3 Commits

Author SHA1 Message Date
julian 64392b695e Fix recursion on self
Update Nix Flake / update-flake (push) Failing after 22s
2026-03-23 21:57:18 +01:00
julian 8896788bfd Delete unneeded standalone hm configs 2026-03-23 20:58:19 +01:00
julian eec600d1d0 Move common host features to features-nixos folder 2026-03-23 20:57:12 +01:00
39 changed files with 57 additions and 74 deletions
+1 -1
View File
@@ -5,7 +5,7 @@ keys:
- &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5 - &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
creation_rules: creation_rules:
- path_regex: hosts/common/secrets.yaml$ - path_regex: hosts/secrets-common.yaml$
key_groups: key_groups:
- age: - age:
- *primary - *primary
@@ -1,4 +1,5 @@
{ {
pwd,
inputs, inputs,
config, config,
... ...
@@ -18,5 +19,5 @@ in {
generateKey = false; # TODO: building should not work without secrets!? generateKey = false; # TODO: building should not work without secrets!?
}; };
sops.defaultSopsFile = ../secrets.yaml; sops.defaultSopsFile = "${pwd}/hosts/secrets-common.yaml";
} }
@@ -1,4 +1,5 @@
{ {
pwd,
pkgs, pkgs,
config, config,
lib, lib,
@@ -29,7 +30,7 @@ in {
]; ];
openssh.authorizedKeys.keys = lib.splitString "\n" ( openssh.authorizedKeys.keys = lib.splitString "\n" (
builtins.readFile ../../../../homes/julian/ssh.pub builtins.readFile ./ssh.pub
); );
# hashedPasswordFile = config.sops.secrets.julian-password.path; # hashedPasswordFile = config.sops.secrets.julian-password.path;
hashedPassword = "$y$j9T$N33kLJQbV8soUoCbDkpwA1$r/yahJDgOPo4GGOrAi6BUG5zLTzmaBrA5NQ4nno561A"; hashedPassword = "$y$j9T$N33kLJQbV8soUoCbDkpwA1$r/yahJDgOPo4GGOrAi6BUG5zLTzmaBrA5NQ4nno561A";
@@ -40,11 +41,11 @@ in {
}; };
sops.secrets.julian-password = { sops.secrets.julian-password = {
sopsFile = ../../secrets.yaml; sopsFile = "${pwd}/hosts/secrets-common.yaml";
neededForUsers = true; neededForUsers = true;
}; };
home-manager.users.julian = import ../../../../homes/julian/${config.networking.hostName}.nix; home-manager.users.julian = import "${pwd}/homes/julian/${config.networking.hostName}.nix";
security.pam.services.swaylock = {}; # Make swaylock unlocking work security.pam.services.swaylock = {}; # Make swaylock unlocking work
} }
+5 -26
View File
@@ -76,10 +76,6 @@
import nixpkgs { import nixpkgs {
inherit system; inherit system;
config.allowUnfree = true; config.allowUnfree = true;
config.permittedInsecurePackages = [
"olm-3.2.16"
];
warn-dirty = false;
} }
); );
in { in {
@@ -89,7 +85,6 @@
homeManagerModules = import ./modules/home-manager; homeManagerModules = import ./modules/home-manager;
overlays = import ./overlays {inherit inputs outputs;}; overlays = import ./overlays {inherit inputs outputs;};
# hydraJobs = import ./hydra.nix { inherit inputs outputs; }; # TODO add hydra jobs here?
packages = forEachSystem (pkgs: import ./packages {inherit pkgs;}); packages = forEachSystem (pkgs: import ./packages {inherit pkgs;});
devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;}); devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;});
@@ -103,45 +98,27 @@
]; ];
specialArgs = { specialArgs = {
inherit inputs outputs; inherit inputs outputs;
pwd = "${self}";
}; };
}; };
kardorf = lib.nixosSystem { kardorf = lib.nixosSystem {
modules = [./hosts/kardorf]; modules = [./hosts/kardorf];
specialArgs = { specialArgs = {
inherit inputs outputs; inherit inputs outputs;
pwd = "${self}";
}; };
}; };
builder = lib.nixosSystem { builder = lib.nixosSystem {
modules = [./hosts/builder]; modules = [./hosts/builder];
specialArgs = { specialArgs = {
inherit inputs outputs; inherit inputs outputs;
pwd = "${self}";
}; };
}; };
}; };
# Standalone HM # Standalone HM
homeConfigurations = { homeConfigurations = {
# Main laptop
"julian@aspi" = lib.homeManagerConfiguration {
modules = [
./homes/julian/aspi.nix
./homes/julian/hm-standalone-config.nix
];
pkgs = pkgsFor.x86_64-linux;
extraSpecialArgs = {
inherit inputs outputs;
};
};
"julian@kardorf" = lib.homeManagerConfiguration {
modules = [
./homes/julian/kardorf.nix
./homes/julian/hm-standalone-config.nix
];
pkgs = pkgsFor.x86_64-linux;
extraSpecialArgs = {
inherit inputs outputs;
};
};
"julian@v3ms" = lib.homeManagerConfiguration { "julian@v3ms" = lib.homeManagerConfiguration {
modules = [ modules = [
./homes/julian/v3ms ./homes/julian/v3ms
@@ -150,6 +127,7 @@
pkgs = pkgsFor.x86_64-linux; pkgs = pkgsFor.x86_64-linux;
extraSpecialArgs = { extraSpecialArgs = {
inherit inputs outputs; inherit inputs outputs;
pwd = "${self}";
}; };
}; };
"julian@quickstart" = lib.homeManagerConfiguration { "julian@quickstart" = lib.homeManagerConfiguration {
@@ -160,6 +138,7 @@
pkgs = pkgsFor.x86_64-linux; pkgs = pkgsFor.x86_64-linux;
extraSpecialArgs = { extraSpecialArgs = {
inherit inputs outputs; inherit inputs outputs;
pwd = "${self}";
}; };
}; };
}; };
+17 -17
View File
@@ -1,28 +1,28 @@
{ {pwd, ...}: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
../common/global "${pwd}/features-nixos/global"
../common/users/julian "${pwd}/features-nixos/users/julian"
../common/optional/binarycaches.nix "${pwd}/features-nixos/optional/binarycaches.nix"
../common/optional/remote-builder.nix "${pwd}/features-nixos/optional/remote-builder.nix"
../common/optional/boot-efi.nix "${pwd}/features-nixos/optional/boot-efi.nix"
../common/optional/greetd.nix "${pwd}/features-nixos/optional/greetd.nix"
../common/optional/authentication.nix "${pwd}/features-nixos/optional/authentication.nix"
../common/optional/pcmanfm.nix "${pwd}/features-nixos/optional/pcmanfm.nix"
../common/optional/pipewire.nix "${pwd}/features-nixos/optional/pipewire.nix"
../common/optional/gamemode.nix "${pwd}/features-nixos/optional/gamemode.nix"
../common/optional/virtualbox.nix "${pwd}/features-nixos/optional/virtualbox.nix"
../common/optional/podman.nix "${pwd}/features-nixos/optional/podman.nix"
../common/optional/wireguard.nix "${pwd}/features-nixos/optional/wireguard.nix"
../common/optional/wireshark.nix "${pwd}/features-nixos/optional/wireshark.nix"
../common/optional/flatpak.nix "${pwd}/features-nixos/optional/flatpak.nix"
../common/optional/avahi.nix "${pwd}/features-nixos/optional/avahi.nix"
]; ];
networking.hostName = "aspi"; networking.hostName = "aspi";
+7 -6
View File
@@ -2,6 +2,7 @@
# or # or
# deploy .#builder # deploy .#builder
{ {
pwd,
config, config,
pkgs, pkgs,
... ...
@@ -9,11 +10,11 @@
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
../common/global/fish.nix # fish for admin "${pwd}/features-nixos/global/fish.nix" # fish for admin
../common/global/locale.nix "${pwd}/features-nixos/global/locale.nix"
../common/global/nix.nix "${pwd}/features-nixos/global/nix.nix"
../common/global/sops.nix "${pwd}/features-nixos/global/sops.nix"
../common/global/root.nix "${pwd}/features-nixos/global/root.nix"
]; ];
networking.hostName = "builder"; networking.hostName = "builder";
@@ -176,7 +177,7 @@
minimumDiskFreeEvaluator = 4; # in GB minimumDiskFreeEvaluator = 4; # in GB
}; };
# add builder itself as build machine so system emulation is properly supported # add builder itpwd as build machine so system emulation is properly supported
# nix.distributedBuilds = true; # nix.distributedBuilds = true;
nix.buildMachines = [ nix.buildMachines = [
{ {
+20 -19
View File
@@ -1,30 +1,31 @@
{pkgs, ...}: { {
pwd,
pkgs,
...
}: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
../common/global "${pwd}/features-nixos/global"
../common/users/julian "${pwd}/features-nixos/users/julian"
../common/users/wolfi "${pwd}/features-nixos/users/wolfi"
../common/optional/binarycaches.nix "${pwd}/features-nixos/optional/binarycaches.nix"
# ../common/optional/xserver.nix "${pwd}/features-nixos/optional/remote-builder.nix"
../common/optional/remote-builder.nix "${pwd}/features-nixos/optional/boot-efi.nix"
../common/optional/boot-efi.nix
../common/optional/greetd.nix "${pwd}/features-nixos/optional/greetd.nix"
../common/optional/authentication.nix "${pwd}/features-nixos/optional/authentication.nix"
../common/optional/pcmanfm.nix "${pwd}/features-nixos/optional/pcmanfm.nix"
../common/optional/pipewire.nix "${pwd}/features-nixos/optional/pipewire.nix"
../common/optional/virtualbox.nix "${pwd}/features-nixos/optional/openssh.nix"
# ../common/optional/gdm.nix "${pwd}/features-nixos/optional/virtualbox.nix"
# ../common/optional/i3.nix
../common/optional/openssh.nix "${pwd}/features-nixos/optional/podman.nix"
"${pwd}/features-nixos/optional/wireshark.nix"
../common/optional/podman.nix "${pwd}/features-nixos/optional/flatpak.nix"
../common/optional/flatpak.nix
]; ];
networking.hostName = "kardorf"; networking.hostName = "kardorf";
+1 -1
View File
@@ -22,7 +22,7 @@
}; };
# Adds my custom packages, available as pkgs.frajul.xyz # Adds my custom packages, available as pkgs.frajul.xyz
my-pkgs = final: prev: {frajul = import ../pkgs {pkgs = final;};}; frajul-pkgs = final: prev: {frajul = import ../packages {pkgs = final;};};
nixpkgs-stable-unstable = final: prev: { nixpkgs-stable-unstable = final: prev: {
unstable = import inputs.nixpkgs-unstable { unstable = import inputs.nixpkgs-unstable {