update config idk jimbo did it all
This commit is contained in:
parent
55c32a778b
commit
55bca312d0
|
@ -76,10 +76,10 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||||||
# users.users.nextcloud = {
|
users.users.nextcloud = {
|
||||||
# extraGroups = [ "nfsShare" ];
|
extraGroups = [ "nfsShare" ];
|
||||||
# isSystemUser = true;
|
isSystemUser = true;
|
||||||
# };
|
};
|
||||||
|
|
||||||
# OpenGL and drivers
|
# OpenGL and drivers
|
||||||
hardware.opengl = {
|
hardware.opengl = {
|
||||||
|
@ -137,21 +137,22 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# # Nextcloud Proxy
|
# Nextcloud Proxy
|
||||||
# "cloud.${secrets.cornDomain}" = {
|
"cloud.${secrets.cornDomain}" = {
|
||||||
# enableACME = true;
|
enableACME = true;
|
||||||
# addSSL = true;
|
addSSL = true;
|
||||||
# locations."/" = {
|
locations."/" = {
|
||||||
# proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# location /.well-known/carddav {
|
location /.well-known/carddav {
|
||||||
# return 301 $scheme://$host/remote.php/dav;
|
return 301 $scheme://$host/remote.php/dav;
|
||||||
# }
|
}
|
||||||
# location /.well-known/caldav {
|
location /.well-known/caldav {
|
||||||
# return 301 $scheme://$host/remote.php/dav;
|
return 301 $scheme://$host/remote.php/dav;
|
||||||
# '';
|
}
|
||||||
# };
|
'';
|
||||||
# };
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
appendConfig = ''
|
appendConfig = ''
|
||||||
rtmp {
|
rtmp {
|
||||||
|
@ -169,23 +170,23 @@ in
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
# # Nextcloud server
|
# Nextcloud server
|
||||||
# services.nextcloud = {
|
services.nextcloud = {
|
||||||
# enable = true;
|
enable = true;
|
||||||
# package = pkgs.nextcloud29;
|
package = pkgs.nextcloud29;
|
||||||
# hostName = "cloud.${secrets.cornDomain}";
|
hostName = "cloud.${secrets.cornDomain}";
|
||||||
# datadir = "/nextcloud";
|
datadir = "/mnt/nextcloud";
|
||||||
# https = true;
|
https = true;
|
||||||
# config = {
|
config = {
|
||||||
# adminuser = "freecorn";
|
adminuser = "freecorn";
|
||||||
# adminpassFile = "/nextcloud/password.txt";
|
adminpassFile = "/mnt/nextcloud/password.txt";
|
||||||
# };
|
};
|
||||||
# settings = {
|
settings = {
|
||||||
# trusted_proxies = [ "127.0.0.1" ];
|
trusted_proxies = [ "127.0.0.1" ];
|
||||||
# trusted_domains = [ "cloud.${secrets.cornDomain}" ];
|
trusted_domains = [ "cloud.${secrets.cornDomain}" ];
|
||||||
# overwriteprotocol = "https";
|
overwriteprotocol = "https";
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
|
|
||||||
# Get certificates for Coturn
|
# Get certificates for Coturn
|
||||||
security.acme = {
|
security.acme = {
|
||||||
|
@ -226,11 +227,16 @@ in
|
||||||
PrintLastLog = "no";
|
PrintLastLog = "no";
|
||||||
PasswordAuthentication = false;
|
PasswordAuthentication = false;
|
||||||
};
|
};
|
||||||
ports = [ 69 ];
|
openFirewall = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
networking.firewall.allowedTCPPorts = [ 1935 4455 80 443 1234 69 ];
|
networking.firewall.allowedTCPPorts = [
|
||||||
|
1935 # RTMP
|
||||||
|
4455 # VR
|
||||||
|
80 443 # Nginx
|
||||||
|
1234 # Something
|
||||||
|
];
|
||||||
networking.firewall.allowedUDPPorts = [ 4455 ];
|
networking.firewall.allowedUDPPorts = [ 4455 ];
|
||||||
|
|
||||||
# Copy and link the NixOS configuration file to (/run/current-system/configuration.nix).
|
# Copy and link the NixOS configuration file to (/run/current-system/configuration.nix).
|
||||||
|
|
|
@ -3,6 +3,9 @@
|
||||||
users.users.freecorn = {
|
users.users.freecorn = {
|
||||||
description = "FreeCorn";
|
description = "FreeCorn";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINoElXZvPDrpHQuTP9MtIgYXq1DA1F4IL2MIVdse48Nr techx18@freecornpc"
|
||||||
|
];
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
"networkmanager"
|
"networkmanager"
|
||||||
"wheel"
|
"wheel"
|
||||||
|
|
20
jimbo.nix
20
jimbo.nix
|
@ -1,25 +1,19 @@
|
||||||
{
|
{pkgs, ...}: let
|
||||||
|
secrets = import ./secrets.nix;
|
||||||
|
in {
|
||||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||||||
users.users.jimbo = {
|
users.users.jimbo = {
|
||||||
description = "Jimbo";
|
description = "Jimbo";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = secrets.jimKeys;
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJPjBdQrL23pDbcsNCLMvJhcNF7+u95ZV7o1QemOmegf jimbo@JimDesktop"
|
|
||||||
];
|
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
"networkmanager"
|
"networkmanager"
|
||||||
"wheel"
|
"wheel"
|
||||||
"nginx"
|
"nginx"
|
||||||
];
|
];
|
||||||
|
shell = pkgs.zsh;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Define home manager programs and configs
|
# Enable ZSH
|
||||||
home-manager = {
|
programs.zsh.enable = true;
|
||||||
useGlobalPkgs = true;
|
|
||||||
useUserPackages = true;
|
|
||||||
users.jimbo = { config, pkgs, ... }: {
|
|
||||||
# Don't change this
|
|
||||||
home.stateVersion = "24.05";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
Reference in a new issue