about summary refs log tree commit diff
path: root/hosts/aptos/default.nix (follow)
Commit message (Collapse)AuthorAgeFilesLines
* profiles: clean up the importsFranck Cuny2023-05-081-0/+2
| | | | The hosts should be explicit about what to import.
* profiles/workstation: move sway to the workstation profileFranck Cuny2023-05-061-3/+0
|
* profiles: move things around for btrfsFranck Cuny2023-05-021-1/+0
|
* profiles/hardware: create a few profiles related to hardwareFranck Cuny2023-05-021-0/+1
|
* profiles/workstation: add font configurationsFranck Cuny2023-05-021-3/+0
|
* profiles/workstation: consolidate sound related configurationsFranck Cuny2023-05-021-1/+0
|
* profiles/workstation: moved more things aroundFranck Cuny2023-05-011-3/+0
|
* profiles/laptop: consolidate services related to laptopFranck Cuny2023-05-011-0/+1
|
* profiles/workstation: reduce the number of moving partsFranck Cuny2023-05-011-13/+8
| | | | | | | | There's too many moving parts and layers of abstractions, for no benefits: I only have to manage 3-4 machines. Going to create profiles, move things there, and stop with the `enable` pattern.
* fix(hosts): the WM manager needs to be in home.nixFranck Cuny2022-09-231-2/+1
|
* ref(home-manager): don't use home-manager when building the hostFranck Cuny2022-09-221-8/+1
| | | | | | | | | | | | | | | | | | | When rebuilding the host (through `nixos-rebuild switch --flake`) I don't want to rebuild also my home-manager configuration. I want these to be two different steps. I rebuild the home-manager configuration more frequently and it's a waste of time and CPU to rebuild the world every time. This is a pretty large refactoring: - move checks back into the flake: if I modify a check, the configuration for `pre-commits` is not regenerated, as the file with the checks is not monitored with `direnv` (I could probably configure it for it, but not now) - remove `home.nix` from the host level configuration - introduce a `mkHomeManagerConfiguration` function to manage the different user@host - fix a warning with the rust overlay
* fix(new-lines): add or remove new lines where neededFranck Cuny2022-07-021-1/+0
| | | | | | | | | | | The pre-commit hook for new lines reported and correct a number of issues, so let's commit them now and after that we ca enable the hook for the repository. Change-Id: I5bb882d3c2cca870ef94301303f029acfb308740 Reviewed-on: https://cl.fcuny.net/c/world/+/592 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
* fix(fmt): correct formatting for all nix filesFranck Cuny2022-06-101-1/+2
| | | | | | | | | This was done by running `nixpkgs-fmt .'. Change-Id: I4ea6c1e759bf468d08074be2111cbc7af72df295 Reviewed-on: https://cl.fcuny.net/c/world/+/404 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
* ref(profiles): get rid of all the profilesFranck Cuny2022-06-091-1/+7
| | | | | | | | | | | | | | All the modules that are setup by the profiles are now managed at the host level. This simplify some configuration, and will make it easier to adjust things at the host instead of trying to squeeze everything into profiles. This will also help the refactoring later, when I'll split nixos and home-manager configuration. Change-Id: I17ffda8b0b5d15bf1915c6fae5030380523d74b5 Reviewed-on: https://cl.fcuny.net/c/world/+/297 Reviewed-by: Franck Cuny <franck@fcuny.net>
* ref(GTK): remove the profile for GTKFranck Cuny2022-06-091-0/+3
| | | | | | | | All the configuration is done at the host level. Change-Id: Ib5ef71ea7955f6872fb08f576e48b24a70600693 Reviewed-on: https://cl.fcuny.net/c/world/+/296 Reviewed-by: Franck Cuny <franck@fcuny.net>
* backups: do backups for the laptopFranck Cuny2022-04-241-0/+1
| | | | | | | | | | | | | From the laptop I only backup /home/fcuny, as the rest should be straightforward to rebuild with nix. I run that backup as my own user, since I need my ssh key to use the remote repository (which is on the NAS). I also need a new secret for it (I might have been able to use `pass' for this, but well, that's easy enough). For the NAS, I update the list of directories to backup to include home, this will be on the systems backup.
* hosts: rename hardware-configuration to hardwareFranck Cuny2022-04-081-1/+1
|
* aptos: consume the new profilesFranck Cuny2022-04-081-3/+2
| | | | aptos is now using the new home-manager setup.
* refactor boot configuration to a moduleFranck Cuny2022-04-061-2/+0
| | | | | | | | | We don't need the previous `hosts/common/system` configs anymore, as everything has been moved out. We keep some boot configuration for carmel in the host configuration for now, but I need to check why I don't have similar settings for tahoe (since I also need to unlock the host remotely).
* refactor intel related configurationFranck Cuny2022-04-051-1/+0
|
* create a profile for laptopFranck Cuny2022-04-051-1/+1
|
* network: move tailscale in modulesFranck Cuny2022-04-051-20/+1
| | | | Move the networking configuration for the hosts to its own file.
* sound: add a new moduleFranck Cuny2022-04-051-0/+1
| | | | | | | | | | This is the start of yet another refactoring of the configuration. Sound configuration is moving to a module, and we enable it as needed at the host level. It takes care of configuring pipewire and install the packages needed too. This module is applied to the laptop and the desktop.
* containers: enable dockerd and containerd on aptosFranck Cuny2022-03-121-0/+11
|
* tailscale: add tailscale to the laptop (aptos)Franck Cuny2022-03-051-0/+1
|
* aptos: nixfmtFranck Cuny2022-03-041-17/+10
|
* wireguard: drop configuration for aptosFranck Cuny2022-03-021-7/+0
| | | | This is done in the module itself.
* aptos: use the hardware module for xps9300Franck Cuny2022-02-271-0/+1
|
* agenix: store wireguard key in persistent storageFranck Cuny2022-02-241-0/+7
| | | | | | The key was created under /run/agenix, which is wiped out after a reboot. The key being absent prevents the wireguard interface to come up. Store the key somewhere persistent to prevent this to happen.
* wireguard: module and peers configurationsFranck Cuny2022-02-211-0/+1
| | | | | | | | | Add a new module to automatically configure the peers for wireguard. The module needs a configuration file (in `configs/wireguard.toml`) which lists all the peers, their IP and and their public keys. The secret keys is encrypted as a secret with agenix. There's some initial documentation on how to use this setup.
* aptos: switch to iwd and enable thermaldFranck Cuny2022-02-211-3/+5
| | | | | | | Replace wpa_supplicant with iwd (I prefer that daemon and the associated tool, iwctl). Enable thermald for managing power.
* hosts: add aptosFranck Cuny2022-02-211-0/+44
aptos is my laptop (dell xps 13'). This adds the initial configuration for it.