2024-03-03 16:57:20 +01:00
|
|
|
{
|
2024-04-02 20:53:12 +02:00
|
|
|
lib,
|
2024-03-03 16:57:20 +01:00
|
|
|
config,
|
2024-04-13 14:26:07 +02:00
|
|
|
pkgs, # required for fudgeMyShitIn
|
2024-03-03 16:57:20 +01:00
|
|
|
...
|
2024-04-13 14:26:07 +02:00
|
|
|
} @ args: let
|
2024-04-02 20:53:12 +02:00
|
|
|
tunnelId = "57f51ad7-25a0-45f3-b113-0b6ae0b2c3e5";
|
2024-04-13 14:26:07 +02:00
|
|
|
|
|
|
|
secretsPath = ../../secrets/etna;
|
|
|
|
mkSecrets = builtins.mapAttrs (name: value: value // {file = "${secretsPath}/${name}.age";});
|
|
|
|
mkSecret = name: other: mkSecrets {${name} = other;};
|
|
|
|
|
2024-04-13 14:34:10 +02:00
|
|
|
fudgeMyShitIn = builtins.map (file: import file (args // {inherit mkSecret mkSecrets;}));
|
2024-04-02 20:53:12 +02:00
|
|
|
in {
|
2024-04-13 14:26:07 +02:00
|
|
|
imports =
|
|
|
|
[
|
|
|
|
(lib.mkAliasOptionModule ["cfTunnels"] ["services" "cloudflared" "tunnels" tunnelId "ingress"])
|
|
|
|
]
|
|
|
|
++ fudgeMyShitIn [
|
|
|
|
./minecraft.nix
|
|
|
|
./dendrite.nix
|
|
|
|
./nextcloud.nix
|
2024-04-13 14:34:10 +02:00
|
|
|
./reposilite.nix
|
|
|
|
./uku.nix
|
|
|
|
./vaultwarden.nix
|
2024-05-18 23:03:42 +02:00
|
|
|
./forgejo.nix
|
2024-04-13 14:26:07 +02:00
|
|
|
];
|
2024-04-02 20:53:12 +02:00
|
|
|
|
2024-04-13 14:26:07 +02:00
|
|
|
age.secrets = mkSecrets {
|
2024-02-02 15:20:48 +01:00
|
|
|
tunnelCreds = {
|
|
|
|
owner = "cloudflared";
|
|
|
|
group = "cloudflared";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-05-12 13:33:15 +02:00
|
|
|
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_6_1;
|
2024-02-02 15:20:48 +01:00
|
|
|
|
|
|
|
services = {
|
2024-04-29 16:34:34 +02:00
|
|
|
openssh.openFirewall = true;
|
|
|
|
|
2024-02-02 15:20:48 +01:00
|
|
|
cloudflared = {
|
|
|
|
enable = true;
|
2024-04-02 20:53:12 +02:00
|
|
|
tunnels.${tunnelId} = {
|
2024-02-02 15:20:48 +01:00
|
|
|
credentialsFile = config.age.secrets.tunnelCreds.path;
|
|
|
|
default = "http_status:404";
|
|
|
|
};
|
|
|
|
};
|
2024-03-06 22:50:31 +01:00
|
|
|
};
|
2024-01-18 15:15:14 +01:00
|
|
|
}
|