{ config, pkgs, ... }: { imports = [ # Include the results of the hardware scan. ./hardware.nix ]; age.secrets.k3s-token = { file = ../../secrets/k3s-token.age; owner = "root"; }; boot = { supportedFilesystems = ["nfs"]; kernelParams = ["cgroup_enable=memory" "cgroup_enable=cpuset" "cgroup_memory=1"]; loader = { systemd-boot.enable = true; efi.canTouchEfiVariables = true; }; }; swapDevices = [ { device = "/var/lib/swapfile"; size = 8 * 1024; } ]; nix = { settings = { auto-optimise-store = true; experimental-features = ["nix-command" "flakes"]; }; gc = { automatic = true; dates = "weekly"; options = "--delete-older-than 30d"; }; # Free up to 1GiB whenever there is less than 100MiB left. extraOptions = '' min-free = ${toString (100 * 1024 * 1024)} max-free = ${toString (1024 * 1024 * 1024)} ''; }; networking = { hostName = "proxmox-node-1"; domain = "gmem.ca"; firewall = { trustedInterfaces = ["tailscale0"]; checkReversePath = "loose"; allowedUDPPorts = [41641]; allowedTCPPorts = [22 80 443 6443 10250]; enable = false; }; nftables.enable = false; }; time.timeZone = "Europe/London"; users.users.gsimmer = { isNormalUser = true; extraGroups = ["wheel"]; packages = with pkgs; [ tree ]; openssh.authorizedKeys.keys = let authorizedKeys = pkgs.fetchurl { url = "https://gmem.ca/ssh"; hash = "sha256-7PpFDgWVfp26c9PuW+2s3O8MBAODtHr4q7WU/l3BoG4="; }; in pkgs.lib.splitString "\n" (builtins.readFile authorizedKeys); }; environment.systemPackages = with pkgs; [ vim wget htop git screen nix-output-monitor tailscale nfs-utils ]; services = { rpcbind.enable = true; openssh.enable = true; tailscale.enable = true; k3s = { enable = true; role = "agent"; serverAddr = "https://100.77.43.133:6443"; tokenFile = config.age.secrets.k3s-token.path; }; qemuGuest.enable = true; }; system.stateVersion = "23.11"; # dId YoU rEaD tHe CoMmEnT? }