nixos-config/services/paperless.nix

122 lines
3.2 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.my.services.paperless;
my = config.my;
domain = config.networking.domain;
paperlessDomain = "paperless.${domain}";
secretKeyFile = pkgs.writeText "paperless-secret-key-file.env" my.secrets.paperless.secretKey;
in
{
options.my.services.paperless = {
enable = lib.mkEnableOption "Paperless";
port = mkOption {
type = types.port;
default = 8080;
example = 8080;
description = "Internal port for Paperless service";
};
};
config = mkIf cfg.enable {
services.paperless-ng = {
enable = true;
port = cfg.port;
passwordFile = pkgs.writeText "paperless-password-file.txt" config.my.secrets.paperless.adminPassword;
extraConfig = {
# Postgres settings
PAPERLESS_DBHOST = "/run/postgresql";
PAPERLESS_DBUSER = "paperless";
PAPERLESS_DBNAME = "paperless";
PAPERLESS_ALLOWED_HOSTS = paperlessDomain;
PAPERLESS_CORS_ALLOWED_HOSTS = "https://${paperlessDomain}";
PAPERLESS_OCR_LANGUAGE = "fra+eng";
PAPERLESS_TIME_ZONE = config.time.timeZone;
PAPERLESS_ADMIN_USER = "alarsyo";
# FIXME: upstream module should be fixed instead of setting the redis URL myself
PAPERLESS_REDIS = "unix://${config.services.redis.servers.paperless.unixSocket}";
};
};
systemd.services = {
paperless-ng-server.serviceConfig = {
EnvironmentFile = secretKeyFile;
BindReadOnlyPaths = [ config.services.redis.servers.paperless.unixSocket ];
};
paperless-ng-consumer.serviceConfig = {
EnvironmentFile = secretKeyFile;
BindReadOnlyPaths = [ config.services.redis.servers.paperless.unixSocket ];
};
paperless-ng-web.serviceConfig = {
EnvironmentFile = secretKeyFile;
BindReadOnlyPaths = [ config.services.redis.servers.paperless.unixSocket ];
};
};
services.postgresql = {
enable = true;
ensureDatabases = [ "paperless" ];
ensureUsers = [
{
name = "paperless";
ensurePermissions."DATABASE paperless" = "ALL PRIVILEGES";
}
];
};
services.redis.servers.paperless.enable = true;
systemd.services.paperless-ng-server = {
# Make sure the DB is available
after = [ "postgresql.service" ];
};
services.nginx.virtualHosts = {
"${paperlessDomain}" = {
forceSSL = true;
useACMEHost = domain;
listen = [
# FIXME: hardcoded tailscale IP
{
addr = "100.80.61.67";
port = 443;
ssl = true;
}
{
addr = "100.80.61.67";
port = 80;
ssl = false;
}
];
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.port}";
proxyWebsockets = true;
};
};
};
2021-07-13 22:20:21 +02:00
users.users.${config.services.paperless-ng.user} = {
extraGroups = [ config.services.redis.servers.paperless.user ];
};
my.services.restic-backup = mkIf cfg.enable {
2021-07-14 03:00:36 +02:00
paths = [
config.services.paperless-ng.dataDir
config.services.paperless-ng.mediaDir
2021-07-14 03:00:36 +02:00
];
2021-07-13 22:20:21 +02:00
};
};
}