config/hosts/vno3-rp3b/configuration.nix

167 lines
3.6 KiB
Nix

# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running `nixos-help`).
{
config,
pkgs,
myData,
...
}:
{
imports = [ ../../modules/profiles/sdcard ];
age.secrets = {
motiejus-passwd-hash.file = ../../secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ../../secrets/root_passwd_hash.age;
sasl-passwd.file = ../../secrets/postfix_sasl_passwd.age;
};
boot = {
initrd = {
availableKernelModules = [ "usbhid" ];
kernelModules = [
"vc4"
"bcm2835_dma"
];
luks.devices = {
luksdata = {
device = "/dev/disk/by-uuid/efa9b396-9ec0-40f7-a0d0-75edc0f6d5ad";
allowDiscards = true;
keyFileOffset = 9728;
keyFileSize = 512;
keyFile = "/dev/mmcblk1";
};
};
};
loader = {
grub.enable = false;
generic-extlinux-compatible.enable = true;
};
kernelModules = [ ];
extraModulePackages = [ ];
};
powerManagement.cpuFreqGovernor = "ondemand";
fileSystems = {
"/" = {
device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
fsType = "ext4";
};
"/data" = {
device = "/dev/mapper/luksdata";
fsType = "btrfs";
options = [ "compress=zstd" ];
};
};
swapDevices = [ ];
mj = {
stateVersion = "23.05";
timeZone = "Europe/Vilnius";
username = "motiejus";
base = {
zfs.enable = true;
users = {
enable = true;
root.hashedPasswordFile = config.age.secrets.root-passwd-hash.path;
user.hashedPasswordFile = config.age.secrets.motiejus-passwd-hash.path;
};
unitstatus = {
enable = true;
email = "motiejus+alerts@jakstys.lt";
};
#snapshot = {
# enable = true;
# mountpoints = [ "/data/shared" ];
#};
};
services = {
printing.enable = true;
tailscale.enable = true;
node_exporter.enable = true;
ping_exporter.enable = true;
#borgstor = {
# enable = true;
# dataDir = "/data/borg";
# sshKeys = with myData; [
# hosts."fwminex.servers.jakst".publicKey
# people_pubkeys.motiejus
# ];
#};
postfix = {
enable = true;
saslPasswdPath = config.age.secrets.sasl-passwd.path;
};
deployerbot = {
follower = {
publicKeys = [ myData.hosts."fwminex.servers.jakst".publicKey ];
enable = true;
sshAllowSubnets = [ myData.subnets.tailscale.sshPattern ];
uidgid = myData.uidgid.updaterbot-deployee;
};
};
#jakstpub = {
# enable = true;
# dataDir = "/data/shared";
# requires = [ "data-shared.mount" ];
# uidgid = myData.uidgid.jakstpub;
# hostname = "hdd.jakstys.lt";
#};
};
};
services = {
chrony.extraConfig = ''
makestep 1 -1
'';
# shared printing
avahi = {
enable = true;
nssmdns4 = true;
openFirewall = true;
publish = {
enable = true;
userServices = true;
};
};
printing = {
openFirewall = true;
allowFrom = [ "all" ];
browsing = true;
defaultShared = true;
};
};
environment.systemPackages = with pkgs; [
raspberrypi-eeprom
libraspberrypi
borgbackup
];
networking = {
hostId = "4bd17751";
hostName = "vno3-rp3b";
domain = "servers.jakst";
dhcpcd.enable = true;
firewall.rejectPackets = true;
};
nixpkgs.hostPlatform = "aarch64-linux";
security.rtkit.enable = true;
}