nixos-config/decoysnail.nix

117 lines
2.7 KiB
Nix
Raw Normal View History

2017-08-24 12:18:58 +00:00
{ config, pkgs, ... }:
{
imports =
[
2020-07-14 14:47:09 +00:00
./common-headless.nix
2021-07-27 09:48:07 +00:00
./i3.nix
2017-08-24 12:18:58 +00:00
./large-sw.nix
./uefi.nix
2018-11-05 17:06:19 +00:00
./fstrim.nix
./atmega.nix
2020-12-01 12:01:26 +00:00
./v4l2loopback.nix
2020-11-21 10:28:14 +00:00
./huion.nix
2021-05-27 10:22:40 +00:00
./nvim05.nix
./nm-restart.nix
2017-08-24 12:18:58 +00:00
];
2021-05-27 10:20:25 +00:00
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ];
boot.initrd.kernelModules = [ "dm-snapshot" ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/a16ae3f7-11df-47fc-a8df-f22c474ec1c1";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/3C5C-049B";
fsType = "vfat";
};
#swapDevices = [
# { device = "/dev/disk/by-uuid/b7274abd-58a5-4acc-8481-30e105e94eec"; }
#];
2022-01-30 14:22:26 +00:00
nix.settings.max-jobs = pkgs.lib.mkDefault 6;
2021-05-27 10:20:25 +00:00
powerManagement.cpuFreqGovernor = pkgs.lib.mkDefault "powersave";
2018-11-05 17:13:27 +00:00
environment.etc."lvm/lvm.conf".text = ''
devices {
issue_discards = 1
}
'';
boot.initrd.luks.devices = {
sda_crypt = {
2019-10-15 11:56:13 +00:00
device = "/dev/disk/by-partuuid/00292928-0088-4887-9e5d-2f2eccb4816f";
2018-10-09 08:40:33 +00:00
preLVM = true;
2018-11-05 17:13:27 +00:00
allowDiscards = true;
};
};
2017-08-24 12:18:58 +00:00
networking = {
hostName = "decoysnail";
hostId = "cf04f682";
};
services.openssh.enable = true;
hardware.cpu.intel.updateMicrocode = true;
services.thermald.enable = true;
2018-12-18 10:07:01 +00:00
hardware.opengl = {
extraPackages = with pkgs; [ beignet ];
driSupport32Bit = true;
};
2017-08-24 12:18:58 +00:00
2019-10-15 11:56:13 +00:00
#services.avahi.nssmdns = true;
#services.nscd.enable = pkgs.lib.mkOverride 10 true;
2019-01-02 12:57:47 +00:00
2018-02-19 09:31:12 +00:00
services.openssh.forwardX11 = true;
2019-10-15 11:56:13 +00:00
system.stateVersion = "19.09";
2018-10-08 09:50:19 +00:00
networking.wireguard.interfaces.wg0 = {
ips = ["10.59.0.4/16"];
privateKeyFile = "/etc/wgkeys/decoysnail";
allowedIPsAsRoutes = true;
postSetup = ''
2019-10-14 09:03:14 +00:00
${pkgs.systemd}/bin/resolvectl domain wg0 '~htdf.gebner.org' '~mtlaa.gebner.org' '~ams.gebner.org'
${pkgs.systemd}/bin/resolvectl dns wg0 10.57.0.1
2018-10-08 09:50:19 +00:00
'';
peers = [{
publicKey = "ByLlJbevlTBooAo2RIZGGJvBHKqA9qiOpHBvR5yuJX4=";
allowedIPs = ["10.56.0.0/14" "10.60.1.1"];
2019-03-08 11:37:04 +00:00
# endpoint = "mtlaa-gw.gebner.org:35869";
2019-10-16 08:37:16 +00:00
# endpoint = "84.112.114.160:35869";
endpoint = "127.0.0.1:35869";
persistentKeepalive = 25;
2018-10-08 09:50:19 +00:00
}];
};
2018-06-11 11:20:18 +00:00
2019-10-16 08:37:16 +00:00
systemd.services.wstunnel = {
path = [ pkgs.wstunnel ];
wantedBy = [ "wireguard-wg0.service" ];
after = [ "network.target" ];
script = ''
wstunnel -L 35869:htdf-gw.gebner.org:35869 -u wss://gebner.org
'';
};
services.resolved = {
domains = [];
enable = true;
};
2019-03-08 11:37:04 +00:00
services.xserver = {
videoDrivers = [ "intel" ];
};
2019-12-20 09:00:28 +00:00
fonts.fontconfig = {
subpixel.rgba = "none";
};
2017-08-24 12:18:58 +00:00
}