Configuration for my NixOS based systems and Home Manager
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

ADD: nix cache server

+46 -32
+29
coredns/config
··· 1 + packetlost.dev { 2 + hosts ${./coredns/packetlost.dev.hosts} packetlost.dev { 3 + fallthrough 4 + } 5 + bind enp4s0f1 6 + } 7 + ngp.computer { 8 + hosts ${./coredns/ngp.computer.hosts} ngp.computer { 9 + fallthrough 10 + } 11 + bind enp4s0f1 12 + } 13 + localhost { 14 + hosts ${./coredns/localhost.hosts} localhost { 15 + fallthrough 16 + } 17 + bind enp4s0f1 18 + } 19 + . { 20 + # NextDNS 21 + forward . tls://2a07:a8c0::dd:2feb:853 tls://2a07:a8c1::dd:2feb:853 tls://45.90.28.93:853 tls://45.90.30.93:853 { 22 + tls_servername dd2feb.dns.nextdns.io 23 + health_check 5s 24 + } 25 + bind enp4s0f1 26 + cache 27 + errors 28 + log 29 + }
+3
coredns/ngp.computer.hosts
··· 1 1 192.168.1.3 img.ngp.computer 2 + 192.168.1.3 misaki.ngp.computer 3 + 2 4 fe80::9ab7:85ff:fe1e:dfe8 img.ngp.computer 5 + fe80::9ab7:85ff:fe1e:dfe8 misaki.ngp.computer
+1
coredns/packetlost.dev.hosts
··· 8 8 9 9 # LAN Hosts 10 10 192.168.1.3 misaki.packetlost.dev misaki 11 + 192.168.1.3 cache.packetlost.dev cache 11 12 #fe80::9ab7:85ff:fe1e:dfe8 misaki.packetlost.dev misaki 12 13 192.168.1.5 komoe.packetlost.dev komoe 13 14 192.168.1.6 rainbow.packetlost.dev rainbow
+1 -1
noah-home.nix
··· 92 92 93 93 programs.fish.enable = true; 94 94 programs.neovim = { 95 - package = unstable.neovim-unwrapped; 95 + #package = unstable.neovim-unwrapped; 96 96 enable = true; 97 97 defaultEditor = true; 98 98 extraPackages = with pkgs; [
+1
packages.nix
··· 60 60 plan9port 61 61 vis 62 62 rc 63 + ncdu 63 64 64 65 # ZFS / filesystem stuff 65 66 zfs
+11 -31
services.nix
··· 103 103 104 104 services.coredns = { 105 105 enable = true; 106 - config = '' 107 - packetlost.dev { 108 - hosts ${./coredns/packetlost.dev.hosts} packetlost.dev { 109 - fallthrough 110 - } 111 - bind enp4s0f1 112 - } 113 - ngp.computer { 114 - hosts ${./coredns/ngp.computer.hosts} ngp.computer { 115 - fallthrough 116 - } 117 - bind enp4s0f1 118 - } 119 - localhost { 120 - hosts ${./coredns/localhost.hosts} localhost { 121 - fallthrough 122 - } 123 - bind enp4s0f1 124 - } 125 - . { 126 - # NextDNS 127 - forward . tls://2a07:a8c0::dd:2feb:853 tls://2a07:a8c1::dd:2feb:853 tls://45.90.28.93:853 tls://45.90.30.93:853 { 128 - tls_servername dd2feb.dns.nextdns.io 129 - health_check 5s 130 - } 131 - bind enp4s0f1 132 - cache 133 - errors 134 - log 135 - } 136 - ''; 106 + config = lib.readFile ./coredns/config; 137 107 }; 138 108 139 109 services.nats = { ··· 282 252 }; 283 253 }; 284 254 255 + services.nix-serve = { 256 + enable = true; 257 + secretKeyFile = "/srv/cache/cache-priv-key.pem"; 258 + #openFirewall = true; 259 + }; 260 + 285 261 services.plex = { 286 262 enable = true; 287 263 openFirewall = false; # we proxy this with nginx ··· 358 334 # }; 359 335 #}; 360 336 337 + virtualHosts."cache.packetlost.dev" = { 338 + locations."/".proxyPass = 339 + "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}"; 340 + }; 361 341 virtualHosts."img.ngp.computer" = { 362 342 forceSSL = true; 363 343 enableACME = true;