177 lines
5.0 KiB
Nix
177 lines
5.0 KiB
Nix
{
|
||
config,
|
||
pkgs,
|
||
outputs,
|
||
...
|
||
}: {
|
||
imports = [
|
||
# Include the results of the hardware scan.
|
||
./hardware-configuration.nix
|
||
../common/users/produktion
|
||
../common/base
|
||
];
|
||
|
||
# Bootloader.
|
||
boot.loader.systemd-boot.enable = true;
|
||
boot.loader.efi.canTouchEfiVariables = true;
|
||
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
||
|
||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||
networking = {
|
||
hostName = "lkk-prod-2";
|
||
networkmanager.enable = true;
|
||
firewall.enable = true;
|
||
};
|
||
programs.fish.enable = true;
|
||
age = {
|
||
secrets = {tailscale-key.file = ../../secrets/tailscale-key.age;};
|
||
identityPaths = ["/root/.ssh/lkk-nix-1"];
|
||
};
|
||
services.openssh = {
|
||
enable = true;
|
||
settings.PermitRootLogin = "yes";
|
||
};
|
||
services.avahi.nssmdns4 = {
|
||
enable = true;
|
||
nssmdns = true;
|
||
};
|
||
services.tailscale = {
|
||
enable = true;
|
||
useRoutingFeatures = "client";
|
||
};
|
||
systemd.services.tailscale-autoconnect = {
|
||
description = "Automatic connection to Tailscale";
|
||
|
||
# make sure tailscale is running before trying to connect to tailscale
|
||
after = ["network-pre.target" "tailscale.service"];
|
||
wants = ["network-pre.target" "tailscale.service"];
|
||
wantedBy = ["multi-user.target"];
|
||
|
||
# set this service as a oneshot job
|
||
serviceConfig = {
|
||
Type = "oneshot";
|
||
EnvironmentFile = "${config.age.secrets.tailscale-key.path}";
|
||
};
|
||
|
||
# have the job run this shell script
|
||
script = with pkgs; ''
|
||
# wait for tailscaled to settle
|
||
sleep 2
|
||
|
||
# check if we are already authenticated to tailscale
|
||
status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)"
|
||
if [ $status = "Running" ]; then # if so, then do nothing
|
||
exit 0
|
||
fi
|
||
|
||
# otherwise authenticate with tailscale
|
||
${tailscale}/bin/tailscale up --authkey $TAILSCALE_KEY
|
||
'';
|
||
};
|
||
# Configure network proxy if necessary
|
||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||
|
||
# Set your time zone.
|
||
time.timeZone = "Europe/Berlin";
|
||
|
||
# Select internationalisation properties.
|
||
i18n.defaultLocale = "de_DE.UTF-8";
|
||
|
||
i18n.extraLocaleSettings = {
|
||
LC_ADDRESS = "de_DE.UTF-8";
|
||
LC_IDENTIFICATION = "de_DE.UTF-8";
|
||
LC_MEASUREMENT = "de_DE.UTF-8";
|
||
LC_MONETARY = "de_DE.UTF-8";
|
||
LC_NAME = "de_DE.UTF-8";
|
||
LC_NUMERIC = "de_DE.UTF-8";
|
||
LC_PAPER = "de_DE.UTF-8";
|
||
LC_TELEPHONE = "de_DE.UTF-8";
|
||
LC_TIME = "de_DE.UTF-8";
|
||
};
|
||
|
||
# Enable the X11 windowing system.
|
||
services.xserver.enable = true;
|
||
|
||
# Enable the KDE Plasma Desktop Environment.
|
||
services.xserver.displayManager.sddm.enable = true;
|
||
services.xserver.desktopManager.plasma5.enable = true;
|
||
|
||
# Configure keymap in X11
|
||
services.xserver = {xkb.layout = "de";};
|
||
|
||
# Configure console keymap
|
||
console.keyMap = "de";
|
||
|
||
# Enable CUPS to print documents.
|
||
services.printing.enable = true;
|
||
|
||
# Enable sound with pipewire.
|
||
sound.enable = true;
|
||
hardware.pulseaudio.enable = false;
|
||
security.rtkit.enable = true;
|
||
services.pipewire = {
|
||
enable = true;
|
||
alsa.enable = true;
|
||
alsa.support32Bit = true;
|
||
pulse.enable = true;
|
||
# If you want to use JACK applications, uncomment this
|
||
#jack.enable = true;
|
||
|
||
# use the example session manager (no others are packaged yet so this is enabled by default,
|
||
# no need to redefine it in your config for now)
|
||
#media-session.enable = true;
|
||
};
|
||
|
||
# Enable touchpad support (enabled default in most desktopManager).
|
||
# services.xserver.libinput.enable = true;
|
||
|
||
nixpkgs = {
|
||
overlays = [
|
||
outputs.overlays.additions
|
||
outputs.overlays.modifications
|
||
outputs.overlays.stable-packages
|
||
];
|
||
config = {allowUnfree = true;};
|
||
};
|
||
|
||
# List packages installed in system profile. To search, run:
|
||
# $ nix search wget
|
||
environment.systemPackages = with pkgs; [neovim];
|
||
|
||
nix = {
|
||
gc = {
|
||
automatic = true;
|
||
options = "--delete-older-than 30d";
|
||
};
|
||
optimise.automatic = true;
|
||
};
|
||
|
||
system.stateVersion = "22.11"; # Did you read the comment?
|
||
# Some programs need SUID wrappers, can be configured further or are
|
||
# started in user sessions.
|
||
# programs.mtr.enable = true;
|
||
# programs.gnupg.agent = {
|
||
# enable = true;
|
||
# enableSSHSupport = true;
|
||
# };
|
||
|
||
# List services that you want to enable:
|
||
|
||
# Enable the OpenSSH daemon.
|
||
# services.openssh.enable = true;
|
||
|
||
# Open ports in the firewall.
|
||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||
# Or disable the firewall altogether.
|
||
# networking.firewall.enable = false;
|
||
|
||
# This value determines the NixOS release from which the default
|
||
# settings for stateful data, like file locations and database versions
|
||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||
# this value at the release version of the first install of this system.
|
||
# Before changing this value read the documentation for this option
|
||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||
}
|