summaryrefslogtreecommitdiff
path: root/modules/nixos/profiles
diff options
context:
space:
mode:
Diffstat (limited to 'modules/nixos/profiles')
-rw-r--r--modules/nixos/profiles/default.nix6
-rw-r--r--modules/nixos/profiles/personal.nix22
-rw-r--r--modules/nixos/profiles/server.nix66
3 files changed, 94 insertions, 0 deletions
diff --git a/modules/nixos/profiles/default.nix b/modules/nixos/profiles/default.nix
new file mode 100644
index 0000000..0d11285
--- /dev/null
+++ b/modules/nixos/profiles/default.nix
@@ -0,0 +1,6 @@
+{
+ imports = [
+ ./personal.nix
+ ./server.nix
+ ];
+}
diff --git a/modules/nixos/profiles/personal.nix b/modules/nixos/profiles/personal.nix
new file mode 100644
index 0000000..df52696
--- /dev/null
+++ b/modules/nixos/profiles/personal.nix
@@ -0,0 +1,22 @@
+{ config, lib, ... }:
+let
+ cfg = config.profiles.personal;
+in
+{
+ options.profiles.personal = {
+ enable = lib.mkEnableOption "the Personal profile";
+ };
+
+ config = lib.mkIf cfg.enable {
+ traits = {
+ home-manager.enable = true;
+
+ secrets.enable = true;
+ tailscale.enable = true;
+
+ users = {
+ seth.enable = true;
+ };
+ };
+ };
+}
diff --git a/modules/nixos/profiles/server.nix b/modules/nixos/profiles/server.nix
new file mode 100644
index 0000000..e3e785b
--- /dev/null
+++ b/modules/nixos/profiles/server.nix
@@ -0,0 +1,66 @@
+{
+ config,
+ lib,
+ pkgs,
+ inputs,
+ ...
+}:
+let
+ cfg = config.profiles.server;
+in
+{
+ options.profiles.server = {
+ enable = lib.mkEnableOption "the Server profile";
+
+ hostUser = lib.mkEnableOption "a default interactive user" // {
+ default = true;
+ };
+ };
+
+ config = lib.mkIf cfg.enable (
+ lib.mkMerge [
+ {
+ # All servers are most likely on stable, so we want to pull in some newer packages from time to time
+ _module.args.unstable = inputs.nixpkgs.legacyPackages.${pkgs.stdenv.hostPlatform.system};
+
+ boot.tmp.cleanOnBoot = lib.mkDefault true;
+
+ # We don't need it here
+ documentation.enable = false;
+
+ environment.defaultPackages = lib.mkForce [ ];
+
+ mixins = {
+ cloudflared.enable = true;
+ nginx.enable = true;
+ };
+
+ nix.gc = {
+ # Every ~2 days
+ dates = "Mon,Wed,Fri *-*-* 00:00:00";
+ options = "-d --delete-older-than 2d";
+ };
+
+ traits = {
+ autoUpgrade.enable = true;
+ secrets.enable = true;
+ tailscale = {
+ enable = true;
+ ssh.enable = true;
+ };
+ zram.enable = true;
+ };
+ }
+
+ (lib.mkIf cfg.hostUser {
+ # Hardening access to `nix` as no other users *should* ever really touch it
+ nix.settings.allowed-users = [ config.networking.hostName ];
+
+ users.users.${config.networking.hostName} = {
+ isNormalUser = true;
+ extraGroups = [ "wheel" ];
+ };
+ })
+ ]
+ );
+}