diff options
Diffstat (limited to 'hosts/sif/default.nix')
-rw-r--r-- | hosts/sif/default.nix | 96 |
1 files changed, 17 insertions, 79 deletions
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix index 32651e14..6214569a 100644 --- a/hosts/sif/default.nix +++ b/hosts/sif/default.nix | |||
@@ -12,7 +12,7 @@ let | |||
12 | in { | 12 | in { |
13 | imports = with flake.nixosModules.systemProfiles; [ | 13 | imports = with flake.nixosModules.systemProfiles; [ |
14 | ./hw.nix | 14 | ./hw.nix |
15 | ./mail ./libvirt ./greetd | 15 | ./email ./libvirt ./greetd |
16 | tmpfs-root bcachefs initrd-all-crypto-modules default-locale openssh rebuild-machines niri-unstable networkmanager | 16 | tmpfs-root bcachefs initrd-all-crypto-modules default-locale openssh rebuild-machines niri-unstable networkmanager |
17 | flakeInputs.nixos-hardware.nixosModules.lenovo-thinkpad-p1 | 17 | flakeInputs.nixos-hardware.nixosModules.lenovo-thinkpad-p1 |
18 | flakeInputs.impermanence.nixosModules.impermanence | 18 | flakeInputs.impermanence.nixosModules.impermanence |
@@ -26,9 +26,6 @@ in { | |||
26 | allowUnfree = true; | 26 | allowUnfree = true; |
27 | pulseaudio = true; | 27 | pulseaudio = true; |
28 | }; | 28 | }; |
29 | extraOverlays = [ | ||
30 | flakeInputs.niri-flake.overlays.niri | ||
31 | ]; | ||
32 | }; | 29 | }; |
33 | 30 | ||
34 | time.timeZone = null; | 31 | time.timeZone = null; |
@@ -55,6 +52,7 @@ in { | |||
55 | systemd-boot = { | 52 | systemd-boot = { |
56 | enable = true; | 53 | enable = true; |
57 | configurationLimit = 15; | 54 | configurationLimit = 15; |
55 | netbootxyz.enable = true; | ||
58 | }; | 56 | }; |
59 | efi.canTouchEfiVariables = true; | 57 | efi.canTouchEfiVariables = true; |
60 | timeout = null; | 58 | timeout = null; |
@@ -128,40 +126,16 @@ in { | |||
128 | rulesetFile = ./ruleset.nft; | 126 | rulesetFile = ./ruleset.nft; |
129 | }; | 127 | }; |
130 | 128 | ||
131 | # firewall = { | ||
132 | # enable = true; | ||
133 | # allowedTCPPorts = [ 22 # ssh | ||
134 | # 8000 # quickserve | ||
135 | # ]; | ||
136 | # }; | ||
137 | |||
138 | # wlanInterfaces = { | ||
139 | # wlan0 = { | ||
140 | # device = "wlp82s0"; | ||
141 | # }; | ||
142 | # }; | ||
143 | |||
144 | # bonds = { | ||
145 | # "lan" = { | ||
146 | # interfaces = [ "wlan0" "enp0s31f6" "dock0" ]; | ||
147 | # driverOptions = { | ||
148 | # miimon = "1000"; | ||
149 | # mode = "active-backup"; | ||
150 | # primary_reselect = "always"; | ||
151 | # }; | ||
152 | # }; | ||
153 | # }; | ||
154 | |||
155 | useDHCP = false; | 129 | useDHCP = false; |
156 | useNetworkd = true; | 130 | useNetworkd = true; |
157 | |||
158 | # interfaces."tinc.yggdrasil" = { | ||
159 | # virtual = true; | ||
160 | # virtualType = config.services.tinc.networks.yggdrasil.interfaceType; | ||
161 | # macAddress = "5c:93:21:c3:61:39"; | ||
162 | # }; | ||
163 | }; | 131 | }; |
164 | 132 | ||
133 | environment.etc."NetworkManager/dnsmasq.d/dnssec.conf" = { | ||
134 | text = '' | ||
135 | conf-file=${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf | ||
136 | dnssec | ||
137 | ''; | ||
138 | }; | ||
165 | environment.etc."NetworkManager/dnsmasq.d/libvirt_dnsmasq.conf" = { | 139 | environment.etc."NetworkManager/dnsmasq.d/libvirt_dnsmasq.conf" = { |
166 | text = '' | 140 | text = '' |
167 | except-interface=virbr0 | 141 | except-interface=virbr0 |
@@ -404,19 +378,6 @@ in { | |||
404 | ]; | 378 | ]; |
405 | 379 | ||
406 | services = { | 380 | services = { |
407 | uucp = { | ||
408 | enable = true; | ||
409 | nodeName = "sif"; | ||
410 | remoteNodes = { | ||
411 | "ymir" = { | ||
412 | publicKeys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG6KNtsCOl5fsZ4rV7udTulGMphJweLBoKapzerWNoLY root@ymir"]; | ||
413 | hostnames = ["ymir.yggdrasil.li" "ymir.niflheim.yggdrasil"]; | ||
414 | }; | ||
415 | }; | ||
416 | |||
417 | defaultCommands = lib.mkForce []; | ||
418 | }; | ||
419 | |||
420 | avahi.enable = true; | 381 | avahi.enable = true; |
421 | 382 | ||
422 | fwupd.enable = true; | 383 | fwupd.enable = true; |
@@ -435,8 +396,8 @@ in { | |||
435 | 396 | ||
436 | logind = { | 397 | logind = { |
437 | lidSwitch = "suspend"; | 398 | lidSwitch = "suspend"; |
438 | lidSwitchDocked = "lock"; | 399 | lidSwitchDocked = "ignore"; |
439 | lidSwitchExternalPower = "lock"; | 400 | lidSwitchExternalPower = "ignore"; |
440 | }; | 401 | }; |
441 | 402 | ||
442 | atd = { | 403 | atd = { |
@@ -472,15 +433,17 @@ in { | |||
472 | libinput.enable = true; | 433 | libinput.enable = true; |
473 | 434 | ||
474 | envfs.enable = false; | 435 | envfs.enable = false; |
436 | |||
437 | displayManager.defaultSession = "Niri"; | ||
475 | }; | 438 | }; |
476 | 439 | ||
477 | systemd.tmpfiles.settings = { | 440 | systemd.tmpfiles.settings = { |
478 | "10-localtime"."/etc/localtime".L.argument = "/.bcachefs/etc/localtime"; | 441 | "10-localtime"."/etc/localtime".L.argument = "/.bcachefs/etc/localtime"; |
479 | 442 | ||
480 | "10-regreet"."/var/cache/regreet/cache.toml".C.argument = toString ((pkgs.formats.toml {}).generate "cache.toml" { | 443 | # "10-regreet"."/var/cache/regreet/cache.toml".C.argument = toString ((pkgs.formats.toml {}).generate "cache.toml" { |
481 | last_user = "gkleen"; | 444 | # last_user = "gkleen"; |
482 | user_to_last_sess.gkleen = "niri"; | 445 | # user_to_last_sess.gkleen = "Niri"; |
483 | }); | 446 | # }); |
484 | }; | 447 | }; |
485 | 448 | ||
486 | users = { | 449 | users = { |
@@ -640,25 +603,6 @@ in { | |||
640 | 603 | ||
641 | environment.etc."X11/xorg.conf.d/50-wacom.conf".source = lib.mkForce ./wacom.conf; | 604 | environment.etc."X11/xorg.conf.d/50-wacom.conf".source = lib.mkForce ./wacom.conf; |
642 | 605 | ||
643 | systemd.services."ac-plugged" = { | ||
644 | description = "Inhibit handling of lid-switch and sleep"; | ||
645 | |||
646 | path = with pkgs; [ systemd coreutils ]; | ||
647 | |||
648 | script = '' | ||
649 | exec systemd-inhibit --what=handle-lid-switch --why="AC is connected" --mode=block sleep infinity | ||
650 | ''; | ||
651 | |||
652 | serviceConfig = { | ||
653 | Type = "simple"; | ||
654 | }; | ||
655 | }; | ||
656 | |||
657 | services.udev.extraRules = with pkgs; lib.mkAfter '' | ||
658 | SUBSYSTEM=="power_supply", ENV{POWER_SUPPLY_ONLINE}=="0", RUN+="${systemd}/bin/systemctl --no-block stop ac-plugged.service" | ||
659 | SUBSYSTEM=="power_supply", ENV{POWER_SUPPLY_ONLINE}=="1", RUN+="${systemd}/bin/systemctl --no-block start ac-plugged.service" | ||
660 | ''; | ||
661 | |||
662 | systemd.services."nix-daemon".serviceConfig = { | 606 | systemd.services."nix-daemon".serviceConfig = { |
663 | MemoryAccounting = true; | 607 | MemoryAccounting = true; |
664 | MemoryHigh = "50%"; | 608 | MemoryHigh = "50%"; |
@@ -718,7 +662,7 @@ in { | |||
718 | directories = [ | 662 | directories = [ |
719 | "/nix" | 663 | "/nix" |
720 | "/root" | 664 | "/root" |
721 | "/home" | 665 | "/home" |
722 | "/var/log" | 666 | "/var/log" |
723 | "/var/lib/sops-nix" | 667 | "/var/lib/sops-nix" |
724 | "/var/lib/nixos" | 668 | "/var/lib/nixos" |
@@ -729,8 +673,6 @@ in { | |||
729 | "/var/lib/upower" | 673 | "/var/lib/upower" |
730 | "/var/lib/postfix" | 674 | "/var/lib/postfix" |
731 | "/etc/NetworkManager/system-connections" | 675 | "/etc/NetworkManager/system-connections" |
732 | { directory = "/var/uucp"; user = "uucp"; group = "uucp"; mode = "0700"; } | ||
733 | { directory = "/var/spool/uucp"; user = "uucp"; group = "uucp"; mode = "0750"; } | ||
734 | ]; | 676 | ]; |
735 | files = [ | 677 | files = [ |
736 | ]; | 678 | ]; |
@@ -751,10 +693,6 @@ in { | |||
751 | 693 | ||
752 | home-manager.sharedModules = [ flakeInputs.nixVirt.homeModules.default ]; | 694 | home-manager.sharedModules = [ flakeInputs.nixVirt.homeModules.default ]; |
753 | 695 | ||
754 | environment.pathsToLink = [ | ||
755 | "share/zsh" | ||
756 | ]; | ||
757 | |||
758 | system.stateVersion = "24.11"; | 696 | system.stateVersion = "24.11"; |
759 | }; | 697 | }; |
760 | } | 698 | } |