env = myconfig.env.tools.ttrss;
};
roundcubemail = pkgs.callPackage ./roundcubemail.nix { env = myconfig.env.tools.roundcubemail; };
+ kanboard = pkgs.callPackage ./kanboard.nix {
+ inherit (mylibs) fetchedGithub;
+ env = myconfig.env.tools.kanboard;
+ };
wallabag = pkgs.callPackage ./wallabag.nix { env = myconfig.env.tools.wallabag; };
yourls = pkgs.callPackage ./yourls.nix {
inherit (mylibs) fetchedGithub;
++ rompr.apache.modules
++ shaarli.apache.modules
++ dokuwiki.apache.modules
- ++ ldap.apache.modules;
+ ++ ldap.apache.modules
+ ++ kanboard.apache.modules;
services.ympd = ympd.config // { enable = true; };
shaarli.apache.vhostConf
dokuwiki.apache.vhostConf
ldap.apache.vhostConf
+ kanboard.apache.vhostConf
];
};
shaarli = shaarli.phpFpm.pool;
dokuwiki = dokuwiki.phpFpm.pool;
ldap = ldap.phpFpm.pool;
+ kanboard = kanboard.phpFpm.pool;
tools = ''
listen = /var/run/phpfpm/tools.sock
user = wwwrun
rompr = rompr.activationScript;
shaarli = shaarli.activationScript;
dokuwiki = dokuwiki.activationScript;
+ kanboard = kanboard.activationScript;
};
system.extraSystemBuilderCmds = ''
ln -s ${ttrss.webRoot} $out/webapps/${ttrss.apache.webappName}
ln -s ${wallabag.webRoot} $out/webapps/${wallabag.apache.webappName}
ln -s ${yourls.webRoot} $out/webapps/${yourls.apache.webappName}
+ ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
'';
nixpkgs.overlays = [ (self: super: rec {
--- /dev/null
+{ lib, env, fetchedGithub, writeText, stdenv, fetchurl }:
+rec {
+ varDir = "/var/lib/kanboard";
+ activationScript = {
+ deps = [ "wrappers" ];
+ text = ''
+ install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir}/data
+ install -m 0750 -o ${apache.user} -g ${apache.group} -d ${varDir}/phpSessions
+ install -TDm644 ${webRoot}/dataold/.htaccess ${varDir}/data/.htaccess
+ install -TDm644 ${webRoot}/dataold/web.config ${varDir}/data/web.config
+ '';
+ };
+ config = writeText "config.php" ''
+ <?php
+ define('MAIL_FROM', 'kanboard@immae.eu');
+
+ define('DB_DRIVER', 'postgres');
+ define('DB_USERNAME', '${env.postgresql.user}');
+ define('DB_PASSWORD', '${env.postgresql.password}');
+ define('DB_HOSTNAME', '${env.postgresql.socket}');
+ define('DB_NAME', '${env.postgresql.database}');
+
+ define('LDAP_AUTH', true);
+ define('LDAP_SERVER', '${env.ldap.host}');
+ define('LDAP_START_TLS', true);
+
+ define('LDAP_BIND_TYPE', 'proxy');
+ define('LDAP_USERNAME', '${env.ldap.dn}');
+ define('LDAP_PASSWORD', '${env.ldap.password}');
+ define('LDAP_USER_BASE_DN', '${env.ldap.base}');
+ define('LDAP_USER_FILTER', '(&(memberOf=cn=users,cn=kanboard,ou=services,dc=immae,dc=eu)(uid=%s))');
+ define('LDAP_GROUP_ADMIN_DN', 'cn=admins,cn=kanboard,ou=services,dc=immae,dc=eu');
+ ?>
+ '';
+ webRoot = stdenv.mkDerivation (fetchedGithub ./kanboard.json // rec {
+ dontBuild = true;
+ installPhase = ''
+ cp -a . $out
+ ln -s ${config} $out/config.php
+ mv $out/data $out/dataold
+ ln -s ${varDir}/data $out/data
+ '';
+ });
+ apache = rec {
+ user = "wwwrun";
+ group = "wwwrun";
+ modules = [ "proxy_fcgi" ];
+ webappName = "tools_kanboard";
+ root = "/run/current-system/webapps/${webappName}";
+ vhostConf = ''
+ Alias /kanboard "${root}"
+ <Directory "${root}">
+ DirectoryIndex index.php
+ AllowOverride All
+ Options FollowSymlinks
+ Require all granted
+
+ <FilesMatch "\.php$">
+ SetHandler "proxy:unix:${phpFpm.socket}|fcgi://localhost"
+ </FilesMatch>
+ </Directory>
+ <DirectoryMatch "${root}/data">
+ Require all denied
+ </DirectoryMatch>
+ '';
+ };
+ phpFpm = rec {
+ basedir = builtins.concatStringsSep ":" [ webRoot varDir config ];
+ socket = "/var/run/phpfpm/kanboard.sock";
+ pool = ''
+ listen = ${socket}
+ user = ${apache.user}
+ group = ${apache.group}
+ listen.owner = ${apache.user}
+ listen.group = ${apache.group}
+ pm = ondemand
+ pm.max_children = 60
+ pm.process_idle_timeout = 60
+
+ ; Needed to avoid clashes in browser cookies (same domain)
+ php_value[session.name] = KanboardPHPSESSID
+ php_admin_value[open_basedir] = "${basedir}:/tmp"
+ php_admin_value[session.save_path] = "${varDir}/phpSessions"
+ '';
+ };
+}