chore: removed other users and systems

This commit is contained in:
Nick 2025-06-26 02:15:04 -05:00
parent 2b4ad99e25
commit 233cab07dd
135 changed files with 216 additions and 2462 deletions

View file

@ -1,44 +0,0 @@
{
pkgs,
config,
...
}:
{
boot = {
extraModulePackages = [
config.boot.kernelPackages.v4l2loopback.out
];
supportedFilesystems = [
"ntfs"
];
initrd = {
network.openvpn.enable = true;
availableKernelModules = [
"nvme"
"ahci"
"xhci_pci"
"usb_storage"
"usbhid"
"sd_mod"
];
kernelModules = [
];
};
kernelModules = [
"kvm-amd"
"vfio-pci"
"v4l2loopback"
];
kernelPackages = pkgs.linuxPackages_latest;
loader = {
efi = {
canTouchEfiVariables = true;
efiSysMountPoint = "/boot";
};
systemd-boot.enable = true;
};
};
}

View file

@ -1,30 +0,0 @@
{
flake,
config,
...
}:
let
inherit (flake.config.people) user1;
inherit (flake.config.machines.devices) charon;
in
{
fileSystems = {
"/" = {
device = "/dev/disk/by-uuid/0457d426-f166-4f35-b77b-93321dca2581";
fsType = "ext4";
};
"/boot" = {
device = "/dev/disk/by-uuid/1703-D452";
fsType = "vfat";
options = charon.boot.options;
};
};
swapDevices = [
{ device = "/dev/disk/by-uuid/bedf4922-fa86-403a-846c-7d900dfb9086"; }
];
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user1}.home.homeDirectory} 0755 ${user1} users -"
];
}

View file

@ -1,12 +0,0 @@
{
hardware = {
graphics = {
enable = true;
extraPackages = [ ];
extraPackages32 = [ ];
};
};
boot.initrd.kernelModules = [
];
services.xserver.videoDrivers = [ "modesetting" ];
}

View file

@ -1,17 +0,0 @@
{
config,
lib,
pkgs,
...
}:
{
hardware = {
firmware = builtins.attrValues {
inherit (pkgs)
rtl8761b-firmware
;
};
enableAllFirmware = true;
cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
};
}

View file

@ -1,35 +0,0 @@
{
lib,
flake,
...
}:
let
inherit (flake.config.machines.devices)
charon
;
in
{
networking = {
hostName = charon.name;
networkmanager.enable = true;
nftables.enable = true;
useDHCP = lib.mkDefault true;
firewall = {
enable = true;
allowedTCPPorts = [
];
};
};
services = {
avahi = {
enable = true;
openFirewall = true;
nssmdns4 = true;
};
sshd.enable = true;
openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
};
}

View file

@ -1,17 +0,0 @@
{ lib, ... }:
let
configPath = ./config;
desktopImports =
let
files = builtins.attrNames (builtins.readDir configPath);
in
map (name: configPath + "/${name}") (
builtins.filter (name: builtins.match ".*\\.nix$" name != null) files
);
in
{
imports = desktopImports;
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
system.stateVersion = lib.mkForce "24.05";
}

View file

@ -6,7 +6,6 @@
let
inherit (flake.config.people)
user0
user1
;
inherit (flake.config.machines.devices)
deimos
@ -14,7 +13,6 @@ let
ceres
;
inherit (flake.config.services.instances)
samba
jellyfin
audiobookshelf
;
@ -100,7 +98,6 @@ in
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user0}.home.homeDirectory} 0755 ${user0} users -"
"Z ${config.home-manager.users.${user1}.home.homeDirectory} 0755 ${user1} users -"
];
services.udisks2.enable = true;

View file

@ -1,9 +1,5 @@
{ flake, ... }:
let
inherit (flake.config.people)
user1
;
in
{
sops = {
secrets = {
@ -17,11 +13,6 @@ in
owner = "root";
mode = "600";
};
"network/${user1}" = {
path = "/var/lib/secrets/${user1}";
owner = "root";
mode = "600";
};
};
};
}

View file

@ -4,9 +4,9 @@
...
}:
let
inherit (flake.config.people) user0 user1 user3;
inherit (flake.config.people) user0 user1;
inherit (flake.config.machines.devices) mars ceres synology;
inherit (flake.config.services.instances) samba jellyfin audiobookshelf;
inherit (flake.config.services.instances) jellyfin audiobookshelf;
synologySecrets = config.sops.secrets."network/synology".path;
ceresSecrets = config.sops.secrets."network/server".path;
in
@ -16,8 +16,6 @@ in
synologyDrives = [
"folder0"
"folder1"
"folder2"
"folder3"
];
storageDrives = [
@ -89,7 +87,6 @@ in
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user0}.home.homeDirectory} 0755 ${user0} users -"
"Z ${config.home-manager.users.${user1}.home.homeDirectory} 0755 ${user1} users -"
"Z ${config.home-manager.users.${user3}.home.homeDirectory} 0755 ${user3} users -"
"Z ${mars.storage0.mount} 0755 ${user0} users -"
"Z ${mars.storage1.mount} 0755 ${user0} users -"
];

View file

@ -6,7 +6,6 @@
let
inherit (flake.config.people)
user0
user1
;
inherit (flake.config.machines.devices)
phobos
@ -31,7 +30,6 @@ in
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user0}.home.homeDirectory} 0755 ${user0} users -"
"Z ${config.home-manager.users.${user1}.home.homeDirectory} 0755 ${user1} users -"
];
services.udisks2.enable = true;

View file

@ -1,47 +0,0 @@
{
pkgs,
config,
...
}:
{
boot = {
extraModulePackages = [
config.boot.kernelPackages.v4l2loopback.out
];
supportedFilesystems = [ "ntfs" ];
initrd = {
availableKernelModules = [
"amdgpu"
"nvme"
"ahci"
"xhci_pci"
"usb_storage"
"usbhid"
"sd_mod"
];
kernelModules = [ ];
};
kernelModules = [
"kvm-amd"
"vfio-pci"
"v4l2loopback"
];
kernelPackages = pkgs.linuxPackages_latest;
loader = {
efi = {
canTouchEfiVariables = true;
efiSysMountPoint = "/boot";
};
systemd-boot.enable = false;
grub = {
enable = true;
device = "nodev";
useOSProber = true;
efiSupport = true;
};
};
};
}

View file

@ -1,53 +0,0 @@
{
config,
flake,
...
}:
let
inherit (flake.config.people) user2;
inherit (flake.config.machines.devices) venus;
in
{
imports = [ ];
fileSystems =
let
storageDrives = [
"storage0"
"storage1"
];
storageMounts = storage: {
name = "${venus.${storage}.mount}";
value = {
device = venus.${storage}.device;
fsType = "ext4";
options = venus.${storage}.options;
};
};
in
{
"/" = {
device = "/dev/disk/by-uuid/d02cb367-26e0-4708-8840-75dcc4362ff4";
fsType = "ext4";
};
"/boot" = {
device = "/dev/disk/by-uuid/22BD-5A25";
fsType = "vfat";
options = venus.boot.options;
};
}
// (builtins.listToAttrs (map storageMounts storageDrives));
swapDevices = [
{ device = "/dev/disk/by-uuid/cc7ab213-26c9-4567-91ca-9dba6e98c9d1"; }
];
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user2}.home.homeDirectory} 0755 ${user2} users -"
"Z ${venus.storage0.mount} 0755 ${user2} users -"
"Z ${venus.storage1.mount} 0755 ${user2} users -"
];
services.udisks2.enable = true;
}

View file

@ -1,24 +0,0 @@
{ pkgs, ... }:
{
hardware = {
graphics = {
enable = true;
extraPackages = builtins.attrValues {
inherit (pkgs)
amdvlk
;
inherit (pkgs.rocmPackages.clr)
icd
;
};
extraPackages32 = builtins.attrValues {
inherit (pkgs.driversi686Linux)
amdvlk
;
};
};
};
boot.initrd.kernelModules = [
"amdgpu"
];
}

View file

@ -1,13 +0,0 @@
{
config,
lib,
pkgs,
...
}:
{
hardware = {
firmware = [ pkgs.rtl8761b-firmware ];
enableAllFirmware = true;
cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
};
}

View file

@ -1,31 +0,0 @@
{
lib,
flake,
...
}:
let
inherit (flake.config.machines.devices) venus;
in
{
networking = {
hostName = venus.name;
networkmanager.enable = true;
useDHCP = lib.mkDefault true;
firewall = {
enable = true;
allowedTCPPorts = [ ];
};
};
services = {
avahi = {
enable = true;
openFirewall = true;
nssmdns4 = true;
};
sshd.enable = true;
openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
};
}

View file

@ -1,20 +0,0 @@
{
lib,
...
}:
let
configPath = ./config;
venusImports =
let
files = builtins.attrNames (builtins.readDir configPath);
in
map (name: configPath + "/${name}") (
builtins.filter (name: builtins.match ".*\\.nix$" name != null) files
);
in
{
imports = venusImports;
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
system.stateVersion = lib.mkForce "24.05";
}