dotfiles/nixos/boxes/bolty/home-assistant.nix

68 lines
1.4 KiB
Nix
Raw Normal View History

2023-08-13 17:00:41 +01:00
{
config,
pkgs,
inputs,
lib,
...
}: let
2023-04-22 22:37:02 +01:00
port = 8123;
path = "/data/nginx";
certPath = "${path}/cert.pem";
keyPath = "${path}/key.pem";
in {
2023-08-13 17:00:41 +01:00
imports = [../nginx.nix ./virtualisation.nix];
2023-04-22 12:30:19 +01:00
2023-08-13 17:00:41 +01:00
networking.firewall.allowedTCPPorts = [port 1883];
2023-07-13 19:36:21 +01:00
services.mosquitto = {
2023-08-13 17:00:41 +01:00
enable = true;
2023-07-13 19:36:21 +01:00
listeners = [
{
port = 1883;
omitPasswordAuth = true;
users = {};
settings = {
allow_anonymous = true;
};
2023-08-13 17:00:41 +01:00
acl = ["topic readwrite #"];
}
];
2023-07-13 19:36:21 +01:00
};
2023-04-22 22:37:02 +01:00
services.nginx = {
virtualHosts = {
"bolty.raptor-carp.ts.net" = {
forceSSL = true;
enableACME = false;
locations."/" = {
proxyPass = "http://10.0.0.244:8123";
proxyWebsockets = true;
};
sslCertificateKey = keyPath;
sslCertificate = certPath;
};
};
};
systemd.services.nginx-tailscale-certs = {
script = ''
mkdir -p ${path}
cp -rv /var/lib/tailscale-certs/cert.pem ${certPath}
cp -rv /var/lib/tailscale-certs/key.pem ${keyPath}
chown -Rv nginx:nginx ${path}
'';
serviceConfig = {
Type = "oneshot";
ReloadPropagatedFrom = "tailscale-cert.service";
};
2023-08-13 17:00:41 +01:00
before = ["nginx.service"];
wantedBy = ["multi-user.target"];
2023-04-22 22:37:02 +01:00
after = [
"network.target"
"network-online.target"
"tailscaled.service"
"tailscale-cert.service"
];
2023-08-13 17:00:41 +01:00
wants = ["tailscale-cert.service"];
2023-04-22 22:37:02 +01:00
};
2022-08-28 08:28:54 +01:00
}