193 lines
4.5 KiB
Nix
193 lines
4.5 KiB
Nix
# Do not modify this file! It was generated by 'nixos-generate-config'
|
|
# and may be overwritten by future invocations. Please make changes
|
|
# to /etc/nixos/configuration.nix instead.
|
|
{
|
|
config,
|
|
lib,
|
|
modulesPath,
|
|
inputs,
|
|
...
|
|
}:
|
|
let
|
|
sanoidConfig = import ./config/sanoid.nix { };
|
|
disks = import ./config/disks.nix;
|
|
smartdDevices = map (device: { inherit device; }) disks;
|
|
|
|
in
|
|
{
|
|
imports = [
|
|
(modulesPath + "/installer/scan/not-detected.nix")
|
|
inputs.disko.nixosModules.disko
|
|
(import ../../profiles/disko-nixos.nix { disks = [ "/dev/sda" ]; })
|
|
];
|
|
|
|
boot = {
|
|
initrd = {
|
|
availableKernelModules = [
|
|
"ehci_pci"
|
|
"ahci"
|
|
"mpt3sas"
|
|
"isci"
|
|
"usbhid"
|
|
"usb_storage"
|
|
"sd_mod"
|
|
];
|
|
kernelModules = [ "nfs" ];
|
|
supportedFilesystems = [ "nfs" ];
|
|
};
|
|
|
|
kernelModules = [
|
|
"kvm-intel"
|
|
"vfio"
|
|
"vfio_iommu_type1"
|
|
"vfio_pci"
|
|
"vfio_virqfd"
|
|
];
|
|
extraModulePackages = [ ];
|
|
kernelParams = [
|
|
"iommu=pt"
|
|
"intel_iommu=on"
|
|
"zfs.zfs_arc_max=107374182400"
|
|
]; # 100GB
|
|
};
|
|
|
|
swapDevices = [ ];
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAGSFTSVPt43PBpSMSF1dGTzN2JbxztDZUml7g4+PnWe CSI-Driver@talos"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBROTzSefJGJeCNUgNLbE5l4sHHg2fHUO4sCwqvP+zAd root@Gollum"
|
|
];
|
|
|
|
# Network settings
|
|
networking = {
|
|
hostName = "gandalf";
|
|
hostId = "e2fc95cd";
|
|
useDHCP = false; # needed for bridge
|
|
networkmanager.enable = true;
|
|
# TODO: Add ports specifically.
|
|
firewall.enable = false;
|
|
nftables.enable = false;
|
|
interfaces = {
|
|
"enp130s0f0".useDHCP = true;
|
|
"eno1".useDHCP = true;
|
|
};
|
|
};
|
|
|
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
|
|
|
# VSCode Compatibility Settings
|
|
programs.nix-ld.enable = true;
|
|
services.vscode-server = {
|
|
enable = true;
|
|
};
|
|
|
|
# Home Manager
|
|
home-manager.users.jahanson = {
|
|
# Git settings
|
|
# TODO: Move to config module.
|
|
programs.git = {
|
|
enable = true;
|
|
userName = "Joseph Hanson";
|
|
userEmail = "joe@veri.dev";
|
|
|
|
extraConfig = {
|
|
core.autocrlf = "input";
|
|
init.defaultBranch = "main";
|
|
pull.rebase = true;
|
|
rebase.autoStash = true;
|
|
};
|
|
};
|
|
};
|
|
|
|
# sops
|
|
sops = {
|
|
secrets = {
|
|
"borg/repository/passphrase" = {
|
|
sopsFile = ./secrets.sops.yaml;
|
|
};
|
|
"syncthing/publicCert" = {
|
|
sopsFile = ./secrets.sops.yaml;
|
|
owner = "syncthing";
|
|
mode = "400";
|
|
restartUnits = [ "syncthing.service" ];
|
|
};
|
|
"syncthing/privateKey" = {
|
|
sopsFile = ./secrets.sops.yaml;
|
|
owner = "syncthing";
|
|
mode = "400";
|
|
restartUnits = [ "syncthing.service" ];
|
|
};
|
|
};
|
|
};
|
|
|
|
services = {
|
|
# Smart daemon for monitoring disk health.
|
|
smartd = {
|
|
devices = smartdDevices;
|
|
# Short test every day at 2:00 AM and long test every Sunday at 4:00 AM.
|
|
defaults.monitored = "-a -o on -s (S/../.././02|L/../../7/04)";
|
|
};
|
|
# ZFS Exporter
|
|
prometheus.exporters.zfs.enable = true;
|
|
};
|
|
|
|
# System settings and services.
|
|
mySystem = {
|
|
purpose = "Production";
|
|
system = {
|
|
motd.networkInterfaces = [
|
|
"enp130s0f0"
|
|
"eno1"
|
|
];
|
|
# Incus
|
|
incus = {
|
|
enable = true;
|
|
preseed = import ./config/incus-preseed.nix { };
|
|
webuiport = 8445;
|
|
};
|
|
# ZFS
|
|
zfs.enable = true;
|
|
zfs.mountPoolsAtBoot = [ "eru" ];
|
|
# NFS
|
|
nfs.enable = true;
|
|
# Samba
|
|
samba = {
|
|
enable = true;
|
|
shares = import ./config/samba-shares.nix { };
|
|
extraConfig = import ./config/samba-config.nix { };
|
|
};
|
|
resticBackup = {
|
|
local.enable = false;
|
|
remote.enable = false;
|
|
local.noWarning = true;
|
|
remote.noWarning = true;
|
|
};
|
|
};
|
|
services = {
|
|
libvirt-qemu.enable = true;
|
|
podman.enable = true;
|
|
|
|
# Syncthing
|
|
syncthing = {
|
|
enable = true;
|
|
publicCertPath = config.sops.secrets."syncthing/publicCert".path;
|
|
privateKeyPath = config.sops.secrets."syncthing/privateKey".path;
|
|
};
|
|
|
|
# Scrutiny
|
|
scrutiny = {
|
|
enable = true;
|
|
devices = disks;
|
|
extraCapabilities = [ "SYS_RAWIO" ];
|
|
containerVolumeLocation = "/eru/containers/volumes/scrutiny";
|
|
port = 8585;
|
|
};
|
|
|
|
# Sanoid
|
|
sanoid = {
|
|
enable = true;
|
|
inherit (sanoidConfig.outputs) templates datasets;
|
|
};
|
|
};
|
|
};
|
|
}
|