blob: 89dcc67a4517932381c711d76d325c2b087d3389 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
{ lib, pkgs, config, ... }:
let
name = "peertube";
cfg = config.services.peertube;
uid = config.ids.uids.peertube;
gid = config.ids.gids.peertube;
in
{
options.services.peertube = {
enable = lib.mkEnableOption "Enable Peertube’s service";
user = lib.mkOption {
type = lib.types.str;
default = name;
description = "User account under which Peertube runs";
};
group = lib.mkOption {
type = lib.types.str;
default = name;
description = "Group under which Peertube runs";
};
dataDir = lib.mkOption {
type = lib.types.path;
default = "/var/lib/${name}";
description = ''
The directory where Peertube stores its data.
'';
};
configFile = lib.mkOption {
type = lib.types.path;
description = ''
The configuration file path for Peertube.
'';
};
package = lib.mkOption {
type = lib.types.package;
default = pkgs.webapps.peertube;
description = ''
Peertube package to use.
'';
};
# Output variables
systemdStateDirectory = lib.mkOption {
type = lib.types.str;
# Use ReadWritePaths= instead if varDir is outside of /var/lib
default = assert lib.strings.hasPrefix "/var/lib/" cfg.dataDir;
lib.strings.removePrefix "/var/lib/" cfg.dataDir;
description = ''
Adjusted Peertube data directory for systemd
'';
readOnly = true;
};
};
config = lib.mkIf cfg.enable {
users.users = lib.optionalAttrs (cfg.user == name) (lib.singleton {
inherit name;
inherit uid;
group = cfg.group;
description = "Peertube user";
home = cfg.dataDir;
useDefaultShell = true;
});
users.groups = lib.optionalAttrs (cfg.group == name) (lib.singleton {
inherit name;
inherit gid;
});
systemd.services.peertube = {
description = "Peertube";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "postgresql.service" ];
wants = [ "postgresql.service" ];
environment.NODE_CONFIG_DIR = "${cfg.dataDir}/config";
environment.NODE_ENV = "production";
environment.HOME = cfg.package;
path = [ pkgs.nodejs pkgs.bashInteractive pkgs.ffmpeg pkgs.openssl ];
script = ''
install -m 0750 -d ${cfg.dataDir}/config
ln -sf ${cfg.configFile} ${cfg.dataDir}/config/production.yaml
exec npm run start
'';
serviceConfig = {
User = cfg.user;
Group = cfg.group;
WorkingDirectory = cfg.package;
StateDirectory = cfg.systemdStateDirectory;
StateDirectoryMode = 0750;
PrivateTmp = true;
ProtectHome = true;
ProtectControlGroups = true;
Restart = "always";
Type = "simple";
TimeoutSec = 60;
};
unitConfig.RequiresMountsFor = cfg.dataDir;
};
};
}
|