diff --git a/nixos/home/jahanson/workstation.nix b/nixos/home/jahanson/workstation.nix index bfeeb94..6d81b62 100644 --- a/nixos/home/jahanson/workstation.nix +++ b/nixos/home/jahanson/workstation.nix @@ -38,6 +38,5 @@ with config; minio-client # S3 management shellcheck # shell script linting ]; - }; } diff --git a/nixos/hosts/legiondary/default-old.nix b/nixos/hosts/legiondary/default-old.nix deleted file mode 100644 index 4c32474..0000000 --- a/nixos/hosts/legiondary/default-old.nix +++ /dev/null @@ -1,33 +0,0 @@ -{ ... }: { - config = { - - # hardware-configuration.nix - half of the hardware-configuration.nix file - - networking.hostId = "ad4380db"; - networking.hostName = "durincore"; - - fileSystems."/" = - { device = "rpool/root"; - fsType = "zfs"; - }; - - fileSystems."/home" = - { device = "rpool/home"; - fsType = "zfs"; - }; - - fileSystems."/boot" = - { device = "/dev/disk/by-uuid/F1B9-CA7C"; - fsType = "vfat"; - options = [ "fmask=0077" "dmask=0077" ]; - }; - - swapDevices = [ ]; - - # System settings and services. - mySystem = { - system.motd.networkInterfaces = [ "enp0s31f6" "wlp4s0" ]; - }; - - }; -} diff --git a/nixos/hosts/varda/default.nix b/nixos/hosts/varda/default.nix index f32fff3..28fe5ff 100644 --- a/nixos/hosts/varda/default.nix +++ b/nixos/hosts/varda/default.nix @@ -14,10 +14,10 @@ fsType = "zfs"; }; - fileSystems."/boot" = - { device = "/dev/disk/by-uuid/8091-E7F2"; - fsType = "vfat"; - }; + fileSystems."/boot" = { + device = "/dev/disk/by-uuid/8091-E7F2"; + fsType = "vfat"; + }; swapDevices = [ ]; diff --git a/nixos/overlays/default.nix b/nixos/overlays/default.nix index 94d2178..8d4634d 100644 --- a/nixos/overlays/default.nix +++ b/nixos/overlays/default.nix @@ -5,10 +5,11 @@ nur = inputs.nur.overlay; # The unstable nixpkgs set (declared in the flake inputs) will # be accessible through 'pkgs.unstable' - unstable-packages = final: _prev: { - unstable = import inputs.nixpkgs-unstable { - inherit (final) system; - config.allowUnfree = true; - }; - }; + # great idea if I wasn't using unstable as my base. + # unstable-packages = final: _prev: { + # unstable = import inputs.nixpkgs-unstable { + # inherit (final) system; + # config.allowUnfree = true; + # }; + # }; } diff --git a/nixos/profiles/role-dev.nix b/nixos/profiles/role-dev.nix index 9bcc585..c46301c 100644 --- a/nixos/profiles/role-dev.nix +++ b/nixos/profiles/role-dev.nix @@ -1,4 +1,4 @@ -{ config, lib, pkgs, imports, boot, self, inputs, ... }: +{ config, pkgs, inputs, ... }: # Role for dev stations # Could be a workstatio or a headless server. @@ -12,14 +12,10 @@ with config; dnsutils nix - # nix dev - dnscontrol # for updating internal DNS servers with homelab services - # TODO Move nil nixpkgs-fmt statix - # nvd gh # bind # for dns utils like named-checkconf diff --git a/nixos/profiles/role-gaming.nix b/nixos/profiles/role-gaming.nix index 3f15922..a2bac36 100644 --- a/nixos/profiles/role-gaming.nix +++ b/nixos/profiles/role-gaming.nix @@ -1,4 +1,4 @@ -{ pkgs, lib, ... }: +{ pkgs, ... }: { # Enable module for NVIDIA graphics mySystem = { diff --git a/nixos/profiles/role-server.nix b/nixos/profiles/role-server.nix index 8b67976..c0e424f 100644 --- a/nixos/profiles/role-server.nix +++ b/nixos/profiles/role-server.nix @@ -5,7 +5,7 @@ with lib; { config = { - # Enable monitoring for remote scraiping + # Enable monitoring for remote scraping mySystem.services.rebootRequiredCheck.enable = true; mySystem.security.wheelNeedsSudoPassword = false; mySystem.services.cockpit.enable = true; @@ -22,6 +22,7 @@ with lib; noXlibs = mkDefault true; systemPackages = [ pkgs.lazygit ]; }; + documentation = { enable = mkDefault false; doc.enable = mkDefault false;