move packages to modules

This commit is contained in:
Grimmauld 2024-05-08 21:13:13 +02:00
parent 2435182a68
commit 7a7818c0c7
Signed by: Grimmauld
GPG key ID: C2946668769F91FB
4 changed files with 24 additions and 15 deletions

View file

@ -39,18 +39,12 @@ in {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
wget wget
hyfetch hyfetch
vulnix vulnix #
tree tree
file file
util-linux util-linux
btop btop
linuxPackages.perf linuxPackages.perf
gitea
matrix-synapse-tools.synadm
matrix-synapse
pufferpanel
(writeShellScriptBin "pufferpanel-nix" "pufferpanel --workDir /var/lib/pufferpanel $@")
]; ];
environment.sessionVariables = { environment.sessionVariables = {
@ -60,13 +54,19 @@ in {
networking.firewall = { networking.firewall = {
enable = true; enable = true;
allowedTCPPorts = [ 80 443 ];
allowPing = true; allowPing = true;
allowedUDPPortRanges = []; allowedUDPPortRanges = [];
}; };
# services.nginx.package = pkgs.nginxStable.override { openssl = pkgs.libressl; };
networking.firewall.allowedTCPPorts = [ 80 443 ];
networking.hostName = "grimmauld-nixos-server";
networking.domain = "grimmauld.de";
services.openssh.enable = true;
system.stateVersion = "23.11";
services.nginx = { services.nginx = {
# package = pkgs.nginxStable.override { openssl = pkgs.libressl; };
enable = true; enable = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;
@ -86,12 +86,9 @@ in {
nix.settings.experimental-features = [ "nix-command" "flakes" ]; nix.settings.experimental-features = [ "nix-command" "flakes" ];
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
boot.tmp.cleanOnBoot = true; boot.tmp.cleanOnBoot = true;
system.stateVersion = "unstable";
zramSwap.enable = true; zramSwap.enable = true;
networking.hostName = "grimmauld-nixos-server";
networking.domain = "grimmauld.de"; # users.users.root.openssh.authorizedKeys.keys = (import ./authorizedKeys.nix);
services.openssh.enable = true;
# users.users.root.openssh.authorizedKeys.keys = (import ./authorizedKeys.nix);
} }

View file

@ -27,6 +27,10 @@ in {
lfs.enable = true; lfs.enable = true;
}; };
environment.systemPackages = with pkgs; [
gitea
];
security.acme.certs."${domain}".extraDomainNames = [ gitea_host]; security.acme.certs."${domain}".extraDomainNames = [ gitea_host];
networking.firewall.allowedTCPPorts = [ gitea_ssh_port ]; networking.firewall.allowedTCPPorts = [ gitea_ssh_port ];

View file

@ -111,6 +111,10 @@ host replication all ::1/128 md5
mode = "0600"; mode = "0600";
}; };
environment.systemPackages = with pkgs; [
matrix-synapse-tools.synadm
matrix-synapse
];
services.nginx = { services.nginx = {
enable = true; enable = true;

View file

@ -43,4 +43,8 @@ in {
# virtualisation.podman.enable = true; # virtualisation.podman.enable = true;
virtualisation.docker.enable = true; virtualisation.docker.enable = true;
environment.systemPackages = with pkgs; [
pufferpanel
(writeShellScriptBin "pufferpanel-nix" "pufferpanel --workDir /var/lib/pufferpanel $@")
];
} }