+1
-1
README.md
+1
-1
README.md
···
6
in your NixOS configuration. for example, `nixosModules.firewall` and
7
`nixosModules.firewall-hetzner`. see `nix flake show` for all available modules.
8
9
-
if not using flakes, you can import `<resource>/` and `<resource>/provider/<provider>`.
10
11
then, you can either use each module's individual `mkApp` config option to
12
generate an app and run it, or you can call `makeApps`:
···
6
in your NixOS configuration. for example, `nixosModules.firewall` and
7
`nixosModules.firewall-hetzner`. see `nix flake show` for all available modules.
8
9
+
if not using flakes, you can import `<resource>/` and `<resource>/<provider>`.
10
11
then, you can either use each module's individual `mkApp` config option to
12
generate an app and run it, or you can call `makeApps`:
firewall/provider/hetzner/app.nix
firewall/hetzner/app.nix
firewall/provider/hetzner/app.nix
firewall/hetzner/app.nix
firewall/provider/hetzner/app.nu
firewall/hetzner/app.nu
firewall/provider/hetzner/app.nu
firewall/hetzner/app.nu
firewall/provider/hetzner/default.nix
firewall/hetzner/default.nix
firewall/provider/hetzner/default.nix
firewall/hetzner/default.nix
firewall/provider/hetzner/rules.nix
firewall/hetzner/rules.nix
firewall/provider/hetzner/rules.nix
firewall/hetzner/rules.nix
+2
-2
flake.nix
+2
-2
flake.nix
···
12
in {
13
nixosModules = {
14
firewall = ./firewall;
15
-
firewall-hetzner = ./firewall/provider/hetzner;
16
};
17
checks =
18
l.mapAttrs
19
(_: pkgs: {
20
-
firewall-hetzner-app = import ./firewall/provider/hetzner/app.nix {
21
inherit pkgs;
22
taggedPorts = {
23
http.allowedTCPPorts = [80 443];