mirror of
https://github.com/nmasur/dotfiles
synced 2025-07-06 17:50:15 +00:00
Compare commits
240 Commits
9ebdfa1071
...
pre-platfo
Author | SHA1 | Date | |
---|---|---|---|
6ee5ade2bc | |||
043cd8ce5c | |||
07a0d5185b | |||
a4b5e05f8f | |||
83f548e95f | |||
c66ca460c0 | |||
2b36140fbf | |||
66207830ba | |||
0f7c15bf36 | |||
d31a083ed6 | |||
148839b0ab | |||
7714635fa0 | |||
ca6c275cd8 | |||
54a897abb6 | |||
45eb33485d | |||
cbdf17f618 | |||
fdf231b46e | |||
e9d611fc03 | |||
f899a76f7f | |||
aa93604a6a | |||
6d8fb63d54 | |||
1cb5827438 | |||
fccee387b8 | |||
6f22a3031b | |||
185258ad8a | |||
b69a9a2de7 | |||
f16859893d | |||
b668c991c8 | |||
405b1ce60f | |||
e6f5649999 | |||
ef03bb112d | |||
da172aaa66 | |||
11625adbe8 | |||
b691895e05 | |||
66ef1fa38d | |||
30cc02c2a7 | |||
0d3e42be3f | |||
61ab3e1b3f | |||
bc604bc2ce | |||
39f80ea79a | |||
6ca944fe42 | |||
28ffa10a59 | |||
006554f545 | |||
1b04f9a883 | |||
00f23f4b9c | |||
9b948f45ee | |||
1f0ee6b27f | |||
3348bd0b39 | |||
780ff152c8 | |||
d61ac18707 | |||
bee5631fab | |||
78d34d9177 | |||
100eedc8cd | |||
ce298b9600 | |||
7128cd8d0d | |||
7007577176 | |||
ca1c7cc23f | |||
ae43d24f62 | |||
c6de176b0b | |||
a36df414c1 | |||
1022a3998f | |||
67727954ec | |||
cf8fc2ac56 | |||
4c38ae86a9 | |||
4b3bc8a216 | |||
e9a2ce6df3 | |||
875054aa2c | |||
4b9eea276b | |||
fc5ed5e892 | |||
1d01ddbbbc | |||
8cba026f10 | |||
a6e4b3130d | |||
33868c1add | |||
d806bd7f56 | |||
120b97f970 | |||
5f71437e57 | |||
e8e65ba4d1 | |||
c594a0b161 | |||
57c3719600 | |||
98c9c85e95 | |||
3ef36c4873 | |||
1d1d5014a0 | |||
1f64ed0bb8 | |||
2bfb8ea8b5 | |||
e91d6665fb | |||
7e3ab279af | |||
cdb9da9c50 | |||
46bbd2c967 | |||
51bee71faf | |||
a7adc18463 | |||
25a959f404 | |||
9f31d775c7 | |||
5306070bc5 | |||
b729eff679 | |||
4883532c65 | |||
982d3ce2d8 | |||
64311e6e1c | |||
83c9393837 | |||
e72d4eb548 | |||
b51df2f3a3 | |||
f47f397e1f | |||
48b1d41aff | |||
25c4e79ccc | |||
3b86a666fd | |||
264ad53f67 | |||
1cb5d3138c | |||
9c4438bed2 | |||
642d3c183f | |||
5798406977 | |||
81cb603bb7 | |||
1e7c69b3ea | |||
45deba10af | |||
d1721efc6c | |||
96caba63c4 | |||
01cd6151c1 | |||
e6644ab7b9 | |||
e43f6cf000 | |||
a9cdf6ac38 | |||
9fb7f68b07 | |||
845fc000b6 | |||
0b0556f057 | |||
771cac63a3 | |||
f7c5d3510f | |||
6866ca5fee | |||
883dc15b3d | |||
842f373101 | |||
65aa25b213 | |||
5b2fef7e01 | |||
2a812c1bdb | |||
16a372ce64 | |||
fb45ccdd5c | |||
74e6d740af | |||
2ad5411b90 | |||
3b494bed5b | |||
de4c8c32ef | |||
a7be0ed5cc | |||
e7f8d706b2 | |||
39fda67d6e | |||
4eb0327a1b | |||
029119ce93 | |||
b15fd34e30 | |||
a47bcf8949 | |||
6c024107ee | |||
4ca25aa194 | |||
20fcca6bda | |||
0bbbabd6e8 | |||
ff05b99fe1 | |||
abdf4b64be | |||
6d0d36165e | |||
b4470727e5 | |||
126baae735 | |||
892dfbbee4 | |||
0198469b83 | |||
c89ca7ea94 | |||
0a98b72784 | |||
c7de16b14c | |||
1d405e1828 | |||
97f99a149e | |||
bc794f89bc | |||
63b90102f2 | |||
c86188d734 | |||
f1cdd4ae98 | |||
332921edd3 | |||
cc69cbaa6c | |||
d165428a37 | |||
3e7955533e | |||
0b9886f93e | |||
2f39eb2ceb | |||
cf19085158 | |||
a387950c9a | |||
dec46bcc97 | |||
0d6230b3dc | |||
517ae65cf1 | |||
6f4ee32e8e | |||
2c2f366c47 | |||
e509943103 | |||
8937d214f1 | |||
af4161c4f4 | |||
0a225d6599 | |||
b78bbf2003 | |||
97cfaf0708 | |||
dceb0c5c65 | |||
a309e96754 | |||
83e95b306d | |||
6742103195 | |||
57ce387402 | |||
265144d957 | |||
f0b9bfc0a7 | |||
a4c9813341 | |||
b051885b52 | |||
985e69b4b8 | |||
8e9d556cfe | |||
99581ae1ea | |||
96d410e1b2 | |||
8e88d70a52 | |||
8b1032ebda | |||
e55ee05c5c | |||
0cdae3569e | |||
0f1cbe2e06 | |||
7a22e798fc | |||
196d2e53e0 | |||
204621a0ba | |||
ab050582c1 | |||
6cf4c4979d | |||
ad0bb2d804 | |||
5117b14388 | |||
e6bde77984 | |||
b546d5b43a | |||
5aa0a935ad | |||
4555797667 | |||
5edd1a50d3 | |||
a16e3ae3cb | |||
edff6fc768 | |||
45ec4e5a3f | |||
48fbb2e2d9 | |||
7ce9ed564e | |||
8074276643 | |||
6edc828ece | |||
4b22c774e2 | |||
b7e81e009c | |||
3d90674522 | |||
0582b4a147 | |||
c06cb27bcc | |||
de106298d6 | |||
b34997257c | |||
ddfaf0064c | |||
e561d5984b | |||
de766b6893 | |||
654009ba74 | |||
a7006af5ad | |||
452afd70c1 | |||
0c399fc269 | |||
e59c565e2f | |||
d0e613f093 | |||
14538d83f5 | |||
2d31f5726f | |||
f4ed3f0ec6 | |||
d07abccbce | |||
0feb11b017 | |||
da559f808a |
29
.github/workflows/arrow-aws.yml
vendored
29
.github/workflows/arrow-aws.yml
vendored
@ -42,6 +42,12 @@ jobs:
|
|||||||
- name: Checkout Repo Code
|
- name: Checkout Repo Code
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Free Disk Space (Ubuntu)
|
||||||
|
if: inputs.rebuild && inputs.action != 'destroy'
|
||||||
|
uses: jlumbroso/free-disk-space@main
|
||||||
|
with:
|
||||||
|
tool-cache: true
|
||||||
|
|
||||||
# Enable access to KVM, required to build an image
|
# Enable access to KVM, required to build an image
|
||||||
- name: Enable KVM group perms
|
- name: Enable KVM group perms
|
||||||
if: inputs.rebuild && inputs.action != 'destroy'
|
if: inputs.rebuild && inputs.action != 'destroy'
|
||||||
@ -60,22 +66,19 @@ jobs:
|
|||||||
# Install Nix
|
# Install Nix
|
||||||
- name: Install Nix
|
- name: Install Nix
|
||||||
if: inputs.rebuild && inputs.action != 'destroy'
|
if: inputs.rebuild && inputs.action != 'destroy'
|
||||||
uses: cachix/install-nix-action@v17
|
uses: cachix/install-nix-action@v20
|
||||||
|
|
||||||
# Build the image
|
# Build the image
|
||||||
- name: Build Image
|
- name: Build Image
|
||||||
if: inputs.rebuild && inputs.action != 'destroy'
|
if: inputs.rebuild && inputs.action != 'destroy'
|
||||||
run: nix build .#arrow-aws
|
run: nix build .#arrow-aws
|
||||||
|
|
||||||
# # Copy the image to S3
|
- name: Upload Image to S3
|
||||||
# - name: Upload Image to Cache
|
if: inputs.rebuild && inputs.action != 'destroy'
|
||||||
# env:
|
run: |
|
||||||
# NIX_CACHE_PRIVATE_KEY: ${{ secrets.NIX_CACHE_PRIVATE_KEY }}
|
aws s3 cp \
|
||||||
# run: |
|
result/nixos-amazon-image-*.vhd \
|
||||||
# echo "$NIX_CACHE_PRIVATE_KEY" > cache.key
|
s3://${{ secrets.IMAGES_BUCKET }}/arrow.vhd \
|
||||||
# nix store sign --key-file cache.key $(readlink result)
|
|
||||||
# nix copy --to s3://t2-aws-nixos-test $(readlink result)
|
|
||||||
# rm cache.key
|
|
||||||
|
|
||||||
# Installs the Terraform binary and some other accessory functions.
|
# Installs the Terraform binary and some other accessory functions.
|
||||||
- name: Setup Terraform
|
- name: Setup Terraform
|
||||||
@ -102,6 +105,7 @@ jobs:
|
|||||||
working-directory: ${{ env.TERRAFORM_DIRECTORY }}
|
working-directory: ${{ env.TERRAFORM_DIRECTORY }}
|
||||||
env:
|
env:
|
||||||
TF_VAR_ec2_size: ${{ inputs.size }}
|
TF_VAR_ec2_size: ${{ inputs.size }}
|
||||||
|
TF_VAR_images_bucket: ${{ secrets.IMAGES_BUCKET }}
|
||||||
run: |
|
run: |
|
||||||
terraform apply \
|
terraform apply \
|
||||||
-auto-approve \
|
-auto-approve \
|
||||||
@ -111,6 +115,9 @@ jobs:
|
|||||||
- name: Terraform Destroy
|
- name: Terraform Destroy
|
||||||
if: inputs.action == 'destroy'
|
if: inputs.action == 'destroy'
|
||||||
working-directory: ${{ env.TERRAFORM_DIRECTORY }}
|
working-directory: ${{ env.TERRAFORM_DIRECTORY }}
|
||||||
|
env:
|
||||||
|
TF_VAR_ec2_size: ${{ inputs.size }}
|
||||||
|
TF_VAR_images_bucket: ${{ secrets.IMAGES_BUCKET }}
|
||||||
run: |
|
run: |
|
||||||
terraform destroy \
|
terraform destroy \
|
||||||
-auto-approve \
|
-auto-approve \
|
||||||
@ -152,7 +159,7 @@ jobs:
|
|||||||
RECORD_ID=$(curl --request GET \
|
RECORD_ID=$(curl --request GET \
|
||||||
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records \
|
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records \
|
||||||
--header 'Content-Type: application/json' \
|
--header 'Content-Type: application/json' \
|
||||||
--header "Authorization: Bearer ${{ env.CLOUDFLARE_API_TOKEN }}" | jq -r '.result[] | select(.name == "transmission.${{ env.ZONE_NAME }}") | .id')
|
--header "Authorization: Bearer ${{ env.CLOUDFLARE_API_TOKEN }}" | jq -r '.result[] | select(.name == "n8n2.${{ env.ZONE_NAME }}") | .id')
|
||||||
curl --request DELETE \
|
curl --request DELETE \
|
||||||
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records/${RECORD_ID} \
|
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records/${RECORD_ID} \
|
||||||
--header 'Content-Type: application/json' \
|
--header 'Content-Type: application/json' \
|
||||||
|
12
.github/workflows/arrow.yml
vendored
12
.github/workflows/arrow.yml
vendored
@ -75,16 +75,6 @@ jobs:
|
|||||||
s3://noahmasur-arrow-images/arrow.iso \
|
s3://noahmasur-arrow-images/arrow.iso \
|
||||||
--endpoint-url "https://${{ env.CLOUDFLARE_R2_ENDPOINT }}"
|
--endpoint-url "https://${{ env.CLOUDFLARE_R2_ENDPOINT }}"
|
||||||
|
|
||||||
# # Copy the image to S3
|
|
||||||
# - name: Upload Image to Cache
|
|
||||||
# env:
|
|
||||||
# NIX_CACHE_PRIVATE_KEY: ${{ secrets.NIX_CACHE_PRIVATE_KEY }}
|
|
||||||
# run: |
|
|
||||||
# echo "$NIX_CACHE_PRIVATE_KEY" > cache.key
|
|
||||||
# nix store sign --key-file cache.key $(readlink result)
|
|
||||||
# nix copy --to s3://t2-aws-nixos-test $(readlink result)
|
|
||||||
# rm cache.key
|
|
||||||
|
|
||||||
# Installs the Terraform binary and some other accessory functions.
|
# Installs the Terraform binary and some other accessory functions.
|
||||||
- name: Setup Terraform
|
- name: Setup Terraform
|
||||||
uses: hashicorp/setup-terraform@v2
|
uses: hashicorp/setup-terraform@v2
|
||||||
@ -157,7 +147,7 @@ jobs:
|
|||||||
RECORD_ID=$(curl --request GET \
|
RECORD_ID=$(curl --request GET \
|
||||||
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records \
|
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records \
|
||||||
--header 'Content-Type: application/json' \
|
--header 'Content-Type: application/json' \
|
||||||
--header "Authorization: Bearer ${{ env.CLOUDFLARE_API_TOKEN }}" | jq -r '.result[] | select(.name == "transmission.${{ env.ZONE_NAME }}") | .id')
|
--header "Authorization: Bearer ${{ env.CLOUDFLARE_API_TOKEN }}" | jq -r '.result[] | select(.name == "n8n2.${{ env.ZONE_NAME }}") | .id')
|
||||||
curl --request DELETE \
|
curl --request DELETE \
|
||||||
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records/${RECORD_ID} \
|
--url https://api.cloudflare.com/client/v4/zones/${{ env.CLOUDFLARE_ZONE_ID }}/dns_records/${RECORD_ID} \
|
||||||
--header 'Content-Type: application/json' \
|
--header 'Content-Type: application/json' \
|
||||||
|
6
.github/workflows/check.yml
vendored
6
.github/workflows/check.yml
vendored
@ -11,10 +11,10 @@ jobs:
|
|||||||
- name: Checkout Repository
|
- name: Checkout Repository
|
||||||
uses: actions/checkout@v3
|
uses: actions/checkout@v3
|
||||||
- name: Install Nix
|
- name: Install Nix
|
||||||
uses: DeterminateSystems/nix-installer-action@v4
|
uses: DeterminateSystems/nix-installer-action@v11
|
||||||
- name: Check Nixpkgs Inputs
|
- name: Check Nixpkgs Inputs
|
||||||
uses: DeterminateSystems/flake-checker-action@v5
|
uses: DeterminateSystems/flake-checker-action@v7
|
||||||
- name: Add Nix Cache
|
- name: Add Nix Cache
|
||||||
uses: DeterminateSystems/magic-nix-cache-action@v2
|
uses: DeterminateSystems/magic-nix-cache-action@v6
|
||||||
- name: Check the Flake
|
- name: Check the Flake
|
||||||
run: nix flake check
|
run: nix flake check
|
||||||
|
12
.github/workflows/update.yml
vendored
12
.github/workflows/update.yml
vendored
@ -3,7 +3,7 @@ name: Update Flake
|
|||||||
on:
|
on:
|
||||||
workflow_dispatch: # allows manual triggering
|
workflow_dispatch: # allows manual triggering
|
||||||
schedule:
|
schedule:
|
||||||
- cron: '33 3 * * 0' # runs weekly on Sunday at 03:33
|
- cron: '33 3 * * 6' # runs weekly on Saturday at 03:33
|
||||||
|
|
||||||
permissions:
|
permissions:
|
||||||
contents: write
|
contents: write
|
||||||
@ -18,13 +18,15 @@ jobs:
|
|||||||
- name: Checkout Repository
|
- name: Checkout Repository
|
||||||
uses: actions/checkout@v3
|
uses: actions/checkout@v3
|
||||||
- name: Install Nix
|
- name: Install Nix
|
||||||
uses: DeterminateSystems/nix-installer-action@v4
|
uses: DeterminateSystems/nix-installer-action@v11
|
||||||
|
with:
|
||||||
|
nix-package-url: https://releases.nixos.org/nix/nix-2.18.4/nix-2.18.4-x86_64-linux.tar.xz
|
||||||
- name: Check Nixpkgs Inputs
|
- name: Check Nixpkgs Inputs
|
||||||
uses: DeterminateSystems/flake-checker-action@v5
|
uses: DeterminateSystems/flake-checker-action@v7
|
||||||
- name: Add Nix Cache
|
- name: Add Nix Cache
|
||||||
uses: DeterminateSystems/magic-nix-cache-action@v2
|
uses: DeterminateSystems/magic-nix-cache-action@v6
|
||||||
- name: Update flake.lock
|
- name: Update flake.lock
|
||||||
uses: DeterminateSystems/update-flake-lock@v19
|
uses: DeterminateSystems/update-flake-lock@v23
|
||||||
id: update
|
id: update
|
||||||
with:
|
with:
|
||||||
pr-title: "Update flake.lock" # Title of PR to be created
|
pr-title: "Update flake.lock" # Title of PR to be created
|
||||||
|
@ -9,7 +9,7 @@ configuration may be difficult to translate to a non-Nix system.
|
|||||||
## System Features
|
## System Features
|
||||||
|
|
||||||
| Feature | Program | Configuration |
|
| Feature | Program | Configuration |
|
||||||
| --- | --- | --- |
|
|----------------|-----------------------------------------------------|-----------------------------------------------|
|
||||||
| OS | [NixOS](https://nixos.org) | [Link](./modules/nixos) |
|
| OS | [NixOS](https://nixos.org) | [Link](./modules/nixos) |
|
||||||
| Display Server | [X11](https://www.x.org/wiki/) | [Link](./modules/nixos/graphical/xorg.nix) |
|
| Display Server | [X11](https://www.x.org/wiki/) | [Link](./modules/nixos/graphical/xorg.nix) |
|
||||||
| Compositor | [Picom](https://github.com/yshui/picom) | [Link](./modules/nixos/graphical/picom.nix) |
|
| Compositor | [Picom](https://github.com/yshui/picom) | [Link](./modules/nixos/graphical/picom.nix) |
|
||||||
@ -21,7 +21,7 @@ configuration may be difficult to translate to a non-Nix system.
|
|||||||
## User Features
|
## User Features
|
||||||
|
|
||||||
| Feature | Program | Configuration |
|
| Feature | Program | Configuration |
|
||||||
| --- | --- | --- |
|
|--------------|----------------------------------------------------------------------------------|----------------------------------------------------|
|
||||||
| Dotfiles | [Home-Manager](https://github.com/nix-community/home-manager) | [Link](./modules/common) |
|
| Dotfiles | [Home-Manager](https://github.com/nix-community/home-manager) | [Link](./modules/common) |
|
||||||
| Terminal | [Kitty](https://sw.kovidgoyal.net/kitty/) | [Link](./modules/common/applications/kitty.nix) |
|
| Terminal | [Kitty](https://sw.kovidgoyal.net/kitty/) | [Link](./modules/common/applications/kitty.nix) |
|
||||||
| Shell | [Fish](https://fishshell.com/) | [Link](./modules/common/shell/fish) |
|
| Shell | [Fish](https://fishshell.com/) | [Link](./modules/common/shell/fish) |
|
||||||
@ -38,7 +38,7 @@ configuration may be difficult to translate to a non-Nix system.
|
|||||||
## macOS Features
|
## macOS Features
|
||||||
|
|
||||||
| Feature | Program | Configuration |
|
| Feature | Program | Configuration |
|
||||||
| --- | --- | --- |
|
|----------|---------------------------------------------|--------------------------------------|
|
||||||
| Keybinds | [Hammerspoon](https://www.hammerspoon.org/) | [Link](./modules/darwin/hammerspoon) |
|
| Keybinds | [Hammerspoon](https://www.hammerspoon.org/) | [Link](./modules/darwin/hammerspoon) |
|
||||||
|
|
||||||
# Diagram
|
# Diagram
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
${pkgs.disko-packaged}/bin/disko \
|
${pkgs.disko}/bin/disko \
|
||||||
--mode create \
|
--mode create \
|
||||||
--dry-run \
|
--dry-run \
|
||||||
--flake "path:$(pwd)#root" \
|
--flake "path:$(pwd)#root" \
|
||||||
@ -31,7 +31,7 @@
|
|||||||
"This will ERASE ALL DATA on the disk /dev/''${DISK}. Are you sure you want to continue?" \
|
"This will ERASE ALL DATA on the disk /dev/''${DISK}. Are you sure you want to continue?" \
|
||||||
--default=false
|
--default=false
|
||||||
|
|
||||||
${pkgs.disko-packaged}/bin/disko \
|
${pkgs.disko}/bin/disko \
|
||||||
--mode create \
|
--mode create \
|
||||||
--flake "path:$(pwd)#root" \
|
--flake "path:$(pwd)#root" \
|
||||||
--arg disk "/dev/''${DISK}"
|
--arg disk "/dev/''${DISK}"
|
||||||
|
568
flake.lock
generated
568
flake.lock
generated
@ -3,11 +3,11 @@
|
|||||||
"baleia-nvim-src": {
|
"baleia-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1704551058,
|
"lastModified": 1721805312,
|
||||||
"narHash": "sha256-0NmiGzMFvL1awYOVtiaSd+O4sAR524x68xwWLgArlqs=",
|
"narHash": "sha256-qA1x5kplP2I8bURO0I4R0gt/zeznu9hQQ+XHptLGuwc=",
|
||||||
"owner": "m00qek",
|
"owner": "m00qek",
|
||||||
"repo": "baleia.nvim",
|
"repo": "baleia.nvim",
|
||||||
"rev": "6d9cbdaca3a428bc7296f838fdfce3ad01ee7495",
|
"rev": "1b25eac3ac03659c3d3af75c7455e179e5f197f7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -19,11 +19,11 @@
|
|||||||
"base16-nvim-src": {
|
"base16-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1713467988,
|
"lastModified": 1716483968,
|
||||||
"narHash": "sha256-p3HWYasmi0gVUM5l9jLWL4Iy37Uxnvbj3SO/cMCpDBg=",
|
"narHash": "sha256-GRF/6AobXHamw8TZ3FjL7SI6ulcpwpcohsIuZeCSh2A=",
|
||||||
"owner": "RRethy",
|
"owner": "RRethy",
|
||||||
"repo": "base16-nvim",
|
"repo": "base16-nvim",
|
||||||
"rev": "eec6882101dd189117f79c5d18d389d20cfc0415",
|
"rev": "6ac181b5733518040a33017dde654059cd771b7c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -35,40 +35,43 @@
|
|||||||
"bufferline-nvim-src": {
|
"bufferline-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1706180994,
|
"lastModified": 1716555412,
|
||||||
"narHash": "sha256-/iGzUDJaodkUyWpwim8UtwaRuarfu/Nk6wxVApk+QxY=",
|
"narHash": "sha256-8PCkY1zrlMrPGnQOb7MjqDXNlkeX46jrT4ScIL+MOwM=",
|
||||||
"owner": "akinsho",
|
"owner": "akinsho",
|
||||||
"repo": "bufferline.nvim",
|
"repo": "bufferline.nvim",
|
||||||
"rev": "d6cb9b7cac52887bcac65f8698e67479553c0748",
|
"rev": "99337f63f0a3c3ab9519f3d1da7618ca4f91cffe",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "akinsho",
|
"owner": "akinsho",
|
||||||
"ref": "v4.5.0",
|
"ref": "v4.6.1",
|
||||||
"repo": "bufferline.nvim",
|
"repo": "bufferline.nvim",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"bypass-paywalls-clean": {
|
"cl-nix-lite": {
|
||||||
"flake": false,
|
|
||||||
"locked": {
|
"locked": {
|
||||||
"narHash": "sha256-VZey1VgabUpsiN+mdSNzoMfxICSNKtZIuvISFcMUDw4=",
|
"lastModified": 1728174978,
|
||||||
"type": "file",
|
"narHash": "sha256-Grqqg+xuicANB85j0gNEXxi9SBKY7bzGeTuyi95eGcY=",
|
||||||
"url": "https://github.com/bpc-clone/bpc_updates/releases/download/latest/bypass_paywalls_clean-3.6.6.0.xpi"
|
"owner": "hraban",
|
||||||
|
"repo": "cl-nix-lite",
|
||||||
|
"rev": "31cfe6275c341eb3120a99f4b1c8516c49a29d87",
|
||||||
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "file",
|
"owner": "hraban",
|
||||||
"url": "https://github.com/bpc-clone/bpc_updates/releases/download/latest/bypass_paywalls_clean-3.6.6.0.xpi"
|
"repo": "cl-nix-lite",
|
||||||
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"cmp-nvim-lsp-src": {
|
"cmp-nvim-lsp-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1702205473,
|
"lastModified": 1733823748,
|
||||||
"narHash": "sha256-/0sh9vJBD9pUuD7q3tNSQ1YLvxFMNykdg5eG+LjZAA8=",
|
"narHash": "sha256-iaihXNCF5bB5MdeoosD/kc3QtpA/QaIDZVLiLIurBSM=",
|
||||||
"owner": "hrsh7th",
|
"owner": "hrsh7th",
|
||||||
"repo": "cmp-nvim-lsp",
|
"repo": "cmp-nvim-lsp",
|
||||||
"rev": "5af77f54de1b16c34b23cba810150689a3a90312",
|
"rev": "99290b3ec1322070bcfb9e846450a46f6efa50f0",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -77,23 +80,6 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"comment-nvim-src": {
|
|
||||||
"flake": false,
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1681214440,
|
|
||||||
"narHash": "sha256-48hy+hiaDJLlgWqC7IeZI3dT+VwWkRo4atQbyPxu/ys=",
|
|
||||||
"owner": "numToStr",
|
|
||||||
"repo": "Comment.nvim",
|
|
||||||
"rev": "e51f2b142d88bb666dcaa77d93a07f4b419aca70",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "numToStr",
|
|
||||||
"ref": "v0.8.0",
|
|
||||||
"repo": "Comment.nvim",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"darwin": {
|
"darwin": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@ -101,11 +87,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1713946171,
|
"lastModified": 1737504076,
|
||||||
"narHash": "sha256-lc75rgRQLdp4Dzogv5cfqOg6qYc5Rp83oedF2t0kDp8=",
|
"narHash": "sha256-/B4XJnzYU/6K1ZZOBIgsa3K4pqDJrnC2579c44c+4rI=",
|
||||||
"owner": "lnl7",
|
"owner": "lnl7",
|
||||||
"repo": "nix-darwin",
|
"repo": "nix-darwin",
|
||||||
"rev": "230a197063de9287128e2c68a7a4b0cd7d0b50a7",
|
"rev": "65cc1fa8e36ceff067daf6cfb142331f02f524d3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -122,11 +108,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714612856,
|
"lastModified": 1737038063,
|
||||||
"narHash": "sha256-W7+rtMzRmdovzndN2NYUv5xzkbMudtQ3jbyFuGk0O1E=",
|
"narHash": "sha256-rMEuiK69MDhjz1JgbaeQ9mBDXMJ2/P8vmOYRbFndXsk=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "d57058eb09dd5ec00c746df34fe0a603ea744370",
|
"rev": "bf0abfde48f469c256f2b0f481c6281ff04a5db2",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -138,16 +124,16 @@
|
|||||||
"fidget-nvim-src": {
|
"fidget-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1704696337,
|
"lastModified": 1716093309,
|
||||||
"narHash": "sha256-uAX/RGfOmsUIUaDepNwUpK8MBaTMBJ4rLZ69y0MwpNE=",
|
"narHash": "sha256-Gpk/G0ByOAIE8uX4Xr94CvAjJBSJMEOwBuvrhmYYGsg=",
|
||||||
"owner": "j-hui",
|
"owner": "j-hui",
|
||||||
"repo": "fidget.nvim",
|
"repo": "fidget.nvim",
|
||||||
"rev": "3a93300c076109d86c7ce35ec67a8034ae6ba9db",
|
"rev": "ef99df04a1c53a453602421bc0f756997edc8289",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "j-hui",
|
"owner": "j-hui",
|
||||||
"ref": "v1.2.0",
|
"ref": "v1.4.5",
|
||||||
"repo": "fidget.nvim",
|
"repo": "fidget.nvim",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -159,11 +145,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714869979,
|
"lastModified": 1737766332,
|
||||||
"narHash": "sha256-kTAMHZ1DDGauq3f5IzPw+EtVOgWdctLPUMJiqciqOx0=",
|
"narHash": "sha256-EcKXfadl+51Y5DQU4R7cy3FQx6XklLwmSwIAtOl1hNU=",
|
||||||
"owner": "bandithedoge",
|
"owner": "bandithedoge",
|
||||||
"repo": "nixpkgs-firefox-darwin",
|
"repo": "nixpkgs-firefox-darwin",
|
||||||
"rev": "7e9014891eebabffa68351e3360da3fbc59b8066",
|
"rev": "ef9a452ffc26aed9265e2a5ff04952e960f8f21b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -175,11 +161,28 @@
|
|||||||
"flake-compat": {
|
"flake-compat": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1696426674,
|
"lastModified": 1730663653,
|
||||||
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
|
"narHash": "sha256-kFCUWettiFHDIqxCWWQ9qY8pVh+Lj+XL0Giyy/kdomg=",
|
||||||
|
"owner": "hraban",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"rev": "e5b16676185cb7548581c852f51ce7f3a49bba5e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hraban",
|
||||||
|
"ref": "fixed-output",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-compat_2": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1733328505,
|
||||||
|
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
|
||||||
"owner": "edolstra",
|
"owner": "edolstra",
|
||||||
"repo": "flake-compat",
|
"repo": "flake-compat",
|
||||||
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
|
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -188,10 +191,69 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"flake-parts": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs-lib": [
|
||||||
|
"nur",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1733312601,
|
||||||
|
"narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "flake-parts",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"flake-utils": {
|
"flake-utils": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"systems": "systems"
|
"systems": "systems"
|
||||||
},
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1731533236,
|
||||||
|
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-utils_2": {
|
||||||
|
"inputs": {
|
||||||
|
"systems": [
|
||||||
|
"mac-app-util",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1731533236,
|
||||||
|
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"id": "flake-utils",
|
||||||
|
"type": "indirect"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-utils_3": {
|
||||||
|
"inputs": {
|
||||||
|
"systems": "systems_3"
|
||||||
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1705309234,
|
"lastModified": 1705309234,
|
||||||
"narHash": "sha256-uNRRNRKmJyCRC/8y1RqBkqWBLM034y4qN7EprSdmgyA=",
|
"narHash": "sha256-uNRRNRKmJyCRC/8y1RqBkqWBLM034y4qN7EprSdmgyA=",
|
||||||
@ -206,32 +268,30 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"flake-utils_2": {
|
"gh-collaborators": {
|
||||||
"inputs": {
|
"flake": false,
|
||||||
"systems": "systems_2"
|
|
||||||
},
|
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710146030,
|
"lastModified": 1736185279,
|
||||||
"narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
|
"narHash": "sha256-SGmP/8Fvf2rcYkwscMOFG01Y0VJGb/TXrNZtLacurxA=",
|
||||||
"owner": "numtide",
|
"owner": "katiem0",
|
||||||
"repo": "flake-utils",
|
"repo": "gh-collaborators",
|
||||||
"rev": "b1d9ab70662946ef0850d488da1c9019f3a9752a",
|
"rev": "bf412dde50605e48af86f291c2ac8714f2c1b228",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "numtide",
|
"owner": "katiem0",
|
||||||
"repo": "flake-utils",
|
"repo": "gh-collaborators",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"hmts-nvim-src": {
|
"hmts-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710430870,
|
"lastModified": 1729786258,
|
||||||
"narHash": "sha256-bsOQX56ciQ8ni7Zh4ZNtTvptvy/YaDPG318AsEaZRpE=",
|
"narHash": "sha256-V5dwIJdxBulFVKk1iSlf4H5NRz1UH7uYQeMvwtgkpIs=",
|
||||||
"owner": "calops",
|
"owner": "calops",
|
||||||
"repo": "hmts.nvim",
|
"repo": "hmts.nvim",
|
||||||
"rev": "473d74cf54da8f51aaa9993ec3e6bfae278eb47b",
|
"rev": "c7ff4c3ad96cd05664b18fb5bbbe2abbd7682dd2",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -247,11 +307,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714865296,
|
"lastModified": 1737762889,
|
||||||
"narHash": "sha256-02r2Qzh4fGYBPB/3Lj8vwPMtE6H/UchZnN7A/dQMHIA=",
|
"narHash": "sha256-5HGG09bh/Yx0JA8wtBMAzt0HMCL1bYZ93x4IqzVExio=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "e0825ea2112d09d9f0680833cd716f6aee3b973f",
|
"rev": "daf04c5950b676f47a794300657f1d3d14c1a120",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -261,87 +321,117 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"kitty-scrollback-nvim-src": {
|
"jujutsu": {
|
||||||
"flake": false,
|
"inputs": {
|
||||||
|
"flake-utils": "flake-utils",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"rust-overlay": "rust-overlay"
|
||||||
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714049193,
|
"lastModified": 1737770753,
|
||||||
"narHash": "sha256-LICARktpc04vaHpFuAFDrZsYKy2HJme6LMtoXMi7jJ8=",
|
"narHash": "sha256-3CxkhWleCeSF18dO4lo0teBfHm5evdEaL959gOcD+0A=",
|
||||||
"owner": "mikesmithgh",
|
"owner": "martinvonz",
|
||||||
"repo": "kitty-scrollback.nvim",
|
"repo": "jj",
|
||||||
"rev": "22f524f1fa9c7660804a1800ed0fe981c5d392c8",
|
"rev": "e58713c1355d0536e197a3f99ce5a5c713fe69c3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "mikesmithgh",
|
"owner": "martinvonz",
|
||||||
"repo": "kitty-scrollback.nvim",
|
"repo": "jj",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"mac-app-util": {
|
||||||
|
"inputs": {
|
||||||
|
"cl-nix-lite": "cl-nix-lite",
|
||||||
|
"flake-compat": "flake-compat",
|
||||||
|
"flake-utils": "flake-utils_2",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": "systems_2"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1732920695,
|
||||||
|
"narHash": "sha256-1fxvJZUznwrmEtYqpPuWi2tPcL9kj6v7p1J7ZZncAPE=",
|
||||||
|
"owner": "hraban",
|
||||||
|
"repo": "mac-app-util",
|
||||||
|
"rev": "548672d0cb661ce11d08ee8bde92b87d2a75c872",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hraban",
|
||||||
|
"repo": "mac-app-util",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nextcloud-cookbook": {
|
"nextcloud-cookbook": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1702545935,
|
"lastModified": 1726214817,
|
||||||
"narHash": "sha256-19LN1nYJJ0RMWj6DrYPvHzocTyhMfYdpdhBFch3fpHE=",
|
"narHash": "sha256-Pfa+Xbopg20os+pnGgg+wpEX1MI5fz5JMb0K4a8rBhs=",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.0/cookbook-0.11.0.tar.gz"
|
"url": "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.2/cookbook-0.11.2.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.0/cookbook-0.11.0.tar.gz"
|
"url": "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.2/cookbook-0.11.2.tar.gz"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nextcloud-external": {
|
"nextcloud-external": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699624348,
|
"lastModified": 1729501349,
|
||||||
"narHash": "sha256-RCL2RP5twRDLxI/KfAX6QLYQOzqZmSWsfrC5ZQIwTD4=",
|
"narHash": "sha256-OV6HhFBzmnQBO5btGEnqmKlaUMY7/t2Qm3XebclpBlM=",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nextcloud-releases/external/releases/download/v5.3.1/external-v5.3.1.tar.gz"
|
"url": "https://github.com/nextcloud-releases/external/releases/download/v5.5.2/external-v5.5.2.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nextcloud-releases/external/releases/download/v5.3.1/external-v5.3.1.tar.gz"
|
"url": "https://github.com/nextcloud-releases/external/releases/download/v5.5.2/external-v5.5.2.tar.gz"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nextcloud-news": {
|
"nextcloud-news": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1703426420,
|
"lastModified": 1729667621,
|
||||||
"narHash": "sha256-AENBJH/bEob5JQvw4WEi864mdLYJ5Mqe78HJH6ceCpI=",
|
"narHash": "sha256-pnvyMZQ+NYMgH0Unfh5S19HdZSjnghgoUDAoi2KIXNI=",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nextcloud/news/releases/download/25.0.0-alpha3/news.tar.gz"
|
"url": "https://github.com/nextcloud/news/releases/download/25.0.0-alpha12/news.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nextcloud/news/releases/download/25.0.0-alpha3/news.tar.gz"
|
"url": "https://github.com/nextcloud/news/releases/download/25.0.0-alpha12/news.tar.gz"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nextcloud-snappymail": {
|
"nextcloud-snappymail": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714909152,
|
"lastModified": 1737776393,
|
||||||
"narHash": "sha256-CsAUnbA/9XiVuk96pOK+E++lp8BlJITtfExWcb9rqPk=",
|
"narHash": "sha256-oCw6Brs85rINBHvz3UJXheyLVqvA3RgPXG03b30Fx7E=",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nmasur/snappymail-nextcloud/releases/download/v2.36.1/snappymail-2.36.1-nextcloud.tar.gz"
|
"url": "https://snappymail.eu/repository/nextcloud/snappymail-2.38.2-nextcloud.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nmasur/snappymail-nextcloud/releases/download/v2.36.1/snappymail-2.36.1-nextcloud.tar.gz"
|
"url": "https://snappymail.eu/repository/nextcloud/snappymail-2.38.2-nextcloud.tar.gz"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nix2vim": {
|
"nix2vim": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-utils": "flake-utils",
|
"flake-utils": "flake-utils_3",
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1707832982,
|
"lastModified": 1732820845,
|
||||||
"narHash": "sha256-Jsrj8HJyo+PmjrHIDhq4gjZCE0eYCVmmTrx24cG8eOQ=",
|
"narHash": "sha256-YPXk41l4PzKb5rtcxkYhymwjHJG95fxl4iXIzXnftr8=",
|
||||||
"owner": "gytis-ivaskevicius",
|
"owner": "gytis-ivaskevicius",
|
||||||
"repo": "nix2vim",
|
"repo": "nix2vim",
|
||||||
"rev": "2fb1328cf058fc967b02f9a5330a99253b4c247e",
|
"rev": "e2c511ea553418dd432005875c649b09d56b7e58",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -352,11 +442,11 @@
|
|||||||
},
|
},
|
||||||
"nixlib": {
|
"nixlib": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1712450863,
|
"lastModified": 1736643958,
|
||||||
"narHash": "sha256-K6IkdtMtq9xktmYPj0uaYc8NsIqHuaAoRBaMgu9Fvrw=",
|
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixpkgs.lib",
|
"repo": "nixpkgs.lib",
|
||||||
"rev": "3c62b6a12571c9a7f65ab037173ee153d539905f",
|
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -373,11 +463,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1713783234,
|
"lastModified": 1737057290,
|
||||||
"narHash": "sha256-3yh0nqI1avYUmmtqqTW3EVfwaLE+9ytRWxsA5aWtmyI=",
|
"narHash": "sha256-3Pe0yKlCc7EOeq1X/aJVDH0CtNL+tIBm49vpepwL1MQ=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixos-generators",
|
"repo": "nixos-generators",
|
||||||
"rev": "722b512eb7e6915882f39fff0e4c9dd44f42b77e",
|
"rev": "d002ce9b6e7eb467cd1c6bb9aef9c35d191b5453",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -388,11 +478,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714635257,
|
"lastModified": 1737632463,
|
||||||
"narHash": "sha256-4cPymbty65RvF1DWQfc+Bc8B233A1BWxJnNULJKQ1EY=",
|
"narHash": "sha256-38J9QfeGSej341ouwzqf77WIHAScihAKCt8PQJ+NH28=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "63c3a29ca82437c87573e4c6919b09a24ea61b0f",
|
"rev": "0aa475546ed21629c4f5bbf90e38c846a99ec9e9",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -418,13 +508,50 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nur": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714880338,
|
"lastModified": 1735563628,
|
||||||
"narHash": "sha256-G/dc755qMdAMvXuZsi1OFCzD49OWszdMSnp12+1eFcM=",
|
"narHash": "sha256-OnSAY7XDSx7CtDoqNh8jwVwh4xNL/2HaJxGjryLWzX8=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "b134951a4c9f3c995fd7be05f3243f8ecd65d798",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-24.05",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_2": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1737632463,
|
||||||
|
"narHash": "sha256-38J9QfeGSej341ouwzqf77WIHAScihAKCt8PQJ+NH28=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "0aa475546ed21629c4f5bbf90e38c846a99ec9e9",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nur": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-parts": "flake-parts",
|
||||||
|
"nixpkgs": "nixpkgs_2",
|
||||||
|
"treefmt-nix": "treefmt-nix"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1737776325,
|
||||||
|
"narHash": "sha256-uSt1yFqmuyehOr0u6k8MXSBrwEGToWcIrTzJexHBufM=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nur",
|
"repo": "nur",
|
||||||
"rev": "49f72c695fb2f46c8aeb1549704246b9558b2011",
|
"rev": "e3bdfbe8b01b6469fd2351ab0cf867d9cfa73da8",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -436,11 +563,11 @@
|
|||||||
"nvim-lint-src": {
|
"nvim-lint-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714489830,
|
"lastModified": 1737487916,
|
||||||
"narHash": "sha256-aM4oWSZrZb660wEpLQnFyoBkH+MSi0WgfBIztk98Qtk=",
|
"narHash": "sha256-DKfivSjBFra/iXIuYQa7Mv5f2LglNbQTr8bQ+sCm8to=",
|
||||||
"owner": "mfussenegger",
|
"owner": "mfussenegger",
|
||||||
"repo": "nvim-lint",
|
"repo": "nvim-lint",
|
||||||
"rev": "861a04313501563bb1b11f125ae9b7237a517b9b",
|
"rev": "789b7ada1b4f00e08d026dffde410dcfa6a0ba87",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -452,16 +579,16 @@
|
|||||||
"nvim-lspconfig-src": {
|
"nvim-lspconfig-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1701687137,
|
"lastModified": 1716281382,
|
||||||
"narHash": "sha256-qFjFofA2LoD4yRfx4KGfSCpR3mDkpFaagcm+TVNPqco=",
|
"narHash": "sha256-foJ7a59N0a3QaBW24PtwbyYDQVlIsFxiatADLO/hQvc=",
|
||||||
"owner": "neovim",
|
"owner": "neovim",
|
||||||
"repo": "nvim-lspconfig",
|
"repo": "nvim-lspconfig",
|
||||||
"rev": "cf3dd4a290084a868fac0e2e876039321d57111c",
|
"rev": "0b8165cf95806bc4bb8f745bb0c92021b2ed4b98",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "neovim",
|
"owner": "neovim",
|
||||||
"ref": "v0.1.7",
|
"ref": "v0.1.8",
|
||||||
"repo": "nvim-lspconfig",
|
"repo": "nvim-lspconfig",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -469,11 +596,11 @@
|
|||||||
"nvim-tree-lua-src": {
|
"nvim-tree-lua-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714794673,
|
"lastModified": 1737769654,
|
||||||
"narHash": "sha256-rY4FbuqBM4zOUkaA3QBc+UrpfTha8uGtp+lIzrYK+cg=",
|
"narHash": "sha256-3wHzEixIhg+aFO9fOOSuTPdNkMK96eG7cdSbK7i5pXA=",
|
||||||
"owner": "kyazdani42",
|
"owner": "kyazdani42",
|
||||||
"repo": "nvim-tree.lua",
|
"repo": "nvim-tree.lua",
|
||||||
"rev": "64f61e4c913047a045ff90bd188dd3b54ee443cf",
|
"rev": "fee1da88972f5972a8296813f6c00d7598325ebd",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -485,20 +612,37 @@
|
|||||||
"nvim-treesitter-src": {
|
"nvim-treesitter-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714811590,
|
"lastModified": 1705679158,
|
||||||
"narHash": "sha256-3Ae3ieCqckVAElTufJxgBRNXdWg81++oI0qesKevcb4=",
|
"narHash": "sha256-zAyiitJIgOCZTB0CmgNt0MHENM70SOHLIoWrVwOJKFg=",
|
||||||
"owner": "nvim-treesitter",
|
"owner": "nvim-treesitter",
|
||||||
"repo": "nvim-treesitter",
|
"repo": "nvim-treesitter",
|
||||||
"rev": "4e21361e15b1d4147830c5fe571556eb1b14e6f9",
|
"rev": "f197a15b0d1e8d555263af20add51450e5aaa1f0",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nvim-treesitter",
|
"owner": "nvim-treesitter",
|
||||||
"ref": "master",
|
"ref": "v0.9.2",
|
||||||
"repo": "nvim-treesitter",
|
"repo": "nvim-treesitter",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"osc": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1732197203,
|
||||||
|
"narHash": "sha256-xL9mqwb+C6WbuJ/qk0lNbi9xd24PbKi5G0FlwaH5XPk=",
|
||||||
|
"owner": "theimpostor",
|
||||||
|
"repo": "osc",
|
||||||
|
"rev": "87b316b3f96a22fd85654cd7bd091f2cac1c6691",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "theimpostor",
|
||||||
|
"ref": "v0.4.6",
|
||||||
|
"repo": "osc",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"ren": {
|
"ren": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
@ -536,16 +680,16 @@
|
|||||||
"baleia-nvim-src": "baleia-nvim-src",
|
"baleia-nvim-src": "baleia-nvim-src",
|
||||||
"base16-nvim-src": "base16-nvim-src",
|
"base16-nvim-src": "base16-nvim-src",
|
||||||
"bufferline-nvim-src": "bufferline-nvim-src",
|
"bufferline-nvim-src": "bufferline-nvim-src",
|
||||||
"bypass-paywalls-clean": "bypass-paywalls-clean",
|
|
||||||
"cmp-nvim-lsp-src": "cmp-nvim-lsp-src",
|
"cmp-nvim-lsp-src": "cmp-nvim-lsp-src",
|
||||||
"comment-nvim-src": "comment-nvim-src",
|
|
||||||
"darwin": "darwin",
|
"darwin": "darwin",
|
||||||
"disko": "disko",
|
"disko": "disko",
|
||||||
"fidget-nvim-src": "fidget-nvim-src",
|
"fidget-nvim-src": "fidget-nvim-src",
|
||||||
"firefox-darwin": "firefox-darwin",
|
"firefox-darwin": "firefox-darwin",
|
||||||
|
"gh-collaborators": "gh-collaborators",
|
||||||
"hmts-nvim-src": "hmts-nvim-src",
|
"hmts-nvim-src": "hmts-nvim-src",
|
||||||
"home-manager": "home-manager",
|
"home-manager": "home-manager",
|
||||||
"kitty-scrollback-nvim-src": "kitty-scrollback-nvim-src",
|
"jujutsu": "jujutsu",
|
||||||
|
"mac-app-util": "mac-app-util",
|
||||||
"nextcloud-cookbook": "nextcloud-cookbook",
|
"nextcloud-cookbook": "nextcloud-cookbook",
|
||||||
"nextcloud-external": "nextcloud-external",
|
"nextcloud-external": "nextcloud-external",
|
||||||
"nextcloud-news": "nextcloud-news",
|
"nextcloud-news": "nextcloud-news",
|
||||||
@ -554,15 +698,19 @@
|
|||||||
"nixos-generators": "nixos-generators",
|
"nixos-generators": "nixos-generators",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nixpkgs-caddy": "nixpkgs-caddy",
|
"nixpkgs-caddy": "nixpkgs-caddy",
|
||||||
|
"nixpkgs-stable": "nixpkgs-stable",
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"nvim-lint-src": "nvim-lint-src",
|
"nvim-lint-src": "nvim-lint-src",
|
||||||
"nvim-lspconfig-src": "nvim-lspconfig-src",
|
"nvim-lspconfig-src": "nvim-lspconfig-src",
|
||||||
"nvim-tree-lua-src": "nvim-tree-lua-src",
|
"nvim-tree-lua-src": "nvim-tree-lua-src",
|
||||||
"nvim-treesitter-src": "nvim-treesitter-src",
|
"nvim-treesitter-src": "nvim-treesitter-src",
|
||||||
|
"osc": "osc",
|
||||||
"ren": "ren",
|
"ren": "ren",
|
||||||
"rep": "rep",
|
"rep": "rep",
|
||||||
|
"snipe-nvim-src": "snipe-nvim-src",
|
||||||
"telescope-nvim-src": "telescope-nvim-src",
|
"telescope-nvim-src": "telescope-nvim-src",
|
||||||
"telescope-project-nvim-src": "telescope-project-nvim-src",
|
"telescope-project-nvim-src": "telescope-project-nvim-src",
|
||||||
|
"tiny-inline-diagnostic-nvim-src": "tiny-inline-diagnostic-nvim-src",
|
||||||
"toggleterm-nvim-src": "toggleterm-nvim-src",
|
"toggleterm-nvim-src": "toggleterm-nvim-src",
|
||||||
"tree-sitter-bash": "tree-sitter-bash",
|
"tree-sitter-bash": "tree-sitter-bash",
|
||||||
"tree-sitter-ini": "tree-sitter-ini",
|
"tree-sitter-ini": "tree-sitter-ini",
|
||||||
@ -576,6 +724,43 @@
|
|||||||
"zenyd-mpv-scripts": "zenyd-mpv-scripts"
|
"zenyd-mpv-scripts": "zenyd-mpv-scripts"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"rust-overlay": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"jujutsu",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1737685583,
|
||||||
|
"narHash": "sha256-p+NVABRpGi+pT+xxf9HcLcFVxG6L+vEEy+NwzB9T0f8=",
|
||||||
|
"owner": "oxalica",
|
||||||
|
"repo": "rust-overlay",
|
||||||
|
"rev": "eb64cbcc8eee0fa87ebded92805280d2ec97415a",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "oxalica",
|
||||||
|
"repo": "rust-overlay",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"snipe-nvim-src": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1736108869,
|
||||||
|
"narHash": "sha256-sJ71eiE0XmMJkhNCkbY82R4eHzBOOKFrPa+nxLc1f8s=",
|
||||||
|
"owner": "leath-dub",
|
||||||
|
"repo": "snipe.nvim",
|
||||||
|
"rev": "0d0a482ac713370196e4fc0025d5aaac5030104d",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "leath-dub",
|
||||||
|
"repo": "snipe.nvim",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"systems": {
|
"systems": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681028828,
|
"lastModified": 1681028828,
|
||||||
@ -592,6 +777,21 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"systems_2": {
|
"systems_2": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1689347925,
|
||||||
|
"narHash": "sha256-ozenz5bFe1UUqOn7f60HRmgc01BgTGIKZ4Xl+HbocGQ=",
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default-darwin",
|
||||||
|
"rev": "2235d7e6cc29ae99878133c95e9fe5e157661ffb",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default-darwin",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"systems_3": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681028828,
|
"lastModified": 1681028828,
|
||||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||||
@ -609,16 +809,16 @@
|
|||||||
"telescope-nvim-src": {
|
"telescope-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1701167040,
|
"lastModified": 1716532947,
|
||||||
"narHash": "sha256-H5RpyWMluE+Yxg7xFX43AZTVW+Yg70DF3FmEGXBUSNg=",
|
"narHash": "sha256-e1ulhc4IIvUgpjKQrSqPY4WpXuez6wlxL6Min9U0o5Q=",
|
||||||
"owner": "nvim-telescope",
|
"owner": "nvim-telescope",
|
||||||
"repo": "telescope.nvim",
|
"repo": "telescope.nvim",
|
||||||
"rev": "d90956833d7c27e73c621a61f20b29fdb7122709",
|
"rev": "a0bbec21143c7bc5f8bb02e0005fa0b982edc026",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nvim-telescope",
|
"owner": "nvim-telescope",
|
||||||
"ref": "0.1.5",
|
"ref": "0.1.8",
|
||||||
"repo": "telescope.nvim",
|
"repo": "telescope.nvim",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -626,11 +826,11 @@
|
|||||||
"telescope-project-nvim-src": {
|
"telescope-project-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1701464478,
|
"lastModified": 1733083023,
|
||||||
"narHash": "sha256-touMCltcnqkrQYV1NtNeWLQeFVGt+WM3aIWIdKilA7w=",
|
"narHash": "sha256-qEORRWYKBpK7fn7se8g+5uuVBJNu0T4JHSc0C2QzNDY=",
|
||||||
"owner": "nvim-telescope",
|
"owner": "nvim-telescope",
|
||||||
"repo": "telescope-project.nvim",
|
"repo": "telescope-project.nvim",
|
||||||
"rev": "1aaf16580a614601a7f7077d9639aeb457dc5559",
|
"rev": "1d7920e799fc5001dffc7bd10909a86e0358eaf4",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -639,19 +839,35 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"tiny-inline-diagnostic-nvim-src": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1737657256,
|
||||||
|
"narHash": "sha256-4RNZjzVrc6lSXCAEHwtdbWJvNCRjglq97ZL9DRM3IiI=",
|
||||||
|
"owner": "rachartier",
|
||||||
|
"repo": "tiny-inline-diagnostic.nvim",
|
||||||
|
"rev": "5c00aec99f558b8f0a2c4445038f74e5f5435c00",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "rachartier",
|
||||||
|
"repo": "tiny-inline-diagnostic.nvim",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"toggleterm-nvim-src": {
|
"toggleterm-nvim-src": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1701858874,
|
"lastModified": 1721232722,
|
||||||
"narHash": "sha256-vJApw7XY2wOX9InfWcah+hkNxBfS1+kQUWr4ITxRmgA=",
|
"narHash": "sha256-hJ6nBCgSyYF1pY4lX+b8WZd49i5F6BwOmrl7xVSIwRw=",
|
||||||
"owner": "akinsho",
|
"owner": "akinsho",
|
||||||
"repo": "toggleterm.nvim",
|
"repo": "toggleterm.nvim",
|
||||||
"rev": "cbd041d91b90cd3c02df03fe6133208888f8e008",
|
"rev": "48be57eaba817f038d61bbf64d2c597f578c0827",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "akinsho",
|
"owner": "akinsho",
|
||||||
"ref": "v2.9.0",
|
"ref": "v2.12.0",
|
||||||
"repo": "toggleterm.nvim",
|
"repo": "toggleterm.nvim",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -659,11 +875,11 @@
|
|||||||
"tree-sitter-bash": {
|
"tree-sitter-bash": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1712878661,
|
"lastModified": 1737678721,
|
||||||
"narHash": "sha256-sj1qYb42k0hXXcNCKg1hINYD11wDcVpnoPhZNtlYT6k=",
|
"narHash": "sha256-aTM0DjmCX2HaeDfZPCoqWULLVoa+nBppiR97jMWWItM=",
|
||||||
"owner": "tree-sitter",
|
"owner": "tree-sitter",
|
||||||
"repo": "tree-sitter-bash",
|
"repo": "tree-sitter-bash",
|
||||||
"rev": "f8fb3274f72a30896075585b32b0c54cad65c086",
|
"rev": "03f4927065b3c0d71a962be87130aa7e79b35448",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -676,11 +892,11 @@
|
|||||||
"tree-sitter-ini": {
|
"tree-sitter-ini": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699877527,
|
"lastModified": 1725233451,
|
||||||
"narHash": "sha256-dYPeVTNWO4apY5dsjsKViavU7YtLeGTp6BzEemXhsEU=",
|
"narHash": "sha256-G11Aynq2rnkRwdkhspjYqtBD/h5k4aD+NvuE0QfploU=",
|
||||||
"owner": "justinmk",
|
"owner": "justinmk",
|
||||||
"repo": "tree-sitter-ini",
|
"repo": "tree-sitter-ini",
|
||||||
"rev": "bcb84a2d4bcd6f55b911c42deade75c8f90cb0c5",
|
"rev": "962568c9efa71d25720ab42c5d36e222626ef3a6",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -692,11 +908,11 @@
|
|||||||
"tree-sitter-lua": {
|
"tree-sitter-lua": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710150044,
|
"lastModified": 1729494737,
|
||||||
"narHash": "sha256-uFaEptW4wPrqgHfB1mYmVltf+4no61L2cPgpsr5qBIU=",
|
"narHash": "sha256-v+fFcIOv+bu+2IGI/Lh/Xbqd5BzbBjaa51ECd0hG7Ow=",
|
||||||
"owner": "MunifTanjim",
|
"owner": "MunifTanjim",
|
||||||
"repo": "tree-sitter-lua",
|
"repo": "tree-sitter-lua",
|
||||||
"rev": "a24dab177e58c9c6832f96b9a73102a0cfbced4a",
|
"rev": "34e60e7f45fc313463c68090d88d742a55d1bd7a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -709,11 +925,11 @@
|
|||||||
"tree-sitter-puppet": {
|
"tree-sitter-puppet": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1713617121,
|
"lastModified": 1734835631,
|
||||||
"narHash": "sha256-+zMgzyuGerJ8l+i5ZtWnmGr3i4fFiSLD5FssyKESsmI=",
|
"narHash": "sha256-bO5g5AdhzpB13yHklpAndUHIX7Rvd7OMjH0Ds2ATA6Q=",
|
||||||
"owner": "amaanq",
|
"owner": "amaanq",
|
||||||
"repo": "tree-sitter-puppet",
|
"repo": "tree-sitter-puppet",
|
||||||
"rev": "584522f32495d648b18a53ccb52d988e60de127d",
|
"rev": "15f192929b7d317f5914de2b4accd37b349182a6",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -725,11 +941,11 @@
|
|||||||
"tree-sitter-python": {
|
"tree-sitter-python": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714528221,
|
"lastModified": 1737668819,
|
||||||
"narHash": "sha256-hHQ5gK4dTRSdp0fLKarytU9vFhsBeQp7Ka61vFoIr7Y=",
|
"narHash": "sha256-g06oE9w2AMCM6BwTQmB+acY1wcQXjIgj62N+z+nrpaY=",
|
||||||
"owner": "tree-sitter",
|
"owner": "tree-sitter",
|
||||||
"repo": "tree-sitter-python",
|
"repo": "tree-sitter-python",
|
||||||
"rev": "71778c2a472ed00a64abf4219544edbf8e4b86d7",
|
"rev": "ab2ba8be034368fa009f62f371c068b8728f9db7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -742,11 +958,11 @@
|
|||||||
"tree-sitter-rasi": {
|
"tree-sitter-rasi": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1707776004,
|
"lastModified": 1716296585,
|
||||||
"narHash": "sha256-7zhQ5wGm0FFyuTiBVN2KgvUTw8G6fwUGR8HKJ69kR+c=",
|
"narHash": "sha256-sPrIVgGGaBaXeqHNxjcdJ/S2FvxyV6rD9UPKU/tpspw=",
|
||||||
"owner": "Fymyte",
|
"owner": "Fymyte",
|
||||||
"repo": "tree-sitter-rasi",
|
"repo": "tree-sitter-rasi",
|
||||||
"rev": "43196d934a9a6ab3c7093a8683efd0111bb03db1",
|
"rev": "6c9bbcfdf5f0f553d9ebc01750a3aa247a37b8aa",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -758,11 +974,11 @@
|
|||||||
"tree-sitter-vimdoc": {
|
"tree-sitter-vimdoc": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1713806200,
|
"lastModified": 1729686839,
|
||||||
"narHash": "sha256-+QbLL5EC3oNiwd7h7MW/mutHhGPUHhbYTQcu6x6atcI=",
|
"narHash": "sha256-Vrl4/cZL+TWlUMEeWZoHCAWhvlefcl3ajGcwyTNKOhI=",
|
||||||
"owner": "neovim",
|
"owner": "neovim",
|
||||||
"repo": "tree-sitter-vimdoc",
|
"repo": "tree-sitter-vimdoc",
|
||||||
"rev": "b711df784dd43d0a8ed8ddbfca0ddcc3239d94b4",
|
"rev": "d2e4b5c172a109966c2ce0378f73df6cede39400",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -771,6 +987,27 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"treefmt-nix": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nur",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1733222881,
|
||||||
|
"narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "treefmt-nix",
|
||||||
|
"rev": "49717b5af6f80172275d47a418c9719a31a78b53",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "treefmt-nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"wallpapers": {
|
"wallpapers": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
@ -789,18 +1026,17 @@
|
|||||||
},
|
},
|
||||||
"wsl": {
|
"wsl": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": "flake-compat",
|
"flake-compat": "flake-compat_2",
|
||||||
"flake-utils": "flake-utils_2",
|
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714355896,
|
"lastModified": 1736095716,
|
||||||
"narHash": "sha256-rtv+nJJ12V7w68j8vIcGacfS1yuK1/dBgglSKWzYMTM=",
|
"narHash": "sha256-csysw/Szu98QDiA2lhWk9seYOyCebeVEWL89zh1cduM=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "NixOS-WSL",
|
"repo": "NixOS-WSL",
|
||||||
"rev": "acb893461a4bee4e77b1a27b1410d4995b52174c",
|
"rev": "63c3b4ed1712a3a0621002cd59bfdc80875ecbb0",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
95
flake.nix
95
flake.nix
@ -7,6 +7,9 @@
|
|||||||
# Used for system packages
|
# Used for system packages
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
|
# Used for specific stable packages
|
||||||
|
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.05";
|
||||||
|
|
||||||
# Used for caddy plugins
|
# Used for caddy plugins
|
||||||
nixpkgs-caddy.url = "github:jpds/nixpkgs/caddy-external-plugins";
|
nixpkgs-caddy.url = "github:jpds/nixpkgs/caddy-external-plugins";
|
||||||
|
|
||||||
@ -37,6 +40,12 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Better App install management in macOS
|
||||||
|
mac-app-util = {
|
||||||
|
url = "github:hraban/mac-app-util";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs"; # Use system packages list for their inputs
|
||||||
|
};
|
||||||
|
|
||||||
# Manage disk format and partitioning
|
# Manage disk format and partitioning
|
||||||
disko = {
|
disko = {
|
||||||
url = "github:nix-community/disko";
|
url = "github:nix-community/disko";
|
||||||
@ -68,7 +77,7 @@
|
|||||||
};
|
};
|
||||||
nvim-lspconfig-src = {
|
nvim-lspconfig-src = {
|
||||||
# https://github.com/neovim/nvim-lspconfig/tags
|
# https://github.com/neovim/nvim-lspconfig/tags
|
||||||
url = "github:neovim/nvim-lspconfig/v0.1.7";
|
url = "github:neovim/nvim-lspconfig/v0.1.8";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
cmp-nvim-lsp-src = {
|
cmp-nvim-lsp-src = {
|
||||||
@ -80,19 +89,14 @@
|
|||||||
url = "github:m00qek/baleia.nvim";
|
url = "github:m00qek/baleia.nvim";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
comment-nvim-src = {
|
|
||||||
# https://github.com/numToStr/Comment.nvim/releases
|
|
||||||
url = "github:numToStr/Comment.nvim/v0.8.0";
|
|
||||||
flake = false;
|
|
||||||
};
|
|
||||||
nvim-treesitter-src = {
|
nvim-treesitter-src = {
|
||||||
# https://github.com/nvim-treesitter/nvim-treesitter/tags
|
# https://github.com/nvim-treesitter/nvim-treesitter/tags
|
||||||
url = "github:nvim-treesitter/nvim-treesitter/master";
|
url = "github:nvim-treesitter/nvim-treesitter/v0.9.2";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
telescope-nvim-src = {
|
telescope-nvim-src = {
|
||||||
# https://github.com/nvim-telescope/telescope.nvim/releases
|
# https://github.com/nvim-telescope/telescope.nvim/releases
|
||||||
url = "github:nvim-telescope/telescope.nvim/0.1.5";
|
url = "github:nvim-telescope/telescope.nvim/0.1.8";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
telescope-project-nvim-src = {
|
telescope-project-nvim-src = {
|
||||||
@ -101,12 +105,12 @@
|
|||||||
};
|
};
|
||||||
toggleterm-nvim-src = {
|
toggleterm-nvim-src = {
|
||||||
# https://github.com/akinsho/toggleterm.nvim/tags
|
# https://github.com/akinsho/toggleterm.nvim/tags
|
||||||
url = "github:akinsho/toggleterm.nvim/v2.9.0";
|
url = "github:akinsho/toggleterm.nvim/v2.12.0";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
bufferline-nvim-src = {
|
bufferline-nvim-src = {
|
||||||
# https://github.com/akinsho/bufferline.nvim/releases
|
# https://github.com/akinsho/bufferline.nvim/releases
|
||||||
url = "github:akinsho/bufferline.nvim/v4.5.0";
|
url = "github:akinsho/bufferline.nvim/v4.6.1";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nvim-tree-lua-src = {
|
nvim-tree-lua-src = {
|
||||||
@ -119,17 +123,21 @@
|
|||||||
};
|
};
|
||||||
fidget-nvim-src = {
|
fidget-nvim-src = {
|
||||||
# https://github.com/j-hui/fidget.nvim/tags
|
# https://github.com/j-hui/fidget.nvim/tags
|
||||||
url = "github:j-hui/fidget.nvim/v1.2.0";
|
url = "github:j-hui/fidget.nvim/v1.4.5";
|
||||||
flake = false;
|
|
||||||
};
|
|
||||||
kitty-scrollback-nvim-src = {
|
|
||||||
url = "github:mikesmithgh/kitty-scrollback.nvim";
|
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nvim-lint-src = {
|
nvim-lint-src = {
|
||||||
url = "github:mfussenegger/nvim-lint";
|
url = "github:mfussenegger/nvim-lint";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
|
tiny-inline-diagnostic-nvim-src = {
|
||||||
|
url = "github:rachartier/tiny-inline-diagnostic.nvim";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
snipe-nvim-src = {
|
||||||
|
url = "github:leath-dub/snipe.nvim";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
|
||||||
# Tree-Sitter Grammars
|
# Tree-Sitter Grammars
|
||||||
tree-sitter-bash = {
|
tree-sitter-bash = {
|
||||||
@ -167,6 +175,13 @@
|
|||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Git alternative
|
||||||
|
# Fixes: https://github.com/martinvonz/jj/issues/4784
|
||||||
|
jujutsu = {
|
||||||
|
url = "github:martinvonz/jj";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
# Ren and rep - CLI find and replace
|
# Ren and rep - CLI find and replace
|
||||||
rep = {
|
rep = {
|
||||||
url = "github:robenkleene/rep-grep";
|
url = "github:robenkleene/rep-grep";
|
||||||
@ -177,33 +192,38 @@
|
|||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Firefox addon from outside the extension store
|
gh-collaborators = {
|
||||||
bypass-paywalls-clean = {
|
url = "github:katiem0/gh-collaborators";
|
||||||
# https://gitlab.com/magnolia1234/bpc-uploads/-/commits/master/?ref_type=HEADS
|
flake = false;
|
||||||
url = "https://github.com/bpc-clone/bpc_updates/releases/download/latest/bypass_paywalls_clean-3.6.6.0.xpi";
|
};
|
||||||
|
|
||||||
|
# Clipboard over SSH
|
||||||
|
osc = {
|
||||||
|
url = "github:theimpostor/osc/v0.4.6";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Nextcloud Apps
|
# Nextcloud Apps
|
||||||
nextcloud-news = {
|
nextcloud-news = {
|
||||||
# https://github.com/nextcloud/news/releases
|
# https://github.com/nextcloud/news/releases
|
||||||
url = "https://github.com/nextcloud/news/releases/download/25.0.0-alpha3/news.tar.gz";
|
url = "https://github.com/nextcloud/news/releases/download/25.0.0-alpha12/news.tar.gz";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nextcloud-external = {
|
nextcloud-external = {
|
||||||
# https://github.com/nextcloud-releases/external/releases
|
# https://github.com/nextcloud-releases/external/releases
|
||||||
url = "https://github.com/nextcloud-releases/external/releases/download/v5.3.1/external-v5.3.1.tar.gz";
|
url = "https://github.com/nextcloud-releases/external/releases/download/v5.5.2/external-v5.5.2.tar.gz";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nextcloud-cookbook = {
|
nextcloud-cookbook = {
|
||||||
# https://github.com/christianlupus-nextcloud/cookbook-releases/releases/
|
# https://github.com/christianlupus-nextcloud/cookbook-releases/releases/
|
||||||
url = "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.0/cookbook-0.11.0.tar.gz";
|
url = "https://github.com/christianlupus-nextcloud/cookbook-releases/releases/download/v0.11.2/cookbook-0.11.2.tar.gz";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nextcloud-snappymail = {
|
nextcloud-snappymail = {
|
||||||
# https://github.com/the-djmaze/snappymail/releases
|
# https://github.com/the-djmaze/snappymail/releases
|
||||||
# https://snappymail.eu/repository/nextcloud
|
# https://snappymail.eu/repository/nextcloud
|
||||||
url = "https://github.com/nmasur/snappymail-nextcloud/releases/download/v2.36.1/snappymail-2.36.1-nextcloud.tar.gz";
|
url = "https://snappymail.eu/repository/nextcloud/snappymail-2.38.2-nextcloud.tar.gz";
|
||||||
|
# url = "https://github.com/nmasur/snappymail-nextcloud/releases/download/v2.36.3/snappymail-2.36.3-nextcloud.tar.gz";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@ -228,36 +248,43 @@
|
|||||||
mail.smtpHost = "smtp.purelymail.com";
|
mail.smtpHost = "smtp.purelymail.com";
|
||||||
dotfilesRepo = "https://github.com/nmasur/dotfiles";
|
dotfilesRepo = "https://github.com/nmasur/dotfiles";
|
||||||
hostnames = {
|
hostnames = {
|
||||||
|
audiobooks = "read.${baseName}";
|
||||||
|
budget = "money.${baseName}";
|
||||||
|
files = "files.${baseName}";
|
||||||
git = "git.${baseName}";
|
git = "git.${baseName}";
|
||||||
influxdb = "influxdb.${baseName}";
|
influxdb = "influxdb.${baseName}";
|
||||||
irc = "irc.${baseName}";
|
irc = "irc.${baseName}";
|
||||||
metrics = "metrics.${baseName}";
|
metrics = "metrics.${baseName}";
|
||||||
minecraft = "minecraft.${baseName}";
|
minecraft = "minecraft.${baseName}";
|
||||||
|
n8n = "n8n.${baseName}";
|
||||||
|
notifications = "ntfy.${baseName}";
|
||||||
prometheus = "prom.${baseName}";
|
prometheus = "prom.${baseName}";
|
||||||
paperless = "paper.${baseName}";
|
paperless = "paper.${baseName}";
|
||||||
|
photos = "photos.${baseName}";
|
||||||
secrets = "vault.${baseName}";
|
secrets = "vault.${baseName}";
|
||||||
stream = "stream.${baseName}";
|
stream = "stream.${baseName}";
|
||||||
content = "cloud.${baseName}";
|
content = "cloud.${baseName}";
|
||||||
books = "books.${baseName}";
|
books = "books.${baseName}";
|
||||||
download = "download.${baseName}";
|
download = "download.${baseName}";
|
||||||
|
status = "status.${baseName}";
|
||||||
transmission = "transmission.${baseName}";
|
transmission = "transmission.${baseName}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Common overlays to always use
|
# Common overlays to always use
|
||||||
overlays = [
|
overlays = [
|
||||||
inputs.nur.overlay
|
inputs.nur.overlays.default
|
||||||
inputs.nix2vim.overlay
|
inputs.nix2vim.overlay
|
||||||
|
inputs.jujutsu.overlays.default # Fix: https://github.com/martinvonz/jj/issues/4784
|
||||||
(import ./overlays/neovim-plugins.nix inputs)
|
(import ./overlays/neovim-plugins.nix inputs)
|
||||||
(import ./overlays/calibre-web.nix)
|
|
||||||
(import ./overlays/disko.nix inputs)
|
|
||||||
(import ./overlays/tree-sitter.nix inputs)
|
(import ./overlays/tree-sitter.nix inputs)
|
||||||
(import ./overlays/mpv-scripts.nix inputs)
|
(import ./overlays/mpv-scripts.nix inputs)
|
||||||
(import ./overlays/nextcloud-apps.nix inputs)
|
(import ./overlays/nextcloud-apps.nix inputs)
|
||||||
(import ./overlays/betterlockscreen.nix)
|
(import ./overlays/betterlockscreen.nix)
|
||||||
(import ./overlays/gh-collaborators.nix)
|
(import ./overlays/gh-collaborators.nix inputs)
|
||||||
(import ./overlays/bypass-paywalls-clean.nix inputs)
|
(import ./overlays/osc.nix inputs)
|
||||||
(import ./overlays/ren-rep.nix inputs)
|
(import ./overlays/ren-rep.nix inputs)
|
||||||
|
(import ./overlays/volnoti.nix)
|
||||||
];
|
];
|
||||||
|
|
||||||
# System types to support.
|
# System types to support.
|
||||||
@ -325,21 +352,23 @@
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
x86_64-linux.staff = staff "x86_64-linux";
|
x86_64-linux.staff = staff "x86_64-linux";
|
||||||
x86_64-linux.arrow = inputs.nixos-generators.nixosGenerate {
|
x86_64-linux.arrow = inputs.nixos-generators.nixosGenerate rec {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
format = "iso";
|
format = "iso";
|
||||||
|
specialArgs = {
|
||||||
|
pkgs-stable = import inputs.nixpkgs-stable { inherit system; };
|
||||||
|
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
||||||
|
};
|
||||||
modules = import ./hosts/arrow/modules.nix { inherit inputs globals overlays; };
|
modules = import ./hosts/arrow/modules.nix { inherit inputs globals overlays; };
|
||||||
};
|
};
|
||||||
x86_64-linux.arrow-aws = inputs.nixos-generators.nixosGenerate rec {
|
x86_64-linux.arrow-aws = inputs.nixos-generators.nixosGenerate rec {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
format = "amazon";
|
format = "amazon";
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
|
pkgs-stable = import inputs.nixpkgs-stable { inherit system; };
|
||||||
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
||||||
};
|
};
|
||||||
modules = import ./hosts/arrow/modules.nix { inherit inputs globals overlays; } ++ [
|
modules = import ./hosts/arrow/modules.nix { inherit inputs globals overlays; } ++ [
|
||||||
# import
|
|
||||||
# ./modules/aws
|
|
||||||
# { inherit inputs; }
|
|
||||||
(
|
(
|
||||||
{ ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
@ -348,6 +377,8 @@
|
|||||||
permitRootLogin = "prohibit-password";
|
permitRootLogin = "prohibit-password";
|
||||||
boot.loader.systemd-boot.enable = inputs.nixpkgs.lib.mkForce false;
|
boot.loader.systemd-boot.enable = inputs.nixpkgs.lib.mkForce false;
|
||||||
boot.loader.efi.canTouchEfiVariables = inputs.nixpkgs.lib.mkForce false;
|
boot.loader.efi.canTouchEfiVariables = inputs.nixpkgs.lib.mkForce false;
|
||||||
|
services.amazon-ssm-agent.enable = true;
|
||||||
|
users.users.ssm-user.extraGroups = [ "wheel" ];
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
];
|
];
|
||||||
|
@ -1,26 +1,40 @@
|
|||||||
resource "aws_instance" "instance" {
|
resource "aws_instance" "instance" {
|
||||||
ami = aws_ami.image.id
|
ami = aws_ami.image.id
|
||||||
|
iam_instance_profile = aws_iam_instance_profile.instance.name
|
||||||
instance_type = var.ec2_size
|
instance_type = var.ec2_size
|
||||||
vpc_security_group_ids = [aws_security_group.instance.id]
|
vpc_security_group_ids = [aws_security_group.instance.id]
|
||||||
|
|
||||||
tags = merge(local.default_tags, {
|
tags = {
|
||||||
Name = "aws-nixos"
|
Name = "aws-nixos"
|
||||||
})
|
}
|
||||||
|
|
||||||
lifecycle {
|
lifecycle {
|
||||||
create_before_destroy = true
|
create_before_destroy = true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "aws_ec2_instance_state" "instance" {
|
||||||
|
instance_id = aws_instance.instance.id
|
||||||
|
state = "running"
|
||||||
|
}
|
||||||
|
|
||||||
data "aws_vpc" "vpc" {
|
data "aws_vpc" "vpc" {
|
||||||
default = true
|
default = true
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "aws_security_group" "instance" {
|
resource "aws_security_group" "instance" {
|
||||||
name = "t2-aws-nixos-test"
|
name = "aws-nixos"
|
||||||
description = "Allow SSH and HTTPS"
|
description = "Allow SSH and HTTPS"
|
||||||
vpc_id = data.aws_vpc.vpc.id
|
vpc_id = data.aws_vpc.vpc.id
|
||||||
|
|
||||||
|
ingress {
|
||||||
|
description = "Ping"
|
||||||
|
from_port = -1
|
||||||
|
to_port = -1
|
||||||
|
protocol = "icmp"
|
||||||
|
cidr_blocks = ["0.0.0.0/0"]
|
||||||
|
}
|
||||||
|
|
||||||
ingress {
|
ingress {
|
||||||
description = "SSH"
|
description = "SSH"
|
||||||
from_port = 22
|
from_port = 22
|
||||||
@ -45,3 +59,40 @@ resource "aws_security_group" "instance" {
|
|||||||
ipv6_cidr_blocks = ["::/0"]
|
ipv6_cidr_blocks = ["::/0"]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Setup IAM for the instance to use SSM
|
||||||
|
data "aws_iam_policy_document" "ec2_assume_role" {
|
||||||
|
statement {
|
||||||
|
actions = ["sts:AssumeRole"]
|
||||||
|
principals {
|
||||||
|
type = "Service"
|
||||||
|
identifiers = ["ec2.amazonaws.com"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
data "aws_iam_policy_document" "instance_profile" {
|
||||||
|
statement {
|
||||||
|
actions = [
|
||||||
|
"s3:ListAllMyBuckets",
|
||||||
|
]
|
||||||
|
resources = ["*"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_iam_role" "instance_profile" {
|
||||||
|
name = "nixos"
|
||||||
|
assume_role_policy = data.aws_iam_policy_document.ec2_assume_role.json
|
||||||
|
inline_policy {
|
||||||
|
name = "instance-profile"
|
||||||
|
policy = data.aws_iam_policy_document.instance_profile.json
|
||||||
|
}
|
||||||
|
}
|
||||||
|
resource "aws_iam_role_policy_attachment" "instance_ssm" {
|
||||||
|
role = aws_iam_role.instance_profile.name
|
||||||
|
policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
|
||||||
|
}
|
||||||
|
resource "aws_iam_instance_profile" "instance" {
|
||||||
|
name = "nixos"
|
||||||
|
role = aws_iam_role.instance_profile.name
|
||||||
|
}
|
||||||
|
@ -1,13 +1,23 @@
|
|||||||
locals {
|
# locals {
|
||||||
image_file = one(fileset(path.root, "result/nixos-amazon-image-*.vhd"))
|
# image_file = one(fileset(path.root, "../../../result/nixos-amazon-image-*.vhd"))
|
||||||
|
# }
|
||||||
|
#
|
||||||
|
# # Upload image to S3
|
||||||
|
# resource "aws_s3_object" "image" {
|
||||||
|
# bucket = var.images_bucket
|
||||||
|
# key = basename(local.image_file)
|
||||||
|
# source = local.image_file
|
||||||
|
# etag = filemd5(local.image_file)
|
||||||
|
# }
|
||||||
|
|
||||||
|
# Use existing image in S3
|
||||||
|
data "aws_s3_object" "image" {
|
||||||
|
bucket = var.images_bucket
|
||||||
|
key = "arrow.vhd"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Upload image to S3
|
resource "terraform_data" "image_replacement" {
|
||||||
resource "aws_s3_object" "image" {
|
input = data.aws_s3_object.image.etag
|
||||||
bucket = var.images_bucket
|
|
||||||
key = basename(local.image_file)
|
|
||||||
source = local.image_file
|
|
||||||
etag = filemd5(local.image_file)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# Setup IAM access for the VM Importer
|
# Setup IAM access for the VM Importer
|
||||||
@ -29,8 +39,8 @@ data "aws_iam_policy_document" "vmimport" {
|
|||||||
"s3:ListBucket",
|
"s3:ListBucket",
|
||||||
]
|
]
|
||||||
resources = [
|
resources = [
|
||||||
"arn:aws:s3:::${aws_s3_object.image.bucket}",
|
"arn:aws:s3:::${data.aws_s3_object.image.bucket}",
|
||||||
"arn:aws:s3:::${aws_s3_object.image.bucket}/*",
|
"arn:aws:s3:::${data.aws_s3_object.image.bucket}/*",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
statement {
|
statement {
|
||||||
@ -58,23 +68,28 @@ resource "aws_ebs_snapshot_import" "image" {
|
|||||||
disk_container {
|
disk_container {
|
||||||
format = "VHD"
|
format = "VHD"
|
||||||
user_bucket {
|
user_bucket {
|
||||||
s3_bucket = aws_s3_object.image.bucket
|
s3_bucket = data.aws_s3_object.image.bucket
|
||||||
s3_key = aws_s3_object.image.key
|
s3_key = data.aws_s3_object.image.key
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
role_name = aws_iam_role.vmimport.name
|
role_name = aws_iam_role.vmimport.name
|
||||||
|
lifecycle {
|
||||||
|
replace_triggered_by = [terraform_data.image_replacement]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Convert to AMI
|
# Convert to AMI
|
||||||
resource "aws_ami" "image" {
|
resource "aws_ami" "image" {
|
||||||
description = "Created with NixOS."
|
description = "Created with NixOS."
|
||||||
name = replace(basename(local.image_file), "/\\.vhd$/", "")
|
name = replace(basename(data.aws_s3_object.image.key), "/\\.vhd$/", "")
|
||||||
virtualization_type = "hvm"
|
virtualization_type = "hvm"
|
||||||
|
root_device_name = "/dev/xvda"
|
||||||
|
ena_support = true
|
||||||
|
|
||||||
ebs_block_device {
|
ebs_block_device {
|
||||||
device_name = "/dev/xvda"
|
device_name = "/dev/xvda"
|
||||||
snapshot_id = aws_ebs_snapshot_import.image.id
|
snapshot_id = aws_ebs_snapshot_import.image.id
|
||||||
volume_size = 8
|
volume_size = 17
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
3
hosts/arrow/aws/outputs.tf
Normal file
3
hosts/arrow/aws/outputs.tf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
output "host_ip" {
|
||||||
|
value = aws_instance.instance.public_ip
|
||||||
|
}
|
@ -26,6 +26,16 @@ inputs.nixpkgs.lib.nixosSystem rec {
|
|||||||
device = "/dev/disk/by-label/boot";
|
device = "/dev/disk/by-label/boot";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
virtualisation.vmVariant = {
|
||||||
|
virtualisation.forwardPorts = [
|
||||||
|
{
|
||||||
|
from = "host";
|
||||||
|
host.port = 2222;
|
||||||
|
guest.port = 22;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -22,19 +22,10 @@
|
|||||||
cloudflare.enable = true;
|
cloudflare.enable = true;
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
services.caddy.enable = true;
|
services.caddy.enable = true;
|
||||||
|
services.n8n.enable = true;
|
||||||
|
|
||||||
# nix-index seems to eat up too much memory for Vultr
|
# nix-index seems to eat up too much memory for Vultr
|
||||||
home-manager.users.${globals.user}.programs.nix-index.enable = inputs.nixpkgs.lib.mkForce false;
|
home-manager.users.${globals.user}.programs.nix-index.enable = inputs.nixpkgs.lib.mkForce false;
|
||||||
|
|
||||||
virtualisation.vmVariant = {
|
|
||||||
virtualisation.forwardPorts = [
|
|
||||||
{
|
|
||||||
from = "host";
|
|
||||||
host.port = 2222;
|
|
||||||
guest.port = 22;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
../../modules/common
|
../../modules/common
|
||||||
../../modules/nixos
|
../../modules/nixos
|
||||||
|
@ -30,15 +30,6 @@ terraform {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# locals {
|
|
||||||
# image_file = one(fileset(path.root, "result/iso/nixos.iso"))
|
|
||||||
# }
|
|
||||||
|
|
||||||
# variable "cloudflare_r2_endpoint" {
|
|
||||||
# type = string
|
|
||||||
# description = "Domain for the Cloudflare R2 endpoint"
|
|
||||||
# }
|
|
||||||
|
|
||||||
variable "vultr_api_key" {
|
variable "vultr_api_key" {
|
||||||
type = string
|
type = string
|
||||||
description = "API key for Vultr management"
|
description = "API key for Vultr management"
|
||||||
@ -64,18 +55,6 @@ provider "vultr" {
|
|||||||
api_key = var.vultr_api_key
|
api_key = var.vultr_api_key
|
||||||
}
|
}
|
||||||
|
|
||||||
# data "aws_s3_bucket" "images" {
|
|
||||||
# bucket = "noahmasur-arrow-images"
|
|
||||||
# }
|
|
||||||
#
|
|
||||||
# resource "aws_s3_object" "image" {
|
|
||||||
# bucket = data.aws_s3_bucket.images.id
|
|
||||||
# key = "arrow.iso"
|
|
||||||
# source = local.image_file
|
|
||||||
# etag = filemd5(local.image_file)
|
|
||||||
# acl = "public-read"
|
|
||||||
# }
|
|
||||||
|
|
||||||
resource "vultr_iso_private" "image" {
|
resource "vultr_iso_private" "image" {
|
||||||
# url = "https://${var.cloudflare_account_id}.r2.cloudflarestorage.com/${data.aws_s3_bucket.images.id}/${aws_s3_object.image.key}"
|
# url = "https://${var.cloudflare_account_id}.r2.cloudflarestorage.com/${data.aws_s3_bucket.images.id}/${aws_s3_object.image.key}"
|
||||||
url = "https://arrow-images.masu.rs/arrow.iso"
|
url = "https://arrow-images.masu.rs/arrow.iso"
|
||||||
|
@ -14,9 +14,12 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
|
||||||
inputs.nixpkgs.lib.nixosSystem {
|
inputs.nixpkgs.lib.nixosSystem rec {
|
||||||
system = "aarch64-linux";
|
system = "aarch64-linux";
|
||||||
specialArgs = { };
|
specialArgs = {
|
||||||
|
pkgs-stable = import inputs.nixpkgs-stable { inherit system; };
|
||||||
|
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
||||||
|
};
|
||||||
modules = [
|
modules = [
|
||||||
globals
|
globals
|
||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
@ -59,7 +62,7 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
|
|
||||||
# Still require colors for programs like Neovim, K9S
|
# Still require colors for programs like Neovim, K9S
|
||||||
theme = {
|
theme = {
|
||||||
colors = (import ../../colorscheme/gruvbox).dark;
|
colors = (import ../../colorscheme/gruvbox-dark).dark;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Programs and services
|
# Programs and services
|
||||||
@ -68,6 +71,7 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
dotfiles.enable = true; # Clone dotfiles
|
dotfiles.enable = true; # Clone dotfiles
|
||||||
neovim.enable = true;
|
neovim.enable = true;
|
||||||
giteaRunner.enable = true;
|
giteaRunner.enable = true;
|
||||||
|
services.actualbudget.enable = true;
|
||||||
services.caddy.enable = true;
|
services.caddy.enable = true;
|
||||||
services.grafana.enable = true;
|
services.grafana.enable = true;
|
||||||
services.thelounge.enable = true;
|
services.thelounge.enable = true;
|
||||||
@ -77,6 +81,11 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
services.gitea.enable = true;
|
services.gitea.enable = true;
|
||||||
services.vaultwarden.enable = true;
|
services.vaultwarden.enable = true;
|
||||||
services.minecraft-server.enable = true; # Setup Minecraft server
|
services.minecraft-server.enable = true; # Setup Minecraft server
|
||||||
|
services.n8n.enable = true;
|
||||||
|
services.ntfy-sh.enable = true;
|
||||||
|
services.postgresql.enable = true;
|
||||||
|
services.uptime-kuma.enable = true;
|
||||||
|
system.autoUpgrade.enable = true;
|
||||||
|
|
||||||
# Allows private remote access over the internet
|
# Allows private remote access over the internet
|
||||||
cloudflareTunnel = {
|
cloudflareTunnel = {
|
||||||
@ -91,6 +100,7 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
endpoint = "s3.us-west-002.backblazeb2.com";
|
endpoint = "s3.us-west-002.backblazeb2.com";
|
||||||
bucket = "noahmasur-backup";
|
bucket = "noahmasur-backup";
|
||||||
accessKeyId = "0026b0e73b2e2c80000000005";
|
accessKeyId = "0026b0e73b2e2c80000000005";
|
||||||
|
resticBucket = "noahmasur-restic";
|
||||||
};
|
};
|
||||||
|
|
||||||
# Disable passwords, only use SSH key
|
# Disable passwords, only use SSH key
|
||||||
|
@ -23,9 +23,11 @@ inputs.darwin.lib.darwinSystem {
|
|||||||
}
|
}
|
||||||
)
|
)
|
||||||
inputs.home-manager.darwinModules.home-manager
|
inputs.home-manager.darwinModules.home-manager
|
||||||
|
inputs.mac-app-util.darwinModules.default
|
||||||
{
|
{
|
||||||
nixpkgs.overlays = [ inputs.firefox-darwin.overlay ] ++ overlays;
|
nixpkgs.overlays = [ inputs.firefox-darwin.overlay ] ++ overlays;
|
||||||
networking.hostName = "lookingglass";
|
networking.hostName = "NYCM-NMASUR2";
|
||||||
|
networking.computerName = "NYCM-NMASUR2";
|
||||||
identityFile = "/Users/Noah.Masur/.ssh/id_ed25519";
|
identityFile = "/Users/Noah.Masur/.ssh/id_ed25519";
|
||||||
gui.enable = true;
|
gui.enable = true;
|
||||||
theme = {
|
theme = {
|
||||||
@ -51,6 +53,8 @@ inputs.darwin.lib.darwinSystem {
|
|||||||
kubernetes.enable = true;
|
kubernetes.enable = true;
|
||||||
_1password.enable = true;
|
_1password.enable = true;
|
||||||
slack.enable = true;
|
slack.enable = true;
|
||||||
|
wezterm.enable = true;
|
||||||
|
yt-dlp.enable = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -8,9 +8,12 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
|
||||||
inputs.nixpkgs.lib.nixosSystem {
|
inputs.nixpkgs.lib.nixosSystem rec {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = { };
|
specialArgs = {
|
||||||
|
pkgs-stable = import inputs.nixpkgs-stable { inherit system; };
|
||||||
|
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
||||||
|
};
|
||||||
modules = [
|
modules = [
|
||||||
globals
|
globals
|
||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
@ -64,6 +67,14 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
devices = (import ../../disks/root.nix { disk = "/dev/nvme0n1"; });
|
devices = (import ../../disks/root.nix { disk = "/dev/nvme0n1"; });
|
||||||
};
|
};
|
||||||
|
|
||||||
|
zramSwap.enable = true;
|
||||||
|
swapDevices = [
|
||||||
|
{
|
||||||
|
device = "/swapfile";
|
||||||
|
size = 4 * 1024; # 4 GB
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
boot.zfs = {
|
boot.zfs = {
|
||||||
# Automatically load the ZFS pool on boot
|
# Automatically load the ZFS pool on boot
|
||||||
extraPools = [ "tank" ];
|
extraPools = [ "tank" ];
|
||||||
@ -94,8 +105,11 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
cloudflare.enable = true;
|
cloudflare.enable = true;
|
||||||
dotfiles.enable = true;
|
dotfiles.enable = true;
|
||||||
arrs.enable = true;
|
arrs.enable = true;
|
||||||
|
filebrowser.enable = true;
|
||||||
|
services.audiobookshelf.enable = true;
|
||||||
services.bind.enable = true;
|
services.bind.enable = true;
|
||||||
services.caddy.enable = true;
|
services.caddy.enable = true;
|
||||||
|
services.immich.enable = true;
|
||||||
services.jellyfin.enable = true;
|
services.jellyfin.enable = true;
|
||||||
services.nextcloud.enable = true;
|
services.nextcloud.enable = true;
|
||||||
services.calibre-web.enable = true;
|
services.calibre-web.enable = true;
|
||||||
@ -105,6 +119,7 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
services.samba.enable = true;
|
services.samba.enable = true;
|
||||||
services.paperless.enable = true;
|
services.paperless.enable = true;
|
||||||
services.postgresql.enable = true;
|
services.postgresql.enable = true;
|
||||||
|
system.autoUpgrade.enable = false;
|
||||||
|
|
||||||
# Allows private remote access over the internet
|
# Allows private remote access over the internet
|
||||||
cloudflareTunnel = {
|
cloudflareTunnel = {
|
||||||
@ -119,6 +134,7 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
endpoint = "s3.us-west-002.backblazeb2.com";
|
endpoint = "s3.us-west-002.backblazeb2.com";
|
||||||
bucket = "noahmasur-backup";
|
bucket = "noahmasur-backup";
|
||||||
accessKeyId = "0026b0e73b2e2c80000000005";
|
accessKeyId = "0026b0e73b2e2c80000000005";
|
||||||
|
resticBucket = "noahmasur-restic";
|
||||||
};
|
};
|
||||||
|
|
||||||
# Disable passwords, only use SSH key
|
# Disable passwords, only use SSH key
|
||||||
|
@ -8,8 +8,12 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
|
||||||
inputs.nixpkgs.lib.nixosSystem {
|
inputs.nixpkgs.lib.nixosSystem rec {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
|
specialArgs = {
|
||||||
|
pkgs-stable = import inputs.nixpkgs-stable { inherit system; };
|
||||||
|
pkgs-caddy = import inputs.nixpkgs-caddy { inherit system; };
|
||||||
|
};
|
||||||
modules = [
|
modules = [
|
||||||
globals
|
globals
|
||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
@ -37,6 +41,12 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
boot.kernelModules = [ "kvm-amd" ];
|
boot.kernelModules = [ "kvm-amd" ];
|
||||||
services.xserver.videoDrivers = [ "amdgpu" ];
|
services.xserver.videoDrivers = [ "amdgpu" ];
|
||||||
|
|
||||||
|
# I don't think I need this?
|
||||||
|
# boot.kernelParams = [
|
||||||
|
# "video=DP-0:2560x1440@165"
|
||||||
|
# "video=DP-1:1920x1080@60"
|
||||||
|
# ];
|
||||||
|
|
||||||
# Required binary blobs to boot on this machine
|
# Required binary blobs to boot on this machine
|
||||||
hardware.enableRedistributableFirmware = true;
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
|
||||||
@ -112,11 +122,13 @@ inputs.nixpkgs.lib.nixosSystem {
|
|||||||
mullvad.enable = false;
|
mullvad.enable = false;
|
||||||
rust.enable = true;
|
rust.enable = true;
|
||||||
terraform.enable = true;
|
terraform.enable = true;
|
||||||
|
wezterm.enable = true;
|
||||||
yt-dlp.enable = true;
|
yt-dlp.enable = true;
|
||||||
gaming = {
|
gaming = {
|
||||||
dwarf-fortress.enable = true;
|
dwarf-fortress.enable = true;
|
||||||
enable = true;
|
enable = true;
|
||||||
steam.enable = true;
|
steam.enable = true;
|
||||||
|
moonlight.enable = true;
|
||||||
legendary.enable = true;
|
legendary.enable = true;
|
||||||
lutris.enable = true;
|
lutris.enable = true;
|
||||||
ryujinx.enable = true;
|
ryujinx.enable = true;
|
||||||
|
@ -22,10 +22,9 @@
|
|||||||
"1password-cli"
|
"1password-cli"
|
||||||
];
|
];
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
home.packages = with pkgs; [
|
home.packages = [
|
||||||
_1password-gui
|
pkgs._1password-cli
|
||||||
_1password
|
] ++ (if pkgs.stdenv.isLinux then [ pkgs._1password-gui ] else [ ]);
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# https://1password.community/discussion/135462/firefox-extension-does-not-connect-to-linux-app
|
# https://1password.community/discussion/135462/firefox-extension-does-not-connect-to-linux-app
|
||||||
|
@ -11,6 +11,7 @@
|
|||||||
./obsidian.nix
|
./obsidian.nix
|
||||||
./qbittorrent.nix
|
./qbittorrent.nix
|
||||||
./slack.nix
|
./slack.nix
|
||||||
|
./wezterm.nix
|
||||||
./yt-dlp.nix
|
./yt-dlp.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -35,7 +35,6 @@
|
|||||||
# https://nur.nix-community.org/repos/rycee/
|
# https://nur.nix-community.org/repos/rycee/
|
||||||
extensions = with pkgs.nur.repos.rycee.firefox-addons; [
|
extensions = with pkgs.nur.repos.rycee.firefox-addons; [
|
||||||
(lib.mkIf config._1password.enable onepassword-password-manager)
|
(lib.mkIf config._1password.enable onepassword-password-manager)
|
||||||
pkgs.bypass-paywalls-clean
|
|
||||||
darkreader
|
darkreader
|
||||||
don-t-fuck-with-paste
|
don-t-fuck-with-paste
|
||||||
facebook-container
|
facebook-container
|
||||||
@ -72,6 +71,8 @@
|
|||||||
"cookiebanners.ui.desktop.enabled" = true; # Reject cookie popups
|
"cookiebanners.ui.desktop.enabled" = true; # Reject cookie popups
|
||||||
"devtools.command-button-screenshot.enabled" = true; # Scrolling screenshot of entire page
|
"devtools.command-button-screenshot.enabled" = true; # Scrolling screenshot of entire page
|
||||||
"svg.context-properties.content.enabled" = true; # Sidebery styling
|
"svg.context-properties.content.enabled" = true; # Sidebery styling
|
||||||
|
"browser.tabs.hoverPreview.enabled" = false; # Disable tab previews
|
||||||
|
"browser.tabs.hoverPreview.showThumbnails" = false; # Disable tab previews
|
||||||
};
|
};
|
||||||
userChrome = ''
|
userChrome = ''
|
||||||
:root {
|
:root {
|
||||||
@ -158,13 +159,26 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Mimic nixpkgs package environment for read-only profiles.ini management
|
||||||
|
# From: https://github.com/booxter/home-manager/commit/dd1602e306fec366280f5953c5e1b553e3d9672a
|
||||||
|
home.sessionVariables = {
|
||||||
|
MOZ_LEGACY_PROFILES = 1;
|
||||||
|
MOZ_ALLOW_DOWNGRADE = 1;
|
||||||
|
};
|
||||||
|
|
||||||
|
# launchd.user.envVariables = config.home-manager.users.${config.user}.home.sessionVariables;
|
||||||
|
|
||||||
xdg.mimeApps = {
|
xdg.mimeApps = {
|
||||||
associations.added = {
|
associations.added = {
|
||||||
"text.html" = [ "firefox.desktop" ];
|
"text/html" = [ "firefox.desktop" ];
|
||||||
};
|
};
|
||||||
defaultApplications = {
|
defaultApplications = {
|
||||||
"text.html" = [ "firefox.desktop" ];
|
"text/html" = [ "firefox.desktop" ];
|
||||||
};
|
};
|
||||||
|
associations.removed = {
|
||||||
|
"text/html" = [ "wine-extension-htm.desktop" ];
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
xsession.windowManager.i3.config.keybindings = lib.mkIf pkgs.stdenv.isLinux {
|
xsession.windowManager.i3.config.keybindings = lib.mkIf pkgs.stdenv.isLinux {
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
environment =
|
environment =
|
||||||
{ }
|
{ }
|
||||||
// lib.attrsets.optionalAttrs (builtins.hasAttr "sessionVariables" config.environment) {
|
// lib.attrsets.optionalAttrs (builtins.hasAttr "sessionVariables" config.environment) {
|
||||||
sessionVariables.ROFI_SYSTEMD_TERM = "${pkgs.kitty}/bin/kitty";
|
sessionVariables.ROFI_SYSTEMD_TERM = lib.mkDefault "${pkgs.kitty}/bin/kitty";
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
@ -31,13 +31,16 @@
|
|||||||
xsession.windowManager.i3.config.terminal = lib.mkIf pkgs.stdenv.isLinux "kitty";
|
xsession.windowManager.i3.config.terminal = lib.mkIf pkgs.stdenv.isLinux "kitty";
|
||||||
|
|
||||||
# Set the Rofi terminal for running programs
|
# Set the Rofi terminal for running programs
|
||||||
programs.rofi.terminal = lib.mkIf pkgs.stdenv.isLinux "${pkgs.kitty}/bin/kitty";
|
programs.rofi.terminal = lib.mkIf pkgs.stdenv.isLinux (lib.mkDefault "${pkgs.kitty}/bin/kitty");
|
||||||
|
|
||||||
# Display images in the terminal
|
# Display images in the terminal
|
||||||
programs.fish.shellAliases = {
|
programs.fish.interactiveShellInit = # fish
|
||||||
icat = "kitty +kitten icat";
|
''
|
||||||
ssh = "kitty +kitten ssh";
|
if test "$TERM" = "xterm-kitty"
|
||||||
};
|
alias icat="kitty +kitten icat"
|
||||||
|
alias ssh="kitty +kitten ssh"
|
||||||
|
end
|
||||||
|
'';
|
||||||
|
|
||||||
programs.kitty = {
|
programs.kitty = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@ -50,18 +53,9 @@
|
|||||||
|
|
||||||
# Easy fullscreen toggle (for macOS)
|
# Easy fullscreen toggle (for macOS)
|
||||||
"super+f" = "toggle_fullscreen";
|
"super+f" = "toggle_fullscreen";
|
||||||
|
|
||||||
# Kitty scrollback nvim
|
|
||||||
"kitty_mod+h" = "kitty_scrollback_nvim";
|
|
||||||
"kitty_mod+g" = "kitty_scrollback_nvim --config ksb_builtin_last_cmd_output";
|
|
||||||
};
|
};
|
||||||
settings = {
|
settings = {
|
||||||
|
|
||||||
# Required for kitty-scrollback.nvim
|
|
||||||
allow_remote_control = "socket-only";
|
|
||||||
listen_on = "unix:/tmp/kitty";
|
|
||||||
action_alias = "kitty_scrollback_nvim kitten ${pkgs.vimPlugins.kitty-scrollback-nvim}/python/kitty_scrollback_nvim.py";
|
|
||||||
|
|
||||||
# Colors (adapted from: https://github.com/kdrag0n/base16-kitty/blob/master/templates/default-256.mustache)
|
# Colors (adapted from: https://github.com/kdrag0n/base16-kitty/blob/master/templates/default-256.mustache)
|
||||||
background = config.theme.colors.base00;
|
background = config.theme.colors.base00;
|
||||||
foreground = config.theme.colors.base05;
|
foreground = config.theme.colors.base05;
|
||||||
|
@ -23,6 +23,6 @@
|
|||||||
|
|
||||||
# Broken on 2023-12-11
|
# Broken on 2023-12-11
|
||||||
# https://forum.obsidian.md/t/electron-25-is-now-eol-please-upgrade-to-a-newer-version/72878/8
|
# https://forum.obsidian.md/t/electron-25-is-now-eol-please-upgrade-to-a-newer-version/72878/8
|
||||||
nixpkgs.config.permittedInsecurePackages = [ "electron-25.9.0" ];
|
insecurePackages = [ "electron-25.9.0" ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -21,4 +21,6 @@
|
|||||||
home.packages = with pkgs; [ slack ];
|
home.packages = with pkgs; [ slack ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Theme string: #1D2122,#665C54,#8EC07C,#BDAE93
|
||||||
}
|
}
|
||||||
|
286
modules/common/applications/wezterm.nix
Normal file
286
modules/common/applications/wezterm.nix
Normal file
@ -0,0 +1,286 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
wezterm = {
|
||||||
|
enable = lib.mkEnableOption {
|
||||||
|
description = "Enable WezTerm terminal.";
|
||||||
|
default = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config =
|
||||||
|
let
|
||||||
|
font = config.home-manager.users.${config.user}.programs.kitty.font.name;
|
||||||
|
in
|
||||||
|
lib.mkIf (config.gui.enable && config.wezterm.enable) {
|
||||||
|
|
||||||
|
# Set the Rofi-Systemd terminal for viewing logs
|
||||||
|
# Using optionalAttrs because only available in NixOS
|
||||||
|
environment =
|
||||||
|
{ }
|
||||||
|
// lib.attrsets.optionalAttrs (builtins.hasAttr "sessionVariables" config.environment) {
|
||||||
|
sessionVariables.ROFI_SYSTEMD_TERM = "${pkgs.wezterm}/bin/wezterm";
|
||||||
|
};
|
||||||
|
|
||||||
|
terminal = "${pkgs.wezterm}/bin/wezterm";
|
||||||
|
terminalLaunchCommand = "${config.terminal} start --";
|
||||||
|
|
||||||
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
|
# Set the i3 terminal
|
||||||
|
xsession.windowManager.i3.config.terminal = lib.mkIf pkgs.stdenv.isLinux "wezterm";
|
||||||
|
|
||||||
|
# Display images in the terminal
|
||||||
|
programs.fish.shellAliases = {
|
||||||
|
icat = lib.mkForce "wezterm imgcat";
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.wezterm = {
|
||||||
|
enable = true;
|
||||||
|
colorSchemes = {
|
||||||
|
myTheme = {
|
||||||
|
background = config.theme.colors.base00;
|
||||||
|
foreground = config.theme.colors.base05;
|
||||||
|
cursor_bg = config.theme.colors.base05;
|
||||||
|
cursor_fg = config.theme.colors.base00;
|
||||||
|
cursor_border = config.theme.colors.base05;
|
||||||
|
selection_bg = config.theme.colors.base05;
|
||||||
|
selection_fg = config.theme.colors.base00;
|
||||||
|
scrollbar_thumb = config.theme.colors.base03;
|
||||||
|
ansi = [
|
||||||
|
config.theme.colors.base01 # black
|
||||||
|
config.theme.colors.base0F # maroon
|
||||||
|
config.theme.colors.base0B # green
|
||||||
|
config.theme.colors.base0A # olive
|
||||||
|
config.theme.colors.base0D # navy
|
||||||
|
config.theme.colors.base0E # purple
|
||||||
|
config.theme.colors.base0C # teal
|
||||||
|
config.theme.colors.base06 # silver
|
||||||
|
];
|
||||||
|
brights = [
|
||||||
|
config.theme.colors.base03 # grey
|
||||||
|
config.theme.colors.base08 # red
|
||||||
|
config.theme.colors.base0B # lime
|
||||||
|
config.theme.colors.base0A # yellow
|
||||||
|
config.theme.colors.base0D # blue
|
||||||
|
config.theme.colors.base0E # fuchsia
|
||||||
|
config.theme.colors.base0C # aqua
|
||||||
|
config.theme.colors.base07 # white
|
||||||
|
];
|
||||||
|
compose_cursor = config.theme.colors.base09; # orange
|
||||||
|
copy_mode_active_highlight_bg = {
|
||||||
|
Color = config.theme.colors.base03;
|
||||||
|
};
|
||||||
|
copy_mode_active_highlight_fg = {
|
||||||
|
Color = config.theme.colors.base07;
|
||||||
|
};
|
||||||
|
copy_mode_inactive_highlight_bg = {
|
||||||
|
Color = config.theme.colors.base02;
|
||||||
|
};
|
||||||
|
copy_mode_inactive_highlight_fg = {
|
||||||
|
Color = config.theme.colors.base06;
|
||||||
|
};
|
||||||
|
quick_select_label_bg = {
|
||||||
|
Color = config.theme.colors.base02;
|
||||||
|
};
|
||||||
|
quick_select_label_fg = {
|
||||||
|
Color = config.theme.colors.base06;
|
||||||
|
};
|
||||||
|
quick_select_match_bg = {
|
||||||
|
Color = config.theme.colors.base03;
|
||||||
|
};
|
||||||
|
quick_select_match_fg = {
|
||||||
|
Color = config.theme.colors.base07;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
extraConfig = ''
|
||||||
|
local wezterm = require("wezterm")
|
||||||
|
local config = wezterm.config_builder()
|
||||||
|
config.check_for_updates = false
|
||||||
|
config.color_scheme = "myTheme"
|
||||||
|
|
||||||
|
-- Scrollback
|
||||||
|
config.scrollback_lines = 10000
|
||||||
|
|
||||||
|
-- Window
|
||||||
|
config.window_padding = {
|
||||||
|
left = 10,
|
||||||
|
right = 10,
|
||||||
|
top = 10,
|
||||||
|
bottom = 12,
|
||||||
|
}
|
||||||
|
|
||||||
|
config.font = wezterm.font('${font}', { weight = 'Bold'})
|
||||||
|
config.font_size = ${if pkgs.stdenv.isLinux then "14.0" else "18.0"}
|
||||||
|
|
||||||
|
-- Fix color blocks instead of text
|
||||||
|
config.front_end = "WebGpu"
|
||||||
|
|
||||||
|
-- Tab Bar
|
||||||
|
config.hide_tab_bar_if_only_one_tab = true
|
||||||
|
config.window_frame = {
|
||||||
|
font = wezterm.font('${font}', { weight = 'Bold'}),
|
||||||
|
font_size = ${if pkgs.stdenv.isLinux then "12.0" else "16.0"},
|
||||||
|
}
|
||||||
|
|
||||||
|
config.colors = {
|
||||||
|
tab_bar = {
|
||||||
|
active_tab = {
|
||||||
|
bg_color = '${config.theme.colors.base00}',
|
||||||
|
fg_color = '${config.theme.colors.base04}',
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
-- Disable audio
|
||||||
|
config.audible_bell = "Disabled"
|
||||||
|
|
||||||
|
config.initial_rows = 80
|
||||||
|
config.initial_cols = 200
|
||||||
|
|
||||||
|
config.unix_domains = {
|
||||||
|
{
|
||||||
|
name = 'unix',
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
-- This causes `wezterm` to act as though it was started as
|
||||||
|
-- `wezterm connect unix` by default, connecting to the unix
|
||||||
|
-- domain on startup.
|
||||||
|
-- If you prefer to connect manually, leave out this line.
|
||||||
|
config.default_gui_startup_args = { 'connect', 'unix' }
|
||||||
|
|
||||||
|
config.leader = {
|
||||||
|
key = 'a',
|
||||||
|
mods = 'CTRL',
|
||||||
|
timeout_milliseconds = 2000,
|
||||||
|
}
|
||||||
|
|
||||||
|
config.keys = {
|
||||||
|
-- Attach to muxer
|
||||||
|
{
|
||||||
|
key = 'a',
|
||||||
|
mods = 'LEADER',
|
||||||
|
action = wezterm.action.AttachDomain 'unix',
|
||||||
|
},
|
||||||
|
|
||||||
|
-- Detach from muxer
|
||||||
|
{
|
||||||
|
key = 'd',
|
||||||
|
mods = 'LEADER',
|
||||||
|
action = wezterm.action.DetachDomain { DomainName = 'unix' },
|
||||||
|
},
|
||||||
|
-- sends completion string for fish autosuggestions
|
||||||
|
{
|
||||||
|
key = 'Enter',
|
||||||
|
mods = 'SHIFT',
|
||||||
|
action = wezterm.action.SendString '\x1F'
|
||||||
|
},
|
||||||
|
-- ctrl-shift-h was "hide"
|
||||||
|
{
|
||||||
|
key = 'H',
|
||||||
|
mods = 'SHIFT|CTRL',
|
||||||
|
action = wezterm.action.DisableDefaultAssignment
|
||||||
|
},
|
||||||
|
-- alt-enter was "fullscreen"
|
||||||
|
{
|
||||||
|
key = 'Enter',
|
||||||
|
mods = 'ALT',
|
||||||
|
action = wezterm.action.DisableDefaultAssignment
|
||||||
|
},
|
||||||
|
-- make super-f "fullscreen"
|
||||||
|
{
|
||||||
|
key = 'f',
|
||||||
|
mods = 'SUPER',
|
||||||
|
action = wezterm.action.ToggleFullScreen
|
||||||
|
},
|
||||||
|
-- super-t open new tab in new dir
|
||||||
|
{
|
||||||
|
key = 't',
|
||||||
|
mods = ${if pkgs.stdenv.isDarwin then "'SUPER'" else "'ALT'"},
|
||||||
|
action = wezterm.action.SpawnCommandInNewTab {
|
||||||
|
cwd = wezterm.home_dir,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
-- shift-super-t open new tab in same dir
|
||||||
|
{
|
||||||
|
key = 't',
|
||||||
|
mods = 'SUPER|SHIFT',
|
||||||
|
action = wezterm.action.SpawnTab 'CurrentPaneDomain'
|
||||||
|
},
|
||||||
|
-- project switcher
|
||||||
|
{
|
||||||
|
key = 'P',
|
||||||
|
mods = 'SUPER',
|
||||||
|
action = wezterm.action_callback(function(window, pane)
|
||||||
|
local choices = {}
|
||||||
|
|
||||||
|
wezterm.log_info "working?"
|
||||||
|
|
||||||
|
function scandir(directory)
|
||||||
|
local i, t, popen = 0, {}, io.popen
|
||||||
|
local pfile = popen('${pkgs.fd}/bin/fd --search-path "'..directory..'" --type directory --exact-depth 2 | ${pkgs.proximity-sort}/bin/proximity-sort "'..os.getenv("HOME").."/dev/work"..'"')
|
||||||
|
for filename in pfile:lines() do
|
||||||
|
i = i + 1
|
||||||
|
t[i] = filename
|
||||||
|
end
|
||||||
|
pfile:close()
|
||||||
|
return t
|
||||||
|
end
|
||||||
|
|
||||||
|
for _, v in pairs(scandir(os.getenv("HOME").."/dev")) do
|
||||||
|
table.insert(choices, { label = v })
|
||||||
|
end
|
||||||
|
|
||||||
|
window:perform_action(
|
||||||
|
wezterm.action.InputSelector {
|
||||||
|
action = wezterm.action_callback(function(window, pane, id, label)
|
||||||
|
if not id and not label then
|
||||||
|
wezterm.log_info "cancelled"
|
||||||
|
else
|
||||||
|
window:perform_action(
|
||||||
|
wezterm.action.SpawnCommandInNewTab {
|
||||||
|
cwd = label,
|
||||||
|
},
|
||||||
|
pane
|
||||||
|
)
|
||||||
|
end
|
||||||
|
end),
|
||||||
|
fuzzy = true,
|
||||||
|
title = "Select Project",
|
||||||
|
choices = choices,
|
||||||
|
},
|
||||||
|
pane
|
||||||
|
)
|
||||||
|
end),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
-- print the workspace name at the upper right
|
||||||
|
wezterm.on("update-right-status", function(window, pane)
|
||||||
|
window:set_right_status(window:active_workspace())
|
||||||
|
end)
|
||||||
|
-- load plugin
|
||||||
|
local workspace_switcher = wezterm.plugin.require("https://github.com/MLFlexer/smart_workspace_switcher.wezterm")
|
||||||
|
-- set path to zoxide
|
||||||
|
workspace_switcher.zoxide_path = "${pkgs.zoxide}/bin/zoxide"
|
||||||
|
-- keymaps
|
||||||
|
table.insert(config.keys, { key = "s", mods = "CTRL|SHIFT", action = workspace_switcher.switch_workspace() })
|
||||||
|
-- table.insert(config.keys, { key = "t", mods = "CTRL|SHIFT", action = wezterm.action.ShowLauncherArgs({ flags = "FUZZY|WORKSPACES" }) })
|
||||||
|
table.insert(config.keys, { key = "[", mods = "CTRL|SHIFT", action = wezterm.action.SwitchWorkspaceRelative(1) })
|
||||||
|
table.insert(config.keys, { key = "]", mods = "CTRL|SHIFT", action = wezterm.action.SwitchWorkspaceRelative(-1) })
|
||||||
|
|
||||||
|
return config
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -76,7 +76,24 @@
|
|||||||
description = "List of unfree packages to allow.";
|
description = "List of unfree packages to allow.";
|
||||||
default = [ ];
|
default = [ ];
|
||||||
};
|
};
|
||||||
|
insecurePackages = lib.mkOption {
|
||||||
|
type = lib.types.listOf lib.types.str;
|
||||||
|
description = "List of insecure packages to allow.";
|
||||||
|
default = [ ];
|
||||||
|
};
|
||||||
hostnames = {
|
hostnames = {
|
||||||
|
audiobooks = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for audiobook server (Audiobookshelf).";
|
||||||
|
};
|
||||||
|
budget = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for budgeting server (ActualBudget).";
|
||||||
|
};
|
||||||
|
files = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for files server (Filebrowser).";
|
||||||
|
};
|
||||||
git = lib.mkOption {
|
git = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for git server (Gitea).";
|
description = "Hostname for git server (Gitea).";
|
||||||
@ -93,6 +110,10 @@
|
|||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for document server (paperless-ngx).";
|
description = "Hostname for document server (paperless-ngx).";
|
||||||
};
|
};
|
||||||
|
photos = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for photo management (Immich).";
|
||||||
|
};
|
||||||
prometheus = lib.mkOption {
|
prometheus = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for Prometheus server.";
|
description = "Hostname for Prometheus server.";
|
||||||
@ -125,6 +146,18 @@
|
|||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for IRC services.";
|
description = "Hostname for IRC services.";
|
||||||
};
|
};
|
||||||
|
n8n = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for n8n automation.";
|
||||||
|
};
|
||||||
|
notifications = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for push notification services (ntfy).";
|
||||||
|
};
|
||||||
|
status = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Hostname for status page (Uptime-Kuma).";
|
||||||
|
};
|
||||||
transmission = lib.mkOption {
|
transmission = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Hostname for peer2peer downloads (Transmission).";
|
description = "Hostname for peer2peer downloads (Transmission).";
|
||||||
@ -157,6 +190,9 @@
|
|||||||
# Retrieves package object based on string name
|
# Retrieves package object based on string name
|
||||||
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) config.unfreePackages;
|
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) config.unfreePackages;
|
||||||
|
|
||||||
|
# Allow specified insecure packages (identified elsewhere)
|
||||||
|
nixpkgs.config.permittedInsecurePackages = config.insecurePackages;
|
||||||
|
|
||||||
# Pin a state version to prevent warnings
|
# Pin a state version to prevent warnings
|
||||||
home-manager.users.${config.user}.home.stateVersion = stateVersion;
|
home-manager.users.${config.user}.home.stateVersion = stateVersion;
|
||||||
home-manager.users.root.home.stateVersion = stateVersion;
|
home-manager.users.root.home.stateVersion = stateVersion;
|
||||||
|
@ -158,14 +158,19 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
extraConfig = {
|
extraConfig = {
|
||||||
general.unsafe-accounts-conf = true;
|
general = {
|
||||||
|
unsafe-accounts-conf = true;
|
||||||
|
# log-file = "~/.cache/aerc.log";
|
||||||
|
# log-level = "debug";
|
||||||
|
};
|
||||||
viewer = {
|
viewer = {
|
||||||
pager = "${pkgs.less}/bin/less -R";
|
pager = "${pkgs.less}/bin/less -R";
|
||||||
};
|
};
|
||||||
filters = {
|
filters = {
|
||||||
"text/plain" = "${pkgs.aerc}/libexec/aerc/filters/colorize";
|
"text/plain" = "${pkgs.aerc}/libexec/aerc/filters/colorize";
|
||||||
"text/calendar" = "${pkgs.gawk}/bin/awk -f ${pkgs.aerc}/libexec/aerc/filters/calendar";
|
"text/calendar" = "${pkgs.gawk}/bin/awk -f ${pkgs.aerc}/libexec/aerc/filters/calendar";
|
||||||
"text/html" = "${pkgs.aerc}/libexec/aerc/filters/html | ${pkgs.aerc}/libexec/aerc/filters/colorize"; # Requires w3m, dante
|
"text/html" =
|
||||||
|
"${pkgs.aerc}/libexec/aerc/filters/html | ${pkgs.aerc}/libexec/aerc/filters/colorize"; # Requires w3m, dante
|
||||||
# "text/*" =
|
# "text/*" =
|
||||||
# ''${pkgs.bat}/bin/bat -fP --file-name="$AERC_FILENAME "'';
|
# ''${pkgs.bat}/bin/bat -fP --file-name="$AERC_FILENAME "'';
|
||||||
"message/delivery-status" = "${pkgs.aerc}/libexec/aerc/filters/colorize";
|
"message/delivery-status" = "${pkgs.aerc}/libexec/aerc/filters/colorize";
|
||||||
@ -186,20 +191,19 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
xdg.desktopEntries.aerc = lib.mkIf pkgs.stdenv.isLinux {
|
xdg.desktopEntries.aerc = lib.mkIf (pkgs.stdenv.isLinux && config.gui.enable) {
|
||||||
name = "aerc";
|
name = "aerc";
|
||||||
exec = "kitty aerc %u";
|
exec = "${config.terminalLaunchCommand} aerc %u";
|
||||||
};
|
};
|
||||||
xsession.windowManager.i3.config.keybindings = lib.mkIf pkgs.stdenv.isLinux {
|
xsession.windowManager.i3.config.keybindings = lib.mkIf pkgs.stdenv.isLinux {
|
||||||
"${
|
"${config.home-manager.users.${config.user}.xsession.windowManager.i3.config.modifier}+Shift+e" =
|
||||||
config.home-manager.users.${config.user}.xsession.windowManager.i3.config.modifier
|
"exec ${
|
||||||
}+Shift+e" = "exec ${
|
|
||||||
# Don't name the script `aerc` or it will affect grep
|
# Don't name the script `aerc` or it will affect grep
|
||||||
builtins.toString (
|
builtins.toString (
|
||||||
pkgs.writeShellScript "focus-mail.sh" ''
|
pkgs.writeShellScript "focus-mail.sh" ''
|
||||||
count=$(ps aux | grep -c aerc)
|
count=$(ps aux | grep -c aerc)
|
||||||
if [ "$count" -eq 1 ]; then
|
if [ "$count" -eq 1 ]; then
|
||||||
i3-msg "exec --no-startup-id kitty --class aerc aerc"
|
i3-msg "exec --no-startup-id ${config.terminal} start --class aerc -- aerc"
|
||||||
sleep 0.25
|
sleep 0.25
|
||||||
fi
|
fi
|
||||||
i3-msg "[class=aerc] focus"
|
i3-msg "[class=aerc] focus"
|
||||||
|
@ -6,6 +6,7 @@
|
|||||||
plugins = [
|
plugins = [
|
||||||
pkgs.vimPlugins.bufferline-nvim
|
pkgs.vimPlugins.bufferline-nvim
|
||||||
pkgs.vimPlugins.vim-bbye # Better closing of buffers
|
pkgs.vimPlugins.vim-bbye # Better closing of buffers
|
||||||
|
pkgs.vimPlugins.snipe-nvim # Jump between open buffers
|
||||||
];
|
];
|
||||||
setup.bufferline = {
|
setup.bufferline = {
|
||||||
options = {
|
options = {
|
||||||
@ -15,6 +16,7 @@
|
|||||||
offsets = [ { filetype = "NvimTree"; } ];
|
offsets = [ { filetype = "NvimTree"; } ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
setup.snipe = { };
|
||||||
lua = ''
|
lua = ''
|
||||||
-- Move buffers
|
-- Move buffers
|
||||||
vim.keymap.set("n", "L", ":BufferLineCycleNext<CR>", { silent = true })
|
vim.keymap.set("n", "L", ":BufferLineCycleNext<CR>", { silent = true })
|
||||||
@ -22,5 +24,7 @@
|
|||||||
|
|
||||||
-- Kill buffer
|
-- Kill buffer
|
||||||
vim.keymap.set("n", "<Leader>x", " :Bdelete<CR>", { silent = true })
|
vim.keymap.set("n", "<Leader>x", " :Bdelete<CR>", { silent = true })
|
||||||
'';
|
|
||||||
|
-- Jump to buffer
|
||||||
|
vim.keymap.set("n", "gb", require("snipe").open_buffer_menu, { silent = true }) '';
|
||||||
}
|
}
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
{
|
{
|
||||||
|
|
||||||
plugins = [
|
plugins = [
|
||||||
|
pkgs.vimPlugins.nvim-cmp
|
||||||
pkgs.vimPlugins.cmp-nvim-lsp
|
pkgs.vimPlugins.cmp-nvim-lsp
|
||||||
pkgs.vimPlugins.cmp-buffer
|
pkgs.vimPlugins.cmp-buffer
|
||||||
pkgs.vimPlugins.cmp-path
|
pkgs.vimPlugins.cmp-path
|
||||||
@ -26,15 +27,21 @@
|
|||||||
|
|
||||||
# Basic completion keybinds
|
# Basic completion keybinds
|
||||||
mapping = {
|
mapping = {
|
||||||
"['<C-n>']" = dsl.rawLua "require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Insert })";
|
"['<C-n>']" =
|
||||||
"['<C-p>']" = dsl.rawLua "require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Insert })";
|
dsl.rawLua "require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })";
|
||||||
"['<Down>']" = dsl.rawLua "require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Select })";
|
"['<C-p>']" =
|
||||||
"['<Up>']" = dsl.rawLua "require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Select })";
|
dsl.rawLua "require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })";
|
||||||
|
"['<Down>']" =
|
||||||
|
dsl.rawLua "require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Select }, { 'i', 'c' })";
|
||||||
|
"['<Up>']" =
|
||||||
|
dsl.rawLua "require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Select }, { 'i', 'c' })";
|
||||||
"['<C-d>']" = dsl.rawLua "require('cmp').mapping.scroll_docs(-4)";
|
"['<C-d>']" = dsl.rawLua "require('cmp').mapping.scroll_docs(-4)";
|
||||||
"['<C-f>']" = dsl.rawLua "require('cmp').mapping.scroll_docs(4)";
|
"['<C-f>']" = dsl.rawLua "require('cmp').mapping.scroll_docs(4)";
|
||||||
"['<C-e>']" = dsl.rawLua "require('cmp').mapping.abort()";
|
"['<C-e>']" = dsl.rawLua "require('cmp').mapping.abort()";
|
||||||
"['<CR>']" = dsl.rawLua "require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Replace, select = true, })";
|
"['<C-y>']" =
|
||||||
"['<C-r>']" = dsl.rawLua "require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Replace, select = true, })";
|
dsl.rawLua "require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Insert, select = true, }, { 'i', 'c' })";
|
||||||
|
"['<C-r>']" =
|
||||||
|
dsl.rawLua "require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Replace, select = true, }, { 'i', 'c' })";
|
||||||
"['<Esc>']" = dsl.rawLua ''
|
"['<Esc>']" = dsl.rawLua ''
|
||||||
function(_)
|
function(_)
|
||||||
cmp.mapping({
|
cmp.mapping({
|
||||||
@ -44,7 +51,7 @@
|
|||||||
vim.cmd("stopinsert") --- Abort and leave insert mode
|
vim.cmd("stopinsert") --- Abort and leave insert mode
|
||||||
end
|
end
|
||||||
'';
|
'';
|
||||||
"['<C-l>']" = dsl.rawLua ''
|
"['<C-k>']" = dsl.rawLua ''
|
||||||
cmp.mapping(function(_)
|
cmp.mapping(function(_)
|
||||||
if require("luasnip").expand_or_jumpable() then
|
if require("luasnip").expand_or_jumpable() then
|
||||||
require("luasnip").expand_or_jump()
|
require("luasnip").expand_or_jump()
|
||||||
@ -128,16 +135,44 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
lua = ''
|
lua' = ''
|
||||||
-- Use buffer source for `/`
|
-- Use buffer source for `/`
|
||||||
require('cmp').setup.cmdline("/", {
|
require('cmp').setup.cmdline("/", {
|
||||||
sources = {
|
mapping = {
|
||||||
{ name = "buffer", keyword_length = 5 },
|
['<C-n>'] = {
|
||||||
|
c = require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })
|
||||||
},
|
},
|
||||||
|
['<C-p>'] = {
|
||||||
|
c = require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
['<C-y>'] = {
|
||||||
|
c = require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Insert, select = true, }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
['<C-r>'] = {
|
||||||
|
c = require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Replace, select = true, }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
},
|
||||||
|
sources = require('cmp').config.sources({
|
||||||
|
{ name = "buffer", keyword_length = 5 },
|
||||||
|
}),
|
||||||
})
|
})
|
||||||
|
|
||||||
-- Use cmdline & path source for ':'
|
-- Use cmdline & path source for ':'
|
||||||
require('cmp').setup.cmdline(":", {
|
require('cmp').setup.cmdline(":", {
|
||||||
|
mapping = {
|
||||||
|
['<C-n>'] = {
|
||||||
|
c = require('cmp').mapping.select_next_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
['<C-p>'] = {
|
||||||
|
c = require('cmp').mapping.select_prev_item({ behavior = require('cmp').SelectBehavior.Insert }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
['<C-y>'] = {
|
||||||
|
c = require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Insert, select = true, }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
['<C-r>'] = {
|
||||||
|
c = require('cmp').mapping.confirm({ behavior = require('cmp').ConfirmBehavior.Replace, select = true, }, { 'i', 'c' })
|
||||||
|
},
|
||||||
|
},
|
||||||
sources = require('cmp').config.sources({
|
sources = require('cmp').config.sources({
|
||||||
{ name = "path" },
|
{ name = "path" },
|
||||||
}, {
|
}, {
|
||||||
|
@ -2,8 +2,11 @@
|
|||||||
vim.keymap.set("n", "<Leader>gr", ":!gh browse %<CR><CR>", { silent = true })
|
vim.keymap.set("n", "<Leader>gr", ":!gh browse %<CR><CR>", { silent = true })
|
||||||
|
|
||||||
-- Pop a terminal to watch the current run
|
-- Pop a terminal to watch the current run
|
||||||
local gitwatch =
|
local gitwatch = require("toggleterm.terminal").Terminal:new({
|
||||||
require("toggleterm.terminal").Terminal:new({ cmd = "fish --interactive --init-command 'gh run watch'" })
|
cmd = "fish --interactive --init-command 'gh run watch'",
|
||||||
|
hidden = true,
|
||||||
|
direction = "float",
|
||||||
|
})
|
||||||
|
|
||||||
-- Set a toggle for this terminal
|
-- Set a toggle for this terminal
|
||||||
function GITWATCH_TOGGLE()
|
function GITWATCH_TOGGLE()
|
||||||
@ -11,4 +14,4 @@ function GITWATCH_TOGGLE()
|
|||||||
end
|
end
|
||||||
|
|
||||||
-- Keymap to toggle the run
|
-- Keymap to toggle the run
|
||||||
vim.keymap.set("n", "<Leader>gw", GITWATCH_TOGGLE)
|
vim.keymap.set("n", "<Leader>W", GITWATCH_TOGGLE)
|
||||||
|
@ -18,9 +18,12 @@
|
|||||||
pkgs.vimPlugins.conform-nvim
|
pkgs.vimPlugins.conform-nvim
|
||||||
pkgs.vimPlugins.fidget-nvim
|
pkgs.vimPlugins.fidget-nvim
|
||||||
pkgs.vimPlugins.nvim-lint
|
pkgs.vimPlugins.nvim-lint
|
||||||
|
pkgs.vimPlugins.vim-table-mode
|
||||||
|
pkgs.vimPlugins.tiny-inline-diagnostic-nvim
|
||||||
];
|
];
|
||||||
|
|
||||||
setup.fidget = { };
|
setup.fidget = { };
|
||||||
|
setup.tiny-inline-diagnostic = { };
|
||||||
|
|
||||||
use.lspconfig.lua_ls.setup = dsl.callWith {
|
use.lspconfig.lua_ls.setup = dsl.callWith {
|
||||||
settings = {
|
settings = {
|
||||||
@ -70,6 +73,9 @@
|
|||||||
files = {
|
files = {
|
||||||
excludeDirs = [ ".direnv" ];
|
excludeDirs = [ ".direnv" ];
|
||||||
};
|
};
|
||||||
|
cargo = {
|
||||||
|
features = "all";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@ -88,7 +94,7 @@
|
|||||||
rust = [ "rustfmt" ];
|
rust = [ "rustfmt" ];
|
||||||
sh = [ "shfmt" ];
|
sh = [ "shfmt" ];
|
||||||
terraform = if config.terraform then [ "terraform_fmt" ] else [ ];
|
terraform = if config.terraform then [ "terraform_fmt" ] else [ ];
|
||||||
hcl = if config.terraform then [ "terraform_fmt" ] else [ ];
|
hcl = [ "hcl" ];
|
||||||
};
|
};
|
||||||
formatters = {
|
formatters = {
|
||||||
lua.command = "${pkgs.stylua}/bin/stylua";
|
lua.command = "${pkgs.stylua}/bin/stylua";
|
||||||
@ -105,6 +111,7 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
terraform_fmt.command = if config.terraform then "${pkgs.terraform}/bin/terraform" else "";
|
terraform_fmt.command = if config.terraform then "${pkgs.terraform}/bin/terraform" else "";
|
||||||
|
hcl.command = "${pkgs.hclfmt}/bin/hclfmt";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -131,6 +138,9 @@
|
|||||||
|
|
||||||
-- Prevent infinite log size (change this when debugging)
|
-- Prevent infinite log size (change this when debugging)
|
||||||
vim.lsp.set_log_level("off")
|
vim.lsp.set_log_level("off")
|
||||||
|
|
||||||
|
-- Hide buffer diagnostics (use tiny-inline-diagnostic.nvim instead)
|
||||||
|
vim.diagnostic.config({ virtual_text = false })
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -10,23 +10,20 @@
|
|||||||
pkgs.vimPlugins.vim-eunuch # File manipulation commands
|
pkgs.vimPlugins.vim-eunuch # File manipulation commands
|
||||||
pkgs.vimPlugins.vim-fugitive # Git commands
|
pkgs.vimPlugins.vim-fugitive # Git commands
|
||||||
pkgs.vimPlugins.vim-repeat # Better repeat using .
|
pkgs.vimPlugins.vim-repeat # Better repeat using .
|
||||||
pkgs.vimPlugins.comment-nvim # Smart comment commands
|
pkgs.vimPlugins.vim-abolish # Keep capitalization in substitute (Subvert)
|
||||||
pkgs.vimPlugins.glow-nvim # Markdown preview popup
|
pkgs.vimPlugins.markview-nvim # Markdown preview
|
||||||
pkgs.vimPlugins.nvim-colorizer-lua # Hex color previews
|
pkgs.vimPlugins.nvim-colorizer-lua # Hex color previews
|
||||||
pkgs.vimPlugins.which-key-nvim # Keybind helper
|
pkgs.vimPlugins.which-key-nvim # Keybind helper
|
||||||
pkgs.vimPlugins.kitty-scrollback-nvim # Scrollback pager for kitty
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# Initialize some plugins
|
# Initialize some plugins
|
||||||
setup.Comment = { };
|
|
||||||
setup.colorizer = {
|
setup.colorizer = {
|
||||||
user_default_options = {
|
user_default_options = {
|
||||||
names = false;
|
names = false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
setup.glow = { };
|
setup.markview = { };
|
||||||
setup.which-key = { };
|
setup.which-key = { };
|
||||||
setup.kitty-scrollback = { };
|
|
||||||
|
|
||||||
vim.o = {
|
vim.o = {
|
||||||
termguicolors = true; # Set to truecolor
|
termguicolors = true; # Set to truecolor
|
||||||
@ -44,7 +41,6 @@
|
|||||||
scrolloff = 3; # Margin of lines to see while scrolling
|
scrolloff = 3; # Margin of lines to see while scrolling
|
||||||
splitright = true; # Vertical splits on the right side
|
splitright = true; # Vertical splits on the right side
|
||||||
splitbelow = true; # Horizontal splits on the bottom side
|
splitbelow = true; # Horizontal splits on the bottom side
|
||||||
pastetoggle = "<F3>"; # Use F3 to enter raw paste mode
|
|
||||||
clipboard = "unnamedplus"; # Uses system clipboard for yanking
|
clipboard = "unnamedplus"; # Uses system clipboard for yanking
|
||||||
updatetime = 300; # Faster diagnostics
|
updatetime = 300; # Faster diagnostics
|
||||||
mouse = "nv"; # Mouse interaction / scrolling
|
mouse = "nv"; # Mouse interaction / scrolling
|
||||||
@ -62,8 +58,8 @@
|
|||||||
|
|
||||||
# Better backup, swap and undo storage
|
# Better backup, swap and undo storage
|
||||||
vim.o.backup = true; # Easier to recover and more secure
|
vim.o.backup = true; # Easier to recover and more secure
|
||||||
vim.bo.swapfile = false; # Instead of swaps, create backups
|
vim.opt.undofile = true; # Keeps undos after quit
|
||||||
vim.bo.undofile = true; # Keeps undos after quit
|
vim.opt.swapfile = false; # Instead of swaps, create backups
|
||||||
vim.o.backupdir = dsl.rawLua ''vim.fn.expand("~/.local/state/nvim/backup//")'';
|
vim.o.backupdir = dsl.rawLua ''vim.fn.expand("~/.local/state/nvim/backup//")'';
|
||||||
vim.o.undodir = dsl.rawLua ''vim.fn.expand("~/.local/state/nvim/undo//")'';
|
vim.o.undodir = dsl.rawLua ''vim.fn.expand("~/.local/state/nvim/undo//")'';
|
||||||
|
|
||||||
|
@ -26,7 +26,6 @@
|
|||||||
pkgs.vimPlugins.playground # Tree-sitter experimenting
|
pkgs.vimPlugins.playground # Tree-sitter experimenting
|
||||||
pkgs.vimPlugins.nginx-vim
|
pkgs.vimPlugins.nginx-vim
|
||||||
pkgs.vimPlugins.vim-helm
|
pkgs.vimPlugins.vim-helm
|
||||||
pkgs.vimPlugins.baleia-nvim # Clean ANSI from kitty scrollback
|
|
||||||
# pkgs.vimPlugins.hmts-nvim # Tree-sitter injections for home-manager
|
# pkgs.vimPlugins.hmts-nvim # Tree-sitter injections for home-manager
|
||||||
(pkgs.vimUtils.buildVimPlugin {
|
(pkgs.vimUtils.buildVimPlugin {
|
||||||
pname = "nmasur";
|
pname = "nmasur";
|
||||||
|
@ -21,7 +21,7 @@ function TERM_TOGGLE()
|
|||||||
basicterminal:toggle()
|
basicterminal:toggle()
|
||||||
end
|
end
|
||||||
|
|
||||||
local nixpkgs = terminal:new({ cmd = "nix repl '<nixpkgs>'" })
|
local nixpkgs = terminal:new({ cmd = "nix repl --expr 'import <nixpkgs>{}'" })
|
||||||
function NIXPKGS_TOGGLE()
|
function NIXPKGS_TOGGLE()
|
||||||
nixpkgs:toggle()
|
nixpkgs:toggle()
|
||||||
end
|
end
|
||||||
|
@ -48,17 +48,11 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Set Neovim as the kitty terminal "scrollback" (vi mode) option.
|
|
||||||
# Requires removing some of the ANSI escape codes that are sent to the
|
|
||||||
# scrollback using sed and baleia, as well as removing several
|
|
||||||
# unnecessary features.
|
|
||||||
programs.kitty.settings.scrollback_pager = "${neovim}/bin/nvim --headless +'KittyScrollbackGenerateKittens' +'set nonumber' +'set norelativenumber' +'%print' +'quit!' 2>&1";
|
|
||||||
|
|
||||||
# Create a desktop option for launching Neovim from a file manager
|
# Create a desktop option for launching Neovim from a file manager
|
||||||
# (Requires launching the terminal and then executing Neovim)
|
# (Requires launching the terminal and then executing Neovim)
|
||||||
xdg.desktopEntries.nvim = lib.mkIf pkgs.stdenv.isLinux {
|
xdg.desktopEntries.nvim = lib.mkIf (pkgs.stdenv.isLinux && config.gui.enable) {
|
||||||
name = "Neovim wrapper";
|
name = "Neovim wrapper";
|
||||||
exec = "kitty nvim %F";
|
exec = "${config.home-manager.users.${config.user}.programs.rofi.terminal} nvim %F";
|
||||||
mimeType = [
|
mimeType = [
|
||||||
"text/plain"
|
"text/plain"
|
||||||
"text/markdown"
|
"text/markdown"
|
||||||
|
@ -11,8 +11,20 @@ vim.filetype.add({
|
|||||||
})
|
})
|
||||||
|
|
||||||
vim.api.nvim_create_autocmd("FileType", {
|
vim.api.nvim_create_autocmd("FileType", {
|
||||||
pattern = "*.eml",
|
pattern = "mail",
|
||||||
callback = function()
|
callback = function()
|
||||||
vim.o.wrapmargin = 79 -- Wrap text automatically
|
vim.o.wrapmargin = 79 -- Wrap text automatically
|
||||||
end,
|
end,
|
||||||
})
|
})
|
||||||
|
|
||||||
|
vim.api.nvim_create_autocmd("FileType", {
|
||||||
|
pattern = "markdown",
|
||||||
|
command = "TableModeEnable",
|
||||||
|
})
|
||||||
|
|
||||||
|
vim.api.nvim_create_autocmd("FileType", {
|
||||||
|
pattern = "terraform",
|
||||||
|
callback = function()
|
||||||
|
vim.bo.commentstring = "# %s"
|
||||||
|
end,
|
||||||
|
})
|
||||||
|
@ -14,7 +14,7 @@
|
|||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
# python310 # Standard Python interpreter
|
# python310 # Standard Python interpreter
|
||||||
nodePackages.pyright # Python language server
|
pyright # Python language server
|
||||||
black # Python formatter
|
black # Python formatter
|
||||||
python310Packages.flake8 # Python linter
|
python310Packages.flake8 # Python linter
|
||||||
];
|
];
|
||||||
|
22
modules/common/shell/bash/scripts/aws-ec2.sh
Executable file
22
modules/common/shell/bash/scripts/aws-ec2.sh
Executable file
@ -0,0 +1,22 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
# Retrieve list of AWS instances
|
||||||
|
# Use enter to jump into their sessions with SSM
|
||||||
|
|
||||||
|
# Specify AWS_PROFILE and AWS_REGION before running this script
|
||||||
|
|
||||||
|
aws ec2 describe-instances \
|
||||||
|
--filters "Name=instance-state-name,Values=running" |
|
||||||
|
jq -r \
|
||||||
|
'.Reservations[]
|
||||||
|
| .Instances[]
|
||||||
|
| .InstanceId + " - " +
|
||||||
|
(.PrivateIpAddress // "n/a") + " - " +
|
||||||
|
(.PublicIpAddress // "n/a") + " - " +
|
||||||
|
(.Tags // [] | from_entries | .Name // "n/a")' |
|
||||||
|
fzf \
|
||||||
|
--height 100% \
|
||||||
|
--layout reverse \
|
||||||
|
--header $'Press Enter to start SSM session\nInstance ID - Private IP - Public IP - Name' \
|
||||||
|
--preview "aws ec2 describe-instances --instance-ids \"\$(echo {} | cut -d' ' -f1)\" | jq -r '.Reservations[].Instances[0]'" \
|
||||||
|
--bind "enter:become(aws ssm start-session --target \$(echo {} | cut -d' ' -f1))"
|
23
modules/common/shell/bash/scripts/jqr.sh
Executable file
23
modules/common/shell/bash/scripts/jqr.sh
Executable file
@ -0,0 +1,23 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
# Adapted from: https://gist.github.com/reegnz/b9e40993d410b75c2d866441add2cb55
|
||||||
|
|
||||||
|
if [[ -z $1 ]] || [[ $1 == "-" ]]; then
|
||||||
|
input=$(mktemp)
|
||||||
|
trap 'rm -f $input' EXIT
|
||||||
|
cat /dev/stdin >"$input"
|
||||||
|
else
|
||||||
|
input=$1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo '' |
|
||||||
|
fzf --phony \
|
||||||
|
--height 100% \
|
||||||
|
--preview-window='up:80%' \
|
||||||
|
--query '.' \
|
||||||
|
--print-query \
|
||||||
|
--header $'CTRL-O: jq output\nCTRL-Y: copy output\nALT-Y: copy query' \
|
||||||
|
--preview "jq --color-output -r {q} $input" \
|
||||||
|
--bind "ctrl-o:execute(jq -r {q} $input)+clear-query+accept" \
|
||||||
|
--bind "alt-y:execute(echo {q} | pbcopy)" \
|
||||||
|
--bind "ctrl-y:execute(jq -r {q} $input | pbcopy)"
|
55
modules/common/shell/bash/scripts/terraform-init.sh
Executable file
55
modules/common/shell/bash/scripts/terraform-init.sh
Executable file
@ -0,0 +1,55 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
export AWS_PROFILE="gs"
|
||||||
|
|
||||||
|
BUCKET_NAME_PART_1="t2"
|
||||||
|
BUCKET_NAME_PART_2="global"
|
||||||
|
BUCKET_NAME_PART_3="terraformstate"
|
||||||
|
|
||||||
|
PROJECT_ROOT=$(git rev-parse --show-toplevel)
|
||||||
|
WORKFLOW_FILE="${PROJECT_ROOT}/.github/workflows/terraform.yml"
|
||||||
|
|
||||||
|
if [ ! -f "$WORKFLOW_FILE" ]; then
|
||||||
|
WORKFLOW_FILE="${PROJECT_ROOT}/.github/workflows/apply.yml"
|
||||||
|
fi
|
||||||
|
|
||||||
|
AWS_ACCOUNT_NUMBER=$(
|
||||||
|
awk '/aws_account_number: .*/ {print $2}' "$WORKFLOW_FILE" | # Grab account number
|
||||||
|
echo "$(
|
||||||
|
read -r s
|
||||||
|
s=${s//\'/}
|
||||||
|
echo "$s"
|
||||||
|
)" # Remove single quote if it exists
|
||||||
|
)
|
||||||
|
|
||||||
|
if [ -z "${AWS_ACCOUNT_NUMBER}" ]; then
|
||||||
|
AWS_ACCOUNT_NUMBER=$(
|
||||||
|
awk '/AWS_ACCOUNT_NUMBER: .*/ {print $2}' "$WORKFLOW_FILE" | # Grab account number
|
||||||
|
echo "$(
|
||||||
|
read -r s
|
||||||
|
s=${s//\'/}
|
||||||
|
echo "$s"
|
||||||
|
)" # Remove single quote if it exists
|
||||||
|
)
|
||||||
|
fi
|
||||||
|
|
||||||
|
REPOSITORY=$(
|
||||||
|
git remote get-url origin |
|
||||||
|
awk -F'/' -v OFS='/' '{print $(NF-1),$NF }' |
|
||||||
|
echo "$(
|
||||||
|
read -r s
|
||||||
|
s=${s%.git}
|
||||||
|
echo "$s"
|
||||||
|
)" # Remove .git suffix if it exists
|
||||||
|
)
|
||||||
|
BRANCH=$(git branch --show-current)
|
||||||
|
|
||||||
|
terraform init \
|
||||||
|
-backend-config="region=us-east-1" \
|
||||||
|
-backend-config="bucket=${BUCKET_NAME_PART_1}${BUCKET_NAME_PART_2}${BUCKET_NAME_PART_3}" \
|
||||||
|
-backend-config="workspace_key_prefix=accounts/${AWS_ACCOUNT_NUMBER}/${REPOSITORY}" \
|
||||||
|
-backend-config="key=state.tfstate" \
|
||||||
|
-backend-config="dynamodb_table=global-tf-state-lock" \
|
||||||
|
-upgrade
|
||||||
|
|
||||||
|
terraform workspace select "$BRANCH"
|
@ -76,6 +76,10 @@
|
|||||||
description = "Full git commit on notes";
|
description = "Full git commit on notes";
|
||||||
body = builtins.readFile ./functions/syncnotes.fish;
|
body = builtins.readFile ./functions/syncnotes.fish;
|
||||||
};
|
};
|
||||||
|
_which = {
|
||||||
|
description = "Identify the path to a program in the shell";
|
||||||
|
body = "command --search (string sub --start=2 $argv)";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
interactiveShellInit = ''
|
interactiveShellInit = ''
|
||||||
fish_vi_key_bindings
|
fish_vi_key_bindings
|
||||||
@ -101,10 +105,18 @@
|
|||||||
"-" = "cd -";
|
"-" = "cd -";
|
||||||
mkd = "mkdir -pv";
|
mkd = "mkdir -pv";
|
||||||
|
|
||||||
|
# Convert a program into its full path
|
||||||
|
"=" = {
|
||||||
|
position = "anywhere";
|
||||||
|
regex = "=\\w+";
|
||||||
|
function = "_which";
|
||||||
|
};
|
||||||
|
|
||||||
# System
|
# System
|
||||||
s = "sudo";
|
s = "sudo";
|
||||||
sc = "systemctl";
|
sc = "systemctl";
|
||||||
scs = "systemctl status";
|
scs = "systemctl status";
|
||||||
|
sca = "systemctl cat";
|
||||||
m = "make";
|
m = "make";
|
||||||
t = "trash";
|
t = "trash";
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
set vimfile (fzf)
|
set vimfile (fzf)
|
||||||
and set vimfile (echo $vimfile | tr -d '\r')
|
and set vimfile (echo $vimfile | tr -d '\r')
|
||||||
and commandline -r "vim $vimfile"
|
and commandline -r "vim \"$vimfile\""
|
||||||
and commandline -f execute
|
and commandline -f execute
|
||||||
|
@ -41,5 +41,16 @@
|
|||||||
FZF_CTRL_T_COMMAND = fzfCommand;
|
FZF_CTRL_T_COMMAND = fzfCommand;
|
||||||
FZF_DEFAULT_OPTS = "-m --height 50% --border";
|
FZF_DEFAULT_OPTS = "-m --height 50% --border";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
home.packages = [
|
||||||
|
(pkgs.writeShellApplication {
|
||||||
|
name = "jqr";
|
||||||
|
runtimeInputs = [
|
||||||
|
pkgs.jq
|
||||||
|
pkgs.fzf
|
||||||
|
];
|
||||||
|
text = builtins.readFile ./bash/scripts/jqr.sh;
|
||||||
|
})
|
||||||
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -113,6 +113,11 @@ in
|
|||||||
gpd = "git push origin -d";
|
gpd = "git push origin -d";
|
||||||
gbd = "git branch -d";
|
gbd = "git branch -d";
|
||||||
gbD = "git branch -D";
|
gbD = "git branch -D";
|
||||||
|
gdd = {
|
||||||
|
position = "anywhere";
|
||||||
|
setCursor = true;
|
||||||
|
expansion = "BRANCH=% git push origin -d $BRANCH and git branch -d $BRANCH";
|
||||||
|
};
|
||||||
gr = "git reset";
|
gr = "git reset";
|
||||||
grh = "git reset --hard";
|
grh = "git reset --hard";
|
||||||
gm = "git merge";
|
gm = "git merge";
|
||||||
@ -158,6 +163,13 @@ in
|
|||||||
and git branch -D $branch
|
and git branch -D $branch
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
git-delete-both = {
|
||||||
|
argumentNames = "branch";
|
||||||
|
body = ''
|
||||||
|
git push origin -d $branch
|
||||||
|
git branch -d $branch
|
||||||
|
'';
|
||||||
|
};
|
||||||
git-merge-fuzzy = {
|
git-merge-fuzzy = {
|
||||||
body = ''
|
body = ''
|
||||||
set branch (git-fuzzy-branch "merge from...")
|
set branch (git-fuzzy-branch "merge from...")
|
||||||
|
@ -6,13 +6,19 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
|
||||||
|
unfreePackages = [ "gh-copilot" ];
|
||||||
|
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
programs.gh = lib.mkIf config.home-manager.users.${config.user}.programs.git.enable {
|
programs.gh = lib.mkIf config.home-manager.users.${config.user}.programs.git.enable {
|
||||||
enable = true;
|
enable = true;
|
||||||
gitCredentialHelper.enable = true;
|
gitCredentialHelper.enable = true;
|
||||||
settings.git_protocol = "https";
|
settings.git_protocol = "https";
|
||||||
extensions = [ pkgs.gh-collaborators ];
|
extensions = [
|
||||||
|
pkgs.gh-collaborators
|
||||||
|
pkgs.gh-dash
|
||||||
|
pkgs.gh-copilot
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.fish = lib.mkIf config.home-manager.users.${config.user}.programs.gh.enable {
|
programs.fish = lib.mkIf config.home-manager.users.${config.user}.programs.gh.enable {
|
||||||
@ -51,7 +57,7 @@
|
|||||||
esac
|
esac
|
||||||
|
|
||||||
selected=$(gh repo list "$organization" \
|
selected=$(gh repo list "$organization" \
|
||||||
--limit 100 \
|
--limit 1000 \
|
||||||
--no-archived \
|
--no-archived \
|
||||||
--json=name,description,isPrivate,updatedAt,primaryLanguage \
|
--json=name,description,isPrivate,updatedAt,primaryLanguage \
|
||||||
| jq -r '.[] | .name + "," + if .description == "" then "-" else .description |= gsub(","; " ") | .description end + "," + .updatedAt + "," + .primaryLanguage.name' \
|
| jq -r '.[] | .name + "," + if .description == "" then "-" else .description |= gsub(","; " ") | .description end + "," + .updatedAt + "," + .primaryLanguage.name' \
|
||||||
|
@ -13,12 +13,18 @@
|
|||||||
ns = "nix-shell -p";
|
ns = "nix-shell -p";
|
||||||
nsf = "nix-shell --run fish -p";
|
nsf = "nix-shell --run fish -p";
|
||||||
nsr = "nix-shell-run";
|
nsr = "nix-shell-run";
|
||||||
nps = "nix repl '<nixpkgs>'";
|
nps = "nix repl --expr 'import <nixpkgs>{}'";
|
||||||
nixo = "man configuration.nix";
|
nixo = "man configuration.nix";
|
||||||
nixh = "man home-configuration.nix";
|
nixh = "man home-configuration.nix";
|
||||||
nr = "rebuild-nixos";
|
nr = {
|
||||||
nro = "rebuild-nixos offline";
|
function = "rebuild-nixos";
|
||||||
hm = "rebuild-home";
|
};
|
||||||
|
nro = {
|
||||||
|
function = "rebuild-nixos-offline";
|
||||||
|
};
|
||||||
|
hm = {
|
||||||
|
function = "rebuild-home";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
functions = {
|
functions = {
|
||||||
nix-shell-run = {
|
nix-shell-run = {
|
||||||
@ -42,19 +48,20 @@
|
|||||||
};
|
};
|
||||||
rebuild-nixos = {
|
rebuild-nixos = {
|
||||||
body = ''
|
body = ''
|
||||||
if test "$argv[1]" = "offline"
|
|
||||||
set option "--option substitute false"
|
|
||||||
end
|
|
||||||
git -C ${config.dotfilesPath} add --intent-to-add --all
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
commandline -r "doas nixos-rebuild switch $option --flake ${config.dotfilesPath}#${config.networking.hostName}"
|
echo "doas nixos-rebuild switch --flake ${config.dotfilesPath}#${config.networking.hostName}"
|
||||||
commandline --function execute
|
'';
|
||||||
|
};
|
||||||
|
rebuild-nixos-offline = {
|
||||||
|
body = ''
|
||||||
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
|
echo "doas nixos-rebuild switch --option substitute false --flake ${config.dotfilesPath}#${config.networking.hostName}"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
rebuild-home = {
|
rebuild-home = {
|
||||||
body = ''
|
body = ''
|
||||||
git -C ${config.dotfilesPath} add --intent-to-add --all
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
commandline -r "${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#${config.networking.hostName}";
|
echo "${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#${config.networking.hostName}";
|
||||||
commandline --function execute
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@ -91,12 +98,6 @@
|
|||||||
# Set channel to flake packages, used for nix-shell commands
|
# Set channel to flake packages, used for nix-shell commands
|
||||||
nixPath = [ "nixpkgs=${pkgs.path}" ];
|
nixPath = [ "nixpkgs=${pkgs.path}" ];
|
||||||
|
|
||||||
# Set registry to this flake's packages, used for nix X commands
|
|
||||||
registry.nixpkgs.to = {
|
|
||||||
type = "path";
|
|
||||||
path = builtins.toString pkgs.path;
|
|
||||||
};
|
|
||||||
|
|
||||||
# For security, only allow specific users
|
# For security, only allow specific users
|
||||||
settings.allowed-users = [
|
settings.allowed-users = [
|
||||||
"@wheel"
|
"@wheel"
|
||||||
|
@ -31,12 +31,14 @@ in
|
|||||||
jo # JSON output
|
jo # JSON output
|
||||||
jq # JSON manipulation
|
jq # JSON manipulation
|
||||||
lf # File viewer
|
lf # File viewer
|
||||||
|
osc # Clipboard over SSH
|
||||||
qrencode # Generate qr codes
|
qrencode # Generate qr codes
|
||||||
rsync # Copy folders
|
rsync # Copy folders
|
||||||
ren # Rename files
|
# ren # Rename files
|
||||||
# rep # Replace text in files
|
# rep # Replace text in files
|
||||||
ripgrep # grep
|
ripgrep # grep
|
||||||
sd # sed
|
sd # sed
|
||||||
|
spacer # Output lines in terminal
|
||||||
tealdeer # Cheatsheets
|
tealdeer # Cheatsheets
|
||||||
tree # View directory hierarchy
|
tree # View directory hierarchy
|
||||||
vimv-rs # Batch rename files
|
vimv-rs # Batch rename files
|
||||||
|
@ -12,41 +12,56 @@
|
|||||||
home.packages =
|
home.packages =
|
||||||
let
|
let
|
||||||
ldap_scheme = "ldaps";
|
ldap_scheme = "ldaps";
|
||||||
magic_number = "2";
|
|
||||||
magic_end_seq = "corp";
|
|
||||||
magic_prefix = "take";
|
magic_prefix = "take";
|
||||||
ldap_host = "${magic_prefix}${magic_number}.t${magic_number}.${magic_end_seq}";
|
ldap_port = 3269;
|
||||||
ldap_port = 636;
|
jq_parse = pkgs.writeShellScriptBin "ljq" ''
|
||||||
ldap_dc_1 = "${magic_prefix}${magic_number}";
|
jq --slurp \
|
||||||
ldap_dc_2 = "t${magic_number}";
|
--raw-input 'split("\n\n")|map(split("\n")|map(select(.[0:1]!="#" and length>0)) |select(length > 0)|map(capture("^(?<key>[^:]*:?): *(?<value>.*)") |if .key[-1:.key|length] == ":" then .key=.key[0:-1]|.value=(.value|@base64d) else . end)| group_by(.key) | map({key:.[0].key,value:(if .|length > 1 then [.[].value] else .[].value end)}) | from_entries)' | jq -r 'del(.[].thumbnailPhoto)'
|
||||||
ldap_dc_3 = magic_end_seq;
|
'';
|
||||||
ldap_script = pkgs.writeShellScriptBin "ldap" ''
|
ldap_script = pkgs.writeShellScriptBin "ldap" ''
|
||||||
# if ! [ "$LDAP_HOST" ]; then
|
if ! [ "$LDAP_HOST" ]; then
|
||||||
# echo "No LDAP_HOST specified!"
|
echo "No LDAP_HOST specified!"
|
||||||
# exit 1
|
exit 1
|
||||||
# fi
|
fi
|
||||||
SEARCH_FILTER="$@"
|
SEARCH_FILTER="$@"
|
||||||
ldapsearch -LLL \
|
ldapsearch -LLL \
|
||||||
-B -o ldif-wrap=no \
|
-B -o ldif-wrap=no \
|
||||||
-H "${ldap_scheme}://${ldap_host}:${builtins.toString ldap_port}" \
|
-E pr=5000/prompt \
|
||||||
-D "${pkgs.lib.toUpper magic_prefix}${magic_number}\\${pkgs.lib.toLower config.user}" \
|
-H "${ldap_scheme}://''${LDAP_HOST}:${builtins.toString ldap_port}" \
|
||||||
-w "$(${pkgs._1password}/bin/op item get T${magic_number} --fields label=password)" \
|
-D "${pkgs.lib.toUpper magic_prefix}2\\${pkgs.lib.toLower config.user}" \
|
||||||
-b "DC=${ldap_dc_1},DC=${ldap_dc_2},DC=${ldap_dc_3}" \
|
-w "$(${pkgs._1password-cli}/bin/op item get T2 --fields label=password --reveal)" \
|
||||||
-s "sub" -x "(cn=$SEARCH_FILTER)" \
|
-b "dc=''${LDAP_HOST//./,dc=}" \
|
||||||
| jq --slurp \
|
-s "sub" -x "(cn=''${SEARCH_FILTER})" \
|
||||||
--raw-input 'split("\n\n")|map(split("\n")|map(select(.[0:1]!="#" and length>0)) |select(length > 0)|map(capture("^(?<key>[^:]*:?): *(?<value>.*)") |if .key[-1:.key|length] == ":" then .key=.key[0:-1]|.value=(.value|@base64d) else . end)| group_by(.key) | map({key:.[0].key,value:(if .|length > 1 then [.[].value] else .[].value end)}) | from_entries)' | jq -r 'del(.[].thumbnailPhoto)'
|
| ${jq_parse}/bin/ljq
|
||||||
'';
|
'';
|
||||||
ldapm_script = pkgs.writeShellScriptBin "ldapm" ''
|
ldapm_script = pkgs.writeShellScriptBin "ldapm" ''
|
||||||
|
if ! [ "$LDAP_HOST" ]; then
|
||||||
|
echo "No LDAP_HOST specified!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
${ldap_script}/bin/ldap "$@" | jq '[ .[].memberOf] | add'
|
${ldap_script}/bin/ldap "$@" | jq '[ .[].memberOf] | add'
|
||||||
'';
|
'';
|
||||||
ldapg_script = pkgs.writeShellScriptBin "ldapg" ''
|
ldapg_script = pkgs.writeShellScriptBin "ldapg" ''
|
||||||
|
if ! [ "$LDAP_HOST" ]; then
|
||||||
|
echo "No LDAP_HOST specified!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
${ldap_script}/bin/ldap "$@" | jq '[ .[].member] | add'
|
${ldap_script}/bin/ldap "$@" | jq '[ .[].member] | add'
|
||||||
'';
|
'';
|
||||||
|
ldapl_script = pkgs.writeShellScriptBin "ldapl" ''
|
||||||
|
if ! [ "$LDAP_HOST" ]; then
|
||||||
|
echo "No LDAP_HOST specified!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
${ldap_script}/bin/ldap "*$@*" | jq -r '.[].name'
|
||||||
|
'';
|
||||||
in
|
in
|
||||||
[
|
[
|
||||||
ldap_script
|
ldap_script
|
||||||
ldapm_script
|
ldapm_script
|
||||||
ldapg_script
|
ldapg_script
|
||||||
|
ldapl_script
|
||||||
|
jq_parse
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -8,14 +8,14 @@
|
|||||||
|
|
||||||
home-manager.users.${config.user} = lib.mkIf pkgs.stdenv.isDarwin {
|
home-manager.users.${config.user} = lib.mkIf pkgs.stdenv.isDarwin {
|
||||||
|
|
||||||
home.packages = with pkgs; [ (nerdfonts.override { fonts = [ "VictorMono" ]; }) ];
|
home.packages = with pkgs; [ nerd-fonts.victor-mono ];
|
||||||
|
|
||||||
programs.alacritty.settings = {
|
programs.alacritty.settings = {
|
||||||
font.normal.family = "VictorMono";
|
font.normal.family = "VictorMono";
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.kitty.font = {
|
programs.kitty.font = {
|
||||||
package = (pkgs.nerdfonts.override { fonts = [ "VictorMono" ]; });
|
package = pkgs.nerd-fonts.victor-mono;
|
||||||
name = "VictorMono Nerd Font Mono";
|
name = "VictorMono Nerd Font Mono";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
src = ./hammerspoon/Spoons/Launcher.spoon/init.lua;
|
src = ./hammerspoon/Spoons/Launcher.spoon/init.lua;
|
||||||
firefox = "${pkgs.firefox-bin}/Applications/Firefox.app";
|
firefox = "${pkgs.firefox-bin}/Applications/Firefox.app";
|
||||||
discord = "${pkgs.discord}/Applications/Discord.app";
|
discord = "${pkgs.discord}/Applications/Discord.app";
|
||||||
kitty = "${pkgs.kitty}/Applications/kitty.app";
|
wezterm = "${pkgs.wezterm}/Applications/WezTerm.app";
|
||||||
obsidian = "${pkgs.obsidian}/Applications/Obsidian.app";
|
obsidian = "${pkgs.obsidian}/Applications/Obsidian.app";
|
||||||
slack = "${pkgs.slack}/Applications/Slack.app";
|
slack = "${pkgs.slack}/Applications/Slack.app";
|
||||||
};
|
};
|
||||||
@ -36,7 +36,7 @@
|
|||||||
homebrew.casks = [ "hammerspoon" ];
|
homebrew.casks = [ "hammerspoon" ];
|
||||||
|
|
||||||
system.activationScripts.postUserActivation.text = ''
|
system.activationScripts.postUserActivation.text = ''
|
||||||
defaults write org.hammerspoon.Hammerspoon MJConfigFile "~/.config/hammerspoon/init.lua"
|
defaults write org.hammerspoon.Hammerspoon MJConfigFile "${config.homePath}/.config/hammerspoon/init.lua"
|
||||||
sudo killall Dock
|
sudo killall Dock
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
@ -56,7 +56,7 @@ function obj:init()
|
|||||||
-- Launcher shortcuts
|
-- Launcher shortcuts
|
||||||
self.launcher:bind("ctrl", "space", function() end)
|
self.launcher:bind("ctrl", "space", function() end)
|
||||||
self.launcher:bind("", "return", function()
|
self.launcher:bind("", "return", function()
|
||||||
self:switch("@kitty@")
|
self:switch("@wezterm@")
|
||||||
end)
|
end)
|
||||||
self.launcher:bind("", "C", function()
|
self.launcher:bind("", "C", function()
|
||||||
self:switch("Calendar.app")
|
self:switch("Calendar.app")
|
||||||
|
@ -41,7 +41,7 @@ local function worklayout()
|
|||||||
local u = hs.geometry.unitrect
|
local u = hs.geometry.unitrect
|
||||||
-- set the layout
|
-- set the layout
|
||||||
local left = {
|
local left = {
|
||||||
{ "kitty", nil, WORK_ONLY_MONITOR, u(0, 0, 1 / 2, 1), nil, nil, visible = true },
|
{ "WezTerm", nil, WORK_ONLY_MONITOR, u(0, 0, 1 / 2, 1), nil, nil, visible = true },
|
||||||
}
|
}
|
||||||
local right = {
|
local right = {
|
||||||
{ "Slack", nil, WORK_ONLY_MONITOR, u(1 / 2, 0, 1 / 2, 1), nil, nil, visible = true },
|
{ "Slack", nil, WORK_ONLY_MONITOR, u(1 / 2, 0, 1 / 2, 1), nil, nil, visible = true },
|
||||||
|
@ -20,7 +20,10 @@
|
|||||||
'';
|
'';
|
||||||
|
|
||||||
# Add homebrew paths to CLI path
|
# Add homebrew paths to CLI path
|
||||||
home-manager.users.${config.user}.home.sessionPath = [ "/opt/homebrew/bin/" ];
|
home-manager.users.${config.user}.home.sessionPath = [
|
||||||
|
"/opt/homebrew/bin/"
|
||||||
|
"/opt/homebrew/opt/trash/bin/"
|
||||||
|
];
|
||||||
|
|
||||||
homebrew = {
|
homebrew = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@ -44,8 +47,9 @@
|
|||||||
"logitune" # Logitech webcam firmware
|
"logitune" # Logitech webcam firmware
|
||||||
"meetingbar" # Show meetings in menu bar
|
"meetingbar" # Show meetings in menu bar
|
||||||
"scroll-reverser" # Different scroll style for mouse vs. trackpad
|
"scroll-reverser" # Different scroll style for mouse vs. trackpad
|
||||||
# "steam" # Not packaged for Nix
|
"notunes" # Don't launch Apple Music with the play button
|
||||||
# "epic-games" # Not packaged for Nix
|
"steam" # Not packaged for Nixon macOS
|
||||||
|
"epic-games" # Not packaged for Nix
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -6,11 +6,12 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
|
||||||
config = lib.mkIf pkgs.stdenv.isDarwin {
|
# config = lib.mkIf pkgs.stdenv.isDarwin {
|
||||||
networking = {
|
# networking = {
|
||||||
computerName = config.networking.hostName;
|
# computerName = config.networking.hostName;
|
||||||
# Adjust if necessary
|
# # Adjust if necessary
|
||||||
# hostName = "";
|
# # hostName = "";
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
|
# }
|
||||||
}
|
}
|
||||||
|
@ -10,25 +10,30 @@
|
|||||||
|
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
shellAbbrs = {
|
shellAbbrs = {
|
||||||
nr = lib.mkForce "rebuild-darwin";
|
nr = {
|
||||||
nro = lib.mkForce "rebuild-darwin offline";
|
function = lib.mkForce "rebuild-darwin";
|
||||||
|
};
|
||||||
|
nro = {
|
||||||
|
function = lib.mkForce "rebuild-darwin-offline";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
functions = {
|
functions = {
|
||||||
rebuild-darwin = {
|
rebuild-darwin = {
|
||||||
body = ''
|
body = ''
|
||||||
if test "$argv[1]" = "offline"
|
|
||||||
set option "--option substitute false"
|
|
||||||
end
|
|
||||||
git -C ${config.dotfilesPath} add --intent-to-add --all
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
commandline -r "darwin-rebuild switch $option --flake ${config.dotfilesPath}#lookingglass"
|
echo "darwin-rebuild switch --flake ${config.dotfilesPath}#lookingglass"
|
||||||
commandline --function execute
|
'';
|
||||||
|
};
|
||||||
|
rebuild-darwin-offline = {
|
||||||
|
body = ''
|
||||||
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
|
echo "darwin-rebuild switch --option substitute false --flake ${config.dotfilesPath}#lookingglass"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
rebuild-home = lib.mkForce {
|
rebuild-home = lib.mkForce {
|
||||||
body = ''
|
body = ''
|
||||||
git -C ${config.dotfilesPath} add --intent-to-add --all
|
git -C ${config.dotfilesPath} add --intent-to-add --all
|
||||||
commandline -r "${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#lookingglass";
|
echo "${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#lookingglass";
|
||||||
commandline --function execute
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -6,6 +6,19 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
terminal = lib.mkOption {
|
||||||
|
type = lib.types.nullOr lib.types.str;
|
||||||
|
description = "Path to executable for terminal emulator program.";
|
||||||
|
default = null;
|
||||||
|
};
|
||||||
|
terminalLaunchCommand = lib.mkOption {
|
||||||
|
type = lib.types.nullOr lib.types.str;
|
||||||
|
description = "Command for using the terminal to launch a new window with a program.";
|
||||||
|
default = null;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
config = lib.mkIf pkgs.stdenv.isDarwin {
|
config = lib.mkIf pkgs.stdenv.isDarwin {
|
||||||
|
|
||||||
services.nix-daemon.enable = true;
|
services.nix-daemon.enable = true;
|
||||||
@ -23,6 +36,8 @@
|
|||||||
|
|
||||||
system = {
|
system = {
|
||||||
|
|
||||||
|
stateVersion = 5;
|
||||||
|
|
||||||
keyboard = {
|
keyboard = {
|
||||||
remapCapsLockToControl = true;
|
remapCapsLockToControl = true;
|
||||||
enableKeyMapping = true; # Allows for skhd
|
enableKeyMapping = true; # Allows for skhd
|
||||||
@ -105,8 +120,7 @@
|
|||||||
"/Applications/zoom.us.app"
|
"/Applications/zoom.us.app"
|
||||||
"${pkgs.discord}/Applications/Discord.app"
|
"${pkgs.discord}/Applications/Discord.app"
|
||||||
"${pkgs.obsidian}/Applications/Obsidian.app"
|
"${pkgs.obsidian}/Applications/Obsidian.app"
|
||||||
"${pkgs.kitty}/Applications/kitty.app"
|
"${pkgs.wezterm}/Applications/WezTerm.app"
|
||||||
"/System/Applications/System Settings.app"
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -134,6 +148,9 @@
|
|||||||
# Where to save screenshots
|
# Where to save screenshots
|
||||||
screencapture.location = "~/Downloads";
|
screencapture.location = "~/Downloads";
|
||||||
|
|
||||||
|
# Show seconds on the clock
|
||||||
|
menuExtraClock.ShowSeconds = true;
|
||||||
|
|
||||||
CustomUserPreferences = {
|
CustomUserPreferences = {
|
||||||
# Disable disk image verification
|
# Disable disk image verification
|
||||||
"com.apple.frameworks.diskimages" = {
|
"com.apple.frameworks.diskimages" = {
|
||||||
@ -171,6 +188,7 @@
|
|||||||
eventTitleIconFormat = ''"iconCalendar"'';
|
eventTitleIconFormat = ''"iconCalendar"'';
|
||||||
slackBrowser = ''{"deletable":true,"arguments":"","name":"Slack","path":""}'';
|
slackBrowser = ''{"deletable":true,"arguments":"","name":"Slack","path":""}'';
|
||||||
zoomBrowser = ''{"deletable":true,"arguments":"","name":"Zoom","path":""}'';
|
zoomBrowser = ''{"deletable":true,"arguments":"","name":"Zoom","path":""}'';
|
||||||
|
teamsBrowser = ''{"deletable":true,"arguments":"","name":"Teams","path":""}'';
|
||||||
KeyboardShortcuts_joinEventShortcut = ''{"carbonModifiers":6400,"carbonKeyCode":38}'';
|
KeyboardShortcuts_joinEventShortcut = ''{"carbonModifiers":6400,"carbonKeyCode":38}'';
|
||||||
timeFormat = ''"12-hour"'';
|
timeFormat = ''"12-hour"'';
|
||||||
};
|
};
|
||||||
|
@ -11,9 +11,13 @@
|
|||||||
users.users."${config.user}" = {
|
users.users."${config.user}" = {
|
||||||
# macOS user
|
# macOS user
|
||||||
home = config.homePath;
|
home = config.homePath;
|
||||||
shell = pkgs.fish; # Default shell
|
uid = 502;
|
||||||
|
# shell = pkgs.fish; # Default shell
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# This might fix the shell issues
|
||||||
|
users.knownUsers = [ config.user ];
|
||||||
|
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
# Default shell setting doesn't work
|
# Default shell setting doesn't work
|
||||||
|
@ -10,32 +10,54 @@
|
|||||||
unfreePackages = [
|
unfreePackages = [
|
||||||
"consul"
|
"consul"
|
||||||
"vault-bin"
|
"vault-bin"
|
||||||
|
# "teams"
|
||||||
];
|
];
|
||||||
|
|
||||||
home-manager.users.${config.user} = lib.mkIf pkgs.stdenv.isDarwin {
|
home-manager.users.${config.user} = lib.mkIf pkgs.stdenv.isDarwin {
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = [
|
||||||
visidata # CSV inspector
|
pkgs.visidata # CSV inspector
|
||||||
dos2unix # Convert Windows text files
|
pkgs.dos2unix # Convert Windows text files
|
||||||
inetutils # Includes telnet
|
pkgs.inetutils # Includes telnet
|
||||||
youtube-dl # Convert web videos
|
pkgs.pandoc # Convert text documents
|
||||||
pandoc # Convert text documents
|
pkgs.mpd # TUI slideshows
|
||||||
mpd # TUI slideshows
|
pkgs.mpv # Video player
|
||||||
mpv # Video player
|
pkgs.gnupg # Encryption
|
||||||
gnupg # Encryption
|
pkgs.awscli2
|
||||||
awscli2
|
pkgs.ssm-session-manager-plugin
|
||||||
ssm-session-manager-plugin
|
pkgs.awslogs
|
||||||
awslogs
|
pkgs.stu # TUI for AWS S3
|
||||||
google-cloud-sdk
|
pkgs.google-cloud-sdk
|
||||||
vault-bin
|
pkgs.vault-bin
|
||||||
consul
|
pkgs.consul
|
||||||
noti # Create notifications programmatically
|
pkgs.noti # Create notifications programmatically
|
||||||
ipcalc # Make IP network calculations
|
pkgs.ipcalc # Make IP network calculations
|
||||||
(writeShellApplication {
|
# pkgs.teams
|
||||||
|
pkgs.cloudflared # Allow connecting to Cloudflare tunnels
|
||||||
|
pkgs.monitorcontrol # Allows adjusting external displays
|
||||||
|
(pkgs.writeShellApplication {
|
||||||
name = "ocr";
|
name = "ocr";
|
||||||
runtimeInputs = [ tesseract ];
|
runtimeInputs = [ pkgs.tesseract ];
|
||||||
text = builtins.readFile ../../modules/common/shell/bash/scripts/ocr.sh;
|
text = builtins.readFile ../../modules/common/shell/bash/scripts/ocr.sh;
|
||||||
})
|
})
|
||||||
|
(pkgs.writeShellApplication {
|
||||||
|
name = "ec2";
|
||||||
|
runtimeInputs = [
|
||||||
|
pkgs.awscli2
|
||||||
|
pkgs.jq
|
||||||
|
pkgs.fzf
|
||||||
|
];
|
||||||
|
text = builtins.readFile ../../modules/common/shell/bash/scripts/aws-ec2.sh;
|
||||||
|
})
|
||||||
|
(pkgs.writeShellApplication {
|
||||||
|
name = "tfinit";
|
||||||
|
runtimeInputs = [
|
||||||
|
pkgs.terraform
|
||||||
|
pkgs.gawk
|
||||||
|
pkgs.git
|
||||||
|
];
|
||||||
|
text = builtins.readFile ../../modules/common/shell/bash/scripts/terraform-init.sh;
|
||||||
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.fish.shellAbbrs = {
|
programs.fish.shellAbbrs = {
|
||||||
|
37
modules/nixos/applications/calendar.nix
Normal file
37
modules/nixos/applications/calendar.nix
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
calendar = {
|
||||||
|
enable = lib.mkEnableOption {
|
||||||
|
description = "Enable calendar.";
|
||||||
|
default = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf (config.gui.enable && config.calendar.enable) {
|
||||||
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
|
accounts.calendar.accounts.default = {
|
||||||
|
basePath = "other/calendars"; # Where to save calendars in ~ directory
|
||||||
|
name = "personal";
|
||||||
|
local.type = "filesystem";
|
||||||
|
primary = true;
|
||||||
|
remote = {
|
||||||
|
passwordCommand = [ "" ];
|
||||||
|
type = "caldav";
|
||||||
|
url = "https://${config.hostnames.content}/remote.php/dav/principals/users/${config.user}";
|
||||||
|
userName = config.user;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
home.packages = with pkgs; [ gnome-calendar ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -2,6 +2,7 @@
|
|||||||
{
|
{
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
./calendar.nix
|
||||||
./calibre.nix
|
./calibre.nix
|
||||||
./nautilus.nix
|
./nautilus.nix
|
||||||
];
|
];
|
||||||
|
@ -20,7 +20,7 @@
|
|||||||
|
|
||||||
# Quick preview with spacebar
|
# Quick preview with spacebar
|
||||||
services.gnome.sushi.enable = true;
|
services.gnome.sushi.enable = true;
|
||||||
environment.systemPackages = [ pkgs.gnome.nautilus ];
|
environment.systemPackages = [ pkgs.nautilus ];
|
||||||
|
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
@ -28,13 +28,13 @@
|
|||||||
xsession.windowManager.i3.config.keybindings = {
|
xsession.windowManager.i3.config.keybindings = {
|
||||||
"${
|
"${
|
||||||
config.home-manager.users.${config.user}.xsession.windowManager.i3.config.modifier
|
config.home-manager.users.${config.user}.xsession.windowManager.i3.config.modifier
|
||||||
}+n" = "exec --no-startup-id ${pkgs.gnome.nautilus}/bin/nautilus";
|
}+n" = "exec --no-startup-id ${pkgs.nautilus}/bin/nautilus";
|
||||||
};
|
};
|
||||||
|
|
||||||
# Generates a QR code and previews it with sushi
|
# Generates a QR code and previews it with sushi
|
||||||
programs.fish.functions = {
|
programs.fish.functions = {
|
||||||
qr = {
|
qr = {
|
||||||
body = "${pkgs.qrencode}/bin/qrencode $argv[1] -o /tmp/qr.png | ${pkgs.gnome.sushi}/bin/sushi /tmp/qr.png";
|
body = "${pkgs.qrencode}/bin/qrencode $argv[1] -o /tmp/qr.png | ${pkgs.sushi}/bin/sushi /tmp/qr.png";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -12,6 +12,7 @@
|
|||||||
./legendary.nix
|
./legendary.nix
|
||||||
./lutris.nix
|
./lutris.nix
|
||||||
./minecraft-server.nix
|
./minecraft-server.nix
|
||||||
|
./moonlight.nix
|
||||||
./ryujinx.nix
|
./ryujinx.nix
|
||||||
./steam.nix
|
./steam.nix
|
||||||
];
|
];
|
||||||
@ -19,10 +20,9 @@
|
|||||||
options.gaming.enable = lib.mkEnableOption "Enable gaming features.";
|
options.gaming.enable = lib.mkEnableOption "Enable gaming features.";
|
||||||
|
|
||||||
config = lib.mkIf (config.gaming.enable && pkgs.stdenv.isLinux) {
|
config = lib.mkIf (config.gaming.enable && pkgs.stdenv.isLinux) {
|
||||||
hardware.opengl = {
|
hardware.graphics = {
|
||||||
enable = true;
|
enable = true;
|
||||||
driSupport = true;
|
enable32Bit = true;
|
||||||
driSupport32Bit = true;
|
|
||||||
};
|
};
|
||||||
programs.gamemode.enable = true;
|
programs.gamemode.enable = true;
|
||||||
};
|
};
|
||||||
|
@ -9,7 +9,10 @@
|
|||||||
options.gaming.dwarf-fortress.enable = lib.mkEnableOption "Dwarf Fortress free edition.";
|
options.gaming.dwarf-fortress.enable = lib.mkEnableOption "Dwarf Fortress free edition.";
|
||||||
|
|
||||||
config = lib.mkIf config.gaming.dwarf-fortress.enable {
|
config = lib.mkIf config.gaming.dwarf-fortress.enable {
|
||||||
unfreePackages = [ "dwarf-fortress" ];
|
unfreePackages = [
|
||||||
|
"dwarf-fortress"
|
||||||
|
"phoebus-theme"
|
||||||
|
];
|
||||||
environment.systemPackages =
|
environment.systemPackages =
|
||||||
let
|
let
|
||||||
dfDesktopItem = pkgs.makeDesktopItem {
|
dfDesktopItem = pkgs.makeDesktopItem {
|
||||||
|
14
modules/nixos/gaming/moonlight.nix
Normal file
14
modules/nixos/gaming/moonlight.nix
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
|
||||||
|
options.gaming.moonlight.enable = lib.mkEnableOption "Enable Moonlight game streaming client.";
|
||||||
|
|
||||||
|
config = lib.mkIf config.gaming.moonlight.enable {
|
||||||
|
environment.systemPackages = with pkgs; [ moonlight-qt ];
|
||||||
|
};
|
||||||
|
}
|
@ -15,6 +15,7 @@
|
|||||||
"steam-original"
|
"steam-original"
|
||||||
"steamcmd"
|
"steamcmd"
|
||||||
"steam-run"
|
"steam-run"
|
||||||
|
"steam-unwrapped"
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.steam = {
|
programs.steam = {
|
||||||
@ -27,7 +28,7 @@
|
|||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
||||||
# Enable terminal interaction
|
# Enable terminal interaction
|
||||||
steamPackages.steamcmd
|
steamcmd
|
||||||
steam-tui
|
steam-tui
|
||||||
|
|
||||||
# Overlay with performance monitoring
|
# Overlay with performance monitoring
|
||||||
|
@ -46,6 +46,16 @@
|
|||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "Command to use for power options menu";
|
description = "Command to use for power options menu";
|
||||||
};
|
};
|
||||||
|
terminal = lib.mkOption {
|
||||||
|
type = lib.types.nullOr lib.types.str;
|
||||||
|
description = "Path to executable for terminal emulator program.";
|
||||||
|
default = null;
|
||||||
|
};
|
||||||
|
terminalLaunchCommand = lib.mkOption {
|
||||||
|
type = lib.types.nullOr lib.types.str;
|
||||||
|
description = "Command for using the terminal to launch a new window with a program.";
|
||||||
|
default = null;
|
||||||
|
};
|
||||||
wallpaper = lib.mkOption {
|
wallpaper = lib.mkOption {
|
||||||
type = lib.types.path;
|
type = lib.types.path;
|
||||||
description = "Wallpaper background image file";
|
description = "Wallpaper background image file";
|
||||||
|
@ -14,7 +14,7 @@ in
|
|||||||
|
|
||||||
fonts.packages = with pkgs; [
|
fonts.packages = with pkgs; [
|
||||||
victor-mono # Used for Vim and Terminal
|
victor-mono # Used for Vim and Terminal
|
||||||
(nerdfonts.override { fonts = [ "Hack" ]; }) # For Polybar, Rofi
|
nerd-fonts.hack # For Polybar, Rofi
|
||||||
];
|
];
|
||||||
fonts.fontconfig.defaultFonts.monospace = [ fontName ];
|
fonts.fontconfig.defaultFonts.monospace = [ fontName ];
|
||||||
|
|
||||||
|
@ -9,6 +9,7 @@ let
|
|||||||
|
|
||||||
lockCmd = "${pkgs.betterlockscreen}/bin/betterlockscreen --lock --display 1 --blur 0.5 --span";
|
lockCmd = "${pkgs.betterlockscreen}/bin/betterlockscreen --lock --display 1 --blur 0.5 --span";
|
||||||
lockUpdate = "${pkgs.betterlockscreen}/bin/betterlockscreen --update ${config.wallpaper} --display 1 --span";
|
lockUpdate = "${pkgs.betterlockscreen}/bin/betterlockscreen --update ${config.wallpaper} --display 1 --span";
|
||||||
|
terminal = "wezterm";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|
||||||
@ -47,9 +48,10 @@ in
|
|||||||
assigns = {
|
assigns = {
|
||||||
"${ws1}" = [ { class = "Firefox"; } ];
|
"${ws1}" = [ { class = "Firefox"; } ];
|
||||||
"${ws2}" = [
|
"${ws2}" = [
|
||||||
{ class = "kitty"; }
|
|
||||||
{ class = "aerc"; }
|
{ class = "aerc"; }
|
||||||
|
{ class = "kitty"; }
|
||||||
{ class = "obsidian"; }
|
{ class = "obsidian"; }
|
||||||
|
{ class = "wezterm"; }
|
||||||
];
|
];
|
||||||
"${ws3}" = [ { class = "discord"; } ];
|
"${ws3}" = [ { class = "discord"; } ];
|
||||||
"${ws4}" = [
|
"${ws4}" = [
|
||||||
@ -126,7 +128,9 @@ in
|
|||||||
"XF86AudioPrev" = "exec ${pkgs.playerctl}/bin/playerctl previous";
|
"XF86AudioPrev" = "exec ${pkgs.playerctl}/bin/playerctl previous";
|
||||||
|
|
||||||
# Launchers
|
# Launchers
|
||||||
"${modifier}+Return" = "exec --no-startup-id kitty; workspace ${ws2}; layout tabbed";
|
"${modifier}+Return" = "exec --no-startup-id ${
|
||||||
|
config.home-manager.users.${config.user}.programs.rofi.terminal
|
||||||
|
}; workspace ${ws2}; layout tabbed";
|
||||||
"${modifier}+space" = "exec --no-startup-id ${config.launcherCommand}";
|
"${modifier}+space" = "exec --no-startup-id ${config.launcherCommand}";
|
||||||
"${modifier}+Shift+s" = "exec --no-startup-id ${config.systemdSearch}";
|
"${modifier}+Shift+s" = "exec --no-startup-id ${config.systemdSearch}";
|
||||||
"${modifier}+Shift+a" = "exec --no-startup-id ${config.audioSwitchCommand}";
|
"${modifier}+Shift+a" = "exec --no-startup-id ${config.audioSwitchCommand}";
|
||||||
@ -138,8 +142,12 @@ in
|
|||||||
"${modifier}+Shift+r" = "restart";
|
"${modifier}+Shift+r" = "restart";
|
||||||
"${modifier}+Shift+q" = ''exec "i3-nagbar -t warning -m 'You pressed the exit shortcut. Do you really want to exit i3? This will end your X session.' -B 'Yes, exit i3' 'i3-msg exit'"'';
|
"${modifier}+Shift+q" = ''exec "i3-nagbar -t warning -m 'You pressed the exit shortcut. Do you really want to exit i3? This will end your X session.' -B 'Yes, exit i3' 'i3-msg exit'"'';
|
||||||
"${modifier}+Shift+x" = "exec ${lockCmd}";
|
"${modifier}+Shift+x" = "exec ${lockCmd}";
|
||||||
"${modifier}+Mod1+h" = "exec --no-startup-id kitty sh -c '${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#${config.networking.hostName} || read'";
|
"${modifier}+Mod1+h" = "exec --no-startup-id ${
|
||||||
"${modifier}+Mod1+r" = "exec --no-startup-id kitty sh -c 'doas nixos-rebuild switch --flake ${config.dotfilesPath}#${config.networking.hostName} || read'";
|
config.home-manager.users.${config.user}.programs.rofi.terminal
|
||||||
|
} -e sh -c '${pkgs.home-manager}/bin/home-manager switch --flake ${config.dotfilesPath}#${config.networking.hostName} || read'";
|
||||||
|
"${modifier}+Mod1+r" = "exec --no-startup-id ${
|
||||||
|
config.home-manager.users.${config.user}.programs.rofi.terminal
|
||||||
|
} -e sh -c 'doas nixos-rebuild switch --flake ${config.dotfilesPath}#${config.networking.hostName} || read'";
|
||||||
|
|
||||||
# Window options
|
# Window options
|
||||||
"${modifier}+q" = "kill";
|
"${modifier}+q" = "kill";
|
||||||
|
@ -42,7 +42,7 @@
|
|||||||
module-margin = 1;
|
module-margin = 1;
|
||||||
modules-left = "i3";
|
modules-left = "i3";
|
||||||
modules-center = "xwindow";
|
modules-center = "xwindow";
|
||||||
modules-right = "mailcount network pulseaudio date keyboard power";
|
modules-right = "mailcount network pulseaudio date power";
|
||||||
cursor-click = "pointer";
|
cursor-click = "pointer";
|
||||||
cursor-scroll = "ns-resize";
|
cursor-scroll = "ns-resize";
|
||||||
enable-ipc = true;
|
enable-ipc = true;
|
||||||
@ -209,12 +209,6 @@
|
|||||||
label-foreground = config.theme.colors.base06;
|
label-foreground = config.theme.colors.base06;
|
||||||
# format-background = colors.background;
|
# format-background = colors.background;
|
||||||
};
|
};
|
||||||
"module/keyboard" = {
|
|
||||||
type = "custom/text";
|
|
||||||
content = "";
|
|
||||||
click-left = "doas systemctl restart keyd";
|
|
||||||
content-foreground = config.theme.colors.base04;
|
|
||||||
};
|
|
||||||
"module/power" = {
|
"module/power" = {
|
||||||
type = "custom/text";
|
type = "custom/text";
|
||||||
content = " ";
|
content = " ";
|
||||||
|
@ -18,9 +18,6 @@ in
|
|||||||
|
|
||||||
config = lib.mkIf (pkgs.stdenv.isLinux && config.services.xserver.enable) {
|
config = lib.mkIf (pkgs.stdenv.isLinux && config.services.xserver.enable) {
|
||||||
|
|
||||||
# Set the Rofi-Systemd terminal for viewing logs
|
|
||||||
environment.sessionVariables.ROFI_SYSTEMD_TERM = lib.mkIf config.kitty.enable "${pkgs.kitty}/bin/kitty";
|
|
||||||
|
|
||||||
home-manager.users.${config.user} = {
|
home-manager.users.${config.user} = {
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
@ -32,6 +29,7 @@ in
|
|||||||
cycle = true;
|
cycle = true;
|
||||||
location = "center";
|
location = "center";
|
||||||
pass = { };
|
pass = { };
|
||||||
|
terminal = lib.mkIf pkgs.stdenv.isLinux config.terminal;
|
||||||
plugins = [
|
plugins = [
|
||||||
pkgs.rofi-calc
|
pkgs.rofi-calc
|
||||||
pkgs.rofi-emoji
|
pkgs.rofi-emoji
|
||||||
|
@ -8,13 +8,13 @@
|
|||||||
|
|
||||||
config = lib.mkIf config.gui.enable {
|
config = lib.mkIf config.gui.enable {
|
||||||
|
|
||||||
|
# Enable touchpad support
|
||||||
|
services.libinput.enable = true;
|
||||||
|
|
||||||
# Enable the X11 windowing system.
|
# Enable the X11 windowing system.
|
||||||
services.xserver = {
|
services.xserver = {
|
||||||
enable = config.gui.enable;
|
enable = config.gui.enable;
|
||||||
|
|
||||||
# Enable touchpad support
|
|
||||||
libinput.enable = true;
|
|
||||||
|
|
||||||
# Login screen
|
# Login screen
|
||||||
displayManager = {
|
displayManager = {
|
||||||
lightdm = {
|
lightdm = {
|
||||||
|
@ -36,8 +36,6 @@ in
|
|||||||
{
|
{
|
||||||
|
|
||||||
config = lib.mkIf (pkgs.stdenv.isLinux && config.gui.enable) {
|
config = lib.mkIf (pkgs.stdenv.isLinux && config.gui.enable) {
|
||||||
sound.enable = true;
|
|
||||||
|
|
||||||
# Enable PipeWire
|
# Enable PipeWire
|
||||||
services.pipewire = {
|
services.pipewire = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -1,9 +1,4 @@
|
|||||||
{
|
{ config, lib, ... }:
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
{
|
||||||
|
|
||||||
config = lib.mkIf config.physical {
|
config = lib.mkIf config.physical {
|
||||||
@ -17,23 +12,29 @@
|
|||||||
autoRepeatInterval = 40;
|
autoRepeatInterval = 40;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Use capslock as escape and/or control
|
# Swap Caps-Lock with Escape when pressed or LCtrl when held/combined with others
|
||||||
services.keyd = {
|
# Inspired by: https://www.youtube.com/watch?v=XuQVbZ0wENE
|
||||||
|
services.kanata = {
|
||||||
enable = true;
|
enable = true;
|
||||||
keyboards = {
|
keyboards.default = {
|
||||||
default = {
|
devices = [
|
||||||
ids = [ "*" ];
|
"/dev/input/by-id/usb-Logitech_Logitech_G710_Keyboard-event-kbd"
|
||||||
settings = {
|
"/dev/input/by-id/usb-Logitech_Logitech_G710_Keyboard-if01-event-kbd"
|
||||||
main = {
|
];
|
||||||
capslock = "overload(control, esc)";
|
extraDefCfg = "process-unmapped-keys yes";
|
||||||
|
config = ''
|
||||||
|
(defsrc
|
||||||
|
caps
|
||||||
|
)
|
||||||
|
(defalias
|
||||||
|
escctrl (tap-hold-press 1000 1000 esc lctrl)
|
||||||
|
)
|
||||||
|
(deflayer base
|
||||||
|
@escctrl
|
||||||
|
)
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# For some reason, keyd doesn't restart properly when updating
|
|
||||||
system.activationScripts.keyd.text = "${pkgs.systemd}/bin/systemctl restart keyd.service";
|
|
||||||
|
|
||||||
# Enable num lock on login
|
# Enable num lock on login
|
||||||
home-manager.users.${config.user}.xsession.numlock.enable = true;
|
home-manager.users.${config.user}.xsession.numlock.enable = true;
|
||||||
|
@ -37,16 +37,16 @@
|
|||||||
# Set up screen position and rotation
|
# Set up screen position and rotation
|
||||||
setupCommands = ''
|
setupCommands = ''
|
||||||
${pkgs.xorg.xrandr}/bin/xrandr --output DisplayPort-1 \
|
${pkgs.xorg.xrandr}/bin/xrandr --output DisplayPort-1 \
|
||||||
--mode 1920x1200 \
|
|
||||||
--pos 1920x0 \
|
|
||||||
--rotate left \
|
|
||||||
--output HDMI-A-0 \
|
|
||||||
--primary \
|
--primary \
|
||||||
--mode 1920x1080 \
|
|
||||||
--pos 0x560 \
|
|
||||||
--rotate normal \
|
--rotate normal \
|
||||||
|
--mode 2560x1440 \
|
||||||
|
--rate 165 \
|
||||||
|
--output DisplayPort-2 \
|
||||||
|
--right-of DisplayPort-1 \
|
||||||
|
--rotate left \
|
||||||
--output DVI-0 --off \
|
--output DVI-0 --off \
|
||||||
--output DVI-1 --off \
|
--output DVI-1 --off \
|
||||||
|
|| echo "xrandr failed"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -21,5 +21,15 @@
|
|||||||
accelProfile = "flat";
|
accelProfile = "flat";
|
||||||
accelSpeed = "1.15";
|
accelSpeed = "1.15";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Cursor
|
||||||
|
home-manager.users.${config.user}.home.pointerCursor = {
|
||||||
|
name = "Adwaita";
|
||||||
|
package = pkgs.adwaita-icon-theme;
|
||||||
|
size = 24;
|
||||||
|
gtk.enable = true;
|
||||||
|
x11.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
|
|
||||||
config = lib.mkIf (config.physical && !config.server) {
|
config = lib.mkIf (config.physical && !config.server) {
|
||||||
|
|
||||||
|
# Use power button to sleep instead of poweroff
|
||||||
|
services.logind.powerKey = "suspend";
|
||||||
|
services.logind.powerKeyLongPress = "poweroff";
|
||||||
|
|
||||||
# Prevent wake from keyboard
|
# Prevent wake from keyboard
|
||||||
powerManagement.powerDownCommands = ''
|
powerManagement.powerDownCommands = ''
|
||||||
set +e
|
set +e
|
||||||
|
@ -1,4 +1,9 @@
|
|||||||
{ config, lib, ... }:
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
{
|
{
|
||||||
|
|
||||||
options = {
|
options = {
|
||||||
@ -8,7 +13,7 @@
|
|||||||
config = lib.mkIf (config.server && config.zfs.enable) {
|
config = lib.mkIf (config.server && config.zfs.enable) {
|
||||||
|
|
||||||
# Only use compatible Linux kernel, since ZFS can be behind
|
# Only use compatible Linux kernel, since ZFS can be behind
|
||||||
boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
|
boot.kernelPackages = pkgs.linuxPackages; # Defaults to latest LTS
|
||||||
boot.kernelParams = [ "nohibernate" ];
|
boot.kernelParams = [ "nohibernate" ];
|
||||||
boot.supportedFilesystems = [ "zfs" ];
|
boot.supportedFilesystems = [ "zfs" ];
|
||||||
services.prometheus.exporters.zfs.enable = config.prometheus.exporters.enable;
|
services.prometheus.exporters.zfs.enable = config.prometheus.exporters.enable;
|
||||||
|
74
modules/nixos/services/actualbudget.nix
Normal file
74
modules/nixos/services/actualbudget.nix
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
services.actualbudget = {
|
||||||
|
enable = lib.mkEnableOption "ActualBudget budgeting service";
|
||||||
|
port = lib.mkOption {
|
||||||
|
type = lib.types.port;
|
||||||
|
description = "Port to use for the localhost";
|
||||||
|
default = 5006;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.actualbudget.enable {
|
||||||
|
|
||||||
|
virtualisation.podman.enable = lib.mkDefault true;
|
||||||
|
|
||||||
|
users.users.actualbudget = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "shared";
|
||||||
|
uid = 980;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Create budget directory, allowing others to manage it
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d /var/lib/actualbudget 0770 actualbudget shared"
|
||||||
|
];
|
||||||
|
|
||||||
|
virtualisation.oci-containers.containers.actualbudget = {
|
||||||
|
workdir = null;
|
||||||
|
volumes = [ "/var/lib/actualbudget:/data" ];
|
||||||
|
user = "${toString (builtins.toString config.users.users.actualbudget.uid)}";
|
||||||
|
pull = "missing";
|
||||||
|
privileged = false;
|
||||||
|
ports = [ "127.0.0.1:${builtins.toString config.services.actualbudget.port}:5006" ];
|
||||||
|
networks = [ ];
|
||||||
|
log-driver = "journald";
|
||||||
|
labels = {
|
||||||
|
app = "actualbudget";
|
||||||
|
};
|
||||||
|
image = "ghcr.io/actualbudget/actual-server:25.1.0";
|
||||||
|
hostname = null;
|
||||||
|
environmentFiles = [ ];
|
||||||
|
environment = {
|
||||||
|
DEBUG = "actual:config"; # Enable debug logging
|
||||||
|
ACTUAL_TRUSTED_PROXIES = builtins.concatStringsSep "," [ "127.0.0.1" ];
|
||||||
|
};
|
||||||
|
dependsOn = [ ];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Allow web traffic to Caddy
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.budget ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = "localhost:${builtins.toString config.services.actualbudget.port}"; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.budget ];
|
||||||
|
|
||||||
|
# Backups
|
||||||
|
services.restic.backups.default.paths = [ "/var/lib/actualbudget" ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
@ -14,6 +14,11 @@ let
|
|||||||
url = "localhost:7878";
|
url = "localhost:7878";
|
||||||
apiKey = config.secrets.radarrApiKey.dest;
|
apiKey = config.secrets.radarrApiKey.dest;
|
||||||
};
|
};
|
||||||
|
readarr = {
|
||||||
|
exportarrPort = "9711";
|
||||||
|
url = "localhost:8787";
|
||||||
|
apiKey = config.secrets.readarrApiKey.dest;
|
||||||
|
};
|
||||||
sonarr = {
|
sonarr = {
|
||||||
exportarrPort = "9708";
|
exportarrPort = "9708";
|
||||||
url = "localhost:8989";
|
url = "localhost:8989";
|
||||||
@ -39,37 +44,44 @@ in
|
|||||||
|
|
||||||
config = lib.mkIf config.arrs.enable {
|
config = lib.mkIf config.arrs.enable {
|
||||||
|
|
||||||
|
# Broken on 2024-12-07
|
||||||
|
# https://discourse.nixos.org/t/solved-sonarr-is-broken-in-24-11-unstable-aka-how-the-hell-do-i-use-nixpkgs-config-permittedinsecurepackages/
|
||||||
|
insecurePackages = [
|
||||||
|
"aspnetcore-runtime-wrapped-6.0.36"
|
||||||
|
"aspnetcore-runtime-6.0.36"
|
||||||
|
"dotnet-sdk-wrapped-6.0.428"
|
||||||
|
"dotnet-sdk-6.0.428"
|
||||||
|
];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
bazarr = {
|
bazarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
group = "media";
|
group = "shared";
|
||||||
};
|
};
|
||||||
jellyseerr.enable = true;
|
jellyseerr.enable = true;
|
||||||
prowlarr.enable = true;
|
prowlarr.enable = true;
|
||||||
sabnzbd = {
|
sabnzbd = {
|
||||||
enable = true;
|
enable = true;
|
||||||
group = "media";
|
group = "shared";
|
||||||
# The config file must be editable within the application
|
# The config file must be editable within the application
|
||||||
# It contains server configs and credentials
|
# It contains server configs and credentials
|
||||||
configFile = "/data/downloads/sabnzbd/sabnzbd.ini";
|
configFile = "/data/downloads/sabnzbd/sabnzbd.ini";
|
||||||
};
|
};
|
||||||
sonarr = {
|
sonarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
group = "media";
|
group = "shared";
|
||||||
};
|
};
|
||||||
radarr = {
|
radarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
group = "media";
|
group = "shared";
|
||||||
|
};
|
||||||
|
readarr = {
|
||||||
|
enable = true;
|
||||||
|
group = "shared";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Create a media group to be shared between services
|
# Allows shared group to read/write the sabnzbd directory
|
||||||
users.groups.media = { };
|
|
||||||
|
|
||||||
# Give the human user access to the media group
|
|
||||||
users.users.${config.user}.extraGroups = [ "media" ];
|
|
||||||
|
|
||||||
# Allows media group to read/write the sabnzbd directory
|
|
||||||
users.users.sabnzbd.homeMode = "0770";
|
users.users.sabnzbd.homeMode = "0770";
|
||||||
|
|
||||||
unfreePackages = [ "unrar" ]; # Required as a dependency for sabnzbd
|
unfreePackages = [ "unrar" ]; # Required as a dependency for sabnzbd
|
||||||
@ -110,6 +122,21 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
group = "download";
|
||||||
|
match = [
|
||||||
|
{
|
||||||
|
host = [ config.hostnames.download ];
|
||||||
|
path = [ "/readarr*" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = arrConfig.readarr.url; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
group = "download";
|
group = "download";
|
||||||
match = [
|
match = [
|
||||||
@ -223,6 +250,11 @@ in
|
|||||||
dest = "/var/private/radarr-api";
|
dest = "/var/private/radarr-api";
|
||||||
prefix = "API_KEY=";
|
prefix = "API_KEY=";
|
||||||
};
|
};
|
||||||
|
secrets.readarrApiKey = {
|
||||||
|
source = ../../../private/radarr-api-key.age;
|
||||||
|
dest = "/var/private/readarr-api";
|
||||||
|
prefix = "API_KEY=";
|
||||||
|
};
|
||||||
secrets.sonarrApiKey = {
|
secrets.sonarrApiKey = {
|
||||||
source = ../../../private/sonarr-api-key.age;
|
source = ../../../private/sonarr-api-key.age;
|
||||||
dest = "/var/private/sonarr-api";
|
dest = "/var/private/sonarr-api";
|
||||||
|
29
modules/nixos/services/audiobookshelf.nix
Normal file
29
modules/nixos/services/audiobookshelf.nix
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.audiobookshelf.enable {
|
||||||
|
|
||||||
|
services.audiobookshelf = {
|
||||||
|
group = "shared";
|
||||||
|
dataDir = "audiobookshelf";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Allow web traffic to Caddy
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.audiobooks ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = "localhost:${builtins.toString config.services.audiobookshelf.port}"; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.audiobooks ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
@ -22,6 +22,11 @@
|
|||||||
description = "S3 access key ID for backups";
|
description = "S3 access key ID for backups";
|
||||||
default = null;
|
default = null;
|
||||||
};
|
};
|
||||||
|
resticBucket = lib.mkOption {
|
||||||
|
type = lib.types.nullOr lib.types.str;
|
||||||
|
description = "S3 bucket for restic backups";
|
||||||
|
default = null;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -44,6 +49,10 @@
|
|||||||
settings = { };
|
settings = { };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Broken on 2024-08-23
|
||||||
|
# https://github.com/NixOS/nixpkgs/commit/0875d0ce1c778f344cd2377a5337a45385d6ffa0
|
||||||
|
insecurePackages = [ "litestream-0.3.13" ];
|
||||||
|
|
||||||
# Wait for secret to exist
|
# Wait for secret to exist
|
||||||
systemd.services.litestream = {
|
systemd.services.litestream = {
|
||||||
after = [ "backup-secret.service" ];
|
after = [ "backup-secret.service" ];
|
||||||
@ -65,5 +74,30 @@
|
|||||||
# timerConfig = { OnCalendar = "00:05:00"; };
|
# timerConfig = { OnCalendar = "00:05:00"; };
|
||||||
# environmentFile = backup.s3File;
|
# environmentFile = backup.s3File;
|
||||||
# };
|
# };
|
||||||
|
|
||||||
|
secrets.s3-glacier = {
|
||||||
|
source = ../../../private/s3-glacier.age;
|
||||||
|
dest = "${config.secretsDirectory}/s3-glacier";
|
||||||
|
};
|
||||||
|
secrets.restic = {
|
||||||
|
source = ../../../private/restic.age;
|
||||||
|
dest = "${config.secretsDirectory}/restic";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.restic.backups = lib.mkIf (config.backup.s3.resticBucket != null) {
|
||||||
|
default = {
|
||||||
|
repository = "s3:s3.us-east-1.amazonaws.com/${config.backup.s3.resticBucket}/restic";
|
||||||
|
paths = [ ];
|
||||||
|
environmentFile = config.secrets.s3-glacier.dest;
|
||||||
|
passwordFile = config.secrets.restic.dest;
|
||||||
|
pruneOpts = [
|
||||||
|
"--keep-daily 14"
|
||||||
|
"--keep-weekly 6"
|
||||||
|
"--keep-monthly 12"
|
||||||
|
"--keep-yearly 100"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -20,6 +20,7 @@ let
|
|||||||
config.hostnames.content
|
config.hostnames.content
|
||||||
config.hostnames.books
|
config.hostnames.books
|
||||||
config.hostnames.download
|
config.hostnames.download
|
||||||
|
config.hostnames.photos
|
||||||
];
|
];
|
||||||
mkRecord = service: "${service} A ${localIp}";
|
mkRecord = service: "${service} A ${localIp}";
|
||||||
localRecords = lib.concatLines (map mkRecord localServices);
|
localRecords = lib.concatLines (map mkRecord localServices);
|
||||||
|
@ -46,7 +46,7 @@
|
|||||||
|
|
||||||
# Force Caddy to 403 if not coming from allowlisted source
|
# Force Caddy to 403 if not coming from allowlisted source
|
||||||
caddy.cidrAllowlist = [ "127.0.0.1/32" ];
|
caddy.cidrAllowlist = [ "127.0.0.1/32" ];
|
||||||
caddy.routes = [
|
caddy.routes = lib.mkBefore [
|
||||||
{
|
{
|
||||||
match = [ { not = [ { remote_ip.ranges = config.caddy.cidrAllowlist; } ]; } ];
|
match = [ { not = [ { remote_ip.ranges = config.caddy.cidrAllowlist; } ]; } ];
|
||||||
handle = [
|
handle = [
|
||||||
@ -58,7 +58,26 @@
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
services.caddy = {
|
services.caddy =
|
||||||
|
let
|
||||||
|
default_logger_name = "other";
|
||||||
|
roll_size_mb = 25;
|
||||||
|
# Extract list of hostnames (fqdns) from current caddy routes
|
||||||
|
getHostnameFromMatch = match: if (lib.hasAttr "host" match) then match.host else [ ];
|
||||||
|
getHostnameFromRoute =
|
||||||
|
route:
|
||||||
|
if (lib.hasAttr "match" route) then (lib.concatMap getHostnameFromMatch route.match) else [ ];
|
||||||
|
hostnames_non_unique = lib.concatMap getHostnameFromRoute config.caddy.routes;
|
||||||
|
hostnames = lib.unique hostnames_non_unique;
|
||||||
|
# Create attrset of subdomains to their fqdns
|
||||||
|
hostname_map = builtins.listToAttrs (
|
||||||
|
map (hostname: {
|
||||||
|
name = builtins.head (lib.splitString "." hostname);
|
||||||
|
value = hostname;
|
||||||
|
}) hostnames
|
||||||
|
);
|
||||||
|
in
|
||||||
|
{
|
||||||
adapter = "''"; # Required to enable JSON
|
adapter = "''"; # Required to enable JSON
|
||||||
configFile = pkgs.writeText "Caddyfile" (
|
configFile = pkgs.writeText "Caddyfile" (
|
||||||
builtins.toJSON {
|
builtins.toJSON {
|
||||||
@ -69,30 +88,124 @@
|
|||||||
routes = config.caddy.routes;
|
routes = config.caddy.routes;
|
||||||
errors.routes = config.caddy.blocks;
|
errors.routes = config.caddy.blocks;
|
||||||
|
|
||||||
logs = { }; # Uncommenting collects access logs
|
# Uncommenting collects access logs
|
||||||
|
logs = {
|
||||||
|
inherit default_logger_name;
|
||||||
|
# Invert hostnames keys and values
|
||||||
|
logger_names = lib.mapAttrs' (name: value: {
|
||||||
|
name = value;
|
||||||
|
value = name;
|
||||||
|
}) hostname_map;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
apps.http.servers.metrics = { }; # Enables Prometheus metrics
|
apps.http.servers.metrics = { }; # Enables Prometheus metrics
|
||||||
apps.tls.automation.policies = config.caddy.tlsPolicies;
|
apps.tls.automation.policies = config.caddy.tlsPolicies;
|
||||||
|
|
||||||
# Setup logging to file
|
# Setup logging to journal and files
|
||||||
logging.logs.main = {
|
logging.logs =
|
||||||
encoder = {
|
{
|
||||||
format = "console";
|
# System logs and catch-all
|
||||||
|
# Must be called `default` to override Caddy's built-in default logger
|
||||||
|
default = {
|
||||||
|
level = "INFO";
|
||||||
|
encoder.format = "console";
|
||||||
|
writer = {
|
||||||
|
output = "stderr";
|
||||||
};
|
};
|
||||||
|
exclude = (map (hostname: "http.log.access.${hostname}") (builtins.attrNames hostname_map)) ++ [
|
||||||
|
"http.log.access.${default_logger_name}"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
# This is for the default access logs (anything not captured by hostname)
|
||||||
|
other = {
|
||||||
|
level = "INFO";
|
||||||
|
encoder.format = "json";
|
||||||
writer = {
|
writer = {
|
||||||
output = "file";
|
output = "file";
|
||||||
filename = "${config.services.caddy.logDir}/caddy.log";
|
filename = "${config.services.caddy.logDir}/other.log";
|
||||||
roll = true;
|
roll = true;
|
||||||
roll_size_mb = 1;
|
inherit roll_size_mb;
|
||||||
};
|
};
|
||||||
|
include = [ "http.log.access.${default_logger_name}" ];
|
||||||
|
};
|
||||||
|
# This is for using the Caddy API, which will probably never happen
|
||||||
|
admin = {
|
||||||
level = "INFO";
|
level = "INFO";
|
||||||
|
encoder.format = "json";
|
||||||
|
writer = {
|
||||||
|
output = "file";
|
||||||
|
filename = "${config.services.caddy.logDir}/admin.log";
|
||||||
|
roll = true;
|
||||||
|
inherit roll_size_mb;
|
||||||
};
|
};
|
||||||
|
include = [ "admin" ];
|
||||||
|
};
|
||||||
|
# This is for TLS cert management tracking
|
||||||
|
tls = {
|
||||||
|
level = "INFO";
|
||||||
|
encoder.format = "json";
|
||||||
|
writer = {
|
||||||
|
output = "file";
|
||||||
|
filename = "${config.services.caddy.logDir}/tls.log";
|
||||||
|
roll = true;
|
||||||
|
inherit roll_size_mb;
|
||||||
|
};
|
||||||
|
include = [ "tls" ];
|
||||||
|
};
|
||||||
|
# This is for debugging
|
||||||
|
debug = {
|
||||||
|
level = "DEBUG";
|
||||||
|
encoder.format = "json";
|
||||||
|
writer = {
|
||||||
|
output = "file";
|
||||||
|
filename = "${config.services.caddy.logDir}/debug.log";
|
||||||
|
roll = true;
|
||||||
|
roll_keep = 1;
|
||||||
|
inherit roll_size_mb;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
# These are the access logs for individual hostnames
|
||||||
|
// (lib.mapAttrs (name: value: {
|
||||||
|
level = "INFO";
|
||||||
|
encoder.format = "json";
|
||||||
|
writer = {
|
||||||
|
output = "file";
|
||||||
|
filename = "${config.services.caddy.logDir}/${name}-access.log";
|
||||||
|
roll = true;
|
||||||
|
inherit roll_size_mb;
|
||||||
|
};
|
||||||
|
include = [ "http.log.access.${name}" ];
|
||||||
|
}) hostname_map)
|
||||||
|
# We also capture just the errors separately for easy debugging
|
||||||
|
// (lib.mapAttrs' (name: value: {
|
||||||
|
name = "${name}-error";
|
||||||
|
value = {
|
||||||
|
level = "ERROR";
|
||||||
|
encoder.format = "json";
|
||||||
|
writer = {
|
||||||
|
output = "file";
|
||||||
|
filename = "${config.services.caddy.logDir}/${name}-error.log";
|
||||||
|
roll = true;
|
||||||
|
inherit roll_size_mb;
|
||||||
|
};
|
||||||
|
include = [ "http.log.access.${name}" ];
|
||||||
|
};
|
||||||
|
}) hostname_map);
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.services.caddy.serviceConfig = {
|
||||||
|
|
||||||
# Allows Caddy to serve lower ports (443, 80)
|
# Allows Caddy to serve lower ports (443, 80)
|
||||||
systemd.services.caddy.serviceConfig.AmbientCapabilities = "CAP_NET_BIND_SERVICE";
|
AmbientCapabilities = "CAP_NET_BIND_SERVICE";
|
||||||
|
|
||||||
|
# Prevent flooding of logs by rate-limiting
|
||||||
|
LogRateLimitIntervalSec = "5s"; # Limit period
|
||||||
|
LogRateLimitBurst = 100; # Limit threshold
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
# Required for web traffic to reach this machine
|
# Required for web traffic to reach this machine
|
||||||
networking.firewall.allowedTCPPorts = [
|
networking.firewall.allowedTCPPorts = [
|
||||||
|
@ -28,6 +28,7 @@ in
|
|||||||
config = lib.mkIf config.services.calibre-web.enable {
|
config = lib.mkIf config.services.calibre-web.enable {
|
||||||
|
|
||||||
services.calibre-web = {
|
services.calibre-web = {
|
||||||
|
group = "shared";
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
options = {
|
options = {
|
||||||
reverseProxyAuth.enable = false;
|
reverseProxyAuth.enable = false;
|
||||||
|
@ -78,6 +78,8 @@ in
|
|||||||
issuers = [
|
issuers = [
|
||||||
{
|
{
|
||||||
module = "acme";
|
module = "acme";
|
||||||
|
email = "acme@${config.mail.server}";
|
||||||
|
account_key = "{env.ACME_ACCOUNT_KEY}";
|
||||||
challenges = {
|
challenges = {
|
||||||
dns = {
|
dns = {
|
||||||
provider = {
|
provider = {
|
||||||
@ -92,7 +94,18 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
# Allow Caddy to read Cloudflare API key for DNS validation
|
# Allow Caddy to read Cloudflare API key for DNS validation
|
||||||
systemd.services.caddy.serviceConfig.EnvironmentFile = config.secrets.cloudflare-api.dest;
|
systemd.services.caddy.serviceConfig.EnvironmentFile = [
|
||||||
|
config.secrets.cloudflare-api.dest
|
||||||
|
config.secrets.letsencrypt-key.dest
|
||||||
|
];
|
||||||
|
|
||||||
|
# Private key is used for LetsEncrypt
|
||||||
|
secrets.letsencrypt-key = {
|
||||||
|
source = ../../../private/letsencrypt-key.age;
|
||||||
|
dest = "${config.secretsDirectory}/letsencrypt-key";
|
||||||
|
owner = "caddy";
|
||||||
|
group = "caddy";
|
||||||
|
};
|
||||||
|
|
||||||
# API key must have access to modify Cloudflare DNS records
|
# API key must have access to modify Cloudflare DNS records
|
||||||
secrets.cloudflare-api = {
|
secrets.cloudflare-api = {
|
||||||
@ -104,8 +117,14 @@ in
|
|||||||
|
|
||||||
# Wait for secret to exist
|
# Wait for secret to exist
|
||||||
systemd.services.caddy = {
|
systemd.services.caddy = {
|
||||||
after = [ "cloudflare-api-secret.service" ];
|
after = [
|
||||||
requires = [ "cloudflare-api-secret.service" ];
|
"cloudflare-api-secret.service"
|
||||||
|
"letsencrypt-key-secret.service"
|
||||||
|
];
|
||||||
|
requires = [
|
||||||
|
"cloudflare-api-secret.service"
|
||||||
|
"letsencrypt-key-secret.service"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
# Allows Nextcloud to trust Cloudflare IPs
|
# Allows Nextcloud to trust Cloudflare IPs
|
||||||
@ -116,6 +135,9 @@ in
|
|||||||
[ "127.0.0.1" ] ++ cloudflareIpRanges
|
[ "127.0.0.1" ] ++ cloudflareIpRanges
|
||||||
);
|
);
|
||||||
|
|
||||||
|
# Using dyn-dns instead of ddclient because I can't find a way to choose
|
||||||
|
# between proxied and non-proxied records for Cloudflare using just
|
||||||
|
# ddclient.
|
||||||
services.cloudflare-dyndns =
|
services.cloudflare-dyndns =
|
||||||
lib.mkIf ((builtins.length config.services.cloudflare-dyndns.domains) > 0)
|
lib.mkIf ((builtins.length config.services.cloudflare-dyndns.domains) > 0)
|
||||||
{
|
{
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
{
|
{
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
./actualbudget.nix
|
||||||
|
./audiobookshelf.nix
|
||||||
./arr.nix
|
./arr.nix
|
||||||
./backups.nix
|
./backups.nix
|
||||||
./bind.nix
|
./bind.nix
|
||||||
@ -12,7 +14,9 @@
|
|||||||
./calibre.nix
|
./calibre.nix
|
||||||
./cloudflare-tunnel.nix
|
./cloudflare-tunnel.nix
|
||||||
./cloudflare.nix
|
./cloudflare.nix
|
||||||
|
./filebrowser.nix
|
||||||
./identity.nix
|
./identity.nix
|
||||||
|
./immich.nix
|
||||||
./irc.nix
|
./irc.nix
|
||||||
./gitea-runner.nix
|
./gitea-runner.nix
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
@ -26,6 +30,7 @@
|
|||||||
./n8n.nix
|
./n8n.nix
|
||||||
./netdata.nix
|
./netdata.nix
|
||||||
./nextcloud.nix
|
./nextcloud.nix
|
||||||
|
./ntfy.nix
|
||||||
./paperless.nix
|
./paperless.nix
|
||||||
./postgresql.nix
|
./postgresql.nix
|
||||||
./prometheus.nix
|
./prometheus.nix
|
||||||
@ -33,6 +38,7 @@
|
|||||||
./secrets.nix
|
./secrets.nix
|
||||||
./sshd.nix
|
./sshd.nix
|
||||||
./transmission.nix
|
./transmission.nix
|
||||||
|
./uptime-kuma.nix
|
||||||
./vaultwarden.nix
|
./vaultwarden.nix
|
||||||
./victoriametrics.nix
|
./victoriametrics.nix
|
||||||
./wireguard.nix
|
./wireguard.nix
|
||||||
|
68
modules/nixos/services/filebrowser.nix
Normal file
68
modules/nixos/services/filebrowser.nix
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
dataDir = "/var/lib/filebrowser";
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
port = 8020;
|
||||||
|
baseURL = "";
|
||||||
|
address = "";
|
||||||
|
log = "stdout";
|
||||||
|
database = "${dataDir}/filebrowser.db";
|
||||||
|
root = "";
|
||||||
|
"auth.method" = "json";
|
||||||
|
username = config.user;
|
||||||
|
# Generate password: htpasswd -nBC 10 "" | tr -d ':\n'
|
||||||
|
password = "$2y$10$ze1cMob0k6pnXRjLowYfZOVZWg4G.dsPtH3TohbUeEbI0sdkG9.za";
|
||||||
|
};
|
||||||
|
|
||||||
|
in
|
||||||
|
{
|
||||||
|
|
||||||
|
options.filebrowser.enable = lib.mkEnableOption "Use Filebrowser.";
|
||||||
|
|
||||||
|
config = lib.mkIf config.filebrowser.enable {
|
||||||
|
|
||||||
|
environment.etc."filebrowser/.filebrowser.json".text = builtins.toJSON settings;
|
||||||
|
|
||||||
|
systemd.services.filebrowser = lib.mkIf config.filebrowser.enable {
|
||||||
|
description = "Filebrowser cloud file services";
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
startLimitIntervalSec = 14400;
|
||||||
|
startLimitBurst = 10;
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.filebrowser}/bin/filebrowser";
|
||||||
|
DynamicUser = true;
|
||||||
|
Group = "shared";
|
||||||
|
ReadWritePaths = [ dataDir ];
|
||||||
|
StateDirectory = [ "filebrowser" ];
|
||||||
|
Restart = "on-failure";
|
||||||
|
RestartPreventExitStatus = 1;
|
||||||
|
RestartSec = "5s";
|
||||||
|
};
|
||||||
|
path = [ pkgs.getent ]; # Fix: getent not found in $PATH
|
||||||
|
};
|
||||||
|
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.files ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = "localhost:${builtins.toString settings.port}"; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.files ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
@ -53,6 +53,7 @@ in
|
|||||||
uid = promUid;
|
uid = promUid;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
# TODO: Add option to pull services from a list like Caddy does
|
||||||
dashboards.settings.providers = [
|
dashboards.settings.providers = [
|
||||||
{
|
{
|
||||||
name = "test";
|
name = "test";
|
||||||
@ -368,6 +369,18 @@ in
|
|||||||
range = true;
|
range = true;
|
||||||
refId = "C";
|
refId = "C";
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
datasource = {
|
||||||
|
type = "prometheus";
|
||||||
|
uid = promUid;
|
||||||
|
};
|
||||||
|
editorMode = "code";
|
||||||
|
expr = "readarr_system_status";
|
||||||
|
hide = false;
|
||||||
|
legendFormat = "Readarr";
|
||||||
|
range = true;
|
||||||
|
refId = "F";
|
||||||
|
}
|
||||||
{
|
{
|
||||||
datasource = {
|
datasource = {
|
||||||
type = "prometheus";
|
type = "prometheus";
|
||||||
@ -669,7 +682,7 @@ in
|
|||||||
};
|
};
|
||||||
editorMode = "code";
|
editorMode = "code";
|
||||||
exemplar = false;
|
exemplar = false;
|
||||||
"expr" = ''increase(zfs_dataset_used_bytes{name="tank"}[1d])'';
|
"expr" = ''delta(zfs_dataset_used_bytes{name="tank"}[1d])'';
|
||||||
hide = false;
|
hide = false;
|
||||||
instant = false;
|
instant = false;
|
||||||
interval = "";
|
interval = "";
|
||||||
@ -683,7 +696,7 @@ in
|
|||||||
uid = promUid;
|
uid = promUid;
|
||||||
};
|
};
|
||||||
editorMode = "code";
|
editorMode = "code";
|
||||||
"expr" = ''increase(zfs_dataset_used_bytes{name="tank"}[7d])'';
|
"expr" = ''delta(zfs_dataset_used_bytes{name="tank"}[7d])'';
|
||||||
hide = false;
|
hide = false;
|
||||||
legendFormat = "Past Week";
|
legendFormat = "Past Week";
|
||||||
range = true;
|
range = true;
|
||||||
@ -695,7 +708,7 @@ in
|
|||||||
uid = promUid;
|
uid = promUid;
|
||||||
};
|
};
|
||||||
editorMode = "code";
|
editorMode = "code";
|
||||||
"expr" = ''increase(zfs_dataset_used_bytes{name="tank"}[30d])'';
|
"expr" = ''delta(zfs_dataset_used_bytes{name="tank"}[30d])'';
|
||||||
hide = false;
|
hide = false;
|
||||||
legendFormat = "Past Month";
|
legendFormat = "Past Month";
|
||||||
range = true;
|
range = true;
|
||||||
@ -819,6 +832,28 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
matcher = {
|
||||||
|
id = "byName";
|
||||||
|
options = "localhost:8787";
|
||||||
|
};
|
||||||
|
properties = [
|
||||||
|
{
|
||||||
|
id = "displayName";
|
||||||
|
value = "Readarr";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
id = "links";
|
||||||
|
value = [
|
||||||
|
{
|
||||||
|
targetBlank = true;
|
||||||
|
title = "";
|
||||||
|
url = "https://${config.hostnames.download}/readarr";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
matcher = {
|
matcher = {
|
||||||
id = "byName";
|
id = "byName";
|
||||||
@ -885,6 +920,28 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
matcher = {
|
||||||
|
id = "byName";
|
||||||
|
options = "localhost:8086";
|
||||||
|
};
|
||||||
|
properties = [
|
||||||
|
{
|
||||||
|
id = "displayName";
|
||||||
|
value = "InfluxDB";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
id = "links";
|
||||||
|
value = [
|
||||||
|
{
|
||||||
|
targetBlank = true;
|
||||||
|
title = "";
|
||||||
|
url = "https://${config.hostnames.influxdb}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
matcher = {
|
matcher = {
|
||||||
id = "byName";
|
id = "byName";
|
||||||
@ -929,6 +986,28 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
matcher = {
|
||||||
|
id = "byName";
|
||||||
|
options = "localhost:9000";
|
||||||
|
};
|
||||||
|
properties = [
|
||||||
|
{
|
||||||
|
id = "displayName";
|
||||||
|
value = "The Lounge";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
id = "links";
|
||||||
|
value = [
|
||||||
|
{
|
||||||
|
targetBlank = true;
|
||||||
|
title = "";
|
||||||
|
url = "https://${config.hostnames.irc}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
matcher = {
|
matcher = {
|
||||||
id = "byName";
|
id = "byName";
|
||||||
@ -1039,6 +1118,50 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
matcher = {
|
||||||
|
id = "byName";
|
||||||
|
options = "localhost:${builtins.toString config.services.paperless.port}";
|
||||||
|
};
|
||||||
|
properties = [
|
||||||
|
{
|
||||||
|
id = "displayName";
|
||||||
|
value = "Paperless";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
id = "links";
|
||||||
|
value = [
|
||||||
|
{
|
||||||
|
targetBlank = true;
|
||||||
|
title = "";
|
||||||
|
url = "https://${config.hostnames.paperless}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
matcher = {
|
||||||
|
id = "byName";
|
||||||
|
options = "localhost:${builtins.toString config.services.audiobookshelf.port}";
|
||||||
|
};
|
||||||
|
properties = [
|
||||||
|
{
|
||||||
|
id = "displayName";
|
||||||
|
value = "Audiobookshelf";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
id = "links";
|
||||||
|
value = [
|
||||||
|
{
|
||||||
|
targetBlank = true;
|
||||||
|
title = "";
|
||||||
|
url = "https://${config.hostnames.audiobooks}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
gridPos = {
|
gridPos = {
|
||||||
@ -2321,7 +2444,7 @@ in
|
|||||||
datasourceUid = promUid;
|
datasourceUid = promUid;
|
||||||
model = {
|
model = {
|
||||||
editorMode = "code";
|
editorMode = "code";
|
||||||
expr = ''systemd_unit_state{name=~"cloudflared-tunnel-.*", state="active"}'';
|
expr = ''systemd_unit_state{name=~"cloudflared-tunnel-.*", state="active", job!="tempest"}'';
|
||||||
hide = false;
|
hide = false;
|
||||||
instant = true;
|
instant = true;
|
||||||
intervalMs = 1000;
|
intervalMs = 1000;
|
||||||
@ -2418,7 +2541,7 @@ in
|
|||||||
execErrState = "Error";
|
execErrState = "Error";
|
||||||
for = "5m";
|
for = "5m";
|
||||||
annotations = {
|
annotations = {
|
||||||
description = "Cloudflare Tunnel for {{ $job }}.";
|
description = "Cloudflare Tunnel for {{ index $labels \"job\" }}.";
|
||||||
summary = "Cloudflare Tunnel is down.";
|
summary = "Cloudflare Tunnel is down.";
|
||||||
};
|
};
|
||||||
isPaused = false;
|
isPaused = false;
|
||||||
|
48
modules/nixos/services/immich.nix
Normal file
48
modules/nixos/services/immich.nix
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.immich.enable {
|
||||||
|
|
||||||
|
services.immich = {
|
||||||
|
port = 2283;
|
||||||
|
group = "shared";
|
||||||
|
database.enable = true;
|
||||||
|
redis.enable = true;
|
||||||
|
machine-learning.enable = true;
|
||||||
|
machine-learning.environment = { };
|
||||||
|
mediaLocation = "/data/images";
|
||||||
|
secretsFile = null;
|
||||||
|
settings.server.externalDomain = "https://${config.hostnames.photos}";
|
||||||
|
environment = {
|
||||||
|
IMMICH_ENV = "production";
|
||||||
|
IMMICH_LOG_LEVEL = "log";
|
||||||
|
NO_COLOR = "false";
|
||||||
|
IMMICH_TRUSTED_PROXIES = "127.0.0.1";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.photos ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = "localhost:${builtins.toString config.services.immich.port}"; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.photos ];
|
||||||
|
|
||||||
|
# Point localhost to the local domain
|
||||||
|
networking.hosts."127.0.0.1" = [ config.hostnames.photos ];
|
||||||
|
|
||||||
|
# Backups
|
||||||
|
services.restic.backups.default.paths = [ "/data/images" ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
@ -11,7 +11,7 @@
|
|||||||
|
|
||||||
config = lib.mkIf config.services.jellyfin.enable {
|
config = lib.mkIf config.services.jellyfin.enable {
|
||||||
|
|
||||||
services.jellyfin.group = "media";
|
services.jellyfin.group = "shared";
|
||||||
users.users.jellyfin = {
|
users.users.jellyfin = {
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
};
|
};
|
||||||
@ -49,14 +49,13 @@
|
|||||||
|
|
||||||
# Create videos directory, allow anyone in Jellyfin group to manage it
|
# Create videos directory, allow anyone in Jellyfin group to manage it
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d /var/lib/jellyfin 0775 jellyfin media"
|
"d /var/lib/jellyfin 0775 jellyfin shared"
|
||||||
"d /var/lib/jellyfin/library 0775 jellyfin media"
|
"d /var/lib/jellyfin/library 0775 jellyfin shared"
|
||||||
];
|
];
|
||||||
|
|
||||||
# Enable VA-API for hardware transcoding
|
# Enable VA-API for hardware transcoding
|
||||||
hardware.opengl = {
|
hardware.graphics = {
|
||||||
enable = true;
|
enable = true;
|
||||||
driSupport = true;
|
|
||||||
extraPackages = [ pkgs.libva ];
|
extraPackages = [ pkgs.libva ];
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.libva-utils ];
|
environment.systemPackages = [ pkgs.libva-utils ];
|
||||||
|
@ -4,33 +4,34 @@
|
|||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
{
|
{
|
||||||
|
|
||||||
options = {
|
config = lib.mkIf config.services.n8n.enable {
|
||||||
n8nServer = lib.mkOption {
|
|
||||||
type = lib.types.nullOr lib.types.str;
|
|
||||||
description = "Hostname for n8n automation";
|
|
||||||
default = null;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf (config.n8nServer != null) {
|
unfreePackages = [ "n8n" ];
|
||||||
|
|
||||||
services.n8n = {
|
services.n8n = {
|
||||||
enable = true;
|
webhookUrl = "https://${config.hostnames.n8n}";
|
||||||
settings = {
|
settings = {
|
||||||
n8n = {
|
listen_address = "127.0.0.1";
|
||||||
listenAddress = "127.0.0.1";
|
|
||||||
port = 5678;
|
port = 5678;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.services.n8n.environment = {
|
||||||
|
N8N_EDITOR_BASE_URL = config.services.n8n.webhookUrl;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.n8n ];
|
||||||
|
|
||||||
|
# Allow web traffic to Caddy
|
||||||
caddy.routes = [
|
caddy.routes = [
|
||||||
{
|
{
|
||||||
match = [ { host = [ config.n8nServer ]; } ];
|
match = [ { host = [ config.hostnames.n8n ]; } ];
|
||||||
handle = [
|
handle = [
|
||||||
{
|
{
|
||||||
handler = "reverse_proxy";
|
handler = "reverse_proxy";
|
||||||
upstreams = [ { dial = "localhost:5678"; } ];
|
upstreams = [ { dial = "localhost:${builtins.toString config.services.n8n.settings.port}"; } ];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
config = lib.mkIf config.services.nextcloud.enable {
|
config = lib.mkIf config.services.nextcloud.enable {
|
||||||
|
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
package = pkgs.nextcloud28; # Required to specify
|
package = pkgs.nextcloud30; # Required to specify
|
||||||
configureRedis = true;
|
configureRedis = true;
|
||||||
datadir = "/data/nextcloud";
|
datadir = "/data/nextcloud";
|
||||||
database.createLocally = true;
|
database.createLocally = true;
|
||||||
@ -26,10 +26,13 @@
|
|||||||
trusted_domains = [ config.hostnames.content ];
|
trusted_domains = [ config.hostnames.content ];
|
||||||
trusted_proxies = [ "127.0.0.1" ];
|
trusted_proxies = [ "127.0.0.1" ];
|
||||||
maintenance_window_start = 4; # Run jobs at 4am UTC
|
maintenance_window_start = 4; # Run jobs at 4am UTC
|
||||||
|
log_type = "file";
|
||||||
|
loglevel = 1; # Include all actions in the log
|
||||||
};
|
};
|
||||||
extraAppsEnable = true;
|
extraAppsEnable = true;
|
||||||
extraApps = with config.services.nextcloud.package.packages.apps; {
|
extraApps = {
|
||||||
inherit calendar contacts;
|
calendar = config.services.nextcloud.package.packages.apps.calendar;
|
||||||
|
contacts = config.services.nextcloud.package.packages.apps.contacts;
|
||||||
# These apps are defined and pinned by overlay in flake.
|
# These apps are defined and pinned by overlay in flake.
|
||||||
news = pkgs.nextcloudApps.news;
|
news = pkgs.nextcloudApps.news;
|
||||||
external = pkgs.nextcloudApps.external;
|
external = pkgs.nextcloudApps.external;
|
||||||
|
33
modules/nixos/services/ntfy.nix
Normal file
33
modules/nixos/services/ntfy.nix
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.ntfy-sh.enable {
|
||||||
|
services.ntfy-sh = {
|
||||||
|
settings = {
|
||||||
|
base-url = "https://${config.hostnames.notifications}";
|
||||||
|
upstream-base-url = "https://ntfy.sh";
|
||||||
|
listen-http = ":8333";
|
||||||
|
behind-proxy = true;
|
||||||
|
auth-default-access = "deny-all";
|
||||||
|
auth-file = "/var/lib/ntfy-sh/user.db";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.notifications ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [ { dial = "localhost${config.services.ntfy-sh.settings.listen-http}"; } ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.notifications ];
|
||||||
|
|
||||||
|
};
|
||||||
|
}
|
@ -57,5 +57,9 @@
|
|||||||
systemd.services.paperless-web.serviceConfig.UMask = lib.mkForce "0026";
|
systemd.services.paperless-web.serviceConfig.UMask = lib.mkForce "0026";
|
||||||
systemd.services.paperless-scheduler.serviceConfig.UMask = lib.mkForce "0026";
|
systemd.services.paperless-scheduler.serviceConfig.UMask = lib.mkForce "0026";
|
||||||
systemd.services.paperless-task-queue.serviceConfig.UMask = lib.mkForce "0026";
|
systemd.services.paperless-task-queue.serviceConfig.UMask = lib.mkForce "0026";
|
||||||
|
|
||||||
|
# Backups
|
||||||
|
services.restic.backups.default.paths = [ "/data/generic/paperless/documents" ];
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
|
|
||||||
services.samba = lib.mkIf config.services.samba.enable {
|
services.samba = lib.mkIf config.services.samba.enable {
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
shares.data = {
|
settings.data = {
|
||||||
path = "/data";
|
path = "/data";
|
||||||
browseable = "yes";
|
browseable = "yes";
|
||||||
"read only" = "no";
|
"read only" = "no";
|
||||||
|
32
modules/nixos/services/uptime-kuma.nix
Normal file
32
modules/nixos/services/uptime-kuma.nix
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
config = lib.mkIf config.services.uptime-kuma.enable {
|
||||||
|
|
||||||
|
services.uptime-kuma = {
|
||||||
|
settings = {
|
||||||
|
PORT = "3033";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Allow web traffic to Caddy
|
||||||
|
caddy.routes = [
|
||||||
|
{
|
||||||
|
match = [ { host = [ config.hostnames.status ]; } ];
|
||||||
|
handle = [
|
||||||
|
{
|
||||||
|
handler = "reverse_proxy";
|
||||||
|
upstreams = [
|
||||||
|
{ dial = "localhost:${config.services.uptime-kuma.settings.PORT}"; }
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Configure Cloudflare DNS to point to this machine
|
||||||
|
services.cloudflare-dyndns.domains = [ config.hostnames.status ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
@ -5,6 +5,7 @@
|
|||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
|
pkgs-stable,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
|
||||||
@ -12,7 +13,7 @@ let
|
|||||||
|
|
||||||
username = "prometheus";
|
username = "prometheus";
|
||||||
|
|
||||||
prometheusConfig = (pkgs.formats.yaml { }).generate "prometheus.yml" {
|
prometheusConfig = {
|
||||||
scrape_configs = [
|
scrape_configs = [
|
||||||
{
|
{
|
||||||
job_name = config.networking.hostName;
|
job_name = config.networking.hostName;
|
||||||
@ -38,7 +39,9 @@ in
|
|||||||
|
|
||||||
config = {
|
config = {
|
||||||
|
|
||||||
services.victoriametrics.extraOptions = [ "-promscrape.config=${prometheusConfig}" ];
|
services.victoriametrics.extraOptions = [
|
||||||
|
"-promscrape.config=${(pkgs.formats.yaml { }).generate "scrape.yml" prometheusConfig}"
|
||||||
|
];
|
||||||
|
|
||||||
systemd.services.vmauth = lib.mkIf config.services.victoriametrics.enable {
|
systemd.services.vmauth = lib.mkIf config.services.victoriametrics.enable {
|
||||||
description = "VictoriaMetrics basic auth proxy";
|
description = "VictoriaMetrics basic auth proxy";
|
||||||
@ -85,21 +88,19 @@ in
|
|||||||
|
|
||||||
# VMAgent
|
# VMAgent
|
||||||
|
|
||||||
services.vmagent.prometheusConfig = prometheusConfig; # Overwritten below
|
services.vmagent = {
|
||||||
systemd.services.vmagent.serviceConfig = lib.mkIf config.services.vmagent.enable {
|
package = pkgs-stable.vmagent;
|
||||||
ExecStart = lib.mkForce ''
|
prometheusConfig = prometheusConfig;
|
||||||
${pkgs.victoriametrics}/bin/vmagent \
|
remoteWrite = {
|
||||||
-promscrape.config=${prometheusConfig} \
|
url = "https://${config.hostnames.prometheus}/api/v1/write";
|
||||||
-remoteWrite.url="https://${config.hostnames.prometheus}/api/v1/write" \
|
basicAuthUsername = username;
|
||||||
-remoteWrite.basicAuth.username=${username} \
|
basicAuthPasswordFile = config.secrets.vmagent.dest;
|
||||||
-remoteWrite.basicAuth.passwordFile=${config.secrets.vmagent.dest}'';
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
secrets.vmagent = lib.mkIf config.services.vmagent.enable {
|
secrets.vmagent = lib.mkIf config.services.vmagent.enable {
|
||||||
source = ../../../private/prometheus.age;
|
source = ../../../private/prometheus.age;
|
||||||
dest = "${config.secretsDirectory}/vmagent";
|
dest = "${config.secretsDirectory}/vmagent";
|
||||||
owner = "vmagent";
|
|
||||||
group = "vmagent";
|
|
||||||
};
|
};
|
||||||
systemd.services.vmagent-secret = lib.mkIf config.services.vmagent.enable {
|
systemd.services.vmagent-secret = lib.mkIf config.services.vmagent.enable {
|
||||||
requiredBy = [ "vmagent.service" ];
|
requiredBy = [ "vmagent.service" ];
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
|
|
||||||
# Update the system daily by pointing it at the flake repository
|
# Update the system daily by pointing it at the flake repository
|
||||||
system.autoUpgrade = {
|
system.autoUpgrade = {
|
||||||
enable = config.server; # Only auto upgrade servers
|
enable = lib.mkDefault false; # Don't enable by default
|
||||||
dates = "09:33";
|
dates = "09:33";
|
||||||
flake = "git+${config.dotfilesRepo}";
|
flake = "git+${config.dotfilesRepo}";
|
||||||
randomizedDelaySec = "25min";
|
randomizedDelaySec = "25min";
|
||||||
|
@ -10,6 +10,7 @@
|
|||||||
./auto-upgrade.nix
|
./auto-upgrade.nix
|
||||||
./doas.nix
|
./doas.nix
|
||||||
./journald.nix
|
./journald.nix
|
||||||
|
./shared.nix
|
||||||
./user.nix
|
./user.nix
|
||||||
./timezone.nix
|
./timezone.nix
|
||||||
];
|
];
|
||||||
|
@ -4,7 +4,10 @@
|
|||||||
# How long to keep journalctl entries
|
# How long to keep journalctl entries
|
||||||
# This helps to make sure log disk usage doesn't grow too unwieldy
|
# This helps to make sure log disk usage doesn't grow too unwieldy
|
||||||
services.journald.extraConfig = ''
|
services.journald.extraConfig = ''
|
||||||
SystemMaxUse=100M
|
SystemMaxUse=4G
|
||||||
|
SystemKeepFree=10G
|
||||||
|
SystemMaxFileSize=128M
|
||||||
|
SystemMaxFiles=500
|
||||||
MaxFileSec=1month
|
MaxFileSec=1month
|
||||||
MaxRetentionSec=2month
|
MaxRetentionSec=2month
|
||||||
'';
|
'';
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user