Cleaup
deploy config / Explore-Gitea-Actions (push) Successful in 7s Details

This commit is contained in:
Tom 2024-08-07 22:27:19 +02:00
parent d2a048b8fe
commit e70d18e477
1 changed files with 13 additions and 24 deletions

View File

@ -1,7 +1,3 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
#
{ config, pkgs, ... }: { config, pkgs, ... }:
@ -12,13 +8,18 @@
]; ];
# Bootloader. # Bootloader.
boot.loader.systemd-boot.enable = true; boot = {
boot.loader.efi.canTouchEfiVariables = true; loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;
};
kernelPackages = pkgs.linuxPackages_latest;
};
boot.kernelPackages = pkgs.linuxPackages_latest; networking = {
hostName = "nginx";
networking.hostName = "nginx"; networkmanager.enable = true;
networking.networkmanager.enable = true; };
# Set your time zone. # Set your time zone.
time.timeZone = "Europe/Zurich"; time.timeZone = "Europe/Zurich";
@ -66,22 +67,11 @@
acme acme
]; ];
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;
# programs.gnupg.agent = {
# enable = true;
# enableSSHSupport = true;
# };
# List services that you want to enable:
# Enable the OpenSSH daemon. # Enable the OpenSSH daemon.
services.openssh = { services.openssh = {
enable = true; enable = true;
settings.PermitRootLogin = "without-password"; settings.PermitRootLogin = "without-password";
}; };
# services.nginx.enable = false;
services.nginx = { services.nginx = {
enable = true; enable = true;
@ -91,6 +81,7 @@
locations."/".proxyPass = "http://10.0.0.24:3000/"; locations."/".proxyPass = "http://10.0.0.24:3000/";
}; };
}; };
security.acme = { security.acme = {
acceptTerms = true; acceptTerms = true;
defaults.email = "gentoo@blubb.fish"; defaults.email = "gentoo@blubb.fish";
@ -99,8 +90,6 @@
# Open ports in the firewall. # Open ports in the firewall.
networking.firewall.allowedTCPPorts = [ 80 443 ]; networking.firewall.allowedTCPPorts = [ 80 443 ];
# networking.firewall.allowedUDPPorts = [ ... ]; # networking.firewall.allowedUDPPorts = [ ... ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions