This commit is contained in:
Chris Kruining 2026-03-30 09:22:42 +02:00
parent f59d282c12
commit 2471562583
No known key found for this signature in database
GPG key ID: EB894A3560CCCAD2
4 changed files with 54 additions and 27 deletions

View file

@ -65,7 +65,7 @@
}; };
inventory.instances = { inventory.instances = {
user-chris = { users-chris = {
module.name = "users"; module.name = "users";
module.input = "clan-core"; module.input = "clan-core";
@ -82,12 +82,4 @@
}; };
}; };
}; };
# machines = {
# mandos = {};
# manwe = {};
# orome = {};
# tulkas = {};
# ulmo = {};
# };
} }

View file

@ -1,16 +1,51 @@
{ pkgs, ...}: { {
self,
lib,
pkgs,
...
}: {
_module.args = {
pkgs = lib.mkForce (import self.inputs.nixpkgs {
system = "x86_64-linux";
overlays = with self.inputs; [
fenix.overlays.default
nix-minecraft.overlay
flux.overlays.default
];
config = {
allowUnfree = true;
permittedInsecurePackages = [
# I think this is because of zen
"qtwebengine-5.15.19"
# For mautrix-signal, the matrix to signal bridge
"olm-3.2.16"
];
};
});
};
imports = [ imports = [
./disks.nix ./disks.nix
./hardware.nix ./hardware.nix
self.inputs.home-manager.nixosModules.home-manager
self.inputs.himmelblau.nixosModules.himmelblau
self.inputs.jovian.nixosModules.default
self.inputs.mydia.nixosModules.default
self.inputs.nix-minecraft.nixosModules.minecraft-servers
self.inputs.nvf.nixosModules.default
self.inputs.sops-nix.nixosModules.sops
(self.inputs.import-tree ../../modules/nixos)
]; ];
nixpkgs.hostPlatform = "x86_64-linux";
system.activationScripts.remove-gtkrc.text = "rm -f /home/chris/.gtkrc-2.0"; system.activationScripts.remove-gtkrc.text = "rm -f /home/chris/.gtkrc-2.0";
services.logrotate.checkConfig = false; services.logrotate.checkConfig = false;
environment.systemPackages = with pkgs; [ beyond-all-reason openrct2 ]; environment.systemPackages = with pkgs; [beyond-all-reason openrct2];
sneeuwvlok = { sneeuwvlok = {
hardware.has = { hardware.has = {

View file

@ -1,18 +1,18 @@
{ config, lib, pkgs, modulesPath, ... }:
let
inherit (lib.modules) mkDefault;
in
{ {
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; config,
lib,
...
}: let
inherit (lib.modules) mkDefault;
in {
boot = { boot = {
initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ]; initrd.availableKernelModules = ["xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod"];
initrd.kernelModules = [ ]; initrd.kernelModules = [];
kernelModules = [ "kvm-amd" ]; kernelModules = ["kvm-amd"];
kernelParams = []; kernelParams = [];
extraModulePackages = [ ]; extraModulePackages = [];
}; };
nixpkgs.hostPlatform = mkDefault pkgs.stdenv.hostPlatform.system; nixpkgs.hostPlatform = "x86_64-linux";
hardware.cpu.amd.updateMicrocode = mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.amd.updateMicrocode = mkDefault config.hardware.enableRedistributableFirmware;
} }

View file

@ -11,7 +11,7 @@
hasPeers = (cfg.peer |> attrNames |> length) > 0; hasPeers = (cfg.peer |> attrNames |> length) > 0;
in { in {
options.sneeuwvlok.services.networking.wireguard = { options.sneeuwvlok.services.networking.wireguard = {
# enable = mkEnableOption "enable wireguard" // {default = true;}; enable = mkEnableOption "enable wireguard" // {default = true;};
peer = mkOption { peer = mkOption {
type = types.attrsOf (types.submodule { type = types.attrsOf (types.submodule {
@ -32,7 +32,7 @@ in {
}; };
}; };
config = mkIf hasPeers { config = mkIf (cfg.enable && hasPeers) {
# networking.firewall.allowedUDPPorts = cfg.peer |> lib.attrValues |> lib.map (p: p.port); # networking.firewall.allowedUDPPorts = cfg.peer |> lib.attrValues |> lib.map (p: p.port);
# networking.wq-quick = { # networking.wq-quick = {
# # enable = cfg.enable; # # enable = cfg.enable;