Compare commits
No commits in common. "41d5cc516dc70691fff6e6d819c331a1c683fa5d" and "58e4b2c38fbcf4b8318cc34dd59cac665b6ae654" have entirely different histories.
41d5cc516d
...
58e4b2c38f
|
@ -1,24 +0,0 @@
|
||||||
{ pkgs, ... }: {
|
|
||||||
imports = [
|
|
||||||
<agenix/modules/age.nix>
|
|
||||||
];
|
|
||||||
|
|
||||||
environment.systemPackages = [ (pkgs.callPackage <agenix/pkgs/agenix.nix> {}) ];
|
|
||||||
age.secrets.secret_restic = {
|
|
||||||
file = ./secrets/secret_restic.age;
|
|
||||||
path = "/run/restic_pass";
|
|
||||||
};
|
|
||||||
age.secrets.secret_nextcloud_admin = {
|
|
||||||
file = ./secrets/nextcloud-admin-pass.age;
|
|
||||||
path = "/run/nextcloud-admin";
|
|
||||||
owner = "nextcloud";
|
|
||||||
group = "nextcloud";
|
|
||||||
};
|
|
||||||
age.secrets.secret_nextcloud_db = {
|
|
||||||
file = ./secrets/nextcloud-db-pass.age;
|
|
||||||
path = "/run/nextcloud-db";
|
|
||||||
owner = "nextcloud";
|
|
||||||
group = "nextcloud";
|
|
||||||
};
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,15 +0,0 @@
|
||||||
{config, pkgs, ...}:
|
|
||||||
{
|
|
||||||
services.restic.backups = {
|
|
||||||
localbackup = {
|
|
||||||
initialize = true;
|
|
||||||
passwordFile = "/run/restic_pass";
|
|
||||||
paths = [ "/var/lib/nextcloud/data/" ];
|
|
||||||
repository = "rest:https://back.atlanticaweb.fr/Nextcloud";
|
|
||||||
timerConfig = {
|
|
||||||
OnCalendar = "00:05";
|
|
||||||
RandomizedDelaySec = "5h";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,31 +0,0 @@
|
||||||
{ pkgs, ... }: {
|
|
||||||
imports = [
|
|
||||||
./hardware-configuration.nix
|
|
||||||
./nextcloud.nix
|
|
||||||
./backup.nix
|
|
||||||
../modules/users.nix
|
|
||||||
../modules/common.nix
|
|
||||||
../modules/prometheus-node.nix
|
|
||||||
./agenix.nix
|
|
||||||
# <agenix/modules/age.nix>
|
|
||||||
];
|
|
||||||
|
|
||||||
system.stateVersion = "21.05";
|
|
||||||
boot.cleanTmpDir = true;
|
|
||||||
zramSwap.enable = true;
|
|
||||||
networking.hostName = "next";
|
|
||||||
services.openssh.enable = true;
|
|
||||||
users.users.root.openssh.authorizedKeys.keys = [
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKUA1RW6JwZasspAp8qmFRFnlV5WXjhLfStAAkM+KYLv lucazeau.alexandre@gmail.com"
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 22 9002];
|
|
||||||
services.qemuGuest.enable = true;
|
|
||||||
|
|
||||||
# environment.systemPackages = [ (pkgs.callPackage <agenix/pkgs/agenix.nix> {}) ];
|
|
||||||
# age.secrets.secret_restic = {
|
|
||||||
# file = ./secrets/secret_restic.age;
|
|
||||||
# path = "/run/restic_pass";
|
|
||||||
# };
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,8 +0,0 @@
|
||||||
{ modulesPath, ... }:
|
|
||||||
{
|
|
||||||
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
|
|
||||||
boot.loader.grub.device = "/dev/sda";
|
|
||||||
boot.initrd.kernelModules = [ "nvme" ];
|
|
||||||
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; };
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,84 +0,0 @@
|
||||||
{config, pkgs, ...}:
|
|
||||||
{
|
|
||||||
|
|
||||||
# Enable Nginx
|
|
||||||
services.nginx = {
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
# Use recommended settings
|
|
||||||
recommendedGzipSettings = true;
|
|
||||||
recommendedOptimisation = true;
|
|
||||||
recommendedProxySettings = true;
|
|
||||||
recommendedTlsSettings = true;
|
|
||||||
|
|
||||||
# Only allow PFS-enabled ciphers with AES256
|
|
||||||
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
|
|
||||||
|
|
||||||
# Setup Nextcloud virtual host to listen on ports
|
|
||||||
virtualHosts = {
|
|
||||||
|
|
||||||
"next.atlanticaweb.fr" = {
|
|
||||||
## Force HTTP redirect to HTTPS
|
|
||||||
forceSSL = true;
|
|
||||||
## LetsEncrypt
|
|
||||||
enableACME = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
security.acme.defaults.email = "lucazeau.alexandre@gmail.com";
|
|
||||||
security.acme.acceptTerms = true;
|
|
||||||
|
|
||||||
# Actual Nextcloud Config
|
|
||||||
services.nextcloud = {
|
|
||||||
enable = true;
|
|
||||||
package = pkgs.nextcloud24;
|
|
||||||
hostName = "next.atlanticaweb.fr";
|
|
||||||
# Enable built-in virtual host management
|
|
||||||
# Takes care of somewhat complicated setup
|
|
||||||
# See here: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/web-apps/nextcloud.nix#L529
|
|
||||||
|
|
||||||
|
|
||||||
# Use HTTPS for links
|
|
||||||
https = true;
|
|
||||||
|
|
||||||
# Auto-update Nextcloud Apps
|
|
||||||
autoUpdateApps.enable = true;
|
|
||||||
# Set what time makes sense for you
|
|
||||||
autoUpdateApps.startAt = "05:00:00";
|
|
||||||
|
|
||||||
config = {
|
|
||||||
# Further forces Nextcloud to use HTTPS
|
|
||||||
overwriteProtocol = "https";
|
|
||||||
|
|
||||||
# Nextcloud PostegreSQL database configuration, recommended over using SQLite
|
|
||||||
dbtype = "pgsql";
|
|
||||||
dbuser = "nextcloud";
|
|
||||||
dbhost = "/run/postgresql"; # nextcloud will add /.s.PGSQL.5432 by itself
|
|
||||||
dbname = "nextcloud";
|
|
||||||
dbpassFile = "/run/nextcloud-db";
|
|
||||||
|
|
||||||
adminpassFile = "/run/nextcloud-admin";
|
|
||||||
adminuser = "admin";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Enable PostgreSQL
|
|
||||||
services.postgresql = {
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
# Ensure the database, user, and permissions always exist
|
|
||||||
ensureDatabases = [ "nextcloud" ];
|
|
||||||
ensureUsers = [
|
|
||||||
{ name = "nextcloud";
|
|
||||||
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
# Ensure that postgres is running before running the setup
|
|
||||||
systemd.services."nextcloud-setup" = {
|
|
||||||
requires = ["postgresql.service"];
|
|
||||||
after = ["postgresql.service"];
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,12 +0,0 @@
|
||||||
{ config, pkgs, lib, ... }:
|
|
||||||
{
|
|
||||||
services.prometheus = {
|
|
||||||
exporters = {
|
|
||||||
node = {
|
|
||||||
enable = true;
|
|
||||||
enabledCollectors = [ "systemd" ];
|
|
||||||
port = 9002;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,9 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 AsRWPA 5ZW4bbKR4eBq9udfQt0aSxKLGqeRfK12CKbK5uO8PXQ
|
|
||||||
jFF9AppAOlTo3K1djnZs6RiqgUvdnxD0qa/oiB/MAhs
|
|
||||||
-> ssh-ed25519 AsRWPA l6PCaq/TiVFb5u6ohyQKDGuRkg5dXWOnnkvXRfo9eng
|
|
||||||
YPxMklq50g8aOsWEbkfk8pprzfUOh2ks7g1HoEuGFRQ
|
|
||||||
-> 6p!-grease J= W~
|
|
||||||
MiJKoixj2WhO2O/DBIfPe80yu7mZ8wIVxyfNhw
|
|
||||||
--- CBRiDc/5kln0elYaqSxwgp39zUWfIPv1/QgLCE39CYw
|
|
||||||
>ÓßAê÷+TÚ.<2E>SetݯËö
®ß;{œü‘ÅzªžUF³¡œ2Õ%ßCÈ<>
|
|
Binary file not shown.
|
@ -1,11 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 cRwSCQ R0+fx+GjiA4oGjdu1jaMAiXFvOD/TAmh+od55rShTGw
|
|
||||||
FBk21m1dWNmo4X3mnjBhvZrlXAlcUFNiNs96BU8NHCU
|
|
||||||
-> ssh-ed25519 cRwSCQ GAcBRtCTRUnPrXDXpU8It5OQnz+3J8IdqHiWW5k200s
|
|
||||||
rCGGuHZ4helvsIQPLBWDMCPV3ZvOMoJ7kPxmwB+RJGw
|
|
||||||
-> ssh-ed25519 AsRWPA PNboiDuuin5kY7HMLzZYruip0whF9xs1IAr9RNfQwXA
|
|
||||||
3mmQBxi3IGgnHBsWNeUuDvoa3ZMhGJdbRksRQtiRk5k
|
|
||||||
-> :Gel-grease
|
|
||||||
atx1cHPtIL3FMjXKj5+MGm4
|
|
||||||
--- cfMzYeRC6IY4Xsg+tMfT3SpMzwPPi7ZhS68NPbrLwDI
|
|
||||||
:Ïe{*<03>n<Ê1¡“ø?ã9X`ºT:AÁAþÄwëÈç|OÝW
|
|
|
@ -1,12 +0,0 @@
|
||||||
let
|
|
||||||
nextcloud-db = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
|
||||||
nextcloud-admin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
|
||||||
restic = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGgO3EpoG14fn0VYC69sSS0iI5ZEB4qx9adFS+L5U5ZB";
|
|
||||||
users_nextcloud = [ nextcloud-db nextcloud-admin ];
|
|
||||||
users_backup = [ restic ];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
"nextcloud-db-pass.age".publicKeys = users_nextcloud;
|
|
||||||
"nextcloud-admin-pass.age".publicKeys = users_nextcloud;
|
|
||||||
"secret_restic.age".publicKeys = users_backup;
|
|
||||||
}
|
|
|
@ -15,7 +15,6 @@
|
||||||
procs
|
procs
|
||||||
plocate
|
plocate
|
||||||
exa
|
exa
|
||||||
age
|
|
||||||
];
|
];
|
||||||
# Nix Garbage Collector
|
# Nix Garbage Collector
|
||||||
nix.gc = {
|
nix.gc = {
|
||||||
|
|
Loading…
Reference in New Issue