mirror of
https://github.com/nmasur/dotfiles
synced 2024-12-05 01:19:09 +00:00
Compare commits
2 Commits
4883532c65
...
5306070bc5
Author | SHA1 | Date | |
---|---|---|---|
|
5306070bc5 | ||
|
b729eff679 |
@ -245,6 +245,7 @@
|
|||||||
content = "cloud.${baseName}";
|
content = "cloud.${baseName}";
|
||||||
books = "books.${baseName}";
|
books = "books.${baseName}";
|
||||||
download = "download.${baseName}";
|
download = "download.${baseName}";
|
||||||
|
status = "status.${baseName}";
|
||||||
transmission = "transmission.${baseName}";
|
transmission = "transmission.${baseName}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -82,6 +82,7 @@ inputs.nixpkgs.lib.nixosSystem rec {
|
|||||||
services.minecraft-server.enable = true; # Setup Minecraft server
|
services.minecraft-server.enable = true; # Setup Minecraft server
|
||||||
services.n8n.enable = true;
|
services.n8n.enable = true;
|
||||||
services.ntfy-sh.enable = true;
|
services.ntfy-sh.enable = true;
|
||||||
|
services.uptime-kuma.enable = true;
|
||||||
system.autoUpgrade.enable = true;
|
system.autoUpgrade.enable = true;
|
||||||
|
|
||||||
# Allows private remote access over the internet
|
# Allows private remote access over the internet
|
||||||
|
@ -44,6 +44,10 @@
|
|||||||
settings = { };
|
settings = { };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Broken on 2024-08-23
|
||||||
|
# https://github.com/NixOS/nixpkgs/commit/0875d0ce1c778f344cd2377a5337a45385d6ffa0
|
||||||
|
nixpkgs.config.permittedInsecurePackages = [ "litestream-0.3.13" ];
|
||||||
|
|
||||||
# Wait for secret to exist
|
# Wait for secret to exist
|
||||||
systemd.services.litestream = {
|
systemd.services.litestream = {
|
||||||
after = [ "backup-secret.service" ];
|
after = [ "backup-secret.service" ];
|
||||||
|
@ -35,6 +35,7 @@
|
|||||||
./secrets.nix
|
./secrets.nix
|
||||||
./sshd.nix
|
./sshd.nix
|
||||||
./transmission.nix
|
./transmission.nix
|
||||||
|
./uptime-kuma.nix
|
||||||
./vaultwarden.nix
|
./vaultwarden.nix
|
||||||
./victoriametrics.nix
|
./victoriametrics.nix
|
||||||
./wireguard.nix
|
./wireguard.nix
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
config = lib.mkIf config.services.ntfy-sh.enable {
|
config = lib.mkIf config.services.ntfy-sh.enable {
|
||||||
services.ntfy-sh = {
|
services.ntfy-sh = {
|
||||||
settings = rec {
|
settings = {
|
||||||
base-url = "https://${config.hostnames.notifications}";
|
base-url = "https://${config.hostnames.notifications}";
|
||||||
upstream-base-url = "https://ntfy.sh";
|
upstream-base-url = "https://ntfy.sh";
|
||||||
listen-http = ":8333";
|
listen-http = ":8333";
|
||||||
|
39
modules/nixos/services/uptime-kuma.nix
Normal file
39
modules/nixos/services/uptime-kuma.nix
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
hostnames.status = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for status page (Uptime-Kuma).";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.uptime-kuma.enable {
|
||||||
|
|
||||||
|
services.uptime-kuma = {
|
||||||
|
settings = {
|
||||||
|
PORT = "3033";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Allow web traffic to Caddy
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.status ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [
|
||||||
|
{ dial = "localhost:${config.services.uptime-kuma.settings.PORT}"; }
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.status ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user