infrastructure/machines/storage01/garage.nix

79 lines
1.8 KiB
Nix
Raw Normal View History

2023-09-11 11:17:52 +02:00
_:
let
host = "s3.dgnum.eu";
webHost = "cdn.dgnum.eu";
data_dir = "/data/slow/garage/data";
metadata_dir = "/data/fast/garage/meta";
2023-09-11 11:17:52 +02:00
in {
services.garage = {
enable = true;
settings = {
inherit data_dir metadata_dir;
2023-09-11 11:17:52 +02:00
replication_mode = "none";
compression_level = 7;
rpc_bind_addr = "[::]:3901";
rpc_public_addr = "127.0.0.1:3901";
rpc_secret =
"a79e86c6fc0e0a02ff71fd3c6127887b6e029ea6e8ade6c3de1a0b7b09ad2873";
s3_api = {
s3_region = "garage";
api_bind_addr = "127.0.0.1:3900";
2023-09-11 11:17:52 +02:00
root_domain = ".${host}";
};
s3_web = {
bind_addr = "127.0.0.1:3902";
2023-09-11 11:17:52 +02:00
root_domain = ".${webHost}";
index = "index.html";
};
k2v_api = { api_bind_addr = "[::]:3904"; };
admin = {
api_bind_addr = "0.0.0.0:3903";
admin_token = "KVGyC6SNrIwT4o9alxg7T1SWFs29vjev0AzLBwqchjo=";
};
};
};
systemd.services.garage.serviceConfig = {
User = "garage";
ReadWriteDirectories = [ data_dir metadata_dir ];
};
users.users.garage = {
isSystemUser = true;
group = "garage";
};
users.groups.garage = { };
services.nginx.virtualHosts = {
${host} = {
enableACME = true;
forceSSL = true;
locations."/".extraConfig = ''
proxy_pass http://127.0.0.1:3900;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
# Disable buffering to a temporary file.
proxy_max_temp_file_size 0;
'';
};
${webHost} = {
enableACME = true;
forceSSL = true;
locations."/".extraConfig = ''
proxy_pass http://127.0.0.1:3902;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;'';
};
2023-09-11 11:17:52 +02:00
};
}