From a61f9040980c29e95fc46942c83e7e687874aba6 Mon Sep 17 00:00:00 2001 From: Eli Ribble Date: Wed, 18 Feb 2026 22:07:22 +0000 Subject: [PATCH] Make tegola domain name configurable by environment --- host/nocix/amd-legacy-quadcore/configuration.nix | 3 +++ host/nocix/amd-legacy-sexcore/configuration.nix | 3 +++ modules/system/tegola.nix | 12 +++++++++--- 3 files changed, 15 insertions(+), 3 deletions(-) diff --git a/host/nocix/amd-legacy-quadcore/configuration.nix b/host/nocix/amd-legacy-quadcore/configuration.nix index 465ffd8..203486a 100644 --- a/host/nocix/amd-legacy-quadcore/configuration.nix +++ b/host/nocix/amd-legacy-quadcore/configuration.nix @@ -28,6 +28,9 @@ domainNameSync = "staging-sync.nidus.cloud"; environment = "staging"; }; + tegola = { + domainName = "staging-tegola.nidus.cloud"; + }; }; services.openssh.enable = true; users.users.root.openssh.authorizedKeys.keys = diff --git a/host/nocix/amd-legacy-sexcore/configuration.nix b/host/nocix/amd-legacy-sexcore/configuration.nix index 1da5759..4f9cfdb 100644 --- a/host/nocix/amd-legacy-sexcore/configuration.nix +++ b/host/nocix/amd-legacy-sexcore/configuration.nix @@ -28,6 +28,9 @@ domainNameSync = "sync.nidus.cloud"; environment = "prod"; }; + tegola = { + domainName = "tegola.nidus.cloud"; + }; }; services.openssh.enable = true; users.users.root.openssh.authorizedKeys.keys = diff --git a/modules/system/tegola.nix b/modules/system/tegola.nix index 45ac4c3..85fc341 100644 --- a/modules/system/tegola.nix +++ b/modules/system/tegola.nix @@ -2,14 +2,20 @@ with lib; let + cfg = config.myModules.tegola; databaseName = "tegola"; databaseUser = "tegola"; - domainName = "tegola.nidus.cloud"; port = 9090; group = "tegola"; user = "tegola"; in { - options.myModules.tegola.enable = mkEnableOption "custom tegola configuration"; + options.myModules.tegola = { + domainName = mkOption { + example = "tegola.nidus.cloud"; + type = types.str; + }; + enable = mkEnableOption "custom tegola configuration"; + }; config = mkIf config.myModules.tegola.enable { environment = { @@ -23,7 +29,7 @@ in { ]; }; networking.firewall.allowedTCPPorts = [ 9090 ]; - services.caddy.virtualHosts."${domainName}" = { + services.caddy.virtualHosts."${cfg.domainName}" = { extraConfig = '' reverse_proxy { to http://127.0.0.1:${toString port}