mini-2024-10-18-07-36-07
This commit is contained in:
@ -4,9 +4,7 @@
|
|||||||
inputs,
|
inputs,
|
||||||
outputs,
|
outputs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
secrets = import ../../configs/secrets.nix;
|
|
||||||
in {
|
|
||||||
nixpkgs = {
|
nixpkgs = {
|
||||||
overlays = [
|
overlays = [
|
||||||
outputs.overlays.additions
|
outputs.overlays.additions
|
||||||
@ -21,11 +19,34 @@ in {
|
|||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
inputs.nixos-hardware.nixosModules.common-cpu-intel
|
inputs.nixos-hardware.nixosModules.common-cpu-intel
|
||||||
|
inputs.sops-nix.nixosModules.sops
|
||||||
../../configs/docker.nix
|
../../configs/docker.nix
|
||||||
../../configs/common.nix
|
../../configs/common.nix
|
||||||
../../configs/user.nix
|
../../configs/user.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
|
sops = {
|
||||||
|
defaultSopsFile = ../../secrets.yaml;
|
||||||
|
validateSopsFiles = true;
|
||||||
|
age = {
|
||||||
|
sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
||||||
|
keyFile = "/var/lib/sops-nix/key.txt";
|
||||||
|
generateKey = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
secrets = {
|
||||||
|
borg-key = {
|
||||||
|
sopsFile = ../../secrets-mini.yaml;
|
||||||
|
owner = config.users.users.alex.name;
|
||||||
|
group = config.users.users.alex.group;
|
||||||
|
};
|
||||||
|
|
||||||
|
hashedPassword = {
|
||||||
|
neededForUsers = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
boot = {
|
boot = {
|
||||||
loader = {
|
loader = {
|
||||||
grub = {
|
grub = {
|
||||||
@ -63,14 +84,6 @@ in {
|
|||||||
# ips = [ "10.100.0.3/24" ];
|
# ips = [ "10.100.0.3/24" ];
|
||||||
# privateKey = secrets.wireguard-mini-private;
|
# privateKey = secrets.wireguard-mini-private;
|
||||||
|
|
||||||
# peers = [{
|
|
||||||
# publicKey = secrets.wireguard-vps-public;
|
|
||||||
# presharedKey = secrets.wireguard-preshared;
|
|
||||||
# allowedIPs = [ "10.100.0.0/24" ];
|
|
||||||
# endpoint = "[2a02:c207:3008:1547::1]:51820";
|
|
||||||
# persistentKeepalive = 25;
|
|
||||||
# }];
|
|
||||||
|
|
||||||
# postSetup = ''
|
# postSetup = ''
|
||||||
# ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o enp3s0 -j MASQUERADE
|
# ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o enp3s0 -j MASQUERADE
|
||||||
# '';
|
# '';
|
||||||
@ -98,6 +111,8 @@ in {
|
|||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
nyx
|
nyx
|
||||||
|
snapraid
|
||||||
|
mergerfs
|
||||||
];
|
];
|
||||||
|
|
||||||
hardware = {
|
hardware = {
|
||||||
@ -110,22 +125,23 @@ in {
|
|||||||
# openFirewall = true;
|
# openFirewall = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
hostapd = {
|
# hostapd = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
radios = {
|
# radios = {
|
||||||
wlp0s20u1u2 = {
|
# wlp0s20u1u2 = {
|
||||||
# wifi4.enable = false;
|
# # wifi4.enable = false;
|
||||||
# wifi5.enable = false;
|
# # wifi5.enable = false;
|
||||||
# settings.ieee80211n = true; # otherwise enabled by wifi4.enable
|
# # settings.ieee80211n = true; # otherwise enabled by wifi4.enable
|
||||||
networks.wlp0s20u1u2 = {
|
# networks.wlp0s20u1u2 = {
|
||||||
ssid = "Skynet-Tor";
|
# ssid = "Skynet-Tor";
|
||||||
authentication.saePasswords = [
|
# authentication.saePasswords = [
|
||||||
{password = "REMOVED_OLD_PASSWORD_FROM_HISTORY";}
|
# { password = "REMOVED_OLD_PASSWORD_FROM_HISTORY"; }
|
||||||
];
|
# ];
|
||||||
};
|
# };
|
||||||
};
|
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
|
# };
|
||||||
|
|
||||||
# dnsmasq = {
|
# dnsmasq = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
@ -136,37 +152,37 @@ in {
|
|||||||
# '';
|
# '';
|
||||||
# };
|
# };
|
||||||
|
|
||||||
kea.dhcp4 = {
|
# kea.dhcp4 = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
# interfaces = [ "wlp0s20u1u2" ];
|
# # interfaces = [ "wlp0s20u1u2" ];
|
||||||
settings = {
|
# settings = {
|
||||||
interfaces-config = {
|
# interfaces-config = {
|
||||||
interfaces = [
|
# interfaces = [
|
||||||
"wlp0s20u1u2"
|
# "wlp0s20u1u2"
|
||||||
];
|
# ];
|
||||||
};
|
# };
|
||||||
lease-database = {
|
# lease-database = {
|
||||||
name = "/var/lib/kea/dhcp4.leases";
|
# name = "/var/lib/kea/dhcp4.leases";
|
||||||
persist = true;
|
# persist = true;
|
||||||
type = "memfile";
|
# type = "memfile";
|
||||||
};
|
# };
|
||||||
rebind-timer = 2000;
|
# rebind-timer = 2000;
|
||||||
renew-timer = 1000;
|
# renew-timer = 1000;
|
||||||
subnet4 = [
|
# subnet4 = [
|
||||||
{
|
# {
|
||||||
pools = [
|
# pools = [
|
||||||
{
|
# {
|
||||||
pool = "192.168.12.100 - 192.168.12.240";
|
# pool = "192.168.12.100 - 192.168.12.240";
|
||||||
}
|
# }
|
||||||
];
|
# ];
|
||||||
subnet = "192.168.12.0/24";
|
# subnet = "192.168.12.0/24";
|
||||||
}
|
# }
|
||||||
];
|
# ];
|
||||||
valid-lifetime = 4000;
|
# valid-lifetime = 4000;
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
|
|
||||||
haveged.enable = true;
|
# haveged.enable = true;
|
||||||
|
|
||||||
# k3s = {
|
# k3s = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
@ -198,16 +214,41 @@ in {
|
|||||||
extraUpFlags = "--advertise-exit-node --login-server=https://headscale.szczepan.ski";
|
extraUpFlags = "--advertise-exit-node --login-server=https://headscale.szczepan.ski";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
samba = {
|
||||||
|
enable = true;
|
||||||
|
securityType = "user";
|
||||||
|
extraConfig = ''
|
||||||
|
workgroup = WORKGROUP
|
||||||
|
server string = server
|
||||||
|
netbios name = server
|
||||||
|
security = user
|
||||||
|
guest account = nobody
|
||||||
|
map to guest = bad user
|
||||||
|
logging = systemd
|
||||||
|
max log size = 50
|
||||||
|
'';
|
||||||
|
shares = {
|
||||||
|
storage = {
|
||||||
|
path = "/mnt/storage";
|
||||||
|
browseable = "yes";
|
||||||
|
"read only" = "no";
|
||||||
|
"guest ok" = "no";
|
||||||
|
"create mask" = "0644";
|
||||||
|
"directory mask" = "0755";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
borgbackup.jobs.home = rec {
|
borgbackup.jobs.home = rec {
|
||||||
compression = "auto,zstd";
|
compression = "auto,zstd";
|
||||||
encryption = {
|
encryption = {
|
||||||
mode = "repokey-blake2";
|
mode = "repokey-blake2";
|
||||||
passphrase = secrets.borg-key;
|
passCommand = "cat ${config.sops.secrets.borg-key.path}";
|
||||||
};
|
};
|
||||||
extraCreateArgs = "--list --stats --verbose --checkpoint-interval 600 --exclude-caches";
|
extraCreateArgs = "--list --stats --verbose --checkpoint-interval 600 --exclude-caches";
|
||||||
environment.BORG_RSH = "ssh -o StrictHostKeyChecking=no -i /home/alex/.ssh/id_ed25519";
|
environment.BORG_RSH = "ssh -o StrictHostKeyChecking=no -i /home/alex/.ssh/id_ed25519";
|
||||||
paths = ["/home/alex" "/var/lib"];
|
paths = ["/home/alex" "/var/lib"];
|
||||||
repo = secrets.borg-repo;
|
repo = "ssh://u278697-sub8@u278697.your-storagebox.de:23/./borg-backup-mini";
|
||||||
startAt = "daily";
|
startAt = "daily";
|
||||||
prune.keep = {
|
prune.keep = {
|
||||||
daily = 7;
|
daily = 7;
|
||||||
@ -225,5 +266,18 @@ in {
|
|||||||
# cpuFreqGovernor = "powersave";
|
# cpuFreqGovernor = "powersave";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd = {
|
||||||
|
mounts = [{
|
||||||
|
requires = [ "mnt-disk1.mount" "mnt-disk2.mount" "mnt-disk3.mount" ];
|
||||||
|
after = [ "mnt-disk1.mount" "mnt-disk2.mount" "mnt-disk3.mount" ];
|
||||||
|
what = "/mnt/disk1:/mnt/disk2:/mnt/disk3";
|
||||||
|
where = "/mnt/storage";
|
||||||
|
type = "fuse.mergerfs";
|
||||||
|
options =
|
||||||
|
"defaults,allow_other,use_ino,fsname=mergerfs,minfreespace=50G,func.getattr=newest,noforget";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
|
||||||
system.stateVersion = "24.05";
|
system.stateVersion = "24.05";
|
||||||
}
|
}
|
||||||
|
@ -17,14 +17,40 @@
|
|||||||
boot.kernelModules = ["kvm-intel"];
|
boot.kernelModules = ["kvm-intel"];
|
||||||
boot.extraModulePackages = [];
|
boot.extraModulePackages = [];
|
||||||
|
|
||||||
fileSystems."/" = {
|
fileSystems = {
|
||||||
device = "/dev/disk/by-uuid/8be3b4e5-7219-4427-bba4-340f1dc4b868";
|
"/" = {
|
||||||
fsType = "ext4";
|
device = "/dev/disk/by-uuid/8be3b4e5-7219-4427-bba4-340f1dc4b868";
|
||||||
};
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
fileSystems."/boot" = {
|
"/mnt/disk1" = {
|
||||||
device = "/dev/disk/by-uuid/7C10-C8BD";
|
device = "/dev/disk/by-uuid/3c4b5d00-43c0-48be-81b8-c2b3977e015b";
|
||||||
fsType = "vfat";
|
fsType = "ext4";
|
||||||
|
options = [ "nofail" "x-systemd.automount" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
"/mnt/disk2" = {
|
||||||
|
device = "/dev/disk/by-uuid/98a75e01-fa80-469e-820c-1e1e275937b8";
|
||||||
|
fsType = "ext4";
|
||||||
|
options = [ "nofail" "x-systemd.automount" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
"/mnt/disk3" = {
|
||||||
|
device = "/dev/disk/by-uuid/0301db98-264f-4b18-9423-15691063f73d";
|
||||||
|
fsType = "ext4";
|
||||||
|
options = [ "nofail" "x-systemd.automount" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
"/mnt/parity" = {
|
||||||
|
device = "/dev/disk/by-uuid/6cce037c-d2d4-4940-bb69-6d2b84fd41aa";
|
||||||
|
fsType = "ext4";
|
||||||
|
options = [ "nofail" "x-systemd.automount" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
"/boot" = {
|
||||||
|
device = "/dev/disk/by-uuid/7C10-C8BD";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
swapDevices = [{device = "/dev/disk/by-uuid/edb5324f-3cd2-4b8c-bb05-cca045adeaf6";}];
|
swapDevices = [{device = "/dev/disk/by-uuid/edb5324f-3cd2-4b8c-bb05-cca045adeaf6";}];
|
||||||
|
Reference in New Issue
Block a user