summary refs log tree commit diff
path: root/modules
diff options
context:
space:
mode:
authorRory& <root@rory.gay>2025-02-08 19:34:44 +0100
committerRory& <root@rory.gay>2025-02-08 19:34:44 +0100
commit7dda362c06c93d53705cfd5ff78e895aeae95e9c (patch)
treeb71a3cb10e624cd756f9289d3453a41aed7aefc5 /modules
parentAdd laptop, desktop changes (diff)
downloadRory-Open-Architecture-7dda362c06c93d53705cfd5ff78e895aeae95e9c.tar.xz
Format files
Diffstat (limited to 'modules')
-rwxr-xr-xmodules/base-server.nix90
-rwxr-xr-xmodules/base.nix4
-rwxr-xr-xmodules/environments/home.nix52
-rw-r--r--modules/monitoring/crutches/synapse.nix4
-rw-r--r--modules/monitoring/module.nix4
-rw-r--r--modules/software-templates/dotnet.client.nix12
-rwxr-xr-xmodules/users/Rory.client.nix4
-rwxr-xr-xmodules/users/chris.nix5
8 files changed, 94 insertions, 81 deletions
diff --git a/modules/base-server.nix b/modules/base-server.nix

index 1fc72f3..008959d 100755 --- a/modules/base-server.nix +++ b/modules/base-server.nix
@@ -80,51 +80,51 @@ hardware.enableRedistributableFirmware = false; services = { -# prometheus = { -# exporters = { -# node = { -# enable = true; -# port = 9100; -# enabledCollectors = [ -# #"logind" #too slow -# "systemd" -# "processes" -# "interrupts" -# # Testing: -# "buddyinfo" -# "cgroups" -# "ksmd" -# "lnstat" -# "mountstats" -# "network_route" -# #"perf" # requires sysctl change -# "qdisc" -# "sysctl" -# "softirqs" -# "tcpstat" -# ]; -# disabledCollectors = [ -# "textfile" -# "xfs" -# "zfs" -# "selinux" -# "cpufreq" -# "btrfs" -# "powersupplyclass" -# "mdadm" -# "tapestats" -# "fibrechannel" -# "cpu_vulnerabilities" -# "watchdog" -# "thermal_zone" -# "logind" -# "nfs" -# "nfsd" -# "infiniband" -# ]; -# }; -# }; -# }; + # prometheus = { + # exporters = { + # node = { + # enable = true; + # port = 9100; + # enabledCollectors = [ + # #"logind" #too slow + # "systemd" + # "processes" + # "interrupts" + # # Testing: + # "buddyinfo" + # "cgroups" + # "ksmd" + # "lnstat" + # "mountstats" + # "network_route" + # #"perf" # requires sysctl change + # "qdisc" + # "sysctl" + # "softirqs" + # "tcpstat" + # ]; + # disabledCollectors = [ + # "textfile" + # "xfs" + # "zfs" + # "selinux" + # "cpufreq" + # "btrfs" + # "powersupplyclass" + # "mdadm" + # "tapestats" + # "fibrechannel" + # "cpu_vulnerabilities" + # "watchdog" + # "thermal_zone" + # "logind" + # "nfs" + # "nfsd" + # "infiniband" + # ]; + # }; + # }; + # }; promtail = { enable = true; configuration = { diff --git a/modules/base.nix b/modules/base.nix
index 15bfd08..d6f9aae 100755 --- a/modules/base.nix +++ b/modules/base.nix
@@ -11,8 +11,8 @@ ./users/Rory.nix ./extra-substituters.nix ./monitoring/module.nix - -# ../packages/overlays/openvpn.nix # Temporary: Fix a build failure + + # ../packages/overlays/openvpn.nix # Temporary: Fix a build failure ]; boot = { diff --git a/modules/environments/home.nix b/modules/environments/home.nix
index 3fbf14e..cf9f841 100755 --- a/modules/environments/home.nix +++ b/modules/environments/home.nix
@@ -8,38 +8,40 @@ { nix = { distributedBuilds = true; - # - buildMachines = builtins.filter (machine: !builtins.any (ip: ip == machine.hostName) (builtins.map (iface: iface.ipv4.addresses) (builtins.attrValues config.networking.interfaces))) [ - { - systems = [ - "x86_64-linux" - "i686-linux" + # + buildMachines = + builtins.filter (machine: !builtins.any (ip: ip == machine.hostName) (builtins.map (iface: iface.ipv4.addresses) (builtins.attrValues config.networking.interfaces))) + [ + { + systems = [ + "x86_64-linux" + "i686-linux" + ]; + hostName = "192.168.0.3"; + sshUser = "Rory"; + sshKey = "/home/Rory/.ssh/id_ed25519"; + maxJobs = 6; + speedFactor = 43200; + } + { + systems = [ + "x86_64-linux" + "i686-linux" + ]; + hostName = "192.168.0.59"; + sshUser = "Rory"; + sshKey = "/home/Rory/.ssh/id_ed25519"; + maxJobs = 2; + speedFactor = 16000; + } ]; - hostName = "192.168.0.3"; - sshUser = "Rory"; - sshKey = "/home/Rory/.ssh/id_ed25519"; - maxJobs = 6; - speedFactor = 43200; - } - { - systems = [ - "x86_64-linux" - "i686-linux" - ]; - hostName = "192.168.0.59"; - sshUser = "Rory"; - sshKey = "/home/Rory/.ssh/id_ed25519"; - maxJobs = 2; - speedFactor = 16000; - } - ]; #ssh://Rory@192.168.0.3 x86_64-linux,i686-linux /home/Rory/.ssh/id_ed25519 12 1 - - - registry.nixpkgs.flake = pkgs; nixPath = [ "nixpkgs=flake:nixpkgs" ]; settings = { builders-use-substitutes = true; - #builders + #builders trusted-substituters = [ "https://nix-community.cachix.org" "https://cache.garnix.io" diff --git a/modules/monitoring/crutches/synapse.nix b/modules/monitoring/crutches/synapse.nix
index 3145d11..7028396 100644 --- a/modules/monitoring/crutches/synapse.nix +++ b/modules/monitoring/crutches/synapse.nix
@@ -1,10 +1,10 @@ -{lib, ...}: +{ lib, ... }: { options.monitoring.synapse = { workerNames = lib.mkOption { type = lib.types.listOf lib.types.str; - default = []; + default = [ ]; description = "Synapse worker names"; }; }; diff --git a/modules/monitoring/module.nix b/modules/monitoring/module.nix
index c8d1d61..f47c483 100644 --- a/modules/monitoring/module.nix +++ b/modules/monitoring/module.nix
@@ -40,8 +40,8 @@ in prometheus = lib.mkIf (cfg.localPrometheus) { enable = true; listenAddress = "127.0.0.1"; - extraFlags = [ - "--storage.tsdb.wal-compression" + extraFlags = [ + "--storage.tsdb.wal-compression" "--query.max-concurrency 128" "--rules.max-concurrent-evals 64" "--storage.tsdb.retention.size 250GB" diff --git a/modules/software-templates/dotnet.client.nix b/modules/software-templates/dotnet.client.nix
index 3a959fe..6f1fdd8 100644 --- a/modules/software-templates/dotnet.client.nix +++ b/modules/software-templates/dotnet.client.nix
@@ -1,9 +1,17 @@ -{ config, pkgs, nixpkgs-stable, ... }: +{ + config, + pkgs, + nixpkgs-stable, + ... +}: let # We have to specify config to set allowUnfree, as nixpkgs-stable.legacyPackages doesn't pass through config. # See: https://slab.midna.dev/public/posts/where-does-pkgs-come-from-xw6epo0t - stablePkgs = import nixpkgs-stable { config = config.nixpkgs.config; system = pkgs.stdenv.hostPlatform.system; }; + stablePkgs = import nixpkgs-stable { + config = config.nixpkgs.config; + system = pkgs.stdenv.hostPlatform.system; + }; in { #imports = [ ./dotnet.nix ]; diff --git a/modules/users/Rory.client.nix b/modules/users/Rory.client.nix
index fb6ad88..ede12df 100755 --- a/modules/users/Rory.client.nix +++ b/modules/users/Rory.client.nix
@@ -35,7 +35,7 @@ # # Install = { WantedBy = [ "default.target" ]; }; # - # Service = { + # Service = { # ExecStart = "${pkgs.keepassxc}/bin/keepassxc ~/.secrets.kdbx"; # Restart = "always"; # }; @@ -50,7 +50,7 @@ # # Install = { WantedBy = [ "default.target" ]; }; # - # Service = { + # Service = { # ExecStart = "${pkgs.easyeffects}/bin/easyeffects"; # Restart = "always"; # }; diff --git a/modules/users/chris.nix b/modules/users/chris.nix
index 3ae92fd..ea939b6 100755 --- a/modules/users/chris.nix +++ b/modules/users/chris.nix
@@ -4,7 +4,10 @@ users.users.chris = { isNormalUser = true; - extraGroups = [ "wheel" "dialout" ]; + extraGroups = [ + "wheel" + "dialout" + ]; packages = with pkgs; [ nano #nodejs-slim