Fix electrs and add electrs hidden service

This commit is contained in:
nixbitcoin 2019-02-25 17:00:50 +01:00
parent 8b9c9bd70a
commit eacd057963
No known key found for this signature in database
GPG key ID: DD11F9AD5308B3BA
5 changed files with 55 additions and 15 deletions

View file

@ -9,6 +9,9 @@ let
${optionalString cfg.testnet "testnet=1"}
${optionalString (cfg.dbCache != null) "dbcache=${toString cfg.dbCache}"}
${optionalString (cfg.prune != null) "prune=${toString cfg.prune}"}
sysperms=${if cfg.sysperms then "1" else "0"}
disablewallet=${if cfg.disablewallet then "1" else "0"}
# Connection options
${optionalString (cfg.port != null) "port=${toString cfg.port}"}
@ -151,6 +154,22 @@ in {
If enabled, the bitcoin service will listen.
'';
};
sysperms = mkOption {
type = types.bool;
default = false;
description = ''
Create new files with system default permissions, instead of umask 077 (only effective with disabled wallet functionality)
# Necessary for electrs
'';
};
disablewallet = mkOption {
type = types.bool;
default = false;
description = ''
Do not load the wallet and disable wallet RPC calls
# Necessary for electrs
'';
};
dbCache = mkOption {
type = types.nullOr (types.ints.between 4 16384);
default = null;
@ -195,6 +214,7 @@ in {
chmod o-rw '${cfg.dataDir}/bitcoin.conf'
chown '${cfg.user}:${cfg.group}' '${cfg.dataDir}/bitcoin.conf'
echo "rpcpassword=$(cat /secrets/bitcoin-rpcpassword)" >> '${cfg.dataDir}/bitcoin.conf'
chmod -R g+rX '${cfg.dataDir}/blocks'
'';
serviceConfig = {
Type = "simple";

View file

@ -4,6 +4,8 @@ with lib;
let
cfg = config.services.electrs;
index-batch-size = "${if cfg.high-memory then "" else "--index-batch-size=10"}";
jsonrpc-import = "${if cfg.high-memory then "" else "--jsonrpc-import"}";
in {
options.services.electrs = {
enable = mkOption {
@ -18,13 +20,20 @@ in {
default = "/var/lib/electrs";
description = "The data directory for electrs.";
};
high-memory = mkOption {
type = types.bool;
default = false;
description = ''
If enabled, the electrs service will sync faster on high-memory systems.
'';
};
};
config = mkIf cfg.enable {
users.users.electrs = {
description = "electrs User";
group = "electrs";
extraGroups = [ "bitcoinrpc" "keys" ];
extraGroups = [ "bitcoinrpc" "keys" "bitcoin"];
home = cfg.dataDir;
};
users.groups.electrs = {
@ -40,7 +49,7 @@ in {
preStart = ''
mkdir -m 0770 -p ${cfg.dataDir}
chown 'electrs:electrs' ${cfg.dataDir}
echo "${pkgs.electrs}/bin/electrs -vvv --timestamp --db-dir ${cfg.dataDir} --daemon-dir /var/lib/bitcoind --cookie=${config.services.bitcoind.rpcuser}:$(cat /secrets/bitcoin-rpcpassword)" > /var/lib/electrs/startscript.sh
echo "${pkgs.electrs}/bin/electrs -vvv ${index-batch-size} ${jsonrpc-import} --timestamp --db-dir ${cfg.dataDir} --daemon-dir /var/lib/bitcoind --cookie=${config.services.bitcoind.rpcuser}:$(cat /secrets/bitcoin-rpcpassword)" > /var/lib/electrs/startscript.sh
chown -R 'electrs:electrs' ${cfg.dataDir}
chmod u+x ${cfg.dataDir}/startscript.sh
'';

View file

@ -16,8 +16,7 @@ let
lightning-charge.package
nanopos.package
spark-wallet.package
# TODO: re-enable when fixed
#electrs
electrs
nodejs-8_x
nginx
];
@ -79,6 +78,8 @@ in {
# bitcoind
services.bitcoind.enable = true;
services.bitcoind.listen = true;
services.bitcoind.sysperms = true;
services.bitcoind.disablewallet = true;
services.bitcoind.proxy = config.services.tor.client.socksListenAddress;
services.bitcoind.port = 8333;
services.bitcoind.rpcuser = "bitcoinrpc";
@ -157,14 +158,20 @@ in {
services.nix-bitcoin-webindex.enable = cfg.modules == "all";
services.clightning.autolisten = cfg.modules == "all";
services.spark-wallet.enable = cfg.modules == "all";
# TODO: re-enable when fixed
services.electrs.enable = false;
services.tor.hiddenServices.spark-wallet = {
map = [{
port = 80; toPort = 9737;
}];
version = 3;
};
services.electrs.enable = true;
services.electrs.high-memory = false;
services.tor.hiddenServices.electrs = {
map = [{
port = 50001; toPort = 50001;
}];
version = 3;
};
environment.systemPackages = if (cfg.modules == "all") then (minimalPackages ++ allPackages) else minimalPackages;
};
}