[WIP] Several changes
- `foot` fonts and background color - `helix` editor - `pass` related aliases in shell - `nix-index` automatic update - `sway`/`waybar` changes - new `beebox` host - `kodi` module - `coredns` for `hs`
This commit is contained in:
parent
859896c9b2
commit
759b200b45
14 changed files with 313 additions and 41 deletions
23
hosts/beebox/default.nix
Normal file
23
hosts/beebox/default.nix
Normal file
|
@ -0,0 +1,23 @@
|
|||
{
|
||||
fleetModules,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}: {
|
||||
imports =
|
||||
[
|
||||
./hardware-configuration.nix
|
||||
]
|
||||
++ fleetModules [
|
||||
"common"
|
||||
"ssh"
|
||||
"ccr"
|
||||
"audio"
|
||||
"dbus"
|
||||
"bluetooth"
|
||||
"kodi"
|
||||
"udisks2"
|
||||
];
|
||||
|
||||
ccr.enable = true;
|
||||
}
|
60
hosts/beebox/hardware-configuration.nix
Normal file
60
hosts/beebox/hardware-configuration.nix
Normal file
|
@ -0,0 +1,60 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}: {
|
||||
imports = [
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = ["ahci" "xhci_pci" "usb_storage" "usbhid" "sd_mod"];
|
||||
boot.initrd.kernelModules = [];
|
||||
boot.kernelModules = ["kvm-intel"];
|
||||
boot.extraModulePackages = [];
|
||||
|
||||
boot.loader.systemd-boot.enable = true;
|
||||
boot.loader.efi.canTouchEfiVariables = true;
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-label/nixos";
|
||||
fsType = "f2fs";
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-label/boot";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [
|
||||
{device = "/dev/disk/by-label/swap";}
|
||||
];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking = {
|
||||
useDHCP = false;
|
||||
interfaces.wlp1s0.useDHCP = true;
|
||||
networkmanager.enable = true;
|
||||
};
|
||||
# networking.interfaces.enp2s0.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
|
||||
hardware.opengl = {
|
||||
enable = true;
|
||||
extraPackages = with pkgs; [
|
||||
intel-media-driver # LIBVA_DRIVER_NAME=iHD
|
||||
vaapiIntel # LIBVA_DRIVER_NAME=i965 (older but works better for Firefox/Chromium)
|
||||
vaapiVdpau
|
||||
libvdpau-va-gl
|
||||
];
|
||||
};
|
||||
}
|
|
@ -2,6 +2,7 @@
|
|||
fleetModules,
|
||||
pkgs,
|
||||
lib,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
imports =
|
||||
|
@ -128,7 +129,7 @@
|
|||
|
||||
transmission = {
|
||||
enable = true;
|
||||
# the following json is merged to this attrset, it must have `rpc-username` and `rpc-password`
|
||||
# following json is merged to this attrset, it must have `rpc-username` and `rpc-password`
|
||||
credentialsFile = "/mnt/archivio/transmission/credentials.json";
|
||||
settings = {
|
||||
download-dir = "/mnt/archivio/transmission/";
|
||||
|
@ -295,11 +296,13 @@
|
|||
4712 # amule
|
||||
4711 # amule web gui
|
||||
8384 # syncthing
|
||||
53 # dns
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
137 # samba
|
||||
138 # samba
|
||||
51820 # wireguard
|
||||
53 # dns
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -360,4 +363,35 @@
|
|||
};
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
|
||||
# TODO move away
|
||||
networking.nameservers = [
|
||||
# https://libreops.cc/radicaldns.html
|
||||
"88.198.92.222"
|
||||
"192.71.166.92"
|
||||
];
|
||||
|
||||
#environment.etc."coredns/blocklist.hosts".source = ../blocklist.hosts;
|
||||
|
||||
services.coredns = {
|
||||
enable = true;
|
||||
config = ''
|
||||
. {
|
||||
# RadicalDNS Forwarding
|
||||
forward . 88.198.92.222 192.71.166.92
|
||||
cache
|
||||
}
|
||||
|
||||
ccr.ydns.eu {
|
||||
template IN A {
|
||||
answer "{{ .Name }} 0 IN A 192.168.1.33"
|
||||
}
|
||||
}
|
||||
*.ccr.ydns.eu {
|
||||
template IN A {
|
||||
answer "{{ .Name }} 0 IN A 192.168.1.33"
|
||||
}
|
||||
}
|
||||
'';
|
||||
};
|
||||
}
|
||||
|
|
|
@ -50,6 +50,7 @@
|
|||
"discord"
|
||||
"cura"
|
||||
"xdg"
|
||||
"helix"
|
||||
];
|
||||
packages = with pkgs; [
|
||||
comma
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue