forked from jan-leila/nix-config
		
	ran statix linter
This commit is contained in:
		
							parent
							
								
									f68a46c46a
								
							
						
					
					
						commit
						9706360841
					
				
					 16 changed files with 376 additions and 329 deletions
				
			
		|  | @ -23,83 +23,91 @@ | |||
|   virtualisation.docker.enable = true; | ||||
|   users.extraGroups.docker.members = [ "leyla" ]; | ||||
| 
 | ||||
|   boot.supportedFilesystems = [ "zfs" ]; | ||||
| 
 | ||||
|   boot.zfs.extraPools = [ "zroot" ]; | ||||
| 
 | ||||
|   services.zfs.autoScrub.enable = true; | ||||
|   services.zfs.autoSnapshot.enable = true; | ||||
| 
 | ||||
|   # this might need to match the hostId of the installation medium? `head -c 8 /etc/machine-id` NOPE | ||||
|   networking.hostId = "c51763d6"; | ||||
|   networking.hostName = "defiant"; # Define your hostname. | ||||
| 
 | ||||
|   nixpkgs.config.allowUnfree = true; | ||||
| 
 | ||||
|   # temp enable desktop enviroment for setup | ||||
|   # Enable the X11 windowing system. | ||||
|   services.xserver.enable = true; | ||||
|   services = { | ||||
|     zfs = { | ||||
|       autoScrub.enable = true; | ||||
|       autoSnapshot.enable = true; | ||||
|     }; | ||||
|      | ||||
|     # temp enable desktop enviroment for setup | ||||
|     # Enable the X11 windowing system. | ||||
|     xserver = { | ||||
|       enable = true; | ||||
| 
 | ||||
|   # Enable the GNOME Desktop Environment. | ||||
|   services.xserver.displayManager.gdm.enable = true; | ||||
|   services.xserver.desktopManager.gnome.enable = true; | ||||
|   services.xserver.desktopManager.xterm.enable = false; | ||||
|       # Enable the GNOME Desktop Environment. | ||||
|       services.xserver.displayManager = { | ||||
|         gdm.enable = true; | ||||
|       }; | ||||
|       services.xserver.desktopManager = { | ||||
|         gnome.enable = true; | ||||
|         desktopManager.xterm.enable = false; | ||||
|       }; | ||||
| 
 | ||||
|   # Get rid of xTerm | ||||
|   services.xserver.excludePackages = [ pkgs.xterm ]; | ||||
|       # Get rid of xTerm | ||||
|       excludePackages = [ pkgs.xterm ]; | ||||
|     }; | ||||
| 
 | ||||
|   # disable computer sleeping | ||||
|   systemd.targets.sleep.enable = false; | ||||
|   systemd.targets.suspend.enable = false; | ||||
|   systemd.targets.hibernate.enable = false; | ||||
|   systemd.targets.hybrid-sleep.enable = false; | ||||
|     openssh = { | ||||
|       enable = true; | ||||
|       ports = [ 22 ]; | ||||
|       settings = { | ||||
|         PasswordAuthentication = false; | ||||
|         AllowUsers = [ "leyla" ]; # Allows all users by default. Can be [ "user1" "user2" ] | ||||
|         UseDns = true; | ||||
|         X11Forwarding = false; | ||||
|       }; | ||||
|     }; | ||||
| 
 | ||||
|   services.openssh = { | ||||
|     enable = true; | ||||
|     ports = [ 22 ]; | ||||
|     settings = { | ||||
|       PasswordAuthentication = false; | ||||
|       AllowUsers = [ "leyla" ]; # Allows all users by default. Can be [ "user1" "user2" ] | ||||
|       UseDns = true; | ||||
|       X11Forwarding = false; | ||||
|     nfs.server = { | ||||
|       enable = true; | ||||
|       exports = '' | ||||
|         /srv/nfs4/docker 192.168.1.0/24(rw,sync,crossmnt,no_subtree_check) | ||||
| 
 | ||||
|         /srv/nfs4/leyla 192.168.1.0/22(rw,sync,no_subtree_check,nohide) | ||||
|         /srv/nfs4/eve   192.168.1.0/22(rw,sync,no_subtree_check,crossmnt) | ||||
|         /srv/nfs4/share 192.168.1.0/22(rw,sync,no_subtree_check,crossmnt) | ||||
|          | ||||
|         # /export         192.168.1.10(rw,fsid=0,no_subtree_check) 192.168.1.15(rw,fsid=0,no_subtree_check) | ||||
|         # /export/kotomi  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|         # /export/mafuyu  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|         # /export/sen     192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|         # /export/tomoyo  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|       ''; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   fileSystems."/srv/nfs4/docker" = { | ||||
|     device = "/home/docker"; | ||||
|     options = [ "bind" ]; | ||||
|   # disable computer sleeping | ||||
|   systemd.targets = { | ||||
|     sleep.enable = false; | ||||
|     suspend.enable = false; | ||||
|     hibernate.enable = false; | ||||
|     hybrid-sleep.enable = false; | ||||
|   }; | ||||
| 
 | ||||
|   fileSystems."/srv/nfs4/users" = { | ||||
|     device = "/home/users"; | ||||
|     options = [ "bind" ]; | ||||
|   fileSystems = { | ||||
|     "/srv/nfs4/docker" = { | ||||
|       device = "/home/docker"; | ||||
|       options = [ "bind" ]; | ||||
|     }; | ||||
| 
 | ||||
|     "/srv/nfs4/users" = { | ||||
|       device = "/home/users"; | ||||
|       options = [ "bind" ]; | ||||
|     }; | ||||
| 
 | ||||
|     "/srv/nfs4/leyla" = { | ||||
|       device = "/home/leyla"; | ||||
|       options = [ "bind" ]; | ||||
|     }; | ||||
| 
 | ||||
|     "/srv/nfs4/eve" = { | ||||
|       device = "/home/eve"; | ||||
|       options = [ "bind" ]; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   fileSystems."/srv/nfs4/leyla" = { | ||||
|     device = "/home/leyla"; | ||||
|     options = [ "bind" ]; | ||||
|   }; | ||||
| 
 | ||||
|   fileSystems."/srv/nfs4/eve" = { | ||||
|     device = "/home/eve"; | ||||
|     options = [ "bind" ]; | ||||
|   }; | ||||
| 
 | ||||
|   services.nfs.server.enable = true; | ||||
|   services.nfs.server.exports = '' | ||||
|     /srv/nfs4/docker 192.168.1.0/24(rw,sync,crossmnt,no_subtree_check) | ||||
| 
 | ||||
|     /srv/nfs4/leyla 192.168.1.0/22(rw,sync,no_subtree_check,nohide) | ||||
|     /srv/nfs4/eve   192.168.1.0/22(rw,sync,no_subtree_check,crossmnt) | ||||
|     /srv/nfs4/share 192.168.1.0/22(rw,sync,no_subtree_check,crossmnt) | ||||
|      | ||||
|     # /export         192.168.1.10(rw,fsid=0,no_subtree_check) 192.168.1.15(rw,fsid=0,no_subtree_check) | ||||
|     # /export/kotomi  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|     # /export/mafuyu  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|     # /export/sen     192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|     # /export/tomoyo  192.168.1.10(rw,nohide,insecure,no_subtree_check) 192.168.1.15(rw,nohide,insecure,no_subtree_check) | ||||
|   ''; | ||||
| 
 | ||||
|   # This value determines the NixOS release from which the default | ||||
|   # settings for stateful data, like file locations and database versions | ||||
|   # on your system were taken. It‘s perfectly fine and recommended to leave | ||||
|  |  | |||
|  | @ -8,10 +8,18 @@ | |||
|     [ (modulesPath + "/installer/scan/not-detected.nix") | ||||
|     ]; | ||||
| 
 | ||||
|   boot.initrd.availableKernelModules = [ "xhci_pci" "aacraid" "ahci" "usbhid" "usb_storage" "sd_mod" ]; | ||||
|   boot.initrd.kernelModules = [ ]; | ||||
|   boot.kernelModules = [ "kvm-amd" ]; | ||||
|   boot.extraModulePackages = [ ]; | ||||
|   boot = { | ||||
|     initrd = { | ||||
|       availableKernelModules = [ "xhci_pci" "aacraid" "ahci" "usbhid" "usb_storage" "sd_mod" ]; | ||||
|       kernelModules = [ ]; | ||||
|     }; | ||||
|     kernelModules = [ "kvm-amd" ]; | ||||
|     extraModulePackages = [ ]; | ||||
|      | ||||
|     supportedFilesystems = [ "zfs" ]; | ||||
| 
 | ||||
|     zfs.extraPools = [ "zroot" ]; | ||||
|   }; | ||||
| 
 | ||||
|   # fileSystems."/" = | ||||
|   #   { device = "/dev/disk/by-uuid/dc6a9664-80f2-4988-afd7-fee5bd3ee2ca"; | ||||
|  | @ -20,13 +28,17 @@ | |||
| 
 | ||||
|   swapDevices = [ ]; | ||||
| 
 | ||||
|   # Enables DHCP on each ethernet and wireless interface. In case of scripted networking | ||||
|   # (the default) this is the recommended approach. When using systemd-networkd it's | ||||
|   # still possible to use this option, but it's recommended to use it in conjunction | ||||
|   # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. | ||||
|   networking.useDHCP = lib.mkDefault true; | ||||
|   # networking.interfaces.eno1.useDHCP = lib.mkDefault true; | ||||
|   # networking.interfaces.eno2.useDHCP = lib.mkDefault true; | ||||
|   networking = { | ||||
|     # Enables DHCP on each ethernet and wireless interface. In case of scripted networking | ||||
|     # (the default) this is the recommended approach. When using systemd-networkd it's | ||||
|     # still possible to use this option, but it's recommended to use it in conjunction | ||||
|     # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. | ||||
|     useDHCP = lib.mkDefault true; | ||||
|     # networking.interfaces.eno1.useDHCP = lib.mkDefault true; | ||||
|     # networking.interfaces.eno2.useDHCP = lib.mkDefault true; | ||||
|     hostId = "c51763d6"; | ||||
|     hostName = "defiant"; # Define your hostname. | ||||
|   }; | ||||
| 
 | ||||
|   nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; | ||||
|   hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue