Compare commits

...

5 commits

Author SHA1 Message Date
aeae1e77e6
uptimekuma: close firewall
All checks were successful
flake check / check (push) Successful in 5m34s
fmt check / check (push) Successful in 42s
2023-12-03 00:03:19 -05:00
bf42de3e29
searxng: disable public instance 2023-12-03 00:01:19 -05:00
fa8b182d70
sakura: remove dashdot 2023-12-03 00:01:10 -05:00
f4db26273d
hosts: switch nfs shares to truenas 2023-12-03 00:00:58 -05:00
b4d462fcbb
traefik: remove searxng 2023-12-03 00:00:13 -05:00
8 changed files with 6 additions and 36 deletions

View file

@ -18,7 +18,7 @@
}; };
fileSystems."/media" = { fileSystems."/media" = {
device = "192.168.1.71:/volume1/media"; device = "192.168.1.199:/mnt/Sutoreji/media";
fsType = "nfs"; fsType = "nfs";
}; };

View file

@ -1,14 +0,0 @@
_: {
virtualisation.oci-containers.containers.dashdot = {
image = "mauricenino/dashdot:sha-4bef01c";
ports = [
"4000:3001"
];
volumes = [
"/home/notoh/docker/dashdot:/mnt/host:ro"
];
environment = {
DASHDOT_ENABLE_CPU_TEMPS = "true";
};
};
}

View file

@ -4,7 +4,6 @@
./forgejo.nix ./forgejo.nix
./rustypaste.nix ./rustypaste.nix
./hedgedoc.nix ./hedgedoc.nix
./dashdot.nix
./grafana.nix ./grafana.nix
./vaultwarden.nix ./vaultwarden.nix
./conduit.nix ./conduit.nix

View file

@ -47,8 +47,7 @@
port = 8100; port = 8100;
bind_address = "0.0.0.0"; bind_address = "0.0.0.0";
secret_key = "@SEARXNG_SECRET@"; secret_key = "@SEARXNG_SECRET@";
base_url = "https://search.flake.sh/"; public_instance = false;
public_instance = true;
infinite_scroll = true; infinite_scroll = true;
}; };
redis = { redis = {

View file

@ -176,19 +176,6 @@
tls.domains = [{main = "*.flake.sh";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
}; };
searxng-insecure = {
rule = "Host(`search.flake.sh`)";
entrypoints = ["web"];
service = "searxng";
middlewares = "redirect-to-https";
};
searxng = {
rule = "Host(`search.flake.sh`)";
entrypoints = ["websecure"];
service = "searxng";
tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production";
};
neko-insecure = { neko-insecure = {
rule = "Host(`neko.flake.sh`)"; rule = "Host(`neko.flake.sh`)";
entrypoints = ["web"]; entrypoints = ["web"];

View file

@ -1,5 +1,4 @@
_: { _: {
networking.firewall.allowedTCPPorts = [4000];
services.uptime-kuma = { services.uptime-kuma = {
enable = true; enable = true;
settings = { settings = {

View file

@ -34,7 +34,7 @@
}; };
fileSystems."/nas" = { fileSystems."/nas" = {
device = "192.168.1.71:/volume1/tsuki"; device = "192.168.1.199:/mnt/Sutoreji/tsuki";
fsType = "nfs"; fsType = "nfs";
}; };

View file

@ -24,17 +24,17 @@
}; };
fileSystems."/nas" = { fileSystems."/nas" = {
device = "192.168.1.71:/volume1/yuki"; device = "192.168.1.199:/mnt/Sutoreji/yuki";
fsType = "nfs"; fsType = "nfs";
}; };
fileSystems."/home/notoh/docker/stash/data" = { fileSystems."/home/notoh/docker/stash/data" = {
device = "192.168.1.71:/volume1/stash"; device = "192.168.1.199:/mnt/Sutoreji/stash";
fsType = "nfs"; fsType = "nfs";
}; };
fileSystems."/media" = { fileSystems."/media" = {
device = "192.168.1.71:/volume1/media"; device = "192.168.1.199:/mnt/Sutoreji/media";
fsType = "nfs"; fsType = "nfs";
}; };