Reinstall Outpost
This commit is contained in:
parent
f2204b3489
commit
70604b5bba
5 changed files with 180 additions and 84 deletions
86
systems/outpost/configuration.nix
Normal file
86
systems/outpost/configuration.nix
Normal file
|
|
@ -0,0 +1,86 @@
|
|||
{ lib, inputs, self, pkgs, pkgs-unstable, ... }: let
|
||||
hostName = "outpost";
|
||||
hostId = "373a7023";
|
||||
tinc-ip = "10.86.84.106/32";
|
||||
|
||||
stateVersion = "25.05";
|
||||
in {
|
||||
networking.hostId = hostId;
|
||||
networking.hostName = hostName;
|
||||
system.stateVersion = stateVersion;
|
||||
|
||||
home-manager = {
|
||||
users."lauren_lagarde" = {
|
||||
home.stateVersion = stateVersion;
|
||||
imports = self.homeManagerModules."lauren_lagarde@tui.mlaga97.space";
|
||||
};
|
||||
extraSpecialArgs = { inherit self pkgs-unstable; };
|
||||
};
|
||||
|
||||
time.timeZone = "America/Chicago";
|
||||
sops.defaultSopsFile = ../../secrets.yaml;
|
||||
|
||||
imports = [
|
||||
inputs.sops-nix.nixosModules.sops
|
||||
inputs.home-manager.nixosModules.home-manager
|
||||
|
||||
../../nixos/features/pi.nix
|
||||
|
||||
# Core Features
|
||||
../../nixos/features/base.nix
|
||||
../../nixos/features/tui-apps.nix
|
||||
../../nixos/features/openssh-server.nix
|
||||
|
||||
# Core Tweaks
|
||||
../../nixos/tweaks/zram.nix
|
||||
../../nixos/tweaks/enable_flakes.nix
|
||||
../../nixos/tweaks/systemd-resolved_nonsense.nix
|
||||
|
||||
# Dotspace
|
||||
../../dotspace/configuration.nix
|
||||
|
||||
# Users
|
||||
../../users/lauren_lagarde/configuration.nix
|
||||
../../users/ashley_funkhouser/ashley_funkhouser.nix
|
||||
|
||||
# Outpost
|
||||
../../nixos/tweaks/disable_firewall.nix
|
||||
];
|
||||
|
||||
##############################################################################
|
||||
##############################################################################
|
||||
##############################################################################
|
||||
# Services
|
||||
|
||||
services.smartd.enable = lib.mkForce false;
|
||||
|
||||
##############################################################################
|
||||
##############################################################################
|
||||
##############################################################################
|
||||
# Networking
|
||||
|
||||
networking.useNetworkd = true;
|
||||
systemd.network = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
##############################################################################
|
||||
# Tinc
|
||||
|
||||
sops.secrets."dotspace/${hostName}/keys/tinc/rsa_key.priv" = { sopsFile = ./secrets.yaml; };
|
||||
sops.secrets."dotspace/${hostName}/keys/tinc/ed25519_key.priv" = { sopsFile = ./secrets.yaml; };
|
||||
|
||||
systemd.network.networks."90-tinc" = {
|
||||
matchConfig.Name = "tinc.dotspace";
|
||||
address = [ "${tinc-ip}/32" ];
|
||||
routes = [ { Destination = "10.86.84.0/24"; } ];
|
||||
};
|
||||
|
||||
services.tinc.networks.dotspace = {
|
||||
name = hostName;
|
||||
ed25519PrivateKeyFile = "/run/secrets/dotspace/${hostName}/keys/tinc/ed25519_key.priv";
|
||||
|
||||
chroot = false;
|
||||
settings.ConnectTo = [ "fortress" ];
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue