]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - modules/private/websites/tools/tools/default.nix
Fix files watcher path
[perso/Immae/Config/Nix.git] / modules / private / websites / tools / tools / default.nix
1 { lib, pkgs, config, myconfig, ... }:
2 let
3 adminer = pkgs.callPackage ./adminer.nix {
4 inherit (pkgs.webapps) adminer;
5 };
6 ympd = pkgs.callPackage ./ympd.nix {
7 env = myconfig.env.tools.ympd;
8 };
9 ttrss = pkgs.callPackage ./ttrss.nix {
10 inherit (pkgs.webapps) ttrss ttrss-plugins;
11 env = myconfig.env.tools.ttrss;
12 };
13 roundcubemail = pkgs.callPackage ./roundcubemail.nix {
14 inherit (pkgs.webapps) roundcubemail roundcubemail-plugins roundcubemail-skins;
15 env = myconfig.env.tools.roundcubemail;
16 };
17 rainloop = pkgs.callPackage ./rainloop.nix {};
18 kanboard = pkgs.callPackage ./kanboard.nix {
19 env = myconfig.env.tools.kanboard;
20 };
21 wallabag = pkgs.callPackage ./wallabag.nix {
22 inherit (pkgs.webapps) wallabag;
23 env = myconfig.env.tools.wallabag;
24 };
25 yourls = pkgs.callPackage ./yourls.nix {
26 inherit (pkgs.webapps) yourls yourls-plugins;
27 env = myconfig.env.tools.yourls;
28 };
29 rompr = pkgs.callPackage ./rompr.nix {
30 inherit (pkgs.webapps) rompr;
31 env = myconfig.env.tools.rompr;
32 };
33 shaarli = pkgs.callPackage ./shaarli.nix {
34 env = myconfig.env.tools.shaarli;
35 };
36 dokuwiki = pkgs.callPackage ./dokuwiki.nix {
37 inherit (pkgs.webapps) dokuwiki dokuwiki-plugins;
38 };
39 ldap = pkgs.callPackage ./ldap.nix {
40 inherit (pkgs.webapps) phpldapadmin;
41 env = myconfig.env.tools.phpldapadmin;
42 };
43
44 cfg = config.myServices.websites.tools.tools;
45 in {
46 options.myServices.websites.tools.tools = {
47 enable = lib.mkEnableOption "enable tools website";
48 };
49
50 config = lib.mkIf cfg.enable {
51 secrets.keys =
52 kanboard.keys
53 ++ ldap.keys
54 ++ roundcubemail.keys
55 ++ shaarli.keys
56 ++ ttrss.keys
57 ++ wallabag.keys
58 ++ yourls.keys;
59
60 services.websites.env.integration.modules =
61 rainloop.apache.modules;
62
63 services.websites.env.tools.modules =
64 [ "proxy_fcgi" ]
65 ++ adminer.apache.modules
66 ++ ympd.apache.modules
67 ++ ttrss.apache.modules
68 ++ roundcubemail.apache.modules
69 ++ wallabag.apache.modules
70 ++ yourls.apache.modules
71 ++ rompr.apache.modules
72 ++ shaarli.apache.modules
73 ++ dokuwiki.apache.modules
74 ++ ldap.apache.modules
75 ++ kanboard.apache.modules;
76
77 services.websites.env.integration.vhostConfs.devtools = {
78 certName = "eldiron";
79 addToCerts = true;
80 hosts = ["devtools.immae.eu" ];
81 root = "/var/lib/ftp/devtools.immae.eu";
82 extraConfig = [
83 ''
84 <Directory "/var/lib/ftp/devtools.immae.eu">
85 DirectoryIndex index.php index.htm index.html
86 AllowOverride all
87 Require all granted
88 <FilesMatch "\.php$">
89 SetHandler "proxy:unix:/var/run/phpfpm/devtools.sock|fcgi://localhost"
90 </FilesMatch>
91 </Directory>
92 ''
93 rainloop.apache.vhostConf
94 ];
95 };
96
97 services.websites.env.tools.vhostConfs.tools = {
98 certName = "eldiron";
99 addToCerts = true;
100 hosts = ["tools.immae.eu" ];
101 root = "/var/lib/ftp/tools.immae.eu";
102 extraConfig = [
103 ''
104 <Directory "/var/lib/ftp/tools.immae.eu">
105 DirectoryIndex index.php index.htm index.html
106 AllowOverride all
107 Require all granted
108 <FilesMatch "\.php$">
109 SetHandler "proxy:unix:/var/run/phpfpm/tools.sock|fcgi://localhost"
110 </FilesMatch>
111 </Directory>
112 ''
113 adminer.apache.vhostConf
114 ympd.apache.vhostConf
115 ttrss.apache.vhostConf
116 roundcubemail.apache.vhostConf
117 wallabag.apache.vhostConf
118 yourls.apache.vhostConf
119 rompr.apache.vhostConf
120 shaarli.apache.vhostConf
121 dokuwiki.apache.vhostConf
122 ldap.apache.vhostConf
123 kanboard.apache.vhostConf
124 ];
125 };
126
127 services.websites.env.tools.vhostConfs.outils = {
128 certName = "eldiron";
129 addToCerts = true;
130 hosts = [ "outils.immae.eu" ];
131 root = null;
132 extraConfig = [
133 ''
134 RedirectMatch 301 ^/mediagoblin(.*)$ https://mgoblin.immae.eu$1
135
136 RedirectMatch 301 ^/ether(.*)$ https://ether.immae.eu$1
137
138 RedirectMatch 301 ^/nextcloud(.*)$ https://cloud.immae.eu$1
139 RedirectMatch 301 ^/owncloud(.*)$ https://cloud.immae.eu$1
140
141 RedirectMatch 301 ^/carddavmate(.*)$ https://dav.immae.eu/infcloud$1
142 RedirectMatch 301 ^/caldavzap(.*)$ https://dav.immae.eu/infcloud$1
143 RedirectMatch 301 ^/caldav.php(.*)$ https://dav.immae.eu/caldav.php$1
144 RedirectMatch 301 ^/davical(.*)$ https://dav.immae.eu/davical$1
145
146 RedirectMatch 301 ^/taskweb(.*)$ https://task.immae.eu/taskweb$1
147
148 RedirectMatch 301 ^/(.*)$ https://tools.immae.eu/$1
149 ''
150 ];
151 };
152
153 systemd.services = {
154 phpfpm-dokuwiki = {
155 after = lib.mkAfter dokuwiki.phpFpm.serviceDeps;
156 wants = dokuwiki.phpFpm.serviceDeps;
157 };
158 phpfpm-kanboard = {
159 after = lib.mkAfter kanboard.phpFpm.serviceDeps;
160 wants = kanboard.phpFpm.serviceDeps;
161 };
162 phpfpm-ldap = {
163 after = lib.mkAfter ldap.phpFpm.serviceDeps;
164 wants = ldap.phpFpm.serviceDeps;
165 };
166 phpfpm-rainloop = {
167 after = lib.mkAfter rainloop.phpFpm.serviceDeps;
168 wants = rainloop.phpFpm.serviceDeps;
169 };
170 phpfpm-roundcubemail = {
171 after = lib.mkAfter roundcubemail.phpFpm.serviceDeps;
172 wants = roundcubemail.phpFpm.serviceDeps;
173 };
174 phpfpm-shaarli = {
175 after = lib.mkAfter shaarli.phpFpm.serviceDeps;
176 wants = shaarli.phpFpm.serviceDeps;
177 };
178 phpfpm-ttrss = {
179 after = lib.mkAfter ttrss.phpFpm.serviceDeps;
180 wants = ttrss.phpFpm.serviceDeps;
181 };
182 phpfpm-wallabag = {
183 after = lib.mkAfter wallabag.phpFpm.serviceDeps;
184 wants = wallabag.phpFpm.serviceDeps;
185 preStart = lib.mkAfter wallabag.phpFpm.preStart;
186 };
187 phpfpm-yourls = {
188 after = lib.mkAfter yourls.phpFpm.serviceDeps;
189 wants = yourls.phpFpm.serviceDeps;
190 };
191 ympd = {
192 description = "Standalone MPD Web GUI written in C";
193 wantedBy = [ "multi-user.target" ];
194 script = ''
195 export MPD_PASSWORD=$(cat /var/secrets/mpd)
196 ${pkgs.ympd}/bin/ympd --host ${ympd.config.host} --port ${toString ympd.config.port} --webport ${ympd.config.webPort} --user nobody
197 '';
198 };
199 tt-rss = {
200 description = "Tiny Tiny RSS feeds update daemon";
201 serviceConfig = {
202 User = "wwwrun";
203 ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
204 StandardOutput = "syslog";
205 StandardError = "syslog";
206 PermissionsStartOnly = true;
207 };
208
209 wantedBy = [ "multi-user.target" ];
210 requires = ["postgresql.service"];
211 after = ["network.target" "postgresql.service"];
212 };
213 };
214
215 services.filesWatcher.ympd = {
216 restart = true;
217 paths = [ "/var/secrets/mpd" ];
218 };
219
220 services.phpfpm.pools.roundcubemail = {
221 listen = roundcubemail.phpFpm.socket;
222 extraConfig = roundcubemail.phpFpm.pool;
223 phpOptions = config.services.phpfpm.phpOptions + roundcubemail.phpFpm.phpConfig;
224 };
225
226 services.phpfpm.pools.devtools = {
227 listen = "/var/run/phpfpm/devtools.sock";
228 extraConfig = ''
229 user = wwwrun
230 group = wwwrun
231 listen.owner = wwwrun
232 listen.group = wwwrun
233 pm = dynamic
234 pm.max_children = 60
235 pm.start_servers = 2
236 pm.min_spare_servers = 1
237 pm.max_spare_servers = 10
238
239 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
240 '';
241 phpOptions = config.services.phpfpm.phpOptions + ''
242 extension=${pkgs.phpPackages.redis}/lib/php/extensions/redis.so
243 extension=${pkgs.phpPackages.apcu}/lib/php/extensions/apcu.so
244 zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
245 '';
246 };
247
248 services.phpfpm.poolConfigs = {
249 adminer = adminer.phpFpm.pool;
250 ttrss = ttrss.phpFpm.pool;
251 wallabag = wallabag.phpFpm.pool;
252 yourls = yourls.phpFpm.pool;
253 rompr = rompr.phpFpm.pool;
254 shaarli = shaarli.phpFpm.pool;
255 dokuwiki = dokuwiki.phpFpm.pool;
256 ldap = ldap.phpFpm.pool;
257 rainloop = rainloop.phpFpm.pool;
258 kanboard = kanboard.phpFpm.pool;
259 tools = ''
260 listen = /var/run/phpfpm/tools.sock
261 user = wwwrun
262 group = wwwrun
263 listen.owner = wwwrun
264 listen.group = wwwrun
265 pm = dynamic
266 pm.max_children = 60
267 pm.start_servers = 2
268 pm.min_spare_servers = 1
269 pm.max_spare_servers = 10
270
271 ; Needed to avoid clashes in browser cookies (same domain)
272 php_value[session.name] = ToolsPHPSESSID
273 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/tools.immae.eu:/tmp"
274 '';
275 };
276
277 system.activationScripts = {
278 adminer = adminer.activationScript;
279 ttrss = ttrss.activationScript;
280 roundcubemail = roundcubemail.activationScript;
281 wallabag = wallabag.activationScript;
282 yourls = yourls.activationScript;
283 rompr = rompr.activationScript;
284 shaarli = shaarli.activationScript;
285 dokuwiki = dokuwiki.activationScript;
286 rainloop = rainloop.activationScript;
287 kanboard = kanboard.activationScript;
288 ldap = ldap.activationScript;
289 };
290
291 myServices.websites.webappDirs = {
292 _adminer = adminer.webRoot;
293 "${dokuwiki.apache.webappName}" = dokuwiki.webRoot;
294 "${ldap.apache.webappName}" = "${ldap.webRoot}/htdocs";
295 "${rompr.apache.webappName}" = rompr.webRoot;
296 "${roundcubemail.apache.webappName}" = roundcubemail.webRoot;
297 "${shaarli.apache.webappName}" = shaarli.webRoot;
298 "${ttrss.apache.webappName}" = ttrss.webRoot;
299 "${wallabag.apache.webappName}" = wallabag.webRoot;
300 "${yourls.apache.webappName}" = yourls.webRoot;
301 "${rainloop.apache.webappName}" = rainloop.webRoot;
302 "${kanboard.apache.webappName}" = kanboard.webRoot;
303 };
304
305 services.websites.env.tools.watchPaths = [
306 "/var/secrets/webapps/tools-shaarli"
307 ];
308 services.filesWatcher.phpfpm-wallabag = {
309 restart = true;
310 paths = [ "/var/secrets/webapps/tools-wallabag" ];
311 };
312 };
313 }
314