mirror of
https://github.com/gensokyo-zone/infrastructure.git
synced 2026-02-09 12:29:19 -08:00
67 lines
3 KiB
Nix
67 lines
3 KiB
Nix
{
|
|
meta,
|
|
config,
|
|
lib,
|
|
...
|
|
}: let
|
|
inherit (lib.modules) mkIf mkMerge;
|
|
inherit (lib.attrsets) listToAttrs nameValuePair;
|
|
inherit (config.networking) hostName;
|
|
cfg = config.services.cloudflared;
|
|
apartment = "5e85d878-c6b2-4b15-b803-9aeb63d63543";
|
|
systemFor = hostName: if hostName == config.networking.hostName
|
|
then config
|
|
else meta.network.nodes.${hostName};
|
|
accessHostFor = { hostName, system ? systemFor hostName, access ? "local", ... }: let
|
|
host = system.networking.access.hostnameForNetwork.${access} or (throw "unsupported access ${access}");
|
|
in if hostName == config.networking.hostName then "localhost" else host;
|
|
ingressForNginx = { host ? system.networking.fqdn, port ? 80, hostName, system ? systemFor hostName }@args: nameValuePair host {
|
|
service = "http://${accessHostFor args}:${toString port}";
|
|
};
|
|
ingressForHass = { host ? system.services.home-assistant.domain, port ? system.services.home-assistant.config.http.server_port, hostName, system ? systemFor hostName, ... }@args: nameValuePair host {
|
|
service = "http://${accessHostFor args}:${toString port}";
|
|
};
|
|
ingressForVouch = { host ? system.services.vouch-proxy.domain, port ? system.services.vouch-proxy.settings.vouch.port, hostName, system ? systemFor hostName, ... }@args: nameValuePair host {
|
|
service = "http://${accessHostFor args}:${toString port}";
|
|
};
|
|
ingressForKanidm = { host ? system.services.kanidm.server.frontend.domain, port ? system.services.kanidm.server.frontend.port, hostName, system ? systemFor hostName, ... }@args: nameValuePair host {
|
|
service = "https://${accessHostFor args}:${toString port}";
|
|
originRequest.noTLSVerify = true;
|
|
};
|
|
ingressForDeluge = { host, port ? system.services.deluge.web.port, hostName, system ? systemFor hostName, ... }@args: nameValuePair host {
|
|
service = "http://${accessHostFor args}:${toString port}";
|
|
};
|
|
in {
|
|
sops.secrets.cloudflared-tunnel-apartment.owner = cfg.user;
|
|
sops.secrets.cloudflared-tunnel-apartment-deluge.owner = cfg.user;
|
|
services.cloudflared = {
|
|
tunnels = {
|
|
${apartment} = {
|
|
credentialsFile = config.sops.secrets.cloudflared-tunnel-apartment.path;
|
|
default = "http_status:404";
|
|
ingress = listToAttrs [
|
|
(ingressForNginx { host = config.networking.domain; inherit hostName; })
|
|
(ingressForNginx { host = config.services.zigbee2mqtt.domain; inherit hostName; })
|
|
(ingressForHass { inherit hostName; })
|
|
(ingressForVouch { inherit hostName; })
|
|
(ingressForKanidm { inherit hostName; })
|
|
];
|
|
extraTunnel.ingress = mkMerge [
|
|
(listToAttrs [
|
|
(ingressForDeluge { host = "deluge"; hostName = "tewi"; access = "tail"; })
|
|
])
|
|
{
|
|
deluge.hostname._secret = config.sops.secrets.cloudflared-tunnel-apartment-deluge.path;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
systemd.services."cloudflared-tunnel-${apartment}" = rec {
|
|
wants = mkIf config.services.tailscale.enable [
|
|
"tailscaled.service"
|
|
];
|
|
after = wants;
|
|
};
|
|
}
|