Compare commits
21 Commits
3db1205a8d
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| 4b37d36212 | |||
| 0a10efefa6 | |||
| 5e559efc6f | |||
| 149f56ce10 | |||
| c6f6441907 | |||
| cc956d3038 | |||
| d409b5b718 | |||
| 6ef87a3226 | |||
| 9a190a28d6 | |||
| e7a215cd15 | |||
| 651f4e61c5 | |||
| ffad8bd6b8 | |||
| 01aaf10e2d | |||
| 8db2a2db86 | |||
| 3389c9549a | |||
| 7ab8cf15ca | |||
| 56a25ab5d7 | |||
| 76649ad698 | |||
| 487d8bc474 | |||
| 529535cffd | |||
| aff4cf1c16 |
@@ -11,7 +11,7 @@ in {
|
|||||||
|
|
||||||
home.username = "nixos"; # your actual username
|
home.username = "nixos"; # your actual username
|
||||||
home.homeDirectory = "/home/nixos";
|
home.homeDirectory = "/home/nixos";
|
||||||
home.stateVersion = "25.05"; # match your NixOS stateVersion
|
home.stateVersion = "25.11"; # match your NixOS stateVersion
|
||||||
|
|
||||||
programs.home-manager.enable = true; # mandatory to activate HM
|
programs.home-manager.enable = true; # mandatory to activate HM
|
||||||
|
|
||||||
|
|||||||
@@ -3,14 +3,14 @@
|
|||||||
description = "LAN NixOS configs";
|
description = "LAN NixOS configs";
|
||||||
nixConfig = {
|
nixConfig = {
|
||||||
access-tokens = [
|
access-tokens = [
|
||||||
"github.com=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"
|
"github.com=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"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-25.11";
|
||||||
nixos-conf-editor.url = "github:snowfallorg/nixos-conf-editor";
|
nixos-conf-editor.url = "github:snowfallorg/nixos-conf-editor";
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager/release-24.11";
|
url = "github:nix-community/home-manager/release-25.11";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -18,8 +18,20 @@ in
|
|||||||
];
|
];
|
||||||
|
|
||||||
networking.hostName = "docker"; # Define your hostname.
|
networking.hostName = "docker"; # Define your hostname.
|
||||||
virtualisation.docker.enable = true;
|
# virtualisation.docker.enable = true;
|
||||||
|
virtualisation.docker = {
|
||||||
|
enable = true;
|
||||||
|
# listenOptions = [
|
||||||
|
# "unix:///var/run/docker.sock"
|
||||||
|
# "tcp://0.0.0.0:2375"
|
||||||
|
#];
|
||||||
|
|
||||||
|
# daemon.settings = {
|
||||||
|
# metrics-addr = "0.0.0.0:9323";
|
||||||
|
# experimental = true;
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
services.tailscale.enable = true;
|
||||||
# Enable docker-compose
|
# Enable docker-compose
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
docker-compose
|
docker-compose
|
||||||
@@ -123,7 +135,7 @@ system.userActivationScripts.createSetupSymlink.text = ''
|
|||||||
services.openssh.settings.PermitRootLogin = "yes";
|
services.openssh.settings.PermitRootLogin = "yes";
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
networking.firewall.allowedTCPPorts = [ 80 8080 443 ];
|
networking.firewall.allowedTCPPorts = [ 80 8080 443 9323 ];
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
# Or disable the firewall altogether.
|
# Or disable the firewall altogether.
|
||||||
# networking.firewall.enable = false;
|
# networking.firewall.enable = false;
|
||||||
|
|||||||
@@ -22,6 +22,10 @@
|
|||||||
locations."/".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
|
locations."/".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
services.prometheus.exporters.node = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ config.services.nginx.defaultHTTPListenPort ];
|
networking.firewall.allowedTCPPorts = [ config.services.nginx.defaultHTTPListenPort ];
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
|
|||||||
@@ -109,10 +109,13 @@ systemd.timers.backup = {
|
|||||||
# NAT: lets LAN devices reply to the Pi without needing routes on the LAN router
|
# NAT: lets LAN devices reply to the Pi without needing routes on the LAN router
|
||||||
networking.nat = {
|
networking.nat = {
|
||||||
enable = true;
|
enable = true;
|
||||||
externalInterface = "ens18";
|
externalInterface = "enp0s18";
|
||||||
internalInterfaces = [ "wg0" ];
|
internalInterfaces = [ "wg0" ];
|
||||||
};
|
};
|
||||||
|
services.prometheus.exporters.node = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
|
|
||||||
services.openssh.settings.PermitRootLogin = "yes";
|
services.openssh.settings.PermitRootLogin = "yes";
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
|
|||||||
Reference in New Issue
Block a user