Add NixOS module

hydra
Simon Bruder 2021-01-05 17:43:37 +01:00
parent c34e9b8f57
commit d3c0d9f786
Signed by: simon
GPG Key ID: 8D3C82F9F309F8EC
1 changed files with 56 additions and 0 deletions

56
module.nix Normal file
View File

@ -0,0 +1,56 @@
{ config, lib, pkgs, ... }:
let
cfg = config.services.bang-evaluator;
in
{
options.services.bang-evaluator = {
enable = lib.mkEnableOption "bang-evaluator";
package = lib.mkOption {
type = lib.types.package;
default = import ./default.nix { inherit pkgs; };
example = "pkgs.bang-exporter-fork";
description = "The package to use for bang-exporter";
};
listenAddress = lib.mkOption {
type = lib.types.str;
default = ":8081";
example = "localhost:8081";
description = "The address bang-evaluator should listen on.";
};
};
config = {
systemd.services.bang-evaluator = lib.mkIf cfg.enable {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
environment = {
BANG_EVALUATOR_LISTEN_ADDRESS = cfg.listenAddress;
};
serviceConfig = {
ExecStart = "${cfg.package}/bin/evaluator";
Restart = "always";
# taken from systemd-analyze --no-pager security bang-evaluator.service
# probably overkill
CapabilityBoundingSet = null;
DynamicUser = true;
LockPersonality = true;
MemoryDenyWriteExecute = true;
PrivateDevices = true;
PrivateUsers = true;
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
RestrictNamespaces = true;
RestrictRealtime = true;
SystemCallArchitectures = "native";
SystemCallFilter = "@system-service";
};
};
};
}