ammending the previous with un added files
This commit is contained in:
parent
7404966c92
commit
d0f4af1214
10 changed files with 330 additions and 6 deletions
38
modules/desktop/gui/gnome.nix
Normal file
38
modules/desktop/gui/gnome.nix
Normal file
|
|
@ -0,0 +1,38 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
# Gnome extensions
|
||||
environment.systemPackages = with pkgs; [
|
||||
gnomeExtensions.dock-from-dash
|
||||
gnomeExtensions.pop-shell
|
||||
];
|
||||
services = {
|
||||
gnome = {
|
||||
core-utilities.enable = false;
|
||||
gnome-keyring.enable = true;
|
||||
};
|
||||
|
||||
xserver = {
|
||||
enable = true;
|
||||
layout = "us";
|
||||
xkbVariant = "";
|
||||
displayManager = {
|
||||
gdm = {
|
||||
enable = true;
|
||||
wayland = true;
|
||||
};
|
||||
defaultSession = lib.mkDefault "gnome";
|
||||
};
|
||||
desktopManager = {
|
||||
xterm.enable = lib.mkForce false;
|
||||
gnome.enable = lib.mkDefault true;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
programs = {
|
||||
xwayland.enable = lib.mkDefault true;
|
||||
};
|
||||
|
||||
xdg.portal = { enable = lib.mkDefault true; };
|
||||
|
||||
}
|
||||
6
modules/desktop/gui/wayfire.nix
Normal file
6
modules/desktop/gui/wayfire.nix
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
environment.systemPackages = with pkgs; [
|
||||
inputs.nixpkgs-wayland.packages.${system}.wayfire-unstable
|
||||
];
|
||||
}
|
||||
83
modules/disko/luks-lvm.nix
Normal file
83
modules/disko/luks-lvm.nix
Normal file
|
|
@ -0,0 +1,83 @@
|
|||
{ disks ? [ "/dev/nvme0n1" ], ... }: {
|
||||
disk = {
|
||||
disk-0 = {
|
||||
type = "disk";
|
||||
device = builtins.elemAt disks 0;
|
||||
content = {
|
||||
type = "table";
|
||||
format = "gpt";
|
||||
partitions = [
|
||||
{
|
||||
type = "partition";
|
||||
name = "ESP";
|
||||
start = "1MiB";
|
||||
end = "2g";
|
||||
bootable = true;
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "vfat";
|
||||
mountpoint = "/boot";
|
||||
mountOptions = [
|
||||
"defaults"
|
||||
];
|
||||
};
|
||||
}
|
||||
{
|
||||
name = "swap";
|
||||
type = "partition";
|
||||
start = "2G";
|
||||
end = "40G";
|
||||
part-type = "primary";
|
||||
content = {
|
||||
type = "swap";
|
||||
randomEncryption = true;
|
||||
};
|
||||
}
|
||||
{
|
||||
type = "partition";
|
||||
name = "luks";
|
||||
start = "40G";
|
||||
end = "100%";
|
||||
content = {
|
||||
type = "luks";
|
||||
name = "crypted";
|
||||
extraOpenArgs = [ "--allow-discards" ];
|
||||
content = {
|
||||
type = "lvm_pv";
|
||||
vg = "pool";
|
||||
};
|
||||
};
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
lvm_vg = {
|
||||
pool = {
|
||||
type = "lvm_vg";
|
||||
lvs = {
|
||||
root = {
|
||||
type = "lvm_lv";
|
||||
size = "128G";
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "ext4";
|
||||
mountpoint = "/";
|
||||
mountOptions = [
|
||||
"defaults"
|
||||
];
|
||||
};
|
||||
};
|
||||
home = {
|
||||
type = "lvm_lv";
|
||||
size = "25G";
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "ext4";
|
||||
mountpoint = "/home";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
11
modules/services/docker.nix
Normal file
11
modules/services/docker.nix
Normal file
|
|
@ -0,0 +1,11 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
virtualisation.docker = {
|
||||
enable = true;
|
||||
liveRestore = false;
|
||||
autoPrune.enable = true;
|
||||
};
|
||||
|
||||
# But allow docker containers to access the local machine
|
||||
networking.firewall.trustedInterfaces = [ "docker0" ];
|
||||
}
|
||||
19
modules/services/openssh.nix
Normal file
19
modules/services/openssh.nix
Normal file
|
|
@ -0,0 +1,19 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
services.openssh = lib.mkDefault {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
#settings = lib.mkDefault {
|
||||
passwordAuthentication = false;
|
||||
permitRootLogin = "no";
|
||||
kbdInteractiveAuthentication = false;
|
||||
#};
|
||||
startWhenNeeded = true;
|
||||
kexAlgorithms = [ "curve25519-sha256@libssh.org" ];
|
||||
};
|
||||
security.pam = lib.mkDefault {
|
||||
enableSSHAgentAuth = true;
|
||||
services.sudo.sshAgentAuth = true;
|
||||
};
|
||||
}
|
||||
17
modules/services/pipewire.nix
Normal file
17
modules/services/pipewire.nix
Normal file
|
|
@ -0,0 +1,17 @@
|
|||
# https://nixos.wiki/wiki/PipeWire
|
||||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
# Remove sound.enable or turn it off if you had it set previously, it seems to cause conflicts with pipewire
|
||||
#sound.enable = false;
|
||||
# rtkit is optional but recommended
|
||||
security.rtkit.enable = true;
|
||||
services.pipewire = {
|
||||
enable = true;
|
||||
alsa = {
|
||||
enable = true;
|
||||
support32Bit = true;
|
||||
};
|
||||
pulse.enable = true;
|
||||
jack.enable = true;
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue