Fediversity/configuration.nix

149 lines
4.2 KiB
Nix
Raw Normal View History

2024-02-22 10:56:31 +01:00
{ config, lib, pkgs, ... }: {
# open up access to the mastodon web interface
networking.firewall.allowedTCPPorts = [ 443 ];
services.mastodon = {
enable = true;
# TODO: set up a domain name, and a DNS service so that this can run not in a vm
# localDomain = "domain.social";
configureNginx = true;
# TODO: configure a mailserver so this works
2024-02-28 22:49:16 +01:00
# smtp.fromAddress = "mastodon@social.local.gd";
2024-02-22 10:56:31 +01:00
# TODO: this is hardware-dependent. let's figure it out when we have hardware
# streamingProcesses = 1;
};
security.acme = {
acceptTerms = true;
preliminarySelfsigned = true;
# TODO: configure a mailserver so we can set up acme
# defaults.email = "test@example.com";
};
# let us log in
users.mutableUsers = false;
2024-03-06 10:40:22 +01:00
users.users.root.hashedPassword = "";
services.openssh = {
enable = true;
settings = {
PermitRootLogin = "yes";
PermitEmptyPasswords = "yes";
UsePAM = "no";
};
};
2024-02-22 10:56:31 +01:00
# access to convenient things
environment.systemPackages = with pkgs; [ w3m python3 ];
nix.extraOptions = ''
extra-experimental-features = nix-command flakes
'';
# these configurations only apply when producing a VM (e.g. nixos-rebuild build-vm)
virtualisation.vmVariant = { config, ... }: {
services.mastodon = {
# redirects to localhost, but allows it to have a proper domain name
# SEE: local.gd
localDomain = "social.local.gd";
2024-02-28 22:49:16 +01:00
smtp = {
fromAddress = "mastodon@social.local.gd";
createLocally = false;
};
2024-03-06 10:40:22 +01:00
extraConfig = {
EMAIL_DOMAIN_ALLOWLIST = "example.com";
RAILS_ENV = "development";
# for letter_opener
REMOTE_DEV = "true";
};
# database = {
# # createLocally = false;
# # host = "/run/postgresql";
# # port = null;
# name = "mastodon_development";
# user = "mastodon_development";
# };
# user = "mastodon_development";
# database.createLocally = false;
2024-02-22 10:56:31 +01:00
# from the documentation: recommended is the amount of your CPU cores minus one.
# but it also must be a positive integer
streamingProcesses = let
2024-02-28 22:49:16 +01:00
ncores = config.virtualisation.cores;
2024-02-22 10:56:31 +01:00
max = x: y: if x > y then x else y;
in
max 1 (ncores - 1);
};
2024-03-06 10:40:22 +01:00
# users.users.mastodon_development = {
# isSystemUser = true;
# home = config.services.mastodon.package;
# group = "mastodon";
# packages = [ config.services.mastodon.package pkgs.imagemagick ];
# };
services.postgresql = {
enable = true;
ensureUsers = [
{
name = config.services.mastodon.database.user;
ensureClauses.createdb = true;
# ensurePermissions."mastodon_development_test.*" = "ALL PRIVILEGES";
}
];
# ensureDatabases = [ "mastodon_development_test" ];
};
systemd.services.mastodon-init-db.script = lib.mkForce ''
if [ `psql -c \
"select count(*) from pg_class c \
join pg_namespace s on s.oid = c.relnamespace \
where s.nspname not in ('pg_catalog', 'pg_toast', 'information_schema') \
and s.nspname not like 'pg_temp%';" | sed -n 3p` -eq 0 ]; then
echo "Seeding database"
rails db:setup
# SAFETY_ASSURED=1 rails db:schema:load
rails db:seed
else
echo "Migrating database (this might be a noop)"
rails db:migrate
fi
'';
2024-02-22 10:56:31 +01:00
security.acme = {
defaults = {
# invalid server; the systemd service will fail, and we won't get properly signed certificates
# but let's not spam the letsencrypt servers (and we don't own this domain anyways)
server = "https://127.0.0.1";
email = "none";
};
};
2024-03-06 10:40:22 +01:00
services.nginx.virtualHosts.${config.services.mastodon.localDomain} = {
# extraConfig = ''
# add_header Referrer-Policy "same-origin";
# '';
};
2024-02-28 22:49:16 +01:00
virtualisation.memorySize = 2048;
2024-02-22 10:56:31 +01:00
virtualisation.forwardPorts = [
{
from = "host";
host.port = 44443;
guest.port = 443;
}
2024-03-06 10:40:22 +01:00
{
from = "host";
host.port = 2222;
guest.port = 22;
}
2024-02-22 10:56:31 +01:00
];
};
}