Compare commits

..

No commits in common. "373e2dd38646ecad2078bcfe91d71f6702ccc838" and "f5be56222f4f031de14e52853ba9050c404c93f5" have entirely different histories.

6 changed files with 90 additions and 97 deletions

View file

@ -1,3 +1,4 @@
{ ... }:
{ {
services.immich = { services.immich = {
enable = true; enable = true;

View file

@ -24,8 +24,7 @@ in
}; };
}; };
services = { services.grafana = {
grafana = {
enable = true; enable = true;
settings = { settings = {
server = { server = {
@ -35,13 +34,13 @@ in
}; };
}; };
victoriametrics = { services.victoriametrics = {
enable = true; enable = true;
listenAddress = "127.0.0.1:9090"; listenAddress = "127.0.0.1:9090";
retentionPeriod = "5y"; retentionPeriod = "5y";
}; };
vmagent = { services.vmagent = {
enable = true; enable = true;
prometheusConfig = { prometheusConfig = {
global.scrape_interval = "15s"; global.scrape_interval = "15s";
@ -61,7 +60,7 @@ in
}; };
}; };
vmauth = { services.vmauth = {
enable = true; enable = true;
listenAddress = "127.0.0.1:9089"; listenAddress = "127.0.0.1:9089";
environmentFile = vmauthEnv.path; environmentFile = vmauthEnv.path;
@ -72,5 +71,4 @@ in
} }
]; ];
}; };
};
} }

View file

@ -43,7 +43,7 @@
replacements = [ replacements = [
{ {
oldDependency = pkgs.ffmpeg-full; oldDependency = pkgs.ffmpeg-full;
newDependency = pkgs.ffmpeg-full.override { withUnfree = true; }; newDependency = (pkgs.ffmpeg-full.override { withUnfree = true; });
} }
]; ];
}; };

View file

@ -1,17 +1,60 @@
{ pkgs, ... }:
{ {
imports = [ pkgs,
./frp.nix config,
./hetzner.nix _utils,
]; ...
}:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
zramSwap.enable = true;
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
dig dig
traceroute traceroute
]; ];
services.openssh = { services = {
ports = [ 4269 ]; openssh.ports = [ 4269 ];
openFirewall = true;
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
};
systemd.services = {
frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
qemu-guest-agent.path = [ pkgs.shadow ];
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
}; };
} }

View file

@ -1,31 +0,0 @@
{ config, _utils, ... }:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
services.frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
};
systemd.services.frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
}

View file

@ -1,18 +0,0 @@
{ pkgs, ... }:
{
services = {
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
# Hetzner DNS does not work with DoT
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
};
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
systemd.services.qemu-guest-agent.path = [ pkgs.shadow ];
zramSwap.enable = true;
}