config/hosts/fwminex/configuration.nix

142 lines
3.1 KiB
Nix
Raw Normal View History

2023-09-13 12:17:43 +03:00
{
pkgs,
2023-09-13 12:17:43 +03:00
config,
myData,
...
2024-04-12 22:13:34 +03:00
}: {
imports = [
../../modules/profiles/autorandr
];
2023-11-28 22:57:58 +02:00
boot = {
2024-03-01 10:31:42 +02:00
initrd.availableKernelModules = ["usb_storage" "sd_mod" "xhci_pci" "thunderbolt" "nvme" "usbhid"];
kernelPackages = pkgs.zfs.latestCompatibleLinuxPackages;
2023-11-28 22:57:58 +02:00
loader.systemd-boot.enable = true;
supportedFilesystems = ["zfs"];
zfs = {
forceImportRoot = false;
devNodes = "/dev/disk/by-id/";
};
};
fileSystems = {
"/" = {
device = "rpool/nixos/root";
fsType = "zfs";
};
"/boot" = {
device = "/dev/disk/by-id/nvme-Samsung_SSD_970_EVO_Plus_2TB_S6P1NS0TA01331A_1-part2";
fsType = "vfat";
};
"/home" = {
device = "rpool/nixos/home";
fsType = "zfs";
};
"/nix" = {
device = "rpool/nixos/nix";
fsType = "zfs";
};
"/var/lib" = {
device = "rpool/nixos/var/lib";
fsType = "zfs";
};
"/var/log" = {
device = "rpool/nixos/var/log";
fsType = "zfs";
2023-09-13 12:17:43 +03:00
};
};
2023-09-14 12:40:16 +03:00
hardware.cpu.intel.updateMicrocode = true;
nixpkgs.hostPlatform = "x86_64-linux";
2023-09-13 12:17:43 +03:00
boot.binfmt.emulatedSystems = ["aarch64-linux"];
2023-09-14 15:26:16 +03:00
systemd.services.zfs-mount.enable = false;
2023-09-13 12:17:43 +03:00
mj = {
stateVersion = "23.05";
timeZone = "Europe/Vilnius";
username = "motiejus";
2023-09-13 12:17:43 +03:00
base = {
zfs.enable = true;
users = {
2024-02-04 16:18:47 +02:00
enable = true;
2024-02-04 22:05:44 +02:00
devTools = true;
root.hashedPasswordFile = config.age.secrets.root-passwd-hash.path;
user.hashedPasswordFile = config.age.secrets.motiejus-passwd-hash.path;
2023-09-13 12:17:43 +03:00
};
snapshot = {
enable = true;
mountpoints = ["/home" "/var/lib" "/var/log"];
};
unitstatus = {
enable = true;
email = "motiejus+alerts@jakstys.lt";
};
};
services = {
sshguard.enable = false;
2023-11-15 00:29:22 +02:00
tailscale = {
enable = true;
verboseLogs = true;
};
2023-09-18 19:29:27 +03:00
node_exporter = {
enable = true;
extraSubnets = [myData.subnets.vno1.cidr];
};
2023-09-13 12:17:43 +03:00
deployerbot = {
follower = {
inherit (myData.hosts."vno1-oh2.servers.jakst") publicKey;
2023-10-01 23:14:05 +03:00
2023-09-13 12:17:43 +03:00
enable = true;
uidgid = myData.uidgid.updaterbot-deployee;
sshAllowSubnets = with myData.subnets; [tailscale.sshPattern];
2023-09-13 12:17:43 +03:00
};
};
2023-09-15 13:23:52 +03:00
postfix = {
enable = true;
saslPasswdPath = config.age.secrets.sasl-passwd.path;
};
2023-09-13 12:17:43 +03:00
syncthing = {
2023-09-18 11:55:09 +03:00
enable = true;
2023-09-13 12:17:43 +03:00
dataDir = "/home/motiejus/";
user = "motiejus";
group = "users";
};
2024-02-27 22:56:09 +02:00
remote-builder.client = let
host = myData.hosts."fra1-a.servers.jakst";
in {
enable = true;
inherit (host) system supportedFeatures;
hostName = host.jakstIP;
sshKey = "/etc/ssh/ssh_host_ed25519_key";
};
2023-09-13 12:17:43 +03:00
};
};
2024-04-26 19:29:20 +03:00
programs.mepo.enable = true;
2024-02-16 18:09:59 +02:00
virtualisation.virtualbox.host.enable = true;
users.extraGroups.vboxusers.members = ["motiejus"];
2024-04-10 01:49:31 +03:00
environment.systemPackages = with pkgs; [
tesseract
];
2023-09-13 12:17:43 +03:00
networking = {
2023-09-13 14:46:58 +03:00
hostId = "3a54afcd";
2023-09-13 12:17:43 +03:00
hostName = "fwminex";
domain = "motiejus.jakst";
2023-09-22 09:58:09 +03:00
firewall.rejectPackets = true;
2023-09-13 12:17:43 +03:00
};
}