mirror of
https://github.com/phfroidmont/self-hosting.git
synced 2025-12-25 05:36:59 +01:00
Add Odoo config
This commit is contained in:
parent
22d5e09f3c
commit
0dd50bde59
6 changed files with 122 additions and 48 deletions
|
|
@ -2,6 +2,7 @@
|
|||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
pkgs-unstable,
|
||||
...
|
||||
}:
|
||||
{
|
||||
|
|
@ -156,6 +157,42 @@
|
|||
};
|
||||
};
|
||||
|
||||
nixpkgs.config.permittedInsecurePackages = [ "qtwebkit-5.212.0-alpha4" ];
|
||||
services.odoo = {
|
||||
enable = false;
|
||||
package = pkgs-unstable.odoo.override {
|
||||
python310 = pkgs.python310.override {
|
||||
packageOverrides = final: prev: {
|
||||
furl = prev.furl.overridePythonAttrs (old: {
|
||||
doCheck = false;
|
||||
});
|
||||
};
|
||||
};
|
||||
};
|
||||
domain = "odoo.froidmont.solutions";
|
||||
settings = {
|
||||
options = {
|
||||
db_host = "10.0.1.11";
|
||||
db_port = 5432;
|
||||
db_name = "odoo";
|
||||
db_user = "odoo";
|
||||
db_password = "odoo";
|
||||
data_dir = "/var/lib/private/odoo/data";
|
||||
};
|
||||
};
|
||||
};
|
||||
services.nginx.virtualHosts = {
|
||||
${config.services.odoo.domain} = {
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
};
|
||||
};
|
||||
services.postgresql.enable = lib.mkForce false;
|
||||
# systemd.services.odoo = {
|
||||
# after = lib.mkForce [ "network.target" ];
|
||||
# requires = lib.mkForce [ ];
|
||||
# };
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
80
|
||||
443
|
||||
|
|
|
|||
|
|
@ -37,6 +37,7 @@
|
|||
${config.services.postgresql.package}/bin/pg_dump -U roundcube roundcube > /nix/var/data/postgresql/roundcube.dmp
|
||||
${config.services.postgresql.package}/bin/pg_dump -U mastodon mastodon > /nix/var/data/postgresql/mastodon.dmp
|
||||
${config.services.postgresql.package}/bin/pg_dump -U dolibarr dolibarr > /nix/var/data/postgresql/dolibarr.dmp
|
||||
${config.services.postgresql.package}/bin/pg_dump -U odoo odoo > /nix/var/data/postgresql/odoo.dmp
|
||||
'';
|
||||
startAt = "03:00";
|
||||
sshKey = config.sops.secrets.borgSshKey.path;
|
||||
|
|
|
|||
|
|
@ -316,6 +316,11 @@
|
|||
upnp = false;
|
||||
};
|
||||
|
||||
services.rustdesk-server = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts."vtt.${config.networking.domain}" = {
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue