Compare commits
No commits in common. "8de8301dc14b4b32d3a6e0649d930f057b31cd21" and "53dc0a539d7038b4e8a87cae1c6363e6c6038033" have entirely different histories.
8de8301dc1
...
53dc0a539d
8 changed files with 63 additions and 75 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -1 +0,0 @@
|
||||||
hosts/configuration.nix
|
|
|
@ -21,11 +21,10 @@
|
||||||
system = system;
|
system = system;
|
||||||
modules = [
|
modules = [
|
||||||
# imports
|
# imports
|
||||||
./hosts/eclipse.nix
|
|
||||||
./nixos/configuration.nix
|
./nixos/configuration.nix
|
||||||
|
./nixos/eclipse-hw-configuration.nix
|
||||||
./nixos/environment.nix
|
./nixos/environment.nix
|
||||||
./nixos/git.nix
|
./nixos/git.nix
|
||||||
./nixos/gui-pkgs.nix
|
|
||||||
./nixos/nvidia.nix
|
./nixos/nvidia.nix
|
||||||
./nixos/nvim.nix
|
./nixos/nvim.nix
|
||||||
./nixos/pkg.nix
|
./nixos/pkg.nix
|
||||||
|
|
|
@ -32,22 +32,18 @@
|
||||||
userName = "cswimr";
|
userName = "cswimr";
|
||||||
userEmail = "seaswimmerthefsh@gmail.com";
|
userEmail = "seaswimmerthefsh@gmail.com";
|
||||||
extraConfig = {
|
extraConfig = {
|
||||||
user = { signingkey = "0EC431A8DA8F8087"; };
|
signing = { signByDefault = true; };
|
||||||
commit = { gpgsign = true; };
|
|
||||||
signing = { signByDefault = true; key = "0EC431A8DA8F8087"; };
|
|
||||||
init = { defaultBranch = "master"; };
|
init = { defaultBranch = "master"; };
|
||||||
safe = { directory = "/etc/nixos"; };
|
safe = { directory = "/etc/nixos"; };
|
||||||
url = {
|
url = {
|
||||||
"git@coastalcommits.com:" = {
|
"https://www.coastalcommits.com/" = {
|
||||||
insteadOf = [
|
insteadOf = [
|
||||||
"https://www.coastalcommits.com/"
|
|
||||||
"cc:"
|
"cc:"
|
||||||
"coastalcommits:"
|
"coastalcommits:"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
"git@github.com:" = {
|
"https://github.com/" = {
|
||||||
insteadOf = [
|
insteadOf = [
|
||||||
"https://github.com/"
|
|
||||||
"gh:"
|
"gh:"
|
||||||
"github:"
|
"github:"
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,48 +0,0 @@
|
||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
|
||||||
# and may be overwritten by future invocations. Please make changes
|
|
||||||
# to /etc/nixos/configuration.nix instead.
|
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports =
|
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
|
||||||
];
|
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" "sr_mod" "rtsx_usb_sdmmc" ];
|
|
||||||
boot.initrd.kernelModules = [ ];
|
|
||||||
boot.kernelModules = [ "kvm-amd" ];
|
|
||||||
boot.extraModulePackages = [ ];
|
|
||||||
|
|
||||||
fileSystems."/" =
|
|
||||||
{ device = "/dev/disk/by-uuid/f65ec459-c974-4032-8224-fa78c57527c2";
|
|
||||||
fsType = "ext4";
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/boot" =
|
|
||||||
{ device = "/dev/disk/by-uuid/484E-279A";
|
|
||||||
fsType = "vfat";
|
|
||||||
options = [ "fmask=0077" "dmask=0077" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/bulk" =
|
|
||||||
{ device = "/dev/disk/by-uuid/3b8e0789-def6-45dd-8eff-7b55b74569ce";
|
|
||||||
fsType = "ext4";
|
|
||||||
};
|
|
||||||
|
|
||||||
swapDevices =
|
|
||||||
[ { device = "/dev/disk/by-uuid/4eab8c8f-85c5-4a04-a03c-e111ada06ec0"; }
|
|
||||||
];
|
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.docker0.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.tailscale0.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.wlp4s0.useDHCP = lib.mkDefault true;
|
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
|
||||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
|
||||||
}
|
|
48
nixos/eclipse-hw-configuration.nix
Executable file
48
nixos/eclipse-hw-configuration.nix
Executable file
|
@ -0,0 +1,48 @@
|
||||||
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
|
# and may be overwritten by future invocations. Please make changes
|
||||||
|
# to /etc/nixos/configuration.nix instead.
|
||||||
|
{ config, lib, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = [
|
||||||
|
"xhci_pci"
|
||||||
|
"ahci"
|
||||||
|
"nvme"
|
||||||
|
"usbhid"
|
||||||
|
"usb_storage"
|
||||||
|
"sd_mod"
|
||||||
|
"sr_mod"
|
||||||
|
"rtsx_usb_sdmmc"
|
||||||
|
];
|
||||||
|
boot.initrd.kernelModules = [ ];
|
||||||
|
boot.kernelModules = [ "kvm-amd" ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/disk/by-uuid/f65ec459-c974-4032-8224-fa78c57527c2";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/boot" = {
|
||||||
|
device = "/dev/disk/by-uuid/484E-279A";
|
||||||
|
fsType = "vfat";
|
||||||
|
options = [ "fmask=0077" "dmask=0077" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices =
|
||||||
|
[{ device = "/dev/disk/by-uuid/4eab8c8f-85c5-4a04-a03c-e111ada06ec0"; }];
|
||||||
|
|
||||||
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
|
||||||
|
# networking.interfaces.wlp4s0.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
hardware.cpu.amd.updateMicrocode =
|
||||||
|
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
}
|
|
@ -1,16 +0,0 @@
|
||||||
{ pkgs, ... }: {
|
|
||||||
# kde stuff
|
|
||||||
environment.systemPackages = with pkgs; [
|
|
||||||
# catppuccin
|
|
||||||
(catppuccin-kde.override {
|
|
||||||
flavour = [ "mocha" "macchiato" "frappe" "latte" ];
|
|
||||||
accents = [ "blue" ];
|
|
||||||
winDecStyles = [ "classic" ];
|
|
||||||
})
|
|
||||||
];
|
|
||||||
|
|
||||||
programs.partition-manager.enable = true;
|
|
||||||
|
|
||||||
fonts.packages = with pkgs;
|
|
||||||
[ (nerdfonts.override { fonts = [ "FiraCode" ]; }) ];
|
|
||||||
}
|
|
|
@ -46,8 +46,18 @@
|
||||||
# javascript stuff 🤮
|
# javascript stuff 🤮
|
||||||
nodejs
|
nodejs
|
||||||
corepack
|
corepack
|
||||||
|
|
||||||
|
# catppuccin
|
||||||
|
(catppuccin-kde.override {
|
||||||
|
flavour = [ "mocha" "macchiato" "frappe" "latte" ];
|
||||||
|
accents = [ "blue" ];
|
||||||
|
winDecStyles = [ "classic" ];
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
|
fonts.packages = with pkgs;
|
||||||
|
[ (nerdfonts.override { fonts = [ "FiraCode" ]; }) ];
|
||||||
|
|
||||||
# install docker
|
# install docker
|
||||||
virtualisation.docker = { enable = true; };
|
virtualisation.docker = { enable = true; };
|
||||||
|
|
||||||
|
|
|
@ -38,7 +38,7 @@
|
||||||
ls = "eza --icons";
|
ls = "eza --icons";
|
||||||
l = "eza -lhg --icons";
|
l = "eza -lhg --icons";
|
||||||
|
|
||||||
upd = "sudo nixos-generate-config --dir /etc/nixos/hosts && sudo rm /etc/nixos/hosts/configuration.nix && sudo mv /etc/nixos/hosts/hardware-configuration.nix /etc/nixos/hosts/$(hostname).nix && git add /etc/nixos/hosts/$(hostname).nix && sudo nixos-rebuild switch";
|
upd = "sudo nixos-rebuild switch";
|
||||||
|
|
||||||
c = "clear";
|
c = "clear";
|
||||||
# alias sudo to itself so user aliases can be sudoed
|
# alias sudo to itself so user aliases can be sudoed
|
||||||
|
|
Loading…
Reference in a new issue