81 lines
2.1 KiB
Nix
81 lines
2.1 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with import <stockholm/lib>;
|
|
let
|
|
byid = dev: "/dev/disk/by-id/" + dev;
|
|
rootDisk = byid "ata-ADATA_SSD_S599_64GB_10460000000000000039";
|
|
auxDisk = byid "ata-HGST_HTS721010A9E630_JR10006PH3A02F";
|
|
dataPartition = auxDisk + "-part1";
|
|
|
|
allDisks = [ rootDisk ]; # auxDisk
|
|
in {
|
|
imports = [
|
|
<stockholm/makefu>
|
|
<stockholm/makefu/2configs/fs/single-partition-ext4.nix>
|
|
<stockholm/makefu/2configs/zsh-user.nix>
|
|
<stockholm/makefu/2configs/smart-monitor.nix>
|
|
<stockholm/makefu/2configs/exim-retiolum.nix>
|
|
<stockholm/makefu/2configs/virtualization.nix>
|
|
|
|
<stockholm/makefu/2configs/tinc/retiolum.nix>
|
|
<stockholm/makefu/2configs/share/temp-share-samba.nix>
|
|
];
|
|
services.samba.shares = {
|
|
isos = {
|
|
path = "/data/isos/";
|
|
"read only" = "yes";
|
|
browseable = "yes";
|
|
"guest ok" = "yes";
|
|
};
|
|
};
|
|
services.tinc.networks.siem = {
|
|
name = "sdarth";
|
|
extraConfig = "ConnectTo = sjump";
|
|
};
|
|
|
|
makefu.forward-journal = {
|
|
enable = true;
|
|
src = "10.8.10.2";
|
|
dst = "10.8.10.6";
|
|
};
|
|
|
|
#networking.firewall.enable = false;
|
|
|
|
boot.kernelModules = [ "coretemp" "f71882fg" ];
|
|
hardware.enableAllFirmware = true;
|
|
nixpkgs.config.allowUnfree = true;
|
|
networking = {
|
|
wireless.enable = true;
|
|
firewall = {
|
|
allowPing = true;
|
|
logRefusedConnections = false;
|
|
trustedInterfaces = [ "eno1" ];
|
|
allowedUDPPorts = [ 80 655 1655 67 ];
|
|
allowedTCPPorts = [ 80 655 1655 ];
|
|
};
|
|
# fallback connection to the internal virtual network
|
|
interfaces.virbr3.ip4 = [{
|
|
address = "10.8.8.2";
|
|
prefixLength = 24;
|
|
}];
|
|
};
|
|
|
|
# TODO smartd omo darth gum all-in-one
|
|
services.smartd.devices = builtins.map (x: { device = x; }) allDisks;
|
|
zramSwap.enable = true;
|
|
|
|
#fileSystems."/data" = {
|
|
# device = dataPartition;
|
|
# fsType = "ext4";
|
|
#};
|
|
|
|
boot.loader.grub.device = rootDisk;
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
config.krebs.users.makefu-omo.pubkey
|
|
config.krebs.users.makefu-vbob.pubkey
|
|
];
|
|
|
|
krebs.build.host = config.krebs.hosts.darth;
|
|
}
|