mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 17:17:22 +01:00
134 lines
3.4 KiB
Nix
134 lines
3.4 KiB
Nix
{ self, config, inputs, pkgs, ... }:
|
|
|
|
{
|
|
imports = [
|
|
|
|
inputs.sops-nix.nixosModules.sops
|
|
./hardware-configuration.nix
|
|
];
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
git
|
|
gnupg
|
|
ssh-to-age
|
|
];
|
|
|
|
services.xserver.xkb = {
|
|
layout = "us";
|
|
variant = "altgr-intl";
|
|
};
|
|
|
|
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
|
|
|
sops = {
|
|
age.sshKeyPaths = [ "/etc/ssh/sops" ];
|
|
defaultSopsFile = "/root/.dotfiles/secrets/sync/secrets.yaml";
|
|
validateSopsFiles = false;
|
|
secrets.swarsel = { owner = "root"; };
|
|
secrets.dnstokenfull = { owner = "acme"; };
|
|
templates."certs.secret".content = ''
|
|
CF_DNS_API_TOKEN=${config.sops.placeholder.dnstokenfull}
|
|
'';
|
|
};
|
|
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
preliminarySelfsigned = false;
|
|
defaults.email = "mrswarsel@gmail.com";
|
|
defaults.dnsProvider = "cloudflare";
|
|
defaults.environmentFile = "${config.sops.templates."certs.secret".path}";
|
|
};
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
recommendedProxySettings = true;
|
|
recommendedTlsSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedGzipSettings = true;
|
|
virtualHosts = {
|
|
|
|
"synki.swarsel.win" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
acmeRoot = null;
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://localhost:27701";
|
|
extraConfig = ''
|
|
client_max_body_size 0;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
"sync.swarsel.win" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
acmeRoot = null;
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://localhost:8384/";
|
|
extraConfig = ''
|
|
client_max_body_size 0;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
};
|
|
};
|
|
|
|
boot.tmp.cleanOnBoot = true;
|
|
zramSwap.enable = false;
|
|
networking = {
|
|
hostName = "sync";
|
|
enableIPv6 = false;
|
|
domain = "subnet03112148.vcn03112148.oraclevcn.com";
|
|
firewall.extraCommands = ''
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 27701 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 8384 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 3000 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p tcp --dport 22000 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p udp --dport 22000 -j ACCEPT
|
|
iptables -I INPUT -m state --state NEW -p udp --dport 21027 -j ACCEPT
|
|
'';
|
|
};
|
|
services.openssh = {
|
|
enable = true;
|
|
# settings.PermitRootLogin = "yes";
|
|
};
|
|
users.users.root.openssh.authorizedKeys.keyFiles = [
|
|
"${self}/secrets/keys/ssh/nbl-imba-2.pub"
|
|
];
|
|
|
|
system.stateVersion = "23.11"; # TEMPLATE - but probably no need to change
|
|
|
|
environment.shellAliases = {
|
|
nswitch = "cd ~/.dotfiles; git pull; nixos-rebuild --flake .#$(hostname) switch; cd -;";
|
|
};
|
|
|
|
boot.loader.grub.device = "nodev";
|
|
|
|
services.anki-sync-server = {
|
|
enable = true;
|
|
port = 27701;
|
|
address = "0.0.0.0";
|
|
openFirewall = true;
|
|
users = [
|
|
{
|
|
username = "Swarsel";
|
|
passwordFile = config.sops.secrets.swarsel.path;
|
|
}
|
|
];
|
|
};
|
|
|
|
services.syncthing = {
|
|
enable = true;
|
|
guiAddress = "0.0.0.0:8384";
|
|
openDefaultPorts = true;
|
|
};
|
|
|
|
|
|
}
|