Personal Nix setup

Remove irqbalance

Changed files
+26 -3
machines
modules
automation
router
+9 -1
machines/ramune/configuration.nix
···
"ec:e5:12:1d:23:40" # tado
];
};
server = {
enable = true;
tailscale.enable = true;
caddy.enable = true;
vaultwarden.enable = true;
home-assistant = {
-
enable = true;
extraOptions = [ "--device=/dev/ttyUSB0" ];
};
};
···
"ec:e5:12:1d:23:40" # tado
];
};
+
automation = {
+
enable = true;
+
mqtt.enable = true;
+
zigbee = {
+
enable = true;
+
serialPort = "/dev/serial/by-id/usb-ITead_Sonoff_Zigbee_3.0_USB_Dongle_Plus_fcea8ceb8612ec11ab4e23c7bd930c07-if00-port0";
+
};
+
};
server = {
enable = true;
tailscale.enable = true;
caddy.enable = true;
vaultwarden.enable = true;
home-assistant = {
+
enable = false;
extraOptions = [ "--device=/dev/ttyUSB0" ];
};
};
+17
modules/automation/zigbee.nix
···
type = types.bool;
};
serialPort = mkOption {
default = "/dev/ttyUSB0";
example = "/dev/ttyUSB0";
···
services.zigbee2mqtt = {
enable = true;
settings = {
serial.port = cfg.zigbee.serialPort;
frontend = cfg.zigbee.frontend;
mqtt = mkIf cfg.mqtt.enable {
server = "mqtts://localhost:${toString cfg.mqtt.port}";
reject_unauthorized = false;
···
key = cfg.mqtt.keyfile;
cert = cfg.mqtt.certfile;
};
};
};
};
}
···
type = types.bool;
};
+
permitJoin = mkOption {
+
default = false;
+
description = "Permit new devices to join indefinitely (Not Recommended)";
+
type = types.bool;
+
};
+
serialPort = mkOption {
default = "/dev/ttyUSB0";
example = "/dev/ttyUSB0";
···
services.zigbee2mqtt = {
enable = true;
settings = {
+
permit_join = cfg.zigbee.permitJoin;
serial.port = cfg.zigbee.serialPort;
frontend = cfg.zigbee.frontend;
+
ota.disable_automatic_update_check = true;
mqtt = mkIf cfg.mqtt.enable {
server = "mqtts://localhost:${toString cfg.mqtt.port}";
reject_unauthorized = false;
···
key = cfg.mqtt.keyfile;
cert = cfg.mqtt.certfile;
};
+
advanced = {
+
log_level = "warning";
+
log_output = ["console"];
+
};
};
+
};
+
+
systemd.services.zigbee2mqtt = mkIf cfg.mqtt.enable {
+
wants = [config.systemd.services.mosquitto.name];
+
after = [config.systemd.services.mosquitto.name];
};
};
}
-2
modules/router/network.nix
···
};
config = mkIf cfg.enable {
-
services.irqbalance.enable = true;
-
networking.useNetworkd = true;
networking.firewall = mkIf (intern != null) {
···
};
config = mkIf cfg.enable {
networking.useNetworkd = true;
networking.firewall = mkIf (intern != null) {