164 lines
4.7 KiB
Nix
164 lines
4.7 KiB
Nix
{ config, inputs, lib, nidus-sync, pkgs, ... }:
|
|
with lib;
|
|
let
|
|
backupName = nidusName;
|
|
cfg = config.myModules.nidus-sync;
|
|
databaseName = nidusName;
|
|
databaseUser = nidusName;
|
|
dataDirectory = /mnt/bigdisk/nidus-sync;
|
|
dataDirectoryString = "/mnt/bigdisk/nidus-sync";
|
|
group = nidusName;
|
|
nidusName = "nidus-sync";
|
|
nidusNameSentryUpload = "nidus-sentry-symbol-upload";
|
|
nidusNameSocket = "${nidusName}";
|
|
nidusNameWebserver = "${nidusName}-webserver";
|
|
nidus-sync-pkg = inputs.nidus-sync.packages.x86_64-linux.default;
|
|
port = 10000;
|
|
secretsName = "${nidusName}-env";
|
|
user = nidusName;
|
|
|
|
environmentFile = "/var/run/secrets/${nidusName}-env";
|
|
in {
|
|
options.myModules.nidus-sync = {
|
|
domainNameReport = mkOption {
|
|
example = "report.mosquitoes.online";
|
|
type = types.str;
|
|
};
|
|
domainNameSync = mkOption {
|
|
example = "sync.nidus.cloud";
|
|
type = types.str;
|
|
};
|
|
enable = mkEnableOption "custom nidus-sync configuration";
|
|
environment = mkOption {
|
|
example = "prod";
|
|
type = types.str;
|
|
};
|
|
};
|
|
|
|
config = mkIf config.myModules.nidus-sync.enable {
|
|
environment.systemPackages = with pkgs; [
|
|
ffmpeg
|
|
nidus-sync-pkg
|
|
sentry-cli
|
|
];
|
|
services.caddy.virtualHosts."${cfg.domainNameReport}" = {
|
|
extraConfig = ''
|
|
reverse_proxy http://127.0.0.1:${toString port}
|
|
'';
|
|
};
|
|
services.caddy.virtualHosts."${cfg.domainNameSync}" = {
|
|
extraConfig = ''
|
|
reverse_proxy http://127.0.0.1:${toString port}
|
|
'';
|
|
};
|
|
services.postgresql = {
|
|
enable = true;
|
|
ensureDatabases = [databaseName];
|
|
ensureUsers = [{
|
|
ensureClauses.login = true;
|
|
ensureDBOwnership = true;
|
|
name = databaseUser;
|
|
}];
|
|
extensions = ps: with ps; [ h3-pg postgis ];
|
|
};
|
|
services.restic.backups."${backupName}-db" = {
|
|
# We can use this due to overridding restic with unstable
|
|
command = [
|
|
"${lib.getExe pkgs.sudo}"
|
|
"-u postgres"
|
|
"${pkgs.postgresql}/bin/pg_dump ${databaseName}"
|
|
];
|
|
environmentFile = "/var/run/secrets/restic-env";
|
|
extraBackupArgs = [
|
|
"--tag database"
|
|
];
|
|
initialize = true;
|
|
passwordFile = "/var/run/secrets/restic-password";
|
|
pruneOpts = [
|
|
"--keep-daily 14"
|
|
"--keep-weekly 4"
|
|
"--keep-monthly 2"
|
|
"--group-by tags"
|
|
];
|
|
repository = "s3:s3.us-west-004.backblazeb2.com/gleipnir-backup-nidus-sync/database";
|
|
};
|
|
services.restic.backups."${backupName}-files" = {
|
|
environmentFile = "/var/run/secrets/restic-env";
|
|
extraBackupArgs = [
|
|
"--tag user-files"
|
|
];
|
|
initialize = true;
|
|
passwordFile = "/var/run/secrets/restic-password";
|
|
paths = [
|
|
(builtins.toString dataDirectory)
|
|
];
|
|
repository = "s3:s3.us-west-004.backblazeb2.com/gleipnir-backup-nidus-sync/files";
|
|
|
|
};
|
|
sops.secrets."${secretsName}" = {
|
|
format = "dotenv";
|
|
group = "${group}";
|
|
mode = "0440";
|
|
owner = "${user}";
|
|
restartUnits = ["${nidusNameWebserver}.service"];
|
|
sopsFile = ../../secrets/${cfg.environment}/${nidusName}.env;
|
|
};
|
|
systemd.services."${nidusNameSentryUpload}" = {
|
|
description = "Upload source maps to Sentry";
|
|
after = [ "network-online.target" ];
|
|
wants = [ "network-online.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
EnvironmentFile = "${environmentFile}";
|
|
Type = "oneshot";
|
|
};
|
|
script = ''
|
|
${pkgs.sentry-cli}/bin/sentry-cli releases files ${inputs.nidus-sync.rev} upload-sourcemaps ${nidus-sync-pkg}/share/frontend/ --rewrite --log-level=info
|
|
'';
|
|
};
|
|
systemd.services."${nidusNameWebserver}" = {
|
|
after=["${nidusNameSocket}.socket" "network.target"];
|
|
description="Nidus Sync Webserver";
|
|
path = with pkgs; [
|
|
ffmpeg
|
|
google-chrome
|
|
];
|
|
requires=["${nidusNameSocket}.socket"];
|
|
serviceConfig = {
|
|
Group = "${group}";
|
|
Environment=[
|
|
"SENTRY_RELEASE=${inputs.nidus-sync.rev}"
|
|
"HOME=/var/lib/nidus-sync"
|
|
];
|
|
EnvironmentFile="${environmentFile}";
|
|
ExecStart = "${nidus-sync-pkg}/bin/nidus-sync";
|
|
KillMode = "mixed"; # SIGTERM to main process, SIGKILL to process group after timeout
|
|
KillSignal = "SIGTERM";
|
|
PrivateTmp = true;
|
|
Restart = "on-failure";
|
|
StateDirectory = "nidus-sync"; # Creates /var/lib/nidus-sync
|
|
TimeoutStopSec = 30;
|
|
Type = "simple";
|
|
User = "${user}";
|
|
WorkingDirectory = "/var/lib/nidus-sync";
|
|
};
|
|
};
|
|
systemd.sockets."${nidusNameSocket}" = {
|
|
listenStreams = [ "${toString port}" ];
|
|
socketConfig = {
|
|
BindIPv6Only = "both";
|
|
Service = "${nidusNameWebserver}.service";
|
|
};
|
|
wantedBy = [ "multi-user.target" ];
|
|
};
|
|
systemd.tmpfiles.rules = [
|
|
"d ${dataDirectoryString} 0755 ${nidusName} ${nidusName}"
|
|
"d ${dataDirectoryString} 0755 ${nidusName} ${nidusName}"
|
|
];
|
|
users.groups.${group} = {};
|
|
users.users.${user} = {
|
|
group = "${group}";
|
|
isSystemUser = true;
|
|
};
|
|
};
|
|
}
|