2019-01-02 21:40:53 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.services.electrs;
|
2019-11-27 13:04:23 +00:00
|
|
|
inherit (config) nix-bitcoin-services;
|
2020-01-12 19:52:39 +00:00
|
|
|
secretsDir = config.nix-bitcoin.secretsDir;
|
2019-01-02 21:40:53 +00:00
|
|
|
in {
|
2020-03-04 17:08:49 +00:00
|
|
|
imports = [
|
|
|
|
(mkRenamedOptionModule [ "services" "electrs" "nginxport" ] [ "services" "electrs" "TLSProxy" "port" ])
|
|
|
|
];
|
|
|
|
|
2019-01-02 21:40:53 +00:00
|
|
|
options.services.electrs = {
|
2020-03-04 17:08:59 +00:00
|
|
|
enable = mkEnableOption "electrs";
|
2019-01-02 21:40:53 +00:00
|
|
|
dataDir = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/lib/electrs";
|
|
|
|
description = "The data directory for electrs.";
|
|
|
|
};
|
2020-05-29 11:13:50 +00:00
|
|
|
# Needed until electrs tls proxy is removed
|
|
|
|
host = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "localhost";
|
|
|
|
description = ''
|
|
|
|
The host on which incoming connections arrive.
|
|
|
|
'';
|
|
|
|
};
|
2019-07-25 11:43:53 +00:00
|
|
|
user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "electrs";
|
|
|
|
description = "The user as which to run electrs.";
|
|
|
|
};
|
|
|
|
group = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = cfg.user;
|
|
|
|
description = "The group as which to run electrs.";
|
|
|
|
};
|
2019-02-25 16:00:50 +00:00
|
|
|
high-memory = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
2020-03-04 17:08:47 +00:00
|
|
|
If enabled, the electrs service will sync faster on high-memory systems (≥ 8GB).
|
2019-02-25 16:00:50 +00:00
|
|
|
'';
|
|
|
|
};
|
2020-03-04 17:09:02 +00:00
|
|
|
address = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "127.0.0.1";
|
|
|
|
description = "RPC listening address.";
|
|
|
|
};
|
2019-03-29 09:58:01 +00:00
|
|
|
port = mkOption {
|
2020-06-02 15:09:52 +00:00
|
|
|
type = types.port;
|
2020-03-04 17:08:47 +00:00
|
|
|
default = 50001;
|
|
|
|
description = "RPC port.";
|
2019-03-29 09:58:01 +00:00
|
|
|
};
|
2020-05-29 11:13:50 +00:00
|
|
|
daemonrpc = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "127.0.0.1:8332";
|
|
|
|
description = ''
|
|
|
|
Bitcoin daemon JSONRPC 'addr:port' to connect
|
|
|
|
'';
|
|
|
|
};
|
2020-03-04 17:09:03 +00:00
|
|
|
extraArgs = mkOption {
|
|
|
|
type = types.separatedString " ";
|
|
|
|
default = "";
|
|
|
|
description = "Extra command line arguments passed to electrs.";
|
|
|
|
};
|
2020-03-04 17:08:49 +00:00
|
|
|
TLSProxy = {
|
|
|
|
enable = mkEnableOption "Nginx TLS proxy";
|
|
|
|
port = mkOption {
|
2020-06-02 15:09:52 +00:00
|
|
|
type = types.port;
|
2019-04-26 09:09:55 +00:00
|
|
|
default = 50003;
|
2019-08-07 13:05:41 +00:00
|
|
|
description = "Port on which to listen for TLS client connections.";
|
2020-03-04 17:08:49 +00:00
|
|
|
};
|
2019-04-26 09:09:55 +00:00
|
|
|
};
|
2019-08-07 13:06:14 +00:00
|
|
|
enforceTor = nix-bitcoin-services.enforceTor;
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
|
|
|
|
2020-03-04 17:08:49 +00:00
|
|
|
config = mkIf cfg.enable (mkMerge [{
|
2020-06-15 10:34:11 +00:00
|
|
|
assertions = [
|
|
|
|
{ assertion = config.services.bitcoind.prune == 0;
|
|
|
|
message = "electrs does not support bitcoind pruning.";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
2020-04-07 20:47:45 +00:00
|
|
|
environment.systemPackages = [ pkgs.nix-bitcoin.electrs ];
|
|
|
|
|
2020-05-06 10:43:57 +00:00
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
"d '${cfg.dataDir}' 0770 ${cfg.user} ${cfg.group} - -"
|
|
|
|
];
|
|
|
|
|
2019-01-02 21:40:53 +00:00
|
|
|
systemd.services.electrs = {
|
2020-03-04 17:08:58 +00:00
|
|
|
description = "Electrs Electrum Server";
|
2019-01-04 09:47:06 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2020-03-04 17:08:49 +00:00
|
|
|
requires = [ "bitcoind.service" ];
|
2019-01-02 21:40:53 +00:00
|
|
|
after = [ "bitcoind.service" ];
|
|
|
|
preStart = ''
|
2020-03-04 17:08:57 +00:00
|
|
|
echo "cookie = \"${config.services.bitcoind.rpcuser}:$(cat ${secretsDir}/bitcoin-rpcpassword)\"" \
|
|
|
|
> electrs.toml
|
2020-03-04 17:08:51 +00:00
|
|
|
'';
|
2020-05-05 13:18:41 +00:00
|
|
|
serviceConfig = nix-bitcoin-services.defaultHardening // {
|
2019-07-25 11:43:53 +00:00
|
|
|
RuntimeDirectory = "electrs";
|
|
|
|
RuntimeDirectoryMode = "700";
|
2020-03-04 17:08:57 +00:00
|
|
|
WorkingDirectory = "/run/electrs";
|
|
|
|
ExecStart = ''
|
|
|
|
${pkgs.nix-bitcoin.electrs}/bin/electrs -vvv \
|
2020-04-07 21:05:10 +00:00
|
|
|
${if cfg.high-memory then
|
|
|
|
traceIf (!config.services.bitcoind.dataDirReadableByGroup) ''
|
|
|
|
Warning: For optimal electrs syncing performance, enable services.bitcoind.dataDirReadableByGroup.
|
|
|
|
Note that this disables wallet support in bitcoind.
|
|
|
|
'' ""
|
|
|
|
else
|
|
|
|
"--jsonrpc-import --index-batch-size=10"
|
|
|
|
} \
|
2020-03-04 17:08:57 +00:00
|
|
|
--db-dir '${cfg.dataDir}' --daemon-dir '${config.services.bitcoind.dataDir}' \
|
2020-05-29 11:13:50 +00:00
|
|
|
--electrum-rpc-addr=${toString cfg.address}:${toString cfg.port} \
|
|
|
|
--daemon-rpc-addr=${toString cfg.daemonrpc} ${cfg.extraArgs}
|
2020-03-04 17:08:57 +00:00
|
|
|
'';
|
2020-03-04 17:09:00 +00:00
|
|
|
User = cfg.user;
|
|
|
|
Group = cfg.group;
|
2019-01-02 21:40:53 +00:00
|
|
|
Restart = "on-failure";
|
|
|
|
RestartSec = "10s";
|
2020-05-05 15:15:16 +00:00
|
|
|
ReadWritePaths = "${cfg.dataDir} ${if cfg.high-memory then "${config.services.bitcoind.dataDir}" else ""}";
|
2020-05-05 13:18:41 +00:00
|
|
|
} // (if cfg.enforceTor
|
2019-04-27 23:53:26 +00:00
|
|
|
then nix-bitcoin-services.allowTor
|
|
|
|
else nix-bitcoin-services.allowAnyIP
|
|
|
|
);
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
2019-04-26 09:09:55 +00:00
|
|
|
|
2020-03-04 17:08:49 +00:00
|
|
|
users.users.${cfg.user} = {
|
|
|
|
description = "electrs User";
|
|
|
|
group = cfg.group;
|
2020-05-21 16:05:31 +00:00
|
|
|
extraGroups = [ "bitcoinrpc" ] ++ optionals cfg.high-memory [ "bitcoin" ];
|
2020-03-04 17:08:49 +00:00
|
|
|
};
|
|
|
|
users.groups.${cfg.group} = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
(mkIf cfg.TLSProxy.enable {
|
2019-04-26 09:09:55 +00:00
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
2020-03-04 17:09:02 +00:00
|
|
|
appendConfig = let
|
|
|
|
address =
|
|
|
|
if cfg.address == "0.0.0.0" then
|
|
|
|
"127.0.0.1"
|
|
|
|
else if cfg.address == "::" then
|
|
|
|
"::1"
|
|
|
|
else
|
|
|
|
cfg.address;
|
|
|
|
in ''
|
2019-04-26 09:09:55 +00:00
|
|
|
stream {
|
|
|
|
upstream electrs {
|
2020-03-04 17:09:02 +00:00
|
|
|
server ${address}:${toString cfg.port};
|
2019-04-26 09:09:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
2020-03-04 17:08:49 +00:00
|
|
|
listen ${toString cfg.TLSProxy.port} ssl;
|
2019-04-26 09:09:55 +00:00
|
|
|
proxy_pass electrs;
|
|
|
|
|
2020-01-12 19:52:39 +00:00
|
|
|
ssl_certificate ${secretsDir}/nginx-cert;
|
|
|
|
ssl_certificate_key ${secretsDir}/nginx-key;
|
2019-04-26 09:09:55 +00:00
|
|
|
ssl_session_cache shared:SSL:1m;
|
|
|
|
ssl_session_timeout 4h;
|
2020-05-03 08:25:13 +00:00
|
|
|
ssl_protocols TLSv1.2 TLSv1.3;
|
2019-04-26 09:09:55 +00:00
|
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
2020-03-04 17:08:49 +00:00
|
|
|
systemd.services = {
|
|
|
|
electrs.wants = [ "nginx.service" ];
|
|
|
|
nginx = {
|
|
|
|
requires = [ "nix-bitcoin-secrets.target" ];
|
|
|
|
after = [ "nix-bitcoin-secrets.target" ];
|
|
|
|
};
|
2020-03-04 17:08:48 +00:00
|
|
|
};
|
2020-01-12 19:52:38 +00:00
|
|
|
nix-bitcoin.secrets = rec {
|
|
|
|
nginx-key = {
|
|
|
|
user = "nginx";
|
|
|
|
group = "root";
|
|
|
|
};
|
|
|
|
nginx-cert = nginx-key;
|
|
|
|
};
|
2020-03-04 17:08:49 +00:00
|
|
|
})
|
|
|
|
]);
|
2019-01-02 21:40:53 +00:00
|
|
|
}
|