Compare commits
2 Commits
master
...
d85b00971e
| Author | SHA1 | Date | |
|---|---|---|---|
|
d85b00971e
|
|||
|
1257eab6c4
|
1
.gitattributes
vendored
1
.gitattributes
vendored
@@ -1,5 +1,4 @@
|
||||
secrets/soundcloud_token filter=git-crypt diff=git-crypt
|
||||
secrets/bandcamp_token filter=git-crypt diff=git-crypt
|
||||
assets/bitwig/activation.bwreg filter=lfs diff=lfs merge=lfs -text
|
||||
assets/bitwig/bitwig-studio.deb filter=lfs diff=lfs merge=lfs -text
|
||||
assets/bitwig/bitwig.jar filter=lfs diff=lfs merge=lfs -text
|
||||
|
||||
3
Makefile
3
Makefile
@@ -1,6 +1,5 @@
|
||||
switch:
|
||||
nixos-rebuild switch --target-host root@localhost \
|
||||
--build-host root@localhost --flake path://$(PWD)#panacea
|
||||
sudo nixos-rebuild switch --flake path://$(PWD)#
|
||||
|
||||
update:
|
||||
nix flake update --commit-lock-file
|
||||
|
||||
@@ -11,6 +11,7 @@ with pkgs;
|
||||
{
|
||||
# Kernel configuration
|
||||
boot = {
|
||||
kernelPackages = linuxPackages_zen;
|
||||
blacklistedKernelModules = [
|
||||
"btusb"
|
||||
"bluetooth"
|
||||
@@ -52,8 +53,6 @@ with pkgs;
|
||||
"root"
|
||||
"coolneng"
|
||||
];
|
||||
lazy-trees = true;
|
||||
eval-cores = 2;
|
||||
};
|
||||
gc = {
|
||||
automatic = true;
|
||||
@@ -111,6 +110,7 @@ with pkgs;
|
||||
group = "systemd-network";
|
||||
};
|
||||
secrets.syncthing.file = secrets/syncthing.age;
|
||||
secrets.samba-ugent.file = secrets/samba-ugent.age;
|
||||
secrets.msmtp.file = secrets/msmtp.age;
|
||||
identityPaths = [ "/etc/ssh/id_ed25519" ];
|
||||
};
|
||||
@@ -184,7 +184,6 @@ with pkgs;
|
||||
./modules/periodic.nix
|
||||
./modules/power.nix
|
||||
./modules/monitoring.nix
|
||||
./modules/latest-zfs-kernel.nix
|
||||
];
|
||||
|
||||
}
|
||||
|
||||
359
flake.lock
generated
359
flake.lock
generated
@@ -10,11 +10,11 @@
|
||||
"systems": "systems"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1762618334,
|
||||
"narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=",
|
||||
"lastModified": 1723293904,
|
||||
"narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=",
|
||||
"owner": "ryantm",
|
||||
"repo": "agenix",
|
||||
"rev": "fcdea223397448d35d9b31f798479227e80183f6",
|
||||
"rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -24,12 +24,30 @@
|
||||
}
|
||||
},
|
||||
"crane": {
|
||||
"inputs": {
|
||||
"flake-compat": [
|
||||
"lanzaboote",
|
||||
"flake-compat"
|
||||
],
|
||||
"flake-utils": [
|
||||
"lanzaboote",
|
||||
"flake-utils"
|
||||
],
|
||||
"nixpkgs": [
|
||||
"lanzaboote",
|
||||
"nixpkgs"
|
||||
],
|
||||
"rust-overlay": [
|
||||
"lanzaboote",
|
||||
"rust-overlay"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765739568,
|
||||
"narHash": "sha256-gQYx35Of4UDKUjAYvmxjUEh/DdszYeTtT6MDin4loGE=",
|
||||
"lastModified": 1681177078,
|
||||
"narHash": "sha256-ZNIjBDou2GOabcpctiQykEQVkI8BDwk7TyvlWlI4myE=",
|
||||
"owner": "ipetkov",
|
||||
"repo": "crane",
|
||||
"rev": "67d2baff0f9f677af35db61b32b5df6863bcc075",
|
||||
"rev": "0c9f468ff00576577d83f5019a66c557ede5acf6",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -62,11 +80,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1744478979,
|
||||
"narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=",
|
||||
"lastModified": 1700795494,
|
||||
"narHash": "sha256-gzGLZSiOhf155FW7262kdHo2YDeugp3VuIFb4/GGng0=",
|
||||
"owner": "lnl7",
|
||||
"repo": "nix-darwin",
|
||||
"rev": "43975d782b418ebf4969e9ccba82466728c2851b",
|
||||
"rev": "4b9b83d5a92e8c1fbfd8eb27eda375908c11ec4d",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -76,87 +94,14 @@
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"determinate": {
|
||||
"inputs": {
|
||||
"determinate-nixd-aarch64-darwin": "determinate-nixd-aarch64-darwin",
|
||||
"determinate-nixd-aarch64-linux": "determinate-nixd-aarch64-linux",
|
||||
"determinate-nixd-x86_64-linux": "determinate-nixd-x86_64-linux",
|
||||
"nix": "nix",
|
||||
"nixpkgs": "nixpkgs_2"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765254444,
|
||||
"narHash": "sha256-kAO/ZeBnjaF+uqOP6qweXlRk2ylocLuv/9Dn8FsuPlU=",
|
||||
"rev": "3ccc0297525e51ac3d7905509e0616c9c8350108",
|
||||
"revCount": 316,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/determinate/3.14.0/019b0160-c5de-7941-9c26-cb47bc17eec3/source.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/DeterminateSystems/determinate/%2A"
|
||||
}
|
||||
},
|
||||
"determinate-nixd-aarch64-darwin": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"narHash": "sha256-6PWoqx52nvlWzlElTjcn7KAPKitfcKZYEFSsC3PoEoE=",
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/macOS"
|
||||
},
|
||||
"original": {
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/macOS"
|
||||
}
|
||||
},
|
||||
"determinate-nixd-aarch64-linux": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"narHash": "sha256-b1e25BUPL7Qf0QVbYlfZ/+QiClrP/SHIjMPtA47aOLc=",
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/aarch64-linux"
|
||||
},
|
||||
"original": {
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/aarch64-linux"
|
||||
}
|
||||
},
|
||||
"determinate-nixd-x86_64-linux": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"narHash": "sha256-8EI2f8IftPcRFlR6K4+cpIEAVf5UIeMCjHysEtVqDw0=",
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/x86_64-linux"
|
||||
},
|
||||
"original": {
|
||||
"type": "file",
|
||||
"url": "https://install.determinate.systems/determinate-nixd/tag/v3.14.0/x86_64-linux"
|
||||
}
|
||||
},
|
||||
"flake-compat": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1696426674,
|
||||
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
|
||||
"lastModified": 1673956053,
|
||||
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-compat_2": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1761588595,
|
||||
"narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
|
||||
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -168,64 +113,56 @@
|
||||
"flake-parts": {
|
||||
"inputs": {
|
||||
"nixpkgs-lib": [
|
||||
"determinate",
|
||||
"nix",
|
||||
"lanzaboote",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1748821116,
|
||||
"narHash": "sha256-F82+gS044J1APL0n4hH50GYdPRv/5JWm34oCJYmVKdE=",
|
||||
"rev": "49f0870db23e8c1ca0b5259734a02cd9e1e371a1",
|
||||
"revCount": 377,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/hercules-ci/flake-parts/0.1.377%2Brev-49f0870db23e8c1ca0b5259734a02cd9e1e371a1/01972f28-554a-73f8-91f4-d488cc502f08/source.tar.gz"
|
||||
"lastModified": 1680392223,
|
||||
"narHash": "sha256-n3g7QFr85lDODKt250rkZj2IFS3i4/8HBU2yKHO3tqw=",
|
||||
"owner": "hercules-ci",
|
||||
"repo": "flake-parts",
|
||||
"rev": "dcc36e45d054d7bb554c9cdab69093debd91a0b5",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/hercules-ci/flake-parts/0.1"
|
||||
"owner": "hercules-ci",
|
||||
"repo": "flake-parts",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"git-hooks-nix": {
|
||||
"flake-utils": {
|
||||
"inputs": {
|
||||
"flake-compat": "flake-compat",
|
||||
"gitignore": [
|
||||
"determinate",
|
||||
"nix"
|
||||
],
|
||||
"nixpkgs": [
|
||||
"determinate",
|
||||
"nix",
|
||||
"nixpkgs"
|
||||
]
|
||||
"systems": "systems_2"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1747372754,
|
||||
"narHash": "sha256-2Y53NGIX2vxfie1rOW0Qb86vjRZ7ngizoo+bnXU9D9k=",
|
||||
"rev": "80479b6ec16fefd9c1db3ea13aeb038c60530f46",
|
||||
"revCount": 1026,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/cachix/git-hooks.nix/0.1.1026%2Brev-80479b6ec16fefd9c1db3ea13aeb038c60530f46/0196d79a-1b35-7b8e-a021-c894fb62163d/source.tar.gz"
|
||||
"lastModified": 1681202837,
|
||||
"narHash": "sha256-H+Rh19JDwRtpVPAWp64F+rlEtxUWBAQW28eAi3SRSzg=",
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"rev": "cfacdce06f30d2b68473a46042957675eebb3401",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/cachix/git-hooks.nix/0.1.941"
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"gitignore": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"lanzaboote",
|
||||
"pre-commit",
|
||||
"pre-commit-hooks-nix",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1709087332,
|
||||
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
|
||||
"lastModified": 1660459072,
|
||||
"narHash": "sha256-8DFJjXG8zqoONA1vXtgeKXy68KdJL5UaXR8NtVMUbx8=",
|
||||
"owner": "hercules-ci",
|
||||
"repo": "gitignore.nix",
|
||||
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
|
||||
"rev": "a20de23b925fd8264fd7fad6454652e142fd7f73",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -242,11 +179,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1745494811,
|
||||
"narHash": "sha256-YZCh2o9Ua1n9uCvrvi5pRxtuVNml8X2a03qIFfRKpFs=",
|
||||
"lastModified": 1703113217,
|
||||
"narHash": "sha256-7ulcXOk63TIT2lVDSExj7XzFx09LpdSAPtvgtM7yQPE=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "abfad3d2958c9e6300a883bd443512c55dfeb1be",
|
||||
"rev": "3bfaacf46133c037bb356193bd2f1765d9dc82c1",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -258,22 +195,26 @@
|
||||
"lanzaboote": {
|
||||
"inputs": {
|
||||
"crane": "crane",
|
||||
"flake-compat": "flake-compat",
|
||||
"flake-parts": "flake-parts",
|
||||
"flake-utils": "flake-utils",
|
||||
"nixpkgs": [
|
||||
"nixpkgs"
|
||||
],
|
||||
"pre-commit": "pre-commit",
|
||||
"pre-commit-hooks-nix": "pre-commit-hooks-nix",
|
||||
"rust-overlay": "rust-overlay"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765887029,
|
||||
"narHash": "sha256-s6LGO6kMlHRdnspV0LReSi47iaYaJ/Oveb4rM9fklPM=",
|
||||
"lastModified": 1682802423,
|
||||
"narHash": "sha256-Fb5TeRTdvUlo/5Yi2d+FC8a6KoRLk2h1VE0/peMhWPs=",
|
||||
"owner": "nix-community",
|
||||
"repo": "lanzaboote",
|
||||
"rev": "5a8c9b5339588bb6ec388da5d0a6e701a46a82c4",
|
||||
"rev": "64b903ca87d18cef2752c19c098af275c6e51d63",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"ref": "v0.3.0",
|
||||
"repo": "lanzaboote",
|
||||
"type": "github"
|
||||
}
|
||||
@@ -281,8 +222,8 @@
|
||||
"local-bitwig": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1765321606,
|
||||
"narHash": "sha256-WteEWi5GPrGGfzLNTEmgQaH5/DAT/zeZofbBE6D+Po8=",
|
||||
"lastModified": 1704673203,
|
||||
"narHash": "sha256-n8gLgN6QEVuHe30kQZ/gCWInDHwDpPWOB5RgVh1tSt8=",
|
||||
"path": "/home/coolneng/Projects/panacea/assets/bitwig",
|
||||
"type": "path"
|
||||
},
|
||||
@@ -291,27 +232,6 @@
|
||||
"type": "path"
|
||||
}
|
||||
},
|
||||
"nix": {
|
||||
"inputs": {
|
||||
"flake-parts": "flake-parts",
|
||||
"git-hooks-nix": "git-hooks-nix",
|
||||
"nixpkgs": "nixpkgs",
|
||||
"nixpkgs-23-11": "nixpkgs-23-11",
|
||||
"nixpkgs-regression": "nixpkgs-regression"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765252170,
|
||||
"narHash": "sha256-p98D44tYJMgB5Qet5S8cTQFdffk/GmoaGkpQtZ3hqJU=",
|
||||
"rev": "1ddd28880651054346c34009d7bb9de36f1db2c1",
|
||||
"revCount": 23362,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/nix-src/3.14.0/019b0159-8907-7fab-a120-9d287c7e6d2e/source.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/DeterminateSystems/nix-src/%2A"
|
||||
}
|
||||
},
|
||||
"nix-index-database": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
@@ -319,11 +239,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765267181,
|
||||
"narHash": "sha256-d3NBA9zEtBu2JFMnTBqWj7Tmi7R5OikoU2ycrdhQEws=",
|
||||
"lastModified": 1728263287,
|
||||
"narHash": "sha256-GJDtsxz2/zw6g/Nrp4XVWBS5IaZ7ZUkuvxPOBEDe7pg=",
|
||||
"owner": "Mic92",
|
||||
"repo": "nix-index-database",
|
||||
"rev": "82befcf7dc77c909b0f2a09f5da910ec95c5b78f",
|
||||
"rev": "5fce10c871bab6d7d5ac9e5e7efbb3a2783f5259",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -334,11 +254,11 @@
|
||||
},
|
||||
"nixos-hardware": {
|
||||
"locked": {
|
||||
"lastModified": 1764440730,
|
||||
"narHash": "sha256-ZlJTNLUKQRANlLDomuRWLBCH5792x+6XUJ4YdFRjtO4=",
|
||||
"lastModified": 1728269138,
|
||||
"narHash": "sha256-oKxDImsOvgUZMY4NwXVyUc/c1HiU2qInX+b5BU0yXls=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixos-hardware",
|
||||
"rev": "9154f4569b6cdfd3c595851a6ba51bfaa472d9f3",
|
||||
"rev": "ecfcd787f373f43307d764762e139a7cdeb9c22b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -349,95 +269,58 @@
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1761597516,
|
||||
"narHash": "sha256-wxX7u6D2rpkJLWkZ2E932SIvDJW8+ON/0Yy8+a5vsDU=",
|
||||
"rev": "daf6dc47aa4b44791372d6139ab7b25269184d55",
|
||||
"revCount": 811874,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.2505.811874%2Brev-daf6dc47aa4b44791372d6139ab7b25269184d55/019a3494-3498-707e-9086-1fb81badc7fe/source.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/NixOS/nixpkgs/0.2505"
|
||||
}
|
||||
},
|
||||
"nixpkgs-23-11": {
|
||||
"locked": {
|
||||
"lastModified": 1717159533,
|
||||
"narHash": "sha256-oamiKNfr2MS6yH64rUn99mIZjc45nGJlj9eGth/3Xuw=",
|
||||
"lastModified": 1730785428,
|
||||
"narHash": "sha256-Zwl8YgTVJTEum+L+0zVAWvXAGbWAuXHax3KzuejaDyo=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "a62e6edd6d5e1fa0329b8653c801147986f8d446",
|
||||
"rev": "4aa36568d413aca0ea84a1684d2d46f55dbabad7",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "a62e6edd6d5e1fa0329b8653c801147986f8d446",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-regression": {
|
||||
"locked": {
|
||||
"lastModified": 1643052045,
|
||||
"narHash": "sha256-uGJ0VXIhWKGXxkeNnq4TvV3CIOkUJ3PAoLZ3HMzNVMw=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "215d4d0fd80ca5163643b03a33fde804a29cc1e2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "215d4d0fd80ca5163643b03a33fde804a29cc1e2",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs_2": {
|
||||
"locked": {
|
||||
"lastModified": 1764611609,
|
||||
"narHash": "sha256-yU9BNcP0oadUKupw0UKmO9BKDOVIg9NStdJosEbXf8U=",
|
||||
"rev": "8c29968b3a942f2903f90797f9623737c215737c",
|
||||
"revCount": 905078,
|
||||
"type": "tarball",
|
||||
"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/nixpkgs-weekly/0.1.905078%2Brev-8c29968b3a942f2903f90797f9623737c215737c/019add91-3add-7a0d-8a25-9569cbe01efe/source.tar.gz"
|
||||
},
|
||||
"original": {
|
||||
"type": "tarball",
|
||||
"url": "https://flakehub.com/f/DeterminateSystems/nixpkgs-weekly/0.1"
|
||||
}
|
||||
},
|
||||
"nixpkgs_3": {
|
||||
"locked": {
|
||||
"lastModified": 1766309749,
|
||||
"narHash": "sha256-3xY8CZ4rSnQ0NqGhMKAy5vgC+2IVK0NoVEzDoOh4DA4=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "a6531044f6d0bef691ea18d4d4ce44d0daa6e816",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"id": "nixpkgs",
|
||||
"ref": "nixos-unstable",
|
||||
"type": "indirect"
|
||||
}
|
||||
},
|
||||
"nixpkgs-stable": {
|
||||
"locked": {
|
||||
"lastModified": 1678872516,
|
||||
"narHash": "sha256-/E1YwtMtFAu2KUQKV/1+KFuReYPANM2Rzehk84VxVoc=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "9b8e5abb18324c7fe9f07cb100c3cd4a29cda8b8",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-22.11",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"pre-commit": {
|
||||
"pre-commit-hooks-nix": {
|
||||
"inputs": {
|
||||
"flake-compat": "flake-compat_2",
|
||||
"flake-compat": [
|
||||
"lanzaboote",
|
||||
"flake-compat"
|
||||
],
|
||||
"flake-utils": [
|
||||
"lanzaboote",
|
||||
"flake-utils"
|
||||
],
|
||||
"gitignore": "gitignore",
|
||||
"nixpkgs": [
|
||||
"lanzaboote",
|
||||
"nixpkgs"
|
||||
]
|
||||
],
|
||||
"nixpkgs-stable": "nixpkgs-stable"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765464257,
|
||||
"narHash": "sha256-dixPWKiHzh80PtD0aLuxYNQ0xP+843dfXG/yM3OzaYQ=",
|
||||
"lastModified": 1681413034,
|
||||
"narHash": "sha256-/t7OjNQcNkeWeSq/CFLYVBfm+IEnkjoSm9iKvArnUUI=",
|
||||
"owner": "cachix",
|
||||
"repo": "pre-commit-hooks.nix",
|
||||
"rev": "09e45f2598e1a8499c3594fe11ec2943f34fe509",
|
||||
"rev": "d3de8f69ca88fb6f8b09e5b598be5ac98d28ede5",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -450,27 +333,30 @@
|
||||
"inputs": {
|
||||
"agenix": "agenix",
|
||||
"cyrus-sasl-xoauth2": "cyrus-sasl-xoauth2",
|
||||
"determinate": "determinate",
|
||||
"lanzaboote": "lanzaboote",
|
||||
"local-bitwig": "local-bitwig",
|
||||
"nix-index-database": "nix-index-database",
|
||||
"nixos-hardware": "nixos-hardware",
|
||||
"nixpkgs": "nixpkgs_3"
|
||||
"nixpkgs": "nixpkgs"
|
||||
}
|
||||
},
|
||||
"rust-overlay": {
|
||||
"inputs": {
|
||||
"flake-utils": [
|
||||
"lanzaboote",
|
||||
"flake-utils"
|
||||
],
|
||||
"nixpkgs": [
|
||||
"lanzaboote",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1765680428,
|
||||
"narHash": "sha256-fyPmRof9SZeI14ChPk5rVPOm7ISiiGkwGCunkhM+eUg=",
|
||||
"lastModified": 1682129965,
|
||||
"narHash": "sha256-1KRPIorEL6pLpJR04FwAqqnt4Tzcm4MqD84yhlD+XSk=",
|
||||
"owner": "oxalica",
|
||||
"repo": "rust-overlay",
|
||||
"rev": "eb3898d8ef143d4bf0f7f2229105fc51c7731b2f",
|
||||
"rev": "2c417c0460b788328220120c698630947547ee83",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -493,6 +379,21 @@
|
||||
"repo": "default",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"systems_2": {
|
||||
"locked": {
|
||||
"lastModified": 1681028828,
|
||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||
"owner": "nix-systems",
|
||||
"repo": "default",
|
||||
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-systems",
|
||||
"repo": "default",
|
||||
"type": "github"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
|
||||
30
flake.nix
30
flake.nix
@@ -2,16 +2,15 @@
|
||||
description = "System configuration for panacea";
|
||||
|
||||
nixConfig = {
|
||||
extra-substituters = "https://cachix.cachix.org https://nix-community.cachix.org https://install.determinate.systems";
|
||||
extra-substituters =
|
||||
"https://cachix.cachix.org https://nix-community.cachix.org";
|
||||
extra-trusted-public-keys = ''
|
||||
cachix.cachix.org-1:eWNHQldwUO7G2VkjpnjDbWwy4KQ/HNxht7H4SSoMckM=
|
||||
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
|
||||
cache.flakehub.com-3:hJuILl5sVK4iKm86JzgdXW12Y2Hwd5G07qKtHTOcDCM=
|
||||
'';
|
||||
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs='';
|
||||
};
|
||||
|
||||
inputs = {
|
||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
||||
nixpkgs.url = "nixpkgs/nixos-unstable";
|
||||
nixos-hardware.url = "github:NixOS/nixos-hardware";
|
||||
agenix = {
|
||||
url = "github:ryantm/agenix";
|
||||
@@ -26,18 +25,16 @@
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
lanzaboote = {
|
||||
url = "github:nix-community/lanzaboote";
|
||||
url = "github:nix-community/lanzaboote/v0.3.0";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
determinate.url = "https://flakehub.com/f/DeterminateSystems/determinate/*";
|
||||
local-bitwig = {
|
||||
url = "path:/home/coolneng/Projects/panacea/assets/bitwig";
|
||||
flake = false;
|
||||
};
|
||||
};
|
||||
|
||||
outputs =
|
||||
{ self, nixpkgs, ... }@inputs:
|
||||
outputs = { self, nixpkgs, ... }@inputs:
|
||||
let
|
||||
system = "x86_64-linux";
|
||||
|
||||
@@ -46,22 +43,16 @@
|
||||
config.allowUnfree = true;
|
||||
overlays = [
|
||||
(final: prev: {
|
||||
emacs-vterm = (
|
||||
(pkgs.emacsPackagesFor pkgs.emacs-pgtk).emacsWithPackages (
|
||||
epkgs: with epkgs; [
|
||||
vterm
|
||||
mu4e
|
||||
]
|
||||
)
|
||||
);
|
||||
emacs-vterm =
|
||||
((pkgs.emacsPackagesFor pkgs.emacs29-pgtk).emacsWithPackages
|
||||
(epkgs: with epkgs; [ vterm mu4e ]));
|
||||
})
|
||||
];
|
||||
};
|
||||
|
||||
lib = nixpkgs.lib;
|
||||
|
||||
in
|
||||
{
|
||||
in {
|
||||
nixosConfigurations.panacea = lib.nixosSystem {
|
||||
inherit system;
|
||||
modules = [
|
||||
@@ -70,7 +61,6 @@
|
||||
inputs.agenix.nixosModules.age
|
||||
inputs.nix-index-database.nixosModules.nix-index
|
||||
inputs.lanzaboote.nixosModules.lanzaboote
|
||||
inputs.determinate.nixosModules.default
|
||||
];
|
||||
specialArgs = {
|
||||
inherit inputs;
|
||||
|
||||
@@ -17,7 +17,6 @@ let
|
||||
];
|
||||
});
|
||||
soundcloud_token = builtins.readFile ../secrets/soundcloud_token;
|
||||
bandcamp_token = builtins.readFile ../secrets/bandcamp_token;
|
||||
|
||||
in
|
||||
{
|
||||
@@ -53,18 +52,18 @@ in
|
||||
mopidy-somafm
|
||||
mopidy-soundcloud
|
||||
];
|
||||
settings = {
|
||||
audio.output = "pulsesink server=127.0.0.1";
|
||||
configuration = ''
|
||||
[audio]
|
||||
output = pulsesink server=127.0.0.1
|
||||
|
||||
local = {
|
||||
media_dir = "/home/coolneng/Music";
|
||||
directories = ''
|
||||
[local]
|
||||
media_dir = /home/coolneng/Music
|
||||
directories =
|
||||
Album Artists local:directory?type=artist&role=albumartist
|
||||
Albums local:directory?type=album
|
||||
Artists local:directory?type=artist
|
||||
Genres local:directory?type=genre
|
||||
'';
|
||||
excluded_file_extensions = ''
|
||||
excluded_file_extensions =
|
||||
.directory
|
||||
.html
|
||||
.jpeg
|
||||
@@ -73,33 +72,27 @@ in
|
||||
.nfo
|
||||
.png
|
||||
.txt
|
||||
scan_timeout = 3000
|
||||
|
||||
[mpd]
|
||||
zeroconf = ""
|
||||
|
||||
[m3u]
|
||||
playlists_dir = /home/coolneng/.config/mpd/playlists
|
||||
base_dir = /home/coolneng/Music
|
||||
|
||||
[youtube]
|
||||
search_results = 50
|
||||
youtube_dl_package = yt_dlp
|
||||
musicapi_enabled = true
|
||||
|
||||
[somafm]
|
||||
encoding = aac
|
||||
quality = highest
|
||||
|
||||
[soundcloud]
|
||||
auth_token = ${soundcloud_token}
|
||||
explore_songs = 100
|
||||
'';
|
||||
scan_timeout = 3000;
|
||||
};
|
||||
|
||||
mpd.zeroconf = "";
|
||||
|
||||
m3u = {
|
||||
playlists_dir = "/home/coolneng/.config/mpd/playlists";
|
||||
base_dir = "/home/coolneng/Music";
|
||||
};
|
||||
|
||||
youtube = {
|
||||
search_results = 50;
|
||||
youtube_dl_package = "yt_dlp";
|
||||
musicapi_enabled = true;
|
||||
};
|
||||
|
||||
somafm = {
|
||||
encoding = "aac";
|
||||
quality = "highest";
|
||||
};
|
||||
|
||||
soundcloud = {
|
||||
auth_token = soundcloud_token;
|
||||
explore_songs = 100;
|
||||
};
|
||||
bandcamp.identity = bandcamp_token;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -5,9 +5,9 @@ let
|
||||
folder = ../cachix;
|
||||
toImport = name: value: folder + ("/" + name);
|
||||
filterCaches = key: value: value == "regular" && lib.hasSuffix ".nix" key;
|
||||
imports = lib.mapAttrsToList toImport (lib.filterAttrs filterCaches (builtins.readDir folder));
|
||||
in
|
||||
{
|
||||
imports = lib.mapAttrsToList toImport
|
||||
(lib.filterAttrs filterCaches (builtins.readDir folder));
|
||||
in {
|
||||
inherit imports;
|
||||
nix.binaryCaches = [ "https://cache.nixos.org/" ];
|
||||
}
|
||||
|
||||
@@ -24,7 +24,7 @@
|
||||
settings = {
|
||||
devices.zion = {
|
||||
id = "FLI2RS7-GNI5PDM-SQRNF7P-YJIOXJ7-46FRPEI-NRLQGBC-HXRWG7O-RKOVLAF";
|
||||
addresses = [ "tcp://192.168.128.2:22000" ];
|
||||
addresses = [ "tcp://192.168.13.2:22000" ];
|
||||
};
|
||||
folders = {
|
||||
Documents = {
|
||||
|
||||
@@ -1,9 +1,4 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
# Improve nix-shell and direnv integration
|
||||
|
||||
@@ -9,14 +9,16 @@ with pkgs;
|
||||
|
||||
{
|
||||
# Display manager
|
||||
services.greetd = {
|
||||
services.xserver.enable = true;
|
||||
services.xserver.displayManager = {
|
||||
defaultSession = "sway";
|
||||
autoLogin = {
|
||||
enable = true;
|
||||
settings = rec {
|
||||
initial_session = {
|
||||
command = "${sway}/bin/sway";
|
||||
user = "coolneng";
|
||||
};
|
||||
default_session = initial_session;
|
||||
lightdm = {
|
||||
enable = true;
|
||||
greeter.enable = false;
|
||||
};
|
||||
};
|
||||
|
||||
@@ -28,9 +30,9 @@ with pkgs;
|
||||
swaylock
|
||||
swayidle
|
||||
swaybg
|
||||
rofi
|
||||
rofi-wayland
|
||||
waybar
|
||||
cliphist
|
||||
clipman
|
||||
wl-clipboard
|
||||
grim
|
||||
slurp
|
||||
@@ -51,7 +53,6 @@ with pkgs;
|
||||
export NVIM_LISTEN_ADDRESS=/tmp/nvimsocket
|
||||
export GIT_CONFIG_NOSYSTEM=true
|
||||
export SYSTEMD_LESS=FRSMK
|
||||
export WLR_RENDERER=vulkan
|
||||
'';
|
||||
wrapperFeatures.gtk = true;
|
||||
};
|
||||
|
||||
@@ -1,65 +1,55 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [
|
||||
"nvme"
|
||||
"xhci_pci"
|
||||
"usbhid"
|
||||
];
|
||||
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "usbhid" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "syscea/stateful/root";
|
||||
fileSystems."/" =
|
||||
{ device = "syscea/stateful/root";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
fileSystems."/nix" = {
|
||||
device = "syscea/ephemeral/nix";
|
||||
fileSystems."/nix" =
|
||||
{ device = "syscea/ephemeral/nix";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
fileSystems."/ugent" = {
|
||||
device = "systemd-1";
|
||||
fileSystems."/ugent" =
|
||||
{ device = "systemd-1";
|
||||
fsType = "autofs";
|
||||
};
|
||||
|
||||
fileSystems."/home/coolneng" = {
|
||||
device = "syscea/stateful/home";
|
||||
fileSystems."/home/coolneng" =
|
||||
{ device = "syscea/stateful/home";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
fileSystems."/tmp" = {
|
||||
device = "syscea/ephemeral/tmp";
|
||||
fileSystems."/tmp" =
|
||||
{ device = "syscea/ephemeral/tmp";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
fileSystems."/home/coolneng/Downloads" = {
|
||||
device = "syscea/stateful/home/downloads";
|
||||
fileSystems."/home/coolneng/Downloads" =
|
||||
{ device = "syscea/stateful/home/downloads";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/C374-A2FD";
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/C374-A2FD";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [
|
||||
{ device = "/dev/disk/by-uuid/1231a42f-a71a-4c67-b4d8-7506c02a8328"; }
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/1231a42f-a71a-4c67-b4d8-7506c02a8328"; }
|
||||
];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
|
||||
@@ -1,28 +0,0 @@
|
||||
{
|
||||
lib,
|
||||
pkgs,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
|
||||
let
|
||||
isUnstable = config.boot.zfs.package == pkgs.zfs_unstable;
|
||||
zfsCompatibleKernelPackages = lib.filterAttrs (
|
||||
name: kernelPackages:
|
||||
(builtins.match "linux_[0-9]+_[0-9]+" name) != null
|
||||
&& (builtins.tryEval kernelPackages).success
|
||||
&& (
|
||||
(!isUnstable && !kernelPackages.zfs.meta.broken)
|
||||
|| (isUnstable && !kernelPackages.zfs_unstable.meta.broken)
|
||||
)
|
||||
) pkgs.linuxKernel.packages;
|
||||
latestKernelPackage = lib.last (
|
||||
lib.sort (a: b: (lib.versionOlder a.kernel.version b.kernel.version)) (
|
||||
builtins.attrValues zfsCompatibleKernelPackages
|
||||
)
|
||||
);
|
||||
in
|
||||
{
|
||||
# Note this might jump back and worth as kernel get added or removed.
|
||||
boot.kernelPackages = lib.mkIf (lib.meta.availableOn pkgs.hostPlatform pkgs.zfs) latestKernelPackage;
|
||||
}
|
||||
@@ -1,9 +1,4 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with pkgs;
|
||||
|
||||
@@ -11,8 +6,7 @@ let
|
||||
sender = "akasroua@disroot.org";
|
||||
recipient = "akasroua+smart@disroot.org";
|
||||
|
||||
in
|
||||
{
|
||||
in {
|
||||
# Notify when a disk starts going haywire
|
||||
services.smartd = {
|
||||
enable = true;
|
||||
|
||||
@@ -1,15 +1,8 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
wireguard_port = "1194";
|
||||
let wireguard_port = "1194";
|
||||
|
||||
in
|
||||
{
|
||||
in {
|
||||
# Set hostname, hostid and enable WiFi
|
||||
networking = {
|
||||
hostName = "panacea";
|
||||
@@ -53,11 +46,11 @@ in
|
||||
name = "wlan0";
|
||||
matchConfig = {
|
||||
Name = "wlan0";
|
||||
SSID = "anakinosi-5GHz";
|
||||
SSID = "Zingarata";
|
||||
};
|
||||
address = [ "192.168.129.3/23" ];
|
||||
gateway = [ "192.168.128.1" ];
|
||||
dns = [ "192.168.128.2" ];
|
||||
address = [ "192.168.13.131/24" ];
|
||||
gateway = [ "192.168.13.1" ];
|
||||
dns = [ "192.168.13.2" ];
|
||||
networkConfig.MulticastDNS = "yes";
|
||||
};
|
||||
|
||||
@@ -69,7 +62,7 @@ in
|
||||
};
|
||||
address = [ "192.168.13.3/24" ];
|
||||
gateway = [ "192.168.13.1" ];
|
||||
dns = [ "1.1.1.1" ];
|
||||
dns = [ "192.168.13.2" ];
|
||||
networkConfig.MulticastDNS = "yes";
|
||||
};
|
||||
|
||||
@@ -84,45 +77,33 @@ in
|
||||
PrivateKeyFile = config.age.secrets.wireguard.path;
|
||||
FirewallMark = 34952;
|
||||
};
|
||||
wireguardPeers = [
|
||||
{
|
||||
wireguardPeers = [{
|
||||
PublicKey = "GN8lqPBZYOulh6xD4GhkoEWI65HMMCpSxJSH5871YnU=";
|
||||
AllowedIPs = [
|
||||
"0.0.0.0/0"
|
||||
"::0"
|
||||
];
|
||||
Endpoint = "psydnd.org:1194";
|
||||
}
|
||||
];
|
||||
AllowedIPs = [ "0.0.0.0/0" ];
|
||||
Endpoint = "coolneng.duckdns.org:1194";
|
||||
}];
|
||||
};
|
||||
systemd.network.networks."wg0" = {
|
||||
matchConfig.Name = "wg0";
|
||||
linkConfig.ActivationPolicy = "manual";
|
||||
networkConfig = {
|
||||
Address = [
|
||||
"10.8.0.2/32"
|
||||
"fd00::2/128"
|
||||
];
|
||||
DNS = [
|
||||
"10.8.0.1"
|
||||
"fd00::2"
|
||||
];
|
||||
Address = "10.8.0.2/32";
|
||||
DNS = "10.8.0.1";
|
||||
DNSDefaultRoute = true;
|
||||
Domains = "~.";
|
||||
MulticastDNS = "yes";
|
||||
};
|
||||
routingPolicyRules = [
|
||||
{
|
||||
routingPolicyRules = [{
|
||||
FirewallMark = 34952;
|
||||
InvertRule = true;
|
||||
Table = 1000;
|
||||
Priority = 10;
|
||||
}
|
||||
];
|
||||
routes = [
|
||||
{
|
||||
}];
|
||||
routes = [{
|
||||
Gateway = "10.8.0.1";
|
||||
GatewayOnLink = true;
|
||||
Table = 1000;
|
||||
}
|
||||
];
|
||||
}];
|
||||
};
|
||||
|
||||
# Firewall configuration
|
||||
@@ -144,15 +125,4 @@ in
|
||||
iptables -t mangle -D nixos-fw-rpfilter -p udp -m udp --dport ${wireguard_port} -j RETURN || true
|
||||
'';
|
||||
};
|
||||
|
||||
# Enable localhost SSH
|
||||
services.openssh = {
|
||||
enable = true;
|
||||
openFirewall = false;
|
||||
startWhenNeeded = true;
|
||||
settings = {
|
||||
PermitRootLogin = "without-password";
|
||||
PasswordAuthentication = false;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,65 +1,94 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with pkgs;
|
||||
|
||||
let
|
||||
isync-oauth2 = (isync.override { withCyrusSaslXoauth2 = true; });
|
||||
let isync-oauth2 = (isync.override { withCyrusSaslXoauth2 = true; });
|
||||
|
||||
in
|
||||
{
|
||||
in {
|
||||
# Upgrade Doom Emacs daily
|
||||
systemd.user.services.doom-upgrade = {
|
||||
description = "Upgrade Doom Emacs";
|
||||
path = [
|
||||
bash
|
||||
emacs-vterm
|
||||
git
|
||||
coreutils
|
||||
];
|
||||
path = [ bash emacs-vterm git coreutils ];
|
||||
script = ''
|
||||
/home/coolneng/.emacs.d/bin/doom -! upgrade
|
||||
${pkgs.bash}/bin/bash -c "/home/coolneng/.emacs.d/bin/doom -! upgrade"
|
||||
'';
|
||||
serviceConfig.Type = "oneshot";
|
||||
startAt = "22:00:00";
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
# Upgrade Neovim plugins weekly
|
||||
systemd.user.services.vim-plug-upgrade = {
|
||||
description = "Upgrade Vim-Plug";
|
||||
path = [ git neovim ];
|
||||
script = "${pkgs.neovim}/bin/nvim +PlugUpgrade +PlugUpdate +qa";
|
||||
serviceConfig.Type = "oneshot";
|
||||
startAt = "Wed 18:00:00";
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
# Push password-store changes to git daily
|
||||
systemd.user.services.password-store-push = {
|
||||
description = "Push password-store changes to git";
|
||||
path = [
|
||||
pass-wayland
|
||||
git
|
||||
pass-git-helper
|
||||
];
|
||||
path = [ pass-wayland git gitAndTools.pass-git-helper ];
|
||||
script = "${pkgs.pass-wayland}/bin/pass git push";
|
||||
serviceConfig.Type = "oneshot";
|
||||
startAt = "18:00:00";
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
# Sync mail using IMAP IDLE
|
||||
systemd.user.services.goimapnotify = {
|
||||
description = "Sync mail using IMAP IDLE";
|
||||
# Sync mail using IDLE
|
||||
systemd.user.services.goimapnotify-ugent = {
|
||||
description = "Sync UGent mail using IMAP IDLE";
|
||||
wantedBy = [ "default.target" ];
|
||||
path = [
|
||||
goimapnotify
|
||||
pass-wayland
|
||||
isync-oauth2
|
||||
mu
|
||||
python39
|
||||
gnupg
|
||||
nix
|
||||
procps
|
||||
emacs-vterm
|
||||
];
|
||||
script = ''
|
||||
${pkgs.goimapnotify}/bin/goimapnotify -conf /home/coolneng/.config/goimapnotify/goimapnotify.yaml
|
||||
${pkgs.goimapnotify}/bin/goimapnotify -conf /home/coolneng/.config/goimapnotify/ugent.conf
|
||||
'';
|
||||
serviceConfig = {
|
||||
ExecStartPre = "/home/coolneng/.local/share/scripts/mail-sync";
|
||||
ExecStartPre = "/home/coolneng/.local/share/scripts/mail-sync ugent";
|
||||
Type = "simple";
|
||||
Restart = "always";
|
||||
RestartSec = 20;
|
||||
};
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
systemd.user.services.goimapnotify-gmail = {
|
||||
description = "Sync gmail mail using IMAP IDLE";
|
||||
wantedBy = [ "default.target" ];
|
||||
path = [ goimapnotify pass-wayland isync-oauth2 mu procps emacs-vterm ];
|
||||
script = ''
|
||||
${pkgs.goimapnotify}/bin/goimapnotify -conf /home/coolneng/.config/goimapnotify/gmail.conf
|
||||
'';
|
||||
serviceConfig = {
|
||||
ExecStartPre = "/home/coolneng/.local/share/scripts/mail-sync gmail";
|
||||
Type = "simple";
|
||||
Restart = "always";
|
||||
RestartSec = 20;
|
||||
};
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
systemd.user.services.goimapnotify-disroot = {
|
||||
description = "Sync disroot mail using IMAP IDLE";
|
||||
wantedBy = [ "default.target" ];
|
||||
path = [ goimapnotify pass-wayland isync-oauth2 mu procps emacs-vterm ];
|
||||
script = ''
|
||||
${pkgs.goimapnotify}/bin/goimapnotify -conf /home/coolneng/.config/goimapnotify/disroot.conf
|
||||
'';
|
||||
serviceConfig = {
|
||||
ExecStartPre = "/home/coolneng/.local/share/scripts/mail-sync disroot";
|
||||
Type = "simple";
|
||||
Restart = "always";
|
||||
RestartSec = 20;
|
||||
@@ -71,16 +100,8 @@ in
|
||||
systemd.user.services.periodic-mail-sync = {
|
||||
description = "Run a mail sync operation periodically";
|
||||
wantedBy = [ "default.target" ];
|
||||
path = [
|
||||
pass-wayland
|
||||
isync-oauth2
|
||||
mu
|
||||
procps
|
||||
emacs-vterm
|
||||
python3
|
||||
gnupg
|
||||
nix
|
||||
];
|
||||
path =
|
||||
[ pass-wayland isync-oauth2 mu procps emacs-vterm python39 gnupg nix ];
|
||||
script = ''
|
||||
/home/coolneng/.local/share/scripts/mail-sync -a
|
||||
'';
|
||||
@@ -95,34 +116,26 @@ in
|
||||
script = "chmod 751 /home/coolneng";
|
||||
serviceConfig.Type = "oneshot";
|
||||
after = [ "home-coolneng.mount" ];
|
||||
before = [
|
||||
"mopidy.service"
|
||||
"mopidy-scan.service"
|
||||
];
|
||||
before = [ "mopidy.service" "mopidy-scan.service" ];
|
||||
};
|
||||
|
||||
# Push panacea changes to git daily
|
||||
systemd.user.services.panacea-push = {
|
||||
description = "Push panacea changes to git";
|
||||
path = [
|
||||
pass-wayland
|
||||
git
|
||||
pass-git-helper
|
||||
];
|
||||
path = [ pass-wayland git gitAndTools.pass-git-helper ];
|
||||
script = "${pkgs.git}/bin/git -C /home/coolneng/Projects/panacea push";
|
||||
serviceConfig.Type = "oneshot";
|
||||
startAt = "18:00:00";
|
||||
startAt = "14:00:00";
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
|
||||
# Show notification when the battery is low
|
||||
systemd.user.services.swaynag-battery = {
|
||||
description = "Show notification when the battery is low";
|
||||
path = [
|
||||
swaynag-battery
|
||||
sway
|
||||
];
|
||||
script = "${pkgs.swaynag-battery}/bin/swaynag-battery --threshold 10";
|
||||
wantedBy = [ "sway-session.target" ];
|
||||
# Pull changes from zion daily
|
||||
systemd.user.services.zion-pull = {
|
||||
description = "Pull zion changes to git";
|
||||
path = [ git ];
|
||||
script = "${pkgs.git}/bin/git -C /home/coolneng/Projects/zion pull";
|
||||
serviceConfig.Type = "oneshot";
|
||||
startAt = "10:00:00";
|
||||
after = [ "network-online.target" ];
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,9 +1,4 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
# Enable power-profiles-daemon
|
||||
|
||||
@@ -1,18 +1,10 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
# Enable CUPS
|
||||
services.printing = {
|
||||
enable = true;
|
||||
drivers = with pkgs; [
|
||||
brgenml1cupswrapper
|
||||
hplip
|
||||
];
|
||||
drivers = with pkgs; [ brgenml1cupswrapper hplip ];
|
||||
};
|
||||
|
||||
# Enable SANE
|
||||
|
||||
@@ -36,7 +36,7 @@ in
|
||||
gnupg
|
||||
pass-wayland
|
||||
passff-host
|
||||
pass-git-helper
|
||||
gitAndTools.pass-git-helper
|
||||
inputs.agenix.packages.${config.nixpkgs.localSystem.system}.default
|
||||
git-crypt
|
||||
git-lfs
|
||||
@@ -48,6 +48,7 @@ in
|
||||
texlab
|
||||
# Text editors
|
||||
neovim
|
||||
neovim-remote
|
||||
emacs-vterm
|
||||
# Emacs dependencies
|
||||
(ripgrep.override { withPCRE2 = true; })
|
||||
@@ -63,15 +64,14 @@ in
|
||||
direnv
|
||||
nix-direnv
|
||||
gnumake
|
||||
pre-commit
|
||||
emacs-lsp-booster
|
||||
gitAndTools.pre-commit
|
||||
# Rice
|
||||
adapta-gtk-theme
|
||||
paper-icon-theme
|
||||
# Audio
|
||||
mopidy
|
||||
ncmpcpp
|
||||
mpc
|
||||
mpc_cli
|
||||
pulsemixer
|
||||
easyeffects
|
||||
patched-bitwig
|
||||
@@ -88,9 +88,9 @@ in
|
||||
# Media
|
||||
gimp
|
||||
custom-mpv
|
||||
nodePackages.webtorrent-cli
|
||||
deluge
|
||||
yt-dlp-light
|
||||
ffmpeg
|
||||
calibre
|
||||
beets
|
||||
# File management
|
||||
@@ -110,8 +110,8 @@ in
|
||||
## Nix
|
||||
nixfmt-rfc-style
|
||||
## Python
|
||||
ty
|
||||
ruff
|
||||
pyright
|
||||
black
|
||||
## C/C++
|
||||
clang-tools
|
||||
## Go
|
||||
@@ -124,11 +124,11 @@ in
|
||||
# Fonts declaration
|
||||
fonts.packages = with pkgs; [
|
||||
google-fonts
|
||||
inconsolata-nerdfont
|
||||
terminus_font_ttf
|
||||
iosevka-bin
|
||||
libertine
|
||||
nerd-fonts.inconsolata
|
||||
nerd-fonts.symbols-only
|
||||
(nerdfonts.override { fonts = [ "NerdFontsSymbolsOnly" ]; })
|
||||
];
|
||||
|
||||
}
|
||||
|
||||
Binary file not shown.
BIN
secrets/samba-ugent.age
Normal file
BIN
secrets/samba-ugent.age
Normal file
Binary file not shown.
@@ -1,8 +1,9 @@
|
||||
let
|
||||
coolneng = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC57m1j/G6iQyi2EpU3nj3+df5Z4PL/XbiOmDcqA7ODg";
|
||||
in
|
||||
{
|
||||
coolneng =
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC57m1j/G6iQyi2EpU3nj3+df5Z4PL/XbiOmDcqA7ODg";
|
||||
in {
|
||||
"wireguard.age".publicKeys = [ coolneng ];
|
||||
"syncthing.age".publicKeys = [ coolneng ];
|
||||
"samba-ugent.age".publicKeys = [ coolneng ];
|
||||
"msmtp.age".publicKeys = [ coolneng ];
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user