Compare commits

...

65 Commits

Author SHA1 Message Date
2a85ad21cb what
Some checks failed
Test Flake / test_flake (push) Failing after 23s
Test Flake / dry_build (push) Failing after 26s
2025-12-19 08:40:24 -07:00
7318c0e094 Merge branch 'main' of https://git.coven.systems/autumn/nixos-conf
Some checks failed
Test Flake / test_flake (push) Failing after 23s
Test Flake / dry_build (push) Failing after 26s
2025-12-19 08:35:52 -07:00
449dc22173 remove swap from rust-motd 2025-12-19 08:34:29 -07:00
723da71a35 weeee
Some checks failed
Test Flake / test_flake (push) Failing after 46s
Test Flake / dry_build (push) Failing after 27s
2025-12-19 08:23:35 -07:00
b5a83638bf s 2025-12-19 08:22:50 -07:00
Dynamic User
a5b4d685b7 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/09de9577d47d8bffb11c449b6a3d24e32ac16c99?narHash=sha256-7Lxp/PfOy4h3QIDtmWG/EgycaswqRSkDX4DGtet14NE%3D' (2025-12-16)
  → 'github:nix-community/home-manager/89c9508bbe9b40d36b3dc206c2483ef176f15173?narHash=sha256-rB45jv4uwC90vM9UZ70plfvY/2Kdygs%2BzlQ07dGQFk4%3D' (2025-12-17)
• Updated input 'lix':
    'fc0073f540.tar.gz?narHash=sha256-clrWX/t2swPGBVs50Yegq2HK3q5bbwOt3kWMsL7JIZM%3D' (2025-12-16)
  → '32d7c02b96.tar.gz?narHash=sha256-avWZpy84s8bdMGsbOjfc4n0LYUqR5H5%2BWj4QmgwsBzg%3D' (2025-12-17)
2025-12-17 16:00:41 -07:00
Dynamic User
61bc144093 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/8315c1544f383b791a3115c9959d1f27920e8320?narHash=sha256-tyNJjd48hfgsyEfsq1Ueufg4oJv6b8xBA6NYRJrLPyg%3D' (2025-12-15)
  → 'github:nix-community/home-manager/09de9577d47d8bffb11c449b6a3d24e32ac16c99?narHash=sha256-7Lxp/PfOy4h3QIDtmWG/EgycaswqRSkDX4DGtet14NE%3D' (2025-12-16)
• Updated input 'lix':
    '70319f1840.tar.gz?narHash=sha256-oLHkfDF0qe2Y93TzR6OyAWYPhh9puKS9oOO0zUKguQY%3D' (2025-12-15)
  → 'fc0073f540.tar.gz?narHash=sha256-clrWX/t2swPGBVs50Yegq2HK3q5bbwOt3kWMsL7JIZM%3D' (2025-12-16)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/82a65dd7eaf97f0169eff1f8d64d8159c5ddcc6a?narHash=sha256-SARM6Cd7qcp8%2BF/Qjyj2ChN6qKuVqXjPX%2BCacv3814o%3D' (2025-12-15)
  → 'github:nix-community/NixOS-WSL/be4af8042e7a61fa12fda58fe9a3b3babdefe17b?narHash=sha256-55V0AJ36V5Egh4kMhWtDh117eE3GOjwq5LhwxDn9eHg%3D' (2025-12-15)
• Updated input 'nixos-wsl/nixpkgs':
    'github:NixOS/nixpkgs/f61125a668a320878494449750330ca58b78c557?narHash=sha256-BmPWzogsG2GsXZtlT%2BMTcAWeDK5hkbGRZTeZNW42fwA%3D' (2025-12-05)
  → 'github:NixOS/nixpkgs/2fbfb1d73d239d2402a8fe03963e37aab15abe8b?narHash=sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0%3D' (2025-12-11)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/2fbfb1d73d239d2402a8fe03963e37aab15abe8b?narHash=sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0%3D' (2025-12-11)
  → 'github:nixos/nixpkgs/1306659b587dc277866c7b69eb97e5f07864d8c4?narHash=sha256-KJ2wa/BLSrTqDjbfyNx70ov/HdgNBCBBSQP3BIzKnv4%3D' (2025-12-15)
2025-12-16 16:01:40 -07:00
Dynamic User
57980742c6 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/58bf3ecb2d0bba7bdf363fc8a6c4d49b4d509d03?narHash=sha256-yeCxFV/905Wr91yKt5zrVvK6O2CVXWRMSrxqlAZnLp0%3D' (2025-12-14)
  → 'github:nix-community/home-manager/8315c1544f383b791a3115c9959d1f27920e8320?narHash=sha256-tyNJjd48hfgsyEfsq1Ueufg4oJv6b8xBA6NYRJrLPyg%3D' (2025-12-15)
• Updated input 'lix':
    '5157fbaf2c.tar.gz?narHash=sha256-8k8nTlmgZ23y4291uI8IwpTjleOURZUdTuB%2BPlLfRq8%3D' (2025-12-14)
  → '70319f1840.tar.gz?narHash=sha256-oLHkfDF0qe2Y93TzR6OyAWYPhh9puKS9oOO0zUKguQY%3D' (2025-12-15)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/b160ef46075d8ddc73f026909282d47c0eabb836?narHash=sha256-dgSPo%2BNeAwcBeP4Un9GT%2BSMsOdLAc0DOLP6cFqoMHK8%3D' (2025-12-13)
  → 'github:nix-community/NixOS-WSL/82a65dd7eaf97f0169eff1f8d64d8159c5ddcc6a?narHash=sha256-SARM6Cd7qcp8%2BF/Qjyj2ChN6qKuVqXjPX%2BCacv3814o%3D' (2025-12-15)
2025-12-15 16:00:59 -07:00
Dynamic User
6c3ee01b9c flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/d787ec69c3216ea33be1c0424fe65cb23aa8fb31?narHash=sha256-KOP4QnkiRwiD5KEOr6ceF67rfTP1OqPmCCft6xDC3k4%3D' (2025-12-13)
  → 'github:nix-community/home-manager/58bf3ecb2d0bba7bdf363fc8a6c4d49b4d509d03?narHash=sha256-yeCxFV/905Wr91yKt5zrVvK6O2CVXWRMSrxqlAZnLp0%3D' (2025-12-14)
• Updated input 'lix':
    '6bf187537a.tar.gz?narHash=sha256-XnxeyyKPAGxgO7nJ1JbeHz5JjLsduE73zWlP/eYvSUA%3D' (2025-12-13)
  → '5157fbaf2c.tar.gz?narHash=sha256-8k8nTlmgZ23y4291uI8IwpTjleOURZUdTuB%2BPlLfRq8%3D' (2025-12-14)
2025-12-14 16:01:15 -07:00
Dynamic User
d176f6a5b2 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/39cb677ed9e908e90478aa9fe5f3383dfc1a63f3?narHash=sha256-HlbvQAqLx7WqZFFQZ8nu5UUJAVlXiV/kqKbyueA8srw%3D' (2025-12-11)
  → 'github:nix-community/home-manager/d787ec69c3216ea33be1c0424fe65cb23aa8fb31?narHash=sha256-KOP4QnkiRwiD5KEOr6ceF67rfTP1OqPmCCft6xDC3k4%3D' (2025-12-13)
• Updated input 'lix':
    'a6f0e59c2c.tar.gz?narHash=sha256-2vsvYj0GNsNaAMg8VDKvEm81sJU5%2B2A7qNnT4GI5%2BjQ%3D' (2025-12-11)
  → '6bf187537a.tar.gz?narHash=sha256-XnxeyyKPAGxgO7nJ1JbeHz5JjLsduE73zWlP/eYvSUA%3D' (2025-12-13)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/0c040f28b44b18e0d4240e027096078e34dbb029?narHash=sha256-w6wznH1lBzlSH3%2BpWDkE%2BL6xA0F02drFAzu2E7PD/Jo%3D' (2025-12-11)
  → 'github:nix-community/NixOS-WSL/b160ef46075d8ddc73f026909282d47c0eabb836?narHash=sha256-dgSPo%2BNeAwcBeP4Un9GT%2BSMsOdLAc0DOLP6cFqoMHK8%3D' (2025-12-13)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/addf7cf5f383a3101ecfba091b98d0a1263dc9b8?narHash=sha256-hM20uyap1a0M9d344I692r%2Bik4gTMyj60cQWO%2BhAYP8%3D' (2025-12-08)
  → 'github:nixos/nixpkgs/2fbfb1d73d239d2402a8fe03963e37aab15abe8b?narHash=sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0%3D' (2025-12-11)
2025-12-13 16:03:50 -07:00
Dynamic User
22fab9f431 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/13cc1efd78b943b98c08d74c9060a5b59bf86921?narHash=sha256-HuWQp8fM25fyWflbuunQkQI62Hg0ecJxWD52FAgmxqY%3D' (2025-12-10)
  → 'github:nix-community/home-manager/39cb677ed9e908e90478aa9fe5f3383dfc1a63f3?narHash=sha256-HlbvQAqLx7WqZFFQZ8nu5UUJAVlXiV/kqKbyueA8srw%3D' (2025-12-11)
• Updated input 'lix':
    '36a61d922c.tar.gz?narHash=sha256-IMbgXXV7%2BzcRIG7GDERX%2B9vNIlgE%2BZs1gI2bfy96EO8%3D' (2025-12-09)
  → 'a6f0e59c2c.tar.gz?narHash=sha256-2vsvYj0GNsNaAMg8VDKvEm81sJU5%2B2A7qNnT4GI5%2BjQ%3D' (2025-12-11)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/30f6a14293df4938c35173a73efdeba450653d0a?narHash=sha256-dsgdFdj8%2Bqh81XPB/9SlwvuhJMHPjqsf7Zk0AnsdVpY%3D' (2025-12-10)
  → 'github:nix-community/NixOS-WSL/0c040f28b44b18e0d4240e027096078e34dbb029?narHash=sha256-w6wznH1lBzlSH3%2BpWDkE%2BL6xA0F02drFAzu2E7PD/Jo%3D' (2025-12-11)
2025-12-11 16:02:21 -07:00
Dynamic User
d8fce003c9 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/e5b1f87841810fc24772bf4389f9793702000c9b?narHash=sha256-BVVyAodLcAD8KOtR3yCStBHSE0WAH/xQWH9f0qsxbmk%3D' (2025-12-08)
  → 'github:nix-community/home-manager/13cc1efd78b943b98c08d74c9060a5b59bf86921?narHash=sha256-HuWQp8fM25fyWflbuunQkQI62Hg0ecJxWD52FAgmxqY%3D' (2025-12-10)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/a16b061ec61831755df35fae916d19b0ac5a43cc?narHash=sha256-d3b3eQsdgXZDW/y4fmDuNiGBjZzwFrLhwD5i3NmM1mM%3D' (2025-12-08)
  → 'github:nix-community/NixOS-WSL/30f6a14293df4938c35173a73efdeba450653d0a?narHash=sha256-dsgdFdj8%2Bqh81XPB/9SlwvuhJMHPjqsf7Zk0AnsdVpY%3D' (2025-12-10)
2025-12-10 16:00:38 -07:00
Dynamic User
286288a41e flake.lock: Update
Flake lock file updates:

• Updated input 'lix':
    'b2bcd99d59.tar.gz?narHash=sha256-sAT2Fny4MxhJACzxlv4T001hcUmlXv4abnylM4somj8%3D' (2025-12-08)
  → '36a61d922c.tar.gz?narHash=sha256-IMbgXXV7%2BzcRIG7GDERX%2B9vNIlgE%2BZs1gI2bfy96EO8%3D' (2025-12-09)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/f61125a668a320878494449750330ca58b78c557?narHash=sha256-BmPWzogsG2GsXZtlT%2BMTcAWeDK5hkbGRZTeZNW42fwA%3D' (2025-12-05)
  → 'github:nixos/nixpkgs/addf7cf5f383a3101ecfba091b98d0a1263dc9b8?narHash=sha256-hM20uyap1a0M9d344I692r%2Bik4gTMyj60cQWO%2BhAYP8%3D' (2025-12-08)
2025-12-09 16:03:15 -07:00
Dynamic User
a19519b292 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/ff067cfc619fdf6f82d50344e7d19ff2323f0827?narHash=sha256-S41K55kw%2BhWgDfgKmZ9/fMZ3F0BQDMvqFfE120fMHeE%3D' (2025-12-02)
  → 'github:nix-community/home-manager/e5b1f87841810fc24772bf4389f9793702000c9b?narHash=sha256-BVVyAodLcAD8KOtR3yCStBHSE0WAH/xQWH9f0qsxbmk%3D' (2025-12-08)
• Updated input 'lix':
    '716a885def.tar.gz?narHash=sha256-QFnWVaNNEhM9Q5RP52yj2zeB1mUfKVY96IFegnWLH94%3D&rev=716a885def4eadc4a031a931eea1e8dc135341ad' (2025-12-02)
  → 'b2bcd99d59.tar.gz?narHash=sha256-sAT2Fny4MxhJACzxlv4T001hcUmlXv4abnylM4somj8%3D' (2025-12-08)
• Updated input 'lix-module':
    '6c95c0b6f7.tar.gz?narHash=sha256-XnNABKfIYKSimQVvKc9FnlC2H0LurOhd9MS6l0Z67lE%3D&rev=6c95c0b6f73f831226453fc6905c216ab634c30f' (2025-11-30)
  → '6c95c0b6f7.tar.gz?narHash=sha256-XnNABKfIYKSimQVvKc9FnlC2H0LurOhd9MS6l0Z67lE%3D' (2025-11-30)
• Updated input 'nixos-wsl':
    'github:nix-community/NixOS-WSL/84d1dab290feb4865d0cfcffc7aa0cf9bc65c3b7?narHash=sha256-T/HMA0Bb/O6UnlGQ0Xt%2BwGe1j8m7eyyQ5%2BvVcCJslsM%3D' (2025-12-01)
  → 'github:nix-community/NixOS-WSL/a16b061ec61831755df35fae916d19b0ac5a43cc?narHash=sha256-d3b3eQsdgXZDW/y4fmDuNiGBjZzwFrLhwD5i3NmM1mM%3D' (2025-12-08)
• Updated input 'nixos-wsl/flake-compat':
    'github:edolstra/flake-compat/f387cd2afec9419c8ee37694406ca490c3f34ee5?narHash=sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4%3D' (2025-10-27)
  → 'github:edolstra/flake-compat/65f23138d8d09a92e30f1e5c87611b23ef451bf3?narHash=sha256-4VBOP18BFeiPkyhy9o4ssBNQEvfvv1kXkasAYd0%2BrrA%3D' (2025-12-07)
• Updated input 'nixos-wsl/nixpkgs':
    'github:NixOS/nixpkgs/2d293cbfa5a793b4c50d17c05ef9e385b90edf6c?narHash=sha256-pp3uT4hHijIC8JUK5MEqeAWmParJrgBVzHLNfJDZxg4%3D' (2025-11-30)
  → 'github:NixOS/nixpkgs/f61125a668a320878494449750330ca58b78c557?narHash=sha256-BmPWzogsG2GsXZtlT%2BMTcAWeDK5hkbGRZTeZNW42fwA%3D' (2025-12-05)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/2d293cbfa5a793b4c50d17c05ef9e385b90edf6c?narHash=sha256-pp3uT4hHijIC8JUK5MEqeAWmParJrgBVzHLNfJDZxg4%3D' (2025-11-30)
  → 'github:nixos/nixpkgs/f61125a668a320878494449750330ca58b78c557?narHash=sha256-BmPWzogsG2GsXZtlT%2BMTcAWeDK5hkbGRZTeZNW42fwA%3D' (2025-12-05)
2025-12-08 16:00:34 -07:00
210768d538 fixing mealie via compose2nix 2025-12-08 12:46:15 -07:00
0f8348d3fe add mullvad
Some checks failed
Test Flake / test_flake (push) Failing after 24s
Test Flake / dry_build (push) Failing after 25s
Update Flake / update_flake (push) Successful in 8s
2025-12-08 08:31:59 -07:00
f85dafd5a8 resync
Some checks failed
Test Flake / test_flake (push) Failing after 28s
Test Flake / dry_build (push) Failing after 26s
2025-12-08 08:29:02 -07:00
e30ccf72e6 Merge pull request 'gitactions' (#6) from gitactions into main
Some checks failed
Test Flake / test_flake (push) Failing after 4s
Test Flake / dry_build (push) Failing after 9s
Reviewed-on: #6
Reviewed-by: autumn <autumnal.musing@gmail.com>
2025-12-08 08:24:47 -07:00
28de659218 Merge pull request 'Adding home-manager stanzas for my systems' (#5) from lilysystems into main
Reviewed-on: #5
Reviewed-by: autumn <autumnal.musing@gmail.com>
2025-12-08 08:24:08 -07:00
Lily Miller
b4923858d2 added testing actions 2025-12-03 14:53:13 -07:00
Lily Miller
28ab585a34 Adding home-manager stanzas for my systems 2025-12-03 14:48:18 -07:00
e6a91a0d49 upgrade to latest kernel 2025-12-02 11:09:10 -07:00
df5d85cc43 smaller change 2025-12-02 11:01:47 -07:00
73ac52a1f7 small edit 2025-12-02 10:45:58 -07:00
ddc1563ef2 syncing species 2025-12-02 10:41:37 -07:00
a14f1da387 Merge branch 'main' of https://git.coven.systems/autumn/nixos-conf 2025-12-02 10:40:21 -07:00
bc4ee5be49 sync server species 2025-12-02 10:39:49 -07:00
65242cd03a add polkit and attempt to autostart swaybg in niri 2025-12-02 08:48:55 -07:00
1beb97c222 add niri 2025-11-25 16:50:47 -07:00
e0d803ff20 small fix 2025-11-23 10:24:49 -07:00
4c1dcec61b add hoardfrost 2025-10-27 13:09:00 -06:00
eb1283157a but actually this time 2 2025-10-12 11:47:37 -06:00
6b4488cf8d distrobox init 2025-10-12 11:43:09 -06:00
Lily Miller
9404428af6 bump 2025-10-11 15:00:59 -06:00
34ab90a16c actually add hydra? 2025-10-11 13:16:57 -06:00
66c15c5574 didnt fuck it 2025-10-11 12:32:45 -06:00
73ff35996b new merge 2025-10-11 12:32:09 -06:00
752fdc02d5 Merge pull request 'add hydrajobs' (#4) from hydrajobs into main
Reviewed-on: #4
2025-10-11 10:59:09 -06:00
aa9289161e add hydrajobs 2025-10-11 10:53:38 -06:00
69fa2b5c9e actually adding currents 2025-10-09 18:15:22 -06:00
23cc978729 add currents 2025-10-09 18:13:27 -06:00
5f340a4b0d u 2025-10-09 18:06:53 -06:00
bb466db985 currents config 2025-10-09 18:06:11 -06:00
8f7fa94a17 w 2025-10-09 23:39:47 +00:00
93cf3e672d restructuring avizo configuration 2025-10-09 09:49:26 -06:00
17b9678ed4 moving bundles to a more reasonable place 2025-10-08 20:52:50 -06:00
d0901ac304 ieh 2025-10-07 16:57:57 -06:00
10ecc8b7e1 beh 2025-09-30 12:12:21 -06:00
52bbf04d18 weh 2025-09-30 10:10:29 -06:00
4652006f3f cargo.lock out of .gitignore 2025-09-30 09:56:27 -06:00
725c13a6b6 custom weather notifier 2025-09-30 09:50:05 -06:00
3ed4ccca9e mako 2025-09-29 20:53:10 -06:00
dd0f88ee53 spotify 2025-09-29 14:55:34 -06:00
f16cd8ccd7 adding automatic flatpak management 2025-09-29 14:22:57 -06:00
14d9fc775d rm flake.lock 2025-09-28 01:21:54 -06:00
c36a17f50c genuinely dont remember 2025-09-28 01:18:52 -06:00
f955772781 yes 2025-09-26 16:35:07 -06:00
a5ab78db3d what 2025-09-24 22:52:44 -06:00
1d6ac4d930 wsl stuff 2025-09-24 15:54:47 +00:00
0050624f26 rename /home-manager/ to /home/ 2025-09-22 13:46:06 -06:00
f320176ae2 testing 2025-09-22 13:32:49 -06:00
7eb6dd5d08 adding themefile subdir 2025-09-22 13:29:25 -06:00
11c04eb724 Merge pull request 'fix' (#2) from fix into main
Reviewed-on: #2
2025-09-21 20:23:50 -06:00
5317363787 bleh 2025-09-21 20:22:22 -06:00
33e6960112 stuff 2025-09-21 20:18:56 -06:00
57 changed files with 2146 additions and 378 deletions

View File

@@ -0,0 +1,31 @@
name: Test Flake
on:
workflow_dispatch:
push:
branches:
- main
jobs:
test_flake:
runs-on: nixos
steps:
- name: Checkout Code
uses: actions/checkout@v5
- name: check nixos flake
run: /run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes flake check --all-systems --verbose
- name: check home-manager flake
run: "/run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes eval .#homeConfigurations --apply 'builtins.mapAttrs (_n: v: v.activationPackage.drvPath)' --verbose"
dry_build:
runs-on: nixos
steps:
- name: Checkout Code
uses: actions/checkout@v5
- name: Test Build
run: |
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#yukigekko
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#lesbos
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#wsl-hive
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#hoardfrost

View File

@@ -0,0 +1,26 @@
name: Update Flake
on:
workflow_dispatch:
schedule:
- cron: '0 23 * * *'
jobs:
update_flake:
runs-on: nixos
steps:
- name: Prevent re-runs
run: |
if [ "$GITHUB_RUN_ATTEMPT" -gt 1 ]; then
echo "No re-runs for you. Go away."
exit 1
else
echo "not a re-run"
fi
- name: Checkout Code
uses: actions/checkout@v4
- name: Update Flake
run: /run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes flake update --refresh --commit-lock-file --verbose
- name: Push Changes
run: git push

1
.gitignore vendored
View File

@@ -1,3 +1,2 @@
*.lock
.envrc .envrc

View File

@@ -0,0 +1,10 @@
{config, pkgs, ...}:
{
programs.distrobox.containers.archlinux = {
additional_packages = "helix zsh git";
image = "archlinux:latest";
nvidia = false;
init = false;
pull = true;
};
}

259
flake.lock generated Normal file
View File

@@ -0,0 +1,259 @@
{
"nodes": {
"currents": {
"inputs": {
"home-manager": "home-manager",
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1760073801,
"narHash": "sha256-bvU0yFi8sqSKYEaLPVl7ayLl6xbpJ6CzSxxGw1GCqF8=",
"owner": "autumnalmusing",
"repo": "currents",
"rev": "932d6ea3ec21fcc25b7f5edf938aec98df879fb1",
"type": "github"
},
"original": {
"owner": "autumnalmusing",
"ref": "main",
"repo": "currents",
"type": "github"
}
},
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1765121682,
"narHash": "sha256-4VBOP18BFeiPkyhy9o4ssBNQEvfvv1kXkasAYd0+rrA=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "65f23138d8d09a92e30f1e5c87611b23ef451bf3",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flakey-profile": {
"locked": {
"lastModified": 1712898590,
"narHash": "sha256-FhGIEU93VHAChKEXx905TSiPZKga69bWl1VB37FK//I=",
"owner": "lf-",
"repo": "flakey-profile",
"rev": "243c903fd8eadc0f63d205665a92d4df91d42d9d",
"type": "github"
},
"original": {
"owner": "lf-",
"repo": "flakey-profile",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1760061988,
"narHash": "sha256-CeuMo7fjWm3XaoK+b1PGyaVIlE1GHudoxk9jrJFvfbY=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "c7f4214faca2f196c551b767c12a70bfa0614510",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"home-manager_2": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1765980955,
"narHash": "sha256-rB45jv4uwC90vM9UZ70plfvY/2Kdygs+zlQ07dGQFk4=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "89c9508bbe9b40d36b3dc206c2483ef176f15173",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"lix": {
"flake": false,
"locked": {
"lastModified": 1766001599,
"narHash": "sha256-avWZpy84s8bdMGsbOjfc4n0LYUqR5H5+Wj4QmgwsBzg=",
"rev": "32d7c02b96259d05f50a482c2b7e55d59a70294c",
"type": "tarball",
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/32d7c02b96259d05f50a482c2b7e55d59a70294c.tar.gz"
},
"original": {
"type": "tarball",
"url": "https://git.lix.systems/lix-project/lix/archive/main.tar.gz"
}
},
"lix-module": {
"inputs": {
"flake-utils": "flake-utils",
"flakey-profile": "flakey-profile",
"lix": [
"lix"
],
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1764519849,
"narHash": "sha256-XnNABKfIYKSimQVvKc9FnlC2H0LurOhd9MS6l0Z67lE=",
"rev": "6c95c0b6f73f831226453fc6905c216ab634c30f",
"type": "tarball",
"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/6c95c0b6f73f831226453fc6905c216ab634c30f.tar.gz"
},
"original": {
"type": "tarball",
"url": "https://git.lix.systems/lix-project/nixos-module/archive/main.tar.gz"
}
},
"nixos-wsl": {
"inputs": {
"flake-compat": "flake-compat",
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1765841014,
"narHash": "sha256-55V0AJ36V5Egh4kMhWtDh117eE3GOjwq5LhwxDn9eHg=",
"owner": "nix-community",
"repo": "NixOS-WSL",
"rev": "be4af8042e7a61fa12fda58fe9a3b3babdefe17b",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "main",
"repo": "NixOS-WSL",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1759831965,
"narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "c9b6fb798541223bbb396d287d16f43520250518",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1759831965,
"narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "c9b6fb798541223bbb396d287d16f43520250518",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1765472234,
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1765779637,
"narHash": "sha256-KJ2wa/BLSrTqDjbfyNx70ov/HdgNBCBBSQP3BIzKnv4=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "1306659b587dc277866c7b69eb97e5f07864d8c4",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"currents": "currents",
"home-manager": "home-manager_2",
"lix": "lix",
"lix-module": "lix-module",
"nixos-wsl": "nixos-wsl",
"nixpkgs": "nixpkgs_4"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
}
},
"root": "root",
"version": 7
}

View File

@@ -3,8 +3,11 @@
description = "Autumn's multi-system configs"; description = "Autumn's multi-system configs";
inputs = { inputs = {
pydev.url ="./system/extras/pydev/"; #dev stuff
nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-unstable"; # pydev.url ="./system/extras/pydev/";
currents.url = "github:autumnalmusing/currents/main";
#regular flakes
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
lix.url = "https://git.lix.systems/lix-project/lix/archive/main.tar.gz"; lix.url = "https://git.lix.systems/lix-project/lix/archive/main.tar.gz";
lix.flake = false; lix.flake = false;
lix-module = { lix-module = {
@@ -23,7 +26,8 @@
lix-module, lix-module,
lix, lix,
home-manager, home-manager,
pydev, # pydev,
currents,
nixos-wsl, nixos-wsl,
... ...
}@inputs: }@inputs:
@@ -45,24 +49,47 @@
extraSpecialArgs = specialArgs; extraSpecialArgs = specialArgs;
pkgs = pkgs; pkgs = pkgs;
modules = [ modules = [
./home-manager/autumn/home.nix ./home/autumn/home.nix
./home-manager/autumn/sysconfs/yukigekko.nix ./home/autumn/sysconfs/yukigekko.nix
]; ];
}; };
"autumn@lesbos" = home-manager.lib.homeManagerConfiguration{ "autumn@lesbos" = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs; extraSpecialArgs = specialArgs;
pkgs = pkgs; pkgs = pkgs;
modules = [ modules = [
./home-manager/autumn/home.nix ./home/autumn/home.nix
# ./home-manager/autumn/sysconfs/lesbos.nix ./home-manager/autumn/sysconfs/lesbos.nix
]; ];
}; };
"autumn@wsl-hive" = home-manager.lib.homeManagerConfiguration{ "autumn@wsl-hive" = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs; extraSpecialArgs = specialArgs;
pkgs = pkgs; pkgs = pkgs;
modules = [ modules = [
./home-manager/autumn/home.nix ./home/autumn/home.nix
./home-manager/autumn/sysconfs/wsl-hive.nix ./home/autumn/sysconfs/wsl-hive.nix
];
};
"autumn@hoardfrost" = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs;
pkgs = pkgs;
modules = [
./home/autumn/sysconfs/hoardfrost.nix
];
};
"autumn@rhiannon" = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs;
pkgs = pkgs;
modules = [
./home/autumn/home.nix
./home/autumn/sysconfs/yukigekko.nix
];
};
"autumn@macha" = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs;
pkgs = pkgs;
modules = [
./home/autumn/home.nix
./home/autumn/sysconfs/lesbos.nix
]; ];
}; };
}; };
@@ -82,6 +109,13 @@
./system/lesbos/configuration.nix ./system/lesbos/configuration.nix
]; ];
}; };
"hoardfrost" = nixpkgs.lib.nixosSystem{
system = system;
specialArgs = specialArgs;
modules = [
./system/hoardfrost/configuration.nix
];
};
"wsl-hive" = nixpkgs.lib.nixosSystem{ "wsl-hive" = nixpkgs.lib.nixosSystem{
specialArgs = specialArgs; specialArgs = specialArgs;
system = system; system = system;
@@ -90,5 +124,17 @@
]; ];
}; };
}; };
hydraJobs = {
nixos = {
yukigekko = self.nixosConfigurations.yukigekko.config.system.build.toplevel;
lesbos = self.nixosConfigurations.lesbos.config.system.build.toplevel;
wsl-hive = self.nixosConfigurations.wsl-hive.config.system.build.toplevel;
};
homes = {
"autumn@yukigekko" = self.homeConfigurations."autumn@yukigekko".activationPackage;
"autumn@lesbos" = self.homeConfigurations."autumn@lesbos".activationPackage;
"autumn@wsl-hive" = self.homeConfigurations."autumn@wsl-hive".activationPackage;
};
};
}; };
} }

View File

@@ -1,4 +1,4 @@
{ config, pkgs, ... }: { config, pkgs, inputs, ... }:
{ {
home = { home = {
@@ -6,7 +6,6 @@
homeDirectory = "/home/autumn"; homeDirectory = "/home/autumn";
stateVersion = "25.11"; stateVersion = "25.11";
packages = with pkgs; [ packages = with pkgs; [
eza
fm fm
felix felix
gnumake gnumake
@@ -26,27 +25,33 @@
htop.enable = true; htop.enable = true;
pls = { pls = {
enable = true; enable = true;
enableFishIntegration = true; enableZshIntegration = true;
}; };
}; };
nixpkgs.config = { nixpkgs.config = {
alowUnfree = true; alowUnfree = true;
allowUnfreePredicate = (_: true); allowUnfreePredicate = (_: true);
}; };
# wayland.windowManager.river.enable = true;
imports = [ imports = [
## Themeing
# cursor theme
../themefiles/cursor.nix
# packages with further configuration # packages with further configuration
../packages/alacritty/alacritty.nix ../packages/alacritty/alacritty.nix
../packages/crawl/crawl.nix ../packages/crawl/crawl.nix
../packages/direnv/direnv.nix ../packages/direnv/direnv.nix
../packages/git/git.nix ../packages/git/git.nix
../packages/helix/helix.nix ../packages/helix/helix.nix
../packages/spotifyd/spotifyd.nix
../packages/starship/starship.nix ../packages/starship/starship.nix
../packages/thunderbird/thunderbird.nix ../packages/thunderbird/thunderbird.nix
../packages/zoxide/zoxide.nix ../packages/zoxide/zoxide.nix
# ../packages/zsh/zsh.nix ../packages/zsh/zsh.nix
# package bundles # package bundles
./bundles/langs.nix ../bundles/langs.nix
]; ];
} }

View File

@@ -0,0 +1,66 @@
{config, pkgs, ...}:
{
home = {
username = "autumn";
homeDirectory = "/home/autumn";
stateVersion = "25.11";
packages = with pkgs; [
htop
gnumake
neofetch
oh-my-zsh
];
};
xdg.configFile."starship.toml".source = ../../packages/starship/starship.toml;
xdg.configFile."rust-motd/rust-motd.kdl".source = ../../packages/rust-motd/rust-motd.kdl;
# programs.bash.initExtra = [
# "zsh"
# "starship init zsh"
# ];
programs.starship.enable = true;
programs.starship.enableZshIntegration = true;
programs.git = {
enable = true;
userEmail = "autumnal.musing@gmail.com";
userName = "autumn";
};
programs.zsh = {
enable = true;
antidote = {
enable = true;
plugins = [
"zsh-users/zsh-autosuggestions"
"zsh-users/zsh-syntax-highlighting"
];
useFriendlyNames = true;
};
autosuggestion = {
enable = true;
};
shellAliases = {
".." = "cd ..";
"..." = "cd ../..";
"...." = "cd ../../..";
"pls" = "pls -d typ -d perm -d user -d group -d size -d mtime -d git";
"z" = "zoxide";
};
sessionVariables ={
SERVDIR = "/srv/samba/hoardfrost/mainstore";
};
oh-my-zsh = {
enable = true;
plugins = [
"git"
"sudo"
"colored-man-pages"
"colorize"
"cp"
# "zoxide"
# "ssh-agent"
"command-not-found"
];
};
};
}

View File

@@ -1,7 +1,7 @@
{config, pkgs, ...}: {config, pkgs, ...}:
{ {
programs.bash.initExtra= ''zsh''; # home.shell = pkgs.zsh;
imports = [ imports = [
../../packages/zsh/zsh.nix ../../packages/zsh/zsh.nix
../../packages/zellij/zellij.nix ../../packages/zellij/zellij.nix

View File

@@ -1,23 +1,27 @@
{config, pkgs, ...}: {config, pkgs, inputs, ...}:
{ {
home.packags = with pkgs; [ home.packages = with pkgs; [
obsidian obsidian
vscodium-fhs vscodium-fhs
vesktop vesktop
cursor-cli
distrobox
]; ];
programs.bash.initExtra= ''fish'';
home.file = {
"config.ini" = {
enable = true;
source = ../packages/avizo/config.ini;
target = ".config/avizo/config.ini";
};
};
imports = [ imports = [
../../packages/fish/fish.nix # ../../packages/fish/fish.nix
../../packages/currents/currents.nix
../../packages/river/river.nix ../../packages/river/river.nix
../../packages/waybar/waybar.nix ../../packages/waybar/waybar.nix
../../packages/twmn/twmn.nix # ../../packages/twmn/twmn.nix
../../packages/mako/mako.nix
../../packages/fuzzel/fuzzel.nix ../../packages/fuzzel/fuzzel.nix
../../packages/avizo/avizo.nix
../../packages/niri/niri.nix
# Distrobox containers
# ../../boxes/archlinux/box-archlinux.nix
inputs.currents.homeManagerModules.currents
]; ];
services.currents.enable = true;
} }

View File

@@ -2,7 +2,8 @@
{ {
home.packages = with pkgs; [ home.packages = with pkgs; [
ccls # ccls
cmake
docker-language-server docker-language-server
ember-cli ember-cli
ember-language-server ember-language-server
@@ -10,14 +11,17 @@
gcc gcc
libgcc libgcc
gleam gleam
glib
kdlfmt kdlfmt
lessc lessc
meson
nil nil
nim-2_0 nim-2_0
nimlangserver nimlangserver
odin odin
ols ols
# python314 # python314
pkg-config
python313 python313
ruby ruby
rubyPackages_3_4.solargraph rubyPackages_3_4.solargraph

View File

@@ -4,7 +4,6 @@
programs.alacritty = { programs.alacritty = {
enable = true; enable = true;
theme = "everforest_dark";
settings = { settings = {
font = { font = {
italic = { italic = {
@@ -17,10 +16,38 @@
}; };
}; };
window = { window = {
opacity = 0.9;
blur = true;
padding = {x=0;y=15;}; padding = {x=0;y=15;};
}; };
colors = {
primary = {
background = "#2b3339";
foreground = "#d3c6aa";
};
cursor = {
text = "#2b3339";
cursor = "#d3c6aa";
};
normal = {
black = "#323c41";
red = "#e67e80";
green = "#a7c080";
yellow = "#dbbc7f";
blue = "#7fbbb3";
magenta = "#d699b6";
cyan = "#83c092";
white = "#d3c6aa";
};
bright = {
black = "#445055";
red = "#e67e80";
green = "#a7c080";
yellow = "#dbbc7f";
blue = "#7fbbb3";
magenta = "#d699b6";
cyan = "#83c092";
white = "#9da9a0";
};
};
}; };
}; };
} }

View File

@@ -0,0 +1,11 @@
{config, pkgs, ...}:
{
services.avizo.enable = true;
home.file = {
"config.ini" = {
enable = true;
source = ../../packages/avizo/config.ini;
target = ".config/avizo/config.ini";
};
};
}

View File

@@ -0,0 +1,34 @@
{config, pkgs, inputs, ...}:
{
services.currents = {
enable = true;
package = inputs.currents.packages.${pkgs.system}.currents-full;
weather = {
apiKey = "16722031ac8d5ec075344893fcbd41af";
location = "Denver, US";
units = "imperial";
provider = "openweathermap";
apiDailyLimit = 1000;
};
notifications = {
urgency = "normal";
sound = false;
};
polling = {
intervalSeconds = 300;
retryAttempts = 3;
retryDelaySeconds = 60;
};
forecastHighlights = {
temperature = {
high = 80.0;
highColor = "red";
low = 45.0;
lowColor = "cyan";
};
# humidity = {
# };
};
};
}

View File

@@ -8,7 +8,7 @@
dracula_trans = ./dracula_trans.toml; dracula_trans = ./dracula_trans.toml;
}; };
settings = { settings = {
theme = "everforest_dark_trans"; theme = "everforest_dark";
editor = { editor = {
mouse = true; mouse = true;
middle-click-paste = true; middle-click-paste = true;

View File

@@ -0,0 +1,19 @@
{ config, pkgs, ... }:
{
services.mako = {
enable = true;
settings = {
anchor = "top-center";
actions = true;
sort = "-time";
border-size = 3;
border-color = "#7fbbb3";
background-color = "#2b3339";
"urgency=low".border-color = "#a7c080";
"urgency=normal".border-color = "#7fbbb3";
"urgency=high".border-color = "#e67e80";
};
};
}

123
home/packages/niri/niri.kdl Normal file
View File

@@ -0,0 +1,123 @@
input {
keyboard {
xkb {
layout "us"
}
}
touchpad {
tap
accel-speed 0.0
scroll-method "two-finger"
middle-emulation
drag true
tap-button-map "left-right-middle"
disabled-on-external-mouse
}
focus-follows-mouse max-scroll-amount="60%"
}
layout {
gaps 10
center-focused-column "on-overflow"
preset-column-widths {
proportion 0.3333333
proportion 0.5
proportion 0.6666667
proportion 1.0
}
preset-window-heights{
proportion 1.0
proportion 0.75
proportion 0.5
proportion 0.25
}
default-column-width { proportion 0.6666667; }
focus-ring { off; }
border {
width 4
active-color "#7fbbb3"
inactive-color "#d3c6aa"
urgent-color "#e67e80"
}
}
window-rule {
geometry-corner-radius 8
clip-to-geometry true
}
window-rule{
match app-id="Alacritty"
match is-focused=true
opacity 0.95
}
// spawn-at-startup "waybar"
spawn-at-startup "swaybg" "-i" "~/Downloads/wp.jpg"
spawn-at-startup "avizo-service"
binds {
//spawn binds
Super+Shift+Slash {show-hotkey-overlay;}
Super+Return hotkey-overlay-title="Alacritty" {spawn "alacritty";}
Super+R hotkey-overlay-title="Fuzzel" {spawn "fuzzel";}
Super+E hotkey-overlay-title="File Manager" {spawn "pcmanfm";}
Super+B hotkey-overlay-title="Obsidian" {spawn "obsidian";}
Super+Escape hotkey-overlay-title="Lock" {spawn "swaylock --screenshots --clock --indicator --indicator-radius 250 --indicator-thickness 12 --effect-blur 7x5 --ring-color 7fbbb3 --line-color d3c6aa --inside-color 2b3339 --separator-color 83c092";}
Super+Shift+E hotkey-overlay-title="Quit" {quit;}
Super+Q hotkey-overlay-title="Close" {close-window;}
Super+O hotkey-overlay-title="Toggle Overview" {toggle-overview;}
Super+KP_Subtract {spawn "swaybg" "-i" "~/Downloads/wp.jpg";}
Super+H {focus-column-left;}
Super+J {focus-window-down;}
Super+K {focus-window-up;}
Super+L {focus-column-right;}
Super+Left {focus-column-left;}
Super+Down {focus-window-down;}
Super+Up {focus-window-up;}
Super+Right {focus-column-right;}
Super+Shift+H {move-column-left;}
Super+Shift+J {move-window-down;}
Super+Shift+K {move-window-up;}
Super+Shift+L {move-column-right;}
Super+Shift+Left {move-column-left;}
Super+Shift+Down {move-window-down;}
Super+Shift+Up {move-window-up;}
Super+Shift+Right {move-column-right;}
Super+Home {focus-column-first;}
Super+End {focus-column-last;}
Super+1 {focus-workspace 1;}
Super+2 {focus-workspace 2;}
Super+3 {focus-workspace 3;}
Super+4 {focus-workspace 4;}
Super+5 {focus-workspace 5;}
Super+6 {focus-workspace 6;}
Super+7 {focus-workspace 7;}
Super+8 {focus-workspace 8;}
Super+9 {focus-workspace 9;}
// Super+10 {focus-workspace 10;}
Super+Shift+1 {move-column-to-workspace 1;}
Super+Shift+2 {move-column-to-workspace 2;}
Super+Shift+3 {move-column-to-workspace 3;}
Super+Shift+4 {move-column-to-workspace 4;}
Super+Shift+5 {move-column-to-workspace 5;}
Super+Shift+6 {move-column-to-workspace 6;}
Super+Shift+7 {move-column-to-workspace 7;}
Super+Shift+8 {move-column-to-workspace 8;}
Super+Shift+9 {move-column-to-workspace 9;}
Super+BracketLeft {consume-or-expel-window-left;}
Super+BracketRight {consume-or-expel-window-right;}
Super+Comma {consume-window-into-column;}
Super+Period {expel-window-from-column;}
Super+A {switch-preset-column-width;}
Super+Shift+A {switch-preset-window-height;}
Super+F {maximize-column;}
Super+Shift+F {fullscreen-window;}
Super+V {toggle-window-floating;}
Super+W {toggle-column-tabbed-display;}
Super+Page_Down {focus-workspace-down;}
Super+Page_Up {focus-workspace-up;}
Super+Shift+Page_Down{move-column-to-workspace-down;}
Super+Shift+Page_Up{move-column-to-workspace-up;}
XF86AudioRaiseVolume {spawn "volumectl" "-d" "-u" "up";}
XF86AudioLowerVolume {spawn "volumectl" "-d" "-u" "down";}
XF86AudioMute {spawn "volumectl" "-d" "toggle-mute";}
XF86MonBrightnessUp {spawn "lightctl" "-d" "up";}
XF86MonBrightnessDown {spawn "lightctl" "-d" "down";}
}

View File

@@ -0,0 +1,6 @@
{ config, pkgs, ... }:
{
xdg.configFile."niri/config.kdl".source = ./niri.kdl;
}

View File

@@ -10,6 +10,7 @@ in
home.packages = with pkgs; [ home.packages = with pkgs; [
wideriver wideriver
swaybg
]; ];
@@ -31,14 +32,20 @@ in
"~/login-wm-setup-2.sh" "~/login-wm-setup-2.sh"
]; ];
output-layout = "wideriver"; output-layout = "wideriver";
rule-add = "ssd"; rule-add = {
"-app-id" = {
"'twmnd'" = {
float = true;
};
};
};
border-color-urgent = "0xe67e80"; border-color-urgent = "0xe67e80";
map = { map = {
normal = { normal = {
# spawn binds # spawn binds
"Super Return" = "spawn alacritty"; "Super Return" = "spawn alacritty";
"Super R" = "spawn fuzzel"; "Super R" = "spawn fuzzel";
"Super E" = "spawn fm"; "Super E" = "spawn pcmanfm";
"Super B" = "spawn obsidian"; "Super B" = "spawn obsidian";
"Super Escape" = "spawn \"swaylock --screenshots --clock --indicator --indicator-radius 250 --indicator-thickness 12 --effect-blur 7x5 --ring-color 7fbbb3 --line-color d3c6aa --inside-color 2b3339 --separator-color 83c092\""; "Super Escape" = "spawn \"swaylock --screenshots --clock --indicator --indicator-radius 250 --indicator-thickness 12 --effect-blur 7x5 --ring-color 7fbbb3 --line-color d3c6aa --inside-color 2b3339 --separator-color 83c092\"";

View File

@@ -0,0 +1,28 @@
global {
version "1.0"
}
components{
command color="blue" "hostname | figlet -f sblood"
weather loc="Denver" style="full"
service-status{
service display-name="samba" unit="samba-wsdd.service"
service display-name="openssh" unit="sshd.service"
service display-name="mealie" unit="podman-mealie.service"
service display-name="mealiedb" unit="podman-postgres.service"
service display-name="stirling" unit="podman-stirling-pdf.service"
service display-name="tbrowser" unit="podman-torrent-browser.service"
service display-name="seas" unit="podman-trainsmission-openvpn.service"
service display-name="tailscale" unit="tailscaled.service"
service display-name="firewall" unit="firewall.service"
service display-name="endlessh" unit="endlessh.service"
}
uptime prefix="up"
memory swap-pos="beside"
last-login {
user username="marcel" num-logins=2
}
filesystems {
filesystem name="root" mount-point="/"
}
load-avg format="Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}"
}

View File

@@ -0,0 +1,16 @@
{config, pkgs, ...}:
{
services.spotifyd = {
enable = true;
settings = {
global = {
device_name = "yukigekko";
volume_controller = "volumectl";
backend = "pipe";
device_type = "computer";
use_mpris = true;
disable_discovery = true;
};
};
};
}

View File

@@ -2,45 +2,50 @@ add_newline = false
format = """ format = """
[█](#D52D00)\ [█](#E67380)\
$username\ $username\
[](bg:#EF7627 fg:#D52D00)\ [](bg:#E69875 fg:#E67380)\
$directory\ $directory\
[](fg:#EF7627 bg:#FF9A56)\ [](fg:#E69875 bg:#DBBC7F)\
$git_branch\ $git_branch\
$git_status\ $git_status\
[](fg:#FF9A56 bg:#D162A4)\ [](fg:#DBBC7F bg:#a7c080 )\
$c\ $c\
$python\ $python\
$elixir\ $elixir\
$elm\ $elm\
$gleam\
$golang\ $golang\
$haskell\ $haskell\
$java\ $java\
$julia\ $julia\
$nodejs\ $nodejs\
$nim\ $nim\
$odin\
$rust\ $rust\
$scala\
$zig\ $zig\
[](fg:#D162A4 bg:#B55690)\ [](fg:#a7c080 bg:#83c092)\
$docker_context\ $docker_context\
[](fg:#B55690 bg:#A30262)\ [](fg:#83c092 bg:#7fbbb3)\
$time\ $time\
[](fg:#A30262)\ [](fg:#7fbbb3 bg:#d699B6)\
$direnv\
[ ](fg:#d699B6)\
\n\ \n\
$status\ $status\
$cmd_duration\ $cmd_duration\
[ ](fg:#d52d00) [ ](fg:#E67380)
""" """
# You can also replace your username with a neat symbol like  to save some space # You can also replace your username with a neat symbol like  to save some space
[username] [username]
show_always = true show_always = true
style_user = "bg:#D52D00" style_user = "fg:#434f55 bg:#E67380"
style_root = "bg:#D52D00" style_root = "fg:#434f55 bg:#E67380"
format = '[$user ]($style)' format = '[$user ]($style)'
[directory] [directory]
style = "bg:#EF7627" style = "fg:#434f55 bg:#E69875"
format = "[ $path ]($style)" format = "[ $path ]($style)"
truncation_length = 3 truncation_length = 3
truncation_symbol = "…/" truncation_symbol = "…/"
@@ -60,83 +65,111 @@ truncation_symbol = "…/"
[c] [c]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[docker_context] [docker_context]
symbol = " " symbol = " "
style = "fg:#666666 bg:#06969a" style = "fg:#434f55 bg:#8c092"
format = '[[ $symbol $context ](fg:#666666 bg:#06969A)]($style) $path' format = '[[ $symbol $context ](fg:#434f55 bg:#)83c092]($style) $path'
[elixir] [elixir]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[elm] [elm]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[git_branch] [git_branch]
symbol = " " symbol = " "
style = "fg:#666666 bg:#FF9A56" style = "fg:#434f55 bg:#dbbc7f"
format = '[[ $symbol $branch ](fg:#666666 bg:#FF9A56)]($style)' format = '[[ $symbol $branch ](fg:#434f55 bg:#dbbc7f)]($style)'
[git_status] [git_status]
style = "fg:#666666 bg:#FF9A56" style = "fg:#434f55 bg:#dbbc7f"
format = '[[($all_status$ahead_behind )](fg:#666666 bg:#FF9A56)]($style)' format = '[[($all_status$ahead_behind )](fg:#434f55 bg:#dbbc7f)]($style)'
[gleam]
symbol = " "
style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[golang] [golang]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[haskell] [haskell]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[java] [java]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[julia] [julia]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[nodejs] [nodejs]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[nim] [nim]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[odin]
symbol = "󱟜 "
style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[rust] [rust]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" format = '[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )'
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)'
[ruby] [ruby]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[python] [python]
symbol = " " symbol = " "
style = "fg:#d3c6aa bg:#D162A4" style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#d3c6aa bg:#D162A4)]($style)' format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[scala]
symbol = " "
style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[zig]
symbol = " "
style = "fg:#434f55 bg:#a7c080 "
format = '[[ $symbol ($version) ](fg:#434f55 bg:#a7c080 )]($style)'
[direnv]
disabled = false
loaded_msg = "󱥾 "
unloaded_msg = "󱧴 "
allowed_msg = "󱥾 "
not_allowed_msg = "󱧴 "
style = "fg:#434f55 bg:#d699B6"
format = '[ $loaded]($style)'
[time] [time]
disabled = false disabled = false
time_format = "%R" # Hour:Minute Format time_format = "%R" # Hour:Minute Format
style = "fg:#d3c6aa bg:#A30262" style = "fg:#434f55 bg:#7fbbb3"
format = '[[ ♥ $time ](bg:#A30262)]($style)' format = '[ ♥ $time ]($style)'
[status] [status]
disabled = false disabled = false
@@ -147,10 +180,10 @@ not_found_symbol = "󰦀 "
sigint_symbol = " " sigint_symbol = " "
signal_symbol = "󰣧 " signal_symbol = "󰣧 "
recognize_signal_code = false recognize_signal_code = false
style = "fg:#d3c6aa bg:#D52D00" style = "fg:#434f55 bg:#E67380"
format = '[ $symbol ]($style)' format = '[ $symbol ]($style)'
[cmd_duration] [cmd_duration]
min_time = 10_000 min_time = 10_000
style = "fg:#d3c6aa bg:#d52d00" style = "fg:#434f55 bg:#E67380"
format = '[$duration]($style)' format = '[$duration]($style)'

View File

@@ -1,12 +1,11 @@
* { * {
font-family: JetBrains Mono, Font Awesome 6 Free; font-family: "Hack Nerd Font Mono";
font-size: 13px; font-size: 13px;
} }
window#waybar { window#waybar {
color: #ffffff; color: #d3c6aa;
background-color: #1e3b28; background-color: #2b3339;
border-bottom: 3px solid #8f2fef;
transition-property: background-color; transition-property: background-color;
transition-duration: .5s; transition-duration: .5s;
} }
@@ -15,34 +14,56 @@ window#waybar.hidden {
opacity: 0.2; opacity: 0.2;
} }
.modules-left,
.modules-center,
.modules-right {
border: 3px solid #7fbbb3;
border-radius: 4px;
padding: 0 5px;
}
#custom-weather {
/* border-bottom: #a7c080; */
}
button { button {
box-shadow: inset 0 -3px transparent; box-shadow: inset 0 -3px transparent;
border: none; border: 1px #000000 solid;
border-radius: 0; border-radius: 0;
color: #d3c6aa;
} }
button:hover { button:hover {
background: inherit; background: inherit;
box-shadow: inset 0 -3px #ffffff; box-shadow: inset 0 -3px #7fbbb3;
opacity: 0.8;
} }
#workspaces button { #workspaces button,
padding: 0 15px; #tags button {
padding: 0 5px;
background-color: transparent; background-color: transparent;
border: 2px solid #8f2fef border: 2px solid #d3c6aa;
margin: 3px;
} }
#workspaces button:hover { #workspaces button.active,
background: rgba(255, 255, 255, 0.2); #tags button.occupied {
background: #d3c6aa;
border: 1px solid #2b3339;
color: #2b3339;
} }
#workspaces button.focused { #workspaces button.focused,
background-color: #8f2fef; #tags button.focused {
box-shadow: inset 0 -3px #ffffff; background-color: #7fbbb3;
color: #2b3339;
border: 1px solid #2b3339;
/* border-bottom: 3px solid #2b3339; */
} }
#workspaces button.urgent { #tags button.urgent {
background-color: #f38ba8; background-color: #e67e80;
} }
#backlight, #backlight,
@@ -55,10 +76,9 @@ button:hover {
#pulseaudio, #pulseaudio,
#temperature, #temperature,
#tray, #tray,
#idle_inhibitor,
#keyboard-state,
#power-profiles-daemon { #power-profiles-daemon {
padding: 0 8px; padding: 0 8px;
color: #d3c6aa;
} }
#window, #window,
@@ -66,126 +86,80 @@ button:hover {
margin: 0 8px; margin: 0 8px;
} }
.modules-left>widget:first-child>#workspaces {
margin-left: 0;
}
.modules-right>widget:last-child>#workspaces {
margin-right: 0;
}
#backlight { #backlight {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #cba6f7; /* border-bottom: 3px solid #7fbbb3; */
} }
#battery { #battery {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #a6e3a1; border-right: 3px solid #7fbbb3;
font-size: 18px;
} }
#battery.critical.discharging { #battery.critical.discharging {
background-color: #f38ba8; background-color: #e67e80;
animation: blink 1s infinite; /* animation: blink 5s infinite; */
} }
#battery.warning.discharging { #battery.warning.discharging {
background-color: #f9e2af; background-color: #dbbc7f;
animation: blink 1s infinite; /* animation: blink 10s infinite; */
} }
@keyframes blink { /* @keyframes blink { */
to { /* to { */
background-color: transparent; /* background-color: transparent; */
} /* } */
} /* } */
#clock { #clock {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #a6e3a1; /* border-bottom: 3px solid #a7c080; */
} }
#cpu { #cpu {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #cba6f7; border-right: 3px solid #7fbbb3;
} }
#memory { #memory {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #f9e2af; border-right: 3px solid #7fbbb3;
}
#mode {
color: #ffffff;
background-color: #8f2fef;
border-bottom: 3px solid #ffffff;
} }
#network { #network {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #a6e3a1; border-right: 3px solid #7fbbb3;
} }
#network.disconnected { #network.disconnected {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #f38ba8; /* border-bottom: 3px solid #f38ba8; */
} }
#pulseaudio { #pulseaudio {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #a6e3a1; border-right: 3px solid #7fbbb3;
} }
#pulseaudio.muted { #pulseaudio.muted {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #f38ba8; /* border-bottom: 3px solid #e67e80; */
} }
#temperature { #temperature {
color: #ffffff;
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #a6e3a1; border-right: 3px solid #7fbbb3;
} }
#temperature.critical { #temperature.critical {
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #f38ba8; /* border-bottom: 3px solid #e67e80; */
} }
#tray { #tray {
background-color: transparent; background-color: transparent;
border-bottom: 3px solid #8f2fef; border-left: 3px solid #7fbbb3;
}
#idle_inhibitor {
color: #ffffff;
background-color: transparent;
border-bottom: 3px solid #f9e2af;
}
#idle_inhibitor.activated {
color: #1e3b28;
background-color: #f9e2af;
border-bottom: 3px solid #f9e2af;
}
#keyboard-state {
color: #ffffff;
background-color: transparent;
border-bottom: 3px solid #fab387;
}
#power-profiles-daemon {
color: #ffffff;
background-color: transparent;
border-bottom: 3px solid #94e2d5;
} }

View File

@@ -1,4 +1,4 @@
{ config, pkgs, ... }: { ... }:
{ {
programs.waybar = { programs.waybar = {
@@ -8,18 +8,19 @@
mainBar = { mainBar = {
layer = "top"; layer = "top";
position = "top"; position = "top";
height = 30; height = 45;
spacing = 4; spacing = 4;
# Module layout # Module layout
# #
modules-left = [ modules-left = [
"river/tags" "river/tags"
"niri/workspaces"
]; ];
modules-center = [ modules-center = [
#"river/mode" "custom/currents"
# "river/layout"
"river/window" "river/window"
"niri/window"
]; ];
modules-right = [ modules-right = [
"pulseaudio" "pulseaudio"
@@ -75,11 +76,20 @@
hide-vacant = true; hide-vacant = true;
}; };
"niri/workspaces" = {
format = "{index}";
};
"river/window" = { "river/window" = {
format = "{}"; format = "{}";
max-length = 20; max-length = 20;
}; };
"niri/window" = {
format = "{}";
max-length = 20;
};
"tray" = { "tray" = {
icon-size = 21; icon-size = 21;
spacing = 10; spacing = 10;
@@ -122,10 +132,10 @@
}; };
format = "{icon} {capacity}%"; format = "{icon} {capacity}%";
format-full = "{icon} Full"; format-full = "{icon} Full";
format-charging = "{icon} Charging {capacity}% {time}"; format-charging = "{icon} {capacity}% {time}";
format-plugged = "{icon} Charge complete"; format-plugged = "{icon} ";
format-good = ">{icon} {capacity}%"; format-good = ">{icon} {capacity}%";
format-icons = ["" "" "" "" "" "" "" ""]; format-icons = [" " " " " " " " " "];
}; };
"network#wifi" = { "network#wifi" = {
@@ -155,168 +165,13 @@
on-click = "pavucontrol"; on-click = "pavucontrol";
}; };
}; };
"custom/currents"= {
interval= 150;
exec= "/home/autumn/.local/bin/currents --output";
return-type= "json";
}; };
}; };
# Waybar styling inspired by the referenced swayhome configuration
style = ''
* {
font-family: "Hack Nerd Font Mono";
font-size: 13px;
}
window#waybar {
color: #d3c6aa;
background-color: #2b3339;
border-bottom: 3px solid #7fbbb3;
transition-property: background-color;
transition-duration: .5s;
}
window#waybar.hidden {
opacity: 0.2;
}
button {
box-shadow: inset 0 -3px transparent;
border: 1px #000000 solid;
border-radius: 0;
color:#d3c6aa;
}
button:hover {
background: inherit;
box-shadow: inset 0 -3px #7fbbb3;
}
#tags button {
padding: 0 15px;
background-color: transparent;
border: 2px solid #d3c6aa;
}
#tags button.occupied {
background: #d3c6aa;
border: 1px solid #2b3339;
color:#2b3339;
}
#tags button.focused {
background-color: #7fbbb3;
color: #2b3339;
border: 1px solid #2b3339;
border-bottom: 3px solid #2b3339;
}
#tags button.urgent {
background-color: #e67e80;
}
#backlight,
#battery,
#clock,
#cpu,
#memory,
#mode,
#network,
#pulseaudio,
#temperature,
#tray,
#power-profiles-daemon {
padding: 0 8px;
color:#d3c6aa;
}
#window,
#workspaces {
margin: 0 8px;
}
#backlight {
background-color: transparent;
border-bottom: 3px solid #cba6f7;
}
#battery {
background-color: transparent;
border-bottom: 3px solid #a6e3a1;
}
#battery.critical.discharging {
background-color: #f38ba8;
animation: blink 1s infinite;
}
#battery.warning.discharging {
background-color: #f9e2af;
animation: blink 1s infinite;
}
@keyframes blink {
to {
background-color: transparent;
}
}
#clock {
background-color: transparent;
border-bottom: 3px solid #a6e3a1;
}
#cpu {
background-color: transparent;
border-bottom: 3px solid #cba6f7;
}
#memory {
background-color: transparent;
border-bottom: 3px solid #f9e2af;
}
#mode {
color: #ffffff;
background-color: #6e3a6d;
border-bottom: 3px solid #ffffff;
}
#network {
background-color: transparent;
border-bottom: 3px solid #a6e3a1;
}
#network.disconnected {
background-color: transparent;
border-bottom: 3px solid #f38ba8;
}
#pulseaudio {
background-color: transparent;
border-bottom: 3px solid #a6e3a1;
}
#pulseaudio.muted {
background-color: transparent;
border-bottom: 3px solid #f38ba8;
}
#temperature {
background-color: transparent;
border-bottom: 3px solid #a6e3a1;
}
#temperature.critical {
background-color: transparent;
border-bottom: 3px solid #f38ba8;
}
#tray {
background-color: transparent;
border-bottom: 3px solid #6e3a6d;
}
#power-profiles-daemon {
background-color: transparent;
border-bottom: 3px solid #94e2d5;
}
'';
}; };
};
xdg.configFile."waybar/style.css".source = ./waybar.css;
} }

View File

@@ -3,7 +3,7 @@
{ {
programs.zellij = { programs.zellij = {
enable = true; enable = true;
enableZshIntegration = true; # enableZshIntegration = true;
# exitShellOnExit = true; # exitShellOnExit = true;
settings = { settings = {
themes = { themes = {

View File

@@ -1,4 +1,4 @@
{ config, pkgs, ... }: { config, pkgs, lib, ... }:
{ {
@@ -9,6 +9,10 @@
programs ={ programs ={
zsh = { zsh = {
enable = true; enable = true;
# initContent = lib.mkOrder 1200 ''
# eval "$(ssh-agent -s)"
# ssh-add ~/.ssh/id_ed25519
# '';
antidote = { antidote = {
enable = true; enable = true;
plugins = [ plugins = [

View File

@@ -0,0 +1,14 @@
{config, pkgs, ...}:
{
home.packages = with pkgs; [oreo-cursors-plus];
home.pointerCursor = {
name = "oreo-cursors-plus";
package = pkgs.oreo-cursors-plus;
size = 32;
};
gtk.enable = true;
gtk.cursorTheme = {
package = pkgs.oreo-cursors-plus;
name = "oreo-cursors-plus";
};
}

View File

@@ -5,4 +5,5 @@
systemd-boot.enable = true; systemd-boot.enable = true;
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
}; };
boot.kernelPackages = pkgs.linuxPackages_latest;
} }

View File

@@ -0,0 +1,4 @@
{config, pkgs, ...}:
{
security.polkit.enable = true;
}

View File

@@ -14,5 +14,6 @@
playerctld.enable = true; playerctld.enable = true;
printing.enable = true; printing.enable = true;
pulseaudio.enable = false; pulseaudio.enable = false;
tailscale.enable = true;
}; };
} }

View File

@@ -0,0 +1,7 @@
{config, pkgs, ...}:
{
programs.nh = {
enable = true;
flake = "https://git.coven.systems/autumn/nixos-conf";
};
}

View File

@@ -6,4 +6,5 @@
description = "Autumn"; description = "Autumn";
extraGroups = [ "networkmanager" "wheel" ]; extraGroups = [ "networkmanager" "wheel" ];
}; };
users.defaultUserShell = pkgs.zsh;
} }

View File

@@ -0,0 +1,159 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ config, pkgs, ... }:
{
imports = [
./hardware-configuration.nix
../packages/rust-motd/rust-motd.nix
../services/samba.nix
../services/openssh.nix
../services/endlessh.nix
../services/podman.nix
# ./services/currents.nix
#. ./services/tailscale.nix.
# ./services/containerization/currents.nix
../services/containerization/docker.nix
../services/containerization/mealie-2.nix
../services/containerization/transtun.nix
../services/containerization/stirlingpdf.nix
];
# Bootloader.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
nix.settings.experimental-features = [
"nix-command"
"flakes"
];
services.tailscale.enable = true;
networking.hostName = "hoardfrost"; # Define your hostname.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# Configure network proxy if necessary
# networking.proxy.default = "http://user:password@proxy:port/";
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
# Enable networking
networking.networkmanager.enable = true;
# Set your time zone.
time.timeZone = "America/Denver";
# Select internationalisation properties.
i18n.defaultLocale = "en_US.UTF-8";
i18n.extraLocaleSettings = {
LC_ADDRESS = "en_US.UTF-8";
LC_IDENTIFICATION = "en_US.UTF-8";
LC_MEASUREMENT = "en_US.UTF-8";
LC_MONETARY = "en_US.UTF-8";
LC_NAME = "en_US.UTF-8";
LC_NUMERIC = "en_US.UTF-8";
LC_PAPER = "en_US.UTF-8";
LC_TELEPHONE = "en_US.UTF-8";
LC_TIME = "en_US.UTF-8";
};
# Configure keymap in X11
services = {
xserver.xkb = {
layout = "us";
variant = "";
};
};
networking.firewall.enable = true;
networking.firewall.allowPing = true;
networking.firewall.allowedTCPPorts = [
22
53
137
138
139
389
445
2022
8080
5657
41641
];
networking.firewall.allowedUDPPorts = [
22
53
137
138
139
389
445
2022
41641
];
# Define a user account. Don't forget to set a password with passwd.
programs.zsh.enable = true;
users = {
defaultUserShell = pkgs.zsh;
users.autumn = {
isNormalUser = true;
description = "autumn";
extraGroups = [
"networkmanager"
"wheel"
];
};
};
# Allow unfree packages
nixpkgs.config.allowUnfree = true;
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
helix
git
nil
inetutils
nh
toybox
nodejs_24
jdk17
rustup
# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
# wget
];
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;
# programs.gnupg.agent = {
# enable = true;
# enableSSHSupport = true;
# };
# List services that you want to enable:
# Enable the OpenSSH daemon.
# services.openssh.enable = true;
# Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "25.05"; # Did you read the comment?
}

48
system/hoardfrost/flake.lock generated Normal file
View File

@@ -0,0 +1,48 @@
{
"nodes": {
"home-manager": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1761191301,
"narHash": "sha256-xsRL2Oyb4YRZZ1Tu4WzR2uFg1n931bH+PfLdFcqtLg8=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "4958aafe7b237dc1e857fb0c916efff72075048f",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1761114652,
"narHash": "sha256-f/QCJM/YhrV/lavyCVz8iU3rlZun6d+dAiC3H+CDle4=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "01f116e4df6a15f4ccdffb1bcd41096869fb385c",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"home-manager": "home-manager",
"nixpkgs": "nixpkgs"
}
}
},
"root": "root",
"version": 7
}

View File

@@ -0,0 +1,39 @@
{
description = "Hoardfrost multipurpose server";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-unstable";
home-manager.url = "github:nix-community/home-manager";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
};
outputs = {self, nixpkgs, home-manager, ...}@inputs:
let
system = "x86_64-linux";
pkgs = nixpkgs.legacyPackages.${system};
timezone = "America/Denver";
locale = "en_US.UTF-8";
specialArgs = {
inherit inputs;
inherit system;
inherit timezone;
inherit locale;
};
in {
homeConfigurations.autumn = home-manager.lib.homeManagerConfiguration{
extraSpecialArgs = specialArgs;
pkgs = pkgs;
modules = [
./home.nix
];
};
nixosConfigurations.hoardfrost = nixpkgs.lib.nixosSystem{
system = system;
specialArgs = specialArgs;
modules = [
./configuration.nix
];
};
};
}

View File

@@ -0,0 +1,38 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/4f1eff7d-8a8c-4a7f-857b-f4e58b7a5f90";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/C802-4F6B";
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp5s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -10,6 +10,7 @@
./hardware-configuration.nix ./hardware-configuration.nix
#system configs #system configs
../defaults/system.nix
../defaults/locale.nix ../defaults/locale.nix
../defaults/boot.nix ../defaults/boot.nix
../defaults/services.nix ../defaults/services.nix

View File

@@ -0,0 +1,14 @@
{ config, pkgs, ... }:
{
# Configure systems to use Hydra as a binary cache substituter
nix.settings = {
substituters = [
"http://rhiannon.coven.systems:3000"
];
trusted-public-keys = [
"rhiannon.coven.systems:f8KiECrc7rY3vDMSy7sACyToxRLPECtQTcm6p8LFMPk="
];
};
}

View File

@@ -0,0 +1,58 @@
{config, pkgs, ...}:
{
environment.systemPackages = with pkgs; [figlet];
programs.rust-motd = {
enable = true;
order = [
"global"
"banner"
"weather"
"uptime"
"last_login"
"memory"
"service_status"
"filesystems"
"load_avg"
];
settings = {
global = {
version = "1.0";
};
banner = {
color = "blue";
command = "hostname | figlet -f sblood";
};
weather = {
loc = "America,Denver";
style = "full";
};
service_status = {
samba = "samba-wsdd.service";
openssh = "sshd.service";
mealie = "podman-mealie.service";
mealiedb = "podman-postgres.service";
stirling = "podman-stirling-pdf.service";
tbrowser = "podman-torrent-browser.service";
seas = "podman-transmission-openvpn.service";
tailscale = "tailscaled.service";
firewall = "firewall.service";
endlessh = "endlessh.service";
};
uptime = {
prefix = "up";
};
memory = {
swap_pos = "none";
};
last_login = {
autumn = 2;
};
filesystems = {
root = "/";
};
load_avg = {
format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}";
};
};
};
}

View File

@@ -0,0 +1,118 @@
add_newline = true
[aws]
disabled = true
[battery]
disabled = true
[character]
success_symbol = "[](bold green)"
error_symbol = "[](bold red)"
vicmd_symbol = "[](bold green)"
[cmd_duration]
[conda]
[directory]
truncation_length = 3
[dotnet]
disabled = true
[env_var]
disabled = true
[elixir]
symbol = " "
[elm]
symbol = " "
[git_branch]
symbol = " "
[git_commit]
disabled = false
commit_hash_length = 4
[git_state]
disabled = true
[git_status]
conflicted = "=${count}"
ahead = "⇡${count}"
behind = "⇣${count}"
diverged = "⇕⇡${ahead_count}⇣${behind_count}"
untracked = "?${count}"
stashed = "\\$${count}"
modified = "!${count}"
staged = "+${count}"
renamed = "»${count}"
deleted = "✘${count}"
[gcloud]
disabled = true
[golang]
symbol = " "
[hostname]
[jobs]
[kubernetes]
symbol = " "
disabled = false
[line_break]
disabled = false
[lua]
symbol = " "
lua_binary = "luajit"
[nix_shell]
disabled = true
[memory_usage]
disabled = true
[java]
symbol = " "
[julia]
[nim]
[nodejs]
symbol = " "
[package]
symbol = " "
[php]
symbol = " "
[python]
symbol = " "
[ruby]
symbol = " "
[rust]
symbol = " "
[scala]
symbol = " "
[terraform]
symbol = " "
format = "via [$symbol$version]($style)"
[time]
disabled = true
[username]
disabled = false

View File

@@ -0,0 +1,12 @@
{config, pkgs, ...}:
{
environment.systemPackages = with pkgs;[
podman
docker-compose
];
virtualisation = {
docker.enable = true;
};
users.users.autumn.extraGroups = ["docker"];
}

View File

@@ -0,0 +1,148 @@
# Auto-generated by compose2nix.
{ pkgs, lib, config, ... }:
{
# Containers
virtualisation.oci-containers.containers."mealie" = {
image = "ghcr.io/mealie-recipes/mealie:v3.6.1";
environment = {
"ALLOW_SIGNUP" = "false";
"BASE_URL" = "https://mealie.yourdomain.com";
"DB_ENGINE" = "postgres";
"PGID" = "1000";
"POSTGRES_DB" = "mealie";
"POSTGRES_PASSWORD" = "mealie";
"POSTGRES_PORT" = "5432";
"POSTGRES_SERVER" = "postgres";
"POSTGRES_USER" = "mealie";
"PUID" = "1000";
"TZ" = "America/Denver";
};
volumes = [
"mealie-data:/app/data:rw"
];
ports = [
"9925:9000/tcp"
];
dependsOn = [
"postgres"
];
log-driver = "journald";
extraOptions = [
"--memory=1048576000b"
"--network-alias=mealie"
"--network=mealieio_default"
];
};
systemd.services."podman-mealie" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
};
after = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-data.service"
];
requires = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-data.service"
];
partOf = [
"podman-compose-mealieio-root.target"
];
wantedBy = [
"podman-compose-mealieio-root.target"
];
};
virtualisation.oci-containers.containers."postgres" = {
image = "postgres:17";
environment = {
"PGUSER" = "mealie";
"POSTGRES_DB" = "mealie";
"POSTGRES_PASSWORD" = "mealie";
"POSTGRES_USER" = "mealie";
};
volumes = [
"mealie-pgdata:/var/lib/postgresql/data:rw"
];
log-driver = "journald";
extraOptions = [
"--health-cmd=[\"pg_isready\"]"
"--health-interval=30s"
"--health-retries=3"
"--health-timeout=20s"
"--network-alias=postgres"
"--network=mealieio_default"
];
};
systemd.services."podman-postgres" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
};
after = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-pgdata.service"
];
requires = [
"podman-network-mealieio_default.service"
"podman-volume-mealieio_mealie-pgdata.service"
];
partOf = [
"podman-compose-mealieio-root.target"
];
wantedBy = [
"podman-compose-mealieio-root.target"
];
};
# Networks
systemd.services."podman-network-mealieio_default" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "podman network rm -f mealieio_default";
};
script = ''
podman network inspect mealieio_default || podman network create mealieio_default
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
# Volumes
systemd.services."podman-volume-mealieio_mealie-data" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
podman volume inspect mealieio_mealie-data || podman volume create mealieio_mealie-data
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
systemd.services."podman-volume-mealieio_mealie-pgdata" = {
path = [ pkgs.podman ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
podman volume inspect mealieio_mealie-pgdata || podman volume create mealieio_mealie-pgdata
'';
partOf = [ "podman-compose-mealieio-root.target" ];
wantedBy = [ "podman-compose-mealieio-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."podman-compose-mealieio-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View File

@@ -0,0 +1,38 @@
{config, pkgs, ...}:
{
virtualisation.oci-containers.containers = {
mealie = {
image = "ghcr.io/mealie-recipes/mealie:v3.3.2";
ports = [
"9000:9000"
];
volumes = [
"/home/autumn/mealie/mealie-data:/app/data"
];
environment = {
DB_ENGINE= "postgres";
POSTGRES_USER = "mealie";
POSTGRES_PASSWORD = "mealie";
POSTGRES_SERVER = "localhost:5432";
POSTGRES_PORT = "5432";
POSTGRES_DB = "mealie";
TZ = "America/Denver";
};
dependsOn = [
"postgres-mealie"
];
};
postgres-mealie = {
image = "postgres:17";
environment = {
POSTGRES_USER = "mealie";
POSTGRES_PASSWORD = "mealie";
PGUSER = "mealie";
POSTGRES_DB = "mealie";
};
volumes = [
"/home/autumn/mealie/mealie-pgdata:/var/lib/postgresql/data"
];
};
};
}

View File

@@ -0,0 +1,19 @@
{config, pkgs, ...}:
{
virtualisation.oci-containers.containers.stirling-pdf = {
image = "stirlingtools/stirling-pdf:latest";
ports = ["8079:8080"];
volumes = [
"/home/autumn/StirlingPDF/trainingData:/usr/share/tessdata"
"/home/autumn/StirlingPDF/extraConfigs:/configs"
"/home/autumn/StirlingPDF/customFiles:/customFiles/"
"/home/autumn/StirlingPDF/logs:/logs/"
"/home/autumn/StirlingPDF/pipeline:/pipeline/"
];
environment = {
DISABLE_ADDITIONAL_FEATURES="true";
LANGS="en_US";
};
};
}

View File

@@ -0,0 +1,55 @@
{config, pkgs, ...}:
{
virtualisation.oci-containers.containers.transmission-openvpn = {
image = "haugene/transmission-openvpn:latest";
ports = [
"9091:9091"
];
volumes = [
"/home/autumn/transtun/holding-cell:/data"
"/home/autumn/transtun/mullvad_userpass.txt:/config/openvpn-credentials.txt"
"/home/autumn/transtun/notify-download.sh:/etc/transmission/notify-download.sh:ro"
];
environment = {
OPENVPN_PROVIDER = "MULLVAD";
OPENVPN_USERNAME = "9413153196446212";
OPENVPN_CONFIG = "ca_van";
LOCAL_NETWORK = "10.0.0.0/16";
OPENVPN_OPTS = "--dev tun0";
TRANSMISSION_RPC_BIND_ADDRESS = "0.0.0.0";
TRANSMISSION_RPC_WHITELIST = "*";
TRANSMISSION_RPC_WHITELIST_ENABLED = "false";
TRANSMISSION_SCRIPT_TORRENT_DONE_ENABLED = "true";
TRANSMISSION_SCRIPT_TORRENT_DONE_FILENAME = "/etc/transmission/notify-download.sh";
};
extraOptions = [
"--cap-add=NET_ADMIN"
"--cap-add=SYS_MODULE"
"--device=/dev/net/tun:/dev/net/tun"
"--privileged"
];
autoStart = true;
};
# Firefox browser container (working version without VPN)
virtualisation.oci-containers.containers.torrent-browser = {
image = "jlesage/firefox:latest";
ports = [
"8080:5800" # Firefox web interface
];
environment = {
DISPLAY = ":0";
APP_NAME = "Torrent Browser";
APP_ICON = "https://raw.githubusercontent.com/jlesage/docker-templates/master/jlesage/images/firefox-icon.png";
};
autoStart = true;
};
}

View File

@@ -0,0 +1,7 @@
{config, pkgs, ...}:
{
services.endlessh = {
enable = true;
port = 22;
};
}

View File

@@ -0,0 +1,118 @@
{ config, pkgs, lib, ... }:
# Define your DNS records declaratively
let
dnsRecords = {
"lan." = {
ttl = 86400; # Time-to-live for records in this zone
ns = [ "hoardfrost.lan." ]; # Nameserver record
soa = {
nameServer = "hoardfrost.lan.";
adminEmail = "root.lan.";
serial = "2025091901"; # Update this serial number with each change
refresh = "3600";
retry = "1800";
expire = "604800";
minimum = "86400";
};
# Define your host records (A for IPv4, AAAA for IPv6)
records = {
# Your NixOS server acting as the DNS server
hoardfrost = [
{ type = "A"; content = "10.0.0.217"; }
{ type = "AAAA"; content = "2601:282:180:630::803b"; }
];
# Other devices on your local network
router = [
{ type = "A"; content = "10.0.0.1"; }
{ type = "AAAA"; content = "fe80::1"; }
];
yukigekko = [
{ type = "A"; content = "10.0.0.210"; }
{ type = "AAAA"; content = "2601:282:180:630::e2e"; }
];
wesbos = [
{ type = "A"; content = "10.0.0.110";}
# { type = "AAAA"; content = "";}
];
wsl-hive = [
{type = "A"; content = "172.18.84.193";}
{type = "AAAA"; content = "fe80::215:5dff:fec1:e4b5";}
];
};
};
};
# This function generates the zone file string from the Nix expression
generateZoneFile = zoneName: zoneConfig:
let
soaRecord = "${zoneName} ${toString zoneConfig.ttl} IN SOA ${zoneConfig.soa.nameServer} ${zoneConfig.soa.adminEmail} ( ${zoneConfig.soa.serial} ${zoneConfig.soa.refresh} ${zoneConfig.soa.retry} ${zoneConfig.soa.expire} ${zoneConfig.soa.minimum} )";
nsRecords = lib.concatStringsSep "\n" (lib.map (ns: "${zoneName} ${toString zoneConfig.ttl} IN NS ${ns}") zoneConfig.ns);
hostRecords = lib.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (hostname: records:
lib.map (record: "${hostname}.${zoneName} ${toString zoneConfig.ttl} IN ${record.type} ${record.content}") records
) zoneConfig.records));
in
''
$ORIGIN ${zoneName}
${soaRecord}
${nsRecords}
${hostRecords}
'';
# Generate the zone file using the `generateZoneFile` function
lanZoneFile = pkgs.writeText "lan.zone" (generateZoneFile "lan." dnsRecords."lan.");
# Configure hickory-dns with the generated zone file
hickoryConfig = pkgs.writeText "hickory-config.toml" ''
listen_addrs_ipv4 = ["127.0.0.1", "10.0.0.217"] # Change to your NixOS server's IPv4
listen_addrs_ipv6 = ["::1", "fe80::215:5dff:fec1:e4b5"] # Change to your NixOS server's IPv6
# Configure as an authoritative server for the local zone
[[zones]]
zone = "lan."
zone_type = "Primary"
file = "${lanZoneFile}"
# Configure as a recursive resolver for all other queries
[[recursor]]
# All queries *not* matching the "lan." zone will be forwarded here.
[[recursor.forwarders]]
name_servers = ["8.8.8.8:53", "[2001:4860:4860::8888]:53"]
# All other DNS queries will be handled recursively, starting from the root hints.
'';
in
{
systemd.services.hickory-dns = {
enable = true;
description = "Hickory DNS with local zone";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = "hickory";
Group = "hickory";
ExecStart = "${pkgs.hickory-dns}/bin/hickory-dns -c ${hickoryConfig}";
Restart = "on-failure";
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
DynamicUser = true;
StateDirectory = "hickory";
};
};
users.groups.hickory = {};
users.users.hickory = {
isSystemUser = true;
group = "hickory";
};
environment.systemPackages = [ pkgs.hickory-dns ];
# Configure your NixOS machine to use itself as the DNS resolver
services.resolved.enable = false;
networking.nameservers = [ "127.0.0.1" "fdaa:a00:0:1::100" ];
}

View File

@@ -0,0 +1,151 @@
{ config, pkgs, lib, ... }:
# Define your DNS records declaratively
let
dnsRecords = {
"lan." = {
ttl = 86400; # Time-to-live for records in this zone
ns = [ "hoardfrost.lan." ]; # Nameserver record
soa = {
nameServer = "hoardfrost.lan.";
adminEmail = "root.lan.";
serial = "2025012001"; # Increment serial for changes
refresh = "3600";
retry = "1800";
expire = "604800";
minimum = "86400";
};
# Define your host records (A for IPv4, AAAA for IPv6)
records = {
# Your NixOS server acting as the DNS server
hoardfrost = [
{ type = "A"; content = "10.0.0.217"; }
{ type = "AAAA"; content = "2601:282:180:630::cc03"; }
];
# Other devices on your local network
router = [
{ type = "A"; content = "10.0.0.1"; }
{ type = "AAAA"; content = "fe80::1"; }
];
yukigekko = [
{ type = "A"; content = "10.0.0.210"; }
{ type = "AAAA"; content = "2601:282:180:630::e2e"; }
];
wesbos = [
{ type = "A"; content = "10.0.0.110";}
# { type = "AAAA"; content = "";}
];
wsl-hive = [
{type = "A"; content = "172.18.84.193";}
{type = "AAAA"; content = "fe80::215:5dff:fec1:e813";}
];
};
};
};
# This function generates the zone file string from the Nix expression
generateZoneFile = zoneName: zoneConfig:
let
soaRecord = "${zoneName} ${toString zoneConfig.ttl} IN SOA ${zoneConfig.soa.nameServer} ${zoneConfig.soa.adminEmail} ( ${zoneConfig.soa.serial} ${zoneConfig.soa.refresh} ${zoneConfig.soa.retry} ${zoneConfig.soa.expire} ${zoneConfig.soa.minimum} )";
nsRecords = lib.concatStringsSep "\n" (map (ns: "${zoneName} ${toString zoneConfig.ttl} IN NS ${ns}") zoneConfig.ns);
hostRecords = lib.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (hostname: records:
map (record: "${hostname}.${zoneName} ${toString zoneConfig.ttl} IN ${record.type} ${record.content}") records
) zoneConfig.records));
in
''
$ORIGIN ${zoneName}
${soaRecord}
${nsRecords}
${hostRecords}
'';
# Generate the zone file using the `generateZoneFile` function
lanZoneFile = pkgs.writeText "lan.zone" (generateZoneFile "lan." dnsRecords."lan.");
# Configure hickory-dns with the generated zone file
hickoryConfig = pkgs.writeText "hickory-config.toml" ''
listen_addrs_ipv4 = ["127.0.0.1", "10.0.0.217"] # Change to your NixOS server's IPv4
listen_addrs_ipv6 = ["::1", "2601:282:180:630::cc03"] # Change to your NixOS server's IPv6
# Configure as an authoritative server for the local zone
[[zones]]
zone = "lan."
zone_type = "Primary"
file = "${lanZoneFile}"
# Note: Recursive resolution is not supported in Hickory DNS 0.25.2
# This server will only serve the local zone
'';
in
{
systemd.services.hickory-dns = {
enable = true;
description = "Hickory DNS authoritative server for local zone";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = "hickory";
Group = "hickory";
ExecStart = "${pkgs.hickory-dns}/bin/hickory-dns -c ${hickoryConfig}";
Restart = "on-failure";
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
DynamicUser = true;
StateDirectory = "hickory";
};
};
users.groups.hickory = {};
users.users.hickory = {
isSystemUser = true;
group = "hickory";
};
environment.systemPackages = [ pkgs.hickory-dns ];
# Configure systemd-resolved to use Unbound
services.resolved.enable = true;
services.resolved.dnssec = "false";
services.resolved.extraConfig = ''
DNS=127.0.0.1@5353
'';
# Configure Unbound as recursive resolver for external queries
services.unbound = {
enable = true;
settings = {
server = {
interface = [ "127.0.0.1" ];
port = 5353; # Use different port to avoid conflict with Hickory DNS
access-control = [ "127.0.0.1 allow" ];
hide-identity = true;
hide-version = true;
};
forward-zone = [
{
name = "lan.";
forward-addr = [ "127.0.0.1@53" ]; # Forward lan. queries to Hickory DNS
}
{
name = ".";
forward-addr = [
"8.8.8.8#dns.google"
"2001:4860:4860::8888#dns.google"
];
}
];
};
};
# Configure NetworkManager to use systemd-resolved and ignore DHCP DNS
networking.networkmanager.dns = "systemd-resolved";
networking.networkmanager.settings.main.dns = "none";
# Set the system to use local DNS
networking.nameservers = [ "127.0.0.1" ];
}

View File

@@ -0,0 +1,7 @@
{config, pkgs, ...}:
{
services.mullvad-vpn = {
enable = true;
package = pkgs.mullvad-vpn;
};
}

View File

@@ -0,0 +1,8 @@
{config, pkgs, ...}:
{
services.openssh = {
enable = true;
passwordAuthentication = true;
ports = [2022];
};
}

View File

@@ -0,0 +1,20 @@
{ pkgs, lib, config, ... }:
{
# Runtime
virtualisation.podman = {
enable = true;
autoPrune.enable = true;
# dockerCompat = true;
};
# Enable container name DNS for all Podman networks.
networking.firewall.interfaces = let
matchAll = if !config.networking.nftables.enable then "podman+" else "podman*";
in {
"${matchAll}".allowedUDPPorts = [ 53 ];
};
virtualisation.oci-containers.backend = "podman";
}

44
system/services/samba.nix Normal file
View File

@@ -0,0 +1,44 @@
{config, pkgs, ...}:
{
services.samba = {
enable = true;
# securityType = "user";
openFirewall = true;
settings = {
global = {
"workgroup" = "WORKGROUP";
"server string" = "smbnix";
# "netbios name" = "smbnix";
"security" = "user";
};
"public" = {
"path" = "/srv/samba/hoardfrost/mainstore";
"browseable" = "yes";
public = "yes";
"read only" = "no";
"guest ok" = "yes";
"create mask" = "0644";
"directory mask" = "0755";
# "force user" = "autumn";
# "force group" = "groupname";
"valid users" = "autumn lia madeleine";
};
"private" = {
"path" = "/srv/samba/hoardfrost/private";
"browseable" = "yes";
"read only" = "no";
"guest ok" = "no";
"create mask" = "0644";
"directory mask" = "0755";
"force user" = "autumn";
# "force group" = "groupname";
"valid users" = "autumn";
};
};
};
services.samba-wsdd = {
enable = true;
openFirewall = true;
discovery = true;
};
}

View File

@@ -0,0 +1,16 @@
{config, pkgs, ...}:
{
systemd.user.services.swaybg-autoset = {
enable = true;
description = "start swaybg on login";
after = ["waybar.service"];
requires = ["network-online.target"];
before = ["multi-user.target"];
wantedBy = ["multi-user.target"];
serviceConfig = {
ExecStart = "swaybg -i ~/Downloads/wp.jpg";
User = "autumn";
Group = "users";
};
};
}

View File

@@ -0,0 +1,7 @@
{config, pkgs, ...}:
{
services.tailscale = {
enable = true;
};
}

View File

@@ -10,13 +10,16 @@
{ {
imports = [ imports = [
# include NixOS-WSL modules # include NixOS-WSL modules
../defaults/users.nix
<nixos-wsl/modules> <nixos-wsl/modules>
]; ];
wsl.enable = true; wsl.enable = true;
wsl.defaultUser = "autumn"; wsl.defaultUser = "autumn";
networking.hostName = "wsl-hive"; networking.hostName = "wsl-hive";
networking.extraHosts = "10.0.0.217 hoardfrost";
environment.systemPackages = [pkgs.git]; environment.systemPackages = [pkgs.git];
programs.zsh.enable = true;
nix.settings.experimental-features = ["nix-command" "flakes"]; nix.settings.experimental-features = ["nix-command" "flakes"];
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default

View File

@@ -9,22 +9,38 @@
[ # Include the results of the hardware scan. [ # Include the results of the hardware scan.
./hardware-configuration.nix ./hardware-configuration.nix
# ../packages/bincache.nix
#system configs #system configs
../defaults/locale.nix
../defaults/boot.nix ../defaults/boot.nix
../defaults/locale.nix
../defaults/security.nix
../defaults/services.nix ../defaults/services.nix
../defaults/system.nix
../defaults/users.nix ../defaults/users.nix
../services/mullvad.nix
../services/swaybg.nix
#system packages #system packages
../packages/sddm/sddm.nix ../packages/sddm/sddm.nix
#flatpaks
# ../extras/flatpak.nix
]; ];
networking.hostName = "yukigekko"; # Define your hostname. networking.hostName = "yukigekko"; # Define your hostname.
networking.networkmanager.enable = true; networking.networkmanager.enable = true;
networking.extraHosts = ''
10.0.0.217 hoardfrost
'';
services.logind.lidSwitchExternalPower = "ignore";
services.blueman.enable = true;
time.timeZone = "${timezone}"; time.timeZone = "${timezone}";
programs.river-classic.enable = true; programs.river-classic.enable = true;
programs.niri.enable = true;
xdg.portal = { xdg.portal = {
enable = true; enable = true;
config.common.default = "*"; config.common.default = "*";
@@ -34,7 +50,7 @@
}; };
programs.firefox.enable = true; programs.firefox.enable = true;
programs.bash.interactiveShellInit = "fish"; programs.zsh.enable = true;
programs.appimage.enable = true; programs.appimage.enable = true;
# programs.openvpn3.enable = true; # programs.openvpn3.enable = true;
@@ -42,25 +58,16 @@
hardware.graphics = { hardware.graphics = {
enable = true; enable = true;
}; };
fileSystems."/mnt/hoardfrost" = {
hardware.nvidia = { device = "//10.0.0.217/public";
modesetting.enable = true; fsType = "cifs";
options = [ "username=autumn" "password=autest" "x-systemd.automount" "noauto"];
powerManagement.enable = false;
powerManagement.finegrained = false;
open = false;
nvidiaSettings = true;
package = config.boot.kernelPackages.nvidiaPackages.stable;
}; };
hardware.nvidia.prime.intelBusId = "PCI:0@0:2:0"; # hardware.nvidia.prime.intelBusId = "PCI:0@0:2:0";
hardware.nvidia.prime.nvidiaBusId = "PCI:1@0:0:0"; # hardware.nvidia.prime.nvidiaBusId = "PCI:1@0:0:0";
hardware.nvidia.prime.sync.enable = true; # hardware.nvidia.prime.sync.enable = true;o
hardware.nvidia.prime.offload.enable = false; # hardware.nvidia.prime.offload.enable = false;
hardware.nvidia.prime.offload.enableOffloadCmd = false; # hardware.nvidia.prime.offload.enableOffloadCmd = false;
# Allow unfree packages # Allow unfree packages
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
@@ -79,6 +86,26 @@
tree tree
swaylock-effects swaylock-effects
code-cursor-fhs code-cursor-fhs
moonlight-qt
pcmanfm
gvfs
vlc
cifs-utils
polkit
waypaper
# wayland
# wayland-protocols
# libxkbcommon
# expat
# fontconfig
# freetype
# freetype.dev
# libGL
# pkg-config
# xorg.libX11
# xorg.libXcursor
# xorg.libXi
# xorg.libXrandr
]; ];
environment.pathsToLink = ["/share/zsh"]; environment.pathsToLink = ["/share/zsh"];
@@ -98,5 +125,5 @@
system.autoUpgrade.enable = true; system.autoUpgrade.enable = true;
system.autoUpgrade.allowReboot = true; system.autoUpgrade.allowReboot = true;
system.autoUpgrade.flake = "../../flake.nix"; system.autoUpgrade.flake = "../../flake.nix";
qt.platformTheme = "kde6"; # qt.platformTheme = "kde6";
} }

View File

@@ -8,25 +8,23 @@
[ (modulesPath + "/installer/scan/not-detected.nix") [ (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sr_mod" "rtsx_pci_sdmmc" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = fileSystems."/" =
{ device = "/dev/disk/by-uuid/764f812a-99d9-4754-9704-ead067694ff9"; { device = "/dev/disk/by-uuid/8f1b1098-ae2e-4804-8a3f-65ae10d66b2c";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/B495-E52C"; { device = "/dev/disk/by-uuid/5B79-90C9";
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ]; options = [ "fmask=0077" "dmask=0077" ];
}; };
swapDevices = swapDevices = [ ];
[ { device = "/dev/disk/by-uuid/c9790e7a-e972-44fe-a6f0-160af701a4b7"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's