nixcfg/hosts/mauville/default.nix

232 lines
5.3 KiB
Nix
Raw Normal View History

2024-03-12 22:14:08 -04:00
# Custom desktop with AMD Ryzen 5 2600, 16GB RAM, AMD Rx 6700, and 1TB SSD + 2TB HDD.
{
2024-04-07 22:16:33 -04:00
config,
lib,
pkgs,
self,
2024-04-07 22:16:33 -04:00
...
}: let
archiveDirectory = "/mnt/Archive";
domain = "raffauflabs.com";
mediaDirectory = "/mnt/Media";
in {
imports = [
../common
./disko.nix
./home.nix
self.inputs.nixhw.nixosModules.common-amd-cpu
self.inputs.nixhw.nixosModules.common-amd-gpu
self.inputs.nixhw.nixosModules.common-bluetooth
self.inputs.nixhw.nixosModules.common-ssd
self.inputs.raffauflabs.nixosModules.raffauflabs
];
age.secrets = {
cloudflare.file = ../../secrets/cloudflare.age;
2024-06-25 21:47:48 -04:00
lastfmId = {
owner = "navidrome";
file = ../../secrets/lastFM/apiKey.age;
};
lastfmSecret = {
owner = "navidrome";
file = ../../secrets/lastFM/secret.age;
2024-06-25 21:47:48 -04:00
};
spotifyId = {
owner = "navidrome";
file = ../../secrets/spotify/clientId.age;
2024-07-04 21:03:49 -04:00
};
spotifySecret = {
owner = "navidrome";
file = ../../secrets/spotify/clientSecret.age;
};
syncthingCert.file = ../../secrets/syncthing/mauville/cert.age;
syncthingKey.file = ../../secrets/syncthing/mauville/key.age;
transmission.file = ../../secrets/transmission.age;
};
2024-06-28 21:07:20 -04:00
2024-07-07 19:17:35 -04:00
boot = {
initrd = {
availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "sd_mod" "r8169"];
network = {
enable = true;
flushBeforeStage2 = true;
ssh = {
enable = true;
hostKeys = [/etc/secrets/initrd/ssh_host_ed25519_key];
};
udhcpc.enable = true;
postCommands = ''
# Automatically ask for the password on SSH login
echo 'cryptsetup-askpass || echo "Unlock was successful; exiting SSH session" && exit 1' >> /root/.profile
'';
};
};
2024-07-07 19:17:35 -04:00
loader = {
efi.canTouchEfiVariables = true;
systemd-boot.enable = true;
};
};
2024-06-28 21:07:20 -04:00
2024-07-07 19:17:35 -04:00
hardware.enableAllFirmware = true;
networking.hostName = "mauville";
2024-06-30 23:01:57 -04:00
services = {
2024-07-11 21:06:45 -04:00
forgejo.settings.service.DISABLE_REGISTRATION = lib.mkForce true;
samba = {
enable = true;
openFirewall = true;
securityType = "user";
shares = {
Media = {
2024-06-07 13:14:34 -04:00
browseable = "yes";
comment = "Media @ ${config.networking.hostName}";
path = mediaDirectory;
"read only" = "no";
"guest ok" = "yes";
"create mask" = "0755";
"directory mask" = "0755";
};
Archive = {
2024-06-07 13:14:34 -04:00
browseable = "yes";
comment = "Archive @ ${config.networking.hostName}";
path = archiveDirectory;
"create mask" = "0755";
"directory mask" = "0755";
2024-06-07 13:14:34 -04:00
"guest ok" = "yes";
"read only" = "no";
};
};
};
samba-wsdd = {
enable = true;
openFirewall = true;
};
transmission = {
enable = true;
credentialsFile = config.age.secrets.transmission.path;
openFirewall = true;
openRPCPort = true;
settings = {
download-dir = mediaDirectory;
peer-port = 51413;
rpc-bind-address = "0.0.0.0";
rpc-port = 9091;
};
};
};
2024-07-07 22:23:19 -04:00
environment.variables.GDK_SCALE = "1.25";
system = {
activationScripts.gen-initrd-ssh.text = ''
KEY_PATH="/etc/secrets/initrd/ssh_host_ed25519_key"
mkdir -p /etc/secrets/initrd
# Check if the file already exists
if [ -f "$KEY_PATH" ]; then
echo "[initrd] ssh key exists at $KEY_PATH."
else
# Generate the SSH key if it doesn't exist
${pkgs.openssh}/bin/ssh-keygen -t ed25519 -N "" -f "$KEY_PATH"
echo "[initrd] ssh key generated at $KEY_PATH."
fi
'';
stateVersion = "24.05";
};
zramSwap.memoryPercent = 100;
ar = {
apps = {
2024-06-28 21:07:20 -04:00
firefox.enable = true;
nicotine-plus.enable = true;
podman.enable = true;
steam.enable = true;
virt-manager.enable = true;
};
desktop = {
greetd = {
enable = true;
autologin = "aly";
};
hyprland.enable = true;
steam.enable = true;
};
users = {
aly = {
enable = true;
password = "$y$j9T$SHPShqI2IpRE101Ey2ry/0$0mhW1f9LbVY02ifhJlP9XVImge9HOpf23s9i1JFLIt9";
syncthing = {
enable = true;
certFile = config.age.secrets.syncthingCert.path;
keyFile = config.age.secrets.syncthingKey.path;
musicPath = "${mediaDirectory}/Music";
};
};
dustin = {
enable = true;
password = "$y$j9T$3mMCBnUQ.xjuPIbSof7w0.$fPtRGblPRSwRLj7TFqk1nzuNQk2oVlgvb/bE47sghl.";
};
};
};
raffauflabs = {
inherit domain;
enable = true;
containers.oci.freshRSS.enable = true;
services = {
audiobookshelf.enable = true;
ddclient = {
enable = true;
passwordFile = config.age.secrets.cloudflare.path;
protocol = "cloudflare";
};
forgejo.enable = true;
navidrome = {
enable = true;
2024-07-10 21:21:14 -04:00
lastfm = {
idFile = config.age.secrets.lastfmId.path;
secretFile = config.age.secrets.lastfmSecret.path;
};
2024-07-10 21:21:14 -04:00
spotify = {
idFile = config.age.secrets.spotifyId.path;
secretFile = config.age.secrets.spotifySecret.path;
};
};
plexMediaServer.enable = true;
};
};
}