nixpkgs/nixos/modules/services/development/zammad.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

324 lines
9.5 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2022-02-16 00:33:10 +00:00
with lib;
let
cfg = config.services.zammad;
2022-02-16 04:33:10 +00:00
settingsFormat = pkgs.formats.yaml { };
2022-02-16 05:49:51 +00:00
filterNull = filterAttrs (_: v: v != null);
serviceConfig = {
Type = "simple";
Restart = "always";
User = "zammad";
Group = "zammad";
PrivateTmp = true;
2022-02-16 00:33:10 +00:00
StateDirectory = "zammad";
WorkingDirectory = cfg.dataDir;
};
2022-02-16 04:33:10 +00:00
environment = {
RAILS_ENV = "production";
NODE_ENV = "production";
2022-02-16 21:50:22 +00:00
RAILS_SERVE_STATIC_FILES = "true";
RAILS_LOG_TO_STDOUT = "true";
};
2022-02-16 04:33:10 +00:00
databaseConfig = settingsFormat.generate "database.yml" cfg.database.settings;
2022-02-16 21:50:22 +00:00
in
{
options = {
services.zammad = {
enable = mkEnableOption (lib.mdDoc "Zammad, a web-based, open source user support/ticketing solution.");
2022-02-16 00:33:10 +00:00
package = mkOption {
type = types.package;
default = pkgs.zammad;
2022-02-16 00:33:10 +00:00
defaultText = literalExpression "pkgs.zammad";
description = lib.mdDoc "Zammad package to use.";
};
2022-02-16 00:33:10 +00:00
dataDir = mkOption {
type = types.path;
default = "/var/lib/zammad";
description = lib.mdDoc ''
Path to a folder that will contain Zammad working directory.
'';
};
2022-02-16 00:33:10 +00:00
host = mkOption {
type = types.str;
default = "127.0.0.1";
example = "192.168.23.42";
description = lib.mdDoc "Host address.";
};
2022-02-16 00:33:10 +00:00
openPorts = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc "Whether to open firewall ports for Zammad";
2022-02-16 00:33:10 +00:00
};
port = mkOption {
type = types.port;
default = 3000;
description = lib.mdDoc "Web service port.";
};
2022-02-16 00:33:10 +00:00
websocketPort = mkOption {
type = types.port;
default = 6042;
description = lib.mdDoc "Websocket service port.";
};
2022-02-16 04:33:10 +00:00
database = {
type = mkOption {
type = types.enum [ "PostgreSQL" "MySQL" ];
default = "PostgreSQL";
example = "MySQL";
description = lib.mdDoc "Database engine to use.";
2022-02-16 04:33:10 +00:00
};
host = mkOption {
type = types.nullOr types.str;
default = {
PostgreSQL = "/run/postgresql";
MySQL = "localhost";
}.${cfg.database.type};
2022-02-23 21:19:10 +00:00
defaultText = literalExpression ''
{
PostgreSQL = "/run/postgresql";
MySQL = "localhost";
}.''${config.services.zammad.database.type};
'';
description = lib.mdDoc ''
2022-02-16 04:33:10 +00:00
Database host address.
'';
};
port = mkOption {
type = types.nullOr types.port;
default = null;
description = lib.mdDoc "Database port. Use `null` for default port.";
2022-02-16 04:33:10 +00:00
};
name = mkOption {
type = types.str;
default = "zammad";
description = lib.mdDoc ''
2022-02-16 04:33:10 +00:00
Database name.
'';
};
2022-02-16 04:33:10 +00:00
user = mkOption {
type = types.nullOr types.str;
default = "zammad";
description = lib.mdDoc "Database user.";
2022-02-16 04:33:10 +00:00
};
passwordFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/run/keys/zammad-dbpassword";
description = lib.mdDoc ''
A file containing the password for {option}`services.zammad.database.user`.
2022-02-16 04:33:10 +00:00
'';
};
createLocally = mkOption {
type = types.bool;
default = true;
description = lib.mdDoc "Whether to create a local database automatically.";
2022-02-16 04:33:10 +00:00
};
settings = mkOption {
type = settingsFormat.type;
2022-02-16 21:50:22 +00:00
default = { };
2022-02-16 04:33:10 +00:00
example = literalExpression ''
{
}
'';
description = lib.mdDoc ''
The {file}`database.yml` configuration file as key value set.
See \<TODO\>
2022-02-16 04:33:10 +00:00
for list of configuration parameters.
'';
};
};
2022-02-16 05:49:51 +00:00
secretKeyBaseFile = mkOption {
2022-02-16 04:33:10 +00:00
type = types.nullOr types.path;
default = null;
2022-02-16 05:49:51 +00:00
example = "/run/keys/secret_key_base";
description = lib.mdDoc ''
2022-02-16 05:49:51 +00:00
The path to a file containing the
`secret_key_base` secret.
2022-02-16 05:49:51 +00:00
Zammad uses `secret_key_base` to encrypt
2022-02-16 05:49:51 +00:00
the cookie store, which contains session data, and to digest
user auth tokens.
Needs to be a 64 byte long string of hexadecimal
characters. You can generate one by running
```
openssl rand -hex 64 >/path/to/secret_key_base_file
```
2022-02-16 05:49:51 +00:00
This should be a string, not a nix path, since nix paths are
copied into the world-readable nix store.
'';
};
};
};
2022-02-16 00:33:10 +00:00
config = mkIf cfg.enable {
2022-02-16 04:33:10 +00:00
services.zammad.database.settings = {
2022-02-16 05:49:51 +00:00
production = mapAttrs (_: v: mkDefault v) (filterNull {
2022-02-16 04:33:10 +00:00
adapter = {
PostgreSQL = "postgresql";
MySQL = "mysql2";
}.${cfg.database.type};
database = cfg.database.name;
pool = 50;
timeout = 5000;
encoding = "utf8";
username = cfg.database.user;
host = cfg.database.host;
2022-02-16 05:49:51 +00:00
port = cfg.database.port;
2022-02-16 04:33:10 +00:00
});
};
2022-02-16 00:33:10 +00:00
networking.firewall.allowedTCPPorts = mkIf cfg.openPorts [
config.services.zammad.port
config.services.zammad.websocketPort
];
users.users.zammad = {
isSystemUser = true;
home = cfg.dataDir;
group = "zammad";
};
2022-02-16 21:50:22 +00:00
users.groups.zammad = { };
2022-02-16 04:33:10 +00:00
assertions = [
2022-02-16 21:50:22 +00:00
{
assertion = cfg.database.createLocally -> cfg.database.user == "zammad";
2022-02-16 04:33:10 +00:00
message = "services.zammad.database.user must be set to \"zammad\" if services.zammad.database.createLocally is set to true";
}
2022-02-16 21:50:22 +00:00
{
assertion = cfg.database.createLocally -> cfg.database.passwordFile == null;
2022-02-16 04:33:10 +00:00
message = "a password cannot be specified if services.zammad.database.createLocally is set to true";
}
];
services.mysql = optionalAttrs (cfg.database.createLocally && cfg.database.type == "MySQL") {
enable = true;
2022-02-16 04:33:10 +00:00
package = mkDefault pkgs.mariadb;
ensureDatabases = [ cfg.database.name ];
ensureUsers = [
2022-02-16 21:50:22 +00:00
{
name = cfg.database.user;
2022-02-16 04:33:10 +00:00
ensurePermissions = { "${cfg.database.name}.*" = "ALL PRIVILEGES"; };
}
];
};
2022-02-16 04:33:10 +00:00
services.postgresql = optionalAttrs (cfg.database.createLocally && cfg.database.type == "PostgreSQL") {
enable = true;
ensureDatabases = [ cfg.database.name ];
ensureUsers = [
2022-02-16 21:50:22 +00:00
{
name = cfg.database.user;
2022-02-16 04:33:10 +00:00
ensurePermissions = { "DATABASE ${cfg.database.name}" = "ALL PRIVILEGES"; };
}
];
};
systemd.services.zammad-web = {
2022-02-16 04:33:10 +00:00
inherit environment;
serviceConfig = serviceConfig // {
# loading all the gems takes time
2022-02-22 10:37:03 +00:00
TimeoutStartSec = 1200;
2022-02-16 04:33:10 +00:00
};
after = [
"network.target"
"postgresql.service"
];
requires = [
"postgresql.service"
];
description = "Zammad web";
wantedBy = [ "multi-user.target" ];
preStart = ''
# Blindly copy the whole project here.
2022-02-16 21:58:20 +00:00
chmod -R +w .
2022-02-16 04:33:10 +00:00
rm -rf ./public/assets/*
rm -rf ./tmp/*
rm -rf ./log/*
cp -r --no-preserve=owner ${cfg.package}/* .
2022-02-16 21:58:20 +00:00
chmod -R +w .
2022-02-16 04:33:10 +00:00
# config file
cp ${databaseConfig} ./config/database.yml
2022-02-16 21:58:20 +00:00
chmod -R +w .
2022-02-16 05:49:51 +00:00
${optionalString (cfg.database.passwordFile != null) ''
{
echo -n " password: "
cat ${cfg.database.passwordFile}
} >> ./config/database.yml
''}
${optionalString (cfg.secretKeyBaseFile != null) ''
{
echo "production: "
echo -n " secret_key_base: "
cat ${cfg.secretKeyBaseFile}
} > ./config/secrets.yml
''}
2022-02-22 10:37:03 +00:00
if [ `${config.services.postgresql.package}/bin/psql \
2022-02-16 04:33:10 +00:00
--host ${cfg.database.host} \
${optionalString
2022-02-22 10:44:26 +00:00
(cfg.database.port != null)
2022-02-16 04:33:10 +00:00
"--port ${toString cfg.database.port}"} \
--username ${cfg.database.user} \
--dbname ${cfg.database.name} \
--command "SELECT COUNT(*) FROM pg_class c \
JOIN pg_namespace s ON s.oid = c.relnamespace \
WHERE s.nspname NOT IN ('pg_catalog', 'pg_toast', 'information_schema') \
AND s.nspname NOT LIKE 'pg_temp%';" | sed -n 3p` -eq 0 ]; then
echo "Initialize database"
2022-02-16 00:27:40 +00:00
./bin/rake --no-system db:migrate
./bin/rake --no-system db:seed
else
echo "Migrate database"
2022-02-16 00:27:40 +00:00
./bin/rake --no-system db:migrate
fi
echo "Done"
'';
2022-02-16 04:33:10 +00:00
script = "./script/rails server -b ${cfg.host} -p ${toString cfg.port}";
};
systemd.services.zammad-websocket = {
2022-02-16 04:33:10 +00:00
inherit serviceConfig environment;
after = [ "zammad-web.service" ];
2022-02-16 04:33:10 +00:00
requires = [ "zammad-web.service" ];
description = "Zammad websocket";
wantedBy = [ "multi-user.target" ];
2022-02-16 04:33:10 +00:00
script = "./script/websocket-server.rb -b ${cfg.host} -p ${toString cfg.websocketPort} start";
};
systemd.services.zammad-scheduler = {
2022-02-16 04:33:10 +00:00
inherit environment;
serviceConfig = serviceConfig // { Type = "forking"; };
after = [ "zammad-web.service" ];
2022-02-16 04:33:10 +00:00
requires = [ "zammad-web.service" ];
description = "Zammad scheduler";
wantedBy = [ "multi-user.target" ];
2022-02-16 04:33:10 +00:00
script = "./script/scheduler.rb start";
};
};
2022-02-16 04:33:10 +00:00
meta.maintainers = with lib.maintainers; [ garbas taeer ];
}