inputs: { system = "x86_64-linux"; modules = [ ../nixos-modules/default.nix inputs.home-manager.nixosModules.home-manager ({ pkgs, config, ... }: let inherit (config.magic_rb.pkgs) nixpkgs-unstable; in { home-manager.users."main" = { ... }: { imports = [ ../home-manager/modules/default.nix ]; magic_rb = { pins = { inherit (inputs) nixpkgs nixpkgs-unstable nixpkgs-master home-manager nixng fenix; }; config = { allowUnfree = true; }; overlays = inputs.self.overlays; programs = { alacritty.enable = true; bash = { enable = true; enableDirenv = true; }; shh.enable = true; ssh.enable = true; emacs.enable = true; xmonad.enable = true; gpg.enable = true; multimc.enable = true; }; packageCollections = { "3dPrinting".enable = true; cmdline.enable = true; graphical.enable = true; rust.enable = true; webdev.enable = true; wine.enable = true; }; }; home.stateVersion = "20.09"; }; magic_rb = { grub = { enable = true; efi.enable = true; }; xserver = { enable = true; gpu = "nvidia"; xmonad = true; qwertyNeo2 = true; }; pins = { inherit (inputs) nixpkgs nixpkgs-unstable nixpkgs-master home-manager nixng fenix; }; config = { allowUnfree = true; }; overlays = inputs.self.overlays; erase-my-darlings = { enable = true; snapshot = "heater-zpool/local/root@blank"; }; hardware.heater = true; sshdEmacs.enable = true; flakes.enable = true; pulseaudio.enable = true; }; programs.steam.enable = true; boot.binfmt.emulatedSystems = [ "aarch64-linux" ]; services.vault-agent = { enable = true; settings = { vault = { address = "https://vault.in.redalder.org:8200"; client_cert = "/etc/vault-agent/client.crt"; client_key = "/etc/vault-agent/client.key"; }; auto_auth = { method = [ { "cert" = { name = "system-heater"; }; } ]; }; template = [ { source = pkgs.writeText "wg0.key.tpl" '' {{ with secret "kv/data/systems/heater/wireguard" }}{{ .Data.data.private_key }}{{ end }} ''; destination = "/var/secrets/wg0.key"; } { source = pkgs.writeText "nomad.hcl.tpl" '' client { enabled = true servers = [ "blowhole.in.redalder.org:4647" ] options { docker.privileged.enabled = "true" } cni_path = "${nixpkgs-unstable.cni-plugins}/bin" } {{ with secret "kv/data/systems/heater/nomad" }} vault { enabled = true address = "https://vault.in.redalder.org:8200" token = "{{ .Data.data.vault_token }}" allow_unauthenticated = true create_from_role = "nomad-cluster" } consul { address = "blowhole.in.redalder.org:8500" token = "{{ .Data.data.consul_token }}" } {{ end }} disable_update_check = true datacenter = "homelab-1" data_dir = "/var/lib/nomad" ''; destination = "/var/secrets/nomad.hcl"; perms = "0644"; } ]; }; }; services.sshd.enable = true; services.nomad = { enable = false; # Consul conflict, services go yeet enableDocker = false; dropPrivileges = false; extraPackages = [ nixpkgs-unstable.consul ]; package = nixpkgs-unstable.nomad; extraSettingsPaths = [ "/var/secrets/nomad.hcl" ]; }; networking = { firewall = { allowedUDPPorts = [ 6666 ]; allowedTCPPorts = [ 22 ]; }; wireguard.interfaces = { wg0 = { ips = [ "10.64.0.3/24" ]; listenPort = 6666; privateKeyFile = "/var/secrets/wg0.key"; peers = [ { publicKey = "h4g6vWjOB6RS0NbrP/Kvb2CZeutm/F+ZfDbJmEd1Dgk="; allowedIPs = [ "10.64.0.0/24" ]; endpoint = "redalder.org:6666"; persistentKeepalive = 25; } ]; }; }; }; virtualisation.podman = { enable = true; dockerCompat = true; }; }) ] ++ [ ({ pkgs, ... }: { networking = { hostName = "heater"; useDHCP = false; interfaces.enp3s0.useDHCP = true; firewall.enable = false; hostId = "3457b383"; }; time.timeZone = "Europe/Bratislava"; system.stateVersion = "20.09"; security.pki.certificates = [ (builtins.readFile ../redalder.org.crt) ]; }) ]; }