def64a73b8d87a1c6cb261508b53c9477d3b049f treewide: use TODO-EXTERNAL (Erik Arvstedt) 6f37bef2a359ee7f3926e3a253711cb2f04ff95f netns-isolation: simplify firewall setup (Erik Arvstedt) f52059ce3c3729fd68245d6781e7c4f13ffd0a6b docs: add doc 'Configuration and maintenance' (Erik Arvstedt) 94aee8174d291a7f1265834c8e515a64451841eb usage.md: add section `Managing services` (Erik Arvstedt) 8cc7b83da1077f68f7323a26717212b506f45ef9 usage.md: convert to '#' heading syntax (Erik Arvstedt) 91fbcfcc776db3201ee30869f9dded59931786a7 faq.md: reformat (Erik Arvstedt) 9e4f4d6b0f9fd57ee893adb754e76501c98d36fc bitcoind: add option `txindex` (Erik Arvstedt) 10a744a59845e59c7a31ac4fd922368110728047 rtl: add option `extraCurrency` (Erik Arvstedt) 62a2602e7832e01b668090d5f3df1d9b2c231d11 electrs: use dataDir for storing extra config (Erik Arvstedt) 9bda7305fd270765734b7a08f3a45dd8debe1650 services: add `tor.*` options (Erik Arvstedt) ff24e73ad7491cb5b26ae1492ada803f6960992b onion-addresses: fix files not being copied (Erik Arvstedt) c6fe017aeb8acde5b14ab91c4f76cc1f5ed9fdd3 netns-isolation: avoid creating service files for disabled services (Erik Arvstedt) 017e08ca10d44d3e08b11de3c6c5613c89c5999c btcpayserver: move nbxplorer options to bottom (Erik Arvstedt) e1d869d76c40c5d981b302a1df102891e4e2560c modules.nix: move rtl to fix topological sorting (Erik Arvstedt) e44cd7ecdc7ae72cf7256d01bdf4efbf9d06f417 rtl: improve descriptions (Erik Arvstedt) bd275d3a9ad45d950e157821d4345d2d37257c08 minor improvements (Erik Arvstedt) 8aa28da110123c1d5de9dad343615dace8cb4337 remove `recurring-donations` module (Erik Arvstedt) Pull request description: ACKs for top commit: nixbitcoin: ACK def64a73b8d87a1c6cb261508b53c9477d3b049f jonasnick: ACK def64a73b8d87a1c6cb261508b53c9477d3b049f Tree-SHA512: 13acd2a3dd73c07f9c31874c8e961f12f39accb48847cbad08479b9a8154b79a6f186819272072dfb5c4768264b81f6e058e9afa57a729db2096784e48352dfd
107 lines
3.1 KiB
Nix
107 lines
3.1 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
let
|
|
options.services.electrs = {
|
|
enable = mkEnableOption "electrs";
|
|
address = mkOption {
|
|
type = types.str;
|
|
default = "127.0.0.1";
|
|
description = "Address to listen for RPC connections.";
|
|
};
|
|
port = mkOption {
|
|
type = types.port;
|
|
default = 50001;
|
|
description = "Port to listen for RPC connections.";
|
|
};
|
|
dataDir = mkOption {
|
|
type = types.path;
|
|
default = "/var/lib/electrs";
|
|
description = "The data directory for electrs.";
|
|
};
|
|
monitoringPort = mkOption {
|
|
type = types.port;
|
|
default = 4224;
|
|
description = "Prometheus monitoring port.";
|
|
};
|
|
extraArgs = mkOption {
|
|
type = types.separatedString " ";
|
|
default = "";
|
|
description = "Extra command line arguments passed to electrs.";
|
|
};
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "electrs";
|
|
description = "The user as which to run electrs.";
|
|
};
|
|
group = mkOption {
|
|
type = types.str;
|
|
default = cfg.user;
|
|
description = "The group as which to run electrs.";
|
|
};
|
|
tor.enforce = nbLib.tor.enforce;
|
|
};
|
|
|
|
cfg = config.services.electrs;
|
|
nbLib = config.nix-bitcoin.lib;
|
|
secretsDir = config.nix-bitcoin.secretsDir;
|
|
bitcoind = config.services.bitcoind;
|
|
in {
|
|
inherit options;
|
|
|
|
config = mkIf cfg.enable {
|
|
assertions = [
|
|
{ assertion = bitcoind.prune == 0;
|
|
message = "electrs does not support bitcoind pruning.";
|
|
}
|
|
];
|
|
|
|
services.bitcoind = {
|
|
enable = true;
|
|
listenWhitelisted = true;
|
|
};
|
|
|
|
systemd.tmpfiles.rules = [
|
|
"d '${cfg.dataDir}' 0770 ${cfg.user} ${cfg.group} - -"
|
|
];
|
|
|
|
systemd.services.electrs = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
requires = [ "bitcoind.service" ];
|
|
after = [ "bitcoind.service" ];
|
|
preStart = ''
|
|
echo "auth = \"${bitcoind.rpc.users.public.name}:$(cat ${secretsDir}/bitcoin-rpcpassword-public)\"" \
|
|
> electrs.toml
|
|
'';
|
|
serviceConfig = nbLib.defaultHardening // {
|
|
# electrs only uses the working directory for reading electrs.toml
|
|
WorkingDirectory = cfg.dataDir;
|
|
ExecStart = ''
|
|
${config.nix-bitcoin.pkgs.electrs}/bin/electrs \
|
|
--log-filters=INFO \
|
|
--network=${bitcoind.makeNetworkName "bitcoin" "regtest"} \
|
|
--db-dir='${cfg.dataDir}' \
|
|
--daemon-dir='${bitcoind.dataDir}' \
|
|
--electrum-rpc-addr=${cfg.address}:${toString cfg.port} \
|
|
--monitoring-addr=${cfg.address}:${toString cfg.monitoringPort} \
|
|
--daemon-rpc-addr=${nbLib.addressWithPort bitcoind.rpc.address bitcoind.rpc.port} \
|
|
--daemon-p2p-addr=${nbLib.addressWithPort bitcoind.address bitcoind.whitelistedPort} \
|
|
${cfg.extraArgs}
|
|
'';
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
Restart = "on-failure";
|
|
RestartSec = "10s";
|
|
ReadWritePaths = cfg.dataDir;
|
|
} // nbLib.allowedIPAddresses cfg.tor.enforce;
|
|
};
|
|
|
|
users.users.${cfg.user} = {
|
|
isSystemUser = true;
|
|
group = cfg.group;
|
|
extraGroups = [ "bitcoinrpc-public" ];
|
|
};
|
|
users.groups.${cfg.group} = {};
|
|
};
|
|
}
|