Compare commits

..

3 Commits

Author SHA1 Message Date
7318c0e094 Merge branch 'main' of https://git.coven.systems/autumn/nixos-conf
Some checks failed
Test Flake / test_flake (push) Failing after 23s
Test Flake / dry_build (push) Failing after 26s
2025-12-19 08:35:52 -07:00
449dc22173 remove swap from rust-motd 2025-12-19 08:34:29 -07:00
210768d538 fixing mealie via compose2nix 2025-12-08 12:46:15 -07:00
6 changed files with 249 additions and 54 deletions

View File

@@ -12,6 +12,7 @@
oh-my-zsh oh-my-zsh
]; ];
}; };
imports = [../../packages/rust-motd/rust-motd.kdl];
xdg.configFile."starship.toml".source = ./packages/starship/starship.toml; xdg.configFile."starship.toml".source = ./packages/starship/starship.toml;
# programs.bash.initExtra = [ # programs.bash.initExtra = [
# "zsh" # "zsh"

View File

@@ -0,0 +1,28 @@
global {
version "1.0"
}
components{
command color="blue" "hostname | figlet -f sblood"
weather loc="Denver" style="full"
service-status{
service display-name="samba" unit="samba-wsdd.service"
service display-name="openssh" unit="sshd.service"
service display-name="mealie" unit="podman-mealie.service"
service display-name="mealiedb" unit="podman-postgres.service"
service display-name="stirling" unit="podman-stirling-pdf.service"
service display-name="tbrowser" unit="podman-torrent-browser.service"
service display-name="seas" unit="podman-trainsmission-openvpn.service"
service display-name="tailscale" unit="tailscaled.service"
service display-name="firewall" unit="firewall.service"
service display-name="endlessh" unit="endlessh.service"
}
uptime prefix="up"
memory swap-pos="beside"
last-login {
user username="marcel" num-logins=2
}
filesystems {
filesystem name="root" mount-point="/"
}
load-avg format="Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}"
}

View File

@@ -13,12 +13,13 @@
../services/samba.nix ../services/samba.nix
../services/openssh.nix ../services/openssh.nix
../services/endlessh.nix ../services/endlessh.nix
../services/podman.nix
# ./services/currents.nix # ./services/currents.nix
#. ./services/tailscale.nix. #. ./services/tailscale.nix.
# ./services/containerization/currents.nix # ./services/containerization/currents.nix
../services/containerization/docker.nix ../services/containerization/docker.nix
../services/containerization/mealie.nix ../services/containerization/mealie-2.nix
../services/containerization/transtun.nix ../services/containerization/transtun.nix
../services/containerization/stirlingpdf.nix ../services/containerization/stirlingpdf.nix
]; ];
@@ -127,9 +128,6 @@
# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default. # vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
# wget # wget
]; ];
virtualisation.podman = {
enable = true;
};
# Some programs need SUID wrappers, can be configured further or are # Some programs need SUID wrappers, can be configured further or are
# started in user sessions. # started in user sessions.

View File

@@ -3,55 +3,55 @@
environment.systemPackages = with pkgs; [figlet]; environment.systemPackages = with pkgs; [figlet];
programs.rust-motd = { programs.rust-motd = {
enable = true; enable = true;
order = [ # order = [
"global" # "global"
"banner" # "banner"
"weather" # "weather"
"uptime" # "uptime"
"last_login" # "last_login"
"memory" # "memory"
"service_status" # "service_status"
"filesystems" # "filesystems"
"load_avg" # "load_avg"
]; # ];
settings = { # settings = {
global = { # global = {
version = "1.0"; # version = "1.0";
}; # };
banner = { # banner = {
color = "blue"; # color = "blue";
command = "hostname | figlet -f sblood"; # command = "hostname | figlet -f sblood";
}; # };
weather = { # weather = {
loc = "Denver,Colorado"; # loc = "Denver,Colorado";
style = "full"; # style = "full";
}; # };
service_status = { # service_status = {
samba = "samba-wsdd.service"; # samba = "samba-wsdd.service";
openssh = "sshd.service"; # openssh = "sshd.service";
mealie = "podman-postgres-mealie.service"; # mealie = "podman-postgres-mealie.service";
stirling = "podman-stirling-pdf.service"; # stirling = "podman-stirling-pdf.service";
tbrowser = "podman-torrent-browser.service"; # tbrowser = "podman-torrent-browser.service";
seas = "podman-transmission-openvpn.service"; # seas = "podman-transmission-openvpn.service";
tailscale = "tailscaled.service"; # tailscale = "tailscaled.service";
firewall = "firewall.service"; # firewall = "firewall.service";
endlessh = "endlessh.service"; # endlessh = "endlessh.service";
}; # };
uptime = { # uptime = {
prefix = "up"; # prefix = "up";
}; # };
memory = { # memory = {
swap_pos = "beside"; # swap_pos = "beside";
}; # };
last_login = { # last_login = {
autumn = 2; # autumn = 2;
}; # };
filesystems = { # filesystems = {
root = "/"; # root = "/";
}; # };
load_avg = { # load_avg = {
format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}"; # format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}";
}; # };
}; # };
}; };
} }

View File

@@ -0,0 +1,148 @@
# Auto-generated by compose2nix.
{ pkgs, lib, config, ... }:
{
# Containers
virtualisation.oci-containers.containers."mealie" = {
image = "ghcr.io/mealie-recipes/mealie:v3.6.1";
environment = {
"ALLOW_SIGNUP" = "false";
"BASE_URL" = "https://mealie.yourdomain.com";
"DB_ENGINE" = "postgres";
"PGID" = "1000";
"POSTGRES_DB" = "mealie";
"POSTGRES_PASSWORD" = "mealie";
"POSTGRES_PORT" = "5432";
"POSTGRES_SERVER" = "postgres";
"POSTGRES_USER" = "mealie";
"PUID" = "1000";
"TZ" = "America/Anchorage";
};
volumes = [
"mealieio_mealie-data:/app/data:rw"
];
ports = [
"9925:9000/tcp"
];
dependsOn = [
"postgres"
];
log-driver = "journald";
extraOptions = [
"--memory=1048576000b"
"--network-alias=mealie"
"--network=mealieio_default"
];
};
systemd.services."podman-mealie" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
};
after = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-data.service"
];
requires = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-data.service"
];
partOf = [
"podman-compose-mealieio-root.target"
];
wantedBy = [
"podman-compose-mealieio-root.target"
];
};
virtualisation.oci-containers.containers."postgres" = {
image = "postgres:17";
environment = {
"PGUSER" = "mealie";
"POSTGRES_DB" = "mealie";
"POSTGRES_PASSWORD" = "mealie";
"POSTGRES_USER" = "mealie";
};
volumes = [
"mealieio_mealie-pgdata:/var/lib/postgresql/data:rw"
];
log-driver = "journald";
extraOptions = [
"--health-cmd=[\"pg_isready\"]"
"--health-interval=30s"
"--health-retries=3"
"--health-timeout=20s"
"--network-alias=postgres"
"--network=mealieio_default"
];
};
systemd.services."podman-postgres" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
};
after = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-pgdata.service"
];
requires = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-pgdata.service"
];
partOf = [
"podman-compose-mealieio-root.target"
];
wantedBy = [
"podman-compose-mealieio-root.target"
];
};
# Networks
systemd.services."podman-network-mealieio_default" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "podman network rm -f mealieio_default";
};
script = ''
podman network inspect mealieio_default || podman network create mealieio_default
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
# Volumes
systemd.services."podman-volume-mealieio_mealie-data" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
podman volume inspect mealieio_mealie-data || podman volume create mealieio_mealie-data
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
systemd.services."podman-volume-mealieio_mealie-pgdata" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
podman volume inspect mealieio_mealie-pgdata || podman volume create mealieio_mealie-pgdata
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."podman-compose-mealieio-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View File

@@ -0,0 +1,20 @@
{ pkgs, lib, config, ... }:
{
# Runtime
virtualisation.podman = {
enable = true;
autoPrune.enable = true;
# dockerCompat = true;
};
# Enable container name DNS for all Podman networks.
networking.firewall.interfaces = let
matchAll = if !config.networking.nftables.enable then "podman+" else "podman*";
in {
"${matchAll}".allowedUDPPorts = [ 53 ];
};
virtualisation.oci-containers.backend = "podman";
}