Compare commits

..

3 Commits

Author SHA1 Message Date
k
52e77fd1d2 Merge branch 'master' of https://git.dhilton.xyz/k/nixos_configs 2025-01-02 02:09:29 +00:00
k
29f4ab693d added docker user 2025-01-02 02:09:07 +00:00
k
cf0d1d2503 added minecraft ports 2025-01-02 02:08:47 +00:00
2 changed files with 32 additions and 10 deletions

View File

@ -18,20 +18,34 @@
trusted-public-keys = ["nix.dhilton.xyz:MOW060dF1A0/UXmPZBue9KMxCO13PHYFwx1X9hcdYZ4="]; trusted-public-keys = ["nix.dhilton.xyz:MOW060dF1A0/UXmPZBue9KMxCO13PHYFwx1X9hcdYZ4="];
}; };
}; };
nixpkgs.config.allowUnfree = true;
programs = { programs = {
nix-ld.enable = true; nix-ld.enable = true;
nix-ld.libraries = with pkgs; [glibc glib]; nix-ld.libraries = with pkgs; [glibc glib];
zsh.enable = true; zsh.enable = true;
}; };
users = {
users.users.k = { motd = "Welcome to the Server";
defaultUserShell = pkgs.zsh;
users = {
k = {
isNormalUser = true; isNormalUser = true;
description = "k"; description = "k";
extraGroups = ["networkmanager" "wheel"]; extraGroups = ["networkmanager" "wheel"];
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPKbKVe6gneJ9ghFih3bOeL++iDNPJNIMoZSdNMOsD0I k@laptop"];
packages = with pkgs; [zsh]; packages = with pkgs; [zsh];
shell = pkgs.zsh; shell = pkgs.zsh;
}; };
docker = {
isNormalUser = true;
description = "user for runing docker";
extraGroups = ["docker"];
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPKbKVe6gneJ9ghFih3bOeL++iDNPJNIMoZSdNMOsD0I k@laptop"];
packages = with pkgs; [docker-compose];
};
};
};
home-manager = {users = {"k" = import ./home.nix;};}; home-manager = {users = {"k" = import ./home.nix;};};
@ -48,7 +62,6 @@
vaapiVdpau vaapiVdpau
libvdpau-va-gl libvdpau-va-gl
vpl-gpu-rt vpl-gpu-rt
neovim
]; ];
}; };

View File

@ -5,8 +5,8 @@
}: { }: {
networking.firewall = { networking.firewall = {
enable = true; enable = true;
allowedTCPPorts = [80 443 22 26615]; allowedTCPPorts = [80 443 22 26615 25565 24454];
allowedUDPPorts = [26615]; allowedUDPPorts = [26615 25565 24454];
}; };
security.acme = { security.acme = {
@ -169,6 +169,15 @@
}; };
}; };
"map.dhilton.xyz" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:8100";
proxyWebsockets = true;
};
};
"nix.dhilton.xyz" = { "nix.dhilton.xyz" = {
locations."/".proxyPass = "http://127.0.0.1:5000"; locations."/".proxyPass = "http://127.0.0.1:5000";
}; };