+15
-9
README.md
+15
-9
README.md
···-- Source IP is preserved using [systemd socket activation](https://github.com/eriksjolund/podman-networking-docs?tab=readme-ov-file#socket-activation-systemd-user-service) mechanism.+using [systemd socket activation](https://github.com/eriksjolund/podman-networking-docs?tab=readme-ov-file#socket-activation-systemd-user-service)······|-----------------------------------------|--------------------------------------------|-----|······- [ ] Consider switching to Flatcar Linux. Personally I like it more, but in the current version they didn't ship-`i915` driver, which is a dealbreaker for me. However, it's [already merged](https://github.com/flatcar/scripts/pull/2349)
+5
butane/fcos.yml.tftpl
+5
butane/fcos.yml.tftpl
+54
-5
configs/alloy/config.alloy
+54
-5
configs/alloy/config.alloy
·········
+28
configs/containers/systemd/element-call.container.tftpl
+28
configs/containers/systemd/element-call.container.tftpl
···
+31
configs/containers/systemd/element-web.container.tftpl
+31
configs/containers/systemd/element-web.container.tftpl
···
+9
-2
configs/containers/systemd/grafana-alloy.container.tftpl
+9
-2
configs/containers/systemd/grafana-alloy.container.tftpl
···+Exec=run --server.http.listen-addr=0.0.0.0:12345 --storage.path=/var/lib/alloy/data --disable-reporting /etc/alloy/config.alloy+Label="traefik.http.routers.grafana-alloy-auth.rule=Host(`alloy.${base_domain}`) && PathPrefix(`/oauth2/`)"···
+1
configs/containers/systemd/immich/immich-server.container.tftpl
+1
configs/containers/systemd/immich/immich-server.container.tftpl
+35
configs/containers/systemd/matrix-rtc/matrix-rtc-jwt.container.tftpl
+35
configs/containers/systemd/matrix-rtc/matrix-rtc-jwt.container.tftpl
···+Label="traefik.http.routers.matrix-rtc-jwt.rule=Host(`matrix-rtc.${base_domain}`) && PathPrefix(`/livekit/jwt`)"
+43
configs/containers/systemd/matrix-rtc/matrix-rtc-sfu.container.tftpl
+43
configs/containers/systemd/matrix-rtc/matrix-rtc-sfu.container.tftpl
···+Label="traefik.http.routers.matrix-rtc-sfu.rule=Host(`matrix-rtc.${base_domain}`) && PathPrefix(`/livekit/sfu`)"
+27
configs/containers/systemd/matrix-rtc/matrix-rtc-valkey.container.tftpl
+27
configs/containers/systemd/matrix-rtc/matrix-rtc-valkey.container.tftpl
···
+34
configs/containers/systemd/matrix/matrix-authentication-service.container.tftpl
+34
configs/containers/systemd/matrix/matrix-authentication-service.container.tftpl
···+Label="traefik.http.routers.matrix-authentication-service.rule=Host(`matrix-account.${base_domain}`) || (Host(`matrix.${base_domain}`) && PathRegexp(`^/_matrix/client/(.*)/(login|logout|refresh)`))"
+33
configs/containers/systemd/matrix/matrix-postgres.container.tftpl
+33
configs/containers/systemd/matrix/matrix-postgres.container.tftpl
···
+35
configs/containers/systemd/matrix/matrix-synapse.container.tftpl
+35
configs/containers/systemd/matrix/matrix-synapse.container.tftpl
···
+27
configs/containers/systemd/matrix/matrix-valkey.container.tftpl
+27
configs/containers/systemd/matrix/matrix-valkey.container.tftpl
···
+1
configs/containers/systemd/networks/matrix-rtc.network
+1
configs/containers/systemd/networks/matrix-rtc.network
···
+1
configs/containers/systemd/networks/matrix.network
+1
configs/containers/systemd/networks/matrix.network
···
+1
configs/containers/systemd/opencloud/opencloud-collaboration.container.tftpl
+1
configs/containers/systemd/opencloud/opencloud-collaboration.container.tftpl
···
+4
-1
configs/containers/systemd/pocket-id.container.tftpl
+4
-1
configs/containers/systemd/pocket-id.container.tftpl
······
+1
configs/containers/systemd/pods/immich.pod
+1
configs/containers/systemd/pods/immich.pod
+7
configs/containers/systemd/pods/matrix-rtc.pod
+7
configs/containers/systemd/pods/matrix-rtc.pod
+8
configs/containers/systemd/pods/matrix.pod
+8
configs/containers/systemd/pods/matrix.pod
+1
configs/containers/systemd/pods/opencloud.pod
+1
configs/containers/systemd/pods/opencloud.pod
+1
-1
configs/containers/systemd/tangled.container.tftpl
+1
-1
configs/containers/systemd/tangled.container.tftpl
-46
configs/containers/systemd/tuwunel.container.tftpl
-46
configs/containers/systemd/tuwunel.container.tftpl
···-Environment=TUWUNEL_TURN_URIS="[\"turn:turn.${base_domain}?transport=udp\", \"turn:turn.${base_domain}?transport=tcp\"]"
+22
configs/element/call.json.tftpl
+22
configs/element/call.json.tftpl
···+"ssla": "https://static.element.io/legal/element-software-and-services-license-agreement-uk-1.pdf",
+67
configs/element/web.json.tftpl
+67
configs/element/web.json.tftpl
···
+23
configs/matrix-rtc/livekit.yaml.tftpl
+23
configs/matrix-rtc/livekit.yaml.tftpl
···
+78
configs/matrix/homeserver.yaml.tftpl
+78
configs/matrix/homeserver.yaml.tftpl
···+turn_uris: [ "turn:turn.${base_domain}?transport=udp", "turn:turn.${base_domain}?transport=tcp" ]
+24
configs/matrix/log.config
+24
configs/matrix/log.config
···
+88
configs/matrix/mas.yaml.tftpl
+88
configs/matrix/mas.yaml.tftpl
···
+71
-8
fcos.tf
+71
-8
fcos.tf
···+synapse_registration_shared_secret : data.bitwarden_secret.synapse_registration_shared_secret.value+matrix_authentication_service_secret : data.bitwarden_secret.matrix_authentication_service_secret.value+matrix_authentication_service_secrets_encryption : data.bitwarden_secret.matrix_authentication_service_secrets_encryption.value+matrix_authentication_service_secrets_rsa_key : data.bitwarden_secret.matrix_authentication_service_secrets_rsa_key.value+matrix_authentication_service_secrets_p256_key : data.bitwarden_secret.matrix_authentication_service_secrets_p256_key.value+matrix_authentication_service_secrets_p384_key : data.bitwarden_secret.matrix_authentication_service_secrets_p384_key.value+matrix_authentication_service_secrets_secp256k1_key : data.bitwarden_secret.matrix_authentication_service_secrets_secp256k1_key.value+matrix_authentication_service_smtp_password : data.bitwarden_secret.matrix_authentication_service_smtp_password.value············
+73
-59
variables.tf
+73
-59
variables.tf
·········