2022-07-30 06:54:32 +03:00
|
|
|
{
|
|
|
|
inputs,
|
|
|
|
pkgs,
|
|
|
|
...
|
|
|
|
}: {
|
2022-07-30 04:39:01 +03:00
|
|
|
imports = [
|
|
|
|
./hardware-configuration.nix
|
|
|
|
];
|
|
|
|
|
|
|
|
boot.cleanTmpDir = true;
|
|
|
|
zramSwap.enable = true;
|
|
|
|
|
2022-07-30 06:54:32 +03:00
|
|
|
# ssh config
|
|
|
|
services.fail2ban.enable = true;
|
2022-07-30 04:39:01 +03:00
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
|
|
|
passwordAuthentication = false;
|
|
|
|
};
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
|
|
(builtins.readFile "${inputs.self}/secrets/ssh-key.pub")
|
|
|
|
];
|
2022-07-30 05:03:10 +03:00
|
|
|
|
2022-07-30 06:54:32 +03:00
|
|
|
# nginx
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
virtualHosts."gaze.systems" = {
|
|
|
|
enableACME = true;
|
|
|
|
forceSSL = true;
|
|
|
|
root = "${inputs.blog.packages.${pkgs.system}.website}";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
security.acme = {
|
|
|
|
acceptTerms = true;
|
|
|
|
certs = {
|
|
|
|
"gaze.systems".email = "y.bera003.06@pm.me";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# firewall stuffs
|
|
|
|
networking.firewall = {
|
|
|
|
enable = true;
|
|
|
|
allowedTCPPorts = [ 22 80 443 ];
|
|
|
|
allowedUDPPortRanges = [ ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# nixinate for deployment
|
2022-07-30 05:03:10 +03:00
|
|
|
_module.args.nixinate = {
|
|
|
|
host = builtins.readFile "${inputs.self}/secrets/wolumonde-ip";
|
|
|
|
sshUser = "root";
|
|
|
|
buildOn = "local"; # valid args are "local" or "remote"
|
|
|
|
substituteOnTarget = true; # if buildOn is "local" then it will substitute on the target, "-s"
|
|
|
|
hermetic = true;
|
|
|
|
};
|
2022-07-30 05:14:17 +03:00
|
|
|
|
|
|
|
system.stateVersion = "22.05";
|
2022-07-30 05:03:10 +03:00
|
|
|
}
|