feat: add formatter
This commit is contained in:
parent
d036cf224a
commit
cf005ff872
269 changed files with 369 additions and 226 deletions
0
system/dev/dn-lap/common/boot.nix
Normal file → Executable file
0
system/dev/dn-lap/common/boot.nix
Normal file → Executable file
0
system/dev/dn-lap/common/default.nix
Normal file → Executable file
0
system/dev/dn-lap/common/default.nix
Normal file → Executable file
43
system/dev/dn-lap/common/hardware-configuration.nix
Normal file → Executable file
43
system/dev/dn-lap/common/hardware-configuration.nix
Normal file → Executable file
|
|
@ -1,28 +1,42 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "uas" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||
boot.initrd.availableKernelModules = [
|
||||
"xhci_pci"
|
||||
"thunderbolt"
|
||||
"nvme"
|
||||
"uas"
|
||||
"sd_mod"
|
||||
"rtsx_pci_sdmmc"
|
||||
];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{
|
||||
device = "/dev/disk/by-label/nixos";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-label/nixos";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{
|
||||
device = "/dev/disk/by-label/BOOT";
|
||||
fsType = "vfat";
|
||||
options = [ "fmask=0077" "dmask=0077" ];
|
||||
};
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-label/BOOT";
|
||||
fsType = "vfat";
|
||||
options = [
|
||||
"fmask=0077"
|
||||
"dmask=0077"
|
||||
];
|
||||
};
|
||||
|
||||
swapDevices = [
|
||||
{ device = "/dev/disk/by-label/swap"; }
|
||||
|
|
@ -36,6 +50,5 @@
|
|||
# networking.interfaces.wlp0s20f3.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
|
|
|||
0
system/dev/dn-lap/default.nix
Normal file → Executable file
0
system/dev/dn-lap/default.nix
Normal file → Executable file
0
system/dev/dn-lap/games/default.nix
Normal file → Executable file
0
system/dev/dn-lap/games/default.nix
Normal file → Executable file
4
system/dev/dn-lap/home/default.nix
Normal file → Executable file
4
system/dev/dn-lap/home/default.nix
Normal file → Executable file
|
|
@ -55,10 +55,6 @@ in
|
|||
|
||||
imports = [
|
||||
../../../../home/presets/basic.nix
|
||||
(import ../../../../home/user/bitwarden.nix {
|
||||
email = "danny@net.dn";
|
||||
baseUrl = "https://bitwarden.net.dn";
|
||||
})
|
||||
|
||||
# waybar
|
||||
(import ../../../../home/user/waybar.nix {
|
||||
|
|
|
|||
0
system/dev/dn-lap/network/default.nix
Normal file → Executable file
0
system/dev/dn-lap/network/default.nix
Normal file → Executable file
0
system/dev/dn-lap/office/default.nix
Normal file → Executable file
0
system/dev/dn-lap/office/default.nix
Normal file → Executable file
0
system/dev/dn-lap/services/default.nix
Normal file → Executable file
0
system/dev/dn-lap/services/default.nix
Normal file → Executable file
0
system/dev/dn-lap/sops/default.nix
Normal file → Executable file
0
system/dev/dn-lap/sops/default.nix
Normal file → Executable file
0
system/dev/dn-lap/sops/secret.yaml
Normal file → Executable file
0
system/dev/dn-lap/sops/secret.yaml
Normal file → Executable file
0
system/dev/dn-lap/sops/sops-conf.nix
Normal file → Executable file
0
system/dev/dn-lap/sops/sops-conf.nix
Normal file → Executable file
0
system/dev/dn-lap/utility/default.nix
Normal file → Executable file
0
system/dev/dn-lap/utility/default.nix
Normal file → Executable file
0
system/dev/dn-lap/virtualisation/default.nix
Normal file → Executable file
0
system/dev/dn-lap/virtualisation/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/boot.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/boot.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/hardware-configuration.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/hardware-configuration.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/nvidia.nix
Normal file → Executable file
0
system/dev/dn-pre7780/common/nvidia.nix
Normal file → Executable file
0
system/dev/dn-pre7780/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/default.nix
Normal file → Executable file
1
system/dev/dn-pre7780/expr/default.nix
Normal file → Executable file
1
system/dev/dn-pre7780/expr/default.nix
Normal file → Executable file
|
|
@ -1,5 +1,6 @@
|
|||
{
|
||||
imports = [
|
||||
# ./osx-kvm.nix
|
||||
./noise-cancel.nix
|
||||
];
|
||||
}
|
||||
|
|
|
|||
4
system/dev/dn-pre7780/expr/noise-cancel.nix
Executable file
4
system/dev/dn-pre7780/expr/noise-cancel.nix
Executable file
|
|
@ -0,0 +1,4 @@
|
|||
{ ... }:
|
||||
{
|
||||
programs.noisetorch.enable = true;
|
||||
}
|
||||
0
system/dev/dn-pre7780/expr/osx-kvm.nix
Normal file → Executable file
0
system/dev/dn-pre7780/expr/osx-kvm.nix
Normal file → Executable file
0
system/dev/dn-pre7780/expr/vm-settings.nix
Normal file → Executable file
0
system/dev/dn-pre7780/expr/vm-settings.nix
Normal file → Executable file
0
system/dev/dn-pre7780/expr/vm.nix
Normal file → Executable file
0
system/dev/dn-pre7780/expr/vm.nix
Normal file → Executable file
1
system/dev/dn-pre7780/games/default.nix
Normal file → Executable file
1
system/dev/dn-pre7780/games/default.nix
Normal file → Executable file
|
|
@ -3,5 +3,6 @@
|
|||
../../../modules/gaming.nix
|
||||
./shadps4.nix
|
||||
./minecraft.nix
|
||||
./heroic.nix
|
||||
];
|
||||
}
|
||||
|
|
|
|||
10
system/dev/dn-pre7780/games/heroic.nix
Executable file
10
system/dev/dn-pre7780/games/heroic.nix
Executable file
|
|
@ -0,0 +1,10 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
home-manager.sharedModules = [
|
||||
{
|
||||
home.packages = with pkgs; [
|
||||
heroic
|
||||
];
|
||||
}
|
||||
];
|
||||
}
|
||||
0
system/dev/dn-pre7780/games/minecraft.nix
Normal file → Executable file
0
system/dev/dn-pre7780/games/minecraft.nix
Normal file → Executable file
0
system/dev/dn-pre7780/games/shadps4.nix
Normal file → Executable file
0
system/dev/dn-pre7780/games/shadps4.nix
Normal file → Executable file
6
system/dev/dn-pre7780/home/default.nix
Normal file → Executable file
6
system/dev/dn-pre7780/home/default.nix
Normal file → Executable file
|
|
@ -126,12 +126,6 @@ in
|
|||
./expr
|
||||
./wm
|
||||
|
||||
# Bitwarden client
|
||||
(import ../../../../home/user/bitwarden.nix {
|
||||
email = "danny@net.dn";
|
||||
baseUrl = "https://bitwarden.net.dn";
|
||||
})
|
||||
|
||||
# waybar
|
||||
(import ../../../../home/user/waybar.nix {
|
||||
matchByDesc = true;
|
||||
|
|
|
|||
0
system/dev/dn-pre7780/home/expr/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/expr/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/expr/helix.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/expr/helix.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/wm/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/wm/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/wm/hyprland.nix
Normal file → Executable file
0
system/dev/dn-pre7780/home/wm/hyprland.nix
Normal file → Executable file
0
system/dev/dn-pre7780/network/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/network/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/mail.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/mail.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/nextcloud.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/nextcloud.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/nginx.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/nginx.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/pangolin.nix
Normal file → Executable file
0
system/dev/dn-pre7780/services/pangolin.nix
Normal file → Executable file
0
system/dev/dn-pre7780/sops/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/sops/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/sops/secret.yaml
Normal file → Executable file
0
system/dev/dn-pre7780/sops/secret.yaml
Normal file → Executable file
0
system/dev/dn-pre7780/sops/sops-conf.nix
Normal file → Executable file
0
system/dev/dn-pre7780/sops/sops-conf.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/airplay.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/airplay.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/blender.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/blender.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/davinci-resolve.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/davinci-resolve.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/utility/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/virtualisation/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/virtualisation/default.nix
Normal file → Executable file
0
system/dev/dn-pre7780/virtualisation/kvm.nix
Normal file → Executable file
0
system/dev/dn-pre7780/virtualisation/kvm.nix
Normal file → Executable file
0
system/dev/dn-server/common/backup.nix
Normal file → Executable file
0
system/dev/dn-server/common/backup.nix
Normal file → Executable file
0
system/dev/dn-server/common/boot.nix
Normal file → Executable file
0
system/dev/dn-server/common/boot.nix
Normal file → Executable file
0
system/dev/dn-server/common/default.nix
Normal file → Executable file
0
system/dev/dn-server/common/default.nix
Normal file → Executable file
0
system/dev/dn-server/common/hardware-configuration.nix
Normal file → Executable file
0
system/dev/dn-server/common/hardware-configuration.nix
Normal file → Executable file
0
system/dev/dn-server/common/networking.nix
Normal file → Executable file
0
system/dev/dn-server/common/networking.nix
Normal file → Executable file
0
system/dev/dn-server/common/nvidia.nix
Normal file → Executable file
0
system/dev/dn-server/common/nvidia.nix
Normal file → Executable file
0
system/dev/dn-server/default.nix
Normal file → Executable file
0
system/dev/dn-server/default.nix
Normal file → Executable file
0
system/dev/dn-server/home/default.nix
Normal file → Executable file
0
system/dev/dn-server/home/default.nix
Normal file → Executable file
0
system/dev/dn-server/network/default.nix
Normal file → Executable file
0
system/dev/dn-server/network/default.nix
Normal file → Executable file
0
system/dev/dn-server/network/nginx.nix
Normal file → Executable file
0
system/dev/dn-server/network/nginx.nix
Normal file → Executable file
4
system/dev/dn-server/network/services.nix
Normal file → Executable file
4
system/dev/dn-server/network/services.nix
Normal file → Executable file
|
|
@ -5,9 +5,11 @@
|
|||
...
|
||||
}:
|
||||
let
|
||||
inherit (builtins) concatStringsSep;
|
||||
inherit (config.systemConf) username security;
|
||||
inherit (lib) concatStringsSep mkForce optionalString;
|
||||
inherit (lib) mkForce optionalString;
|
||||
inherit (helper.nftables) mkElementsStatement;
|
||||
|
||||
netbirdCfg = config.services.netbird;
|
||||
|
||||
ethInterface = "enp0s31f6";
|
||||
|
|
|
|||
0
system/dev/dn-server/network/step-ca.nix
Normal file → Executable file
0
system/dev/dn-server/network/step-ca.nix
Normal file → Executable file
0
system/dev/dn-server/network/wireguard.nix
Normal file → Executable file
0
system/dev/dn-server/network/wireguard.nix
Normal file → Executable file
0
system/dev/dn-server/nix/atticd.nix
Normal file → Executable file
0
system/dev/dn-server/nix/atticd.nix
Normal file → Executable file
0
system/dev/dn-server/nix/default.nix
Normal file → Executable file
0
system/dev/dn-server/nix/default.nix
Normal file → Executable file
0
system/dev/dn-server/options/default.nix
Normal file → Executable file
0
system/dev/dn-server/options/default.nix
Normal file → Executable file
0
system/dev/dn-server/options/network.nix
Normal file → Executable file
0
system/dev/dn-server/options/network.nix
Normal file → Executable file
0
system/dev/dn-server/security/crowdsec.nix
Normal file → Executable file
0
system/dev/dn-server/security/crowdsec.nix
Normal file → Executable file
0
system/dev/dn-server/security/default.nix
Normal file → Executable file
0
system/dev/dn-server/security/default.nix
Normal file → Executable file
0
system/dev/dn-server/security/fail2ban.nix
Normal file → Executable file
0
system/dev/dn-server/security/fail2ban.nix
Normal file → Executable file
0
system/dev/dn-server/services/actual-budget.nix
Normal file → Executable file
0
system/dev/dn-server/services/actual-budget.nix
Normal file → Executable file
0
system/dev/dn-server/services/bitwarden.nix
Normal file → Executable file
0
system/dev/dn-server/services/bitwarden.nix
Normal file → Executable file
0
system/dev/dn-server/services/default.nix
Normal file → Executable file
0
system/dev/dn-server/services/default.nix
Normal file → Executable file
0
system/dev/dn-server/services/docmost.nix
Normal file → Executable file
0
system/dev/dn-server/services/docmost.nix
Normal file → Executable file
0
system/dev/dn-server/services/forgejo.nix
Normal file → Executable file
0
system/dev/dn-server/services/forgejo.nix
Normal file → Executable file
0
system/dev/dn-server/services/hideTTY.nix
Normal file → Executable file
0
system/dev/dn-server/services/hideTTY.nix
Normal file → Executable file
0
system/dev/dn-server/services/keycloak.nix
Normal file → Executable file
0
system/dev/dn-server/services/keycloak.nix
Normal file → Executable file
0
system/dev/dn-server/services/mail-server.nix
Normal file → Executable file
0
system/dev/dn-server/services/mail-server.nix
Normal file → Executable file
0
system/dev/dn-server/services/metrics.nix
Normal file → Executable file
0
system/dev/dn-server/services/metrics.nix
Normal file → Executable file
1
system/dev/dn-server/services/minecraft-server.nix
Normal file → Executable file
1
system/dev/dn-server/services/minecraft-server.nix
Normal file → Executable file
|
|
@ -27,6 +27,7 @@ in
|
|||
"mods" = "${modpack}/mods";
|
||||
};
|
||||
serverProperties = {
|
||||
|
||||
server-port = 25565;
|
||||
difficulty = 3;
|
||||
gamemode = "survival";
|
||||
|
|
|
|||
51
system/dev/dn-server/services/netbird.nix
Normal file → Executable file
51
system/dev/dn-server/services/netbird.nix
Normal file → Executable file
|
|
@ -10,8 +10,7 @@ let
|
|||
cfg = config.services.netbird;
|
||||
srv = cfg.server;
|
||||
|
||||
# TODO: Change realm to master
|
||||
realm = "netbird";
|
||||
realm = "master";
|
||||
in
|
||||
{
|
||||
sops.secrets."netbird/wt0-setupKey" = {
|
||||
|
|
@ -30,7 +29,7 @@ in
|
|||
inherit realm vDomain;
|
||||
domain = "netbird.${domain}";
|
||||
oidcURL = "https://${config.services.keycloak.settings.hostname}";
|
||||
enableNginx = false;
|
||||
enableNginx = true;
|
||||
oidcType = "keycloak";
|
||||
})
|
||||
];
|
||||
|
|
@ -71,49 +70,11 @@ in
|
|||
real_ip_recursive on;
|
||||
'';
|
||||
|
||||
services.nginx.virtualHosts."netbird.local" = {
|
||||
locations = {
|
||||
"/" = {
|
||||
root = cfg.server.dashboard.finalDrv;
|
||||
tryFiles = "$uri $uri.html $uri/ =404";
|
||||
};
|
||||
|
||||
"/404.html".extraConfig = ''
|
||||
internal;
|
||||
'';
|
||||
|
||||
"/api" = {
|
||||
extraConfig = ''
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
'';
|
||||
proxyPass = "http://127.0.0.1:${builtins.toString srv.management.port}";
|
||||
};
|
||||
|
||||
"/management.ManagementService/".extraConfig = ''
|
||||
client_body_timeout 1d;
|
||||
|
||||
grpc_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
|
||||
grpc_pass grpc://127.0.0.1:${builtins.toString srv.management.port};
|
||||
grpc_read_timeout 1d;
|
||||
grpc_send_timeout 1d;
|
||||
grpc_socket_keepalive on;
|
||||
'';
|
||||
|
||||
"/signalexchange.SignalExchange/".extraConfig = ''
|
||||
client_body_timeout 1d;
|
||||
|
||||
grpc_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
|
||||
grpc_pass grpc://127.0.0.1:${builtins.toString srv.signal.port};
|
||||
grpc_read_timeout 1d;
|
||||
grpc_send_timeout 1d;
|
||||
grpc_socket_keepalive on;
|
||||
services.nginx.virtualHosts."${srv.domain}" = {
|
||||
locations."/api" = {
|
||||
extraConfig = ''
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
'';
|
||||
};
|
||||
|
||||
extraConfig = ''
|
||||
error_page 404 /404.html;
|
||||
'';
|
||||
};
|
||||
}
|
||||
|
|
|
|||
0
system/dev/dn-server/services/nextcloud.nix
Normal file → Executable file
0
system/dev/dn-server/services/nextcloud.nix
Normal file → Executable file
0
system/dev/dn-server/services/ntfy.nix
Normal file → Executable file
0
system/dev/dn-server/services/ntfy.nix
Normal file → Executable file
0
system/dev/dn-server/services/paperless-ngx.nix
Normal file → Executable file
0
system/dev/dn-server/services/paperless-ngx.nix
Normal file → Executable file
0
system/dev/dn-server/sops/default.nix
Normal file → Executable file
0
system/dev/dn-server/sops/default.nix
Normal file → Executable file
8
system/dev/dn-server/sops/secret.yaml
Normal file → Executable file
8
system/dev/dn-server/sops/secret.yaml
Normal file → Executable file
|
|
@ -3,7 +3,7 @@ wireguard:
|
|||
wg1.conf: ENC[AES256_GCM,data:Wq8PgaNaEZNYpxqC2sO9CY+Cc+Qsk+sWpQ43FkjXqY5rSYo7rSjzN3sde44ba2IY85Dwyo+TKNp+mmLnjDM3Bgxb3h/sLLEJRwVGS1lU7GQKuT2ZL3MupnKVYXyK/2VmP+Umfw75AHYeMM809HRr7UroDEFQEll3DVqNqWSJRAll2hR14lnxUQpZIewMWTerEE0b+SEADXhPCOsgTUXFxJMtXTfsifGjf0HO2sLrW7EQvMxuiTvSCwosUilc/HgaA/+vNm+UkZ3pSwybYm9fIFvEu0IEqHuLyvy41J70DdxFdS9mNAcYcpeOFrTR4BE6NQ==,iv:zgyIqdH9OWEXPNkHs94Tcet16zvbxV7rbkwzVybkQBc=,tag:GJgAAGyrAhhaxVmcsT/reA==,type:str]
|
||||
netbird:
|
||||
oidc:
|
||||
secret: ENC[AES256_GCM,data:zZ8zuDqUdZANk1VV44kfp/Y4eXxJDwead9440QJma4Q=,iv:d6/RSEtuhqL+RQDuOQMJhyC9U9ikcasEz0DIdtaBtKg=,tag:8be6FBymbIN+To0dFz2ncA==,type:str]
|
||||
secret: ENC[AES256_GCM,data:6LEiompRgmip9NJUSHBevdwbnDhR3IXrSSorK7ToNlk=,iv:UshQW7lNdXZ6K/LX4prpRhZXTItXSM9fEIkJhOysYtc=,tag:aOrs44I7DbDQmdioB64Peg==,type:str]
|
||||
dataStoreKey: ENC[AES256_GCM,data:FGyqII1DZMtImMtWiUx0e1I4J+yMzrWKwhBB6kjmRHqlLz8Oy+C/zCM5SQ8=,iv:AXD8u9vcha8CSRnMPabtdXDQoeqpqKIbWGwfcgIc8Dw=,tag:3nSIt0V+G6NJQ7JSslNOWg==,type:str]
|
||||
coturn:
|
||||
password: ENC[AES256_GCM,data:AMWBkWLcj1EFfufl8pALpVOG0PE=,iv:sngIedZE4X8clhGIsQyiGKbdsheRbEqeU57Emz2DWJM=,tag:daRLPNrO5fq84rtieYuYYw==,type:str]
|
||||
|
|
@ -19,7 +19,7 @@ nextcloud:
|
|||
backendsecret: ENC[AES256_GCM,data:pV5yw755RkAwHBdmfeP37/SobFZqJouWyIiRJ+Y2mk0iiVdW04vhYVsyjcI=,iv:NhkewgnyE2Dw8mQMMSq6AWo6IOWu8BlyPZvZAszyZuQ=,tag:BlZO15qZWViV8pCWIgZHZQ==,type:str]
|
||||
step_ca:
|
||||
password: ENC[AES256_GCM,data:3NtUAl344gHiXLlMl88X17Vsm/4OKFM0W8bntzbXC0U=,iv:q9cWW8xTxYQnRYohBxnPIsbVSpvkZYVpYLRVeZgmsRM=,tag:ibumK7ebPKNO/CXAS0eeRA==,type:str]
|
||||
vaultwarden: ENC[AES256_GCM,data:5gn2+IYznojrYbmzCJx17qAlBvJBv3CnMEZensyep9JpKEHVz29teOYDh5Zetv0mSrgmrUxCTdNsm0OZCX9EswhslNl5ay6zkhoL+64JIyUcNFWcvu7oD2w1qynWgz41GS2yzuw91LntN4mcpODKhHNN8XFCU9d71Z9zTSIdWn2PoG8wME2hVBJ2YxLpqzDyJYlkWYf4VYUnn9vXZatZqQd0n7bjx3dgX3ogFG/UNfMAs2oLCfuYLkxBqpR2cGNktIxWctCEAWwG68Pfk7X66KMi5w==,iv:JcExp8YkGwV2nMbCK+n0KSL3+SryJZ0iKtVcU/Q+Cgs=,tag:Ut6ahXVAuOKlcwk6DE56Ig==,type:str]
|
||||
vaultwarden: ENC[AES256_GCM,data:h8GFyXRMI51DZutX60up4vXTQLNY3q0pr+BWpZ5frJHwy6PVBTYts81K0aTIIU71epT4SVR3p3e8yUdU7jXS1Tw1ol0RnPL+bBNv7JyUede9mkrP4pnozmuCQqOdlHCaUvYyIoWFPrLiz/drXX7gJvWh6zYTTFn9mQ3wQE9J6rxoLzbMyS6raSn2O8Ke+YM0VRXYgVvsyEL3Aa0wV3qO5NDCZ67rZp4TG5U8tOrziw0gnKU3eBCuNyL/uU/7ySvfdxwv631vEi24+dxN+Kx6rlaJpJIywx9xxxoRhOz5TrHzptqRMWpg2GZL5qdVXiUxqYLgC3s7Ri0P2BwOslteO6Z6NXk0HSravbpz3sevEu+bRS7u2MLvL3keP48+EBsXNebnKY7nfqCoIPUQ86CIVGw5fNI+irnRR8kq6oV0MBDGXu6DgmzKV7crFp65zzVSqfFOntVYSqgtQnnM1CmkuGJD,iv:51zbASyFgprzYCMswiEM81p8C0kFhSc28VavCHqRsF0=,tag:LvcY2DbeA71/PXEnjph3dw==,type:str]
|
||||
ldap:
|
||||
password: ENC[AES256_GCM,data:gz5WBopSffGyvJxKDPekPQ==,iv:bX7N9/oNMhtE/KbPah2ge4s87P2VsxHGoFkOyl83dxs=,tag:YoTe6NPAJgp/0nvhHC9Y5A==,type:str]
|
||||
env: ENC[AES256_GCM,data:68EvTHeBqtCVfde5oO+Wzny+l/YIMWQmbcNQ0Wl59EjMrSlJM0rmFm2lMJpxKzCN2cFs0N2z6zG1/eQ9t/SxxyVBrNA6ECnCZrerIo2YGlaT30tc1rffpd8TchMH1VKP5qHnbLUqORMx5z0LR4U49l2HVcHgSCjt/1f127oMi411vIU=,iv:+m1F0CBaoJGv6Z1u+h6rbsXGPUhxgHouTalj13ccJiY=,tag:I/hK65yPaIcgHEZVaXJHBA==,type:str]
|
||||
|
|
@ -89,7 +89,7 @@ sops:
|
|||
OFloWEFuTC9GTXJsMG5NNktmdmIrY1kK0yN0ae0xNaydujV5lt2FiwXdyursG0DK
|
||||
9i/B3TTAm9csDMMSTSFbiAUJDzG7kIqn++JU/cxvsGScSnhMqjEK/g==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2026-01-07T08:19:02Z"
|
||||
mac: ENC[AES256_GCM,data:hWVuAT2P1vXtSWUiCYh52vr2FY60611QlO+lNf9GbB98Tzk6K3/RaEtQR8a1KVGz9qoJFwxRk0jm9Mo78ezxaCmjePWklyDYFTPGCcBZbPNGTcZfiCfp5yzFGDbGsR2s3nVDHP+a+BIwIWYEJZz2T4Gi/sPK2rUwGdvq6b0rnKQ=,iv:trEF/xsJobs87q96BdRxDkZHmInEU9krhUQiMvNu87g=,tag:PkYNLlnl72J+dxgnWhvWAw==,type:str]
|
||||
lastmodified: "2026-01-09T04:59:21Z"
|
||||
mac: ENC[AES256_GCM,data:NIHLAoNatyAhKHwCNdRGMR8+rUv00y/ssoGSQlq9/QayYt/GATfelgNwcqksSWf/db5v+Jz92bbk3RT9SKeoMWRxjm+8xzARbjhHGrzxAeLoerGPjQpEpkYYWbFC2ihSODrE+ar3HskAkQmVxmiGKEtYSg3+X2hiEy6ydZkP5Ps=,iv:mAyO820PpeG6NWQlmQf+l9MLIL4OTGJXCBSqYbmozZk=,tag:+Bex5hyAGBXiFoqxqVtaqg==,type:str]
|
||||
unencrypted_suffix: _unencrypted
|
||||
version: 3.11.0
|
||||
|
|
|
|||
1
system/dev/dn-server/sops/sops-conf.nix
Normal file → Executable file
1
system/dev/dn-server/sops/sops-conf.nix
Normal file → Executable file
|
|
@ -6,7 +6,6 @@ in
|
|||
sops.secrets = {
|
||||
"wireguard/privateKey" = { };
|
||||
"step_ca/password" = { };
|
||||
vaultwarden = { };
|
||||
"oauth/password" = { };
|
||||
"oauth/adminEnv" = { };
|
||||
"ldap/password" = lib.mkIf config.mail-server.enable {
|
||||
|
|
|
|||
0
system/dev/generic/default.nix
Normal file → Executable file
0
system/dev/generic/default.nix
Normal file → Executable file
0
system/dev/generic/disk.nix
Normal file → Executable file
0
system/dev/generic/disk.nix
Normal file → Executable file
13
system/dev/generic/hardware-configuration.nix
Normal file → Executable file
13
system/dev/generic/hardware-configuration.nix
Normal file → Executable file
|
|
@ -1,12 +1,21 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
imports = [ ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "virtio_scsi" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules = [
|
||||
"virtio_scsi"
|
||||
"sd_mod"
|
||||
];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
|
|
|||
0
system/dev/public/dn/common.nix
Normal file → Executable file
0
system/dev/public/dn/common.nix
Normal file → Executable file
0
system/dev/public/dn/default.nix
Normal file → Executable file
0
system/dev/public/dn/default.nix
Normal file → Executable file
0
system/dev/public/dn/ntfy.nix
Normal file → Executable file
0
system/dev/public/dn/ntfy.nix
Normal file → Executable file
0
system/dev/public/dn/yubikey.nix
Normal file → Executable file
0
system/dev/public/dn/yubikey.nix
Normal file → Executable file
0
system/dev/public/sops/dn-secret.yaml
Normal file → Executable file
0
system/dev/public/sops/dn-secret.yaml
Normal file → Executable file
0
system/dev/public/sops/secret.yaml
Normal file → Executable file
0
system/dev/public/sops/secret.yaml
Normal file → Executable file
0
system/dev/skydrive-lap/common/boot.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/boot.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/default.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/default.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/disk.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/disk.nix
Normal file → Executable file
21
system/dev/skydrive-lap/common/hardware-configuration.nix
Normal file → Executable file
21
system/dev/skydrive-lap/common/hardware-configuration.nix
Normal file → Executable file
|
|
@ -1,14 +1,25 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" ];
|
||||
boot.initrd.availableKernelModules = [
|
||||
"xhci_pci"
|
||||
"ahci"
|
||||
"nvme"
|
||||
"usbhid"
|
||||
];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
|
|
|||
0
system/dev/skydrive-lap/common/nvidia.nix
Normal file → Executable file
0
system/dev/skydrive-lap/common/nvidia.nix
Normal file → Executable file
5
system/dev/skydrive-lap/default.nix
Normal file → Executable file
5
system/dev/skydrive-lap/default.nix
Normal file → Executable file
|
|
@ -10,7 +10,8 @@ in
|
|||
systemConf = {
|
||||
inherit hostname username;
|
||||
domain = "net.dn";
|
||||
# hyprland.enable = true;
|
||||
enableHomeManager = true;
|
||||
hyprland.enable = false;
|
||||
niri.enable = true;
|
||||
face = pkgs.fetchurl {
|
||||
url = "https://git.dnywe.com/dachxy/skydrive-avatar/raw/branch/main/skydrive.jpg";
|
||||
|
|
@ -26,6 +27,8 @@ in
|
|||
./sops
|
||||
./utility
|
||||
./network
|
||||
./home
|
||||
../../modules/shells/noctalia
|
||||
];
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keys = [
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue