{ config, lib, modulesPath, ... } @ args: { networking.hostName = "instance-20221213-1915"; networking.hostId = "746d4523"; imports = [ (modulesPath + "/profiles/qemu-guest.nix") ./systemd-boot.nix ./server.nix ./wireguard/public-server.nix ./services/named-submissive.nix ./services/shitalloverme.nix ./users/remote-build.nix ./services/atticd.nix ./services/minecraft.nix ./services/postgres.nix ./services/mautrix-discord.nix ./services/mautrix-telegram.nix ./services/mautrix-whatsapp.nix ./services/mautrix-signal.nix ./services/synapse.nix ./services/heisenbridge.nix ./services/uptime-kuma.nix ./services/matrix-sliding-sync.nix ./services/reverse-proxy.nix ./wireguard ./zfs.nix ]; boot.initrd.availableKernelModules = ["xhci_pci" "virtio_pci" "usbhid"]; boot.initrd.kernelModules = []; boot.kernelModules = []; boot.extraModulePackages = []; fileSystems."/" = { device = "tank/local/root"; fsType = "zfs"; }; fileSystems."/boot" = { device = "/dev/disk/by-uuid/6557-C4A0"; fsType = "vfat"; }; fileSystems."/nix" = { device = "tank/local/nix"; fsType = "zfs"; }; fileSystems."/persist" = { device = "tank/safe/persist"; fsType = "zfs"; neededForBoot = true; }; fileSystems."/home" = { device = "tank/safe/home"; fsType = "zfs"; }; networking.useDHCP = lib.mkDefault true; # https://grahamc.com/blog/erase-your-darlings boot.initrd.postDeviceCommands = lib.mkAfter '' zfs rollback -r tank/local/root@blank ''; services.openssh = { hostKeys = [ { path = "/persist/ssh/ssh_host_ed25519_key"; type = "ed25519"; } { path = "/persist/ssh/ssh_host_rsa_key"; type = "rsa"; bits = 4096; } ]; }; systemd.tmpfiles.rules = [ "L /var/lib/acme - - - - /persist/var/lib/acme" "L /var/lib/tailscale/tailscaled.state - - - - /persist/var/lib/tailscale/tailscaled.state" "d /build - - - - -" "L /var/lib/ipfs - - - - /persist/var/lib/ipfs" "L /var/lib/uptime-kuma - - - - /persist/var/lib/uptime-kuma" ]; services.postgresql.dataDir = "/persist/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}"; networking.wireguard.interfaces."wg0".ips = ["fd0d:a262:1fa6:e621:746d:4523:5c04:1453/64"]; home-manager.users.darkkirb = import ./home-manager/darkkirb.nix { desktop = false; inherit args; }; nix.settings.cores = 4; nix.settings.max-jobs = 4; nix.settings.system-features = [ "nixos-test" "big-parallel" "benchmark" "gccarch-armv8-a" "gccarch-armv8.1-a" "gccarch-armv8.2-a" "ca-derivations" ]; nix.daemonCPUSchedPolicy = "idle"; nix.daemonIOSchedClass = "idle"; boot.binfmt.emulatedSystems = [ "riscv32-linux" "riscv64-linux" ]; system.stateVersion = "22.11"; sops.secrets."root/.ssh/id_ed25519" = { owner = "root"; path = "/root/.ssh/id_ed25519"; }; sops.secrets."services/ssh/host-key" = { owner = "root"; path = "/etc/secrets/initrd/ssh_host_ed25519_key"; }; sops.age.sshKeyPaths = lib.mkForce ["/persist/ssh/ssh_host_ed25519_key"]; services.bind.forwarders = lib.mkForce []; boot.loader.systemd-boot.configurationLimit = lib.mkForce 1; services.tailscale.useRoutingFeatures = "server"; services.postgresql.settings = { max_connections = 200; shared_buffers = "6GB"; effective_cache_size = "18GB"; maintenance_work_mem = "1536MB"; checkpoint_completion_target = 0.9; wal_buffers = "16MB"; default_statistics_target = 100; random_page_cost = 1.1; effective_io_concurrency = 200; work_mem = "15728kB"; min_wal_size = "1GB"; max_wal_size = "4GB"; max_worker_processes = 4; max_parallel_workers_per_gather = 2; max_parallel_workers = 4; max_parallel_maintenance_workers = 2; }; services.restic.backups.sysbackup.paths = ["/persist"]; }