blob: f7d7b94ab93dfe3e798a60866a6a81801028b976 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
{ config, pkgs, ... }:
# Future People: This place is not a place of honor... no highly esteemed deed
# is commemorated here... nothing valued is here...
# Look at the docker volumes section: You'll have to build and fail a few
# times... sorry
let
ports = import ../ports.nix;
pretix_config = pkgs.writeText "pretix.cfg" ''
[pretix]
instance_name=tickets.emile.space
url=https://tickets.emile.space
currency=EUR
; DO NOT change the following value, it has to be set to the location of the
; directory *inside* the docker container
datadir=/data
cookie_domain=tickets.emile.space
trust_x_forwarded_for=on
trust_x_forwarded_proto=on
[database]
backend=sqlite3
[mail]
; See config file documentation for more options
from=tickets@emile.space
; This is the default IP address of your docker host in docker's virtual
; network. Make sure postfix listens on this address.
host=mail.emile.space
user=mail
password=${config.age.secrets.mail_password.path}
port=1025
tls=on
ssl=off
[redis]
location=unix:///pretix/redis.sock?db=0
; Remove the following line if you are unsure about your redis' security
; to reduce impact if redis gets compromised.
sessions=true
[celery]
backend=redis+socket:///pretix/redis.sock?virtual_host=1
broker=redis+socket:///pretix/redis.sock?virtual_host=2
'';
in {
services.nginx.virtualHosts."tickets.emile.space" = {
forceSSL = true;
enableACME = true;
# serverAliases = [
# "falscher-ha.se"
# ];
locations = {
"/" = {
extraConfig = ''
proxy_pass http://127.0.0.1:${toString ports.tickets};
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
'';
};
};
};
virtualisation.oci-containers.containers = {
pretix = {
image = "pretix/standalone:stable";
ports = [
"127.0.0.1:${toString ports.tickets}:80"
];
volumes = [
"/var/pretix-data:/data"
"/etc/pretix:/etc/pretix"
"/run/redis-pretix/redis.sock:/pretix/redis.sock"
# "/run/redis:/var/run/redis"
# update the below manually using the result from
# ; readlink /etc/static/pretix.cfg
# after building and failing once
# (yes, I'm so annoyed that I can't mount symlinks into docker containers)
# "/nix/store/vch1g88b5za1ab79cikil3n7wqrl8wxg-etc-pretix.cfg:/etc/pretix/pretix.cfg"
# "/nix/store/rcxvnbg7iqb1z011ybanj3982153xi70-etc-pretix.cfg:/etc/pretix/pretix.cfg"
"${pretix_config}:/etc/pretix/pretix.cfg"
];
extraOptions = [
# "--sysctl net.core.somaxconn=4096"
];
};
};
services.redis.vmOverCommit = true;
services.redis.servers."pretix" = {
enable = true;
port = 0;
unixSocketPerm = 666;
user = "pretixuser";
};
users = {
groups."pretixuser" = {};
users."pretixuser" = {
isNormalUser = true; # we're setting the uid manually, nix should detect this, but whatever...
uid = 15371;
group = "pretixuser";
description = "The user for pretix. Created, as we need a user to set the permissions for the redis unix socket";
};
};
# Allow access to the unix socket for the "redis" group.
# services.redis.settings.unixsocketperm = "770";
# trace: warning: The option `services.redis.settings' defined in `/nix/store/ib5271hcbjqrxb0yrmrjcypvpacmnp2s-source/ops/modules/www/tickets.emile.space.nix' has been renamed to `services.redis.servers."".settings'.
}
|