selfprivacy-nixos-config/social/pleroma.nix

61 lines
1.5 KiB
Nix
Raw Permalink Normal View History

{ pkgs, lib, config, ... }:
2021-11-15 12:02:05 +02:00
let
cfg = config.services.userdata;
in
{
fileSystems = lib.mkIf cfg.useBinds {
"/var/lib/pleroma" = {
device = "/volumes/${cfg.pleroma.location}/pleroma";
options = [ "bind" ];
};
"/var/lib/postgresql" = {
device = "/volumes/${cfg.pleroma.location}/postgresql";
options = [ "bind" ];
};
};
2021-11-15 12:02:05 +02:00
services = {
pleroma = {
enable = cfg.pleroma.enable;
user = "pleroma";
group = "pleroma";
configs = [
2021-11-18 20:19:26 +02:00
(builtins.replaceStrings
[ "$DOMAIN" "$LUSER" ]
[ cfg.domain cfg.username ]
(builtins.readFile ./config.exs))
2021-11-15 12:02:05 +02:00
];
};
postgresql = {
enable = true;
package = pkgs.postgresql_12;
initialScript = "/etc/setup.psql";
ensureDatabases = [
"pleroma"
];
ensureUsers = [
{
name = "pleroma";
ensurePermissions = {
"DATABASE pleroma" = "ALL PRIVILEGES";
};
}
];
2021-11-15 12:02:05 +02:00
};
};
environment.etc."setup.psql".text = ''
CREATE USER pleroma;
2021-11-15 12:02:05 +02:00
CREATE DATABASE pleroma OWNER pleroma;
\c pleroma;
--Extensions made by ecto.migrate that need superuser access
CREATE EXTENSION IF NOT EXISTS citext;
CREATE EXTENSION IF NOT EXISTS pg_trgm;
CREATE EXTENSION IF NOT EXISTS "uuid-ossp";
'';
users.users.pleroma = {
extraGroups = [ "postgres" ];
2021-11-15 12:29:20 +02:00
isNormalUser = false;
isSystemUser = true;
2022-04-20 13:22:16 +03:00
group = "pleroma";
2021-11-15 12:02:05 +02:00
};
}