lib: add mkCaddyReverseProxy, mkFail2banJail, mkGrafanaAnnotationService, extractArrApiKey
This commit is contained in:
103
modules/lib.nix
103
modules/lib.nix
@@ -176,5 +176,108 @@ inputs.nixpkgs.lib.extend (
|
|||||||
after = [ "${serviceName}-file-perms.service" ];
|
after = [ "${serviceName}-file-perms.service" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
# Creates a Caddy virtualHost with reverse_proxy to a local or VPN-namespaced port.
|
||||||
|
# Use `subdomain` for "<name>.${domain}" or `domain` for a full custom domain.
|
||||||
|
# Exactly one of `subdomain` or `domain` must be provided.
|
||||||
|
mkCaddyReverseProxy =
|
||||||
|
{
|
||||||
|
subdomain ? null,
|
||||||
|
domain ? null,
|
||||||
|
port,
|
||||||
|
auth ? false,
|
||||||
|
vpn ? false,
|
||||||
|
}:
|
||||||
|
assert (subdomain != null) != (domain != null);
|
||||||
|
{ config, ... }:
|
||||||
|
let
|
||||||
|
vhostDomain = if domain != null then domain else "${subdomain}.${service_configs.https.domain}";
|
||||||
|
upstream =
|
||||||
|
if vpn then
|
||||||
|
"${config.vpnNamespaces.wg.namespaceAddress}:${builtins.toString port}"
|
||||||
|
else
|
||||||
|
":${builtins.toString port}";
|
||||||
|
in
|
||||||
|
{
|
||||||
|
services.caddy.virtualHosts."${vhostDomain}".extraConfig = lib.concatStringsSep "\n" (
|
||||||
|
lib.optional auth "import ${config.age.secrets.caddy_auth.path}" ++ [ "reverse_proxy ${upstream}" ]
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
# Creates a fail2ban jail with systemd journal backend.
|
||||||
|
# Covers the common pattern: journal-based detection, http/https ports, default thresholds.
|
||||||
|
mkFail2banJail =
|
||||||
|
{
|
||||||
|
name,
|
||||||
|
unitName ? "${name}.service",
|
||||||
|
failregex,
|
||||||
|
}:
|
||||||
|
{ ... }:
|
||||||
|
{
|
||||||
|
services.fail2ban.jails.${name} = {
|
||||||
|
enabled = true;
|
||||||
|
settings = {
|
||||||
|
backend = "systemd";
|
||||||
|
port = "http,https";
|
||||||
|
# defaults: maxretry=5, findtime=10m, bantime=10m
|
||||||
|
};
|
||||||
|
filter.Definition = {
|
||||||
|
inherit failregex;
|
||||||
|
ignoreregex = "";
|
||||||
|
journalmatch = "_SYSTEMD_UNIT=${unitName}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Creates a hardened Grafana annotation daemon service.
|
||||||
|
# Provides DynamicUser, sandboxing, state directory, and GRAFANA_URL/STATE_FILE automatically.
|
||||||
|
mkGrafanaAnnotationService =
|
||||||
|
{
|
||||||
|
name,
|
||||||
|
description,
|
||||||
|
script,
|
||||||
|
after ? [ ],
|
||||||
|
environment ? { },
|
||||||
|
loadCredential ? null,
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
systemd.services."${name}-annotations" = {
|
||||||
|
inherit description;
|
||||||
|
after = [
|
||||||
|
"network.target"
|
||||||
|
"grafana.service"
|
||||||
|
]
|
||||||
|
++ after;
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.python3}/bin/python3 ${script}";
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = "10s";
|
||||||
|
DynamicUser = true;
|
||||||
|
StateDirectory = "${name}-annotations";
|
||||||
|
NoNewPrivileges = true;
|
||||||
|
ProtectSystem = "strict";
|
||||||
|
ProtectHome = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
RestrictAddressFamilies = [
|
||||||
|
"AF_INET"
|
||||||
|
"AF_INET6"
|
||||||
|
];
|
||||||
|
MemoryDenyWriteExecute = true;
|
||||||
|
}
|
||||||
|
// lib.optionalAttrs (loadCredential != null) {
|
||||||
|
LoadCredential = loadCredential;
|
||||||
|
};
|
||||||
|
environment = {
|
||||||
|
GRAFANA_URL = "http://127.0.0.1:${toString service_configs.ports.private.grafana.port}";
|
||||||
|
STATE_FILE = "/var/lib/${name}-annotations/state.json";
|
||||||
|
}
|
||||||
|
// environment;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Shell command to extract an API key from an *arr config.xml file.
|
||||||
|
# Returns a string suitable for $() command substitution in shell scripts.
|
||||||
|
extractArrApiKey =
|
||||||
|
configXmlPath: "${lib.getExe pkgs.gnugrep} -oP '(?<=<ApiKey>)[^<]+' ${configXmlPath}";
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
{
|
{
|
||||||
pkgs,
|
pkgs,
|
||||||
|
lib,
|
||||||
service_configs,
|
service_configs,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
@@ -12,7 +13,6 @@ let
|
|||||||
|
|
||||||
curl = "${pkgs.curl}/bin/curl";
|
curl = "${pkgs.curl}/bin/curl";
|
||||||
jq = "${pkgs.jq}/bin/jq";
|
jq = "${pkgs.jq}/bin/jq";
|
||||||
grep = "${pkgs.gnugrep}/bin/grep";
|
|
||||||
|
|
||||||
# Max items to search per cycle per category (missing + cutoff) per app
|
# Max items to search per cycle per category (missing + cutoff) per app
|
||||||
maxPerCycle = 5;
|
maxPerCycle = 5;
|
||||||
@@ -20,8 +20,8 @@ let
|
|||||||
searchScript = pkgs.writeShellScript "arr-search" ''
|
searchScript = pkgs.writeShellScript "arr-search" ''
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
RADARR_KEY=$(${grep} -oP '(?<=<ApiKey>)[^<]+' ${radarrConfig})
|
RADARR_KEY=$(${lib.extractArrApiKey radarrConfig})
|
||||||
SONARR_KEY=$(${grep} -oP '(?<=<ApiKey>)[^<]+' ${sonarrConfig})
|
SONARR_KEY=$(${lib.extractArrApiKey sonarrConfig})
|
||||||
|
|
||||||
search_radarr() {
|
search_radarr() {
|
||||||
local endpoint="$1"
|
local endpoint="$1"
|
||||||
|
|||||||
@@ -16,6 +16,11 @@
|
|||||||
(lib.serviceFilePerms "bazarr" [
|
(lib.serviceFilePerms "bazarr" [
|
||||||
"Z ${service_configs.bazarr.dataDir} 0700 ${config.services.bazarr.user} ${config.services.bazarr.group}"
|
"Z ${service_configs.bazarr.dataDir} 0700 ${config.services.bazarr.user} ${config.services.bazarr.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "bazarr";
|
||||||
|
port = service_configs.ports.private.bazarr.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.bazarr = {
|
services.bazarr = {
|
||||||
@@ -23,11 +28,6 @@
|
|||||||
listenPort = service_configs.ports.private.bazarr.port;
|
listenPort = service_configs.ports.private.bazarr.port;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."bazarr.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.bazarr.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
users.users.${config.services.bazarr.user}.extraGroups = [
|
users.users.${config.services.bazarr.user}.extraGroups = [
|
||||||
service_configs.media_group
|
service_configs.media_group
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -13,6 +13,10 @@
|
|||||||
(lib.serviceFilePerms "jellyseerr" [
|
(lib.serviceFilePerms "jellyseerr" [
|
||||||
"Z ${service_configs.jellyseerr.configDir} 0700 jellyseerr jellyseerr"
|
"Z ${service_configs.jellyseerr.configDir} 0700 jellyseerr jellyseerr"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "jellyseerr";
|
||||||
|
port = service_configs.ports.private.jellyseerr.port;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.jellyseerr = {
|
services.jellyseerr = {
|
||||||
@@ -36,8 +40,4 @@
|
|||||||
|
|
||||||
users.groups.jellyseerr = { };
|
users.groups.jellyseerr = { };
|
||||||
|
|
||||||
services.caddy.virtualHosts."jellyseerr.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
# import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.jellyseerr.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -14,6 +14,12 @@
|
|||||||
(lib.serviceFilePerms "prowlarr" [
|
(lib.serviceFilePerms "prowlarr" [
|
||||||
"Z ${service_configs.prowlarr.dataDir} 0700 prowlarr prowlarr"
|
"Z ${service_configs.prowlarr.dataDir} 0700 prowlarr prowlarr"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "prowlarr";
|
||||||
|
port = service_configs.ports.private.prowlarr.port;
|
||||||
|
auth = true;
|
||||||
|
vpn = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.prowlarr = {
|
services.prowlarr = {
|
||||||
@@ -51,8 +57,4 @@
|
|||||||
ExecStart = lib.mkForce "${lib.getExe pkgs.prowlarr} -nobrowser -data=${service_configs.prowlarr.dataDir}";
|
ExecStart = lib.mkForce "${lib.getExe pkgs.prowlarr} -nobrowser -data=${service_configs.prowlarr.dataDir}";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."prowlarr.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy ${config.vpnNamespaces.wg.namespaceAddress}:${builtins.toString service_configs.ports.private.prowlarr.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,11 @@
|
|||||||
(lib.serviceFilePerms "radarr" [
|
(lib.serviceFilePerms "radarr" [
|
||||||
"Z ${service_configs.radarr.dataDir} 0700 ${config.services.radarr.user} ${config.services.radarr.group}"
|
"Z ${service_configs.radarr.dataDir} 0700 ${config.services.radarr.user} ${config.services.radarr.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "radarr";
|
||||||
|
port = service_configs.ports.private.radarr.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.radarr = {
|
services.radarr = {
|
||||||
@@ -25,11 +30,6 @@
|
|||||||
settings.update.mechanism = "external";
|
settings.update.mechanism = "external";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."radarr.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.radarr.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
users.users.${config.services.radarr.user}.extraGroups = [
|
users.users.${config.services.radarr.user}.extraGroups = [
|
||||||
service_configs.media_group
|
service_configs.media_group
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -13,8 +13,8 @@ let
|
|||||||
# Runs as root (via + prefix) after the NixOS module writes config.json.
|
# Runs as root (via + prefix) after the NixOS module writes config.json.
|
||||||
# Extracts API keys from radarr/sonarr config.xml and injects them via jq.
|
# Extracts API keys from radarr/sonarr config.xml and injects them via jq.
|
||||||
injectApiKeys = pkgs.writeShellScript "recyclarr-inject-api-keys" ''
|
injectApiKeys = pkgs.writeShellScript "recyclarr-inject-api-keys" ''
|
||||||
RADARR_KEY=$(${lib.getExe pkgs.gnugrep} -oP '(?<=<ApiKey>)[^<]+' ${radarrConfig})
|
RADARR_KEY=$(${lib.extractArrApiKey radarrConfig})
|
||||||
SONARR_KEY=$(${lib.getExe pkgs.gnugrep} -oP '(?<=<ApiKey>)[^<]+' ${sonarrConfig})
|
SONARR_KEY=$(${lib.extractArrApiKey sonarrConfig})
|
||||||
${pkgs.jq}/bin/jq \
|
${pkgs.jq}/bin/jq \
|
||||||
--arg rk "$RADARR_KEY" \
|
--arg rk "$RADARR_KEY" \
|
||||||
--arg sk "$SONARR_KEY" \
|
--arg sk "$SONARR_KEY" \
|
||||||
|
|||||||
@@ -16,6 +16,11 @@
|
|||||||
(lib.serviceFilePerms "sonarr" [
|
(lib.serviceFilePerms "sonarr" [
|
||||||
"Z ${service_configs.sonarr.dataDir} 0700 ${config.services.sonarr.user} ${config.services.sonarr.group}"
|
"Z ${service_configs.sonarr.dataDir} 0700 ${config.services.sonarr.user} ${config.services.sonarr.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "sonarr";
|
||||||
|
port = service_configs.ports.private.sonarr.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
@@ -31,11 +36,6 @@
|
|||||||
settings.update.mechanism = "external";
|
settings.update.mechanism = "external";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."sonarr.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.sonarr.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
users.users.${config.services.sonarr.user}.extraGroups = [
|
users.users.${config.services.sonarr.user}.extraGroups = [
|
||||||
service_configs.media_group
|
service_configs.media_group
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -8,6 +8,12 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
(lib.vpnNamespaceOpenPort service_configs.ports.private.bitmagnet.port "bitmagnet")
|
(lib.vpnNamespaceOpenPort service_configs.ports.private.bitmagnet.port "bitmagnet")
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "bitmagnet";
|
||||||
|
port = service_configs.ports.private.bitmagnet.port;
|
||||||
|
auth = true;
|
||||||
|
vpn = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.bitmagnet = {
|
services.bitmagnet = {
|
||||||
@@ -24,8 +30,4 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."bitmagnet.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy ${config.vpnNamespaces.wg.namespaceAddress}:${builtins.toString service_configs.ports.private.bitmagnet.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,6 +13,10 @@
|
|||||||
(lib.serviceFilePerms "vaultwarden" [
|
(lib.serviceFilePerms "vaultwarden" [
|
||||||
"Z ${service_configs.vaultwarden.path} 0700 vaultwarden vaultwarden"
|
"Z ${service_configs.vaultwarden.path} 0700 vaultwarden vaultwarden"
|
||||||
])
|
])
|
||||||
|
(lib.mkFail2banJail {
|
||||||
|
name = "vaultwarden";
|
||||||
|
failregex = ''^.*Username or password is incorrect\. Try again\. IP: <HOST>\..*$'';
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.vaultwarden = {
|
services.vaultwarden = {
|
||||||
@@ -38,18 +42,4 @@
|
|||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Protect Vaultwarden login from brute force attacks
|
|
||||||
services.fail2ban.jails.vaultwarden = {
|
|
||||||
enabled = true;
|
|
||||||
settings = {
|
|
||||||
backend = "systemd";
|
|
||||||
port = "http,https";
|
|
||||||
# defaults: maxretry=5, findtime=10m, bantime=10m
|
|
||||||
};
|
|
||||||
filter.Definition = {
|
|
||||||
failregex = ''^.*Username or password is incorrect\. Try again\. IP: <HOST>\..*$'';
|
|
||||||
ignoreregex = "";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=vaultwarden.service";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,6 +6,13 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
imports = [
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
domain = service_configs.firefox_syncserver.domain;
|
||||||
|
port = service_configs.ports.private.firefox_syncserver.port;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
services.firefox-syncserver = {
|
services.firefox-syncserver = {
|
||||||
enable = true;
|
enable = true;
|
||||||
database = {
|
database = {
|
||||||
@@ -33,7 +40,4 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."${service_configs.firefox_syncserver.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.firefox_syncserver.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -11,6 +11,14 @@
|
|||||||
(lib.serviceFilePerms "gitea" [
|
(lib.serviceFilePerms "gitea" [
|
||||||
"Z ${config.services.gitea.stateDir} 0700 ${config.services.gitea.user} ${config.services.gitea.group}"
|
"Z ${config.services.gitea.stateDir} 0700 ${config.services.gitea.user} ${config.services.gitea.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
domain = service_configs.gitea.domain;
|
||||||
|
port = service_configs.ports.private.gitea.port;
|
||||||
|
})
|
||||||
|
(lib.mkFail2banJail {
|
||||||
|
name = "gitea";
|
||||||
|
failregex = "^.*Failed authentication attempt for .* from <HOST>:.*$";
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.gitea = {
|
services.gitea = {
|
||||||
@@ -41,10 +49,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."${service_configs.gitea.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString config.services.gitea.settings.server.HTTP_PORT}
|
|
||||||
'';
|
|
||||||
|
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
ensureDatabases = [ config.services.gitea.user ];
|
ensureDatabases = [ config.services.gitea.user ];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
@@ -58,18 +62,4 @@
|
|||||||
|
|
||||||
services.openssh.settings.AllowUsers = [ config.services.gitea.user ];
|
services.openssh.settings.AllowUsers = [ config.services.gitea.user ];
|
||||||
|
|
||||||
# Protect Gitea login from brute force attacks
|
|
||||||
services.fail2ban.jails.gitea = {
|
|
||||||
enabled = true;
|
|
||||||
settings = {
|
|
||||||
backend = "systemd";
|
|
||||||
port = "http,https";
|
|
||||||
# defaults: maxretry=5, findtime=10m, bantime=10m
|
|
||||||
};
|
|
||||||
filter.Definition = {
|
|
||||||
failregex = "^.*Failed authentication attempt for .* from <HOST>:.*$";
|
|
||||||
ignoreregex = "";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=gitea.service";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -12,6 +12,11 @@
|
|||||||
(lib.serviceFilePerms "grafana" [
|
(lib.serviceFilePerms "grafana" [
|
||||||
"Z ${service_configs.grafana.dir} 0700 grafana grafana"
|
"Z ${service_configs.grafana.dir} 0700 grafana grafana"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
domain = service_configs.grafana.domain;
|
||||||
|
port = service_configs.ports.private.grafana.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.grafana = {
|
services.grafana = {
|
||||||
@@ -85,11 +90,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."${service_configs.grafana.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${toString service_configs.ports.private.grafana.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
ensureDatabases = [ "grafana" ];
|
ensureDatabases = [ "grafana" ];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
|
|||||||
@@ -1,40 +1,18 @@
|
|||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
pkgs,
|
|
||||||
service_configs,
|
service_configs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
lib.mkIf (config.services.grafana.enable && config.services.jellyfin.enable) {
|
lib.mkIf (config.services.grafana.enable && config.services.jellyfin.enable) (
|
||||||
systemd.services.jellyfin-annotations = {
|
lib.mkGrafanaAnnotationService {
|
||||||
|
name = "jellyfin";
|
||||||
description = "Jellyfin stream annotation service for Grafana";
|
description = "Jellyfin stream annotation service for Grafana";
|
||||||
after = [
|
script = ./jellyfin-annotations.py;
|
||||||
"network.target"
|
|
||||||
"grafana.service"
|
|
||||||
];
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
serviceConfig = {
|
|
||||||
ExecStart = "${pkgs.python3}/bin/python3 ${./jellyfin-annotations.py}";
|
|
||||||
Restart = "always";
|
|
||||||
RestartSec = "10s";
|
|
||||||
LoadCredential = "jellyfin-api-key:${config.age.secrets.jellyfin-api-key.path}";
|
|
||||||
DynamicUser = true;
|
|
||||||
StateDirectory = "jellyfin-annotations";
|
|
||||||
NoNewPrivileges = true;
|
|
||||||
ProtectSystem = "strict";
|
|
||||||
ProtectHome = true;
|
|
||||||
PrivateTmp = true;
|
|
||||||
RestrictAddressFamilies = [
|
|
||||||
"AF_INET"
|
|
||||||
"AF_INET6"
|
|
||||||
];
|
|
||||||
MemoryDenyWriteExecute = true;
|
|
||||||
};
|
|
||||||
environment = {
|
environment = {
|
||||||
JELLYFIN_URL = "http://127.0.0.1:${toString service_configs.ports.private.jellyfin.port}";
|
JELLYFIN_URL = "http://127.0.0.1:${toString service_configs.ports.private.jellyfin.port}";
|
||||||
GRAFANA_URL = "http://127.0.0.1:${toString service_configs.ports.private.grafana.port}";
|
|
||||||
STATE_FILE = "/var/lib/jellyfin-annotations/state.json";
|
|
||||||
POLL_INTERVAL = "30";
|
POLL_INTERVAL = "30";
|
||||||
};
|
};
|
||||||
};
|
loadCredential = "jellyfin-api-key:${config.age.secrets.jellyfin-api-key.path}";
|
||||||
}
|
}
|
||||||
|
)
|
||||||
|
|||||||
@@ -1,39 +1,18 @@
|
|||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
pkgs,
|
|
||||||
service_configs,
|
service_configs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
lib.mkIf (config.services.grafana.enable && config.services.llama-cpp.enable) {
|
lib.mkIf (config.services.grafana.enable && config.services.llama-cpp.enable) (
|
||||||
systemd.services.llama-cpp-annotations = {
|
lib.mkGrafanaAnnotationService {
|
||||||
|
name = "llama-cpp";
|
||||||
description = "LLM request annotation service for Grafana";
|
description = "LLM request annotation service for Grafana";
|
||||||
after = [
|
script = ./llama-cpp-annotations.py;
|
||||||
"grafana.service"
|
after = [ "llama-cpp.service" ];
|
||||||
"llama-cpp.service"
|
|
||||||
];
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
serviceConfig = {
|
|
||||||
ExecStart = "${pkgs.python3}/bin/python3 ${./llama-cpp-annotations.py}";
|
|
||||||
Restart = "always";
|
|
||||||
RestartSec = "10s";
|
|
||||||
DynamicUser = true;
|
|
||||||
StateDirectory = "llama-cpp-annotations";
|
|
||||||
NoNewPrivileges = true;
|
|
||||||
ProtectSystem = "strict";
|
|
||||||
ProtectHome = true;
|
|
||||||
PrivateTmp = true;
|
|
||||||
RestrictAddressFamilies = [
|
|
||||||
"AF_INET"
|
|
||||||
"AF_INET6"
|
|
||||||
];
|
|
||||||
MemoryDenyWriteExecute = true;
|
|
||||||
};
|
|
||||||
environment = {
|
environment = {
|
||||||
GRAFANA_URL = "http://127.0.0.1:${toString service_configs.ports.private.grafana.port}";
|
|
||||||
STATE_FILE = "/var/lib/llama-cpp-annotations/state.json";
|
|
||||||
POLL_INTERVAL = "5";
|
POLL_INTERVAL = "5";
|
||||||
CPU_THRESHOLD = "50";
|
CPU_THRESHOLD = "50";
|
||||||
};
|
};
|
||||||
};
|
}
|
||||||
}
|
)
|
||||||
|
|||||||
@@ -16,6 +16,15 @@
|
|||||||
(lib.serviceFilePerms "immich-server" [
|
(lib.serviceFilePerms "immich-server" [
|
||||||
"Z ${config.services.immich.mediaLocation} 0770 ${config.services.immich.user} ${config.services.immich.group}"
|
"Z ${config.services.immich.mediaLocation} 0770 ${config.services.immich.user} ${config.services.immich.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "immich";
|
||||||
|
port = service_configs.ports.private.immich.port;
|
||||||
|
})
|
||||||
|
(lib.mkFail2banJail {
|
||||||
|
name = "immich";
|
||||||
|
unitName = "immich-server.service";
|
||||||
|
failregex = "^.*Failed login attempt for user .* from ip address <HOST>.*$";
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.immich = {
|
services.immich = {
|
||||||
@@ -29,10 +38,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."immich.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString config.services.immich.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
immich-go
|
immich-go
|
||||||
];
|
];
|
||||||
@@ -42,18 +47,4 @@
|
|||||||
"render"
|
"render"
|
||||||
];
|
];
|
||||||
|
|
||||||
# Protect Immich login from brute force attacks
|
|
||||||
services.fail2ban.jails.immich = {
|
|
||||||
enabled = true;
|
|
||||||
settings = {
|
|
||||||
backend = "systemd";
|
|
||||||
port = "http,https";
|
|
||||||
# defaults: maxretry=5, findtime=10m, bantime=10m
|
|
||||||
};
|
|
||||||
filter.Definition = {
|
|
||||||
failregex = "^.*Failed login attempt for user .* from ip address <HOST>.*$";
|
|
||||||
ignoreregex = "";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=immich-server.service";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,6 +13,13 @@ let
|
|||||||
modelAlias = lib.removeSuffix ".gguf" (baseNameOf modelUrl);
|
modelAlias = lib.removeSuffix ".gguf" (baseNameOf modelUrl);
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
imports = [
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "llm";
|
||||||
|
port = service_configs.ports.private.llama_cpp.port;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
services.llama-cpp = {
|
services.llama-cpp = {
|
||||||
enable = true;
|
enable = true;
|
||||||
model = toString (
|
model = toString (
|
||||||
@@ -94,10 +101,4 @@ in
|
|||||||
+ " ${utils.escapeSystemdExecArgs cfg.extraFlags}"
|
+ " ${utils.escapeSystemdExecArgs cfg.extraFlags}"
|
||||||
);
|
);
|
||||||
|
|
||||||
# Auth handled by llama-cpp --api-key-file (Bearer token).
|
|
||||||
# No caddy_auth — the API key is the auth layer, and caddy_auth's basic
|
|
||||||
# auth would block Bearer-only clients like oh-my-pi.
|
|
||||||
services.caddy.virtualHosts."llm.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${toString config.services.llama-cpp.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -12,6 +12,10 @@
|
|||||||
(lib.serviceFilePerms "continuwuity" [
|
(lib.serviceFilePerms "continuwuity" [
|
||||||
"Z /var/lib/private/continuwuity 0770 ${config.services.matrix-continuwuity.user} ${config.services.matrix-continuwuity.group}"
|
"Z /var/lib/private/continuwuity 0770 ${config.services.matrix-continuwuity.user} ${config.services.matrix-continuwuity.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
domain = service_configs.matrix.domain;
|
||||||
|
port = service_configs.ports.private.matrix.port;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.matrix-continuwuity = {
|
services.matrix-continuwuity = {
|
||||||
@@ -53,10 +57,6 @@
|
|||||||
respond /.well-known/matrix/client `{"m.server":{"base_url":"https://${service_configs.matrix.domain}"},"m.homeserver":{"base_url":"https://${service_configs.matrix.domain}"},"org.matrix.msc3575.proxy":{"base_url":"https://${config.services.matrix-continuwuity.settings.global.server_name}"},"org.matrix.msc4143.rtc_foci":[{"type":"livekit","livekit_service_url":"https://${service_configs.livekit.domain}"}]}`
|
respond /.well-known/matrix/client `{"m.server":{"base_url":"https://${service_configs.matrix.domain}"},"m.homeserver":{"base_url":"https://${service_configs.matrix.domain}"},"org.matrix.msc3575.proxy":{"base_url":"https://${config.services.matrix-continuwuity.settings.global.server_name}"},"org.matrix.msc4143.rtc_foci":[{"type":"livekit","livekit_service_url":"https://${service_configs.livekit.domain}"}]}`
|
||||||
'';
|
'';
|
||||||
|
|
||||||
services.caddy.virtualHosts."${service_configs.matrix.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.matrix.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
# Exact duplicate for federation port
|
# Exact duplicate for federation port
|
||||||
services.caddy.virtualHosts."${service_configs.matrix.domain}:${builtins.toString service_configs.ports.public.matrix_federation.port}".extraConfig =
|
services.caddy.virtualHosts."${service_configs.matrix.domain}:${builtins.toString service_configs.ports.public.matrix_federation.port}".extraConfig =
|
||||||
config.services.caddy.virtualHosts."${service_configs.matrix.domain}".extraConfig;
|
config.services.caddy.virtualHosts."${service_configs.matrix.domain}".extraConfig;
|
||||||
|
|||||||
@@ -12,6 +12,10 @@
|
|||||||
(lib.serviceFilePerms "ntfy-sh" [
|
(lib.serviceFilePerms "ntfy-sh" [
|
||||||
"Z /var/lib/private/ntfy-sh 0700 ${config.services.ntfy-sh.user} ${config.services.ntfy-sh.group}"
|
"Z /var/lib/private/ntfy-sh 0700 ${config.services.ntfy-sh.user} ${config.services.ntfy-sh.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
domain = service_configs.ntfy.domain;
|
||||||
|
port = service_configs.ports.private.ntfy.port;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.ntfy-sh = {
|
services.ntfy-sh = {
|
||||||
@@ -27,8 +31,4 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."${service_configs.ntfy.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString service_configs.ports.private.ntfy.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -27,6 +27,12 @@ in
|
|||||||
"z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.TempPath} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
"z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.TempPath} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
||||||
"Z ${config.services.qbittorrent.profileDir} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
"Z ${config.services.qbittorrent.profileDir} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "torrent";
|
||||||
|
port = service_configs.ports.private.torrent.port;
|
||||||
|
auth = true;
|
||||||
|
vpn = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.qbittorrent = {
|
services.qbittorrent = {
|
||||||
@@ -156,11 +162,6 @@ in
|
|||||||
_: path: "d ${path} 0770 ${config.services.qbittorrent.user} ${service_configs.media_group} -"
|
_: path: "d ${path} 0770 ${config.services.qbittorrent.user} ${service_configs.media_group} -"
|
||||||
) service_configs.torrent.categories;
|
) service_configs.torrent.categories;
|
||||||
|
|
||||||
services.caddy.virtualHosts."torrent.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy ${config.vpnNamespaces.wg.namespaceAddress}:${builtins.toString config.services.qbittorrent.webuiPort}
|
|
||||||
'';
|
|
||||||
|
|
||||||
users.users.${config.services.qbittorrent.user}.extraGroups = [
|
users.users.${config.services.qbittorrent.user}.extraGroups = [
|
||||||
service_configs.media_group
|
service_configs.media_group
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -19,6 +19,10 @@
|
|||||||
"Z ${service_configs.slskd.downloads} 0750 ${config.services.slskd.user} music"
|
"Z ${service_configs.slskd.downloads} 0750 ${config.services.slskd.user} music"
|
||||||
"Z ${service_configs.slskd.incomplete} 0750 ${config.services.slskd.user} music"
|
"Z ${service_configs.slskd.incomplete} 0750 ${config.services.slskd.user} music"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "soulseek";
|
||||||
|
port = service_configs.ports.private.soulseek_web.port;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
users.groups."music" = { };
|
users.groups."music" = { };
|
||||||
@@ -58,11 +62,6 @@
|
|||||||
users.users.${config.services.jellyfin.user}.extraGroups = [ "music" ];
|
users.users.${config.services.jellyfin.user}.extraGroups = [ "music" ];
|
||||||
users.users.${username}.extraGroups = [ "music" ];
|
users.users.${username}.extraGroups = [ "music" ];
|
||||||
|
|
||||||
# doesn't work with auth????
|
|
||||||
services.caddy.virtualHosts."soulseek.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
reverse_proxy :${builtins.toString config.services.slskd.settings.web.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [
|
networking.firewall.allowedTCPPorts = [
|
||||||
service_configs.ports.public.soulseek_listen.port
|
service_configs.ports.public.soulseek_listen.port
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -17,6 +17,11 @@
|
|||||||
"Z ${service_configs.syncthing.signalBackupDir} 0750 ${config.services.syncthing.user} ${config.services.syncthing.group}"
|
"Z ${service_configs.syncthing.signalBackupDir} 0750 ${config.services.syncthing.user} ${config.services.syncthing.group}"
|
||||||
"Z ${service_configs.syncthing.grayjayBackupDir} 0750 ${config.services.syncthing.user} ${config.services.syncthing.group}"
|
"Z ${service_configs.syncthing.grayjayBackupDir} 0750 ${config.services.syncthing.user} ${config.services.syncthing.group}"
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "syncthing";
|
||||||
|
port = service_configs.ports.private.syncthing_gui.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.syncthing = {
|
services.syncthing = {
|
||||||
@@ -49,9 +54,4 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."syncthing.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${toString service_configs.ports.private.syncthing_gui.port}
|
|
||||||
'';
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -10,6 +10,11 @@
|
|||||||
(lib.serviceMountWithZpool "trilium-server" service_configs.zpool_ssds [
|
(lib.serviceMountWithZpool "trilium-server" service_configs.zpool_ssds [
|
||||||
(service_configs.services_dir + "/trilium")
|
(service_configs.services_dir + "/trilium")
|
||||||
])
|
])
|
||||||
|
(lib.mkCaddyReverseProxy {
|
||||||
|
subdomain = "notes";
|
||||||
|
port = service_configs.ports.private.trilium.port;
|
||||||
|
auth = true;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.trilium-server = {
|
services.trilium-server = {
|
||||||
@@ -19,8 +24,4 @@
|
|||||||
dataDir = service_configs.trilium.dataDir;
|
dataDir = service_configs.trilium.dataDir;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."notes.${service_configs.https.domain}".extraConfig = ''
|
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
|
||||||
reverse_proxy :${toString service_configs.ports.private.trilium.port}
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user