1
0
Fork 0
dotfiles/system/nixos/mastodon.nix

94 lines
2.1 KiB
Nix
Raw Normal View History

2022-11-29 14:51:54 +00:00
{ config, secret, ... }:
2022-11-29 14:17:23 +00:00
2022-11-29 14:51:54 +00:00
let
web-domain = "mastodon.kempkens.io";
in
2022-11-29 14:17:23 +00:00
{
services.mastodon = {
enable = true;
configureNginx = false;
localDomain = "kempkens.io";
streamingPort = 55000;
webPort = 55001;
sidekiqPort = 55002;
2022-11-29 14:51:54 +00:00
enableUnixSocket = true;
2022-11-29 14:17:23 +00:00
trustedProxy = "172.18.0.4";
vapidPublicKeyFile = "/var/lib/mastodon/secrets/vapid-public-key";
secretKeyBaseFile = "/var/lib/mastodon/secrets/secret-key-base";
otpSecretFile = "/var/lib/mastodon/secrets/otp-secret";
vapidPrivateKeyFile = "/var/lib/mastodon/secrets/vapid-private-key";
database = {
createLocally = false;
host = "10.99.99.3";
port = 5432;
name = "mastodon";
inherit (secret.mastodon.database) user;
inherit (secret.mastodon.database) passwordFile;
};
redis = {
createLocally = false;
host = "10.99.99.3";
port = 6379;
};
elasticsearch.host = null;
smtp = {
createLocally = false;
authenticate = true;
host = "smtp.mailgun.org";
port = 465;
fromAddress = "mastodon@mg.kempkens.io";
inherit (secret.mastodon.smtp) user;
inherit (secret.mastodon.smtp) passwordFile;
};
automaticMigrations = true;
mediaAutoRemove = {
enable = true;
startAt = "daily";
olderThanDays = 21;
};
extraConfig = {
2022-11-29 14:51:54 +00:00
WEB_DOMAIN = web-domain;
};
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
virtualHosts."${web-domain}" = {
root = "${config.services.mastodon.package}/public/";
forceSSL = false;
enableACME = false;
locations."/system/".alias = "/var/lib/mastodon/public-system/";
locations."/" = {
tryFiles = "$uri @proxy";
};
locations."@proxy" = {
proxyPass = "http://unix:/run/mastodon-web/web.socket";
proxyWebsockets = true;
};
locations."/api/v1/streaming/" = {
proxyPass = "http://unix:/run/mastodon-streaming/streaming.socket";
proxyWebsockets = true;
};
2022-11-29 14:17:23 +00:00
};
};
networking.firewall.allowedTCPPorts = [ 55000 55001 55002 ];
}