Ingress quasar configurations
This commit is contained in:
parent
9eb0949e60
commit
ae246349e1
4 changed files with 106 additions and 0 deletions
|
|
@ -14,4 +14,12 @@ in {
|
|||
modules = [ ./astral ];
|
||||
specialArgs = { inherit (self) nixosModules; };
|
||||
};
|
||||
quasar = nixosSystem {
|
||||
system = "x86_64-linux";
|
||||
modules = [ ./quasar ];
|
||||
specialArgs = {
|
||||
inherit (self) nixosModules;
|
||||
inherit agenix;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
89
hosts/quasar/default.nix
Normal file
89
hosts/quasar/default.nix
Normal file
|
|
@ -0,0 +1,89 @@
|
|||
{ modulesPath, nixosModules, agenix, pkgs, config, ... }: {
|
||||
imports = [
|
||||
"${modulesPath}/virtualisation/amazon-image.nix"
|
||||
nixosModules.nettika
|
||||
nixosModules.promptmoji
|
||||
agenix.nixosModules.default
|
||||
];
|
||||
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
nix.settings = {
|
||||
experimental-features = [ "nix-command" "flakes" ];
|
||||
trusted-users = [ "@wheel" ];
|
||||
};
|
||||
|
||||
security.sudo.wheelNeedsPassword = false;
|
||||
|
||||
environment.variables.EDITOR = "nano";
|
||||
|
||||
networking = {
|
||||
hostName = "quasar";
|
||||
networkmanager.enable = true;
|
||||
firewall.allowedTCPPorts = [ 80 443 ];
|
||||
};
|
||||
|
||||
environment.systemPackages = [ pkgs.htop ];
|
||||
|
||||
age.secrets = {
|
||||
matrix-synapse-secrets.file = ./secrets/matrix-synapse-secrets.age;
|
||||
};
|
||||
|
||||
services.postgresql = { enable = true; };
|
||||
|
||||
services.caddy = {
|
||||
enable = true;
|
||||
virtualHosts = {
|
||||
"consortium.chat".extraConfig = ''
|
||||
reverse_proxy localhost:8008
|
||||
header Strict-Transport-Security "max-age=63072000; includeSubDomains"
|
||||
'';
|
||||
"matrix.consortium.chat".extraConfig = ''
|
||||
reverse_proxy /_matrix/* localhost:8008
|
||||
reverse_proxy /_synapse/client/* localhost:8008
|
||||
'';
|
||||
"admin.consortium.chat".extraConfig = ''
|
||||
root * ${pkgs.synapse-admin}
|
||||
file_server
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
services.matrix-synapse = {
|
||||
enable = true;
|
||||
settings = {
|
||||
server_name = "consortium.chat";
|
||||
serve_server_wellknown = true;
|
||||
};
|
||||
extraConfigFiles = [ config.age.secrets.matrix-synapse-secrets.path ];
|
||||
};
|
||||
|
||||
programs.git = {
|
||||
enable = true;
|
||||
lfs.enable = true;
|
||||
config = {
|
||||
init.defaultBranch = "master";
|
||||
user = {
|
||||
email = "git@nettika.cat";
|
||||
name = "Nettika";
|
||||
};
|
||||
credential.helper = "store";
|
||||
};
|
||||
};
|
||||
|
||||
programs.nano = {
|
||||
enable = true;
|
||||
nanorc = ''
|
||||
set autoindent
|
||||
set linenumbers
|
||||
'';
|
||||
};
|
||||
|
||||
programs.fish.enable = true;
|
||||
|
||||
promptSymbol = "🌟";
|
||||
|
||||
time.timeZone = "America/Los_Angeles";
|
||||
|
||||
system.stateVersion = "24.05";
|
||||
}
|
||||
7
hosts/quasar/secrets/matrix-synapse-secrets.age
Normal file
7
hosts/quasar/secrets/matrix-synapse-secrets.age
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 f+PJrQ Iv9sdO33a3P4MqwsqV9fG1pZo2qflmlKYr2oDI/guwQ
|
||||
oUUIBdg9Ey5RTBDFTKTvAdQGxKWtdlBluBE2Urosc7Y
|
||||
--- pAqz01P0OJOGhl/nM09oFU+f447+O7K1lFRlkhcv740
|
||||
¡¯÷©ó¬Hub¸ò~à*:ž9z¦l…÷/€«^o#<23>ň3¢Ô~§z(56¤µÃ+¯<þTxàM5`F`[-£¦3"×Ϩ-
|
||||
h? å@4gÞ³$€æsûè2„Ïbí[ÊY÷üã·)ã s܃_ûœYI¯ñ†…í{4µ²ë¦ŸC<C5B8>RÝA°Ðô$‡kâŸQð,
|
||||
ž˜¦<CB9C>óoŠÂigÃr¹ë<'lžƒ‚$ôÊS2½s®<73>Á<EFBFBD>8ƒ…àž}EùÓ+é\.¶rèy"k¸Â}ŽÔ,Óæê<C3A6>ˆ0=t<yÎ|[ã+xœ{ʳ<C38A>ÔØ(‹S4uë¯
|
||||
|
|
@ -5,4 +5,6 @@ in {
|
|||
"hosts/marauder/secrets/restic-env.age".publicKeys = [ marauder.nettika ];
|
||||
"hosts/marauder/secrets/restic-password.age".publicKeys =
|
||||
[ marauder.nettika ];
|
||||
"hosts/quasar/secrets/matrix-synapse-secrets.age".publicKeys =
|
||||
[ marauder.nettika ];
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue