Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix

This commit is contained in:
Timo Boomers 2025-06-11 13:14:22 +02:00
commit 95235d5ad5
Signed by: xeovalyte
SSH Key Fingerprint: SHA256:GWI1hq+MNKR2UOcvk7n9tekASXT8vyazK7vDF9Xyciw
21 changed files with 159 additions and 104 deletions

View File

@ -10,7 +10,7 @@
]; ];
settings = { settings = {
hostname = "ti-clt-dsk01"; hostname = "ti-clt-lpt01";
display-manager = "cosmic-greeter"; display-manager = "cosmic-greeter";
desktop-environments = { desktop-environments = {
cosmic.enable = true; cosmic.enable = true;
@ -55,6 +55,7 @@
configurationLimit = 32; configurationLimit = 32;
}; };
boot.kernelPackages = pkgs.linuxPackages_latest; boot.kernelPackages = pkgs.linuxPackages_latest;
boot.supportedFilesystems = [ "nfs" ];
# Networking # Networking
networking.hosts = { networking.hosts = {

View File

@ -48,7 +48,6 @@
home.packages = with pkgs; [ home.packages = with pkgs; [
# Desktop Applications # Desktop Applications
kdenlive
prismlauncher prismlauncher
unstable.prusa-slicer unstable.prusa-slicer
signal-desktop signal-desktop
@ -62,7 +61,6 @@
unstable.hoppscotch unstable.hoppscotch
unstable.apostrophe unstable.apostrophe
unstable.surfer # waveform viewer unstable.surfer # waveform viewer
unstable.drawio
# Office # Office
libreoffice libreoffice
@ -72,9 +70,6 @@
inkscape inkscape
unstable.obs-studio unstable.obs-studio
# Development
unstable.drawio
unstable.moonlight-qt unstable.moonlight-qt
# Scripts # Scripts

View File

@ -2,7 +2,7 @@
# your system. Help is available in the configuration.nix(5) man page # your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help). # and in the NixOS manual (accessible by running nixos-help).
{ modulesPath, ... }: { modulesPath, lib, ... }:
{ {
imports = [ imports = [
@ -12,6 +12,8 @@
../../modules/system/default.nix ../../modules/system/default.nix
]; ];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
settings = { settings = {
hostname = "v-th-ctr-01"; hostname = "v-th-ctr-01";
display-manager = "none"; display-manager = "none";

View File

@ -57,6 +57,7 @@
vikunja.enable = true; vikunja.enable = true;
stalwart.enable = true; stalwart.enable = true;
linkding.enable = true; linkding.enable = true;
jellyfin.enable = true;
}; };
}; };

View File

@ -49,6 +49,11 @@ in {
}; };
}; };
settings.containers.caddy.routes.tbmrs-local.routes.beszel = {
host = "monitor";
url = "beszel:8090";
};
sops.secrets = { sops.secrets = {
"containers/beszel/key" = { }; "containers/beszel/key" = { };
}; };

View File

@ -5,19 +5,22 @@ with lib;
let let
cfg = config.settings.containers.caddy; cfg = config.settings.containers.caddy;
generateRoutes = entries: lib.concatMapStrings (route: '' toInternal = name: routesDef: {
@${route.name} host ${route.host} name = name;
host = routesDef.host;
url = routesDef.url;
};
generateRoutes = domain: entries: lib.concatMapStrings (route: ''
@${route.name} host ${route.host}.${domain}
handle @${route.name} { handle @${route.name} {
reverse_proxy ${route.url} reverse_proxy ${route.url}
} }
'') entries; '') entries;
routesOption = lib.mkOption { routesOption = lib.mkOption {
type = types.listOf (types.submodule { type = types.attrsOf (types.submodule {
options = { options = {
name = mkOption {
type = types.str;
};
url = mkOption { url = mkOption {
type = types.str; type = types.str;
}; };
@ -29,7 +32,7 @@ let
}; };
in { in {
options = { options = {
settings.containers.caddy.enable = lib.mkOption { settings.containers.caddy.enable = mkOption {
type = lib.types.bool; type = lib.types.bool;
default = false; default = false;
description = '' description = ''
@ -37,8 +40,16 @@ in {
''; '';
}; };
settings.containers.caddy.routes.tbmrs = routesOption; settings.containers.caddy.routes = mkOption {
settings.containers.caddy.routes.tbmrs-local = routesOption; type = lib.types.attrsOf (types.submodule {
options = {
routes = routesOption;
domain = mkOption {
type = types.str;
};
};
});
};
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
@ -59,48 +70,10 @@ in {
]; ];
}; };
settings.containers.caddy.routes.tbmrs = [ settings.containers.caddy.routes = {
{ tbmrs.domain = "tbmrs.nl";
name = "kanidm"; tbmrs-local.domain = "local.tbmrs.nl";
host = "auth"; };
url = "https://auth.tbmrs.nl";
}
{
name = "forgejo";
host = "git";
url = "forgejo:3000";
}
{
name = "immich";
host = "photos";
url = "immich-server:2283";
}
{
name = "homepage";
host = "home";
url = "homepage:3000";
}
{
name = "uptime-kuma";
host = "uptime";
url = "uptime-kuma:3001";
}
{
name = "pingvin-share";
host = "share";
url = "pingvin-share:3000";
}
{
name = "dufs";
host = "files";
url = "dufs:5000";
}
{
name = "stalwart";
host = "mail";
url = "stalwart:8000";
}
];
home.file."containers/caddy/Caddyfile".text = '' home.file."containers/caddy/Caddyfile".text = ''
*.tbmrs.nl, tbmrs.nl { *.tbmrs.nl, tbmrs.nl {
@ -109,7 +82,7 @@ in {
resolvers 1.1.1.1 resolvers 1.1.1.1
} }
${generateRoutes cfg.routes.tbmrs} ${generateRoutes cfg.routes.tbmrs.domain (mapAttrsToList toInternal cfg.routes.tbmrs.routes)}
} }
*.local.tbmrs.nl { *.local.tbmrs.nl {
@ -118,45 +91,7 @@ in {
resolvers 1.1.1.1 resolvers 1.1.1.1
} }
@vaultwarden host vault.local.tbmrs.nl ${generateRoutes cfg.routes.tbmrs-local.domain (mapAttrsToList toInternal cfg.routes.tbmrs-local.routes)}
handle @vaultwarden {
reverse_proxy vaultwarden:80
}
@paperless-ngx host paperless.local.tbmrs.nl
handle @paperless-ngx {
reverse_proxy paperless-ngx:8000
}
@beszel host monitor.local.tbmrs.nl
handle @beszel {
reverse_proxy beszel:8090
}
@syncthing host syncthing.local.tbmrs.nl
handle @syncthing {
reverse_proxy syncthing:8384
}
@homeassistant host home-assistant.local.tbmrs.nl
handle @homeassistant {
reverse_proxy homeassistant:8123
}
@karakeep host karakeep.local.tbmrs.nl
handle @karakeep {
reverse_proxy karakeep:3000
}
@vikunja host vikunja.local.tbmrs.nl
handle @vikunja {
reverse_proxy vikunja:3456
}
@linkding host linkding.local.tbmrs.nl
handle @linkding {
reverse_proxy linkding:9090
}
} }
''; '';
}; };

View File

@ -28,5 +28,10 @@ in {
FORGEJO__service__ENABLE_PASSWORD_SIGNIN_FORM = false; FORGEJO__service__ENABLE_PASSWORD_SIGNIN_FORM = false;
}; };
}; };
settings.containers.caddy.routes.tbmrs.routes.forgejo = {
host = "git";
url = "forgejo:3000";
};
}; };
} }

View File

@ -27,5 +27,10 @@ in {
TZ = "Europe/Amsterdam"; TZ = "Europe/Amsterdam";
}; };
}; };
settings.containers.caddy.routes.tbmrs-local.routes.home-assistant = {
host = "home-assistant";
url = "homeassistant:8123";
};
}; };
} }

View File

@ -32,6 +32,11 @@ in {
}; };
}; };
settings.containers.caddy.routes.tbmrs.routes.homepage = {
host = "home";
url = "homepage:3000";
};
home.file."containers/homepage/config/settings.yaml".source = (pkgs.formats.yaml { }).generate "settings" { home.file."containers/homepage/config/settings.yaml".source = (pkgs.formats.yaml { }).generate "settings" {
title = "Timo's Server"; title = "Timo's Server";
description = "server from Timo"; description = "server from Timo";
@ -125,12 +130,21 @@ in {
}; };
} }
{ {
"Karakeep" = { "Linkding" = {
href = "https://karakeep.local.tbmrs.nl"; href = "https://links.local.tbmrs.nl";
description = "Data hoarder"; description = "Bookmarks";
icon = "karakeep"; icon = "linkding";
server = "podman"; server = "podman";
container = "karakeep"; container = "linkding";
};
}
{
"Stalwart" = {
href = "https://mail.tbmrs.nl";
description = "Mailserver";
icon = "stalwart";
server = "podman";
container = "stalwart";
}; };
} }
]; ];

View File

@ -71,5 +71,10 @@ in {
}; };
exec = ''postgres -c shared_preload_libraries=vectors.so -c 'search_path="$$user", public, vectors' -c logging_collector=on -c max_wal_size=2GB -c shared_buffers=512MB -c wal_compression=on''; exec = ''postgres -c shared_preload_libraries=vectors.so -c 'search_path="$$user", public, vectors' -c logging_collector=on -c max_wal_size=2GB -c shared_buffers=512MB -c wal_compression=on'';
}; };
settings.containers.caddy.routes.tbmrs.routes.immich = {
host = "photos";
url = "immich-server:2283";
};
}; };
} }

View File

@ -0,0 +1,35 @@
{ config, lib, ... }:
with lib;
let
cfg = config.settings.containers.jellyfin;
in {
options = {
settings.containers.jellyfin.enable = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Enable jellyfin container
'';
};
};
config = mkIf cfg.enable {
services.podman.containers.jellyfin = {
image = "jellyfin/jellyfin";
network = "proxy";
volumes = [
"%h/containers/jellyfin/config:/config"
"%h/containers/jellyfin/cache:/cache"
"%h/media:/media"
];
userNS = "keep-id";
};
settings.containers.caddy.routes.tbmrs-local.routes.jellyfin = {
host = "stream";
url = "jellyfin:8096";
};
};
}

View File

@ -36,5 +36,10 @@ in {
KANIDM_ORIGIN = "https://auth.tbmrs.nl"; KANIDM_ORIGIN = "https://auth.tbmrs.nl";
}; };
}; };
settings.containers.caddy.routes.tbmrs.routes.kanidm = {
host = "auth";
url = "https://auth.tbmrs.nl";
};
}; };
} }

View File

@ -36,6 +36,11 @@ in {
]; ];
}; };
settings.containers.caddy.routes.tbmrs-local.routes.linkding = {
host = "links";
url = "linkding:9090";
};
settings.services.sops.enable = true; settings.services.sops.enable = true;
sops.templates = { sops.templates = {

View File

@ -88,6 +88,11 @@ in {
]; ];
}; };
settings.containers.caddy.routes.tbmrs-local.routes.paperless-ngx = {
host = "paperless";
url = "paperless-ngx:8000";
};
sops.secrets = { sops.secrets = {
"containers/paperless-ngx/db-password" = { }; "containers/paperless-ngx/db-password" = { };
"containers/paperless-ngx/secret" = { }; "containers/paperless-ngx/secret" = { };

View File

@ -39,6 +39,11 @@ in {
}; };
}; };
settings.containers.caddy.routes.tbmrs.routes.pingvin = {
host = "share";
url = "pingvin-share:3000";
};
sops.templates = { sops.templates = {
"container-pingvin.yaml" = { "container-pingvin.yaml" = {
content = /*yaml*/ '' content = /*yaml*/ ''

View File

@ -33,5 +33,10 @@ in {
"%h/containers/stalwart/data:/opt/stalwart-mail" "%h/containers/stalwart/data:/opt/stalwart-mail"
]; ];
}; };
settings.containers.caddy.routes.tbmrs.routes.stalwart = {
host = "mail";
url = "stalwart:8080";
};
}; };
} }

View File

@ -43,5 +43,15 @@ in {
"22000:22000/udp" "22000:22000/udp"
]; ];
}; };
settings.containers.caddy.routes.tbmrs-local.routes.sycnthing = {
host = "syncthing";
url = "syncthing:8384";
};
settings.containers.caddy.routes.tbmrs.routes.dufs = {
host = "files";
url = "dufs:5000";
};
}; };
} }

View File

@ -17,11 +17,16 @@ in {
config = mkIf cfg.enable { config = mkIf cfg.enable {
services.podman.containers.uptime-kuma = { services.podman.containers.uptime-kuma = {
image = "louislam/uptime-kuma:1"; image = "louislam/uptime-kuma:beta";
network = "proxy"; network = "proxy";
volumes = [ volumes = [
"%h/containers/uptime-kuma/data:/app/data" "%h/containers/uptime-kuma/data:/app/data"
]; ];
}; };
settings.containers.caddy.routes.tbmrs.routes.uptime-kuma = {
host = "uptime";
url = "uptime-kuma:3001";
};
}; };
} }

View File

@ -27,5 +27,11 @@ in {
SIGNUPS_ALLOWED = true; SIGNUPS_ALLOWED = true;
}; };
}; };
settings.containers.caddy.routes.tbmrs-local.routes.vaultwarden = {
host = "vault";
url = "vaultwarden:80";
};
}; };
} }

View File

@ -25,5 +25,10 @@ in {
"%h/containers/vikunja/db:/db" "%h/containers/vikunja/db:/db"
]; ];
}; };
settings.containers.caddy.routes.tbmrs-local.routes.vikunja = {
host = "tasks";
url = "vikunja:3456";
};
}; };
} }

View File

@ -46,6 +46,7 @@
./containers/stalwart.nix ./containers/stalwart.nix
./containers/static.nix ./containers/static.nix
./containers/linkding.nix ./containers/linkding.nix
./containers/jellyfin.nix
]; ];
config = { config = {