{ inputs, ... }:
{
system = "x86_64-linux";
-extraArgs = rec {
- CPUs = 4;
- ipv4 = "80.67.180.129";
- wireguard = rec {
- wg-intra = {
- ipv4 = "192.168.42.1";
- listenPort = 43642;
- persistentKeepalive = null;
- peer = {
- publicKey = "XbTEP2X71LBTjmdmySdiOpQJ+uIomcXvg1aiQGUtWBI=";
- allowedIPs = [ "${wg-intra.ipv4}/32" ];
- endpoint = "${ipv4}:${toString wg-intra.listenPort}";
- };
- };
- };
-};
modules = [
+ {
+ config._module.args = {
+ CPUs = 4;
+ ipv4 = "80.67.180.129";
+ };
+ }
../nixos/defaults.nix
+ ../nixos/profiles/systems/debug.nix
mermet/acme.nix
mermet/croc.nix
mermet/coturn.nix
- mermet/debug.nix
mermet/dovecot.nix
mermet/fail2ban.nix
mermet/fileSystems.nix
mermet/gitolite.nix
mermet/hardware.nix
mermet/knot.nix
+ mermet/iodine.nix
+ mermet/miniflux.nix
#mermet/mlmmj.nix
mermet/murmur.nix
mermet/networking.nix
mermet/nginx.nix
mermet/openldap.nix
mermet/postfix.nix
+ mermet/postgresql.nix
mermet/prosody.nix
- (inputs.secrets + "/hosts/mermet/prosody.nix")
mermet/public-inbox.nix
- mermet/redis.nix
mermet/rspamd.nix
mermet/sanoid.nix
mermet/security.nix
+ #mermet/sourcehut.nix
mermet/system.nix
mermet/unbound.nix
mermet/users.nix