move packages to modules
This commit is contained in:
parent
2435182a68
commit
7a7818c0c7
4 changed files with 24 additions and 15 deletions
|
@ -39,18 +39,12 @@ in {
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
wget
|
wget
|
||||||
hyfetch
|
hyfetch
|
||||||
vulnix
|
vulnix #
|
||||||
tree
|
tree
|
||||||
file
|
file
|
||||||
util-linux
|
util-linux
|
||||||
btop
|
btop
|
||||||
linuxPackages.perf
|
linuxPackages.perf
|
||||||
gitea
|
|
||||||
matrix-synapse-tools.synadm
|
|
||||||
matrix-synapse
|
|
||||||
|
|
||||||
pufferpanel
|
|
||||||
(writeShellScriptBin "pufferpanel-nix" "pufferpanel --workDir /var/lib/pufferpanel $@")
|
|
||||||
];
|
];
|
||||||
|
|
||||||
environment.sessionVariables = {
|
environment.sessionVariables = {
|
||||||
|
@ -60,13 +54,19 @@ in {
|
||||||
|
|
||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
enable = true;
|
enable = true;
|
||||||
allowedTCPPorts = [ 80 443 ];
|
|
||||||
allowPing = true;
|
allowPing = true;
|
||||||
allowedUDPPortRanges = [];
|
allowedUDPPortRanges = [];
|
||||||
};
|
};
|
||||||
|
|
||||||
# services.nginx.package = pkgs.nginxStable.override { openssl = pkgs.libressl; };
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
||||||
|
networking.hostName = "grimmauld-nixos-server";
|
||||||
|
networking.domain = "grimmauld.de";
|
||||||
|
services.openssh.enable = true;
|
||||||
|
system.stateVersion = "23.11";
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
|
# package = pkgs.nginxStable.override { openssl = pkgs.libressl; };
|
||||||
enable = true;
|
enable = true;
|
||||||
recommendedGzipSettings = true;
|
recommendedGzipSettings = true;
|
||||||
recommendedOptimisation = true;
|
recommendedOptimisation = true;
|
||||||
|
@ -86,12 +86,9 @@ in {
|
||||||
|
|
||||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
boot.tmp.cleanOnBoot = true;
|
boot.tmp.cleanOnBoot = true;
|
||||||
system.stateVersion = "unstable";
|
|
||||||
zramSwap.enable = true;
|
zramSwap.enable = true;
|
||||||
networking.hostName = "grimmauld-nixos-server";
|
|
||||||
networking.domain = "grimmauld.de";
|
# users.users.root.openssh.authorizedKeys.keys = (import ./authorizedKeys.nix);
|
||||||
services.openssh.enable = true;
|
|
||||||
# users.users.root.openssh.authorizedKeys.keys = (import ./authorizedKeys.nix);
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -27,6 +27,10 @@ in {
|
||||||
lfs.enable = true;
|
lfs.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
gitea
|
||||||
|
];
|
||||||
|
|
||||||
|
|
||||||
security.acme.certs."${domain}".extraDomainNames = [ gitea_host];
|
security.acme.certs."${domain}".extraDomainNames = [ gitea_host];
|
||||||
networking.firewall.allowedTCPPorts = [ gitea_ssh_port ];
|
networking.firewall.allowedTCPPorts = [ gitea_ssh_port ];
|
||||||
|
|
|
@ -111,6 +111,10 @@ host replication all ::1/128 md5
|
||||||
mode = "0600";
|
mode = "0600";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
matrix-synapse-tools.synadm
|
||||||
|
matrix-synapse
|
||||||
|
];
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -43,4 +43,8 @@ in {
|
||||||
# virtualisation.podman.enable = true;
|
# virtualisation.podman.enable = true;
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
pufferpanel
|
||||||
|
(writeShellScriptBin "pufferpanel-nix" "pufferpanel --workDir /var/lib/pufferpanel $@")
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue