summaryrefslogtreecommitdiff
path: root/machines/labsrv01/default.nix
blob: 6ce9feb83583d416bd8427e2663498d2dc0983a6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
{
  inputs,
  modulesPath,
  lib,
  pkgs,
  sops,
  config,
  ...
}@args:
{
  imports = [
    inputs.determinate.nixosModules.default
    inputs.disko.nixosModules.disko
    ./disk-config.nix
    inputs.sops-nix.nixosModules.sops
    ./network.nix
    ../../modules/secureboot.nix
    ../../modules/alt-arrow-vt.nix

    inputs.home-manager.nixosModules.home-manager
    ./homes.nix

    ../../modules/cgit.nix
    ../../modules/buildbot.nix
    ../../modules/attic.nix
  ];
  hardware.facter.reportPath = ./facter.json;

  nix = {
    extraOptions = ''
      experimental-features = ca-derivations nix-command flakes
    '';
    settings = {
      trusted-users = [ "root" "kjtsanaktsidis" ];
      substituters = [
        "https://cache.nixos.org"
        # the ca-derivations cache seems to be down
        # "https://cache.ngi0.nixos.org/"
      ];
      trusted-public-keys = [
        "cache.ngi0.nixos.org-1:KqH5CBLNSyX184S9BKZJo1LxrxJ9ltnY2uAs5c/f1MA="
      ];
    };
  };

  sops = {
    defaultSopsFile = ./secrets.yaml;
    age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
    age.generateKey = false;

    secrets = {
      luks_passphrase = { };
      kj_hashed_password = {
        neededForUsers = true;
      };
      ssh_host_key_ed25519 = { };
      ssh_host_key_rsa = { };
    };
  };

  system.stateVersion = "25.11";
  swapDevices = [
    {
      device = "/swap/swapfile";
      size = 32768;
    }
  ];

  security.sudo.enable = true;
  users.mutableUsers = false;
  users.groups.kjtsanaktsidis = { };
  users.users = {
    kjtsanaktsidis = {
      createHome = true;
      isNormalUser = true;
      description = "KJ Tsanaktsidis";
      group = "kjtsanaktsidis";
      extraGroups = [
        "wheel"
        "networkmanager"
      ];
      shell = pkgs.zsh;
      hashedPasswordFile = config.sops.secrets.kj_hashed_password.path;
      openssh.authorizedKeys.keys = [
        "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAC/BtvW1c1RbBI8eeGo7oOH2y9byBaxWVDHsErgaE+s kjtsanaktsidis@KJMacbookGroq.local"
        "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHsyhMLrlNiffDrqz0s46hZF8IdR9/qX63TUyllK0LCA kj@KJ-PC"
        "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPS77sno1zVa6uO+2wCbBK489snNIp3uvymca2cHX/33 kjtsanaktsidis@labsrv01"
      ];
    };
  };

  services.openssh = {
    enable = true;
    hostKeys = [
      {
        type = "ed25519";
        path = config.sops.secrets.ssh_host_key_ed25519.path;
      }
      {
        type = "rsa";
        path = config.sops.secrets.ssh_host_key_rsa.path;
      }
    ];
  };

  services.fwupd.enable = true;

  # Enable zsh system-wide
  programs.zsh.enable = true;
}