added dafoe
This commit is contained in:
parent
f7ffc5cdf9
commit
1fd4e939a1
21 changed files with 385 additions and 3 deletions
20
dafoe/README.md
Normal file
20
dafoe/README.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# Willem
|
||||
|
||||
Willem is a server running on a Raspberry Pi 400 offering the following services:
|
||||
- [Gitea](git.vatthauer.xyz)
|
||||
- [Vaultwarden](bitwarden.vatthauer.xyz)
|
||||
|
||||
There are daily backups of the Gitea instance using Restic via B2.
|
||||
## Installation on Raspberry Pi 400
|
||||
### Resources
|
||||
- https://nixos.wiki/wiki/NixOS_on_ARM/Raspberry_Pi_4
|
||||
- https://nixos.wiki/wiki/NixOS_on_ARM#Installation
|
||||
|
||||
### Step by step
|
||||
1. Follow the [generic installation steps](https://nixos.wiki/wiki/NixOS_on_ARM#Installation) to get NixOS up and running on the Pi.
|
||||
2. Generate the default `configuration.nix` via `sudo nixos-generate-config` and do a first rebuild `sudo nixos-rebuild switch`
|
||||
3. Somehow get this repository onto the machine and `cd` into it
|
||||
4. We need git: `nix-shell -p git`
|
||||
5. Build the flake via `sudo nixos-rebuild switch --flake .`
|
||||
6. At this point you can restart
|
||||
7. Login, set password, move the repository to `/home/leonv/nixos`
|
87
dafoe/configuration.nix
Normal file
87
dafoe/configuration.nix
Normal file
|
@ -0,0 +1,87 @@
|
|||
# Edit this configuration file to define what should be installed on
|
||||
# your system. Help is available in the configuration.nix(5) man page
|
||||
# and in the NixOS manual (accessible by running 'nixos-help').
|
||||
|
||||
{ config, pkgs, lib, inputs, ... }:
|
||||
{
|
||||
imports =
|
||||
[
|
||||
./hardware-configuration.nix
|
||||
./services
|
||||
./programs
|
||||
];
|
||||
|
||||
# enable flakes
|
||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||
|
||||
# Use the extlinux boot loader. (NixOS wants to enable GRUB by default)
|
||||
boot.loader.grub.enable = true;
|
||||
boot.loader.grub.device = "/dev/sda";
|
||||
|
||||
networking.hostName = "dafoe"; # Define your hostname.
|
||||
#networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||||
networking.firewall.allowedTCPPorts = [ 22 80 443 631 8096 8920 ];
|
||||
networking.firewall.allowedUDPPorts = [ 22 80 443 631 1900 7359 ];
|
||||
|
||||
# Set your time zone.
|
||||
time.timeZone = "Europe/Berlin";
|
||||
|
||||
# Define a user account. Don't forget to set a password with 'passwd'.
|
||||
users.users.leonv = {
|
||||
isNormalUser = true;
|
||||
initialPassword = "leonv";
|
||||
extraGroups = [ "wheel" ]; # Enable 'sudo' for the user.
|
||||
packages = with pkgs; [
|
||||
];
|
||||
};
|
||||
users.defaultUserShell = pkgs.zsh;
|
||||
|
||||
# List packages installed in system profile.
|
||||
environment.systemPackages = with pkgs; [
|
||||
wget
|
||||
zsh
|
||||
oh-my-zsh
|
||||
restic
|
||||
# for hugo website
|
||||
hugo
|
||||
go
|
||||
];
|
||||
environment.variables = {
|
||||
EDITOR = "vim";
|
||||
|
||||
# bitwarden key
|
||||
YUBICO_CLIENT_ID = "${../nix-secrets/willem/vaultwarden/yubico-id}";
|
||||
YUBICO_SECRET_KEY = "${../nix-secrets/willem/vaultwarden/yubico-secret}";
|
||||
};
|
||||
environment.shells = [ pkgs.zsh ];
|
||||
|
||||
programs.git = {
|
||||
enable = true;
|
||||
lfs.enable = true;
|
||||
config = {
|
||||
init = {
|
||||
defaultBranch = "main";
|
||||
};
|
||||
commit = {
|
||||
gpgsign = true;
|
||||
};
|
||||
gpg = {
|
||||
format = "ssh";
|
||||
};
|
||||
user = {
|
||||
email = "leon.vatthauer@fau.de";
|
||||
name = "Leon Vatthauer";
|
||||
signingkey = "~/.ssh/git";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
|
||||
"plexmediaserver"
|
||||
];
|
||||
|
||||
services.jellyfin.enable = true;
|
||||
|
||||
system.stateVersion = "23.11"; # Did you read the comment?
|
||||
}
|
||||
|
33
dafoe/hardware-configuration.nix
Normal file
33
dafoe/hardware-configuration.nix
Normal file
|
@ -0,0 +1,33 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "ata_piix" "virtio_pci" "virtio_scsi" "xhci_pci" "sd_mod" "sr_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/40245dca-bf9c-4f39-ad96-8c2fee4b7b2e";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/d8d1edd9-e549-4d92-94d5-8ac5af126a5b"; }
|
||||
];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.ens3.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
}
|
8
dafoe/programs/default.nix
Normal file
8
dafoe/programs/default.nix
Normal file
|
@ -0,0 +1,8 @@
|
|||
{
|
||||
imports = [
|
||||
./neovim.nix
|
||||
./ssh.nix
|
||||
./starship.nix
|
||||
./zsh.nix
|
||||
];
|
||||
}
|
14
dafoe/programs/neovim.nix
Normal file
14
dafoe/programs/neovim.nix
Normal file
|
@ -0,0 +1,14 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
programs.neovim = {
|
||||
enable = true;
|
||||
configure = {
|
||||
customRC = '''';
|
||||
packages.myVimPackage = with pkgs.vimPlugins; {
|
||||
start = [ vim-nix ];
|
||||
};
|
||||
};
|
||||
viAlias = true;
|
||||
vimAlias = true;
|
||||
};
|
||||
}
|
6
dafoe/programs/ssh.nix
Normal file
6
dafoe/programs/ssh.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
{
|
||||
programs.ssh.startAgent = true;
|
||||
programs.ssh.extraConfig = ''
|
||||
AddKeysToAgent yes
|
||||
'';
|
||||
}
|
8
dafoe/programs/starship.nix
Normal file
8
dafoe/programs/starship.nix
Normal file
|
@ -0,0 +1,8 @@
|
|||
{
|
||||
programs.starship = {
|
||||
enable = true;
|
||||
settings = {
|
||||
gradle.symbol = "🐘";
|
||||
};
|
||||
};
|
||||
}
|
19
dafoe/programs/zsh.nix
Normal file
19
dafoe/programs/zsh.nix
Normal file
|
@ -0,0 +1,19 @@
|
|||
{
|
||||
programs.zsh = {
|
||||
enable = true;
|
||||
shellAliases = {
|
||||
clean = "sudo nix-env --delete-generations old --profile /nix/var/nix/profiles/system && sudo /nix/var/nix/profiles/system/bin/switch-to-configuration switch && sudo nix-store --gc";
|
||||
};
|
||||
shellInit = ''
|
||||
function rebuild () {
|
||||
sudo nixos-rebuild switch --flake "/home/leonv/nixos?submodules=1"
|
||||
sudo cp -r /home/leonv/nixos /etc/
|
||||
}
|
||||
'';
|
||||
ohMyZsh = {
|
||||
enable = true;
|
||||
plugins = [ "git" ];
|
||||
theme = "dpoggi";
|
||||
};
|
||||
};
|
||||
}
|
10
dafoe/services/acme.nix
Normal file
10
dafoe/services/acme.nix
Normal file
|
@ -0,0 +1,10 @@
|
|||
{
|
||||
security.acme.acceptTerms = true;
|
||||
security.acme.certs = {
|
||||
"git.vatthauer.xyz".email = "leonvatthauer@outlook.com";
|
||||
"bitwarden.vatthauer.xyz".email = "leonvatthauer@outlook.com";
|
||||
"video.vatthauer.xyz".email = "leonvatthauer@outlook.com";
|
||||
"files.vatthauer.xyz".email = "leonvatthauer@outlook.com";
|
||||
#"vatthauer.xyz".email = "leonvatthauer@outlook.com";
|
||||
};
|
||||
}
|
16
dafoe/services/ddns.nix
Normal file
16
dafoe/services/ddns.nix
Normal file
|
@ -0,0 +1,16 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
# dynamic dns
|
||||
users.users.ddns = {
|
||||
isSystemUser = true;
|
||||
group = "ddns";
|
||||
};
|
||||
users.groups.ddns = {};
|
||||
systemd.services.ddns-updater = {
|
||||
enable = true;
|
||||
serviceConfig.User = "ddns";
|
||||
path = [ pkgs.curl ];
|
||||
script = "${../../nix-secrets/willem/ddns/update}";
|
||||
startAt = "hourly";
|
||||
};
|
||||
}
|
13
dafoe/services/default.nix
Normal file
13
dafoe/services/default.nix
Normal file
|
@ -0,0 +1,13 @@
|
|||
{ lib, pkgs, inputs, ... }:
|
||||
{
|
||||
imports = [
|
||||
./acme.nix
|
||||
./ddns.nix
|
||||
./nginx.nix
|
||||
./forgejo.nix
|
||||
#./printing.nix
|
||||
./restic.nix
|
||||
./ssh.nix
|
||||
./vaultwarden.nix
|
||||
];
|
||||
}
|
23
dafoe/services/forgejo.nix
Normal file
23
dafoe/services/forgejo.nix
Normal file
|
@ -0,0 +1,23 @@
|
|||
{ pkgs, ...}:
|
||||
{
|
||||
services.forgejo = {
|
||||
enable = true;
|
||||
settings.DEFAULT.APP_NAME = "Lambda-Git";
|
||||
package = pkgs.forgejo;
|
||||
stateDir = "/forgejo";
|
||||
database = {
|
||||
type = "sqlite3";
|
||||
};
|
||||
dump = {
|
||||
enable = true;
|
||||
interval = "02:00";
|
||||
};
|
||||
settings.server = {
|
||||
ROOT_URL = "https://git.vatthauer.xyz";
|
||||
HTTP_PORT = 3001;
|
||||
DOMAIN = "git.vatthauer.xyz";
|
||||
};
|
||||
settings.session.COOKIE_SECURE = true;
|
||||
settings.service.DISABLE_REGISTRATION = true;
|
||||
};
|
||||
}
|
44
dafoe/services/nginx.nix
Normal file
44
dafoe/services/nginx.nix
Normal file
|
@ -0,0 +1,44 @@
|
|||
{ lib, pkgs, inputs, ... }:
|
||||
{
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
recommendedGzipSettings = true;
|
||||
recommendedOptimisation = true;
|
||||
recommendedProxySettings = true;
|
||||
recommendedTlsSettings = true;
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts."git.vatthauer.xyz" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:3001/";
|
||||
};
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts."bitwarden.vatthauer.xyz" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:8222/";
|
||||
};
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts."video.vatthauer.xyz" = {
|
||||
enableACME = true;
|
||||
forceSSL = false;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:8096";
|
||||
};
|
||||
};
|
||||
#services.nginx.virtualHosts."vatthauer.xyz" = {
|
||||
# forceSSL = true;
|
||||
# enableACME = true;
|
||||
# root = pkgs.callPackage ./resumee-website.nix {};
|
||||
#};
|
||||
services.nginx.virtualHosts."files.vatthauer.xyz" = {
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
root = "/var/www";
|
||||
};
|
||||
}
|
20
dafoe/services/printing.nix
Normal file
20
dafoe/services/printing.nix
Normal file
|
@ -0,0 +1,20 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
# Enable CUPS to print documents.
|
||||
services.avahi = {
|
||||
enable = true;
|
||||
publish.enable = true;
|
||||
publish.userServices = true;
|
||||
};
|
||||
services.printing = {
|
||||
enable = true;
|
||||
drivers = [ pkgs.splix ];
|
||||
browsing = true;
|
||||
listenAddresses = [ "*:631" ];
|
||||
allowFrom = [ "all" ];
|
||||
defaultShared = true;
|
||||
extraConf = ''
|
||||
BrowseLocalProtocols all
|
||||
'';
|
||||
};
|
||||
}
|
15
dafoe/services/restic.nix
Normal file
15
dafoe/services/restic.nix
Normal file
|
@ -0,0 +1,15 @@
|
|||
{
|
||||
services.restic.backups = {
|
||||
giteaBackup = {
|
||||
paths = [ "/forgejo/dump" ];
|
||||
environmentFile = "${../../nix-secrets/willem/gitea/backupCreds}";
|
||||
passwordFile = "${../../nix-secrets/willem/restic/password}";
|
||||
repository = "b2:gitea-willem";
|
||||
initialize = true;
|
||||
timerConfig = {
|
||||
OnCalendar = "04:00";
|
||||
Persistent = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
15
dafoe/services/resumee-website.nix
Normal file
15
dafoe/services/resumee-website.nix
Normal file
|
@ -0,0 +1,15 @@
|
|||
{ stdenv, git, go, hugo }:
|
||||
stdenv.mkDerivation {
|
||||
name = "resumee-website";
|
||||
version = "1.0";
|
||||
src = builtins.fetchGit {
|
||||
url = "https://git.vatthauer.xyz/leonv/resumee-website.git";
|
||||
rev = "5cd0f5bb30da8d7297a15be3704e4d9efc73d8b4";
|
||||
};
|
||||
nativeBuildInputs = [ git go hugo ];
|
||||
buildPhase = "hugo -d $out";
|
||||
outputHashAlgo = "sha256";
|
||||
outputHashMode = "recursive";
|
||||
outputHash = "sha256-PQzuhxRrruBbEfUjhPGPeJkJ6vsbMJ+5Ojg4t11oNV8=";
|
||||
}
|
||||
|
4
dafoe/services/ssh.nix
Normal file
4
dafoe/services/ssh.nix
Normal file
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
# Enable the OpenSSH daemon.
|
||||
services.openssh.enable = true;
|
||||
}
|
19
dafoe/services/vaultwarden.nix
Normal file
19
dafoe/services/vaultwarden.nix
Normal file
|
@ -0,0 +1,19 @@
|
|||
{
|
||||
services.vaultwarden = {
|
||||
enable = true;
|
||||
config = {
|
||||
DOMAIN = "https://bitwarden.vatthauer.xyz";
|
||||
SIGNUPS_ALLOWED = false;
|
||||
|
||||
ROCKET_ADDRESS = "127.0.0.1";
|
||||
ROCKET_PORT = 8222;
|
||||
|
||||
ROCKET_LOG = "critical";
|
||||
|
||||
ADMIN_TOKEN = "${../../nix-secrets/willem/vaultwarden/admin-token}";
|
||||
|
||||
YUBICO_CLIENT_ID = "${../../nix-secrets/willem/vaultwarden/yubico-id}";
|
||||
YUBICO_SECRET_KEY = "${../../nix-secrets/willem/vaultwarden/yubico-secret}";
|
||||
};
|
||||
};
|
||||
}
|
|
@ -160,11 +160,11 @@
|
|||
"homebrew-core": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1714451058,
|
||||
"narHash": "sha256-2OynGCZFa3HD3LizrcnGVa1voijuI9ZXK/iE3wLK5NM=",
|
||||
"lastModified": 1714451504,
|
||||
"narHash": "sha256-1G1ksvFwzg1i9ZYLACtVIS/0EAop0tiAeexfD01pHyc=",
|
||||
"owner": "homebrew",
|
||||
"repo": "homebrew-core",
|
||||
"rev": "e071ff1388a74e9c978f361b6183c22fcf4c725b",
|
||||
"rev": "b376432848daaf1243709cee4c835c2a7c6397c1",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -57,6 +57,11 @@
|
|||
specialArgs = { inherit inputs; };
|
||||
modules = [ ./willem/configuration.nix ];
|
||||
};
|
||||
dafoe = unstable.lib.nixosSystem {
|
||||
system = "x86_64-linux";
|
||||
specialArgs = { inherit inputs; };
|
||||
modules = [ ./dafoe/configuration.nix ];
|
||||
};
|
||||
};
|
||||
darwinConfigurations = {
|
||||
shinx = darwin.lib.darwinSystem {
|
||||
|
|
|
@ -91,6 +91,9 @@
|
|||
])
|
||||
|
||||
lean4
|
||||
|
||||
# for emacs
|
||||
texlab
|
||||
];
|
||||
|
||||
programs.home-manager.enable = true;
|
||||
|
|
Loading…
Reference in a new issue