Compare commits

..

2 commits

9 changed files with 136 additions and 36 deletions

View file

@ -1,53 +1,69 @@
{ config, pkgs, ... }:
{ config, lib, pkgs, ... }:
{
desu.secrets.arumi-singbox-pk = {};
desu.secrets.arumi-singbox-sid = {};
desu.secrets.arumi-singbox-users = {};
desu.secrets.arumi-singbox-pk.owner = "xray";
desu.secrets.arumi-singbox-sid.owner = "xray";
desu.secrets.arumi-singbox-users.owner = "xray";
services.sing-box = {
users.users.xray = {
isNormalUser = true;
uid = 1102;
};
services.xray = {
enable = true;
settings = {
settingsFile = "/etc/xray/config.json";
};
systemd.tmpfiles.rules = [
"d /etc/xray 0700 1102 1102 -"
];
systemd.services.xray.serviceConfig = {
DynamicUser = lib.mkForce false;
User = "xray";
};
systemd.services.xray.preStart = let
file = "/etc/xray/config.json";
template = pkgs.writeText "config.json" (builtins.toJSON {
log = { level = "info"; timestamp = true; };
inbounds = [
{
type = "vless";
tag = "vless-in";
listen = "::";
listen_port = 443;
sniff = true;
sniff_override_destination = true;
domain_strategy = "ipv4_only";
users = []; # populated later in the preStart script
tls = let server = "updates.cdn-apple.com"; in {
enabled = true;
server_name = server;
reality = {
enabled = true;
handshake = { inherit server; server_port = 443; };
private_key._secret = config.desu.secrets.arumi-singbox-pk.path;
short_id = [
{ _secret = config.desu.secrets.arumi-singbox-sid.path; }
];
port = 443;
protocol = "vless";
settings = {
decryption = "none";
clients = []; # populated later in the preStart script
};
streamSettings = {
network = "tcp";
security = "reality";
realitySettings = {
alpn = [ "h2" ];
target = "updates.cdn-apple.com:443";
serverNames = [ "updates.cdn-apple.com" ];
privateKey = ""; # populated later in the preStart script
shortIds = []; # populated later in the preStart script
};
};
sniffing = {
enabled = true;
destOverride = [ "tls" "http" "quic" ];
routeOnly = true;
};
}
];
outbounds = [
{ type = "direct"; tag = "direct"; }
{ type = "block"; tag = "block"; }
{ protocol = "freedom"; tag = "direct"; }
];
};
};
systemd.services.sing-box.preStart = let
file = "/etc/sing-box/config.json";
});
in ''
users=$(${pkgs.yaml2json}/bin/yaml2json < ${config.desu.secrets.arumi-singbox-users.path})
${pkgs.jq}/bin/jq --arg users "$users" \
'.inbounds[0].users = ($users | fromjson | map({ "uuid": ., "flow": "xtls-rprx-vision" }))' \
${file} > ${file}.tmp
mv ${file}.tmp ${file}
pk=$(cat ${config.desu.secrets.arumi-singbox-pk.path})
sid=$(cat ${config.desu.secrets.arumi-singbox-sid.path})
${pkgs.jq}/bin/jq --arg users "$users" --arg pk "$pk" --arg sid "$sid" \
'.inbounds[0].settings.clients = ($users | fromjson | map({ "id": ., "flow": "xtls-rprx-vision" }))
| .inbounds[0].streamSettings.realitySettings.privateKey = $pk
| .inbounds[0].streamSettings.realitySettings.shortIds = [$sid]' ${template} > ${file}
'';
networking.firewall.allowedTCPPorts = [ 443 ];

View file

@ -41,6 +41,7 @@
./containers/outline
./containers/docmost
./containers/forgejo
./containers/activepieces
./containers/teisu.nix
./containers/bots/pcre-sub-bot.nix
./containers/bots/channel-logger-bot.nix
@ -112,6 +113,8 @@
boot.kernelParams = [ "panic=5" "panic_on_oops=1" "mitigations=off" ];
boot.kernelPackages = pkgs.linuxPackages_latest;
networking.firewall.allowedTCPPorts = [ 25565 ];
services.desu-deploy = {
enable = true;
key = builtins.readFile (abs "ssh/desu-deploy.pub");

View file

@ -0,0 +1,67 @@
{ pkgs, config, ... }:
let
UID = 1127;
context = pkgs.copyPathToStore ./image;
in {
desu.secrets.activepieces-env.owner = "activepieces";
users.users.activepieces = {
isNormalUser = true;
uid = UID;
};
services.postgresql.ensureUsers = [
{ name = "activepieces"; ensureDBOwnership = true; }
];
services.postgresql.ensureDatabases = [ "activepieces" ];
desu.postgresql.ensurePasswords.activepieces = "activepieces";
virtualisation.oci-containers.containers.activepieces-redis = {
image = "docker.io/redis:7.0-alpine";
user = builtins.toString UID;
extraOptions = [
"--mount=type=bind,source=/srv/activepieces/redis,target=/data"
];
};
systemd.tmpfiles.rules = [
"d /srv/activepieces/redis 0700 ${builtins.toString UID} ${builtins.toString UID} -"
];
systemd.services.docker-activepieces.serviceConfig.ExecStartPre = [
(pkgs.writeShellScript "build-activepieces" ''
docker build -t local/activepieces ${context}
'')
];
virtualisation.oci-containers.containers.activepieces = {
image = "local/activepieces";
dependsOn = [ "activepieces-redis" ];
environment = {
AP_EXECUTION_MODE = "SANDBOX_CODE_ONLY";
AP_FRONTEND_URL = "https://ap.stupid.fish";
AP_POSTGRES_URL = "postgres://activepieces:activepieces@172.17.0.1:5432/activepieces";
AP_TELEMETRY_ENABLED = "false";
AP_EDITION = "ee";
AP_QUEUE_MODE = "REDIS";
AP_REDIS_HOST = "activepieces-redis.docker";
AP_REDIS_PORT = "6379";
};
environmentFiles = [
# oidc related config + SECRET_KEY, UTILS_SECRET
config.desu.secrets.activepieces-env.path
];
user = builtins.toString UID;
};
systemd.services.docker-activepieces.requires = [ "postgresql.service" ];
services.nginx.virtualHosts."ap.stupid.fish" = {
forceSSL = true;
useACMEHost = "stupid.fish";
locations."/" = {
proxyPass = "http://activepieces.docker$request_uri";
proxyWebsockets = true;
};
};
}

View file

@ -0,0 +1,8 @@
FROM ghcr.io/activepieces/activepieces:0.38.3
RUN sed -i -E 's!https://secrets.activepieces.com/license-keys!https://license.stupid.fish/services/activepieces!' /usr/src/app/dist/packages/server/api/main.js && \
chmod -R 777 /var/log/nginx/ && \
chmod -R 777 /var/lib/nginx && \
chmod -R 777 /run/ && \
mkdir -p /usr/src/app/cache && \
chmod -R 777 /usr/src/app/cache

View file

@ -11,7 +11,7 @@ in {
};
virtualisation.oci-containers.containers.teisu = {
image = "ghcr.io/teidesu/tei.su:latest";
image = "git.stupid.fish/teidesu/tei.su:latest";
environmentFiles = [
config.desu.secrets.teisu-env.path
];

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,6 @@
age-encryption.org/v1
-> ssh-ed25519 sj88Xw x8G6D56j1N7kjMuU9TXdKxpmCyPyDnkbRSAAjcmIXGc
qzQbchvolZgSIWisyKg/eiNRh+826iz6WHu5HQOiBoU
--- MnAF7KtGU97wxf2tCfRbitqRPV/Bfg/GftUCrZAjtuU
YC¥`+Û¬¦k÷bt½b¥‰CGRÿoùUtMü5b<35>UäZ
xN÷I(pÜž6ºjÏ]y°_ÃP&ÎE…<45>ÒjSO‰¢ZŽÒCÜkñÇmCW¾4´4M°g¼ªÖtìÏvhÆHá