nix-config/modules/nix/containers/nixos/traefik.nix
smayzy e5f57c30da
All checks were successful
nixos config pipeline / show-flake (push) Successful in 24s
nixos config pipeline / deploy (push) Successful in 27s
add servarr and proxmox to traefik
2025-09-05 19:50:30 +02:00

191 lines
6.8 KiB
Nix

{ lib, config, ... }:
let
inherit (lib) mkIf mkOption types;
cfg = config.smayzy.containers.nixos.traefik;
net = config.smayzy.containers.networking;
in
{
options.smayzy.containers.nixos.traefik = {
enable = mkOption {
type = types.bool;
default = false;
description = "traefik nixos ct";
};
ip = mkOption {
type = types.str;
description = "ip addr e.g. (192.168.1.20)";
};
};
config = mkIf cfg.enable {
age.secrets.traefik-cf-tk = {
file = ../../../../secrets/traefik-cf-tk.age;
owner = "root";
group = "root";
mode = "0400";
};
containers.traefik = {
bindMounts."/run/secrets/traefik-cf-tk" = {
hostPath = config.age.secrets.traefik-cf-tk.path;
isReadOnly = true;
};
autoStart = true;
privateNetwork = true;
hostBridge = net.bridge;
localAddress = cfg.ip;
config = { ... }: {
system.stateVersion = "25.11";
networking.defaultGateway = net.gateway;
networking.nameservers = net.dns;
networking.firewall.allowedTCPPorts = [ 80 443 880 4443 ];
systemd.services.traefik.serviceConfig.EnvironmentFile = [
"/run/secrets/traefik-cf-tk"
];
services.traefik = {
enable = true;
staticConfigOptions = {
log = {
level = "WARN";
};
api = {
dashboard = true;
};
entryPoints = {
local = {
address = ":80";
};
localSec = {
address = ":443";
};
ext = {
address = ":880";
};
extSec = {
address = ":4443";
};
};
certificatesResolvers = {
cloudflare = {
acme = {
email = "smayzy@smayzy.ovh";
storage = "/var/lib/traefik/acme.json";
dnsChallenge = {
provider = "cloudflare";
resolvers = [ "192.168.1.202" ];
propagation.delayBeforeChecks = 15;
};
};
};
};
};
dynamicConfigOptions = {
http = {
routers = {
traefik = {
rule = "Host(`traefik.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "api@internal";
tls.certResolver = "cloudflare";
};
httpd = {
rule = "Host(`httpd.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "httpd";
tls.certResolver = "cloudflare";
};
bazarr-anime = {
rule = "Host(`bazarr-anime.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "bazarr-anime";
tls.certResolver = "cloudflare";
};
bazarr = {
rule = "Host(`bazarr.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "bazarr";
tls.certResolver = "cloudflare";
};
lidarr = {
rule = "Host(`lidarr.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "lidarr";
tls.certResolver = "cloudflare";
};
nzbget = {
rule = "Host(`nzbget.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "nzbget";
tls.certResolver = "cloudflare";
};
prowlarr = {
rule = "Host(`prowlarr.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "prowlarr";
tls.certResolver = "cloudflare";
};
qbittorrent = {
rule = "Host(`qbittorrent.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "qbittorrent";
tls.certResolver = "cloudflare";
};
radarr = {
rule = "Host(`radarr.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "radarr";
tls.certResolver = "cloudflare";
};
sonarr-anime = {
rule = "Host(`sonarr-anime.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "sonarr-anime";
tls.certResolver = "cloudflare";
};
sonarr = {
rule = "Host(`sonarr.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "sonarr";
tls.certResolver = "cloudflare";
};
srv1-proxmox = {
rule = "Host(`srv1-proxmox.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "srv1-proxmox";
tls.certResolver = "cloudflare";
};
srv2-proxmox = {
rule = "Host(`srv2-proxmox.internal.smayzy.ovh`)";
entryPoints = [ "localSec" ];
service = "srv2-proxmox";
tls.certResolver = "cloudflare";
};
};
services = {
"httpd".loadBalancer.servers = [ { url = "http://192.168.1.201" ; } ];
"bazarr-anime".loadBalancer.servers = [ { url = "http://192.168.1.147:6768"; } ];
"bazarr".loadBalancer.servers = [ { url = "http://192.168.1.147:6767"; } ];
"lidarr".loadBalancer.servers = [ { url = "http://192.168.1.147:8686"; } ];
"nzbget".loadBalancer.servers = [ { url = "http://192.168.1.147:6789"; } ];
"prowlarr".loadBalancer.servers = [ { url = "http://192.168.1.147:9696"; } ];
"qbittorrent".loadBalancer.servers = [ { url = "http://192.168.1.147:8080"; } ];
"radarr".loadBalancer.servers = [ { url = "http://192.168.1.147:7878"; } ];
"sonarr-anime".loadBalancer.servers = [ { url = "http://192.168.1.147:8988"; } ];
"sonarr".loadBalancer.servers = [ { url = "http://192.168.1.147:8989"; } ];
"srv1-proxmox".loadBalancer.servers = [ { url = "http://192.168.1.193:8006"; } ];
"srv2-proxmox".loadBalancer.servers = [ { url = "http://192.168.1.113:8006"; } ];
};
};
};
};
};
};
};
}