Compare commits
5 Commits
15fb558afc
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
| a3cab8fb9a | |||
| 105eb3477a | |||
| d134deee7e | |||
| 1f7d5634bd | |||
| b2a72f1a24 |
22
default.nix
22
default.nix
@@ -1,13 +1,18 @@
|
|||||||
# Edit this configuration file to define what should be installed on
|
{ self, inputs, ... }: {
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
||||||
|
|
||||||
{ config, lib, pkgs, ... }:
|
flake.nixosConfigurations."homebox" = inputs.nixpkgs.lib.nixosSystem {
|
||||||
|
|
||||||
{
|
modules = [
|
||||||
|
self.nixosModules.homebox
|
||||||
|
self.nixosModules.default
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
flake.nixosModules.homebox = { config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
imports = [ # Include the results of the hardware scan.
|
imports = [ # Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
|
||||||
|
|
||||||
(import ./disko.nix { device1 = "/dev/nvme0n1"; device2 = "/dev/nvme1n1"; device3 = "/dev/sda"; })
|
(import ./disko.nix { device1 = "/dev/nvme0n1"; device2 = "/dev/nvme1n1"; device3 = "/dev/sda"; })
|
||||||
];
|
];
|
||||||
@@ -62,6 +67,8 @@
|
|||||||
|
|
||||||
sysconfig = {
|
sysconfig = {
|
||||||
|
|
||||||
|
host = "homebox";
|
||||||
|
|
||||||
docker.nvidia = true;
|
docker.nvidia = true;
|
||||||
|
|
||||||
remoteBuildClient = false;
|
remoteBuildClient = false;
|
||||||
@@ -73,6 +80,7 @@
|
|||||||
ssh.keys = [
|
ssh.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAsU69CxfQk58CvItPN426h5Alnpb60SH37wet97Vb57 nathan@laptop"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAsU69CxfQk58CvItPN426h5Alnpb60SH37wet97Vb57 nathan@laptop"
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEnUhN2uHwAJF/SLRX3wlGRmfhV3zpP88JQAYB+gh8jW nathan@localhost"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEnUhN2uHwAJF/SLRX3wlGRmfhV3zpP88JQAYB+gh8jW nathan@localhost"
|
||||||
|
"ssh-rsa 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 nathan@rpi-3dp"
|
||||||
];
|
];
|
||||||
shell = pkgs.zsh;
|
shell = pkgs.zsh;
|
||||||
hashedPasswordFile = config.sops.secrets."nathan/pass".path;
|
hashedPasswordFile = config.sops.secrets."nathan/pass".path;
|
||||||
@@ -88,7 +96,6 @@
|
|||||||
hyprlock.enable = false;
|
hyprlock.enable = false;
|
||||||
wal.enable = true;
|
wal.enable = true;
|
||||||
mpd.enable = true;
|
mpd.enable = true;
|
||||||
hyprpanel.enable = false;
|
|
||||||
calcurse.enable = true;
|
calcurse.enable = true;
|
||||||
rofi.enable = false;
|
rofi.enable = false;
|
||||||
firefox.enable = false;
|
firefox.enable = false;
|
||||||
@@ -120,4 +127,5 @@
|
|||||||
system.stateVersion = "23.05"; # Did you read the comment?
|
system.stateVersion = "23.05"; # Did you read the comment?
|
||||||
};
|
};
|
||||||
|
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,11 @@
|
|||||||
{
|
{ ... }: {
|
||||||
|
|
||||||
|
flake.diskoConfigurations.homebox = {
|
||||||
device1 ? throw "Set this to your disk device, e.g. /dev/sda",
|
device1 ? throw "Set this to your disk device, e.g. /dev/sda",
|
||||||
device2,
|
device2,
|
||||||
device3,
|
device3,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
disko.devices = {
|
disko.devices = {
|
||||||
disk = {
|
disk = {
|
||||||
main = {
|
main = {
|
||||||
@@ -142,4 +144,5 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
38
flake.nix
38
flake.nix
@@ -1,38 +0,0 @@
|
|||||||
{
|
|
||||||
|
|
||||||
description = "System Configuration";
|
|
||||||
|
|
||||||
inputs = {
|
|
||||||
|
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
|
|
||||||
|
|
||||||
home-manager = {
|
|
||||||
url = "github:nix-community/home-manager/release-25.11";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
};
|
|
||||||
|
|
||||||
olympus = {
|
|
||||||
#url = "git+https://gitea.esotericbytes.com/Blunkall-Technologies/Olympus";
|
|
||||||
url = "git+file:///home/nathan/Projects/Olympus";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
inputs.home-manager.follows = "home-manager";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
outputs = { self, nixpkgs, olympus, ... }: let
|
|
||||||
host = "homebox";
|
|
||||||
|
|
||||||
in {
|
|
||||||
|
|
||||||
nixosConfigurations."${host}" = nixpkgs.lib.nixosSystem {
|
|
||||||
|
|
||||||
specialArgs = olympus.inputs;
|
|
||||||
|
|
||||||
modules = [
|
|
||||||
{ sysconfig.host = host; }
|
|
||||||
./.
|
|
||||||
olympus.profiles.homebox
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,9 +1,8 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
{ ... }: {
|
||||||
# and may be overwritten by future invocations. Please make changes
|
|
||||||
# to /etc/nixos/configuration.nix instead.
|
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
|
||||||
|
|
||||||
{
|
flake.nixosModules.homebox = { config, lib, pkgs, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||||
];
|
];
|
||||||
@@ -13,27 +12,13 @@
|
|||||||
boot.kernelModules = [ "kvm-amd" ];
|
boot.kernelModules = [ "kvm-amd" ];
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
networking.useDHCP = lib.mkDefault true;
|
networking.useDHCP = lib.mkDefault true;
|
||||||
# networking.interfaces.br-de2feead48ad.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.docker0.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.enp6s0.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-blunkall-us.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-gitea.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-home-assnHYM.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-jellyfin.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-keycloak.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-n8n.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-netbird.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-nextcloud.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-ollama.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-traefik.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.ve-wyoming.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.wlp7s0.useDHCP = lib.mkDefault true;
|
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ gitea:
|
|||||||
keycloak:
|
keycloak:
|
||||||
dbpass: ENC[AES256_GCM,data:tc4wIAqzY7nonBhz8s+YdAux,iv:Wg0b0/xnl6cANLTOJWBsX+gw1iF8Q/GvO/iKyKwqJrM=,tag:LORKRmo4RjcrVbPNhk2A9Q==,type:str]
|
dbpass: ENC[AES256_GCM,data:tc4wIAqzY7nonBhz8s+YdAux,iv:Wg0b0/xnl6cANLTOJWBsX+gw1iF8Q/GvO/iKyKwqJrM=,tag:LORKRmo4RjcrVbPNhk2A9Q==,type:str]
|
||||||
netbird:
|
netbird:
|
||||||
coturnPass: ENC[AES256_GCM,data:zB6P9RyTTKkXEOIhOyeJuF4Y,iv:8SWVfcdmMnXQJxezu3uanrlmFhR+hxXEJ3T7KA+YZqE=,tag:1H21K3kbZOuLOdN2zufWJw==,type:str]
|
secret_key: ENC[AES256_GCM,data:isJHGh/InvgJUSqISqxpWhZH0OMN/QG7WBbSS7WqHaWTdfZDBOh//PBP8g==,iv:j0D6feM3qnDjXijXRHgZPboFLHzPwWIhT5bYz3M+QMU=,tag:pOHRxOEdOUrL3n6DgqGDsA==,type:str]
|
||||||
gitlab:
|
gitlab:
|
||||||
db_pass: ENC[AES256_GCM,data:N3KvXkXql/PDjxZSpGo/Apr/,iv:OOzhR4BEmV3T01PA50vqdJMg7D2OGKHn/8hiqKEaOd4=,tag:jzdonXH/D/5kZ5Cld2W//w==,type:str]
|
db_pass: ENC[AES256_GCM,data:N3KvXkXql/PDjxZSpGo/Apr/,iv:OOzhR4BEmV3T01PA50vqdJMg7D2OGKHn/8hiqKEaOd4=,tag:jzdonXH/D/5kZ5Cld2W//w==,type:str]
|
||||||
root_pass: ENC[AES256_GCM,data:bALaUkoJw3N0ugZP/4MCnEsD,iv:LJdJpXlyzA6o00UVlK+l5WCCFIL/sT/fQNjI8wA5LAg=,tag:BYk1o/rjubyEpeHbgYA1Sg==,type:str]
|
root_pass: ENC[AES256_GCM,data:bALaUkoJw3N0ugZP/4MCnEsD,iv:LJdJpXlyzA6o00UVlK+l5WCCFIL/sT/fQNjI8wA5LAg=,tag:BYk1o/rjubyEpeHbgYA1Sg==,type:str]
|
||||||
@@ -38,7 +38,7 @@ sops:
|
|||||||
S0NMRGJSeks0Q0UrVnZmUVdyU2NqVm8KLu2kQpD1fJdU0fTdR9A2cTQzRp+waJ6M
|
S0NMRGJSeks0Q0UrVnZmUVdyU2NqVm8KLu2kQpD1fJdU0fTdR9A2cTQzRp+waJ6M
|
||||||
8vA+E8xYb2U4d7m0YnwKkGzw0CBPb0BvdEgvWvqpFViftoDwRv5KGA==
|
8vA+E8xYb2U4d7m0YnwKkGzw0CBPb0BvdEgvWvqpFViftoDwRv5KGA==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2026-01-30T13:36:40Z"
|
lastmodified: "2026-02-01T12:56:37Z"
|
||||||
mac: ENC[AES256_GCM,data:rmsAKZoCpAWGkbFtnKzvFljpUG3JzBr7xm0SxA3Hmh9z0ue/lhxl2pxTRCtA5JCAmCOdcIeGX3rPq0ofrd2zx7qExsZCQpO2FsBnVy9TBHDdi4fFwOA6PCIi32HkKLqQispJpVg08k5b4hL4Ad5x9jMB7iUYkrohuJdQySBc+pw=,iv:gplDymlUg5+1kJt7PJWbm469ipGHW7js9cWsPHDLiC0=,tag:KUz+75XQaEtwMzqMZ55iMg==,type:str]
|
mac: ENC[AES256_GCM,data:clu/WnwHAQaowQ99Z8tNlIKKcVnLHYeYsgQK0meftXgiQKnLyLzqNipwfaU3qjITdm6fB7wY+TcySygpwFbY2f2TKrqAk7RxdnTFa61vQDqMF7rYPG90Ub79P+R5URZI8yjv69Hmrav0Y6z92vH8ItbPSRBLtgrbYZx36IFq0LU=,iv:qzBVA0xATM979tzu6cTvMrX77firvA5K0WU2hoUggoA=,tag:Fm3IqH0GUHBq9Din6ZW6ng==,type:str]
|
||||||
unencrypted_suffix: _unencrypted
|
unencrypted_suffix: _unencrypted
|
||||||
version: 3.11.0
|
version: 3.11.0
|
||||||
|
|||||||
Reference in New Issue
Block a user