- Introduced a new module for a11ywatch with Podman support, creating a bridge network and defining backend and frontend containers. - Configured Nginx to serve the a11ywatch application with SSL and ACME support. - Added user and group configurations for a11ywatch. - Created a systemd service to ensure the Podman network exists on boot. Implement Firefox Container Controller extension and host - Added a module for the Firefox Container Controller extension, allowing installation via Nix. - Created a native messaging host for the extension to communicate with the container controller. - Included CLI helpers to enqueue commands for showing and hiding containers. Enable fingerprint authentication in PAM - Configured fingerprint authentication for login, sudo, and swaylock services. Setup Raspberry Pi OS image creation script - Developed a script to create a read-only Raspberry Pi OS Lite image with Snapcast client. - Included configuration for Wi-Fi, hostname, and Snapcast server. - Implemented user and group setup for Snapcast client and ensured necessary services are enabled. Document Raspberry Pi Zero W setup instructions - Added detailed instructions for configuring Raspberry Pi OS on Zero W, including disabling unused services and setting up Snapcast client. Create test configuration script for NixOS - Implemented a script to perform dry-builds for NixOS configurations, allowing for easy validation of host configurations.
111 lines
3.0 KiB
Nix
111 lines
3.0 KiB
Nix
{ lib, pkgs, ... }: {
|
|
imports = [
|
|
./utils/bento.nix
|
|
./utils/modules/sops.nix
|
|
./utils/modules/lego/lego.nix
|
|
|
|
|
|
./modules/mysql.nix
|
|
./modules/postfix.nix
|
|
./utils/modules/nginx.nix
|
|
./modules/bitwarden
|
|
./modules/authelia
|
|
./modules/collabora.nix
|
|
./modules/nextcloud
|
|
./modules/rustdesk.nix
|
|
./modules/postgresql.nix
|
|
./modules/grafana.nix
|
|
./modules/loki.nix
|
|
./modules/victoriametrics.nix
|
|
./modules/updns.nix
|
|
|
|
./utils/modules/autoupgrade.nix
|
|
./utils/modules/promtail
|
|
./utils/modules/borgbackup.nix
|
|
./utils/modules/netdata.nix
|
|
|
|
./hardware-configuration.nix
|
|
|
|
# ./modules/a11ywatch.nix
|
|
|
|
./modules/web/typo3.nix
|
|
./modules/web/stack.nix
|
|
|
|
./sites/autoconfig.cloonar.com.nix
|
|
./sites/feeds.cloonar.com.nix
|
|
|
|
./sites/cloonar.com.nix
|
|
./sites/gbv-aktuell.at.nix
|
|
./sites/matomo.cloonar.com.nix
|
|
./sites/support.cloonar.dev.nix
|
|
./sites/stage.cloonar-technologies.at.nix
|
|
|
|
./sites/cloonar.dev.nix
|
|
./sites/paraclub.at.nix
|
|
./sites/api.paraclub.at.nix
|
|
./sites/module.paraclub.at.nix
|
|
./sites/tandem.paraclub.at.nix
|
|
./sites/paraclub.cloonar.dev.nix
|
|
./sites/api.paraclub.cloonar.dev.nix
|
|
./sites/tandem.paraclub.cloonar.dev.nix
|
|
./sites/module.paraclub.cloonar.dev.nix
|
|
./sites/gbv-aktuell.cloonar.dev.nix
|
|
./sites/stage.myhidden.life.nix
|
|
./sites/stage.korean-skin.care.nix
|
|
./sites/feeds.jordanrannells.com.nix
|
|
./sites/dialog-relations.cloonar.dev.nix
|
|
./sites/lena-schilling.cloonar.dev.nix
|
|
./sites/lena-schilling.at.nix
|
|
];
|
|
|
|
nixpkgs.overlays = [
|
|
(import ./overlays/packages.nix)
|
|
];
|
|
|
|
nixpkgs.config.permittedInsecurePackages = [
|
|
"openssl-1.1.1v"
|
|
"openssl-1.1.1w"
|
|
];
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
vim
|
|
davfs2
|
|
screen
|
|
ucommon
|
|
php
|
|
php83
|
|
];
|
|
|
|
time.timeZone = "Europe/Vienna";
|
|
|
|
services.logind.extraConfig = "RuntimeDirectorySize=2G";
|
|
|
|
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
|
sops.defaultSopsFile = ./secrets.yaml;
|
|
|
|
nix.gc = {
|
|
automatic = true;
|
|
options = "--delete-older-than 60d";
|
|
};
|
|
|
|
boot.tmp.cleanOnBoot = true;
|
|
zramSwap.enable = true;
|
|
networking.hostName = "web-arm";
|
|
networking.domain = "cloonar.com";
|
|
services.openssh.enable = true;
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDN/2SAFm50kraB1fepAizox/QRXxB7WbqVbH+5OPalDT47VIJGNKOKhixQoqhABHxEoLxdf/C83wxlCVlPV9poLfDgVkA3Lyt5r3tSFQ6QjjOJAgchWamMsxxyGBedhKvhiEzcr/Lxytnoz3kjDG8fqQJwEpdqMmJoMUfyL2Rqp16u+FQ7d5aJtwO8EUqovhMaNO7rggjPpV/uMOg+tBxxmscliN7DLuP4EMTA/FwXVzcFNbOx3K9BdpMRAaSJt4SWcJO2cS2KHA5n/H+PQI7nz5KN3Yr/upJN5fROhi/SHvK39QOx12Pv7FCuWlc+oR68vLaoCKYhnkl3DnCfc7A7"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIRQuPqH5fdX3KEw7DXzWEdO3AlUn1oSmtJtHB71ICoH Generated By Termius"
|
|
];
|
|
|
|
# backups
|
|
borgbackup.repo = "u149513-sub8@u149513-sub8.your-backup.de:borg";
|
|
|
|
networking.firewall = {
|
|
enable = true;
|
|
allowedTCPPorts = [ 22 80 443 ];
|
|
};
|
|
|
|
system.stateVersion = "22.05";
|
|
}
|