X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fwebsites%2Fisabelle%2Firidologie.nix;h=cd733c1d28c1f284e1a0e80a1864b547669f5374;hb=5315b439af1f72c3282549508ae58d86d66e38ec;hp=cb4e3005350600f2f62716e748e2703d1f9b7688;hpb=fd2af8fa50dc1a60d40a1aa3c4252d8eb3abf5b0;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/websites/isabelle/iridologie.nix b/modules/private/websites/isabelle/iridologie.nix index cb4e300..cd733c1 100644 --- a/modules/private/websites/isabelle/iridologie.nix +++ b/modules/private/websites/isabelle/iridologie.nix @@ -1,59 +1,113 @@ -{ lib, config, ... }: +{ lib, pkgs, config, ... }: let + icfg = config.myEnv.websites.isabelle.iridologie; cfg = config.myServices.websites.isabelle.iridologie; - varDir = "/var/lib/ftp/isabelle"; + app = pkgs.callPackage ./iridologie_app { + inherit (icfg) environment; + inherit (pkgs.webapps) spip; + varDir = "/var/lib/isabelle_iridologie"; + }; + + apacheUser = config.services.httpd.Prod.user; + apacheGroup = config.services.httpd.Prod.group; + secretsPath = config.secrets.fullPaths."websites/isabelle/iridologie"; in { options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website"; config = lib.mkIf cfg.enable { - services.webstats.sites = [ { name = "iridologie.icommandeur.org"; } ]; - system.activationScripts.iridologie = { - deps = [ "httpd" ]; + secrets.keys."websites/isabelle/iridologie" = { + user = apacheUser; + group = apacheGroup; + permissions = "0400"; text = '' - install -m 0755 -o wwwrun -g wwwrun -d /var/lib/php/sessions/iridologie - ''; + SetEnv SPIP_CONFIG_DIR "${./config}" + SetEnv SPIP_VAR_DIR "${app.varDir}" + SetEnv SPIP_SITE "iridologie-${app.environment}" + SetEnv SPIP_LDAP_BASE "dc=immae,dc=eu" + SetEnv SPIP_LDAP_HOST "ldaps://ldap.immae.eu" + SetEnv SPIP_LDAP_SEARCH_DN "${icfg.ldap.dn}" + SetEnv SPIP_LDAP_SEARCH_PW "${icfg.ldap.password}" + SetEnv SPIP_LDAP_SEARCH "${icfg.ldap.filter}" + SetEnv SPIP_MYSQL_HOST "${icfg.mysql.host}" + SetEnv SPIP_MYSQL_PORT "${icfg.mysql.port}" + SetEnv SPIP_MYSQL_DB "${icfg.mysql.database}" + SetEnv SPIP_MYSQL_USER "${icfg.mysql.user}" + SetEnv SPIP_MYSQL_PASSWORD "${icfg.mysql.password}" + ''; + }; + services.webstats.sites = [ { name = "iridologie.icommandeur.org"; } ]; + + systemd.services.phpfpm-isabelle_iridologie.after = lib.mkAfter [ "mysql.service" ]; + systemd.services.phpfpm-isabelle_iridologie.wants = [ "mysql.service" ]; + services.phpfpm.pools.isabelle_iridologie = { + user = config.services.httpd.Prod.user; + group = config.services.httpd.Prod.group; + settings = { + "listen.owner" = "${apacheUser}"; + "listen.group" = "${apacheGroup}"; + "php_admin_value[upload_max_filesize]" = "20M"; + "php_admin_value[post_max_size]" = "20M"; + #"php_admin_flag[log_errors]" = "on"; + "php_admin_value[open_basedir]" = "${app.spipConfig}:${./config}:${app}:${app.varDir}:/tmp"; + "php_admin_value[session.save_path]" = "${app.varDir}/phpSessions"; + "pm" = "dynamic"; + "pm.max_children" = "20"; + "pm.start_servers" = "2"; + "pm.min_spare_servers" = "1"; + "pm.max_spare_servers" = "3"; + }; + phpPackage = pkgs.php72; }; - services.phpfpm.pools.iridologie = { - listen = "/run/phpfpm/iridologie.sock"; - extraConfig = '' - user = wwwrun - group = wwwrun - listen.owner = wwwrun - listen.group = wwwrun - - pm = ondemand - pm.max_children = 5 - pm.process_idle_timeout = 60 - - php_admin_value[open_basedir] = "/var/lib/php/sessions/iridologie:${varDir}:/tmp" - php_admin_value[session.save_path] = "/var/lib/php/sessions/iridologie" - ''; + system.activationScripts.isabelle_iridologie = { + deps = [ "wrappers" ]; + text = '' + install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir} ${app.varDir}/IMG ${app.varDir}/tmp ${app.varDir}/local + install -m 0750 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir}/phpSessions + ''; }; services.websites.env.production.modules = [ "proxy_fcgi" ]; - services.websites.env.production.vhostConfs.iridologie = { - certName = "aten"; - addToCerts = true; - hosts = [ "iridologie.icommandeur.org" "icommandeur.org" "www.icommandeur.org" ]; - root = varDir; - extraConfig = [ + services.websites.env.production.vhostConfs.isabelle_iridologie = { + certName = "isabelle"; + addToCerts = true; + hosts = [ "iridologie.icommandeur.org" "icommandeur.org" "www.icommandeur.org" ]; + root = app.webRoot; + extraConfig = [ '' - Use Stats iridologie.icommandeur.org - RewriteEngine On - RewriteCond "%{HTTP_HOST}" "!^iridologie\.icommandeur\.org$" [NC] - RewriteRule ^(.+)$ https://iridologie.icommandeur.org$1 [R=302,L] - - - SetHandler "proxy:unix:/run/phpfpm/iridologie.sock|fcgi://localhost" - - - - DirectoryIndex index.php index.htm index.html - AllowOverride All - Require all granted - + RewriteEngine On + RewriteCond "%{HTTP_HOST}" "!^iridologie\.icommandeur\.org$" [NC] + RewriteRule ^(.+)$ https://iridologie.icommandeur.org$1 [R=302,L] + + Include ${secretsPath} + + RewriteEngine On + + + SetHandler "proxy:unix:${config.services.phpfpm.pools.isabelle_iridologie.socket}|fcgi://localhost" + + + + DirectoryIndex index.php index.htm index.html + Options -Indexes +FollowSymLinks +MultiViews +Includes + Include ${app.webRoot}/htaccess.txt + + AllowOverride AuthConfig FileInfo Limit + Require all granted + + + + Require all denied + + + + Require all denied + + + Use Stats iridologie.icommandeur.org '' ]; }; + services.websites.env.production.watchPaths = [ + secretsPath + ]; }; } -