🔥 remove unused services

This commit is contained in:
Ingolf Wagner 2024-10-10 09:32:41 +09:00
parent a46240a9e5
commit 913aa0dae9
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
4 changed files with 0 additions and 166 deletions

View file

@ -21,9 +21,7 @@
./service-photoprism.nix ./service-photoprism.nix
# ./service-surrealdb.nix # not really needed at the moment # ./service-surrealdb.nix # not really needed at the moment
./service-taskchampion.nix ./service-taskchampion.nix
#./service-taskwarrior.nix
./service-vaultwarden.nix ./service-vaultwarden.nix
# ./service-vikunja.nix
./service-wastebin.nix ./service-wastebin.nix
./nginx-ingolf-wagner-de.nix ./nginx-ingolf-wagner-de.nix

View file

@ -150,18 +150,6 @@ in
#"com.sun:auto-snapshot:monthly" = toString true; #"com.sun:auto-snapshot:monthly" = toString true;
}; };
}; };
"vikunja" = {
type = "zfs_fs";
mountpoint = "/var/lib/nixos-containers/vikunja";
options = {
mountpoint = "legacy";
compression = "lz4";
"com.sun:auto-snapshot:hourly" = toString true;
"com.sun:auto-snapshot:daily" = toString true;
#"com.sun:auto-snapshot:weekly" = toString true;
#"com.sun:auto-snapshot:monthly" = toString true;
};
};
}; };
}; };

View file

@ -1,76 +0,0 @@
{
config,
lib,
pkgs,
...
}:
let
uiPort = 8080;
in
{
users.users.taskwarrior-webui = {
isSystemUser = true;
group = "taskwarrior-webui";
uid = config.ids.uids.taskd;
};
users.groups.taskwarrior-webui = {
gid = config.ids.gids.taskd;
};
# fixme: process is running as root
# fixme: task sync not working
virtualisation.oci-containers = {
containers.taskwarrior-webui = {
volumes = [
"/srv/taskwarrior/taskrc:/.taskrc"
"/srv/taskwarrior/task:/.task"
];
ports = [
# only allow access via wireguard
"10.100.0.1:${toString uiPort}:80"
];
#user = "${toString config.users.users.taskwarrior-webui.uid}:${toString config.users.groups.taskwarrior-webui.gid}";
environment = {
TZ = "Europe/Berlin";
};
image = "dcsunset/taskwarrior-webui:3";
extraOptions = [
# https://www.artificialworlds.net/blog/2023/08/18/accessing-services-on-the-host-from-a-docker-container-or-a-podman-one/
# host.containers.internal <- will reference host ports
"--network=slirp4netns:allow_host_loopback=true"
];
};
};
networking.firewall.interfaces.wg0.allowedTCPPorts = [ uiPort ];
networking.firewall.interfaces.wg0.allowedUDPPorts = [ uiPort ];
healthchecks.closed.public.ports.taskserver-webui = [ uiPort ];
# host nginx setup
# ----------------
# curl -H "Host: taskwarrior.ingolf-wagner.de" https://orbi.private/ < will work
# curl -H "Host: taskwarrior.ingolf-wagner.de" https://10.100.0.1/ < will work
# curl -H "Host: taskwarrior.ingolf-wagner.de" https://144.76.13.147/ < wont work
#services.nginx = {
# enable = true;
# recommendedProxySettings = true;
# virtualHosts = {
# "transmission2.${config.networking.hostName}.private" = {
# extraConfig = ''
# allow ${config.tinc.private.subnet};
# allow ${config.wireguard.wg0.subnet};
# deny all;
# '';
# locations."/" = {
# proxyPass = "http://127.0.0.1:${toString uiPort}";
# };
# };
# };
#};
}

View file

@ -1,76 +0,0 @@
{
config,
pkgs,
lib,
components,
inputs,
...
}:
let
vikunjaPort = 3456;
mysqlPort = 3337;
in
{
networking.firewall.interfaces.wg0.allowedTCPPorts = [ vikunjaPort ];
healthchecks.closed.public.ports.vikunja = [ vikunjaPort ];
containers.vikunja = {
privateNetwork = false;
autoStart = true;
config =
{ config, lib, ... }:
{
nixpkgs.pkgs = pkgs;
imports = [
"${components}/monitor/container.nix"
inputs.nix-topology.nixosModules.default
];
system.stateVersion = "24.05";
services.logrotate.checkConfig = false; # because uid 3000 does not exist in here
# Vikunja
# ----------
services.vikunja = {
enable = true;
port = vikunjaPort;
frontendScheme = "http";
frontendHostname = "vikunja.ingolf-wagner.de";
database.type = "sqlite";
#database = {
# type = "mysql";
# host = "localhost:${toString mysqlPort}";
# user = "vikunja";
#};
};
# MySQL Database
# --------------
services.mysql = {
enable = false;
package = pkgs.mariadb;
settings.mysqld.port = mysqlPort;
ensureDatabases = [ "vikunja" ];
ensureUsers = [
{
name = "vikunja";
ensurePermissions = {
"vikunja.*" = "ALL PRIVILEGES";
};
}
];
};
# Backup Database
# ---------------
services.mysqlBackup = {
enable = false;
databases = config.services.mysql.ensureDatabases;
singleTransaction = true;
};
};
};
}