This commit is contained in:
mjallen18
2025-08-20 18:19:20 -05:00
parent b937a85dcc
commit 24c1580452
31 changed files with 351 additions and 463 deletions

View File

@@ -4,7 +4,6 @@
}:
{
imports = [
./nix.nix
./homebrew.nix
./programs.nix
./system.nix

View File

@@ -1,17 +0,0 @@
{ ... }:
{
# Auto upgrade nix package and the daemon service.
# services.nix-daemon.enable = true;
# nix.package = pkgs.nix;
# Necessary for using flakes on this system.
nix = {
settings.experimental-features = "nix-command flakes";
};
# The platform the configuration will be used on.
nixpkgs = {
config.allowUnfree = true;
hostPlatform = "aarch64-darwin";
};
}

View File

@@ -1,59 +1,69 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
lib,
modulesPath,
...
}:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "usb_storage" "sdhci_pci" ];
boot.initrd.availableKernelModules = [
"usb_storage"
"sdhci_pci"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "none";
fsType = "tmpfs";
options = [ "mode=755" ];
};
fileSystems."/" = {
device = "none";
fsType = "tmpfs";
options = [ "mode=755" ];
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/E66E-1A03";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/E66E-1A03";
fsType = "vfat";
options = [
"fmask=0022"
"dmask=0022"
];
};
fileSystems."/root" =
{ device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/root" = {
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/etc" =
{ device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=etc" ];
};
fileSystems."/etc" = {
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=etc" ];
};
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/nix" = {
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/var/log" =
{ device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=log" ];
};
fileSystems."/var/log" = {
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=log" ];
};
fileSystems."/home" =
{ device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/home" = {
device = "/dev/disk/by-uuid/335f1bb3-6fdb-474e-972c-77b64e930d03";
fsType = "btrfs";
options = [ "subvol=home" ];
};
swapDevices = [ ];

View File

@@ -3,7 +3,6 @@
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
{
config,
lib,
pkgs,
namespace,
@@ -26,19 +25,6 @@ in
hardware.disko.enable = true;
};
nix = {
settings = {
substituters = [
"https://nixos-raspberrypi.cachix.org"
"https://cache.mjallen.dev"
];
trusted-public-keys = [
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
"cache.mjallen.dev-1:IzFmKCd8/gggI6lcCXsW65qQwiCLGFFN9t9s2iw7Lvc="
];
};
};
# Configure nixpkgs
nixpkgs = {
overlays = lib.mkAfter [
@@ -53,20 +39,8 @@ in
})
];
};
programs.zsh.enable = true;
hardware.i2c.enable = true;
services = {
openssh = {
enable = true;
authorizedKeysFiles = [
config.sops.secrets."ssh-keys-public/pi5".path
];
hostKeys = [ ];
};
};
systemd.services.btattach = {
before = [ "bluetooth.service" ];
after = [ "dev-ttyAMA0.device" ];

View File

@@ -11,7 +11,7 @@
}:
let
user = "matt";
password = config.sops.secrets."pi5/matt-password".path;
# password = config.sops.secrets."pi5/matt-password".path;
kernelBundle = pkgs.linuxAndFirmware.latest;
in
{
@@ -30,20 +30,6 @@ in
};
};
# Enable nix flakes and nix-command tools
nix = {
settings = {
substituters = [
"https://nixos-raspberrypi.cachix.org"
# "https://cache.mjallen.dev"
];
trusted-public-keys = [
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
# "cache.mjallen.dev-1:IzFmKCd8/gggI6lcCXsW65qQwiCLGFFN9t9s2iw7Lvc="
];
};
};
# Configure nixpkgs
nixpkgs = {
overlays = lib.mkAfter [
@@ -119,5 +105,9 @@ in
users.root.shell = pkgs.zsh;
};
programs = {
kdeconnect.enable = false;
};
zramSwap.enable = true;
}

View File

@@ -51,17 +51,6 @@ let
];
in
{
# nix = {
# settings = {
# substituters = [
# "https://cache.mjallen.dev"
# ];
# trusted-public-keys = [
# "cache.mjallen.dev-1:IzFmKCd8/gggI6lcCXsW65qQwiCLGFFN9t9s2iw7Lvc="
# ];
# };
# };
chaotic.mesa-git.enable = false;
# Environment configuration

View File

@@ -27,7 +27,8 @@ in
fsType = "bcachefs";
options = [
"noatime"
] ++ defaultLocalOptions;
]
++ defaultLocalOptions;
};
# Network shares

View File

@@ -32,7 +32,8 @@ in
options = [
"subvol=nix"
"noatime"
] ++ defeaultBtrfsOptions;
]
++ defeaultBtrfsOptions;
};
fileSystems."/etc" = {
@@ -41,7 +42,8 @@ in
options = [
"subvol=etc"
"noatime"
] ++ defeaultBtrfsOptions;
]
++ defeaultBtrfsOptions;
};
fileSystems."/root" = {
@@ -50,7 +52,8 @@ in
options = [
"subvol=root"
"noatime"
] ++ defeaultBtrfsOptions;
]
++ defeaultBtrfsOptions;
};
fileSystems."/var/log" = {
@@ -59,7 +62,8 @@ in
options = [
"subvol=log"
"noatime"
] ++ defeaultBtrfsOptions;
]
++ defeaultBtrfsOptions;
};
fileSystems."/home" = {
@@ -67,7 +71,8 @@ in
fsType = "btrfs";
options = [
"subvol=home"
] ++ defeaultBtrfsOptions;
]
++ defeaultBtrfsOptions;
};
fileSystems."/boot" = {

View File

@@ -8,4 +8,4 @@
environment.variables = {
LSFG_DLL_PATH = "/media/matt/data/steam/steamapps/common/Lossless Scaling/Lossless.dll";
};
}
}

View File

@@ -52,7 +52,7 @@ in
clevis = {
enable = true;
devices = {
# "/dev/sde:/dev/sdf:/dev/sdh:/dev/sdi:/dev/sdj".secretFile = "../../../pool.jwe";
# "/dev/sde:/dev/sdf:/dev/sdh:/dev/sdi:/dev/sdj".secretFile = "../../../pool.jwe";
};
};
};

View File

@@ -1,4 +1,3 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page, on
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
@@ -19,7 +18,6 @@
./apps.nix
./grafana.nix
./networking.nix
./nixpkgs.nix
./ups.nix
./users.nix
./samba.nix
@@ -191,20 +189,4 @@
optimise.automatic = lib.mkDefault true;
};
# Nixpkgs configuration
nixpkgs = {
config = {
allowUnfree = lib.mkForce true;
allowUnsupportedSystem = true;
permittedInsecurePackages = [
# ...
];
};
};
nixpkgs.config.allowUnfreePredicate =
pkg:
builtins.elem (lib.getName pkg) [
"vscode-extension-github-copilot"
];
}

View File

@@ -1,11 +1,8 @@
{ ... }:
let
defaultOptions = [ "compress=zstd" ];
in
{
fileSystems."/mnt" = {
fileSystems."/media/nas/main" = {
label = "nas_pool";
# device = "/dev/sde:/dev/sdf:/dev/sdh:/dev/sdi:/dev/:sdj";
# device = "/dev/sde:/dev/sdf:/dev/sdh:/dev/sdi:/dev/sdj:/dev/nmve0n1:/dev/nvme1n1";
fsType = "bcachefs";
mountPoint = "/media/nas/main";
};

View File

@@ -1,25 +0,0 @@
{ ... }:
{
# Configure nixpkgs
nixpkgs = {
config = {
# Enable non free
allowUnfree = true;
# enable cuda support
cudaSupport = true;
allowUnfreePredicate =
p:
builtins.all (
license:
license.free
|| builtins.elem license.shortName [
"CUDA EULA"
"cuDNN EULA"
"cuTENSOR EULA"
"NVidia OptiX EULA"
]
) (if builtins.isList p.meta.license then p.meta.license else [ p.meta.license ]);
};
};
}

View File

@@ -45,15 +45,4 @@
optimise.automatic = lib.mkDefault true;
};
# Nixpkgs configuration
nixpkgs = {
config = {
allowUnfree = lib.mkForce true;
allowUnsupportedSystem = true;
permittedInsecurePackages = [
# ...
];
};
};
}

View File

@@ -60,9 +60,5 @@ in
# Further reduce systemd output
systemd = {
services.systemd-udev-settle.enable = false;
extraConfig = ''
ShowStatus=no
DefaultTimeoutStartSec=15s
'';
};
}

View File

@@ -9,8 +9,6 @@
...
}:
{
nixpkgs.config.allowUnfree = lib.mkForce true;
# Define a user account. Don't forget to set a password with passwd.
users.users = {
deck = {

View File

@@ -19,8 +19,6 @@
./sops.nix
];
nixpkgs.config.allowUnfree = true;
${namespace} = {
hardware.disko.enable = true;
bootloader.lanzaboote.enable = true;