This makes some amount of sense, since it would probably be the nix daemon that is connecting to the remote build machine.
394 lines
11 KiB
Nix
394 lines
11 KiB
Nix
# Edit this configuration file to define what should be installed on
|
||
# your system. Help is available in the configuration.nix(5) man page
|
||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||
|
||
{ pkgs, ... }:
|
||
|
||
let
|
||
sourcehut-fqdn = "sourcehut.nixos.local";
|
||
in
|
||
{
|
||
imports =
|
||
[ # Include the results of the hardware scan.
|
||
./hardware-configuration.nix
|
||
];
|
||
|
||
# Bootloader.
|
||
boot.loader.systemd-boot.enable = true;
|
||
boot.loader.efi.canTouchEfiVariables = true;
|
||
|
||
networking.hostName = "nixos"; # Define your hostname.
|
||
networking.extraHosts = ''
|
||
127.0.0.1 sourcehut.nixos.local
|
||
127.0.0.1 meta.sourcehut.nixos.local
|
||
127.0.0.1 man.sourcehut.nixos.local
|
||
127.0.0.1 git.sourcehut.nixos.local
|
||
'';
|
||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||
|
||
# Configure network proxy if necessary
|
||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||
|
||
# Enable networking
|
||
networking.networkmanager.enable = true;
|
||
|
||
# setup magicdns for tailscale
|
||
networking.nameservers = [ "100.100.100.100" "1.1.1.1" "8.8.8.8" ];
|
||
networking.search = [ "hummingbird-stork.ts.net" ];
|
||
|
||
# Set your time zone.
|
||
time.timeZone = "Europe/Paris";
|
||
|
||
# Select internationalisation properties.
|
||
i18n.defaultLocale = "en_US.UTF-8";
|
||
|
||
i18n.extraLocaleSettings = {
|
||
LC_ADDRESS = "fr_FR.UTF-8";
|
||
LC_IDENTIFICATION = "fr_FR.UTF-8";
|
||
LC_MEASUREMENT = "fr_FR.UTF-8";
|
||
LC_MONETARY = "fr_FR.UTF-8";
|
||
LC_NAME = "fr_FR.UTF-8";
|
||
LC_NUMERIC = "fr_FR.UTF-8";
|
||
LC_PAPER = "fr_FR.UTF-8";
|
||
LC_TELEPHONE = "fr_FR.UTF-8";
|
||
LC_TIME = "fr_FR.UTF-8";
|
||
};
|
||
|
||
# Enable the X11 windowing system.
|
||
# You can disable this if you're only using the Wayland session.
|
||
services.xserver.enable = true;
|
||
|
||
# Enable the KDE Plasma Desktop Environment.
|
||
services.displayManager.sddm.enable = true;
|
||
services.desktopManager.plasma6.enable = true;
|
||
|
||
# does this add river to sddm menu?
|
||
programs.river.enable = true;
|
||
|
||
# Configure keymap in X11
|
||
services.xserver = {
|
||
layout = "fr";
|
||
xkbVariant = "";
|
||
};
|
||
|
||
# Configure console keymap
|
||
console.keyMap = "fr";
|
||
|
||
# Enable CUPS to print documents.
|
||
services.printing.enable = true;
|
||
|
||
# Enable sound with pipewire.
|
||
hardware.pulseaudio.enable = false;
|
||
security.rtkit.enable = true;
|
||
services.pipewire = {
|
||
enable = true;
|
||
alsa.enable = true;
|
||
alsa.support32Bit = true;
|
||
pulse.enable = true;
|
||
# If you want to use JACK applications, uncomment this
|
||
#jack.enable = true;
|
||
|
||
# use the example session manager (no others are packaged yet so this is enabled by default,
|
||
# no need to redefine it in your config for now)
|
||
#media-session.enable = true;
|
||
};
|
||
|
||
# Enable touchpad support (enabled default in most desktopManager).
|
||
# services.xserver.libinput.enable = true;
|
||
|
||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||
users.users.khais = {
|
||
isNormalUser = true;
|
||
description = "Khaïs COLIN";
|
||
extraGroups = [ "networkmanager" "wheel" "podman" ];
|
||
shell = pkgs.zsh;
|
||
};
|
||
|
||
users.users.guest = {
|
||
isNormalUser = true;
|
||
description = "Guest Account";
|
||
extraGroups = [ "networkmanager" ];
|
||
shell = pkgs.zsh;
|
||
packages = with pkgs; [
|
||
mpv
|
||
vlc
|
||
];
|
||
};
|
||
|
||
# Install firefox.
|
||
programs.firefox.enable = true;
|
||
|
||
# chroot jail
|
||
programs.firejail.enable = true;
|
||
|
||
# shell
|
||
programs.zsh.enable = true;
|
||
|
||
# Allow unfree packages
|
||
nixpkgs.config.allowUnfree = true;
|
||
# configure overlays
|
||
nixpkgs.overlays = [
|
||
(import ./overlays/cacert.nix)
|
||
];
|
||
|
||
# List packages installed in system profile. To search, run:
|
||
# $ nix search wget
|
||
environment.systemPackages = with pkgs; [
|
||
neovim
|
||
home-manager
|
||
git
|
||
gnumake
|
||
cifs-utils
|
||
tailscale
|
||
wluma
|
||
# man pages
|
||
man-pages man-pages-posix
|
||
# kde
|
||
kdePackages.kate kdePackages.plasma-workspace kdePackages.dolphin
|
||
# fix kde apps having no icons
|
||
kdePackages.qtsvg
|
||
];
|
||
|
||
# set global environment variables
|
||
environment.sessionVariables = {
|
||
# I don't know what this does, but it is needed for wluma to work correctly.
|
||
# It will also slightly increase cpu usage (on wayland compositors), but shouldn't be too bad.
|
||
WLR_DRM_NO_MODIFIERS = 1;
|
||
# fix dolphin file associations not working
|
||
XDG_MENU_PREFIX = "plasma-";
|
||
};
|
||
|
||
# Some programs need SUID wrappers, can be configured further or are
|
||
# started in user sessions.
|
||
# programs.mtr.enable = true;
|
||
# programs.gnupg.agent = {
|
||
# enable = true;
|
||
# enableSSHSupport = true;
|
||
# };
|
||
|
||
# automount smb music share
|
||
fileSystems."/home/khais/Music" = {
|
||
device = "//void/Music";
|
||
fsType = "cifs";
|
||
options = let
|
||
# prevent hanging when network is not reachable
|
||
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
|
||
in [ "${automount_opts},credentials=/etc/nixos/secrets/music.smb" ];
|
||
};
|
||
|
||
fileSystems."/home/khais/Books" = {
|
||
device = "//void/Books";
|
||
fsType = "cifs";
|
||
options = let
|
||
# prevent hanging when network is not reachable
|
||
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
|
||
in [ "${automount_opts},credentials=/etc/nixos/secrets/books.smb" ];
|
||
};
|
||
|
||
# font configuration
|
||
fonts = {
|
||
packages = with pkgs; [
|
||
nerdfonts
|
||
ibm-plex
|
||
cm_unicode
|
||
];
|
||
fontconfig = {
|
||
defaultFonts = {
|
||
monospace = [ "VictorMono NF Medium" ];
|
||
sansSerif = [ "IBM Plex Sans" ];
|
||
serif = [ "CMU Serif" ];
|
||
};
|
||
};
|
||
};
|
||
|
||
# fingerprint sensor setup
|
||
services.open-fprintd.enable = true;
|
||
services.python-validity.enable = true;
|
||
|
||
# List services that you want to enable:
|
||
|
||
services.tailscale = {
|
||
enable = true;
|
||
useRoutingFeatures = "both";
|
||
extraUpFlags = [ "--ssh" ];
|
||
};
|
||
|
||
# enable wluma for automatic brightness adjustment
|
||
systemd.user.services.wluma = {
|
||
enable = true;
|
||
description = "Adjusting screen brightness based on screen contents and amount of ambient light";
|
||
after = [ "graphical-session.target" ];
|
||
partOf = [ "graphical-session.target" ];
|
||
serviceConfig = {
|
||
ExecStart = "${pkgs.wluma}/bin/wluma";
|
||
Restart = "always";
|
||
};
|
||
wantedBy = [ "graphical-session.target" ];
|
||
};
|
||
|
||
# enable selfhosted sourcehut instance
|
||
services.sourcehut = {
|
||
enable = true;
|
||
meta = {
|
||
enable = true;
|
||
gunicorn.extraArgs = [
|
||
"--timeout 120"
|
||
"--workers 1"
|
||
"--log-level=info"
|
||
"--bind [::1]:5000"
|
||
];
|
||
};
|
||
git = {
|
||
enable = true;
|
||
gunicorn.extraArgs = [
|
||
"--timeout 120"
|
||
"--workers 1"
|
||
"--log-level=info"
|
||
"--bind [::1]:5001"
|
||
];
|
||
};
|
||
man = {
|
||
enable = true;
|
||
gunicorn.extraArgs = [
|
||
"--timeout 120"
|
||
"--workers 1"
|
||
"--log-level=info"
|
||
"--bind [::1]:5004"
|
||
];
|
||
};
|
||
nginx.enable = true;
|
||
postgresql.enable = true;
|
||
redis.enable = true;
|
||
settings = {
|
||
"sr.ht" = {
|
||
environment = "production";
|
||
global-domain = "${sourcehut-fqdn}";
|
||
origin = "http://${sourcehut-fqdn}";
|
||
network-key = "/etc/nixos/secrets/sourcehut/network.key";
|
||
service-key = "/etc/nixos/secrets/sourcehut/service.key";
|
||
};
|
||
"git.sr.ht" = {
|
||
oauth-client-id = "7f2819091157584f";
|
||
oauth-client-secret = "/etc/nixos/secrets/sourcehut/git.oauth";
|
||
origin = "http://git.${sourcehut-fqdn}";
|
||
};
|
||
"man.sr.ht" = {
|
||
oauth-client-id = "man.sr.ht";
|
||
oauth-client-secret = "/etc/nixos/secrets/sourcehut/man.oauth";
|
||
origin = "http://man.${sourcehut-fqdn}";
|
||
};
|
||
"meta.sr.ht" = {
|
||
origin = "http://meta.${sourcehut-fqdn}";
|
||
onboarding-redirect = "http://meta.${sourcehut-fqdn}";
|
||
};
|
||
mail = {
|
||
pgp-key-id = "/etc/nixos/secrets/sourcehut/mail.key.id";
|
||
pgp-privkey = "/etc/nixos/secrets/sourcehut/mail.key";
|
||
pgp-pubkey = "/etc/nixos/secrets/sourcehut/mail.key.pub";
|
||
smtp-from = "mail@${sourcehut-fqdn}";
|
||
};
|
||
webhooks.private-key = "/etc/nixos/secrets/sourcehut/webhook.key";
|
||
};
|
||
};
|
||
|
||
# security.acme = {
|
||
# certs."${sourcehut-fqdn}".extraDomainNames = [
|
||
# "meta.${sourcehut-fqdn}"
|
||
# "man.${sourcehut-fqdn}"
|
||
# "git.${sourcehut-fqdn}"
|
||
# ];
|
||
# acceptTerms = true;
|
||
# defaults.email = "khais.colin+letsencrypt@gmail.com";
|
||
# };
|
||
|
||
security.pki.certificateFiles = [
|
||
/etc/nixos/secrets/certs/myCA.pem
|
||
];
|
||
|
||
services.nginx = {
|
||
enable = true;
|
||
recommendedTlsSettings = false;
|
||
recommendedOptimisation = true;
|
||
recommendedGzipSettings = true;
|
||
recommendedProxySettings = true;
|
||
virtualHosts = {
|
||
"${sourcehut-fqdn}" = {
|
||
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
||
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
||
};
|
||
"meta.${sourcehut-fqdn}" = {
|
||
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
||
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
||
};
|
||
"man.${sourcehut-fqdn}" = {
|
||
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
||
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
||
};
|
||
"git.${sourcehut-fqdn}" = {
|
||
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
||
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
||
};
|
||
};
|
||
};
|
||
|
||
services.postgresql.enable = true;
|
||
|
||
programs.gnupg.agent = {
|
||
enable = true;
|
||
enableSSHSupport = true;
|
||
};
|
||
|
||
# Enable the OpenSSH daemon.
|
||
# services.openssh.enable = true;
|
||
|
||
# Open ports in the firewall.
|
||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||
# Or disable the firewall altogether.
|
||
# networking.firewall.enable = false;
|
||
|
||
# enable manpages documentation
|
||
documentation = {
|
||
man = {
|
||
enable = true;
|
||
generateCaches = true;
|
||
};
|
||
info.enable = true;
|
||
dev.enable = true; # linux man-pages project, dev documenation
|
||
};
|
||
|
||
# enable docker virtualization
|
||
virtualisation.podman = {
|
||
enable = true;
|
||
# create alias mapping docker to podman
|
||
dockerCompat = true;
|
||
dockerSocket.enable = true;
|
||
};
|
||
|
||
# configure ssh
|
||
programs.ssh = {
|
||
enable = true;
|
||
# ensure remote nix build can acces nix environment
|
||
# https://wiki.nixos.org/wiki/Distributed_build
|
||
matchBlocks.void.setEnv.PATH = "/nix/var/nix/profiles/default/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin";
|
||
};
|
||
|
||
# This value determines the NixOS release from which the default
|
||
# settings for stateful data, like file locations and database versions
|
||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||
# this value at the release version of the first install of this system.
|
||
# Before changing this value read the documentation for this option
|
||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||
system.stateVersion = "24.05"; # Did you read the comment?
|
||
|
||
# flakes
|
||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||
|
||
# automatically collect garbage
|
||
nix.gc = {
|
||
automatic = true;
|
||
dates = "weekly";
|
||
options = "--delete-older-than 60d";
|
||
};
|
||
}
|