]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - nixops/modules/websites/tools/tools/default.nix
061c0043637e3caed1dfc34db3da35920878ad8d
[perso/Immae/Config/Nix.git] / nixops / modules / websites / tools / tools / default.nix
1 { lib, pkgs, config, myconfig, ... }:
2 let
3 adminer = pkgs.callPackage ../../commons/adminer.nix {};
4 ympd = pkgs.callPackage ./ympd.nix {
5 env = myconfig.env.tools.ympd;
6 };
7 ttrss = pkgs.callPackage ./ttrss.nix {
8 inherit (pkgs.webapps) ttrss ttrss-plugins;
9 env = myconfig.env.tools.ttrss;
10 };
11 roundcubemail = pkgs.callPackage ./roundcubemail.nix {
12 inherit (pkgs.webapps) roundcubemail roundcubemail-plugins roundcubemail-skins;
13 env = myconfig.env.tools.roundcubemail;
14 };
15 rainloop = pkgs.callPackage ./rainloop.nix {};
16 kanboard = pkgs.callPackage ./kanboard.nix {
17 env = myconfig.env.tools.kanboard;
18 };
19 wallabag = pkgs.callPackage ./wallabag.nix {
20 inherit (pkgs.webapps) wallabag;
21 env = myconfig.env.tools.wallabag;
22 };
23 yourls = pkgs.callPackage ./yourls.nix {
24 inherit (pkgs.webapps) yourls yourls-plugins;
25 env = myconfig.env.tools.yourls;
26 };
27 rompr = pkgs.callPackage ./rompr.nix {
28 inherit (pkgs.webapps) rompr;
29 env = myconfig.env.tools.rompr;
30 };
31 shaarli = pkgs.callPackage ./shaarli.nix {
32 env = myconfig.env.tools.shaarli;
33 };
34 dokuwiki = pkgs.callPackage ./dokuwiki.nix {
35 inherit (pkgs.webapps) dokuwiki dokuwiki-plugins;
36 };
37 ldap = pkgs.callPackage ./ldap.nix {
38 inherit (pkgs.webapps) phpldapadmin;
39 env = myconfig.env.tools.phpldapadmin;
40 };
41
42 cfg = config.services.myWebsites.tools.tools;
43 in {
44 options.services.myWebsites.tools.tools = {
45 enable = lib.mkEnableOption "enable tools website";
46 };
47
48 config = lib.mkIf cfg.enable {
49 secrets.keys =
50 kanboard.keys
51 ++ ldap.keys
52 ++ roundcubemail.keys
53 ++ shaarli.keys
54 ++ ttrss.keys
55 ++ wallabag.keys
56 ++ yourls.keys;
57
58 services.websites.integration.modules =
59 rainloop.apache.modules;
60
61 services.websites.tools.modules =
62 [ "proxy_fcgi" ]
63 ++ adminer.apache.modules
64 ++ ympd.apache.modules
65 ++ ttrss.apache.modules
66 ++ roundcubemail.apache.modules
67 ++ wallabag.apache.modules
68 ++ yourls.apache.modules
69 ++ rompr.apache.modules
70 ++ shaarli.apache.modules
71 ++ dokuwiki.apache.modules
72 ++ ldap.apache.modules
73 ++ kanboard.apache.modules;
74
75 systemd.services.ympd = {
76 description = "Standalone MPD Web GUI written in C";
77 wantedBy = [ "multi-user.target" ];
78 script = ''
79 export MPD_PASSWORD=$(cat /var/secrets/mpd)
80 ${pkgs.ympd}/bin/ympd --host ${ympd.config.host} --port ${toString ympd.config.port} --webport ${ympd.config.webPort} --user nobody
81 '';
82 };
83
84 services.websites.integration.vhostConfs.devtools = {
85 certName = "eldiron";
86 addToCerts = true;
87 hosts = ["devtools.immae.eu" ];
88 root = "/var/lib/ftp/devtools.immae.eu";
89 extraConfig = [
90 ''
91 <Directory "/var/lib/ftp/devtools.immae.eu">
92 DirectoryIndex index.php index.htm index.html
93 AllowOverride all
94 Require all granted
95 <FilesMatch "\.php$">
96 SetHandler "proxy:unix:/var/run/phpfpm/devtools.sock|fcgi://localhost"
97 </FilesMatch>
98 </Directory>
99 ''
100 rainloop.apache.vhostConf
101 ];
102 };
103
104 services.websites.tools.vhostConfs.tools = {
105 certName = "eldiron";
106 addToCerts = true;
107 hosts = ["tools.immae.eu" ];
108 root = "/var/lib/ftp/tools.immae.eu";
109 extraConfig = [
110 ''
111 <Directory "/var/lib/ftp/tools.immae.eu">
112 DirectoryIndex index.php index.htm index.html
113 AllowOverride all
114 Require all granted
115 <FilesMatch "\.php$">
116 SetHandler "proxy:unix:/var/run/phpfpm/tools.sock|fcgi://localhost"
117 </FilesMatch>
118 </Directory>
119 ''
120 adminer.apache.vhostConf
121 ympd.apache.vhostConf
122 ttrss.apache.vhostConf
123 roundcubemail.apache.vhostConf
124 wallabag.apache.vhostConf
125 yourls.apache.vhostConf
126 rompr.apache.vhostConf
127 shaarli.apache.vhostConf
128 dokuwiki.apache.vhostConf
129 ldap.apache.vhostConf
130 kanboard.apache.vhostConf
131 ];
132 };
133
134 services.websites.tools.vhostConfs.outils = {
135 certName = "eldiron";
136 addToCerts = true;
137 hosts = [ "outils.immae.eu" ];
138 root = null;
139 extraConfig = [
140 ''
141 RedirectMatch 301 ^/mediagoblin(.*)$ https://mgoblin.immae.eu$1
142
143 RedirectMatch 301 ^/ether(.*)$ https://ether.immae.eu$1
144
145 RedirectMatch 301 ^/nextcloud(.*)$ https://cloud.immae.eu$1
146 RedirectMatch 301 ^/owncloud(.*)$ https://cloud.immae.eu$1
147
148 RedirectMatch 301 ^/carddavmate(.*)$ https://dav.immae.eu/infcloud$1
149 RedirectMatch 301 ^/caldavzap(.*)$ https://dav.immae.eu/infcloud$1
150 RedirectMatch 301 ^/caldav.php(.*)$ https://dav.immae.eu/caldav.php$1
151 RedirectMatch 301 ^/davical(.*)$ https://dav.immae.eu/davical$1
152
153 RedirectMatch 301 ^/taskweb(.*)$ https://task.immae.eu/taskweb$1
154
155 RedirectMatch 301 ^/(.*)$ https://tools.immae.eu/$1
156 ''
157 ];
158 };
159
160 services.myPhpfpm.serviceDependencies = {
161 dokuwiki = dokuwiki.phpFpm.serviceDeps;
162 kanboard = kanboard.phpFpm.serviceDeps;
163 ldap = ldap.phpFpm.serviceDeps;
164 rainloop = rainloop.phpFpm.serviceDeps;
165 roundcubemail = roundcubemail.phpFpm.serviceDeps;
166 shaarli = shaarli.phpFpm.serviceDeps;
167 ttrss = ttrss.phpFpm.serviceDeps;
168 wallabag = wallabag.phpFpm.serviceDeps;
169 yourls = yourls.phpFpm.serviceDeps;
170 };
171
172 services.myPhpfpm.poolPhpConfigs = {
173 devtools = ''
174 extension=${pkgs.phpPackages.redis}/lib/php/extensions/redis.so
175 extension=${pkgs.phpPackages.apcu}/lib/php/extensions/apcu.so
176 zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
177 '';
178 roundcubemail = roundcubemail.phpFpm.phpConfig;
179 };
180 services.myPhpfpm.preStart = {
181 wallabag = wallabag.phpFpm.preStart;
182 };
183 services.myPhpfpm.poolConfigs = {
184 adminer = adminer.phpFpm.pool;
185 ttrss = ttrss.phpFpm.pool;
186 roundcubemail = roundcubemail.phpFpm.pool;
187 wallabag = wallabag.phpFpm.pool;
188 yourls = yourls.phpFpm.pool;
189 rompr = rompr.phpFpm.pool;
190 shaarli = shaarli.phpFpm.pool;
191 dokuwiki = dokuwiki.phpFpm.pool;
192 ldap = ldap.phpFpm.pool;
193 rainloop = rainloop.phpFpm.pool;
194 kanboard = kanboard.phpFpm.pool;
195 devtools = ''
196 listen = /var/run/phpfpm/devtools.sock
197 user = wwwrun
198 group = wwwrun
199 listen.owner = wwwrun
200 listen.group = wwwrun
201 pm = dynamic
202 pm.max_children = 60
203 pm.start_servers = 2
204 pm.min_spare_servers = 1
205 pm.max_spare_servers = 10
206
207 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
208 '';
209 tools = ''
210 listen = /var/run/phpfpm/tools.sock
211 user = wwwrun
212 group = wwwrun
213 listen.owner = wwwrun
214 listen.group = wwwrun
215 pm = dynamic
216 pm.max_children = 60
217 pm.start_servers = 2
218 pm.min_spare_servers = 1
219 pm.max_spare_servers = 10
220
221 ; Needed to avoid clashes in browser cookies (same domain)
222 php_value[session.name] = ToolsPHPSESSID
223 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/tools.immae.eu:/tmp"
224 '';
225 };
226
227 system.activationScripts = {
228 ttrss = ttrss.activationScript;
229 roundcubemail = roundcubemail.activationScript;
230 wallabag = wallabag.activationScript;
231 yourls = yourls.activationScript;
232 rompr = rompr.activationScript;
233 shaarli = shaarli.activationScript;
234 dokuwiki = dokuwiki.activationScript;
235 rainloop = rainloop.activationScript;
236 kanboard = kanboard.activationScript;
237 };
238
239 system.extraSystemBuilderCmds = ''
240 mkdir -p $out/webapps
241 ln -s ${dokuwiki.webRoot} $out/webapps/${dokuwiki.apache.webappName}
242 ln -s ${ldap.webRoot}/htdocs $out/webapps/${ldap.apache.webappName}
243 ln -s ${rompr.webRoot} $out/webapps/${rompr.apache.webappName}
244 ln -s ${roundcubemail.webRoot} $out/webapps/${roundcubemail.apache.webappName}
245 ln -s ${shaarli.webRoot} $out/webapps/${shaarli.apache.webappName}
246 ln -s ${ttrss.webRoot} $out/webapps/${ttrss.apache.webappName}
247 ln -s ${wallabag.webRoot} $out/webapps/${wallabag.apache.webappName}
248 ln -s ${yourls.webRoot} $out/webapps/${yourls.apache.webappName}
249 ln -s ${rainloop.webRoot} $out/webapps/${rainloop.apache.webappName}
250 ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
251 '';
252
253 systemd.services.tt-rss = {
254 description = "Tiny Tiny RSS feeds update daemon";
255 serviceConfig = {
256 User = "wwwrun";
257 ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
258 StandardOutput = "syslog";
259 StandardError = "syslog";
260 PermissionsStartOnly = true;
261 };
262
263 wantedBy = [ "multi-user.target" ];
264 requires = ["postgresql.service"];
265 after = ["network.target" "postgresql.service"];
266 };
267
268 };
269 }
270