Delete aidsbox

This commit is contained in:
Ciapa 2023-06-15 17:19:08 +00:00
parent 08efc4bca5
commit 2500171c72
8 changed files with 0 additions and 138 deletions

View File

@ -60,16 +60,6 @@
];
};
"kitty.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs self; };
modules = [
sops-nix.nixosModules.sops
./default.nix
./hosts/seedbox/kitty/configuration.nix
];
};
"rene.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs self; };
@ -157,19 +147,6 @@
};
};
"kitty.elmosco.lewd.wtf" = {
sshOpts = [ "-p" "22105" "-o" "StrictHostKeyChecking=no" ];
hostname = "kitty.elmosco.lewd.wtf";
fastConnection = true;
profiles.system = {
sshUser = "root";
path =
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."kitty.elmosco.lewd.wtf";
user = "root";
};
};
"rene.elmosco.lewd.wtf" = {
sshOpts = [ "-p" "22113" "-o" "StrictHostKeyChecking=no" ];
hostname = "rene.elmosco.lewd.wtf";

View File

@ -1,25 +0,0 @@
{ self, config, pkgs, lib, ... }:
let
utils = import ../../../util/include.nix { lib = lib; };
imports =
(utils.includeDir ./services) ++
[
./hardware-configuration.nix
./networking.nix
./users.nix
];
in
{
inherit imports;
networking.hostName = "kitty";
networking.domain = "elmosco.lewd.wtf";
boot.loader.grub = {
enable = true;
efiSupport = false;
devices = [ "/dev/sda" ];
};
system.stateVersion = "22.11";
}

View File

@ -1,18 +0,0 @@
{ modulesPath, ... }:
{
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
boot.kernelModules = [ "kvm-intel" ];
fileSystems."/" = {
device = "/dev/disk/by-label/nixos";
fsType = "ext4";
};
fileSystems."/home" = {
device = "/dev/disk/by-label/home";
fsType = "ext4";
};
services.qemuGuest.enable = true;
}

View File

@ -1,11 +0,0 @@
{ ... }:
{
networking.defaultGateway = "192.168.99.1";
networking.nameservers = [ "1.1.1.1" ];
networking.interfaces.ens18.ipv4.addresses = [
{
address = "192.168.99.105";
prefixLength = 24;
}
];
}

View File

@ -1,18 +0,0 @@
{
virtualisation.oci-containers.containers = {
filebrowser = {
image = "filebrowser/filebrowser:s6";
autoStart = true;
ports = [ "80:8080" ];
volumes = [
"/home/kitty:/home/kitty"
"/home/kitty/filebrowser/config:/config"
"/home/kitty/filebrowser/database:/database"
];
environment = {
PUID = "1000";
PGID = "994";
};
};
};
}

View File

@ -1,15 +0,0 @@
{
imports =
[
../../../../deployments/seedbox/qbittorrent/default.nix
];
variables.qbittorrent = {
user = "kitty";
group = "kitty";
torrentPort = 43991;
uiPort = 8888;
configDir = "/home/kitty";
openFilesLimit = 8192;
};
}

View File

@ -1,14 +0,0 @@
{ pkgs, ...}:
{
networking.firewall.allowedTCPPorts = [ 9000 ];
services.thelounge = {
enable = true;
public = false;
extraConfig = {
prefetch = true;
messageStorage = [ "sqlite" "text" ];
};
plugins = [ pkgs.theLoungePlugins.themes.solarized ];
};
}

View File

@ -1,14 +0,0 @@
{
users.groups.kitty = {};
users.users.kitty = {
group = "kitty";
isNormalUser = true;
home = "/home/kitty";
homeMode = "755";
createHome = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIERtfY26/h5xl+bzZm2htR4+Wd879DvZRPHsosFaEqIW gaming@DESKTOP-4ACM3JU"
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDQMGFxzIW62c1rudlhYOB9kKuzm3dZWu/PKh89GAtXccRz5Lq+AempZvuKX8LxvMoDsctocAmqKOfthQUUNP3rJtrEzyuEV7tpZ21oJ03ALW4uJUz306lsHoEjet6x2w83OmXp3p7bX+PphjVu83M2P6rO0QuWxSutoQRK/Zc09lSpJiSMqh8tH9rc7t3gBwhvhIRAWGBSjXBV0G5L+Ws8gGP+br5YhtHR39tq0EypV8ZfZs7Q8KQngioF+sX8ry0U0MNBC2ueTY0yGFpM1mE6OHW00gZPXxLb38oPvj2o76bMoI/jCqoX9C0YO1So6QM49Useiwxo2R6igDPYcT4r1g3Qdz5DXp1U/81qADxAl4IoeW6zMtrLXRAGa1qRlHA4HfOBjQShCdKbh0Vj927QPM2sSbVRngL7fNkUl19ChkA7HEMt8l446y9e84VCMpkYOBanUOZlpcGsn/TGlQVoWuk80ZgCt7fdP4JOHhmggvWiHhmJ4fDmSXxXQjRfL7k= kitty@fedora"
];
};
}