Compare commits

...

447 commits

Author SHA1 Message Date
fcd55d7650
chore(flake): bump inputs 2024-12-14 17:58:40 +08:00
c2a24c217c
spec(eientei): add minecraft greedycraft instance 2024-12-14 17:47:10 +08:00
05a935810e
home(gnome): link monitors.xml 2024-11-26 22:42:49 +08:00
6c607a47c3
spec(shatter): initial configuration 2024-11-22 04:52:45 +08:00
1f4db6382f
flake: bump inputs 2024-11-22 04:48:24 +08:00
de601464ca
flake: bump inputs 2024-11-14 11:00:55 +08:00
bd7f577869
flake: bump inputs 2024-11-08 14:54:30 +08:00
b979d27010
flake: bump inputs 2024-10-26 01:33:16 +08:00
badf20410a
flake: bump inputs 2024-10-26 01:14:54 +08:00
b0be3b24fa
global(zfs): split setup depend on secret mountpoint 2024-10-26 01:02:09 +08:00
2faa0b1fc2
spec(chireiden): enable gnome 2024-10-26 01:01:06 +08:00
749e8a97d9
spec(focus): nextcloud 29 -> 30 2024-10-24 15:08:00 +08:00
e10a76c449
spec(eientei): nextcloud 29 -> 30 2024-10-21 22:11:31 +08:00
0a680b70d3
flake: bump inputs 2024-10-21 20:48:13 +08:00
41f164ddb0
spec(yume): enable android 2024-10-21 20:48:04 +08:00
7bfa56c273
flake: bump inputs 2024-09-28 16:52:28 +08:00
c5509cb772
home(gnome): intellihide from focused windows 2024-09-19 09:25:48 +08:00
0deb8fdb27
flake: bump inputs 2024-09-18 19:23:46 +08:00
475f8a9cf8
spec(hakugyokurou): remove jovian mode 2024-09-13 12:32:12 +08:00
3f0147b80a
flake: bump inputs 2024-09-13 12:28:17 +08:00
ae801d9871
home(gnome): update package 2024-09-13 12:14:49 +08:00
4e04bcb2a5
flake: bump inputs 2024-09-10 22:53:05 +08:00
f2ac047373
home(gnome): add monitors persist 2024-09-02 22:14:26 +08:00
652f0b12bc
home(gnome): add some gnome-specific theming 2024-08-31 21:25:47 +08:00
a6dd68f8a5
flake: bump inputs 2024-08-28 22:15:58 +08:00
8f1a36e5fd
spec(reimaden): disable unsandboxed minecraft 2024-08-18 13:33:29 +08:00
f13ed41136
global(io): udisks ignore zvols 2024-08-17 20:08:25 +08:00
a01fb0a0f9
global(fs): add zfs option 2024-08-17 20:08:02 +08:00
e6563a0e05
spec(reimaden): enable gnome 2024-08-17 20:07:47 +08:00
8187f235eb
home(gnome): add extensions 2024-08-15 20:50:14 +08:00
e365e4ed96
home(gnome): disable d2p multi-monitor 2024-08-15 18:26:59 +08:00
4f0eda0fc4
flake: bump inputs 2024-08-13 10:10:58 +08:00
da1b58909a
home(util): remove persist unnecessary for flatpak 2024-08-07 23:01:06 +08:00
f7ffabb48d
global(flatpak): add var persist 2024-08-07 22:49:43 +08:00
e5fbf705c6
home(gnome): set power profile toggle 2024-08-04 17:20:50 +08:00
4fe4cf8757
home(gnome): add more shortcuts 2024-08-04 13:05:00 +08:00
83f33645f8
flake: bump inputs 2024-08-04 12:28:13 +08:00
d6d250286d
spec(hakugyokurou): enable android 2024-08-04 12:27:11 +08:00
9d62794bb3
home(gnome): add more shortcuts 2024-08-03 18:02:17 +08:00
c3246bb3b6
home(gnome): improve gtk3 theme consistency 2024-07-30 18:51:45 +08:00
9b207e7aeb
home(gnome): add some gnome-specific theming 2024-07-30 18:45:20 +08:00
ed6bae2708
home(gnome): move applications to flatpak 2024-07-29 23:44:44 +08:00
7eb8a922ce
spec(hakugyokurou): set plymouth scale 2024-07-29 20:01:06 +08:00
3a64a42cd1
home(gnome): disable theme 2024-07-29 19:56:16 +08:00
e893a78285
home(gnome): enable flatpak by default 2024-07-29 15:40:59 +08:00
7276b2fa08
global(flatpak): add portals and persist 2024-07-29 15:40:41 +08:00
f1ed625154
spec(hakugyokurou): enable gnome 2024-07-29 14:43:01 +08:00
32a31bea83
home(gnome): update gtk theme names 2024-07-29 14:19:20 +08:00
c5aa86759c
flake: bump inputs 2024-07-28 16:06:12 +08:00
9f014d09e2
spec(koumakyou): set cursor theme 2024-07-27 23:05:13 +08:00
7281bdef4f
spec(hakugyokurou): correct Xwayland scale value 2024-07-27 23:03:53 +08:00
6d4c9829c3
spec(hakugyokurou): initial configuration 2024-07-27 18:18:35 +08:00
c786e789fa
flake: bump inputs 2024-07-26 15:46:49 +08:00
b5bbc7ef09
home(catppuccin): enable catppuccin module even without gui 2024-07-21 16:37:39 +08:00
d80386ea4d
package(expresslrs-configurator): bump expresslrs-configurator 1.6.1 to 1.7.2 2024-07-21 10:59:09 +08:00
c8be72dd46
package(photoview): bump photoview 2.3.13 to 2.4.0 2024-07-21 10:54:14 +08:00
bd41faae8b
spec(chireiden): disable catppuccin for plymouth 2024-07-18 17:36:44 +08:00
7a8933d47b
home(catppuccin): add i3status colours 2024-07-18 17:36:24 +08:00
1c4253e567
spec(shinkirou): specialise plasma 2024-07-18 17:06:03 +08:00
2b38dc4e30
flake: bump inputs 2024-07-18 11:01:19 +08:00
bf7d975b5a
global(gpu): enable 32-bit drivers 2024-07-13 21:34:25 +08:00
d2f0e23f5b
home(catppuccin): fix gtk theme name again 2024-07-13 21:05:28 +08:00
ff9dd2375e
package(tubesync): temporarily allow obsolete dependency 2024-07-12 23:42:33 +08:00
e412a12732
home(catppuccin): set qt style 2024-07-12 19:41:43 +08:00
081e8af472
flake: bump inputs 2024-07-12 17:10:48 +08:00
03b183197c
spec(yume): enable lanzaboote 2024-07-12 17:10:40 +08:00
b3e92fd225
global(gui): add nvidia options 2024-06-24 20:28:49 +08:00
3d837e99d6
global(io): switch audio system to pipewire 2024-06-24 18:22:30 +08:00
b14131d588
flake: bump inputs 2024-06-24 16:32:20 +08:00
0140acc343
home(vscode): update vscode color theme 2024-06-24 10:04:43 +08:00
d4bde1c06f
flake: bump inputs 2024-06-24 09:56:37 +08:00
be1bbeb4d0
home(gui): switch to catppuccin module 2024-06-24 09:56:31 +08:00
275f6a8d7f
spec(koumakyou): set max-performance on power disconnect 2024-06-13 08:56:50 +08:00
981c3bea9b
spec(koumakyou): clean up jovian config 2024-06-11 11:53:49 +08:00
ac9a6c6b8f
spec(koumakyou): enable jetbrains defaults 2024-06-11 08:24:40 +08:00
5943766d57
spec(koumakyou): add gamemode and enable decky 2024-06-10 17:08:44 +08:00
176588d7cc
flake: bump inputs 2024-06-10 10:11:39 +08:00
7a4a0932e8
spec(eientei): remove minecraft reverse proxy 2024-06-03 16:03:15 +08:00
5055d4117c
spec(eientei): add minecraft services 2024-06-03 11:05:58 +08:00
0cc811e6f8
flake: bump inputs 2024-06-02 23:01:58 +08:00
6a0c997262
global(fs): make syncoid delete target snapshots 2024-06-02 22:19:21 +08:00
5e71d46e7e
spec(koumakyou): minecraft retain app user 2024-05-31 14:01:32 +08:00
f9a3d4c3c4
home(minecraft): make username configurable 2024-05-31 14:00:52 +08:00
37265c1c34
home(minecraft): check gui condition in home 2024-05-31 11:20:56 +08:00
97a3cbff7f
home: crop koishi profile pictures 2024-05-31 11:12:26 +08:00
3d54c40ff6
home(minecraft): run minecraft under dedicated user 2024-05-31 11:09:20 +08:00
82cc764936
home: improve profile pictures 2024-05-31 11:08:29 +08:00
732674c139
package(tubesync): temporarily allow obsolete dependency 2024-05-30 17:21:41 +08:00
4f2a5dccce
spec(shinkirou): add mouse natural scrolling 2024-05-30 17:19:18 +08:00
a116dcb394
spec(shinkirou): use plasma by default 2024-05-30 17:18:26 +08:00
0511bdd138
flake: bump inputs 2024-05-29 16:10:21 +08:00
c06facfd2c
flake: bump inputs 2024-05-25 16:03:26 +08:00
c22496ac27
flake: bump inputs 2024-05-22 22:10:13 +08:00
2d3052f6eb
spec(koumakyou): add kodi 2024-05-22 22:10:06 +08:00
333d8b59dc
spec(koumakyou): set console font 2024-05-22 21:11:06 +08:00
c59e1b0045
home(jetbrains): add go compiler 2024-05-20 09:18:26 +08:00
4444d3fec5
spec(focus): nextcloud 28 -> 29 2024-05-20 09:01:46 +08:00
3425bdde80
spec(focus): add nextcloud maintenance window 2024-05-20 09:00:57 +08:00
48135d0dcd
spec(eientei): add nextcloud maintenance window 2024-05-20 08:59:26 +08:00
ea6784b59b
spec(eientei): nextcloud 28 -> 29 2024-05-20 08:34:37 +08:00
f2a37dfa7c
flake: bump inputs 2024-05-18 21:57:57 +08:00
b0d714eafc
flake: bump inputs 2024-05-14 20:10:30 +08:00
a62d0a512f
spec(yume): disable autolock 2024-05-14 20:03:10 +08:00
ec3358e67a
spec(koumakyou): disable autolock 2024-05-14 20:02:58 +08:00
f27e47039b
home: fix profile icon installation 2024-05-14 19:59:29 +08:00
6150bd5e39
spec(yume): enable plasma 2024-05-14 17:31:05 +08:00
5bb1efbcee
home(plasma): fix wallet persist 2024-05-14 17:29:54 +08:00
dc5e799c0b
spec(koumakyou): allow network management and xwayland scale 2024-05-14 12:14:35 +08:00
8111d62ab0
home(plasma): persist wallet 2024-05-14 12:14:12 +08:00
6b6988a289
spec(shinkirou): add Xwayland scale 2024-05-14 11:40:47 +08:00
bdb3915c6d
home(plasma): do not back up gtkrc-2.0 2024-05-14 11:40:32 +08:00
bfa51535b9
home(plasma): persist display output config 2024-05-14 11:26:39 +08:00
4a27adcb1f
spec(shinkirou): configure plasma inputs 2024-05-14 11:21:11 +08:00
941d02a794
home(plasma): disable home-manager cursor and unify image 2024-05-14 11:20:51 +08:00
0ad6c02562
global(io): reduce firewall spam 2024-05-14 10:48:16 +08:00
a8f489f5b9
spec(shinkirou): enable plasma specialisation 2024-05-14 10:21:10 +08:00
6d98f27b86
spec(reimaden): enable plasma specialisation 2024-05-14 10:20:58 +08:00
6af5baf6d9
home(plasma): add specialise option 2024-05-14 10:20:46 +08:00
e9a9e280d0
home(plasma): set wallpaper 2024-05-13 11:39:48 +08:00
1aab576939
spec(koumakyou): add plasma session 2024-05-13 09:43:33 +08:00
4884b88a5f
spec(reimaden): add plasma specialisation 2024-05-13 09:23:43 +08:00
492bfd5fb0
home(plasma): enable home-manager auto replace 2024-05-13 09:16:06 +08:00
30016b2445
home(gui): set catppuccin iconTheme name 2024-05-13 09:15:41 +08:00
873e77860e
flake: bump inputs 2024-05-13 08:56:11 +08:00
488114466f
home(plasma): add plasma-manager 2024-05-13 08:55:58 +08:00
7be8a330c9
home(gui): cleaner defaults 2024-05-13 08:38:38 +08:00
90deb57cb3
flake: bump inputs 2024-05-11 10:30:26 +08:00
84002e7dd9
home(foot): disable terminal transparency 2024-05-11 10:30:20 +08:00
b8b98ad548
spec(koumakyou): boot to gamescope 2024-05-11 00:03:05 +08:00
559b9c1eb7
spec(koumakyou): disable decky 2024-05-08 15:22:12 +08:00
9e1271dd14
flake: bump inputs 2024-05-05 23:13:53 +08:00
facc85b09b
spec(yume): enable jetbrains defaults 2024-05-05 20:52:07 +08:00
18e61bbcf4
spec(koumakyou): remove steamos cmdline 2024-05-01 01:48:58 +08:00
3b6418bd20
flake: bump inputs 2024-04-30 19:50:42 +08:00
96e776949a
spec(koumakyou): init 2024-04-29 22:36:32 +08:00
f3869d8abd
spec(reimaden): enable jetbrains defaults 2024-04-28 11:00:10 +08:00
240fb89b1d
home(jetbrains): add jetbrains products and directories 2024-04-28 10:58:54 +08:00
90209b3867
flake: bump inputs 2024-04-28 09:36:26 +08:00
6aa1e3c1c6
home(util): add jellyfin-media-player 2024-04-22 15:59:18 +08:00
ff9d6a8acd
flake: bump inputs 2024-04-22 12:54:50 +08:00
be30686a57
spec(reimaden): disable headless due to scaling bugs 2024-04-19 09:27:33 +08:00
c46fd6837f
home(foot): enable terminal transparency 2024-04-19 09:24:37 +08:00
ad85dbfd14
flake: bump inputs 2024-04-19 08:15:03 +08:00
9e783cd128
flake: bump inputs 2024-04-15 10:33:03 +08:00
99e91f5320
spec(focus): update proxy address 2024-04-11 15:15:55 +08:00
4f632814a3
global(io): add compat to hosts 2024-04-11 14:44:32 +08:00
a70d4d9b95
spec(chireiden): move trackpad workaround to powerManagement 2024-04-11 14:26:48 +08:00
ad4bd476ca
spec(eientei): disable vaultwarden registration 2024-04-09 12:17:05 +08:00
58849f1595
flake: bump inputs 2024-04-08 22:25:06 +08:00
02ade08d1b
spec(eientei): add webauthn nextcloud app 2024-04-08 11:26:41 +08:00
075e381415
spec(focus): add webauthn nextcloud app 2024-04-08 11:25:24 +08:00
e78ccd21c8
home(auth): float Bitwarden windows 2024-04-08 11:24:37 +08:00
4e63944fa4
flake: bump inputs 2024-04-04 11:55:17 +08:00
0ac8b06d6d
spec(web): add home redirects 2024-04-01 11:00:44 +08:00
ad96cbe41d
home(auth): fix allowed_signers file generation 2024-04-01 08:30:50 +08:00
08b885dc00
spec(reimaden): enable headless 2024-04-01 08:27:09 +08:00
e0001419bb
home(headless): add headless module 2024-04-01 08:26:47 +08:00
71dd1b4d4b
global(auth): add utility port to firewall allow 2024-04-01 08:07:29 +08:00
ef34c9be61
global(auth): translate key list 2024-03-30 14:09:52 +08:00
1a5d9fa1f6
global(io): update redir address 2024-03-30 14:01:48 +08:00
5d31abeab7
spec(focus): update proxy address 2024-03-29 21:47:16 +08:00
dfd918d702
global(gpu): remove i915 from initrd when arc is set 2024-03-29 11:02:13 +08:00
0fd770ae5c
global(io): add netvm to hosts 2024-03-29 10:33:23 +08:00
d67b541fe8
global(io): add net-priv hosts 2024-03-29 10:29:57 +08:00
2dfe6dc4c8
flake: compact input lines 2024-03-28 08:37:04 +08:00
2934d0bf66
repo: update gitignore 2024-03-28 08:13:19 +08:00
f55b98cb52
flake: bump inputs 2024-03-28 08:01:16 +08:00
a116e4c05c
package(tubesync): bump tubesync 0.13.3 to 0.13.6 2024-03-26 08:57:36 +08:00
2f548cab7d
global(fs): add ability to customise curl args in alert 2024-03-25 13:15:25 +08:00
d35c33b511
spec(focus): enable zfs alerts 2024-03-25 12:46:45 +08:00
bf00772c68
spec(eientei): enable zfs alerts 2024-03-25 12:32:01 +08:00
efcc203c83
global(fs): add zfs alerts 2024-03-25 12:31:50 +08:00
7f8ae8bbcf
home(util): add sedutil 2024-03-25 09:36:56 +08:00
a2afa8890b
global(virtualbox): add kvm virtualbox host 2024-03-24 11:10:09 +08:00
7745b34cc4
package(tubesync): patch ffmpeg 2024-03-21 17:11:58 +08:00
901ed845b3
package(tubesync): patch yt-dlp options to print newlines as progress 2024-03-21 09:06:23 +08:00
213b253726
flake: bump inputs 2024-03-21 08:30:13 +08:00
b9c5fa9b06
spec(eientei): set zfs_arc_max 2024-03-21 08:14:58 +08:00
8a6730dd77
spec(eientei): enable vaultwarden 2024-03-19 09:50:08 +08:00
6507d0acbc
spec(eientei): fix frigate firewall interface names 2024-03-19 09:05:57 +08:00
a5dee5ed9c
home(auth): add ssh ports 2024-03-19 08:56:21 +08:00
282cf55e5c
spec(eientei): proxy matrix health endpoint 2024-03-18 11:46:47 +08:00
6ea244fb96
spec(web): enable uptime-kuma 2024-03-18 11:09:56 +08:00
b0152ce107
home(gyroflow): move package to module 2024-03-18 09:38:16 +08:00
91fb077069
package(tubesync): patch yt-dlp options to disable continue 2024-03-14 18:51:59 +08:00
4b39e7e664
spec(eientei): fix photoprism persistence path 2024-03-14 17:41:14 +08:00
6416ffd950
global(fs): ensure /var/lib/private mode 2024-03-14 17:40:56 +08:00
0aad597200
spec(eientei): enable photoview 2024-03-14 10:47:46 +08:00
40a26b5bfa
flake: bump inputs 2024-03-14 10:46:52 +08:00
1067c27fad
package(tubesync): patch yt-dlp options to ensure integrity 2024-03-14 10:06:54 +08:00
9f055cbe9b
global(libvirt): add virtiofsd to environment 2024-03-11 21:39:46 +08:00
08f9f5b378
flake: bump inputs 2024-03-11 15:08:00 +08:00
b874e6daa3
spec(eientei): photoprism update path 2024-03-10 15:04:33 +08:00
5380730975
home(sway): redirect output to file 2024-03-08 19:33:02 +08:00
c8406e885d
spec(eientei): photoprism switch to vaapi hwaccel 2024-03-07 21:54:15 +08:00
b8e0f5539c
spec(eientei): photoprism remove limits 2024-03-07 08:53:58 +08:00
f896c02f36
spec(eientei): photoprism use intel hwaccel 2024-03-07 08:49:53 +08:00
e9cbbaf0a9
spec(eientei): enable photoprism 2024-03-07 08:39:56 +08:00
ad44305e6e
spec(eientei): disable photoview 2024-03-07 07:58:42 +08:00
0a7af7becd
home(gyroflow): add qtwayland 2024-03-06 14:03:08 +08:00
cf907bff6d
home(chrome): add ozone wayland environment variable 2024-03-06 13:48:49 +08:00
f562c9766b
spec(shinkirou): scale login screen 2024-03-06 10:26:31 +08:00
27dc6d1757
flake: bump inputs 2024-03-06 09:09:06 +08:00
385f43f1fe
spec(eientei): enable photoview 2024-03-05 09:39:03 +08:00
ab7931b3fe
spec(chireiden): enable libreoffice 2024-03-05 07:52:44 +08:00
7eeda0fca6
global(fs): switch default zfs kernel to lts 2024-03-04 21:31:34 +08:00
718979ff61
spec(shinkirou): initial configuration 2024-03-04 21:28:16 +08:00
849b6c4f3b
package(photoview): add nixos module 2024-03-04 12:14:05 +08:00
adb0e1a330
package(photoview): install model data, add ui build info 2024-03-04 12:07:20 +08:00
15f824ba94
package(photoview): package photoview 2024-03-04 09:26:16 +08:00
00f8ca527a
flake: bump inputs 2024-03-03 21:37:51 +08:00
537f29525c
spec(focus): enable zfs replication 2024-03-03 15:04:49 +08:00
3b6dee974e
global(fs): add zfs replication custom ssh port 2024-03-03 15:04:33 +08:00
1e1076d930
flake: bump inputs 2024-03-02 18:20:40 +08:00
87fc96bb9d
spec(focus): increase fastcgi read timeout 2024-02-28 08:57:47 +08:00
59b7fc7eef
spec(web): about: update link to server spec 2024-02-24 22:09:39 +08:00
5fb160483d
spec(web): convert to bundlerEnv 2024-02-24 17:19:50 +08:00
60d387c32a
home: add test password for koishi in vmVariant 2024-02-24 15:35:03 +08:00
d1c1edacbc
flake: bump inputs 2024-02-24 15:08:45 +08:00
96839ecfa8
package(tubesync): add tools called by yt-dlp to PATH 2024-02-23 10:45:54 +08:00
a1bdfa19a1
package(tubesync): add worker option 2024-02-22 11:24:59 +08:00
bbd7decb24
package(tubesync): remove umask 2024-02-22 00:45:35 +08:00
3fdf9e5b48
spec(eientei): enable tubesync 2024-02-22 00:45:24 +08:00
120af7cd51
package(tubesync): allow redis access to run directory 2024-02-22 00:01:25 +08:00
70800a4459
package(tubesync): create run directory pre-startup 2024-02-21 23:36:27 +08:00
33c5ac3a72
package(tubesync): add tubesync application and module 2024-02-21 23:25:06 +08:00
a514fbbae5
package: add nixos module imports 2024-02-21 21:53:08 +08:00
01ce5b2957
spec(eientei): change replication user 2024-02-19 15:19:22 +08:00
12d3d60a04
global(fs): remove replication compress flag 2024-02-19 15:19:11 +08:00
12d6afe744
home(gui): improve catppuccin terminal visibility 2024-02-19 13:58:55 +08:00
f60db03d92
spec(eientei): enable gpu drivers 2024-02-19 12:55:37 +08:00
284de5afc8
global(gpu): add session checks for session-specific options 2024-02-19 12:55:23 +08:00
2134dd8d78
spec(eientei): add jellyfin packages 2024-02-19 12:36:44 +08:00
1aea486c65
home(btop): add btop and catppuccin colours 2024-02-18 21:48:47 +08:00
304879578b
spec(eientei): add jellyfin 2024-02-18 19:08:27 +08:00
333cd3746e
spec(eientei): move hass nginx configuration 2024-02-18 18:41:27 +08:00
cf49486c17
spec(focus): enable netdata dashboard 2024-02-18 17:59:23 +08:00
51546f454b
spec(focus): remove grafana dashboard 2024-02-18 17:59:13 +08:00
da4a8191ac
global(netdata): add netdata module and nginx wrapper 2024-02-18 17:36:49 +08:00
dedfebef5d
flake: bump inputs 2024-02-18 12:49:39 +08:00
b3d91c4725
spec(eientei): add hass deps 2024-02-17 23:52:50 +08:00
04e4621fc6
spec(incinerator): unlock initrd emergency access 2024-02-15 17:20:28 +08:00
3aa4d1b598
home(gui): add catppuccin icons 2024-02-15 12:30:07 +08:00
8fbad5628d
home(swayidle): fix idle commands 2024-02-14 16:47:30 +08:00
a27bfa50d4
home(swayidle): set up idle behaviour 2024-02-14 15:38:19 +08:00
0f8eaf7550
home(gui): theme mako 2024-02-14 14:47:48 +08:00
964b464524
home(gui): fix catppuccin palette 2024-02-14 14:40:48 +08:00
3ebd342ebd
home(swaylock): isolate from sway 2024-02-14 13:04:17 +08:00
18289ff4d9
home(sway): switch to swaylock-effects 2024-02-14 12:33:51 +08:00
a23ec8f250
spec(reimaden): add platform support kernel module 2024-02-14 03:23:48 +08:00
1c95aba389
home(gui): add flake background 2024-02-13 11:55:39 +08:00
b355c65d4e
home(sway): set default workspace 2024-02-13 11:26:48 +08:00
cc6801df43
flake: bump inputs 2024-02-13 00:42:30 +08:00
a7b3833cd1
spec(chireiden): enable vscode 2024-02-12 23:30:56 +08:00
12ea5b63b5
spec(reimaden): enable vscode 2024-02-12 23:30:11 +08:00
a02a476d33
home(vscode): add vscodium and extensions 2024-02-12 23:29:13 +08:00
d8811132d6
home(gui): theme sway with catppuccin 2024-02-12 19:25:55 +08:00
656fc846c8
home(gui): add catppuccin gtk and cursor themes 2024-02-12 17:40:58 +08:00
a81d5b9aa6
global(gpu): greetd settings priority 2024-02-12 17:33:12 +08:00
17c740811e
spec(koumakyou): enable gnome 2024-02-12 15:18:12 +08:00
e4f32a4134
home(gnome): move desktop backgrounds to share directory 2024-02-12 15:17:57 +08:00
ecc7a4714a
home: add networkmanager as an adminGroup 2024-02-10 05:48:08 +08:00
3821d76886
spec(eientei): remove proxy configuration 2024-02-10 05:47:40 +08:00
a21a193ade
spec(eientei): convert to global zfs replication 2024-02-10 01:03:54 +08:00
a208e637c8
global(fs): fix permission fix 2024-02-10 01:03:36 +08:00
8a485d4b7d
global(fs): add zfs replication options 2024-02-10 00:57:35 +08:00
5aecdd310c
spec(focus): convert to global split zfs 2024-02-10 00:32:16 +08:00
7c4b09c47b
spec(eientei): convert to global split zfs 2024-02-10 00:23:47 +08:00
6aa34ff975
global(fs): add missing fs options 2024-02-10 00:20:43 +08:00
7d6e768362
global(fs): add zfs split store options 2024-02-10 00:16:09 +08:00
7c3ee6e7bc
flake: bump inputs 2024-02-09 22:25:17 +08:00
1393359d48
spec(chireiden): add trackpad driver workaround 2024-02-09 22:25:08 +08:00
44ee0bc874
spec(eientei): add replication service 2024-02-09 19:48:11 +08:00
1db1382543
home(util): add serial client and mbuffer 2024-02-09 12:40:02 +08:00
8261ac62d3
spec(eientei): add sas driver 2024-02-07 22:32:42 +08:00
c25273cb69
flake: bump inputs 2024-02-06 09:34:05 +08:00
22c0922a29
flake: bump inputs 2024-02-05 14:23:14 +08:00
129827a242
spec(focus): enable boot-time memory test 2024-02-05 14:17:10 +08:00
05985b10e6
spec(focus): pin network interfaces 2024-02-04 22:17:38 +08:00
58c2746dd1
global(boot): add memtest option 2024-02-04 22:17:19 +08:00
99912496cb
spec(focus): update nextcloud options 2024-02-03 22:29:38 +08:00
97ebdd0cc2
spec(focus): fix proxy 2024-02-03 21:47:35 +08:00
8b41e01d20
spec(eientei): correct forgejo ssh port 2024-02-02 09:31:15 +08:00
b25e54de11
spec(eientei): add home-assistant mqtt 2024-02-02 09:15:35 +08:00
4107f688cc
spec(eientei): add home-assistant 2024-02-02 09:13:18 +08:00
31c35d9518
flake: bump inputs 2024-02-02 07:33:59 +08:00
ccf5947d9a
global(oci): add system-wide persistence 2024-02-02 07:33:48 +08:00
b36c19a6a8
spec(eientei): fix proxy 2024-02-02 07:33:30 +08:00
c9ed48c1f8
spec(eientei): add frigate 2024-02-02 07:33:17 +08:00
d7fd03ef30
spec(eientei): fix noProxy 2024-02-02 05:13:13 +08:00
482c98379a
spec(eientei): migrate library configuration 2024-02-02 04:39:50 +08:00
2105089b3d
spec(eientei): add proxy configuration 2024-02-02 01:59:11 +08:00
0270062bcf
spec(eientei): initial configuration 2024-02-01 17:27:06 +08:00
41d0d3b6d4
spec(reimaden): rename public key 2024-02-01 17:24:23 +08:00
06bbb1d8d6
flake: bump inputs 2024-01-31 11:47:30 +08:00
4f0e84f04a
spec(reimaden): rename from eientei 2024-01-31 11:45:26 +08:00
c849838e4e
spec(focus): add grafana dashboard 2024-01-29 17:44:41 +08:00
12c8f44c50
spec(focus): rename ethernet via hw address 2024-01-29 17:44:01 +08:00
4e55056a55
home(gnome): enable tap to click, add terminal themes 2024-01-29 01:13:23 +08:00
991fc3194c
home(gnome): disable workspace indicator and install gnome-terminal 2024-01-29 00:48:19 +08:00
87d9375d60
home(gnome): configure gnome user experience 2024-01-29 00:20:21 +08:00
e819ca42d0
home: add profile pictures 2024-01-29 00:19:57 +08:00
13d5891b73
spec(incinerator): remove unnecessary configuration 2024-01-28 16:52:19 +08:00
ac05e58a5d
home(gnome): add gnome desktop 2024-01-28 16:51:53 +08:00
6d16a28797
home(plasma): remove plasma desktop 2024-01-28 16:38:17 +08:00
7d33cc1837
home(gui): disable hm qt config for plasma since it breaks the wayland session 2024-01-28 11:25:17 +08:00
678a181f53
home(plasma): add plasma desktop 2024-01-28 11:24:48 +08:00
af3038ac2d
global(io): betaflight default follow gui 2024-01-28 10:38:51 +08:00
9408adce23
home(gui): switch to papirus icon theme 2024-01-28 10:38:29 +08:00
9a46553e58
home(util): separate BLHeliSuite32 state workaround from dist and add per-user state dir 2024-01-27 22:47:32 +08:00
665d0a3d7d
global(gpu): rename from gui 2024-01-27 22:14:03 +08:00
cdf4b29004
spec(focus): set default nextcloud language 2024-01-27 15:41:25 +08:00
dd1ac2568c
flake: bump inputs 2024-01-27 09:58:08 +08:00
ab9a3260fe
spec(focus): enable nextcloud 2024-01-27 09:56:24 +08:00
5b527c5633
spec(focus): configure nginx 2024-01-27 09:56:16 +08:00
2e5de2ff1a
spec(focus): enable postgresql 2024-01-27 09:55:46 +08:00
663b215efb
spec(focus): enable libvirt and acme 2024-01-27 09:55:36 +08:00
738938eef2
spec(focus): initial configuration 2024-01-26 13:59:24 +08:00
f5c3f8a474
global(fs): add bcachefs 2024-01-24 08:59:12 +08:00
03d6319a07
global(kernel): lower priority of default kernel to below mkDefault 2024-01-24 08:38:04 +08:00
0dcf1809a7
global(fs): adjust zfs kernelPackages priority 2024-01-24 08:34:07 +08:00
46de50c5f9
spec(incinerator): remove postgresql 2024-01-24 08:31:59 +08:00
cda83a2900
global(fs): remove btrfs 2024-01-24 08:28:48 +08:00
f7f4166b22
home(virt-manager): add sway window commands 2024-01-22 11:32:00 +08:00
0d9b776e48
home(sway): remove vanity options 2024-01-21 20:48:59 +08:00
29701eabbc
global(fs): add zfs external nix store 2024-01-21 20:44:12 +08:00
fa24626bcc
global(fs): extPersist -> external 2024-01-21 20:43:50 +08:00
7156cbf218
home(gui): enable blueman 2024-01-20 14:20:32 +08:00
ad12c67ecc
spec(library): add noatime option 2024-01-20 12:47:00 +08:00
fa3a0aac78
flake: bump inputs 2024-01-20 12:36:48 +08:00
0e42364f54
global(fs): add noatime option 2024-01-20 12:35:48 +08:00
c8c6f4ef08
global(gui): add pure nvidia flicker workaround 2024-01-19 21:59:46 +08:00
048f37e680
global(gui): add pure nvidia workarounds 2024-01-19 21:25:03 +08:00
fc92715669
spec(yume): initial configuration 2024-01-19 21:23:31 +08:00
8567134eaf
global(auth): remove diag key 2024-01-19 15:50:50 +08:00
c6c51ec945
flake: bump inputs 2024-01-19 15:48:24 +08:00
ec76e6eb4b
spec(web): add nginx redirect 2024-01-19 15:47:39 +08:00
fa890e6216
home(util): add dnsutils and whois 2024-01-19 10:54:55 +08:00
32d4ea7fbd
global(gui): remove withArcFull specialisation since it had no use case 2024-01-17 21:39:34 +08:00
3328617756
spec(web): enable minimum utils 2024-01-17 19:33:01 +08:00
db1eca894b
home(util): add minimal system option 2024-01-17 19:31:56 +08:00
f3d30cf12c
spec(web): update deps 2024-01-17 18:58:15 +08:00
e42600c8e4
spec(web): set mastodon url 2024-01-17 18:32:51 +08:00
ab7e02ff36
home(sway): add --unsupported-gpu conditionally 2024-01-16 17:30:12 +08:00
357192ab7b
home(minecraft): add floating window rules 2024-01-16 14:23:33 +08:00
e2356f2a93
home(steam): add floating window rules 2024-01-16 14:23:25 +08:00
ae86673b02
home(util): add floating window rules 2024-01-16 14:16:35 +08:00
4a737e56eb
home(util): add ExpressLRS Configurator persistence 2024-01-16 12:12:57 +08:00
cd5f3d7e2d
home(util): add nvme-cli 2024-01-16 11:59:49 +08:00
708bb4a30a
package: deprecate home-grown gyroflow package in favour of nixpkgs 2024-01-15 22:29:23 +08:00
2e7e14132c
package: migrate gyroflow, expresslrs-configurator and blhelisuite32 2024-01-15 22:22:30 +08:00
5ec8fc4087
spec(chireiden): change default frequency governor to powersave 2024-01-15 19:02:18 +08:00
4e3a88bbb3
home(util): add BLHeliSuite32 desktop item and icon from MacOS app 2024-01-15 18:57:35 +08:00
bc6bbb9183
flake: bump inputs 2024-01-15 17:44:39 +08:00
020dcfc00b
spec(web): about: open gitea links in blank pages and improve wording of prompt tip 2024-01-15 17:15:39 +08:00
31305938fc
spec(library): enable acme 2024-01-15 17:13:03 +08:00
f76abd77a8
spec(web): post: BLHeli32 ESC Startup Music 2024-01-15 17:06:11 +08:00
6341bf77f8
feat(web): add nginx configuration 2024-01-15 16:56:47 +08:00
022b3f501e
feat(web): enable acme 2024-01-15 15:57:40 +08:00
2054a0e8f6
feat(acme): add acme defaults 2024-01-15 15:57:25 +08:00
df6af87a34
feat(web): add jekyll website 2024-01-15 15:39:28 +08:00
b5ee62eba2
feat: add gimp 2024-01-15 11:19:38 +08:00
3022fb8429
fix(web): remove headless profile 2024-01-14 12:52:45 +08:00
36aed2ae95
feat(web): initial configuration 2024-01-14 12:41:57 +08:00
a00186edf5
feat(lowmem): add swap and trusted users 2024-01-14 12:41:39 +08:00
9908b7d2fc
refactor(library): remove redundant configuration 2024-01-13 19:38:54 +08:00
db4ebee2d9
fix(io): improve bluetooth/audio defaults 2024-01-13 19:38:39 +08:00
06e4712dd5
chore(flake): bump inputs 2024-01-13 16:14:43 +08:00
64d397e71d
feat(koumakyou): enable oci runtime 2024-01-12 19:33:39 +08:00
3ea2753de1
feat: add ExpressLRS configurator 2024-01-12 19:24:57 +08:00
fdef44f40b
build: remove stdenvNoCC from BLHeliSuite32 2024-01-12 19:24:39 +08:00
ec833028c6
fix: link BLHeliSuite32 music directory 2024-01-12 18:05:03 +08:00
47ff3beb7c
feat: add BLHeliSuite32 2024-01-12 17:50:48 +08:00
358724e9f8
fix(gyroflow): change mdk-sdk pname 2024-01-12 17:46:47 +08:00
dd8b7593c3
fix(incinerator): switch to ext4 2024-01-11 15:57:39 +08:00
cb500a1b58
feat(library): disable act_runner host 2024-01-11 14:34:42 +08:00
bc6bb83552
feat(library): add act_runner instance 2024-01-11 14:29:06 +08:00
245865a1bb
fix(gui): fix type 2024-01-11 14:15:04 +08:00
4b0109366c
feat(library): enable oci runtime 2024-01-11 14:04:23 +08:00
71416ade51
fix(gui): add default null value to type 2024-01-11 14:03:36 +08:00
3544d30e74
feat(koumakyou): enable oci runtime 2024-01-11 14:03:17 +08:00
2692d18d88
feat(incinerator): enable oci runtime 2024-01-11 14:03:06 +08:00
3c3a26fe21
feat(oci): add podman runtime 2024-01-11 13:59:55 +08:00
58ff4b3373
fix(gyroflow): add enable check to persist 2024-01-11 13:26:49 +08:00
751b7634db
fix(fs): set kernel version when zfs is selected 2024-01-11 12:24:14 +08:00
ca67c4f0cc
build(gyroflow): remove redundant copy and vars 2024-01-11 12:22:52 +08:00
6273a69145
chore(flake): bump inputs 2024-01-11 11:44:09 +08:00
211d11c362
feat(gui): add withArcFull specialisation
Always-on offload.
2024-01-11 10:59:16 +08:00
cddc280ee7
feat(koumakyou): enable gyroflow 2024-01-11 10:52:22 +08:00
bfba32ae08
feat(eientei): enable gyroflow 2024-01-10 23:49:25 +08:00
3ecf498ef8
feat(gyroflow): add package and module 2024-01-10 23:49:00 +08:00
cf03d7b9c8
feat(gui): add intel icd 2024-01-10 23:37:33 +08:00
375f5bd297
fix(ui): add gtk theme engines 2024-01-10 23:37:17 +08:00
2d909f9880
feat: add file 2024-01-10 19:21:40 +08:00
51bcd60940
feat: add zip and unzip 2024-01-10 16:54:03 +08:00
d9fff38d20
fix: add nix-index persistence 2024-01-10 16:31:17 +08:00
1ba6f65227
feat: add nix-index 2024-01-10 15:58:27 +08:00
c167ad6c64
feat(eientei): enable libreoffice 2024-01-10 13:38:29 +08:00
0a99fabcee
feat(libreoffice): add libreoffice package 2024-01-10 13:38:13 +08:00
a8bc21e078
fix(gui): improve withArc specialisation 2024-01-09 19:11:05 +08:00
b4d9a7d6e7
feat(eientei): switch to powersave governor 2024-01-09 18:48:40 +08:00
7021e920fc
fix(foot): configure font 2024-01-09 17:46:33 +08:00
60236b1ffe
fix(libvirt): add zfs mountpoint 2024-01-09 17:02:15 +08:00
1a384eecc7
fix: map home persistence to zfs mountpoints 2024-01-09 16:48:49 +08:00
909643fde9
fix(fs): improve zfs mountpoint handling 2024-01-09 16:48:28 +08:00
e95362e277
fix(eientei): enable arc toggle 2024-01-09 15:02:59 +08:00
fe9378e830
feat(gui): add arc toggle specialisation 2024-01-09 15:02:40 +08:00
99d2637723
docs(fs): add zfs comment regarding pool creation 2024-01-09 14:50:30 +08:00
e386c1d49c
feat(eientei): initial configuration 2024-01-09 14:16:37 +08:00
6fc3379549
fix(app): isolate app user configuration 2024-01-09 14:10:05 +08:00
f274cc567d
feat(fs): add f2fs and zfs 2024-01-09 13:17:47 +08:00
0be0b07b99
chore(auth): add eientei public key 2024-01-09 13:12:50 +08:00
9fa89ccffd
fix(koumakyou): unique machine-id value
This has a duplicate template value.
2024-01-08 18:19:07 +08:00
c3b71a354c
fix(incinerator): unique machine-id value
This has a duplicate template value.
2024-01-08 18:18:53 +08:00
40d56808e5
feat(gui): nvidia prime iGPU specialisation
Add specialisation for disabling nvidia under a prime configuration.
2024-01-08 09:47:46 +08:00
b01142144e
refactor: rename global from faucet 2024-01-07 22:01:31 +08:00
4b12d60e44
feat(koumakyou): enable minecraft and steam 2024-01-07 21:52:20 +08:00
3b820992f2
feat(chireiden): enable app user 2024-01-07 21:51:53 +08:00
3067535474
feat(user): add app user capability 2024-01-07 21:51:34 +08:00
acddf28490
feat(minecraft): add app user capability 2024-01-07 21:51:12 +08:00
2426ce43f3
refactor(steam): port to home 2024-01-07 21:50:42 +08:00
6f489d47eb
perf(gui)!: switch to proprietary nvidia drivers 2024-01-07 18:00:10 +08:00
c5a92f8f84
fix(sway): source profile in sway wrapper 2024-01-07 16:14:53 +08:00
ed9c918873
fix(gui): unify qt theme 2024-01-07 14:47:25 +08:00
344dc2c5f3
feat(chireiden): enable power management 2024-01-07 14:09:44 +08:00
69856eb9db
feat(koumakyou): enable steam and power management 2024-01-07 13:58:45 +08:00
bd7009850a
feat(steam): add steam program and directories 2024-01-07 13:58:29 +08:00
3eeee0defa
fix(minecraft): add jdk8 package 2024-01-07 13:57:59 +08:00
856b3b044a
feat(library): add matrix and coturn service 2024-01-06 19:22:04 +08:00
f9bf3d339e
chore(flake): bump inputs 2024-01-06 17:40:14 +08:00
843548dfeb
feat(koumakyou): initial configuration 2024-01-05 22:27:04 +08:00
e761b63a17
fix(minecraft): add check to persistence 2024-01-05 22:26:34 +08:00
cc2b1a7125
feat(minecraft): add prism launcher 2024-01-05 22:24:55 +08:00
27349be332
feat(asusd): add asusd service 2024-01-05 22:24:35 +08:00
b606aa73b8
fix(gui): improve driver selection correctness 2024-01-05 22:23:41 +08:00
bb2eede8e6
fix(library): add allowed port 2024-01-05 20:47:25 +08:00
92a2f268f7
feat(chireiden): enable android tools 2024-01-05 18:02:07 +08:00
4016dd6632
feat(adb): add android tools 2024-01-05 18:00:51 +08:00
2bcdb70936
feat: add helpful packages 2024-01-05 13:40:16 +08:00
feb0cc6a32
feat(sway): bind pavucontrol 2024-01-05 10:59:21 +08:00
028ccd9244
feat(mpv): enable mpv and add va configuration 2024-01-05 09:26:49 +08:00
299fc276b7
fix(gui): configure video acceleration 2024-01-05 09:26:14 +08:00
889a56f6d0
fix(imv): add gui check 2024-01-05 09:11:07 +08:00
717304c3c4
feat(imv): enable imv 2024-01-05 09:10:01 +08:00
cb94c288bb
feat: add thunar 2024-01-05 09:08:15 +08:00
6b9be493bf
fix(incinerator): add lib 2024-01-05 08:46:03 +08:00
d1b3120349
feat(incinerator): add postgresql service 2024-01-05 08:44:41 +08:00
199 changed files with 7363 additions and 374 deletions

2
.gitignore vendored
View file

@ -1 +1,3 @@
result-*
result
repl-result-*

View file

@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICvi83M2V/DHUthDPzoiYgLhc8wlWNBFaBsYOWi115f4 diag

View file

@ -1,22 +0,0 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.faucet.fs;
in {
options.faucet.fs.btrfs = {
options = mkOption {
type = with types; listOf str;
default = [ "noatime" "compress=zstd" ];
description = "btrfs mount options";
};
};
config = mkIf (cfg.type == "btrfs") {
fileSystems."/nix" =
{ inherit (cfg.btrfs) options;
device = "/dev/disk/by-uuid/${cfg.store}";
fsType = "btrfs";
};
};
}

View file

@ -1,61 +0,0 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.faucet.gui;
in {
imports = [
./plymouth.nix
./greetd.nix
];
options.faucet.gui = {
enable = mkEnableOption "various setup required for GUI and support software";
session = mkEnableOption "software required for a graphical session" // { default = true; };
type = mkOption {
type = with types; enum [ "intel" "amdgpu" "nvidia" "prime" ];
description = "type of graphics acceleration used";
};
prime = {
integrated = mkOption {
type = with types; str;
default = "i915";
description = "integrated gpu driver";
};
};
};
config = mkIf cfg.enable {
hardware.opengl = {
enable = true;
driSupport = true;
driSupport32Bit = true;
};
services.xserver.videoDrivers =
optional ((cfg.type == "nvidia") || (cfg.type == "prime")) "nvidia" ++
optional (cfg.type == "amdgpu") "amdgpu";
# inhibits default display manager
services.xserver.displayManager.startx.enable = mkDefault true;
hardware.nvidia = mkIf ((cfg.type == "nvidia") || (cfg.type == "prime")) {
modesetting.enable = true;
nvidiaSettings = true;
prime = mkIf (cfg.type == "prime") {
offload = {
enable = true;
enableOffloadCmd = true;
};
};
powerManagement.enable = false;
powerManagement.finegrained = false;
open = true;
};
boot.initrd.kernelModules =
optional (cfg.type == "amdgpu") "amdgpu" ++
optional (cfg.type == "prime") cfg.prime.integrated;
};
}

View file

@ -1,23 +0,0 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.faucet.gui;
in mkIf (cfg.enable && cfg.session) {
programs.regreet = {
enable = true;
cageArgs = [ "-s" "-d" "-m" "last" ];
settings = {
background.path = ../../share/54345906_p0.jpg;
background.fit = "Fill";
GTK = {
application_prefer_dark_theme = true;
cursor_theme_name = "Bibata-Modern-Classic";
icon_theme_name = "WhiteSur-dark";
theme_name = "WhiteSur-Dark";
};
};
};
environment.persistence."/nix/persist/fhs".directories = [ "/var/cache/regreet" ];
}

View file

@ -1,13 +0,0 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.faucet.util;
in {
options.faucet.util = { };
config = {
programs.zsh.enable = true;
environment.shells = singleton pkgs.zsh;
};
}

204
flake.lock generated
View file

@ -1,30 +1,33 @@
{
"nodes": {
"catppuccin": {
"locked": {
"lastModified": 1734057772,
"narHash": "sha256-waF/2Y39JXJ4kG3zawmw1J1GxPHopyoOkJKJhfJ7RBs=",
"owner": "catppuccin",
"repo": "nix",
"rev": "20b6328df20ae45752c81311d225fd47cba32483",
"type": "github"
},
"original": {
"owner": "catppuccin",
"repo": "nix",
"type": "github"
}
},
"crane": {
"inputs": {
"flake-compat": [
"lanzaboote",
"flake-compat"
],
"flake-utils": [
"lanzaboote",
"flake-utils"
],
"nixpkgs": [
"lanzaboote",
"nixpkgs"
],
"rust-overlay": [
"lanzaboote",
"rust-overlay"
]
},
"locked": {
"lastModified": 1681177078,
"narHash": "sha256-ZNIjBDou2GOabcpctiQykEQVkI8BDwk7TyvlWlI4myE=",
"lastModified": 1717535930,
"narHash": "sha256-1hZ/txnbd/RmiBPNUs7i8UQw2N89uAK3UzrGAWdnFfU=",
"owner": "ipetkov",
"repo": "crane",
"rev": "0c9f468ff00576577d83f5019a66c557ede5acf6",
"rev": "55e7754ec31dac78980c8be45f8a28e80e370946",
"type": "github"
},
"original": {
@ -36,11 +39,11 @@
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1673956053,
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=",
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
@ -56,11 +59,11 @@
]
},
"locked": {
"lastModified": 1704152458,
"narHash": "sha256-DS+dGw7SKygIWf9w4eNBUZsK+4Ug27NwEWmn2tnbycg=",
"lastModified": 1733312601,
"narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "88a2cd8166694ba0b6cb374700799cec53aef527",
"rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github"
},
"original": {
@ -77,11 +80,11 @@
]
},
"locked": {
"lastModified": 1680392223,
"narHash": "sha256-n3g7QFr85lDODKt250rkZj2IFS3i4/8HBU2yKHO3tqw=",
"lastModified": 1717285511,
"narHash": "sha256-iKzJcpdXih14qYVcZ9QC9XuZYnPc6T8YImb6dX166kw=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "dcc36e45d054d7bb554c9cdab69093debd91a0b5",
"rev": "2a55567fcf15b1b1c7ed712a2c6fadaec7412ea8",
"type": "github"
},
"original": {
@ -95,11 +98,11 @@
"systems": "systems"
},
"locked": {
"lastModified": 1701680307,
"narHash": "sha256-kAuep2h5ajznlPMD9rnQyffWG8EM/C73lejGofXvdM8=",
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "4022d587cbbfd70fe950c1e2083a02621806a725",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@ -113,11 +116,11 @@
"systems": "systems_2"
},
"locked": {
"lastModified": 1681202837,
"narHash": "sha256-H+Rh19JDwRtpVPAWp64F+rlEtxUWBAQW28eAi3SRSzg=",
"lastModified": 1710146030,
"narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "cfacdce06f30d2b68473a46042957675eebb3401",
"rev": "b1d9ab70662946ef0850d488da1c9019f3a9752a",
"type": "github"
},
"original": {
@ -135,11 +138,11 @@
]
},
"locked": {
"lastModified": 1660459072,
"narHash": "sha256-8DFJjXG8zqoONA1vXtgeKXy68KdJL5UaXR8NtVMUbx8=",
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "a20de23b925fd8264fd7fad6454652e142fd7f73",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
@ -155,11 +158,11 @@
]
},
"locked": {
"lastModified": 1704383912,
"narHash": "sha256-Be7O73qoOj/z+4ZCgizdLlu+5BkVvO2KO299goZ9cW8=",
"lastModified": 1734093295,
"narHash": "sha256-hSwgGpcZtdDsk1dnzA0xj5cNaHgN9A99hRF/mxMtwS4=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "26b8adb300e50efceb51fff6859a1a6ba1ade4f7",
"rev": "66c5d8b62818ec4c1edb3e941f55ef78df8141a8",
"type": "github"
},
"original": {
@ -170,11 +173,11 @@
},
"impermanence": {
"locked": {
"lastModified": 1703656108,
"narHash": "sha256-hCSUqdFJKHHbER8Cenf5JRzjMlBjIdwdftGQsO0xoJs=",
"lastModified": 1731242966,
"narHash": "sha256-B3C3JLbGw0FtLSWCjBxU961gLNv+BOOBC6WvstKLYMw=",
"owner": "nix-community",
"repo": "impermanence",
"rev": "033643a45a4a920660ef91caa391fbffb14da466",
"rev": "3ed3f0eaae9fcc0a8331e77e9319c8a4abd8a71a",
"type": "github"
},
"original": {
@ -184,6 +187,25 @@
"type": "github"
}
},
"jovian": {
"inputs": {
"nix-github-actions": "nix-github-actions",
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1734162608,
"narHash": "sha256-m2AX+3eiVqIK6uO7GbGY7SFnkkYOlR5fQiNI0eRvWOQ=",
"owner": "Jovian-Experiments",
"repo": "Jovian-NixOS",
"rev": "31bdf4c7c91204d65afbde01146deee0259a8fb7",
"type": "github"
},
"original": {
"owner": "Jovian-Experiments",
"repo": "Jovian-NixOS",
"type": "github"
}
},
"lanzaboote": {
"inputs": {
"crane": "crane",
@ -197,27 +219,49 @@
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1682802423,
"narHash": "sha256-Fb5TeRTdvUlo/5Yi2d+FC8a6KoRLk2h1VE0/peMhWPs=",
"lastModified": 1718178907,
"narHash": "sha256-eSZyrQ9uoPB9iPQ8Y5H7gAmAgAvCw3InStmU3oEjqsE=",
"owner": "nix-community",
"repo": "lanzaboote",
"rev": "64b903ca87d18cef2752c19c098af275c6e51d63",
"rev": "b627ccd97d0159214cee5c7db1412b75e4be6086",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "v0.3.0",
"ref": "v0.4.1",
"repo": "lanzaboote",
"type": "github"
}
},
"nix-github-actions": {
"inputs": {
"nixpkgs": [
"jovian",
"nixpkgs"
]
},
"locked": {
"lastModified": 1729697500,
"narHash": "sha256-VFTWrbzDlZyFHHb1AlKRiD/qqCJIripXKiCSFS8fAOY=",
"owner": "zhaofengli",
"repo": "nix-github-actions",
"rev": "e418aeb728b6aa5ca8c5c71974e7159c2df1d8cf",
"type": "github"
},
"original": {
"owner": "zhaofengli",
"ref": "matrix-name",
"repo": "nix-github-actions",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1704194953,
"narHash": "sha256-RtDKd8Mynhe5CFnVT8s0/0yqtWFMM9LmCzXv/YKxnq4=",
"lastModified": 1733392399,
"narHash": "sha256-kEsTJTUQfQFIJOcLYFt/RvNxIK653ZkTBIs4DG+cBns=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "bd645e8668ec6612439a9ee7e71f7eac4099d4f6",
"rev": "d0797a04b81caeae77bcff10a9dde78bc17f5661",
"type": "github"
},
"original": {
@ -229,30 +273,65 @@
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1678872516,
"narHash": "sha256-/E1YwtMtFAu2KUQKV/1+KFuReYPANM2Rzehk84VxVoc=",
"lastModified": 1710695816,
"narHash": "sha256-3Eh7fhEID17pv9ZxrPwCLfqXnYP006RKzSs0JptsN84=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9b8e5abb18324c7fe9f07cb100c3cd4a29cda8b8",
"rev": "614b4613980a522ba49f0d194531beddbb7220d3",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-22.11",
"ref": "nixos-23.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1733940404,
"narHash": "sha256-Pj39hSoUA86ZePPF/UXiYHHM7hMIkios8TYG29kQT4g=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5d67ea6b4b63378b9c13be21e2ec9d1afc921713",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"plasma-manager": {
"inputs": {
"home-manager": [
"home-manager"
],
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1733858086,
"narHash": "sha256-h2BDIDKiqgMpA6E+mu0RgMGy3FeM6k+EuJ9xgOQ1+zw=",
"owner": "pjones",
"repo": "plasma-manager",
"rev": "7e2010249529931a3848054d5ff0dbf24675ab68",
"type": "github"
},
"original": {
"owner": "pjones",
"repo": "plasma-manager",
"type": "github"
}
},
"pre-commit-hooks-nix": {
"inputs": {
"flake-compat": [
"lanzaboote",
"flake-compat"
],
"flake-utils": [
"lanzaboote",
"flake-utils"
],
"gitignore": "gitignore",
"nixpkgs": [
"lanzaboote",
@ -261,11 +340,11 @@
"nixpkgs-stable": "nixpkgs-stable"
},
"locked": {
"lastModified": 1681413034,
"narHash": "sha256-/t7OjNQcNkeWeSq/CFLYVBfm+IEnkjoSm9iKvArnUUI=",
"lastModified": 1717664902,
"narHash": "sha256-7XfBuLULizXjXfBYy/VV+SpYMHreNRHk9nKMsm1bgb4=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"rev": "d3de8f69ca88fb6f8b09e5b598be5ac98d28ede5",
"rev": "cc4d466cb1254af050ff7bdf47f6d404a7c646d1",
"type": "github"
},
"original": {
@ -276,12 +355,15 @@
},
"root": {
"inputs": {
"catppuccin": "catppuccin",
"flake-parts": "flake-parts",
"flake-utils": "flake-utils",
"home-manager": "home-manager",
"impermanence": "impermanence",
"jovian": "jovian",
"lanzaboote": "lanzaboote",
"nixpkgs": "nixpkgs"
"nixpkgs": "nixpkgs_2",
"plasma-manager": "plasma-manager"
}
},
"rust-overlay": {
@ -296,11 +378,11 @@
]
},
"locked": {
"lastModified": 1682129965,
"narHash": "sha256-1KRPIorEL6pLpJR04FwAqqnt4Tzcm4MqD84yhlD+XSk=",
"lastModified": 1717813066,
"narHash": "sha256-wqbRwq3i7g5EHIui0bIi84mdqZ/It1AXBSLJ5tafD28=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "2c417c0460b788328220120c698630947547ee83",
"rev": "6dc3e45fe4aee36efeed24d64fc68b1f989d5465",
"type": "github"
},
"original": {

View file

@ -3,24 +3,21 @@
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
flake-utils.url = "github:numtide/flake-utils";
flake-parts = {
url = "github:hercules-ci/flake-parts";
inputs.nixpkgs-lib.follows = "nixpkgs";
};
flake-parts.url = "github:hercules-ci/flake-parts";
flake-parts.inputs.nixpkgs-lib.follows = "nixpkgs";
impermanence.url = "github:nix-community/impermanence/master";
home-manager.url = "github:nix-community/home-manager";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
plasma-manager.url = "github:pjones/plasma-manager";
plasma-manager.inputs.nixpkgs.follows = "nixpkgs";
plasma-manager.inputs.home-manager.follows = "home-manager";
catppuccin.url = "github:catppuccin/nix";
lanzaboote.url = "github:nix-community/lanzaboote/v0.4.1";
lanzaboote.inputs.nixpkgs.follows = "nixpkgs";
home-manager = {
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs";
};
lanzaboote = {
url = "github:nix-community/lanzaboote/v0.3.0";
inputs.nixpkgs.follows = "nixpkgs";
};
# steamdeck
jovian.url = "github:Jovian-Experiments/Jovian-NixOS";
};
outputs = inputs:

20
global/acme/default.nix Normal file
View file

@ -0,0 +1,20 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.acme;
in {
options.global.acme = {
enable = mkEnableOption "ACME SSL certificates";
};
config = mkIf cfg.enable {
security.acme = {
acceptTerms = true;
defaults.email = mkDefault "koishi@514fpv.one";
defaults.group = config.services.nginx.group;
};
environment.persistence."/nix/persist/fhs".directories = [ "/var/lib/acme" ];
};
}

View file

@ -0,0 +1,17 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.android;
in {
options.global.android = {
enable = mkEnableOption "android tools";
};
config = mkIf cfg.enable {
programs.adb.enable = true;
# allow device access by admin users
users.adminGroups = [ "adbusers" ];
};
}

18
global/asusd/default.nix Normal file
View file

@ -0,0 +1,18 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.asusd;
in {
options.global.asusd = {
enable = mkEnableOption "ASUS laptop userland support daemon";
};
config = mkIf cfg.enable {
services.asusd.enable = true;
environment.persistence."/nix/persist/fhs".directories = [
"/etc/asusd"
];
};
}

View file

@ -2,20 +2,22 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.auth;
cfg = config.global.auth;
pub = lib.pipe ./pub [
builtins.readDir
(lib.filterAttrs (n: ty: ty == "regular"))
(lib.mapAttrsToList (n: _: builtins.readFile ./pub/${n}))
(foldr (payload: keys: (splitString "\n" payload) ++ keys) [ ])
(foldr (candidate: keys: keys ++ (if candidate == "" then [ ] else [ candidate ])) [ ])
];
in {
options.faucet.auth = {
options.global.auth = {
enable = mkEnableOption "identity authentication in various software" // { default = true; };
openssh = {
enable = mkEnableOption "openssh server";
password = mkEnableOption "password authentication";
publicKeys = mkOption {
type = with types; listOf str;
type = with types; listOf singleLineStr;
default = pub;
description = "list of trusted openssh keys";
};
@ -40,7 +42,7 @@ in {
settings.PasswordAuthentication = cfg.openssh.password;
};
networking.firewall.allowedTCPPorts = [ ] ++
networking.firewall.allowedTCPPorts = [ 1300 ] ++ # utility port
optional (cfg.openssh.enable && (cfg.openssh.port != null)) cfg.openssh.port;
environment.persistence."/nix/persist/fhs".directories = [ ] ++

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJnhMCGSLMY+QldeCTaRovmfuzKdJsllQy9XinN2JU2z koishi@eientei

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHKCA0/6dsdVyLEgzWt8+u5lWVc0o6A3MY4M2Hf2BT8h koishi@hakugyokurou

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINJOoXrfB4D8Vi6HH4E7RqHHIWhPPqEiiOeLRfggW1XZ koishi@koumakyou

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGIZq1mD3J1cgWK61okXx3hQSe+5g3UTBfAf4RHkkFVd koishi@reimaden

View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDwV7Z+PDC8ARRj1LxUJlv59gJ3A84LCMMyMSqLtRtuQ koishi@shinkirou

1
global/auth/pub/yume.pub Normal file
View file

@ -0,0 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPdzq2g13LEyxTZnA0HQ5hMEp4XNh0TOB/KY1bRwjsaq koishi@yume

View file

@ -2,12 +2,17 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.boot;
cfg = config.global.boot;
in {
options.faucet.boot = {
options.global.boot = {
enable = mkEnableOption "bootloader installation and maintenance" // { default = true; };
systemd-boot = mkEnableOption "generation selection via systemd-boot" // { default = !cfg.lanzaboote; };
lanzaboote = mkEnableOption "secure boot maintenance via lanzaboote";
memtest = mkOption {
type = with types; nullOr int;
default = null;
description = "memtest passes to perform on boot";
};
};
config = let
@ -20,6 +25,7 @@ in {
loader.systemd-boot.enable = cfg.systemd-boot;
loader.efi.canTouchEfiVariables = true;
tmp.cleanOnBoot = true;
kernelParams = optional (cfg.memtest != null) "memtest=${toString cfg.memtest}";
};
# symlink for sbctl

View file

@ -0,0 +1,17 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.flatpak;
in {
options.global.flatpak = {
enable = mkEnableOption "flatpak sandbox";
};
config = mkIf cfg.enable {
services.flatpak.enable = true;
xdg.portal.enable = true;
users.home.persist.directories = [ ".local/share/flatpak" ".var" ];
environment.persistence."/nix/persist/fhs".directories = [ "/var/lib/flatpak" ];
};
}

22
global/fs/bcachefs.nix Normal file
View file

@ -0,0 +1,22 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.fs;
in {
options.global.fs.bcachefs = {
options = mkOption {
type = with types; listOf str;
default = [ "noatime" "compression=zstd" ];
description = "bcachefs mount options";
};
};
config = mkIf (cfg.type == "bcachefs") {
fileSystems."/nix" =
{ inherit (cfg.bcachefs) options;
device = "/dev/disk/by-uuid/${cfg.store}";
fsType = "bcachefs";
};
};
}

View file

@ -2,23 +2,25 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.fs;
cfg = config.global.fs;
in {
imports = [
./ext4.nix
./f2fs.nix
./xfs.nix
#./bcachefs.nix
./btrfs.nix
./bcachefs.nix
./zfs
];
options.faucet.fs = {
options.global.fs = {
type = mkOption {
type = with types; enum [ "ext4" "xfs" "bcachefs" "btrfs" ];
type = with types; enum [ "ext4" "f2fs" "xfs" "zfs" "bcachefs" ];
default = "bcachefs";
description = "filesystem type to use for persistent state storage";
};
store = mkOption {
type = with types; str;
default = config.networking.hostName;
description = "UUID/dataset of nix store backing device";
};
esp = {
@ -29,7 +31,7 @@ in {
description = "vfat serial number of EFI system partition";
};
};
extPersist = {
external = {
enable = mkEnableOption "external persist filesystem";
# this wraps the standard fileSystems module
# since some attrs have to be unconditionally set
@ -70,8 +72,8 @@ in {
{ device = "/dev/disk/by-uuid/${cfg.esp.uuid}";
fsType = "vfat";
};
fileSystems."/nix/persist" = mkIf cfg.extPersist.enable
{ inherit (cfg.extPersist) device fsType options;
fileSystems."/nix/persist" = mkIf cfg.external.enable
{ inherit (cfg.external) device fsType options;
neededForBoot = true;
depends = [ "/nix" ];
};
@ -88,5 +90,10 @@ in {
inherit (cfg.cryptsetup) allowDiscards bypassWorkqueues;
device = "/dev/disk/by-uuid/${uuid}";
}) cfg.cryptsetup.uuids);
environment.persistence."/nix/persist/fhs".files = [ {
file = "/var/lib/private/mode";
parentDirectory.mode = "0700";
} ];
};
}

View file

@ -1,10 +1,11 @@
{ lib
, config
, ... }: with lib; let
cfg = config.faucet.fs;
cfg = config.global.fs;
in mkIf (cfg.type == "ext4") {
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/${cfg.store}";
fsType = "ext4";
options = [ "noatime" ];
};
}

10
global/fs/f2fs.nix Normal file
View file

@ -0,0 +1,10 @@
{ lib
, config
, ... }: with lib; let
cfg = config.global.fs;
in mkIf (cfg.type == "f2fs") {
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/${cfg.store}";
fsType = "f2fs";
};
}

View file

@ -1,11 +1,12 @@
{ lib
, config
, ... }: with lib; let
cfg = config.faucet.fs;
cfg = config.global.fs;
in mkIf (cfg.type == "xfs") {
# NOTE: -m reflink=1
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/${cfg.store}";
fsType = "xfs";
options = [ "noatime" ];
};
}

122
global/fs/zfs/alert.nix Normal file
View file

@ -0,0 +1,122 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.fs.zfs.alert;
backend = {
text = pkgs.writeShellScript "telegram-text" ''
set -e
source ${cfg.secret}
${pkgs.curl}/bin/curl -sG \
--data-urlencode "chat_id=$CHATID" \
--data-urlencode "text=$ALERT" \
$CURL_EXTRA_ARGS \
"https://api.telegram.org/bot$APIKEY/sendMessage"
'';
image = pkgs.writeShellScript "telegram-image" ''
set -e
source ${cfg.secret}
${pkgs.curl}/bin/curl -sG \
-F "chat_id=$CHATID" \
-F "caption=$ALERT" \
-F "photo=@-" \
$CURL_EXTRA_ARGS \
"https://api.telegram.org/bot$APIKEY/sendPhoto"
'';
};
zedAlert = pkgs.writeShellScript "zed-alert" ''
set -e
export BODY="$(cat)"
# add tag
ALERT="$1 #zfs"
export ALERT
echo -e "$BODY" | \
${pkgs.imagemagick}/bin/convert \
-size 1500x2000 xc:black \
-font "${pkgs.freefont_ttf}/share/fonts/truetype/FreeMono.ttf" \
-pointsize 16 \
-fill white -annotate +15+80 "@-" \
-trim -bordercolor "#000" \
-border 32 +repage \
png:- | \
${backend.image}
'';
mdadmAlert = pkgs.writeShellScript "mdadm-alert" ''
set -e
EVENT="$1"
ARRAY="$2"
DEVICE="$3"
# fallback alert
ALERT="$EVENT | $ARRAY | $DEVICE"
case $EVENT in
DegradedArray)
ALERT="Array $ARRAY is in a degraded state"
;;
DeviceDisappeared)
ALERT="Array $ARRAY disappeared"
;;
Fail)
ALERT="Array $ARRAY encountered failure of component $DEVICE"
;;
FailSpare)
ALERT="Array $ARRAY encountered failure of spare component $DEVICE during rebuild"
;;
MoveSpare)
ALERT="Spare $DEVICE moved to array $ARRAY"
;;
NewArray)
ALERT="Array $ARRAY appeared"
;;
Rebuild??)
ALERT="Array $ARRAY rebuild is now $(echo $EVENT | ${pkgs.sedutil}/bin/sed 's/Rebuild//')% complete"
;;
RebuildFinished)
ALERT="Rebuild of array $ARRAY has concluded"
;;
RebuildStarted)
ALERT="Rebuild of array $ARRAY has started"
;;
SpareActive)
ALERT="Spare $DEVICE activated in array $ARRAY"
;;
SparesMissing)
ALERT="Array $ARRAY missing one or more spares"
;;
TestMessage)
ALERT="Test message generated for array $ARRAY"
;;
esac
# add tag
ALERT="$ALERT #swraid"
export ALERT
exec ${backend.text}
'';
in mkIf (cfg.secret != null) {
services.zfs.zed = mkIf cfg.zed {
settings = {
ZED_EMAIL_ADDR = [ "root" ];
ZED_EMAIL_PROG = toString zedAlert;
ZED_EMAIL_OPTS = "'@SUBJECT@'";
ZED_NOTIFY_INTERVAL_SECS = 3600;
ZED_NOTIFY_VERBOSE = false;
ZED_USE_ENCLOSURE_LEDS = true;
ZED_SCRUB_AFTER_RESILVER = false;
};
};
global.fs.zfs.split.mdProg = mkIf cfg.swraid (toString mdadmAlert);
}

105
global/fs/zfs/default.nix Normal file
View file

@ -0,0 +1,105 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.fs;
in {
imports = [
./alert.nix
./split.nix
./replication.nix
];
# -o ashift=12
# -O encryption=on -O keyformat=passphrase -O keylocation=prompt
# -O compression=on -O mountpoint=none -O xattr=sa -O acltype=posixacl
options.global.fs.zfs = {
alert = {
zed = mkEnableOption "zfs event alerts" // { default = true; };
swraid = mkEnableOption "software raid alerts" // { default = true; };
secret = mkOption {
type = with types; nullOr str;
default = null;
description = "path to alert secrets";
};
};
persist = mkOption {
type = with types; str;
default = cfg.store;
description = ''
pool for persist dataset
defaults to nix store dataset
'';
};
mountpoints = mkOption {
type = with types; attrsOf str;
description = "zfs dataset mountpoints";
};
externalStore = mkEnableOption "external nix store filesystem";
split = {
enable = mkEnableOption "zfs state with split nix store";
mdProg = mkOption {
type = with types; str;
default = "/usr/bin/true";
description = "mdadm PROGRAM config value";
};
secret = mkOption {
type = with types; str;
description = "UUID of secret filesystem";
};
store = mkOption {
type = with types; str;
description = "UUID of store filesystem";
};
};
replication = {
enable = mkEnableOption "zfs replication to remote";
remote = mkOption {
type = with types; str;
description = "remote host as replication destination";
};
port = mkOption {
type = with types; port;
description = "ssh port of replication target";
default = 22;
};
datasets = mkOption {
type = with types; listOf str;
default = [ "persist" "service" "storage" ];
description = "list of filesystems to perform replication for";
};
sendOptions = mkOption {
type = with types; str;
default = "w";
description = "send options for all datasets";
};
};
};
config = mkIf (cfg.type == "zfs") {
fileSystems = (mapAttrs (path: dataset: {
device = "${cfg.zfs.persist}/${dataset}";
fsType = "zfs";
options = [ "zfsutil" ];
# required by impermanence
neededForBoot = true;
}) cfg.zfs.mountpoints) // {
"/nix" = (if !cfg.zfs.externalStore then
{ device = "${cfg.store}/nix";
fsType = "zfs";
} else
{ inherit (cfg.external) device fsType options; });
};
global.fs.zfs.mountpoints."/nix/persist" = "persist";
services.zfs.trim.enable = true;
services.zfs.autoSnapshot.enable = true;
services.zfs.autoScrub.enable = true;
boot.zfs.devNodes = mkDefault "/dev/disk/by-partuuid";
#boot.kernelPackages = mkDefault config.boot.zfs.package.latestCompatibleLinuxPackages;
global.kernel.lts = mkDefault true;
};
}

View file

@ -0,0 +1,30 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.fs.zfs.replication;
in mkIf cfg.enable {
services.syncoid = {
enable = mkDefault true;
interval = mkDefault "daily";
sshKey = mkDefault "/var/lib/syncoid/.ssh/id_ed25519";
commonArgs = [
"--recursive"
"--mbuffer-size=128M"
"--delete-target-snapshots"
"--sshport=${toString cfg.port}"
];
localSourceAllow = mkOptionDefault [ "mount" ];
commands = (lists.foldr (name: commands: commands // {
"${config.global.fs.store}/${name}" = {
inherit (cfg) sendOptions;
target = "${cfg.remote}/${name}";
};
}) { }) cfg.datasets;
};
users.users.syncoid.uid = 82;
users.groups.syncoid.gid = 82;
environment.persistence."/nix/persist/fhs".directories = [ "/var/lib/syncoid" ];
}

35
global/fs/zfs/split.nix Normal file
View file

@ -0,0 +1,35 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.fs.zfs.split;
in mkIf cfg.enable {
# unconditionally enable fstrim for xfs and ext4
services.fstrim.enable = mkDefault true;
# enable swraid for split raid1 system array
boot.swraid.enable = mkDefault true;
boot.swraid.mdadmConf = mkDefault ''
PROGRAM ${cfg.mdProg}
'';
# secret filesystem backed by swraid
fileSystems."/nix/var/secret" =
{ device = "/dev/disk/by-uuid/${cfg.secret}";
fsType = "ext4";
options = [ "noatime" ];
neededForBoot = true;
depends = [ "/nix/var" ];
};
# external store backed by swraid
global.fs = {
zfs.externalStore = mkDefault true;
external.device = "/dev/disk/by-uuid/${cfg.store}";
external.fsType = "xfs";
external.options = [ "noatime" ];
};
# import system state pool after encrypted filesystems become available for key loading
boot.initrd.systemd.services."zfs-import-${config.global.fs.store}".after = [ "sysroot-nix-var-secret.mount" "cryptsetup.target" ];
}

111
global/gpu/default.nix Normal file
View file

@ -0,0 +1,111 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.gpu;
intel = cfg.type == "intel" || (cfg.type == "prime" && config.hardware.nvidia.prime.intelBusId != "");
amdgpu = cfg.type == "amdgpu" || (cfg.type == "prime" && config.hardware.nvidia.prime.amdgpuBusId != "");
nvidia = cfg.type == "nvidia" || cfg.type == "prime";
in {
imports = [
./plymouth.nix
./greetd.nix
];
options.global.gpu = {
enable = mkEnableOption "various setup required for GUI and support software";
session = mkEnableOption "software required for a graphical session" // { default = true; };
type = mkOption {
type = with types; nullOr (enum [ "intel" "amdgpu" "nvidia" "prime" ]);
default = null;
description = "type of graphics acceleration used";
};
arc = mkOption {
type = with types; nullOr str;
default = null;
description = "intel arc PCI ID if installed, enables toggling the arc before boot";
};
};
config = mkIf cfg.enable {
hardware.graphics = {
enable = true;
enable32Bit = true;
# https://nixos.wiki/wiki/Accelerated_Video_Playback
extraPackages = with pkgs; optionals intel [
intel-media-driver # LIBVA_DRIVER_NAME=iHD
vaapiIntel # LIBVA_DRIVER_NAME=i965 (older but works better for Firefox/Chromium)
vaapiVdpau
libvdpau-va-gl
intel-compute-runtime
] ++
optional nvidia nvidia-vaapi-driver ++
optional (cfg.type == "nvidia") vulkan-validation-layers;
};
services.xserver = mkIf cfg.session {
videoDrivers =
optional nvidia "nvidia" ++
optional (cfg.type == "amdgpu") "amdgpu";
# inhibits default display manager
displayManager.startx.enable = mkDefault true;
};
hardware.nvidia = mkIf nvidia {
modesetting.enable = true;
nvidiaSettings = true;
prime = mkIf (cfg.type == "prime") {
offload = {
enable = true;
enableOffloadCmd = true;
};
};
powerManagement.enable = false;
powerManagement.finegrained = false;
open = false;
};
environment.variables = {
# work around broken nvidia hw cursor on wayland
WLR_NO_HARDWARE_CURSORS = mkIf (cfg.type == "nvidia") "1";
# work around wlroots flickering on pure nvidia
#WLR_RENDERER = mkIf (cfg.type == "nvidia") "vulkan";
};
specialisation.integratedGraphics = mkIf (cfg.type == "prime") {
configuration = {
global.gpu.type = mkForce (if intel then "intel" else if amdgpu then "amdgpu" else "prime");
boot.blacklistedKernelModules = [ "nouveau" ];
};
};
specialisation.withArc = mkIf (cfg.arc != null) {
configuration = {
global.gpu.arc = mkForce null;
powerManagement.cpuFreqGovernor = mkForce "performance";
};
};
boot.initrd.kernelModules =
optional amdgpu "amdgpu" ++
optional (intel && cfg.arc == null) "i915" ++
optionals nvidia [ "nvidia" "nvidia_drm" "nvidia_modeset" "nvidia_uvm" ] ++
optional (cfg.arc != null) "vfio-pci";
boot.extraModulePackages = optional nvidia config.boot.kernelPackages.nvidia_x11;
boot.extraModprobeConfig = mkIf (cfg.arc != null) ''
softdep drm pre: vfio-pci
options vfio-pci ids=${cfg.arc}
'';
boot.kernelParams =
optional intel "i915.fastboot=1" ++
optionals nvidia [ "nvidia_drm.modeset=1" "nvidia_drm.fbdev=1" ];
};
}

24
global/gpu/greetd.nix Normal file
View file

@ -0,0 +1,24 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.gpu;
gui = with cfg; enable && session;
in mkIf gui {
programs.regreet = {
enable = mkDefault true;
cageArgs = [ "-s" "-d" "-m" "last" ];
settings = {
background.path = mkDefault ../../share/54345906_p0.jpg;
background.fit = "Fill";
GTK = {
application_prefer_dark_theme = mkDefault true;
cursor_theme_name = mkDefault "Bibata-Modern-Classic";
icon_theme_name = mkDefault "Papirus-Dark";
theme_name = mkDefault "WhiteSur-Dark";
};
};
};
environment.persistence."/nix/persist/fhs".directories = [ "/var/cache/regreet" ];
}

View file

@ -2,10 +2,11 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.gui;
in mkIf cfg.enable {
cfg = config.global.gpu;
gui = with cfg; enable && session;
in mkIf gui {
boot = {
loader.timeout = lib.mkDefault 0;
loader.timeout = mkDefault 0;
consoleLogLevel = 0;
initrd.verbose = false;
initrd.systemd.enable = true;
@ -13,7 +14,6 @@ in mkIf cfg.enable {
kernelParams = [
"quiet"
"splash"
"i915.fastboot=1"
"loglevel=3"
"rd.systemd.show_status=false"
"rd.udev.log_level=3"

View file

@ -2,9 +2,9 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.id;
cfg = config.global.id;
in {
options.faucet.id = mkOption {
options.global.id = mkOption {
type = with types; str;
description = "systemd machine id";
};

View file

@ -2,41 +2,61 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.io;
cfg = config.global.io;
gui = with config.global.gpu; enable && session;
in {
options.faucet.io = {
betaflight = mkEnableOption "betaflight udev rules" // { default = true; };
bluetooth = mkEnableOption "bluetooth daemons and state persistence" // { default = true; };
audio = mkEnableOption "pulseaudio server configuration" // { default = true; };
options.global.io = {
betaflight = mkEnableOption "betaflight udev rules" // { default = gui; };
bluetooth = mkEnableOption "bluetooth daemons and state persistence" // { default = gui; };
audio = mkEnableOption "pulseaudio server configuration" // { default = gui; };
coredump = mkEnableOption "save coredumps handled by systemd";
};
config = {
services.udev.extraRules = "" + (if cfg.betaflight then ''
services.udev.extraRules = ''
# ignore zvols
KERNEL=="zd*", ENV{UDISKS_IGNORE}="1"
'' + (if cfg.betaflight then ''
# DFU (Internal bootloader for STM32 and AT32 MCUs)
SUBSYSTEM=="usb", ATTRS{idVendor}=="2e3c", ATTRS{idProduct}=="df11", MODE="0664", GROUP="dialout"
SUBSYSTEM=="usb", ATTRS{idVendor}=="0483", ATTRS{idProduct}=="df11", MODE="0664", GROUP="dialout"
'' else "");
networking.networkmanager.enable = mkDefault true;
networking.hosts = {
"10.5.14.0" = [ "codec" ];
"10.5.14.1" = [ "redir" ];
"10.5.14.2" = [ "compat" ];
"192.168.123.1" = [ "netvm" ];
};
networking.firewall.logRefusedConnections = true;
hardware.bluetooth.enable = mkDefault cfg.bluetooth;
hardware.pulseaudio = mkIf cfg.audio {
# rtkit is optional but recommended
security.rtkit.enable = cfg.audio;
services.pipewire = mkIf cfg.audio {
enable = true;
support32Bit = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
jack.enable = true;
};
#nixpkgs.config.pulseaudio = mkIf cfg.audio;
security.pam.loginLimits = mkIf (!cfg.coredump) (singleton { domain = "*"; item = "core"; type = "hard"; value = "0"; });
systemd.coredump.extraConfig = mkIf (!cfg.coredump) "Storage=none";
environment.persistence."/nix/persist/fhs".directories = [
"/var/log"
"/var/lib/nixos"
"/var/lib/systemd/backlight"
] ++
optional config.networking.networkmanager.enable "/etc/NetworkManager/system-connections" ++
optional cfg.bluetooth "/var/lib/bluetooth" ++
optional cfg.coredump "/var/lib/systemd/coredump";
environment.persistence."/nix/persist/fhs".hideMounts = true;
users.home.persist.directories = [ ] ++
optional cfg.audio ".local/state/wireplumber";
};
}

View file

@ -2,9 +2,9 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.kernel;
cfg = config.global.kernel;
in {
options.faucet.kernel = {
options.global.kernel = {
enable = mkEnableOption "kernel version and configuration" // { default = true; };
lts = mkEnableOption "longterm kernel releases";
sysctl = {
@ -23,6 +23,6 @@ in {
"kernel.dmesg_restrict" = mkIf cfg.sysctl.harden 1;
"vm.swappiness" = cfg.sysctl.swappiness;
};
boot.kernelPackages = with pkgs; mkDefault (if cfg.lts then linuxPackages else linuxPackages_latest);
boot.kernelPackages = with pkgs; mkOverride 1001 (if cfg.lts then linuxPackages else linuxPackages_latest);
};
}

View file

@ -2,9 +2,9 @@
, lib
, config
, ... }: with lib; let
cfg = config.faucet.libvirt;
cfg = config.global.libvirt;
in {
options.faucet.libvirt = {
options.global.libvirt = {
enable = mkEnableOption "libvirt virtualisation daemon" // { default = true; };
};
@ -20,12 +20,15 @@ in {
parallelShutdown = 5;
};
environment.systemPackages = with pkgs; [ virtiofsd ];
# USB redirection requires a setuid wrapper
virtualisation.spiceUSBRedirection.enable = true;
environment.persistence."/nix/persist/fhs".directories = [
"/var/lib/libvirt"
];
global.fs.zfs.mountpoints."/nix/persist/service/libvirt" = "service/libvirt";
# allow management by admin users
users.adminGroups = [ "libvirtd" ];

25
global/lowmem/default.nix Normal file
View file

@ -0,0 +1,25 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.lowmem;
in {
options.global.lowmem = {
enable = mkEnableOption "low memory optimisations";
swapsize = mkOption {
type = with types; int;
default = 8 * 1024;
description = "automatic swap file size";
};
};
config = mkIf cfg.enable {
# enables remote nixos-rebuild
nix.settings.trusted-users = [ "koishi" ];
swapDevices = [ {
device = "/nix/persist/secret/swap";
size = cfg.swapsize;
} ];
};
}

View file

@ -0,0 +1,52 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.netdata;
in {
options.global.netdata = {
enable = mkEnableOption "netdata";
host = mkOption {
type = with types; str;
default = "localhost";
description = "hostname of netdata web interface";
};
addSSL = mkEnableOption "add SSL to netdata proxy";
useACMEHost = mkOption {
type = with types; nullOr str;
default = null;
description = "existing acme host";
};
basicAuthFile = mkOption {
type = with types; nullOr path;
default = "/nix/persist/secret/netdata";
description = "path to passwd file";
};
};
config = mkIf cfg.enable {
services.netdata = {
enable = true;
config = {
global = {
"error log" = "syslog";
"access log" = "none";
"debug log" = "syslog";
};
web."bind to" = "unix:/var/run/netdata/netdata.sock";
};
};
users.users.netdata.uid = 287;
users.groups.netdata.gid = 287;
services.nginx.enable = mkDefault true;
services.nginx.virtualHosts.${cfg.host} = {
inherit (cfg) addSSL useACMEHost basicAuthFile;
locations."/".proxyPass = "http://unix:/var/run/netdata/netdata.sock";
};
users.users.nginx.extraGroups = [ "netdata" ];
environment.persistence."/nix/persist/fhs".directories = [ "/var/lib/netdata" ];
};
}

21
global/oci/default.nix Normal file
View file

@ -0,0 +1,21 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.oci;
in {
options.global.oci = {
enable = mkEnableOption "oci container runtime";
};
config = mkIf cfg.enable {
virtualisation.podman = {
enable = true;
enableNvidia = with config.global.gpu; mkDefault type == "prime" || type == "nvidia";
dockerCompat = true;
};
users.home.persist.directories = [ ".local/share/containers" ];
environment.persistence."/nix/persist/fhs".directories = [ "/var/lib/containers" ];
};
}

View file

@ -0,0 +1,34 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.global.virtualbox;
in {
options.global.virtualbox = {
enable = mkEnableOption "virtualbox host (kvm)";
};
config = mkIf cfg.enable {
virtualisation.virtualbox.host = {
enable = true;
enableKvm = true;
enableExtensionPack = true;
enableHardening = false;
addNetworkInterface = false;
};
# allow virtualbox USB passthrough
users.adminGroups = [ "vboxusers" ];
users.home.persist.directories = [
".config/VirtualBox"
];
users.homeModules = [ {
wayland.windowManager.sway.config.window.commands = [
{ criteria.class = "VirtualBox Manager"; command = "floating enable"; }
];
} ];
};
}

28
home/app/nixos.nix Normal file
View file

@ -0,0 +1,28 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.users;
in {
options.users.home.persistApp = {
files = mkOption {
type = with types; listOf (oneOf [ str (attrsOf str) ]);
default = [ ];
};
directories = mkOption {
type = with types; listOf (oneOf [ str (attrsOf str) ]);
default = [ ];
};
};
config = {
users.profiles.app = {
uid = 5800;
description = "Insecure Applications";
picture = ../picture/app.png;
};
# extra persistence specific to the app user
environment.persistence."/nix/persist".users.app = cfg.home.persistApp;
};
}

View file

@ -17,9 +17,21 @@
# compiled from trusted keys in auth module
ssh.allowedSignersFile = toString (pkgs.writeText
"allowed_signers" (foldr (key: folded:
folded + "koishi@514fpv.one ${key}") ""
folded + "koishi@514fpv.one ${key}\n") ""
config.passthrough.publicKeys));
};
};
};
programs.ssh = {
enable = true;
matchBlocks = {
"edge.514fpv.io".port = 8086;
"sf.514fpv.io".port = 8087;
};
};
wayland.windowManager.sway.config.window.commands = mkIf config.passthrough.gui [
{ criteria.title = "Bitwarden"; command = "floating enable"; }
];
}

View file

@ -2,6 +2,6 @@
, ... }: {
# this module passes openssh public keys to home-manager
users.homeModules = [ {
passthrough.publicKeys = config.faucet.auth.openssh.publicKeys;
passthrough.publicKeys = config.global.auth.openssh.publicKeys;
} ];
}

13
home/btop/home.nix Normal file
View file

@ -0,0 +1,13 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.btop;
in mkIf cfg.enable {
programs.btop = {
enable = true;
settings = {
theme_background = false;
};
};
}

17
home/btop/nixos.nix Normal file
View file

@ -0,0 +1,17 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.btop;
in {
options.home.btop = {
enable = mkEnableOption "btop" // { default = !config.home.util.minimal; };
};
config = {
users.homeModules = [
# this module passes gyroflow configuration to home-manager
{ passthrough.btop = cfg; }
];
};
}

BIN
home/catppuccin/flake.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 47 KiB

62
home/catppuccin/gui.nix Normal file
View file

@ -0,0 +1,62 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.catppuccin;
palette = (lib.importJSON "${config.catppuccin.sources.palette}/palette.json").${config.catppuccin.flavor}.colors;
in mkIf cfg.enable {
gtk.theme = { inherit (cfg.gtk) package name; };
qt.style.name = "kvantum";
qt.platformTheme.name = "kvantum";
home.pointerCursor = { inherit (cfg.cursor) package name; };
# sway colour palette override
wayland.windowManager.sway.config = {
colors = {
focused = { border = "$lavender"; background = "$base"; text = "$text"; indicator = "$rosewater"; childBorder = "$lavender"; };
focusedInactive = { border = "$overlay0"; background = "$base"; text = "$text"; indicator = "$rosewater"; childBorder = "$overlay0"; };
unfocused = { border = "$overlay0"; background = "$base"; text = "$text"; indicator = "$rosewater"; childBorder = "$overlay0"; };
urgent = { border = "$peach"; background = "$base"; text = "$peach"; indicator = "$overlay0"; childBorder = "$peach"; };
placeholder = { border = "$overlay0"; background = "$base"; text = "$text"; indicator = "$overlay0"; childBorder = "$overlay0"; };
background = "$base";
};
bars = mkForce [ {
colors = {
background = "$base";
statusline = "$text";
focusedStatusline = "$text";
focusedSeparator = "$base";
focusedWorkspace = { border = "$base"; background = "$base"; text = "$green"; };
activeWorkspace = { border = "$base"; background = "$base"; text = "$blue"; };
inactiveWorkspace = { border = "$base"; background = "$base"; text = "$surface1"; };
urgentWorkspace = { border = "$base"; background = "$base"; text = "$surface1"; };
bindingMode = { border = "$base"; background = "$base"; text = "$surface1"; };
};
mode = "dock";
position = "bottom";
workspaceButtons = true;
workspaceNumbers = true;
statusCommand = "${pkgs.i3status}/bin/i3status";
fonts = {
names = [ "monospace" ];
size = 8.0;
};
trayOutput = "primary";
} ];
output."*".bg = mkForce "${./flake.png} fill";
gaps.inner = 12;
gaps.outer = 5;
# dodge the status bar
gaps.bottom = 0;
};
# i3status colour palette override
programs.i3status.general = with palette; {
color_good = lavender.hex;
color_degraded = yellow.hex;
color_bad = red.hex;
};
}

9
home/catppuccin/home.nix Normal file
View file

@ -0,0 +1,9 @@
{
catppuccin = {
enable = true;
accent = "pink";
flavor = "mocha";
};
imports = [ ./gui.nix ];
}

79
home/catppuccin/nixos.nix Normal file
View file

@ -0,0 +1,79 @@
{ pkgs
, lib
, config
, ... }: with lib; let
gui = with config.global.gpu; enable && session;
cfg = config.home.catppuccin;
in {
options.home.catppuccin = {
enable = mkEnableOption "catppuccin colour scheme" // { default = gui; };
gtk = {
package = mkOption {
type = with types; package;
default = (pkgs.catppuccin-gtk.overrideAttrs {
src = pkgs.fetchFromGitHub {
owner = "catppuccin";
repo = "gtk";
rev = "v1.0.3";
fetchSubmodules = true;
hash = "sha256-q5/VcFsm3vNEw55zq/vcM11eo456SYE5TQA3g2VQjGc=";
};
postUnpack = "";
}).override {
accents = [ "pink" ];
size = "compact";
#tweaks = [ "rimless" "black" ];
variant = "mocha";
};
description = "catppuccin gtk theme package";
};
name = mkOption {
type = with types; str;
default = "catppuccin-mocha-pink-compact";
description = "name of catppuccin gtk theme";
};
};
cursor = {
package = mkOption {
type = with types; package;
default = pkgs.catppuccin-cursors.mochaDark;
description = "catppuccin cursor theme package";
};
name = mkOption {
type = with types; str;
default = "catppuccin-mocha-dark-cursors";
description = "name of catppuccin cursor theme";
};
};
};
config = {
users.homeModules = [
# this module passes catppuccin configuration to home-manager
{ passthrough.catppuccin = cfg; }
];
catppuccin.enable = cfg.enable;
# gtk and cursor themes
environment.systemPackages = with cfg; mkIf enable [
gtk.package cursor.package
];
# override greetd theme
programs.regreet = mkIf cfg.enable {
theme = {
inherit (cfg.gtk) name package;
};
cursorTheme = {
inherit (cfg.cursor) name package;
};
settings = {
background.path = ./solid.png;
};
};
};
}

BIN
home/catppuccin/solid.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 33 KiB

View file

@ -2,8 +2,9 @@
, lib
, config
, ... }: with lib; let
gui = with config.faucet.gui; ( enable && session );
gui = with config.global.gpu; enable && session;
in {
users.home.persist.directories = mkIf gui [ ".config/google-chrome" ];
security.chromiumSuidSandbox.enable = mkIf gui true;
environment.sessionVariables.NIXOS_OZONE_WL = "1";
}

View file

@ -5,5 +5,7 @@
programs.foot = {
enable = true;
settings.main.term = "xterm-256color";
settings.main.font = "DejaVu Sans Mono:size=11";
#settings.colors.alpha = 0.8;
};
}

11
home/gnome/home.nix Normal file
View file

@ -0,0 +1,11 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.gnome;
in {
imports = [
./impl/home.nix
./impl/dconf.nix
];
}

286
home/gnome/impl/dconf.nix Normal file
View file

@ -0,0 +1,286 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.gnome;
bg = ../../../share/54345906_p0.jpg;
in mkIf cfg.enable {
dconf.settings = let
p = "org/gnome";
pd = "${p}/desktop";
ps = "${p}/shell";
pse = "${ps}/extensions";
ptl = "${p}/terminal/legacy";
ptlp = "${ptl}/profiles:";
in {
"${pd}/peripherals/mouse".natural-scroll = true;
"${pd}/peripherals/touchpad".tap-to-click = true;
"${p}/epiphany".ask-for-default = false;
"${p}/evolution-data-server".migrated = true;
"${p}/nautilus/preferences" = {
default-folder-viewer = "icon-view";
migrated-gtk-settings = true;
search-filter-time-type = "last_modified";
};
"${pd}/background" = {
color-shading-type = "solid";
picture-options = "zoom";
picture-uri = "file://${bg}";
picture-uri-dark = "file://${bg}";
primary-color = "#000000000000";
secondary-color = "#000000000000";
};
"${pd}/interface" = {
color-scheme = "prefer-dark";
cursor-theme = "Bibata-Modern-Classic";
font-antialiasing = "grayscale";
font-hinting = "slight";
gtk-theme = "adw-gtk3-dark";
icon-theme = "Papirus-Dark";
};
"${pd}/screensaver" = {
color-shading-type = "solid";
lock-enabled = false;
picture-options = "zoom";
picture-uri = "file://${bg}";
primary-color = "#000000000000";
secondary-color = "#000000000000";
};
"${pd}/wm/preferences" = {
action-double-click-titlebar = "toggle-maximize";
action-middle-click-titlebar = "minimize";
button-layout = "close:appmenu";
resize-with-right-button = true;
};
"${pd}/wm/keybindings" = {
panel-run-dialog = [ ];
begin-resize = [ "<Super>r" ];
close = [ "<Shift><Super>q" ];
minimize = [ "<Super>BackSpace" ];
move-to-workspace-1 = [ "<Shift><Super>1" ];
move-to-workspace-2 = [ "<Shift><Super>2" ];
move-to-workspace-3 = [ "<Shift><Super>3" ];
move-to-workspace-4 = [ "<Shift><Super>4" ];
move-to-workspace-left = [ "<Shift><Super>h" ];
move-to-workspace-right = [ "<Shift><Super>l" ];
switch-to-workspace-1 = [ "<Super>1" ];
switch-to-workspace-2 = [ "<Super>2" ];
switch-to-workspace-3 = [ "<Super>3" ];
switch-to-workspace-4 = [ "<Super>4" ];
toggle-maximized = [ "<Super>f" ];
};
"${ps}/keybindings" = {
switch-to-application-1 = [ ];
switch-to-application-2 = [ ];
switch-to-application-3 = [ ];
switch-to-application-4 = [ ];
switch-to-application-5 = [ ];
switch-to-application-6 = [ ];
switch-to-application-7 = [ ];
switch-to-application-8 = [ ];
switch-to-application-9 = [ ];
toggle-application-view = [ "<Super>d" ];
};
"${p}/settings-daemon/plugins/media-keys" = {
custom-keybindings = [
"/org/gnome/settings-daemon/plugins/media-keys/custom-keybindings/custom0/"
"/org/gnome/settings-daemon/plugins/media-keys/custom-keybindings/custom1/"
];
logout = [ ];
screensaver = [ "<Control><Alt>l" ];
};
"${p}/settings-daemon/plugins/media-keys/custom-keybindings/custom0" = {
binding = "<Super>Return";
command = "kgx";
name = "Launch console";
};
"${p}/settings-daemon/plugins/media-keys/custom-keybindings/custom1" = {
binding = "<Super>q";
command = "google-chrome-stable";
name = "Launch Google Chrome";
};
"${ptlp}" = {
#default = "95894cfd-82f7-430d-af6e-84d168bc34f5";
list = [
"de8a9081-8352-4ce4-9519-5de655ad9361"
"71a9971e-e829-43a9-9b2f-4565c855d664"
"5083e06b-024e-46be-9cd2-892b814f1fc8"
"95894cfd-82f7-430d-af6e-84d168bc34f5"
];
};
"${ptlp}/:5083e06b-024e-46be-9cd2-892b814f1fc8" = {
background-color = "#24273a";
cursor-background-color = "#f4dbd6";
cursor-colors-set = true;
cursor-foreground-color = "#24273a";
foreground-color = "#cad3f5";
highlight-background-color = "#24273a";
highlight-colors-set = true;
highlight-foreground-color = "#5b6078";
palette = [
"#494d64" "#ed8796" "#a6da95" "#eed49f"
"#8aadf4" "#f5bde6" "#8bd5ca" "#b8c0e0"
"#5b6078" "#ed8796" "#a6da95" "#eed49f"
"#8aadf4" "#f5bde6" "#8bd5ca" "#a5adcb"
];
use-theme-colors = false;
visible-name = "Catppuccin Macchiato";
};
"${ptlp}/:71a9971e-e829-43a9-9b2f-4565c855d664" = {
background-color = "#303446";
cursor-background-color = "#f2d5cf";
cursor-colors-set = true;
cursor-foreground-color = "#303446";
default-size-columns = 150;
default-size-rows = 35;
foreground-color = "#c6d0f5";
highlight-background-color = "#303446";
highlight-colors-set = true;
highlight-foreground-color = "#626880";
palette = [
"#51576d" "#e78284" "#a6d189" "#e5c890"
"#8caaee" "#f4b8e4" "#81c8be" "#b5bfe2"
"#626880" "#e78284" "#a6d189" "#e5c890"
"#8caaee" "#f4b8e4" "#81c8be" "#a5adce"
];
use-theme-colors = false;
visible-name = "Catppuccin Frappe";
};
"${ptlp}/:95894cfd-82f7-430d-af6e-84d168bc34f5" = {
background-color = "#1e1e2e";
cursor-background-color = "#f5e0dc";
cursor-colors-set = true;
cursor-foreground-color = "#1e1e2e";
foreground-color = "#cdd6f4";
highlight-background-color = "#1e1e2e";
highlight-colors-set = true;
highlight-foreground-color = "#585b70";
palette = [
"#45475a" "#f38ba8" "#a6e3a1" "#f9e2af"
"#89b4fa" "#f5c2e7" "#94e2d5" "#bac2de"
"#585b70" "#f38ba8" "#a6e3a1" "#f9e2af"
"#89b4fa" "#f5c2e7" "#94e2d5" "#a6adc8"
];
use-theme-colors = false;
visible-name = "Catppuccin Mocha";
};
"${ptlp}/:de8a9081-8352-4ce4-9519-5de655ad9361" = {
background-color = "#eff1f5";
cursor-background-color = "#dc8a78";
cursor-colors-set = true;
cursor-foreground-color = "#eff1f5";
foreground-color = "#4c4f69";
highlight-background-color = "#eff1f5";
highlight-colors-set = true;
highlight-foreground-color = "#acb0be";
palette = [
"#5c5f77" "#d20f39" "#40a02b" "#df8e1d"
"#1e66f5" "#ea76cb" "#179299" "#acb0be"
"#6c6f85" "#d20f39" "#40a02b" "#df8e1d"
"#1e66f5" "#ea76cb" "#179299" "#bcc0cc"
];
use-theme-colors = false;
visible-name = "Catppuccin Latte";
};
"${ps}" = {
disabled-extensions = [
"light-style@gnome-shell-extensions.gcampax.github.com"
"places-menu@gnome-shell-extensions.gcampax.github.com"
"windowsNavigator@gnome-shell-extensions.gcampax.github.com"
"window-list@gnome-shell-extensions.gcampax.github.com"
"workspace-indicator@gnome-shell-extensions.gcampax.github.com"
"dash-to-dock@micxgx.gmail.com"
];
enabled-extensions = [
"user-theme@gnome-shell-extensions.gcampax.github.com"
"apps-menu@gnome-shell-extensions.gcampax.github.com"
"drive-menu@gnome-shell-extensions.gcampax.github.com"
"appindicatorsupport@rgcjonas.gmail.com"
"dash-to-panel@jderose9.github.com"
"caffeine@patapon.info"
"PrivacyMenu@stuarthayhurst"
];
last-selected-power-profile = "performance";
welcome-dialog-last-shown-version = "45.3";
};
#"${pse}/user-theme".name = "catppuccin-mocha-pink-compact";
"${pse}/caffeine" = {
screen-blank = "never";
};
"${pse}/dash-to-dock" = {
background-opacity = 0.80000000000000004;
dash-max-icon-size = 48;
dock-position = "BOTTOM";
height-fraction = 0.90000000000000002;
multi-monitor = false;
running-indicator-style = "DOTS";
custom-theme-shrink = true;
};
"${pse}/dash-to-panel" = {
animate-appicon-hover = false;
animate-appicon-hover-animation-type = "SIMPLE";
appicon-margin = 0;
appicon-padding = 4;
appicon-style= "NORMAL";
available-monitors = [ 0 ];
dot-position = "BOTTOM";
dot-style-focused = "METRO";
dot-style-unfocused = "DOTS";
group-apps = true;
hide-overview-on-startup = true;
hotkeys-overlay-combo = "TEMPORARILY";
intellihide = true;
intellihide-behaviour = "FOCUSED_WINDOWS";
intellihide-hide-from-windows = true;
isolate-workspaces = false;
leftbox-padding = -1;
overview-click-to-exit = true;
panel-anchors = ''{"0":"MIDDLE"}'';
panel-element-positions = ''{"0":[{"element":"showAppsButton","visible":true,"position":"stackedTL"},{"element":"activitiesButton","visible":true,"position":"stackedTL"},{"element":"leftBox","visible":false,"position":"stackedTL"},{"element":"taskbar","visible":true,"position":"centerMonitor"},{"element":"centerBox","visible":true,"position":"stackedBR"},{"element":"rightBox","visible":true,"position":"stackedBR"},{"element":"dateMenu","visible":true,"position":"stackedBR"},{"element":"systemMenu","visible":true,"position":"stackedBR"},{"element":"desktopButton","visible":false,"position":"stackedBR"}]}'';
panel-lengths = ''{"0":100}'';
panel-positions = ''{"0":"BOTTOM"}'';
panel-sizes = ''{"0":42}'';
primary-monitor = 0;
secondarymenu-contains-showdetails = true;
show-showdesktop-hover = true;
status-icon-padding = -1;
stockgs-force-hotcorner = false;
stockgs-keep-dash = false;
stockgs-keep-top-panel = false;
stockgs-panelbtn-click-only = false;
trans-bg-color = "#2a2a2a";
trans-dynamic-anim-target = 1.0;
trans-dynamic-behavior = "MAXIMIZED_WINDOWS";
trans-gradient-bottom-color = "#000000";
trans-gradient-bottom-opacity = 0.5;
trans-gradient-top-opacity = 0.0;
trans-panel-opacity = 0.0;
trans-use-custom-bg = true;
trans-use-custom-gradient = true;
trans-use-custom-opacity = true;
trans-use-dynamic-opacity = true;
tray-padding = -1;
window-preview-title-position = "TOP";
};
};
}

32
home/gnome/impl/home.nix Normal file
View file

@ -0,0 +1,32 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.gnome;
in mkIf cfg.enable {
home.packages =
with pkgs;
with gnome;
with gnomeExtensions; [
# gtk3 theme
adw-gtk3
# gnomeExtensions
caffeine
dash-to-panel
dash-to-dock
appindicator
privacy-settings-menu
];
catppuccin.enable = mkForce false;
home.pointerCursor = mkForce null;
gtk.enable = false;
home.persistence."/nix/persist/home/${config.home.username}" = {
removePrefixDirectory = true;
files = [
(if config.specialisation != {} then "gnome/.config/monitors.xml" else "extern/.config/monitors.xml")
];
};
}

49
home/gnome/impl/nixos.nix Normal file
View file

@ -0,0 +1,49 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.gnome;
in mkIf cfg.enable {
global.flatpak.enable = mkDefault true;
home.catppuccin.enable = mkDefault false;
catppuccin.enable = false;
programs.regreet.enable = false;
services.xserver.enable = true;
services.xserver.displayManager.startx.enable = false;
services.xserver.displayManager.gdm.enable = true;
services.xserver.desktopManager.gnome.enable = true;
services.udev.packages = with pkgs; [ gnome-settings-daemon ];
services.hardware.bolt.enable = true;
xdg.portal.configPackages = with pkgs; [ gnome-session ];
hardware.pulseaudio.enable = false;
environment.gnome.excludePackages = (with pkgs; [
snapshot
gnome-tour
] ++ optionals config.global.flatpak.enable [
baobab
simple-scan
evince
file-roller
geary
loupe
seahorse
totem
epiphany
gnome-calculator
gnome-calendar
gnome-connections
gnome-font-viewer
gnome-text-editor
gnome-characters
gnome-clocks
gnome-contacts
gnome-logs
gnome-maps
gnome-music
gnome-weather
]) ++ (with pkgs.gnome; [ ] ++ optionals config.global.flatpak.enable [
]);
users.home.persist.directories = [ ".config/dconf" ];
}

25
home/gnome/nixos.nix Normal file
View file

@ -0,0 +1,25 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.gnome;
in {
imports = [ ./impl/nixos.nix ];
options.home.gnome = {
enable = mkEnableOption "GNOME desktop environment";
};
config = {
users.homeModules = [
# this module passes gnome configuration to home-manager
{ passthrough.gnome = cfg; }
];
specialisation.nognome = with cfg; mkIf enable {
configuration = {
home.gnome.enable = mkForce false;
};
};
};
}

View file

@ -1,25 +1,35 @@
{ pkgs
, lib
, config
, ... }: with lib; mkIf config.passthrough.gui {
# cursor theme
home.pointerCursor = {
package = pkgs.bibata-cursors;
name = "Bibata-Modern-Classic";
size = 24;
};
, ... }: with lib; let
catppuccin = config.passthrough.catppuccin.enable;
in {
config = mkIf config.passthrough.gui {
# cursor theme
home.pointerCursor = {
package = mkDefault pkgs.bibata-cursors;
name = mkDefault "Bibata-Modern-Classic";
size = 24;
x11.enable = true;
gtk.enable = true;
};
# gtk theme
gtk.theme = {
package = pkgs.whitesur-gtk-theme;
name = "WhiteSur-Dark";
};
# gtk theme
gtk.theme = mkDefault {
package = pkgs.whitesur-gtk-theme;
name = "WhiteSur-Dark";
};
# gtk icons
gtk.iconTheme = {
package = pkgs.whitesur-icon-theme;
name = "WhiteSur-dark";
};
# gtk icons
gtk.iconTheme = mkDefault {
package = pkgs.papirus-icon-theme;
name = "Papirus-Dark";
};
gtk.enable = true;
# unify qt theme
qt.platformTheme.name = mkDefault "gtk";
gtk.enable = mkDefault true;
qt.enable = mkDefault true;
};
}

View file

@ -2,7 +2,8 @@
, lib
, config
, ... }: with lib; let
gui = with config.faucet.gui; ( enable && session );
gui = with config.global.gpu; enable && session;
catppuccin = config.home.catppuccin;
in {
config = {
users.homeModules = [
@ -12,17 +13,24 @@ in {
users.adminGroups = mkIf gui [ "video" ];
# themes and icons
environment.systemPackages = with pkgs; mkIf gui [
whitesur-gtk-theme whitesur-icon-theme
environment.systemPackages = with pkgs; mkIf gui ([
papirus-icon-theme
] ++ optionals (!catppuccin.enable) [
whitesur-gtk-theme
whitesur-icon-theme
bibata-cursors
];
]);
fonts.enableDefaultPackages = mkIf gui true;
security = mkIf gui {
polkit.enable = true;
};
fonts.enableDefaultPackages = mkIf gui true;
programs = mkIf gui {
dconf.enable = true;
};
services = mkIf gui {
blueman.enable = !config.global.flatpak.enable;
};
};
}

13
home/gyroflow/home.nix Normal file
View file

@ -0,0 +1,13 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.gyroflow;
in mkIf cfg.enable {
# temporarily gone until regression is fixed
#home.packages = [ cfg.package ];
wayland.windowManager.sway.config.window.commands = [
{ criteria.app_id = "xyz.gyroflow.gyroflow"; command = "floating enable"; }
];
}

26
home/gyroflow/nixos.nix Normal file
View file

@ -0,0 +1,26 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.gyroflow;
in {
options.home.gyroflow = {
enable = mkEnableOption "gyroflow stabilisation software";
package = mkOption {
type = with types; package;
default = pkgs.gyroflow.overrideAttrs (finalAttrs: previousAttrs: {
buildInputs = previousAttrs.buildInputs ++ [ pkgs.qt6Packages.qtwayland ];
});
description = "gyroflow package";
};
};
config = {
users.homeModules = [
# this module passes gyroflow configuration to home-manager
{ passthrough.gyroflow = cfg; }
];
users.home.persist.directories = mkIf cfg.enable [ ".config/Gyroflow" ];
};
}

24
home/headless/home.nix Normal file
View file

@ -0,0 +1,24 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.headless;
in mkIf (cfg.enable != null) {
wayland.windowManager.sway.config = {
output = {
${cfg.enable}.pos = "0 0";
HEADLESS-1 = cfg.output;
};
startup = [ { command = "swaymsg create_output && swaymsg output HEADLESS-1 disable"; } ];
};
home.packages = [ (pkgs.writeShellScriptBin "headless" ''
swaymsg output HEADLESS-1 enable
${pkgs.wayvnc}/bin/wayvnc \
--output=HEADLESS-1 \
${cfg.extraArgs} \
${cfg.host} ${toString cfg.port}
swaymsg output HEADLESS-1 disable
'') ];
}

51
home/headless/nixos.nix Normal file
View file

@ -0,0 +1,51 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.headless;
in {
options.home.headless = {
enable = mkOption {
type = with types; nullOr str;
default = null;
description = "a headless, remotely viewed sway display";
};
output = mkOption {
type = with types; attrsOf str;
default = {
# pixel tablet
mode = "2560x1600";
scale = "2";
pos = "1920 0";
};
description = "headless display configuration";
};
host = mkOption {
type = with types; str;
default = "0.0.0.0";
description = "wayvnc listen host";
};
port = mkOption {
type = with types; port;
# utility port
default = 1300;
description = "wayvnc listen port";
};
extraArgs = mkOption {
type = with types; str;
default = "--max-fps=60";
description = "extra wayvnc args";
};
};
config = {
users.homeModules = [
# this module passes headless configuration to home-manager
{ passthrough.headless = cfg; }
];
};
}

6
home/imv/home.nix Normal file
View file

@ -0,0 +1,6 @@
{ pkgs
, lib
, config
, ... }: with lib; mkIf config.passthrough.gui {
programs.imv.enable = true;
}

11
home/jetbrains/home.nix Normal file
View file

@ -0,0 +1,11 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.jetbrains;
in mkIf cfg.enable {
home.packages = with pkgs.jetbrains; [ pkgs.go ] ++
optional cfg.idea idea-community ++
optional cfg.clion clion ++
optional cfg.goland goland;
}

27
home/jetbrains/nixos.nix Normal file
View file

@ -0,0 +1,27 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.jetbrains;
in {
options.home.jetbrains = {
enable = mkEnableOption "jetbrains text editor";
idea = mkEnableOption "intellij idea";
clion = mkEnableOption "clion ide";
goland = mkEnableOption "goland ide" // { default = true; };
};
config = {
users.homeModules = [
# this module passes jetbrains configuration to home-manager
{ passthrough.jetbrains = cfg; }
];
users.home.persist.directories = mkIf cfg.enable [
"go"
".java/.userPrefs"
".config/JetBrains"
".local/share/JetBrains"
];
};
}

View file

@ -0,0 +1,9 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.libreoffice;
enable = cfg.enable && (cfg.allUsers || (config.home.username == "app"));
in mkIf enable {
home.packages = with pkgs; [ libreoffice ];
}

View file

@ -0,0 +1,22 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.libreoffice;
persist = [ ".config/libreoffice" ];
in {
options.home.libreoffice = {
enable = mkEnableOption "open source office suite";
allUsers = mkEnableOption "set up for all users";
};
config = {
users.homeModules = [
# this module passes minecraft configuration to home-manager
{ passthrough.libreoffice = cfg; }
];
users.home.persist.directories = with cfg; mkIf (enable && allUsers) persist;
users.home.persistApp.directories = with cfg; mkIf (enable && !allUsers) persist;
};
}

16
home/minecraft/home.nix Normal file
View file

@ -0,0 +1,16 @@
{ pkgs
, lib
, config
, ... }: with lib; let
inherit (config.passthrough) gui;
cfg = config.passthrough.minecraft;
enable = cfg.enable && config.home.username == cfg.user;
in mkIf enable {
home.packages = with pkgs; [
jdk8
] ++ optional gui prismlauncher;
wayland.windowManager.sway.config.window.commands = mkIf gui [
{ criteria.app_id = "org.prismlauncher.PrismLauncher"; command = "floating enable"; }
];
}

33
home/minecraft/nixos.nix Normal file
View file

@ -0,0 +1,33 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.minecraft;
gui = with config.global.gpu; enable && session;
in {
options.home.minecraft = {
enable = mkEnableOption "minecraft game launcher and jvm";
user = mkOption {
type = with types; str;
default = "minecraft";
description = "username which minecraft game client runs under";
};
};
config = {
users.homeModules = [
# this module passes minecraft configuration to home-manager
{ passthrough.minecraft = cfg; }
];
users.profiles.minecraft = mkIf (cfg.enable && cfg.user == "minecraft") {
uid = 5801;
description = "Minecraft";
picture = ../picture/aux.png;
};
environment.persistence."/nix/persist".users.${cfg.user} = mkIf (cfg.enable && gui) {
directories = [ ".local/share/PrismLauncher" ];
};
};
}

14
home/mpv/home.nix Normal file
View file

@ -0,0 +1,14 @@
{ pkgs
, lib
, config
, ... }: with lib; mkIf config.passthrough.gui {
programs.mpv = {
enable = true;
config = {
hwdec = "auto-safe";
vo = "gpu";
profile = "gpu-hq";
gpu-context = "wayland";
};
};
}

BIN
home/picture/app.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 114 KiB

BIN
home/picture/aux.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 114 KiB

BIN
home/picture/koishi.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 89 KiB

BIN
home/picture/staging.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 99 KiB

13
home/plasma/config.nix Normal file
View file

@ -0,0 +1,13 @@
{
programs.plasma = {
workspace = {
lookAndFeel = "org.kde.breezedark.desktop";
#clickItemTo = "select";
};
configFile = {
baloofilerc."Basic Settings"."Indexing-Enabled" = false;
kcminputrc.Libinput."2362"."597"."UNIW0001:00 093A:0255 Touchpad".NaturalScroll = true;
};
};
}

51
home/plasma/home.nix Normal file
View file

@ -0,0 +1,51 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.plasma;
image = ../../share/54345906_p0.jpg;
in mkIf cfg.enable {
programs.plasma = {
# https://github.com/pjones/plasma-manager
enable = true;
#overrideConfig = true;
workspace = {
lookAndFeel = "org.kde.breezedark.desktop";
wallpaper = image;
};
hotkeys.commands = {
launch-konsole = {
name = "Launch Konsole";
key = "Meta+Enter";
command = "konsole";
};
};
configFile = {
baloofilerc."Basic Settings"."Indexing-Enabled" = false;
kscreenlockerrc.Greeter.Wallpaper."org.kde.image".General.Image = image;
kscreenlockerrc.Greeter.Wallpaper."org.kde.image".General.PreviewImage = image;
};
} // cfg.extraConfig;
home.activation.gtkCleanup = hm.dag.entryAfter [ "writeBoundary" ] ''
$DRY_RUN_CMD rm -f $HOME/.gtkrc-2.0.old
'';
qt.enable = false;
qt.platformTheme.name = null;
# gtk theme
gtk.theme = {
package = pkgs.kdePackages.breeze-gtk;
name = "Breeze-Dark";
};
# gtk icons
gtk.iconTheme = {
package = pkgs.kdePackages.breeze-icons;
name = "breeze-dark";
};
}

52
home/plasma/nixos.nix Normal file
View file

@ -0,0 +1,52 @@
{ pkgs
, lib
, config
, plasma-manager
, ... }: with lib; let
cfg = config.home.plasma;
in {
options.home.plasma = {
enable = mkEnableOption "plasma desktop and configuration";
specialise = mkEnableOption "enable plasma in a specialisation";
extraConfig = mkOption {
type = with types; anything;
default = { };
description = "extra plasma-manager configuration";
};
};
config = {
users.homeModules = [
# this module passes plasma configuration to home-manager
{ passthrough.plasma = cfg; }
];
users.home.persist.files = mkIf cfg.enable [
".config/kwinoutputconfig.json"
];
users.home.persist.directories = mkIf cfg.enable [
".local/share/kwalletd"
];
services.desktopManager.plasma6 = mkIf cfg.enable {
enable = true;
};
home-manager.backupFileExtension = mkIf cfg.enable "old";
home-manager.sharedModules = [
plasma-manager.homeManagerModules.plasma-manager
];
services.blueman = mkIf cfg.enable {
enable = mkForce false;
};
home = mkIf cfg.enable {
catppuccin.enable = mkForce false;
};
specialisation.plasma = mkIf cfg.specialise {
configuration.home.plasma.enable = true;
};
};
}

View file

@ -1,6 +1,7 @@
{ pkgs
, lib
, config
, inputs
, ... }: with lib; let
cfg = config.users;
in {
@ -28,6 +29,11 @@ in {
default = false;
description = "enable ssh authorized keys for user";
};
picture = mkOption {
type = with types; nullOr path;
default = null;
description = "path to user profile picture";
};
};
});
description = "preconfigured users with profile options";
@ -67,9 +73,9 @@ in {
users = mapAttrs (name: opts: {
inherit (opts) uid;
description = with opts; mkIf (description != null) description;
extraGroups = mkIf opts.admin cfg.adminGroups;
extraGroups = [ "dialout" ] ++ optionals opts.admin cfg.adminGroups;
openssh.authorizedKeys.keys = mkIf (opts.sshLogin && config.services.openssh.enable)
config.faucet.auth.openssh.publicKeys;
config.global.auth.openssh.publicKeys;
hashedPasswordFile = "/nix/persist/shadow/${name}";
shell = pkgs.zsh;
isNormalUser = mkIf (name != "root") true;
@ -79,8 +85,9 @@ in {
# base groups
adminGroups = [
"wheel" "dialout" "kvm"
"wheel" "kvm"
"systemd-journal"
"networkmanager"
];
# base home modules in current directory
@ -124,25 +131,64 @@ in {
neededForBoot = true;
}) cfg.profiles;
global.fs.zfs.mountpoints = mapAttrs'
(name: opts: nameValuePair
"/nix/persist/home/${name}"
"home/${name}")
(filterAttrs (n: _: n != "root") config.users.profiles);
home-manager.users = mapAttrs (name: opts: {
imports = cfg.homeModules;
imports = with inputs; cfg.homeModules ++ [
impermanence.homeManagerModules.impermanence
catppuccin.homeManagerModules.catppuccin
];
home.file.".face" = mkIf (opts.picture != null) {
source = opts.picture;
};
home.stateVersion = "23.11";
}) cfg.profiles;
system.activationScripts = mapAttrs'
(name: opts: nameValuePair
"${name}-profile-icon"
{
deps = [ "users" ];
text = let
iconDest = "/var/lib/AccountsService/icons/${name}";
userConf = pkgs.writeText "${name}-config" ''
[User]
Session=
Icon=${iconDest}
SystemAccount=false
'';
in ''
install -Dm 0444 ${opts.picture} ${iconDest}
install -Dm 0400 ${userConf} /var/lib/AccountsService/users/${name}
'';
})
(filterAttrs (n: _: n != "root") config.users.profiles);
# set up standard persistence for users
# this is registered internally for each software's configuration
environment.persistence."/nix/persist" = {
users = mapAttrs (name: _: cfg.home.persist // {
users = (mapAttrs (name: _: cfg.home.persist // {
# root workaround, ugly but necessary
# cannot get it properly for the same reason
# mentioned above in fileSystems
home = mkIf (name == "root") "/root";
}) cfg.profiles;
}) cfg.profiles);
hideMounts = true;
};
# enable passwordless sudo
security.sudo.wheelNeedsPassword = false;
# enable access in build-vm
virtualisation.vmVariant = {
users.users.koishi.password = "passwd";
users.users.koishi.hashedPasswordFile = mkForce null;
};
};
# this is for home components that need to extend nixos

14
home/steam/config.nix Normal file
View file

@ -0,0 +1,14 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.steam;
in mkIf cfg.enable {
hardware.steam-hardware.enable = true;
networking.firewall = {
allowedTCPPorts = [ 27015 27036 ];
allowedUDPPorts = [ 27015 ];
allowedUDPPortRanges = [ { from = 27031; to = 27036; } ];
};
}

17
home/steam/home.nix Normal file
View file

@ -0,0 +1,17 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.steam;
enable = cfg.enable && (cfg.allUsers || (config.home.username == "app"));
package = config.programs.steam.package;
in mkIf enable {
home.packages = with pkgs; [
cfg.package
cfg.package.run
];
wayland.windowManager.sway.config.window.commands = [
{ criteria.class = "steam"; command = "floating enable"; }
];
}

29
home/steam/nixos.nix Normal file
View file

@ -0,0 +1,29 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.steam;
persist = [ ".steam" ".local/share/Steam" ];
in {
imports = [ ./config.nix ];
options.home.steam = {
enable = mkEnableOption "steam software and environment";
package = mkOption {
type = with types; package;
default = config.programs.steam.package;
description = "steam package";
};
allUsers = mkEnableOption "set up for all users";
};
config = {
users.homeModules = [
# this module passes steam configuration to home-manager
{ passthrough.steam = cfg; }
];
users.home.persist.directories = with cfg; mkIf (enable && allUsers) persist;
users.home.persistApp.directories = with cfg; mkIf (enable && !allUsers) persist;
};
}

View file

@ -10,6 +10,7 @@
swaynag.enable = true;
config = {
defaultWorkspace = "workspace number 1";
modifier = "Mod4";
keybindings = let
modifier = config.wayland.windowManager.sway.config.modifier;
@ -17,10 +18,11 @@
XF86MonBrightnessUp = "light -A 5";
XF86MonBrightnessDown = "light -U 5";
"Control+Alt+l" = "exec ${pkgs.swaylock}/bin/swaylock -c 000000";
"Control+Alt+l" = "exec swaylock -f --grace 0";
"Print" = "exec ${pkgs.grim}/bin/grim - | ${pkgs.wl-clipboard}/bin/wl-copy";
"${modifier}+Print" = "exec ${pkgs.grim}/bin/grim -g \"$(${pkgs.slurp}/bin/slurp)\" - | ${pkgs.wl-clipboard}/bin/wl-copy";
"${modifier}+q" = "exec google-chrome-stable";
"${modifier}+Home" = "exec ${pkgs.pavucontrol}/bin/pavucontrol";
};
bars = [ {
@ -37,14 +39,10 @@
# sets transparency
colors.background = "00000000";
} ];
gaps.inner = 12;
gaps.outer = 5;
# dodge the status bar
gaps.bottom = 0;
input."*".natural_scroll = "enabled";
input."type:touchpad".tap = "enabled";
output."*".bg = "${../../share/54345906_p0.jpg} fill";
output."*".bg = "#000000 solid_color";
};
};
}

View file

@ -2,9 +2,10 @@
, lib
, config
, ... }: with lib; let
gui = with config.faucet.gui; ( enable && session );
gui = with config.global.gpu; enable && session;
nvidia = with config.global.gpu; type == "nvidia" || type == "prime";
in mkIf gui {
services.xserver.displayManager.sessionPackages = [
services.displayManager.sessionPackages = [
(pkgs.writeTextFile {
name = "sway-session";
destination = "/share/wayland-sessions/sway.desktop";
@ -12,12 +13,25 @@ in mkIf gui {
[Desktop Entry]
Name=Sway
Comment=An i3-compatible Wayland compositor
Exec=sway --unsupported-gpu
Exec=${pkgs.writeTextFile {
name = "sway-wrapper";
executable = true;
text = ''
#!${pkgs.zsh}/bin/zsh
SHLVL=0
for profile in ''${(z)NIX_PROFILES}; do
fpath+=($profile/share/zsh/site-functions $profile/share/zsh/$ZSH_VERSION/functions $profile/share/zsh/vendor-completions)
done
exec sway${if nvidia then " --unsupported-gpu" else ""} 2>&1 >> $XDG_CACHE_HOME/sway
'';
checkPhase = ''
${pkgs.stdenv.shellDryRun} "$target"
'';
}}
Type=Application
'';
} // { providedSessions = [ pkgs.sway.meta.mainProgram ]; })
];
security.pam.services.swaylock = { };
programs.light.enable = true;
}

24
home/swayidle/home.nix Normal file
View file

@ -0,0 +1,24 @@
{ pkgs
, lib
, config
, ... }: with lib; mkIf config.passthrough.gui {
services.swayidle = let
sway = config.wayland.windowManager.sway.package;
swaymsg = "${sway}/bin/swaymsg";
swaylock = "${config.programs.swaylock.package}/bin/swaylock";
in {
enable = true;
systemdTarget = "sway-session.target";
timeouts = [
{ timeout = 600; command = "${swaymsg} 'output * dpms off'"; resumeCommand = "${swaymsg} 'output * dpms on'"; }
];
events = [
{ event = "before-sleep"; command = "${swaylock} -f --grace 0"; }
];
};
# fullscreen as simple idle inhibitor shortcut
wayland.windowManager.sway.config.window.commands = [
{ criteria.shell = ".*"; command = "inhibit_idle fullscreen"; }
];
}

24
home/swaylock/home.nix Normal file
View file

@ -0,0 +1,24 @@
{ pkgs
, lib
, config
, ... }: with lib; mkIf config.passthrough.gui {
programs.swaylock = {
enable = true;
package = pkgs.swaylock-effects;
settings = {
indicator-caps-lock = true;
font-size = 20;
ignore-empty-password = true;
show-failed-attempts = true;
color = mkDefault "#00000000";
# Ring
indicator-radius = 115;
# Swaylock-effects specific settings
clock = true;
timestr = "%r";
grace = 2;
};
};
}

8
home/swaylock/nixos.nix Normal file
View file

@ -0,0 +1,8 @@
{ pkgs
, lib
, config
, ... }: with lib; let
gui = with config.global.gpu; enable && session;
in mkIf gui {
security.pam.services.swaylock = { };
}

View file

@ -5,11 +5,13 @@
description = "Koishi";
admin = true;
sshLogin = true;
picture = ./picture/koishi.png;
};
staging = {
uid = 1000;
description = "Staging Environment";
picture = ./picture/staging.png;
};
root.uid = 0;

View file

@ -1,13 +1,33 @@
{ pkgs
, lib
, config
, ... }: with lib; {
, ... }: with lib; let
cfg = config.passthrough.util;
in {
home.packages = with pkgs; [
pciutils usbutils lsscsi
pv file wget e2fsprogs
] ++ optionals (!cfg.minimal) [
tio mbuffer sedutil
lsscsi zip unzip
nix-index dnsutils whois
pciutils usbutils nvme-cli
] ++ optionals config.passthrough.gui [
gtk-engine-murrine
gnome-themes-extra
mission-planner
betaflight-configurator
inav-configurator
inav-blackbox-tools
(blhelisuite32.override { workdir = "${config.home.homeDirectory}/.blhelisuite32"; })
] ++ optionals (config.passthrough.gui && !config.passthrough.flatpak.enable) [
xfce.thunar gimp
jellyfin-media-player
betaflight-configurator
expresslrs-configurator
];
wayland.windowManager.sway.config.window.commands = mkIf config.passthrough.gui [
{ criteria.class = "BLHeliSuite32xl"; command = "floating enable"; }
{ criteria.app_id = "thunar"; command = "floating enable"; }
];
}

View file

@ -2,12 +2,43 @@
, lib
, config
, ... }: with lib; let
gui = with config.faucet.gui; ( enable && session );
cfg = config.home.util;
gui = with config.global.gpu; enable && session;
in {
users.home.persist.directories = [ ] ++
optionals gui [
".local/share/Mission Planner"
".config/betaflight-configurator"
".config/inav-configurator"
];
options.home.util = {
minimal = mkEnableOption "minimal system environment with less packages";
};
config = {
users.homeModules = [
# this module passes util configuration to home-manager
{ passthrough.util = cfg; }
# this module passes flatpak configuration to home-manager
{ passthrough.flatpak = config.global.flatpak; }
];
programs.zsh.enable = true;
environment.shells = singleton pkgs.zsh;
users.home.persist.directories = [ ] ++
optionals (!cfg.minimal) [
".cache/nix-index"
] ++
optionals gui [
# mission-planner
".local/share/Mission Planner"
# inav-configurator
".config/inav-configurator"
] ++
optionals (gui && !config.global.flatpak.enable) [
# jellyfin-media-player
".config/jellyfin.org"
".local/share/jellyfinmediaplayer"
".local/share/Jellyfin Media Player"
# expresslrs-configurator
".config/ExpressLRS Configurator"
# betaflight-configurator
".config/betaflight-configurator"
];
};
}

View file

@ -49,4 +49,10 @@
};
"${p}/conns/qemu:system".pretty-name = "KVM";
};
# floating other than main window
wayland.windowManager.sway.config.window.commands = [
{ criteria.app_id = "virt-manager"; command = "floating enable"; }
{ criteria.app_id = "virt-manager"; criteria.title = "Virtual Machine Manager"; command = "floating disable"; }
];
}

View file

@ -2,7 +2,7 @@
, lib
, config
, ... }: with lib; let
gui = with config.faucet.gui; ( enable && session );
gui = with config.global.gpu; enable && session;
in mkIf gui {
programs.virt-manager.enable = true;
}

24
home/vscode/home.nix Normal file
View file

@ -0,0 +1,24 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.passthrough.vscode;
theme = config.passthrough.catppuccin.enable;
in mkIf cfg.enable {
programs.vscode = {
enable = true;
mutableExtensionsDir = false;
enableUpdateCheck = false;
enableExtensionUpdateCheck = false;
package = pkgs.vscodium;
extensions = with pkgs.vscode-extensions; [
catppuccin.catppuccin-vsc catppuccin.catppuccin-vsc-icons
bbenoist.nix golang.go rust-lang.rust-analyzer
];
userSettings = {
"workbench.colorTheme" = mkIf theme "Catppuccin Mocha";
"workbench.iconTheme" = mkIf theme "catppuccin-mocha";
"[nix]"."editor.tabSize" = 2;
};
};
}

19
home/vscode/nixos.nix Normal file
View file

@ -0,0 +1,19 @@
{ pkgs
, lib
, config
, ... }: with lib; let
cfg = config.home.vscode;
in {
options.home.vscode = {
enable = mkEnableOption "vscode text editor";
};
config = {
users.homeModules = [
# this module passes vscode configuration to home-manager
{ passthrough.vscode = cfg; }
];
users.home.persist.directories = mkIf cfg.enable [ ".config/VSCodium" ];
};
}

View file

@ -0,0 +1,92 @@
{ lib
, libicns
, p7zip
, fetchzip
, stdenvNoCC
, makeDesktopItem
, buildFHSUserEnv
, workdir ? "/tmp/blhelisuite32" }: let
name = "BLHeliSuite32";
pname = "blhelisuite32";
version = "32.10";
suffix = "1044";
dist = fetchzip {
name = "${pname}-dist";
url = "https://github.com/bitdump/BLHeli/releases/download/Rev${version}/${name}xLinux64_${suffix}.zip";
hash = "sha256-y4S824s9Ipxb1M1IeD6Lo6k7hmm8CEmPflvhaqZz+84=";
};
desktopItem = makeDesktopItem {
name = pname;
exec = pname;
icon = pname;
comment = "This Application may flash and configure BLHeli_32 based ESCs";
desktopName = name;
genericName = "BLHeli for brushless ESC firmware";
};
icons = stdenvNoCC.mkDerivation {
pname = "${pname}-icons";
inherit version;
src = fetchzip {
name = "${pname}-macos";
url = "https://github.com/bitdump/BLHeli/releases/download/Rev${version}/${name}xm_MacOS64_${suffix}.zip";
hash = "sha256-StRnrVI8p51vNsTMO1LtaZvENbG7XZ1V/mKHe4pO7kU=";
};
nativeBuildInputs = [ libicns p7zip ];
configurePhase = ''
7z x *.dmg
'';
buildPhase = ''
icns2png -x ${name}xm_MacOS64_${suffix}/${name}xm.app/Contents/Resources/${name}xm.icns
'';
installPhase = ''
mkdir -p "$out"
cp -r ${name}*.png "$out"
'';
};
linked = stdenvNoCC.mkDerivation {
inherit pname version;
phases = [ "unpackPhase" "patchPhase" "installPhase" ];
src = dist;
installPhase = ''
cp -r . "$out"
# BLHeliSuite32 tries to write next to its binary
ln -s ${workdir}/settings $out/Settings
ln -s ${workdir}/music $out/Music
'';
};
in buildFHSUserEnv {
inherit pname version;
targetPkgs = pkgs: (with pkgs; [
glib libGL curl
libgcc gtk3
zlib systemdLibs
]);
extraInstallCommands = let
mkIconScale = scale:
"install -m 444 -D ${icons}/${name}xm_${scale}x${scale}x32.png $out/share/icons/hicolor/${scale}x${scale}/apps/${pname}.png";
in ''
${mkIconScale "16"}
${mkIconScale "32"}
${mkIconScale "64"}
${mkIconScale "128"}
${mkIconScale "256"}
${mkIconScale "512"}
${mkIconScale "1024"}
cp -r ${desktopItem}/share/applications $out/share/
'';
runScript = "sh -c '" +
"mkdir -p ${workdir}/settings && " +
"mkdir -p ${workdir}/music && " +
"exec ${linked}/${name}xl'";
}

19
package/default.nix Normal file
View file

@ -0,0 +1,19 @@
{ lib, ... }: {
nixpkgs.overlays = [ (final: prev:
builtins.listToAttrs (map (pkg: {
name = pkg;
value = let
argsPath = ./${pkg}/args.nix;
in final.callPackage ./${pkg}
(if (builtins.pathExists argsPath) then
(import argsPath final)
else { });
}) (builtins.attrNames (builtins.readDir ./.)))
) ];
imports = lib.pipe ./. [
builtins.readDir
(lib.filterAttrs (n: ty: ty == "directory" && builtins.pathExists ./${n}/nixos.nix))
(lib.mapAttrsToList (n: _: ./${n}/nixos.nix))
];
}

View file

@ -0,0 +1,51 @@
{ lib
, fetchzip
, makeDesktopItem
, imagemagick
, buildFHSUserEnv }: let
name = "ExpressLRS-Configurator";
pname = "expresslrs-configurator";
version = "1.7.2";
dist = fetchzip {
name = "${pname}-dist";
url = "https://github.com/ExpressLRS/ExpressLRS-Configurator/releases/download/v${version}/${pname}-${version}.zip";
stripRoot = false;
hash = "sha256-pXmJ420HeJaMjAZCzlIriuFrTK5xabxTrSy3PDVisgU=";
};
desktopItem = makeDesktopItem {
name = pname;
exec = pname;
icon = pname;
comment = "Cross platform configuration & build tool for the ExpressLRS radio link";
desktopName = "ExpressLRS Configurator";
genericName = "radio link configuration & build tool";
};
in buildFHSUserEnv {
inherit pname version;
# copied from chromium deps
targetPkgs = pkgs: (with pkgs; [
glib fontconfig freetype pango cairo xorg.libX11 xorg.libXi atk nss nspr
xorg.libXcursor xorg.libXext xorg.libXfixes xorg.libXrender
xorg.libXScrnSaver xorg.libXcomposite xorg.libxcb
alsa-lib xorg.libXdamage xorg.libXtst xorg.libXrandr xorg.libxshmfence expat cups
dbus gdk-pixbuf gcc-unwrapped.lib
systemd
libexif pciutils
liberation_ttf curl util-linux wget
flac harfbuzz icu libpng libopus snappy speechd
bzip2 libcap at-spi2-atk at-spi2-core
libkrb5 libdrm libglvnd mesa coreutils
libxkbcommon pipewire wayland
libva gtk3 gtk4
]);
extraInstallCommands = ''
mkdir -p $out/share
${imagemagick}/bin/convert ${dist}/resources/assets/icon.png -resize 128x128 icon-128.png
install -m 444 -D icon-128.png $out/share/icons/hicolor/128x128/apps/${pname}.png
cp -r ${desktopItem}/share/applications $out/share/
'';
runScript = "${dist}/expresslrs-configurator";
}

View file

@ -0,0 +1,74 @@
{ lib
, pkg-config
, libjpeg_turbo
, libheif
, lapack
, dlib
, blas
, ffmpeg
, exiftool
, darktable
, fetchFromGitHub
, buildGoModule
, buildNpmPackage
, runCommandLocal
, makeWrapper }: buildGoModule rec {
pname = "photoview";
version = "2.4.0";
source = fetchFromGitHub {
name = "${pname}-src";
owner = pname;
repo = pname;
rev = "refs/tags/v${version}";
hash = "sha256-ZfvBdQlyqONsrviZGL22Kt+AiPaVWwdoREDUrHDYyIs=";
};
src = source + "/api";
vendorHash = "sha256-Tn4OxSV41s/4n2Q3teJRJNc39s6eKW4xE9wW/CIR5Fg=";
nativeBuildInputs = [
pkg-config
makeWrapper
];
buildInputs = [
libjpeg_turbo
libheif
lapack
dlib
blas
];
ui = buildNpmPackage {
pname = "${pname}-ui";
inherit version;
src = source + "/ui";
#REACT_APP_API_ENDPOINT = "";
REACT_APP_BUILD_VERSION = version;
REACT_APP_BUILD_DATE = builtins.readFile (runCommandLocal "date" { } "date -uI > $out" );
REACT_APP_BUILD_COMMIT_SHA = "nix";
npmDepsHash = "sha256-wUbfq+7SuJUBxfy9TxHVda8A0g4mmYCbzJT64XBN2mI=";
};
postInstall = ''
mkdir -p "$out/lib/${pname}"
mv "$out/bin/api" "$out/bin/${pname}"
wrapProgram $out/bin/${pname} \
--prefix PATH ":" "${lib.makeBinPath [
ffmpeg
exiftool
darktable
]}" \
--set PHOTOVIEW_SERVE_UI 1 \
--set PHOTOVIEW_UI_PATH "$out/lib/${pname}/ui"
cp -r \
"${src}/data/" \
"$out/lib/${pname}/data/"
cp -r \
"${ui}/lib/node_modules/photoview-ui/dist" \
"$out/lib/${pname}/ui"
'';
}

Some files were not shown because too many files have changed in this diff Show more