flake/services/akkoma.nix
2025-11-08 21:14:34 +00:00

62 lines
1.6 KiB
Nix

{
pkgs,
config,
...
}: let
fediPort = 8083;
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;
in {
age.secrets."hidden_service/akkoma".file = ../secrets/hidden_service/akkoma;
services = {
akkoma = {
enable = true;
config = {
":pleroma" = {
":instance" = {
name = "social.distrust.network";
description = "Akkoma instance for distrust.network users";
email = "root@distrust.network";
registration_open = false;
};
":ldap" = {
enabled = true;
host = "localhost";
port = 3890;
ssl = false;
tls = false;
base = "ou=people,dc=distrust,dc=network";
uid = "uid";
};
"Pleroma.Upload".base_url = "https://social.distrust.network/media/";
"Pleroma.Web.Endpoint" = {
url.host = "social.distrust.network";
http = {
ip = "0.0.0.0";
port = fediPort;
};
};
"Pleroma.Web.Auth.Authenticator" = mkAtom "Pleroma.Web.Auth.LDAPAuthenticator";
};
};
};
};
distrust.services."akkoma" = {
url = "https://social.distrust.network";
onion = {
url = "http://n5j5sq55iem2hzbgvkba5vwd5gx5qj2pkb7nxyginbtmnkah74rtulad.onion";
secretKey = config.age.secrets."hidden_service/akkoma".path;
};
virtualHostConfig = ''
reverse_proxy localhost:${toString fediPort}
'';
backup = {
enable = true;
paths = [
"/var/lib/akkoma"
];
database = "akkoma";
};
};
}