mirror of
https://github.com/nmasur/dotfiles
synced 2025-04-28 10:02:24 +00:00
Compare commits
2 Commits
4b0d68089a
...
ffe867e6a8
Author | SHA1 | Date | |
---|---|---|---|
|
ffe867e6a8 | ||
|
b599162090 |
@ -1,4 +1,4 @@
|
|||||||
{ config, lib, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
let giteaPath = "/var/lib/gitea"; # Default service directory
|
let giteaPath = "/var/lib/gitea"; # Default service directory
|
||||||
|
|
||||||
@ -44,6 +44,7 @@ in {
|
|||||||
};
|
};
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 122 ];
|
networking.firewall.allowedTCPPorts = [ 122 ];
|
||||||
|
users.users.${config.user}.extraGroups = [ "gitea" ];
|
||||||
|
|
||||||
caddy.routes = [{
|
caddy.routes = [{
|
||||||
match = [{ host = [ config.gitServer ]; }];
|
match = [{ host = [ config.gitServer ]; }];
|
||||||
@ -84,6 +85,34 @@ in {
|
|||||||
requires = [ "gitea.service" ];
|
requires = [ "gitea.service" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Run a repository file backup on a schedule
|
||||||
|
systemd.timers.gitea-backup = lib.mkIf (config.backup.s3.endpoint != null) {
|
||||||
|
timerConfig = {
|
||||||
|
OnCalendar = "*-*-* 00:00:00"; # Once per day
|
||||||
|
Unit = "gitea-backup.service";
|
||||||
|
};
|
||||||
|
wantedBy = [ "timers.target" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Backup Gitea repos to object storage
|
||||||
|
systemd.services.gitea-backup =
|
||||||
|
lib.mkIf (config.backup.s3.endpoint != null) {
|
||||||
|
description = "Backup Gitea data";
|
||||||
|
environment.AWS_ACCESS_KEY_ID = config.backup.s3.accessKeyId;
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
User = "gitea";
|
||||||
|
Group = "backup";
|
||||||
|
EnvironmentFile = config.secrets.backup.dest;
|
||||||
|
};
|
||||||
|
script = ''
|
||||||
|
${pkgs.awscli2}/bin/aws s3 sync --exclude */gitea.db* \
|
||||||
|
${giteaPath}/ \
|
||||||
|
s3://${config.backup.s3.bucket}/gitea-data/ \
|
||||||
|
--endpoint-url=https://${config.backup.s3.endpoint}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -20,16 +20,15 @@
|
|||||||
webExternalUrl = lib.mkIf config.services.grafana.enable
|
webExternalUrl = lib.mkIf config.services.grafana.enable
|
||||||
"https://${config.prometheusServer}";
|
"https://${config.prometheusServer}";
|
||||||
# Web config file: https://prometheus.io/docs/prometheus/latest/configuration/https/
|
# Web config file: https://prometheus.io/docs/prometheus/latest/configuration/https/
|
||||||
webConfigFile =
|
webConfigFile = lib.mkIf config.services.grafana.enable
|
||||||
lib.mkIf config.services.grafana.enable (pkgs.formats.yaml { }).generate
|
((pkgs.formats.yaml { }).generate "webconfig.yml" {
|
||||||
"webconfig.yml" {
|
|
||||||
basic_auth_users = {
|
basic_auth_users = {
|
||||||
# Generate password: htpasswd -nBC 10 "" | tr -d ':\n'
|
# Generate password: htpasswd -nBC 10 "" | tr -d ':\n'
|
||||||
# Encrypt and place in private/prometheus.age
|
# Encrypt and place in private/prometheus.age
|
||||||
"prometheus" =
|
"prometheus" =
|
||||||
"$2y$10$r7FWHLHTGPAY312PdhkPEuvb05aGn9Nk1IO7qtUUUjmaDl35l6sLa";
|
"$2y$10$r7FWHLHTGPAY312PdhkPEuvb05aGn9Nk1IO7qtUUUjmaDl35l6sLa";
|
||||||
};
|
};
|
||||||
};
|
});
|
||||||
remoteWrite = lib.mkIf (!config.services.grafana.enable) [{
|
remoteWrite = lib.mkIf (!config.services.grafana.enable) [{
|
||||||
name = config.networking.hostName;
|
name = config.networking.hostName;
|
||||||
url = "https://${config.prometheusServer}";
|
url = "https://${config.prometheusServer}";
|
||||||
|
Loading…
x
Reference in New Issue
Block a user