feat: add nix-secrets input and enable upstream proxy

This commit is contained in:
tux
2025-01-29 20:23:21 +05:30
parent 0f944b78d7
commit f47355c594
3 changed files with 32 additions and 0 deletions

21
flake.lock generated
View File

@ -343,6 +343,26 @@
"type": "github" "type": "github"
} }
}, },
"nix-secrets": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1738161919,
"narHash": "sha256-EKyY5XwFmgkEYElZEpNGEl6UsJO4jYvqtzZYtQPvD18=",
"owner": "tuxdotrs",
"repo": "nix-secrets",
"rev": "5f6314b52859812eb877b54ddf158098cf21c8c0",
"type": "github"
},
"original": {
"owner": "tuxdotrs",
"repo": "nix-secrets",
"type": "github"
}
},
"nix-vscode-extensions": { "nix-vscode-extensions": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_3", "flake-compat": "flake-compat_3",
@ -662,6 +682,7 @@
"ghostty": "ghostty", "ghostty": "ghostty",
"home-manager": "home-manager", "home-manager": "home-manager",
"impermanence": "impermanence", "impermanence": "impermanence",
"nix-secrets": "nix-secrets",
"nix-vscode-extensions": "nix-vscode-extensions", "nix-vscode-extensions": "nix-vscode-extensions",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixos-wsl": "nixos-wsl", "nixos-wsl": "nixos-wsl",

View File

@ -86,6 +86,10 @@
url = "github:nix-community/disko"; url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
nix-secrets = {
url = "github:tuxdotrs/nix-secrets";
inputs.nixpkgs.follows = "nixpkgs";
};
ghostty.url = "github:ghostty-org/ghostty"; ghostty.url = "github:ghostty-org/ghostty";
nixos-hardware.url = "github:nixos/nixos-hardware"; nixos-hardware.url = "github:nixos/nixos-hardware";
nixpkgs-f2k.url = "github:moni-dz/nixpkgs-f2k"; nixpkgs-f2k.url = "github:moni-dz/nixpkgs-f2k";

View File

@ -3,12 +3,14 @@
username, username,
config, config,
email, email,
inputs,
... ...
}: { }: {
imports = [ imports = [
./hardware.nix ./hardware.nix
../common ../common
../../modules/nixos/uptime-kuma.nix ../../modules/nixos/uptime-kuma.nix
../../modules/nixos/upstream-proxy.nix
]; ];
sops.secrets = { sops.secrets = {
@ -64,6 +66,11 @@
users.users.nginx.extraGroups = ["acme"]; users.users.nginx.extraGroups = ["acme"];
tux.services.nginxStreamProxy = {
enable = true;
upstreamServers = inputs.nix-secrets.proxy-servers;
};
services = { services = {
nginx = { nginx = {
recommendedGzipSettings = true; recommendedGzipSettings = true;