Compare commits

...

6 Commits

17 changed files with 45 additions and 34 deletions

View File

@@ -79,8 +79,10 @@
# Configure keymap in X11 # Configure keymap in X11
services.xserver = { services.xserver = {
layout = "us"; xkb = {
xkbVariant = ""; layout = "us";
variant = "";
};
}; };
# Enable CUPS to print documents. # Enable CUPS to print documents.

View File

@@ -68,7 +68,7 @@ let
partOf = ["headscale.service"]; partOf = ["headscale.service"];
script = '' script = ''
${cfg.package}/bin/headscale users create ${name} ${pkgs.bash}/bin/bash -c '${cfg.package}/bin/headscale users create ${name} || true'
''; '';
serviceConfig = { serviceConfig = {

View File

@@ -6,7 +6,7 @@
nixpkgs.config.nvidia.acceptLicense = true; nixpkgs.config.nvidia.acceptLicense = true;
services.xserver.videoDrivers = [ "nvidia" ]; services.xserver.videoDrivers = [ "nvidia" ];
hardware.opengl.enable = true; hardware.graphics.enable = true;
# Optionally, you may need to select the appropriate driver version for your specific GPU. # Optionally, you may need to select the appropriate driver version for your specific GPU.
hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.legacy_470; hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.legacy_470;

View File

@@ -13,15 +13,15 @@
# ./private/grafana.nix # ./private/grafana.nix
# Home Monitoring and Control # Home Monitoring and Control
./private/homeassistant.nix # ./private/homeassistant.nix
# Minio S3 Object Storage # Minio S3 Object Storage
./private/miniio.nix ./private/miniio.nix
# OctoPrint # OctoPrint
./private/octoprint.nix # ./private/octoprint.nix
# Samba Share # Samba Share
./private/samba.nix # ./private/samba.nix
]; ];
} }

View File

@@ -6,9 +6,6 @@
# Entrace to Control Pane of Private Network # Entrace to Control Pane of Private Network
./public/headscale.nix ./public/headscale.nix
# Location tracking of my Dad in Saskatchewan
./public/hauk.nix
# Self Hosted Git Server # Self Hosted Git Server
./public/gitea.nix ./public/gitea.nix
@@ -47,5 +44,8 @@
# Recipe Manager # Recipe Manager
./public/tandoor.nix ./public/tandoor.nix
# Random Usage, specific port
./public/random.nix
]; ];
} }

View File

@@ -35,7 +35,7 @@ in {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; settings.port = 5432;
ensureDatabases = [ ensureDatabases = [
"gitea" "gitea"
]; ];

View File

@@ -1,14 +0,0 @@
{pkgs, config, ...}:
{
imports = [
../../oci/hauk.nix
];
services.caddy.virtualHosts = {
"crompton.cc" = {
extraConfig = ''
reverse_proxy 127.0.0.1:7888
'';
};
};
}

View File

@@ -23,7 +23,7 @@
]; ];
# Give a name to each device # Give a name to each device
dns_config = { dns = {
base_domain = "tailnet"; base_domain = "tailnet";
magic_dns = true; magic_dns = true;
}; };

View File

@@ -13,9 +13,9 @@ in {
services.nextcloud = { services.nextcloud = {
enable = true; enable = true;
package = pkgs.nextcloud28; package = pkgs.nextcloud29;
hostName = "localhost"; hostName = "localhost";
extraOptions = { settings = {
trusted_domains = [ trusted_domains = [
"cloud.crompton.cc" "cloud.crompton.cc"
"nextcloud.syzygial.cc" "nextcloud.syzygial.cc"
@@ -76,7 +76,7 @@ in {
shell = pkgs.bashInteractive; shell = pkgs.bashInteractive;
packages = with pkgs; [ packages = with pkgs; [
# generate video thumbnails with preview generator # generate video thumbnails with preview generator
ffmpeg_5-headless ffmpeg_7-headless
# required for recognize app # required for recognize app
nodejs_20 # runtime and installation requirement nodejs_20 # runtime and installation requirement
nodejs_20.pkgs.node-pre-gyp # installation requirement nodejs_20.pkgs.node-pre-gyp # installation requirement
@@ -99,7 +99,7 @@ in {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; settings.port = 5432;
ensureDatabases = [ ensureDatabases = [
"nextcloud" "nextcloud"
]; ];

View File

@@ -36,7 +36,7 @@
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; settings.port = 5432;
ensureDatabases = [ ensureDatabases = [
"onlyoffice" "onlyoffice"
]; ];

View File

@@ -52,11 +52,17 @@
}; };
services.caddy.virtualHosts = { services.caddy.virtualHosts = {
"games.syzygial.cc:443" = { "games.syzygial.cc:443" = {
serverAliases = [
"games.crompton.cc:443"
];
extraConfig = '' extraConfig = ''
reverse_proxy 10.1.0.1:80 reverse_proxy 10.1.0.1:80
''; '';
}; };
"games.syzygial.cc:9000" = { "games.syzygial.cc:9000" = {
serverAliases = [
"games.crompton.cc:9000"
];
extraConfig = '' extraConfig = ''
reverse_proxy 10.1.0.1:9000 reverse_proxy 10.1.0.1:9000
''; '';

View File

@@ -0,0 +1,9 @@
{ config, pkgs, lib, ... }: {
services.caddy.virtualHosts = {
"pitch.syzygial.cc" = {
extraConfig = ''
reverse_proxy 127.0.0.1:7123
'';
};
};
}

View File

@@ -10,5 +10,12 @@
} }
''; '';
}; };
"crompton.cc" = {
extraConfig = ''
file_server {
root /srv/www/crompton
}
'';
};
}; };
} }

View File

@@ -26,7 +26,7 @@ in {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; settings.port = 5432;
ensureDatabases = [ ensureDatabases = [
tandoor_user tandoor_user
]; ];

View File

@@ -16,7 +16,7 @@
}; };
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; settings.port = 5432;
ensureDatabases = [ ensureDatabases = [
"vaultwarden" "vaultwarden"
]; ];

View File

@@ -1,5 +1,6 @@
{ {
imports = [ imports = [
./services/tailscale.nix ./services/tailscale.nix
./services/dyndns.nix
]; ];
} }

View File

@@ -2,7 +2,7 @@
sops.secrets.ddclient = {}; sops.secrets.ddclient = {};
services.ddclient = { services.ddclient = {
enable = true; enable = true;
use = "web, web=dynamicdns.park-your-domain.com/getip"; usev4 = "web, web=dynamicdns.park-your-domain.com/getip";
protocol = "namecheap"; protocol = "namecheap";
server = "dynamicdns.park-your-domain.com"; server = "dynamicdns.park-your-domain.com";
username = "crompton.cc"; username = "crompton.cc";