fix: kuma and improve deployment logging

This commit is contained in:
Jermeiah S 2025-06-19 15:52:56 -04:00
parent 62c440f78a
commit bb141b7a71
No known key found for this signature in database
4 changed files with 21 additions and 8 deletions

View file

@ -14,6 +14,7 @@ in
self.nixosModules.default self.nixosModules.default
"${modulesPath}/virtualisation/lxc-container.nix" "${modulesPath}/virtualisation/lxc-container.nix"
]; ];
deploy.address = "200:b938:d405:92df:a6e:1ffd:5213:26b";
services = { services = {
tty-ips.enable = true; tty-ips.enable = true;
uptime-kuma = { uptime-kuma = {

View file

@ -16,6 +16,9 @@ in
self.nixosModules.default self.nixosModules.default
"${modulesPath}/virtualisation/lxc-container.nix" "${modulesPath}/virtualisation/lxc-container.nix"
]; ];
deploy = {
address = "200:1978:6503:e6f0:2dbe:11fd:74b:ff64";
};
sops.secrets = { sops.secrets = {
otfenv = { otfenv = {
owner = "otf"; owner = "otf";

View file

@ -14,9 +14,11 @@ let
# inherit (self.hosts.${hostName}) address hostPlatform remoteBuild; # inherit (self.hosts.${hostName}) address hostPlatform remoteBuild;
# inherit (deploy-rs.lib.${hostPlatform}) activate; # inherit (deploy-rs.lib.${hostPlatform}) activate;
system = self.nixosConfigurations."${hostName}".pkgs.system; system = self.nixosConfigurations."${hostName}".pkgs.system;
address = self.nixosConfigurations."${hostName}".config.deploy.address;
in in
{ {
hostname = hostName; # inherit address;
hostname = address;
profiles.system.path = deploy-rs.lib.${system}.activate.nixos self.nixosConfigurations.${hostName}; profiles.system.path = deploy-rs.lib.${system}.activate.nixos self.nixosConfigurations.${hostName};
}; };
in in

View file

@ -1,4 +1,10 @@
_: { { lib, config, ... }:
{
options.deploy.address = lib.mkOption {
type = lib.types.str;
default = config.networking.hostName;
};
config = {
services.openssh.enable = true; services.openssh.enable = true;
security = { security = {
sudo.execWheelOnly = true; sudo.execWheelOnly = true;
@ -7,4 +13,5 @@ _: {
services.sudo.sshAgentAuth = true; services.sudo.sshAgentAuth = true;
}; };
}; };
};
} }