mirror of https://gitlab.com/curben/blog
post: update nixos config syntax to 20.03
- 'loaOf' type has been deprecated, in favour of 'attrsOf' - https://nixos.org/nixos/manual/release-notes.html#sec-release-20.03
This commit is contained in:
parent
bd2391427b
commit
6a4a361b67
|
@ -2,6 +2,7 @@
|
|||
title: "Setup Caddy as a reverse proxy on NixOS (Part 1: Installation)"
|
||||
excerpt: "Part 1: Installing NixOS"
|
||||
date: 2020-02-23
|
||||
lastUpdated: 2020-04-22
|
||||
tags:
|
||||
- web
|
||||
- linux
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: "Setup Caddy as a reverse proxy on NixOS (Part 2: Hardening)"
|
||||
excerpt: "Part 2: Securing NixOS"
|
||||
date: 2020-03-04
|
||||
lastUpdated: 2020-03-23
|
||||
lastUpdated: 2020-04-22
|
||||
tags:
|
||||
- web
|
||||
- linux
|
||||
|
@ -148,16 +148,10 @@ Once the secret is generated, TOTP can be enabled using the following config. I
|
|||
|
||||
``` js
|
||||
## Requires OTP to login & sudo
|
||||
security.pam.services = [
|
||||
{
|
||||
name = "login";
|
||||
googleAuthenticator.enable = true;
|
||||
}
|
||||
{
|
||||
name = "sudo";
|
||||
googleAuthenticator.enable = true;
|
||||
}
|
||||
];
|
||||
security.pam = {
|
||||
services.login.googleAuthenticator.enable = true;
|
||||
services.sudo.googleAuthenticator.enable = true;
|
||||
};
|
||||
```
|
||||
|
||||
## DNS-over-TLS
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
title: "How to make your website available over I2P Eepsite on NixOS"
|
||||
excerpt: "A guide on I2P Eepsite on NixOS"
|
||||
date: 2020-03-21
|
||||
lastUpdated: 2020-04-22
|
||||
tags:
|
||||
- web
|
||||
- linux
|
||||
|
@ -39,8 +40,7 @@ To join the I2P network, I'm using [i2pd](https://i2pd.website/), an (unofficial
|
|||
enable = true;
|
||||
ifname = "ens3";
|
||||
address = "xxxx";
|
||||
inTunnels = [{
|
||||
name = "myEep";
|
||||
inTunnels.myEep = {
|
||||
enable = true;
|
||||
keys = "myEep-keys.dat";
|
||||
inPort = 80;
|
||||
|
@ -49,7 +49,7 @@ To join the I2P network, I'm using [i2pd](https://i2pd.website/), an (unofficial
|
|||
port = 8081;
|
||||
# inbound.length = 1;
|
||||
# outbound.length = 1;
|
||||
}];
|
||||
};
|
||||
enableIPv4 = false;
|
||||
enableIPv6 = true;
|
||||
};
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
title: "How to make your website available over Tor hidden service on NixOS"
|
||||
excerpt: "A guide on Tor hidden service on NixOS"
|
||||
date: 2020-03-16
|
||||
lastUpdated: 2020-04-22
|
||||
tags:
|
||||
- web
|
||||
- linux
|
||||
|
@ -36,8 +37,7 @@ The first step is to bring up a Tor hidden service to get an onion address. Add
|
|||
services.tor = {
|
||||
enable = true;
|
||||
enableGeoIP = false;
|
||||
hiddenServices = [{
|
||||
name = "myOnion";
|
||||
hiddenServices.myOnion = {
|
||||
version = 3;
|
||||
map = [
|
||||
{
|
||||
|
@ -46,7 +46,7 @@ The first step is to bring up a Tor hidden service to get an onion address. Add
|
|||
toPort = "8080";
|
||||
}
|
||||
];
|
||||
}];
|
||||
};
|
||||
extraConfig =
|
||||
''
|
||||
ClientUseIPv4 0
|
||||
|
|
Loading…
Reference in New Issue