* hax * hax * shell monitoring * hax radicale! * hacking * haxor * hax * hack * feat: refactor paths etc for impermance * fix: restic * hax * more hax * feat: migrate z2m * fix: websockets i guess * cleanup * hacks * hax * feat: miniflux + postgres * feat: add calibre * feat: calibre-web * Auto lint/format * feat: add calibre/web + rss-bridge * hax --------- Co-authored-by: Truxnell <9149206+truxnell@users.noreply.github.com> Co-authored-by: truxnell <truxnell@users.noreply.github.com>
136 lines
3.1 KiB
Nix
136 lines
3.1 KiB
Nix
{ lib
|
|
, config
|
|
, pkgs
|
|
, ...
|
|
}:
|
|
with lib;
|
|
let
|
|
cfg = config.mySystem.${category}.${app};
|
|
app = "rss-bridge";
|
|
category = "services";
|
|
description = "rss feed for sites without";
|
|
# image = "%{image}";
|
|
inherit (config.services.rss-bridge) user;#string
|
|
inherit (config.services.rss-bridge) group;#string
|
|
port = 1234; #int
|
|
appFolder = "/var/lib/${app}";
|
|
# persistentFolder = "${config.mySystem.persistentFolder}/var/lib/${appFolder}";
|
|
host = "${app}" + (if cfg.dev then "-dev" else "");
|
|
url = "${host}.${config.networking.domain}";
|
|
in
|
|
{
|
|
options.mySystem.${category}.${app} =
|
|
{
|
|
enable = mkEnableOption "${app}";
|
|
addToHomepage = mkEnableOption "Add ${app} to homepage" // { default = true; };
|
|
monitor = mkOption
|
|
{
|
|
type = lib.types.bool;
|
|
description = "Enable gatus monitoring";
|
|
default = true;
|
|
};
|
|
prometheus = mkOption
|
|
{
|
|
type = lib.types.bool;
|
|
description = "Enable prometheus scraping";
|
|
default = true;
|
|
};
|
|
addToDNS = mkOption
|
|
{
|
|
type = lib.types.bool;
|
|
description = "Add to DNS list";
|
|
default = true;
|
|
};
|
|
dev = mkOption
|
|
{
|
|
type = lib.types.bool;
|
|
description = "Development instance";
|
|
default = false;
|
|
};
|
|
backup = mkOption
|
|
{
|
|
type = lib.types.bool;
|
|
description = "Enable backups";
|
|
default = true;
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
## Secrets
|
|
# sops.secrets."${category}/${app}/env" = {
|
|
# sopsFile = ./secrets.sops.yaml;
|
|
# owner = user;
|
|
# group = group;
|
|
# restartUnits = [ "${app}.service" ];
|
|
# };
|
|
|
|
users.users.truxnell.extraGroups = [ group ];
|
|
|
|
## service
|
|
services.rss-bridge = {
|
|
enable = true;
|
|
whitelist = [ "*" ];
|
|
virtualHost = "${url}";
|
|
};
|
|
|
|
# homepage integration
|
|
mySystem.services.homepage.infrastructure = mkIf cfg.addToHomepage [
|
|
{
|
|
${app} = {
|
|
icon = "${app}.svg";
|
|
href = "https://${url}";
|
|
inherit description;
|
|
};
|
|
}
|
|
];
|
|
|
|
### gatus integration
|
|
mySystem.services.gatus.monitors = mkIf cfg.monitor [
|
|
{
|
|
name = app;
|
|
group = "${category}";
|
|
url = "https://${url}";
|
|
interval = "1m";
|
|
conditions = [ "[CONNECTED] == true" "[STATUS] == 200" "[RESPONSE_TIME] < 50" ];
|
|
}
|
|
];
|
|
|
|
### Ingress
|
|
services.nginx.virtualHosts.${url} = {
|
|
forceSSL = true;
|
|
useACMEHost = config.networking.domain;
|
|
};
|
|
|
|
### firewall config
|
|
|
|
# networking.firewall = mkIf cfg.openFirewall {
|
|
# allowedTCPPorts = [ port ];
|
|
# allowedUDPPorts = [ port ];
|
|
# };
|
|
|
|
### backups
|
|
warnings = [
|
|
(mkIf (!cfg.backup && config.mySystem.purpose != "Development")
|
|
"WARNING: Backups for ${app} are disabled!")
|
|
];
|
|
|
|
services.restic.backups = mkIf cfg.backup (config.lib.mySystem.mkRestic
|
|
{
|
|
inherit app user;
|
|
paths = [ appFolder ];
|
|
inherit appFolder;
|
|
});
|
|
|
|
|
|
# services.postgresqlBackup = {
|
|
# databases = [ app ];
|
|
# };
|
|
|
|
|
|
|
|
};
|
|
}
|