mirror of
https://github.com/tuxdotrs/tawm.git
synced 2025-07-05 20:56:33 +05:30
216 lines
5.0 KiB
Nix
216 lines
5.0 KiB
Nix
{
|
|
modulesPath,
|
|
inputs,
|
|
username,
|
|
lib,
|
|
email,
|
|
config,
|
|
...
|
|
}: {
|
|
imports = [
|
|
(modulesPath + "/installer/scan/not-detected.nix")
|
|
(modulesPath + "/profiles/qemu-guest.nix")
|
|
inputs.disko.nixosModules.default
|
|
(import ./disko.nix {device = "/dev/sda";})
|
|
|
|
../common
|
|
../../modules/nixos/virtualisation/docker.nix
|
|
../../modules/nixos/postgresql.nix
|
|
../../modules/nixos/headscale.nix
|
|
../../modules/nixos/vaultwarden.nix
|
|
../../modules/nixos/gitea.nix
|
|
../../modules/nixos/plausible.nix
|
|
../../modules/nixos/monitoring/grafana.nix
|
|
../../modules/nixos/monitoring/loki.nix
|
|
../../modules/nixos/monitoring/promtail.nix
|
|
../../modules/nixos/ntfy-sh.nix
|
|
../../modules/nixos/searx.nix
|
|
../../modules/nixos/wakapi.nix
|
|
../../modules/nixos/nextcloud.nix
|
|
../../modules/nixos/silver-bullet.nix
|
|
../../modules/nixos/rustdesk-server.nix
|
|
../../modules/nixos/containers/cs2.nix
|
|
];
|
|
|
|
tux.services.openssh.enable = true;
|
|
|
|
sops.secrets = {
|
|
borg_encryption_key = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
searx_secret_key = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
"cloudflare_credentials/email" = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
"cloudflare_credentials/dns_api_token" = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
plausible_key = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
wakapi_salt = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
nextcloud_password = {
|
|
sopsFile = ./secrets.yaml;
|
|
owner = "nextcloud";
|
|
};
|
|
|
|
silver_bullet = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
"cs2_secrets/SRCDS_TOKEN" = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
"cs2_secrets/CS2_RCONPW" = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
|
|
"cs2_secrets/CS2_PW" = {
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
};
|
|
|
|
nixpkgs = {
|
|
hostPlatform = "x86_64-linux";
|
|
};
|
|
|
|
boot = {
|
|
kernel.sysctl = {
|
|
"vm.swappiness" = 10;
|
|
};
|
|
|
|
initrd.systemd = {
|
|
enable = lib.mkForce true;
|
|
|
|
services.wipe-my-fs = {
|
|
wantedBy = ["initrd.target"];
|
|
after = ["initrd-root-device.target"];
|
|
before = ["sysroot.mount"];
|
|
unitConfig.DefaultDependencies = "no";
|
|
serviceConfig.Type = "oneshot";
|
|
script = ''
|
|
mkdir /btrfs_tmp
|
|
mount /dev/disk/by-partlabel/disk-primary-root /btrfs_tmp
|
|
|
|
if [[ -e /btrfs_tmp/root ]]; then
|
|
mkdir -p /btrfs_tmp/old_roots
|
|
timestamp=$(date --date="@$(stat -c %Y /btrfs_tmp/root)" "+%Y-%m-%-d_%H:%M:%S")
|
|
mv /btrfs_tmp/root "/btrfs_tmp/old_roots/$timestamp"
|
|
fi
|
|
|
|
delete_subvolume_recursively() {
|
|
IFS=$'\n'
|
|
for i in $(btrfs subvolume list -o "$1" | cut -f 9- -d ' '); do
|
|
delete_subvolume_recursively "/btrfs_tmp/$i"
|
|
done
|
|
btrfs subvolume delete "$1"
|
|
}
|
|
|
|
for i in $(find /btrfs_tmp/old_roots/ -maxdepth 1 -mtime +30); do
|
|
delete_subvolume_recursively "$i"
|
|
done
|
|
|
|
btrfs subvolume create /btrfs_tmp/root
|
|
umount /btrfs_tmp
|
|
'';
|
|
};
|
|
};
|
|
|
|
loader = {
|
|
grub = {
|
|
efiSupport = true;
|
|
efiInstallAsRemovable = true;
|
|
configurationLimit = 10;
|
|
};
|
|
timeout = 1;
|
|
};
|
|
};
|
|
|
|
networking = {
|
|
hostName = "arcturus";
|
|
|
|
firewall = {
|
|
enable = true;
|
|
allowedTCPPorts = [80 443 22 3333];
|
|
};
|
|
};
|
|
|
|
security = {
|
|
acme = {
|
|
acceptTerms = true;
|
|
defaults.email = "${email}";
|
|
certs = {
|
|
"tux.rs" = {
|
|
group = "nginx";
|
|
domain = "*.tux.rs";
|
|
extraDomainNames = ["tux.rs"];
|
|
dnsProvider = "cloudflare";
|
|
credentialFiles = {
|
|
CLOUDFLARE_EMAIL_FILE = config.sops.secrets."cloudflare_credentials/email".path;
|
|
CLOUDFLARE_DNS_API_TOKEN_FILE = config.sops.secrets."cloudflare_credentials/dns_api_token".path;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
users.users.nginx.extraGroups = ["acme"];
|
|
|
|
services = {
|
|
nginx = {
|
|
recommendedTlsSettings = true;
|
|
recommendedBrotliSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedProxySettings = true;
|
|
recommendedZstdSettings = true;
|
|
};
|
|
};
|
|
|
|
programs.fuse.userAllowOther = true;
|
|
fileSystems."/persist".neededForBoot = true;
|
|
environment.persistence."/persist" = {
|
|
hideMounts = true;
|
|
directories = [
|
|
"/var/log"
|
|
"/var/lib/nixos"
|
|
"/var/lib/acme"
|
|
"/var/lib/postgresql"
|
|
"/var/lib/headscale"
|
|
"/var/lib/vaultwarden"
|
|
"/var/lib/gitea"
|
|
"/var/lib/clickhouse"
|
|
"/var/lib/grafana"
|
|
"/var/lib/promtail"
|
|
"/var/lib/private"
|
|
"/var/lib/nextcloud"
|
|
"/var/lib/silverbullet"
|
|
];
|
|
files = [
|
|
"/etc/ssh/ssh_host_ed25519_key"
|
|
"/etc/ssh/ssh_host_ed25519_key.pub"
|
|
"/etc/ssh/ssh_host_rsa_key"
|
|
"/etc/ssh/ssh_host_rsa_key.pub"
|
|
];
|
|
};
|
|
|
|
home-manager.users.${username} = {
|
|
imports = [
|
|
./home.nix
|
|
];
|
|
};
|
|
|
|
system.stateVersion = "24.11";
|
|
}
|