# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running `nixos-help`). { config, pkgs, materusFlake, ... }: { imports = [ # Include the results of the hardware scan. ./hardware-configuration.nix ./services ]; materus.profile.nix.enable = true; # Use the GRUB 2 boot loader. boot.loader.grub.enable = true; # boot.loader.grub.efiSupport = true; # boot.loader.grub.efiInstallAsRemovable = true; # boot.loader.efi.efiSysMountPoint = "/boot/efi"; # Define on which hard drive you want to install Grub. boot.loader.grub.device = "/dev/sda"; # or "nodev" for efi only networking.hostName = "valkyrie"; # Define your hostname. # Pick only one of the below networking options. # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. networking.networkmanager.enable = false; # Set your time zone. time.timeZone = "Europe/Warsaw"; # Configure network proxy if necessary # networking.proxy.default = "http://user:password@proxy:port/"; # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain"; # Select internationalisation properties. i18n.defaultLocale = "pl_PL.UTF-8"; console = { font = "lat2-16"; keyMap = "pl"; useXkbConfig = false; # use xkbOptions in tty. }; # Enable the X11 windowing system. # services.xserver.enable = true; # Configure keymap in X11 # services.xserver.layout = "us"; # services.xserver.xkbOptions = "eurosign:e,caps:escape"; # Enable CUPS to print documents. # services.printing.enable = true; # Enable sound. # sound.enable = true; # hardware.pulseaudio.enable = true; # Enable touchpad support (enabled default in most desktopManager). # services.xserver.libinput.enable = true; # Define a user account. Don't forget to set a password with ‘passwd’. users.users.materus = { isNormalUser = true; extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user. packages = with pkgs; [ ]; openssh.authorizedKeys.keyFiles = [ (materusFlake.selfPath + /extraFiles/keys/ssh/materus.pub) ]; }; # List packages installed in system profile. To search, run: # $ nix search wget environment.systemPackages = with pkgs; [ vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default. wget nano git ]; # Some programs need SUID wrappers, can be configured further or are # started in user sessions. # programs.mtr.enable = true; # programs.gnupg.agent = { # enable = true; # enableSSHSupport = true; # }; # List services that you want to enable: # Enable the OpenSSH daemon. services.openssh.enable = true; services.openssh.openFirewall = false; services.openssh.settings.PermitRootLogin = "no"; services.openssh.settings.PasswordAuthentication = true; # Open ports in the firewall. # networking.firewall.allowedTCPPorts = [ ... ]; # networking.firewall.allowedUDPPorts = [ ... ]; # Or disable the firewall altogether. networking.firewall.enable = true; # Copy the NixOS configuration file and link it from the resulting system # (/run/current-system/configuration.nix). This is useful in case you # accidentally delete configuration.nix. # system.copySystemConfiguration = true; # This value determines the NixOS release from which the default # settings for stateful data, like file locations and database versions # on your system were taken. It's perfectly fine and recommended to leave # this value at the release version of the first install of this system. # Before changing this value read the documentation for this option # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). system.stateVersion = "23.05"; # Did you read the comment? services.nginx = { enable = true; package = pkgs.tengine; recommendedTlsSettings = true; recommendedOptimisation = true; recommendedGzipSettings = true; }; services.postgresql = { enable = true; package = pkgs.postgresql_15; enableTCPIP = true; authentication = pkgs.lib.mkOverride 10 '' local all all trust ''; }; security.acme.acceptTerms = true; security.acme.defaults.email = "materus+acme@podkos.pl"; security.acme.certs."materus.pl" = { domain = "materus.pl"; group = "nginx"; extraDomainNames = [ "*.materus.pl" ]; dnsProvider = "ovh"; credentialsFile = "/materus/config/private/valkyrie/certs.secret"; }; security.acme.certs."podkos.pl" = { domain = "podkos.pl"; group = "nginx"; extraDomainNames = [ "*.podkos.pl" ]; dnsProvider = "ovh"; credentialsFile = "/materus/config/private/valkyrie/certs.secret"; }; security.acme.certs."podkos.xyz" = { domain = "podkos.xyz"; group = "nginx"; extraDomainNames = [ "*.podkos.xyz" ]; dnsProvider = "ovh"; credentialsFile = "/materus/config/private/valkyrie/certs.secret"; }; }