summaryrefslogtreecommitdiff
path: root/modules/nixos/server/mixins/cloudflared.nix
diff options
context:
space:
mode:
authorseth <[email protected]>2024-06-30 09:56:30 -0400
committerseth <[email protected]>2024-06-30 10:23:04 -0400
commit088facf700946cb8f2d96c6089185bdc2a67180a (patch)
treec5b4e4cffbb3ee4ad2498c2251892bd457e9d3c7 /modules/nixos/server/mixins/cloudflared.nix
parent5d3045a0769af3a94fba7b5cf646e8498aaef595 (diff)
alejandra -> nixfmt-rfc-style
Diffstat (limited to 'modules/nixos/server/mixins/cloudflared.nix')
-rw-r--r--modules/nixos/server/mixins/cloudflared.nix18
1 files changed, 10 insertions, 8 deletions
diff --git a/modules/nixos/server/mixins/cloudflared.nix b/modules/nixos/server/mixins/cloudflared.nix
index a5afb62..f781150 100644
--- a/modules/nixos/server/mixins/cloudflared.nix
+++ b/modules/nixos/server/mixins/cloudflared.nix
@@ -3,10 +3,12 @@
lib,
secretsDir,
...
-}: let
+}:
+let
cfg = config.server.mixins.cloudflared;
inherit (config.services) nginx;
-in {
+in
+{
options.server.mixins.cloudflared = {
enable = lib.mkEnableOption "cloudflared mixin";
tunnelName = lib.mkOption {
@@ -18,11 +20,9 @@ in {
'';
};
- manageSecrets =
- lib.mkEnableOption "automatic secrets management"
- // {
- default = config.traits.secrets.enable;
- };
+ manageSecrets = lib.mkEnableOption "automatic secrets management" // {
+ default = config.traits.secrets.enable;
+ };
};
config = lib.mkIf cfg.enable (
@@ -33,7 +33,9 @@ in {
tunnels.${cfg.tunnelName} = {
default = "http_status:404";
- ingress = lib.mapAttrs (_: _: {service = "http://localhost:${toString nginx.defaultHTTPListenPort}";}) nginx.virtualHosts;
+ ingress = lib.mapAttrs (_: _: {
+ service = "http://localhost:${toString nginx.defaultHTTPListenPort}";
+ }) nginx.virtualHosts;
};
};
}