Compare commits

..

2 commits

Author SHA1 Message Date
uku
373e2dd386
chore: cleanups 2024-12-31 16:08:29 +01:00
uku
250c600a48
chore(vesuvio): split config into multiple files 2024-12-31 16:06:33 +01:00
6 changed files with 97 additions and 90 deletions

View file

@ -1,4 +1,3 @@
{ ... }:
{ {
services.immich = { services.immich = {
enable = true; enable = true;

View file

@ -24,7 +24,8 @@ in
}; };
}; };
services.grafana = { services = {
grafana = {
enable = true; enable = true;
settings = { settings = {
server = { server = {
@ -34,13 +35,13 @@ in
}; };
}; };
services.victoriametrics = { victoriametrics = {
enable = true; enable = true;
listenAddress = "127.0.0.1:9090"; listenAddress = "127.0.0.1:9090";
retentionPeriod = "5y"; retentionPeriod = "5y";
}; };
services.vmagent = { vmagent = {
enable = true; enable = true;
prometheusConfig = { prometheusConfig = {
global.scrape_interval = "15s"; global.scrape_interval = "15s";
@ -60,7 +61,7 @@ in
}; };
}; };
services.vmauth = { vmauth = {
enable = true; enable = true;
listenAddress = "127.0.0.1:9089"; listenAddress = "127.0.0.1:9089";
environmentFile = vmauthEnv.path; environmentFile = vmauthEnv.path;
@ -71,4 +72,5 @@ in
} }
]; ];
}; };
};
} }

View file

@ -43,7 +43,7 @@
replacements = [ replacements = [
{ {
oldDependency = pkgs.ffmpeg-full; oldDependency = pkgs.ffmpeg-full;
newDependency = (pkgs.ffmpeg-full.override { withUnfree = true; }); newDependency = pkgs.ffmpeg-full.override { withUnfree = true; };
} }
]; ];
}; };

View file

@ -1,60 +1,17 @@
{ pkgs, ... }:
{ {
pkgs, imports = [
config, ./frp.nix
_utils, ./hetzner.nix
... ];
}:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
zramSwap.enable = true;
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
dig dig
traceroute traceroute
]; ];
services = { services.openssh = {
openssh.ports = [ 4269 ]; ports = [ 4269 ];
openFirewall = true;
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
};
systemd.services = {
frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
qemu-guest-agent.path = [ pkgs.shadow ];
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
}; };
} }

31
systems/vesuvio/frp.nix Normal file
View file

@ -0,0 +1,31 @@
{ config, _utils, ... }:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
services.frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
};
systemd.services.frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
}

View file

@ -0,0 +1,18 @@
{ pkgs, ... }:
{
services = {
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
# Hetzner DNS does not work with DoT
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
};
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
systemd.services.qemu-guest-agent.path = [ pkgs.shadow ];
zramSwap.enable = true;
}