diff --git a/configs/user.nix b/configs/user.nix index f45fca3..9c16a0c 100644 --- a/configs/user.nix +++ b/configs/user.nix @@ -187,9 +187,5 @@ in { }; services.vscode-server.enable = true; - - # manuals not needed - manual.html.enable = false; - manual.json.enable = false; }; } diff --git a/ddclient.conf b/ddclient.conf new file mode 100644 index 0000000..c6bcc9b --- /dev/null +++ b/ddclient.conf @@ -0,0 +1 @@ +rtGAAbKqSiCi9yqJDezwTl40YXniShCWWoBygXMyIMJWFellAXMRbl9dZY2fNwcB \ No newline at end of file diff --git a/machine/mini.nix b/machine/mini.nix index 2cc0565..9d9243c 100644 --- a/machine/mini.nix +++ b/machine/mini.nix @@ -1,16 +1,14 @@ { config, pkgs, ... }: -let - secrets = import ../configs/secrets.nix; -in -{ - imports = - [ - - /etc/nixos/hardware-configuration.nix - ../configs/docker.nix - ../configs/common.nix - ../configs/user.nix - ]; +let secrets = import ../configs/secrets.nix; +in { + imports = [ + + /etc/nixos/hardware-configuration.nix + ../configs/docker.nix + ../configs/libvirt.nix + ../configs/common.nix + ../configs/user.nix + ]; # Use the systemd-boot EFI boot loader. boot.loader.systemd-boot.enable = true; @@ -21,49 +19,74 @@ in networking = { hostName = "mini"; useDHCP = false; - firewall = { - enable = false; - }; + firewall = { enable = false; }; networkmanager.enable = true; wireguard.interfaces = { wg0 = { ips = [ "10.100.0.3/24" ]; privateKey = secrets.wireguard-mini-private; - peers = [ - { - publicKey = secrets.wireguard-vps-public; - presharedKey = secrets.wireguard-preshared; - allowedIPs = [ "10.100.0.0/24" ]; - endpoint = "szczepan.ski:51820"; - persistentKeepalive = 25; - } - ]; + peers = [{ + publicKey = secrets.wireguard-vps-public; + presharedKey = secrets.wireguard-preshared; + allowedIPs = [ "10.100.0.0/24" ]; + endpoint = "szczepan.ski:51820"; + persistentKeepalive = 25; + }]; }; }; }; services = { - k3s = { + # k3s = { + # enable = true; + # role = "server"; + # }; + + # nextdns = { + # arguments = pkgs.lib.mkForce [ + # "-config" + # secrets.nextdnshash + # "-cache-size" + # "10MB" + # "-listen" + # "0.0.0.0:53" + # "-listen" + # ":::53" + # "-forwarder" + # secrets.nextdnsforwarder + # "-report-client-info" + # ]; + # }; + + ddclient = { enable = true; - role = "server"; + verbose = true; + server = "dyndns.strato.com/nic/update"; + username = "beinacht.org"; + passwordFile = "/home/alex/nixos-config/ddclient.conf"; + domains = [ "home.beinacht.org" ]; }; - nextdns = { - arguments = pkgs.lib.mkForce [ - "-config" - secrets.nextdnshash - "-cache-size" - "10MB" - "-listen" - "0.0.0.0:53" - "-listen" - ":::53" - "-forwarder" - secrets.nextdnsforwarder - "-report-client-info" - ]; + printing = { + enable = true; + drivers = [ pkgs.brlaser ]; + browsing = true; + listenAddresses = [ + "*:631" + ]; # Not 100% sure this is needed and you might want to restrict to the local network + allowFrom = [ + "all" + ]; # this gives access to anyone on the interface you might want to limit it see the official documentation + defaultShared = true; # If you want }; + + avahi = { + enable = true; + publish.enable = true; + publish.userServices = true; + }; + }; system.stateVersion = "22.05";