nixos/modules/base-system.nix

199 lines
6.5 KiB
Nix

# Settings that most of my hosts can agree on, but
# some of these settings are overriden on a per-host basis.
{
pkgs,
lib,
config,
inputs,
...
}: let
cfg = config.settings;
inherit (lib) mkDefault;
highSSHPort = 38611;
vpnInterface = config.services.tailscale.interfaceName;
enableHydraMinion = config.services.openssh.enable;
in {
imports = [
./hdparm.nix
./malte.nix
./deck.nix
./radicale.nix
./wakeup.nix
./state.nix
];
options.settings = with lib; {
nvidiaUsed = mkEnableOption "NVIDIA graphic card usage";
minimalGnome.enable = mkEnableOption "basic gnome stuff";
ssh.openOutsideVPN = mkEnableOption "an additional ssh port outside the VPN";
batteryStuff.enable = mkEnableOption "battery-related things";
hiDPI.enable = mkEnableOption "High-DPI display";
};
config = {
# Allow joypixels' license and unfree licenses in general
nixpkgs.config = {
# TODO: Fix once allowUnfree works for home-manager again
allowUnfreePredicate = _: true;
joypixels.acceptLicense = true;
};
# Some overlays
nixpkgs.overlays = [
(_: super: {
"2i-emulator" = super.callPackage ../pkgs/2i-emulator.nix {};
darkman = super.callPackage ../pkgs/darkman.nix {};
emulationstation-de = lib.warn "I'm overriding emulationstation-de. Keep a look out for updates, will ya?" (super.callPackage ../pkgs/emulationstation-de.nix {});
hack-nerdfont = super.nerdfonts.override {fonts = ["Hack"];};
})
];
# This includes the firmware, oc
hardware.enableRedistributableFirmware = true;
# Add certificate authority used for my servers
security.pki.certificates = [
(builtins.readFile ../secrets/ca.crt)
];
system.nixos.label = let
rev =
if builtins.hasAttr "dirtyShortRev" inputs.self
then inputs.self.dirtyShortRev
else inputs.self.shortRev;
in
(builtins.concatStringsSep "-" (builtins.sort (x: y: x < y) config.system.nixos.tags)) + config.system.nixos.version + "-SHA:${rev}";
# Use some binary caches
nix.settings = {
# add binary caches
trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA="
"cache.home:/ioV+oXpVgxDOZJvXIWmnyL83ERT4W6eW4SDEpnRbxU="
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
];
substituters = [
"https://cache.nixos.org"
"https://nixpkgs-wayland.cachix.org"
"https://hyprland.cachix.org"
];
trusted-users =
[
# Hand the wheel group extra nix daemon rights
"@wheel"
# The hydra-minion is trusted aswell
]
++ lib.optional enableHydraMinion config.users.users.hydra-minion.name;
};
nix.extraOptions = ''
experimental-features = nix-command flakes
'';
nix.registry.nixpkgs.flake = inputs.nixpkgs;
nix.nixPath = ["nixpkgs=${inputs.nixpkgs}"];
users.users.hydra-minion = lib.mkIf enableHydraMinion {
description = "Hydra Minion for remote building";
isSystemUser = true;
home = "/home/hydra-minion";
createHome = true;
useDefaultShell = true;
group = config.users.groups.hydra-minion.name;
openssh.authorizedKeys.keyFiles = [
../secrets/pub/yubikey.pub
../secrets/hydra-overseer.pub
];
};
users.groups.hydra-minion = lib.mkIf enableHydraMinion {};
# Make sure that I can login over the tailscale infrastructure while increasing security
services.openssh = {
enable = pkgs.lib.mkDefault true;
ports = [22 highSSHPort];
openFirewall = false;
};
networking.firewall.interfaces.${vpnInterface} = {
# Allow default port over VPN
allowedTCPPorts = [22 highSSHPort];
};
# Add extra high port if requested for those outside the VPN
networking.firewall.allowedTCPPorts = lib.optional cfg.ssh.openOutsideVPN highSSHPort;
# Tailscale exit node seem to have a problem with strict checking
networking.firewall.checkReversePath = "loose";
# Add yubikey for root authentication
users.users.root.openssh.authorizedKeys.keyFiles = [../secrets/pub/yubikey.pub];
# Enable mosh for some SSH superpower
programs.mosh.enable = pkgs.lib.mkDefault true;
# Basic packages
environment.systemPackages = with pkgs; [
# I might need git for rebuilding this flake on the remote machine
git
# Sops is for security
sops
# top is lacking pizzazz
btop
# An initial `tailscale up` is necessary to get the network going
tailscale
# I will need to have access to helix
helix
# I much rather use some tools other than the default
fd
# For highlighting log files
tailspin
# For spacing log files
spacer
# DiskUsage improvements
du-dust
# R.I.P. grep
ripgrep
# It's just too handy
file
# file manager
nnn
];
# Language and timezone defaults
time.timeZone = "Europe/Berlin";
i18n.supportedLocales = [
"en_US.UTF-8/UTF-8"
"de_DE.UTF-8/UTF-8"
];
# Use the latest kernel, this is altered on some hosts with zfs requirements
boot.kernelPackages = pkgs.lib.mkOverride 2000 pkgs.linuxPackages_latest;
boot.loader.timeout = pkgs.lib.mkDefault 1;
# This setting is fine, on hosts with x/wayland, I'll want to increase this
boot.loader.systemd-boot.configurationLimit = lib.mkDefault 10;
# Network configuration with tailscale
networking.useDHCP = false;
# Enable tailscale!
services.tailscale = {
enable = true;
interfaceName = "looking-glas";
};
networking.interfaces.looking-glas = {};
networking.firewall.allowedUDPPorts = [config.services.tailscale.port];
# Regularly clear the store
nix.gc = {
automatic = true;
dates = lib.mkDefault "weekly";
};
# Enable store optimiser
nix.optimise = {
automatic = true;
dates = ["04:00"];
};
# GNOME
# Don't forget to import DISPLAY into dbus variables
programs.dconf.enable = mkDefault cfg.minimalGnome.enable;
programs.seahorse.enable = mkDefault cfg.minimalGnome.enable;
services.gnome.at-spi2-core.enable = mkDefault cfg.minimalGnome.enable;
services.gnome.gnome-keyring.enable = mkDefault cfg.minimalGnome.enable;
services.dbus.packages = lib.optional cfg.minimalGnome.enable pkgs.gcr;
};
}