2019-01-02 21:40:53 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
options.services.electrs = {
|
2021-12-14 18:51:23 +00:00
|
|
|
enable = mkEnableOption "electrs, an Electrum server implemented in Rust";
|
2021-01-14 12:24:06 +00:00
|
|
|
address = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "127.0.0.1";
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "Address to listen for RPC connections.";
|
2021-01-14 12:24:06 +00:00
|
|
|
};
|
|
|
|
port = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 50001;
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "Port to listen for RPC connections.";
|
2021-01-14 12:24:06 +00:00
|
|
|
};
|
2019-01-02 21:40:53 +00:00
|
|
|
dataDir = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/lib/electrs";
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "The data directory for electrs.";
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
2020-09-27 10:43:16 +00:00
|
|
|
monitoringPort = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 4224;
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "Prometheus monitoring port.";
|
2020-09-27 10:43:16 +00:00
|
|
|
};
|
2020-03-04 17:09:03 +00:00
|
|
|
extraArgs = mkOption {
|
|
|
|
type = types.separatedString " ";
|
|
|
|
default = "";
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "Extra command line arguments passed to electrs.";
|
2020-03-04 17:09:03 +00:00
|
|
|
};
|
2021-09-13 11:40:48 +00:00
|
|
|
user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "electrs";
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "The user as which to run electrs.";
|
2021-09-13 11:40:48 +00:00
|
|
|
};
|
|
|
|
group = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = cfg.user;
|
2022-12-18 12:13:47 +00:00
|
|
|
description = mdDoc "The group as which to run electrs.";
|
2021-09-13 11:40:48 +00:00
|
|
|
};
|
2021-11-28 20:24:49 +00:00
|
|
|
tor.enforce = nbLib.tor.enforce;
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
|
|
|
|
2021-09-13 11:40:47 +00:00
|
|
|
cfg = config.services.electrs;
|
|
|
|
nbLib = config.nix-bitcoin.lib;
|
|
|
|
secretsDir = config.nix-bitcoin.secretsDir;
|
|
|
|
bitcoind = config.services.bitcoind;
|
|
|
|
in {
|
|
|
|
inherit options;
|
|
|
|
|
2020-05-10 14:13:20 +00:00
|
|
|
config = mkIf cfg.enable {
|
2020-06-15 10:34:11 +00:00
|
|
|
assertions = [
|
2020-09-27 10:43:14 +00:00
|
|
|
{ assertion = bitcoind.prune == 0;
|
2020-06-15 10:34:11 +00:00
|
|
|
message = "electrs does not support bitcoind pruning.";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
2021-10-05 14:52:02 +00:00
|
|
|
services.bitcoind = {
|
|
|
|
enable = true;
|
2021-10-29 15:56:57 +00:00
|
|
|
listenWhitelisted = true;
|
2021-10-05 14:52:02 +00:00
|
|
|
};
|
2020-10-18 12:49:20 +00:00
|
|
|
|
2020-05-06 10:43:57 +00:00
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
"d '${cfg.dataDir}' 0770 ${cfg.user} ${cfg.group} - -"
|
|
|
|
];
|
|
|
|
|
2019-01-02 21:40:53 +00:00
|
|
|
systemd.services.electrs = {
|
2019-01-04 09:47:06 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2020-03-04 17:08:49 +00:00
|
|
|
requires = [ "bitcoind.service" ];
|
2019-01-02 21:40:53 +00:00
|
|
|
after = [ "bitcoind.service" ];
|
|
|
|
preStart = ''
|
2021-02-23 10:49:59 +00:00
|
|
|
echo "auth = \"${bitcoind.rpc.users.public.name}:$(cat ${secretsDir}/bitcoin-rpcpassword-public)\"" \
|
2020-03-04 17:08:57 +00:00
|
|
|
> electrs.toml
|
2020-03-04 17:08:51 +00:00
|
|
|
'';
|
2021-02-03 21:44:41 +00:00
|
|
|
serviceConfig = nbLib.defaultHardening // {
|
2021-10-05 14:52:02 +00:00
|
|
|
# electrs only uses the working directory for reading electrs.toml
|
2021-11-26 14:13:36 +00:00
|
|
|
WorkingDirectory = cfg.dataDir;
|
2020-03-04 17:08:57 +00:00
|
|
|
ExecStart = ''
|
2021-11-28 17:34:10 +00:00
|
|
|
${config.nix-bitcoin.pkgs.electrs}/bin/electrs \
|
|
|
|
--log-filters=INFO \
|
2020-10-16 15:43:09 +00:00
|
|
|
--network=${bitcoind.makeNetworkName "bitcoin" "regtest"} \
|
2020-09-27 10:43:13 +00:00
|
|
|
--db-dir='${cfg.dataDir}' \
|
2020-09-27 10:43:14 +00:00
|
|
|
--daemon-dir='${bitcoind.dataDir}' \
|
2020-09-27 10:43:16 +00:00
|
|
|
--electrum-rpc-addr=${cfg.address}:${toString cfg.port} \
|
|
|
|
--monitoring-addr=${cfg.address}:${toString cfg.monitoringPort} \
|
2021-10-01 09:51:57 +00:00
|
|
|
--daemon-rpc-addr=${nbLib.addressWithPort bitcoind.rpc.address bitcoind.rpc.port} \
|
2021-10-29 15:56:57 +00:00
|
|
|
--daemon-p2p-addr=${nbLib.addressWithPort bitcoind.address bitcoind.whitelistedPort} \
|
2020-09-27 10:43:13 +00:00
|
|
|
${cfg.extraArgs}
|
2020-03-04 17:08:57 +00:00
|
|
|
'';
|
2020-03-04 17:09:00 +00:00
|
|
|
User = cfg.user;
|
|
|
|
Group = cfg.group;
|
2019-01-02 21:40:53 +00:00
|
|
|
Restart = "on-failure";
|
|
|
|
RestartSec = "10s";
|
2022-05-07 18:34:21 +00:00
|
|
|
ReadWritePaths = [ cfg.dataDir ];
|
2021-11-28 20:24:49 +00:00
|
|
|
} // nbLib.allowedIPAddresses cfg.tor.enforce;
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
2019-04-26 09:09:55 +00:00
|
|
|
|
2020-03-04 17:08:49 +00:00
|
|
|
users.users.${cfg.user} = {
|
2021-08-04 22:48:59 +00:00
|
|
|
isSystemUser = true;
|
2020-03-04 17:08:49 +00:00
|
|
|
group = cfg.group;
|
2021-10-05 14:52:02 +00:00
|
|
|
extraGroups = [ "bitcoinrpc-public" ];
|
2020-03-04 17:08:49 +00:00
|
|
|
};
|
|
|
|
users.groups.${cfg.group} = {};
|
2020-05-10 14:13:20 +00:00
|
|
|
};
|
2019-01-02 21:40:53 +00:00
|
|
|
}
|