Compare commits

..

No commits in common. "56af1ef2219d7033c33760c48c133f1c52bc1d87" and "74fd474e4a149b37682b2d2a0f1c892e10cbd548" have entirely different histories.

58 changed files with 497 additions and 891 deletions

View file

@ -1,20 +1,20 @@
{ { self
self, , flake-utils
flake-utils, , nixpkgs
nixpkgs, , ...
...
}: }:
(flake-utils.lib.eachDefaultSystem ( (flake-utils.lib.eachDefaultSystem (system:
system:
let let
pkgs = nixpkgs.legacyPackages.${system}; pkgs = nixpkgs.legacyPackages.${system};
formatter = self.formatter.${system}; formatter = self.formatter.${system};
in in
{ {
checks = { checks = {
format = pkgs.runCommand "check-format" { format = pkgs.runCommand
buildInputs = [ formatter ]; "check-format"
} "${formatter}/bin/nixpkgs-fmt --check ${./.} && touch $out"; {
buildInputs = [ formatter ];
}
"${formatter}/bin/nixpkgs-fmt --check ${./.} && touch $out";
}; };
} })).checks
)).checks

75
flake.lock generated
View file

@ -6,19 +6,19 @@
"home-manager": "home-manager", "home-manager": "home-manager",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ]
"systems": "systems"
}, },
"locked": { "locked": {
"lastModified": 1747575206, "lastModified": 1703089996,
"narHash": "sha256-NwmAFuDUO/PFcgaGGr4j3ozG9Pe5hZ/ogitWhY+D81k=", "narHash": "sha256-ipqShkBmHKC9ft1ZAsA6aeKps32k7+XZSPwfxeHLsAU=",
"owner": "ryantm", "owner": "ryantm",
"repo": "agenix", "repo": "agenix",
"rev": "4835b1dc898959d8547a871ef484930675cb47f1", "rev": "564595d0ad4be7277e07fa63b5a991b3c645655d",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "ryantm", "owner": "ryantm",
"ref": "0.15.0",
"repo": "agenix", "repo": "agenix",
"type": "github" "type": "github"
} }
@ -31,11 +31,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1744478979, "lastModified": 1673295039,
"narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=", "narHash": "sha256-AsdYgE8/GPwcelGgrntlijMg4t3hLFJFCRF3tL5WVjA=",
"owner": "lnl7", "owner": "lnl7",
"repo": "nix-darwin", "repo": "nix-darwin",
"rev": "43975d782b418ebf4969e9ccba82466728c2851b", "rev": "87b9d090ad39b25b2400029c64825fc2a8868943",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -109,11 +109,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1745494811, "lastModified": 1682203081,
"narHash": "sha256-YZCh2o9Ua1n9uCvrvi5pRxtuVNml8X2a03qIFfRKpFs=", "narHash": "sha256-kRL4ejWDhi0zph/FpebFYhzqlOBrk0Pl3dzGEKSAlEw=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "abfad3d2958c9e6300a883bd443512c55dfeb1be", "rev": "32d3e39c491e2f91152c84f8ad8b003420eab0a1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -129,11 +129,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1749358668, "lastModified": 1747439237,
"narHash": "sha256-V91nN4Q9ZwX0N+Gzu+F8SnvzMcdURYnMcIvpfLQzD5M=", "narHash": "sha256-5rCGrnkglKKj4cav1U3HC+SIUNJh08pqOK4spQv9RjA=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "06451df423dd5e555f39857438ffc16c5b765862", "rev": "ae755329092c87369b9e9a1510a8cf1ce2b1c708",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -179,11 +179,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1747663185, "lastModified": 1742568034,
"narHash": "sha256-Obh50J+O9jhUM/FgXtI3he/QRNiV9+J53+l+RlKSaAk=", "narHash": "sha256-QaMEhcnscfF2MqB7flZr+sLJMMYZPnvqO4NYf9B4G38=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-generators", "repo": "nixos-generators",
"rev": "ee07ba0d36c38e9915c55d2ac5a8fb0f05f2afcc", "rev": "42ee229088490e3777ed7d1162cb9e9d8c3dbb11",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -194,11 +194,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1749195551, "lastModified": 1747129300,
"narHash": "sha256-W5GKQHgunda/OP9sbKENBZhMBDNu2QahoIPwnsF6CeM=", "narHash": "sha256-L3clA5YGeYCF47ghsI7Tcex+DnaaN/BbQ4dR2wzoiKg=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "4602f7e1d3f197b3cb540d5accf5669121629628", "rev": "e81fd167b33121269149c57806599045fd33eeed",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -210,11 +210,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1749143949, "lastModified": 1747327360,
"narHash": "sha256-QuUtALJpVrPnPeozlUG/y+oIMSLdptHxb3GK6cpSVhA=", "narHash": "sha256-LSmTbiq/nqZR9B2t4MRnWG7cb0KVNU70dB7RT4+wYK4=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d3d2d80a2191a73d1e86456a751b83aa13085d7d", "rev": "e06158e58f3adee28b139e9c2bcfcc41f8625b46",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -226,11 +226,11 @@
}, },
"nixpkgs-small": { "nixpkgs-small": {
"locked": { "locked": {
"lastModified": 1749289455, "lastModified": 1747452614,
"narHash": "sha256-FmG/5HlnBrPNTCQv91GPUV2RKUw2WvDtyhXcN2fN280=", "narHash": "sha256-hSEz6JHZTJJTeIudt0SK3UoZnfThHwKCUGvSe5/zn8g=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "6dbd508802ef3f74cf792a25b653861ed8360a80", "rev": "e067fb89ac3e59f993f257c799318132f1492f01",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -252,7 +252,7 @@
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nixpkgs-small": "nixpkgs-small", "nixpkgs-small": "nixpkgs-small",
"systems": "systems_2", "systems": "systems",
"treefmt-nix": "treefmt-nix" "treefmt-nix": "treefmt-nix"
} }
}, },
@ -271,21 +271,6 @@
"type": "github" "type": "github"
} }
}, },
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"treefmt-nix": { "treefmt-nix": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@ -293,11 +278,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1749194973, "lastModified": 1747469671,
"narHash": "sha256-eEy8cuS0mZ2j/r/FE0/LYBSBcIs/MKOIVakwHVuqTfk=", "narHash": "sha256-bo1ptiFoNqm6m1B2iAhJmWCBmqveLVvxom6xKmtuzjg=",
"owner": "numtide", "owner": "numtide",
"repo": "treefmt-nix", "repo": "treefmt-nix",
"rev": "a05be418a1af1198ca0f63facb13c985db4cb3c5", "rev": "ab0378b61b0d85e73a8ab05d5c6029b5bd58c9fb",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -18,7 +18,7 @@
flake = false; flake = false;
}; };
agenix = { agenix = {
url = "github:ryantm/agenix"; url = "github:ryantm/agenix/0.15.0";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
devshell = { devshell = {
@ -40,5 +40,5 @@
}; };
}; };
outputs = { ... }@args: import ./outputs.nix args; outputs = { ... } @ args: import ./outputs.nix args;
} }

View file

@ -33,20 +33,8 @@ with lib.hm.gvariant;
current = mkUint32 0; current = mkUint32 0;
per-window = false; per-window = false;
show-all-sources = true; show-all-sources = true;
sources = [ sources = [ (mkTuple [ "xkb" "eu" ]) (mkTuple [ "xkb" "de" ]) ];
(mkTuple [ xkb-options = [ "lv3:ralt_switch" "caps:escape" ];
"xkb"
"eu"
])
(mkTuple [
"xkb"
"de"
])
];
xkb-options = [
"lv3:ralt_switch"
"caps:escape"
];
}; };
"org/gnome/desktop/interface" = { "org/gnome/desktop/interface" = {
@ -139,10 +127,7 @@ with lib.hm.gvariant;
composer-attribution-language = "de_DE"; composer-attribution-language = "de_DE";
composer-reply-start-bottom = false; composer-reply-start-bottom = false;
composer-signature-in-new-only = true; composer-signature-in-new-only = true;
composer-spell-languages = [ composer-spell-languages = [ "de" "en_US" ];
"de"
"en_US"
];
composer-top-signature = false; composer-top-signature = false;
composer-unicode-smileys = false; composer-unicode-smileys = false;
composer-visually-wrap-long-lines = true; composer-visually-wrap-long-lines = true;

View file

@ -1,13 +1,8 @@
{ lib, ... }: { lib, ... }:
with lib; with lib; let
let modules' = dir: filterAttrs (name: type: (hasSuffix ".nix" name) || (type == "directory"))
modules' = (builtins.readDir dir);
dir: modules = dir: mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}")))
filterAttrs (name: type: (hasSuffix ".nix" name) || (type == "directory")) (builtins.readDir dir); (modules' dir);
modules =
dir:
mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}"))) (
modules' dir
);
in in
(modules ./modules) (modules ./modules)

View file

@ -1,11 +1,9 @@
{ { pkgs
pkgs, , lib
lib, , config
config, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.alacritty; cfg = config.dadada.home.alacritty;
in in
{ {

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; {
{
options.dadada.home.colors = mkOption { options.dadada.home.colors = mkOption {
type = types.attrs; type = types.attrs;
description = "Color scheme"; description = "Color scheme";

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.direnv; cfg = config.dadada.home.direnv;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , lib
lib, , pkgs
pkgs, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.git; cfg = config.dadada.home.git;
allowedSigners = pkgs.writeTextFile { allowedSigners = pkgs.writeTextFile {
name = "allowed-signers"; name = "allowed-signers";

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.gpg; cfg = config.dadada.home.gpg;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , lib
lib, , pkgs
pkgs, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.gtk; cfg = config.dadada.home.gtk;
in in
{ {

View file

@ -1,9 +1,4 @@
{ { config, pkgs, lib, ... }:
config,
pkgs,
lib,
...
}:
let let
cfg = config.dadada.home.helix; cfg = config.dadada.home.helix;
in in

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.keyring; cfg = config.dadada.home.keyring;
in in
{ {

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.session; cfg = config.dadada.home.session;
in in
{ {

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.ssh; cfg = config.dadada.home.ssh;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.syncthing; cfg = config.dadada.home.syncthing;
in in
{ {

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.tmux; cfg = config.dadada.home.tmux;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
apps = { apps = {
"x-scheme-handler/mailto" = "evolution.desktop"; "x-scheme-handler/mailto" = "evolution.desktop";
"message/rfc822" = "evolution.desktop"; "message/rfc822" = "evolution.desktop";

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.home.zsh; cfg = config.dadada.home.zsh;
in in
{ {
@ -47,7 +45,8 @@ in
PROMPT="%F{red}%?%f %F{green}%m%f:%F{blue}%~%f"$'\n'"> " PROMPT="%F{red}%?%f %F{green}%m%f:%F{blue}%~%f"$'\n'"> "
RPROMPT='$(git_super_status)' RPROMPT='$(git_super_status)'
''; '';
profileExtra = ''''; profileExtra = ''
'';
shellAliases = { shellAliases = {
ga = "git add"; ga = "git add";
gc = "git commit"; gc = "git commit";

View file

@ -1,5 +1,4 @@
{ pkgs }: { pkgs }: {
{
allowUnfree = true; allowUnfree = true;
allowUnfreePredicate = pkg: true; allowUnfreePredicate = pkg: true;
allowBroken = false; allowBroken = false;

View file

@ -1,6 +1,5 @@
{ pkgs }: { pkgs }:
with pkgs; with pkgs; [
[
anki anki
aqbanking aqbanking
aria2 aria2
@ -106,10 +105,7 @@ with pkgs;
prusa-slicer prusa-slicer
pv pv
pwgen pwgen
(python3.withPackages (pkgs: [ (python3.withPackages (pkgs: [pkgs.pandas pkgs.requests]))
pkgs.pandas
pkgs.requests
]))
ranger ranger
reptyr reptyr
ripgrep ripgrep

View file

@ -1,4 +1,5 @@
{ self, nixpkgs, ... }: { self, nixpkgs, ... }:
(nixpkgs.lib.mapAttrs' ( (nixpkgs.lib.mapAttrs'
name: config: nixpkgs.lib.nameValuePair name config.config.system.build.toplevel (name: config: nixpkgs.lib.nameValuePair name config.config.system.build.toplevel)
) self.nixosConfigurations) self.nixosConfigurations
)

View file

@ -1,8 +1,7 @@
{ { config
config, , modulesPath
modulesPath, , pkgs
pkgs, , ...
...
}: }:
{ {
imports = [ imports = [
@ -31,10 +30,7 @@
fileSystems."/swap" = { fileSystems."/swap" = {
device = "/dev/sda1"; device = "/dev/sda1";
fsType = "btrfs"; fsType = "btrfs";
options = [ options = [ "subvol=/root/swap" "noatime" ];
"subvol=/root/swap"
"noatime"
];
}; };
#swapDevices = [{ #swapDevices = [{
@ -53,14 +49,7 @@
networking.hostName = "agares"; networking.hostName = "agares";
networking.domain = "bs.dadada.li"; networking.domain = "bs.dadada.li";
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "ehci_pci" "usb_storage" "sd_mod" "sdhci_pci" ];
"xhci_pci"
"ahci"
"ehci_pci"
"usb_storage"
"sd_mod"
"sdhci_pci"
];
boot.initrd.kernelModules = [ "dm-snapshot" ]; boot.initrd.kernelModules = [ "dm-snapshot" ];
# Use the GRUB 2 boot loader. # Use the GRUB 2 boot loader.

View file

@ -66,10 +66,7 @@
]; ];
stub-zone = stub-zone =
let let
stubZone = name: addrs: { stubZone = name: addrs: { name = "${name}"; stub-addr = addrs; };
name = "${name}";
stub-addr = addrs;
};
in in
[ [
#(stubZone "li.dadada.bs" ["192.168.128.220" "2a01:4f8:c010:a710::1"]) #(stubZone "li.dadada.bs" ["192.168.128.220" "2a01:4f8:c010:a710::1"])

View file

@ -10,10 +10,7 @@ in
enable = true; enable = true;
links = { links = {
"10-persistent" = { "10-persistent" = {
matchConfig.OriginalName = [ matchConfig.OriginalName = [ "enp1s0" "enp2s0" ]; # takes search domains from the [Network]
"enp1s0"
"enp2s0"
]; # takes search domains from the [Network]
linkConfig.MACAddressPolicy = "persistent"; linkConfig.MACAddressPolicy = "persistent";
}; };
}; };
@ -52,21 +49,19 @@ in
PrivateKeyFile = config.age.secrets."wg-privkey-vpn-dadada-li".path; PrivateKeyFile = config.age.secrets."wg-privkey-vpn-dadada-li".path;
ListenPort = 51234; ListenPort = 51234;
}; };
wireguardPeers = [ wireguardPeers = [{
{ wireguardPeerConfig =
wireguardPeerConfig = let
let peerAddresses = i: [
peerAddresses = i: [ "${ipv4Prefix}.120.${i}/32"
"${ipv4Prefix}.120.${i}/32" "${ulaPrefix}:120::${i}/128"
"${ulaPrefix}:120::${i}/128" ];
]; in
in {
{ PublicKey = "0eWP1hzkyoXlrjPSOq+6Y1u8tnFH+SejBJs8f8lf+iU=";
PublicKey = "0eWP1hzkyoXlrjPSOq+6Y1u8tnFH+SejBJs8f8lf+iU="; AllowedIPs = peerAddresses "3";
AllowedIPs = peerAddresses "3"; };
}; }];
}
];
}; };
"20-wg0" = { "20-wg0" = {
netdevConfig = { netdevConfig = {
@ -142,10 +137,7 @@ in
"10-mgmt" = lib.mkMerge [ "10-mgmt" = lib.mkMerge [
(subnet "enp1s0" "100") (subnet "enp1s0" "100")
{ {
networkConfig.VLAN = [ networkConfig.VLAN = [ "lan.10" "ff.11" ];
"lan.10"
"ff.11"
];
dhcpServerStaticLeases = [ dhcpServerStaticLeases = [
{ {
# legion # legion
@ -166,24 +158,13 @@ in
]; ];
"30-wg0" = { "30-wg0" = {
matchConfig.Name = "wg0"; matchConfig.Name = "wg0";
address = [ address = [ "10.3.3.2/32" "fd42:9c3b:f96d:121::2/128" ];
"10.3.3.2/32"
"fd42:9c3b:f96d:121::2/128"
];
DHCP = "no"; DHCP = "no";
networkConfig.IPv6AcceptRA = false; networkConfig.IPv6AcceptRA = false;
linkConfig.RequiredForOnline = false; linkConfig.RequiredForOnline = false;
routes = [ routes = [
{ { routeConfig = { Destination = "10.3.3.1/24"; }; }
routeConfig = { { routeConfig = { Destination = "fd42:9c3b:f96d:121::1/64"; }; }
Destination = "10.3.3.1/24";
};
}
{
routeConfig = {
Destination = "fd42:9c3b:f96d:121::1/64";
};
}
]; ];
}; };
"30-lan" = subnet "lan.10" "101" // { "30-lan" = subnet "lan.10" "101" // {
@ -285,14 +266,10 @@ in
linkConfig.RequiredForOnline = false; linkConfig.RequiredForOnline = false;
routes = [ routes = [
{ {
routeConfig = { routeConfig = { Destination = "${ipv4Prefix}.120.1/24"; };
Destination = "${ipv4Prefix}.120.1/24";
};
} }
{ {
routeConfig = { routeConfig = { Destination = "${ulaPrefix}::120:1/64"; };
Destination = "${ulaPrefix}::120:1/64";
};
} }
]; ];
}; };

View file

@ -1,9 +1,4 @@
{ { pkgs, lib, config, ... }:
pkgs,
lib,
config,
...
}:
let let
secretsPath = config.dadada.secrets.path; secretsPath = config.dadada.secrets.path;
in in

View file

@ -1,8 +1,7 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
let let
xilinxJtag = pkgs.writeTextFile { xilinxJtag = pkgs.writeTextFile {
@ -105,18 +104,13 @@ in
passwordFile = config.age.secrets.paperless.path; passwordFile = config.age.secrets.paperless.path;
}; };
systemd.tmpfiles.rules = systemd.tmpfiles.rules = let cfg = config.services.paperless; in [
let (if cfg.consumptionDirIsPublic then
cfg = config.services.paperless; "d '${cfg.consumptionDir}' 777 - - - -"
in else
[ "d '${cfg.consumptionDir}' 770 ${cfg.user} ${config.users.users.${cfg.user}.group} - -"
( )
if cfg.consumptionDirIsPublic then ];
"d '${cfg.consumptionDir}' 777 - - - -"
else
"d '${cfg.consumptionDir}' 770 ${cfg.user} ${config.users.users.${cfg.user}.group} - -"
)
];
age.secrets.paperless = { age.secrets.paperless = {
file = "${config.dadada.secrets.path}/paperless.age"; file = "${config.dadada.secrets.path}/paperless.age";
@ -136,14 +130,12 @@ in
]; ];
}; };
hardware.printers.ensurePrinters = [ hardware.printers.ensurePrinters = [{
{ name = "Brother_HL-L2300D";
name = "Brother_HL-L2300D"; model = "everywhere";
model = "everywhere"; location = "BS";
location = "BS"; deviceUri = "ipp://192.168.101.29:631/printers/Brother_HL-L2300D";
deviceUri = "ipp://192.168.101.29:631/printers/Brother_HL-L2300D"; }];
}
];
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
android-studio android-studio
@ -183,7 +175,7 @@ in
saleaeLogic saleaeLogic
keychron keychron
pkgs.libsigrok pkgs.libsigrok
]; # noMtpUdevRules ]; ]; #noMtpUdevRules ];
virtualisation.libvirtd.enable = true; virtualisation.libvirtd.enable = true;
@ -195,20 +187,7 @@ in
users.users = { users.users = {
dadada = { dadada = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ extraGroups = [ "wheel" "networkmanager" "libvirtd" "adbusers" "kvm" "video" "scanner" "lp" "docker" "dialout" "wireshark" "paperless" ];
"wheel"
"networkmanager"
"libvirtd"
"adbusers"
"kvm"
"video"
"scanner"
"lp"
"docker"
"dialout"
"wireshark"
"paperless"
];
shell = "/run/current-system/sw/bin/zsh"; shell = "/run/current-system/sw/bin/zsh";
}; };
}; };

View file

@ -1,26 +1,17 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ { config
config, , lib
lib, , pkgs
pkgs, , modulesPath
modulesPath, , ...
... }: {
}:
{
imports = [ imports = [
(modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [ "nvme" "ehci_pci" "xhci_pci" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
"nvme"
"ehci_pci"
"xhci_pci"
"usb_storage"
"sd_mod"
"rtsx_pci_sdmmc"
];
boot.initrd.kernelModules = [ "dm-snapshot" ]; boot.initrd.kernelModules = [ "dm-snapshot" ];
boot.kernelModules = [ "kvm-amd" ]; boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];

View file

@ -1,16 +1,11 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.admin; cfg = config.dadada.admin;
extraGroups = [ extraGroups = [ "wheel" "libvirtd" ];
"wheel"
"libvirtd"
];
shells = { shells = {
"bash" = pkgs.bashInteractive; "bash" = pkgs.bashInteractive;
@ -21,32 +16,22 @@ let
shellNames = builtins.attrNames shells; shellNames = builtins.attrNames shells;
adminOpts = adminOpts =
{ { name
name, , config
config, , ...
... }: {
}:
{
options = { options = {
keys = mkOption { keys = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = [ ]; default = [ ];
apply = apply = x: assert (builtins.length x > 0 || abort "Please specify at least one key to be able to log in"); x;
x:
assert (builtins.length x > 0 || abort "Please specify at least one key to be able to log in");
x;
description = '' description = ''
The keys that should be able to access the account. The keys that should be able to access the account.
''; '';
}; };
shell = mkOption { shell = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
apply = apply = x: assert (builtins.elem x shellNames || abort "Please specify one of ${builtins.toString shellNames}"); x;
x:
assert (
builtins.elem x shellNames || abort "Please specify one of ${builtins.toString shellNames}"
);
x;
default = "zsh"; default = "zsh";
defaultText = literalExpression "zsh"; defaultText = literalExpression "zsh";
example = literalExpression "bash"; example = literalExpression "bash";
@ -96,12 +81,15 @@ in
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
services.openssh.openFirewall = true; services.openssh.openFirewall = true;
users.users = mapAttrs (user: keys: { users.users =
shell = shells."${keys.shell}"; mapAttrs
extraGroups = extraGroups; (user: keys: {
isNormalUser = true; shell = shells."${keys.shell}";
openssh.authorizedKeys.keys = keys.keys; extraGroups = extraGroups;
}) cfg.users; isNormalUser = true;
openssh.authorizedKeys.keys = keys.keys;
})
cfg.users;
nix.settings.trusted-users = builtins.attrNames cfg.users; nix.settings.trusted-users = builtins.attrNames cfg.users;
@ -115,7 +103,7 @@ in
services.tor.relay.onionServices = { services.tor.relay.onionServices = {
"rat" = mkIf cfg.rat.enable { "rat" = mkIf cfg.rat.enable {
name = "rat"; name = "rat";
map = [ { port = 22; } ]; map = [{ port = 22; }];
}; };
}; };
}; };

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
backupExcludes = [ backupExcludes = [
"/backup" "/backup"
"/dev" "/dev"

View file

@ -1,11 +1,6 @@
{ config, lib, ... }: { config, lib, ... }:
let let
inherit (lib) inherit (lib) mkEnableOption mkIf mkOption types;
mkEnableOption
mkIf
mkOption
types
;
cfg = config.dadada.borgServer; cfg = config.dadada.borgServer;
in in
{ {
@ -25,41 +20,31 @@ in
services.borgbackup.repos = { services.borgbackup.repos = {
"metis" = { "metis" = {
allowSubRepos = false; allowSubRepos = false;
authorizedKeysAppendOnly = [ authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDnc1gCi8lbhlLmPKvaExtCxVaAni8RrOuHUQO6wTbzR root@metis" ];
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDnc1gCi8lbhlLmPKvaExtCxVaAni8RrOuHUQO6wTbzR root@metis"
];
path = "${cfg.path}/metis"; path = "${cfg.path}/metis";
quota = "1T"; quota = "1T";
}; };
"gorgon" = { "gorgon" = {
allowSubRepos = false; allowSubRepos = false;
authorizedKeysAppendOnly = [ authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP6p9b2D7y2W+9BGee2yk2xsCRewNNaE6oS3CqlW61ti root@gorgon" ];
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP6p9b2D7y2W+9BGee2yk2xsCRewNNaE6oS3CqlW61ti root@gorgon"
];
path = "${cfg.path}/gorgon"; path = "${cfg.path}/gorgon";
quota = "1T"; quota = "1T";
}; };
"surgat" = { "surgat" = {
allowSubRepos = false; allowSubRepos = false;
authorizedKeysAppendOnly = [ authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGhatanrNG+M6jAkU7Yi44mJmTreJkqyZ6Z+qiEgV7O root@surgat" ];
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGhatanrNG+M6jAkU7Yi44mJmTreJkqyZ6Z+qiEgV7O root@surgat"
];
path = "${cfg.path}/surgat"; path = "${cfg.path}/surgat";
quota = "50G"; quota = "50G";
}; };
"pruflas" = { "pruflas" = {
allowSubRepos = false; allowSubRepos = false;
authorizedKeysAppendOnly = [ authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBk7f9DSnXCOIUsxFsjCKG23vHShV4TSzzPJunPOwa1I root@pruflas" ];
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBk7f9DSnXCOIUsxFsjCKG23vHShV4TSzzPJunPOwa1I root@pruflas"
];
path = "${cfg.path}/pruflas"; path = "${cfg.path}/pruflas";
quota = "50G"; quota = "50G";
}; };
"wohnzimmerpi" = { "wohnzimmerpi" = {
allowSubRepos = false; allowSubRepos = false;
authorizedKeysAppendOnly = [ authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK6uZ8mPQJWOL984gZKKPyxp7VLcxk42TpTh5iPP6N6k root@wohnzimmerpi" ];
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK6uZ8mPQJWOL984gZKKPyxp7VLcxk42TpTh5iPP6N6k root@wohnzimmerpi"
];
path = "${cfg.path}/wohnzimmerpi"; path = "${cfg.path}/wohnzimmerpi";
quota = "50G"; quota = "50G";
}; };

View file

@ -1,70 +1,52 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.ddns; cfg = config.dadada.ddns;
ddnsConfig = ddnsConfig = { domains, credentialsPath, interface }: {
{ systemd.timers = listToAttrs (forEach domains (domain:
domains, nameValuePair "ddns-${domain}"
credentialsPath, {
interface, wantedBy = [ "timers.target" ];
}: partOf = [ "ddns-${domain}.service" ];
{ timerConfig.OnCalendar = "hourly";
systemd.timers = listToAttrs ( }));
forEach domains (
domain:
nameValuePair "ddns-${domain}" {
wantedBy = [ "timers.target" ];
partOf = [ "ddns-${domain}.service" ];
timerConfig.OnCalendar = "hourly";
}
)
);
systemd.services = listToAttrs ( systemd.services = listToAttrs (forEach domains (domain:
forEach domains ( nameValuePair "ddns-${domain}"
domain: {
nameValuePair "ddns-${domain}" { serviceConfig = {
serviceConfig = { Type = "oneshot";
Type = "oneshot"; PrivateTmp = true;
PrivateTmp = true; PrivateDevices = true;
PrivateDevices = true; PrivateUsers = true;
PrivateUsers = true; PrivateMounts = true;
PrivateMounts = true; PrivateIPC = true;
PrivateIPC = true; ProtectHome = true;
ProtectHome = true; ProtectSystem = "strict";
ProtectSystem = "strict"; ProtectKernelTunables = true;
ProtectKernelTunables = true; BindReadOnlyPaths = [ credentialsPath ];
BindReadOnlyPaths = [ credentialsPath ]; NoNewPrivileges = true;
NoNewPrivileges = true; CapabilitBoundingSet = [ ];
CapabilitBoundingSet = [ ]; };
}; script = ''
script = '' function url() {
function url() { echo "https://svc.joker.com/nic/update?username=$1&password=$2&hostname=$3"
echo "https://svc.joker.com/nic/update?username=$1&password=$2&hostname=$3" }
}
IFS=':' IFS=':'
read -r user password < ${credentialsPath} read -r user password < ${credentialsPath}
unset IFS unset IFS
curl_url=$(url "$user" "$password" ${domain}) curl_url=$(url "$user" "$password" ${domain})
${pkgs.curl}/bin/curl --ipv4 "$curl_url" ${ ${pkgs.curl}/bin/curl --ipv4 "$curl_url" ${if interface == null then "" else "--interface ${interface}"} || true
if interface == null then "" else "--interface ${interface}" ${pkgs.curl}/bin/curl --ipv6 "$curl_url" ${if interface == null then "" else "--interface ${interface}"}
} || true '';
${pkgs.curl}/bin/curl --ipv6 "$curl_url" ${ }));
if interface == null then "" else "--interface ${interface}" };
}
'';
}
)
);
};
in in
{ {
options = { options = {

View file

@ -1,16 +1,8 @@
{ lib, ... }: { lib, ... }:
with lib; with lib; let
let modules' = dir: filterAttrs (name: type: (name != "default.nix" && name != "profiles" && ((hasSuffix ".nix" name) || (type == "directory"))))
modules' = (builtins.readDir dir);
dir: modules = dir: mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}")))
filterAttrs ( (modules' dir);
name: type:
(name != "default.nix" && name != "profiles" && ((hasSuffix ".nix" name) || (type == "directory")))
) (builtins.readDir dir);
modules =
dir:
mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}"))) (
modules' dir
);
in in
(modules ./.) (modules ./.)

View file

@ -1,8 +1,7 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
let let
cfg = config.dadada.element; cfg = config.dadada.element;

View file

@ -1,10 +1,8 @@
{ { config
config, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.fileShare; cfg = config.dadada.fileShare;
sharePath = "/mnt/storage/share"; sharePath = "/mnt/storage/share";
ipv6 = "fd42:dead:beef::/48"; ipv6 = "fd42:dead:beef::/48";

View file

@ -1,8 +1,7 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
let let
cfg = config.dadada.forgejo; cfg = config.dadada.forgejo;

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.headphones; cfg = config.dadada.headphones;
in in
{ {

View file

@ -1,13 +1,11 @@
{ { config
config, , lib
lib, , ...
...
}: }:
let let
cfg = config.dadada.homepage; cfg = config.dadada.homepage;
in in
with lib; with lib; {
{
options.dadada.homepage = { options.dadada.homepage = {
enable = mkEnableOption "Enable home page"; enable = mkEnableOption "Enable home page";
package = mkOption { package = mkOption {

View file

@ -1,8 +1,7 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
let let
cfg = config.dadada.inputs; cfg = config.dadada.inputs;

View file

@ -21,8 +21,6 @@ in
sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path; sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path;
}; };
age.secrets."${config.networking.hostName}-backup-passphrase".file = age.secrets."${config.networking.hostName}-backup-passphrase".file = "${secretsPath}/${config.networking.hostName}-backup-passphrase.age";
"${secretsPath}/${config.networking.hostName}-backup-passphrase.age"; age.secrets."${config.networking.hostName}-backup-ssh-key".file = "${secretsPath}/${config.networking.hostName}-backup-ssh-key.age";
age.secrets."${config.networking.hostName}-backup-ssh-key".file =
"${secretsPath}/${config.networking.hostName}-backup-ssh-key.age";
} }

View file

@ -1,9 +1,4 @@
{ { config, lib, pkgs, ... }:
config,
lib,
pkgs,
...
}:
let let
mkDefault = lib.mkDefault; mkDefault = lib.mkDefault;
inputs = config.dadada.inputs; inputs = config.dadada.inputs;
@ -32,7 +27,7 @@ in
nix.package = pkgs.lix; nix.package = pkgs.lix;
nix.settings.substituters = [ "https://cache.nixos.org/" ]; nix.settings.substituters = [ https://cache.nixos.org/ ];
nix.settings.trusted-public-keys = [ nix.settings.trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=" "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
@ -61,10 +56,7 @@ in
services.resolved = { services.resolved = {
enable = mkDefault true; enable = mkDefault true;
fallbackDns = [ fallbackDns = [ "9.9.9.9#dns.quad9.net" "2620:fe::fe:11#dns11.quad9.net" ];
"9.9.9.9#dns.quad9.net"
"2620:fe::fe:11#dns11.quad9.net"
];
}; };
programs.zsh.enable = mkDefault true; programs.zsh.enable = mkDefault true;
@ -72,3 +64,4 @@ in
# Avoid some bots # Avoid some bots
services.openssh.ports = [ 2222 ]; services.openssh.ports = [ 2222 ];
} }

View file

@ -21,13 +21,14 @@ in
hostKeys = [ hostKeys = [
config.age.secrets."${initrdHostKey}".path config.age.secrets."${initrdHostKey}".path
]; ];
authorizedKeys = authorizedKeys = with lib;
with lib; concatLists (mapAttrsToList
concatLists ( (name: user:
mapAttrsToList ( if elem "wheel" user.extraGroups then
name: user: if elem "wheel" user.extraGroups then user.openssh.authorizedKeys.keys else [ ] user.openssh.authorizedKeys.keys
) config.users.users else
); [ ])
config.users.users);
}; };
postCommands = '' postCommands = ''
echo 'cryptsetup-askpass' >> /root/.profile echo 'cryptsetup-askpass' >> /root/.profile
@ -35,9 +36,7 @@ in
}; };
assertions = lib.singleton { assertions = lib.singleton {
assertion = assertion = (config.boot.initrd.network.ssh.hostKeys != [ ]) -> config.boot.loader.supportsInitrdSecrets == true;
(config.boot.initrd.network.ssh.hostKeys != [ ])
-> config.boot.loader.supportsInitrdSecrets == true;
message = "Refusing to store private keys in store"; message = "Refusing to store private keys in store";
}; };

View file

@ -1,14 +1,12 @@
{ { config
config, , lib
lib, , ...
...
}: }:
let let
inputs = config.dadada.inputs; inputs = config.dadada.inputs;
secretsPath = config.dadada.secrets.path; secretsPath = config.dadada.secrets.path;
in in
with lib; with lib; {
{
imports = [ imports = [
./backup.nix ./backup.nix
./base.nix ./base.nix
@ -55,6 +53,5 @@ with lib;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase-gs".path; passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase-gs".path;
}; };
age.secrets."${config.networking.hostName}-backup-passphrase-gs".file = age.secrets."${config.networking.hostName}-backup-passphrase-gs".file = "${secretsPath}/${config.networking.hostName}-backup-passphrase-gs.age";
"${secretsPath}/${config.networking.hostName}-backup-passphrase-gs.age";
} }

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; {
{
imports = [ imports = [
./backup.nix ./backup.nix
./base.nix ./base.nix
@ -18,9 +16,7 @@ with lib;
documentation.enable = mkDefault false; documentation.enable = mkDefault false;
documentation.nixos.enable = mkDefault false; documentation.nixos.enable = mkDefault false;
services.btrfs.autoScrub.enable = mkDefault ( services.btrfs.autoScrub.enable = mkDefault ((filterAttrs (name: fs: fs.fsType == "btrfs") config.fileSystems) != { });
(filterAttrs (name: fs: fs.fsType == "btrfs") config.fileSystems) != { }
);
services.journald.extraConfig = '' services.journald.extraConfig = ''
SystemKeepFree = 2G SystemKeepFree = 2G

View file

@ -1,9 +1,4 @@
{ { config, pkgs, lib, ... }:
config,
pkgs,
lib,
...
}:
{ {
environment.systemPackages = lib.mkIf config.services.postgresql.enable [ environment.systemPackages = lib.mkIf config.services.postgresql.enable [
( (

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.share; cfg = config.dadada.share;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.steam; cfg = config.dadada.steam;
in in
{ {

View file

@ -1,32 +1,28 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.vpnServer; cfg = config.dadada.vpnServer;
wgPeer = wgPeer = { name, ... }: {
{ name, ... }: options = {
{ name = mkOption {
options = { internal = true;
name = mkOption { default = name;
internal = true; };
default = name; id = mkOption {
}; description = "VPN client id";
id = mkOption { default = 0;
description = "VPN client id"; type = types.str;
default = 0; };
type = types.str; key = mkOption {
}; description = "VPN client public key";
key = mkOption { default = "";
description = "VPN client public key"; type = types.str;
default = "";
type = types.str;
};
}; };
}; };
};
in in
{ {
options.dadada.vpnServer = { options.dadada.vpnServer = {
@ -45,10 +41,13 @@ in
privateKeyFile = "/var/lib/wireguard/wg0-key"; privateKeyFile = "/var/lib/wireguard/wg0-key";
ips = [ "fd42:9c3b:f96d:0201::0/64" ]; ips = [ "fd42:9c3b:f96d:0201::0/64" ];
listenPort = 51234; listenPort = 51234;
peers = map (peer: { peers =
allowedIPs = [ "fd42:9c3b:f96d:0201::${peer.id}/128" ]; map
publicKey = peer.key; (peer: {
}) (attrValues cfg.peers); allowedIPs = [ "fd42:9c3b:f96d:0201::${peer.id}/128" ];
publicKey = peer.key;
})
(attrValues cfg.peers);
postSetup = '' postSetup = ''
wg set wg0 fwmark 51234 wg set wg0 fwmark 51234
ip -6 route add table 2468 fd42:9c3b:f96d::/48 dev ens3 ip -6 route add table 2468 fd42:9c3b:f96d::/48 dev ens3

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
cfg = config.dadada.weechat; cfg = config.dadada.weechat;
in in
{ {

View file

@ -1,11 +1,9 @@
{ { config
config, , pkgs
pkgs, , lib
lib, , ...
...
}: }:
with lib; with lib; let
let
yubikey = config.dadada.yubikey; yubikey = config.dadada.yubikey;
in in
{ {

View file

@ -1,9 +1,4 @@
{ { config, pkgs, lib, ... }:
config,
pkgs,
lib,
...
}:
let let
hostAliases = [ hostAliases = [
"ifrit.dadada.li" "ifrit.dadada.li"
@ -42,10 +37,7 @@ in
}; };
}; };
services.openssh.ports = [ services.openssh.ports = [ 22 2222 ];
22
2222
];
dadada.backupClient.bs.enable = false; dadada.backupClient.bs.enable = false;
dadada.backupClient.backup1.enable = false; dadada.backupClient.backup1.enable = false;
@ -67,9 +59,7 @@ in
boot.loader.efi.canTouchEfiVariables = true; boot.loader.efi.canTouchEfiVariables = true;
assertions = lib.singleton { assertions = lib.singleton {
assertion = assertion = (config.boot.initrd.network.ssh.hostKeys != [ ]) -> config.boot.loader.supportsInitrdSecrets == true;
(config.boot.initrd.network.ssh.hostKeys != [ ])
-> config.boot.loader.supportsInitrdSecrets == true;
message = "Refusing to store private keys in store"; message = "Refusing to store private keys in store";
}; };
@ -193,12 +183,7 @@ in
{ {
hostName = "localhost"; hostName = "localhost";
system = "x86_64-linux"; system = "x86_64-linux";
supportedFeatures = [ supportedFeatures = [ "kvm" "nixos-test" "big-parallel" "benchmark" ];
"kvm"
"nixos-test"
"big-parallel"
"benchmark"
];
maxJobs = 16; maxJobs = 16;
} }
]; ];
@ -292,48 +277,26 @@ in
}; };
"30-wg0" = { "30-wg0" = {
matchConfig.Name = "wg0"; matchConfig.Name = "wg0";
address = [ address = [ "10.3.3.3/32" "fd42:9c3b:f96d:121::3/128" ];
"10.3.3.3/32"
"fd42:9c3b:f96d:121::3/128"
];
DHCP = "no"; DHCP = "no";
networkConfig.IPv6AcceptRA = false; networkConfig.IPv6AcceptRA = false;
linkConfig.RequiredForOnline = false; linkConfig.RequiredForOnline = false;
routes = [ routes = [
{ { routeConfig = { Destination = "10.3.3.1/24"; }; }
routeConfig = { { routeConfig = { Destination = "fd42:9c3b:f96d:121::1/64"; }; }
Destination = "10.3.3.1/24";
};
}
{
routeConfig = {
Destination = "fd42:9c3b:f96d:121::1/64";
};
}
]; ];
}; };
"30-uwu" = { "30-uwu" = {
matchConfig.Name = "uwu"; matchConfig.Name = "uwu";
address = [ address = [ "10.11.0.39/24" "fc00:1337:dead:beef::10.11.0.39/128" ];
"10.11.0.39/24"
"fc00:1337:dead:beef::10.11.0.39/128"
];
dns = [ "10.11.0.1%uwu#uwu" ]; dns = [ "10.11.0.1%uwu#uwu" ];
domains = [ "uwu" ]; domains = [ "uwu" ];
DHCP = "no"; DHCP = "no";
networkConfig.IPv6AcceptRA = false; networkConfig.IPv6AcceptRA = false;
linkConfig.RequiredForOnline = false; linkConfig.RequiredForOnline = false;
routes = [ routes = [
{ { routeConfig = { Destination = "10.11.0.0/22"; }; }
routeConfig = { { routeConfig = { Destination = "fc00:1337:dead:beef::10.11.0.0/118"; }; }
Destination = "10.11.0.0/22";
};
}
{
routeConfig = {
Destination = "fc00:1337:dead:beef::10.11.0.0/118";
};
}
]; ];
}; };
"20-br0" = { "20-br0" = {
@ -374,10 +337,7 @@ in
{ {
wireguardPeerConfig = { wireguardPeerConfig = {
PublicKey = "KzL+PKlv4LktIqqTqC9Esw8dkSZN2qSn/vq76UHbOlY="; PublicKey = "KzL+PKlv4LktIqqTqC9Esw8dkSZN2qSn/vq76UHbOlY=";
AllowedIPs = [ AllowedIPs = [ "10.3.3.1/32" "fd42:9c3b:f96d:121::1/128" ];
"10.3.3.1/32"
"fd42:9c3b:f96d:121::1/128"
];
PersistentKeepalive = 25; PersistentKeepalive = 25;
Endpoint = "surgat.dadada.li:51235"; Endpoint = "surgat.dadada.li:51235";
}; };
@ -385,10 +345,7 @@ in
{ {
wireguardPeerConfig = { wireguardPeerConfig = {
PublicKey = "INfv++4R+Kd2jdh/3CooM70ZeeoN6aeU6mo+T4C8gWU="; PublicKey = "INfv++4R+Kd2jdh/3CooM70ZeeoN6aeU6mo+T4C8gWU=";
AllowedIPs = [ AllowedIPs = [ "10.3.3.2/32" "fd42:9c3b:f96d:121::2/128" ];
"10.3.3.2/32"
"fd42:9c3b:f96d:121::2/128"
];
Endpoint = "192.168.101.1:51235"; Endpoint = "192.168.101.1:51235";
}; };
} }
@ -402,21 +359,15 @@ in
wireguardConfig = { wireguardConfig = {
PrivateKeyFile = config.age.secrets.${uwuPrivKey}.path; PrivateKeyFile = config.age.secrets.${uwuPrivKey}.path;
}; };
wireguardPeers = [ wireguardPeers = [{
{ wireguardPeerConfig = {
wireguardPeerConfig = { PublicKey = "tuoiOWqgHz/lrgTcLjX+xIhvxh9jDH6gmDw2ZMvX5T8=";
PublicKey = "tuoiOWqgHz/lrgTcLjX+xIhvxh9jDH6gmDw2ZMvX5T8="; AllowedIPs = [ "10.11.0.0/22" "fc00:1337:dead:beef::10.11.0.0/118" "192.168.178.0/23" ];
AllowedIPs = [ PersistentKeepalive = 25;
"10.11.0.0/22" PresharedKeyFile = config.age.secrets.${uwuPresharedKey}.path;
"fc00:1337:dead:beef::10.11.0.0/118" Endpoint = "53c70r.de:51820";
"192.168.178.0/23" };
]; }];
PersistentKeepalive = 25;
PresharedKeyFile = config.age.secrets.${uwuPresharedKey}.path;
Endpoint = "53c70r.de:51820";
};
}
];
}; };
}; };
}; };

View file

@ -1,115 +1,89 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ { config, lib, modulesPath, ... }:
config,
lib,
modulesPath,
...
}:
{ {
imports = [ imports =
(modulesPath + "/installer/scan/not-detected.nix") [
]; (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [ "igc" "xhci_pci" "thunderbolt" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" ];
"igc"
"xhci_pci"
"thunderbolt"
"ahci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" =
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714"; {
fsType = "btrfs"; device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
options = [ "compress=zstd" ]; fsType = "btrfs";
}; options = [ "compress=zstd" ];
};
boot.initrd.luks.devices."luks".device = "/dev/disk/by-uuid/bac4ee0e-e393-414f-ac3e-1ec20739abae"; boot.initrd.luks.devices."luks".device = "/dev/disk/by-uuid/bac4ee0e-e393-414f-ac3e-1ec20739abae";
fileSystems."/swap" = { fileSystems."/swap" =
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [
"subvol=swap"
"noatime"
];
};
fileSystems."/nix" = {
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [
"subvol=nix"
"noatime"
"compress=zstd"
];
};
fileSystems."/var" = {
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [
"subvol=var"
"compress=zstd"
];
};
fileSystems."/home" = {
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [
"subvol=home"
"compress=zstd"
];
};
fileSystems."/root" = {
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [
"subvol=root"
"compress=zstd"
];
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/2E20-49CB";
fsType = "vfat";
};
swapDevices = [
{ {
device = "/swap/swapfile"; device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
size = 32 * 1024; # 32 GByte fsType = "btrfs";
} options = [ "subvol=swap" "noatime" ];
]; };
fileSystems."/mnt/storage" = { fileSystems."/nix" =
device = "/dev/disk/by-uuid/ce483e75-5886-4b03-a3f9-675b80560ac9"; {
fsType = "btrfs"; device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
options = [ fsType = "btrfs";
"subvol=root" options = [ "subvol=nix" "noatime" "compress=zstd" ];
"compress=zstd" };
];
};
fileSystems."/mnt/storage/backups" = { fileSystems."/var" =
device = "/dev/disk/by-uuid/ce483e75-5886-4b03-a3f9-675b80560ac9"; {
fsType = "btrfs"; device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
options = [ fsType = "btrfs";
"subvol=backups" options = [ "subvol=var" "compress=zstd" ];
"noatime" };
];
}; fileSystems."/home" =
{
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [ "subvol=home" "compress=zstd" ];
};
fileSystems."/root" =
{
device = "/dev/disk/by-uuid/7ca5fd2a-2a56-48fe-bd48-1e51b6a66714";
fsType = "btrfs";
options = [ "subvol=root" "compress=zstd" ];
};
fileSystems."/boot" =
{
device = "/dev/disk/by-uuid/2E20-49CB";
fsType = "vfat";
};
swapDevices = [{
device = "/swap/swapfile";
size = 32 * 1024; # 32 GByte
}];
fileSystems."/mnt/storage" =
{
device = "/dev/disk/by-uuid/ce483e75-5886-4b03-a3f9-675b80560ac9";
fsType = "btrfs";
options = [ "subvol=root" "compress=zstd" ];
};
fileSystems."/mnt/storage/backups" =
{
device = "/dev/disk/by-uuid/ce483e75-5886-4b03-a3f9-675b80560ac9";
fsType = "btrfs";
options = [ "subvol=backups" "noatime" ];
};
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";

View file

@ -1,7 +1,6 @@
{ { config
config, , pkgs
pkgs, , ...
...
}: }:
let let
hostName = "surgat"; hostName = "surgat";
@ -86,29 +85,14 @@ in
}; };
"10-ninurta" = { "10-ninurta" = {
matchConfig.Name = "ninurta"; matchConfig.Name = "ninurta";
address = [ address = [ "10.3.3.1/32" "fd42:9c3b:f96d:121::1/128" ];
"10.3.3.1/32"
"fd42:9c3b:f96d:121::1/128"
];
DHCP = "no"; DHCP = "no";
networkConfig.IPv6AcceptRA = false; networkConfig.IPv6AcceptRA = false;
linkConfig.RequiredForOnline = "no"; linkConfig.RequiredForOnline = "no";
routes = [ routes = [
{ { routeConfig = { Destination = "10.3.3.3/24"; }; }
routeConfig = { { routeConfig = { Destination = "fd42:9c3b:f96d:121::/64"; }; }
Destination = "10.3.3.3/24"; { routeConfig = { Destination = "fd42:9c3b:f96d:101::/64"; }; }
};
}
{
routeConfig = {
Destination = "fd42:9c3b:f96d:121::/64";
};
}
{
routeConfig = {
Destination = "fd42:9c3b:f96d:101::/64";
};
}
]; ];
}; };
}; };
@ -122,18 +106,12 @@ in
PrivateKeyFile = "/var/lib/wireguard/hydra"; PrivateKeyFile = "/var/lib/wireguard/hydra";
ListenPort = 51235; ListenPort = 51235;
}; };
wireguardPeers = [ wireguardPeers = [{
{ wireguardPeerConfig = {
wireguardPeerConfig = { PublicKey = "Kw2HVRb1zeA7NAzBvI3UzmOj45VqM358EBuZWdlAUDE=";
PublicKey = "Kw2HVRb1zeA7NAzBvI3UzmOj45VqM358EBuZWdlAUDE="; AllowedIPs = [ "10.3.3.3/32" "fd42:9c3b:f96d:121::3/128" "fd42:9c3b:f96d:101:4a21:bff:fe3e:9cfe/128" ];
AllowedIPs = [ };
"10.3.3.3/32" }];
"fd42:9c3b:f96d:121::3/128"
"fd42:9c3b:f96d:101:4a21:bff:fe3e:9cfe/128"
];
};
}
];
}; };
}; };
}; };
@ -165,10 +143,7 @@ in
services.resolved = { services.resolved = {
enable = true; enable = true;
fallbackDns = [ fallbackDns = [ "9.9.9.9" "2620:fe::fe" ];
"9.9.9.9"
"2620:fe::fe"
];
}; };
system.autoUpgrade.allowReboot = false; system.autoUpgrade.allowReboot = false;

View file

@ -1,25 +1,17 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ { config
config, , lib
lib, , pkgs
pkgs, , modulesPath
modulesPath, , ...
... }: {
}:
{
imports = [ imports = [
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
]; ];
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [ "ata_piix" "virtio_pci" "xhci_pci" "sd_mod" "sr_mod" ];
"ata_piix"
"virtio_pci"
"xhci_pci"
"sd_mod"
"sr_mod"
];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ]; boot.kernelModules = [ ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];

View file

@ -26,7 +26,7 @@
in in
import ./devshell.nix { inherit pkgs extraModules; }; import ./devshell.nix { inherit pkgs extraModules; };
formatter = pkgs.nixfmt-tree; formatter = pkgs.nixpkgs-fmt;
packages = import ./pkgs { inherit pkgs; } // { packages = import ./pkgs { inherit pkgs; } // {
installer-iso = self.nixosConfigurations.installer.config.system.build.isoImage; installer-iso = self.nixosConfigurations.installer.config.system.build.isoImage;

View file

@ -1 +1,2 @@
{ } {
}

View file

@ -1 +1,2 @@
{ pkgs }: { } { pkgs }:
{ }

View file

@ -9,82 +9,30 @@ let
surgat = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOOJ9UgAle5sX0pAawfRztckVwaQm2U8o0Bawv7cZfXE root@surgat"; surgat = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOOJ9UgAle5sX0pAawfRztckVwaQm2U8o0Bawv7cZfXE root@surgat";
}; };
backupSecrets = hostName: { backupSecrets = hostName: {
"${hostName}-backup-passphrase.age".publicKeys = [ "${hostName}-backup-passphrase.age".publicKeys = [ systems.${hostName} dadada ];
systems.${hostName} "${hostName}-backup-ssh-key.age".publicKeys = [ systems.${hostName} dadada ];
dadada
];
"${hostName}-backup-ssh-key.age".publicKeys = [
systems.${hostName}
dadada
];
}; };
in in
{ {
"pruflas-wg0-key.age".publicKeys = [ "pruflas-wg0-key.age".publicKeys = [ systems.ninurta dadada ];
systems.ninurta "pruflas-wg0-preshared-key.age".publicKeys = [ systems.ninurta dadada ];
dadada "pruflas-wg-hydra-key.age".publicKeys = [ systems.ninurta dadada ];
]; "hydra-github-authorization.age".publicKeys = [ systems.ninurta dadada ];
"pruflas-wg0-preshared-key.age".publicKeys = [ "miniflux-admin-credentials.age".publicKeys = [ systems.surgat dadada ];
systems.ninurta "gorgon-backup-passphrase-gs.age".publicKeys = [ systems.gorgon dadada ];
dadada "paperless.age".publicKeys = [ systems.gorgon dadada ];
]; "initrd-surgat-ssh_host_ed25519_key.age".publicKeys = [ systems.surgat dadada ];
"pruflas-wg-hydra-key.age".publicKeys = [ "surgat-ssh_host_ed25519_key.age".publicKeys = [ systems.surgat dadada ];
systems.ninurta "ninurta-initrd-ssh-key.age".publicKeys = [ systems.ninurta dadada ];
dadada "ddns-credentials.age".publicKeys = [ systems.agares systems.ninurta dadada ];
]; "etc-ppp-chap-secrets.age".publicKeys = [ systems.agares dadada ];
"hydra-github-authorization.age".publicKeys = [ "etc-ppp-telekom-secret.age".publicKeys = [ systems.agares dadada ];
systems.ninurta "wg-privkey-vpn-dadada-li.age".publicKeys = [ systems.agares dadada ];
dadada "agares-wg0-key.age".publicKeys = [ systems.agares dadada ];
]; } //
"miniflux-admin-credentials.age".publicKeys = [ backupSecrets "ninurta" //
systems.surgat backupSecrets "gorgon" //
dadada backupSecrets "ifrit" //
]; backupSecrets "pruflas" //
"gorgon-backup-passphrase-gs.age".publicKeys = [ backupSecrets "surgat" //
systems.gorgon backupSecrets "agares"
dadada
];
"paperless.age".publicKeys = [
systems.gorgon
dadada
];
"initrd-surgat-ssh_host_ed25519_key.age".publicKeys = [
systems.surgat
dadada
];
"surgat-ssh_host_ed25519_key.age".publicKeys = [
systems.surgat
dadada
];
"ninurta-initrd-ssh-key.age".publicKeys = [
systems.ninurta
dadada
];
"ddns-credentials.age".publicKeys = [
systems.agares
systems.ninurta
dadada
];
"etc-ppp-chap-secrets.age".publicKeys = [
systems.agares
dadada
];
"etc-ppp-telekom-secret.age".publicKeys = [
systems.agares
dadada
];
"wg-privkey-vpn-dadada-li.age".publicKeys = [
systems.agares
dadada
];
"agares-wg0-key.age".publicKeys = [
systems.agares
dadada
];
}
// backupSecrets "ninurta"
// backupSecrets "gorgon"
// backupSecrets "ifrit"
// backupSecrets "pruflas"
// backupSecrets "surgat"
// backupSecrets "agares"