nix-config/modules/system.nix

290 lines
5.7 KiB
Nix
Raw Normal View History

2024-08-03 20:40:07 +02:00
{
nix-config,
pkgs,
lib,
config,
...
}:
let
inherit (lib.types) nullOr str listOf;
inherit (config.boot) isContainer;
2024-08-03 20:40:07 +02:00
inherit (lib)
mkOption
mkEnableOption
mkIf
singleton
optional
2024-08-03 20:40:07 +02:00
;
inherit (cfg)
username
iHaveLotsOfRam
hashedPassword
mullvad
allowSRB2Port
allowDevPort
postgres
;
isPhone = config.programs.calls.enable;
2024-04-04 15:41:32 +02:00
cfg = config.modules.system;
in
2023-06-22 17:54:12 +02:00
{
imports = with nix-config.inputs.home-manager.nixosModules; [ home-manager ];
2024-04-04 15:41:32 +02:00
options.modules.system = {
username = mkOption {
type = str;
default = "user";
};
hashedPassword = mkOption {
type = nullOr str;
default = null;
};
2024-04-04 15:41:32 +02:00
timeZone = mkOption {
type = str;
default = "America/New_York";
};
2024-04-04 15:41:32 +02:00
defaultLocale = mkOption {
type = str;
default = "ja_JP.UTF-8";
};
2024-04-04 15:41:32 +02:00
supportedLocales = mkOption {
type = listOf str;
2024-08-03 20:40:07 +02:00
default = [
"ja_JP.UTF-8/UTF-8"
"en_US.UTF-8/UTF-8"
"fr_FR.UTF-8/UTF-8"
];
2024-04-04 15:41:32 +02:00
};
stateVersion = mkOption {
type = str;
default = "22.11";
};
hostName = mkOption {
type = str;
default = "nixos";
};
iHaveLotsOfRam = mkEnableOption "tmpfs on /tmp";
mullvad = mkEnableOption "mullvad vpn";
postgres = mkEnableOption "postgres database for containers";
allowSRB2Port = mkEnableOption "port for srb2";
allowDevPort = mkEnableOption "port for development server";
};
2024-04-04 15:41:32 +02:00
config = {
boot = {
2024-08-03 20:40:07 +02:00
tmp = if iHaveLotsOfRam then { useTmpfs = true; } else { cleanOnBoot = true; };
binfmt.emulatedSystems = mkIf (pkgs.system == "x86_64-linux") [ "aarch64-linux" ];
2024-04-04 15:41:32 +02:00
loader = {
systemd-boot = mkIf (pkgs.system != "aarch64-linux") {
2024-04-04 15:41:32 +02:00
enable = true;
editor = false;
configurationLimit = 10;
};
timeout = 0;
efi.canTouchEfiVariables = true;
};
2024-08-03 20:40:07 +02:00
blacklistedKernelModules = [ "floppy" ];
};
systemd = {
2024-04-04 15:41:32 +02:00
extraConfig = "DefaultTimeoutStopSec=10s";
services.NetworkManager-wait-online.enable = false;
};
2024-04-04 15:41:32 +02:00
nix = {
2024-10-10 14:17:27 +02:00
package = pkgs.nixVersions.latest;
2024-04-04 15:41:32 +02:00
settings = {
auto-optimise-store = true;
warn-dirty = false;
allow-import-from-derivation = false;
keep-going = true;
2024-08-03 20:40:07 +02:00
experimental-features = [
"nix-command"
"flakes"
];
trusted-users = [
"root"
"@wheel"
];
2024-04-04 15:41:32 +02:00
};
};
zramSwap = {
2024-04-04 15:41:32 +02:00
enable = true;
memoryPercent = 100;
};
2024-04-04 15:41:32 +02:00
time = {
inherit (cfg) timeZone;
};
i18n = {
inherit (cfg) defaultLocale supportedLocales;
};
system = {
inherit (cfg) stateVersion;
};
users = {
mutableUsers = false;
allowNoPasswordLogin = mkIf isContainer true;
users.${username} = {
inherit hashedPassword;
isNormalUser = true;
uid = 1000;
password = mkIf (hashedPassword == null && !isContainer) (if isPhone then "1234" else username);
2024-08-03 20:40:07 +02:00
extraGroups =
if isContainer then
2024-08-03 20:40:07 +02:00
[ ]
else
[
"wheel"
"networkmanager"
"dialout"
"feedbackd"
"video"
];
};
};
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
sharedModules = singleton {
2024-04-08 10:15:46 +02:00
home = {
inherit (cfg) stateVersion;
};
programs.man.generateCaches = mkIf (!isPhone) true;
};
users.${username}.home = {
inherit username;
homeDirectory = "/home/${username}";
};
};
virtualisation.vmVariant = {
virtualisation = {
memorySize = 4096;
cores = 4;
sharedDirectories = {
tmp = {
source = "/tmp";
target = "/mnt";
};
};
qemu.options = [
"-device virtio-vga-gl"
"-display sdl,gl=on,show-cursor=off"
"-audio pa,model=hda"
"-full-screen"
];
};
services.interception-tools.enable = lib.mkForce false;
networking.resolvconf.enable = lib.mkForce true;
zramSwap.enable = lib.mkForce false;
boot.enableContainers = false;
};
networking = {
inherit (cfg) hostName;
networkmanager = {
enable = true;
wifi.macAddress = "random";
ethernet.macAddress = "random";
unmanaged = [ "interface-name:ve-*" ];
};
useHostResolvConf = true;
resolvconf.enable = mkIf mullvad false;
nat = mkIf mullvad {
enable = true;
internalInterfaces = [ "ve-+" ];
externalInterface = "wg0-mullvad";
};
firewall = {
allowedUDPPorts = [
67
68
] ++ optional allowSRB2Port [ 5029 ];
2024-08-03 20:40:07 +02:00
allowedTCPPorts = mkIf allowDevPort [ 3000 ];
};
};
services = {
resolved.llmnr = "false";
mullvad-vpn = mkIf mullvad {
enable = true;
enableExcludeWrapper = false;
};
postgresql = mkIf postgres {
enable = true;
ensureUsers = singleton {
name = username;
};
ensureDatabases = [
username
];
};
2024-08-12 00:47:05 +02:00
openssh = {
enable = true;
settings = {
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
2024-08-12 00:47:05 +02:00
};
};
};
environment = {
2024-08-03 20:40:07 +02:00
systemPackages = with pkgs; [ (pass.withExtensions (ext: with ext; [ pass-otp ])) ];
defaultPackages = [ ];
gnome.excludePackages = with pkgs; [ gnome-tour ];
};
programs.command-not-found.enable = false;
};
2023-06-22 17:54:12 +02:00
}