Compare commits

..

2 commits

Author SHA1 Message Date
Jimbo 033d8f162e Add Chromebook to the roster without secrets 2024-10-18 15:44:38 -04:00
Jimbo 95155e9e93 Add Chromebook to the roster 2024-10-18 15:32:32 -04:00
10 changed files with 139 additions and 6 deletions

View file

@ -38,6 +38,7 @@
firefly = mkNixos [ ./hosts/firefly/system ]; firefly = mkNixos [ ./hosts/firefly/system ];
cyberspark = mkNixos [ ./hosts/cyberspark/system ]; cyberspark = mkNixos [ ./hosts/cyberspark/system ];
shuttleworth = mkNixos [ ./hosts/shuttleworth/system ]; shuttleworth = mkNixos [ ./hosts/shuttleworth/system ];
lacros = mkNixos [ ./hosts/lacros/system ];
}; };
# home-manager switch --flake .#username@hostname # home-manager switch --flake .#username@hostname
@ -45,6 +46,7 @@
"jimbo@firefly" = mkHome [ ./hosts/firefly/home ] nixpkgs.legacyPackages.x86_64-linux; "jimbo@firefly" = mkHome [ ./hosts/firefly/home ] nixpkgs.legacyPackages.x86_64-linux;
"jimbo@cyberspark" = mkHome [ ./hosts/cyberspark/home ] nixpkgs.legacyPackages.x86_64-linux; "jimbo@cyberspark" = mkHome [ ./hosts/cyberspark/home ] nixpkgs.legacyPackages.x86_64-linux;
"jimbo@shuttleworth" = mkHome [ ./hosts/shuttleworth/home ] nixpkgs.legacyPackages.aarch64-linux; "jimbo@shuttleworth" = mkHome [ ./hosts/shuttleworth/home ] nixpkgs.legacyPackages.aarch64-linux;
"jimbo@lacros" = mkHome [ ./hosts/lacros/home ] nixpkgs.legacyPackages.x86_64-linux;
}; };
}; };
} }

View file

@ -8,9 +8,9 @@
../../../modules/home/settings ../../../modules/home/settings
../../../modules/home/programs ../../../modules/home/programs
../../../modules/home/programs/misc/production ../../../modules/home/programs/misc/production
../../../modules/home/programs/misc/school
../../../modules/home/programs/misc/gaming/launchers ../../../modules/home/programs/misc/gaming/launchers
../../../modules/home/programs/misc/gaming/xash3d ../../../modules/home/programs/misc/gaming/xash3d
../../../modules/home/programs/misc/school
../../../modules/home/sway ../../../modules/home/sway
../../../modules/home/utils ../../../modules/home/utils

View file

@ -1,4 +1,4 @@
{ lanzaboote, ... }: { ... }:
{ {
imports = [ imports = [
./hardware ./hardware
@ -21,9 +21,6 @@
# Misc # Misc
../../../overlays ../../../overlays
../../../variables ../../../variables
# Imports
lanzaboote.nixosModules.lanzaboote
]; ];
networking.hostName = "firefly"; networking.hostName = "firefly";

View file

@ -0,0 +1,22 @@
{ config, nur, ... }:
{
imports = [
# Apps and programs
../../../modules/home
../../../modules/home/users
../../../modules/home/files
../../../modules/home/settings
../../../modules/home/programs
../../../modules/home/programs/misc/remote-desktop
../../../modules/home/sway
../../../modules/home/utils
# Misc
../../../overlays
../../../variables
../../../variables/look/colors/purple
# Imports
nur.nixosModules.nur
];
}

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBk6ALxn+zKrRys6/c1oYSoWJaUUEo3nAM224ElhjJQR jimbo@lacros

View file

@ -0,0 +1,13 @@
{ ... }:
{
boot.initrd = {
systemd.enable = true;
luks.devices = {
crypt-mmc = {
device = "/dev/disk/by-uuid/5906e176-7ad3-41e5-bc45-ae65664eb10c";
preLVM = true;
allowDiscards = true;
};
};
};
}

View file

@ -0,0 +1,28 @@
{ config, ... }:
{
imports = [
./hardware
./boot
# Apps and programs
../../../modules/system
../../../modules/system/accounts
../../../modules/system/desktop
../../../modules/system/programs
../../../modules/system/services
# Devices and hardware
../../../modules/system/devices
../../../modules/system/devices/boot/lanzaboote
../../../modules/system/devices/networking/wireless
../../../modules/system/devices/networking/firewall/pc
../../../modules/system/devices/networking/wireguard/pc
# Extras
../../../overlays
../../../variables
];
networking.hostName = "lacros";
networking.wireguard.interfaces."${config.ips.wgInt}".ips = [ "${config.ips.wgSpan}.18/24" ];
}

View file

@ -0,0 +1,66 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "sdhci_pci" ];
boot.initrd.kernelModules = [ "dm-snapshot" ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/e8c9c5a8-4df0-4100-8de6-f08a1a774fad";
fsType = "btrfs";
options = [ "subvol=@" ];
};
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/e8c9c5a8-4df0-4100-8de6-f08a1a774fad";
fsType = "btrfs";
options = [ "subvol=@nix" ];
};
fileSystems."/var" =
{ device = "/dev/disk/by-uuid/e8c9c5a8-4df0-4100-8de6-f08a1a774fad";
fsType = "btrfs";
options = [ "subvol=@var" ];
};
fileSystems."/.snapshots" =
{ device = "/dev/disk/by-uuid/e8c9c5a8-4df0-4100-8de6-f08a1a774fad";
fsType = "btrfs";
options = [ "subvol=@snapshots" ];
};
fileSystems."/home" =
{ device = "/dev/disk/by-uuid/e8c9c5a8-4df0-4100-8de6-f08a1a774fad";
fsType = "btrfs";
options = [ "subvol=@home" ];
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/1C76-1006";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/54a9cc22-4a2c-4e04-a968-313c34481489"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.wg0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View file

@ -1,5 +1,9 @@
{ ... }: { lanzaboote, ... }:
{ {
imports = [
lanzaboote.nixosModules.lanzaboote
];
boot.lanzaboote = { boot.lanzaboote = {
enable = true; enable = true;
pkiBundle = "/etc/secureboot"; pkiBundle = "/etc/secureboot";

Binary file not shown.