forked from c3d2/nix-config
style of spacee (while reading)
This commit is contained in:
parent
81b1be4831
commit
b6c5f89a18
|
@ -30,10 +30,18 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
c3d2.hq.statistics.enable = true;
|
c3d2.hq.statistics.enable = true;
|
||||||
|
|
||||||
# List packages installed in system profile. To search, run:
|
# List packages installed in system profile. To search, run:
|
||||||
# $ nix search wget
|
# $ nix search wget
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
wget vim python3Full python310Packages.pip nmap htop wireguard-tools docker-compose
|
wget
|
||||||
|
vim
|
||||||
|
python3Full
|
||||||
|
python310Packages.pip
|
||||||
|
nmap
|
||||||
|
htop
|
||||||
|
wireguard-tools
|
||||||
|
docker-compose
|
||||||
];
|
];
|
||||||
|
|
||||||
users.users.leon-docker = {
|
users.users.leon-docker = {
|
||||||
|
@ -50,19 +58,19 @@
|
||||||
allowedTCPPorts = [ 80 443 22 53 14000 14500 15000 ];
|
allowedTCPPorts = [ 80 443 22 53 14000 14500 15000 ];
|
||||||
allowedUDPPorts = [ 18900 53 ];
|
allowedUDPPorts = [ 18900 53 ];
|
||||||
};
|
};
|
||||||
#------------------DOCKER----------------------------
|
|
||||||
|
#>-----------------docker-------------------------
|
||||||
|
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
|
|
||||||
#------------------DOCKER----------------------------
|
#<-----------------docker-------------------------
|
||||||
|
|
||||||
|
#>-----------------wireguard client---------------
|
||||||
|
|
||||||
#------------------Wireguard-client----------------------------
|
|
||||||
# Enable WireGuard
|
# Enable WireGuard
|
||||||
networking.wireguard.interfaces = {
|
networking.wireguard.interfaces = {
|
||||||
vpn = {
|
vpn = {
|
||||||
ips = [ "10.10.11.4/24" ];
|
ips = [ "10.10.11.4/24" ];
|
||||||
|
|
||||||
privateKeyFile = "/etc/nixos/wireguard-keys/private-key";
|
privateKeyFile = "/etc/nixos/wireguard-keys/private-key";
|
||||||
peers = [
|
peers = [
|
||||||
{
|
{
|
||||||
|
@ -74,9 +82,11 @@
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
#------------------End----------------------------
|
|
||||||
|
|
||||||
#------------------next-cloud---------------------
|
#<-----------------wireguard client---------------
|
||||||
|
|
||||||
|
#>-----------------nextcloud----------------------
|
||||||
|
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
hostName = "cloud";
|
hostName = "cloud";
|
||||||
|
@ -88,7 +98,6 @@ services.nextcloud = {
|
||||||
adminpassFile = "/etc/nixos/next-cloud/pass";
|
adminpassFile = "/etc/nixos/next-cloud/pass";
|
||||||
adminuser = "root";
|
adminuser = "root";
|
||||||
extraTrustedDomains = [ "172.20.79.254" "10.10.11.4" ];
|
extraTrustedDomains = [ "172.20.79.254" "10.10.11.4" ];
|
||||||
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -96,7 +105,8 @@ services.nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
ensureDatabases = [ "nextcloud" ];
|
ensureDatabases = [ "nextcloud" ];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{ name = "nextcloud";
|
{
|
||||||
|
name = "nextcloud";
|
||||||
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
@ -108,6 +118,8 @@ services.nextcloud = {
|
||||||
after = ["postgresql.service"];
|
after = ["postgresql.service"];
|
||||||
};
|
};
|
||||||
|
|
||||||
#------------------End----------------------------
|
#<-----------------nextcloud----------------------
|
||||||
|
|
||||||
system.stateVersion = "22.05";
|
system.stateVersion = "22.05";
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue
Block a user