nixos-config/machines/renge/configuration.nix

65 lines
1.3 KiB
Nix
Raw Normal View History

{ pkgs, ... }:
2022-03-23 15:03:08 +01:00
{
imports = [
./hardware-configuration.nix
../../modules
2022-03-23 17:15:28 +01:00
2022-03-23 17:55:55 +01:00
./services/ankisyncd.nix
2022-03-25 20:30:03 +01:00
./services/element-web.nix
2022-03-23 17:15:28 +01:00
./services/gitea.nix
./services/grafana.nix
2022-03-23 17:27:55 +01:00
./services/hedgedoc.nix
./services/invidious
./services/libreddit.nix
./services/matrix
2022-03-23 18:07:16 +01:00
./services/murmur.nix
./services/nitter.nix
./services/prometheus.nix
./services/sbruder.xyz
2022-03-23 15:03:08 +01:00
];
sbruder = {
nginx.hardening.enable = true;
restic.system = {
enable = true;
};
wireguard.home.enable = true;
};
networking.hostName = "renge";
system.stateVersion = "21.11";
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts."sbruder.de" = {
enableACME = true;
forceSSL = true;
root = pkgs.sbruder.contact;
};
2022-03-23 15:03:08 +01:00
};
networking.firewall.allowedTCPPorts = [
80
443
];
2022-03-23 17:16:00 +01:00
services.postgresqlBackup = {
enable = true;
startAt = [ ]; # triggered by restic system backup
location = "/var/lib/postgresql-backup";
};
systemd.services.restic-backups-system = {
after = [ "postgresqlBackup.service" ];
wants = [ "postgresqlBackup.service" ];
};
2022-03-23 15:03:08 +01:00
}