Compare commits

...

27 Commits

Author SHA1 Message Date
9d98a24d8e Enable brotli
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-04 02:54:45 +00:00
b65d84e11a Update with CLS-reducing settings
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-04 02:09:58 +00:00
a3d41a2f05 Update blog with dead-KaTeX-elimination
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-04 00:48:38 +00:00
5fe381b450 Give daniel neovim
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-03 23:37:11 +00:00
13ed9c038c Update blog source with new subsetting switch
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-03 23:36:46 +00:00
b728f3232f Add Daniel user group
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-03 23:04:36 +00:00
d2accabba8 Create a non-root user
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-03 23:00:15 +00:00
4b787e4798 Update blog with new article
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2026-01-01 05:32:04 +00:00
90946946af Disable registration on Gitea
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-30 08:14:28 +00:00
249472e6d0 Deploy Scylla
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-27 19:31:21 +00:00
d4576c6287 Migrate gitea instance to NixOS
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-27 03:39:41 +00:00
7e97c1a8d8 Update blog with new resume
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-27 00:22:16 +00:00
3479806db3 Upgrade to new NixOS, pin all packages' nixpkgs, update flake.lock
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-26 23:12:09 +00:00
2a42226f15 Update with latest lock file
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-12-26 21:02:53 +00:00
f611576c46 Update blog etc. again 2025-03-03 03:01:48 +00:00
96f7b952c6 Update nixpkgs and blog
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2025-03-02 21:46:40 +00:00
9ca21e7150 Update lock file
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2024-06-10 05:31:45 +00:00
6fa3ede34e Update blog flake 2024-05-20 07:41:09 +00:00
fc0ff8a586 Update flake.lock with new nixpkgs etc.
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2024-05-14 02:47:47 +00:00
355dc7cf9d Update to proper version of nix.package
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2024-05-14 02:45:47 +00:00
9e95e6c8d3 Set state version and update deprecated configuration
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-12-30 23:06:19 +00:00
2286867025 Pin the blog nixpkgs to the OS nixpkgs.
Easier to update Hugo this way.

Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-12-16 19:34:11 +00:00
ea0a65fd34 Update flake.lock to even later working version of packages
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-11-30 07:41:40 +00:00
7f510b654a Update flake.lock
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-11-30 07:18:20 +00:00
a527e746d9 Fix the CORS header for static.danilafe.com
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-11-30 07:17:20 +00:00
3888606d8c Host the static files required by the blog on a subdomain.
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-11-30 05:51:20 +00:00
28aad07d18 Add a swapfile. We run out of memory way too often.
Signed-off-by: Danila Fedorin <danila.fedorin@gmail.com>
2023-11-30 05:46:47 +00:00
4 changed files with 425 additions and 132 deletions

View File

@@ -1,4 +1,4 @@
{ pkgs, system, blog, ... }: { pkgs, system, blog, web-files, Scylla, ... }:
let let
productionSite = blog.english { productionSite = blog.english {
ssl = true; ssl = true;
@@ -8,7 +8,39 @@ let
drafts = true; drafts = true;
host = "drafts.danilafe.com"; host = "drafts.danilafe.com";
}; };
allVirtualHosts = map blog.virtualHostFor [productionSite draftSite]; webFiles = {
"static.danilafe.com" = {
root = web-files;
forceSSL = true;
enableACME = true;
locations."/" = {
extraConfig = ''
add_header 'Access-Control-Allow-Origin' '*';
'';
};
};
};
gitea = {
"dev.danilafe.com" = {
forceSSL = true;
enableACME = true;
locations."/".proxyPass = "http://localhost:3000/";
};
};
scylla = {
"scylla.danilafe.com" = {
root = Scylla;
addSSL = true;
enableACME = true;
locations."/static/" = {
tryFiles = "$uri =404";
};
locations."/" = {
tryFiles = "$uri $uri/ /index.html";
};
};
};
allVirtualHosts = [scylla gitea webFiles] ++ map blog.virtualHostFor [productionSite draftSite];
in in
{ {
imports = [ imports = [
@@ -16,8 +48,10 @@ in
./networking.nix # generated at runtime by nixos-infect ./networking.nix # generated at runtime by nixos-infect
]; ];
system.stateVersion = "24.05";
nix = { nix = {
package = pkgs.nixUnstable; package = pkgs.nixVersions.latest;
extraOptions = '' extraOptions = ''
experimental-features = nix-command flakes experimental-features = nix-command flakes
''; '';
@@ -27,13 +61,24 @@ in
git git
]; ];
boot.cleanTmpDir = true; boot.tmp.cleanOnBoot = true;
networking.hostName = "nixos-droplet-v2"; networking.hostName = "nixos-droplet-v2";
networking.firewall.allowPing = true; networking.firewall.allowPing = true;
networking.firewall.allowedTCPPorts = [ 22 80 443 ]; networking.firewall.allowedTCPPorts = [ 22 80 443 ];
users.groups.daniel = {};
users.users.daniel = {
isNormalUser = true;
group = "daniel";
extraGroups = [ "wheel" ];
packages = with pkgs; [
neovim
];
};
security.sudo.wheelNeedsPassword = false;
services.openssh.enable = true; services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [ users.users.daniel.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJXYJZfEOgccfCa3uQV9z2rHvGn4AuVnXbIDXv27HgEk vanilla@arch-xps" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJXYJZfEOgccfCa3uQV9z2rHvGn4AuVnXbIDXv27HgEk vanilla@arch-xps"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOzk0SnRBJhpfNpPBgkReQoDpul2Egl2yJhRw7ldYEzF NixOS" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOzk0SnRBJhpfNpPBgkReQoDpul2Egl2yJhRw7ldYEzF NixOS"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAoyFSuik6XRU2b+O4v9C1bc7rKJyjKgzUeaBaVNQKN6 vanilla-pinebook" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAoyFSuik6XRU2b+O4v9C1bc7rKJyjKgzUeaBaVNQKN6 vanilla-pinebook"
@@ -49,10 +94,51 @@ in
services.nginx = { services.nginx = {
enable = true; enable = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
recommendedBrotliSettings = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = pkgs.lib.mkMerge allVirtualHosts; virtualHosts = pkgs.lib.mkMerge allVirtualHosts;
}; };
users.groups.gitea = {};
users.users.gitea = {
group = "gitea";
isSystemUser = true;
};
services.gitea = {
enable = true;
appName = "Daniel's Tiny Cup Of Tea";
stateDir = "/var/lib/gitea";
# Default database settings (sqlite3, 127.0.0.1, path) all what we want
database = {};
# Default server settings are fine, except we need to customize domain etc.
settings.server = {
DOMAIN = "dev.danilafe.com";
ROOT_URL = "https://dev.danilafe.com";
OFFLINE_MODE = false;
# STATIC_ROOT_PATH = "/var/lib/gitea/data";
};
settings.service = {
DISABLE_REGISTRATION = true;
};
# NixOS service overrides cookies to insecure, but Gitea default is secure
settings.session = {
COOKIE_SECURE = true;
PROVIDER = "file";
};
settings.security = {
INSTALL_LOCK = true;
};
settings.indexer = {
REPO_INDEXER_ENABLED = true;
};
};
users.defaultUserShell = pkgs.zsh; users.defaultUserShell = pkgs.zsh;
programs.zsh.enable = true; programs.zsh.enable = true;
programs.zsh.ohMyZsh = { programs.zsh.ohMyZsh = {

439
flake.lock generated
View File

@@ -1,19 +1,89 @@
{ {
"nodes": { "nodes": {
"Scylla": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1766862133,
"narHash": "sha256-//tElNDA44kTCRNS8MzBdXA4uCwEfLHI/NVw9PtmLDs=",
"ref": "refs/heads/master",
"rev": "38968c3247945ba99718d7564163f8bf685756c5",
"revCount": 168,
"type": "git",
"url": "https://dev.danilafe.com/Matrix-Programs/Scylla.git"
},
"original": {
"type": "git",
"url": "https://dev.danilafe.com/Matrix-Programs/Scylla.git"
}
},
"bergamot-elm": {
"inputs": {
"flake-utils": "flake-utils_4",
"nixpkgs": [
"blog",
"web-files",
"nixpkgs"
]
},
"locked": {
"lastModified": 1766788208,
"narHash": "sha256-/P3uz+VNeNOFzI2qSIijy53MpnejO1sWgB+gMqcI2z0=",
"ref": "main",
"rev": "ceca48840efe668fb033b47bc6e415ea4cf9ae85",
"revCount": 97,
"type": "git",
"url": "https://dev.danilafe.com/Everything-I-Know-About-Types/bergamot-elm.git"
},
"original": {
"ref": "main",
"type": "git",
"url": "https://dev.danilafe.com/Everything-I-Know-About-Types/bergamot-elm.git"
}
},
"bergamot-elm_2": {
"inputs": {
"flake-utils": "flake-utils_6",
"nixpkgs": [
"web-files",
"nixpkgs"
]
},
"locked": {
"lastModified": 1766788208,
"narHash": "sha256-/P3uz+VNeNOFzI2qSIijy53MpnejO1sWgB+gMqcI2z0=",
"ref": "main",
"rev": "ceca48840efe668fb033b47bc6e415ea4cf9ae85",
"revCount": 97,
"type": "git",
"url": "https://dev.danilafe.com/Everything-I-Know-About-Types/bergamot-elm.git"
},
"original": {
"ref": "main",
"type": "git",
"url": "https://dev.danilafe.com/Everything-I-Know-About-Types/bergamot-elm.git"
}
},
"blog": { "blog": {
"inputs": { "inputs": {
"blog-source": "blog-source", "blog-source": "blog-source",
"flake-utils": "flake-utils", "flake-utils": "flake-utils_2",
"katex-html": "katex-html", "nixpkgs": [
"nixpkgs": "nixpkgs_3", "nixpkgs"
"resume": "resume" ],
"resume": "resume",
"web-files": "web-files"
}, },
"locked": { "locked": {
"lastModified": 1681181670, "lastModified": 1767492562,
"narHash": "sha256-MsoGEzIKZHUjPAGzyADR/yROxarBWqUbZJdlX3vKm6Q=", "narHash": "sha256-kmiIK8DybOUh9IQUFWIimGBogoouNDIUsgSF4m88Giw=",
"ref": "master", "ref": "refs/heads/master",
"rev": "ab4b92d031a4d46ad59f49e33f39e9d2ef7041f9", "rev": "b469d78d1abb031d6ee710481c8591e037d2b44b",
"revCount": 116, "revCount": 225,
"type": "git", "type": "git",
"url": "https://dev.danilafe.com/Nix-Configs/blog-static-flake.git" "url": "https://dev.danilafe.com/Nix-Configs/blog-static-flake.git"
}, },
@@ -25,11 +95,11 @@
"blog-source": { "blog-source": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1681105957, "lastModified": 1767492531,
"narHash": "sha256-9cjA5X5ZP4FkT48L2kHoujyB9l4WRnagdo5Sa+mKxHY=", "narHash": "sha256-129XwekGf9FULizZzS/HfxF12QQHrGeCWYGeCx3uZOg=",
"ref": "master", "ref": "refs/heads/master",
"rev": "a71c0c4e74d881af8631b17947ebe4bcb5c4ce0e", "rev": "a6f3cd3f9ad58c73585dce0fda50e60d8e2194dc",
"revCount": 634, "revCount": 925,
"submodules": true, "submodules": true,
"type": "git", "type": "git",
"url": "https://dev.danilafe.com/Web-Projects/blog-static.git" "url": "https://dev.danilafe.com/Web-Projects/blog-static.git"
@@ -41,12 +111,15 @@
} }
}, },
"flake-utils": { "flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": { "locked": {
"lastModified": 1648297722, "lastModified": 1731533236,
"narHash": "sha256-W+qlPsiZd8F3XkzXOzAoR+mpFqzm3ekQkJNa+PIh1BQ=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "0f8662f1319ad6abf89b3380dd2722369fc51ade", "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -56,12 +129,15 @@
} }
}, },
"flake-utils_2": { "flake-utils_2": {
"inputs": {
"systems": "systems_2"
},
"locked": { "locked": {
"lastModified": 1648297722, "lastModified": 1731533236,
"narHash": "sha256-W+qlPsiZd8F3XkzXOzAoR+mpFqzm3ekQkJNa+PIh1BQ=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "0f8662f1319ad6abf89b3380dd2722369fc51ade", "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -71,12 +147,15 @@
} }
}, },
"flake-utils_3": { "flake-utils_3": {
"inputs": {
"systems": "systems_3"
},
"locked": { "locked": {
"lastModified": 1648297722, "lastModified": 1731533236,
"narHash": "sha256-W+qlPsiZd8F3XkzXOzAoR+mpFqzm3ekQkJNa+PIh1BQ=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "0f8662f1319ad6abf89b3380dd2722369fc51ade", "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -86,12 +165,15 @@
} }
}, },
"flake-utils_4": { "flake-utils_4": {
"inputs": {
"systems": "systems_4"
},
"locked": { "locked": {
"lastModified": 1676283394, "lastModified": 1731533236,
"narHash": "sha256-XX2f9c3iySLCw54rJ/CZs+ZK6IQy7GXNY4nSOyu2QG4=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "3db36a8b464d0c4532ba1c7dda728f4576d6d073", "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -100,133 +182,90 @@
"type": "github" "type": "github"
} }
}, },
"katex-html": { "flake-utils_5": {
"inputs": { "inputs": {
"flake-utils": "flake-utils_2", "systems": "systems_5"
"katex-server": "katex-server",
"nixpkgs": "nixpkgs_2"
}, },
"locked": { "locked": {
"lastModified": 1666145450, "lastModified": 1731533236,
"narHash": "sha256-1hE7YoOyycdtjY25iTokG2qUtwTMd2uRDM6nIo1PJhw=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"ref": "master", "owner": "numtide",
"rev": "66dc28eca710d237cccad37e0f6c8555a725d409", "repo": "flake-utils",
"revCount": 14, "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "git", "type": "github"
"url": "https://dev.danilafe.com/Nix-Configs/katex-html"
}, },
"original": { "original": {
"type": "git", "owner": "numtide",
"url": "https://dev.danilafe.com/Nix-Configs/katex-html" "repo": "flake-utils",
"type": "github"
} }
}, },
"katex-server": { "flake-utils_6": {
"inputs": { "inputs": {
"flake-utils": "flake-utils_3", "systems": "systems_6"
"nixpkgs": "nixpkgs"
}, },
"locked": { "locked": {
"lastModified": 1666145384, "lastModified": 1731533236,
"narHash": "sha256-kpHv3EawXzyR1mRX4joIqqZDYz//xyUMtGMsmJk3YuE=", "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"ref": "master", "owner": "numtide",
"rev": "cce6cf6a9458537ff1cb08dd8dad4f8460060f76", "repo": "flake-utils",
"revCount": 7, "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "git", "type": "github"
"url": "https://dev.danilafe.com/Nix-Configs/katex-server"
}, },
"original": { "original": {
"type": "git", "owner": "numtide",
"url": "https://dev.danilafe.com/Nix-Configs/katex-server" "repo": "flake-utils",
"type": "github"
}
},
"flake-utils_7": {
"inputs": {
"systems": "systems_7"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
} }
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1648444094, "lastModified": 1766736597,
"narHash": "sha256-2liapKh7WXPHELuzLvYK+464g4w9tr9DbNxGuz8XZ98=", "narHash": "sha256-BASnpCLodmgiVn0M1MU2Pqyoz0aHwar/0qLkp7CjvSQ=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "87c74b8120980461a9d4ce8f341551ce0fb50728", "rev": "f560ccec6b1116b22e6ed15f4c510997d99d5852",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "ref": "nixos-25.11",
"type": "github"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1648444094,
"narHash": "sha256-2liapKh7WXPHELuzLvYK+464g4w9tr9DbNxGuz8XZ98=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "87c74b8120980461a9d4ce8f341551ce0fb50728",
"type": "github"
},
"original": {
"owner": "nixos",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1648444094,
"narHash": "sha256-2liapKh7WXPHELuzLvYK+464g4w9tr9DbNxGuz8XZ98=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "87c74b8120980461a9d4ce8f341551ce0fb50728",
"type": "github"
},
"original": {
"owner": "nixos",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1676718858,
"narHash": "sha256-giQecvcifVLNHCC9lMfTGP09tNxXhOMw+d/aql7MhRw=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "e6d5772f3515b8518d50122471381feae7cbae36",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-22.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_5": {
"locked": {
"lastModified": 1648069223,
"narHash": "sha256-BXzQV8p/RR440EB9qY0ULYfTH0zSW1stjUCYeP4SF+E=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "1d08ea2bd83abef174fb43cbfb8a856b8ef2ce26",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
}, },
"resume": { "resume": {
"inputs": { "inputs": {
"flake-utils": "flake-utils_4", "flake-utils": "flake-utils_3",
"nixpkgs": "nixpkgs_4" "nixpkgs": [
"blog",
"nixpkgs"
]
}, },
"locked": { "locked": {
"lastModified": 1676875551, "lastModified": 1766794825,
"narHash": "sha256-DIcIlMWh9exQIXISxgnS25egwIquyuZX+UqdTMJpJZA=", "narHash": "sha256-+Fabo0uQF9srEXdi9TB1wjB+PHaU9htXj/fjnvUFNAs=",
"ref": "master", "ref": "refs/heads/master",
"rev": "36fcd6d66fe2031d7429f8d60d5f83d64fd94cca", "rev": "f22cb5b79580020079ba7223346e612b41eb7d42",
"revCount": 47, "revCount": 74,
"type": "git", "type": "git",
"url": "https://dev.danilafe.com/DanilaFe/resume" "url": "https://dev.danilafe.com/DanilaFe/resume"
}, },
@@ -237,8 +276,160 @@
}, },
"root": { "root": {
"inputs": { "inputs": {
"Scylla": "Scylla",
"blog": "blog", "blog": "blog",
"nixpkgs": "nixpkgs_5" "nixpkgs": "nixpkgs",
"web-files": "web-files_2"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_3": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_4": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_5": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_6": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_7": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"web-files": {
"inputs": {
"bergamot-elm": "bergamot-elm",
"flake-utils": "flake-utils_5",
"nixpkgs": [
"blog",
"nixpkgs"
]
},
"locked": {
"lastModified": 1766788330,
"narHash": "sha256-7Dx1g0fM/glKCBzo2ZgIwXyp5ASyG/Y7S5OPcltb3Os=",
"ref": "refs/heads/master",
"rev": "407b087a1d0042e04bbcc9333097decd9e776270",
"revCount": 14,
"type": "git",
"url": "https://dev.danilafe.com/Nix-Configs/web-files.git"
},
"original": {
"type": "git",
"url": "https://dev.danilafe.com/Nix-Configs/web-files.git"
}
},
"web-files_2": {
"inputs": {
"bergamot-elm": "bergamot-elm_2",
"flake-utils": "flake-utils_7",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1766788330,
"narHash": "sha256-7Dx1g0fM/glKCBzo2ZgIwXyp5ASyG/Y7S5OPcltb3Os=",
"ref": "refs/heads/master",
"rev": "407b087a1d0042e04bbcc9333097decd9e776270",
"revCount": 14,
"type": "git",
"url": "https://dev.danilafe.com/Nix-Configs/web-files.git"
},
"original": {
"type": "git",
"url": "https://dev.danilafe.com/Nix-Configs/web-files.git"
} }
} }
}, },

View File

@@ -1,16 +1,26 @@
{ {
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
blog.url = "git+https://dev.danilafe.com/Nix-Configs/blog-static-flake.git"; blog.url = "git+https://dev.danilafe.com/Nix-Configs/blog-static-flake.git";
blog.inputs.nixpkgs.follows = "nixpkgs";
web-files.url = "git+https://dev.danilafe.com/Nix-Configs/web-files.git";
web-files.inputs.nixpkgs.follows = "nixpkgs";
Scylla.url = "git+https://dev.danilafe.com/Matrix-Programs/Scylla.git";
Scylla.inputs.nixpkgs.follows = "nixpkgs";
}; };
outputs = { self, nixpkgs, blog }: outputs = { self, nixpkgs, blog, web-files, Scylla }:
let let
system = "x86_64-linux"; system = "x86_64-linux";
in in
{ {
nixosConfigurations.nixos-droplet-v2 = nixpkgs.lib.nixosSystem { nixosConfigurations.nixos-droplet-v2 = nixpkgs.lib.nixosSystem {
inherit system; inherit system;
specialArgs = { inherit system; blog = blog.lib."${system}"; }; specialArgs = {
inherit system;
blog = blog.lib."${system}";
web-files = web-files.defaultPackage."${system}";
Scylla = Scylla.defaultPackage."${system}";
};
modules = [ ./configuration.nix ]; modules = [ ./configuration.nix ];
}; };
}; };

View File

@@ -3,4 +3,10 @@
imports = [ "${modulesPath}/profiles/qemu-guest.nix" ]; imports = [ "${modulesPath}/profiles/qemu-guest.nix" ];
boot.loader.grub.device = "/dev/vda"; boot.loader.grub.device = "/dev/vda";
fileSystems."/" = { device = "/dev/vda1"; fsType = "ext4"; }; fileSystems."/" = { device = "/dev/vda1"; fsType = "ext4"; };
swapDevices = [
{
device = "/var/lib/swapfile";
size = 2*1024;
}
];
} }