--- /dev/null
+{ config, pkgs, lib, name, ... }:
+{
+ options = {
+ myServices.status = {
+ enable = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = ''
+ Whether to enable status app.
+ '';
+ };
+ };
+ };
+ config = lib.mkIf config.myServices.status.enable {
+ secrets.keys = [
+ {
+ dest = "naemon-status/environment";
+ user = "naemon";
+ group = "naemon";
+ permission = "0400";
+ text = ''
+ TOKENS=${builtins.concatStringsSep " " config.myEnv.monitoring.nrdp_tokens}
+ '';
+ }
+ ];
+ services.nginx = {
+ enable = true;
+ recommendedOptimisation = true;
+ recommendedGzipSettings = true;
+ recommendedProxySettings = true;
+ virtualHosts."status.immae.eu" = {
+ useACMEHost = name;
+ forceSSL = true;
+ locations."/".proxyPass = "http://unix:/run/naemon-status/socket.sock:/";
+ };
+ };
+ security.acme.certs."${name}".extraDomains."status.immae.eu" = null;
+
+ myServices.certificates.enable = true;
+ networking.firewall.allowedTCPPorts = [ 80 443 18000 ];
+ systemd.services.naemon-status = {
+ description = "Naemon status";
+ after = [ "network.target" ];
+ wantedBy = [ "multi-user.target" ];
+
+ serviceConfig = {
+ EnvironmentFile = config.secrets.fullPaths."naemon-status/environment";
+ Type = "simple";
+ WorkingDirectory = "${./status}";
+ ExecStart = let
+ python = pkgs.python3.withPackages (p: [ p.gunicorn p.flask p.flask_login ]);
+ in
+ "${python}/bin/gunicorn -w4 --bind unix:/run/naemon-status/socket.sock app:app";
+ User = "naemon";
+ RuntimeDirectory = "naemon-status";
+ StandardOutput = "journal";
+ StandardError = "inherit";
+ };
+ };
+ };
+}