❄️ Nix configurations
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

test new caddy build

A.Ottr d84a892b 882a399a

+54 -1
+33
nixos/common/caddy/custom-caddy.nix
··· 1 + { pkgs, config, plugins, stdenv, lib, ... }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "caddy"; 5 + # https://github.com/NixOS/nixpkgs/issues/113520 6 + version = "2.7.6"; 7 + dontUnpack = true; 8 + 9 + nativeBuildInputs = [ pkgs.git pkgs.go pkgs.xcaddy ]; 10 + 11 + configurePhase = '' 12 + export GOCACHE=$TMPDIR/go-cache 13 + export GOPATH="$TMPDIR/go" 14 + ''; 15 + 16 + buildPhase = 17 + let 18 + pluginArgs = 19 + lib.concatMapStringsSep " " (plugin: "--with ${plugin}") plugins; 20 + in 21 + '' 22 + runHook preBuild 23 + ${pkgs.xcaddy}/bin/xcaddy build "v${version}" ${pluginArgs} 24 + runHook postBuild 25 + ''; 26 + 27 + installPhase = '' 28 + runHook preInstall 29 + mkdir -p $out/bin 30 + mv caddy $out/bin 31 + runHook postInstall 32 + ''; 33 + }
+20
nixos/common/caddy/default.nix
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + services.caddy = { 7 + enable = true; 8 + package = (pkgs.callPackage ./custom-caddy.nix { 9 + plugins = [ "github.com/caddy-dns/cloudflare" ]; 10 + }); 11 + 12 + virtualHosts."localhost".extraConfig = '' 13 + respond "OK" 14 + ''; 15 + }; 16 + networking.firewall.allowedTCPPorts = [ 17 + 80 18 + 443 19 + ]; 20 + }
+1 -1
nixos/ferret/default.nix
··· 5 5 ./configuration.nix 6 6 ./hardware-configuration.nix 7 7 ./media.nix 8 - ./caddy.nix 8 + ../common/caddy 9 9 ]; 10 10 11 11 security.polkit.enable = true;