simple-nixos-fediverse/mastodon.nix

134 lines
4.1 KiB
Nix
Raw Normal View History

2024-03-06 10:48:01 +01:00
{ config, lib, pkgs, ... }: lib.mkMerge [
# mastodon setup
{
# open up access to the mastodon web interface
networking.firewall.allowedTCPPorts = [ 443 ];
2024-02-22 10:56:31 +01:00
services.mastodon = {
2024-03-06 10:48:01 +01:00
enable = true;
2024-02-22 10:56:31 +01:00
2024-03-06 10:48:01 +01:00
# TODO: set up a domain name, and a DNS service so that this can run not in a vm
# localDomain = "domain.social";
configureNginx = true;
2024-03-06 10:40:22 +01:00
2024-03-06 10:48:01 +01:00
# TODO: configure a mailserver so this works
# smtp.fromAddress = "mastodon@mastodon.localhost";
# TODO: this is hardware-dependent. let's figure it out when we have hardware
# streamingProcesses = 1;
};
security.acme = {
acceptTerms = true;
preliminarySelfsigned = true;
# TODO: configure a mailserver so we can set up acme
# defaults.email = "test@example.com";
2024-02-22 10:56:31 +01:00
};
2024-03-06 10:48:01 +01:00
}
# VM setup
{
# these configurations only apply when producing a VM (e.g. nixos-rebuild build-vm)
virtualisation.vmVariant = { config, ... }: {
services.mastodon = {
# redirects to localhost, but allows it to have a proper domain name
localDomain = "mastodon.localhost";
smtp = {
fromAddress = "mastodon@mastodon.localhost";
createLocally = false;
};
extraConfig = {
EMAIL_DOMAIN_ALLOWLIST = "example.com";
};
# from the documentation: recommended is the amount of your CPU cores minus one.
# but it also must be a positive integer
streamingProcesses = let
ncores = config.virtualisation.cores;
max = x: y: if x > y then x else y;
in
max 1 (ncores - 1);
};
2024-02-22 10:56:31 +01:00
2024-03-06 10:48:01 +01:00
security.acme = {
defaults = {
# invalid server; the systemd service will fail, and we won't get properly signed certificates
# but let's not spam the letsencrypt servers (and we don't own this domain anyways)
server = "https://127.0.0.1";
email = "none";
};
};
2024-03-06 10:40:22 +01:00
2024-03-06 10:48:01 +01:00
virtualisation.memorySize = 2048;
virtualisation.forwardPorts = [
{
from = "host";
host.port = 44443;
guest.port = 443;
}
2024-03-06 10:40:22 +01:00
];
};
2024-03-06 10:48:01 +01:00
}
# mastodon development environment
{
2024-03-20 01:39:59 +01:00
networking.firewall.allowedTCPPorts = [ 55001 ];
2024-03-06 10:48:01 +01:00
virtualisation.vmVariant = { config, ... }: {
services.mastodon = {
2024-03-06 15:16:35 +01:00
# needed so we can directly access mastodon at port 55001
# otherwise, mastodon has to be accessed *from* port 443, which we can't do via port forwarding
enableUnixSocket = false;
2024-03-06 10:48:01 +01:00
extraConfig = {
RAILS_ENV = "development";
2024-03-20 10:23:57 +01:00
# to be accessible from outside the VM
BIND = "0.0.0.0";
2024-03-20 01:39:59 +01:00
# for letter_opener (still doesn't work though)
2024-03-06 10:48:01 +01:00
REMOTE_DEV = "true";
};
};
2024-03-06 10:40:22 +01:00
2024-03-06 10:48:01 +01:00
services.postgresql = {
enable = true;
ensureUsers = [
{
name = config.services.mastodon.database.user;
ensureClauses.createdb = true;
# ensurePermissions doesn't work anymore
# ensurePermissions = {
# "mastodon_development.*" = "ALL PRIVILEGES";
# "mastodon_test.*" = "ALL PRIVILEGES";
# }
}
];
# ensureDatabases = [ "mastodon_development_test" "mastodon_test" ];
2024-02-22 10:56:31 +01:00
};
2024-03-06 10:48:01 +01:00
# run rails db:seed so that mastodon sets up the databases for us
systemd.services.mastodon-init-db.script = lib.mkForce ''
if [ `psql -c \
"select count(*) from pg_class c \
join pg_namespace s on s.oid = c.relnamespace \
where s.nspname not in ('pg_catalog', 'pg_toast', 'information_schema') \
and s.nspname not like 'pg_temp%';" | sed -n 3p` -eq 0 ]; then
echo "Seeding database"
rails db:setup
# SAFETY_ASSURED=1 rails db:schema:load
rails db:seed
else
echo "Migrating database (this might be a noop)"
2024-03-06 15:16:35 +01:00
# TODO: this breaks for some reason
# rails db:migrate
2024-03-06 10:48:01 +01:00
fi
'';
2024-03-20 01:39:59 +01:00
virtualisation.forwardPorts = [
2024-03-06 15:16:35 +01:00
{
from = "host";
host.port = 55001;
guest.port = 55001;
}
];
2024-03-06 10:40:22 +01:00
};
2024-03-06 10:48:01 +01:00
}
]