mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 09:07:21 +01:00
Compare commits
4 commits
6f33ffe8c9
...
8ceb7f9868
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8ceb7f9868 | ||
|
|
2e6e8ba7fe | ||
|
|
797be8015f | ||
|
|
026de8cd25 |
4 changed files with 32 additions and 2 deletions
|
|
@ -4874,7 +4874,7 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
|
||||||
wifi-security = {
|
wifi-security = {
|
||||||
auth-alg = "open";
|
auth-alg = "open";
|
||||||
key-mgmt = "wpa-psk";
|
key-mgmt = "wpa-psk";
|
||||||
psk = "WLAN1_PW";
|
psk = "$WLAN1_PW";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -7696,6 +7696,11 @@ This manages backups for my pictures and obsidian files.
|
||||||
passwordFile = config.sops.secrets.resticpw.path;
|
passwordFile = config.sops.secrets.resticpw.path;
|
||||||
paths = [
|
paths = [
|
||||||
"/Vault/data/paperless"
|
"/Vault/data/paperless"
|
||||||
|
"/Vault/data/koillection"
|
||||||
|
"/Vault/data/postgresql"
|
||||||
|
"/Vault/data/firefly-iii"
|
||||||
|
"/Vault/data/radicale"
|
||||||
|
"/Vault/data/matrix-synapse"
|
||||||
"/Vault/Eternor/Paperless"
|
"/Vault/Eternor/Paperless"
|
||||||
"/Vault/Eternor/Bilder"
|
"/Vault/Eternor/Bilder"
|
||||||
"/Vault/Eternor/Immich"
|
"/Vault/Eternor/Immich"
|
||||||
|
|
@ -9065,6 +9070,7 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
serviceName = "koillection";
|
serviceName = "koillection";
|
||||||
servicePort = 2282;
|
servicePort = 2282;
|
||||||
serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
|
serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
|
||||||
|
serviceDir = "/Vault/data/koillection";
|
||||||
|
|
||||||
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
|
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
|
||||||
postgresPort = config.services.postgresql.settings.port; # 5432
|
postgresPort = config.services.postgresql.settings.port; # 5432
|
||||||
|
|
@ -9096,6 +9102,10 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
"${toString servicePort}:80"
|
"${toString servicePort}:80"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
volumes = [
|
||||||
|
"${serviceDir}/uploads:/uploads"
|
||||||
|
];
|
||||||
|
|
||||||
environment = {
|
environment = {
|
||||||
APP_DEBUG = "0";
|
APP_DEBUG = "0";
|
||||||
APP_ENV = "prod";
|
APP_ENV = "prod";
|
||||||
|
|
@ -9174,6 +9184,11 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {
|
"/" = {
|
||||||
proxyPass = "http://${serviceName}";
|
proxyPass = "http://${serviceName}";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_buffer_size 128k;
|
||||||
|
proxy_buffers 4 256k;
|
||||||
|
proxy_busy_buffers_size 256k;
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -118,7 +118,7 @@ in
|
||||||
wifi-security = {
|
wifi-security = {
|
||||||
auth-alg = "open";
|
auth-alg = "open";
|
||||||
key-mgmt = "wpa-psk";
|
key-mgmt = "wpa-psk";
|
||||||
psk = "WLAN1_PW";
|
psk = "$WLAN1_PW";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -5,6 +5,7 @@ let
|
||||||
serviceName = "koillection";
|
serviceName = "koillection";
|
||||||
servicePort = 2282;
|
servicePort = 2282;
|
||||||
serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
|
serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
|
||||||
|
serviceDir = "/Vault/data/koillection";
|
||||||
|
|
||||||
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
|
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
|
||||||
postgresPort = config.services.postgresql.settings.port; # 5432
|
postgresPort = config.services.postgresql.settings.port; # 5432
|
||||||
|
|
@ -36,6 +37,10 @@ in
|
||||||
"${toString servicePort}:80"
|
"${toString servicePort}:80"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
volumes = [
|
||||||
|
"${serviceDir}/uploads:/uploads"
|
||||||
|
];
|
||||||
|
|
||||||
environment = {
|
environment = {
|
||||||
APP_DEBUG = "0";
|
APP_DEBUG = "0";
|
||||||
APP_ENV = "prod";
|
APP_ENV = "prod";
|
||||||
|
|
@ -114,6 +119,11 @@ in
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {
|
"/" = {
|
||||||
proxyPass = "http://${serviceName}";
|
proxyPass = "http://${serviceName}";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_buffer_size 128k;
|
||||||
|
proxy_buffers 4 256k;
|
||||||
|
proxy_busy_buffers_size 256k;
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -31,6 +31,11 @@ in
|
||||||
passwordFile = config.sops.secrets.resticpw.path;
|
passwordFile = config.sops.secrets.resticpw.path;
|
||||||
paths = [
|
paths = [
|
||||||
"/Vault/data/paperless"
|
"/Vault/data/paperless"
|
||||||
|
"/Vault/data/koillection"
|
||||||
|
"/Vault/data/postgresql"
|
||||||
|
"/Vault/data/firefly-iii"
|
||||||
|
"/Vault/data/radicale"
|
||||||
|
"/Vault/data/matrix-synapse"
|
||||||
"/Vault/Eternor/Paperless"
|
"/Vault/Eternor/Paperless"
|
||||||
"/Vault/Eternor/Bilder"
|
"/Vault/Eternor/Bilder"
|
||||||
"/Vault/Eternor/Immich"
|
"/Vault/Eternor/Immich"
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue