2020-02-23 21:01:33 +01:00
|
|
|
{
|
|
|
|
pkgs ? import <nixpkgs> {},
|
|
|
|
briefcase ? import <briefcase> {},
|
|
|
|
...
|
|
|
|
}:
|
2020-02-20 20:49:15 +01:00
|
|
|
|
2020-02-23 19:55:28 +01:00
|
|
|
let
|
|
|
|
trimNewline = x: pkgs.lib.removeSuffix "\n" x;
|
|
|
|
readSecret = x: trimNewline (builtins.readFile ("/etc/secrets/" + x));
|
|
|
|
in {
|
2020-02-22 19:44:44 +01:00
|
|
|
imports = [ ./hardware.nix ];
|
2020-02-20 20:49:15 +01:00
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
# Use the systemd-boot EFI boot loader.
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
2020-02-20 20:49:15 +01:00
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
networking = {
|
|
|
|
hostName = "socrates";
|
|
|
|
# The global useDHCP flag is deprecated, therefore explicitly set to false
|
|
|
|
# here. Per-interface useDHCP will be mandatory in the future, so this
|
|
|
|
# generated config replicates the default behaviour.
|
|
|
|
useDHCP = false;
|
|
|
|
networkmanager.enable = true;
|
|
|
|
interfaces.enp2s0f1.useDHCP = true;
|
|
|
|
interfaces.wlp3s0.useDHCP = true;
|
|
|
|
firewall.allowedTCPPorts = [ 9418 80 443 ];
|
|
|
|
};
|
2020-02-20 20:49:15 +01:00
|
|
|
|
|
|
|
time.timeZone = "UTC";
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
programs.fish.enable = true;
|
|
|
|
programs.mosh.enable = true;
|
|
|
|
|
2020-02-20 20:49:15 +01:00
|
|
|
environment.systemPackages = with pkgs; [
|
2020-02-22 19:44:44 +01:00
|
|
|
curl
|
|
|
|
direnv
|
|
|
|
emacs26-nox
|
|
|
|
gnupg
|
|
|
|
htop
|
|
|
|
pass
|
|
|
|
vim
|
|
|
|
certbot
|
|
|
|
tree
|
|
|
|
git
|
2020-02-20 20:49:15 +01:00
|
|
|
];
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
users = {
|
|
|
|
# I need a git group to run the git server.
|
|
|
|
groups.git = {};
|
|
|
|
|
|
|
|
users.wpcarro = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" "wheel" ];
|
|
|
|
shell = pkgs.fish;
|
|
|
|
};
|
|
|
|
|
|
|
|
users.git = {
|
|
|
|
group = "git";
|
|
|
|
isNormalUser = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
nix = {
|
|
|
|
# Expose depot as <depot>, nixpkgs as <nixpkgs>
|
|
|
|
nixPath = [
|
|
|
|
"briefcase=/home/wpcarro/briefcase"
|
|
|
|
"depot=/home/wpcarro/depot"
|
|
|
|
"nixpkgs=/home/wpcarro/nixpkgs"
|
|
|
|
];
|
|
|
|
|
|
|
|
# Allow wpcarro to call nixos-rebuild
|
|
|
|
trustedUsers = [ "root" "wpcarro" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
##############################################################################
|
|
|
|
# Services
|
|
|
|
##############################################################################
|
2020-02-20 20:49:15 +01:00
|
|
|
services.openssh.enable = true;
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
services.lorri.enable = true;
|
|
|
|
|
2020-02-23 21:01:33 +01:00
|
|
|
systemd.services.monzo-token-server = {
|
2020-02-22 19:44:44 +01:00
|
|
|
enable = true;
|
|
|
|
description = "Ensure my Monzo access token is valid";
|
2020-02-23 21:01:33 +01:00
|
|
|
script = "${briefcase.monzo_ynab.tokens}/bin/token-server";
|
2020-02-22 19:44:44 +01:00
|
|
|
|
2020-02-23 21:01:33 +01:00
|
|
|
# TODO(wpcarro): I'm unsure of the size of this security risk, but if a
|
|
|
|
# non-root user runs `systemctl cat monzo-token-server`, they could read the
|
|
|
|
# following, sensitive environment variables.
|
2020-02-23 19:55:28 +01:00
|
|
|
environment = {
|
2020-02-23 21:00:04 +01:00
|
|
|
store_path = "/var/cache/monzo_ynab";
|
2020-02-23 19:55:28 +01:00
|
|
|
monzo_client_id = readSecret "monzo-client-id";
|
|
|
|
monzo_client_secret = readSecret "monzo-client-secret";
|
|
|
|
ynab_personal_access_token = readSecret "ynab-personal-access-token";
|
|
|
|
ynab_account_id = readSecret "ynab-account-id";
|
|
|
|
ynab_budget_id = readSecret "ynab-budget-id";
|
|
|
|
};
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
serviceConfig = {
|
2020-02-23 20:32:52 +01:00
|
|
|
Type = "simple";
|
2020-02-22 19:44:44 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.gitDaemon = {
|
|
|
|
enable = true;
|
|
|
|
basePath = "/srv/git";
|
|
|
|
exportAll = true;
|
|
|
|
repositories = [ "/srv/git/briefcase" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Since I'm using this laptop as a server in my flat, I'd prefer to close its
|
|
|
|
# lid.
|
|
|
|
services.logind.lidSwitch = "ignore";
|
|
|
|
|
|
|
|
# Provision SSL certificates to support HTTPS connections.
|
|
|
|
security.acme.acceptTerms = true;
|
|
|
|
security.acme.certs."wpcarro.dev".email = "wpcarro@gmail.com";
|
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
enableReload = true;
|
|
|
|
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
recommendedGzipSettings = true;
|
|
|
|
recommendedProxySettings = true;
|
|
|
|
|
|
|
|
commonHttpConfig = ''
|
|
|
|
log_format json_combined escape=json
|
|
|
|
'{'
|
|
|
|
'"time_local":"$time_local",'
|
|
|
|
'"remote_addr":"$remote_addr",'
|
|
|
|
'"remote_user":"$remote_user",'
|
|
|
|
'"request":"$request",'
|
|
|
|
'"status": "$status",'
|
|
|
|
'"body_bytes_sent":"$body_bytes_sent",'
|
|
|
|
'"request_time":"$request_time",'
|
|
|
|
'"http_referrer":"$http_referer",'
|
|
|
|
'"http_user_agent":"$http_user_agent"'
|
|
|
|
'}';
|
|
|
|
access_log syslog:server=unix:/dev/log json_combined;
|
|
|
|
'';
|
|
|
|
|
|
|
|
virtualHosts.blog = {
|
|
|
|
serverName = "blog.wpcarro.dev";
|
|
|
|
useACMEHost = "wpcarro.dev";
|
|
|
|
addSSL = true;
|
|
|
|
extraConfig = ''
|
|
|
|
location / {
|
|
|
|
proxy_pass http://localhost:80
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
2020-02-20 20:49:15 +01:00
|
|
|
};
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
system.stateVersion = "20.09"; # Did you read the comment?
|
2020-02-20 20:49:15 +01:00
|
|
|
}
|