feat: Split all the services into their own files
This commit is contained in:
@@ -6,8 +6,8 @@
|
||||
}: {
|
||||
imports = [
|
||||
# Include the results of the hardware scan.
|
||||
./services
|
||||
./mirai.nix
|
||||
./services.nix
|
||||
./docker.nix
|
||||
];
|
||||
security.sudo.wheelNeedsPassword = false;
|
||||
@@ -15,7 +15,6 @@
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
defaultSopsFormat = "yaml";
|
||||
age.keyFile = "/home/fs0c131y/.config/sops/age/keys.txt";
|
||||
secrets."nextcloud/adminpass".owner = config.users.users.nextcloud.name;
|
||||
secrets."llama/user".owner = config.services.caddy.user;
|
||||
secrets."builder/mirai/cache/private" = {};
|
||||
secrets."llama/api_key".owner = config.services.caddy.user;
|
||||
|
||||
@@ -1,286 +0,0 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
sops = {
|
||||
secrets = {
|
||||
"authelia/servers/darksailor/jwtSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/servers/darksailor/storageEncryptionSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/servers/darksailor/sessionSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/users/servius".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
users.owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
};
|
||||
};
|
||||
services = {
|
||||
nix-serve = {
|
||||
enable = true;
|
||||
};
|
||||
home-assistant = {
|
||||
enable = false;
|
||||
extraComponents = [
|
||||
"esphome"
|
||||
"met"
|
||||
"radio_browser"
|
||||
"wiz"
|
||||
];
|
||||
customComponents = [
|
||||
pkgs.home-assistant-custom-components.auth-header
|
||||
];
|
||||
config = {
|
||||
default_config = {};
|
||||
http = {
|
||||
server_host = "::1";
|
||||
trusted_proxies = ["::1"];
|
||||
use_x_forwarded_for = true;
|
||||
};
|
||||
auth_header = {
|
||||
username_header = "Remote-User";
|
||||
};
|
||||
};
|
||||
};
|
||||
jellyfin = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
authelia = {
|
||||
instances.darksailor = {
|
||||
enable = true;
|
||||
settings = {
|
||||
authentication_backend = {
|
||||
password_reset.disable = false;
|
||||
file = {
|
||||
path = "/run/secrets/users";
|
||||
};
|
||||
};
|
||||
session = {
|
||||
cookies = [
|
||||
{
|
||||
domain = "darksailor.dev";
|
||||
authelia_url = "https://auth.darksailor.dev";
|
||||
name = "authelia_session";
|
||||
}
|
||||
];
|
||||
};
|
||||
access_control = {
|
||||
default_policy = "one_factor";
|
||||
rules = [
|
||||
{
|
||||
domain = "darksailor.dev";
|
||||
policy = "one_factor";
|
||||
}
|
||||
{
|
||||
domain = "media.darksailor.dev";
|
||||
policy = "one_factor";
|
||||
}
|
||||
{
|
||||
domain = "music.darksailor.dev";
|
||||
policy = "one_factor";
|
||||
}
|
||||
{
|
||||
domain = "music.darksailor.dev";
|
||||
policy = "bypass";
|
||||
resources = [
|
||||
"^/rest([/?].*)?$"
|
||||
"^/share([/?].*)?$"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
storage = {
|
||||
local = {
|
||||
path = "/var/lib/authelia-darksailor/authelia.sqlite3";
|
||||
};
|
||||
};
|
||||
theme = "dark";
|
||||
notifier.filesystem.filename = "/var/lib/authelia-darksailor/authelia-notifier.log";
|
||||
server = {
|
||||
address = "127.0.0.1:5555";
|
||||
endpoints.authz = {
|
||||
forward-auth = {
|
||||
implementation = "ForwardAuth";
|
||||
};
|
||||
auth-request = {
|
||||
implementation = "AuthRequest";
|
||||
};
|
||||
};
|
||||
};
|
||||
# log = {
|
||||
# file_path = "/tmp/authelia.log";
|
||||
# };
|
||||
};
|
||||
secrets = {
|
||||
jwtSecretFile = config.sops.secrets."authelia/servers/darksailor/jwtSecret".path;
|
||||
storageEncryptionKeyFile = config.sops.secrets."authelia/servers/darksailor/storageEncryptionSecret".path;
|
||||
sessionSecretFile = config.sops.secrets."authelia/servers/darksailor/sessionSecret".path;
|
||||
};
|
||||
};
|
||||
};
|
||||
fail2ban = {
|
||||
enable = true;
|
||||
bantime = "24h"; # Ban IPs for one day on the first ban
|
||||
bantime-increment = {
|
||||
enable = true; # Enable increment of bantime after each violation
|
||||
# formula = "ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)";
|
||||
multipliers = "1 2 4 8 16 32 64";
|
||||
maxtime = "168h"; # Do not ban for more than 1 week
|
||||
overalljails = true; # Calculate the bantime based on all the violations
|
||||
};
|
||||
# jails.apache-nohome-iptables.settings = {
|
||||
# # Block an IP address if it accesses a non-existent
|
||||
# # home directory more than 5 times in 10 minutes,
|
||||
# # since that indicates that it's scanning.
|
||||
# filter = "apache-nohome";
|
||||
# action = ''iptables-multiport[name=HTTP, port="http,https"]'';
|
||||
# logpath = "/var/log/httpd/error_log*";
|
||||
# backend = "auto";
|
||||
# findtime = 600;
|
||||
# bantime = 600;
|
||||
# maxretry = 5;
|
||||
# };
|
||||
};
|
||||
tailscale = {
|
||||
enable = true;
|
||||
};
|
||||
navidrome = {
|
||||
enable = false;
|
||||
settings = {
|
||||
MusicFolder = "/media/music";
|
||||
ReverseProxyUserHeader = "Remote-User";
|
||||
ReverseProxyWhitelist = "127.0.0.1/32";
|
||||
};
|
||||
};
|
||||
atuin = {
|
||||
enable = true;
|
||||
};
|
||||
nextcloud = {
|
||||
enable = true;
|
||||
package = pkgs.nextcloud30;
|
||||
hostName = "cloud.darksailor.dev";
|
||||
config.adminuser = "servius";
|
||||
config.adminpassFile = config.sops.secrets."nextcloud/adminpass".path;
|
||||
configureRedis = true;
|
||||
https = true;
|
||||
};
|
||||
ollama = {
|
||||
enable = true;
|
||||
loadModels = ["RobinBially/nomic-embed-text-8k" "mistral"];
|
||||
port = 11434;
|
||||
host = "0.0.0.0";
|
||||
environmentVariables = {
|
||||
OLLAMA_ORIGINS = "*";
|
||||
};
|
||||
};
|
||||
nextjs-ollama-llm-ui = {
|
||||
enable = true;
|
||||
port = 5096;
|
||||
ollamaUrl = "https://llama.darksailor.dev/api/ollama";
|
||||
};
|
||||
llama-cpp = {
|
||||
enable = false;
|
||||
host = "127.0.0.1";
|
||||
port = 3000;
|
||||
model = builtins.fetchurl {
|
||||
name = "qwen_2.5.1_coder_7b_instruct_gguf";
|
||||
sha256 = "61834b88c1a1ce5c277028a98c4a0c94a564210290992a7ba301bbef96ef8eba";
|
||||
url = "https://huggingface.co/bartowski/Qwen2.5.1-Coder-7B-Instruct-GGUF/resolve/main/Qwen2.5.1-Coder-7B-Instruct-Q8_0.gguf?download=true";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."${config.services.nextcloud.hostName}".listen = [
|
||||
{
|
||||
addr = "127.0.0.1";
|
||||
port = 8080; # NOT an exposed port
|
||||
}
|
||||
];
|
||||
|
||||
caddy = {
|
||||
enable = true;
|
||||
virtualHosts."music.darksailor.dev".extraConfig = ''
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:4533
|
||||
'';
|
||||
virtualHosts."media.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8096
|
||||
'';
|
||||
virtualHosts."atuin.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8888
|
||||
'';
|
||||
virtualHosts."cloud.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8080
|
||||
'';
|
||||
virtualHosts."llama.darksailor.dev".extraConfig = ''
|
||||
handle /api/v1/* {
|
||||
uri strip_prefix /api/v1
|
||||
reverse_proxy localhost:3000
|
||||
|
||||
@apikey {
|
||||
header Authorization "Bearer {env.LLAMA_API_KEY}"
|
||||
}
|
||||
|
||||
handle @apikey {
|
||||
header {
|
||||
# Set response headers or proxy to a different service if API key is valid
|
||||
Access-Control-Allow-Origin *
|
||||
-Authorization "Bearer {env.LLAMA_API_KEY}" # Remove the header after validation
|
||||
}
|
||||
reverse_proxy localhost:11434
|
||||
}
|
||||
|
||||
handle {
|
||||
respond "Unauthorized" 403
|
||||
}
|
||||
}
|
||||
|
||||
handle /api/ollama/* {
|
||||
uri strip_prefix /api/ollama
|
||||
reverse_proxy localhost:11434
|
||||
|
||||
@apikey {
|
||||
header Authorization "Bearer {env.LLAMA_API_KEY}"
|
||||
}
|
||||
|
||||
handle @apikey {
|
||||
header {
|
||||
# Set response headers or proxy to a different service if API key is valid
|
||||
Access-Control-Allow-Origin *
|
||||
-Authorization "Bearer {env.LLAMA_API_KEY}" # Remove the header after validation
|
||||
}
|
||||
reverse_proxy localhost:11434
|
||||
}
|
||||
|
||||
handle {
|
||||
respond "Unauthorized" 403
|
||||
}
|
||||
}
|
||||
|
||||
handle {
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:5096
|
||||
}
|
||||
'';
|
||||
virtualHosts."auth.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:5555
|
||||
'';
|
||||
virtualHosts."home.darksailor.dev".extraConfig = ''
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:8123
|
||||
|
||||
'';
|
||||
};
|
||||
};
|
||||
systemd.services.caddy = {
|
||||
serviceConfig = {
|
||||
EnvironmentFile = config.sops.templates."LLAMA_API_KEY.env".path;
|
||||
};
|
||||
};
|
||||
}
|
||||
12
nixos/mirai/services/atuin.nix
Normal file
12
nixos/mirai/services/atuin.nix
Normal file
@@ -0,0 +1,12 @@
|
||||
{...}: {
|
||||
services = {
|
||||
atuin = {
|
||||
enable = true;
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."atuin.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8888
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
91
nixos/mirai/services/authelia.nix
Normal file
91
nixos/mirai/services/authelia.nix
Normal file
@@ -0,0 +1,91 @@
|
||||
{config, ...}: {
|
||||
sops = {
|
||||
secrets = {
|
||||
"authelia/servers/darksailor/jwtSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/servers/darksailor/storageEncryptionSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/servers/darksailor/sessionSecret".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
"authelia/users/servius".owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
users.owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||
};
|
||||
};
|
||||
services = {
|
||||
authelia = {
|
||||
instances.darksailor = {
|
||||
enable = true;
|
||||
settings = {
|
||||
authentication_backend = {
|
||||
password_reset.disable = false;
|
||||
file = {
|
||||
path = "/run/secrets/users";
|
||||
};
|
||||
};
|
||||
session = {
|
||||
cookies = [
|
||||
{
|
||||
domain = "darksailor.dev";
|
||||
authelia_url = "https://auth.darksailor.dev";
|
||||
name = "authelia_session";
|
||||
}
|
||||
];
|
||||
};
|
||||
access_control = {
|
||||
default_policy = "one_factor";
|
||||
rules = [
|
||||
{
|
||||
domain = "darksailor.dev";
|
||||
policy = "one_factor";
|
||||
}
|
||||
# {
|
||||
# domain = "media.darksailor.dev";
|
||||
# policy = "one_factor";
|
||||
# }
|
||||
{
|
||||
domain = "music.darksailor.dev";
|
||||
policy = "one_factor";
|
||||
}
|
||||
{
|
||||
domain = "music.darksailor.dev";
|
||||
policy = "bypass";
|
||||
resources = [
|
||||
"^/rest([/?].*)?$"
|
||||
"^/share([/?].*)?$"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
storage = {
|
||||
local = {
|
||||
path = "/var/lib/authelia-darksailor/authelia.sqlite3";
|
||||
};
|
||||
};
|
||||
theme = "dark";
|
||||
notifier.filesystem.filename = "/var/lib/authelia-darksailor/authelia-notifier.log";
|
||||
server = {
|
||||
address = "127.0.0.1:5555";
|
||||
endpoints.authz = {
|
||||
forward-auth = {
|
||||
implementation = "ForwardAuth";
|
||||
};
|
||||
auth-request = {
|
||||
implementation = "AuthRequest";
|
||||
};
|
||||
};
|
||||
};
|
||||
# log = {
|
||||
# file_path = "/tmp/authelia.log";
|
||||
# };
|
||||
};
|
||||
secrets = {
|
||||
jwtSecretFile = config.sops.secrets."authelia/servers/darksailor/jwtSecret".path;
|
||||
storageEncryptionKeyFile = config.sops.secrets."authelia/servers/darksailor/storageEncryptionSecret".path;
|
||||
sessionSecretFile = config.sops.secrets."authelia/servers/darksailor/sessionSecret".path;
|
||||
};
|
||||
};
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."auth.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:5555
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
33
nixos/mirai/services/default.nix
Normal file
33
nixos/mirai/services/default.nix
Normal file
@@ -0,0 +1,33 @@
|
||||
{...}: {
|
||||
imports = [
|
||||
./atuin.nix
|
||||
./authelia.nix
|
||||
./home-assistant.nix
|
||||
./navidrome.nix
|
||||
./llama.nix
|
||||
# ./nextcloud.nix
|
||||
# ./jellyfin.nix
|
||||
];
|
||||
services = {
|
||||
nix-serve = {
|
||||
enable = true;
|
||||
};
|
||||
fail2ban = {
|
||||
enable = true;
|
||||
bantime = "24h"; # Ban IPs for one day on the first ban
|
||||
bantime-increment = {
|
||||
enable = true; # Enable increment of bantime after each violation
|
||||
# formula = "ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)";
|
||||
multipliers = "1 2 4 8 16 32 64";
|
||||
maxtime = "168h"; # Do not ban for more than 1 week
|
||||
overalljails = true; # Calculate the bantime based on all the violations
|
||||
};
|
||||
};
|
||||
tailscale = {
|
||||
enable = true;
|
||||
};
|
||||
caddy = {
|
||||
enable = true;
|
||||
};
|
||||
};
|
||||
}
|
||||
41
nixos/mirai/services/home-assistant.nix
Normal file
41
nixos/mirai/services/home-assistant.nix
Normal file
@@ -0,0 +1,41 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
services = {
|
||||
home-assistant = {
|
||||
enable = false;
|
||||
extraComponents = [
|
||||
"esphome"
|
||||
"met"
|
||||
"radio_browser"
|
||||
"wiz"
|
||||
];
|
||||
customComponents = [
|
||||
pkgs.home-assistant-custom-components.auth-header
|
||||
];
|
||||
config = {
|
||||
default_config = {};
|
||||
http = {
|
||||
server_host = "::1";
|
||||
trusted_proxies = ["::1"];
|
||||
use_x_forwarded_for = true;
|
||||
};
|
||||
auth_header = {
|
||||
username_header = "Remote-User";
|
||||
};
|
||||
};
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."home.darksailor.dev".extraConfig = ''
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:8123
|
||||
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
13
nixos/mirai/services/jellyfin.nix
Normal file
13
nixos/mirai/services/jellyfin.nix
Normal file
@@ -0,0 +1,13 @@
|
||||
{...}: {
|
||||
services = {
|
||||
jellyfin = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."media.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8096
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
98
nixos/mirai/services/llama.nix
Normal file
98
nixos/mirai/services/llama.nix
Normal file
@@ -0,0 +1,98 @@
|
||||
{config, ...}: {
|
||||
sops = {
|
||||
secrets."llama/api_key".owner = config.services.caddy.user;
|
||||
secrets."llama/user".owner = config.services.caddy.user;
|
||||
};
|
||||
services = {
|
||||
ollama = {
|
||||
enable = true;
|
||||
loadModels = ["RobinBially/nomic-embed-text-8k" "mistral"];
|
||||
port = 11434;
|
||||
host = "0.0.0.0";
|
||||
environmentVariables = {
|
||||
OLLAMA_ORIGINS = "*";
|
||||
};
|
||||
};
|
||||
nextjs-ollama-llm-ui = {
|
||||
enable = true;
|
||||
port = 5096;
|
||||
ollamaUrl = "https://llama.darksailor.dev/api/ollama";
|
||||
};
|
||||
# llama-cpp = {
|
||||
# enable = false;
|
||||
# host = "127.0.0.1";
|
||||
# port = 3000;
|
||||
# model = builtins.fetchurl {
|
||||
# name = "qwen_2.5.1_coder_7b_instruct_gguf";
|
||||
# sha256 = "61834b88c1a1ce5c277028a98c4a0c94a564210290992a7ba301bbef96ef8eba";
|
||||
# url = "https://huggingface.co/bartowski/Qwen2.5.1-Coder-7B-Instruct-GGUF/resolve/main/Qwen2.5.1-Coder-7B-Instruct-Q8_0.gguf?download=true";
|
||||
# };
|
||||
# };
|
||||
# nginx.virtualHosts."${config.services.nextcloud.hostName}".listen = [
|
||||
# {
|
||||
# addr = "127.0.0.1";
|
||||
# port = 8080; # NOT an exposed port
|
||||
# }
|
||||
# ];
|
||||
caddy = {
|
||||
virtualHosts."llama.darksailor.dev".extraConfig = ''
|
||||
handle /api/v1/* {
|
||||
uri strip_prefix /api/v1
|
||||
reverse_proxy localhost:3000
|
||||
|
||||
@apikey {
|
||||
header Authorization "Bearer {env.LLAMA_API_KEY}"
|
||||
}
|
||||
|
||||
handle @apikey {
|
||||
header {
|
||||
# Set response headers or proxy to a different service if API key is valid
|
||||
Access-Control-Allow-Origin *
|
||||
-Authorization "Bearer {env.LLAMA_API_KEY}" # Remove the header after validation
|
||||
}
|
||||
reverse_proxy localhost:11434
|
||||
}
|
||||
|
||||
handle {
|
||||
respond "Unauthorized" 403
|
||||
}
|
||||
}
|
||||
|
||||
handle /api/ollama/* {
|
||||
uri strip_prefix /api/ollama
|
||||
reverse_proxy localhost:11434
|
||||
|
||||
@apikey {
|
||||
header Authorization "Bearer {env.LLAMA_API_KEY}"
|
||||
}
|
||||
|
||||
handle @apikey {
|
||||
header {
|
||||
# Set response headers or proxy to a different service if API key is valid
|
||||
Access-Control-Allow-Origin *
|
||||
-Authorization "Bearer {env.LLAMA_API_KEY}" # Remove the header after validation
|
||||
}
|
||||
reverse_proxy localhost:11434
|
||||
}
|
||||
|
||||
handle {
|
||||
respond "Unauthorized" 403
|
||||
}
|
||||
}
|
||||
|
||||
handle {
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:5096
|
||||
}
|
||||
'';
|
||||
};
|
||||
};
|
||||
systemd.services.caddy = {
|
||||
serviceConfig = {
|
||||
EnvironmentFile = config.sops.templates."LLAMA_API_KEY.env".path;
|
||||
};
|
||||
};
|
||||
}
|
||||
21
nixos/mirai/services/navidrome.nix
Normal file
21
nixos/mirai/services/navidrome.nix
Normal file
@@ -0,0 +1,21 @@
|
||||
{...}: {
|
||||
services = {
|
||||
navidrome = {
|
||||
enable = true;
|
||||
settings = {
|
||||
MusicFolder = "/media/music";
|
||||
ReverseProxyUserHeader = "Remote-User";
|
||||
ReverseProxyWhitelist = "127.0.0.1/32";
|
||||
};
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."music.darksailor.dev".extraConfig = ''
|
||||
forward_auth localhost:5555 {
|
||||
uri /api/authz/forward-auth
|
||||
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
|
||||
}
|
||||
reverse_proxy localhost:4533
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
31
nixos/mirai/services/nextcloud.nix
Normal file
31
nixos/mirai/services/nextcloud.nix
Normal file
@@ -0,0 +1,31 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
sops = {
|
||||
secrets."nextcloud/adminpass".owner = config.users.users.nextcloud.name;
|
||||
};
|
||||
services = {
|
||||
nextcloud = {
|
||||
enable = true;
|
||||
package = pkgs.nextcloud30;
|
||||
hostName = "cloud.darksailor.dev";
|
||||
config.adminuser = "servius";
|
||||
config.adminpassFile = config.sops.secrets."nextcloud/adminpass".path;
|
||||
configureRedis = true;
|
||||
https = true;
|
||||
};
|
||||
caddy = {
|
||||
virtualHosts."cloud.darksailor.dev".extraConfig = ''
|
||||
reverse_proxy localhost:8080
|
||||
'';
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."${config.services.nextcloud.hostName}".listen = [
|
||||
{
|
||||
addr = "127.0.0.1";
|
||||
port = 8080; # NOT an exposed port
|
||||
}
|
||||
];
|
||||
}
|
||||
Reference in New Issue
Block a user