{ modulesPath, lib, pkgs, ... }: { system.stateVersion = "24.11"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; imports = [ (modulesPath + "/profiles/qemu-guest.nix") ]; boot = { initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "ahci" "sd_mod" "sr_mod" "virtio_blk" ]; initrd.kernelModules = [ ]; kernelPackages = pkgs.linuxPackages_latest; kernelModules = [ "kvm-amd" ]; extraModulePackages = [ ]; loader.grub = { enable = true; device = "/dev/vda"; }; }; nix = { package = pkgs.lix; settings = { experimental-features = [ "nix-command" "flakes" ]; }; }; zramSwap = { enable = true; algorithm = "zstd"; memoryPercent = 50; }; fileSystems."/" = { device = "/dev/disk/by-uuid/09e65ff9-2195-41d8-b6a4-671c306742c3"; fsType = "ext4"; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/FED3-A372"; fsType = "vfat"; options = [ "fmask=0022" "dmask=0022" ]; }; networking = { enableIPv6 = false; # Had to disable for now due to problems with resolving firewall = { allowedTCPPorts = [ 80 # HTTP 443 # HTTPS 222 # git over ssh ]; allowedUDPPorts = [ 25565 # minecraft ]; }; hostName = "theia"; nameservers = [ "1.1.1.1" "8.8.8.8" "9.9.9.9" ]; domain = "theia.blahai.gay"; useDHCP = lib.mkDefault false; defaultGateway = { address = "178.63.247.183"; interface = "ens3"; }; interfaces = { ens3 = { ipv4 = { addresses = [{ address = "178.63.118.252"; prefixLength = 32; }]; routes = [{ address = "178.63.247.183"; prefixLength = 32; }]; }; }; }; }; services = { earlyoom = { enable = true; extraArgs = let avoid = lib.concatStringsSep "|" [ "cryptsetup" "dbus-.*" "gpg-agent" "ssh-agent" "sshd" "systemd" "systemd-.*" "bash" "fish" "n?vim" ]; prefer = lib.concatStringsSep "|" [ "dotnet" "java.*" "nix" "npm" "node" ]; in [ "-g" "--avoid '(^|/)(${avoid})'" # things that we want to avoid killing "--prefer '(^|/)(${prefer})'" # things we want to remove fast ]; }; caddy = { enable = true; virtualHosts = { "git.blahai.gay" = { extraConfig = '' reverse_proxy localhost:3000 ''; }; "vault.blahai.gay" = { extraConfig = '' reverse_proxy localhost:8222 { header_up X-Real-IP {remote_host} } ''; }; "search.blahai.gay" = { extraConfig = '' reverse_proxy localhost:8888 ''; }; "kuma.blahai.gay" = { extraConfig = '' reverse_proxy localhost:3001 ''; }; "status.blahai.gay" = { extraConfig = '' reverse_proxy localhost:19999 ''; }; }; }; uptime-kuma = { enable = true; settings = { PORT = "3001"; }; }; netdata = { enable = true; config.global = { "memory mode" = "ram"; "debug log" = "none"; "access log" = "none"; "error log" = "syslog"; }; }; forgejo = { package = pkgs.forgejo; enable = true; settings = { DEFAULT.APP_NAME = "githai"; federation.ENABLED = true; server = { ROOT_URL = "https://git.blahai.gay"; DOMAIN = "git.blahai.gay"; SSH_PORT = 222; SSH_LISTEN_PORT = 222; }; }; }; vaultwarden = { enable = true; config = { DOMAIN = "https://vault.blahai.gay"; ROCKET_PORT = 8222; }; }; searx = { enable = true; redisCreateLocally = true; settings = { use_default_settings = true; server = { port = 8888; secret_key = "7360d3df7c08ce681cf6d5122e3e182de2c5205e962766abd3e6dfc8dec1b683"; }; ui = { infinite_scroll = true; }; general = { instance_name = "searchai"; debug = false; }; search = { safe_search = 0; autocomplete = "google"; default_lang = "en"; }; }; }; openssh = { enable = true; openFirewall = true; settings = { PasswordAuthentication = false; }; }; fail2ban = { enable = true; maxretry = 5; bantime = "24h"; # Ban IPs for one day on the first ban bantime-increment = { enable = true; # Enable increment of bantime after each violation overalljails = true; # Calculate the bantime based on all the violations }; }; }; programs = { nix-ld.enable = true; }; users.users.root = { openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILPbmiNqoyeKXk/VopFm2cFfEnV4cKCFBhbhyYB69Fuu" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILLqPq70t6RbnI8UejEshYcfBP66I4OrLFjvGLLfIEXD" ]; initialHashedPassword = "$y$j9T$TzqbL4iMGLjli6EEXfRCZ0$AhFJ4iCFxRlstth5owic3M5nq74Sp1qhtctjSBcgAl8"; }; users.users.pingu = { isNormalUser = true; extraGroups = [ "wheel" ]; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILPbmiNqoyeKXk/VopFm2cFfEnV4cKCFBhbhyYB69Fuu" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILLqPq70t6RbnI8UejEshYcfBP66I4OrLFjvGLLfIEXD" ]; initialHashedPassword = "$y$j9T$cxwKGmzYyC1eLeIysr8r/.$dsxxxV4NvXY.Wpd9LO.RiuMQuy2lYyy2HGrk52BJX08"; }; users.users.minecraft = { isNormalUser = true; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILPbmiNqoyeKXk/VopFm2cFfEnV4cKCFBhbhyYB69Fuu" # nyx "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILLqPq70t6RbnI8UejEshYcfBP66I4OrLFjvGLLfIEXD" # laptop "ssh-rsa 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" # slogo laptop "ssh-rsa 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" # slogo desktop ]; packages = with pkgs; [ openjdk21 openjdk17 screen ]; initialHashedPassword = "$y$j9T$KpQYYLB6eWfHAUo9.o/uy1$gnj/UlWLrx5XBZDm2GNdjHs2G5D3XxxqqtrCIf5MX43"; }; users.users.shizu = { isNormalUser = true; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ2zPly//j7KGHTqd/KZ7Hcbw8vnNJzAZCbYcKBzx2jW" ]; }; users.users.nino = { isNormalUser = true; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPrTDcvk5FMuNsKEJmMpKvuYyrj/p7EBRgHhXOUcqPmi" ]; }; environment.systemPackages = with pkgs; [ git curl bat neovim btop zip jq busybox fish ]; }