Add VaultWarden; update Transmission; reorder allowedTCPPorts

This commit is contained in:
James Eversole 2024-08-07 10:02:50 -05:00
parent afbbe88620
commit aa40c0c5e3
7 changed files with 15 additions and 2 deletions

View File

@ -111,18 +111,28 @@
}; };
transmission = { transmission = {
image = "haugene/transmission-openvpn:5"; image = "haugene/transmission-openvpn:5.3.1";
ports = [ "9091:9091" ]; ports = [ "9091:9091" ];
volumes = [ volumes = [
"/home/sezycei/srv/scripts/transmission/settings.json:/etc/transmission-daemon/settings.json" "/home/sezycei/srv/scripts/transmission/settings.json:/etc/transmission-daemon/settings.json"
"/etc/localtime:/etc/localtime:ro" "/etc/localtime:/etc/localtime:ro"
"/home/torrent/data:/data" "/home/torrent/data:/data"
"/home/sezycei/srv/scripts/transmission/custom-data:/etc/openvpn/custom"
]; ];
environmentFiles = environmentFiles =
[ config.age.secrets.transmission-env.path ]; [ config.age.secrets.transmission-env.path ];
extraOptions = [ "--cap-add=NET_ADMIN" "--privileged" ]; extraOptions = [ "--cap-add=NET_ADMIN" "--privileged" ];
}; };
vaultwarden = {
image = "vaultwarden/server:1.31.0";
ports = [ "40080:80" ];
volumes = [
"/home/sezycei/srv/containerdata/bitwarden/data:/data"
];
environmentFiles = [ config.age.secrets.bitwarden-env.path ];
};
}; };
}; };
} }

View File

@ -76,6 +76,7 @@
"jame.su" = static { dir = "/var/www/jame.su"; }; "jame.su" = static { dir = "/var/www/jame.su"; };
"matri.cx" = static { dir = "/var/www/matri.cx"; }; "matri.cx" = static { dir = "/var/www/matri.cx"; };
"media.matri.cx" = proxied { target = "http://127.0.0.1:8096"; }; "media.matri.cx" = proxied { target = "http://127.0.0.1:8096"; };
"pw.eversole.co" = proxied { target = "http://127.0.0.1:40080"; };
"sezycei.com" = static { dir = "/var/www/sezycei.com"; }; "sezycei.com" = static { dir = "/var/www/sezycei.com"; };
"snakebelmont.com" = static { dir = "/var/www/snakebelmont.com"; }; "snakebelmont.com" = static { dir = "/var/www/snakebelmont.com"; };
"transmission.matri.cx" = proxiedLAN { target = "http://127.0.0.1:9091"; }; "transmission.matri.cx" = proxiedLAN { target = "http://127.0.0.1:9091"; };

View File

@ -18,6 +18,7 @@
}; };
keys.file = ../../secrets/keys.age; keys.file = ../../secrets/keys.age;
miniflux.file = ../../secrets/miniflux.age; miniflux.file = ../../secrets/miniflux.age;
bitwarden-env.file = ../../secrets/bitwarden-env.age;
transmission-env.file = ../../secrets/transmission-env.age; transmission-env.file = ../../secrets/transmission-env.age;
}; };
identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -2,7 +2,7 @@
networking = { networking = {
hostName = "eve-psr-nix0"; hostName = "eve-psr-nix0";
firewall = { firewall = {
allowedTCPPorts = [ 22 80 443 7860 23231 23232 23233 9418 3000 ]; allowedTCPPorts = [ 22 80 443 3000 7860 9418 23231 23232 23233 ];
allowedUDPPorts = [ 53 1194 ]; allowedUDPPorts = [ 53 1194 ];
trustedInterfaces = [ "tun0" ]; trustedInterfaces = [ "tun0" ];
}; };

View File

@ -13,5 +13,6 @@ in
"secrets/htpasswd-dock.age" = { publicKeys = all; }; "secrets/htpasswd-dock.age" = { publicKeys = all; };
"secrets/keys.age" = { publicKeys = all; }; "secrets/keys.age" = { publicKeys = all; };
"secrets/miniflux.age" = { publicKeys = all; }; "secrets/miniflux.age" = { publicKeys = all; };
"secrets/bitwarden-env.age" = { publicKeys = all; };
"secrets/transmission-env.age" = { publicKeys = all; }; "secrets/transmission-env.age" = { publicKeys = all; };
} }

BIN
secrets/bitwarden-env.age Normal file

Binary file not shown.

Binary file not shown.