Compare commits
907 Commits
f97ca9ccc4
...
dev
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
94a27bb403
|
||
|
|
1d656dc4ae
|
||
|
|
b3014bce85
|
||
|
|
ef845edd12
|
||
|
|
c456e4cad8
|
||
|
|
39b12966f1
|
||
|
|
cbef43ae83
|
||
|
|
765f18d5a0
|
||
|
|
76302840d0
|
||
|
|
e02aca85bd
|
||
|
|
0378ce7dff
|
||
|
|
0fd8286331
|
||
|
|
e4aac05b6a
|
||
|
|
fd7b95e12e
|
||
|
|
a94e8beb37
|
||
|
|
3e05dfbc07
|
||
|
|
a94574a53d | ||
|
|
03bec133ba | ||
|
|
b6de2d2ccf | ||
|
|
334a484ad4 | ||
|
|
11f7e95d95 | ||
|
|
24a0fb6a93 | ||
|
|
892e271719 | ||
|
|
8769b6da9d | ||
|
|
00bdef4307 | ||
|
|
6ed72c00ff | ||
|
|
6d5cd82e72 | ||
|
|
3e921ef2ab | ||
|
|
09cc16bc40 | ||
|
|
425722e2c6 | ||
|
|
0fb6aa0047 | ||
|
|
07283e1f26 | ||
|
|
362afd3d4e | ||
|
|
1154cbb3bd | ||
|
|
25c7823f38 | ||
|
|
d57fb32f67 | ||
|
|
08a7ed2469 | ||
|
|
45e375168e | ||
|
|
56252474d9 | ||
|
|
0ee26c817c | ||
|
|
51bd495981 | ||
|
|
d9a59e9593 | ||
|
|
8557df0199 | ||
|
|
84d9b0ade0 | ||
|
|
7e3d86e37e | ||
|
|
f5c16775c4 | ||
|
|
83dec697d1 | ||
|
|
dd47977cbd | ||
|
|
601999180b | ||
|
|
97004b4b75 | ||
|
|
d15895d8e3 | ||
|
|
983c19eaa5 | ||
|
|
4e7a348461 | ||
|
|
4ccb941766 | ||
|
|
e19fe6a973 | ||
|
|
d9e07543ba | ||
|
|
5d4aaeb49f | ||
|
|
14540f043d | ||
|
|
2c29f8a41b | ||
|
|
cd994d6359 | ||
|
|
a1da14f9fb | ||
|
|
143ea35dc1 | ||
|
|
c23ad28f85 | ||
|
|
c60123ca3c | ||
|
|
c069079a3a | ||
|
|
e777a56816 | ||
|
|
9933d12183 | ||
|
|
2e6c044b89 | ||
|
|
252373f956 | ||
|
|
511837f0a5 | ||
|
|
2882889eae | ||
|
|
c174fe20ae | ||
|
|
31a972d55b | ||
|
|
9de6cedf33 | ||
|
|
f80107efab | ||
|
|
ea21907e5d | ||
|
|
d86c3b76b5 | ||
|
|
66e878b902 | ||
|
|
6a3327386f | ||
|
|
860955f555 | ||
|
|
f5fd711636 | ||
|
|
677c9bc7d4 | ||
|
|
2cb8d6c24e | ||
|
|
3b4e7d07a4 | ||
|
|
8ecef91c92 | ||
|
|
95c1bb126e | ||
|
|
de18ad8127 | ||
|
|
8e57822c10 | ||
|
|
f2883aa33d | ||
|
|
7bd5ceacd9 | ||
|
|
e940bd0ec1 | ||
|
|
44813226c2 | ||
|
|
7381a17f87 | ||
|
|
19cec13a43 | ||
|
|
9117530393 | ||
|
|
868ba53208 | ||
|
|
f7c55f3a5a | ||
| 7cfd1bb245 | |||
| 85a6517609 | |||
| d55756f8f8 | |||
| 18beb41cd8 | |||
| 78f01cf111 | |||
| c582d89715 | |||
| 4270b15f9d | |||
| a62bc660c5 | |||
| 973fd78c1b | |||
| 7e62883e66 | |||
| feccc2c3e0 | |||
| 0b02de0957 | |||
| 721838df2b | |||
|
|
8c800ad0d3 | ||
|
|
f7af832d8e | ||
|
|
6ddf4a07cc | ||
|
|
0df674647c | ||
|
|
7bead6b3ac | ||
|
|
f0befa87be | ||
|
|
6d665ee59c | ||
|
|
befe46c085 | ||
|
|
ba6d057600 | ||
|
|
db5230bd69 | ||
|
|
e1a80bb7ce | ||
| 7d95ba04a9 | |||
| 9169205357 | |||
| 74721f6b09 | |||
| 668c0107f9 | |||
| 331291c54d | |||
| d10f53e485 | |||
| 82aea8268f | |||
| 050eaedca2 | |||
| be9cb270aa | |||
| a5e0e96b52 | |||
| 4366232f18 | |||
| 4398b1d888 | |||
| c4b5c47aa4 | |||
| ff64e6c231 | |||
| e7d656141a | |||
| cf3c2428fb | |||
| a2dc050b1c | |||
| 8bf332caf2 | |||
| 20d3786547 | |||
| 79422c180a | |||
| 65fc9c6df2 | |||
| a59cbd13a3 | |||
| 5f04ef7ae5 | |||
| 0aff508cda | |||
| 30df106b94 | |||
| 3abdb6d637 | |||
|
|
cd4c727255 | ||
|
|
26cb095014 | ||
|
|
2a9113e07d | ||
|
|
42a170283d | ||
|
|
3d4cdaf6e9 | ||
|
|
21d959b592 | ||
|
|
0895d67489 | ||
|
|
86f1fc116c | ||
|
|
b82033f857 | ||
|
|
fbe8399886 | ||
|
|
036f1117be | ||
|
|
b3eb1de9e6 | ||
|
|
91c2928a56 | ||
|
|
89ffc75db2 | ||
|
|
63fc0bde6e | ||
|
|
bc765ea0c6 | ||
|
|
df236d4ec7 | ||
|
|
2f24725df4 | ||
|
|
4708753085 | ||
|
|
370416edba | ||
|
|
ee1dec3d44 | ||
| b748db9550 | |||
| 78381d15ff | |||
| 037d75af2a | |||
| 9e9338d136 | |||
| cd19d8ac06 | |||
| 6dda5f6bd5 | |||
| 836b890fab | |||
| 40ed44aa52 | |||
| 2fcbf6adb3 | |||
| f3fbf159b4 | |||
| f3b8feb50d | |||
| f6f51597cd | |||
| 5c7b5fcbfe | |||
| 07b6868d27 | |||
| 870b13ef36 | |||
| 4b8c8bdc51 | |||
| c24628b574 | |||
| c1fb77a89f | |||
| 94012aa44c | |||
| 5ff282e65c | |||
|
|
0bedb71d07 | ||
|
|
47cbbc56cb | ||
| e116efd45c | |||
|
|
ff498d15a3 | ||
|
|
90c596270f | ||
|
|
458a9091d4 | ||
|
|
123d18d1e8 | ||
|
|
f05f7b0147 | ||
|
|
a41390dcee | ||
|
|
29478e2aed | ||
|
|
82b422883e | ||
|
|
4151e50a42 | ||
|
|
5afaf859b9 | ||
|
|
0cd20319fe | ||
|
|
468cd34fca | ||
|
|
882d36ff83 | ||
|
|
dc2682c829 | ||
|
|
f354a99d56 | ||
|
|
bf1fbea959 | ||
|
|
31addeda66 | ||
|
|
d0ca9761d7 | ||
|
|
bbbb5831a8 | ||
|
|
46f4b5288b | ||
|
|
8293df4974 | ||
|
|
08866273cc | ||
|
|
e2772e51d9 | ||
|
|
6bf856b702 | ||
|
|
93199b4359 | ||
|
|
d3ffacf4ca | ||
|
|
ac0e28b5ab | ||
|
|
e76f53d887 | ||
|
|
f67e142f53 | ||
|
|
8165bf6935 | ||
|
|
09539b5866 | ||
|
|
1b2a724a26 | ||
|
|
e6e6e4af49 | ||
|
|
e999a5bf2c | ||
|
|
a57818e37e | ||
|
|
0e61b2fad4 | ||
|
|
9016657699 | ||
|
|
5462434558 | ||
|
|
aa36fa812c | ||
|
|
f5f28968c6 | ||
|
|
4c2ef6e264 | ||
|
|
fa808f3eb2 | ||
|
|
7bc9ae1f2d | ||
|
|
e53be27e96 | ||
|
|
88ab6e2007 | ||
|
|
864e698272 | ||
|
|
8961706503 | ||
|
|
c637fea0d0 | ||
|
|
9813e7d49a | ||
|
|
ea6db4b9bf | ||
|
|
2eff0969e0 | ||
|
|
cf5648122d | ||
|
|
b10e7a5a93 | ||
|
|
882a43b705 | ||
|
|
e9868a2513 | ||
|
|
43a0f903b0 | ||
|
|
1b76ec20b4 | ||
|
|
6a7fcf6152 | ||
|
|
b6bc6dd138 | ||
|
|
90f8387192 | ||
|
|
25604d6c14 | ||
|
|
51d60de5c0 | ||
|
|
5e8cd65785 | ||
|
|
fa5845808b | ||
|
|
28c17d9bb6 | ||
|
|
89d2f9a48e | ||
|
|
e58d323ea0 | ||
|
|
7465b6b24c | ||
|
|
59c6b68501 | ||
|
|
9273387170 | ||
|
|
55a08673f0 | ||
|
|
5dbb95603d | ||
|
|
d60f8dd56f | ||
|
|
7d35cb319f | ||
|
|
8d4caac83b | ||
|
|
ad2b492b51 | ||
|
|
4b68accf2f | ||
|
|
0d9c8a2974 | ||
|
|
63d2dddd1e | ||
|
|
55d678df19 | ||
|
|
88a4ab069e | ||
|
|
c54ed4a712 | ||
|
|
3db4517a3b | ||
|
|
f3dfe561ad | ||
|
|
b58da2b2e1 | ||
|
|
28fa63919f | ||
|
|
cb7e29bfe0 | ||
|
|
ea58be6fdc | ||
|
|
da51e61c05 | ||
|
|
1ca61b70d2 | ||
|
|
eafafe876f | ||
|
|
21adca1fbc | ||
|
|
57efc58bc2 | ||
|
|
cd5deea849 | ||
|
|
9f5f8751e5 | ||
|
|
f02adc6d93 | ||
|
|
b2f6d8cc9e | ||
|
|
c18ac097fa | ||
|
|
1fc9017e7e | ||
|
|
8ff90e54b8 | ||
|
|
fba3a24f16 | ||
|
|
fcb97828f4 | ||
|
|
e04382742f | ||
|
|
48b40d819b | ||
|
|
8b75968f11 | ||
|
|
dda8409329 | ||
|
|
9a0b5171b1 | ||
|
|
9abb5b2f26 | ||
|
|
8362599b54 | ||
|
|
c1b9c12281 | ||
|
|
e4dcb0bd39 | ||
|
|
a31991c507 | ||
|
|
e1651cba2a | ||
|
|
bb5ecbba73 | ||
|
|
0c79617647 | ||
|
|
a3bc8b80c5 | ||
|
|
55fcf8b71a | ||
|
|
5aabd9acce | ||
|
|
e652c12bf2 | ||
|
|
4c684cf9b1 | ||
|
|
0c60bbbaa8 | ||
|
|
097334b483 | ||
|
|
bfd099d201 | ||
|
|
1fe6e43046 | ||
|
|
23b8ad480e | ||
|
|
3d1fc2a2c9 | ||
|
|
aacca16eb2 | ||
|
|
5de459c347 | ||
|
|
d898116ff4 | ||
|
|
e2b688c836 | ||
|
|
b5d57bf9c8 | ||
|
|
236f9dbdc3 | ||
|
|
9696ca9a6d | ||
|
|
df523c48e5 | ||
|
|
4d398d5596 | ||
|
|
5045291097 | ||
|
|
2dc1632a40 | ||
|
|
744a2b8563 | ||
|
|
b722d349af | ||
|
|
7438905618 | ||
|
|
908c144c73 | ||
|
|
6d353df19f | ||
|
|
7194d91b1c | ||
|
|
d3c301db36 | ||
|
|
135d48d78c | ||
|
|
d4292cd46d | ||
|
|
4a4d3e3604 | ||
|
|
d076538901 | ||
|
|
8fedaf18cd | ||
|
|
4c1f9f0e78 | ||
|
|
1a8eb085df | ||
|
|
8a619d9fc6 | ||
|
|
a76f920297 | ||
|
|
fe93cb708e | ||
|
|
cb29056296 | ||
|
|
4bc68eeeaf | ||
|
|
9cf9937cb7 | ||
|
|
593514c100 | ||
|
|
6ad9a0b34c | ||
|
|
65e3568072 | ||
|
|
c55b06cca9 | ||
|
|
40dba4b959 | ||
|
|
bc8a9d42f9 | ||
|
|
cd5a1aeed4 | ||
|
|
0f2081486d | ||
|
|
1c022d7642 | ||
|
|
379f6befb3 | ||
|
|
868d2ce116 | ||
|
|
94fdfa2b33 | ||
|
|
a73ad174ea | ||
|
|
fba5a79ce6 | ||
|
|
e8c9fc52fb | ||
|
|
8092bac6b7 | ||
|
|
7d80478e83 | ||
|
|
2cab462db5 | ||
|
|
0bb796fbe8 | ||
|
|
1f2cc94a0a | ||
|
|
3caf507905 | ||
|
|
27a5566ac6 | ||
|
|
b439888fa8 | ||
|
|
093497367a | ||
|
|
1c0cfd1afe | ||
|
|
c457867440 | ||
|
|
d73bbd8b18 | ||
|
|
95c3c0290a | ||
|
|
f80ba36c2a | ||
|
|
e276df28b4 | ||
|
|
0782278a0c | ||
|
|
e334d39f7d | ||
|
|
e05f6dd125 | ||
|
|
158bee36f8 | ||
|
|
9600f7a370 | ||
|
|
83b921afcc | ||
|
|
aaee4d9442 | ||
|
|
e3e535f527 | ||
|
|
865c12cacc | ||
|
|
02a8ffeb10 | ||
|
|
c57f19b18d | ||
|
|
f81ba27e56 | ||
|
|
dd192d2983 | ||
|
|
e7a414df5f | ||
|
|
f3fcb320be | ||
|
|
710def3ea3 | ||
|
|
b070f6f5e1 | ||
|
|
1ada287c8d | ||
|
|
29a1702c39 | ||
|
|
226a1baaa1 | ||
|
|
2e0295163c | ||
|
|
282d5206a6 | ||
|
|
7717d07ae8 | ||
|
|
4a86b856fb | ||
|
|
a8c8740b14 | ||
|
|
a44dc8108d | ||
|
|
626a88c8c8 | ||
|
|
fd7797c6e7 | ||
|
|
b2d040d414 | ||
|
|
cd05d939a8 | ||
|
|
d626c13572 | ||
|
|
c779c1760b | ||
|
|
8876b63c7b | ||
|
|
be0ccc9e79 | ||
|
|
662424f1d1 | ||
|
|
1566aca2b8 | ||
|
|
28fdc04c7b | ||
|
|
ce569f16e2 | ||
|
|
e53997093b | ||
|
|
66b594a1a2 | ||
|
|
7c91cd4733 | ||
|
|
da2aa4649e | ||
|
|
90b7eb097f | ||
|
|
4946fa999b | ||
|
|
f1ce4b7b81 | ||
|
|
e9eb4d9506 | ||
|
|
c8cb980c15 | ||
| 38350b91e1 | |||
|
|
142d842886 | ||
|
|
c9e59a9a89 | ||
|
|
b1afbf6bbe | ||
|
|
4c2f368da3 | ||
|
|
9377d1ce45 | ||
|
|
d3a3941591 | ||
|
|
b1bbb3ce86 | ||
|
|
d8be8b72ab | ||
|
|
59709bcde9 | ||
|
|
b0f5ef7439 | ||
|
|
301d8d1ea6 | ||
|
|
5aa041ba27 | ||
|
|
d2e35d3673 | ||
|
|
0baf9c1800 | ||
|
|
a7edc932a8 | ||
|
|
ae82eaa500 | ||
|
|
e24e96f091 | ||
|
|
b42579f8cd | ||
|
|
0192a1ace0 | ||
|
|
dcc5c440f7 | ||
|
|
1ceb440026 | ||
| 25b2e3e05f | |||
|
|
c823dbab4d | ||
|
|
32bbe70e2e | ||
|
|
1248c258df | ||
|
|
f852ed7662 | ||
|
|
4729a82990 | ||
|
|
c9ebc6e512 | ||
|
|
d68c26a4eb | ||
|
|
7b3d80c86e | ||
|
|
f98fee7988 | ||
|
|
401bb84bb0 | ||
|
|
39ea963b7c | ||
|
|
7cbb8ffae2 | ||
|
|
9d9e99e462 | ||
|
|
3f5d05e076 | ||
|
|
c1670a406c | ||
|
|
76b77b532c | ||
|
|
16add98b0d | ||
|
|
f764e681c0 | ||
|
|
f3c8020a85 | ||
|
|
376ac4a229 | ||
|
|
d4e599bd9b | ||
|
|
edc764461c | ||
|
|
cf9c7f8b80 | ||
|
|
0cdd18bec7 | ||
|
|
5cbf1e8555 | ||
|
|
735a9e2e0e | ||
|
|
eba7f7bd74 | ||
|
|
beb6ef1b05 | ||
|
|
e519f5c03c | ||
|
|
d55fd5fc0e | ||
|
|
b31f6cd331 | ||
|
|
9b0fc14795 | ||
|
|
32c83bca98 | ||
|
|
a7ce1dc7ea | ||
| 60bf451310 | |||
|
|
7f6e5879aa | ||
| 3fd400062d | |||
|
|
637297130f | ||
| 9ab6a6b92b | |||
| 94c2956904 | |||
|
|
fadd1ca63e | ||
| 5f64431332 | |||
|
|
2f8284bf61 | ||
| 14436f4507 | |||
|
|
26641247ea | ||
| 030c938dfa | |||
|
|
b7f2be0337 | ||
| 3b3545e8a4 | |||
|
|
2f8a20e062 | ||
| aa0845a3f8 | |||
|
|
8d27ca6dd1 | ||
| 1850124ec0 | |||
|
|
10df7a2f87 | ||
| 11b391613a | |||
|
|
52d2ec52df | ||
| 41641b0e5c | |||
|
|
07f41fa629 | ||
| 604406eb87 | |||
|
|
dc88fbc36d | ||
| 2b5d3480d0 | |||
|
|
04696cccd7 | ||
| c00f1e597b | |||
| 10d72aa61b | |||
|
|
8e5359fc89 | ||
| ea24abd34b | |||
|
|
b8b04ea9a0 | ||
| 63e29a0ab9 | |||
|
|
86ce081499 | ||
| 35f5cc981a | |||
|
|
bd499b29fe | ||
| 883f50c541 | |||
|
|
9a17b81976 | ||
| 757022670b | |||
|
|
b67c36b2d5 | ||
| ffdb7c29ae | |||
|
|
572df30c5d | ||
| 3194526625 | |||
|
|
332a4486cd | ||
| 5d46e20d50 | |||
|
|
ed7134202e | ||
| 3ff4e57848 | |||
|
|
5672681440 | ||
|
|
ef4bdb77f7 | ||
| de7acbfca6 | |||
|
|
b50a2fffe3 | ||
| c29571d1b8 | |||
|
|
c416ebd16a | ||
| 40041e9f8d | |||
|
|
b85e86099c | ||
| cefacf4eb0 | |||
|
|
7a4aba4578 | ||
| 679044816f | |||
|
|
4104234334 | ||
| 8b5d4e241f | |||
|
|
7e24069870 | ||
|
|
9019ba84e3
|
||
| 4943b90476 | |||
|
|
05d276e392 | ||
| 5a4b2e815f | |||
|
|
c53da55394 | ||
|
|
ca8283f5a2
|
||
|
|
dfa84137be
|
||
|
|
ffd6bf94cc
|
||
|
|
29b2cbb011
|
||
| 1fb8aa1dcc | |||
|
|
341e743b1e | ||
| db93fb0ad2 | |||
|
|
2299d7db62 | ||
| 31c1f97409 | |||
|
|
dbe97e6042 | ||
| 028e0ea7e2 | |||
|
|
81cf09ef29 | ||
| 74e544a604 | |||
| bd44efc583 | |||
|
|
2d8ac1c47e | ||
|
|
ba72106b7f
|
||
| 57c94cd93e | |||
|
|
59b9fe2236 | ||
| 2662b4bb38 | |||
|
|
fc21a048a1 | ||
| 5ceb7c8277 | |||
| 47277e31e8 | |||
|
|
9ea7c20d1c | ||
| b7b6b2ee5f | |||
|
|
aeb1690fab | ||
| fc7b4874ef | |||
|
|
5bb84fafbb | ||
| 9116edc15b | |||
|
|
0cf8fe1b85 | ||
| 9f6444658a | |||
|
|
6e6a7a47ac | ||
| b0527e55bf | |||
|
|
0d1d9f9cd8 | ||
| aa14dde9df | |||
|
|
9a8577bb9d | ||
| 295f65a05e | |||
|
|
3364477ea4 | ||
| ed758e5992 | |||
|
|
818950ce06 | ||
| e2a2a39440 | |||
|
|
8cf955ee5f | ||
| bb31ac82a5 | |||
|
|
5ecb0ec6e1 | ||
| 9d42f74107 | |||
|
|
2c3da72e1c | ||
| 4dad4004e5 | |||
|
|
e323c019bc | ||
| 7bcadfa43c | |||
|
|
ef14fb82b7 | ||
| 77cb7b14c7 | |||
|
|
6bafa68ae4 | ||
| 65d2405aac | |||
|
|
765a12b2be | ||
| 309c8b19a6 | |||
|
|
1b5d14b90f | ||
| 9fb8d04ce7 | |||
|
|
54d25bbdab | ||
| 54b90463f3 | |||
|
|
921db78da0 | ||
| 3b9854a179 | |||
|
|
4075f1fef4 | ||
| 920e2cf33d | |||
|
|
74147ca952 | ||
| 1684a36b21 | |||
|
|
0ecf85a715 | ||
| 23303a9a9d | |||
|
|
29a3e6b1cd | ||
| d3f825ccb3 | |||
|
|
d1ef3a5d69 | ||
| b1b1f4959c | |||
|
|
6079c9d32e | ||
| ae5002aacf | |||
|
|
931e3104f2 | ||
| c1d7b717f2 | |||
|
|
d5f07f1b52 | ||
|
|
af1d183e5a | ||
| 6c3c974812 | |||
|
|
25acea774a | ||
|
|
f1cce84950 | ||
|
|
abdc3d65af | ||
|
|
0b1298c5cc | ||
|
|
ab42b366da | ||
|
|
a5622e5f55 | ||
|
|
d8cdfa4c54 | ||
|
|
211ef28e43 | ||
|
|
66edf1fbfc | ||
|
|
6239e08920 | ||
|
|
ed3d676a9d | ||
|
|
1576181ed2 | ||
|
|
165791bbdb | ||
| 0650ff3933 | |||
|
|
5423790903 | ||
|
|
7925012c03 | ||
|
|
7e4ef81aa1 | ||
|
|
73a90212a3 | ||
|
|
925c8a0b3f | ||
|
|
30226099e7 | ||
|
|
991898884d | ||
|
|
38e24429ea | ||
|
|
44aa8c7ec4 | ||
|
|
4f71551caa | ||
|
|
ff13963b35 | ||
|
|
7c9b43cafa | ||
|
|
7369d9157b | ||
|
|
ce239b5530 | ||
|
|
3760180d73 | ||
|
|
1968a1d4f6 | ||
|
|
d98f06b0b0 | ||
|
|
6639999e9a | ||
|
|
aa34956969 | ||
|
|
6a7af294dd | ||
|
|
46a6bf1fe1 | ||
|
|
c62d093b19 | ||
|
|
4f9b1630cd | ||
|
|
dc350cd669 | ||
|
|
07df68fc19 | ||
|
|
1cd9d6ccbf | ||
|
|
56ed6f2fa8 | ||
|
|
4c1ef61375
|
||
|
|
139d33ae2d
|
||
|
|
71443cfbc1 | ||
|
|
db69b419b6 | ||
|
|
4346ec7232
|
||
|
|
49469b4962
|
||
|
|
a2ef475040 | ||
|
|
42952cc19b | ||
|
|
110ff51e9e | ||
|
|
712f263c6c | ||
|
|
cc3cd50852 | ||
|
|
56533cfeb1 | ||
|
|
272587d9ab | ||
|
|
2629e7c873 | ||
|
|
71d1f30920 | ||
|
|
29027c39d6 | ||
|
|
fde8c67d5b | ||
|
|
209bc82941 | ||
|
|
06d3c576ff | ||
|
|
d29d622b54 | ||
|
|
b05c1c9261 | ||
|
|
6227d69f5c | ||
|
|
e99f5df33a | ||
|
|
7fa3301ad7 | ||
|
|
e31da30d09 | ||
|
|
833b7b35b1 | ||
|
|
b94ce739b7 | ||
|
|
114831b04c | ||
|
|
e94516a8bc | ||
|
|
407f3833ab | ||
|
|
881d6ceacc | ||
|
|
ee4ce37d3f | ||
|
|
4a1bb88e6e | ||
| 07637d826d | |||
|
|
6a69546fad | ||
|
|
ffb710a68f | ||
|
|
770b3acddf | ||
|
|
6ee70b0d1f | ||
|
|
51e08f1cc7 | ||
|
|
339404a312 | ||
|
|
1c68ef2023 | ||
|
|
fd0bfcf00d | ||
|
|
fdcb0ede25 | ||
|
|
74182b2a3e
|
||
|
|
12646765c2
|
||
|
|
495862c294
|
||
|
|
c54376b937 | ||
|
|
11a902d741 | ||
|
|
7dbc9824ef | ||
|
|
06ece39078 | ||
|
|
8cc274d4ab | ||
|
|
5538d67bc9 | ||
|
|
fd9e41cec3 | ||
|
|
2ea10a944a | ||
|
|
b42ccab3d3 | ||
|
|
42ace39326 | ||
|
|
6433fe8a3a | ||
|
|
2affae6854 | ||
|
|
95293dc629 | ||
|
|
f291f13f33 | ||
|
|
1b1caad2d1 | ||
|
|
9318aa095e | ||
|
|
fd6a3151ce
|
||
|
|
40b827d4ca
|
||
| 1410c0c39f | |||
|
|
8d68938abd | ||
|
|
3d7d29934c | ||
|
|
877f516788 | ||
|
|
2ebd8c4fea | ||
|
|
bb0f40a755 | ||
|
|
e7e632fab4 | ||
|
|
c928fbd14b | ||
|
|
0d17b0650a | ||
|
|
dbc2aee14b | ||
|
|
95cbbf591f | ||
|
|
58cfdb4fd2 | ||
|
|
b77863f8f9 | ||
|
|
ee3380b501 | ||
|
|
5d68b291ba | ||
|
|
1e89d5880b | ||
|
|
f733d9dbc4 | ||
|
|
f8816df0d2 | ||
|
|
4c09698f8d | ||
|
|
724ebb4d27 | ||
|
|
cbe331644c | ||
|
|
121ea423b3 | ||
|
|
47d87a9bec | ||
|
|
f84d4e696a | ||
|
|
87f12a228a
|
||
| 19c3f68543 | |||
|
|
36a44b9355 | ||
|
|
adbabf4eea | ||
|
|
ea9b423c9d | ||
| 551902a03e | |||
|
|
47880e6ab5 | ||
|
|
5d929a23df | ||
|
|
4f91f0276a | ||
|
|
3612103e2f | ||
|
|
7d10222740 | ||
|
|
a1c7dc96da | ||
|
|
0eec6b6eef | ||
|
|
83ea710f1c | ||
|
|
9cb14a2882 | ||
|
|
ab9074c324 | ||
|
|
f682198e22 | ||
|
|
cb0859f228 | ||
|
|
e4ee6c5d2e | ||
|
|
221250699c | ||
| b00983cd21 | |||
|
|
9232d9a0fb | ||
|
|
08a6485a1c | ||
|
|
8b3efcfc59 | ||
|
|
bdcf625ebc | ||
|
|
0d4a2a774e | ||
|
|
87f2dd4fd4 | ||
| 90d5038a3f | |||
| bc3ce8d5b4 | |||
|
|
e732429365
|
||
|
|
deabe42bb6
|
||
|
|
a62b2faa2a
|
||
|
|
9fd47e218d
|
||
|
|
75480a3373
|
||
| e4dfead658 | |||
|
|
692b613613
|
||
|
|
38fd971314
|
||
|
|
0b25204147
|
||
|
|
c8fe860b6e
|
||
|
|
c88ba54f77 | ||
|
|
3216ca2a1b | ||
|
|
019d38c4ba | ||
|
|
94bb01c319 | ||
|
|
7f5f35b7ca | ||
|
|
68a75ad255 | ||
|
|
d19f8ea9e1 | ||
|
|
df5fd60d6b | ||
|
|
803339c49e
|
||
|
|
8f9b785468 | ||
|
|
4d3b504446 | ||
|
|
9356deca2c
|
||
|
|
92d0dad938 | ||
|
|
fe61140415 | ||
|
|
d39d4ac640 | ||
|
|
36d51f01a3 | ||
|
|
858b38200c | ||
|
|
81a600de00 | ||
|
|
8712d7a8d1 | ||
|
|
367cd0b827 | ||
|
|
611d898b99 | ||
|
|
7efc00e324 | ||
|
|
6f079fb49e | ||
|
|
d378316e60
|
||
|
|
5b43e414b7
|
||
|
|
a4435844a9 | ||
|
|
07bc11e7e8 | ||
|
|
a14c2f888e | ||
|
|
2e38384459 | ||
| 00811913b5 | |||
|
|
a17bf69d26 | ||
|
|
6978c3c1e4
|
||
|
|
11b7660d26
|
||
|
|
dcd593cabc | ||
|
|
8ed8e2b2e2
|
||
|
|
de33b74926
|
||
|
|
4f2cf2d356
|
||
| addf6baa5f | |||
| fe1f1ee3c1 | |||
|
|
4ea8a40dbd
|
||
|
|
bf0aa63936 | ||
|
|
160fceb1d7 | ||
|
|
f9b2912764 | ||
|
|
c636f15689
|
||
|
|
16540a9327
|
||
|
|
5a50140975 | ||
|
|
da870ad90b | ||
|
|
fc90173651 | ||
|
|
10926b3622 | ||
|
|
df90098d44 | ||
|
|
25429b40bc | ||
|
|
f1bdc6f8d4 | ||
|
|
a8c74cba69
|
||
|
|
0f4154bcb5
|
||
|
|
3aedb499fb
|
||
|
|
29eeb04fac
|
||
|
|
8a09c870d7
|
||
|
|
d0732d6f11 | ||
|
|
832471f37d
|
||
|
|
93dd93561f | ||
| b1f2a66d72 | |||
|
|
486db33120 | ||
|
|
150d2f2e07
|
||
|
|
b644c87517
|
||
|
|
6441652b8c
|
||
|
|
4c2c9c2773
|
||
|
|
f966c944f9
|
||
|
|
a1c6b056e0
|
||
|
|
e0b1be56a2
|
||
|
|
448fe0c18b
|
||
|
|
6ba720623b
|
||
|
|
6549d9135f
|
||
|
|
df40f31406
|
||
|
|
0920a1381d
|
||
|
|
ad1c8a0026
|
||
|
|
f65ccf0e5e
|
||
|
|
52423ffdad
|
||
|
|
e325d82f34
|
||
|
|
dfb4761621
|
||
|
|
e0b96bf7c5
|
||
|
|
05bf386e51
|
||
|
|
6cb2c2bd00
|
||
|
|
972cb47e3f
|
||
|
|
0a02d67b7e | ||
|
|
29b836fffe | ||
|
|
9a578de3ad
|
||
|
|
c5d1e36160
|
||
|
|
41efe10dd4
|
||
|
918a2460f2
|
|||
| 35626de702 | |||
|
|
177c26e41d
|
||
|
|
e4b93499b9
|
||
|
|
80965eb915 | ||
| 1200a5bb4c | |||
|
|
90364e9909 | ||
|
|
4c8b53237f | ||
|
|
f1ac3b5ac3 | ||
|
|
4ca7b1caa5 | ||
| 0c40e45266 | |||
|
|
de4b1c4f1f | ||
|
|
b1a06cafbb | ||
|
|
3b7f9efb4a | ||
|
|
85d9d4bf72 | ||
|
|
663260bee0 | ||
|
|
f743fa5ce2 | ||
| 67a982055e | |||
|
|
7255caad6e | ||
| f6e2f16191 | |||
|
|
e67052bd90 | ||
|
|
a0d6a1696a | ||
|
|
9954788c83 | ||
|
|
80c3444462 | ||
|
|
008373bdc0 | ||
|
|
6386870219
|
38
.gitea/workflows/build.yml
Normal file
38
.gitea/workflows/build.yml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
name: Nix Build
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
push:
|
||||||
|
workflow_run:
|
||||||
|
workflows: []
|
||||||
|
types: [completed]
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-nixos:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v6
|
||||||
|
|
||||||
|
- name: "Install Nix ❄️"
|
||||||
|
uses: cachix/install-nix-action@v31
|
||||||
|
|
||||||
|
# - uses: DeterminateSystems/nix-installer-action@v4
|
||||||
|
- uses: DeterminateSystems/magic-nix-cache-action@v13
|
||||||
|
- uses: DeterminateSystems/flake-checker-action@v12
|
||||||
|
|
||||||
|
- name: "Install Cachix ❄️"
|
||||||
|
uses: cachix/cachix-action@v17
|
||||||
|
with:
|
||||||
|
name: helcel
|
||||||
|
authToken: "${{ secrets.CACHIX_AUTH_TOKEN }}"
|
||||||
|
|
||||||
|
|
||||||
|
- name: "Build NixOS CI config ❄️"
|
||||||
|
run: |
|
||||||
|
nix build .#nixosConfigurations.ci.config.system.build.toplevel
|
||||||
|
|
||||||
|
- name: "Build NixOS Sandbox config ❄️"
|
||||||
|
run: |
|
||||||
|
nix build .#nixosConfigurations.sandbox.config.system.build.toplevel
|
||||||
|
|
||||||
30
.gitea/workflows/update.yml
Normal file
30
.gitea/workflows/update.yml
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
name: update-flake-lock
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
schedule:
|
||||||
|
- cron: '0 2 * * 6,7'
|
||||||
|
|
||||||
|
|
||||||
|
env:
|
||||||
|
USER: "runner"
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
lockfile:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v6
|
||||||
|
- name: Install nix
|
||||||
|
uses: DeterminateSystems/nix-installer-action@v22
|
||||||
|
with:
|
||||||
|
github-token: ${{ secrets.GH_TOKEN_FOR_UPDATES }}
|
||||||
|
extra_nix_config: |
|
||||||
|
experimental-features = nix-command flakes
|
||||||
|
- name: Update flake.lock
|
||||||
|
uses: DeterminateSystems/update-flake-lock@v28
|
||||||
|
with:
|
||||||
|
token: ${{ secrets.GT_TOKEN_FOR_UPDATES }}
|
||||||
|
pr-title: "[chore] Update flake.lock"
|
||||||
|
pr-labels: |
|
||||||
|
dependencies
|
||||||
|
automated
|
||||||
2
.gitignore
vendored
2
.gitignore
vendored
@@ -1,3 +1,5 @@
|
|||||||
result
|
result
|
||||||
age-key.txt
|
age-key.txt
|
||||||
.decrypted~common.yaml
|
.decrypted~common.yaml
|
||||||
|
.decrypted*
|
||||||
|
.tmp
|
||||||
75
.sops.yaml
75
.sops.yaml
@@ -4,43 +4,62 @@ keys:
|
|||||||
- &sora 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
|
- &sora 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
|
||||||
# Hosts
|
# Hosts
|
||||||
- &hosts:
|
- &hosts:
|
||||||
|
- &ci age13qv9dn9806paqgpjwmmkwtdzvv4qpv0ulksq0epnn8ufaxeug5zskyas3z
|
||||||
- &iriy age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s
|
- &iriy age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s
|
||||||
- &avalon age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
- &avalon age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
- &valinor age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
- &valinor age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
- &asgard age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
- &asgard age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
|
- &gateway age1lqvnzlendlmtwgstzrj4xzrwpatwx56k5az5au78fyg99yecwfzs3s6xn6
|
||||||
|
- &sandbox age1pf4auk6u2tmefuqpuc6mntr26cp4wcsmlhnn98arzxsp3753ruqsj0jqk3
|
||||||
|
|
||||||
creation_rules:
|
creation_rules:
|
||||||
- path_regex: modules/nixos/system/security/sops/iriy.ya?ml$
|
- path_regex: modules/shared/sops/private/iriy.[a-z]+
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *iriy
|
- *iriy
|
||||||
pgp:
|
pgp:
|
||||||
- *sora
|
- *sora
|
||||||
- path_regex: modules/nixos/system/security/sops/avalon.ya?ml$
|
- path_regex: modules/shared/sops/private/avalon.[a-z]+
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *avalon
|
- *avalon
|
||||||
pgp:
|
pgp:
|
||||||
- *sora
|
- *sora
|
||||||
- path_regex: modules/nixos/system/security/sops/valinor.ya?ml$
|
- path_regex: modules/shared/sops/private/valinor.[a-z]+
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *valinor
|
- *valinor
|
||||||
pgp:
|
pgp:
|
||||||
- *sora
|
- *sora
|
||||||
- path_regex: modules/nixos/system/security/sops/asgard.ya?ml$
|
- path_regex: modules/shared/sops/private/asgard.[a-z]+
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *asgard
|
- *asgard
|
||||||
pgp:
|
pgp:
|
||||||
- *sora
|
- *sora
|
||||||
|
|
||||||
- path_regex: modules/nixos/system/security/sops/common.yaml$
|
- path_regex: modules/shared/sops/common.[a-z]+
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *valinor
|
- *valinor
|
||||||
- *iriy
|
- *iriy
|
||||||
- *avalon
|
- *avalon
|
||||||
- *asgard
|
- *asgard
|
||||||
pgp:
|
- *gateway
|
||||||
- *sora
|
pgp:
|
||||||
|
- *sora
|
||||||
|
|
||||||
|
- path_regex: modules/shared/sops/mock.[a-z]+
|
||||||
|
key_groups:
|
||||||
|
- age:
|
||||||
|
- *ci
|
||||||
|
- *sandbox
|
||||||
|
|
||||||
|
- path_regex: modules/server/sops/server.[a-z]+
|
||||||
|
key_groups:
|
||||||
|
- age:
|
||||||
|
- *avalon
|
||||||
|
- *sandbox
|
||||||
|
|
||||||
|
pgp:
|
||||||
|
- *sora
|
||||||
|
|||||||
300
flake.lock
generated
300
flake.lock
generated
@@ -1,5 +1,27 @@
|
|||||||
{
|
{
|
||||||
"nodes": {
|
"nodes": {
|
||||||
|
"arion": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-parts": "flake-parts",
|
||||||
|
"haskell-flake": "haskell-flake",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1770259557,
|
||||||
|
"narHash": "sha256-EvZ09k9+mzXAngPzU2K7oLLUDlKoT1numb4bDb3Gtl4=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "arion",
|
||||||
|
"rev": "9b24cf65c72cb0e9616e437d55e1ac8e5c6bc715",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "arion",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"base16-schemes": {
|
"base16-schemes": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
@@ -23,11 +45,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708231718,
|
"lastModified": 1777780666,
|
||||||
"narHash": "sha256-IZdieFWvhBkxoOFMDejqLUYqD94WN6k0YSpw0DFy+4g=",
|
"narHash": "sha256-8wURyQMdDkGUarSTKOGdCuFfYiwa3HbzwscUfn3STDE=",
|
||||||
"owner": "lnl7",
|
"owner": "lnl7",
|
||||||
"repo": "nix-darwin",
|
"repo": "nix-darwin",
|
||||||
"rev": "0e6857fa1d632637488666c08e7b02c08e3178f8",
|
"rev": "8c62fba0854ba15c8917aed18894dbccb48a3777",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -37,13 +59,55 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"flake-parts": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs-lib": [
|
||||||
|
"arion",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1769996383,
|
||||||
|
"narHash": "sha256-AnYjnFWgS49RlqX7LrC4uA+sCCDBj0Ry/WOJ5XWAsa0=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"rev": "57928607ea566b5db3ad13af0e57e921e6b12381",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-parts_2": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs-lib": [
|
||||||
|
"nur",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1733312601,
|
||||||
|
"narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"hardware": {
|
"hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708091350,
|
"lastModified": 1778143761,
|
||||||
"narHash": "sha256-o28BJYi68qqvHipT7V2jkWxDiMS1LF9nxUsou+eFUPQ=",
|
"narHash": "sha256-lkesY6x2X2qxlqLM7CT2iM/0rP2JB7fruPN3h8POXmI=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "106d3fec43bcea19cb2e061ca02531d54b542ce3",
|
"rev": "3bcaa367d4c550d687a17ac792fd5cda214ee871",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -52,6 +116,22 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"haskell-flake": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1675296942,
|
||||||
|
"narHash": "sha256-u1X1sblozi5qYEcLp1hxcyo8FfDHnRUVX3dJ/tW19jY=",
|
||||||
|
"owner": "srid",
|
||||||
|
"repo": "haskell-flake",
|
||||||
|
"rev": "c2cafce9d57bfca41794dc3b99c593155006c71e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "srid",
|
||||||
|
"ref": "0.1.0",
|
||||||
|
"repo": "haskell-flake",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"home-manager": {
|
"home-manager": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -59,90 +139,20 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708031129,
|
"lastModified": 1777851538,
|
||||||
"narHash": "sha256-EH20hJfNnc1/ODdDVat9B7aKm0B95L3YtkIRwKLvQG8=",
|
"narHash": "sha256-Gp8qwTEYNoy2yvmErVGlvLOQvrtEECCAKbonW7VJef8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "3d6791b3897b526c82920a2ab5f61d71985b3cf8",
|
"rev": "cc09c0f9b7eaa95c2d9827338a5eb03d32505ca5",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
|
"ref": "release-25.11",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"hyprland": {
|
|
||||||
"inputs": {
|
|
||||||
"hyprland-protocols": "hyprland-protocols",
|
|
||||||
"nixpkgs": [
|
|
||||||
"nixpkgs"
|
|
||||||
],
|
|
||||||
"systems": "systems",
|
|
||||||
"wlroots": "wlroots",
|
|
||||||
"xdph": "xdph"
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1708223041,
|
|
||||||
"narHash": "sha256-xhQyesCfdA9tzfko/DE+UiCZhkK7Diun/DZFG9P4dyo=",
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "Hyprland",
|
|
||||||
"rev": "7e8bcd675de15ee2498f1aa15c5b335e9a9a55f0",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "Hyprland",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"hyprland-protocols": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"hyprland",
|
|
||||||
"nixpkgs"
|
|
||||||
],
|
|
||||||
"systems": [
|
|
||||||
"hyprland",
|
|
||||||
"systems"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1691753796,
|
|
||||||
"narHash": "sha256-zOEwiWoXk3j3+EoF3ySUJmberFewWlagvewDRuWYAso=",
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "hyprland-protocols",
|
|
||||||
"rev": "0c2ce70625cb30aef199cb388f99e19a61a6ce03",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "hyprland-protocols",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"hyprlang": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"hyprland",
|
|
||||||
"xdph",
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1704287638,
|
|
||||||
"narHash": "sha256-TuRXJGwtK440AXQNl5eiqmQqY4LZ/9+z/R7xC0ie3iA=",
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "hyprlang",
|
|
||||||
"rev": "6624f2bb66d4d27975766e81f77174adbe58ec97",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "hyprlang",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nix-colors": {
|
"nix-colors": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"base16-schemes": "base16-schemes",
|
"base16-schemes": "base16-schemes",
|
||||||
@@ -162,18 +172,34 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixUnstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708118438,
|
"lastModified": 1778274207,
|
||||||
"narHash": "sha256-kk9/0nuVgA220FcqH/D2xaN6uGyHp/zoxPNUmPCMmEE=",
|
"narHash": "sha256-I4puXmX1iovcCHZlRmztO3vW0mAbbRvq4F8wgIMQ1MM=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "5863c27340ba4de8f83e7e3c023b9599c3cb3c80",
|
"rev": "b3da656039dc7a6240f27b2ef8cc6a3ef3bccae7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"ref": "nixos-unstable",
|
"ref": "nixpkgs-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1778003029,
|
||||||
|
"narHash": "sha256-q/nkKLDtHIyLjZpKhWk3cSK5IYsFqtMd6UtXF3ddjgA=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "0c88e1f2bdb93d5999019e99cb0e61e1fe2af4c5",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-25.11",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@@ -193,13 +219,33 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nur": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708241357,
|
"lastModified": 1777954456,
|
||||||
"narHash": "sha256-dThUfhqic3DXElde6mdUEXDqSYdSU3wTiPrBiSAgajI=",
|
"narHash": "sha256-hGdgeU2Nk87RAuZyYjyDjFL6LK7dAZN5RE9+hrDTkDU=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "549bd84d6279f9852cae6225e372cc67fb91a4c1",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nur": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-parts": "flake-parts_2",
|
||||||
|
"nixpkgs": "nixpkgs_2"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1778376280,
|
||||||
|
"narHash": "sha256-pL2F2FF2FN7zWr5o/vG7GiYOSjp+DUNyPIYqNaLQFFs=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nur",
|
"repo": "nur",
|
||||||
"rev": "507abb80942a552e20305208f9e98208bce01bf1",
|
"rev": "828688994167eb57628c98fd1d7e1223b079cda1",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -210,11 +256,12 @@
|
|||||||
},
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
|
"arion": "arion",
|
||||||
"darwin": "darwin",
|
"darwin": "darwin",
|
||||||
"hardware": "hardware",
|
"hardware": "hardware",
|
||||||
"home-manager": "home-manager",
|
"home-manager": "home-manager",
|
||||||
"hyprland": "hyprland",
|
|
||||||
"nix-colors": "nix-colors",
|
"nix-colors": "nix-colors",
|
||||||
|
"nixUnstable": "nixUnstable",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"sops-nix": "sops-nix"
|
"sops-nix": "sops-nix"
|
||||||
@@ -224,17 +271,14 @@
|
|||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
|
||||||
"nixpkgs-stable": [
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1708225343,
|
"lastModified": 1777944972,
|
||||||
"narHash": "sha256-Q0uVUOfumc1DcKsIJIfMCHph08MjkOvZxvPb/Vi8hWw=",
|
"narHash": "sha256-VfGRo1qTBKOe3s2gOv8LSoA6Fk19PvBlwQ1ECN0Evn8=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "ffed177a9d2c685901781c3c6c9024ae0ffc252b",
|
"rev": "c591bf665727040c6cc5cb409079acb22dcce33c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -242,70 +286,6 @@
|
|||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"systems": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1689347949,
|
|
||||||
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
|
|
||||||
"owner": "nix-systems",
|
|
||||||
"repo": "default-linux",
|
|
||||||
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nix-systems",
|
|
||||||
"repo": "default-linux",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"wlroots": {
|
|
||||||
"flake": false,
|
|
||||||
"locked": {
|
|
||||||
"host": "gitlab.freedesktop.org",
|
|
||||||
"lastModified": 1706359063,
|
|
||||||
"narHash": "sha256-5HUTG0p+nCJv3cn73AmFHRZdfRV5AD5N43g8xAePSKM=",
|
|
||||||
"owner": "wlroots",
|
|
||||||
"repo": "wlroots",
|
|
||||||
"rev": "00b869c1a96f300a8f25da95d624524895e0ddf2",
|
|
||||||
"type": "gitlab"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"host": "gitlab.freedesktop.org",
|
|
||||||
"owner": "wlroots",
|
|
||||||
"repo": "wlroots",
|
|
||||||
"rev": "00b869c1a96f300a8f25da95d624524895e0ddf2",
|
|
||||||
"type": "gitlab"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"xdph": {
|
|
||||||
"inputs": {
|
|
||||||
"hyprland-protocols": [
|
|
||||||
"hyprland",
|
|
||||||
"hyprland-protocols"
|
|
||||||
],
|
|
||||||
"hyprlang": "hyprlang",
|
|
||||||
"nixpkgs": [
|
|
||||||
"hyprland",
|
|
||||||
"nixpkgs"
|
|
||||||
],
|
|
||||||
"systems": [
|
|
||||||
"hyprland",
|
|
||||||
"systems"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1706521509,
|
|
||||||
"narHash": "sha256-AInZ50acOJ3wzUwGzNr1TmxGTMx+8j6oSTzz4E7Vbp8=",
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "xdg-desktop-portal-hyprland",
|
|
||||||
"rev": "c06fd88b3da492b8f9067be021b9184f7012b5a8",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "hyprwm",
|
|
||||||
"repo": "xdg-desktop-portal-hyprland",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": "root",
|
"root": "root",
|
||||||
|
|||||||
62
flake.nix
62
flake.nix
@@ -1,13 +1,14 @@
|
|||||||
{
|
{
|
||||||
description = "SoraFlake";
|
description = "SoraFlake";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
# Trick renovate into working: "github:NixOS/nixpkgs/nixpkgs-unstable"
|
||||||
|
nixUnstable.url = "github:nixos/nixpkgs/nixpkgs-unstable";
|
||||||
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
|
||||||
hardware.url = "github:nixos/nixos-hardware";
|
hardware.url = "github:nixos/nixos-hardware";
|
||||||
nur.url = "github:nix-community/nur";
|
nur.url = "github:nix-community/nur";
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager";
|
url = "github:nix-community/home-manager/release-25.11";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -16,66 +17,31 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
hyprland = {
|
|
||||||
url = "github:hyprwm/Hyprland";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
};
|
|
||||||
sops-nix = {
|
sops-nix = {
|
||||||
url = "github:Mic92/sops-nix";
|
url = "github:Mic92/sops-nix";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
inputs.nixpkgs-stable.follows = "nixpkgs";
|
|
||||||
};
|
};
|
||||||
nix-colors.url = "github:misterio77/nix-colors";
|
nix-colors.url = "github:misterio77/nix-colors";
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = inputs:
|
outputs = inputs:
|
||||||
|
|
||||||
let gen = import ./generator.nix { inherit inputs; };
|
let gen = import ./generator.nix { inherit inputs; };
|
||||||
in {
|
in {
|
||||||
devShells = import ./shells { inherit inputs; };
|
devShells = import ./shells { inherit inputs; };
|
||||||
|
|
||||||
nixosConfigurations = {
|
nixosConfigurations = {
|
||||||
valinor = gen.generate {
|
valinor = gen.generate { host = "valinor"; };
|
||||||
type = "nixos";
|
iriy = gen.generate { host = "iriy"; };
|
||||||
system = "x86_64-linux";
|
efir = gen.generate { host = "efir"; };
|
||||||
host = "valinor";
|
avalon = gen.generate { host = "avalon"; };
|
||||||
};
|
ci = gen.generate { host = "ci"; };
|
||||||
iriy = gen.generate {
|
sandbox = gen.generate { host = "sandbox"; };
|
||||||
type = "nixos";
|
gateway = gen.generate { host = "gateway"; };
|
||||||
system = "x86_64-linux";
|
|
||||||
host = "iriy";
|
|
||||||
};
|
|
||||||
efir = gen.generate {
|
|
||||||
type = "nixos";
|
|
||||||
system = "x86_64-linux";
|
|
||||||
host = "efir";
|
|
||||||
};
|
|
||||||
avalon = gen.generate {
|
|
||||||
type = "nixos";
|
|
||||||
system = "x86_64-linux";
|
|
||||||
host = "avalon";
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
darwinConfigurations = {
|
|
||||||
asgard = gen.generate {
|
|
||||||
type = "macos";
|
|
||||||
system = "x86_64-darwin";
|
|
||||||
host = "asgard";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
darwinConfigurations = { asgard = gen.generate { host = "asgard"; }; };
|
||||||
homeConfigurations = {
|
homeConfigurations = {
|
||||||
yomi = gen.generate {
|
yomi = gen.generate { host = "example"; };
|
||||||
type = "home";
|
example = gen.generate { host = "example"; };
|
||||||
system = "arm-64";
|
|
||||||
host = "example";
|
|
||||||
};
|
|
||||||
example = gen.generate {
|
|
||||||
type = "home";
|
|
||||||
system = "-"; # supports any
|
|
||||||
host = "example";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -1,51 +1,67 @@
|
|||||||
{ inputs, ... }: {
|
{ inputs, ... }: {
|
||||||
generate = { type, system, host }:
|
generate = { host }:
|
||||||
({
|
let
|
||||||
|
syscfg = import ./systems/${host}/cfg.nix;
|
||||||
|
nameValuePair = name: value: { inherit name value; };
|
||||||
|
in ({
|
||||||
"nixos" = inputs.nixpkgs.lib.nixosSystem {
|
"nixos" = inputs.nixpkgs.lib.nixosSystem {
|
||||||
system = system;
|
system = syscfg.syscfg.system;
|
||||||
|
specialArgs = { inherit inputs; };
|
||||||
modules = [
|
modules = [
|
||||||
inputs.sops-nix.nixosModules.sops
|
./modules/shared/syscfg
|
||||||
|
./modules/shared/sops
|
||||||
./modules/nixos
|
./modules/nixos
|
||||||
|
syscfg
|
||||||
./systems/${host}
|
./systems/${host}
|
||||||
|
inputs.sops-nix.nixosModules.sops
|
||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = { inherit inputs; };
|
home-manager.extraSpecialArgs = { inherit inputs; };
|
||||||
home-manager.users.sora = {
|
home-manager.users = builtins.listToAttrs (map (userConfig:
|
||||||
imports = [
|
nameValuePair userConfig.username {
|
||||||
./modules/home
|
imports = [
|
||||||
inputs.nix-colors.homeManagerModule
|
./modules/shared/syscfg
|
||||||
inputs.hyprland.homeManagerModules.default
|
./modules/shared/colors
|
||||||
./systems/${host}/home.nix
|
./modules/home
|
||||||
];
|
syscfg
|
||||||
};
|
{ usercfg = userConfig; }
|
||||||
|
inputs.nix-colors.homeManagerModule
|
||||||
|
# inputs.hyprland.homeManagerModules.default
|
||||||
|
inputs.sops-nix.homeManagerModules.sops
|
||||||
|
];
|
||||||
|
}) syscfg.syscfg.users);
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
"macos" = inputs.darwin.lib.darwinSystem {
|
"macos" = inputs.darwin.lib.darwinSystem {
|
||||||
system = system;
|
system = syscfg.system;
|
||||||
modules = [
|
modules = [
|
||||||
inputs.sops-nix.nixosModules.sops
|
./modules/shared/syscfg
|
||||||
|
./modules/shared/sops
|
||||||
|
syscfg
|
||||||
./systems/${host}
|
./systems/${host}
|
||||||
|
inputs.sops-nix.nixosModules.sops
|
||||||
inputs.home-manager.darwinModules.home-manager
|
inputs.home-manager.darwinModules.home-manager
|
||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = { inherit inputs; };
|
home-manager.extraSpecialArgs = { inherit inputs; };
|
||||||
home-manager.users.sora = {
|
home-manager.users = builtins.listToAttrs (map (userConfig:
|
||||||
imports = [
|
nameValuePair userConfig.username {
|
||||||
inputs.nix-colors.homeManagerModule
|
imports = [
|
||||||
inputs.hyprland.homeManagerModules.default
|
inputs.nix-colors.homeManagerModule
|
||||||
./systems/${host}/home.nix
|
inputs.sops-nix.homeManagerModules.sops
|
||||||
];
|
];
|
||||||
};
|
}) syscfg.syscfg.users);
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
"home" = inputs.home-manager.lib.homeManagerConfiguration {
|
"home" = inputs.home-manager.lib.homeManagerConfiguration {
|
||||||
modules = [ ./modules/home ./systems/${host}/home.nix ];
|
modules = [ ./modules/home ];
|
||||||
};
|
};
|
||||||
_ = throw "Unsupported system";
|
_ = throw "Unsupported system";
|
||||||
}.${type});
|
}.${syscfg.syscfg.type});
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,12 +1,21 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
|
|
||||||
|
#environment.sessionVariables.SOPS_AGE_KEY_FILE = keyFilePath;
|
||||||
systemd.user.startServices = "sd-switch";
|
systemd.user.startServices = "sd-switch";
|
||||||
programs.home-manager.enable = true;
|
programs.home-manager.enable = true;
|
||||||
|
|
||||||
home = {
|
home = {
|
||||||
username = "${config.homecfg.username}";
|
username = "${config.usercfg.username}";
|
||||||
homeDirectory = "/home/${config.homecfg.username}";
|
homeDirectory = "/home/${config.usercfg.username}";
|
||||||
|
|
||||||
stateVersion = "23.11";
|
stateVersion = "24.11";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
#SOPS
|
||||||
|
# sops.defaultSopsFile = ./sops/${config.usercfg.username}.yaml;
|
||||||
|
# sops.age.keyFile = "/var/lib/sops-nix/age-key.txt";
|
||||||
|
# sops.age.generateKey = true;
|
||||||
|
# sops.secrets."github_user_key" = { };
|
||||||
|
# sops.secrets."curse_forge_key" = { };
|
||||||
}
|
}
|
||||||
|
|||||||
69
modules/home/base/sops/sora.yaml
Normal file
69
modules/home/base/sops/sora.yaml
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
curse_forge_key: ENC[AES256_GCM,data:PhhwPhUys/WDzXb40iFlrUcwFEJVzi49vDlm5Hpc7IUwbBiQI1Zvi6115THMvarnGESDyouPfoZP0wha,iv:x//EzR4QwdD0UxqV97yUepc39DopoqiDT21unpF9R2E=,tag:5jM1EibWo0wI+PS70+kb/Q==,type:str]
|
||||||
|
github_user_key: ENC[AES256_GCM,data:RvBsQjWGd2qRCvBzcpMv8FIXGY/GiPd9o0x2Oq+NlbXxR2NMqNBNLw==,iv:99AcmOWFft7XQAn7YrGjZuCvz0M5wUkYeInsWwyeUFM=,tag:wkw2YQGi9j/8XtOFd8KhdQ==,type:str]
|
||||||
|
sops:
|
||||||
|
kms: []
|
||||||
|
gcp_kms: []
|
||||||
|
azure_kv: []
|
||||||
|
hc_vault: []
|
||||||
|
age:
|
||||||
|
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
|
enc: |
|
||||||
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBraWFDRFUxQ2l5OWV1OXNK
|
||||||
|
UExEbWZkM0kzVk1rZG4yY3pBLzdMVWVJS0UwCnhlWFJ5T2lZUXJyNkg1ejQxaU1t
|
||||||
|
L3F2RUhldTY3N2xXL0hwczNKRzNjcncKLS0tIEkycHoxcDBGNyt2V3RDY29wNGVp
|
||||||
|
TGg5Rk05VkRsaXM1Q0NxMmtMajRORDAKqjFldiAYJKjmnkeDkwanjYvhL6645DZ5
|
||||||
|
dVXExjqO/DG733ge8HFyKzpfpkzRymV1giUwxBdII1dd0mJ2ncINeA==
|
||||||
|
-----END AGE ENCRYPTED FILE-----
|
||||||
|
- recipient: age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s
|
||||||
|
enc: |
|
||||||
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB3UkRjblIvYStZUzQyRHA1
|
||||||
|
ZGVXeHhrN0kyVkxZdms5U3gwVFlPMW12MVJjCjRkVURpZXBzb0tYenB4dGxKamh6
|
||||||
|
VXVBMmo1Ujkvd2VTRExyWE5MbVJaclUKLS0tIDVhRkYzZmEzUG00Q2IwOWZUMVVt
|
||||||
|
ODVIbytpcjN1cVMyaG1qVVdkRmtaMzQKNsvD9DpK/raDBob+IcuNk72tQDts36kJ
|
||||||
|
QhtoLy8MvUymi49PdEWrgyf68w5XwRO/U4iINhR0qzm0glg/XcyHjA==
|
||||||
|
-----END AGE ENCRYPTED FILE-----
|
||||||
|
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
|
enc: |
|
||||||
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJc3hKWkk3ckNOY2UyTVhG
|
||||||
|
MmtLaEd0K04yaGxiOUoxMXkzOEFnYis4VkhnCktDRFM2bS8vb05OWDdwa0RwRlNO
|
||||||
|
cmlZemtxVGZ6S0tNTDV1cmE1N0pVWnMKLS0tIE9EZllycHJpcEY2R1pwOFhOZEU3
|
||||||
|
L01IcytDd3BPb0VOTW9DQ2lUdUVJS0kKiD+C+3mK1b/eIwCEFanFgYGLNk3JNPQ7
|
||||||
|
i1UqzbHVxSd0q/YVwdKAcj0jA6EezGm275tgq7IVsy2sHkvRMaEDtQ==
|
||||||
|
-----END AGE ENCRYPTED FILE-----
|
||||||
|
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
||||||
|
enc: |
|
||||||
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAweVU3TkxFZzRnd2I2clN2
|
||||||
|
ZTlTWmhwQkhVc1hnOXFvZVVDSWpHMVh1TGtrCkc3M1pUTnZCMHpvYXB5ZVhreGxa
|
||||||
|
ZVY2cG5Ja2ltL3k2Q1VEalc5TTNFMXcKLS0tIGd5UWl0RGVXT211Zm51dlB6WFZ1
|
||||||
|
STRtTVpVTCtVZ1FUNENqWFFVNTNuaVUKN6HRiZjTdENeif8dJ29urBxPXDaosjjY
|
||||||
|
InN4Ko6YUaGfvB1DTrKIzrxOpsHS+XjisoGfT71tJwwEOoREklEO/A==
|
||||||
|
-----END AGE ENCRYPTED FILE-----
|
||||||
|
lastmodified: "2024-12-23T18:05:22Z"
|
||||||
|
mac: ENC[AES256_GCM,data:YSi2xIwz50VxUDL3QzGVUwRWUgZhvudSLCKgwIbWm8gkuAJ/V2sVRhJNVQJ1YvLO44ob5hmrgR4wSnOdAbS7FrpbLcJuoYBjVUTDjy+j6otnIDxEcYeciHhZ1pV/OiydBmJC+lZ4+SRdWdokL2HaXRKgc9QT9e/MdAbFIzI1x90=,iv:8rj8yEqHTMgoGu31RVskYizmROB/5I0ajZJ/EcmlVfE=,tag:PILFCyXY8sXYGxCEHS7qCg==,type:str]
|
||||||
|
pgp:
|
||||||
|
- created_at: "2023-04-20T10:20:17Z"
|
||||||
|
enc: |-
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
wcFMA6R3Y9nD7qMBAQ/8CVWQaYKfOzvPIllZyyWpUjHRLLXaR8MNJ8U5WI/tdwdN
|
||||||
|
9UScDYJFuYRW7Q9s4Mt961kBGpaHqe9MUZBxUDlYX59+EN3FbO/eMQ5OqI05ESmL
|
||||||
|
TvZB4+S9C5o73nuypSDNvYz+Lgq6DO25ZPhXdtPhx2DE4G31/wft/LpxhjalIjI8
|
||||||
|
MU0Dv22R4qC+glJbe4GIF2IJ8XoxnnzjiGeSqiyv0QIBM0SzOtA5sKwNohWBnW7g
|
||||||
|
7vxOTm5+kyzG0dDjt3tFApgPDaA1wjofzhRuuveF52VBsuIA2opFdpqkyICvK6rn
|
||||||
|
NB5kUaPlY6A0m+n0oHSfY5wm/AnHNE4Oob/ifumAaB0EAJVUTRauI5M8SeJF0ya1
|
||||||
|
U0IQ9N2lb7Y6q4pqHywIa6fnylsqCfxInAYKMuslRq8f9t/qakb4/MYcnPrwpzjw
|
||||||
|
73/naiNoJmG6NVTkM52qTtOqZAmsaQd5cigTuPW2Z2CJq1yLZEVGSSd1DUGUjBDK
|
||||||
|
nQGucpVVVpD+ifrIPz+Iqwy+5NoZZm/Oa9pKJGFzqXinnDNZaqtgpmTw9QxcSeaP
|
||||||
|
VvGZG9CDd89MtAm1VQyuqi1bQ2faq3G0xNrLl7xUsfmjx4ofW+JXR87OzvGfLPhu
|
||||||
|
Sjl3kS9j5/MEBRBg3n9gNkgSu5Sy3ilhckY3yjTgAT9Gw2giDhCiUXi1/7KrGprS
|
||||||
|
UQHPCSsjyWsyuYVa3lAP/WPdVclc4WOdfYcetUCXBVP7LQr0bq+IG+2J0nnY3mDt
|
||||||
|
Va5k4sP1qu6Ecrs2JioQ1V2H+VmcrRykBWnMXl1tDSWKMA==
|
||||||
|
=pS8X
|
||||||
|
-----END PGP MESSAGE-----
|
||||||
|
fp: 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
|
||||||
|
unencrypted_suffix: _unencrypted
|
||||||
|
version: 3.9.2
|
||||||
@@ -1,15 +1,17 @@
|
|||||||
{ config, pkgs, ... }: {
|
{ config, lib, pkgs, ... }: {
|
||||||
|
|
||||||
programs.git = {
|
programs.git = {
|
||||||
enable = true;
|
enable = true;
|
||||||
userEmail = "${config.homecfg.git.email}";
|
signing = lib.mkIf (config.usercfg.git.key != null) {
|
||||||
userName = "${config.homecfg.git.username}";
|
key = config.usercfg.git.key;
|
||||||
signing = {
|
|
||||||
key = "${config.homecfg.git.key}";
|
|
||||||
signByDefault = true;
|
signByDefault = true;
|
||||||
};
|
};
|
||||||
ignores = [ "*result*" ".direnv" "node_modules" ];
|
ignores = [ "*result*" ".direnv" "node_modules" ];
|
||||||
extraConfig = { core.hooksPath = "./.dev/hooks"; };
|
settings = {
|
||||||
|
core.hooksPath = "./.dev/hooks";
|
||||||
|
user.email = "${config.usercfg.git.email}";
|
||||||
|
user.name = "${config.usercfg.git.username}";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
home.packages = with pkgs; [ tig ];
|
home.packages = with pkgs; [ tig ];
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
cbonsai
|
cbonsai
|
||||||
pipes-rs
|
pipes-rs
|
||||||
cmatrix
|
cmatrix
|
||||||
cava
|
#cava
|
||||||
sl
|
sl
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -9,10 +9,16 @@ in {
|
|||||||
"sudo" = "sudo ";
|
"sudo" = "sudo ";
|
||||||
"devsh" =
|
"devsh" =
|
||||||
"nix develop --profile /tmp/devsh-env ${nixflake_url}#devsh -c zsh";
|
"nix develop --profile /tmp/devsh-env ${nixflake_url}#devsh -c zsh";
|
||||||
|
"cdevsh" =
|
||||||
|
"nix develop --profile /tmp/devsh-env -c zsh";
|
||||||
"nixb" = "(sudo nixos-rebuild switch --flake ${nixflake_url})";
|
"nixb" = "(sudo nixos-rebuild switch --flake ${nixflake_url})";
|
||||||
"nixgc" = "sudo nix-collect-garbage -d && nix-collect-garbage -d";
|
"nixgc" = "sudo nix-collect-garbage -d && nix-collect-garbage -d";
|
||||||
"ssh" = "TERM=xterm-256color ${pkgs.openssh}/bin/ssh";
|
"ssh" = "TERM=xterm-256color ${pkgs.openssh}/bin/ssh";
|
||||||
"top" = "btop";
|
"top" = "btop";
|
||||||
};
|
};
|
||||||
|
initContent = ''
|
||||||
|
sopsu() {nix-shell -p sops --run "sops updatekeys $1";}
|
||||||
|
sopsn() {nix-shell -p sops --run "sops $1";}
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
{ ... }: { imports = [ ./base ./cli ./gui ./homecfg ./wayland ./xdg ./xorg ]; }
|
{ ... }: { imports = [ ./base ./cli ./gui ./wayland ./xdg ./xorg ]; }
|
||||||
|
|||||||
@@ -1,3 +1,3 @@
|
|||||||
{ ... }: {
|
{ ... }: {
|
||||||
imports = [ ./develop ./firefox ./images ./mpv ./pipewire ./vosk ./zathura ];
|
imports = [ ./develop ./firefox ./images ./mpv ./pipewire ./zathura ];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
imports = [ ./vscodium ];
|
imports = [ ./vscodium ];
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.develop) {
|
config = lib.mkIf (config.syscfg.make.develop) {
|
||||||
home.packages = with pkgs; [ blender godot_4 ];
|
home.packages = with pkgs; [ blender godot_4 openscad-unstable orca-slicer pandoc claude-code];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,17 +1,20 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.develop) {
|
config = lib.mkIf (config.syscfg.make.develop) {
|
||||||
programs.vscode = {
|
programs.vscode = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.vscodium;
|
package = pkgs.vscodium;
|
||||||
extensions = with pkgs.vscode-extensions; [
|
#profiles.default = {
|
||||||
bbenoist.nix
|
profiles.default.extensions = with pkgs.vscode-extensions; [
|
||||||
esbenp.prettier-vscode
|
bbenoist.nix
|
||||||
golang.go
|
esbenp.prettier-vscode
|
||||||
ms-python.vscode-pylance
|
golang.go
|
||||||
ms-vscode.cpptools
|
ms-python.vscode-pylance
|
||||||
dbaeumer.vscode-eslint
|
ms-vscode.cpptools
|
||||||
];
|
dbaeumer.vscode-eslint
|
||||||
|
continue.continue
|
||||||
|
];
|
||||||
|
#};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
programs.firefox = {
|
programs.firefox = {
|
||||||
enable = true;
|
enable = true;
|
||||||
profiles = {
|
profiles = {
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
programs.imv.enable = true;
|
programs.imv.enable = true;
|
||||||
|
|
||||||
programs.obs-studio.enable = true;
|
programs.obs-studio.enable = true;
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
programs.mpv = {
|
programs.mpv = {
|
||||||
enable = true;
|
enable = true;
|
||||||
scripts = with pkgs; [ mpvScripts.mpris ];
|
scripts = with pkgs; [ mpvScripts.mpris ];
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
xdg.configFile."pipewire/pipewire-pulse.conf.d/desktop.conf".text = ''
|
xdg.configFile."pipewire/pipewire-pulse.conf.d/desktop.conf".text = ''
|
||||||
context.modules = [
|
context.modules = [
|
||||||
{ name = libpipewire-module-loopback
|
{ name = libpipewire-module-loopback
|
||||||
@@ -25,6 +25,20 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
{ name = "libpipewire-module-loopback"
|
||||||
|
args = {
|
||||||
|
node.description = "Virtual Loopback"
|
||||||
|
audio.position = [ FL FR ]
|
||||||
|
capture.props = {
|
||||||
|
media.class = "Audio/Sink"
|
||||||
|
node.name = "vloopback_sink"
|
||||||
|
}
|
||||||
|
playback.props = {
|
||||||
|
media.class = "Audio/Source"
|
||||||
|
node.name = "vloopback_source"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
]
|
]
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
custom.vosk.base
|
custom.vosk.base
|
||||||
jq
|
jq
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
programs.zathura = {
|
programs.zathura = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
services.nextcloud-client.enable = true;
|
services.nextcloud-client.enable = true;
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
@@ -10,8 +10,11 @@
|
|||||||
xfce.tumbler
|
xfce.tumbler
|
||||||
|
|
||||||
telegram-desktop
|
telegram-desktop
|
||||||
|
discord-canary
|
||||||
pavucontrol
|
pavucontrol
|
||||||
keepassxc
|
keepassxc
|
||||||
|
nextcloud-client
|
||||||
|
|
||||||
gramps
|
gramps
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,20 +1,22 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ inputs, lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
imports = [ ./openttd.nix ];
|
imports = [ ./openttd.nix ./wow.nix ];
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.game) {
|
config = lib.mkIf (config.syscfg.make.game) {
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
# custom.simc
|
|
||||||
|
|
||||||
#games
|
#games
|
||||||
steam
|
# steam
|
||||||
gamemode
|
gamemode
|
||||||
gamescope
|
#gamescope
|
||||||
mangohud
|
#mangohud
|
||||||
prismlauncher
|
prismlauncher
|
||||||
openttd-jgrpp
|
openttd-jgrpp
|
||||||
bottles
|
#bottles
|
||||||
|
lutris
|
||||||
|
unstable.umu-launcher
|
||||||
|
# wine
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.game) {
|
config = lib.mkIf (config.syscfg.make.game) {
|
||||||
xdg.configFile."openttd/openttd.cfg".text = ''
|
xdg.configFile."openttd/openttd.cfg".text = ''
|
||||||
[misc]
|
[misc]
|
||||||
display_opt = SHOW_TOWN_NAMES|SHOW_STATION_NAMES|SHOW_SIGNS|FULL_ANIMATION|FULL_DETAIL|WAYPOINTS|SHOW_COMPETITOR_SIGNS
|
display_opt = SHOW_TOWN_NAMES|SHOW_STATION_NAMES|SHOW_SIGNS|FULL_ANIMATION|FULL_DETAIL|WAYPOINTS|SHOW_COMPETITOR_SIGNS
|
||||||
|
|||||||
23
modules/home/gui/games/wow.nix
Normal file
23
modules/home/gui/games/wow.nix
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
{ pkgs, lib, config, sops, ... }: {
|
||||||
|
|
||||||
|
config = lib.mkIf (config.syscfg.make.game) {
|
||||||
|
|
||||||
|
home.packages = with pkgs;
|
||||||
|
[
|
||||||
|
# custom.simc
|
||||||
|
unstable.instawow
|
||||||
|
];
|
||||||
|
|
||||||
|
# templates buggy currently
|
||||||
|
#xdg.configFile."instawow/config.json" = ''${config.sops.templates."instawow_config.json".path}'';
|
||||||
|
sops.templates."instawow_config.json".content = ''
|
||||||
|
{
|
||||||
|
"auto_update_check": true,
|
||||||
|
"access_tokens": {
|
||||||
|
"cfcore": "${config.sops.placeholder.curse_forge_key}",
|
||||||
|
"github": "${config.sops.placeholder.github_user_key}",
|
||||||
|
"wago_addons": null
|
||||||
|
}
|
||||||
|
}'';
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -5,7 +5,7 @@ let
|
|||||||
wallpaperGen = import ./wallpaper-gen.nix { inherit pkgs config; };
|
wallpaperGen = import ./wallpaper-gen.nix { inherit pkgs config; };
|
||||||
in {
|
in {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.make.gui) {
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
home.pointerCursor = {
|
home.pointerCursor = {
|
||||||
package = pkgs.bibata-cursors;
|
package = pkgs.bibata-cursors;
|
||||||
name = "Bibata-Modern-Classic";
|
name = "Bibata-Modern-Classic";
|
||||||
@@ -17,7 +17,7 @@ in {
|
|||||||
gtk = {
|
gtk = {
|
||||||
enable = true;
|
enable = true;
|
||||||
theme = {
|
theme = {
|
||||||
name = "${config.colorscheme.slug}";
|
name = "${config.colorscheme.slug}-Dark";
|
||||||
package = gtkThemeFromScheme;
|
package = gtkThemeFromScheme;
|
||||||
};
|
};
|
||||||
iconTheme = {
|
iconTheme = {
|
||||||
@@ -28,7 +28,7 @@ in {
|
|||||||
|
|
||||||
qt = {
|
qt = {
|
||||||
enable = true;
|
enable = true;
|
||||||
platformTheme = "gtk";
|
platformTheme.name = "gtk";
|
||||||
};
|
};
|
||||||
|
|
||||||
home.packages = [ wallpaperGen pkgs.swww ];
|
home.packages = [ wallpaperGen pkgs.swww ];
|
||||||
|
|||||||
@@ -9,60 +9,89 @@ let
|
|||||||
in pkgs.stdenv.mkDerivation rec {
|
in pkgs.stdenv.mkDerivation rec {
|
||||||
name = "generated-gtk-theme-${scheme.slug}";
|
name = "generated-gtk-theme-${scheme.slug}";
|
||||||
src = pkgs.fetchFromGitHub {
|
src = pkgs.fetchFromGitHub {
|
||||||
owner = "nana-4";
|
owner = "vinceliuice";
|
||||||
repo = "materia-theme";
|
repo = "Orchis-theme";
|
||||||
rev = "6e5850388a25f424b8193fe4523504d1dc364175";
|
rev = "5b73376721cf307101e22d7031c1f4b1344d1f63";
|
||||||
sha256 = "sha256-I6hpH0VTmftU4+/pRbztuTQcBKcOFBFbNZXJL/2bcgU=";
|
sha256 = "sha256-+2/CsgJ+rdDpCp+r5B/zys3PtFgtnu+ohTEUOtJNd1Y=";
|
||||||
};
|
};
|
||||||
buildInputs = with pkgs; [
|
|
||||||
sassc
|
|
||||||
bc
|
|
||||||
which
|
|
||||||
rendersvg
|
|
||||||
meson
|
|
||||||
ninja
|
|
||||||
nodePackages.sass
|
|
||||||
gtk4.dev
|
|
||||||
optipng
|
|
||||||
];
|
|
||||||
phases = [ "unpackPhase" "installPhase" ];
|
|
||||||
installPhase = ''
|
|
||||||
HOME=/build
|
|
||||||
chmod 777 -R .
|
|
||||||
patchShebangs .
|
|
||||||
mkdir -p $out/share/themes
|
|
||||||
mkdir bin
|
|
||||||
sed -e 's/handle-horz-.*//' -e 's/handle-vert-.*//' -i ./src/gtk-2.0/assets.txt
|
|
||||||
|
|
||||||
cat > /build/gtk-colors << EOF
|
nativeBuildInputs = with pkgs; [ gtk3 sassc ];
|
||||||
BG=${scheme.palette.base00}
|
buildInputs = with pkgs; [ gnome-themes-extra ];
|
||||||
FG=${scheme.palette.base07}
|
propagatedUserEnvPkgs = with pkgs; [ gtk-engine-murrine ];
|
||||||
HDR_BG=${scheme.palette.base00}
|
|
||||||
HDR_FG=${scheme.palette.base07}
|
preInstall = ''
|
||||||
SEL_BG=${scheme.palette.base03}
|
mkdir -p $out/share/themes
|
||||||
SEL_FG=${scheme.palette.base07}
|
cat > src/_sass/_color-palette-${scheme.slug}.scss << 'EOF'
|
||||||
TXT_BG=${scheme.palette.base01}
|
$red-light: #${scheme.palette.low0F};
|
||||||
TXT_FG=${scheme.palette.base07}
|
$red-dark: #${scheme.palette.high0F};
|
||||||
BTN_BG=${scheme.palette.base01}
|
|
||||||
BTN_FG=${scheme.palette.base07}
|
$pink-light: #${scheme.palette.low0E};
|
||||||
HDR_BTN_BG=${scheme.palette.base01}
|
$pink-dark: #${scheme.palette.high0E};
|
||||||
HDR_BTN_FG=${scheme.palette.base07}
|
|
||||||
MENU_BG=${scheme.palette.base00}
|
$purple-light: #${scheme.palette.low0D};
|
||||||
MENU_FG=${scheme.palette.base07}
|
$purple-dark: #${scheme.palette.high0D};
|
||||||
ACCENT_BG=${scheme.palette.base0C}
|
|
||||||
ACCENT_FG=${scheme.palette.base00}
|
$blue-light: #${scheme.palette.low0C};
|
||||||
MATERIA_SURFACE=${scheme.palette.base01}
|
$blue-dark: #${scheme.palette.high0C};
|
||||||
MATERIA_VIEW=${scheme.palette.base00}
|
|
||||||
WM_BORDER_FOCUS=${scheme.palette.base02}
|
$teal-light: #${scheme.palette.low0B};
|
||||||
WM_BORDER_UNFOCUS=${scheme.palette.base02}
|
$teal-dark: #${scheme.palette.high0B};
|
||||||
UNITY_DEFAULT_LAUNCHER_STYLE=False
|
|
||||||
ROUNDNESS=7
|
$green-light: #${scheme.palette.low0A};
|
||||||
NAME=${scheme.slug}
|
$green-dark: #${scheme.palette.high0A};
|
||||||
MATERIA_STYLE_COMPACT=True
|
$sea-light: #${scheme.palette.alt_low0B};
|
||||||
|
$sea-dark: #${scheme.palette.alt_high0B};
|
||||||
|
|
||||||
|
$yellow-light: #${scheme.palette.low09};
|
||||||
|
$yellow-dark: #${scheme.palette.low09};
|
||||||
|
|
||||||
|
$orange-light: #${scheme.palette.low08};
|
||||||
|
$orange-dark: #${scheme.palette.high08};
|
||||||
|
|
||||||
|
$grey-050: #${scheme.palette.base07};
|
||||||
|
$grey-100: #${scheme.palette.base07};
|
||||||
|
$grey-150: #${scheme.palette.base06};
|
||||||
|
$grey-200: #${scheme.palette.base06};
|
||||||
|
$grey-250: #${scheme.palette.base05};
|
||||||
|
$grey-300: #${scheme.palette.base05};
|
||||||
|
$grey-350: #${scheme.palette.base04};
|
||||||
|
$grey-400: #${scheme.palette.base04};
|
||||||
|
$grey-450: #${scheme.palette.base03};
|
||||||
|
$grey-500: #${scheme.palette.base03};
|
||||||
|
$grey-550: #${scheme.palette.base02};
|
||||||
|
$grey-600: #${scheme.palette.base02};
|
||||||
|
$grey-650: #${scheme.palette.base02};
|
||||||
|
$grey-700: #${scheme.palette.base01};
|
||||||
|
$grey-750: #${scheme.palette.base01};
|
||||||
|
$grey-800: #${scheme.palette.base01};
|
||||||
|
$grey-850: #${scheme.palette.base00};
|
||||||
|
$grey-900: #${scheme.palette.base00};
|
||||||
|
$grey-950: #${scheme.palette.base00};
|
||||||
|
|
||||||
|
$white: #${scheme.palette.base07};
|
||||||
|
$black: #${scheme.palette.base00};
|
||||||
|
|
||||||
|
$button-close: #${scheme.palette.base0F};
|
||||||
|
$button-max: #${scheme.palette.base0A};
|
||||||
|
$button-min: #${scheme.palette.base08};
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
echo "Changing colours:"
|
sed -i "/\@import/s/color-palette-default/color-palette-${scheme.slug}/" src/_sass/_tweaks.scss
|
||||||
./change_color.sh -o ${scheme.slug} /build/gtk-colors -i False -t "$out/share/themes"
|
sed -i "/\$colorscheme:/s/default/${scheme.slug}/" src/_sass/_tweaks.scss
|
||||||
chmod 555 -R .
|
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
installPhase = ''
|
||||||
|
runHook preInstall
|
||||||
|
bash install.sh -d $out/share/themes \
|
||||||
|
-t default \
|
||||||
|
-n ${scheme.slug} \
|
||||||
|
-c ${scheme.variant} \
|
||||||
|
-s standard \
|
||||||
|
--tweaks primary \
|
||||||
|
--round ${scheme.palette.border-radius}px
|
||||||
|
|
||||||
|
runHook postInstall
|
||||||
|
'';
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,43 +0,0 @@
|
|||||||
{ inputs, lib, config, ... }:
|
|
||||||
with lib; {
|
|
||||||
options.homecfg = {
|
|
||||||
username = mkOption { type = types.str; };
|
|
||||||
wm = mkOption {
|
|
||||||
type = types.enum [ "Wayland" "X11" ];
|
|
||||||
default = "Wayland";
|
|
||||||
};
|
|
||||||
make = {
|
|
||||||
cli = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = true;
|
|
||||||
};
|
|
||||||
gui = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
develop = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
game = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
power = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
git = {
|
|
||||||
username = mkOption { type = types.str; };
|
|
||||||
email = mkOption { type = types.str; };
|
|
||||||
key = mkOption { type = types.str; };
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
imports = with inputs; [
|
|
||||||
nix-colors.homeManagerModules.default
|
|
||||||
../../shared/colors
|
|
||||||
];
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
home.packages = with pkgs; [ libnotify ];
|
home.packages = with pkgs; [ libnotify ];
|
||||||
services.dunst = {
|
services.dunst = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -12,8 +12,10 @@
|
|||||||
width = "350";
|
width = "350";
|
||||||
scale = "0";
|
scale = "0";
|
||||||
origin = "top-right";
|
origin = "top-right";
|
||||||
offset =
|
offset = "${
|
||||||
"${config.colorScheme.palette.gaps-bar}x${config.colorScheme.palette.gaps-screen}";
|
toString ((lib.strings.toInt config.colorScheme.palette.gaps-bar)
|
||||||
|
+ (lib.strings.toInt config.colorScheme.palette.gaps-screen))
|
||||||
|
}x${config.colorScheme.palette.gaps-screen}";
|
||||||
notification_limit = "0";
|
notification_limit = "0";
|
||||||
progress_bar = "true";
|
progress_bar = "true";
|
||||||
progress_bar_height = "10";
|
progress_bar_height = "10";
|
||||||
|
|||||||
@@ -17,7 +17,8 @@ calendar {
|
|||||||
font-weight: bold;
|
font-weight: bold;
|
||||||
}
|
}
|
||||||
|
|
||||||
.button {
|
label {
|
||||||
|
font-size: 20pt;
|
||||||
color: $base0C;
|
color: $base0C;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -35,9 +36,6 @@ calendar {
|
|||||||
margin-top: -4pt;
|
margin-top: -4pt;
|
||||||
}
|
}
|
||||||
|
|
||||||
.minute, .hour, .day, .month {
|
|
||||||
font-size: 20pt;
|
|
||||||
}
|
|
||||||
|
|
||||||
.date {
|
.date {
|
||||||
color: $base0C;
|
color: $base0C;
|
||||||
@@ -47,5 +45,4 @@ calendar {
|
|||||||
|
|
||||||
.datetime {
|
.datetime {
|
||||||
padding: $gaps-window;
|
padding: $gaps-window;
|
||||||
|
|
||||||
}
|
}
|
||||||
35
modules/home/wayland/apps/eww/bar/css/_systray.scss
Normal file
35
modules/home/wayland/apps/eww/bar/css/_systray.scss
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
.tray * {
|
||||||
|
padding: $border-width 0px;
|
||||||
|
}
|
||||||
|
.tray menu {
|
||||||
|
background-color: $base01;
|
||||||
|
color: $base07;
|
||||||
|
@include border-radius;
|
||||||
|
@include border-active;
|
||||||
|
|
||||||
|
|
||||||
|
padding: 10px 0px;
|
||||||
|
|
||||||
|
>menuitem {
|
||||||
|
margin: 2px $border-width;
|
||||||
|
padding: 0px 10px;
|
||||||
|
|
||||||
|
&:disabled label {
|
||||||
|
color: $base04;
|
||||||
|
}
|
||||||
|
|
||||||
|
&:hover {
|
||||||
|
background-color: $base0C;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
separator {
|
||||||
|
background-color: $base03;
|
||||||
|
padding-top: 1px;
|
||||||
|
margin:10px 0px;
|
||||||
|
|
||||||
|
&:last-child {
|
||||||
|
padding: unset;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -13,6 +13,8 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
@mixin border-active {
|
@mixin border-active {
|
||||||
|
border-width: $border-width;
|
||||||
|
border-style: solid;
|
||||||
border-color: $base04;
|
border-color: $base04;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -99,6 +101,9 @@ tooltip {
|
|||||||
}
|
}
|
||||||
.modevent:hover {
|
.modevent:hover {
|
||||||
@include border-active;
|
@include border-active;
|
||||||
|
border-right-style: none;
|
||||||
|
border-bottom-right-radius: 0;
|
||||||
|
border-top-right-radius: 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
.modinner {
|
.modinner {
|
||||||
@@ -115,6 +120,7 @@ tooltip {
|
|||||||
@import 'css/clock';
|
@import 'css/clock';
|
||||||
@import 'css/radio';
|
@import 'css/radio';
|
||||||
@import 'css/powermenu';
|
@import 'css/powermenu';
|
||||||
|
@import 'css/systray';
|
||||||
|
|
||||||
|
|
||||||
/* BAR */
|
/* BAR */
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
|
|
||||||
(include "modules/sys.yuck")
|
(include "modules/sys.yuck")
|
||||||
(include "modules/net.yuck")
|
(include "modules/net.yuck")
|
||||||
|
(include "modules/systray.yuck")
|
||||||
(include "modules/clock.yuck")
|
(include "modules/clock.yuck")
|
||||||
|
|
||||||
(include "windows/calendar.yuck")
|
(include "windows/calendar.yuck")
|
||||||
@@ -26,6 +27,7 @@
|
|||||||
:valign "end"
|
:valign "end"
|
||||||
(sys-mod)
|
(sys-mod)
|
||||||
(net-mod)
|
(net-mod)
|
||||||
|
(systray-mod)
|
||||||
(clock-mod)))
|
(clock-mod)))
|
||||||
|
|
||||||
(defwidget center []
|
(defwidget center []
|
||||||
@@ -46,7 +48,7 @@
|
|||||||
|
|
||||||
|
|
||||||
(defwindow bar
|
(defwindow bar
|
||||||
:monitor 0
|
:monitor 1
|
||||||
:geometry (geometry
|
:geometry (geometry
|
||||||
:x "0%"
|
:x "0%"
|
||||||
:y "0%"
|
:y "0%"
|
||||||
|
|||||||
@@ -5,28 +5,30 @@
|
|||||||
(eventbox
|
(eventbox
|
||||||
:onhover "${EWW_CMD} update date_rev=true"
|
:onhover "${EWW_CMD} update date_rev=true"
|
||||||
:onhoverlost "${EWW_CMD} update date_rev=false"
|
:onhoverlost "${EWW_CMD} update date_rev=false"
|
||||||
|
:onclick "(sleep 0.1 && ${EWW_CMD} open --toggle calendar)"
|
||||||
|
:onrightclick "(sleep 0.1 && ${EWW_CMD} open --toggle powermenu)"
|
||||||
(box
|
(box
|
||||||
:class "datetime"
|
:class "datetime"
|
||||||
(overlay
|
(overlay
|
||||||
(box
|
(box
|
||||||
:orientation "v"
|
:orientation "v"
|
||||||
(button
|
(label :show-truncated false
|
||||||
:class "hour" hour)
|
:class "hour"
|
||||||
(button
|
:text {hour})
|
||||||
:class "minute" minute))
|
(label :show-truncated false
|
||||||
|
:class "minute"
|
||||||
|
:text {minute}))
|
||||||
(revealer
|
(revealer
|
||||||
:reveal date_rev
|
:reveal date_rev
|
||||||
(box
|
(box
|
||||||
:class "date"
|
:class "date"
|
||||||
:orientation "v"
|
:orientation "v"
|
||||||
(button
|
(label :show-truncated "false"
|
||||||
:onclick "${EWW_CMD} open --toggle calendar"
|
:class "day"
|
||||||
:onrightclick "${EWW_CMD} open --toggle powermenu"
|
:text {day})
|
||||||
:class "day" day)
|
(label :show-truncated "false"
|
||||||
(button
|
:class "month"
|
||||||
:onclick "${EWW_CMD} open --toggle calendar"
|
:text {month}))
|
||||||
:onrightclick "${EWW_CMD} open --toggle powermenu"
|
|
||||||
:class "month" month))
|
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -6,23 +6,21 @@
|
|||||||
|
|
||||||
(defwidget sys-mod []
|
(defwidget sys-mod []
|
||||||
(module
|
(module
|
||||||
(button
|
(eventbox
|
||||||
:class "module"
|
:onclick "(sleep 0.1 && ${EWW_CMD} open --toggle sys)"
|
||||||
:onclick "${EWW_CMD} open --toggle sys"
|
|
||||||
(box
|
(box
|
||||||
:orientation "v"
|
:orientation "v"
|
||||||
(circular-progress
|
(circular-progress
|
||||||
:value {EWW_CPU.avg}
|
:value {EWW_CPU.avg}
|
||||||
:class "cpubar"
|
:class "cpubar"
|
||||||
:thickness 6
|
:thickness 6
|
||||||
(label :class "icon-text" :text "C"))
|
(label :class "icon-text" :text "C"))
|
||||||
|
|
||||||
(circular-progress
|
|
||||||
:value {gpu.devices[0].GRBM2?.CommandProcessor-Graphics?.value?:0}
|
|
||||||
:class "gpubar"
|
|
||||||
:thickness 6
|
|
||||||
(label :class "icon-text" :text "G"))
|
|
||||||
|
|
||||||
|
(circular-progress
|
||||||
|
:value {gpu.devices[0].GRBM2?.CommandProcessor-Graphics?.value?:0}
|
||||||
|
:class "gpubar"
|
||||||
|
:thickness 6
|
||||||
|
(label :class "icon-text" :text "G"))
|
||||||
(circular-progress
|
(circular-progress
|
||||||
:value {100*memory.used/memory.total}
|
:value {100*memory.used/memory.total}
|
||||||
:class "membar"
|
:class "membar"
|
||||||
|
|||||||
15
modules/home/wayland/apps/eww/bar/modules/systray.yuck
Normal file
15
modules/home/wayland/apps/eww/bar/modules/systray.yuck
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
|
||||||
|
(defwidget systray-mod []
|
||||||
|
(module
|
||||||
|
(box
|
||||||
|
:orientation "v"
|
||||||
|
(systray
|
||||||
|
:class "tray"
|
||||||
|
:space-evenly "true"
|
||||||
|
:orientation "v"
|
||||||
|
:icon-size 20
|
||||||
|
:prepend-new "false"
|
||||||
|
)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
)
|
||||||
@@ -11,6 +11,7 @@
|
|||||||
(button
|
(button
|
||||||
:onclick "hyprctl dispatch workspace ${ws.number}"
|
:onclick "hyprctl dispatch workspace ${ws.number}"
|
||||||
(label
|
(label
|
||||||
|
:show-truncated false
|
||||||
:class "icon-text ${ws.color}"
|
:class "icon-text ${ws.color}"
|
||||||
:text `${ws.focused ? "" : ""}`
|
:text `${ws.focused ? "" : ""}`
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ done
|
|||||||
generate
|
generate
|
||||||
|
|
||||||
# main loop
|
# main loop
|
||||||
socat -u UNIX-CONNECT:/tmp/hypr/"$HYPRLAND_INSTANCE_SIGNATURE"/.socket2.sock - | rg --line-buffered "workspace|mon(itor)?" | while read -r line; do
|
socat -u UNIX-CONNECT:$XDG_RUNTIME_DIR/hypr/"$HYPRLAND_INSTANCE_SIGNATURE"/.socket2.sock - | rg --line-buffered "workspace|mon(itor)?" | while read -r line; do
|
||||||
case ${line%>>*} in
|
case ${line%>>*} in
|
||||||
"workspace")
|
"workspace")
|
||||||
focusedws=${line#*>>}
|
focusedws=${line#*>>}
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
(defwindow calendar
|
(defwindow calendar
|
||||||
:monitor 0
|
:monitor 1
|
||||||
:geometry (geometry
|
:geometry (geometry
|
||||||
:x "0%"
|
:x "0%"
|
||||||
:y "0%"
|
:y "0%"
|
||||||
|
|||||||
@@ -34,7 +34,7 @@
|
|||||||
)
|
)
|
||||||
|
|
||||||
(defwindow powermenu
|
(defwindow powermenu
|
||||||
:monitor 0
|
:monitor 1
|
||||||
:stacking "overlay"
|
:stacking "overlay"
|
||||||
:geometry (geometry
|
:geometry (geometry
|
||||||
:anchor "center"
|
:anchor "center"
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
(defvar radio_rev false)
|
(defvar radio_rev false)
|
||||||
|
|
||||||
(defwindow radio
|
(defwindow radio
|
||||||
:monitor 0
|
:monitor 1
|
||||||
:geometry (geometry
|
:geometry (geometry
|
||||||
:x "0%"
|
:x "0%"
|
||||||
:y "0%"
|
:y "0%"
|
||||||
@@ -100,8 +100,11 @@
|
|||||||
(box
|
(box
|
||||||
:orientation "v"
|
:orientation "v"
|
||||||
(button
|
(button
|
||||||
:onclick "${EWW_CMD} open --toggle --no-daemonize radio"
|
:onclick "(sleep 0.1 && ${EWW_CMD} open --toggle --no-daemonize radio)"
|
||||||
(label :class "icon-text" :text "")
|
(label
|
||||||
|
:show-truncated false
|
||||||
|
:class "icon-text"
|
||||||
|
:text "")
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -129,7 +129,7 @@
|
|||||||
)
|
)
|
||||||
|
|
||||||
(defwindow sys
|
(defwindow sys
|
||||||
:monitor 0
|
:monitor 1
|
||||||
:stacking "overlay"
|
:stacking "overlay"
|
||||||
:geometry (geometry
|
:geometry (geometry
|
||||||
:x "0%"
|
:x "0%"
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
home.packages = with pkgs; [ eww-wayland jaq custom.amdgpu_top ];
|
home.packages = with pkgs; [ eww jq jaq custom.amdgpu_top ];
|
||||||
|
|
||||||
xdg.configFile."eww" = {
|
xdg.configFile."eww" = {
|
||||||
source = lib.cleanSourceWith {
|
source = lib.cleanSourceWith {
|
||||||
|
|||||||
@@ -1,93 +1,110 @@
|
|||||||
{ ... }: {
|
{ config, lib, ... }: {
|
||||||
|
|
||||||
services.kanshi = {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
enable = true;
|
services.kanshi = {
|
||||||
systemdTarget = "graphical-session.target";
|
enable = true;
|
||||||
profiles = {
|
systemdTarget = "graphical-session.target";
|
||||||
tower_0 = {
|
settings = [
|
||||||
outputs = [{
|
{
|
||||||
criteria = "CEX CX133 0x00000001";
|
profile.name = "tower_0";
|
||||||
mode = "1920x1200@59.972";
|
profile.outputs = [
|
||||||
position = "0,0";
|
{
|
||||||
scale = 1.0;
|
criteria = "AOC 24E1W1 GNSKCHA086899";
|
||||||
status = "enable";
|
mode = "1920x1080@60.000";
|
||||||
}];
|
position = "0,0";
|
||||||
};
|
status = "enable";
|
||||||
tower_1 = {
|
scale = 1.0;
|
||||||
outputs = [{
|
adaptiveSync = true;
|
||||||
criteria = "AOC 16G3 1DDP7HA000348";
|
}
|
||||||
mode = "1920x1080@144.000";
|
{
|
||||||
position = "0,0";
|
criteria = "AOC 24E1W1 GNSKBHA080346";
|
||||||
status = "enable";
|
mode = "1920x1080@60.000";
|
||||||
scale = 1.0;
|
position = "1920,0";
|
||||||
adaptiveSync = true;
|
status = "enable";
|
||||||
}];
|
scale = 1.0;
|
||||||
};
|
adaptiveSync = true;
|
||||||
tower_2 = {
|
}
|
||||||
outputs = [
|
];
|
||||||
{
|
}
|
||||||
criteria = "AOC 16G3 1DDP7HA000348";
|
{
|
||||||
mode = "1920x1080@144.000";
|
profile.name = "tower_1";
|
||||||
position = "0,0";
|
profile.outputs = [
|
||||||
status = "enable";
|
{
|
||||||
scale = 1.0;
|
criteria = "AOC 24E1W1 GNSKCHA086899";
|
||||||
adaptiveSync = true;
|
mode = "1920x1080@60.000";
|
||||||
}
|
position = "0,0";
|
||||||
{
|
status = "enable";
|
||||||
criteria = "CEX CX133 0x00000001";
|
scale = 1.0;
|
||||||
mode = "1920x1200@59.972";
|
adaptiveSync = true;
|
||||||
position = "0,1080";
|
}
|
||||||
scale = 1.0;
|
{
|
||||||
status = "enable";
|
criteria = "AOC 24E1W1 GNSKBHA080346";
|
||||||
}
|
mode = "1920x1080@60.000";
|
||||||
];
|
position = "0,0";
|
||||||
};
|
status = "enable";
|
||||||
laptop_0 = {
|
scale = 1.0;
|
||||||
outputs = [{
|
adaptiveSync = true;
|
||||||
criteria = "LG Display 0x060A Unknown";
|
}
|
||||||
mode = "1920x1080@60.020";
|
{
|
||||||
position = "0,0";
|
criteria = "LG UNKNOWN_TBD";
|
||||||
scale = 1.0;
|
mode = "1920x1080@144.000";
|
||||||
status = "enable";
|
position = "0,0";
|
||||||
}];
|
status = "enable";
|
||||||
};
|
scale = 1.0;
|
||||||
laptop_1 = {
|
adaptiveSync = true;
|
||||||
outputs = [
|
}
|
||||||
{
|
];
|
||||||
criteria = "CEX CX133 0x00000001";
|
}
|
||||||
mode = "2560x1600@59.972";
|
{
|
||||||
position = "0,0";
|
profile.name = "laptop_0";
|
||||||
scale = 1.0;
|
profile.outputs = [{
|
||||||
status = "enable";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
criteria = "LG Display 0x060A Unknown";
|
criteria = "LG Display 0x060A Unknown";
|
||||||
mode = "1920x1080@60.020";
|
mode = "1920x1080@60.020";
|
||||||
position = "2560,0";
|
|
||||||
scale = 1.0;
|
|
||||||
status = "enable";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
laptop_2 = {
|
|
||||||
outputs = [
|
|
||||||
{
|
|
||||||
criteria = "AOC 16G3 1DDP7HA000348";
|
|
||||||
mode = "1920x1080@144.000";
|
|
||||||
position = "0,0";
|
position = "0,0";
|
||||||
status = "enable";
|
|
||||||
scale = 1.0;
|
|
||||||
adaptiveSync = true;
|
|
||||||
}
|
|
||||||
{
|
|
||||||
criteria = "LG Display 0x060A Unknown";
|
|
||||||
mode = "1920x1080@60.020";
|
|
||||||
position = "1920,0";
|
|
||||||
scale = 1.0;
|
scale = 1.0;
|
||||||
status = "enable";
|
status = "enable";
|
||||||
}
|
}];
|
||||||
];
|
}
|
||||||
};
|
{
|
||||||
|
profile.name = "laptop_1";
|
||||||
|
profile.outputs = [
|
||||||
|
{
|
||||||
|
criteria = "CEX CX133 0x00000001";
|
||||||
|
mode = "2560x1600@59.972";
|
||||||
|
position = "0,0";
|
||||||
|
scale = 1.0;
|
||||||
|
status = "enable";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
criteria = "LG Display 0x060A Unknown";
|
||||||
|
mode = "1920x1080@60.020";
|
||||||
|
position = "2560,0";
|
||||||
|
scale = 1.0;
|
||||||
|
status = "enable";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
profile.name = "laptop_2";
|
||||||
|
profile.outputs = [
|
||||||
|
{
|
||||||
|
criteria = "AOC 16G3 1DDP7HA000348";
|
||||||
|
mode = "1920x1080@144.000";
|
||||||
|
position = "0,0";
|
||||||
|
status = "enable";
|
||||||
|
scale = 1.0;
|
||||||
|
adaptiveSync = true;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
criteria = "LG Display 0x060A Unknown";
|
||||||
|
mode = "1920x1080@60.020";
|
||||||
|
position = "1920,0";
|
||||||
|
scale = 1.0;
|
||||||
|
status = "enable";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ let
|
|||||||
''
|
''
|
||||||
}/bin/waybar-${name}";
|
}/bin/waybar-${name}";
|
||||||
in {
|
in {
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
|
|
||||||
home.packages = [ pkgs.custom.amdgpu_top pkgs.jq ];
|
home.packages = [ pkgs.custom.amdgpu_top pkgs.jq ];
|
||||||
|
|
||||||
|
|||||||
@@ -1,10 +1,12 @@
|
|||||||
{ lib, pkgs, config, ... }: {
|
{ lib, pkgs, config, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
|
|
||||||
home.packages = with pkgs; [ swayidle swaylock-effects ];
|
home.packages = with pkgs; [ swayidle swaylock-effects ];
|
||||||
|
|
||||||
xdg.configFile."swaylock/config".text = ''
|
xdg.configFile."swaylock/config".text = ''
|
||||||
screenshots
|
screenshots
|
||||||
|
grace-no-mouse
|
||||||
|
grace-no-touch
|
||||||
grace=5
|
grace=5
|
||||||
effect-pixelate=5
|
effect-pixelate=5
|
||||||
fade-in=0.2
|
fade-in=0.2
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
home.packages = with pkgs; [ wofi ];
|
home.packages = with pkgs; [ wofi ];
|
||||||
xdg.configFile."wofi/config".text = ''
|
xdg.configFile."wofi/config".text = ''
|
||||||
width=280
|
width=280
|
||||||
|
|||||||
@@ -11,14 +11,18 @@ let
|
|||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
dbus-hyprland-environment
|
dbus-hyprland-environment
|
||||||
wayland
|
wayland
|
||||||
|
|
||||||
grim
|
hyprpicker
|
||||||
|
|
||||||
|
hyprshot
|
||||||
slurp
|
slurp
|
||||||
|
satty
|
||||||
|
|
||||||
swappy
|
swappy
|
||||||
cliphist
|
cliphist
|
||||||
wl-clipboard
|
wl-clipboard
|
||||||
@@ -42,6 +46,8 @@ in {
|
|||||||
[ "discord-402572971681644545.desktop" ];
|
[ "discord-402572971681644545.desktop" ];
|
||||||
"x-scheme-handler/discord-696343075731144724" =
|
"x-scheme-handler/discord-696343075731144724" =
|
||||||
[ "discord-696343075731144724.desktop" ];
|
[ "discord-696343075731144724.desktop" ];
|
||||||
|
"x-scheme-handler/tg" = [ "org.telegram.desktop.desktop" ];
|
||||||
|
"x-scheme-handler/tonsite" = [ "org.telegram.desktop.desktop" ];
|
||||||
"x-scheme-handler/http" = [ "firefox.desktop" ];
|
"x-scheme-handler/http" = [ "firefox.desktop" ];
|
||||||
"x-scheme-handler/https" = [ "firefox.desktop" ];
|
"x-scheme-handler/https" = [ "firefox.desktop" ];
|
||||||
"x-scheme-handler/chrome" = [ "firefox.desktop" ];
|
"x-scheme-handler/chrome" = [ "firefox.desktop" ];
|
||||||
|
|||||||
@@ -1,11 +1,12 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
|
|
||||||
wayland.windowManager.hyprland = {
|
wayland.windowManager.hyprland = {
|
||||||
enable = true;
|
enable = true;
|
||||||
xwayland.enable = true;
|
xwayland.enable = true;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
monitor=,preferred,auto,auto
|
monitor=,preferred,auto,auto
|
||||||
|
env=bitdepth,10
|
||||||
input {
|
input {
|
||||||
kb_layout = us, ru
|
kb_layout = us, ru
|
||||||
kb_variant = intl, phonetic
|
kb_variant = intl, phonetic
|
||||||
@@ -13,7 +14,7 @@
|
|||||||
|
|
||||||
follow_mouse = 1
|
follow_mouse = 1
|
||||||
|
|
||||||
sensitivity = 0 # -0.5 # -1.0 - 1.0, 0 means no modification.
|
sensitivity = 0
|
||||||
|
|
||||||
touchpad {
|
touchpad {
|
||||||
natural_scroll=no
|
natural_scroll=no
|
||||||
@@ -60,10 +61,10 @@
|
|||||||
fullscreen_opacity = 1.0
|
fullscreen_opacity = 1.0
|
||||||
|
|
||||||
# shadow
|
# shadow
|
||||||
drop_shadow = no
|
# drop_shadow = no
|
||||||
shadow_range = 60
|
# shadow_range = 60
|
||||||
shadow_offset = 0 5
|
# shadow_offset = 0 5
|
||||||
shadow_render_power = 4
|
# shadow_render_power = 4
|
||||||
#col.shadow = rgba(00000099)
|
#col.shadow = rgba(00000099)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -85,12 +86,10 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
master {
|
master {
|
||||||
new_is_master = true
|
new_status = master
|
||||||
}
|
}
|
||||||
|
|
||||||
gestures {
|
gesture = 3, vertical, workspace
|
||||||
workspace_swipe = off
|
|
||||||
}
|
|
||||||
|
|
||||||
exec-once = eww open bar
|
exec-once = eww open bar
|
||||||
#exec-once = waybar
|
#exec-once = waybar
|
||||||
@@ -137,14 +136,19 @@
|
|||||||
windowrulev2 = float,title:^(File Operation Progress)$
|
windowrulev2 = float,title:^(File Operation Progress)$
|
||||||
windowrulev2 = float,class:^(firefox)$,title:^(Picture-in-Picture)$
|
windowrulev2 = float,class:^(firefox)$,title:^(Picture-in-Picture)$
|
||||||
windowrulev2 = pin,class:^(firefox)$,title:^(Picture-in-Picture)$
|
windowrulev2 = pin,class:^(firefox)$,title:^(Picture-in-Picture)$
|
||||||
windowrulev2 = nofullscreenrequest,class:^(firefox)$,title:^(Picture-in-Picture)$
|
windowrulev2 = suppressevent fullscreen,class:^(firefox)$,title:^(Picture-in-Picture)$
|
||||||
windowrulev2 = float,class:^(firefox)$,title:^(Firefox — Sharing Indicator)$
|
windowrulev2 = float,class:^(firefox)$,title:^(Firefox — Sharing Indicator)$
|
||||||
windowrulev2 = nofullscreenrequest,class:^(firefox)$,title:^(Firefox — Sharing Indicator)$
|
windowrulev2 = suppressevent fullscreen,class:^(firefox)$,title:^(Firefox — Sharing Indicator)$
|
||||||
windowrulev2 = float,class:^(firefox)$,title:^(Extension:.* Mozilla Firefox)$
|
windowrulev2 = float,class:^(firefox)$,title:^(Extension:.* Mozilla Firefox)$
|
||||||
windowrulev2 = nofullscreenrequest,class:^(firefox)$,title:^(Extension:.* Mozilla Firefox)$
|
windowrulev2 = suppressevent fullscreen,class:^(firefox)$,title:^(Extension:.* Mozilla Firefox)$
|
||||||
windowrulev2 = float,class:^(org.telegram.desktop)$,title:^(Media viewer)$
|
windowrulev2 = float,class:^(org.telegram.desktop)$,title:^(Media viewer)$
|
||||||
windowrulev2 = center,class:^(org.telegram.desktop)$,title:^(Media viewer)$
|
windowrulev2 = center,class:^(org.telegram.desktop)$,title:^(Media viewer)$
|
||||||
|
|
||||||
|
#SPECIAL NO SLEEP
|
||||||
|
windowrulev2 = idleinhibit fullscreen, class:^(.*)
|
||||||
|
windowrulev2 = idleinhibit focus, class:^(steam_app_.*)$
|
||||||
|
windowrulev2 = idleinhibit focus, class:^(mpv)$
|
||||||
|
|
||||||
layerrule = blur,^(eww-blur)
|
layerrule = blur,^(eww-blur)
|
||||||
|
|
||||||
#binds
|
#binds
|
||||||
@@ -160,7 +164,7 @@
|
|||||||
bind = SUPER SHIFT,D,exec, ~/.config/hypr/themes/apatheia/eww/launch_bar
|
bind = SUPER SHIFT,D,exec, ~/.config/hypr/themes/apatheia/eww/launch_bar
|
||||||
|
|
||||||
bind = SUPER, V, exec, cliphist list | wofi -dmenu | cliphist decode | wl-copy
|
bind = SUPER, V, exec, cliphist list | wofi -dmenu | cliphist decode | wl-copy
|
||||||
bind = , Print, exec, grim -g "$(slurp -d)" - | swappy -f -
|
bind = , PRINT, exec, hyprshot -m region --raw | satty --filename - --early-exit --action-on-enter save-to-clipboard --copy-command 'wl-copy'
|
||||||
|
|
||||||
bind = SUPER, L, exec, swaylock
|
bind = SUPER, L, exec, swaylock
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }: {
|
{ lib, config, pkgs, ... }: {
|
||||||
imports = [ ./config.nix ];
|
imports = [ ./config.nix ];
|
||||||
config = lib.mkIf (config.homecfg.wm == "Wayland") {
|
config = lib.mkIf (config.usercfg.wm == "Wayland") {
|
||||||
wayland.windowManager.hyprland = { enable = true; };
|
wayland.windowManager.hyprland = { enable = true; };
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.wm == "X11") {
|
config = lib.mkIf (config.usercfg.wm == "X11") {
|
||||||
xsession.windowManager.bspwm.extraConfig = ''
|
xsession.windowManager.bspwm.extraConfig = ''
|
||||||
#! /bin/bash
|
#! /bin/bash
|
||||||
|
|
||||||
@@ -110,7 +110,7 @@
|
|||||||
telegram-desktop &
|
telegram-desktop &
|
||||||
nextcloud &
|
nextcloud &
|
||||||
jellyfin-mpv-shim &
|
jellyfin-mpv-shim &
|
||||||
flameshot &
|
#flameshot &
|
||||||
|
|
||||||
sleep 2
|
sleep 2
|
||||||
|
|
||||||
@@ -265,7 +265,7 @@
|
|||||||
|
|
||||||
# Screenshots
|
# Screenshots
|
||||||
Print
|
Print
|
||||||
flameshot gui
|
hyprshot -m region
|
||||||
|
|
||||||
# Lock Desktop
|
# Lock Desktop
|
||||||
super + l
|
super + l
|
||||||
|
|||||||
@@ -2,10 +2,10 @@
|
|||||||
|
|
||||||
imports = [ ./config.nix ./script.nix ./xressources.nix ];
|
imports = [ ./config.nix ./script.nix ./xressources.nix ];
|
||||||
|
|
||||||
config = lib.mkIf (config.homecfg.wm == "X11") {
|
config = lib.mkIf (config.usercfg.wm == "X11") {
|
||||||
xsession.windowManager.bspwm = { enable = true; };
|
xsession.windowManager.bspwm = { enable = true; };
|
||||||
services.sxhkd = { enable = true; };
|
services.sxhkd = { enable = true; };
|
||||||
home.packages = with pkgs; [ xrandr arandr flameshot xtrlock i3lock ];
|
home.packages = with pkgs; [ xrandr arandr hyprshot xtrlock i3lock ];
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.wm == "X11") {
|
config = lib.mkIf (config.usercfg.wm == "X11") {
|
||||||
xdg.configFile."script/lock.sh".text = ''
|
xdg.configFile."script/lock.sh".text = ''
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
TMPBG=/tmp/screen.png
|
TMPBG=/tmp/screen.png
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{ lib, config, ... }: {
|
{ lib, config, ... }: {
|
||||||
config = lib.mkIf (config.homecfg.wm == "X11") {
|
config = lib.mkIf (config.usercfg.wm == "X11") {
|
||||||
xresources.extraConfig = ''
|
xresources.extraConfig = ''
|
||||||
|
|
||||||
#define white #ffffff
|
#define white #ffffff
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
{ ... }: { imports = [ ./cli ./gui ./hostcfg ./system ./tools ./users ]; }
|
{ ... }: { imports = [ ./cli ./gui ./system ./tools ./users ]; }
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }:
|
||||||
let cfg = config.hostcfg.make.gui;
|
let cfg = config.syscfg.make.gui;
|
||||||
in {
|
in {
|
||||||
config = lib.mkIf cfg {
|
config = lib.mkIf cfg {
|
||||||
sound.enable = true;
|
# sound.enable = true;
|
||||||
hardware.pulseaudio.enable = false;
|
|
||||||
security.rtkit.enable = true;
|
security.rtkit.enable = true;
|
||||||
|
services.pulseaudio.enable = false; #25.05 change to services
|
||||||
services.pipewire = {
|
services.pipewire = {
|
||||||
enable = true;
|
enable = true;
|
||||||
alsa.enable = true;
|
alsa.enable = true;
|
||||||
@@ -13,6 +13,6 @@ in {
|
|||||||
# wireplumber.enable = true;
|
# wireplumber.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [ easyeffects ];
|
environment.systemPackages = with pkgs; [ easyeffects alsa-utils ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,10 +1,13 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }:
|
||||||
let cfg = config.hostcfg.make.game;
|
let cfg = config.syscfg.make.game;
|
||||||
in {
|
in {
|
||||||
config = lib.mkIf cfg {
|
config = lib.mkIf cfg {
|
||||||
programs.steam = {
|
programs.steam = {
|
||||||
enable = true;
|
enable = true;
|
||||||
remotePlay.openFirewall = true;
|
remotePlay.openFirewall = true;
|
||||||
|
extraCompatPackages = with pkgs; [proton-ge-bin];
|
||||||
};
|
};
|
||||||
|
programs.gamemode.enable = true;
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,14 +1,12 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }: {
|
||||||
let cfg = config.hostcfg.make.gui;
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
in {
|
|
||||||
config = lib.mkIf cfg {
|
|
||||||
|
|
||||||
services.greetd = {
|
services.greetd = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = rec {
|
settings = rec {
|
||||||
initial_session = {
|
initial_session = {
|
||||||
command = "zsh";
|
command = "zsh";
|
||||||
user = "${config.hostcfg.username}";
|
user = "${config.syscfg.defaultUser}";
|
||||||
};
|
};
|
||||||
default_session = initial_session;
|
default_session = initial_session;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }: {
|
||||||
let cfg = config.hostcfg.make.gui;
|
config = lib.mkIf (config.syscfg.make.gui) {
|
||||||
in {
|
programs.xwayland.enable = true;
|
||||||
config = lib.mkIf cfg {
|
|
||||||
services.xserver = {
|
services.xserver = {
|
||||||
enable = true;
|
enable = true;
|
||||||
videoDrivers = [ "amd" ];
|
videoDrivers = [ "amd" ];
|
||||||
|
|||||||
@@ -1,48 +0,0 @@
|
|||||||
{ lib, config, ... }:
|
|
||||||
with lib; {
|
|
||||||
options.hostcfg = {
|
|
||||||
hostname = mkOption { type = types.str; };
|
|
||||||
username = mkOption { type = types.str; };
|
|
||||||
make = {
|
|
||||||
cli = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = true;
|
|
||||||
};
|
|
||||||
gui = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
virt = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = true;
|
|
||||||
};
|
|
||||||
power = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
game = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
develop = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
net = {
|
|
||||||
wlp = {
|
|
||||||
enable = mkOption { type = types.bool; };
|
|
||||||
nif = mkOption { type = types.str; };
|
|
||||||
};
|
|
||||||
wg = {
|
|
||||||
enable = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = true;
|
|
||||||
};
|
|
||||||
ip4 = mkOption { type = types.str; };
|
|
||||||
ip6 = mkOption { type = types.str; };
|
|
||||||
pk = mkOption { type = types.str; };
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,3 +1,9 @@
|
|||||||
{ ... }: {
|
{ ... }: {
|
||||||
imports = [ ./dbus ./fonts ./hw ./locale ./network ./nix ./security ./xdg ];
|
imports = [ ./dbus ./fonts ./hw ./locale ./network ./nix ./security ./xdg ];
|
||||||
|
|
||||||
|
# services.journald.extraConfig = ''
|
||||||
|
# LineMax=128K
|
||||||
|
# SystemMaxUse=512M
|
||||||
|
# SystemMaxFileSize=128M
|
||||||
|
# '';
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ ... }: {
|
{ ... }: {
|
||||||
services.fwupd.enable = false; # Note: run inside a nix-shell
|
services.fwupd.enable = true;
|
||||||
hardware.enableAllFirmware = true;
|
hardware.enableAllFirmware = true;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,12 +1,16 @@
|
|||||||
{ ... }: {
|
{ lib, config, ... }:
|
||||||
boot.loader = {
|
let isSANDBOX = builtins.elem config.syscfg.hostname [ "sandbox" ];
|
||||||
systemd-boot = {
|
in {
|
||||||
enable = true;
|
config = lib.mkIf (!isSANDBOX) {
|
||||||
configurationLimit = 8;
|
boot.loader = {
|
||||||
};
|
systemd-boot = {
|
||||||
efi = {
|
enable = true;
|
||||||
canTouchEfiVariables = true;
|
configurationLimit = 8;
|
||||||
efiSysMountPoint = "/boot/efi";
|
};
|
||||||
|
efi = {
|
||||||
|
canTouchEfiVariables = true;
|
||||||
|
efiSysMountPoint = "/boot";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
{ ... }: { imports = [ ./base ./boot ./fs ./opengl ./power ./udev ./virt ]; }
|
{ ... }: { imports = [ ./base ./boot ./fs ./graphics ./power ./udev ./virt ]; }
|
||||||
|
|||||||
4
modules/nixos/system/hw/graphics/default.nix
Normal file
4
modules/nixos/system/hw/graphics/default.nix
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
{ ... }: {
|
||||||
|
hardware.graphics.enable = true;
|
||||||
|
hardware.graphics.enable32Bit = true;
|
||||||
|
}
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
{ ... }: {
|
|
||||||
hardware.opengl.enable = true;
|
|
||||||
hardware.opengl.driSupport = true;
|
|
||||||
hardware.opengl.driSupport32Bit = true;
|
|
||||||
}
|
|
||||||
@@ -1,7 +1,5 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }: {
|
||||||
let cfg = config.hostcfg.make.power;
|
config = lib.mkIf (config.syscfg.make.power) {
|
||||||
in {
|
|
||||||
config = lib.mkIf cfg {
|
|
||||||
services.tlp = {
|
services.tlp = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
@@ -9,9 +7,24 @@ in {
|
|||||||
STOP_CHARGE_THRESH_BAT0 = 90;
|
STOP_CHARGE_THRESH_BAT0 = 90;
|
||||||
CPU_SCALING_GOVERNOR_ON_AC = "performance";
|
CPU_SCALING_GOVERNOR_ON_AC = "performance";
|
||||||
CPU_SCALING_GOVERNOR_ON_BAT = "powersave";
|
CPU_SCALING_GOVERNOR_ON_BAT = "powersave";
|
||||||
|
MEM_SLEEP_ON_BAT = "deep";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
powerManagement.enable = true;
|
||||||
|
# suspend to RAM (deep) rather than `s2idle`
|
||||||
|
boot.kernelParams = [ "mem_sleep_default=deep" ];
|
||||||
|
# suspend-then-hibernate
|
||||||
|
systemd.sleep.extraConfig = ''
|
||||||
|
HibernateDelaySec=30m
|
||||||
|
SuspendState=mem
|
||||||
|
'';
|
||||||
|
|
||||||
|
services.logind.settings.Login.HandleLidSwitch = "suspend-then-hibernate";
|
||||||
|
# Hibernate on power button pressed
|
||||||
|
services.logind.settings.Login.HandlePowerKey = "hibernate";
|
||||||
|
services.logind.settings.Login.HandlePowerKeyLongPress = "poweroff";
|
||||||
|
|
||||||
systemd.user.services.battery_monitor = {
|
systemd.user.services.battery_monitor = {
|
||||||
wants = [ "display-manager.service" ];
|
wants = [ "display-manager.service" ];
|
||||||
wantedBy = [ "graphical-session.target" ];
|
wantedBy = [ "graphical-session.target" ];
|
||||||
|
|||||||
@@ -1,20 +1,23 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }: {
|
||||||
let cfg = config.hostcfg.make.virt;
|
config = lib.mkIf (config.syscfg.make.virt) {
|
||||||
in {
|
#environment.systemPackages = [ pkgs.qemu ];
|
||||||
config = lib.mkIf cfg {
|
|
||||||
|
|
||||||
environment.systemPackages = [ pkgs.qemu ];
|
|
||||||
virtualisation = {
|
virtualisation = {
|
||||||
libvirtd.enable = true;
|
#libvirtd.enable = true;
|
||||||
# waydroid.enable = true;
|
# waydroid.enable = true;
|
||||||
# lxd.enable = true;
|
# lxd.enable = true;
|
||||||
docker = {
|
docker.enable = false;
|
||||||
|
podman = {
|
||||||
enable = true;
|
enable = true;
|
||||||
rootless = {
|
dockerSocket.enable = true;
|
||||||
enable = true;
|
dockerCompat = true;
|
||||||
setSocketVariable = true;
|
defaultNetwork.settings = {
|
||||||
|
#dnsname.enable = true;
|
||||||
|
dns_enabled = true;
|
||||||
|
#internal = true;
|
||||||
|
#name = "internal";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
virtualisation.containers.registries.search = [ "quay.io" "docker.io" "ghcr.io" ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,20 @@
|
|||||||
{ config, ... }: {
|
{ config, ... }: {
|
||||||
networking = {
|
networking = {
|
||||||
hostName = config.hostcfg.hostname;
|
hostName = config.syscfg.hostname;
|
||||||
useDHCP = true;
|
useDHCP = true;
|
||||||
nameservers = [ "1.1.1.1" "9.9.9.9" ];
|
nameservers = [ "1.1.1.1" "9.9.9.9" ];
|
||||||
|
|
||||||
firewall = { enable = true; };
|
firewall = {
|
||||||
|
enable = true;
|
||||||
|
allowedUDPPorts =
|
||||||
|
(if (config.syscfg.server != false && config.syscfg.server.wireguard) then [ 1515 ] else [ ]) ++
|
||||||
|
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
|
||||||
|
[ ];
|
||||||
|
|
||||||
|
allowedTCPPorts =
|
||||||
|
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
|
||||||
|
(if (config.syscfg.server != false) then [ 5432 6379 ] else [ ]) ++
|
||||||
|
[ ];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,7 @@
|
|||||||
{ pkgs, ... }: {
|
{ config, lib, pkgs, ... }: {
|
||||||
hardware.bluetooth.enable = true;
|
config = lib.mkIf (config.syscfg.net.ble.enable) {
|
||||||
services.blueman.enable = true;
|
hardware.bluetooth.enable = true;
|
||||||
environment.systemPackages = with pkgs; [ bluez bluez-tools ];
|
services.blueman.enable = true;
|
||||||
|
environment.systemPackages = with pkgs; [ bluez bluez-tools ];
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,7 @@
|
|||||||
{ lib, config, ... }:
|
{ lib, config, ... }: {
|
||||||
let cfg = config.hostcfg.net.wlp;
|
config = lib.mkIf (config.syscfg.net.wlp.enable) {
|
||||||
in {
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
networking.supplicant = {
|
networking.supplicant = {
|
||||||
"${cfg.nif}" = {
|
"${config.syscfg.net.wlp.nif}" = {
|
||||||
configFile.path = config.sops.secrets.wifi.path;
|
configFile.path = config.sops.secrets.wifi.path;
|
||||||
extraConf = ''
|
extraConf = ''
|
||||||
network={
|
network={
|
||||||
|
|||||||
@@ -1,19 +1,42 @@
|
|||||||
{ config, ... }: {
|
{ config, lib, pkgs, ... }: let
|
||||||
networking.wireguard = {
|
|
||||||
enable = true;
|
isValidPeer = p:
|
||||||
interfaces = {
|
(p ? syscfg.net.wg.enable) &&
|
||||||
wg0 = {
|
(p.syscfg.net.wg.enable == true) &&
|
||||||
ips = [ config.hostcfg.net.wg.ip4 config.hostcfg.net.wg.ip6 ];
|
(p.syscfg.net.wg.pubkey != config.syscfg.net.wg.pubkey);
|
||||||
privateKeyFile = config.hostcfg.net.wg.pk;
|
activePeers = builtins.filter isValidPeer config.syscfg.peers;
|
||||||
listenPort = 1515;
|
in
|
||||||
mtu = 1340;
|
{
|
||||||
peers = [{
|
config = lib.mkIf (config.syscfg.net.wg.enable) {
|
||||||
allowedIPs = [ "10.10.1.0/24" "fd10:10:10::0/64" ];
|
networking.wireguard = {
|
||||||
endpoint = "vpn.helcel.net:1515";
|
enable = true;
|
||||||
publicKey = "NFBJvYXZC+bd62jhrKnM7/pugidWhgR6+C5qIiUiq3Q=";
|
interfaces = {
|
||||||
persistentKeepalive = 30;
|
wg0 = {
|
||||||
}];
|
ips = [ config.syscfg.net.wg.ip4 config.syscfg.net.wg.ip6 ];
|
||||||
|
privateKeyFile =
|
||||||
|
config.sops.secrets."${config.syscfg.hostname}_wg_priv".path;
|
||||||
|
listenPort = 1515;
|
||||||
|
mtu = 1340;
|
||||||
|
peers =
|
||||||
|
if (config.syscfg.server ? wireguard && config.syscfg.server.wireguard) then
|
||||||
|
map (p: {
|
||||||
|
name = p.syscfg.hostname;
|
||||||
|
publicKey = p.syscfg.net.wg.pubkey;
|
||||||
|
allowedIPs = [ p.syscfg.net.wg.ip4 p.syscfg.net.wg.ip6 ];
|
||||||
|
}) activePeers
|
||||||
|
else
|
||||||
|
[{
|
||||||
|
allowedIPs = [ "10.10.1.0/24" "fd10:10:10::0/64" ];
|
||||||
|
endpoint = "vpn.helcel.net:1515";
|
||||||
|
publicKey = "NFBJvYXZC+bd62jhrKnM7/pugidWhgR6+C5qIiUiq3Q=";
|
||||||
|
persistentKeepalive = 30;
|
||||||
|
}];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
systemd.services."wireguard-wg0" = {
|
||||||
|
after = [ "network-online.target" "nss-lookup.target" ];
|
||||||
|
wants = [ "network-online.target" "nss-lookup.target" ];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ pkgs, ... }: {
|
{ inputs, pkgs, ... }: {
|
||||||
nixpkgs.config = {
|
nixpkgs.config = {
|
||||||
permittedInsecurePackages = [ ];
|
permittedInsecurePackages = [ ];
|
||||||
allowUnfree = true;
|
allowUnfree = true;
|
||||||
@@ -8,9 +8,9 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
nixpkgs.overlays = import ../../../../overlays { inherit pkgs; };
|
nixpkgs.overlays = import ../../../../overlays { inherit inputs pkgs; };
|
||||||
nix = {
|
nix = {
|
||||||
package = pkgs.nixFlakes;
|
package = pkgs.nixVersions.stable;
|
||||||
extraOptions = ''
|
extraOptions = ''
|
||||||
experimental-features = nix-command flakes
|
experimental-features = nix-command flakes
|
||||||
warn-dirty = false
|
warn-dirty = false
|
||||||
@@ -25,13 +25,17 @@
|
|||||||
settings = {
|
settings = {
|
||||||
auto-optimise-store = true;
|
auto-optimise-store = true;
|
||||||
builders-use-substitutes = true;
|
builders-use-substitutes = true;
|
||||||
substituters =
|
substituters = [
|
||||||
[ "https://hyprland.cachix.org" "https://cache.nixos.org" ];
|
"https://hyprland.cachix.org"
|
||||||
|
"https://cache.nixos.org"
|
||||||
|
"https://helcel.cachix.org"
|
||||||
|
];
|
||||||
trusted-public-keys = [
|
trusted-public-keys = [
|
||||||
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
|
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
|
||||||
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
||||||
|
"helcel.cachix.org-1:95s8D+N2xIHwzmkuu7jMUp9t3rtN4EimafR73jO7GLg="
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
system.stateVersion = "23.11";
|
system.stateVersion = "24.11";
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
{ ... }: { imports = [ ./gpg ./polkit ./sops ./ssh ]; }
|
{ ... }: { imports = [ ./gpg ./polkit ./ssh ]; }
|
||||||
|
|||||||
@@ -1,93 +0,0 @@
|
|||||||
valinor_ssh_priv: ENC[AES256_GCM,data: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,iv:pTQbb6nLHJ8BXTIYdiSe4vc5+1hpNuHhQhDkIAsZ9HI=,tag:jyO99VXSsCQlQD+Hh+gtvg==,type:str]
|
|
||||||
valinor_ssh_pub: ENC[AES256_GCM,data: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,iv:YT0ZN/Rt6CbMSFU1wZDbrenlwXCh7e4C06YbVL5J/VU=,tag:BqVtzOC1ViEkHHTXbgDJHw==,type:str]
|
|
||||||
valinor_wg_priv: ENC[AES256_GCM,data:1izZF+6G2Uc2MRBH56A07lexZEkyOiiFI4zltyoZco0+Y9EPhH1nJ4sWzs0=,iv:OIBIQvMsrq93/o0r8V6eSzfU63xtCzgQFf8NKXsjRk0=,tag:wdcQOfdaoxe7Vw0QWmngwA==,type:str]
|
|
||||||
valinor_wg_pub: ENC[AES256_GCM,data:noAhVF91HUwpU3lHl4knlmGkV0Zjbuc4TQhFhF7HjCbv1hdSycO17TDfgcw=,iv:82v169pOoCOwnOaqPTOMvtvOUJJEcXjPI9BzogC+UaI=,tag:NHIcOYD5mSnZ6kwZBAnXGg==,type:str]
|
|
||||||
iriy_ssh_priv: ENC[AES256_GCM,data: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,iv:cM6fDDPdHQ0Xamv41gKvCQ3Oh70hCRaijXLA8n2rEEA=,tag:7CsbqkiNGv7W5lCrPK3CmQ==,type:str]
|
|
||||||
iriy_ssh_pub: ENC[AES256_GCM,data:zjET00BIFhSI3/3bHO9d99VZLNqpGwWYuqhFvZAk6hYejOFRReCn3WKxXwEJh/IS8PYw1ARnj8DOpfYoRwhdofg+ap2/XMLE858B2cmgGQE5XZNftUryjmBV/WpWVECmAa/Dd6w71MACqZ9TDnt8Kkg5c0jtiGT7zg62/gMcjm/k531y1NDi4e8Jf7MFN9A/5nMpVDCpspZe42N2Lv+w0M2lhDrP4bjYTE9p7Klo27C7lt3vGahlNAjQBvx3o+309+4bSnE2hwTUkgwjN8YPx9qpV8v5XAfPEA3Syz4Qmhi6YpDnEsNPIVrmuGdNhrnprDQHJ8G04bHv51DXURf7Wtf8HSQUNVWXJoGb1jw5xzyiYEBB1Cu6VrRRHytQGtMMbQsIldoW7ISSo1jzRIPWJRMCYrY/4fneoALAXPN6u6VsYM+wtO6/1+A02KIz4uhHvt9c+iv2BNiJrwgHSdH2aY3JaOLEAI+wVQaf47WBfPIjfTzYsDx+kDNiflmBhENNWSqRnrXXLiAG0oVbbz0iuzA+C6w/gNc/t4L4foiMbeF3m9jVfFm3LrCmR1FJrGeA7ZSUAEQ6v55an+IbDMv7P9lUxgd7rsCj2M0elG2iDizV9vziFPOSJkplqzygxXZdo+In0pmRHUfWj06epacZjNdDxJHrakfhmWpGBvrwYRRp4/5p7/k2CToqj6UqedYen0S8M09JseHjNndr9/Oe2yJZYlzRhfq0ZDB1pzdVIiePcQ==,iv:nWWm3vecA7c5pv8bYrjjZk3VLHjKJI7c7ZPkK+pUqU4=,tag:Gfa5Izk6I3s/spA3GkXufQ==,type:str]
|
|
||||||
iriy_wg_priv: ENC[AES256_GCM,data:inng2niJrTXF3ld2T5Xs9t/64oDC8haJhpK1Iajpc60hMHWbenpqGRis7NM=,iv:E/cW6iwjbC3iKulvgBD5vXsjxh9A6nGO7Acr2DXAQps=,tag:CfHqE8u87xGDkzArZg3BnA==,type:str]
|
|
||||||
iriy_wg_pub: ENC[AES256_GCM,data:/4yPr9+NKyU/84L1heVhVa5Mzu6/9bTRciL4V8v31J99Fh5ratZDufNt8AY=,iv:1PzTUsgt1YQPQAywSQqBUVm08++EA9rTdQF/puRJMs8=,tag:ew+bmkZmlj74/mzdBPiSDA==,type:str]
|
|
||||||
avalon_ssh_priv: ENC[AES256_GCM,data:wTAQKXU=,iv:7x+5AnmbNde6lsr+y5MlkR7KoaOUSCGTCVwLECYxPHI=,tag:DkrosVUFtURFBuqQI0LxaQ==,type:bool]
|
|
||||||
avalon_ssh_pub: ENC[AES256_GCM,data:22S09ak=,iv:Q5SU6BQw9j4HMyohQorIeNwGL0xLx8erm10gvPpHmCc=,tag:o02ZcLBSz35sqY9INyOMRw==,type:bool]
|
|
||||||
avalon_wg_priv: ENC[AES256_GCM,data:Urf0hCzMoyo3IiV+0zhiHGhh3vfinrMAFbX9JwFgkXiW+3+AXN2b1b785JE=,iv:TV0zwPssXOEVSxiVo0jZwFCmZJiTSXXXctFXFX0H97s=,tag:YDNaw6dRBcbyMSjXTRIJmw==,type:str]
|
|
||||||
avalon_wg_pub: ENC[AES256_GCM,data:Lc8LIn3UX6mpN8WWum18OVI5LWjBLoW2Qles4Bv/cKP6yOfKTLXPkAYzmFU=,iv:P3UJr5aHkW07HVH0oy500HdsumZpcwwuRdRKx/Efgjo=,tag:U9G9Ja+7mS1x6no+MVptiQ==,type:str]
|
|
||||||
asgard_ssh_priv: ENC[AES256_GCM,data:PflBgd0=,iv:OvKG6iGAtvcx7Nw/CT3mJos69ECG0k5CasZMzg/xWo8=,tag:X9iQY/nDBb5Dz9a+rnN9Rg==,type:bool]
|
|
||||||
asgard_ssh_pub: ENC[AES256_GCM,data:+M50sSY=,iv:fWVBRPlz/ACENHhOJ5zabu0eqOAAH/AH9+HBqUZZQU8=,tag:UPdE0aLWnhj/zlXpKbdoGw==,type:bool]
|
|
||||||
asgard_wg_priv: ENC[AES256_GCM,data:YxlKrwQ=,iv:1xnNKjzkJ0KPglLQy35i3FZ6kaJIgf7u0vT4aciDQI8=,tag:Jg5a/215Ifxj/XXMkSHwMg==,type:bool]
|
|
||||||
asgard_wg_pub: ENC[AES256_GCM,data:7ojknU8=,iv:Rk2otESlMbnVItBS0Xo2JeoSjOiDusUnsMVMw9/4oU4=,tag:FD0S6AfDfvVgvgy0coF/Uw==,type:bool]
|
|
||||||
efir_ssh_priv: ENC[AES256_GCM,data:lfC0LrU=,iv:QCNZWYj1bokbZwVbPanuWzljwTv8k1yRvJJYzXiffRw=,tag:1r0myqf+wk0paT3ODStB6A==,type:bool]
|
|
||||||
efir_ssh_pub: ENC[AES256_GCM,data:s2CtFco=,iv:5ckMLWh/OrANzuN7dChi87jJqp8ulbTuhefteVijVeU=,tag:0Ojvf/u6Vs0tKiPzLnaHuQ==,type:bool]
|
|
||||||
efir_wg_priv: ENC[AES256_GCM,data:jxmtVME=,iv:4SJC/lexF/oxgZp4QDAA+MhLU50K6G7g4IgQmbXl81s=,tag:wC7h+uCgBfGFynIZlyaOng==,type:bool]
|
|
||||||
efir_wg_pub: ENC[AES256_GCM,data:lYCUem4=,iv:FmIo/U0Zo9O2pbiehLLbTe9bWKzRRjEJHP53zXPvhAU=,tag:nQKx887kvTKaoKIXTR+/EA==,type:bool]
|
|
||||||
vpn_ssh_priv: ENC[AES256_GCM,data:RQhNAZg=,iv:PHdobW9HIEITGaIq86YbOFhyf7OTeTzhgjWVKo0YgNs=,tag:EhSAJz8N2OAuHC7sbvBj+w==,type:bool]
|
|
||||||
vpn_ssh_pub: ENC[AES256_GCM,data:K7+ZMxQ=,iv:xp1ghLqP5sk91feAIxC1JpHOkCzBfYBO9rHW9ghfqAM=,tag:eX8s7hGITevnerFo1VpfRg==,type:bool]
|
|
||||||
vpn_wg_priv: ENC[AES256_GCM,data:YS2NMqSZdH6gTQq89sWNLna6sLFIzR+uDFurFP1s+3Pe1+QP/SAiX81PZfc=,iv:Ovm3ir8ia5793yYPsKrscpqc4A6B6r270hpx9pWmR1o=,tag:asWYQrENr5ip8kHdb2mkYw==,type:str]
|
|
||||||
vpn_wg_pub: ENC[AES256_GCM,data:orLTPlTD5Y6bimDcc+BFJytQFER2POfgcOFEk6zcKkvuq/GyU8bKgKLxuyM=,iv:TVHw+yVhlDJFz/8HYqI3qT85hGzgx+3Bj7mT0mr3dFE=,tag:EKDs8gE8RJMGQVfcYLj9Jw==,type:str]
|
|
||||||
pgp_key: ENC[AES256_GCM,data:nEMur/Uq,iv:2KXW/AAAWDX09Ich2S6LQ7618ZBAY61KZcGkIabqCLs=,tag:Q7o8fz3dFFuqeMpzu9U/Fg==,type:str]
|
|
||||||
wifi: ENC[AES256_GCM,data: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,iv:5mBedTqbzgrLUZ4HZGBrz+h3JAT7DUIP++TI+5j7/M8=,tag:XAWSPoSGepULdfn0W/StzQ==,type:str]
|
|
||||||
sops:
|
|
||||||
kms: []
|
|
||||||
gcp_kms: []
|
|
||||||
azure_kv: []
|
|
||||||
hc_vault: []
|
|
||||||
age:
|
|
||||||
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
|
||||||
enc: |
|
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBraWFDRFUxQ2l5OWV1OXNK
|
|
||||||
UExEbWZkM0kzVk1rZG4yY3pBLzdMVWVJS0UwCnhlWFJ5T2lZUXJyNkg1ejQxaU1t
|
|
||||||
L3F2RUhldTY3N2xXL0hwczNKRzNjcncKLS0tIEkycHoxcDBGNyt2V3RDY29wNGVp
|
|
||||||
TGg5Rk05VkRsaXM1Q0NxMmtMajRORDAKqjFldiAYJKjmnkeDkwanjYvhL6645DZ5
|
|
||||||
dVXExjqO/DG733ge8HFyKzpfpkzRymV1giUwxBdII1dd0mJ2ncINeA==
|
|
||||||
-----END AGE ENCRYPTED FILE-----
|
|
||||||
- recipient: age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s
|
|
||||||
enc: |
|
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB3UkRjblIvYStZUzQyRHA1
|
|
||||||
ZGVXeHhrN0kyVkxZdms5U3gwVFlPMW12MVJjCjRkVURpZXBzb0tYenB4dGxKamh6
|
|
||||||
VXVBMmo1Ujkvd2VTRExyWE5MbVJaclUKLS0tIDVhRkYzZmEzUG00Q2IwOWZUMVVt
|
|
||||||
ODVIbytpcjN1cVMyaG1qVVdkRmtaMzQKNsvD9DpK/raDBob+IcuNk72tQDts36kJ
|
|
||||||
QhtoLy8MvUymi49PdEWrgyf68w5XwRO/U4iINhR0qzm0glg/XcyHjA==
|
|
||||||
-----END AGE ENCRYPTED FILE-----
|
|
||||||
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
|
||||||
enc: |
|
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJc3hKWkk3ckNOY2UyTVhG
|
|
||||||
MmtLaEd0K04yaGxiOUoxMXkzOEFnYis4VkhnCktDRFM2bS8vb05OWDdwa0RwRlNO
|
|
||||||
cmlZemtxVGZ6S0tNTDV1cmE1N0pVWnMKLS0tIE9EZllycHJpcEY2R1pwOFhOZEU3
|
|
||||||
L01IcytDd3BPb0VOTW9DQ2lUdUVJS0kKiD+C+3mK1b/eIwCEFanFgYGLNk3JNPQ7
|
|
||||||
i1UqzbHVxSd0q/YVwdKAcj0jA6EezGm275tgq7IVsy2sHkvRMaEDtQ==
|
|
||||||
-----END AGE ENCRYPTED FILE-----
|
|
||||||
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
|
|
||||||
enc: |
|
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAweVU3TkxFZzRnd2I2clN2
|
|
||||||
ZTlTWmhwQkhVc1hnOXFvZVVDSWpHMVh1TGtrCkc3M1pUTnZCMHpvYXB5ZVhreGxa
|
|
||||||
ZVY2cG5Ja2ltL3k2Q1VEalc5TTNFMXcKLS0tIGd5UWl0RGVXT211Zm51dlB6WFZ1
|
|
||||||
STRtTVpVTCtVZ1FUNENqWFFVNTNuaVUKN6HRiZjTdENeif8dJ29urBxPXDaosjjY
|
|
||||||
InN4Ko6YUaGfvB1DTrKIzrxOpsHS+XjisoGfT71tJwwEOoREklEO/A==
|
|
||||||
-----END AGE ENCRYPTED FILE-----
|
|
||||||
lastmodified: "2024-02-18T07:35:26Z"
|
|
||||||
mac: ENC[AES256_GCM,data:jnLJi3ZhQfeLO/GmOnUL/HuWoet83V79GGZzoqxWeImQDN9jjSAqrRPULPAREHFD+hc+n2JAW7MZrZD86jcFFy2F+wGhcDAY+25dV6d2CSi34u/dBG5ETHsn/rRV5aAOQWldna/CEpnyi69Oz/oJcQrkHDyeUWsFG/ele6aPmB4=,iv:z+zSX9W/exvEJa37VlFBJ6S2173x7KQ6qnwZw/QAp7A=,tag:ge9klDIulMFv8Szjj6+gzw==,type:str]
|
|
||||||
pgp:
|
|
||||||
- created_at: "2023-04-20T10:20:17Z"
|
|
||||||
enc: |-
|
|
||||||
-----BEGIN PGP MESSAGE-----
|
|
||||||
|
|
||||||
wcFMA6R3Y9nD7qMBAQ/8CVWQaYKfOzvPIllZyyWpUjHRLLXaR8MNJ8U5WI/tdwdN
|
|
||||||
9UScDYJFuYRW7Q9s4Mt961kBGpaHqe9MUZBxUDlYX59+EN3FbO/eMQ5OqI05ESmL
|
|
||||||
TvZB4+S9C5o73nuypSDNvYz+Lgq6DO25ZPhXdtPhx2DE4G31/wft/LpxhjalIjI8
|
|
||||||
MU0Dv22R4qC+glJbe4GIF2IJ8XoxnnzjiGeSqiyv0QIBM0SzOtA5sKwNohWBnW7g
|
|
||||||
7vxOTm5+kyzG0dDjt3tFApgPDaA1wjofzhRuuveF52VBsuIA2opFdpqkyICvK6rn
|
|
||||||
NB5kUaPlY6A0m+n0oHSfY5wm/AnHNE4Oob/ifumAaB0EAJVUTRauI5M8SeJF0ya1
|
|
||||||
U0IQ9N2lb7Y6q4pqHywIa6fnylsqCfxInAYKMuslRq8f9t/qakb4/MYcnPrwpzjw
|
|
||||||
73/naiNoJmG6NVTkM52qTtOqZAmsaQd5cigTuPW2Z2CJq1yLZEVGSSd1DUGUjBDK
|
|
||||||
nQGucpVVVpD+ifrIPz+Iqwy+5NoZZm/Oa9pKJGFzqXinnDNZaqtgpmTw9QxcSeaP
|
|
||||||
VvGZG9CDd89MtAm1VQyuqi1bQ2faq3G0xNrLl7xUsfmjx4ofW+JXR87OzvGfLPhu
|
|
||||||
Sjl3kS9j5/MEBRBg3n9gNkgSu5Sy3ilhckY3yjTgAT9Gw2giDhCiUXi1/7KrGprS
|
|
||||||
UQHPCSsjyWsyuYVa3lAP/WPdVclc4WOdfYcetUCXBVP7LQr0bq+IG+2J0nnY3mDt
|
|
||||||
Va5k4sP1qu6Ecrs2JioQ1V2H+VmcrRykBWnMXl1tDSWKMA==
|
|
||||||
=pS8X
|
|
||||||
-----END PGP MESSAGE-----
|
|
||||||
fp: 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
|
|
||||||
unencrypted_suffix: _unencrypted
|
|
||||||
version: 3.8.1
|
|
||||||
@@ -1,26 +0,0 @@
|
|||||||
{ config, pkgs, ... }:
|
|
||||||
let keyFilePath = "/var/lib/sops-nix/age-key.txt";
|
|
||||||
in {
|
|
||||||
sops.defaultSopsFile = ./common.yaml;
|
|
||||||
sops.age.keyFile = keyFilePath;
|
|
||||||
sops.age.generateKey = true;
|
|
||||||
|
|
||||||
sops.secrets.wifi = { };
|
|
||||||
|
|
||||||
sops.secrets."${config.hostcfg.hostname}_ssh_priv" = {
|
|
||||||
mode = "0400";
|
|
||||||
owner = config.users.users.sora.name;
|
|
||||||
group = config.users.users.sora.group;
|
|
||||||
};
|
|
||||||
sops.secrets."${config.hostcfg.hostname}_ssh_pub" = {
|
|
||||||
mode = "0400";
|
|
||||||
owner = config.users.users.sora.name;
|
|
||||||
group = config.users.users.sora.group;
|
|
||||||
};
|
|
||||||
sops.secrets."${config.hostcfg.hostname}_wg_priv" = { };
|
|
||||||
sops.secrets."${config.hostcfg.hostname}_wg_pub" = { };
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [ sops ];
|
|
||||||
environment.sessionVariables.OPS_AGE_KEY_FILE = keyFilePath;
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -2,7 +2,7 @@
|
|||||||
programs.ssh = {
|
programs.ssh = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
IdentityFile ${
|
IdentityFile ${
|
||||||
config.sops.secrets."${config.hostcfg.hostname}_ssh_priv".path
|
config.sops.secrets."${config.syscfg.hostname}_ssh_priv".path
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,60 +1,68 @@
|
|||||||
{ pkgs, ... }: {
|
{ config, lib, pkgs, ... }: {
|
||||||
|
config = lib.mkMerge [
|
||||||
|
(lib.mkIf (config.syscfg.make.gui) {
|
||||||
|
xdg.portal = {
|
||||||
|
enable = true;
|
||||||
|
# wlr.enable = true;
|
||||||
|
extraPortals = with pkgs; [
|
||||||
|
xdg-desktop-portal-hyprland
|
||||||
|
xdg-desktop-portal-gtk
|
||||||
|
];
|
||||||
|
config.common.default = [ "hyprland" "gtk" ];
|
||||||
|
};
|
||||||
|
|
||||||
xdg.portal = {
|
environment.sessionVariables = rec {
|
||||||
enable = true;
|
GBM_BACKEND = "amd-drm";
|
||||||
# wlr.enable = true;
|
__GL_GSYNC_ALLOWED = "0";
|
||||||
extraPortals = with pkgs; [
|
__GL_VRR_ALLOWED = "1";
|
||||||
xdg-desktop-portal-hyprland
|
__GLX_VENDOR_LIBRARY_NAME = "amd";
|
||||||
xdg-desktop-portal-gtk
|
WLR_DRM_NO_ATOMIC = "1";
|
||||||
];
|
_JAVA_AWT_WM_NONREPARENTING = "1";
|
||||||
config.common.default = [ "hyprland" "gtk" ];
|
QT_QPA_PLATFORM = "wayland";
|
||||||
};
|
QT_WAYLAND_DISABLE_WINDOWDECORATION = "1";
|
||||||
|
# GDK_BACKEND = "wayland";
|
||||||
|
WLR_NO_HARDWARE_CURSORS = "1";
|
||||||
|
MOZ_ENABLE_WAYLAND = "1";
|
||||||
|
# WLR_BACKEND = "vulkan";
|
||||||
|
# WLR_RENDERER = "vulkan";
|
||||||
|
XCURSOR_SIZE = "24";
|
||||||
|
NIXOS_OZONE_WL = "1";
|
||||||
|
};
|
||||||
|
})
|
||||||
|
({
|
||||||
|
|
||||||
environment.sessionVariables = rec {
|
environment.sessionVariables = rec {
|
||||||
GBM_BACKEND = "amd-drm";
|
PATH = [ "$HOME/.local/bin/:$PATH" ];
|
||||||
__GL_GSYNC_ALLOWED = "0";
|
XDG_CACHE_HOME = "$HOME/.cache";
|
||||||
__GL_VRR_ALLOWED = "1";
|
XDG_CONFIG_HOME = "$HOME/.config";
|
||||||
WLR_DRM_NO_ATOMIC = "1";
|
XDG_DATA_HOME = "$HOME/.local/share";
|
||||||
__GLX_VENDOR_LIBRARY_NAME = "amd";
|
XDG_STATE_HOME = "$HOME/.local/state";
|
||||||
_JAVA_AWT_WM_NONREPARENTING = "1";
|
XDG_BIN_HOME = "$HOME/.local/bin";
|
||||||
QT_QPA_PLATFORM = "wayland";
|
XDG_DESKTOP_DIR = "$HOME/desktop";
|
||||||
QT_WAYLAND_DISABLE_WINDOWDECORATION = "1";
|
XDG_DOCUMENTS_DIR = "$HOME/files";
|
||||||
GDK_BACKEND = "wayland";
|
XDG_DOWNLOAD_DIR = "$HOME/download";
|
||||||
WLR_NO_HARDWARE_CURSORS = "1";
|
XDG_MUSIC_DIR = "$HOME/media/music";
|
||||||
MOZ_ENABLE_WAYLAND = "1";
|
XDG_PICTURES_DIR = "$HOME/media/photo";
|
||||||
WLR_BACKEND = "vulkan";
|
XDG_PUBLICSHARE_DIR = "$HOME/pub";
|
||||||
WLR_RENDERER = "vulkan";
|
XDG_TEMPLATES_DIR = "$HOME/media/templates";
|
||||||
XCURSOR_SIZE = "24";
|
XDG_VIDEOS_DIR = "$HOME/media/video";
|
||||||
NIXOS_OZONE_WL = "1";
|
};
|
||||||
PATH = [ "$HOME/.local/bin/:$PATH" ];
|
|
||||||
XDG_CACHE_HOME = "$HOME/.cache";
|
|
||||||
XDG_CONFIG_HOME = "$HOME/.config";
|
|
||||||
XDG_DATA_HOME = "$HOME/.local/share";
|
|
||||||
XDG_STATE_HOME = "$HOME/.local/state";
|
|
||||||
XDG_BIN_HOME = "$HOME/.local/bin";
|
|
||||||
XDG_DESKTOP_DIR = "$HOME/desktop";
|
|
||||||
XDG_DOCUMENTS_DIR = "$HOME/files";
|
|
||||||
XDG_DOWNLOAD_DIR = "$HOME/download";
|
|
||||||
XDG_MUSIC_DIR = "$HOME/media/music";
|
|
||||||
XDG_PICTURES_DIR = "$HOME/media/photo";
|
|
||||||
XDG_PUBLICSHARE_DIR = "$HOME/pub";
|
|
||||||
XDG_TEMPLATES_DIR = "$HOME/media/templates";
|
|
||||||
XDG_VIDEOS_DIR = "$HOME/media/video";
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.etc."xdg/user-dirs.defaults".text = ''
|
environment.etc."xdg/user-dirs.defaults".text = ''
|
||||||
XDG_CACHE_HOME="$HOME/.cache"
|
XDG_CACHE_HOME="$HOME/.cache"
|
||||||
XDG_CONFIG_HOME="$HOME/.config"
|
XDG_CONFIG_HOME="$HOME/.config"
|
||||||
XDG_DATA_HOME="$HOME/.local/share"
|
XDG_DATA_HOME="$HOME/.local/share"
|
||||||
XDG_STATE_HOME="$HOME/.local/state"
|
XDG_STATE_HOME="$HOME/.local/state"
|
||||||
XDG_BIN_HOME="$HOME/.local/bin"
|
XDG_BIN_HOME="$HOME/.local/bin"
|
||||||
XDG_DESKTOP_DIR="$HOME/desktop"
|
XDG_DESKTOP_DIR="$HOME/desktop"
|
||||||
XDG_DOCUMENTS_DIR="$HOME/files"
|
XDG_DOCUMENTS_DIR="$HOME/files"
|
||||||
XDG_DOWNLOAD_DIR="$HOME/download"
|
XDG_DOWNLOAD_DIR="$HOME/download"
|
||||||
XDG_MUSIC_DIR="$HOME/media/music"
|
XDG_MUSIC_DIR="$HOME/media/music"
|
||||||
XDG_PICTURES_DIR="$HOME/media/photo"
|
XDG_PICTURES_DIR="$HOME/media/photo"
|
||||||
XDG_PUBLICSHARE_DIR="$HOME/pub"
|
XDG_PUBLICSHARE_DIR="$HOME/pub"
|
||||||
XDG_TEMPLATES_DIR="$HOME/media/templates"
|
XDG_TEMPLATES_DIR="$HOME/media/templates"
|
||||||
XDG_VIDEOS_DIR="$HOME/media/video"
|
XDG_VIDEOS_DIR="$HOME/media/video"
|
||||||
'';
|
'';
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,12 @@
|
|||||||
{ pkgs, config, ... }: {
|
{ pkgs, config, lib, ... }: {
|
||||||
programs.adb.enable = true;
|
|
||||||
programs.wireshark.enable = true;
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [ wget dconf wireshark ];
|
config = lib.mkIf (config.syscfg.make.develop) {
|
||||||
|
programs.adb.enable = true;
|
||||||
|
# services.udev.packages = [
|
||||||
|
# pkgs.android-udev-rules
|
||||||
|
# ];
|
||||||
|
programs.wireshark.enable = true;
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [ wget dconf wireshark ];
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +1,64 @@
|
|||||||
{ ... }: { imports = [ ./debug ./develop ]; }
|
{ pkgs, ... }: {
|
||||||
|
imports = [ ./debug ./develop ];
|
||||||
|
|
||||||
|
# services.telegraf = {
|
||||||
|
# enable = true;
|
||||||
|
# extraConfig = {
|
||||||
|
# agent = {
|
||||||
|
# interval = "10s";
|
||||||
|
# round_interval = true;
|
||||||
|
# metric_batch_size = 1000;
|
||||||
|
# metric_buffer_limit = 10000;
|
||||||
|
# collection_jitter = "0s";
|
||||||
|
# flush_interval = "10s";
|
||||||
|
# flush_jitter = "0s";
|
||||||
|
# precision = "";
|
||||||
|
# hostname = "valinor";
|
||||||
|
# omit_hostname = false;
|
||||||
|
# };
|
||||||
|
|
||||||
|
# inputs.cpu = {
|
||||||
|
# percpu = true;
|
||||||
|
# totalcpu = true;
|
||||||
|
# collect_cpu_time = false;
|
||||||
|
# report_active = false;
|
||||||
|
# };
|
||||||
|
|
||||||
|
# inputs.mem = {};
|
||||||
|
# inputs.swap = {};
|
||||||
|
# inputs.system = {};
|
||||||
|
# inputs.disk = {
|
||||||
|
# ignore_fs = ["tmpfs" "devtmpfs" "devfs"];
|
||||||
|
# };
|
||||||
|
|
||||||
|
# inputs.net = {};
|
||||||
|
# inputs.netstat = {};
|
||||||
|
|
||||||
|
# inputs.ping = {
|
||||||
|
# urls = ["8.8.8.8" "8.8.4.4"];
|
||||||
|
# count = 4;
|
||||||
|
# interval = "60s";
|
||||||
|
# binary = "${pkgs.iputils.out}/bin/ping";
|
||||||
|
# };
|
||||||
|
|
||||||
|
# inputs.internet_speed = {
|
||||||
|
# interval = "2m";
|
||||||
|
# };
|
||||||
|
|
||||||
|
# inputs.net_response = {
|
||||||
|
# protocol = "tcp";
|
||||||
|
# address = "google.com:80";
|
||||||
|
# timeout = "5s";
|
||||||
|
# read_timeout = "5s";
|
||||||
|
# interval = "30s";
|
||||||
|
# };
|
||||||
|
|
||||||
|
# outputs.influxdb_v2 = {
|
||||||
|
# urls = [""];
|
||||||
|
# token = "";
|
||||||
|
# organization = "";
|
||||||
|
# bucket = "";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
}
|
||||||
|
|||||||
@@ -6,10 +6,13 @@ let
|
|||||||
includeEmulator = false;
|
includeEmulator = false;
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
config = lib.mkIf (config.hostcfg.make.develop) {
|
|
||||||
environment.systemPackages = with pkgs; [
|
imports = [ ./ollama ];
|
||||||
android-tools
|
config = lib.mkIf (config.syscfg.make.develop) {
|
||||||
androidStudioPackages.stable
|
environment.systemPackages = with pkgs;
|
||||||
];
|
[
|
||||||
|
# android-tools
|
||||||
|
unstable.androidStudioPackages.canary
|
||||||
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
16
modules/nixos/tools/develop/ollama/default.nix
Normal file
16
modules/nixos/tools/develop/ollama/default.nix
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
{ lib, config, pkgs, ... }:
|
||||||
|
let
|
||||||
|
ollamaPkg = pkgs.ollama-rocm;
|
||||||
|
in{
|
||||||
|
|
||||||
|
config = lib.mkIf (config.syscfg.make.develop) {
|
||||||
|
services.ollama = {
|
||||||
|
enable = true;
|
||||||
|
package = ollamaPkg;
|
||||||
|
acceleration = "rocm";
|
||||||
|
loadModels = [ "deepseek-v2:lite" "qwen2.5-coder:7b" "qwen2.5-coder:1.5b" ];
|
||||||
|
syncModels = true;
|
||||||
|
};
|
||||||
|
environment.systemPackages = with pkgs; [ ollamaPkg ];
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,23 +1,29 @@
|
|||||||
{ config, pkgs, ... }: {
|
{ config, pkgs, lib, ... }:
|
||||||
|
let nameValuePair = name: value: { inherit name value; };
|
||||||
|
in {
|
||||||
programs.zsh.enable = true;
|
programs.zsh.enable = true;
|
||||||
users = {
|
users = {
|
||||||
defaultUserShell = pkgs.zsh;
|
defaultUserShell = pkgs.zsh;
|
||||||
users.${config.hostcfg.username} = {
|
users = builtins.listToAttrs (map (userConfig:
|
||||||
isNormalUser = true;
|
nameValuePair userConfig.username {
|
||||||
description = "${config.hostcfg.username}";
|
isNormalUser = true;
|
||||||
extraGroups = [
|
description = "${userConfig.username}";
|
||||||
"networkmanager"
|
extraGroups = [
|
||||||
"wheel"
|
"networkmanager"
|
||||||
"vboxsf"
|
"wheel"
|
||||||
"adbusers"
|
"dialout"
|
||||||
"libvirtd"
|
"vboxsf"
|
||||||
"kvm"
|
"adbusers"
|
||||||
"lp"
|
"libvirtd"
|
||||||
"audio"
|
"kvm"
|
||||||
"video"
|
"lp"
|
||||||
"docker"
|
"audio"
|
||||||
"wireshark"
|
"video"
|
||||||
];
|
"docker"
|
||||||
};
|
"podman"
|
||||||
|
"wireshark"
|
||||||
|
"gamemode"
|
||||||
|
];
|
||||||
|
}) config.syscfg.users);
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
46
modules/server/containers/apps/.template.nix
Normal file
46
modules/server/containers/apps/.template.nix
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name,... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = "EXAMPLE";
|
||||||
|
tag = "0.0.0";
|
||||||
|
contents = [ pkgs.bashInteractive ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "echo 1" ];
|
||||||
|
ExposedPorts = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
templateData = builder.mkData { name = "template"; dir = "template"; vars = {
|
||||||
|
_ARGUMENT = "template";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = false;
|
||||||
|
db = false;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.configPath}/example/";
|
||||||
|
mode = "0444";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8080;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = { };
|
||||||
|
overrides = {
|
||||||
|
cmd = [ ];
|
||||||
|
volumes = [ ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."EXAMPLE".path;
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
...
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
7
modules/server/containers/apps/.todo.md
Normal file
7
modules/server/containers/apps/.todo.md
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
# Missing
|
||||||
|
|
||||||
|
RSS: TTRSS / FreshRSS
|
||||||
|
Monitoring: Telegraf + InfluxDB
|
||||||
|
https://github.com/tarampampam/error-pages ?
|
||||||
|
|
||||||
|
- Transmission Cfg and API/Token handling
|
||||||
111
modules/server/containers/apps/authentik.nix
Normal file
111
modules/server/containers/apps/authentik.nix
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
version = "2026.2.2";
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
authentikData = builder.mkData {
|
||||||
|
name = "authentik"; dir = "authentik"; vars = {
|
||||||
|
AUTHENTIK_DOMAIN = "${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
COOKIE_DOMAIN = "${serverCfg.domain}";
|
||||||
|
AUTHENTIK_LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
|
||||||
|
}
|
||||||
|
// (if serverCfg.containers?jellyfin then { JELLYFIN_DOMAIN = "${serverCfg.containers.jellyfin.subdomain}.${serverCfg.domain}";} else {})
|
||||||
|
// (if serverCfg.containers?gitea then { GITEA_DOMAIN = "${serverCfg.containers.gitea.subdomain}.${serverCfg.domain}";} else {})
|
||||||
|
// (if serverCfg.containers?immich then { IMMICH_DOMAIN = "${serverCfg.containers.immich.subdomain}.${serverCfg.domain}";} else {})
|
||||||
|
// (if serverCfg.containers?nextcloud then { NEXTCLOUD_DOMAIN = "${serverCfg.containers.nextcloud.subdomain}.${serverCfg.domain}";} else {});
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.configPath}/authentik/media";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}{
|
||||||
|
path="${serverCfg.configPath}/authentik/templates";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
image = "ghcr.io/goauthentik/server:${version}";
|
||||||
|
port = 9000;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
AUTHENTIK_REDIS__HOST = builder.host;
|
||||||
|
AUTHENTIK_POSTGRESQL__HOST = builder.host;
|
||||||
|
AUTHENTIK_POSTGRESQL__USER = "authentik_user";
|
||||||
|
AUTHENTIK_POSTGRESQL__NAME = "authentik_db";
|
||||||
|
AUTHENTIK_POSAUTHENTIK_POSTGRESQL__SSLMODE = "false";
|
||||||
|
AUTHENTIK_EMAIL__HOST = serverCfg.mailDomain;
|
||||||
|
AUTHENTIK_EMAIL__PORT = "587";
|
||||||
|
AUTHENTIK_EMAIL__USERNAME = "noreply@${serverCfg.domain}";
|
||||||
|
AUTHENTIK_EMAIL__USE_TLS = "true";
|
||||||
|
AUTHENTIK_EMAIL__USE_SSL = "false";
|
||||||
|
AUTHENTIK_EMAIL__TIMEOUT = "10";
|
||||||
|
AUTHENTIK_EMAIL__FROM = "sso@noreply.${serverCfg.domain}";
|
||||||
|
AUTHENTIK_DISABLE_UPDATE_CHECK = "true";
|
||||||
|
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
cmd = [ "server" ];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/authentik/media:/media"
|
||||||
|
"${serverCfg.configPath}/authentik/templates:/templates"
|
||||||
|
"${authentikData}:/blueprints/custom:ro"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
worker = builder.mkContainer {
|
||||||
|
image = "ghcr.io/goauthentik/server:${version}";
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
AUTHENTIK_REDIS__HOST = builder.host;
|
||||||
|
AUTHENTIK_POSTGRESQL__HOST = builder.host;
|
||||||
|
AUTHENTIK_POSTGRESQL__USER = "authentik_user";
|
||||||
|
AUTHENTIK_POSTGRESQL__NAME = "authentik_db";
|
||||||
|
AUTHENTIK_POSAUTHENTIK_POSTGRESQL__SSLMODE = "false";
|
||||||
|
AUTHENTIK_DISABLE_UPDATE_CHECK = "true";
|
||||||
|
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
cmd = [ "worker" ];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/authentik/media:/media"
|
||||||
|
"${serverCfg.configPath}/authentik/templates:/templates"
|
||||||
|
"${authentikData}:/blueprints/custom:ro"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
ldap = builder.mkContainer {
|
||||||
|
image = "ghcr.io/goauthentik/ldap:${version}";
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
AUTHENTIK_HOST = "https://${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
AUTHENTIK_INSECURE = "false";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "worker";
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
# Define the command wrapper
|
||||||
|
AK="${pkgs.podman}/bin/podman --events-backend=none exec --env-file ${config.sops.secrets."CUSTOM".path} -e DOMAIN=${serverCfg.domain} -u root authentik-worker ak"
|
||||||
|
|
||||||
|
$AK apply_blueprint /blueprints/custom/authentik.yaml
|
||||||
|
$AK apply_blueprint /blueprints/custom/traefik.yaml
|
||||||
|
$AK apply_blueprint /blueprints/custom/ldap.yaml
|
||||||
|
|
||||||
|
${lib.optionalString (serverCfg.containers ? gitea) ''$AK apply_blueprint /blueprints/custom/gitea.yaml''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? jellyfin) ''$AK apply_blueprint /blueprints/custom/jellyfin.yaml''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? nextcloud) ''$AK apply_blueprint /blueprints/custom/nextcloud.yaml''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? immich) ''$AK apply_blueprint /blueprints/custom/immich.yaml''}
|
||||||
|
|
||||||
|
echo "Completed Authentik Setup"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
34
modules/server/containers/apps/collabora.nix
Normal file
34
modules/server/containers/apps/collabora.nix
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
version = "latest";
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
image = "collabora/code:${version}";
|
||||||
|
port = 9980;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
"aliasgroup1" = "https://${serverCfg.containers.nextcloud.subdomain}.${serverCfg.domain}";
|
||||||
|
"server_name" = "${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
"username" = "collabora_user";
|
||||||
|
"VIRTUAL_HOST" = "${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
"VIRTUAL_PORT" = "9980";
|
||||||
|
"VIRTUAL_PROTO" = "http";
|
||||||
|
"DONT_GEN_SSL_CERT" = "true";
|
||||||
|
"RESOLVE_TO_PROXY_IP" = "true";
|
||||||
|
"extra_params" = "--o:ssl.enable=false --o:ssl.termination=true";
|
||||||
|
"dictionaries" = "en fr de jp no";
|
||||||
|
};
|
||||||
|
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${pkgs.noto-fonts}/share/fonts/noto:/opt/collaboraoffice/share/fonts/truetype/noto:ro"
|
||||||
|
"${pkgs.ibm-plex}/share/fonts/opentype:/opt/collaboraoffice/share/fonts/opentype/plex:ro"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
39
modules/server/containers/apps/ethercalc.nix
Normal file
39
modules/server/containers/apps/ethercalc.nix
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name,... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
ethercalc_exe = pkgs.ethercalc;
|
||||||
|
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = "ethercalc";
|
||||||
|
tag = ethercalc_exe.version;
|
||||||
|
contents = [ pkgs.bashInteractive ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${ethercalc_exe}/bin/ethercalc" ];
|
||||||
|
ExposedPorts = { "8080/tcp" = {}; };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.dataPath}/ethercalc/";
|
||||||
|
mode = "0666";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8080;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
ETHERCALC_PORT = "8080";
|
||||||
|
#CONNECT TO REDIS
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/ethercalc:/data"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
124
modules/server/containers/apps/etherpad.nix
Normal file
124
modules/server/containers/apps/etherpad.nix
Normal file
@@ -0,0 +1,124 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name,... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
etherpad_exe = pkgs.etherpad-lite;
|
||||||
|
settings = pkgs.writeText"settings.json" (builtins.toJSON {
|
||||||
|
title= "\${TITLE:Etherpad}";
|
||||||
|
showRecentPads = "\${SHOW_RECENT_PADS:true}";
|
||||||
|
favicon = "\${FAVICON:null}";
|
||||||
|
publicURL = "\${PUBLIC_URL:null}";
|
||||||
|
skinName = "\${SKIN_NAME:colibris}";
|
||||||
|
skinVariants = "\${SKIN_VARIANTS:super-light-toolbar super-light-editor light-background}";
|
||||||
|
ip = "\${IP:0.0.0.0}";
|
||||||
|
port = "\${PORT:9001}";
|
||||||
|
showSettingsInAdminPage = "\${SHOW_SETTINGS_IN_ADMIN_PAGE:true}";
|
||||||
|
enableMetrics = "\${ENABLE_METRICS:true}";
|
||||||
|
updates.tier = "off";
|
||||||
|
cleanup.enabled = false;
|
||||||
|
gdprAuthorErasure.enabled = "\${GDPR_AUTHOR_ERASURE_ENABLED:false}";
|
||||||
|
authenticationMethod = "\${AUTHENTICATION_METHOD:apikey}";
|
||||||
|
enableDarkMode = "\${ENABLE_DARK_MODE:true}";
|
||||||
|
enablePadWideSettings = "\${ENABLE_PAD_WIDE_SETTINGS:true}";
|
||||||
|
dbType = "\${DB_TYPE:dirty}";
|
||||||
|
dbSettings = {
|
||||||
|
host = "\${DB_HOST:undefined}";
|
||||||
|
port = "\${DB_PORT:undefined}";
|
||||||
|
database = "\${DB_NAME:undefined}";
|
||||||
|
user = "\${DB_USER:undefined}";
|
||||||
|
password = "\${DB_PASS:undefined}";
|
||||||
|
charset = "\${DB_CHARSET:undefined}";
|
||||||
|
filename = "\${DB_FILENAME:var/dirty.db}";
|
||||||
|
collection = "\${DB_COLLECTION:undefined}";
|
||||||
|
url = "\${DB_URL:undefined}";
|
||||||
|
};
|
||||||
|
defaultPadText = "\${DEFAULT_PAD_TEXT:P A D}";
|
||||||
|
padOptions = {
|
||||||
|
noColors = "\${PAD_OPTIONS_NO_COLORS:false}";
|
||||||
|
showControls = "\${PAD_OPTIONS_SHOW_CONTROLS:true}";
|
||||||
|
showChat = "\${PAD_OPTIONS_SHOW_CHAT:true}";
|
||||||
|
showLineNumbers = "\${PAD_OPTIONS_SHOW_LINE_NUMBERS:true}";
|
||||||
|
useMonospaceFont = "\${PAD_OPTIONS_USE_MONOSPACE_FONT:false}";
|
||||||
|
userName = "\${PAD_OPTIONS_USER_NAME:null}";
|
||||||
|
userColor = "\${PAD_OPTIONS_USER_COLOR:null}";
|
||||||
|
rtl = "\${PAD_OPTIONS_RTL:false}";
|
||||||
|
alwaysShowChat = "\${PAD_OPTIONS_ALWAYS_SHOW_CHAT:false}";
|
||||||
|
chatAndUsers = "\${PAD_OPTIONS_CHAT_AND_USERS:false}";
|
||||||
|
lang = "\${PAD_OPTIONS_LANG:null}";
|
||||||
|
fadeInactiveAuthorColors = "\${PAD_OPTIONS_FADE_INACTIVE_AUTHOR_COLORS:true}";
|
||||||
|
enforceReadableAuthorColors = "\${PAD_OPTIONS_ENFORCE_READABLE_AUTHOR_COLORS:true}";
|
||||||
|
};
|
||||||
|
|
||||||
|
requireSession = "\${REQUIRE_SESSION:false}";
|
||||||
|
editOnly = "\${EDIT_ONLY:false}";
|
||||||
|
minify = "\${MINIFY:true}";
|
||||||
|
requireAuthentication = "\${REQUIRE_AUTHENTICATION:false}";
|
||||||
|
requireAuthorization = "\${REQUIRE_AUTHORIZATION:false}";
|
||||||
|
trustProxy = "\${TRUST_PROXY:true}";
|
||||||
|
ep_headerauth.username_header = "X-authentik-username";
|
||||||
|
users.admin = {
|
||||||
|
password = "\${ADMIN_PASSWORD:null}";
|
||||||
|
is_admin = true;
|
||||||
|
};
|
||||||
|
socketTransportProtocols = ["websocket" "polling"];
|
||||||
|
socketIo.maxHttpBufferSize = "\${SOCKETIO_MAX_HTTP_BUFFER_SIZE:1000000}";
|
||||||
|
indentationOnNewLine = true;
|
||||||
|
|
||||||
|
loglevel = "\${LOGLEVEL:INFO}";
|
||||||
|
lowerCasePadIds = "\${LOWER_CASE_PAD_IDS:true}";
|
||||||
|
});
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = "etherpad";
|
||||||
|
tag = etherpad_exe.version;
|
||||||
|
contents = [ pkgs.bashInteractive ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${etherpad_exe}/bin/etherpad-lite" ];
|
||||||
|
ExposedPorts = { "8080/tcp" = {}; };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.configPath}/etherpad/";
|
||||||
|
mode = "0444";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8080;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
TITLE = "Pad";
|
||||||
|
PORT ="8080";
|
||||||
|
DB_TYPE = "postgres";
|
||||||
|
DB_HOST = builder.host;
|
||||||
|
DB_NAME = "etherpad_db";
|
||||||
|
DB_USER = "etherpad_user";
|
||||||
|
TRUST_PROXY = "true";
|
||||||
|
DB_CHARSET = "utf8mb4";
|
||||||
|
DEFAULT_PAD_TEXT = "";
|
||||||
|
PAD_OPTIONS_SHOW_LINE_NUMBERS = "true";
|
||||||
|
PAD_OPTIONS_USE_MONOSPACE_FONT = "true";
|
||||||
|
SKIN_VARIANTS = "super-dark-toolbar light-editor dark-background";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
cmd = [ "--settings" "/etc/etherpad/settings.json" "--apikey" "/etc/etherpad/APIKEY.txt" ];
|
||||||
|
volumes = [
|
||||||
|
"${settings}:/etc/etherpad/settings.json"
|
||||||
|
"${serverCfg.configPath}/etherpad/APIKEY.txt:/etc/etherpad/APIKEY.txt:ro"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."ETHERPAD".path;
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
echo "$APIKEY" > ${serverCfg.configPath}/etherpad/APIKEY.txt
|
||||||
|
chmod 444 ${serverCfg.configPath}/etherpad/APIKEY.txt
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
95
modules/server/containers/apps/frigate.nix
Normal file
95
modules/server/containers/apps/frigate.nix
Normal file
@@ -0,0 +1,95 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
|
||||||
|
# Ensure the package is available (Nixpkgs includes frigate)
|
||||||
|
frigatePkg = pkgs.frigate;
|
||||||
|
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = "frigate";
|
||||||
|
tag = frigatePkg.version;
|
||||||
|
contents = [
|
||||||
|
pkgs.bashInteractive
|
||||||
|
frigatePkg
|
||||||
|
pkgs.ffmpeg # Explicitly included for video stream processing
|
||||||
|
];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${frigatePkg}/bin/frigate" ];
|
||||||
|
Cmd = [ "start" ];
|
||||||
|
ExposedPorts = {
|
||||||
|
"5000/tcp" = {}; # Web UI / API
|
||||||
|
"8554/tcp" = {}; # RTSP Feeds
|
||||||
|
"8555/tcp" = {}; # WebRTC
|
||||||
|
};
|
||||||
|
Env = [
|
||||||
|
"FRIGATE_RTSP_PASSWORD=secret" # Base fallback, overridden by envFile/sops
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true; # Enabled to safeguard sensitive camera RTSP stream credentials
|
||||||
|
db = false; # Internal SQLite is used by default in Frigate
|
||||||
|
|
||||||
|
paths = [
|
||||||
|
{
|
||||||
|
path = "${serverCfg.configPath}/frigate/";
|
||||||
|
mode = "0755";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
path = "/var/lib/frigate/storage/";
|
||||||
|
mode = "0755"; # Dedicated path for heavy video recordings and media
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 5000;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
PLUS_API_KEY = ""; # Optional: For Frigate Plus users
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
cmd = [ ];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/frigate:/config"
|
||||||
|
"/var/lib/frigate/storage:/media/frigate"
|
||||||
|
"/dev/bus/usb:/dev/bus/usb" # Passes Google Coral USB TPU to the container
|
||||||
|
"/dev/dri:/dev/dri" # Passes Intel/AMD GPU for hardware video decoding
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."FRIGATE_ENV".path;
|
||||||
|
script = pkgs.writeShellScript "setup-frigate" ''
|
||||||
|
mkdir -p "${serverCfg.configPath}/frigate"
|
||||||
|
mkdir -p "/var/lib/frigate/storage"
|
||||||
|
|
||||||
|
# Bootstrap a standard configuration layout if missing
|
||||||
|
if [ ! -f "${serverCfg.configPath}/frigate/config.yml" ]; then
|
||||||
|
cat <<EOF > "${serverCfg.configPath}/frigate/config.yml"
|
||||||
|
mqtt:
|
||||||
|
enabled: False # Set to True and define host if connecting to Home Assistant
|
||||||
|
|
||||||
|
database:
|
||||||
|
path: /config/frigate.db
|
||||||
|
|
||||||
|
cameras:
|
||||||
|
dummy_camera: # Replace with your actual RTSP stream details
|
||||||
|
enabled: false
|
||||||
|
ffmpeg:
|
||||||
|
inputs:
|
||||||
|
- path: rtsp://127.0.0.1:554/live
|
||||||
|
roles:
|
||||||
|
- detect
|
||||||
|
detect:
|
||||||
|
enabled: false
|
||||||
|
EOF
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
145
modules/server/containers/apps/gitea.nix
Normal file
145
modules/server/containers/apps/gitea.nix
Normal file
@@ -0,0 +1,145 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
version = "latest";
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
|
||||||
|
LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.dataPath}/gitea/data";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}{
|
||||||
|
path="${serverCfg.dataPath}/gitea/data-runner";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}];
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
image = "gitea/gitea:${version}";
|
||||||
|
port = 8080;
|
||||||
|
secret = name;
|
||||||
|
|
||||||
|
extraEnv = { # app.ini -> GITEA__<section>__<KEY> = "<VALUE>";
|
||||||
|
GITEA__DEFAULT__APP_NAME = if(containerCfg.extra ? name) then containerCfg.extra.name else "Gitea";
|
||||||
|
GITEA__repository__DISABLED_REPO_UNITS = "repo.ext_issues,repo.ext_wiki";
|
||||||
|
GITEA__repository__DISABLE_STARS = "true";
|
||||||
|
GITEA__repository__DEFAULT_MERGE_STYLE = "squash";
|
||||||
|
# GITEA__ui__THEMES = "";
|
||||||
|
# GITEA__ui__DEFAULT_THEME = "";
|
||||||
|
|
||||||
|
# GITEA__security__SECRET_KEY = "SECRET_ENV";
|
||||||
|
# GITEA__security__INTERNAL_TOKEN = "SECRET_ENV";
|
||||||
|
# GITEA__database__PASSWD = "SECRET_ENV";
|
||||||
|
# GITEA__mailer__PASSWD="SECRET_ENV";
|
||||||
|
|
||||||
|
GITEA__database__DB_TYPE = "postgres";
|
||||||
|
GITEA__database__HOST = builder.host;
|
||||||
|
GITEA__database__NAME = "gitea_db";
|
||||||
|
GITEA__database__USER = "gitea_user";
|
||||||
|
|
||||||
|
|
||||||
|
GITEA__mailer__ENABLED = "true";
|
||||||
|
GITEA__mailer__FROM = "";
|
||||||
|
GITEA__mailer__PROTOCOL = "smtps";
|
||||||
|
GITEA__mailer__SMTP_ADDR = "";
|
||||||
|
GITEA__mailer__SMTP_PORT = "";
|
||||||
|
GITEA__mailer__USER= "";
|
||||||
|
|
||||||
|
GITEA__server__DOMAIN = "${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
GITEA__server__ROOT_URL = "https://${containerCfg.subdomain}.${serverCfg.domain}/";
|
||||||
|
GITEA__server__PROTOCOL = "http";
|
||||||
|
GITEA__server__HTTP_PORT = "8080";
|
||||||
|
GITEA__server__LFS_START_SERVER = "true";
|
||||||
|
GITEA__security__INSTALL_LOCK = "true";
|
||||||
|
|
||||||
|
} // ( if serverCfg.containers?authentik then {
|
||||||
|
GITEA__service__ENABLE_BASIC_AUTHENTICATION = "false";
|
||||||
|
GITEA__service__ENABLE_REVERSE_PROXY_AUTHENTICATION = "true";
|
||||||
|
GITEA__service__ENABLE_REVERSE_PROXY_AUTHENTICATION_API = "true";
|
||||||
|
GITEA__service__ENABLE_REVERSE_PROXY_AUTO_REGISTRATION = "true";
|
||||||
|
GITEA__service__ENABLE_REVERSE_PROXY_EMAIL = "true";
|
||||||
|
GITEA__service__ENABLE_REVERSE_PROXY_FULL_NAME = "true";
|
||||||
|
GITEA__service__ALLOW_ONLY_EXTERNAL_REGISTRATION = "true";
|
||||||
|
GITEA__security__REVERSE_PROXY_LOGOUT_REDIRECT = "https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/outpost.goauthentik.io/sign_out";
|
||||||
|
GITEA__security__REVERSE_PROXY_AUTHENTICATION_USER = "X-authentik-username";
|
||||||
|
GITEA__security__REVERSE_PROXY_AUTHENTICATION_EMAIL = "X-authentik-email";
|
||||||
|
GITEA__security__REVERSE_PROXY_AUTHENTICATION_FULL_NAME = "X-authentik-name";
|
||||||
|
GITEA__security__RREVERSE_PROXY_LIMIT = "1";
|
||||||
|
GITEA__security__REVERSE_PROXY_TRUSTED_PROXIES = "127.0.0.0/8,::1/128,10.0.0.0/8";
|
||||||
|
} else {});
|
||||||
|
extraLabels = {
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.rule" = "Host(`${containerCfg.subdomain}.${serverCfg.domain}`) && Path(`/user/login`) ";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.priority" = "100";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.entrypoints" = "web-secure";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.tls" = "true";
|
||||||
|
};
|
||||||
|
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/gitea/data:/data"
|
||||||
|
];
|
||||||
|
ports = [ "2222:22" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
runner = builder.mkContainer {
|
||||||
|
image = "gitea/act_runner:${version}";
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
CONFIG_FILE="/data/config.yml";
|
||||||
|
GITEA_INSTANCE_URL="https://${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
GITHUB_INSTANCE_URL="https://${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
};
|
||||||
|
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/gitea/data-runner:/data"
|
||||||
|
"/var/run/podman/podman.sock:/var/run/docker.sock"
|
||||||
|
];
|
||||||
|
# ports = [ "8088:8088" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."CUSTOM".path;
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
# Define the command wrapper
|
||||||
|
GT="${pkgs.podman}/bin/podman --events-backend=none exec -u git gitea-server gitea"
|
||||||
|
GTR="${pkgs.podman}/bin/podman --events-backend=none exec -u git gitea-runner ./act_runner"
|
||||||
|
|
||||||
|
$GT admin user create --username "$DEFAULT_ADMIN_USERNAME" --password "$DEFAULT_ADMIN_PASSWORD" --email "$DEFAULT_ADMIN_EMAIL" --admin || true
|
||||||
|
|
||||||
|
touch ${serverCfg.dataPath}/gitea/data-runner/config.yml
|
||||||
|
|
||||||
|
RUNNER_TOKEN=$($GT actions generate-runner-token)
|
||||||
|
$GTR register \
|
||||||
|
--instance "https://${containerCfg.subdomain}.${serverCfg.domain}" \
|
||||||
|
--token "$RUNNER_TOKEN" \
|
||||||
|
--name "Runner" \
|
||||||
|
--labels "ubuntu-latest:docker://catthehacker/ubuntu:act-latest" \
|
||||||
|
--no-interactive
|
||||||
|
|
||||||
|
|
||||||
|
${lib.optionalString (serverCfg.containers ? authentik) ''
|
||||||
|
$GT admin auth add-ldap --name Authentik --host authentik-ldap --port 6636 --security-protocol ldaps --skip-tls-verify \
|
||||||
|
--bind-dn "cn=ldap-service,ou=users,${LDAP_DC_DOMAIN}" --bind-password $DEFAULT_LDAP_PASSWORD \
|
||||||
|
--user-search-base "ou=users,${LDAP_DC_DOMAIN}" \
|
||||||
|
--user-filter "(&(objectClass=user)(|(uid=%[1]s)(mail=%[1]s)))" \
|
||||||
|
--admin-filter "(memberOf=cn=admin,ou=groups,${LDAP_DC_DOMAIN})" \
|
||||||
|
--username-attribute "username" --firstname-attribute "givenName" --surname-attribute "sn" --email-attribute "mail" \
|
||||||
|
--synchronize-users
|
||||||
|
''}
|
||||||
|
|
||||||
|
|
||||||
|
echo "Completed Gitea Setup"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
3
modules/server/containers/apps/handbrake.nix
Normal file
3
modules/server/containers/apps/handbrake.nix
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
{...}:{
|
||||||
|
|
||||||
|
}
|
||||||
43
modules/server/containers/apps/homeassistant.nix
Normal file
43
modules/server/containers/apps/homeassistant.nix
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = pkgs.home-assistant.name;
|
||||||
|
tag = pkgs.home-assistant.version;
|
||||||
|
contents = [ ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${pkgs.home-assistant}/bin/hass" ];
|
||||||
|
ExposedPorts = {
|
||||||
|
"8123/tcp" = {};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = false;
|
||||||
|
|
||||||
|
paths = [{
|
||||||
|
path = "${serverCfg.configPath}/homeassistant/";
|
||||||
|
mode = "0755";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8123;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
TZ = config.time.timeZone or "UTC";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
cmd = [ "--config" "/config" ];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/homeassistant/:/config"
|
||||||
|
"/run/dbus:/run/dbus:ro" # Required for Bluetooth/mDNS service discovery
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
||||||
97
modules/server/containers/apps/immich.nix
Normal file
97
modules/server/containers/apps/immich.nix
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name,... }:
|
||||||
|
let
|
||||||
|
version = "v2";
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
|
||||||
|
paths = [{
|
||||||
|
path = "${serverCfg.configPath}/immich/cache";
|
||||||
|
mode = "0750";
|
||||||
|
}{
|
||||||
|
path = "${serverCfg.dataPath}/immich/";
|
||||||
|
mode = "0755";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
image = "ghcr.io/immich-app/immich-server:${version}";
|
||||||
|
port = 2283;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
DB_HOSTNAME = builder.host;
|
||||||
|
REDIS_HOSTNAME = builder.host;
|
||||||
|
DB_USERNAME = "immich_user";
|
||||||
|
DB_DATABASE_NAME = "immich_db";
|
||||||
|
IMMICH_TRUSTED_PROXIES = "10.0.0.0/8";
|
||||||
|
IMMICH_MACHINE_LEARNING_URL = "http://immich-ml:3003";
|
||||||
|
# IMMICH_ALLOW_SETUP = "false";
|
||||||
|
# IMMICH_IGNORE_MOUNT_CHECK_ERRORS = "true";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/immich:/data"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
ml = builder.mkContainer {
|
||||||
|
image = "ghcr.io/immich-app/immich-machine-learning:${version}";
|
||||||
|
port = 3003;
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/immich/cache:/cache"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."CUSTOM".path;
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
PSQL="${pkgs.postgresql}/bin/psql -U postgres"
|
||||||
|
$PSQL -d "immich_db" -tAc "CREATE EXTENSION IF NOT EXISTS vchord CASCADE;"
|
||||||
|
$PSQL -d "immich_db" -tAc "CREATE EXTENSION IF NOT EXISTS earthdistance CASCADE;"
|
||||||
|
|
||||||
|
mkdir -p ${serverCfg.dataPath}/immich/{upload,library,thumbs,encoded-video,profile,backups}
|
||||||
|
|
||||||
|
IMMICH_URL="https://${containerCfg.subdomain}.${serverCfg.domain}"
|
||||||
|
until [[ "$(${pkgs.curl}/bin/curl -s -o /dev/null -w "%{http_code}" "$IMMICH_URL")" =~ (200|301|302) ]]; do
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
${pkgs.curl}/bin/curl -X POST "$IMMICH_URL/api/auth/admin-sign-up" \
|
||||||
|
-H "Content-Type: application/json" -H "Accept: application/json" \
|
||||||
|
-d '{ "email": "'"$DEFAULT_ADMIN_EMAIL"'", "password": "'"$DEFAULT_ADMIN_PASSWORD"'", "name": "'"$DEFAULT_ADMIN_USERNAME"'" }'
|
||||||
|
|
||||||
|
IMMICH_TOKEN=$(${pkgs.curl}/bin/curl -sSf -X POST "$IMMICH_URL/api/auth/login" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-d '{ "email": "'"$DEFAULT_ADMIN_EMAIL"'", "password": "'"$DEFAULT_ADMIN_PASSWORD"'"}' \
|
||||||
|
| ${pkgs.jq}/bin/jq -r '.accessToken')
|
||||||
|
|
||||||
|
${lib.optionalString (serverCfg.containers ? authentik) ''
|
||||||
|
${pkgs.curl}/bin/curl -s -X GET "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" | \
|
||||||
|
${pkgs.jq}/bin/jq '.oauth.enabled = true |
|
||||||
|
.oauth.autoRegister = true |
|
||||||
|
.oauth.autoLaunch = true |
|
||||||
|
.oauth.signingAlgorithm = "RS256" |
|
||||||
|
.oauth.profileSigningAlgorithm = "RS256" |
|
||||||
|
.oauth.clientId = "immich" |
|
||||||
|
.oauth.clientSecret = "'"$IMMICH_OAUTH_SECRET"'" |
|
||||||
|
.oauth.issuerUrl = "https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/o/immich/" |
|
||||||
|
.oauth.scope = "openid profile email" |
|
||||||
|
.oauth.buttonText = "Login with SSO"' | \
|
||||||
|
${pkgs.curl}/bin/curl -s -X PUT "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" -H "Content-Type: application/json" -d @-
|
||||||
|
''}
|
||||||
|
|
||||||
|
${pkgs.curl}/bin/curl -s -X GET "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" | \
|
||||||
|
${pkgs.jq}/bin/jq '.storageTemplate.enable = true |
|
||||||
|
.storageTemplate.template = "{{y}}/{{#if album}}{{album}}{{else}}{{MM}}{{/if}}/{{filename}}"' | \
|
||||||
|
${pkgs.curl}/bin/curl -s -X PUT "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" -H "Content-Type: application/json" -d @-
|
||||||
|
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
45
modules/server/containers/apps/influx.nix
Normal file
45
modules/server/containers/apps/influx.nix
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
influxPkg = pkgs.influxdb2;
|
||||||
|
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = influxPkg.name;
|
||||||
|
tag = influxPkg.version;
|
||||||
|
contents = [ ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${influxPkg}/bin/influxd" ];
|
||||||
|
ExposedPorts = {
|
||||||
|
"8086/tcp" = {}; # Combined Engine and UI port
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
sops = true; # Highly recommended for initial admin passwords and setup tokens
|
||||||
|
db = false; # Using InfluxDB directly as the primary database
|
||||||
|
|
||||||
|
paths = [{
|
||||||
|
path = "${serverCfg.configPath}/influxdb/";
|
||||||
|
mode = "0700"; # Strict database permissions
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8086;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
INFLUXD_CONFIG_PATH = "var/lib/influxdb2/config";
|
||||||
|
INFLUXD_BOLT_PATH = "/var/lib/influxdb2/influxdb.bolt";
|
||||||
|
INFLUXD_ENGINE_PATH = "/var/lib/influxdb2/engine";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/influxdb/:/var/lib/influxdb2"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
||||||
78
modules/server/containers/apps/invidious.nix
Normal file
78
modules/server/containers/apps/invidious.nix
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
|
||||||
|
patchedInvidious = pkgs.invidious.overrideAttrs (oldAttrs: {
|
||||||
|
postPatch = (oldAttrs.postPatch or "") + ''
|
||||||
|
cp ${../data/invidious/login.cr} src/invidious/routes/login.cr
|
||||||
|
'';
|
||||||
|
});
|
||||||
|
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage {
|
||||||
|
name = pkgs.invidious.name;
|
||||||
|
tag = pkgs.invidious.version;
|
||||||
|
|
||||||
|
contents = [ pkgs.cacert patchedInvidious ];
|
||||||
|
config = {
|
||||||
|
Entrypoint = [ "${patchedInvidious}/bin/invidious" ];
|
||||||
|
ExposedPorts = { "3000/tcp" = {}; };
|
||||||
|
Env = [
|
||||||
|
"SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||||
|
"NIX_SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.configPath}/invidious";
|
||||||
|
mode = "0755";
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 3000;
|
||||||
|
secret = name;
|
||||||
|
extraLabels = {
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.rule" = "Host(`${containerCfg.subdomain}.${serverCfg.domain}`) && Path(`/login`) ";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.priority" = "100";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.entrypoints" = "web-secure";
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}-login.tls" = "true";
|
||||||
|
};
|
||||||
|
extraEnv = {
|
||||||
|
INVIDIOUS_CONFIG_FILE = "/data/config.yml";
|
||||||
|
};
|
||||||
|
overrides = {
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.configPath}/invidious:/data:ro"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
companion = builder.mkContainer {
|
||||||
|
image = "quay.io/invidious/invidious-companion:latest";
|
||||||
|
port = 8282;
|
||||||
|
secret = name; #SERVER_SECRET_KEY = INVIDIOUS_COMPANION_KEY
|
||||||
|
extraOptions = [
|
||||||
|
"--cap-drop=all"
|
||||||
|
"--security-opt=no-new-privileges"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = [ config.sops.secrets."INVIDIOUS".path config.sops.secrets."CUSTOM".path ];
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
export DB_HOST=${builder.host}
|
||||||
|
export INVIDIOUS_DOMAIN=${containerCfg.subdomain}.${serverCfg.domain}
|
||||||
|
|
||||||
|
${pkgs.gettext}/bin/envsubst < "${../data/invidious/config.yml}" > "${serverCfg.configPath}/invidious/config.yml"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
177
modules/server/containers/apps/jellyfin.nix
Normal file
177
modules/server/containers/apps/jellyfin.nix
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name, ... }:
|
||||||
|
let
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
|
||||||
|
nss = pkgs.dockerTools.fakeNss.override {
|
||||||
|
extraPasswdLines = [
|
||||||
|
"jellyfin:x:1000:1000:Jellyfin Daemon:/config/data:/bin/false"
|
||||||
|
];
|
||||||
|
extraGroupLines = [
|
||||||
|
"jellyfin:x:1000:"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
image = pkgs.dockerTools.streamLayeredImage { # pkgs.dockerTools.buildImage{#
|
||||||
|
name = pkgs.jellyfin.name;
|
||||||
|
tag = pkgs.jellyfin.version;
|
||||||
|
contents = [ pkgs.cacert nss pkgs.jellyfin pkgs.bashInteractive ];
|
||||||
|
config = {
|
||||||
|
User = "jellyfin:jellyfin";
|
||||||
|
Entrypoint = [ "${pkgs.jellyfin}/bin/jellyfin" ];
|
||||||
|
ExposedPorts = { "8096/tcp" = { }; };
|
||||||
|
Env = [
|
||||||
|
"SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||||
|
"NIX_SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
paths = [
|
||||||
|
{
|
||||||
|
path = "${serverCfg.dataPath}/media/";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
path = "${serverCfg.configPath}/jellyfin/";
|
||||||
|
owner = "1000:1000";
|
||||||
|
mode = "0755";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
imageStream = image;
|
||||||
|
port = 8096;
|
||||||
|
extraEnv = {
|
||||||
|
HOME = "/config/data";
|
||||||
|
DOTNET_SYSTEM_GLOBALIZATION_INVARIANT = "1";
|
||||||
|
JELLYFIN_HttpListenerHost__BindAddress= "0.0.0.0"; #we can use settings.xml override
|
||||||
|
JELLYFIN_ServerName = if containerCfg.extra?name then containerCfg.extra.name else "Flix";
|
||||||
|
};
|
||||||
|
extraOptions = [
|
||||||
|
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
|
||||||
|
];
|
||||||
|
overrides = {
|
||||||
|
cmd = [
|
||||||
|
"--datadir" "/config/data"
|
||||||
|
"--cachedir" "/config/cache"
|
||||||
|
"--configdir" "/config/config"
|
||||||
|
"--logdir" "/config/log"
|
||||||
|
];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/media:/media:ro"
|
||||||
|
"${serverCfg.configPath}/jellyfin:/config"
|
||||||
|
];
|
||||||
|
# If you have an Intel/AMD GPU for transcoding, add the device:
|
||||||
|
devices = lib.optionals (builtins.pathExists "/dev/dri") [ "/dev/dri:/dev/dri" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
envFile = config.sops.secrets."CUSTOM".path;
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
JELLYFIN_URL="https://${containerCfg.subdomain}.${serverCfg.domain}"
|
||||||
|
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
echo "Jellyfin is up. Sleeping for 20 seconds..."
|
||||||
|
sleep 20
|
||||||
|
WIZARD_COMPLETE=$(${pkgs.curl}/bin/curl -sSf "$JELLYFIN_URL/System/Info/Public" 2>/dev/null | \
|
||||||
|
${pkgs.jq}/bin/jq -r '.StartupWizardCompleted // false')
|
||||||
|
if [ "$WIZARD_COMPLETE" = "false" ]; then
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/Configuration" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-d '{"ServerName":"Flix","UICulture":"en-US","MetadataCountryCode":"US","PreferredMetadataLanguage":"en"}'; then
|
||||||
|
echo "ERROR: Failed to set startup configuration."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X GET "$JELLYFIN_URL/Startup/User"; then
|
||||||
|
echo "ERROR: Failed to get base user."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/User" \
|
||||||
|
-H 'accept: */*' -H "Content-Type: application/json" \
|
||||||
|
-d '{"Name": "'"$DEFAULT_ADMIN_USERNAME"'", "Password": "'"$DEFAULT_ADMIN_PASSWORD"'"}'; then
|
||||||
|
echo "ERROR: Failed to set admin user."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/RemoteAccess" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-d '{"EnableRemoteAccess":true,"EnableAutomaticPortMapping":false}'; then
|
||||||
|
echo "ERROR: Failed to configure remote access."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "''$JELLYFIN_URL/Startup/Complete"; then
|
||||||
|
echo "ERROR: Failed to complete wizard."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
echo "Jellyfin initialization successfully completed!"
|
||||||
|
fi
|
||||||
|
|
||||||
|
${lib.optionalString (serverCfg.containers ? authentik) ''
|
||||||
|
JELLYFIN_TOKEN=$(${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Users/AuthenticateByName" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-H "Authorization: MediaBrowser Client=\"Bash Script\", Device=\"Server Terminal\", DeviceId=\"script-12345\", Version=\"1.0.0\"" \
|
||||||
|
-d "{\"Username\": \"$DEFAULT_ADMIN_USERNAME\", \"Pw\": \"$DEFAULT_ADMIN_PASSWORD\"}" \
|
||||||
|
| ${pkgs.jq}/bin/jq -r '.AccessToken')
|
||||||
|
|
||||||
|
# Verify we got a token
|
||||||
|
if [ "$JELLYFIN_TOKEN" = "null" ] || [ -z "$JELLYFIN_TOKEN" ]; then
|
||||||
|
echo "ERROR: Authentication failed."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
if ${pkgs.curl}/bin/curl -sSf -H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
|
||||||
|
"$JELLYFIN_URL/Plugins" | ${pkgs.gnugrep}/bin/grep -q "958aad6637844d2ab89aa7b6fab6e25c"; then
|
||||||
|
echo "LDAP Plugin is already installed. Skipping setup."
|
||||||
|
else
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Packages/Installed/LDAP%20Authentication?assemblyGuid=958aad6637844d2ab89aa7b6fab6e25c" \
|
||||||
|
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
|
||||||
|
-H "Content-Length: 0"; then
|
||||||
|
echo "ERROR: LDAP Plugin Setup Failed."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/System/Restart" \
|
||||||
|
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
|
||||||
|
-H "Content-Length: 0"; then
|
||||||
|
echo "ERROR: Server failed to accept restart command."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
sleep 1-
|
||||||
|
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
echo "Jellyfin is up. Sleeping for 20 seconds..."
|
||||||
|
sleep 20
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Plugins/958aad66-3784-4d2a-b89a-a7b6fab6e25c/Configuration" \
|
||||||
|
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
|
||||||
|
-H "Content-Type: application/json" -H 'accept: */*' \
|
||||||
|
-d '{"LdapUsers":[],"LdapServer":"authentik-ldap","LdapPort":6636,"UseSsl":true,"UseStartTls":false,"SkipSslVerify":true,
|
||||||
|
"LdapBindUser":"cn=ldap-service,ou=users,${LDAP_DC_DOMAIN}","LdapBindPassword": "'"$DEFAULT_LDAP_PASSWORD"'",
|
||||||
|
"LdapBaseDn":"${LDAP_DC_DOMAIN}","LdapSearchFilter":"(memberOf=cn=flix,ou=groups,${LDAP_DC_DOMAIN})",
|
||||||
|
"LdapSearchAttributes":"uid, cn, mail, displayName",
|
||||||
|
"LdapAdminBaseDn":"","LdapAdminFilter":"(memberOf=cn=admin,ou=groups,${LDAP_DC_DOMAIN})",
|
||||||
|
"EnableLdapAdminFilterMemberUid":false,"LdapUidAttribute":"uid","LdapUsernameAttribute":"cn","LdapPasswordAttribute":"userPassword",
|
||||||
|
"EnableLdapProfileImageSync":false,"RemoveImagesNotInLdap":false,"LdapProfileImageAttribute":"jpegphoto","LdapProfileImageFormat":"Default",
|
||||||
|
"LdapClientCertPath":"","LdapClientKeyPath":"","LdapRootCaPath":"","CreateUsersFromLdap":true,"AllowPassChange":false,
|
||||||
|
"EnableAllFolders":true,"EnabledFolders":[],"PasswordResetUrl":""}'; then
|
||||||
|
echo "ERROR: LDAP Plugin Setup Failed."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
''}
|
||||||
|
|
||||||
|
echo "Completed Setup"
|
||||||
|
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
||||||
0
modules/server/containers/apps/miniflux.nix
Normal file
0
modules/server/containers/apps/miniflux.nix
Normal file
199
modules/server/containers/apps/nextcloud.nix
Normal file
199
modules/server/containers/apps/nextcloud.nix
Normal file
@@ -0,0 +1,199 @@
|
|||||||
|
{ config, containerCfg, pkgs, lib, builder, name,... }:
|
||||||
|
let
|
||||||
|
version = "31";
|
||||||
|
serverCfg = config.syscfg.server;
|
||||||
|
in {
|
||||||
|
sops = true;
|
||||||
|
db = true;
|
||||||
|
paths = [{
|
||||||
|
path="${serverCfg.dataPath}/nextcloud/www";
|
||||||
|
owner = "33:33";
|
||||||
|
mode = "0755";
|
||||||
|
}{
|
||||||
|
path="${serverCfg.dataPath}/nextcloud/data";
|
||||||
|
owner = "33:33";
|
||||||
|
mode = "0755";
|
||||||
|
backup = true;
|
||||||
|
}];
|
||||||
|
|
||||||
|
containers = {
|
||||||
|
server = builder.mkContainer {
|
||||||
|
subdomain = containerCfg.subdomain;
|
||||||
|
image = "nextcloud:${version}";
|
||||||
|
port = 80;
|
||||||
|
secret = name;
|
||||||
|
extraEnv = {
|
||||||
|
REDIS_HOST = builder.host;
|
||||||
|
POSTGRES_HOST = builder.host;
|
||||||
|
POSTGRES_USER = "nextcloud_user";
|
||||||
|
POSTGRES_DB = "nextcloud_db";
|
||||||
|
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
|
||||||
|
"NEXTCLOUD_TRUSTED_DOMAINS " = "${containerCfg.subdomain}.${serverCfg.domain}";
|
||||||
|
"SMTP_HOST" = serverCfg.mailServer;
|
||||||
|
"SMTP_NAME" = "mail_user";
|
||||||
|
"SMTP_PASSWORD" = "mail_password";
|
||||||
|
"MAIL_FROM_ADDRESS" = "${containerCfg.subdomain}@${serverCfg.domain}";
|
||||||
|
"MAIL_DOMAIN" = serverCfg.mailDomain;
|
||||||
|
"TRUSTED_PROXIES" = "10.10.0.0/16 192.168.0.0/16";
|
||||||
|
};
|
||||||
|
extraLabels = {
|
||||||
|
"traefik.http.routers.${containerCfg.subdomain}.middlewares" = "sts_headers,${containerCfg.subdomain}-caldav";
|
||||||
|
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.permanent" = "true";
|
||||||
|
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.regex" = "https://(.*)/.well-known/(?:card|cal)dav";
|
||||||
|
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.replacement" = "https://$1/remote.php/dav";
|
||||||
|
"traefik.http.middlewares.sts_headers.headers.stsSeconds" = "15552000";
|
||||||
|
"traefik.http.middlewares.sts_headers.headers.stsIncludeSubdomains" = "true";
|
||||||
|
};
|
||||||
|
extraOptions = [
|
||||||
|
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
|
||||||
|
];
|
||||||
|
overrides = {
|
||||||
|
ports = if containerCfg.port!=null then [ "${toString containerCfg.port}:80" ] else [];
|
||||||
|
volumes = [
|
||||||
|
"${serverCfg.dataPath}/nextcloud/www:/var/www/html"
|
||||||
|
"${serverCfg.dataPath}/nextcloud/data:/var/www/html/data"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
setup = {
|
||||||
|
trigger = "server";
|
||||||
|
script = pkgs.writeShellScript "setup" ''
|
||||||
|
# Define the command wrapper
|
||||||
|
OCC="${pkgs.podman}/bin/podman --events-backend=none exec --env-file ${config.sops.secrets."CUSTOM".path} -e DOMAIN=${serverCfg.domain} -u www-data nextcloud-server php occ"
|
||||||
|
|
||||||
|
echo "Waiting for Nextcloud container to start..."
|
||||||
|
until $OCC status > /dev/null 2>&1; do
|
||||||
|
sleep 2
|
||||||
|
done
|
||||||
|
|
||||||
|
INSTALLED=$($OCC status --output=json | grep -o '"installed":true')
|
||||||
|
if [ -z "$INSTALLED" ]; then
|
||||||
|
echo "Running first-time setup..."
|
||||||
|
|
||||||
|
$OCC maintenance:install \
|
||||||
|
--admin-user "$DEFAULT_ADMIN_USERNAME" \
|
||||||
|
--admin-pass "$DEFAULT_ADMIN_PASSWORD"
|
||||||
|
fi
|
||||||
|
if [ -z "$INSTALLED" ] || [ -f "/tmp/force-nextcloud-setup" ]; then
|
||||||
|
rm -f "/tmp/force-nextcloud-setup"
|
||||||
|
echo "Applying Settings..."
|
||||||
|
|
||||||
|
$OCC config:system:set default_phone_region --value="CH"
|
||||||
|
$OCC config:system:set overwriteprotocol --value="https"
|
||||||
|
$OCC config:app:set core backgroundjobs_mode --value="cron"
|
||||||
|
$OCC config:system:set maintenance_window_start --type=integer --value=1
|
||||||
|
$OCC config:system:set default_language --value="en"
|
||||||
|
$OCC config:system:set default_locale --value="en_CH"
|
||||||
|
|
||||||
|
echo "Applying Apps..."
|
||||||
|
$OCC app:disable activity || true
|
||||||
|
$OCC app:disable app_api || true
|
||||||
|
$OCC app:disable comments || true
|
||||||
|
$OCC app:disable firstrunwizard || true
|
||||||
|
$OCC config:system:set show_first_run_wizard --type=bool --value=false
|
||||||
|
$OCC app:disable nextcloud_announcements || true
|
||||||
|
$OCC app:disable oauth2 || true
|
||||||
|
$OCC app:disable recommendations || true
|
||||||
|
$OCC app:disable sharebymail || true
|
||||||
|
$OCC app:disable support || true
|
||||||
|
$OCC app:disable survey_client || true
|
||||||
|
$OCC app:disable updatenotification || true
|
||||||
|
$OCC app:disable user_status || true
|
||||||
|
|
||||||
|
$OCC app:install calendar || true
|
||||||
|
$OCC app:install calendar || true
|
||||||
|
$OCC app:install contacts || true
|
||||||
|
$OCC app:install camerarawpreviews || true
|
||||||
|
$OCC app:install cospend || true
|
||||||
|
$OCC app:install deck || true
|
||||||
|
$OCC app:install files_markdown || true
|
||||||
|
$OCC app:install forms || true
|
||||||
|
$OCC app:install groupfolders || true
|
||||||
|
$OCC app:install ownpad || true
|
||||||
|
$OCC app:install previewgenerator || true
|
||||||
|
$OCC app:install richdocuments || true
|
||||||
|
${lib.optionalString (serverCfg.containers ? collabora == false) ''$OCC app:install richdocumentscode || true''}
|
||||||
|
# $OCC app:install side_menu || true
|
||||||
|
$OCC app:install spreed || true
|
||||||
|
$OCC app:install teamfolders || true
|
||||||
|
${lib.optionalString (serverCfg.containers ? authentik) ''$OCC app:install user_saml || true''}
|
||||||
|
|
||||||
|
echo "Applying Apps Settings..."
|
||||||
|
$OCC config:system:set enabledPreviewProviders --value='["OC\\Preview\\Movie", "OC\\Preview\\PNG", "OC\\Preview\\JPEG", "OC\\Preview\\GIF", "OC\\Preview\\HEIC", "OC\\Preview\\RAW"]' --type=json
|
||||||
|
$OCC config:app:set cospend allow_federation --value="yes"
|
||||||
|
|
||||||
|
${lib.optionalString (serverCfg.containers ? ethercalc) ''
|
||||||
|
$OCC config:app:set ownpad ownpad_ethercalc_enable --value="yes"
|
||||||
|
$OCC config:app:set ownpad ownpad_ethercalc_host --value="https://${serverCfg.containers.ethercalc.subdomain}.${serverCfg.domain}"
|
||||||
|
''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? etherpad) ''
|
||||||
|
$OCC config:app:set ownpad ownpad_etherpad_enable --value="yes"
|
||||||
|
$OCC config:app:set ownpad ownpad_etherpad_host --value="https://${serverCfg.containers.etherpad.subdomain}.${serverCfg.domain}"
|
||||||
|
''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? collabora) ''
|
||||||
|
$OCC config:app:set richdocuments wopi_url --value="https://${serverCfg.containers.collabora.subdomain}.${serverCfg.domain}/"
|
||||||
|
$OCC config:app:set richdocuments public_wopi_url --value="https://${serverCfg.containers.collabora.subdomain}.${serverCfg.domain}"
|
||||||
|
$OCC config:app:set richdocuments wopi_allowlist --value="10.0.0.0/8"
|
||||||
|
''}
|
||||||
|
${lib.optionalString (serverCfg.containers ? authentik) ''
|
||||||
|
$OCC saml:config:set 1 --general-idp0_display_name="authentik"
|
||||||
|
$OCC saml:config:set 1 --general-uid_mapping="http://schemas.goauthentik.io/2021/02/saml/username"
|
||||||
|
$OCC saml:config:set 1 --idp-entityId="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}"
|
||||||
|
$OCC saml:config:set 1 --idp-singleSignOnService.url="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/saml/nextcloud/sso/binding/redirect/"
|
||||||
|
$OCC saml:config:set 1 --idp-singleLogoutService.url="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/saml/nextcloud/slo/binding/redirect/"
|
||||||
|
AUTHENTIK_CERT=$(${pkgs.postgresql}/bin/psql -h localhost -U authentik_user -d authentik_db -At -c "SELECT certificate_data FROM authentik_crypto_certificatekeypair WHERE name = 'authentik Self-signed Certificate';")
|
||||||
|
$OCC saml:config:set 1 --idp-x509cert="$AUTHENTIK_CERT"
|
||||||
|
|
||||||
|
$OCC saml:config:set 1 --saml-attribute-mapping-displayName_mapping="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
|
||||||
|
$OCC saml:config:set 1 --saml-attribute-mapping-email_mapping="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
|
||||||
|
$OCC saml:config:set 1 --saml-attribute-mapping-group_mapping="http://schemas.xmlsoap.org/claims/Group"
|
||||||
|
|
||||||
|
$OCC config:app:set user_saml general-allowed_groups --value="admin,cloud"
|
||||||
|
$OCC group:add admin || true
|
||||||
|
$OCC group:add cloud || true
|
||||||
|
$OCC config:app:set user_saml general-group_provisioning --value="0"
|
||||||
|
$OCC config:app:set user_saml general-require_provisioning_groups --value="1"
|
||||||
|
''}
|
||||||
|
# configure side_menu ...
|
||||||
|
FOLDERS=$($OCC teamfolders:list --format=json)
|
||||||
|
${builtins.concatStringsSep "\n" (map (name: ''
|
||||||
|
if ! echo "$FOLDERS" | grep -q '"name":"${name}"'; then
|
||||||
|
$OCC teamfolders:create "${name}"
|
||||||
|
fi
|
||||||
|
'') containerCfg.extra.teamFolders or [])}
|
||||||
|
SERVERS=$($OCC federation:list-servers --format=json)
|
||||||
|
${builtins.concatStringsSep "\n" (map (domain: ''
|
||||||
|
if ! echo "$SERVERS" | grep -q "${domain}"; then
|
||||||
|
$OCC federation:add-server "https://${domain}"
|
||||||
|
fi
|
||||||
|
'') containerCfg.extra.federatedServers or [])}
|
||||||
|
$OCC config:app:set systemtags allow_user_creating --value="no"
|
||||||
|
|
||||||
|
echo "Applying Theme..."
|
||||||
|
$OCC config:app:set theming url --value="https://${containerCfg.subdomain}.${serverCfg.domain}"
|
||||||
|
${lib.optionalString (containerCfg.extra ? name) ''$OCC config:app:set theming name --value="${containerCfg.extra.name}"''}
|
||||||
|
${lib.optionalString (containerCfg.extra ? slogan) ''$OCC config:app:set theming slogan --value="${containerCfg.extra.slogan}"''}
|
||||||
|
$OCC config:app:set theming background_color --value="${serverCfg.colorScheme.palette.base02}"
|
||||||
|
$OCC config:app:set theming primary_color --value="${serverCfg.colorScheme.palette.base0C}"
|
||||||
|
|
||||||
|
#$OCC theming:config logo {serverCfg.colorScheme.logo}
|
||||||
|
#$OCC theming:config logoheader {serverCfg.colorScheme.logo}
|
||||||
|
#$OCC theming:config background {serverCfg.colorScheme.bg}
|
||||||
|
|
||||||
|
else
|
||||||
|
echo "Nextcloud is already installed. Skipping setup."
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "Maintenance..."
|
||||||
|
$OCC app:update --all
|
||||||
|
$OCC maintenance:repair --include-expensive --no-interaction
|
||||||
|
$OCC db:add-missing-indices --no-interaction
|
||||||
|
|
||||||
|
echo "Completed Setup"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
cron = [ "*/5 * * * * root ${pkgs.podman}/bin/podman --events-backend=none exec -u www-data nextcloud-server php -f /var/www/html/cron.php" ];
|
||||||
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user