format clean up
This commit is contained in:
parent
5fe30e3f4c
commit
b8a31f1f6d
@ -48,7 +48,7 @@ in
|
|||||||
device = "LABEL=BTCEcoandBackup";
|
device = "LABEL=BTCEcoandBackup";
|
||||||
fsType = "ext4";
|
fsType = "ext4";
|
||||||
options = [ "nofail" ];
|
options = [ "nofail" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/boot/efi".options = [ "umask=0077" "defaults" ];
|
fileSystems."/boot/efi".options = [ "umask=0077" "defaults" ];
|
||||||
|
|
||||||
@ -190,13 +190,13 @@ in
|
|||||||
|
|
||||||
programs.nixvim = {
|
programs.nixvim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
colorschemes.catppuccin.enable = true;
|
||||||
colorschemes.catppuccin.enable = true;
|
plugins.lualine.enable = true;
|
||||||
plugins.lualine.enable = true;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
programs.bash.promptInit = "fish";
|
programs.bash.promptInit = "fish";
|
||||||
|
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
enable = true;
|
enable = true;
|
||||||
promptInit = "neofetch";
|
promptInit = "neofetch";
|
||||||
@ -241,17 +241,17 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
"${personalization.nextcloud_url}" = {
|
"${personalization.nextcloud_url}" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
encode gzip zstd
|
encode gzip zstd
|
||||||
root * /var/lib/www/nextcloud
|
root * /var/lib/www/nextcloud
|
||||||
php_fastcgi unix//run/phpfpm/mypool.sock
|
php_fastcgi unix//run/phpfpm/mypool.sock
|
||||||
file_server
|
file_server
|
||||||
redir /.well-known/carddav /remote.php/dav/ 301
|
redir /.well-known/carddav /remote.php/dav/ 301
|
||||||
redir /.well-known/caldav /remote.php/dav/ 301
|
redir /.well-known/caldav /remote.php/dav/ 301
|
||||||
header {
|
header {
|
||||||
Strict-Transport-Security max-age=31536000;
|
Strict-Transport-Security max-age=31536000;
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
"${personalization.matrix_url}" = {
|
"${personalization.matrix_url}" = {
|
||||||
@ -293,8 +293,8 @@ in
|
|||||||
|
|
||||||
###### CREATE DATABASE (WORDPRESS, MATRIX_SYNAPSE, AND NEXTCLOUD) #######
|
###### CREATE DATABASE (WORDPRESS, MATRIX_SYNAPSE, AND NEXTCLOUD) #######
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
services.postgresql.authentication = lib.mkForce ''
|
services.postgresql.authentication = lib.mkForce ''
|
||||||
@ -307,9 +307,9 @@ in
|
|||||||
|
|
||||||
|
|
||||||
services.mysql = {
|
services.mysql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.mariadb;
|
package = pkgs.mariadb;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
services.postgresql.initialScript = pkgs.writeText "begin-init.sql" ''
|
services.postgresql.initialScript = pkgs.writeText "begin-init.sql" ''
|
||||||
@ -360,7 +360,7 @@ backup /var/lib/ localhost/
|
|||||||
backup /etc/nixos/ localhost/
|
backup /etc/nixos/ localhost/
|
||||||
backup /etc/nix-bitcoin-secrets/ localhost/
|
backup /etc/nix-bitcoin-secrets/ localhost/
|
||||||
'';
|
'';
|
||||||
cronIntervals = {
|
cronIntervals = {
|
||||||
daily = "50 21 * * *";
|
daily = "50 21 * * *";
|
||||||
hourly = "0 * * * *";
|
hourly = "0 * * * *";
|
||||||
};
|
};
|
||||||
@ -381,8 +381,8 @@ backup /etc/nix-bitcoin-secrets/ localhost/
|
|||||||
####### TOR #######
|
####### TOR #######
|
||||||
services.tor = {
|
services.tor = {
|
||||||
enable = true;
|
enable = true;
|
||||||
client.enable = true;
|
client.enable = true;
|
||||||
torsocks.enable = true;
|
torsocks.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.privoxy.enableTor = true;
|
services.privoxy.enableTor = true;
|
||||||
@ -415,10 +415,10 @@ backup /etc/nix-bitcoin-secrets/ localhost/
|
|||||||
####### Open ports in the firewall #######
|
####### Open ports in the firewall #######
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 5349 8448 3050 3051 ];
|
networking.firewall.allowedTCPPorts = [ 80 443 5349 8448 3050 3051 ];
|
||||||
networking.firewall.allowedUDPPorts = [ 80 443 5349 8448 3050 3051 ];
|
networking.firewall.allowedUDPPorts = [ 80 443 5349 8448 3050 3051 ];
|
||||||
networking.firewall.allowedUDPPortRanges = [
|
|
||||||
{ from=49152; to=65535; } # TURN relay
|
|
||||||
];
|
|
||||||
|
|
||||||
|
networking.firewall.allowedUDPPortRanges = [
|
||||||
|
{ from=49152; to=65535; } # TURN relay
|
||||||
|
];
|
||||||
|
|
||||||
networking.firewall.enable = true;
|
networking.firewall.enable = true;
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user