{ lib, pkgs, config, ... }: with lib; let cfg = config.services.plausible; in { options.services.plausible = { enable = mkEnableOption (lib.mdDoc "plausible"); package = mkPackageOptionMD pkgs "plausible" { }; releaseCookiePath = mkOption { type = with types; either str path; description = lib.mdDoc '' The path to the file with release cookie. (used for remote connection to the running node). ''; }; adminUser = { name = mkOption { default = "admin"; type = types.str; description = lib.mdDoc '' Name of the admin user that plausible will created on initial startup. ''; }; email = mkOption { type = types.str; example = "admin@localhost"; description = lib.mdDoc '' Email-address of the admin-user. ''; }; passwordFile = mkOption { type = types.either types.str types.path; description = lib.mdDoc '' Path to the file which contains the password of the admin user. ''; }; activate = mkEnableOption (lib.mdDoc "activating the freshly created admin-user"); }; database = { clickhouse = { setup = mkEnableOption (lib.mdDoc "creating a clickhouse instance") // { default = true; }; url = mkOption { default = "http://localhost:8123/default"; type = types.str; description = lib.mdDoc '' The URL to be used to connect to `clickhouse`. ''; }; }; postgres = { setup = mkEnableOption (lib.mdDoc "creating a postgresql instance") // { default = true; }; dbname = mkOption { default = "plausible"; type = types.str; description = lib.mdDoc '' Name of the database to use. ''; }; socket = mkOption { default = "/run/postgresql"; type = types.str; description = lib.mdDoc '' Path to the UNIX domain-socket to communicate with `postgres`. ''; }; }; }; server = { disableRegistration = mkOption { default = true; type = types.bool; description = lib.mdDoc '' Whether to prohibit creating an account in plausible's UI. ''; }; secretKeybaseFile = mkOption { type = types.either types.path types.str; description = lib.mdDoc '' Path to the secret used by the `phoenix`-framework. Instructions how to generate one are documented in the [ framework docs](https://hexdocs.pm/phoenix/Mix.Tasks.Phx.Gen.Secret.html#content). ''; }; port = mkOption { default = 8000; type = types.port; description = lib.mdDoc '' Port where the service should be available. ''; }; baseUrl = mkOption { type = types.str; description = lib.mdDoc '' Public URL where plausible is available. Note that `/path` components are currently ignored: [ https://github.com/plausible/analytics/issues/1182 ](https://github.com/plausible/analytics/issues/1182). ''; }; }; mail = { email = mkOption { default = "hello@plausible.local"; type = types.str; description = lib.mdDoc '' The email id to use for as *from* address of all communications from Plausible. ''; }; smtp = { hostAddr = mkOption { default = "localhost"; type = types.str; description = lib.mdDoc '' The host address of your smtp server. ''; }; hostPort = mkOption { default = 25; type = types.port; description = lib.mdDoc '' The port of your smtp server. ''; }; user = mkOption { default = null; type = types.nullOr types.str; description = lib.mdDoc '' The username/email in case SMTP auth is enabled. ''; }; passwordFile = mkOption { default = null; type = with types; nullOr (either str path); description = lib.mdDoc '' The path to the file with the password in case SMTP auth is enabled. ''; }; enableSSL = mkEnableOption (lib.mdDoc "SSL when connecting to the SMTP server"); retries = mkOption { type = types.ints.unsigned; default = 2; description = lib.mdDoc '' Number of retries to make until mailer gives up. ''; }; }; }; }; config = mkIf cfg.enable { assertions = [ { assertion = cfg.adminUser.activate -> cfg.database.postgres.setup; message = '' Unable to automatically activate the admin-user if no locally managed DB for postgres (`services.plausible.database.postgres.setup') is enabled! ''; } ]; services.postgresql = mkIf cfg.database.postgres.setup { enable = true; }; services.clickhouse = mkIf cfg.database.clickhouse.setup { enable = true; }; services.epmd.enable = true; environment.systemPackages = [ cfg.package ]; systemd.services = mkMerge [ { plausible = { inherit (cfg.package.meta) description; documentation = [ "https://plausible.io/docs/self-hosting" ]; wantedBy = [ "multi-user.target" ]; after = optional cfg.database.clickhouse.setup "clickhouse.service" ++ optionals cfg.database.postgres.setup [ "postgresql.service" "plausible-postgres.service" ]; requires = optional cfg.database.clickhouse.setup "clickhouse.service" ++ optionals cfg.database.postgres.setup [ "postgresql.service" "plausible-postgres.service" ]; environment = { # NixOS specific option to avoid that it's trying to write into its store-path. # See also https://github.com/lau/tzdata#data-directory-and-releases STORAGE_DIR = "/var/lib/plausible/elixir_tzdata"; # Configuration options from # https://plausible.io/docs/self-hosting-configuration PORT = toString cfg.server.port; DISABLE_REGISTRATION = boolToString cfg.server.disableRegistration; RELEASE_TMP = "/var/lib/plausible/tmp"; # Home is needed to connect to the node with iex HOME = "/var/lib/plausible"; ADMIN_USER_NAME = cfg.adminUser.name; ADMIN_USER_EMAIL = cfg.adminUser.email; DATABASE_SOCKET_DIR = cfg.database.postgres.socket; DATABASE_NAME = cfg.database.postgres.dbname; CLICKHOUSE_DATABASE_URL = cfg.database.clickhouse.url; BASE_URL = cfg.server.baseUrl; MAILER_EMAIL = cfg.mail.email; SMTP_HOST_ADDR = cfg.mail.smtp.hostAddr; SMTP_HOST_PORT = toString cfg.mail.smtp.hostPort; SMTP_RETRIES = toString cfg.mail.smtp.retries; SMTP_HOST_SSL_ENABLED = boolToString cfg.mail.smtp.enableSSL; SELFHOST = "true"; } // (optionalAttrs (cfg.mail.smtp.user != null) { SMTP_USER_NAME = cfg.mail.smtp.user; }); path = [ cfg.package ] ++ optional cfg.database.postgres.setup config.services.postgresql.package; script = '' export RELEASE_COOKIE="$(< $CREDENTIALS_DIRECTORY/RELEASE_COOKIE )" export ADMIN_USER_PWD="$(< $CREDENTIALS_DIRECTORY/ADMIN_USER_PWD )" export SECRET_KEY_BASE="$(< $CREDENTIALS_DIRECTORY/SECRET_KEY_BASE )" ${lib.optionalString (cfg.mail.smtp.passwordFile != null) ''export SMTP_USER_PWD="$(< $CREDENTIALS_DIRECTORY/SMTP_USER_PWD )"''} # setup ${cfg.package}/createdb.sh ${cfg.package}/migrate.sh ${optionalString cfg.adminUser.activate '' if ! ${cfg.package}/init-admin.sh | grep 'already exists'; then psql -d plausible <<< "UPDATE users SET email_verified=true;" fi ''} exec plausible start ''; serviceConfig = { DynamicUser = true; PrivateTmp = true; WorkingDirectory = "/var/lib/plausible"; StateDirectory = "plausible"; LoadCredential = [ "ADMIN_USER_PWD:${cfg.adminUser.passwordFile}" "SECRET_KEY_BASE:${cfg.server.secretKeybaseFile}" "RELEASE_COOKIE:${cfg.releaseCookiePath}" ] ++ lib.optionals (cfg.mail.smtp.passwordFile != null) [ "SMTP_USER_PWD:${cfg.mail.smtp.passwordFile}"]; }; }; } (mkIf cfg.database.postgres.setup { # `plausible' requires the `citext'-extension. plausible-postgres = { after = [ "postgresql.service" ]; partOf = [ "plausible.service" ]; serviceConfig = { Type = "oneshot"; User = config.services.postgresql.superUser; RemainAfterExit = true; }; script = with cfg.database.postgres; '' PSQL() { ${config.services.postgresql.package}/bin/psql --port=5432 "$@" } # check if the database already exists if ! PSQL -lqt | ${pkgs.coreutils}/bin/cut -d \| -f 1 | ${pkgs.gnugrep}/bin/grep -qw ${dbname} ; then PSQL -tAc "CREATE ROLE plausible WITH LOGIN;" PSQL -tAc "CREATE DATABASE ${dbname} WITH OWNER plausible;" PSQL -d ${dbname} -tAc "CREATE EXTENSION IF NOT EXISTS citext;" fi ''; }; }) ]; }; meta.maintainers = with maintainers; [ ma27 ]; meta.doc = ./plausible.md; }