massicot: switch to ssd

This commit is contained in:
xinyangli 2024-09-23 20:16:19 +08:00
parent 74fe93e5d8
commit 4822043a8b
Signed by: xin
SSH key fingerprint: SHA256:UU5pRTl7NiLFJbWJZa+snLylZSXIz5rgHmwjzv8v4oE
3 changed files with 41 additions and 17 deletions

View file

@ -37,6 +37,7 @@
"xin" "xin"
"zhuo" "zhuo"
"ycm" "ycm"
"yzl"
]; ];
}; };
grafana-superadmins = { grafana-superadmins = {
@ -73,6 +74,11 @@
displayName = "Chunming"; displayName = "Chunming";
mailAddresses = [ "chunmingyou@gmail.com" ]; mailAddresses = [ "chunmingyou@gmail.com" ];
}; };
yzl = {
displayName = "Zhengli Yang";
mailAddresses = [ "13391935399@189.cn" ];
};
}; };
systems.oauth2 = { systems.oauth2 = {
forgejo = { forgejo = {

View file

@ -268,7 +268,9 @@ in
virtualHosts."http://auth.xinyang.life:80".extraConfig = '' virtualHosts."http://auth.xinyang.life:80".extraConfig = ''
reverse_proxy ${config.security.acme.certs."auth.xinyang.life".listenHTTP} reverse_proxy ${config.security.acme.certs."auth.xinyang.life".listenHTTP}
''; '';
virtualHosts."https://auth.xinyang.life".extraConfig = '' virtualHosts."https://auth.xinyang.life".extraConfig =
let
reverseProxyKanidm = ''
reverse_proxy https://127.0.0.1:${toString kanidm_listen_port} { reverse_proxy https://127.0.0.1:${toString kanidm_listen_port} {
header_up Host {upstream_hostport} header_up Host {upstream_hostport}
header_down Access-Control-Allow-Origin "*" header_down Access-Control-Allow-Origin "*"
@ -277,6 +279,22 @@ in
} }
} }
''; '';
in
''
reverse_proxy /oauth2/openid/owncloud/userinfo https://127.0.0.1:${toString kanidm_listen_port} {
header_up Host {upstream_hostport}
header_down Access-Control-Allow-Origin "*"
transport http {
tls_server_name ${config.services.kanidm.serverSettings.domain}
}
@error status 400
handle_response @error {
rewrite /oauth2/openid/owncloud/userinfo /oauth2/openid/owncloud-android/userinfo
${reverseProxyKanidm}
}
}
${reverseProxyKanidm}
'';
virtualHosts."https://rss.xinyang.life".extraConfig = '' virtualHosts."https://rss.xinyang.life".extraConfig = ''
reverse_proxy ${config.custom.miniflux.environment.LISTEN_ADDR} reverse_proxy ${config.custom.miniflux.environment.LISTEN_ADDR}

View file

@ -5,9 +5,9 @@
... ...
}: }:
let let
sqliteBackup = path: '' sqliteBackup = fromPath: toPath: file: ''
mkdir -p /backup${path} mkdir -p ${toPath}
${lib.getExe pkgs.sqlite} ${path} "vacuum into '/var/backup${path}'" ${lib.getExe pkgs.sqlite} ${fromPath} ".backup '${toPath}/${file}'"
''; '';
in in
{ {
@ -25,7 +25,7 @@ in
repositoryFile = config.sops.secrets."restic/repo".path; repositoryFile = config.sops.secrets."restic/repo".path;
passwordFile = config.sops.secrets."restic/password".path; passwordFile = config.sops.secrets."restic/password".path;
paths = [ paths = [
"/var/backup" "/backup"
"/mnt/storage" "/mnt/storage"
]; ];
}; };
@ -34,15 +34,15 @@ in
enable = true; enable = true;
compression = "zstd"; compression = "zstd";
compressionLevel = 9; compressionLevel = 9;
location = "/var/backup/postgresql"; location = "/backup/postgresql";
}; };
services.restic.backups.${config.networking.hostName} = { services.restic.backups.${config.networking.hostName} = {
backupPrepareCommand = builtins.concatStringsSep "\n" [ backupPrepareCommand = builtins.concatStringsSep "\n" [
(sqliteBackup "/var/lib/hedgedoc/db.sqlite") (sqliteBackup "/var/lib/hedgedoc/db.sqlite" "/backup/hedgedoc" "db.sqlite")
(sqliteBackup "/var/lib/bitwarden_rs/db.sqlite3") (sqliteBackup "/var/lib/bitwarden_rs/db.sqlite3" "/backup/bitwarden_rs" "db.sqlite3")
(sqliteBackup "/var/lib/gotosocial/database.sqlite") (sqliteBackup "/var/lib/gotosocial/database.sqlite" "/backup/gotosocial" "database.sqlite")
(sqliteBackup "/var/lib/kanidm/kanidm.db") (sqliteBackup "/var/lib/kanidm/kanidm.db" "/backup/kanidm" "kanidm.db")
]; ];
extraBackupArgs = [ extraBackupArgs = [
"--limit-upload=1024" "--limit-upload=1024"