vps-arm-2024-12-03-15-47-46
This commit is contained in:
@ -6,7 +6,7 @@
|
|||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [
|
imports = [
|
||||||
./configs/common.nix
|
./common.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot = {
|
boot = {
|
||||||
|
@ -8,8 +8,7 @@ OLD_TRANSID=${OLD_TRANSID#transid marker was }
|
|||||||
sudo btrfs subvolume find-new "/fs-diff/root" "$OLD_TRANSID" |
|
sudo btrfs subvolume find-new "/fs-diff/root" "$OLD_TRANSID" |
|
||||||
sed '$d' |
|
sed '$d' |
|
||||||
cut -f17- -d' ' |
|
cut -f17- -d' ' |
|
||||||
sort |
|
sort |uniq |
|
||||||
uniq |
|
|
||||||
while read path; do
|
while read path; do
|
||||||
path="/$path"
|
path="/$path"
|
||||||
if [ -L "$path" ]; then
|
if [ -L "$path" ]; then
|
||||||
|
@ -5,24 +5,22 @@
|
|||||||
outputs,
|
outputs,
|
||||||
inputs,
|
inputs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
secrets = import ../../configs/secrets.nix;
|
|
||||||
be = import ../../configs/borg-exclude.nix;
|
|
||||||
in {
|
|
||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
../../configs/common-linux.nix
|
../../configs/common-linux.nix
|
||||||
../../configs/docker.nix
|
../../configs/docker.nix
|
||||||
../../configs/user.nix
|
../../configs/user.nix
|
||||||
|
|
||||||
../../services/atuin.nix
|
|
||||||
../../services/adguardhome.nix
|
../../services/adguardhome.nix
|
||||||
|
../../services/atuin.nix
|
||||||
../../services/frigate.nix
|
../../services/frigate.nix
|
||||||
../../services/gitea.nix
|
../../services/gitea.nix
|
||||||
|
../../services/goaccess.nix
|
||||||
|
../../services/headscale.nix
|
||||||
|
../../services/immich.nix
|
||||||
../../services/nextcloud.nix
|
../../services/nextcloud.nix
|
||||||
../../services/uptime-kuma.nix
|
../../services/uptime-kuma.nix
|
||||||
../../services/headscale.nix
|
|
||||||
../../services/goaccess.nix
|
|
||||||
];
|
];
|
||||||
|
|
||||||
sops = {
|
sops = {
|
||||||
|
@ -20,7 +20,7 @@ in {
|
|||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {proxyPass = "https://127.0.0.1:3003/";};
|
"/" = {proxyPass = "https://127.0.0.1:3004/";};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@ -71,7 +71,7 @@ in {
|
|||||||
allow_unencrypted_doh = false;
|
allow_unencrypted_doh = false;
|
||||||
port_dns_over_tls = 853;
|
port_dns_over_tls = 853;
|
||||||
port_dns_over_quic = 0;
|
port_dns_over_quic = 0;
|
||||||
port_https = 3003;
|
port_https = 3004;
|
||||||
certificate_chain = "";
|
certificate_chain = "";
|
||||||
private_key = "";
|
private_key = "";
|
||||||
certificate_path = "/var/lib/AdGuardHome/chain.pem";
|
certificate_path = "/var/lib/AdGuardHome/chain.pem";
|
||||||
|
@ -3,9 +3,7 @@
|
|||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
secrets = import ../configs/secrets.nix;
|
|
||||||
in {
|
|
||||||
environment = {
|
environment = {
|
||||||
persistence."/persist" = {
|
persistence."/persist" = {
|
||||||
directories = [
|
directories = [
|
||||||
|
@ -3,9 +3,7 @@
|
|||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
secrets = import ../configs/secrets.nix;
|
|
||||||
in {
|
|
||||||
environment = {
|
environment = {
|
||||||
systemPackages = with pkgs; [
|
systemPackages = with pkgs; [
|
||||||
goaccess
|
goaccess
|
||||||
|
46
services/immich.nix
Normal file
46
services/immich.nix
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
environment = {
|
||||||
|
persistence."/persist" = {
|
||||||
|
directories = [
|
||||||
|
"/var/lib/immich"
|
||||||
|
"/var/lib/redis-immich"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services = {
|
||||||
|
nginx = {
|
||||||
|
virtualHosts = {
|
||||||
|
"immich.szczepan.ski" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations = {"/" = {proxyPass = "http://[::1]:2283/";};};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# postgresql = {
|
||||||
|
# enable = true;
|
||||||
|
# ensureDatabases = [
|
||||||
|
# config.services.nextcloud.config.dbname
|
||||||
|
# ];
|
||||||
|
# ensureUsers = [
|
||||||
|
# {
|
||||||
|
# name = config.services..config.dbuser;
|
||||||
|
# ensureDBOwnership = true;
|
||||||
|
# # ensurePermissions."DATABASE ${config.services.gitea.database.name}" = "ALL PRIVILEGES";
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
|
# };
|
||||||
|
|
||||||
|
immich = {
|
||||||
|
enable = true;
|
||||||
|
settings.server.externalDomain = "https://immich.szczepan.ski";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -5,11 +5,6 @@
|
|||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
environment = {
|
environment = {
|
||||||
systemPackages = with pkgs; [
|
|
||||||
goaccess
|
|
||||||
xd
|
|
||||||
nyx
|
|
||||||
];
|
|
||||||
persistence."/persist" = {
|
persistence."/persist" = {
|
||||||
directories = [
|
directories = [
|
||||||
"/var/lib/nextcloud"
|
"/var/lib/nextcloud"
|
||||||
|
Reference in New Issue
Block a user