Loki: disable most services

This commit is contained in:
Filippo Berto 2024-02-18 17:01:19 +01:00
parent ec64668027
commit 83ce3ffa79
No known key found for this signature in database
GPG key ID: FE98AE5EC52B1056

View file

@ -60,29 +60,29 @@ in
time.timeZone = "Europe/Rome"; time.timeZone = "Europe/Rome";
services = { services = {
avahi = { # avahi = {
enable = true; # enable = true;
openFirewall = true; # openFirewall = true;
nssmdns = true; # nssmdns = true;
publish = { # publish = {
enable = true; # enable = true;
addresses = true; # addresses = true;
domain = true; # domain = true;
userServices = true; # userServices = true;
workstation = true; # workstation = true;
}; # };
extraServiceFiles = { # extraServiceFiles = {
ssh = "${pkgs.avahi}/etc/avahi/services/ssh.service"; # ssh = "${pkgs.avahi}/etc/avahi/services/ssh.service";
}; # };
}; # };
# bazarr = { enable = true; openFirewall = true; group = "users"; }; # bazarr = { enable = true; openFirewall = true; group = "users"; };
blueman.enable = true; blueman.enable = true;
dbus = { packages = [ pkgs.dconf ]; implementation = "broker"; }; dbus = { packages = [ pkgs.dconf ]; implementation = "broker"; };
# esphome = { enable = true; openFirewall = true; }; # esphome = { enable = true; openFirewall = true; };
fail2ban = { enable = true; bantime-increment.enable = true; }; # fail2ban = { enable = true; bantime-increment.enable = true; };
gnome.gnome-keyring.enable = true; gnome.gnome-keyring.enable = true;
gvfs.enable = true; gvfs.enable = true;
jackett = { enable = true; openFirewall = true; group = "users"; }; # jackett = { enable = true; openFirewall = true; group = "users"; };
jellyfin = { enable = true; openFirewall = true; group = "users"; }; jellyfin = { enable = true; openFirewall = true; group = "users"; };
logind.lidSwitch = "ignore"; logind.lidSwitch = "ignore";
# node-red = { enable = true; openFirewall = true; withNpmAndGcc = true; }; # node-red = { enable = true; openFirewall = true; withNpmAndGcc = true; };
@ -91,7 +91,7 @@ in
power-profiles-daemon.enable = true; power-profiles-daemon.enable = true;
# prowlarr = { enable = true; openFirewall = true; }; # prowlarr = { enable = true; openFirewall = true; };
# radarr = { enable = true; openFirewall = true; group = "users"; }; # radarr = { enable = true; openFirewall = true; group = "users"; };
samba-wsdd = { enable = true; discovery = true; }; # samba-wsdd = { enable = true; discovery = true; };
# samba = { # samba = {
# enable = true; # enable = true;
# enableNmbd = true; # enableNmbd = true;
@ -248,15 +248,15 @@ in
podman.enable = true; podman.enable = true;
# virtualbox.host.enable = true; # virtualbox.host.enable = true;
oci-containers.containers = { # oci-containers.containers = {
doods2 = { # doods2 = {
image = "docker.io/snowzach/doods2:latest"; # image = "docker.io/snowzach/doods2:latest";
# environment = { TZ = "Europe/Rome"; }; # # environment = { TZ = "Europe/Rome"; };
extraOptions = [ "--pull=always" ]; # extraOptions = [ "--pull=always" ];
ports = [ "127.0.0.1:8080:8080" ]; # ports = [ "127.0.0.1:8080:8080" ];
# volumes = [ "/var/lib/hass:/config" "/mnt/raid0/condiviso:/media" ]; # # volumes = [ "/var/lib/hass:/config" "/mnt/raid0/condiviso:/media" ];
}; # };
}; # };
}; };