Compare commits

..

No commits in common. "781ce2d5e939da7cab8b4ae20ea9467fc68e16ec" and "d039cc313130d564c9b001580c9dac00c02bb604" have entirely different histories.

24 changed files with 506 additions and 620 deletions

View file

@ -13,19 +13,14 @@
agenix.url = "github:yaxitech/ragenix";
};
outputs = inputs @ {
self,
nixpkgs,
home-manager,
microvm,
agenix,
...
}: let
outputs = inputs@{ self, nixpkgs, home-manager, microvm, agenix, ... }:
let
system = "x86_64-linux";
username = "tbarnouin";
proxy_host = "192.168.1.40";
pgsql_host = "192.168.1.13";
in {
in
{
nixosConfigurations = {
nixmox-curiosity = nixpkgs.lib.nixosSystem {
inherit system;
@ -89,16 +84,16 @@
}
];
};
# template = nixpkgs.lib.nixosSystem {
# inherit system;
# modules = [
# agenix.nixosModules.default
# "${inputs.self}/systems/minimalVMConfig.nix"
# {
# networking.hostName = "nixos";
# }
# ];
# };
# template = nixpkgs.lib.nixosSystem {
# inherit system;
# modules = [
# agenix.nixosModules.default
# "${inputs.self}/systems/minimalVMConfig.nix"
# {
# networking.hostName = "nixos";
# }
# ];
# };
jellyfin = nixpkgs.lib.nixosSystem {
inherit system;
modules = [

View file

@ -1,15 +1,11 @@
{
config,
lib,
pkgs,
...
}: {
imports = [./hardware-configuration.nix];
{ config, lib, pkgs, ... }:
{ imports = [ ./hardware-configuration.nix ];
nix = {
settings = {
experimental-features = ["nix-command" "flakes"];
trusted-users = ["@wheel"];
experimental-features = [ "nix-command" "flakes" ];
trusted-users = [ "@wheel" ];
auto-optimise-store = true;
};
gc = {
@ -21,9 +17,9 @@
security.sudo.wheelNeedsPassword = false;
networking = {
networking= {
useNetworkd = true;
firewall.allowedTCPPorts = [22];
firewall.allowedTCPPorts = [ 22 ];
};
systemd.network = {
@ -108,4 +104,5 @@
};
system.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -1,15 +1,13 @@
{ lib, system, ... }:
{
lib,
system,
...
}: {
boot = {
# use latest kernel
# kernelPackages = pkgs.linuxPackages_latest;
supportedFilesystems = ["ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs"];
supportedFilesystems = [ "ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs" ];
growPartition = true;
kernelModules = ["kvm-intel"];
kernelParams = lib.mkForce [];
kernelModules = [ "kvm-intel" ];
kernelParams = lib.mkForce [ ];
loader = {
grub = {
@ -22,8 +20,8 @@
};
initrd = {
availableKernelModules = ["9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi"];
kernelModules = ["virtio_balloon" "virtio_console" "virtio_rng"];
availableKernelModules = [ "9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi" ];
kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" ];
};
tmp.cleanOnBoot = true;
@ -47,6 +45,7 @@
};
};
services.fstrim = {
enable = true;
interval = "weekly";

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home = {
username = "tbarnouin";
stateVersion = "24.11";
@ -78,7 +75,8 @@
};
oh-my-zsh = {
enable = true;
plugins = [
plugins =
[
"git"
"terraform"
"sudo"

View file

@ -1,15 +1,11 @@
{
config,
lib,
pkgs,
...
}: {
imports = [./hardware-configuration.nix];
{ config, lib, pkgs, ... }:
{ imports = [ ./hardware-configuration.nix ];
nix = {
settings = {
experimental-features = ["nix-command" "flakes"];
trusted-users = ["@wheel"];
experimental-features = [ "nix-command" "flakes" ];
trusted-users = [ "@wheel" ];
auto-optimise-store = true;
};
gc = {
@ -21,9 +17,9 @@
security.sudo.wheelNeedsPassword = false;
networking = {
networking= {
useNetworkd = true;
firewall.allowedTCPPorts = [22];
firewall.allowedTCPPorts = [ 22 ];
};
systemd.network = {
@ -108,4 +104,5 @@
};
system.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -1,15 +1,13 @@
{ lib, system, ... }:
{
lib,
system,
...
}: {
boot = {
# use latest kernel
# kernelPackages = pkgs.linuxPackages_latest;
supportedFilesystems = ["ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs"];
supportedFilesystems = [ "ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs" ];
growPartition = true;
kernelModules = ["kvm-intel"];
kernelParams = lib.mkForce [];
kernelModules = [ "kvm-intel" ];
kernelParams = lib.mkForce [ ];
loader = {
grub = {
@ -22,8 +20,8 @@
};
initrd = {
availableKernelModules = ["9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi"];
kernelModules = ["virtio_balloon" "virtio_console" "virtio_rng"];
availableKernelModules = [ "9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi" ];
kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" ];
};
tmp.cleanOnBoot = true;

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home = {
username = "tbarnouin";
stateVersion = "24.11";
@ -78,7 +75,8 @@
};
oh-my-zsh = {
enable = true;
plugins = [
plugins =
[
"git"
"terraform"
"sudo"

View file

@ -1,17 +1,19 @@
let
tbarnouin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos";
users = [tbarnouin];
users = [ tbarnouin ];
forgejo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF2NAam+nseSCzJV/1UTyO2LgMjx0xT7/vTOOi5EG9HV root@forgejo-runner";
grafana = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQxvO9vdd2f9aV4F3LEQrrTJaLwLvSLbLtjB9qNxc4z root@grafana";
onlyoffice = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGbnzv2/Or4XdQXLDjIbr7oIDTQEvgSMTX4aiNCQk4tC root@onlyoffice";
systems = [forgejo grafana];
in {
systems = [ forgejo grafana ];
in
{
"secrets/initialPassword.age".publicKeys = users ++ systems;
"services/grafana/secrets/grafana-db.age".publicKeys = [tbarnouin grafana];
"services/grafana/secrets/grafana-oauth_secret.age".publicKeys = [tbarnouin grafana];
"services/grafana/secrets/kuma-token.age".publicKeys = [tbarnouin grafana];
"services/onlyoffice/secrets/office-dbpass.age".publicKeys = [tbarnouin onlyoffice];
"services/onlyoffice/secrets/office-jwtpass.age".publicKeys = [tbarnouin onlyoffice];
"services/grafana/secrets/grafana-db.age".publicKeys = [ tbarnouin grafana ];
"services/grafana/secrets/grafana-oauth_secret.age".publicKeys = [ tbarnouin grafana ];
"services/grafana/secrets/kuma-token.age".publicKeys = [ tbarnouin grafana ];
"services/onlyoffice/secrets/office-dbpass.age".publicKeys = [ tbarnouin onlyoffice ];
"services/onlyoffice/secrets/office-jwtpass.age".publicKeys = [ tbarnouin onlyoffice ];
}

View file

@ -1,18 +1,14 @@
{
inputs,
config,
lib,
authentik-nix,
...
}: let
{ inputs, config, lib, authentik-nix, ... }:
let
cfg = config.services.vm_authentik;
in {
in
{
options.services.vm_authentik = {
enable = lib.mkEnableOption "Enable minimal config";
};
config = lib.mkIf cfg.enable {
networking = {
firewall.allowedTCPPorts = [9000 9300 9443];
firewall.allowedTCPPorts = [ 9000 9300 9443 ];
};
};
}

View file

@ -1,4 +1,5 @@
{inputs, ...}: {
{ inputs, ... }:
{
imports = [
./nginx
./gitea

View file

@ -1,11 +1,8 @@
{
config,
pkgs,
lib,
...
}: let
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_gitea;
in {
in
{
options.services.vm_gitea = {
enable = lib.mkEnableOption "Enable minimal config";
db_ip = lib.mkOption {
@ -30,6 +27,6 @@ in {
passwordFile = "/run/secrets/gitea/gitea-dbpass";
};
};
networking.firewall.allowedTCPPorts = [3000];
networking.firewall.allowedTCPPorts = [ 3000 ];
};
}

View file

@ -1,11 +1,8 @@
{
lib,
config,
pkgs,
...
}: let
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_grafana;
in {
in
{
options.services.vm_grafana = {
enable = lib.mkEnableOption "Enable minimal config";
vm_ip = lib.mkOption {
@ -22,7 +19,7 @@ in {
};
};
config = lib.mkIf cfg.enable {
age.secrets = {
age.secrets ={
grafana-db = {
file = ./secrets/grafana-db.age;
owner = "grafana";
@ -91,125 +88,95 @@ in {
job_name = "kuma";
scrape_interval = "30s";
scheme = "http";
static_configs = [
{
targets = ["192.168.1.90:3001"];
}
];
static_configs = [{
targets = [ "192.168.1.90:3001" ];
}];
basic_auth.username = "tbarnouin";
basic_auth.password_file = config.age.secrets.kuma-token.path;
}
{
job_name = "grafana";
static_configs = [
{
targets = ["127.0.0.1:9002"];
}
];
static_configs = [{
targets = [ "127.0.0.1:9002" ];
}];
}
{
job_name = "openmediavault_cadvisor";
static_configs = [
{
targets = ["192.168.1.125:8080"];
}
];
static_configs = [{
targets = [ "192.168.1.125:8080" ];
}];
}
{
job_name = "opportunity";
static_configs = [
{
targets = ["192.168.1.125:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.125:9100" ];
}];
}
{
job_name = "nginx";
static_configs = [
{
targets = ["${cfg.proxy_ip}:9002"];
}
];
static_configs = [{
targets = [ "${cfg.proxy_ip}:9002" ];
}];
}
{
job_name = "redis";
static_configs = [
{
targets = ["192.168.1.16:9002"];
}
];
static_configs = [{
targets = [ "192.168.1.16:9002" ];
}];
}
{
job_name = "ingenuity";
static_configs = [
{
targets = ["192.168.1.90:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.90:9100" ];
}];
}
{
job_name = "gitea";
static_configs = [
{
targets = ["192.168.1.14:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.14:9100" ];
}];
}
{
job_name = "postgresql";
static_configs = [
{
targets = ["192.168.1.13:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.13:9100" ];
}];
}
{
job_name = "nextcloud";
static_configs = [
{
targets = ["192.168.1.44:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.44:9100" ];
}];
}
{
job_name = "deluge";
static_configs = [
{
targets = ["192.168.1.18:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.18:9100" ];
}];
}
{
job_name = "netbox";
static_configs = [
{
targets = ["192.168.1.45:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.45:9100" ];
}];
}
{
job_name = "jellyfin";
static_configs = [
{
targets = ["192.168.1.42:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.42:9100" ];
}];
}
{
job_name = "authentik-ldap";
static_configs = [
{
targets = ["192.168.1.41:9100"];
}
];
static_configs = [{
targets = [ "192.168.1.41:9100" ];
}];
}
{
job_name = "authentik";
static_configs = [
{
targets = ["192.168.1.25:9002"];
}
];
static_configs = [{
targets = [ "192.168.1.25:9002" ];
}];
}
];
};
@ -235,8 +202,7 @@ in {
chunk_retain_period = "30s";
};
schema_config = {
configs = [
{
configs = [{
from = "2022-06-06";
store = "boltdb-shipper";
object_store = "filesystem";
@ -245,8 +211,7 @@ in {
prefix = "index_";
period = "24h";
};
}
];
}];
};
storage_config = {
boltdb_shipper = {
@ -290,11 +255,9 @@ in {
positions = {
filename = "/tmp/positions.yaml";
};
clients = [
{
clients = [{
url = "http://127.0.0.1:3100/loki/api/v1/push";
}
];
}];
scrape_configs = [
{
job_name = "syslog";
@ -308,27 +271,27 @@ in {
};
relabel_configs = [
{
source_labels = ["__syslog_message_hostname"];
source_labels = [ "__syslog_message_hostname" ];
target_label = "host";
}
{
source_labels = ["__syslog_message_hostname"];
source_labels = [ "__syslog_message_hostname" ];
target_label = "hostname";
}
{
source_labels = ["__syslog_message_severity"];
source_labels = [ "__syslog_message_severity" ];
target_label = "level";
}
{
source_labels = ["__syslog_message_app_name"];
source_labels = [ "__syslog_message_app_name" ];
target_label = "application";
}
{
source_labels = ["__syslog_message_facility"];
source_labels = [ "__syslog_message_facility" ];
target_label = "facility";
}
{
source_labels = ["__syslog_connection_hostname"];
source_labels = [ "__syslog_connection_hostname" ];
target_label = "connection_hostname";
}
];
@ -338,7 +301,7 @@ in {
};
# Open ports in the firewall.
networking.firewall.allowedTCPPorts = [3000 3100 3101 8086 9001 1514 514];
networking.firewall.allowedUDPPorts = [514];
networking.firewall.allowedTCPPorts = [ 3000 3100 3101 8086 9001 1514 514 ];
networking.firewall.allowedUDPPorts = [ 514 ];
};
}

View file

@ -1,16 +1,13 @@
{
lib,
config,
pkgs,
...
}: let
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_jellyfin;
in {
in
{
options.services.vm_jellyfin = {
enable = lib.mkEnableOption "Enable minimal config";
};
config = lib.mkIf cfg.enable {
environment.systemPackages = [pkgs.cifs-utils];
environment.systemPackages = [ pkgs.cifs-utils ];
services.jellyfin = {
enable = true;
user = "tbarnouin";

View file

@ -1,25 +1,20 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
imports = [
./lxc.nix
./vm.nix
];
nix = {
settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = ["root" "@wheel"];
settings.experimental-features = [ "nix-command" "flakes" ];
settings.trusted-users = [ "root" "@wheel" ];
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [22 9002];
allowedTCPPorts = [ 22 9002 ];
};
};
@ -40,7 +35,7 @@
users = {
users.tbarnouin = {
isNormalUser = true;
extraGroups = ["wheel"];
extraGroups = [ "wheel" ];
shell = pkgs.zsh;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -63,7 +58,7 @@
};
ohMyZsh = {
enable = true;
plugins = ["git"];
plugins = [ "git" ];
theme = "bira";
};
};
@ -115,7 +110,7 @@
exporters = {
node = {
enable = true;
enabledCollectors = ["systemd"];
enabledCollectors = [ "systemd" ];
port = 9002;
};
};

View file

@ -1,11 +1,8 @@
{
lib,
config,
modulesPath,
...
}: let
{lib, config, modulesPath, ...}:
let
cfg = config.services.lxc;
in {
in
{
options.services.lxc = {
enable = lib.mkEnableOption "Enable LXC container config";
};

View file

@ -1,11 +1,8 @@
{
lib,
config,
modulesPath,
...
}: let
{lib, config, modulesPath, ...}:
let
cfg = config.services.vm;
in {
in
{
options.services.vm = {
enable = lib.mkEnableOption "Enable LXC container config";
};

View file

@ -1,11 +1,8 @@
{
lib,
config,
pkgs,
...
}: let
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_nextcloud;
in {
in
{
options.services.vm_nextcloud = {
enable = lib.mkEnableOption "Enable minimal config";
proxy_ip = lib.mkOption {
@ -56,8 +53,8 @@ in {
"opcache.memory_consumption" = "512";
};
settings = {
trusted_proxies = ["${cfg.proxy_ip}"];
trusted_domains = ["${cfg.proxy_ip}"];
trusted_proxies = [ "${cfg.proxy_ip}" ];
trusted_domains = [ "${cfg.proxy_ip}" ];
overwriteprotocol = "http";
overwrite.cli.url = "http://${cfg.proxy_ip}/cloud/";
"overwritehost" = "${cfg.proxy_ip}";
@ -76,6 +73,6 @@ in {
};
};
};
networking.firewall.allowedTCPPorts = [80];
networking.firewall.allowedTCPPorts = [ 80 ];
};
}

View file

@ -1,11 +1,8 @@
{
config,
pkgs,
lib,
...
}: let
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_nginx;
in {
in
{
options.services.vm_nginx = {
enable = lib.mkEnableOption "Enable minimal config";
};
@ -149,18 +146,9 @@ in {
proxyWebsockets = true;
};
};
"actual.le43.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://192.168.1.125:5006";
recommendedProxySettings = true;
proxyWebsockets = true;
};
};
};
};
};
networking.firewall.allowedTCPPorts = [80 443];
networking.firewall.allowedTCPPorts = [ 80 443 ];
};
}

View file

@ -1,11 +1,8 @@
{
config,
pkgs,
lib,
...
}: let
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_onlyoffice;
in {
in
{
options.services.vm_onlyoffice = {
enable = lib.mkEnableOption "Enable OnlyOffice service";
pgsql_ip = lib.mkOption {
@ -36,6 +33,6 @@ in {
jwtSecretFile = config.age.secrets.office-jwtpass.path;
};
};
networking.firewall.allowedTCPPorts = [80 4369 5432 5672 6379 8000 8080];
networking.firewall.allowedTCPPorts = [ 80 4369 5432 5672 6379 8000 8080 ];
};
}

View file

@ -1,11 +1,8 @@
{
lib,
config,
pkgs,
...
}: let
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_postgresql;
in {
in
{
options.services.vm_postgresql = {
enable = lib.mkEnableOption "Enable minimal config";
};
@ -47,6 +44,6 @@ in {
alter user nextcloud with password 'password';
'';
};
networking.firewall.allowedTCPPorts = [5432];
networking.firewall.allowedTCPPorts = [ 5432 ];
};
}

View file

@ -1,11 +1,8 @@
{
config,
pkgs,
lib,
...
}: let
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_redis;
in {
in
{
options.services.vm_redis = {
enable = lib.mkEnableOption "Enable minimal config";
};
@ -21,6 +18,6 @@ in {
};
};
};
networking.firewall.allowedTCPPorts = [6379];
networking.firewall.allowedTCPPorts = [ 6379 ];
};
}

View file

@ -1,20 +1,15 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
nix = {
settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = ["root" "@wheel"];
settings.experimental-features = [ "nix-command" "flakes" ];
settings.trusted-users = [ "root" "@wheel" ];
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [22 9002];
allowedTCPPorts = [ 22 9002 ];
};
};
@ -48,7 +43,7 @@
users = {
users.tbarnouin = {
isNormalUser = true;
extraGroups = ["wheel"];
extraGroups = [ "wheel" ];
shell = pkgs.zsh;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -71,7 +66,7 @@
};
ohMyZsh = {
enable = true;
plugins = ["git"];
plugins = [ "git" ];
theme = "bira";
};
};
@ -123,7 +118,7 @@
exporters = {
node = {
enable = true;
enabledCollectors = ["systemd"];
enabledCollectors = [ "systemd" ];
port = 9002;
};
};

View file

@ -1,14 +1,8 @@
{
config,
pkgs,
lib,
inputs,
modulesPath,
microvm,
...
}: let
{ config, pkgs, lib, inputs, modulesPath, microvm, ... }:
let
cfg = config.services.micro_vm;
in {
in
{
options.services.micro_vm = {
enable = lib.mkEnableOption "Enable NixOS microvm config";
hostname = lib.mkOption {
@ -59,13 +53,11 @@ in {
mountPoint = "/run/secrets/${cfg.hostname}";
}
];
interfaces = [
{
interfaces = [ {
type = "tap";
id = "vm-${cfg.hostname}";
mac = "${cfg.macAddr}";
}
];
} ];
hypervisor = "qemu";
socket = "control.socket";
@ -84,14 +76,14 @@ in {
};
nix = {
settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = ["root" "@wheel"];
settings.experimental-features = [ "nix-command" "flakes" ];
settings.trusted-users = [ "root" "@wheel" ];
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [22 9002];
allowedTCPPorts = [ 22 9002 ];
};
};
@ -112,7 +104,7 @@ in {
users = {
users.tbarnouin = {
isNormalUser = true;
extraGroups = ["wheel"];
extraGroups = [ "wheel" ];
shell = pkgs.zsh;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -135,7 +127,7 @@ in {
};
ohMyZsh = {
enable = true;
plugins = ["git"];
plugins = [ "git" ];
theme = "bira";
};
};
@ -187,7 +179,7 @@ in {
exporters = {
node = {
enable = true;
enabledCollectors = ["systemd"];
enabledCollectors = [ "systemd" ];
port = 9002;
};
};
@ -200,3 +192,4 @@ in {
};
};
}

View file

@ -1,20 +1,15 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
nix = {
settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = ["root" "@wheel"];
settings.experimental-features = [ "nix-command" "flakes" ];
settings.trusted-users = [ "root" "@wheel" ];
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [22 9002];
allowedTCPPorts = [ 22 9002 ];
};
};
@ -35,7 +30,7 @@
users = {
users.tbarnouin = {
isNormalUser = true;
extraGroups = ["wheel"];
extraGroups = [ "wheel" ];
shell = pkgs.zsh;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -58,7 +53,7 @@
};
ohMyZsh = {
enable = true;
plugins = ["git"];
plugins = [ "git" ];
theme = "bira";
};
};
@ -111,7 +106,7 @@
exporters = {
node = {
enable = true;
enabledCollectors = ["systemd"];
enabledCollectors = [ "systemd" ];
port = 9002;
};
};