Compare commits
8 commits
4c05f0767f
...
2a7f905bc2
Author | SHA1 | Date | |
---|---|---|---|
2a7f905bc2 | |||
Tristan Daniël Maat | a24c68d9db | ||
Tristan Daniël Maat | 343c7fcc36 | ||
Tristan Daniël Maat | 5f8899d542 | ||
Tristan Daniël Maat | b8bf3bd3a2 | ||
Tristan Daniël Maat | 458f6c7f7b | ||
Tristan Daniël Maat | 517f4f0080 | ||
Tristan Daniël Maat | 2d61711e07 |
|
@ -1,4 +1,4 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
@ -55,19 +55,21 @@
|
||||||
recommendedGzipSettings = true;
|
recommendedGzipSettings = true;
|
||||||
recommendedProxySettings = true;
|
recommendedProxySettings = true;
|
||||||
clientMaxBodySize = "10G";
|
clientMaxBodySize = "10G";
|
||||||
|
domain = "tlater.net";
|
||||||
|
|
||||||
virtualHosts = let
|
virtualHosts = let
|
||||||
host = port: extra:
|
host = port: extra:
|
||||||
{
|
lib.recursiveUpdate {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations."/" = { proxyPass = "http://127.0.0.1:${toString port}"; };
|
locations."/" = { proxyPass = "http://127.0.0.1:${toString port}"; };
|
||||||
} // extra;
|
} extra;
|
||||||
|
domain = config.services.nginx.domain;
|
||||||
in {
|
in {
|
||||||
"tlater.net" = host 3002 { serverAliases = [ "www.tlater.net" ]; };
|
"${domain}" = host 3002 { serverAliases = [ "www.${domain}" ]; };
|
||||||
"gitea.tlater.net" = host 3000 { };
|
"gitea.${domain}" = host 3000 { };
|
||||||
"nextcloud.tlater.net" = host 3001 { };
|
"nextcloud.${domain}" = host 3001 { };
|
||||||
"hydra.tlater.net" = host config.services.hydra.port { };
|
"hydra.${domain}" = host config.services.hydra.port { };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,7 @@
|
||||||
virtualisation.pods.gitea = {
|
virtualisation.pods.gitea = {
|
||||||
hostname = "gitea.tlater.net";
|
hostname = "gitea.tlater.net";
|
||||||
publish = [ "3000:3000" "2221:2221" ];
|
publish = [ "3000:3000" "2221:2221" ];
|
||||||
|
network = "slirp4netns";
|
||||||
|
|
||||||
containers = {
|
containers = {
|
||||||
gitea = {
|
gitea = {
|
||||||
|
@ -26,7 +27,6 @@
|
||||||
DB_HOST = "gitea-postgres:5432";
|
DB_HOST = "gitea-postgres:5432";
|
||||||
DB_NAME = "gitea";
|
DB_NAME = "gitea";
|
||||||
DB_USER = "gitea";
|
DB_USER = "gitea";
|
||||||
DB_PASSWD = "/qNDDK9WCMuubfA7D8DFwfl9T+Gy2IMDvPhiNpcxZjY=";
|
|
||||||
|
|
||||||
USER_UID = toString config.users.extraUsers.gitea.uid;
|
USER_UID = toString config.users.extraUsers.gitea.uid;
|
||||||
USER_GID = toString config.users.extraGroups.gitea.gid;
|
USER_GID = toString config.users.extraGroups.gitea.gid;
|
||||||
|
@ -42,7 +42,6 @@
|
||||||
environment = {
|
environment = {
|
||||||
POSTGRES_DB = "gitea";
|
POSTGRES_DB = "gitea";
|
||||||
POSTGRES_USER = "gitea";
|
POSTGRES_USER = "gitea";
|
||||||
POSTGRES_PASSWORD = "/qNDDK9WCMuubfA7D8DFwfl9T+Gy2IMDvPhiNpcxZjY=";
|
|
||||||
};
|
};
|
||||||
volumes = [ "gitea-db-data:/var/lib/postgresql/data" ];
|
volumes = [ "gitea-db-data:/var/lib/postgresql/data" ];
|
||||||
};
|
};
|
||||||
|
|
|
@ -7,5 +7,10 @@
|
||||||
|
|
||||||
hydraURL = "hydra.tlater.net";
|
hydraURL = "hydra.tlater.net";
|
||||||
notificationSender = "hydra@tlater.net";
|
notificationSender = "hydra@tlater.net";
|
||||||
|
extraConfig = ''
|
||||||
|
<gitea_authorization>
|
||||||
|
|
||||||
|
</gitea_authorization>
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
minecraft-server-args = [
|
minecraft-server-args = [
|
||||||
|
@ -52,7 +52,7 @@ let
|
||||||
|
|
||||||
in {
|
in {
|
||||||
nixpkgs.config.allowUnfreePredicate = pkg:
|
nixpkgs.config.allowUnfreePredicate = pkg:
|
||||||
builtins.elem (pkgs.lib.getName pkg) [ "forge-server" ];
|
builtins.elem (lib.getName pkg) [ "forge-server" ];
|
||||||
|
|
||||||
virtualisation.oci-containers.containers.minecraft-voor-kia = let
|
virtualisation.oci-containers.containers.minecraft-voor-kia = let
|
||||||
properties = ./configs/minecraft/voor-kia/server.properties;
|
properties = ./configs/minecraft/voor-kia/server.properties;
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
virtualisation.pods.nextcloud = {
|
virtualisation.pods.nextcloud = {
|
||||||
hostname = "nextcloud.tlater.net";
|
hostname = "nextcloud.tlater.net";
|
||||||
publish = [ "3001:80" ];
|
publish = [ "3001:80" ];
|
||||||
|
network = "slirp4netns";
|
||||||
|
|
||||||
containers = {
|
containers = {
|
||||||
nextcloud = {
|
nextcloud = {
|
||||||
|
@ -18,7 +19,6 @@
|
||||||
POSTGRES_DB = "nextcloud";
|
POSTGRES_DB = "nextcloud";
|
||||||
POSTGRES_USER = "nextcloud";
|
POSTGRES_USER = "nextcloud";
|
||||||
POSTGRES_HOST = "nextcloud-postgres";
|
POSTGRES_HOST = "nextcloud-postgres";
|
||||||
POSTGRES_PASSWORD = "rI7t7Nek1yGA9ucrRc7Uhy0jcjwPjnXa8me4o8tJON8=";
|
|
||||||
OVERWRITEPROTOCOL = "https";
|
OVERWRITEPROTOCOL = "https";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -43,7 +43,6 @@
|
||||||
environment = {
|
environment = {
|
||||||
POSTGRES_DB = "nextcloud";
|
POSTGRES_DB = "nextcloud";
|
||||||
POSTGRES_USER = "nextcloud";
|
POSTGRES_USER = "nextcloud";
|
||||||
POSTGRES_PASSWORD = "rI7t7Nek1yGA9ucrRc7Uhy0jcjwPjnXa8me4o8tJON8=";
|
|
||||||
};
|
};
|
||||||
volumes = [ "nextcloud-db-data:/var/lib/postgresql/data" ];
|
volumes = [ "nextcloud-db-data:/var/lib/postgresql/data" ];
|
||||||
};
|
};
|
||||||
|
|
|
@ -34,6 +34,10 @@
|
||||||
|
|
||||||
ports = [ "3002:3002" ];
|
ports = [ "3002:3002" ];
|
||||||
volumes = [ "tlaternet-mail:/srv/mail" ];
|
volumes = [ "tlaternet-mail:/srv/mail" ];
|
||||||
extraOptions = [ "--hostname=tlater.net" ];
|
extraOptions = [
|
||||||
|
"--hostname=tlater.net"
|
||||||
|
# This can change with rocket 0.5.
|
||||||
|
"--stop-signal=SIGKILL"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
18
flake.lock
18
flake.lock
|
@ -2,11 +2,11 @@
|
||||||
"nodes": {
|
"nodes": {
|
||||||
"flake-utils": {
|
"flake-utils": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1619345332,
|
"lastModified": 1620759905,
|
||||||
"narHash": "sha256-qHnQkEp1uklKTpx3MvKtY6xzgcqXDsz5nLilbbuL+3A=",
|
"narHash": "sha256-WiyWawrgmyN0EdmiHyG2V+fqReiVi8bM9cRdMaKQOFg=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "flake-utils",
|
"repo": "flake-utils",
|
||||||
"rev": "2ebf2558e5bf978c7fb8ea927dfaed8fefab2e28",
|
"rev": "b543720b25df6ffdfcf9227afafc5b8c1fabfae8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -37,11 +37,11 @@
|
||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1619336929,
|
"lastModified": 1620983891,
|
||||||
"narHash": "sha256-joIC2D26jtSbHodR/o8r+5T9XL2hXs6NIp5mVyA4JOc=",
|
"narHash": "sha256-E2OKVgGo/cUqDsrIeYGVx64b4cxgzd7+bX33NHL0rbA=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "f7540d6c27704ec0fe56ecc8b2a9b663181850b0",
|
"rev": "c4399b921fa7ff5f93ee10b3521b56b722ed74d8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -53,11 +53,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1619486598,
|
"lastModified": 1621088295,
|
||||||
"narHash": "sha256-ZEvJ+uItcKLQ9uSjGbQFE6Euu9w1Y98x0TWydXIgHAI=",
|
"narHash": "sha256-hn8Rk6o5nRbWK/GE+z2OK8DIDIgGxCmVkaXpNYkald0=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "d4e7af972158a14ebdd9c828b1c2e07e2ce7ef1c",
|
"rev": "17d3dab8647a31a00d8a11433a56cc12d84b5ab4",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
18
flake.nix
18
flake.nix
|
@ -68,12 +68,28 @@
|
||||||
(import ./modules)
|
(import ./modules)
|
||||||
|
|
||||||
(import ./configuration)
|
(import ./configuration)
|
||||||
({ ... }: {
|
({ config, lib, ... }: {
|
||||||
users.users.tlater.password = "insecure";
|
users.users.tlater.password = "insecure";
|
||||||
|
|
||||||
# Disable graphical tty so -curses works
|
# Disable graphical tty so -curses works
|
||||||
boot.kernelParams = [ "nomodeset" ];
|
boot.kernelParams = [ "nomodeset" ];
|
||||||
|
|
||||||
|
# Sets the base domain for nginx to localhost so that we
|
||||||
|
# can easily test locally with the VM.
|
||||||
|
services.nginx.domain = lib.mkOverride 99 "localhost";
|
||||||
|
|
||||||
|
# Hydra uses X-Forwarded-Port to figure out how to
|
||||||
|
# include links to static files, but because we redirect
|
||||||
|
# 443 -> 3443 in the vm we need to explicitly set this
|
||||||
|
# (nginx can't see qemu's port redirection).
|
||||||
|
services.nginx.virtualHosts =
|
||||||
|
let domain = config.services.nginx.domain;
|
||||||
|
in {
|
||||||
|
"hydra.${domain}".locations."/".extraConfig = ''
|
||||||
|
proxy_set_header X-Forwarded-Port 3443;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
# # Set up VM settings to match real VPS
|
# # Set up VM settings to match real VPS
|
||||||
# virtualisation.memorySize = 3941;
|
# virtualisation.memorySize = 3941;
|
||||||
# virtualisation.cores = 2;
|
# virtualisation.cores = 2;
|
||||||
|
|
|
@ -1,5 +1,12 @@
|
||||||
{ ... }:
|
{ lib, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [ ./virtualisation/pods.nix ];
|
imports = [ ./virtualisation/pods.nix ];
|
||||||
|
|
||||||
|
options.services.nginx.domain = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
description = "The base domain name to append to virtual domain names";
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue