infrastructure/machines/vault01/_configuration.nix
Tom Hubrecht 8a42e18d98
All checks were successful
build configuration / build_storage01 (push) Successful in 1m38s
build configuration / build_compute01 (push) Successful in 1m40s
build configuration / build_web01 (push) Successful in 2m11s
build configuration / build_vault01 (push) Successful in 2m11s
lint / check (push) Successful in 27s
build configuration / build_geo02 (push) Successful in 1m20s
build configuration / build_geo01 (push) Successful in 1m23s
build configuration / build_web02 (push) Successful in 1m28s
build configuration / build_rescue01 (push) Successful in 1m28s
build configuration / build_bridge01 (push) Successful in 1m20s
build configuration / push_to_cache_storage01 (push) Successful in 1m32s
build configuration / push_to_cache_geo02 (push) Successful in 1m38s
build configuration / push_to_cache_geo01 (push) Successful in 1m38s
build configuration / push_to_cache_compute01 (push) Successful in 2m8s
build configuration / push_to_cache_rescue01 (push) Successful in 1m39s
build configuration / push_to_cache_web01 (push) Successful in 2m29s
build configuration / push_to_cache_web02 (push) Successful in 1m28s
build configuration / push_to_cache_bridge01 (push) Successful in 1m17s
feat(k-radius): Use LE certificates instead of self-signed ones
2024-09-01 15:40:59 +02:00

28 lines
490 B
Nix

{ lib, ... }:
lib.extra.mkConfig {
enabledModules = [
# List of modules to enable
"dgn-fail2ban"
];
enabledServices = [
# List of services to enable
"k-radius"
"networking"
"ups"
];
extraConfig = {
dgn-fail2ban.jails = lib.extra.enableAttrs' "enabled" [
"sshd-bruteforce"
"sshd-timeout"
];
services.netbird.enable = true;
services.nginx.enable = true;
networking.firewall.allowedTCPPorts = [ 80 ];
};
root = ./.;
}