2023-04-07 03:12:43 +00:00
|
|
|
|
{
|
|
|
|
|
config,
|
|
|
|
|
pkgs,
|
2024-03-02 16:23:27 +00:00
|
|
|
|
lib,
|
2023-04-07 03:12:43 +00:00
|
|
|
|
...
|
|
|
|
|
}: {
|
|
|
|
|
imports = [
|
|
|
|
|
./hardware-configuration.nix
|
|
|
|
|
./zfs.nix
|
|
|
|
|
];
|
|
|
|
|
|
2024-02-06 04:20:02 +00:00
|
|
|
|
age.secrets = {
|
|
|
|
|
cf_dns_kilonull.file = ../../../secrets/cf_dns_kilonull.age;
|
|
|
|
|
teslamate_db.file = ../../../secrets/teslamate_db.age;
|
|
|
|
|
};
|
2023-07-16 17:53:02 +00:00
|
|
|
|
|
2023-04-07 03:12:43 +00:00
|
|
|
|
aa = {
|
2023-07-09 15:24:54 +00:00
|
|
|
|
nix.enable = true;
|
2023-04-09 02:13:00 +00:00
|
|
|
|
nix.useSelfhostedCache = true;
|
2023-04-07 03:12:43 +00:00
|
|
|
|
|
2023-09-08 02:37:05 +00:00
|
|
|
|
apps.tmux.enable = true;
|
|
|
|
|
|
2023-07-09 15:24:54 +00:00
|
|
|
|
services.tailscale = {
|
|
|
|
|
enable = true;
|
|
|
|
|
configureClientRouting = true;
|
|
|
|
|
configureServerRouting = true;
|
|
|
|
|
};
|
2023-04-07 03:12:43 +00:00
|
|
|
|
services.openssh.enable = true;
|
2023-07-16 17:53:02 +00:00
|
|
|
|
services.adguardhome = {
|
|
|
|
|
enable = true;
|
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
|
|
|
|
services.nextcloud = {
|
|
|
|
|
enable = true;
|
2023-09-08 02:37:05 +00:00
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
|
|
|
|
services.grafana = {
|
|
|
|
|
enable = true;
|
2023-09-08 03:21:46 +00:00
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
|
|
|
|
services.prometheus = {
|
|
|
|
|
enable = true;
|
2023-09-10 16:20:11 +00:00
|
|
|
|
enableServer = true;
|
2023-09-08 05:51:38 +00:00
|
|
|
|
};
|
2023-09-10 17:08:17 +00:00
|
|
|
|
services.loki.enable = true;
|
|
|
|
|
services.promtail.enable = true;
|
2023-08-04 00:21:58 +00:00
|
|
|
|
services.syncoid = {
|
|
|
|
|
# sudo -u backups zfs create -o mountpoint=/tank/backups/gospel tank/backups/gospel
|
|
|
|
|
enable = true;
|
|
|
|
|
remoteTargetUser = "backups";
|
|
|
|
|
remoteTargetDatasets = ["tank/backups"];
|
|
|
|
|
remoteTargetPublicKeys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAhA+9O2OBMDH1Xnj6isu36df5TOdZG8aEA4JpN2K60e syncoid@gospel"];
|
|
|
|
|
};
|
2024-02-06 04:20:02 +00:00
|
|
|
|
services.teslamate = {
|
|
|
|
|
enable = true;
|
|
|
|
|
database = {
|
|
|
|
|
createDatabase = true;
|
|
|
|
|
passwordFile = config.age.secrets.teslamate_db.path;
|
|
|
|
|
};
|
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
2023-11-20 16:09:13 +00:00
|
|
|
|
services.gitea = {
|
|
|
|
|
enable = true;
|
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
|
|
|
|
|
2023-11-19 16:27:18 +00:00
|
|
|
|
services.homeassistant = {
|
|
|
|
|
enable = true;
|
|
|
|
|
acmeCertName = "kilonull.com";
|
|
|
|
|
};
|
2023-07-16 17:53:02 +00:00
|
|
|
|
|
|
|
|
|
security.acme = {
|
|
|
|
|
enable = true;
|
|
|
|
|
domainName = "kilonull.com";
|
|
|
|
|
dnsCredentialsFile = config.age.secrets.cf_dns_kilonull.path;
|
|
|
|
|
};
|
2023-07-09 15:24:54 +00:00
|
|
|
|
|
2023-04-07 03:12:43 +00:00
|
|
|
|
system.zfs.enable = true;
|
|
|
|
|
system.monitoring.enable = true;
|
2023-04-16 17:07:42 +00:00
|
|
|
|
|
|
|
|
|
suites.utils.enable = true;
|
|
|
|
|
|
|
|
|
|
tools.zsh.enable = true;
|
|
|
|
|
tools.gpg.enable = true;
|
|
|
|
|
apps.yubikey.enable = true;
|
2023-04-07 03:12:43 +00:00
|
|
|
|
};
|
|
|
|
|
|
2024-03-02 16:47:05 +00:00
|
|
|
|
security.pam.sshAgentAuth = {
|
|
|
|
|
enable = true;
|
|
|
|
|
# Addresses issue 31611
|
|
|
|
|
# See: https://github.com/NixOS/nixpkgs/issues/31611
|
|
|
|
|
authorizedKeysFiles = lib.mkForce ["/etc/ssh/authorized_keys.d/%u"];
|
|
|
|
|
};
|
2023-04-16 17:07:42 +00:00
|
|
|
|
security.pam.services.${config.aa.user.name}.sshAgentAuth = true;
|
|
|
|
|
|
2023-04-07 03:12:43 +00:00
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
|
|
2023-04-16 17:07:42 +00:00
|
|
|
|
security.sudo = {
|
|
|
|
|
wheelNeedsPassword = false;
|
|
|
|
|
execWheelOnly = true;
|
|
|
|
|
};
|
|
|
|
|
|
2023-07-09 15:24:54 +00:00
|
|
|
|
networking = {
|
|
|
|
|
hostName = "node";
|
|
|
|
|
useDHCP = false;
|
|
|
|
|
defaultGateway = "192.168.113.1";
|
|
|
|
|
nameservers = ["127.0.0.1" "1.1.1.1"];
|
|
|
|
|
interfaces.enp7s0.ipv4.addresses = [
|
|
|
|
|
{
|
|
|
|
|
address = "192.168.113.13";
|
|
|
|
|
prefixLength = 24;
|
|
|
|
|
}
|
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
|
2024-03-02 16:23:27 +00:00
|
|
|
|
# Running own DNS resolver on same system. This prevents DNS issues with ACME
|
|
|
|
|
systemd.services = let
|
|
|
|
|
dependency = ["adguardhome.service"];
|
|
|
|
|
in
|
|
|
|
|
lib.mapAttrs'
|
|
|
|
|
(name: _:
|
|
|
|
|
lib.nameValuePair "acme-${name}" {
|
|
|
|
|
after = dependency;
|
|
|
|
|
preStart = ''
|
|
|
|
|
sleep 10
|
|
|
|
|
'';
|
|
|
|
|
})
|
|
|
|
|
config.security.acme.certs;
|
|
|
|
|
|
2023-04-07 03:12:43 +00:00
|
|
|
|
# List packages installed in system profile. To search, run:
|
|
|
|
|
# $ nix search wget
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
|
vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
|
|
|
|
|
wget
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
# This value determines the NixOS release from which the default
|
|
|
|
|
# settings for stateful data, like file locations and database versions
|
|
|
|
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
|
|
|
|
# this value at the release version of the first install of this system.
|
|
|
|
|
# Before changing this value read the documentation for this option
|
|
|
|
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
|
|
|
|
system.stateVersion = "22.11"; # Did you read the comment?
|
|
|
|
|
}
|