don't run drastikbot behind vpn

This commit is contained in:
zuckerberg 2021-10-02 17:40:49 -04:00
parent d45390bcb4
commit 2635905d58
3 changed files with 10 additions and 11 deletions

View File

@ -68,7 +68,6 @@ in {
enable = true; enable = true;
after = ["network.target"]; after = ["network.target"];
wantedBy = ["multi-user.target"]; wantedBy = ["multi-user.target"];
serviceConfig.ExecStartPre = ["${pkgs.coreutils}/bin/sleep 20"];
serviceConfig.ExecStart = "${drastikbot}/drastikbot -c ${cfg.dataDir}"; serviceConfig.ExecStart = "${drastikbot}/drastikbot -c ${cfg.dataDir}";
serviceConfig.User = cfg.user; serviceConfig.User = cfg.user;
serviceConfig.Group = cfg.group; serviceConfig.Group = cfg.group;

16
flake.lock generated
View File

@ -21,11 +21,11 @@
"dailybuild_modules": { "dailybuild_modules": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1630708165, "lastModified": 1633210754,
"narHash": "sha256-Oe1LszfWK4drG5seZbKcYDcb6XlGwTRH251xXd/GwRY=", "narHash": "sha256-jBIE07mLsF+qHoa/CQLSRipvfNSivgbuWUatI6Wwy0s=",
"ref": "master", "ref": "master",
"rev": "7915955afad2e9aee599946d324ce588a504f455", "rev": "e6a1c8686dad46b7847a5c690107a48fc20a6a29",
"revCount": 8, "revCount": 9,
"type": "git", "type": "git",
"url": "https://git.neet.dev/zuckerberg/dailybuild_modules.git" "url": "https://git.neet.dev/zuckerberg/dailybuild_modules.git"
}, },
@ -163,11 +163,11 @@
"nixpkgs": "nixpkgs_3" "nixpkgs": "nixpkgs_3"
}, },
"locked": { "locked": {
"lastModified": 1633209822, "lastModified": 1633210684,
"narHash": "sha256-wQyQl7RkwAdyshaUdktoUPy0QLRdALcEIpI0vJHshhc=", "narHash": "sha256-/S8QePRyxmQlATVFpT0HtPGcJcpQHt8omtO1NW+EDME=",
"ref": "main", "ref": "main",
"rev": "b9b050fec1a4d74cae3e5e4ba7b88dd80627b521", "rev": "4255c43cf6efd8f145b8e87b3d5d584be32191b6",
"revCount": 46, "revCount": 47,
"type": "git", "type": "git",
"url": "https://git.neet.dev/zuckerberg/radio.git" "url": "https://git.neet.dev/zuckerberg/radio.git"
}, },

View File

@ -164,18 +164,18 @@ in {
networking.useHostResolvConf = false; networking.useHostResolvConf = false;
services.resolved.enable = true; services.resolved.enable = true;
services.drastikbot.enable = true;
services.radio = { services.radio = {
enable = true; enable = true;
host = "radio.neet.space"; host = "radio.neet.space";
}; };
systemd.services.drastikbot.after = ["openvpn-us-east.service"];
}; };
}; };
}; };
# load the secret on behalf of the container # load the secret on behalf of the container
age.secrets."pia-login.conf".file = ../../secrets/pia-login.conf; age.secrets."pia-login.conf".file = ../../secrets/pia-login.conf;
services.drastikbot.enable = true;
# icecast endpoint + website # icecast endpoint + website
services.nginx.virtualHosts."radio.neet.space" = { services.nginx.virtualHosts."radio.neet.space" = {
enableACME = true; enableACME = true;