Compare commits

..

5 commits

Author SHA1 Message Date
0d62f52cd5 nixos/razer: move module replacement to module-overrides.nix 2025-04-07 13:25:03 +02:00
8ceac3ce88 nixos/module-overrides: use modulesPath for luksroot override 2025-04-07 13:22:10 +02:00
27b241adff treewide: restructure modules
make every module contain config attribute
and if module doesn't use module arguments,
don't make it a function
2025-04-07 12:54:34 +02:00
4dab0aff15 treewide: standardize comments referencing nixpkgs pr 2025-04-07 12:41:16 +02:00
5b16eb9aba nixos/nix: use remote sudo by default for nixos-rebuild 2025-04-07 12:36:26 +02:00
12 changed files with 513 additions and 496 deletions

View file

@ -4,6 +4,7 @@
imports = [ imports = [
./unstable-packages.nix ./unstable-packages.nix
]; ];
config = {
users.users.wroclaw = { users.users.wroclaw = {
isNormalUser = true; isNormalUser = true;
description = "Rafał"; description = "Rafał";
@ -44,4 +45,5 @@
dataDir = "/home/wroclaw"; dataDir = "/home/wroclaw";
configDir = "/home/wroclaw/.config/syncthing"; configDir = "/home/wroclaw/.config/syncthing";
}; };
};
} }

View file

@ -10,6 +10,7 @@
./module-overrides.nix ./module-overrides.nix
./nix.nix ./nix.nix
]; ];
config = {
# kernel # kernel
boot.kernelPackages = pkgs.linuxPackages_latest; boot.kernelPackages = pkgs.linuxPackages_latest;
@ -84,4 +85,5 @@
8022 8022
]; ];
}; };
};
} }

View file

@ -1,7 +1,8 @@
{ lib, config, pkgs, ... }: { lib, config, pkgs, ... }:
{ {
config.virtualisation.docker = { config = {
virtualisation.docker = {
enable = true; enable = true;
enableOnBoot = true; enableOnBoot = true;
storageDriver = if config.fileSystems."/".fsType == "btrfs" then "btrfs" else null; storageDriver = if config.fileSystems."/".fsType == "btrfs" then "btrfs" else null;
@ -14,26 +15,27 @@
bip = "10.127.0.1/16"; bip = "10.127.0.1/16";
}; };
}; };
config.users.users.indocker = { users.users.indocker = {
isSystemUser = true; isSystemUser = true;
hashedPassword = "!"; hashedPassword = "!";
uid = 900; uid = 900;
group = "indocker"; group = "indocker";
}; };
config.users.groups.indocker = { users.groups.indocker = {
gid = 900; gid = 900;
}; };
config.environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
docker-compose docker-compose
]; ];
# Docker enables firewall anyway, let's enable the firewall for it if it's disabled # Docker enables firewall anyway, let's enable the firewall for it if it's disabled
# TODO: Apply only when config.networking.firewall is false # TODO: Apply only when config.networking.firewall is false
config.networking.firewall = { networking.firewall = {
enable = lib.mkOverride 90 true; enable = lib.mkOverride 90 true;
allowedTCPPorts = lib.mkOverride 90 []; allowedTCPPorts = lib.mkOverride 90 [];
allowedUDPPorts = lib.mkOverride 90 []; allowedUDPPorts = lib.mkOverride 90 [];
allowedTCPPortRanges = lib.mkOverride 90 [{ from = 0; to = 65535;}]; allowedTCPPortRanges = lib.mkOverride 90 [{ from = 0; to = 65535;}];
allowedUDPPortRanges = lib.mkOverride 90 [{ from = 0; to = 65535;}]; allowedUDPPortRanges = lib.mkOverride 90 [{ from = 0; to = 65535;}];
}; };
};
} }

View file

@ -1,5 +1,3 @@
{ ... }:
{ {
config = { config = {
# Set your time zone. # Set your time zone.

View file

@ -1,17 +1,33 @@
{ lib, ... }: {
lib,
modulesPath,
...
}:
let let
moduleOverrides = [ moduleOverrides = [
# TODO: Remove after updating to nixos 25.05 # NIXPKGS-PR: 359882
{ {
# https://github.com/NixOS/nixpkgs/pull/359882
disabledModules = [ disabledModules = [
"system/boot/luksroot.nix" "${modulesPath}/system/boot/luksroot.nix"
]; ];
replacementModules = [(builtins.fetchurl { replacementModules = [(builtins.fetchurl {
url = "https://raw.githubusercontent.com/amozeo/nixpkgs/728d5806fe6f975ba3843297332d12e13119fe86/nixos/modules/system/boot/luksroot.nix"; url = "https://raw.githubusercontent.com/amozeo/nixpkgs/728d5806fe6f975ba3843297332d12e13119fe86/nixos/modules/system/boot/luksroot.nix";
sha256 = "0s2k8k6rrlwn2zb02q6fkvswln8w4hvh02hm4krqvkh46amyasyy"; sha256 = "0s2k8k6rrlwn2zb02q6fkvswln8w4hvh02hm4krqvkh46amyasyy";
})]; })];
} }
# NIXPKGS-PR: 394300
{
disabledModules = [
"${modulesPath}/hardware/openrazer.nix"
];
replacementModules = [
(builtins.fetchurl {
url = "https://raw.githubusercontent.com/NixOS/nixpkgs/4a11562c20fbe7af7d5ac139dbf0f8d50ce276f6/nixos/modules/hardware/openrazer.nix";
sha256 = "0n6kzrcwlmxgws4pmffyqagp2rxpfxmfjl11vgvlkjcbglg6fs7y";
})
];
}
]; ];
toModule = entry: { toModule = entry: {

View file

@ -28,8 +28,7 @@ let
}; };
}; };
# nixpkgs PR389487 # NIXPKGS-PR: 389487
# https://github.com/NixOS/nixpkgs/pull/389487
futureNixosExecutables = let futureNixosExecutables = let
nixpkgs = builtins.fetchTarball { nixpkgs = builtins.fetchTarball {
url = "https://github.com/NixOS/nixpkgs/archive/e8f4dba5135ce202c7ef77118f145ef8b3803088.tar.gz"; url = "https://github.com/NixOS/nixpkgs/archive/e8f4dba5135ce202c7ef77118f145ef8b3803088.tar.gz";
@ -46,7 +45,8 @@ let
postBuild = '' postBuild = ''
wrapProgram $out/bin/nixos-rebuild \ wrapProgram $out/bin/nixos-rebuild \
--add-flags "--log-format" \ --add-flags "--log-format" \
--add-flags "bar" --add-flags "bar" \
--add-flags "--use-remote-sudo"
''; '';
}; };
in { in {

View file

@ -1,6 +1,7 @@
{ config, lib, pkgs, ...}: { config, lib, pkgs, ...}:
{ {
config = {
hardware.graphics = { hardware.graphics = {
enable = true; enable = true;
enable32Bit = true; enable32Bit = true;
@ -25,4 +26,5 @@
}; };
}; };
nixpkgs.config.nvidia.acceptLicense = true; nixpkgs.config.nvidia.acceptLicense = true;
};
} }

View file

@ -1,6 +1,5 @@
{ ... }:
{ {
config = {
security.polkit.extraConfig = '' security.polkit.extraConfig = ''
polkit.addRule(function(action, subject) { polkit.addRule(function(action, subject) {
polkit.log("action=" + action); polkit.log("action=" + action);
@ -41,4 +40,5 @@
}; };
}); });
''; '';
};
} }

View file

@ -1,23 +1,12 @@
{ {
config, config,
lib, lib,
modulesPath,
pkgs, pkgs,
... ...
}: }:
{ {
# NIXPKGS-PR: 394300 config = {
disabledModules = [
"${modulesPath}/hardware/openrazer.nix"
];
imports = [
(builtins.fetchurl {
url = "https://raw.githubusercontent.com/NixOS/nixpkgs/4a11562c20fbe7af7d5ac139dbf0f8d50ce276f6/nixos/modules/hardware/openrazer.nix";
sha256 = "0n6kzrcwlmxgws4pmffyqagp2rxpfxmfjl11vgvlkjcbglg6fs7y";
})
];
hardware.openrazer = { hardware.openrazer = {
enable = true; enable = true;
users = [ users = [
@ -43,4 +32,5 @@
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
polychromatic polychromatic
]; ];
};
} }

View file

@ -25,6 +25,8 @@ in
imports = [ imports = [
./unstable-packages.nix ./unstable-packages.nix
]; ];
config = {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
aliasDrag aliasDrag
rangerGit rangerGit
@ -158,4 +160,5 @@ in
}; };
}; };
}; };
};
} }

View file

@ -2,6 +2,7 @@
{ lib, config, pkgs, ... }: { lib, config, pkgs, ... }:
{ {
config = {
#virtualisation.waydroid.enable = true; #virtualisation.waydroid.enable = true;
programs.virt-manager.enable = true; programs.virt-manager.enable = true;
virtualisation.libvirtd = { virtualisation.libvirtd = {
@ -13,4 +14,5 @@
]; ];
}; };
}; };
};
} }

View file

@ -1,6 +1,5 @@
{ ... }:
{ {
config = {
xdg.mime.enable = true; xdg.mime.enable = true;
xdg.mime.defaultApplications = { xdg.mime.defaultApplications = {
# Browser # Browser
@ -134,4 +133,5 @@
"image/xbm" = "qimgv.desktop"; "image/xbm" = "qimgv.desktop";
"image/xpm" = "qimgv.desktop"; "image/xpm" = "qimgv.desktop";
}; };
};
} }