This deploys irccat, connected to the #snix channel. We drop the custom irccat third_party, it's 2 years older than the latest version in nixpkgs. The irccat.nix module file contains some of the code present in the TVL version, it however moves the secrets merging to ExecStartPre=, given https://github.com/systemd/systemd/issues/19604#issuecomment-989279884 has been fixed for almost a year. Contrary to the setup there, we don't let irccat connect to ZNC, but hackint directly (so make use of the secrets logic). We also drop the network-online.target, and make this overall more tolerant by using Restart=on-failure. Change-Id: Ieac3b744b7ea58b8dddf1cdc37a8bc057b205b1b Reviewed-on: https://cl.snix.dev/c/snix/+/30504 Autosubmit: Florian Klink <flokli@flokli.de> Reviewed-by: Ryan Lahfa <ryan@lahfa.xyz> Tested-by: besadii
		
			
				
	
	
		
			60 lines
		
	
	
	
		
			1.8 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			60 lines
		
	
	
	
		
			1.8 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, pkgs, ... }:
 | |
| 
 | |
| let
 | |
|   cfg = config.services.irccat;
 | |
|   description = "irccat - forward messages to IRC";
 | |
| 
 | |
|   # irccat expects to read its configuration from the *current
 | |
|   # directory*, and its configuration contains secrets.
 | |
|   #
 | |
|   # To make this work we construct the JSON configuration file and
 | |
|   # then recursively merge it with an on-disk secret using jq on
 | |
|   # service launch.
 | |
|   configJson = pkgs.writeText "irccat.json" (builtins.toJSON cfg.config);
 | |
| in
 | |
| {
 | |
|   options.services.irccat = {
 | |
|     enable = lib.mkEnableOption description;
 | |
| 
 | |
|     config = lib.mkOption {
 | |
|       type = lib.types.attrsOf lib.types.anything; # varying value types
 | |
|       description = "Configuration structure (unchecked!)";
 | |
|     };
 | |
| 
 | |
|     secretsFile = lib.mkOption {
 | |
|       type = lib.types.str;
 | |
|       description = "Path to the secrets file to be merged";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = lib.mkIf cfg.enable {
 | |
|     systemd.services.irccat = {
 | |
|       inherit description;
 | |
|       wantedBy = [ "multi-user.target" ];
 | |
|       after = [ "network.target" ];
 | |
|       wants = [ "network.target" ];
 | |
| 
 | |
|       serviceConfig = {
 | |
|         ExecStartPre = (pkgs.writeShellScript "merge-irccat-config" ''
 | |
|           if [ ! -f "$CREDENTIALS_DIRECTORY/secrets" ]; then
 | |
|             echo "irccat secrets file is missing"
 | |
|             exit 1
 | |
|           fi
 | |
| 
 | |
|           # jq's * is the recursive merge operator
 | |
|           ${pkgs.jq}/bin/jq -s '.[0] * .[1]' ${configJson} "$CREDENTIALS_DIRECTORY/secrets" \
 | |
|             > /var/lib/irccat/irccat.json
 | |
|         '');
 | |
| 
 | |
|         ExecStart = "${pkgs.irccat}/bin/irccat";
 | |
|         DynamicUser = true;
 | |
|         StateDirectory = "irccat";
 | |
|         WorkingDirectory = "/var/lib/irccat";
 | |
|         LoadCredential = "secrets:${cfg.secretsFile}";
 | |
|         Restart = "on-failure";
 | |
|         RestartSec = "5s";
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| }
 | |
| 
 |