nixos-config/hosts/poseidon/default.nix

146 lines
3 KiB
Nix
Raw Normal View History

2021-01-27 18:22:02 +01:00
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
2021-01-30 18:11:02 +01:00
{ config, lib, pkgs, ... }:
2021-02-14 13:42:43 +01:00
let
secrets = config.my.secrets;
in
2021-01-27 18:22:02 +01:00
{
imports =
[ # Include the results of the hardware scan.
./hardware-configuration.nix
];
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/sda"; # or "nodev" for efi only
2021-03-24 22:04:33 +01:00
boot.supportedFilesystems = [ "btrfs" ];
2021-03-25 00:40:22 +01:00
services.btrfs = {
autoScrub = {
enable = true;
fileSystems = [ "/" ];
};
};
2021-01-27 18:22:02 +01:00
networking.hostName = "poseidon"; # Define your hostname.
networking.domain = "alarsyo.net";
2021-01-27 18:22:02 +01:00
# Set your time zone.
time.timeZone = "Europe/Paris";
# The global useDHCP flag is deprecated, therefore explicitly set to false here.
# Per-interface useDHCP will be mandatory in the future, so this generated config
# replicates the default behaviour.
networking.useDHCP = false;
networking.interfaces.eno1.ipv4.addresses = [
{
address = "163.172.11.110";
prefixLength = 24;
}
];
networking.defaultGateway = {
address = "163.172.11.1";
interface = "eno1";
};
networking.nameservers = [
"62.210.16.6"
"62.210.16.7"
];
2021-02-22 18:59:37 +01:00
my.networking.externalInterface = "eno1";
2021-01-27 18:22:02 +01:00
# List services that you want to enable:
my.services = {
2021-01-31 00:31:43 +01:00
bitwarden_rs = {
enable = true;
privatePort = 8081;
websocketPort = 3012;
};
2021-01-30 18:11:02 +01:00
borg-backup = {
enable = true;
2021-02-14 13:42:43 +01:00
repo = secrets.borg-backup-repo;
2021-01-30 18:11:02 +01:00
};
2021-01-30 21:14:27 +01:00
2021-02-22 15:07:29 +01:00
fail2ban = {
enable = true;
};
2021-02-02 16:55:19 +01:00
gitea = {
enable = true;
privatePort = 8082;
};
2021-02-19 21:21:35 +01:00
jellyfin = {
enable = true;
};
2021-03-28 22:08:19 +02:00
lohr = {
enable = true;
};
2021-01-30 21:14:27 +01:00
miniflux = {
enable = true;
2021-02-14 13:42:43 +01:00
adminCredentialsFile = "${../../secrets/miniflux-admin-credentials.secret}";
2021-01-30 21:14:27 +01:00
privatePort = 8080;
};
2021-02-02 01:20:31 +01:00
matrix = {
enable = true;
2021-02-14 13:42:43 +01:00
registration_shared_secret = secrets.matrix-registration-shared-secret;
2021-02-02 01:20:31 +01:00
};
2021-01-30 21:14:27 +01:00
monitoring = {
2021-01-27 20:55:16 +01:00
enable = true;
useACME = true;
domain = "monitoring.${config.networking.domain}";
2021-01-27 20:55:16 +01:00
};
2021-03-23 19:31:59 +01:00
nextcloud = {
enable = true;
};
postgresql-backup = {
enable = true;
};
2021-02-19 22:29:04 +01:00
2021-03-16 17:46:25 +01:00
tgv = {
enable = true;
};
2021-02-19 22:29:04 +01:00
transmission = {
enable = true;
username = "alarsyo";
password = secrets.transmission-password;
};
2021-02-22 18:59:37 +01:00
wireguard = {
enable = true;
iface = "wg";
port = 51820;
net = {
v4 = {
subnet = "10.0.0";
mask = 24;
};
v6 = {
subnet = "fd42:42:42";
mask = 64;
};
};
};
2021-01-27 20:55:16 +01:00
};
security.acme.acceptTerms = true;
security.acme.email = "antoine97.martin@gmail.com";
2021-01-27 18:22:02 +01:00
# Enable the OpenSSH daemon.
services.openssh.enable = true;
services.openssh.permitRootLogin = "no";
services.openssh.passwordAuthentication = false;
}