Configuration for my NixOS based systems and Home Manager
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

ADD: hardware-config, other stuff

+95 -32
+1
coredns/localhost.hosts
··· 1 + 127.0.0.1 *.localhost
+57
hardware-configuration.nix
··· 1 + # Do not modify this file! It was generated by ‘nixos-generate-config’ 2 + # and may be overwritten by future invocations. Please make changes 3 + # to /etc/nixos/configuration.nix instead. 4 + { config, lib, pkgs, modulesPath, ... }: 5 + 6 + { 7 + imports = 8 + [ 9 + (modulesPath + "/installer/scan/not-detected.nix") 10 + ]; 11 + 12 + boot.kernelPackages = pkgs.linuxPackages_6_6; 13 + boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "dm-raid" "raid1" ]; 14 + boot.initrd.kernelModules = [ "dm-snapshot" "dm-raid" "raid1" "amdgpu" ]; 15 + boot.kernelModules = [ "kvm-amd" "zfs" ]; 16 + boot.extraModulePackages = [ ]; 17 + 18 + fileSystems."/" = 19 + { 20 + device = "/dev/disk/by-uuid/1988fa0d-ff4a-44aa-a93e-7f0bf3cea5cf"; 21 + fsType = "ext4"; 22 + }; 23 + 24 + fileSystems."/boot" = 25 + { 26 + device = "/dev/disk/by-uuid/81D4-01CD"; 27 + fsType = "vfat"; 28 + }; 29 + 30 + swapDevices = [ ]; 31 + 32 + # Enables DHCP on each ethernet and wireless interface. In case of scripted networking 33 + # (the default) this is the recommended approach. When using systemd-networkd it's 34 + # still possible to use this option, but it's recommended to use it in conjunction 35 + # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. 36 + networking.useDHCP = lib.mkDefault true; 37 + # networking.interfaces.enp4s0f0.useDHCP = lib.mkDefault true; 38 + # networking.interfaces.enp4s0f1.useDHCP = lib.mkDefault true; 39 + # networking.interfaces.enp6s0.useDHCP = lib.mkDefault true; 40 + 41 + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; 42 + hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; 43 + 44 + hardware.graphics = { 45 + enable = true; 46 + extraPackages = with pkgs; [ 47 + mesa.drivers 48 + #libva 49 + amdvlk 50 + rocmPackages.clr.icd 51 + ]; 52 + }; 53 + environment.variables = { 54 + ROC_ENABLE_PRE_VEGA = "1"; 55 + }; 56 + services.xserver.videoDrivers = [ "amdgpu" ]; 57 + }
+23 -31
noah-home.nix
··· 13 13 { 14 14 home.packages = with pkgs; [ 15 15 # main tool 16 - firefox-devedition 17 16 direnv 18 17 fish 19 18 tree ··· 51 50 gcc 52 51 go 53 52 gnumake 54 - babashka 53 + #babashka 55 54 ccls 56 - clojure 57 - cmake 55 + #clojure 56 + #cmake 58 57 ctags 59 - kotlin 60 - nodejs 61 - node2nix 62 - opam 58 + #kotlin 59 + #nodejs 60 + #node2nix 61 + #opam 63 62 rustup 64 - zig 63 + #zig 65 64 luarocks 66 65 luajit 67 66 lua-language-server 68 - leiningen 67 + #leiningen 69 68 libressl 70 - erlang 71 - elixir 72 - ghc 69 + #erlang 70 + #elixir 71 + #ghc 73 72 nil 74 73 python3 75 - unstable.harec 76 - unstable.hare 77 - unstable.haredo 78 - unstable.gleam 79 - unstable.rebar3 80 - unstable.flyctl 81 - unstable.bun 82 - unstable.gh 83 - unstable.kraft 84 - unstable.doctl 74 + #unstable.harec 75 + #unstable.hare 76 + #unstable.haredo 77 + #unstable.gleam 78 + #unstable.rebar3 79 + #unstable.flyctl 80 + #unstable.bun 81 + #unstable.gh 82 + #unstable.kraft 83 + #unstable.doctl 85 84 86 - 87 - # GUI tools 88 - i3status 89 - slurp 90 - grim 91 - wl-clipboard 92 - playerctl 93 85 clinfo 94 86 95 87 # Server-specific tools ··· 152 144 153 145 programs.aerc = { 154 146 enable = true; 155 - package = unstable.aerc; 147 + #package = unstable.aerc; 156 148 }; 157 149 158 150 programs.ssh = {
+1
packages.nix
··· 107 107 "tailscale" 108 108 "plexmediaserver" 109 109 "sftpgo" 110 + "teamspeak-server" 110 111 ]; 111 112 }
+12
services.nix
··· 3 3 unstable = import <nixos-unstable> { 4 4 config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ 5 5 "plexmediaserver" 6 + "teamspeak-server" 6 7 ]; 7 8 }; 8 9 _age = import <agenix/modules/age.nix> { }; ··· 111 112 } 112 113 ngp.computer { 113 114 hosts ${./coredns/ngp.computer.hosts} ngp.computer { 115 + fallthrough 116 + } 117 + bind enp4s0f1 118 + } 119 + localhost { 120 + hosts ${./coredns/localhost.hosts} localhost { 114 121 fallthrough 115 122 } 116 123 bind enp4s0f1 ··· 330 337 }; 331 338 }; 332 339 }; 340 + }; 341 + 342 + services.teamspeak3 = { 343 + enable = true; 344 + openFirewall = true; 333 345 }; 334 346 335 347 # Nginx Reverse SSL Proxy
+1 -1
users.nix
··· 27 27 name = "chiefnoah.keys"; 28 28 # Update this with: 29 29 # `curl https://meta.sr.ht/~chiefnoah.keys | sha256sum` 30 - sha256 = "1587d75012cdd77c2dc006b3162e816213c5bac9c8c4addf81d66c156393b1fc"; 30 + sha256 = "19x8lim69kd06spqxjs7ril68izrqzkgqdvn45z2vkqgkw0jjzxh"; 31 31 })); 32 32 }; 33 33