remove piped; update flake
This commit is contained in:
parent
af686d8240
commit
d15de2f221
111
flake.lock
111
flake.lock
|
@ -39,19 +39,17 @@
|
||||||
"flake-compat": [
|
"flake-compat": [
|
||||||
"flake-compat"
|
"flake-compat"
|
||||||
],
|
],
|
||||||
"nixpkgs": [
|
"nixpkgs": "nixpkgs",
|
||||||
"nixpkgs-unstable"
|
|
||||||
],
|
|
||||||
"utils": [
|
"utils": [
|
||||||
"flake-utils"
|
"flake-utils"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699701798,
|
"lastModified": 1701095034,
|
||||||
"narHash": "sha256-goytj9Wm1onHgdr8UoUnQ0pLwCDSsyUqonE3sbu2nUw=",
|
"narHash": "sha256-up8JguDsMgvf3umpcH6P9iD/R6TqCrcB3rhlsOTLKYU=",
|
||||||
"ref": "refs/heads/hungy",
|
"ref": "refs/heads/hungy",
|
||||||
"rev": "d6466a95059de3df3d5947a49d73833e9992c28f",
|
"rev": "1cca07d244e18ea1c1c0d48016fa3e4b581bf224",
|
||||||
"revCount": 55,
|
"revCount": 57,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://forgejo.owo.monster/chaos/food-site"
|
"url": "https://forgejo.owo.monster/chaos/food-site"
|
||||||
},
|
},
|
||||||
|
@ -67,11 +65,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699663185,
|
"lastModified": 1701071203,
|
||||||
"narHash": "sha256-hI3CZPINBWstkMN+ptyzWibw5eRtFCiEvO7zR61bGBs=",
|
"narHash": "sha256-lQywA7QU/vzTdZ1apI0PfgCWNyQobXUYghVrR5zuIeM=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "691cbcc03af6ad1b5384c0e0e0b5f2298f58c5ce",
|
"rev": "db1878f013b52ba5e4034db7c1b63e8d04173a86",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -85,17 +83,17 @@
|
||||||
"flake-compat": [
|
"flake-compat": [
|
||||||
"flake-compat"
|
"flake-compat"
|
||||||
],
|
],
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs_2",
|
||||||
"utils": [
|
"utils": [
|
||||||
"flake-utils"
|
"flake-utils"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699704512,
|
"lastModified": 1701094124,
|
||||||
"narHash": "sha256-kAyPmOuU3zXH9j3Yl0lPaC/DNJULXh1dlONuB6SivAw=",
|
"narHash": "sha256-4nZrZe/rzxmp+H2JrfLWVkwNGzvx0nVVWcfcF1AEb9I=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "9f48d9eab50549f5191ca5c8fc91dd311dcaf364",
|
"rev": "8f935b84929eb6ea4577b015b9b4ef4e86ee69ce",
|
||||||
"revCount": 109,
|
"revCount": 116,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://forgejo.owo.monster/chaos/musicutil"
|
"url": "https://forgejo.owo.monster/chaos/musicutil"
|
||||||
},
|
},
|
||||||
|
@ -117,11 +115,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699549513,
|
"lastModified": 1700665566,
|
||||||
"narHash": "sha256-cfsghOs6Cr61wFsxkWonK8AwPwHaRGZ6QkbasUgygh4=",
|
"narHash": "sha256-+AU2AdpA2eHlVwH3LL1qCWCTJyOJwCw/7pwampP3Jy8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "NixOS-WSL",
|
"repo": "NixOS-WSL",
|
||||||
"rev": "0e4c17efebff955471f169fffbb7e8cd62ada498",
|
"rev": "a9287f7191467138d6203ea44b3a0b9c745cb145",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -132,11 +130,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699099776,
|
"lastModified": 1700794826,
|
||||||
"narHash": "sha256-X09iKJ27mGsGambGfkKzqvw5esP1L/Rf8H3u3fCqIiU=",
|
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "85f1ba3e51676fa8cc604a3d863d729026a6b8eb",
|
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -148,11 +146,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs-unstable": {
|
"nixpkgs-unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699099776,
|
"lastModified": 1700794826,
|
||||||
"narHash": "sha256-X09iKJ27mGsGambGfkKzqvw5esP1L/Rf8H3u3fCqIiU=",
|
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "85f1ba3e51676fa8cc604a3d863d729026a6b8eb",
|
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -164,11 +162,27 @@
|
||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699099776,
|
"lastModified": 1700794826,
|
||||||
"narHash": "sha256-X09iKJ27mGsGambGfkKzqvw5esP1L/Rf8H3u3fCqIiU=",
|
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "85f1ba3e51676fa8cc604a3d863d729026a6b8eb",
|
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_3": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1700794826,
|
||||||
|
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -180,11 +194,11 @@
|
||||||
},
|
},
|
||||||
"nur": {
|
"nur": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699696572,
|
"lastModified": 1701085559,
|
||||||
"narHash": "sha256-hnHyp2T4pkuj5xdkj/ZZme/ppmNJff47BcPRxwcJP00=",
|
"narHash": "sha256-BHT8Zxl/4iQ4NQ8N+fvJhi+LoblGNUz8p+axv40RDjY=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "NUR",
|
"repo": "NUR",
|
||||||
"rev": "2999af35ec973a0001ca92bb56b037ae18869f22",
|
"rev": "5b543aa25fdc06ae3f60c45acc050bd0876541bc",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -193,32 +207,6 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"piped-flake": {
|
|
||||||
"inputs": {
|
|
||||||
"flake-compat": [
|
|
||||||
"flake-compat"
|
|
||||||
],
|
|
||||||
"nixpkgs": [
|
|
||||||
"nixpkgs-unstable"
|
|
||||||
],
|
|
||||||
"utils": [
|
|
||||||
"flake-utils"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1697479170,
|
|
||||||
"narHash": "sha256-TF5LZDLY/WMDcQ/kexL3+fZ9lw9p9h16htloC1CcQLA=",
|
|
||||||
"ref": "refs/heads/main",
|
|
||||||
"rev": "d2344c2b4ae8216c286d762f367a49fe3fc8b306",
|
|
||||||
"revCount": 23,
|
|
||||||
"type": "git",
|
|
||||||
"url": "https://forgejo.owo.monster/chaos/piped-flake"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"type": "git",
|
|
||||||
"url": "https://forgejo.owo.monster/chaos/piped-flake"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": "flake-compat",
|
"flake-compat": "flake-compat",
|
||||||
|
@ -229,7 +217,6 @@
|
||||||
"nixos-wsl": "nixos-wsl",
|
"nixos-wsl": "nixos-wsl",
|
||||||
"nixpkgs-unstable": "nixpkgs-unstable",
|
"nixpkgs-unstable": "nixpkgs-unstable",
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"piped-flake": "piped-flake",
|
|
||||||
"tree-input": "tree-input",
|
"tree-input": "tree-input",
|
||||||
"vaultui": "vaultui"
|
"vaultui": "vaultui"
|
||||||
}
|
}
|
||||||
|
@ -290,17 +277,17 @@
|
||||||
"flake-compat": [
|
"flake-compat": [
|
||||||
"flake-compat"
|
"flake-compat"
|
||||||
],
|
],
|
||||||
"nixpkgs": "nixpkgs_2",
|
"nixpkgs": "nixpkgs_3",
|
||||||
"utils": [
|
"utils": [
|
||||||
"flake-utils"
|
"flake-utils"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699703627,
|
"lastModified": 1701095009,
|
||||||
"narHash": "sha256-DEzQZFUFJWmpqHKHDAynd7onl1EwEow7VIUhRInQ80M=",
|
"narHash": "sha256-hV9R/ZCXL9cZ78TZSkO6TUfuwx/E2K13k2kcoGDgGBc=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "e392ef0e0393b282c9250726238c4839d4cdb792",
|
"rev": "6b0eada62567711299750ae2b708ae30318c8ff9",
|
||||||
"revCount": 461,
|
"revCount": 462,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://forgejo.owo.monster/chaos/VaultUI"
|
"url": "https://forgejo.owo.monster/chaos/VaultUI"
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,8 @@
|
||||||
musicutil.inputs.utils.follows = "flake-utils";
|
musicutil.inputs.utils.follows = "flake-utils";
|
||||||
musicutil.inputs.flake-compat.follows = "flake-compat";
|
musicutil.inputs.flake-compat.follows = "flake-compat";
|
||||||
|
|
||||||
piped-flake.url = "git+https://forgejo.owo.monster/chaos/piped-flake";
|
|
||||||
piped-flake.inputs.nixpkgs.follows = "nixpkgs-unstable";
|
|
||||||
piped-flake.inputs.utils.follows = "flake-utils";
|
|
||||||
piped-flake.inputs.flake-compat.follows = "flake-compat";
|
|
||||||
|
|
||||||
food-site.url = "git+https://forgejo.owo.monster/chaos/food-site";
|
food-site.url = "git+https://forgejo.owo.monster/chaos/food-site";
|
||||||
food-site.inputs.nixpkgs.follows = "nixpkgs-unstable";
|
#food-site.inputs.nixpkgs.follows = "nixpkgs-unstable";
|
||||||
food-site.inputs.utils.follows = "flake-utils";
|
food-site.inputs.utils.follows = "flake-utils";
|
||||||
food-site.inputs.flake-compat.follows = "flake-compat";
|
food-site.inputs.flake-compat.follows = "flake-compat";
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,70 +0,0 @@
|
||||||
{
|
|
||||||
self,
|
|
||||||
hostPath,
|
|
||||||
tree,
|
|
||||||
inputs,
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
pipedName = "piped-fi";
|
|
||||||
containerName = pipedName;
|
|
||||||
|
|
||||||
containerAddresses = import "${hostPath}/data/containerAddresses.nix";
|
|
||||||
hostIP = containerAddresses.host;
|
|
||||||
containerIP = containerAddresses.containers.${containerName};
|
|
||||||
|
|
||||||
pipedSocketForComponent = (
|
|
||||||
component: "/var/lib/nixos-containers/${containerName}/var/sockets/piped-${component}.sock"
|
|
||||||
);
|
|
||||||
in {
|
|
||||||
containers.${containerName} = {
|
|
||||||
autoStart = true;
|
|
||||||
privateNetwork = true;
|
|
||||||
hostAddress = hostIP;
|
|
||||||
localAddress = containerIP;
|
|
||||||
|
|
||||||
specialArgs = {
|
|
||||||
inherit inputs;
|
|
||||||
inherit tree;
|
|
||||||
inherit self;
|
|
||||||
inherit hostPath;
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {...}: {
|
|
||||||
nixpkgs.pkgs = pkgs;
|
|
||||||
|
|
||||||
imports = with tree; [
|
|
||||||
presets.nixos.containerBase
|
|
||||||
presets.nixos.pipedNode
|
|
||||||
];
|
|
||||||
|
|
||||||
home-manager.users.root.home.stateVersion = "23.05";
|
|
||||||
system.stateVersion = "23.05";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "frontend"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."backend.${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "backend"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."proxy.${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "proxy"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -12,15 +12,10 @@ in {
|
||||||
enable = true;
|
enable = true;
|
||||||
enableTCPIP = true;
|
enableTCPIP = true;
|
||||||
ensureDatabases = [
|
ensureDatabases = [
|
||||||
"piped"
|
|
||||||
"gotosocial"
|
"gotosocial"
|
||||||
"quassel"
|
"quassel"
|
||||||
];
|
];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
|
||||||
name = "piped";
|
|
||||||
ensurePermissions."DATABASE piped" = "ALL PRIVILEGES";
|
|
||||||
}
|
|
||||||
{
|
{
|
||||||
name = "gotosocial";
|
name = "gotosocial";
|
||||||
ensurePermissions."DATABASE gotosocial" = "ALL PRIVILEGES";
|
ensurePermissions."DATABASE gotosocial" = "ALL PRIVILEGES";
|
||||||
|
@ -33,9 +28,6 @@ in {
|
||||||
# If the host is a local container then use the container's IP
|
# If the host is a local container then use the container's IP
|
||||||
# otherwise use the host's IP
|
# otherwise use the host's IP
|
||||||
authentication = ''
|
authentication = ''
|
||||||
host piped piped ${localContainersAddresses.containers."piped-fi"}/32 trust
|
|
||||||
host piped piped ${wireguardHosts."raspberry".ip}/32 trust
|
|
||||||
|
|
||||||
host gotosocial gotosocial ${localContainersAddresses.containers."social"}/32 trust
|
host gotosocial gotosocial ${localContainersAddresses.containers."social"}/32 trust
|
||||||
host quassel quassel ${localContainersAddresses.containers."quassel"}/32 trust
|
host quassel quassel ${localContainersAddresses.containers."quassel"}/32 trust
|
||||||
'';
|
'';
|
||||||
|
|
|
@ -7,7 +7,6 @@
|
||||||
|
|
||||||
backupPrepareCommand = "${
|
backupPrepareCommand = "${
|
||||||
(pkgs.writeShellScriptBin "backupPrepareCommand" ''
|
(pkgs.writeShellScriptBin "backupPrepareCommand" ''
|
||||||
systemctl start remotePostgreSQLBackup-piped --wait
|
|
||||||
systemctl start remotePostgreSQLBackup-gotosocial --wait
|
systemctl start remotePostgreSQLBackup-gotosocial --wait
|
||||||
systemctl start remotePostgreSQLBackup-quassel --wait
|
systemctl start remotePostgreSQLBackup-quassel --wait
|
||||||
'')
|
'')
|
||||||
|
@ -51,7 +50,6 @@ in {
|
||||||
enable = true;
|
enable = true;
|
||||||
backupUser = "postgres";
|
backupUser = "postgres";
|
||||||
databases = [
|
databases = [
|
||||||
"piped"
|
|
||||||
"gotosocial"
|
"gotosocial"
|
||||||
"quassel"
|
"quassel"
|
||||||
];
|
];
|
||||||
|
|
|
@ -7,9 +7,8 @@
|
||||||
quassel = "10.0.1.5";
|
quassel = "10.0.1.5";
|
||||||
forgejo = "10.0.1.6";
|
forgejo = "10.0.1.6";
|
||||||
postgresql = "10.0.1.7";
|
postgresql = "10.0.1.7";
|
||||||
piped-fi = "10.0.1.8";
|
caldav = "10.0.1.8";
|
||||||
caldav = "10.0.1.9";
|
owncast = "10.0.1.9";
|
||||||
owncast = "10.0.1.10";
|
jellyfin = "10.0.1.10";
|
||||||
jellyfin = "10.0.1.11";
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,7 +25,6 @@ in {
|
||||||
"music"
|
"music"
|
||||||
"quassel"
|
"quassel"
|
||||||
"postgresql"
|
"postgresql"
|
||||||
"piped-fi"
|
|
||||||
"mail"
|
"mail"
|
||||||
"forgejo"
|
"forgejo"
|
||||||
"caldav"
|
"caldav"
|
||||||
|
|
|
@ -32,7 +32,6 @@
|
||||||
inputs.nixos-wsl.nixosModules.default
|
inputs.nixos-wsl.nixosModules.default
|
||||||
|
|
||||||
inputs.vaultui.nixosModules.default
|
inputs.vaultui.nixosModules.default
|
||||||
inputs.piped-flake.nixosModules.default
|
|
||||||
|
|
||||||
tree.modules.nixos.rcloneServe
|
tree.modules.nixos.rcloneServe
|
||||||
tree.modules.nixos.rcloneSync
|
tree.modules.nixos.rcloneSync
|
||||||
|
|
|
@ -1,69 +0,0 @@
|
||||||
{
|
|
||||||
self,
|
|
||||||
hostPath,
|
|
||||||
tree,
|
|
||||||
inputs,
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
inherit (lib.modules) mkForce;
|
|
||||||
|
|
||||||
pipedName = "piped-uk";
|
|
||||||
containerName = pipedName;
|
|
||||||
|
|
||||||
pipedSocketForComponent = (
|
|
||||||
component: "/var/lib/nixos-containers/${containerName}/var/sockets/piped-${component}.sock"
|
|
||||||
);
|
|
||||||
in {
|
|
||||||
containers.${containerName} = {
|
|
||||||
autoStart = true;
|
|
||||||
privateNetwork = false;
|
|
||||||
|
|
||||||
specialArgs = {
|
|
||||||
inherit inputs;
|
|
||||||
inherit tree;
|
|
||||||
inherit self;
|
|
||||||
inherit hostPath;
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {...}: {
|
|
||||||
nixpkgs.pkgs = pkgs;
|
|
||||||
|
|
||||||
imports = with tree; [
|
|
||||||
presets.nixos.containerBase
|
|
||||||
presets.nixos.pipedNode
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.firewall.enable = mkForce false;
|
|
||||||
|
|
||||||
home-manager.users.root.home.stateVersion = "23.05";
|
|
||||||
system.stateVersion = "23.05";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "frontend"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."backend.${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "backend"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."proxy.${pipedName}.owo.monster" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://unix:${pipedSocketForComponent "proxy"}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -8,8 +8,6 @@
|
||||||
|
|
||||||
profiles.chaosInternalWireGuard
|
profiles.chaosInternalWireGuard
|
||||||
|
|
||||||
./containers/piped-uk/default.nix
|
|
||||||
|
|
||||||
./secrets.nix
|
./secrets.nix
|
||||||
./boot.nix
|
./boot.nix
|
||||||
]
|
]
|
||||||
|
|
|
@ -22,9 +22,6 @@ in
|
||||||
config.allowUnfree = true;
|
config.allowUnfree = true;
|
||||||
overlays = [
|
overlays = [
|
||||||
(import ./overlay)
|
(import ./overlay)
|
||||||
(import ./overlay/piped-overlay.nix {
|
|
||||||
inherit (inputs) piped-flake;
|
|
||||||
})
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
|
@ -57,7 +54,6 @@ in
|
||||||
inherit (pkgs) comic-code comic-sans;
|
inherit (pkgs) comic-code comic-sans;
|
||||||
inherit (pkgs) mk-enc-usb mk-encrypted-drive mk-raspberry-ext-drive;
|
inherit (pkgs) mk-enc-usb mk-encrypted-drive mk-raspberry-ext-drive;
|
||||||
inherit (pkgs) gotosocial mpd-headless owncast;
|
inherit (pkgs) gotosocial mpd-headless owncast;
|
||||||
inherit (pkgs) piped-backend piped-frontend piped-proxy;
|
|
||||||
inherit (pkgs) kitty-terminfo;
|
inherit (pkgs) kitty-terminfo;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -162,10 +158,6 @@ in
|
||||||
hasHostSecrets = doesHaveHostSecrets "vault";
|
hasHostSecrets = doesHaveHostSecrets "vault";
|
||||||
sshAddress = "vault.servers.genderfucked.monster";
|
sshAddress = "vault.servers.genderfucked.monster";
|
||||||
};
|
};
|
||||||
#"raspberry" = {
|
|
||||||
# containers = ["piped-uk"];
|
|
||||||
# sshAddress = "raspberry.servers.genderfucked.monster";
|
|
||||||
#};
|
|
||||||
"lappy-t495" = configForMachine "lappy-t495";
|
"lappy-t495" = configForMachine "lappy-t495";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -1,27 +0,0 @@
|
||||||
{piped-flake}: (prev: final: let
|
|
||||||
system = final.system;
|
|
||||||
piped-flake-pkgs = piped-flake.packages.${system};
|
|
||||||
in {
|
|
||||||
inherit (piped-flake-pkgs) piped-frontend;
|
|
||||||
inherit (piped-flake-pkgs) piped-proxy piped-proxy-openssl;
|
|
||||||
inherit (piped-flake-pkgs) piped-proxy-full piped-proxy-full-openssl;
|
|
||||||
inherit (piped-flake-pkgs) piped-proxy-minimal piped-proxy-minimal-openssl;
|
|
||||||
|
|
||||||
# Won't build due to this; added a native-arm64 to all builders on arm64
|
|
||||||
# https://github.com/NixOS/nixpkgs/issues/255780
|
|
||||||
piped-backend =
|
|
||||||
(piped-flake-pkgs.piped-backend.override (prev: {
|
|
||||||
piped-backend-deps = prev.piped-backend-deps.overrideAttrs {
|
|
||||||
requiredSystemFeatures =
|
|
||||||
if system == "aarch64-linux"
|
|
||||||
then ["native-arm64"]
|
|
||||||
else [];
|
|
||||||
};
|
|
||||||
}))
|
|
||||||
.overrideAttrs {
|
|
||||||
requiredSystemFeatures =
|
|
||||||
if system == "aarch64-linux"
|
|
||||||
then ["native-arm64"]
|
|
||||||
else [];
|
|
||||||
};
|
|
||||||
})
|
|
|
@ -17,7 +17,6 @@
|
||||||
# Default modules which are usually included in nixos.nix
|
# Default modules which are usually included in nixos.nix
|
||||||
inputs.home-manager-unstable.nixosModules.home-manager
|
inputs.home-manager-unstable.nixosModules.home-manager
|
||||||
inputs.vaultui.nixosModules.default
|
inputs.vaultui.nixosModules.default
|
||||||
inputs.piped-flake.nixosModules.default
|
|
||||||
];
|
];
|
||||||
|
|
||||||
home-manager.users.root = {
|
home-manager.users.root = {
|
||||||
|
|
|
@ -1,122 +0,0 @@
|
||||||
{
|
|
||||||
self,
|
|
||||||
config,
|
|
||||||
tree,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
inherit (builtins) attrNames elem;
|
|
||||||
|
|
||||||
hostName = config.networking.hostName;
|
|
||||||
|
|
||||||
hetznerARMContainerAddresses = import "${self}/hosts/hetzner-arm/data/containerAddresses.nix";
|
|
||||||
|
|
||||||
defaultPorts = {
|
|
||||||
internalPipedBackend = 3012;
|
|
||||||
internalPipedProxy = 3013;
|
|
||||||
|
|
||||||
internalNginxPort = 8199;
|
|
||||||
};
|
|
||||||
|
|
||||||
hostConfigs = {
|
|
||||||
"piped-fi" = {
|
|
||||||
baseDomain = "piped-fi.owo.monster";
|
|
||||||
ports = defaultPorts;
|
|
||||||
};
|
|
||||||
"piped-uk" = {
|
|
||||||
baseDomain = "piped-uk.owo.monster";
|
|
||||||
ports = defaultPorts;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
hostConfig =
|
|
||||||
if elem hostName (attrNames hostConfigs)
|
|
||||||
then hostConfigs.${hostName}
|
|
||||||
else throw "host isn't configured for piped node";
|
|
||||||
|
|
||||||
inherit (hostConfig) baseDomain ports;
|
|
||||||
in {
|
|
||||||
imports = with tree; [
|
|
||||||
profiles.nginx
|
|
||||||
];
|
|
||||||
|
|
||||||
services.piped = {
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
frontend = {
|
|
||||||
domain = "${baseDomain}";
|
|
||||||
|
|
||||||
nginx = {
|
|
||||||
forceSSL = false;
|
|
||||||
enableACME = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
backend = {
|
|
||||||
domain = "backend.${baseDomain}";
|
|
||||||
internalPort = ports.internalPipedBackend;
|
|
||||||
|
|
||||||
nginx = {
|
|
||||||
forceSSL = false;
|
|
||||||
enableACME = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
settings = {
|
|
||||||
disableRegistrations = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
database = {
|
|
||||||
disablePostgresDB = true;
|
|
||||||
name = "piped";
|
|
||||||
username = "piped";
|
|
||||||
usePassword = false;
|
|
||||||
host = hetznerARMContainerAddresses.containers.postgresql;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
proxy = {
|
|
||||||
domain = "proxy.${baseDomain}";
|
|
||||||
internalPort = ports.internalPipedProxy;
|
|
||||||
package = pkgs.piped-proxy-minimal-openssl;
|
|
||||||
nginx = {
|
|
||||||
forceSSL = false;
|
|
||||||
enableACME = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
|
||||||
"d /var/sockets - nginx nginx"
|
|
||||||
];
|
|
||||||
|
|
||||||
systemd.services.nginx = {
|
|
||||||
serviceConfig.ReadWritePaths = [
|
|
||||||
"/var/sockets"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts = let
|
|
||||||
componentPath = component: "/var/sockets/piped-${component}.sock";
|
|
||||||
listen = [
|
|
||||||
{
|
|
||||||
addr = "127.0.0.1";
|
|
||||||
port = ports.internalNginxPort;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
in {
|
|
||||||
"${baseDomain}" = {
|
|
||||||
inherit listen;
|
|
||||||
extraConfig = "listen unix:${componentPath "frontend"};";
|
|
||||||
};
|
|
||||||
|
|
||||||
"backend.${baseDomain}" = {
|
|
||||||
inherit listen;
|
|
||||||
extraConfig = "listen unix:${componentPath "backend"};";
|
|
||||||
};
|
|
||||||
|
|
||||||
"proxy.${baseDomain}" = {
|
|
||||||
inherit listen;
|
|
||||||
extraConfig = "listen unix:${componentPath "proxy"};";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -27,9 +27,6 @@ in {
|
||||||
};
|
};
|
||||||
overlays = [
|
overlays = [
|
||||||
(import ../../overlay)
|
(import ../../overlay)
|
||||||
(import ../../overlay/piped-overlay.nix {
|
|
||||||
inherit (inputs) piped-flake;
|
|
||||||
})
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
environment.etc."nixpkgs-commit".text = inputs.nixpkgs-unstable.rev;
|
environment.etc."nixpkgs-commit".text = inputs.nixpkgs-unstable.rev;
|
||||||
|
|
|
@ -1 +0,0 @@
|
||||||
nix build --system aarch64-linux .#piped-backend --builders "ssh://root@raspberry.servers.genderfucked.monster?ssh-key=/usb/ssh-keys/chaos.priv aarch64-linux - 2 2 nixos-test,benchmark,big-parallel,kvm - c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSUJhZlp5bitQcUtBclVYZ1VNdCszaDQvRU5kbWVUNWx3YXBPUm5lZXZ2eVIgcm9vdEByYXNwYmVycnkK#" --max-jobs 0 --builders-use-substitutes
|
|
|
@ -4,6 +4,4 @@ SCRIPT_DIR=$( cd -- "$( dirname -- "${BASH_SOURCE[0]}" )" &> /dev/null && pwd )
|
||||||
REPO_ROOT="${SCRIPT_DIR}/.."
|
REPO_ROOT="${SCRIPT_DIR}/.."
|
||||||
cd $REPO_ROOT
|
cd $REPO_ROOT
|
||||||
|
|
||||||
# TODO
|
|
||||||
#./overlay/piped/update.sh
|
|
||||||
nix flake update
|
nix flake update
|
||||||
|
|
Loading…
Reference in a new issue