nixos-dotfiles/hosts/titan/configuration.nix

423 lines
12 KiB
Nix
Raw Normal View History

# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
inputs: { config, pkgs, lib, ... }:
let
# nix-software-center = inputs.nix-software-center.packages.${pkgs.system}.nix-software-center;
# doom-emacs = inputs.nix-doom-emacs.packages.${pkgs.system}.default;
# nh = inputs.nix-but-gigachad.packages.${pkgs.system}.default;
in {
imports =
[ # Include the results of the hardware scan.
./hardware/hardware-configuration.nix
./cachix.nix
( import ./hardware/nvidia.nix inputs )
( import ./services/forge.nix inputs )
( import ./services/cloud.nix inputs )
( import ./services/vaultwarden.nix inputs )
( import ./services/matrix.nix inputs )
( import ./services/tor.nix inputs )
2024-06-25 10:53:22 +03:00
( import ./services/navidrome.nix inputs )
# ( import ./services/iceshrimp.nix inputs )
( import ./services/slskd.nix inputs )
# ( import ./services/office.nix inputs )
# ( import ./services/Sharkey inputs )
# ( import ./services/caddy.nix inputs ) # doesn't work
# ( import ./services/dnsmasq.nix inputs ) # borks my DNS
# ( import ./services/mail-server.nix inputs ) # needs a lot of DNS configs from cloudflaer, I only have 3 rules
# inputs.nix-but-gigachad.nixosModules.default
];
# nh = {
# enable = true;
# clean.enable = true;
# flake = "/home/ultra/.nixdotfiles";
# };
fonts = {
fontconfig = {
defaultFonts = {
serif = [ "JetBrainsMono Nerd Font" ];
sansSerif = [ "JetBrainsMono Nerd Font" ];
monospace = [ "JetBrainsMono Nerd Font" ];
};
};
};
nix.settings = {
trusted-users = [ "root" "ultra" ];
experimental-features = [ "nix-command" "flakes" ];
substituters = [
"https://hyprland.cachix.org"
"https://viperml.cachix.org"
];
trusted-public-keys = [
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
"viperml.cachix.org-1:qZhKBMTfmcLL+OG6fj/hzsMEedgKvZVFRRAhq7j8Vh8="
];
};
boot = {
kernelPackages = pkgs.linuxPackages_latest; # Use the latest kernel
loader = {
systemd-boot.enable = true;
efi = {
canTouchEfiVariables = true;
efiSysMountPoint = "/boot/efi";
};
};
plymouth.enable = true;
};
networking = {
hostName = "titan"; # Define your hostname.
domain = "gra.phite.ro";
# Enable networking
networkmanager.enable = true;
hosts = {
# "192.168.0.221" = [ "pi" "pi-master" ];
"65.108.48.233" = [ "queer.af" ];
};
/*
nameservers = [
"8.8.8.8"
"94.16.114.254"
];
*/
};
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# Configure network proxy if necessary
# networking.proxy.default = "http://user:password@proxy:port/";
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
# Set your time zone.
time.timeZone = "Europe/Bucharest";
# Select internationalisation properties.
i18n.defaultLocale = "en_GB.utf8";
i18n.extraLocaleSettings = {
LC_ADDRESS = "ro_RO.utf8";
LC_IDENTIFICATION = "ro_RO.utf8";
LC_MEASUREMENT = "ro_RO.utf8";
LC_MONETARY = "ro_RO.utf8";
LC_NAME = "ro_RO.utf8";
LC_NUMERIC = "ro_RO.utf8";
LC_PAPER = "ro_RO.utf8";
LC_TELEPHONE = "ro_RO.utf8";
LC_TIME = "ro_RO.utf8";
};
# Enable sound with pipewire.
sound.enable = true;
hardware.pulseaudio.enable = false;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
# If you want to use JACK applications, uncomment this
#jack.enable = true;
# use the example session manager (no others are packaged yet so this is enabled by default,
# no need to redefine it in your config for now)
#media-session.enable = true;
};
# Enable touchpad support (enabled default in most desktopManager).
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with passwd.
users.users.ultra = {
isNormalUser = true;
description = "Alex S.";
extraGroups = [
"networkmanager"
"wheel"
"vboxusers"
"input"
"uinput"
];
shell = pkgs.fish;
hashedPassword = "$6$OBjnSQhhJgHsr5LE$jFtUz.2qv0l2viv86exXmfHWC0fDFXKD3rqH41NmqgkdoBrwY2rPkDBCPjdq7PSoeudYcQ0nXxJvh1N7EIUs90";
};
# Allow unfree packages
nixpkgs.config.allowUnfree = true;
# List packages installed in system profile. To search, run:
# $ nix search wget
environment = {
sessionVariables = {
QT_QPA_PLATFORMTHEME = "qt5ct";
};
systemPackages = with pkgs; [
wget
neovim
neofetch
podman
distrobox
cargo
nushell
nerdfonts
steam-run
packagekit
# nix-software-center
fish
libsForQt5.yakuake
libsForQt5.discover
wacomtablet
git
starship
plymouth
clang-tools
nil
pkg-config
nh
ksnip
virt-manager
flutter
nixd
sddm-kcm
wooting-udev-rules
wootility
docker-compose
qflipper
];
variables = {
NIX_AUTO_RUN = "!";
};
};
programs = {
dconf.enable = true;
fish.enable = true;
kdeconnect = {
enable = true;
};
hyprland = {
enable = true;
};
command-not-found.enable = true;
nh = {
enable = true;
clean.enable = true;
flake = "/home/ultra/.nixdotfiles";
};
};
# programs.nushell.enable = true;
# users.defaultUserShell = pkgs.zsh;
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;
# programs.gnupg.agent = {
# enable = true;
# enableSSHSupport = true;
# };
# List services that you want to enable:
# Enable the OpenSSH daemon.
# services.openssh.enable = true;
# Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ 21 20 22 ];
# networking.firewall.allowedUDPPorts = [ 21 20 22 ];
# Or disable the firewall altogether.
networking.firewall.enable = false;
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "22.11"; # Did you read the comment?
system.autoUpgrade.enable = true;
system.autoUpgrade.allowReboot = false;
security.sudo.extraConfig = ''
Defaults insults
Defaults pwfeedback
'';
virtualisation = {
libvirtd = {
enable = true;
};
podman = {
enable = true;
dockerCompat = true;
# defaultNetwork.settings.dns_enabled = true;
};
waydroid.enable = true;
lxd.enable = true;
virtualbox = {
host = {
enable = false; # it takes a REALLY long time (and a lot of CPU) to build, and it still doesn't work.
enableExtensionPack = false; # false because this might build it (idk)
};
};
};
services = {
xrdp = {
enable = true;
defaultWindowManager = "startplasma-x11";
openFirewall = false;
};
x2goserver.enable = true;
emacs = {
enable = false; # takes a lot of time to compile
/*
package = doom-emacs.override {
doomPrivateDir = ./doom.d;
};
*/
};
flatpak.enable = true;
packagekit.enable = true;
xserver = {
# videoDrivers = [ "nvidia" ];
wacom.enable = true;
enable = true;
# Enable KDE Plasma 5
displayManager = {
/*
autoLogin = {
enable = false;
user = "ultra";
};
*/
sddm = {
enable = true;
settings = {
General = {
DisplayServer = "wayland";
GreeterEnbironment = "QT_WAYLAND_SHELL_INTEGRATION=layer-shell";
};
Wayland = {
CompositerCommand = "kwin_wayland --drm --no-lockscreen --no-global-shortcuts";
};
};
};
startx.enable = true;
};
desktopManager.plasma5.enable = true;
# Keymap
layout = "ro";
xkbVariant = "";
};
apcupsd = {
enable = true;
};
# Enable CUPS to print documents.
printing = {
enable = true;
};
twingate.enable = false;
kubo = {
enable = true;
startWhenNeeded = true;
autoMount = true;
};
# FTP daemon
vsftpd = {
enable = true; # enable the daemon
localUsers = true; # allow local users to use the daemon
# allow anonymous users to log in
anonymousUser = true;
anonymousUserNoPassword = true;
anonymousUploadEnable = false; # Anyone uploading files wouldn't be so secure, would it?
anonymousMkdirEnable = false; # Neither would them creating directories.
writeEnable = false;
};
snowflake-proxy.enable = true;
openssh = {
enable = true;
settings = {
PasswordAuthentication = true;
};
};
tailscale = {
enable = true;
};
avahi = {
enable = true;
nssmdns = true;
};
};
# create a oneshot job to authenticate to Tailscale
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";
# make sure tailscale is running before trying to connect to tailscale
after = [ "network-pre.target" "tailscale.service" ];
wants = [ "network-pre.target" "tailscale.service" ];
wantedBy = [ "multi-user.target" ];
# set this service as a oneshot job
serviceConfig.Type = "oneshot";
# have the job run this shell script
script = with pkgs; ''
# wait for tailscaled to settle
sleep 2
# check if we are already authenticated to tailscale
status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)"
if [ $status = "Running" ]; then # if so, then do nothing
exit 0
fi
# otherwise authenticate with tailscale
${tailscale}/bin/tailscale up
'';
};
hardware = {
# bluetooth config
bluetooth = {
enable = true;
};
wooting.enable = true;
xpadneo.enable = true;
flipperzero.enable = true;
};
security = {
pam = {
loginLimits = [
{
domain = "*";
item = "nproc";
type = "soft";
value = "10000";
}
];
};
};
}