summaryrefslogtreecommitdiff
path: root/modules/nixos/server/services/cloudflared.nix
diff options
context:
space:
mode:
authorseth <[email protected]>2023-08-04 13:31:35 -0400
committerseth <[email protected]>2023-08-04 13:31:35 -0400
commitc71dd50f7c1b99a2a1a6d8ab91597bd2e7113840 (patch)
tree03fa486bb08b393011f7faf514de2ad40fe3f513 /modules/nixos/server/services/cloudflared.nix
parent7049883c333927b5e8ca3574b58222bd78bf3a9c (diff)
modules/nixos: init cloudflared module
Diffstat (limited to 'modules/nixos/server/services/cloudflared.nix')
-rw-r--r--modules/nixos/server/services/cloudflared.nix41
1 files changed, 41 insertions, 0 deletions
diff --git a/modules/nixos/server/services/cloudflared.nix b/modules/nixos/server/services/cloudflared.nix
new file mode 100644
index 0000000..5081a0a
--- /dev/null
+++ b/modules/nixos/server/services/cloudflared.nix
@@ -0,0 +1,41 @@
+{
+ config,
+ lib,
+ self,
+ ...
+}: let
+ cfg = config.getchoo.server.services.cloudflared;
+ inherit (lib) mkEnableOption mkIf;
+in {
+ options.getchoo.server.services.cloudflared = {
+ enable = mkEnableOption "cloudflared";
+ };
+
+ config = mkIf cfg.enable {
+ age.secrets.cloudflaredCreds = {
+ file = "${self}/secrets/hosts/${config.networking.hostName}/cloudflaredCreds.age";
+ mode = "400";
+ owner = "cloudflared";
+ group = "cloudflared";
+ };
+
+ services.cloudflared = {
+ enable = true;
+ tunnels = {
+ "${config.networking.hostName}-nginx" = {
+ default = "http_status:404";
+
+ ingress = let
+ inherit (config.services) nginx;
+ in
+ lib.genAttrs
+ (builtins.attrNames nginx.virtualHosts)
+ (_: {service = "http://localhost:${builtins.toString nginx.defaultHTTPListenPort}";});
+
+ originRequest.noTLSVerify = true;
+ credentialsFile = config.age.secrets.cloudflaredCreds.path;
+ };
+ };
+ };
+ };
+}