Compare commits

..

5 commits

Author SHA1 Message Date
da9c186010
refactor: hjemify foot & keepassxc
Some checks failed
/ test (push) Failing after 1s
2025-02-15 22:54:53 +01:00
831cb6b0f4
feat: add deck ssh acl
Some checks failed
/ test (push) Failing after 2s
2025-02-15 22:54:44 +01:00
243f70bb63
chore: replace nginxproxymanager with nginx 2025-02-15 22:54:34 +01:00
7a50bc17d4
fix: remove dns use from podman 2025-02-15 22:54:22 +01:00
49159caaf5
chore: update nysh
Some checks failed
/ test (push) Failing after 1s
2025-02-11 02:12:49 +01:00
4 changed files with 60 additions and 22 deletions

View file

@ -53,7 +53,7 @@ in
"tag:server" "tag:server"
"tag:client" "tag:client"
] ]
[ "ny" ] [ "ny" "deck" ]
) # client -> {client, server} ) # client -> {client, server}
]; ];

View file

@ -1,6 +1,7 @@
{ {
modulesPath, modulesPath,
pubkeys, pubkeys,
config,
... ...
}: }:
{ {
@ -35,12 +36,8 @@
container = { container = {
kitchenowl = { kitchenowl = {
enable = true; enable = true;
openFirewall = true;
version = "v0.6.4"; version = "v0.6.4";
}; };
nginxproxymanager = {
enable = true;
};
}; };
server = { server = {
@ -131,6 +128,56 @@
}; };
}; };
}; };
security.acme = {
acceptTerms = true;
defaults = {
email = "contact@ccnlc.eu";
dnsProvider = "ovh";
environmentFile = "/run/secrets/ovh";
};
certs."ccnlc.eu" = {
group = "nginx";
extraDomainNames = [ "*.ccnlc.eu" ];
};
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
clientMaxBodySize = "100M";
virtualHosts =
let
mkVHLocal = mkVH "http://localhost";
mkVH = domain: port: {
forceSSL = true;
locations."/" = {
proxyPass = "${domain}:${toString port}";
extraConfig = ''
proxy_ssl_server_name on;
proxy_pass_header Authorization;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection;
proxy_http_version 1.1;
'';
};
useACMEHost = "ccnlc.eu";
};
in
{
"octoprint.ccnlc.eu" = mkVHLocal config.services.octoprint.port;
"immich.ccnlc.eu" = mkVHLocal config.services.immich.port;
"jellyfin.ccnlc.eu" = mkVHLocal 8096;
"ntfy.ccnlc.eu" = mkVHLocal 9393;
"dav.ccnlc.eu" = mkVHLocal 5232;
"assistant.ccnlc.eu" = mkVHLocal config.services.home-assistant.config.http.server_port;
"kitchenowl.ccnlc.eu" = mkVHLocal config.modules.container.kitchenowl.port;
"navidrome.ccnlc.eu" = mkVHLocal config.services.navidrome.settings.Port;
"paperless.ccnlc.eu" = mkVHLocal config.modules.server.paperless.port;
"fritz.ccnlc.eu" = mkVH "http://192.168.178.1" 80;
"truenas.ccnlc.eu" = mkVH "https://192.168.178.21" 443;
};
};
services = { services = {
openssh = { openssh = {
@ -141,23 +188,15 @@
}; };
}; };
jellyfin = { jellyfin.enable = true;
enable = true; immich.enable = true;
openFirewall = true;
};
immich = {
enable = true;
openFirewall = true;
host = "0.0.0.0";
};
radicale = { radicale = {
enable = true; enable = true;
# Documentation at <https://radicale.org/v3.html#configuration> # Documentation at <https://radicale.org/v3.html#configuration>
settings = { settings = {
server = { server = {
hosts = [ "0.0.0.0:5232" ]; hosts = [ "127.0.0.1:5232" ];
}; };
auth = { auth = {
type = "htpasswd"; type = "htpasswd";
@ -178,7 +217,7 @@
in in
{ {
base-url = "https://ntfy.ccnlc.eu"; base-url = "https://ntfy.ccnlc.eu";
listen-http = "0.0.0.0:9393"; listen-http = "127.0.0.1:9393";
auth-default-access = "deny-all"; auth-default-access = "deny-all";
behind-proxy = true; behind-proxy = true;
attachment-cache-dir = "${root}/attachments"; attachment-cache-dir = "${root}/attachments";
@ -189,7 +228,6 @@
octoprint = { octoprint = {
enable = true; enable = true;
openFirewall = true;
port = 5000; port = 5000;
}; };
@ -225,8 +263,8 @@
}; };
networking.firewall.allowedTCPPorts = [ networking.firewall.allowedTCPPorts = [
5232 443
9393 80
]; ];
fileSystems = { fileSystems = {

View file

@ -77,7 +77,7 @@ in
ExecStop = "podman network rm -f kitchenowl_default"; ExecStop = "podman network rm -f kitchenowl_default";
}; };
script = '' script = ''
podman network inspect kitchenowl_default || podman network create kitchenowl_default podman network inspect kitchenowl_default || podman network create kitchenowl_default --disable-dns
''; '';
partOf = [ "podman-compose-kitchenowl-root.target" ]; partOf = [ "podman-compose-kitchenowl-root.target" ];
wantedBy = [ "podman-compose-kitchenowl-root.target" ]; wantedBy = [ "podman-compose-kitchenowl-root.target" ];

View file

@ -84,7 +84,7 @@ in
ExecStop = "podman network rm -f nginx_default"; ExecStop = "podman network rm -f nginx_default";
}; };
script = '' script = ''
podman network inspect nginx_default || podman network create nginx_default podman network inspect nginx_default || podman network create nginx_default --disable-dns
''; '';
partOf = [ "podman-compose-nginx-root.target" ]; partOf = [ "podman-compose-nginx-root.target" ];
wantedBy = [ "podman-compose-nginx-root.target" ]; wantedBy = [ "podman-compose-nginx-root.target" ];