Compare commits
3 Commits
723da71a35
...
7318c0e094
| Author | SHA1 | Date | |
|---|---|---|---|
| 7318c0e094 | |||
| 449dc22173 | |||
| 210768d538 |
@@ -12,6 +12,7 @@
|
||||
oh-my-zsh
|
||||
];
|
||||
};
|
||||
imports = [../../packages/rust-motd/rust-motd.kdl];
|
||||
xdg.configFile."starship.toml".source = ./packages/starship/starship.toml;
|
||||
# programs.bash.initExtra = [
|
||||
# "zsh"
|
||||
|
||||
28
home/packages/rust-motd/rust-motd.kdl
Normal file
28
home/packages/rust-motd/rust-motd.kdl
Normal file
@@ -0,0 +1,28 @@
|
||||
global {
|
||||
version "1.0"
|
||||
}
|
||||
components{
|
||||
command color="blue" "hostname | figlet -f sblood"
|
||||
weather loc="Denver" style="full"
|
||||
service-status{
|
||||
service display-name="samba" unit="samba-wsdd.service"
|
||||
service display-name="openssh" unit="sshd.service"
|
||||
service display-name="mealie" unit="podman-mealie.service"
|
||||
service display-name="mealiedb" unit="podman-postgres.service"
|
||||
service display-name="stirling" unit="podman-stirling-pdf.service"
|
||||
service display-name="tbrowser" unit="podman-torrent-browser.service"
|
||||
service display-name="seas" unit="podman-trainsmission-openvpn.service"
|
||||
service display-name="tailscale" unit="tailscaled.service"
|
||||
service display-name="firewall" unit="firewall.service"
|
||||
service display-name="endlessh" unit="endlessh.service"
|
||||
}
|
||||
uptime prefix="up"
|
||||
memory swap-pos="beside"
|
||||
last-login {
|
||||
user username="marcel" num-logins=2
|
||||
}
|
||||
filesystems {
|
||||
filesystem name="root" mount-point="/"
|
||||
}
|
||||
load-avg format="Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}"
|
||||
}
|
||||
@@ -13,12 +13,13 @@
|
||||
../services/samba.nix
|
||||
../services/openssh.nix
|
||||
../services/endlessh.nix
|
||||
../services/podman.nix
|
||||
# ./services/currents.nix
|
||||
#. ./services/tailscale.nix.
|
||||
|
||||
# ./services/containerization/currents.nix
|
||||
../services/containerization/docker.nix
|
||||
../services/containerization/mealie.nix
|
||||
../services/containerization/mealie-2.nix
|
||||
../services/containerization/transtun.nix
|
||||
../services/containerization/stirlingpdf.nix
|
||||
];
|
||||
@@ -127,9 +128,6 @@
|
||||
# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
|
||||
# wget
|
||||
];
|
||||
virtualisation.podman = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
# Some programs need SUID wrappers, can be configured further or are
|
||||
# started in user sessions.
|
||||
|
||||
@@ -3,55 +3,55 @@
|
||||
environment.systemPackages = with pkgs; [figlet];
|
||||
programs.rust-motd = {
|
||||
enable = true;
|
||||
order = [
|
||||
"global"
|
||||
"banner"
|
||||
"weather"
|
||||
"uptime"
|
||||
"last_login"
|
||||
"memory"
|
||||
"service_status"
|
||||
"filesystems"
|
||||
"load_avg"
|
||||
];
|
||||
settings = {
|
||||
global = {
|
||||
version = "1.0";
|
||||
};
|
||||
banner = {
|
||||
color = "blue";
|
||||
command = "hostname | figlet -f sblood";
|
||||
};
|
||||
weather = {
|
||||
loc = "Denver,Colorado";
|
||||
style = "full";
|
||||
};
|
||||
service_status = {
|
||||
samba = "samba-wsdd.service";
|
||||
openssh = "sshd.service";
|
||||
mealie = "podman-postgres-mealie.service";
|
||||
stirling = "podman-stirling-pdf.service";
|
||||
tbrowser = "podman-torrent-browser.service";
|
||||
seas = "podman-transmission-openvpn.service";
|
||||
tailscale = "tailscaled.service";
|
||||
firewall = "firewall.service";
|
||||
endlessh = "endlessh.service";
|
||||
};
|
||||
uptime = {
|
||||
prefix = "up";
|
||||
};
|
||||
memory = {
|
||||
swap_pos = "beside";
|
||||
};
|
||||
last_login = {
|
||||
autumn = 2;
|
||||
};
|
||||
filesystems = {
|
||||
root = "/";
|
||||
};
|
||||
load_avg = {
|
||||
format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}";
|
||||
};
|
||||
};
|
||||
# order = [
|
||||
# "global"
|
||||
# "banner"
|
||||
# "weather"
|
||||
# "uptime"
|
||||
# "last_login"
|
||||
# "memory"
|
||||
# "service_status"
|
||||
# "filesystems"
|
||||
# "load_avg"
|
||||
# ];
|
||||
# settings = {
|
||||
# global = {
|
||||
# version = "1.0";
|
||||
# };
|
||||
# banner = {
|
||||
# color = "blue";
|
||||
# command = "hostname | figlet -f sblood";
|
||||
# };
|
||||
# weather = {
|
||||
# loc = "Denver,Colorado";
|
||||
# style = "full";
|
||||
# };
|
||||
# service_status = {
|
||||
# samba = "samba-wsdd.service";
|
||||
# openssh = "sshd.service";
|
||||
# mealie = "podman-postgres-mealie.service";
|
||||
# stirling = "podman-stirling-pdf.service";
|
||||
# tbrowser = "podman-torrent-browser.service";
|
||||
# seas = "podman-transmission-openvpn.service";
|
||||
# tailscale = "tailscaled.service";
|
||||
# firewall = "firewall.service";
|
||||
# endlessh = "endlessh.service";
|
||||
# };
|
||||
# uptime = {
|
||||
# prefix = "up";
|
||||
# };
|
||||
# memory = {
|
||||
# swap_pos = "beside";
|
||||
# };
|
||||
# last_login = {
|
||||
# autumn = 2;
|
||||
# };
|
||||
# filesystems = {
|
||||
# root = "/";
|
||||
# };
|
||||
# load_avg = {
|
||||
# format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}";
|
||||
# };
|
||||
# };
|
||||
};
|
||||
}
|
||||
|
||||
148
system/services/containerization/mealie-2.nix
Normal file
148
system/services/containerization/mealie-2.nix
Normal file
@@ -0,0 +1,148 @@
|
||||
# Auto-generated by compose2nix.
|
||||
|
||||
{ pkgs, lib, config, ... }:
|
||||
|
||||
{
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."mealie" = {
|
||||
image = "ghcr.io/mealie-recipes/mealie:v3.6.1";
|
||||
environment = {
|
||||
"ALLOW_SIGNUP" = "false";
|
||||
"BASE_URL" = "https://mealie.yourdomain.com";
|
||||
"DB_ENGINE" = "postgres";
|
||||
"PGID" = "1000";
|
||||
"POSTGRES_DB" = "mealie";
|
||||
"POSTGRES_PASSWORD" = "mealie";
|
||||
"POSTGRES_PORT" = "5432";
|
||||
"POSTGRES_SERVER" = "postgres";
|
||||
"POSTGRES_USER" = "mealie";
|
||||
"PUID" = "1000";
|
||||
"TZ" = "America/Anchorage";
|
||||
};
|
||||
volumes = [
|
||||
"mealieio_mealie-data:/app/data:rw"
|
||||
];
|
||||
ports = [
|
||||
"9925:9000/tcp"
|
||||
];
|
||||
dependsOn = [
|
||||
"postgres"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--memory=1048576000b"
|
||||
"--network-alias=mealie"
|
||||
"--network=mealieio_default"
|
||||
];
|
||||
};
|
||||
systemd.services."podman-mealie" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
};
|
||||
after = [
|
||||
"podman-network-mealieio_default.service"
|
||||
"podman-volume-mealieio_mealie-data.service"
|
||||
];
|
||||
requires = [
|
||||
"podman-network-mealieio_default.service"
|
||||
"podman-volume-mealieio_mealie-data.service"
|
||||
];
|
||||
partOf = [
|
||||
"podman-compose-mealieio-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"podman-compose-mealieio-root.target"
|
||||
];
|
||||
};
|
||||
virtualisation.oci-containers.containers."postgres" = {
|
||||
image = "postgres:17";
|
||||
environment = {
|
||||
"PGUSER" = "mealie";
|
||||
"POSTGRES_DB" = "mealie";
|
||||
"POSTGRES_PASSWORD" = "mealie";
|
||||
"POSTGRES_USER" = "mealie";
|
||||
};
|
||||
volumes = [
|
||||
"mealieio_mealie-pgdata:/var/lib/postgresql/data:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--health-cmd=[\"pg_isready\"]"
|
||||
"--health-interval=30s"
|
||||
"--health-retries=3"
|
||||
"--health-timeout=20s"
|
||||
"--network-alias=postgres"
|
||||
"--network=mealieio_default"
|
||||
];
|
||||
};
|
||||
systemd.services."podman-postgres" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
};
|
||||
after = [
|
||||
"podman-network-mealieio_default.service"
|
||||
"podman-volume-mealieio_mealie-pgdata.service"
|
||||
];
|
||||
requires = [
|
||||
"podman-network-mealieio_default.service"
|
||||
"podman-volume-mealieio_mealie-pgdata.service"
|
||||
];
|
||||
partOf = [
|
||||
"podman-compose-mealieio-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"podman-compose-mealieio-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."podman-network-mealieio_default" = {
|
||||
path = [ pkgs.podman ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "podman network rm -f mealieio_default";
|
||||
};
|
||||
script = ''
|
||||
podman network inspect mealieio_default || podman network create mealieio_default
|
||||
'';
|
||||
partOf = [ "podman-compose-mealieio-root.target" ];
|
||||
wantedBy = [ "podman-compose-mealieio-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."podman-volume-mealieio_mealie-data" = {
|
||||
path = [ pkgs.podman ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
podman volume inspect mealieio_mealie-data || podman volume create mealieio_mealie-data
|
||||
'';
|
||||
partOf = [ "podman-compose-mealieio-root.target" ];
|
||||
wantedBy = [ "podman-compose-mealieio-root.target" ];
|
||||
};
|
||||
systemd.services."podman-volume-mealieio_mealie-pgdata" = {
|
||||
path = [ pkgs.podman ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
podman volume inspect mealieio_mealie-pgdata || podman volume create mealieio_mealie-pgdata
|
||||
'';
|
||||
partOf = [ "podman-compose-mealieio-root.target" ];
|
||||
wantedBy = [ "podman-compose-mealieio-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."podman-compose-mealieio-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
||||
20
system/services/podman.nix
Normal file
20
system/services/podman.nix
Normal file
@@ -0,0 +1,20 @@
|
||||
|
||||
{ pkgs, lib, config, ... }:
|
||||
|
||||
{
|
||||
# Runtime
|
||||
virtualisation.podman = {
|
||||
enable = true;
|
||||
autoPrune.enable = true;
|
||||
# dockerCompat = true;
|
||||
};
|
||||
|
||||
# Enable container name DNS for all Podman networks.
|
||||
networking.firewall.interfaces = let
|
||||
matchAll = if !config.networking.nftables.enable then "podman+" else "podman*";
|
||||
in {
|
||||
"${matchAll}".allowedUDPPorts = [ 53 ];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.backend = "podman";
|
||||
}
|
||||
Reference in New Issue
Block a user