ADD : nextcloud conf
This commit is contained in:
parent
58e4b2c38f
commit
f38d4896fd
|
@ -0,0 +1,24 @@
|
||||||
|
{ pkgs, ... }: {
|
||||||
|
imports = [
|
||||||
|
<agenix/modules/age.nix>
|
||||||
|
];
|
||||||
|
|
||||||
|
environment.systemPackages = [ (pkgs.callPackage <agenix/pkgs/agenix.nix> {}) ];
|
||||||
|
age.secrets.secret_restic = {
|
||||||
|
file = ./secrets/secret_restic.age;
|
||||||
|
path = "/run/restic_pass";
|
||||||
|
};
|
||||||
|
age.secrets.secret_nextcloud_admin = {
|
||||||
|
file = ./secrets/nextcloud-admin-pass.age;
|
||||||
|
path = "/run/nextcloud-admin";
|
||||||
|
owner = "nextcloud";
|
||||||
|
group = "nextcloud";
|
||||||
|
};
|
||||||
|
age.secrets.secret_nextcloud_db = {
|
||||||
|
file = ./secrets/nextcloud-db-pass.age;
|
||||||
|
path = "/run/nextcloud-db";
|
||||||
|
owner = "nextcloud";
|
||||||
|
group = "nextcloud";
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,15 @@
|
||||||
|
{config, pkgs, ...}:
|
||||||
|
{
|
||||||
|
services.restic.backups = {
|
||||||
|
localbackup = {
|
||||||
|
initialize = true;
|
||||||
|
passwordFile = "/run/restic_pass";
|
||||||
|
paths = [ "/var/lib/nextcloud/data/" ];
|
||||||
|
repository = "rest:https://back.atlanticaweb.fr/Nextcloud";
|
||||||
|
timerConfig = {
|
||||||
|
OnCalendar = "00:05";
|
||||||
|
RandomizedDelaySec = "5h";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -0,0 +1,31 @@
|
||||||
|
{ pkgs, ... }: {
|
||||||
|
imports = [
|
||||||
|
./hardware-configuration.nix
|
||||||
|
./nextcloud.nix
|
||||||
|
./backup.nix
|
||||||
|
../modules/users.nix
|
||||||
|
../modules/common.nix
|
||||||
|
../modules/prometheus-node.nix
|
||||||
|
./agenix.nix
|
||||||
|
# <agenix/modules/age.nix>
|
||||||
|
];
|
||||||
|
|
||||||
|
system.stateVersion = "21.05";
|
||||||
|
boot.cleanTmpDir = true;
|
||||||
|
zramSwap.enable = true;
|
||||||
|
networking.hostName = "next";
|
||||||
|
services.openssh.enable = true;
|
||||||
|
users.users.root.openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKUA1RW6JwZasspAp8qmFRFnlV5WXjhLfStAAkM+KYLv lucazeau.alexandre@gmail.com"
|
||||||
|
];
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ 80 443 22 9002];
|
||||||
|
services.qemuGuest.enable = true;
|
||||||
|
|
||||||
|
# environment.systemPackages = [ (pkgs.callPackage <agenix/pkgs/agenix.nix> {}) ];
|
||||||
|
# age.secrets.secret_restic = {
|
||||||
|
# file = ./secrets/secret_restic.age;
|
||||||
|
# path = "/run/restic_pass";
|
||||||
|
# };
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,8 @@
|
||||||
|
{ modulesPath, ... }:
|
||||||
|
{
|
||||||
|
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
|
||||||
|
boot.loader.grub.device = "/dev/sda";
|
||||||
|
boot.initrd.kernelModules = [ "nvme" ];
|
||||||
|
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; };
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,86 @@
|
||||||
|
{config, pkgs, ...}:
|
||||||
|
{
|
||||||
|
|
||||||
|
# Enable Nginx
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
# Use recommended settings
|
||||||
|
recommendedGzipSettings = true;
|
||||||
|
recommendedOptimisation = true;
|
||||||
|
recommendedProxySettings = true;
|
||||||
|
recommendedTlsSettings = true;
|
||||||
|
|
||||||
|
# Only allow PFS-enabled ciphers with AES256
|
||||||
|
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
|
||||||
|
|
||||||
|
# Setup Nextcloud virtual host to listen on ports
|
||||||
|
virtualHosts = {
|
||||||
|
|
||||||
|
"next.atlanticaweb.fr" = {
|
||||||
|
## Force HTTP redirect to HTTPS
|
||||||
|
forceSSL = true;
|
||||||
|
## LetsEncrypt
|
||||||
|
enableACME = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
security.acme.defaults.email = "lucazeau.alexandre@gmail.com";
|
||||||
|
security.acme.acceptTerms = true;
|
||||||
|
|
||||||
|
# Actual Nextcloud Config
|
||||||
|
services.nextcloud = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.nextcloud24;
|
||||||
|
hostName = "next.atlanticaweb.fr";
|
||||||
|
# Enable built-in virtual host management
|
||||||
|
# Takes care of somewhat complicated setup
|
||||||
|
# See here: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/web-apps/nextcloud.nix#L529
|
||||||
|
|
||||||
|
|
||||||
|
# Use HTTPS for links
|
||||||
|
https = true;
|
||||||
|
|
||||||
|
# Auto-update Nextcloud Apps
|
||||||
|
autoUpdateApps.enable = true;
|
||||||
|
# Set what time makes sense for you
|
||||||
|
autoUpdateApps.startAt = "05:00:00";
|
||||||
|
|
||||||
|
config = {
|
||||||
|
# Further forces Nextcloud to use HTTPS
|
||||||
|
overwriteProtocol = "https";
|
||||||
|
|
||||||
|
# Nextcloud PostegreSQL database configuration, recommended over using SQLite
|
||||||
|
dbtype = "pgsql";
|
||||||
|
dbuser = "nextcloud";
|
||||||
|
dbhost = "/run/postgresql"; # nextcloud will add /.s.PGSQL.5432 by itself
|
||||||
|
dbname = "nextcloud";
|
||||||
|
dbpassFile = "/run/nextcloud-db";
|
||||||
|
#dbpassFile = "/var/nextcloud-db-pass";
|
||||||
|
|
||||||
|
adminpassFile = "/run/nextcloud-admin";
|
||||||
|
#adminpassFile = "/var/nextcloud-admin-pass";
|
||||||
|
adminuser = "admin";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Enable PostgreSQL
|
||||||
|
services.postgresql = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
# Ensure the database, user, and permissions always exist
|
||||||
|
ensureDatabases = [ "nextcloud" ];
|
||||||
|
ensureUsers = [
|
||||||
|
{ name = "nextcloud";
|
||||||
|
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Ensure that postgres is running before running the setup
|
||||||
|
systemd.services."nextcloud-setup" = {
|
||||||
|
requires = ["postgresql.service"];
|
||||||
|
after = ["postgresql.service"];
|
||||||
|
};
|
||||||
|
}
|
|
@ -0,0 +1,12 @@
|
||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
{
|
||||||
|
services.prometheus = {
|
||||||
|
exporters = {
|
||||||
|
node = {
|
||||||
|
enable = true;
|
||||||
|
enabledCollectors = [ "systemd" ];
|
||||||
|
port = 9002;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 AsRWPA 5ZW4bbKR4eBq9udfQt0aSxKLGqeRfK12CKbK5uO8PXQ
|
||||||
|
jFF9AppAOlTo3K1djnZs6RiqgUvdnxD0qa/oiB/MAhs
|
||||||
|
-> ssh-ed25519 AsRWPA l6PCaq/TiVFb5u6ohyQKDGuRkg5dXWOnnkvXRfo9eng
|
||||||
|
YPxMklq50g8aOsWEbkfk8pprzfUOh2ks7g1HoEuGFRQ
|
||||||
|
-> 6p!-grease J= W~
|
||||||
|
MiJKoixj2WhO2O/DBIfPe80yu7mZ8wIVxyfNhw
|
||||||
|
--- CBRiDc/5kln0elYaqSxwgp39zUWfIPv1/QgLCE39CYw
|
||||||
|
>ÓßAê÷+TÚ.<2E>SetݯËö
®ß;{œü‘ÅzªžUF³¡œ2Õ%ßCÈ<>
|
Binary file not shown.
|
@ -0,0 +1,11 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 cRwSCQ R0+fx+GjiA4oGjdu1jaMAiXFvOD/TAmh+od55rShTGw
|
||||||
|
FBk21m1dWNmo4X3mnjBhvZrlXAlcUFNiNs96BU8NHCU
|
||||||
|
-> ssh-ed25519 cRwSCQ GAcBRtCTRUnPrXDXpU8It5OQnz+3J8IdqHiWW5k200s
|
||||||
|
rCGGuHZ4helvsIQPLBWDMCPV3ZvOMoJ7kPxmwB+RJGw
|
||||||
|
-> ssh-ed25519 AsRWPA PNboiDuuin5kY7HMLzZYruip0whF9xs1IAr9RNfQwXA
|
||||||
|
3mmQBxi3IGgnHBsWNeUuDvoa3ZMhGJdbRksRQtiRk5k
|
||||||
|
-> :Gel-grease
|
||||||
|
atx1cHPtIL3FMjXKj5+MGm4
|
||||||
|
--- cfMzYeRC6IY4Xsg+tMfT3SpMzwPPi7ZhS68NPbrLwDI
|
||||||
|
:Ïe{*<03>n<Ê1¡“ø?ã9X`ºT:AÁAþÄwëÈç|OÝW
|
|
@ -0,0 +1,12 @@
|
||||||
|
let
|
||||||
|
nextcloud-db = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
||||||
|
nextcloud-admin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
||||||
|
restic = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
||||||
|
users_nextcloud = [ nextcloud-db nextcloud-admin ];
|
||||||
|
users_backup = [ restic ];
|
||||||
|
in
|
||||||
|
{
|
||||||
|
"nextcloud-db-pass.age".publicKeys = users_nextcloud;
|
||||||
|
"nextcloud-admin-pass.age".publicKeys = users_nextcloud;
|
||||||
|
"secret_restic.age".publicKeys = users_backup;
|
||||||
|
}
|
|
@ -15,6 +15,7 @@
|
||||||
procs
|
procs
|
||||||
plocate
|
plocate
|
||||||
exa
|
exa
|
||||||
|
age
|
||||||
];
|
];
|
||||||
# Nix Garbage Collector
|
# Nix Garbage Collector
|
||||||
nix.gc = {
|
nix.gc = {
|
||||||
|
|
Loading…
Reference in New Issue