Lots of stuff

This commit is contained in:
Vice 2025-03-05 06:34:39 -05:00
parent 9115983c81
commit c15fab234d
17 changed files with 10 additions and 86 deletions

View file

@ -1,3 +1,3 @@
# ROCKPro64-Server
Jules' and Jimbo's flake for a ROCKPro64 server.
A flake for Jules' ROCKPro64 server.

22
flake.lock generated
View file

@ -20,27 +20,6 @@
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1739757849,
"narHash": "sha256-Gs076ot1YuAAsYVcyidLKUMIc4ooOaRGO0PqTY7sBzA=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "9d3d080aec2a35e05a15cedd281c2384767c2cfe",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-24.11",
"repo": "home-manager",
"type": "github"
}
},
"impermanence": {
"locked": {
"lastModified": 1737831083,
@ -74,7 +53,6 @@
"root": {
"inputs": {
"disko": "disko",
"home-manager": "home-manager",
"impermanence": "impermanence",
"nixpkgs": "nixpkgs",
"unstable": "unstable"

View file

@ -7,10 +7,6 @@
url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs";
};
home-manager = {
url = "github:nix-community/home-manager/release-24.11";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = {
@ -19,7 +15,6 @@
unstable,
impermanence,
disko,
home-manager,
...
}@inputs:
{

View file

@ -1,9 +1,7 @@
{ home-manager, ... }:
{ ... }:
{
imports = [
./jules
./jimbo
home-manager.nixosModules.home-manager
];
}

View file

@ -2,7 +2,6 @@
{
boot.supportedFilesystems = {
btrfs = true;
ntfs = true;
zfs = true;
};

View file

@ -3,7 +3,6 @@
imports = [
./doas
./git
./home-manager
./shells
];
}

View file

@ -1,12 +0,0 @@
{ unstable, ... }:
{
home-manager = {
useUserPackages = true;
backupFileExtension = "bak";
extraSpecialArgs = {
inherit
unstable
;
};
};
}

View file

@ -3,7 +3,6 @@
imports = [
./apparmor
./earlyoom
./libvirtd
./snowflake
./ssh
./userborn

View file

@ -1,22 +0,0 @@
{ pkgs, ... }:
{
virtualisation.libvirtd = {
enable = false;
onBoot = "ignore";
onShutdown = "shutdown";
qemu = {
ovmf = {
enable = true;
packages = with pkgs; [ OVMFFull.fd ];
};
vhostUserPackages = with pkgs; [ virtiofsd ];
swtpm.enable = true;
};
};
# Needed to make NAT work
networking.firewall.trustedInterfaces = [
"virbr0"
"virbr1"
];
}

View file

@ -2,16 +2,16 @@
{
imports = [
./cfdyndns
./fileserver
./forgejo
./jellyfin
./mysql
./nextcloud
./nfs
./owncast
./transmission
./vaultwarden
./webserver
];
options.system = with lib; {
server.enable = mkEnableOption "Enable server apps and services";
};
options.system.server.enable = with lib; mkEnableOption "Enable server apps and services";
}

View file

@ -1,10 +0,0 @@
{ lib, ... }:
{
options.system.fileserver.enable = lib.mkEnableOption "Enable file serving services";
imports = [
./jellyfin
./nextcloud
./nfs
];
}

View file

@ -2,7 +2,7 @@
{
imports = [ ./nginx ];
config = lib.mkIf config.system.fileserver.enable {
config = lib.mkIf config.system.server.enable {
services.nextcloud = {
enable = true;
package = pkgs.nextcloud30;

View file

@ -1,7 +1,7 @@
{ config, ... }:
{
services.nfs.server = {
enable = config.system.fileserver.enable;
enable = config.system.server.enable;
exports = ''
/export/KittyNFS/Files *(rw,sync,no_subtree_check)
/export/KittyNFS/Media *(rw,sync,no_subtree_check)

View file

@ -1,9 +1,9 @@
{ lib, ... }:
{
options.system.webserver.enable = lib.mkEnableOption "Enable nginx related services";
imports = [
./acme
./nginx
];
options.system.webserver.enable = lib.mkEnableOption "Enable nginx related services";
}