# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’). { lib, config, pkgs, ... }: with lib; { imports = [ # Include the results of the hardware scan. ./hardware-configuration.nix # Fonts ../modules/personal/fonts # Encrypted DNS ../modules/services/edns # Other services ../modules/personal/u2f.nix ./peertube-runner.nix ]; # Kernel boot.kernelPackages = pkgs.linuxKernel.packages.linux_xanmod_stable; # Plasma! services.desktopManager.plasma6.enable = true; ## Encryption # Kernel modules needed for mounting USB VFAT devices in initrd stage common.linux.luksDevices.root = "/dev/disk/by-uuid/7c6e40a8-900b-4f85-9712-2b872caf1892"; common.linux.sops.enable = true; common.linux.sops.file = ./secrets.yaml; # Nix cache server sops.secrets."nix-cache/private-key" = { owner = "nix-serve"; group = "nix-serve"; mode = "0600"; }; nki.services.nix-cache = { enableServer = true; privateKeyFile = config.sops.secrets."nix-cache/private-key".path; }; # Networking common.linux.networking = { hostname = "kagamiPC"; # Define your hostname. networks = { "10-wired" = { match = "enp*"; isRequired = true; }; "20-wireless".match = "wlan*"; }; dnsServers = [ "127.0.0.1" ]; }; nki.services.edns.enable = true; nki.services.edns.ipv6 = true; ## DTTH Wireguard # sops.secrets."dtth-wg/private-key" = { owner = "root"; group = "systemd-network"; mode = "0640"; }; sops.secrets."dtth-wg/preshared-key" = { owner = "root"; group = "systemd-network"; mode = "0640"; }; systemd.network.netdevs."10-dtth-wg" = { netdevConfig = { Kind = "wireguard"; Name = "dtth-wg"; MTUBytes = "1280"; }; wireguardConfig = { PrivateKeyFile = config.sops.secrets."dtth-wg/private-key".path; }; wireguardPeers = [{ PublicKey = "+7iI4jwmM1Qr+/DKB1Hv8JgFkGu7lSV0PAoo+O5d3yQ="; PresharedKeyFile = config.sops.secrets."dtth-wg/preshared-key".path; AllowedIPs = [ "100.64.0.0/10" "fd00::/106" ]; Endpoint = "vpn.dtth.ch:51820"; PersistentKeepalive = 25; }]; }; systemd.network.networks."dtth-wg" = { matchConfig.Name = "dtth-wg"; address = [ "100.73.146.80/32" "fd00::33:105b/128" ]; DHCP = "no"; routes = [ { Destination = "100.64.0.0/10"; Scope = "link"; } { Destination = "fd00::/106"; } ]; }; # Define a user account. common.linux.username = "nki"; services.getty.autologinUser = "nki"; ## Hardware # Peripherals hardware.opentabletdriver.enable = true; # Enable razer daemon hardware.openrazer.enable = true; hardware.openrazer.keyStatistics = true; hardware.openrazer.verboseLogging = true; # Mounting disks! fileSystems = let ntfsMount = path: { device = path; fsType = "ntfs"; options = [ "rw" "uid=${toString config.users.users.nki.uid}" "nofail" ]; }; in { "/mnt/Data" = ntfsMount "/dev/disk/by-uuid/A90680F8BBE62FE3"; "/mnt/Stuff" = ntfsMount "/dev/disk/by-uuid/717BF2EE20BB8A62"; "/mnt/Shared" = ntfsMount "/dev/disk/by-uuid/76AC086BAC0827E7"; "/mnt/osu" = ntfsMount "/dev/disk/by-uuid/530D3E1648CD1C26"; }; # PAM personal.u2f.enable = true; # This value determines the NixOS release from which the default # settings for stateful data, like file locations and database versions # on your system were taken. It‘s perfectly fine and recommended to leave # this value at the release version of the first install of this system. # Before changing this value read the documentation for this option # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). system.stateVersion = "22.11"; # Did you read the comment? # tinc network sops.secrets."tinc/ed25519-private-key" = { }; sops.secrets."tinc/rsa-private-key" = { }; services.my-tinc = { enable = true; hostName = "home"; rsaPrivateKey = config.sops.secrets."tinc/rsa-private-key".path; ed25519PrivateKey = config.sops.secrets."tinc/ed25519-private-key".path; bindPort = 6565; }; # Music server services.navidrome.enable = true; services.navidrome.settings = { Address = "11.0.0.2"; MusicFolder = "/mnt/Stuff/Music"; }; systemd.services.navidrome.serviceConfig.BindReadOnlyPaths = lib.mkAfter [ "/etc" ]; networking.firewall.allowedTCPPorts = [ 4533 8000 ]; # Printers services.printing.enable = true; # mpd services.mpd = { enable = true; user = "nki"; startWhenNeeded = true; extraConfig = '' audio_output { type "pipewire" name "pipewire local" dsd "yes" } ''; }; systemd.services.mpd.environment = { # https://gitlab.freedesktop.org/pipewire/pipewire/-/issues/609 XDG_RUNTIME_DIR = "/run/user/1000"; # User-id 1000 must match above user. MPD will look inside this directory for the PipeWire socket. }; sops.secrets."scrobble/lastfm" = { }; sops.secrets."scrobble/listenbrainz" = { }; services.mpdscribble = { enable = true; endpoints."last.fm" = { username = "natsukagami"; passwordFile = config.sops.secrets."scrobble/lastfm".path; }; endpoints."listenbrainz" = { username = "natsukagami"; passwordFile = config.sops.secrets."scrobble/listenbrainz".path; }; }; }