{ lib, pkgs, config, myconfig, mylibs, ... }:
let
mastodon = pkgs.callPackage ./mastodon.nix {
inherit (mylibs) fetchedGithub;
env = myconfig.env.tools.mastodon;
};
root = "/run/current-system/webapps/tools_mastodon";
cfg = config.services.myWebsites.tools.mastodon;
in {
options.services.myWebsites.tools.mastodon = {
enable = lib.mkEnableOption "enable mastodon's website";
};
config = lib.mkIf cfg.enable {
ids.uids.mastodon = myconfig.env.tools.mastodon.user.uid;
ids.gids.mastodon = myconfig.env.tools.mastodon.user.gid;
users.users.mastodon = {
name = "mastodon";
uid = config.ids.uids.mastodon;
group = "mastodon";
description = "Mastodon user";
home = mastodon.varDir;
useDefaultShell = true;
};
users.groups.mastodon.gid = config.ids.gids.mastodon;
systemd.services.mastodon-streaming = {
description = "Mastodon Streaming";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "mastodon-web.service" ];
environment.NODE_ENV = "production";
environment.SOCKET = mastodon.nodeSocket;
path = [ pkgs.nodejs pkgs.bashInteractive ];
script = ''
exec npm run start
'';
postStart = ''
while [ ! -S $SOCKET ]; do
sleep 0.5
done
chmod a+w $SOCKET
'';
postStop = ''
rm $SOCKET
'';
serviceConfig = {
User = "mastodon";
EnvironmentFile = mastodon.config;
PrivateTmp = true;
Restart = "always";
TimeoutSec = 15;
Type = "simple";
WorkingDirectory = mastodon.railsRoot;
};
unitConfig.RequiresMountsFor = mastodon.varDir;
};
systemd.services.mastodon-web = {
description = "Mastodon Web app";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
environment.RAILS_ENV = "production";
environment.BUNDLE_PATH = "${mastodon.gems}/lib/ruby/gems/2.5.0";
environment.BUNDLE_GEMFILE = "${mastodon.gems.confFiles}/Gemfile";
environment.SOCKET = mastodon.railsSocket;
path = [ mastodon.gems mastodon.gems.ruby pkgs.file ];
preStart = ''
./bin/bundle exec rails db:migrate
'';
script = ''
exec ./bin/bundle exec puma -C config/puma.rb
'';
serviceConfig = {
User = "mastodon";
EnvironmentFile = mastodon.config;
PrivateTmp = true;
Restart = "always";
TimeoutSec = 60;
Type = "simple";
WorkingDirectory = mastodon.railsRoot;
};
unitConfig.RequiresMountsFor = mastodon.varDir;
};
systemd.services.mastodon-sidekiq = {
description = "Mastodon Sidekiq";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "mastodon-web.service" ];
environment.RAILS_ENV="production";
environment.BUNDLE_PATH = "${mastodon.gems}/${mastodon.gems.ruby.gemPath}";
environment.BUNDLE_GEMFILE = "${mastodon.gems.confFiles}/Gemfile";
environment.DB_POOL="5";
path = [ mastodon.gems mastodon.gems.ruby pkgs.imagemagick pkgs.ffmpeg pkgs.file ];
script = ''
exec ./bin/bundle exec sidekiq -c 5 -q default -q mailers -q pull -q push
'';
serviceConfig = {
User = "mastodon";
EnvironmentFile = mastodon.config;
PrivateTmp = true;
Restart = "always";
TimeoutSec = 15;
Type = "simple";
WorkingDirectory = mastodon.railsRoot;
};
unitConfig.RequiresMountsFor = mastodon.varDir;
};
system.activationScripts.mastodon = {
deps = [ "users" ];
text = ''
install -m 0755 -o mastodon -g mastodon -d ${mastodon.socketsDir}
install -m 0755 -o mastodon -g mastodon -d ${mastodon.varDir} ${mastodon.varDir}/tmp/cache
'';
};
services.myWebsites.tools.modules = [
"headers" "proxy" "proxy_wstunnel" "proxy_http"
];
security.acme.certs."eldiron".extraDomains."mastodon.immae.eu" = null;
system.extraSystemBuilderCmds = ''
mkdir -p $out/webapps
ln -s ${mastodon.railsRoot}/public/ $out/webapps/tools_mastodon
'';
services.myWebsites.tools.vhostConfs.mastodon = {
certName = "eldiron";
hosts = ["mastodon.immae.eu" ];
root = root;
extraConfig = [ ''
Header always set Referrer-Policy "strict-origin-when-cross-origin"
Header always set Strict-Transport-Security "max-age=31536000"
Header always set Cache-Control "public, max-age=31536000, immutable"
Require all granted
ProxyPreserveHost On
RequestHeader set X-Forwarded-Proto "https"
RewriteEngine On
ProxyPass /500.html !
ProxyPass /sw.js !
ProxyPass /embed.js !
ProxyPass /robots.txt !
ProxyPass /manifest.json !
ProxyPass /browserconfig.xml !
ProxyPass /mask-icon.svg !
ProxyPassMatch ^(/.*\.(png|ico|gif)$) !
ProxyPassMatch ^/(assets|avatars|emoji|headers|packs|sounds|system|.well-known/acme-challenge) !
RewriteRule ^/api/v1/streaming/(.+)$ unix://${mastodon.nodeSocket}|http://mastodon.immae.eu/api/v1/streaming/$1 [P,NE,QSA,L]
RewriteRule ^/api/v1/streaming/$ unix://${mastodon.nodeSocket}|ws://mastodon.immae.eu/ [P,NE,QSA,L]
ProxyPass / unix://${mastodon.railsSocket}|http://mastodon.immae.eu/
ProxyPassReverse / unix://${mastodon.railsSocket}|http://mastodon.immae.eu/
Alias /system ${mastodon.varDir}
Require all granted
Options -MultiViews
Require all granted
Options -MultiViews +FollowSymlinks
ErrorDocument 500 /500.html
ErrorDocument 501 /500.html
ErrorDocument 502 /500.html
ErrorDocument 503 /500.html
ErrorDocument 504 /500.html
'' ];
};
};
}