]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - nixops/modules/websites/tools/tools/default.nix
Improve shaarli keys handling
[perso/Immae/Config/Nix.git] / nixops / modules / websites / tools / tools / default.nix
1 { lib, pkgs, config, myconfig, mylibs, ... }:
2 let
3 adminer = pkgs.callPackage ../../commons/adminer.nix {};
4 ympd = pkgs.callPackage ./ympd.nix {
5 env = myconfig.env.tools.ympd;
6 };
7 ttrss = pkgs.callPackage ./ttrss.nix {
8 inherit (mylibs) fetchedGithub fetchedGit;
9 env = myconfig.env.tools.ttrss;
10 };
11 roundcubemail = pkgs.callPackage ./roundcubemail.nix {
12 inherit (mylibs) fetchedGithub;
13 env = myconfig.env.tools.roundcubemail;
14 };
15 rainloop = pkgs.callPackage ./rainloop.nix {};
16 kanboard = pkgs.callPackage ./kanboard.nix {
17 inherit (mylibs) fetchedGithub;
18 env = myconfig.env.tools.kanboard;
19 };
20 wallabag = pkgs.callPackage ./wallabag.nix { env = myconfig.env.tools.wallabag; };
21 yourls = pkgs.callPackage ./yourls.nix {
22 inherit (mylibs) fetchedGithub;
23 env = myconfig.env.tools.yourls;
24 };
25 rompr = pkgs.callPackage ./rompr.nix {
26 inherit (mylibs) fetchedGithub;
27 env = myconfig.env.tools.rompr;
28 };
29 shaarli = pkgs.callPackage ./shaarli.nix {
30 env = myconfig.env.tools.shaarli;
31 };
32 dokuwiki = pkgs.callPackage ./dokuwiki.nix {
33 inherit (mylibs) fetchedGithub;
34 };
35 ldap = pkgs.callPackage ./ldap.nix {
36 env = myconfig.env.tools.phpldapadmin;
37 };
38
39 cfg = config.services.myWebsites.tools.tools;
40 in {
41 options.services.myWebsites.tools.tools = {
42 enable = lib.mkEnableOption "enable tools website";
43 };
44
45 config = lib.mkIf cfg.enable {
46 security.acme.certs."eldiron".extraDomains."tools.immae.eu" = null;
47 security.acme.certs."eldiron".extraDomains."devtools.immae.eu" = null;
48
49 deployment.keys =
50 kanboard.keys
51 // ldap.keys
52 // roundcubemail.keys
53 // shaarli.keys
54 // ttrss.keys
55 // wallabag.keys
56 // yourls.keys;
57
58 services.myWebsites.integration.modules =
59 rainloop.apache.modules;
60
61 services.myWebsites.tools.modules =
62 [ "proxy_fcgi" ]
63 ++ adminer.apache.modules
64 ++ ympd.apache.modules
65 ++ ttrss.apache.modules
66 ++ roundcubemail.apache.modules
67 ++ wallabag.apache.modules
68 ++ yourls.apache.modules
69 ++ rompr.apache.modules
70 ++ shaarli.apache.modules
71 ++ dokuwiki.apache.modules
72 ++ ldap.apache.modules
73 ++ kanboard.apache.modules;
74
75 services.ympd = ympd.config // { enable = true; };
76
77 services.myWebsites.integration.vhostConfs.devtools = {
78 certName = "eldiron";
79 hosts = ["devtools.immae.eu" ];
80 root = null;
81 extraConfig = [
82 rainloop.apache.vhostConf
83 ];
84 };
85
86 services.myWebsites.tools.vhostConfs.tools = {
87 certName = "eldiron";
88 hosts = ["tools.immae.eu" ];
89 root = "/var/lib/ftp/tools.immae.eu";
90 extraConfig = [
91 ''
92 <Directory "/var/lib/ftp/tools.immae.eu">
93 DirectoryIndex index.php index.htm index.html
94 AllowOverride all
95 Require all granted
96 <FilesMatch "\.php$">
97 SetHandler "proxy:unix:/var/run/phpfpm/tools.sock|fcgi://localhost"
98 </FilesMatch>
99 </Directory>
100 ''
101 adminer.apache.vhostConf
102 ympd.apache.vhostConf
103 ttrss.apache.vhostConf
104 roundcubemail.apache.vhostConf
105 wallabag.apache.vhostConf
106 yourls.apache.vhostConf
107 rompr.apache.vhostConf
108 shaarli.apache.vhostConf
109 dokuwiki.apache.vhostConf
110 ldap.apache.vhostConf
111 kanboard.apache.vhostConf
112 ];
113 };
114
115 security.acme.certs."eldiron".extraDomains."outils.immae.eu" = null;
116 services.myWebsites.tools.vhostConfs.outils = {
117 certName = "eldiron";
118 hosts = [ "outils.immae.eu" ];
119 root = null;
120 extraConfig = [
121 ''
122 RedirectMatch 301 ^/mediagoblin(.*)$ https://mgoblin.immae.eu$1
123
124 RedirectMatch 301 ^/ether(.*)$ https://ether.immae.eu$1
125
126 RedirectMatch 301 ^/nextcloud(.*)$ https://cloud.immae.eu$1
127 RedirectMatch 301 ^/owncloud(.*)$ https://cloud.immae.eu$1
128
129 RedirectMatch 301 ^/carddavmate(.*)$ https://dav.immae.eu/infcloud$1
130 RedirectMatch 301 ^/caldavzap(.*)$ https://dav.immae.eu/infcloud$1
131 RedirectMatch 301 ^/caldav.php(.*)$ https://dav.immae.eu/caldav.php$1
132 RedirectMatch 301 ^/davical(.*)$ https://dav.immae.eu/davical$1
133
134 RedirectMatch 301 ^/taskweb(.*)$ https://task.immae.eu/taskweb$1
135
136 RedirectMatch 301 ^/(.*)$ https://tools.immae.eu/$1
137 ''
138 ];
139 };
140
141 services.myPhpfpm.serviceDependencies = {
142 dokuwiki = dokuwiki.phpFpm.serviceDeps;
143 kanboard = kanboard.phpFpm.serviceDeps;
144 ldap = ldap.phpFpm.serviceDeps;
145 rainloop = rainloop.phpFpm.serviceDeps;
146 roundcubemail = roundcubemail.phpFpm.serviceDeps;
147 shaarli = shaarli.phpFpm.serviceDeps;
148 ttrss = ttrss.phpFpm.serviceDeps;
149 wallabag = wallabag.phpFpm.serviceDeps;
150 yourls = yourls.phpFpm.serviceDeps;
151 };
152
153 services.myPhpfpm.poolPhpConfigs.roundcubemail = roundcubemail.phpFpm.phpConfig;
154 services.myPhpfpm.poolConfigs = {
155 adminer = adminer.phpFpm.pool;
156 ttrss = ttrss.phpFpm.pool;
157 roundcubemail = roundcubemail.phpFpm.pool;
158 wallabag = wallabag.phpFpm.pool;
159 yourls = yourls.phpFpm.pool;
160 rompr = rompr.phpFpm.pool;
161 shaarli = shaarli.phpFpm.pool;
162 dokuwiki = dokuwiki.phpFpm.pool;
163 ldap = ldap.phpFpm.pool;
164 rainloop = rainloop.phpFpm.pool;
165 kanboard = kanboard.phpFpm.pool;
166 tools = ''
167 listen = /var/run/phpfpm/tools.sock
168 user = wwwrun
169 group = wwwrun
170 listen.owner = wwwrun
171 listen.group = wwwrun
172 pm = dynamic
173 pm.max_children = 60
174 pm.start_servers = 2
175 pm.min_spare_servers = 1
176 pm.max_spare_servers = 10
177
178 ; Needed to avoid clashes in browser cookies (same domain)
179 php_value[session.name] = ToolsPHPSESSID
180 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/tools.immae.eu:/tmp"
181 '';
182 };
183
184 system.activationScripts = {
185 ttrss = ttrss.activationScript;
186 roundcubemail = roundcubemail.activationScript;
187 wallabag = wallabag.activationScript;
188 yourls = yourls.activationScript;
189 rompr = rompr.activationScript;
190 shaarli = shaarli.activationScript;
191 dokuwiki = dokuwiki.activationScript;
192 rainloop = rainloop.activationScript;
193 kanboard = kanboard.activationScript;
194 };
195
196 system.extraSystemBuilderCmds = ''
197 mkdir -p $out/webapps
198 ln -s ${dokuwiki.webRoot} $out/webapps/${dokuwiki.apache.webappName}
199 ln -s ${ldap.webRoot}/htdocs $out/webapps/${ldap.apache.webappName}
200 ln -s ${rompr.webRoot} $out/webapps/${rompr.apache.webappName}
201 ln -s ${roundcubemail.webRoot} $out/webapps/${roundcubemail.apache.webappName}
202 ln -s ${shaarli.webRoot} $out/webapps/${shaarli.apache.webappName}
203 ln -s ${ttrss.webRoot} $out/webapps/${ttrss.apache.webappName}
204 ln -s ${wallabag.webRoot} $out/webapps/${wallabag.apache.webappName}
205 ln -s ${yourls.webRoot} $out/webapps/${yourls.apache.webappName}
206 ln -s ${rainloop.webRoot} $out/webapps/${rainloop.apache.webappName}
207 ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
208 '';
209
210 nixpkgs.overlays = [ (self: super: rec {
211 ympd = super.ympd.overrideAttrs(old: mylibs.fetchedGithub ./ympd.json);
212 }) ];
213
214 systemd.services.tt-rss = {
215 description = "Tiny Tiny RSS feeds update daemon";
216 serviceConfig = {
217 User = "wwwrun";
218 ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
219 StandardOutput = "syslog";
220 StandardError = "syslog";
221 PermissionsStartOnly = true;
222 };
223
224 wantedBy = [ "multi-user.target" ];
225 requires = ["postgresql.service"];
226 after = ["network.target" "postgresql.service"];
227 };
228
229 };
230 }
231