updates
Some checks failed
Plex Update / update (push) Has been cancelled

This commit is contained in:
Vivian 2024-06-01 18:00:41 +02:00
parent 4fe990f884
commit 598a5a5e65
8 changed files with 308 additions and 378 deletions

File diff suppressed because it is too large Load diff

View file

@ -72,7 +72,7 @@
pkgs = import nixpkgs { pkgs = import nixpkgs {
inherit system; inherit system;
config.allowUnfree = true; config.allowUnfree = true;
overlays = [ (import ./nixos/pkgs) vault-secrets.overlay nur.overlay ]; overlays = [ (import ./nixos/pkgs) vault-secrets.overlays.default nur.overlay ];
}; };
pkgs_stable = import nixpkgs_stable { pkgs_stable = import nixpkgs_stable {
@ -148,9 +148,7 @@
cachix cachix
deadnix deadnix
statix statix
nixfmt
nixpkgs-fmt nixpkgs-fmt
nixUnstable
nil nil
vault vault
yamllint yamllint

View file

@ -43,7 +43,7 @@
nix = { nix = {
registry.nixpkgs.flake = inputs.nixpkgs; registry.nixpkgs.flake = inputs.nixpkgs;
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ]; nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
package = pkgs.nixUnstable; # package = pkgs.nixUnstable;
settings = { settings = {
auto-optimise-store = true; auto-optimise-store = true;
trusted-users = [ "root" "vivian" ]; trusted-users = [ "root" "vivian" ];

View file

@ -37,7 +37,7 @@ in {
}; };
mode = mkOption { mode = mkOption {
type = enum [ "server" "laptop" ]; type = types.enum [ "server" "laptop" ];
default = "laptop"; default = "laptop";
description = '' description = ''
Whether to configure the DNS in server mode (listen on all interfaces) or laptop mode (just on localhost) Whether to configure the DNS in server mode (listen on all interfaces) or laptop mode (just on localhost)

View file

@ -3,28 +3,6 @@
# and in the NixOS manual (accessible by running `nixos-help`). # and in the NixOS manual (accessible by running `nixos-help`).
{ pkgs, ... }: { pkgs, ... }:
# let
# Redefining the package instead of overriding as overriding GoModules seems broken
# see: https://github.com/NixOS/nixpkgs/issues/86349
# _nuclei-latest = pkgs.buildGoModule rec {
# pname = "nuclei";
# version = "2.9.2";
#
# src = pkgs.fetchFromGitHub {
# owner = "projectdiscovery";
# repo = pname;
# rev = "1f9a065713924b28b203e2108fc76d7a1ec49068";
# hash = "sha256-QiegMoBy0gZMyQl2MRAwR14zXeh8wvVonyETdAzHbj0=";
# };
#
# vendorHash = "sha256-0JNwoBqLKH1F/0Tr8o35gCSNT/2plIjIQvZRuzAZ5P8=";
#
# modRoot = "./v2";
# subPackages = [ "cmd/nuclei/" ];
#
# doCheck = false;
# };
# in {
{ {
imports = [ ./hardware-configuration.nix ]; imports = [ ./hardware-configuration.nix ];
@ -37,9 +15,13 @@
system.stateVersion = "23.05"; # Did you read the comment? system.stateVersion = "23.05"; # Did you read the comment?
# Additional packages # Additional packages
environment.systemPackages = with pkgs; [ jq wget jre8 ]; environment.systemPackages = with pkgs; [
boot.loader = { jq
wget
jdk17
];
boot.loader = {
systemd-boot.enable = true; systemd-boot.enable = true;
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
efi.efiSysMountPoint = "/boot"; efi.efiSysMountPoint = "/boot";
@ -49,28 +31,25 @@
enable = true; enable = true;
allowedTCPPorts = [ 25565 ]; allowedTCPPorts = [ 25565 ];
}; };
users = { users = {
groups.mc = { };
groups.users = { };
extraUsers = { extraUsers = {
laura.extraGroups = [ "wheel" ]; laura.extraGroups = [ "wheel" ];
vivian.extraGroups = [ "wheel" ]; vivian.extraGroups = [
"wheel"
julia = { "mc"
];
julius = {
isNormalUser = true; isNormalUser = true;
shell = pkgs.zsh; group = "users";
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKTvqk+CJG4VwN8wg3H1ZdbUVj1JuX7RYKH1ewRKfCPv julia@juliadijkstraarch" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAJBY9eQlR/JRnjVC2wKWQ+o02wDlGUlSgN/4e3i6ans"
# Below is Evelyn's keys "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBt9ie9/XBVPnKo6wENKjEd32hhPqjiQFnn+okXZ0LRT"
"ssh-rsa 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"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA0KA0uOoLXUN4LhU7LgtSk0atWyPlEz5LA8dIXs9xTl"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIfooZjMWXvXZu1ReOEACDZ0TMb2WJRBSOLlWE8y6fUh victor@aoife"
]; ];
extraGroups = [ "mc" "wheel" ];
}; };
}; };
groups.mc = { };
}; };
} }

View file

@ -9,36 +9,43 @@
"/mnt/disk1" = { "/mnt/disk1" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/abbfc440-fb3d-4b33-92cb-948b2deeac53"; device = "/dev/disk/by-partuuid/abbfc440-fb3d-4b33-92cb-948b2deeac53";
options = [ "nofail" ];
}; };
"/mnt/disk2" = { "/mnt/disk2" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/3a57ffa8-8a0f-4839-81df-7f34d99e9dbc"; device = "/dev/disk/by-partuuid/3a57ffa8-8a0f-4839-81df-7f34d99e9dbc";
options = [ "nofail" ];
}; };
"/mnt/disk3" = { "/mnt/disk3" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/0f72c5f8-b7db-4151-83f0-47e5f703aeb1"; device = "/dev/disk/by-partuuid/0f72c5f8-b7db-4151-83f0-47e5f703aeb1";
options = [ "nofail" ];
}; };
"/mnt/disk4" = { "/mnt/disk4" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/b9c72b41-1538-436e-a595-49d1faa5ed01"; device = "/dev/disk/by-partuuid/b9c72b41-1538-436e-a595-49d1faa5ed01";
options = [ "nofail" ];
}; };
"/mnt/disk5" = { "/mnt/disk5" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/928d0200-eca1-4a69-b2d6-fbd23a5ee8cd"; device = "/dev/disk/by-partuuid/928d0200-eca1-4a69-b2d6-fbd23a5ee8cd";
options = [ "nofail" ];
}; };
"/mnt/disk6" = { "/mnt/disk6" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-uuid/63381321-fe00-4838-8668-4d1decc94296"; device = "/dev/disk/by-uuid/63381321-fe00-4838-8668-4d1decc94296";
options = [ "nofail" ];
}; };
"/mnt/disk7" = { "/mnt/disk7" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-uuid/6c568887-9d2e-45ce-ab85-4c48cca2226a"; device = "/dev/disk/by-uuid/6c568887-9d2e-45ce-ab85-4c48cca2226a";
options = [ "nofail" ];
}; };
# "/mnt/disk8" = { # "/mnt/disk8" = {
@ -49,11 +56,13 @@
"/mnt/parity1" = { "/mnt/parity1" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/7c9b88ed-b8f8-40c9-bbc3-b75d30e04e01"; device = "/dev/disk/by-partuuid/7c9b88ed-b8f8-40c9-bbc3-b75d30e04e01";
options = [ "nofail" ];
}; };
"/mnt/parity2" = { "/mnt/parity2" = {
fsType = "ext4"; fsType = "ext4";
device = "/dev/disk/by-partuuid/5d2d7e3e-3730-4d9b-8759-dc14396f3357"; device = "/dev/disk/by-partuuid/5d2d7e3e-3730-4d9b-8759-dc14396f3357";
options = [ "nofail" ];
}; };
"/mnt/storage" = { "/mnt/storage" = {

View file

@ -61,7 +61,7 @@ in {
gitMinimal gitMinimal
gnused gnused
jq jq
nixUnstable nix
nodejs nodejs
statix statix
vault vault

View file

@ -59,7 +59,7 @@ in
"REPO_INDEXER_EXCLUDE" = "node_modules/**"; "REPO_INDEXER_EXCLUDE" = "node_modules/**";
}; };
ui = { ui = {
"THEMES" = "forgejo-auto,forgejo-light,forgejo-dark,auto,gitea,arc-green,agatheme"; "THEMES" = "forgejo-auto,forgejo-light,forgejo-dark,auto,gitea,arc-green";
"DEFAULT_THEME" = "forgejo-auto"; "DEFAULT_THEME" = "forgejo-auto";
"USE_SERVICE_WORKER" = true; "USE_SERVICE_WORKER" = true;
}; };
@ -96,10 +96,10 @@ in
group = "gitea"; group = "gitea";
}; };
system.activationScripts.gitea-theme = # system.activationScripts.gitea-theme =
let target_dir = "${config.services.gitea.stateDir}/custom/public/css/"; # let target_dir = "${config.services.gitea.stateDir}/custom/public/css/";
in lib.stringAfter [ "var" ] '' # in lib.stringAfter [ "var" ] ''
mkdir -p ${target_dir} # mkdir -p ${target_dir}
ln -sf ${pkgs.v.gitea-agatheme} "${target_dir}/theme-agatheme.css" # ln -sf ${pkgs.v.gitea-agatheme} "${target_dir}/theme-agatheme.css"
''; # '';
} }