nix machine / user configurations

add volsinii and dzwonek hosts

+21
_sources/generated.json
··· 60 60 }, 61 61 "version": "a60247a8d92e1802298fc197034d0b7b54cd90b7" 62 62 }, 63 + "disko": { 64 + "cargoLocks": null, 65 + "date": "2025-10-17", 66 + "extract": null, 67 + "name": "disko", 68 + "passthru": null, 69 + "pinned": false, 70 + "src": { 71 + "deepClone": false, 72 + "fetchSubmodules": false, 73 + "leaveDotGit": false, 74 + "name": null, 75 + "owner": "nix-community", 76 + "repo": "disko", 77 + "rev": "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5", 78 + "sha256": "sha256-y7UhnWlER8r776JsySqsbTUh2Txf7K30smfHlqdaIQw=", 79 + "sparseCheckout": [], 80 + "type": "github" 81 + }, 82 + "version": "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5" 83 + }, 63 84 "gomod2nix": { 64 85 "cargoLocks": null, 65 86 "date": "2025-10-09",
+12
_sources/generated.nix
··· 41 41 }; 42 42 date = "2025-09-15"; 43 43 }; 44 + disko = { 45 + pname = "disko"; 46 + version = "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5"; 47 + src = fetchFromGitHub { 48 + owner = "nix-community"; 49 + repo = "disko"; 50 + rev = "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5"; 51 + fetchSubmodules = false; 52 + sha256 = "sha256-y7UhnWlER8r776JsySqsbTUh2Txf7K30smfHlqdaIQw="; 53 + }; 54 + date = "2025-10-17"; 55 + }; 44 56 gomod2nix = { 45 57 pname = "gomod2nix"; 46 58 version = "7f8d7438f5870eb167abaf2c39eea3d2302019d1";
+12 -2
deploy.nu
··· 28 28 } else { 29 29 log error $content 30 30 } 31 - http post --content-type application/json $"https://discord.com/api/webhooks/($env.WEBHOOK_ID)/($env.WEBHOOK_TOKEN)" $msg 31 + # http post --content-type application/json $"https://discord.com/api/webhooks/($env.WEBHOOK_ID)/($env.WEBHOOK_TOKEN)" $msg 32 32 } 33 33 34 34 def upload-paste []: any -> string { ··· 49 49 type: "nixos", 50 50 user: "root", 51 51 addr: "23.88.101.188", 52 + }, 53 + dzwonek: { 54 + type: "nixos", 55 + user: "root", 56 + addr: "94.237.26.47", 57 + }, 58 + volsinii: { 59 + type: "nixos", 60 + user: "root", 61 + addr: "199.71.188.53", 52 62 }, 53 63 "dusk@devel.mobi": { 54 64 type: "home", ··· 85 95 let result_link = readlink $result_dir 86 96 87 97 let target = $"($hostcfg.user)@($hostcfg.addr)" 88 - let copy_cmd = {nix copy --to $"ssh://($target)" $result_link} 98 + let copy_cmd = {nix copy -s --to $"ssh://($target)" $result_link} 89 99 if (run_step "copy to" $copy_cmd) { 90 100 return 91 101 }
+3 -4
hosts/default.nix
··· 11 11 inherit lib; 12 12 system = null; 13 13 modules = [ 14 - ../modules 15 - ../locale 16 - "${set.inputs.home}/nixos" 17 14 { networking.hostName = name; } 18 15 { nixpkgs.pkgs = set.pkgs; } 19 16 (import (./. + "/${name}/default.nix")) ··· 28 25 # lungmen = "x86_64-linux"; 29 26 # tkaronto = "x86_64-linux"; 30 27 wolumonde = allPkgsSets.x86_64-linux; 31 - wsl = allPkgsSets.x86_64-linux; 28 + # wsl = allPkgsSets.x86_64-linux; 29 + dzwonek = allPkgsSets.x86_64-linux; 30 + volsinii = allPkgsSets.x86_64-linux; 32 31 }; 33 32 in 34 33 lib.mapAttrs mkSystem systems
+28
hosts/dzwonek/default.nix
··· 1 + { 2 + inputs, 3 + tlib, 4 + pkgs, 5 + modulesPath, 6 + ... 7 + }: 8 + { 9 + imports = [ 10 + "${inputs.agenix}/modules/age.nix" 11 + "${inputs.home}/nixos" 12 + "${inputs.disko}/module.nix" 13 + ../../modules 14 + ../../users/root 15 + ./disk-config.nix 16 + ] 17 + ++ (tlib.importFolder (toString ./modules)); 18 + 19 + 20 + environment.systemPackages = [ 21 + pkgs.curl 22 + pkgs.gitMinimal 23 + ]; 24 + 25 + networking.firewall.enable = true; 26 + 27 + system.stateVersion = "25.05"; 28 + }
+54
hosts/dzwonek/disk-config.nix
··· 1 + { 2 + disko.devices = { 3 + disk = { 4 + main = { 5 + type = "disk"; 6 + device = "/dev/vda"; 7 + content = { 8 + type = "gpt"; 9 + partitions = { 10 + boot = { 11 + priority = 1; 12 + name = "boot"; 13 + size = "1M"; 14 + type = "EF02"; 15 + }; 16 + esp = { 17 + priority = 2; 18 + name = "ESP"; 19 + size = "256M"; 20 + type = "EF00"; 21 + content = { 22 + type = "filesystem"; 23 + format = "vfat"; 24 + mountpoint = "/boot"; 25 + mountOptions = [ "umask=0077" ]; 26 + }; 27 + }; 28 + root = { 29 + priority = 3; 30 + end = "-2G"; 31 + content = { 32 + type = "btrfs"; 33 + extraArgs = [ "-f" ]; # Override existing partition 34 + mountpoint = "/"; 35 + mountOptions = [ 36 + "compress=zstd" 37 + "noatime" 38 + ]; 39 + }; 40 + }; 41 + plainSwap = { 42 + priority = 4; 43 + size = "100%"; 44 + content = { 45 + type = "swap"; 46 + discardPolicy = "both"; 47 + }; 48 + }; 49 + }; 50 + }; 51 + }; 52 + }; 53 + }; 54 + }
+23
hosts/dzwonek/modules/hardware-configuration.nix
··· 1 + # Do not modify this file! It was generated by ‘nixos-generate-config’ 2 + # and may be overwritten by future invocations. Please make changes 3 + # to /etc/nixos/configuration.nix instead. 4 + { config, lib, pkgs, modulesPath, ... }: 5 + 6 + { 7 + imports = 8 + [ (modulesPath + "/profiles/qemu-guest.nix") 9 + ]; 10 + 11 + boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk" ]; 12 + boot.initrd.kernelModules = [ ]; 13 + boot.kernelModules = [ ]; 14 + boot.extraModulePackages = [ ]; 15 + 16 + boot.loader.grub = { 17 + efiSupport = true; 18 + efiInstallAsRemovable = true; 19 + }; 20 + 21 + networking.useDHCP = lib.mkDefault true; 22 + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; 23 + }
+11
hosts/dzwonek/modules/ssh.nix
··· 1 + { inputs, ... }: 2 + { 3 + services.fail2ban.enable = true; 4 + services.openssh = { 5 + enable = true; 6 + settings.PasswordAuthentication = false; 7 + }; 8 + users.users.root.openssh.authorizedKeys.keys = [ 9 + (builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub") 10 + ]; 11 + }
+32
hosts/volsinii/default.nix
··· 1 + { 2 + inputs, 3 + tlib, 4 + pkgs, 5 + modulesPath, 6 + ... 7 + }: 8 + { 9 + imports = [ 10 + "${inputs.agenix}/modules/age.nix" 11 + "${inputs.home}/nixos" 12 + "${inputs.disko}/module.nix" 13 + ../../modules 14 + ../../users/root 15 + ./disk-config.nix 16 + ] 17 + ++ (tlib.importFolder (toString ./modules)); 18 + 19 + boot.loader.grub = { 20 + efiSupport = true; 21 + efiInstallAsRemovable = true; 22 + }; 23 + 24 + environment.systemPackages = [ 25 + pkgs.curl 26 + pkgs.gitMinimal 27 + ]; 28 + 29 + networking.firewall.enable = true; 30 + 31 + system.stateVersion = "25.05"; 32 + }
+54
hosts/volsinii/disk-config.nix
··· 1 + { 2 + disko.devices = { 3 + disk = { 4 + main = { 5 + type = "disk"; 6 + device = "/dev/xvda"; 7 + content = { 8 + type = "gpt"; 9 + partitions = { 10 + boot = { 11 + priority = 1; 12 + name = "boot"; 13 + size = "1M"; 14 + type = "EF02"; 15 + }; 16 + esp = { 17 + priority = 2; 18 + name = "ESP"; 19 + size = "500M"; 20 + type = "EF00"; 21 + content = { 22 + type = "filesystem"; 23 + format = "vfat"; 24 + mountpoint = "/boot"; 25 + mountOptions = [ "umask=0077" ]; 26 + }; 27 + }; 28 + root = { 29 + priority = 3; 30 + end = "-8G"; 31 + content = { 32 + type = "btrfs"; 33 + extraArgs = [ "-f" ]; # Override existing partition 34 + mountpoint = "/"; 35 + mountOptions = [ 36 + "compress=zstd" 37 + "noatime" 38 + ]; 39 + }; 40 + }; 41 + plainSwap = { 42 + priority = 4; 43 + size = "100%"; 44 + content = { 45 + type = "swap"; 46 + discardPolicy = "both"; 47 + }; 48 + }; 49 + }; 50 + }; 51 + }; 52 + }; 53 + }; 54 + }
+26
hosts/volsinii/modules/hardware-configuration.nix
··· 1 + # Do not modify this file! It was generated by ‘nixos-generate-config’ 2 + # and may be overwritten by future invocations. Please make changes 3 + # to /etc/nixos/configuration.nix instead. 4 + { config, lib, pkgs, modulesPath, ... }: 5 + 6 + { 7 + imports = [ ]; 8 + 9 + boot.initrd.availableKernelModules = [ "ata_piix" "sr_mod" "xen_blkfront" ]; 10 + boot.initrd.kernelModules = [ ]; 11 + boot.kernelModules = [ ]; 12 + boot.extraModulePackages = [ ]; 13 + 14 + networking.useDHCP = false; 15 + 16 + systemd.network.enable = true; 17 + systemd.network.wait-online.enable = false; 18 + systemd.network.networks."enX0" = { 19 + matchConfig = { Name = "enX0"; }; 20 + address = ["199.71.188.53/29"]; 21 + gateway = ["199.71.188.49"]; 22 + }; 23 + 24 + 25 + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; 26 + }
+11
hosts/volsinii/modules/ssh.nix
··· 1 + { inputs, ... }: 2 + { 3 + services.fail2ban.enable = true; 4 + services.openssh = { 5 + enable = true; 6 + settings.PasswordAuthentication = false; 7 + }; 8 + users.users.root.openssh.authorizedKeys.keys = [ 9 + (builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub") 10 + ]; 11 + }
+3
hosts/wolumonde/default.nix
··· 6 6 }: 7 7 { 8 8 imports = [ 9 + ../../modules 10 + ../../locale 11 + "${inputs.home}/nixos" 9 12 ../../users/root 10 13 "${inputs.agenix}/modules/age.nix" 11 14 "${inputs.ncr}/firewall"
+3
hosts/wsl/default.nix
··· 8 8 }: 9 9 { 10 10 imports = [ 11 + ../../modules 12 + ../../locale 13 + "${inputs.home}/nixos" 11 14 ../../users/root 12 15 ../../users/firewatch 13 16 "${inputs.nixos-wsl}/modules"
+2
modules/base/nix.nix
··· 1 1 { 2 + pkgs, 2 3 lib, 3 4 inputs, 4 5 ... 5 6 }: 6 7 { 7 8 nix = { 9 + package = pkgs.lixPackageSets.git.lix; 8 10 registry = builtins.mapAttrs (_: v: { flake = v; }) (lib.filterAttrs (_: v: v ? outputs) inputs); 9 11 gc.automatic = false; 10 12 optimise.automatic = true;
+2
modules/nushell/prompt.nu
··· 3 3 wolumonde: {start: "0x603F26", end: "0x6C4E31"}, 4 4 chernobog: {start: "0xA94438", end: "0xD24545"}, 5 5 "sd-148036": {start: "0x595CFF", end: "0xC6F8FF"}, 6 + dzwonek: {start: "0x595CFF", end: "0xC6F8FF"}, 7 + volsinii: {start: "0x595CFF", end: "0xC6F8FF"}, 6 8 } 7 9 let user_colors = { 8 10 kirara: {start: "0xFF407D", end: "0xEE99C2"},
+4
nvfetcher.toml
··· 8 8 src.git = "https://github.com/nix-community/NixOS-WSL" 9 9 fetch.github = "nix-community/NixOS-WSL" 10 10 11 + [disko] 12 + src.git = "https://github.com/nix-community/disko" 13 + fetch.github = "nix-community/disko" 14 + 11 15 [home] 12 16 src.git = "https://github.com/nix-community/home-manager" 13 17 fetch.github = "nix-community/home-manager"
+1
secrets/dzwonek.key.pub
··· 1 + ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmAPY6Si6vf4bfi5r24XVDka7p/tcl4uHHuItFbf1vP
+1
secrets/volsinii.key.pub
··· 1 + ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEKFdogRnTNHcIwtdQqdX5O+1nvMDCX2iFx7Gd3eFIF9