fix handbrake cli ref
add host taz & mod searx + random tweaks
add taz to flake checks
add taz/hardware-configuration.nix
KOJUSLZEOGTPYW2EGQY6PZKGGMOL6PLIQ7NUAJR26S5HZZZQQJYQC
PKUQNGARQTNWOZNQYHXVQH2UEXORRVKZZUYGXPQB3AAS6QXAWXBQC
S6TTLG2JJJNDFDBBGOYLA67OGTSLXY4E64FMB25EYDTJSTGITR7QC
2MH4TU2HSSXKDWLUQXEBJER4F52ALDFAKVUVNT5O4XSFZHPYV53QC
5ZZOAJQ65SAFQVNGFKSMZ2XMCMJ73ODBCMEB64BTOANWRITGGSXQC
WCNLUVUGDQ55KUE5TTZAJHVPQ5EOG5SPNUMDNMAZ7ENAQV7D4XYQC
OEG6DPRQVUDPTETGTOR7WYOJTIB4SWUPXGYW4FEPWSYYNULOCTIQC
7UWOMG432IHX7BGGN7PPQUGSSUP6CCQNBXOO7TKNMKMK2R2WFOGAC
U6GSJX5ZG4O7R3XO4CA7G62TTDE22HRZ2LL7EQKLQSYCHCAA3CQQC
3OAFCHK7EIRUD3ZLAGZ3MAXVYOGFAJVDOF63ZIGNU7I3RWIPMAOQC
WHTEZBXRS7R3AM44LJZFR2YE6RP4IWE3AB5V3DYGO4YJU7PBTMQAC
VSKDZ32TKJD6SSB6DAUT7JVYKEVFWO74LFB442LGJG4LPYX6LTRAC
# Do not modify this file! It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot.initrd.availableKernelModules = ["virtio_pci" "virtio_scsi" "ahci" "sd_mod"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
fileSystems."/" = {
device = "/dev/sda";
fsType = "ext4";
};
swapDevices = [{device = "/dev/sdb";}];
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
# recommendations from linode docs on nixos
# https://www.linode.com/docs/guides/install-nixos-on-linode/
boot.kernelParams = ["console=ttyS0,19200n8"];
boot.loader.grub.extraConfig = ''
serial --speed=19200 --unit=0 --word=8 --parity=no --stop=1;
terminal_input serial;
terminal_output serial
'';
boot.loader.grub.forceInstall = true;
boot.loader.grub.device = "nodev";
boot.loader.timeout = 10;
}
{pkgs, ...}: {
imports = [
./hardware-configuration.nix
];
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
networking = {
firewall.checkReversePath = "loose";
hostName = "taz";
useDHCP = false;
defaultGateway = {
address = "66.175.212.76";
interface = "eth0";
};
usePredictableInterfaceNames = false;
interfaces.eth0 = {
useDHCP = true;
ipv4.addresses = [
{
address = "66.175.212.76";
prefixLength = 24;
}
];
};
};
services.openssh = {
enable = true;
permitRootLogin = "no";
};
environment.systemPackages = with pkgs; [
inetutils
mtr
sysstat
];
system.stateVersion = "21.11";
home-manager.users.chris = {pkgs, ...}: {
home.stateVersion = "21.11";
};
time.timeZone = "UTC";
users.users.chris.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGaGrbXoVGe5fXpOhG6+pUZw+aYANuiDPvoI82jftpPd chris@thesogu.com" # chris-thelio
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPflVyCskMX25z8S3pQLyGbo67zBQyC+eMbCkksRw4o/ chris@thesogu.com" # chris-xps
];
security.acme = {
acceptTerms = true;
defaults.email = "green.iron4199@fastmail.com";
};
services.nginx = {
enable = true;
virtualHosts = {
"search.thesogu.com" = {
forceSSL = true;
enableACME = true;
serverAliases = ["search.thesogu.com"];
locations."/" = {
root = "/var/www";
};
};
};
};
}
{_, ...}: {
services.searx = {
enable = true;
runInUwsgi = true;
uwsgiConfig = {
disable-logging = true;
http = ":8080";
cache2 = "name=searxcache,items=2000,blocks=2000,blocksize=4096,bitmap=1";
};
settings = {
use_default_settings = true;
server = {
base_url = false;
image_proxy = true;
secret_key = "chris-test";
# secret_key = "@SEARX_SECRET_KEY@";
};
};
};
}
taz = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = {inherit inputs overlays;};
modules = [
./nixpkgs/nixos/taz
./nixpkgs/nixos/common.nix
./nixpkgs/nixos/searx.nix
./nixpkgs/nixos/tailscale.nix
./nixpkgs/nixos/users/chris-minimal.nix
home-manager.nixosModules.home-manager
{
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
}
];
};