2016-06-25 16:56:39 +00:00
|
|
|
{ config, lib, pkgs, ...}:
|
|
|
|
|
|
|
|
{
|
|
|
|
# generate private key with:
|
|
|
|
# nix-store --generate-binary-cache-key my-secret-key my-public-key
|
|
|
|
services.nix-serve = {
|
|
|
|
enable = true;
|
|
|
|
secretKeyFile = config.krebs.secret.files.nix-serve-key.path;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.nix-serve = {
|
|
|
|
requires = ["secret.service"];
|
|
|
|
after = ["secret.service"];
|
|
|
|
};
|
|
|
|
krebs.secret.files.nix-serve-key = {
|
|
|
|
path = "/run/secret/nix-serve.key";
|
|
|
|
owner.name = "nix-serve";
|
|
|
|
source-path = toString <secrets> + "/nix-serve.key";
|
|
|
|
};
|
2016-12-26 13:18:08 +00:00
|
|
|
services.nginx = {
|
2016-06-25 16:56:39 +00:00
|
|
|
enable = true;
|
2016-12-26 13:18:08 +00:00
|
|
|
virtualHosts.nix-serve = {
|
2018-11-10 20:45:52 +00:00
|
|
|
serverAliases = [ "cache.prism.r" "cache.krebsco.de" "cache.lassul.us" ];
|
2016-12-26 13:18:08 +00:00
|
|
|
locations."/".extraConfig = ''
|
2016-06-25 16:56:39 +00:00
|
|
|
proxy_pass http://localhost:${toString config.services.nix-serve.port};
|
2016-12-26 13:18:08 +00:00
|
|
|
'';
|
2016-06-25 16:56:39 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|