This commit is contained in:
m3tam3re 2023-03-28 12:03:26 +02:00
parent e220ebdae6
commit 0f12e5577a
9 changed files with 43 additions and 14 deletions

View File

@ -85,11 +85,11 @@
"utils": "utils_2" "utils": "utils_2"
}, },
"locked": { "locked": {
"lastModified": 1678729503, "lastModified": 1679992839,
"narHash": "sha256-j+h4Bdqbe+qjzhxdhkRmVgSx2lxJ8HnKeYcAhhnd1zM=", "narHash": "sha256-q3mABQYZeIvznM4tjfcgN4pxI2uJ5HkPF47TZODlNdU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "24c1a6335e3da6a3ecf82f33ac50c2ad66aee346", "rev": "deb2f59b5c1fd11bec00600517ba7f51984c3090",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -116,11 +116,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1678654296, "lastModified": 1679865578,
"narHash": "sha256-aVfw3ThpY7vkUeF1rFy10NAkpKDS2imj3IakrzT0Occ=", "narHash": "sha256-sYQmxxqIYL3QFsRYjW0AufhGur8qWfwoOGPGHRJZlGc=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5a1dc8acd977ff3dccd1328b7c4a6995429a656b", "rev": "4361baa782dc3d3b35fd455a1adc370681d9187c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -148,11 +148,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1678703398, "lastModified": 1679878071,
"narHash": "sha256-Y1mW3dBsoWLHpYm+UIHb5VZ7rx024NNHaF16oZBx++o=", "narHash": "sha256-7U5sTaebhjtlTYQI+q1FrbS2YXAhEsbLIcqirQ/kXJk=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "67f26c1cfc5d5783628231e776a81c1ade623e0b", "rev": "44302d48a0b26421d23ee375ade3e47f9aab21df",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@ -76,6 +76,7 @@
epkgs.org-download epkgs.org-download
epkgs.org-gcal epkgs.org-gcal
epkgs.org-ql epkgs.org-ql
epkgs.org-present
epkgs.org-roam epkgs.org-roam
epkgs.org-roam-ui epkgs.org-roam-ui
epkgs.pass epkgs.pass

View File

@ -43,11 +43,19 @@
mode = "770"; mode = "770";
owner = "traefik"; owner = "traefik";
}; };
minio-root-cred = {
file = ../../secrets/minio-root-cred.age;
mode = "770";
owner = "minio";
};
searx-environmentFile = { searx-environmentFile = {
file = ../../secrets/searx-environmentFile.age; file = ../../secrets/searx-environmentFile.age;
mode = "770"; mode = "770";
owner = "searx"; owner = "searx";
}; };
wg-easy-environmentFile = { wg-easy-environmentFile = {
file = ../../secrets/wg-easy-environmentFile.age; file = ../../secrets/wg-easy-environmentFile.age;
mode = "770"; mode = "770";

View File

@ -1,5 +0,0 @@
{
services.netbird = {
enable = true;
};
}

View File

@ -0,0 +1,9 @@
{ config, ... }: {
services.minio = {
enable = true;
region = "eu-central-1";
rootCredentialsFile = config.age.secrets.minio-root-cred.path;
dataDir = [ "/var/backup/s3" ];
};
}

View File

@ -11,4 +11,7 @@
systemd.services.n8n.environment = { systemd.services.n8n.environment = {
BILLBEE_API_KEY = config.age.secrets.billbee-api-key.path; # TODO env file for systemd service BILLBEE_API_KEY = config.age.secrets.billbee-api-key.path; # TODO env file for systemd service
}; };
systemd.services.traefik.serviceConfig = {
EnvironmentFile="${config.age.secrets.traefik-env.path}";
};
} }

View File

@ -81,6 +81,8 @@
[{ url = "http://localhost:3012/"; }]; [{ url = "http://localhost:3012/"; }];
syncthing.loadBalancer.servers = syncthing.loadBalancer.servers =
[{ url = "http://localhost:8384/"; }]; [{ url = "http://localhost:8384/"; }];
minio.loadBalancer.servers =
[{ url = "http://localhost:9000/"; }];
}; };
routers = { routers = {
api = { api = {
@ -141,6 +143,15 @@
service = "matomo"; service = "matomo";
entrypoints = "websecure"; entrypoints = "websecure";
}; };
minio = {
rule = "Host(`s3.lanakk.com`)";
tls = {
certResolver = "godaddy";
domains = "s3.lanakk.com";
};
service = "matomo";
entrypoints = "websecure";
};
searx = { searx = {
rule = "Host(`search.lanakk.com`)"; rule = "Host(`search.lanakk.com`)";
tls = { tls = {

View File

@ -19,4 +19,6 @@ in {
"littlelink-m3tam3re-env.age".publicKeys = [ root ]; "littlelink-m3tam3re-env.age".publicKeys = [ root ];
"traefik-env.age".publicKeys = [ root ]; "traefik-env.age".publicKeys = [ root ];
"minio-root-cred.age".publicKeys = [ root ];
} }

BIN
secrets/minio-root-cred.age Normal file

Binary file not shown.