nixos-config/services/journiv.nix

94 lines
1.9 KiB
Nix

{
config,
lib,
pkgs,
...
}: let
inherit
(lib)
mkEnableOption
mkIf
mkOption
;
cfg = config.my.services.journiv;
my = config.my;
domain = config.networking.domain;
hostname = config.networking.hostName;
fqdn = "${hostname}.${domain}";
in {
options.my.services.journiv = let
inherit (lib) types;
in {
enable = mkEnableOption "Journiv config";
home = mkOption {
type = types.str;
default = "/var/lib/journiv";
example = "/var/lib/journiv";
description = "Home for the journiv service, where data will be stored";
};
port = mkOption {
type = types.port;
example = 8080;
description = "Internal port for Journiv webapp";
};
};
config = mkIf cfg.enable {
users.users.journiv = {
isSystemUser = true;
home = cfg.home;
createHome = true;
group = "journiv";
};
users.groups.journiv = {};
services.nginx.virtualHosts = {
"journiv.${domain}" = {
forceSSL = true;
useACMEHost = fqdn;
listen = [
# FIXME: hardcoded tailscale IP
{
addr = "100.115.172.44";
port = 443;
ssl = true;
}
{
addr = "100.115.172.44";
port = 80;
ssl = false;
}
];
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.port}";
proxyWebsockets = true;
};
extraConfig = ''
proxy_connect_timeout 600;
proxy_read_timeout 600;
proxy_send_timeout 600;
client_max_body_size 500m;
access_log syslog:server=unix:/dev/log,tag=journiv;
'';
};
};
security.acme.certs.${fqdn}.extraDomainNames = ["journiv.${domain}"];
# my.services.restic-backup = mkIf cfg.enable {
# paths = [
# cfg.home
# ];
# exclude = [
# "${cfg.home}/storage"
# ];
# };
};
}