# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’). { config, lib, pkgs, ... }: let secrets = config.my.secrets; in { imports = [ # Include the results of the hardware scan. ./hardware-configuration.nix ]; # Use the GRUB 2 boot loader. boot.loader.grub.enable = true; boot.loader.grub.version = 2; boot.loader.grub.device = "/dev/sda"; # or "nodev" for efi only networking.hostName = "poseidon"; # Define your hostname. networking.domain = "alarsyo.net"; # Set your time zone. time.timeZone = "Europe/Paris"; # The global useDHCP flag is deprecated, therefore explicitly set to false here. # Per-interface useDHCP will be mandatory in the future, so this generated config # replicates the default behaviour. networking.useDHCP = false; networking.interfaces.eno1.ipv4.addresses = [ { address = "163.172.11.110"; prefixLength = 24; } ]; networking.defaultGateway = { address = "163.172.11.1"; interface = "eno1"; }; networking.nameservers = [ "62.210.16.6" "62.210.16.7" ]; # List packages installed in system profile. To search, run: # $ nix search wget environment.systemPackages = with pkgs; [ bat fish git gnupg htop pinentry-curses ripgrep stow tmux vim wget ]; # Some programs need SUID wrappers, can be configured further or are # started in user sessions. programs.fish.enable = true; programs.gnupg.agent = { enable = true; enableSSHSupport = true; pinentryFlavor = "curses"; }; # List services that you want to enable: my.services = { bitwarden_rs = { enable = true; privatePort = 8081; websocketPort = 3012; }; borg-backup = { enable = true; repo = secrets.borg-backup-repo; }; gitea = { enable = true; privatePort = 8082; }; jellyfin = { enable = true; }; miniflux = { enable = true; adminCredentialsFile = "${../../secrets/miniflux-admin-credentials.secret}"; privatePort = 8080; }; matrix = { enable = true; registration_shared_secret = secrets.matrix-registration-shared-secret; }; monitoring = { enable = true; useACME = true; domain = "monitoring.${config.networking.domain}"; }; postgresql-backup = { enable = true; }; }; security.acme.acceptTerms = true; security.acme.email = "antoine97.martin@gmail.com"; # Enable the OpenSSH daemon. services.openssh.enable = true; services.openssh.permitRootLogin = "no"; services.openssh.passwordAuthentication = false; boot.supportedFilesystems = [ "btrfs" ]; nix = { package = pkgs.nixUnstable; extraOptions = '' experimental-features = nix-command flakes ''; binaryCaches = [ "https://alarsyo.cachix.org" ]; binaryCachePublicKeys = [ "alarsyo.cachix.org-1:A6BmcaJek5+ZDWWv3fPteHhPm6U8liS9CbDbmegPfmk=" ]; gc = { automatic = true; dates = "03:15"; options = "--delete-older-than 30d"; }; }; }