1
0
Fork 0
dotfiles/container/weewx/default.nix

101 lines
2.3 KiB
Nix

{ config, ... }:
let
secret = import ../../secret/container/weewx;
data-dir = "/etc/container-weewx";
in
{
virtualisation.arion.projects.weewx.settings = {
services = {
weewx = {
service = {
image = "ghcr.io/nifoc/weewx-docker:master";
container_name = "weewx";
restart = "unless-stopped";
ports = [ "127.0.0.1:8000:8000" ];
environment = {
"TZ" = "Europe/Berlin";
};
volumes = [
"${data-dir}:/data"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"io.containers.autoupdate" = "registry";
};
};
};
};
};
systemd.tmpfiles.rules = [
"d ${data-dir} 0755 421 421"
"d ${data-dir}/html 0755 421 421"
];
environment.etc."container-weewx/weewx.conf" = {
source = ../../secret/container/weewx/config/weewx.conf;
mode = "0644";
uid = 421;
gid = 421;
};
services.mosquitto.listeners = [{
address = "0.0.0.0";
port = 1883;
users = {
weewx-proxy = {
hashedPasswordFile = config.age.secrets.mosquitto-password-weewx-proxy.path;
acl = [ "write weewx/+" ];
};
weewx = {
hashedPasswordFile = config.age.secrets.mosquitto-password-weewx.path;
acl = [ "read weewx/+" ];
};
};
}];
networking.firewall.interfaces =
let
mosquittoPorts = [ 1883 ];
in
{
"enp7s0".allowedTCPPorts = mosquittoPorts;
"tailscale0".allowedTCPPorts = mosquittoPorts;
"podman+".allowedTCPPorts = mosquittoPorts;
};
services.nginx.virtualHosts."${secret.container.weewx.hostname}" = {
http3 = true;
kTLS = true;
root = "${data-dir}/html/wdc";
forceSSL = true;
useACMEHost = "kempkens.io";
extraConfig = ''
index index.html;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
'';
locations."~* \.html$".extraConfig = ''
expires modified 120s;
'';
locations."~* \.(js|css)$".extraConfig = ''
expires 1h;
'';
locations."~ ^/dwd/(icons|warn_icons)/" = {
recommendedProxySettings = true;
proxyPass = "http://127.0.0.1:8000";
};
locations."~ ^/dwd/[\w]+\.(gif|png)".extraConfig = ''
expires modified 1h;
'';
};
}