# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’). { config, pkgs, lib, ... }: { imports = [ # Include the results of the hardware scan. ./odin/hw.nix ./users.nix ./custom/uucp.nix ./custom/uucp-mediaserver.nix ./custom/borgbackup.nix ./custom/motion.nix ./custom/unit-status-mail.nix ./custom/zsh.nix ./utils/nix/module.nix ]; # Use the GRUB 2 boot loader. boot.loader.grub.enable = true; boot.loader.grub.version = 2; # Define on which hard drive you want to install Grub. boot.loader.grub.device = "/dev/disk/by-id/ata-MKNSSDCR60GB_MK130619AS1031770"; boot.extraTTYs = [ "tty7" ]; boot.initrd.network = { enable = true; ssh = { enable = true; authorizedKeys = [ (builtins.readFile ./users/keys/gkleen-hel-rsa.pub) ]; }; }; networking.hostName = "odin"; # Define your hostname. # Select internationalisation properties. i18n = { consoleKeyMap = "dvp"; defaultLocale = "en_US.UTF-8"; }; # Set your time zone. time.timeZone = "Europe/Berlin"; environment.systemPackages = with pkgs; [ pythonPackages.magic-wormhole tmux mosh quota git samba ntfs3g rebuild-system monitor-uucp ]; services.openssh = { enable = true; passwordAuthentication = false; challengeResponseAuthentication = false; extraConfig = '' AllowGroups ssh ''; }; users.groups."ssh" = { members = ["uucp" "root"]; }; networking.firewall = { enable = true; allowPing = true; allowedTCPPorts = [ 22 # ssh 139 445 # samba 2010 2011 # notmuch-tcp 5001 # iperf ]; allowedTCPPortRanges = [ { from = 8080; to = 8080; } # motion ]; allowedUDPPorts = [ 137 138 # samba ]; allowedUDPPortRanges = [ { from = 60000; to = 61000; } # mosh ]; }; users.extraUsers.root = let template = import ./users/gkleen.nix; in { inherit (template) shell; openssh.authorizedKeys.keyFiles = template.openssh.authorizedKeys.keyFiles; }; services.journald = { rateLimitBurst = 0; console = "/dev/tty7"; }; services.haveged.enable = true; services.uucp = { enable = true; nodeName = "odin"; remoteNodes = { "ymir" = { publicKeys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGANj+LJ4CI6VrAgBRocKCGq74kZnwD1PdKr/gdlfVr1 uucp@ymir"]; hostnames = ["ymir.yggdrasil.li" "ymir.niflheim.yggdrasil"]; commands = ["rmail"]; }; "hel" = { publicKeys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKD8ycFGfVkBL9wjA5Kc33cl6Qt5K2505G/38oH8Cy/e uucp@hel"]; hostnames = ["hel.asgard.yggdrasil" "hel.faraday.asgard.yggdrasil" "hel.midgard.yggdrasil"]; commands = ["rmail" "recv"]; }; }; media-server = { enable = true; remoteNodes = [ "hel" ]; }; commandPath = [ "${pkgs.rmail}/bin" config.security.wrapperDir ]; }; programs.recv.enable = true; users.groups."media" = { members = [ "uucp" ]; }; services.postfix = { enable = true; enableSmtp = false; enableSubmission = false; setSendmail = true; networksStyle = "host"; hostname = "odin.asgard.yggdrasil"; recipientDelimiter = "+"; postmasterAlias = "gkleen"; rootAlias = "gkleen"; extraAliases = '' uucp: gkleen ''; virtual = '' @hel gkleen ''; destination = [ ''regexp:${pkgs.writeText "destination" '' /\.?localdomain$/ ACCEPT /^localhost$/ ACCEPT /\.?odin(\.asgard\.yggdrasil)?$/ ACCEPT ''} '' ]; config = { default_transport = "uucp:ymir"; message_size_limit = "0"; mailbox_size_limit = "0"; mail_spool_directory = "/srv/mail"; luser_relay = ''postmaster''${recipient_delimiter}''${local:unknown}''; }; masterConfig = { uucp = { type = "unix"; private = true; privileged = true; chroot = false; command = "pipe"; args = [ "flags=Fqhu" "user=uucp" ''argv=${config.security.wrapperDir}/uux -z -a $sender - $nexthop!rmail ($recipient)'' ]; }; }; networks = ["127.0.0.0/8" "[::ffff:127.0.0.0]/104" "[::1]/128" "10.141.0.0/16"]; }; services.borgbackup = { snapshots = "lvm"; prefix = "yggdrasil.asgard.odin."; targets = { "munin" = { repo = "borg.munin:borg"; paths = [ { VG = "raid6"; LV = "mail"; } { VG = "raid6"; LV = "home"; } { VG = "raid6"; LV = "media"; } { VG = "raid6"; LV = "root"; } { VG = "ssd-raid1"; LV = "root"; } ]; prune = lib.genAttrs ["raid6/mail" "raid6/home" "raid6/media" "raid6/root" "ssd-raid1/root"] (name: [ "--keep-within" "24H" "--keep-daily" "31" "--keep-monthly" "12" "--keep-yearly" "-1" ]); }; }; }; services.samba = { enable = true; shares = { homes = { comment = "Home Directories"; browseable = true; "valid users" = "%S"; writable = true; }; eos = { comment = "Disk image of eos"; browseable = true; "valid users" = "mherold"; writable = true; path = "/srv/eos"; }; media = { browseable = true; writable = false; path = "/srv/media"; "guest ok" = true; "guest only" = true; }; }; extraConfig = '' domain master = yes workgroup = ASGARD load printers = no printing = bsd printcap name = /dev/null disable spoolss = yes guest account = nobody ''; }; fileSystems."/srv/eos.lower" = { device = "/dev/disk/by-uuid/2A3052E73052BA11"; fsType = "ntfs-3g"; options = ["ro" "uid=1001" "gid=100" "fmask=0177" "dmask=0077" "permissions"]; }; systemd.mounts = [ { wantedBy = [ "samba-smbd.service" ]; before = [ "samba-smbd.service" ]; where = "/srv/eos"; what = "overlay"; type = "overlay"; options = lib.concatStringsSep "," [ "lowerdir=/srv/eos.lower" "upperdir=/home/mherold/.eos.upper" "workdir=/home/mherold/.eos.work" ]; unitConfig = { RequiresMountsFor = [ "/srv/eos.lower" "/home/mherold/.eos.upper" "/home/mherold/.eos.work" ]; }; } ]; services.motion = { cameras = [ { extraConfig = '' camera_name cat-food netcam_url mjpeg://ipcam01.hlidskjalf.yggdrasil:80/mjpeg.cgi netcam_keepalive on width 640 height 480 stream_port 8080 despeckle_filter EedDl threshold_tune on noise_tune on lightswitch 50 minimum_motion_frames 5 ''; configFiles = [ "/etc/motion/cat-food.secret" ]; } ]; extraConfig = '' text_left "%$\n%F %T %Z" text_right "" text_changes off event_gap 20 output_pictures off ffmpeg_output_movies on ffmpeg_video_codec mkv ffmpeg_bps 500000 max_movie_time 600 target_dir /srv/hlidskjalf movie_filename %Y-%m-%d/%H-%M-%S.%$ stream_localhost off stream_auth_method 1 stream_quality 80 stream_maxrate 100 stream_motion on webcontrol_port 0 ipv6_enabled on ''; configFiles = [ "/etc/motion/motion.secret" ]; }; users.groups."hlidskjalf" = { members = [ "motion" "uucp" ]; }; virtualisation.libvirtd = { enable = true; }; services.rollingDirectories = [ { path = "/srv/hlidskjalf"; maxSize = "20Gi"; } ]; security.polkit = { enable = true; extraConfig = '' polkit.addRule(function(action, subject) { if ( action.id == "org.freedesktop.systemd1.manage-units" && subject.isInGroup("wheel") ) { return polkit.Result.YES; } }); ''; }; programs.ssh = { startAgent = true; agentTimeout = "1h"; }; nix = { daemonIONiceLevel = 3; daemonNiceLevel = 10; gc = { automatic = true; options = "--delete-older-than 21d"; }; autoOptimiseStore = true; }; services.smartd = { enable = true; autodetect = false; devices = map (id: { device = "/dev/disk/by-id/" + id; }) [ "ata-MKNSSDCR60GB_MK130620AS1032639" "ata-MKNSSDCR60GB_MK130619AS1031770" "ata-WDC_WD20EFRX-68AX9N0_WD-WMC301206808" "ata-WDC_WD20EFRX-68AX9N0_WD-WMC300900004" "ata-WDC_WD20EZRX-00D8PB0_WD-WMC4M0FA7MUY" "ata-WDC_WD20EARX-00PASB0_WD-WCAZA8424566" "ata-ST2000VN000-1HJ164_W7201QX1" "nvme-KINGSTON_SKC1000240G_50026B728204C4FC" ]; notifications = { mail.enable = true; wall.enable = true; }; defaults.monitored = "-a -n standby,10 -o on -s (S/../.././02|L/../../7/04)"; extraOptions = [ "--interval=600" "-A" "/var/log/smart/" "-s" "/var/lib/smart/" ]; }; systemd.services."iperf-tcp" = { wantedBy = [ "multi-user.target" ]; serviceConfig = { ExecStart = "${pkgs.iperf2}/bin/iperf -sV"; }; }; systemd.services."iperf-udp" = { wantedBy = [ "multi-user.target" ]; serviceConfig = { ExecStart = "${pkgs.iperf2}/bin/iperf -suV"; }; }; systemd.status-mail = { recipient = "root@odin.asgard.yggdrasil"; onFailure = [ "nixos-upgrade" "borgbackup-munin@" "borgbackup-prune-munin" "smartd" ]; }; system.autoUpgrade.enable = true; system.nixos.stateVersion = "18.09"; systemd.services."nixos-upgrade" = { path = with pkgs; [ git ]; preStart = '' git -C /etc/nixos pull --recurse-submodules ''; }; }