Removed old stuff(dont use NixOS on desktop anymore) + update
This commit is contained in:
parent
859ffa55e8
commit
53750afbe3
47 changed files with 22 additions and 18286 deletions
|
|
@ -1,148 +0,0 @@
|
|||
{
|
||||
lib,
|
||||
pkgs,
|
||||
inputs,
|
||||
namespace,
|
||||
system,
|
||||
target,
|
||||
format,
|
||||
virtual,
|
||||
systems,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
with lib.custom; {
|
||||
facter.reportPath = ./facter.json;
|
||||
custom = {
|
||||
programs.dolphin = enabled;
|
||||
presets.default = enabled;
|
||||
presets.wayland = enabled;
|
||||
presets.gaming = enabled;
|
||||
hardware = {
|
||||
#nvidia = enabled;
|
||||
bluetooth = enabled;
|
||||
printing = enabled;
|
||||
};
|
||||
|
||||
users = {
|
||||
kylekrein = {
|
||||
enable = true;
|
||||
};
|
||||
andrej = {
|
||||
enable = true;
|
||||
};
|
||||
};
|
||||
|
||||
presets.disko = {
|
||||
ext4Swap = {
|
||||
enable = true;
|
||||
device = "/dev/sda";
|
||||
swapSize = 16;
|
||||
};
|
||||
ext4 = {
|
||||
enable = true;
|
||||
device = "/dev/sdb";
|
||||
mountpoint = "/home/andrej/SteamGames";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
#greeter
|
||||
programs.dankMaterialShell.greeter = {
|
||||
enable = config.${namespace}.windowManagers.niri.enable || config.programs.hyprland.enable;
|
||||
compositor.name =
|
||||
if config.${namespace}.windowManagers.niri.enable
|
||||
then "niri"
|
||||
else "hyprland";
|
||||
configHome = let
|
||||
imp = config.${namespace}.impermanence;
|
||||
in "${
|
||||
if imp.enable
|
||||
then imp.persistentStorage
|
||||
else ""
|
||||
}${config.users.users.andrej.home}";
|
||||
};
|
||||
|
||||
services.flatpak = enabled;
|
||||
security.pam.services.quickshell = {};
|
||||
services.xserver = {
|
||||
enable = true;
|
||||
};
|
||||
programs.hyprland = {
|
||||
enable = true;
|
||||
systemd.setPath = enabled;
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [22 25565];
|
||||
networking.firewall.allowedUDPPorts = [22 25565];
|
||||
|
||||
security.polkit.enable = true;
|
||||
|
||||
security.rtkit.enable = true;
|
||||
services.pipewire = {
|
||||
enable = true;
|
||||
alsa.enable = true;
|
||||
alsa.support32Bit = true;
|
||||
pulse.enable = true;
|
||||
jack.enable = true;
|
||||
};
|
||||
|
||||
programs.kdeconnect.enable = true;
|
||||
programs.kdeconnect.package = lib.mkDefault pkgs.kdePackages.kdeconnect-kde;
|
||||
|
||||
programs.nh = {
|
||||
enable = true;
|
||||
clean.enable = true;
|
||||
clean.extraArgs = "--keep-since 4d --keep 3";
|
||||
flake = "/etc/nixos-config";
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
libreoffice
|
||||
fzf
|
||||
killall
|
||||
eza
|
||||
fd
|
||||
gparted
|
||||
exfatprogs
|
||||
lazygit
|
||||
fastfetch
|
||||
telegram-desktop
|
||||
vlc
|
||||
wl-clipboard
|
||||
git
|
||||
git-credential-manager
|
||||
egl-wayland
|
||||
btop
|
||||
obs-studio
|
||||
blender
|
||||
vscodium-fhs
|
||||
discord
|
||||
solaar
|
||||
element-desktop
|
||||
|
||||
prismlauncher
|
||||
mcpelauncher-ui-qt
|
||||
jdk
|
||||
teams-for-linux
|
||||
];
|
||||
systemd.network.wait-online.enable = lib.mkForce false;
|
||||
networking.wireless.enable = mkForce false;
|
||||
|
||||
networking.networkmanager.enable = true;
|
||||
services.udisks2.enable = true;
|
||||
|
||||
services.zerotierone = {
|
||||
enable = true;
|
||||
joinNetworks = [
|
||||
"a09acf0233dccb4a"
|
||||
"1d71939404962783"
|
||||
"41d49af6c260338d"
|
||||
];
|
||||
};
|
||||
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
system.stateVersion = "24.11";
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
}
|
||||
File diff suppressed because it is too large
Load diff
|
|
@ -1,75 +0,0 @@
|
|||
{
|
||||
lib,
|
||||
pkgs,
|
||||
inputs,
|
||||
namespace,
|
||||
system,
|
||||
target,
|
||||
format,
|
||||
virtual,
|
||||
systems,
|
||||
config,
|
||||
...
|
||||
}: let
|
||||
niri-config = {
|
||||
programs.niri = {
|
||||
settings = {
|
||||
#input.power-key-handling.enable = true;
|
||||
spawn-at-startup = [
|
||||
{
|
||||
command = [
|
||||
"${lib.getExe pkgs.brightnessctl}"
|
||||
"-s 20%"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
in
|
||||
with lib;
|
||||
with lib.custom; {
|
||||
facter.reportPath = ./facter.json;
|
||||
systemd.network.wait-online.enable = lib.mkForce false; #facter
|
||||
|
||||
custom.hardware.hibernation = {
|
||||
enable = false;
|
||||
swapFileOffset = 533760;
|
||||
};
|
||||
custom.presets.disko.impermanenceBtrfsLuks = {
|
||||
enable = true;
|
||||
swapSize = 64;
|
||||
};
|
||||
custom.hardware.framework12 = enabled;
|
||||
custom.hardware.secureBoot = enabled;
|
||||
custom.hardware.tablet.inputDevice = "/dev/input/by-path/platform-gpio-keys.9.auto-event";
|
||||
custom.impermanence = enabled;
|
||||
custom.presets.workstation = enabled;
|
||||
custom.presets.gaming = enabled;
|
||||
custom.windowManagers.niri = enabled;
|
||||
custom.services.ai = {
|
||||
enable = true;
|
||||
models = ["qwq" "llama3.1" "qwen2.5-coder:7b"];
|
||||
ui = disabled;
|
||||
};
|
||||
custom.users.kylekrein = {
|
||||
enable = true;
|
||||
config = niri-config;
|
||||
};
|
||||
environment.systemPackages = with pkgs; [
|
||||
blender
|
||||
video-downloader
|
||||
];
|
||||
|
||||
#services.fprintd.enable = true;
|
||||
#services.fprintd.tod.enable = true;
|
||||
#services.fprintd.tod.driver = pkgs.libfprint-2-tod1-elan;
|
||||
services.power-profiles-daemon.enable = true;
|
||||
services.tlp.enable = false;
|
||||
#Chat host
|
||||
networking.firewall.allowedTCPPorts = [80 443 22 8448 9993 8081];
|
||||
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
system.stateVersion = "25.05";
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
}
|
||||
File diff suppressed because it is too large
Load diff
|
|
@ -1,81 +0,0 @@
|
|||
{
|
||||
lib,
|
||||
pkgs,
|
||||
inputs,
|
||||
namespace,
|
||||
system,
|
||||
target,
|
||||
format,
|
||||
virtual,
|
||||
systems,
|
||||
config,
|
||||
...
|
||||
}: let
|
||||
niri-outputs = {
|
||||
programs.niri.settings.outputs = {
|
||||
"DP-1" = {
|
||||
scale = 1.6;
|
||||
position.x = 1600;
|
||||
position.y = 0;
|
||||
};
|
||||
"DP-3" = {
|
||||
scale = 1.6;
|
||||
position.x = 0;
|
||||
position.y = 0;
|
||||
};
|
||||
};
|
||||
};
|
||||
in
|
||||
with lib;
|
||||
with lib.${namespace}; {
|
||||
facter.reportPath = ./facter.json;
|
||||
systemd.network.wait-online.enable = lib.mkForce false; #facter
|
||||
|
||||
custom.hardware.nvidia = enabled;
|
||||
services.scx.enable = true; # by default uses scx_rustland scheduler
|
||||
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_cachyos;
|
||||
system.modulesTree = [pkgs.linux_cachyos.modules];
|
||||
custom.impermanence = enabled;
|
||||
custom.presets.workstation = enabled;
|
||||
custom.presets.gaming = enabled;
|
||||
custom.presets.disko.impermanenceBtrfs = {
|
||||
enable = true;
|
||||
device = "/dev/nvme0n1";
|
||||
swapSize = 32;
|
||||
};
|
||||
custom.windowManagers.niri = enabled;
|
||||
custom.services.ai = {
|
||||
enable = true;
|
||||
models = ["qwq" "llama3.1" "qwen2.5-coder:7b" "gpt-oss:20b" "gpt-oss:120b"];
|
||||
};
|
||||
|
||||
custom.users = {
|
||||
kylekrein = {
|
||||
enable = true;
|
||||
config = niri-outputs;
|
||||
};
|
||||
tania = {
|
||||
inherit (config.custom.users.kylekrein) enable config;
|
||||
};
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
blender
|
||||
];
|
||||
|
||||
services.zerotierone = {
|
||||
enable = true;
|
||||
port = 9994;
|
||||
joinNetworks = [
|
||||
"A84AC5C10AD269CA"
|
||||
"db64858fed285e0f"
|
||||
];
|
||||
};
|
||||
#Chat host
|
||||
networking.firewall.allowedTCPPorts = [80 443 22 8448 9993 8081] ++ [config.services.zerotierone.port];
|
||||
networking.firewall.allowedUDPPorts = [config.services.zerotierone.port];
|
||||
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
system.stateVersion = "25.05";
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
}
|
||||
File diff suppressed because it is too large
Load diff
|
|
@ -1,155 +0,0 @@
|
|||
{
|
||||
lib,
|
||||
pkgs,
|
||||
inputs,
|
||||
namespace,
|
||||
system,
|
||||
target,
|
||||
format,
|
||||
virtual,
|
||||
systems,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
with lib.custom; {
|
||||
imports = lib.snowfall.fs.get-non-default-nix-files ./.;
|
||||
custom = {
|
||||
presets.default = enabled;
|
||||
users.kylekrein = {
|
||||
enable = true;
|
||||
config = {};
|
||||
};
|
||||
services.conduwuit = {
|
||||
enable = true;
|
||||
#user = "turnserver";
|
||||
settings = {
|
||||
global = {
|
||||
server_name = "kylekrein.com";
|
||||
well_known = {
|
||||
server = "matrix.kylekrein.com:443";
|
||||
client = "https://matrix.kylekrein.com";
|
||||
};
|
||||
port = [6167];
|
||||
trusted_servers = ["matrix.org"];
|
||||
allow_registration = false;
|
||||
registration_token = null; #nix shell nixpkgs#openssl -c openssl rand -base64 48 | tr -d '/+' | cut -c1-64
|
||||
allow_federation = true;
|
||||
allow_encryption = true;
|
||||
|
||||
allow_local_presence = true;
|
||||
require_auth_for_profile_requests = true;
|
||||
};
|
||||
};
|
||||
extraEnvironment = {
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.caddy = {
|
||||
enable = true;
|
||||
#virtualHosts."kylekrein.com:8448".extraConfig = ''
|
||||
# reverse_proxy http://localhost:6167
|
||||
#'';
|
||||
virtualHosts."kylekrein.com".extraConfig = ''
|
||||
handle_path /.well-known/matrix/* {
|
||||
|
||||
header Access-Control-Allow-Origin *
|
||||
|
||||
## `Content-Type: application/json` isn't required by the matrix spec
|
||||
## but some browsers (firefox) and some other tooling might preview json
|
||||
## content prettier when they are made aware via Content-Type
|
||||
header Content-Type application/json
|
||||
|
||||
respond /client `{ "m.homeserver": { "base_url": "https://matrix.kylekrein.com/" }, "org.matrix.msc3575.proxy": { "url": "https://matrix.kylekrein.com/"}, "org.matrix.msc4143.rtc_foci": [ { "type": "livekit", "livekit_service_url": "https://livekit-jwt.call.matrix.org" } ] }`
|
||||
|
||||
respond /server `{ "m.server": "matrix.kylekrein.com:443" }`
|
||||
|
||||
## return http/404 if nothing matches
|
||||
respond 404
|
||||
}
|
||||
respond /.well-known/element/element.json `{"call":{"widget_url":"https://call.element.io"}}`
|
||||
reverse_proxy * http://localhost:6167
|
||||
'';
|
||||
# reverse_proxy /.well-known/* http://localhost:6167
|
||||
#'';
|
||||
virtualHosts."matrix.kylekrein.com".extraConfig = ''
|
||||
handle_path /.well-known/matrix/* {
|
||||
|
||||
header Access-Control-Allow-Origin *
|
||||
|
||||
## `Content-Type: application/json` isn't required by the matrix spec
|
||||
## but some browsers (firefox) and some other tooling might preview json
|
||||
## content prettier when they are made aware via Content-Type
|
||||
header Content-Type application/json
|
||||
|
||||
respond /client `{ "m.homeserver": { "base_url": "https://matrix.kylekrein.com/" }, "org.matrix.msc3575.proxy": { "url": "https://matrix.kylekrein.com/"}, "org.matrix.msc4143.rtc_foci": [ { "type": "livekit", "livekit_service_url": "https://livekit-jwt.call.matrix.org" } ] }`
|
||||
|
||||
respond /server `{ "m.server": "https://matrix.kylekrein.com" }`
|
||||
|
||||
## return http/404 if nothing matches
|
||||
respond 404
|
||||
}
|
||||
respond /.well-known/element/element.json `{"call":{"widget_url":"https://call.element.io"}}`
|
||||
reverse_proxy * http://localhost:6167
|
||||
'';
|
||||
virtualHosts."uptime.kylekrein.com".extraConfig = ''
|
||||
reverse_proxy * http://localhost:4621
|
||||
'';
|
||||
#virtualHosts."gitlab.kylekrein.com".extraConfig = ''
|
||||
# reverse_proxy * unix//run/gitlab/gitlab-workhorse.socket
|
||||
#'';
|
||||
};
|
||||
services.uptime-kuma = {
|
||||
enable = true;
|
||||
settings = {
|
||||
PORT = "4621";
|
||||
HOST = "127.0.0.1";
|
||||
};
|
||||
appriseSupport = true;
|
||||
};
|
||||
|
||||
#Chat host
|
||||
networking.firewall.allowedTCPPorts = [80 443 22 8448];
|
||||
networking.firewall.allowedUDPPorts = [3478 5349];
|
||||
#sops.secrets."services/conduwuit" = {mode = "0755";};
|
||||
|
||||
#sops.secrets."services/gitlab/dbPassword" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/rootPassword" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/secret" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/otpsecret" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/dbsecret" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/oidcKeyBase" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/activeRecordSalt" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/activeRecordPrimaryKey" = {owner = "gitlab";};
|
||||
#sops.secrets."services/gitlab/activeRecordDeterministicKey" = {owner = "gitlab";};
|
||||
services.gitlab = {
|
||||
enable = false;
|
||||
host = "gitlab.kylekrein.com";
|
||||
https = true;
|
||||
port = 443;
|
||||
#statePath = "/persist/gitlab/state";
|
||||
backup.startAt = "3:00";
|
||||
databasePasswordFile = config.sops.secrets."services/gitlab/dbPassword".path;
|
||||
initialRootPasswordFile = config.sops.secrets."services/gitlab/rootPassword".path;
|
||||
secrets = {
|
||||
secretFile = config.sops.secrets."services/gitlab/secret".path;
|
||||
otpFile = config.sops.secrets."services/gitlab/otpsecret".path;
|
||||
dbFile = config.sops.secrets."services/gitlab/dbsecret".path;
|
||||
jwsFile = config.sops.secrets."services/gitlab/oidcKeyBase".path; #pkgs.runCommand "oidcKeyBase" {} "${pkgs.openssl}/bin/openssl genrsa 2048 > $out";
|
||||
activeRecordSaltFile = config.sops.secrets."services/gitlab/activeRecordSalt".path;
|
||||
activeRecordPrimaryKeyFile = config.sops.secrets."services/gitlab/activeRecordPrimaryKey".path;
|
||||
activeRecordDeterministicKeyFile = config.sops.secrets."services/gitlab/activeRecordDeterministicKey".path;
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.gitlab-backup.environment.BACKUP = "dump";
|
||||
boot.tmp.cleanOnBoot = true;
|
||||
boot.loader.grub.enable = true;
|
||||
boot.loader.grub.device = "/dev/sda";
|
||||
boot.loader.systemd-boot.enable = mkForce false;
|
||||
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
system.stateVersion = "24.11";
|
||||
# ======================== DO NOT CHANGE THIS ========================
|
||||
}
|
||||
|
|
@ -1,32 +0,0 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}: {
|
||||
imports = [
|
||||
(modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = ["ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod"];
|
||||
boot.initrd.kernelModules = [];
|
||||
boot.kernelModules = [];
|
||||
boot.extraModulePackages = [];
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/4f7e141c-0fc7-415a-815d-944b36f93806";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
swapDevices = [];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.eth0.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
}
|
||||
|
|
@ -1,48 +0,0 @@
|
|||
{lib, ...}: {
|
||||
# This file was populated at runtime with the networking
|
||||
# details gathered from the active system.
|
||||
networking = {
|
||||
nameservers = [
|
||||
"8.8.8.8"
|
||||
];
|
||||
defaultGateway = "172.31.1.1";
|
||||
defaultGateway6 = {
|
||||
address = "";
|
||||
interface = "eth0";
|
||||
};
|
||||
dhcpcd.enable = false;
|
||||
usePredictableInterfaceNames = lib.mkForce false;
|
||||
interfaces = {
|
||||
eth0 = {
|
||||
ipv4.addresses = [
|
||||
{
|
||||
address = "91.99.0.169";
|
||||
prefixLength = 32;
|
||||
}
|
||||
];
|
||||
ipv6.addresses = [
|
||||
{
|
||||
address = "fe80::9400:4ff:fe30:830e";
|
||||
prefixLength = 64;
|
||||
}
|
||||
];
|
||||
ipv4.routes = [
|
||||
{
|
||||
address = "172.31.1.1";
|
||||
prefixLength = 32;
|
||||
}
|
||||
];
|
||||
ipv6.routes = [
|
||||
{
|
||||
address = "";
|
||||
prefixLength = 128;
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
services.udev.extraRules = ''
|
||||
ATTR{address}=="96:00:04:30:83:0e", NAME="eth0"
|
||||
|
||||
'';
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue