diff options
| author | seth <[email protected]> | 2024-02-11 03:12:54 -0500 |
|---|---|---|
| committer | seth <[email protected]> | 2024-02-11 03:15:48 -0500 |
| commit | dadd33514c1fdc8ba4890e9334ab0fb89c31d02a (patch) | |
| tree | 20d8f9a31933ee143c5d6d1fefa92f3a5f6d402d /modules/nixos/traits/cloudflared.nix | |
| parent | 055b48c798039558e2ffde83b589ef6856917bbf (diff) | |
nixos/server: init (again)
Diffstat (limited to 'modules/nixos/traits/cloudflared.nix')
| -rw-r--r-- | modules/nixos/traits/cloudflared.nix | 50 |
1 files changed, 0 insertions, 50 deletions
diff --git a/modules/nixos/traits/cloudflared.nix b/modules/nixos/traits/cloudflared.nix deleted file mode 100644 index 5bff263..0000000 --- a/modules/nixos/traits/cloudflared.nix +++ /dev/null @@ -1,50 +0,0 @@ -{ - config, - lib, - secretsDir, - ... -}: let - cfg = config.traits.cloudflared; - inherit (config.services) nginx; -in { - options.traits.cloudflared = { - enable = lib.mkEnableOption "cloudflared"; - manageSecrets = - lib.mkEnableOption "automatic secrets management" - // { - default = config.traits.secrets.enable; - }; - }; - - config = lib.mkIf cfg.enable ( - lib.mkMerge [ - { - services.cloudflared = { - enable = true; - tunnels = { - "${config.networking.hostName}-nginx" = - { - default = "http_status:404"; - - ingress = lib.genAttrs (builtins.attrNames nginx.virtualHosts) ( - _: {service = "http://localhost:${toString nginx.defaultHTTPListenPort}";} - ); - } - // lib.optionalAttrs cfg.manageSecrets { - credentialsFile = config.age.secrets.cloudflaredCreds.path; - }; - }; - }; - } - - (lib.mkIf cfg.manageSecrets { - age.secrets.cloudflaredCreds = { - file = secretsDir + "/cloudflaredCreds.age"; - mode = "400"; - owner = "cloudflared"; - group = "cloudflared"; - }; - }) - ] - ); -} |
