mirror of
https://github.com/buckley310/nixos-config.git
synced 2024-12-21 19:24:15 +00:00
121 lines
3.2 KiB
Nix
121 lines
3.2 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
let
|
|
cfg = config.sconfig.phpipam;
|
|
|
|
version = "1.4.2";
|
|
|
|
phpipamHtdocs = pkgs.stdenv.mkDerivation {
|
|
inherit version;
|
|
pname = "phpipam-htdocs";
|
|
src = pkgs.fetchFromGitHub {
|
|
owner = "phpipam";
|
|
repo = "phpipam";
|
|
rev = "v${version}";
|
|
sha256 = "1yqlqcfclq331ssv2hz44mp6f4r9d8mwi26wsca51nlar43w40xg";
|
|
fetchSubmodules = true;
|
|
};
|
|
installPhase = ''
|
|
cp -r "$src" "$out"
|
|
chmod +w "$out"
|
|
mv "$out/config.docker.php" "$out/config.php"
|
|
'';
|
|
};
|
|
|
|
in
|
|
{
|
|
options.sconfig.phpipam = {
|
|
|
|
enable = lib.mkEnableOption "Enable phpipam";
|
|
|
|
domainName = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "localhost";
|
|
};
|
|
|
|
useTLS = lib.mkOption {
|
|
type = lib.types.bool;
|
|
default = false;
|
|
};
|
|
|
|
certificatePath = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "/etc/nixos/phpipam.crt";
|
|
};
|
|
|
|
certificateKeyPath = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "/etc/nixos/phpipam.key";
|
|
};
|
|
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
systemd.services = {
|
|
phpipam_ping = {
|
|
script = "exec ${pkgs.php}/bin/php ${phpipamHtdocs}/functions/scripts/pingCheck.php";
|
|
environment.IPAM_DATABASE_USER = "nginx";
|
|
serviceConfig.User = "nginx";
|
|
startAt = "*:0/15";
|
|
};
|
|
phpipam_discovery = {
|
|
script = "exec ${pkgs.php}/bin/php ${phpipamHtdocs}/functions/scripts/discoveryCheck.php";
|
|
environment.IPAM_DATABASE_USER = "nginx";
|
|
serviceConfig.User = "nginx";
|
|
startAt = "*:0/15";
|
|
};
|
|
};
|
|
|
|
services = {
|
|
|
|
phpfpm.pools.www = {
|
|
user = "nginx";
|
|
group = "nginx";
|
|
phpEnv.IPAM_DATABASE_USER = "nginx";
|
|
phpEnv.PHP_INI_SCAN_DIR = "$PHP_INI_SCAN_DIR";
|
|
phpOptions = ''
|
|
date.timezone = America/New_York
|
|
max_execution_time = 600
|
|
'';
|
|
settings = {
|
|
"pm" = "ondemand";
|
|
"pm.max_children" = "8";
|
|
"listen.group" = "nginx";
|
|
"php_admin_value[error_log]" = "stderr";
|
|
"catch_workers_output" = "yes";
|
|
};
|
|
};
|
|
|
|
nginx = {
|
|
enable = true;
|
|
virtualHosts."${cfg.domainName}" = {
|
|
addSSL = cfg.useTLS;
|
|
sslCertificate = cfg.certificatePath;
|
|
sslCertificateKey = cfg.certificateKeyPath;
|
|
extraConfig = "access_log syslog:server=unix:/dev/log;";
|
|
root = phpipamHtdocs;
|
|
locations."/".extraConfig = ''
|
|
try_files $uri $uri/ /index.php; index index.php;
|
|
'';
|
|
locations."/api/".extraConfig = ''
|
|
try_files $uri $uri/ /api/index.php;
|
|
'';
|
|
locations."~ \\.php$".extraConfig = ''
|
|
fastcgi_pass unix:${config.services.phpfpm.pools.www.socket};
|
|
fastcgi_index index.php;
|
|
try_files $uri $uri/ index.php = 404;
|
|
include ${pkgs.nginx}/conf/fastcgi.conf;
|
|
'';
|
|
};
|
|
};
|
|
|
|
mysql = {
|
|
enable = true;
|
|
package = pkgs.mariadb;
|
|
ensureDatabases = [ "phpipam" ];
|
|
ensureUsers = [{ name = "nginx"; ensurePermissions = { "phpipam.*" = "ALL PRIVILEGES"; }; }];
|
|
};
|
|
|
|
};
|
|
};
|
|
}
|