summaryrefslogtreecommitdiff
path: root/machines/dragon.nix
blob: 33100256e653632ed40f1d1d128746fb582dd414 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
{ config, lib, pkgs, ... }:
let
  duid = "00:01:00:01:21:a2:4e:a8:d0:bf:9c:45:a6:ec";
in
{
  imports = [
    ../config/acme-sh.nix
    ../config/mpd.nix
    ../config/borg-backup.nix
    ../config/common.nix
    ../config/users.nix
    # ../config/weechat.nix
    ../config/dns.nix
    ../config/hydra.nix
    ../config/web-server.nix
    ../config/cgit.nix
    ../config/mail-server.nix
    ../config/munin-node.nix
    ../config/munin-master.nix
    ../config/vpn-server.nix
    ../config/terraria.nix
    ../config/pjournal.nix
  ];

  services.pjournal = {
    enable = true;
    port = (import ../data/aliases.nix).services.pjournal.port;
    base_url = "https://journal.orbekk.com";
  };

  environment.systemPackages = with pkgs; [ ipmitool ];
  
  # environment.etc."dhcpcd.duid".text = duid;
  # systemd.services.dhcpcd.preStart = ''
  #   cp ${pkgs.writeText "duid" "${duid}"} /var/db/dhcpcd/duid
  # '';

  programs.mosh.enable = true;

  virtualisation.lxd.enable = true;
  #security.apparmor = {
  #  enable = true;
  #  profiles = [
  #    "${pkgs.lxc}/etc/apparmor.d/usr.bin.lxc-star" 
  #    "${pkgs.lxc}/etc/apparmor.d/lxc-containers"
  #  ];
  #  packages = [ pkgs.lxc pkgs.apparmor-parser ];
  #};

  boot = {
    kernelParams = [ "console=tty0" ''console="ttyS0,115200n8"'' ];
    kernel.sysctl = {
      "net.ipv4.conf.all.forwarding" = true;
      "net.ipv6.conf.all.forwarding" = true;
      "net.ipv6.conf.br0.accept_ra" = 2;
    };
    
    loader.grub.extraConfig = ''
      GRUB_TERMINAL="serial"
      GRUB_SERIAL_COMMAND="serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1"
      serial --speed 115200 --unit=0
      terminal_input serial
      terminal_output serial
    '';
    loader.grub.enable = true;
    loader.grub.version = 2;
    loader.grub.devices = ["/dev/sda" "/dev/sdb"];
  };
  
  networking = {
    hostName = lib.mkForce "dragon";

    firewall.allowPing = true;
    firewall.checkReversePath = "loose";
    firewall.logRefusedConnections = false;

    bridges = {
      br0 = {
        interfaces = ["eno2"];
      };
    };

    dhcpcd.extraConfig = ''
    duid
    ipv6ra_noautoconf
    debug
    interface br0
      clientid ${duid}
      ipv6ra_noautoconf
      dhcp6
    '';
  };

  # Required to enable password authentication for one user.
  security.pam.services.sshd.unixAuth = lib.mkForce true;
  services.openssh = {
    enable = lib.mkDefault true;
    passwordAuthentication = false;
    extraConfig = ''
      Match User readonly
        PasswordAuthentication yes
    '';
  };

  fileSystems = {
    "/storage" = {
      device = "/dev/sda3";
      fsType = "btrfs";
      options = [ "subvol=storage" ];
    };
    "/staging" = {
      device = "/dev/sda3";
      fsType = "btrfs";
      options = [ "subvol=staging" ];
    };
  };

  users.users.breakds = {
    uid = 1101;
    shell = pkgs.bashInteractive;
    home = "/home/breakds";
    createHome = false;
    isNormalUser = true;
    description = "Break Yang";
    openssh.authorizedKeys.keyFiles = [ ../data/break_rsa.pub ];
  };

  system.stateVersion = lib.mkForce "17.09";
}