Compare commits

...

2 Commits

Author SHA1 Message Date
7c61d646a6 may work 2026-01-05 15:20:14 -06:00
ea3c826c63 try 2026-01-05 10:23:29 -06:00
12 changed files with 35 additions and 1105 deletions

View File

@@ -33,7 +33,6 @@
hyprland.url = "git+https://github.com/hyprwm/Hyprland?submodules=1";
#nixvim.url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Moirai";
nixvim.url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Moirai";
};
@@ -47,10 +46,10 @@
(name: ({
inherit name;
value = { ... } @ exputs: {
value = { ... }: {
imports = [
(import ./system (inputs // exputs))
(import ./system/profiles/${name} (inputs // exputs))
./system
./system/profiles/${name}
];
};
})) filtered)

File diff suppressed because it is too large Load Diff

View File

@@ -26,8 +26,7 @@
nixosConfigurations."${host}" = nixpkgs.lib.nixosSystem {
specialArgs = {
};
specialArgs = olympus.inputs;
modules = [
{ sysconfig.host = host; }

View File

@@ -16,7 +16,7 @@
# Bootloader.
boot = {
kernelPackages = pkgs.linuxKernel.packages.linux_6_16;
kernelPackages = pkgs.linuxKernel.packages.linux_6_18;
loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;

View File

@@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }: {
{ ... }: {
imports = [
./hyprland

View File

@@ -1,4 +1,4 @@
{ config, lib, pkgs, inputs, ... }: {
{ config, lib, pkgs, hyprland, ... }: {
options.sysconfig.programs.hyprland.enable = lib.options.mkOption {
type = lib.types.bool;
@@ -18,9 +18,9 @@
systemd.setPath.enable = true;
package = inputs.hyprland.packages.${pkgs.stdenv.hostPlatform.system}.hyprland;
package = hyprland.packages.${pkgs.stdenv.hostPlatform.system}.hyprland;
portalPackage = inputs.hyprland.packages.${pkgs.stdenv.hostPlatform.system}.xdg-desktop-portal-hyprland;
portalPackage = hyprland.packages.${pkgs.stdenv.hostPlatform.system}.xdg-desktop-portal-hyprland;
};
};
}

View File

@@ -1,10 +1,20 @@
{ config, lib, pkgs, nix-minecraft, ... }: {
options.sysconfig.virtualization.minecraft.enable = lib.options.mkOption {
options.sysconfig = {
virtualization.minecraft.enable = lib.options.mkOption {
type = lib.types.bool;
default = false;
};
services.minecraft.enable = lib.options.mkOption {
type = lib.types.bool;
default = false;
};
};
/*imports = [
nix-minecraft.nixosModules.minecraft-servers
];*/
config = lib.mkIf config.sysconfig.virtualization.minecraft.enable {
@@ -42,9 +52,9 @@
config = {
imports = [
/*imports = [
nix-minecraft.nixosModules.minecraft-servers
];
];*/
environment.systemPackages = with pkgs; [ tmux ];

View File

@@ -5,7 +5,6 @@
./openssh
./pipewire
./containers
./minecraft
./sddm
./novnc
./kdePlasma6

View File

@@ -1,70 +0,0 @@
{ config, lib, pkgs, nix-minecraft, ... }: {
options.sysconfig.services.minecraft.enable = lib.options.mkOption {
type = lib.types.bool;
default = false;
};
imports = [
nix-minecraft.nixosModules.minecraft-servers
];
config = lib.mkIf config.sysconfig.services.minecraft.enable {
nixpkgs.overlays = [ nix-minecraft.overlay ];
services.minecraft-servers = {
enable = true;
eula = true;
openFirewall = true;
dataDir = "/var/lib/mcservers";
#managementSystem.systemd-socket.enable = true; #temp
servers = {
bedrock = {
enable = true;
package = pkgs.fabricServers.fabric-1_21_8;
serverProperties = {
server-port = 25566;
gamemode = "survival";
difficulty = 2;
white-list = true;
motd = "Test";
};
whitelist = {
"MeasureTwice66" = "a4032062-293d-484d-a790-9f52475836bb";
"651sonic" = "936a3fb0-4548-4557-975b-7794e97a3afc";
"Griffin12_" = "6a1f56d9-f712-4723-a031-e5437a389bb3";
};
autoStart = true;
};
modded = {
enable = false;
#package = pkgs.fabricServers.fabric-1_21_1.override { loaderVersion = "0.16.14"; };
package = pkgs.fabricServers.fabric-1_21_1;
jvmOpts = [ "-Xms8000M" "-Xmx12000M" ];
serverProperties = {
server-port = 25566;
gamemode = "survival";
white-list = true;
allow-flight = true;
motd = "Ex-plo-sion!!!";
};
whitelist = {
"MeasureTwice66" = "a4032062-293d-484d-a790-9f52475836bb";
"651sonic" = "936a3fb0-4548-4557-975b-7794e97a3afc";
"Griffin12_" = "6a1f56d9-f712-4723-a031-e5437a389bb3";
};
autoStart = true;
symlinks = {
"mods" = ./mods;
};
};
};
};
};
}

View File

@@ -1,12 +1,16 @@
{ config, lib, pkgs, inputs, ... }: {
{ config, lib, pkgs, ... } @ inputs: {
imports = let
dir = builtins.readDir ./.;
in (builtins.filter
in builtins.map (x: ./${x}) (builtins.filter
(file: (dir.${file} == "directory"))
(builtins.attrNames dir)
);
/*imports = [
./nathan
];*/
options.sysconfig = with lib; {
sshHostKeys = lib.mkOption {

View File

@@ -37,7 +37,7 @@
nh.enable = lib.mkDefault true;
minimal = lib.mkDefault false;
hyprland.enable = lib.mkDefault config.homeconfig.graphical && !config.homeconfig.standalone;
hyprland.enable = lib.mkDefault (config.homeconfig.graphical && !config.homeconfig.standalone);
hyprlock.enable = lib.mkDefault config.homeconfig.hyprland.enable;
wal.enable = lib.mkDefault config.homeconfig.graphical;
hyprpanel.enable = lib.mkDefault config.homeconfig.hyprland.enable;

View File

@@ -11,8 +11,8 @@
isNormalUser = true;
#hashedPasswordFile = lib.mkIf (cfg.hashedPasswordFile != null) cfg.hashedPasswordFile;
extraGroups = [ "networkmanager" ];
openssh.authorizedKeys.keys = lib.mkIf config.sysconfig.services.openssh.enable (cfg.ssh.keys ++ (map (z: config.sysconfig.sshHostKeys.${z}) cfg.ssh.hosts));
packages = with pkgs; lib.mkIf (cfg.home-manager.enable && cfg.home-manager.standalone) [ home-manager ];
openssh.authorizedKeys.keys = with config.sysconfig.users.nathan; lib.mkIf config.sysconfig.services.openssh.enable (ssh.keys ++ (map (z: config.sysconfig.sshHostKeys.${z}) ssh.hosts));
packages = with pkgs; with config.sysconfig.users.nathan; lib.mkIf (home-manager.enable && home-manager.standalone) [ home-manager ];
};
};