roundcube: clean-up and add test

This commit is contained in:
Robin Gloster 2018-10-11 10:09:29 +02:00
parent 2f8073bd92
commit 9ace7f6409
No known key found for this signature in database
GPG Key ID: D5C458DF6DD97EDF
2 changed files with 128 additions and 43 deletions

View File

@ -9,49 +9,77 @@ in
options.services.roundcube = { options.services.roundcube = {
enable = mkEnableOption "Roundcube"; enable = mkEnableOption "Roundcube";
listenAddress = mkOption { nginx.enable = mkOption {
type = types.str; type = types.bool;
default = "[::]"; default = true;
description = "Listening address. IPv6 addresses must be enclosed in square brackets"; description = ''
Whether to enable nginx virtual host management.
Further nginx configuration can be done by adapting <literal>services.nginx.virtualHosts.&lt;name&gt;</literal>.
See <xref linkend="opt-services.nginx.virtualHosts"/> for further information.
'';
}; };
listenPort = mkOption { hostName = mkOption {
type = types.int;
default = 80;
description = "Listening port";
};
subDomain = mkOption {
type = types.str; type = types.str;
example = "webmail"; example = "webmail";
description = "Sub-domain to use which is the name of the nginx vhost"; description = "Host name to use which for the nginx vhost";
};
database = {
username = mkOption {
type = types.str;
default = "roundcube";
description = "Username for the postgresql connection";
};
host = mkOption {
type = types.str;
default = "localhost";
description = "Host of the postgresql server";
};
password = mkOption {
type = types.str;
description = "Password for the postgresql connection";
};
dbname = mkOption {
type = types.str;
default = "roundcube";
description = "Name of the postgresql database";
};
};
plugins = mkOption {
type = types.listOf types.str;
default = [];
description = ''
List of roundcube plugins to enable.
'';
}; };
extraConfig = mkOption { extraConfig = mkOption {
type = types.str; type = types.lines;
default = '' default = "";
<?php description = "Extra configuration for roundcube webmail instance";
$config = array();
$config['db_dsnw'] = 'pgsql://roundcube:pass@localhost/roundcubemail';
$config['db_prefix'] = 'rc';
$config['default_host'] = 'tls://%h';
$config['smtp_server'] = 'tls://%h';
$config['smtp_user'] = '%u';
$config['smtp_pass'] = '%p';
$config['max_message_size'] = '25M';
'';
description = "Configuration for roundcube webmail instance";
}; };
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.etc."roundcube/config.inc.php".text = cfg.extraConfig; environment.etc."roundcube/config.inc.php".text = ''
<?php
services.nginx.virtualHosts = { $config = array();
"${cfg.subDomain}" = { $config['db_dsnw'] = 'pgsql://${cfg.database.username}:${cfg.database.password}@${cfg.database.host}/${cfg.database.dbname}';
listen = [ { addr = cfg.listenAddress; port = cfg.listenPort; } ]; $config['log_driver'] = 'syslog';
$config['max_message_size'] = '25M';
$config['plugins'] = [${concatMapStringsSep "," (p: "'${p}'") cfg.plugins}];
${cfg.extraConfig}
'';
services.nginx = mkIf cfg.nginx.enable {
enable = true;
virtualHosts = {
${cfg.hostName} = {
forceSSL = mkDefault true;
enableACME = mkDefault true;
locations."/" = { locations."/" = {
root = pkgs.roundcube; root = pkgs.roundcube;
index = "index.php"; index = "index.php";
@ -66,8 +94,13 @@ in
}; };
}; };
}; };
};
services.phpfpm.poolConfigs.${cfg.subDomain} = '' services.postgresql = mkIf (cfg.database.host == "localhost") {
enable = true;
};
services.phpfpm.poolConfigs.${cfg.hostName} = ''
listen = /run/phpfpm/roundcube listen = /run/phpfpm/roundcube
listen.owner = nginx listen.owner = nginx
listen.group = nginx listen.group = nginx
@ -85,5 +118,29 @@ in
php_admin_value[upload_max_filesize] = 25M php_admin_value[upload_max_filesize] = 25M
catch_workers_output = yes catch_workers_output = yes
''; '';
systemd.services.phpfpm-roundcube.after = [ "roundcube-setup.service" ];
systemd.services.roundcube-setup = let
pgSuperUser = config.services.postgresql.superUser;
in {
requires = [ "postgresql.service" ];
after = [ "postgresql.service" ];
wantedBy = [ "multi-user.target" ];
path = [ config.services.postgresql.package ];
script = ''
mkdir -p /var/lib/roundcube
if [ ! -f /var/lib/roundcube/db-created ]; then
if [ "${cfg.database.host}" = "localhost" ]; then
${pkgs.sudo}/bin/sudo -u ${pgSuperUser} psql postgres -c "create role ${cfg.database.username} with login password '${cfg.database.password}'";
${pkgs.sudo}/bin/sudo -u ${pgSuperUser} psql postgres -c "create database ${cfg.database.dbname} with owner ${cfg.database.username}";
fi
PGPASSWORD=${cfg.database.password} ${pkgs.postgresql}/bin/psql -U ${cfg.database.username} \
-f ${pkgs.roundcube}/SQL/postgres.initial.sql \
-h ${cfg.database.host} ${cfg.database.dbname}
touch /var/lib/roundcube/db-created
fi
'';
serviceConfig.Type = "oneshot";
};
}; };
} }

28
nixos/tests/roundcube.nix Normal file
View File

@ -0,0 +1,28 @@
import ./make-test.nix ({ pkgs, ...} : {
name = "roundcube";
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ globin ];
};
nodes = {
roundcube = { config, pkgs, ... }: {
services.roundcube = {
enable = true;
hostName = "roundcube";
nginx.enable = true;
database.password = "notproduction";
};
services.nginx.virtualHosts.roundcube = {
forceSSL = false;
enableACME = false;
};
};
};
testScript = ''
$roundcube->start;
$roundcube->waitForUnit("postgresql.service");
$roundcube->waitForUnit("phpfpm-roundcube.service");
$roundcube->succeed("curl -sSfL http://roundcube/");
'';
})