From 6697a293ae5d678cceaec2e3f4488196af936634 Mon Sep 17 00:00:00 2001 From: Ashelyn Rose Date: Sun, 28 May 2023 18:15:56 -0600 Subject: Nix flake config --- flake.nix | 154 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 154 insertions(+) create mode 100644 flake.nix (limited to 'flake.nix') diff --git a/flake.nix b/flake.nix new file mode 100644 index 0000000..a5d6c53 --- /dev/null +++ b/flake.nix @@ -0,0 +1,154 @@ +{ + inputs = { + utils.url = "github:numtide/flake-utils"; + nixpkgs.url = "github:NixOS/nixpkgs/master"; + nix-filter.url = "github:numtide/nix-filter"; + }; + + outputs = { + self, + nixpkgs, + utils, + nix-filter, + }: + utils.lib.eachDefaultSystem + (system: let + pkgs = import nixpkgs { + inherit system; + }; + + filter = nix-filter.lib; + + nodejs = pkgs.nodejs-18_x; + + node_modules = pkgs.stdenv.mkDerivation { + name = "node_modules"; + + src = filter { + root = ./.; + include = [ + ./package.json + ./package-lock.json + ]; + }; + + __noChroot = true; + + configurePhase = '' + export HOME=$TMP + ''; + + buildInputs = [ nodejs ]; + + buildPhase = '' + ${nodejs}/bin/npm ci + ''; + + installPhase = '' + mkdir $out + mv node_modules $out/node_modules + ''; + }; + in { + packages = { + + default = pkgs.stdenv.mkDerivation { + name = "tempest.dev"; + + src = filter { + root = ./.; + exclude = [ + ./.next + ./node_modules + ]; + }; + + nativeBuildInputs = [ nodejs ]; + + buildPhase = ''npm run build''; + + configurePhase = '' + ln -sf ${node_modules}/node_modules node_modules + export HOME=$TMP + ''; + + installPhase = '' + # Use the standalone nextjs version + mv .next/standalone $out + + # Copy non-generated static files + if [ -d "public" ]; then + cp -R public $out/public + fi + + # Also copy generated static files + mv .next/static $out/.next/static + + # Re-link the node_modules + rm $out/node_modules + mv node_modules $out/node_modules + + # Link cache directory + ln -s /tmp $out/.next/cache + + # Wrap the script + cat < $out/entrypoint + #!${pkgs.stdenv.shell} + exec "$(type -p node)" "$out/server.js" "$$@" + ENTRYPOINT + chmod +x $out/entrypoint + ''; + }; + }; + }) // { + nixosModule = {config, lib, pkgs, ...}: + with lib; + let cfg = config.ashe.services."tempest.dev"; + + in { + options.ashe.services."tempest.dev" = { + enable = mkEnableOption "Enables the tempest.dev HTTP service"; + + port = mkOption rec { + type = types.int; + default = 8000; + example = default; + description = "The port for this service to listen on"; + + }; + + domain = mkOption rec { + type = types.str; + default = "tempest.dev"; + example = default; + description = "The domain name for tempest.dev"; + }; + }; + + config = mkIf cfg.enable { + systemd.services."ashe.tempest.dev" = { + wantedBy = [ "multi-user.target" ]; + + serviceConfig = let pkg = self.packages.${pkgs.system}.default; + in { + Restart = "on-failure"; + ExecStart = "${pkg}/entrypoint"; + DynamicUser = "yes"; + PrivateTmp = "yes"; + Environment = [ + "PORT=${toString cfg.port}" + ]; + }; + }; + + services.nginx.virtualHosts.${cfg.domain} = { + locations."/" = { proxyPass = "http://127.0.0.1:${toString cfg.port}"; }; + forceSSL = true; + enableACME = true; + }; + }; + }; + + + }; +} -- cgit 1.4.1