nixpkgs-suyu/nixos/modules/services/databases/neo4j.nix

145 lines
3.8 KiB
Nix
Raw Normal View History

2014-08-16 23:53:26 +02:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.neo4j;
2016-10-11 23:58:54 +02:00
serverConfig = pkgs.writeText "neo4j.conf" ''
dbms.directories.data=${cfg.dataDir}/data
dbms.directories.certificates=${cfg.certDir}
dbms.directories.logs=${cfg.dataDir}/logs
dbms.directories.plugins=${cfg.dataDir}/plugins
dbms.connector.http.type=HTTP
dbms.connector.http.enabled=true
dbms.connector.http.address=${cfg.listenAddress}:${toString cfg.port}
${optionalString cfg.enableBolt ''
dbms.connector.bolt.type=BOLT
dbms.connector.bolt.enabled=true
dbms.connector.bolt.tls_level=OPTIONAL
dbms.connector.bolt.address=${cfg.listenAddress}:${toString cfg.boltPort}
''}
2014-08-16 23:53:26 +02:00
${optionalString cfg.enableHttps ''
2016-10-11 23:58:54 +02:00
dbms.connector.https.type=HTTP
dbms.connector.https.enabled=true
dbms.connector.https.encryption=TLS
dbms.connector.https.address=${cfg.listenAddress}:${toString cfg.httpsPort}
2014-08-16 23:53:26 +02:00
''}
2016-10-11 23:58:54 +02:00
dbms.shell.enabled=true
2014-08-16 23:53:26 +02:00
${cfg.extraServerConfig}
'';
wrapperConfig = pkgs.writeText "neo4j-wrapper.conf" ''
2016-10-11 23:58:54 +02:00
dbms.jvm.additional=-Dunsupported.dbms.udc.source=tarball
dbms.jvm.additional=-XX:+UseConcMarkSweepGC
dbms.jvm.additional=-XX:+CMSClassUnloadingEnabled
2014-08-16 23:53:26 +02:00
'';
in {
###### interface
options.services.neo4j = {
enable = mkOption {
description = "Whether to enable neo4j.";
default = false;
2015-06-15 18:10:26 +02:00
type = types.bool;
2014-08-16 23:53:26 +02:00
};
2014-10-18 13:18:37 +02:00
package = mkOption {
description = "Neo4j package to use.";
default = pkgs.neo4j;
defaultText = "pkgs.neo4j";
2014-10-18 13:18:37 +02:00
type = types.package;
};
listenAddress = mkOption {
2014-08-16 23:53:26 +02:00
description = "Neo4j listen address.";
default = "127.0.0.1";
type = types.str;
};
port = mkOption {
description = "Neo4j port to listen for HTTP traffic.";
default = 7474;
type = types.int;
};
2016-10-11 23:58:54 +02:00
enableBolt = mkOption {
description = "Enable bolt for Neo4j.";
default = true;
type = types.bool;
};
boltPort = mkOption {
description = "Neo4j port to listen for BOLT traffic.";
default = 7687;
type = types.int;
};
2014-08-16 23:53:26 +02:00
enableHttps = mkOption {
description = "Enable https for Neo4j.";
default = false;
type = types.bool;
};
httpsPort = mkOption {
description = "Neo4j port to listen for HTTPS traffic.";
default = 7473;
type = types.int;
};
2016-10-11 23:58:54 +02:00
certDir = mkOption {
description = "Neo4j TLS certificates directory.";
default = "${cfg.dataDir}/certificates";
2014-08-16 23:53:26 +02:00
type = types.path;
};
dataDir = mkOption {
description = "Neo4j data directory.";
default = "/var/lib/neo4j";
type = types.path;
};
extraServerConfig = mkOption {
description = "Extra configuration for neo4j server.";
default = "";
type = types.lines;
};
};
###### implementation
config = mkIf cfg.enable {
systemd.services.neo4j = {
description = "Neo4j Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
2016-10-11 23:58:54 +02:00
environment = {
NEO4J_HOME = "${cfg.package}/share/neo4j";
NEO4J_CONF = "${cfg.dataDir}/conf";
};
2014-08-16 23:53:26 +02:00
serviceConfig = {
2014-10-18 13:18:37 +02:00
ExecStart = "${cfg.package}/bin/neo4j console";
2014-08-16 23:53:26 +02:00
User = "neo4j";
PermissionsStartOnly = true;
};
preStart = ''
2016-10-11 23:58:54 +02:00
mkdir -m 0700 -p ${cfg.dataDir}/{data/graph.db,conf,logs}
ln -fs ${serverConfig} ${cfg.dataDir}/conf/neo4j.conf
2014-08-16 23:53:26 +02:00
ln -fs ${wrapperConfig} ${cfg.dataDir}/conf/neo4j-wrapper.conf
if [ "$(id -u)" = 0 ]; then chown -R neo4j ${cfg.dataDir}; fi
'';
};
environment.systemPackages = [ pkgs.neo4j ];
users.extraUsers = singleton {
name = "neo4j";
uid = config.ids.uids.neo4j;
description = "Neo4j daemon user";
home = cfg.dataDir;
};
};
}