configuration.nix/nixos/modules/default.nix

489 lines
16 KiB
Nix
Raw Normal View History

2024-08-03 10:37:55 +02:00
top@{ inputs, moduleWithSystem, ... }: {
flake.nixosModules = {
2024-07-06 17:10:57 +02:00
grub = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
boot = {
loader = {
2024-07-06 17:19:11 +02:00
grub =
let
2024-07-07 10:42:36 +02:00
theme = pkgs.sleek-grub-theme.override { withBanner = "Hello Ivan"; withStyle = "bigSur"; };
2024-07-06 17:19:11 +02:00
in
2024-08-04 19:08:59 +02:00
{
enable = pkgs.lib.mkDefault true;
useOSProber = true;
efiSupport = true;
device = "nodev";
theme = theme;
splashImage = "${theme}/background.png";
};
efi.canTouchEfiVariables = true;
};
};
2024-07-06 17:10:57 +02:00
});
2024-07-04 08:38:33 +02:00
base = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
2024-08-03 10:37:55 +02:00
imports = [ inputs.hosts.nixosModule ];
2024-07-05 13:29:07 +02:00
system.stateVersion = top.config.flake.stateVersion;
2024-07-07 10:42:36 +02:00
nix = { extraOptions = ''experimental-features = nix-command flakes''; };
2024-07-04 08:38:33 +02:00
i18n.supportedLocales = [ "all" ];
time.timeZone = "Europe/Prague";
environment = {
2024-08-04 10:29:28 +02:00
systemPackages = with pkgs; [ cmatrix uutils-coreutils-noprefix cryptsetup fd file git glibc gnumake mlocate openssh openssl procs ripgrep srm unzip vim zip just nixos-install-tools tshark ];
2024-08-02 08:39:36 +02:00
sessionVariables = { MAKEFLAGS = "-j 4"; };
2024-08-02 11:37:59 +02:00
shells = with pkgs; [ bash zsh nushell ];
2024-08-03 20:16:58 +02:00
enableAllTerminfo = true;
2024-07-04 08:38:33 +02:00
};
2024-08-02 11:37:59 +02:00
users.defaultUserShell = pkgs.zsh;
programs = { zsh.enable = true; nix-ld.enable = true; };
2024-08-02 18:46:46 +02:00
services = {
dbus.enable = true;
2024-08-04 13:33:34 +02:00
logind = { killUserProcesses = true; powerKeyLongPress = "reboot"; };
2024-08-02 18:46:46 +02:00
};
2024-08-02 11:54:02 +02:00
networking = { stevenBlackHosts = { enable = true; blockFakenews = true; blockGambling = true; blockSocial = true; }; };
2024-07-04 08:38:33 +02:00
});
2024-08-03 15:41:51 +02:00
shell = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
programs = {
starship.enable = true;
zsh = {
enableBashCompletion = true;
syntaxHighlighting.enable = true;
autosuggestions = {
enable = true;
strategy = [ "completion" ];
};
shellAliases = {
cal = "cal $(date +%Y)";
GG = "git add . && git commit -m 'GG' && git push --set-upstream origin HEAD";
gad = "git add . && git diff --cached";
gac = "ga && gc";
ga = "git add .";
gc = "git commit";
dev = "nix develop --command $SHELL";
eza = "${pkgs.eza}/bin/eza '--long' '--header' '--icons' '--smart-group' '--mounts' '--octal-permissions' '--git'";
ls = "eza";
la = "eza --all";
lt = "eza --git-ignore --all --tree --level=10";
sc = "systemctl";
neofetch = "${pkgs.fastfetch}/bin/fastfetch -c all.jsonc";
};
};
};
});
2024-07-05 09:32:10 +02:00
sound = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
2024-07-07 10:42:36 +02:00
services = { pipewire = { enable = true; alsa.enable = true; pulse.enable = true; }; };
environment.systemPackages = with pkgs; [ pwvucontrol ];
2024-07-04 08:38:33 +02:00
});
2024-07-05 00:10:36 +02:00
music = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
2024-08-03 10:37:55 +02:00
imports = [ inputs.musnix.nixosModules.musnix ];
2024-07-07 10:42:36 +02:00
environment.systemPackages = with pkgs; [ guitarix ];
2024-07-05 11:53:58 +02:00
services.pipewire = {
jack.enable = true;
2024-07-07 10:42:36 +02:00
extraConfig = { jack."69-low-latency" = { "jack.properties" = { "node.latency" = "64/48000"; }; }; };
2024-07-05 11:52:45 +02:00
};
2024-07-05 00:10:36 +02:00
musnix = {
enable = true;
rtcqs.enable = true;
soundcardPciId = "00:1f.3";
2024-08-02 21:54:57 +02:00
kernel = { realtime = true; packages = pkgs.linuxPackages-rt; };
2024-07-05 00:10:36 +02:00
};
});
2024-08-02 22:43:08 +02:00
wayland = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
hardware.graphics.enable = true;
security.pam.services.swaylock = { };
xdg.portal = {
enable = true;
xdgOpenUsePortal = true;
wlr = { enable = true; settings = { screencast = { output_name = "HDMI-A-1"; max_fps = 60; }; }; };
config.common.default = "*";
};
});
2024-07-04 08:38:33 +02:00
security = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
security = {
2024-07-07 10:42:36 +02:00
sudo = { enable = false; execWheelOnly = true; extraRules = [{ groups = [ "wheel" ]; }]; };
2024-07-07 16:01:23 +02:00
doas = { enable = true; extraRules = [{ groups = [ "wheel" ]; noPass = true; keepEnv = true; }]; };
polkit.enable = true;
rtkit.enable = true;
};
});
2024-08-04 20:07:52 +02:00
intranet = {
2024-07-04 08:38:33 +02:00
networking.wg-quick.interfaces = {
wg0 = {
2024-08-03 20:16:58 +02:00
address = [ "10.0.0.2/32" ];
2024-07-04 08:38:33 +02:00
privateKeyFile = "/etc/wireguard/privatekey";
peers = [
{
publicKey = "5FiTLnzbgcbgQLlyVyYeESEd+2DtwM1JHCGz/32UcEU=";
allowedIPs = [ "0.0.0.0/0" "::/0" ];
endpoint = "37.205.13.29:51820";
persistentKeepalive = 25;
}
];
};
};
2024-08-04 21:24:32 +02:00
services.openssh = {
2024-08-04 20:07:52 +02:00
enable = true;
settings = {
PermitRootLogin = "prohibit-password";
};
};
};
2024-07-04 08:38:33 +02:00
wireless = {
networking = {
wireless = {
enable = true;
networks = {
"Smart-Hostel-2.4" = {
psk = "smarttrans.bg";
};
"Yohohostel2.4G" = {
psk = "kaskamaska";
};
"Nomado_Guest" = {
psk = "welcomehome";
};
"HostelMusala Uni" = {
psk = "mhostelm";
};
"BOUTIQUE APARTMENTS" = {
psk = "boutique26";
};
"Safestay" = {
psk = "AlldayrooftopBAR";
};
"HOSTEL JASMIN 2" = {
psk = "Jasmin2024";
};
"HOME" = {
psk = "iloveprague";
};
"Vodafone-B925" = {
psk = "7aGh3FE6pN4p4cu6";
};
"O2WIFIZ_EXT" = {
psk = "iloveprague";
};
2024-06-23 15:35:19 +02:00
"KOTEKLAN_GUEST" = {
psk = "koteklankotek";
};
2024-07-30 10:01:43 +02:00
"3G" = {
hidden = true;
};
};
};
};
};
2024-08-02 20:04:50 +02:00
ivand = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }:
let homeMods = top.config.flake.homeManagerModules; in {
2024-08-03 10:37:55 +02:00
imports = [ inputs.home-manager.nixosModules.default ];
2024-08-02 20:04:50 +02:00
home-manager = {
2024-08-02 21:54:57 +02:00
backupFileExtension = "bak";
2024-08-02 20:04:50 +02:00
useUserPackages = true;
useGlobalPkgs = true;
users.ivand = { ... }: {
imports = with homeMods; [
base
ivand
shell
util
swayland
web
];
};
};
2024-08-02 20:04:50 +02:00
fonts.packages = with pkgs; [ (nerdfonts.override { fonts = [ "FiraCode" ]; }) noto-fonts noto-fonts-emoji noto-fonts-lgc-plus ];
users = {
users = {
ivand = {
isNormalUser = true;
createHome = true;
extraGroups = [
"adbusers"
"adm"
"audio"
"bluetooth"
"dialout"
"flatpak"
"kvm"
"mlocate"
"realtime"
"render"
"video"
"wheel"
];
};
};
2024-08-03 20:19:53 +02:00
extraGroups = { mlocate = { }; realtime = { }; };
2024-08-02 20:04:50 +02:00
};
programs.dconf.enable = true;
});
2024-07-04 08:38:33 +02:00
flatpak = {
2024-07-07 10:42:36 +02:00
xdg = { portal = { enable = true; wlr.enable = true; config.common.default = "*"; }; };
2024-07-04 08:38:33 +02:00
services.flatpak.enable = true;
};
2024-07-04 08:38:33 +02:00
ai = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
2024-07-07 10:42:36 +02:00
services = { ollama.enable = true; };
});
2024-07-24 10:05:13 +02:00
anon = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
environment.systemPackages = with pkgs; [ tor-browser ];
});
cryptocurrency = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
environment.systemPackages = with pkgs; [ monero-cli ];
2024-08-02 18:25:12 +02:00
services = { monero.enable = true; };
2024-07-06 22:58:14 +02:00
});
2024-08-04 15:11:01 +02:00
monero-miner = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
services = {
xmrig = {
enable = true;
settings = {
autosave = true;
cpu = true;
opencl = false;
cuda = false;
pools = [
{
url = "pool.supportxmr.com:443";
user = "48e9t9xvq4M4HBWomz6whiY624YRCPwgJ7LPXngcc8pUHk6hCuR3k6ENpLGDAhPEHWaju8Z4btxkbENpcwaqWcBvLxyh5cn";
keepalive = true;
tls = true;
}
];
};
};
};
});
2024-08-03 17:09:52 +02:00
vps = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
imports = [
inputs.vpsadminos.nixosConfigurations.container
../../hosts/vps/mailserver
];
});
2024-08-05 18:12:02 +02:00
mailserver = moduleWithSystem (toplevel@{ ... }: perSystem@{ config, pkgs, ... }: {
imports = [
inputs.simple-nixos-mailserver.nixosModule
];
mailserver = {
enable = true;
localDnsResolver = false;
fqdn = "mail.idimitrov.dev";
domains = [ "idimitrov.dev" "mail.idimitrov.dev" ];
loginAccounts = {
"ivan@idimitrov.dev" = {
hashedPassword = "$2b$05$rTVIQD98ogXeCBKdk/YufulWHqpMCAlb7SHDPlh5y8Xbukoa/uQLm";
aliases = [ "admin@idimitrov.dev" ];
};
"security@idimitrov.dev" = {
hashedPassword = "$2b$05$rTVIQD98ogXeCBKdk/YufulWHqpMCAlb7SHDPlh5y8Xbukoa/uQLm";
};
};
certificateScheme = "acme-nginx";
hierarchySeparator = "/";
};
services = {
dovecot2.sieve.extensions = [ "fileinto" ];
roundcube = {
enable = true;
package = pkgs.roundcube.withPlugins (plugins: [ plugins.persistent_login ]);
plugins = [
"persistent_login"
];
hostName = "${config.mailserver.fqdn}";
extraConfig = ''
$config['smtp_host'] = "tls://${config.mailserver.fqdn}";
$config['smtp_user'] = "%u";
$config['smtp_pass'] = "%p";
'';
};
nginx.virtualHosts =
let
restrictToVpn = ''
allow 10.0.0.2/32;
allow 10.0.0.3/32;
allow 10.0.0.4/32;
deny all;
'';
in
{
"${config.mailserver.fqdn}" = {
extraConfig = restrictToVpn;
};
};
2024-08-05 18:12:02 +02:00
postgresql.enable = true;
};
security = {
acme = {
acceptTerms = true;
defaults.email = "security@idimitrov.dev";
};
};
});
2024-08-05 18:40:34 +02:00
nginx = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
2024-08-05 18:25:15 +02:00
services = {
nginx =
let
webshiteConfig = ''
add_header 'Referrer-Policy' 'origin-when-cross-origin';
add_header X-Content-Type-Options nosniff;
'';
extensions = [ "html" "txt" "png" "jpg" "jpeg" ];
serveStatic = exts: ''
try_files $uri $uri/ ${pkgs.lib.strings.concatStringsSep " " (builtins.map (x: "$uri." + "${x}") exts)} =404;
'';
in
{
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
virtualHosts = {
"idimitrov.dev" = {
enableACME = true;
forceSSL = true;
locations."/" = {
root = "${pkgs.webshite}";
extraConfig = serveStatic extensions;
};
extraConfig = webshiteConfig;
};
"www.idimitrov.dev" = {
enableACME = true;
forceSSL = true;
locations."/" = {
root = "${pkgs.webshite}";
extraConfig = serveStatic extensions;
};
extraConfig = webshiteConfig;
};
"src.idimitrov.dev" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:3001";
};
};
"pic.idimitrov.dev" = {
enableACME = true;
forceSSL = true;
locations."/" = {
root = "/var/pic";
extraConfig = ''
autoindex on;
${serveStatic ["png"]}
'';
};
};
};
};
gitea = {
enable = true;
appName = "src";
database = {
type = "postgres";
};
settings = {
server = {
DOMAIN = "src.idimitrov.dev";
ROOT_URL = "https://src.idimitrov.dev/";
HTTP_PORT = 3001;
};
repository = {
DEFAULT_BRANCH = "master";
};
service = {
DISABLE_REGISTRATION = true;
};
};
};
postgresql = {
enable = true;
ensureUsers = [
{
name = "root";
ensureClauses = {
superuser = true;
createrole = true;
createdb = true;
};
}
];
};
};
});
2024-08-05 18:40:34 +02:00
wireguard-output = moduleWithSystem (toplevel@{ ... }: perSystem@{ pkgs, ... }: {
networking = {
nat = {
enable = true;
enableIPv6 = true;
externalInterface = "venet0";
internalInterfaces = [ "wg0" ];
};
wg-quick.interfaces = {
wg0 = let iptables = "${pkgs.iptables}/bin/iptables"; ip6tables = "${pkgs.iptables}/bin/ip6tables"; in {
address = [ "10.0.0.1/32" ];
listenPort = 51820;
privateKeyFile = "/etc/wireguard/privatekey";
postUp = ''
${iptables} -A FORWARD -i wg0 -j ACCEPT
${iptables} -t nat -A POSTROUTING -s 10.0.0.1/24 -o venet0 -j MASQUERADE
${ip6tables} -A FORWARD -i wg0 -j ACCEPT
${ip6tables} -t nat -A POSTROUTING -s fdc9:281f:04d7:9ee9::1/64 -o venet0 -j MASQUERADE
'';
preDown = ''
${iptables} -D FORWARD -i wg0 -j ACCEPT
${iptables} -t nat -D POSTROUTING -s 10.0.0.1/24 -o venet0 -j MASQUERADE
${ip6tables} -D FORWARD -i wg0 -j ACCEPT
${ip6tables} -t nat -D POSTROUTING -s fdc9:281f:04d7:9ee9::1/64 -o venet0 -j MASQUERADE
'';
peers = [
{
publicKey = "kI93V0dVKSqX8hxMJHK5C0c1hEDPQTgPQDU8TKocVgo=";
allowedIPs = [ "10.0.0.2/32" ];
}
{
publicKey = "RqTsFxFCcgYsytcDr+jfEoOA5UNxa1ZzGlpx6iuTpXY=";
allowedIPs = [ "10.0.0.3/32" ];
}
{
publicKey = "1e0mjluqXdLbzv681HlC9B8BfGN8sIXIw3huLyQqwXI=";
allowedIPs = [ "10.0.0.4/32" ];
}
];
};
};
};
});
2024-08-05 18:46:10 +02:00
anonymous-dns = moduleWithSystem (toplevel@{ ... }: perSystem@{ ... }: {
networking = {
nameservers = [ "127.0.0.1" "::1" ];
dhcpcd.extraConfig = "nohook resolv.conf";
};
services = {
dnscrypt-proxy2 = {
enable = true;
settings = {
cache = false;
ipv4_servers = true;
ipv6_servers = true;
dnscrypt_servers = true;
doh_servers = false;
odoh_servers = false;
require_dnssec = true;
require_nolog = true;
require_nofilter = true;
anonymized_dns = {
routes = [{ server_name = "*"; via = [ "sdns://gQ8yMTcuMTM4LjIyMC4yNDM" ]; }];
};
sources.public-resolvers = {
urls = [
"https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md"
"https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md"
];
cache_file = "/var/lib/dnscrypt-proxy/public-resolvers.md";
minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3";
};
};
};
};
});
};
}