2018-12-10 16:34:41 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.spark-wallet;
|
2021-02-03 21:44:41 +00:00
|
|
|
nbLib = config.nix-bitcoin.lib;
|
2020-10-16 15:43:02 +00:00
|
|
|
|
|
|
|
# Use wasabi rate provider because the default (bitstamp) doesn't accept
|
|
|
|
# connections through Tor
|
|
|
|
torRateProvider = "--rate-provider wasabi --proxy socks5h://${config.services.tor.client.socksListenAddress}";
|
|
|
|
startScript = ''
|
2021-01-14 12:24:19 +00:00
|
|
|
${optionalString (cfg.getPublicAddressCmd != "") ''
|
|
|
|
publicURL="--public-url http://$(${cfg.getPublicAddressCmd})"
|
2020-10-16 15:43:02 +00:00
|
|
|
''}
|
2020-11-09 21:09:09 +00:00
|
|
|
exec ${config.nix-bitcoin.pkgs.spark-wallet}/bin/spark-wallet \
|
2020-10-16 15:43:04 +00:00
|
|
|
--ln-path '${config.services.clightning.networkDir}' \
|
2021-01-14 12:24:08 +00:00
|
|
|
--host ${cfg.address} --port ${toString cfg.port} \
|
2020-10-16 15:43:02 +00:00
|
|
|
--config '${config.nix-bitcoin.secretsDir}/spark-wallet-login' \
|
2020-10-16 15:43:03 +00:00
|
|
|
${optionalString cfg.enforceTor torRateProvider} \
|
2020-10-16 15:43:02 +00:00
|
|
|
$publicURL \
|
|
|
|
--pairing-qr --print-key ${cfg.extraArgs}
|
2019-03-27 00:49:54 +00:00
|
|
|
'';
|
2018-12-10 16:34:41 +00:00
|
|
|
in {
|
|
|
|
options.services.spark-wallet = {
|
2021-02-01 21:53:15 +00:00
|
|
|
enable = mkEnableOption "spark-wallet";
|
2021-01-14 12:24:08 +00:00
|
|
|
address = mkOption {
|
2020-06-10 14:41:13 +00:00
|
|
|
type = types.str;
|
|
|
|
default = "localhost";
|
2021-01-14 12:24:08 +00:00
|
|
|
description = "http(s) server address.";
|
|
|
|
};
|
|
|
|
port = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 9737;
|
|
|
|
description = "http(s) server port.";
|
2020-06-10 14:41:13 +00:00
|
|
|
};
|
|
|
|
extraArgs = mkOption {
|
|
|
|
type = types.separatedString " ";
|
|
|
|
default = "";
|
|
|
|
description = "Extra command line arguments passed to spark-wallet.";
|
|
|
|
};
|
2021-01-14 12:24:19 +00:00
|
|
|
getPublicAddressCmd = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
|
|
|
description = ''
|
|
|
|
Bash expression which outputs the public service address.
|
|
|
|
If set, spark-wallet prints a QR code to the systemd journal which
|
|
|
|
encodes an URL for accessing the web interface.
|
|
|
|
'';
|
|
|
|
};
|
2021-02-16 16:51:15 +00:00
|
|
|
user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "spark-wallet";
|
|
|
|
description = "The user as which to run spark-wallet.";
|
|
|
|
};
|
|
|
|
group = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = cfg.user;
|
|
|
|
description = "The group as which to run spark-wallet.";
|
|
|
|
};
|
2021-02-03 21:44:41 +00:00
|
|
|
inherit (nbLib) enforceTor;
|
2018-12-10 16:34:41 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
2020-10-18 12:49:20 +00:00
|
|
|
services.clightning.enable = true;
|
2020-06-15 10:34:11 +00:00
|
|
|
|
2021-02-16 16:51:15 +00:00
|
|
|
users.users.${cfg.user} = {
|
|
|
|
group = cfg.group;
|
|
|
|
extraGroups = [ config.services.clightning.group ];
|
2020-05-03 12:18:21 +00:00
|
|
|
};
|
2021-02-16 16:51:15 +00:00
|
|
|
users.groups.${cfg.group} = {};
|
2020-05-03 12:18:21 +00:00
|
|
|
|
2019-01-02 15:17:57 +00:00
|
|
|
systemd.services.spark-wallet = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
2021-01-14 12:24:19 +00:00
|
|
|
requires = [ "clightning.service" ];
|
|
|
|
after = [ "clightning.service" ];
|
2020-10-16 15:43:02 +00:00
|
|
|
script = startScript;
|
2021-02-03 21:44:41 +00:00
|
|
|
serviceConfig = nbLib.defaultHardening // {
|
2021-02-16 16:51:15 +00:00
|
|
|
User = cfg.user;
|
2019-01-02 15:17:57 +00:00
|
|
|
Restart = "on-failure";
|
|
|
|
RestartSec = "10s";
|
2021-03-22 12:19:45 +00:00
|
|
|
} // nbLib.allowedIPAddresses cfg.enforceTor
|
2021-02-03 21:44:41 +00:00
|
|
|
// nbLib.nodejs;
|
2018-12-10 16:34:41 +00:00
|
|
|
};
|
2021-02-16 16:51:15 +00:00
|
|
|
nix-bitcoin.secrets.spark-wallet-login.user = cfg.user;
|
2019-01-02 15:17:57 +00:00
|
|
|
};
|
2018-12-10 16:34:41 +00:00
|
|
|
}
|