X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fwebsites%2Fisabelle%2Firidologie.nix;h=5fa87cee075a81508d8dcf5390918086d3e5d9cb;hb=f5761aac8dbfb4af91c232f2b52d1353c899abda;hp=460bd2a902db048e8c6ae9148036883a8e5056d7;hpb=423c3f1caefdf5f125a2acf7456b5ca0273cee4b;p=perso%2FImmae%2FConfig%2FNix.git
diff --git a/modules/private/websites/isabelle/iridologie.nix b/modules/private/websites/isabelle/iridologie.nix
index 460bd2a..5fa87ce 100644
--- a/modules/private/websites/isabelle/iridologie.nix
+++ b/modules/private/websites/isabelle/iridologie.nix
@@ -1,49 +1,119 @@
{ lib, pkgs, config, ... }:
let
- iridologie = pkgs.callPackage ./spip_builder.nix {
- inherit (pkgs.webapps) iridologie;
- config = config.myEnv.websites.isabelle.iridologie;
- apacheUser = config.services.httpd.Prod.user;
- apacheGroup = config.services.httpd.Prod.group;
+ icfg = config.myEnv.websites.isabelle.iridologie;
+ cfg = config.myServices.websites.isabelle.iridologie;
+ app = pkgs.callPackage ./iridologie_app {
+ inherit (icfg) environment;
+ inherit (pkgs.webapps) spip;
+ varDir = "/var/lib/isabelle_iridologie";
};
- cfg = config.myServices.websites.isabelle.iridologie;
+ apacheUser = config.services.httpd.Prod.user;
+ apacheGroup = config.services.httpd.Prod.group;
+ webappdir = config.services.websites.webappDirsPaths.isabelle_iridologie;
+ secretsPath = config.secrets.fullPaths."websites/isabelle/iridologie";
in {
options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website";
config = lib.mkIf cfg.enable {
- services.duplyBackup.profiles.iridologie_prod.rootDir = iridologie.app.varDir;
- secrets.keys = iridologie.keys;
+ services.duplyBackup.profiles.isabelle_iridologie.rootDir = app.varDir;
+ secrets.keys = [
+ {
+ dest = "websites/isabelle/iridologie";
+ user = apacheUser;
+ group = apacheGroup;
+ permissions = "0400";
+ text = ''
+ SetEnv SPIP_CONFIG_DIR "${./config}"
+ SetEnv SPIP_VAR_DIR "${app.varDir}"
+ SetEnv SPIP_SITE "iridologie-${app.environment}"
+ SetEnv SPIP_LDAP_BASE "dc=immae,dc=eu"
+ SetEnv SPIP_LDAP_HOST "ldaps://ldap.immae.eu"
+ SetEnv SPIP_LDAP_SEARCH_DN "${icfg.ldap.dn}"
+ SetEnv SPIP_LDAP_SEARCH_PW "${icfg.ldap.password}"
+ SetEnv SPIP_LDAP_SEARCH "${icfg.ldap.filter}"
+ SetEnv SPIP_MYSQL_HOST "${icfg.mysql.host}"
+ SetEnv SPIP_MYSQL_PORT "${icfg.mysql.port}"
+ SetEnv SPIP_MYSQL_DB "${icfg.mysql.database}"
+ SetEnv SPIP_MYSQL_USER "${icfg.mysql.user}"
+ SetEnv SPIP_MYSQL_PASSWORD "${icfg.mysql.password}"
+ '';
+ }
+ ];
services.webstats.sites = [ { name = "iridologie.icommandeur.org"; } ];
- systemd.services.phpfpm-iridologie.after = lib.mkAfter iridologie.phpFpm.serviceDeps;
- systemd.services.phpfpm-iridologie.wants = iridologie.phpFpm.serviceDeps;
- services.phpfpm.pools.iridologie = {
- listen = iridologie.phpFpm.socket;
- extraConfig = iridologie.phpFpm.pool;
- phpOptions = config.services.phpfpm.phpOptions + ''
- extension=${pkgs.php}/lib/php/extensions/mysqli.so
+ systemd.services.phpfpm-isabelle_iridologie.after = lib.mkAfter [ "mysql.service" ];
+ systemd.services.phpfpm-isabelle_iridologie.wants = [ "mysql.service" ];
+ services.phpfpm.pools.isabelle_iridologie = {
+ user = config.services.httpd.Prod.user;
+ group = config.services.httpd.Prod.group;
+ settings = {
+ "listen.owner" = "${apacheUser}";
+ "listen.group" = "${apacheGroup}";
+ "php_admin_value[upload_max_filesize]" = "20M";
+ "php_admin_value[post_max_size]" = "20M";
+ #"php_admin_flag[log_errors]" = "on";
+ "php_admin_value[open_basedir]" = "${app.spipConfig}:${./config}:${app}:${app.varDir}:/tmp";
+ "php_admin_value[session.save_path]" = "${app.varDir}/phpSessions";
+ "pm" = "dynamic";
+ "pm.max_children" = "20";
+ "pm.start_servers" = "2";
+ "pm.min_spare_servers" = "1";
+ "pm.max_spare_servers" = "3";
+ };
+ phpPackage = pkgs.php72;
+ };
+ system.activationScripts.isabelle_iridologie = {
+ deps = [ "wrappers" ];
+ text = ''
+ install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir} ${app.varDir}/IMG ${app.varDir}/tmp ${app.varDir}/local
+ install -m 0750 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir}/phpSessions
'';
};
- system.activationScripts.iridologie = iridologie.activationScript;
- myServices.websites.webappDirs."${iridologie.apache.webappName}" = iridologie.app.webRoot;
- services.websites.env.production.modules = iridologie.apache.modules;
- services.websites.env.production.vhostConfs.iridologie = {
- certName = "aten";
+ services.websites.webappDirs.isabelle_iridologie = app.webRoot;
+ services.websites.env.production.modules = [ "proxy_fcgi" ];
+ services.websites.env.production.vhostConfs.isabelle_iridologie = {
+ certName = "isabelle";
addToCerts = true;
hosts = [ "iridologie.icommandeur.org" "icommandeur.org" "www.icommandeur.org" ];
- root = iridologie.apache.root;
+ root = webappdir;
extraConfig = [
''
RewriteEngine On
RewriteCond "%{HTTP_HOST}" "!^iridologie\.icommandeur\.org$" [NC]
RewriteRule ^(.+)$ https://iridologie.icommandeur.org$1 [R=302,L]
+
+ Include ${secretsPath}
+
+ RewriteEngine On
+
+
+ SetHandler "proxy:unix:${config.services.phpfpm.pools.isabelle_iridologie.socket}|fcgi://localhost"
+
+
+
+ DirectoryIndex index.php index.htm index.html
+ Options -Indexes +FollowSymLinks +MultiViews +Includes
+ Include ${webappdir}/htaccess.txt
+
+ AllowOverride AuthConfig FileInfo Limit
+ Require all granted
+
+
+
+ Require all denied
+
+
+
+ Require all denied
+
+
+ Use Stats iridologie.icommandeur.org
''
- iridologie.apache.vhostConf
];
};
services.websites.env.production.watchPaths = [
- "/var/secrets/webapps/${iridologie.app.environment}-iridologie"
+ secretsPath
];
};
}