vspd: optionally vendor the webapi (public and templates)

This commit is contained in:
stakeynet 2025-12-02 16:40:42 -08:00
parent cf23980135
commit 46048f48ee
Signed by: stakey
GPG Key ID: 0E5D9B54F07D920D
4 changed files with 32 additions and 9 deletions

View File

@ -66,7 +66,7 @@ If you run dcrwallet as a service, here's how to intialize a wallet as `root`.
```bash ```bash
cd /var/lib/dcrwallet cd /var/lib/dcrwallet
export DCRWALLET_BIN=$(systemctl cat --runtime dcrwallet.service | grep ExecStart | awk '{print $1}' | cut -d= -f2) export DCRWALLET_BIN=$(systemctl cat --runtime dcrwallet.service | grep ExecStart= | awk '{print $1}' | cut -d= -f2)
doas -u dcrwallet $DCRWALLET_BIN \ doas -u dcrwallet $DCRWALLET_BIN \
--configfile=/run/secrets/rendered/dcrwallet.conf \ --configfile=/run/secrets/rendered/dcrwallet.conf \
--appdata=/var/lib/dcrwallet \ --appdata=/var/lib/dcrwallet \

View File

@ -11,9 +11,6 @@ Render `vspd.conf` with `sops-nix` and point the service at it. Example:
{ {
# Define credentials as secrets # Define credentials as secrets
sops.secrets."vspd/adminpass" = {}; sops.secrets."vspd/adminpass" = {};
sops.secrets."dcrd/rpcuser" = {};
sops.secrets."dcrd/rpcpass" = {};
sops.secrets."dcrwallet/rpcuser" = {};
sops.secrets."dcrwallet/rpcpass" = {}; sops.secrets."dcrwallet/rpcpass" = {};
# Render vspd.conf owned by the vspd service user/group # Render vspd.conf owned by the vspd service user/group
@ -24,7 +21,7 @@ Render `vspd.conf` with `sops-nix` and point the service at it. Example:
restartUnits = [ "vspd.service" ]; restartUnits = [ "vspd.service" ];
content = '' content = ''
[Application Options] [Application Options]
network = mainnet network = testnet
# Web server # Web server
listen = 0.0.0.0:8800 listen = 0.0.0.0:8800
@ -34,14 +31,14 @@ Render `vspd.conf` with `sops-nix` and point the service at it. Example:
# dcrd connection # dcrd connection
dcrdhost = 127.0.0.1:9109 dcrdhost = 127.0.0.1:9109
dcrduser = ${config.sops.placeholder."dcrd/rpcuser"} dcrduser = myusername
dcrdpass = ${config.sops.placeholder."dcrd/rpcpass"} dcrdpass = ${config.sops.placeholder."dcrwallet/rpcpass"}
dcrdcert = /var/lib/dcrd/rpc.cert dcrdcert = /var/lib/dcrd/rpc.cert
# dcrwallet connections # dcrwallet connections
# Multiple wallets are comma-separated # Multiple wallets are comma-separated
wallethost = 10.0.0.1:9110,10.0.0.2:9110,10.0.0.3:9110 wallethost = 10.0.0.1:9110,10.0.0.2:9110,10.0.0.3:9110
walletuser = ${config.sops.placeholder."dcrwallet/rpcuser"},${config.sops.placeholder."dcrwallet/rpcuser"},${config.sops.placeholder."dcrwallet/rpcuser"} walletuser = wallet1user,wallet2user,wallet3user
walletpass = ${config.sops.placeholder."dcrwallet/rpcpass"},${config.sops.placeholder."dcrwallet/rpcpass"},${config.sops.placeholder."dcrwallet/rpcpass"} walletpass = ${config.sops.placeholder."dcrwallet/rpcpass"},${config.sops.placeholder."dcrwallet/rpcpass"},${config.sops.placeholder."dcrwallet/rpcpass"}
walletcert = /var/lib/vspd/wallet1.cert,/var/lib/vspd/wallet2.cert,/var/lib/vspd/wallet3.cert walletcert = /var/lib/vspd/wallet1.cert,/var/lib/vspd/wallet2.cert,/var/lib/vspd/wallet3.cert
''; '';
@ -62,6 +59,7 @@ Render `vspd.conf` with `sops-nix` and point the service at it. Example:
## Notes ## Notes
- `vspd` expects its configuration file to be named `vspd.conf` and located in its home directory. The NixOS module handles this by symlinking the file provided in `configFile` to `/var/lib/vspd/vspd.conf` on startup. - `vspd` expects its configuration file to be named `vspd.conf` and located in its home directory. The NixOS module handles this by symlinking the file provided in `configFile` to `/var/lib/vspd/vspd.conf` on startup.
- Web assets (`public` and `templates`) are symlinked to `services.vspd.webPath` if it is set (default `null`). Set this to a path (e.g. `/var/www/vspd`) to serve these assets with a web server like Caddy or Nginx.
- `vspd` requires access to the `rpc.cert` files for both `dcrd` and all voting `dcrwallet` instances. Ensure permissions are set correctly so the `vspd` user can read them. - `vspd` requires access to the `rpc.cert` files for both `dcrd` and all voting `dcrwallet` instances. Ensure permissions are set correctly so the `vspd` user can read them.
- `vspd` periodically writes a backup of its database to `{homedir}/data/{network}/vspd.db-backup`. - `vspd` periodically writes a backup of its database to `{homedir}/data/{network}/vspd.db-backup`.
Ensure this file is backed up regularly. Ensure this file is backed up regularly.

View File

@ -1,6 +1,7 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
let let
dcrdEnabled = config.services.dcrd.enable or false;
cfg = config.services.vspd; cfg = config.services.vspd;
in { in {
options.services.vspd = with lib; { options.services.vspd = with lib; {
@ -30,6 +31,12 @@ in {
description = "State directory for vspd"; description = "State directory for vspd";
}; };
webPath = mkOption {
type = types.nullOr types.path;
default = null;
description = "Directory for vspd web assets (public and templates)";
};
configFile = mkOption { configFile = mkOption {
type = types.path; type = types.path;
description = "Path to vspd.conf"; description = "Path to vspd.conf";
@ -42,10 +49,15 @@ in {
home = cfg.dataDir; home = cfg.dataDir;
isSystemUser = true; isSystemUser = true;
description = "vspd user"; description = "vspd user";
# vspd needs read access to the dcrd RPC certificate
extraGroups = lib.optional (dcrdEnabled && config.services.dcrd.group != cfg.group) config.services.dcrd.group;
}; };
users.groups.${cfg.group} = {}; users.groups.${cfg.group} = {};
systemd.tmpfiles.rules = lib.optional (cfg.webPath != null)
"d '${cfg.webPath}' 0755 ${cfg.user} ${cfg.group} - -";
systemd.services.vspd = { systemd.services.vspd = {
description = "Voting Service Provider Daemon"; description = "Voting Service Provider Daemon";
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
@ -59,7 +71,14 @@ in {
StateDirectoryMode = "0750"; StateDirectoryMode = "0750";
WorkingDirectory = cfg.dataDir; WorkingDirectory = cfg.dataDir;
# Link the provided config file to the expected location in homedir # Link the provided config file to the expected location in homedir
ExecStartPre = "${pkgs.bash}/bin/bash -c 'ln -sf ${cfg.configFile} ${cfg.dataDir}/vspd.conf'"; ExecStartPre = "${pkgs.writeShellScript "vspd-pre-start" ''
set -e
ln -sf ${cfg.configFile} ${cfg.dataDir}/vspd.conf
${lib.optionalString (cfg.webPath != null) ''
ln -sfn ${cfg.package}/share/vspd/internal/webapi/public ${cfg.webPath}/public
ln -sfn ${cfg.package}/share/vspd/internal/webapi/templates ${cfg.webPath}/templates
''}
''}";
ExecStart = "${lib.getExe cfg.package} --homedir=${cfg.dataDir}"; ExecStart = "${lib.getExe cfg.package} --homedir=${cfg.dataDir}";
Restart = "on-failure"; Restart = "on-failure";
RestartSec = "10s"; RestartSec = "10s";

View File

@ -22,6 +22,12 @@ buildGoModule (finalAttrs: {
"cmd/vspadmin" "cmd/vspadmin"
]; ];
postInstall = ''
mkdir -p $out/share/vspd/internal/webapi
cp -r internal/webapi/public $out/share/vspd/internal/webapi/
cp -r internal/webapi/templates $out/share/vspd/internal/webapi/
'';
meta = { meta = {
homepage = "https://github.com/decred/vspd"; homepage = "https://github.com/decred/vspd";
description = "Voting Service Provider Daemon"; description = "Voting Service Provider Daemon";