{ self, caddy-with-plugins, ... }: { modulesPath, pkgs, config, ... }: { imports = [ (modulesPath + "/virtualisation/lxc-container.nix") ../../users/root ../../users/erwin ./backup.nix ./miniflux ]; eboskma = { users.erwin = { enable = true; server = true; }; nix-common = { enable = true; remote-builders = true; }; caddy-proxy = { enable = true; package = caddy-with-plugins.packages.${pkgs.system}.caddy-with-cloudflare; proxyHosts = [ { externalHostname = "read.datarift.nl"; proxyAddress = "http://${config.services.miniflux.config.LISTEN_ADDR}"; } ]; }; tailscale.enable = true; }; boot = { isContainer = true; kernel.sysctl = { "net.core.rmem_max" = 7500000; "net.core.wmem_max" = 7500000; }; }; time.timeZone = "Europe/Amsterdam"; system.configurationRevision = self.inputs.nixpkgs.lib.mkIf (self ? rev) self.rev; networking = { hostName = "read"; useDHCP = false; useHostResolvConf = false; networkmanager.enable = false; useNetworkd = true; nftables.enable = true; firewall.trustedInterfaces = [ "tailscale0" ]; }; systemd = { services.logrotate-checkconf.enable = false; network = { enable = true; wait-online.anyInterface = true; networks = { "40-eth0" = { matchConfig = { Name = "eth0"; }; networkConfig = { Address = "10.0.0.207/24"; Gateway = "10.0.0.1"; DNS = "10.0.0.206"; DHCP = "no"; }; }; }; }; }; security = { sudo-rs = { enable = true; execWheelOnly = true; wheelNeedsPassword = false; }; sudo.enable = false; }; sops.defaultSopsFile = ./secrets.yaml; sops.secrets = { caddy-env = { }; miniflux-env = { }; miniflux-backup-ssh-key = { }; miniflux-backup-pass = { }; }; system.stateVersion = "24.11"; }