53 lines
1.2 KiB
Nix
53 lines
1.2 KiB
Nix
{ config, ... }:
|
|
{
|
|
imports = [
|
|
./hardware-configuration.nix
|
|
../../config/base.nix
|
|
../../config/stylix.nix
|
|
];
|
|
my = import ./toggles.nix // {
|
|
nix.cores = 3;
|
|
nix.maxJobs = 8;
|
|
users.nixremote.enable = true;
|
|
users.nixremote.authorizedKeys = [
|
|
../../secrets/ssh/ed25519_nixworkstation.pub
|
|
../../secrets/ssh/ed25519_nixserver.pub
|
|
];
|
|
};
|
|
nix.buildMachines =
|
|
let
|
|
buildMachine = hostName: maxJobs: speedFactor: {
|
|
inherit hostName maxJobs speedFactor;
|
|
system = "x86_64-linux";
|
|
sshUser = "nixremote";
|
|
supportedFeatures = config.my.nix.features;
|
|
};
|
|
in
|
|
[
|
|
(buildMachine "workstation" 8 40)
|
|
(buildMachine "server" 6 17)
|
|
];
|
|
networking = {
|
|
hostName = "miniserver";
|
|
firewall = {
|
|
allowedTCPPorts = [ 2049 ];
|
|
allowedUDPPorts = [ 2049 ];
|
|
};
|
|
};
|
|
nixpkgs.config.permittedInsecurePackages = [ "openssl-1.1.1w" ];
|
|
services = {
|
|
btrfs.autoScrub = {
|
|
enable = true;
|
|
fileSystems = [ "/" ];
|
|
};
|
|
minidlna = {
|
|
enable = false;
|
|
openFirewall = true;
|
|
settings = {
|
|
inotify = "yes";
|
|
media_dir = [ "/srv/pool/" ];
|
|
};
|
|
};
|
|
};
|
|
}
|