323 lines
8.9 KiB
Nix
323 lines
8.9 KiB
Nix
# Edit this configuration file to define what should be installed on
|
||
# your system. Help is available in the configuration.nix(5) man page, on
|
||
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
|
||
|
||
{ modulesPath, pkgs, inputs, lib, nix-colors, config, ... }:
|
||
{
|
||
imports =
|
||
[
|
||
# Include the results of the hardware scan.
|
||
./hardware-configuration.nix
|
||
inputs.home-manager.nixosModules.default
|
||
./disk-config.nix
|
||
(modulesPath + "/installer/scan/not-detected.nix")
|
||
(modulesPath + "/profiles/qemu-guest.nix")
|
||
|
||
../../common
|
||
];
|
||
|
||
# LOVE me some blob
|
||
hardware.enableRedistributableFirmware = true;
|
||
hardware.enableAllFirmware = true;
|
||
|
||
networking = {
|
||
hostName = "nuOS"; # Define your hostname.
|
||
networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
||
};
|
||
# Pick only one of the below networking options.
|
||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||
|
||
# Set your time zone.
|
||
time.timeZone = "Europe/Amsterdam";
|
||
|
||
# Configure network proxy if necessary
|
||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||
|
||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||
users.defaultUserShell = pkgs.zsh;
|
||
users.users = {
|
||
noa = {
|
||
isNormalUser = true;
|
||
extraGroups = [ "networkmanager" "wheel" "docker" "libvirt" ];
|
||
hashedPassword = "$6$rounds=512400$g/s4dcRttXi4ux6c$Z6pKnhJXcWxv0TBSMtvJu5.piETdUBSgBVN7oDPKiQV.lbTYz1r.0XQLwMYxzcvaaX0DL6Iw/SEUTiC2M50wC/";
|
||
openssh.authorizedKeys.keys = import ../../common/ssh-keys.nix;
|
||
};
|
||
};
|
||
|
||
# Allow unfree packages
|
||
nixpkgs.config.allowUnfree = true;
|
||
|
||
# List packages installed in system profile. To search, run:
|
||
# $ nix search wget
|
||
environment = {
|
||
systemPackages = with pkgs; [
|
||
sddm
|
||
git
|
||
zsh
|
||
];
|
||
};
|
||
|
||
# Some programs need SUID wrappers, can be configured further or are
|
||
# started in user sessions.
|
||
# programs.mtr.enable = true;
|
||
# programs.gnupg.agent = {
|
||
# enable = true;
|
||
# enableSSHSupport = true;
|
||
# };
|
||
|
||
|
||
programs.zsh.enable = true;
|
||
|
||
home-manager = {
|
||
extraSpecialArgs = {
|
||
inherit inputs;
|
||
inherit nix-colors;
|
||
};
|
||
users = {
|
||
"noa" = import ./home.nix;
|
||
"root" = import ./root.nix;
|
||
};
|
||
};
|
||
|
||
systemd.timers."update-from-flake" = {
|
||
wantedBy = [ "timers.target" ];
|
||
timerConfig = {
|
||
OnCalendar = "daily";
|
||
Persistent = true;
|
||
};
|
||
};
|
||
|
||
nix = {
|
||
settings = {
|
||
builders-use-substitutes = true;
|
||
};
|
||
};
|
||
|
||
systemd.services."update-from-flake" = {
|
||
path = with pkgs; [
|
||
nixos-rebuild
|
||
git
|
||
];
|
||
script = ''nixos-rebuild switch --flake github:itepastra/nixconf#nuOS'';
|
||
serviceConfig = {
|
||
Type = "oneshot";
|
||
User = "root";
|
||
};
|
||
wants = [
|
||
"network-online.target"
|
||
];
|
||
after = [
|
||
"network-online.target"
|
||
];
|
||
};
|
||
|
||
virtualisation = {
|
||
docker = {
|
||
enable = true;
|
||
};
|
||
libvirtd = {
|
||
enable = true;
|
||
qemu = {
|
||
package = pkgs.qemu_kvm;
|
||
runAsRoot = true;
|
||
swtpm.enable = true;
|
||
ovmf = {
|
||
enable = true;
|
||
packages = [
|
||
(pkgs.OVMF.override {
|
||
secureBoot = true;
|
||
tpmSupport = true;
|
||
}).fd
|
||
];
|
||
};
|
||
};
|
||
};
|
||
};
|
||
|
||
age = {
|
||
identityPaths = [ "${config.users.users.noa.home}/.ssh/id_ed25519" ];
|
||
secrets = {
|
||
"secrets/token-flurry".file = ../../secrets/github/flurry.age;
|
||
"secrets/token-nixconf".file = ../../secrets/github/nixconf.age;
|
||
"secrets/nix-store-key".file = ../../secrets/nix-serve/private.age;
|
||
"secrets/radicale".file = ../../secrets/radicale/htpasswd.age;
|
||
};
|
||
};
|
||
|
||
services = {
|
||
nix-serve = {
|
||
enable = true;
|
||
package = pkgs.nix-serve-ng;
|
||
secretKeyFile = config.age.secrets."secrets/nix-store-key".path;
|
||
port = 22332;
|
||
};
|
||
github-runners = {
|
||
flurry-runner = {
|
||
enable = true;
|
||
extraPackages = with pkgs;[
|
||
nodejs
|
||
curl
|
||
];
|
||
name = "flurry-runner";
|
||
tokenFile = config.age.secrets."secrets/token-flurry".path;
|
||
url = "https://github.com/itepastra/flurry";
|
||
};
|
||
};
|
||
openssh = {
|
||
enable = true;
|
||
settings.PasswordAuthentication = false;
|
||
settings.KbdInteractiveAuthentication = false;
|
||
};
|
||
radicale = {
|
||
enable = true;
|
||
settings = {
|
||
server.hosts = [ "[::1]:29341" ];
|
||
auth = {
|
||
type = "htpasswd";
|
||
htpasswd_filename = config.age.secrets."secrets/radicale".path;
|
||
htpasswd_encryption = "bcrypt";
|
||
};
|
||
};
|
||
};
|
||
nginx =
|
||
let
|
||
|
||
extra = ''
|
||
client_max_body_size 50000M;
|
||
|
||
proxy_redirect off;
|
||
|
||
proxy_read_timeout 600s;
|
||
proxy_send_timeout 600s;
|
||
send_timeout 600s;'';
|
||
proxy = name: url: {
|
||
forceSSL = true;
|
||
useACMEHost = name;
|
||
extraConfig = extra;
|
||
locations."/" = {
|
||
proxyWebsockets = true;
|
||
proxyPass = url;
|
||
};
|
||
};
|
||
in
|
||
{
|
||
enable = true;
|
||
package = pkgs.nginx.override {
|
||
modules = [ pkgs.nginxModules.brotli ];
|
||
};
|
||
|
||
|
||
recommendedOptimisation = true;
|
||
recommendedProxySettings = true;
|
||
recommendedTlsSettings = true;
|
||
recommendedBrotliSettings = true;
|
||
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
|
||
|
||
virtualHosts = {
|
||
"noa.voorwaarts.nl" = {
|
||
forceSSL = true;
|
||
enableACME = true;
|
||
extraConfig = extra;
|
||
locations."/" = {
|
||
proxyWebsockets = true;
|
||
proxyPass = "http://192.168.42.5:8000";
|
||
};
|
||
};
|
||
|
||
"images.noa.voorwaarts.nl" = proxy "noa.voorwaarts.nl" "http://192.168.42.5:2283/";
|
||
"maintenance.noa.voorwaarts.nl" = proxy "noa.voorwaarts.nl" "http://192.168.42.5:5000/";
|
||
"map.noa.voorwaarts.nl" = proxy "noa.voorwaarts.nl" "http://127.0.0.1:8123/";
|
||
|
||
"fete.voorwaarts.nl" = {
|
||
forceSSL = true;
|
||
enableACME = true;
|
||
extraConfig = extra;
|
||
locations."/" = {
|
||
proxyWebsockets = true;
|
||
proxyPass = "http://[::1]:22000";
|
||
};
|
||
};
|
||
|
||
"itepastra.nl" = {
|
||
forceSSL = true;
|
||
enableACME = true;
|
||
extraConfig = extra;
|
||
locations."/" = {
|
||
proxyWebsockets = true;
|
||
proxyPass = "http://192.168.42.5:9001/";
|
||
};
|
||
};
|
||
|
||
"calendar.itepastra.nl" = proxy "itepastra.nl" "http://[::1]:29341";
|
||
"cache.itepastra.nl" = proxy "itepastra.nl" "http://127.0.0.1:22332";
|
||
};
|
||
};
|
||
};
|
||
|
||
|
||
security.acme = {
|
||
acceptTerms = true;
|
||
defaults.email = "noa@voorwaarts.nl";
|
||
certs = {
|
||
"noa.voorwaarts.nl".extraDomainNames = [
|
||
"images.noa.voorwaarts.nl"
|
||
"maintenance.noa.voorwaarts.nl"
|
||
"map.noa.voorwaarts.nl"
|
||
];
|
||
"itepastra.nl".extraDomainNames = [
|
||
"locked.itepastra.nl"
|
||
"calendar.itepastra.nl"
|
||
"cache.itepastra.nl"
|
||
];
|
||
};
|
||
};
|
||
|
||
# Open ports in the firewall.
|
||
networking.firewall.allowedTCPPorts = [
|
||
22 # ssh
|
||
80 # http
|
||
443 # https
|
||
9212 # hydra
|
||
|
||
25565 # minecraft
|
||
24454 # minecraft (voice)
|
||
|
||
22000 # syncthing
|
||
];
|
||
networking.firewall.allowedUDPPorts = [
|
||
22 # ssh
|
||
80 # http
|
||
443 # https
|
||
|
||
22000 # syncthing
|
||
21027 # syncthing
|
||
];
|
||
# Or disable the firewall altogether.
|
||
# networking.firewall.enable = false;
|
||
|
||
# Copy the NixOS configuration file and link it from the resulting system
|
||
# (/run/current-system/configuration.nix). This is useful in case you
|
||
# accidentally delete configuration.nix.
|
||
# system.copySystemConfiguration = true;
|
||
|
||
# This option defines the first version of NixOS you have installed on this particular machine,
|
||
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
|
||
#
|
||
# Most users should NEVER change this value after the initial install, for any reason,
|
||
# even if you've upgraded your system to a new NixOS release.
|
||
#
|
||
# This value does NOT affect the Nixpkgs version your packages and OS are pulled from,
|
||
# so changing it will NOT upgrade your system - see https://nixos.org/manual/nixos/stable/#sec-upgrading for how
|
||
# to actually do that.
|
||
#
|
||
# This value being lower than the current NixOS release does NOT mean your system is
|
||
# out of date, out of support, or vulnerable.
|
||
#
|
||
# Do NOT change this value unless you have manually inspected all the changes it would make to your configuration,
|
||
# and migrated your data accordingly.
|
||
#
|
||
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
|
||
system.stateVersion = "24.05"; # Did you read the comment?
|
||
|
||
}
|