raffauflabs: enable vaultwarden and homepage
Some checks are pending
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-build / slateport-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run

This commit is contained in:
Aly Raffauf 2024-08-27 14:51:16 -04:00
parent b02c450f9d
commit 4ae9d2ce10
2 changed files with 209 additions and 59 deletions

View file

@ -29,7 +29,7 @@
};
in {
networking = {
firewall.allowedTCPPorts = [80 443 2379 2380 3000 6443];
firewall.allowedTCPPorts = [80 443 2379 2380 3000 6443 61208];
firewall.allowedUDPPorts = [8472];
};
@ -91,12 +91,12 @@ in {
};
};
k3s = {
enable = true;
role = "server";
tokenFile = config.age.secrets.k3s.path;
serverAddr = "https://192.168.0.104:6443";
};
# k3s = {
# enable = true;
# role = "server";
# tokenFile = config.age.secrets.k3s.path;
# serverAddr = "https://192.168.0.104:6443";
# };
navidrome = {
enable = true;
@ -123,7 +123,15 @@ in {
};
};
systemd.services.navidrome.serviceConfig = let
systemd.services = {
glances = {
wantedBy = ["multi-user.target"];
after = ["network.target"];
path = [pkgs.glances];
script = "glances --webserver --bind 0.0.0.0 --port 61208";
};
navidrome.serviceConfig = let
navidromeConfig = builtins.toFile "navidrome.json" (lib.generators.toJSON {} {
Address = "0.0.0.0";
DefaultTheme = "Auto";
@ -163,4 +171,5 @@ in {
--datafolder /var/lib/navidrome/
'';
};
};
}

View file

@ -20,6 +20,7 @@ in {
"bt.${domain}"
"git.${domain}"
"music.${domain}"
"passwords.${domain}"
"plex.${domain}"
"podcasts.${domain}"
domain
@ -39,12 +40,133 @@ in {
bantime = "1h";
};
k3s = {
homepage-dashboard = {
enable = true;
clusterInit = true;
role = "server";
tokenFile = config.age.secrets.k3s.path;
openFirewall = true;
bookmarks = [
# {
# Websites = [
# {
# "Aly Raffauf" = [
# {
# abbr = "AR";
# description = "Personal website and portfolio.";
# href = "https://aly.raffauflabs.com/";
# }
# ];
# }
# ];
# }
];
services = [
{
Websites = [
{
"Aly Raffauf" = {
abbr = "AR";
description = "Personal website and portfolio.";
href = "https://aly.raffauflabs.com/";
};
}
{
"Specular Anomalies" = {
abbr = "SA";
description = "Academic & tech blog.";
href = "https://distort.jp/";
};
}
];
}
{
Media = [
{
"Audiobookshelf" = {
description = "Audiobooks & podcasts.";
href = "https://podcasts.raffauflabs.com";
icon = "audiobookshelf";
};
}
{
"Plex" = {
description = "TV Shows, movies & music.";
href = "https://plex.raffauflabs.com";
icon = "plex";
};
}
{
"Navidrome" = {
description = "Subsonic-compatible music streaming.";
href = "https://music.raffauflabs.com";
icon = "navidrome";
};
}
];
}
{
Tools = [
{
"Forĝejo" = {
description = "Git forge for open source projects.";
href = "https://git.raffauflabs.com";
icon = "forgejo";
};
}
{
"Transmission (Tailnet only)" = {
description = "Torrent client with web UI.";
href = "http://mauville:9091";
icon = "transmission";
};
}
{
"Vaultwarden" = {
description = "Secure password manager.";
href = "https://passwords.raffauflabs.com";
icon = "vaultwarden";
};
}
];
}
];
settings = {
color = "sky";
target = "_self";
title = "RaffaufLabs.com";
};
widgets = [
{
glances = {
url = "http:/mauville:61208/";
cpu = true;
mem = true;
disk = "/mnt/Media";
};
}
{
search = {
provider = "brave";
showSearchSuggestions = true;
};
}
{
datetime = {
text_size = "xl";
format.timeStyle = "short";
};
}
];
};
# k3s = {
# enable = true;
# clusterInit = true;
# role = "server";
# tokenFile = config.age.secrets.k3s.path;
# };
nginx = {
enable = true;
@ -53,19 +175,18 @@ in {
recommendedTlsSettings = true;
virtualHosts = {
# "bt.${domain}" = {
# enableACME = true;
# forceSSL = true;
"${domain}" = {
enableACME = true;
forceSSL = true;
# locations."/" = {
# proxyPass = "http://${ip}:${toString 9091}";
# proxyWebsockets = true;
locations."/" = {
proxyPass = "http://localhost:${toString config.services.homepage-dashboard.listenPort}";
# extraConfig = ''
# proxy_buffering off;
# '';
# };
# };
extraConfig = ''
client_max_body_size 512M;
'';
};
};
"git.${domain}" = {
enableACME = true;
@ -94,6 +215,14 @@ in {
};
};
"passwords.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
};
};
"plex.${domain}" = {
enableACME = true;
forceSSL = true;
@ -129,5 +258,17 @@ in {
};
};
};
vaultwarden = {
enable = true;
config = {
DOMAIN = "https://passowrds.raffauflabs.com";
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_LOG = "critical";
ROCKET_PORT = 8222;
SIGNUPS_ALLOWED = false;
};
};
};
}