nixos-servers/configuration.nix

187 lines
3.9 KiB
Nix
Raw Normal View History

{ pkgs, config, lib, modulesPath, ... }: {
2023-11-22 17:28:55 +00:00
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
2023-11-24 12:52:51 +00:00
./modules/custom
2023-11-22 17:28:55 +00:00
];
2023-11-05 17:43:32 +00:00
boot = {
kernelModules = [ "kvm-intel" ];
extraModulePackages = [ ];
initrd = {
availableKernelModules = [
"ahci"
"xhci_pci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
"sdhci_pci"
];
kernelModules = [ ];
};
loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;
};
2023-11-05 17:43:32 +00:00
};
time.timeZone = "Europe/Amsterdam";
i18n = {
defaultLocale = "en_US.UTF-8";
extraLocaleSettings = {
LC_ADDRESS = "nl_NL.UTF-8";
LC_IDENTIFICATION = "nl_NL.UTF-8";
LC_MEASUREMENT = "nl_NL.UTF-8";
LC_MONETARY = "nl_NL.UTF-8";
LC_NAME = "nl_NL.UTF-8";
LC_NUMERIC = "nl_NL.UTF-8";
LC_PAPER = "nl_NL.UTF-8";
LC_TELEPHONE = "nl_NL.UTF-8";
LC_TIME = "nl_NL.UTF-8";
};
};
services = {
openssh = {
enable = true;
2023-12-26 12:44:59 +00:00
openFirewall = true;
2023-11-05 17:43:32 +00:00
settings = {
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
};
};
xserver = {
layout = "us";
xkbVariant = "";
};
};
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOodpLr+FDRyKyHjucHizNLVFHZ5AQmE9GmxMnOsSoaw pimkunis@thinkpadpim"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINUZp4BCxf7uLa1QWonx/Crf8tYZ5MKIZ+EuaBa82LrV user@user-laptop"
];
2023-11-22 15:53:34 +00:00
programs = {
ssh = {
knownHosts = {
dmz = {
hostNames = [ "*.dmz" ];
publicKey =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAX2IhgHNxC6JTvLu9cej+iWuG+uJFMXn4AiRro9533x";
certAuthority = true;
};
hypervisors = {
hostNames = [ "*.hyp" ];
publicKey =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFzRkH3d/KVJQouswY/DMpenWbDFVOnI3Vut0xR0e1tb";
certAuthority = true;
};
2023-11-05 17:43:32 +00:00
};
};
2023-11-22 15:53:34 +00:00
neovim = {
enable = true;
vimAlias = true;
viAlias = true;
};
2023-11-05 17:43:32 +00:00
};
nixpkgs = {
config.allowUnfree = true;
hostPlatform = "x86_64-linux";
};
2023-11-05 17:43:32 +00:00
2023-11-22 15:53:34 +00:00
environment.systemPackages = with pkgs; [
neofetch
wget
git
btop
htop
ripgrep
dig
tree
file
];
2023-11-05 17:43:32 +00:00
networking = {
2023-12-15 14:11:14 +00:00
domain = "hyp";
2023-12-26 12:44:59 +00:00
firewall.enable = true;
useDHCP = false;
2023-11-08 20:16:51 +00:00
};
2023-11-05 17:43:32 +00:00
system.stateVersion = "23.05";
systemd.network = {
enable = true;
netdevs = {
"20-vlandmz" = {
netdevConfig = {
Kind = "vlan";
Name = "vlandmz";
};
vlanConfig.Id = 30;
};
"20-bridgedmz" = {
netdevConfig = {
Kind = "bridge";
Name = "bridgedmz";
};
};
};
networks = {
"30-main-nic" = {
matchConfig.Name = "en*";
2023-11-11 23:04:37 +00:00
networkConfig = { DHCP = "yes"; };
vlan = [ "vlandmz" ];
2023-11-05 17:43:32 +00:00
};
"40-vlandmz" = {
matchConfig.Name = "vlandmz";
networkConfig = {
IPv6AcceptRA = false;
LinkLocalAddressing = "no";
Bridge = "bridgedmz";
};
linkConfig.RequiredForOnline = "enslaved";
};
"40-bridgedmz" = {
matchConfig.Name = "bridgedmz";
networkConfig = {
IPv6AcceptRA = false;
LinkLocalAddressing = "no";
};
linkConfig.RequiredForOnline = "carrier";
};
};
};
hardware.cpu.intel.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
2023-11-24 12:52:51 +00:00
age.identityPaths = [ "/root/age_ed25519" ];
virtualisation.libvirtd.enable = true;
nix = {
package = pkgs.nixFlakes;
extraOptions = ''
experimental-features = nix-command flakes
'';
};
2023-12-16 15:02:41 +00:00
system.activationScripts.diff = ''
if [[ -e /run/current-system ]]; then
${pkgs.nix}/bin/nix store diff-closures /run/current-system "$systemConfig"
fi
'';
2023-11-05 17:43:32 +00:00
}