Compare commits

...

66 commits

Author SHA1 Message Date
jopejoe1
88e4d59f0c add hash 2025-01-19 18:47:12 +01:00
jopejoe1
7a2a020ccd ops forgot this 2025-01-19 18:46:28 +01:00
jopejoe1
b4005a027f add patch 2025-01-19 18:45:23 +01:00
jopejoe1
1bdcab3c57 add media url 2025-01-17 18:54:13 +01:00
jopejoe1
9fd5ce7074 use akkoma instead of mastodon 2025-01-17 18:45:30 +01:00
jopejoe1
e4ca35cf8f enable text search mastodon 2025-01-17 18:09:21 +01:00
jopejoe1
746063d9e0 re-enable mastodon 2025-01-17 17:54:10 +01:00
jopejoe1
84c5aed0a9 disable mastodon 2025-01-17 17:19:06 +01:00
jopejoe1
1a72f14a65 dont patch matrix 2025-01-17 17:04:46 +01:00
jopejoe1
12c1ae47aa run mastadon in main 2025-01-17 17:02:05 +01:00
0649b83930 add gh 2025-01-17 10:43:46 +01:00
jopejoe1
70fa1e1d4e update lock 2025-01-15 20:10:20 +01:00
jopejoe1
368c90a01d update facter 2025-01-15 20:09:33 +01:00
jopejoe1
7b3a97cfc3 update facter link 2025-01-15 20:04:53 +01:00
jopejoe1
6963d78461 enable mastodon 2025-01-13 16:45:09 +01:00
jopejoe1
ead0fcea69 disable mastodon 2025-01-13 16:31:31 +01:00
jopejoe1
916a161c4f configure mastadon 2025-01-13 16:17:53 +01:00
jopejoe1
e8abbcf516 fix disk mount 2025-01-12 19:07:34 +01:00
jopejoe1
a38010b900 use string merginf not list merging 2025-01-10 15:33:14 +01:00
jopejoe1
3703a67930 fix matrix 2025-01-10 15:32:13 +01:00
jopejoe1
7166d84864 remove dupe 2025-01-10 15:19:50 +01:00
jopejoe1
71d799a779 fix typo 2025-01-10 15:19:20 +01:00
jopejoe1
cf73956130 add mail for nyan.social 2025-01-10 15:18:49 +01:00
jopejoe1
1fd976dfd0 get network interface name from hardware report 2025-01-10 15:16:30 +01:00
jopejoe1
b4499da9e6 add missing options 2025-01-10 15:00:01 +01:00
jopejoe1
cd4b0a78da set streamingProcesses 2025-01-10 14:57:43 +01:00
jopejoe1
11423944d4 fix defaultGateway 2025-01-10 14:50:25 +01:00
jopejoe1
221ffd2d60 add nspawn container 2025-01-10 14:44:17 +01:00
jopejoe1
014ddd954b open firewall 2025-01-10 12:23:23 +01:00
jopejoe1
8e84f240d2 open port 2025-01-10 09:20:53 +01:00
jopejoe1
6728dae390 search remove hardware 2025-01-09 23:30:34 +01:00
jopejoe1
089ef61302 remove hardware conf 2025-01-09 23:27:33 +01:00
jopejoe1
2fb2e70390 limit grnd 2025-01-09 22:55:11 +01:00
jopejoe1
c5bb2788a2 update lock 2025-01-09 22:47:13 +01:00
jopejoe1
792ceb6060 clean up omoikane 2025-01-09 22:46:19 +01:00
jopejoe1
2b6a2736f2 formt with nix fmt 2025-01-03 17:49:41 +01:00
jopejoe1
2eb114c0b4 rm jitsi 2025-01-02 16:35:18 +01:00
jopejoe1
d22aea2197 uodate lock 2025-01-02 16:19:55 +01:00
jopejoe1
3b698d923d update nixpkgs 2025-01-02 16:17:17 +01:00
jopejoe1
a6f90fc29c shairport use pipewire 2025-01-02 16:16:26 +01:00
3a14487095 update email 2025-01-02 16:13:57 +01:00
df5da21b59 update lock 2025-01-02 16:13:55 +01:00
52c0513e8c enable shairport 2025-01-02 16:12:45 +01:00
c758e8c444 use locl nix 2025-01-02 16:12:45 +01:00
0e79c59c9d update lock 2025-01-02 15:37:41 +01:00
c2390e575f enable shairport 2025-01-02 15:33:31 +01:00
bb3d378f5e remove shairport-sync 2024-12-15 16:07:10 +01:00
8d66e86242 update lock 2024-12-15 16:04:43 +01:00
e7b5e18e76 change back to unstaabek 2024-12-15 16:04:02 +01:00
9647193ccf change display name 2024-12-15 16:02:41 +01:00
6d81c885e7 shairport sync test 2024-12-09 22:40:01 +01:00
3dcff28b4e update lock 2024-12-07 19:58:08 +01:00
b2df5ffd6a enable repology 2024-12-07 16:24:16 +01:00
894d95f6bb update lock 2024-12-07 16:24:07 +01:00
177d1865ae postgresql use extensions 2024-12-04 21:06:24 +01:00
0189927310 disable mixxx 2024-12-04 21:01:32 +01:00
e799b148f5 use system 2024-12-04 20:58:00 +01:00
9ecbc5f7be use master 2024-12-04 20:50:45 +01:00
37a4e14941 update lock 2024-12-04 20:37:07 +01:00
ac5199a2b1 ise regular nixpkgs 2024-12-04 20:35:19 +01:00
8a01628c8c rm librewolf 2024-12-04 20:31:59 +01:00
713ba5dea1 test local branch 2024-12-04 20:31:10 +01:00
211ea5c51d test 2024-12-04 20:30:22 +01:00
5cf5f94e57 add printer 2024-12-02 19:20:49 +01:00
f74512b261 enable repology 2024-11-30 19:43:27 +01:00
81ccd1e8e7 add fonts 2024-11-28 17:53:18 +01:00
17 changed files with 748 additions and 684 deletions

182
flake.lock generated
View file

@ -79,11 +79,11 @@
]
},
"locked": {
"lastModified": 1728330715,
"narHash": "sha256-xRJ2nPOXb//u1jaBnDP56M7v5ldavjbtR6lfGqSvcKg=",
"lastModified": 1735644329,
"narHash": "sha256-tO3HrHriyLvipc4xr+Ewtdlo7wM1OjXNjlWRgmM7peY=",
"owner": "numtide",
"repo": "devshell",
"rev": "dd6b80932022cea34a019e2bb32f6fa9e494dfef",
"rev": "f7795ede5b02664b57035b3b757876703e2c3eac",
"type": "github"
},
"original": {
@ -99,11 +99,11 @@
]
},
"locked": {
"lastModified": 1732645828,
"narHash": "sha256-+4U2I2653JvPFxcux837ulwYS864QvEueIljUkwytsk=",
"lastModified": 1736711425,
"narHash": "sha256-8hKhPQuMtXfJi+4lPvw3FBk/zSJVHeb726Zo0uF1PP8=",
"owner": "nix-community",
"repo": "disko",
"rev": "869ba3a87486289a4197b52a6c9e7222edf00b3e",
"rev": "f720e64ec37fa16ebba6354eadf310f81555cc07",
"type": "github"
},
"original": {
@ -143,11 +143,11 @@
},
"locked": {
"dir": "pkgs/firefox-addons",
"lastModified": 1732593794,
"narHash": "sha256-VhS+81/eTDiin5ULZLWvqI+9ggI+qXNUSvi3dIQfBX4=",
"lastModified": 1736913802,
"narHash": "sha256-72be03HWS5Q8I1W9hlWRVicZxL5MJURVKbnJGIcbjIE=",
"owner": "rycee",
"repo": "nur-expressions",
"rev": "9b7d4fb4739c0bf808d31e2b66b337f1234e4447",
"rev": "79a77a7d0b22e82d52a90055cc8206447ab85285",
"type": "gitlab"
},
"original": {
@ -238,11 +238,11 @@
]
},
"locked": {
"lastModified": 1726153070,
"narHash": "sha256-HO4zgY0ekfwO5bX0QH/3kJ/h4KvUDFZg8YpkNwIbg1U=",
"lastModified": 1733312601,
"narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "bcef6817a8b2aa20a5a6dbb19b43e63c5bf8619a",
"rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github"
},
"original": {
@ -259,11 +259,11 @@
]
},
"locked": {
"lastModified": 1730504689,
"narHash": "sha256-hgmguH29K2fvs9szpq2r3pz2/8cJd2LPS+b4tfNFCwE=",
"lastModified": 1736143030,
"narHash": "sha256-+hu54pAoLDEZT9pjHlqL9DNzWz0NbUn8NEAHP7PQPzU=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "506278e768c2a08bec68eb62932193e341f55c90",
"rev": "b905f6fc23a9051a6e1b741e1438dbfc0634c6de",
"type": "github"
},
"original": {
@ -333,18 +333,14 @@
"nixpkgs": [
"nixvim",
"nixpkgs"
],
"nixpkgs-stable": [
"nixvim",
"nixpkgs"
]
},
"locked": {
"lastModified": 1732021966,
"narHash": "sha256-mnTbjpdqF0luOkou8ZFi2asa1N3AA2CchR/RqCNmsGE=",
"lastModified": 1735882644,
"narHash": "sha256-3FZAG+pGt3OElQjesCAWeMkQ7C/nB1oTHLRQ8ceP110=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "3308484d1a443fc5bc92012435d79e80458fe43c",
"rev": "a5a961387e75ae44cc20f0a57ae463da5e959656",
"type": "github"
},
"original": {
@ -382,11 +378,11 @@
]
},
"locked": {
"lastModified": 1732482255,
"narHash": "sha256-GUffLwzawz5WRVfWaWCg78n/HrBJrOG7QadFY6rtV8A=",
"lastModified": 1736785676,
"narHash": "sha256-TY0jUwR3EW0fnS0X5wXMAVy6h4Z7Y6a3m+Yq++C9AyE=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "a9953635d7f34e7358d5189751110f87e3ac17da",
"rev": "fc52a210b60f2f52c74eac41a8647c1573d2071d",
"type": "github"
},
"original": {
@ -397,11 +393,11 @@
},
"impermanence": {
"locked": {
"lastModified": 1731242966,
"narHash": "sha256-B3C3JLbGw0FtLSWCjBxU961gLNv+BOOBC6WvstKLYMw=",
"lastModified": 1736688610,
"narHash": "sha256-1Zl9xahw399UiZSJ9Vxs1W4WRFjO1SsNdVZQD4nghz0=",
"owner": "nix-community",
"repo": "impermanence",
"rev": "3ed3f0eaae9fcc0a8331e77e9319c8a4abd8a71a",
"rev": "c64bed13b562fc3bb454b48773d4155023ac31b7",
"type": "github"
},
"original": {
@ -496,11 +492,11 @@
]
},
"locked": {
"lastModified": 1732324260,
"narHash": "sha256-0xzQvoId/P008QkTSAdFVv465P9rL9nYkIOWXL5pdsY=",
"lastModified": 1736370755,
"narHash": "sha256-iWcjToBpx4PUd74uqvIGAfqqVfyrvRLRauC/SxEKIF0=",
"owner": "lnl7",
"repo": "nix-darwin",
"rev": "698a62c628c2ec423aa770d8ec0e1d0bcf4fca1a",
"rev": "57733bd1dc81900e13438e5b4439239f1b29db0e",
"type": "github"
},
"original": {
@ -511,11 +507,11 @@
},
"nixlib": {
"locked": {
"lastModified": 1732410305,
"narHash": "sha256-/hxIKRTBsdrnudJWDGaBN8wIjHovqVAVxXdi8ByVtck=",
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "87b6978992e2eb605732fba842cad0a7e14b2047",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
@ -538,11 +534,11 @@
"treefmt-nix": "treefmt-nix_3"
},
"locked": {
"lastModified": 1731763758,
"narHash": "sha256-zcoxeMRGPpOd46dLeo2bgGLkjW5w50VC5DwZlvZD+A4=",
"lastModified": 1735024884,
"narHash": "sha256-aoTJqEImmpgsol+TyDASuyHW6tuL7NIS8gusUJ/kxyk=",
"owner": "nix-community",
"repo": "nixos-anywhere",
"rev": "80a2e7d6d9816a80fd412befd5f173836e675185",
"rev": "97b45ac774699b1cfd267e98a8bdecb74bace593",
"type": "github"
},
"original": {
@ -569,15 +565,15 @@
},
"nixos-facter-modules_2": {
"locked": {
"lastModified": 1732288619,
"narHash": "sha256-zSQ2cR+NRJfHUVfkv+O6Wi53wXfzX8KHiO8fRfnvc0M=",
"owner": "numtide",
"lastModified": 1736931726,
"narHash": "sha256-aY55yiifyo1XPPpbpH0kWlV1g2dNGBlx6622b7OK8ks=",
"owner": "nix-community",
"repo": "nixos-facter-modules",
"rev": "862648589993a96480c2255197a28feea712f68f",
"rev": "fa11d87b61b2163efbb9aed7b7a5ae0299e5ab9c",
"type": "github"
},
"original": {
"owner": "numtide",
"owner": "nix-community",
"repo": "nixos-facter-modules",
"type": "github"
}
@ -590,11 +586,11 @@
]
},
"locked": {
"lastModified": 1732496924,
"narHash": "sha256-/MNhZLR0eh9z/d3l+ammq+F5XxHln0RHgO4Bhtjr0IM=",
"lastModified": 1736730523,
"narHash": "sha256-mvTZ7fLKA6ggGnA8GZwcXV57EvVReRTCfi26xc08Q3g=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "098e8b6ff72c86944a8d54b64ddd7b7e6635830a",
"rev": "74b8e31dd709760c86eed16b6c1d0b88d7360937",
"type": "github"
},
"original": {
@ -605,11 +601,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1732483221,
"narHash": "sha256-kF6rDeCshoCgmQz+7uiuPdREVFuzhIorGOoPXMalL2U=",
"lastModified": 1736441705,
"narHash": "sha256-OL7leZ6KBhcDF3nEKe4aZVfIm6xQpb1Kb+mxySIP93o=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "45348ad6fb8ac0e8415f6e5e96efe47dd7f39405",
"rev": "8870dcaff63dfc6647fb10648b827e9d40b0a337",
"type": "github"
},
"original": {
@ -630,11 +626,11 @@
]
},
"locked": {
"lastModified": 1727367213,
"narHash": "sha256-7O4pi8MmcJpA0nYUQkdolvKGyu6zNjf2gFYD1Q0xppc=",
"lastModified": 1734098258,
"narHash": "sha256-3mzGstXtPqt+zWzXqesgQ2haEI6LNCFhc/uU3Bcj6Ak=",
"owner": "nix-community",
"repo": "nixos-images",
"rev": "3e7978bab153f39f3fc329ad346d35a8871420f7",
"rev": "231f5f6370e78d04675c9fa8199be6c3b1b85773",
"type": "github"
},
"original": {
@ -645,48 +641,48 @@
},
"nixos-stable": {
"locked": {
"lastModified": 1727264057,
"narHash": "sha256-KQPI8CTTnB9CrJ7LrmLC4VWbKZfljEPBXOFGZFRpxao=",
"lastModified": 1733808091,
"narHash": "sha256-KWwINTQelKOoQgrXftxoqxmKFZb9pLVfnRvK270nkVk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "759537f06e6999e141588ff1c9be7f3a5c060106",
"rev": "a0f3e10d94359665dba45b71b4227b0aeb851f8e",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.05",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1732014248,
"narHash": "sha256-y/MEyuJ5oBWrWAic/14LaIr/u5E0wRVzyYsouYY3W6w=",
"owner": "NixOS",
"lastModified": 1736798957,
"narHash": "sha256-qwpCtZhSsSNQtK4xYGzMiyEDhkNzOCz/Vfu4oL2ETsQ=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "23e89b7da85c3640bbc2173fe04f4bd114342367",
"rev": "9abb87b552b7f55ac8916b6fc9e5cb486656a2f3",
"type": "github"
},
"original": {
"owner": "NixOS",
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-24_05": {
"nixpkgs-24_11": {
"locked": {
"lastModified": 1717144377,
"narHash": "sha256-F/TKWETwB5RaR8owkPPi+SPJh83AQsm6KrQAlJ8v/uA=",
"lastModified": 1734083684,
"narHash": "sha256-5fNndbndxSx5d+C/D0p/VF32xDiJCJzyOqorOYW4JEo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "805a384895c696f802a9bf5bf4720f37385df547",
"rev": "314e12ba369ccdb9b352a4db26ff419f7c49fa84",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-24.05",
"ref": "nixos-24.11",
"type": "indirect"
}
},
@ -707,11 +703,11 @@
"treefmt-nix": "treefmt-nix_4"
},
"locked": {
"lastModified": 1732629460,
"narHash": "sha256-Cr8EyxEFPbVmX6p8LsslFBjDEuVlFNPILrWlwbBNnNA=",
"lastModified": 1736961674,
"narHash": "sha256-nuOFHtSUHYsb6PHueFF9KPLS8v+Wi+wGCXZCI+J54QI=",
"owner": "nix-community",
"repo": "nixvim",
"rev": "8b19d154823619af7ced464185e8d13ec80a758b",
"rev": "54e6dbd8c83586d9553f61c21fa639b500e51f93",
"type": "github"
},
"original": {
@ -729,11 +725,11 @@
]
},
"locked": {
"lastModified": 1731936508,
"narHash": "sha256-z0BSSf78LkxIrrFXZYmCoRRAxAmxMUKpK7CyxQRvkZI=",
"lastModified": 1735854821,
"narHash": "sha256-Iv59gMDZajNfezTO0Fw6LHE7uKAShxbvMidmZREit7c=",
"owner": "NuschtOS",
"repo": "search",
"rev": "fe07070f811b717a4626d01fab714a87d422a9e1",
"rev": "836908e3bddd837ae0f13e215dd48767aee355f0",
"type": "github"
},
"original": {
@ -752,11 +748,11 @@
]
},
"locked": {
"lastModified": 1731936508,
"narHash": "sha256-z0BSSf78LkxIrrFXZYmCoRRAxAmxMUKpK7CyxQRvkZI=",
"lastModified": 1735854821,
"narHash": "sha256-Iv59gMDZajNfezTO0Fw6LHE7uKAShxbvMidmZREit7c=",
"owner": "NuschtOS",
"repo": "search",
"rev": "fe07070f811b717a4626d01fab714a87d422a9e1",
"rev": "836908e3bddd837ae0f13e215dd48767aee355f0",
"type": "github"
},
"original": {
@ -792,14 +788,14 @@
"nixpkgs": [
"nixpkgs"
],
"nixpkgs-24_05": "nixpkgs-24_05"
"nixpkgs-24_11": "nixpkgs-24_11"
},
"locked": {
"lastModified": 1722877200,
"narHash": "sha256-qgKDNJXs+od+1UbRy62uk7dYal3h98I4WojfIqMoGcg=",
"lastModified": 1735230346,
"narHash": "sha256-zgR8NTiNDPVNrfaiOlB9yHSmCqFDo7Ks2IavaJ2dZo4=",
"owner": "simple-nixos-mailserver",
"repo": "nixos-mailserver",
"rev": "af7d3bf5daeba3fc28089b015c0dd43f06b176f2",
"rev": "dc0569066e79ae96184541da6fa28f35a33fbf7b",
"type": "gitlab"
},
"original": {
@ -841,11 +837,11 @@
]
},
"locked": {
"lastModified": 1732575825,
"narHash": "sha256-xtt95+c7OUMoqZf4OvA/7AemiH3aVuWHQbErYQoPwFk=",
"lastModified": 1736808430,
"narHash": "sha256-wlgdf/n7bJMLBheqt1jmPoxJFrUP6FByKQFXuM9YvIk=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "3433ea14fbd9e6671d0ff0dd45ed15ee4c156ffa",
"rev": "553c7cb22fed19fd60eb310423fdc93045c51ba8",
"type": "github"
},
"original": {
@ -861,11 +857,11 @@
]
},
"locked": {
"lastModified": 1732570520,
"narHash": "sha256-ANPZf+osgErYUs27N7ItYovc0d/TJKwOpMtlpk6W9+M=",
"lastModified": 1736810122,
"narHash": "sha256-29Mp0xa3jXF33Qu92hd/uPz1HZWBestpEKmgG4RyzCo=",
"owner": "nix-community",
"repo": "srvos",
"rev": "0ba8119cd4077eaea0f2406b8e1ec491429b8fc4",
"rev": "61cc2047ad1a4c52ef18d117ac8e6ccfc0e38ea5",
"type": "github"
},
"original": {
@ -970,11 +966,11 @@
]
},
"locked": {
"lastModified": 1727252110,
"narHash": "sha256-3O7RWiXpvqBcCl84Mvqa8dXudZ1Bol1ubNdSmQt7nF4=",
"lastModified": 1733761991,
"narHash": "sha256-s4DalCDepD22jtKL5Nw6f4LP5UwoMcPzPZgHWjAfqbQ=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "1bff2ba6ec22bc90e9ad3f7e94cca0d37870afa3",
"rev": "0ce9d149d99bc383d1f2d85f31f6ebd146e46085",
"type": "github"
},
"original": {
@ -991,11 +987,11 @@
]
},
"locked": {
"lastModified": 1732292307,
"narHash": "sha256-5WSng844vXt8uytT5djmqBCkopyle6ciFgteuA9bJpw=",
"lastModified": 1736154270,
"narHash": "sha256-p2r8xhQZ3TYIEKBoiEhllKWQqWNJNoT9v64Vmg4q8Zw=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "705df92694af7093dfbb27109ce16d828a79155f",
"rev": "13c913f5deb3a5c08bb810efd89dc8cb24dd968b",
"type": "github"
},
"original": {
@ -1011,11 +1007,11 @@
]
},
"locked": {
"lastModified": 1732643199,
"narHash": "sha256-uI7TXEb231o8dkwB5AUCecx3AQtosRmL6hKgnckvjps=",
"lastModified": 1736154270,
"narHash": "sha256-p2r8xhQZ3TYIEKBoiEhllKWQqWNJNoT9v64Vmg4q8Zw=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "84637a7ab04179bdc42aa8fd0af1909fba76ad0c",
"rev": "13c913f5deb3a5c08bb810efd89dc8cb24dd968b",
"type": "github"
},
"original": {

View file

@ -2,8 +2,8 @@
description = "jopejoe1 NixOS configuration";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
nixos-facter-modules.url = "github:numtide/nixos-facter-modules";
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
nixos-facter-modules.url = "github:nix-community/nixos-facter-modules";
# Outputs
nixos-generators = {

View file

@ -18,7 +18,7 @@ in
programs.git = {
enable = true;
package = pkgs.git;
userEmail = "johannes@joens.email";
userEmail = "jopejoe1@missing.ninja";
userName = "jopejoe1";
extraConfig = {
core = {

View file

@ -13,7 +13,7 @@ in
loader = {
systemd-boot = {
enable = true;
configurationLimit = 10;
configurationLimit = 5;
editor = false;
};
efi = {

View file

@ -17,7 +17,7 @@ in
services.printing = {
enable = true;
webInterface = true;
drivers = with pkgs; [ ];
drivers = with pkgs; [ hplip ];
};
hardware = {
@ -30,6 +30,7 @@ in
services.avahi = {
enable = true;
nssmdns4 = true;
nssmdns6 = true;
openFirewall = true;
};
};

View file

@ -11,7 +11,9 @@ let
in
{
options.jopejoe1.sops = {
enable = (lib.mkEnableOption "Enable sops") // { default = true;};
enable = (lib.mkEnableOption "Enable sops") // {
default = true;
};
};
config = lib.mkIf cfg.enable {

View file

@ -18,7 +18,7 @@ in
users.users.jopejoe1 = {
isNormalUser = true;
shell = pkgs.nushell;
description = "Johannes Jöns";
description = "jopejoe1";
hashedPassword = "$2b$05$Uk84TY/RHlH8DIigUlFYjeorjTlCMEY9wN2pAcw5BLaPoc7dKiSsC";
extraGroups = [
"wheel"

View file

@ -10,8 +10,8 @@
./hardware-configuration.nix
nixos-hardware.nixosModules.common-cpu-intel
#nixos-hardware.nixosModules.common-gpu-nvidia
nixos-hardware.nixosModules.common-pc-laptop
nixos-hardware.nixosModules.common-pc-laptop-hdd
#nixos-hardware.nixosModules.common-pc-laptop
#nixos-hardware.nixosModules.common-pc-laptop-hdd
];
facter.reportPath = ./facter.json;

View file

@ -6,6 +6,9 @@
...
}:
let
network_interface_name = (lib.elemAt config.facter.report.hardware.network_interface 0).unix_device_name;
in
{
imports = [
@ -40,10 +43,36 @@
};
};
networking.firewall = {
enable = true;
allowedTCPPorts = [ 21 80 ];
allowedUDPPorts = [ 21 80 ];
networking = {
firewall = {
enable = true;
allowedTCPPorts = [
21
80
];
allowedUDPPorts = [
21
80
];
};
bridges.br0.interfaces = [
network_interface_name
];
useDHCP = false;
interfaces."br0" = {
useDHCP = true;
ipv4.addresses = [
{
address = "192.168.100.3";
prefixLength = 24;
}
];
};
defaultGateway = {
address = "192.168.100.1";
interface = network_interface_name;
};
nameservers = [ "192.168.100.1" ];
};
systemd.network.networks."10-uplink".networkConfig.Address = "2a01:4f8:a0:31e5::/64";
@ -66,6 +95,36 @@
chrootlocalUser = true;
};
services.akkoma = {
enable = true;
package = pkgs.akkoma.overrideAttrs (finalAttrs: previousAttrs: {
patches = [
(pkgs.fetchpatch2 {
url = "https://akkoma.dev/AkkomaGang/akkoma/pulls/846.patch";
hash = "sha256-KTv7YKzSAzLqBnG22EIbIiX4B5D4WUYT9FzZCb4CYrU=";
})
];
});
nginx = {
enableACME = true;
forceSSL = true;
};
config = {
":pleroma" = {
":instance" = {
name = "Nyan Social";
description = "More detailed description";
email = "admin@nyan.social";
registration_open = false;
};
"Pleroma.Web.Endpoint" = {
url.host = "nyan.social";
};
"Pleroma.Upload".base_url = "https://nyan.social/media/";
};
};
};
users.users.backupftp = {
isNormalUser = true;
initialPassword = "backupPassword";

View file

@ -25,6 +25,9 @@
"net0loggy.de"
"dtg-c.de"
"joens.email"
"nyan.social"
"miau.social"
"pumkin.social"
];
# A list of all login accounts. To create the password hashes, use
@ -48,6 +51,9 @@
"@net0loggy.de"
"@dtg-c.de"
"@joens.email"
"@nyan.social"
"@miau.social"
"@pumpkin.social"
];
};
};

View file

@ -58,7 +58,8 @@
"cache.missing.ninja" = {
forceSSL = true;
enableACME = true;
locations."/".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
locations."/".proxyPass =
"http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
};
"nix.missing.ninja" = {
forceSSL = true;
@ -71,15 +72,6 @@
specialArgs.modulesPath = pkgs.path + "/nixos/modules";
urlPrefix = "https://github.com/nix-community/disko/blob/master/";
}
{
modules = lib.attrValues self.inputs.nixos-hardware.nixosModules;
name = "NixOS Hardware";
specialArgs = {
modulesPath = pkgs.path + "/nixos/modules";
inherit pkgs;
};
urlPrefix = "https://github.com/NixOS/nixos-hardware/blob/master/";
}
{
modules = [
self.inputs.snm.nixosModules.default
@ -98,23 +90,29 @@
urlPrefix = "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/blob/master/";
}
{
optionsJSON = (import "${self.inputs.nixpkgs}/nixos/release.nix" { }).options + /share/doc/nixos/options.json;
optionsJSON =
(import "${self.inputs.nixpkgs}/nixos/release.nix" { }).options + /share/doc/nixos/options.json;
name = "NixOS";
urlPrefix = "https://github.com/NixOS/nixpkgs/tree/master/";
}
{
optionsJSON = self.inputs.home-manager.packages.${pkgs.stdenv.system}.docs-html.passthru.home-manager-options.nixos + /share/doc/nixos/options.json;
optionsJSON =
self.inputs.home-manager.packages.${pkgs.stdenv.system}.docs-html.passthru.home-manager-options.nixos
+ /share/doc/nixos/options.json;
name = "Home Manager NixOS";
urlPrefix = "https://github.com/nix-community/home-manager/tree/master/";
}
{
optionsJSON = self.inputs.home-manager.packages.${pkgs.stdenv.system}.docs-json + /share/doc/home-manager/options.json;
optionsJSON =
self.inputs.home-manager.packages.${pkgs.stdenv.system}.docs-json
+ /share/doc/home-manager/options.json;
optionsPrefix = "home-manager.users.<name>";
name = "Home Manager";
urlPrefix = "https://github.com/nix-community/home-manager/tree/master/";
}
{
optionsJSON = self.inputs.nixvim.packages.${pkgs.stdenv.system}.options-json + /share/doc/nixos/options.json;
optionsJSON =
self.inputs.nixvim.packages.${pkgs.stdenv.system}.options-json + /share/doc/nixos/options.json;
optionsPrefix = "programs.nixvim";
name = "NixVim";
urlPrefix = "https://github.com/nix-community/nixvim/tree/main/";

View file

@ -50,15 +50,22 @@
networking = {
hostId = "16c22faf";
firewall = {
allowedTCPPorts = [ 8080 ];
allowedUDPPorts = [ 8080 ];
};
};
services = {
hardware.openrgb = {
enable = true;
};
zerotierone.joinNetworks = [
"d5e5fb653774ee43"
];
postgresql = {
enable = true;
extraPlugins = ps: with ps; [ pg_libversion ];
extensions = ps: with ps; [ pg_libversion ];
enableTCPIP = true;
initialScript = pkgs.writeText "backend-initScript" ''
CREATE DATABASE repology
@ -77,6 +84,10 @@
openFirewall = true;
secretKeyFile = "/var/cache-priv-key.pem";
};
shairport-sync = {
enable = true;
package = pkgs.shairport-sync-airplay2;
};
};
nixpkgs = {
@ -105,11 +116,11 @@
environment.systemPackages = with pkgs; [
prismlauncher
picard
mixxx
#mixxx
goverlay
strawberry-qt6
jitsi-meet-electron
thunderbird
gh
(ffmpeg-full.override {
#withTensorflow = true;
withUnfree = true;

View file

@ -65,6 +65,10 @@
udev.packages = [ pkgs.yubikey-personalization ];
fwupd.enable = true;
libinput.enable = true;
#repology.enable = true;
zerotierone.joinNetworks = [
"d5e5fb653774ee43"
];
};
time.timeZone = "Europe/Berlin";
@ -79,7 +83,6 @@
environment.systemPackages = with pkgs; [
prismlauncher
goverlay
thunderbird
strawberry-qt6
picard
@ -106,14 +109,16 @@
"nixos-test"
];
networking.firewall = {
allowedTCPPorts = [ 8080 ];
allowedUDPPorts = [ 8080 ];
};
boot.binfmt.emulatedSystems = [
"riscv64-linux"
"aarch64-linux"
"armv6l-linux"
];
boot.plymouth = {
enable = true;
};
boot.initrd.systemd.enable = true;
programs.captive-browser = {

View file

@ -1,4 +1,4 @@
{...}:
{ ... }:
{
disko.devices = {
disk = {

File diff suppressed because it is too large Load diff

View file

@ -12,7 +12,7 @@
fileSystems."/home/jopejoe1/Public/games" = {
device = "/dev/sda";
fsType = "bcachefs";
options = [ "compression=zstd" ];
options = [ "compression=zstd" "nofail" ];
};
powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand";

View file

@ -121,11 +121,9 @@
if ! test -e "${hostStateDir}/secret-keys.php"; then
umask 0177
echo "<?php" >> "${hostStateDir}/secret-keys.php"
${
lib.concatMapStringsSep "\n" (var: ''
echo "define('${var}', '`tr -dc a-zA-Z0-9 </dev/urandom | head -c 64`');" >> "${hostStateDir}/secret-keys.php"
'') secretsVars
}
${lib.concatMapStringsSep "\n" (var: ''
echo "define('${var}', '`tr -dc a-zA-Z0-9 </dev/urandom | head -c 64`');" >> "${hostStateDir}/secret-keys.php"
'') secretsVars}
echo "?>" >> "${hostStateDir}/secret-keys.php"
chmod 440 "${hostStateDir}/secret-keys.php"
fi