diff --git a/flake.nix b/flake.nix index 095a2f4..1a3e2b4 100644 --- a/flake.nix +++ b/flake.nix @@ -58,6 +58,7 @@ }; bengal = { }; + ocelot = { }; }; nixosConfigurations = { diff --git a/hosts/ocelot/default.nix b/hosts/ocelot/default.nix new file mode 100644 index 0000000..15781b8 --- /dev/null +++ b/hosts/ocelot/default.nix @@ -0,0 +1,13 @@ +{ ... }: { + imports = [ + ./hardware-configuration.nix + ]; + + cherrykitten.graphical = false; + + boot.tmp.cleanOnBoot = true; + zramSwap.enable = true; + networking.hostName = "ocelot"; + networking.domain = ""; + system.stateVersion = "23.11"; +} diff --git a/hosts/ocelot/hardware-configuration.nix b/hosts/ocelot/hardware-configuration.nix new file mode 100644 index 0000000..4a04950 --- /dev/null +++ b/hosts/ocelot/hardware-configuration.nix @@ -0,0 +1,39 @@ +{ modulesPath, lib, ... }: { + imports = [ (modulesPath + "/profiles/qemu-guest.nix") ]; + boot.loader.grub.device = "/dev/sda"; + boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "xen_blkfront" "vmw_pvscsi" ]; + boot.initrd.kernelModules = [ "nvme" ]; + fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; + + + networking = { + nameservers = [ + "8.8.8.8" + ]; + defaultGateway = "172.31.1.1"; + defaultGateway6 = { + address = "fe80::1"; + interface = "eth0"; + }; + dhcpcd.enable = false; + usePredictableInterfaceNames = lib.mkForce false; + interfaces = { + eth0 = { + ipv4.addresses = [ + { address = "128.140.109.125"; prefixLength = 32; } + ]; + ipv6.addresses = [ + { address = "2a01:4f8:c2c:bd32::1"; prefixLength = 64; } + { address = "fe80::9400:3ff:fe24:677a"; prefixLength = 64; } + ]; + ipv4.routes = [{ address = "172.31.1.1"; prefixLength = 32; }]; + ipv6.routes = [{ address = "fe80::1"; prefixLength = 128; }]; + }; + + }; + }; + services.udev.extraRules = '' + ATTR{address}=="96:00:03:24:67:7a", NAME="eth0" + ''; + +} diff --git a/users/common/ssh.nix b/users/common/ssh.nix index 9a3a478..7078380 100644 --- a/users/common/ssh.nix +++ b/users/common/ssh.nix @@ -26,9 +26,9 @@ identitiesOnly = true; }; - "maine-coon" = { - host = "maine-coon"; - hostname = "159.69.71.253"; + "ocelot" = { + host = "ocelot"; + hostname = "128.140.109.125"; identityFile = "~/.ssh/yubikey.pub"; identitiesOnly = true; remoteForwards = [