cofractal-ams01: adopt more responsibility from clouvider-fra01

This commit is contained in:
Luke Granger-Brown 2023-03-12 03:15:34 +00:00
parent f0712a966a
commit ca7b57a78a
4 changed files with 86 additions and 10 deletions

View file

@ -4,10 +4,10 @@
{ pkgs, ... }: { pkgs, ... }:
let let
version = "1.30.1.6497-5fc2e0894"; version = "1.31.2.6783-9209b39b4";
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "https://downloads.plex.tv/plex-media-server-new/1.30.1.6497-5fc2e0894/debian/plexmediaserver_1.30.1.6497-5fc2e0894_amd64.deb"; url = "https://downloads.plex.tv/plex-media-server-new/1.31.2.6783-9209b39b4/debian/plexmediaserver_1.31.2.6783-9209b39b4_amd64.deb";
hash = "sha256:019yyyn24nsn33fvrbg2mqhjp4n710pjdj32xcnlmpq3j6s9w1jp"; hash = "sha256:0sfqwgw20z6bn7r2jgi8nh7br8fwq75j71py7iidfhbxwwliph9m";
}; };
in in
(pkgs.plex.override { (pkgs.plex.override {

View file

@ -3,12 +3,55 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
{ depot, lib, pkgs, config, ... }: { depot, lib, pkgs, config, ... }:
let
vhostsConfig = {
int = rec {
proxy = _apply (value: { extraConfig = ''
${bind}
reverse_proxy ${value}
''; }) {
"http://deluge.int.lukegb.com" = "http://localhost:8112";
"http://radarr.int.lukegb.com" = "http://localhost:7878";
"http://sonarr.int.lukegb.com" = "http://localhost:8989";
};
serve = _apply (value: { extraConfig = ''
${bind}
root * ${value}
file_server
''; }) {
"http://int.lukegb.com" = depot.web.int;
"http://logged-out.int.lukegb.com" = depot.web.logged-out-int;
};
other = _apply lib.id {
"http://content.int.lukegb.com" = {
serverAliases = ["http://content.int.lukegb.com:18081"];
extraConfig = ''
${bind}
root * /store/content
file_server browse
'';
};
};
_apply = f: builtins.mapAttrs (name: value: lib.recursiveUpdate hostBase (f value));
};
};
vhosts = vhostsConfig.int.proxy // vhostsConfig.int.serve // vhostsConfig.int.other;
hostBase = {
extraConfig = ''
${bind}
'';
};
bind = "bind [${config.my.ip.tailscale6}] ${config.my.ip.tailscale}";
in
{ {
imports = [ imports = [
../lib/zfs.nix ../lib/zfs.nix
../lib/bgp.nix ../lib/bgp.nix
../lib/nixbuild-distributed.nix ../lib/nixbuild-distributed.nix
../lib/gitlab-runner-cacher.nix ../lib/gitlab-runner-cacher.nix
../lib/coredns/default.nix
../lib/deluge.nix
../lib/plex.nix
]; ];
# Otherwise _this_ machine won't enumerate things properly. # Otherwise _this_ machine won't enumerate things properly.
@ -51,6 +94,7 @@
"/tmp" = zfs "zfast/local/tmp"; "/tmp" = zfs "zfast/local/tmp";
"/persist" = zfs "zfast/safe/persist"; "/persist" = zfs "zfast/safe/persist";
"/store" = zfs "zslow/safe/store";
"/home" = (zfs "zslow/safe/home") // { neededForBoot = true; }; "/home" = (zfs "zslow/safe/home") // { neededForBoot = true; };
"/boot" = { "/boot" = {
@ -101,6 +145,7 @@
}; };
my.ip.tailscale = "100.94.187.27"; my.ip.tailscale = "100.94.187.27";
my.ip.tailscale6 = "fd7a:115c:a1e0:ab12:4843:cd96:625e:bb1b"; my.ip.tailscale6 = "fd7a:115c:a1e0:ab12:4843:cd96:625e:bb1b";
my.coredns.bind = [ "bond0" "tailscale0" "127.0.0.1" "::1" ];
services.openssh.hostKeys = [ services.openssh.hostKeys = [
{ {
@ -167,5 +212,21 @@
boot.binfmt.emulatedSystems = [ "aarch64-linux" ]; boot.binfmt.emulatedSystems = [ "aarch64-linux" ];
services.sonarr.enable = true;
services.radarr.enable = true;
services.kubo = {
enable = true;
settings = {
Discovery.MDNS.Enabled = false;
Swarm.DisableNatPortMap = true;
Experimental.FilestoreEnabled = true;
};
dataDir = "/store/ipfs";
};
services.caddy = {
enable = true;
virtualHosts = vhosts;
};
system.stateVersion = "23.05"; system.stateVersion = "23.05";
} }

View file

@ -318,12 +318,12 @@ in {
allowed_domains = null; allowed_domains = null;
} // extraConfig; } // extraConfig;
in [ in [
(service "clouvider-fra01.int.as205479.net" "int.lukegb.com" {}) (service "cofractal-ams01.int.as205479.net" "int.lukegb.com" {})
(service "clouvider-fra01.int.as205479.net" "logged-out.int.lukegb.com" (public {})) (service "cofractal-ams01.int.as205479.net" "logged-out.int.lukegb.com" (public {}))
(service "clouvider-fra01.int.as205479.net" "sonarr.int.lukegb.com" {}) (service "cofractal-ams01.int.as205479.net" "sonarr.int.lukegb.com" {})
(service "clouvider-fra01.int.as205479.net" "radarr.int.lukegb.com" {}) (service "cofractal-ams01.int.as205479.net" "radarr.int.lukegb.com" {})
(service "clouvider-fra01.int.as205479.net" "deluge.int.lukegb.com" {}) (service "cofractal-ams01.int.as205479.net" "deluge.int.lukegb.com" {})
(service "clouvider-fra01.int.as205479.net" "content.int.lukegb.com" {}) (service "cofractal-ams01.int.as205479.net" "content.int.lukegb.com" {})
(service "totoro.int.as205479.net:9090" "prometheus.int.lukegb.com" {}) (service "totoro.int.as205479.net:9090" "prometheus.int.lukegb.com" {})
(service "totoro.int.as205479.net:9093" "alertmanager.int.lukegb.com" {}) (service "totoro.int.as205479.net:9093" "alertmanager.int.lukegb.com" {})
(service "totoro.int.as205479.net:3000" "grafana.int.lukegb.com" {}) (service "totoro.int.as205479.net:3000" "grafana.int.lukegb.com" {})

View file

@ -2,7 +2,7 @@
# #
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
{ ... }: { lib, ... }:
{ {
users.users.content = { users.users.content = {
isSystemUser = true; isSystemUser = true;
@ -11,8 +11,23 @@
users.groups.content = {}; users.groups.content = {};
users.users.lukegb.extraGroups = [ "content" ]; users.users.lukegb.extraGroups = [ "content" ];
users.users.sonarr.extraGroups = [ "content" ];
users.users.radarr.extraGroups = [ "content" ];
users.users.deluge.extraGroups = [ "content" ];
systemd.services.nginx.serviceConfig = { systemd.services.nginx.serviceConfig = {
SupplementaryGroups = [ "content" ]; SupplementaryGroups = [ "content" ];
}; };
systemd.services.deluged.serviceConfig = {
UMask = "0002";
Group = lib.mkForce "content";
};
systemd.services.sonarr.serviceConfig = {
UMask = "0002";
Group = lib.mkForce "content";
};
systemd.services.radarr.serviceConfig = {
UMask = "0002";
Group = lib.mkForce "content";
};
} }