nixos-config/hosts/home-server.nix

143 lines
3.8 KiB
Nix

{ config, pkgs, ... }:
let
# mkdir /etc/secrets/initrd -p
# chmod 700 -R /etc/secrets/
# ssh-keygen -t ed25519 -N "" -f /etc/secrets/initrd/ssh_host_ed25519_key
hostKeys = [{
path = "/etc/secrets/initrd/ssh_host_ed25519_key";
type = "ed25519";
}];
in {
imports = [
../hardware/base.nix
../desktop/x11.nix
../system/server.nix
../virtualisation/containers.nix
../virtualisation/podman.nix
../modules/inadyn.nix
../modules/systemdNotify.nix
../services/mail.nix
../services/lldap.nix
../services/authelia.nix
../services/restic/home-server.nix
../services/samba/home-server.nix
# ../services/kodi.nix
../services/jellyfin.nix
../services/etebase.nix
../services/website.nix
../services/wkd.nix
../services/home-assistant
../services/matrix
../services/immich.nix
../services/miniflux.nix
../services/paperless.nix
../services/nextcloud.nix
../services/collabora-office.nix
../services/calibre-web.nix
../services/focalboard.nix
];
age.secrets.cloudflare.file = ../secrets/cloudflare.age;
age.secrets.hostKey.file = ../secrets/home-server/hostKey.age;
nixpkgs.config.allowUnfree = true;
networking.domain = "home.felschr.com";
networking.firewall.allowedTCPPorts = [ 80 443 ];
networking.firewall.allowedUDPPorts = [ 80 443 ];
security.acme.acceptTerms = true;
security.acme.defaults.email = "dev@felschr.com";
services.inadyn.enable = true;
services.inadyn.provider = "cloudflare.com";
services.inadyn.username = "felschr.com";
services.inadyn.passwordFile = config.age.secrets.cloudflare.path;
services.inadyn.extraConfig = ''
proxied = false
'';
services.inadyn.ipv4.enable = true;
services.inadyn.ipv4.command = "${pkgs.writeScript "get-ipv4" ''
/run/wrappers/bin/mullvad-exclude \
${pkgs.curl}/bin/curl -4 -s --retry 10 ifconfig.co
''}";
services.inadyn.ipv6.enable = true;
services.inadyn.ipv6.command = "${pkgs.writeScript "get-ipv6" ''
${pkgs.iproute2}/bin/ip -6 --brief addr show enp2s0 mngtmpaddr \
| ${pkgs.gawk}/bin/awk '{print $3}' \
| cut -f1 -d'/'
''}";
services.inadyn.domains = [
"felschr.com"
"openpgpkey.felschr.com"
"ldap.felschr.com"
"auth.felschr.com"
"home.felschr.com"
"esphome.felschr.com"
"matrix.felschr.com"
"element.felschr.com"
"cloud.felschr.com"
"office.felschr.com"
"media.felschr.com"
"photos.felschr.com"
"books.felschr.com"
"news.felschr.com"
"etebase.felschr.com"
"paperless.felschr.com"
"boards.felschr.com"
];
services.nginx = {
enable = true;
recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedZstdSettings = true;
recommendedGzipSettings = true;
recommendedBrotliSettings = true;
};
programs.zsh.enable = true;
programs.ssh.enableAskPassword = false;
services.openssh = {
enable = true;
settings = {
KbdInteractiveAuthentication = false;
PasswordAuthentication = false;
PermitRootLogin = "no";
};
inherit hostKeys;
};
services.tailscale.extraUpFlags = [
"--advertise-routes=192.168.1.0/24"
"--advertise-tags=tag:felschr-com"
"--advertise-connector"
];
# ssh root@hostname "echo "$(read -s pass; echo \'"$pass"\')" > /crypt-ramfs/passphrase"
boot.initrd.availableKernelModules = [ "igb" ];
boot.initrd.network = {
enable = true;
ssh = {
enable = true;
hostKeys = map (f: f.path) hostKeys;
authorizedKeys = config.users.users.felschr.openssh.authorizedKeys.keys;
};
};
systemd.notify = {
enable = true;
method = "email";
email.mailTo = "admin@felschr.com";
email.mailFrom = "${config.networking.hostName} <felschr@web.de>";
};
# only change this when specified in release notes
system.stateVersion = "23.05";
}