{ config, lib, ... }: { sops.secrets.microbin_env.sopsFile = ../secrets.yaml; satellite.cloudflared.at.bin.port = config.satellite.ports.microbin; services.microbin = { enable = true; dataDir = "/var/lib/microbin"; passwordFile = config.sops.secrets.microbin_env.path; # {{{ Settings settings = { # High level settings MICROBIN_ADMIN_USERNAME = "prescientmoon"; MICROBIN_PORT = toString config.satellite.cloudflared.at.bin.port; MICROBIN_PUBLIC_PATH = config.satellite.cloudflared.at.bin.url; MICROBIN_DEFAULT_EXPIRY = "1week"; # Disable online features MICROBIN_DISABLE_TELEMETRY = "true"; MICROBIN_DISABLE_UPDATE_CHECKING = "true"; # Enable features MICROBIN_HIGHLIGHTSYNTAX = "true"; MICROBIN_QR = "true"; MICROBIN_READONLY = "true"; # Requires a password for uploads # Disable unwanted features MICROBIN_EDITABLE = "false"; MICROBIN_ENABLE_BURN_AFTER = "false"; MICROBIN_ENABLE_READONLY = "false"; MICROBIN_ETERNAL_PASTA = "false"; MICROBIN_SHOW_READ_STATS = "false"; # Make UI more minimal MICROBIN_HIDE_FOOTER = "true"; MICROBIN_HIDE_HEADER = "true"; MICROBIN_HIDE_LOGO = "true"; }; # }}} }; systemd.services.microbin.serviceConfig = { # We want to use systemd's `StateDirectory` mechanism to fix permissions ReadWritePaths = lib.mkForce [ ]; }; environment.persistence."/persist/state".directories = [ "/var/lib/private/microbin" ]; }