blob: 692b4e9a5e0c12febf8de942d8e569ad8f28d269 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
{ options, lib, config, pkgs, ... }:
let
cfg = config.services.storybook;
rootDomain = "bensima.com";
ports = import ../Omni/Cloud/Ports.nix;
in {
options.services.storybook = {
enable = lib.mkEnableOption "Enable the storybook service";
port = lib.mkOption {
type = lib.types.int;
default = 3000;
description = ''
The port on which storybook will listen for
incoming HTTP traffic.
'';
};
dataDir = lib.mkOption {
type = lib.types.path;
default = "/var/storybook/";
description = "Data dir location";
};
package = lib.mkOption {
type = lib.types.package;
description = "storybook package to use";
};
};
config = lib.mkIf cfg.enable {
systemd.services.storybook = {
path = [ cfg.package pkgs.git ];
wantedBy = [ "multi-user.target" ];
preStart = ''
# these must be manually created
test -d /run/storybook
test -f /run/storybook/env
# this can be generated
mkdir -p ${cfg.dataDir}
'';
script = ''
${cfg.package}/bin/storybook
'';
description = ''
Storybook
'';
serviceConfig = {
Environment =
[ "PORT=${toString cfg.port}" "AREA=Live" "DATA_DIR=${cfg.dataDir}" ];
EnvironmentFile = "/run/storybook/env";
KillSignal = "INT";
Type = "simple";
Restart = "on-abort";
RestartSec = "1";
};
};
# TODO: nginx web stuff
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
statusPage = true;
user = "nginx";
group = "nginx";
virtualHosts."storybook.${rootDomain}" = {
forceSSL = true;
enableACME = true;
locations."/".proxyPass = "http://localhost:${toString cfg.port}";
# useACMEHost = rootDomain;
};
};
networking.firewall.allowedTCPPorts = [ ports.ssh ports.http ports.https ];
};
}
|