2024-03-03 16:57:20 +01:00
|
|
|
{
|
2024-04-02 20:53:12 +02:00
|
|
|
lib,
|
2024-03-03 16:57:20 +01:00
|
|
|
config,
|
2024-04-13 14:26:07 +02:00
|
|
|
pkgs, # required for fudgeMyShitIn
|
2024-03-03 16:57:20 +01:00
|
|
|
...
|
2024-04-13 14:26:07 +02:00
|
|
|
} @ args: let
|
2024-04-02 20:53:12 +02:00
|
|
|
tunnelId = "57f51ad7-25a0-45f3-b113-0b6ae0b2c3e5";
|
2024-04-13 14:26:07 +02:00
|
|
|
|
|
|
|
secretsPath = ../../secrets/etna;
|
|
|
|
mkSecrets = builtins.mapAttrs (name: value: value // {file = "${secretsPath}/${name}.age";});
|
|
|
|
mkSecret = name: other: mkSecrets {${name} = other;};
|
|
|
|
|
2024-04-13 14:34:10 +02:00
|
|
|
fudgeMyShitIn = builtins.map (file: import file (args // {inherit mkSecret mkSecrets;}));
|
2024-04-02 20:53:12 +02:00
|
|
|
in {
|
2024-04-13 14:26:07 +02:00
|
|
|
imports =
|
|
|
|
[
|
|
|
|
(lib.mkAliasOptionModule ["cfTunnels"] ["services" "cloudflared" "tunnels" tunnelId "ingress"])
|
|
|
|
]
|
|
|
|
++ fudgeMyShitIn [
|
|
|
|
./minecraft.nix
|
|
|
|
./dendrite.nix
|
|
|
|
./nextcloud.nix
|
2024-04-13 14:34:10 +02:00
|
|
|
./reposilite.nix
|
|
|
|
./uku.nix
|
|
|
|
./vaultwarden.nix
|
2024-05-18 23:03:42 +02:00
|
|
|
./forgejo.nix
|
2024-04-13 14:26:07 +02:00
|
|
|
];
|
2024-04-02 20:53:12 +02:00
|
|
|
|
2024-04-13 14:26:07 +02:00
|
|
|
age.secrets = mkSecrets {
|
2024-02-02 15:20:48 +01:00
|
|
|
tunnelCreds = {
|
|
|
|
owner = "cloudflared";
|
|
|
|
group = "cloudflared";
|
|
|
|
};
|
2024-05-19 18:53:03 +02:00
|
|
|
|
|
|
|
frpToken = {};
|
2024-02-02 15:20:48 +01:00
|
|
|
};
|
|
|
|
|
2024-05-21 15:00:01 +02:00
|
|
|
boot = {
|
|
|
|
kernelPackages = lib.mkForce pkgs.linuxPackages_6_1;
|
|
|
|
loader.systemd-boot.enable = true;
|
|
|
|
};
|
2024-02-02 15:20:48 +01:00
|
|
|
|
|
|
|
services = {
|
2024-06-14 23:59:44 +02:00
|
|
|
jmusicbot = {
|
|
|
|
enable = true;
|
|
|
|
stateDir = "/var/lib/jmusicbot";
|
|
|
|
};
|
|
|
|
|
2024-04-29 16:34:34 +02:00
|
|
|
openssh.openFirewall = true;
|
|
|
|
|
2024-05-19 10:34:48 +02:00
|
|
|
nginx.enable = true;
|
|
|
|
|
|
|
|
frp = {
|
|
|
|
enable = true;
|
|
|
|
role = "client";
|
|
|
|
settings = {
|
|
|
|
serverAddr = "49.13.148.129";
|
|
|
|
serverPort = 7000;
|
2024-05-19 18:53:03 +02:00
|
|
|
auth = {
|
|
|
|
method = "token";
|
|
|
|
token = "{{ .Envs.FRP_TOKEN }}";
|
|
|
|
};
|
2024-05-19 10:34:48 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-02-02 15:20:48 +01:00
|
|
|
cloudflared = {
|
|
|
|
enable = true;
|
2024-04-02 20:53:12 +02:00
|
|
|
tunnels.${tunnelId} = {
|
2024-02-02 15:20:48 +01:00
|
|
|
credentialsFile = config.age.secrets.tunnelCreds.path;
|
|
|
|
default = "http_status:404";
|
|
|
|
};
|
|
|
|
};
|
2024-03-06 22:50:31 +01:00
|
|
|
};
|
2024-05-19 18:53:03 +02:00
|
|
|
|
|
|
|
systemd.services.frp.serviceConfig.EnvironmentFile = config.age.secrets.frpToken.path;
|
2024-01-18 15:15:14 +01:00
|
|
|
}
|