config-perso/hive.nix

129 lines
4 KiB
Nix
Raw Normal View History

2024-03-13 11:11:16 +01:00
let
mods = import ./modules;
users = import ./users;
in {
2024-03-12 17:26:16 +01:00
meta.nixpkgs = <nixpkgs>;
2024-03-13 11:11:16 +01:00
meta.specialArgs = {
inherit mods users;
};
2024-03-12 17:26:16 +01:00
defaults = { pkgs, ... }: {
2024-03-16 20:03:01 +01:00
imports = [ <home-manager/nixos> ];
2024-03-12 17:26:16 +01:00
boot.tmp.useTmpfs = true;
};
2024-03-18 20:26:22 +01:00
2024-03-12 17:26:16 +01:00
kat-probook = { name, nodes, ... }: {
2024-03-16 20:03:01 +01:00
deployment.allowLocalDeployment = true;
2024-03-12 17:26:16 +01:00
imports = [
./machines/kat-probook/configuration.nix
2024-03-13 11:11:16 +01:00
users.root
users.catvayor
2024-03-12 17:26:16 +01:00
];
networking.hostName = name;
};
2024-03-18 20:26:22 +01:00
2024-03-15 10:46:02 +01:00
kat-r86s = { name, nodes, ... }: {
2024-03-26 16:06:08 +01:00
deployment.targetHost = "r86s.kat";
2024-03-15 10:46:02 +01:00
imports = [
./machines/kat-r86s/configuration.nix
users.root
];
networking.hostName = name;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAA16foz+XzwKwyIR4wFgNIAE3Y7AfXyEsUZFVVz8Rie catvayor@katvayor"
];
};
2024-03-18 20:26:22 +01:00
kat-test = { name, nodes, ... }: {
deployment = {
allowLocalDeployment = true;
targetHost = "test.kat";
};
imports = [
./machines/kat-test/configuration.nix
users.root
users.catvayor
];
networking.hostName = name;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAA16foz+XzwKwyIR4wFgNIAE3Y7AfXyEsUZFVVz8Rie catvayor@katvayor"
];
2024-03-22 14:24:31 +01:00
home-manager.users.catvayor = {
imports = [ mods.home.mail ];
};
};
kat-virt = { name, nodes, ... }: {
deployment.targetHost = "virt.kat";
imports = [
./machines/kat-virt/configuration.nix
users.root
];
networking.hostName = name;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAA16foz+XzwKwyIR4wFgNIAE3Y7AfXyEsUZFVVz8Rie catvayor@katvayor"
2024-03-27 17:35:34 +01:00
"ssh-rsa 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 sylvain@idefix"
2024-03-22 14:24:31 +01:00
];
2024-03-18 20:26:22 +01:00
};
2024-03-22 14:24:31 +01:00
2024-03-18 20:26:22 +01:00
kat-iso = { name, pkgs, ... }:{
2024-03-16 20:03:01 +01:00
deployment = {
allowLocalDeployment = false;
targetHost = null;
};
imports = [
<nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel-no-zfs.nix>
users.root
];
networking = {
hostName = name;
networkmanager.enable = true;
wireless.enable = false;
};
console.keyMap = "fr";
2024-03-18 20:26:22 +01:00
environment.systemPackages = with pkgs; [ perl git ];
2024-03-16 20:03:01 +01:00
boot.supportedFilesystems = [ "bcachefs" ];
programs.zsh.enable = true;
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAA16foz+XzwKwyIR4wFgNIAE3Y7AfXyEsUZFVVz8Rie catvayor@katvayor"
];
2024-03-18 20:26:22 +01:00
environment.etc = {
"config_base.nix" = {
mode = "0444";
text = ''
{ config, lib, pkgs, ... }: {
imports = [ ./hardware-configuration.nix ];
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
boot.supportedFilesystems = [ "bcachefs" ];
boot.kernelPackages = pkgs.linuxPackages_latest;
# networking.networkmanager.enable = true;
networking.hostName = "kat-undefined";
time.timeZone = "Europe/Paris";
i18n.defaultLocale = "en_US.UTF-8";
console = {
font = "Lat2-Terminus16";
keyMap = "fr";
};
services.netbird.enable = true;
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAA16foz+XzwKwyIR4wFgNIAE3Y7AfXyEsUZFVVz8Rie catvayor@katvayor"
];
system.stateVersion = "23.11";
}
'';
};
};
2024-03-16 20:03:01 +01:00
};
2024-03-12 17:26:16 +01:00
}