Compare commits
6 Commits
987919417d
...
90a3549237
Author | SHA1 | Date | |
---|---|---|---|
90a3549237 | |||
63f2a82ad1 | |||
0cc39bfbe0 | |||
ec54b27d67 | |||
bba4f27465 | |||
b5c77611d7 |
@ -50,6 +50,7 @@ in
|
|||||||
micro
|
micro
|
||||||
helix
|
helix
|
||||||
lm_sensors
|
lm_sensors
|
||||||
|
picocom
|
||||||
];
|
];
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
@ -50,6 +50,7 @@ in {
|
|||||||
arduino
|
arduino
|
||||||
yt-dlp
|
yt-dlp
|
||||||
jellyfin-media-player
|
jellyfin-media-player
|
||||||
|
config.inputs.deploy-rs.packages.${config.currentSystem}.deploy-rs
|
||||||
];
|
];
|
||||||
|
|
||||||
# Networking
|
# Networking
|
||||||
|
@ -1,34 +1,24 @@
|
|||||||
{ config, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
# Improvements to the default shell
|
# Improvements to the default shell
|
||||||
# - use nix-locate for command-not-found
|
# - use nix-index for command-not-found
|
||||||
# - disable fish's annoying greeting message
|
# - disable fish's annoying greeting message
|
||||||
# - add some handy shell commands
|
# - add some handy shell commands
|
||||||
|
|
||||||
let
|
{
|
||||||
nix-locate = config.inputs.nix-locate.packages.${config.currentSystem}.default;
|
environment.systemPackages = with pkgs; [
|
||||||
in {
|
comma
|
||||||
programs.command-not-found.enable = false;
|
|
||||||
|
|
||||||
environment.systemPackages = [
|
|
||||||
nix-locate
|
|
||||||
];
|
];
|
||||||
|
|
||||||
|
# nix-index
|
||||||
|
programs.nix-index.enable = true;
|
||||||
|
programs.nix-index.enableFishIntegration = true;
|
||||||
|
programs.command-not-found.enable = false;
|
||||||
|
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
shellInit = let
|
shellInit = ''
|
||||||
wrapper = pkgs.writeScript "command-not-found" ''
|
|
||||||
#!${pkgs.bash}/bin/bash
|
|
||||||
source ${nix-locate}/etc/profile.d/command-not-found.sh
|
|
||||||
command_not_found_handle "$@"
|
|
||||||
'';
|
|
||||||
in ''
|
|
||||||
# use nix-locate for command-not-found functionality
|
|
||||||
function __fish_command_not_found_handler --on-event fish_command_not_found
|
|
||||||
${wrapper} $argv
|
|
||||||
end
|
|
||||||
|
|
||||||
# disable annoying fish shell greeting
|
# disable annoying fish shell greeting
|
||||||
set fish_greeting
|
set fish_greeting
|
||||||
'';
|
'';
|
||||||
@ -43,4 +33,18 @@ in {
|
|||||||
io_rand_read = "nix run nixpkgs#fio -- --name TEST --eta-newline=5s --filename=temp.file --rw=randread --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=32 --runtime=60 --group_reporting; rm temp.file";
|
io_rand_read = "nix run nixpkgs#fio -- --name TEST --eta-newline=5s --filename=temp.file --rw=randread --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=32 --runtime=60 --group_reporting; rm temp.file";
|
||||||
io_rand_write = "nix run nixpkgs#fio -- --name TEST --eta-newline=5s --filename=temp.file --rw=randrw --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
io_rand_write = "nix run nixpkgs#fio -- --name TEST --eta-newline=5s --filename=temp.file --rw=randrw --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nixpkgs.overlays = [
|
||||||
|
(final: prev: {
|
||||||
|
# comma uses the "nix-index" package built into nixpkgs by default.
|
||||||
|
# That package doesn't use the prebuilt nix-index database so it needs to be changed.
|
||||||
|
comma = prev.comma.overrideAttrs (old: {
|
||||||
|
postInstall = ''
|
||||||
|
wrapProgram $out/bin/comma \
|
||||||
|
--prefix PATH : ${lib.makeBinPath [ prev.fzy config.programs.nix-index.package ]}
|
||||||
|
ln -s $out/bin/comma $out/bin/,
|
||||||
|
'';
|
||||||
|
});
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
70
flake.lock
generated
70
flake.lock
generated
@ -105,6 +105,31 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"deploy-rs": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": "flake-compat",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"utils": [
|
||||||
|
"simple-nixos-mailserver",
|
||||||
|
"utils"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1674127017,
|
||||||
|
"narHash": "sha256-QO1xF7stu5ZMDLbHN30LFolMAwY6TVlzYvQoUs1RD68=",
|
||||||
|
"owner": "serokell",
|
||||||
|
"repo": "deploy-rs",
|
||||||
|
"rev": "8c9ea9605eed20528bf60fae35a2b613b901fd77",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "serokell",
|
||||||
|
"repo": "deploy-rs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"flake-compat": {
|
"flake-compat": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
@ -136,39 +161,38 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nix-locate": {
|
"nix-index-database": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": "flake-compat",
|
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1673969751,
|
"lastModified": 1677382901,
|
||||||
"narHash": "sha256-U6aYz3lqZ4NVEGEWiti1i0FyqEo4bUjnTAnA73DPnNU=",
|
"narHash": "sha256-2idFWlTVG+qUZkU2/W50amGSIxmN56igIkMAXKbv4S4=",
|
||||||
"owner": "bennofs",
|
"owner": "Mic92",
|
||||||
"repo": "nix-index",
|
"repo": "nix-index-database",
|
||||||
"rev": "5f98881b1ed27ab6656e6d71b534f88430f6823a",
|
"rev": "4306fa7c12e098360439faac1a2e6b8e509ec97c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "bennofs",
|
"owner": "Mic92",
|
||||||
"repo": "nix-index",
|
"repo": "nix-index-database",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1672580127,
|
"lastModified": 1677823547,
|
||||||
"narHash": "sha256-3lW3xZslREhJogoOkjeZtlBtvFMyxHku7I/9IVehhT8=",
|
"narHash": "sha256-xD2qco8Pw8HAXgjf9OSi2H2N20WaTrtvgcl21525kVE=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "0874168639713f547c05947c76124f78441ea46c",
|
"rev": "78c4d33c16092e535bc4ba1284ba49e3e138483a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-22.05",
|
"ref": "master",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -188,22 +212,6 @@
|
|||||||
"type": "indirect"
|
"type": "indirect"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs-unstable": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1675835843,
|
|
||||||
"narHash": "sha256-y1dSCQPcof4CWzRYRqDj4qZzbBl+raVPAko5Prdil28=",
|
|
||||||
"owner": "NixOS",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "32f914af34f126f54b45e482fb2da4ae78f3095f",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "NixOS",
|
|
||||||
"ref": "master",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"radio": {
|
"radio": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-utils": [
|
"flake-utils": [
|
||||||
@ -250,10 +258,10 @@
|
|||||||
"agenix": "agenix",
|
"agenix": "agenix",
|
||||||
"archivebox": "archivebox",
|
"archivebox": "archivebox",
|
||||||
"dailybuild_modules": "dailybuild_modules",
|
"dailybuild_modules": "dailybuild_modules",
|
||||||
|
"deploy-rs": "deploy-rs",
|
||||||
"flake-utils": "flake-utils",
|
"flake-utils": "flake-utils",
|
||||||
"nix-locate": "nix-locate",
|
"nix-index-database": "nix-index-database",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nixpkgs-unstable": "nixpkgs-unstable",
|
|
||||||
"radio": "radio",
|
"radio": "radio",
|
||||||
"radio-web": "radio-web",
|
"radio-web": "radio-web",
|
||||||
"simple-nixos-mailserver": "simple-nixos-mailserver"
|
"simple-nixos-mailserver": "simple-nixos-mailserver"
|
||||||
|
65
flake.nix
65
flake.nix
@ -1,13 +1,9 @@
|
|||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-22.05";
|
nixpkgs.url = "github:NixOS/nixpkgs/master";
|
||||||
nixpkgs-unstable.url = "github:NixOS/nixpkgs/master";
|
|
||||||
|
|
||||||
flake-utils.url = "github:numtide/flake-utils";
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
|
|
||||||
nix-locate.url = "github:bennofs/nix-index";
|
|
||||||
nix-locate.inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
|
|
||||||
# mail server
|
# mail server
|
||||||
simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-22.05";
|
simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-22.05";
|
||||||
simple-nixos-mailserver.inputs.nixpkgs.follows = "nixpkgs";
|
simple-nixos-mailserver.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
@ -32,21 +28,31 @@
|
|||||||
archivebox.url = "git+https://git.neet.dev/zuckerberg/archivebox.git";
|
archivebox.url = "git+https://git.neet.dev/zuckerberg/archivebox.git";
|
||||||
archivebox.inputs.nixpkgs.follows = "nixpkgs";
|
archivebox.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
archivebox.inputs.flake-utils.follows = "flake-utils";
|
archivebox.inputs.flake-utils.follows = "flake-utils";
|
||||||
|
|
||||||
|
# nixos config deployment
|
||||||
|
deploy-rs.url = "github:serokell/deploy-rs";
|
||||||
|
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
deploy-rs.inputs.utils.follows = "simple-nixos-mailserver/utils";
|
||||||
|
|
||||||
|
# prebuilt nix-index database
|
||||||
|
nix-index-database.url = "github:Mic92/nix-index-database";
|
||||||
|
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = { self, nixpkgs, nixpkgs-unstable, ... }@inputs: {
|
outputs = { self, nixpkgs, ... }@inputs: {
|
||||||
|
|
||||||
nixosConfigurations =
|
nixosConfigurations =
|
||||||
let
|
let
|
||||||
modules = system: [
|
modules = system: with inputs; [
|
||||||
./common
|
./common
|
||||||
inputs.simple-nixos-mailserver.nixosModule
|
simple-nixos-mailserver.nixosModule
|
||||||
inputs.agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
inputs.dailybuild_modules.nixosModule
|
dailybuild_modules.nixosModule
|
||||||
inputs.archivebox.nixosModule
|
archivebox.nixosModule
|
||||||
|
nix-index-database.nixosModules.nix-index
|
||||||
({ lib, ... }: {
|
({ lib, ... }: {
|
||||||
config.environment.systemPackages = [
|
config.environment.systemPackages = [
|
||||||
inputs.agenix.packages.${system}.agenix
|
agenix.packages.${system}.agenix
|
||||||
];
|
];
|
||||||
|
|
||||||
# because nixos specialArgs doesn't work for containers... need to pass in inputs a different way
|
# because nixos specialArgs doesn't work for containers... need to pass in inputs a different way
|
||||||
@ -68,29 +74,22 @@
|
|||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
"ray" = mkSystem "x86_64-linux" nixpkgs-unstable ./machines/ray/configuration.nix;
|
"ray" = mkSystem "x86_64-linux" nixpkgs ./machines/ray/configuration.nix;
|
||||||
"nat" = mkSystem "aarch64-linux" nixpkgs ./machines/nat/configuration.nix;
|
# "nat" = mkSystem "aarch64-linux" nixpkgs ./machines/nat/configuration.nix;
|
||||||
"liza" = mkSystem "x86_64-linux" nixpkgs ./machines/liza/configuration.nix;
|
"liza" = mkSystem "x86_64-linux" nixpkgs ./machines/liza/configuration.nix;
|
||||||
"ponyo" = mkSystem "x86_64-linux" nixpkgs ./machines/ponyo/configuration.nix;
|
"ponyo" = mkSystem "x86_64-linux" nixpkgs ./machines/ponyo/configuration.nix;
|
||||||
"router" = mkSystem "x86_64-linux" nixpkgs-unstable ./machines/router/configuration.nix;
|
"router" = mkSystem "x86_64-linux" nixpkgs ./machines/router/configuration.nix;
|
||||||
"s0" = mkSystem "x86_64-linux" nixpkgs-unstable ./machines/storage/s0/configuration.nix;
|
"s0" = mkSystem "x86_64-linux" nixpkgs ./machines/storage/s0/configuration.nix;
|
||||||
"n1" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n1/configuration.nix;
|
|
||||||
"n2" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n2/configuration.nix;
|
|
||||||
"n3" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n3/configuration.nix;
|
|
||||||
"n4" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n4/configuration.nix;
|
|
||||||
"n5" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n5/configuration.nix;
|
|
||||||
"n6" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n6/configuration.nix;
|
|
||||||
"n7" = mkSystem "aarch64-linux" nixpkgs ./machines/compute/n7/configuration.nix;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
packages = let
|
packages = let
|
||||||
mkKexec = system:
|
mkKexec = system:
|
||||||
(nixpkgs-unstable.lib.nixosSystem {
|
(nixpkgs.lib.nixosSystem {
|
||||||
inherit system;
|
inherit system;
|
||||||
modules = [ ./machines/ephemeral/kexec.nix ];
|
modules = [ ./machines/ephemeral/kexec.nix ];
|
||||||
}).config.system.build.kexec_tarball;
|
}).config.system.build.kexec_tarball;
|
||||||
mkIso = system:
|
mkIso = system:
|
||||||
(nixpkgs-unstable.lib.nixosSystem {
|
(nixpkgs.lib.nixosSystem {
|
||||||
inherit system;
|
inherit system;
|
||||||
modules = [ ./machines/ephemeral/iso.nix ];
|
modules = [ ./machines/ephemeral/iso.nix ];
|
||||||
}).config.system.build.isoImage;
|
}).config.system.build.isoImage;
|
||||||
@ -100,5 +99,21 @@
|
|||||||
"aarch64-linux"."kexec" = mkKexec "aarch64-linux";
|
"aarch64-linux"."kexec" = mkKexec "aarch64-linux";
|
||||||
"aarch64-linux"."iso" = mkIso "aarch64-linux";
|
"aarch64-linux"."iso" = mkIso "aarch64-linux";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
deploy.nodes =
|
||||||
|
let
|
||||||
|
mkDeploy = configName: hostname: {
|
||||||
|
inherit hostname;
|
||||||
|
magicRollback = false;
|
||||||
|
sshUser = "root";
|
||||||
|
profiles.system.path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.${configName};
|
||||||
|
};
|
||||||
|
|
||||||
|
in {
|
||||||
|
s0 = mkDeploy "s0" "s0";
|
||||||
|
router = mkDeploy "router" "192.168.1.228";
|
||||||
|
};
|
||||||
|
|
||||||
|
# checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) inputs.deploy-rs.lib;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -1,24 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
# NixOS wants to enable GRUB by default
|
|
||||||
boot.loader.grub.enable = false;
|
|
||||||
# Enables the generation of /boot/extlinux/extlinux.conf
|
|
||||||
boot.loader.generic-extlinux-compatible.enable = true;
|
|
||||||
|
|
||||||
fileSystems = {
|
|
||||||
"/" = {
|
|
||||||
device = "/dev/disk/by-label/NIXOS_SD";
|
|
||||||
fsType = "ext4";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
system.autoUpgrade.enable = true;
|
|
||||||
|
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
|
||||||
|
|
||||||
hardware.deviceTree.enable = true;
|
|
||||||
hardware.deviceTree.overlays = [
|
|
||||||
./sopine-baseboard-ethernet.dtbo # fix pine64 clusterboard ethernet
|
|
||||||
];
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n1";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n2";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n3";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n4";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n5";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n6";
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
../common.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = "n7";
|
|
||||||
}
|
|
Binary file not shown.
@ -1,15 +0,0 @@
|
|||||||
/dts-v1/;
|
|
||||||
|
|
||||||
/ {
|
|
||||||
model = "SoPine with baseboard";
|
|
||||||
compatible = "pine64,sopine-baseboard\0pine64,sopine\0allwinner,sun50i-a64";
|
|
||||||
|
|
||||||
fragment@0 {
|
|
||||||
/* target = <ðernet@1c30000>; */
|
|
||||||
target-path = "/soc/ethernet@1c30000";
|
|
||||||
__overlay__ {
|
|
||||||
allwinner,tx-delay-ps = <500>;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
@ -11,9 +11,13 @@
|
|||||||
# Enable serial output
|
# Enable serial output
|
||||||
boot.kernelParams = [
|
boot.kernelParams = [
|
||||||
"panic=30" "boot.panic_on_fail" # reboot the machine upon fatal boot issues
|
"panic=30" "boot.panic_on_fail" # reboot the machine upon fatal boot issues
|
||||||
"console=ttyS0,115200" # enable serial console
|
"console=ttyS0,115200n8" # enable serial console
|
||||||
"console=tty1"
|
|
||||||
];
|
];
|
||||||
|
boot.loader.grub.extraConfig = "
|
||||||
|
serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1
|
||||||
|
terminal_input serial
|
||||||
|
terminal_output serial
|
||||||
|
";
|
||||||
|
|
||||||
# firmware
|
# firmware
|
||||||
firmware.x86_64.enable = true;
|
firmware.x86_64.enable = true;
|
||||||
|
@ -20,6 +20,9 @@
|
|||||||
# samba
|
# samba
|
||||||
services.samba.enable = true;
|
services.samba.enable = true;
|
||||||
|
|
||||||
|
# disable suspend on lid close
|
||||||
|
services.logind.lidSwitch = "ignore";
|
||||||
|
|
||||||
# navidrome
|
# navidrome
|
||||||
services.navidrome = {
|
services.navidrome = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user