1
1
Fork 0

Compare commits

..

3 Commits

Author SHA1 Message Date
Bill Ewanick e4ac56d530 Try woodpecker CI/CD 2024-01-20 16:43:36 -05:00
Bill Ewanick b9532ad6e8 Disable fancyTypist.dev site 2024-01-20 16:43:13 -05:00
Bill Ewanick 52ce8f5611 Add spelling dictionary 2024-01-15 14:56:45 -05:00
4 changed files with 84 additions and 8 deletions

View File

@ -1,6 +1,12 @@
{
"cSpell.words": [
"Aeson",
"axios",
"dhall",
"HLINT",
"jquery",
"pandoc",
"photoframe"
"photoframe",
"unrecognised"
]
}

View File

@ -11,6 +11,8 @@
./fancytypist.com.nix
./hydra.fancyTypist.com.nix
./woodpecker.fancyTypist.dev.nix
];
# when in doubt, clear away the certs with

View File

@ -35,18 +35,18 @@ in
'';
};
"fancytypist.dev" = {
serverAliases = [ "www.fancytypist.dev" ];
extraConfig = ''
reverse_proxy ${HOST}:${toString PORT}
'';
};
# "fancytypist.dev" = {
# serverAliases = [ "www.fancytypist.dev" ];
# extraConfig = ''
# reverse_proxy ${HOST}:${toString PORT}
# '';
# };
};
};
systemd.services = {
fancyTypistDotDev-site = {
enable = true;
enable = false;
description = "The Haskell Servant executable server that hosts my FancyTypist.dev site.";
path = with pkgs; [ nix git ];
script = ''

View File

@ -0,0 +1,68 @@
{ config
, ...
}:
let
domain = "woodpecker.fancyTypist.dev";
in
{
# This automatically sets up certificates via let's encrypt
# security.acme.defaults.email = "admin@fancytypist.dev";
# security.acme.acceptTerms = true;
# security.acme.certs."${domain}" = { };
# Setting up a nginx proxy that handles tls for us
networking.firewall.allowedTCPPorts = [ 80 443 ];
services.nginx = {
enable = true;
recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
virtualHosts."${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:3007";
};
};
};
services.woodpecker-server = {
enable = true;
environment = {
WOODPECKER_HOST = "https://${domain}";
WOODPECKER_SERVER_ADDR = ":3007";
WOODPECKER_OPEN = "true";
};
# You can pass a file with env vars to the system it could look like:
# WOODPECKER_AGENT_SECRET=XXXXXXXXXXXXXXXXXXXXXX
# environmentFile = "/path/to/my/secrets/file";
};
# This sets up a woodpecker agent
services.woodpecker-agents.agents."docker" = {
enable = true;
# We need this to talk to the podman socket
extraGroups = [ "podman" ];
environment = {
WOODPECKER_SERVER = "localhost:9000";
WOODPECKER_MAX_WORKFLOWS = "4";
DOCKER_HOST = "unix:///run/podman/podman.sock";
WOODPECKER_BACKEND = "docker";
};
# Same as with woodpecker-server
# environmentFile = [ "/var/lib/secrets/woodpecker.env" ];
};
# Here we setup podman and enable dns
virtualisation.podman = {
enable = true;
defaultNetwork.settings = {
dns_enabled = true;
};
};
# This is needed for podman to be able to talk over dns
networking.firewall.interfaces."podman0" = {
allowedUDPPorts = [ 53 ];
allowedTCPPorts = [ 53 ];
};
}