nixos-config/machines/renge/configuration.nix

67 lines
1.3 KiB
Nix
Raw Normal View History

{ pkgs, ... }:
2022-03-23 15:03:08 +01:00
{
imports = [
./hardware-configuration.nix
../../modules
2022-03-23 17:15:28 +01:00
2022-03-26 12:49:01 +01:00
./services/bang-evaluator.nix
2022-06-27 14:45:48 +02:00
./services/buchborgen.nix
2022-03-26 14:39:47 +01:00
./services/coturn.nix
2022-03-25 20:30:03 +01:00
./services/element-web.nix
2023-12-10 15:36:11 +01:00
./services/forgejo.nix
./services/grafana.nix
2022-03-23 17:27:55 +01:00
./services/hedgedoc.nix
./services/invidious
./services/matrix
2022-03-23 18:07:16 +01:00
./services/murmur.nix
2022-07-16 19:52:40 +02:00
./services/password-hash-self-service.nix
./services/prometheus.nix
2022-09-08 11:10:47 +02:00
./services/psycho-power-papagei.de
./services/sbruder.xyz
2022-04-09 10:10:08 +02:00
./services/schabernack.nix
2022-03-23 15:03:08 +01:00
];
sbruder = {
nginx.hardening.enable = true;
2023-12-31 12:54:51 +01:00
restic.system.enable = true;
2022-03-23 15:03:08 +01:00
wireguard.home.enable = true;
};
networking.hostName = "renge";
2023-12-31 12:54:51 +01:00
system.stateVersion = "23.11";
2022-03-23 15:03:08 +01:00
services.nginx = {
enable = true;
virtualHosts."sbruder.de" = {
enableACME = true;
forceSSL = true;
root = pkgs.sbruder.contact;
};
2022-03-23 15:03:08 +01:00
};
networking.firewall.allowedTCPPorts = [
80
443
];
2022-03-23 17:16:00 +01:00
2023-12-31 12:54:51 +01:00
services.postgresql = {
enable = true;
package = pkgs.postgresql_16;
};
2022-03-23 17:16:00 +01:00
services.postgresqlBackup = {
enable = true;
startAt = [ ]; # triggered by restic system backup
location = "/var/lib/postgresql-backup";
compression = "none";
2022-03-23 17:16:00 +01:00
};
systemd.services.restic-backups-system = {
after = [ "postgresqlBackup.service" ];
wants = [ "postgresqlBackup.service" ];
};
2022-03-23 15:03:08 +01:00
}