024-10-19 04:54:55 +00:00
{
lib,
pkgs,
inputs,
2024-10-19 05:00:06 +00:00
ports,
2024-10-19 04:54:55 +00:00
...
}:
let
2024-10-19 05:00:06 +00:00
port = ports.ip-checker;
2024-10-19 04:54:55 +00:00
in
{
systemd.services."ip-checker" = {
wantedBy = [ "multi-user.target" ];
2024-10-19 09:30:29 +00:00
environment = {
IP_CHECKER_LISTEN = "127.0.0.1:${toString port}";
2024-10-25 13:50:23 +00:00
IP_CHECKER_MODE = "prod";
IP_CHECKER_ASN_DB = pkgs.dbip-asn-lite.mmdb;
IP_CHECKER_CITY_DB = pkgs.dbip-city-lite.mmdb;
2024-10-19 09:30:29 +00:00
};
2024-10-19 04:54:55 +00:00
serviceConfig = {
ExecStart = lib.getExe inputs.ip-checker.packages.${pkgs.stdenv.hostPlatform.system}.default;
CapabilityBoundingSet = "";
DynamicUser = true;
LockPersonality = true;
MemoryDenyWriteExecute = true;
NoNewPrivileges = true;
PrivateDevices = true;
PrivateUsers = true;
ProcSubset = "pid";
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectProc = "invisible";
ProtectSystem = "strict";
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
SystemCallArchitectures = "native";
SystemCallErrorNumber = "EPERM";
SystemCallFilter = "@system-service";
UMask = "0077";
};
};
services.caddy.settings.apps.http.servers.srv0.routes = lib.singleton {
match = lib.singleton { host = [ "ip.ny4.dev" ]; };
handle = lib.singleton {
2024-10-25 13:50:23 +00:00
handler = "subroute";
routes = [
# TODO: make `curl ip.ny4.dev` work
{
match = [ { path = [ "/api/v1/*" ]; } ];
handle = lib.singleton {
handler = "reverse_proxy";
upstreams = lib.singleton { dial = "127.0.0.1:${toString port}"; };
};
}
{
handle = lib.singleton {
handler = "file_server";
root = "${inputs.ip-checker}/ui";
};
}
];
2024-10-19 04:54:55 +00:00
};
};
}