]>
Commit | Line | Data |
---|---|---|
1 | { lib, pkgs, config, myconfig, mylibs, ... }: | |
2 | let | |
3 | peertube = pkgs.callPackage ./peertube.nix { | |
4 | inherit (mylibs) fetchedGithub; | |
5 | env = myconfig.env.tools.peertube; | |
6 | }; | |
7 | ||
8 | cfg = config.services.myWebsites.tools.peertube; | |
9 | in { | |
10 | options.services.myWebsites.tools.peertube = { | |
11 | enable = lib.mkEnableOption "enable Peertube's website"; | |
12 | }; | |
13 | ||
14 | config = lib.mkIf cfg.enable { | |
15 | ids.uids.peertube = myconfig.env.tools.peertube.user.uid; | |
16 | ids.gids.peertube = myconfig.env.tools.peertube.user.gid; | |
17 | ||
18 | users.users.peertube = { | |
19 | name = "peertube"; | |
20 | uid = config.ids.uids.peertube; | |
21 | group = "peertube"; | |
22 | description = "Peertube user"; | |
23 | home = peertube.varDir; | |
24 | useDefaultShell = true; | |
25 | }; | |
26 | ||
27 | users.groups.peertube.gid = config.ids.gids.peertube; | |
28 | ||
29 | systemd.services.peertube = { | |
30 | description = "Peertube"; | |
31 | wantedBy = [ "multi-user.target" ]; | |
32 | after = [ "network.target" "postgresql.service" "tools-peertube-key.service" ]; | |
33 | wants = [ "postgresql.service" "tools-peertube-key.service" ]; | |
34 | ||
35 | environment.NODE_CONFIG_DIR = "${peertube.varDir}/config"; | |
36 | environment.NODE_ENV = "production"; | |
37 | environment.HOME = peertube.webappDir; | |
38 | ||
39 | path = [ pkgs.nodejs pkgs.bashInteractive pkgs.ffmpeg pkgs.openssl ]; | |
40 | ||
41 | script = '' | |
42 | exec npm run start | |
43 | ''; | |
44 | ||
45 | serviceConfig = { | |
46 | User = "peertube"; | |
47 | Group = "peertube"; | |
48 | WorkingDirectory = peertube.webappDir; | |
49 | PrivateTmp = true; | |
50 | ProtectHome = true; | |
51 | ProtectControlGroups = true; | |
52 | Restart = "always"; | |
53 | Type = "simple"; | |
54 | TimeoutSec = 60; | |
55 | }; | |
56 | ||
57 | unitConfig.RequiresMountsFor = peertube.varDir; | |
58 | }; | |
59 | ||
60 | deployment.keys.tools-peertube = { | |
61 | destDir = "/run/keys/webapps"; | |
62 | user = "peertube"; | |
63 | group = "peertube"; | |
64 | permissions = "0700"; | |
65 | text = peertube.config; | |
66 | }; | |
67 | ||
68 | system.activationScripts.peertube = { | |
69 | deps = [ "users" ]; | |
70 | text = '' | |
71 | install -m 0750 -o peertube -g peertube -d ${peertube.varDir} | |
72 | install -m 0750 -o peertube -g peertube -d ${peertube.varDir}/config | |
73 | install -m 0640 -o peertube -g peertube -T /run/keys/webapps/tools-peertube ${peertube.varDir}/config/production.yaml | |
74 | ''; | |
75 | }; | |
76 | ||
77 | services.myWebsites.tools.modules = [ | |
78 | "headers" "proxy" "proxy_http" "proxy_wstunnel" | |
79 | ]; | |
80 | security.acme.certs."eldiron".extraDomains."peertube.immae.eu" = null; | |
81 | services.myWebsites.tools.vhostConfs.peertube = { | |
82 | certName = "eldiron"; | |
83 | hosts = [ "peertube.immae.eu" ]; | |
84 | root = null; | |
85 | extraConfig = [ '' | |
86 | ProxyPass / http://localhost:${peertube.listenPort}/ | |
87 | ProxyPassReverse / http://localhost:${peertube.listenPort}/ | |
88 | ||
89 | ProxyPreserveHost On | |
90 | RequestHeader set X-Real-IP %{REMOTE_ADDR}s | |
91 | ||
92 | ProxyPass /tracker/socket ws://127.0.0.1:${peertube.listenPort}/tracker/socket | |
93 | ProxyPassReverse /tracker/socket ws://127.0.0.1:${peertube.listenPort}/tracker/socket | |
94 | ||
95 | ProxyPass /socket.io ws://127.0.0.1:${peertube.listenPort}/socket.io | |
96 | ProxyPassReverse /socket.io ws://127.0.0.1:${peertube.listenPort}/socket.io | |
97 | '' ]; | |
98 | }; | |
99 | }; | |
100 | } |