From 73858519c638fddfbc1c912c975640421bf1dea7 Mon Sep 17 00:00:00 2001 From: Kopatz <7265381+Kropatz@users.noreply.github.com> Date: Sun, 9 Jun 2024 14:15:55 +0200 Subject: [PATCH] add plausible --- modules/services/default.nix | 1 + modules/services/plausible.nix | 37 ++++++++++++++++++++++++++++ pkgs/adam-site/default.nix | 2 +- secrets/plausible-admin.age | 7 ++++++ secrets/plausible-keybase.age | Bin 0 -> 411 bytes secrets/secrets.nix | 3 +++ systems/adam-site/configuration.nix | 6 +++++ 7 files changed, 55 insertions(+), 1 deletion(-) create mode 100644 modules/services/plausible.nix create mode 100644 secrets/plausible-admin.age create mode 100644 secrets/plausible-keybase.age diff --git a/modules/services/default.nix b/modules/services/default.nix index f88569b..1029fb0 100644 --- a/modules/services/default.nix +++ b/modules/services/default.nix @@ -14,5 +14,6 @@ ./kop-monitor.nix ./kop-fileshare.nix ./adam-site.nix + ./plausible.nix ]; } diff --git a/modules/services/plausible.nix b/modules/services/plausible.nix new file mode 100644 index 0000000..d822c42 --- /dev/null +++ b/modules/services/plausible.nix @@ -0,0 +1,37 @@ +{ config, pkgs, lib, inputs, ... }: +let cfg = config.custom.services.plausible; +in { + options.custom.services.plausible = { + enable = lib.mkEnableOption "Enables plausible"; + }; + config = lib.mkIf cfg.enable { + + age.secrets.plausible-admin = { + file = ../../secrets/plausible-admin.age; + }; + age.secrets.plausible-keybase = { + file = ../../secrets/plausible-keybase.age; + }; + + services.plausible = { + enable = true; + adminUser = { + # activate is used to skip the email verification of the admin-user that's + # automatically created by plausible. This is only supported if + # postgresql is configured by the module. This is done by default, but + # can be turned off with services.plausible.database.postgres.setup. + activate = true; + email = "admin@localhost"; + passwordFile = config.age.secrets.plausible-admin.path; + }; + server = { + baseUrl = "https://plausible.imbissaggsbachdorf.at"; + #baseUrl = "http://localhost"; + # secretKeybaseFile is a path to the file which contains the secret generated + # with openssl as described above. + secretKeybaseFile = config.age.secrets.plausible-keybase.path; + }; + }; + + }; +} diff --git a/pkgs/adam-site/default.nix b/pkgs/adam-site/default.nix index 7f25156..b56243c 100644 --- a/pkgs/adam-site/default.nix +++ b/pkgs/adam-site/default.nix @@ -6,7 +6,7 @@ buildNpmPackage rec { src = fetchGit { url = "git@github.com:oberprofis/adams.git"; ref = "main"; - rev = "b5af7fe2acf2fcf3b7b115f39c9401d0bf40456d"; + rev = "68fa8392335a462634d4bb886344762592c8d566"; }; npmDepsHash="sha256-ULxOaEpa2+YS45kh+2xCZMqXQs5bMYhy7J08DsFYE+s="; installPhase = '' diff --git a/secrets/plausible-admin.age b/secrets/plausible-admin.age new file mode 100644 index 0000000..2ed2886 --- /dev/null +++ b/secrets/plausible-admin.age @@ -0,0 +1,7 @@ +age-encryption.org/v1 +-> ssh-ed25519 bqM3xA Wrj1qtU09AyFSgxzqH0eCYWwlGhZEgIZJBrjywU/bSg +mMwRqlAGXFCUr+Nj/6JMbjjJHLbwHm4/mrOjwaxBlDM +-> ssh-ed25519 DCzi1A hgOetbh8HzZeDfHccR5LG7V8ImLyY7Hil+LvcIAO5RQ +xfLj0NwDZ0jUzCjxs3DUHGxu3tQc7uShMduyl9hoqe8 +--- uaqIvyCHbDxezDYBgIYAlBYD+Dtw+jIFknYl8DQVRnM +!9~:_!Ap] h9{ HKMvL =TOA%8 u[2-,2*j[V8s0@g \ No newline at end of file diff --git a/secrets/plausible-keybase.age b/secrets/plausible-keybase.age new file mode 100644 index 0000000000000000000000000000000000000000..9234d1effe78d3aca714e8909b2c60aee09a683e GIT binary patch literal 411 zcmYdHPt{G$OD?J`D9Oyv)5|YP*Do{V(zR14F3!+RO))YxHMCSnD)cq3a8z*fa11R7 zG%EHo$;%8)HVJaCh|2NxN%sjzt27A8_wvimO|nQaaVyI(^yMz}2P7+{Dq%BRwr3uPD_o*TBo8v>+<4GM_7|A}Pf+!{4&RJS5F9G%d{7(j>&# zT;I~fxFjSuDI+;G#k4po%hT1*EtE@FS63m=BiNwW+$_UWyV%Ik$;Z(