tangled
alpha
login
or
join now
bwc9876.dev
/
nixos-config
1
fork
atom
Flake for my NixOS devices
1
fork
atom
overview
issues
pulls
pipelines
Black mesa enable redistributable firmware
bwc9876.dev
4 months ago
15f225e1
e281bd0e
verified
This commit was signed with the committer's
known signature
.
bwc9876.dev
SSH Key Fingerprint:
SHA256:DanMEP/RNlSC7pAVbnXO6wzQV00rqyKj053tz4uH5gQ=
+80
-77
1 changed file
expand all
collapse all
unified
split
nixosConfigurations
black-mesa.nix
+80
-77
nixosConfigurations/black-mesa.nix
···
2
2
inputs,
3
3
outputs,
4
4
...
5
5
-
}: {
5
5
+
}:
6
6
+
{
6
7
system = "x86_64-linux";
7
8
8
8
-
modules =
9
9
-
(builtins.attrValues outputs.nixosModules)
10
10
-
++ [
11
11
-
inputs.nixos-hardware.nixosModules.common-gpu-amd
12
12
-
inputs.nixos-hardware.nixosModules.common-cpu-amd
13
13
-
{
14
14
-
home-manager.users.bean.home.stateVersion = "25.05";
15
15
-
system.stateVersion = "25.05";
16
16
-
networking.hostName = "black-mesa";
9
9
+
modules = (builtins.attrValues outputs.nixosModules) ++ [
10
10
+
inputs.nixos-hardware.nixosModules.common-gpu-amd
11
11
+
inputs.nixos-hardware.nixosModules.common-cpu-amd
12
12
+
{
13
13
+
home-manager.users.bean.home.stateVersion = "25.05";
14
14
+
system.stateVersion = "25.05";
15
15
+
networking.hostName = "black-mesa";
17
16
18
18
-
powerManagement.cpuFreqGovernor = "performance";
17
17
+
powerManagement.cpuFreqGovernor = "performance";
19
18
20
20
-
boot.initrd.availableKernelModules = [
21
21
-
"nvme"
22
22
-
"xhci_pci"
23
23
-
"ahci"
24
24
-
"usbhid"
25
25
-
"usb_storage"
26
26
-
"sd_mod"
27
27
-
];
28
28
-
boot.kernelModules = ["kvm-amd"];
29
29
-
boot.extraModulePackages = [];
19
19
+
boot.initrd.availableKernelModules = [
20
20
+
"nvme"
21
21
+
"xhci_pci"
22
22
+
"ahci"
23
23
+
"usbhid"
24
24
+
"usb_storage"
25
25
+
"sd_mod"
26
26
+
];
27
27
+
boot.kernelModules = [ "kvm-amd" ];
28
28
+
boot.extraModulePackages = [ ];
29
29
+
30
30
+
hardware.enableRedistributableFirmware = true;
30
31
31
31
-
# Other disks handled by cow.disks
32
32
-
fileSystems."/mnt/storage" = {
33
33
-
device = "/dev/sda1";
34
34
-
fsType = "btrfs";
35
35
-
};
32
32
+
# Other disks handled by cow.disks
33
33
+
fileSystems."/mnt/storage" = {
34
34
+
device = "/dev/sda1";
35
35
+
fsType = "btrfs";
36
36
+
};
36
37
37
37
-
users.users = let
38
38
+
users.users =
39
39
+
let
38
40
secureRoot = "/nix/persist/secure";
39
39
-
in {
41
41
+
in
42
42
+
{
40
43
bean.hashedPasswordFile = "${secureRoot}/hashed-passwd";
41
44
root.hashedPasswordFile = "${secureRoot}/hashed-passwd";
42
45
};
43
46
44
44
-
home-manager.users.bean.cow = {
45
45
-
sync.enable = true;
46
46
-
dev.enable = true;
47
47
+
home-manager.users.bean.cow = {
48
48
+
sync.enable = true;
49
49
+
dev.enable = true;
50
50
+
};
51
51
+
52
52
+
cow = {
53
53
+
bean.sudoer = true;
54
54
+
lanzaboote.enable = true;
55
55
+
ssh-server.enable = true;
56
56
+
role-desktop.enable = true;
57
57
+
gaming.enable = true;
58
58
+
imperm.enable = true;
59
59
+
disks = {
60
60
+
enable = true;
61
61
+
partition-prefix = "cow-bm";
62
62
+
swap = false;
63
63
+
luks = true;
47
64
};
65
65
+
};
66
66
+
}
67
67
+
{
68
68
+
# Bingus!
69
69
+
imports = [ inputs.bingus.nixosModules.default ];
70
70
+
nixpkgs.overlays = [ inputs.bingus.overlays.default ];
48
71
49
49
-
cow = {
50
50
-
bean.sudoer = true;
51
51
-
lanzaboote.enable = true;
52
52
-
ssh-server.enable = true;
53
53
-
role-desktop.enable = true;
54
54
-
gaming.enable = true;
55
55
-
imperm.enable = true;
56
56
-
disks = {
57
57
-
enable = true;
58
58
-
partition-prefix = "cow-bm";
59
59
-
swap = false;
60
60
-
luks = true;
61
61
-
};
62
62
-
};
63
63
-
}
64
64
-
{
65
65
-
# Bingus!
66
66
-
imports = [inputs.bingus.nixosModules.default];
67
67
-
nixpkgs.overlays = [inputs.bingus.overlays.default];
72
72
+
cow.imperm.keep = [
73
73
+
"/var/lib/private/bingus"
74
74
+
];
68
75
69
69
-
cow.imperm.keep = [
70
70
-
"/var/lib/private/bingus"
76
76
+
services.bingus-bot = {
77
77
+
enable = true;
78
78
+
tokenFile = "/nix/persist/secure/bingus-token";
79
79
+
replyChannels = [
80
80
+
1295447496948191262
81
81
+
1295245646542143489
71
82
];
72
72
-
73
73
-
services.bingus-bot = {
74
74
-
enable = true;
75
75
-
tokenFile = "/nix/persist/secure/bingus-token";
76
76
-
replyChannels = [
77
77
-
1295447496948191262
78
78
-
1295245646542143489
79
79
-
];
83
83
+
};
84
84
+
}
85
85
+
{
86
86
+
# for WOL
87
87
+
systemd.network.links."79-eth-wol" = {
88
88
+
matchConfig = {
89
89
+
Type = "ether";
90
90
+
Driver = "!veth";
91
91
+
Virtualization = "false";
80
92
};
81
81
-
}
82
82
-
{
83
83
-
# for WOL
84
84
-
systemd.network.links."79-eth-wol" = {
85
85
-
matchConfig = {
86
86
-
Type = "ether";
87
87
-
Driver = "!veth";
88
88
-
Virtualization = "false";
89
89
-
};
90
90
-
linkConfig = {
91
91
-
WakeOnLan = "magic";
92
92
-
NamePolicy = "keep kernel database onboard slot path";
93
93
-
AlternativeNamesPolicy = "database onboard slot path mac";
94
94
-
MACAddressPolicy = "persistent";
95
95
-
};
93
93
+
linkConfig = {
94
94
+
WakeOnLan = "magic";
95
95
+
NamePolicy = "keep kernel database onboard slot path";
96
96
+
AlternativeNamesPolicy = "database onboard slot path mac";
97
97
+
MACAddressPolicy = "persistent";
96
98
};
97
97
-
}
98
98
-
];
99
99
+
};
100
100
+
}
101
101
+
];
99
102
}