Skip to content
/ biome Public

System level configs, see github.com/Lugarun/ecosystem for my user level config.

Notifications You must be signed in to change notification settings

Lugarun/biome

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

68 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Biome

Welcome to Biome, my vpn/selfhosting setup! I am a novice in computer security so don't expect the secret setup to be secure. Here are the features we have so far:

  • everything runs nixos so we have one click deploys (except for the initial one) and updates to all devices on the net
  • tailscale
  • syncthing
  • restic backups

Wireguard base VPN

Right now I use tailscale but I plan on switching to host my own (headscale control server)[https://github.com/juanfont/headscale].

Steps to add new computer to wireguard

  1. Install nixos on the computer with your ssh key authorized for root access
  2. Create Computer Config
  • create computers config under /hosts/$COMPUTER_NAME
  • pull the generated configuration.nix and hardware-configuration.nix files and adjust as needed
  • put computers deploy info in /ops/network.nix and flake.nix
  • make deploy-rs/$COMPUTER_NAME
  1. Add the computers syncthing id to config/syncthing.json, syncing files may take a while
  2. Download the password store repo and copy over the gpg key.
  • gpg2 --export-secret-keys > keys.gpg
  • scp lukas@original_pc:keys.gpg ./
  • gpg2 --import keys.gpg
  • Remove both leftover files
  1. Copy over the password store
  • scp -r lukas@original_pc:.local/share/password-store .local/share/
  1. Add to tailscale sudo tailscale up and then adjust step 2.3
  2. If you included ecosystem with your install then you must also go through the ecosystem readme setup steps.

Installation steps

Install nixos on the computer

Authorize Root SSH Access

Copy this line to the nixos config.

users.users.root.openssh.authorizedKeys.keys = authorizedSSHKeys;

Add to tailscale

You will need to access the computer in order to deploy a new nixos instance to it. If the computer isn't accessible you can add it to Tailscale by adding the modules/tailscale.nix code to the nix config and then running tailscale up to validate the machine.

Create the basic config for the machine

Copy the configuration generated during the nixos install from the machine to the hosts file and adjust it to your needs.

You will need to add the computer to:

  1. /ops/network.nix
  2. /flake.nix

Install the new nixos configuration

Now you can run make deploy-rs/computer to deploy your configuration where computer is your new computer name.

Additional Steps

If you included home manager you will also need to:

Setup syncthing

First add the computer to syncthing.json with a random id. Then deploy to the computer, once it is running get the actual id from localhost:8384 and put it in syncthing.json. Then open the syncthing web interface on all computers trying to connect to each other and accept the notifications. Then wait 2-3 years for the files to sync the first time

TODO Download Password Manager
Install Steam Games

File Setup

I love syncthing but it doesn't play nice with ios. To bridge this gap I tried nextcloud, however the nextcloud external local folder feature is horrible. This means nextcloud won't play nice with syncthing.

I am currently looking into using sftp to sync photos from my iphone to my other devices and using something like filestash or gossa or h5ai for file web access. I also want to setup a nice photo service like lychee.

Restic Campus Onedrive

This is my current backup solution. My school gives it's students free access to 5 TB of onedrive storage. I am using this space as a restic repository to backup my files. Three times a week all of my files on fiasco (my file server) are backed up to the restic server. Here are the initial setup steps.

Setup rclone with onedrive giving the repo a name that matches the later restic config.

rclone config

Then find the rclone config and add it to your secrets.

rclone config file

Finally create a password for your restic backup and add it to your secrets. To manually trigger a backup run

systemctl start restic-backups-uwonedrive.service

Accessing your backups

Make sure rclone can see the backups.

rclone --config secrets/restic/uwonedrive-rclone-config lsd uwonedrive:backups

Make sure rclone config is in the right place.

rclone config file

List snapshots

restic -r rclone:uwonedrive:backups snapshots

Recover snapshots

restic -r rclone:uwonedrive:backupsrestore df2564be --target /tmp/restore-work

Todo

  • secret distribution (uses legacy morph right now)
  • fix mount from nextcloud to syncthing (move things appropriately) on fiasco
  • fix dns leak
  • iphone file sync
  • web file frontend
  • add personal website hosting
  • add calendar

Acknowledgments

This setup is heavily inspired by the following:

About

System level configs, see github.com/Lugarun/ecosystem for my user level config.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published