aboutsummaryrefslogtreecommitdiff
path: root/modules/private/system/backup-2.nix
diff options
context:
space:
mode:
Diffstat (limited to 'modules/private/system/backup-2.nix')
-rw-r--r--modules/private/system/backup-2.nix20
1 files changed, 9 insertions, 11 deletions
diff --git a/modules/private/system/backup-2.nix b/modules/private/system/backup-2.nix
index a49c374..d1064c7 100644
--- a/modules/private/system/backup-2.nix
+++ b/modules/private/system/backup-2.nix
@@ -1,26 +1,22 @@
1{ privateFiles }: 1{ privateFiles }:
2{ config, pkgs, resources, name, ... }: 2{ config, pkgs, resources, name, ... }:
3{ 3{
4 deployment = {
5 targetUser = "root";
6 targetHost = config.hostEnv.ips.main.ip4;
7 substituteOnDestination = true;
8 };
4 boot.kernelPackages = pkgs.linuxPackages_latest; 9 boot.kernelPackages = pkgs.linuxPackages_latest;
5 myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; 10 myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; };
6 11
7 imports = builtins.attrValues (import ../..); 12 imports = [ <nixpkgs/nixos/modules/profiles/qemu-guest.nix> ] ++ builtins.attrValues (import ../..);
8
9 deployment = {
10 targetEnv = "hetznerCloud";
11 hetznerCloud = {
12 authToken = config.myEnv.hetznerCloud.authToken;
13 datacenter = "hel1-dc2";
14 location ="hel1";
15 serverType = "cx11";
16 };
17 };
18 13
19 fileSystems = { 14 fileSystems = {
20 "/backup2" = { 15 "/backup2" = {
21 fsType = "ext4"; 16 fsType = "ext4";
22 device = "UUID=b9425333-f567-435d-94d8-b26c22d93426"; 17 device = "UUID=b9425333-f567-435d-94d8-b26c22d93426";
23 }; 18 };
19 "/" = { device = "/dev/sda1"; fsType = "ext4"; };
24 }; 20 };
25 21
26 networking = { 22 networking = {
@@ -34,6 +30,8 @@
34 defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; 30 defaultGateway6 = { address = "fe80::1"; interface = "ens3"; };
35 }; 31 };
36 32
33 boot.loader.grub.device = "nodev";
34
37 myServices.certificates.enable = true; 35 myServices.certificates.enable = true;
38 security.acme.certs."${name}" = { 36 security.acme.certs."${name}" = {
39 user = config.services.nginx.user; 37 user = config.services.nginx.user;