new service! amdl

This commit is contained in:
Reid 2025-05-19 01:15:21 -07:00
parent 5c7720f462
commit 66ccec0f2c
Signed by: reidlab
GPG key ID: DAF5EAF6665839FD
11 changed files with 138 additions and 14 deletions

View file

@ -6,6 +6,12 @@ nix flake config! this is just used on my personal server at the moment
this flake is built for a multi-user experience per host, enforced by [`modules/users.nix`](./modules/users.nix), and found in the `default.nix` file for each host.
## secrets
run `rg /etc/secrets/` to see where you need to add secret files when deploying on new systems
unfortunately, as a consequence of this secret method, you need to do impure builds
## todo
- find a better way to do cloudflare ips

View file

@ -8,6 +8,7 @@ in {
imports =
[
inputs.home-manager.nixosModules.home-manager
inputs.amdl.nixosModules.default
inputs.vscode-server.nixosModules.default
]
++ (mapModulesRec' (toString ./modules) import);

59
flake.lock generated Executable file → Normal file
View file

@ -1,8 +1,27 @@
{
"nodes": {
"amdl": {
"inputs": {
"nixpkgs": "nixpkgs",
"systems": "systems"
},
"locked": {
"lastModified": 1747705427,
"narHash": "sha256-h2cyRLeBwIhtjkkrmDUkPYpY4i3CwkWh7D1M5U9TblY=",
"ref": "refs/heads/main",
"rev": "4893de0d2878a4161cb72c1adea7d70e7530c66c",
"revCount": 12,
"type": "git",
"url": "https://git.reidlab.pink/reidlab/amdl.git"
},
"original": {
"type": "git",
"url": "https://git.reidlab.pink/reidlab/amdl.git"
}
},
"flake-utils": {
"inputs": {
"systems": "systems"
"systems": "systems_2"
},
"locked": {
"lastModified": 1681202837,
@ -54,6 +73,22 @@
}
},
"nixpkgs": {
"locked": {
"lastModified": 1739866667,
"narHash": "sha256-EO1ygNKZlsAC9avfcwHkKGMsmipUk1Uc0TbrEZpkn64=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "73cf49b8ad837ade2de76f87eb53fc85ed5d4680",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1742422364,
"narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=",
@ -69,7 +104,7 @@
"type": "github"
}
},
"nixpkgs_2": {
"nixpkgs_3": {
"locked": {
"lastModified": 1682134069,
"narHash": "sha256-TnI/ZXSmRxQDt2sjRYK/8j8iha4B4zP2cnQCZZ3vp7k=",
@ -85,13 +120,29 @@
},
"root": {
"inputs": {
"amdl": "amdl",
"hardware": "hardware",
"home-manager": "home-manager",
"nixpkgs": "nixpkgs",
"nixpkgs": "nixpkgs_2",
"vscode-server": "vscode-server"
}
},
"systems": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
@ -109,7 +160,7 @@
"vscode-server": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": "nixpkgs_2"
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1729422940,

View file

@ -9,6 +9,8 @@
hardware.url = "github:nixos/nixos-hardware";
amdl.url = "git+https://git.reidlab.pink/reidlab/amdl.git";
vscode-server.url = "github:nix-community/nixos-vscode-server";
};
@ -21,7 +23,7 @@
import pkgs {
inherit system;
config.allowUnfree = true;
config.allowAliases = false;
config.allowAliases = true;
overlays = extraOverlays ++ (lib.attrValues self.overlays);
};
pkgs = mkPkgs nixpkgs [ self.overlays.default ];

View file

@ -30,6 +30,11 @@ in {
enable = true;
domain = "grafana.reidlab.pink";
};
amdl = {
enable = true;
domain = "amdl.reidlab.pink";
};
};
};
@ -40,6 +45,7 @@ in {
add_header Access-Control-Allow-Origin "*";
'';
# TODO: we should perhaps add something to help with this in staticSites?
# just seems a little redundant if we get more pages like this
extraConfig = ''
error_page 404 /404.html;
'';

44
modules/services/amdl.nix Normal file
View file

@ -0,0 +1,44 @@
{ config, lib, pkgs, options, ... }:
with lib;
let
cfg = config.modules.services.amdl;
in {
options.modules.services.amdl = {
enable = mkEnableOption "enable amdl, an apple music download server";
port = mkOption {
type = types.int;
default = 3001;
};
domain = mkOption {
type = types.str;
default = "amdl.reidlab.pink";
};
};
config = mkIf cfg.enable {
services.amdl = {
enable = true;
stateDir = "/var/lib/${cfg.domain}";
config = {
server = {
port = cfg.port;
};
};
env = {
MEDIA_USER_TOKEN = lib.removeSuffix "\n" (builtins.readFile /etc/secrets/amdl/media_user_token);
WIDEVINE_CLIENT_ID = lib.removeSuffix "\n" (builtins.readFile /etc/secrets/amdl/widevine_client_id);
WIDEVINE_PRIVATE_KEY = lib.removeSuffix "\n" (builtins.readFile /etc/secrets/amdl/widevine_private_key);
};
};
services.nginx.virtualHosts."${cfg.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.port}";
};
};
};
}

View file

@ -6,6 +6,10 @@ let
in {
options.modules.services.forgejo = {
enable = mkEnableOption "enable forgejo, a lightweight git server";
port = mkOption {
type = types.int;
default = 3000;
};
domain = mkOption {
type = types.str;
default = "git.reidlab.pink";
@ -26,6 +30,7 @@ in {
INSTALL_LOCK = true;
PASSWORD_HASH_ALGO = "argon2";
PASSWORD_CHECK_PWN = true;
REVERSE_PROXY_TRUSTED_PROXIES = "127.0.0.0/8,::1/128";
};
"ui.meta" = {
AUTHOR = "reidlab";
@ -33,7 +38,8 @@ in {
};
"server" = {
DOMAIN = cfg.domain;
PROTOCOL = "http+unix";
PROTOCOL = "http";
HTTP_PORT = cfg.port;
ROOT_URL = "https://${cfg.domain}/";
};
"repository" = {
@ -60,7 +66,7 @@ in {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://unix:${config.services.forgejo.settings.server.HTTP_ADDR}";
proxyPass = "http://127.0.0.1:${toString cfg.port}";
extraConfig = ''
client_max_body_size 512M;
'';

View file

@ -16,15 +16,15 @@ in {
};
grafanaPort = mkOption {
type = types.int;
default = 3000;
default = 2000;
};
promtailPort = mkOption {
type = types.int;
default = 3001;
default = 2001;
};
lokiPort = mkOption {
type = types.int;
default = 3002;
default = 2002;
};
prometheusPort = mkOption {
type = types.int;

View file

@ -5,10 +5,7 @@ let
cfg = config.modules.services.mysql;
in {
options.modules.services.mysql = {
enable = mkOption {
type = types.bool;
default = false;
};
enable = mkEnableOption "enable mysql, a relational database management system";
};
config = mkIf cfg.enable {

View file

@ -6,6 +6,14 @@ let
in {
options.modules.services.nginx-config = {
enable = mkEnableOption "enable and configure nginx, a high performance web server";
port = mkOption {
type = types.int;
default = 80;
};
sslPort = mkOption {
type = types.int;
default = 443;
};
};
config = mkIf cfg.enable {
@ -19,6 +27,9 @@ in {
services.nginx = {
enable = true;
defaultHTTPListenPort = cfg.port;
defaultSSLListenPort = cfg.sslPort;
recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedGzipSettings = true;

0
packages/.gitkeep Executable file → Normal file
View file