2019-01-02 21:40:53 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.electrs;
|
2019-11-27 13:04:23 +00:00
|
|
|
inherit (config) nix-bitcoin-services;
|
2019-02-25 16:00:50 +00:00
|
|
|
index-batch-size = "${if cfg.high-memory then "" else "--index-batch-size=10"}";
|
|
|
|
jsonrpc-import = "${if cfg.high-memory then "" else "--jsonrpc-import"}";
|
2019-01-02 21:40:53 +00:00
|
|
|
in {
|
|
|
|
options.services.electrs = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
If enabled, the electrs service will be installed.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/lib/electrs";
|
|
|
|
description = "The data directory for electrs.";
|
|
|
|
};
|
2019-07-25 11:43:53 +00:00
|
|
|
user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "electrs";
|
|
|
|
description = "The user as which to run electrs.";
|
|
|
|
};
|
|
|
|
group = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = cfg.user;
|
|
|
|
description = "The group as which to run electrs.";
|
|
|
|
};
|
2019-02-25 16:00:50 +00:00
|
|
|
high-memory = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
2019-03-24 20:26:07 +00:00
|
|
|
If enabled, the electrs service will sync faster on high-memory systems (≥ 8GB).
|
2019-02-25 16:00:50 +00:00
|
|
|
'';
|
|
|
|
};
|
2019-03-29 09:58:01 +00:00
|
|
|
port = mkOption {
|
|
|
|
type = types.ints.u16;
|
|
|
|
default = 50001;
|
2019-08-07 13:05:41 +00:00
|
|
|
description = "RPC port.";
|
2019-03-29 09:58:01 +00:00
|
|
|
};
|
2019-04-26 09:09:55 +00:00
|
|
|
onionport = mkOption {
|
|
|
|
type = types.ints.u16;
|
|
|
|
default = 50002;
|
2019-08-07 13:05:41 +00:00
|
|
|
description = "Port on which to listen for tor client connections.";
|
2019-04-26 09:09:55 +00:00
|
|
|
};
|
|
|
|
nginxport = mkOption {
|
|
|
|
type = types.ints.u16;
|
|
|
|
default = 50003;
|
2019-08-07 13:05:41 +00:00
|
|
|
description = "Port on which to listen for TLS client connections.";
|
2019-04-26 09:09:55 +00:00
|
|
|
};
|
2019-08-07 13:06:14 +00:00
|
|
|
enforceTor = nix-bitcoin-services.enforceTor;
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
2019-07-25 11:43:53 +00:00
|
|
|
users.users.${cfg.user} = {
|
2019-01-02 21:40:53 +00:00
|
|
|
description = "electrs User";
|
2019-07-25 11:43:53 +00:00
|
|
|
group = cfg.group;
|
2019-11-27 13:04:19 +00:00
|
|
|
extraGroups = [ "bitcoinrpc" "bitcoin"];
|
2019-01-02 21:40:53 +00:00
|
|
|
home = cfg.dataDir;
|
|
|
|
};
|
2019-11-27 13:04:15 +00:00
|
|
|
users.groups.${cfg.group} = {};
|
2019-01-02 21:40:53 +00:00
|
|
|
|
|
|
|
systemd.services.electrs = {
|
|
|
|
description = "Run electrs";
|
2019-01-04 09:47:06 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2019-04-26 09:09:55 +00:00
|
|
|
requires = [ "bitcoind.service" "nginx.service"];
|
2019-01-02 21:40:53 +00:00
|
|
|
after = [ "bitcoind.service" ];
|
|
|
|
# create shell script to start up electrs safely with password parameter
|
|
|
|
preStart = ''
|
|
|
|
mkdir -m 0770 -p ${cfg.dataDir}
|
2019-07-25 11:43:53 +00:00
|
|
|
chown -R '${cfg.user}:${cfg.group}' ${cfg.dataDir}
|
2019-11-27 13:04:21 +00:00
|
|
|
echo "${pkgs.nix-bitcoin.electrs}/bin/electrs -vvv ${index-batch-size} ${jsonrpc-import} --timestamp --db-dir ${cfg.dataDir} --daemon-dir /var/lib/bitcoind --cookie=${config.services.bitcoind.rpcuser}:$(cat /secrets/bitcoin-rpcpassword) --electrum-rpc-addr=127.0.0.1:${toString cfg.port}" > /run/electrs/startscript.sh
|
2019-01-04 09:47:06 +00:00
|
|
|
'';
|
2019-07-25 11:43:53 +00:00
|
|
|
serviceConfig = rec {
|
|
|
|
RuntimeDirectory = "electrs";
|
|
|
|
RuntimeDirectoryMode = "700";
|
2019-01-04 09:47:06 +00:00
|
|
|
PermissionsStartOnly = "true";
|
2019-07-25 11:43:53 +00:00
|
|
|
ExecStart = "${pkgs.bash}/bin/bash /run/${RuntimeDirectory}/startscript.sh";
|
2019-01-02 21:40:53 +00:00
|
|
|
User = "electrs";
|
|
|
|
Restart = "on-failure";
|
|
|
|
RestartSec = "10s";
|
2019-04-27 23:53:26 +00:00
|
|
|
} // nix-bitcoin-services.defaultHardening
|
|
|
|
// (if cfg.enforceTor
|
|
|
|
then nix-bitcoin-services.allowTor
|
|
|
|
else nix-bitcoin-services.allowAnyIP
|
|
|
|
);
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
2019-04-26 09:09:55 +00:00
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
appendConfig = ''
|
|
|
|
stream {
|
|
|
|
upstream electrs {
|
|
|
|
server 127.0.0.1:${toString config.services.electrs.port};
|
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen ${toString config.services.electrs.nginxport} ssl;
|
|
|
|
proxy_pass electrs;
|
|
|
|
|
2019-08-13 20:57:59 +00:00
|
|
|
ssl_certificate /secrets/nginx_cert;
|
|
|
|
ssl_certificate_key /secrets/nginx_key;
|
2019-04-26 09:09:55 +00:00
|
|
|
ssl_session_cache shared:SSL:1m;
|
|
|
|
ssl_session_timeout 4h;
|
|
|
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
2019-11-27 13:04:19 +00:00
|
|
|
systemd.services.nginx = {
|
|
|
|
requires = [ "nix-bitcoin-secrets.target" ];
|
|
|
|
after = [ "nix-bitcoin-secrets.target" ];
|
|
|
|
};
|
2019-01-02 21:40:53 +00:00
|
|
|
};
|
|
|
|
}
|