]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - modules/private/websites/isabelle/iridologie.nix
Add alternate cloud storage for daily backups
[perso/Immae/Config/Nix.git] / modules / private / websites / isabelle / iridologie.nix
1 { lib, pkgs, config, ... }:
2 let
3 icfg = config.myEnv.websites.isabelle.iridologie;
4 cfg = config.myServices.websites.isabelle.iridologie;
5 app = pkgs.callPackage ./iridologie_app {
6 inherit (icfg) environment;
7 inherit (pkgs.webapps) spip;
8 varDir = "/var/lib/isabelle_iridologie";
9 };
10
11 apacheUser = config.services.httpd.Prod.user;
12 apacheGroup = config.services.httpd.Prod.group;
13 webappdir = config.services.websites.webappDirsPaths.isabelle_iridologie;
14 secretsPath = config.secrets.fullPaths."websites/isabelle/iridologie";
15 in {
16 options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website";
17
18 config = lib.mkIf cfg.enable {
19 services.duplyBackup.profiles.isabelle_iridologie.rootDir = app.varDir;
20 services.duplyBackup.profiles.isabelle_iridologie.remotes = ["eriomem" "ovh"];
21 secrets.keys = [
22 {
23 dest = "websites/isabelle/iridologie";
24 user = apacheUser;
25 group = apacheGroup;
26 permissions = "0400";
27 text = ''
28 SetEnv SPIP_CONFIG_DIR "${./config}"
29 SetEnv SPIP_VAR_DIR "${app.varDir}"
30 SetEnv SPIP_SITE "iridologie-${app.environment}"
31 SetEnv SPIP_LDAP_BASE "dc=immae,dc=eu"
32 SetEnv SPIP_LDAP_HOST "ldaps://ldap.immae.eu"
33 SetEnv SPIP_LDAP_SEARCH_DN "${icfg.ldap.dn}"
34 SetEnv SPIP_LDAP_SEARCH_PW "${icfg.ldap.password}"
35 SetEnv SPIP_LDAP_SEARCH "${icfg.ldap.filter}"
36 SetEnv SPIP_MYSQL_HOST "${icfg.mysql.host}"
37 SetEnv SPIP_MYSQL_PORT "${icfg.mysql.port}"
38 SetEnv SPIP_MYSQL_DB "${icfg.mysql.database}"
39 SetEnv SPIP_MYSQL_USER "${icfg.mysql.user}"
40 SetEnv SPIP_MYSQL_PASSWORD "${icfg.mysql.password}"
41 '';
42 }
43 ];
44 services.webstats.sites = [ { name = "iridologie.icommandeur.org"; } ];
45
46 systemd.services.phpfpm-isabelle_iridologie.after = lib.mkAfter [ "mysql.service" ];
47 systemd.services.phpfpm-isabelle_iridologie.wants = [ "mysql.service" ];
48 services.phpfpm.pools.isabelle_iridologie = {
49 user = config.services.httpd.Prod.user;
50 group = config.services.httpd.Prod.group;
51 settings = {
52 "listen.owner" = "${apacheUser}";
53 "listen.group" = "${apacheGroup}";
54 "php_admin_value[upload_max_filesize]" = "20M";
55 "php_admin_value[post_max_size]" = "20M";
56 #"php_admin_flag[log_errors]" = "on";
57 "php_admin_value[open_basedir]" = "${app.spipConfig}:${./config}:${app}:${app.varDir}:/tmp";
58 "php_admin_value[session.save_path]" = "${app.varDir}/phpSessions";
59 "pm" = "dynamic";
60 "pm.max_children" = "20";
61 "pm.start_servers" = "2";
62 "pm.min_spare_servers" = "1";
63 "pm.max_spare_servers" = "3";
64 };
65 phpPackage = pkgs.php72;
66 };
67 system.activationScripts.isabelle_iridologie = {
68 deps = [ "wrappers" ];
69 text = ''
70 install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir} ${app.varDir}/IMG ${app.varDir}/tmp ${app.varDir}/local
71 install -m 0750 -o ${apacheUser} -g ${apacheGroup} -d ${app.varDir}/phpSessions
72 '';
73 };
74 services.websites.webappDirs.isabelle_iridologie = app.webRoot;
75 services.websites.env.production.modules = [ "proxy_fcgi" ];
76 services.websites.env.production.vhostConfs.isabelle_iridologie = {
77 certName = "isabelle";
78 addToCerts = true;
79 hosts = [ "iridologie.icommandeur.org" "icommandeur.org" "www.icommandeur.org" ];
80 root = webappdir;
81 extraConfig = [
82 ''
83 RewriteEngine On
84 RewriteCond "%{HTTP_HOST}" "!^iridologie\.icommandeur\.org$" [NC]
85 RewriteRule ^(.+)$ https://iridologie.icommandeur.org$1 [R=302,L]
86
87 Include ${secretsPath}
88
89 RewriteEngine On
90
91 <FilesMatch "\.php$">
92 SetHandler "proxy:unix:${config.services.phpfpm.pools.isabelle_iridologie.socket}|fcgi://localhost"
93 </FilesMatch>
94
95 <Directory ${webappdir}>
96 DirectoryIndex index.php index.htm index.html
97 Options -Indexes +FollowSymLinks +MultiViews +Includes
98 Include ${webappdir}/htaccess.txt
99
100 AllowOverride AuthConfig FileInfo Limit
101 Require all granted
102 </Directory>
103
104 <DirectoryMatch "${webappdir}/squelettes">
105 Require all denied
106 </DirectoryMatch>
107
108 <FilesMatch "(.htaccess|rewrite-rules|.gitignore)$">
109 Require all denied
110 </FilesMatch>
111
112 Use Stats iridologie.icommandeur.org
113 ''
114 ];
115 };
116 services.websites.env.production.watchPaths = [
117 secretsPath
118 ];
119 };
120 }