]> git.immae.eu Git - perso/Immae/Config/Nix.git/blame - nixops/modules/websites/tools/peertube/default.nix
Fix secret permissions
[perso/Immae/Config/Nix.git] / nixops / modules / websites / tools / peertube / default.nix
CommitLineData
0eaac6ba
IB
1{ lib, pkgs, config, myconfig, mylibs, ... }:
2let
3 peertube = pkgs.callPackage ./peertube.nix {
4 inherit (mylibs) fetchedGithub;
5 env = myconfig.env.tools.peertube;
6 };
7
8 cfg = config.services.myWebsites.tools.peertube;
9in {
10 options.services.myWebsites.tools.peertube = {
11 enable = lib.mkEnableOption "enable Peertube's website";
12 };
13
14 config = lib.mkIf cfg.enable {
15 ids.uids.peertube = myconfig.env.tools.peertube.user.uid;
16 ids.gids.peertube = myconfig.env.tools.peertube.user.gid;
17
18 users.users.peertube = {
19 name = "peertube";
20 uid = config.ids.uids.peertube;
21 group = "peertube";
22 description = "Peertube user";
fe6f1528 23 home = peertube.varDir;
0eaac6ba
IB
24 useDefaultShell = true;
25 };
26
27 users.groups.peertube.gid = config.ids.gids.peertube;
28
29 systemd.services.peertube = {
30 description = "Peertube";
31 wantedBy = [ "multi-user.target" ];
4a65e38b
IB
32 after = [ "network.target" "postgresql.service" "tools-peertube-key.service" ];
33 wants = [ "postgresql.service" "tools-peertube-key.service" ];
0eaac6ba
IB
34
35 environment.NODE_CONFIG_DIR = "${peertube.varDir}/config";
36 environment.NODE_ENV = "production";
37 environment.HOME = peertube.webappDir;
38
39 path = [ pkgs.nodejs pkgs.bashInteractive pkgs.ffmpeg pkgs.openssl ];
40
41 script = ''
42 exec npm run start
43 '';
44
45 serviceConfig = {
46 User = "peertube";
47 Group = "peertube";
48 WorkingDirectory = peertube.webappDir;
49 PrivateTmp = true;
50 ProtectHome = true;
51 ProtectControlGroups = true;
52 Restart = "always";
53 Type = "simple";
54 TimeoutSec = 60;
55 };
56
57 unitConfig.RequiresMountsFor = peertube.varDir;
58 };
59
4a65e38b
IB
60 deployment.keys.tools-peertube = {
61 destDir = "/run/keys/webapps";
62 user = "peertube";
63 group = "peertube";
85f5ed68 64 permissions = "0400";
4a65e38b
IB
65 text = peertube.config;
66 };
67
0eaac6ba
IB
68 system.activationScripts.peertube = {
69 deps = [ "users" ];
70 text = ''
4a65e38b
IB
71 install -m 0750 -o peertube -g peertube -d ${peertube.varDir}
72 install -m 0750 -o peertube -g peertube -d ${peertube.varDir}/config
73 install -m 0640 -o peertube -g peertube -T /run/keys/webapps/tools-peertube ${peertube.varDir}/config/production.yaml
0eaac6ba
IB
74 '';
75 };
76
77 services.myWebsites.tools.modules = [
78 "headers" "proxy" "proxy_http" "proxy_wstunnel"
79 ];
80 security.acme.certs."eldiron".extraDomains."peertube.immae.eu" = null;
81 services.myWebsites.tools.vhostConfs.peertube = {
82 certName = "eldiron";
83 hosts = [ "peertube.immae.eu" ];
84 root = null;
85 extraConfig = [ ''
86 ProxyPass / http://localhost:${peertube.listenPort}/
87 ProxyPassReverse / http://localhost:${peertube.listenPort}/
88
89 ProxyPreserveHost On
90 RequestHeader set X-Real-IP %{REMOTE_ADDR}s
91
92 ProxyPass /tracker/socket ws://127.0.0.1:${peertube.listenPort}/tracker/socket
93 ProxyPassReverse /tracker/socket ws://127.0.0.1:${peertube.listenPort}/tracker/socket
94
95 ProxyPass /socket.io ws://127.0.0.1:${peertube.listenPort}/socket.io
96 ProxyPassReverse /socket.io ws://127.0.0.1:${peertube.listenPort}/socket.io
97 '' ];
98 };
99 };
100}