{ pkgs, sources, config, flake, ... }:
let
  versioning = sources.psql-versioning.src;
in {
  config = {
    services.postgresql = {
      enable = true;
      package = pkgs.postgresql_14;
    };

    services.pgbackrest = {
      enable = true;
      settings = {
        "surtr" = {
          pg1-path = config.services.postgresql.dataDir;

          repo1-path = "/var/lib/pgbackrest";
          repo1-retention-full-type = "time";
          repo1-retention-full = 7;
          repo1-retention-archive = 2;

          repo2-host-type = "tls";
          repo2-host = "pgbackrest.vidhar.yggdrasil";
          repo2-host-ca-file = toString ../../vidhar/pgbackrest/ca/ca.crt;
          repo2-host-cert-file = toString ./pgbackrest.crt;
          repo2-host-key-file = config.sops.secrets."pgbackrest.key".path;
          repo2-retention-full-type = "time";
          repo2-retention-full = 14;
          repo2-retention-archive = 7;
        };

        "global" = {
          compress-type = "zst";
          compress-level = 9;

          archive-async = true;
          spool-path = "/var/spool/pgbackrest";
        };

        "global:server" = {
          tls-server-address = "2a03:4000:52:ada:1::";
          tls-server-ca-file = toString ../../vidhar/pgbackrest/ca/ca.crt;
          tls-server-cert-file = toString ./pgbackrest.crt;
          tls-server-key-file = config.sops.secrets."pgbackrest.key".path;
          tls-server-auth = ["vidhar.yggdrasil=surtr"];
        };

        "global:archive-push" = {
          process-max = 2;
        };
        "global:archive-get" = {
          process-max = 2;
        };
      };

      tlsServer.enable = true;

      backups."surtr-daily" = {
        stanza = "surtr";
        repo = "1";
        timerConfig.OnCalendar = "daily";
      };
    };

    sops.secrets."pgbackrest.key" = {
      format = "binary";
      sopsFile = ./pgbackrest.key;
      owner = "postgres";
      group = "postgres";
      mode = "0400";
    };

    systemd.tmpfiles.rules = [
      "d /var/lib/pgbackrest 0750 postgres postgres - -"
      "d /var/spool/pgbackrest 0750 postgres postgres - -"
    ];

    systemd.services.migrate-postgresql = {
      after = [ "postgresql.service" ];
      bindsTo = [ "postgresql.service" ];
      wantedBy = [ "postgresql.service" ];

      serviceConfig = {
        Type = "oneshot";
        inherit (config.systemd.services.postgresql.serviceConfig) User Group;
        RemainAfterExit = true;
      };

      path = [ config.services.postgresql.package ];
      script = ''
        psql postgres postgres -eXf ${pkgs.writeText "schema.sql" ''
          CREATE DATABASE "matrix-synapse" WITH TEMPLATE "template0" ENCODING "UTF8" LOCALE "C";
          CREATE DATABASE "email" WITH TEMPLATE "template0" ENCODING "UTF8" LOCALE "C";
          CREATE DATABASE "etebase" WITH TEMPLATE "template0" ENCODING "UTF8" LOCALE "C";
        ''}

        psql matrix-synapse postgres -eXf ${pkgs.writeText "matrix-synapse.sql" ''
          \i ${versioning + "/install.versioning.sql"}

          BEGIN;
          SELECT _v.register_patch('000-matrix-users', null, null);

          CREATE USER "matrix-synapse";
          GRANT ALL PRIVILEGES ON DATABASE "matrix-synapse" TO "matrix-synapse";
          GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA public TO "matrix-synapse";
          COMMIT;
        ''}

        psql email postgres -eXf ${pkgs.writeText "email.sql" ''
          \i ${versioning + "/install.versioning.sql"}

          BEGIN;
          SELECT _v.register_patch('000-users', null, null);

          CREATE USER "postfix";
          GRANT CONNECT ON DATABASE "email" TO "postfix";
          ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO "postfix";
          CREATE USER "dovecot2";
          GRANT CONNECT ON DATABASE "email" TO "dovecot2";
          ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO "dovecot2";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('001-spm', null, null);

          CREATE USER "spm";
          GRANT CONNECT ON DATABASE "email" TO "spm";
          ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES to "spm";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('000-base', null, null);

          CREATE TABLE mailbox (
            id uuid PRIMARY KEY NOT NULL DEFAULT gen_random_uuid(),
            mailbox text NOT NULL CONSTRAINT mailbox_non_empty CHECK (mailbox <> '''),
            quota_bytes bigint CONSTRAINT quota_bytes_positive CHECK (CASE WHEN quota_bytes IS NOT NULL THEN quota_bytes > 0 ELSE true END),
            CONSTRAINT mailbox_unique UNIQUE (mailbox)
          );
          CREATE TABLE mailbox_mapping (
            id uuid PRIMARY KEY NOT NULL DEFAULT gen_random_uuid(),
            local text CONSTRAINT local_non_empty CHECK (local IS DISTINCT FROM '''),
            domain text NOT NULL CONSTRAINT domain_non_empty CHECK (domain <> '''),
            mailbox uuid REFERENCES mailbox(id),
            CONSTRAINT local_domain_unique UNIQUE (local, domain)
          );
          CREATE UNIQUE INDEX domain_unique ON mailbox_mapping (domain) WHERE local IS NULL;

          CREATE VIEW virtual_mailbox_domain (domain) AS SELECT DISTINCT domain FROM mailbox_mapping;
          CREATE VIEW virtual_mailbox_mapping (mailbox, lookup) AS SELECT mailbox.mailbox as mailbox, (CASE WHEN local IS NULL THEN ''' ELSE local END) || '@' || domain AS lookup FROM mailbox_mapping INNER JOIN mailbox on mailbox.id = mailbox_mapping.mailbox;

          CREATE VIEW imap_user ("user", quota_rule) AS SELECT mailbox AS "user", (CASE WHEN quota_bytes IS NULL THEN '*:ignore' ELSE '*:bytes=' || quota_bytes END) AS quota_rule FROM mailbox;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('001-lmtp-mapping', ARRAY['000-base'], null);

          CREATE VIEW lmtp_mapping ("user", quota_rule, local, domain) AS SELECT mailbox.mailbox AS "user", (CASE WHEN quota_bytes IS NULL THEN '*:ignore' ELSE '*:bytes=' || quota_bytes END) AS quota_rule, local, domain FROM mailbox INNER JOIN mailbox_mapping ON mailbox.id = mailbox_mapping.mailbox;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('002-citext', ARRAY['000-base'], null);

          DROP VIEW virtual_mailbox_domain;
          DROP VIEW virtual_mailbox_mapping;
          DROP VIEW imap_user;
          DROP VIEW lmtp_mapping;

          CREATE EXTENSION citext;

          ALTER TABLE mailbox ALTER mailbox TYPE citext;
          ALTER TABLE mailbox_mapping ALTER local TYPE citext;
          ALTER TABLE mailbox_mapping ALTER domain TYPE citext;

          CREATE VIEW mailbox_quota_rule (id, mailbox, quota_rule) AS SELECT id, mailbox, (CASE WHEN quota_bytes IS NULL THEN '*:ignore' ELSE '*:bytes=' || quota_bytes END) AS quota_rule FROM mailbox;

          CREATE VIEW virtual_mailbox_domain (domain) AS SELECT DISTINCT domain FROM mailbox_mapping;
          CREATE VIEW virtual_mailbox_mapping (lookup) AS SELECT (CASE WHEN local IS NULL THEN ''' ELSE local END) || '@' || domain AS lookup FROM mailbox_mapping;
          CREATE VIEW imap_user ("user", quota_rule) AS SELECT mailbox AS "user", quota_rule FROM mailbox_quota_rule;
          CREATE VIEW lmtp_mapping ("user", quota_rule, local, domain) AS SELECT mailbox_quota_rule.mailbox AS "user", quota_rule, local, domain FROM mailbox_quota_rule INNER JOIN mailbox_mapping ON mailbox_quota_rule.id = mailbox_mapping.mailbox;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('003-extensions', ARRAY['000-base', '002-citext'], null);

          ALTER TABLE mailbox_mapping ADD COLUMN extension citext CHECK (CASE WHEN extension IS NOT NULL THEN extension NOT LIKE '%+%' ELSE true END);

          DROP VIEW virtual_mailbox_mapping;
          DROP VIEW lmtp_mapping;

          CREATE VIEW virtual_mailbox_mapping (lookup) AS SELECT (CASE WHEN local IS NULL THEN ''' ELSE local END) || (CASE WHEN extension IS NULL THEN ''' ELSE '+' || extension END) || '@' || domain AS lookup FROM mailbox_mapping WHERE mailbox IS NOT NULL;
          CREATE VIEW virtual_mailbox_access (lookup, action) AS SELECT (CASE WHEN local IS NULL THEN ''' ELSE local END) || (CASE WHEN extension IS NULL THEN ''' ELSE '+' || extension END) || '@' || domain AS lookup, CASE WHEN mailbox IS NULL THEN 'REJECT' ELSE 'DUNNO' END AS action FROM mailbox_mapping;
          CREATE VIEW lmtp_mapping ("user", quota_rule, local, extension, domain) AS SELECT mailbox_quota_rule.mailbox AS "user", quota_rule, local, extension, domain FROM mailbox_quota_rule INNER JOIN mailbox_mapping ON mailbox_quota_rule.id = mailbox_mapping.mailbox;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('004-cascade', ARRAY['000-base'], null);

          ALTER TABLE mailbox_mapping DROP CONSTRAINT mailbox_mapping_mailbox_fkey;
          ALTER TABLE mailbox_mapping ADD CONSTRAINT mailbox_mapping_mailbox_fkey FOREIGN KEY (mailbox) REFERENCES mailbox(id) ON DELETE CASCADE ON UPDATE RESTRICT;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('005-spm', ARRAY['000-base', '002-citext', '003-extensions'], null);

          GRANT INSERT ON "mailbox_mapping" TO "spm";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('006-spm-mailbox', ARRAY['000-base'], null);

          GRANT SELECT ON ALL TABLES IN SCHEMA public TO "spm";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('007-ccert-sender-policy', ARRAY['000-base'], null);

          CREATE USER "postfix-ccert-sender-policy";
          GRANT CONNECT ON DATABASE "email" TO "postfix-ccert-sender-policy";
          ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO "postfix-ccert-sender-policy";
          GRANT SELECT ON ALL TABLES IN SCHEMA public TO "postfix-ccert-sender-policy";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('008-mailbox-mapping-claim', ARRAY['000-base', '002-citext', '003-extensions'], null);
          ALTER TABLE mailbox_mapping DROP CONSTRAINT mailbox_mapping_extension_check;
          ALTER TABLE mailbox_mapping ADD CONSTRAINT mailbox_mapping_extension_check CHECK (CASE WHEN extension IS NOT NULL THEN extension NOT LIKE '%+%' AND extension <> ''' AND local IS DISTINCT FROM ''' ELSE true END);

          ALTER TABLE mailbox_mapping DROP CONSTRAINT local_domain_unique;
          CREATE UNIQUE INDEX local_domain_unique ON mailbox_mapping (local, domain) WHERE extension IS null;

          CREATE UNIQUE INDEX local_extension_domain_unique ON mailbox_mapping (local, extension, domain);
          ALTER TABLE mailbox_mapping ADD CONSTRAINT local_extension_domain_unique UNIQUE USING INDEX local_extension_domain_unique;

          ALTER TABLE mailbox_mapping ADD COLUMN reject bool NOT NULL DEFAULT false;

          CREATE OR REPLACE VIEW virtual_mailbox_access (lookup, action) AS SELECT (CASE WHEN local IS NULL THEN ''' ELSE local END) || (CASE WHEN extension IS NULL THEN ''' ELSE '+' || extension END) || '@' || domain AS lookup, CASE WHEN mailbox IS NULL OR reject THEN 'REJECT' ELSE 'DUNNO' END AS action FROM mailbox_mapping;
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('009-spm-update-mapping', ARRAY['000-base', '002-citext', '003-extensions'], null);

          GRANT UPDATE ON "mailbox_mapping" TO "spm";
          COMMIT;

          BEGIN;
          SELECT _v.register_patch('010-spm-delete-mapping', ARRAY['000-base', '002-citext', '003-extensions'], null);

          GRANT DELETE ON "mailbox_mapping" TO "spm";
          COMMIT;
        ''}

        psql etebase postgres -eXf ${pkgs.writeText "etebase.sql" ''
          \i ${versioning + "/install.versioning.sql"}

          BEGIN;
          SELECT _v.register_patch('000-user', null, null);

          CREATE USER "etebase";
          GRANT ALL PRIVILEGES ON DATABASE "etebase" TO "etebase";
          GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA public TO "etebase";
          COMMIT;
        ''}
      '';
    };
  };
}