Compare commits

...

21 Commits

Author SHA1 Message Date
4b37d36212 Update hosts/docker/configuration.nix 2026-02-25 00:20:50 +00:00
0a10efefa6 Update hosts/docker/configuration.nix 2026-02-25 00:17:39 +00:00
5e559efc6f Update hosts/docker/configuration.nix 2026-02-25 00:16:37 +00:00
149f56ce10 Update common/home.nix 2026-02-17 16:00:33 +00:00
c6f6441907 Update flake.nix 2026-02-17 15:59:35 +00:00
cc956d3038 Update hosts/docker/configuration.nix 2026-02-17 15:57:26 +00:00
d409b5b718 Update hosts/docker/configuration.nix 2026-02-17 15:56:47 +00:00
6ef87a3226 Update hosts/docker/configuration.nix 2026-02-17 15:53:06 +00:00
9a190a28d6 Update hosts/docker/configuration.nix 2026-02-17 15:52:05 +00:00
e7a215cd15 Update hosts/docker/configuration.nix 2026-02-17 15:50:06 +00:00
651f4e61c5 Update hosts/docker/configuration.nix 2026-02-17 15:40:04 +00:00
ffad8bd6b8 Update hosts/docker/configuration.nix 2026-02-17 11:44:58 +00:00
01aaf10e2d Update hosts/docker/configuration.nix 2026-02-16 09:22:16 +00:00
8db2a2db86 Update hosts/docker/configuration.nix 2026-02-16 09:14:46 +00:00
3389c9549a Update flake.nix 2026-02-09 10:12:06 +00:00
7ab8cf15ca Update hosts/nix-cache/configuration.nix 2026-02-09 10:05:23 +00:00
56a25ab5d7 Update hosts/server/configuration.nix 2026-02-09 10:00:53 +00:00
76649ad698 modified: hosts/docker/configuration.nix 2025-12-20 13:06:57 +10:00
487d8bc474 modified: hosts/server/configuration.nix 2025-12-18 12:24:04 +10:00
529535cffd modified: hosts/server/configuration.nix 2025-12-18 12:22:59 +10:00
aff4cf1c16 modified: hosts/server/configuration.nix 2025-12-18 12:16:06 +10:00
5 changed files with 28 additions and 9 deletions

View File

@@ -11,7 +11,7 @@ in {
home.username = "nixos"; # your actual username
home.homeDirectory = "/home/nixos";
home.stateVersion = "25.05"; # match your NixOS stateVersion
home.stateVersion = "25.11"; # match your NixOS stateVersion
programs.home-manager.enable = true; # mandatory to activate HM

View File

@@ -3,14 +3,14 @@
description = "LAN NixOS configs";
nixConfig = {
access-tokens = [
"github.com=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"
"github.com=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"
];
};
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11";
nixpkgs.url = "github:NixOS/nixpkgs/nixos-25.11";
nixos-conf-editor.url = "github:snowfallorg/nixos-conf-editor";
home-manager = {
url = "github:nix-community/home-manager/release-24.11";
url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs";
};
};

View File

@@ -18,8 +18,20 @@ in
];
networking.hostName = "docker"; # Define your hostname.
virtualisation.docker.enable = true;
# virtualisation.docker.enable = true;
virtualisation.docker = {
enable = true;
# listenOptions = [
# "unix:///var/run/docker.sock"
# "tcp://0.0.0.0:2375"
#];
# daemon.settings = {
# metrics-addr = "0.0.0.0:9323";
# experimental = true;
# };
};
services.tailscale.enable = true;
# Enable docker-compose
environment.systemPackages = with pkgs; [
docker-compose
@@ -123,7 +135,7 @@ system.userActivationScripts.createSetupSymlink.text = ''
services.openssh.settings.PermitRootLogin = "yes";
# Open ports in the firewall.
networking.firewall.allowedTCPPorts = [ 80 8080 443 ];
networking.firewall.allowedTCPPorts = [ 80 8080 443 9323 ];
# networking.firewall.allowedUDPPorts = [ ... ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;

View File

@@ -22,6 +22,10 @@
locations."/".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
};
};
services.prometheus.exporters.node = {
enable = true;
openFirewall = true;
};
networking.firewall.allowedTCPPorts = [ config.services.nginx.defaultHTTPListenPort ];
# Open ports in the firewall.

View File

@@ -109,10 +109,13 @@ systemd.timers.backup = {
# NAT: lets LAN devices reply to the Pi without needing routes on the LAN router
networking.nat = {
enable = true;
externalInterface = "ens18";
externalInterface = "enp0s18";
internalInterfaces = [ "wg0" ];
};
services.prometheus.exporters.node = {
enable = true;
openFirewall = true;
};
services.openssh.settings.PermitRootLogin = "yes";
# Open ports in the firewall.