mastodon: decomission
This commit is contained in:
parent
e5740af04b
commit
cf4fba0936
9 changed files with 0 additions and 105 deletions
|
@ -54,12 +54,6 @@
|
|||
fast = true;
|
||||
location = "192.168.0.1";
|
||||
}
|
||||
{
|
||||
path = "zdata/big-apps/mastodon";
|
||||
remotePath = "zdata/recv/lasting-integrity/big-apps/mastodon";
|
||||
fast = true;
|
||||
location = "192.168.0.1";
|
||||
}
|
||||
{
|
||||
path = "zdata/big-apps/nextcloud";
|
||||
remotePath = "zdata/recv/lasting-integrity/big-apps/nextcloud";
|
||||
|
@ -74,7 +68,6 @@
|
|||
services = {
|
||||
git.enable = true;
|
||||
mail.enable = true;
|
||||
mastodon.enable = true;
|
||||
matrix.enable = true;
|
||||
nginx.hosts = [
|
||||
{
|
||||
|
|
|
@ -54,10 +54,6 @@
|
|||
device = "zdata/big-apps/influxdb2";
|
||||
fsType = "zfs";
|
||||
};
|
||||
"/var/lib/mastodon/public-system" = {
|
||||
device = "zdata/big-apps/mastodon";
|
||||
fsType = "zfs";
|
||||
};
|
||||
"/var/lib/git" = {
|
||||
device = "zdata/big-apps/git";
|
||||
fsType = "zfs";
|
||||
|
|
|
@ -7,7 +7,6 @@
|
|||
./data-access
|
||||
./git
|
||||
./mail
|
||||
./mastodon
|
||||
./matrix
|
||||
./nextcloud
|
||||
./nginx
|
||||
|
|
|
@ -1,78 +0,0 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
options.chvp.services.mastodon.enable = lib.mkOption {
|
||||
default = false;
|
||||
example = true;
|
||||
};
|
||||
|
||||
config = lib.mkIf config.chvp.services.mastodon.enable {
|
||||
chvp = {
|
||||
base.zfs.systemLinks = [{ path = "/var/lib/redis-mastodon"; type = "cache"; }];
|
||||
services.nginx.hosts = [{
|
||||
fqdn = "social.chvp.be";
|
||||
options = {
|
||||
root = "${pkgs.mastodon}/public/";
|
||||
locations = {
|
||||
"/system/".alias = "/var/lib/mastodon/public-system/";
|
||||
"/".tryFiles = "$uri @proxy";
|
||||
"@proxy" = {
|
||||
proxyPass = "http://unix:/run/mastodon-web/web.socket";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
"/api/v1/streaming" = {
|
||||
proxyPass = "http://unix:/run/mastodon-streaming/streaming.socket";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
}];
|
||||
};
|
||||
users = {
|
||||
users = {
|
||||
mastodon.uid = 989;
|
||||
nginx.extraGroups = [ "mastodon" ];
|
||||
};
|
||||
groups.mastodon.gid = 985;
|
||||
};
|
||||
services.mastodon = {
|
||||
enable = true;
|
||||
configureNginx = false;
|
||||
localDomain = "social.chvp.be";
|
||||
enableUnixSocket = true;
|
||||
streamingProcesses = 4;
|
||||
|
||||
database.createLocally = true;
|
||||
redis.createLocally = true;
|
||||
smtp = {
|
||||
fromAddress = "social@chvp.be";
|
||||
createLocally = false;
|
||||
};
|
||||
extraConfig = {
|
||||
SMTP_OPENSSL_VERIFY_MODE = "none";
|
||||
};
|
||||
|
||||
otpSecretFile = config.age.secrets."passwords/services/mastodon/otp".path;
|
||||
secretKeyBaseFile = config.age.secrets."passwords/services/mastodon/key".path;
|
||||
vapidPublicKeyFile = config.age.secrets."passwords/services/mastodon/vapid-public".path;
|
||||
vapidPrivateKeyFile = config.age.secrets."passwords/services/mastodon/vapid-private".path;
|
||||
};
|
||||
|
||||
age.secrets."passwords/services/mastodon/vapid-public" = {
|
||||
file = ../../../../secrets/passwords/services/mastodon/vapid-public.age;
|
||||
owner = "mastodon";
|
||||
};
|
||||
age.secrets."passwords/services/mastodon/vapid-private" = {
|
||||
file = ../../../../secrets/passwords/services/mastodon/vapid-private.age;
|
||||
owner = "mastodon";
|
||||
};
|
||||
age.secrets."passwords/services/mastodon/key" = {
|
||||
file = ../../../../secrets/passwords/services/mastodon/key.age;
|
||||
owner = "mastodon";
|
||||
};
|
||||
age.secrets."passwords/services/mastodon/otp" = {
|
||||
file = ../../../../secrets/passwords/services/mastodon/otp.age;
|
||||
owner = "mastodon";
|
||||
};
|
||||
};
|
||||
}
|
|
@ -77,12 +77,6 @@ in
|
|||
"secrets/passwords/services/git/secret.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/gitlab-runner/registration.age".publicKeys = [ urithiru ] ++ users;
|
||||
|
||||
"secrets/passwords/services/mastodon/otp.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/mastodon/key.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/mastodon/vapid-public.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/mastodon/vapid-private.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
|
||||
"secrets/passwords/services/garmin2influx-env.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/grafana/smtp.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/grafana/admin-password.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
"secrets/passwords/services/grafana/secret-key.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||
|
|
Binary file not shown.
Binary file not shown.
|
@ -1,9 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 hKAFvQ MOJSN3hq4H+2R84i4w/zLxlR1AU4y080IrCfcpyCnS8
|
||||
Gs3vTYjkNUe4WvVhg6TWRzEsyYMyeIYGwHAg7CqKwnE
|
||||
-> ssh-ed25519 s9rb8g mfSwXNjit2EG8HKjeszxeM6FcccRppnonKLlIWWoAHg
|
||||
JfoY4D3VmRba4YtlpVJC+1kL9IeLGsyQ06My/74/Fc0
|
||||
-> ssh-ed25519 +xxExQ aYnjsl9l+Vb4tLPqpElHcMzcHdXYkQsapDYGDDSMlxs
|
||||
klVSSRh52RwT51wI51N3kGyWOiBUa7UXdXre7+579n8
|
||||
--- M859YQAcXUn2JFJ/xZOGtGl4qomYoucqufTNpd4uKlQ
|
||||
ÌM»Œ ?_bÑNwˆp]YM¢®^VV®ç¥ÖNª[HV‰<E280B0>ÃÂéW¤_@á])-N»+ȧè2ƒûE«{P¦¶˜Ax<>y<EFBFBD>ZÞ'Þ
|
Binary file not shown.
Loading…
Add table
Reference in a new issue