Compare commits
4 commits
4b8f1589da
...
98715d12e3
| Author | SHA1 | Date | |
|---|---|---|---|
| 98715d12e3 | |||
| 67ca6433cc | |||
| 3b079d142f | |||
| 23ce55d880 |
5 changed files with 25 additions and 4 deletions
|
|
@ -44,6 +44,8 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
users.users."${config.services.crowdsec.user}".extraGroups = [ "adm" ];
|
||||||
|
|
||||||
systemd.tmpfiles.rules = let cfg = config.services.crowdsec;
|
systemd.tmpfiles.rules = let cfg = config.services.crowdsec;
|
||||||
in [ "d /var/lib/crowdsec 0755 ${cfg.user} ${cfg.group}" ];
|
in [ "d /var/lib/crowdsec 0755 ${cfg.user} ${cfg.group}" ];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -155,8 +155,8 @@ in {
|
||||||
networks = [ networks."${user}".ref ];
|
networks = [ networks."${user}".ref ];
|
||||||
publishPorts = [ "127.0.0.1:${port}:${containerPort}" ];
|
publishPorts = [ "127.0.0.1:${port}:${containerPort}" ];
|
||||||
};
|
};
|
||||||
unitConfig.Requires = [ secrets.ref containers."${user}".ref ];
|
unitConfig.Requires = [ secrets.ref containers."${user}-db".ref ];
|
||||||
unitConfig.After = [ secrets.ref containers."${user}".ref ];
|
unitConfig.After = [ secrets.ref containers."${user}-db".ref ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
9
services/openssh.nix
Normal file
9
services/openssh.nix
Normal file
|
|
@ -0,0 +1,9 @@
|
||||||
|
{ ... }: {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -60,6 +60,15 @@ in {
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
services.crowdsec = {
|
||||||
|
localConfig.acquisitions = [{
|
||||||
|
source = "journalctl";
|
||||||
|
journalctl_filter = [ "_SYSTEMD_USER_UNIT=${user}.service" ];
|
||||||
|
labels.type = "bitwarden";
|
||||||
|
}];
|
||||||
|
hub.collections = [ "MariuszKociubinski/bitwarden" ];
|
||||||
|
};
|
||||||
|
|
||||||
users.users."${user}" = {
|
users.users."${user}" = {
|
||||||
group = user;
|
group = user;
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
|
@ -146,8 +155,8 @@ in {
|
||||||
networks = [ networks."${user}".ref ];
|
networks = [ networks."${user}".ref ];
|
||||||
publishPorts = [ "127.0.0.1:${port}:${containerPort}" ];
|
publishPorts = [ "127.0.0.1:${port}:${containerPort}" ];
|
||||||
};
|
};
|
||||||
unitConfig.Requires = [ secrets.ref containers."${user}".ref ];
|
unitConfig.Requires = [ secrets.ref containers."${user}-db".ref ];
|
||||||
unitConfig.After = [ secrets.ref containers."${user}".ref ];
|
unitConfig.After = [ secrets.ref containers."${user}-db".ref ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -12,6 +12,7 @@
|
||||||
./../../services/fireflyiii.nix
|
./../../services/fireflyiii.nix
|
||||||
./../../services/freshrss.nix
|
./../../services/freshrss.nix
|
||||||
./../../services/navidrome.nix
|
./../../services/navidrome.nix
|
||||||
|
./../../services/openssh.nix
|
||||||
./../../services/vaultwarden.nix
|
./../../services/vaultwarden.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue