forked from c3d2/nix-config
style of spacee (while reading)
This commit is contained in:
parent
81b1be4831
commit
b6c5f89a18
|
@ -15,7 +15,7 @@
|
|||
|
||||
c3d2.deployment = {
|
||||
server = "server9";
|
||||
mounts = [ "etc" "home" "var"];
|
||||
mounts = [ "etc" "home" "var" ];
|
||||
autoNetSetup = true;
|
||||
};
|
||||
|
||||
|
@ -30,10 +30,18 @@
|
|||
};
|
||||
|
||||
c3d2.hq.statistics.enable = true;
|
||||
|
||||
# List packages installed in system profile. To search, run:
|
||||
# $ nix search wget
|
||||
environment.systemPackages = with pkgs; [
|
||||
wget vim python3Full python310Packages.pip nmap htop wireguard-tools docker-compose
|
||||
wget
|
||||
vim
|
||||
python3Full
|
||||
python310Packages.pip
|
||||
nmap
|
||||
htop
|
||||
wireguard-tools
|
||||
docker-compose
|
||||
];
|
||||
|
||||
users.users.leon-docker = {
|
||||
|
@ -42,27 +50,27 @@
|
|||
createHome = true;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM2zpmWA3Z9zshWaU8k1SWyJnbAyasOu9pV+9BvTY0XE leon@¯\_(ツ)_/¯"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJPZoT83l0ogbJpviBs4VmO+NdF4NPtYAnyf8RRSoXsv leon@leon"
|
||||
];
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJPZoT83l0ogbJpviBs4VmO+NdF4NPtYAnyf8RRSoXsv leon@leon"
|
||||
];
|
||||
};
|
||||
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [ 80 443 22 53 14000 14500 15000 ];
|
||||
allowedUDPPorts = [ 18900 53 ];
|
||||
};
|
||||
#------------------DOCKER----------------------------
|
||||
|
||||
#>-----------------docker-------------------------
|
||||
|
||||
virtualisation.docker.enable = true;
|
||||
|
||||
#------------------DOCKER----------------------------
|
||||
#<-----------------docker-------------------------
|
||||
|
||||
#>-----------------wireguard client---------------
|
||||
|
||||
#------------------Wireguard-client----------------------------
|
||||
# Enable WireGuard
|
||||
networking.wireguard.interfaces = {
|
||||
vpn = {
|
||||
ips = [ "10.10.11.4/24" ];
|
||||
|
||||
privateKeyFile = "/etc/nixos/wireguard-keys/private-key";
|
||||
peers = [
|
||||
{
|
||||
|
@ -74,9 +82,11 @@
|
|||
];
|
||||
};
|
||||
};
|
||||
#------------------End----------------------------
|
||||
|
||||
#------------------next-cloud---------------------
|
||||
#<-----------------wireguard client---------------
|
||||
|
||||
#>-----------------nextcloud----------------------
|
||||
|
||||
services.nextcloud = {
|
||||
enable = true;
|
||||
hostName = "cloud";
|
||||
|
@ -87,18 +97,18 @@ services.nextcloud = {
|
|||
dbname = "nextcloud";
|
||||
adminpassFile = "/etc/nixos/next-cloud/pass";
|
||||
adminuser = "root";
|
||||
extraTrustedDomains = [ "172.20.79.254" "10.10.11.4" ];
|
||||
|
||||
};
|
||||
extraTrustedDomains = [ "172.20.79.254" "10.10.11.4" ];
|
||||
};
|
||||
};
|
||||
|
||||
services.postgresql = {
|
||||
enable = true;
|
||||
ensureDatabases = [ "nextcloud" ];
|
||||
ensureUsers = [
|
||||
{ name = "nextcloud";
|
||||
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
||||
}
|
||||
{
|
||||
name = "nextcloud";
|
||||
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -108,6 +118,8 @@ services.nextcloud = {
|
|||
after = ["postgresql.service"];
|
||||
};
|
||||
|
||||
#------------------End----------------------------
|
||||
#<-----------------nextcloud----------------------
|
||||
|
||||
system.stateVersion = "22.05";
|
||||
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue
Block a user