format nix code
All checks were successful
nixos config pipeline / show-flake (push) Successful in 27s
nixos config pipeline / deploy (push) Successful in 1m38s

This commit is contained in:
smayzy 2025-10-09 17:55:32 +02:00
parent e776e94484
commit d341c0c3f1
6 changed files with 444 additions and 365 deletions

View File

@ -9,9 +9,18 @@
networking.hostName = "desktop1"; networking.hostName = "desktop1";
networking.bridges.br0.interfaces = [ "enp4s0" ]; networking.bridges.br0.interfaces = [ "enp4s0" ];
networking.interfaces.br0.ipv4.addresses = [ { address = "192.168.1.146"; prefixLength = 24; } ]; networking.interfaces.br0.ipv4.addresses = [
{
address = "192.168.1.146";
prefixLength = 24;
}
];
networking.defaultGateway = "192.168.1.254"; networking.defaultGateway = "192.168.1.254";
networking.nameservers = [ "192.168.1.202" "192.168.1.137" "192.168.1.49" ]; networking.nameservers = [
"192.168.1.202"
"192.168.1.137"
"192.168.1.49"
];
age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -9,9 +9,18 @@
networking.hostName = "server1"; networking.hostName = "server1";
networking.bridges.br0.interfaces = [ "ens18" ]; networking.bridges.br0.interfaces = [ "ens18" ];
networking.interfaces.br0.ipv4.addresses = [ { address = "192.168.1.197"; prefixLength = 24; } ]; networking.interfaces.br0.ipv4.addresses = [
{
address = "192.168.1.197";
prefixLength = 24;
}
];
networking.defaultGateway = "192.168.1.254"; networking.defaultGateway = "192.168.1.254";
networking.nameservers = [ "192.168.1.202" "192.168.1.137" "192.168.1.49" ]; networking.nameservers = [
"192.168.1.202"
"192.168.1.137"
"192.168.1.49"
];
age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -23,7 +23,9 @@ in
privateNetwork = true; privateNetwork = true;
hostBridge = net.bridge; hostBridge = net.bridge;
localAddress = cfg.ip; localAddress = cfg.ip;
config = { ... }: { config =
{ ... }:
{
system.stateVersion = "25.11"; system.stateVersion = "25.11";
services.httpd = { services.httpd = {

View File

@ -47,12 +47,19 @@ in
privateNetwork = true; privateNetwork = true;
hostBridge = net.bridge; hostBridge = net.bridge;
localAddress = cfg.ip; localAddress = cfg.ip;
config = { ... }: { config =
{ ... }:
{
system.stateVersion = "25.11"; system.stateVersion = "25.11";
networking.defaultGateway = net.gateway; networking.defaultGateway = net.gateway;
networking.nameservers = net.dns; networking.nameservers = net.dns;
networking.firewall.allowedTCPPorts = [ 80 443 880 4443 ]; networking.firewall.allowedTCPPorts = [
80
443
880
4443
];
systemd.services.traefik.serviceConfig.EnvironmentFile = [ systemd.services.traefik.serviceConfig.EnvironmentFile = [
"/run/secrets/traefik-cf-tk" "/run/secrets/traefik-cf-tk"
@ -180,91 +187,136 @@ in
chat = { chat = {
rule = "Host(`chat.smayzy.ovh`)"; rule = "Host(`chat.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "chat"; service = "chat";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
crafty = { crafty = {
rule = "Host(`crafty.smayzy.ovh`)"; rule = "Host(`crafty.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "crafty"; service = "crafty";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
cyberchef = { cyberchef = {
rule = "Host(`cyberchef.smayzy.ovh`)"; rule = "Host(`cyberchef.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "cyberchef"; service = "cyberchef";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
gitea = { gitea = {
rule = "Host(`gitea.smayzy.ovh`)"; rule = "Host(`gitea.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "gitea"; service = "gitea";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
jellyfin = { jellyfin = {
rule = "Host(`jellyfin.smayzy.ovh`)"; rule = "Host(`jellyfin.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "jellyfin"; service = "jellyfin";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
kuma = { kuma = {
rule = "Host(`kuma.smayzy.ovh`)"; rule = "Host(`kuma.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "kuma"; service = "kuma";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
kutt = { kutt = {
rule = "Host(`kutt.smayzy.ovh`)"; rule = "Host(`kutt.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "kutt"; service = "kutt";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
matrix = { matrix = {
rule = "Host(`matrix.smayzy.ovh`)"; rule = "Host(`matrix.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "matrix"; service = "matrix";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
mirror = { mirror = {
rule = "Host(`mirror.smayzy.ovh`)"; rule = "Host(`mirror.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "mirror"; service = "mirror";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
ombi-anime = { ombi-anime = {
rule = "Host(`ombi-anime.smayzy.ovh`)"; rule = "Host(`ombi-anime.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "ombi-anime"; service = "ombi-anime";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
ombi = { ombi = {
rule = "Host(`ombi.smayzy.ovh`)"; rule = "Host(`ombi.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "ombi"; service = "ombi";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
share = { share = {
rule = "Host(`share.smayzy.ovh`)"; rule = "Host(`share.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "share"; service = "share";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
vault = { vault = {
rule = "Host(`vault.smayzy.ovh`)"; rule = "Host(`vault.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "vault"; service = "vault";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
wordpress = { wordpress = {
rule = "Host(`wordpress.smayzy.ovh`)"; rule = "Host(`wordpress.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "wordpress"; service = "wordpress";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };
mail = { mail = {
rule = "Host(`autoconfig.smayzy.ovh`) || Host(`autodiscover.smayzy.ovh`) || Host(`mail.smayzy.ovh`) || Host(`mta-sts.mail.smayzy.ovh`) || Host(`mta-sts.smayzy.ovh`) || Host(`smayzy.ovh`) || Host(`www.smayzy.ovh`)"; rule = "Host(`autoconfig.smayzy.ovh`) || Host(`autodiscover.smayzy.ovh`) || Host(`mail.smayzy.ovh`) || Host(`mta-sts.mail.smayzy.ovh`) || Host(`mta-sts.smayzy.ovh`) || Host(`smayzy.ovh`) || Host(`www.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ]; entryPoints = [
"ext"
"extSec"
];
service = "mail"; service = "mail";
tls.certResolver = "cloudflare"; tls.certResolver = "cloudflare";
}; };

View File

@ -23,7 +23,9 @@ in
privateNetwork = true; privateNetwork = true;
hostBridge = net.bridge; hostBridge = net.bridge;
localAddress = cfg.ip; localAddress = cfg.ip;
config = { ... }: { config =
{ ... }:
{
system.stateVersion = "25.11"; system.stateVersion = "25.11";
services.unbound = { services.unbound = {

View File

@ -1,4 +1,9 @@
{ lib, pkgs, config, ... }: {
lib,
pkgs,
config,
...
}:
let let
inherit (lib) mkIf mkOption types; inherit (lib) mkIf mkOption types;
in in