210 lines
5.5 KiB
Nix
210 lines
5.5 KiB
Nix
{ config, pkgs, ... }:
|
|
|
|
let
|
|
sshKeys = [
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAM15boHYClgaBXAIyWSjbJd3W/bwcIE6YZwLu/K+Ipp ant@nixos"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKCTCKcHgCZOlGeCEz0+HcoYMyXzFy3l3igsG+nhMC8Z ant@moon"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB5zrLxiyG6T5eupXT/wqhvtt8Cuak4DtPEzCyksqa1a ant@allegro"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKt6WkeBNowTOqSv1GAvTSIMReaMDvltOKGpUC2jStGG ant@hs"
|
|
];
|
|
domain = "antoinev.freeboxos.fr";
|
|
# ./ssh/authorized_keys_root;
|
|
in {
|
|
imports = [
|
|
./hardware-configuration.nix
|
|
./syncthing.nix
|
|
./disks.nix
|
|
];
|
|
|
|
nix.settings = { experimental-features = [ "nix-command" "flakes" ]; };
|
|
|
|
boot.kernelParams = [ "ip=dhcp" ];
|
|
boot = {
|
|
loader.systemd-boot.enable = true;
|
|
loader.efi.canTouchEfiVariables = true;
|
|
initrd = {
|
|
availableKernelModules = [ "r8169" ];
|
|
network = {
|
|
enable = true;
|
|
ssh = {
|
|
enable = true;
|
|
port = 22;
|
|
authorizedKeys = sshKeys;
|
|
hostKeys = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
|
shell = "/bin/cryptsetup-askpass";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
hardware.graphics = {
|
|
enable = true;
|
|
enable32Bit = true;
|
|
extraPackages = with pkgs; [ nvidia-vaapi-driver ];
|
|
|
|
};
|
|
|
|
hardware.nvidia.package =
|
|
config.boot.kernelPackages.nvidiaPackages.legacy_535;
|
|
|
|
services.xserver.videoDrivers = [ "nvidia" ];
|
|
|
|
networking.hostName = "hs"; # Define your hostname.
|
|
networking.networkmanager.enable = true;
|
|
networking.domain = domain;
|
|
|
|
time.timeZone = "Europe/Paris";
|
|
i18n.defaultLocale = "fr_FR.UTF-8";
|
|
i18n.extraLocaleSettings = {
|
|
LC_ADDRESS = "fr_FR.UTF-8";
|
|
LC_IDENTIFICATION = "fr_FR.UTF-8";
|
|
LC_MEASUREMENT = "fr_FR.UTF-8";
|
|
LC_MONETARY = "fr_FR.UTF-8";
|
|
LC_NAME = "fr_FR.UTF-8";
|
|
LC_NUMERIC = "fr_FR.UTF-8";
|
|
LC_PAPER = "fr_FR.UTF-8";
|
|
LC_TELEPHONE = "fr_FR.UTF-8";
|
|
LC_TIME = "fr_FR.UTF-8";
|
|
};
|
|
services.xserver.xkb = {
|
|
layout = "fr";
|
|
variant = "";
|
|
};
|
|
console.keyMap = "fr";
|
|
|
|
users.users.ant = {
|
|
isNormalUser = true;
|
|
description = "ant";
|
|
extraGroups = [ "networkmanager" "wheel" ];
|
|
openssh.authorizedKeys.keys = sshKeys;
|
|
};
|
|
security.sudo.wheelNeedsPassword = false;
|
|
|
|
nixpkgs.config.allowUnfree = true;
|
|
environment.systemPackages = with pkgs; [ neovim tmux nh git curl wget htop ];
|
|
|
|
# Some programs need SUID wrappers, can be configured further or are
|
|
# started in user sessions.
|
|
# programs.mtr.enable = true;
|
|
# programs.gnupg.agent = {
|
|
# enable = true;
|
|
# enableSSHSupport = true;
|
|
# };
|
|
|
|
# List services that you want to enable:
|
|
|
|
# Enable the OpenSSH daemon.
|
|
services.openssh = {
|
|
enable = true;
|
|
settings.PasswordAuthentication = false;
|
|
};
|
|
users.users.root.openssh.authorizedKeys.keys = sshKeys;
|
|
|
|
programs.fish = {
|
|
enable = true;
|
|
interactiveShellInit = ''
|
|
set -gx fish_greeting
|
|
'';
|
|
};
|
|
users.defaultUserShell = pkgs.fish;
|
|
|
|
# Open ports in the firewall.
|
|
networking.firewall.allowedTCPPorts = [
|
|
80
|
|
443 # ssl
|
|
25565
|
|
];
|
|
networking.firewall.allowedUDPPorts = [ 25565 ];
|
|
# Or disable the firewall altogether.
|
|
# networking.firewall.enable = false;
|
|
|
|
networking.interfaces.enp10s0.wakeOnLan.enable = true;
|
|
|
|
systemd.services.ragnamod = {
|
|
enable = false;
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "default.target" ];
|
|
description = "Ragnamod server";
|
|
path = [ pkgs.jre ];
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
ExecStart = "/home/ant/ragnamod/startserver.sh";
|
|
User = "ant";
|
|
};
|
|
};
|
|
|
|
services.glances = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
services.immich = {
|
|
enable = true;
|
|
accelerationDevices = null;
|
|
};
|
|
users.users.immich.extraGroups = [ "video" "render" ];
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedProxySettings = true;
|
|
recommendedTlsSettings = true;
|
|
virtualHosts = let
|
|
reverseProxy = port: {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
locations."/" = {
|
|
proxyPass = "http://127.0.0.1:${builtins.toString port}";
|
|
proxyWebsockets = true;
|
|
};
|
|
};
|
|
in {
|
|
"immich.antoinevaure.fr" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
locations."/" = {
|
|
proxyWebsockets = true;
|
|
recommendedProxySettings = true;
|
|
extraConfig = ''
|
|
client_max_body_size 50000M;
|
|
proxy_read_timeout 600s;
|
|
proxy_send_timeout 600s;
|
|
send_timeout 600s;
|
|
'';
|
|
proxyPass =
|
|
"http://localhost:${builtins.toString config.services.immich.port}";
|
|
};
|
|
};
|
|
|
|
# "jellyfin.${domain}" = (reverseProxy 8096);
|
|
# "sonarr.${domain}" = (reverseProxy 8989);
|
|
# "radarr.${domain}" = (reverseProxy 7878);
|
|
# "qbittorrent.${domain}" = (reverseProxy qbittorrentPort);
|
|
"git.antoinevaure.fr" = (reverseProxy 2999);
|
|
# "nextcloud.${domain}" = {
|
|
# enableACME = true;
|
|
# forceSSL = true;
|
|
# };
|
|
};
|
|
};
|
|
|
|
services.gitea = {
|
|
enable = true;
|
|
settings.server.HTTP_PORT = 2999;
|
|
settings.service.DISABLE_REGISTRATION = true;
|
|
settings.server.DOMAIN = "git.antoinevaure.fr";
|
|
settings.server.ROOT_URL = "https://git.antoinevaure.fr/";
|
|
settings.repository = {
|
|
ENABLE_PUSH_CREATE_USER = true;
|
|
ENABLE_PUSH_CREATE_ORG = true;
|
|
};
|
|
};
|
|
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
defaults.email = "contact@antoinevaure.fr";
|
|
};
|
|
|
|
system.stateVersion = "24.11";
|
|
}
|