hosts: switch to flake.sh

This commit is contained in:
notohh 2023-10-03 14:24:26 -04:00
parent 0b9acde163
commit 4809eb83a4
Signed by: notohh
GPG key ID: BD47506D475EE86D
11 changed files with 32 additions and 53 deletions

View file

@ -4,7 +4,6 @@ inputs: let
hmModule = inputs.home-manager.nixosModules.home-manager; hmModule = inputs.home-manager.nixosModules.home-manager;
hyprlandModule = inputs.hyprland.homeManagerModules.default; hyprlandModule = inputs.hyprland.homeManagerModules.default;
ironbarModule = inputs.ironbar.homeManagerModules.default; ironbarModule = inputs.ironbar.homeManagerModules.default;
atticdModule = inputs.attic.nixosModules.atticd;
nix-index-Module = inputs.nix-index-database.hmModules.nix-index; nix-index-Module = inputs.nix-index-database.hmModules.nix-index;
inherit (inputs.nixpkgs.lib) nixosSystem; inherit (inputs.nixpkgs.lib) nixosSystem;
in { in {
@ -15,7 +14,6 @@ in {
./tsuki ./tsuki
sopsModule sopsModule
hmModule hmModule
atticdModule
{ {
home-manager = { home-manager = {
useGlobalPkgs = true; useGlobalPkgs = true;
@ -40,7 +38,6 @@ in {
./sakura ./sakura
sopsModule sopsModule
hmModule hmModule
atticdModule
{ {
home-manager = { home-manager = {
useGlobalPkgs = true; useGlobalPkgs = true;

View file

@ -5,7 +5,7 @@
settings = { settings = {
global = { global = {
address = "0.0.0.0"; address = "0.0.0.0";
server_name = "matrix.notohh.dev"; server_name = "matrix.flake.sh";
allow_registration = true; allow_registration = true;
allow_federation = false; allow_federation = false;
allow_encryption = true; allow_encryption = true;

View file

@ -10,7 +10,6 @@
./dashdot.nix ./dashdot.nix
./grafana.nix ./grafana.nix
./vaultwarden.nix ./vaultwarden.nix
./atticd.nix
./conduit.nix ./conduit.nix
./cloudflareddns.nix ./cloudflareddns.nix
]; ];

View file

@ -19,7 +19,7 @@
server = { server = {
HTTP_PORT = 3200; HTTP_PORT = 3200;
DOMAIN = "git.notohh.dev"; DOMAIN = "git.notohh.dev";
ROOT_URL = "https://git.notohh.dev"; ROOT_URL = "https://git.flake.sh";
LANDING_PAGE = "/explore/repos"; LANDING_PAGE = "/explore/repos";
}; };
database = { database = {

View file

@ -3,8 +3,8 @@ _: {
enable = true; enable = true;
settings = { settings = {
server = { server = {
root_url = "https://metrics.notohh.dev"; root_url = "https://metrics.flake.sh";
domain = "metrics.notohh.dev"; domain = "metrics.flake.sh";
enforce_domain = true; enforce_domain = true;
http_addr = "0.0.0.0"; http_addr = "0.0.0.0";
http_port = 3100; http_port = 3100;

View file

@ -3,8 +3,8 @@ _: {
enable = true; enable = true;
settings = { settings = {
port = 3300; port = 3300;
domain = "scratch.notohh.dev"; domain = "scratch.flake.sh";
allowOrigin = ["scratch.notohh.dev"]; allowOrigin = ["scratch.flake.sh"];
allowAnonymous = true; allowAnonymous = true;
allowFreeURL = true; allowFreeURL = true;
allowEmailRegister = false; allowEmailRegister = false;

View file

@ -46,59 +46,52 @@
middlewares = "authelia"; middlewares = "authelia";
}; };
foundryvtt = { foundryvtt = {
rule = "Host(`foundry.notohh.dev`)"; rule = "Host(`foundry.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "foundryvtt"; service = "foundryvtt";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
gitea = { forgejo = {
rule = "Host(`git.notohh.dev`)"; rule = "Host(`git.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "gitea"; service = "forgejo";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
rustypaste = { rustypaste = {
rule = "Host(`img.notohh.dev`)"; rule = "Host(`i.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "rustypaste"; service = "rustypaste";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
grafana = { grafana = {
rule = "Host(`metrics.notohh.dev`)"; rule = "Host(`metrics.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "grafana"; service = "grafana";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
woodpecker-server = { woodpecker-server = {
rule = "Host(`ci.notohh.dev`)"; rule = "Host(`ci.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "woodpecker-server"; service = "woodpecker-server";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production";
};
atticd = {
rule = "Host(`cache.notohh.dev`)";
entrypoints = ["websecure"];
service = "atticd";
tls.domains = [{main = "*.notohh.dev";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
hedgedoc = { hedgedoc = {
rule = "Host(`scratch.notohh.dev`)"; rule = "Host(`scratch.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "hedgedoc"; service = "hedgedoc";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
vaultwarden = { vaultwarden = {
rule = "Host(`vault.notohh.dev`)"; rule = "Host(`vault.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "vaultwarden"; service = "vaultwarden";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
}; };
@ -107,11 +100,10 @@
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}]; dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
hugo.loadBalancer.servers = [{url = "http://localhost:1313";}]; hugo.loadBalancer.servers = [{url = "http://localhost:1313";}];
foundryvtt.loadBalancer.servers = [{url = "http://localhost:30000";}]; foundryvtt.loadBalancer.servers = [{url = "http://localhost:30000";}];
gitea.loadBalancer.servers = [{url = "http://localhost:3200";}]; forgejo.loadBalancer.servers = [{url = "http://localhost:3200";}];
rustypaste.loadBalancer.servers = [{url = "http://localhost:8000";}]; rustypaste.loadBalancer.servers = [{url = "http://localhost:8000";}];
grafana.loadBalancer.servers = [{url = "http://localhost:3100";}]; grafana.loadBalancer.servers = [{url = "http://localhost:3100";}];
woodpecker-server.loadBalancer.servers = [{url = "http://localhost:8200";}]; woodpecker-server.loadBalancer.servers = [{url = "http://localhost:8200";}];
atticd.loadBalancer.servers = [{url = "http://localhost:8100";}];
hedgedoc.loadBalancer.servers = [{url = "http://localhost:3300";}]; hedgedoc.loadBalancer.servers = [{url = "http://localhost:3300";}];
vaultwarden.loadBalancer.servers = [{url = "http://localhost:8222";}]; vaultwarden.loadBalancer.servers = [{url = "http://localhost:8222";}];
}; };

View file

@ -4,7 +4,7 @@
package = pkgs.vaultwarden-postgresql; package = pkgs.vaultwarden-postgresql;
dbBackend = "postgresql"; dbBackend = "postgresql";
config = { config = {
DOMAIN = "https://vault.notohh.dev/"; DOMAIN = "https://vault.flake.sh/";
SIGNUPS_ALLOWED = false; SIGNUPS_ALLOWED = false;
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@192.168.1.211:5432/vaultwarden"; DATABASE_URL = "postgresql://vaultwarden:vaultwarden@192.168.1.211:5432/vaultwarden";
LOG_LEVEL = "Info"; LOG_LEVEL = "Info";

View file

@ -6,10 +6,10 @@
environment = { environment = {
WOODPECKER_SERVER_ADDR = ":8200"; WOODPECKER_SERVER_ADDR = ":8200";
WOODPECKER_GRPC_ADDR = ":8300"; WOODPECKER_GRPC_ADDR = ":8300";
WOODPECKER_HOST = "https://ci.notohh.dev"; WOODPECKER_HOST = "https://ci.flake.sh";
WOODPECKER_OPEN = "false"; WOODPECKER_OPEN = "false";
WOODPECKER_GITEA = "true"; WOODPECKER_GITEA = "true";
WOODPECKER_GITEA_URL = "https://git.notohh.dev"; WOODPECKER_GITEA_URL = "https://git.flake.sh";
WOODPECKER_ADMIN = "notohh"; WOODPECKER_ADMIN = "notohh";
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path; WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
WOODPECKER_LOG_LEVEL = "debug"; WOODPECKER_LOG_LEVEL = "debug";

View file

@ -26,38 +26,30 @@
service = "api@internal"; service = "api@internal";
}; };
uptime-kuma = { uptime-kuma = {
rule = "Host(`status.notohh.dev`)"; rule = "Host(`status.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "uptime-kuma"; service = "uptime-kuma";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
gotify = { gotify = {
rule = "Host(`gotify.notohh.dev`)"; rule = "Host(`gotify.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "gotify"; service = "gotify";
tls.domains = [{main = "*.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production";
};
neko = {
rule = "Host(`neko.notohh.dev`)";
entrypoints = ["websecure"];
service = "neko";
tls.domains = [{main = "neko.notohh.dev";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
conduit = { conduit = {
rule = "Host(`matrix.notohh.dev`)"; rule = "Host(`matrix.flake.sh`)";
entrypoints = ["websecure"]; entrypoints = ["websecure"];
service = "conduit"; service = "conduit";
tls.domains = [{main = "matrix.notohh.dev";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
}; };
services = { services = {
uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}]; uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}];
gotify.loadBalancer.servers = [{url = "http://100.87.54.48:3000";}]; gotify.loadBalancer.servers = [{url = "http://100.87.54.48:3000";}];
neko.loadBalancer.servers = [{url = "http://100.110.140.130:8080";}];
conduit.loadBalancer.servers = [{url = "http://100.121.201.47:6167";}]; conduit.loadBalancer.servers = [{url = "http://100.121.201.47:6167";}];
}; };
}; };

View file

@ -94,7 +94,6 @@
qemu_kvm qemu_kvm
pinentry-gtk2 pinentry-gtk2
jdk17 jdk17
attic-client
comma comma
inputs.matugen.packages.x86_64-linux.default inputs.matugen.packages.x86_64-linux.default
]; ];