Compare commits
85 commits
| Author | SHA1 | Date | |
|---|---|---|---|
| c356952829 | |||
| 6c9e6893b9 | |||
|
|
6b002df0c8 | ||
| 74a073513b | |||
| 932a0210a3 | |||
| b2482bcd0e | |||
|
|
7d3a905a5b | ||
|
|
0a05b244b9 | ||
|
|
3fa70d15e1 | ||
| a4968bffc1 | |||
| 2e2e7c13a6 | |||
| 317f1bfb0d | |||
| 1844cb7ef3 | |||
| ca16e3af50 | |||
| 41f68392eb | |||
| 68359e345d | |||
| 17b279a41b | |||
|
|
1ad4f3a598 | ||
| 4ebfb82746 | |||
| f444c9a9ea | |||
| 25391e3261 | |||
| b41fbbe6f8 | |||
| 0a01c859ab | |||
| 68bd97fe3a | |||
| 2210d8eecf | |||
| 997aa93cdc | |||
| beb429d72d | |||
| 43f898a7c5 | |||
| 3d8655d208 | |||
| c7d5cf033b | |||
| da1928e8ca | |||
| b1ff58b3d9 | |||
| aa404c2de6 | |||
| b38af9cce3 | |||
| 57b2d2f051 | |||
| 8ffde247cf | |||
| cfd54d3f7f | |||
| d3f12d97e9 | |||
| 840bcd4cea | |||
| 5b36b4089d | |||
| d3c8c253f2 | |||
| fec23849d3 | |||
| 71c97ab7a5 | |||
| 2895a51862 | |||
| bdd876cdfd | |||
| ed2a33f3a6 | |||
| b43a55bb9f | |||
| 8d718be321 | |||
| dac10cfe1a | |||
| 86fef3990e | |||
|
|
b2bd89105d | ||
| 1c537e6c1b | |||
| 33ba5078e7 | |||
| 8c1c1e864b | |||
| 69f780a9f2 | |||
| e21bba4363 | |||
|
|
c0e5c26ae9 | ||
|
|
32ac87ee41 | ||
| 34df05f81a | |||
| 7a784af41d | |||
| 03650c11c0 | |||
| 708014dbdc | |||
| 6b93088039 | |||
|
|
965c43679a | ||
|
|
25fb72c8ec | ||
|
|
b738c1451f | ||
|
|
487523ce55 | ||
|
|
1c508735c0 | ||
|
|
5557db3a54 | ||
|
|
4ee143230e | ||
|
|
071126e9c3 | ||
|
|
ca550f134f | ||
|
|
c975d30f4f | ||
|
|
3d860de343 | ||
|
|
4ba7a0328a | ||
|
|
8750d000bc | ||
|
|
41781e6a17 | ||
|
|
27530f0de0 | ||
|
|
2fc3df27a4 | ||
|
|
e970325774 | ||
|
|
5669eb73f1 | ||
|
|
eb43445854 | ||
| 306652ff73 | |||
| d173ab984f | |||
| c710e06232 |
69 changed files with 795 additions and 442 deletions
4
.EditorConfig
Normal file
4
.EditorConfig
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
root = true
|
||||||
|
|
||||||
|
[*.nix]
|
||||||
|
indent_style = "tab"
|
||||||
Binary file not shown.
Binary file not shown.
3
.gitmodules
vendored
Normal file
3
.gitmodules
vendored
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
[submodule "config/hosts/grondahl/services/ooye"]
|
||||||
|
path = config/hosts/grondahl/services/ooye
|
||||||
|
url = https://cgit.rory.gay/nix/OOYE-module.git
|
||||||
12
Makefile
Normal file
12
Makefile
Normal file
|
|
@ -0,0 +1,12 @@
|
||||||
|
all: result
|
||||||
|
|
||||||
|
.PHONY: update result deploy
|
||||||
|
|
||||||
|
result:
|
||||||
|
nix build -f deploy/default.nix
|
||||||
|
|
||||||
|
update:
|
||||||
|
cd config/sources && niv update
|
||||||
|
|
||||||
|
deploy:
|
||||||
|
./result
|
||||||
26
README.md
26
README.md
|
|
@ -1 +1,27 @@
|
||||||
NixOS deployments using [nixus](https://github.com/Infinisil/nixus).
|
NixOS deployments using [nixus](https://github.com/Infinisil/nixus).
|
||||||
|
|
||||||
|
TL;DR:
|
||||||
|
1. `make update`
|
||||||
|
2. `make result`
|
||||||
|
3. `make deploy`
|
||||||
|
|
||||||
|
First make sure you have `niv` so you can upgrade dependency versions in `sources.json`.
|
||||||
|
```sh
|
||||||
|
nix-shell -p niv
|
||||||
|
(cd config/sources && niv update)
|
||||||
|
```
|
||||||
|
Build with:
|
||||||
|
```sh
|
||||||
|
nix-build deploy/
|
||||||
|
```
|
||||||
|
Deploy by running the generated executable.
|
||||||
|
```sh
|
||||||
|
./result
|
||||||
|
```
|
||||||
|
|
||||||
|
## Switching nixpkgs branch
|
||||||
|
```sh
|
||||||
|
cd config/sources
|
||||||
|
niv modify nixpkgs -b nixos-xx.yy
|
||||||
|
```
|
||||||
|
|
||||||
|
|
|
||||||
12
config/common/configuration/documentation.nix
Normal file
12
config/common/configuration/documentation.nix
Normal file
|
|
@ -0,0 +1,12 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# Some docs fail to build, so we need to disable some of it
|
||||||
|
documentation = {
|
||||||
|
enable = true;
|
||||||
|
man.enable = true;
|
||||||
|
doc.enable = true;
|
||||||
|
dev.enable = false;
|
||||||
|
nixos.enable = false;
|
||||||
|
};
|
||||||
|
}
|
||||||
12
config/common/configuration/nix.nix
Normal file
12
config/common/configuration/nix.nix
Normal file
|
|
@ -0,0 +1,12 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
# Configuration options for the nix package manager
|
||||||
|
{
|
||||||
|
nix.gc = {
|
||||||
|
# Run garbage collection automatically
|
||||||
|
automatic = true;
|
||||||
|
# Run it once a week
|
||||||
|
dates = "weekly";
|
||||||
|
options = "--delete-older-than 30d";
|
||||||
|
};
|
||||||
|
}
|
||||||
1
config/common/data/pubkeys/backup_host_ed25519_key.pub
Normal file
1
config/common/data/pubkeys/backup_host_ed25519_key.pub
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG4C5OgZpxoF42L5rPqwejs+Q1ViN9TM9o/fEbpnPFtA
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH+ZQk80BU/OdQfV990yrkFwvsLVbVZ2Itof/qwxjTn7
|
|
||||||
|
|
@ -20,26 +20,26 @@
|
||||||
map $scheme $hsts_header {
|
map $scheme $hsts_header {
|
||||||
https "max-age=31536000; includeSubdomains; preload";
|
https "max-age=31536000; includeSubdomains; preload";
|
||||||
}
|
}
|
||||||
add_header Strict-Transport-Security $hsts_header;
|
#add_header Strict-Transport-Security $hsts_header;
|
||||||
|
|
||||||
# Enable CSP for your services.
|
# Enable CSP for your services.
|
||||||
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
|
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
|
||||||
|
|
||||||
# Minimize information leaked to other domains
|
# Minimize information leaked to other domains
|
||||||
add_header 'Referrer-Policy' 'same-origin';
|
#add_header 'Referrer-Policy' 'same-origin';
|
||||||
|
|
||||||
# Disable embedding as a frame
|
# Disable embedding as a frame
|
||||||
add_header X-Frame-Options DENY;
|
#add_header X-Frame-Options DENY;
|
||||||
|
|
||||||
# Prevent injection of code in other mime types (XSS Attacks)
|
# Prevent injection of code in other mime types (XSS Attacks)
|
||||||
add_header X-Content-Type-Options nosniff;
|
#add_header X-Content-Type-Options nosniff;
|
||||||
|
|
||||||
# Enable XSS protection of the browser.
|
# Enable XSS protection of the browser.
|
||||||
# May be unnecessary when CSP is configured properly (see above)
|
# May be unnecessary when CSP is configured properly (see above)
|
||||||
add_header X-XSS-Protection "1; mode=block";
|
#add_header X-XSS-Protection "1; mode=block";
|
||||||
|
|
||||||
# This might create errors
|
# This might create errors
|
||||||
proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict";
|
#proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict";
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -2,19 +2,21 @@
|
||||||
{
|
{
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
permitRootLogin = "no";
|
|
||||||
passwordAuthentication = false;
|
|
||||||
challengeResponseAuthentication = false;
|
|
||||||
hostKeys = [ { path = config.secrets.files.ssh_host_ed25519_key.file; type = "ed25519"; } ];
|
hostKeys = [ { path = config.secrets.files.ssh_host_ed25519_key.file; type = "ed25519"; } ];
|
||||||
kexAlgorithms = [ "curve25519-sha256" "curve25519-sha256@libssh.org" ];
|
settings = {
|
||||||
macs = [ "hmac-sha2-512-etm@openssh.com" "hmac-sha2-512-etm@openssh.com" "umac-128-etm@openssh.com" ];
|
KexAlgorithms = [ "curve25519-sha256" "curve25519-sha256@libssh.org" ];
|
||||||
|
Macs = [ "hmac-sha2-512-etm@openssh.com" "hmac-sha2-512-etm@openssh.com" "umac-128-etm@openssh.com" ];
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
KbdInteractiveAuthentication = false;
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
programs.ssh.knownHosts = {
|
programs.ssh.knownHosts = {
|
||||||
despondos = {
|
backup = {
|
||||||
hostNames = [ "despondos.nao.sh" ];
|
hostNames = [ "backup.graven.dev" ];
|
||||||
publicKeyFile = ../data/pubkeys/despondos_host_ed25519_key.pub;
|
publicKeyFile = ../data/pubkeys/backup_host_ed25519_key.pub;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
37
config/common/services/tailscale.nix
Normal file
37
config/common/services/tailscale.nix
Normal file
|
|
@ -0,0 +1,37 @@
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
{
|
||||||
|
environment.systemPackages = [ pkgs.tailscale ];
|
||||||
|
|
||||||
|
services.tailscale.enable = false;
|
||||||
|
|
||||||
|
# ...
|
||||||
|
|
||||||
|
# create a oneshot job to authenticate to Tailscale
|
||||||
|
systemd.services.tailscale-autoconnect = {
|
||||||
|
description = "Automatic connection to Tailscale";
|
||||||
|
|
||||||
|
# make sure tailscale is running before trying to connect to tailscale
|
||||||
|
after = [ "network-pre.target" "tailscale.service" ];
|
||||||
|
wants = [ "network-pre.target" "tailscale.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
|
# set this service as a oneshot job
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
|
||||||
|
# have the job run this shell script
|
||||||
|
script = with pkgs; ''
|
||||||
|
# wait for tailscaled to settle
|
||||||
|
sleep 2
|
||||||
|
|
||||||
|
# check if we are already authenticated to tailscale
|
||||||
|
status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)"
|
||||||
|
if [ $status = "Running" ]; then # if so, then do nothing
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
# otherwise authenticate with tailscale
|
||||||
|
${tailscale}/bin/tailscale up -authkey CHANGEME
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -5,8 +5,7 @@
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = [ "wheel" ];
|
extraGroups = [ "wheel" ];
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICO4LyBsW1YuUA6i3EL/IZhchSvk7reO4qgRmR/tdQPU emelie@flap"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAn9xV1GA/hMkCFoP7DWzYyGmbeiri823fHMRz0ZVoxq emelie-personal-bw"
|
||||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIGRtSxLRqPWmsn161ybDFcMYxrBKhay5a485tlM8hQEuAAAABHNzaDo= emelie@thinky-fed"
|
|
||||||
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
@ -17,6 +16,10 @@
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILwmREgBmckocQerEfO4XhB+dbKDsZopok37ePWHwCEj id_ed25519"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILwmREgBmckocQerEfO4XhB+dbKDsZopok37ePWHwCEj id_ed25519"
|
||||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAILrZWS1PBVRbdmPh8IJdIPHhK0+ZuSnQCR10a8Bl11VZAAAABHNzaDo= amanda@sharpy"
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAILrZWS1PBVRbdmPh8IJdIPHhK0+ZuSnQCR10a8Bl11VZAAAABHNzaDo= amanda@sharpy"
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO6v5D/aJuIhuIVcnzFA7ocxPMI8JgHEnxSPuD+SaLHX amanda@sharpy"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO6v5D/aJuIhuIVcnzFA7ocxPMI8JgHEnxSPuD+SaLHX amanda@sharpy"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG+0x2uHcuXpFQdeXeUWeLGPefWo6Sd7yy2FJlyZy8V+ amanda@tappy"
|
||||||
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIFKWhc20jOFF+pVVT/Mf1ACYOtppkYWkP7NkY0/fPvjPAAAAFHNzaDphMy1uazNhLXBlcnNvbmFs ssh:a3-nk3a-personal"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGMLbLay9KARrdb8QM4OLzmqWIN48rZMX6wCddBwYT/U amanda@gpg"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICGMWTQc7A3W/LI4AgFWy/Uw/+oMucmSziuJKxC2rleo amanda@bitwarden"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -5,23 +5,26 @@
|
||||||
[ # Include the results of the hardware scan.
|
[ # Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
./data/secrets/secrets.nix
|
./data/secrets/secrets.nix
|
||||||
|
../../common/configuration/nix.nix
|
||||||
|
../../common/configuration/documentation.nix
|
||||||
../../common/services/ssh.nix
|
../../common/services/ssh.nix
|
||||||
|
../../common/services/tailscale.nix
|
||||||
../../common/users.nix
|
../../common/users.nix
|
||||||
./services/acme.nix
|
./services/acme.nix
|
||||||
|
./services/borg.nix
|
||||||
./services/coturn.nix
|
./services/coturn.nix
|
||||||
./services/nginx.nix
|
./services/nginx.nix
|
||||||
./services/restic.nix
|
|
||||||
./services/synapse.nix
|
./services/synapse.nix
|
||||||
./services/postgres.nix
|
./services/postgres.nix
|
||||||
|
./services/ooye.nix
|
||||||
#./services/mail.nix
|
#./services/mail.nix
|
||||||
#./services/containers.nix
|
#./services/containers.nix
|
||||||
#./services/redis.nix
|
#./services/redis.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.loader.grub.enable = true;
|
boot.loader.grub.enable = true;
|
||||||
boot.loader.grub.version = 2;
|
|
||||||
boot.loader.grub.device = "/dev/vda";
|
boot.loader.grub.device = "/dev/vda";
|
||||||
boot.kernelPackages = pkgs.linuxPackages_5_10;
|
boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "grondahl";
|
hostName = "grondahl";
|
||||||
useDHCP = false;
|
useDHCP = false;
|
||||||
|
|
@ -49,9 +52,9 @@
|
||||||
|
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
|
|
||||||
nix = {
|
nix.settings = {
|
||||||
autoOptimiseStore = true;
|
auto-optimise-store = true;
|
||||||
trustedUsers = [
|
trusted-users = [
|
||||||
"root"
|
"root"
|
||||||
"@wheel"
|
"@wheel"
|
||||||
];
|
];
|
||||||
|
|
@ -72,9 +75,15 @@
|
||||||
dig
|
dig
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 22 80 443 ];
|
networking.firewall = {
|
||||||
networking.firewall.allowedTCPPortRanges = [ { from = 3478; to = 3479; } { from = 5349; to = 5350; } ];
|
enable = true;
|
||||||
networking.firewall.allowedUDPPortRanges = [ { from = 3478; to = 3479; } { from = 5349; to = 5350; } { from = 49152; to = 49999; } ];
|
checkReversePath = "loose";
|
||||||
|
trustedInterfaces = [ "tailscale0" ];
|
||||||
|
allowedUDPPorts = [ config.services.tailscale.port ];
|
||||||
|
allowedTCPPorts = [ 22 80 443 ];
|
||||||
|
allowedTCPPortRanges = [ { from = 3478; to = 3479; } { from = 5349; to = 5350; } ];
|
||||||
|
allowedUDPPortRanges = [ { from = 3478; to = 3479; } { from = 5349; to = 5350; } { from = 49152; to = 49999; } ];
|
||||||
|
};
|
||||||
|
|
||||||
system.stateVersion = "21.05";
|
system.stateVersion = "21.05";
|
||||||
|
|
||||||
|
|
|
||||||
Binary file not shown.
BIN
config/hosts/grondahl/data/secrets/borg_pass
Normal file
BIN
config/hosts/grondahl/data/secrets/borg_pass
Normal file
Binary file not shown.
BIN
config/hosts/grondahl/data/secrets/ooye_client_secret
Normal file
BIN
config/hosts/grondahl/data/secrets/ooye_client_secret
Normal file
Binary file not shown.
BIN
config/hosts/grondahl/data/secrets/ooye_token
Normal file
BIN
config/hosts/grondahl/data/secrets/ooye_token
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
config/hosts/grondahl/data/secrets/synapse_extra_config
Normal file
BIN
config/hosts/grondahl/data/secrets/synapse_extra_config
Normal file
Binary file not shown.
|
|
@ -2,7 +2,7 @@
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
(modulesPath + "/profiles/minimal.nix")
|
#(modulesPath + "/profiles/minimal.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sr_mod" "virtio_blk" ];
|
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sr_mod" "virtio_blk" ];
|
||||||
|
|
|
||||||
|
|
@ -3,12 +3,7 @@
|
||||||
{
|
{
|
||||||
security.acme = {
|
security.acme = {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
email = "admin+certs@anarkafem.dev";
|
defaults.email = "admin+certs@anarkafem.dev";
|
||||||
certs."anarkafem.dev" = {
|
|
||||||
extraDomainNames = [ "*.anarkafem.dev" ];
|
|
||||||
dnsProvider = "hurricane";
|
|
||||||
credentialsFile = config.secrets.files.acme_anarkafem_dev.file;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
26
config/hosts/grondahl/services/borg.nix
Normal file
26
config/hosts/grondahl/services/borg.nix
Normal file
|
|
@ -0,0 +1,26 @@
|
||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.borgbackup.jobs = {
|
||||||
|
postgres = {
|
||||||
|
paths = "/var/lib/postgresql/backup";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/grondahl/postgres";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_postgres.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_postgres.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:15:00";
|
||||||
|
user = "postgres";
|
||||||
|
};
|
||||||
|
synapse = {
|
||||||
|
paths = "/var/lib/matrix-synapse";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/grondahl/synapse";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_synapse.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_synapse.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:45:00";
|
||||||
|
user = "matrix-synapse";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -1,8 +1,13 @@
|
||||||
{
|
{
|
||||||
imports = [ ../../../common/services/nginx.nix ];
|
imports = [ ../../../common/services/nginx.nix ];
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
|
"ooye.anarkafem.dev" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/".proxyPass = "http://127.0.0.1:6693/";
|
||||||
|
};
|
||||||
"anarkafem.dev" = {
|
"anarkafem.dev" = {
|
||||||
useACMEHost = "anarkafem.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".root = "/var/www/anarkafem.dev/public";
|
locations."/".root = "/var/www/anarkafem.dev/public";
|
||||||
locations."/_matrix/".proxyPass = "http://127.0.0.1:8008";
|
locations."/_matrix/".proxyPass = "http://127.0.0.1:8008";
|
||||||
|
|
@ -21,14 +26,21 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"cal.anarkafem.dev" = {
|
"cal.anarkafem.dev" = {
|
||||||
useACMEHost = "anarkafem.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".proxyPass = "http://127.0.0.1:4000";
|
locations."/".proxyPass = "http://127.0.0.1:4000";
|
||||||
};
|
};
|
||||||
"auth.anarkafem.dev" = {
|
"auth.anarkafem.dev" = {
|
||||||
useACMEHost = "anarkafem.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".proxyPass = "http://127.0.0.1:9000";
|
locations."/".proxyPass = "http://127.0.0.1:9000";
|
||||||
};
|
};
|
||||||
|
"beanz.one" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/" = {
|
||||||
|
root = "/var/www/beanz.one/public";
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
1
config/hosts/grondahl/services/ooye
Submodule
1
config/hosts/grondahl/services/ooye
Submodule
|
|
@ -0,0 +1 @@
|
||||||
|
Subproject commit 11cc65efa2909bdc7e3e978bf1f56f6d141bf82a
|
||||||
16
config/hosts/grondahl/services/ooye.nix
Normal file
16
config/hosts/grondahl/services/ooye.nix
Normal file
|
|
@ -0,0 +1,16 @@
|
||||||
|
# Out of your Element prerequisites
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
./ooye/module.nix
|
||||||
|
];
|
||||||
|
services.matrix-ooye = {
|
||||||
|
enable = true;
|
||||||
|
homeserver = "http://localhost:8008";
|
||||||
|
namespace = "_discord_";
|
||||||
|
discordClientSecretPath = builtins.toString config.secrets.files.ooye_client_secret.file;
|
||||||
|
discordTokenPath = builtins.toString config.secrets.files.ooye_token.file;
|
||||||
|
bridgeOrigin = "https://ooye.anarkafem.dev";
|
||||||
|
enableSynapseIntegration = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -2,8 +2,8 @@
|
||||||
{
|
{
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.postgresql_13;
|
package = pkgs.postgresql_16;
|
||||||
extraPlugins = with config.services.postgresql.package.pkgs; [
|
extensions = with config.services.postgresql.package.pkgs; [
|
||||||
postgis
|
postgis
|
||||||
];
|
];
|
||||||
ensureDatabases = [
|
ensureDatabases = [
|
||||||
|
|
@ -14,15 +14,15 @@
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
{
|
||||||
name = "matrix-synapse";
|
name = "matrix-synapse";
|
||||||
ensurePermissions."DATABASE \"matrix-synapse\"" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
name = "mobilizon";
|
name = "mobilizon";
|
||||||
ensurePermissions."DATABASE mobilizon" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
name = "authentik";
|
name = "authentik";
|
||||||
ensurePermissions."DATABASE authentik" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
initialScript = pkgs.writeText "synapse-init.sql" ''
|
initialScript = pkgs.writeText "synapse-init.sql" ''
|
||||||
|
|
|
||||||
|
|
@ -1,11 +1,13 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
{
|
{
|
||||||
services.redis = {
|
services.redis = {
|
||||||
|
vmOverCommit = true;
|
||||||
|
servers."" = {
|
||||||
enable = true;
|
enable = true;
|
||||||
unixSocket = "/run/redis/redis.sock";
|
unixSocket = "/run/redis/redis.sock";
|
||||||
vmOverCommit = true;
|
|
||||||
unixSocketPerm = 770;
|
unixSocketPerm = 770;
|
||||||
#requirePassfile = config.secrets.files.redis_pass.file;
|
#requirePassfile = config.secrets.files.redis_pass.file;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,26 +0,0 @@
|
||||||
{ config, ... }:
|
|
||||||
{
|
|
||||||
services.restic.backups = {
|
|
||||||
"postgres" = {
|
|
||||||
paths = [ "/var/lib/postgresql/backup" ];
|
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/grondahl/postgres";
|
|
||||||
initialize = true;
|
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
|
||||||
timerConfig = { "OnCalendar" = "03:15"; };
|
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
|
||||||
user = "postgres";
|
|
||||||
};
|
|
||||||
"synapse" = {
|
|
||||||
paths = [ "/var/lib/matrix-synapse" ];
|
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/grondahl/synapse";
|
|
||||||
initialize = true;
|
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
|
||||||
timerConfig = { "OnCalendar" = "03:45"; };
|
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
|
||||||
user = "matrix-synapse";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
@ -3,15 +3,19 @@
|
||||||
{
|
{
|
||||||
services.matrix-synapse = {
|
services.matrix-synapse = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
withJemalloc = true;
|
||||||
|
settings = {
|
||||||
|
database = {
|
||||||
|
name = "psycopg2";
|
||||||
|
args.user = "matrix-synapse";
|
||||||
|
args.database = "matrix-synapse";
|
||||||
|
};
|
||||||
|
|
||||||
server_name = "anarkafem.dev";
|
server_name = "anarkafem.dev";
|
||||||
enable_registration = false;
|
enable_registration = false;
|
||||||
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
||||||
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
||||||
max_upload_size = "100M";
|
max_upload_size = "100M";
|
||||||
database_type = "psycopg2";
|
|
||||||
database_args = {
|
|
||||||
password = builtins.toString config.secrets.files.synapse_db_password.file;
|
|
||||||
};
|
|
||||||
turn_uris = [
|
turn_uris = [
|
||||||
"turn:turn.anarkafem.dev:3478?transport=udp"
|
"turn:turn.anarkafem.dev:3478?transport=udp"
|
||||||
"turn:turn.anarkafem.dev:3478?transport=tcp"
|
"turn:turn.anarkafem.dev:3478?transport=tcp"
|
||||||
|
|
@ -23,7 +27,6 @@
|
||||||
"turns:turn.anarkafem.dev:5350?transport=tcp"
|
"turns:turn.anarkafem.dev:5350?transport=tcp"
|
||||||
];
|
];
|
||||||
report_stats = false;
|
report_stats = false;
|
||||||
withJemalloc = true;
|
|
||||||
servers = { "anarkafem.dev" = {}; };
|
servers = { "anarkafem.dev" = {}; };
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
default_room_version: "9"
|
default_room_version: "9"
|
||||||
|
|
@ -57,7 +60,7 @@
|
||||||
listeners = [
|
listeners = [
|
||||||
{
|
{
|
||||||
port = 8008;
|
port = 8008;
|
||||||
bind_address = "127.0.0.1";
|
bind_addresses = ["127.0.0.1"];
|
||||||
type = "http";
|
type = "http";
|
||||||
tls = false;
|
tls = false;
|
||||||
x_forwarded = true;
|
x_forwarded = true;
|
||||||
|
|
@ -70,5 +73,6 @@
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,13 +1,16 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports = [
|
||||||
[
|
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
./data/secrets/secrets.nix
|
./data/secrets/secrets.nix
|
||||||
|
../../common/configuration/nix.nix
|
||||||
|
../../common/configuration/documentation.nix
|
||||||
../../common/services/ssh.nix
|
../../common/services/ssh.nix
|
||||||
|
../../common/services/tailscale.nix
|
||||||
../../common/users.nix
|
../../common/users.nix
|
||||||
./services/acme.nix
|
./services/acme.nix
|
||||||
|
./services/immich.nix
|
||||||
./services/nextcloud.nix
|
./services/nextcloud.nix
|
||||||
./services/nginx.nix
|
./services/nginx.nix
|
||||||
./services/postgres.nix
|
./services/postgres.nix
|
||||||
|
|
@ -16,11 +19,11 @@
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.loader.grub.enable = true;
|
boot.loader.grub.enable = true;
|
||||||
boot.loader.grub.version = 2;
|
|
||||||
boot.loader.grub.device = "/dev/sda";
|
boot.loader.grub.device = "/dev/sda";
|
||||||
|
boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
|
||||||
|
|
||||||
boot.supportedFilesystems = ["zfs"];
|
boot.supportedFilesystems = ["zfs"];
|
||||||
services.zfs.autoSnapshot.enable = true;
|
services.zfs.autoSnapshot.enable = false;
|
||||||
services.zfs.autoScrub.enable = true;
|
services.zfs.autoScrub.enable = true;
|
||||||
|
|
||||||
time.timeZone = "Europe/Copenhagen";
|
time.timeZone = "Europe/Copenhagen";
|
||||||
|
|
@ -51,9 +54,9 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
nix = {
|
nix.settings = {
|
||||||
autoOptimiseStore = true;
|
auto-optimise-store = true;
|
||||||
trustedUsers = [
|
trusted-users = [
|
||||||
"root"
|
"root"
|
||||||
"@wheel"
|
"@wheel"
|
||||||
];
|
];
|
||||||
|
|
@ -65,6 +68,7 @@
|
||||||
htop
|
htop
|
||||||
iotop
|
iotop
|
||||||
dig
|
dig
|
||||||
|
tailscale
|
||||||
];
|
];
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
|
|
||||||
|
|
@ -76,7 +80,13 @@
|
||||||
users.groups.redis.members = [ "nextcloud" ];
|
users.groups.redis.members = [ "nextcloud" ];
|
||||||
users.groups.backup.members = [ "nextcloud" "postgres" ];
|
users.groups.backup.members = [ "nextcloud" "postgres" ];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 22 80 443 ];
|
networking.firewall = {
|
||||||
|
allowedTCPPorts = [ 22 80 443 ];
|
||||||
|
allowedUDPPorts = [ config.services.tailscale.port ];
|
||||||
|
trustedInterfaces = [ "tailscale0" ];
|
||||||
|
enable = true;
|
||||||
|
checkReversePath = "loose";
|
||||||
|
};
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
system.stateVersion = "21.05";
|
system.stateVersion = "21.05";
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,7 @@
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
(modulesPath + "/profiles/minimal.nix")
|
#(modulesPath + "/profiles/minimal.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
|
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,7 @@
|
||||||
{
|
{
|
||||||
security.acme = {
|
security.acme = {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
email = "admin+certs@graven.dev";
|
defaults.email = "admin+certs@graven.dev";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
27
config/hosts/rudiger/services/borg.nix
Normal file
27
config/hosts/rudiger/services/borg.nix
Normal file
|
|
@ -0,0 +1,27 @@
|
||||||
|
|
||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.borgbackup.jobs = {
|
||||||
|
postgres = {
|
||||||
|
paths = "/var/lib/postgresql/backup";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/rudiger/postgres";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_postgres.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_postgres.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:15:00";
|
||||||
|
user = "postgres";
|
||||||
|
};
|
||||||
|
synapse = {
|
||||||
|
paths = "/var/lib/nextcloud/data";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/rudiger/nextcloud";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_synapse.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_synapse.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:45:00";
|
||||||
|
user = "nextcloud";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
9
config/hosts/rudiger/services/immich.nix
Normal file
9
config/hosts/rudiger/services/immich.nix
Normal file
|
|
@ -0,0 +1,9 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.immich = {
|
||||||
|
enable = true;
|
||||||
|
port = 2283;
|
||||||
|
settings.server.externalDomain = "https://immich.graven.dev";
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
hostName = "cloud.graven.dev";
|
hostName = "cloud.graven.dev";
|
||||||
https = true;
|
https = true;
|
||||||
package = pkgs.nextcloud22;
|
package = pkgs.nextcloud32;
|
||||||
autoUpdateApps.enable = true;
|
autoUpdateApps.enable = true;
|
||||||
maxUploadSize = "10G";
|
maxUploadSize = "10G";
|
||||||
webfinger = true;
|
webfinger = true;
|
||||||
|
|
@ -14,9 +14,12 @@
|
||||||
dbuser = "nextcloud";
|
dbuser = "nextcloud";
|
||||||
dbhost = "/run/postgresql"; # nextcloud will add /.s.PGSQL.5432 by itself
|
dbhost = "/run/postgresql"; # nextcloud will add /.s.PGSQL.5432 by itself
|
||||||
dbname = "nextcloud";
|
dbname = "nextcloud";
|
||||||
defaultPhoneRegion = "DK";
|
|
||||||
adminpassFile = builtins.toString config.secrets.files.nc_admin_pass.file;
|
adminpassFile = builtins.toString config.secrets.files.nc_admin_pass.file;
|
||||||
adminuser = "root";
|
adminuser = "root";
|
||||||
};
|
};
|
||||||
|
settings = {
|
||||||
|
default_phone_region = "DK";
|
||||||
|
};
|
||||||
|
phpOptions."opcache.interned_strings_buffer" = "23";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,8 +1,25 @@
|
||||||
{ ... }:
|
{ config, ... }:
|
||||||
{
|
{
|
||||||
imports = [ ../../../common/services/nginx.nix ];
|
imports = [ ../../../common/services/nginx.nix ];
|
||||||
services.nginx.virtualHosts."cloud.graven.dev" = {
|
services.nginx.virtualHosts."cloud.graven.dev" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
};
|
};
|
||||||
|
services.nginx.virtualHosts."immich.graven.dev" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://[::1]:${toString config.services.immich.port}";
|
||||||
|
proxyWebsockets = true;
|
||||||
|
recommendedProxySettings = true;
|
||||||
|
extraConfig = ''
|
||||||
|
client_max_body_size 50000M;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
send_timeout 600s;
|
||||||
|
proxy_max_temp_file_size 0;
|
||||||
|
proxy_buffering off;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,14 +1,15 @@
|
||||||
{ ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
package = pkgs.postgresql_15;
|
||||||
ensureDatabases = [
|
ensureDatabases = [
|
||||||
"nextcloud"
|
"nextcloud"
|
||||||
];
|
];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
{
|
||||||
name = "nextcloud";
|
name = "nextcloud";
|
||||||
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,10 +1,12 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
{
|
{
|
||||||
services.redis = {
|
services.redis = {
|
||||||
|
vmOverCommit = true;
|
||||||
|
servers."" = {
|
||||||
enable = true;
|
enable = true;
|
||||||
unixSocket = "/run/redis/redis.sock";
|
unixSocket = "/run/redis/redis.sock";
|
||||||
vmOverCommit = true;
|
|
||||||
unixSocketPerm = 770;
|
unixSocketPerm = 770;
|
||||||
#requirePassfile = config.secrets.files.redis_pass.file;
|
#requirePassfile = config.secrets.files.redis_pass.file;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,21 +3,21 @@
|
||||||
services.restic.backups = {
|
services.restic.backups = {
|
||||||
"postgres" = {
|
"postgres" = {
|
||||||
paths = [ "/var/lib/postgresql/backup" ];
|
paths = [ "/var/lib/postgresql/backup" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/rudiger/postgres";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/rudiger/postgres";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "04:15"; };
|
timerConfig = { "OnCalendar" = "04:15"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "postgres";
|
user = "postgres";
|
||||||
};
|
};
|
||||||
"nextcloud" = {
|
"nextcloud" = {
|
||||||
paths = [ "/var/lib/nextcloud/data" ];
|
paths = [ "/var/lib/nextcloud/data" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/rudiger/nextcloud";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/rudiger/nextcloud";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "04:30"; };
|
timerConfig = { "OnCalendar" = "04:30"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "nextcloud";
|
user = "nextcloud";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,13 +1,16 @@
|
||||||
{ config, pkgs, lib, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
../../common/configuration/nix.nix
|
||||||
|
../../common/configuration/documentation.nix
|
||||||
../../common/services/ssh.nix
|
../../common/services/ssh.nix
|
||||||
|
../../common/services/tailscale.nix
|
||||||
../../common/users.nix
|
../../common/users.nix
|
||||||
./services/acme.nix
|
./services/acme.nix
|
||||||
|
./services/borg.nix
|
||||||
./services/coturn.nix
|
./services/coturn.nix
|
||||||
#./services/grocy.nix
|
|
||||||
./services/nginx.nix
|
./services/nginx.nix
|
||||||
./services/postgres.nix
|
./services/postgres.nix
|
||||||
./services/synapse.nix
|
./services/synapse.nix
|
||||||
|
|
@ -16,15 +19,15 @@
|
||||||
./services/restic.nix
|
./services/restic.nix
|
||||||
./services/vaultwarden.nix
|
./services/vaultwarden.nix
|
||||||
./services/wireguard.nix
|
./services/wireguard.nix
|
||||||
|
./services/akkoma.nix
|
||||||
./data/secrets/secrets.nix
|
./data/secrets/secrets.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.loader.grub.enable = true;
|
boot.loader.grub.enable = true;
|
||||||
boot.loader.grub.version = 2;
|
|
||||||
boot.loader.grub.device = "/dev/sda";
|
boot.loader.grub.device = "/dev/sda";
|
||||||
boot.kernelPackages = pkgs.linuxPackages_5_10;
|
boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
|
||||||
boot.supportedFilesystems = ["zfs"];
|
boot.supportedFilesystems = ["zfs"];
|
||||||
services.zfs.autoSnapshot.enable = true;
|
services.zfs.autoSnapshot.enable = false;
|
||||||
services.zfs.autoScrub.enable = true;
|
services.zfs.autoScrub.enable = true;
|
||||||
|
|
||||||
networking.hostName = "wind";
|
networking.hostName = "wind";
|
||||||
|
|
@ -50,11 +53,12 @@
|
||||||
htop
|
htop
|
||||||
iotop
|
iotop
|
||||||
dig
|
dig
|
||||||
|
tailscale
|
||||||
];
|
];
|
||||||
|
|
||||||
nix = {
|
nix.settings = {
|
||||||
autoOptimiseStore = true;
|
auto-optimise-store = true;
|
||||||
trustedUsers = [
|
trusted-users = [
|
||||||
"root"
|
"root"
|
||||||
"@wheel"
|
"@wheel"
|
||||||
];
|
];
|
||||||
|
|
|
||||||
Binary file not shown.
Binary file not shown.
BIN
config/hosts/wind/data/secrets/borg_pass
Normal file
BIN
config/hosts/wind/data/secrets/borg_pass
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
config/hosts/wind/data/secrets/synapse_extra_config
Normal file
BIN
config/hosts/wind/data/secrets/synapse_extra_config
Normal file
Binary file not shown.
BIN
config/hosts/wind/data/secrets/synapse_sliding_sync_env
Normal file
BIN
config/hosts/wind/data/secrets/synapse_sliding_sync_env
Normal file
Binary file not shown.
|
|
@ -6,7 +6,7 @@
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
(modulesPath + "/profiles/minimal.nix")
|
#(modulesPath + "/profiles/minimal.nix")
|
||||||
#(modulesPath + "/profiles/hardened.nix")
|
#(modulesPath + "/profiles/hardened.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -3,19 +3,7 @@
|
||||||
{
|
{
|
||||||
security.acme = {
|
security.acme = {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
email = "admin+certs@graven.dev";
|
defaults.email = "admin+certs@graven.dev";
|
||||||
certs = {
|
|
||||||
"graven.dev" = {
|
|
||||||
extraDomainNames = [ "*.graven.dev" ];
|
|
||||||
dnsProvider = "hurricane";
|
|
||||||
credentialsFile = config.secrets.files.acme_graven_dev.file;
|
|
||||||
};
|
|
||||||
"graven.se" = {
|
|
||||||
extraDomainNames = [ "*.graven.se" ];
|
|
||||||
dnsProvider = "hurricane";
|
|
||||||
credentialsFile = config.secrets.files.acme_graven_se.file;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
36
config/hosts/wind/services/akkoma.nix
Normal file
36
config/hosts/wind/services/akkoma.nix
Normal file
|
|
@ -0,0 +1,36 @@
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
services.akkoma = {
|
||||||
|
enable = true;
|
||||||
|
config = {
|
||||||
|
":pleroma" = {
|
||||||
|
":instance" = {
|
||||||
|
name = "graven.se";
|
||||||
|
description = "Graven Fedi";
|
||||||
|
email = "charlie@graven.se";
|
||||||
|
registration_open = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
"Pleroma.Web.Endpoint" = {
|
||||||
|
url.host = "fedi.graven.se";
|
||||||
|
};
|
||||||
|
"Pleroma.Web.Webfinger" = {
|
||||||
|
domain = "graven.se";
|
||||||
|
};
|
||||||
|
"Pleroma.Upload".filters =
|
||||||
|
map (pkgs.formats.elixirConf { }).lib.mkRaw
|
||||||
|
[
|
||||||
|
"Pleroma.Upload.Filter.Exiftool"
|
||||||
|
"Pleroma.Upload.Filter.Dedupe"
|
||||||
|
"Pleroma.Upload.Filter.AnonymizeFilename"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
nginx = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
serverName = "fedi.graven.se";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
36
config/hosts/wind/services/borg.nix
Normal file
36
config/hosts/wind/services/borg.nix
Normal file
|
|
@ -0,0 +1,36 @@
|
||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.borgbackup.jobs = {
|
||||||
|
gitea = {
|
||||||
|
paths = "/var/lib/gitea";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/wind/gitea";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_gitea.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_gitea.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 02:15:00";
|
||||||
|
user = "gitea";
|
||||||
|
};
|
||||||
|
postgres = {
|
||||||
|
paths = "/var/lib/postgresql/backup";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/wind/postgres";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_postgres.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_postgres.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:15:00";
|
||||||
|
user = "postgres";
|
||||||
|
};
|
||||||
|
synapse = {
|
||||||
|
paths = "/var/lib/matrix-synapse";
|
||||||
|
repo = "ssh://borg@backup.graven.dev//mnt/slab/backup/wind/synapse";
|
||||||
|
encryption.mode = "repokey";
|
||||||
|
encryption.passCommand = "cat ${config.secrets.files.borg_pass_synapse.file}";
|
||||||
|
environment.BORG_RSH = "ssh -i ${config.secrets.files.ssh_key_synapse.file}";
|
||||||
|
compression = "auto,zstd";
|
||||||
|
startAt = "*-*-* 03:15:00";
|
||||||
|
user = "matrix-synapse";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
{
|
{
|
||||||
services.coturn = {
|
services.coturn = {
|
||||||
enable = true;
|
enable = false;
|
||||||
lt-cred-mech = true;
|
lt-cred-mech = true;
|
||||||
use-auth-secret = true;
|
use-auth-secret = true;
|
||||||
static-auth-secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
static-auth-secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
||||||
|
|
|
||||||
|
|
@ -1,16 +1,32 @@
|
||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.gitea = {
|
services.forgejo = {
|
||||||
enable = true;
|
enable = true;
|
||||||
domain = "git.graven.dev";
|
user = "gitea";
|
||||||
rootUrl = "https://git.graven.dev";
|
group = "gitea";
|
||||||
enableUnixSocket = true;
|
stateDir = "/var/lib/gitea";
|
||||||
cookieSecure = true;
|
|
||||||
appName = "Graven Gitea";
|
|
||||||
settings = { "ui" = { "DEFAULT_THEME" = "arc-green"; }; };
|
|
||||||
database = {
|
database = {
|
||||||
type = "postgres";
|
type = "postgres";
|
||||||
|
name = "gitea";
|
||||||
|
user = "gitea";
|
||||||
|
};
|
||||||
|
settings = {
|
||||||
|
DEFAULT.APP_NAME = "Graven Gitea";
|
||||||
|
service.DISABLE_REGISTRATION = true;
|
||||||
|
session.COOKIE_SECURE = true;
|
||||||
|
server.DOMAIN = "git.graven.dev";
|
||||||
|
server.ROOT_URL = "https://git.graven.dev";
|
||||||
|
server.PROTOCOL = "http+unix";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
users.users.gitea = {
|
||||||
|
home = "/var/lib/gitea";
|
||||||
|
useDefaultShell = true;
|
||||||
|
group = "gitea";
|
||||||
|
isSystemUser = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.groups.gitea = {};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,10 +0,0 @@
|
||||||
{
|
|
||||||
services.grocy = {
|
|
||||||
enable = true;
|
|
||||||
hostName = "grocy.graven.dev";
|
|
||||||
settings = {
|
|
||||||
currency = "DKK";
|
|
||||||
calendar.firstDayOfWeek = 1;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -2,11 +2,13 @@
|
||||||
imports = [ ../../../common/services/nginx.nix ];
|
imports = [ ../../../common/services/nginx.nix ];
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"graven.dev" = {
|
"graven.dev" = {
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".root = "/var/www/graven.dev/public";
|
locations."/".root = "/var/www/graven.dev/public";
|
||||||
locations."/_matrix".proxyPass = "http://127.0.0.1:8008";
|
locations."~ ^(\\/_matrix|\\/_synapse\\/client)" = {
|
||||||
locations."/_synapse".proxyPass = "http://127.0.0.1:8008";
|
proxyPass = "http://127.0.0.1:8008";
|
||||||
|
priority = 1000;
|
||||||
|
};
|
||||||
locations."/.well-known/matrix/" = {
|
locations."/.well-known/matrix/" = {
|
||||||
root = "/var/www/matrix/public";
|
root = "/var/www/matrix/public";
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
@ -14,24 +16,34 @@
|
||||||
add_header Access-Control-Allow-Origin "*";
|
add_header Access-Control-Allow-Origin "*";
|
||||||
add_header Strict-Transport-Security $hsts_header;
|
add_header Strict-Transport-Security $hsts_header;
|
||||||
add_header Referrer-Policy "same-origin";
|
add_header Referrer-Policy "same-origin";
|
||||||
add_header X-Frame-Options "DENY";
|
|
||||||
add_header X-Content-Type-Options "nosniff";
|
add_header X-Content-Type-Options "nosniff";
|
||||||
add_header X-XSS-Protection "1; mode=block";
|
add_header X-XSS-Protection "1; mode=block";
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
# Fedi webfinger
|
||||||
|
"graven.se" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/.well-known/host-meta".return = "301 https://fedi.graven.se$request_uri";
|
||||||
|
};
|
||||||
|
"amanda.graven.dev" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/".root = "/var/www/amanda.graven.dev/public";
|
||||||
|
};
|
||||||
"rss.graven.dev" = {
|
"rss.graven.dev" = {
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
};
|
};
|
||||||
"git.graven.dev" = {
|
"git.graven.dev" = {
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".proxyPass = "http://unix:/run/gitea/gitea.sock:";
|
locations."/".proxyPass = "http://unix:/run/forgejo/forgejo.sock:";
|
||||||
};
|
};
|
||||||
"vault.graven.dev" = {
|
"vault.graven.dev" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost:8812";
|
proxyPass = "http://localhost:8812";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
|
|
@ -47,7 +59,7 @@
|
||||||
};
|
};
|
||||||
"openpgpkey.graven.dev" = {
|
"openpgpkey.graven.dev" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
root = "/var/www/openpgpkey";
|
root = "/var/www/openpgpkey";
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
@ -63,7 +75,7 @@
|
||||||
};
|
};
|
||||||
"openpgpkey.graven.se" = {
|
"openpgpkey.graven.se" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
useACMEHost = "graven.se";
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
root = "/var/www/openpgpkey";
|
root = "/var/www/openpgpkey";
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
@ -79,7 +91,7 @@
|
||||||
};
|
};
|
||||||
"tor.graven.dev" = {
|
"tor.graven.dev" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
useACMEHost = "graven.dev";
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
root = "/var/www/tor";
|
root = "/var/www/tor";
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,7 @@
|
||||||
{
|
{
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.postgresql_13;
|
package = pkgs.postgresql_16;
|
||||||
initialScript = pkgs.writeText "synapse-init.sql" ''
|
initialScript = pkgs.writeText "synapse-init.sql" ''
|
||||||
CREATE ROLE synapse;
|
CREATE ROLE synapse;
|
||||||
CREATE DATABASE synapse WITH OWNER synapse
|
CREATE DATABASE synapse WITH OWNER synapse
|
||||||
|
|
|
||||||
|
|
@ -5,41 +5,41 @@
|
||||||
services.restic.backups = {
|
services.restic.backups = {
|
||||||
"gitea" = {
|
"gitea" = {
|
||||||
paths = [ "/var/lib/gitea" ];
|
paths = [ "/var/lib/gitea" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/wind/gitea";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/wind/gitea";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "02:15"; };
|
timerConfig = { "OnCalendar" = "02:15"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "gitea";
|
user = "gitea";
|
||||||
};
|
};
|
||||||
"postgres" = {
|
"postgres" = {
|
||||||
paths = [ "/var/lib/postgresql/backup" ];
|
paths = [ "/var/lib/postgresql/backup" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/wind/postgres";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/wind/postgres";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "03:00"; };
|
timerConfig = { "OnCalendar" = "03:00"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "postgres";
|
user = "postgres";
|
||||||
};
|
};
|
||||||
"synapse" = {
|
"synapse" = {
|
||||||
paths = [ "/var/lib/matrix-synapse" ];
|
paths = [ "/var/lib/matrix-synapse" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/wind/synapse";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/wind/synapse";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "03:30"; };
|
timerConfig = { "OnCalendar" = "03:30"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "matrix-synapse";
|
user = "matrix-synapse";
|
||||||
};
|
};
|
||||||
"vaultwarden" = {
|
"vaultwarden" = {
|
||||||
paths = [ "/var/lib/bitwarden_rs" ];
|
paths = [ "/var/lib/bitwarden_rs" ];
|
||||||
repository = "sftp:restic@despondos.nao.sh:/etheria/backup/wind/vaultwarden";
|
repository = "sftp:restic@backup.graven.dev:/etheria/backup/wind/vaultwarden";
|
||||||
initialize = true;
|
initialize = true;
|
||||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" "--keep-yearly 75" ];
|
||||||
timerConfig = { "OnCalendar" = "23:45"; };
|
timerConfig = { "OnCalendar" = "23:45"; };
|
||||||
extraOptions = [ "sftp.command='ssh restic@despondos.nao.sh -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
extraOptions = [ "sftp.command='ssh restic@backup.graven.dev -i ${config.secrets.files.ssh_key.file} -s sftp'" ];
|
||||||
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
passwordFile = builtins.toString config.secrets.files.restic_pass.file;
|
||||||
user = "vaultwarden";
|
user = "vaultwarden";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -3,14 +3,17 @@
|
||||||
{
|
{
|
||||||
services.matrix-synapse = {
|
services.matrix-synapse = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
withJemalloc = true;
|
||||||
|
extraConfigFiles = [ config.secrets.files.synapse_extra_config.file ];
|
||||||
|
settings = {
|
||||||
server_name = "graven.dev";
|
server_name = "graven.dev";
|
||||||
enable_registration = false;
|
enable_registration = false;
|
||||||
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
||||||
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
||||||
max_upload_size = "100M";
|
max_upload_size = "100M";
|
||||||
database_type = "psycopg2";
|
database.name = "psycopg2";
|
||||||
database_user = "synapse";
|
database.args.user = "synapse";
|
||||||
database_name = "synapse";
|
database.args.database = "synapse";
|
||||||
turn_uris = [
|
turn_uris = [
|
||||||
"turn:turn.graven.dev:3478?transport=udp"
|
"turn:turn.graven.dev:3478?transport=udp"
|
||||||
"turn:turn.graven.dev:3478?transport=tcp"
|
"turn:turn.graven.dev:3478?transport=tcp"
|
||||||
|
|
@ -22,57 +25,34 @@
|
||||||
"turns:turn.graven.dev:5350?transport=tcp"
|
"turns:turn.graven.dev:5350?transport=tcp"
|
||||||
];
|
];
|
||||||
report_stats = true;
|
report_stats = true;
|
||||||
withJemalloc = true;
|
|
||||||
|
|
||||||
extraConfig = ''
|
|
||||||
password_config:
|
|
||||||
enabled: false
|
|
||||||
oidc_providers:
|
|
||||||
- idp_id: authentik
|
|
||||||
idp_name: authentik
|
|
||||||
discover: true
|
|
||||||
issuer: "https://auth.graven.dev/application/o/synapse/"
|
|
||||||
client_id: "7a77036d3b360265895f2ab5a51264ba586c93d5"
|
|
||||||
client_secret: "a9f9146fd13338230481a71c824d122bfb5e8a2118f2cdaf882746ad6726aeecd50ef522338acec89d3f8ccb8014124e022a6af6769807ea4271931f219a3f55"
|
|
||||||
allow_existing_users: true
|
|
||||||
scopes:
|
|
||||||
- "openid"
|
|
||||||
- "profile"
|
|
||||||
- "email"
|
|
||||||
user_mapping_provider:
|
|
||||||
config:
|
|
||||||
localpart_template: "{{ user.name }}"
|
|
||||||
display_name_template: "{{ user.name|capitalize }}"
|
|
||||||
'';
|
|
||||||
|
|
||||||
logConfig = ''
|
logConfig = ''
|
||||||
version: 1
|
version: 1
|
||||||
|
|
||||||
formatters:
|
formatters:
|
||||||
precise:
|
precise:
|
||||||
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
|
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
|
||||||
|
|
||||||
handlers:
|
handlers:
|
||||||
console:
|
console:
|
||||||
class: logging.StreamHandler
|
class: logging.StreamHandler
|
||||||
formatter: precise
|
formatter: precise
|
||||||
|
|
||||||
loggers:
|
loggers:
|
||||||
synapse.storage.SQL:
|
synapse.storage.SQL:
|
||||||
# beware: increasing this to DEBUG will make synapse log sensitive
|
# beware: increasing this to DEBUG will make synapse log sensitive
|
||||||
# information such as access tokens.
|
# information such as access tokens.
|
||||||
level: WARN
|
level: WARN
|
||||||
|
|
||||||
root:
|
root:
|
||||||
level: WARN
|
level: WARN
|
||||||
handlers: [console]
|
handlers: [console]
|
||||||
|
|
||||||
disable_existing_loggers: false
|
disable_existing_loggers: false
|
||||||
'';
|
'';
|
||||||
listeners = [
|
listeners = [
|
||||||
{
|
{
|
||||||
port = 8008;
|
port = 8008;
|
||||||
bind_address = "127.0.0.1";
|
bind_addresses = ["127.0.0.1"];
|
||||||
type = "http";
|
type = "http";
|
||||||
tls = false;
|
tls = false;
|
||||||
x_forwarded = true;
|
x_forwarded = true;
|
||||||
|
|
@ -85,5 +65,6 @@ disable_existing_loggers: false
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
37
config/hosts/wind/services/ttrss-plugins/fever.nix
Normal file
37
config/hosts/wind/services/ttrss-plugins/fever.nix
Normal file
|
|
@ -0,0 +1,37 @@
|
||||||
|
{ lib, stdenv, fetchFromGitHub, tt-rss, ... }:
|
||||||
|
|
||||||
|
stdenv.mkDerivation rec {
|
||||||
|
pname = "tt-rss-fever-api";
|
||||||
|
version = "2.3.0";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "DigitalDJ";
|
||||||
|
repo = "tinytinyrss-fever-plugin";
|
||||||
|
rev = "${version}";
|
||||||
|
sha256 = "fKHnF7pXMD04sWygoRnPH5hLUyWW4Dv/e4JWtfobX/g=";
|
||||||
|
};
|
||||||
|
|
||||||
|
installPhase = ''
|
||||||
|
mkdir -p $out/fever
|
||||||
|
cp -r fever_api.php index.php init.php $out/fever/
|
||||||
|
'';
|
||||||
|
|
||||||
|
meta = {
|
||||||
|
description = "Fever API for Tiny Tiny RSS";
|
||||||
|
longDescription = ''
|
||||||
|
This is a plugin for Tiny Tiny RSS (tt-rss).
|
||||||
|
|
||||||
|
It lets you use feed reader programs which interface with the Fever feed
|
||||||
|
reader API together with Tiny Tiny RSS
|
||||||
|
'';
|
||||||
|
license = lib.licenses.gpl3Only;
|
||||||
|
homepage = "https://github.com/DigitalDJ/tinytinyrss-fever-plugin";
|
||||||
|
maintainers = [ {
|
||||||
|
email = "amanda@graven.dev";
|
||||||
|
name = "Amanda Graven";
|
||||||
|
github = "agraven";
|
||||||
|
githubId = 23525639;
|
||||||
|
} ];
|
||||||
|
inherit (tt-rss.meta) platforms;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -1,10 +1,13 @@
|
||||||
{ config, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.tt-rss = {
|
services.tt-rss = {
|
||||||
enable = true;
|
enable = true;
|
||||||
registration.enable = true;
|
registration.enable = false;
|
||||||
virtualHost = "rss.graven.dev";
|
virtualHost = "rss.graven.dev";
|
||||||
selfUrlPath = "https://rss.graven.dev";
|
selfUrlPath = "https://rss.graven.dev";
|
||||||
|
pluginPackages = [
|
||||||
|
(pkgs.callPackage ./ttrss-plugins/fever.nix {})
|
||||||
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,7 @@
|
||||||
services.vaultwarden = {
|
services.vaultwarden = {
|
||||||
enable = true;
|
enable = true;
|
||||||
environmentFile = config.secrets.files.vaultwarden_env.file;
|
environmentFile = config.secrets.files.vaultwarden_env.file;
|
||||||
backupDir = "/var/lib/bitwarden_rs/backup";
|
backupDir = "/var/backup/vaultwarden";
|
||||||
config = {
|
config = {
|
||||||
domain = "https://vault.graven.dev";
|
domain = "https://vault.graven.dev";
|
||||||
signupsAllowed = false;
|
signupsAllowed = false;
|
||||||
|
|
|
||||||
|
|
@ -5,10 +5,10 @@
|
||||||
"homepage": "https://github.com/nmattia/niv",
|
"homepage": "https://github.com/nmattia/niv",
|
||||||
"owner": "nmattia",
|
"owner": "nmattia",
|
||||||
"repo": "niv",
|
"repo": "niv",
|
||||||
"rev": "df49d53b71ad5b6b5847b32e5254924d60703c46",
|
"rev": "368268e45dee0c94d1cf898381a384856379ad76",
|
||||||
"sha256": "1j5p8mi1wi3pdcq0lfb881p97i232si07nb605dl92cjwnira88c",
|
"sha256": "1k03n7qmaz6yf2r8i5sng4kii3rr1y36g8k70sg7piqz3npxisy3",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nmattia/niv/archive/df49d53b71ad5b6b5847b32e5254924d60703c46.tar.gz",
|
"url": "https://github.com/nmattia/niv/archive/368268e45dee0c94d1cf898381a384856379ad76.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
|
|
@ -17,22 +17,22 @@
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "feceb4d24f582817d8f6e737cd40af9e162dee05",
|
"rev": "2096f3f411ce46e88a79ae4eafcfc9df8ed41c61",
|
||||||
"sha256": "1q92jq6xf5b1pshai9j72cj17r0ah3fhrx669h3vc58rj7xvgiw7",
|
"sha256": "1al72rhlaa6g725syx72klpismv8xygdd55smqfwa9xglhv35r34",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/NixOS/nixos-hardware/archive/feceb4d24f582817d8f6e737cd40af9e162dee05.tar.gz",
|
"url": "https://github.com/NixOS/nixos-hardware/archive/2096f3f411ce46e88a79ae4eafcfc9df8ed41c61.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"branch": "nixos-21.11",
|
"branch": "nixos-25.11",
|
||||||
"description": "Nix Packages collection",
|
"description": "Nix Packages collection",
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "ccb90fb9e11459aeaf83cc28d5f8910816d90dd0",
|
"rev": "a4bf06618f0b5ee50f14ed8f0da77d34ecc19160",
|
||||||
"sha256": "1jlyhw5nf7pcxg22k1bwkv13vm02p86d7jf6znihl3hczz1yfgi0",
|
"sha256": "0vma331213djanwmb7ibgmi5290952h6ri123xwb66mg58k8r200",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/NixOS/nixpkgs/archive/ccb90fb9e11459aeaf83cc28d5f8910816d90dd0.tar.gz",
|
"url": "https://github.com/NixOS/nixpkgs/archive/a4bf06618f0b5ee50f14ed8f0da77d34ecc19160.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
"nixus": {
|
"nixus": {
|
||||||
|
|
@ -41,10 +41,10 @@
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "Infinisil",
|
"owner": "Infinisil",
|
||||||
"repo": "nixus",
|
"repo": "nixus",
|
||||||
"rev": "d1e1057a31f16a75d9f871e311c4aaaf664561b9",
|
"rev": "b12665bc80134ac167eef1fff2f4e41e1f8925cb",
|
||||||
"sha256": "0d4576dssr6l4vdpi86rbf6dyn3jfl3csvmn9csd4n6dj53f5pqm",
|
"sha256": "11894412807mhg0kgkrn4bjbdk9b2a89b0plh0bpdn06c8pfg11g",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/Infinisil/nixus/archive/d1e1057a31f16a75d9f871e311c4aaaf664561b9.tar.gz",
|
"url": "https://github.com/Infinisil/nixus/archive/b12665bc80134ac167eef1fff2f4e41e1f8925cb.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -27,12 +27,33 @@ let
|
||||||
fetch_git = name: spec:
|
fetch_git = name: spec:
|
||||||
let
|
let
|
||||||
ref =
|
ref =
|
||||||
if spec ? ref then spec.ref else
|
spec.ref or (
|
||||||
if spec ? branch then "refs/heads/${spec.branch}" else
|
if spec ? branch then "refs/heads/${spec.branch}" else
|
||||||
if spec ? tag then "refs/tags/${spec.tag}" else
|
if spec ? tag then "refs/tags/${spec.tag}" else
|
||||||
abort "In git source '${name}': Please specify `ref`, `tag` or `branch`!";
|
abort "In git source '${name}': Please specify `ref`, `tag` or `branch`!"
|
||||||
|
);
|
||||||
|
submodules = spec.submodules or false;
|
||||||
|
submoduleArg =
|
||||||
|
let
|
||||||
|
nixSupportsSubmodules = builtins.compareVersions builtins.nixVersion "2.4" >= 0;
|
||||||
|
emptyArgWithWarning =
|
||||||
|
if submodules
|
||||||
|
then
|
||||||
|
builtins.trace
|
||||||
|
(
|
||||||
|
"The niv input \"${name}\" uses submodules "
|
||||||
|
+ "but your nix's (${builtins.nixVersion}) builtins.fetchGit "
|
||||||
|
+ "does not support them"
|
||||||
|
)
|
||||||
|
{ }
|
||||||
|
else { };
|
||||||
in
|
in
|
||||||
builtins.fetchGit { url = spec.repo; inherit (spec) rev; inherit ref; };
|
if nixSupportsSubmodules
|
||||||
|
then { inherit submodules; }
|
||||||
|
else emptyArgWithWarning;
|
||||||
|
in
|
||||||
|
builtins.fetchGit
|
||||||
|
({ url = spec.repo; inherit (spec) rev; inherit ref; } // submoduleArg);
|
||||||
|
|
||||||
fetch_local = spec: spec.path;
|
fetch_local = spec: spec.path;
|
||||||
|
|
||||||
|
|
@ -69,7 +90,7 @@ let
|
||||||
if builtins.hasAttr "nixpkgs" sources
|
if builtins.hasAttr "nixpkgs" sources
|
||||||
then sourcesNixpkgs
|
then sourcesNixpkgs
|
||||||
else if hasNixpkgsPath && ! hasThisAsNixpkgsPath then
|
else if hasNixpkgsPath && ! hasThisAsNixpkgsPath then
|
||||||
import <nixpkgs> {}
|
import <nixpkgs> { }
|
||||||
else
|
else
|
||||||
abort
|
abort
|
||||||
''
|
''
|
||||||
|
|
@ -95,7 +116,7 @@ let
|
||||||
# the path directly as opposed to the fetched source.
|
# the path directly as opposed to the fetched source.
|
||||||
replace = name: drv:
|
replace = name: drv:
|
||||||
let
|
let
|
||||||
saneName = stringAsChars (c: if isNull (builtins.match "[a-zA-Z0-9]" c) then "_" else c) name;
|
saneName = stringAsChars (c: if (builtins.match "[a-zA-Z0-9]" c) == null then "_" else c) name;
|
||||||
ersatz = builtins.getEnv "NIV_OVERRIDE_${saneName}";
|
ersatz = builtins.getEnv "NIV_OVERRIDE_${saneName}";
|
||||||
in
|
in
|
||||||
if ersatz == "" then drv else
|
if ersatz == "" then drv else
|
||||||
|
|
@ -112,7 +133,7 @@ let
|
||||||
);
|
);
|
||||||
|
|
||||||
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295
|
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295
|
||||||
range = first: last: if first > last then [] else builtins.genList (n: first + n) (last - first + 1);
|
range = first: last: if first > last then [ ] else builtins.genList (n: first + n) (last - first + 1);
|
||||||
|
|
||||||
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L257
|
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L257
|
||||||
stringToCharacters = s: map (p: builtins.substring p 1 s) (range 0 (builtins.stringLength s - 1));
|
stringToCharacters = s: map (p: builtins.substring p 1 s) (range 0 (builtins.stringLength s - 1));
|
||||||
|
|
@ -123,7 +144,7 @@ let
|
||||||
concatStrings = builtins.concatStringsSep "";
|
concatStrings = builtins.concatStringsSep "";
|
||||||
|
|
||||||
# https://github.com/NixOS/nixpkgs/blob/8a9f58a375c401b96da862d969f66429def1d118/lib/attrsets.nix#L331
|
# https://github.com/NixOS/nixpkgs/blob/8a9f58a375c401b96da862d969f66429def1d118/lib/attrsets.nix#L331
|
||||||
optionalAttrs = cond: as: if cond then as else {};
|
optionalAttrs = cond: as: if cond then as else { };
|
||||||
|
|
||||||
# fetchTarball version that is compatible between all the versions of Nix
|
# fetchTarball version that is compatible between all the versions of Nix
|
||||||
builtins_fetchTarball = { url, name ? null, sha256 }@attrs:
|
builtins_fetchTarball = { url, name ? null, sha256 }@attrs:
|
||||||
|
|
@ -131,7 +152,7 @@ let
|
||||||
inherit (builtins) lessThan nixVersion fetchTarball;
|
inherit (builtins) lessThan nixVersion fetchTarball;
|
||||||
in
|
in
|
||||||
if lessThan nixVersion "1.12" then
|
if lessThan nixVersion "1.12" then
|
||||||
fetchTarball ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
|
fetchTarball ({ inherit url; } // (optionalAttrs (name != null) { inherit name; }))
|
||||||
else
|
else
|
||||||
fetchTarball attrs;
|
fetchTarball attrs;
|
||||||
|
|
||||||
|
|
@ -141,25 +162,28 @@ let
|
||||||
inherit (builtins) lessThan nixVersion fetchurl;
|
inherit (builtins) lessThan nixVersion fetchurl;
|
||||||
in
|
in
|
||||||
if lessThan nixVersion "1.12" then
|
if lessThan nixVersion "1.12" then
|
||||||
fetchurl ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
|
fetchurl ({ inherit url; } // (optionalAttrs (name != null) { inherit name; }))
|
||||||
else
|
else
|
||||||
fetchurl attrs;
|
fetchurl attrs;
|
||||||
|
|
||||||
# Create the final "sources" from the config
|
# Create the final "sources" from the config
|
||||||
mkSources = config:
|
mkSources = config:
|
||||||
mapAttrs (
|
mapAttrs
|
||||||
|
(
|
||||||
name: spec:
|
name: spec:
|
||||||
if builtins.hasAttr "outPath" spec
|
if builtins.hasAttr "outPath" spec
|
||||||
then abort
|
then
|
||||||
|
abort
|
||||||
"The values in sources.json should not have an 'outPath' attribute"
|
"The values in sources.json should not have an 'outPath' attribute"
|
||||||
else
|
else
|
||||||
spec // { outPath = replace name (fetch config.pkgs name spec); }
|
spec // { outPath = replace name (fetch config.pkgs name spec); }
|
||||||
) config.sources;
|
)
|
||||||
|
config.sources;
|
||||||
|
|
||||||
# The "config" used by the fetchers
|
# The "config" used by the fetchers
|
||||||
mkConfig =
|
mkConfig =
|
||||||
{ sourcesFile ? if builtins.pathExists ./sources.json then ./sources.json else null
|
{ sourcesFile ? if builtins.pathExists ./sources.json then ./sources.json else null
|
||||||
, sources ? if isNull sourcesFile then {} else builtins.fromJSON (builtins.readFile sourcesFile)
|
, sources ? if sourcesFile == null then { } else builtins.fromJSON (builtins.readFile sourcesFile)
|
||||||
, system ? builtins.currentSystem
|
, system ? builtins.currentSystem
|
||||||
, pkgs ? mkPkgs sources system
|
, pkgs ? mkPkgs sources system
|
||||||
}: rec {
|
}: rec {
|
||||||
|
|
@ -171,4 +195,4 @@ let
|
||||||
};
|
};
|
||||||
|
|
||||||
in
|
in
|
||||||
mkSources (mkConfig {}) // { __functor = _: settings: mkSources (mkConfig settings); }
|
mkSources (mkConfig { }) // { __functor = _: settings: mkSources (mkConfig settings); }
|
||||||
|
|
|
||||||
|
|
@ -13,21 +13,21 @@ in import "${sources.nixus}" {} ({ config, ... }: {
|
||||||
|
|
||||||
nodes = {
|
nodes = {
|
||||||
wind = { lib, config, ... }: {
|
wind = { lib, config, ... }: {
|
||||||
host = "emelie@graven.dev";
|
host = "graven.dev";
|
||||||
configuration = ../config/hosts/wind/configuration.nix;
|
configuration = ../config/hosts/wind/configuration.nix;
|
||||||
switchTimeout = 300;
|
switchTimeout = 300;
|
||||||
successTimeout = 300;
|
successTimeout = 300;
|
||||||
ignoreFailingSystemdUnits = true;
|
ignoreFailingSystemdUnits = true;
|
||||||
};
|
};
|
||||||
grondahl = { lib, config, ... }: {
|
grondahl = { lib, config, ... }: {
|
||||||
host = "emelie@anarkafem.dev";
|
host = "anarkafem.dev";
|
||||||
configuration = ../config/hosts/grondahl/configuration.nix;
|
configuration = ../config/hosts/grondahl/configuration.nix;
|
||||||
successTimeout = 300;
|
successTimeout = 300;
|
||||||
switchTimeout = 300;
|
switchTimeout = 300;
|
||||||
ignoreFailingSystemdUnits = true;
|
ignoreFailingSystemdUnits = true;
|
||||||
};
|
};
|
||||||
rudiger = { lib, config, ... }: {
|
rudiger = { lib, config, ... }: {
|
||||||
host = "emelie@cloud.graven.dev";
|
host = "cloud.graven.dev";
|
||||||
configuration = ../config/hosts/rudiger/configuration.nix;
|
configuration = ../config/hosts/rudiger/configuration.nix;
|
||||||
switchTimeout = 300;
|
switchTimeout = 300;
|
||||||
successTimeout = 300;
|
successTimeout = 300;
|
||||||
|
|
|
||||||
7
shell.nix
Normal file
7
shell.nix
Normal file
|
|
@ -0,0 +1,7 @@
|
||||||
|
{ pkgs ? import <nixpkgs> {} }:
|
||||||
|
|
||||||
|
pkgs.mkShell {
|
||||||
|
packages = with pkgs; [
|
||||||
|
niv
|
||||||
|
];
|
||||||
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue