mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-nixos-config.git
synced 2024-11-23 20:11:27 +00:00
Merge remote-tracking branch 'origin/flakes' into inex/test-service-configuration
This commit is contained in:
commit
8987727c5b
|
@ -44,4 +44,4 @@
|
||||||
},
|
},
|
||||||
"root": "root",
|
"root": "root",
|
||||||
"version": 7
|
"version": 7
|
||||||
}
|
}
|
3
sp-modules/monitoring/config-paths-needed.json
Normal file
3
sp-modules/monitoring/config-paths-needed.json
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[
|
||||||
|
[ "selfprivacy", "modules", "monitoring" ]
|
||||||
|
]
|
9
sp-modules/monitoring/flake.nix
Normal file
9
sp-modules/monitoring/flake.nix
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
description = "PoC SP module for Prometheus-based monitoring";
|
||||||
|
|
||||||
|
outputs = { self }: {
|
||||||
|
nixosModules.default = import ./module.nix;
|
||||||
|
configPathsNeeded =
|
||||||
|
builtins.fromJSON (builtins.readFile ./config-paths-needed.json);
|
||||||
|
};
|
||||||
|
}
|
33
sp-modules/monitoring/module.nix
Normal file
33
sp-modules/monitoring/module.nix
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
{config, lib, ...}: let
|
||||||
|
cfg = config.selfprivacy.modules.monitoring;
|
||||||
|
in {
|
||||||
|
options.selfprivacy.modules.monitoring = {
|
||||||
|
enable = lib.mkOption {
|
||||||
|
default = false;
|
||||||
|
type = lib.types.bool;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.prometheus = {
|
||||||
|
enable = true;
|
||||||
|
port = 9001;
|
||||||
|
listenAddress = "127.0.0.1";
|
||||||
|
exporters = {
|
||||||
|
node = {
|
||||||
|
enable = true;
|
||||||
|
enabledCollectors = [ "systemd" ];
|
||||||
|
port = 9002;
|
||||||
|
listenAddress = "127.0.0.1";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
scrapeConfigs = [
|
||||||
|
{
|
||||||
|
job_name = "node-exporter";
|
||||||
|
static_configs = [{
|
||||||
|
targets = [ "127.0.0.1:9002" ];
|
||||||
|
}];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
5
sp-modules/roundcube/config-paths-needed.json
Normal file
5
sp-modules/roundcube/config-paths-needed.json
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
[
|
||||||
|
["selfprivacy", "domain"],
|
||||||
|
["selfprivacy", "modules", "roundcube"],
|
||||||
|
["mailserver", "fqdn"]
|
||||||
|
]
|
9
sp-modules/roundcube/flake.nix
Normal file
9
sp-modules/roundcube/flake.nix
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
description = "Roundcube is a web-based email client.";
|
||||||
|
|
||||||
|
outputs = { self }: {
|
||||||
|
nixosModules.default = import ./module.nix;
|
||||||
|
configPathsNeeded =
|
||||||
|
builtins.fromJSON (builtins.readFile ./config-paths-needed.json);
|
||||||
|
};
|
||||||
|
}
|
39
sp-modules/roundcube/module.nix
Normal file
39
sp-modules/roundcube/module.nix
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
{ config, lib, ... }:
|
||||||
|
let
|
||||||
|
domain = config.selfprivacy.domain;
|
||||||
|
cfg = config.selfprivacy.modules.roundcube;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.selfprivacy.modules.roundcube = {
|
||||||
|
enable = lib.mkOption {
|
||||||
|
default = false;
|
||||||
|
type = lib.types.bool;
|
||||||
|
};
|
||||||
|
subdomain = lib.mkOption {
|
||||||
|
default = "roundcube";
|
||||||
|
type = lib.types.strMatching "[A-Za-z0-9][A-Za-z0-9\-]{0,61}[A-Za-z0-9]";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
|
||||||
|
services.roundcube = {
|
||||||
|
enable = true;
|
||||||
|
# this is the url of the vhost, not necessarily the same as the fqdn of
|
||||||
|
# the mailserver
|
||||||
|
hostName = "${cfg.subdomain}.${config.selfprivacy.domain}";
|
||||||
|
extraConfig = ''
|
||||||
|
# starttls needed for authentication, so the fqdn required to match
|
||||||
|
# the certificate
|
||||||
|
$config['smtp_server'] = "tls://${config.mailserver.fqdn}";
|
||||||
|
$config['smtp_user'] = "%u";
|
||||||
|
$config['smtp_pass'] = "%p";
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
services.nginx.virtualHosts."${cfg.subdomain}.${domain}" = {
|
||||||
|
forceSSL = true;
|
||||||
|
useACMEHost = domain;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue