Compare commits

..

No commits in common. "5be4192143c5cf450d4ed615fa319776a8aec50c" and "57a2d11ae67d8996ee599d82853008638a3ca0b9" have entirely different histories.

4 changed files with 4 additions and 24 deletions

View file

@ -92,12 +92,6 @@ Ram: 3GB of Host
Build: `nixos-rebuild build-vm --flake .#U3ncSovm`
Run VM:
```bash
export QEMU_NET_OPTS="hostfwd=tcp::443-:443"
/nix/store/00your00hash00of00build999999999-nixos-vm/bin/run-U3ncSovm-vm
```
## License
[MIT © kB01](../LICENSE)

View file

@ -20,9 +20,9 @@ in
services.traefik.dynamicConfigOptions = {
http.routers.audiobookshelf.entrypoints = "websecure";
http.routers.audiobookshelf.tls = true;
http.routers.audiobookshelf.rule = "Host(`audiobookshelf.localhost`)";
http.routers.audiobookshelf.rule = "Host(`audiobookshelf.U3ncSovm`)";
http.routers.audiobookshelf.service = "audiobookshelf";
services.audiobookshelf.loadBalancer.servers = [ { url = "http://localhost:63001/"; } ];
services.audiobookshelf.loadBalancer.servers = [ { url = "http://localhost:63001"; } ];
};
};
}

View file

@ -11,7 +11,7 @@ let
in
{
config = lib.mkIf (cfg.enable && cfg.useTraefik.enable) {
# Default Config
services.traefik = {
enable = true;
staticConfigOptions = {
@ -19,19 +19,6 @@ in
entryPoints.websecure.address = ":443";
};
};
networking.firewall.interfaces.eth0.allowedTCPPorts = [ 80 443 ];
# Enable Secure Dashboard
services.traefik.staticConfigOptions.api = {};
services.traefik.dynamicConfigOptions = {
http.routers.dashboard.entrypoints = "websecure";
http.routers.dashboard.tls = true;
http.routers.dashboard.rule = "Host(`traefik.localhost`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))";
http.routers.dashboard.service = "api@internal";
http.routers.dashboard.middlewares = "auth";
http.middlewares.auth.basicauth.users = "master:\$\$2y\$\$05\$\$JwzsNHz7CMJh0RU1eMe3AOfY5H30Qr1Q/glS1r/qEHCNpo5LvWnRW";
};
};
}

View file

@ -28,7 +28,6 @@
users.users.master = {
initialPassword = "test";
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF82e+j7y8qsSvLn/DZuosvsH0S2EsHpqDkvZ8jiONm3 kb@LoyAdjo"
];
isNormalUser = true;
extraGroups = [ "wheel" ]; # Enable sudo for the user.
@ -49,7 +48,7 @@
# Enable NAS Functionality
services.nas = {
enable = true;
servers.audiobookshelf.enable = true;
servers.audiobookshelf = true;
};
# SSH and Mosh