chore: Flake | a bit of cleanup

This commit is contained in:
2025-02-04 00:01:53 +05:00
parent f098da3229
commit a9fb51279a
3 changed files with 17 additions and 16 deletions

View File

@@ -43,11 +43,6 @@
outputs = {
self,
nixpkgs,
home-manager,
disko,
lanzaboote,
nixos-hardware,
sops-nix,
...
} @ inputs:
let
@@ -60,10 +55,10 @@
"${host}" = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
lanzaboote.nixosModules.lanzaboote
disko.nixosModules.disko
nixos-hardware.nixosModules.framework-13-7040-amd
sops-nix.nixosModules.sops
inputs.lanzaboote.nixosModules.lanzaboote
inputs.disko.nixosModules.disko
inputs.nixos-hardware.nixosModules.framework-13-7040-amd
inputs.sops-nix.nixosModules.sops
./nixos/configuration.nix
./nixos/disko-config.nix
./nixos/hardware-configuration.nix
@@ -76,7 +71,7 @@
};
homeConfigurations = {
"${user}" = home-manager.lib.homeManagerConfiguration {
"${user}" = inputs.home-manager.lib.homeManagerConfiguration {
inherit pkgs;
modules = [ ./home-manager/home.nix ];
};

View File

@@ -12,12 +12,13 @@ in
boot = {
loader = {
# Set this to true on first install. This must be false for secure boot.
systemd-boot.enable = lib.mkForce false;
systemd-boot.enable = true;
# systemd-boot.enable = lib.mkForce false;
efi.canTouchEfiVariables = true;
};
lanzaboote = {
enable = true;
enable = false;
pkiBundle = "/etc/secureboot";
};
};

View File

@@ -6,10 +6,15 @@
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
boot = {
initrd = {
availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "sd_mod" ];
kernelModules = [ ];
};
kernelModules = [ "kvm-amd" ];
extraModulePackages = [ ];
};
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's