mirror of
https://github.com/harryssecret/homelab-nix.git
synced 2025-08-08 14:40:19 +02:00
using generated config files instead of copying mine over to git
This commit is contained in:
parent
931557e4b5
commit
0d78cad5bc
4 changed files with 6 additions and 129 deletions
|
@ -1,8 +1,12 @@
|
||||||
{ inputs, username, ... }:
|
{ inputs, username, ... }:
|
||||||
{
|
{
|
||||||
|
# diva provides uptime-kuma, and website hosting for rougebordeaux.xyz
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
./hardware.nix
|
# these files should be automatically generated by nixos-infect
|
||||||
./networking.nix
|
/etc/nixos/configuration/hardware.nix
|
||||||
|
/etc/nixos/configuration/networking.nix
|
||||||
|
|
||||||
./features
|
./features
|
||||||
../../shared
|
../../shared
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,78 +0,0 @@
|
||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
"${
|
|
||||||
fetchTarball {
|
|
||||||
url = "https://github.com/onny/nixos-nextcloud-testumgebung/archive/fa6f062830b4bc3cedb9694c1dbf01d5fdf775ac.tar.gz";
|
|
||||||
sha256 = "0gzd0276b8da3ykapgqks2zhsqdv4jjvbv97dsxg0hgrhb74z0fs";
|
|
||||||
}
|
|
||||||
}/nextcloud-extras.nix"
|
|
||||||
./nextcloud-network.nix
|
|
||||||
]; # adding caddy support
|
|
||||||
|
|
||||||
sops.secrets.adminNextcloudPass = {
|
|
||||||
owner = "nextcloud";
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nextcloud = {
|
|
||||||
enable = true;
|
|
||||||
hostName = "cloud.hypervirtual.world";
|
|
||||||
database.createLocally = true;
|
|
||||||
webserver = "caddy";
|
|
||||||
configureRedis = true;
|
|
||||||
package = pkgs.nextcloud30;
|
|
||||||
config = {
|
|
||||||
dbtype = "pgsql";
|
|
||||||
adminpassFile = config.sops.secrets.adminNextcloudPass.path;
|
|
||||||
};
|
|
||||||
|
|
||||||
settings = {
|
|
||||||
enabledPreviewProviders = [
|
|
||||||
"OC\\Preview\\BMP"
|
|
||||||
"OC\\Preview\\GIF"
|
|
||||||
"OC\\Preview\\JPEG"
|
|
||||||
"OC\\Preview\\Krita"
|
|
||||||
"OC\\Preview\\MarkDown"
|
|
||||||
"OC\\Preview\\MP3"
|
|
||||||
"OC\\Preview\\OpenDocument"
|
|
||||||
"OC\\Preview\\PNG"
|
|
||||||
"OC\\Preview\\TXT"
|
|
||||||
"OC\\Preview\\XBitmap"
|
|
||||||
"OC\\Preview\\HEIC"
|
|
||||||
];
|
|
||||||
|
|
||||||
trustedDomains = [ "cloud.hypervirtual.world" ];
|
|
||||||
overwriteprotocol = "https";
|
|
||||||
log_type = "file"; # temporary fix for https://nixos.org/manual/nixos/stable/#module-services-nextcloud-warning-logreader
|
|
||||||
default_phone_region = "FR";
|
|
||||||
default_locale = "fr_FR";
|
|
||||||
default_language = "fr";
|
|
||||||
default_timezone = "Europe/Paris";
|
|
||||||
"memories.exiftool" = "${lib.getExe pkgs.exiftool}";
|
|
||||||
};
|
|
||||||
|
|
||||||
phpExtraExtensions = all: [
|
|
||||||
all.pdlib
|
|
||||||
all.redis
|
|
||||||
all.bz2
|
|
||||||
];
|
|
||||||
|
|
||||||
phpOptions."opcache.interned_strings_buffer" = "23";
|
|
||||||
appstoreEnable = true; # why i would want appstore to be disabled ???
|
|
||||||
autoUpdateApps.enable = true;
|
|
||||||
cli.memoryLimit = "4G";
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages =
|
|
||||||
let
|
|
||||||
php = pkgs.php.buildEnv { extraConfig = "memory_limit = 4G"; };
|
|
||||||
in
|
|
||||||
[
|
|
||||||
php
|
|
||||||
];
|
|
||||||
}
|
|
|
@ -1,14 +0,0 @@
|
||||||
{ modulesPath, ... }:
|
|
||||||
{
|
|
||||||
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
|
|
||||||
boot.loader.grub = {
|
|
||||||
efiSupport = true;
|
|
||||||
efiInstallAsRemovable = true;
|
|
||||||
device = "nodev";
|
|
||||||
};
|
|
||||||
fileSystems."/boot" = { device = "/dev/disk/by-uuid/476E-933D"; fsType = "vfat"; };
|
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "xen_blkfront" ];
|
|
||||||
boot.initrd.kernelModules = [ "nvme" ];
|
|
||||||
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; };
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,35 +0,0 @@
|
||||||
{ lib, ... }: {
|
|
||||||
# This file was populated at runtime with the networking
|
|
||||||
# details gathered from the active system.
|
|
||||||
networking = {
|
|
||||||
nameservers = [ "2a01:4ff:ff00::add:1"
|
|
||||||
"2a01:4ff:ff00::add:2"
|
|
||||||
"185.12.64.2"
|
|
||||||
];
|
|
||||||
defaultGateway = "172.31.1.1";
|
|
||||||
defaultGateway6 = {
|
|
||||||
address = "fe80::1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
dhcpcd.enable = false;
|
|
||||||
usePredictableInterfaceNames = lib.mkForce false;
|
|
||||||
interfaces = {
|
|
||||||
eth0 = {
|
|
||||||
ipv4.addresses = [
|
|
||||||
{ address="95.216.145.45"; prefixLength=32; }
|
|
||||||
];
|
|
||||||
ipv6.addresses = [
|
|
||||||
{ address="2a01:4f9:c011:97d1::1"; prefixLength=64; }
|
|
||||||
{ address="fe80::9400:4ff:fe44:c3cd"; prefixLength=64; }
|
|
||||||
];
|
|
||||||
ipv4.routes = [ { address = "172.31.1.1"; prefixLength = 32; } ];
|
|
||||||
ipv6.routes = [ { address = "fe80::1"; prefixLength = 128; } ];
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
};
|
|
||||||
services.udev.extraRules = ''
|
|
||||||
ATTR{address}=="96:00:04:44:c3:cd", NAME="eth0"
|
|
||||||
|
|
||||||
'';
|
|
||||||
}
|
|
Loading…
Add table
Add a link
Reference in a new issue