- New unified flake with two nixpkgs channels (unstable for desktops, 25.11 for muffin)
- modules/common-{doas,shell-fish,nix}.nix extracted from duplicated blocks
- modules/desktop-common.nix: renamed from system/common.nix; secret paths point to secrets/desktop/
- hosts/{mreow,yarn}/default.nix import desktop-common; yarn imports modules/no-rgb.nix
- hosts/muffin/default.nix imports common-* + server-prefixed modules + services/; duplicate doas/fish/nix blocks removed; gc retention preserved as mkForce override
- modules/age-secrets.nix: file paths → ../secrets/server/*.age
- services/{minecraft,matrix/livekit}: secret paths → ../secrets/server/
- home/profiles/*.nix: ./progs/ → ../progs/
- hosts/{mreow,yarn}/home.nix: imports rewired to ../../home/profiles/ and ../../home/progs/
- home/progs/pi.nix and hosts/yarn/home.nix: secret reads → ../../secrets/home/
- tests/*.nix: ../modules/security.nix → ../modules/server-security.nix; ../modules/overlays.nix → ../lib/overlays.nix
- lib/default.nix: takes explicit lib param (defaults to nixpkgs-stable.lib)
52 lines
1.1 KiB
Nix
52 lines
1.1 KiB
Nix
{
|
|
service_configs,
|
|
...
|
|
}:
|
|
let
|
|
keyFile = ../../secrets/server/livekit_keys;
|
|
in
|
|
{
|
|
services.livekit = {
|
|
enable = true;
|
|
inherit keyFile;
|
|
openFirewall = true;
|
|
|
|
settings = {
|
|
port = service_configs.ports.public.livekit.port;
|
|
bind_addresses = [ "127.0.0.1" ];
|
|
|
|
rtc = {
|
|
port_range_start = 50100;
|
|
port_range_end = 50200;
|
|
use_external_ip = true;
|
|
};
|
|
|
|
# Disable LiveKit's built-in TURN; coturn is already running
|
|
turn = {
|
|
enabled = false;
|
|
};
|
|
|
|
logging = {
|
|
level = "info";
|
|
};
|
|
};
|
|
};
|
|
|
|
services.lk-jwt-service = {
|
|
enable = true;
|
|
inherit keyFile;
|
|
livekitUrl = "wss://${service_configs.livekit.domain}";
|
|
port = service_configs.ports.private.lk_jwt.port;
|
|
};
|
|
|
|
services.caddy.virtualHosts."${service_configs.livekit.domain}".extraConfig = ''
|
|
@jwt path /sfu/get /healthz
|
|
handle @jwt {
|
|
reverse_proxy :${builtins.toString service_configs.ports.private.lk_jwt.port}
|
|
}
|
|
handle {
|
|
reverse_proxy :${builtins.toString service_configs.ports.public.livekit.port}
|
|
}
|
|
'';
|
|
}
|