summaryrefslogtreecommitdiff
path: root/modules/nixos/server
diff options
context:
space:
mode:
authorseth <[email protected]>2024-06-30 09:56:30 -0400
committerseth <[email protected]>2024-06-30 10:23:04 -0400
commit088facf700946cb8f2d96c6089185bdc2a67180a (patch)
treec5b4e4cffbb3ee4ad2498c2251892bd457e9d3c7 /modules/nixos/server
parent5d3045a0769af3a94fba7b5cf646e8498aaef595 (diff)
alejandra -> nixfmt-rfc-style
Diffstat (limited to 'modules/nixos/server')
-rw-r--r--modules/nixos/server/default.nix10
-rw-r--r--modules/nixos/server/host-user.nix20
-rw-r--r--modules/nixos/server/mixins/acme.nix18
-rw-r--r--modules/nixos/server/mixins/cloudflared.nix18
-rw-r--r--modules/nixos/server/mixins/hercules.nix46
-rw-r--r--modules/nixos/server/mixins/nginx.nix10
-rw-r--r--modules/nixos/server/mixins/promtail.nix14
7 files changed, 70 insertions, 66 deletions
diff --git a/modules/nixos/server/default.nix b/modules/nixos/server/default.nix
index 735a30f..366abb3 100644
--- a/modules/nixos/server/default.nix
+++ b/modules/nixos/server/default.nix
@@ -4,9 +4,11 @@
pkgs,
inputs,
...
-}: let
+}:
+let
cfg = config.server;
-in {
+in
+{
options.server = {
enable = lib.mkEnableOption "server settings";
};
@@ -26,7 +28,7 @@ in {
man.enable = false;
};
- environment.defaultPackages = lib.mkForce [];
+ environment.defaultPackages = lib.mkForce [ ];
nix = {
gc = {
@@ -34,7 +36,7 @@ in {
options = "-d --delete-older-than 2d";
};
- settings.allowed-users = [config.networking.hostName];
+ settings.allowed-users = [ config.networking.hostName ];
};
};
}
diff --git a/modules/nixos/server/host-user.nix b/modules/nixos/server/host-user.nix
index 5aa1ce5..8b76e9d 100644
--- a/modules/nixos/server/host-user.nix
+++ b/modules/nixos/server/host-user.nix
@@ -3,18 +3,20 @@
lib,
secretsDir,
...
-}: let
+}:
+let
cfg = config.server.hostUser;
inherit (config.networking) hostName;
-in {
+in
+{
options.server.hostUser = {
- enable = lib.mkEnableOption "${hostName} user configuration" // {default = config.server.enable;};
+ enable = lib.mkEnableOption "${hostName} user configuration" // {
+ default = config.server.enable;
+ };
- manageSecrets =
- lib.mkEnableOption "automatic secrets management"
- // {
- default = config.traits.secrets.enable;
- };
+ manageSecrets = lib.mkEnableOption "automatic secrets management" // {
+ default = config.traits.secrets.enable;
+ };
};
config = lib.mkIf cfg.enable (
@@ -22,7 +24,7 @@ in {
{
users.users.${hostName} = {
isNormalUser = true;
- extraGroups = ["wheel"];
+ extraGroups = [ "wheel" ];
};
}
diff --git a/modules/nixos/server/mixins/acme.nix b/modules/nixos/server/mixins/acme.nix
index 0e4a6d6..e809ad4 100644
--- a/modules/nixos/server/mixins/acme.nix
+++ b/modules/nixos/server/mixins/acme.nix
@@ -3,19 +3,21 @@
lib,
secretsDir,
...
-}: let
+}:
+let
cfg = config.server.mixins.acme;
-in {
+in
+{
options.server.mixins.acme = {
enable = lib.mkEnableOption "ACME mixin";
- manageSecrets =
- lib.mkEnableOption "automatic secrets management"
- // {
- default = config.traits.secrets.enable;
- };
+ manageSecrets = lib.mkEnableOption "automatic secrets management" // {
+ default = config.traits.secrets.enable;
+ };
- useDns = lib.mkEnableOption "the usage of Cloudflare to obtain certs" // {default = true;};
+ useDns = lib.mkEnableOption "the usage of Cloudflare to obtain certs" // {
+ default = true;
+ };
};
config = lib.mkIf cfg.enable (
diff --git a/modules/nixos/server/mixins/cloudflared.nix b/modules/nixos/server/mixins/cloudflared.nix
index a5afb62..f781150 100644
--- a/modules/nixos/server/mixins/cloudflared.nix
+++ b/modules/nixos/server/mixins/cloudflared.nix
@@ -3,10 +3,12 @@
lib,
secretsDir,
...
-}: let
+}:
+let
cfg = config.server.mixins.cloudflared;
inherit (config.services) nginx;
-in {
+in
+{
options.server.mixins.cloudflared = {
enable = lib.mkEnableOption "cloudflared mixin";
tunnelName = lib.mkOption {
@@ -18,11 +20,9 @@ in {
'';
};
- manageSecrets =
- lib.mkEnableOption "automatic secrets management"
- // {
- default = config.traits.secrets.enable;
- };
+ manageSecrets = lib.mkEnableOption "automatic secrets management" // {
+ default = config.traits.secrets.enable;
+ };
};
config = lib.mkIf cfg.enable (
@@ -33,7 +33,9 @@ in {
tunnels.${cfg.tunnelName} = {
default = "http_status:404";
- ingress = lib.mapAttrs (_: _: {service = "http://localhost:${toString nginx.defaultHTTPListenPort}";}) nginx.virtualHosts;
+ ingress = lib.mapAttrs (_: _: {
+ service = "http://localhost:${toString nginx.defaultHTTPListenPort}";
+ }) nginx.virtualHosts;
};
};
}
diff --git a/modules/nixos/server/mixins/hercules.nix b/modules/nixos/server/mixins/hercules.nix
index 103f58e..49ba46d 100644
--- a/modules/nixos/server/mixins/hercules.nix
+++ b/modules/nixos/server/mixins/hercules.nix
@@ -4,16 +4,16 @@
unstable,
secretsDir,
...
-}: let
+}:
+let
cfg = config.server.mixins.hercules-ci;
-in {
+in
+{
options.server.mixins.hercules-ci = {
enable = lib.mkEnableOption "hercules-ci mixin";
- manageSecrets =
- lib.mkEnableOption "automatic secrets management"
- // {
- default = config.traits.secrets.enable;
- };
+ manageSecrets = lib.mkEnableOption "automatic secrets management" // {
+ default = config.traits.secrets.enable;
+ };
};
config = lib.mkIf cfg.enable (
@@ -25,29 +25,29 @@ in {
};
}
- (let
- secretNames = [
- "binaryCaches"
- "clusterJoinToken"
- "secretsJson"
- ];
- in
+ (
+ let
+ secretNames = [
+ "binaryCaches"
+ "clusterJoinToken"
+ "secretsJson"
+ ];
+ in
lib.mkIf cfg.manageSecrets {
- age.secrets = lib.genAttrs secretNames (
- file: {
- file = "${secretsDir}/${file}.age";
- mode = "400";
- owner = "hercules-ci-agent";
- group = "hercules-ci-agent";
- }
- );
+ age.secrets = lib.genAttrs secretNames (file: {
+ file = "${secretsDir}/${file}.age";
+ mode = "400";
+ owner = "hercules-ci-agent";
+ group = "hercules-ci-agent";
+ });
services.hercules-ci-agent = {
settings = lib.mapAttrs' (name: lib.nameValuePair (name + "Path")) (
lib.genAttrs secretNames (name: config.age.secrets.${name}.path)
);
};
- })
+ }
+ )
]
);
}
diff --git a/modules/nixos/server/mixins/nginx.nix b/modules/nixos/server/mixins/nginx.nix
index ba18ecf..11306a2 100644
--- a/modules/nixos/server/mixins/nginx.nix
+++ b/modules/nixos/server/mixins/nginx.nix
@@ -1,10 +1,8 @@
-{
- config,
- lib,
- ...
-}: let
+{ config, lib, ... }:
+let
cfg = config.server.mixins.nginx;
-in {
+in
+{
options.server.mixins.nginx = {
enable = lib.mkEnableOption "nginx mixin";
};
diff --git a/modules/nixos/server/mixins/promtail.nix b/modules/nixos/server/mixins/promtail.nix
index 1baaac6..6b4cf32 100644
--- a/modules/nixos/server/mixins/promtail.nix
+++ b/modules/nixos/server/mixins/promtail.nix
@@ -1,17 +1,15 @@
-{
- config,
- lib,
- ...
-}: let
+{ config, lib, ... }:
+let
cfg = config.server.mixins.promtail;
inherit (lib) types;
-in {
+in
+{
options.server.mixins.promtail = {
enable = lib.mkEnableOption "Promtail mixin";
clients = lib.mkOption {
type = types.listOf types.attrs;
- default = [{}];
+ default = [ { } ];
description = "Clients for promtail";
};
};
@@ -37,7 +35,7 @@ in {
relabel_configs = [
{
- source_labels = ["__journal__systemd_unit"];
+ source_labels = [ "__journal__systemd_unit" ];
target_label = "unit";
}
];