hosts/dosei: drop
This commit is contained in:
@@ -25,7 +25,6 @@ Here are some of the interesting files and dirs:
|
||||
|------|--------------|---------|
|
||||
| `Tsuki` | Dell Poweredge r710 server | Data storage / Build server / Selfhosted services. This server hosts a wide variety of services, including websites, matrix server, git repos, CI/CD and more. **This is probably the most interesting machine to pick config from** |
|
||||
| `Kasei` | AMD Zen 2 CPU / AMD GPU - desktop computer | Semi-daily driver. This is my main computer at home. |
|
||||
| `Dosei` | Dell Optiplex | Work computer, mostly used for development and testing. |
|
||||
|
||||
|
||||
## home-manager configuration
|
||||
|
||||
@@ -1,100 +0,0 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
|
||||
./programs/nrfutil.nix
|
||||
|
||||
./services/avahi.nix
|
||||
./services/docker.nix
|
||||
./services/jenkins.nix
|
||||
./services/logiops.nix
|
||||
./services/wstunnel.nix
|
||||
];
|
||||
|
||||
boot.loader.systemd-boot.enable = true;
|
||||
boot.loader.efi.canTouchEfiVariables = true;
|
||||
|
||||
boot.kernelPackages = pkgs.linuxPackages_6_14;
|
||||
|
||||
boot.binfmt.emulatedSystems = [
|
||||
"aarch64-linux"
|
||||
"armv7l-linux"
|
||||
];
|
||||
|
||||
i18n.defaultLocale = "en_US.UTF-8";
|
||||
|
||||
services.udev.packages = with pkgs; [
|
||||
segger-jlink
|
||||
];
|
||||
|
||||
system.stateVersion = "24.05";
|
||||
|
||||
machineVars = {
|
||||
headless = false;
|
||||
gaming = false;
|
||||
development = true;
|
||||
creative = true;
|
||||
|
||||
wayland = true;
|
||||
|
||||
dataDrives = let
|
||||
main = "/data";
|
||||
in {
|
||||
drives = { inherit main; };
|
||||
default = main;
|
||||
};
|
||||
|
||||
screens = {
|
||||
DP-1 = {
|
||||
primary = true;
|
||||
frequency = 60;
|
||||
};
|
||||
DP-2 = {
|
||||
frequency = 60;
|
||||
position = "1920x0";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
systemd.targets = {
|
||||
sleep.enable = false;
|
||||
suspend.enable = false;
|
||||
hibernate.enable = false;
|
||||
hybrid-sleep.enable = false;
|
||||
};
|
||||
|
||||
systemd.network = {
|
||||
enable = true;
|
||||
networks."40-enp0s31f6" = {
|
||||
name = "enp0s31f6";
|
||||
DHCP = true;
|
||||
domains = [ "nordicsemi.no" ];
|
||||
};
|
||||
};
|
||||
|
||||
networking = {
|
||||
hostName = "dosei";
|
||||
useNetworkd = true;
|
||||
# TODO: reenable
|
||||
firewall.enable = false;
|
||||
# hostId = "";
|
||||
};
|
||||
|
||||
services = {
|
||||
openssh = {
|
||||
enable = true;
|
||||
settings.X11Forwarding = true;
|
||||
};
|
||||
blueman.enable = true;
|
||||
fstrim.enable = true;
|
||||
};
|
||||
|
||||
nix.buildMachines = lib.mkForce [ ];
|
||||
|
||||
hardware = {
|
||||
bluetooth.enable = true;
|
||||
enableRedistributableFirmware = true;
|
||||
keyboard.zsa.enable = true;
|
||||
};
|
||||
}
|
||||
@@ -1,44 +0,0 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
|
||||
boot.initrd.kernelModules = [ "dm-snapshot" "cryptd" ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
boot.supportedFilesystems = [ "bcachefs" ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "UUID=ef98dc67-17bf-4005-8209-b5d3c352d6c6";
|
||||
fsType = "bcachefs";
|
||||
};
|
||||
|
||||
boot.initrd.luks.devices."crypted".device = "/dev/disk/by-uuid/1b6e3d9b-4408-45ac-9b98-dce4b505c311";
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/C930-D394";
|
||||
fsType = "vfat";
|
||||
options = [ "fmask=0022" "dmask=0022" ];
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/4fcc8f63-f5e0-42e3-a9d3-a96e4a26d5e8"; }
|
||||
];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
# networking.useDHCP = lib.mkDefault true;
|
||||
networking.interfaces.enp0s31f6.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.enableAllFirmware = true;
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
@@ -1,22 +0,0 @@
|
||||
{ config, pkgs, ... }:
|
||||
{
|
||||
home.stateVersion = "24.05";
|
||||
|
||||
home.packages = with pkgs; [
|
||||
groovy
|
||||
];
|
||||
|
||||
programs.ssh.matchBlocks = {
|
||||
"tsuki-ws" = {
|
||||
user = "h7x4";
|
||||
hostname = "localhost";
|
||||
port = 10022;
|
||||
};
|
||||
|
||||
"hildring pvv-login".proxyJump = "tsuki-ws";
|
||||
"drolsum pvv-login2 pvv".proxyJump = "tsuki-ws";
|
||||
"microbel pvv-users pvv-mail".proxyJump = "tsuki-ws";
|
||||
};
|
||||
|
||||
programs.waybar.settings.mainBar.output = [ "DP-1" ];
|
||||
}
|
||||
@@ -1,13 +0,0 @@
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
environment.systemPackages = with pkgs; [
|
||||
nrfutil
|
||||
nrfconnect
|
||||
nrf-command-line-tools
|
||||
];
|
||||
|
||||
services.udev.packages = with pkgs; [
|
||||
nrf-udev
|
||||
segger-jlink
|
||||
];
|
||||
}
|
||||
@@ -1,13 +0,0 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
services.avahi = {
|
||||
enable = true;
|
||||
publish.enable = true;
|
||||
publish.addresses = true;
|
||||
publish.domain = true;
|
||||
publish.hinfo = true;
|
||||
publish.userServices = true;
|
||||
publish.workstation = true;
|
||||
extraServiceFiles.ssh = "${pkgs.avahi}/etc/avahi/services/ssh.service";
|
||||
};
|
||||
}
|
||||
@@ -1,4 +0,0 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
virtualisation.docker.enable = true;
|
||||
}
|
||||
@@ -1,23 +0,0 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
services.jenkins = {
|
||||
enable = true;
|
||||
withCLI = true;
|
||||
# extraJavaOptions = [
|
||||
# "-Dorg.jenkinsci.plugins.durabletask.BourneShellScript.LAUNCH_DIAGNOSTICS=true"
|
||||
# ];
|
||||
packages = with pkgs; [
|
||||
stdenv
|
||||
jdk17
|
||||
nix
|
||||
docker
|
||||
git
|
||||
bashInteractive # 'sh' step requires this
|
||||
coreutils
|
||||
which
|
||||
procps
|
||||
];
|
||||
};
|
||||
|
||||
users.groups.docker.members = [ "jenkins" ];
|
||||
}
|
||||
@@ -1,52 +0,0 @@
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
# TODO: remove when merged: https://github.com/NixOS/nixpkgs/pull/167388
|
||||
systemd.services.logid = let
|
||||
config = pkgs.writeText "logid.cfg" ''
|
||||
devices: (
|
||||
{
|
||||
name: "Wireless Mouse MX Master";
|
||||
smartshift:
|
||||
{
|
||||
on: true;
|
||||
threshold: 30;
|
||||
torque: 50;
|
||||
};
|
||||
hiresscroll:
|
||||
{
|
||||
hires: true;
|
||||
invert: false;
|
||||
target: true;
|
||||
up: {
|
||||
mode: "Axis";
|
||||
axis: "REL_WHEEL_HI_RES";
|
||||
multiplier: 1;
|
||||
},
|
||||
down: {
|
||||
mode: "Axis";
|
||||
axis: "REL_WHEEL_HI_RES";
|
||||
multiplier: -1;
|
||||
},
|
||||
};
|
||||
dpi: 800;
|
||||
}
|
||||
);
|
||||
'';
|
||||
in {
|
||||
description = "Logitech Configuration Daemon";
|
||||
startLimitIntervalSec = 0;
|
||||
wants = [ "multi-user.target" ];
|
||||
after = [ "multi-user.target" ];
|
||||
wantedBy = [ "graphical-session.target" ];
|
||||
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
ExecStart = "${pkgs.logiops}/bin/logid --config ${config}";
|
||||
User = "root";
|
||||
ExecReload = "/bin/kill -HUP $MAINPID";
|
||||
Restart="on-failure";
|
||||
};
|
||||
};
|
||||
|
||||
hardware.logitech.wireless.enable = true;
|
||||
}
|
||||
@@ -1,32 +0,0 @@
|
||||
{ config, ... }:
|
||||
{
|
||||
imports = [
|
||||
../../../modules/wstunnel.nix
|
||||
];
|
||||
disabledModules = [
|
||||
"services/networking/wstunnel.nix"
|
||||
];
|
||||
|
||||
sops = {
|
||||
secrets."wstunnel/http-upgrade-path-prefix" = {
|
||||
sopsFile = ../../../secrets/common.yaml;
|
||||
};
|
||||
templates."wstunnel-environment.env".content = let
|
||||
inherit (config.sops) placeholder;
|
||||
in ''
|
||||
WSTUNNEL_HTTP_UPGRADE_PATH_PREFIX=${placeholder."wstunnel/http-upgrade-path-prefix"}
|
||||
WSTUNNEL_RESTRICT_HTTP_UPGRADE_PATH_PREFIX=${placeholder."wstunnel/http-upgrade-path-prefix"}
|
||||
'';
|
||||
};
|
||||
|
||||
services.wstunnel = {
|
||||
enable = true;
|
||||
clients."ws-tsuki" = {
|
||||
connectTo = "wss://ws.nani.wtf";
|
||||
localToRemote = [
|
||||
"tcp://10022:localhost:22"
|
||||
];
|
||||
environmentFile = config.sops.templates."wstunnel-environment.env".path;
|
||||
};
|
||||
};
|
||||
}
|
||||
Reference in New Issue
Block a user