fix issues

This commit is contained in:
2026-04-07 20:55:10 +02:00
parent 375e535c2f
commit df6269323b
9 changed files with 41 additions and 34 deletions
+8 -4
View File
@@ -10,26 +10,30 @@ in
nixpkgs, nixpkgs,
disko, disko,
lolcat, lolcat,
modules ? [ ], nixosModules,
hostModules ? [ ],
}: }:
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
specialArgs = { specialArgs = {
inputs = inputs // { "lolcat++" = lolcat; }; inputs = inputs // { "lolcat++" = lolcat; };
inherit nixosModules;
}; };
modules = [ disko.nixosModules.disko ] ++ modules; modules = [ disko.nixosModules.disko ] ++ hostModules;
}; };
mkDesktopHost = { mkDesktopHost = {
nixpkgs, nixpkgs,
disko, disko,
lolcat, lolcat,
modules ? [ ], nixosModules,
hostModules ? [ ],
}: }:
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
specialArgs = { specialArgs = {
inputs = inputs // { "lolcat++" = lolcat; }; inputs = inputs // { "lolcat++" = lolcat; };
inherit nixosModules;
}; };
modules = [ modules = [
disko.nixosModules.disko disko.nixosModules.disko
@@ -40,6 +44,6 @@ in
home-manager.backupFileExtension = "hm-backup"; home-manager.backupFileExtension = "hm-backup";
home-manager.users.love = import "${dotfiles}/home.nix"; home-manager.users.love = import "${dotfiles}/home.nix";
} }
] ++ modules; ] ++ hostModules;
}; };
} }
+2 -2
View File
@@ -1,6 +1,6 @@
{ inputs }: { inputs }:
let let
modules = import ../nixos; nixosModules = import ../nixos;
flakeLib = import ./lib.nix { inherit inputs; }; flakeLib = import ./lib.nix { inherit inputs; };
in in
import ../hosts ({ inherit inputs modules; } // flakeLib) import ../hosts ({ inherit inputs nixosModules; } // flakeLib)
+7 -7
View File
@@ -1,7 +1,7 @@
{ {
inputs, inputs,
pkgs, pkgs,
modules, nixosModules,
... ...
}: }:
let let
@@ -25,11 +25,11 @@ in
imports = [ imports = [
inputs.mailserver.nixosModules.default inputs.mailserver.nixosModules.default
./disko.nix ./disko.nix
modules.base nixosModules.base
modules.zfsRoot nixosModules.zfsRoot
modules.luksInitrdSshUnlock nixosModules.luksInitrdSshUnlock
modules.mailServer nixosModules.mailServer
modules.binBashWrapper nixosModules.binBashWrapper
]; ];
my.binBashWrapper.enable = true; my.binBashWrapper.enable = true;
@@ -42,7 +42,7 @@ in
}; };
networking.hostName = hostName; networking.hostName = hostName;
networking.hostId = "8d49a097f2"; networking.hostId = "8d49a097";
users.mutableUsers = true; users.mutableUsers = true;
users.users.${userName} = { users.users.${userName} = {
+5 -2
View File
@@ -1,6 +1,7 @@
{ {
inputs, inputs,
mkHost, mkHost,
nixosModules,
... ...
}: }:
{ {
@@ -8,13 +9,15 @@
nixpkgs = inputs.nixpkgs-stable; nixpkgs = inputs.nixpkgs-stable;
disko = inputs.disko-stable; disko = inputs.disko-stable;
lolcat = inputs."lolcat++-stable"; lolcat = inputs."lolcat++-stable";
modules = [ ./configuration.nix ]; inherit nixosModules;
hostModules = [ ./configuration.nix ];
}; };
hermes = mkHost { hermes = mkHost {
nixpkgs = inputs.nixpkgs-stable; nixpkgs = inputs.nixpkgs-stable;
disko = inputs.disko-stable; disko = inputs.disko-stable;
lolcat = inputs."lolcat++-stable"; lolcat = inputs."lolcat++-stable";
modules = [ ./configuration.nix ]; inherit nixosModules;
hostModules = [ ./configuration.nix ];
}; };
} }
+6 -6
View File
@@ -1,7 +1,7 @@
{ {
config, config,
pkgs, pkgs,
modules, nixosModules,
... ...
}: }:
let let
@@ -25,11 +25,11 @@ in
imports = [ imports = [
./hardware.nix ./hardware.nix
./disko.nix ./disko.nix
modules.base nixosModules.base
modules.zfsRoot nixosModules.zfsRoot
modules.luksTpm2 nixosModules.luksTpm2
modules.desktopHyprland nixosModules.desktopHyprland
modules.binBashWrapper nixosModules.binBashWrapper
]; ];
my.binBashWrapper.enable = true; my.binBashWrapper.enable = true;
+5 -2
View File
@@ -1,6 +1,7 @@
{ {
inputs, inputs,
mkDesktopHost, mkDesktopHost,
nixosModules,
... ...
}: }:
{ {
@@ -8,13 +9,15 @@
nixpkgs = inputs.nixpkgs-unstable; nixpkgs = inputs.nixpkgs-unstable;
disko = inputs.disko-unstable; disko = inputs.disko-unstable;
lolcat = inputs."lolcat++-unstable"; lolcat = inputs."lolcat++-unstable";
modules = [ ./configuration.nix ]; inherit nixosModules;
hostModules = [ ./configuration.nix ];
}; };
kronos = mkDesktopHost { kronos = mkDesktopHost {
nixpkgs = inputs.nixpkgs-unstable; nixpkgs = inputs.nixpkgs-unstable;
disko = inputs.disko-unstable; disko = inputs.disko-unstable;
lolcat = inputs."lolcat++-unstable"; lolcat = inputs."lolcat++-unstable";
modules = [ ./configuration.nix ]; inherit nixosModules;
hostModules = [ ./configuration.nix ];
}; };
} }
+1 -1
View File
@@ -81,7 +81,7 @@
IPv6AcceptRA = true; IPv6AcceptRA = true;
}; };
dhcpV4Config.RouteMetric = 100; dhcpV4Config.RouteMetric = 100;
dhcpV6Config.RouteMetric = 100; ipv6AcceptRAConfig.RouteMetric = 100;
}; };
programs.zsh.enable = true; programs.zsh.enable = true;
-4
View File
@@ -40,10 +40,6 @@ in
authorizedKeys = cfg.authorizedKeys; authorizedKeys = cfg.authorizedKeys;
}; };
}; };
boot.initrd.secrets = {
"${toString cfg.hostKeyPath}" = cfg.hostKeyPath;
};
system.activationScripts.initrdSshHostKey = { system.activationScripts.initrdSshHostKey = {
deps = [ "users" "groups" ]; deps = [ "users" "groups" ];
text = '' text = ''
+7 -6
View File
@@ -1,22 +1,23 @@
{ config, ... }: { config, ... }:
{ {
security.acme.acceptTerms = true; security.acme = {
acceptTerms = true;
defaults.email = "love@billenius.com";
};
networking.firewall.allowedTCPPorts = [ 80 ]; networking.firewall.allowedTCPPorts = [ 80 ];
services.nginx.virtualHosts.${config.mailserver.fqdn}.enableACME = true; services.nginx.virtualHosts.${config.mailserver.fqdn}.enableACME = true;
mailserver = { mailserver = {
enable = true; enable = true;
stateVersion = 4;
fqdn = "mail.billenius.com"; fqdn = "mail.billenius.com";
domains = [ "billenius.com" ]; domains = [ "billenius.com" ];
certificateScheme = "acme";
x509.useACMEHost = config.mailserver.fqdn;
# A list of all login accounts. To create the password hashes, use # A list of all login accounts. To create the password hashes, use
# nix-shell -p mkpasswd --run 'mkpasswd -s' # nix-shell -p mkpasswd --run 'mkpasswd -s'
accounts = { loginAccounts = {
"love@billenius.com" = { "love@billenius.com" = {
hashedPasswordFile = ../../../resources/mail-server/love@billenius.com; hashedPasswordFile = "${../../../resources/mail-server}/love@billenius.com";
aliases = [ "postmaster@billenius.com" ]; aliases = [ "postmaster@billenius.com" ];
}; };
}; };