125 lines
3.3 KiB
Nix
125 lines
3.3 KiB
Nix
{
|
|
lib,
|
|
config,
|
|
pkgs,
|
|
inputs,
|
|
...
|
|
}: {
|
|
imports = [];
|
|
|
|
options = {
|
|
apps = {
|
|
base_domain = lib.mkOption {
|
|
type = lib.types.str;
|
|
};
|
|
headscale = {
|
|
subdomain = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "subdomain of base domain that headscale will be hosted at";
|
|
default = "headscale";
|
|
};
|
|
hostname = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "hostname that headscale will be hosted at";
|
|
default = "${config.apps.headscale.subdomain}.${config.apps.base_domain}";
|
|
};
|
|
};
|
|
nextcloud = {
|
|
subdomain = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "subdomain of base domain that nextcloud will be hosted at";
|
|
default = "nextcloud";
|
|
};
|
|
hostname = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "hostname that nextcloud will be hosted at";
|
|
default = "${config.apps.nextcloud.subdomain}.${config.apps.base_domain}";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
config = {
|
|
sops.secrets = {
|
|
"services/nextcloud_adminpass" = {
|
|
sopsFile = "${inputs.secrets}/defiant-services.yaml";
|
|
owner = config.users.users.nextcloud.name;
|
|
};
|
|
};
|
|
|
|
systemd = {
|
|
services = {
|
|
# nextcloud-setup = {
|
|
# after = ["network.target"];
|
|
# };
|
|
headscale = {
|
|
after = ["postgresql.service"];
|
|
requires = ["postgresql.service"];
|
|
};
|
|
};
|
|
|
|
# disable computer sleeping
|
|
targets = {
|
|
sleep.enable = false;
|
|
suspend.enable = false;
|
|
hibernate.enable = false;
|
|
hybrid-sleep.enable = false;
|
|
};
|
|
};
|
|
|
|
services = {
|
|
# DNS stub needs to be disabled so pi hole can bind
|
|
# resolved.extraConfig = "DNSStubListener=no";
|
|
headscale = {
|
|
enable = true;
|
|
user = "headscale";
|
|
group = "headscale";
|
|
address = "0.0.0.0";
|
|
port = 8080;
|
|
settings = {
|
|
server_url = "https://${config.apps.headscale.hostname}";
|
|
dns.base_domain = "clients.${config.apps.headscale.hostname}";
|
|
logtail.enabled = true;
|
|
database = {
|
|
type = "postgres";
|
|
postgres = {
|
|
host = "/run/postgresql";
|
|
port = config.services.postgresql.settings.port;
|
|
user = "headscale";
|
|
name = "headscale";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
# nextcloud here is built using its auto setup mysql db because it was not playing nice with postgres
|
|
nextcloud = {
|
|
enable = true;
|
|
package = pkgs.nextcloud30;
|
|
hostName = config.apps.nextcloud.hostname;
|
|
config = {
|
|
adminpassFile = config.sops.secrets."services/nextcloud_adminpass".path;
|
|
};
|
|
};
|
|
|
|
nginx = {
|
|
enable = true;
|
|
virtualHosts = {
|
|
${config.apps.headscale.hostname} = {
|
|
# forceSSL = true;
|
|
# enableACME = true;
|
|
locations."/" = {
|
|
proxyPass = "http://localhost:${toString config.services.headscale.port}";
|
|
proxyWebsockets = true;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
environment.systemPackages = [
|
|
config.services.headscale.package
|
|
];
|
|
};
|
|
}
|