2020-03-07 16:17:04 +01:00
|
|
|
{ ... }:
|
|
|
|
|
2020-02-23 19:55:28 +01:00
|
|
|
let
|
Manually require dependencies for <nixpkgs>, <briefcase>
When I build socrates using `sudo nixos-rebuild [...] switch`, my
`nixos-config` (i.e. <briefcase/nixos/socrates/default.nix>) is a simple Nix
anonymous function. Typically readTree populates my pkgs, briefcase, depot
function parameters with <nixpkgs>, <briefcase>, <depot>, but `nixos-rebuild` is
unaware of `readTree`.
For now I'm manually importing these dependencies, and I'm leaving a TODO to
reconsider switching to the `{ pkgs, briefcase, ... }` style when I better
understand NixOS.
2020-03-01 23:32:43 +01:00
|
|
|
# TODO(wpcarro): Instead of importing these dependencies as parameters that
|
|
|
|
# readTree will expose I need to import these dependencies manually because
|
|
|
|
# I'm building this using `nixos-rebuild`. When I better understand how to
|
|
|
|
# build socrates using readTree, prefer defining this as an anonymous
|
|
|
|
# function.
|
|
|
|
pkgs = import <nixpkgs> {};
|
|
|
|
briefcase = import <briefcase> {};
|
|
|
|
|
2020-02-23 19:55:28 +01:00
|
|
|
trimNewline = x: pkgs.lib.removeSuffix "\n" x;
|
|
|
|
readSecret = x: trimNewline (builtins.readFile ("/etc/secrets/" + x));
|
2020-03-07 16:07:32 +01:00
|
|
|
in {
|
2020-02-22 19:44:44 +01:00
|
|
|
imports = [ ./hardware.nix ];
|
2020-02-20 20:49:15 +01:00
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
# Use the systemd-boot EFI boot loader.
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
2020-02-20 20:49:15 +01:00
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
networking = {
|
|
|
|
hostName = "socrates";
|
|
|
|
# The global useDHCP flag is deprecated, therefore explicitly set to false
|
|
|
|
# here. Per-interface useDHCP will be mandatory in the future, so this
|
|
|
|
# generated config replicates the default behaviour.
|
|
|
|
useDHCP = false;
|
|
|
|
networkmanager.enable = true;
|
|
|
|
interfaces.enp2s0f1.useDHCP = true;
|
|
|
|
interfaces.wlp3s0.useDHCP = true;
|
|
|
|
firewall.allowedTCPPorts = [ 9418 80 443 ];
|
|
|
|
};
|
2020-02-20 20:49:15 +01:00
|
|
|
|
|
|
|
time.timeZone = "UTC";
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
programs.fish.enable = true;
|
|
|
|
programs.mosh.enable = true;
|
|
|
|
|
2020-02-20 20:49:15 +01:00
|
|
|
environment.systemPackages = with pkgs; [
|
2020-02-22 19:44:44 +01:00
|
|
|
curl
|
|
|
|
direnv
|
|
|
|
emacs26-nox
|
|
|
|
gnupg
|
|
|
|
htop
|
|
|
|
pass
|
|
|
|
vim
|
|
|
|
certbot
|
|
|
|
tree
|
|
|
|
git
|
2020-02-20 20:49:15 +01:00
|
|
|
];
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
users = {
|
|
|
|
# I need a git group to run the git server.
|
|
|
|
groups.git = {};
|
|
|
|
|
|
|
|
users.wpcarro = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" "wheel" ];
|
|
|
|
shell = pkgs.fish;
|
|
|
|
};
|
|
|
|
|
|
|
|
users.git = {
|
|
|
|
group = "git";
|
|
|
|
isNormalUser = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
nix = {
|
|
|
|
# Expose depot as <depot>, nixpkgs as <nixpkgs>
|
|
|
|
nixPath = [
|
|
|
|
"briefcase=/home/wpcarro/briefcase"
|
|
|
|
"depot=/home/wpcarro/depot"
|
|
|
|
"nixpkgs=/home/wpcarro/nixpkgs"
|
|
|
|
];
|
|
|
|
|
|
|
|
trustedUsers = [ "root" "wpcarro" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
##############################################################################
|
|
|
|
# Services
|
|
|
|
##############################################################################
|
2020-03-11 00:06:03 +01:00
|
|
|
|
2020-02-20 20:49:15 +01:00
|
|
|
services.openssh.enable = true;
|
|
|
|
|
2020-03-11 00:06:03 +01:00
|
|
|
systemd.services.gogs = {
|
|
|
|
enable = true;
|
|
|
|
description = "Easy-to-use Git server written in golang";
|
|
|
|
script = "${pkgs.gogs}/bin/gogs web";
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "simple";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-02-23 21:01:33 +01:00
|
|
|
systemd.services.monzo-token-server = {
|
2020-02-22 19:44:44 +01:00
|
|
|
enable = true;
|
|
|
|
description = "Ensure my Monzo access token is valid";
|
2020-02-23 21:01:33 +01:00
|
|
|
script = "${briefcase.monzo_ynab.tokens}/bin/token-server";
|
2020-02-22 19:44:44 +01:00
|
|
|
|
2020-02-23 21:01:33 +01:00
|
|
|
# TODO(wpcarro): I'm unsure of the size of this security risk, but if a
|
|
|
|
# non-root user runs `systemctl cat monzo-token-server`, they could read the
|
|
|
|
# following, sensitive environment variables.
|
2020-02-23 19:55:28 +01:00
|
|
|
environment = {
|
2020-02-23 21:00:04 +01:00
|
|
|
store_path = "/var/cache/monzo_ynab";
|
2020-02-23 19:55:28 +01:00
|
|
|
monzo_client_id = readSecret "monzo-client-id";
|
|
|
|
monzo_client_secret = readSecret "monzo-client-secret";
|
|
|
|
ynab_personal_access_token = readSecret "ynab-personal-access-token";
|
|
|
|
ynab_account_id = readSecret "ynab-account-id";
|
|
|
|
ynab_budget_id = readSecret "ynab-budget-id";
|
|
|
|
};
|
|
|
|
|
2020-02-22 19:44:44 +01:00
|
|
|
serviceConfig = {
|
2020-02-23 20:32:52 +01:00
|
|
|
Type = "simple";
|
2020-02-22 19:44:44 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.gitDaemon = {
|
|
|
|
enable = true;
|
|
|
|
basePath = "/srv/git";
|
|
|
|
exportAll = true;
|
|
|
|
repositories = [ "/srv/git/briefcase" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Since I'm using this laptop as a server in my flat, I'd prefer to close its
|
|
|
|
# lid.
|
|
|
|
services.logind.lidSwitch = "ignore";
|
|
|
|
|
|
|
|
# Provision SSL certificates to support HTTPS connections.
|
|
|
|
security.acme.acceptTerms = true;
|
2020-03-07 16:08:11 +01:00
|
|
|
security.acme.email = "wpcarro@gmail.com";
|
2020-02-22 19:44:44 +01:00
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
enableReload = true;
|
|
|
|
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
recommendedGzipSettings = true;
|
|
|
|
recommendedProxySettings = true;
|
|
|
|
|
|
|
|
commonHttpConfig = ''
|
|
|
|
log_format json_combined escape=json
|
|
|
|
'{'
|
|
|
|
'"time_local":"$time_local",'
|
|
|
|
'"remote_addr":"$remote_addr",'
|
|
|
|
'"remote_user":"$remote_user",'
|
|
|
|
'"request":"$request",'
|
|
|
|
'"status": "$status",'
|
|
|
|
'"body_bytes_sent":"$body_bytes_sent",'
|
|
|
|
'"request_time":"$request_time",'
|
|
|
|
'"http_referrer":"$http_referer",'
|
|
|
|
'"http_user_agent":"$http_user_agent"'
|
|
|
|
'}';
|
|
|
|
access_log syslog:server=unix:/dev/log json_combined;
|
|
|
|
'';
|
|
|
|
|
2020-03-07 16:08:11 +01:00
|
|
|
virtualHosts = {
|
2020-03-20 01:22:13 +01:00
|
|
|
"wpcarro.dev" = {
|
|
|
|
addSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
root = briefcase.website;
|
|
|
|
};
|
2020-03-07 16:08:11 +01:00
|
|
|
"learn.wpcarro.dev" = {
|
|
|
|
addSSL = true;
|
|
|
|
enableACME = true;
|
2020-03-20 01:47:21 +01:00
|
|
|
root = briefcase.website.learn;
|
2020-03-07 16:08:11 +01:00
|
|
|
};
|
|
|
|
"blog.wpcarro.dev" = {
|
|
|
|
addSSL = true;
|
|
|
|
enableACME = true;
|
2020-03-20 01:46:29 +01:00
|
|
|
root = briefcase.website.blog;
|
2020-03-07 16:08:11 +01:00
|
|
|
};
|
2020-03-19 12:53:57 +01:00
|
|
|
"sandbox.wpcarro.dev" = {
|
2020-03-18 22:29:11 +01:00
|
|
|
addSSL = true;
|
|
|
|
enableACME = true;
|
2020-03-20 01:47:53 +01:00
|
|
|
root = briefcase.website.sandbox;
|
2020-03-18 22:29:11 +01:00
|
|
|
};
|
2020-02-22 19:44:44 +01:00
|
|
|
};
|
2020-02-20 20:49:15 +01:00
|
|
|
};
|
|
|
|
|
2020-03-19 12:53:57 +01:00
|
|
|
system.stateVersion = "20.09";
|
2020-03-07 16:07:32 +01:00
|
|
|
}
|