nixos modules for convenient deployment of cloud resources

refactor: move providers out of nested dir

ptr.pet 1751c068 52576c71

verified
Changed files
+3 -3
firewall
+1 -1
README.md
··· 6 in your NixOS configuration. for example, `nixosModules.firewall` and 7 `nixosModules.firewall-hetzner`. see `nix flake show` for all available modules. 8 9 - if not using flakes, you can import `<resource>/` and `<resource>/provider/<provider>`. 10 11 then, you can either use each module's individual `mkApp` config option to 12 generate an app and run it, or you can call `makeApps`:
··· 6 in your NixOS configuration. for example, `nixosModules.firewall` and 7 `nixosModules.firewall-hetzner`. see `nix flake show` for all available modules. 8 9 + if not using flakes, you can import `<resource>/` and `<resource>/<provider>`. 10 11 then, you can either use each module's individual `mkApp` config option to 12 generate an app and run it, or you can call `makeApps`:
firewall/provider/hetzner/app.nix firewall/hetzner/app.nix
firewall/provider/hetzner/app.nu firewall/hetzner/app.nu
firewall/provider/hetzner/default.nix firewall/hetzner/default.nix
firewall/provider/hetzner/rules.nix firewall/hetzner/rules.nix
+2 -2
flake.nix
··· 12 in { 13 nixosModules = { 14 firewall = ./firewall; 15 - firewall-hetzner = ./firewall/provider/hetzner; 16 }; 17 checks = 18 l.mapAttrs 19 (_: pkgs: { 20 - firewall-hetzner-app = import ./firewall/provider/hetzner/app.nix { 21 inherit pkgs; 22 taggedPorts = { 23 http.allowedTCPPorts = [80 443];
··· 12 in { 13 nixosModules = { 14 firewall = ./firewall; 15 + firewall-hetzner = ./firewall/hetzner; 16 }; 17 checks = 18 l.mapAttrs 19 (_: pkgs: { 20 + firewall-hetzner-app = import ./firewall/hetzner/app.nix { 21 inherit pkgs; 22 taggedPorts = { 23 http.allowedTCPPorts = [80 443];