{ lib, config, adminUser, ... }: { imports = [ ../../../profiles/cgroups.nix ../../../profiles/defaults.nix ../../../profiles/disk/btrfs-on-luks.nix ../../../profiles/forgejo.nix ../../../profiles/hardware/framework-desktop.nix ../../../profiles/home-manager.nix ../../../profiles/keycloak.nix ../../../profiles/remote-unlock.nix ../../../profiles/server.nix ../../../profiles/tailscale.nix ]; age = { secrets = { wireguard = { file = ../../../secrets/rivendell/wireguard.age; }; ts = { file = ../../../secrets/rivendell/ts.age; }; }; }; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; networking.hostName = "rivendell"; networking.useDHCP = lib.mkDefault true; systemd.network.wait-online.anyInterface = lib.mkDefault config.networking.useDHCP; users.users.builder = { openssh.authorizedKeys.keys = [ # my personal key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINBkozy+X96u5ciX766bJ/AyQ3xm1tXZTIr5+4PVFZFi" # remote builder ssh key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFGxdplt9WwGjdhoYkmPe2opZMJShtpqnGCI+swrgvw" ]; isNormalUser = true; group = "nogroup"; }; nix.settings.trusted-users = [ "builder" ]; networking.wireguard = { enable = true; interfaces.wg0 = { ips = [ "10.100.0.60/32" ]; listenPort = 51871; privateKeyFile = config.age.secrets.wireguard.path; peers = [ { # digital ocean droplet publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318="; allowedIPs = [ "10.100.0.0/24" ]; endpoint = "165.232.158.110:51871"; persistentKeepalive = 25; } ]; }; }; networking.firewall.allowedUDPPorts = [ 51871 ]; services.tailscale = { useRoutingFeatures = "both"; authKeyFile = config.age.secrets.ts.path; extraSetFlags = [ "--accept-dns=true" "--accept-routes=true" "--advertise-exit-node=true" "--ssh" ]; }; home-manager = { users.${adminUser.name} = { imports = [ ../../../home/profiles/minimal.nix ]; inherit (adminUser) userinfo; }; }; system.stateVersion = "23.11"; # Did you read the comment? }