I verified on whitby that the password hashes generated by //web/pwcrypt are compatible with our OpenLDAP, so it's time to make this thing public. Change-Id: Icc2f095ca7ce4acff6de91a1642dea6461177423 Reviewed-on: https://cl.tvl.fyi/c/depot/+/9266 Tested-by: BuildkiteCI Reviewed-by: flokli <flokli@flokli.de> Autosubmit: tazjin <tazjin@tvl.su>
		
			
				
	
	
		
			653 lines
		
	
	
	
		
			15 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			653 lines
		
	
	
	
		
			15 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { depot, lib, pkgs, ... }: # readTree options
 | |
| { config, ... }: # passed by module system
 | |
| 
 | |
| let
 | |
|   inherit (builtins) listToAttrs;
 | |
|   inherit (lib) range;
 | |
| 
 | |
|   mod = name: depot.path.origSrc + ("/ops/modules/" + name);
 | |
| in
 | |
| {
 | |
|   imports = [
 | |
|     (mod "atward.nix")
 | |
|     (mod "cgit.nix")
 | |
|     (mod "clbot.nix")
 | |
|     (mod "gerrit-queue.nix")
 | |
|     (mod "irccat.nix")
 | |
|     (mod "josh.nix")
 | |
|     (mod "journaldriver.nix")
 | |
|     (mod "known-hosts.nix")
 | |
|     (mod "monorepo-gerrit.nix")
 | |
|     (mod "nixery.nix")
 | |
|     (mod "owothia.nix")
 | |
|     (mod "panettone.nix")
 | |
|     (mod "paroxysm.nix")
 | |
|     (mod "restic.nix")
 | |
|     (mod "smtprelay.nix")
 | |
|     (mod "sourcegraph.nix")
 | |
|     (mod "tvl-buildkite.nix")
 | |
|     (mod "tvl-slapd/default.nix")
 | |
|     (mod "tvl-users.nix")
 | |
|     (mod "www/atward.tvl.fyi.nix")
 | |
|     (mod "www/auth.tvl.fyi.nix")
 | |
|     (mod "www/b.tvl.fyi.nix")
 | |
|     (mod "www/cache.tvl.su.nix")
 | |
|     (mod "www/cl.tvl.fyi.nix")
 | |
|     (mod "www/code.tvl.fyi.nix")
 | |
|     (mod "www/cs.tvl.fyi.nix")
 | |
|     (mod "www/deploys.tvl.fyi.nix")
 | |
|     (mod "www/images.tvl.fyi.nix")
 | |
|     (mod "www/nixery.dev.nix")
 | |
|     (mod "www/self-redirect.nix")
 | |
|     (mod "www/signup.tvl.fyi.nix")
 | |
|     (mod "www/static.tvl.fyi.nix")
 | |
|     (mod "www/status.tvl.su.nix")
 | |
|     (mod "www/todo.tvl.fyi.nix")
 | |
|     (mod "www/tvix.dev.nix")
 | |
|     (mod "www/tvixbolt.tvl.su.nix")
 | |
|     (mod "www/tvl.fyi.nix")
 | |
|     (mod "www/tvl.su.nix")
 | |
|     (mod "www/wigglydonke.rs.nix")
 | |
| 
 | |
|     (depot.third_party.agenix.src + "/modules/age.nix")
 | |
|   ];
 | |
| 
 | |
|   hardware = {
 | |
|     enableRedistributableFirmware = true;
 | |
|     cpu.amd.updateMicrocode = true;
 | |
|   };
 | |
| 
 | |
|   boot = {
 | |
|     tmp.useTmpfs = true;
 | |
|     kernelModules = [ "kvm-amd" ];
 | |
|     supportedFilesystems = [ "zfs" ];
 | |
| 
 | |
|     initrd = {
 | |
|       availableKernelModules = [
 | |
|         "igb"
 | |
|         "xhci_pci"
 | |
|         "nvme"
 | |
|         "ahci"
 | |
|         "usbhid"
 | |
|         "usb_storage"
 | |
|         "sr_mod"
 | |
|       ];
 | |
| 
 | |
|       # Enable SSH in the initrd so that we can enter disk encryption
 | |
|       # passwords remotely.
 | |
|       network = {
 | |
|         enable = true;
 | |
|         ssh = {
 | |
|           enable = true;
 | |
|           port = 2222;
 | |
|           authorizedKeys =
 | |
|             depot.users.tazjin.keys.all
 | |
|             ++ depot.users.lukegb.keys.all
 | |
|             ++ [ depot.users.grfn.keys.whitby ];
 | |
| 
 | |
|           hostKeys = [
 | |
|             /etc/secrets/initrd_host_ed25519_key
 | |
|           ];
 | |
|         };
 | |
| 
 | |
|         # this will launch the zfs password prompt on login and kill the
 | |
|         # other prompt
 | |
|         postCommands = ''
 | |
|           echo "zfs load-key -a && killall zfs" >> /root/.profile
 | |
|         '';
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     kernel.sysctl = {
 | |
|       "net.ipv4.tcp_congestion_control" = "bbr";
 | |
|     };
 | |
| 
 | |
|     loader.grub = {
 | |
|       enable = true;
 | |
|       efiSupport = true;
 | |
|       efiInstallAsRemovable = true;
 | |
|       device = "/dev/disk/by-id/nvme-SAMSUNG_MZQLB1T9HAJR-00007_S439NA0N201620";
 | |
|     };
 | |
| 
 | |
|     zfs.requestEncryptionCredentials = true;
 | |
|   };
 | |
| 
 | |
|   fileSystems = {
 | |
|     "/" = {
 | |
|       device = "zroot/root";
 | |
|       fsType = "zfs";
 | |
|     };
 | |
| 
 | |
|     "/boot" = {
 | |
|       device = "/dev/disk/by-uuid/073E-7FBD";
 | |
|       fsType = "vfat";
 | |
|     };
 | |
| 
 | |
|     "/nix" = {
 | |
|       device = "zroot/nix";
 | |
|       fsType = "zfs";
 | |
|     };
 | |
| 
 | |
|     "/home" = {
 | |
|       device = "zroot/home";
 | |
|       fsType = "zfs";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   networking = {
 | |
|     # Glass is boring, but Luke doesn't like Wapping - the Prospect of
 | |
|     # Whitby, however, is quite a pleasant establishment.
 | |
|     hostName = "whitby";
 | |
|     domain = "tvl.fyi";
 | |
|     hostId = "b38ca543";
 | |
|     useDHCP = false;
 | |
| 
 | |
|     # Don't use Hetzner's DNS servers.
 | |
|     nameservers = [
 | |
|       "8.8.8.8"
 | |
|       "8.8.4.4"
 | |
|     ];
 | |
| 
 | |
|     defaultGateway6 = {
 | |
|       address = "fe80::1";
 | |
|       interface = "enp196s0";
 | |
|     };
 | |
| 
 | |
|     firewall.allowedTCPPorts = [ 22 80 443 4238 8443 29418 ];
 | |
|     firewall.allowedUDPPorts = [ 8443 ];
 | |
| 
 | |
|     interfaces.enp196s0.useDHCP = true;
 | |
|     interfaces.enp196s0.ipv6.addresses = [
 | |
|       {
 | |
|         address = "2a01:04f8:0242:5b21::feed:edef:beef";
 | |
|         prefixLength = 64;
 | |
|       }
 | |
|     ];
 | |
|   };
 | |
| 
 | |
|   # Generate an immutable /etc/resolv.conf from the nameserver settings
 | |
|   # above (otherwise DHCP overwrites it):
 | |
|   environment.etc."resolv.conf" = with lib; {
 | |
|     source = pkgs.writeText "resolv.conf" ''
 | |
|       ${concatStringsSep "\n" (map (ns: "nameserver ${ns}") config.networking.nameservers)}
 | |
|       options edns0
 | |
|     '';
 | |
|   };
 | |
| 
 | |
|   # Disable background git gc system-wide, as it has a tendency to break CI.
 | |
|   environment.etc."gitconfig".source = pkgs.writeText "gitconfig" ''
 | |
|     [gc]
 | |
|     autoDetach = false
 | |
|   '';
 | |
| 
 | |
|   time.timeZone = "UTC";
 | |
| 
 | |
|   nix = {
 | |
|     nrBuildUsers = 256;
 | |
|     settings = {
 | |
|       max-jobs = lib.mkDefault 64;
 | |
|       secret-key-files = "/run/agenix/nix-cache-priv";
 | |
| 
 | |
|       trusted-users = [
 | |
|         "grfn"
 | |
|         "lukegb"
 | |
|         "tazjin"
 | |
|         "sterni"
 | |
|       ];
 | |
|     };
 | |
| 
 | |
|     sshServe = {
 | |
|       enable = true;
 | |
|       keys = with depot.users;
 | |
|         tazjin.keys.all
 | |
|         ++ lukegb.keys.all
 | |
|         ++ [ grfn.keys.whitby ]
 | |
|         ++ sterni.keys.all
 | |
|       ;
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   programs.mtr.enable = true;
 | |
|   programs.mosh.enable = true;
 | |
|   services.openssh = {
 | |
|     enable = true;
 | |
|     settings = {
 | |
|       PasswordAuthentication = false;
 | |
|       KbdInteractiveAuthentication = false;
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Configure secrets for services that need them.
 | |
|   age.secrets =
 | |
|     let
 | |
|       secretFile = name: depot.ops.secrets."${name}.age";
 | |
|     in
 | |
|     {
 | |
|       clbot.file = secretFile "clbot";
 | |
|       gerrit-queue.file = secretFile "gerrit-queue";
 | |
|       grafana.file = secretFile "grafana";
 | |
|       irccat.file = secretFile "irccat";
 | |
|       keycloak-db.file = secretFile "keycloak-db";
 | |
|       nix-cache-priv.file = secretFile "nix-cache-priv";
 | |
|       owothia.file = secretFile "owothia";
 | |
|       panettone.file = secretFile "panettone";
 | |
|       smtprelay.file = secretFile "smtprelay";
 | |
| 
 | |
|       buildkite-agent-token = {
 | |
|         file = secretFile "buildkite-agent-token";
 | |
|         mode = "0440";
 | |
|         group = "buildkite-agents";
 | |
|       };
 | |
| 
 | |
|       buildkite-graphql-token = {
 | |
|         file = secretFile "buildkite-graphql-token";
 | |
|         mode = "0440";
 | |
|         group = "buildkite-agents";
 | |
|       };
 | |
| 
 | |
|       buildkite-besadii-config = {
 | |
|         file = secretFile "besadii";
 | |
|         mode = "0440";
 | |
|         group = "buildkite-agents";
 | |
|       };
 | |
| 
 | |
|       buildkite-private-key = {
 | |
|         file = secretFile "buildkite-ssh-private-key";
 | |
|         mode = "0440";
 | |
|         group = "buildkite-agents";
 | |
|       };
 | |
| 
 | |
|       gerrit-besadii-config = {
 | |
|         file = secretFile "besadii";
 | |
|         owner = "git";
 | |
|       };
 | |
| 
 | |
|       gerrit-secrets = {
 | |
|         file = secretFile "gerrit-secrets";
 | |
|         path = "/var/lib/gerrit/etc/secure.config";
 | |
|         owner = "git";
 | |
|         mode = "0400";
 | |
|       };
 | |
| 
 | |
|       clbot-ssh = {
 | |
|         file = secretFile "clbot-ssh";
 | |
|         owner = "clbot";
 | |
|       };
 | |
| 
 | |
|       # Not actually a secret
 | |
|       nix-cache-pub = {
 | |
|         file = secretFile "nix-cache-pub";
 | |
|         mode = "0444";
 | |
|       };
 | |
| 
 | |
|       depot-replica-key = {
 | |
|         file = secretFile "depot-replica-key";
 | |
|         mode = "0500";
 | |
|         owner = "git";
 | |
|         group = "git";
 | |
|         path = "/var/lib/git/.ssh/id_ed25519";
 | |
|       };
 | |
|     };
 | |
| 
 | |
|   # Automatically collect garbage from the Nix store.
 | |
|   services.depot.automatic-gc = {
 | |
|     enable = true;
 | |
|     interval = "1 hour";
 | |
|     diskThreshold = 200; # GiB
 | |
|     maxFreed = 420; # GiB
 | |
|     preserveGenerations = "90d";
 | |
|   };
 | |
| 
 | |
|   # Run a handful of Buildkite agents to support parallel builds.
 | |
|   services.depot.buildkite = {
 | |
|     enable = true;
 | |
|     agentCount = 32;
 | |
|   };
 | |
| 
 | |
|   # Start a local SMTP relay to Gmail (used by gerrit)
 | |
|   services.depot.smtprelay = {
 | |
|     enable = true;
 | |
|     args = {
 | |
|       listen = ":2525";
 | |
|       remote_host = "smtp.gmail.com:587";
 | |
|       remote_auth = "plain";
 | |
|       remote_user = "tvlbot@tazj.in";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Start a ZNC instance which bounces for tvlbot and owothia.
 | |
|   services.znc = {
 | |
|     enable = true;
 | |
|     useLegacyConfig = false;
 | |
|     config = {
 | |
|       LoadModule = [
 | |
|         "webadmin"
 | |
|         "adminlog"
 | |
|       ];
 | |
| 
 | |
|       User.admin = {
 | |
|         Admin = true;
 | |
|         Pass.password = {
 | |
|           Method = "sha256";
 | |
|           Hash = "bb00aa8239de484c2925b1c3f6a196fb7612633f001daa9b674f83abe7e1103f";
 | |
|           Salt = "TiB0Ochb1CrtpMTl;2;j";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       Listener.l = {
 | |
|         Host = "localhost";
 | |
|         Port = 2627; # bncr
 | |
|         SSL = false;
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Start the Gerrit->IRC bot
 | |
|   services.depot.clbot = {
 | |
|     enable = true;
 | |
|     channels = [ "#tvl" ];
 | |
| 
 | |
|     # See //fun/clbot for details.
 | |
|     flags = {
 | |
|       gerrit_host = "cl.tvl.fyi:29418";
 | |
|       gerrit_ssh_auth_username = "clbot";
 | |
|       gerrit_ssh_auth_key = config.age.secretsDir + "/clbot-ssh";
 | |
| 
 | |
|       irc_server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
 | |
|       irc_user = "tvlbot";
 | |
|       irc_nick = "tvlbot";
 | |
| 
 | |
|       notify_branches = "canon,refs/meta/config";
 | |
|       notify_repo = "depot";
 | |
| 
 | |
|       # This secret is read from an environment variable, which is
 | |
|       # populated by a systemd EnvironmentFile.
 | |
|       irc_pass = "$CLBOT_PASS";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   services.depot = {
 | |
|     # Run a SourceGraph code search instance
 | |
|     sourcegraph.enable = true;
 | |
| 
 | |
|     # Run the Panettone issue tracker
 | |
|     panettone = {
 | |
|       enable = true;
 | |
|       dbUser = "panettone";
 | |
|       dbName = "panettone";
 | |
|       irccatChannel = "#tvl";
 | |
|     };
 | |
| 
 | |
|     # Run the first cursed bot (quote bot)
 | |
|     paroxysm.enable = true;
 | |
| 
 | |
|     # Run the second cursed bot
 | |
|     owothia = {
 | |
|       enable = true;
 | |
|       ircServer = "localhost";
 | |
|       ircPort = config.services.znc.config.Listener.l.Port;
 | |
|     };
 | |
| 
 | |
|     # Run irccat to forward messages to IRC
 | |
|     irccat = {
 | |
|       enable = true;
 | |
|       config = {
 | |
|         tcp.listen = ":4722"; # "ircc"
 | |
|         irc = {
 | |
|           server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
 | |
|           tls = false;
 | |
|           nick = "tvlbot";
 | |
|           # Note: irccat means 'ident' where it says 'realname', so
 | |
|           # this is critical for connecting to ZNC.
 | |
|           realname = "tvlbot";
 | |
|           channels = [
 | |
|             "#tvl"
 | |
|           ];
 | |
|         };
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     # Run atward, the search engine redirection thing.
 | |
|     atward.enable = true;
 | |
| 
 | |
|     # Run a Nixery instance
 | |
|     nixery.enable = true;
 | |
| 
 | |
|     # Run cgit & josh to serve git
 | |
|     cgit = {
 | |
|       enable = true;
 | |
|       user = "git"; # run as the same user as gerrit
 | |
|     };
 | |
| 
 | |
|     josh.enable = true;
 | |
| 
 | |
|     # Configure backups to GleSYS
 | |
|     restic = {
 | |
|       enable = true;
 | |
|       paths = [
 | |
|         "/var/backup/postgresql"
 | |
|         "/var/lib/grafana"
 | |
|         "/var/lib/znc"
 | |
|       ];
 | |
|     };
 | |
| 
 | |
|     # Run autosubmit bot for Gerrit
 | |
|     gerrit-queue.enable = true;
 | |
|   };
 | |
| 
 | |
|   services.postgresql = {
 | |
|     enable = true;
 | |
|     enableTCPIP = true;
 | |
| 
 | |
|     authentication = lib.mkForce ''
 | |
|       local all all trust
 | |
|       host all all 127.0.0.1/32 password
 | |
|       host all all ::1/128 password
 | |
|       hostnossl all all 127.0.0.1/32 password
 | |
|       hostnossl all all ::1/128  password
 | |
|     '';
 | |
| 
 | |
|     ensureDatabases = [
 | |
|       "panettone"
 | |
|     ];
 | |
| 
 | |
|     ensureUsers = [{
 | |
|       name = "panettone";
 | |
|       ensurePermissions = {
 | |
|         "DATABASE panettone" = "ALL PRIVILEGES";
 | |
|       };
 | |
|     }];
 | |
|   };
 | |
| 
 | |
|   services.postgresqlBackup = {
 | |
|     enable = true;
 | |
|     databases = [
 | |
|       "keycloak"
 | |
|       "panettone"
 | |
|       "tvldb"
 | |
|     ];
 | |
|   };
 | |
| 
 | |
|   services.nix-serve = {
 | |
|     enable = true;
 | |
|     port = 6443;
 | |
|     secretKeyFile = config.age.secretsDir + "/nix-cache-priv";
 | |
|     bindAddress = "localhost";
 | |
|   };
 | |
| 
 | |
|   services.fail2ban.enable = true;
 | |
| 
 | |
|   environment.systemPackages = (with pkgs; [
 | |
|     bat
 | |
|     bb
 | |
|     curl
 | |
|     direnv
 | |
|     emacs-nox
 | |
|     fd
 | |
|     git
 | |
|     htop
 | |
|     hyperfine
 | |
|     jq
 | |
|     nano
 | |
|     nvd
 | |
|     ripgrep
 | |
|     tree
 | |
|     unzip
 | |
|     vim
 | |
|     zfs
 | |
|     zfstools
 | |
|   ]) ++ (with depot; [
 | |
|     ops.deploy-whitby
 | |
|   ]);
 | |
| 
 | |
|   # Required for prometheus to be able to scrape stats
 | |
|   services.nginx.statusPage = true;
 | |
| 
 | |
|   # Configure Prometheus & Grafana. Exporter configuration for
 | |
|   # Prometheus is inside the respective service modules.
 | |
|   services.prometheus = {
 | |
|     enable = true;
 | |
|     retentionTime = "90d";
 | |
| 
 | |
|     exporters = {
 | |
|       node = {
 | |
|         enable = true;
 | |
| 
 | |
|         enabledCollectors = [
 | |
|           "logind"
 | |
|           "processes"
 | |
|           "systemd"
 | |
|         ];
 | |
|       };
 | |
| 
 | |
|       nginx = {
 | |
|         enable = true;
 | |
|         sslVerify = false;
 | |
|         constLabels = [ "host=whitby" ];
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     scrapeConfigs = [{
 | |
|       job_name = "node";
 | |
|       scrape_interval = "5s";
 | |
|       static_configs = [{
 | |
|         targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ];
 | |
|       }];
 | |
|     }
 | |
|       {
 | |
|         job_name = "nginx";
 | |
|         scrape_interval = "5s";
 | |
|         static_configs = [{
 | |
|           targets = [ "localhost:${toString config.services.prometheus.exporters.nginx.port}" ];
 | |
|         }];
 | |
|       }];
 | |
|   };
 | |
| 
 | |
|   services.grafana = {
 | |
|     enable = true;
 | |
| 
 | |
|     settings = {
 | |
|       server = {
 | |
|         http_port = 4723; # "graf" on phone keyboard
 | |
|         domain = "status.tvl.su";
 | |
|         root_url = "https://status.tvl.su";
 | |
|       };
 | |
| 
 | |
|       analytics.reporting_enabled = false;
 | |
| 
 | |
|       "auth.generic_oauth" = {
 | |
|         enabled = true;
 | |
|         client_id = "grafana";
 | |
|         scopes = "openid profile email";
 | |
|         name = "TVL";
 | |
|         email_attribute_path = "mail";
 | |
|         login_attribute_path = "sub";
 | |
|         name_attribute_path = "displayName";
 | |
|         auth_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/auth";
 | |
|         token_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/token";
 | |
|         api_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/userinfo";
 | |
| 
 | |
|         # Give lukegb, grfn, tazjin "Admin" rights.
 | |
|         role_attribute_path = "((sub == 'lukegb' || sub == 'grfn' || sub == 'tazjin') && 'Admin') || 'Editor'";
 | |
| 
 | |
|         # Allow creating new Grafana accounts from OAuth accounts.
 | |
|         allow_sign_up = true;
 | |
|       };
 | |
| 
 | |
|       "auth.anonymous" = {
 | |
|         enabled = true;
 | |
|         org_name = "The Virus Lounge";
 | |
|         org_role = "Viewer";
 | |
|       };
 | |
| 
 | |
|       "auth.basic".enabled = false;
 | |
| 
 | |
|       auth = {
 | |
|         oauth_auto_login = true;
 | |
|         disable_login_form = true;
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     provision = {
 | |
|       enable = true;
 | |
|       datasources.settings.datasources = [{
 | |
|         name = "Prometheus";
 | |
|         type = "prometheus";
 | |
|         url = "http://localhost:9090";
 | |
|       }];
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Contains GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET.
 | |
|   systemd.services.grafana.serviceConfig.EnvironmentFile = config.age.secretsDir + "/grafana";
 | |
| 
 | |
|   services.keycloak = {
 | |
|     enable = true;
 | |
| 
 | |
|     settings = {
 | |
|       http-port = 5925; # kycl
 | |
|       hostname = "auth.tvl.fyi";
 | |
|       http-relative-path = "/auth";
 | |
|       proxy = "edge";
 | |
|     };
 | |
| 
 | |
|     database = {
 | |
|       type = "postgresql";
 | |
|       passwordFile = config.age.secretsDir + "/keycloak-db";
 | |
|       createLocally = false;
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Join TVL Tailscale network at net.tvl.fyi
 | |
|   services.tailscale = {
 | |
|     enable = true;
 | |
|     useRoutingFeatures = "server"; # for exit-node usage
 | |
|   };
 | |
| 
 | |
|   # Allow Keycloak access to the LDAP module by forcing in the JVM
 | |
|   # configuration
 | |
|   systemd.services.keycloak.environment.PREPEND_JAVA_OPTS =
 | |
|     "--add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED";
 | |
| 
 | |
|   security.sudo.extraRules = [
 | |
|     {
 | |
|       groups = [ "wheel" ];
 | |
|       commands = [{ command = "ALL"; options = [ "NOPASSWD" ]; }];
 | |
|     }
 | |
|   ];
 | |
| 
 | |
|   users = {
 | |
|     # Set up a user & group for git shenanigans
 | |
|     groups.git = { };
 | |
|     users.git = {
 | |
|       group = "git";
 | |
|       isSystemUser = true;
 | |
|       createHome = true;
 | |
|       home = "/var/lib/git";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   zramSwap.enable = true;
 | |
| 
 | |
|   system.stateVersion = "20.03";
 | |
| }
 |