Compare commits

...

6 Commits

12 changed files with 159 additions and 45 deletions

View File

@@ -0,0 +1,9 @@
{ inputs, ... }: {
flake.modules.nixos.tux = {
imports = with inputs.self.modules.nixos;
with inputs.self.factory; [
development-tools
docker
];
};
}

View File

@@ -1,18 +1,18 @@
{ {
flake.modules.nixos.tux = { flake.modules.nixos.tux = {
fileSystems."/" = fileSystems."/" =
{ device = "/dev/disk/by-uuid/39bb2139-7d71-4f3d-9c11-2cf3fe26ad7d"; { device = "/dev/mapper/luks-9d836ef1-a7f9-430f-8fb8-f202f6336e5a";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/6514-61C0"; { device = "/dev/disk/by-uuid/15FA-55CF";
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ]; options = [ "fmask=0077" "dmask=0077" ];
}; };
swapDevices = swapDevices =
[ { device = "/dev/disk/by-uuid/ac1606de-34d3-4036-baf6-2ed17e54bfc3"; } [ { device = "/dev/mapper/luks-46e78828-ab23-48b8-8e2a-de7a21adbe24"; }
]; ];

View File

@@ -5,11 +5,12 @@
]; ];
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sd_mod" "sdhci_pci" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sd_mod" "sdhci_pci" ];
boot.initrd.luks.devices."luks-9d836ef1-a7f9-430f-8fb8-f202f6336e5a".device = "/dev/disk/by-uuid/9d836ef1-a7f9-430f-8fb8-f202f6336e5a";
boot.initrd.luks.devices."luks-46e78828-ab23-48b8-8e2a-de7a21adbe24".device = "/dev/disk/by-uuid/46e78828-ab23-48b8-8e2a-de7a21adbe24";
nixpkgs.hostPlatform = "x86_64-linux"; nixpkgs.hostPlatform = "x86_64-linux";
hardware.enableRedistributableFirmware = true; hardware.enableRedistributableFirmware = true;
hardware.cpu.intel.updateMicrocode = true; hardware.cpu.intel.updateMicrocode = true;
}; };
} }

View File

@@ -9,8 +9,7 @@
(autologin "weckyy702") (autologin "weckyy702")
development-tools home-vpn
tailscale
opentablet opentablet
#TODO: laptop specific aspects like powertop #TODO: laptop specific aspects like powertop

View File

@@ -0,0 +1,5 @@
{
flake.modules.nixos.tux = {
users.users.weckyy702.extraGroups = [ "docker" ];
};
}

View File

@@ -6,9 +6,84 @@
}; };
}; };
flake.modules.homeManager.browser = { pkgs, ... }: { flake.modules.homeManager.browser =
{ pkgs
, lib
, ...
}:
let
mkExtension = shortId: guid: {
name = guid;
value = {
install_url = "https://addons.mozilla.org/en-US/firefox/downloads/latest/${shortId}/latest.xpi";
installation_mode = "normal_installed";
};
};
zen-pkg =
inputs.zen-browser.packages.${pkgs.stdenv.hostPlatform.system}.zen-browser-unwrapped;
prefs = {
"zen.tabs.vertical.right-side" = true;
"zen.workspaces.force-container-workspace" = true;
"zen.view.compact.enable-at-startup" = true;
"zen.pinned-tab-manager.restore-pinned-tabs-to-pinned-url" = true;
"zen.welcome-screen.seen" = true;
"sidebar.visibility" = "hide-sidebar";
"browser.ctrlTab.sortByRecentlyUsed" = true;
"privacy.fingerprintingProtection" = true;
"privacy.globalprivacycontrol.was_ever_enabled" = true;
"privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs3" = true;
"privacy.trackingprotection.allow_list.convenience.enabled" = false;
"privacy.trackingprotection.allow_list.hasMigratedCategoryPrefs" = true;
"privacy.trackingprotection.allow_list.hasUserInteractedWithETPSettings" = true;
"privacy.trackingprotection.emailtracking.enabled" = true;
"privacy.trackingprotection.enabled" = true;
"privacy.trackingprotection.socialtracking.enabled" = true;
};
extensions = [
# To add additional extensions, find it on addons.mozilla.org, find
# the short ID in the url (like https://addons.mozilla.org/en-US/firefox/addon/!SHORT_ID!/)
# Then go to https://addons.mozilla.org/api/v5/addons/addon/!SHORT_ID!/ to get the guid
(mkExtension "ublock-origin" "uBlock0@raymondhill.net")
(mkExtension "darkreader" "addon@darkreader.org")
(mkExtension "bitwarden-password-manager" "{446900e4-71c2-419f-a6a7-df9c091e268b}")
# ...
];
in
{
home.packages = [ home.packages = [
inputs.zen-browser.packages.${pkgs.stdenv.hostPlatform.system}.default (
pkgs.wrapFirefox zen-pkg
{
extraPrefs = lib.concatLines (
lib.mapAttrsToList
(
name: value: ''lockPref(${lib.strings.toJSON name}, ${lib.strings.toJSON value});''
)
prefs
);
extraPolicies = {
DisableTelemetry = true;
ExtensionSettings = builtins.listToAttrs extensions;
SearchEngines = {
Default = "ddg";
Add = [
{
Name = "nixpkgs packages";
URLTemplate = "https://search.nixos.org/packages?query={searchTerms}";
IconURL = "https://wiki.nixos.org/favicon.ico";
Alias = "@np";
}
];
};
};
}
)
]; ];
}; };
} }

View File

@@ -1,9 +1,5 @@
{ inputs, ... }: { { inputs, ... }: {
flake.modules.nixos.development-tools = { pkgs, ... }: { flake.modules.nixos.development-tools = { pkgs, ... }: {
imports = with inputs.self.modules.nixos; [
rust
];
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
cmake cmake
gnumake gnumake

View File

@@ -6,7 +6,7 @@
}; };
}; };
flake.modules.nixos.rust = { pkgs, ... }: { flake.modules.nixos.development-tools = { pkgs, ... }: {
nixpkgs.overlays = [ nixpkgs.overlays = [
inputs.rust-overlay.overlays.default inputs.rust-overlay.overlays.default
]; ];

View File

@@ -0,0 +1,8 @@
{
flake.modules.nixos.docker = {
virtualisation.docker = {
enable = true;
autoPrune.enable = true;
};
};
}

View File

@@ -0,0 +1,14 @@
{ self, ... }: {
flake.modules.nixos.home-vpn = {
imports = with self.modules.nixos; [
tailscale
resolved
];
services.resolved.extraConfig = ''
[Resolve]
DNS=10.10.0.1
Domains=~veltnet
'';
};
}

View File

@@ -0,0 +1,7 @@
{
flake.modules.nixos.resolved = {
services.resolved.enable = true;
networking.networkmanager.dns = "systemd-resolved";
};
}

View File

@@ -1,12 +1,12 @@
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFNjTWNPZyB6Mzk1 YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFNjTWNPZyBDZVNV
MWl5cW5uNkc0WTFUTEF1TGFOS0J3a1YyRzJieTlDOGVPbm84WVVNCjJUNlp5K3Ny dEhaL21OOUpVeEIyVHY0RHUySldpMkxEMjNrbk5nbWlNRUZrblRvCmEyTnRlNC8r
YUhMdWp2Zk5tNGp1TkxKcnNST2h1N0VrVnNiaUZzV21QUFUKLT4gc3NoLWVkMjU1 cldvZGEwS1QvSzdWdGdNSHUrR1N5M1lJcXBpcHZ2RDVMc0UKLT4gc3NoLWVkMjU1
MTkgZkJwNFR3IDR5UFhoTkNOUlJyVmovMUQzTExGK2Y2bFZPMW9ZZFdQTFliUFVj MTkgZkJwNFR3IERiWDkrMEk5MU1vSHB4MmpFbjRMSDhiY3EwVXlrejBHT0h2N2pm
WDRPM2cKSjFQVWhVZXFMY0ZzdDEraXdkeW1BVkRtemFQdHYzeUI4ZjhrNFdsdmo1 N0I3MGsKd3RFQ01ObktrNkV5Z1ZsMVFzakVmUXJEczIyV2FVbldCQThCVERQMzJO
WQotPiBzc2gtZWQyNTUxOSBZazBxSWcgOUJxQkMzYzFrYWhVOTVFTnNvVmI1WDBn VQotPiBzc2gtZWQyNTUxOSBZazBxSWcgNjBhL2RldVQ2SWhjL0R2c09jUUY4d01j
U2ZCVDU0WTliQzRxTVZKdCtCdwpYbUlJVmNHaHpuY0dJMldJSEFkbmpkZTlmTkI1 RjFjamExWlEvOHlaVUhhQlhURQplRzgxY1pxblZnOXNkZVVEUHN0MVlsRFlQK1hW
Y3lhQWRBaWdNOGpvcHdzCi0tLSA0dm04SEovSnZ5dW9MaTdxV1NSUGxnZ3orTzNy WWVWQ1NwSHM1eUFtRHBvCi0tLSBnL0tvY3JBR3JVaGZVT2NZU2F4SnJlLzE5VUFw
WUt6eUt6TFAyTGFhdWFVCs0loU4KFs/vYaJX4d31Gf1y8Fv/jWEIALZ4KIqbEPPf QU4zM2lsNnRKQkE2blBVCqVEBU+W7CRtMD5OPPvioRttzBk1ZAJSgSiZkJPdVli9
3C1Ljr2Mbfz231S/zxjfjK2vhHNtYdBtPOsEtpvThCZSTzuJ/WUzox5XUfL7 Phhr6ZWAr3crBp3Pbn3emLmh+79XdOeAjXI5NhKA2/qW1eSpfClr2rIwu3HX
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----