jitsi-roomsv2/nixos.nix

69 lines
1.6 KiB
Nix
Raw Normal View History

2025-01-19 11:16:19 +01:00
{
lib,
pkgs,
config,
...
}:
with lib;
let
cfg = config.services.jitsi-rooms;
backendPort = 8081;
wsPort = 9160;
address = "127.0.0.1";
backend = (pkgs.callPackage ./backend/default.nix { });
frontend = (pkgs.callPackage ./frontend/default.nix { });
prodsodyPackage = (pkgs.callPackage ./prodsody/default.nix { });
2025-01-20 20:49:45 +01:00
notifyScript = "/run/current-system/sw/bin/send-signal-jitsi-notify";
2025-01-19 11:16:19 +01:00
in
{
options.services.jitsi-rooms = {
enable = mkEnableOption "jitsi-rooms service";
nginxHostname = mkOption {
type = types.str;
default = "treffen.filefighter.de";
};
};
config = mkIf cfg.enable {
systemd.services.jitsi-rooms = {
description = "jitsi-rooms";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
2025-01-20 20:49:45 +01:00
ExecStart = "${backend}/bin/jitsi-rooms-exe -n ${notifyScript}";
2025-01-19 11:16:19 +01:00
DynamicUser = true;
User = "jitsi-rooms-backend";
};
};
2025-01-20 21:09:24 +01:00
users.users.jitsi-rooms-backend = {
isSystemUser = true;
group = "jitsi-rooms-backend";
extraGroups = [ "dbus" ];
};
users.groups.jitsi-rooms-backend = { };
2025-01-19 11:16:19 +01:00
services.nginx.virtualHosts.${cfg.nginxHostname} = {
forceSSL = true;
enableACME = true;
locations = {
"/" = {
root = frontend;
tryFiles = "$uri $uri/ /index.html";
};
"/ws" = {
proxyPass = "http://${address}:${toString wsPort}";
};
};
};
services.prosody = {
extraPluginPaths = [ "${prodsodyPackage}/share" ];
extraModules = [ "jitsi_rooms" ];
};
};
}