Nix Pkgs Update with an update to configuration.nix

This commit is contained in:
2023-12-28 18:40:16 -08:00
parent 8d0d040379
commit 4eff14d7b0
2 changed files with 40 additions and 29 deletions

View File

@ -56,7 +56,6 @@ in
nix.settings.experimental-features = [ "nix-command" "flakes" ];
networking.hostName = "nixos"; # Define your hostname.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# Enable networking
networking.networkmanager.enable = true;
@ -116,8 +115,6 @@ in
users.users.php.group = "php";
users.groups.php = {};
# Enable automatic login for the user.
services.xserver.displayManager.autoLogin.enable = true;
services.xserver.displayManager.autoLogin.user = "free";
@ -211,7 +208,6 @@ in
};
};
#networking.enableIPv6 = false;
####### CADDY #######
services.caddy = {
@ -294,9 +290,9 @@ in
###### CREATE DATABASE (WORDPRESS, MATRIX_SYNAPSE, AND NEXTCLOUD) #######
services.postgresql = {
enable = true;
package = pkgs.postgresql_14;
};
services.postgresql.authentication = lib.mkForce ''
# Generated file; do not edit!
# TYPE DATABASE USER ADDRESS METHOD
@ -308,9 +304,10 @@ in
services.mysql = {
enable = true;
package = pkgs.mariadb_1011;
package = pkgs.mariadb;
};
services.postgresql.initialScript = pkgs.writeText "begin-init.sql" ''
CREATE ROLE "ncusr" WITH LOGIN PASSWORD '${personalization.age.secrets.nextclouddb.file}';
CREATE DATABASE "nextclouddb" WITH OWNER "ncusr"
@ -336,12 +333,10 @@ in
;
####### KEEP AWAKE for DISPLAY and HEADLESS #######
services.xserver.displayManager.gdm.autoSuspend = false;
####### BACKUP TO INTERNAL DRIVE #######
services.rsnapshot = {
enable = true;
@ -353,13 +348,12 @@ backup /home/ localhost/
backup /var/lib/ localhost/
backup /etc/nixos/ localhost/
backup /etc/nix-bitcoin-secrets/ localhost/
'';
'';
cronIntervals = {
daily = "50 21 * * *";
hourly = "0 * * * *";
};
};
};
};
####### CRON #######
@ -379,11 +373,10 @@ backup /etc/nix-bitcoin-secrets/ localhost/
client.enable = true;
torsocks.enable = true;
};
services.privoxy.enableTor = true;
####### Enable the OpenSSH daemon #######
services.openssh = {
enable = true;
@ -394,6 +387,7 @@ backup /etc/nix-bitcoin-secrets/ localhost/
};
};
#######FailtoBan#######
services.fail2ban = {
enable = true;
@ -414,7 +408,7 @@ backup /etc/nix-bitcoin-secrets/ localhost/
{ from=49152; to=65535; } # TURN relay
];
# Or disable the firewall altogether.
networking.firewall.enable = true;
@ -425,6 +419,7 @@ backup /etc/nix-bitcoin-secrets/ localhost/
options = "--delete-older-than 7d";
};
system.stateVersion = "22.05";
}