2024-08-09 18:14:51 +02:00
|
|
|
{
|
|
|
|
|
config,
|
|
|
|
|
lib,
|
|
|
|
|
pkgs,
|
2024-08-09 20:12:31 +02:00
|
|
|
archtikaPackages,
|
2024-08-09 18:14:51 +02:00
|
|
|
...
|
|
|
|
|
}:
|
|
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
cfg = config.services.archtika;
|
|
|
|
|
in
|
|
|
|
|
{
|
|
|
|
|
options.services.archtika = {
|
|
|
|
|
enable = mkEnableOption "archtika service";
|
|
|
|
|
|
|
|
|
|
user = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "archtika";
|
|
|
|
|
description = "User account under which archtika runs.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
group = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "archtika";
|
|
|
|
|
description = "Group under which archtika runs.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
databaseName = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "archtika";
|
|
|
|
|
description = "Name of the PostgreSQL database for archtika.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
jwtSecret = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
description = "JWT secret for archtika.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
port = mkOption {
|
|
|
|
|
type = types.port;
|
|
|
|
|
default = 3000;
|
|
|
|
|
description = "Port on which the API runs.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
webAppPort = mkOption {
|
|
|
|
|
type = types.port;
|
|
|
|
|
default = 4000;
|
|
|
|
|
description = "Port on which the web application runs.";
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
users.users.${cfg.user} = {
|
|
|
|
|
isSystemUser = true;
|
|
|
|
|
group = cfg.group;
|
|
|
|
|
home = "/var/lib/archtika";
|
|
|
|
|
createHome = true;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
users.groups.${cfg.group} = { };
|
|
|
|
|
|
|
|
|
|
systemd.services.archtika-api = {
|
|
|
|
|
description = "archtika API service";
|
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
|
after = [
|
|
|
|
|
"network.target"
|
|
|
|
|
"postgresql.service"
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
|
User = cfg.user;
|
|
|
|
|
Group = cfg.group;
|
|
|
|
|
Restart = "always";
|
|
|
|
|
};
|
2024-08-09 20:12:31 +02:00
|
|
|
|
|
|
|
|
script = ''
|
|
|
|
|
${pkgs.postgresql_16}/bin/psql postgres://postgres@localhost:5432/${cfg.databaseName} -c "ALTER DATABASE ${cfg.databaseName} SET \"app.jwt_secret\" TO '${cfg.jwtSecret}'"
|
|
|
|
|
|
|
|
|
|
${pkgs.dbmate}/bin/dbmate --url postgres://postgres@localhost:5432/archtika?sslmode=disable --migrations-dir ${archtikaPackages.api}/migrations up
|
|
|
|
|
|
|
|
|
|
PGRST_SERVER_PORT=${toString cfg.port} PGRST_DB_SCHEMAS="api" PGRST_DB_ANON_ROLE="anon" PGRST_OPENAPI_MODE="ignore-privileges" PGRST_DB_URI="postgres://authenticator@localhost:5432/${cfg.databaseName}" PGRST_JWT_SECRET="${cfg.jwtSecret}" ${pkgs.postgrest}/bin/postgrest
|
|
|
|
|
'';
|
2024-08-09 18:14:51 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
systemd.services.archtika-web = {
|
2024-08-09 20:12:31 +02:00
|
|
|
description = "archtika Web App service";
|
2024-08-09 18:14:51 +02:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
|
after = [ "network.target" ];
|
|
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
|
User = cfg.user;
|
|
|
|
|
Group = cfg.group;
|
|
|
|
|
Restart = "always";
|
|
|
|
|
};
|
2024-08-09 20:12:31 +02:00
|
|
|
|
|
|
|
|
script = ''
|
|
|
|
|
ORIGIN=http://localhost:${toString cfg.webAppPort} PORT=${toString cfg.webAppPort} ${pkgs.nodejs_22}/bin/node ${archtikaPackages.web}
|
|
|
|
|
'';
|
2024-08-09 18:14:51 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
services.postgresql = {
|
|
|
|
|
enable = true;
|
|
|
|
|
package = pkgs.postgresql_16;
|
|
|
|
|
ensureDatabases = [ cfg.databaseName ];
|
|
|
|
|
authentication = lib.mkForce ''
|
2024-08-09 20:12:31 +02:00
|
|
|
# IPv4 local connections:
|
|
|
|
|
host all all 127.0.0.1/32 trust
|
|
|
|
|
# IPv6 local connections:
|
|
|
|
|
host all all ::1/128 trust
|
|
|
|
|
# Local socket connections:
|
|
|
|
|
local all all trust
|
2024-08-09 18:14:51 +02:00
|
|
|
'';
|
|
|
|
|
extraPlugins = with pkgs.postgresql16Packages; [ pgjwt ];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
|
enable = true;
|
|
|
|
|
recommendedProxySettings = true;
|
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
}
|