erpnext-nix/test-vm/configuration.nix

204 lines
6.1 KiB
Nix
Raw Normal View History

{ pkgs, lib, config, modulesPath, ... }:
{
imports = [
"${modulesPath}/profiles/minimal.nix"
"${modulesPath}/profiles/qemu-guest.nix"
"${modulesPath}/virtualisation/qemu-vm.nix"
];
config = {
services.qemuGuest.enable = true;
2023-06-05 17:28:33 +00:00
system.stateVersion = "23.05";
fileSystems."/" = {
device = "/dev/disk/by-label/nixos";
fsType = "ext4";
autoResize = true;
};
boot = {
growPartition = true;
loader.timeout = 5;
};
virtualisation = {
diskSize = 8000; # MB
memorySize = 2048; # MB
# We don't want to use tmpfs, otherwise the nix store's size will be bounded
# by a fraction of available RAM.
writableStoreUseTmpfs = false;
2023-06-05 17:28:33 +00:00
forwardPorts = [{
guest.port = 22;
host.port = 2222;
} {
guest.port = 9090;
host.port = 9090;
2023-06-06 04:19:10 +00:00
} {
guest.port = 8081;
host.port = 8081;
2023-06-05 17:28:33 +00:00
}];
};
# So that we can ssh into the VM, see e.g.
# http://blog.patapon.info/nixos-local-vm/#accessing-the-vm-with-ssh
services.openssh.enable = true;
services.openssh.settings.PermitRootLogin = "yes";
# Give root an empty password to ssh in.
users.extraUsers.root.password = "";
2023-06-05 17:28:33 +00:00
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMNeQYLFauAbzDyIbKC86NUh9yZfiyBm/BtIdkcpZnSU"
];
users.mutableUsers = false;
2023-06-05 17:28:33 +00:00
networking.firewall.enable = false;
environment.systemPackages = with pkgs; [
git
htop
neovim
];
services.mysql = {
enable = true;
package = pkgs.mariadb;
2023-06-05 17:28:33 +00:00
ensureUsers = [{
name = "root";
ensurePermissions = {
"*.*" = "ALL PRIVILEGES";
};
}];
ensureDatabases = [ "root" ];
};
services.redis.servers = {
# Queue, naming it "" makes it use default values.
"".enable = true;
socketio = {
enable = true;
port = 12311;
};
};
users.users.erpnext = {
description = "User to run erpnext";
group = "erpnext";
isSystemUser = true;
2023-06-05 17:28:33 +00:00
home = "/var/lib/erpnext";
createHome = true;
};
2023-06-05 17:28:33 +00:00
systemd.services.setup-mysql = {
enable = true;
before = [ "erpnext.service" ];
after = [ "mysql.service" ];
wantedBy = [ "erpnext.service" ];
partOf = [ "erpnext.service" ];
script = ''
${pkgs.mariadb-client}/bin/mysql -e "SET PASSWORD FOR 'root'@'localhost' = PASSWORD('password')";
'';
serviceConfig = {
RemainAfterExit = true;
Type = "oneshot";
};
2023-06-05 17:28:33 +00:00
};
systemd.services.ensure-bench-dir = {
enable = true;
2023-06-05 17:28:33 +00:00
before = [ "erpnext.service" ];
wantedBy = [ "erpnext.service" ];
partOf = [ "erpnext.service" ];
script = ''
2023-06-07 19:58:05 +00:00
for subdir in apps sites config/pids logs; do
mkdir -p /var/lib/erpnext/bench/$subdir
done
2023-06-05 17:28:33 +00:00
'';
serviceConfig = {
RemainAfterExit = true;
Type = "oneshot";
User = "erpnext";
};
};
2023-06-06 04:19:10 +00:00
services.nginx = {
enable = true;
2023-06-07 19:58:05 +00:00
appendHttpConfig = builtins.readFile "${pkgs.erpnext-nginx-conf}";
2023-06-06 04:19:10 +00:00
};
2023-06-05 17:28:33 +00:00
systemd.services.erpnext =
let
2023-06-12 13:28:17 +00:00
penv = pkgs.python3.buildEnv.override {
extraLibs = [
2023-06-12 13:28:17 +00:00
pkgs.python3.pkgs.frappe
pkgs.python3.pkgs.erpnext
pkgs.python3.pkgs.bench
];
};
2023-06-05 17:28:33 +00:00
appsFile = pkgs.writeText "erpnext-apps.txt" ''
frappe
erpnext
2023-06-05 17:28:33 +00:00
'';
2023-06-05 17:28:33 +00:00
# In a module, this could be provided by a use as a file as it could
# contain secrets and we don't want this in the nix-store. But here it
# is OK.
commonSiteConfig = pkgs.writeText "erpnext-common_site_config.json" ''
{
"db_host": "localhost",
"db_port": 3306,
"db_name": "erpnext" ,
"db_password": "erpnext" ,
"redis_cache": "redis://localhost:6379?db=0",
"redis_queue": "redis://localhost:6379?db=1",
"redis_socketio": "redis://localhost:6379?db=2",
2023-06-05 17:28:33 +00:00
"socketio_port": 3000
}
'';
2023-06-05 17:28:33 +00:00
in
{
enable = true;
wantedBy = [ "multi-user.target" ];
after = [ "mysql.service" "redis.service" "redis-socketio.service" ];
description = "ERPNext";
confinement = {
enable = true;
packages = [ pkgs.mariadb-client pkgs.nodejs penv ];
};
script = ''
2023-06-12 13:28:17 +00:00
export PYTHON_PATH=${penv}/${pkgs.python3.sitePackages}
2023-06-05 17:28:33 +00:00
export PATH="${pkgs.mariadb-client}/bin:${pkgs.nodejs}/bin:${penv}/bin:$PATH"
# Upstream initializes the DB with this command
# TODO: Make this idempotent
cd /var/lib/erpnext/bench/sites
2023-06-07 19:58:05 +00:00
bench new-site localhost --mariadb-root-password password --admin-password admin || true
2023-06-05 17:28:33 +00:00
bench --site localhost install-app erpnext
# TODO: Run these as systemd units
node /var/lib/erpnext/bench/apps/frappe/socketio.js &
gunicorn --chdir="/var/lib/erpnext/bench/sites" --bind=0.0.0.0:9090 --threads=4 --workers=2 --worker-class=gthread --worker-tmp-dir=/dev/shm --timeout=120 --preload frappe.app:application
'';
serviceConfig = {
User = "erpnext";
NoNewPrivileges = true;
Type = "simple";
BindReadOnlyPaths = [
"/etc/hosts:/etc/hosts"
2023-06-07 19:58:05 +00:00
"${pkgs.frappe-app}:${pkgs.frappe-app}"
2023-06-05 17:28:33 +00:00
"${pkgs.frappe-app}/share/apps/frappe:/var/lib/erpnext/bench/apps/frappe"
2023-06-07 19:58:05 +00:00
"${pkgs.erpnext-app}:${pkgs.erpnext-app}"
2023-06-05 17:28:33 +00:00
"${pkgs.erpnext-app}/share/apps/erpnext:/var/lib/erpnext/bench/apps/erpnext"
"${pkgs.frappe-erpnext-assets}/share/sites/assets:/var/lib/erpnext/bench/sites/assets"
"${appsFile}:/var/lib/erpnext/bench/sites/apps.txt"
"${commonSiteConfig}:/var/lib/erpnext/bench/sites/common_site_config.json"
"${penv}:/var/lib/erpnext/bench/env"
];
BindPaths = [
"/var/lib/erpnext:/var/lib/erpnext"
];
};
};
};
}