feat(nix): flakes

This commit is contained in:
Skye 2023-07-15 14:19:21 +09:00
parent a560699787
commit 1ade38b4f4
Signed by: me
GPG key ID: 0104BC05F41B77B8
2 changed files with 181 additions and 0 deletions

24
flake.lock Normal file
View file

@ -0,0 +1,24 @@
{
"nodes": {
"nixpkgs": {
"locked": {
"lastModified": 1688939073,
"narHash": "sha256-jYhYjeK5s6k8QS3i+ovq9VZqBJaWbxm7awTKNhHL9d0=",
"path": "/nix/store/qfzj4dl08yww1j5dplacf6przdmccc7s-source",
"rev": "8df7a67abaf8aefc8a2839e0b48f92fdcf69a38b",
"type": "path"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"root": {
"inputs": {
"nixpkgs": "nixpkgs"
}
}
},
"root": "root",
"version": 7
}

157
flake.nix Normal file
View file

@ -0,0 +1,157 @@
{
inputs.nixpkgs.url = "nixpkgs";
outputs = {
self,
nixpkgs,
...
}: let
version = builtins.substring 0 7 self.lastModifiedDate;
systems = [
"x86_64-linux"
"aarch64-linux"
"x86_64-darwin"
"aarch64-darwin"
];
forAllSystems = nixpkgs.lib.genAttrs systems;
nixpkgsFor = forAllSystems (system: import nixpkgs {inherit system;});
packageFn = pkgs:
pkgs.rustPlatform.buildRustPackage {
pname = "quiclime";
inherit version;
src = builtins.path {
name = "source";
path = ./.;
};
cargoSha256 = "sha256-pc3uVPimdjygDHEludRByy7mbXJr//rCf7OfrsW+hDk=";
};
in rec {
packages = forAllSystems (s: let
pkgs = nixpkgsFor.${s};
in rec {
quiclime = packageFn pkgs;
default = quiclime;
});
devShells = forAllSystems (s: let
pkgs = nixpkgsFor.${s};
inherit (pkgs) mkShell;
in {
default = mkShell {
packages = with pkgs; [rustc cargo rustfmt];
};
});
nixosModules = rec {
quiclime = { config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.quiclime;
in {
options = {
services.quiclime = {
enable =
mkEnableOption "Enable Quiclime relay server";
package = mkOption {
default = packages.${pkgs.system}.quiclime;
type = types.package;
defaultText = literalExpression "packages.${pkgs.system}.quiclime";
description = lib.mdDoc "Quiclime derivation to use";
};
user = mkOption {
type = types.str;
default = "quiclime";
description = lib.mdDoc "User account under which quiclime runs.";
};
group = mkOption {
type = types.str;
default = "quiclime";
description = lib.mdDoc "Group under which quiclime runs.";
};
baseDomain = mkOption {
type = types.str;
description = lib.mdDoc "The base domain for this relay.";
};
mcAddr = mkOption {
type = types.str;
default = "0.0.0.0:25565";
description = lib.mdDoc "The socket address to listen to Minecraft connections.";
};
relayAddr = mkOption {
type = types.str;
default = "0.0.0.0:25575";
description = lib.mdDoc "The socket address to listen to quiclime connections.";
};
controlAddr = mkOption {
type = types.str;
default = "127.0.0.1:25585";
description = lib.mdDoc "The socket address to listen to HTTP control messages.";
};
cert = mkOption {
type = types.str;
example = "/path/to/fullchain.pem";
description = lib.mdDoc "Path to TLS certificate to use for quiclime connections.";
};
key = mkOption {
type = types.str;
example = "/path/to/key.pem";
description = lib.mdDoc "Path to TLS key to use for quiclime connections.";
};
};
};
config = mkIf cfg.enable {
systemd.services.quiclime = {
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
description = "Quiclime relay server";
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = cfg.group;
ExecStart =
"${cfg.package}/bin/quiclime";
};
environment = {
QUICLIME_BASE_DOMAIN = cfg.baseDomain;
QUICLIME_BIND_ADDR_MC = cfg.mcAddr;
QUICLIME_BIND_ADDR_QUIC = cfg.relayAddr;
QUICLIME_BIND_ADDR_WEB = cfg.controlAddr;
QUICLIME_CERT_PATH = cfg.cert;
QUICLIME_KEY_PATH = cfg.key;
};
};
users.users = mkIf (cfg.user == "quiclime") {
quiclime = {
description = "Quiclime relay server";
useDefaultShell = true;
group = cfg.group;
isSystemUser = true;
};
};
users.groups = mkIf (cfg.group == "quiclime") {
quiclime = {};
};
};
};
default = quiclime;
};
};
}