From a6505df173af299265de79fec176e8491f9a22ba Mon Sep 17 00:00:00 2001 From: Max Audron Date: Sun, 4 Feb 2024 11:19:56 +0100 Subject: update to 23.11 and move garage --- modules/bgp/default.nix | 2 +- modules/common/default.nix | 2 +- modules/default.nix | 3 +++ modules/garage/default.nix | 58 ++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 63 insertions(+), 2 deletions(-) create mode 100644 modules/garage/default.nix (limited to 'modules') diff --git a/modules/bgp/default.nix b/modules/bgp/default.nix index 3eecd86..1f33aad 100644 --- a/modules/bgp/default.nix +++ b/modules/bgp/default.nix @@ -33,7 +33,7 @@ enable = true; config = '' router bgp 64716 - bgp router-id ${config.kubernetes.externalIP.v4} + bgp router-id ${config.deploy.host} bgp ebgp-requires-policy no bgp default ipv4-unicast no bgp network import-check diff --git a/modules/common/default.nix b/modules/common/default.nix index 05c395f..26f42c4 100644 --- a/modules/common/default.nix +++ b/modules/common/default.nix @@ -15,7 +15,7 @@ systemd.enableEmergencyMode = false; # Default Packages Set - environment.systemPackages = with pkgs; [ git vim htop wget nftables wireguard-tools tmux ]; + environment.systemPackages = with pkgs; [ git vim htop wget nftables wireguard-tools tmux fd ripgrep ]; nixpkgs.config.allowUnfree = true; diff --git a/modules/default.nix b/modules/default.nix index dc6de23..baa7cd2 100644 --- a/modules/default.nix +++ b/modules/default.nix @@ -21,4 +21,7 @@ hydra = import ./hydra; tlmp = import ./tlmp; homeassistant = import ./homeassistant; + garage = import ./garage; + + palworld = import ./palworld; } diff --git a/modules/garage/default.nix b/modules/garage/default.nix new file mode 100644 index 0000000..9bc2998 --- /dev/null +++ b/modules/garage/default.nix @@ -0,0 +1,58 @@ +{ self, config, lib, pkgs, ... }: + +with self.lib.nginx; +{ + services.garage = { + enable = true; + package = pkgs.garage_0_9_0; + settings = { + replication_mode = 3; + metadata_dir = "/var/lib/garage/meta"; + data_dir = "/var/lib/garage/data"; + db_engine = "lmdb"; + + compression_level = 2; + + rpc_bind_addr = "${config.wireguard.v4.address}:3901"; + rpc_public_addr = "${config.wireguard.v4.address}:3901"; + rpc_secret = "37e1edc5a5eefb8901ca314bcfbd21cb803fbfb0a780b80a547fddf641284503"; + + bootstrap_peers = [ ]; + + s3_api = { + s3_region = "cdn"; + api_bind_addr = "127.0.0.1:3900"; + root_domain = "s3.vapor.systems"; + }; + + s3_web = { + bind_addr = "127.0.0.1:3902"; + root_domain = "web.vapor.systems"; + index = "index.html"; + }; + }; + }; + + security.acme.certs = { + "vapor.systems" = { + extraDomainNames = [ "*.vapor.systems" ]; + }; + "gnulag.net" = { + extraDomainNames = [ "*.gnulag.net" ]; + }; + "linuxmasterrace.org" = { + extraDomainNames = [ "*.linuxmasterrace.org" ]; + }; + }; + + services.nginx = { + enable = true; + virtualHosts = { + "s3.vapor.systems" = (proxyDomain "vapor.systems" "http://127.0.0.1:3900/"); + "web.vapor.systems" = (proxyDomain "vapor.systems" "http://127.0.0.1:3902/"); + "gnulag.net" = (proxyDomain "gnulag.net" "http://127.0.0.1:3902/"); + "linuxmasterrace.org" = (proxyDomain "linuxmasterrace.org" "http://127.0.0.1:3902/"); + "dash.linuxmasterrace.org" = (proxyDomain "linuxmasterrace.org" "http://127.0.0.1:3902/"); + }; + }; +} -- cgit v1.2.3