Compare commits
No commits in common. "3ac9bba7393f3ca0f8fbe1b5d23aa3e41ccca69f" and "449dca5ddfe7dd17d2ab30d4f5b84bb1afa2ab70" have entirely different histories.
3ac9bba739
...
449dca5ddf
4 changed files with 86 additions and 6 deletions
|
@ -3,6 +3,8 @@
|
|||
./hardware-configuration.nix
|
||||
./services
|
||||
../../modules
|
||||
../../modules/prometheus/exporters/redis.nix
|
||||
../../modules/prometheus/exporters/postgres.nix
|
||||
];
|
||||
|
||||
boot.loader = {
|
||||
|
@ -14,10 +16,6 @@
|
|||
};
|
||||
};
|
||||
|
||||
boot.kernel.sysctl = {
|
||||
"kernel.shmmax" = 100663296;
|
||||
};
|
||||
|
||||
networking = {
|
||||
hostName = "arashi";
|
||||
};
|
||||
|
|
|
@ -11,8 +11,6 @@
|
|||
port = 5432;
|
||||
settings = {
|
||||
listen_addresses = lib.mkForce "*";
|
||||
max_connections = "300";
|
||||
shared_buffers = "80MB";
|
||||
};
|
||||
authentication = ''
|
||||
local all all trust
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
{...}: {
|
||||
imports = [
|
||||
./traefik.nix
|
||||
./authelia.nix
|
||||
./forgejo.nix
|
||||
./rustypaste.nix
|
||||
|
|
83
hosts/sakura/services/traefik.nix
Normal file
83
hosts/sakura/services/traefik.nix
Normal file
|
@ -0,0 +1,83 @@
|
|||
{config, ...}: {
|
||||
sops.secrets.cloudflare-api-key = {};
|
||||
systemd.services.traefik = {
|
||||
environment = {
|
||||
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
|
||||
};
|
||||
serviceConfig = {
|
||||
EnvironmentFile = [config.sops.secrets.cloudflare-api-key.path];
|
||||
};
|
||||
};
|
||||
services.traefik = {
|
||||
enable = true;
|
||||
dynamicConfigOptions = {
|
||||
http = {
|
||||
middlewares.authelia = {
|
||||
forwardauth = {
|
||||
address = "http://localhost:9091/api/verify?rd=https://passport.notohh.dev/";
|
||||
trustForwardHeader = true;
|
||||
};
|
||||
};
|
||||
routers = {
|
||||
api = {
|
||||
rule = "PathPrefix(`/api/`)";
|
||||
entrypoints = ["websecure"];
|
||||
service = "api@internal";
|
||||
};
|
||||
dashdot = {
|
||||
rule = "Host(`dashdot.sakura.internal.flake.sh`)";
|
||||
entrypoints = ["web"];
|
||||
service = "dashdot";
|
||||
};
|
||||
};
|
||||
services = {
|
||||
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
|
||||
};
|
||||
};
|
||||
};
|
||||
staticConfigOptions = {
|
||||
log.level = "DEBUG";
|
||||
api.dashboard = false;
|
||||
api.insecure = false;
|
||||
global = {
|
||||
checkNewVersion = false;
|
||||
sendAnonymousUsage = false;
|
||||
};
|
||||
entryPoints = {
|
||||
websecure = {
|
||||
address = ":443";
|
||||
};
|
||||
web = {
|
||||
address = ":80";
|
||||
};
|
||||
};
|
||||
metrics = {
|
||||
prometheus = {
|
||||
addServicesLabels = true;
|
||||
};
|
||||
};
|
||||
certificatesResolvers = {
|
||||
staging.acme = {
|
||||
email = "x3xr6n66@notohh.dev";
|
||||
storage = "/var/lib/traefik/acme.json";
|
||||
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
|
||||
dnsChallenge = {
|
||||
provider = "cloudflare";
|
||||
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
|
||||
delayBeforeCheck = "0";
|
||||
};
|
||||
};
|
||||
production.acme = {
|
||||
email = "x3xr6n66@notohh.dev";
|
||||
storage = "/var/lib/traefik/acme.json";
|
||||
caServer = "https://acme-v02.api.letsencrypt.org/directory";
|
||||
dnsChallenge = {
|
||||
provider = "cloudflare";
|
||||
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
|
||||
delayBeforeCheck = "0";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue