370 lines
13 KiB
Nix
370 lines
13 KiB
Nix
{
|
||
inputs = {
|
||
nixpkgs.url = "nixpkgs/nixos-unstable";
|
||
agenix = {
|
||
url = "github:ryantm/agenix";
|
||
inputs.nixpkgs.follows = "nixpkgs";
|
||
};
|
||
};
|
||
|
||
outputs = { self, nixpkgs, agenix, ... }:
|
||
let
|
||
lib = nixpkgs.lib;
|
||
proj_root = ./../..;
|
||
# TODO: Change respectively to the system or make a nix shell to alias `nix run github:ryantm/agenix -- `
|
||
base_modules = [
|
||
agenix.nixosModule
|
||
{
|
||
age.secrets.s3fs = {
|
||
file = ./secrets/s3fs.age;
|
||
# mode = "600"; # owner + group only
|
||
# owner = "hungtr";
|
||
# group = "users";
|
||
};
|
||
age.secrets."s3fs.digital-garden" = {
|
||
file = ./secrets/s3fs.digital-garden.age;
|
||
};
|
||
age.secrets._nhitrl_cred = {
|
||
file = ./secrets/_nhitrl.age;
|
||
};
|
||
environment.systemPackages = [agenix.defaultPackage.x86_64-linux];
|
||
}
|
||
];
|
||
in {
|
||
# Windows with NixOS WSL
|
||
nixosConfigurations.Felia = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
modules = base_modules ++ [
|
||
./wsl-configuration.nix
|
||
{
|
||
system.stateVersion = "22.05";
|
||
}
|
||
];
|
||
specialArgs = {
|
||
# includeHardware = false;
|
||
hostname = "Felia";
|
||
_services.openssh = {
|
||
permitRootLogin = "no";
|
||
enable = true;
|
||
};
|
||
};
|
||
};
|
||
nixosConfigurations.lizzi = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
modules = base_modules ++ [
|
||
./configuration.nix
|
||
{
|
||
system.stateVersion = "22.05";
|
||
}
|
||
];
|
||
specialArgs = {
|
||
hostname = "lizzi";
|
||
_networking = {
|
||
interfaces.eth1.ipv4.addresses = [{
|
||
address = "71.0.0.1";
|
||
prefixLength = 24;
|
||
}];
|
||
firewall = {
|
||
enable = true;
|
||
allowedTCPPorts = [ 80 443 22 ];
|
||
};
|
||
useDHCP = false;
|
||
# required so that we get IP address from linode
|
||
interfaces.eth0.useDHCP = true;
|
||
};
|
||
_boot.loader.grub.enable = true;
|
||
_boot.loader.grub.version = 2;
|
||
_services.openssh = {
|
||
permitRootLogin = "no";
|
||
enable = true;
|
||
};
|
||
_services.gitea = {
|
||
enable = true;
|
||
stateDir = "/gitea";
|
||
rootUrl = "https://git.pegasust.com";
|
||
settings = {
|
||
repository = {
|
||
"ENABLE_PUSH_CREATE_USER" = true;
|
||
"ENABLE_PUSH_CREATE_ORG" = true;
|
||
};
|
||
};
|
||
};
|
||
# Highly suspect that thanks to nginx, ipv6 is disabled?
|
||
_services.nginx = {
|
||
enable = true;
|
||
clientMaxBodySize = "100m"; # Allow big file transfers over git :^)
|
||
recommendedGzipSettings = true;
|
||
recommendedOptimisation = true;
|
||
recommendedProxySettings = true;
|
||
recommendedTlsSettings = true;
|
||
virtualHosts."git.pegasust.com" = {
|
||
# Gitea hostname
|
||
sslCertificate = "/var/lib/acme/git.pegasust.com/fullchain.pem";
|
||
sslCertificateKey = "/var/lib/acme/git.pegasust.com/key.pem";
|
||
forceSSL = true; # Runs on port 80 and 443
|
||
locations."/".proxyPass = "http://localhost:3000/"; # Proxy to Gitea
|
||
};
|
||
};
|
||
};
|
||
};
|
||
# Generic machine
|
||
nixosConfigurations.pixi = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
modules = base_modules ++ [
|
||
./configuration.nix
|
||
{
|
||
system.stateVersion = "22.05";
|
||
}
|
||
];
|
||
specialArgs = {
|
||
hostname = "pixi";
|
||
_networking = {
|
||
# interfaces.eth1.ipv4.addresses = [{
|
||
# address = "71.0.0.1";
|
||
# prefixLength = 24;
|
||
# }];
|
||
firewall = {
|
||
enable = false;
|
||
allowedTCPPorts = [ 80 443 22 ];
|
||
};
|
||
useDHCP = false;
|
||
# interfaces.eth0.useDHCP = true;
|
||
};
|
||
_boot.loader.grub.enable = true;
|
||
_boot.loader.grub.version = 2;
|
||
_services.openssh = {
|
||
permitRootLogin = "no";
|
||
enable = true;
|
||
};
|
||
_services.gitea = {
|
||
enable = true;
|
||
stateDir = "/gitea";
|
||
rootUrl = "https://git.pegasust.com";
|
||
settings = {
|
||
repository = {
|
||
"ENABLE_PUSH_CREATE_USER" = true;
|
||
"ENABLE_PUSH_CREATE_ORG" = true;
|
||
};
|
||
};
|
||
};
|
||
_services.nginx = {
|
||
enable = true;
|
||
clientMaxBodySize = "100m"; # Allow big file transfers over git :^)
|
||
recommendedGzipSettings = true;
|
||
recommendedOptimisation = true;
|
||
recommendedProxySettings = true;
|
||
recommendedTlsSettings = true;
|
||
virtualHosts."git.pegasust.com" = {
|
||
# Gitea hostname
|
||
sslCertificate = "/var/lib/acme/git.pegasust.com/fullchain.pem";
|
||
sslCertificateKey = "/var/lib/acme/git.pegasust.com/key.pem";
|
||
forceSSL = true; # Runs on port 80 and 443
|
||
locations."/".proxyPass = "http://localhost:3000/"; # Proxy to Gitea
|
||
};
|
||
};
|
||
};
|
||
};
|
||
nixosConfigurations.nyx = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
modules = base_modules ++ [
|
||
./configuration.nix
|
||
{
|
||
system.stateVersion = "22.05";
|
||
}
|
||
];
|
||
specialArgs = {
|
||
hostname = "nyx";
|
||
_networking = {
|
||
enableIPv6 = false;
|
||
interfaces.eth1.ipv4.addresses = [{
|
||
address = "71.0.0.2";
|
||
prefixLength = 24;
|
||
}];
|
||
firewall.enable = true;
|
||
useDHCP = false;
|
||
interfaces.eth0.useDHCP = true;
|
||
};
|
||
_boot.loader.grub.enable = true;
|
||
_boot.loader.grub.version = 2;
|
||
_services.openssh = {
|
||
permitRootLogin = "no";
|
||
enable = true;
|
||
};
|
||
};
|
||
};
|
||
nixosConfigurations.nixos = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
modules = base_modules ++ [
|
||
./configuration.nix
|
||
{
|
||
system.stateVersion = "22.05";
|
||
}
|
||
];
|
||
specialArgs = {
|
||
hostname = "nixos";
|
||
};
|
||
};
|
||
nixosConfigurations.bao = nixpkgs.lib.nixosSystem {
|
||
system = "x86_64-linux";
|
||
specialArgs.hostname = "bao";
|
||
modules = base_modules ++ [
|
||
./configuration.nix
|
||
./../../modules/storage.perso.sys.nix
|
||
# GPU, sound, networking stuffs
|
||
({ config, pkgs, lib, ... }:
|
||
let
|
||
gpu_pkgs = [ pkgs.clinfo pkgs.lshw pkgs.glxinfo pkgs.pciutils pkgs.vulkan-tools ];
|
||
gpu_conf = {
|
||
# openCL
|
||
hardware.opengl = {
|
||
enable = true;
|
||
extraPackages = let
|
||
inherit (pkgs) rocm-opencl-icd rocm-opencl-runtime;
|
||
in [rocm-opencl-icd rocm-opencl-runtime];
|
||
# Vulkan
|
||
driSupport = true;
|
||
driSupport32Bit = true;
|
||
package = pkgs.mesa.drivers;
|
||
package32 = pkgs.pkgsi686Linux.mesa.drivers;
|
||
};
|
||
};
|
||
amd_rx470 = {
|
||
# early amd gpu usage
|
||
boot.initrd.kernelModules = ["amdgpu"];
|
||
services.xserver.enable = true;
|
||
services.xserver.videoDrivers = ["amdgpu"];
|
||
};
|
||
nv_rtx3060 = {
|
||
nixpkgs.config.allowUnfree = true;
|
||
services.xserver.enable = true;
|
||
services.xserver.videoDrivers = ["nvidia"];
|
||
hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.stable;
|
||
};
|
||
systemPackages = [] ++ gpu_pkgs;
|
||
in
|
||
lib.recursiveUpdate gpu_conf (lib.recursiveUpdate nv_rtx3060 {
|
||
# Use UEFI
|
||
boot.loader.systemd-boot.enable = true;
|
||
|
||
networking.hostName = "bao"; # Define your hostname.
|
||
# Pick only one of the below networking options.
|
||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||
networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
||
|
||
# Enable the X11 windowing system.
|
||
services.xserver.enable = true;
|
||
# KDE & Plasma 5
|
||
services.xserver.displayManager.sddm.enable = true;
|
||
services.xserver.desktopManager.plasma5 = {
|
||
enable = true;
|
||
excludePackages = let plasma5 = pkgs.libsForQt5; in [
|
||
plasma5.elisa # audio viewer
|
||
plasma5.konsole # I use alacritty instaed
|
||
plasma5.plasma-browser-integration
|
||
plasma5.print-manager # will enable if I need
|
||
plasma5.khelpcenter # why not just write manpages instead :(
|
||
# plasma5.ksshaskpass # pls just put prompts on my dear terminal
|
||
];
|
||
};
|
||
|
||
# disables KDE's setting of askpassword
|
||
programs.ssh.askPassword = "";
|
||
programs.ssh.enableAskPassword = false;
|
||
|
||
time.timeZone = "America/Phoenix";
|
||
# Configure keymap in X11
|
||
services.xserver.layout = "us";
|
||
# services.xserver.xkbOptions = {
|
||
# "eurosign:e";
|
||
# "caps:escape" # map caps to escape.
|
||
# };
|
||
|
||
# Enable CUPS to print documents.
|
||
# services.printing.enable = true;
|
||
|
||
# Enable sound. (pulse audio)
|
||
sound.enable = true;
|
||
programs.dconf.enable = true;
|
||
hardware.pulseaudio.enable = true;
|
||
hardware.pulseaudio.support32Bit = true;
|
||
nixpkgs.config.pulseaudio = true;
|
||
hardware.pulseaudio.extraConfig = "load-module module-combine-sink";
|
||
|
||
# Sound: pipewire
|
||
# sound.enable = false;
|
||
# hardware.pulseaudio.enable = false;
|
||
# services.pipewire = {
|
||
# enable = true;
|
||
# alsa.enable = true;
|
||
# alsa.support32Bit = true;
|
||
# pulse.enable = true;
|
||
# # Might want to use JACK in the future
|
||
# jack.enable = true;
|
||
# };
|
||
#
|
||
# security.rtkit.enable = true;
|
||
|
||
|
||
# Enable touchpad support (enabled default in most desktopManager).
|
||
# services.xserver.libinput.enable = true;
|
||
|
||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||
# users.users.alice = {
|
||
# isNormalUser = true;
|
||
# extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
|
||
# packages = with pkgs; [
|
||
# firefox
|
||
# thunderbird
|
||
# ];
|
||
# };
|
||
# Just an initial user to get this started lol
|
||
users.users.user = {
|
||
initialPassword = "pw123";
|
||
extraGroups = [ "wheel" "networkmanager" "audio"];
|
||
isNormalUser = true;
|
||
};
|
||
|
||
# List packages installed in system profile. To search, run:
|
||
# $ nix search wget
|
||
environment.systemPackages = with pkgs; [
|
||
neovim
|
||
wget
|
||
] ++ systemPackages;
|
||
|
||
# Some programs need SUID wrappers, can be configured further or are
|
||
# started in user sessions.
|
||
# programs.mtr.enable = true;
|
||
# programs.gnupg.agent = {
|
||
# enable = true;
|
||
# enableSSHSupport = true;
|
||
# };
|
||
|
||
# List services that you want to enable:
|
||
|
||
# Enable the OpenSSH daemon.
|
||
services.openssh.enable = true;
|
||
|
||
# Open ports in the firewall.
|
||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||
# Or disable the firewall altogether.
|
||
# networking.firewall.enable = false;
|
||
|
||
# Copy the NixOS configuration file and link it from the resulting system
|
||
# (/run/current-system/configuration.nix). This is useful in case you
|
||
# accidentally delete configuration.nix.
|
||
# system.copySystemConfiguration = true;
|
||
|
||
# This value determines the NixOS release from which the default
|
||
# settings for stateful data, like file locations and database versions
|
||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||
# this value at the release version of the first install of this system.
|
||
# Before changing this value read the documentation for this option
|
||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||
system.stateVersion = "22.11"; # Did you read the comment?
|
||
}))
|
||
];
|
||
};
|
||
};
|
||
}
|