Compare commits

...

4 commits

Author SHA1 Message Date
Leon Schwarzäugl
8ceb7f9868
chore: backup more dirs 2025-07-20 16:01:36 +02:00
Leon Schwarzäugl
2e6e8ba7fe
fix: koillection not serving big collections 2025-07-20 16:01:19 +02:00
Leon Schwarzäugl
797be8015f
fix: koillection images lost in ephemeral storage 2025-07-20 16:00:51 +02:00
Leon Schwarzäugl
026de8cd25
fix: WLAN1 pw not set 2025-07-20 16:00:28 +02:00
4 changed files with 32 additions and 2 deletions

View file

@ -4874,7 +4874,7 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
wifi-security = { wifi-security = {
auth-alg = "open"; auth-alg = "open";
key-mgmt = "wpa-psk"; key-mgmt = "wpa-psk";
psk = "WLAN1_PW"; psk = "$WLAN1_PW";
}; };
}; };
@ -7696,6 +7696,11 @@ This manages backups for my pictures and obsidian files.
passwordFile = config.sops.secrets.resticpw.path; passwordFile = config.sops.secrets.resticpw.path;
paths = [ paths = [
"/Vault/data/paperless" "/Vault/data/paperless"
"/Vault/data/koillection"
"/Vault/data/postgresql"
"/Vault/data/firefly-iii"
"/Vault/data/radicale"
"/Vault/data/matrix-synapse"
"/Vault/Eternor/Paperless" "/Vault/Eternor/Paperless"
"/Vault/Eternor/Bilder" "/Vault/Eternor/Bilder"
"/Vault/Eternor/Immich" "/Vault/Eternor/Immich"
@ -9065,6 +9070,7 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
serviceName = "koillection"; serviceName = "koillection";
servicePort = 2282; servicePort = 2282;
serviceDomain = config.repo.secrets.common.services.domains.${serviceName}; serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
serviceDir = "/Vault/data/koillection";
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
postgresPort = config.services.postgresql.settings.port; # 5432 postgresPort = config.services.postgresql.settings.port; # 5432
@ -9096,6 +9102,10 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
"${toString servicePort}:80" "${toString servicePort}:80"
]; ];
volumes = [
"${serviceDir}/uploads:/uploads"
];
environment = { environment = {
APP_DEBUG = "0"; APP_DEBUG = "0";
APP_ENV = "prod"; APP_ENV = "prod";
@ -9174,6 +9184,11 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
locations = { locations = {
"/" = { "/" = {
proxyPass = "http://${serviceName}"; proxyPass = "http://${serviceName}";
extraConfig = ''
proxy_buffer_size 128k;
proxy_buffers 4 256k;
proxy_busy_buffers_size 256k;
'';
}; };
}; };
}; };

View file

@ -118,7 +118,7 @@ in
wifi-security = { wifi-security = {
auth-alg = "open"; auth-alg = "open";
key-mgmt = "wpa-psk"; key-mgmt = "wpa-psk";
psk = "WLAN1_PW"; psk = "$WLAN1_PW";
}; };
}; };

View file

@ -5,6 +5,7 @@ let
serviceName = "koillection"; serviceName = "koillection";
servicePort = 2282; servicePort = 2282;
serviceDomain = config.repo.secrets.common.services.domains.${serviceName}; serviceDomain = config.repo.secrets.common.services.domains.${serviceName};
serviceDir = "/Vault/data/koillection";
postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres postgresUser = config.systemd.services.postgresql.serviceConfig.User; # postgres
postgresPort = config.services.postgresql.settings.port; # 5432 postgresPort = config.services.postgresql.settings.port; # 5432
@ -36,6 +37,10 @@ in
"${toString servicePort}:80" "${toString servicePort}:80"
]; ];
volumes = [
"${serviceDir}/uploads:/uploads"
];
environment = { environment = {
APP_DEBUG = "0"; APP_DEBUG = "0";
APP_ENV = "prod"; APP_ENV = "prod";
@ -114,6 +119,11 @@ in
locations = { locations = {
"/" = { "/" = {
proxyPass = "http://${serviceName}"; proxyPass = "http://${serviceName}";
extraConfig = ''
proxy_buffer_size 128k;
proxy_buffers 4 256k;
proxy_busy_buffers_size 256k;
'';
}; };
}; };
}; };

View file

@ -31,6 +31,11 @@ in
passwordFile = config.sops.secrets.resticpw.path; passwordFile = config.sops.secrets.resticpw.path;
paths = [ paths = [
"/Vault/data/paperless" "/Vault/data/paperless"
"/Vault/data/koillection"
"/Vault/data/postgresql"
"/Vault/data/firefly-iii"
"/Vault/data/radicale"
"/Vault/data/matrix-synapse"
"/Vault/Eternor/Paperless" "/Vault/Eternor/Paperless"
"/Vault/Eternor/Bilder" "/Vault/Eternor/Bilder"
"/Vault/Eternor/Immich" "/Vault/Eternor/Immich"