]>
Commit | Line | Data |
---|---|---|
1 | { lib, pkgs, config, mylibs, ... }: | |
2 | let | |
3 | mediagoblin = pkgs.callPackage ./mediagoblin.nix { | |
4 | inherit (mylibs) checkEnv fetchedGit fetchedGithub; | |
5 | }; | |
6 | ||
7 | cfg = config.services.myWebsites.tools.mediagoblin; | |
8 | in { | |
9 | options.services.myWebsites.tools.mediagoblin = { | |
10 | enable = lib.mkEnableOption "enable mediagoblin's website"; | |
11 | }; | |
12 | ||
13 | config = lib.mkIf cfg.enable { | |
14 | ids.uids.mediagoblin = 397; | |
15 | ids.gids.mediagoblin = 397; | |
16 | ||
17 | users.users.mediagoblin = { | |
18 | name = "mediagoblin"; | |
19 | uid = config.ids.uids.mediagoblin; | |
20 | group = "mediagoblin"; | |
21 | description = "Mediagoblin user"; | |
22 | home = mediagoblin.varDir; | |
23 | useDefaultShell = true; | |
24 | }; | |
25 | ||
26 | users.groups.mediagoblin.gid = config.ids.gids.mediagoblin; | |
27 | ||
28 | systemd.services.mediagoblin-web = { | |
29 | description = "Mediagoblin service"; | |
30 | wantedBy = [ "multi-user.target" ]; | |
31 | after = [ "network.target" ]; | |
32 | ||
33 | environment.SCRIPT_NAME = "/mediagoblin/"; | |
34 | ||
35 | script = '' | |
36 | exec ./bin/paster serve \ | |
37 | ${mediagoblin.pythonRoot}/paste_local.ini \ | |
38 | --pid-file=${mediagoblin.socketsDir}/mediagoblin.pid | |
39 | ''; | |
40 | ||
41 | preStop = '' | |
42 | exec ./bin/paster serve \ | |
43 | --pid-file=${mediagoblin.socketsDir}/mediagoblin.pid \ | |
44 | ${mediagoblin.pythonRoot}/paste_local.ini stop | |
45 | ''; | |
46 | preStart = '' | |
47 | ./bin/gmg dbupdate | |
48 | ''; | |
49 | ||
50 | serviceConfig = { | |
51 | User = "mediagoblin"; | |
52 | PrivateTmp = true; | |
53 | Restart = "always"; | |
54 | TimeoutSec = 15; | |
55 | Type = "simple"; | |
56 | WorkingDirectory = mediagoblin.pythonRoot; | |
57 | PIDFile = "${mediagoblin.socketsDir}/mediagoblin.pid"; | |
58 | }; | |
59 | ||
60 | unitConfig.RequiresMountsFor = mediagoblin.varDir; | |
61 | }; | |
62 | ||
63 | systemd.services.mediagoblin-celeryd = { | |
64 | description = "Mediagoblin service"; | |
65 | wantedBy = [ "multi-user.target" ]; | |
66 | after = [ "network.target" "mediagoblin-web.service" ]; | |
67 | ||
68 | environment.MEDIAGOBLIN_CONFIG = "${mediagoblin.pythonRoot}/mediagoblin_local.ini"; | |
69 | environment.CELERY_CONFIG_MODULE = "mediagoblin.init.celery.from_celery"; | |
70 | ||
71 | script = '' | |
72 | exec ./bin/celery worker \ | |
73 | --logfile=${mediagoblin.varDir}/celery.log \ | |
74 | --loglevel=INFO | |
75 | ''; | |
76 | ||
77 | serviceConfig = { | |
78 | User = "mediagoblin"; | |
79 | PrivateTmp = true; | |
80 | Restart = "always"; | |
81 | TimeoutSec = 60; | |
82 | Type = "simple"; | |
83 | WorkingDirectory = mediagoblin.pythonRoot; | |
84 | PIDFile = "${mediagoblin.socketsDir}/mediagoblin-celeryd.pid"; | |
85 | }; | |
86 | ||
87 | unitConfig.RequiresMountsFor = mediagoblin.varDir; | |
88 | }; | |
89 | ||
90 | system.activationScripts.mediagoblin = { | |
91 | deps = [ "users" ]; | |
92 | text = '' | |
93 | install -m 0755 -o mediagoblin -g mediagoblin -d ${mediagoblin.socketsDir} | |
94 | install -m 0755 -o mediagoblin -g mediagoblin -d ${mediagoblin.varDir} | |
95 | if [ -d ${mediagoblin.varDir}/plugin_static/ ]; then | |
96 | rm ${mediagoblin.varDir}/plugin_static/coreplugin_basic_auth | |
97 | ln -sf ${mediagoblin.pythonRoot}/mediagoblin/plugins/basic_auth/static ${mediagoblin.varDir}/plugin_static/coreplugin_basic_auth | |
98 | fi | |
99 | ''; | |
100 | }; | |
101 | ||
102 | services.myWebsites.tools.modules = [ | |
103 | "proxy" "proxy_http" "proxy_balancer" | |
104 | "lbmethod_byrequests" "lbmethod_bytraffic" "lbmethod_bybusyness" "lbmethod_heartbeat" | |
105 | ]; | |
106 | users.users.wwwrun.extraGroups = [ "mediagoblin" ]; | |
107 | security.acme.certs."eldiron".extraDomains."mgoblin.immae.eu" = null; | |
108 | services.myWebsites.tools.vhostConfs.mgoblin = { | |
109 | certName = "eldiron"; | |
110 | hosts = ["mgoblin.immae.eu" ]; | |
111 | root = null; | |
112 | extraConfig = [ '' | |
113 | Alias /mgoblin_media ${mediagoblin.varDir}/media/public | |
114 | <Directory ${mediagoblin.varDir}/media/public> | |
115 | Options -Indexes +FollowSymLinks +MultiViews +Includes | |
116 | Require all granted | |
117 | </Directory> | |
118 | ||
119 | Alias /theme_static ${mediagoblin.varDir}/theme_static | |
120 | <Directory ${mediagoblin.varDir}/theme_static> | |
121 | Options -Indexes +FollowSymLinks +MultiViews +Includes | |
122 | Require all granted | |
123 | </Directory> | |
124 | ||
125 | Alias /plugin_static ${mediagoblin.varDir}/plugin_static | |
126 | <Directory ${mediagoblin.varDir}/plugin_static> | |
127 | Options -Indexes +FollowSymLinks +MultiViews +Includes | |
128 | Require all granted | |
129 | </Directory> | |
130 | ||
131 | ProxyPreserveHost on | |
132 | ProxyVia On | |
133 | ProxyRequests Off | |
134 | ProxyPass /mgoblin_media ! | |
135 | ProxyPass /theme_static ! | |
136 | ProxyPass /plugin_static ! | |
137 | ProxyPassMatch ^/.well-known/acme-challenge ! | |
138 | ProxyPass / balancer://paster_server/ | |
139 | ProxyPassReverse / balancer://paster_server | |
140 | <Proxy balancer://paster_server> | |
141 | BalancerMember unix://${mediagoblin.socketsDir}/mediagoblin.sock|http:// | |
142 | </Proxy> | |
143 | '' ]; | |
144 | }; | |
145 | }; | |
146 | } |