Formatting
This commit is contained in:
parent
a015dc2a89
commit
608fd46eb4
@ -6,8 +6,10 @@ let
|
|||||||
];
|
];
|
||||||
hostname = "architect";
|
hostname = "architect";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
imports = [ # Include the results of the hardware scan.
|
{
|
||||||
|
imports = [
|
||||||
|
# Include the results of the hardware scan.
|
||||||
./backup.nix
|
./backup.nix
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./firewall.nix
|
./firewall.nix
|
||||||
@ -29,7 +31,7 @@ in {
|
|||||||
./invidious.nix
|
./invidious.nix
|
||||||
./nitter.nix
|
./nitter.nix
|
||||||
./lidarr.nix
|
./lidarr.nix
|
||||||
# ./navidrome.nix
|
# ./navidrome.nix
|
||||||
./jellyfin.nix
|
./jellyfin.nix
|
||||||
./prosody.nix
|
./prosody.nix
|
||||||
./deluge.nix
|
./deluge.nix
|
||||||
@ -43,7 +45,7 @@ in {
|
|||||||
];
|
];
|
||||||
|
|
||||||
time.timeZone = "Europe/Rome";
|
time.timeZone = "Europe/Rome";
|
||||||
# system.stateVersion = "21.11";
|
# system.stateVersion = "21.11";
|
||||||
users.users.giulio.openssh.authorizedKeys.keys = pubkeys;
|
users.users.giulio.openssh.authorizedKeys.keys = pubkeys;
|
||||||
boot = {
|
boot = {
|
||||||
initrd = {
|
initrd = {
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "htdel.giugl.io";
|
domain = "htdel.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
deluge = {
|
deluge = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -49,7 +49,8 @@ let
|
|||||||
wireguard_udp
|
wireguard_udp
|
||||||
];
|
];
|
||||||
|
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
networking = {
|
networking = {
|
||||||
# needed to use nftables
|
# needed to use nftables
|
||||||
firewall.enable = false;
|
firewall.enable = false;
|
||||||
|
@ -5,7 +5,8 @@ let
|
|||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
host = "127.0.0.1";
|
host = "127.0.0.1";
|
||||||
port = 8123;
|
port = 8123;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
mosquitto = {
|
mosquitto = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
domain = "auth.giugl.io";
|
domain = "auth.giugl.io";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
keycloak = {
|
keycloak = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "htlid.giugl.io";
|
domain = "htlid.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
lidarr = {
|
lidarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -97,9 +97,9 @@ in
|
|||||||
return 200 '${builtins.toJSON client}';
|
return 200 '${builtins.toJSON client}';
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# locations."/".extraConfig = ''
|
# locations."/".extraConfig = ''
|
||||||
# return 404;
|
# return 404;
|
||||||
# '';
|
# '';
|
||||||
|
|
||||||
# forward all Matrix API calls to the synapse Matrix homeserver
|
# forward all Matrix API calls to the synapse Matrix homeserver
|
||||||
locations."/_matrix" = {
|
locations."/_matrix" = {
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
domain = "s3.giugl.io";
|
domain = "s3.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
minio.enable = true;
|
minio.enable = true;
|
||||||
|
|
||||||
|
@ -77,7 +77,7 @@ in {
|
|||||||
PrivateTmp = true;
|
PrivateTmp = true;
|
||||||
PrivateUsers = true;
|
PrivateUsers = true;
|
||||||
|
|
||||||
# ProtectClock = true;
|
# ProtectClock = true;
|
||||||
ProtectControlGroups = true;
|
ProtectControlGroups = true;
|
||||||
ProtectHostname = true;
|
ProtectHostname = true;
|
||||||
ProtectKernelLogs = true;
|
ProtectKernelLogs = true;
|
||||||
|
@ -6,7 +6,8 @@ let
|
|||||||
library_path = "/media/Music";
|
library_path = "/media/Music";
|
||||||
beets_config = "/media/beets.conf";
|
beets_config = "/media/beets.conf";
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
navidrome = {
|
navidrome = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "cloud.giugl.io";
|
domain = "cloud.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
redis_port = 6379;
|
redis_port = 6379;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
mysql = {
|
mysql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
domain = "tweet.giugl.io";
|
domain = "tweet.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
nitter = {
|
nitter = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "htnzb.giugl.io";
|
domain = "htnzb.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
nzbget = {
|
nzbget = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
{
|
{
|
||||||
openresty_oidc_block =
|
openresty_oidc_block =
|
||||||
{ access_role ? "", whitelisted_ips ? [] }: ''
|
{ access_role ? "", whitelisted_ips ? [ ] }: ''
|
||||||
access_by_lua_block {
|
access_by_lua_block {
|
||||||
local opts = {
|
local opts = {
|
||||||
discovery = "https://auth.giugl.io/realms/master/.well-known/openid-configuration",
|
discovery = "https://auth.giugl.io/realms/master/.well-known/openid-configuration",
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
domain = "media.giugl.io";
|
domain = "media.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services.plex = {
|
services.plex = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.unstable.plex;
|
package = pkgs.unstable.plex;
|
||||||
|
@ -5,7 +5,8 @@ let
|
|||||||
conference_domain = "conference.${domain}";
|
conference_domain = "conference.${domain}";
|
||||||
upload_domain = "uploads.${domain}";
|
upload_domain = "uploads.${domain}";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
prosody = {
|
prosody = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
domain = "htpro.giugl.io";
|
domain = "htpro.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
prowlarr.enable = true;
|
prowlarr.enable = true;
|
||||||
|
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "htrad.giugl.io";
|
domain = "htrad.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
radarr = {
|
radarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -10,7 +10,7 @@ in
|
|||||||
searx = {
|
searx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.searxng;
|
package = pkgs.searxng;
|
||||||
# package = mach-nix.buildPythonPackage "https://github.com/searxng/searxng/commit/2cf1425e8bc5d3143b6e001e82a034a794e8a206https://github.com/searxng/searxng/commit/2cf1425e8bc5d3143b6e001e82a034a794e8a206";
|
# package = mach-nix.buildPythonPackage "https://github.com/searxng/searxng/commit/2cf1425e8bc5d3143b6e001e82a034a794e8a206https://github.com/searxng/searxng/commit/2cf1425e8bc5d3143b6e001e82a034a794e8a206";
|
||||||
|
|
||||||
environmentFile = /secrets/searx/env;
|
environmentFile = /secrets/searx/env;
|
||||||
settings = {
|
settings = {
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
domain = "htson.giugl.io";
|
domain = "htson.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
sonarr = {
|
sonarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -4,7 +4,8 @@ let
|
|||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
|
|
||||||
ifname = "ts0";
|
ifname = "ts0";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
tailscale = {
|
tailscale = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -3,7 +3,8 @@
|
|||||||
let
|
let
|
||||||
domain = "httra.giugl.io";
|
domain = "httra.giugl.io";
|
||||||
network = import ./network.nix;
|
network = import ./network.nix;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
transmission = {
|
transmission = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -9,7 +9,8 @@ let
|
|||||||
export __VK_LAYER_NV_optimus=NVIDIA_only
|
export __VK_LAYER_NV_optimus=NVIDIA_only
|
||||||
exec -a "$0" "$@"
|
exec -a "$0" "$@"
|
||||||
'';
|
'';
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
imports = [ ./hardware.nix ./wireguard.nix ./sound.nix ];
|
imports = [ ./hardware.nix ./wireguard.nix ./sound.nix ];
|
||||||
|
|
||||||
boot = {
|
boot = {
|
||||||
@ -70,5 +71,5 @@ in {
|
|||||||
|
|
||||||
programs.steam.enable = true;
|
programs.steam.enable = true;
|
||||||
environment.systemPackages = with pkgs; [ efibootmgr nvidia-offload ];
|
environment.systemPackages = with pkgs; [ efibootmgr nvidia-offload ];
|
||||||
# system.stateVersion = "21.05"; # Did you read the comment?
|
# system.stateVersion = "21.05"; # Did you read the comment?
|
||||||
}
|
}
|
||||||
|
@ -5,14 +5,17 @@
|
|||||||
let
|
let
|
||||||
mkRole = role: import (../roles + "/${role}.nix");
|
mkRole = role: import (../roles + "/${role}.nix");
|
||||||
|
|
||||||
users_mod = (map (u:
|
users_mod = (map
|
||||||
|
(u:
|
||||||
user.mkUser {
|
user.mkUser {
|
||||||
name = u.user;
|
name = u.user;
|
||||||
roles = u.roles;
|
roles = u.roles;
|
||||||
}) users);
|
})
|
||||||
|
users);
|
||||||
roles_mod = (map (r: mkRole r) roles);
|
roles_mod = (map (r: mkRole r) roles);
|
||||||
add_imports = imports;
|
add_imports = imports;
|
||||||
in nixpkgs.lib.nixosSystem {
|
in
|
||||||
|
nixpkgs.lib.nixosSystem {
|
||||||
inherit system;
|
inherit system;
|
||||||
|
|
||||||
modules = [
|
modules = [
|
||||||
|
@ -5,7 +5,8 @@
|
|||||||
let
|
let
|
||||||
mkRole = role: import (../roles/home + "/${role}.nix");
|
mkRole = role: import (../roles/home + "/${role}.nix");
|
||||||
roles_mod = (map (r: mkRole r) roles);
|
roles_mod = (map (r: mkRole r) roles);
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
users.groups.plugdev = { };
|
users.groups.plugdev = { };
|
||||||
|
|
||||||
fileSystems."/home/${name}/Downloads" = {
|
fileSystems."/home/${name}/Downloads" = {
|
||||||
@ -27,7 +28,8 @@
|
|||||||
let
|
let
|
||||||
mkRole = role: import (../roles/home + "/${role}.nix");
|
mkRole = role: import (../roles/home + "/${role}.nix");
|
||||||
roles_mod = (map (r: mkRole r) roles);
|
roles_mod = (map (r: mkRole r) roles);
|
||||||
in home-manager.lib.homeManagerConfiguration {
|
in
|
||||||
|
home-manager.lib.homeManagerConfiguration {
|
||||||
inherit pkgs;
|
inherit pkgs;
|
||||||
modules = [
|
modules = [
|
||||||
{
|
{
|
||||||
|
@ -9,7 +9,8 @@ let
|
|||||||
name = "guake";
|
name = "guake";
|
||||||
package = pkgs.guake;
|
package = pkgs.guake;
|
||||||
});
|
});
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
imports = [ ./gnome.nix ];
|
imports = [ ./gnome.nix ];
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
Loading…
Reference in New Issue
Block a user