]> git.immae.eu Git - perso/Immae/Config/Nix.git/commitdiff
Replace myPhpfpm with correct overrides
authorIsmaël Bouya <ismael.bouya@normalesup.org>
Tue, 21 May 2019 00:47:52 +0000 (02:47 +0200)
committerIsmaël Bouya <ismael.bouya@normalesup.org>
Tue, 21 May 2019 00:47:52 +0000 (02:47 +0200)
25 files changed:
modules/private/websites/aten/integration.nix
modules/private/websites/aten/production.nix
modules/private/websites/chloe/builder.nix
modules/private/websites/chloe/integration.nix
modules/private/websites/chloe/production.nix
modules/private/websites/connexionswing/builder.nix
modules/private/websites/connexionswing/integration.nix
modules/private/websites/connexionswing/production.nix
modules/private/websites/florian/app.nix
modules/private/websites/immae/production.nix
modules/private/websites/leila/production.nix
modules/private/websites/ludivinecassal/integration.nix
modules/private/websites/ludivinecassal/production.nix
modules/private/websites/naturaloutil/production.nix
modules/private/websites/piedsjaloux/integration.nix
modules/private/websites/piedsjaloux/production.nix
nixops/modules/task/default.nix
nixops/modules/websites/default.nix
nixops/modules/websites/phpfpm/default.nix [deleted file]
nixops/modules/websites/phpfpm/pool-options.nix [deleted file]
nixops/modules/websites/tools/cloud.nix
nixops/modules/websites/tools/dav/default.nix
nixops/modules/websites/tools/git/default.nix
nixops/modules/websites/tools/tools/default.nix
nixops/modules/websites/tools/tools/roundcubemail.nix

index 790c5a93998596635b5ca3df465f7a92eb4e6ba4..5ccc0c1870710e71035bb56ab620613385675079 100644 (file)
@@ -13,9 +13,10 @@ in {
 
   config = lib.mkIf cfg.enable {
     secrets.keys = aten.keys;
-    services.myPhpfpm.preStart.aten_dev = aten.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.aten_dev = aten.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.aten_dev = aten.phpFpm.pool;
+    systemd.services.phpfpm-aten_dev.preStart = lib.mkAfter aten.phpFpm.preStart;
+    systemd.services.phpfpm-aten_dev.after = lib.mkAfter aten.phpFpm.serviceDeps;
+    systemd.services.phpfpm-aten_dev.wants = aten.phpFpm.serviceDeps;
+    services.phpfpm.poolConfigs.aten_dev = aten.phpFpm.pool;
     system.activationScripts.aten_dev = aten.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 697f1b83f247f30570798915768520a75c061af4..7938241ead0c62a3b152fe0be8381ee6f9af9f52 100644 (file)
@@ -15,9 +15,10 @@ in {
     secrets.keys = aten.keys;
     services.webstats.sites = [ { name = "aten.pro"; } ];
 
-    services.myPhpfpm.preStart.aten_prod = aten.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.aten_prod = aten.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.aten_prod = aten.phpFpm.pool;
+    systemd.services.phpfpm-aten_prod.preStart = lib.mkAfter aten.phpFpm.preStart;
+    systemd.services.phpfpm-aten_prod.after = lib.mkAfter aten.phpFpm.serviceDeps;
+    systemd.services.phpfpm-aten_prod.wants = aten.phpFpm.serviceDeps;
+    services.phpfpm.poolConfigs.aten_prod = aten.phpFpm.pool;
     system.activationScripts.aten_prod = aten.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 7b72b9706fb38d9e0cff97914363f32af59a055f..f65e9a9531e4694efb3c8670eccbe9a088bbc88e 100644 (file)
@@ -5,7 +5,6 @@ rec {
     serviceDeps = [ "mysql.service" ];
     socket = "/var/run/phpfpm/chloe-${app.environment}.sock";
     pool = ''
-      listen = ${socket}
       user = ${apacheUser}
       group = ${apacheGroup}
       listen.owner = ${apacheUser}
index 458e41450dc8fb990208ea4d46baf594be5a1233..d49a85c084cfc473528943630a3ae0f90602cae8 100644 (file)
@@ -13,11 +13,15 @@ in {
 
   config = lib.mkIf cfg.enable {
     secrets.keys = chloe.keys;
-    services.myPhpfpm.serviceDependencies.chloe_dev = chloe.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.chloe_dev = chloe.phpFpm.pool;
-    services.myPhpfpm.poolPhpConfigs.chloe_dev = ''
-      extension=${pkgs.php}/lib/php/extensions/mysqli.so
+    systemd.services.phpfpm-chloe_dev.after = lib.mkAfter chloe.phpFpm.serviceDeps;
+    systemd.services.phpfpm-chloe_dev.wants = chloe.phpFpm.serviceDeps;
+    services.phpfpm.pools.chloe_dev = {
+      listen = chloe.phpFpm.socket;
+      extraConfig = chloe.phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + ''
+        extension=${pkgs.php}/lib/php/extensions/mysqli.so
       '';
+    };
     system.activationScripts.chloe_dev = chloe.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 0eafebdc6e76d41160b8b5f8527252536ed52deb..d4b22994d0a98d1c143ea60125253f82904f8323 100644 (file)
@@ -15,11 +15,15 @@ in {
     secrets.keys = chloe.keys;
     services.webstats.sites = [ { name = "osteopathe-cc.fr"; } ];
 
-    services.myPhpfpm.serviceDependencies.chloe_prod = chloe.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.chloe_prod = chloe.phpFpm.pool;
-    services.myPhpfpm.poolPhpConfigs.chloe_prod = ''
-      extension=${pkgs.php}/lib/php/extensions/mysqli.so
+    systemd.services.phpfpm-chloe_prod.after = lib.mkAfter chloe.phpFpm.serviceDeps;
+    systemd.services.phpfpm-chloe_prod.wants = chloe.phpFpm.serviceDeps;
+    services.phpfpm.pools.chloe_prod = {
+      listen = chloe.phpFpm.socket;
+      extraConfig = chloe.phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + ''
+        extension=${pkgs.php}/lib/php/extensions/mysqli.so
       '';
+    };
     system.activationScripts.chloe_prod = chloe.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 1224420b6e57c8a3488d4e3bc0bcf2e06012915a..b4b04cb2275a54c87254d2cd96344601e38a5a6f 100644 (file)
@@ -49,7 +49,6 @@ rec {
       extension=${phpPackages.imagick}/lib/php/extensions/imagick.so
       '';
     pool = ''
-      listen = ${socket}
       user = ${apacheUser}
       group = ${apacheGroup}
       listen.owner = ${apacheUser}
index c3425bdfd659bc7b4ee4a9c72df24e3a05477a93..6570977f6e3d5c891f4cfbacdfcb9365eb5f743a 100644 (file)
@@ -13,10 +13,14 @@ in {
 
   config = lib.mkIf cfg.enable {
     secrets.keys = connexionswing.keys;
-    services.myPhpfpm.preStart.connexionswing_dev = connexionswing.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.connexionswing_dev = connexionswing.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.connexionswing_dev = connexionswing.phpFpm.pool;
-    services.myPhpfpm.poolPhpConfigs.connexionswing_dev = connexionswing.phpFpm.phpConfig;
+    systemd.services.phpfpm-connexionswing_dev.after = lib.mkAfter connexionswing.phpFpm.serviceDeps;
+    systemd.services.phpfpm-connexionswing_dev.wants = connexionswing.phpFpm.serviceDeps;
+    systemd.services.phpfpm-connexionswing_dev.preStart = lib.mkAfter connexionswing.phpFpm.preStart;
+    services.phpfpm.pools.connexionswing_dev = {
+      listen = connexionswing.phpFpm.socket;
+      extraConfig = connexionswing.phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + connexionswing.phpFpm.phpConfig;
+    };
     system.activationScripts.connexionswing_dev = connexionswing.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 8f28f462abef6bff896e382069183aff22213978..b51c549fdbd1abe6342f0e0ba924565b39586ff3 100644 (file)
@@ -15,10 +15,14 @@ in {
     secrets.keys = connexionswing.keys;
     services.webstats.sites = [ { name = "connexionswing.com"; } ];
 
-    services.myPhpfpm.preStart.connexionswing_prod = connexionswing.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.connexionswing_prod = connexionswing.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.connexionswing_prod = connexionswing.phpFpm.pool;
-    services.myPhpfpm.poolPhpConfigs.connexionswing_prod = connexionswing.phpFpm.phpConfig;
+    systemd.services.phpfpm-connexionswing_prod.after = lib.mkAfter connexionswing.phpFpm.serviceDeps;
+    systemd.services.phpfpm-connexionswing_prod.wants = connexionswing.phpFpm.serviceDeps;
+    systemd.services.phpfpm-connexionswing_prod.preStart = lib.mkAfter connexionswing.phpFpm.preStart;
+    services.phpfpm.pools.connexionswing_prod = {
+      listen = connexionswing.phpFpm.socket;
+      extraConfig = connexionswing.phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + connexionswing.phpFpm.phpConfig;
+    };
     system.activationScripts.connexionswing_prod = connexionswing.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 08506e101a36ed05dd766f72e5b64acb09fec884..905c66a0be44f5d41a4346f6fbbf4525bc618a86 100644 (file)
@@ -15,9 +15,10 @@ in {
 
   config = lib.mkIf cfg.enable {
     secrets.keys = tellesflorian.keys;
-    services.myPhpfpm.preStart.tellesflorian_dev = tellesflorian.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.tellesflorian_dev = tellesflorian.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.tellesflorian_dev = tellesflorian.phpFpm.pool;
+    systemd.services.phpfpm-tellesflorian_dev.after = lib.mkAfter tellesflorian.phpFpm.serviceDeps;
+    systemd.services.phpfpm-tellesflorian_dev.wants = tellesflorian.phpFpm.serviceDeps;
+    systemd.services.phpfpm-tellesflorian_dev.preStart = lib.mkAfter tellesflorian.phpFpm.preStart;
+    services.phpfpm.poolConfigs.tellesflorian_dev = tellesflorian.phpFpm.pool;
     system.activationScripts.tellesflorian_dev = tellesflorian.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index 58cf04889587e401e6442e1ef5eb1dd8eabb19b0..c3cabb6ae84e7fb51b469c3ce08eeb25efc403dc 100644 (file)
@@ -9,7 +9,7 @@ in {
   config = lib.mkIf cfg.enable {
     services.webstats.sites = [ { name = "www.immae.eu"; } ];
 
-    services.myPhpfpm.poolConfigs.immae = ''
+    services.phpfpm.poolConfigs.immae = ''
       listen = /run/phpfpm/immae.sock
       user = wwwrun
       group = wwwrun
index 1ce8eea94b327ff991ea4d9bee3db81449e74eea..69c8c4972a3011baaf95edb894e7208e1037e746 100644 (file)
@@ -6,7 +6,7 @@ in {
   options.myServices.websites.leila.production.enable = lib.mkEnableOption "enable Leila's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.myPhpfpm.poolConfigs.leila = ''
+    services.phpfpm.poolConfigs.leila = ''
       listen = /run/phpfpm/leila.sock
       user = wwwrun
       group = wwwrun
index 0be067b49c30fdf7fa23d712d70d04cfd84ddc3b..a53f1fe76a69e22ce7e3705afe5dfed0cc7a31c1 100644 (file)
@@ -14,9 +14,10 @@ in {
   config = lib.mkIf cfg.enable {
     secrets.keys = ludivinecassal.keys;
 
-    services.myPhpfpm.preStart.ludivinecassal_dev = ludivinecassal.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.ludivinecassal_dev = ludivinecassal.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.ludivinecassal_dev = ludivinecassal.phpFpm.pool;
+    systemd.services.phpfpm-ludivinecassal_dev.after = lib.mkAfter ludivinecassal.phpFpm.serviceDeps;
+    systemd.services.phpfpm-ludivinecassal_dev.wants = ludivinecassal.phpFpm.serviceDeps;
+    systemd.services.phpfpm-ludivinecassal_dev.preStart = lib.mkAfter ludivinecassal.phpFpm.preStart;
+    services.phpfpm.poolConfigs.ludivinecassal_dev = ludivinecassal.phpFpm.pool;
     system.activationScripts.ludivinecassal_dev = ludivinecassal.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index c5de698265fc39d6e0fb2926c130256ecafff8f8..8fe681296b11993771ac40e0fdcd7f1c12e79086 100644 (file)
@@ -15,9 +15,10 @@ in {
     secrets.keys = ludivinecassal.keys;
     services.webstats.sites = [ { name = "ludivinecassal.com"; } ];
 
-    services.myPhpfpm.preStart.ludivinecassal_prod = ludivinecassal.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.ludivinecassal_prod = ludivinecassal.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.ludivinecassal_prod = ludivinecassal.phpFpm.pool;
+    systemd.services.phpfpm-ludivinecassal_prod.after = lib.mkAfter ludivinecassal.phpFpm.serviceDeps;
+    systemd.services.phpfpm-ludivinecassal_prod.wants = ludivinecassal.phpFpm.serviceDeps;
+    systemd.services.phpfpm-ludivinecassal_prod.preStart = lib.mkAfter ludivinecassal.phpFpm.preStart;
+    services.phpfpm.poolConfigs.ludivinecassal_prod = ludivinecassal.phpFpm.pool;
     system.activationScripts.ludivinecassal_prod = ludivinecassal.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index b6cf06912cce1b5ff4a9dcba02b55ec087d41760..2315b301abd7131b991fac07a08cd8022c92127d 100644 (file)
@@ -33,24 +33,27 @@ in {
         ?>
       '';
     }];
-    services.myPhpfpm.serviceDependencies.jerome = [ "mysql.service" ];
-    services.myPhpfpm.poolConfigs.jerome = ''
-      listen = /run/phpfpm/naturaloutil.sock
-      user = wwwrun
-      group = wwwrun
-      listen.owner = wwwrun
-      listen.group = wwwrun
+    systemd.services.phpfpm-jerome.after = lib.mkAfter [ "mysql.service" ];
+    systemd.services.phpfpm-jerome.wants = [ "mysql.service" ];
+    services.phpfpm.pools.jerome = {
+      listen = "/run/phpfpm/naturaloutil.sock";
+      extraConfig = ''
+        user = wwwrun
+        group = wwwrun
+        listen.owner = wwwrun
+        listen.group = wwwrun
 
-      pm = ondemand
-      pm.max_children = 5
-      pm.process_idle_timeout = 60
+        pm = ondemand
+        pm.max_children = 5
+        pm.process_idle_timeout = 60
 
-      env[BDD_CONNECT] = "/var/secrets/webapps/prod-naturaloutil"
-      php_admin_value[open_basedir] = "/var/secrets/webapps/prod-naturaloutil:${varDir}:/tmp"
-      '';
-    services.myPhpfpm.poolPhpConfigs.jerome = ''
-      extension=${pkgs.php}/lib/php/extensions/mysqli.so
-      '';
+        env[BDD_CONNECT] = "/var/secrets/webapps/prod-naturaloutil"
+        php_admin_value[open_basedir] = "/var/secrets/webapps/prod-naturaloutil:${varDir}:/tmp"
+        '';
+      phpOptions = config.services.phpfpm.phpOptions + ''
+        extension=${pkgs.php}/lib/php/extensions/mysqli.so
+        '';
+    };
     services.websites.production.modules = adminer.apache.modules ++ [ "proxy_fcgi" ];
     services.websites.production.vhostConfs.naturaloutil = {
       certName     = "naturaloutil";
index 6249e853b95b720b1d0b075815f387ea90d9401f..83b428a6459485e00db1dca0d78fdd561a353f7d 100644 (file)
@@ -13,9 +13,10 @@ in {
 
   config = lib.mkIf cfg.enable {
     secrets.keys = piedsjaloux.keys;
-    services.myPhpfpm.preStart.piedsjaloux_dev = piedsjaloux.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.piedsjaloux_dev = piedsjaloux.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.piedsjaloux_dev = piedsjaloux.phpFpm.pool;
+    systemd.services.phpfpm-piedsjaloux_dev.after = lib.mkAfter piedsjaloux.phpFpm.serviceDeps;
+    systemd.services.phpfpm-piedsjaloux_dev.wants = piedsjaloux.phpFpm.serviceDeps;
+    systemd.services.phpfpm-piedsjaloux_dev.preStart = lib.mkAfter piedsjaloux.phpFpm.preStart;
+    services.phpfpm.poolConfigs.piedsjaloux_dev = piedsjaloux.phpFpm.pool;
     system.activationScripts.piedsjaloux_dev = piedsjaloux.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index afa166779ec26b51d97edaf2b5f47b667d4cd05e..0efd56bcb5cc2a9d78191c01d1d72f73fd4385d8 100644 (file)
@@ -15,9 +15,10 @@ in {
     secrets.keys = piedsjaloux.keys;
     services.webstats.sites = [ { name = "piedsjaloux.fr"; } ];
 
-    services.myPhpfpm.preStart.piedsjaloux_prod = piedsjaloux.phpFpm.preStart;
-    services.myPhpfpm.serviceDependencies.piedsjaloux_prod = piedsjaloux.phpFpm.serviceDeps;
-    services.myPhpfpm.poolConfigs.piedsjaloux_prod = piedsjaloux.phpFpm.pool;
+    systemd.services.phpfpm-piedsjaloux_prod.after = lib.mkAfter piedsjaloux.phpFpm.serviceDeps;
+    systemd.services.phpfpm-piedsjaloux_prod.wants = piedsjaloux.phpFpm.serviceDeps;
+    systemd.services.phpfpm-piedsjaloux_prod.preStart = lib.mkAfter piedsjaloux.phpFpm.preStart;
+    services.phpfpm.poolConfigs.piedsjaloux_prod = piedsjaloux.phpFpm.pool;
     system.activationScripts.piedsjaloux_prod = piedsjaloux.activationScript;
     system.extraSystemBuilderCmds = ''
       mkdir -p $out/webapps
index e1c933f3e435dd4cc36bdaf6b574f1daff14136d..e62031815c72d7065d64d147f77deb31e213ae8a 100644 (file)
@@ -160,7 +160,7 @@ in {
         </Location>
         '') env.taskwarrior-web);
     };
-    services.myPhpfpm.poolConfigs = {
+    services.phpfpm.poolConfigs = {
       tasks = ''
         listen = /var/run/phpfpm/task.sock
         user = ${user}
index 584892acc6c914e53bd4ea22463ac6bbfeb4e98a..1948fe9c4e255d3e92d1f15533e8df9b2061c29b 100644 (file)
@@ -76,8 +76,6 @@ in
     ./tools/diaspora.nix
     ./tools/ether.nix
     ./tools/peertube.nix
-    # Adapted from base phpfpm
-    ./phpfpm
   ];
 
   config = {
@@ -156,7 +154,7 @@ in
       ln -s ${adminer.webRoot} $out/webapps/${adminer.apache.webappName}
       '';
 
-    services.myPhpfpm = {
+    services.phpfpm = {
       phpPackage = pkgs.php;
       phpOptions = ''
         session.save_path = "/var/lib/php/sessions"
diff --git a/nixops/modules/websites/phpfpm/default.nix b/nixops/modules/websites/phpfpm/default.nix
deleted file mode 100644 (file)
index 60959e0..0000000
+++ /dev/null
@@ -1,217 +0,0 @@
-{ config, lib, pkgs, ... }:
-
-with lib;
-
-let
-  cfg = config.services.myPhpfpm;
-  enabled = cfg.poolConfigs != {} || cfg.pools != {};
-
-  stateDir = "/run/phpfpm";
-
-  poolConfigs = cfg.poolConfigs // mapAttrs mkPool cfg.pools;
-
-  mkPool = n: p: ''
-    listen = ${p.listen}
-    ${p.extraConfig}
-  '';
-
-  fpmCfgFile = pool: poolConfig: pkgs.writeText "phpfpm-${pool}.conf" ''
-    [global]
-    error_log = syslog
-    daemonize = no
-    ${cfg.extraConfig}
-
-    [${pool}]
-    ${poolConfig}
-  '';
-
-  phpIni = poolPhpOptions: (pkgs.runCommand "php.ini" {
-    inherit (cfg) phpPackage phpOptions;
-    inherit poolPhpOptions;
-    nixDefaults = ''
-      sendmail_path = "/run/wrappers/bin/sendmail -t -i"
-    '';
-    passAsFile = [ "nixDefaults" "phpOptions" "poolPhpOptions" ];
-  } ''
-    cat $phpPackage/etc/php.ini $nixDefaultsPath $phpOptionsPath $poolPhpOptionsPath > $out
-  '');
-
-in {
-
-  options = {
-    services.myPhpfpm = {
-      extraConfig = mkOption {
-        type = types.lines;
-        default = "";
-        description = ''
-          Extra configuration that should be put in the global section of
-          the PHP-FPM configuration file. Do not specify the options
-          <literal>error_log</literal> or
-          <literal>daemonize</literal> here, since they are generated by
-          NixOS.
-        '';
-      };
-
-      phpPackage = mkOption {
-        type = types.package;
-        default = pkgs.php;
-        defaultText = "pkgs.php";
-        description = ''
-          The PHP package to use for running the PHP-FPM service.
-        '';
-      };
-
-      phpOptions = mkOption {
-        type = types.lines;
-        default = "";
-        example =
-          ''
-            date.timezone = "CET"
-          '';
-        description =
-          "Options appended to the PHP configuration file <filename>php.ini</filename>.";
-      };
-
-      serviceDependencies = mkOption {
-        default = {};
-        type = types.attrsOf (types.listOf types.string);
-        example = literalExample ''
-          { mypool = ["postgresql.service"]; }
-        '';
-        description = ''
-          Extra service dependencies specific to pool.
-        '';
-      };
-
-      envFile = mkOption {
-        default = {};
-        type = types.attrsOf types.string;
-        example = literalExample ''
-          { mypool = "path/to/file";
-          }
-        '';
-        description = ''
-          Extra environment file go into the service script.
-        '';
-      };
-
-      preStart = mkOption {
-        default = {};
-        type = types.attrsOf types.lines;
-        example = literalExample ''
-          { mypool = '''
-              touch foo
-            ''';
-          }
-        '';
-        description = ''
-          Extra lines that will go into the preStart systemd service
-        '';
-      };
-
-      poolPhpConfigs = mkOption {
-        default = {};
-        type = types.attrsOf types.lines;
-        example = literalExample ''
-          { mypool = '''
-              extension = some_extension.so
-            ''';
-          }
-        '';
-        description = ''
-          Extra lines that go into the php configuration specific to pool.
-        '';
-      };
-
-      poolConfigs = mkOption {
-        default = {};
-        type = types.attrsOf types.lines;
-        example = literalExample ''
-          { mypool = '''
-              listen = /run/phpfpm/mypool
-              user = nobody
-              pm = dynamic
-              pm.max_children = 75
-              pm.start_servers = 10
-              pm.min_spare_servers = 5
-              pm.max_spare_servers = 20
-              pm.max_requests = 500
-            ''';
-          }
-        '';
-        description = ''
-          A mapping between PHP-FPM pool names and their configurations.
-          See the documentation on <literal>php-fpm.conf</literal> for
-          details on configuration directives. If no pools are defined,
-          the phpfpm service is disabled.
-        '';
-      };
-
-      pools = mkOption {
-        type = types.attrsOf (types.submodule (import ./pool-options.nix {
-          inherit lib;
-        }));
-        default = {};
-        example = literalExample ''
-         {
-           mypool = {
-             listen = "/path/to/unix/socket";
-             extraConfig = '''
-               user = nobody
-               pm = dynamic
-               pm.max_children = 75
-               pm.start_servers = 10
-               pm.min_spare_servers = 5
-               pm.max_spare_servers = 20
-               pm.max_requests = 500
-             ''';
-           }
-         }'';
-        description = ''
-          PHP-FPM pools. If no pools or poolConfigs are defined, the PHP-FPM
-          service is disabled.
-        '';
-      };
-    };
-  };
-
-  config = mkIf enabled {
-
-    systemd.slices.phpfpm = {
-      description = "PHP FastCGI Process manager pools slice";
-    };
-
-    systemd.targets.phpfpm = {
-      description = "PHP FastCGI Process manager pools target";
-      wantedBy = [ "multi-user.target" ];
-    };
-
-    systemd.services = flip mapAttrs' poolConfigs (pool: poolConfig:
-      nameValuePair "phpfpm-${pool}" {
-        description = "PHP FastCGI Process Manager service for pool ${pool}";
-        after = [ "network.target" ] ++ (cfg.serviceDependencies.${pool} or []);
-        wants = cfg.serviceDependencies.${pool} or [];
-        wantedBy = [ "phpfpm.target" ];
-        partOf = [ "phpfpm.target" ];
-        preStart = ''
-          mkdir -p ${stateDir}
-        '' + (cfg.preStart.${pool} or "");
-        serviceConfig = let
-          cfgFile = fpmCfgFile pool poolConfig;
-          poolPhpIni = cfg.poolPhpConfigs.${pool} or "";
-        in {
-          EnvironmentFile = if builtins.hasAttr pool cfg.envFile then [cfg.envFile.${pool}] else [];
-          Slice = "phpfpm.slice";
-          PrivateDevices = true;
-          ProtectSystem = "full";
-          ProtectHome = true;
-          # XXX: We need AF_NETLINK to make the sendmail SUID binary from postfix work
-          RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6 AF_NETLINK";
-          Type = "notify";
-          ExecStart = "${cfg.phpPackage}/bin/php-fpm -y ${cfgFile} -c ${phpIni poolPhpIni}";
-          ExecReload = "${pkgs.coreutils}/bin/kill -USR2 $MAINPID";
-        };
-      }
-   );
-  };
-}
diff --git a/nixops/modules/websites/phpfpm/pool-options.nix b/nixops/modules/websites/phpfpm/pool-options.nix
deleted file mode 100644 (file)
index cc688c2..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-{ lib }:
-
-with lib; {
-
-  options = {
-
-    listen = mkOption {
-      type = types.str;
-      example = "/path/to/unix/socket";
-      description = ''
-        The address on which to accept FastCGI requests.
-      '';
-    };
-
-    extraConfig = mkOption {
-      type = types.lines;
-      example = ''
-        user = nobody
-        pm = dynamic
-        pm.max_children = 75
-        pm.start_servers = 10
-        pm.min_spare_servers = 5
-        pm.max_spare_servers = 20
-        pm.max_requests = 500
-      '';
-
-      description = ''
-        Extra lines that go into the pool configuration.
-        See the documentation on <literal>php-fpm.conf</literal> for
-        details on configuration directives.
-      '';
-    };
-  };
-}
-
index 5e010f4332cb9aac9859d26d15dbe30edf4afed5..5d2ca401a67eabbe7b002195b851bfbac7d22c19 100644 (file)
@@ -17,7 +17,6 @@ let
       zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
       '';
     pool = ''
-      listen = ${socket}
       user = wwwrun
       group = wwwrun
       listen.owner = wwwrun
@@ -170,9 +169,10 @@ in {
       ln -s ${nextcloud} $out/webapps/${webappName}
       '';
 
-    services.myPhpfpm = {
-      poolPhpConfigs.nextcloud = phpFpm.phpConfig;
-      poolConfigs.nextcloud = phpFpm.pool;
+    services.phpfpm.pools.nextcloud = {
+      listen = phpFpm.socket;
+      extraConfig = phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + phpFpm.phpConfig;
     };
 
     services.cron = {
index 075cf48d440a4f906d46f17e3064f2ab744d90d1..78e0ba3b8280d39b262fa0ad810d56c54e115c70 100644 (file)
@@ -41,7 +41,7 @@ in {
       ];
     };
 
-    services.myPhpfpm.poolConfigs = {
+    services.phpfpm.poolConfigs = {
       davical = davical.phpFpm.pool;
     };
 
index 064d3ddb50fa92a84cc72fd445b2df1dafaaab76..495c5eace0c7c6da9db8a8f4dc0d7a2b0be6fe98 100644 (file)
@@ -38,7 +38,7 @@ in {
           ''
       ];
     };
-    services.myPhpfpm.poolConfigs = {
+    services.phpfpm.poolConfigs = {
       mantisbt = mantisbt.phpFpm.pool;
     };
   };
index 061c0043637e3caed1dfc34db3da35920878ad8d..642755ff1ff5679dada6a577ec9489c3c04cd2f3 100644 (file)
@@ -72,15 +72,6 @@ in {
       ++ ldap.apache.modules
       ++ kanboard.apache.modules;
 
-    systemd.services.ympd = {
-      description = "Standalone MPD Web GUI written in C";
-      wantedBy = [ "multi-user.target" ];
-      script = ''
-        export MPD_PASSWORD=$(cat /var/secrets/mpd)
-        ${pkgs.ympd}/bin/ympd --host ${ympd.config.host} --port ${toString ympd.config.port} --webport ${ympd.config.webPort} --user nobody
-        '';
-    };
-
     services.websites.integration.vhostConfs.devtools = {
       certName    = "eldiron";
       addToCerts  = true;
@@ -157,33 +148,99 @@ in {
       ];
     };
 
-    services.myPhpfpm.serviceDependencies = {
-      dokuwiki = dokuwiki.phpFpm.serviceDeps;
-      kanboard = kanboard.phpFpm.serviceDeps;
-      ldap = ldap.phpFpm.serviceDeps;
-      rainloop = rainloop.phpFpm.serviceDeps;
-      roundcubemail = roundcubemail.phpFpm.serviceDeps;
-      shaarli = shaarli.phpFpm.serviceDeps;
-      ttrss = ttrss.phpFpm.serviceDeps;
-      wallabag = wallabag.phpFpm.serviceDeps;
-      yourls = yourls.phpFpm.serviceDeps;
+    systemd.services = {
+      phpfpm-dokuwiki = {
+        after = lib.mkAfter dokuwiki.phpFpm.serviceDeps;
+        wants = dokuwiki.phpFpm.serviceDeps;
+      };
+      phpfpm-kanboard = {
+        after = lib.mkAfter kanboard.phpFpm.serviceDeps;
+        wants = kanboard.phpFpm.serviceDeps;
+      };
+      phpfpm-ldap = {
+        after = lib.mkAfter ldap.phpFpm.serviceDeps;
+        wants = ldap.phpFpm.serviceDeps;
+      };
+      phpfpm-rainloop = {
+        after = lib.mkAfter rainloop.phpFpm.serviceDeps;
+        wants = rainloop.phpFpm.serviceDeps;
+      };
+      phpfpm-roundcubemail = {
+        after = lib.mkAfter roundcubemail.phpFpm.serviceDeps;
+        wants = roundcubemail.phpFpm.serviceDeps;
+      };
+      phpfpm-shaarli = {
+        after = lib.mkAfter shaarli.phpFpm.serviceDeps;
+        wants = shaarli.phpFpm.serviceDeps;
+      };
+      phpfpm-ttrss = {
+        after = lib.mkAfter ttrss.phpFpm.serviceDeps;
+        wants = ttrss.phpFpm.serviceDeps;
+      };
+      phpfpm-wallabag = {
+        after = lib.mkAfter wallabag.phpFpm.serviceDeps;
+        wants = wallabag.phpFpm.serviceDeps;
+        preStart = lib.mkAfter wallabag.phpFpm.preStart;
+      };
+      phpfpm-yourls = {
+        after = lib.mkAfter yourls.phpFpm.serviceDeps;
+        wants = yourls.phpFpm.serviceDeps;
+      };
+      ympd = {
+        description = "Standalone MPD Web GUI written in C";
+        wantedBy = [ "multi-user.target" ];
+        script = ''
+          export MPD_PASSWORD=$(cat /var/secrets/mpd)
+          ${pkgs.ympd}/bin/ympd --host ${ympd.config.host} --port ${toString ympd.config.port} --webport ${ympd.config.webPort} --user nobody
+          '';
+      };
+      tt-rss = {
+        description = "Tiny Tiny RSS feeds update daemon";
+        serviceConfig = {
+          User = "wwwrun";
+          ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
+          StandardOutput = "syslog";
+          StandardError = "syslog";
+          PermissionsStartOnly = true;
+        };
+
+        wantedBy = [ "multi-user.target" ];
+        requires = ["postgresql.service"];
+        after = ["network.target" "postgresql.service"];
+      };
+    };
+
+    services.phpfpm.pools.roundcubemail = {
+      listen = roundcubemail.phpFpm.socket;
+      extraConfig = roundcubemail.phpFpm.pool;
+      phpOptions = config.services.phpfpm.phpOptions + roundcubemail.phpFpm.phpConfig;
     };
 
-    services.myPhpfpm.poolPhpConfigs = {
-      devtools = ''
+    services.phpfpm.pools.devtools = {
+      listen = "/var/run/phpfpm/devtools.sock";
+      extraConfig = ''
+        user = wwwrun
+        group = wwwrun
+        listen.owner = wwwrun
+        listen.group = wwwrun
+        pm = dynamic
+        pm.max_children = 60
+        pm.start_servers = 2
+        pm.min_spare_servers = 1
+        pm.max_spare_servers = 10
+
+        php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
+        '';
+      phpOptions = config.services.phpfpm.phpOptions + ''
         extension=${pkgs.phpPackages.redis}/lib/php/extensions/redis.so
         extension=${pkgs.phpPackages.apcu}/lib/php/extensions/apcu.so
         zend_extension=${pkgs.php}/lib/php/extensions/opcache.so
         '';
-      roundcubemail = roundcubemail.phpFpm.phpConfig;
-    };
-    services.myPhpfpm.preStart = {
-      wallabag = wallabag.phpFpm.preStart;
     };
-    services.myPhpfpm.poolConfigs = {
+
+    services.phpfpm.poolConfigs = {
       adminer = adminer.phpFpm.pool;
       ttrss = ttrss.phpFpm.pool;
-      roundcubemail = roundcubemail.phpFpm.pool;
       wallabag = wallabag.phpFpm.pool;
       yourls = yourls.phpFpm.pool;
       rompr = rompr.phpFpm.pool;
@@ -192,20 +249,6 @@ in {
       ldap = ldap.phpFpm.pool;
       rainloop = rainloop.phpFpm.pool;
       kanboard = kanboard.phpFpm.pool;
-      devtools = ''
-        listen = /var/run/phpfpm/devtools.sock
-        user = wwwrun
-        group = wwwrun
-        listen.owner = wwwrun
-        listen.group = wwwrun
-        pm = dynamic
-        pm.max_children = 60
-        pm.start_servers = 2
-        pm.min_spare_servers = 1
-        pm.max_spare_servers = 10
-
-        php_admin_value[open_basedir] = "/run/wrappers/bin/sendmail:/var/lib/ftp/devtools.immae.eu:/tmp"
-        '';
       tools = ''
         listen = /var/run/phpfpm/tools.sock
         user = wwwrun
@@ -250,21 +293,6 @@ in {
       ln -s ${kanboard.webRoot} $out/webapps/${kanboard.apache.webappName}
       '';
 
-    systemd.services.tt-rss = {
-      description = "Tiny Tiny RSS feeds update daemon";
-      serviceConfig = {
-        User = "wwwrun";
-        ExecStart = "${pkgs.php}/bin/php ${ttrss.webRoot}/update.php --daemon";
-        StandardOutput = "syslog";
-        StandardError = "syslog";
-        PermissionsStartOnly = true;
-      };
-
-      wantedBy = [ "multi-user.target" ];
-      requires = ["postgresql.service"];
-      after = ["network.target" "postgresql.service"];
-    };
-
   };
 }
 
index 6177ff32253b414dd3798faad9c3a98dc1a634f8..8974d1bbbe2e50a08e5f1df33ec647fe4f2959cf 100644 (file)
@@ -102,7 +102,6 @@ rec {
       '';
     socket = "/var/run/phpfpm/roundcubemail.sock";
     pool = ''
-      listen = ${socket}
       user = ${apache.user}
       group = ${apache.group}
       listen.owner = ${apache.user}