Compare commits

...

4 commits

28 changed files with 233 additions and 56 deletions

View file

@ -53,7 +53,6 @@ nix multi user, multi system, configuration with `sops` secret management, `home
## Tech Debt ## Tech Debt
- [ ] monitor configuration in `~/.config/monitors.xml` should be sym linked to `/run/gdm/.config/monitors.xml` (https://www.reddit.com/r/NixOS/comments/u09cz9/home_manager_create_my_own_symlinks_automatically/) - [ ] monitor configuration in `~/.config/monitors.xml` should be sym linked to `/run/gdm/.config/monitors.xml` (https://www.reddit.com/r/NixOS/comments/u09cz9/home_manager_create_my_own_symlinks_automatically/)
- [ ] migrate away from flakes and move to npins - [ ] migrate away from flakes and move to npins
- [ ] rework the reverse_proxy.nix file so that it is a normally named service. Then also change it so that we can hook into it with both a base domain and a subdomain to make migrating to vpn accessible services easier
## Broken things ## Broken things
- [ ] figure out steam vr things? - [ ] figure out steam vr things?
@ -73,12 +72,13 @@ nix multi user, multi system, configuration with `sops` secret management, `home
- [ ] offline access for nfs mounts (overlay with rsync might be a good option here? https://www.spinics.net/lists/linux-unionfs/msg07105.html note about nfs4 and overlay fs) - [ ] offline access for nfs mounts (overlay with rsync might be a good option here? https://www.spinics.net/lists/linux-unionfs/msg07105.html note about nfs4 and overlay fs)
- [ ] figure out why syncthing and jellyfins permissions don't propagate downwards - [ ] figure out why syncthing and jellyfins permissions don't propagate downwards
- [ ] make radarr, sonarr, and bazarr accessible over vpn - [ ] make radarr, sonarr, and bazarr accessible over vpn
- [ ] move searx, home-assistant, actual, jellyfin, paperless, and immich to only be accessible via vpn - [ ] move searx, home-assistant, actual, vikunja, jellyfin, paperless, and immich to only be accessible via vpn
## Services ## Services
- [ ] vikunja service for project management - [ ] vikunja service for project management
- [ ] Create Tor guard/relay server - [ ] Create Tor guard/relay server
- [ ] mastodon instance - [ ] mastodon instance
- [ ] screeps server
## DevOps ## DevOps
- [ ] wake on LAN for updates - [ ] wake on LAN for updates

View file

@ -310,7 +310,7 @@
forgejo = { forgejo = {
enable = true; enable = true;
domain = "git.jan-leila.com"; reverseProxy.domain = "git.jan-leila.com";
}; };
searx = { searx = {

View file

@ -6,7 +6,14 @@
const = import ./const.nix; const = import ./const.nix;
dataDirectory = const.dataDirectory; dataDirectory = const.dataDirectory;
in { in {
config = lib.mkIf (config.services.actual.enable && config.host.impermanence.enable) { options.services.actual = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.actual.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.actual.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.actual.settings.ACTUAL_DATA_DIR == dataDirectory; assertion = config.services.actual.settings.ACTUAL_DATA_DIR == dataDirectory;

View file

@ -14,9 +14,13 @@
description = "extra domains that should be configured for actual"; description = "extra domains that should be configured for actual";
default = []; default = [];
}; };
reverseProxy.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.actual.enable && config.services.reverseProxy.enable;
};
}; };
config = lib.mkIf (config.services.actual.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.actual.reverseProxy.enable {
services.reverseProxy.services.actual = { services.reverseProxy.services.actual = {
target = "http://localhost:${toString config.services.actual.settings.port}"; target = "http://localhost:${toString config.services.actual.settings.port}";
domain = config.services.actual.domain; domain = config.services.actual.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
bazarr_data_directory = "/var/lib/bazarr"; bazarr_data_directory = "/var/lib/bazarr";
in { in {
config = lib.mkIf (config.services.bazarr.enable && config.host.impermanence.enable) { options.services.bazarr = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.bazarr.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.bazarr.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.bazarr.dataDir == bazarr_data_directory; assertion = config.services.bazarr.dataDir == bazarr_data_directory;

View file

@ -5,7 +5,14 @@
}: let }: let
workingDirectory = "/var/lib/private/crab-hole"; workingDirectory = "/var/lib/private/crab-hole";
in { in {
config = lib.mkIf (config.services.crab-hole.enable && config.host.impermanence.enable) { options.services.crab-hole = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.crab-hole.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.crab-hole.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = assertion =

View file

@ -6,7 +6,14 @@
dataFolder = "/var/lib/fail2ban"; dataFolder = "/var/lib/fail2ban";
dataFile = "fail2ban.sqlite3"; dataFile = "fail2ban.sqlite3";
in { in {
config = lib.mkIf (config.services.fail2ban.enable && config.host.impermanence.enable) { options.services.fail2ban = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.fail2ban.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.fail2ban.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.fail2ban.daemonSettings.Definition.dbfile == "${dataFolder}/${dataFile}"; assertion = config.services.fail2ban.daemonSettings.Definition.dbfile == "${dataFolder}/${dataFile}";

View file

@ -3,7 +3,14 @@
config, config,
... ...
}: { }: {
config = lib.mkIf (config.services.flaresolverr.enable && config.host.impermanence.enable) { options.services.flaresolverr = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.flaresolverr.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.flaresolverr.impermanence.enable {
# FlareSolverr typically doesn't need persistent storage as it's a proxy service # FlareSolverr typically doesn't need persistent storage as it's a proxy service
# but we'll add basic structure in case it's needed for logs or configuration # but we'll add basic structure in case it's needed for logs or configuration
environment.persistence."/persist/system/root" = { environment.persistence."/persist/system/root" = {

View file

@ -4,7 +4,16 @@
pkgs, pkgs,
... ...
}: { }: {
config = lib.mkIf (config.services.forgejo.enable && config.services.fail2ban.enable) { options.services.forgejo = {
fail2ban = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.forgejo.enable && config.services.fail2ban.enable;
};
};
};
config = lib.mkIf config.services.forgejo.fail2ban.enable {
environment.etc = { environment.etc = {
"fail2ban/filter.d/forgejo.local".text = lib.mkIf config.services.forgejo.enable ( "fail2ban/filter.d/forgejo.local".text = lib.mkIf config.services.forgejo.enable (
pkgs.lib.mkDefault (pkgs.lib.mkAfter '' pkgs.lib.mkDefault (pkgs.lib.mkAfter ''

View file

@ -5,7 +5,14 @@
}: let }: let
stateDir = "/var/lib/forgejo"; stateDir = "/var/lib/forgejo";
in { in {
config = lib.mkIf (config.services.forgejo.enable && config.host.impermanence.enable) { options.services.forgejo = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.forgejo.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.forgejo.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.forgejo.stateDir == stateDir; assertion = config.services.forgejo.stateDir == stateDir;

View file

@ -8,6 +8,10 @@
in { in {
options.services.forgejo = { options.services.forgejo = {
reverseProxy = { reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.forgejo.enable && config.services.reverseProxy.enable;
};
domain = lib.mkOption { domain = lib.mkOption {
type = lib.types.str; type = lib.types.str;
description = "domain that forgejo will be hosted at"; description = "domain that forgejo will be hosted at";
@ -21,7 +25,7 @@ in {
}; };
}; };
config = lib.mkIf (config.services.forgejo.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.forgejo.reverseProxy.enable {
services.reverseProxy.services.forgejo = { services.reverseProxy.services.forgejo = {
target = "http://localhost:${toString httpPort}"; target = "http://localhost:${toString httpPort}";
domain = config.services.forgejo.reverseProxy.domain; domain = config.services.forgejo.reverseProxy.domain;

View file

@ -3,8 +3,17 @@
pkgs, pkgs,
config, config,
... ...
}: }: {
lib.mkIf (config.services.fail2ban.enable && config.services.home-assistant.enable) { options.services.home-assistant = {
fail2ban = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.fail2ban.enable && config.services.home-assistant.enable;
};
};
};
config = lib.mkIf config.services.home-assistant.fail2ban.enable {
environment.etc = { environment.etc = {
"fail2ban/filter.d/hass.local".text = ( "fail2ban/filter.d/hass.local".text = (
pkgs.lib.mkDefault (pkgs.lib.mkAfter '' pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
@ -36,4 +45,5 @@ lib.mkIf (config.services.fail2ban.enable && config.services.home-assistant.enab
}; };
}; };
}; };
};
} }

View file

@ -14,9 +14,15 @@
description = "extra domains that should be configured for home-assistant"; description = "extra domains that should be configured for home-assistant";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.reverseProxy.enable && config.services.home-assistant.enable;
};
};
}; };
config = lib.mkIf (config.services.reverseProxy.enable && config.services.home-assistant.enable) { config = lib.mkIf config.services.home-assistant.reverseProxy.enable {
services.reverseProxy.services.home-assistant = { services.reverseProxy.services.home-assistant = {
target = "http://localhost:${toString config.services.home-assistant.config.http.server_port}"; target = "http://localhost:${toString config.services.home-assistant.config.http.server_port}";
domain = config.services.home-assistant.domain; domain = config.services.home-assistant.domain;

View file

@ -4,7 +4,16 @@
pkgs, pkgs,
... ...
}: { }: {
config = lib.mkIf (config.services.fail2ban.enable && config.services.immich.enable) { options.services.immich = {
fail2ban = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.fail2ban.enable && config.services.immich.enable;
};
};
};
config = lib.mkIf config.services.immich.fail2ban.enable {
environment.etc = { environment.etc = {
"fail2ban/filter.d/immich.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter '' "fail2ban/filter.d/immich.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
[Definition] [Definition]

View file

@ -5,7 +5,14 @@
}: let }: let
mediaLocation = "/var/lib/immich"; mediaLocation = "/var/lib/immich";
in { in {
config = lib.mkIf (config.services.immich.enable && config.host.impermanence.enable) { options.services.immich = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.immich.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.immich.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.immich.mediaLocation == mediaLocation; assertion = config.services.immich.mediaLocation == mediaLocation;

View file

@ -14,9 +14,15 @@
description = "extra domains that should be configured for immich"; description = "extra domains that should be configured for immich";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.immich.enable && config.services.reverseProxy.enable;
};
};
}; };
config = lib.mkIf (config.services.immich.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.immich.reverseProxy.enable {
services.reverseProxy.services.immich = { services.reverseProxy.services.immich = {
target = "http://localhost:${toString config.services.immich.port}"; target = "http://localhost:${toString config.services.immich.port}";
domain = config.services.immich.domain; domain = config.services.immich.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
jackett_data_directory = "/var/lib/jackett/.config/Jackett"; jackett_data_directory = "/var/lib/jackett/.config/Jackett";
in { in {
config = lib.mkIf (config.services.jackett.enable && config.host.impermanence.enable) { options.services.jackett = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.jackett.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.jackett.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.jackett.dataDir == jackett_data_directory; assertion = config.services.jackett.dataDir == jackett_data_directory;

View file

@ -6,7 +6,14 @@
jellyfin_data_directory = "/var/lib/jellyfin"; jellyfin_data_directory = "/var/lib/jellyfin";
jellyfin_cache_directory = "/var/cache/jellyfin"; jellyfin_cache_directory = "/var/cache/jellyfin";
in { in {
config = lib.mkIf (config.services.jellyfin.enable && config.host.impermanence.enable) { options.services.jellyfin = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.jellyfin.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.jellyfin.impermanence.enable {
fileSystems."/persist/system/jellyfin".neededForBoot = true; fileSystems."/persist/system/jellyfin".neededForBoot = true;
host.storage.pool.extraDatasets = { host.storage.pool.extraDatasets = {

View file

@ -16,9 +16,15 @@ in {
description = "extra domains that should be configured for jellyfin"; description = "extra domains that should be configured for jellyfin";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.jellyfin.enable && config.services.reverseProxy.enable;
};
};
}; };
config = lib.mkIf (config.services.jellyfin.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.jellyfin.reverseProxy.enable {
services.reverseProxy.services.jellyfin = { services.reverseProxy.services.jellyfin = {
target = "http://localhost:${toString jellyfinPort}"; target = "http://localhost:${toString jellyfinPort}";
domain = config.services.jellyfin.domain; domain = config.services.jellyfin.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
lidarr_data_directory = "/var/lib/lidarr/.config/Lidarr"; lidarr_data_directory = "/var/lib/lidarr/.config/Lidarr";
in { in {
config = lib.mkIf (config.services.lidarr.enable && config.host.impermanence.enable) { options.services.lidarr = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.lidarr.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.lidarr.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.lidarr.dataDir == lidarr_data_directory; assertion = config.services.lidarr.dataDir == lidarr_data_directory;

View file

@ -3,7 +3,14 @@
config, config,
... ...
}: { }: {
config = lib.mkIf (config.services.panoramax.enable && config.host.impermanence.enable) { options.services.panoramax = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.panoramax.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.panoramax.impermanence.enable {
# TODO: configure impermanence for panoramax data # TODO: configure impermanence for panoramax data
# This would typically include directories like: # This would typically include directories like:
# - /var/lib/panoramax # - /var/lib/panoramax

View file

@ -14,9 +14,15 @@
description = "extra domains that should be configured for panoramax"; description = "extra domains that should be configured for panoramax";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.panoramax.enable && config.services.reverseProxy.enable;
};
};
}; };
config = lib.mkIf (config.services.panoramax.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.panoramax.reverseProxy.enable {
services.reverseProxy.services.panoramax = { services.reverseProxy.services.panoramax = {
target = "http://localhost:${toString config.services.panoramax.port}"; target = "http://localhost:${toString config.services.panoramax.port}";
domain = config.services.panoramax.domain; domain = config.services.panoramax.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
dataDir = "/var/lib/paperless"; dataDir = "/var/lib/paperless";
in { in {
config = lib.mkIf (config.services.paperless.enable && config.host.impermanence.enable) { options.services.paperless = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.paperless.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.paperless.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.paperless.dataDir == dataDir; assertion = config.services.paperless.dataDir == dataDir;

View file

@ -9,9 +9,15 @@
description = "extra domains that should be configured for paperless"; description = "extra domains that should be configured for paperless";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.paperless.enable && config.services.reverseProxy.enable;
};
};
}; };
config = lib.mkIf (config.services.paperless.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.paperless.reverseProxy.enable {
services.reverseProxy.services.paperless = { services.reverseProxy.services.paperless = {
target = "http://${config.services.paperless.address}:${toString config.services.paperless.port}"; target = "http://${config.services.paperless.address}:${toString config.services.paperless.port}";
domain = config.services.paperless.domain; domain = config.services.paperless.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
qbittorent_profile_directory = "/var/lib/qBittorrent/"; qbittorent_profile_directory = "/var/lib/qBittorrent/";
in { in {
config = lib.mkIf (config.services.qbittorrent.enable && config.host.impermanence.enable) { options.services.qbittorrent = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.qbittorrent.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.qbittorrent.impermanence.enable {
fileSystems."/persist/system/qbittorrent".neededForBoot = true; fileSystems."/persist/system/qbittorrent".neededForBoot = true;
host.storage.pool.extraDatasets = { host.storage.pool.extraDatasets = {

View file

@ -5,7 +5,14 @@
}: let }: let
radarr_data_directory = "/var/lib/radarr/.config/Radarr"; radarr_data_directory = "/var/lib/radarr/.config/Radarr";
in { in {
config = lib.mkIf (config.services.radarr.enable && config.host.impermanence.enable) { options.services.radarr = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.radarr.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.radarr.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.radarr.dataDir == radarr_data_directory; assertion = config.services.radarr.dataDir == radarr_data_directory;

View file

@ -9,9 +9,15 @@
description = "extra domains that should be configured for searx"; description = "extra domains that should be configured for searx";
default = []; default = [];
}; };
reverseProxy = {
enable = lib.mkOption {
type = lib.types.bool;
default = config.services.searx.enable && config.services.reverseProxy.enable;
};
};
}; };
config = lib.mkIf (config.services.searx.enable && config.services.reverseProxy.enable) { config = lib.mkIf config.services.searx.reverseProxy.enable {
services.reverseProxy.services.searx = { services.reverseProxy.services.searx = {
target = "http://localhost:${toString config.services.searx.settings.server.port}"; target = "http://localhost:${toString config.services.searx.settings.server.port}";
domain = config.services.searx.domain; domain = config.services.searx.domain;

View file

@ -5,7 +5,14 @@
}: let }: let
sonarr_data_directory = "/var/lib/sonarr/.config/NzbDrone"; sonarr_data_directory = "/var/lib/sonarr/.config/NzbDrone";
in { in {
config = lib.mkIf (config.services.sonarr.enable && config.host.impermanence.enable) { options.services.sonarr = {
impermanence.enable = lib.mkOption {
type = lib.types.bool;
default = config.services.sonarr.enable && config.host.impermanence.enable;
};
};
config = lib.mkIf config.services.sonarr.impermanence.enable {
assertions = [ assertions = [
{ {
assertion = config.services.sonarr.dataDir == sonarr_data_directory; assertion = config.services.sonarr.dataDir == sonarr_data_directory;