@@ -97,16 +97,10 @@ in
|
|||||||
"downloads-button"
|
"downloads-button"
|
||||||
"privatebrowsing-button"
|
"privatebrowsing-button"
|
||||||
];
|
];
|
||||||
"toolbar-menubar" = [
|
"toolbar-menubar" = [ "menubar-items" ];
|
||||||
"menubar-items"
|
|
||||||
];
|
|
||||||
"TabsToolbar" = [ ];
|
"TabsToolbar" = [ ];
|
||||||
"vertical-tabs" = [
|
"vertical-tabs" = [ "tabbrowser-tabs" ];
|
||||||
"tabbrowser-tabs"
|
"PersonalToolbar" = [ "personal-bookmarks" ];
|
||||||
];
|
|
||||||
"PersonalToolbar" = [
|
|
||||||
"personal-bookmarks"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
"seen" = [
|
"seen" = [
|
||||||
"wayback_machine_mozilla_org-browser-action"
|
"wayback_machine_mozilla_org-browser-action"
|
||||||
|
@@ -13,8 +13,6 @@
|
|||||||
let
|
let
|
||||||
selfPkgs = inputs.self.packages.${system};
|
selfPkgs = inputs.self.packages.${system};
|
||||||
hmConfig = config.home-manager.users.${user};
|
hmConfig = config.home-manager.users.${user};
|
||||||
inherit (hmConfig.virtualisation.quadlet) containers volumes networks;
|
|
||||||
autheliaClientId = "I2ZYDFGWP1bzfiauXe94IaiReZF6SqoEskSp6phoL2L8l16Cq7YX3Vr4pkQOSYfNDOwuFjTRIpqQ8eAqK0M93NeEgpr8YoPhKHyR";
|
|
||||||
podman = lib.meta.getExe pkgs.podman;
|
podman = lib.meta.getExe pkgs.podman;
|
||||||
podmanAsUser = "${config.security.wrapperDir}/git-sudo -u ${user} ${podman}";
|
podmanAsUser = "${config.security.wrapperDir}/git-sudo -u ${user} ${podman}";
|
||||||
in
|
in
|
||||||
@@ -65,7 +63,12 @@ in
|
|||||||
AuthorizedKeysCommand ${podmanAsUser} exec -i gitea gitea keys -c /etc/gitea/app.ini -e git -u %u -t %t -k %k
|
AuthorizedKeysCommand ${podmanAsUser} exec -i gitea gitea keys -c /etc/gitea/app.ini -e git -u %u -t %t -k %k
|
||||||
'';
|
'';
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} =
|
||||||
|
let
|
||||||
|
autheliaClientId = "I2ZYDFGWP1bzfiauXe94IaiReZF6SqoEskSp6phoL2L8l16Cq7YX3Vr4pkQOSYfNDOwuFjTRIpqQ8eAqK0M93NeEgpr8YoPhKHyR";
|
||||||
|
inherit (hmConfig.virtualisation.quadlet) containers volumes networks;
|
||||||
|
in
|
||||||
|
{
|
||||||
sops = {
|
sops = {
|
||||||
secrets = {
|
secrets = {
|
||||||
"gitea/postgresql".sopsFile = ../../../../../../secrets/secrets.yaml;
|
"gitea/postgresql".sopsFile = ../../../../../../secrets/secrets.yaml;
|
||||||
|
@@ -3,14 +3,14 @@
|
|||||||
mkdir -p /tmp
|
mkdir -p /tmp
|
||||||
PIPE=$(mktemp -u)
|
PIPE=$(mktemp -u)
|
||||||
mkfifo "$PIPE"
|
mkfifo "$PIPE"
|
||||||
trap 'rm -f "$PIPE"' EXIT
|
|
||||||
|
|
||||||
ntfy serve > "$PIPE" 2>&1 &
|
ntfy serve > "$PIPE" 2>&1 &
|
||||||
|
|
||||||
pid=$!
|
PID=$!
|
||||||
grep -q "INFO Listening on :80\[http\]" < "$PIPE"
|
grep -q "INFO Listening on :80\[http\]" < "$PIPE"
|
||||||
kill "$pid"
|
kill "$PID"
|
||||||
wait "$pid" || true
|
wait "$PID" || true
|
||||||
|
rm -f "$PIPE"
|
||||||
|
|
||||||
export NTFY_PASSWORD="$NTFY_ADMIN_PASSWORD"
|
export NTFY_PASSWORD="$NTFY_ADMIN_PASSWORD"
|
||||||
ntfy user add "$NTFY_ADMIN_USER" || true
|
ntfy user add "$NTFY_ADMIN_USER" || true
|
||||||
|
@@ -14,11 +14,11 @@ let
|
|||||||
selfPkgs = inputs.self.packages.${system};
|
selfPkgs = inputs.self.packages.${system};
|
||||||
hmConfig = config.home-manager.users.${user};
|
hmConfig = config.home-manager.users.${user};
|
||||||
jupiterVpsConfig = inputs.self.nixosConfigurations.jupiter-vps.config;
|
jupiterVpsConfig = inputs.self.nixosConfigurations.jupiter-vps.config;
|
||||||
inherit (hmConfig.virtualisation.quadlet) volumes containers networks;
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
boot.kernelParams = [ "psi=1" ];
|
boot.kernelParams = [ "psi=1" ];
|
||||||
|
|
||||||
|
# TODO: Secure with unix sockets
|
||||||
# The below containers all need to run as root to collect host metrics.
|
# The below containers all need to run as root to collect host metrics.
|
||||||
virtualisation.quadlet.containers = {
|
virtualisation.quadlet.containers = {
|
||||||
prometheus-node-exporter.containerConfig = {
|
prometheus-node-exporter.containerConfig = {
|
||||||
@@ -78,7 +78,11 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} =
|
||||||
|
let
|
||||||
|
inherit (hmConfig.virtualisation.quadlet) volumes containers networks;
|
||||||
|
in
|
||||||
|
{
|
||||||
virtualisation.quadlet = {
|
virtualisation.quadlet = {
|
||||||
networks = {
|
networks = {
|
||||||
prometheus.networkConfig.internal = true;
|
prometheus.networkConfig.internal = true;
|
||||||
|
@@ -37,7 +37,7 @@ in
|
|||||||
virtualisation.quadlet = {
|
virtualisation.quadlet = {
|
||||||
networks.traefik = { };
|
networks.traefik = { };
|
||||||
|
|
||||||
volumes.letsencrypt = { };
|
volumes.traefik = { };
|
||||||
|
|
||||||
containers = {
|
containers = {
|
||||||
traefik = {
|
traefik = {
|
||||||
@@ -53,9 +53,11 @@ in
|
|||||||
in
|
in
|
||||||
[
|
[
|
||||||
"/run/user/${uid}/podman/podman.sock:/var/run/docker.sock"
|
"/run/user/${uid}/podman/podman.sock:/var/run/docker.sock"
|
||||||
"${volumes.letsencrypt.ref}:/letsencrypt"
|
"${volumes.traefik.ref}:/var/lib/traefik"
|
||||||
];
|
];
|
||||||
exec = [
|
exec = [
|
||||||
|
"--experimental.fastProxy"
|
||||||
|
|
||||||
"--api.dashboard=true"
|
"--api.dashboard=true"
|
||||||
"--api.disabledashboardad=true"
|
"--api.disabledashboardad=true"
|
||||||
|
|
||||||
@@ -86,7 +88,7 @@ in
|
|||||||
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
|
||||||
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
|
||||||
"--certificatesresolvers.letsencrypt.acme.email=nick@karaolidis.com"
|
"--certificatesresolvers.letsencrypt.acme.email=nick@karaolidis.com"
|
||||||
"--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json"
|
"--certificatesresolvers.letsencrypt.acme.storage=/var/lib/traefik/acme.json"
|
||||||
|
|
||||||
"--metrics.prometheus=true"
|
"--metrics.prometheus=true"
|
||||||
];
|
];
|
||||||
@@ -178,7 +180,7 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
Install = {
|
Install = {
|
||||||
WantedBy = [ "sockets.target" ];
|
WantedBy = [ "default.target" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -190,7 +192,7 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
Install = {
|
Install = {
|
||||||
WantedBy = [ "sockets.target" ];
|
WantedBy = [ "default.target" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@@ -26,7 +26,7 @@ pkgs.dockerTools.buildImage {
|
|||||||
};
|
};
|
||||||
|
|
||||||
runAsRoot = ''
|
runAsRoot = ''
|
||||||
mkdir -p /var/lib/mysql /run/mysqld
|
mkdir -p /run/mysqld
|
||||||
'';
|
'';
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
|
@@ -13,7 +13,7 @@ if [ ! -f "$DATADIR/mysql_upgrade_info" ]; then
|
|||||||
mariadb-install-db --datadir="$DATADIR" --skip-test-db
|
mariadb-install-db --datadir="$DATADIR" --skip-test-db
|
||||||
|
|
||||||
mariadbd --user=root --datadir="$DATADIR" --skip-networking --skip-grant-tables &
|
mariadbd --user=root --datadir="$DATADIR" --skip-networking --skip-grant-tables &
|
||||||
pid="$!"
|
PID="$!"
|
||||||
|
|
||||||
while ! mariadb --protocol=socket -e "
|
while ! mariadb --protocol=socket -e "
|
||||||
FLUSH PRIVILEGES;
|
FLUSH PRIVILEGES;
|
||||||
@@ -28,12 +28,12 @@ if [ ! -f "$DATADIR/mysql_upgrade_info" ]; then
|
|||||||
sleep 0.1
|
sleep 0.1
|
||||||
done
|
done
|
||||||
|
|
||||||
kill -QUIT "$pid"
|
kill -QUIT "$PID"
|
||||||
wait "$pid" || true
|
wait "$PID" || true
|
||||||
fi
|
fi
|
||||||
|
|
||||||
trap 'kill -QUIT "$pid"' INT
|
trap 'kill -QUIT "$PID"' INT
|
||||||
mariadbd --user=root --datadir="$DATADIR" "$@" &
|
mariadbd --user=root --datadir="$DATADIR" "$@" &
|
||||||
pid=$!
|
PID=$!
|
||||||
wait "$pid"
|
wait "$PID"
|
||||||
exit $?
|
exit $?
|
||||||
|
@@ -65,20 +65,20 @@ cron
|
|||||||
PHPRC="$(dirname "$(readlink -f "$(which php)")")/../lib/php.ini"
|
PHPRC="$(dirname "$(readlink -f "$(which php)")")/../lib/php.ini"
|
||||||
export PHPRC
|
export PHPRC
|
||||||
|
|
||||||
pidfile=$(mktemp)
|
PIDFILE=$(mktemp)
|
||||||
|
|
||||||
# shellcheck disable=SC2016
|
# shellcheck disable=SC2016
|
||||||
setsid sh -c '
|
setsid sh -c '
|
||||||
echo "$$" > "$1"
|
echo "$$" > "$1"
|
||||||
shift
|
shift
|
||||||
exec httpd "$@"
|
exec httpd "$@"
|
||||||
' _ "$pidfile" "$@" &
|
' _ "$PIDFILE" "$@" &
|
||||||
|
|
||||||
until [ -s "$pidfile" ]; do sleep 0.01; done
|
until [ -s "$PIDFILE" ]; do sleep 0.01; done
|
||||||
|
|
||||||
pid=$(cat "$pidfile")
|
PID=$(cat "$PIDFILE")
|
||||||
rm "$pidfile"
|
rm "$PIDFILE"
|
||||||
|
|
||||||
trap 'kill -INT "$pid"' INT
|
trap 'kill -INT "$PID"' INT
|
||||||
wait "$pid"
|
wait "$PID"
|
||||||
exit $?
|
exit $?
|
||||||
|
@@ -30,7 +30,7 @@ pkgs.dockerTools.buildImage {
|
|||||||
|
|
||||||
runAsRoot = ''
|
runAsRoot = ''
|
||||||
${pkgs.dockerTools.shadowSetup}
|
${pkgs.dockerTools.shadowSetup}
|
||||||
mkdir -p /etc/postgresql /var/lib/postgresql /run/postgresql
|
mkdir -p /etc/postgresql /run/postgresql
|
||||||
cp ${postgresql}/share/postgresql/postgresql.conf.sample /etc/postgresql/postgresql.conf
|
cp ${postgresql}/share/postgresql/postgresql.conf.sample /etc/postgresql/postgresql.conf
|
||||||
${pkgs.gnused}/bin/sed -ri "s!^#?(listen_addresses)\s*=\s*\S+.*!\1 = '*'!" /etc/postgresql/postgresql.conf
|
${pkgs.gnused}/bin/sed -ri "s!^#?(listen_addresses)\s*=\s*\S+.*!\1 = '*'!" /etc/postgresql/postgresql.conf
|
||||||
'';
|
'';
|
||||||
|
@@ -21,7 +21,6 @@ mkfifo "$LOG_PIPE"
|
|||||||
fi
|
fi
|
||||||
done < "$LOG_PIPE"
|
done < "$LOG_PIPE"
|
||||||
) &
|
) &
|
||||||
LOG_PID=$!
|
|
||||||
|
|
||||||
if [ ! -s "$PGDATA/PG_VERSION" ]; then
|
if [ ! -s "$PGDATA/PG_VERSION" ]; then
|
||||||
tmpfile=$(mktemp)
|
tmpfile=$(mktemp)
|
||||||
@@ -42,5 +41,4 @@ if [ ! -s "$PGDATA/PG_VERSION" ]; then
|
|||||||
pg_ctl -m fast -w stop
|
pg_ctl -m fast -w stop
|
||||||
fi
|
fi
|
||||||
|
|
||||||
trap 'kill $LOG_PID' EXIT
|
|
||||||
exec postgres -c config_file="/etc/postgresql/postgresql.conf" "$@" > "$LOG_PIPE" 2>&1
|
exec postgres -c config_file="/etc/postgresql/postgresql.conf" "$@" > "$LOG_PIPE" 2>&1
|
||||||
|
@@ -16,8 +16,5 @@ mkfifo "$LOG_PIPE"
|
|||||||
fi
|
fi
|
||||||
done < "$LOG_PIPE"
|
done < "$LOG_PIPE"
|
||||||
) &
|
) &
|
||||||
LOG_PID=$!
|
|
||||||
|
|
||||||
trap 'kill $LOG_PID' EXIT
|
|
||||||
|
|
||||||
exec prometheus-fail2ban-exporter "$@" > "$LOG_PIPE" 2>&1
|
exec prometheus-fail2ban-exporter "$@" > "$LOG_PIPE" 2>&1
|
||||||
|
@@ -16,8 +16,5 @@ mkfifo "$LOG_PIPE"
|
|||||||
fi
|
fi
|
||||||
done < "$LOG_PIPE"
|
done < "$LOG_PIPE"
|
||||||
) &
|
) &
|
||||||
LOG_PID=$!
|
|
||||||
|
|
||||||
trap 'kill $LOG_PID' EXIT
|
|
||||||
|
|
||||||
exec prometheus-podman-exporter "$@" > "$LOG_PIPE" 2>&1
|
exec prometheus-podman-exporter "$@" > "$LOG_PIPE" 2>&1
|
||||||
|
Reference in New Issue
Block a user