mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-29 00:54:11 +00:00
galene: init at 0.2
This commit is contained in:
parent
7b968c79a1
commit
cea5fca275
|
@ -864,6 +864,7 @@
|
|||
./services/web-apps/documize.nix
|
||||
./services/web-apps/dokuwiki.nix
|
||||
./services/web-apps/engelsystem.nix
|
||||
./services/web-apps/galene.nix
|
||||
./services/web-apps/gerrit.nix
|
||||
./services/web-apps/gotify-server.nix
|
||||
./services/web-apps/grocy.nix
|
||||
|
|
178
nixos/modules/services/web-apps/galene.nix
Normal file
178
nixos/modules/services/web-apps/galene.nix
Normal file
|
@ -0,0 +1,178 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with lib;
|
||||
let
|
||||
cfg = config.services.galene;
|
||||
defaultstateDir = "/var/lib/galene";
|
||||
defaultrecordingsDir = "${cfg.stateDir}/recordings";
|
||||
defaultgroupsDir = "${cfg.stateDir}/groups";
|
||||
defaultdataDir = "${cfg.stateDir}/data";
|
||||
in
|
||||
{
|
||||
options = {
|
||||
services.galene = {
|
||||
enable = mkEnableOption "Galene Service.";
|
||||
|
||||
stateDir = mkOption {
|
||||
default = defaultstateDir;
|
||||
type = types.str;
|
||||
description = ''
|
||||
The directory where Galene stores its internal state. If left as the default
|
||||
value this directory will automatically be created before the Galene server
|
||||
starts, otherwise the sysadmin is responsible for ensuring the directory
|
||||
exists with appropriate ownership and permissions.
|
||||
'';
|
||||
};
|
||||
|
||||
user = mkOption {
|
||||
type = types.str;
|
||||
default = "galene";
|
||||
description = "User account under which galene runs.";
|
||||
};
|
||||
|
||||
group = mkOption {
|
||||
type = types.str;
|
||||
default = "galene";
|
||||
description = "Group under which galene runs.";
|
||||
};
|
||||
|
||||
insecure = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = ''
|
||||
Whether Galene should listen in http or in https. If left as the default
|
||||
value (false), Galene needs to be fed a private key and a certificate.
|
||||
'';
|
||||
};
|
||||
|
||||
certFile = mkOption {
|
||||
type = types.nullOr types.str;
|
||||
default = null;
|
||||
example = "/path/to/your/cert.pem";
|
||||
description = ''
|
||||
Path to the server's certificate. The file is copied at runtime to
|
||||
Galene's data directory where it needs to reside.
|
||||
'';
|
||||
};
|
||||
|
||||
keyFile = mkOption {
|
||||
type = types.nullOr types.str;
|
||||
default = null;
|
||||
example = "/path/to/your/key.pem";
|
||||
description = ''
|
||||
Path to the server's private key. The file is copied at runtime to
|
||||
Galene's data directory where it needs to reside.
|
||||
'';
|
||||
};
|
||||
|
||||
httpAddress = mkOption {
|
||||
type = types.str;
|
||||
default = "";
|
||||
description = "HTTP listen address for galene.";
|
||||
};
|
||||
|
||||
httpPort = mkOption {
|
||||
type = types.port;
|
||||
default = 8443;
|
||||
description = "HTTP listen port.";
|
||||
};
|
||||
|
||||
staticDir = mkOption {
|
||||
type = types.str;
|
||||
default = "${cfg.package.static}/static";
|
||||
example = "/var/lib/galene/static";
|
||||
description = "Web server directory.";
|
||||
};
|
||||
|
||||
recordingsDir = mkOption {
|
||||
type = types.str;
|
||||
default = defaultrecordingsDir;
|
||||
example = "/var/lib/galene/recordings";
|
||||
description = "Recordings directory.";
|
||||
};
|
||||
|
||||
dataDir = mkOption {
|
||||
type = types.str;
|
||||
default = defaultdataDir;
|
||||
example = "/var/lib/galene/data";
|
||||
description = "Data directory.";
|
||||
};
|
||||
|
||||
groupsDir = mkOption {
|
||||
type = types.str;
|
||||
default = defaultgroupsDir;
|
||||
example = "/var/lib/galene/groups";
|
||||
description = "Web server directory.";
|
||||
};
|
||||
|
||||
package = mkOption {
|
||||
default = pkgs.galene;
|
||||
defaultText = "pkgs.galene";
|
||||
type = types.package;
|
||||
description = ''
|
||||
Package for running Galene.
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
assertions = [
|
||||
{
|
||||
assertion = cfg.insecure || (cfg.certFile != null && cfg.keyFile != null);
|
||||
message = ''
|
||||
Galene needs both certFile and keyFile defined for encryption, or
|
||||
the insecure flag.
|
||||
'';
|
||||
}
|
||||
];
|
||||
|
||||
systemd.services.galene = {
|
||||
description = "galene";
|
||||
after = [ "network.target" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
||||
preStart = ''
|
||||
install -m 700 -o '${cfg.user}' -g '${cfg.group}' ${cfg.certFile} ${cfg.dataDir}/cert.pem
|
||||
install -m 700 -o '${cfg.user}' -g '${cfg.group}' ${cfg.keyFile} ${cfg.dataDir}/key.pem
|
||||
'';
|
||||
|
||||
serviceConfig = mkMerge [
|
||||
{
|
||||
Type = "simple";
|
||||
User = cfg.user;
|
||||
Group = cfg.group;
|
||||
WorkingDirectory = cfg.stateDir;
|
||||
ExecStart = ''${cfg.package}/bin/galene \
|
||||
${optionalString (cfg.insecure) "-insecure"} \
|
||||
-data ${cfg.dataDir} \
|
||||
-groups ${cfg.groupsDir} \
|
||||
-recordings ${cfg.recordingsDir} \
|
||||
-static ${cfg.staticDir}'';
|
||||
Restart = "always";
|
||||
# Upstream Requirements
|
||||
LimitNOFILE = 65536;
|
||||
StateDirectory = [ ] ++
|
||||
optional (cfg.stateDir == defaultstateDir) "galene" ++
|
||||
optional (cfg.dataDir == defaultdataDir) "galene/data" ++
|
||||
optional (cfg.groupsDir == defaultgroupsDir) "galene/groups" ++
|
||||
optional (cfg.recordingsDir == defaultrecordingsDir) "galene/recordings";
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
users.users = mkIf (cfg.user == "galene")
|
||||
{
|
||||
galene = {
|
||||
description = "galene Service";
|
||||
group = cfg.group;
|
||||
isSystemUser = true;
|
||||
};
|
||||
};
|
||||
|
||||
users.groups = mkIf (cfg.group == "galene") {
|
||||
galene = { };
|
||||
};
|
||||
};
|
||||
meta.maintainers = with lib.maintainers; [ rgrunbla ];
|
||||
}
|
30
pkgs/servers/web-apps/galene/default.nix
Normal file
30
pkgs/servers/web-apps/galene/default.nix
Normal file
|
@ -0,0 +1,30 @@
|
|||
{ stdenv, fetchFromGitHub, buildGoModule }:
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "galene";
|
||||
version = "0.2";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "jech";
|
||||
repo = "galene";
|
||||
rev = "galene-${version}";
|
||||
sha256 = "0hpgqqv8mp1d3sk7dk49m3yv0cv4afa0v3vdd4w8mdnx6pcqdgy1";
|
||||
};
|
||||
|
||||
vendorSha256 = "12b7andpzsgzmd56gg4gc5ilkxvjrpwpmwbdmygfzgkd5jncmcgp";
|
||||
|
||||
outputs = [ "out" "static" ];
|
||||
|
||||
postInstall = ''
|
||||
mkdir $static
|
||||
cp -r ./static $static
|
||||
'';
|
||||
|
||||
meta = with stdenv.lib; {
|
||||
description = "Videoconferencing server that is easy to deploy, written in Go";
|
||||
homepage = "https://github.com/jech/galene";
|
||||
license = licenses.mit;
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ rgrunbla ];
|
||||
};
|
||||
}
|
|
@ -1207,6 +1207,8 @@ in
|
|||
|
||||
gaia = callPackage ../development/libraries/gaia { };
|
||||
|
||||
galene = callPackage ../servers/web-apps/galene {};
|
||||
|
||||
gamecube-tools = callPackage ../development/tools/gamecube-tools { };
|
||||
|
||||
gammy = qt5.callPackage ../tools/misc/gammy { };
|
||||
|
|
Loading…
Reference in a new issue