Compare commits

..

No commits in common. "d060ce64d59751722335eb7b6ace17e3ecec7a99" and "d7d800b346a9013fbccebeb5584b3d2c2933a169" have entirely different histories.

2 changed files with 81 additions and 18 deletions

View File

@ -41,13 +41,26 @@
};
# Enable the X11 windowing system.
services.xserver.enable = false;
# Enable the GNOME Desktop Environment.
services.xserver.displayManager.gdm.enable = false;
services.xserver.desktopManager.gnome.enable = false;
# Enable CUPS to print documents.
services.auto-cpufreq.enable = true;
services.thermald.enable = true;
powerManagement.powertop.enable = true;
powerManagement.enable = true;
# Enable sound with pipewire.
sound.enable = false;
# Enable touchpad support (enabled default in most desktopManager).
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with passwd.
programs.nix-ld.enable = true;
programs.nix-ld.libraries = with pkgs; [
];
@ -55,7 +68,7 @@
users.users.k = {
isNormalUser = true;
description = "k";
extraGroups = [ "networkmanager" "wheel" ];
extraGroups = [ "networkmanager" "wheel" "libvirtd" ];
packages = with pkgs; [zsh];
shell = pkgs.zsh;
};
@ -78,6 +91,10 @@
intel-media-driver
microcodeIntel
];
networking.firewall = {
enable = false;
allowedTCPPorts = [80 443 22 ];
};
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions

View File

@ -1,12 +1,5 @@
{pkgs,lib,...}:
{
networking.firewall = {
enable = true;
allowedTCPPorts = [80 443 22 ];
};
services.openssh = {
enable = true;
};
@ -23,7 +16,6 @@
HTTP_PORT = 8001;
DOMAIN = "dhilton.xyz";
ROOT_URL = "https://git.dhilton.xyz";
ENABLE_PUSH_CREATE_USER = true;
};
};
};
@ -33,12 +25,22 @@
url = "https://git.dhilton.xyz";
name = "nixsrv";
token = "LaqTWUDidsm510TGBglGvcphsUxYmCzMjrZbEtJj";
labels = ["ubuntu-latest:docker://catthehacker/ubuntu:act-latest" "ubuntu-22.04:docker://catthehacker/ubuntu:act-22.04" "ubuntu-20.04:docker://catthehacker/ubuntu:act-20.04" "ubuntu-18.04:docker://catthehacker/ubuntu:act-18.04" "native:host"];
labels = ["ubuntu-latest:docker://node:16-bullseye" "ubuntu-22.04:docker://node:16-bullseye" "ubuntu-20.04:docker://node:16-bullseye" "ubuntu-18.04:docker://node:16-buster" "native:host"];
};
services.pufferpanel = {
enable = true;
extraGroups =["docker"];
extraPackages = [pkgs.jre];
environment = {
PUFFER_WEB_HOST = ":8002";
PUFFER_PANEL_REGISTRATIONENABLED = "false";
};
};
services.home-assistant = {
enable = true;
extraComponents = ["wiz" "fail2ban"];
extraComponents = ["wiz" "fail2ban" "whisper" "piper" "wyoming" "ollama"];
config = {
default_config={};
"automation ui" = "!include automations.yaml";
@ -66,8 +68,33 @@
settings = { server.port = 8005; server.secret_key = "secretlol";};
};
networking.domain = "dhilton.xyz";
services.postgresql.enable = true;
services.akkoma.enable = true;
services.akkoma.config = {
":pleroma" = {
":instance" = {
name = "dhilton fedi";
description = "dhilton akkoma server";
email = "markers711@gmail.com";
registration_open = false;
};
"Pleroma.Web.Endpoint" = {
url.host = "fed.dhilton.xyz";
};
};
};
services.akkoma.nginx = {
enableACME = true;
forceSSL = true;
};
services.fail2ban = {
enable=true;
enable=false;
};
virtualisation.docker = {
@ -91,7 +118,6 @@
"git.dhilton.xyz" = {
addSSL = true;
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:8001";
proxyWebsockets = true;
@ -99,7 +125,6 @@
};
"ntfy.dhilton.xyz" = {
forceSSL = true;
addSSL = true;
enableACME = true;
locations."/" = {
@ -109,7 +134,6 @@
};
"jel.dhilton.xyz" = {
forceSSL = true;
addSSL = true;
enableACME = true;
locations."/" = {
@ -119,7 +143,6 @@
};
"puf.dhilton.xyz" = {
forceSSL = true;
addSSL = true;
enableACME = true;
locations."/" = {
@ -129,7 +152,6 @@
};
"srx.dhilton.xyz" = {
forceSSL = true;
addSSL = true;
enableACME = true;
locations."/" = {
@ -138,8 +160,16 @@
};
};
"map.dhilton.xyz" = {
addSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:8100";
proxyWebsockets = true;
};
};
"hom.dhilton.xyz" = {
forceSSL = true;
addSSL = true;
enableACME = true;
locations."/" = {
@ -154,4 +184,20 @@
acceptTerms = true;
defaults.email = "markers711@gmail.com";
};
virtualisation.libvirtd = {
enable = true;
qemu = {
package = pkgs.qemu_kvm;
runAsRoot = true;
swtpm.enable = true;
ovmf = {
enable = true;
packages = [(pkgs.OVMF.override {
secureBoot = true;
tpmSupport = true;
}).fd];
};
};
};
}