blob: 265a9ea1b017ae40cf64a655f73857c20f48ac3d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
|
{
inputs = {
nixpkgs.url = "nixpkgs";
zig.url = "github:silversquirl/zig-flake";
zig.inputs.nixpkgs.follows = "nixpkgs";
};
outputs = {
self,
nixpkgs,
zig,
...
}: let
forAllSystems = f:
builtins.mapAttrs
(system: pkgs: f pkgs zig.packages.${system}.nightly)
nixpkgs.legacyPackages;
in {
devShells = forAllSystems (pkgs: zig: {
default = pkgs.mkShellNoCC {
packages = [pkgs.bash zig zig.zls];
};
});
packages = forAllSystems (pkgs: zig: {
default = zig.makePackage {
pname = "zhttpws";
version = "0.0.0";
src = ./.;
zigReleaseMode = "fast";
depsHash = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo=";
};
});
nixosModules.default = { config, lib, pkgs }:
let cfg = config.services.zhttpws;
in {
options.services.zhttpws = {
enable = lib.mkEnableOption "zhttpws";
domain = lib.mkOption {
type = lib.types.str;
};
port = lib.mkOption {
type = lib.types.port;
};
};
config = lib.mkIf cfg.enable {
systemd.services.zhttpws = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = "${self.packages.${pkgs.system}.default}/bin/zhttpws";
DynamicUser = true;
Restart = "always";
};
environment = {
PORT = toString cfg.port;
};
};
services.caddy.virtualHosts."${cfg.domain}".extraConfig = ''
reverse_proxy localhost:${toString cfg.port}
'';
};
};
};
}
|