Compare commits

...

4 commits

Author SHA1 Message Date
8c38afd9fe
tsuki: enable davfs for cryptomator
All checks were successful
ci/woodpecker/push/checks Pipeline was successful
2023-09-01 08:52:33 -04:00
d4a8f1f253
yuki: bump dashdot / homarr 2023-09-01 08:52:19 -04:00
a618f8c859
yuki: remove kanboard, miniflux 2023-09-01 08:52:06 -04:00
061fce185a
sakura: remove conduit, bump dashdot 2023-09-01 08:51:36 -04:00
9 changed files with 4 additions and 60 deletions

View file

@ -1,15 +0,0 @@
_: {
networking.firewall.allowedTCPPorts = [6167 8448];
services.matrix-conduit = {
enable = true;
settings.global = {
address = "0.0.0.0";
port = 6167;
server_name = "notohh.dev";
allow_registration = true;
allow_federation = true;
allow_encryption = true;
trusted_servers = ["matrix.org"];
};
};
}

View file

@ -1,6 +1,6 @@
_: { _: {
virtualisation.oci-containers.containers.dashdot = { virtualisation.oci-containers.containers.dashdot = {
image = "mauricenino/dashdot:sha-207b2df"; image = "mauricenino/dashdot:sha-4bef01c";
ports = [ ports = [
"4000:3001" "4000:3001"
]; ];

View file

@ -41,6 +41,7 @@
}; };
services.pcscd.enable = true; services.pcscd.enable = true;
services.davfs2.enable = true;
sound.enable = true; sound.enable = true;
hardware.pulseaudio.enable = false; hardware.pulseaudio.enable = false;

View file

@ -1,6 +1,6 @@
_: { _: {
virtualisation.oci-containers.containers.dashdot = { virtualisation.oci-containers.containers.dashdot = {
image = "mauricenino/dashdot:sha-207b2df"; image = "mauricenino/dashdot:sha-4bef01c";
ports = [ ports = [
"4000:3001" "4000:3001"
]; ];

View file

@ -2,11 +2,9 @@
imports = [ imports = [
./restic.nix ./restic.nix
./traefik.nix ./traefik.nix
./kanboard.nix
./stash.nix ./stash.nix
./searxng.nix ./searxng.nix
./homarr.nix ./homarr.nix
./dashdot.nix ./dashdot.nix
./miniflux.nix
]; ];
} }

View file

@ -1,6 +1,6 @@
_: { _: {
virtualisation.oci-containers.containers.homarr = { virtualisation.oci-containers.containers.homarr = {
image = "ghcr.io/ajnart/homarr:0.13.0"; image = "ghcr.io/ajnart/homarr:0.13.2";
ports = [ ports = [
"7575:7575" "7575:7575"
]; ];

View file

@ -1,12 +0,0 @@
_: {
virtualisation.oci-containers.containers.kanboard = {
image = "kanboard/kanboard:v1.2.30";
ports = [
"8080:80"
];
volumes = [
"/var/lib/kanboard/kanboard_data:/var/www/app/data"
"/var/lib/kanboard/kanboard_plugins:/var/www/app/plugins"
];
};
}

View file

@ -1,16 +0,0 @@
{
config,
lib,
...
}: {
networking.firewall.allowedTCPPorts = [8200];
sops.secrets.miniflux = {};
services.miniflux = {
enable = true;
config = {
DATABASE_URL = lib.mkForce "host=192.168.1.211 port=5432 user=miniflux password=miniflux dbname=miniflux sslmode=disable";
LISTEN_ADDR = "localhost:8200";
};
adminCredentialsFile = config.sops.secrets.miniflux.path;
};
}

View file

@ -20,11 +20,6 @@ _: {
entryPoints = ["web"]; entryPoints = ["web"];
service = "searxng"; service = "searxng";
}; };
kanboard = {
rule = "Host(`kanboard.home.arpa`)";
entryPoints = ["web"];
service = "kanboard";
};
stash = { stash = {
rule = "Host(`stash.home.arpa`)"; rule = "Host(`stash.home.arpa`)";
entrypoints = ["web"]; entrypoints = ["web"];
@ -35,19 +30,12 @@ _: {
entrypoints = ["web"]; entrypoints = ["web"];
service = "dashdot"; service = "dashdot";
}; };
miniflux = {
rule = "Host(`news.home.arpa`)";
entrypoints = ["web"];
service = "miniflux";
};
}; };
services = { services = {
kanboard.loadBalancer.servers = [{url = "http://localhost:8080";}];
stash.loadBalancer.servers = [{url = "http://localhost:9999";}]; stash.loadBalancer.servers = [{url = "http://localhost:9999";}];
homarr.loadBalancer.servers = [{url = "http://localhost:7575";}]; homarr.loadBalancer.servers = [{url = "http://localhost:7575";}];
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}]; dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
searxng.loadBalancer.servers = [{url = "http://localhost:8100";}]; searxng.loadBalancer.servers = [{url = "http://localhost:8100";}];
miniflux.loadBalancer.servers = [{url = "http://localhost:8200";}];
}; };
}; };
}; };