mini-2024-10-18-07-36-07
This commit is contained in:
@ -4,9 +4,7 @@
|
||||
inputs,
|
||||
outputs,
|
||||
...
|
||||
}: let
|
||||
secrets = import ../../configs/secrets.nix;
|
||||
in {
|
||||
}: {
|
||||
nixpkgs = {
|
||||
overlays = [
|
||||
outputs.overlays.additions
|
||||
@ -21,11 +19,34 @@ in {
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
inputs.nixos-hardware.nixosModules.common-cpu-intel
|
||||
inputs.sops-nix.nixosModules.sops
|
||||
../../configs/docker.nix
|
||||
../../configs/common.nix
|
||||
../../configs/user.nix
|
||||
];
|
||||
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets.yaml;
|
||||
validateSopsFiles = true;
|
||||
age = {
|
||||
sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = true;
|
||||
};
|
||||
|
||||
secrets = {
|
||||
borg-key = {
|
||||
sopsFile = ../../secrets-mini.yaml;
|
||||
owner = config.users.users.alex.name;
|
||||
group = config.users.users.alex.group;
|
||||
};
|
||||
|
||||
hashedPassword = {
|
||||
neededForUsers = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
boot = {
|
||||
loader = {
|
||||
grub = {
|
||||
@ -63,14 +84,6 @@ in {
|
||||
# ips = [ "10.100.0.3/24" ];
|
||||
# privateKey = secrets.wireguard-mini-private;
|
||||
|
||||
# peers = [{
|
||||
# publicKey = secrets.wireguard-vps-public;
|
||||
# presharedKey = secrets.wireguard-preshared;
|
||||
# allowedIPs = [ "10.100.0.0/24" ];
|
||||
# endpoint = "[2a02:c207:3008:1547::1]:51820";
|
||||
# persistentKeepalive = 25;
|
||||
# }];
|
||||
|
||||
# postSetup = ''
|
||||
# ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.100.0.0/24 -o enp3s0 -j MASQUERADE
|
||||
# '';
|
||||
@ -98,6 +111,8 @@ in {
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
nyx
|
||||
snapraid
|
||||
mergerfs
|
||||
];
|
||||
|
||||
hardware = {
|
||||
@ -110,22 +125,23 @@ in {
|
||||
# openFirewall = true;
|
||||
};
|
||||
|
||||
hostapd = {
|
||||
enable = true;
|
||||
radios = {
|
||||
wlp0s20u1u2 = {
|
||||
# wifi4.enable = false;
|
||||
# wifi5.enable = false;
|
||||
# settings.ieee80211n = true; # otherwise enabled by wifi4.enable
|
||||
networks.wlp0s20u1u2 = {
|
||||
ssid = "Skynet-Tor";
|
||||
authentication.saePasswords = [
|
||||
{password = "REMOVED_OLD_PASSWORD_FROM_HISTORY";}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
# hostapd = {
|
||||
# enable = true;
|
||||
# radios = {
|
||||
# wlp0s20u1u2 = {
|
||||
# # wifi4.enable = false;
|
||||
# # wifi5.enable = false;
|
||||
# # settings.ieee80211n = true; # otherwise enabled by wifi4.enable
|
||||
# networks.wlp0s20u1u2 = {
|
||||
# ssid = "Skynet-Tor";
|
||||
# authentication.saePasswords = [
|
||||
# { password = "REMOVED_OLD_PASSWORD_FROM_HISTORY"; }
|
||||
# ];
|
||||
# };
|
||||
|
||||
# };
|
||||
# };
|
||||
# };
|
||||
|
||||
# dnsmasq = {
|
||||
# enable = true;
|
||||
@ -136,37 +152,37 @@ in {
|
||||
# '';
|
||||
# };
|
||||
|
||||
kea.dhcp4 = {
|
||||
enable = true;
|
||||
# interfaces = [ "wlp0s20u1u2" ];
|
||||
settings = {
|
||||
interfaces-config = {
|
||||
interfaces = [
|
||||
"wlp0s20u1u2"
|
||||
];
|
||||
};
|
||||
lease-database = {
|
||||
name = "/var/lib/kea/dhcp4.leases";
|
||||
persist = true;
|
||||
type = "memfile";
|
||||
};
|
||||
rebind-timer = 2000;
|
||||
renew-timer = 1000;
|
||||
subnet4 = [
|
||||
{
|
||||
pools = [
|
||||
{
|
||||
pool = "192.168.12.100 - 192.168.12.240";
|
||||
}
|
||||
];
|
||||
subnet = "192.168.12.0/24";
|
||||
}
|
||||
];
|
||||
valid-lifetime = 4000;
|
||||
};
|
||||
};
|
||||
# kea.dhcp4 = {
|
||||
# enable = true;
|
||||
# # interfaces = [ "wlp0s20u1u2" ];
|
||||
# settings = {
|
||||
# interfaces-config = {
|
||||
# interfaces = [
|
||||
# "wlp0s20u1u2"
|
||||
# ];
|
||||
# };
|
||||
# lease-database = {
|
||||
# name = "/var/lib/kea/dhcp4.leases";
|
||||
# persist = true;
|
||||
# type = "memfile";
|
||||
# };
|
||||
# rebind-timer = 2000;
|
||||
# renew-timer = 1000;
|
||||
# subnet4 = [
|
||||
# {
|
||||
# pools = [
|
||||
# {
|
||||
# pool = "192.168.12.100 - 192.168.12.240";
|
||||
# }
|
||||
# ];
|
||||
# subnet = "192.168.12.0/24";
|
||||
# }
|
||||
# ];
|
||||
# valid-lifetime = 4000;
|
||||
# };
|
||||
# };
|
||||
|
||||
haveged.enable = true;
|
||||
# haveged.enable = true;
|
||||
|
||||
# k3s = {
|
||||
# enable = true;
|
||||
@ -198,16 +214,41 @@ in {
|
||||
extraUpFlags = "--advertise-exit-node --login-server=https://headscale.szczepan.ski";
|
||||
};
|
||||
|
||||
samba = {
|
||||
enable = true;
|
||||
securityType = "user";
|
||||
extraConfig = ''
|
||||
workgroup = WORKGROUP
|
||||
server string = server
|
||||
netbios name = server
|
||||
security = user
|
||||
guest account = nobody
|
||||
map to guest = bad user
|
||||
logging = systemd
|
||||
max log size = 50
|
||||
'';
|
||||
shares = {
|
||||
storage = {
|
||||
path = "/mnt/storage";
|
||||
browseable = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "no";
|
||||
"create mask" = "0644";
|
||||
"directory mask" = "0755";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
borgbackup.jobs.home = rec {
|
||||
compression = "auto,zstd";
|
||||
encryption = {
|
||||
mode = "repokey-blake2";
|
||||
passphrase = secrets.borg-key;
|
||||
passCommand = "cat ${config.sops.secrets.borg-key.path}";
|
||||
};
|
||||
extraCreateArgs = "--list --stats --verbose --checkpoint-interval 600 --exclude-caches";
|
||||
environment.BORG_RSH = "ssh -o StrictHostKeyChecking=no -i /home/alex/.ssh/id_ed25519";
|
||||
paths = ["/home/alex" "/var/lib"];
|
||||
repo = secrets.borg-repo;
|
||||
repo = "ssh://u278697-sub8@u278697.your-storagebox.de:23/./borg-backup-mini";
|
||||
startAt = "daily";
|
||||
prune.keep = {
|
||||
daily = 7;
|
||||
@ -225,5 +266,18 @@ in {
|
||||
# cpuFreqGovernor = "powersave";
|
||||
};
|
||||
|
||||
systemd = {
|
||||
mounts = [{
|
||||
requires = [ "mnt-disk1.mount" "mnt-disk2.mount" "mnt-disk3.mount" ];
|
||||
after = [ "mnt-disk1.mount" "mnt-disk2.mount" "mnt-disk3.mount" ];
|
||||
what = "/mnt/disk1:/mnt/disk2:/mnt/disk3";
|
||||
where = "/mnt/storage";
|
||||
type = "fuse.mergerfs";
|
||||
options =
|
||||
"defaults,allow_other,use_ino,fsname=mergerfs,minfreespace=50G,func.getattr=newest,noforget";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
}];
|
||||
};
|
||||
|
||||
system.stateVersion = "24.05";
|
||||
}
|
||||
|
@ -17,15 +17,41 @@
|
||||
boot.kernelModules = ["kvm-intel"];
|
||||
boot.extraModulePackages = [];
|
||||
|
||||
fileSystems."/" = {
|
||||
fileSystems = {
|
||||
"/" = {
|
||||
device = "/dev/disk/by-uuid/8be3b4e5-7219-4427-bba4-340f1dc4b868";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
"/mnt/disk1" = {
|
||||
device = "/dev/disk/by-uuid/3c4b5d00-43c0-48be-81b8-c2b3977e015b";
|
||||
fsType = "ext4";
|
||||
options = [ "nofail" "x-systemd.automount" ];
|
||||
};
|
||||
|
||||
"/mnt/disk2" = {
|
||||
device = "/dev/disk/by-uuid/98a75e01-fa80-469e-820c-1e1e275937b8";
|
||||
fsType = "ext4";
|
||||
options = [ "nofail" "x-systemd.automount" ];
|
||||
};
|
||||
|
||||
"/mnt/disk3" = {
|
||||
device = "/dev/disk/by-uuid/0301db98-264f-4b18-9423-15691063f73d";
|
||||
fsType = "ext4";
|
||||
options = [ "nofail" "x-systemd.automount" ];
|
||||
};
|
||||
|
||||
"/mnt/parity" = {
|
||||
device = "/dev/disk/by-uuid/6cce037c-d2d4-4940-bb69-6d2b84fd41aa";
|
||||
fsType = "ext4";
|
||||
options = [ "nofail" "x-systemd.automount" ];
|
||||
};
|
||||
|
||||
"/boot" = {
|
||||
device = "/dev/disk/by-uuid/7C10-C8BD";
|
||||
fsType = "vfat";
|
||||
};
|
||||
};
|
||||
|
||||
swapDevices = [{device = "/dev/disk/by-uuid/edb5324f-3cd2-4b8c-bb05-cca045adeaf6";}];
|
||||
|
||||
|
Reference in New Issue
Block a user