Compare commits

..

No commits in common. "ada4538ac8d4ba0c989cbf42940c6c6210b44877" and "fde1d41bb8b485c38ac395215ee89b37f82bc57f" have entirely different histories.

5 changed files with 88 additions and 98 deletions

View file

@ -1,6 +1,4 @@
{config, ...}: let {...}: {
username = config.horseman.username;
in {
imports = [ imports = [
../../modules ../../modules
]; ];
@ -8,15 +6,6 @@ in {
config.horseman = { config.horseman = {
users.default.enable = true; users.default.enable = true;
containers = {
enable = true;
backupDir = "/home/${username}/backups";
nginx.enable = true;
vaultwarden.enable = true;
forgejo.enable = true;
};
base = { base = {
nix.enable = true; nix.enable = true;
locale.enable = true; locale.enable = true;

View file

@ -1,10 +1,5 @@
{ {lib, ...}: let
config, inherit (lib) mkOption types;
lib,
...
}: let
inherit (lib) mkIf mkEnableOption mkOption types;
cfg = config.horseman.containers;
in { in {
imports = [ imports = [
./nginx.nix ./nginx.nix
@ -13,20 +8,17 @@ in {
]; ];
options = { options = {
horseman.containers = { backupDir = mkOption {
enable = mkEnableOption "Containers"; type = types.str;
backupDir = mkOption {
type = types.str;
};
}; };
}; };
config = mkIf cfg.enable { config = {
networking.nat = { networking.nat = {
enable = true; enable = true;
# Use "ve-*" when using nftables instead of iptables # Use "ve-*" when using nftables instead of iptables
internalInterfaces = ["ve-+"]; internalInterfaces = ["ve-+"];
externalInterface = "enp2s0"; externalInterface = "eno1";
# Lazy IPv6 connectivity for the container # Lazy IPv6 connectivity for the container
enableIPv6 = true; enableIPv6 = true;
}; };

View file

@ -57,8 +57,8 @@ in {
containers.forgejoRunner = { containers.forgejoRunner = {
autoStart = true; autoStart = true;
privateNetwork = true; privateNetwork = true;
hostAddress = "172.168.100.2"; hostAddress = "172.16.0.2";
localAddress = "192.168.100.102"; localAddress = "192.168.100.2";
bindMounts = { bindMounts = {
"/var/lib/secrets" = { "/var/lib/secrets" = {
@ -91,7 +91,7 @@ in {
systemd.services.startup = { systemd.services.startup = {
script = '' script = ''
cd ${config.users.users.runner.home} cd ${config.users.users.runner.home}
${pkgs.forgejo-runner}/bin/forgejo-runner create-runner-file --instance ${cfg.url} --secret $(cat /var/lib/secrets/secret) --name runner ${pkgs.forgejo-runner}/bin/forgejo-runner create-runner-file --instance http://192.168.100.3:3000 --secret $(cat /var/lib/secrets/secret) --name runner
sleep 10 sleep 10
${pkgs.forgejo-runner}/bin/forgejo-runner daemon --config ${configFile} ${pkgs.forgejo-runner}/bin/forgejo-runner daemon --config ${configFile}
''; '';
@ -106,8 +106,8 @@ in {
containers.forgejo = { containers.forgejo = {
autoStart = true; autoStart = true;
privateNetwork = true; privateNetwork = true;
hostAddress = "192.168.100.3"; hostAddress = "172.16.0.3";
localAddress = "192.168.100.103"; localAddress = "192.168.100.3";
bindMounts = { bindMounts = {
"/var/lib/forgejo" = { "/var/lib/forgejo" = {
@ -127,18 +127,6 @@ in {
... ...
}: { }: {
environment.systemPackages = [pkgs.forgejo]; environment.systemPackages = [pkgs.forgejo];
services.openssh = {
enable = true;
ports = [cfg.sshPort];
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
# AllowUsers = ["git"];
};
};
services.forgejo = { services.forgejo = {
enable = true; enable = true;
@ -151,7 +139,7 @@ in {
ROOT_URL = cfg.url; ROOT_URL = cfg.url;
}; };
session = { session = {
COOKIE_SECURE = true; COOKIE_SECURE = false; # TODO Set to true
}; };
service = { service = {
DISABLE_REGISTRATION = true; DISABLE_REGISTRATION = true;

View file

@ -8,6 +8,7 @@
}: let }: let
inherit (lib) mkEnableOption mkIf mkOption types; inherit (lib) mkEnableOption mkIf mkOption types;
cfg = config.horseman.containers.nginx; cfg = config.horseman.containers.nginx;
osConfig = config;
in { in {
options = { options = {
horseman.containers.nginx = { horseman.containers.nginx = {
@ -25,61 +26,81 @@ in {
acceptTerms = true; acceptTerms = true;
defaults.email = "koen.de.ruiter@hotmail.com"; defaults.email = "koen.de.ruiter@hotmail.com";
}; };
containers.nginx = {
autoStart = true;
privateNetwork = true;
hostAddress = "172.16.0.1";
localAddress = "192.168.100.1";
services.fail2ban.enable = true; bindMounts = {
services.nginx = { "/var/www/portfolio" = {
enable = true; hostPath = "/var/www/portfolio";
isReadOnly = true;
streamConfig = ''
server {
listen ${toString config.horseman.containers.forgejo.sshPort};
proxy_pass ${config.containers.forgejo.localAddress}:${toString config.horseman.containers.forgejo.sshPort};
}
'';
virtualHosts = {
"${cfg.domain}" = {
forceSSL = true;
enableACME = true;
root = "/var/www/portfolio";
default = true;
extraConfig = ''
error_page 404 /404.html;
'';
}; };
"/var/www/public" = {
"public.${cfg.domain}" = { hostPath = "/var/www/public";
forceSSL = true; isReadOnly = true;
enableACME = true;
root = "/var/www/public";
};
"git.${cfg.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://${config.containers.forgejo.localAddress}:${toString config.horseman.containers.forgejo.port}";
};
};
"vault.${cfg.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://${config.containers.vaultwarden.localAddress}:${toString config.horseman.containers.vaultwarden.port}";
};
}; };
}; };
};
networking = { config = {
firewall = { config,
enable = true; pkgs,
allowedTCPPorts = [80 443 config.horseman.containers.forgejo.sshPort]; lib,
...
}: {
services.nginx = {
enable = true;
virtualHosts = {
"${cfg.domain}" = {
forceSSL = true;
enableACME = true;
root = "/var/www/portfolio";
default = true;
extraConfig = ''
error_page 404 /404.html;
'';
};
"public.${cfg.domain}" = {
forceSSL = true;
enableACME = true;
root = "/var/www/public";
};
"git.${cfg.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://${osConfig.containers.forgejo.localAddress}:${toString osConfig.horseman.containers.forgejo.port}";
};
};
"vault.${cfg.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://${osConfig.containers.vaultwarden.localAddress}:${toString osConfig.horseman.containers.vaultwarden.port}";
};
};
};
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [80 443];
};
useHostResolvConf = lib.mkForce false;
};
services.resolved.enable = true;
system.stateVersion = "23.11";
}; };
}; };
}; };

View file

@ -52,14 +52,14 @@ in {
containers.vaultwarden = { containers.vaultwarden = {
autoStart = true; autoStart = true;
privateNetwork = true; privateNetwork = true;
hostAddress = "192.168.100.4"; hostAddress = "172.16.0.4";
localAddress = "192.168.100.104"; localAddress = "192.168.100.4";
bindMounts = { bindMounts = {
"/var/lib/bitwarden_rs" = { "/var/lib/vaultwarden" = {
hostPath = DATA_DIR; hostPath = DATA_DIR;
isReadOnly = false; isReadOnly = false;
}; }; # TODO set correct
}; };
config = { config = {