{ config, lib, pkgs, inputs, ... }: let # this gets rid of the implicit dependency on ghc, reducing closure size stripLib = drv: pkgs.stdenv.mkDerivation { name = drv.name + "-without-lib"; src = drv.outPath; buildPhase = '' mkdir -p $out cp -r $src/bin $out ''; phases = [ "buildPhase" ]; }; tracktrain-config = '' dbstring: "dbname=tracktrain user=tracktrain" gtfs: ${pkgs.copyPathToStore ./gtfs.zip} warp: port: 4000 login: enable: false url: "http://dings" clientname: not clientsecret: used ''; in { services.nginx.recommendedProxySettings = true; services.nginx.virtualHosts."tracktrain.stuebinm.eu" = { locations."/" = { proxyPass = "http://192.168.42.41:4000"; proxyWebsockets = true; }; locations."/api" = { proxyPass = "http://192.168.42.41:4000"; proxyWebsockets = true; extraConfig = '' add_header 'Access-Control-Allow-Origin' '*' always; ''; }; locations."/metrics/" = { proxyPass = "http://localhost:2342"; proxyWebsockets = true; extraConfig = '' rewrite ^/metrics/(.*) /$1 break; ''; }; locations."/assets" = { proxyPass = "http://192.168.42.41:4567"; }; enableACME = true; forceSSL = true; }; services.prometheus = { enable = true; port = 9001; scrapeConfigs = [ { job_name = "tracktrain"; static_configs = [{ targets = [ "192.168.42.41:4000" ]; }]; } ]; }; services.grafana = { enable = true; settings.server = { serve_from_sub_path = true; domain = "tracktrain.ilztalbahn.eu"; root_url = "%(protocol)s://%(domain)s:/metrics/"; http_port = 2342; http_addr = "0.0.0.0"; }; provision = { enable = true; datasources.settings.datasources = [ { url = "http://localhost:9001"; type = "prometheus"; name = "prometheus"; } ]; }; }; networking.firewall.allowedTCPPorts = [ 443 ]; containers.tracktrain = { autoStart = true; privateNetwork = true; hostAddress6 = "fd00::42:40"; localAddress6 = "fd00::42:41"; hostAddress = "192.168.42.40"; localAddress = "192.168.42.41"; config = { config, pkgs, ... }: { environment.noXlibs = true; systemd.services.dufs = { enable = true; description = "assets for tracktrain's frontend"; wantedBy = [ "tracktrain.service" ]; serviceConfig.Type = "simple"; path = [ pkgs.dufs ]; script = '' dufs -b 0.0.0.0 -p 4567 --path-prefix /assets --auth /@$(cat /username):$(cat /password)"@*" --auth-method basic --allow-upload --allow-delete /assets ''; }; systemd.services.tracktrain = { enable = true; description = "tracks trains, hopefully"; wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; serviceConfig.Type = "simple"; path = [ pkgs.wget ]; script = '' cd /tmp ln -sf ${pkgs.writeText "config.yaml" tracktrain-config} "config.yaml" ${ import inputs.tracktrain { nixpkgs = pkgs; compiler = "default"; } }/bin/tracktrain +RTS -T ''; startAt = "daily"; }; services.postgresql = { enable = true; ensureDatabases = [ "tracktrain" ]; ensureUsers = [ { name = "tracktrain"; ensurePermissions = { "DATABASE tracktrain" = "ALL PRIVILEGES"; }; } ]; authentication = '' local all all trust host all all 127.0.0.1/32 trust ''; }; networking.firewall.enable = false; system.stateVersion = "22.05"; services.coredns = { enable = true; config = '' .:53 { forward . 1.1.1.1 } ''; }; }; }; networking.nat = { enable = true; internalInterfaces = [ "ve-tracktrain" ]; externalInterface = "ens3"; }; }