nixfmt everything
This commit is contained in:
parent
dbf843d70f
commit
d92420451d
30 changed files with 383 additions and 330 deletions
92
flake.nix
92
flake.nix
|
|
@ -5,39 +5,51 @@
|
|||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-22.11";
|
||||
|
||||
home-manager = { url = "github:nix-community/home-manager/master"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||||
home-manager-stable = { url = "github:nix-community/home-manager/release-22.11"; inputs.nixpkgs.follows = "nixpkgs-stable"; };
|
||||
home-manager = {
|
||||
url = "github:nix-community/home-manager/master";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
home-manager-stable = {
|
||||
url = "github:nix-community/home-manager/release-22.11";
|
||||
inputs.nixpkgs.follows = "nixpkgs-stable";
|
||||
};
|
||||
|
||||
baduhai-nur.url = "github:baduhai/nur";
|
||||
|
||||
kmonad = { url = "github:kmonad/kmonad?dir=nix"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||||
|
||||
deploy-rs = { url = "github:serokell/deploy-rs"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||||
|
||||
agenix = { url = "github:ryantm/agenix"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||||
|
||||
nixos-generators = { url = "github:nix-community/nixos-generators"; inputs.nixpkgs.follows = "nixpkgs-stable"; };
|
||||
|
||||
homepage = { url = "github:baduhai/homepage"; flake = false; };
|
||||
|
||||
dotfiles = { url = "github:baduhai/dotfiles"; flake = false; };
|
||||
kmonad = {
|
||||
url = "github:kmonad/kmonad?dir=nix";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
|
||||
outputs = inputs @ {
|
||||
self,
|
||||
nixpkgs,
|
||||
home-manager,
|
||||
baduhai-nur,
|
||||
kmonad,
|
||||
nixpkgs-stable,
|
||||
home-manager-stable,
|
||||
deploy-rs,
|
||||
agenix,
|
||||
nixos-generators,
|
||||
homepage,
|
||||
dotfiles,
|
||||
...
|
||||
}: {
|
||||
deploy-rs = {
|
||||
url = "github:serokell/deploy-rs";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
|
||||
agenix = {
|
||||
url = "github:ryantm/agenix";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
|
||||
nixos-generators = {
|
||||
url = "github:nix-community/nixos-generators";
|
||||
inputs.nixpkgs.follows = "nixpkgs-stable";
|
||||
};
|
||||
|
||||
homepage = {
|
||||
url = "github:baduhai/homepage";
|
||||
flake = false;
|
||||
};
|
||||
|
||||
dotfiles = {
|
||||
url = "github:baduhai/dotfiles";
|
||||
flake = false;
|
||||
};
|
||||
};
|
||||
|
||||
outputs = inputs@{ self, nixpkgs, home-manager, baduhai-nur, kmonad
|
||||
, nixpkgs-stable, home-manager-stable, deploy-rs, agenix, nixos-generators
|
||||
, homepage, dotfiles, ... }: {
|
||||
nixosConfigurations = {
|
||||
rotterdam = nixpkgs.lib.nixosSystem {
|
||||
system = "x86_64-linux";
|
||||
|
|
@ -47,7 +59,10 @@
|
|||
agenix.nixosModules.default
|
||||
kmonad.nixosModules.default
|
||||
home-manager.nixosModules.default
|
||||
{ nixpkgs.overlays = [ baduhai-nur.overlay agenix.overlays.default ]; }
|
||||
{
|
||||
nixpkgs.overlays =
|
||||
[ baduhai-nur.overlay agenix.overlays.default ];
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
|
|
@ -59,7 +74,10 @@
|
|||
agenix.nixosModules.default
|
||||
kmonad.nixosModules.default
|
||||
home-manager.nixosModules.default
|
||||
{ nixpkgs.overlays = [ baduhai-nur.overlay agenix.overlays.default ]; }
|
||||
{
|
||||
nixpkgs.overlays =
|
||||
[ baduhai-nur.overlay agenix.overlays.default ];
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
|
|
@ -76,10 +94,7 @@
|
|||
unstable-overlay = final: prev: {
|
||||
unstable = nixpkgs.legacyPackages.x86_64-linux;
|
||||
};
|
||||
in {
|
||||
nixpkgs.overlays = [ unstable-overlay ];
|
||||
}
|
||||
)
|
||||
in { nixpkgs.overlays = [ unstable-overlay ]; })
|
||||
];
|
||||
};
|
||||
};
|
||||
|
|
@ -94,7 +109,8 @@
|
|||
hostname = "alexandria";
|
||||
profiles.system = {
|
||||
remoteBuild = true;
|
||||
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.alexandria;
|
||||
path = deploy-rs.lib.x86_64-linux.activate.nixos
|
||||
self.nixosConfigurations.alexandria;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
@ -105,9 +121,11 @@
|
|||
packages.x86_64-linux = {
|
||||
install-iso = nixos-generators.nixosGenerate {
|
||||
system = "x86_64-linux";
|
||||
modules = [
|
||||
{users.users.nixos.openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE" ];}
|
||||
modules = [{
|
||||
users.users.nixos.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE"
|
||||
];
|
||||
}];
|
||||
format = "install-iso";
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -18,9 +18,7 @@
|
|||
tree
|
||||
wget
|
||||
# Package overrides
|
||||
(nnn.override {
|
||||
withNerdIcons = true;
|
||||
})
|
||||
(nnn.override { withNerdIcons = true; })
|
||||
];
|
||||
|
||||
programs = {
|
||||
|
|
|
|||
|
|
@ -5,13 +5,12 @@
|
|||
user = {
|
||||
isNormalUser = true;
|
||||
shell = pkgs.fish;
|
||||
extraGroups = [
|
||||
"networkmanager"
|
||||
"docker"
|
||||
"wheel"
|
||||
extraGroups = [ "networkmanager" "docker" "wheel" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE"
|
||||
];
|
||||
openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE" ];
|
||||
hashedPassword = "$6$Pj7v/CpstyuWQQV0$cNujVDhfMBdwlGVEnnd8t71.kZPixbo0u25cd.874iaqLTH4V5fa1f98V5zGapjQCz5JyZmsR94xi00sUrntT0";
|
||||
hashedPassword =
|
||||
"$6$Pj7v/CpstyuWQQV0$cNujVDhfMBdwlGVEnnd8t71.kZPixbo0u25cd.874iaqLTH4V5fa1f98V5zGapjQCz5JyZmsR94xi00sUrntT0";
|
||||
};
|
||||
root = {
|
||||
shell = pkgs.fish;
|
||||
|
|
|
|||
|
|
@ -10,9 +10,7 @@
|
|||
extraModprobeConfig = ''
|
||||
options bluetooth disable_ertm=1
|
||||
'';
|
||||
kernel.sysctl = {
|
||||
"net.ipv4.tcp_mtu_probing" = 1;
|
||||
};
|
||||
kernel.sysctl = { "net.ipv4.tcp_mtu_probing" = 1; };
|
||||
kernelParams = [
|
||||
"quiet"
|
||||
"splash"
|
||||
|
|
|
|||
|
|
@ -11,5 +11,6 @@
|
|||
|
||||
sound.enable = true;
|
||||
|
||||
security.rtkit.enable = true; # Needed for pipewire to acquire realtime priority
|
||||
security.rtkit.enable =
|
||||
true; # Needed for pipewire to acquire realtime priority
|
||||
}
|
||||
|
|
|
|||
|
|
@ -62,9 +62,7 @@
|
|||
wezterm
|
||||
yubikey-personalization-gui
|
||||
# Package overrides
|
||||
(appimage-run.override {
|
||||
extraPkgs = pkgs: [ libthai ];
|
||||
})
|
||||
(appimage-run.override { extraPkgs = pkgs: [ libthai ]; })
|
||||
# Packages from 3rd party overlays
|
||||
agenix
|
||||
chatterino7
|
||||
|
|
@ -95,11 +93,6 @@
|
|||
];
|
||||
};
|
||||
|
||||
environment.plasma5.excludePackages = ( with pkgs.plasma5Packages; [
|
||||
elisa
|
||||
gwenview
|
||||
oxygen
|
||||
khelpcenter
|
||||
konsole
|
||||
]);
|
||||
environment.plasma5.excludePackages =
|
||||
(with pkgs.plasma5Packages; [ elisa gwenview oxygen khelpcenter konsole ]);
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,9 +4,8 @@ let
|
|||
plasma = pkgs.writeScriptBin "plasma" ''
|
||||
${pkgs.plasma-workspace}/bin/startplasma-wayland &> /dev/null
|
||||
'';
|
||||
in
|
||||
|
||||
{
|
||||
in {
|
||||
services = {
|
||||
printing.enable = true;
|
||||
pipewire = {
|
||||
|
|
@ -30,7 +29,8 @@ in
|
|||
greetd = {
|
||||
enable = true;
|
||||
settings = {
|
||||
default_session.command = "${pkgs.greetd.tuigreet}/bin/tuigreet --remember --user-menu --asterisks --time --greeting \"Welcome to NixOS\" --cmd ${plasma}/bin/plasma";
|
||||
default_session.command = ''
|
||||
${pkgs.greetd.tuigreet}/bin/tuigreet --remember --user-menu --asterisks --time --greeting "Welcome to NixOS" --cmd ${plasma}/bin/plasma'';
|
||||
initial_session = {
|
||||
command = "${plasma}/bin/plasma";
|
||||
user = "user";
|
||||
|
|
|
|||
|
|
@ -2,8 +2,10 @@
|
|||
|
||||
{
|
||||
environment.sessionVariables = rec {
|
||||
KDEHOME = "$XDG_CONFIG_HOME/kde4"; # Stops kde from placing a .kde4 folder in the home dir
|
||||
NIXOS_OZONE_WL = "1"; # Forces chromium and most electron apps to run in wayland
|
||||
KDEHOME =
|
||||
"$XDG_CONFIG_HOME/kde4"; # Stops kde from placing a .kde4 folder in the home dir
|
||||
NIXOS_OZONE_WL =
|
||||
"1"; # Forces chromium and most electron apps to run in wayland
|
||||
};
|
||||
|
||||
users.users.user = {
|
||||
|
|
|
|||
|
|
@ -20,11 +20,7 @@
|
|||
};
|
||||
|
||||
boot = {
|
||||
kernelParams = [
|
||||
"nosgx"
|
||||
"i915.fastboot=1"
|
||||
"mem_sleep_default=deep"
|
||||
];
|
||||
kernelParams = [ "nosgx" "i915.fastboot=1" "mem_sleep_default=deep" ];
|
||||
kernelModules = [
|
||||
"i2c-dev" # Required for arduino dev
|
||||
"i2c-piix4" # Required for arduino dev
|
||||
|
|
|
|||
|
|
@ -1,7 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
];
|
||||
imports = [ ./hardware-configuration.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,24 +4,24 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sdhci_pci" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sdhci_pci" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/2321ee32-a952-4a4b-bba0-bb25f616a4a5";
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/2321ee32-a952-4a4b-bba0-bb25f616a4a5";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
boot.initrd.luks.devices."luks-008bb7cb-917c-4dda-93fe-542c2285bafb".device = "/dev/disk/by-uuid/008bb7cb-917c-4dda-93fe-542c2285bafb";
|
||||
boot.initrd.luks.devices."luks-008bb7cb-917c-4dda-93fe-542c2285bafb".device =
|
||||
"/dev/disk/by-uuid/008bb7cb-917c-4dda-93fe-542c2285bafb";
|
||||
|
||||
fileSystems."/boot/efi" =
|
||||
{ device = "/dev/disk/by-uuid/36B4-C473";
|
||||
fileSystems."/boot/efi" = {
|
||||
device = "/dev/disk/by-uuid/36B4-C473";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
|
|
@ -35,5 +35,6 @@
|
|||
# networking.interfaces.wlp0s20f3.useDHCP = lib.mkDefault true;
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -18,13 +18,9 @@
|
|||
|
||||
systemd.targets.hibernate.enable = false; # disable non-functional hibernate
|
||||
|
||||
nix.nixPath = [
|
||||
"nixos-config=${./rotterdam.nix}"
|
||||
];
|
||||
nix.nixPath = [ "nixos-config=${./rotterdam.nix}" ];
|
||||
|
||||
users.users.user.extraGroups = [
|
||||
"corectrl"
|
||||
];
|
||||
users.users.user.extraGroups = [ "corectrl" ];
|
||||
|
||||
boot.kernelParams = [
|
||||
"processor.max_cstate=1" # Fixes bug where ryzen cpus freeze when in highest C state
|
||||
|
|
@ -32,7 +28,8 @@
|
|||
];
|
||||
|
||||
environment.sessionVariables = rec {
|
||||
KWIN_DRM_NO_AMS = "1"; # RDNA2 colour/gamma modesetting bug workaround for kwin wayland
|
||||
KWIN_DRM_NO_AMS =
|
||||
"1"; # RDNA2 colour/gamma modesetting bug workaround for kwin wayland
|
||||
};
|
||||
|
||||
programs = {
|
||||
|
|
|
|||
|
|
@ -1,7 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
];
|
||||
imports = [ ./hardware-configuration.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,28 +4,26 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/9ccbb9e3-addc-42a3-b5d8-1e81eed37548";
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/9ccbb9e3-addc-42a3-b5d8-1e81eed37548";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot/efi" =
|
||||
{ device = "/dev/disk/by-uuid/7707-0E25";
|
||||
fileSystems."/boot/efi" = {
|
||||
device = "/dev/disk/by-uuid/7707-0E25";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/39005453-0ac9-4fee-bdd3-7ea9bb6f9ca6"; }
|
||||
];
|
||||
[{ device = "/dev/disk/by-uuid/39005453-0ac9-4fee-bdd3-7ea9bb6f9ca6"; }];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
|
|
@ -35,5 +33,6 @@
|
|||
# networking.interfaces.enp34s0.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlo1.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.amd.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -8,51 +8,27 @@
|
|||
containers = {
|
||||
"actual" = {
|
||||
image = "jlongster/actual-server:latest";
|
||||
ports = [
|
||||
"${config.ports.actual}:5006"
|
||||
];
|
||||
volumes = [
|
||||
"/data/actual:/data"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.actual}:5006" ];
|
||||
volumes = [ "/data/actual:/data" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"cinny" = {
|
||||
image = "ghcr.io/cinnyapp/cinny:latest";
|
||||
ports = [
|
||||
"${config.ports.cinny}:80"
|
||||
];
|
||||
volumes = [
|
||||
"/data/matrix/cinny-config.json:/app/config.json"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.cinny}:80" ];
|
||||
volumes = [ "/data/matrix/cinny-config.json:/app/config.json" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"cinny2" = {
|
||||
image = "ghcr.io/cinnyapp/cinny:latest";
|
||||
ports = [
|
||||
"${config.ports.cinny2}:80"
|
||||
];
|
||||
volumes = [
|
||||
"/data/matrix/cinny-config.json:/app/config.json"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.cinny2}:80" ];
|
||||
volumes = [ "/data/matrix/cinny-config.json:/app/config.json" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"librespeed" = {
|
||||
image = "lscr.io/linuxserver/librespeed:latest";
|
||||
environment = {
|
||||
TZ = "America/Bahia";
|
||||
};
|
||||
ports = [
|
||||
"${config.ports.librespeed}:80"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
environment = { TZ = "America/Bahia"; };
|
||||
ports = [ "${config.ports.librespeed}:80" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"whoogle" = {
|
||||
image = "benbusby/whoogle-search:latest";
|
||||
|
|
@ -63,12 +39,8 @@
|
|||
WHOOGLE_CONFIG_VIEW_IMAGE = "1";
|
||||
WHOOGLE_CONFIG_GET_ONLY = "1";
|
||||
};
|
||||
ports = [
|
||||
"${config.ports.whoogle}:5000"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.whoogle}:5000" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -4,22 +4,21 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/31289617-1d84-4432-a833-680b52e88525";
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/31289617-1d84-4432-a833-680b52e88525";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/4130-BE54";
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/4130-BE54";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
|
|
@ -33,7 +32,8 @@
|
|||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
# high-resolution display
|
||||
hardware.video.hidpi.enable = lib.mkDefault true;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -3,9 +3,7 @@
|
|||
{
|
||||
services.matrix-conduit = {
|
||||
enable = true;
|
||||
extraEnvironment = {
|
||||
RUST_MIN_STACK = "16777216";
|
||||
};
|
||||
extraEnvironment = { RUST_MIN_STACK = "16777216"; };
|
||||
package = pkgs.unstable.matrix-conduit;
|
||||
settings.global = {
|
||||
server_name = "baduhai.me";
|
||||
|
|
|
|||
|
|
@ -15,9 +15,7 @@
|
|||
dnsProvider = "cloudflare";
|
||||
credentialsFile = config.age.secrets.cloudflare-creds.path;
|
||||
};
|
||||
certs."baduhai.me" = {
|
||||
extraDomainNames = [ "*.baduhai.me" ];
|
||||
};
|
||||
certs."baduhai.me" = { extraDomainNames = [ "*.baduhai.me" ]; };
|
||||
};
|
||||
|
||||
boot.kernel.sysctl = {
|
||||
|
|
|
|||
|
|
@ -64,22 +64,108 @@
|
|||
kTLS = true;
|
||||
root = inputs.homepage;
|
||||
};
|
||||
"bazarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.bazaar}"; };
|
||||
"bitwarden.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.vaultwarden}"; };
|
||||
"cinny.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.cinny}"; };
|
||||
"detect.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.changedetection-io}"; };
|
||||
"jackett.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.jackett}"; };
|
||||
"jellyfin.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.jellyfin}"; };
|
||||
"actual.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.actual}"; };
|
||||
"librespeed.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.librespeed}"; };
|
||||
"n8n.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.n8n}"; };
|
||||
"paperless.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.paperless}"; };
|
||||
"qbittorrent.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.qbittorrent}"; };
|
||||
"radarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.radarr}"; };
|
||||
"shiori.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.shiori}"; };
|
||||
"sonarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.sonarr}"; };
|
||||
"sync.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.syncthing}"; };
|
||||
"whoogle.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.whoogle}"; };
|
||||
"bazarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.bazaar}";
|
||||
};
|
||||
"bitwarden.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.vaultwarden}";
|
||||
};
|
||||
"cinny.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.cinny}";
|
||||
};
|
||||
"detect.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.changedetection-io}";
|
||||
};
|
||||
"jackett.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.jackett}";
|
||||
};
|
||||
"jellyfin.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.jellyfin}";
|
||||
};
|
||||
"actual.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.actual}";
|
||||
};
|
||||
"librespeed.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.librespeed}";
|
||||
};
|
||||
"n8n.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.n8n}";
|
||||
};
|
||||
"paperless.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.paperless}";
|
||||
};
|
||||
"qbittorrent.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.qbittorrent}";
|
||||
};
|
||||
"radarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.radarr}";
|
||||
};
|
||||
"shiori.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.shiori}";
|
||||
};
|
||||
"sonarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.sonarr}";
|
||||
};
|
||||
"sync.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.syncthing}";
|
||||
};
|
||||
"whoogle.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.whoogle}";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
|
@ -90,9 +176,7 @@
|
|||
passwordFile = config.age.secrets.paperless-pass.path;
|
||||
port = lib.toInt "${config.ports.paperless}";
|
||||
consumptionDirIsPublic = true;
|
||||
extraConfig = {
|
||||
PAPERLESS_OCR_LANGUAGE = "eng+por+deu";
|
||||
};
|
||||
extraConfig = { PAPERLESS_OCR_LANGUAGE = "eng+por+deu"; };
|
||||
};
|
||||
|
||||
postgresql.enable = true;
|
||||
|
|
@ -132,5 +216,6 @@
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.NetworkManager-wait-online.enable = false; # Workaround for upstream bug in NetworkManager-wait-online.service
|
||||
systemd.services.NetworkManager-wait-online.enable =
|
||||
false; # Workaround for upstream bug in NetworkManager-wait-online.service
|
||||
}
|
||||
|
|
|
|||
|
|
@ -9,13 +9,7 @@
|
|||
groups = {
|
||||
hosted = {
|
||||
gid = 1005;
|
||||
members = [
|
||||
"user"
|
||||
"shiori"
|
||||
"minecraft"
|
||||
"paperless"
|
||||
"vaultwarden"
|
||||
];
|
||||
members = [ "user" "shiori" "minecraft" "paperless" "vaultwarden" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,13 +1,13 @@
|
|||
{ specialArgs, inputs, config, pkgs, lib, ... }:
|
||||
|
||||
let
|
||||
mkStringOption = default: lib.mkOption {
|
||||
mkStringOption = default:
|
||||
lib.mkOption {
|
||||
inherit default;
|
||||
type = lib.types.str;
|
||||
};
|
||||
in
|
||||
|
||||
{
|
||||
in {
|
||||
options.ports = {
|
||||
n8n = mkStringOption "5678";
|
||||
bazaar = mkStringOption "6767";
|
||||
|
|
|
|||
|
|
@ -1,8 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./boot.nix
|
||||
./nix.nix
|
||||
];
|
||||
imports = [ ./boot.nix ./nix.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,8 +4,7 @@ let
|
|||
cfg = config.services.qbittorrent;
|
||||
configDir = "${cfg.dataDir}/.config";
|
||||
openFilesLimit = 4096;
|
||||
in
|
||||
{
|
||||
in {
|
||||
options.services.qbittorrent = {
|
||||
enable = mkOption {
|
||||
type = types.bool;
|
||||
|
|
|
|||
|
|
@ -1,8 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./home.nix
|
||||
./programs.nix
|
||||
];
|
||||
imports = [ ./home.nix ./programs.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -5,13 +5,14 @@
|
|||
username = "user";
|
||||
homeDirectory = "/home/user";
|
||||
stateVersion = "22.05";
|
||||
sessionVariables = {
|
||||
EDITOR = "micro";
|
||||
};
|
||||
sessionVariables = { EDITOR = "micro"; };
|
||||
file = {
|
||||
".config/btop/themes/catppuccin_mocha.theme".source = "${inputs.dotfiles}/.config/btop/themes/catppuccin_mocha.theme";
|
||||
".config/fish/themes/Catppuccin Mocha.theme".source = "${inputs.dotfiles}/.config/fish/themes/Catppuccin Mocha.theme";
|
||||
".config/starship.toml".source = "${inputs.dotfiles}/.config/starship.toml";
|
||||
".config/btop/themes/catppuccin_mocha.theme".source =
|
||||
"${inputs.dotfiles}/.config/btop/themes/catppuccin_mocha.theme";
|
||||
".config/fish/themes/Catppuccin Mocha.theme".source =
|
||||
"${inputs.dotfiles}/.config/fish/themes/Catppuccin Mocha.theme";
|
||||
".config/starship.toml".source =
|
||||
"${inputs.dotfiles}/.config/starship.toml";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -43,7 +43,7 @@
|
|||
# loginShellInit = "nix-your-shell fish | source";
|
||||
shellAliases = {
|
||||
nano = "micro";
|
||||
wget = "wget --hsts-file=\"$XDG_DATA_HOME/wget-hsts\"";
|
||||
wget = ''wget --hsts-file="$XDG_DATA_HOME/wget-hsts"'';
|
||||
};
|
||||
functions = {
|
||||
fish_greeting = "";
|
||||
|
|
|
|||
|
|
@ -1,9 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./home.nix
|
||||
./programs.nix
|
||||
./services.nix
|
||||
];
|
||||
imports = [ ./home.nix ./programs.nix ./services.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -10,13 +10,20 @@
|
|||
package = pkgs.breeze-icons;
|
||||
};
|
||||
file = {
|
||||
".config/wezterm/wezterm.lua".source = "${inputs.dotfiles}/.config/wezterm/wezterm.lua";
|
||||
".config/MangoHud/MangoHud.conf".source = "${inputs.dotfiles}/.config/MangoHud/MangoHud.conf";
|
||||
".config/solvespace/settings.json".source = "${inputs.dotfiles}/.config/solvespace/settings.json";
|
||||
".local/share/color-schemes/CatppuccinLatte.colors".source = "${inputs.dotfiles}/.local/share/color-schemes/CatppuccinLatte.colors";
|
||||
".local/share/color-schemes/CatppuccinMocha.colors".source = "${inputs.dotfiles}/.local/share/color-schemes/CatppuccinMocha.colors";
|
||||
".config/wezterm/wezterm.lua".source =
|
||||
"${inputs.dotfiles}/.config/wezterm/wezterm.lua";
|
||||
".config/MangoHud/MangoHud.conf".source =
|
||||
"${inputs.dotfiles}/.config/MangoHud/MangoHud.conf";
|
||||
".config/solvespace/settings.json".source =
|
||||
"${inputs.dotfiles}/.config/solvespace/settings.json";
|
||||
".local/share/color-schemes/CatppuccinLatte.colors".source =
|
||||
"${inputs.dotfiles}/.local/share/color-schemes/CatppuccinLatte.colors";
|
||||
".local/share/color-schemes/CatppuccinMocha.colors".source =
|
||||
"${inputs.dotfiles}/.local/share/color-schemes/CatppuccinMocha.colors";
|
||||
# Autostart programs
|
||||
".config/autostart/koi.desktop".source = config.lib.file.mkOutOfStoreSymlink "/var/run/current-system/sw/share/applications/koi.desktop";
|
||||
".config/autostart/koi.desktop".source =
|
||||
config.lib.file.mkOutOfStoreSymlink
|
||||
"/var/run/current-system/sw/share/applications/koi.desktop";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -5,9 +5,18 @@
|
|||
|
||||
gtk = {
|
||||
enable = true;
|
||||
font = { name = "Inter"; size = 10; };
|
||||
theme = { package = pkgs.breeze-gtk; name = "Breeze"; };
|
||||
iconTheme = { package = pkgs.breeze-icons; name = "Breeze"; };
|
||||
font = {
|
||||
name = "Inter";
|
||||
size = 10;
|
||||
};
|
||||
theme = {
|
||||
package = pkgs.breeze-gtk;
|
||||
name = "Breeze";
|
||||
};
|
||||
iconTheme = {
|
||||
package = pkgs.breeze-icons;
|
||||
name = "Breeze";
|
||||
};
|
||||
};
|
||||
|
||||
programs = {
|
||||
|
|
@ -30,10 +39,14 @@
|
|||
interactiveShellInit = "nix-your-shell fish | source";
|
||||
loginShellInit = "nix-your-shell fish | source";
|
||||
functions = {
|
||||
rebuild = "rm ~/.gtkrc-2.0; sudo nixos-rebuild switch --flake '/home/user/Projects/personal/nix-config#'";
|
||||
rebuild-boot = "rm ~/.gtkrc-2.0; sudo nixos-rebuild boot --flake '/home/user/Projects/personal/nix-config#'";
|
||||
upgrade = "rm ~/.gtkrc-2.0; nix flake lock --update-input nixpkgs --commit-lock-file /home/user/Projects/personal/nix-config; sudo nixos-rebuild switch --upgrade --flake '/home/user/Projects/personal/nix-config#'";
|
||||
upgrade-boot = "rm ~/.gtkrc-2.0; nix flake lock --update-input nixpkgs --commit-lock-file /home/user/Projects/personal/nix-config; sudo nixos-rebuild boot --upgrade --flake '/home/user/Projects/personal/nix-config#'";
|
||||
rebuild =
|
||||
"rm ~/.gtkrc-2.0; sudo nixos-rebuild switch --flake '/home/user/Projects/personal/nix-config#'";
|
||||
rebuild-boot =
|
||||
"rm ~/.gtkrc-2.0; sudo nixos-rebuild boot --flake '/home/user/Projects/personal/nix-config#'";
|
||||
upgrade =
|
||||
"rm ~/.gtkrc-2.0; nix flake lock --update-input nixpkgs --commit-lock-file /home/user/Projects/personal/nix-config; sudo nixos-rebuild switch --upgrade --flake '/home/user/Projects/personal/nix-config#'";
|
||||
upgrade-boot =
|
||||
"rm ~/.gtkrc-2.0; nix flake lock --update-input nixpkgs --commit-lock-file /home/user/Projects/personal/nix-config; sudo nixos-rebuild boot --upgrade --flake '/home/user/Projects/personal/nix-config#'";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,7 +1,5 @@
|
|||
{ specialArgs, inputs, config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
services = {
|
||||
kdeconnect.enable = true;
|
||||
};
|
||||
services = { kdeconnect.enable = true; };
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue