Compare commits
25 Commits
eb1283157a
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a5b4d685b7 | ||
|
|
61bc144093 | ||
|
|
57980742c6 | ||
|
|
6c3ee01b9c | ||
|
|
d176f6a5b2 | ||
|
|
22fab9f431 | ||
|
|
d8fce003c9 | ||
|
|
286288a41e | ||
|
|
a19519b292 | ||
| 0f8348d3fe | |||
| f85dafd5a8 | |||
| e30ccf72e6 | |||
| 28de659218 | |||
|
|
b4923858d2 | ||
|
|
28ab585a34 | ||
| e6a91a0d49 | |||
| df5d85cc43 | |||
| 73ac52a1f7 | |||
| ddc1563ef2 | |||
| a14f1da387 | |||
| bc4ee5be49 | |||
| 65242cd03a | |||
| 1beb97c222 | |||
| e0d803ff20 | |||
| 4c1dcec61b |
31
.gitea/workflows/test-on-push.yaml
Normal file
31
.gitea/workflows/test-on-push.yaml
Normal file
@@ -0,0 +1,31 @@
|
||||
name: Test Flake
|
||||
on:
|
||||
workflow_dispatch:
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
jobs:
|
||||
test_flake:
|
||||
runs-on: nixos
|
||||
steps:
|
||||
- name: Checkout Code
|
||||
uses: actions/checkout@v5
|
||||
|
||||
- name: check nixos flake
|
||||
run: /run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes flake check --all-systems --verbose
|
||||
|
||||
- name: check home-manager flake
|
||||
run: "/run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes eval .#homeConfigurations --apply 'builtins.mapAttrs (_n: v: v.activationPackage.drvPath)' --verbose"
|
||||
|
||||
dry_build:
|
||||
runs-on: nixos
|
||||
steps:
|
||||
- name: Checkout Code
|
||||
uses: actions/checkout@v5
|
||||
|
||||
- name: Test Build
|
||||
run: |
|
||||
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#yukigekko
|
||||
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#lesbos
|
||||
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#wsl-hive
|
||||
/run/current-system/sw/bin/nixos-rebuild dry-build --flake .#hoardfrost
|
||||
26
.gitea/workflows/update.yaml
Normal file
26
.gitea/workflows/update.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
name: Update Flake
|
||||
on:
|
||||
workflow_dispatch:
|
||||
schedule:
|
||||
- cron: '0 23 * * *'
|
||||
jobs:
|
||||
update_flake:
|
||||
runs-on: nixos
|
||||
steps:
|
||||
- name: Prevent re-runs
|
||||
run: |
|
||||
if [ "$GITHUB_RUN_ATTEMPT" -gt 1 ]; then
|
||||
echo "No re-runs for you. Go away."
|
||||
exit 1
|
||||
else
|
||||
echo "not a re-run"
|
||||
fi
|
||||
|
||||
- name: Checkout Code
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: Update Flake
|
||||
run: /run/current-system/sw/bin/nix --extra-experimental-features nix-command --extra-experimental-features flakes flake update --refresh --commit-lock-file --verbose
|
||||
|
||||
- name: Push Changes
|
||||
run: git push
|
||||
46
flake.lock
generated
46
flake.lock
generated
@@ -23,11 +23,11 @@
|
||||
"flake-compat": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1747046372,
|
||||
"narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
|
||||
"lastModified": 1765121682,
|
||||
"narHash": "sha256-4VBOP18BFeiPkyhy9o4ssBNQEvfvv1kXkasAYd0+rrA=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
|
||||
"rev": "65f23138d8d09a92e30f1e5c87611b23ef451bf3",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -94,11 +94,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1760130406,
|
||||
"narHash": "sha256-GKMwBaFRw/C1p1VtjDz4DyhyzjKUWyi1K50bh8lgA2E=",
|
||||
"lastModified": 1765980955,
|
||||
"narHash": "sha256-rB45jv4uwC90vM9UZ70plfvY/2Kdygs+zlQ07dGQFk4=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "d305eece827a3fe317a2d70138f53feccaf890a1",
|
||||
"rev": "89c9508bbe9b40d36b3dc206c2483ef176f15173",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -110,11 +110,11 @@
|
||||
"lix": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1760208466,
|
||||
"narHash": "sha256-1tQJ7hOxG7SN61ZMTrOewtv7FV1JHCcHiU8fQ7DYuos=",
|
||||
"rev": "d9c1c0925ca74536bfaeaeb69042886e33c4e5a6",
|
||||
"lastModified": 1766001599,
|
||||
"narHash": "sha256-avWZpy84s8bdMGsbOjfc4n0LYUqR5H5+Wj4QmgwsBzg=",
|
||||
"rev": "32d7c02b96259d05f50a482c2b7e55d59a70294c",
|
||||
"type": "tarball",
|
||||
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/d9c1c0925ca74536bfaeaeb69042886e33c4e5a6.tar.gz"
|
||||
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/32d7c02b96259d05f50a482c2b7e55d59a70294c.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
@@ -133,11 +133,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1756511062,
|
||||
"narHash": "sha256-IgD1JR7scSEwlK/YAbmrcTWpAYT30LPldCUHdzXkaMs=",
|
||||
"rev": "3f09a5eb772e02d98bb8878ab687d5b721f00d16",
|
||||
"lastModified": 1764519849,
|
||||
"narHash": "sha256-XnNABKfIYKSimQVvKc9FnlC2H0LurOhd9MS6l0Z67lE=",
|
||||
"rev": "6c95c0b6f73f831226453fc6905c216ab634c30f",
|
||||
"type": "tarball",
|
||||
"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/3f09a5eb772e02d98bb8878ab687d5b721f00d16.tar.gz"
|
||||
"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/6c95c0b6f73f831226453fc6905c216ab634c30f.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
@@ -150,11 +150,11 @@
|
||||
"nixpkgs": "nixpkgs_3"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1759833546,
|
||||
"narHash": "sha256-rOfkgIiiZNPUbf61OqEym60wXEODeDG8XH+gV/SUoUc=",
|
||||
"lastModified": 1765841014,
|
||||
"narHash": "sha256-55V0AJ36V5Egh4kMhWtDh117eE3GOjwq5LhwxDn9eHg=",
|
||||
"owner": "nix-community",
|
||||
"repo": "NixOS-WSL",
|
||||
"rev": "7c0c0f4c3a51761434f18209fa9499b8579ff730",
|
||||
"rev": "be4af8042e7a61fa12fda58fe9a3b3babdefe17b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -198,11 +198,11 @@
|
||||
},
|
||||
"nixpkgs_3": {
|
||||
"locked": {
|
||||
"lastModified": 1759733170,
|
||||
"narHash": "sha256-TXnlsVb5Z8HXZ6mZoeOAIwxmvGHp1g4Dw89eLvIwKVI=",
|
||||
"lastModified": 1765472234,
|
||||
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "8913c168d1c56dc49a7718685968f38752171c3b",
|
||||
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -214,11 +214,11 @@
|
||||
},
|
||||
"nixpkgs_4": {
|
||||
"locked": {
|
||||
"lastModified": 1760038930,
|
||||
"narHash": "sha256-Oncbh0UmHjSlxO7ErQDM3KM0A5/Znfofj2BSzlHLeVw=",
|
||||
"lastModified": 1765779637,
|
||||
"narHash": "sha256-KJ2wa/BLSrTqDjbfyNx70ov/HdgNBCBBSQP3BIzKnv4=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "0b4defa2584313f3b781240b29d61f6f9f7e0df3",
|
||||
"rev": "1306659b587dc277866c7b69eb97e5f07864d8c4",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
||||
32
flake.nix
32
flake.nix
@@ -7,7 +7,7 @@
|
||||
# pydev.url ="./system/extras/pydev/";
|
||||
currents.url = "github:autumnalmusing/currents/main";
|
||||
#regular flakes
|
||||
nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-unstable";
|
||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||
lix.url = "https://git.lix.systems/lix-project/lix/archive/main.tar.gz";
|
||||
lix.flake = false;
|
||||
lix-module = {
|
||||
@@ -69,6 +69,29 @@
|
||||
./home/autumn/sysconfs/wsl-hive.nix
|
||||
];
|
||||
};
|
||||
"autumn@hoardfrost" = home-manager.lib.homeManagerConfiguration{
|
||||
extraSpecialArgs = specialArgs;
|
||||
pkgs = pkgs;
|
||||
modules = [
|
||||
./home/autumn/sysconfs/hoardfrost.nix
|
||||
];
|
||||
};
|
||||
"autumn@rhiannon" = home-manager.lib.homeManagerConfiguration{
|
||||
extraSpecialArgs = specialArgs;
|
||||
pkgs = pkgs;
|
||||
modules = [
|
||||
./home/autumn/home.nix
|
||||
./home/autumn/sysconfs/yukigekko.nix
|
||||
];
|
||||
};
|
||||
"autumn@macha" = home-manager.lib.homeManagerConfiguration{
|
||||
extraSpecialArgs = specialArgs;
|
||||
pkgs = pkgs;
|
||||
modules = [
|
||||
./home/autumn/home.nix
|
||||
./home/autumn/sysconfs/lesbos.nix
|
||||
];
|
||||
};
|
||||
};
|
||||
nixosConfigurations = {
|
||||
"yukigekko" = nixpkgs.lib.nixosSystem{
|
||||
@@ -86,6 +109,13 @@
|
||||
./system/lesbos/configuration.nix
|
||||
];
|
||||
};
|
||||
"hoardfrost" = nixpkgs.lib.nixosSystem{
|
||||
system = system;
|
||||
specialArgs = specialArgs;
|
||||
modules = [
|
||||
./system/hoardfrost/configuration.nix
|
||||
];
|
||||
};
|
||||
"wsl-hive" = nixpkgs.lib.nixosSystem{
|
||||
specialArgs = specialArgs;
|
||||
system = system;
|
||||
|
||||
@@ -53,9 +53,5 @@
|
||||
# package bundles
|
||||
../bundles/langs.nix
|
||||
|
||||
## Development
|
||||
inputs.currents.homeManagerModules.currents
|
||||
];
|
||||
|
||||
services.currents.enable = true;
|
||||
}
|
||||
|
||||
65
home/autumn/sysconfs/hoardfrost.nix
Normal file
65
home/autumn/sysconfs/hoardfrost.nix
Normal file
@@ -0,0 +1,65 @@
|
||||
{config, pkgs, ...}:
|
||||
|
||||
{
|
||||
home = {
|
||||
username = "autumn";
|
||||
homeDirectory = "/home/autumn";
|
||||
stateVersion = "25.11";
|
||||
packages = with pkgs; [
|
||||
htop
|
||||
gnumake
|
||||
neofetch
|
||||
oh-my-zsh
|
||||
];
|
||||
};
|
||||
xdg.configFile."starship.toml".source = ./packages/starship/starship.toml;
|
||||
# programs.bash.initExtra = [
|
||||
# "zsh"
|
||||
# "starship init zsh"
|
||||
# ];
|
||||
programs.starship.enable = true;
|
||||
programs.starship.enableZshIntegration = true;
|
||||
programs.git = {
|
||||
enable = true;
|
||||
userEmail = "autumnal.musing@gmail.com";
|
||||
userName = "autumn";
|
||||
};
|
||||
|
||||
programs.zsh = {
|
||||
enable = true;
|
||||
antidote = {
|
||||
enable = true;
|
||||
plugins = [
|
||||
"zsh-users/zsh-autosuggestions"
|
||||
"zsh-users/zsh-syntax-highlighting"
|
||||
];
|
||||
useFriendlyNames = true;
|
||||
};
|
||||
autosuggestion = {
|
||||
enable = true;
|
||||
};
|
||||
shellAliases = {
|
||||
".." = "cd ..";
|
||||
"..." = "cd ../..";
|
||||
"...." = "cd ../../..";
|
||||
"pls" = "pls -d typ -d perm -d user -d group -d size -d mtime -d git";
|
||||
"z" = "zoxide";
|
||||
};
|
||||
sessionVariables ={
|
||||
SERVDIR = "/srv/samba/hoardfrost/mainstore";
|
||||
};
|
||||
oh-my-zsh = {
|
||||
enable = true;
|
||||
plugins = [
|
||||
"git"
|
||||
"sudo"
|
||||
"colored-man-pages"
|
||||
"colorize"
|
||||
"cp"
|
||||
# "zoxide"
|
||||
# "ssh-agent"
|
||||
"command-not-found"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
||||
@@ -1,4 +1,4 @@
|
||||
{config, pkgs, ...}:
|
||||
{config, pkgs, inputs, ...}:
|
||||
{
|
||||
home.packages = with pkgs; [
|
||||
obsidian
|
||||
@@ -15,9 +15,13 @@
|
||||
# ../../packages/twmn/twmn.nix
|
||||
../../packages/mako/mako.nix
|
||||
../../packages/fuzzel/fuzzel.nix
|
||||
# ../../packages/avizo/avizo.nix
|
||||
../../packages/avizo/avizo.nix
|
||||
../../packages/niri/niri.nix
|
||||
# Distrobox containers
|
||||
../../boxes/archlinux/box-archlinux.nix
|
||||
# ../../boxes/archlinux/box-archlinux.nix
|
||||
|
||||
inputs.currents.homeManagerModules.currents
|
||||
];
|
||||
|
||||
services.currents.enable = true;
|
||||
}
|
||||
|
||||
@@ -16,8 +16,6 @@
|
||||
};
|
||||
};
|
||||
window = {
|
||||
opacity = 0.9;
|
||||
blur = true;
|
||||
padding = {x=0;y=15;};
|
||||
};
|
||||
colors = {
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
dracula_trans = ./dracula_trans.toml;
|
||||
};
|
||||
settings = {
|
||||
theme = "everforest_dark_trans";
|
||||
theme = "everforest_dark";
|
||||
editor = {
|
||||
mouse = true;
|
||||
middle-click-paste = true;
|
||||
|
||||
118
home/packages/niri/niri.kdl
Normal file
118
home/packages/niri/niri.kdl
Normal file
@@ -0,0 +1,118 @@
|
||||
input {
|
||||
keyboard {
|
||||
xkb {
|
||||
layout "us"
|
||||
}
|
||||
}
|
||||
touchpad {
|
||||
tap
|
||||
accel-speed 0.0
|
||||
scroll-method "two-finger"
|
||||
middle-emulation
|
||||
drag true
|
||||
tap-button-map "left-right-middle"
|
||||
disabled-on-external-mouse
|
||||
}
|
||||
focus-follows-mouse max-scroll-amount="60%"
|
||||
}
|
||||
layout {
|
||||
gaps 10
|
||||
center-focused-column "on-overflow"
|
||||
preset-column-widths {
|
||||
proportion 0.3333333
|
||||
proportion 0.5
|
||||
proportion 0.6666667
|
||||
proportion 1.0
|
||||
}
|
||||
preset-window-heights{
|
||||
proportion 1.0
|
||||
proportion 0.75
|
||||
proportion 0.5
|
||||
proportion 0.25
|
||||
}
|
||||
default-column-width { proportion 0.6666667; }
|
||||
focus-ring { off; }
|
||||
border {
|
||||
width 4
|
||||
active-color "#7fbbb3"
|
||||
inactive-color "#d3c6aa"
|
||||
urgent-color "#e67e80"
|
||||
}
|
||||
}
|
||||
window-rule {
|
||||
geometry-corner-radius 8
|
||||
clip-to-geometry true
|
||||
}
|
||||
window-rule{
|
||||
match app-id="Alacritty"
|
||||
match is-focused=true
|
||||
opacity 0.95
|
||||
}
|
||||
// spawn-at-startup "waybar"
|
||||
spawn-at-startup "swaybg" "-i" "~/Downloads/wp.jpg"
|
||||
spawn-at-startup "avizo-service"
|
||||
binds {
|
||||
//spawn binds
|
||||
Super+Shift+Slash {show-hotkey-overlay;}
|
||||
Super+Return hotkey-overlay-title="Alacritty" {spawn "alacritty";}
|
||||
Super+R hotkey-overlay-title="Fuzzel" {spawn "fuzzel";}
|
||||
Super+E hotkey-overlay-title="File Manager" {spawn "pcmanfm";}
|
||||
Super+B hotkey-overlay-title="Obsidian" {spawn "obsidian";}
|
||||
Super+Escape hotkey-overlay-title="Lock" {spawn "swaylock --screenshots --clock --indicator --indicator-radius 250 --indicator-thickness 12 --effect-blur 7x5 --ring-color 7fbbb3 --line-color d3c6aa --inside-color 2b3339 --separator-color 83c092";}
|
||||
Super+Shift+E hotkey-overlay-title="Quit" {quit;}
|
||||
Super+Q hotkey-overlay-title="Close" {close-window;}
|
||||
Super+O hotkey-overlay-title="Toggle Overview" {toggle-overview;}
|
||||
Super+KP_Subtract {spawn "swaybg" "-i" "~/Downloads/wp.jpg";}
|
||||
|
||||
Super+H {focus-column-left;}
|
||||
Super+J {focus-window-down;}
|
||||
Super+K {focus-window-up;}
|
||||
Super+L {focus-column-right;}
|
||||
Super+Left {focus-column-left;}
|
||||
Super+Down {focus-window-down;}
|
||||
Super+Up {focus-window-up;}
|
||||
Super+Right {focus-column-right;}
|
||||
Super+Shift+H {move-column-left;}
|
||||
Super+Shift+J {move-window-down;}
|
||||
Super+Shift+K {move-window-up;}
|
||||
Super+Shift+L {move-column-right;}
|
||||
Super+Shift+Left {move-column-left;}
|
||||
Super+Shift+Down {move-window-down;}
|
||||
Super+Shift+Up {move-window-up;}
|
||||
Super+Shift+Right {move-column-right;}
|
||||
Super+Home {focus-column-first;}
|
||||
Super+End {focus-column-last;}
|
||||
Super+1 {focus-workspace 1;}
|
||||
Super+2 {focus-workspace 2;}
|
||||
Super+3 {focus-workspace 3;}
|
||||
Super+4 {focus-workspace 4;}
|
||||
Super+5 {focus-workspace 5;}
|
||||
Super+6 {focus-workspace 6;}
|
||||
Super+7 {focus-workspace 7;}
|
||||
Super+8 {focus-workspace 8;}
|
||||
Super+9 {focus-workspace 9;}
|
||||
// Super+10 {focus-workspace 10;}
|
||||
Super+Shift+1 {move-column-to-workspace 1;}
|
||||
Super+Shift+2 {move-column-to-workspace 2;}
|
||||
Super+Shift+3 {move-column-to-workspace 3;}
|
||||
Super+Shift+4 {move-column-to-workspace 4;}
|
||||
Super+Shift+5 {move-column-to-workspace 5;}
|
||||
Super+Shift+6 {move-column-to-workspace 6;}
|
||||
Super+Shift+7 {move-column-to-workspace 7;}
|
||||
Super+Shift+8 {move-column-to-workspace 8;}
|
||||
Super+Shift+9 {move-column-to-workspace 9;}
|
||||
Super+BracketLeft {consume-or-expel-window-left;}
|
||||
Super+BracketRight {consume-or-expel-window-right;}
|
||||
Super+Comma {consume-window-into-column;}
|
||||
Super+Period {expel-window-from-column;}
|
||||
Super+A {switch-preset-column-width;}
|
||||
Super+Shift+A {switch-preset-window-height;}
|
||||
Super+F {maximize-column;}
|
||||
Super+Shift+F {fullscreen-window;}
|
||||
Super+V {toggle-window-floating;}
|
||||
Super+W {toggle-column-tabbed-display;}
|
||||
Super+Page_Down {focus-workspace-down;}
|
||||
Super+Page_Up {focus-workspace-up;}
|
||||
Super+Shift+Page_Down{move-column-to-workspace-down;}
|
||||
Super+Shift+Page_Up{move-column-to-workspace-up;}
|
||||
}
|
||||
6
home/packages/niri/niri.nix
Normal file
6
home/packages/niri/niri.nix
Normal file
@@ -0,0 +1,6 @@
|
||||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
xdg.configFile."niri/config.kdl".source = ./niri.kdl;
|
||||
}
|
||||
|
||||
@@ -1,12 +1,11 @@
|
||||
* {
|
||||
font-family: JetBrains Mono, Font Awesome 6 Free;
|
||||
font-family: "Hack Nerd Font Mono";
|
||||
font-size: 13px;
|
||||
}
|
||||
|
||||
window#waybar {
|
||||
color: #ffffff;
|
||||
background-color: #1e3b28;
|
||||
border-bottom: 3px solid #8f2fef;
|
||||
color: #d3c6aa;
|
||||
background-color: #2b3339;
|
||||
transition-property: background-color;
|
||||
transition-duration: .5s;
|
||||
}
|
||||
@@ -15,34 +14,56 @@ window#waybar.hidden {
|
||||
opacity: 0.2;
|
||||
}
|
||||
|
||||
.modules-left,
|
||||
.modules-center,
|
||||
.modules-right {
|
||||
border: 3px solid #7fbbb3;
|
||||
border-radius: 4px;
|
||||
padding: 0 5px;
|
||||
}
|
||||
|
||||
#custom-weather {
|
||||
/* border-bottom: #a7c080; */
|
||||
}
|
||||
|
||||
button {
|
||||
box-shadow: inset 0 -3px transparent;
|
||||
border: none;
|
||||
border: 1px #000000 solid;
|
||||
border-radius: 0;
|
||||
color: #d3c6aa;
|
||||
}
|
||||
|
||||
button:hover {
|
||||
background: inherit;
|
||||
box-shadow: inset 0 -3px #ffffff;
|
||||
box-shadow: inset 0 -3px #7fbbb3;
|
||||
opacity: 0.8;
|
||||
}
|
||||
|
||||
#workspaces button {
|
||||
padding: 0 15px;
|
||||
#workspaces button,
|
||||
#tags button {
|
||||
padding: 0 5px;
|
||||
background-color: transparent;
|
||||
border: 2px solid #8f2fef
|
||||
border: 2px solid #d3c6aa;
|
||||
margin: 3px;
|
||||
}
|
||||
|
||||
#workspaces button:hover {
|
||||
background: rgba(255, 255, 255, 0.2);
|
||||
#workspaces button.active,
|
||||
#tags button.occupied {
|
||||
background: #d3c6aa;
|
||||
border: 1px solid #2b3339;
|
||||
color: #2b3339;
|
||||
}
|
||||
|
||||
#workspaces button.focused {
|
||||
background-color: #8f2fef;
|
||||
box-shadow: inset 0 -3px #ffffff;
|
||||
#workspaces button.focused,
|
||||
#tags button.focused {
|
||||
background-color: #7fbbb3;
|
||||
color: #2b3339;
|
||||
border: 1px solid #2b3339;
|
||||
/* border-bottom: 3px solid #2b3339; */
|
||||
}
|
||||
|
||||
#workspaces button.urgent {
|
||||
background-color: #f38ba8;
|
||||
#tags button.urgent {
|
||||
background-color: #e67e80;
|
||||
}
|
||||
|
||||
#backlight,
|
||||
@@ -55,10 +76,9 @@ button:hover {
|
||||
#pulseaudio,
|
||||
#temperature,
|
||||
#tray,
|
||||
#idle_inhibitor,
|
||||
#keyboard-state,
|
||||
#power-profiles-daemon {
|
||||
padding: 0 8px;
|
||||
color: #d3c6aa;
|
||||
}
|
||||
|
||||
#window,
|
||||
@@ -66,126 +86,80 @@ button:hover {
|
||||
margin: 0 8px;
|
||||
}
|
||||
|
||||
.modules-left>widget:first-child>#workspaces {
|
||||
margin-left: 0;
|
||||
}
|
||||
|
||||
.modules-right>widget:last-child>#workspaces {
|
||||
margin-right: 0;
|
||||
}
|
||||
|
||||
#backlight {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #cba6f7;
|
||||
/* border-bottom: 3px solid #7fbbb3; */
|
||||
}
|
||||
|
||||
#battery {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a6e3a1;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
font-size: 18px;
|
||||
}
|
||||
|
||||
#battery.critical.discharging {
|
||||
background-color: #f38ba8;
|
||||
animation: blink 1s infinite;
|
||||
background-color: #e67e80;
|
||||
/* animation: blink 5s infinite; */
|
||||
}
|
||||
|
||||
#battery.warning.discharging {
|
||||
background-color: #f9e2af;
|
||||
animation: blink 1s infinite;
|
||||
background-color: #dbbc7f;
|
||||
/* animation: blink 10s infinite; */
|
||||
}
|
||||
|
||||
@keyframes blink {
|
||||
to {
|
||||
background-color: transparent;
|
||||
}
|
||||
}
|
||||
/* @keyframes blink { */
|
||||
/* to { */
|
||||
/* background-color: transparent; */
|
||||
/* } */
|
||||
/* } */
|
||||
|
||||
#clock {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a6e3a1;
|
||||
/* border-bottom: 3px solid #a7c080; */
|
||||
}
|
||||
|
||||
#cpu {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #cba6f7;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#memory {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f9e2af;
|
||||
}
|
||||
|
||||
#mode {
|
||||
color: #ffffff;
|
||||
background-color: #8f2fef;
|
||||
border-bottom: 3px solid #ffffff;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#network {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a6e3a1;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#network.disconnected {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f38ba8;
|
||||
/* border-bottom: 3px solid #f38ba8; */
|
||||
}
|
||||
|
||||
#pulseaudio {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a6e3a1;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#pulseaudio.muted {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f38ba8;
|
||||
/* border-bottom: 3px solid #e67e80; */
|
||||
}
|
||||
|
||||
#temperature {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a6e3a1;
|
||||
border-right: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#temperature.critical {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f38ba8;
|
||||
/* border-bottom: 3px solid #e67e80; */
|
||||
}
|
||||
|
||||
#tray {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #8f2fef;
|
||||
}
|
||||
|
||||
#idle_inhibitor {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f9e2af;
|
||||
}
|
||||
|
||||
#idle_inhibitor.activated {
|
||||
color: #1e3b28;
|
||||
background-color: #f9e2af;
|
||||
border-bottom: 3px solid #f9e2af;
|
||||
}
|
||||
|
||||
#keyboard-state {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #fab387;
|
||||
}
|
||||
|
||||
#power-profiles-daemon {
|
||||
color: #ffffff;
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #94e2d5;
|
||||
}
|
||||
border-left: 3px solid #7fbbb3;
|
||||
}
|
||||
@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, ... }:
|
||||
{ ... }:
|
||||
|
||||
{
|
||||
programs.waybar = {
|
||||
@@ -8,17 +8,19 @@
|
||||
mainBar = {
|
||||
layer = "top";
|
||||
position = "top";
|
||||
height = 30;
|
||||
height = 45;
|
||||
spacing = 4;
|
||||
|
||||
# Module layout
|
||||
#
|
||||
modules-left = [
|
||||
"river/tags"
|
||||
"niri/workspaces"
|
||||
];
|
||||
modules-center = [
|
||||
"custom/currents"
|
||||
"river/window"
|
||||
"niri/window"
|
||||
];
|
||||
modules-right = [
|
||||
"pulseaudio"
|
||||
@@ -74,11 +76,20 @@
|
||||
hide-vacant = true;
|
||||
};
|
||||
|
||||
"niri/workspaces" = {
|
||||
format = "{index}";
|
||||
};
|
||||
|
||||
"river/window" = {
|
||||
format = "{}";
|
||||
max-length = 20;
|
||||
};
|
||||
|
||||
|
||||
"niri/window" = {
|
||||
format = "{}";
|
||||
max-length = 20;
|
||||
};
|
||||
|
||||
"tray" = {
|
||||
icon-size = 21;
|
||||
spacing = 10;
|
||||
@@ -121,10 +132,10 @@
|
||||
};
|
||||
format = "{icon} {capacity}%";
|
||||
format-full = "{icon} Full";
|
||||
format-charging = "{icon} Charging {capacity}% {time}";
|
||||
format-plugged = "{icon} Charge complete";
|
||||
format-charging = "{icon} {capacity}% {time}";
|
||||
format-plugged = "{icon} ";
|
||||
format-good = ">{icon} {capacity}%";
|
||||
format-icons = ["" "" "" "" "" "" "" ""];
|
||||
format-icons = [" " " " " " " " " "];
|
||||
};
|
||||
|
||||
"network#wifi" = {
|
||||
@@ -154,163 +165,13 @@
|
||||
on-click = "pavucontrol";
|
||||
};
|
||||
};
|
||||
"custom/currents"= {
|
||||
interval= 150;
|
||||
exec= "/home/autumn/.local/bin/currents --output";
|
||||
return-type= "json";
|
||||
};
|
||||
"custom/currents"= {
|
||||
interval= 150;
|
||||
exec= "/home/autumn/.local/bin/currents --output";
|
||||
return-type= "json";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
style = ''
|
||||
* {
|
||||
font-family: "Hack Nerd Font Mono";
|
||||
font-size: 13px;
|
||||
}
|
||||
window#waybar {
|
||||
color: #d3c6aa;
|
||||
background-color: #2b3339;
|
||||
border-bottom: 3px solid #7fbbb3;
|
||||
transition-property: background-color;
|
||||
transition-duration: .5s;
|
||||
}
|
||||
|
||||
window#waybar.hidden {
|
||||
opacity: 0.2;
|
||||
}
|
||||
#custom-weather{
|
||||
border-bottom: #a7c080;
|
||||
}
|
||||
button {
|
||||
box-shadow: inset 0 -3px transparent;
|
||||
border: 1px #000000 solid;
|
||||
border-radius: 0;
|
||||
color:#d3c6aa;
|
||||
|
||||
}
|
||||
button:hover {
|
||||
background: inherit;
|
||||
box-shadow: inset 0 -3px #7fbbb3;
|
||||
}
|
||||
|
||||
#tags button {
|
||||
padding: 0 15px;
|
||||
background-color: transparent;
|
||||
border: 2px solid #d3c6aa;
|
||||
}
|
||||
|
||||
#tags button.occupied {
|
||||
background: #d3c6aa;
|
||||
border: 1px solid #2b3339;
|
||||
color:#2b3339;
|
||||
}
|
||||
|
||||
#tags button.focused {
|
||||
background-color: #7fbbb3;
|
||||
color: #2b3339;
|
||||
border: 1px solid #2b3339;
|
||||
border-bottom: 3px solid #2b3339;
|
||||
}
|
||||
|
||||
#tags button.urgent {
|
||||
background-color: #e67e80;
|
||||
}
|
||||
|
||||
#backlight,
|
||||
#battery,
|
||||
#clock,
|
||||
#cpu,
|
||||
#memory,
|
||||
#mode,
|
||||
#network,
|
||||
#pulseaudio,
|
||||
#temperature,
|
||||
#tray,
|
||||
#power-profiles-daemon {
|
||||
padding: 0 8px;
|
||||
color:#d3c6aa;
|
||||
}
|
||||
|
||||
#window,
|
||||
#workspaces {
|
||||
margin: 0 8px;
|
||||
}
|
||||
|
||||
#backlight {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#battery {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a7c080;
|
||||
}
|
||||
|
||||
#battery.critical.discharging {
|
||||
background-color: #e67e80;
|
||||
animation: blink 5s infinite;
|
||||
}
|
||||
|
||||
#battery.warning.discharging {
|
||||
background-color: #dbbc7f;
|
||||
animation: blink 10s infinite;
|
||||
}
|
||||
|
||||
@keyframes blink {
|
||||
to {
|
||||
background-color: transparent;
|
||||
}
|
||||
}
|
||||
|
||||
#clock {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a7c080;
|
||||
}
|
||||
|
||||
#cpu {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#memory {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #dbbc7f;
|
||||
}
|
||||
|
||||
#network {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a7c080;
|
||||
}
|
||||
|
||||
#network.disconnected {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #f38ba8;
|
||||
}
|
||||
|
||||
#pulseaudio {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #7fbbb3;
|
||||
}
|
||||
|
||||
#pulseaudio.muted {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #e67e80;
|
||||
}
|
||||
|
||||
#temperature {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #a7c080;
|
||||
}
|
||||
|
||||
#temperature.critical {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #e67e80;
|
||||
}
|
||||
|
||||
#tray {
|
||||
background-color: transparent;
|
||||
border-bottom: 3px solid #7fbbb3;
|
||||
}
|
||||
'';
|
||||
};
|
||||
xdg.configFile."waybar/style.css".source = ./waybar.css;
|
||||
}
|
||||
|
||||
@@ -5,6 +5,10 @@
|
||||
name = "oreo-cursors-plus";
|
||||
package = pkgs.oreo-cursors-plus;
|
||||
size = 32;
|
||||
gtk.enable = true;
|
||||
};
|
||||
gtk.enable = true;
|
||||
gtk.cursorTheme = {
|
||||
package = pkgs.oreo-cursors-plus;
|
||||
name = "oreo-cursors-plus";
|
||||
};
|
||||
}
|
||||
|
||||
@@ -5,4 +5,5 @@
|
||||
systemd-boot.enable = true;
|
||||
efi.canTouchEfiVariables = true;
|
||||
};
|
||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
||||
}
|
||||
|
||||
4
system/defaults/security.nix
Normal file
4
system/defaults/security.nix
Normal file
@@ -0,0 +1,4 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
security.polkit.enable = true;
|
||||
}
|
||||
161
system/hoardfrost/configuration.nix
Normal file
161
system/hoardfrost/configuration.nix
Normal file
@@ -0,0 +1,161 @@
|
||||
# Edit this configuration file to define what should be installed on
|
||||
# your system. Help is available in the configuration.nix(5) man page
|
||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||||
|
||||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
|
||||
../packages/rust-motd/rust-motd.nix
|
||||
|
||||
../services/samba.nix
|
||||
../services/openssh.nix
|
||||
../services/endlessh.nix
|
||||
# ./services/currents.nix
|
||||
#. ./services/tailscale.nix.
|
||||
|
||||
# ./services/containerization/currents.nix
|
||||
../services/containerization/docker.nix
|
||||
../services/containerization/mealie.nix
|
||||
../services/containerization/transtun.nix
|
||||
../services/containerization/stirlingpdf.nix
|
||||
];
|
||||
|
||||
# Bootloader.
|
||||
boot.loader.systemd-boot.enable = true;
|
||||
boot.loader.efi.canTouchEfiVariables = true;
|
||||
|
||||
nix.settings.experimental-features = [
|
||||
"nix-command"
|
||||
"flakes"
|
||||
];
|
||||
services.tailscale.enable = true;
|
||||
|
||||
networking.hostName = "hoardfrost"; # Define your hostname.
|
||||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||||
|
||||
# Configure network proxy if necessary
|
||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||||
|
||||
# Enable networking
|
||||
networking.networkmanager.enable = true;
|
||||
|
||||
# Set your time zone.
|
||||
time.timeZone = "America/Denver";
|
||||
|
||||
# Select internationalisation properties.
|
||||
i18n.defaultLocale = "en_US.UTF-8";
|
||||
|
||||
i18n.extraLocaleSettings = {
|
||||
LC_ADDRESS = "en_US.UTF-8";
|
||||
LC_IDENTIFICATION = "en_US.UTF-8";
|
||||
LC_MEASUREMENT = "en_US.UTF-8";
|
||||
LC_MONETARY = "en_US.UTF-8";
|
||||
LC_NAME = "en_US.UTF-8";
|
||||
LC_NUMERIC = "en_US.UTF-8";
|
||||
LC_PAPER = "en_US.UTF-8";
|
||||
LC_TELEPHONE = "en_US.UTF-8";
|
||||
LC_TIME = "en_US.UTF-8";
|
||||
};
|
||||
|
||||
# Configure keymap in X11
|
||||
services = {
|
||||
xserver.xkb = {
|
||||
layout = "us";
|
||||
variant = "";
|
||||
};
|
||||
};
|
||||
networking.firewall.enable = true;
|
||||
networking.firewall.allowPing = true;
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
22
|
||||
53
|
||||
137
|
||||
138
|
||||
139
|
||||
389
|
||||
445
|
||||
2022
|
||||
8080
|
||||
5657
|
||||
41641
|
||||
];
|
||||
networking.firewall.allowedUDPPorts = [
|
||||
22
|
||||
53
|
||||
137
|
||||
138
|
||||
139
|
||||
389
|
||||
445
|
||||
2022
|
||||
41641
|
||||
];
|
||||
|
||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||||
programs.zsh.enable = true;
|
||||
users = {
|
||||
defaultUserShell = pkgs.zsh;
|
||||
users.autumn = {
|
||||
isNormalUser = true;
|
||||
description = "autumn";
|
||||
extraGroups = [
|
||||
"networkmanager"
|
||||
"wheel"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
# Allow unfree packages
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
# List packages installed in system profile. To search, run:
|
||||
# $ nix search wget
|
||||
environment.systemPackages = with pkgs; [
|
||||
helix
|
||||
git
|
||||
nil
|
||||
inetutils
|
||||
nh
|
||||
toybox
|
||||
nodejs_24
|
||||
jdk17
|
||||
rustup
|
||||
# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
|
||||
# wget
|
||||
];
|
||||
virtualisation.podman = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
# Some programs need SUID wrappers, can be configured further or are
|
||||
# started in user sessions.
|
||||
# programs.mtr.enable = true;
|
||||
# programs.gnupg.agent = {
|
||||
# enable = true;
|
||||
# enableSSHSupport = true;
|
||||
# };
|
||||
|
||||
# List services that you want to enable:
|
||||
|
||||
# Enable the OpenSSH daemon.
|
||||
# services.openssh.enable = true;
|
||||
|
||||
# Open ports in the firewall.
|
||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||
# Or disable the firewall altogether.
|
||||
# networking.firewall.enable = false;
|
||||
|
||||
# This value determines the NixOS release from which the default
|
||||
# settings for stateful data, like file locations and database versions
|
||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "25.05"; # Did you read the comment?
|
||||
|
||||
}
|
||||
48
system/hoardfrost/flake.lock
generated
Normal file
48
system/hoardfrost/flake.lock
generated
Normal file
@@ -0,0 +1,48 @@
|
||||
{
|
||||
"nodes": {
|
||||
"home-manager": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1761191301,
|
||||
"narHash": "sha256-xsRL2Oyb4YRZZ1Tu4WzR2uFg1n931bH+PfLdFcqtLg8=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "4958aafe7b237dc1e857fb0c916efff72075048f",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1761114652,
|
||||
"narHash": "sha256-f/QCJM/YhrV/lavyCVz8iU3rlZun6d+dAiC3H+CDle4=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "01f116e4df6a15f4ccdffb1bcd41096869fb385c",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nixos",
|
||||
"ref": "nixos-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"home-manager": "home-manager",
|
||||
"nixpkgs": "nixpkgs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
"version": 7
|
||||
}
|
||||
39
system/hoardfrost/flake.nix
Normal file
39
system/hoardfrost/flake.nix
Normal file
@@ -0,0 +1,39 @@
|
||||
{
|
||||
description = "Hoardfrost multipurpose server";
|
||||
|
||||
inputs = {
|
||||
nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-unstable";
|
||||
home-manager.url = "github:nix-community/home-manager";
|
||||
home-manager.inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
|
||||
outputs = {self, nixpkgs, home-manager, ...}@inputs:
|
||||
let
|
||||
system = "x86_64-linux";
|
||||
pkgs = nixpkgs.legacyPackages.${system};
|
||||
timezone = "America/Denver";
|
||||
locale = "en_US.UTF-8";
|
||||
specialArgs = {
|
||||
inherit inputs;
|
||||
inherit system;
|
||||
inherit timezone;
|
||||
inherit locale;
|
||||
};
|
||||
in {
|
||||
|
||||
homeConfigurations.autumn = home-manager.lib.homeManagerConfiguration{
|
||||
extraSpecialArgs = specialArgs;
|
||||
pkgs = pkgs;
|
||||
modules = [
|
||||
./home.nix
|
||||
];
|
||||
};
|
||||
nixosConfigurations.hoardfrost = nixpkgs.lib.nixosSystem{
|
||||
system = system;
|
||||
specialArgs = specialArgs;
|
||||
modules = [
|
||||
./configuration.nix
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
||||
38
system/hoardfrost/hardware-configuration.nix
Normal file
38
system/hoardfrost/hardware-configuration.nix
Normal file
@@ -0,0 +1,38 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/4f1eff7d-8a8c-4a7f-857b-f4e58b7a5f90";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/C802-4F6B";
|
||||
fsType = "vfat";
|
||||
options = [ "fmask=0077" "dmask=0077" ];
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.enp5s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
57
system/packages/rust-motd/rust-motd.nix
Normal file
57
system/packages/rust-motd/rust-motd.nix
Normal file
@@ -0,0 +1,57 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
environment.systemPackages = with pkgs; [figlet];
|
||||
programs.rust-motd = {
|
||||
enable = true;
|
||||
order = [
|
||||
"global"
|
||||
"banner"
|
||||
"weather"
|
||||
"uptime"
|
||||
"last_login"
|
||||
"memory"
|
||||
"service_status"
|
||||
"filesystems"
|
||||
"load_avg"
|
||||
];
|
||||
settings = {
|
||||
global = {
|
||||
version = "1.0";
|
||||
};
|
||||
banner = {
|
||||
color = "blue";
|
||||
command = "hostname | figlet -f sblood";
|
||||
};
|
||||
weather = {
|
||||
loc = "Denver,Colorado";
|
||||
style = "full";
|
||||
};
|
||||
service_status = {
|
||||
samba = "samba-wsdd.service";
|
||||
openssh = "sshd.service";
|
||||
mealie = "podman-postgres-mealie.service";
|
||||
stirling = "podman-stirling-pdf.service";
|
||||
tbrowser = "podman-torrent-browser.service";
|
||||
seas = "podman-transmission-openvpn.service";
|
||||
tailscale = "tailscaled.service";
|
||||
firewall = "firewall.service";
|
||||
endlessh = "endlessh.service";
|
||||
};
|
||||
uptime = {
|
||||
prefix = "up";
|
||||
};
|
||||
memory = {
|
||||
swap_pos = "beside";
|
||||
};
|
||||
last_login = {
|
||||
autumn = 2;
|
||||
};
|
||||
filesystems = {
|
||||
root = "/";
|
||||
};
|
||||
load_avg = {
|
||||
format = "Load (1, 5, 15 min.): {one:.02}, {five:.02}, {fifteen:.02}";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
118
system/packages/starship/starship.toml
Normal file
118
system/packages/starship/starship.toml
Normal file
@@ -0,0 +1,118 @@
|
||||
add_newline = true
|
||||
|
||||
[aws]
|
||||
disabled = true
|
||||
|
||||
[battery]
|
||||
disabled = true
|
||||
|
||||
[character]
|
||||
success_symbol = "[](bold green)"
|
||||
error_symbol = "[](bold red)"
|
||||
vicmd_symbol = "[](bold green)"
|
||||
|
||||
[cmd_duration]
|
||||
|
||||
[conda]
|
||||
|
||||
[directory]
|
||||
truncation_length = 3
|
||||
|
||||
[dotnet]
|
||||
disabled = true
|
||||
|
||||
[env_var]
|
||||
disabled = true
|
||||
|
||||
[elixir]
|
||||
symbol = " "
|
||||
|
||||
[elm]
|
||||
symbol = " "
|
||||
|
||||
[git_branch]
|
||||
symbol = " "
|
||||
|
||||
[git_commit]
|
||||
disabled = false
|
||||
commit_hash_length = 4
|
||||
|
||||
[git_state]
|
||||
disabled = true
|
||||
|
||||
[git_status]
|
||||
conflicted = "=${count}"
|
||||
ahead = "⇡${count}"
|
||||
behind = "⇣${count}"
|
||||
diverged = "⇕⇡${ahead_count}⇣${behind_count}"
|
||||
untracked = "?${count}"
|
||||
stashed = "\\$${count}"
|
||||
modified = "!${count}"
|
||||
staged = "+${count}"
|
||||
renamed = "»${count}"
|
||||
deleted = "✘${count}"
|
||||
|
||||
[gcloud]
|
||||
disabled = true
|
||||
|
||||
[golang]
|
||||
symbol = " "
|
||||
|
||||
[hostname]
|
||||
|
||||
[jobs]
|
||||
|
||||
[kubernetes]
|
||||
symbol = " "
|
||||
disabled = false
|
||||
|
||||
[line_break]
|
||||
disabled = false
|
||||
|
||||
[lua]
|
||||
symbol = " "
|
||||
lua_binary = "luajit"
|
||||
|
||||
[nix_shell]
|
||||
disabled = true
|
||||
|
||||
[memory_usage]
|
||||
disabled = true
|
||||
|
||||
[java]
|
||||
symbol = " "
|
||||
|
||||
[julia]
|
||||
|
||||
[nim]
|
||||
|
||||
[nodejs]
|
||||
symbol = " "
|
||||
|
||||
[package]
|
||||
symbol = " "
|
||||
|
||||
[php]
|
||||
symbol = " "
|
||||
|
||||
[python]
|
||||
symbol = " "
|
||||
|
||||
[ruby]
|
||||
symbol = " "
|
||||
|
||||
[rust]
|
||||
symbol = " "
|
||||
|
||||
[scala]
|
||||
symbol = " "
|
||||
|
||||
[terraform]
|
||||
symbol = " "
|
||||
format = "via [$symbol$version]($style)"
|
||||
|
||||
[time]
|
||||
disabled = true
|
||||
|
||||
[username]
|
||||
disabled = false
|
||||
12
system/services/containerization/docker.nix
Normal file
12
system/services/containerization/docker.nix
Normal file
@@ -0,0 +1,12 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
environment.systemPackages = with pkgs;[
|
||||
podman
|
||||
docker-compose
|
||||
];
|
||||
|
||||
virtualisation = {
|
||||
docker.enable = true;
|
||||
};
|
||||
users.users.autumn.extraGroups = ["docker"];
|
||||
}
|
||||
38
system/services/containerization/mealie.nix
Normal file
38
system/services/containerization/mealie.nix
Normal file
@@ -0,0 +1,38 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
virtualisation.oci-containers.containers = {
|
||||
mealie = {
|
||||
image = "ghcr.io/mealie-recipes/mealie:v3.3.2";
|
||||
ports = [
|
||||
"9000:9000"
|
||||
];
|
||||
volumes = [
|
||||
"/home/autumn/mealie/mealie-data:/app/data"
|
||||
];
|
||||
environment = {
|
||||
DB_ENGINE= "postgres";
|
||||
POSTGRES_USER = "mealie";
|
||||
POSTGRES_PASSWORD = "mealie";
|
||||
POSTGRES_SERVER = "localhost:5432";
|
||||
POSTGRES_PORT = "5432";
|
||||
POSTGRES_DB = "mealie";
|
||||
TZ = "America/Denver";
|
||||
};
|
||||
dependsOn = [
|
||||
"postgres-mealie"
|
||||
];
|
||||
};
|
||||
postgres-mealie = {
|
||||
image = "postgres:17";
|
||||
environment = {
|
||||
POSTGRES_USER = "mealie";
|
||||
POSTGRES_PASSWORD = "mealie";
|
||||
PGUSER = "mealie";
|
||||
POSTGRES_DB = "mealie";
|
||||
};
|
||||
volumes = [
|
||||
"/home/autumn/mealie/mealie-pgdata:/var/lib/postgresql/data"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
||||
19
system/services/containerization/stirlingpdf.nix
Normal file
19
system/services/containerization/stirlingpdf.nix
Normal file
@@ -0,0 +1,19 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
|
||||
virtualisation.oci-containers.containers.stirling-pdf = {
|
||||
image = "stirlingtools/stirling-pdf:latest";
|
||||
ports = ["8079:8080"];
|
||||
volumes = [
|
||||
"/home/autumn/StirlingPDF/trainingData:/usr/share/tessdata"
|
||||
"/home/autumn/StirlingPDF/extraConfigs:/configs"
|
||||
"/home/autumn/StirlingPDF/customFiles:/customFiles/"
|
||||
"/home/autumn/StirlingPDF/logs:/logs/"
|
||||
"/home/autumn/StirlingPDF/pipeline:/pipeline/"
|
||||
];
|
||||
environment = {
|
||||
DISABLE_ADDITIONAL_FEATURES="true";
|
||||
LANGS="en_US";
|
||||
};
|
||||
};
|
||||
}
|
||||
55
system/services/containerization/transtun.nix
Normal file
55
system/services/containerization/transtun.nix
Normal file
@@ -0,0 +1,55 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
virtualisation.oci-containers.containers.transmission-openvpn = {
|
||||
image = "haugene/transmission-openvpn:latest";
|
||||
|
||||
ports = [
|
||||
"9091:9091"
|
||||
];
|
||||
|
||||
volumes = [
|
||||
"/home/autumn/transtun/holding-cell:/data"
|
||||
"/home/autumn/transtun/mullvad_userpass.txt:/config/openvpn-credentials.txt"
|
||||
"/home/autumn/transtun/notify-download.sh:/etc/transmission/notify-download.sh:ro"
|
||||
];
|
||||
|
||||
environment = {
|
||||
OPENVPN_PROVIDER = "MULLVAD";
|
||||
OPENVPN_USERNAME = "9413153196446212";
|
||||
OPENVPN_CONFIG = "ca_van";
|
||||
LOCAL_NETWORK = "10.0.0.0/16";
|
||||
OPENVPN_OPTS = "--dev tun0";
|
||||
TRANSMISSION_RPC_BIND_ADDRESS = "0.0.0.0";
|
||||
TRANSMISSION_RPC_WHITELIST = "*";
|
||||
TRANSMISSION_RPC_WHITELIST_ENABLED = "false";
|
||||
TRANSMISSION_SCRIPT_TORRENT_DONE_ENABLED = "true";
|
||||
TRANSMISSION_SCRIPT_TORRENT_DONE_FILENAME = "/etc/transmission/notify-download.sh";
|
||||
};
|
||||
|
||||
extraOptions = [
|
||||
"--cap-add=NET_ADMIN"
|
||||
"--cap-add=SYS_MODULE"
|
||||
"--device=/dev/net/tun:/dev/net/tun"
|
||||
"--privileged"
|
||||
];
|
||||
|
||||
autoStart = true;
|
||||
};
|
||||
|
||||
# Firefox browser container (working version without VPN)
|
||||
virtualisation.oci-containers.containers.torrent-browser = {
|
||||
image = "jlesage/firefox:latest";
|
||||
|
||||
ports = [
|
||||
"8080:5800" # Firefox web interface
|
||||
];
|
||||
|
||||
environment = {
|
||||
DISPLAY = ":0";
|
||||
APP_NAME = "Torrent Browser";
|
||||
APP_ICON = "https://raw.githubusercontent.com/jlesage/docker-templates/master/jlesage/images/firefox-icon.png";
|
||||
};
|
||||
|
||||
autoStart = true;
|
||||
};
|
||||
}
|
||||
118
system/services/hickory-dns-bak.nix
Normal file
118
system/services/hickory-dns-bak.nix
Normal file
@@ -0,0 +1,118 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
# Define your DNS records declaratively
|
||||
let
|
||||
dnsRecords = {
|
||||
"lan." = {
|
||||
ttl = 86400; # Time-to-live for records in this zone
|
||||
ns = [ "hoardfrost.lan." ]; # Nameserver record
|
||||
soa = {
|
||||
nameServer = "hoardfrost.lan.";
|
||||
adminEmail = "root.lan.";
|
||||
serial = "2025091901"; # Update this serial number with each change
|
||||
refresh = "3600";
|
||||
retry = "1800";
|
||||
expire = "604800";
|
||||
minimum = "86400";
|
||||
};
|
||||
|
||||
# Define your host records (A for IPv4, AAAA for IPv6)
|
||||
records = {
|
||||
# Your NixOS server acting as the DNS server
|
||||
hoardfrost = [
|
||||
{ type = "A"; content = "10.0.0.217"; }
|
||||
{ type = "AAAA"; content = "2601:282:180:630::803b"; }
|
||||
];
|
||||
|
||||
# Other devices on your local network
|
||||
router = [
|
||||
{ type = "A"; content = "10.0.0.1"; }
|
||||
{ type = "AAAA"; content = "fe80::1"; }
|
||||
];
|
||||
|
||||
yukigekko = [
|
||||
{ type = "A"; content = "10.0.0.210"; }
|
||||
{ type = "AAAA"; content = "2601:282:180:630::e2e"; }
|
||||
];
|
||||
|
||||
wesbos = [
|
||||
{ type = "A"; content = "10.0.0.110";}
|
||||
# { type = "AAAA"; content = "";}
|
||||
];
|
||||
|
||||
wsl-hive = [
|
||||
{type = "A"; content = "172.18.84.193";}
|
||||
{type = "AAAA"; content = "fe80::215:5dff:fec1:e4b5";}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# This function generates the zone file string from the Nix expression
|
||||
generateZoneFile = zoneName: zoneConfig:
|
||||
let
|
||||
soaRecord = "${zoneName} ${toString zoneConfig.ttl} IN SOA ${zoneConfig.soa.nameServer} ${zoneConfig.soa.adminEmail} ( ${zoneConfig.soa.serial} ${zoneConfig.soa.refresh} ${zoneConfig.soa.retry} ${zoneConfig.soa.expire} ${zoneConfig.soa.minimum} )";
|
||||
nsRecords = lib.concatStringsSep "\n" (lib.map (ns: "${zoneName} ${toString zoneConfig.ttl} IN NS ${ns}") zoneConfig.ns);
|
||||
hostRecords = lib.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (hostname: records:
|
||||
lib.map (record: "${hostname}.${zoneName} ${toString zoneConfig.ttl} IN ${record.type} ${record.content}") records
|
||||
) zoneConfig.records));
|
||||
in
|
||||
''
|
||||
$ORIGIN ${zoneName}
|
||||
${soaRecord}
|
||||
${nsRecords}
|
||||
${hostRecords}
|
||||
'';
|
||||
|
||||
# Generate the zone file using the `generateZoneFile` function
|
||||
lanZoneFile = pkgs.writeText "lan.zone" (generateZoneFile "lan." dnsRecords."lan.");
|
||||
|
||||
# Configure hickory-dns with the generated zone file
|
||||
hickoryConfig = pkgs.writeText "hickory-config.toml" ''
|
||||
listen_addrs_ipv4 = ["127.0.0.1", "10.0.0.217"] # Change to your NixOS server's IPv4
|
||||
listen_addrs_ipv6 = ["::1", "fe80::215:5dff:fec1:e4b5"] # Change to your NixOS server's IPv6
|
||||
|
||||
# Configure as an authoritative server for the local zone
|
||||
[[zones]]
|
||||
zone = "lan."
|
||||
zone_type = "Primary"
|
||||
file = "${lanZoneFile}"
|
||||
|
||||
# Configure as a recursive resolver for all other queries
|
||||
[[recursor]]
|
||||
# All queries *not* matching the "lan." zone will be forwarded here.
|
||||
[[recursor.forwarders]]
|
||||
name_servers = ["8.8.8.8:53", "[2001:4860:4860::8888]:53"]
|
||||
# All other DNS queries will be handled recursively, starting from the root hints.
|
||||
'';
|
||||
|
||||
in
|
||||
{
|
||||
systemd.services.hickory-dns = {
|
||||
enable = true;
|
||||
description = "Hickory DNS with local zone";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = "hickory";
|
||||
Group = "hickory";
|
||||
ExecStart = "${pkgs.hickory-dns}/bin/hickory-dns -c ${hickoryConfig}";
|
||||
Restart = "on-failure";
|
||||
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
|
||||
DynamicUser = true;
|
||||
StateDirectory = "hickory";
|
||||
};
|
||||
};
|
||||
|
||||
users.groups.hickory = {};
|
||||
users.users.hickory = {
|
||||
isSystemUser = true;
|
||||
group = "hickory";
|
||||
};
|
||||
|
||||
environment.systemPackages = [ pkgs.hickory-dns ];
|
||||
|
||||
# Configure your NixOS machine to use itself as the DNS resolver
|
||||
services.resolved.enable = false;
|
||||
networking.nameservers = [ "127.0.0.1" "fdaa:a00:0:1::100" ];
|
||||
}
|
||||
151
system/services/hickory-dns.nix
Normal file
151
system/services/hickory-dns.nix
Normal file
@@ -0,0 +1,151 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
# Define your DNS records declaratively
|
||||
let
|
||||
dnsRecords = {
|
||||
"lan." = {
|
||||
ttl = 86400; # Time-to-live for records in this zone
|
||||
ns = [ "hoardfrost.lan." ]; # Nameserver record
|
||||
soa = {
|
||||
nameServer = "hoardfrost.lan.";
|
||||
adminEmail = "root.lan.";
|
||||
serial = "2025012001"; # Increment serial for changes
|
||||
refresh = "3600";
|
||||
retry = "1800";
|
||||
expire = "604800";
|
||||
minimum = "86400";
|
||||
};
|
||||
|
||||
# Define your host records (A for IPv4, AAAA for IPv6)
|
||||
records = {
|
||||
# Your NixOS server acting as the DNS server
|
||||
hoardfrost = [
|
||||
{ type = "A"; content = "10.0.0.217"; }
|
||||
{ type = "AAAA"; content = "2601:282:180:630::cc03"; }
|
||||
];
|
||||
|
||||
# Other devices on your local network
|
||||
router = [
|
||||
{ type = "A"; content = "10.0.0.1"; }
|
||||
{ type = "AAAA"; content = "fe80::1"; }
|
||||
];
|
||||
|
||||
yukigekko = [
|
||||
{ type = "A"; content = "10.0.0.210"; }
|
||||
{ type = "AAAA"; content = "2601:282:180:630::e2e"; }
|
||||
];
|
||||
|
||||
wesbos = [
|
||||
{ type = "A"; content = "10.0.0.110";}
|
||||
# { type = "AAAA"; content = "";}
|
||||
];
|
||||
|
||||
wsl-hive = [
|
||||
{type = "A"; content = "172.18.84.193";}
|
||||
{type = "AAAA"; content = "fe80::215:5dff:fec1:e813";}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# This function generates the zone file string from the Nix expression
|
||||
generateZoneFile = zoneName: zoneConfig:
|
||||
let
|
||||
soaRecord = "${zoneName} ${toString zoneConfig.ttl} IN SOA ${zoneConfig.soa.nameServer} ${zoneConfig.soa.adminEmail} ( ${zoneConfig.soa.serial} ${zoneConfig.soa.refresh} ${zoneConfig.soa.retry} ${zoneConfig.soa.expire} ${zoneConfig.soa.minimum} )";
|
||||
nsRecords = lib.concatStringsSep "\n" (map (ns: "${zoneName} ${toString zoneConfig.ttl} IN NS ${ns}") zoneConfig.ns);
|
||||
hostRecords = lib.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (hostname: records:
|
||||
map (record: "${hostname}.${zoneName} ${toString zoneConfig.ttl} IN ${record.type} ${record.content}") records
|
||||
) zoneConfig.records));
|
||||
in
|
||||
''
|
||||
$ORIGIN ${zoneName}
|
||||
${soaRecord}
|
||||
${nsRecords}
|
||||
${hostRecords}
|
||||
'';
|
||||
|
||||
# Generate the zone file using the `generateZoneFile` function
|
||||
lanZoneFile = pkgs.writeText "lan.zone" (generateZoneFile "lan." dnsRecords."lan.");
|
||||
|
||||
# Configure hickory-dns with the generated zone file
|
||||
hickoryConfig = pkgs.writeText "hickory-config.toml" ''
|
||||
listen_addrs_ipv4 = ["127.0.0.1", "10.0.0.217"] # Change to your NixOS server's IPv4
|
||||
listen_addrs_ipv6 = ["::1", "2601:282:180:630::cc03"] # Change to your NixOS server's IPv6
|
||||
|
||||
# Configure as an authoritative server for the local zone
|
||||
[[zones]]
|
||||
zone = "lan."
|
||||
zone_type = "Primary"
|
||||
file = "${lanZoneFile}"
|
||||
|
||||
# Note: Recursive resolution is not supported in Hickory DNS 0.25.2
|
||||
# This server will only serve the local zone
|
||||
'';
|
||||
|
||||
in
|
||||
{
|
||||
systemd.services.hickory-dns = {
|
||||
enable = true;
|
||||
description = "Hickory DNS authoritative server for local zone";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = "hickory";
|
||||
Group = "hickory";
|
||||
ExecStart = "${pkgs.hickory-dns}/bin/hickory-dns -c ${hickoryConfig}";
|
||||
Restart = "on-failure";
|
||||
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
|
||||
DynamicUser = true;
|
||||
StateDirectory = "hickory";
|
||||
};
|
||||
};
|
||||
|
||||
users.groups.hickory = {};
|
||||
users.users.hickory = {
|
||||
isSystemUser = true;
|
||||
group = "hickory";
|
||||
};
|
||||
|
||||
environment.systemPackages = [ pkgs.hickory-dns ];
|
||||
|
||||
# Configure systemd-resolved to use Unbound
|
||||
services.resolved.enable = true;
|
||||
services.resolved.dnssec = "false";
|
||||
services.resolved.extraConfig = ''
|
||||
DNS=127.0.0.1@5353
|
||||
'';
|
||||
|
||||
# Configure Unbound as recursive resolver for external queries
|
||||
services.unbound = {
|
||||
enable = true;
|
||||
settings = {
|
||||
server = {
|
||||
interface = [ "127.0.0.1" ];
|
||||
port = 5353; # Use different port to avoid conflict with Hickory DNS
|
||||
access-control = [ "127.0.0.1 allow" ];
|
||||
hide-identity = true;
|
||||
hide-version = true;
|
||||
};
|
||||
forward-zone = [
|
||||
{
|
||||
name = "lan.";
|
||||
forward-addr = [ "127.0.0.1@53" ]; # Forward lan. queries to Hickory DNS
|
||||
}
|
||||
{
|
||||
name = ".";
|
||||
forward-addr = [
|
||||
"8.8.8.8#dns.google"
|
||||
"2001:4860:4860::8888#dns.google"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
# Configure NetworkManager to use systemd-resolved and ignore DHCP DNS
|
||||
networking.networkmanager.dns = "systemd-resolved";
|
||||
networking.networkmanager.settings.main.dns = "none";
|
||||
|
||||
# Set the system to use local DNS
|
||||
networking.nameservers = [ "127.0.0.1" ];
|
||||
}
|
||||
7
system/services/mullvad.nix
Normal file
7
system/services/mullvad.nix
Normal file
@@ -0,0 +1,7 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
services.mullvad-vpn = {
|
||||
enable = true;
|
||||
package = pkgs.mullvad-vpn;
|
||||
};
|
||||
}
|
||||
8
system/services/openssh.nix
Normal file
8
system/services/openssh.nix
Normal file
@@ -0,0 +1,8 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
services.openssh = {
|
||||
enable = true;
|
||||
passwordAuthentication = true;
|
||||
ports = [2022];
|
||||
};
|
||||
}
|
||||
44
system/services/samba.nix
Normal file
44
system/services/samba.nix
Normal file
@@ -0,0 +1,44 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
services.samba = {
|
||||
enable = true;
|
||||
# securityType = "user";
|
||||
openFirewall = true;
|
||||
settings = {
|
||||
global = {
|
||||
"workgroup" = "WORKGROUP";
|
||||
"server string" = "smbnix";
|
||||
# "netbios name" = "smbnix";
|
||||
"security" = "user";
|
||||
};
|
||||
"public" = {
|
||||
"path" = "/srv/samba/hoardfrost/mainstore";
|
||||
"browseable" = "yes";
|
||||
public = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "yes";
|
||||
"create mask" = "0644";
|
||||
"directory mask" = "0755";
|
||||
# "force user" = "autumn";
|
||||
# "force group" = "groupname";
|
||||
"valid users" = "autumn lia madeleine";
|
||||
};
|
||||
"private" = {
|
||||
"path" = "/srv/samba/hoardfrost/private";
|
||||
"browseable" = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "no";
|
||||
"create mask" = "0644";
|
||||
"directory mask" = "0755";
|
||||
"force user" = "autumn";
|
||||
# "force group" = "groupname";
|
||||
"valid users" = "autumn";
|
||||
};
|
||||
};
|
||||
};
|
||||
services.samba-wsdd = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
discovery = true;
|
||||
};
|
||||
}
|
||||
16
system/services/swaybg.nix
Normal file
16
system/services/swaybg.nix
Normal file
@@ -0,0 +1,16 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
systemd.user.services.swaybg-autoset = {
|
||||
enable = true;
|
||||
description = "start swaybg on login";
|
||||
after = ["waybar.service"];
|
||||
requires = ["network-online.target"];
|
||||
before = ["multi-user.target"];
|
||||
wantedBy = ["multi-user.target"];
|
||||
serviceConfig = {
|
||||
ExecStart = "swaybg -i ~/Downloads/wp.jpg";
|
||||
User = "autumn";
|
||||
Group = "users";
|
||||
};
|
||||
};
|
||||
}
|
||||
7
system/services/tailscale.nix
Normal file
7
system/services/tailscale.nix
Normal file
@@ -0,0 +1,7 @@
|
||||
{config, pkgs, ...}:
|
||||
{
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
|
||||
};
|
||||
}
|
||||
@@ -9,14 +9,18 @@
|
||||
[ # Include the results of the hardware scan.
|
||||
./hardware-configuration.nix
|
||||
|
||||
../packages/bincache.nix
|
||||
# ../packages/bincache.nix
|
||||
#system configs
|
||||
../defaults/system.nix
|
||||
../defaults/locale.nix
|
||||
../defaults/boot.nix
|
||||
../defaults/locale.nix
|
||||
../defaults/security.nix
|
||||
../defaults/services.nix
|
||||
../defaults/system.nix
|
||||
../defaults/users.nix
|
||||
|
||||
../services/mullvad.nix
|
||||
../services/swaybg.nix
|
||||
|
||||
#system packages
|
||||
../packages/sddm/sddm.nix
|
||||
|
||||
@@ -28,7 +32,6 @@
|
||||
networking.networkmanager.enable = true;
|
||||
networking.extraHosts = ''
|
||||
10.0.0.217 hoardfrost
|
||||
174.63.4.139 frosty
|
||||
'';
|
||||
|
||||
services.logind.lidSwitchExternalPower = "ignore";
|
||||
@@ -37,6 +40,7 @@
|
||||
time.timeZone = "${timezone}";
|
||||
|
||||
programs.river-classic.enable = true;
|
||||
programs.niri.enable = true;
|
||||
xdg.portal = {
|
||||
enable = true;
|
||||
config.common.default = "*";
|
||||
@@ -54,23 +58,14 @@
|
||||
hardware.graphics = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
hardware.nvidia = {
|
||||
modesetting.enable = true;
|
||||
|
||||
powerManagement.enable = false;
|
||||
|
||||
powerManagement.finegrained = false;
|
||||
|
||||
open = false;
|
||||
|
||||
nvidiaSettings = true;
|
||||
|
||||
package = config.boot.kernelPackages.nvidiaPackages.stable;
|
||||
fileSystems."/mnt/hoardfrost" = {
|
||||
device = "//10.0.0.217/public";
|
||||
fsType = "cifs";
|
||||
options = [ "username=autumn" "password=autest" "x-systemd.automount" "noauto"];
|
||||
};
|
||||
# hardware.nvidia.prime.intelBusId = "PCI:0@0:2:0";
|
||||
# hardware.nvidia.prime.nvidiaBusId = "PCI:1@0:0:0";
|
||||
# hardware.nvidia.prime.sync.enable = true;
|
||||
# hardware.nvidia.prime.sync.enable = true;o
|
||||
# hardware.nvidia.prime.offload.enable = false;
|
||||
# hardware.nvidia.prime.offload.enableOffloadCmd = false;
|
||||
|
||||
@@ -94,6 +89,10 @@
|
||||
moonlight-qt
|
||||
pcmanfm
|
||||
gvfs
|
||||
vlc
|
||||
cifs-utils
|
||||
polkit
|
||||
waypaper
|
||||
# wayland
|
||||
# wayland-protocols
|
||||
# libxkbcommon
|
||||
@@ -126,5 +125,5 @@
|
||||
system.autoUpgrade.enable = true;
|
||||
system.autoUpgrade.allowReboot = true;
|
||||
system.autoUpgrade.flake = "../../flake.nix";
|
||||
qt.platformTheme = "kde6";
|
||||
# qt.platformTheme = "kde6";
|
||||
}
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sr_mod" "rtsx_pci_sdmmc" ];
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
@@ -33,7 +33,7 @@
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.enp3s0f1.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlp2s0.useDHCP = lib.mkDefault true;
|
||||
hardware.bluetooth.enable = true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user