2023-06-03 17:31:46 +00:00
|
|
|
{ pkgs, lib, config, modulesPath, ... }:
|
|
|
|
{
|
|
|
|
imports = [
|
|
|
|
"${modulesPath}/profiles/minimal.nix"
|
|
|
|
"${modulesPath}/profiles/qemu-guest.nix"
|
|
|
|
"${modulesPath}/virtualisation/qemu-vm.nix"
|
|
|
|
];
|
|
|
|
|
|
|
|
config = {
|
|
|
|
services.qemuGuest.enable = true;
|
2023-06-05 17:28:33 +00:00
|
|
|
system.stateVersion = "23.05";
|
2023-06-03 17:31:46 +00:00
|
|
|
|
|
|
|
fileSystems."/" = {
|
|
|
|
device = "/dev/disk/by-label/nixos";
|
|
|
|
fsType = "ext4";
|
|
|
|
autoResize = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
boot = {
|
|
|
|
growPartition = true;
|
|
|
|
loader.timeout = 5;
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation = {
|
|
|
|
diskSize = 8000; # MB
|
|
|
|
memorySize = 2048; # MB
|
|
|
|
|
|
|
|
# We don't want to use tmpfs, otherwise the nix store's size will be bounded
|
|
|
|
# by a fraction of available RAM.
|
|
|
|
writableStoreUseTmpfs = false;
|
2023-06-05 17:28:33 +00:00
|
|
|
|
|
|
|
forwardPorts = [{
|
|
|
|
guest.port = 22;
|
|
|
|
host.port = 2222;
|
|
|
|
} {
|
|
|
|
guest.port = 9090;
|
|
|
|
host.port = 9090;
|
2023-06-06 04:19:10 +00:00
|
|
|
} {
|
|
|
|
guest.port = 8081;
|
|
|
|
host.port = 8081;
|
2023-06-05 17:28:33 +00:00
|
|
|
}];
|
2023-06-03 17:31:46 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
# So that we can ssh into the VM, see e.g.
|
|
|
|
# http://blog.patapon.info/nixos-local-vm/#accessing-the-vm-with-ssh
|
|
|
|
services.openssh.enable = true;
|
|
|
|
services.openssh.settings.PermitRootLogin = "yes";
|
|
|
|
# Give root an empty password to ssh in.
|
|
|
|
users.extraUsers.root.password = "";
|
2023-06-05 17:28:33 +00:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMNeQYLFauAbzDyIbKC86NUh9yZfiyBm/BtIdkcpZnSU"
|
|
|
|
];
|
2023-06-03 17:31:46 +00:00
|
|
|
users.mutableUsers = false;
|
2023-06-05 17:28:33 +00:00
|
|
|
networking.firewall.enable = false;
|
2023-06-03 17:31:46 +00:00
|
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
git
|
|
|
|
htop
|
|
|
|
neovim
|
|
|
|
];
|
|
|
|
|
|
|
|
services.mysql = {
|
|
|
|
enable = true;
|
|
|
|
package = pkgs.mariadb;
|
2023-06-05 17:28:33 +00:00
|
|
|
ensureUsers = [{
|
|
|
|
name = "root";
|
|
|
|
ensurePermissions = {
|
|
|
|
"*.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
}];
|
|
|
|
ensureDatabases = [ "root" ];
|
2023-06-03 17:31:46 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
services.redis.servers = {
|
|
|
|
# Queue, naming it "" makes it use default values.
|
|
|
|
"".enable = true;
|
|
|
|
|
|
|
|
socketio = {
|
|
|
|
enable = true;
|
|
|
|
port = 12311;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
users.users.erpnext = {
|
|
|
|
description = "User to run erpnext";
|
|
|
|
group = "erpnext";
|
|
|
|
isSystemUser = true;
|
2023-06-05 17:28:33 +00:00
|
|
|
home = "/var/lib/erpnext";
|
|
|
|
createHome = true;
|
2023-06-03 17:31:46 +00:00
|
|
|
};
|
|
|
|
|
2023-06-05 17:28:33 +00:00
|
|
|
systemd.services.setup-mysql = {
|
|
|
|
enable = true;
|
|
|
|
before = [ "erpnext.service" ];
|
|
|
|
after = [ "mysql.service" ];
|
|
|
|
wantedBy = [ "erpnext.service" ];
|
|
|
|
partOf = [ "erpnext.service" ];
|
|
|
|
script = ''
|
|
|
|
${pkgs.mariadb-client}/bin/mysql -e "SET PASSWORD FOR 'root'@'localhost' = PASSWORD('password')";
|
|
|
|
'';
|
|
|
|
serviceConfig = {
|
|
|
|
RemainAfterExit = true;
|
|
|
|
Type = "oneshot";
|
2023-06-05 17:19:43 +00:00
|
|
|
};
|
2023-06-05 17:28:33 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.ensure-bench-dir = {
|
2023-06-05 17:19:43 +00:00
|
|
|
enable = true;
|
2023-06-05 17:28:33 +00:00
|
|
|
before = [ "erpnext.service" ];
|
|
|
|
wantedBy = [ "erpnext.service" ];
|
|
|
|
partOf = [ "erpnext.service" ];
|
|
|
|
script = ''
|
|
|
|
cd /var/lib/erpnext
|
|
|
|
mkdir bench
|
|
|
|
cd bench
|
|
|
|
mkdir -p apps sites config/pids logs
|
|
|
|
'';
|
|
|
|
serviceConfig = {
|
|
|
|
RemainAfterExit = true;
|
|
|
|
Type = "oneshot";
|
|
|
|
User = "erpnext";
|
|
|
|
};
|
|
|
|
};
|
2023-06-05 17:19:43 +00:00
|
|
|
|
2023-06-06 04:19:10 +00:00
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
config = builtins.readFile "${pkgs.erpnext-nginx-conf}";
|
|
|
|
};
|
|
|
|
|
2023-06-05 17:28:33 +00:00
|
|
|
systemd.services.erpnext =
|
2023-06-03 17:31:46 +00:00
|
|
|
let
|
2023-06-05 17:28:33 +00:00
|
|
|
penv = pkgs.python3-erpnext.buildEnv.override {
|
2023-06-03 17:31:46 +00:00
|
|
|
extraLibs = [
|
2023-06-05 17:28:33 +00:00
|
|
|
pkgs.python3-erpnext.pkgs.frappe
|
|
|
|
pkgs.python3-erpnext.pkgs.erpnext
|
|
|
|
pkgs.python3-erpnext.pkgs.bench
|
2023-06-03 17:31:46 +00:00
|
|
|
];
|
|
|
|
};
|
2023-06-05 17:28:33 +00:00
|
|
|
appsFile = pkgs.writeText "erpnext-apps.txt" ''
|
2023-06-05 17:19:43 +00:00
|
|
|
frappe
|
|
|
|
erpnext
|
2023-06-05 17:28:33 +00:00
|
|
|
'';
|
2023-06-05 17:19:43 +00:00
|
|
|
|
2023-06-05 17:28:33 +00:00
|
|
|
# In a module, this could be provided by a use as a file as it could
|
|
|
|
# contain secrets and we don't want this in the nix-store. But here it
|
|
|
|
# is OK.
|
|
|
|
commonSiteConfig = pkgs.writeText "erpnext-common_site_config.json" ''
|
2023-06-05 17:19:43 +00:00
|
|
|
{
|
|
|
|
"db_host": "localhost",
|
|
|
|
"db_port": 3306,
|
|
|
|
"db_name": "erpnext" ,
|
|
|
|
"db_password": "erpnext" ,
|
|
|
|
"redis_cache": "redis://localhost:6379?db=0",
|
|
|
|
"redis_queue": "redis://localhost:6379?db=1",
|
|
|
|
"redis_socketio": "redis://localhost:6379?db=2",
|
2023-06-05 17:28:33 +00:00
|
|
|
"socketio_port": 3000
|
2023-06-05 17:19:43 +00:00
|
|
|
}
|
|
|
|
'';
|
2023-06-05 17:28:33 +00:00
|
|
|
in
|
|
|
|
{
|
|
|
|
enable = true;
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "mysql.service" "redis.service" "redis-socketio.service" ];
|
|
|
|
description = "ERPNext";
|
|
|
|
confinement = {
|
|
|
|
enable = true;
|
|
|
|
packages = [ pkgs.mariadb-client pkgs.nodejs penv ];
|
|
|
|
};
|
|
|
|
script = ''
|
|
|
|
export PYTHON_PATH=${penv}/${pkgs.python3-erpnext.sitePackages}
|
|
|
|
export PATH="${pkgs.mariadb-client}/bin:${pkgs.nodejs}/bin:${penv}/bin:$PATH"
|
|
|
|
|
|
|
|
# Upstream initializes the DB with this command
|
|
|
|
# TODO: Make this idempotent
|
|
|
|
cd /var/lib/erpnext/bench/sites
|
|
|
|
bench new-site localhost --mariadb-root-password password --admin-password admin
|
|
|
|
bench --site localhost install-app erpnext
|
|
|
|
|
|
|
|
# TODO: Run these as systemd units
|
|
|
|
node /var/lib/erpnext/bench/apps/frappe/socketio.js &
|
|
|
|
gunicorn --chdir="/var/lib/erpnext/bench/sites" --bind=0.0.0.0:9090 --threads=4 --workers=2 --worker-class=gthread --worker-tmp-dir=/dev/shm --timeout=120 --preload frappe.app:application
|
|
|
|
'';
|
|
|
|
serviceConfig = {
|
|
|
|
User = "erpnext";
|
|
|
|
NoNewPrivileges = true;
|
|
|
|
Type = "simple";
|
|
|
|
BindReadOnlyPaths = [
|
|
|
|
"/etc/hosts:/etc/hosts"
|
|
|
|
"${pkgs.frappe-app}/share/apps/frappe:/var/lib/erpnext/bench/apps/frappe"
|
|
|
|
"${pkgs.erpnext-app}/share/apps/erpnext:/var/lib/erpnext/bench/apps/erpnext"
|
|
|
|
"${pkgs.frappe-erpnext-assets}/share/sites/assets:/var/lib/erpnext/bench/sites/assets"
|
|
|
|
"${appsFile}:/var/lib/erpnext/bench/sites/apps.txt"
|
|
|
|
"${commonSiteConfig}:/var/lib/erpnext/bench/sites/common_site_config.json"
|
|
|
|
"${penv}:/var/lib/erpnext/bench/env"
|
|
|
|
];
|
|
|
|
BindPaths = [
|
|
|
|
"/var/lib/erpnext:/var/lib/erpnext"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
2023-06-03 17:31:46 +00:00
|
|
|
};
|
|
|
|
}
|