163 lines
		
	
	
	
		
			4.5 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			163 lines
		
	
	
	
		
			4.5 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ ... }:
 | 
						|
 | 
						|
let
 | 
						|
  # TODO(wpcarro): Instead of importing these dependencies as parameters that
 | 
						|
  # readTree will expose I need to import these dependencies manually because
 | 
						|
  # I'm building this using `nixos-rebuild`. When I better understand how to
 | 
						|
  # build socrates using readTree, prefer defining this as an anonymous
 | 
						|
  # function.
 | 
						|
  pkgs = import <nixpkgs> {};
 | 
						|
  briefcase = import <briefcase> {};
 | 
						|
 | 
						|
  trimNewline = x: pkgs.lib.removeSuffix "\n" x;
 | 
						|
  readSecret = x: trimNewline (builtins.readFile ("/etc/secrets/" + x));
 | 
						|
in {
 | 
						|
  imports = [ ./hardware.nix ];
 | 
						|
 | 
						|
  # Use the systemd-boot EFI boot loader.
 | 
						|
  boot.loader.systemd-boot.enable = true;
 | 
						|
  boot.loader.efi.canTouchEfiVariables = true;
 | 
						|
 | 
						|
  networking = {
 | 
						|
    hostName = "socrates";
 | 
						|
    # The global useDHCP flag is deprecated, therefore explicitly set to false
 | 
						|
    # here.  Per-interface useDHCP will be mandatory in the future, so this
 | 
						|
    # generated config replicates the default behaviour.
 | 
						|
    useDHCP = false;
 | 
						|
    networkmanager.enable = true;
 | 
						|
    interfaces.enp2s0f1.useDHCP = true;
 | 
						|
    interfaces.wlp3s0.useDHCP = true;
 | 
						|
    firewall.allowedTCPPorts = [ 9418 80 443 ];
 | 
						|
  };
 | 
						|
 | 
						|
  time.timeZone = "UTC";
 | 
						|
 | 
						|
  programs.fish.enable = true;
 | 
						|
  programs.mosh.enable = true;
 | 
						|
 | 
						|
  environment.systemPackages = with pkgs; [
 | 
						|
    curl
 | 
						|
    direnv
 | 
						|
    emacs26-nox
 | 
						|
    gnupg
 | 
						|
    htop
 | 
						|
    pass
 | 
						|
    vim
 | 
						|
    certbot
 | 
						|
    tree
 | 
						|
    git
 | 
						|
  ];
 | 
						|
 | 
						|
  users = {
 | 
						|
    # I need a git group to run the git server.
 | 
						|
    groups.git = {};
 | 
						|
 | 
						|
    users.wpcarro = {
 | 
						|
      isNormalUser = true;
 | 
						|
      extraGroups = [ "git" "wheel" ];
 | 
						|
      shell = pkgs.fish;
 | 
						|
    };
 | 
						|
 | 
						|
    users.git = {
 | 
						|
      group = "git";
 | 
						|
      isNormalUser = false;
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  nix = {
 | 
						|
    # Expose depot as <depot>, nixpkgs as <nixpkgs>
 | 
						|
    nixPath = [
 | 
						|
      "briefcase=/home/wpcarro/briefcase"
 | 
						|
      "depot=/home/wpcarro/depot"
 | 
						|
      "nixpkgs=/home/wpcarro/nixpkgs"
 | 
						|
    ];
 | 
						|
 | 
						|
    trustedUsers = [ "root" "wpcarro" ];
 | 
						|
  };
 | 
						|
 | 
						|
  ##############################################################################
 | 
						|
  # Services
 | 
						|
  ##############################################################################
 | 
						|
  services.openssh.enable = true;
 | 
						|
 | 
						|
  services.lorri.enable = true;
 | 
						|
 | 
						|
  systemd.services.monzo-token-server = {
 | 
						|
    enable = true;
 | 
						|
    description = "Ensure my Monzo access token is valid";
 | 
						|
    script = "${briefcase.monzo_ynab.tokens}/bin/token-server";
 | 
						|
 | 
						|
    # TODO(wpcarro): I'm unsure of the size of this security risk, but if a
 | 
						|
    # non-root user runs `systemctl cat monzo-token-server`, they could read the
 | 
						|
    # following, sensitive environment variables.
 | 
						|
    environment = {
 | 
						|
      store_path = "/var/cache/monzo_ynab";
 | 
						|
      monzo_client_id = readSecret "monzo-client-id";
 | 
						|
      monzo_client_secret = readSecret "monzo-client-secret";
 | 
						|
      ynab_personal_access_token = readSecret "ynab-personal-access-token";
 | 
						|
      ynab_account_id = readSecret "ynab-account-id";
 | 
						|
      ynab_budget_id = readSecret "ynab-budget-id";
 | 
						|
    };
 | 
						|
 | 
						|
    serviceConfig = {
 | 
						|
      Type = "simple";
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  services.gitDaemon = {
 | 
						|
    enable = true;
 | 
						|
    basePath = "/srv/git";
 | 
						|
    exportAll = true;
 | 
						|
    repositories = [ "/srv/git/briefcase" ];
 | 
						|
  };
 | 
						|
 | 
						|
  # Since I'm using this laptop as a server in my flat, I'd prefer to close its
 | 
						|
  # lid.
 | 
						|
  services.logind.lidSwitch = "ignore";
 | 
						|
 | 
						|
  # Provision SSL certificates to support HTTPS connections.
 | 
						|
  security.acme.acceptTerms = true;
 | 
						|
  security.acme.email = "wpcarro@gmail.com";
 | 
						|
 | 
						|
  services.nginx = {
 | 
						|
    enable = true;
 | 
						|
    enableReload = true;
 | 
						|
 | 
						|
    recommendedTlsSettings = true;
 | 
						|
    recommendedGzipSettings = true;
 | 
						|
    recommendedProxySettings = true;
 | 
						|
 | 
						|
    commonHttpConfig = ''
 | 
						|
      log_format json_combined escape=json
 | 
						|
      '{'
 | 
						|
          '"time_local":"$time_local",'
 | 
						|
          '"remote_addr":"$remote_addr",'
 | 
						|
          '"remote_user":"$remote_user",'
 | 
						|
          '"request":"$request",'
 | 
						|
          '"status": "$status",'
 | 
						|
          '"body_bytes_sent":"$body_bytes_sent",'
 | 
						|
          '"request_time":"$request_time",'
 | 
						|
          '"http_referrer":"$http_referer",'
 | 
						|
          '"http_user_agent":"$http_user_agent"'
 | 
						|
      '}';
 | 
						|
      access_log syslog:server=unix:/dev/log json_combined;
 | 
						|
    '';
 | 
						|
 | 
						|
    virtualHosts = {
 | 
						|
      "learn.wpcarro.dev" = {
 | 
						|
        addSSL = true;
 | 
						|
        enableACME = true;
 | 
						|
        # TODO(wpcarro): Prefer creating a default.nix in //learn and using
 | 
						|
        # briefcase.learn as root.
 | 
						|
        root = /home/wpcarro/briefcase/learn/static;
 | 
						|
      };
 | 
						|
      "blog.wpcarro.dev" = {
 | 
						|
        addSSL = true;
 | 
						|
        enableACME = true;
 | 
						|
        root = briefcase.blog;
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  system.stateVersion = "20.09"; # Did you read the comment?
 | 
						|
}
 |