feat: bootstrap winters

This commit is contained in:
Swarsel 2024-09-23 22:09:33 +02:00
parent 713af5d722
commit f376490aee
Signed by: swarsel
GPG key ID: 26A54C31F2A4FD84
8 changed files with 382 additions and 355 deletions

View file

@ -19,7 +19,7 @@
services.jellyfin = {
enable = true;
user = "jellyfin";
# openFirewall = true; # this works only for the default ports
openFirewall = true; # this works only for the default ports
};
services.nginx = {
@ -30,7 +30,7 @@
acmeRoot = null;
locations = {
"/" = {
proxyPass = "http://192.168.1.16:8096";
proxyPass = "http://192.168.1.2:8096";
extraConfig = ''
client_max_body_size 0;
'';

View file

@ -22,7 +22,7 @@
acmeRoot = null;
locations = {
"/" = {
proxyPass = "http://192.168.1.22:8080";
proxyPass = "http://192.168.1.2:8080";
extraConfig = ''
client_max_body_size 0;
'';

View file

@ -151,6 +151,7 @@ in
services.mautrix-whatsapp = {
enable = true;
registerToSynapse = true;
settings = {
homeserver = {
address = "http://localhost:8008";
@ -197,6 +198,7 @@ in
services.mautrix-signal = {
enable = true;
registerToSynapse = true;
settings = {
homeserver = {
address = "http://localhost:8008";
@ -258,7 +260,7 @@ in
acmeRoot = null;
locations = {
"~ ^(/_matrix|/_synapse/client)" = {
proxyPass = "http://192.168.1.23:8008";
proxyPass = "http://192.168.1.2:8008";
extraConfig = ''
client_max_body_size 0;
'';

View file

@ -29,6 +29,7 @@
services.navidrome = {
enable = true;
openFirewall = true;
settings = {
Address = "0.0.0.0";
Port = 4040;
@ -55,7 +56,7 @@
acmeRoot = null;
locations = {
"/" = {
proxyPass = "http://192.168.1.13:4040";
proxyPass = "http://192.168.1.2:4040";
proxyWebsockets = true;
extraConfig = ''
proxy_redirect http:// https://;

View file

@ -3,6 +3,9 @@
environment.systemPackages = with pkgs; [
lego
];
users.users.acme = { };
sops = {
secrets.dnstokenfull = { owner = "acme"; };
templates."certs.secret".content = ''

View file

@ -4,6 +4,9 @@ _:
enable = true;
settings.PermitRootLogin = "yes";
};
users.users.swarsel.openssh.authorizedKeys.keyFiles = [
../../../secrets/keys/authorized_keys
];
users.users.root.openssh.authorizedKeys.keyFiles = [
../../../secrets/keys/authorized_keys
];