Compare commits
51 Commits
485b787d09
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| c1ab929c4e | |||
| 087da792de | |||
| 89d91a98de | |||
| 2e0110ad06 | |||
| e875bc8907 | |||
| 9c6c172a27 | |||
| b77f746c39 | |||
| aafb9e5b6f | |||
| 5f090fee23 | |||
| 1f30f51625 | |||
| de51bbadaa | |||
| 3f5a598f0b | |||
| d43e89900b | |||
| 24872e5e71 | |||
| 74f3632834 | |||
| 58c066387a | |||
| bb17f24446 | |||
| 7a10a92621 | |||
| c73a6fff61 | |||
| 7ff1da9886 | |||
| 092c3ec9ac | |||
| d8167b3bc1 | |||
| 033a9e582c | |||
| 6c4ac92a7c | |||
| ea837aba45 | |||
| 0d6c532340 | |||
| b795a74417 | |||
| 8f5123319f | |||
| e2e9875653 | |||
| 557aca3aa9 | |||
| ef95597355 | |||
| b034edfda1 | |||
| effa623876 | |||
| 8dc4384350 | |||
| 8d71ea5657 | |||
| cde630dc74 | |||
| dfe853ec96 | |||
| 84ee16c98a | |||
| 9a55c22c23 | |||
| 3d901b78eb | |||
| 4e3f4b416f | |||
| d7fa9e2cc7 | |||
| d14ed789f5 | |||
| 4cb380812b | |||
| 0ffee96f6c | |||
| 09ca273f3e | |||
| 7b6dc8c2a8 | |||
| 0439f5083e | |||
| cadadbee02 | |||
| d8c3525423 | |||
| 5ab83572b3 |
166
flake.lock
generated
166
flake.lock
generated
@@ -1,24 +1,42 @@
|
||||
{
|
||||
"nodes": {
|
||||
"flake-utils": {
|
||||
"deploy-rs": {
|
||||
"inputs": {
|
||||
"systems": "systems"
|
||||
"flake-compat": "flake-compat",
|
||||
"nixpkgs": "nixpkgs",
|
||||
"utils": "utils"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731533236,
|
||||
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||
"lastModified": 1762286984,
|
||||
"narHash": "sha256-9I2H9x5We6Pl+DBYHjR1s3UT8wgwcpAH03kn9CqtdQc=",
|
||||
"owner": "serokell",
|
||||
"repo": "deploy-rs",
|
||||
"rev": "9c870f63e28ec1e83305f7f6cb73c941e699f74f",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"owner": "serokell",
|
||||
"repo": "deploy-rs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-utils_2": {
|
||||
"flake-compat": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1733328505,
|
||||
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-utils": {
|
||||
"inputs": {
|
||||
"systems": "systems_2"
|
||||
},
|
||||
@@ -36,7 +54,7 @@
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-utils_3": {
|
||||
"flake-utils_2": {
|
||||
"inputs": {
|
||||
"systems": "systems_3"
|
||||
},
|
||||
@@ -54,6 +72,24 @@
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-utils_3": {
|
||||
"inputs": {
|
||||
"systems": "systems_4"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731533236,
|
||||
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flakey-profile": {
|
||||
"locked": {
|
||||
"lastModified": 1712898590,
|
||||
@@ -76,11 +112,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1742588233,
|
||||
"narHash": "sha256-Fi5g8H5FXMSRqy+mU6gPG0v+C9pzjYbkkiePtz8+PpA=",
|
||||
"lastModified": 1762458864,
|
||||
"narHash": "sha256-O8NI0pOf1GxPaBRhyspWZmtXLo0tzEEvOfMxNh3/8Jo=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "296ddc64627f4a6a4eb447852d7346b9dd16197d",
|
||||
"rev": "f35d0cb75f0669ac8de18d774b336d3d3560bcde",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -132,11 +168,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1742486781,
|
||||
"narHash": "sha256-Q0JINFp8mtpkbvODO2arZJUONfXhYBu8O4oGqUjso2A=",
|
||||
"lastModified": 1757014957,
|
||||
"narHash": "sha256-iPw1uXPUb4mPSZ/Uneop+1veSN5fEYCrsJwq71zLADs=",
|
||||
"ref": "refs/heads/master",
|
||||
"rev": "14454885f19e63584cc3ce557e97488541f15883",
|
||||
"revCount": 77,
|
||||
"rev": "71bb31643363b4a42948505d41f4e1c83a21c868",
|
||||
"revCount": 88,
|
||||
"type": "git",
|
||||
"url": "https://git.syzygial.cc/Syzygial/EmacsConfig.git"
|
||||
},
|
||||
@@ -154,11 +190,11 @@
|
||||
"spectrum": "spectrum"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1743083165,
|
||||
"narHash": "sha256-Fz7AiCJWtoWZ2guJwO3B1h3RuJxYWaCzFIqY0Kmkyrs=",
|
||||
"lastModified": 1762200934,
|
||||
"narHash": "sha256-Bv4ZKRPsIc6W7qF1I2fevxFETqRNuG3XOsiRIfJ7YlQ=",
|
||||
"owner": "astro",
|
||||
"repo": "microvm.nix",
|
||||
"rev": "773d5a04e2e10ca7b412270dea11276a496e1b61",
|
||||
"rev": "1d05a3c26dbb9d4b1cd644e10713a70d8740cb6a",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -174,11 +210,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1742595055,
|
||||
"narHash": "sha256-cEetDber6LF8W4ThmRc4rwKs/o8y2GH0pUdX7e6CnAQ=",
|
||||
"lastModified": 1762304480,
|
||||
"narHash": "sha256-ikVIPB/ea/BAODk6aksgkup9k2jQdrwr4+ZRXtBgmSs=",
|
||||
"owner": "LnL7",
|
||||
"repo": "nix-darwin",
|
||||
"rev": "e9f41de2a81f04390afd106959adf352a207628f",
|
||||
"rev": "b8c7ac030211f18bd1f41eae0b815571853db7a2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -190,11 +226,27 @@
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1742422364,
|
||||
"narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=",
|
||||
"lastModified": 1743014863,
|
||||
"narHash": "sha256-jAIUqsiN2r3hCuHji80U7NNEafpIMBXiwKlSrjWMlpg=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "a84ebe20c6bc2ecbcfb000a50776219f48d134cc",
|
||||
"rev": "bd3bac8bfb542dbde7ffffb6987a1a1f9d41699f",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixpkgs-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs_2": {
|
||||
"locked": {
|
||||
"lastModified": 1762111121,
|
||||
"narHash": "sha256-4vhDuZ7OZaZmKKrnDpxLZZpGIJvAeMtK6FKLJYUtAdw=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "b3d51a0365f6695e7dd5cdf3e180604530ed33b4",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -204,13 +256,13 @@
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs_2": {
|
||||
"nixpkgs_3": {
|
||||
"locked": {
|
||||
"lastModified": 1741865919,
|
||||
"narHash": "sha256-4thdbnP6dlbdq+qZWTsm4ffAwoS8Tiq1YResB+RP6WE=",
|
||||
"lastModified": 1760596604,
|
||||
"narHash": "sha256-J/i5K6AAz/y5dBePHQOuzC7MbhyTOKsd/GLezSbEFiM=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "573c650e8a14b2faa0041645ab18aed7e60f0c9a",
|
||||
"rev": "3cbe716e2346710d6e1f7c559363d14e11c32a43",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -222,25 +274,26 @@
|
||||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"deploy-rs": "deploy-rs",
|
||||
"home-manager": "home-manager",
|
||||
"lix-module": "lix-module",
|
||||
"me-emacs": "me-emacs",
|
||||
"microvm": "microvm",
|
||||
"nix-darwin": "nix-darwin",
|
||||
"nixpkgs": "nixpkgs",
|
||||
"nixpkgs": "nixpkgs_2",
|
||||
"sops-nix": "sops-nix"
|
||||
}
|
||||
},
|
||||
"sops-nix": {
|
||||
"inputs": {
|
||||
"nixpkgs": "nixpkgs_2"
|
||||
"nixpkgs": "nixpkgs_3"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1742595978,
|
||||
"narHash": "sha256-05onsoMrLyXE4XleDCeLC3bXnC4nyUbKWInGwM7v6hU=",
|
||||
"lastModified": 1760998189,
|
||||
"narHash": "sha256-ee2e1/AeGL5X8oy/HXsZQvZnae6XfEVdstGopKucYLY=",
|
||||
"owner": "Mic92",
|
||||
"repo": "sops-nix",
|
||||
"rev": "b7756921b002de60fb66782effad3ce8bdb5b25d",
|
||||
"rev": "5a7d18b5c55642df5c432aadb757140edfeb70b3",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
@@ -252,11 +305,11 @@
|
||||
"spectrum": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1733308308,
|
||||
"narHash": "sha256-+RcbMAjSxV1wW5UpS9abIG1lFZC8bITPiFIKNnE7RLs=",
|
||||
"lastModified": 1759482047,
|
||||
"narHash": "sha256-H1wiXRQHxxPyMMlP39ce3ROKCwI5/tUn36P8x6dFiiQ=",
|
||||
"ref": "refs/heads/main",
|
||||
"rev": "80c9e9830d460c944c8f730065f18bb733bc7ee2",
|
||||
"revCount": 792,
|
||||
"rev": "c5d5786d3dc938af0b279c542d1e43bce381b4b9",
|
||||
"revCount": 996,
|
||||
"type": "git",
|
||||
"url": "https://spectrum-os.org/git/spectrum"
|
||||
},
|
||||
@@ -309,6 +362,39 @@
|
||||
"repo": "default",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"systems_4": {
|
||||
"locked": {
|
||||
"lastModified": 1681028828,
|
||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||
"owner": "nix-systems",
|
||||
"repo": "default",
|
||||
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-systems",
|
||||
"repo": "default",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"utils": {
|
||||
"inputs": {
|
||||
"systems": "systems"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731533236,
|
||||
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "numtide",
|
||||
"repo": "flake-utils",
|
||||
"type": "github"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
|
||||
27
flake.nix
27
flake.nix
@@ -14,9 +14,10 @@
|
||||
};
|
||||
microvm.url = "github:astro/microvm.nix";
|
||||
microvm.inputs.nixpkgs.follows = "nixpkgs";
|
||||
deploy-rs.url = "github:serokell/deploy-rs";
|
||||
};
|
||||
|
||||
outputs = { self, nixpkgs, sops-nix, me-emacs, nix-darwin, home-manager, lix-module, microvm }@inputs: let
|
||||
outputs = { self, nixpkgs, sops-nix, me-emacs, nix-darwin, home-manager, lix-module, microvm, deploy-rs }@inputs: let
|
||||
overlays = import ./overlays/default.nix inputs;
|
||||
modules = import ./modules/default.nix inputs;
|
||||
|
||||
@@ -62,7 +63,8 @@
|
||||
overlays.emacs
|
||||
])
|
||||
modules.sops
|
||||
lix-module.nixosModules.default
|
||||
# Broken w/ this nixpkgs input
|
||||
# lix-module.nixosModules.default
|
||||
];
|
||||
};
|
||||
pericyte = nixosSystem' {
|
||||
@@ -70,7 +72,7 @@
|
||||
./machines/pericyte/configuration.nix
|
||||
modules.sops
|
||||
# lix-module.nixosModules.default
|
||||
microvm.nixosModules.host
|
||||
# microvm.nixosModules.host
|
||||
];
|
||||
};
|
||||
};
|
||||
@@ -82,7 +84,7 @@
|
||||
overlays.emacs
|
||||
])
|
||||
modules.home-manager-darwin
|
||||
lix-module.nixosModules.default
|
||||
# lix-module.nixosModules.default
|
||||
];
|
||||
};
|
||||
};
|
||||
@@ -101,8 +103,23 @@
|
||||
};
|
||||
};
|
||||
|
||||
deploy = {
|
||||
nodes = {
|
||||
pericyte = {
|
||||
hostname = "opcp";
|
||||
sshUser = "root";
|
||||
profiles.system = {
|
||||
user = "root";
|
||||
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.pericyte;
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
# This is highly advised, and will prevent many possible mistakes
|
||||
# checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
|
||||
|
||||
hydraJobs = {
|
||||
inherit (me-emacs) packages;
|
||||
# inherit (me-emacs) packages;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,6 +1,24 @@
|
||||
{ ... }: {
|
||||
{ pkgs, config, ... }: {
|
||||
services.gitea.dump = {
|
||||
enable = true;
|
||||
interval = "2:45";
|
||||
};
|
||||
systemd.timers."gitea-clear-dump" = {
|
||||
wantedBy = [ "timers.target" ];
|
||||
timerConfig = {
|
||||
OnCalendar = "daily";
|
||||
Persistent = true;
|
||||
Unit = "gitea-clear-dump.service";
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services."gitea-clear-dump" = {
|
||||
script = ''
|
||||
${pkgs.findutils}/bin/find /var/lib/gitea/dump -type f -ctime +5 -exec rm -f {} \;
|
||||
'';
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
User = config.services.gitea.user;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -91,7 +91,7 @@ let
|
||||
partOf = ["headscale.service"];
|
||||
|
||||
script = ''
|
||||
${cfg.package}/bin/headscale preauthkeys -u ${name} create \
|
||||
${cfg.package}/bin/headscale preauthkeys -u $(${cfg.package}/bin/headscale users -o json-line list | ${pkgs.jq}/bin/jq '.[] | select(.name=="${name}").id') create \
|
||||
${lib.optionalString options.preAuthEphemeral "--ephemeral"} \
|
||||
${lib.optionalString options.preAuthReusable "--reusable"} \
|
||||
--expiration ${options.preAuthExpiration} \
|
||||
|
||||
5
machines/hippocampus/oci/Wireguard.ContainerFile
Normal file
5
machines/hippocampus/oci/Wireguard.ContainerFile
Normal file
@@ -0,0 +1,5 @@
|
||||
FROM alpine:3.16
|
||||
RUN apk add --no-cache bash wireguard-tools jq curl git ncurses
|
||||
RUN git clone https://github.com/pia-foss/manual-connections /manual-connections
|
||||
WORKDIR /manual-connections
|
||||
CMD bash -c "/manual-connections/run_setup.sh && watch -n 60 curl ip.me"
|
||||
@@ -18,10 +18,12 @@
|
||||
in {
|
||||
containers = {
|
||||
wireguard = {
|
||||
image = "thrnz/docker-wireguard-pia";
|
||||
# Derived from the pia-wg.tar.gz
|
||||
# which was built from the containerfile
|
||||
image = "localhost/pia-wg:latest";
|
||||
volumes = [
|
||||
# "${configDir}/wireguard:/config"
|
||||
"${configDir}/wireguard_pia:/pia"
|
||||
# "${configDir}/wireguard_pia:/pia"
|
||||
];
|
||||
ports = getPorts [
|
||||
"deluge"
|
||||
@@ -34,13 +36,23 @@
|
||||
];
|
||||
environment = {
|
||||
TZ = "America/Toronto";
|
||||
LOC = "ca";
|
||||
LOC = "ca";
|
||||
PIA_DNS = "false"; # - true/false
|
||||
PIA_PF = "false"; # - true/false
|
||||
PIA_CONNECT = "true"; # - true/false; connect to VPN after configuration has been created. Set to false to only create configuration file. Only effective for wireguard protocol. Default true.
|
||||
MAX_LATENCY = "0.2"; # - numeric value, in seconds
|
||||
AUTOCONNECT = "true"; # - true/false; this will test for and select the server with the lowest latency, it will override PREFERRED_REGION
|
||||
# PREFERRED_REGION = ""; # - the region ID for a PIA server
|
||||
DIP_TOKEN = "n";
|
||||
VPN_PROTOCOL = "wireguard"; # - wireguard or openvpn; openvpn will default to openvpn_udp_standard, but can also specify openvpn_tcp/udp_standad/strong
|
||||
DISABLE_IPV6 = "no"; # - yes/no
|
||||
};
|
||||
extraOptions = [
|
||||
"--cap-add=ALL"
|
||||
"--pull=newer"
|
||||
"--dns=1.1.1.1"
|
||||
"--privileged" "--dns=1.1.1.1"
|
||||
"--env-file=${config.sops.secrets.jellyfin-pia.path}"
|
||||
"--cap-add=NET_ADMIN,NET_RAW,SYS_MODULE"
|
||||
"--cap-drop=MKNOD,AUDIT_WRITE"
|
||||
"--sysctl=net.ipv4.ip_forward=1"
|
||||
"--sysctl=net.ipv4.conf.all.src_valid_mark=1"
|
||||
"--sysctl=net.ipv6.conf.lo.disable_ipv6=1"
|
||||
"--sysctl=net.ipv6.conf.all.disable_ipv6=1"
|
||||
|
||||
BIN
machines/hippocampus/oci/pia-wg.tar.gz
Normal file
BIN
machines/hippocampus/oci/pia-wg.tar.gz
Normal file
Binary file not shown.
@@ -2,4 +2,5 @@
|
||||
boot.binfmt.emulatedSystems = [
|
||||
"riscv64-linux"
|
||||
];
|
||||
boot.binfmt.preferStaticEmulators = true;
|
||||
}
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
nextcloud:
|
||||
adminPass: ENC[AES256_GCM,data:D2SAD/Somvw8abIm0KX4fWRfuQ==,iv:Y7K14yZZFcu97KVBd0219hwnGY4LEX2DNxxulSegr/8=,tag:aRJAlz1xvQxWodcE2bZLdQ==,type:str]
|
||||
s3secret: ENC[AES256_GCM,data:lIVuiZMh376MSuu13UPCu49Q64bVbk+WM/CUEIGzV0Q=,iv:J2vHalppWEupWK07zXsMoiH6avmpsgg0Cqcc7EkZVV4=,tag:pxKwiaH5SZa8Vh71gLGQWw==,type:str]
|
||||
jellyfin-pia: ENC[AES256_GCM,data:rbqpmm2EtxcMeJfjlGaJOwPCn4UAZaKsH8Zeztk7A6QiSw==,iv:8A6NHVHgKIL6iwLKgRrT6T3k0pgDI5lL5rDMN5/Egrw=,tag:P6Kh9cOnrB23Z7S72xBK7g==,type:str]
|
||||
jellyfin-pia: ENC[AES256_GCM,data:hOgUAr47FMd2QgzgXBeqv41Paqy6zn6tyWVDbF1JtqcTog/zZC4=,iv:opnxrycFszAhuMARcP48gKF6eL1ERNgWS68wO+s4CIM=,tag:fqimxKdTAh55ANKD3bp46w==,type:str]
|
||||
ddclient: ENC[AES256_GCM,data:a31MKnoEZXrj/s8z3+MP9jhQ5/sBjljZphXBJsWj5GU=,iv:YHKCartadDQa59aUf9Fw/KgdgMgsqsVLDAIh/KeqehQ=,tag:hUaUqjcX75xw6eC9axtQmw==,type:str]
|
||||
anki: ENC[AES256_GCM,data:hUBKr/s1DDorlmbHDUvHtVSumw==,iv:Ekjt6dsncinHhM+dV/mxOjErBQpgKtPOVbmwGRy9XOE=,tag:zvfV9z3QROgsk4eznmxqDw==,type:str]
|
||||
tandoor-secret: ENC[AES256_GCM,data:/clEIU38M7lJ6+JbFSKWb5kKSUvxdGYPq2Hl9TjgijZtYIYFOleJQ9PiT+d/osmY/r0=,iv:Nulu93V+s9RBmEDRs2LXJXy7l0O/AeU0CwwtTNLGw2c=,tag:brRyVaWeUGLx1nt0MtcIEw==,type:str]
|
||||
@@ -14,10 +14,6 @@ restic:
|
||||
passwd: ENC[AES256_GCM,data:vUsAP5+iZo7U55xnUP7Cnk1OxnrO+paHKmT2cuc=,iv:GF7fybEQZIxHPm1Z6Sj5dn/zOR5dRVgikH8LILsTMIs=,tag:Mh61boRPsfHeiSfXmrEx5Q==,type:str]
|
||||
backblaze: ENC[AES256_GCM,data:IfWzuIYUrCGYpP68CPFi2vLqq9NVmiVyCE+Z8yi+cnaQwgwNL40lJEPL/U3d0lgsmrsV4GheNJ0oQ9tnrrJeBgZgwMl/CwXMctuUHo+cvVot/cNRd1vCdjRr7WUnw8737uxyW45OaaYbkZRa3NWEGDll1iFDWB2w4n5DTsomyO03tFZB5gckwQYmpjYmK4DcIWyTaEiDrznmkyM+sxoWv9pcTHZIIN7TCHHkzmlMzXXqJnoRfCpdVm/QF9jbrAYs,iv:tOa1FFyggm0ScoRdFk6tACOnQVcZMYaDqeJyX5SMKXc=,tag:EY5jQhZnLP6IzqY9garoEQ==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age:
|
||||
- recipient: age1crymppz88etsdjpckmtdhr397x5xg5wv8jt6tcj23gt2snq73pzs04fuve
|
||||
enc: |
|
||||
@@ -28,8 +24,7 @@ sops:
|
||||
RVUzMlFya3Z0amdTUTJ5YjFRck5kZzQKoWZzExqzPRpQPL4CdqBalc1/dYtjBH6J
|
||||
LGR0oImfOWlIJwcaJLv/fc470UvXHHwIji9v/pbV7xMkgMjlJthaYg==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2024-11-26T02:45:21Z"
|
||||
mac: ENC[AES256_GCM,data:t5+2iRUJprwwW8GRiQx/h8IOYjjhsq+954GDL2ujXiZVM3oBhESdeBi6aMMwsqABCr+PjP4gb4qHHbduxWlGSZlAh4HSiVwwizI8XV8HZqUqPKBJEqRThzcwznCk4DOGpf1PMbktBX/r50pDeoDcgShKka1bMY8kD385SVklgNE=,iv:EXFXz12HNTMRoW0gIrTEZPHhdTG2cxaWf65uTgT7nZ4=,tag:5XweTiLnO9N8eZb4EPkh6g==,type:str]
|
||||
pgp: []
|
||||
lastmodified: "2025-07-19T19:15:37Z"
|
||||
mac: ENC[AES256_GCM,data:RPGKe5f+5GUnGK3zybRrTnd8N4TprLWBEWLI2HI68Acf1MlJ1AMOWOhpi5xa0Hkxpah8D/d0CEH2ymaO5EBSUamPdYThI4g/4cxNBXboKnALSf91ZUty86/1+14TbI6vFCZ5ghjB4THxszGf47ajIDa/TjHx0yHFWDi7rpApmcw=,iv:ep/NlJfkIkQe5RJ4U2YfZ7/0S4vWqxjg+xrLLnJwfwI=,tag:c01jey2juzoPKux7n/0rug==,type:str]
|
||||
unencrypted_suffix: _unencrypted
|
||||
version: 3.9.0
|
||||
version: 3.10.2
|
||||
|
||||
@@ -25,7 +25,7 @@
|
||||
./public/nextcloud.nix
|
||||
|
||||
# Rabb.it at home
|
||||
./public/watchthingz.nix
|
||||
# ./public/watchthingz.nix
|
||||
|
||||
# Pterodactyl Game Server
|
||||
./public/pterodactyl.nix
|
||||
@@ -47,5 +47,8 @@
|
||||
|
||||
# Random Usage, specific port
|
||||
./public/random.nix
|
||||
|
||||
# Perfect Pitch Project
|
||||
./public/perfect_pitch.nix
|
||||
];
|
||||
}
|
||||
|
||||
@@ -26,6 +26,9 @@
|
||||
dns = {
|
||||
base_domain = "tailnet";
|
||||
magic_dns = true;
|
||||
nameservers.global = [
|
||||
"1.1.1.1"
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
@@ -17,7 +17,7 @@ in {
|
||||
'';
|
||||
};
|
||||
nix.extraOptions = ''
|
||||
allowed-uris = https://github.com/ https://git.savannah.gnu.org/ https://git.syzygial.cc https://gitlab.com https://sr.ht github: gitlab:
|
||||
allowed-uris = https://github.com/ https://git.savannah.gnu.org/ https://git.syzygial.cc https://gitlab.com https://sr.ht github: gitlab: https://git.lix.systems
|
||||
'';
|
||||
systemd.services.hydra = {
|
||||
serviceConfig = {
|
||||
|
||||
@@ -13,7 +13,7 @@ in {
|
||||
|
||||
services.nextcloud = {
|
||||
enable = true;
|
||||
package = pkgs.nextcloud30;
|
||||
package = pkgs.nextcloud32;
|
||||
hostName = "localhost";
|
||||
settings = {
|
||||
trusted_domains = [
|
||||
@@ -22,8 +22,7 @@ in {
|
||||
];
|
||||
|
||||
trusted_proxies = [
|
||||
"cloud.crompton.cc"
|
||||
"nextcloud.syzygial.cc"
|
||||
"127.0.0.1"
|
||||
];
|
||||
|
||||
overwriteprotocol = "https";
|
||||
|
||||
52
machines/hippocampus/servers/public/perfect_pitch.nix
Normal file
52
machines/hippocampus/servers/public/perfect_pitch.nix
Normal file
@@ -0,0 +1,52 @@
|
||||
{config, pkgs, ...}:
|
||||
|
||||
{
|
||||
systemd.targets.machines.enable = true;
|
||||
systemd.services."perfectpitch-container" = {
|
||||
enable = true;
|
||||
wantedBy = ["machines.target"];
|
||||
environment = {
|
||||
# SYSTEMD_NSPAWN_USE_CGNS = "0";
|
||||
};
|
||||
script = ''
|
||||
exec ${config.systemd.package}/bin/systemd-nspawn --hostname perfectpitch \
|
||||
--resolv-conf=off --system-call-filter="add_key keyctl bpf" --bind /dev/fuse \
|
||||
-nbD /var/lib/machines/perfectpitch --machine perfectpitch
|
||||
'';
|
||||
postStart = ''
|
||||
${pkgs.iproute2}/bin/ip link set ve-perfectpitch up || true
|
||||
${pkgs.iproute2}/bin/ip addr add 10.2.0.0 dev ve-perfectpitch || true
|
||||
${pkgs.iproute2}/bin/ip route add 10.2.0.1 dev ve-perfectpitch || true
|
||||
'';
|
||||
serviceConfig = {
|
||||
Type = "notify";
|
||||
Slice = "machine.slice";
|
||||
Delegate = true;
|
||||
DeviceAllow = "/dev/fuse rwm";
|
||||
};
|
||||
};
|
||||
networking.nat = {
|
||||
enable = true;
|
||||
# Check for hostBridge use vb instead of ve
|
||||
internalInterfaces = ["ve-perfectpitch"];
|
||||
externalInterface = "enp0s25";
|
||||
enableIPv6 = true;
|
||||
forwardPorts = [
|
||||
{ sourcePort = 8022;
|
||||
destination = "10.2.0.1:22";
|
||||
proto = "tcp";
|
||||
}
|
||||
{ sourcePort = 8022;
|
||||
destination = "10.2.0.1:22";
|
||||
proto = "udp";
|
||||
}
|
||||
];
|
||||
};
|
||||
services.caddy.virtualHosts = {
|
||||
"pitch.crompton.cc" = {
|
||||
extraConfig = ''
|
||||
reverse_proxy 10.2.0.1:8080
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
@@ -32,11 +32,11 @@
|
||||
externalInterface = "enp0s25";
|
||||
enableIPv6 = true;
|
||||
forwardPorts = [
|
||||
{ sourcePort = "25565:28000";
|
||||
{ sourcePort = "25565:26000";
|
||||
destination = "10.1.0.1:25565-25600";
|
||||
proto = "tcp";
|
||||
}
|
||||
{ sourcePort = "25565:28000";
|
||||
{ sourcePort = "25565:26000";
|
||||
destination = "10.1.0.1:25565-25600";
|
||||
proto = "udp";
|
||||
}
|
||||
|
||||
@@ -18,7 +18,8 @@ in {
|
||||
};
|
||||
|
||||
systemd.services.tandoor-recipes = {
|
||||
environment.GUNICORN_MEDIA = lib.mkForce null;
|
||||
# https://github.com/TandoorRecipes/recipes/issues/3617
|
||||
environment.GUNICORN_MEDIA = "1"; #lib.mkForce null;
|
||||
serviceConfig = {
|
||||
EnvironmentFile = config.sops.secrets.tandoor-pass.path;
|
||||
};
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
sops.secrets.ddclient = {};
|
||||
services.ddclient = {
|
||||
enable = true;
|
||||
usev4 = "web, web=dynamicdns.park-your-domain.com/getip";
|
||||
usev4 = "webv4, web=dynamicdns.park-your-domain.com/getip";
|
||||
protocol = "namecheap";
|
||||
server = "dynamicdns.park-your-domain.com";
|
||||
username = "crompton.cc";
|
||||
|
||||
@@ -4,8 +4,10 @@
|
||||
"${inputs.nixpkgs}/nixos/modules/profiles/headless.nix"
|
||||
"${inputs.nixpkgs}/nixos/modules/profiles/minimal.nix"
|
||||
|
||||
./microvm-configuration.nix
|
||||
./k3s.nix
|
||||
./podman.nix
|
||||
./container-registry.nix
|
||||
# ./microvm-configuration.nix
|
||||
# ./k3s.nix
|
||||
];
|
||||
|
||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||
@@ -13,10 +15,12 @@
|
||||
environment.systemPackages = with pkgs; [
|
||||
git
|
||||
btop
|
||||
tmux
|
||||
oci-cli
|
||||
];
|
||||
|
||||
boot.tmp.cleanOnBoot = true;
|
||||
zramSwap.enable = true;
|
||||
# zramSwap.enable = true;
|
||||
networking.hostName = "pericyte";
|
||||
networking.domain = "";
|
||||
services.openssh.enable = true;
|
||||
|
||||
6
machines/pericyte/container-registry.nix
Normal file
6
machines/pericyte/container-registry.nix
Normal file
@@ -0,0 +1,6 @@
|
||||
{ pkgs, ... }: {
|
||||
services.dockerRegistry = {
|
||||
enable = true;
|
||||
package = pkgs.distribution;
|
||||
};
|
||||
}
|
||||
@@ -7,8 +7,12 @@
|
||||
device = "nodev";
|
||||
};
|
||||
fileSystems."/boot" = { device = "/dev/disk/by-uuid/FCE4-1F46"; fsType = "vfat"; };
|
||||
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; };
|
||||
swapDevices = [
|
||||
{
|
||||
device = "/swapfile";
|
||||
}
|
||||
];
|
||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "xen_blkfront" "vmw_pvscsi" ];
|
||||
boot.initrd.kernelModules = [ "nvme" ];
|
||||
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; };
|
||||
|
||||
}
|
||||
|
||||
@@ -16,4 +16,7 @@
|
||||
# "--debug" # Optionally add additional args to k3s
|
||||
];
|
||||
};
|
||||
environment.systemPackages = with pkgs; [
|
||||
rancher
|
||||
];
|
||||
}
|
||||
|
||||
21
machines/pericyte/podman.nix
Normal file
21
machines/pericyte/podman.nix
Normal file
@@ -0,0 +1,21 @@
|
||||
{ pkgs, ... }: {
|
||||
# Enable common container config files in /etc/containers
|
||||
virtualisation.containers.enable = true;
|
||||
virtualisation = {
|
||||
podman = {
|
||||
enable = true;
|
||||
|
||||
# Required for containers under podman-compose to be able to talk to each other.
|
||||
defaultNetwork.settings.dns_enabled = true;
|
||||
};
|
||||
};
|
||||
|
||||
# Useful other development tools
|
||||
environment.systemPackages = with pkgs; [
|
||||
dive # look into docker image layers
|
||||
skopeo # Inspect images
|
||||
podlet # create quadlets (systemd units)
|
||||
podman-tui # status of containers in the terminal
|
||||
podman-compose # start group of containers for dev
|
||||
];
|
||||
}
|
||||
32
machines/pericyte/test.nix
Normal file
32
machines/pericyte/test.nix
Normal file
@@ -0,0 +1,32 @@
|
||||
{ pkgs, ... }: {
|
||||
users.groups.peertube = { };
|
||||
users.users.peertube = {
|
||||
isSystemUser = true;
|
||||
group = "peertube";
|
||||
home = "/var/lib/peertube";
|
||||
createHome = true;
|
||||
uid = 2342;
|
||||
subUidRanges = [
|
||||
{
|
||||
count = 65536;
|
||||
startUid = 2147483646;
|
||||
}
|
||||
];
|
||||
subGidRanges = [
|
||||
{
|
||||
count = 65536;
|
||||
startGid = 2147483647;
|
||||
}
|
||||
];
|
||||
};
|
||||
virtualisation.oci-containers = {
|
||||
backend = "podman";
|
||||
# containers.peertube = {
|
||||
# image = "chocobozzz/peertube:latest";
|
||||
# ports = [ ];
|
||||
# podman = {
|
||||
# user = "peertube";
|
||||
# };
|
||||
# };
|
||||
};
|
||||
}
|
||||
@@ -59,9 +59,7 @@ in
|
||||
services.emacs = {
|
||||
# Emacsclient behaving weirdly
|
||||
# enable = true;
|
||||
package = pkgs.me-emacs.override {
|
||||
withNativeCompilation = false;
|
||||
};
|
||||
package = pkgs.me-emacs;
|
||||
};
|
||||
|
||||
environment.variables = {
|
||||
@@ -146,9 +144,7 @@ in
|
||||
];
|
||||
|
||||
environment.systemPackages = (with pkgs; [
|
||||
(me-emacs.override {
|
||||
withNativeCompilation = false;
|
||||
})
|
||||
me-emacs
|
||||
svgbob
|
||||
(aspellWithDicts (p: with p;[
|
||||
en
|
||||
@@ -224,4 +220,5 @@ in
|
||||
# Used for backwards compatibility, please read the changelog before changing.
|
||||
# $ darwin-rebuild changelog
|
||||
system.stateVersion = 4;
|
||||
system.primaryUser = "universelaptop";
|
||||
}
|
||||
|
||||
@@ -34,6 +34,9 @@
|
||||
|
||||
# ccache, y'know for blenders and whatnots
|
||||
./ccache.nix
|
||||
|
||||
# So we can run riscv 'natively'
|
||||
./riscv.nix
|
||||
];
|
||||
|
||||
fileSystems."/home/universe/tmp" = {
|
||||
|
||||
@@ -3,6 +3,7 @@
|
||||
./audio.nix
|
||||
./graphics.nix
|
||||
# ./dwl.nix # Sadly, nVidia seems to be too broken too often on wayland
|
||||
./dwm.nix
|
||||
./dwm.nix
|
||||
# ./niri.nix
|
||||
];
|
||||
}
|
||||
|
||||
@@ -91,8 +91,8 @@ in {
|
||||
# Recommended by upstream, required for screencast support
|
||||
# https://github.com/YaLTeR/niri/wiki/Important-Software#portals
|
||||
extraPortals = [
|
||||
#pkgs.xdg-desktop-portal-gnome
|
||||
#pkgs.xdg-desktop-portal-gtk
|
||||
pkgs.xdg-desktop-portal-gnome
|
||||
pkgs.xdg-desktop-portal-gtk
|
||||
];
|
||||
|
||||
wlr.enable = true;
|
||||
|
||||
@@ -2,11 +2,7 @@
|
||||
nixpkgs.overlays = [
|
||||
(final: prev: {
|
||||
st = prev.st.override {
|
||||
conf = builtins.readFile (pkgs.substituteAll {
|
||||
src = ./dwm/st-config.def.h;
|
||||
env = {
|
||||
};
|
||||
});
|
||||
conf = builtins.readFile (pkgs.replaceVars ./dwm/st-config.def.h {});
|
||||
};
|
||||
})
|
||||
];
|
||||
@@ -18,21 +14,18 @@
|
||||
emacsclient --create-frame --alternate-editor=""
|
||||
'';
|
||||
in pkgs.dwm.override {
|
||||
conf = pkgs.substituteAll {
|
||||
src = ./dwm/config.h;
|
||||
env = {
|
||||
dmenucmd="${pkgs.dmenu}/bin/dmenu_run";
|
||||
termcmd="${pkgs.st}/bin/st";
|
||||
editcmd="${launch_emacs}";
|
||||
playcmd=pkgs.writeScript "playerctl-play-pause" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.playerctl}/bin/playerctl play-pause
|
||||
'';
|
||||
scrncmd=pkgs.writeScript "screenshot-region" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.maim}/bin/maim -o -s | ${pkgs.xclip}/bin/xclip -sel clip -t image/png
|
||||
'';
|
||||
};
|
||||
conf = pkgs.replaceVars ./dwm/config.h {
|
||||
dmenucmd="${pkgs.dmenu}/bin/dmenu_run";
|
||||
termcmd="${pkgs.st}/bin/st";
|
||||
editcmd="${launch_emacs}";
|
||||
playcmd=pkgs.writeScript "playerctl-play-pause" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.playerctl}/bin/playerctl play-pause
|
||||
'';
|
||||
scrncmd=pkgs.writeScript "screenshot-region" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.maim}/bin/maim -o -s | ${pkgs.xclip}/bin/xclip -sel clip -t image/png
|
||||
'';
|
||||
};
|
||||
patches = [
|
||||
./dwm/fullscreen.patch
|
||||
@@ -48,6 +41,16 @@
|
||||
enable = true;
|
||||
background = "#000000";
|
||||
};
|
||||
services.xserver.config = lib.mkAfter ''
|
||||
Section "InputClass"
|
||||
Identifier "joystick catchall"
|
||||
MatchIsJoystick "on"
|
||||
MatchDevicePath "/dev/input/event*"
|
||||
Driver "joystick"
|
||||
Option "StartKeysEnabled" "False"
|
||||
Option "StartMouseEnabled" "False"
|
||||
EndSection
|
||||
'';
|
||||
environment.sessionVariables = {
|
||||
GTK_THEME="Adwaita-dark";
|
||||
};
|
||||
|
||||
@@ -1,7 +1,106 @@
|
||||
{ config, pkgs, lib, ... }: {
|
||||
{ config, pkgs, lib, ... }: let
|
||||
launch_emacs = pkgs.writeScript "emacsclient-or-start" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
emacsclient --create-frame --alternate-editor=""
|
||||
'';
|
||||
in {
|
||||
imports = [
|
||||
./wayland.nix
|
||||
];
|
||||
|
||||
programs.niri.enable = true;
|
||||
services.displayManager.sessionPackages = [ pkgs.dwl ];
|
||||
#services.gnome.gnome-keyring.enable = lib.mkDefault true;
|
||||
systemd.packages = [ pkgs.dwl ];
|
||||
|
||||
nixpkgs.overlays = [
|
||||
(final: prev: {
|
||||
wlroots_0_19 = prev.wlroots_0_18.overrideAttrs (old: {
|
||||
src = final.fetchFromGitLab {
|
||||
domain = "gitlab.freedesktop.org";
|
||||
owner = "wlroots";
|
||||
repo = "wlroots";
|
||||
rev = "d305934ebe6852785a1f425ee96861f0b7280d76"; # 0.19-prev # 25-01-25
|
||||
hash = "sha256-NnPSC5p/phTFe+nWp9vl8LUbmBO/RXSSUuDZ2boucXY=";
|
||||
};
|
||||
});
|
||||
dwl = (prev.dwl.override { wlroots = final.wlroots_0_19; }).overrideAttrs (old: let
|
||||
dwl-patches = pkgs.fetchgit {
|
||||
url = "https://codeberg.org/dwl/dwl-patches.git";
|
||||
rev = "4a869141fa643d9be792a9aa44a42cf7f7f882ad";
|
||||
hash = "sha256-xlaK9xMrc+KDNecsyByRIxXmPEZ2dmP4FQ0bMojsyws=";
|
||||
};
|
||||
patches = let
|
||||
dwl-patch = p: "${dwl-patches}/patches/${p}/${p}.patch";
|
||||
in [
|
||||
(dwl-patch "ipc")
|
||||
(dwl-patch "restore-monitor")
|
||||
(dwl-patch "regexrules")
|
||||
(dwl-patch "autostart")
|
||||
];
|
||||
in {
|
||||
version = "21-09-2024";
|
||||
|
||||
src = final.fetchFromGitea {
|
||||
domain = "codeberg.org";
|
||||
owner = "dwl";
|
||||
repo = "dwl";
|
||||
rev = "d1c2f434983562bd7d2ace15ab0c05155be603bc";
|
||||
hash = "sha256-SpfjQfzvbpDiihziyKGPoBwvp3evgCQQhhjldAE/MwY=";
|
||||
};
|
||||
|
||||
patches = (old.patches or []) ++ patches;
|
||||
postPatch = (old.postPatch or "") + ''
|
||||
export termcmd=${pkgs.foot}/bin/foot
|
||||
export editcmd=${launch_emacs}
|
||||
export menucmd=${pkgs.fuzzel}/bin/fuzzel
|
||||
export barcmd=${pkgs.waybar}/bin/waybar
|
||||
export playcmd=${pkgs.writeScript "playerctl-play-pause" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.playerctl}/bin/playerctl play-pause
|
||||
''}
|
||||
export scrncmd=${pkgs.writeScript "screenshot-region" ''
|
||||
#!${pkgs.bash}/bin/bash
|
||||
${pkgs.slurp}/bin/slurp | ${pkgs.grim}/bin/grim -g - - | ${pkgs.wl-clipboard}/bin/wl-copy
|
||||
''}
|
||||
substituteAll ${./dwl/config.def.h} ./config.def.h
|
||||
'';
|
||||
postInstall = ''
|
||||
chmod ugo+x $out/share/wayland-sessions/dwl.desktop
|
||||
'';
|
||||
passthru.providedSessions = ["dwl"];
|
||||
});
|
||||
})
|
||||
];
|
||||
|
||||
|
||||
security = {
|
||||
polkit.enable = true;
|
||||
pam.services.swaylock = { };
|
||||
};
|
||||
|
||||
services.graphical-desktop.enable = true;
|
||||
|
||||
services.xserver.desktopManager.runXdgAutostartIfNone = lib.mkDefault true;
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
dwl
|
||||
waybar
|
||||
foot
|
||||
pwvucontrol
|
||||
];
|
||||
}
|
||||
{ config, pkgs, lib, ... }: {
|
||||
programs.niri.enable = true;
|
||||
|
||||
environment.sessionVariables = {
|
||||
# Breaks WebCord
|
||||
# NIXOS_OZONE_WL=1;
|
||||
WLR_NO_HARDWARE_CURSORS=1;
|
||||
SDL_VIDEODRIVER="wayland";
|
||||
QT_QPA_PLATFORM="wayland-egl";
|
||||
QT_WAYLAND_DISABLE_WINDOW_DECORATIONS="1";
|
||||
__JAVA_AWT_WM_NONREPARENTING=1;
|
||||
GTK_THEME="Adwaita-dark";
|
||||
};
|
||||
|
||||
}
|
||||
|
||||
@@ -5,41 +5,9 @@
|
||||
python-final: python-prev: let
|
||||
py = python-prev;
|
||||
in {
|
||||
opencamlib = py.toPythonModule (pkgs.stdenv.mkDerivation rec {
|
||||
pname = "opencamlib";
|
||||
version = "2019.07";
|
||||
nativeBuildInputs = (with pkgs;[
|
||||
cmake
|
||||
git
|
||||
doxygen
|
||||
boost
|
||||
texlive.combined.scheme-full
|
||||
]);
|
||||
propagatedNativeBuildInputs = [
|
||||
py.python
|
||||
py.boost
|
||||
py.vtk
|
||||
];
|
||||
postPatch = ''
|
||||
mkdir -p $out/${py.python.sitePackages}/{lib,ocl}
|
||||
sed -e 's#LIBRARY DESTINATION ''${PYTHON_ARCH_PACKAGES}#LIBRARY DESTINATION '"$out"'/${py.python.sitePackages}#g' -i src/pythonlib/pythonlib.cmake
|
||||
sed -e 's#DESTINATION ''${PYTHON_SITE_PACKAGES}#DESTINATION '"$out"'/${py.python.sitePackages}#g' -i src/pythonlib/pythonlib.cmake
|
||||
'';
|
||||
cmakeFlags = [
|
||||
"-DVERSION_STRING=2019.07"
|
||||
"-DBUILD_CXX_LIB=ON"
|
||||
"-DBUILD_PY_LIB=ON"
|
||||
"-DUSE_PY_3=ON"
|
||||
"-DCMAKE_BUILD_TYPE=Release"
|
||||
];
|
||||
src = pkgs.fetchFromGitHub {
|
||||
owner = "aewallin";
|
||||
repo = "opencamlib";
|
||||
rev = "2019.07";
|
||||
sha256 = "1a8pxp1mh8x3bfsb0l97vgxrpk482p7q9jprkd4m9hv69vva2bdz";
|
||||
};
|
||||
});
|
||||
equation = py.buildPythonPackage {
|
||||
pyproject = true;
|
||||
build-system = [ py.setuptools ];
|
||||
pname = "Equation";
|
||||
version = "1.2.01";
|
||||
nativeBuildInputs = [
|
||||
@@ -52,6 +20,8 @@
|
||||
};
|
||||
};
|
||||
morphio = py.toPythonModule ( pkgs.stdenv.mkDerivation rec {
|
||||
pyproject = true;
|
||||
build-system = [ py.setuptools ];
|
||||
pname = "MorphIO";
|
||||
version = "3.3.4";
|
||||
nativeBuildInputs = (with pkgs; [
|
||||
@@ -85,20 +55,20 @@
|
||||
blender_cuda = prev.blender.override {
|
||||
cudaSupport = true;
|
||||
};
|
||||
blender = final.blender_cuda.withPackages (p: with p; [
|
||||
# OpenCAMLib support
|
||||
shapely
|
||||
equation
|
||||
#opencamlib
|
||||
# NeuroMorphoVis support
|
||||
matplotlib
|
||||
seaborn
|
||||
pandas
|
||||
pillow
|
||||
h5py
|
||||
morphio
|
||||
# TODO add BluePy support?
|
||||
]);
|
||||
# blender = final.blender_cuda.withPackages (p: with p; [
|
||||
# # OpenCAMLib support
|
||||
# shapely
|
||||
# equation
|
||||
# opencamlib
|
||||
# # NeuroMorphoVis support
|
||||
# matplotlib
|
||||
# seaborn
|
||||
# pandas
|
||||
# pillow
|
||||
# h5py
|
||||
# morphio
|
||||
# # TODO add BluePy support?
|
||||
# ]);
|
||||
# Update RX and Aseprite
|
||||
rx = prev.rx.overrideAttrs (old: {
|
||||
version = "git";
|
||||
@@ -118,6 +88,7 @@
|
||||
|
||||
rx
|
||||
aseprite-unfree
|
||||
pixelorama
|
||||
gimp
|
||||
|
||||
glaxnimate
|
||||
|
||||
@@ -24,9 +24,7 @@
|
||||
nextcloud-client
|
||||
libsForQt5.kdeconnect-kde
|
||||
|
||||
vesktop
|
||||
slack
|
||||
signal-desktop
|
||||
discord
|
||||
zoom-us
|
||||
|
||||
anki
|
||||
|
||||
@@ -5,6 +5,7 @@
|
||||
xdg.portal.enable = true;
|
||||
xdg.portal.wlr.enable = true;
|
||||
xdg.portal.config.common.default = "*";
|
||||
# On X11: Steam requires a compositor for BigPicture
|
||||
programs.steam.enable = true;
|
||||
# Game compat
|
||||
programs.gamemode.enable = true;
|
||||
|
||||
@@ -9,7 +9,8 @@
|
||||
htop
|
||||
btop
|
||||
xclip
|
||||
screen
|
||||
tio
|
||||
tmux
|
||||
usbutils
|
||||
man-pages
|
||||
man-pages-posix
|
||||
|
||||
6
machines/universedesktop/riscv.nix
Normal file
6
machines/universedesktop/riscv.nix
Normal file
@@ -0,0 +1,6 @@
|
||||
{ config, pkgs, lib, ... }: {
|
||||
boot.binfmt.emulatedSystems = [
|
||||
"riscv64-linux"
|
||||
];
|
||||
boot.binfmt.preferStaticEmulators = true;
|
||||
}
|
||||
Reference in New Issue
Block a user