aboutsummaryrefslogtreecommitdiffstats
path: root/flake.nix
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--flake.nix147
1 files changed, 145 insertions, 2 deletions
diff --git a/flake.nix b/flake.nix
index 0d606fb..e0cc70a 100644
--- a/flake.nix
+++ b/flake.nix
@@ -26,6 +26,7 @@
# per https://nixos-and-flakes.thiscute.world/nixos-with-flakes/downgrade-or-upgrade-packages
#nixpkgs-67e692392.url = "github:nixos/nixpkgs/67e69239226f37168d1adb8d29bd61150756a03e";
+ #nixpkgs-wine9_22.url = "github:nixos/nixpkgs/dea5930f0ed8c29d3758d5ade9898b4e99d80b74";
nixpkgs-master.url = "github:nixos/nixpkgs";
#nixpkgs-pr369712.url = "github:7c6f434c/nixpkgs/fix-tftp-hpa";
nixpkgs-stable.url = "github:nixos/nixpkgs/release-24.05";
@@ -51,6 +52,7 @@
nixpkgs-master,
#nixpkgs-pr369712,
nixpkgs-stable,
+ #nixpkgs-wine9_22,
nixpkgs,
nvidia-patch,
self,
@@ -98,6 +100,34 @@
];
};
+ caladan = nixpkgs.lib.nixosSystem {
+ specialArgs = { inherit inputs outputs; };
+ modules = [
+ #{
+ # environment.systemPackages = [
+ # ghostty.packages.x86_64-linux.default
+ # ];
+ #}
+ #({ config, pkgs, ... }:
+ # let
+ # overlay-dict-pr367392 = final: prev: {
+ # dict = nixpkgs-pr367392.legacyPackages."x86_64-linux".dict;
+ # };
+ # in {
+ # nixpkgs.overlays = [ overlay-dict-pr367392 ];
+ # }
+ #)
+ disko.nixosModules.disko
+ ./hosts/caladan
+ home-manager.nixosModules.home-manager {
+ home-manager.sharedModules = [ sops-nix.homeManagerModules.sops ];
+ home-manager.users.root = import ./home/root/caladan.nix;
+ home-manager.users.nipsy = import ./home/nipsy/caladan.nix;
+ }
+ sops-nix.nixosModules.sops
+ ];
+ };
+
darkstar = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
@@ -112,6 +142,21 @@
];
};
+ fangorn = nixpkgs.lib.nixosSystem rec {
+ specialArgs = { inherit inputs outputs; };
+ modules = [
+ disko.nixosModules.disko
+ ./hosts/fangorn
+ home-manager.nixosModules.home-manager {
+ home-manager.sharedModules = [ sops-nix.homeManagerModules.sops ];
+ home-manager.users.root = import ./home/root/fangorn.nix;
+ home-manager.users.don = import ./home/don/fangorn.nix;
+ home-manager.users.nipsy = import ./home/nipsy/fangorn.nix;
+ }
+ sops-nix.nixosModules.sops
+ ];
+ };
+
ginaz = nixpkgs.lib.nixosSystem rec {
specialArgs = { inherit inputs outputs; };
modules = [
@@ -130,10 +175,108 @@
# from https://nixos.wiki/wiki/Creating_a_NixOS_live_CD and https://chengeric.com/homelab/
iso = nixpkgs.lib.nixosSystem {
modules = [
- "${nixpkgs}/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix"
- ({
+ ({ modulesPath, pkgs, ... }: {
+ environment.systemPackages = [
+ pkgs.acl
+ pkgs.bash
+ pkgs.bc
+ pkgs.bzip2
+ pkgs.conntrack-tools
+ pkgs.coreutils
+ pkgs.cpio
+ pkgs.curl
+ pkgs.diffutils
+ pkgs.dig
+ pkgs.dmidecode
+ pkgs.elinks
+ pkgs.encfs
+ pkgs.ethtool
+ pkgs.expect
+ pkgs.file
+ pkgs.findutils
+ pkgs.fio
+ pkgs.fping
+ pkgs.git
+ pkgs.gnugrep
+ pkgs.gnupatch
+ pkgs.gnused
+ pkgs.gnutar
+ pkgs.gptfdisk
+ pkgs.gzip
+ pkgs.htop
+ pkgs.iotop
+ pkgs.ipcalc
+ pkgs.iperf
+ pkgs.iproute2
+ pkgs.iputils
+ pkgs.jq
+ pkgs.less
+ pkgs.lshw
+ pkgs.lsof
+ pkgs.lvm2
+ pkgs.moreutils
+ pkgs.nano
+ pkgs.netcat-openbsd
+ pkgs.nettools
+ pkgs.nmap
+ pkgs.ntfs3g
+ pkgs.openldap
+ pkgs.openssl
+ pkgs.p7zip
+ pkgs.parted
+ pkgs.pciutils
+ pkgs.procps
+ pkgs.progress
+ pkgs.psmisc
+ pkgs.pv
+ pkgs.pwgen
+ pkgs.recode
+ pkgs.rsync
+ pkgs.sg3_utils
+ pkgs.smartmontools
+ pkgs.socat
+ pkgs.speedtest-cli
+ pkgs.sqlite
+ pkgs.sshfs
+ pkgs.strace
+ pkgs.sysstat
+ pkgs.tcpdump
+ pkgs.tftp-hpa
+ pkgs.traceroute
+ pkgs.tree
+ pkgs.tshark
+ pkgs.unixtools.xxd
+ pkgs.unrar
+ pkgs.unzip
+ pkgs.usbutils
+ pkgs.util-linux
+ pkgs.vim
+ pkgs.wdiff
+ pkgs.wget
+ pkgs.whois
+ pkgs.wireguard-tools
+ pkgs.xz
+ pkgs.zip
+ ];
+
+ imports = [ (modulesPath + "/installer/cd-dvd/installation-cd-minimal.nix") ];
+
#isoImage.squashfsCompression = "gzip -Xcompression-level 1";
+
nix.settings.experimental-features = [ "nix-command" "flakes" ];
+
+ nixpkgs.config.allowUnfree = true;
+
+ services.openssh = {
+ enable = true;
+ openFirewall = true;
+
+ settings = {
+ PasswordAuthentication = false;
+ KbdInteractiveAuthentication = false;
+ };
+ };
+
users.users = {
nixos.openssh.authorizedKeys.keys = [ (builtins.readFile ./hosts/common/users/nipsy/keys/id_arrakis.pub) ];
root.openssh.authorizedKeys.keys = [ (builtins.readFile ./hosts/common/users/nipsy/keys/id_arrakis.pub) ];