nixos-config/machines/renge/configuration.nix

75 lines
1.5 KiB
Nix
Raw Normal View History

# SPDX-FileCopyrightText: 2022-2024 Simon Bruder <simon@sbruder.de>
#
# SPDX-License-Identifier: AGPL-3.0-or-later
{ pkgs, ... }:
2022-03-23 15:03:08 +01:00
{
imports = [
./hardware-configuration.nix
../../modules
2022-03-23 17:15:28 +01:00
2022-06-27 14:45:48 +02:00
./services/buchborgen.nix
2022-03-26 14:39:47 +01:00
./services/coturn.nix
2022-03-25 20:30:03 +01:00
./services/element-web.nix
2023-12-10 15:36:11 +01:00
./services/forgejo.nix
./services/grafana.nix
2022-03-23 17:27:55 +01:00
./services/hedgedoc.nix
./services/invidious
./services/matrix
2022-07-16 19:52:40 +02:00
./services/password-hash-self-service.nix
./services/prometheus.nix
./services/sbruder.xyz
2022-04-09 10:10:08 +02:00
./services/schabernack.nix
2022-03-23 15:03:08 +01:00
];
sbruder = {
nginx.hardening.enable = true;
2024-08-22 16:13:13 +02:00
restic = {
enable = true;
2024-08-22 16:13:13 +02:00
backups.system.enable = true;
};
2022-03-23 15:03:08 +01:00
wireguard.home.enable = true;
infovhost.enable = true;
2024-01-27 17:22:53 +01:00
wkd = {
enable = true;
};
2022-03-23 15:03:08 +01:00
};
networking.hostName = "renge";
2023-12-31 12:54:51 +01:00
system.stateVersion = "23.11";
2022-03-23 15:03:08 +01:00
services.nginx = {
enable = true;
virtualHosts."sbruder.de" = {
enableACME = true;
forceSSL = true;
root = pkgs.sbruder.contact;
};
2022-03-23 15:03:08 +01:00
};
networking.firewall.allowedTCPPorts = [
80
443
];
2022-03-23 17:16:00 +01:00
2023-12-31 12:54:51 +01:00
services.postgresql = {
enable = true;
package = pkgs.postgresql_16;
};
2022-03-23 17:16:00 +01:00
services.postgresqlBackup = {
enable = true;
startAt = [ ]; # triggered by restic system backup
location = "/var/lib/postgresql-backup";
compression = "none";
2022-03-23 17:16:00 +01:00
};
systemd.services.restic-backups-system = {
after = [ "postgresqlBackup.service" ];
wants = [ "postgresqlBackup.service" ];
};
2022-03-23 15:03:08 +01:00
}