Compare commits
3 commits
0961e81a9f
...
63002031d6
Author | SHA1 | Date | |
---|---|---|---|
63002031d6 | |||
c7f89489da | |||
9ed7d26952 |
9 changed files with 41 additions and 31 deletions
|
@ -1,6 +1,11 @@
|
|||
{ depot, ... }:
|
||||
|
||||
{
|
||||
services.fbi = {
|
||||
nodes.host = [ "VEGAS" ];
|
||||
nixos.host = ./host.nix;
|
||||
};
|
||||
|
||||
dns.records = let
|
||||
fbiAddr = [ depot.hours.VEGAS.interfaces.primary.addrPublic ];
|
||||
in {
|
||||
|
|
|
@ -1,5 +1,10 @@
|
|||
{ depot, ... }:
|
||||
|
||||
{
|
||||
services.reflex = {
|
||||
nodes.host = [ "VEGAS" ];
|
||||
nixos.host = ./host.nix;
|
||||
};
|
||||
|
||||
dns.records.reflex.target = [ depot.hours.VEGAS.interfaces.primary.addrPublic ];
|
||||
}
|
||||
|
|
|
@ -1,6 +1,11 @@
|
|||
{ depot, ... }:
|
||||
|
||||
{
|
||||
services.soda = {
|
||||
nodes.host = [ "VEGAS" ];
|
||||
nixos.host = ./host.nix;
|
||||
};
|
||||
|
||||
monitoring.blackbox.targets.soda-machine = {
|
||||
address = "soda.int.${depot.lib.meta.domain}:22";
|
||||
module = "sshConnect";
|
||||
|
|
26
cluster/services/soda/host.nix
Normal file
26
cluster/services/soda/host.nix
Normal file
|
@ -0,0 +1,26 @@
|
|||
{ depot, ... }:
|
||||
|
||||
{
|
||||
containers.soda = {
|
||||
path = depot.nixosConfigurations.soda.config.system.build.toplevel;
|
||||
privateNetwork = true;
|
||||
hostBridge = "vmdefault";
|
||||
localAddress = "${depot.hours.soda.interfaces.primary.addr}/24";
|
||||
autoStart = true;
|
||||
bindMounts.sodaDir = {
|
||||
hostPath = "/srv/storage/www/soda";
|
||||
mountPoint = "/soda";
|
||||
isReadOnly = false;
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services."container@soda".after = [ "libvirtd.service" "sys-devices-virtual-net-vmdefault.device" ];
|
||||
|
||||
networking.nat.forwardPorts = [
|
||||
{
|
||||
sourcePort = 52222;
|
||||
destination = "${depot.hours.soda.interfaces.primary.addr}:22";
|
||||
proto = "tcp";
|
||||
}
|
||||
];
|
||||
}
|
|
@ -3,10 +3,6 @@ let
|
|||
inherit (config.reflection) interfaces;
|
||||
in
|
||||
{
|
||||
imports = [
|
||||
./port-forward.nix
|
||||
];
|
||||
|
||||
networking.nat = {
|
||||
enable = true;
|
||||
externalInterface = interfaces.primary.link;
|
||||
|
|
|
@ -1,11 +0,0 @@
|
|||
{ depot, ... }:
|
||||
|
||||
{
|
||||
networking.nat.forwardPorts = [
|
||||
{
|
||||
sourcePort = 52222;
|
||||
destination = "${depot.hours.soda.interfaces.primary.addr}:22";
|
||||
proto = "tcp";
|
||||
}
|
||||
];
|
||||
}
|
|
@ -18,12 +18,10 @@
|
|||
./services/backbone-routing
|
||||
./services/bitwarden
|
||||
./services/cdn-shield
|
||||
./services/fbi
|
||||
./services/gitlab
|
||||
./services/jokes
|
||||
./services/mail
|
||||
./services/minecraft
|
||||
./services/reflex
|
||||
./services/sso
|
||||
./services/websites
|
||||
./services/wireguard-server
|
||||
|
@ -90,18 +88,4 @@
|
|||
|
||||
system.stateVersion = "21.05";
|
||||
services.openssh.settings.PasswordAuthentication = false;
|
||||
|
||||
containers.soda = {
|
||||
path = depot.nixosConfigurations.soda.config.system.build.toplevel;
|
||||
privateNetwork = true;
|
||||
hostBridge = "vmdefault";
|
||||
localAddress = "${depot.hours.soda.interfaces.primary.addr}/24";
|
||||
autoStart = true;
|
||||
bindMounts.sodaDir = {
|
||||
hostPath = "/srv/storage/www/soda";
|
||||
mountPoint = "/soda";
|
||||
isReadOnly = false;
|
||||
};
|
||||
};
|
||||
systemd.services."container@soda".after = [ "libvirtd.service" "sys-devices-virtual-net-vmdefault.device" ];
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue