2024-01-09 17:20:58 +00:00
|
|
|
selfprivacy-graphql-api: { config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.selfprivacy-api;
|
|
|
|
config-id = "default";
|
|
|
|
nixos-rebuild = "${config.system.build.nixos-rebuild}/bin/nixos-rebuild";
|
|
|
|
nix = "${config.nix.package.out}/bin/nix";
|
|
|
|
in
|
|
|
|
{
|
|
|
|
options.services.selfprivacy-api = {
|
|
|
|
enable = lib.mkOption {
|
|
|
|
default = true;
|
|
|
|
type = lib.types.bool;
|
|
|
|
description = ''
|
|
|
|
Enable SelfPrivacy API service
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
users.users."selfprivacy-api" = {
|
|
|
|
isNormalUser = false;
|
|
|
|
isSystemUser = true;
|
|
|
|
extraGroups = [ "opendkim" ];
|
|
|
|
group = "selfprivacy-api";
|
|
|
|
};
|
|
|
|
users.groups."selfprivacy-api".members = [ "selfprivacy-api" ];
|
|
|
|
|
|
|
|
systemd.services.selfprivacy-api = {
|
|
|
|
description = "API Server used to control system from the mobile application";
|
|
|
|
environment = config.nix.envVars // {
|
|
|
|
HOME = "/root";
|
|
|
|
PYTHONUNBUFFERED = "1";
|
|
|
|
} // config.networking.proxy.envVars;
|
|
|
|
path = [
|
|
|
|
"/var/"
|
|
|
|
"/var/dkim/"
|
|
|
|
pkgs.coreutils
|
|
|
|
pkgs.gnutar
|
|
|
|
pkgs.xz.bin
|
|
|
|
pkgs.gzip
|
|
|
|
pkgs.gitMinimal
|
|
|
|
config.nix.package.out
|
|
|
|
pkgs.restic
|
2024-09-23 18:29:50 +00:00
|
|
|
pkgs.rclone
|
2024-01-09 17:20:58 +00:00
|
|
|
pkgs.mkpasswd
|
|
|
|
pkgs.util-linux
|
|
|
|
pkgs.e2fsprogs
|
|
|
|
pkgs.iproute2
|
2024-11-20 17:24:07 +00:00
|
|
|
pkgs.kanidm
|
2024-01-09 17:20:58 +00:00
|
|
|
];
|
|
|
|
after = [ "network-online.target" ];
|
|
|
|
wantedBy = [ "network-online.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
User = "root";
|
|
|
|
ExecStart = "${selfprivacy-graphql-api}/bin/app.py";
|
|
|
|
Restart = "always";
|
|
|
|
RestartSec = "5";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
systemd.services.selfprivacy-api-worker = {
|
|
|
|
description = "Task worker for SelfPrivacy API";
|
|
|
|
environment = config.nix.envVars // {
|
|
|
|
HOME = "/root";
|
|
|
|
PYTHONUNBUFFERED = "1";
|
|
|
|
PYTHONPATH =
|
2024-07-26 19:59:32 +00:00
|
|
|
pkgs.python312Packages.makePythonPath [ selfprivacy-graphql-api ];
|
2024-01-09 17:20:58 +00:00
|
|
|
} // config.networking.proxy.envVars;
|
|
|
|
path = [
|
|
|
|
"/var/"
|
|
|
|
"/var/dkim/"
|
|
|
|
pkgs.coreutils
|
|
|
|
pkgs.gnutar
|
|
|
|
pkgs.xz.bin
|
|
|
|
pkgs.gzip
|
|
|
|
pkgs.gitMinimal
|
|
|
|
config.nix.package.out
|
|
|
|
pkgs.restic
|
2024-09-23 18:29:50 +00:00
|
|
|
pkgs.rclone
|
2024-01-09 17:20:58 +00:00
|
|
|
pkgs.mkpasswd
|
|
|
|
pkgs.util-linux
|
|
|
|
pkgs.e2fsprogs
|
|
|
|
pkgs.iproute2
|
|
|
|
];
|
|
|
|
after = [ "network-online.target" ];
|
|
|
|
wantedBy = [ "network-online.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
User = "root";
|
2024-07-26 19:59:32 +00:00
|
|
|
ExecStart = "${pkgs.python312Packages.huey}/bin/huey_consumer.py selfprivacy_api.task_registry.huey";
|
2024-01-09 17:20:58 +00:00
|
|
|
Restart = "always";
|
|
|
|
RestartSec = "5";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
# One shot systemd service to rebuild NixOS using nixos-rebuild
|
|
|
|
systemd.services.sp-nixos-rebuild = {
|
|
|
|
description = "nixos-rebuild switch";
|
|
|
|
environment = config.nix.envVars // {
|
|
|
|
HOME = "/root";
|
|
|
|
} // config.networking.proxy.envVars;
|
|
|
|
# TODO figure out how to get dependencies list reliably
|
|
|
|
path = [ pkgs.coreutils pkgs.gnutar pkgs.xz.bin pkgs.gzip pkgs.gitMinimal config.nix.package.out ];
|
|
|
|
# TODO set proper timeout for reboot instead of service restart
|
|
|
|
serviceConfig = {
|
|
|
|
User = "root";
|
|
|
|
WorkingDirectory = "/etc/nixos";
|
|
|
|
# sync top-level flake with sp-modules sub-flake
|
|
|
|
# (https://github.com/NixOS/nix/issues/9339)
|
|
|
|
ExecStartPre = ''
|
|
|
|
${nix} flake lock --override-input sp-modules path:./sp-modules
|
|
|
|
'';
|
|
|
|
ExecStart = ''
|
|
|
|
${nixos-rebuild} switch --flake .#${config-id}
|
|
|
|
'';
|
|
|
|
KillMode = "none";
|
|
|
|
SendSIGKILL = "no";
|
|
|
|
};
|
|
|
|
restartIfChanged = false;
|
|
|
|
unitConfig.X-StopOnRemoval = false;
|
|
|
|
};
|
|
|
|
# One shot systemd service to upgrade NixOS using nixos-rebuild
|
|
|
|
systemd.services.sp-nixos-upgrade = {
|
|
|
|
# protection against simultaneous runs
|
|
|
|
after = [ "sp-nixos-rebuild.service" ];
|
|
|
|
description = "Upgrade NixOS and SP modules to latest versions";
|
|
|
|
environment = config.nix.envVars // {
|
|
|
|
HOME = "/root";
|
|
|
|
} // config.networking.proxy.envVars;
|
|
|
|
# TODO figure out how to get dependencies list reliably
|
|
|
|
path = [ pkgs.coreutils pkgs.gnutar pkgs.xz.bin pkgs.gzip pkgs.gitMinimal config.nix.package.out ];
|
|
|
|
serviceConfig = {
|
|
|
|
User = "root";
|
|
|
|
WorkingDirectory = "/etc/nixos";
|
|
|
|
# TODO get URL from systemd template parameter?
|
|
|
|
ExecStartPre = ''
|
|
|
|
${nix} flake update \
|
|
|
|
--override-input selfprivacy-nixos-config git+https://git.selfprivacy.org/SelfPrivacy/selfprivacy-nixos-config.git?ref=flakes
|
|
|
|
'';
|
|
|
|
ExecStart = ''
|
|
|
|
${nixos-rebuild} switch --flake .#${config-id}
|
|
|
|
'';
|
|
|
|
KillMode = "none";
|
|
|
|
SendSIGKILL = "no";
|
|
|
|
};
|
|
|
|
restartIfChanged = false;
|
|
|
|
unitConfig.X-StopOnRemoval = false;
|
|
|
|
};
|
|
|
|
# One shot systemd service to rollback NixOS using nixos-rebuild
|
|
|
|
systemd.services.sp-nixos-rollback = {
|
|
|
|
# protection against simultaneous runs
|
|
|
|
after = [ "sp-nixos-rebuild.service" "sp-nixos-upgrade.service" ];
|
|
|
|
description = "Rollback NixOS using nixos-rebuild";
|
|
|
|
environment = config.nix.envVars // {
|
|
|
|
HOME = "/root";
|
|
|
|
} // config.networking.proxy.envVars;
|
|
|
|
# TODO figure out how to get dependencies list reliably
|
|
|
|
path = [ pkgs.coreutils pkgs.gnutar pkgs.xz.bin pkgs.gzip pkgs.gitMinimal config.nix.package.out ];
|
|
|
|
serviceConfig = {
|
|
|
|
User = "root";
|
|
|
|
WorkingDirectory = "/etc/nixos";
|
|
|
|
ExecStart = ''
|
|
|
|
${nixos-rebuild} switch --rollback --flake .#${config-id}
|
|
|
|
'';
|
|
|
|
KillMode = "none";
|
|
|
|
SendSIGKILL = "no";
|
|
|
|
};
|
|
|
|
restartIfChanged = false;
|
|
|
|
unitConfig.X-StopOnRemoval = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|