nixos/share/common.nix

574 lines
14 KiB
Nix
Raw Normal View History

2023-01-15 18:56:16 +01:00
{ config, pkgs, ... }:
let
impermanence = builtins.fetchTarball "https://github.com/nix-community/impermanence/archive/master.tar.gz";
2024-10-03 00:50:52 +02:00
cullmann-fonts = pkgs.callPackage "/data/nixos/packages/cullmann-fonts.nix" {};
2023-01-15 18:56:16 +01:00
in
{
#
# stuff shared between home machines
#
2024-07-02 19:54:05 +02:00
# get impermanence working & include more shared parts
2023-01-15 18:56:16 +01:00
imports = [
# manage persistent files
"${impermanence}/nixos.nix"
2024-06-27 20:37:20 +02:00
# our users
2024-10-03 00:50:52 +02:00
"/data/nixos/share/users.nix"
2023-01-15 18:56:16 +01:00
];
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
2023-06-09 18:26:35 +02:00
# on your system were taken. It's perfectly fine and recommended to leave
2023-01-15 18:56:16 +01:00
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
2023-06-09 18:26:35 +02:00
system.stateVersion = "23.05"; # Did you read the comment?
2024-10-10 21:59:50 +02:00
# atm all stuff is x86_64
nixpkgs.hostPlatform = "x86_64-linux";
2024-10-03 11:17:39 +02:00
# enable ZFS
2024-10-03 00:50:52 +02:00
boot.supportedFilesystems = [ "zfs" ];
2023-01-15 18:56:16 +01:00
# my kernel parameters
boot.kernelParams = [
2024-10-03 11:17:39 +02:00
# no hibernate for ZFS systems
"nohibernate"
2024-10-03 14:49:01 +02:00
# make ARC fast
"init_on_alloc=0"
"init_on_free=0"
# don't check for split locks, for KVM and Co.
"split_lock_detect=off"
];
2024-10-03 11:17:39 +02:00
# tweak ZFS
boot.extraModprobeConfig = ''
options zfs zfs_arc_meta_limit_percent=75
options zfs zfs_arc_min=134217728
options zfs zfs_arc_max=4294967296
2024-10-03 14:49:01 +02:00
options zfs zfs_compressed_arc_enabled=0
options zfs zfs_abd_scatter_enabled=0
2024-10-03 11:17:39 +02:00
options zfs zfs_txg_timeout=30
options zfs zfs_vdev_scrub_min_active=1
options zfs zfs_vdev_scrub_max_active=1
options zfs zfs_vdev_sync_write_min_active=8
options zfs zfs_vdev_sync_write_max_active=32
options zfs zfs_vdev_sync_read_min_active=8
options zfs zfs_vdev_sync_read_max_active=32
options zfs zfs_vdev_async_read_min_active=8
options zfs zfs_vdev_async_read_max_active=32
options zfs zfs_vdev_async_write_min_active=8
options zfs zfs_vdev_async_write_max_active=32
options zfs zfs_vdev_def_queue_depth=128
'';
2023-01-15 18:56:16 +01:00
# Use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
2023-06-02 23:53:02 +02:00
# use a high resolution
boot.loader.systemd-boot.consoleMode = "max";
# we want to be able to do a memtest
boot.loader.systemd-boot.memtest86.enable = true;
2024-05-29 21:07:09 +02:00
# use systemd early
boot.initrd.systemd.enable = true;
2023-06-02 23:53:02 +02:00
# setup the console stuff early
console.earlySetup = true;
2024-07-15 22:16:22 +02:00
# boot splash
boot.plymouth.enable = true;
2023-10-24 20:17:19 +02:00
# swap to RAM
zramSwap.enable = true;
2024-05-29 21:07:09 +02:00
# root file system in RAM
2024-03-27 19:49:42 +01:00
fileSystems."/" =
2024-05-29 21:07:09 +02:00
{ device = "none";
fsType = "tmpfs";
2024-03-27 19:49:42 +01:00
neededForBoot = true;
2024-05-29 21:07:09 +02:00
options = [ "defaults" "size=8G" "mode=755" ];
2024-03-27 19:49:42 +01:00
};
2024-10-03 00:50:52 +02:00
# my data
fileSystems."/data" =
{ device = "zpool/data";
fsType = "zfs";
neededForBoot = true;
};
# the system
fileSystems."/nix" =
{ device = "zpool/nix";
fsType = "zfs";
neededForBoot = true;
};
# tmp to not fill RAM
fileSystems."/tmp" =
2024-10-03 00:50:52 +02:00
{ device = "zpool/tmp";
fsType = "zfs";
2024-03-27 19:49:42 +01:00
neededForBoot = true;
};
# bind mount to have root home
fileSystems."/root" =
2024-10-03 00:50:52 +02:00
{ device = "/data/root";
2024-03-27 19:49:42 +01:00
fsType = "none";
neededForBoot = true;
options = [ "bind" ];
2024-10-03 00:50:52 +02:00
depends = [ "/data" ];
2024-03-27 19:49:42 +01:00
};
# bind mount to have NixOS configuration, different per host
fileSystems."/etc/nixos" =
2024-10-03 00:50:52 +02:00
{ device = "/data/nixos/${config.networking.hostName}";
2024-03-27 19:49:42 +01:00
fsType = "none";
neededForBoot = true;
options = [ "bind" ];
2024-10-03 00:50:52 +02:00
depends = [ "/data" ];
2024-03-27 19:49:42 +01:00
};
2024-05-30 17:42:54 +02:00
# keep some stuff persistent
environment.persistence."/nix/persistent" = {
hideMounts = true;
directories = [
# user and group mappings
# Either "/var/lib/nixos" has to be persisted, or all users and groups must have a uid/gid specified. The following users are missing a uid
"/var/lib/nixos"
2024-05-30 17:42:54 +02:00
# systemd timers
2024-08-19 23:21:52 +02:00
"/var/lib/systemd/timers"
2024-05-30 17:42:54 +02:00
# alsa state for persistent sound settings
2024-08-19 23:21:52 +02:00
"/var/lib/alsa"
2024-07-04 18:52:50 +02:00
# NetworkManager connections
2024-08-19 23:21:52 +02:00
"/etc/NetworkManager"
"/var/lib/NetworkManager"
2024-05-30 17:42:54 +02:00
];
};
2024-07-12 19:35:16 +02:00
# kill the tmp content on reboots, we mount that to /nix/persistent to avoid memory fill-up
boot.tmp.cleanOnBoot = true;
2024-10-03 11:17:39 +02:00
# ensure our data is not rotting
services.zfs.autoScrub = {
enable = true;
interval = "weekly";
};
# trim the stuff, we use SSDs
services.zfs.trim.enable = true;
2024-01-10 17:58:07 +01:00
# enable fast dbus
services.dbus.implementation = "broker";
2023-01-15 22:48:29 +01:00
# allow all firmware
hardware.enableAllFirmware = true;
# use NetworkManager, works well for WiFi, too
networking.networkmanager.enable = true;
2024-06-27 19:39:48 +02:00
# ensure firewall is up, allow ssh in
2023-01-15 22:48:29 +01:00
networking.firewall.enable = true;
2023-06-10 17:42:28 +02:00
networking.firewall.allowedTCPPorts = [ 22 ];
2023-01-15 18:56:16 +01:00
2023-06-09 18:26:35 +02:00
# OpenSSH daemon config
services.openssh = {
2024-04-03 23:42:36 +02:00
# enable with public key only auth, start on demand only
2023-05-02 19:32:11 +02:00
enable = true;
2024-04-03 23:42:36 +02:00
startWhenNeeded = true;
2024-01-11 23:45:38 +01:00
settings.PasswordAuthentication = false;
settings.KbdInteractiveAuthentication = false;
2023-06-09 18:26:35 +02:00
# only ed25519 keys, make them persistent
hostKeys = [{
path = "/nix/persistent/ssh_host_ed25519_key";
type = "ed25519";
}];
# only safe ciphers & Co.
settings.Ciphers = [ "aes256-gcm@openssh.com" ];
settings.KexAlgorithms = [ "sntrup761x25519-sha512@openssh.com" ];
settings.Macs = [ "hmac-sha2-512-etm@openssh.com" ];
2023-05-02 19:32:11 +02:00
};
2023-01-15 18:56:16 +01:00
# Set your time zone.
time.timeZone = "Europe/Berlin";
# default locale is English US
i18n.defaultLocale = "en_US.UTF-8";
# use German stuff for sorting/date/....
i18n.extraLocaleSettings = {
LC_ADDRESS = "de_DE.UTF-8";
LC_IDENTIFICATION = "de_DE.UTF-8";
LC_MEASUREMENT = "de_DE.UTF-8";
LC_MONETARY = "de_DE.UTF-8";
LC_NAME = "de_DE.UTF-8";
LC_NUMERIC = "de_DE.UTF-8";
LC_PAPER = "de_DE.UTF-8";
LC_TELEPHONE = "de_DE.UTF-8";
LC_TIME = "de_DE.UTF-8";
};
2023-09-02 17:06:15 +02:00
# allow to have all locales
i18n.supportedLocales = [ "all" ];
# use X11/wayland layout for console, too
2023-10-21 21:31:26 +02:00
console.useXkbConfig = true;
2023-01-15 18:56:16 +01:00
2024-07-15 22:12:39 +02:00
# enable SDDM & the KDE Plasma Desktop Environment with Wayland
2024-03-27 07:40:25 +01:00
services.desktopManager.plasma6.enable = true;
2024-07-15 22:12:39 +02:00
services.displayManager.sddm = {
enable = true;
2024-07-15 22:12:39 +02:00
wayland.enable = true;
};
2023-01-15 18:56:16 +01:00
2023-05-20 22:37:33 +02:00
# enable sound with PipeWire
hardware.pulseaudio.enable = false;
2023-01-15 18:56:16 +01:00
services.pipewire = {
enable = true;
alsa = {
enable = true;
support32Bit = true;
};
2024-09-04 17:33:34 +02:00
jack.enable = true;
2023-05-20 22:37:33 +02:00
pulse.enable = true;
2023-01-15 18:56:16 +01:00
};
# allow realtime
security.rtkit.enable = true;
# no need to replace the kernel at runtime
security.protectKernelImage = true;
2023-01-15 18:56:16 +01:00
# package manager config
nix = {
2024-10-04 17:28:57 +02:00
# general settings
settings = {
# don't hog all cores, might OOM, too
cores = 2;
max-jobs = 2;
2024-10-04 17:15:25 +02:00
2024-10-04 17:28:57 +02:00
# auto optimize the store
auto-optimise-store = true;
# enable new stuff
experimental-features = "nix-command flakes";
};
2023-01-15 18:56:16 +01:00
# cleanup the store from time to time
gc = {
automatic = true;
dates = "daily";
options = "--delete-older-than 7d";
};
# https://github.com/nix-community/nix-direnv
extraOptions = ''
keep-outputs = true
keep-derivations = true
'';
2023-01-15 18:56:16 +01:00
};
# avoid suspend ever to be triggered
2023-01-15 18:56:16 +01:00
systemd.targets.sleep.enable = false;
systemd.targets.suspend.enable = false;
systemd.targets.hibernate.enable = false;
systemd.targets.hybrid-sleep.enable = false;
2024-05-26 22:55:46 +02:00
# allow unfree packages
2023-01-15 18:56:16 +01:00
nixpkgs.config.allowUnfree = true;
2024-05-26 22:55:46 +02:00
# we want DRM support
nixpkgs.config.chromium.enableWideVine = true;
2023-01-15 18:56:16 +01:00
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
aspellDicts.de
aspellDicts.en
2024-06-16 22:12:32 +02:00
bitwise
2023-01-15 18:56:16 +01:00
borgbackup
2023-03-23 20:50:35 +01:00
btop
calibre
2023-10-21 18:15:29 +02:00
chromium
2023-06-10 19:09:58 +02:00
clinfo
2023-09-16 16:54:02 +02:00
config.boot.kernelPackages.perf
2024-08-21 22:28:29 +02:00
delta
2024-06-16 20:53:26 +02:00
duf
2023-07-28 17:11:20 +02:00
efibootmgr
emacs
2024-06-26 19:16:56 +02:00
f2
2023-10-15 17:18:18 +02:00
fdupes
ffmpeg
2023-10-15 17:18:18 +02:00
file
2024-09-19 20:59:41 +02:00
fooyin
fzf
gimp
2023-01-15 18:56:16 +01:00
gitFull
2023-06-10 19:09:58 +02:00
glxinfo
go
2024-06-30 16:26:25 +02:00
gorilla-bin
2023-07-28 17:29:07 +02:00
gptfdisk
heaptrack
hotspot
hugo
2023-01-15 18:56:16 +01:00
hunspellDicts.de_DE
hunspellDicts.en_US
2023-10-15 17:18:18 +02:00
inetutils
2024-05-12 16:21:45 +02:00
inkscape
2024-10-04 17:47:49 +02:00
kdePackages.ark
kdePackages.calligra
kdePackages.filelight
kdePackages.kate
kdePackages.kcachegrind
kdePackages.kcalc
kdePackages.kleopatra
kdePackages.kmail
kdePackages.konsole
kdePackages.merkuro
kdePackages.neochat
kdePackages.okular
kdePackages.tokodon
keychain
2024-06-16 20:53:26 +02:00
lazygit
libjxl
libreoffice
2023-06-10 19:09:58 +02:00
libva-utils
2023-01-15 18:56:16 +01:00
lsof
2024-07-07 16:40:50 +02:00
mailutils
2023-01-15 18:56:16 +01:00
mc
2024-06-25 22:35:22 +02:00
micro
2024-07-27 17:29:48 +02:00
mission-center
2024-08-15 17:49:55 +02:00
mplayer
nixos-install-tools
nmap
2023-09-16 17:08:34 +02:00
nvme-cli
2024-07-07 16:40:50 +02:00
procmail
okteta
2023-08-06 19:41:42 +02:00
p7zip
2023-07-28 17:29:07 +02:00
parted
2023-10-15 17:18:18 +02:00
pciutils
2024-01-28 01:54:01 +01:00
pdftk
2024-06-16 20:53:26 +02:00
procs
pulseaudio
2024-05-30 11:18:56 +02:00
pwgen
qmk
2024-10-05 20:08:59 +02:00
restic
2024-06-16 22:03:26 +02:00
ripgrep
2024-06-16 20:53:26 +02:00
scc
2023-12-29 12:43:35 +01:00
ssh-audit
2024-01-13 16:34:30 +01:00
sysstat
tcl
texlive.combined.scheme-small
tigervnc
tk
2024-06-16 20:53:26 +02:00
tldr
2023-06-10 17:02:24 +02:00
unrar
unzip
usbutils
valgrind
vlc
vscodium
2023-06-10 19:09:58 +02:00
vulkan-tools
wayland-utils
2024-10-05 18:25:08 +02:00
xorg.xhost
xorg.xlsclients
2024-04-27 21:54:41 +02:00
zoxide
2023-01-15 18:56:16 +01:00
zsh
];
# olm is insecure
nixpkgs.config.permittedInsecurePackages = [
"olm-3.2.16"
];
2023-10-22 17:56:24 +02:00
# run browsers in a sandbox
2023-10-21 18:15:29 +02:00
programs.firejail = {
enable = true;
2023-10-21 19:22:49 +02:00
2023-10-21 18:15:29 +02:00
wrappedBinaries = {
chromium = {
executable = "${pkgs.lib.getBin pkgs.chromium}/bin/chromium";
profile = "${pkgs.firejail}/etc/firejail/chromium.profile";
};
2023-10-21 19:22:49 +02:00
2023-10-21 18:15:29 +02:00
firefox = {
executable = "${pkgs.lib.getBin pkgs.firefox}/bin/firefox";
profile = "${pkgs.firejail}/etc/firejail/firefox.profile";
};
signal-desktop = {
executable = "${pkgs.signal-desktop}/bin/signal-desktop";
profile = "${pkgs.firejail}/etc/firejail/signal-desktop.profile";
};
2023-10-21 18:08:29 +02:00
};
};
2023-10-21 19:22:49 +02:00
2023-10-21 18:15:29 +02:00
# chromium needs programs.firefox.enable here and systemPackages entry to have icon and work
2023-10-15 16:27:54 +02:00
programs.chromium.enable = true;
2023-10-21 19:22:49 +02:00
2023-10-21 18:15:29 +02:00
# firefox needs programs.firefox.enable here but no systemPackages entry to have icon and work
2023-10-15 16:27:54 +02:00
programs.firefox.enable = true;
2023-01-15 18:56:16 +01:00
# allow keyboard configure tools to work
2023-05-20 23:22:25 +02:00
hardware.keyboard.qmk.enable = true;
2023-01-15 18:56:16 +01:00
# add ~/bin to PATH
environment.homeBinInPath = true;
2024-08-04 16:25:50 +02:00
# fonts for all users
2023-01-15 18:56:16 +01:00
fonts = {
2024-08-04 16:25:50 +02:00
# no default fonts
enableDefaultPackages = false;
2024-04-04 00:03:20 +02:00
2024-07-21 15:41:29 +02:00
# ensure we have an emulated global fontdir
2024-08-04 22:51:42 +02:00
fontDir = {
enable = true;
decompressFonts = true;
};
2024-07-21 15:41:29 +02:00
2024-08-31 17:30:41 +02:00
# system fonts
2024-08-16 19:07:14 +02:00
packages = with pkgs; [
2024-09-01 17:22:32 +02:00
# personal paid fonts
2024-09-01 19:41:01 +02:00
# https://www.monolisa.dev/
# https://www.lucasfonts.com/fonts/the-sans
# https://www.lucasfonts.com/fonts/the-serif
2024-09-01 17:22:32 +02:00
cullmann-fonts
2024-08-31 17:30:41 +02:00
# font families with good unicode coverage as fallback
2024-08-16 19:07:14 +02:00
noto-fonts
noto-fonts-cjk-sans
noto-fonts-cjk-serif
noto-fonts-lgc-plus
# emoji in Farbe und bunt
noto-fonts-color-emoji
];
2024-08-13 20:10:44 +02:00
2024-08-31 17:30:41 +02:00
# proper default config for fonts
2023-01-15 18:56:16 +01:00
fontconfig = {
2024-08-31 17:30:41 +02:00
# we use fontconfig
2024-08-04 22:51:42 +02:00
enable = true;
2024-08-31 17:30:41 +02:00
# use some proper default fonts
2023-01-15 18:56:16 +01:00
defaultFonts = {
2024-08-16 19:07:14 +02:00
emoji = [ "Noto Color Emoji" ];
2024-08-31 18:26:13 +02:00
monospace = [ "MonoLisa" "Noto Sans Mono" ];
2024-09-01 19:40:04 +02:00
sansSerif = [ "TheSansOffice" "Noto Sans" ];
serif = [ "TheSerifOffice" "Noto Serif" ];
2023-01-15 18:56:16 +01:00
};
2024-08-24 15:58:57 +02:00
2024-08-31 17:30:41 +02:00
# don't look like ancient X11
2024-08-24 15:58:57 +02:00
antialias = true;
2024-08-31 17:30:41 +02:00
# enable proper hinting
2024-08-24 15:58:57 +02:00
hinting = {
enable = true;
style = "full";
autohint = true;
2024-08-24 15:58:57 +02:00
};
# disable subpixel rendering to avoid color blurr
2024-08-24 15:58:57 +02:00
subpixel = {
rgba = "none";
lcdfilter = "none";
2024-08-24 15:58:57 +02:00
};
2023-01-15 18:56:16 +01:00
};
};
2024-10-05 18:25:08 +02:00
# OpenGL, 32-bit for steam
hardware.graphics = {
enable = true;
enable32Bit = true;
};
2023-01-15 18:56:16 +01:00
2023-02-06 20:20:40 +01:00
# try to ensure we can use our network LaserJet
2023-01-15 18:56:16 +01:00
services.printing.enable = true;
services.printing.drivers = [ pkgs.hplip ];
# dconf is needed for gtk, see https://nixos.wiki/wiki/KDE
programs.dconf.enable = true;
# https://nixos.wiki/wiki/Chromium - Wayland support on
environment.sessionVariables.NIXOS_OZONE_WL = "1";
2024-07-07 16:40:50 +02:00
# ensure machine can send mails
services.opensmtpd = {
2024-04-04 00:00:17 +02:00
enable = true;
setSendmail = true;
2024-07-07 16:40:50 +02:00
serverConfiguration = ''
table aliases file:/etc/mail/aliases
table secrets file:/etc/mail/secrets
2024-07-07 18:10:47 +02:00
listen on localhost
2024-07-07 16:40:50 +02:00
action "local" mda "procmail -f -" virtual <aliases>
action "relay" relay host smtps://smtp@moon.babylon2k.com auth <secrets> mail-from bot@cullmann.io
match for local action "local"
match for any action "relay"
'';
};
environment.etc."mail/aliases" = {
text = "@ christoph@cullmann.io";
mode = "0400";
};
environment.etc."mail/secrets" = {
2024-10-03 00:50:52 +02:00
text = builtins.readFile "/data/nixos/secret/mail.secret";
2024-07-07 16:40:50 +02:00
mode = "0400";
2024-04-04 00:00:17 +02:00
};
2023-01-15 18:56:16 +01:00
2024-10-03 11:17:39 +02:00
# send mails on ZFS events
services.zfs.zed = {
settings = {
ZED_DEBUG_LOG = "/tmp/zed.debug.log";
ZED_EMAIL_ADDR = [ "root" ];
ZED_EMAIL_PROG = "/run/wrappers/bin/sendmail";
ZED_EMAIL_OPTS = "@ADDRESS@";
ZED_NOTIFY_INTERVAL_SECS = 3600;
ZED_NOTIFY_VERBOSE = true;
ZED_USE_ENCLOSURE_LEDS = true;
ZED_SCRUB_AFTER_RESILVER = true;
};
# this option does not work; will return error
enableMail = false;
};
# use ZSH per default
programs.zsh.enable = true;
environment.shells = with pkgs; [ zsh ];
# needed for the ZSH completion
environment.pathsToLink = [ "/share/zsh" ];
2024-06-27 23:25:42 +02:00
2024-06-25 22:35:22 +02:00
# use micro as default terminal editor
environment.variables.EDITOR = "micro";
2023-10-23 19:55:37 +02:00
# enable VirtualBox
2023-01-15 18:56:16 +01:00
virtualisation.virtualbox.host.enable = true;
2024-09-04 16:50:21 +02:00
virtualisation.virtualbox.host.enableKvm = true;
2024-05-26 16:58:37 +02:00
virtualisation.virtualbox.host.enableHardening = false;
virtualisation.virtualbox.host.addNetworkInterface = false;
2023-01-15 18:56:16 +01:00
2024-10-05 18:25:08 +02:00
# use doas instead of sudo
security.sudo.enable = false;
security.doas.enable = true;
security.doas.extraRules = [
# wheel users are allowed to become all users
{ groups = [ "wheel" ]; noPass = false; keepEnv = true; persist = true; }
# wheel users can use sandbox stuff without password
{ groups = [ "wheel" ]; runAs = "sandbox-games"; noPass = true; }
{ groups = [ "wheel" ]; runAs = "sandbox-kde"; noPass = true; }
];
2023-01-15 18:56:16 +01:00
}