Run nix fmt

This commit is contained in:
Thomas Avé 2026-03-11 18:13:34 +07:00
parent df9449315d
commit c22aee3927
63 changed files with 3851 additions and 3637 deletions

View File

@ -29,16 +29,25 @@
};
};
outputs = { nixpkgs, home-manager, nur, nixos-06cb-009a-fingerprint-sensor, ... }@inputs:
let
system = "x86_64-linux";
outputs = {
nixpkgs,
home-manager,
nur,
nixos-06cb-009a-fingerprint-sensor,
...
} @ inputs: let
supportedSystems = ["x86_64-linux" "aarch64-linux"];
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
system = builtins.currentSystem;
pkgs = nixpkgs.legacyPackages.${system};
commonModules = host: user: [
./hosts/${host}/hardware-configuration.nix
{ nixpkgs.overlays = [
{
nixpkgs.overlays = [
nur.overlays.default
(self: super: {utillinux = super.util-linux;})
]; }
];
}
{
networking.hostName = host;
time.timeZone = "Asia/Bangkok";
@ -87,12 +96,14 @@
}
./hosts/${host}
];
mkSystem = host: cfg:
let
mkSystem = host: cfg: let
system = cfg.system or "x86_64-linux";
in
nixpkgs.lib.nixosSystem {
modules = (commonModules host cfg.user) ++ (cfg.modules or [ ]) ++ [
modules =
(commonModules host cfg.user)
++ (cfg.modules or [])
++ [
{nixpkgs.hostPlatform = system;}
];
specialArgs = inputs;
@ -101,13 +112,19 @@
Riva = {user = "user";};
Kell = {user = "user";};
Aloria = {user = "user";};
Arendia = { user = "user"; modules = [
Arendia = {
user = "user";
modules = [
nixos-06cb-009a-fingerprint-sensor.nixosModules."06cb-009a-fingerprint-sensor"
];};
];
};
Asturia = {user = "user";};
};
in
{
in {
nixosConfigurations = nixpkgs.lib.mapAttrs mkSystem systems;
formatter = forAllSystems (
system:
nixpkgs.legacyPackages.${system}.alejandra
);
};
}

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
fzgo_paths = {
files = [
"/home/user/.dotfiles"
@ -9,8 +13,7 @@ let
"/Storage/TrackBox"
];
};
in
{
in {
imports = [
(import ./utils/desktop.nix {inherit inputs config pkgs;})
(import ./utils/fzgo_links.nix {inherit config pkgs fzgo_paths;})

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
fzgo_paths = {
files = [
"/home/user/.dotfiles"
@ -9,8 +13,7 @@ let
"/Storage/TrackBox/"
];
};
in
{
in {
imports = [
(import ./utils/desktop.nix {inherit inputs config pkgs;})
(import ./utils/fzgo_links.nix {inherit config pkgs fzgo_paths;})

View File

@ -1,7 +1,10 @@
{ inputs, config, pkgs, ... }:
let
in
{
inputs,
config,
pkgs,
...
}: let
in {
home.username = "ubuntu";
home.homeDirectory = "/home/ubuntu";
nix = {

View File

@ -1,6 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
imports = [
(import ./utils/desktop.nix {inherit inputs config pkgs;})
];

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
home.username = "user";
home.homeDirectory = "/home/user";

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
fzgo_paths = {
files = [
"/home/user/.dotfiles"
@ -12,8 +16,7 @@ let
"/home/server/.cache/fzgo/entries/d/|home|server|Storage|Shared"
];
};
in
{
in {
imports = [
(import ./utils/desktop.nix {inherit inputs config pkgs;})
(import ./utils/fzgo_links.nix {inherit config pkgs fzgo_paths;})

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
username = "server";
home_dir = "/home/${username}";
scripts = {

View File

@ -1,7 +1,10 @@
{ inputs, config, pkgs, ... }:
let
in
{
inputs,
config,
pkgs,
...
}: let
in {
home.username = "user";
home.homeDirectory = "/home/user";
nix = {

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
fzgo_paths = {
files = [
"/home/user/.dotfiles"
@ -12,8 +16,7 @@ let
"/home/server/.cache/fzgo/entries/d/|home|server|Storage|Shared"
];
};
in
{
in {
imports = [
(import ./utils/fzgo_links.nix {inherit config pkgs fzgo_paths;})
(import ./utils/desktop.nix {inherit inputs config pkgs;})

View File

@ -1,6 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
home.username = "user";
home.homeDirectory = "/home/user";
nix = {

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
let
{
inputs,
config,
pkgs,
...
}: let
scripts = {
disk_check = {
when = "*-*-* *:00:00";
@ -47,8 +51,7 @@ let
'');
};
};
in
{
in {
home.username = "server";
home.homeDirectory = "/home/server";
nix = {
@ -59,7 +62,10 @@ in
xdg.enable = true;
imports = [
(import ./utils/common.nix {inherit inputs config pkgs;})
(import ./utils/services.nix { inherit pkgs; scripts = scripts; })
(import ./utils/services.nix {
inherit pkgs;
scripts = scripts;
})
./ssh
];

View File

@ -1,5 +1,8 @@
{ inputs, pkgs, ... }:
{
inputs,
pkgs,
...
}: {
# add the home manager module
imports = [inputs.ags.homeManagerModules.default];
programs.ags = {

View File

@ -1,6 +1,4 @@
{ pkgs, ... }:
{
{pkgs, ...}: {
programs.alacritty = {
enable = true;
settings = {

View File

@ -1,6 +1,9 @@
{ config, inputs, pkgs, ... }:
{
config,
inputs,
pkgs,
...
}: {
programs.starship = {
enable = true;
enableBashIntegration = true;

View File

@ -1,9 +1,10 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home.file = {
".mailcap".text =
"text/html; w3m -dump -o -document_charset=%{charset} %s; nametemplate=%s.html; copiousoutput";
".mailcap".text = "text/html; w3m -dump -o -document_charset=%{charset} %s; nametemplate=%s.html; copiousoutput";
};
home.packages = with pkgs; [mailcap];
@ -177,13 +178,11 @@
dirlist-tree = true;
};
viewer = {
pager =
"${pkgs.neovim}/bin/nvim -u ${config.xdg.configHome}/nvim/aerc.lua";
pager = "${pkgs.neovim}/bin/nvim -u ${config.xdg.configHome}/nvim/aerc.lua";
};
compose = {address-book-cmd = ''notmuch address "%s"'';};
multipart-converters = {
"text/html" =
"${pkgs.w3m}/bin/w3m -dump -o display_link_number=1 -T text/html";
"text/html" = "${pkgs.w3m}/bin/w3m -dump -o display_link_number=1 -T text/html";
};
filters = {
"text/plain" = "cat";
@ -198,22 +197,17 @@
Zoho = {
outgoing = "smtps://email%40thomasave.be@smtp.zoho.com";
outgoing-cred-cmd = "cat ~/.secrets/Aerc/Zoho.key";
source =
"maildir:///home/server/Storage/Thomas/Mail/email@thomasave.be/";
check-mail-cmd =
"ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
source = "maildir:///home/server/Storage/Thomas/Mail/email@thomasave.be/";
check-mail-cmd = "ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
check-mail-timeout = "60s";
default = "Inbox";
from = ''"Thomas Avé" <email@thomasave.be>'';
cache-headers = true;
};
UAntwerpen = {
outgoing =
"ssh server@192.168.1.2 /home/server/Containers/mbsync/send.sh";
source =
"maildir:///home/server/Storage/Thomas/Mail/Thomas.Ave@uantwerpen.be";
check-mail-cmd =
"ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
outgoing = "ssh server@192.168.1.2 /home/server/Containers/mbsync/send.sh";
source = "maildir:///home/server/Storage/Thomas/Mail/Thomas.Ave@uantwerpen.be";
check-mail-cmd = "ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
check-mail-timeout = "60s";
default = "Inbox";
from = ''"Thomas Avé" <Thomas.Ave@uantwerpen.be>'';
@ -222,10 +216,8 @@
IMEC = {
outgoing = "smtp+insecure://ave57%40imec.be@smtp.thomasave.be:1025";
outgoing-cred-cmd = "cat ~/.secrets/Aerc/IMEC.key";
source =
"maildir:///home/server/Storage/Thomas/Mail/Thomas.Ave@imec.be/";
check-mail-cmd =
"ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
source = "maildir:///home/server/Storage/Thomas/Mail/Thomas.Ave@imec.be/";
check-mail-cmd = "ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
check-mail-timeout = "60s";
default = "Inbox";
from = ''"Thomas Avé" <Thomas.Ave@imec.be>'';
@ -233,8 +225,7 @@
};
NotMuch = {
source = "notmuch:///home/server/Storage/Thomas/Mail/";
check-mail-cmd =
"ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
check-mail-cmd = "ssh server@10.1 /home/server/Containers/mbsync/sync.sh";
check-mail-timeout = "60s";
from = ''"Thomas Avé" <Thomas.Ave@uantwerpen.be>'';
query-map = "${config.xdg.configHome}/aerc/map.conf";
@ -244,8 +235,7 @@
};
};
home.file."${config.xdg.configHome}/aerc/map.conf".text =
"Inbox=tag:inbox and not tag:archived and not tag:deleted";
home.file."${config.xdg.configHome}/aerc/map.conf".text = "Inbox=tag:inbox and not tag:archived and not tag:deleted";
home.file."${config.xdg.configHome}/aerc/stylesets/catppuccin-mocha".text = ''
*.default=true
*.normal=true

View File

@ -1,11 +1,9 @@
{ pkgs, ... }:
let
{pkgs, ...}: let
lock-false = {
Value = false;
Status = "locked";
};
in
{
in {
programs.firefox = {
enable = true;
package = pkgs.wrapFirefox pkgs.firefox-unwrapped {
@ -24,8 +22,7 @@ in
};
ExtensionSettings = {
"{3e4d2037-d300-4e95-859d-3cba866f46d3}" = {
install_url =
"https://addons.mozilla.org/firefox/downloads/latest/private-internet-access-ext/latest.xpi";
install_url = "https://addons.mozilla.org/firefox/downloads/latest/private-internet-access-ext/latest.xpi";
installation_mode = "force_installed";
};
"{c7c120ff-2878-4e59-a5a3-cd4d1655bc13}" = {

View File

@ -1,5 +1,4 @@
{ ... }:
{
{...}: {
programs.foot = {
enable = true;
server.enable = true;
@ -13,7 +12,7 @@
sixel = "yes";
};
scrollback.lines = 100000;
colors = {
colors-dark = {
background = "000010";
foreground = "F8F8F2";
regular0 = "121212";

View File

@ -1,5 +1,4 @@
{ ... }:
{
{...}: {
programs.ghostty = {
enable = true;
enableZshIntegration = true;
@ -39,7 +38,6 @@
font-family = "JetBrains Mono";
window-decoration = false;
# adjust-cell-height = "10%";
};
};
}

View File

@ -1,6 +1,4 @@
{ pkgs, ... }:
{
{pkgs, ...}: {
programs.git = {
enable = true;
lfs.enable = true;

View File

@ -1,5 +1,4 @@
{ pkgs, ... }:
{
{pkgs, ...}: {
home.packages = [
(pkgs.appimageTools.wrapType2 {
pname = "Helium";

View File

@ -1,5 +1,4 @@
{ pkgs, ... }:
let
{pkgs, ...}: let
playerctl = "${pkgs.playerctl}/bin/playerctl";
nautilus = "${pkgs.nautilus}/bin/nautilus";
gnome-calendar = "${pkgs.gnome-calendar}/bin/gnome-calendar";
@ -232,7 +231,8 @@ in {
"$mainMod $altMod, K, resizeactive, 0 -20"
"$mainMod $altMod, J, resizeactive, 0 20"
];
bind = [
bind =
[
"$mainMod, return, exec, ${launch_terminal}/bin/launch_terminal $(hyprctl activewindow -j | ${jq} .pid)"
"$mainMod SHIFT, return, exec, ${terminal}"
"$mainMod, Q, killactive,"
@ -282,16 +282,16 @@ in {
"$mainMod SHIFT, TAB, ${workspace_command_prefix}workspace, m-1"
"$mainMod, Caps_Lock, ${workspace_command_prefix}workspace, m+1"
"$mainMod SHIFT, Caps_Lock, ${workspace_command_prefix}workspace, m-1"
] ++ (
]
++ (
# workspaces
builtins.concatLists (builtins.genList (x:
let
builtins.concatLists (builtins.genList (x: let
ws = let c = (x + 1) / 10; in builtins.toString (x + 1 - (c * 10));
in
[
in [
"$mainMod, ${ws}, ${workspace_command_prefix}workspace, ${toString (x + 1)}"
"$mainMod SHIFT, ${ws}, ${workspace_command_prefix}movetoworkspace, ${toString (x + 1)}"
]) 10));
]) 10)
);
};
};
}

View File

@ -1,6 +1,4 @@
{ lib, ... }:
{
{lib, ...}: {
programs.kitty = {
enable = true;
shellIntegration.enableZshIntegration = true;

View File

@ -1,6 +1,8 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home.file."${config.xdg.configHome}/lf" = {
source = ./files;
recursive = true;

View File

@ -1,6 +1,8 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home.file."${config.xdg.configHome}/mpv" = {
source = ./files;
recursive = true;

View File

@ -1,6 +1,8 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home.packages = with pkgs; [
# codeium
nixd

View File

@ -1,6 +1,8 @@
{ config, pkgs, ... }:
{
config,
pkgs,
...
}: {
home.packages = with pkgs; [papirus-icon-theme];
programs.rofi = {
@ -13,8 +15,8 @@
kb-cancel = "Super_L+XF86Launch5,Escape";
combi-hide-mode-prefix = true;
};
theme =
let inherit (config.lib.formats.rasi) mkLiteral;
theme = let
inherit (config.lib.formats.rasi) mkLiteral;
in {
"*" = {
background = mkLiteral "#0f111a";

View File

@ -1,6 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
programs.ssh = {
enable = true;
enableDefaultConfig = false;

View File

@ -1,5 +1,4 @@
{ pkgs, ... }:
{
{pkgs, ...}: {
programs.tmux = {
shell = "${pkgs.zsh}/bin/zsh";
terminal = "screen-256color";

View File

@ -1,6 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
imports = [
(import ../zsh {inherit inputs config pkgs;})
(import ../bash {inherit inputs config pkgs;})
@ -48,5 +51,4 @@
$pdf_mode = 1;
$pdf_previewer = 'evince %O %S';
'';
}

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
imports = [
(import ./common.nix {inherit inputs config pkgs;})
(import ./python.nix {inherit inputs config pkgs;})

View File

@ -1,5 +1,4 @@
{ pkgs }:
{
{pkgs}: {
when = "*-*-* *:00:00";
script = toString (pkgs.writeShellScript "script" ''
REPORT_EMAIL=email@thomasave.be

View File

@ -1,5 +1,8 @@
{ config, pkgs, fzgo_paths }:
let
{
config,
pkgs,
fzgo_paths,
}: let
mkLink = source_path: file_type: {
"${source_path}-${file_type}" = {
source = config.lib.file.mkOutOfStoreSymlink source_path;

View File

@ -1,5 +1,4 @@
{ pkgs, ... }:
let
{pkgs, ...}: let
pythonldlibpath = pkgs.lib.makeLibraryPath (with pkgs; [
libGL
glib
@ -20,19 +19,22 @@ let
systemd
]);
# Darwin requires a different library path prefix
wrapPrefix = if (!pkgs.stdenv.isDarwin) then "LD_LIBRARY_PATH" else "DYLD_LIBRARY_PATH";
wrapPrefix =
if (!pkgs.stdenv.isDarwin)
then "LD_LIBRARY_PATH"
else "DYLD_LIBRARY_PATH";
# pythonOverlay = (pkgs.python313.withPackages (ps: [
# (ps.torch.override { rocmSupport = true; })
# ]));
patchedpython = (pkgs.symlinkJoin {
patchedpython = pkgs.symlinkJoin {
name = "python";
paths = [pkgs.python313];
buildInputs = [pkgs.makeWrapper];
postBuild = ''
wrapProgram "$out/bin/python3.13" --prefix ${wrapPrefix} : "${pythonldlibpath}"
'';
});
};
in {
home.packages = [
patchedpython

View File

@ -1,6 +1,9 @@
{ pkgs, scripts }:
let
notify_script = (pkgs.writers.writePython3Bin "telegram-notify.py"
{
pkgs,
scripts,
}: let
notify_script =
pkgs.writers.writePython3Bin "telegram-notify.py"
{
libraries = [pkgs.python3Packages.python-telegram-bot];
} ''
@ -52,7 +55,7 @@ let
loop = asyncio.get_event_loop()
loop.run_until_complete(asyncio.wait([loop.create_task(run())]))
loop.close()
'');
'';
mkTimer = name: cfg: {
Install.WantedBy = ["timers.target"];
@ -68,9 +71,9 @@ let
# Install = { WantedBy = [ "default.target" ]; };
Service = {ExecStart = cfg.script;};
};
in
{
systemd.user.services = pkgs.lib.mapAttrs mkService scripts
in {
systemd.user.services =
pkgs.lib.mapAttrs mkService scripts
// (pkgs.lib.mapAttrs mkService {
"status_notify@" = {
script = "${notify_script}/bin/telegram-notify.py %i";

View File

@ -1,4 +1,5 @@
{ inputs, ... }: # Add inputs here
{inputs, ...}:
# Add inputs here
{
# Import the module definition here
imports = [inputs.vicinae.homeManagerModules.default];

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
imports = [inputs.walker.homeManagerModules.walker];
programs.walker = {
enable = true;

View File

@ -1,6 +1,8 @@
{ inputs, pkgs, ... }:
{
inputs,
pkgs,
...
}: {
programs.waybar = {
enable = true;
package = inputs.waybar.packages.${pkgs.stdenv.hostPlatform.system}.waybar;

View File

@ -1,6 +1,4 @@
{...}:
{
{...}: {
programs.yazi = {
enable = true;
enableZshIntegration = true;
@ -13,16 +11,56 @@
keymap = {
mgr.normal = [
{ on = [ "j" ]; run = "down"; desc = "Move cursor down"; }
{ on = [ "k" ]; run = "up"; desc = "Move cursor up"; }
{ on = [ "h" ]; run = "back"; desc = "Go back to parent directory"; }
{ on = [ "l" ]; run = "forward"; desc = "Enter directory / open file"; }
{ on = [ "q" ]; run = "quit"; desc = "Quit yazi"; }
{ on = [ " " ]; run = "select"; desc = "Select the current file"; }
{ on = [ "v" ]; run = "visual_mode"; desc = "Enter visual mode"; }
{ on = [ "y" ]; run = "yank"; desc = "Yank selection"; }
{ on = [ "p" ]; run = "paste"; desc = "Paste files"; }
{ on = [ "d" ]; run = "remove --permanently"; desc = "Delete permanently"; }
{
on = ["j"];
run = "down";
desc = "Move cursor down";
}
{
on = ["k"];
run = "up";
desc = "Move cursor up";
}
{
on = ["h"];
run = "back";
desc = "Go back to parent directory";
}
{
on = ["l"];
run = "forward";
desc = "Enter directory / open file";
}
{
on = ["q"];
run = "quit";
desc = "Quit yazi";
}
{
on = [" "];
run = "select";
desc = "Select the current file";
}
{
on = ["v"];
run = "visual_mode";
desc = "Enter visual mode";
}
{
on = ["y"];
run = "yank";
desc = "Yank selection";
}
{
on = ["p"];
run = "paste";
desc = "Paste files";
}
{
on = ["d"];
run = "remove --permanently";
desc = "Delete permanently";
}
];
};
};

View File

@ -1,5 +1,4 @@
{ config, ... }:
{
{config, ...}: {
programs.zellij = {
enable = true;
};

View File

@ -1,6 +1,9 @@
{ config, inputs, pkgs, ... }:
{
config,
inputs,
pkgs,
...
}: {
home.packages = [
pkgs.fzy
pkgs.lf

View File

@ -1,5 +1,10 @@
{ pkgs, lib, inputs, config, ... }:
let
{
pkgs,
lib,
inputs,
config,
...
}: let
serverIP = "10.0.0.1";
in {
imports = [
@ -24,13 +29,25 @@ in {
services.thinkfan.settings = {
sensors = [
# Search for 'coretemp' anywhere in /sys/class/hwmon
{ hwmon = "/sys/class/hwmon"; name = "coretemp"; indices = [ 1 ]; }
{
hwmon = "/sys/class/hwmon";
name = "coretemp";
indices = [1];
}
# Search for 'acpitz'
{ hwmon = "/sys/class/hwmon"; name = "acpitz"; indices = [ 1 ]; }
{
hwmon = "/sys/class/hwmon";
name = "acpitz";
indices = [1];
}
# Search for 'nvme'
{ hwmon = "/sys/class/hwmon"; name = "nvme"; indices = [ 1 ]; }
{
hwmon = "/sys/class/hwmon";
name = "nvme";
indices = [1];
}
];
fans = [
@ -108,12 +125,14 @@ in {
autostart = false;
postUp = "resolvectl dns Tunnel 10.0.0.1; resolvectl domain Tunnel ~thomasave.be;";
dns = ["10.0.0.1"];
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["0.0.0.0/0" "::/0"];
endpoint = "external.thomasave.be:13231";
persistentKeepalive = 25;
}];
}
];
};
OPNsense = {
address = ["10.0.0.5/24"];
@ -122,12 +141,14 @@ in {
autostart = true;
postUp = "resolvectl dns OPNsense 10.0.0.1; resolvectl domain OPNsense ~thomasave.be;";
dns = ["10.0.0.1"];
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["10.0.0.1/8" "192.168.1.2/32"];
endpoint = "external.thomasave.be:13231";
persistentKeepalive = 25;
}];
}
];
};
GCP = {
address = ["10.5.0.5/24"];
@ -135,16 +156,21 @@ in {
listenPort = 51820;
autostart = false;
postUp = "resolvectl dns GCP 1.1.1.1;resolvectl dns wlan0 1.1.1.1;";
peers = [{
peers = [
{
publicKey = "NEBNE4Czf2MkZF2X5aVhmofENH1uXjDpvXjIMJvfMFA=";
allowedIPs = ["0.0.0.0/0"];
endpoint = "35.201.231.151:443";
persistentKeepalive = 25;
}];
}
];
};
};
systemd.services."wg-quick-OPNsense" = {
serviceConfig = { Restart = "on-failure"; RestartSec = "2s"; };
serviceConfig = {
Restart = "on-failure";
RestartSec = "2s";
};
unitConfig.StartLimitIntervalSec = 0;
};
services.usbmuxd.enable = true;

View File

@ -1,11 +1,15 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = ["xhci_pci" "thunderbolt" "nvme" "usb_storage" "sd_mod"];
@ -18,18 +22,18 @@
'';
boot.kernelParams = ["ipv6.disable=1"];
fileSystems."/" =
{ device = "rpool/root";
fileSystems."/" = {
device = "rpool/root";
fsType = "zfs";
};
fileSystems."/home" =
{ device = "rpool/home";
fileSystems."/home" = {
device = "rpool/home";
fsType = "zfs";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/5C58-A909";
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/5C58-A909";
fsType = "vfat";
options = ["fmask=0022" "dmask=0022"];
};

View File

@ -1,5 +1,11 @@
{ pkgs, lib, inputs, config, nixos-06cb-009a-fingerprint-sensor, ... }:
let
{
pkgs,
lib,
inputs,
config,
nixos-06cb-009a-fingerprint-sensor,
...
}: let
serverIP = "10.0.0.1";
in {
imports = [
@ -89,12 +95,14 @@ in {
autostart = false;
postUp = "resolvectl dns Tunnel 10.0.0.1; resolvectl domain Tunnel ~thomasave.be;";
dns = ["10.0.0.1"];
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["0.0.0.0/0" "::/0"];
endpoint = "ipv4.thomasave.be:13231";
persistentKeepalive = 25;
}];
}
];
};
OPNsense = {
address = ["10.0.0.7/24" "2a02:a03f:83ad:2101::7/128"];
@ -103,16 +111,21 @@ in {
autostart = true;
postUp = "resolvectl dns OPNsense 10.0.0.1; resolvectl domain OPNsense ~thomasave.be;";
dns = ["10.0.0.1"];
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["10.0.0.1/8" "192.168.1.2/32"];
endpoint = "ipv4.thomasave.be:13231";
persistentKeepalive = 25;
}];
}
];
};
};
systemd.services."wg-quick-OPNsense" = {
serviceConfig = { Restart = "on-failure"; RestartSec = "2s"; };
serviceConfig = {
Restart = "on-failure";
RestartSec = "2s";
};
unitConfig.StartLimitIntervalSec = 0;
};
environment.systemPackages = with pkgs; [

View File

@ -1,6 +1,9 @@
{ config, lib, modulesPath, ... }:
{
config,
lib,
modulesPath,
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];

View File

@ -11,8 +11,11 @@
fzgo.url = "git+https://git.thomasave.be/thomasave/fzgo.git";
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "aarch64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {

View File

@ -1,5 +1,10 @@
{ lib, inputs, config, pkgs, ... }:
let
{
lib,
inputs,
config,
pkgs,
...
}: let
serverIP = "192.168.1.2";
in {
imports = [
@ -15,11 +20,13 @@ in {
dns = ["10.0.0.1" "fdc9:281f:04d7:9ee9::1"];
privateKeyFile = "/home/user/.secrets/Wireguard/Asturia.key";
listenPort = 51820;
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["10.0.0.1/8"];
endpoint = "192.168.1.1:13231";
}];
}
];
};
};

View File

@ -1,11 +1,15 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/profiles/qemu-guest.nix")
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot.initrd.availableKernelModules = ["ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "usbhid" "sd_mod" "sr_mod"];
@ -13,13 +17,13 @@
boot.kernelModules = ["kvm-amd"];
boot.extraModulePackages = [];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/721d0462-9488-435e-9690-f13f11557edc";
fileSystems."/" = {
device = "/dev/disk/by-uuid/721d0462-9488-435e-9690-f13f11557edc";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/CE52-0414";
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/CE52-0414";
fsType = "vfat";
options = ["fmask=0077" "dmask=0077"];
};

View File

@ -1,5 +1,4 @@
{ pkgs, ... }:
{
{pkgs, ...}: {
environment.sessionVariables.NIXOS_OZONE_WL = "1"; # hint electron apps to use wayland:
nixpkgs.config.allowUnfree = true;

View File

@ -1,5 +1,8 @@
{ inputs, pkgs, ... }:
{
inputs,
pkgs,
...
}: {
services.udev.packages = [pkgs.yubikey-personalization];
programs.appimage.enable = true;
programs.appimage.binfmt = true;

View File

@ -1,6 +1,8 @@
{pkgs, serverIP, ...}:
let
{
pkgs,
serverIP,
...
}: let
sharePath = "/home/server";
mountPath = "/home/server";
common_options = [
@ -18,20 +20,24 @@ let
"x-systemd.after=network-online.target"
"x-systemd.requires=network-online.target"
];
bind_options = [
bind_options =
[
"bind"
"x-systemd.after=${builtins.replaceStrings ["/"] ["-"] mountPath}.mount"
] ++ common_options;
]
++ common_options;
in {
services.rpcbind.enable = true;
boot.supportedFilesystems = ["nfs"];
fileSystems.${mountPath} = {
device = "${serverIP}:${sharePath}";
fsType = "nfs";
options = [
options =
[
"x-systemd.after=wg-quick-Tunnel.service"
"x-systemd.after=wg-quick-OPNsense.service"
] ++ common_options;
]
++ common_options;
};
systemd.services."${builtins.replaceStrings ["/"] ["-"] mountPath}-unmount" = {

View File

@ -1,5 +1,8 @@
{ pkgs, config, ... }:
{
pkgs,
config,
...
}: {
services.xserver.videoDrivers = ["nvidia"];
environment.systemPackages = with pkgs; [
pciutils

View File

@ -1,5 +1,4 @@
{ ... }:
{
{...}: {
boot.initrd.supportedFilesystems = ["zfs"];
boot.supportedFilesystems = ["zfs"];
services.zfs.autoScrub.enable = true;

View File

@ -16,8 +16,11 @@
};
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "x86_64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {

View File

@ -1,5 +1,10 @@
{ lib, inputs, config, pkgs, ... }:
let
{
lib,
inputs,
config,
pkgs,
...
}: let
serverIP = "192.168.1.2";
in {
imports = [
@ -54,11 +59,13 @@ in {
dns = ["10.0.0.1" "fdc9:281f:04d7:9ee9::1"];
privateKeyFile = "/home/user/.secrets/Wireguard/Kell.key";
listenPort = 51820;
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["10.0.0.1/8"];
endpoint = "192.168.1.1:13231";
}];
}
];
};
};
@ -81,7 +88,6 @@ in {
# };
# };
# Programs & Services
programs.gnupg.agent.enable = true;
services.sunshine = {
@ -156,7 +162,10 @@ in {
hardware.sane = {
enable = true;
extraBackends = [
(pkgs.epsonscan2.override { withNonFreePlugins = true; withGui = true; } )
(pkgs.epsonscan2.override {
withNonFreePlugins = true;
withGui = true;
})
];
};
}

View File

@ -1,10 +1,13 @@
{ config, lib, pkgs, modulesPath, ... }:
{
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [(modulesPath + "/installer/scan/not-detected.nix")];
boot.initrd.availableKernelModules =
[ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.availableKernelModules = ["nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod"];
boot.kernelModules = ["kvm-amd"];
boot.extraModulePackages = [];

View File

@ -16,8 +16,11 @@
};
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "x86_64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {

View File

@ -11,8 +11,11 @@
fzgo.url = "git+https://git.thomasave.be/thomasave/fzgo.git";
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "aarch64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {

View File

@ -1,5 +1,9 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
imports = [
(import ../Common/default.nix {inherit inputs config pkgs;})
(import ../Common/nvidia.nix {inherit pkgs config;})
@ -23,11 +27,13 @@
address = ["10.0.0.12/24"];
privateKeyFile = "/home/user/.secrets/Wireguard/Riva.key";
listenPort = 51820;
peers = [{
peers = [
{
publicKey = "/9ppjm3yeD0duDvxrqgcHscHmftXko+0s2RbivNEy2c=";
allowedIPs = ["10.0.0.1/8"];
endpoint = "192.168.1.1:13231";
}];
}
];
};
};
fileSystems."/home/server/Workspace" = {

View File

@ -1,13 +1,16 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [(modulesPath + "/profiles/qemu-guest.nix")];
boot.initrd.availableKernelModules =
[ "ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk" ];
boot.initrd.availableKernelModules = ["ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk"];
boot.initrd.kernelModules = [];
boot.kernelModules = ["kvm-amd"];
boot.extraModulePackages = [];

View File

@ -11,8 +11,11 @@
fzgo.url = "git+https://git.thomasave.be/thomasave/fzgo.git";
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "x86_64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {

View File

@ -11,8 +11,11 @@
fzgo.url = "git+https://git.thomasave.be/thomasave/fzgo.git";
};
outputs = { nixpkgs, home-manager, ... }@inputs:
let
outputs = {
nixpkgs,
home-manager,
...
} @ inputs: let
system = "x86_64-linux";
pkgs = nixpkgs.legacyPackages.${system};
in {