mirror of
https://github.com/Ahwxorg/nixos-config.git
synced 2026-03-19 15:50:30 +01:00
Compare commits
No commits in common. "281f567843bb07b4d0f6b5503607e482e5916d4b" and "7dec0745a6a16db7c7f454a326cd225128978108" have entirely different histories.
281f567843
...
7dec0745a6
13 changed files with 72 additions and 131 deletions
|
|
@ -21,7 +21,6 @@
|
|||
"minioRootCredentials" = { };
|
||||
"atticdEnvironment" = { };
|
||||
"nextcloudPassword" = { };
|
||||
"gluetunEnvironment" = { };
|
||||
"matrixRegistrationSecret" = {
|
||||
owner = "matrix-synapse";
|
||||
};
|
||||
|
|
|
|||
|
|
@ -261,8 +261,7 @@
|
|||
"$mainMod, Q, killactive,"
|
||||
"$mainMod, F, fullscreen, 0" # set 1 to 0 to set full screen without waybar
|
||||
"$mainMod, Space, togglefloating,"
|
||||
# "$mainMod, D, exec, bemenu-run -l 5 --ignorecase"
|
||||
"$mainMod, D, exec, vicinae toggle"
|
||||
"$mainMod, D, exec, bemenu-run -l 5 --ignorecase"
|
||||
"SUPER SHIFT, L, exec, swaylock --image /home/${username}/.local/share/bg.png"
|
||||
"SUPER, L, exec, swaylock --image /home/${username}/.local/share/bg.png"
|
||||
"$mainMod, E, exec, nautilus"
|
||||
|
|
|
|||
|
|
@ -13,7 +13,6 @@
|
|||
nwg-dock-hyprland
|
||||
hyprland-monitor-attached
|
||||
hypridle
|
||||
vicinae
|
||||
];
|
||||
# systemd.user.targets.hyprland-session.Unit.Wants = [ "xdg-desktop-autostart.target" ];
|
||||
wayland.windowManager.hyprland = {
|
||||
|
|
|
|||
|
|
@ -1,12 +1,12 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
# users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
||||
#services.anubis = {
|
||||
# defaultOptions = {
|
||||
# enable = true;
|
||||
# settings = {
|
||||
# SERVE_ROBOTS_TXT = true;
|
||||
# };
|
||||
# };
|
||||
#};
|
||||
users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
||||
services.anubis = {
|
||||
defaultOptions = {
|
||||
enable = true;
|
||||
settings = {
|
||||
SERVE_ROBOTS_TXT = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -32,20 +32,19 @@
|
|||
};
|
||||
};
|
||||
};
|
||||
#anubis.instances.atticd = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:8060";
|
||||
# BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.atticd = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8060";
|
||||
BIND = ":8061";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."cache.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}";
|
||||
proxyPass = "http://localhost:8060";
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,23 +1,19 @@
|
|||
{ config, ... }:
|
||||
let
|
||||
target = "http://localhost:8081";
|
||||
in
|
||||
{
|
||||
services = {
|
||||
#anubis.instances.binternet = {
|
||||
# settings = {
|
||||
# TARGET = target;
|
||||
# BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.binternet = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8081";
|
||||
BIND = ":8082";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."curate.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}";
|
||||
proxyPass = target;
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -68,20 +68,19 @@ in
|
|||
# };
|
||||
# };
|
||||
# };
|
||||
#anubis.instances.forgejo = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:3050";
|
||||
# BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.forgejo = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:3050";
|
||||
BIND = ":3051";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."code.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
||||
proxyPass = "http://localhost:3050";
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -17,20 +17,19 @@
|
|||
guacd-hostname = "localhost";
|
||||
};
|
||||
};
|
||||
#anubis.instances.guacamole = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:4822";
|
||||
# BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.guacamole = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:4822";
|
||||
BIND = ":4883";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."remote.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
||||
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,23 +1,19 @@
|
|||
{ config, ... }:
|
||||
let
|
||||
target = "http://localhost:8078";
|
||||
in
|
||||
{
|
||||
services = {
|
||||
#anubis.instances.librey = {
|
||||
# settings = {
|
||||
# TARGET = target;
|
||||
# BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.librey = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8078";
|
||||
BIND = ":8079";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."search.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}";
|
||||
proxyPass = target;
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,33 +1,19 @@
|
|||
{ config, pkgs, ... }:
|
||||
{ ... }:
|
||||
{
|
||||
services.nextcloud = {
|
||||
enable = true;
|
||||
package = pkgs.nextcloud32;
|
||||
hostName = "cloud.liv.town";
|
||||
# appstoreEnable = true;
|
||||
https = true;
|
||||
maxUploadSize = "10G";
|
||||
extraApps = {
|
||||
inherit (config.services.nextcloud.package.packages.apps)
|
||||
news
|
||||
contacts
|
||||
calendar
|
||||
groupfolders
|
||||
notify_push
|
||||
;
|
||||
};
|
||||
config = {
|
||||
adminuser = "root";
|
||||
adminpassFile = config.sops.secrets.nextcloudPassword.path;
|
||||
dbtype = "sqlite";
|
||||
};
|
||||
enable = false;
|
||||
config.dbtype = "sqlite";
|
||||
configureRedis = true;
|
||||
home = "/home/liv/nextcloud";
|
||||
config.adminpassFile = "/run/nextcloud/adminpassFile";
|
||||
maxUploadSize = "25G";
|
||||
https = true;
|
||||
hostName = "dandelion.srv.liv.town";
|
||||
settings = {
|
||||
mail_smtphost = "smtp.migadu.com";
|
||||
mail_smtpport = 465;
|
||||
mail_smtpname = "notifications@liv.town";
|
||||
mail_smtpauth = true;
|
||||
trusted_domains = [ "cloud.liv.town" ];
|
||||
trusted_domains = [
|
||||
"dandelion.srv.liv.town"
|
||||
"files.dandelion.srv.liv.town"
|
||||
];
|
||||
enabledPreviewProviders = [
|
||||
"OC\\Preview\\BMP"
|
||||
"OC\\Preview\\GIF"
|
||||
|
|
@ -43,25 +29,4 @@
|
|||
];
|
||||
};
|
||||
};
|
||||
services.nginx.virtualHosts.${config.services.nextcloud.hostName} = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
};
|
||||
systemd.services.nextcloud-custom-config = {
|
||||
path = [
|
||||
config.services.nextcloud.occ
|
||||
];
|
||||
script = ''
|
||||
nextcloud-occ theming:config name "livnet"
|
||||
# nextcloud-occ theming:config description "liv to your fullest"
|
||||
nextcloud-occ theming:config url "https://cloud.liv.town";
|
||||
# nextcloud-occ theming:config privacyUrl "https://liv.town/privacy";
|
||||
nextcloud-occ theming:config color "#3253a5";
|
||||
'';
|
||||
# nextcloud-occ theming:config logo ${./logo.png}
|
||||
after = [ "nextcloud-setup.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
|
||||
}
|
||||
|
|
|
|||
|
|
@ -24,14 +24,6 @@
|
|||
environmentFile = "/home/liv/desec.env"; # location of your DESEC_TOKEN=[value]
|
||||
webroot = null;
|
||||
};
|
||||
"ahwx.org" = {
|
||||
domain = "*.ahwx.org";
|
||||
extraDomainNames = [ "ahwx.org" ];
|
||||
group = config.services.nginx.group;
|
||||
dnsProvider = "desec";
|
||||
environmentFile = "/home/liv/desec.env"; # location of your DESEC_TOKEN=[value]
|
||||
webroot = null;
|
||||
};
|
||||
"quack.social" = {
|
||||
domain = "*.quack.social";
|
||||
extraDomainNames = [ "quack.social" ];
|
||||
|
|
|
|||
|
|
@ -5,20 +5,19 @@
|
|||
enable = true;
|
||||
settings.PORT = "4800";
|
||||
};
|
||||
#anubis.instances.uptime-kuma = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:4800";
|
||||
# BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
anubis.instances.uptime-kuma = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:4800";
|
||||
BIND = ":4801";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
nginx.virtualHosts."uptime.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
||||
proxyPass = "http://localhost:4800";
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
File diff suppressed because one or more lines are too long
Loading…
Add table
Add a link
Reference in a new issue