diff options
| author | seth <[email protected]> | 2024-10-27 20:12:19 -0400 |
|---|---|---|
| committer | GitHub <[email protected]> | 2024-10-28 00:12:19 +0000 |
| commit | 5ec7ee21e036f7bc1cbdec714271c619cb3fdb3d (patch) | |
| tree | 3277d8ba68ca466e68c58a8373063010db392d2e /modules/nixos/mixins/cloudflared.nix | |
| parent | 75ec48c5f7dd7877f2294b86764b1fdadc6b7e88 (diff) | |
modules: restructure (#487)
* seth: remove unused pkgs
* modules: restructure
from archetypes back to profiles
make less actual modules for everything
use lib.mkDefault like it's supposed to
move mixins out of server
* nixos/resolved: use modern options
Diffstat (limited to 'modules/nixos/mixins/cloudflared.nix')
| -rw-r--r-- | modules/nixos/mixins/cloudflared.nix | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/modules/nixos/mixins/cloudflared.nix b/modules/nixos/mixins/cloudflared.nix new file mode 100644 index 0000000..372103b --- /dev/null +++ b/modules/nixos/mixins/cloudflared.nix @@ -0,0 +1,60 @@ +{ + config, + lib, + secretsDir, + ... +}: +let + cfg = config.mixins.cloudflared; + inherit (config.services) nginx; +in +{ + options.mixins.cloudflared = { + enable = lib.mkEnableOption "cloudflared mixin"; + tunnelName = lib.mkOption { + description = '' + Name of the default tunnel being created + ''; + type = lib.types.str; + default = "${config.networking.hostName}-nginx"; + defaultText = lib.literalExpression "\${config.networking.hostName}-nginx"; + example = "my-tunnel"; + }; + + manageSecrets = lib.mkEnableOption "automatic management of secrets" // { + default = config.traits.secrets.enable; + defaultText = lib.literalExpression "config.traits.secrets.enable"; + }; + }; + + config = lib.mkIf cfg.enable ( + lib.mkMerge [ + { + services.cloudflared = { + enable = true; + tunnels.${cfg.tunnelName} = { + default = "http_status:404"; + + # map our virtualHosts from nginx to ingress rules + ingress = lib.mapAttrs (_: _: { + service = "http://localhost:${toString nginx.defaultHTTPListenPort}"; + }) nginx.virtualHosts; + }; + }; + } + + (lib.mkIf cfg.manageSecrets { + age.secrets.cloudflaredCreds = { + file = secretsDir + "/cloudflaredCreds.age"; + mode = "400"; + owner = "cloudflared"; + group = "cloudflared"; + }; + + services.cloudflared.tunnels.${cfg.tunnelName} = { + credentialsFile = config.age.secrets.cloudflaredCreds.path; + }; + }) + ] + ); +} |
