aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--flake.lock165
-rw-r--r--flake.nix2
-rw-r--r--flake/hosts.nix1
-rw-r--r--flake/overlays.nix1
-rw-r--r--infra/tf/cloudflare-dns/records.tf9
-rw-r--r--machines/nixos/x86_64-linux/do-rproxy/profiles/caddy.nix14
-rw-r--r--machines/nixos/x86_64-linux/synology-vm/default.nix1
-rw-r--r--machines/nixos/x86_64-linux/synology-vm/profiles/goget.nix7
8 files changed, 194 insertions, 6 deletions
diff --git a/flake.lock b/flake.lock
index dcd7228..9ab0425 100644
--- a/flake.lock
+++ b/flake.lock
@@ -123,6 +123,22 @@
"type": "github"
}
},
+ "flake-compat_2": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
"flake-parts": {
"inputs": {
"nixpkgs-lib": [
@@ -164,9 +180,49 @@
"type": "github"
}
},
+ "flake-utils": {
+ "inputs": {
+ "systems": "systems_2"
+ },
+ "locked": {
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
"gitignore": {
"inputs": {
"nixpkgs": [
+ "my-go-tools",
+ "pre-commit-hooks",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1709087332,
+ "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "type": "github"
+ }
+ },
+ "gitignore_2": {
+ "inputs": {
+ "nixpkgs": [
"pre-commit-hooks",
"nixpkgs"
]
@@ -227,13 +283,34 @@
"type": "github"
}
},
+ "my-go-tools": {
+ "inputs": {
+ "flake-utils": "flake-utils",
+ "nixpkgs": "nixpkgs",
+ "pre-commit-hooks": "pre-commit-hooks",
+ "treefmt-nix": "treefmt-nix"
+ },
+ "locked": {
+ "lastModified": 1756073189,
+ "narHash": "sha256-McYkeIxo1LGu6SHNeKaX91BsUr1T+OZ7gHry8wul0GI=",
+ "ref": "refs/heads/main",
+ "rev": "1072ca15a6357623b5260f951cec323635cb73e4",
+ "revCount": 7,
+ "type": "git",
+ "url": "https://code.fcuny.net/fcuny/x"
+ },
+ "original": {
+ "type": "git",
+ "url": "https://code.fcuny.net/fcuny/x"
+ }
+ },
"nixpkgs": {
"locked": {
- "lastModified": 1754689972,
- "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
+ "lastModified": 1755274400,
+ "narHash": "sha256-rTInmnp/xYrfcMZyFMH3kc8oko5zYfxsowaLv1LVobY=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
+ "rev": "ad7196ae55c295f53a7d1ec39e4a06d922f3b899",
"type": "github"
},
"original": {
@@ -275,6 +352,22 @@
"type": "github"
}
},
+ "nixpkgs_2": {
+ "locked": {
+ "lastModified": 1754689972,
+ "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "ref": "nixos-25.05",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
"nur": {
"inputs": {
"flake-parts": "flake-parts_2",
@@ -301,6 +394,29 @@
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
+ "my-go-tools",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1755446520,
+ "narHash": "sha256-I0Ok1OGDwc1jPd8cs2VvAYZsHriUVFGIUqW+7uSsOUM=",
+ "owner": "cachix",
+ "repo": "git-hooks.nix",
+ "rev": "4b04db83821b819bbbe32ed0a025b31e7971f22e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "cachix",
+ "repo": "git-hooks.nix",
+ "type": "github"
+ }
+ },
+ "pre-commit-hooks_2": {
+ "inputs": {
+ "flake-compat": "flake-compat_2",
+ "gitignore": "gitignore_2",
+ "nixpkgs": [
"nixpkgs"
]
},
@@ -326,11 +442,12 @@
"emacs-overlay": "emacs-overlay",
"flake-parts": "flake-parts",
"home-manager": "home-manager_2",
- "nixpkgs": "nixpkgs",
+ "my-go-tools": "my-go-tools",
+ "nixpkgs": "nixpkgs_2",
"nixpkgsUnstable": "nixpkgsUnstable",
"nur": "nur",
- "pre-commit-hooks": "pre-commit-hooks",
- "treefmt-nix": "treefmt-nix"
+ "pre-commit-hooks": "pre-commit-hooks_2",
+ "treefmt-nix": "treefmt-nix_2"
}
},
"systems": {
@@ -348,9 +465,45 @@
"type": "github"
}
},
+ "systems_2": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
"treefmt-nix": {
"inputs": {
"nixpkgs": [
+ "my-go-tools",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1754847726,
+ "narHash": "sha256-2vX8QjO5lRsDbNYvN9hVHXLU6oMl+V/PsmIiJREG4rE=",
+ "owner": "numtide",
+ "repo": "treefmt-nix",
+ "rev": "7d81f6fb2e19bf84f1c65135d1060d829fae2408",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "treefmt-nix",
+ "type": "github"
+ }
+ },
+ "treefmt-nix_2": {
+ "inputs": {
+ "nixpkgs": [
"nixpkgs"
]
},
diff --git a/flake.nix b/flake.nix
index eb12b3d..b888ff5 100644
--- a/flake.nix
+++ b/flake.nix
@@ -50,6 +50,8 @@
url = "github:hercules-ci/flake-parts";
inputs.nixpkgs-lib.follows = "nixpkgs";
};
+
+ my-go-tools.url = "git+https://code.fcuny.net/fcuny/x";
};
outputs =
diff --git a/flake/hosts.nix b/flake/hosts.nix
index f053c88..3ae840e 100644
--- a/flake/hosts.nix
+++ b/flake/hosts.nix
@@ -159,6 +159,7 @@ let
++ defaultModules
++ [
hostconf
+ inputs.my-go-tools.nixosModules.default
];
}
);
diff --git a/flake/overlays.nix b/flake/overlays.nix
index 504fdfd..1eecfcf 100644
--- a/flake/overlays.nix
+++ b/flake/overlays.nix
@@ -16,6 +16,7 @@
inputs.agenix.overlays.default
inputs.emacs-overlay.overlay
inputs.nur.overlays.default
+ inputs.my-go-tools.overlays.default
self.overlays.default
];
};
diff --git a/infra/tf/cloudflare-dns/records.tf b/infra/tf/cloudflare-dns/records.tf
index 737fec8..a282e2f 100644
--- a/infra/tf/cloudflare-dns/records.tf
+++ b/infra/tf/cloudflare-dns/records.tf
@@ -43,6 +43,15 @@ resource "cloudflare_dns_record" "cname_code" {
zone_id = var.zone_id
}
+resource "cloudflare_dns_record" "cname_go" {
+ content = "165.232.158.110"
+ name = "go.fcuny.net"
+ proxied = false
+ ttl = 1
+ type = "A"
+ zone_id = var.zone_id
+}
+
resource "cloudflare_dns_record" "cname_id" {
content = "165.232.158.110"
name = "id.fcuny.net"
diff --git a/machines/nixos/x86_64-linux/do-rproxy/profiles/caddy.nix b/machines/nixos/x86_64-linux/do-rproxy/profiles/caddy.nix
index d426a53..c39a1ec 100644
--- a/machines/nixos/x86_64-linux/do-rproxy/profiles/caddy.nix
+++ b/machines/nixos/x86_64-linux/do-rproxy/profiles/caddy.nix
@@ -16,6 +16,13 @@
reloadServices = [ "caddy.service" ];
credentialFiles.CF_DNS_API_TOKEN_FILE = config.age.secrets."cloudflare-caddy".path;
};
+ "go.fcuny.net" = {
+ domain = "go.fcuny.net";
+ dnsProvider = "cloudflare";
+ dnsResolver = "1.1.1.1";
+ reloadServices = [ "caddy.service" ];
+ credentialFiles.CF_DNS_API_TOKEN_FILE = config.age.secrets."cloudflare-caddy".path;
+ };
"id.fcuny.net" = {
domain = "id.fcuny.net";
dnsProvider = "cloudflare";
@@ -46,6 +53,13 @@
reverse_proxy 10.100.0.40:3000
'';
};
+ go = {
+ hostName = "go.fcuny.net";
+ useACMEHost = "go.fcuny.net";
+ extraConfig = ''
+ reverse_proxy 10.100.0.40:8070
+ '';
+ };
auth = {
hostName = "id.fcuny.net";
useACMEHost = "id.fcuny.net";
diff --git a/machines/nixos/x86_64-linux/synology-vm/default.nix b/machines/nixos/x86_64-linux/synology-vm/default.nix
index de0f5e9..9316432 100644
--- a/machines/nixos/x86_64-linux/synology-vm/default.nix
+++ b/machines/nixos/x86_64-linux/synology-vm/default.nix
@@ -30,6 +30,7 @@
"${self}/profiles/programs/fish.nix"
./profiles/forgejo.nix
./profiles/keycloak.nix
+ ./profiles/goget.nix
];
boot.loader.efi.canTouchEfiVariables = true;
diff --git a/machines/nixos/x86_64-linux/synology-vm/profiles/goget.nix b/machines/nixos/x86_64-linux/synology-vm/profiles/goget.nix
new file mode 100644
index 0000000..ac32e62
--- /dev/null
+++ b/machines/nixos/x86_64-linux/synology-vm/profiles/goget.nix
@@ -0,0 +1,7 @@
+{ ... }:
+{
+ services.goget = {
+ enable = true;
+ openFirewall = true;
+ };
+}