📲 | Configuration for instances hosted by Uzinfocom [maintainer=@orzklv]
  • Nix 96.7%
  • Shell 3.3%
Find a file
Uzinfocom Assistant 194c076726
Some checks are pending
Test CI / Test flake options (push) Waiting to run
Test CI / Build Configurations (push) Waiting to run
Test CI / Build Configurations-1 (push) Waiting to run
Test CI / Build Configurations-2 (push) Waiting to run
Test CI / Merge Update PRs (push) Blocked by required conditions
Merge pull request #139 from uzinfocom-org/update_flake_lock_action
flake.lock: Update
2026-02-15 20:09:15 +05:00
.github [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
hosts chore: allow voice for any homeserver 2026-02-13 03:06:43 +05:00
lib fix: fmt 2026-02-10 05:27:23 +05:00
maintainers chore: new users + livekit fix 2026-02-10 12:34:04 +05:00
modules fix: remove commonHeaders from call as well 2026-02-13 03:16:05 +05:00
overlays fix: use stdenv.system 2026-02-10 05:29:18 +05:00
secrets fix: correct disk partition 2026-01-31 09:31:49 +05:00
.envrc [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
.gitignore [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
.sops.yaml chore: remove shakhzod from sops 2026-02-10 05:24:29 +05:00
flake.lock flake.lock: Update 2026-02-15 15:06:49 +00:00
flake.nix fix: fmt 2026-02-10 05:27:23 +05:00
LICENSE [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
NOTES.md [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
README.md [create-pull-request] automated change 2026-01-14 19:23:35 +00:00
shell.nix fix: fmt 2026-02-10 05:27:23 +05:00
statix.toml [create-pull-request] automated change 2026-01-14 19:23:35 +00:00

Uzinfocom's {Instances}

Uzinfocom's Infrastructure configurations for all instances.

Top Used Language Test CI

About

This repository is intended to keep all configurations of instandces ran by Uzinfocom's Open Source Team. Configurations contain both service and environmental implications.

Features

  • Services & Containers
  • Rust made replacements
  • Key configurations
  • Software configurations
  • Selfmade scripts

Get NixOS Ready on your server

This is actually quite hard task as it requires a few prequisites to be prepared beforehand. You may refer to bootstrap and installer for further instructions.

Installing configurations

After you get NixOS running on your machine, the next step is to apply declarative configurations onto your machines:

sudo nixos-rebuild switch --flake github:uzinfocom-org/instances#Instance --upgrade

# Check keys of users before push. Change hostname (Laboratory) accordingly
nix build .#nixosConfigurations.Laboratory.config.system.build.toplevel --show-trace

Thanks

  • Template - Started with this template
  • Example - Learned from his configurations
  • Home Manager - Simplyifying my life and avoid frustrations
  • Nix - Masterpiece of package management

License

This project is licensed under the MIT License - see the LICENSE file for details.

Uzinfocom's {Instances}