hosts: switch to flake.sh
This commit is contained in:
parent
0b9acde163
commit
4809eb83a4
11 changed files with 32 additions and 53 deletions
|
@ -4,7 +4,6 @@ inputs: let
|
||||||
hmModule = inputs.home-manager.nixosModules.home-manager;
|
hmModule = inputs.home-manager.nixosModules.home-manager;
|
||||||
hyprlandModule = inputs.hyprland.homeManagerModules.default;
|
hyprlandModule = inputs.hyprland.homeManagerModules.default;
|
||||||
ironbarModule = inputs.ironbar.homeManagerModules.default;
|
ironbarModule = inputs.ironbar.homeManagerModules.default;
|
||||||
atticdModule = inputs.attic.nixosModules.atticd;
|
|
||||||
nix-index-Module = inputs.nix-index-database.hmModules.nix-index;
|
nix-index-Module = inputs.nix-index-database.hmModules.nix-index;
|
||||||
inherit (inputs.nixpkgs.lib) nixosSystem;
|
inherit (inputs.nixpkgs.lib) nixosSystem;
|
||||||
in {
|
in {
|
||||||
|
@ -15,7 +14,6 @@ in {
|
||||||
./tsuki
|
./tsuki
|
||||||
sopsModule
|
sopsModule
|
||||||
hmModule
|
hmModule
|
||||||
atticdModule
|
|
||||||
{
|
{
|
||||||
home-manager = {
|
home-manager = {
|
||||||
useGlobalPkgs = true;
|
useGlobalPkgs = true;
|
||||||
|
@ -40,7 +38,6 @@ in {
|
||||||
./sakura
|
./sakura
|
||||||
sopsModule
|
sopsModule
|
||||||
hmModule
|
hmModule
|
||||||
atticdModule
|
|
||||||
{
|
{
|
||||||
home-manager = {
|
home-manager = {
|
||||||
useGlobalPkgs = true;
|
useGlobalPkgs = true;
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
settings = {
|
settings = {
|
||||||
global = {
|
global = {
|
||||||
address = "0.0.0.0";
|
address = "0.0.0.0";
|
||||||
server_name = "matrix.notohh.dev";
|
server_name = "matrix.flake.sh";
|
||||||
allow_registration = true;
|
allow_registration = true;
|
||||||
allow_federation = false;
|
allow_federation = false;
|
||||||
allow_encryption = true;
|
allow_encryption = true;
|
||||||
|
|
|
@ -10,7 +10,6 @@
|
||||||
./dashdot.nix
|
./dashdot.nix
|
||||||
./grafana.nix
|
./grafana.nix
|
||||||
./vaultwarden.nix
|
./vaultwarden.nix
|
||||||
./atticd.nix
|
|
||||||
./conduit.nix
|
./conduit.nix
|
||||||
./cloudflareddns.nix
|
./cloudflareddns.nix
|
||||||
];
|
];
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
server = {
|
server = {
|
||||||
HTTP_PORT = 3200;
|
HTTP_PORT = 3200;
|
||||||
DOMAIN = "git.notohh.dev";
|
DOMAIN = "git.notohh.dev";
|
||||||
ROOT_URL = "https://git.notohh.dev";
|
ROOT_URL = "https://git.flake.sh";
|
||||||
LANDING_PAGE = "/explore/repos";
|
LANDING_PAGE = "/explore/repos";
|
||||||
};
|
};
|
||||||
database = {
|
database = {
|
||||||
|
|
|
@ -3,8 +3,8 @@ _: {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
server = {
|
server = {
|
||||||
root_url = "https://metrics.notohh.dev";
|
root_url = "https://metrics.flake.sh";
|
||||||
domain = "metrics.notohh.dev";
|
domain = "metrics.flake.sh";
|
||||||
enforce_domain = true;
|
enforce_domain = true;
|
||||||
http_addr = "0.0.0.0";
|
http_addr = "0.0.0.0";
|
||||||
http_port = 3100;
|
http_port = 3100;
|
||||||
|
|
|
@ -3,8 +3,8 @@ _: {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
port = 3300;
|
port = 3300;
|
||||||
domain = "scratch.notohh.dev";
|
domain = "scratch.flake.sh";
|
||||||
allowOrigin = ["scratch.notohh.dev"];
|
allowOrigin = ["scratch.flake.sh"];
|
||||||
allowAnonymous = true;
|
allowAnonymous = true;
|
||||||
allowFreeURL = true;
|
allowFreeURL = true;
|
||||||
allowEmailRegister = false;
|
allowEmailRegister = false;
|
||||||
|
|
|
@ -46,59 +46,52 @@
|
||||||
middlewares = "authelia";
|
middlewares = "authelia";
|
||||||
};
|
};
|
||||||
foundryvtt = {
|
foundryvtt = {
|
||||||
rule = "Host(`foundry.notohh.dev`)";
|
rule = "Host(`foundry.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "foundryvtt";
|
service = "foundryvtt";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
gitea = {
|
forgejo = {
|
||||||
rule = "Host(`git.notohh.dev`)";
|
rule = "Host(`git.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "gitea";
|
service = "forgejo";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
rustypaste = {
|
rustypaste = {
|
||||||
rule = "Host(`img.notohh.dev`)";
|
rule = "Host(`i.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "rustypaste";
|
service = "rustypaste";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
grafana = {
|
grafana = {
|
||||||
rule = "Host(`metrics.notohh.dev`)";
|
rule = "Host(`metrics.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "grafana";
|
service = "grafana";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
woodpecker-server = {
|
woodpecker-server = {
|
||||||
rule = "Host(`ci.notohh.dev`)";
|
rule = "Host(`ci.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "woodpecker-server";
|
service = "woodpecker-server";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
|
||||||
};
|
|
||||||
atticd = {
|
|
||||||
rule = "Host(`cache.notohh.dev`)";
|
|
||||||
entrypoints = ["websecure"];
|
|
||||||
service = "atticd";
|
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
hedgedoc = {
|
hedgedoc = {
|
||||||
rule = "Host(`scratch.notohh.dev`)";
|
rule = "Host(`scratch.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "hedgedoc";
|
service = "hedgedoc";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
vaultwarden = {
|
vaultwarden = {
|
||||||
rule = "Host(`vault.notohh.dev`)";
|
rule = "Host(`vault.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "vaultwarden";
|
service = "vaultwarden";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -107,11 +100,10 @@
|
||||||
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
|
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
|
||||||
hugo.loadBalancer.servers = [{url = "http://localhost:1313";}];
|
hugo.loadBalancer.servers = [{url = "http://localhost:1313";}];
|
||||||
foundryvtt.loadBalancer.servers = [{url = "http://localhost:30000";}];
|
foundryvtt.loadBalancer.servers = [{url = "http://localhost:30000";}];
|
||||||
gitea.loadBalancer.servers = [{url = "http://localhost:3200";}];
|
forgejo.loadBalancer.servers = [{url = "http://localhost:3200";}];
|
||||||
rustypaste.loadBalancer.servers = [{url = "http://localhost:8000";}];
|
rustypaste.loadBalancer.servers = [{url = "http://localhost:8000";}];
|
||||||
grafana.loadBalancer.servers = [{url = "http://localhost:3100";}];
|
grafana.loadBalancer.servers = [{url = "http://localhost:3100";}];
|
||||||
woodpecker-server.loadBalancer.servers = [{url = "http://localhost:8200";}];
|
woodpecker-server.loadBalancer.servers = [{url = "http://localhost:8200";}];
|
||||||
atticd.loadBalancer.servers = [{url = "http://localhost:8100";}];
|
|
||||||
hedgedoc.loadBalancer.servers = [{url = "http://localhost:3300";}];
|
hedgedoc.loadBalancer.servers = [{url = "http://localhost:3300";}];
|
||||||
vaultwarden.loadBalancer.servers = [{url = "http://localhost:8222";}];
|
vaultwarden.loadBalancer.servers = [{url = "http://localhost:8222";}];
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
package = pkgs.vaultwarden-postgresql;
|
package = pkgs.vaultwarden-postgresql;
|
||||||
dbBackend = "postgresql";
|
dbBackend = "postgresql";
|
||||||
config = {
|
config = {
|
||||||
DOMAIN = "https://vault.notohh.dev/";
|
DOMAIN = "https://vault.flake.sh/";
|
||||||
SIGNUPS_ALLOWED = false;
|
SIGNUPS_ALLOWED = false;
|
||||||
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@192.168.1.211:5432/vaultwarden";
|
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@192.168.1.211:5432/vaultwarden";
|
||||||
LOG_LEVEL = "Info";
|
LOG_LEVEL = "Info";
|
||||||
|
|
|
@ -6,10 +6,10 @@
|
||||||
environment = {
|
environment = {
|
||||||
WOODPECKER_SERVER_ADDR = ":8200";
|
WOODPECKER_SERVER_ADDR = ":8200";
|
||||||
WOODPECKER_GRPC_ADDR = ":8300";
|
WOODPECKER_GRPC_ADDR = ":8300";
|
||||||
WOODPECKER_HOST = "https://ci.notohh.dev";
|
WOODPECKER_HOST = "https://ci.flake.sh";
|
||||||
WOODPECKER_OPEN = "false";
|
WOODPECKER_OPEN = "false";
|
||||||
WOODPECKER_GITEA = "true";
|
WOODPECKER_GITEA = "true";
|
||||||
WOODPECKER_GITEA_URL = "https://git.notohh.dev";
|
WOODPECKER_GITEA_URL = "https://git.flake.sh";
|
||||||
WOODPECKER_ADMIN = "notohh";
|
WOODPECKER_ADMIN = "notohh";
|
||||||
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
||||||
WOODPECKER_LOG_LEVEL = "debug";
|
WOODPECKER_LOG_LEVEL = "debug";
|
||||||
|
|
|
@ -26,38 +26,30 @@
|
||||||
service = "api@internal";
|
service = "api@internal";
|
||||||
};
|
};
|
||||||
uptime-kuma = {
|
uptime-kuma = {
|
||||||
rule = "Host(`status.notohh.dev`)";
|
rule = "Host(`status.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "uptime-kuma";
|
service = "uptime-kuma";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
gotify = {
|
gotify = {
|
||||||
rule = "Host(`gotify.notohh.dev`)";
|
rule = "Host(`gotify.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "gotify";
|
service = "gotify";
|
||||||
tls.domains = [{main = "*.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
|
||||||
};
|
|
||||||
neko = {
|
|
||||||
rule = "Host(`neko.notohh.dev`)";
|
|
||||||
entrypoints = ["websecure"];
|
|
||||||
service = "neko";
|
|
||||||
tls.domains = [{main = "neko.notohh.dev";}];
|
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
conduit = {
|
conduit = {
|
||||||
rule = "Host(`matrix.notohh.dev`)";
|
rule = "Host(`matrix.flake.sh`)";
|
||||||
entrypoints = ["websecure"];
|
entrypoints = ["websecure"];
|
||||||
service = "conduit";
|
service = "conduit";
|
||||||
tls.domains = [{main = "matrix.notohh.dev";}];
|
tls.domains = [{main = "*.flake.sh";}];
|
||||||
tls.certresolver = "production";
|
tls.certresolver = "production";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
services = {
|
services = {
|
||||||
uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}];
|
uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}];
|
||||||
gotify.loadBalancer.servers = [{url = "http://100.87.54.48:3000";}];
|
gotify.loadBalancer.servers = [{url = "http://100.87.54.48:3000";}];
|
||||||
neko.loadBalancer.servers = [{url = "http://100.110.140.130:8080";}];
|
|
||||||
conduit.loadBalancer.servers = [{url = "http://100.121.201.47:6167";}];
|
conduit.loadBalancer.servers = [{url = "http://100.121.201.47:6167";}];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -94,7 +94,6 @@
|
||||||
qemu_kvm
|
qemu_kvm
|
||||||
pinentry-gtk2
|
pinentry-gtk2
|
||||||
jdk17
|
jdk17
|
||||||
attic-client
|
|
||||||
comma
|
comma
|
||||||
inputs.matugen.packages.x86_64-linux.default
|
inputs.matugen.packages.x86_64-linux.default
|
||||||
];
|
];
|
||||||
|
|
Loading…
Reference in a new issue