92 lines
2.3 KiB
Nix
92 lines
2.3 KiB
Nix
{ common }:
|
|
{
|
|
...
|
|
}:
|
|
{
|
|
|
|
# NOTE some useful links
|
|
# nixos containers: https://blog.beardhatcode.be/2020/12/Declarative-Nixos-Containers.html
|
|
# https://nixos.wiki/wiki/NixOS_Containers
|
|
options = { };
|
|
|
|
imports = [
|
|
common.nixosModules.containers.librechat
|
|
common.nixosModules.containers.forgejo
|
|
];
|
|
|
|
config = {
|
|
## Give internet access
|
|
networking = {
|
|
nat = {
|
|
enable = true;
|
|
internalInterfaces = [ "ve-*" ];
|
|
externalInterface = "eno1";
|
|
enableIPv6 = true;
|
|
};
|
|
firewall.trustedInterfaces = [ "ve-*" ];
|
|
};
|
|
|
|
# mathesar
|
|
# services.mathesar.secretKey = "mImvhwyu0cFmtUNOAyOjm6qozWjEmHyrGIpOTZXWW7lnkj5RP3";
|
|
|
|
containers.wasabi = {
|
|
ephemeral = true;
|
|
autoStart = true;
|
|
privateNetwork = true;
|
|
hostAddress = "192.168.100.2";
|
|
localAddress = "192.168.100.11";
|
|
config =
|
|
{ config, pkgs, ... }:
|
|
{
|
|
system.stateVersion = "24.11";
|
|
services.httpd.enable = true;
|
|
services.httpd.adminAddr = "foo@example.org";
|
|
networking.firewall = {
|
|
enable = true;
|
|
allowedTCPPorts = [ 80 ];
|
|
};
|
|
};
|
|
};
|
|
|
|
virtualisation.oci-containers.backend = "docker";
|
|
|
|
security.acme.acceptTerms = true;
|
|
security.acme.defaults.email = "admin@joshuabell.xyz";
|
|
services.nginx = {
|
|
enable = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedProxySettings = true;
|
|
recommendedTlsSettings = true;
|
|
virtualHosts = {
|
|
# "local.belljm.com" = {
|
|
# # enableACME = true;
|
|
# # forceSSL = true;
|
|
# locations."/".proxyPass = "http://${config.containers.wasabi.localAddress}:80";
|
|
# };
|
|
# "127.0.0.1" = {
|
|
# locations."/wasabi/" = {
|
|
# extraConfig = ''
|
|
# rewrite ^/wasabi/(.*) /$1 break;
|
|
# '';
|
|
# proxyPass = "http://${config.containers.wasabi.localAddress}:80/";
|
|
# };
|
|
# locations."/" = {
|
|
# return = "404"; # or 444 for drop
|
|
# };
|
|
# };
|
|
"_" = {
|
|
default = true;
|
|
locations."/" = {
|
|
return = "404"; # or 444 for drop
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [
|
|
80
|
|
443
|
|
];
|
|
};
|
|
}
|