nixfiles/config/services/nyastodon.nix

36 lines
1.4 KiB
Nix
Raw Permalink Normal View History

2024-06-12 15:00:55 +02:00
{ config, pkgs, ... }: {
2024-08-14 18:46:14 +02:00
sops.secrets."services/nyastodon/extraEnvFile" = {
sopsFile = ../../secrets/services/nyastodon.yaml;
owner = "mastodon";
};
sops.secrets."services/nyastodon/secretKeyBaseFile" = {
sopsFile = ../../secrets/services/nyastodon.yaml;
owner = "mastodon";
};
sops.secrets."services/nyastodon/otpSecretFile" = {
sopsFile = ../../secrets/services/nyastodon.yaml;
owner = "mastodon";
};
sops.secrets."services/nyastodon/vapidPrivateKeyFile" = {
sopsFile = ../../secrets/services/nyastodon.yaml;
owner = "mastodon";
};
sops.secrets."services/nyastodon/vapidPublicKeyFile" = {
sopsFile = ../../secrets/services/nyastodon.yaml;
owner = "mastodon";
};
2024-04-16 22:17:16 +02:00
services.mastodon = {
enable = true;
package = pkgs.nyastodon;
localDomain = config.networking.fqdn;
configureNginx = true;
smtp.fromAddress = "webmaster@girldick.gay";
streamingProcesses = 16;
2024-08-14 18:46:14 +02:00
extraEnvFiles = [ config.sops.secrets."services/nyastodon/extraEnvFile".path ];
secretKeyBaseFile = config.sops.secrets."services/nyastodon/secretKeyBaseFile".path;
otpSecretFile = config.sops.secrets."services/nyastodon/otpSecretFile".path;
vapidPrivateKeyFile = config.sops.secrets."services/nyastodon/vapidPrivateKeyFile".path;
vapidPublicKeyFile = config.sops.secrets."services/nyastodon/vapidPublicKeyFile".path;
2024-04-16 22:17:16 +02:00
};
}