feat: google support for plausible

This commit is contained in:
xyno (Philipp Hochkamp) 2023-08-28 20:16:11 +02:00
parent c9758ba2f7
commit 3385de5cbb
6 changed files with 31 additions and 1 deletions

View file

@ -1,4 +1,5 @@
local lspconfig = require 'lspconfig'
local util = require 'lspconfig.util'
local capabilities = require('cmp_nvim_lsp').default_capabilities()
-- lsp keymaps
local lsp_attach_keymappings = {
@ -26,6 +27,10 @@ local on_lsp_attach = function(_, bufnr)
for key, cmd in pairs(lsp_attach_keymappings) do buf_nnoremap_lua(bufnr, key, cmd) end
end
vim.g.markdown_fenced_languages = {
"ts=typescript"
}
lspconfig.denols.setup { capabilities = capabilities, on_attach = on_lsp_attach, root_dir = util.root_pattern("deno.json", "deno.jsonc") }
lspconfig.gopls.setup { capabilities = capabilities, on_attach = on_lsp_attach }
lspconfig.pyright.setup { capabilities = capabilities, on_attach = on_lsp_attach }
lspconfig.nil_ls.setup { capabilities = capabilities, on_attach = on_lsp_attach } -- nix

View file

@ -52,7 +52,7 @@
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://[::1]${config.services.xynoblog.listen}";
locations."/gyakapyukawfyuokfgwtyutf.js".proxyPass = "http://127.0.0.1:${toString config.services.plausible.server.port}/js/plausible.js";
locations."/gyakapyukawfyuokfgwtyutf.js".proxyPass = "http://127.0.0.1:${toString config.services.plausible.server.port}/js/plausible.outbound-links.js";
locations."/api/event".proxyPass = "http://127.0.0.1:${toString config.services.plausible.server.port}";
};
services.lolpizza2.enable = true;

View file

@ -4,6 +4,8 @@ in {
ragon.agenix.secrets."plausibleAdminPw" = { };
ragon.agenix.secrets."plausibleReleaseCookie" = { };
ragon.agenix.secrets."plausibleSecretKeybase" = { };
ragon.agenix.secrets."plausibleGoogleClientId" = { };
ragon.agenix.secrets."plausibleGoogleClientSecret" = { };
ragon.agenix.secrets."smtpPassword" = { };
services.nginx.virtualHosts.${domain} = {
forceSSL = true;
@ -11,6 +13,10 @@ in {
locations."/".proxyPass =
"http://127.0.0.1:${toString config.services.plausible.server.port}";
};
systemd.services.plausible.serviceConfig.LoadCredential = [
"GOOGLE_CLIENT_ID:${config.age.secrets.plausibleGoogleClientId.path}"
"GOOGLE_CLIENT_SECRET:${config.age.secrets.plausibleGoogleClientSecret.path}"
];
services.plausible = {
enable = true;
releaseCookiePath = config.age.secrets.plausibleSecretKeybase.path;

Binary file not shown.

View file

@ -0,0 +1,17 @@
age-encryption.org/v1
-> ssh-ed25519 WceKOQ 7kiO44F83uEy4fAuW72b9Q7S5tOtwEfkzRBctQecHgw
3ln1Ygj6jNJIYHdph3jnOFyKfBJ2GgOXkRnkNQK2mg0
-> ssh-ed25519 ugHWWw EKWqhkVKs2bMLxuqyVS37Ze081K75Ccf/1LaspGSwiE
5cpWDtEB8M/iDLy+et4qMavTLH/apJezJBeLjxtX6KU
-> ssh-ed25519 UU9RSA Jsgue+2fonBIQDhNiUS7ErHMSLEQKwVTEK1k6RY2uyM
C1R14hzTQCtmAE75WAhQeAPxjViXRSYnMEkq1Yg+MXE
-> ssh-ed25519 RJI3BA xKalpyxOrK3zw4GhBnK04oX/S+60VNIPre0d9ZI0DWU
EWCd3HPQ/P2P4QYV5/pW9yiE60nwbKtPUbN6WpZlzns
-> ssh-ed25519 XnvJKw qyvvbgaOqEWLgwUqiAzaYntG1CaqkyJtz6vgdizzQxk
GFeLp6YzXptFauHJN/+O9SryvnsmLm+WCA/5kUoyeFo
-> ssh-ed25519 7NL5Ng BjN17bwe+tZKPUsGABPpEXVmsMiwxrQNK0sNy/XtkRA
5pK3dBXnAFZkKDBKH17QAan0CBLkn7iFUqi5XOAucXA
-> 2*<^-grease \_Ov4 l?~S ^lZ3a
3bmM+FGiMlF4GL952n9DfRuPHaBbbsCitkTPD0syFQ
--- 2+4yhONiZ2GKKjJx7bIuW30ms3LtIQpZcYYnm8/1tIM
OAœ¶Ç Ç8 |_ÃÚÕ»ÔV g,@uG<75>ޤHç—rå0[ XR<58>@JÈêŠÌðဆ™÷TÂøÿ}ü™ƒóĪ@

View file

@ -19,6 +19,8 @@ in
"ds9SyncoidHealthCheckUrl.age".publicKeys = pubkeys.ragon.host "ds9";
"gatebridgeHostKeys.age".publicKeys = pubkeys.ragon.host "ds9";
"plausibleAdminPw.age".publicKeys = pubkeys.ragon.host "picard";
"plausibleGoogleClientId.age".publicKeys = pubkeys.ragon.host "picard";
"plausibleGoogleClientSecret.age".publicKeys = pubkeys.ragon.host "picard";
"plausibleReleaseCookie.age".publicKeys = pubkeys.ragon.host "picard";
"plausibleSecretKeybase.age".publicKeys = pubkeys.ragon.host "picard";
"hedgedocSecret.age".publicKeys = pubkeys.ragon.host "picard";