1 { lib, pkgs, config, myconfig, mylibs, ... }:
3 adminer = pkgs.callPackage ../../commons/adminer.nix {};
4 ympd = pkgs.callPackage ./ympd.nix {
5 env = myconfig.env.tools.ympd;
7 ttrss = pkgs.callPackage ./ttrss.nix {
8 inherit (mylibs) fetchedGithub fetchedGit;
9 env = myconfig.env.tools.ttrss;
11 roundcubemail = pkgs.callPackage ./roundcubemail.nix {
12 inherit (mylibs) fetchedGithub;
13 env = myconfig.env.tools.roundcubemail;
15 rainloop = pkgs.callPackage ./rainloop.nix {};
16 kanboard = pkgs.callPackage ./kanboard.nix {
17 inherit (mylibs) fetchedGithub;
18 env = myconfig.env.tools.kanboard;
20 wallabag = pkgs.callPackage ./wallabag.nix { env = myconfig.env.tools.wallabag; };
21 yourls = pkgs.callPackage ./yourls.nix {
22 inherit (mylibs) fetchedGithub;
23 env = myconfig.env.tools.yourls;
25 rompr = pkgs.callPackage ./rompr.nix {
26 inherit (mylibs) fetchedGithub;
27 env = myconfig.env.tools.rompr;
29 shaarli = pkgs.callPackage ./shaarli.nix {
30 env = myconfig.env.tools.shaarli;
32 dokuwiki = pkgs.callPackage ./dokuwiki.nix {
33 inherit (mylibs) fetchedGithub;
35 ldap = pkgs.callPackage ./ldap.nix {
36 env = myconfig.env.tools.phpldapadmin;
39 cfg = config.services.myWebsites.tools.tools;
41 options.services.myWebsites.tools.tools = {
42 enable = lib.mkEnableOption "enable tools website";
45 config = lib.mkIf cfg.enable {
46 security.acme.certs."eldiron".extraDomains."tools.immae.eu" = null;
47 security.acme.certs."eldiron".extraDomains."devtools.immae.eu" = null;
58 services.myWebsites.integration.modules =
59 rainloop.apache.modules;
61 services.myWebsites.tools.modules =
63 ++ adminer.apache.modules
64 ++ ympd.apache.modules
65 ++ ttrss.apache.modules
66 ++ roundcubemail.apache.modules
67 ++ wallabag.apache.modules
68 ++ yourls.apache.modules
69 ++ rompr.apache.modules
70 ++ shaarli.apache.modules
71 ++ dokuwiki.apache.modules
72 ++ ldap.apache.modules
73 ++ kanboard.apache.modules;
75 services.ympd = ympd.config // { enable = true; };
77 services.myWebsites.integration.vhostConfs.devtools = {
79 hosts = ["devtools.immae.eu" ];
80 root = "/var/lib/ftp/devtools.immae.eu";
83 <Directory "/var/lib/ftp/devtools.immae.eu">
84 DirectoryIndex index.php index.htm index.html
88 SetHandler "proxy:unix:/var/run/phpfpm/devtools.sock|fcgi://localhost"
92 rainloop.apache.vhostConf
96 services.myWebsites.tools.vhostConfs.tools = {
98 hosts = ["tools.immae.eu" ];
99 root = "/var/lib/ftp/tools.immae.eu";
102 <Directory "/var/lib/ftp/tools.immae.eu">
103 DirectoryIndex index.php index.htm index.html
106 <FilesMatch "\.php$">
107 SetHandler "proxy:unix:/var/run/phpfpm/tools.sock|fcgi://localhost"
111 adminer.apache.vhostConf
112 ympd.apache.vhostConf
113 ttrss.apache.vhostConf
114 roundcubemail.apache.vhostConf
115 wallabag.apache.vhostConf
116 yourls.apache.vhostConf
117 rompr.apache.vhostConf
118 shaarli.apache.vhostConf
119 dokuwiki.apache.vhostConf
120 ldap.apache.vhostConf
121 kanboard.apache.vhostConf
125 security.acme.certs."eldiron".extraDomains."outils.immae.eu" = null;
126 services.myWebsites.tools.vhostConfs.outils = {
127 certName = "eldiron";
128 hosts = [ "outils.immae.eu" ];
132 RedirectMatch 301 ^/mediagoblin(.*)$ https://mgoblin.immae.eu$1
134 RedirectMatch 301 ^/ether(.*)$ https://ether.immae.eu$1
136 RedirectMatch 301 ^/nextcloud(.*)$ https://cloud.immae.eu$1
137 RedirectMatch 301 ^/owncloud(.*)$ https://cloud.immae.eu$1
139 RedirectMatch 301 ^/carddavmate(.*)$ https://dav.immae.eu/infcloud$1
140 RedirectMatch 301 ^/caldavzap(.*)$ https://dav.immae.eu/infcloud$1
141 RedirectMatch 301 ^/caldav.php(.*)$ https://dav.immae.eu/caldav.php$1
142 RedirectMatch 301 ^/davical(.*)$ https://dav.immae.eu/davical$1
144 RedirectMatch 301 ^/taskweb(.*)$ https://task.immae.eu/taskweb$1
146 RedirectMatch 301 ^/(.*)$ https://tools.immae.eu/$1
151 services.myPhpfpm.serviceDependencies = {
152 dokuwiki = dokuwiki.phpFpm.serviceDeps;
153 kanboard = kanboard.phpFpm.serviceDeps;
154 ldap = ldap.phpFpm.serviceDeps;
155 rainloop = rainloop.phpFpm.serviceDeps;
156 roundcubemail = roundcubemail.phpFpm.serviceDeps;
157 shaarli = shaarli.phpFpm.serviceDeps;
158 ttrss = ttrss.phpFpm.serviceDeps;
159 wallabag = wallabag.phpFpm.serviceDeps;
160 yourls = yourls.phpFpm.serviceDeps;
163 services.myPhpfpm.poolPhpConfigs = {
165 extension=${pkgs.phpPackages.redis}/lib/php/extensions/redis.so
166 extension=${pkgs.phpPackages.apcu}/lib/php/extensions/apcu.so
167 zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
169 roundcubemail = roundcubemail.phpFpm.phpConfig;
171 services.myPhpfpm.poolConfigs = {
172 adminer = adminer.phpFpm.pool;
173 ttrss = ttrss.phpFpm.pool;
174 roundcubemail = roundcubemail.phpFpm.pool;
175 wallabag = wallabag.phpFpm.pool;
176 yourls = yourls.phpFpm.pool;
177 rompr = rompr.phpFpm.pool;
178 shaarli = shaarli.phpFpm.pool;
179 dokuwiki = dokuwiki.phpFpm.pool;
180 ldap = ldap.phpFpm.pool;
181 rainloop = rainloop.phpFpm.pool;
182 kanboard = kanboard.phpFpm.pool;
184 listen = /var/run/phpfpm/devtools.sock
187 listen.owner = wwwrun
188 listen.group = wwwrun
192 pm.min_spare_servers = 1
193 pm.max_spare_servers = 10
195 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
198 listen = /var/run/phpfpm/tools.sock
201 listen.owner = wwwrun
202 listen.group = wwwrun
206 pm.min_spare_servers = 1
207 pm.max_spare_servers = 10
209 ; Needed to avoid clashes in browser cookies (same domain)
210 php_value[session.name] = ToolsPHPSESSID
211 php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/tools.immae.eu:/tmp"
215 system.activationScripts = {
216 ttrss = ttrss.activationScript;
217 roundcubemail = roundcubemail.activationScript;
218 wallabag = wallabag.activationScript;
219 yourls = yourls.activationScript;
220 rompr = rompr.activationScript;
221 shaarli = shaarli.activationScript;
222 dokuwiki = dokuwiki.activationScript;
223 rainloop = rainloop.activationScript;
224 kanboard = kanboard.activationScript;
227 system.extraSystemBuilderCmds = ''
228 mkdir -p $out/webapps
229 ln -s ${dokuwiki.webRoot} $out/webapps/${dokuwiki.apache.webappName}
230 ln -s ${ldap.webRoot}/htdocs $out/webapps/${ldap.apache.webappName}
231 ln -s ${rompr.webRoot} $out/webapps/${rompr.apache.webappName}
232 ln -s ${roundcubemail.webRoot} $out/webapps/${roundcubemail.apache.webappName}
233 ln -s ${shaarli.webRoot} $out/webapps/${shaarli.apache.webappName}
234 ln -s ${ttrss.webRoot} $out/webapps/${ttrss.apache.webappName}
235 ln -s ${wallabag.webRoot} $out/webapps/${wallabag.apache.webappName}
236 ln -s ${yourls.webRoot} $out/webapps/${yourls.apache.webappName}
237 ln -s ${rainloop.webRoot} $out/webapps/${rainloop.apache.webappName}
238 ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
241 nixpkgs.overlays = [ (self: super: rec {
242 ympd = super.ympd.overrideAttrs(old: mylibs.fetchedGithub ./ympd.json);
245 systemd.services.tt-rss = {
246 description = "Tiny Tiny RSS feeds update daemon";
249 ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
250 StandardOutput = "syslog";
251 StandardError = "syslog";
252 PermissionsStartOnly = true;
255 wantedBy = [ "multi-user.target" ];
256 requires = ["postgresql.service"];
257 after = ["network.target" "postgresql.service"];