110 lines
3.5 KiB
Nix
110 lines
3.5 KiB
Nix
{pkgs, ...}: {
|
|
# services.mattermost = {
|
|
# enable = true;
|
|
# siteUrl = "https://mattermost.example.com"; # Set this to the URL you will be hosting the site on.
|
|
# };
|
|
|
|
# todo: ci runner
|
|
|
|
# services.ollama = {
|
|
# enable = true;
|
|
# # acceleration = "cuda";
|
|
# };
|
|
|
|
# services.gotosocial = {
|
|
# enable = true;
|
|
# setupPostgresqlDB = true;
|
|
# settings = {
|
|
# application-name = "My GoToSocial";
|
|
# host = "gotosocial.example.com";
|
|
# protocol = "http";
|
|
# bind-address = "127.0.0.1";
|
|
# port = 8080;
|
|
# };
|
|
# };
|
|
|
|
|
|
|
|
# services.rustdesk-server = {
|
|
# enable = true;
|
|
# openFirewall = true;
|
|
# relayIP = "100.91.88.2";
|
|
# };
|
|
|
|
# users.users.lol = {
|
|
# isNormalUser = true;
|
|
# description = "lol";
|
|
# extraGroups = [
|
|
# "networkmanager"
|
|
# # "wheel"
|
|
# # "syncthing"
|
|
# # "tss"
|
|
# # "dialout"
|
|
# # "vboxusers"
|
|
# # "adbusers"
|
|
# ];
|
|
# initialPassword = "password123";
|
|
# };
|
|
|
|
# netwobking
|
|
# ipvx dns-search = "";
|
|
# wifi mac-address-blacklist = "";
|
|
# wifisec auth-alg = "open";
|
|
|
|
# services.thymis-controller = {
|
|
# enable = true;
|
|
# system-binfmt-aarch64-enable = true; # enables emulation of aarch64 binaries, default is true on x86_64, needed for building aarch64 images on x86_64
|
|
# system-binfmt-x86_64-enable = false; # enables emulation of x86_64 binaries, default is false
|
|
# repo-path = "/var/lib/thymis/repository"; # directory where the controller will store the repository holding the project
|
|
# database-url = "sqlite:////var/lib/thymis/thymis.sqlite"; # URL of the database
|
|
# base-url = "https://cave/"; # base URL of the controller, how it will be accessed from the outside
|
|
# auth-basic = true; # whether to enable authentication using a basic username/password
|
|
# auth-basic-username = "admin"; # username for basic authentication
|
|
# auth-basic-password-file = "/var/lib/thymis/auth-basic-password"; # file containing the password for basic authentication
|
|
# # content will be automatically generated if it does not exist
|
|
# listen-host = "127.0.0.1"; # host on which the controller listens for incoming connections
|
|
# listen-port = 33100; # port on which the controller listens for incoming connections
|
|
# nginx-vhost-enable = false; # whether to enable the Nginx virtual host
|
|
# nginx-vhost-name = "thymis"; # name of the Nginx virtual host
|
|
# };
|
|
# # Configure the Nginx virtual host
|
|
# services.nginx = {
|
|
# enable = true;
|
|
# virtualHosts."thymis" = {
|
|
# serverName = "cave";
|
|
# enableACME = true;
|
|
# forceSSL = true;
|
|
# };
|
|
# };
|
|
# security.acme.defaults.email = "tasiaiso@proton.me";
|
|
|
|
# services.nginx.enable = true;
|
|
# services.nginx.virtualHosts."test.vulpecula.zone" = {
|
|
# # addSSL = true;
|
|
# # enableACME = true;
|
|
# root = "/www";
|
|
# };
|
|
# security.acme = {
|
|
# acceptTerms = true;
|
|
# defaults.email = "tasiaiso@proton.me";
|
|
# };
|
|
|
|
security.acme.acceptTerms = true;
|
|
# services.uptime-kuma.enable = true;
|
|
|
|
# programs.adb.enable = true;
|
|
|
|
# Needed to build enry
|
|
#boot.binfmt.emulatedSystems = ["aarch64-linux"];
|
|
|
|
# services.radicle.enable = true;
|
|
# services.radicle.privateKeyFile = /home/tasia/.radicle/keys/radicle;
|
|
# services.radicle.publicKey = /home/tasia/.radicle/keys/radicle.pub;
|
|
# services.radicle.settings = {
|
|
# web.pinned.repositories = [
|
|
# "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5" # heartwood
|
|
# "rad:z3trNYnLWS11cJWC6BbxDs5niGo82" # rips
|
|
# ];
|
|
# };
|
|
}
|