stockholm/lass/1systems/ubik/config.nix

46 lines
1.1 KiB
Nix
Raw Normal View History

2023-01-26 15:15:35 +00:00
with import <stockholm/lib>;
{ config, lib, pkgs, ... }:
{
imports = [
<stockholm/lass>
<stockholm/lass/2configs>
<stockholm/lass/2configs/retiolum.nix>
];
krebs.build.host = config.krebs.hosts.ubik;
2023-01-30 19:53:24 +00:00
krebs.sync-containers3.inContainer = {
2023-01-26 15:15:35 +00:00
enable = true;
pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPBFGMjH0+Dco6DVFZbByENMci8CFTLXCL7j53yctPnM";
};
2023-07-02 20:46:37 +00:00
security.acme = {
acceptTerms = true;
defaults.email = "acme@lassul.us";
};
networking.firewall.allowedTCPPorts = [ 80 443 ];
# nextcloud
services.nginx.virtualHosts."c.apanowicz.de" = {
enableACME = true;
forceSSL = true;
};
2023-01-26 15:15:35 +00:00
services.nextcloud = {
enable = true;
2023-07-02 20:46:37 +00:00
enableBrokenCiphersForSSE = false;
2023-01-26 15:15:35 +00:00
hostName = "c.apanowicz.de";
package = pkgs.nextcloud25;
config.adminpassFile = "/run/nextcloud.pw";
https = true;
2023-07-02 20:46:37 +00:00
maxUploadSize = "9001M";
2023-01-26 15:15:35 +00:00
};
systemd.services.nextcloud-setup.serviceConfig.ExecStartPre = [
"+${pkgs.writeDash "copy-pw" ''
${pkgs.rsync}/bin/rsync \
--chown nextcloud:nextcloud \
--chmod 0700 \
/var/src/secrets/nextcloud.pw /run/nextcloud.pw
''}"
];
}