infrastructure/machines/vault01/_configuration.nix
Tom Hubrecht fd0aeacff4
All checks were successful
build configuration / build_storage01 (push) Successful in 1m49s
build configuration / build_compute01 (push) Successful in 1m52s
build configuration / build_web02 (push) Successful in 2m0s
build configuration / build_vault01 (push) Successful in 2m12s
build configuration / build_web01 (push) Successful in 2m27s
lint / check (push) Successful in 29s
build configuration / build_geo02 (push) Successful in 1m28s
build configuration / build_rescue01 (push) Successful in 1m33s
build configuration / build_bridge01 (push) Successful in 1m22s
build configuration / build_geo01 (push) Successful in 1m35s
build configuration / push_to_cache_storage01 (push) Successful in 1m49s
build configuration / push_to_cache_compute01 (push) Successful in 1m52s
build configuration / push_to_cache_geo02 (push) Successful in 1m39s
build configuration / push_to_cache_web02 (push) Successful in 1m47s
build configuration / push_to_cache_rescue01 (push) Successful in 1m47s
build configuration / push_to_cache_bridge01 (push) Successful in 1m29s
build configuration / push_to_cache_web01 (push) Successful in 2m27s
build configuration / push_to_cache_geo01 (push) Successful in 1m22s
feat(firewall): Sunset fail2ban and switch to reaction
2024-09-01 22:51:56 +02:00

22 lines
358 B
Nix

{ lib, ... }:
lib.extra.mkConfig {
enabledModules = [
# List of modules to enable
];
enabledServices = [
# List of services to enable
"k-radius"
"networking"
"ups"
];
extraConfig = {
services.netbird.enable = true;
services.nginx.enable = true;
networking.firewall.allowedTCPPorts = [ 80 ];
};
root = ./.;
}