reduce reliance on feature variable
This commit is contained in:
parent
924d87e1c0
commit
f99185cd13
24 changed files with 82 additions and 82 deletions
|
|
@ -13,17 +13,9 @@ in
|
||||||
imports = [ inputs.copyparty.nixosModules.default ];
|
imports = [ inputs.copyparty.nixosModules.default ];
|
||||||
|
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
environment.systemPackages = [ pkgs.copyparty ];
|
|
||||||
nixpkgs.overlays = [ inputs.copyparty.overlays.default ];
|
|
||||||
|
|
||||||
age.secrets."copyparty-will" = {
|
|
||||||
file = ../../../secrets/copyparty-will.age;
|
|
||||||
owner = "copyparty";
|
|
||||||
};
|
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
copyparty = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
z = true;
|
z = true;
|
||||||
|
|
@ -62,6 +54,15 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# secrets
|
||||||
|
age.secrets."copyparty-will" = {
|
||||||
|
file = ../../../secrets/copyparty-will.age;
|
||||||
|
owner = "copyparty";
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [ pkgs.copyparty ];
|
||||||
|
nixpkgs.overlays = [ inputs.copyparty.overlays.default ];
|
||||||
};
|
};
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
couchdb = {
|
||||||
enable = true;
|
enable = true;
|
||||||
databaseDir = "/srv/couchdb";
|
databaseDir = "/srv/couchdb";
|
||||||
viewIndexDir = "/srv/couchdb";
|
viewIndexDir = "/srv/couchdb";
|
||||||
|
|
|
||||||
|
|
@ -7,7 +7,7 @@ let
|
||||||
feature = "direnv";
|
feature = "direnv";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable { programs.${feature}.enable = true; };
|
config = lib.mkIf config.${feature}.enable { programs.direnv.enable = true; };
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
flaresolverr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
port = lib.toInt port;
|
port = lib.toInt port;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -33,15 +33,12 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
system.activationScripts = insertSecrets secrets;
|
|
||||||
age.secrets = genSecrets secrets;
|
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
homepage-dashboard = {
|
||||||
enable = true;
|
enable = true;
|
||||||
listenPort = lib.toInt port;
|
listenPort = lib.toInt port;
|
||||||
allowedHosts = "${feature}.fi33.buzz";
|
allowedHosts = "homepage-dashboard.fi33.buzz";
|
||||||
services = [
|
services = [
|
||||||
{
|
{
|
||||||
"Media Management" = [
|
"Media Management" = [
|
||||||
|
|
@ -275,6 +272,10 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# secrets
|
||||||
|
age.secrets = genSecrets secrets;
|
||||||
|
system.activationScripts = insertSecrets secrets;
|
||||||
};
|
};
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
|
||||||
|
|
@ -9,22 +9,22 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services.${feature} = {
|
services = {
|
||||||
enable = true;
|
immich = {
|
||||||
port = builtins.fromJSON "${port}";
|
enable = true;
|
||||||
mediaLocation = "/srv/${feature}";
|
port = builtins.fromJSON "${port}";
|
||||||
};
|
mediaLocation = "/srv/immich";
|
||||||
|
};
|
||||||
|
|
||||||
# reverse proxy
|
nginx = {
|
||||||
services.nginx = {
|
clientMaxBodySize = "50000M";
|
||||||
clientMaxBodySize = "50000M";
|
virtualHosts."${feature}.fi33.buzz" = {
|
||||||
|
forceSSL = true;
|
||||||
virtualHosts."${feature}.fi33.buzz" = {
|
useACMEHost = "fi33.buzz";
|
||||||
forceSSL = true;
|
locations."/" = {
|
||||||
useACMEHost = "fi33.buzz";
|
proxyPass = "http://[::1]:${port}";
|
||||||
locations."/" = {
|
proxyWebsockets = true;
|
||||||
proxyPass = "http://[::1]:${port}";
|
};
|
||||||
proxyWebsockets = true;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -12,7 +12,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
jellyfin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/jellyfin";
|
dataDir = "/srv/jellyfin";
|
||||||
group = "media";
|
group = "media";
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
lidarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/lidarr";
|
dataDir = "/srv/lidarr";
|
||||||
settings.server.port = lib.toInt port;
|
settings.server.port = lib.toInt port;
|
||||||
|
|
|
||||||
|
|
@ -9,11 +9,9 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
age.secrets.miniflux-creds.file = ../../../secrets/miniflux-creds.age;
|
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
miniflux = {
|
||||||
enable = true;
|
enable = true;
|
||||||
adminCredentialsFile = config.age.secrets.miniflux-creds.path;
|
adminCredentialsFile = config.age.secrets.miniflux-creds.path;
|
||||||
config = {
|
config = {
|
||||||
|
|
@ -34,6 +32,10 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# secrets
|
||||||
|
age.secrets."miniflux-creds".file = ../../../secrets/miniflux-creds.age;
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
|
||||||
|
|
@ -8,11 +8,7 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
age.secrets."porkbun-api" = {
|
services.nginx = {
|
||||||
file = ../../../secrets/porkbun-api.age;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.${feature} = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
recommendedProxySettings = true;
|
recommendedProxySettings = true;
|
||||||
|
|
@ -33,14 +29,19 @@ in
|
||||||
certs."fi33.buzz" = {
|
certs."fi33.buzz" = {
|
||||||
domain = "fi33.buzz";
|
domain = "fi33.buzz";
|
||||||
extraDomainNames = [ "*.fi33.buzz" ];
|
extraDomainNames = [ "*.fi33.buzz" ];
|
||||||
group = "${feature}";
|
group = "nginx";
|
||||||
dnsProvider = "porkbun";
|
dnsProvider = "porkbun";
|
||||||
dnsPropagationCheck = true;
|
dnsPropagationCheck = true;
|
||||||
credentialsFile = config.age.secrets."porkbun-api".path;
|
credentialsFile = config.age.secrets."porkbun-api".path;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
users.users.${feature}.extraGroups = [ "acme" ];
|
# secrets
|
||||||
|
age.secrets."porkbun-api" = {
|
||||||
|
file = ../../../secrets/porkbun-api.age;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.nginx.extraGroups = [ "acme" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
|
||||||
|
|
@ -9,7 +9,7 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
programs.${feature} = {
|
programs.nh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
# clean.enable = true;
|
# clean.enable = true;
|
||||||
flake = "/home/${userName}/.dots";
|
flake = "/home/${userName}/.dots";
|
||||||
|
|
|
||||||
|
|
@ -10,7 +10,7 @@ in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
environment.variables.EDITOR = "nvim";
|
environment.variables.EDITOR = "nvim";
|
||||||
programs.${feature} = {
|
programs.nixvim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
opts = {
|
opts = {
|
||||||
shiftwidth = 2;
|
shiftwidth = 2;
|
||||||
|
|
|
||||||
|
|
@ -11,10 +11,10 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
ntfy-sh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
base-url = "https://${feature}.fi33.buzz";
|
base-url = "https://ntfy-sh.fi33.buzz";
|
||||||
listen-http = ":${port}";
|
listen-http = ":${port}";
|
||||||
behind-proxy = true;
|
behind-proxy = true;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
paperless = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/paperless";
|
dataDir = "/srv/paperless";
|
||||||
database.createLocally = true;
|
database.createLocally = true;
|
||||||
|
|
@ -35,7 +35,10 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
age.secrets.paperless.file = ../../../secrets/paperless.age;
|
age.secrets."paperless" = {
|
||||||
|
file = ../../../secrets/paperless.age;
|
||||||
|
owner = "paperless";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
|
||||||
|
|
@ -15,7 +15,5 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
imports = [ ];
|
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,5 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
imports = [ ];
|
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
prowlarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/prowlarr";
|
dataDir = "/srv/prowlarr";
|
||||||
settings.server.port = lib.toInt port;
|
settings.server.port = lib.toInt port;
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
radarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/radarr";
|
dataDir = "/srv/radarr";
|
||||||
settings.server.port = lib.toInt port;
|
settings.server.port = lib.toInt port;
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
sonarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = "/srv/sonarr";
|
dataDir = "/srv/sonarr";
|
||||||
settings.server.port = lib.toInt port;
|
settings.server.port = lib.toInt port;
|
||||||
|
|
|
||||||
|
|
@ -10,7 +10,5 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
imports = [ ];
|
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -8,9 +8,7 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services.tailscale.enable = true;
|
||||||
${feature}.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall.trustedInterfaces = [ "tailscale0" ];
|
networking.firewall.trustedInterfaces = [ "tailscale0" ];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -10,18 +10,20 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services.${feature} = {
|
services = {
|
||||||
enable = true;
|
vaultwarden = {
|
||||||
backupDir = "/srv/${feature}";
|
enable = true;
|
||||||
config = {
|
backupDir = "/srv/vaultwarden";
|
||||||
rocketPort = "${port}";
|
config = {
|
||||||
domain = "https://${feature}.fi33.buzz";
|
rocketPort = "${port}";
|
||||||
signupsAllowed = false;
|
domain = "https://vaultwarden.fi33.buzz";
|
||||||
invitationsAllowed = false;
|
signupsAllowed = false;
|
||||||
showPasswordHint = false;
|
invitationsAllowed = false;
|
||||||
useSyslog = true;
|
showPasswordHint = false;
|
||||||
extendedLogging = true;
|
useSyslog = true;
|
||||||
adminTokenFile = "${config.age.secrets.vaultwarden-admin.path}";
|
extendedLogging = true;
|
||||||
|
adminTokenFile = "${config.age.secrets.vaultwarden-admin.path}";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -36,11 +38,9 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
# secrets
|
# secrets
|
||||||
age.secrets = {
|
age.secrets."vaultwarden-admin" = {
|
||||||
"vaultwarden-admin" = {
|
file = ../../../secrets/vaultwarden-admin.age;
|
||||||
file = ../../../secrets/vaultwarden-admin.age;
|
owner = "vaultwarden";
|
||||||
owner = "${feature}";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -8,9 +8,9 @@ let
|
||||||
feature = "vscode-server";
|
feature = "vscode-server";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.${feature}.enable { services.${feature}.enable = true; };
|
config = lib.mkIf config.${feature}.enable { services.vscode-server.enable = true; };
|
||||||
|
|
||||||
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
options.${feature}.enable = lib.mkEnableOption "enables ${feature}";
|
||||||
|
|
||||||
imports = [ inputs.${feature}.nixosModules.default ];
|
imports = [ inputs.vscode-server.nixosModules.default ];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -7,7 +7,7 @@ in
|
||||||
config = lib.mkIf config.${feature}.enable {
|
config = lib.mkIf config.${feature}.enable {
|
||||||
services = {
|
services = {
|
||||||
# service
|
# service
|
||||||
${feature} = {
|
feature = {
|
||||||
enable = true;
|
enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue