From 1ade38b4f46d4cf14c36dc5879d968610feea852 Mon Sep 17 00:00:00 2001 From: Skye Date: Sat, 15 Jul 2023 14:19:21 +0900 Subject: [PATCH] feat(nix): flakes --- flake.lock | 24 ++++++++ flake.nix | 157 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 181 insertions(+) create mode 100644 flake.lock create mode 100644 flake.nix diff --git a/flake.lock b/flake.lock new file mode 100644 index 0000000..53305a3 --- /dev/null +++ b/flake.lock @@ -0,0 +1,24 @@ +{ + "nodes": { + "nixpkgs": { + "locked": { + "lastModified": 1688939073, + "narHash": "sha256-jYhYjeK5s6k8QS3i+ovq9VZqBJaWbxm7awTKNhHL9d0=", + "path": "/nix/store/qfzj4dl08yww1j5dplacf6przdmccc7s-source", + "rev": "8df7a67abaf8aefc8a2839e0b48f92fdcf69a38b", + "type": "path" + }, + "original": { + "id": "nixpkgs", + "type": "indirect" + } + }, + "root": { + "inputs": { + "nixpkgs": "nixpkgs" + } + } + }, + "root": "root", + "version": 7 +} diff --git a/flake.nix b/flake.nix new file mode 100644 index 0000000..30d2460 --- /dev/null +++ b/flake.nix @@ -0,0 +1,157 @@ +{ + inputs.nixpkgs.url = "nixpkgs"; + + outputs = { + self, + nixpkgs, + ... + }: let + version = builtins.substring 0 7 self.lastModifiedDate; + + systems = [ + "x86_64-linux" + "aarch64-linux" + "x86_64-darwin" + "aarch64-darwin" + ]; + + forAllSystems = nixpkgs.lib.genAttrs systems; + nixpkgsFor = forAllSystems (system: import nixpkgs {inherit system;}); + + packageFn = pkgs: + pkgs.rustPlatform.buildRustPackage { + pname = "quiclime"; + inherit version; + + src = builtins.path { + name = "source"; + path = ./.; + }; + + cargoSha256 = "sha256-pc3uVPimdjygDHEludRByy7mbXJr//rCf7OfrsW+hDk="; + }; + in rec { + packages = forAllSystems (s: let + pkgs = nixpkgsFor.${s}; + in rec { + quiclime = packageFn pkgs; + default = quiclime; + }); + + devShells = forAllSystems (s: let + pkgs = nixpkgsFor.${s}; + inherit (pkgs) mkShell; + in { + default = mkShell { + packages = with pkgs; [rustc cargo rustfmt]; + }; + }); + + nixosModules = rec { + quiclime = { config, lib, pkgs, ... }: + with lib; + let + cfg = config.services.quiclime; + in { + options = { + services.quiclime = { + enable = + mkEnableOption "Enable Quiclime relay server"; + + package = mkOption { + default = packages.${pkgs.system}.quiclime; + type = types.package; + defaultText = literalExpression "packages.${pkgs.system}.quiclime"; + description = lib.mdDoc "Quiclime derivation to use"; + }; + + user = mkOption { + type = types.str; + default = "quiclime"; + description = lib.mdDoc "User account under which quiclime runs."; + }; + + group = mkOption { + type = types.str; + default = "quiclime"; + description = lib.mdDoc "Group under which quiclime runs."; + }; + + baseDomain = mkOption { + type = types.str; + description = lib.mdDoc "The base domain for this relay."; + }; + + mcAddr = mkOption { + type = types.str; + default = "0.0.0.0:25565"; + description = lib.mdDoc "The socket address to listen to Minecraft connections."; + }; + + relayAddr = mkOption { + type = types.str; + default = "0.0.0.0:25575"; + description = lib.mdDoc "The socket address to listen to quiclime connections."; + }; + + controlAddr = mkOption { + type = types.str; + default = "127.0.0.1:25585"; + description = lib.mdDoc "The socket address to listen to HTTP control messages."; + }; + + cert = mkOption { + type = types.str; + example = "/path/to/fullchain.pem"; + description = lib.mdDoc "Path to TLS certificate to use for quiclime connections."; + }; + + key = mkOption { + type = types.str; + example = "/path/to/key.pem"; + description = lib.mdDoc "Path to TLS key to use for quiclime connections."; + }; + }; + }; + + config = mkIf cfg.enable { + systemd.services.quiclime = { + wantedBy = [ "multi-user.target" ]; + after = [ "network-online.target" ]; + description = "Quiclime relay server"; + serviceConfig = { + Type = "simple"; + User = cfg.user; + Group = cfg.group; + ExecStart = + "${cfg.package}/bin/quiclime"; + }; + + environment = { + QUICLIME_BASE_DOMAIN = cfg.baseDomain; + QUICLIME_BIND_ADDR_MC = cfg.mcAddr; + QUICLIME_BIND_ADDR_QUIC = cfg.relayAddr; + QUICLIME_BIND_ADDR_WEB = cfg.controlAddr; + QUICLIME_CERT_PATH = cfg.cert; + QUICLIME_KEY_PATH = cfg.key; + }; + }; + + users.users = mkIf (cfg.user == "quiclime") { + quiclime = { + description = "Quiclime relay server"; + useDefaultShell = true; + group = cfg.group; + isSystemUser = true; + }; + }; + + users.groups = mkIf (cfg.group == "quiclime") { + quiclime = {}; + }; + }; + }; + default = quiclime; + }; + }; +} \ No newline at end of file