2024-05-03 13:33:06 -04:00
|
|
|
|
# Edit this configuration file to define what should be installed on
|
|
|
|
|
|
# your system. Help is available in the configuration.nix(5) man page
|
|
|
|
|
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
|
|
|
|
{
|
|
|
|
|
|
pkgs,
|
|
|
|
|
|
inputs,
|
2024-10-22 15:15:39 -04:00
|
|
|
|
config,
|
2024-05-03 13:33:06 -04:00
|
|
|
|
...
|
|
|
|
|
|
}: {
|
|
|
|
|
|
imports = [
|
|
|
|
|
|
# Include the results of the hardware scan.
|
|
|
|
|
|
./hardware-configuration.nix
|
|
|
|
|
|
];
|
|
|
|
|
|
|
2024-05-29 22:14:43 -04:00
|
|
|
|
nix.settings = {
|
2024-07-10 10:49:29 -04:00
|
|
|
|
trusted-users = ["zoey"];
|
2024-05-29 22:14:43 -04:00
|
|
|
|
};
|
|
|
|
|
|
|
2024-08-07 10:44:50 -04:00
|
|
|
|
nix.optimise = {
|
|
|
|
|
|
automatic = true;
|
|
|
|
|
|
dates = ["03:45"];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
nix.gc = {
|
|
|
|
|
|
automatic = true;
|
|
|
|
|
|
dates = "weekly";
|
|
|
|
|
|
options = "--delete-older-than 14d";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-03 13:33:06 -04:00
|
|
|
|
# Bootloader.
|
|
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
|
|
|
|
|
2024-10-06 21:37:22 -04:00
|
|
|
|
programs.nix-ld.enable = true;
|
|
|
|
|
|
|
2024-05-03 13:33:06 -04:00
|
|
|
|
networking.hostName = "pluto"; # Define your hostname.
|
|
|
|
|
|
|
2024-05-24 11:42:49 -04:00
|
|
|
|
services.web.nginx.enable = true;
|
2024-05-31 14:45:01 -04:00
|
|
|
|
services.gh.enable = true;
|
2024-10-16 15:40:35 -04:00
|
|
|
|
services.fail2ban.enable = true;
|
2024-10-18 23:59:23 -04:00
|
|
|
|
|
2024-11-13 20:35:13 -05:00
|
|
|
|
services.atproto-pds = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
nginx = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
domain = "zoeys.computer";
|
|
|
|
|
|
subdomainPrefix = "pds";
|
|
|
|
|
|
useACME = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
blobStorage = {
|
|
|
|
|
|
type = "disk";
|
|
|
|
|
|
diskPath = "/pds/blocks"; # or your preferred path
|
|
|
|
|
|
};
|
|
|
|
|
|
port = 3525; # or any other port you want to use
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-10-31 21:01:42 -04:00
|
|
|
|
ui.fonts.enable = true;
|
|
|
|
|
|
|
2024-10-22 15:15:39 -04:00
|
|
|
|
age.secrets = {
|
|
|
|
|
|
zc_key = {
|
|
|
|
|
|
owner = "zoeyscomputer-phx";
|
|
|
|
|
|
group = "zoeyscomputer-phx";
|
|
|
|
|
|
file = ./sec/zc_key.age;
|
|
|
|
|
|
};
|
|
|
|
|
|
zc_db_pass = {
|
|
|
|
|
|
owner = "zoeyscomputer-phx";
|
|
|
|
|
|
group = "zoeyscomputer-phx";
|
|
|
|
|
|
file = ./sec/zc_db_pass.age;
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-24 11:42:49 -04:00
|
|
|
|
sites = {
|
|
|
|
|
|
cv.enable = true;
|
|
|
|
|
|
gitlab.enable = true;
|
|
|
|
|
|
grafana.enable = true;
|
|
|
|
|
|
mirror.enable = true;
|
|
|
|
|
|
pterodactyl.enable = true;
|
|
|
|
|
|
search.enable = true;
|
2024-06-06 12:22:31 -04:00
|
|
|
|
map.enable = true;
|
2024-10-18 23:59:23 -04:00
|
|
|
|
hydra.enable = true;
|
2024-10-19 14:33:01 -04:00
|
|
|
|
cache.enable = true;
|
2024-10-22 15:15:39 -04:00
|
|
|
|
minio.enable = true;
|
|
|
|
|
|
zoeycomputer = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
domain = "zoeys.computer";
|
|
|
|
|
|
phx = {
|
|
|
|
|
|
database = {
|
|
|
|
|
|
name = "zoeyscomputer";
|
|
|
|
|
|
user = "zoeyscomputer";
|
|
|
|
|
|
passwordFile = config.age.secrets.zc_db_pass.path; # Optional
|
|
|
|
|
|
host = "localhost"; # Optional, defaults to localhost
|
|
|
|
|
|
};
|
|
|
|
|
|
secret_key_file = config.age.secrets.zc_key.path;
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
2024-05-24 11:42:49 -04:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
zmio.blog.enable = true;
|
2024-07-24 12:16:23 -04:00
|
|
|
|
zmio.blog.domain = "zackmyers.io";
|
2024-05-24 11:42:49 -04:00
|
|
|
|
|
2024-05-03 13:40:06 -04:00
|
|
|
|
nix.settings.experimental-features = ["nix-command" "flakes"];
|
|
|
|
|
|
|
2024-05-03 13:33:06 -04:00
|
|
|
|
# Enable networking
|
|
|
|
|
|
networking.networkmanager.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Set your time zone.
|
|
|
|
|
|
time.timeZone = "America/New_York";
|
|
|
|
|
|
|
|
|
|
|
|
# Select internationalisation properties.
|
|
|
|
|
|
i18n.defaultLocale = "en_US.UTF-8";
|
|
|
|
|
|
|
|
|
|
|
|
i18n.extraLocaleSettings = {
|
|
|
|
|
|
LC_ADDRESS = "en_US.UTF-8";
|
|
|
|
|
|
LC_IDENTIFICATION = "en_US.UTF-8";
|
|
|
|
|
|
LC_MEASUREMENT = "en_US.UTF-8";
|
|
|
|
|
|
LC_MONETARY = "en_US.UTF-8";
|
|
|
|
|
|
LC_NAME = "en_US.UTF-8";
|
|
|
|
|
|
LC_NUMERIC = "en_US.UTF-8";
|
|
|
|
|
|
LC_PAPER = "en_US.UTF-8";
|
|
|
|
|
|
LC_TELEPHONE = "en_US.UTF-8";
|
|
|
|
|
|
LC_TIME = "en_US.UTF-8";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Configure keymap in X11
|
|
|
|
|
|
services.xserver = {
|
|
|
|
|
|
layout = "us";
|
|
|
|
|
|
xkbVariant = "";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-03 13:40:06 -04:00
|
|
|
|
programs.zsh.enable = true;
|
|
|
|
|
|
|
2024-05-03 14:10:05 -04:00
|
|
|
|
programs.mosh.enable = true;
|
|
|
|
|
|
|
2024-05-05 21:12:08 -04:00
|
|
|
|
environment.systemPackages = [inputs.agenix.packages.${pkgs.system}.agenix];
|
|
|
|
|
|
|
2024-05-03 13:40:06 -04:00
|
|
|
|
users.mutableUsers = false;
|
2024-05-03 13:33:06 -04:00
|
|
|
|
# Define a user account. Don't forget to set a password with ‘passwd’.
|
|
|
|
|
|
users.users.zack = {
|
|
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "zack";
|
2024-05-03 16:28:54 -04:00
|
|
|
|
extraGroups = ["networkmanager" "wheel" "docker"];
|
2024-05-03 13:40:06 -04:00
|
|
|
|
shell = pkgs.zsh;
|
2024-05-05 18:52:10 -04:00
|
|
|
|
packages = with pkgs; [];
|
2024-05-03 13:40:06 -04:00
|
|
|
|
hashedPassword = "$6$rounds=2000000$673Iz4rM8Dr9yz7C$Xq5JXxE7ioUrpZmMf3uTrPN2ODrEu3Sph6EhWyPoM5Ty./FhgB9hU0mz1yYo8sUj7wdUMWfR98haVJ24Wv3BK/";
|
2024-05-04 00:15:42 -04:00
|
|
|
|
openssh.authorizedKeys.keys = [
|
|
|
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICuUA9KTvcZ+ZTEO90y6VcmQyuwL30I2mOGsm8GZn7BF zack@mars"
|
|
|
|
|
|
];
|
2024-05-03 13:33:06 -04:00
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-10 10:49:29 -04:00
|
|
|
|
users.users.zoey = {
|
|
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "zoey";
|
|
|
|
|
|
extraGroups = ["networkmanager" "wheel" "docker"];
|
|
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
|
|
hashedPassword = "$6$rounds=2000000$673Iz4rM8Dr9yz7C$Xq5JXxE7ioUrpZmMf3uTrPN2ODrEu3Sph6EhWyPoM5Ty./FhgB9hU0mz1yYo8sUj7wdUMWfR98haVJ24Wv3BK/";
|
|
|
|
|
|
openssh.authorizedKeys.keys = [
|
2025-01-12 15:55:22 -05:00
|
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFuw7D+qDzzxBKsfKEmMd7odc98m3ZEnqWYFtuKwvC9k zoey@earth"
|
2024-07-10 10:49:29 -04:00
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-04 00:21:10 -04:00
|
|
|
|
users.users.alfie = {
|
2024-05-04 00:20:43 -04:00
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "alfie";
|
|
|
|
|
|
extraGroups = ["wheel" "docker"];
|
|
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
|
|
hashedPassword = "$6$rounds=2000000$iq6PHGbyILszBS.4$PNjQ8FHJAC6JwwjTns1gxfLrXH0m/yMdFE57O29mGBEKOYm0fDqd1XG/7GjdBgNsxYVVy3LgebOGifSMUwelu1";
|
|
|
|
|
|
openssh.authorizedKeys.keys = [
|
|
|
|
|
|
"ssh-rsa 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 rotki@DESKTOP-J809N7P"
|
|
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-29 11:46:52 -04:00
|
|
|
|
users.users.aspect = {
|
|
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "aspect";
|
|
|
|
|
|
extraGroups = ["wheel" "docker"];
|
|
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
|
|
hashedPassword = "$6$rounds=2000000$.jQCugUHZuUcjfEn$L1M3pmsEPCeqckEPa5t7pqKCxQyGwxmQvK/65c2.IAXE0bhsoGL3kN0F9WpLxcN/wLt7xcikz005GiKFF.AND.";
|
|
|
|
|
|
openssh.authorizedKeys.keys = [
|
|
|
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA45PCi9tsGbGlVYq2Rt1jAD9/GDIDCsEfv88+4mAA2U imboo@FBISurvallienceVan3"
|
|
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-03 16:28:54 -04:00
|
|
|
|
virtualisation.docker.enable = true;
|
2024-05-03 13:33:06 -04:00
|
|
|
|
|
2024-05-24 11:42:49 -04:00
|
|
|
|
snowfallorg.users.zack = {
|
|
|
|
|
|
create = true;
|
|
|
|
|
|
admin = false;
|
|
|
|
|
|
|
|
|
|
|
|
home = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-10 10:49:29 -04:00
|
|
|
|
snowfallorg.users.zoey = {
|
|
|
|
|
|
create = true;
|
|
|
|
|
|
admin = false;
|
|
|
|
|
|
|
|
|
|
|
|
home = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-24 11:42:49 -04:00
|
|
|
|
snowfallorg.users.alfie = {
|
|
|
|
|
|
create = true;
|
|
|
|
|
|
admin = false;
|
|
|
|
|
|
|
|
|
|
|
|
home = {
|
|
|
|
|
|
enable = true;
|
2024-05-03 13:33:06 -04:00
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-29 12:43:29 -04:00
|
|
|
|
snowfallorg.users.aspect = {
|
|
|
|
|
|
create = true;
|
|
|
|
|
|
admin = false;
|
|
|
|
|
|
home = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-03 14:22:34 -04:00
|
|
|
|
security.acme = {
|
|
|
|
|
|
acceptTerms = true;
|
|
|
|
|
|
defaults.email = "zach@zacharymyers.com";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-05-03 13:33:06 -04:00
|
|
|
|
# Some programs need SUID wrappers, can be configured further or are
|
|
|
|
|
|
# started in user sessions.
|
|
|
|
|
|
# programs.mtr.enable = true;
|
|
|
|
|
|
# programs.gnupg.agent = {
|
|
|
|
|
|
# enable = true;
|
|
|
|
|
|
# enableSSHSupport = true;
|
|
|
|
|
|
# };
|
|
|
|
|
|
|
|
|
|
|
|
# List services that you want to enable:
|
|
|
|
|
|
|
|
|
|
|
|
# Enable the OpenSSH daemon.
|
2024-05-04 00:15:42 -04:00
|
|
|
|
services.openssh = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
passwordAuthentication = false;
|
2024-05-19 18:41:15 -04:00
|
|
|
|
permitRootLogin = "no";
|
2024-05-04 00:15:42 -04:00
|
|
|
|
};
|
2024-05-03 13:33:06 -04:00
|
|
|
|
|
|
|
|
|
|
# Open ports in the firewall.
|
2025-01-19 15:04:19 -05:00
|
|
|
|
networking.firewall.allowedTCPPorts = [80 443 6969 2022 16262];
|
2024-05-04 00:00:17 -04:00
|
|
|
|
networking.firewall.allowedTCPPortRanges = [
|
|
|
|
|
|
{
|
|
|
|
|
|
from = 25565;
|
|
|
|
|
|
to = 25575;
|
|
|
|
|
|
}
|
|
|
|
|
|
{
|
|
|
|
|
|
from = 24454;
|
|
|
|
|
|
to = 24464;
|
|
|
|
|
|
}
|
|
|
|
|
|
];
|
2025-01-19 15:04:19 -05:00
|
|
|
|
networking.firewall.allowedUDPPorts = [80 443 6969 2022 16262];
|
2024-05-03 13:33:06 -04:00
|
|
|
|
# Or disable the firewall altogether.
|
|
|
|
|
|
# networking.firewall.enable = false;
|
|
|
|
|
|
|
|
|
|
|
|
# This value determines the NixOS release from which the default
|
|
|
|
|
|
# settings for stateful data, like file locations and database versions
|
|
|
|
|
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
|
|
|
|
|
# this value at the release version of the first install of this system.
|
|
|
|
|
|
# Before changing this value read the documentation for this option
|
|
|
|
|
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
|
|
|
|
|
system.stateVersion = "23.11"; # Did you read the comment?
|
|
|
|
|
|
}
|