diff --git a/.forgejo/workflows/deploy-rs.yml b/.forgejo/workflows/deploy-rs.yml index b797765d..ceb177e7 100644 --- a/.forgejo/workflows/deploy-rs.yml +++ b/.forgejo/workflows/deploy-rs.yml @@ -1,3 +1,5 @@ +# yamllint disable rule:line-length rule:truthy +--- name: deploy-rs run-name: ${{ github.actor }} - deploy-rs on: @@ -14,110 +16,110 @@ jobs: image: ubuntu:24.04 options: --mount type=bind,src=/dev/net/tun,dst=/dev/net/tun --privileged steps: - - name: "Runner: Info" - run: | - set -x - pwd - ls -lah - id - uname -a - hostname - cat /etc/os-release - whoami - id - cat /etc/resolv.conf + - name: "Runner: Info" + run: | + set -x + pwd + ls -lah + id + uname -a + hostname + cat /etc/os-release + whoami + id + cat /etc/resolv.conf - - name: "Setup: Runner" - run: - apt update -y - apt install git nodejs nix-bin sudo curl -y - git config --global user.email "${{github.actor}}" - git config --global user.name "Forgejo Runner" - echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts + - name: "Setup: Runner" + run: + apt update -y + apt install git nodejs nix-bin sudo curl -y + git config --global user.email "${{github.actor}}" + git config --global user.name "Forgejo Runner" + echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts - - name: "Setup: Tailscale Repo" - run: | - mkdir -p --mode=0755 /usr/share/keyrings - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list - apt update -y - apt install tailscale -y + - name: "Setup: Tailscale Repo" + run: | + mkdir -p --mode=0755 /usr/share/keyrings + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list + apt update -y + apt install tailscale -y - - name: "Setup: SSH" - run: | - rm -rf /root/.ssh - mkdir /root/.ssh - echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub - echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 - chmod 700 /root/.ssh - chmod 600 /root/.ssh/id_ed25519 - chmod 644 /root/.ssh/id_ed25519.pub + - name: "Setup: SSH" + run: | + rm -rf /root/.ssh + mkdir /root/.ssh + echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub + echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 + chmod 700 /root/.ssh + chmod 600 /root/.ssh/id_ed25519 + chmod 644 /root/.ssh/id_ed25519.pub - - name: "Setup: Headscale Network" - run: | - echo "tailscaled --cleanup" - sudo tailscaled --cleanup - echo "" - echo "tailscaled --state=mem 2> ~/tailscaled.log &" - sudo tailscaled --state=mem: 2> ~/tailscaled.log & - echo "" - echo "tailscale up" - sudo tailscale up \ - --login-server=https://headscale.sysctl.io \ - --accept-routes \ - --accept-dns \ - --authkey ${{ secrets.TAILSCALE_KEY }} \ - --hostname forgejo-runner \ - --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" - sudo tailscale status - sudo tailscale netcheck + - name: "Setup: Headscale Network" + run: | + echo "tailscaled --cleanup" + sudo tailscaled --cleanup + echo "" + echo "tailscaled --state=mem 2> ~/tailscaled.log &" + sudo tailscaled --state=mem: 2> ~/tailscaled.log & + echo "" + echo "tailscale up" + sudo tailscale up \ + --login-server=https://headscale.sysctl.io \ + --accept-routes \ + --accept-dns \ + --authkey ${{ secrets.TAILSCALE_KEY }} \ + --hostname forgejo-runner \ + --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" + sudo tailscale status + sudo tailscale netcheck - - name: "nixos-version (Pre)" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ - " - nixos-version - " + - name: "nixos-version (Pre)" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ + " + nixos-version + " - - name: "SSH and Deploy" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ - " - set -x - eval (ssh-agent -c) - ssh-add - env | grep SSH - cd /etc/nixos/git - git pull - ssh -qA osaka-linode-01 'sudo systemctl restart podman-derp' - ssh -qA frankfurt-linode-01 'sudo systemctl restart podman-derp' - ssh -qA milan-linode-01 'sudo systemctl restart podman-derp' - ssh -qA warsaw-ovh-01 'sudo systemctl restart container@rdesktop' - sleep 30 - deploy -sd - " + - name: "SSH and Deploy" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ + " + set -x + eval (ssh-agent -c) + ssh-add + env | grep SSH + cd /etc/nixos/git + git pull + ssh -qA osaka-linode-01 'sudo systemctl restart podman-derp' + ssh -qA frankfurt-linode-01 'sudo systemctl restart podman-derp' + ssh -qA milan-linode-01 'sudo systemctl restart podman-derp' + ssh -qA warsaw-ovh-01 'sudo systemctl restart container@rdesktop' + sleep 30 + deploy -sd + " - - name: "nixos-version (Post)" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ - " - nixos-version - " - tailscale down + - name: "nixos-version (Post)" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ + " + nixos-version + " + tailscale down - - if: success() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] NixOS Deployed' - notification_message: 'Deployment completed successfully.' - name: "Send Notification - Success" - - if: failure() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Deployment Failed' - notification_message: 'Your deployment has failed. Check Forgejo.' - name: "Send Notification - Failure" + - if: success() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] NixOS Deployed' + notification_message: 'Deployment completed successfully.' + name: "Send Notification - Success" + - if: failure() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Deployment Failed' + notification_message: 'Your deployment has failed. Check Forgejo.' + name: "Send Notification - Failure" diff --git a/.forgejo/workflows/update-flake-lock.yml b/.forgejo/workflows/update-flake-lock.yml index 533d34aa..772e3b4f 100644 --- a/.forgejo/workflows/update-flake-lock.yml +++ b/.forgejo/workflows/update-flake-lock.yml @@ -1,3 +1,5 @@ +# yamllint disable rule:line-length rule:truthy +--- name: update-flake-lock run-name: ${{ github.actor }} - update-flake-lock on: @@ -9,109 +11,109 @@ on: jobs: update-flake-lock: runs-on: ubuntu - container: + container: image: ubuntu:24.04 options: --mount type=bind,src=/dev/net/tun,dst=/dev/net/tun --privileged steps: - - name: "Runner: Info" - run: | - set -x - pwd - ls -lah - id - uname -a - hostname - cat /etc/os-release - whoami - id - cat /etc/resolv.conf + - name: "Runner: Info" + run: | + set -x + pwd + ls -lah + id + uname -a + hostname + cat /etc/os-release + whoami + id + cat /etc/resolv.conf - - name: "Setup: Runner" - run: | - apt update -y - apt install git nodejs nix-bin sudo curl -y - git config --global user.email "${{github.actor}}" - git config --global user.name "Forgejo Runner" - echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts + - name: "Setup: Runner" + run: | + apt update -y + apt install git nodejs nix-bin sudo curl -y + git config --global user.email "${{github.actor}}" + git config --global user.name "Forgejo Runner" + echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts - - name: "Setup: Tailscale Repo" - run: | - mkdir -p --mode=0755 /usr/share/keyrings - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list - apt update -y - apt install tailscale -y - - - name: "Setup: SSH" - run: | - rm -rf /root/.ssh - mkdir /root/.ssh - echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub - echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 - chmod 700 /root/.ssh - chmod 600 /root/.ssh/id_ed25519 - chmod 644 /root/.ssh/id_ed25519.pub + - name: "Setup: Tailscale Repo" + run: | + mkdir -p --mode=0755 /usr/share/keyrings + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list + apt update -y + apt install tailscale -y - - name: "Setup: Headscale Network" - run: | - echo "tailscaled --cleanup" - sudo tailscaled --cleanup - echo "" - echo "tailscaled --state=mem 2> ~/tailscaled.log &" - sudo tailscaled --state=mem: 2> ~/tailscaled.log & - echo "" - echo "tailscale up" - sudo tailscale up \ - --login-server=https://headscale.sysctl.io \ - --accept-routes \ - --accept-dns \ - --authkey ${{ secrets.TAILSCALE_KEY }} \ - --hostname forgejo-runner \ - --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" - sudo tailscale status - sudo tailscale netcheck + - name: "Setup: SSH" + run: | + rm -rf /root/.ssh + mkdir /root/.ssh + echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub + echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 + chmod 700 /root/.ssh + chmod 600 /root/.ssh/id_ed25519 + chmod 644 /root/.ssh/id_ed25519.pub + + - name: "Setup: Headscale Network" + run: | + echo "tailscaled --cleanup" + sudo tailscaled --cleanup + echo "" + echo "tailscaled --state=mem 2> ~/tailscaled.log &" + sudo tailscaled --state=mem: 2> ~/tailscaled.log & + echo "" + echo "tailscale up" + sudo tailscale up \ + --login-server=https://headscale.sysctl.io \ + --accept-routes \ + --accept-dns \ + --authkey ${{ secrets.TAILSCALE_KEY }} \ + --hostname forgejo-runner \ + --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" + sudo tailscale status + sudo tailscale netcheck - - name: "SSH and Update / Check" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ - " - set -x - eval (ssh-agent -c) - ssh-add - env | grep SSH - cd /etc/nixos/git - git pull - nix flake update - nix flake check --show-trace - " + - name: "SSH and Update / Check" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ + " + set -x + eval (ssh-agent -c) + ssh-add + env | grep SSH + cd /etc/nixos/git + git pull + nix flake update + nix flake check --show-trace + " - - if: success() - name: "Sucess: Git Commit & Push" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ - " - set -x - eval (ssh-agent -c) - ssh-add - env | grep SSH - cd /etc/nixos/git - git -c commit.gpgsign=false commit -am '[ACTIONS] Flake Update (`date +%Y-%m-%d`)' \ - && git push - " + - if: success() + name: "Sucess: Git Commit & Push" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@warsaw-ovh-01 \ + " + set -x + eval (ssh-agent -c) + ssh-add + env | grep SSH + cd /etc/nixos/git + git -c commit.gpgsign=false commit -am '[ACTIONS] Flake Update (`date +%Y-%m-%d`)' \ + && git push + " - - if: success() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] NixOS Flake Updated' - notification_message: 'Build completed successfully.' - - if: failure() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Build Failed' - notification_message: 'Your build has failed. Check Forgejo.' - name: "Send Notification" + - if: success() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] NixOS Flake Updated' + notification_message: 'Build completed successfully.' + - if: failure() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Build Failed' + notification_message: 'Your build has failed. Check Forgejo.' + name: "Send Notification" diff --git a/.forgejo/workflows/update-steamdeck.yml b/.forgejo/workflows/update-steamdeck.yml index 1f3ae677..39a50358 100644 --- a/.forgejo/workflows/update-steamdeck.yml +++ b/.forgejo/workflows/update-steamdeck.yml @@ -1,4 +1,5 @@ - +# yamllint disable rule:line-length rule:truthy +--- name: update-steamdeck run-name: ${{ github.actor }} - update-steamdeck on: @@ -15,106 +16,106 @@ jobs: image: ubuntu:23.10 options: --mount type=bind,src=/dev/net/tun,dst=/dev/net/tun --privileged steps: - - name: "Runner: Info" - run: | - set -x - pwd - ls -lah - id - uname -a - hostname - cat /etc/os-release - whoami - id - cat /etc/resolv.conf + - name: "Runner: Info" + run: | + set -x + pwd + ls -lah + id + uname -a + hostname + cat /etc/os-release + whoami + id + cat /etc/resolv.conf - - name: "Setup: Runner" - run: | - apt update -y - apt install git nodejs nix-bin sudo sudo curl -y - git config user.email "${{github.actor}}" - git config user.name "Forgejo Runner" - echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts + - name: "Setup: Runner" + run: | + apt update -y + apt install git nodejs nix-bin sudo sudo curl -y + git config user.email "${{github.actor}}" + git config user.name "Forgejo Runner" + echo "100.64.0.13 gotify.sysctl.io" >> /etc/hosts - - name: "Setup: Tailscale Repo" - run: | - mkdir -p --mode=0755 /usr/share/keyrings - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null - curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list - apt update -y - apt install tailscale -y - - - name: "Setup: SSH" - run: | - rm -rf /root/.ssh - mkdir /root/.ssh - echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub - echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 - chmod 700 /root/.ssh - chmod 600 /root/.ssh/id_ed25519 - chmod 644 /root/.ssh/id_ed25519.pub - echo "Public Key: " - cat /root/.ssh/id_ed25519.pub + - name: "Setup: Tailscale Repo" + run: | + mkdir -p --mode=0755 /usr/share/keyrings + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null + curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/lunar.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list + apt update -y + apt install tailscale -y - - name: "Setup: Headscale Network" - run: | - echo "tailscaled --cleanup" - sudo tailscaled --cleanup - echo "" - echo "tailscaled --state=mem 2> ~/tailscaled.log &" - sudo tailscaled --state=mem: 2> ~/tailscaled.log & - echo "" - echo "tailscale up" - sudo tailscale up \ - --login-server=https://headscale.sysctl.io \ - --accept-routes \ - --accept-dns \ - --authkey ${{ secrets.TAILSCALE_KEY }} \ - --hostname forgejo-runner \ - --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" - sudo tailscale status - sudo tailscale netcheck + - name: "Setup: SSH" + run: | + rm -rf /root/.ssh + mkdir /root/.ssh + echo "${{ secrets.SSH_PUBLIC_KEY }}" > /root/.ssh/id_ed25519.pub + echo "${{ secrets.SSH_PRIVATE_KEY }}" > /root/.ssh/id_ed25519 + chmod 700 /root/.ssh + chmod 600 /root/.ssh/id_ed25519 + chmod 644 /root/.ssh/id_ed25519.pub + echo "Public Key: " + cat /root/.ssh/id_ed25519.pub - - name: "nixos-version (Pre)" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@steamdeck \ - " - nixos-version - " + - name: "Setup: Headscale Network" + run: | + echo "tailscaled --cleanup" + sudo tailscaled --cleanup + echo "" + echo "tailscaled --state=mem 2> ~/tailscaled.log &" + sudo tailscaled --state=mem: 2> ~/tailscaled.log & + echo "" + echo "tailscale up" + sudo tailscale up \ + --login-server=https://headscale.sysctl.io \ + --accept-routes \ + --accept-dns \ + --authkey ${{ secrets.TAILSCALE_KEY }} \ + --hostname forgejo-runner \ + --advertise-tags "tag:forgejo,tag:container,tag:ephemeral" + sudo tailscale status + sudo tailscale netcheck - - name: "SSH and Deploy" - run: | - ssh -o StrictHostKeyChecking=no albert@steamdeck \ - " - set -x - source ~/.config/fish/config.fish - cd /etc/nixos/git - git pull - sudo nixos-rebuild switch --flake /etc/nixos/git - home-manager switch -b backup --flake /etc/nixos/git - " + - name: "nixos-version (Pre)" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@steamdeck \ + " + nixos-version + " - - name: "nixos-version (Post)" - run: | - ssh -q -A -o StrictHostKeyChecking=no albert@steamdeck \ - " - nixos-version - " - tailscale down + - name: "SSH and Deploy" + run: | + ssh -o StrictHostKeyChecking=no albert@steamdeck \ + " + set -x + source ~/.config/fish/config.fish + cd /etc/nixos/git + git pull + sudo nixos-rebuild switch --flake /etc/nixos/git + home-manager switch -b backup --flake /etc/nixos/git + " - - if: success() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Steam Deck Updated' - notification_message: 'Deployment completed successfully.' - name: "Send Notification - Success" - - if: failure() - uses: https://git.sysctl.io/actions/gotify-action@master - with: - gotify_api_base: '${{ secrets.GOTIFY_URL }}' - gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' - notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Deployment Failed' - notification_message: 'Your deployment has failed. Check Forgejo.' - name: "Send Notification - Failure" + - name: "nixos-version (Post)" + run: | + ssh -q -A -o StrictHostKeyChecking=no albert@steamdeck \ + " + nixos-version + " + tailscale down + + - if: success() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Steam Deck Updated' + notification_message: 'Deployment completed successfully.' + name: "Send Notification - Success" + - if: failure() + uses: https://git.sysctl.io/actions/gotify-action@master + with: + gotify_api_base: '${{ secrets.GOTIFY_URL }}' + gotify_app_token: '${{ secrets.GOTIFY_TOKEN }}' + notification_title: '[ ${{ github.repository }}: ${{ github.workflow }} ] Deployment Failed' + notification_message: 'Your deployment has failed. Check Forgejo.' + name: "Send Notification - Failure" diff --git a/home-manager/common/software/cli/atuin.nix b/home-manager/common/software/cli/atuin.nix index 8fa2adfb..40ed552b 100644 --- a/home-manager/common/software/cli/atuin.nix +++ b/home-manager/common/software/cli/atuin.nix @@ -1,4 +1,4 @@ -{ config, username, ... }: { +{ ... }: { programs.atuin = { enable = true; enableBashIntegration = true; diff --git a/nixos/common/packages/default.nix b/nixos/common/packages/default.nix index 381268aa..1d2ad80f 100644 --- a/nixos/common/packages/default.nix +++ b/nixos/common/packages/default.nix @@ -1,4 +1,4 @@ -{ inputs, pkgs, system, ... }: { +{ pkgs, ... }: { imports = [ ./small.nix ]; # List packages installed in system profile diff --git a/nixos/hosts/nuc-server/default.nix b/nixos/hosts/nuc-server/default.nix index 44865351..4e386206 100644 --- a/nixos/hosts/nuc-server/default.nix +++ b/nixos/hosts/nuc-server/default.nix @@ -1,4 +1,4 @@ -{ inputs, config, lib, pkgs, modulesPath, hostname, username, system, ... }: { +{ inputs, config, lib, modulesPath, system, ... }: { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ../../common/services/tailscale-autoconnect.nix