blob: 21b05d66bb71fdfe31a545b8be3b85fed29ad737 (
plain) (
tree)
|
|
{
description = "A privacy-aware, distributed, open source social network.";
inputs.myuids = {
url = "path:../myuids";
};
inputs.flake-utils.url = "github:numtide/flake-utils";
inputs.nixpkgs = {
url = "github:NixOS/nixpkgs/840c782d507d60aaa49aa9e3f6d0b0e780912742";
flake = false;
};
inputs.diaspora = {
url = "github:diaspora/diaspora/v0.7.10.0";
flake = false;
};
outputs = { self, myuids, nixpkgs, diaspora, flake-utils }: flake-utils.lib.eachSystem ["x86_64-linux"] (system:
let
pkgs = import nixpkgs { inherit system; overlays = []; };
version = (builtins.fromJSON (builtins.readFile ./flake.lock)).nodes.diaspora.original.ref;
inherit (pkgs) callPackage;
in rec {
packages.diaspora = callPackage ./. { src = diaspora // { inherit version; }; };
defaultPackage = packages.diaspora;
legacyPackages.diaspora = packages.diaspora;
checks = {
build = defaultPackage;
};
}
) // rec {
overlays = {
diaspora = final: prev: {
diaspora = self.defaultPackage."${final.system}";
};
};
overlay = overlays.diaspora;
nixosModule = { lib, pkgs, config, ... }:
let
name = "diaspora";
cfg = config.services.diaspora;
uid = config.ids.uids.diaspora;
gid = config.ids.gids.diaspora;
in
{
options.services.diaspora = {
enable = lib.mkEnableOption "Enable Diaspora’s service";
user = lib.mkOption {
type = lib.types.str;
default = name;
description = "User account under which Diaspora runs";
};
group = lib.mkOption {
type = lib.types.str;
default = name;
description = "Group under which Diaspora runs";
};
adminEmail = lib.mkOption {
type = lib.types.str;
example = "admin@example.com";
description = "Admin e-mail for Diaspora";
};
dataDir = lib.mkOption {
type = lib.types.path;
default = "/var/lib/${name}";
description = ''
The directory where Diaspora stores its data.
'';
};
socketsDir = lib.mkOption {
type = lib.types.path;
default = "/run/${name}";
description = ''
The directory where Diaspora puts runtime files and sockets.
'';
};
configDir = lib.mkOption {
type = lib.types.path;
description = ''
The configuration path for Diaspora.
'';
};
package = lib.mkOption {
type = lib.types.package;
default = pkgs.diaspora;
description = ''
Diaspora package to use.
'';
};
withLdap = lib.mkEnableOption "Add ldap patch";
# Output variables
systemdStateDirectory = lib.mkOption {
type = lib.types.str;
# Use ReadWritePaths= instead if varDir is outside of /var/lib
default = assert lib.strings.hasPrefix "/var/lib/" cfg.dataDir;
lib.strings.removePrefix "/var/lib/" cfg.dataDir;
description = ''
Adjusted Diaspora data directory for systemd
'';
readOnly = true;
};
systemdRuntimeDirectory = lib.mkOption {
type = lib.types.str;
# Use ReadWritePaths= instead if socketsDir is outside of /run
default = assert lib.strings.hasPrefix "/run/" cfg.socketsDir;
lib.strings.removePrefix "/run/" cfg.socketsDir;
description = ''
Adjusted Diaspora sockets directory for systemd
'';
readOnly = true;
};
workdir = lib.mkOption {
type = lib.types.package;
default = cfg.package.override {
varDir = cfg.dataDir;
podmin_email = cfg.adminEmail;
config_dir = cfg.configDir;
ldap = cfg.withLdap;
};
description = ''
Adjusted diaspora package with overriden values
'';
readOnly = true;
};
sockets = lib.mkOption {
type = lib.types.attrsOf lib.types.path;
default = {
rails = "${cfg.socketsDir}/diaspora.sock";
eye = "${cfg.socketsDir}/eye.sock";
};
readOnly = true;
description = ''
Diaspora sockets
'';
};
pids = lib.mkOption {
type = lib.types.attrsOf lib.types.path;
default = {
eye = "${cfg.socketsDir}/eye.pid";
};
readOnly = true;
description = ''
Diaspora pids
'';
};
};
config = lib.mkIf cfg.enable {
nixpkgs.overlays = [ self.overlay ];
users.users = lib.optionalAttrs (cfg.user == name) {
"${name}" = {
uid = myuids.lib.uids.diaspora;
group = cfg.group;
description = "Diaspora user";
home = cfg.dataDir;
packages = [ cfg.workdir.gems pkgs.nodejs cfg.workdir.gems.ruby ];
useDefaultShell = true;
};
};
users.groups = lib.optionalAttrs (cfg.group == name) {
"${name}" = {
gid = myuids.lib.gids.diaspora;
};
};
systemd.services.diaspora = {
description = "Diaspora";
wantedBy = [ "multi-user.target" ];
after = [
"network.target" "redis.service" "postgresql.service"
];
wants = [
"redis.service" "postgresql.service"
];
environment.RAILS_ENV = "production";
environment.BUNDLE_PATH = "${cfg.workdir.gems}/${cfg.workdir.gems.ruby.gemPath}";
environment.BUNDLE_GEMFILE = "${cfg.workdir.gems.confFiles}/Gemfile";
environment.EYE_SOCK = cfg.sockets.eye;
environment.EYE_PID = cfg.pids.eye;
path = [ cfg.workdir.gems pkgs.nodejs cfg.workdir.gems.ruby pkgs.curl pkgs.which pkgs.gawk ];
preStart = ''
install -m 0755 -d ${cfg.dataDir}/uploads ${cfg.dataDir}/tmp ${cfg.dataDir}/log
install -m 0700 -d ${cfg.dataDir}/tmp/pids
if [ ! -f ${cfg.dataDir}/schedule.yml ]; then
echo "{}" > ${cfg.dataDir}/schedule.yml
fi
./bin/bundle exec rails db:migrate
'';
script = ''
exec ${cfg.workdir}/script/server
'';
serviceConfig = {
User = cfg.user;
PrivateTmp = true;
Restart = "always";
Type = "simple";
WorkingDirectory = cfg.workdir;
StateDirectory = cfg.systemdStateDirectory;
RuntimeDirectory = cfg.systemdRuntimeDirectory;
StandardInput = "null";
KillMode = "control-group";
};
unitConfig.RequiresMountsFor = cfg.dataDir;
};
};
};
};
}
|