]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - nixops/modules/websites/tools/tools/default.nix
Replace myPhpfpm with correct overrides
[perso/Immae/Config/Nix.git] / nixops / modules / websites / tools / tools / default.nix
1 { lib, pkgs, config, myconfig, ... }:
2 let
3 adminer = pkgs.callPackage ../../commons/adminer.nix {};
4 ympd = pkgs.callPackage ./ympd.nix {
5 env = myconfig.env.tools.ympd;
6 };
7 ttrss = pkgs.callPackage ./ttrss.nix {
8 inherit (pkgs.webapps) ttrss ttrss-plugins;
9 env = myconfig.env.tools.ttrss;
10 };
11 roundcubemail = pkgs.callPackage ./roundcubemail.nix {
12 inherit (pkgs.webapps) roundcubemail roundcubemail-plugins roundcubemail-skins;
13 env = myconfig.env.tools.roundcubemail;
14 };
15 rainloop = pkgs.callPackage ./rainloop.nix {};
16 kanboard = pkgs.callPackage ./kanboard.nix {
17 env = myconfig.env.tools.kanboard;
18 };
19 wallabag = pkgs.callPackage ./wallabag.nix {
20 inherit (pkgs.webapps) wallabag;
21 env = myconfig.env.tools.wallabag;
22 };
23 yourls = pkgs.callPackage ./yourls.nix {
24 inherit (pkgs.webapps) yourls yourls-plugins;
25 env = myconfig.env.tools.yourls;
26 };
27 rompr = pkgs.callPackage ./rompr.nix {
28 inherit (pkgs.webapps) rompr;
29 env = myconfig.env.tools.rompr;
30 };
31 shaarli = pkgs.callPackage ./shaarli.nix {
32 env = myconfig.env.tools.shaarli;
33 };
34 dokuwiki = pkgs.callPackage ./dokuwiki.nix {
35 inherit (pkgs.webapps) dokuwiki dokuwiki-plugins;
36 };
37 ldap = pkgs.callPackage ./ldap.nix {
38 inherit (pkgs.webapps) phpldapadmin;
39 env = myconfig.env.tools.phpldapadmin;
40 };
41
42 cfg = config.services.myWebsites.tools.tools;
43 in {
44 options.services.myWebsites.tools.tools = {
45 enable = lib.mkEnableOption "enable tools website";
46 };
47
48 config = lib.mkIf cfg.enable {
49 secrets.keys =
50 kanboard.keys
51 ++ ldap.keys
52 ++ roundcubemail.keys
53 ++ shaarli.keys
54 ++ ttrss.keys
55 ++ wallabag.keys
56 ++ yourls.keys;
57
58 services.websites.integration.modules =
59 rainloop.apache.modules;
60
61 services.websites.tools.modules =
62 [ "proxy_fcgi" ]
63 ++ adminer.apache.modules
64 ++ ympd.apache.modules
65 ++ ttrss.apache.modules
66 ++ roundcubemail.apache.modules
67 ++ wallabag.apache.modules
68 ++ yourls.apache.modules
69 ++ rompr.apache.modules
70 ++ shaarli.apache.modules
71 ++ dokuwiki.apache.modules
72 ++ ldap.apache.modules
73 ++ kanboard.apache.modules;
74
75 services.websites.integration.vhostConfs.devtools = {
76 certName = "eldiron";
77 addToCerts = true;
78 hosts = ["devtools.immae.eu" ];
79 root = "/var/lib/ftp/devtools.immae.eu";
80 extraConfig = [
81 ''
82 <Directory "/var/lib/ftp/devtools.immae.eu">
83 DirectoryIndex index.php index.htm index.html
84 AllowOverride all
85 Require all granted
86 <FilesMatch "\.php$">
87 SetHandler "proxy:unix:/var/run/phpfpm/devtools.sock|fcgi://localhost"
88 </FilesMatch>
89 </Directory>
90 ''
91 rainloop.apache.vhostConf
92 ];
93 };
94
95 services.websites.tools.vhostConfs.tools = {
96 certName = "eldiron";
97 addToCerts = true;
98 hosts = ["tools.immae.eu" ];
99 root = "/var/lib/ftp/tools.immae.eu";
100 extraConfig = [
101 ''
102 <Directory "/var/lib/ftp/tools.immae.eu">
103 DirectoryIndex index.php index.htm index.html
104 AllowOverride all
105 Require all granted
106 <FilesMatch "\.php$">
107 SetHandler "proxy:unix:/var/run/phpfpm/tools.sock|fcgi://localhost"
108 </FilesMatch>
109 </Directory>
110 ''
111 adminer.apache.vhostConf
112 ympd.apache.vhostConf
113 ttrss.apache.vhostConf
114 roundcubemail.apache.vhostConf
115 wallabag.apache.vhostConf
116 yourls.apache.vhostConf
117 rompr.apache.vhostConf
118 shaarli.apache.vhostConf
119 dokuwiki.apache.vhostConf
120 ldap.apache.vhostConf
121 kanboard.apache.vhostConf
122 ];
123 };
124
125 services.websites.tools.vhostConfs.outils = {
126 certName = "eldiron";
127 addToCerts = true;
128 hosts = [ "outils.immae.eu" ];
129 root = null;
130 extraConfig = [
131 ''
132 RedirectMatch 301 ^/mediagoblin(.*)$ https://mgoblin.immae.eu$1
133
134 RedirectMatch 301 ^/ether(.*)$ https://ether.immae.eu$1
135
136 RedirectMatch 301 ^/nextcloud(.*)$ https://cloud.immae.eu$1
137 RedirectMatch 301 ^/owncloud(.*)$ https://cloud.immae.eu$1
138
139 RedirectMatch 301 ^/carddavmate(.*)$ https://dav.immae.eu/infcloud$1
140 RedirectMatch 301 ^/caldavzap(.*)$ https://dav.immae.eu/infcloud$1
141 RedirectMatch 301 ^/caldav.php(.*)$ https://dav.immae.eu/caldav.php$1
142 RedirectMatch 301 ^/davical(.*)$ https://dav.immae.eu/davical$1
143
144 RedirectMatch 301 ^/taskweb(.*)$ https://task.immae.eu/taskweb$1
145
146 RedirectMatch 301 ^/(.*)$ https://tools.immae.eu/$1
147 ''
148 ];
149 };
150
151 systemd.services = {
152 phpfpm-dokuwiki = {
153 after = lib.mkAfter dokuwiki.phpFpm.serviceDeps;
154 wants = dokuwiki.phpFpm.serviceDeps;
155 };
156 phpfpm-kanboard = {
157 after = lib.mkAfter kanboard.phpFpm.serviceDeps;
158 wants = kanboard.phpFpm.serviceDeps;
159 };
160 phpfpm-ldap = {
161 after = lib.mkAfter ldap.phpFpm.serviceDeps;
162 wants = ldap.phpFpm.serviceDeps;
163 };
164 phpfpm-rainloop = {
165 after = lib.mkAfter rainloop.phpFpm.serviceDeps;
166 wants = rainloop.phpFpm.serviceDeps;
167 };
168 phpfpm-roundcubemail = {
169 after = lib.mkAfter roundcubemail.phpFpm.serviceDeps;
170 wants = roundcubemail.phpFpm.serviceDeps;
171 };
172 phpfpm-shaarli = {
173 after = lib.mkAfter shaarli.phpFpm.serviceDeps;
174 wants = shaarli.phpFpm.serviceDeps;
175 };
176 phpfpm-ttrss = {
177 after = lib.mkAfter ttrss.phpFpm.serviceDeps;
178 wants = ttrss.phpFpm.serviceDeps;
179 };
180 phpfpm-wallabag = {
181 after = lib.mkAfter wallabag.phpFpm.serviceDeps;
182 wants = wallabag.phpFpm.serviceDeps;
183 preStart = lib.mkAfter wallabag.phpFpm.preStart;
184 };
185 phpfpm-yourls = {
186 after = lib.mkAfter yourls.phpFpm.serviceDeps;
187 wants = yourls.phpFpm.serviceDeps;
188 };
189 ympd = {
190 description = "Standalone MPD Web GUI written in C";
191 wantedBy = [ "multi-user.target" ];
192 script = ''
193 export MPD_PASSWORD=$(cat /var/secrets/mpd)
194 ${pkgs.ympd}/bin/ympd --host ${ympd.config.host} --port ${toString ympd.config.port} --webport ${ympd.config.webPort} --user nobody
195 '';
196 };
197 tt-rss = {
198 description = "Tiny Tiny RSS feeds update daemon";
199 serviceConfig = {
200 User = "wwwrun";
201 ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
202 StandardOutput = "syslog";
203 StandardError = "syslog";
204 PermissionsStartOnly = true;
205 };
206
207 wantedBy = [ "multi-user.target" ];
208 requires = ["postgresql.service"];
209 after = ["network.target" "postgresql.service"];
210 };
211 };
212
213 services.phpfpm.pools.roundcubemail = {
214 listen = roundcubemail.phpFpm.socket;
215 extraConfig = roundcubemail.phpFpm.pool;
216 phpOptions = config.services.phpfpm.phpOptions + roundcubemail.phpFpm.phpConfig;
217 };
218
219 services.phpfpm.pools.devtools = {
220 listen = "/var/run/phpfpm/devtools.sock";
221 extraConfig = ''
222 user = wwwrun
223 group = wwwrun
224 listen.owner = wwwrun
225 listen.group = wwwrun
226 pm = dynamic
227 pm.max_children = 60
228 pm.start_servers = 2
229 pm.min_spare_servers = 1
230 pm.max_spare_servers = 10
231
232 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
233 '';
234 phpOptions = config.services.phpfpm.phpOptions + ''
235 extension=${pkgs.phpPackages.redis}/lib/php/extensions/redis.so
236 extension=${pkgs.phpPackages.apcu}/lib/php/extensions/apcu.so
237 zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
238 '';
239 };
240
241 services.phpfpm.poolConfigs = {
242 adminer = adminer.phpFpm.pool;
243 ttrss = ttrss.phpFpm.pool;
244 wallabag = wallabag.phpFpm.pool;
245 yourls = yourls.phpFpm.pool;
246 rompr = rompr.phpFpm.pool;
247 shaarli = shaarli.phpFpm.pool;
248 dokuwiki = dokuwiki.phpFpm.pool;
249 ldap = ldap.phpFpm.pool;
250 rainloop = rainloop.phpFpm.pool;
251 kanboard = kanboard.phpFpm.pool;
252 tools = ''
253 listen = /var/run/phpfpm/tools.sock
254 user = wwwrun
255 group = wwwrun
256 listen.owner = wwwrun
257 listen.group = wwwrun
258 pm = dynamic
259 pm.max_children = 60
260 pm.start_servers = 2
261 pm.min_spare_servers = 1
262 pm.max_spare_servers = 10
263
264 ; Needed to avoid clashes in browser cookies (same domain)
265 php_value[session.name] = ToolsPHPSESSID
266 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/tools.immae.eu:/tmp"
267 '';
268 };
269
270 system.activationScripts = {
271 ttrss = ttrss.activationScript;
272 roundcubemail = roundcubemail.activationScript;
273 wallabag = wallabag.activationScript;
274 yourls = yourls.activationScript;
275 rompr = rompr.activationScript;
276 shaarli = shaarli.activationScript;
277 dokuwiki = dokuwiki.activationScript;
278 rainloop = rainloop.activationScript;
279 kanboard = kanboard.activationScript;
280 };
281
282 system.extraSystemBuilderCmds = ''
283 mkdir -p $out/webapps
284 ln -s ${dokuwiki.webRoot} $out/webapps/${dokuwiki.apache.webappName}
285 ln -s ${ldap.webRoot}/htdocs $out/webapps/${ldap.apache.webappName}
286 ln -s ${rompr.webRoot} $out/webapps/${rompr.apache.webappName}
287 ln -s ${roundcubemail.webRoot} $out/webapps/${roundcubemail.apache.webappName}
288 ln -s ${shaarli.webRoot} $out/webapps/${shaarli.apache.webappName}
289 ln -s ${ttrss.webRoot} $out/webapps/${ttrss.apache.webappName}
290 ln -s ${wallabag.webRoot} $out/webapps/${wallabag.apache.webappName}
291 ln -s ${yourls.webRoot} $out/webapps/${yourls.apache.webappName}
292 ln -s ${rainloop.webRoot} $out/webapps/${rainloop.apache.webappName}
293 ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
294 '';
295
296 };
297 }
298