136 lines
3.9 KiB
Nix
136 lines
3.9 KiB
Nix
# Edit this configuration file to define what should be installed on
|
||
# your system. Help is available in the configuration.nix(5) man page
|
||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||
|
||
{ lib, config, pkgs, ... }:
|
||
|
||
with lib;
|
||
{
|
||
imports =
|
||
[
|
||
# Include the results of the hardware scan.
|
||
./hardware-configuration.nix
|
||
# secret management
|
||
./secrets
|
||
# Fonts
|
||
../modules/personal/fonts
|
||
# Encrypted DNS
|
||
../modules/services/edns
|
||
# Other services
|
||
../modules/personal/u2f.nix
|
||
];
|
||
|
||
## Encryption
|
||
# Kernel modules needed for mounting USB VFAT devices in initrd stage
|
||
common.linux.luksDevices.root = "/dev/disk/by-uuid/7c6e40a8-900b-4f85-9712-2b872caf1892";
|
||
|
||
# Networking
|
||
common.linux.networking =
|
||
{
|
||
hostname = "kagamiPC"; # Define your hostname.
|
||
networks = {
|
||
"10-wired" = {
|
||
match = "enp*";
|
||
isRequired = true;
|
||
};
|
||
"20-wireless".match = "wlan*";
|
||
};
|
||
dnsServers = [ "127.0.0.1" ];
|
||
};
|
||
nki.services.edns.enable = true;
|
||
nki.services.edns.ipv6 = true;
|
||
|
||
# Define a user account.
|
||
common.linux.username = "nki";
|
||
services.getty.autologinUser = "nki";
|
||
|
||
## Hardware
|
||
# Peripherals
|
||
hardware.opentabletdriver.enable = true;
|
||
# Enable razer daemon
|
||
hardware.openrazer.enable = true;
|
||
hardware.openrazer.keyStatistics = true;
|
||
hardware.openrazer.verboseLogging = true;
|
||
|
||
# Mounting disks!
|
||
fileSystems =
|
||
let
|
||
ntfsMount = path: {
|
||
device = path;
|
||
fsType = "ntfs";
|
||
options = [ "rw" "uid=${toString config.users.users.nki.uid}" "nofail" ];
|
||
};
|
||
in
|
||
{
|
||
"/mnt/Data" = ntfsMount "/dev/disk/by-uuid/A90680F8BBE62FE3";
|
||
"/mnt/Stuff" = ntfsMount "/dev/disk/by-uuid/717BF2EE20BB8A62";
|
||
"/mnt/Shared" = ntfsMount "/dev/disk/by-uuid/76AC086BAC0827E7";
|
||
};
|
||
|
||
# PAM
|
||
personal.u2f.enable = true;
|
||
|
||
# This value determines the NixOS release from which the default
|
||
# settings for stateful data, like file locations and database versions
|
||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||
# this value at the release version of the first install of this system.
|
||
# Before changing this value read the documentation for this option
|
||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||
system.stateVersion = "21.05"; # Did you read the comment?
|
||
|
||
# tinc network
|
||
sops.secrets."tinc/ed25519-private-key" = { };
|
||
sops.secrets."tinc/rsa-private-key" = { };
|
||
services.my-tinc = {
|
||
enable = true;
|
||
hostName = "home";
|
||
rsaPrivateKey = config.sops.secrets."tinc/rsa-private-key".path;
|
||
ed25519PrivateKey = config.sops.secrets."tinc/ed25519-private-key".path;
|
||
bindPort = 6565;
|
||
};
|
||
|
||
|
||
# Music server
|
||
services.navidrome.enable = true;
|
||
services.navidrome.settings = {
|
||
Address = "11.0.0.2";
|
||
MusicFolder = "/mnt/Stuff/Music";
|
||
};
|
||
systemd.services.navidrome.serviceConfig.BindReadOnlyPaths = lib.mkAfter [ "/etc" ];
|
||
|
||
# Printers
|
||
services.printing.enable = true;
|
||
|
||
# mpd
|
||
services.mpd = {
|
||
enable = true;
|
||
user = "nki";
|
||
startWhenNeeded = true;
|
||
extraConfig = ''
|
||
audio_output {
|
||
type "pipewire"
|
||
name "pipewire local"
|
||
dsd "yes"
|
||
}
|
||
'';
|
||
};
|
||
systemd.services.mpd.environment = {
|
||
# https://gitlab.freedesktop.org/pipewire/pipewire/-/issues/609
|
||
XDG_RUNTIME_DIR = "/run/user/1000"; # User-id 1000 must match above user. MPD will look inside this directory for the PipeWire socket.
|
||
};
|
||
sops.secrets."scrobble/lastfm" = { };
|
||
sops.secrets."scrobble/listenbrainz" = { };
|
||
services.mpdscribble = {
|
||
enable = true;
|
||
endpoints."last.fm" = {
|
||
username = "natsukagami";
|
||
passwordFile = config.sops.secrets."scrobble/lastfm".path;
|
||
};
|
||
endpoints."listenbrainz" = {
|
||
username = "natsukagami";
|
||
passwordFile = config.sops.secrets."scrobble/listenbrainz".path;
|
||
};
|
||
};
|
||
}
|
||
|