dotfiles/systems/x86_64-linux/node/default.nix

156 lines
3.8 KiB
Nix
Raw Permalink Normal View History

2023-04-07 03:12:43 +00:00
{
config,
pkgs,
2024-03-02 16:23:27 +00:00
lib,
2023-04-07 03:12:43 +00:00
...
}: {
imports = [
./hardware-configuration.nix
./zfs.nix
];
2024-02-06 04:20:02 +00:00
age.secrets = {
cf_dns_kilonull.file = ../../../secrets/cf_dns_kilonull.age;
teslamate_db.file = ../../../secrets/teslamate_db.age;
};
2023-04-07 03:12:43 +00:00
aa = {
2023-07-09 15:24:54 +00:00
nix.enable = true;
2023-04-09 02:13:00 +00:00
nix.useSelfhostedCache = true;
2023-04-07 03:12:43 +00:00
2023-07-09 15:24:54 +00:00
services.tailscale = {
enable = true;
configureClientRouting = true;
configureServerRouting = true;
};
2023-04-07 03:12:43 +00:00
services.openssh.enable = true;
services.adguardhome = {
enable = true;
acmeCertName = "kilonull.com";
};
services.nextcloud = {
enable = true;
2023-09-08 02:37:05 +00:00
acmeCertName = "kilonull.com";
};
services.grafana = {
enable = true;
2023-09-08 03:21:46 +00:00
acmeCertName = "kilonull.com";
};
services.prometheus = {
enable = true;
2023-09-10 16:20:11 +00:00
enableServer = true;
};
services.loki.enable = true;
services.promtail.enable = true;
2024-02-06 04:20:02 +00:00
services.teslamate = {
enable = true;
database = {
createDatabase = true;
passwordFile = config.age.secrets.teslamate_db.path;
};
acmeCertName = "kilonull.com";
};
2023-11-20 16:09:13 +00:00
2023-11-19 16:27:18 +00:00
services.homeassistant = {
enable = true;
acmeCertName = "kilonull.com";
};
2024-03-10 21:28:44 +00:00
services.minio = {
enable = true;
acmeCertName = "kilonull.com";
};
security.acme = {
enable = true;
domainName = "kilonull.com";
dnsCredentialsFile = config.age.secrets.cf_dns_kilonull.path;
};
2023-07-09 15:24:54 +00:00
2023-04-07 03:12:43 +00:00
system.zfs.enable = true;
system.monitoring.enable = true;
suites.utils.enable = true;
apps.yubikey.enable = true;
2023-04-07 03:12:43 +00:00
};
# Rewrite specific to this machine (didn't want to put this in my adguardhome
# module incase I want to reuse it for something else later)
services.adguardhome.settings.filtering.rewrites = [
{
domain = "octoprint.kilonull.com";
answer = "192.168.113.42";
}
{
domain = "hydra.kilonull.com";
answer = "192.168.113.69";
}
{
domain = "cache.kilonull.com";
answer = "192.168.113.69";
}
{
domain = "*.kilonull.com";
answer = "192.168.113.13";
}
];
security.pam.sshAgentAuth = {
enable = true;
# Addresses issue 31611
# See: https://github.com/NixOS/nixpkgs/issues/31611
authorizedKeysFiles = lib.mkForce ["/etc/ssh/authorized_keys.d/%u"];
};
security.pam.services.${config.aa.user.name}.sshAgentAuth = true;
2023-04-07 03:12:43 +00:00
boot.loader.systemd-boot.enable = true;
security.sudo = {
wheelNeedsPassword = false;
execWheelOnly = true;
};
2023-07-09 15:24:54 +00:00
networking = {
hostName = "node";
useDHCP = false;
defaultGateway = "192.168.113.1";
nameservers = ["127.0.0.1" "1.1.1.1"];
interfaces.enp7s0.ipv4.addresses = [
{
address = "192.168.113.13";
prefixLength = 24;
}
];
};
2024-03-02 16:23:27 +00:00
# Running own DNS resolver on same system. This prevents DNS issues with ACME
systemd.services = let
dependency = ["adguardhome.service"];
in
lib.mapAttrs'
(name: _:
lib.nameValuePair "acme-${name}" {
after = dependency;
preStart = ''
sleep 10
'';
})
config.security.acme.certs;
2023-04-07 03:12:43 +00:00
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
wget
];
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "22.11"; # Did you read the comment?
}