--- /dev/null
+{
+ description = "A privacy-aware, distributed, open source social network.";
+ inputs.myuids = {
+ url = "path:../myuids";
+ };
+ inputs.flake-utils.url = "github:numtide/flake-utils";
+ inputs.nixpkgs = {
+ url = "github:NixOS/nixpkgs/840c782d507d60aaa49aa9e3f6d0b0e780912742";
+ flake = false;
+ };
+ inputs.diaspora = {
+ url = "github:diaspora/diaspora/v0.7.10.0";
+ flake = false;
+ };
+
+ outputs = { self, myuids, nixpkgs, diaspora, flake-utils }: flake-utils.lib.eachSystem ["x86_64-linux"] (system:
+ let
+ pkgs = import nixpkgs { inherit system; overlays = []; };
+ version = (builtins.fromJSON (builtins.readFile ./flake.lock)).nodes.diaspora.original.ref;
+ inherit (pkgs) callPackage;
+ in rec {
+ packages.diaspora = callPackage ./. { src = diaspora // { inherit version; }; };
+ defaultPackage = packages.diaspora;
+ legacyPackages.diaspora = packages.diaspora;
+ checks = {
+ build = defaultPackage;
+ };
+ }
+ ) // rec {
+ overlays = {
+ diaspora = final: prev: {
+ diaspora = self.defaultPackage."${final.system}";
+ };
+ };
+ overlay = overlays.diaspora;
+ nixosModule = { lib, pkgs, config, ... }:
+ let
+ name = "diaspora";
+ cfg = config.services.diaspora;
+
+ uid = config.ids.uids.diaspora;
+ gid = config.ids.gids.diaspora;
+ in
+ {
+ options.services.diaspora = {
+ enable = lib.mkEnableOption "Enable Diaspora’s service";
+ user = lib.mkOption {
+ type = lib.types.str;
+ default = name;
+ description = "User account under which Diaspora runs";
+ };
+ group = lib.mkOption {
+ type = lib.types.str;
+ default = name;
+ description = "Group under which Diaspora runs";
+ };
+ adminEmail = lib.mkOption {
+ type = lib.types.str;
+ example = "admin@example.com";
+ description = "Admin e-mail for Diaspora";
+ };
+ dataDir = lib.mkOption {
+ type = lib.types.path;
+ default = "/var/lib/${name}";
+ description = ''
+ The directory where Diaspora stores its data.
+ '';
+ };
+ socketsDir = lib.mkOption {
+ type = lib.types.path;
+ default = "/run/${name}";
+ description = ''
+ The directory where Diaspora puts runtime files and sockets.
+ '';
+ };
+ configDir = lib.mkOption {
+ type = lib.types.path;
+ description = ''
+ The configuration path for Diaspora.
+ '';
+ };
+ package = lib.mkOption {
+ type = lib.types.package;
+ default = pkgs.diaspora;
+ description = ''
+ Diaspora package to use.
+ '';
+ };
+ withLdap = lib.mkEnableOption "Add ldap patch";
+ # Output variables
+ systemdStateDirectory = lib.mkOption {
+ type = lib.types.str;
+ # Use ReadWritePaths= instead if varDir is outside of /var/lib
+ default = assert lib.strings.hasPrefix "/var/lib/" cfg.dataDir;
+ lib.strings.removePrefix "/var/lib/" cfg.dataDir;
+ description = ''
+ Adjusted Diaspora data directory for systemd
+ '';
+ readOnly = true;
+ };
+ systemdRuntimeDirectory = lib.mkOption {
+ type = lib.types.str;
+ # Use ReadWritePaths= instead if socketsDir is outside of /run
+ default = assert lib.strings.hasPrefix "/run/" cfg.socketsDir;
+ lib.strings.removePrefix "/run/" cfg.socketsDir;
+ description = ''
+ Adjusted Diaspora sockets directory for systemd
+ '';
+ readOnly = true;
+ };
+ workdir = lib.mkOption {
+ type = lib.types.package;
+ default = cfg.package.override {
+ varDir = cfg.dataDir;
+ podmin_email = cfg.adminEmail;
+ config_dir = cfg.configDir;
+ ldap = cfg.withLdap;
+ };
+ description = ''
+ Adjusted diaspora package with overriden values
+ '';
+ readOnly = true;
+ };
+ sockets = lib.mkOption {
+ type = lib.types.attrsOf lib.types.path;
+ default = {
+ rails = "${cfg.socketsDir}/diaspora.sock";
+ eye = "${cfg.socketsDir}/eye.sock";
+ };
+ readOnly = true;
+ description = ''
+ Diaspora sockets
+ '';
+ };
+ pids = lib.mkOption {
+ type = lib.types.attrsOf lib.types.path;
+ default = {
+ eye = "${cfg.socketsDir}/eye.pid";
+ };
+ readOnly = true;
+ description = ''
+ Diaspora pids
+ '';
+ };
+ };
+
+ config = lib.mkIf cfg.enable {
+ nixpkgs.overlays = [ self.overlay ];
+ users.users = lib.optionalAttrs (cfg.user == name) {
+ "${name}" = {
+ uid = myuids.lib.uids.diaspora;
+ group = cfg.group;
+ description = "Diaspora user";
+ home = cfg.dataDir;
+ packages = [ cfg.workdir.gems pkgs.nodejs cfg.workdir.gems.ruby ];
+ useDefaultShell = true;
+ };
+ };
+ users.groups = lib.optionalAttrs (cfg.group == name) {
+ "${name}" = {
+ gid = myuids.lib.gids.diaspora;
+ };
+ };
+
+ systemd.services.diaspora = {
+ description = "Diaspora";
+ wantedBy = [ "multi-user.target" ];
+ after = [
+ "network.target" "redis.service" "postgresql.service"
+ ];
+ wants = [
+ "redis.service" "postgresql.service"
+ ];
+
+ environment.RAILS_ENV = "production";
+ environment.BUNDLE_PATH = "${cfg.workdir.gems}/${cfg.workdir.gems.ruby.gemPath}";
+ environment.BUNDLE_GEMFILE = "${cfg.workdir.gems.confFiles}/Gemfile";
+ environment.EYE_SOCK = cfg.sockets.eye;
+ environment.EYE_PID = cfg.pids.eye;
+
+ path = [ cfg.workdir.gems pkgs.nodejs cfg.workdir.gems.ruby pkgs.curl pkgs.which pkgs.gawk ];
+
+ preStart = ''
+ install -m 0755 -d ${cfg.dataDir}/uploads ${cfg.dataDir}/tmp ${cfg.dataDir}/log
+ install -m 0700 -d ${cfg.dataDir}/tmp/pids
+ if [ ! -f ${cfg.dataDir}/schedule.yml ]; then
+ echo "{}" > ${cfg.dataDir}/schedule.yml
+ fi
+ ./bin/bundle exec rails db:migrate
+ '';
+
+ script = ''
+ exec ${cfg.workdir}/script/server
+ '';
+
+ serviceConfig = {
+ User = cfg.user;
+ PrivateTmp = true;
+ Restart = "always";
+ Type = "simple";
+ WorkingDirectory = cfg.workdir;
+ StateDirectory = cfg.systemdStateDirectory;
+ RuntimeDirectory = cfg.systemdRuntimeDirectory;
+ StandardInput = "null";
+ KillMode = "control-group";
+ };
+
+ unitConfig.RequiresMountsFor = cfg.dataDir;
+ };
+ };
+ };
+ };
+}
+