174 lines
6.9 KiB
Nix
174 lines
6.9 KiB
Nix
# docs:
|
|
# - <repo:LemmyNet/lemmy:docker/federation/nginx.conf>
|
|
# - <repo:LemmyNet/lemmy:docker/nginx.conf>
|
|
# - <repo:LemmyNet/lemmy-ansible:templates/nginx.conf>
|
|
|
|
{ lib, pkgs, ... }:
|
|
let
|
|
uiPort = 1234; # default ui port is 1234
|
|
backendPort = 8536; # default backend port is 8536
|
|
#^ i guess the "backend" port is used for federation?
|
|
pict-rs = pkgs.pict-rs;
|
|
# pict-rs configuration is applied in this order:
|
|
# - via toml
|
|
# - via env vars (overrides everything above)
|
|
# - via CLI flags (overrides everything above)
|
|
# some of the CLI flags have defaults, making it the only actual way to configure certain things even when docs claim otherwise.
|
|
# CLI args: <https://git.asonix.dog/asonix/pict-rs#user-content-running>
|
|
# TOML args: <https://git.asonix.dog/asonix/pict-rs/src/branch/main/pict-rs.toml>
|
|
toml = pkgs.formats.toml { };
|
|
tomlConfig = toml.generate "pict-rs.toml" pictrsConfig;
|
|
pictrsConfig = {
|
|
media.process_timeout = 120;
|
|
media.video.allow_audio = true;
|
|
media.video.max_frame_count = 30 * 60 * 60;
|
|
};
|
|
in {
|
|
services.lemmy = {
|
|
enable = true;
|
|
settings.hostname = "lemmy.uninsane.org";
|
|
# federation.debug forces outbound federation queries to be run synchronously
|
|
# N.B.: this option might not be read for 0.17.0+? <https://github.com/LemmyNet/lemmy/blob/c32585b03429f0f76d1e4ff738786321a0a9df98/RELEASES.md#upgrade-instructions>
|
|
# settings.federation.debug = true;
|
|
settings.port = backendPort;
|
|
ui.port = uiPort;
|
|
database.createLocally = true;
|
|
nginx.enable = true;
|
|
};
|
|
|
|
systemd.services.lemmy.environment = {
|
|
RUST_BACKTRACE = "full";
|
|
RUST_LOG = "error";
|
|
# RUST_LOG = "warn";
|
|
# RUST_LOG = "debug";
|
|
# RUST_LOG = "trace";
|
|
# upstream defaults LEMMY_DATABASE_URL = "postgres:///lemmy?host=/run/postgresql";
|
|
# - Postgres complains that we didn't specify a user
|
|
# lemmy formats the url as:
|
|
# - postgres://{user}:{password}@{host}:{port}/{database}
|
|
# SO suggests (https://stackoverflow.com/questions/3582552/what-is-the-format-for-the-postgresql-connection-string-url):
|
|
# - postgresql://[user[:password]@][netloc][:port][/dbname][?param1=value1&...]
|
|
# LEMMY_DATABASE_URL = "postgres://lemmy@/run/postgresql"; # connection to server on socket "/run/postgresql/.s.PGSQL.5432" failed: FATAL: database "run/postgresql" does not exist
|
|
# LEMMY_DATABASE_URL = "postgres://lemmy?host=/run/postgresql"; # no PostgreSQL user name specified in startup packet
|
|
# LEMMY_DATABASE_URL = lib.mkForce "postgres://lemmy@?host=/run/postgresql"; # WORKS
|
|
LEMMY_DATABASE_URL = lib.mkForce "postgres://lemmy@/lemmy?host=/run/postgresql";
|
|
};
|
|
users.groups.lemmy = {};
|
|
users.users.lemmy = {
|
|
group = "lemmy";
|
|
isSystemUser = true;
|
|
};
|
|
|
|
services.nginx.virtualHosts."lemmy.uninsane.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
};
|
|
|
|
sane.dns.zones."uninsane.org".inet.CNAME."lemmy" = "native";
|
|
|
|
systemd.services.lemmy = {
|
|
# fix to use a normal user so we can configure perms correctly
|
|
# XXX(2024-07-28): this hasn't been rigorously tested:
|
|
# possible that i've set something too strict and won't notice right away
|
|
serviceConfig.DynamicUser = lib.mkForce false;
|
|
serviceConfig.User = "lemmy";
|
|
serviceConfig.Group = "lemmy";
|
|
|
|
# hardening (systemd-analyze security lemmy)
|
|
# a handful of these are specified in upstream nixpkgs, but mostly not
|
|
serviceConfig.LockPersonality = true;
|
|
serviceConfig.NoNewPrivileges = true;
|
|
serviceConfig.MemoryDenyWriteExecute = true;
|
|
serviceConfig.PrivateDevices = true;
|
|
serviceConfig.PrivateMounts = true;
|
|
serviceConfig.PrivateTmp = true;
|
|
serviceConfig.PrivateUsers = true;
|
|
serviceConfig.ProcSubset = "pid";
|
|
|
|
serviceConfig.ProtectClock = true;
|
|
serviceConfig.ProtectControlGroups = true;
|
|
serviceConfig.ProtectHome = true;
|
|
serviceConfig.ProtectHostname = true;
|
|
serviceConfig.ProtectKernelLogs = true;
|
|
serviceConfig.ProtectKernelModules = true;
|
|
serviceConfig.ProtectKernelTunables = true;
|
|
serviceConfig.ProtectProc = "invisible";
|
|
serviceConfig.ProtectSystem = "strict";
|
|
serviceConfig.RemoveIPC = true;
|
|
serviceConfig.RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
|
|
|
serviceConfig.RestrictNamespaces = true;
|
|
serviceConfig.RestrictSUIDSGID = true;
|
|
serviceConfig.SystemCallArchitectures = "native";
|
|
serviceConfig.SystemCallFilter = [ "@system-service" ];
|
|
};
|
|
|
|
systemd.services.lemmy-ui = {
|
|
# hardening (systemd-analyze security lemmy-ui)
|
|
# TODO: upstream into nixpkgs
|
|
serviceConfig.LockPersonality = true;
|
|
serviceConfig.NoNewPrivileges = true;
|
|
# serviceConfig.MemoryDenyWriteExecute = true; #< it uses v8, JIT
|
|
serviceConfig.PrivateDevices = true;
|
|
serviceConfig.PrivateMounts = true;
|
|
serviceConfig.PrivateTmp = true;
|
|
serviceConfig.PrivateUsers = true;
|
|
serviceConfig.ProcSubset = "pid";
|
|
|
|
serviceConfig.ProtectClock = true;
|
|
serviceConfig.ProtectControlGroups = true;
|
|
serviceConfig.ProtectHome = true;
|
|
serviceConfig.ProtectHostname = true;
|
|
serviceConfig.ProtectKernelLogs = true;
|
|
serviceConfig.ProtectKernelModules = true;
|
|
serviceConfig.ProtectKernelTunables = true;
|
|
serviceConfig.ProtectProc = "invisible";
|
|
serviceConfig.ProtectSystem = "strict";
|
|
serviceConfig.RemoveIPC = true;
|
|
serviceConfig.RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
|
|
|
serviceConfig.RestrictNamespaces = true;
|
|
serviceConfig.RestrictSUIDSGID = true;
|
|
serviceConfig.SystemCallArchitectures = "native";
|
|
serviceConfig.SystemCallFilter = [ "@system-service" "@pkey" "@sandbox" ];
|
|
};
|
|
|
|
#v DO NOT REMOVE: defaults to 0.3, instead of latest, so always need to explicitly set this.
|
|
services.pict-rs.package = pict-rs;
|
|
|
|
systemd.services.pict-rs = {
|
|
serviceConfig.ExecStart = lib.mkForce (lib.concatStringsSep " " [
|
|
(lib.getExe pict-rs)
|
|
"--config-file"
|
|
tomlConfig
|
|
"run"
|
|
]);
|
|
|
|
# hardening (systemd-analyze security pict-rs)
|
|
# TODO: upstream into nixpkgs
|
|
serviceConfig.LockPersonality = true;
|
|
serviceConfig.NoNewPrivileges = true;
|
|
serviceConfig.MemoryDenyWriteExecute = true;
|
|
serviceConfig.PrivateDevices = true;
|
|
serviceConfig.PrivateMounts = true;
|
|
serviceConfig.PrivateTmp = true;
|
|
serviceConfig.PrivateUsers = true;
|
|
serviceConfig.ProcSubset = "pid";
|
|
serviceConfig.ProtectClock = true;
|
|
serviceConfig.ProtectControlGroups = true;
|
|
serviceConfig.ProtectHome = true;
|
|
serviceConfig.ProtectHostname = true;
|
|
serviceConfig.ProtectKernelLogs = true;
|
|
serviceConfig.ProtectKernelModules = true;
|
|
serviceConfig.ProtectKernelTunables = true;
|
|
serviceConfig.ProtectProc = "invisible";
|
|
serviceConfig.ProtectSystem = "strict";
|
|
serviceConfig.RemoveIPC = true;
|
|
serviceConfig.RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
|
serviceConfig.RestrictNamespaces = true;
|
|
serviceConfig.RestrictSUIDSGID = true;
|
|
serviceConfig.SystemCallArchitectures = "native";
|
|
serviceConfig.SystemCallFilter = [ "@system-service" ];
|
|
};
|
|
}
|