flake/systems/etna/default.nix
2024-04-13 14:26:26 +02:00

79 lines
1.7 KiB
Nix

{
lib,
config,
pkgs, # required for fudgeMyShitIn
...
} @ args: let
tunnelId = "57f51ad7-25a0-45f3-b113-0b6ae0b2c3e5";
secretsPath = ../../secrets/etna;
mkSecrets = builtins.mapAttrs (name: value: value // {file = "${secretsPath}/${name}.age";});
mkSecret = name: other: mkSecrets {${name} = other;};
fudgeMyShitIn = builtins.map (file: import file (args // {inherit mkSecret;}));
in {
imports =
[
(lib.mkAliasOptionModule ["cfTunnels"] ["services" "cloudflared" "tunnels" tunnelId "ingress"])
]
++ fudgeMyShitIn [
./minecraft.nix
./attic.nix
./dendrite.nix
./nextcloud.nix
];
age.secrets = mkSecrets {
apiRsEnv = {};
ukubotRsEnv = {};
tunnelCreds = {
owner = "cloudflared";
group = "cloudflared";
};
};
boot.loader.systemd-boot.enable = true;
services = {
api-rs = {
enable = true;
environmentFile = config.age.secrets.apiRsEnv.path;
};
ukubot-rs = {
enable = true;
environmentFile = config.age.secrets.ukubotRsEnv.path;
};
reposilite.enable = true;
tailscale.extraUpFlags = ["--advertise-exit-node"];
vaultwarden = {
enable = true;
config = {
DOMAIN = "https://bw.uku3lig.net";
SIGNUPS_ALLOWED = false;
ROCKET_ADDRESS = "::1";
ROCKET_PORT = 8222;
};
};
cloudflared = {
enable = true;
tunnels.${tunnelId} = {
credentialsFile = config.age.secrets.tunnelCreds.path;
ingress = {
"api.uku3lig.net" = "http://localhost:5000";
"bw.uku3lig.net" = "http://localhost:8222";
"maven.uku3lig.net" = "http://localhost:8080";
};
default = "http_status:404";
};
};
};
}