feat: working on sharing server

This commit is contained in:
Nick 2025-11-25 13:01:51 -06:00
parent e63236cfcc
commit 4a83e1702e
4 changed files with 45 additions and 28 deletions

View file

@ -28,6 +28,9 @@ in
"torrent"
"p2p"
];
ports = {
port0 = 3030;
};
interface = {
id = "vm-${name}";
mac = "02:00:00:00:56:07";

View file

@ -13,14 +13,11 @@ in
ivpn
network
ollamaMars
# plasma
plymouth
# sddm
tuios
wireguard
microvm
defenseio
# midnight
;
};
};
@ -36,7 +33,6 @@ in
wireguard
microvm
defenseio
# midnight
;
};
};
@ -46,7 +42,6 @@ in
inherit (modules)
microvm
defenseio
# midnight
;
};
};
@ -58,6 +53,7 @@ in
caddy
ceresOpenCloud
comfyui
defenseio
firefly-iii
forgejo
jellyfin
@ -67,10 +63,10 @@ in
projectSite
restic
sambaCeres
torrent
vaultwarden
website
zookeeper
defenseio
;
};
};
@ -82,8 +78,6 @@ in
caddy
logrotate
microvm
# midnight
# opencloud
sambaEris
postgresEris
defenseio

View file

@ -1,16 +1,19 @@
{
config,
flake,
pkgs,
...
}:
let
inherit (flake.config.people) user0;
inherit (flake.config.services) instances;
serviceCfg = instances.torrent;
host = instances.torrent;
host = instances.torrent.domains.url0;
dns0 = instances.web.dns.provider0;
dns0Path = "dns/${dns0}";
in
{
microvm.vms.${serviceCfg.name} = {
autostart = true;
config = {
@ -18,7 +21,10 @@ in
networking.firewall.allowedTCPPorts = [
22
80
serviceCfg.ports.port0
];
imports = [
./rqbit.nix
];
services = {
@ -42,13 +48,14 @@ in
network = {
enable = true;
networks."10-enp" = {
matchConfig.Name = "enp0s5";
matchConfig.Name = "enp0s4";
addresses = [ { Address = "${serviceCfg.interface.ip}/24"; } ];
gateway = [ serviceCfg.interface.gate ];
};
};
tmpfiles.rules = [
"d ${serviceCfg.varPaths.path0} 755 ${serviceCfg.name} ${serviceCfg.name} -"
"d ${serviceCfg.varPaths.path0}/downloads 755 ${serviceCfg.name} ${serviceCfg.name} -"
];
};
@ -62,6 +69,18 @@ in
id = serviceCfg.interface.id;
mac = serviceCfg.interface.mac;
}
{
type = "user";
id = serviceCfg.interface.idUser;
mac = serviceCfg.interface.macUser;
}
];
forwardPorts = [
{
from = "host";
host.port = serviceCfg.interface.ssh;
guest.port = 22;
}
];
shares = [
@ -77,13 +96,12 @@ in
source = serviceCfg.mntPaths.path0;
tag = "${serviceCfg.name}_data";
}
{
mountPoint = "/run/secrets";
proto = "virtiofs";
source = "/run/secrets/${serviceCfg.name}";
tag = "host_secrets";
}
# {
# mountPoint = "/run/secrets";
# proto = "virtiofs";
# source = "/run/secrets/${serviceCfg.name}";
# tag = "host_secrets";
# }
];
};
environment.systemPackages = [ ];
@ -99,9 +117,7 @@ in
{$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
}
reverse_proxy ${serviceCfg.interface.ip}:${toString serviceCfg.ports.port0} {
header_up X-Real-IP {remote_host}
}
reverse_proxy ${serviceCfg.interface.ip}:${toString serviceCfg.ports.port0}
tls ${serviceCfg.ssl.cert} ${serviceCfg.ssl.key}
@ -120,17 +136,21 @@ in
};
};
security.acme.certs.${host} = {
dnsProvider = instances.web.dns.provider1;
environmentFile = config.sops.secrets."dns/${instances.web.dns.provider1}".path;
security.acme.certs."${host}" = {
dnsProvider = dns0;
environmentFile = config.sops.secrets.${dns0Path}.path;
group = "caddy";
};
users.users.caddy.extraGroups = [ "acme" ];
systemd = {
services.caddy = {
serviceConfig = {
EnvironmentFile = config.sops.secrets."caddy/${serviceCfg.name}-auth".path;
};
};
tmpfiles.rules = [
"d ${serviceCfg.mntPaths.path0} 0755 microvm wheel - -"
"d ${serviceCfg.secretPaths.path0}/caddy 755 caddy caddy -"