71 lines
1.4 KiB
Nix
71 lines
1.4 KiB
Nix
{
|
|
lib,
|
|
pkgs,
|
|
config,
|
|
_utils,
|
|
...
|
|
}: let
|
|
tunnelId = "57f51ad7-25a0-45f3-b113-0b6ae0b2c3e5";
|
|
|
|
frpSecret = _utils.setupSingleSecret config "frpToken" {};
|
|
cfTunnelSecret = _utils.setupSingleSecret config "tunnelCreds" {
|
|
owner = "cloudflared";
|
|
group = "cloudflared";
|
|
};
|
|
in {
|
|
imports = [
|
|
(lib.mkAliasOptionModule ["cfTunnels"] ["services" "cloudflared" "tunnels" tunnelId "ingress"])
|
|
|
|
frpSecret.generate
|
|
cfTunnelSecret.generate
|
|
|
|
./minecraft.nix
|
|
./dendrite.nix
|
|
./nextcloud.nix
|
|
./reposilite.nix
|
|
./uku.nix
|
|
./vaultwarden.nix
|
|
./forgejo.nix
|
|
./shlink.nix
|
|
./metrics.nix
|
|
];
|
|
|
|
boot = {
|
|
kernelPackages = lib.mkForce pkgs.linuxPackages_6_1;
|
|
loader.systemd-boot.enable = true;
|
|
};
|
|
|
|
services = {
|
|
jmusicbot = {
|
|
enable = true;
|
|
stateDir = "/var/lib/jmusicbot";
|
|
};
|
|
|
|
openssh.openFirewall = true;
|
|
|
|
nginx.enable = true;
|
|
|
|
frp = {
|
|
enable = true;
|
|
role = "client";
|
|
settings = {
|
|
serverAddr = "49.13.148.129";
|
|
serverPort = 7000;
|
|
auth = {
|
|
method = "token";
|
|
token = "{{ .Envs.FRP_TOKEN }}";
|
|
};
|
|
};
|
|
};
|
|
|
|
cloudflared = {
|
|
enable = true;
|
|
tunnels.${tunnelId} = {
|
|
credentialsFile = cfTunnelSecret.path;
|
|
default = "http_status:404";
|
|
};
|
|
};
|
|
};
|
|
|
|
systemd.services.frp.serviceConfig.EnvironmentFile = frpSecret.path;
|
|
}
|