2023-02-22 10:02:55 +01:00
|
|
|
{
|
|
|
|
|
config,
|
|
|
|
|
pkgs,
|
|
|
|
|
...
|
|
|
|
|
}: let
|
|
|
|
|
inherit (import ../../lib) tmpfilesConfig;
|
2022-11-30 10:21:59 +01:00
|
|
|
in {
|
|
|
|
|
services.postgresql = {
|
|
|
|
|
enable = true;
|
|
|
|
|
dataDir = "/var/state/postgresql/${config.services.postgresql.package.psqlSchema}";
|
|
|
|
|
ensureDatabases = ["atuin"];
|
|
|
|
|
ensureUsers = [
|
|
|
|
|
{
|
|
|
|
|
name = "atuin";
|
|
|
|
|
ensurePermissions."DATABASE atuin" = "ALL PRIVILEGES";
|
|
|
|
|
}
|
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
|
2022-12-03 08:25:47 +01:00
|
|
|
services.postgresqlBackup = {
|
|
|
|
|
enable = true;
|
|
|
|
|
databases = ["atuin"];
|
|
|
|
|
};
|
|
|
|
|
|
2022-11-30 10:21:59 +01:00
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
|
(tmpfilesConfig {
|
|
|
|
|
type = "d";
|
|
|
|
|
path = "/var/state/postgresql";
|
|
|
|
|
mode = "0700";
|
|
|
|
|
user = "postgres";
|
|
|
|
|
group = "postgres";
|
|
|
|
|
})
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
users.groups.atuin = {};
|
|
|
|
|
users.users.atuin = {
|
|
|
|
|
isSystemUser = true;
|
|
|
|
|
group = "atuin";
|
|
|
|
|
home = "/run/atuin";
|
|
|
|
|
createHome = true;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
systemd.services.atuin = {
|
|
|
|
|
wantedBy = ["multi-user.target"];
|
|
|
|
|
environment = {
|
|
|
|
|
ATUIN_HOST = "0.0.0.0";
|
|
|
|
|
ATUIN_PORT = "8888";
|
|
|
|
|
ATUIN_OPEN_REGISTRATION = "true";
|
|
|
|
|
ATUIN_DB_URI = "postgres:///atuin";
|
|
|
|
|
};
|
|
|
|
|
serviceConfig = {
|
|
|
|
|
User = "atuin";
|
2023-02-22 10:02:55 +01:00
|
|
|
ExecStart = "${pkgs.atuin}/bin/atuin server start";
|
2022-12-31 07:23:01 +01:00
|
|
|
Restart = "on-failure";
|
2022-11-30 10:21:59 +01:00
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
networking.firewall.allowedTCPPorts = [8888];
|
|
|
|
|
}
|