blob: 600312d7f87c1dc8357cbaaca41faf3ab2192812 (
plain) (
tree)
|
|
{
lib,
adminUser,
config,
...
}:
{
imports = [
../../../profiles/cgroups.nix
../../../profiles/defaults.nix
../../../profiles/disk/basic-vm.nix
../../../profiles/home-manager.nix
../../../profiles/server.nix
];
age = {
secrets = {
restic_gcs_credentials = {
file = ../../../secrets/restic_gcs_credentials.age;
};
restic_password = {
file = ../../../secrets/restic_password.age;
};
nas_client_credentials = {
file = ../../../secrets/nas_client.age;
};
wireguard = {
file = ../../../secrets/vm-synology/wireguard.age;
};
};
};
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.systemd-boot.enable = true;
networking.hostName = "synology-vm";
networking.useDHCP = lib.mkDefault true;
systemd.network.wait-online.anyInterface = lib.mkDefault config.networking.useDHCP;
users.users.builder = {
openssh.authorizedKeys.keys = [
# my personal key
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINBkozy+X96u5ciX766bJ/AyQ3xm1tXZTIr5+4PVFZFi"
# remote builder ssh key
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFGxdplt9WwGjdhoYkmPe2opZMJShtpqnGCI+swrgvw"
];
isNormalUser = true;
group = "nogroup";
};
nix.settings.trusted-users = [ "builder" ];
networking.wireguard = {
enable = true;
interfaces.wg0 = {
ips = [ "10.100.0.40/32" ];
listenPort = 51871;
privateKeyFile = config.age.secrets.wireguard.path;
peers = [
{
publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318=";
allowedIPs = [ "10.100.0.0/24" ];
endpoint = "165.232.158.110:51871";
persistentKeepalive = 25;
}
{
# rivendell
publicKey = "jf7T7TMKQWSgSXhUplldZDV9G2y2BjMmHIAhg5d26ng=";
allowedIPs = [ "10.100.0.0/24" ];
persistentKeepalive = 25;
}
];
};
};
networking.firewall.allowedUDPPorts = [ 51871 ];
home-manager = {
users.${adminUser.name} = {
imports = [
../../../home/profiles/minimal.nix
];
};
};
system.stateVersion = "23.11"; # Did you read the comment?
}
|