format nix code
All checks were successful
nixos config pipeline / show-flake (push) Successful in 27s
nixos config pipeline / deploy (push) Successful in 1m38s

This commit is contained in:
smayzy 2025-10-09 17:55:32 +02:00
parent e776e94484
commit d341c0c3f1
6 changed files with 444 additions and 365 deletions

View File

@ -9,9 +9,18 @@
networking.hostName = "desktop1";
networking.bridges.br0.interfaces = [ "enp4s0" ];
networking.interfaces.br0.ipv4.addresses = [ { address = "192.168.1.146"; prefixLength = 24; } ];
networking.interfaces.br0.ipv4.addresses = [
{
address = "192.168.1.146";
prefixLength = 24;
}
];
networking.defaultGateway = "192.168.1.254";
networking.nameservers = [ "192.168.1.202" "192.168.1.137" "192.168.1.49" ];
networking.nameservers = [
"192.168.1.202"
"192.168.1.137"
"192.168.1.49"
];
age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -9,9 +9,18 @@
networking.hostName = "server1";
networking.bridges.br0.interfaces = [ "ens18" ];
networking.interfaces.br0.ipv4.addresses = [ { address = "192.168.1.197"; prefixLength = 24; } ];
networking.interfaces.br0.ipv4.addresses = [
{
address = "192.168.1.197";
prefixLength = 24;
}
];
networking.defaultGateway = "192.168.1.254";
networking.nameservers = [ "192.168.1.202" "192.168.1.137" "192.168.1.49" ];
networking.nameservers = [
"192.168.1.202"
"192.168.1.137"
"192.168.1.49"
];
age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -23,7 +23,9 @@ in
privateNetwork = true;
hostBridge = net.bridge;
localAddress = cfg.ip;
config = { ... }: {
config =
{ ... }:
{
system.stateVersion = "25.11";
services.httpd = {

View File

@ -47,12 +47,19 @@ in
privateNetwork = true;
hostBridge = net.bridge;
localAddress = cfg.ip;
config = { ... }: {
config =
{ ... }:
{
system.stateVersion = "25.11";
networking.defaultGateway = net.gateway;
networking.nameservers = net.dns;
networking.firewall.allowedTCPPorts = [ 80 443 880 4443 ];
networking.firewall.allowedTCPPorts = [
80
443
880
4443
];
systemd.services.traefik.serviceConfig.EnvironmentFile = [
"/run/secrets/traefik-cf-tk"
@ -180,91 +187,136 @@ in
chat = {
rule = "Host(`chat.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "chat";
tls.certResolver = "cloudflare";
};
crafty = {
rule = "Host(`crafty.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "crafty";
tls.certResolver = "cloudflare";
};
cyberchef = {
rule = "Host(`cyberchef.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "cyberchef";
tls.certResolver = "cloudflare";
};
gitea = {
rule = "Host(`gitea.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "gitea";
tls.certResolver = "cloudflare";
};
jellyfin = {
rule = "Host(`jellyfin.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "jellyfin";
tls.certResolver = "cloudflare";
};
kuma = {
rule = "Host(`kuma.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "kuma";
tls.certResolver = "cloudflare";
};
kutt = {
rule = "Host(`kutt.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "kutt";
tls.certResolver = "cloudflare";
};
matrix = {
rule = "Host(`matrix.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "matrix";
tls.certResolver = "cloudflare";
};
mirror = {
rule = "Host(`mirror.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "mirror";
tls.certResolver = "cloudflare";
};
ombi-anime = {
rule = "Host(`ombi-anime.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "ombi-anime";
tls.certResolver = "cloudflare";
};
ombi = {
rule = "Host(`ombi.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "ombi";
tls.certResolver = "cloudflare";
};
share = {
rule = "Host(`share.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "share";
tls.certResolver = "cloudflare";
};
vault = {
rule = "Host(`vault.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "vault";
tls.certResolver = "cloudflare";
};
wordpress = {
rule = "Host(`wordpress.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "wordpress";
tls.certResolver = "cloudflare";
};
mail = {
rule = "Host(`autoconfig.smayzy.ovh`) || Host(`autodiscover.smayzy.ovh`) || Host(`mail.smayzy.ovh`) || Host(`mta-sts.mail.smayzy.ovh`) || Host(`mta-sts.smayzy.ovh`) || Host(`smayzy.ovh`) || Host(`www.smayzy.ovh`)";
entryPoints = [ "ext" "extSec" ];
entryPoints = [
"ext"
"extSec"
];
service = "mail";
tls.certResolver = "cloudflare";
};

View File

@ -23,7 +23,9 @@ in
privateNetwork = true;
hostBridge = net.bridge;
localAddress = cfg.ip;
config = { ... }: {
config =
{ ... }:
{
system.stateVersion = "25.11";
services.unbound = {

View File

@ -1,4 +1,9 @@
{ lib, pkgs, config, ... }:
{
lib,
pkgs,
config,
...
}:
let
inherit (lib) mkIf mkOption types;
in