From e6ed60548397627bf10f561f9438201dbba0a36e Mon Sep 17 00:00:00 2001 From: Azat Bahawi Date: Sun, 21 Apr 2024 02:15:42 +0300 Subject: 2024-04-21 --- modules/ntfy.nix | 80 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 80 insertions(+) create mode 100644 modules/ntfy.nix (limited to 'modules/ntfy.nix') diff --git a/modules/ntfy.nix b/modules/ntfy.nix new file mode 100644 index 0000000..5739855 --- /dev/null +++ b/modules/ntfy.nix @@ -0,0 +1,80 @@ +{ + config, + lib, + libNginx, + this, + ... +}: +with lib; +let + cfg = config.nixfiles.modules.ntfy; +in +{ + options.nixfiles.modules.ntfy = { + enable = mkEnableOption "ntfy"; + + port = mkOption { + description = "Port."; + type = types.port; + default = 2586; + }; + + domain = mkOption { + description = "Domain name sans protocol scheme."; + type = with types; str; + default = "ntfy.${config.networking.domain}"; + }; + + prometheus = { + enable = mkEnableOption "Prometheus exporter." // { + default = true; + }; + + address = mkOption { + description = "Address."; + type = with types; str; + default = this.wireguard.ipv4.address; + }; + + port = mkOption { + description = "Port."; + type = with types; port; + default = 9289; + }; + }; + }; + + config = mkIf cfg.enable { + ark.files = [ config.services.ntfy-sh.settings.auth-file ]; + + nixfiles.modules.nginx = { + enable = true; + upstreams.ntfy.servers.${config.services.ntfy-sh.settings.listen-http} = { }; + virtualHosts.${cfg.domain} = { + locations = { + "/" = { + proxyPass = "http://ntfy"; + proxyWebsockets = true; + }; + "/metrics".extraConfig = '' + deny all; + ''; + }; + extraConfig = libNginx.config.internalOnly; + }; + }; + + services.ntfy-sh = { + enable = true; + settings = { + listen-http = "127.0.0.1:${toString cfg.port}"; + base-url = "https://${cfg.domain}"; + behind-proxy = true; + enable-metrics = cfg.prometheus.enable; + metrics-listen-http = + with cfg.prometheus; + optionalString cfg.prometheus.enable "${address}:${toString port}"; + }; + }; + }; +} -- cgit v1.2.3