Begin Dendritic rewrite

This commit is contained in:
2026-03-06 16:24:53 -06:00
parent f3a90a0fe8
commit c1684a80f7
99 changed files with 4375 additions and 4643 deletions

3
.gitmodules vendored
View File

@@ -4,6 +4,3 @@
[submodule "machines/laptop"] [submodule "machines/laptop"]
path = machines/laptop path = machines/laptop
url = ssh://gitea@gitea.esotericbytes.com:2222/Blunkall-Technologies/laptop url = ssh://gitea@gitea.esotericbytes.com:2222/Blunkall-Technologies/laptop
[submodule "machines/android"]
path = machines/android
url = ssh://gitea@gitea.esotericbytes.com:2222/Blunkall-Technologies/android

7
flake-parts.nix Normal file
View File

@@ -0,0 +1,7 @@
{ inputs, ... }: {
imports = [
inputs.home-manager.flakeModules.home-manager
inputs.disko.flakeModules.default
];
}

180
flake.nix
View File

@@ -21,6 +21,9 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
flake-parts.url = "github:hercules-ci/flake-parts";
import-tree.url = "github:vic/import-tree";
firefox-addons = { firefox-addons = {
url = "gitlab:rycee/nur-expressions?dir=pkgs/firefox-addons"; url = "gitlab:rycee/nur-expressions?dir=pkgs/firefox-addons";
@@ -29,179 +32,22 @@
nix-minecraft.url = "github:Infinidoge/nix-minecraft"; nix-minecraft.url = "github:Infinidoge/nix-minecraft";
#simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-25.11";
hyprland.url = "git+https://github.com/hyprwm/Hyprland?submodules=1"; hyprland.url = "git+https://github.com/hyprwm/Hyprland?submodules=1";
nixvim.url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Moirai"; nixvim.url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Moirai";
aurora.url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Aurora";
self.submodules = true; self.submodules = true;
}; };
outputs = { self, nixpkgs, home-manager, ... } @ inputs: { outputs = { ... } @ inputs:
inputs.flake-parts.lib.mkFlake { inherit inputs; }
profiles = let (inputs.import-tree [
dir = builtins.readDir ./profiles; ./profiles
filtered = builtins.filter (x: dir.${x} == "directory") (builtins.attrNames dir); ./homes
in (builtins.listToAttrs ./machines
(builtins.map
(name: ({
inherit name;
value = { ... }: {
imports = [
./system ./system
./profiles/${name} ./templates/default.nix
]; ]);
};
})) filtered)
);
homes = let
dir = builtins.readDir ./homes;
filtered = builtins.filter (x: dir.${x} == "directory") (builtins.attrNames dir);
in (builtins.listToAttrs
(builtins.map
(name: ({
inherit name;
value = { ... } @ exputs: {
imports = [ (import ./homes/${name}/home-manager (exputs // inputs)) ];
};
})) filtered)
);
iso = (nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = {
inputs = inputs // {
nathan = self.homes.nathan;
inherit self;
};
};
modules = [
self.profiles.iso
];
}).config.system.build.isoImage;
templates = {
nixos = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./templates/nixos;
};
home-manager = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./templates/home-manager;
};
nix-on-droid = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./templates/nix-on-droid;
};
machines = let
dir = builtins.readDir ./machines;
filtered = builtins.filter (x: dir.${x} == "directory") (builtins.attrNames dir);
in (builtins.listToAttrs
(builtins.map
(name: ({
inherit name;
value = {
welcomeText = ''
#Welcome to Olympus!
##Warning:
This is a config for ${name}, an established machine!
It may require significant alterations to be usable!
'';
description = ''
Generate this where you want your config.
'';
path = ./machines/${name};
};
})) filtered)
);
homes = let
dir = builtins.readDir ./homes;
filtered = builtins.filter (x: dir.${x} == "directory") (builtins.attrNames dir);
in (builtins.listToAttrs
(builtins.map
(name: ({
inherit name;
value = {
welcomeText = ''
#Welcome home, ${name}!
Your config is right here.
'';
description = ''
Generate this where you want your config.
'';
path = ./homes/${name};
};
})) filtered)
);
default = self.templates.nixos;
};
nixosConfigurations = let
dir = builtins.readDir ./machines;
filtered = builtins.filter (x: dir.${x} == "directory" && x != "android") (builtins.attrNames dir);
in (builtins.listToAttrs
(builtins.map
(name: ({
inherit name;
value = nixpkgs.lib.nixosSystem {
specialArgs = inputs;
modules = [
{ sysconfig.host = name; }
./machines/${name}
self.profiles.${name}
];
};
})) filtered)
);
};
} }

View File

@@ -1,40 +0,0 @@
{
description = "Home-Manager Configuration";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
home-manager = {
url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs";
};
olympus = {
url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Olympus";
inputs.nixpkgs.follows = "nixpkgs";
inputs.home-manager.follows = "home-manager";
};
};
outputs = { self, nixpkgs, home-manager, olympus, ... } @ inputs: {
homeConfigurations = {
nathan = home-manager.lib.homeManagerConfiguration {
pkgs = import nixpkgs {
system = builtins.currentSystem;
};
modules = [
olympus.homes.nathan
./home.nix
];
extraSpecialArgs = {
inherit inputs;
};
};
};
};
}

View File

@@ -1,11 +1,8 @@
{ config, lib, pkgs, inputs, ... }: { { inputs, ... }: {
imports = let flake.homeModules.nathan = { config, lib, pkgs, ... }: {
dir = builtins.readDir ./.;
in (builtins.map (x: ./${x}) (builtins.filter imports = [
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
)) ++ [
inputs.sops-nix.homeManagerModules.sops inputs.sops-nix.homeManagerModules.sops
]; ];
@@ -47,9 +44,11 @@
hyprland.enable = lib.mkDefault config.homeconfig.graphical; hyprland.enable = lib.mkDefault config.homeconfig.graphical;
hyprlock.enable = lib.mkDefault config.homeconfig.hyprland.enable; hyprlock.enable = lib.mkDefault config.homeconfig.hyprland.enable;
wal.enable = lib.mkDefault config.homeconfig.graphical; wal.enable = lib.mkDefault config.homeconfig.graphical;
hyprpanel.enable = lib.mkDefault config.homeconfig.hyprland.enable; #hyprpanel.enable = lib.mkDefault config.homeconfig.hyprland.enable;
rofi.enable = lib.mkDefault config.homeconfig.hyprland.enable; rofi.enable = lib.mkDefault config.homeconfig.hyprland.enable;
firefox.enable = lib.mkDefault config.homeconfig.graphical; firefox.enable = lib.mkDefault config.homeconfig.graphical;
aurora.enable = lib.mkDefault config.homeconfig.hyprland.enable;
}; };
home.username = lib.mkDefault config.homeconfig.name; home.username = lib.mkDefault config.homeconfig.name;
@@ -111,4 +110,5 @@
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
home.file = { home.file = {
".config/hypr" = lib.mkIf config.homeconfig.hyprland.enable { source = ./hypr; recursive = true; }; ".config/hypr" = lib.mkIf config.homeconfig.hyprland.enable { source = ./hypr; recursive = true; };
@@ -9,4 +11,5 @@
"Pictures/Wallpaper" = lib.mkIf config.homeconfig.graphical { source = ./Wallpaper; recursive = true; }; "Pictures/Wallpaper" = lib.mkIf config.homeconfig.graphical { source = ./Wallpaper; recursive = true; };
}; };
};
} }

View File

@@ -1,5 +1,7 @@
{ config, lib, pkgs, inputs, ... }: let { inputs, ... }: {
system = "x86_64-linux";
flake.homeModules.nathan = { config, lib, pkgs, ... }: let
system = pkgs.stdenv.hostPlatform;
pkgs-us = import inputs.nixpkgs-us { pkgs-us = import inputs.nixpkgs-us {
inherit system; inherit system;
@@ -8,10 +10,6 @@
in { in {
imports = [
./scripts
];
options.homeconfig.minimal = with lib; options.mkOption { options.homeconfig.minimal = with lib; options.mkOption {
type = with types; bool; type = with types; bool;
default = false; default = false;
@@ -117,4 +115,5 @@
]; ];
}) })
]; ];
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, inputs, ... }: let { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, inputs, ... }: let
system = "x86_64-linux"; system = "x86_64-linux";
@@ -131,5 +133,6 @@
]; ];
}) })
]; ];
};
} }

View File

@@ -0,0 +1,17 @@
{ ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
options.homeconfig.aurora.enable = with lib; mkOption {
type = with types; bool;
default = false;
};
config = lib.mkIf config.homeconfig.aurora.enable {
programs.aurora = {
enable = true;
};
};
};
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
options.homeconfig.calcurse.enable = lib.options.mkOption { options.homeconfig.calcurse.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -11,4 +13,5 @@
libnotify libnotify
]; ];
}; };
};
} }

View File

@@ -1,12 +1,6 @@
{ config, lib, pkgs, inputs, ... }: { { ... }: {
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
flake.homeModules.nathan = { config, lib, pkgs, inputs, ... }: {
config = { config = {
@@ -16,4 +10,5 @@
home.sessionVariables.EDITOR = "nvim"; home.sessionVariables.EDITOR = "nvim";
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, inputs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, inputs, ... }: {
options.homeconfig.firefox.enable = lib.options.mkOption { options.homeconfig.firefox.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -57,4 +59,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
options.homeconfig.git.enable = lib.options.mkOption { options.homeconfig.git.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -44,4 +46,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
options.homeconfig.hyprland.enable = lib.options.mkOption { options.homeconfig.hyprland.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -48,4 +50,5 @@
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
options.homeconfig.hyprlock.enable = lib.options.mkOption { options.homeconfig.hyprlock.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -49,4 +51,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
options.homeconfig.hyprpanel.enable = with lib; mkOption { options.homeconfig.hyprpanel.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
@@ -11,4 +13,5 @@
enable = true; enable = true;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, inputs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, inputs, ... }: {
options.homeconfig.nh.enable = lib.options.mkOption { options.homeconfig.nh.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -19,4 +21,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, inputs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, inputs, ... }: {
options.homeconfig.wal.enable = lib.options.mkOption { options.homeconfig.wal.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -15,5 +17,6 @@
]; ];
};
}; };
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
options.homeconfig.quickshell.enable = with lib; mkOption { options.homeconfig.quickshell.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
@@ -23,4 +25,5 @@
activeConfig = "default"; activeConfig = "default";
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
options.homeconfig.rofi.enable = lib.options.mkOption { options.homeconfig.rofi.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -16,5 +18,6 @@
theme = "/home/nathan/.cache/wal/colors-rofi-dark.rasi"; theme = "/home/nathan/.cache/wal/colors-rofi-dark.rasi";
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
home.packages = with pkgs; [ oh-my-posh ]; home.packages = with pkgs; [ oh-my-posh ];
@@ -12,6 +14,7 @@
ksh = "kitten ssh"; ksh = "kitten ssh";
v = "nvim";
vi = "nvim"; vi = "nvim";
vim = "nvim"; vim = "nvim";
@@ -28,4 +31,5 @@
eval "$(oh-my-posh init bash --config ${config.home.homeDirectory}/.config/ohmyposh/ohmyposh.toml)" eval "$(oh-my-posh init bash --config ${config.home.homeDirectory}/.config/ohmyposh/ohmyposh.toml)"
''); '');
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
programs.bat = { programs.bat = {
@@ -14,5 +16,6 @@
]; ];
};
}; };
} }

View File

@@ -1,17 +0,0 @@
{ ... }: {
imports = [
./bat
./bash
./eza
./fzf
./lf
./tmux
./kitty
./zoxide
./zsh
./ssh
./ohmyposh
./opencode
];
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
programs.eza = { programs.eza = {
@@ -14,4 +16,5 @@
icons = "auto"; icons = "auto";
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
programs.fzf = { programs.fzf = {
@@ -12,4 +14,5 @@
#shellIntegrationOptions = []; #shellIntegrationOptions = [];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, ... }: { { ... }: {
flake.homeModules.nathan = { config, ... }: {
programs.kitty = { programs.kitty = {
@@ -29,5 +31,6 @@ map ctrl+shift+tab previous_tab
''; '';
}; };
};
} }

View File

@@ -1,7 +1,10 @@
{ ... }: { { ... }: {
flake.homeModules.nathan = { ... }: {
config = { config = {
programs.lf = { programs.lf = {
enable = true; enable = true;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
home.packages = with pkgs; [ home.packages = with pkgs; [
oh-my-posh oh-my-posh
@@ -133,4 +135,5 @@ c13 = "{color13}"
c14 = "{color14}" c14 = "{color14}"
c15 = "{color15}" c15 = "{color15}"
''; '';
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, ... }: {
options.homeconfig.opencode.enable = with lib; mkOption { options.homeconfig.opencode.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
@@ -48,4 +50,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,5 +1,7 @@
{ ... }: { { ... }: {
flake.homeModules.nathan = { ... }: {
programs.ssh = { programs.ssh = {
enable = true; enable = true;
@@ -20,5 +22,6 @@
enableDefaultConfig = false; enableDefaultConfig = false;
};
}; };
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
programs.tmux = { programs.tmux = {
@@ -18,6 +20,7 @@
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { ... }: {
programs.zoxide = { programs.zoxide = {
@@ -10,4 +12,5 @@
"--cmd cd" "--cmd cd"
]; ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ lib, ... }: { { ... }: {
flake.homeModules.nathan = { lib, ... }: {
programs.zsh = { programs.zsh = {
@@ -34,4 +36,5 @@
share = true; share = true;
}; };
}; };
};
} }

View File

@@ -1,9 +0,0 @@
{ ... }: {
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.homeModules.nathan = { config, lib, pkgs, ... }: {
options = { options = {
homeconfig.mpd.enable = lib.options.mkOption { homeconfig.mpd.enable = lib.options.mkOption {
@@ -38,4 +40,5 @@
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ lib, inputs, ... }: { self, inputs, ... }: {
flake.homeModules.nathan = { lib, ... }:
{ {
@@ -22,4 +24,15 @@
programs.home-manager.enable = true; programs.home-manager.enable = true;
}; };
};
flake.homeConfigurations.nathan = inputs.home-manager.lib.homeManagerConfiguration {
pkgs = import inputs.nixpkgs {
system = builtins.currentSystem;
};
modules = [
self.homeModules.nathan
];
};
} }

Submodule machines/android deleted from 4ba07466f6

View File

@@ -1,4 +1,6 @@
{ config, pkgs, lib, inputs, ... }: { ... }: {
flake.nixosModules.container = { config, pkgs, lib, inputs, ... }:
{ {
imports = imports =
@@ -154,4 +156,5 @@
fonts.packages = with pkgs; [ nerd-fonts.fira-code ]; fonts.packages = with pkgs; [ nerd-fonts.fira-code ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, pkgs, lib, disko, sops-nix, home-manager, ... }: { ... }: {
flake.nixosModules.homebox = { config, pkgs, lib, disko, sops-nix, home-manager, ... }:
{ {
imports = imports =
@@ -113,4 +115,5 @@
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ lib, pkgs, inputs, modulesPath, ... }: { { ... }: {
flake.nixosModules.iso = { lib, pkgs, inputs, modulesPath, ... }: {
imports = with inputs; [ imports = with inputs; [
@@ -102,5 +104,6 @@
}; };
};
}; };
} }

View File

@@ -1,4 +1,6 @@
{ config, pkgs, lib, inputs, ... }: { ... }: {
flake.nixosModules.jesstop = { config, pkgs, lib, inputs, ... }:
{ {
@@ -127,5 +129,6 @@
fonts.packages = with pkgs; [ nerd-fonts.fira-code ]; fonts.packages = with pkgs; [ nerd-fonts.fira-code ];
};
}; };
} }

View File

@@ -1,7 +1,6 @@
# Do not modify this file! It was generated by nixos-generate-config { ... }: {
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. flake.nixosModules.jesstop = { config, lib, pkgs, modulesPath, ... }:
{ config, lib, pkgs, modulesPath, ... }:
{ {
imports = imports =
@@ -36,4 +35,5 @@
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
};
} }

View File

@@ -1,4 +1,6 @@
{ config, pkgs, lib, home-manager, sops-nix, ... }: { ... }: {
flake.nixosModules.laptop = { config, pkgs, lib, home-manager, sops-nix, ... }:
{ {
@@ -112,4 +114,5 @@
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ pkgs, inputs, ... }: { { ... }: {
flake.nixosModules.live = { pkgs, inputs, ... }: {
imports = with inputs; [ imports = with inputs; [
@@ -118,4 +120,5 @@
fonts.packages = with pkgs; [ nerd-fonts.fira-code ]; fonts.packages = with pkgs; [ nerd-fonts.fira-code ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ { ... }: {
flake.diskoConfigurations.live = {
device1 ? throw "Set this to your disk device, e.g. /dev/sda", device1 ? throw "Set this to your disk device, e.g. /dev/sda",
... ...
}: { }: {
@@ -64,3 +66,4 @@
}; };
}; };
} }
}

View File

@@ -1,4 +1,6 @@
{ config, pkgs, inputs, ... }: { { ... }: {
flake.nixosModules.pi4 = { config, pkgs, inputs, ... }: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
@@ -132,4 +134,5 @@
system.stateVersion = "25.05"; system.stateVersion = "25.05";
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ { ... }: {
flake.diskoConfigurations.pi4 = {
device1 ? throw "Set this to your disk device, e.g. /dev/sda", device1 ? throw "Set this to your disk device, e.g. /dev/sda",
... ...
}: { }: {
@@ -63,4 +65,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,7 +1,6 @@
# Do not modify this file! It was generated by nixos-generate-config { ... }: {
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. flake.nixosModules.pi4 = { config, lib, pkgs, modulesPath, ... }:
{ config, lib, pkgs, modulesPath, ... }:
{ {
imports = imports =
@@ -24,4 +23,5 @@
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux"; nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
};
} }

View File

@@ -1,11 +1,6 @@
{ config, lib, pkgs, nixpkgs, ... }: { { ... }: {
imports = let flake.nixosModules.default = { config, lib, pkgs, nixpkgs, ... }: {
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
options.sysconfig = with lib; { options.sysconfig = with lib; {
host = mkOption { host = mkOption {
@@ -112,4 +107,6 @@
}; };
}; };
}; };
} };
};

View File

@@ -1,6 +1,10 @@
{ ... }: { { ... }: {
flake.nixosModules.default = { ... }: {
config = { config = {
}; };
};
} }

View File

@@ -1,7 +1,11 @@
{ pkgs, disko, ... }: { { inputs, ... }: {
flake.nixosModules.default = { pkgs, ... }: {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
sops sops
disko.packages.${pkgs.stdenv.hostPlatform.system}.disko-install inputs.disko.packages.${pkgs.stdenv.hostPlatform.system}.disko-install
]; ];
};
} }

View File

@@ -1,9 +0,0 @@
{ ... }: {
imports = [
./hyprland
./hyprpanel
./steam
];
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, hyprland, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, hyprland, ... }: {
options.sysconfig.programs.hyprland.enable = lib.options.mkOption { options.sysconfig.programs.hyprland.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -25,4 +27,6 @@
portalPackage = hyprland.packages.${pkgs.stdenv.hostPlatform.system}.xdg-desktop-portal-hyprland; portalPackage = hyprland.packages.${pkgs.stdenv.hostPlatform.system}.xdg-desktop-portal-hyprland;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.programs.hyprpanel.enable = lib.options.mkOption { options.sysconfig.programs.hyprpanel.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -27,4 +29,6 @@
wf-recorder wf-recorder
]; ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.programs.steam.enable = lib.options.mkOption { options.sysconfig.programs.steam.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -11,4 +13,6 @@
enable = true; enable = true;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options = { options = {
sysconfig.services.avahi.enable = lib.options.mkOption { sysconfig.services.avahi.enable = lib.options.mkOption {
@@ -20,4 +22,6 @@
}; };
}; };
};
} }

View File

@@ -1,9 +0,0 @@
{ ... }: {
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.services.dynamicDNS.enable = with lib; mkOption { options.sysconfig.services.dynamicDNS.enable = with lib; mkOption {
@@ -37,4 +39,6 @@
script = ''''; script = '''';
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.services.kdePlasma6.enable = lib.options.mkOption { options.sysconfig.services.kdePlasma6.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -28,4 +30,6 @@
wl-clipboard # Command-line copy/paste utilities for Wayland wl-clipboard # Command-line copy/paste utilities for Wayland
]; ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, nixpkgs-us, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, nixpkgs-us, ... }: {
options.sysconfig = { options.sysconfig = {
@@ -23,4 +25,6 @@
package = pkgs-us.netbird; package = pkgs-us.netbird;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.services.novnc.enable = lib.mkOption { options.sysconfig.services.novnc.enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -27,4 +29,6 @@
networking.firewall.allowedTCPPorts = [ 80 ]; networking.firewall.allowedTCPPorts = [ 80 ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, nixpkgs-us, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, nixpkgs-us, ... }: {
options = { options = {
sysconfig.services.ollama.enable = lib.options.mkOption { sysconfig.services.ollama.enable = lib.options.mkOption {
@@ -22,4 +24,6 @@
in pkgs-us.ollama-cuda; in pkgs-us.ollama-cuda;
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options = { options = {
sysconfig.services.openssh.enable = lib.options.mkOption { sysconfig.services.openssh.enable = lib.options.mkOption {
@@ -19,4 +21,6 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options = { options = {
sysconfig.services.pipewire.enable = lib.options.mkOption { sysconfig.services.pipewire.enable = lib.options.mkOption {
@@ -48,4 +50,5 @@
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.services.sddm.enable = lib.mkOption { options.sysconfig.services.sddm.enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -31,4 +33,5 @@
]; ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.services.wyoming = { options.sysconfig.services.wyoming = {
enable = lib.options.mkOption { enable = lib.options.mkOption {
@@ -63,4 +65,5 @@
}; };
}; };
};
} }

View File

@@ -1,11 +1,6 @@
{ config, lib, pkgs, ... } @ inputs: { { ... }: {
imports = let flake.nixosModules.default = { config, lib, pkgs, ... } @ inputs: {
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
options.sysconfig = with lib; { options.sysconfig = with lib; {
@@ -141,4 +136,5 @@
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
config = lib.mkIf ( config = lib.mkIf (
config.sysconfig.users ? nathan && config.sysconfig.users.nathan.usePresets config.sysconfig.users ? nathan && config.sysconfig.users.nathan.usePresets
@@ -21,4 +23,5 @@
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers.code-server.enable = lib.options.mkOption { options.sysconfig.containers.code-server.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -38,4 +40,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,32 +0,0 @@
{ ... }: {
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
/*imports = [
./gitlab
./gitea
./traefik
./nginx
./jellyfin
./pihole
./nextcloud
./ntfy
./homeassistant
./rustdesk
./netbird
./keycloak
./ollama
./openwebui
./n8n
./wyoming
./code-server
./novnc
./minecraft
#./sandbox
];*/
}

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers.gitea.enable = lib.options.mkOption { options.sysconfig.containers.gitea.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -32,6 +34,7 @@
extraFlags = [ extraFlags = [
"--load-credential=dbpass:${config.sops.secrets."gitea/dbpass".path}" "--load-credential=dbpass:${config.sops.secrets."gitea/dbpass".path}"
]; ];
config = { config = {
systemd.services.secrets_setup = { systemd.services.secrets_setup = {
@@ -86,6 +89,7 @@
}; };
}; };
services.openssh = { services.openssh = {
enable = true; enable = true;
openFirewall = true; openFirewall = true;
@@ -103,4 +107,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,172 +0,0 @@
{ config, lib, ... }: {
options.sysconfig.containers.gitlab.enable = lib.options.mkOption {
type = lib.types.bool;
default = false;
};
config = lib.mkIf config.sysconfig.containers.gitlab.enable {
sops.secrets = {
"gitlab/db_pass" = {};
"gitlab/root_pass" = {};
"gitlab/secrets/secret" = {};
"gitlab/secrets/otp" = {};
"gitlab/secrets/db" = {};
"gitlab/secrets/jws" = {};
"gitlab/oidc/id" = {};
"gitlab/oidc/secret" = {};
};
services.openssh.ports = [
2222
];
networking.firewall.allowedTCPPorts = [
22
2222
];
containers.gitlab = {
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.10";
localAddress = "192.168.100.16";
forwardPorts = [
{
containerPort = 22;
hostPort = 22;
}
];
bindMounts = {
"/etc/gitlab/data" = {
hostPath = "/ssd1/Gitlab/data";
isReadOnly = false;
};
};
extraFlags = [
"--load-credential=dbpass:${config.sops.secrets."gitlab/db_pass".path}"
"--load-credential=rootpass:${config.sops.secrets."gitlab/root_pass".path}"
"--load-credential=secret:${config.sops.secrets."gitlab/secrets/secret".path}"
"--load-credential=otp:${config.sops.secrets."gitlab/secrets/otp".path}"
"--load-credential=db:${config.sops.secrets."gitlab/secrets/db".path}"
"--load-credential=jws:${config.sops.secrets."gitlab/secrets/jws".path}"
"--load-credential=oidc_id:${config.sops.secrets."gitlab/oidc/id".path}"
"--load-credential=oidc_secret:${config.sops.secrets."gitlab/oidc/secret".path}"
];
config = {
systemd.services.secrets_setup = {
wantedBy = [ "gitlab.service" ];
serviceConfig = {
LoadCredential = [
"dbpass"
"rootpass"
"secret"
"db"
"otp"
"jws"
"oidc_id"
"oidc_secret"
];
};
script = ''
cat ''${CREDENTIALS_DIRECTORY}/dbpass > /etc/gitlab/dbpass
cat ''${CREDENTIALS_DIRECTORY}/rootpass > /etc/gitlab/rootpass
cat ''${CREDENTIALS_DIRECTORY}/secret > /etc/gitlab/secret
cat ''${CREDENTIALS_DIRECTORY}/db > /etc/gitlab/db
cat ''${CREDENTIALS_DIRECTORY}/otp > /etc/gitlab/otp
cat ''${CREDENTIALS_DIRECTORY}/jws > /etc/gitlab/jws
cat ''${CREDENTIALS_DIRECTORY}/oidc_id > /etc/gitlab/oidc-id
cat ''${CREDENTIALS_DIRECTORY}/oidc_secret > /etc/gitlab/oidc-secret
chown gitlab:gitlab /etc/gitlab/*
'';
};
services.gitlab = {
enable = true;
#https = true;
#port = 443;
host = "gitlab.blunkall.us";
databasePasswordFile = "/etc/gitlab/dbpass";
initialRootPasswordFile = "/etc/gitlab/rootpass";
statePath = "/etc/gitlab/data";
secrets = {
secretFile = "/etc/gitlab/secret";
otpFile = "/etc/gitlab/otp";
dbFile = "/etc/gitlab/db";
jwsFile = "/etc/gitlab/jws";
};
extraConfig = {
gitlab = {
default_project_features = {
builds = false;
};
};
omniauth = {
enabled = true;
auto_sign_in_with_provider = "openid_connect";
allow_single_sign_on = [ "openid_connect" ];
sync_email_from_provider = "openid_connect";
sync_profile_from_provider = [ "openid_connect" ];
sync_profile_attributes = [ "email" ];
auto_link_saml_user = true;
auto_link_user = [ "openid_connect" ];
block_auto_created_users = false;
providers = [
{
name = "openid_connect";
label = "Authentik SSO";
args = {
name = "openid_connect";
scope = [ "openid" "profile" "email" ];
response_type = "code";
issuer = "https://auth.blunkall.us/application/o/gitlab/";
discovery = true;
client_auth_method = "query";
uid_field = "preferred_username";
send_scope_to_token_endpoint = true;
pkce = true;
client_options = {
identifier = { _secret = "/etc/gitlab/oidc-id"; };
secret = { _secret = "/etc/gitlab/oidc-secret"; };
redirect_uri = "https://gitlab.blunkall.us/users/auth/openid_connect/callback";
};
};
}
];
};
};
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
virtualHosts = {
"gitlab.blunkall.us" = {
locations."/".proxyPass = "http://unix:/run/gitlab/gitlab-workhorse.socket";
};
};
};
services.openssh.enable = true;
systemd.services.gitlab-backup.environment.BACKUP = "dump";
networking.firewall.allowedTCPPorts = [ 22 80 ];
system.stateVersion = "24.05";
};
};
};
}

View File

@@ -1,108 +0,0 @@
{ config, lib, pkgs, nix-minecraft, ... }: {
options.sysconfig = {
containers.minecraft.enable = lib.options.mkOption {
type = lib.types.bool;
default = false;
};
};
config = lib.mkIf config.sysconfig.containers.minecraft.enable {
networking = {
firewall = {
allowedTCPPorts = [ 25565 ];
allowedUDPPorts = [ 25565 ];
};
};
nixpkgs.overlays = [ nix-minecraft.overlay ];
containers.minecraft = {
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.10";
localAddress = "192.168.100.29";
forwardPorts = [
{
containerPort = 25565;
hostPort = 25565;
protocol = "tcp";
}
{
containerPort = 25565;
hostPort = 25565;
protocol = "udp";
}
];
config = {
imports = [
nix-minecraft.nixosModules.minecraft-servers
];
environment.systemPackages = with pkgs; [ tmux ];
services.minecraft-servers = {
enable = true;
eula = true;
openFirewall = true;
dataDir = "/var/lib/mcservers";
managementSystem.systemd-socket.enable = true; #temp
servers = {
vanilla = {
enable = true;
package = pkgs.fabricServers.fabric-1_21_8;
serverProperties = {
server-port = 25565;
gamemode = "survival";
difficulty = 2;
white-list = true;
motd = "Didn't see that coming huh?";
};
whitelist = {
"MeasureTwice66" = "a4032062-293d-484d-a790-9f52475836bb";
"651sonic" = "936a3fb0-4548-4557-975b-7794e97a3afc";
"Griffin12_" = "6a1f56d9-f712-4723-a031-e5437a389bb3";
};
autoStart = true;
};
modded = {
enable = false;
#package = pkgs.fabricServers.fabric-1_21_1.override { loaderVersion = "0.16.14"; };
package = pkgs.fabricServers.fabric-1_21_1;
jvmOpts = [ "-Xms8000M" "-Xmx12000M" ];
serverProperties = {
server-port = 25566;
gamemode = "survival";
white-list = true;
allow-flight = true;
motd = "Ex-plo-sion!!!";
};
whitelist = {
"MeasureTwice66" = "a4032062-293d-484d-a790-9f52475836bb";
"651sonic" = "936a3fb0-4548-4557-975b-7794e97a3afc";
"Griffin12_" = "6a1f56d9-f712-4723-a031-e5437a389bb3";
};
autoStart = true;
symlinks = {
"mods" = ./mods;
};
};
};
};
system.stateVersion = "25.05";
};
};
};
}

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers."esotericbytes.com".enable = lib.mkOption { options.sysconfig.containers."esotericbytes.com".enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -40,4 +42,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.containers.novnc.enable = lib.mkOption { options.sysconfig.containers.novnc.enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -49,4 +51,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers.ntfy.enable = lib.mkOption { options.sysconfig.containers.ntfy.enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -40,4 +42,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers.rustdesk.enable = lib.options.mkOption { options.sysconfig.containers.rustdesk.enable = lib.options.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -82,4 +84,5 @@
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, self, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, self, ... }: {
options.sysconfig.containers.sandbox.enable = lib.mkOption { options.sysconfig.containers.sandbox.enable = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@@ -74,6 +76,7 @@
}; };
};
}; };
}; };
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.containers.wyoming = { options.sysconfig.containers.wyoming = {
enable = lib.options.mkOption { enable = lib.options.mkOption {
@@ -128,4 +130,5 @@
}; };
}; };
};
} }

View File

@@ -1,9 +0,0 @@
{ ... }: {
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
}

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
hostPort = 9005; hostPort = 9005;
@@ -234,4 +236,5 @@ in {
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.docker = { options.sysconfig.docker = {
enable = with lib; mkOption { enable = with lib; mkOption {
@@ -12,13 +14,6 @@
}; };
}; };
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
config = lib.mkIf config.sysconfig.docker.enable { config = lib.mkIf config.sysconfig.docker.enable {
networking.nat.internalInterfaces = [ "docker0" "docker-main" ]; networking.nat.internalInterfaces = [ "docker0" "docker-main" ];
@@ -58,4 +53,6 @@
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
subdomain = "gitea"; subdomain = "gitea";
@@ -148,4 +150,5 @@ in {
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, ... }: let
subdomain = "hass"; subdomain = "hass";
@@ -55,4 +57,5 @@ in {
]; ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
subdomain = "watch"; subdomain = "watch";
@@ -114,4 +116,5 @@ in {
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
subdomain = "n8n"; subdomain = "n8n";
@@ -99,4 +101,5 @@ in {
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.docker.netbird.enable = with lib; mkOption { options.sysconfig.docker.netbird.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
@@ -226,4 +228,5 @@
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
subdomain = "cloud"; subdomain = "cloud";
@@ -112,4 +114,5 @@ in {
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
hostPort = 11434; hostPort = 11434;
@@ -70,4 +72,5 @@ in {
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, pkgs, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: let
subdomain = "ai"; subdomain = "ai";
@@ -93,4 +95,5 @@ in {
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, ... }: let
hostPort = 9001; hostPort = 9001;
@@ -79,4 +81,5 @@ in {
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, ... }: let
hostPort = 9000; hostPort = 9000;
@@ -59,4 +61,5 @@ in {
]; ];
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: let { ... }: {
flake.nixosModules.default = { config, lib, ... }: let
subdomain = "searxng"; subdomain = "searxng";
@@ -56,4 +58,5 @@ in {
}; };
}; };
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.docker.traefik.enable = with lib; mkOption { options.sysconfig.docker.traefik.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
@@ -105,4 +107,5 @@
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };
};
} }

View File

@@ -1,17 +1,12 @@
{ config, lib, pkgs, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, pkgs, ... }: {
options.sysconfig.virtual-machines.enable = with lib; mkOption { options.sysconfig.virtual-machines.enable = with lib; mkOption {
type = with types; bool; type = with types; bool;
default = false; default = false;
}; };
imports = let
dir = builtins.readDir ./.;
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
config = lib.mkIf config.sysconfig.virtual-machines.enable { config = lib.mkIf config.sysconfig.virtual-machines.enable {
programs.virt-manager.enable = true; programs.virt-manager.enable = true;
@@ -28,4 +23,5 @@
virt-viewer virt-viewer
]; ];
}; };
};
} }

View File

@@ -1,4 +1,6 @@
{ config, lib, ... }: { { ... }: {
flake.nixosModules.default = { config, lib, ... }: {
options.sysconfig.virtual-machines.home-assistant = { options.sysconfig.virtual-machines.home-assistant = {
enable = lib.options.mkOption { enable = lib.options.mkOption {
@@ -10,4 +12,6 @@
config = lib.mkIf config.sysconfig.virtual-machines.home-assistant.enable { config = lib.mkIf config.sysconfig.virtual-machines.home-assistant.enable {
}; };
};
} }

46
templates/default.nix Normal file
View File

@@ -0,0 +1,46 @@
{ ... }: {
flake.templates = {
nixos = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./nixos;
};
home-manager = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./home-manager;
};
nix-on-droid = {
welcomeText = ''
#Welcome to Olympus!
Have Fun!
'';
description = ''
Generate this where you want your config.
'';
path = ./nix-on-droid;
};
};
}