0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-14 22:20:30 +03:00
nixpkgs/nixos/modules/services/networking/wasabibackend.nix

190 lines
5.4 KiB
Nix
Raw Permalink Normal View History

{
config,
lib,
options,
pkgs,
...
}:
2020-06-18 14:18:39 +02:00
let
cfg = config.services.wasabibackend;
opt = options.services.wasabibackend;
2020-06-18 14:18:39 +02:00
inherit (lib)
literalExpression
mkEnableOption
mkIf
mkOption
optionalAttrs
optionalString
types
;
confOptions =
{
2020-06-18 14:18:39 +02:00
BitcoinRpcConnectionString = "${cfg.rpc.user}:${cfg.rpc.password}";
}
// optionalAttrs (cfg.network == "mainnet") {
2020-06-18 14:18:39 +02:00
Network = "Main";
MainNetBitcoinP2pEndPoint = "${cfg.endpoint.ip}:${toString cfg.endpoint.port}";
MainNetBitcoinCoreRpcEndPoint = "${cfg.rpc.ip}:${toString cfg.rpc.port}";
}
// optionalAttrs (cfg.network == "testnet") {
2020-06-18 14:18:39 +02:00
Network = "TestNet";
TestNetBitcoinP2pEndPoint = "${cfg.endpoint.ip}:${toString cfg.endpoint.port}";
TestNetBitcoinCoreRpcEndPoint = "${cfg.rpc.ip}:${toString cfg.rpc.port}";
}
// optionalAttrs (cfg.network == "regtest") {
2020-06-18 14:18:39 +02:00
Network = "RegTest";
RegTestBitcoinP2pEndPoint = "${cfg.endpoint.ip}:${toString cfg.endpoint.port}";
RegTestBitcoinCoreRpcEndPoint = "${cfg.rpc.ip}:${toString cfg.rpc.port}";
};
2020-06-18 14:18:39 +02:00
2020-11-22 17:23:53 +10:00
configFile = pkgs.writeText "wasabibackend.conf" (builtins.toJSON confOptions);
2020-06-18 14:18:39 +02:00
in
{
2020-06-18 14:18:39 +02:00
options = {
services.wasabibackend = {
enable = mkEnableOption "Wasabi backend service";
2020-06-18 14:18:39 +02:00
dataDir = mkOption {
type = types.path;
default = "/var/lib/wasabibackend";
description = "The data directory for the Wasabi backend node.";
2020-06-18 14:18:39 +02:00
};
customConfigFile = mkOption {
type = types.nullOr types.path;
default = null;
description = "Defines the path to a custom configuration file that is copied to the user's directory. Overrides any config options.";
2020-06-18 14:18:39 +02:00
};
network = mkOption {
type = types.enum [
"mainnet"
"testnet"
"regtest"
];
2020-06-18 14:18:39 +02:00
default = "mainnet";
description = "The network to use for the Wasabi backend service.";
2020-06-18 14:18:39 +02:00
};
endpoint = {
ip = mkOption {
type = types.str;
default = "127.0.0.1";
description = "IP address for P2P connection to bitcoind.";
2020-06-18 14:18:39 +02:00
};
port = mkOption {
type = types.port;
default = 8333;
description = "Port for P2P connection to bitcoind.";
2020-06-18 14:18:39 +02:00
};
};
rpc = {
ip = mkOption {
type = types.str;
default = "127.0.0.1";
description = "IP address for RPC connection to bitcoind.";
2020-06-18 14:18:39 +02:00
};
port = mkOption {
type = types.port;
default = 8332;
description = "Port for RPC connection to bitcoind.";
2020-06-18 14:18:39 +02:00
};
user = mkOption {
type = types.str;
default = "bitcoin";
description = "RPC user for the bitcoin endpoint.";
2020-06-18 14:18:39 +02:00
};
password = mkOption {
type = types.str;
default = "password";
description = "RPC password for the bitcoin endpoint. Warning: this is stored in cleartext in the Nix store! Use `configFile` or `passwordFile` if needed.";
2020-06-18 14:18:39 +02:00
};
passwordFile = mkOption {
type = types.nullOr types.path;
default = null;
description = "File that contains the password of the RPC user.";
2020-06-18 14:18:39 +02:00
};
};
user = mkOption {
type = types.str;
default = "wasabibackend";
description = "The user as which to run the wasabibackend node.";
2020-06-18 14:18:39 +02:00
};
group = mkOption {
type = types.str;
default = cfg.user;
defaultText = literalExpression "config.${opt.user}";
description = "The group as which to run the wasabibackend node.";
2020-06-18 14:18:39 +02:00
};
};
};
config = mkIf cfg.enable {
systemd.tmpfiles.rules = [
"d '${cfg.dataDir}' 0770 '${cfg.user}' '${cfg.group}' - -"
];
systemd.services.wasabibackend = {
description = "wasabibackend server";
wantedBy = [ "multi-user.target" ];
wants = [ "network-online.target" ];
2020-06-18 14:18:39 +02:00
after = [ "network-online.target" ];
environment = {
DOTNET_PRINT_TELEMETRY_MESSAGE = "false";
DOTNET_CLI_TELEMETRY_OPTOUT = "true";
};
preStart = ''
mkdir -p ${cfg.dataDir}/.walletwasabi/backend
${
if cfg.customConfigFile != null then
''
cp -v ${cfg.customConfigFile} ${cfg.dataDir}/.walletwasabi/backend/Config.json
''
else
''
cp -v ${configFile} ${cfg.dataDir}/.walletwasabi/backend/Config.json
${optionalString (cfg.rpc.passwordFile != null) ''
CONFIGTMP=$(mktemp)
cat ${cfg.dataDir}/.walletwasabi/backend/Config.json | ${pkgs.jq}/bin/jq --arg rpconnection "${cfg.rpc.user}:$(cat "${cfg.rpc.passwordFile}")" '. + { BitcoinRpcConnectionString: $rpconnection }' > $CONFIGTMP
mv $CONFIGTMP ${cfg.dataDir}/.walletwasabi/backend/Config.json
''}
''
}
2020-06-18 14:18:39 +02:00
chmod ug+w ${cfg.dataDir}/.walletwasabi/backend/Config.json
'';
serviceConfig = {
User = cfg.user;
Group = cfg.group;
ExecStart = "${pkgs.wasabibackend}/bin/WasabiBackend";
ProtectSystem = "full";
};
};
users.users.${cfg.user} = {
name = cfg.user;
group = cfg.group;
description = "wasabibackend daemon user";
home = cfg.dataDir;
isSystemUser = true;
};
users.groups.${cfg.group} = { };
2020-06-18 14:18:39 +02:00
};
}