You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

164 lines
4.6 KiB

{
inputs.nixpkgs.url = "nixpkgs";
outputs = {
self,
nixpkgs,
...
}: let
version = builtins.substring 0 7 self.lastModifiedDate;
systems = [
"x86_64-linux"
"aarch64-linux"
"x86_64-darwin"
"aarch64-darwin"
];
forAllSystems = nixpkgs.lib.genAttrs systems;
nixpkgsFor = forAllSystems (system: import nixpkgs {inherit system;});
packageFn = pkgs:
pkgs.rustPlatform.buildRustPackage {
pname = "quiclime";
inherit version;
src = builtins.path {
name = "source";
path = ./.;
};
cargoLock = {
lockFile = ./Cargo.lock;
};
separateDebugInfo = true;
};
in rec {
packages = forAllSystems (s: let
pkgs = nixpkgsFor.${s};
in rec {
quiclime = packageFn pkgs;
default = quiclime;
});
devShells = forAllSystems (s: let
pkgs = nixpkgsFor.${s};
inherit (pkgs) mkShell;
in {
default = mkShell {
packages = with pkgs; [rustc cargo rustfmt];
};
});
nixosModules = rec {
quiclime = { config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.quiclime;
in {
options = {
services.quiclime = {
enable =
mkEnableOption "Enable Quiclime relay server";
package = mkOption {
default = packages.${pkgs.system}.quiclime;
type = types.package;
defaultText = literalExpression "packages.${pkgs.system}.quiclime";
description = lib.mdDoc "Quiclime derivation to use";
};
user = mkOption {
type = types.str;
default = "quiclime";
description = lib.mdDoc "User account under which quiclime runs.";
};
group = mkOption {
type = types.str;
default = "quiclime";
description = lib.mdDoc "Group under which quiclime runs.";
};
baseDomain = mkOption {
type = types.str;
description = lib.mdDoc "The base domain for this relay.";
};
mcAddr = mkOption {
type = types.str;
default = "0.0.0.0:25565";
description = lib.mdDoc "The socket address to listen to Minecraft connections.";
};
relayAddr = mkOption {
type = types.str;
default = "0.0.0.0:25575";
description = lib.mdDoc "The socket address to listen to quiclime connections.";
};
controlAddr = mkOption {
type = types.str;
default = "127.0.0.1:25585";
description = lib.mdDoc "The socket address to listen to HTTP control messages.";
};
cert = mkOption {
type = types.str;
example = "/path/to/fullchain.pem";
description = lib.mdDoc "Path to TLS certificate to use for quiclime connections.";
};
key = mkOption {
type = types.str;
example = "/path/to/key.pem";
description = lib.mdDoc "Path to TLS key to use for quiclime connections.";
};
};
};
config = mkIf cfg.enable {
systemd.services.quiclime = {
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
description = "Quiclime relay server";
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = cfg.group;
ExecStart =
"${cfg.package}/bin/quiclime";
Restart = "on-failure";
LimitNOFILE = "infinity";
};
environment = {
QUICLIME_BASE_DOMAIN = cfg.baseDomain;
QUICLIME_BIND_ADDR_MC = cfg.mcAddr;
QUICLIME_BIND_ADDR_QUIC = cfg.relayAddr;
QUICLIME_BIND_ADDR_WEB = cfg.controlAddr;
QUICLIME_CERT_PATH = cfg.cert;
QUICLIME_KEY_PATH = cfg.key;
};
};
users.users = mkIf (cfg.user == "quiclime") {
quiclime = {
description = "Quiclime relay server";
useDefaultShell = true;
group = cfg.group;
isSystemUser = true;
};
};
users.groups = mkIf (cfg.group == "quiclime") {
quiclime = {};
};
};
};
default = quiclime;
};
};
}