nix machine / user configurations

add volsinii and dzwonek hosts

+21
_sources/generated.json
···
},
"version": "a60247a8d92e1802298fc197034d0b7b54cd90b7"
},
"gomod2nix": {
"cargoLocks": null,
"date": "2025-10-09",
···
},
"version": "a60247a8d92e1802298fc197034d0b7b54cd90b7"
},
+
"disko": {
+
"cargoLocks": null,
+
"date": "2025-10-17",
+
"extract": null,
+
"name": "disko",
+
"passthru": null,
+
"pinned": false,
+
"src": {
+
"deepClone": false,
+
"fetchSubmodules": false,
+
"leaveDotGit": false,
+
"name": null,
+
"owner": "nix-community",
+
"repo": "disko",
+
"rev": "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5",
+
"sha256": "sha256-y7UhnWlER8r776JsySqsbTUh2Txf7K30smfHlqdaIQw=",
+
"sparseCheckout": [],
+
"type": "github"
+
},
+
"version": "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5"
+
},
"gomod2nix": {
"cargoLocks": null,
"date": "2025-10-09",
+12
_sources/generated.nix
···
};
date = "2025-09-15";
};
gomod2nix = {
pname = "gomod2nix";
version = "7f8d7438f5870eb167abaf2c39eea3d2302019d1";
···
};
date = "2025-09-15";
};
+
disko = {
+
pname = "disko";
+
version = "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5";
+
src = fetchFromGitHub {
+
owner = "nix-community";
+
repo = "disko";
+
rev = "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5";
+
fetchSubmodules = false;
+
sha256 = "sha256-y7UhnWlER8r776JsySqsbTUh2Txf7K30smfHlqdaIQw=";
+
};
+
date = "2025-10-17";
+
};
gomod2nix = {
pname = "gomod2nix";
version = "7f8d7438f5870eb167abaf2c39eea3d2302019d1";
+12 -2
deploy.nu
···
} else {
log error $content
}
-
http post --content-type application/json $"https://discord.com/api/webhooks/($env.WEBHOOK_ID)/($env.WEBHOOK_TOKEN)" $msg
}
def upload-paste []: any -> string {
···
type: "nixos",
user: "root",
addr: "23.88.101.188",
},
"dusk@devel.mobi": {
type: "home",
···
let result_link = readlink $result_dir
let target = $"($hostcfg.user)@($hostcfg.addr)"
-
let copy_cmd = {nix copy --to $"ssh://($target)" $result_link}
if (run_step "copy to" $copy_cmd) {
return
}
···
} else {
log error $content
}
+
# http post --content-type application/json $"https://discord.com/api/webhooks/($env.WEBHOOK_ID)/($env.WEBHOOK_TOKEN)" $msg
}
def upload-paste []: any -> string {
···
type: "nixos",
user: "root",
addr: "23.88.101.188",
+
},
+
dzwonek: {
+
type: "nixos",
+
user: "root",
+
addr: "94.237.26.47",
+
},
+
volsinii: {
+
type: "nixos",
+
user: "root",
+
addr: "199.71.188.53",
},
"dusk@devel.mobi": {
type: "home",
···
let result_link = readlink $result_dir
let target = $"($hostcfg.user)@($hostcfg.addr)"
+
let copy_cmd = {nix copy -s --to $"ssh://($target)" $result_link}
if (run_step "copy to" $copy_cmd) {
return
}
+3 -4
hosts/default.nix
···
inherit lib;
system = null;
modules = [
-
../modules
-
../locale
-
"${set.inputs.home}/nixos"
{ networking.hostName = name; }
{ nixpkgs.pkgs = set.pkgs; }
(import (./. + "/${name}/default.nix"))
···
# lungmen = "x86_64-linux";
# tkaronto = "x86_64-linux";
wolumonde = allPkgsSets.x86_64-linux;
-
wsl = allPkgsSets.x86_64-linux;
};
in
lib.mapAttrs mkSystem systems
···
inherit lib;
system = null;
modules = [
{ networking.hostName = name; }
{ nixpkgs.pkgs = set.pkgs; }
(import (./. + "/${name}/default.nix"))
···
# lungmen = "x86_64-linux";
# tkaronto = "x86_64-linux";
wolumonde = allPkgsSets.x86_64-linux;
+
# wsl = allPkgsSets.x86_64-linux;
+
dzwonek = allPkgsSets.x86_64-linux;
+
volsinii = allPkgsSets.x86_64-linux;
};
in
lib.mapAttrs mkSystem systems
+28
hosts/dzwonek/default.nix
···
···
+
{
+
inputs,
+
tlib,
+
pkgs,
+
modulesPath,
+
...
+
}:
+
{
+
imports = [
+
"${inputs.agenix}/modules/age.nix"
+
"${inputs.home}/nixos"
+
"${inputs.disko}/module.nix"
+
../../modules
+
../../users/root
+
./disk-config.nix
+
]
+
++ (tlib.importFolder (toString ./modules));
+
+
+
environment.systemPackages = [
+
pkgs.curl
+
pkgs.gitMinimal
+
];
+
+
networking.firewall.enable = true;
+
+
system.stateVersion = "25.05";
+
}
+54
hosts/dzwonek/disk-config.nix
···
···
+
{
+
disko.devices = {
+
disk = {
+
main = {
+
type = "disk";
+
device = "/dev/vda";
+
content = {
+
type = "gpt";
+
partitions = {
+
boot = {
+
priority = 1;
+
name = "boot";
+
size = "1M";
+
type = "EF02";
+
};
+
esp = {
+
priority = 2;
+
name = "ESP";
+
size = "256M";
+
type = "EF00";
+
content = {
+
type = "filesystem";
+
format = "vfat";
+
mountpoint = "/boot";
+
mountOptions = [ "umask=0077" ];
+
};
+
};
+
root = {
+
priority = 3;
+
end = "-2G";
+
content = {
+
type = "btrfs";
+
extraArgs = [ "-f" ]; # Override existing partition
+
mountpoint = "/";
+
mountOptions = [
+
"compress=zstd"
+
"noatime"
+
];
+
};
+
};
+
plainSwap = {
+
priority = 4;
+
size = "100%";
+
content = {
+
type = "swap";
+
discardPolicy = "both";
+
};
+
};
+
};
+
};
+
};
+
};
+
};
+
}
+23
hosts/dzwonek/modules/hardware-configuration.nix
···
···
+
# Do not modify this file! It was generated by ‘nixos-generate-config’
+
# and may be overwritten by future invocations. Please make changes
+
# to /etc/nixos/configuration.nix instead.
+
{ config, lib, pkgs, modulesPath, ... }:
+
+
{
+
imports =
+
[ (modulesPath + "/profiles/qemu-guest.nix")
+
];
+
+
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk" ];
+
boot.initrd.kernelModules = [ ];
+
boot.kernelModules = [ ];
+
boot.extraModulePackages = [ ];
+
+
boot.loader.grub = {
+
efiSupport = true;
+
efiInstallAsRemovable = true;
+
};
+
+
networking.useDHCP = lib.mkDefault true;
+
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
+
}
+11
hosts/dzwonek/modules/ssh.nix
···
···
+
{ inputs, ... }:
+
{
+
services.fail2ban.enable = true;
+
services.openssh = {
+
enable = true;
+
settings.PasswordAuthentication = false;
+
};
+
users.users.root.openssh.authorizedKeys.keys = [
+
(builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub")
+
];
+
}
+32
hosts/volsinii/default.nix
···
···
+
{
+
inputs,
+
tlib,
+
pkgs,
+
modulesPath,
+
...
+
}:
+
{
+
imports = [
+
"${inputs.agenix}/modules/age.nix"
+
"${inputs.home}/nixos"
+
"${inputs.disko}/module.nix"
+
../../modules
+
../../users/root
+
./disk-config.nix
+
]
+
++ (tlib.importFolder (toString ./modules));
+
+
boot.loader.grub = {
+
efiSupport = true;
+
efiInstallAsRemovable = true;
+
};
+
+
environment.systemPackages = [
+
pkgs.curl
+
pkgs.gitMinimal
+
];
+
+
networking.firewall.enable = true;
+
+
system.stateVersion = "25.05";
+
}
+54
hosts/volsinii/disk-config.nix
···
···
+
{
+
disko.devices = {
+
disk = {
+
main = {
+
type = "disk";
+
device = "/dev/xvda";
+
content = {
+
type = "gpt";
+
partitions = {
+
boot = {
+
priority = 1;
+
name = "boot";
+
size = "1M";
+
type = "EF02";
+
};
+
esp = {
+
priority = 2;
+
name = "ESP";
+
size = "500M";
+
type = "EF00";
+
content = {
+
type = "filesystem";
+
format = "vfat";
+
mountpoint = "/boot";
+
mountOptions = [ "umask=0077" ];
+
};
+
};
+
root = {
+
priority = 3;
+
end = "-8G";
+
content = {
+
type = "btrfs";
+
extraArgs = [ "-f" ]; # Override existing partition
+
mountpoint = "/";
+
mountOptions = [
+
"compress=zstd"
+
"noatime"
+
];
+
};
+
};
+
plainSwap = {
+
priority = 4;
+
size = "100%";
+
content = {
+
type = "swap";
+
discardPolicy = "both";
+
};
+
};
+
};
+
};
+
};
+
};
+
};
+
}
+26
hosts/volsinii/modules/hardware-configuration.nix
···
···
+
# Do not modify this file! It was generated by ‘nixos-generate-config’
+
# and may be overwritten by future invocations. Please make changes
+
# to /etc/nixos/configuration.nix instead.
+
{ config, lib, pkgs, modulesPath, ... }:
+
+
{
+
imports = [ ];
+
+
boot.initrd.availableKernelModules = [ "ata_piix" "sr_mod" "xen_blkfront" ];
+
boot.initrd.kernelModules = [ ];
+
boot.kernelModules = [ ];
+
boot.extraModulePackages = [ ];
+
+
networking.useDHCP = false;
+
+
systemd.network.enable = true;
+
systemd.network.wait-online.enable = false;
+
systemd.network.networks."enX0" = {
+
matchConfig = { Name = "enX0"; };
+
address = ["199.71.188.53/29"];
+
gateway = ["199.71.188.49"];
+
};
+
+
+
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
+
}
+11
hosts/volsinii/modules/ssh.nix
···
···
+
{ inputs, ... }:
+
{
+
services.fail2ban.enable = true;
+
services.openssh = {
+
enable = true;
+
settings.PasswordAuthentication = false;
+
};
+
users.users.root.openssh.authorizedKeys.keys = [
+
(builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub")
+
];
+
}
+3
hosts/wolumonde/default.nix
···
}:
{
imports = [
../../users/root
"${inputs.agenix}/modules/age.nix"
"${inputs.ncr}/firewall"
···
}:
{
imports = [
+
../../modules
+
../../locale
+
"${inputs.home}/nixos"
../../users/root
"${inputs.agenix}/modules/age.nix"
"${inputs.ncr}/firewall"
+3
hosts/wsl/default.nix
···
}:
{
imports = [
../../users/root
../../users/firewatch
"${inputs.nixos-wsl}/modules"
···
}:
{
imports = [
+
../../modules
+
../../locale
+
"${inputs.home}/nixos"
../../users/root
../../users/firewatch
"${inputs.nixos-wsl}/modules"
+2
modules/base/nix.nix
···
{
lib,
inputs,
...
}:
{
nix = {
registry = builtins.mapAttrs (_: v: { flake = v; }) (lib.filterAttrs (_: v: v ? outputs) inputs);
gc.automatic = false;
optimise.automatic = true;
···
{
+
pkgs,
lib,
inputs,
...
}:
{
nix = {
+
package = pkgs.lixPackageSets.git.lix;
registry = builtins.mapAttrs (_: v: { flake = v; }) (lib.filterAttrs (_: v: v ? outputs) inputs);
gc.automatic = false;
optimise.automatic = true;
+2
modules/nushell/prompt.nu
···
wolumonde: {start: "0x603F26", end: "0x6C4E31"},
chernobog: {start: "0xA94438", end: "0xD24545"},
"sd-148036": {start: "0x595CFF", end: "0xC6F8FF"},
}
let user_colors = {
kirara: {start: "0xFF407D", end: "0xEE99C2"},
···
wolumonde: {start: "0x603F26", end: "0x6C4E31"},
chernobog: {start: "0xA94438", end: "0xD24545"},
"sd-148036": {start: "0x595CFF", end: "0xC6F8FF"},
+
dzwonek: {start: "0x595CFF", end: "0xC6F8FF"},
+
volsinii: {start: "0x595CFF", end: "0xC6F8FF"},
}
let user_colors = {
kirara: {start: "0xFF407D", end: "0xEE99C2"},
+4
nvfetcher.toml
···
src.git = "https://github.com/nix-community/NixOS-WSL"
fetch.github = "nix-community/NixOS-WSL"
[home]
src.git = "https://github.com/nix-community/home-manager"
fetch.github = "nix-community/home-manager"
···
src.git = "https://github.com/nix-community/NixOS-WSL"
fetch.github = "nix-community/NixOS-WSL"
+
[disko]
+
src.git = "https://github.com/nix-community/disko"
+
fetch.github = "nix-community/disko"
+
[home]
src.git = "https://github.com/nix-community/home-manager"
fetch.github = "nix-community/home-manager"
+1
secrets/dzwonek.key.pub
···
···
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmAPY6Si6vf4bfi5r24XVDka7p/tcl4uHHuItFbf1vP
+1
secrets/volsinii.key.pub
···
···
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEKFdogRnTNHcIwtdQqdX5O+1nvMDCX2iFx7Gd3eFIF9