nixos-config/machines/fuuko/configuration.nix

69 lines
1.5 KiB
Nix
Raw Normal View History

2021-01-26 18:42:42 +01:00
{ config, lib, pkgs, ... }:
{
imports = [
./hardware-configuration.nix
../../modules
../../users/simon
2021-02-24 20:55:07 +01:00
2021-03-09 21:22:19 +01:00
./services/ankisyncd.nix
2021-03-06 17:11:36 +01:00
./services/dnsmasq.nix
2021-04-03 18:47:01 +02:00
./services/drone
2021-02-21 13:04:36 +01:00
./services/gitea.nix
2021-02-24 20:55:21 +01:00
./services/grafana.nix
2021-03-10 15:40:55 +01:00
./services/hedgedoc.nix
2021-03-18 13:01:59 +01:00
./services/matrix
2021-03-05 16:12:25 +01:00
./services/media.nix
2021-02-24 20:55:07 +01:00
./services/prometheus.nix
./services/scan.nix
2021-02-19 18:35:44 +01:00
./services/torrent.nix
2021-03-05 15:27:23 +01:00
./services/wordclock-dimmer.nix
2021-01-26 18:42:42 +01:00
];
sbruder = {
wireguard.home.enable = true;
nginx.hardening.enable = true;
2021-03-08 17:33:30 +01:00
restic.system = {
enable = true;
extraPaths = [
"/data"
];
extraExcludes = [
"/data/media/video"
"/data/misc"
"/data/torrent"
];
};
2021-04-03 18:47:01 +02:00
unfree.allowSoftware = true;
2021-01-26 18:42:42 +01:00
};
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts."fuuko.home.sbruder.de" = {
enableACME = true;
forceSSL = true;
};
};
networking.firewall.allowedTCPPorts = [ 80 443 ];
systemd.services.nginx.serviceConfig.SupplementaryGroups = lib.singleton "keys";
2021-01-26 18:42:42 +01:00
2021-03-09 11:50:32 +01:00
services.postgresqlBackup = {
enable = true;
startAt = [ ]; # triggered by restic system backup
location = "/data/backup/postgresql";
};
systemd.services.restic-backups-system = {
after = [ "postgresqlBackup.service" ];
wants = [ "postgresqlBackup.service" ];
};
2021-01-26 18:42:42 +01:00
networking.hostName = "fuuko";
system.stateVersion = "20.09";
}