2015-12-16 11:06:44 +00:00
|
|
|
|
# Edit this configuration file to define what should be installed on
|
|
|
|
|
# your system. Help is available in the configuration.nix(5) man page
|
|
|
|
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
|
|
|
|
2016-01-05 15:07:13 +00:00
|
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
let
|
|
|
|
|
byid = dev: "/dev/disk/by-id/" + dev;
|
|
|
|
|
keyFile = "/dev/disk/by-id/usb-Verbatim_STORE_N_GO_070B3CEE0B223954-0:0";
|
|
|
|
|
rootDisk = byid "ata-INTEL_SSDSA2M080G2GC_CVPO003402PB080BGN";
|
|
|
|
|
homePartition = byid "ata-INTEL_SSDSA2M080G2GC_CVPO003402PB080BGN-part3";
|
2016-01-05 15:21:01 +00:00
|
|
|
|
# cryptsetup luksFormat $dev --cipher aes-xts-plain64 -s 512 -h sha512
|
|
|
|
|
# cryptsetup luksAddKey $dev tmpkey
|
2016-03-08 17:35:32 +00:00
|
|
|
|
# cryptsetup luksOpen $dev crypt0 --key-file tmpkey --keyfile-size=4096
|
|
|
|
|
# mkfs.ext4 /dev/mapper/crypt0 -L crypt0 -T largefile
|
2016-03-05 09:59:09 +00:00
|
|
|
|
|
|
|
|
|
# omo Chassis:
|
|
|
|
|
# __FRONT_
|
|
|
|
|
# |* d2 |
|
|
|
|
|
# | |
|
|
|
|
|
# |* d3 |
|
|
|
|
|
# | |
|
|
|
|
|
# |* d0 |
|
|
|
|
|
# | |
|
|
|
|
|
# |* d1 |
|
|
|
|
|
# |* |
|
|
|
|
|
# | * r0 |
|
|
|
|
|
# |_______|
|
2016-01-05 15:07:13 +00:00
|
|
|
|
cryptDisk0 = byid "ata-ST2000DM001-1CH164_Z240XTT6";
|
|
|
|
|
cryptDisk1 = byid "ata-TP02000GB_TPW151006050068";
|
2016-03-08 17:35:32 +00:00
|
|
|
|
cryptDisk2 = byid "ata-ST4000DM000-1F2168_Z303HVSG";
|
|
|
|
|
# cryptDisk3 = byid "ata-WDC_WD20EARS-00MVWB0_WD-WMAZA1786907";
|
2016-01-05 15:07:13 +00:00
|
|
|
|
# all physical disks
|
2016-03-08 17:35:32 +00:00
|
|
|
|
allDisks = [ rootDisk cryptDisk0 cryptDisk1 cryptDisk2 ];
|
2016-01-05 15:07:13 +00:00
|
|
|
|
in {
|
2015-12-16 11:06:44 +00:00
|
|
|
|
imports =
|
2016-01-03 05:07:35 +00:00
|
|
|
|
[
|
2016-02-15 15:27:11 +00:00
|
|
|
|
../.
|
2016-01-03 05:07:35 +00:00
|
|
|
|
# TODO: unlock home partition via ssh
|
2015-12-16 11:06:44 +00:00
|
|
|
|
../2configs/fs/single-partition-ext4.nix
|
2016-01-03 05:07:35 +00:00
|
|
|
|
../2configs/zsh-user.nix
|
2015-12-16 11:06:44 +00:00
|
|
|
|
../2configs/exim-retiolum.nix
|
2016-01-03 05:07:35 +00:00
|
|
|
|
../2configs/smart-monitor.nix
|
2016-01-03 22:07:55 +00:00
|
|
|
|
../2configs/mail-client.nix
|
2016-01-14 11:42:52 +00:00
|
|
|
|
../2configs/share-user-sftp.nix
|
2016-02-01 21:01:41 +00:00
|
|
|
|
../2configs/omo-share.nix
|
2015-12-16 11:06:44 +00:00
|
|
|
|
];
|
2016-03-11 01:10:34 +00:00
|
|
|
|
krebs.retiolum.enable = true;
|
2016-01-27 21:20:32 +00:00
|
|
|
|
networking.firewall.trustedInterfaces = [ "enp3s0" ];
|
|
|
|
|
# udp:137 udp:138 tcp:445 tcp:139 - samba, allowed in local net
|
|
|
|
|
# tcp:80 - nginx for sharing files
|
|
|
|
|
# tcp:655 udp:655 - tinc
|
|
|
|
|
# tcp:8080 - sabnzbd
|
|
|
|
|
networking.firewall.allowedUDPPorts = [ 655 ];
|
|
|
|
|
networking.firewall.allowedTCPPorts = [ 80 655 8080 ];
|
|
|
|
|
|
2016-01-14 11:42:52 +00:00
|
|
|
|
# services.openssh.allowSFTP = false;
|
2016-01-08 02:37:38 +00:00
|
|
|
|
|
|
|
|
|
# copy config from <secrets/sabnzbd.ini> to /var/lib/sabnzbd/
|
|
|
|
|
services.sabnzbd.enable = true;
|
|
|
|
|
systemd.services.sabnzbd.environment.SSL_CERT_FILE = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
|
|
|
|
|
|
|
|
|
|
# HDD Array stuff
|
2016-01-05 15:07:13 +00:00
|
|
|
|
services.smartd.devices = builtins.map (x: { device = x; }) allDisks;
|
2016-01-08 02:37:38 +00:00
|
|
|
|
|
2016-01-05 15:21:01 +00:00
|
|
|
|
makefu.snapraid = let
|
|
|
|
|
toMapper = id: "/media/crypt${builtins.toString id}";
|
|
|
|
|
in {
|
|
|
|
|
enable = true;
|
|
|
|
|
disks = map toMapper [ 0 1 ];
|
|
|
|
|
parity = toMapper 2;
|
2016-01-03 05:07:35 +00:00
|
|
|
|
};
|
2016-01-05 15:21:01 +00:00
|
|
|
|
fileSystems = let
|
|
|
|
|
cryptMount = name:
|
|
|
|
|
{ "/media/${name}" = { device = "/dev/mapper/${name}"; fsType = "xfs"; };};
|
|
|
|
|
in {
|
|
|
|
|
"/home" = {
|
|
|
|
|
device = "/dev/mapper/home";
|
|
|
|
|
fsType = "ext4";
|
|
|
|
|
};
|
|
|
|
|
} // cryptMount "crypt0"
|
|
|
|
|
// cryptMount "crypt1"
|
|
|
|
|
// cryptMount "crypt2";
|
|
|
|
|
|
2016-01-05 15:07:13 +00:00
|
|
|
|
powerManagement.powerUpCommands = lib.concatStrings (map (disk: ''
|
|
|
|
|
${pkgs.hdparm}/sbin/hdparm -S 100 ${disk}
|
|
|
|
|
${pkgs.hdparm}/sbin/hdparm -B 127 ${disk}
|
|
|
|
|
${pkgs.hdparm}/sbin/hdparm -y ${disk}
|
|
|
|
|
'') allDisks);
|
2016-01-08 02:37:38 +00:00
|
|
|
|
|
2016-01-27 21:20:32 +00:00
|
|
|
|
# crypto unlocking
|
2015-12-16 11:06:44 +00:00
|
|
|
|
boot = {
|
2016-01-03 05:07:35 +00:00
|
|
|
|
initrd.luks = {
|
2016-01-05 15:07:13 +00:00
|
|
|
|
devices = let
|
|
|
|
|
usbkey = name: device: {
|
|
|
|
|
inherit name device keyFile;
|
2016-01-03 05:07:35 +00:00
|
|
|
|
keyFileSize = 4096;
|
2016-01-05 15:07:13 +00:00
|
|
|
|
};
|
|
|
|
|
in [
|
|
|
|
|
(usbkey "home" homePartition)
|
|
|
|
|
(usbkey "crypt0" cryptDisk0)
|
|
|
|
|
(usbkey "crypt1" cryptDisk1)
|
2016-03-08 17:35:32 +00:00
|
|
|
|
(usbkey "crypt2" cryptDisk2)
|
2016-01-03 05:07:35 +00:00
|
|
|
|
];
|
|
|
|
|
};
|
2016-01-05 15:07:13 +00:00
|
|
|
|
loader.grub.device = rootDisk;
|
2015-12-16 11:06:44 +00:00
|
|
|
|
|
|
|
|
|
initrd.availableKernelModules = [
|
|
|
|
|
"ahci"
|
2016-01-03 05:07:35 +00:00
|
|
|
|
"ohci_pci"
|
2015-12-16 11:06:44 +00:00
|
|
|
|
"ehci_pci"
|
2016-01-03 05:07:35 +00:00
|
|
|
|
"pata_atiixp"
|
|
|
|
|
"firewire_ohci"
|
|
|
|
|
"usb_storage"
|
|
|
|
|
"usbhid"
|
2015-12-16 11:06:44 +00:00
|
|
|
|
];
|
|
|
|
|
|
2016-01-03 05:07:35 +00:00
|
|
|
|
kernelModules = [ "kvm-amd" ];
|
2015-12-16 11:06:44 +00:00
|
|
|
|
extraModulePackages = [ ];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
hardware.enableAllFirmware = true;
|
|
|
|
|
hardware.cpu.amd.updateMicrocode = true;
|
|
|
|
|
|
2016-01-08 02:37:38 +00:00
|
|
|
|
zramSwap.enable = true;
|
2016-01-03 05:07:35 +00:00
|
|
|
|
zramSwap.numDevices = 2;
|
|
|
|
|
|
2016-01-27 21:00:50 +00:00
|
|
|
|
krebs.build.host = config.krebs.hosts.omo;
|
2015-12-16 11:06:44 +00:00
|
|
|
|
}
|