started container config
This commit is contained in:
28
flake.lock
generated
28
flake.lock
generated
@@ -1160,12 +1160,12 @@
|
|||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 0,
|
"lastModified": 0,
|
||||||
"narHash": "sha256-IPYagfnkxKiBpLyWFy+WwS9JQ72kn+6Bm/oE8tuSraM=",
|
"narHash": "sha256-vhkyPcraN1gHPR50nUBwPGMdGP1p20/3n4i8uAuragY=",
|
||||||
"path": "/nix/store/d8942lmgvsq0xvllg6qcm5xghygqspb5-source/home-manager",
|
"path": "/nix/store/nlgbyrj29hzjkm7f15v4k6pzm0zwcw9a-source/home-manager",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/d8942lmgvsq0xvllg6qcm5xghygqspb5-source/home-manager",
|
"path": "/nix/store/nlgbyrj29hzjkm7f15v4k6pzm0zwcw9a-source/home-manager",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -1642,11 +1642,11 @@
|
|||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1,
|
||||||
"narHash": "sha256-oZjb5biv4evAYiQhs7m1WqDt96NMLrGzn4KiYNBP01s=",
|
"narHash": "sha256-oZjb5biv4evAYiQhs7m1WqDt96NMLrGzn4KiYNBP01s=",
|
||||||
"path": "/nix/store/1l5pym20sj0al1yashc3apv59zd7gj18-source/packages",
|
"path": "/nix/store/h6akvkf3ind4w4nl87rj4yscvp7cznzs-source/packages",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/1l5pym20sj0al1yashc3apv59zd7gj18-source/packages",
|
"path": "/nix/store/h6akvkf3ind4w4nl87rj4yscvp7cznzs-source/packages",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -1715,11 +1715,11 @@
|
|||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1,
|
||||||
"narHash": "sha256-5gepalTSnDyC1WW11Gp75FAPeex5V9M0xOUn9amViyw=",
|
"narHash": "sha256-5gepalTSnDyC1WW11Gp75FAPeex5V9M0xOUn9amViyw=",
|
||||||
"path": "/nix/store/1l5pym20sj0al1yashc3apv59zd7gj18-source/programs",
|
"path": "/nix/store/h6akvkf3ind4w4nl87rj4yscvp7cznzs-source/programs",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/1l5pym20sj0al1yashc3apv59zd7gj18-source/programs",
|
"path": "/nix/store/h6akvkf3ind4w4nl87rj4yscvp7cznzs-source/programs",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -1730,11 +1730,11 @@
|
|||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1,
|
||||||
"narHash": "sha256-HAuZ9X84fuwUcit6NWUoJCjHj+29nST/YN6Rs8JQugY=",
|
"narHash": "sha256-HAuZ9X84fuwUcit6NWUoJCjHj+29nST/YN6Rs8JQugY=",
|
||||||
"path": "/nix/store/s2ayzjpygbj4r3zq0aklwkzg6p43sw3p-source/programs",
|
"path": "/nix/store/5nl92vargx6kx6dikxpfwdr5v0kpvm50-source/programs",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/s2ayzjpygbj4r3zq0aklwkzg6p43sw3p-source/programs",
|
"path": "/nix/store/5nl92vargx6kx6dikxpfwdr5v0kpvm50-source/programs",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -1815,11 +1815,11 @@
|
|||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1,
|
||||||
"narHash": "sha256-0Ztx5DVQ2I7hvCK/qjGa4XTdRgbzM8rhf19m0al8lVM=",
|
"narHash": "sha256-0Ztx5DVQ2I7hvCK/qjGa4XTdRgbzM8rhf19m0al8lVM=",
|
||||||
"path": "/nix/store/s2ayzjpygbj4r3zq0aklwkzg6p43sw3p-source/services/sddm",
|
"path": "/nix/store/5nl92vargx6kx6dikxpfwdr5v0kpvm50-source/services/sddm",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/s2ayzjpygbj4r3zq0aklwkzg6p43sw3p-source/services/sddm",
|
"path": "/nix/store/5nl92vargx6kx6dikxpfwdr5v0kpvm50-source/services/sddm",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -1865,12 +1865,12 @@
|
|||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1,
|
||||||
"narHash": "sha256-9AOirMNOFuTBtkxJb5lxe3EWedeYCR/MvE7b7pqk0JI=",
|
"narHash": "sha256-M4cP5Czkn09N4ckf5hZJ6Oq4ZAP7rp6E0zUjIPrQEMA=",
|
||||||
"path": "/nix/store/d8942lmgvsq0xvllg6qcm5xghygqspb5-source/system-config",
|
"path": "/nix/store/nlgbyrj29hzjkm7f15v4k6pzm0zwcw9a-source/system-config",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/d8942lmgvsq0xvllg6qcm5xghygqspb5-source/system-config",
|
"path": "/nix/store/nlgbyrj29hzjkm7f15v4k6pzm0zwcw9a-source/system-config",
|
||||||
"type": "path"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -11,6 +11,11 @@
|
|||||||
|
|
||||||
impermanence.url = "github:nix-community/impermanence";
|
impermanence.url = "github:nix-community/impermanence";
|
||||||
|
|
||||||
|
sops-nix = {
|
||||||
|
url = "github:Mic92/sops-nix";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager/release-24.05";
|
url = "github:nix-community/home-manager/release-24.05";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|||||||
@@ -10,6 +10,8 @@
|
|||||||
(import ./disko.nix { device1 = "/dev/nvme0n1"; device2 = "/dev/nvme1n1"; })
|
(import ./disko.nix { device1 = "/dev/nvme0n1"; device2 = "/dev/nvme1n1"; })
|
||||||
|
|
||||||
inputs.impermanence.nixosModules.impermanence
|
inputs.impermanence.nixosModules.impermanence
|
||||||
|
|
||||||
|
inputs.sops-nix.nixosModules.sops
|
||||||
|
|
||||||
inputs.home-manager.nixosModules.default
|
inputs.home-manager.nixosModules.default
|
||||||
|
|
||||||
@@ -96,7 +98,7 @@
|
|||||||
hostName = "homebox";
|
hostName = "homebox";
|
||||||
nameservers = [ "1.1.1.1#one.one.one.one" "1.0.0.1#one.one.one.one" ];
|
nameservers = [ "1.1.1.1#one.one.one.one" "1.0.0.1#one.one.one.one" ];
|
||||||
networkmanager.enable = true;
|
networkmanager.enable = true;
|
||||||
firewall.allowedTCPPorts = [ 22 ];
|
firewall.allowedTCPPorts = [ 22 80 443 9080 9443 ];
|
||||||
};
|
};
|
||||||
|
|
||||||
system.stateVersion = "23.05"; # Did you read the comment?
|
system.stateVersion = "23.05"; # Did you read the comment?
|
||||||
@@ -164,7 +166,7 @@
|
|||||||
programs.fuse.userAllowOther = true;
|
programs.fuse.userAllowOther = true;
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
backupFileExtension = ".backup";
|
backupFileExtension = "backup";
|
||||||
extraSpecialArgs = {inherit inputs;};
|
extraSpecialArgs = {inherit inputs;};
|
||||||
users = {
|
users = {
|
||||||
"nathan" = lib.mkMerge [
|
"nathan" = lib.mkMerge [
|
||||||
|
|||||||
7
system-config/services/containers/default.nix
Normal file
7
system-config/services/containers/default.nix
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
{ ... }: {
|
||||||
|
|
||||||
|
imports = [
|
||||||
|
./gitlab
|
||||||
|
./traefik
|
||||||
|
];
|
||||||
|
}
|
||||||
33
system-config/services/containers/gitlab/default.nix
Normal file
33
system-config/services/containers/gitlab/default.nix
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{ config, lib, pkgs, ... }: {
|
||||||
|
|
||||||
|
options.sysconfig.opts.virtualization.gitlab.enable = lib.options.mkOption {
|
||||||
|
type = lib.types.bool;
|
||||||
|
default = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.sysconfig.opts.virtualization.gitlab.enable {
|
||||||
|
|
||||||
|
virtualisation.containers.gitlab = {
|
||||||
|
|
||||||
|
autoStart = true;
|
||||||
|
privateNetwork = true;
|
||||||
|
hostAddress = "192.168.100.10";
|
||||||
|
localAddress = "192.168.100.11";
|
||||||
|
config = {
|
||||||
|
|
||||||
|
services.gitlab = {
|
||||||
|
enable = true;
|
||||||
|
#https = true;
|
||||||
|
#port = 443;
|
||||||
|
#host = "localhost";
|
||||||
|
databasePasswordFile = pkgs.writeText "dbPassword" "hellothere!";
|
||||||
|
initialRootPasswordFile = pkgs.writeText "rootPassword" "generalkenobi";
|
||||||
|
|
||||||
|
secrets = {
|
||||||
|
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
26
system-config/services/containers/traefik/default.nix
Normal file
26
system-config/services/containers/traefik/default.nix
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
{ config, lib, ... }: {
|
||||||
|
|
||||||
|
options.sysconfig.opts.virtualization.traefik.enable = lib.options.mkOption {
|
||||||
|
type = lib.types.bool;
|
||||||
|
default = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.sysconfig.opts.virtualization.traefik.enable {
|
||||||
|
|
||||||
|
services.traefik = {
|
||||||
|
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
staticConfigOpts = {
|
||||||
|
entryPoints = {
|
||||||
|
web = {};
|
||||||
|
websecure = {};
|
||||||
|
log = {};
|
||||||
|
certificatesResolvers
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
dynamicConfigOpts = {};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -4,5 +4,6 @@
|
|||||||
./ollama
|
./ollama
|
||||||
./openssh
|
./openssh
|
||||||
./pipewire
|
./pipewire
|
||||||
|
# ./containers
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user