diff --git a/config/hosts/eh22-wiki/dokuwiki.nix b/config/hosts/eh22-wiki/dokuwiki.nix index f9a7cbd..c0eafaa 100644 --- a/config/hosts/eh22-wiki/dokuwiki.nix +++ b/config/hosts/eh22-wiki/dokuwiki.nix @@ -21,8 +21,7 @@ let app = "dokuwiki"; domain = "eh22.easterhegg.eu"; dataDir = "/srv/www/${domain}"; -in -{ +in { systemd.tmpfiles.rules = [ "d ${dataDir} 0755 ${app} ${app}" ]; @@ -77,7 +76,7 @@ in default = true; enableACME = true; serverName = "${domain}"; - + listen = [ { addr = "0.0.0.0"; diff --git a/config/hosts/mqtt/configuration.nix b/config/hosts/mqtt/configuration.nix index 793807d..18d0184 100644 --- a/config/hosts/mqtt/configuration.nix +++ b/config/hosts/mqtt/configuration.nix @@ -1,10 +1,10 @@ { ... }: { - networking = { - hostName = "mqtt"; - domain = "z9.ccchh.net"; - }; + networking = { + hostName = "mqtt"; + domain = "z9.ccchh.net"; + }; - system.stateVersion = "23.11"; -} + system.stateVersion = "23.11"; +} \ No newline at end of file diff --git a/config/hosts/mqtt/default.nix b/config/hosts/mqtt/default.nix index bc91d9f..bb61c12 100644 --- a/config/hosts/mqtt/default.nix +++ b/config/hosts/mqtt/default.nix @@ -1,9 +1,9 @@ { pkgs, ... }: { - imports = [ - ./configuration.nix - ./networking.nix - ./mosquitto.nix - ]; -} + imports = [ + ./configuration.nix + ./networking.nix + ./mosquitto.nix + ]; +} \ No newline at end of file diff --git a/config/hosts/mqtt/mosquitto.nix b/config/hosts/mqtt/mosquitto.nix index d093bd8..672c05d 100644 --- a/config/hosts/mqtt/mosquitto.nix +++ b/config/hosts/mqtt/mosquitto.nix @@ -5,29 +5,29 @@ { ... }: { - services.mosquitto = { - enable = true; - persistence = true; + services.mosquitto = { + enable = true; + persistence = true; - # set config for all listeners - listeners = [{ - settings.allow_anonymous = true; - omitPasswordAuth = true; - acl = [ "topic readwrite #" ]; - }]; + # set config for all listeners + listeners = [ { + settings.allow_anonymous = true; + omitPasswordAuth = true; + acl = ["topic readwrite #"]; + } ]; - bridges.winkekatz = { - addresses = [ - { address = "mqtt.winkekatze24.de"; } - ]; - topics = [ - "winkekatze/allcats/eye/set in 2" - "winkekatze/allcats in 2" - "+/status out 2 winkekatze/ \"\"" - "+/connected out 2 winkekatze/ \"\"" - ]; + bridges.winkekatz = { + addresses = [ + { address = "mqtt.winkekatze24.de"; } + ]; + topics = [ + "winkekatze/allcats/eye/set in 2" + "winkekatze/allcats in 2" + "+/status out 2 winkekatze/ \"\"" + "+/connected out 2 winkekatze/ \"\"" + ]; + }; }; - }; - networking.firewall.allowedTCPPorts = [ 1883 ]; -} + networking.firewall.allowedTCPPorts = [ 1883 ]; +} \ No newline at end of file diff --git a/config/hosts/nix-box-june/users.nix b/config/hosts/nix-box-june/users.nix index dfb333e..9f1b217 100644 --- a/config/hosts/nix-box-june/users.nix +++ b/config/hosts/nix-box-june/users.nix @@ -26,7 +26,7 @@ }; yuri = { isNormalUser = true; - openssh.authorizedKeys.keys = [ + openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDdk3FLQRoCWxdOxg4kHcPqAu3QQOs/rY9na2Al2ilGl yuri@violet" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJEvM35w+UaSpDTuaG5pGPgfHcfwscr+wSZN9Z5Jle82 yuri@kiara" ]; diff --git a/config/hosts/public-web-static/virtualHosts/hacker.tours.nix b/config/hosts/public-web-static/virtualHosts/hacker.tours.nix index 1ee6180..7eaa086 100644 --- a/config/hosts/public-web-static/virtualHosts/hacker.tours.nix +++ b/config/hosts/public-web-static/virtualHosts/hacker.tours.nix @@ -4,8 +4,7 @@ let domain = "hacker.tours"; dataDir = "/var/www/${domain}"; deployUser = "hackertours-website-deploy"; -in -{ +in { services.nginx.virtualHosts = { "acme-${domain}" = { enableACME = true; diff --git a/config/hosts/public-web-static/virtualHosts/hackertours.hamburg.ccc.de.nix b/config/hosts/public-web-static/virtualHosts/hackertours.hamburg.ccc.de.nix index b0104b6..2077ca7 100644 --- a/config/hosts/public-web-static/virtualHosts/hackertours.hamburg.ccc.de.nix +++ b/config/hosts/public-web-static/virtualHosts/hackertours.hamburg.ccc.de.nix @@ -4,8 +4,7 @@ let domain = "hackertours.hamburg.ccc.de"; dataDir = "/var/www/${domain}"; deployUser = "ht-ccchh-website-deploy"; -in -{ +in { services.nginx.virtualHosts = { "acme-${domain}" = { enableACME = true; diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/default.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/default.nix index 69d8855..fe53d04 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/default.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/default.nix @@ -1,4 +1,4 @@ -{ ... }: +{...}: { imports = [ @@ -9,4 +9,4 @@ ./eh11.nix ./eh20.nix ]; -} +} \ No newline at end of file diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh03.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh03.nix index 2c5dd86..60d4f21 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh03.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh03.nix @@ -6,7 +6,7 @@ let rev = "74977c56486cd060566bf06678a936e801952f9e"; hash = "sha256-ded/NO+Jex2Sa4yWAIRpqANsv8i0vKmJSkM5r9KxaVk="; }; -in +in { security.acme.certs."eh03.easterhegg.eu".extraDomainNames = [ "eh2003.hamburg.ccc.de" @@ -48,7 +48,7 @@ in }]; locations."/".return = "302 https://eh03.easterhegg.eu"; - + extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and # $remote_port to the client address and client port, when using proxy diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh05.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh05.nix index 37cb893..7651666 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh05.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh05.nix @@ -48,7 +48,7 @@ in }]; locations."/".return = "302 https://eh05.easterhegg.eu"; - + extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and # $remote_port to the client address and client port, when using proxy @@ -60,7 +60,7 @@ in real_ip_header proxy_protocol; ''; }; - + "eh05.easterhegg.eu" = { forceSSL = true; useACMEHost = "eh05.easterhegg.eu"; @@ -71,7 +71,7 @@ in ssl = true; proxyProtocol = true; }]; - + locations."/" = { index = "index.shtml"; root = eh05; @@ -80,7 +80,7 @@ in default_type text/html; # Enable SSI ssi on; - ''; + ''; }; extraConfig = '' diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh07.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh07.nix index ebfa712..40fe480 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh07.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh07.nix @@ -54,7 +54,7 @@ in }]; locations."/".return = "302 https://eh07.easterhegg.eu"; - + extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and # $remote_port to the client address and client port, when using proxy @@ -86,7 +86,7 @@ in default_type text/html; # Enable SSI ssi on; - ''; + ''; }; extraConfig = '' diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh09.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh09.nix index ea274af..f7416ed 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh09.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh09.nix @@ -54,7 +54,7 @@ in }]; locations."/".return = "302 https://eh09.easterhegg.eu"; - + extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and # $remote_port to the client address and client port, when using proxy @@ -86,7 +86,7 @@ in default_type text/html; # Enable SSI ssi on; - ''; + ''; }; extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and diff --git a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh11.nix b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh11.nix index 39d7fad..c409641 100644 --- a/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh11.nix +++ b/config/hosts/public-web-static/virtualHosts/historic-easterhegg/eh11.nix @@ -54,7 +54,7 @@ in }]; locations."/".return = "302 https://eh11.easterhegg.eu"; - + extraConfig = '' # Make use of the ngx_http_realip_module to set the $remote_addr and # $remote_port to the client address and client port, when using proxy @@ -86,7 +86,7 @@ in default_type text/html; # Enable SSI ssi on; - ''; + ''; }; extraConfig = '' diff --git a/config/hosts/public-web-static/virtualHosts/staging.hacker.tours.nix b/config/hosts/public-web-static/virtualHosts/staging.hacker.tours.nix index 14ede9b..382f1b6 100644 --- a/config/hosts/public-web-static/virtualHosts/staging.hacker.tours.nix +++ b/config/hosts/public-web-static/virtualHosts/staging.hacker.tours.nix @@ -4,8 +4,7 @@ let domain = "staging.hacker.tours"; dataDir = "/var/www/${domain}"; deployUser = "hackertours-website-deploy"; -in -{ +in { services.nginx.virtualHosts = { "acme-${domain}" = { enableACME = true; diff --git a/config/hosts/public-web-static/virtualHosts/staging.hackertours.hamburg.ccc.de.nix b/config/hosts/public-web-static/virtualHosts/staging.hackertours.hamburg.ccc.de.nix index 79ca38c..4b71d53 100644 --- a/config/hosts/public-web-static/virtualHosts/staging.hackertours.hamburg.ccc.de.nix +++ b/config/hosts/public-web-static/virtualHosts/staging.hackertours.hamburg.ccc.de.nix @@ -4,8 +4,7 @@ let domain = "staging.hackertours.hamburg.ccc.de"; dataDir = "/var/www/${domain}"; deployUser = "ht-ccchh-website-deploy"; -in -{ +in { services.nginx.virtualHosts = { "acme-${domain}" = { enableACME = true; diff --git a/config/hosts/woodpecker/woodpecker-agent/woodpecker-agent.nix b/config/hosts/woodpecker/woodpecker-agent/woodpecker-agent.nix index 8c6847b..dc89021 100644 --- a/config/hosts/woodpecker/woodpecker-agent/woodpecker-agent.nix +++ b/config/hosts/woodpecker/woodpecker-agent/woodpecker-agent.nix @@ -3,12 +3,13 @@ # - https://woodpecker-ci.org/docs/administration/agent-config # - https://woodpecker-ci.org/docs/administration/backends/docker -{ config, pkgs, ... }: +{ config, pkgs, pkgs-unstable, ... }: { services.woodpecker-agents.agents."docker" = { enable = true; - package = pkgs.woodpecker-agent; + # Since we use woodpecker-server from unstable, use the agent from unstable as well. + package = pkgs-unstable.woodpecker-agent; extraGroups = [ "docker" ]; environment = { WOODPECKER_SERVER = "localhost${config.services.woodpecker-server.environment.WOODPECKER_GRPC_ADDR}"; diff --git a/config/hosts/woodpecker/woodpecker-server/woodpecker-server.nix b/config/hosts/woodpecker/woodpecker-server/woodpecker-server.nix index 2baafc5..464af13 100644 --- a/config/hosts/woodpecker/woodpecker-server/woodpecker-server.nix +++ b/config/hosts/woodpecker/woodpecker-server/woodpecker-server.nix @@ -5,12 +5,14 @@ # - https://woodpecker-ci.org/docs/administration/forges/forgejo # - https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING -{ config, pkgs, ... }: +{ config, pkgs, pkgs-unstable, ... }: { services.woodpecker-server = { enable = true; - package = pkgs.woodpecker-server; + # Use package from unstable to get at least version 2.6.0 for native Forgejo support. + # https://github.com/woodpecker-ci/woodpecker/releases/tag/v2.6.0 + package = pkgs-unstable.woodpecker-server; environment = { WOODPECKER_HOST = "https://woodpecker.hamburg.ccc.de"; WOODPECKER_SERVER_ADDR = ":8001"; diff --git a/config/hosts/yate/service.nix b/config/hosts/yate/service.nix index e031d4d..e426a31 100644 --- a/config/hosts/yate/service.nix +++ b/config/hosts/yate/service.nix @@ -6,16 +6,16 @@ description = "Yate telehony engine"; unitConfig = { Type = "simple"; - After = "network.target"; + After="network.target"; }; serviceConfig = { ExecStart = "${pkgs.yate}/bin/yate -c /yate -e /yate/share -Do"; - Type = "simple"; - Restart = "always"; + Type="simple"; + Restart="always"; # ... }; wantedBy = [ "default.target" ]; - requiredBy = [ "network.target" ]; + requiredBy = [ "network.target" ]; # ... }; } diff --git a/flake.lock b/flake.lock index f09abde..24f50dd 100644 --- a/flake.lock +++ b/flake.lock @@ -68,10 +68,27 @@ "type": "github" } }, + "nixpkgs-unstable": { + "locked": { + "lastModified": 1730449684, + "narHash": "sha256-Hlv3rTPxnO+DpKRXw9yjzERLdk05h7+fEbZxWM2taCw=", + "owner": "nixos", + "repo": "nixpkgs", + "rev": "ab464abbeb3a2833288c6e907488c49c2e599f88", + "type": "github" + }, + "original": { + "owner": "nixos", + "ref": "nixos-unstable-small", + "repo": "nixpkgs", + "type": "github" + } + }, "root": { "inputs": { "nixos-generators": "nixos-generators", "nixpkgs": "nixpkgs", + "nixpkgs-unstable": "nixpkgs-unstable", "sops-nix": "sops-nix" } }, diff --git a/flake.nix b/flake.nix index f575ac6..b787f78 100644 --- a/flake.nix +++ b/flake.nix @@ -6,6 +6,7 @@ # https://nixos.org/manual/nixos/stable/#sec-upgrading # https://github.com/NixOS/nixpkgs nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05-small"; + nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable-small"; # Add nixos-generators as an input. # See here: https://github.com/nix-community/nixos-generators#using-in-a-flake @@ -22,32 +23,26 @@ }; }; - outputs = { self, nixpkgs, nixos-generators, sops-nix, ... }: + outputs = { self, nixpkgs, nixpkgs-unstable, nixos-generators, sops-nix, ... }: let system = "x86_64-linux"; + shairportSync431ExtendedNixpkgsUnstableOverlay = final: prev: { + shairport-sync = (prev.shairport-sync.override { enableMetadata = true; enableAirplay2 = true; }).overrideAttrs (finalAttr: previousAttr: { + # See: https://github.com/mikebrady/shairport-sync/blob/e78a88b64adfe7b5f88fd6faedf55c57445bb240/CONFIGURATION%20FLAGS.md + configureFlags = previousAttr.configureFlags ++ [ "--with-mqtt-client" ]; + buildInputs = previousAttr.buildInputs ++ [ final.mosquitto ]; + }); + }; + pkgs-unstable = nixpkgs-unstable.legacyPackages."x86_64-linux"; in { - overlays = { - shairportSyncAirplay2 = final: prev: { - shairport-sync = (prev.shairport-sync.override { enableMetadata = true; enableAirplay2 = true; }).overrideAttrs (finalAttr: previousAttr: { - # See: https://github.com/mikebrady/shairport-sync/blob/e78a88b64adfe7b5f88fd6faedf55c57445bb240/CONFIGURATION%20FLAGS.md - configureFlags = previousAttr.configureFlags ++ [ "--with-mqtt-client" ]; - buildInputs = previousAttr.buildInputs ++ [ final.mosquitto ]; - }); - }; - }; - nixosModules = { - common = ./config/common; - proxmox-vm = ./config/proxmox-vm; - prometheus-exporter = ./config/extra/prometheus-exporter.nix; - }; nixosConfigurations = { audio-hauptraum-kueche = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm - { nixpkgs.overlays = [ self.overlays.shairportSyncAirplay2 ]; } + ./config/common + ./config/proxmox-vm + { nixpkgs.overlays = [ shairportSync431ExtendedNixpkgsUnstableOverlay ]; } ./config/hosts/audio-hauptraum-kueche ]; }; @@ -55,9 +50,9 @@ audio-hauptraum-tafel = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm - { nixpkgs.overlays = [ self.overlays.shairportSyncAirplay2 ]; } + ./config/common + ./config/proxmox-vm + { nixpkgs.overlays = [ shairportSync431ExtendedNixpkgsUnstableOverlay ]; } ./config/hosts/audio-hauptraum-tafel ]; }; @@ -65,8 +60,8 @@ esphome = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ./config/hosts/esphome ]; }; @@ -74,8 +69,8 @@ public-reverse-proxy = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ./config/hosts/public-reverse-proxy ]; }; @@ -83,10 +78,10 @@ netbox = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/netbox ]; }; @@ -94,10 +89,10 @@ matrix = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/matrix ]; }; @@ -105,10 +100,10 @@ public-web-static = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/public-web-static ]; }; @@ -116,10 +111,10 @@ git = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/git ]; }; @@ -127,10 +122,10 @@ forgejo-actions-runner = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/forgejo-actions-runner ]; }; @@ -138,8 +133,8 @@ ptouch-print-server = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ./config/hosts/ptouch-print-server ]; }; @@ -147,9 +142,9 @@ eh22-wiki = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm - self.nixosModules.prometheus-exporter + ./config/common + ./config/proxmox-vm + ./config/extra/prometheus-exporter.nix ./config/hosts/eh22-wiki ]; }; @@ -157,9 +152,9 @@ nix-box-june = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm - self.nixosModules.prometheus-exporter + ./config/common + ./config/proxmox-vm + ./config/extra/prometheus-exporter.nix ./config/hosts/nix-box-june ]; }; @@ -167,8 +162,8 @@ yate = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ./config/hosts/yate ]; }; @@ -176,8 +171,8 @@ mqtt = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ./config/hosts/mqtt ]; }; @@ -185,10 +180,10 @@ mjolnir = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/mjolnir ]; }; @@ -196,19 +191,22 @@ woodpecker = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/woodpecker ]; + specialArgs = { + inherit pkgs-unstable; + }; }; status = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops ./config/hosts/status ]; @@ -217,10 +215,10 @@ penpot = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm sops-nix.nixosModules.sops - self.nixosModules.prometheus-exporter + ./config/extra/prometheus-exporter.nix ./config/hosts/penpot ]; }; @@ -228,9 +226,9 @@ hydra = nixpkgs.lib.nixosSystem { inherit system; modules = [ - self.nixosModules.common - self.nixosModules.proxmox-vm - self.nixosModules.prometheus-exporter + ./config/common + ./config/proxmox-vm + ./config/extra/prometheus-exporter.nix ./config/hosts/hydra ]; }; @@ -241,8 +239,8 @@ system = "x86_64-linux"; modules = [ ./config/nixos-generators/proxmox.nix - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ]; format = "proxmox"; }; @@ -252,8 +250,8 @@ modules = [ ./config/nixos-generators/proxmox-chaosknoten.nix ./config/proxmox-chaosknoten-additional-initial-config.nix - self.nixosModules.common - self.nixosModules.proxmox-vm + ./config/common + ./config/proxmox-vm ]; format = "proxmox"; };