buzzrelay/nixos-module.nix
2023-01-11 18:47:36 +01:00

86 lines
2.3 KiB
Nix

{ self }:
{ config, lib, pkgs, ... }: {
options.services.buzzrelay = with lib; {
enable = mkEnableOption "Enable Fedi.buzz relay";
streams = mkOption {
type = types.listOf str;
default = [
"https://fedi.buzz/api/v1/streaming/public"
];
};
listenPort = mkOption {
type = types.int;
default = 8000;
};
hostName = mkOption {
type = types.str;
};
privKeyFile = mkOption {
type = types.str;
};
pubKeyFile = mkOption {
type = types.str;
};
database = mkOption {
type = types.str;
default = "buzzrelay";
};
user = mkOption {
type = types.str;
default = "relay";
};
group = mkOption {
type = types.str;
default = "relay";
};
};
config =
let
cfg = config.services.buzzrelay;
configFile = builtins.toFile "buzzrelay.toml" (
lib.generators.toYAML {} {
streams = cfg.streams;
hostname = cfg.hostName;
listen_port = cfg.listenPort;
priv_key_file = cfg.privKeyFile;
pub_key_file = cfg.pubKeyFile;
db = "host=/var/run/postgresql user=${cfg.user} dbname=${cfg.database}";
});
inherit (self.packages.${pkgs.system}) buzzrelay;
in
lib.mkIf cfg.enable {
users.users.${cfg.user} = {
inherit (cfg) group;
isSystemUser = true;
};
users.groups.${cfg.group} = {};
services.postgresql = {
enable = true;
ensureDatabases = [ cfg.database ];
ensureUsers = [ {
name = cfg.user;
ensurePermissions = {
"DATABASE ${cfg.database}" = "ALL PRIVILEGES";
};
} ];
};
systemd.services.buzzrelay = {
wantedBy = [ "multi-user.target" ];
after = [ "postgresql.service" "network-online.target" ];
serviceConfig = {
Type = "notify";
WorkingDirectory = "${buzzrelay}/share/buzzrelay";
ExecStart = "${buzzrelay}/bin/buzzrelay ${lib.escapeShellArg configFile}";
User = cfg.user;
Group = cfg.group;
ProtectSystem = "full";
Restart = "always";
RestartSec = "1s";
WatchdogSec = "1800s";
};
};
};
}