Signed-off-by: Nikolaos Karaolidis <nick@karaolidis.com>
This commit is contained in:
2025-06-25 23:03:12 +01:00
parent b9d57d2d58
commit aca10fdc66
12 changed files with 420 additions and 425 deletions

View File

@@ -97,16 +97,10 @@ in
"downloads-button" "downloads-button"
"privatebrowsing-button" "privatebrowsing-button"
]; ];
"toolbar-menubar" = [ "toolbar-menubar" = [ "menubar-items" ];
"menubar-items"
];
"TabsToolbar" = [ ]; "TabsToolbar" = [ ];
"vertical-tabs" = [ "vertical-tabs" = [ "tabbrowser-tabs" ];
"tabbrowser-tabs" "PersonalToolbar" = [ "personal-bookmarks" ];
];
"PersonalToolbar" = [
"personal-bookmarks"
];
}; };
"seen" = [ "seen" = [
"wayback_machine_mozilla_org-browser-action" "wayback_machine_mozilla_org-browser-action"

View File

@@ -13,8 +13,6 @@
let let
selfPkgs = inputs.self.packages.${system}; selfPkgs = inputs.self.packages.${system};
hmConfig = config.home-manager.users.${user}; hmConfig = config.home-manager.users.${user};
inherit (hmConfig.virtualisation.quadlet) containers volumes networks;
autheliaClientId = "I2ZYDFGWP1bzfiauXe94IaiReZF6SqoEskSp6phoL2L8l16Cq7YX3Vr4pkQOSYfNDOwuFjTRIpqQ8eAqK0M93NeEgpr8YoPhKHyR";
podman = lib.meta.getExe pkgs.podman; podman = lib.meta.getExe pkgs.podman;
podmanAsUser = "${config.security.wrapperDir}/git-sudo -u ${user} ${podman}"; podmanAsUser = "${config.security.wrapperDir}/git-sudo -u ${user} ${podman}";
in in
@@ -65,7 +63,12 @@ in
AuthorizedKeysCommand ${podmanAsUser} exec -i gitea gitea keys -c /etc/gitea/app.ini -e git -u %u -t %t -k %k AuthorizedKeysCommand ${podmanAsUser} exec -i gitea gitea keys -c /etc/gitea/app.ini -e git -u %u -t %t -k %k
''; '';
home-manager.users.${user} = { home-manager.users.${user} =
let
autheliaClientId = "I2ZYDFGWP1bzfiauXe94IaiReZF6SqoEskSp6phoL2L8l16Cq7YX3Vr4pkQOSYfNDOwuFjTRIpqQ8eAqK0M93NeEgpr8YoPhKHyR";
inherit (hmConfig.virtualisation.quadlet) containers volumes networks;
in
{
sops = { sops = {
secrets = { secrets = {
"gitea/postgresql".sopsFile = ../../../../../../secrets/secrets.yaml; "gitea/postgresql".sopsFile = ../../../../../../secrets/secrets.yaml;

View File

@@ -3,14 +3,14 @@
mkdir -p /tmp mkdir -p /tmp
PIPE=$(mktemp -u) PIPE=$(mktemp -u)
mkfifo "$PIPE" mkfifo "$PIPE"
trap 'rm -f "$PIPE"' EXIT
ntfy serve > "$PIPE" 2>&1 & ntfy serve > "$PIPE" 2>&1 &
pid=$! PID=$!
grep -q "INFO Listening on :80\[http\]" < "$PIPE" grep -q "INFO Listening on :80\[http\]" < "$PIPE"
kill "$pid" kill "$PID"
wait "$pid" || true wait "$PID" || true
rm -f "$PIPE"
export NTFY_PASSWORD="$NTFY_ADMIN_PASSWORD" export NTFY_PASSWORD="$NTFY_ADMIN_PASSWORD"
ntfy user add "$NTFY_ADMIN_USER" || true ntfy user add "$NTFY_ADMIN_USER" || true

View File

@@ -14,11 +14,11 @@ let
selfPkgs = inputs.self.packages.${system}; selfPkgs = inputs.self.packages.${system};
hmConfig = config.home-manager.users.${user}; hmConfig = config.home-manager.users.${user};
jupiterVpsConfig = inputs.self.nixosConfigurations.jupiter-vps.config; jupiterVpsConfig = inputs.self.nixosConfigurations.jupiter-vps.config;
inherit (hmConfig.virtualisation.quadlet) volumes containers networks;
in in
{ {
boot.kernelParams = [ "psi=1" ]; boot.kernelParams = [ "psi=1" ];
# TODO: Secure with unix sockets
# The below containers all need to run as root to collect host metrics. # The below containers all need to run as root to collect host metrics.
virtualisation.quadlet.containers = { virtualisation.quadlet.containers = {
prometheus-node-exporter.containerConfig = { prometheus-node-exporter.containerConfig = {
@@ -78,7 +78,11 @@ in
}; };
}; };
home-manager.users.${user} = { home-manager.users.${user} =
let
inherit (hmConfig.virtualisation.quadlet) volumes containers networks;
in
{
virtualisation.quadlet = { virtualisation.quadlet = {
networks = { networks = {
prometheus.networkConfig.internal = true; prometheus.networkConfig.internal = true;

View File

@@ -37,7 +37,7 @@ in
virtualisation.quadlet = { virtualisation.quadlet = {
networks.traefik = { }; networks.traefik = { };
volumes.letsencrypt = { }; volumes.traefik = { };
containers = { containers = {
traefik = { traefik = {
@@ -53,9 +53,11 @@ in
in in
[ [
"/run/user/${uid}/podman/podman.sock:/var/run/docker.sock" "/run/user/${uid}/podman/podman.sock:/var/run/docker.sock"
"${volumes.letsencrypt.ref}:/letsencrypt" "${volumes.traefik.ref}:/var/lib/traefik"
]; ];
exec = [ exec = [
"--experimental.fastProxy"
"--api.dashboard=true" "--api.dashboard=true"
"--api.disabledashboardad=true" "--api.disabledashboardad=true"
@@ -86,7 +88,7 @@ in
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true" "--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare" "--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
"--certificatesresolvers.letsencrypt.acme.email=nick@karaolidis.com" "--certificatesresolvers.letsencrypt.acme.email=nick@karaolidis.com"
"--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json" "--certificatesresolvers.letsencrypt.acme.storage=/var/lib/traefik/acme.json"
"--metrics.prometheus=true" "--metrics.prometheus=true"
]; ];
@@ -178,7 +180,7 @@ in
}; };
Install = { Install = {
WantedBy = [ "sockets.target" ]; WantedBy = [ "default.target" ];
}; };
}; };
@@ -190,7 +192,7 @@ in
}; };
Install = { Install = {
WantedBy = [ "sockets.target" ]; WantedBy = [ "default.target" ];
}; };
}; };
}; };

View File

@@ -26,7 +26,7 @@ pkgs.dockerTools.buildImage {
}; };
runAsRoot = '' runAsRoot = ''
mkdir -p /var/lib/mysql /run/mysqld mkdir -p /run/mysqld
''; '';
config = { config = {

View File

@@ -13,7 +13,7 @@ if [ ! -f "$DATADIR/mysql_upgrade_info" ]; then
mariadb-install-db --datadir="$DATADIR" --skip-test-db mariadb-install-db --datadir="$DATADIR" --skip-test-db
mariadbd --user=root --datadir="$DATADIR" --skip-networking --skip-grant-tables & mariadbd --user=root --datadir="$DATADIR" --skip-networking --skip-grant-tables &
pid="$!" PID="$!"
while ! mariadb --protocol=socket -e " while ! mariadb --protocol=socket -e "
FLUSH PRIVILEGES; FLUSH PRIVILEGES;
@@ -28,12 +28,12 @@ if [ ! -f "$DATADIR/mysql_upgrade_info" ]; then
sleep 0.1 sleep 0.1
done done
kill -QUIT "$pid" kill -QUIT "$PID"
wait "$pid" || true wait "$PID" || true
fi fi
trap 'kill -QUIT "$pid"' INT trap 'kill -QUIT "$PID"' INT
mariadbd --user=root --datadir="$DATADIR" "$@" & mariadbd --user=root --datadir="$DATADIR" "$@" &
pid=$! PID=$!
wait "$pid" wait "$PID"
exit $? exit $?

View File

@@ -65,20 +65,20 @@ cron
PHPRC="$(dirname "$(readlink -f "$(which php)")")/../lib/php.ini" PHPRC="$(dirname "$(readlink -f "$(which php)")")/../lib/php.ini"
export PHPRC export PHPRC
pidfile=$(mktemp) PIDFILE=$(mktemp)
# shellcheck disable=SC2016 # shellcheck disable=SC2016
setsid sh -c ' setsid sh -c '
echo "$$" > "$1" echo "$$" > "$1"
shift shift
exec httpd "$@" exec httpd "$@"
' _ "$pidfile" "$@" & ' _ "$PIDFILE" "$@" &
until [ -s "$pidfile" ]; do sleep 0.01; done until [ -s "$PIDFILE" ]; do sleep 0.01; done
pid=$(cat "$pidfile") PID=$(cat "$PIDFILE")
rm "$pidfile" rm "$PIDFILE"
trap 'kill -INT "$pid"' INT trap 'kill -INT "$PID"' INT
wait "$pid" wait "$PID"
exit $? exit $?

View File

@@ -30,7 +30,7 @@ pkgs.dockerTools.buildImage {
runAsRoot = '' runAsRoot = ''
${pkgs.dockerTools.shadowSetup} ${pkgs.dockerTools.shadowSetup}
mkdir -p /etc/postgresql /var/lib/postgresql /run/postgresql mkdir -p /etc/postgresql /run/postgresql
cp ${postgresql}/share/postgresql/postgresql.conf.sample /etc/postgresql/postgresql.conf cp ${postgresql}/share/postgresql/postgresql.conf.sample /etc/postgresql/postgresql.conf
${pkgs.gnused}/bin/sed -ri "s!^#?(listen_addresses)\s*=\s*\S+.*!\1 = '*'!" /etc/postgresql/postgresql.conf ${pkgs.gnused}/bin/sed -ri "s!^#?(listen_addresses)\s*=\s*\S+.*!\1 = '*'!" /etc/postgresql/postgresql.conf
''; '';

View File

@@ -21,7 +21,6 @@ mkfifo "$LOG_PIPE"
fi fi
done < "$LOG_PIPE" done < "$LOG_PIPE"
) & ) &
LOG_PID=$!
if [ ! -s "$PGDATA/PG_VERSION" ]; then if [ ! -s "$PGDATA/PG_VERSION" ]; then
tmpfile=$(mktemp) tmpfile=$(mktemp)
@@ -42,5 +41,4 @@ if [ ! -s "$PGDATA/PG_VERSION" ]; then
pg_ctl -m fast -w stop pg_ctl -m fast -w stop
fi fi
trap 'kill $LOG_PID' EXIT
exec postgres -c config_file="/etc/postgresql/postgresql.conf" "$@" > "$LOG_PIPE" 2>&1 exec postgres -c config_file="/etc/postgresql/postgresql.conf" "$@" > "$LOG_PIPE" 2>&1

View File

@@ -16,8 +16,5 @@ mkfifo "$LOG_PIPE"
fi fi
done < "$LOG_PIPE" done < "$LOG_PIPE"
) & ) &
LOG_PID=$!
trap 'kill $LOG_PID' EXIT
exec prometheus-fail2ban-exporter "$@" > "$LOG_PIPE" 2>&1 exec prometheus-fail2ban-exporter "$@" > "$LOG_PIPE" 2>&1

View File

@@ -16,8 +16,5 @@ mkfifo "$LOG_PIPE"
fi fi
done < "$LOG_PIPE" done < "$LOG_PIPE"
) & ) &
LOG_PID=$!
trap 'kill $LOG_PID' EXIT
exec prometheus-podman-exporter "$@" > "$LOG_PIPE" 2>&1 exec prometheus-podman-exporter "$@" > "$LOG_PIPE" 2>&1