feat: init

This commit is contained in:
Nick 2024-10-06 15:25:05 -05:00
commit c19ea940bd
320 changed files with 23845 additions and 0 deletions

28
systems/server/boot.nix Executable file
View file

@ -0,0 +1,28 @@
{
pkgs,
config,
...
}: {
boot = {
extraModulePackages = [
config.boot.kernelPackages.v4l2loopback.out
];
supportedFilesystems = ["ntfs"];
initrd = {
availableKernelModules = ["nvme" "ahci" "xhci_pci" "usb_storage" "usbhid" "sd_mod"];
kernelModules = [];
};
kernelModules = ["kvm-amd" "vfio-pci" "v4l2loopback"];
kernelPackages = pkgs.linuxPackages_latest;
loader = {
efi = {
canTouchEfiVariables = true;
efiSysMountPoint = "/boot";
};
systemd-boot.enable = true;
};
};
}

13
systems/server/default.nix Executable file
View file

@ -0,0 +1,13 @@
{lib, ...}: {
imports = [
./boot.nix
./filesystem.nix
./graphics.nix
./hardware.nix
./networking.nix
./sops.nix
./ssh.nix
];
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
system.stateVersion = lib.mkForce "24.05";
}

45
systems/server/filesystem.nix Executable file
View file

@ -0,0 +1,45 @@
{
flake,
config,
...
}: let
inherit (flake.config.people) user0;
inherit (flake.config.system.device) server;
in {
fileSystems = let
storageDrives = [
"storage0"
];
storageMounts = storage: {
name = "${server.${storage}.mount}";
value = {
device = server.${storage}.device;
fsType = "ext4";
options = server.${storage}.options;
};
};
in
{
"/" = {
device = "/dev/disk/by-uuid/de4e681b-0667-4bf8-8d6e-c50894aa41cd";
fsType = "ext4";
};
"/boot" = {
device = "/dev/disk/by-uuid/C68D-B1C0";
fsType = "vfat";
};
}
// (builtins.listToAttrs (map storageMounts storageDrives));
swapDevices = [
{device = "/dev/disk/by-uuid/259fcc06-912c-4bd3-b781-8f77449e935a";}
];
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user0}.home.homeDirectory} 0755 ${user0} users -"
"Z ${server.storage0.mount} 2775 root root -"
];
services.udisks2.enable = true;
}

18
systems/server/graphics.nix Executable file
View file

@ -0,0 +1,18 @@
{pkgs, ...}: {
hardware = {
graphics = {
enable = true;
extraPackages = with pkgs; [
rocm-opencl-icd
rocm-opencl-runtime
rocmPackages.clr.icd
pkgs.amdvlk
];
extraPackages32 = [
pkgs.driversi686Linux.amdvlk
];
};
};
boot.initrd.kernelModules = ["amdgpu"];
services.xserver.videoDrivers = ["amdgpu"];
}

12
systems/server/hardware.nix Executable file
View file

@ -0,0 +1,12 @@
{
config,
lib,
pkgs,
...
}: {
hardware = {
firmware = [pkgs.rtl8761b-firmware];
enableAllFirmware = true;
cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
};
}

38
systems/server/networking.nix Executable file
View file

@ -0,0 +1,38 @@
{
lib,
flake,
...
}: let
inherit (flake.config.system.device) server;
in {
networking = {
hostName = server.name;
networkmanager.enable = true;
useDHCP = lib.mkDefault true;
firewall = {
enable = true;
allowedTCPPorts = [
22 # SSH
25 # SMTP
139 # SMTP
587 # SMTP
];
};
};
services = {
avahi = {
enable = true;
openFirewall = true;
nssmdns4 = true;
publish = {
enable = true;
userServices = true;
};
};
sshd.enable = true;
openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
};
}

26
systems/server/sops.nix Executable file
View file

@ -0,0 +1,26 @@
{flake, ...}: let
inherit (flake.config.people) user0;
in {
sops = {
defaultSopsFile = ../../secrets/secrets.yaml;
validateSopsFiles = false;
age = {
keyFile = "/var/lib/sops-nix/key.txt";
generateKey = false;
};
secrets = {
"ssh/private" = {
path = "/home/${user0}/.ssh/id_ed25519";
owner = user0;
};
"ssh/public" = {
path = "/home/${user0}/.ssh/id_ed25519.pub";
owner = user0;
};
"discord-token" = {
path = "/home/${user0}/projects/zookeeper/.env";
owner = user0;
};
};
};
}

8
systems/server/ssh.nix Executable file
View file

@ -0,0 +1,8 @@
{flake, ...}: let
inherit (flake.config.people) user0;
inherit (flake.config.people.user.${user0}) sshKeys;
in {
users.users.${user0} = {
openssh.authorizedKeys.keys = sshKeys;
};
}