aboutsummaryrefslogblamecommitdiff
path: root/machines/nixos/x86_64-linux/synology-vm.nix
blob: a905be53e6a5a58d407cb0f1580000afa500861b (plain) (tree)
1
2
3
4
5
6
7
 
      
            
         

     
 







                                       
















                                                           
                                              

                                         
                                      

                                                                                     
 

                                   
                       
                                                                                        

                                                                                        






                                             












                                                                     





                                                                     



        




                        

                                                  







                                          

                                                            
{
  lib,
  adminUser,
  config,
  ...
}:
{
  imports = [
    ../../../profiles/cgroups.nix
    ../../../profiles/defaults.nix
    ../../../profiles/disk/basic-vm.nix
    ../../../profiles/home-manager.nix
    ../../../profiles/server.nix
  ];

  age = {
    secrets = {
      restic_gcs_credentials = {
        file = ../../../secrets/restic_gcs_credentials.age;
      };
      restic_password = {
        file = ../../../secrets/restic_password.age;
      };
      nas_client_credentials = {
        file = ../../../secrets/nas_client.age;
      };
      wireguard = {
        file = ../../../secrets/vm-synology/wireguard.age;
      };
    };
  };

  boot.loader.efi.canTouchEfiVariables = true;
  boot.loader.systemd-boot.enable = true;

  networking.hostName = "synology-vm";
  networking.useDHCP = lib.mkDefault true;
  systemd.network.wait-online.anyInterface = lib.mkDefault config.networking.useDHCP;

  users.users.builder = {
    openssh.authorizedKeys.keys = [
      # my personal key
      "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINBkozy+X96u5ciX766bJ/AyQ3xm1tXZTIr5+4PVFZFi"
      # remote builder ssh key
      "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFGxdplt9WwGjdhoYkmPe2opZMJShtpqnGCI+swrgvw"
    ];
    isNormalUser = true;
    group = "nogroup";
  };

  nix.settings.trusted-users = [ "builder" ];

  networking.wireguard = {
    enable = true;
    interfaces.wg0 = {
      ips = [ "10.100.0.40/32" ];
      listenPort = 51871;
      privateKeyFile = config.age.secrets.wireguard.path;
      peers = [
        {
          publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318=";
          allowedIPs = [ "10.100.0.0/24" ];
          endpoint = "165.232.158.110:51871";
          persistentKeepalive = 25;
        }
        {
          # rivendell
          publicKey = "jf7T7TMKQWSgSXhUplldZDV9G2y2BjMmHIAhg5d26ng=";
          allowedIPs = [ "10.100.0.0/24" ];
          persistentKeepalive = 25;
        }
      ];
    };
  };

  services.goget = {
    enable = true;
    openFirewall = true;
  };

  networking.firewall.allowedUDPPorts = [ 51871 ];

  home-manager = {
    users.${adminUser.name} = {
      imports = [
        ../../../home/profiles/minimal.nix
      ];
    };
  };

  system.stateVersion = "23.11"; # Did you read the comment?
}