nixpkgs/nixos/modules/services/finance/odoo.nix
h7x4 0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00

123 lines
2.9 KiB
Nix

{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.services.odoo;
format = pkgs.formats.ini {};
in
{
options = {
services.odoo = {
enable = mkEnableOption (lib.mdDoc "odoo");
package = mkPackageOption pkgs "odoo" { };
addons = mkOption {
type = with types; listOf package;
default = [];
example = literalExpression "[ pkgs.odoo_enterprise ]";
description = lib.mdDoc "Odoo addons.";
};
settings = mkOption {
type = format.type;
default = {};
description = lib.mdDoc ''
Odoo configuration settings. For more details see <https://www.odoo.com/documentation/15.0/administration/install/deploy.html>
'';
example = literalExpression ''
options = {
db_user = "odoo";
db_password="odoo";
};
'';
};
domain = mkOption {
type = with types; nullOr str;
description = lib.mdDoc "Domain to host Odoo with nginx";
default = null;
};
};
};
config = mkIf (cfg.enable) (let
cfgFile = format.generate "odoo.cfg" cfg.settings;
in {
services.nginx = mkIf (cfg.domain != null) {
upstreams = {
odoo.servers = {
"127.0.0.1:8069" = {};
};
odoochat.servers = {
"127.0.0.1:8072" = {};
};
};
virtualHosts."${cfg.domain}" = {
extraConfig = ''
proxy_read_timeout 720s;
proxy_connect_timeout 720s;
proxy_send_timeout 720s;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Real-IP $remote_addr;
'';
locations = {
"/longpolling" = {
proxyPass = "http://odoochat";
};
"/" = {
proxyPass = "http://odoo";
extraConfig = ''
proxy_redirect off;
'';
};
};
};
};
services.odoo.settings.options = {
proxy_mode = cfg.domain != null;
};
users.users.odoo = {
isSystemUser = true;
group = "odoo";
};
users.groups.odoo = {};
systemd.services.odoo = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "postgresql.service" ];
# pg_dump
path = [ config.services.postgresql.package ];
requires = [ "postgresql.service" ];
script = "HOME=$STATE_DIRECTORY ${cfg.package}/bin/odoo ${optionalString (cfg.addons != []) "--addons-path=${concatMapStringsSep "," escapeShellArg cfg.addons}"} -c ${cfgFile}";
serviceConfig = {
DynamicUser = true;
User = "odoo";
StateDirectory = "odoo";
};
};
services.postgresql = {
enable = true;
ensureDatabases = [ "odoo" ];
ensureUsers = [{
name = "odoo";
ensureDBOwnership = true;
}];
};
});
}