snowfield/machines/gustave/default.nix

192 lines
4 KiB
Nix
Raw Normal View History

2024-08-14 22:13:13 +02:00
{
pkgs,
inputs,
profiles,
2024-09-04 15:30:04 +02:00
lib,
2024-08-14 22:13:13 +02:00
...
}:
2024-04-05 00:34:14 +02:00
{
2024-05-09 00:52:39 +02:00
imports = [
./hardware.nix
./home-julien.nix
2024-08-12 18:15:30 +02:00
./nsd.nix
2024-09-03 22:03:09 +02:00
./borg.nix
# Performance is not as good as we expected, wait for pages v3
# ./pages.nix
2024-11-01 22:43:02 +01:00
./readeck.nix
2024-12-06 17:13:46 +01:00
./plausible.nix
./nextcloud.nix
2025-01-10 02:33:26 +01:00
./glance.nix
2025-01-19 22:54:03 +01:00
./syncthing.nix
2025-02-02 17:44:03 +01:00
"${inputs.unstable}/nixos/modules/services/web-apps/readeck.nix"
2024-05-09 00:52:39 +02:00
];
2024-04-05 00:34:14 +02:00
2025-03-13 00:15:46 +01:00
users.users.julien.linger = true;
services.openssh.extraConfig = ''
HostCertificate /etc/ssh/ssh_host_ed25519_key-cert.pub
HostKey /etc/ssh/ssh_host_ed25519_key
TrustedUserCAKeys /etc/ssh/ssh_user_key.pub
MaxAuthTries 20
'';
2024-08-10 17:56:30 +02:00
machine.meta = {
arch = "x86_64-linux";
nixpkgs_version = inputs.nixpkgs;
hm_version = inputs.home-manager;
2024-09-02 16:42:35 +02:00
profiles = with profiles; [
vm-simple-network
server
behind-sniproxy
2024-09-02 16:42:35 +02:00
];
2024-08-12 18:12:00 +02:00
ips = {
public.ipv4 = "82.67.34.230";
local.ipv4 = "192.168.0.90";
vpn.ipv4 = "100.100.45.24";
public.ipv6 = "2a01:e0a:de4:a0e1:eb2:aaaa::45";
vpn.ipv6 = "fd7a:115c:a1e0::18";
2024-08-10 17:56:30 +02:00
};
};
2024-09-05 10:55:09 +02:00
luj.docs = {
enable = true;
nginx.enable = true;
nginx.subdomain = "docs";
};
2024-09-27 18:43:23 +02:00
2025-03-13 00:15:46 +01:00
security.polkit.enable = true;
2024-04-05 00:34:14 +02:00
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
programs.fuse.userAllowOther = true;
2024-04-05 00:34:14 +02:00
deployment.tags = [ "server" ];
2024-04-05 00:34:14 +02:00
disko = import ./disko.nix;
2025-01-03 00:16:39 +01:00
nixpkgs.config.permittedInsecurePackages = [
"dotnet-sdk-6.0.428"
"aspnetcore-runtime-6.0.36"
];
systemd.network.netdevs = {
"20-wg0" = {
netdevConfig = {
Kind = "wireguard";
Name = "wg0";
MTUBytes = "1300";
};
wireguardConfig = {
PrivateKeyFile = "/srv/wg-private";
ListenPort = 51820;
};
wireguardPeers = [
{
2024-12-01 17:58:31 +01:00
PublicKey = "oYsN1Qy+a7dwVOKapN5s5KJOmhSflLHZqh+GLMeNpHw=";
AllowedIPs = [ "0.0.0.0/0" ];
Endpoint = "[${lib.snowfield.akhaten.ips.public.ipv6}]:51821";
PersistentKeepalive = 25;
}
];
};
};
systemd.network.networks."30-wg0" = {
matchConfig.Name = "wg0";
addresses = [
{
2024-12-01 17:58:31 +01:00
Address = "10.100.45.2/24";
AddPrefixRoute = false;
}
];
2024-07-08 16:45:48 +02:00
routes = [
{
2024-12-01 17:58:31 +01:00
Gateway = "10.100.45.1";
Destination = "10.100.45.0/24";
2024-07-08 16:45:48 +02:00
}
];
DHCP = "no";
networkConfig = {
IPv6AcceptRA = false;
};
};
2024-07-04 22:25:24 +02:00
services.forgejo = {
enable = true;
2024-09-02 18:24:46 +02:00
package = pkgs.unstable.forgejo;
2024-07-06 18:40:12 +02:00
settings = {
server = {
ROOT_URL = "https://git.luj.fr/";
LANDING_PAGE = "luj";
};
};
2024-07-04 22:25:24 +02:00
};
services.openssh.ports = [ 22 ];
2024-07-04 22:25:24 +02:00
services.nginx.virtualHosts."git.luj.fr" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:3000";
proxyWebsockets = true;
};
};
2024-05-09 00:52:39 +02:00
environment.persistence."/persistent" = {
hideMounts = true;
directories = [
2024-05-22 16:33:09 +02:00
"/var/lib"
"/var/log"
2024-05-25 19:33:42 +02:00
"/srv"
];
2024-05-09 00:52:39 +02:00
files = [
"/etc/machine-id"
2024-05-09 00:52:39 +02:00
"/etc/ssh/ssh_host_ed25519_key"
"/etc/ssh/ssh_host_ed25519_key.pub"
];
2024-04-05 00:34:14 +02:00
};
2024-05-25 19:33:42 +02:00
fileSystems."/srv".neededForBoot = true;
2024-09-02 16:43:33 +02:00
environment.systemPackages = [ pkgs.tailscale ];
2024-05-22 15:03:02 +02:00
services.tailscale.enable = true;
2024-05-22 15:02:00 +02:00
luj.irc = {
enable = true;
nginx = {
enable = true;
subdomain = "irc";
};
};
2024-05-23 00:20:28 +02:00
luj.homepage.enable = true;
2024-05-23 19:27:59 +02:00
luj.mediaserver = {
enable = true;
tv.enable = true;
2024-12-13 21:22:49 +01:00
music.enable = false;
2024-05-23 19:27:59 +02:00
};
2024-05-25 19:07:53 +02:00
luj.deluge.interface = "wg0";
2024-05-23 00:20:28 +02:00
networking.firewall.allowedTCPPorts = [ 51820 ];
networking.firewall.allowedUDPPorts = [ 51820 ];
services.roundcube = {
enable = true;
plugins = [
"managesieve"
];
hostName = "webmail.luj.fr";
extraConfig = ''
# starttls needed for authentication, so the fqdn required to match
# the certificate
$config['smtp_server'] = "tls://mail.luj.fr";
$config['smtp_user'] = "%u";
$config['smtp_pass'] = "%p";
$config['imap_host'] = 'ssl://mail.luj.fr';
'';
};
2024-05-09 00:52:39 +02:00
system.stateVersion = "23.11";
2024-04-05 00:34:14 +02:00
}