diff --git a/home/code.nix b/home/code.nix new file mode 100644 index 0000000..eb032b2 --- /dev/null +++ b/home/code.nix @@ -0,0 +1,15 @@ +{pkgs, lib, ...}: +let + unstable = import { config = { allowUnfree = true; }; }; +in +{ + home-manager.users.gunalx = { + #vscode with home manager + programs.vscode = { + enable = true; + enableUpdateCheck = false; + package = unstable.vscode-fhs; + + }; + }; +} diff --git a/home/home.nix b/home/home.nix new file mode 100644 index 0000000..cd8ff47 --- /dev/null +++ b/home/home.nix @@ -0,0 +1,18 @@ +{ config, pkgs, ... }: +let + home-manager = builtins.fetchTarball "https://github.com/nix-community/home-manager/archive/release-23.05.tar.gz"; +in +{ + imports = [ + (import "${home-manager}/nixos") + ./code.nix + ]; + + home-manager.users.gunalx = { + /* The home.stateVersion option does not have a default and must be set */ + home.stateVersion = "23.05"; + /* Here goes the rest of your home-manager config, e.g. home.packages = [ pkgs.foo ]; */ + + + }; +} diff --git a/machines/aragon/code.nix b/machines/aragon/code.nix new file mode 100644 index 0000000..eb032b2 --- /dev/null +++ b/machines/aragon/code.nix @@ -0,0 +1,15 @@ +{pkgs, lib, ...}: +let + unstable = import { config = { allowUnfree = true; }; }; +in +{ + home-manager.users.gunalx = { + #vscode with home manager + programs.vscode = { + enable = true; + enableUpdateCheck = false; + package = unstable.vscode-fhs; + + }; + }; +} diff --git a/machines/aragon/configuration.nix b/machines/aragon/configuration.nix new file mode 100644 index 0000000..6fad3b7 --- /dev/null +++ b/machines/aragon/configuration.nix @@ -0,0 +1,231 @@ +# Edit this configuration file to define what should be installed on +# your system. Help is available in the configuration.nix(5) man page +# and in the NixOS manual (accessible by running ‘nixos-help’). + +{ config, pkgs, lib, ... }: + +{ + imports = + [ # Include the results of the hardware scan. + ./hardware-configuration.nix + + #home manager + ./home.nix + + #customised applications + ./steam.nix + ./podman.nix + ]; + + # Bootloader. + boot.loader.systemd-boot.enable = true; + boot.loader.efi.canTouchEfiVariables = true; + + # Setup keyfile + boot.initrd.secrets = { + "/crypto_keyfile.bin" = null; + }; + + # Enable swap on luks + boot.initrd.luks.devices."luks-08650b6b-6143-4503-8bf5-a3d32ef62d73".device = "/dev/disk/by-uuid/08650b6b-6143-4503-8bf5-a3d32ef62d73"; + boot.initrd.luks.devices."luks-08650b6b-6143-4503-8bf5-a3d32ef62d73".keyFile = "/crypto_keyfile.bin"; + + networking.hostName = "aragon"; # Define your hostname. + # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. + + # Configure network proxy if necessary + # networking.proxy.default = "http://user:password@proxy:port/"; + # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain"; + + # Enable networking + networking.networkmanager.enable = true; + + # Set your time zone. + time.timeZone = "Europe/Oslo"; + + # Select internationalisation properties. + i18n.defaultLocale = "en_US.UTF-8"; + + # Enable the X11 windowing system. + services.xserver.enable = true; + services.xserver.videoDrivers = [ "amdgou" ]; + hardware.opengl.extraPackages = with pkgs; [ + rocm-opencl-icd + rocm-opencl-runtime + amdvlk + ]; + + hardware.opengl.driSupport = true; + # For 32 bit applications + hardware.opengl.driSupport32Bit = true; + + # Enable the KDE Plasma Desktop Environment. + services.xserver.displayManager.sddm.enable = true; + services.xserver.desktopManager.plasma5.enable = true; + + # Configure keymap in X11 + services.xserver = { + layout = "no"; + xkbVariant = ""; + }; + +fonts.fonts = with pkgs; [ + noto-fonts + noto-fonts-cjk + noto-fonts-emoji + liberation_ttf + fira-code + fira-code-symbols + mplus-outline-fonts.githubRelease + dina-font + proggyfonts + nerdfonts + ubuntu_font_family + +]; + + # Enable CUPS to print documents. + services.printing.enable = true; + + # Enable sound with pipewire. + sound.enable = true; + hardware.pulseaudio.enable = false; + security.rtkit.enable = true; + services.pipewire = { + enable = true; + alsa.enable = true; + alsa.support32Bit = true; + pulse.enable = true; + # If you want to use JACK applications, uncomment this + #jack.enable = true; + + # use the example session manager (no others are packaged yet so this is enabled by default, + # no need to redefine it in your config for now) + #media-session.enable = true; + }; + + # Enable touchpad support (enabled default in most desktopManager). + # services.xserver.libinput.enable = true; + + # Define a user account. Don't forget to set a password with ‘passwd’. + users.users.gunalx = { + isNormalUser = true; + description = "Adrian Gunnar Lauterer"; + extraGroups = [ "networkmanager" "wheel" ]; + packages = with pkgs; [ + firefox + kate + + python310 + python310Packages.scipy + python310Packages.sympy + python310Packages.numpy + python310Packages.matplotlib + python310Packages.torch + python310Packages.torchvision + gcc + gpp + cmake + rustup + rustc + cargo + + + + ]; + }; + + # Allow unfree packages + nixpkgs.config.allowUnfree = true; + + # List packages installed in system profile. To search, run: + # $ nix search wget + environment.systemPackages = with pkgs; [ + #basics + vim + git + wget + + #sleep + pmutils + + #basic programming + python310 + python310Packages.scipy + python310Packages.sympy + python310Packages.numpy + python310Packages.matplotlib + python310Packages.torch + python310Packages.torchvision + gcc + gpp + cmake + rustup + rustc + cargo + cura + htop + killall + docker-compose + + ]; + + hardware.bluetooth.enable = true; + services.blueman.enable=true; + + + services.tailscale.enable = true; + + + services.openssh.enable = true ; + services.openssh.settings = { + UseDns = true; + PasswordAuthentication = true; + }; + + + fileSystems."/mnt/nas" = { + device = "truenas:/mnt/Main"; + fsType = "nfs"; + options = [ "x-systemd.automount" "noauto" ]; + }; + + + # sleep wakeup rules + services.udev.extraRules = '' + ACTION=="add", SUBSYSTEM=="pci", DRIVER=="pcieport", ATTR{power/wakeup}="disabled" + ''; + # systemd.targets.sleep.enable = false; + # systemd.targets.suspend.enable = false; + # systemd.targets.hibernate.enable = false; + # systemd.targets.hybrid-sleep.enable = false; + + + # Some programs need SUID wrappers, can be configured further or are + # started in user sessions. + # programs.mtr.enable = true; + # programs.gnupg.agent = { + # enable = true; + # enableSSHSupport = true; + # }; + + # List services that you want to enable: + + # Enable the OpenSSH daemon. + # services.openssh.enable = true; + + # Open ports in the firewall. + # networking.firewall.allowedTCPPorts = [ ... ]; + # networking.firewall.allowedUDPPorts = [ ... ]; + # Or disable the firewall altogether. + # networking.firewall.enable = false; + + # This value determines the NixOS release from which the default + # settings for stateful data, like file locations and database versions + # on your system were taken. It‘s perfectly fine and recommended to leave + # this value at the release version of the first install of this system. + # Before changing this value read the documentation for this option + # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). + system.stateVersion = "23.05"; # Did you read the comment? + +} diff --git a/machines/aragon/hardware-configuration.nix b/machines/aragon/hardware-configuration.nix new file mode 100644 index 0000000..203c4d7 --- /dev/null +++ b/machines/aragon/hardware-configuration.nix @@ -0,0 +1,44 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, modulesPath, ... }: + +{ + imports = + [ (modulesPath + "/installer/scan/not-detected.nix") + ]; + + boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" "sr_mod" ]; + #boot.initrd.kernelModules = ["amdgou" ]; + boot.initrd.kernelModules = ["amdgpu" ]; + + boot.kernelModules = [ "kvm-amd" ]; + boot.extraModulePackages = [ ]; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/8ab16ad5-08d2-44f9-a9e4-2e6240bfd8f8"; + fsType = "ext4"; + }; + + boot.initrd.luks.devices."luks-31bf11fb-518a-408a-af06-93af528a5985".device = "/dev/disk/by-uuid/31bf11fb-518a-408a-af06-93af528a5985"; + + fileSystems."/boot" = + { device = "/dev/disk/by-uuid/9A50-906F"; + fsType = "vfat"; + }; + + swapDevices = + [ { device = "/dev/disk/by-uuid/c7cdfab4-2c92-42de-b951-ccc6fcd7b7d7"; } + ]; + + # Enables DHCP on each ethernet and wireless interface. In case of scripted networking + # (the default) this is the recommended approach. When using systemd-networkd it's + # still possible to use this option, but it's recommended to use it in conjunction + # with explicit per-interface declarations with `networking.interfaces..useDHCP`. + networking.useDHCP = lib.mkDefault true; + # networking.interfaces.enp10s0.useDHCP = lib.mkDefault true; + # networking.interfaces.wlp7s0.useDHCP = lib.mkDefault true; + + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; + hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; +} diff --git a/machines/aragon/home.nix b/machines/aragon/home.nix new file mode 100644 index 0000000..cd8ff47 --- /dev/null +++ b/machines/aragon/home.nix @@ -0,0 +1,18 @@ +{ config, pkgs, ... }: +let + home-manager = builtins.fetchTarball "https://github.com/nix-community/home-manager/archive/release-23.05.tar.gz"; +in +{ + imports = [ + (import "${home-manager}/nixos") + ./code.nix + ]; + + home-manager.users.gunalx = { + /* The home.stateVersion option does not have a default and must be set */ + home.stateVersion = "23.05"; + /* Here goes the rest of your home-manager config, e.g. home.packages = [ pkgs.foo ]; */ + + + }; +} diff --git a/machines/aragon/podman.nix b/machines/aragon/podman.nix new file mode 100644 index 0000000..c6b0fce --- /dev/null +++ b/machines/aragon/podman.nix @@ -0,0 +1,11 @@ +{ + virtualisation.podman = { + enable = true; + dockerCompat = true; + dockerSocket.enable = true ; + autoPrune.flags = ["--all"]; + autoPrune.enable = true; + + + }; +} diff --git a/machines/aragon/steam.nix b/machines/aragon/steam.nix new file mode 100644 index 0000000..ee62b1f --- /dev/null +++ b/machines/aragon/steam.nix @@ -0,0 +1,21 @@ +{pkgs, lib, ...}: +{ + nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ + "steam" + "steam-original" + "steam-run" + ]; + + + programs.steam = { + enable = true; + remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play + dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server + }; + + environment.systemPackages = [ + pkgs.steam-run + ]; + + +} diff --git a/packages/podman.nix b/packages/podman.nix new file mode 100644 index 0000000..c6b0fce --- /dev/null +++ b/packages/podman.nix @@ -0,0 +1,11 @@ +{ + virtualisation.podman = { + enable = true; + dockerCompat = true; + dockerSocket.enable = true ; + autoPrune.flags = ["--all"]; + autoPrune.enable = true; + + + }; +} diff --git a/packages/steam.nix b/packages/steam.nix new file mode 100644 index 0000000..ee62b1f --- /dev/null +++ b/packages/steam.nix @@ -0,0 +1,21 @@ +{pkgs, lib, ...}: +{ + nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ + "steam" + "steam-original" + "steam-run" + ]; + + + programs.steam = { + enable = true; + remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play + dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server + }; + + environment.systemPackages = [ + pkgs.steam-run + ]; + + +} diff --git a/profiles/desktop.nix b/profiles/desktop.nix new file mode 100644 index 0000000..ca4a582 --- /dev/null +++ b/profiles/desktop.nix @@ -0,0 +1,12 @@ +{ config, pkgs, lib, ... }: +{ +imports = + [ + ./base.nix + ../packages/vim.nix + ../home/code.nix + ../packages/steam.nix + ]; + + +} diff --git a/services/freshrrs.nix b/services/freshrrs.nix new file mode 100644 index 0000000..b481839 --- /dev/null +++ b/services/freshrrs.nix @@ -0,0 +1,10 @@ +{ config, pkgs, lib, ... }: +{ + environment.systemPackages = [ + pkgs.freshrss + ]; + services.freshrss.enable = true; + services.freshrss.baseUrl = "http://127.0.0.1"; + services.freshrss.passwordFile = config.sops.secrets."freshrss".path; #"/run/secrets/freshrss"; + +} \ No newline at end of file