blob: 2d2e03dee10d6fc3c4b563e5eaa2771ce2392c30 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
|
{ config, pkgs, ... }:
let
luaPam = pkgs.callPackage ./custom/luaPam.nix {};
in {
imports =
[
./ymir-hw.nix
./custom/zsh.nix
./users.nix
];
boot.loader.grub = {
enable = true;
version = 2;
device = "/dev/vda";
};
nixpkgs.config.packageOverrides = pkgs:
rec {
prosody = pkgs.callPackage ./customized/prosody.nix ({
inherit (pkgs.lua51Packages) luasocket luasec luaexpat luafilesystem luabitop luaevent luazlib;
extraModules = ["mod_auth_pam"];
extraLibs = [luaPam];
});
};
environment.systemPackages = with pkgs; [
git
mosh
rsync
tmux
zsh
];
networking = {
hostName = "ymir";
hostId = "1c5c994e";
firewall = {
enable = true;
allowPing = true;
allowedTCPPorts = [ 22
5222
5269
];
allowedUDPPortRanges = [ { from = 60000; to = 61000; } # mosh
];
};
enableIPv6 = true;
defaultGateway6 = "fe80::1";
interfaces."enp0s3" = {
ipv6Address = "2a03:4000:6:d004::";
ipv6PrefixLength = 64;
};
};
users.extraUsers.root = let
template = (import users/gkleen.nix);
in {
inherit (template) shell;
openssh.authorizedKeys.keyFiles = template.openssh.authorizedKeys.keyFiles;
};
services.ntp = {
enable = false;
};
# List services that you want to enable:
services.openssh = {
enable = true;
passwordAuthentication = false;
};
services.fcron = {
enable = true;
systab = ''
%weekly * * nix-collect-garbage --delete-older-than '7d'
'';
};
services.chrony = {
enable = true;
};
services.prosody = {
enable = true;
admins = [
"gkleen@xmpp.li"
];
allowRegistration = false;
extraModules = [ "private"
];
extraConfig = ''
authentication="pam"
'';
virtualHosts.default = {
enabled = true;
domain = "xmpp.li";
ssl = {
key = "certs/xmpp.li.key";
cert = "certs/xmpp.li.crt";
};
};
};
}
|