mirror of
https://github.com/harryssecret/homelab-nix.git
synced 2025-08-08 22:50:19 +02:00
Compare commits
No commits in common. "65381a0ca484777cfbd0dc76e02d5ffb051cf6de" and "8998b072c39203d60f6f2f21bbd9452cd1332b59" have entirely different histories.
65381a0ca4
...
8998b072c3
15 changed files with 72 additions and 92 deletions
|
@ -1,5 +1,5 @@
|
||||||
U2FsdGVkX1+alugeaL42d1DXdx+FlLJ9RQErEECKiXmHETExGwdgvNOSSjSXfWc0
|
U2FsdGVkX1+pKUtcxhT27nl6afKy5paC7y9iBtZgbq2rnuJebgGFCD0AxE1TOWMV
|
||||||
Mo22lNDdaoVtCK2gcsBqdxxI8Y6RlxuJvznyk7MO3dqT+CYSxbOS8NMfCu7q+NDg
|
RaWwqeK7YaU7MnImh+b7JfR3C7b6OgQz3+V+gGhC8f10e23maH/me3m3SNsxLp4w
|
||||||
zelWePoV+99RmeI7dbkgFrwzw1F3YEXlrTnfmsr72Qb9kje1j9GRaN73Tvc3+PMN
|
BS4SQZzrWc5WHS+QHTCH7tfUyFPYBs8xnfMAN+TGqB/ud0l7ZZ7MRvpU2IHpzoi1
|
||||||
Rq0QmIXluZLSt0z1dfn/lOSY9Q4kB2t/60ErNAC4tL58sK7Dry6G2mjT8pHwOzF8
|
8ek6OT+w/oyXU3o5eVklEuXpTEB2dcGJ41hbXCEDn7ELyfpaF/+Tx5yGGIJ73FvS
|
||||||
yXP1iuae6jhNDmlgoXuH76ktVYdS+nbURWjvt0uFQENyU29+r9pCpJDhExNdvPKX
|
+P2s1wpjWnrHPj78aphmdm8Q/PZ81vDU4/e2nyg4OcHyOPXVVnwhRUWl1Y9/a/sK
|
||||||
|
|
|
@ -1,24 +1,11 @@
|
||||||
{
|
{ config, ... }:
|
||||||
config,
|
|
||||||
secrets,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./backups-repos.nix
|
./backups-repos.nix
|
||||||
];
|
];
|
||||||
sops.secrets.borgRepoPassword = { };
|
sops.secrets.borgRepoPassword = { };
|
||||||
sops.secrets.borgRemoteServerPassword = {
|
sops.secrets.borgRemoteServerPassword = {
|
||||||
sopsFile = "${secrets}/secrets/backup.yaml";
|
sopsFile = "/home/homelab/secrets/backup.yaml";
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets.sshBorgOffsiteBackup = {
|
|
||||||
sopsFile = "${secrets}/secrets/backup.yaml";
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets.borgOffsiteBackupHostKeys = {
|
|
||||||
sopsFile = "${secrets}/secrets/backup.yaml";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services.borgbackup.jobs = {
|
services.borgbackup.jobs = {
|
||||||
|
@ -77,26 +64,25 @@
|
||||||
"/srv/freshrss"
|
"/srv/freshrss"
|
||||||
"/srv/Minecraft"
|
"/srv/Minecraft"
|
||||||
];
|
];
|
||||||
postgresql_databases = [
|
postgres_databases = [
|
||||||
{ name = "forgejo"; }
|
"forgejo"
|
||||||
{ name = "nextcloud"; }
|
"nextcloud"
|
||||||
{ name = "matrix-synapse"; }
|
"matrix-synapse"
|
||||||
];
|
];
|
||||||
exclude_patterns = [ "/home/*/.cache" ];
|
exclude_patterns = [ "/home/*/.cache" ];
|
||||||
encryption_passcommand = "${pkgs.coreutils}/bin/cat /run/secrets/borgRemoteServerPassword";
|
encryption_passcommand = "cat /run/secrets/borgRemoteServerPassword";
|
||||||
ssh_command = "ssh -o GlobalKnownHostsFile=${config.sops.secrets.borgOffsiteBackupHostKeys.path} -i ${config.sops.secrets.sshBorgOffsiteBackup.path}";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.timers."borgmatic" = {
|
systemd.timers.borgmatic = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
unit = "borgmatic.service";
|
||||||
wantedBy = [ "timers.target" ];
|
wantedBy = [ "timers.target" ];
|
||||||
timerConfig = {
|
timerConfig = {
|
||||||
OnCalendar = "*-*-* 03:00:00";
|
OnCalendar = "*-*-* 03:00:00";
|
||||||
Persistent = true;
|
Persistent = true;
|
||||||
WakeSystem = true;
|
WakeSystem = true;
|
||||||
Unit = "borgmatic.service";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,10 +24,6 @@
|
||||||
reverse_proxy :8096
|
reverse_proxy :8096
|
||||||
'';
|
'';
|
||||||
|
|
||||||
"http://media.hypervirtual.world".extraConfig = ''
|
|
||||||
reverse_proxy :8096
|
|
||||||
'';
|
|
||||||
|
|
||||||
"http://slskd.sisyphe.normandy.hypervirtual.world".extraConfig = ''
|
"http://slskd.sisyphe.normandy.hypervirtual.world".extraConfig = ''
|
||||||
reverse_proxy :5030
|
reverse_proxy :5030
|
||||||
'';
|
'';
|
||||||
|
@ -52,7 +48,7 @@
|
||||||
reverse_proxy :3000
|
reverse_proxy :3000
|
||||||
'';
|
'';
|
||||||
|
|
||||||
"http://status.hypervirtual.world".extraConfig = ''
|
"http://status.normandy.hypervirtual.world".extraConfig = ''
|
||||||
reverse_proxy :4000
|
reverse_proxy :4000
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
|
|
@ -28,6 +28,6 @@
|
||||||
ethtool
|
ethtool
|
||||||
networkd-dispatcher
|
networkd-dispatcher
|
||||||
transcrypt
|
transcrypt
|
||||||
libressl_3_9
|
libressl_3_8
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,10 @@
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.arrSuite;
|
cfg = config.arrSuite;
|
||||||
|
@ -32,27 +35,27 @@ in
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
};
|
};
|
||||||
/*
|
/*
|
||||||
#TODO: create duplicated instances of Sonarr.
|
#TODO: create duplicated instances of Sonarr.
|
||||||
systemd.services."sonarrAnime" = {
|
systemd.services."sonarrAnime" = {
|
||||||
enable = true;
|
enable = true;
|
||||||
description = "Duplicated Sonarr instance, for animes";
|
description = "Duplicated Sonarr instance, for animes";
|
||||||
after = [
|
after = [
|
||||||
"syslog.target"
|
"syslog.target"
|
||||||
"network.target"
|
"network.target"
|
||||||
];
|
];
|
||||||
|
|
||||||
path = [ pkgs.sonarr ];
|
path = [ pkgs.sonarr ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
User = "sonarr";
|
User = "sonarr";
|
||||||
ExecStart = "${pkgs.sonarr}/bin/Sonarr -nobrowser -data=/var/lib/sonarrAnime";
|
ExecStart = "${pkgs.sonarr}/bin/Sonarr -nobrowser -data=/var/lib/sonarrAnime";
|
||||||
TimeoutStopSec = "20";
|
TimeoutStopSec = "20";
|
||||||
KillMode = "process";
|
KillMode = "process";
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
};
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
};
|
};
|
||||||
*/
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
};
|
||||||
|
*/
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,7 +16,6 @@
|
||||||
intel-media-sdk # QSV up to 11th gen
|
intel-media-sdk # QSV up to 11th gen
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.jellyfin = {
|
services.jellyfin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
|
|
|
@ -1,17 +1,12 @@
|
||||||
{
|
{ config, lib, ... }:
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
secrets,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.downloads.music;
|
cfg = config.slskd;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options = {
|
options = {
|
||||||
downloads.music.directory = mkOption {
|
slskd.directory = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
default = "/srv/media/Music";
|
default = "/srv/media/Music";
|
||||||
};
|
};
|
||||||
|
@ -19,7 +14,7 @@ in
|
||||||
config = {
|
config = {
|
||||||
|
|
||||||
sops.secrets.slskd = {
|
sops.secrets.slskd = {
|
||||||
sopsFile = "${secrets}/secrets/slskd.env";
|
sopsFile = ../../../secrets/slskd.env;
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -1,17 +1,12 @@
|
||||||
{
|
{ config, lib, ... }:
|
||||||
config,
|
|
||||||
secrets,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.downloads.transmission;
|
cfg = config.transmission;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options = {
|
options = {
|
||||||
downloads.transmission = {
|
transmission = {
|
||||||
directory = mkOption {
|
directory = mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
default = "/srv/Multimedia";
|
default = "/srv/Multimedia";
|
||||||
|
@ -21,7 +16,7 @@ in
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
sops.secrets.transmission = {
|
sops.secrets.transmission = {
|
||||||
sopsFile = "${secrets}/secrets/transmission.json";
|
sopsFile = ../../../secrets/transmission.json;
|
||||||
path = "/var/lib/secrets/transmission/settings.json";
|
path = "/var/lib/secrets/transmission/settings.json";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -14,14 +14,18 @@ in
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
sops.secrets = {
|
sops.secrets = {
|
||||||
freshrss_username = { };
|
freshrss_username = {
|
||||||
freshrss_password = { };
|
sopsFile = ../../secrets/freshrss.yaml;
|
||||||
|
};
|
||||||
|
freshrss_password = {
|
||||||
|
sopsFile = ../../secrets/freshrss.yaml;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.freshrss = {
|
services.freshrss = {
|
||||||
enable = true;
|
enable = true;
|
||||||
language = "fr";
|
language = "fr";
|
||||||
defaultUser = "";
|
defaultUser = config.sops.secrets.freshrss_username;
|
||||||
baseUrl = cfg.url;
|
baseUrl = cfg.url;
|
||||||
passwordFile = config.sops.secrets.freshrss_password.path;
|
passwordFile = config.sops.secrets.freshrss_password.path;
|
||||||
database = {
|
database = {
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
server = {
|
server = {
|
||||||
|
http_addr = "0.0.0.0";
|
||||||
http_port = 3000;
|
http_port = 3000;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,7 +1,6 @@
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
secrets,
|
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
@ -34,7 +33,7 @@ in
|
||||||
#TODO: add Radarr/Sonarr/... api key support
|
#TODO: add Radarr/Sonarr/... api key support
|
||||||
config = {
|
config = {
|
||||||
sops.secrets."homepage" = {
|
sops.secrets."homepage" = {
|
||||||
sopsFile = "${secrets}/secrets/homepage.env";
|
sopsFile = ../../../secrets/homepage.env;
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -221,11 +220,12 @@ in
|
||||||
{
|
{
|
||||||
"Utilitaires" = [
|
"Utilitaires" = [
|
||||||
{
|
{
|
||||||
"Nextcloud" = {
|
"Photoprism" = {
|
||||||
icon = "nextcloud";
|
icon = "photoprism";
|
||||||
description = "Sauvegarde de données";
|
description = "Sauvegarde de photos";
|
||||||
href = "https://cloud.hypervirtual.world";
|
href = "http://${ip}:2342";
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
"4get" = {
|
"4get" = {
|
||||||
|
|
7
features/server/services/i2p.nix
Normal file
7
features/server/services/i2p.nix
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
{
|
||||||
|
services.i2pd = {
|
||||||
|
enable = true;
|
||||||
|
upnp.enable = true;
|
||||||
|
};
|
||||||
|
}
|
|
@ -4,6 +4,7 @@
|
||||||
services.uptime-kuma = {
|
services.uptime-kuma = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
HOST = "0.0.0.0";
|
||||||
PORT = "4000";
|
PORT = "4000";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -8,10 +8,8 @@
|
||||||
alejandra.url = "github:kamadorueda/alejandra/3.0.0";
|
alejandra.url = "github:kamadorueda/alejandra/3.0.0";
|
||||||
alejandra.inputs.nixpkgs.follows = "nixpkgs";
|
alejandra.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|
||||||
nix-secrets = {
|
nix-secrets.url = "git.hypervirtual.world:harry123/nix-secrets.git";
|
||||||
url = "git+https://git.hypervirtual.world/harry123/nix-secrets.git";
|
nix-secrets.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
flake = false;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs =
|
outputs =
|
||||||
|
@ -23,18 +21,15 @@
|
||||||
}@inputs:
|
}@inputs:
|
||||||
let
|
let
|
||||||
username = "harry123";
|
username = "harry123";
|
||||||
secrets = builtins.toString inputs.nix-secrets;
|
|
||||||
|
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
inherit username;
|
inherit username;
|
||||||
inherit secrets;
|
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
nixosConfigurations = {
|
nixosConfigurations = {
|
||||||
sisyphe = nixpkgs.lib.nixosSystem {
|
sisyphe = nixpkgs.lib.nixosSystem {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = specialArgs;
|
|
||||||
modules = [
|
modules = [
|
||||||
./hosts/sisyphe/configuration.nix
|
./hosts/sisyphe/configuration.nix
|
||||||
sops-nix.nixosModules.sops
|
sops-nix.nixosModules.sops
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
secrets,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
|
@ -37,7 +36,6 @@ in
|
||||||
enable = true;
|
enable = true;
|
||||||
allowedTCPPorts = [
|
allowedTCPPorts = [
|
||||||
22 # ssh
|
22 # ssh
|
||||||
80 # http
|
|
||||||
8008 # matrix-synapse
|
8008 # matrix-synapse
|
||||||
8448 # matrix-synapse
|
8448 # matrix-synapse
|
||||||
];
|
];
|
||||||
|
@ -62,5 +60,5 @@ in
|
||||||
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
||||||
sops.age.keyFile = "/var/lib/sops-nix/key.txt";
|
sops.age.keyFile = "/var/lib/sops-nix/key.txt";
|
||||||
sops.age.generateKey = true;
|
sops.age.generateKey = true;
|
||||||
sops.defaultSopsFile = "${secrets}/secrets/secrets.yaml";
|
sops.defaultSopsFile = ../../secrets/secrets.yaml;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue