WMG2YNWEKFK4DMH3AZP5WSGJ4K66OUHXGK4KPHOW2JNU57DVS42QC GPT5VKSQPGJBZ7S3X3FCUFCL4VTEYY7XWLAQDT2SAAUIW3R7AFTQC THJLZSV3XR4IHRPZI57WECBG5C2326ZIAABAMXCCJMJWLSUU2H7QC IJL4O2Y2EO5HYTOB52ICAG7DIVVU5547SLSQT4EHBWSMIKOUPSIQC SSG24QP3C2K5NTVHM2QFK7RWBV7ZPZV2K2XOXUT6M6C4V5NXKQ6AC L4MIQLMFJTU6ICGZ4PH4ZKYMQ3HMZ5C2HXWD2OFF3QVNOBCII7ZAC RTBMBSBABSGTRICJ4AWBKWO3JJHBRKV6FGOMYPDD7X6SS6X35ZIQC WKTWJMZPPJXR7K6E7JZF42ORLVINJVC634G4SJKR5QBNO7UYTXBQC UBB7TTAXVPQQCOVHACKWXSPV2NPARSHREYJB6J3RSEDZZIXPFGOAC GOTKUZN2F5IGYBNWCMIFRHE7AOOF7BPHK6ZJKCTZVKJLWI5WJCMAC D6GISMV3ERTOKGO73ENCJO52U7PFNRFXQ4CC7ZCPLW7TAJSK2ZBAC QGBCI5OMIHDEXEJIO2BFCRRAQP4445DO2ZVWDU3FMEFUD6WWBKSQC HAJVDLU5KQ3CM5P6Z3SOIRHVUTU427EVFA4QHL56MQ3SDRZWK56AC V33E4VVWVODHSCFMHOPROK6FAI3UOROYASPDNDMJCIBDEYUHKXHAC ADJBSSJQYK6JNUKKP4AOQWLBIXR2DUMBRWTGXJKZASF6M2BSFYCQC EO6NBSIWQZ4MWHKHWLYLLRW3PIUWV33LSW5573EEAYSWONGELY3QC FKE6MKHWUXHJNYFZM4KN4BM4ZM73WQS4OIW4XV7WPOD2A3I76OCAC SJBGJVNSXEMBKQUEH7HTQ6JVP7CKCEH2L4GD5JS7TOWPOFLTIQZQC V2RX2Y7VB7Y3BHX3ALK4GTCMFJATMLCKIAT4U3XCYZZZIUBIIZ5QC TSX4OAMHBTCC3T6IK3HDNQYKI2GTW7PG7XFAGI2HOKIVLXK42G4AC ATF3K2KSKMI6STPROVW54ZGLYM6S3XPB45AKAZODDKIXFR4HWYFAC TIHOQEN2ITDF7YUSX4KZFXFIH2S6K2YWM4GCTHDA3HDCJ72L6SGQC QE55SHCRM4EPX5UKNQMPDSEGR33P3CNUU6IJCEHXRDSFEMG6FETQC QT43YZLQI5ZQSNKIZSESWRM6XUORC3EYWHQ2F4JPZHNPRANUNABQC YFOFEQL5K3ZABTXSB7WQIVVOK2B6AWT6VBBX3OFFFPU26WXJ6YJAC RJIISHE5VJHPYUNCDDMDELB3WAI4QRSGC62ZS7NL5I6A4LWDQFAQC 4XUXIGQGX6RHOWRRUXRBA4HZU6JWZLFVV775SDHXH6WNCL3IWZOQC letinherit (inputs.os.lib) mkMerge;inherit (inputs.os.lib.attrsets) optionalAttrs;specialArgs = { inherit inputs; };commonModules = with inputs.self.modules.nixos; [disable-nanodisable-nix-documentationdynamic-binarieshjemkeysliblocalenetrcnetworknix-settingsopensshpackagessecret-managersystemtailscalethemeunfreeusersvirtualisationyubikey];desktopModules = with inputs.self.modules.nixos; [audioboot-systemddesktop-guidesktop-toolsgammastepgraphicshardware-desktopjujutsu-extrakeyboardlinux-kernel-zenmousepackages-extra-desktoppower-menuprocess-managementquickshellrebuildrust-desktopscratchpadssudo-desktoptheme-extra-fontstheme-extra-scriptswaybarwindow-manager];serverModules = with inputs.self.modules.nixos; [forgejo-action-runnerlinux-kernelnix-distributed-buildsnix-distributed-builderprometheus-node-exportersudo-server];mkConfig =host: platform: type: rest:mkMerge [{network.hostName = host;inherit type platform;age.secrets = {id.rekeyFile = ../secrets/${host}-id.age;password.rekeyFile = ../secrets/${host}-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;nixStoreKey.rekeyFile = ../secrets/${host}-nix-store-key.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";};};unfree.allowedNames = ["claude-code""nvidia-x11""nvidia-settings""steam""steam-unwrapped"];}(optionalAttrs (type == "server") {forgejo-action-runner = {withDocker = true;labels = ["self-hosted:host""${host}:host""docpad-infra:host""ubuntu-22.04:docker://docker.gitea.com/runner-images:ubuntu-22.04"];};})rest];in
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [audioboot-systemddesktop-guidesktop-toolsdisable-nanodisable-nix-documentationdisks-normaldisks-extra-swapdisks-extra-zram-swapdynamic-binariesgamesgammastepgraphicshardware-desktophjemjujutsu-extrakeyboardkeysliblocalelinux-kernel-zenmousenetrcnetworknix-settingsobject-storageopensshpackagespackages-extra-desktoppower-menuprocess-managementquickshellrebuildrust-desktopscratchpadssecret-managersudo-desktopsystemtailscalethemetheme-extra-fontstheme-extra-scriptsunfreeusersvirtualisationwaybarwindow-manageryubikey{config = {platform = "x86_64-linux";type = "desktop";
inherit specialArgs;
network.hostName = "yuzu";unfree.allowedNames = ["claude-code""nvidia-x11""nvidia-settings""steam""steam-unwrapped"];age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFDLlddona4PlORWd+QpR/7F5H46/Dic9vV23/YSrZl0 root@yuzu";
modules =with inputs.self.modules.nixos;commonModules++ desktopModules++ [disks-normaldisks-extra-swapdisks-extra-zram-swapgamesobject-storage{config = mkConfig "yuzu" "x86_64-linux" "desktop" {age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFDLlddona4PlORWd+QpR/7F5H46/Dic9vV23/YSrZl0 root@yuzu";
age.secrets = {id.rekeyFile = ../secrets/yuzu-id.age;password.rekeyFile = ../secrets/yuzu-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;nixStoreKey.rekeyFile = ../secrets/yuzu-nix-store-key.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";};
system.stateVersion = "26.05";
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [audioboot-systemddesktop-guidesktop-toolsdisable-nanodisable-nix-documentationdisks-normaldisks-extra-swapdisks-extra-zram-swapdynamic-binariesgamesgammastepgraphicshardware-desktophjemjujutsu-extrakeyboardkeysliblocalelinux-kernel-zenmousenetrcnetworknix-settingsobject-storageopensshpackagespackages-extra-desktoppower-menuprocess-managementquickshellrebuildrust-desktopscratchpadssecret-managersudo-desktopsystemtailscalethemetheme-extra-fontstheme-extra-scriptsunfreeusersvirtualisationwaybarwindow-manageryubikey{config = {platform = "x86_64-linux";type = "desktop";network.hostName = "date";unfree.allowedNames = ["claude-code""nvidia-x11""nvidia-settings""steam""steam-unwrapped"];
inherit specialArgs;
age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEzfoVKZDyiyyMiX1JRFaaTELspG25MlLNq0kI2AANTa root@date";
modules =with inputs.self.modules.nixos;commonModules++ desktopModules++ [disks-normaldisks-extra-swapdisks-extra-zram-swapobject-storage{config = mkConfig "date" "x86_64-linux" "desktop" {age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEzfoVKZDyiyyMiX1JRFaaTELspG25MlLNq0kI2AANTa root@date";
age.secrets = {id.rekeyFile = ../secrets/date-id.age;password.rekeyFile = ../secrets/date-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;# TODO# nixStoreKey.rekeyFile = ../secrets/date-nix-store-key.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";};
system.stateVersion = "26.05";
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [inputs.os-wsl.nixosModules.defaultdesktop-toolsdisable-nanodisable-nix-documentationdynamic-binarieshjemjujutsu-extrakeysliblocalelinux-kernel-zennetrcnetworknix-settingsobject-storageopensshpackagespackages-extra-desktoprebuildrust-desktopscratchpadssecret-managersudo-desktopsystemtailscalethemeunfreeusersvirtualisationwsl-settingsyubikey{config = {platform = "x86_64-linux";type = "wsl";
inherit specialArgs;
network.hostName = "pear";unfree.allowedNames = ["claude-code""nvidia-x11""nvidia-settings""steam""steam-unwrapped"];age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL2/Pg/5ohT3Dacnzjw9pvkeoQ1hEFwG5l1vRkr3v2sQ root@pear";
modules =with inputs.self.modules.nixos;commonModules++ [desktop-toolsjujutsu-extralinux-kernel-zenobject-storagepackages-extra-desktoprebuildrust-desktopscratchpadssudo-desktopwsl{config = mkConfig "pear" "x86_64-linux" "wsl" {age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL2/Pg/5ohT3Dacnzjw9pvkeoQ1hEFwG5l1vRkr3v2sQ root@pear";
age.secrets = {id.rekeyFile = ../secrets/pear-id.age;password.rekeyFile = ../secrets/pear-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;# TODO# nixStoreKey.rekeyFile = ../secrets/pear-nix-store-key.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";};
system.stateVersion = "26.05";
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [acmeboot-grubdisable-nanodisable-nix-documentationdisks-diskodisks-extra-zram-swapdynamic-binariesforgejoforgejo-action-runnergoatcounterhjemkeyslocaleliblinux-kernelnetrcnetworknginxnix-distributed-buildsnix-distributed-buildernix-settingsprometheus-node-exporterobject-storageopensshpackagesrebuildrustsecret-managersudo-serversystemtailscalethemeunfreeuptime-kumausersvirtualisationwebsite-personalyubikey{config = {platform = "x86_64-linux";type = "server";
inherit specialArgs;
network = {hostName = "plum";domain = "plumj.am";tcpPorts = [2280443];};unfree.allowedNames = [ "claude-code" ];forgejo-action-runner = {withDocker = true;labels = ["self-hosted:host""plum:host""docpad-infra:host""ubuntu-22.04:docker://docker.gitea.com/runner-images:ubuntu-22.04"];};
modules =with inputs.self.modules.nixos;commonModules++ serverModules++ [acmeboot-grubdisks-diskodisks-extra-zram-swapforgejogoatcounternginxobject-storagerebuildrustuptime-kumawebsite-personal{config = mkConfig "plum" "x86_64-linux" "server" {network = {domain = "plumj.am";tcpPorts = [2280443];};
age.secrets = {id.rekeyFile = ../secrets/plum-id.age;password.rekeyFile = ../secrets/plum-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;nixStoreKey.rekeyFile = ../secrets/plum-nix-store-key.age;forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;forgejoAdminPassword.rekeyFile = ../secrets/plum-forgejo-password.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";
age.secrets = {forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;forgejoAdminPassword.rekeyFile = ../secrets/plum-forgejo-password.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [acmeboot-grubdisable-nanodisable-nix-documentationdisks-diskodisks-extra-zram-swapdynamic-binariesforgejo-action-runnerhjemkeyslocaleliblinux-kernelnetrcnetworknginxnix-distributed-buildsnix-distributed-buildernix-settingsprometheus-node-exporterobject-storageopensshpackagesrebuildrustsecret-managersudo-serversystemtailscalethemeunfreeuptime-kumausersvirtualisationwebsite-dr-radkayubikey{config = {platform = "x86_64-linux";type = "server";network = {hostName = "kiwi";domain = "dr-radka.pl";tcpPorts = [2280443];};
inherit specialArgs;
unfree.allowedNames = [ "claude-code" ];forgejo-action-runner = {withDocker = true;labels = ["self-hosted:host""kiwi:host""docpad-infra:host""ubuntu-22.04:docker://docker.gitea.com/runner-images:ubuntu-22.04"];};
modules =with inputs.self.modules.nixos;commonModules++ serverModules++ [acmeboot-grubdisks-diskodisks-extra-zram-swapnginxobject-storagerebuildrustuptime-kumawebsite-dr-radka{config = mkConfig "kiwi" "x86_64-linux" "server" {network = {domain = "dr-radka.pl";tcpPorts = [2280443];};
age.secrets = {id.rekeyFile = ../secrets/kiwi-id.age;password.rekeyFile = ../secrets/kiwi-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;nixStoreKey.rekeyFile = ../secrets/kiwi-nix-store-key.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;drRadkaEnvironment.rekeyFile = ../secrets/kiwi-dr-radka-environment.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";
age.secrets = {forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;drRadkaEnvironment.rekeyFile = ../secrets/kiwi-dr-radka-environment.age;
specialArgs = { inherit inputs; };modules = with inputs.self.modules.nixos; [boot-grubdisable-nanodisable-nix-documentationdisks-diskodisks-extra-zram-swapdynamic-binariesforgejo-action-runnerhjemkeyslocaleliblinux-kernelnetrcnetworknix-distributed-buildsnix-distributed-buildernix-settingsprometheus-node-exporterobject-storageopensshpackagesrebuildrustsecret-managersudo-serversystemtailscalethemeunfreeusersvirtualisationyubikey{config = {platform = "x86_64-linux";type = "server";
inherit specialArgs;
network = {hostName = "blackwell";tcpPorts = [22];};unfree.allowedNames = [ "claude-code" ];forgejo-action-runner = {withDocker = true;labels = ["self-hosted:host""blackwell:host""docpad-infra:host""ubuntu-22.04:docker://docker.gitea.com/runner-images:ubuntu-22.04"];};
modules =with inputs.self.modules.nixos;commonModules++ serverModules++ [boot-grubdisks-diskodisks-extra-zram-swapobject-storagerebuildrust{config = mkConfig "blackwell" "x86_64-linux" "server" {
age.secrets = {id.rekeyFile = ../secrets/blackwell-id.age;password.rekeyFile = ../secrets/blackwell-password.age;s3AccessKey.rekeyFile = ../secrets/s3-access-key.age;s3SecretKey.rekeyFile = ../secrets/s3-secret-key.age;forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;nixStoreKey.rekeyFile = ../secrets/blackwell-nix-store-key.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;context7Key = {rekeyFile = ../secrets/context7-key.age;owner = "jam";mode = "400";};zaiKey = {rekeyFile = ../secrets/z-ai-key.age;owner = "jam";mode = "400";
age.secrets = {forgejoRunnerToken.rekeyFile = ../secrets/plum-forgejo-runner-token.age;acmeEnvironment.rekeyFile = ../secrets/acme-environment.age;