Compare commits

...

2 Commits

Author SHA1 Message Date
k
d060ce64d5 cleanup 2024-09-06 21:15:30 -04:00
k
6f8d77da40 update 2024-09-06 20:58:58 -04:00
2 changed files with 18 additions and 81 deletions

View File

@ -41,26 +41,13 @@
}; };
# Enable the X11 windowing system.
services.xserver.enable = false;
# Enable the GNOME Desktop Environment.
services.xserver.displayManager.gdm.enable = false;
services.xserver.desktopManager.gnome.enable = false;
# Enable CUPS to print documents. # Enable CUPS to print documents.
services.auto-cpufreq.enable = true; services.auto-cpufreq.enable = true;
services.thermald.enable = true; services.thermald.enable = true;
powerManagement.powertop.enable = true; powerManagement.powertop.enable = true;
powerManagement.enable = true; powerManagement.enable = true;
# Enable sound with pipewire.
sound.enable = false;
# Enable touchpad support (enabled default in most desktopManager).
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with passwd.
programs.nix-ld.enable = true; programs.nix-ld.enable = true;
programs.nix-ld.libraries = with pkgs; [ programs.nix-ld.libraries = with pkgs; [
]; ];
@ -68,7 +55,7 @@
users.users.k = { users.users.k = {
isNormalUser = true; isNormalUser = true;
description = "k"; description = "k";
extraGroups = [ "networkmanager" "wheel" "libvirtd" ]; extraGroups = [ "networkmanager" "wheel" ];
packages = with pkgs; [zsh]; packages = with pkgs; [zsh];
shell = pkgs.zsh; shell = pkgs.zsh;
}; };
@ -91,10 +78,6 @@
intel-media-driver intel-media-driver
microcodeIntel microcodeIntel
]; ];
networking.firewall = {
enable = false;
allowedTCPPorts = [80 443 22 ];
};
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions

View File

@ -1,5 +1,12 @@
{pkgs,lib,...}: {pkgs,lib,...}:
{ {
networking.firewall = {
enable = true;
allowedTCPPorts = [80 443 22 ];
};
services.openssh = { services.openssh = {
enable = true; enable = true;
}; };
@ -16,6 +23,7 @@
HTTP_PORT = 8001; HTTP_PORT = 8001;
DOMAIN = "dhilton.xyz"; DOMAIN = "dhilton.xyz";
ROOT_URL = "https://git.dhilton.xyz"; ROOT_URL = "https://git.dhilton.xyz";
ENABLE_PUSH_CREATE_USER = true;
}; };
}; };
}; };
@ -25,22 +33,12 @@
url = "https://git.dhilton.xyz"; url = "https://git.dhilton.xyz";
name = "nixsrv"; name = "nixsrv";
token = "LaqTWUDidsm510TGBglGvcphsUxYmCzMjrZbEtJj"; token = "LaqTWUDidsm510TGBglGvcphsUxYmCzMjrZbEtJj";
labels = ["ubuntu-latest:docker://node:16-bullseye" "ubuntu-22.04:docker://node:16-bullseye" "ubuntu-20.04:docker://node:16-bullseye" "ubuntu-18.04:docker://node:16-buster" "native:host"]; labels = ["ubuntu-latest:docker://catthehacker/ubuntu:act-latest" "ubuntu-22.04:docker://catthehacker/ubuntu:act-22.04" "ubuntu-20.04:docker://catthehacker/ubuntu:act-20.04" "ubuntu-18.04:docker://catthehacker/ubuntu:act-18.04" "native:host"];
};
services.pufferpanel = {
enable = true;
extraGroups =["docker"];
extraPackages = [pkgs.jre];
environment = {
PUFFER_WEB_HOST = ":8002";
PUFFER_PANEL_REGISTRATIONENABLED = "false";
};
}; };
services.home-assistant = { services.home-assistant = {
enable = true; enable = true;
extraComponents = ["wiz" "fail2ban" "whisper" "piper" "wyoming" "ollama"]; extraComponents = ["wiz" "fail2ban"];
config = { config = {
default_config={}; default_config={};
"automation ui" = "!include automations.yaml"; "automation ui" = "!include automations.yaml";
@ -68,33 +66,8 @@
settings = { server.port = 8005; server.secret_key = "secretlol";}; settings = { server.port = 8005; server.secret_key = "secretlol";};
}; };
networking.domain = "dhilton.xyz";
services.postgresql.enable = true;
services.akkoma.enable = true;
services.akkoma.config = {
":pleroma" = {
":instance" = {
name = "dhilton fedi";
description = "dhilton akkoma server";
email = "markers711@gmail.com";
registration_open = false;
};
"Pleroma.Web.Endpoint" = {
url.host = "fed.dhilton.xyz";
};
};
};
services.akkoma.nginx = {
enableACME = true;
forceSSL = true;
};
services.fail2ban = { services.fail2ban = {
enable=false; enable=true;
}; };
virtualisation.docker = { virtualisation.docker = {
@ -118,6 +91,7 @@
"git.dhilton.xyz" = { "git.dhilton.xyz" = {
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
forceSSL = true;
locations."/" = { locations."/" = {
proxyPass = "http://127.0.0.1:8001"; proxyPass = "http://127.0.0.1:8001";
proxyWebsockets = true; proxyWebsockets = true;
@ -125,6 +99,7 @@
}; };
"ntfy.dhilton.xyz" = { "ntfy.dhilton.xyz" = {
forceSSL = true;
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
@ -134,6 +109,7 @@
}; };
"jel.dhilton.xyz" = { "jel.dhilton.xyz" = {
forceSSL = true;
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
@ -143,6 +119,7 @@
}; };
"puf.dhilton.xyz" = { "puf.dhilton.xyz" = {
forceSSL = true;
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
@ -152,6 +129,7 @@
}; };
"srx.dhilton.xyz" = { "srx.dhilton.xyz" = {
forceSSL = true;
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
@ -160,16 +138,8 @@
}; };
}; };
"map.dhilton.xyz" = {
addSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:8100";
proxyWebsockets = true;
};
};
"hom.dhilton.xyz" = { "hom.dhilton.xyz" = {
forceSSL = true;
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
@ -184,20 +154,4 @@
acceptTerms = true; acceptTerms = true;
defaults.email = "markers711@gmail.com"; defaults.email = "markers711@gmail.com";
}; };
virtualisation.libvirtd = {
enable = true;
qemu = {
package = pkgs.qemu_kvm;
runAsRoot = true;
swtpm.enable = true;
ovmf = {
enable = true;
packages = [(pkgs.OVMF.override {
secureBoot = true;
tpmSupport = true;
}).fd];
};
};
};
} }