mirror of
https://github.com/nmasur/dotfiles
synced 2025-04-24 19:42:24 +00:00
Compare commits
No commits in common. "494cf355e91112719b3d85640b89597382421e47" and "18154b6579883a3694e5e12480cd95f768a30998" have entirely different histories.
494cf355e9
...
18154b6579
@ -71,8 +71,6 @@
|
|||||||
"layout.css.color-mix.enabled" = true;
|
"layout.css.color-mix.enabled" = true;
|
||||||
"ui.systemUsesDarkTheme" =
|
"ui.systemUsesDarkTheme" =
|
||||||
if config.theme.dark == true then 1 else 0;
|
if config.theme.dark == true then 1 else 0;
|
||||||
"media.ffmpeg.vaapi.enabled" =
|
|
||||||
true; # Enable hardware video acceleration
|
|
||||||
};
|
};
|
||||||
userChrome = ''
|
userChrome = ''
|
||||||
:root {
|
:root {
|
||||||
|
@ -21,10 +21,7 @@
|
|||||||
programs.mpv = {
|
programs.mpv = {
|
||||||
enable = true;
|
enable = true;
|
||||||
bindings = { };
|
bindings = { };
|
||||||
config = {
|
config = { image-display-duration = 2; };
|
||||||
image-display-duration = 2;
|
|
||||||
hwdec = "auto-safe";
|
|
||||||
};
|
|
||||||
scripts = [
|
scripts = [
|
||||||
|
|
||||||
# Automatically load playlist entries before and after current file
|
# Automatically load playlist entries before and after current file
|
||||||
|
@ -17,9 +17,6 @@
|
|||||||
steamPackages.steamcmd
|
steamPackages.steamcmd
|
||||||
steam-tui
|
steam-tui
|
||||||
|
|
||||||
# Allow downloading of GE-Proton and other versions
|
|
||||||
protonup-qt
|
|
||||||
|
|
||||||
];
|
];
|
||||||
|
|
||||||
};
|
};
|
||||||
|
@ -10,12 +10,9 @@
|
|||||||
autoRepeatDelay = 250;
|
autoRepeatDelay = 250;
|
||||||
autoRepeatInterval = 40;
|
autoRepeatInterval = 40;
|
||||||
|
|
||||||
};
|
# Swap escape key with caps lock key
|
||||||
|
xkbOptions = "eurosign:e,caps:swapescape";
|
||||||
|
|
||||||
# Use capslock as escape and/or control
|
|
||||||
services.keyd = {
|
|
||||||
enable = true;
|
|
||||||
settings = { main = { capslock = "overload(control, esc)"; }; };
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# Enable num lock on login
|
# Enable num lock on login
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
options = {
|
options = {
|
||||||
transmissionServer = lib.mkOption {
|
transmissionServer = lib.mkOption {
|
||||||
type = lib.types.nullOr lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for Transmission";
|
description = "Hostname for Transmission";
|
||||||
default = null;
|
default = null;
|
||||||
};
|
};
|
||||||
@ -12,7 +12,7 @@
|
|||||||
namespace = config.networking.wireguard.interfaces.wg0.interfaceNamespace;
|
namespace = config.networking.wireguard.interfaces.wg0.interfaceNamespace;
|
||||||
vpnIp = lib.strings.removeSuffix "/32"
|
vpnIp = lib.strings.removeSuffix "/32"
|
||||||
(builtins.head config.networking.wireguard.interfaces.wg0.ips);
|
(builtins.head config.networking.wireguard.interfaces.wg0.ips);
|
||||||
in lib.mkIf (config.transmissionServer != null) {
|
in lib.mkIf (config.wireguard.enable && config.transmissionServer != null) {
|
||||||
|
|
||||||
# Setup transmission
|
# Setup transmission
|
||||||
services.transmission = {
|
services.transmission = {
|
||||||
@ -26,13 +26,13 @@
|
|||||||
rpc-host-whitelist = config.transmissionServer;
|
rpc-host-whitelist = config.transmissionServer;
|
||||||
rpc-host-whitelist-enabled = true;
|
rpc-host-whitelist-enabled = true;
|
||||||
rpc-whitelist = "127.0.0.1,${vpnIp}";
|
rpc-whitelist = "127.0.0.1,${vpnIp}";
|
||||||
rpc-whitelist-enabled = config.wireguard.enable;
|
rpc-whitelist-enabled = true;
|
||||||
};
|
};
|
||||||
credentialsFile = config.secrets.transmission.dest;
|
credentialsFile = config.secrets.transmission.dest;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Bind transmission to wireguard namespace
|
# Bind transmission to wireguard namespace
|
||||||
systemd.services.transmission = lib.mkIf config.wireguard.enable {
|
systemd.services.transmission = {
|
||||||
bindsTo = [ "netns@${namespace}.service" ];
|
bindsTo = [ "netns@${namespace}.service" ];
|
||||||
requires = [ "network-online.target" "transmission-secret.service" ];
|
requires = [ "network-online.target" "transmission-secret.service" ];
|
||||||
after = [ "wireguard-wg0.service" "transmission-secret.service" ];
|
after = [ "wireguard-wg0.service" "transmission-secret.service" ];
|
||||||
@ -59,7 +59,7 @@
|
|||||||
boot.kernel.sysctl."net.core.rmem_max" = 4194304;
|
boot.kernel.sysctl."net.core.rmem_max" = 4194304;
|
||||||
|
|
||||||
# Allow inbound connections to reach namespace
|
# Allow inbound connections to reach namespace
|
||||||
systemd.services.transmission-web-netns = lib.mkIf config.wireguard.enable {
|
systemd.services.transmission-web-netns = {
|
||||||
description = "Forward to transmission in wireguard namespace";
|
description = "Forward to transmission in wireguard namespace";
|
||||||
requires = [ "transmission.service" ];
|
requires = [ "transmission.service" ];
|
||||||
after = [ "transmission.service" ];
|
after = [ "transmission.service" ];
|
||||||
|
Loading…
x
Reference in New Issue
Block a user