mirror of
https://codeberg.org/tmayoff/.dotfiles.git
synced 2025-12-06 16:58:34 -05:00
Reviewed-on: https://codeberg.org/tmayoff/.dotfiles/pulls/39 Co-authored-by: Tyler Mayoff <tyler@tylermayoff.com> Co-committed-by: Tyler Mayoff <tyler@tylermayoff.com>
225 lines
6.7 KiB
Nix
225 lines
6.7 KiB
Nix
# Edit this configuration file to define what should be installed on
|
||
# your system. Help is available in the configuration.nix(5) man page, on
|
||
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
|
||
{
|
||
inputs,
|
||
outputs,
|
||
# config,
|
||
lib,
|
||
pkgs,
|
||
...
|
||
}: let
|
||
secrets = builtins.readFile ./secrets.sh;
|
||
in {
|
||
imports = [
|
||
# Include the results of the hardware scan.
|
||
./hardware-configuration.nix
|
||
];
|
||
|
||
nixpkgs = {
|
||
overlays = builtins.attrValues outputs.overlays;
|
||
|
||
config = {
|
||
allowUnfree = true;
|
||
};
|
||
};
|
||
|
||
nix = let
|
||
flakeInputs = lib.filterAttrs (_: lib.isType "flake") inputs;
|
||
in {
|
||
settings = {
|
||
experimental-features = ["nix-command" "flakes"];
|
||
};
|
||
|
||
channel.enable = false;
|
||
|
||
registry = lib.mapAttrs (_: flake: {inherit flake;}) flakeInputs;
|
||
nixPath = lib.mapAttrsToList (n: _: "${n}=flake:${n}") flakeInputs;
|
||
};
|
||
|
||
# Use the systemd-boot EFI boot loader.
|
||
boot.loader.systemd-boot.enable = true;
|
||
boot.loader.efi.canTouchEfiVariables = true;
|
||
|
||
services.pcscd.enable = true;
|
||
programs.gnupg.agent = {
|
||
enable = true;
|
||
pinentryPackage = pkgs.pinentry-curses;
|
||
enableSSHSupport = true;
|
||
};
|
||
|
||
networking.hostName = "mal"; # Define your hostname.
|
||
# Pick only one of the below networking options.
|
||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
||
|
||
# Set your time zone.
|
||
# time.timeZone = "Europe/Amsterdam";
|
||
|
||
# Configure network proxy if necessary
|
||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||
|
||
# Select internationalisation properties.
|
||
# i18n.defaultLocale = "en_US.UTF-8";
|
||
# console = {
|
||
# font = "Lat2-Terminus16";
|
||
# keyMap = "us";
|
||
# useXkbConfig = true; # use xkb.options in tty.
|
||
# };
|
||
|
||
# Enable the X11 windowing system.
|
||
# services.xserver.enable = true;
|
||
|
||
# Configure keymap in X11
|
||
services.xserver.xkb.layout = "us";
|
||
# services.xserver.xkb.options = "eurosign:e,caps:escape";
|
||
|
||
# Enable CUPS to print documents.
|
||
# services.printing.enable = true;
|
||
|
||
# Enable sound.
|
||
# hardware.pulseaudio.enable = true;
|
||
# OR
|
||
# services.pipewire = {
|
||
# enable = true;
|
||
# pulse.enable = true;
|
||
# };
|
||
|
||
# Enable touchpad support (enabled default in most desktopManager).
|
||
# services.libinput.enable = true;
|
||
|
||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||
users.users.tyler = {
|
||
isNormalUser = true;
|
||
extraGroups = ["wheel"]; # Enable ‘sudo’ for the user.
|
||
shell = pkgs.fish;
|
||
};
|
||
|
||
# List packages installed in system profile. To search, run:
|
||
# $ nix search wget
|
||
environment.systemPackages = with pkgs; [
|
||
helix # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
|
||
wget
|
||
yadm
|
||
restic
|
||
git
|
||
chezmoi
|
||
|
||
screen
|
||
|
||
pinentry-curses
|
||
];
|
||
|
||
# Some programs need SUID wrappers, can be configured further or are
|
||
# started in user sessions.
|
||
# programs.mtr.enable = true;
|
||
# programs.gnupg.agent = {
|
||
# enable = true;
|
||
# enableSSHSupport = true;
|
||
# };
|
||
|
||
systemd.timers."backup-serenity" = {
|
||
wantedBy = ["timers.target"];
|
||
timerConfig = {
|
||
OnCalendar = "monthly";
|
||
Persistent = true;
|
||
Unit = "backup-serenity.service";
|
||
};
|
||
};
|
||
|
||
systemd.services."backup-serenity" = {
|
||
script = ''
|
||
# Remove keys
|
||
|
||
${secrets}
|
||
|
||
printf "\nBacking up nextcloud \n"
|
||
# ${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/NextCloud" backup -vvv --no-scan /mnt/user/NextCloud
|
||
# ${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/NextCloud" check -vvv
|
||
|
||
printf "\nBacking up Backups \n"
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/Backups" backup -vvv --no-scan /mnt/user/Backups
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/Backups" check -vvv
|
||
|
||
printf "\nBacking up appdata \n"
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/appdata" backup -vvv --no-scan /mnt/user/appdata
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/appdata" check -vvv
|
||
'';
|
||
serviceConfig = {
|
||
Type = "simple";
|
||
User = "root";
|
||
};
|
||
};
|
||
|
||
systemd.services."restore-nextcloud" = {
|
||
script = ''
|
||
# Remove keys
|
||
|
||
${secrets}
|
||
|
||
printf "\nRestore nextcloud \n"
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/NextCloud" restore latest -vvv --target /
|
||
# ${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/NextCloud" check -vvv
|
||
'';
|
||
serviceConfig = {
|
||
Type = "simple";
|
||
User = "root";
|
||
};
|
||
};
|
||
|
||
systemd.services."restore-backups" = {
|
||
script = ''
|
||
# Remove keys
|
||
|
||
${secrets}
|
||
|
||
printf "\nRestore restore \n"
|
||
${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/Backups" restore latest -vvv --target /
|
||
# ${pkgs.restic}/bin/restic -r "$RESTIC_REPOSITORY/NextCloud" check -vvv
|
||
'';
|
||
serviceConfig = {
|
||
Type = "simple";
|
||
User = "root";
|
||
};
|
||
};
|
||
|
||
programs.fish.enable = true;
|
||
|
||
# List services that you want to enable:
|
||
|
||
# Enable the OpenSSH daemon.
|
||
services.openssh.enable = true;
|
||
|
||
services.qemuGuest.enable = true;
|
||
|
||
# Open ports in the firewall.
|
||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||
# Or disable the firewall altogether.
|
||
# networking.firewall.enable = false;
|
||
|
||
# Copy the NixOS configuration file and link it from the resulting system
|
||
# (/run/current-system/configuration.nix). This is useful in case you
|
||
# accidentally delete configuration.nix.
|
||
# system.copySystemConfiguration = true;
|
||
|
||
# This option defines the first version of NixOS you have installed on this particular machine,
|
||
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
|
||
#
|
||
# Most users should NEVER change this value after the initial install, for any reason,
|
||
# even if you've upgraded your system to a new NixOS release.
|
||
#
|
||
# This value does NOT affect the Nixpkgs version your packages and OS are pulled from,
|
||
# so changing it will NOT upgrade your system - see https://nixos.org/manual/nixos/stable/#sec-upgrading for how
|
||
# to actually do that.
|
||
#
|
||
# This value being lower than the current NixOS release does NOT mean your system is
|
||
# out of date, out of support, or vulnerable.
|
||
#
|
||
# Do NOT change this value unless you have manually inspected all the changes it would make to your configuration,
|
||
# and migrated your data accordingly.
|
||
#
|
||
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
|
||
system.stateVersion = "24.05"; # Did you read the comment?
|
||
}
|