Compare commits

..

No commits in common. "53fc3f21001886fa4dc7358cd6dd46168208c62a" and "855b932cbd4a085d9418de60d96e2e599cddcd7b" have entirely different histories.

17 changed files with 65 additions and 93 deletions

24
flake.lock generated
View file

@ -296,11 +296,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1749832440, "lastModified": 1749195551,
"narHash": "sha256-lfxhuxAaHlYFGr8yOrAXZqdMt8PrFLzjVqH9v3lQaoY=", "narHash": "sha256-W5GKQHgunda/OP9sbKENBZhMBDNu2QahoIPwnsF6CeM=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "db030f62a449568345372bd62ed8c5be4824fa49", "rev": "4602f7e1d3f197b3cb540d5accf5669121629628",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -312,11 +312,11 @@
}, },
"nixos-unstable": { "nixos-unstable": {
"locked": { "locked": {
"lastModified": 1749794982, "lastModified": 1749285348,
"narHash": "sha256-Kh9K4taXbVuaLC0IL+9HcfvxsSUx8dPB5s5weJcc9pc=", "narHash": "sha256-frdhQvPbmDYaScPFiCnfdh3B/Vh81Uuoo0w5TkWmmjU=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "ee930f9755f58096ac6e8ca94a1887e0534e2d81", "rev": "3e3afe5174c561dee0df6f2c2b2236990146329f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -328,11 +328,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1749727998, "lastModified": 1749237914,
"narHash": "sha256-mHv/yeUbmL91/TvV95p+mBVahm9mdQMJoqaTVTALaFw=", "narHash": "sha256-N5waoqWt8aMr/MykZjSErOokYH6rOsMMXu3UOVH5kiw=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "fd487183437963a59ba763c0cc4f27e3447dd6dd", "rev": "70c74b02eac46f4e4aa071e45a6189ce0f6d9265",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -403,11 +403,11 @@
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1749908208, "lastModified": 1749389855,
"narHash": "sha256-0nf9P4kRAzsBvf5jbY7M3NlnGSwBzU50kJAYGZH5Ez4=", "narHash": "sha256-//wZBnlBJ7Ki5/ZdafiAZwVFZd/2HhKqEbOupo/HcRA=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "67c8eca32f1baf158ffb9a56f28a2fc8e9852fb0", "rev": "bf5ab9df57a3d77847289c39c3a537bd6e6ac6f4",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -1,37 +1,37 @@
{pkgs, rootPath, lib, ...}:{ {pkgs, ...}:{
imports = [ imports = [
./boot.nix ./boot.nix
./hardware-configuration.nix ./hardware-configuration.nix
(rootPath + /system_profiles/server.nix)
(rootPath + /modules/pkg_mgrmnt/unattended-updates.nix)
(rootPath + /modules/hosting/wordpress-simple/kiezpalme.nix) #../../modules/hosting/wordpress-simple/kiezpalme.nix
(rootPath + /modules/hosting/wordpress-simple/pertineo.nix) #../../modules/hosting/wordpress-simple/pertineo.nix
#(rootPath + /modules/hosting/wordpress.nix) ../../modules/hosting/wordpress.nix
../../modules/sec_auth/ssh-server.nix
../../system_profiles/server.nix
]; ];
services.mysql = { #services.mysql = {
# enable = true;
# package = pkgs.mariadb;
#};
services.cWordpress."example-site" = {
enable = true; enable = true;
package = pkgs.mariadb; sitePort = 80;
settings.mysqld.bind-address = "127.0.0.1";
}; };
#services.cWordpress."example-site" = { services.cWordpress."example-site2" = {
# enable = true; enable = true;
# sitePort = 80; sitePort = 81;
#}; };
#services.cWordpress."example-site2" = { services.openssh.ports = [11522];
# enable = true;
# sitePort = 81;
#};
services.openssh.ports = lib.mkForce [11522];
users = let users = let
username = "root"; username = "root";
in { in {
users."${username}".openssh.authorizedKeys.keyFiles = [ users."${username}".openssh.authorizedKeys.keyFiles = [
(rootPath + /certificates/id_ed25519_ext-julia.pub) ../../certificates/id_ed25519_ext-julia.pub
]; ];
}; };
} }

View file

@ -6,6 +6,10 @@
modulesPath, modulesPath,
... ...
}: { }: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot = { boot = {
initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"]; initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
initrd.kernelModules = []; initrd.kernelModules = [];

View file

@ -1,18 +1,20 @@
{rootPath, ...}: { {
imports = [ imports = [
./boot.nix ./boot.nix
./hardware-configuration.nix ./hardware-configuration.nix
(rootPath + /system_profiles/server.nix)
(rootPath + /modules/game/server/luanti) ../../modules/game/server/luanti
(rootPath + /modules/pkg_mgrmnt/unattended-updates.nix) ../../modules/sec_auth/ssh-server.nix
../../modules/pkg_mgrmnt/unattended-updates.nix
../../system_profiles/server.nix
]; ];
users = let users = let
username = "root"; username = "root";
in { in {
users."${username}".openssh.authorizedKeys.keyFiles = [ users."${username}".openssh.authorizedKeys.keyFiles = [
(rootPath + /certificates/id_ed25519_game-luanti.pub) ../../certificates/id_ed25519_game-luanti.pub
]; ];
}; };

View file

@ -6,6 +6,9 @@
modulesPath, modulesPath,
... ...
}: { }: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot = { boot = {
initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"]; initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
initrd.kernelModules = []; initrd.kernelModules = [];

13
hosts/jitsi/default.nix Normal file
View file

@ -0,0 +1,13 @@
{...}: {
nixpkgs.config = {
# Disable if you don't want unfree packages
allowUnfree = true;
};
imports = [
./hardware-configuration.nix
../../system_profiles/defaults.nix
../../system_profiles/mini-container.nix
];
}

View file

@ -0,0 +1,3 @@
{lib, ...}: {
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
}

View file

@ -1,7 +0,0 @@
{rootPath, ...}: {
imports = [
./hardware-configuration.nix
(rootPath + /system_profiles/server.nix)
];
}

View file

@ -1,33 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
lib,
modulesPath,
...
}: {
boot = {
initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
initrd.kernelModules = [];
kernelModules = [];
extraModulePackages = [];
};
fileSystems."/" = {
device = "/dev/disk/by-uuid/d290e12c-d93c-45f6-b737-135b551c1951";
fsType = "ext4";
};
swapDevices = [
{device = "/dev/disk/by-uuid/8c56f52e-568a-4e03-b22c-6d1c7de7c118";}
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.ens18.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
}

View file

@ -11,6 +11,7 @@
./locale.nix ./locale.nix
./networking.nix ./networking.nix
#./plymouth.nix # increases boot time too much #./plymouth.nix # increases boot time too much
#./serial-console.nix # probably only for servers
./theming.nix ./theming.nix
]; ];
} }

View file

@ -15,11 +15,11 @@ in {
nixosConfigurations = builtins.mapAttrs (hostName: hostOptions: (hostHelper hostName hostOptions)) { nixosConfigurations = builtins.mapAttrs (hostName: hostOptions: (hostHelper hostName hostOptions)) {
crocoite = {stateVersion = "24.05";}; crocoite = {stateVersion = "24.05";};
#srv-videoconf = {stateVersion = "24.11";}; #jitsi = {stateVersion = "24.11";};
game-luanti = {stateVersion = "25.05";}; game-luanti = {stateVersion = "25.05";};
ext-julia = {stateVersion = "25.05";}; #ext-julia = {stateVersion = "24.11";};
}; };
# Your custom packages # Your custom packages

View file

@ -1,5 +0,0 @@
{
system = {
rebuild.enableNg = false;
};
}

View file

@ -1,6 +0,0 @@
{modulesPath, ...}; {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
services.qemuGuest.enable = true;
}

View file

@ -1,7 +1,6 @@
{ {
imports = [ imports = [
./components/nix-defaults.nix ./components/nix-defaults.nix
#./components/nixpkgs-ng.nix
./importers/desktop.nix ./importers/desktop.nix
./importers/general.nix ./importers/general.nix

View file

@ -1,7 +1,6 @@
{rootPath, ...}: { {rootPath, ...}: {
imports = [ imports = [
(rootPath + /modules/customisation.nix) (rootPath + /modules/customisation.nix)
(rootPath + /modules/sec_auth/ssh-server.nix)
(rootPath + /modules/software/neovim.nix) (rootPath + /modules/software/neovim.nix)
(rootPath + /modules/software/packages/core.nix) (rootPath + /modules/software/packages/core.nix)
]; ];

View file

@ -2,7 +2,6 @@
imports = [ imports = [
./components/minify.nix ./components/minify.nix
./components/nix-defaults.nix ./components/nix-defaults.nix
./components/qemu.nix
./importers/general.nix ./importers/general.nix
./importers/server.nix ./importers/server.nix