mirror of
https://github.com/nmasur/dotfiles
synced 2025-04-28 19:22:24 +00:00
Compare commits
6 Commits
1b7e4687e4
...
8dde578676
Author | SHA1 | Date | |
---|---|---|---|
|
8dde578676 | ||
|
5e1534451d | ||
|
c4a1c7564c | ||
|
0de2c429f2 | ||
|
eb6b72a25c | ||
|
0618fc3962 |
3
.github/workflows/arrow.yml
vendored
3
.github/workflows/arrow.yml
vendored
@ -1,5 +1,7 @@
|
|||||||
name: Arrow
|
name: Arrow
|
||||||
|
|
||||||
|
run-name: Arrow - ${{ inputs.rebuild && 'Rebuild and ' || '' }}${{ inputs.action == 'create' && 'Create' || ( ${{ inputs.action == 'destroy' && 'Destroy' || 'No Action' ) }}
|
||||||
|
|
||||||
env:
|
env:
|
||||||
TERRAFORM_DIRECTORY: hosts/arrow
|
TERRAFORM_DIRECTORY: hosts/arrow
|
||||||
DEPLOY_IDENTITY_BASE64: ${{ secrets.DEPLOY_IDENTITY_BASE64 }}
|
DEPLOY_IDENTITY_BASE64: ${{ secrets.DEPLOY_IDENTITY_BASE64 }}
|
||||||
@ -24,6 +26,7 @@ on:
|
|||||||
options:
|
options:
|
||||||
- create
|
- create
|
||||||
- destroy
|
- destroy
|
||||||
|
- nothing
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build-deploy:
|
build-deploy:
|
||||||
|
@ -3,7 +3,6 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./chiaki.nix
|
./chiaki.nix
|
||||||
./dwarf-fortress.nix
|
./dwarf-fortress.nix
|
||||||
./leagueoflegends.nix
|
|
||||||
./legendary.nix
|
./legendary.nix
|
||||||
./lutris.nix
|
./lutris.nix
|
||||||
./minecraft-server.nix
|
./minecraft-server.nix
|
||||||
|
@ -1,32 +0,0 @@
|
|||||||
{ config, pkgs, lib, ... }: {
|
|
||||||
|
|
||||||
options.gaming.leagueoflegends.enable =
|
|
||||||
lib.mkEnableOption "League of Legends";
|
|
||||||
|
|
||||||
config =
|
|
||||||
lib.mkIf (config.gaming.leagueoflegends.enable && pkgs.stdenv.isLinux) {
|
|
||||||
|
|
||||||
# League of Legends anti-cheat requirement
|
|
||||||
boot.kernel.sysctl = { "abi.vsyscall32" = 0; };
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
|
||||||
|
|
||||||
# Lutris requirement to install the game
|
|
||||||
lutris
|
|
||||||
amdvlk
|
|
||||||
wineWowPackages.stable
|
|
||||||
# vulkan-tools
|
|
||||||
|
|
||||||
# Required according to https://lutris.net/games/league-of-legends/
|
|
||||||
openssl
|
|
||||||
gnome.zenity
|
|
||||||
|
|
||||||
# Don't remember if this is required
|
|
||||||
dconf
|
|
||||||
|
|
||||||
];
|
|
||||||
|
|
||||||
environment.sessionVariables = { QT_X11_NO_MITSHM = "1"; };
|
|
||||||
|
|
||||||
};
|
|
||||||
}
|
|
@ -98,52 +98,56 @@ in {
|
|||||||
services.transmission.settings.rpc-whitelist =
|
services.transmission.settings.rpc-whitelist =
|
||||||
builtins.concatStringsSep "," ([ "127.0.0.1" ] ++ cloudflareIpRanges);
|
builtins.concatStringsSep "," ([ "127.0.0.1" ] ++ cloudflareIpRanges);
|
||||||
|
|
||||||
services.cloudflare-dyndns = {
|
services.cloudflare-dyndns = lib.mkIf
|
||||||
enable = true;
|
((builtins.length config.services.cloudflare-dyndns.domains) > 0) {
|
||||||
proxied = true;
|
enable = true;
|
||||||
deleteMissing = true;
|
proxied = true;
|
||||||
apiTokenFile = config.secrets.cloudflare-api.dest;
|
deleteMissing = true;
|
||||||
};
|
apiTokenFile = config.secrets.cloudflare-api.dest;
|
||||||
|
};
|
||||||
|
|
||||||
# Wait for secret to exist
|
# Wait for secret to exist to start
|
||||||
systemd.services.cloudflare-dyndns = {
|
systemd.services.cloudflare-dyndns =
|
||||||
after = [ "cloudflare-api-secret.service" ];
|
lib.mkIf config.services.cloudflare-dyndns.enable {
|
||||||
requires = [ "cloudflare-api-secret.service" ];
|
after = [ "cloudflare-api-secret.service" ];
|
||||||
};
|
requires = [ "cloudflare-api-secret.service" ];
|
||||||
|
};
|
||||||
|
|
||||||
# Run a second copy of dyn-dns for non-proxied domains
|
# Run a second copy of dyn-dns for non-proxied domains
|
||||||
# Adapted from: https://github.com/NixOS/nixpkgs/blob/nixos-unstable/nixos/modules/services/networking/cloudflare-dyndns.nix
|
# Adapted from: https://github.com/NixOS/nixpkgs/blob/nixos-unstable/nixos/modules/services/networking/cloudflare-dyndns.nix
|
||||||
systemd.services.cloudflare-dyndns-noproxy = {
|
systemd.services.cloudflare-dyndns-noproxy =
|
||||||
description = "CloudFlare Dynamic DNS Client (no proxy)";
|
lib.mkIf ((builtins.length config.cloudflare.noProxyDomains) > 0) {
|
||||||
after = [ "network.target" "cloudflare-api-secret.service" ];
|
description = "CloudFlare Dynamic DNS Client (no proxy)";
|
||||||
requires = [ "cloudflare-api-secret.service" ];
|
after = [ "network.target" "cloudflare-api-secret.service" ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
requires = [ "cloudflare-api-secret.service" ];
|
||||||
startAt = "*:0/5";
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
startAt = "*:0/5";
|
||||||
|
|
||||||
environment = {
|
environment = {
|
||||||
CLOUDFLARE_DOMAINS = toString config.cloudflare.noProxyDomains;
|
CLOUDFLARE_DOMAINS = toString config.cloudflare.noProxyDomains;
|
||||||
};
|
};
|
||||||
|
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
DynamicUser = true;
|
DynamicUser = true;
|
||||||
StateDirectory = "cloudflare-dyndns-noproxy";
|
StateDirectory = "cloudflare-dyndns-noproxy";
|
||||||
EnvironmentFile = config.services.cloudflare-dyndns.apiTokenFile;
|
EnvironmentFile = config.services.cloudflare-dyndns.apiTokenFile;
|
||||||
ExecStart = let
|
ExecStart = let
|
||||||
args = [ "--cache-file /var/lib/cloudflare-dyndns-noproxy/ip.cache" ]
|
args =
|
||||||
++ (if config.services.cloudflare-dyndns.ipv4 then
|
[ "--cache-file /var/lib/cloudflare-dyndns-noproxy/ip.cache" ]
|
||||||
[ "-4" ]
|
++ (if config.services.cloudflare-dyndns.ipv4 then
|
||||||
else
|
[ "-4" ]
|
||||||
[ "-no-4" ]) ++ (if config.services.cloudflare-dyndns.ipv6 then
|
|
||||||
[ "-6" ]
|
|
||||||
else
|
else
|
||||||
[ "-no-6" ])
|
[ "-no-4" ]) ++ (if config.services.cloudflare-dyndns.ipv6 then
|
||||||
++ lib.optional config.services.cloudflare-dyndns.deleteMissing
|
[ "-6" ]
|
||||||
"--delete-missing";
|
else
|
||||||
|
[ "-no-6" ])
|
||||||
|
++ lib.optional config.services.cloudflare-dyndns.deleteMissing
|
||||||
|
"--delete-missing";
|
||||||
|
|
||||||
in "${pkgs.cloudflare-dyndns}/bin/cloudflare-dyndns ${toString args}";
|
in "${pkgs.cloudflare-dyndns}/bin/cloudflare-dyndns ${toString args}";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -4,7 +4,10 @@
|
|||||||
systemd.services.wait-for-identity = {
|
systemd.services.wait-for-identity = {
|
||||||
description = "Wait until identity file exists on the machine";
|
description = "Wait until identity file exists on the machine";
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
serviceConfig = { Type = "oneshot"; };
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
};
|
||||||
script = ''
|
script = ''
|
||||||
for i in $(seq 1 10); do
|
for i in $(seq 1 10); do
|
||||||
if [ -f ${config.identityFile} ]; then
|
if [ -f ${config.identityFile} ]; then
|
||||||
|
@ -68,7 +68,8 @@
|
|||||||
|
|
||||||
description = "Decrypt secret for ${name}";
|
description = "Decrypt secret for ${name}";
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
requires = [ "wait-for-identity.service" ];
|
bindsTo = [ "wait-for-identity.service" ];
|
||||||
|
after = [ "wait-for-identity.service" ];
|
||||||
serviceConfig.Type = "oneshot";
|
serviceConfig.Type = "oneshot";
|
||||||
script = ''
|
script = ''
|
||||||
echo "${attrs.prefix}$(
|
echo "${attrs.prefix}$(
|
||||||
|
@ -40,15 +40,15 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
# Create reverse proxy for web UI
|
# Create reverse proxy for web UI
|
||||||
caddy.routes = lib.mkAfter [{
|
caddy.routes = let
|
||||||
group =
|
# Set if the download domain is the same as the Transmission domain
|
||||||
if (config.hostnames.download == config.hostnames.transmission) then
|
useDownloadDomain = config.hostnames.download
|
||||||
"download"
|
== config.hostnames.transmission;
|
||||||
else
|
in lib.mkAfter [{
|
||||||
"transmission";
|
group = if useDownloadDomain then "download" else "transmission";
|
||||||
match = [{
|
match = [{
|
||||||
host = [ config.hostnames.transmission ];
|
host = [ config.hostnames.transmission ];
|
||||||
path = [ "/transmission*" ];
|
path = if useDownloadDomain then [ "/transmission*" ] else null;
|
||||||
}];
|
}];
|
||||||
handle = [{
|
handle = [{
|
||||||
handler = "reverse_proxy";
|
handler = "reverse_proxy";
|
||||||
|
Loading…
x
Reference in New Issue
Block a user