1
0
Fork 0
dotfiles/system/nixos/mastodon.nix

133 lines
3.2 KiB
Nix
Raw Normal View History

2022-11-29 14:51:54 +00:00
{ config, secret, ... }:
2022-11-29 14:17:23 +00:00
2022-11-29 14:51:54 +00:00
let
web-domain = "mastodon.kempkens.io";
in
2022-11-29 14:17:23 +00:00
{
services.mastodon = {
enable = true;
configureNginx = false;
localDomain = "kempkens.io";
streamingPort = 55000;
webPort = 55001;
sidekiqPort = 55002;
enableUnixSocket = true;
sidekiqThreads = 12;
2022-11-29 14:17:23 +00:00
2022-11-29 14:54:13 +00:00
trustedProxy = "127.0.0.1";
2022-11-29 14:17:23 +00:00
2023-02-05 19:32:19 +00:00
vapidPublicKeyFile = config.age.secrets.mastodon-vapid-public-key.path;
secretKeyBaseFile = config.age.secrets.mastodon-secret-key-base.path;
otpSecretFile = config.age.secrets.mastodon-otp-secret.path;
vapidPrivateKeyFile = config.age.secrets.mastodon-vapid-private-key.path;
2022-11-29 14:17:23 +00:00
database = {
createLocally = false;
host = "10.99.99.3";
port = 5432;
name = "mastodon";
inherit (secret.mastodon.database) user;
2023-02-05 19:32:19 +00:00
passwordFile = config.age.secrets.mastodon-database-password.path;
2022-11-29 14:17:23 +00:00
};
redis = {
createLocally = false;
host = "10.99.99.3";
port = 6379;
};
2022-12-23 16:08:24 +00:00
elasticsearch = {
host = "10.99.99.3";
port = 9200;
};
2022-11-29 14:17:23 +00:00
smtp = {
createLocally = false;
authenticate = true;
host = "smtp.mailgun.org";
2022-11-29 16:03:25 +00:00
port = 587;
2022-11-29 14:17:23 +00:00
fromAddress = "mastodon@mg.kempkens.io";
inherit (secret.mastodon.smtp) user;
2023-02-05 19:32:19 +00:00
passwordFile = config.age.secrets.mastodon-smtp-password.path;
2022-11-29 14:17:23 +00:00
};
automaticMigrations = true;
mediaAutoRemove = {
enable = true;
startAt = "daily";
2022-12-01 21:48:43 +00:00
olderThanDays = 14;
2022-11-29 14:17:23 +00:00
};
extraConfig = {
2022-11-29 14:51:54 +00:00
WEB_DOMAIN = web-domain;
};
extraEnvFiles = [ config.age.secrets.mastodon-extra-config.path ];
2022-11-29 14:51:54 +00:00
};
2023-03-06 17:23:32 +00:00
services.nginx.virtualHosts."${web-domain}" = {
http3 = true;
root = "${config.services.mastodon.package}/public/";
forceSSL = true;
useACMEHost = "kempkens.io";
locations."/system/" = {
extraConfig = ''
rewrite ^/system/?(.*)$ https://mastodon-cdn.kempkens.io/$1 permanent;
'';
};
locations."/" = {
tryFiles = "$uri @proxy";
};
locations."@proxy" = {
recommendedProxySettings = true;
proxyPass = "http://unix:/run/mastodon-web/web.socket";
proxyWebsockets = true;
extraConfig = ''
proxy_force_ranges on;
'';
};
locations."/api/v1/streaming/" = {
recommendedProxySettings = true;
proxyPass = "http://unix:/run/mastodon-streaming/streaming.socket";
proxyWebsockets = true;
extraConfig = ''
proxy_force_ranges on;
'';
2022-11-29 14:17:23 +00:00
};
};
2023-03-06 20:24:46 +00:00
services.nginx.virtualHosts."mastodon-cdn.kempkens.io" = {
http3 = true;
2023-03-06 20:47:25 +00:00
root = "${config.services.mastodon.package}/public/";
2023-03-06 20:24:46 +00:00
forceSSL = true;
useACMEHost = "kempkens.io";
2023-03-06 20:47:25 +00:00
2023-03-06 20:55:07 +00:00
extraConfig = ''
add_header Access-Control-Allow-Origin https://mastodon.kempkens.io;
'';
2023-03-06 20:47:25 +00:00
locations."/system/".alias = "/var/lib/mastodon/public-system/";
2023-03-06 21:00:48 +00:00
# "Old" CDN paths
locations."/accounts/".alias = "/var/lib/mastodon/public-system/accounts/";
2023-03-06 20:47:25 +00:00
locations."/cache/".alias = "/var/lib/mastodon/public-system/cache/";
2023-03-06 21:00:48 +00:00
locations."/custom_emojis/".alias = "/var/lib/mastodon/public-system/custom_emojis/";
locations."/media_attachments/".alias = "/var/lib/mastodon/public-system/media_attachments/";
2023-03-06 20:24:46 +00:00
};
2022-11-29 23:16:26 +00:00
users.groups.mastodon.members = [ config.services.nginx.user ];
2022-11-29 14:17:23 +00:00
}