prep for distrust-mini

This commit is contained in:
root 2025-11-10 00:03:12 +00:00
parent 813a92ece0
commit b2c36ea08b
2 changed files with 16 additions and 21 deletions

View file

@ -29,7 +29,7 @@
}; };
distrust-mini = lib.nixosSystem { distrust-mini = lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix agenix.nixosModules.default {networking.hostName = "distrust-mini";}]; modules = [./system/distrust-mini ./services/distrust-mini agenix.nixosModules.default {networking.hostName = "distrust-mini";}];
}; };
}; };
}; };

View file

@ -3,27 +3,22 @@
in { in {
age.secrets."hidden_service/uptime-kuma".file = ../../secrets/hidden_service/uptime-kuma; age.secrets."hidden_service/uptime-kuma".file = ../../secrets/hidden_service/uptime-kuma;
services.uptime-kuma = { services = {
enable = true; uptime-kuma = {
settings = {
PORT = toString kumaPort;
};
};
distrust.services."uptime-kuma" = {
url = "https://status.distrust.network";
onion = {
url = "http://dstrst6d56jb7y7bmd77fcq73x43e6euphf74qzjvvn43j67ugydd2id.onion";
secretKey = config.age.secrets."hidden_service/uptime-kuma".path;
};
virtualHostConfig = ''
reverse_proxy localhost:${toString kumaPort}
'';
backup = {
enable = true; enable = true;
paths = [ settings = {
"/var/lib/uptime-kuma" PORT = toString kumaPort;
]; };
};
caddy = {
enable = true;
virtualHosts."https://status.distrust.network".extraConfig = ''
reverse_proxy localhost:${toString kumaPort}
'';
};
tor.relay.onionServices."uptime-kuma" = {
map = [80];
secretKey = config.age.secrets."hidden_service/uptime-kuma".path;
}; };
}; };
} }