Nixfmt Tree
This commit is contained in:
parent
d6bcf1a468
commit
f173b9d236
23 changed files with 381 additions and 224 deletions
|
|
@ -3,7 +3,8 @@
|
|||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
}:
|
||||
{
|
||||
foehammer = {
|
||||
users.admin = {
|
||||
enable = true;
|
||||
|
|
@ -62,7 +63,11 @@
|
|||
environmentFile = config.sops.secrets.restic-env.path;
|
||||
passwordFile = config.sops.secrets.restic-password.path;
|
||||
|
||||
paths = ["/var/lib/vaultwarden" "/var/lib/authelia" "/var/lib/forgejo"];
|
||||
paths = [
|
||||
"/var/lib/vaultwarden"
|
||||
"/var/lib/authelia"
|
||||
"/var/lib/forgejo"
|
||||
];
|
||||
};
|
||||
|
||||
tailscale = {
|
||||
|
|
@ -76,7 +81,7 @@
|
|||
|
||||
i18n.defaultLocale = "en_US.UTF-8";
|
||||
|
||||
networking.firewall.allowedTCPPorts = [22];
|
||||
networking.firewall.allowedTCPPorts = [ 22 ];
|
||||
|
||||
system.stateVersion = "24.11";
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,18 +4,25 @@
|
|||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}: {
|
||||
}:
|
||||
{
|
||||
imports = [
|
||||
(modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
services.qemuGuest.enable = true;
|
||||
|
||||
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
|
||||
boot.initrd.kernelModules = [];
|
||||
boot.kernelModules = [];
|
||||
boot.extraModulePackages = [];
|
||||
boot.supportedFilesystems = ["btrfs"];
|
||||
boot.initrd.availableKernelModules = [
|
||||
"ata_piix"
|
||||
"uhci_hcd"
|
||||
"virtio_pci"
|
||||
"sr_mod"
|
||||
"virtio_blk"
|
||||
];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.extraModulePackages = [ ];
|
||||
boot.supportedFilesystems = [ "btrfs" ];
|
||||
|
||||
boot.initrd.postDeviceCommands = lib.mkAfter ''
|
||||
mkdir /btrfs_tmp
|
||||
|
|
@ -45,30 +52,54 @@
|
|||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-label/NIXROOT";
|
||||
fsType = "btrfs";
|
||||
options = ["subvol=root" "defaults" "noatime" "compress=zstd:1" "discard=async" "nodatacow"];
|
||||
options = [
|
||||
"subvol=root"
|
||||
"defaults"
|
||||
"noatime"
|
||||
"compress=zstd:1"
|
||||
"discard=async"
|
||||
"nodatacow"
|
||||
];
|
||||
};
|
||||
|
||||
fileSystems."/nix" = {
|
||||
device = "/dev/disk/by-label/NIXROOT";
|
||||
fsType = "btrfs";
|
||||
neededForBoot = true;
|
||||
options = ["subvol=nix" "defaults" "noatime" "compress=zstd:3" "discard=async" "nodatacow"];
|
||||
options = [
|
||||
"subvol=nix"
|
||||
"defaults"
|
||||
"noatime"
|
||||
"compress=zstd:3"
|
||||
"discard=async"
|
||||
"nodatacow"
|
||||
];
|
||||
};
|
||||
|
||||
fileSystems."/persist" = {
|
||||
device = "/dev/disk/by-label/NIXROOT";
|
||||
fsType = "btrfs";
|
||||
neededForBoot = true;
|
||||
options = ["subvol=persist" "defaults" "noatime" "compress=zstd:1" "discard=async" "nodatacow"];
|
||||
options = [
|
||||
"subvol=persist"
|
||||
"defaults"
|
||||
"noatime"
|
||||
"compress=zstd:1"
|
||||
"discard=async"
|
||||
"nodatacow"
|
||||
];
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-label/NIXBOOT";
|
||||
fsType = "vfat";
|
||||
options = ["fmask=0077" "dmask=0077"];
|
||||
options = [
|
||||
"fmask=0077"
|
||||
"dmask=0077"
|
||||
];
|
||||
};
|
||||
|
||||
swapDevices = [];
|
||||
swapDevices = [ ];
|
||||
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
|
||||
|
|
|
|||
|
|
@ -1,4 +1,5 @@
|
|||
{config, ...}: {
|
||||
{ config, ... }:
|
||||
{
|
||||
foehammer.caddy.enable = true;
|
||||
|
||||
services.caddy = {
|
||||
|
|
|
|||
|
|
@ -1,31 +1,40 @@
|
|||
{...}: {
|
||||
{ ... }:
|
||||
{
|
||||
sops = {
|
||||
defaultSopsFile = ../secrets/main.yaml;
|
||||
|
||||
secrets = let
|
||||
autheliaSecret = {
|
||||
owner = "authelia-main";
|
||||
sopsFile = ../secrets/authelia/secrets.yaml;
|
||||
secrets =
|
||||
let
|
||||
autheliaSecret = {
|
||||
owner = "authelia-main";
|
||||
sopsFile = ../secrets/authelia/secrets.yaml;
|
||||
};
|
||||
in
|
||||
{
|
||||
admin-password.neededForUsers = true;
|
||||
|
||||
tskey = { };
|
||||
|
||||
vaultwarden-env = { };
|
||||
|
||||
restic-env = {
|
||||
owner = "restic";
|
||||
};
|
||||
restic-password = {
|
||||
owner = "restic";
|
||||
};
|
||||
restic-repository = {
|
||||
owner = "restic";
|
||||
};
|
||||
|
||||
lldap-admin-password.owner = "lldap";
|
||||
|
||||
authelia-jwtsecret = autheliaSecret;
|
||||
authelia-oidc-privkey = autheliaSecret;
|
||||
authelia-oidc-hmac = autheliaSecret;
|
||||
authelia-session-secret = autheliaSecret;
|
||||
authelia-storage-encryption = autheliaSecret;
|
||||
authelia-lldap-password = autheliaSecret;
|
||||
};
|
||||
in {
|
||||
admin-password.neededForUsers = true;
|
||||
|
||||
tskey = {};
|
||||
|
||||
vaultwarden-env = {};
|
||||
|
||||
restic-env = {owner = "restic";};
|
||||
restic-password = {owner = "restic";};
|
||||
restic-repository = {owner = "restic";};
|
||||
|
||||
lldap-admin-password.owner = "lldap";
|
||||
|
||||
authelia-jwtsecret = autheliaSecret;
|
||||
authelia-oidc-privkey = autheliaSecret;
|
||||
authelia-oidc-hmac = autheliaSecret;
|
||||
authelia-session-secret = autheliaSecret;
|
||||
authelia-storage-encryption = autheliaSecret;
|
||||
authelia-lldap-password = autheliaSecret;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,5 +1,6 @@
|
|||
{config, ...}: {
|
||||
sops.age.sshKeyPaths = ["/persist/etc/ssh/ssh_host_ed25519_key"];
|
||||
{ config, ... }:
|
||||
{
|
||||
sops.age.sshKeyPaths = [ "/persist/etc/ssh/ssh_host_ed25519_key" ];
|
||||
|
||||
environment.persistence."/persist" = {
|
||||
directories = [
|
||||
|
|
@ -14,7 +15,12 @@
|
|||
"/var/lib/caddy/.local/share/caddy"
|
||||
"/var/lib/vaultwarden"
|
||||
|
||||
{ directory = "/var/lib/lldap"; user = "lldap"; group = "lldap"; mode = "0700"; }
|
||||
{
|
||||
directory = "/var/lib/lldap";
|
||||
user = "lldap";
|
||||
group = "lldap";
|
||||
mode = "0700";
|
||||
}
|
||||
];
|
||||
|
||||
files = [
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue