{ modulesPath, inputs, lib, pkgs, config, options, ... }: let persistRoot = config.autoinstall.persist.persistRoot or "/persist"; in { imports = with inputs.self; [ ./boot.nix ./hardening.nix ./hardware-configuration.nix ./virtualisation.nix ./disks.nix nixosRoles.hypervisor nixosProfiles.acme nixosProfiles.authentik nixosProfiles.battery-historian nixosProfiles.blocky nixosProfiles.duplicacy nixosProfiles.fail2ban # nixosProfiles.firefox-syncserver nixosProfiles.gitea nixosProfiles.joplin-server nixosProfiles.mailserver nixosProfiles.nginx nixosProfiles.roundcube nixosProfiles.tinyproxy nixosProfiles.vaultwarden nixosProfiles.vscode-server nixosProfiles.media-stack nixosProfiles.copyparty nixosProfiles.seafile nixosProfiles.cocalc # nixosProfiles.neko-browser nixosProfiles.yandex-db ]; deviceSpecific.devInfo = { cpu = { vendor = "intel"; clock = 2300; cores = 4; }; drive = { type = "ssd"; speed = 500; size = 500; }; gpu = { vendor = "other"; }; bigScreen = false; ram = 12; fileSystem = "zfs"; }; deviceSpecific.enableVirtualisation = true; deviceSpecific.vpn.mullvad.enable = false; deviceSpecific.isServer = true; zramSwap = { enable = true; algorithm = "zstd"; memoryPercent = 70; }; # Impermanence persist = { enable = true; cache.clean.enable = true; state.files = [ "/etc/machine-id" ]; }; fileSystems."/home".neededForBoot = true; fileSystems.${persistRoot}.neededForBoot = true; boot.initrd.postDeviceCommands = lib.mkAfter '' zfs rollback -r rpool/nixos/root@empty zfs rollback -r rpool/user/home@empty ''; # build hell environment.noXlibs = lib.mkForce false; # minimal profile documentation.nixos.enable = lib.mkForce false; programs.command-not-found.enable = lib.mkForce false; xdg.autostart.enable = lib.mkForce false; xdg.icons.enable = lib.mkForce false; xdg.mime.enable = lib.mkForce false; xdg.sounds.enable = lib.mkForce false; services.udisks2.enable = lib.mkForce false; fonts.enableDefaultFonts = lib.mkForce false; fonts.fonts = [ (pkgs.nerdfonts.override { fonts = [ "FiraCode" "VictorMono" ]; }) ]; security.polkit.enable = true; # security.pam.enableSSHAgentAuth = true; services.zfs = { autoScrub.enable = true; autoScrub.interval = "weekly"; trim.enable = true; trim.interval = "weekly"; }; # hardened networking.firewall.enable = true; networking.firewall.allowedTCPPorts = lib.mkDefault []; networking.firewall.allowedUDPPorts = lib.mkDefault []; systemd.coredump.enable = false; programs.firejail.enable = true; # scudo memalloc is unstable environment.memoryAllocator.provider = lib.mkForce "libc"; # environment.memoryAllocator.provider = "graphene-hardened"; networking.wireless.enable = false; networking.networkmanager.enable = false; networking.hostName = config.device; networking.nameservers = [ "192.168.0.1" ]; networking.defaultGateway = "192.168.0.1"; networking.bridges.br0.interfaces = [ "enp2s0f0" ]; networking.interfaces.br0 = { useDHCP = false; ipv4.addresses = [{ address = "192.168.0.10"; prefixLength = 24; }]; }; networking.extraHosts = '' 127.0.0.1 mail.ataraxiadev.com 127.0.0.1 code.ataraxiadev.com ''; # networking.proxy.default = "http://127.0.0.1:3128"; services.logind.lidSwitch = "lock"; services.logind.lidSwitchDocked = "lock"; services.logind.lidSwitchExternalPower = "lock"; services.timesyncd.enable = lib.mkForce false; services.openntpd.enable = true; networking.timeServers = [ "0.ru.pool.ntp.org" "1.ru.pool.ntp.org" "2.ru.pool.ntp.org" "3.ru.pool.ntp.org" "0.europe.pool.ntp.org" "1.europe.pool.ntp.org" "2.europe.pool.ntp.org" "3.europe.pool.ntp.org" ] ++ options.networking.timeServers.default; home-manager.users.${config.mainuser} = { home.file.".config/libvirt/libvirt.conf".text = '' uri_default = "qemu:///system" ''; home.packages = with pkgs; [ bat podman-compose micro bottom nix-index-update pwgen comma ]; xdg.mime.enable = false; home.stateVersion = "22.11"; }; system.stateVersion = "22.11"; }