lohr: setup real service
This commit is contained in:
parent
bb08ec560e
commit
ba0e0e993e
|
@ -80,6 +80,7 @@ in
|
||||||
|
|
||||||
lohr = {
|
lohr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
port = 8083;
|
||||||
};
|
};
|
||||||
|
|
||||||
miniflux = {
|
miniflux = {
|
||||||
|
|
|
@ -14,6 +14,7 @@ with lib;
|
||||||
transmission-password = lib.fileContents ./transmission.secret;
|
transmission-password = lib.fileContents ./transmission.secret;
|
||||||
nextcloud-admin-pass = lib.fileContents ./nextcloud-admin-pass.secret;
|
nextcloud-admin-pass = lib.fileContents ./nextcloud-admin-pass.secret;
|
||||||
nextcloud-admin-user = lib.fileContents ./nextcloud-admin-user.secret;
|
nextcloud-admin-user = lib.fileContents ./nextcloud-admin-user.secret;
|
||||||
|
lohr-shared-secret = lib.fileContents ./lohr-shared-secret.secret;
|
||||||
|
|
||||||
wireguard = pkgs.callPackage ./wireguard.nix { };
|
wireguard = pkgs.callPackage ./wireguard.nix { };
|
||||||
};
|
};
|
||||||
|
|
BIN
secrets/lohr-shared-secret.secret
Normal file
BIN
secrets/lohr-shared-secret.secret
Normal file
Binary file not shown.
|
@ -1,4 +1,4 @@
|
||||||
{ config, lib, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
|
@ -6,6 +6,12 @@ let
|
||||||
cfg = config.my.services.lohr;
|
cfg = config.my.services.lohr;
|
||||||
my = config.my;
|
my = config.my;
|
||||||
domain = config.networking.domain;
|
domain = config.networking.domain;
|
||||||
|
secrets = config.my.secrets;
|
||||||
|
lohrPkg =
|
||||||
|
let
|
||||||
|
flake = builtins.getFlake "github:alarsyo/lohr?rev=bc32f8a565faa2055c1bbfa8c2353ce4738208b2";
|
||||||
|
in
|
||||||
|
flake.defaultPackage."x86_64-linux"; # FIXME: use correct system
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.my.services.lohr = {
|
options.my.services.lohr = {
|
||||||
|
@ -17,19 +23,51 @@ in
|
||||||
example = "/var/lib/lohr";
|
example = "/var/lib/lohr";
|
||||||
description = "Home for the lohr service, where data will be stored";
|
description = "Home for the lohr service, where data will be stored";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
port = mkOption {
|
||||||
|
type = types.port;
|
||||||
|
default = 8080;
|
||||||
|
example = 8080;
|
||||||
|
description = "Internal port for Lohr daemon";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
|
systemd.services.lohr = {
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Environment = [
|
||||||
|
"ROCKET_PORT=${toString cfg.port}"
|
||||||
|
"ROCKET_LOG_LEVEL=normal"
|
||||||
|
"LOHR_HOME=${cfg.home}"
|
||||||
|
"'LOHR_SECRET=${secrets.lohr-shared-secret}'"
|
||||||
|
];
|
||||||
|
ExecStart = "${lohrPkg}/bin/lohr";
|
||||||
|
StateDirectory = "lohr";
|
||||||
|
WorkingDirectory = "/var/lib/lohr";
|
||||||
|
User = "lohr";
|
||||||
|
Group = "lohr";
|
||||||
|
};
|
||||||
|
path = with pkgs; [
|
||||||
|
git
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.lohr = {
|
||||||
|
isSystemUser = true;
|
||||||
|
home = cfg.home;
|
||||||
|
createHome = true;
|
||||||
|
group = "lohr";
|
||||||
|
};
|
||||||
|
users.groups.lohr = { };
|
||||||
|
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"lohr.${domain}" = {
|
"lohr.${domain}" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = let
|
proxyPass = "http://127.0.0.1:${toString cfg.port}";
|
||||||
laptopClientNum = my.secrets.wireguard.peers.laptop.clientNum;
|
|
||||||
in
|
|
||||||
"http://10.0.0.${toString laptopClientNum}:8000";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue