nix/nixos/hosts/framework-server/default.nix
iFargle 3e22c67563
Some checks failed
update-flake-lock / update-flake-lock (push) Successful in 1m57s
build-desktop-iso / build-desktop-iso (push) Failing after 37m6s
build-console-iso / build-console-iso (push) Failing after 1m35s
build-linode-img / build-linode-img (push) Failing after 3h11m0s
deploy-rs / deploy-rs (push) Successful in 21m18s
Update to docker.nix and not podman.nix
2024-01-14 13:26:18 +09:00

55 lines
1.9 KiB
Nix

{ inputs, config, lib, pkgs, modulesPath, desktop, username, hostname, platform, ... }: {
imports = [
inputs.nixos-hardware.nixosModules.framework-13th-gen-intel
(modulesPath + "/installer/scan/not-detected.nix")
../../common/modules/secureboot.nix
../../common/modules/udev-rules.nix
../../common/services/fwupd.nix
../../common/modules/ssh-luks.nix
../../common/services/docker.nix
../../common/services/tailscale-autoconnect.nix
./disks.nix
./builder.nix
./wireguard.nix
./cron.nix
./firewall.nix
];
environment.systemPackages = [
inputs.deploy-rs.packages.${platform}.deploy-rs
pkgs.distrobox
];
# backups-rpi4 cron job to back up sysctl.io's Docker files
users.users.root.openssh.authorizedKeys.keys = [ ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKp2wgqFcr0LGaUXbom88/zK2631pysePUWIaCMljT0K root@backups-rpi4'' ];
services.openssh.settings.PermitRootLogin = lib.mkForce "prohibit-password";
# steam, etc
nixpkgs.config.allowUnfree = true;
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "thunderbolt" "sd_mod" "uas" ];
boot.initrd.kernelModules = [ "r8152" ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = with config.boot.kernelPackages; [ acpi_call ];
networking.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "performance";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
# Set your time zone.
time.timeZone = "Asia/Tokyo";
# Set the networking hostname:
networking.hostName = "framework-server";
networking.firewall.allowedTCPPorts = [ 22 ];
services.tailscale.extraUpFlags = [
"--advertise-exit-node"
"--advertise-routes=10.2.0.0/24"
];
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = true;
};
}