Compare commits

...

187 Commits

Author SHA1 Message Date
4c14502dd2 changed wlan interface 2025-07-19 15:53:48 +02:00
e28f9d5f2f Config changes... 2025-07-17 15:59:45 +02:00
6381ccf530 updated flakes inputs 2025-07-09 13:47:29 +02:00
35e7c0df79 added ppd 2025-07-08 15:23:59 +02:00
047e54ef74 removed not used padding 2025-07-08 15:15:05 +02:00
6dfad3f7f1 merge 2025-07-08 15:13:29 +02:00
74ecc77048 merges 2025-07-08 15:12:58 +02:00
5c74dc820b changed configs 2025-07-08 15:10:02 +02:00
89de487f68 added margin between modules 2025-07-08 15:08:35 +02:00
07c5526868 niri changes 2025-07-07 16:02:37 +02:00
d3bb262f7a added brightnessctl 2025-06-24 14:21:51 +02:00
d5560fd847 add brightness controls 2025-06-24 14:18:40 +02:00
751cb87d8d Added host option 2025-06-24 14:04:56 +02:00
d2cc6663e7 added greetd greeter for niri 2025-06-24 13:56:38 +02:00
64f21a317b More niri styling 2025-06-23 17:04:59 +02:00
849bd2a5e0 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-06-22 10:09:47 +02:00
79d07a5bfd Changed some configs 2025-06-22 10:09:41 +02:00
351272fc5c Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-06-20 16:35:21 +02:00
f68ff8d18c updated laptop configuration 2025-06-20 16:35:05 +02:00
f475b7b4ab added niri and samba share 2025-06-20 16:34:19 +02:00
e65e523992 added niri 2025-06-19 14:07:57 +02:00
38cb13a195 enabled bluetooth on desktop 2025-06-16 20:43:32 +02:00
fa648a174d Added obs and useful links section to README 2025-06-14 11:02:27 +02:00
95235d5ad5 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-06-11 13:14:22 +02:00
4d1b3e9911 updated flake file 2025-06-11 13:14:20 +02:00
e1fd8a07bd fixed jellyfin 2025-06-03 19:41:07 +02:00
8e9ab3aa38 fixed jellyfin 2025-06-03 19:24:36 +02:00
5da7636a42 Changed caddy config 2025-06-03 19:24:29 +02:00
9fd98e97fe changed how caddy works 2025-05-22 13:25:58 +02:00
af966ab2f3 removed packages 2025-05-22 13:21:46 +02:00
ff981dc3f4 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-22 12:07:36 +02:00
8b2bcf41d4 modified hostname 2025-05-22 12:07:19 +02:00
4874017b4f updated inputs 2025-05-22 12:06:55 +02:00
37b631f68b Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-22 11:24:58 +02:00
cc362f7b5b changed url's 2025-05-22 11:24:56 +02:00
933b9bb6d6 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-22 08:01:46 +02:00
f3bf8d650a Added caddyfile generation 2025-05-22 08:01:31 +02:00
0cdb821d5b disabled karakaeep 2025-05-22 07:57:12 +02:00
bace54a43d added age keys 2025-05-20 17:23:31 +02:00
b260743b9e updated nix flake 2025-05-20 16:41:58 +02:00
f51c7e4267 added basic raspi config 2025-05-20 16:36:44 +02:00
2839974006 Delete result 2025-05-20 15:46:12 +02:00
fe6d12b060 added linkding 2025-05-20 15:36:56 +02:00
f09dfbc108 Migrated from default.nix to configuration.nix 2025-05-17 17:13:43 +02:00
ceeb4980ef recrypt keys again 2025-05-17 15:24:06 +02:00
ae43972aa3 changed age keys 2025-05-17 15:23:52 +02:00
abc634dab8 recrypt again 2025-05-17 15:17:47 +02:00
67cb031d5e Recript files 2025-05-17 15:14:20 +02:00
a321537c40 recript 2025-05-17 15:11:44 +02:00
66f7a1be30 changed rpi config 2025-05-17 15:09:05 +02:00
71390267eb added default home manager 2025-05-17 14:22:08 +02:00
be91e1e877 changed overlay 2025-05-17 14:04:55 +02:00
a6b7791093 changed x86 to arm 2025-05-17 13:59:06 +02:00
329e741553 fixed spelling mistake 2025-05-17 13:51:51 +02:00
5c9cce1e4a added home config for rpi 2025-05-17 13:50:45 +02:00
59f36caeb1 changed rpi config 2025-05-17 13:33:35 +02:00
2f90d8e0e8 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-17 13:12:28 +02:00
2df3077b80 replaced vesktop with webcord 2025-05-17 13:12:27 +02:00
1628be3e62 Added config for static sites 2025-05-16 15:28:36 +02:00
92f20c250b Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-16 14:27:57 +02:00
8ecf066196 Changed typst config 2025-05-16 14:27:55 +02:00
b072ac82e1 added stalwart 2025-05-16 13:24:35 +02:00
a79b1b7281 Added typst 2025-05-16 10:50:59 +02:00
38cb4a54b1 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-13 14:53:40 +02:00
ca45586276 Fixed cliplboard 2025-05-13 14:53:39 +02:00
51f96a1158 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-13 08:14:42 +02:00
e384a2bb8b added vscode 2025-05-13 08:14:38 +02:00
ad155e63ce Added more services 2025-05-09 13:06:35 +02:00
87b73dc10e Added podman aliases 2025-05-09 13:02:38 +02:00
6d3dea12ff Changed helix preferences 2025-05-09 12:19:47 +02:00
5c78d0c1f5 Modularized helix 2025-05-09 12:18:16 +02:00
42cab14829 disabled nushell 2025-05-09 08:43:06 +02:00
22f69febf9 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-09 08:41:44 +02:00
c1d5675927 Added wezterm and added aliases for justfile 2025-05-09 08:40:34 +02:00
86bf66c817 Added storage and home assistant 2025-05-02 16:43:52 +02:00
bde66ffbe2 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-02 08:57:28 +02:00
eb9ca5e5e1 Added nushell 2025-05-02 08:57:22 +02:00
d7056e8f38 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-05-01 18:50:20 +02:00
9147a68f0b Reconfigured zellij configuration 2025-05-01 18:50:16 +02:00
4ab5ad76cf Added beszel to homepage 2025-04-30 15:56:19 +02:00
5f0eb27281 Added beszel monitoring 2025-04-30 15:24:02 +02:00
1a6889d561 added prototype of beszel container 2025-04-30 15:00:05 +02:00
c4f86996d9 Changed hosts 2025-04-30 14:18:34 +02:00
e17752dec4 Paperless added and fixes for old services 2025-04-30 14:17:05 +02:00
40a5f794ea Added pingvin and vaultwarden 2025-04-30 14:17:05 +02:00
b6a91b7dcb Added homepage, immich and uptime kuma 2025-04-30 14:17:05 +02:00
a8a6776b1b merge 2025-04-28 07:46:11 +02:00
4c47313acc updated inputs 2025-04-28 07:45:33 +02:00
01343006a5 Add forgejo container 2025-04-26 14:54:08 +02:00
4788bd8cd4 Changed lldap to kanidm configuration 2025-04-26 14:09:34 +02:00
af39ac1be4 Added boilerplate for lldap and handle wildcard certificates for tbmrs.nl 2025-04-26 12:23:41 +02:00
8dbddaf62d fixed caddy container and added acme 2025-04-26 11:49:14 +02:00
fcc9fe0773 Modified caddy to make a simple working code 2025-04-25 21:09:55 +02:00
7a0797bcd8 added caddy container 2025-04-25 20:08:18 +02:00
52ce5660fa updated inputs 2025-04-25 19:41:14 +02:00
fdf3fe63d7 added surfer 2025-04-25 17:34:05 +02:00
751fc9298f disabled common home applications 2025-04-25 08:54:11 +02:00
2bd950bd83 added ssh 2025-04-25 08:41:34 +02:00
68ec429e96 Enable first podman container 2025-04-25 08:31:10 +02:00
e07c854ae0 updated inputs 2025-04-25 08:14:18 +02:00
a3f022f5fc added pkgs 2025-04-24 22:56:59 +02:00
63c40c4230 added podman workaround 2025-04-24 22:52:25 +02:00
4512b87d02 changed kernel version 2025-04-24 20:37:18 +02:00
bd454fe348 renaming 2025-04-24 17:27:32 +02:00
4b1332e748 Hostname diff 2025-04-24 17:25:36 +02:00
ff3388379c removed bootloader 2025-04-24 16:48:11 +02:00
0c2736b9aa Fixed hostname 2025-04-24 16:45:42 +02:00
a28c86b74a Added none to display mananger 2025-04-24 16:43:14 +02:00
293fad6bf8 Changed configuration 2025-04-24 16:40:15 +02:00
323b8af5aa Removed modulespath 2025-04-24 16:37:17 +02:00
8a425afdde Bunch of naming 2025-04-24 16:36:36 +02:00
b9d4c49d43 Added two new hosts 2025-04-24 16:10:39 +02:00
7f42d033db Changed git username 2025-04-23 12:08:32 +02:00
0ce120c045 Added tu delft gitlab entry 2025-04-23 11:04:34 +02:00
46d4f7f0f6 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-04-22 08:19:48 +02:00
cd16cc2cb8 Updated firefox 2025-04-22 08:19:31 +02:00
82e9af1d80 updated inputes 2025-04-21 16:08:22 +02:00
66aa78041e Updated inputes 2025-04-10 09:08:27 +02:00
c52c189e87 Added assembly language server 2025-04-02 12:54:06 +02:00
e22ca026e5 Fixed conflicts 2025-03-28 16:07:21 +01:00
52624b4390 Lots of changes 2025-03-28 16:06:09 +01:00
5b64398bfb Updated inputs and fixed cosmic greeter 2025-03-28 16:05:57 +01:00
a9b50ca7f2 Updated inputs 2025-03-23 12:37:05 +01:00
78d49601db Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-03-20 14:19:35 +01:00
77953bd48b Desktop changes 2025-03-20 14:19:09 +01:00
3567163844 Updated inputs and and removed unused helix entries 2025-03-20 08:22:50 +01:00
aa5022198f Modified options 2025-03-17 15:10:26 +01:00
c573823590 Updated flakes 2025-03-13 11:34:46 +01:00
e655ba8b08 Added trusted users 2025-03-02 11:07:50 +01:00
4a4648eafd Added incus service 2025-02-28 16:29:18 +01:00
ae201dc410 fixed typo 2025-02-28 08:43:14 +01:00
729fd9688f Modified tablet and desktop config 2025-02-28 08:30:05 +01:00
eacbe34402 Updated flakes 2025-02-25 11:01:06 +01:00
690daec6fa Enabled sunshine 2025-02-22 16:17:19 +01:00
9a08ed5dff Updated inputs 2025-02-20 16:37:00 +01:00
e1eef10228 Migrated bookmarks to Q3 2025-02-10 08:25:13 +01:00
f3362df5aa Updated zellij and docker configuration 2025-02-06 11:16:24 +01:00
3a61bc6b26 Update flake inputs 2025-02-03 13:35:23 +01:00
d161cf7a81 Updated ti desktop and ch desktop 2025-02-01 11:41:25 +01:00
19e101ddc9 Change to unstable bitwarden version 2025-01-28 14:33:57 +01:00
eab59092a4 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-01-28 13:34:10 +01:00
dc7061e70a Updated inputs 2025-01-28 13:33:37 +01:00
482abfdf63 Added hoppscotch 2025-01-26 22:45:11 +01:00
16d8eb35d1 Updated flake inputs 2025-01-20 09:44:42 +01:00
f739a1a984 Added helix nuxt configuration 2025-01-18 13:05:02 +01:00
6033709dea Remoed nuxt helix configuration 2025-01-13 23:21:05 +01:00
bfc2c002b1 modified helix configuration 2025-01-13 22:30:11 +01:00
8944b6534a Enable docker on Timo desktop 2025-01-13 16:53:57 +01:00
587d2bc790 Added pull and update command 2025-01-11 11:28:56 +01:00
beb673db10 Updated flake inputs 2025-01-11 11:25:08 +01:00
44c97f169d Changed other hostnames 2025-01-10 13:55:26 +01:00
ecc8187973 Migrated hostname 2025-01-10 13:47:02 +01:00
9c88315c00 Changed justfile 2025-01-10 13:20:05 +01:00
c0661b2522 Removed homelab and updated config 2025-01-09 22:52:28 +01:00
e09285d330 Modified config so kiiwy doesn't get mad 2025-01-09 19:28:33 +01:00
ba648c277c Small fix 2025-01-09 17:30:17 +01:00
42cd51c0b5 Added wallpaper 2025-01-09 17:16:21 +01:00
fa8a1f2eec Changed stylix 2025-01-09 17:14:10 +01:00
ac8f095cce Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix 2025-01-09 15:59:17 +01:00
3705f8b8fe Added christa desktop 2025-01-09 15:59:10 +01:00
89993d7c8a Added hosts voor laptop config 2025-01-09 08:26:58 +01:00
f85a04b3b8 Added gnome extension manager 2025-01-07 13:18:12 +01:00
53e3c11d1e Added tweaks 2025-01-07 13:15:33 +01:00
b19e207ec7 Updated inputs 2025-01-07 10:17:48 +01:00
86b463f067 Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix
Merge
2025-01-03 11:09:13 +01:00
71f09fccc0 Added hosts configuration 2025-01-03 11:09:05 +01:00
331f2c2962 Updated surface config 2025-01-02 19:30:27 +01:00
08f7138ba4 Updated hardware configuration 2025-01-02 19:11:41 +01:00
3c31e70fd2 Config changes 2025-01-02 09:35:55 +01:00
b023df2fab Merge branch 'main' of https://gitea.xeovalyte.dev/xeovalyte/nix 2024-12-28 17:09:18 +01:00
8026bc8603 Change nvidia configuration 2024-12-28 17:04:36 +01:00
c1dc4529f5 Updated desktop configuration 2024-12-28 16:59:34 +01:00
99818d0119 Updated inputs 2024-12-27 09:23:15 +01:00
ec339ff0da Merge branch 'main' of ssh://gitea.xeovalyte.dev:2222/xeovalyte/nix
Merge
2024-12-25 23:55:31 +01:00
747c00129b Migrated from nix-colors to stylix 2024-12-25 23:55:11 +01:00
5243670d89 Updated surface configuration 2024-12-25 10:57:48 +01:00
030cbad2ca Added surface configuration 2024-12-25 09:46:01 +01:00
xeovalyte
be7e8d306f Added surface configuration 2024-12-24 14:55:11 +01:00
2a05a1ec06 Updated flake 2024-12-24 10:28:13 +01:00
b3fde8e028 Reworked home manager configuration to modules 2024-12-24 10:20:09 +01:00
5edd8b1e01 Migrated from import based to config based 2024-12-23 17:03:36 +01:00
c1b12746f5 Cosmic updates 2024-12-21 20:09:35 +01:00
55a416c7d7 Merge branch 'main' of https://gitea.xeovalyte.dev/xeovalyte/nix
Merge
2024-11-30 18:30:08 +01:00
c177f110a2 Modified flake 2024-11-30 18:30:01 +01:00
6dd44cc064 Merge branch 'main' of https://gitea.xeovalyte.dev/xeovalyte/nix
Merge
2024-11-09 18:47:19 +01:00
59367c916f Merge 2024-10-06 19:17:37 +02:00
d69aa82748 Migrated from podman to docker 2024-10-06 19:16:41 +02:00
207 changed files with 5777 additions and 9768 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
result

7
.sops.yaml Normal file
View File

@@ -0,0 +1,7 @@
keys:
- &v-th-ctr-01 age1cs2p7tgk9356tjmet6526k3ghwq9we82nz6z7qggqns656paku6sx30tkg
- &p-th-rpi-01 age1dd7xpgnak6z6zmwa9889pjd6hmj42zaxq7ea8s47dlk3v6u5f37sldkt97
creation_rules:
- path_regex: secrets/deploy.yaml$
age: >-
age1cs2p7tgk9356tjmet6526k3ghwq9we82nz6z7qggqns656paku6sx30tkg,age12gjtehffgmepyga9vaqkurn9fyvte8n7wsklmg866z5usezvuqlsr2m5mp

View File

@@ -3,6 +3,7 @@
## New system install guide
### 1. Install Nixos with ISO
[Nixos download](https://nixos.org/download)
### 2. Copy hardware configuration to hosts directory
@@ -10,14 +11,85 @@
### 3. Generate ssh-keys
**Archserver**
1. `ssh-keygen -f ~/.ssh/archserver`
2. `ssh-copy-id -i ~/.ssh/archserver 192.168.1.20`
**Gitea**
1. `ssh-keygen -f ~/.ssh/gitea -t ed25519 -C "me+gitea@xeovalyte.dev"`
2. Upload to [Gitea](https://gitea.xeovalyt.dev)
3. Verify ssh key (follow instructions on Gitea)
### 4. Add SSH keys
1. `ssh-add ~/.ssh/gitea`
2. `ssh-add ~/.ssh/archserver`
## Homelab
List over services
| Service | Description | Link |
| -------------- | ---------------------------------- | ---------------------------------------------------------------------- |
| Caddy | Reverse proxy | - |
| Kanidm | Openid provider | [auth.tbmrs.nl](https://auth.tbmrs.nl) |
| Forgejo | Git provider | [git.tbmrs.nl](https://git.tbmrs.nl) |
| Immich | Photo and videos | [photos.tbmrs.nl](https://photos.tbmrs.nl) |
| Homepage | Dashboard | [home.tbmrs.nl](https://home.tbmrs.nl) |
| Uptime Kuma | Uptime monitor | [uptime.tbmrs.nl](https://uptime.tbmrs.nl) |
| Pingvin share | Sharing of files | [share.tbmrs.nl](https://share.tbmrs.nl) |
| Vaultwarden | Password manager | [vault.local.tbmrs.nl](https://vault.local.tbmrs.nl) |
| Paperless NGX | Documents management | [paperless.local.tbmrs.nl](https://paperless.local.tbmrs.nl) |
| Beszel | Resource usage | [monitor.local.tbmrs.nl](https://monitor.local.tbmrs.nl) |
| Dufs | File manager | [files.tbmrs.nl](https://files.tbmrs.nl) |
| Syncthing | File syncing | [syncthing.local.tbmrs.nl](https://syncthing.local.tbmrs.nl) |
| Home Assistant | Home automation | [home-assistant.local.tbmrs.nl](https://home-assistant.local.tbmrs.nl) |
| ~~Karakeep~~ | Bookmarking | ~~[karakeep.local.tbmrs.nl](https://karakeep.local.tbmrs.nl)~~ |
| Vikunja | Tasks management | [vikunja.local.tbmrs.nl](https://vikunja.local.tbmrs.nl) |
| Stalwart | Mailserver | [mail.tbmrs.nl](https://mail.tbmrs.nl) |
| Linkding | Bookmark managment | [links.local.tbmrs.nl](https://links.local.tbmrs.nl) |
| Jellyfin | Movies, series and music streaming | [stream.local.tbmrs.nl](https://stream.local.tbmrs.nl) |
### Todo
- Install koreader selfhosted sync
### Openid commands
#### Configure new openid client
From: [Kanidm Docs](https://kanidm.github.io/kanidm/master/integrations/oauth2/examples.html)
Replace `<service>` with the name of the service.
1. Create a new Kanidm group, and add your regular account to it:
```bash
$ kanidm group create <service>_users
$ kanidm group add-members <service>_users your_username
```
2. Create a new OAuth2 application configuration in Kanidm, configure the redirect URL, and scope access to the group:
```bash
$ kanidm system oauth2 create <service> <servicename> <service_login_url>
$ kanidm system oauth2 add-redirect-url <service> <redirect_url>
$ kanidm system oauth2 update-scope-map <service> <service>_users email openid profile groups
```
3. (Optional) Disable PKCE
```bash
$ kanidm system oauth2 warning-insecure-client-disable-pkce <service>
```
4. Get the OAuth2 client secret from Kanidm
```bash
$ kanidm system oauth2 show-basic-secret <service>
```
## Useful links
Womier keyboard permissions denied or not finding: https://github.com/the-via/releases/issues/257

BIN
assets/kiiwy.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 46 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.0 MiB

BIN
assets/wallpaper-2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.8 MiB

View File

@@ -1,7 +1,7 @@
FROM caddy:2.8-builder AS builder
RUN xcaddy build \
--with github.com/caddy-dns/cloudflare
--with github.com/caddy-dns/transip
FROM caddy:2.8

558
flake.lock generated
View File

@@ -1,5 +1,55 @@
{
"nodes": {
"base16": {
"inputs": {
"fromYaml": "fromYaml"
},
"locked": {
"lastModified": 1746562888,
"narHash": "sha256-YgNJQyB5dQiwavdDFBMNKk1wyS77AtdgDk/VtU6wEaI=",
"owner": "SenchoPens",
"repo": "base16.nix",
"rev": "806a1777a5db2a1ef9d5d6f493ef2381047f2b89",
"type": "github"
},
"original": {
"owner": "SenchoPens",
"repo": "base16.nix",
"type": "github"
}
},
"base16-fish": {
"flake": false,
"locked": {
"lastModified": 1622559957,
"narHash": "sha256-PebymhVYbL8trDVVXxCvZgc0S5VxI7I1Hv4RMSquTpA=",
"owner": "tomyun",
"repo": "base16-fish",
"rev": "2f6dd973a9075dabccd26f1cded09508180bf5fe",
"type": "github"
},
"original": {
"owner": "tomyun",
"repo": "base16-fish",
"type": "github"
}
},
"base16-helix": {
"flake": false,
"locked": {
"lastModified": 1748408240,
"narHash": "sha256-9M2b1rMyMzJK0eusea0x3lyh3mu5nMeEDSc4RZkGm+g=",
"owner": "tinted-theming",
"repo": "base16-helix",
"rev": "6c711ab1a9db6f51e2f6887cc3345530b33e152e",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-helix",
"type": "github"
}
},
"base16-schemes": {
"flake": false,
"locked": {
@@ -16,19 +66,110 @@
"type": "github"
}
},
"flake-compat": {
"base16-vim": {
"flake": false,
"locked": {
"lastModified": 1717312683,
"narHash": "sha256-FrlieJH50AuvagamEvWMIE6D2OAnERuDboFDYAED/dE=",
"lastModified": 1732806396,
"narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
"owner": "tinted-theming",
"repo": "base16-vim",
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-vim",
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github"
}
},
"disko": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1751854533,
"narHash": "sha256-U/OQFplExOR1jazZY4KkaQkJqOl59xlh21HP9mI79Vc=",
"owner": "nix-community",
"repo": "flake-compat",
"rev": "38fd3954cf65ce6faf3d0d45cd26059e059f07ea",
"repo": "disko",
"rev": "16b74a1e304197248a1bc663280f2548dbfcae3c",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "flake-compat",
"repo": "disko",
"type": "github"
}
},
"firefox-gnome-theme": {
"flake": false,
"locked": {
"lastModified": 1748383148,
"narHash": "sha256-pGvD/RGuuPf/4oogsfeRaeMm6ipUIznI2QSILKjKzeA=",
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
"rev": "4eb2714fbed2b80e234312611a947d6cb7d70caf",
"type": "github"
},
"original": {
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": [
"stylix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1749398372,
"narHash": "sha256-tYBdgS56eXYaWVW3fsnPQ/nFlgWi/Z2Ymhyu21zVM98=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "9305fe4e5c2a6fcf5ba6a3ff155720fbe4076569",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"fromYaml": {
"flake": false,
"locked": {
"lastModified": 1731966426,
"narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=",
"owner": "SenchoPens",
"repo": "fromYaml",
"rev": "106af9e2f715e2d828df706c386a685698f3223b",
"type": "github"
},
"original": {
"owner": "SenchoPens",
"repo": "fromYaml",
"type": "github"
}
},
"gnome-shell": {
"flake": false,
"locked": {
"lastModified": 1744584021,
"narHash": "sha256-0RJ4mJzf+klKF4Fuoc8VN8dpQQtZnKksFmR2jhWE1Ew=",
"owner": "GNOME",
"repo": "gnome-shell",
"rev": "52c517c8f6c199a1d6f5118fae500ef69ea845ae",
"type": "github"
},
"original": {
"owner": "GNOME",
"ref": "48.1",
"repo": "gnome-shell",
"type": "github"
}
},
@@ -39,20 +180,76 @@
]
},
"locked": {
"lastModified": 1733572789,
"narHash": "sha256-zjO6m5BqxXIyjrnUziAzk4+T4VleqjstNudSqWcpsHI=",
"lastModified": 1751810233,
"narHash": "sha256-kllkNbIqQi3VplgTMeGzuh1t8Gk8TauvkTRt93Km+tQ=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "c7ffc9727d115e433fd884a62dc164b587ff651d",
"rev": "9b0873b46c9f9e4b7aa01eb634952c206af53068",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-24.11",
"ref": "release-25.05",
"repo": "home-manager",
"type": "github"
}
},
"niri": {
"inputs": {
"niri-stable": "niri-stable",
"niri-unstable": "niri-unstable",
"nixpkgs": "nixpkgs",
"nixpkgs-stable": "nixpkgs-stable",
"xwayland-satellite-stable": "xwayland-satellite-stable",
"xwayland-satellite-unstable": "xwayland-satellite-unstable"
},
"locked": {
"lastModified": 1752057206,
"narHash": "sha256-f8fNAag3K3WAq+lJr2EEu2f3xVSFLPddLgJKZRzXa3M=",
"owner": "sodiboo",
"repo": "niri-flake",
"rev": "90c2edcf32d0fcb511fee9a0b8c580a18178c109",
"type": "github"
},
"original": {
"owner": "sodiboo",
"repo": "niri-flake",
"type": "github"
}
},
"niri-stable": {
"flake": false,
"locked": {
"lastModified": 1748151941,
"narHash": "sha256-z4viQZLgC2bIJ3VrzQnR+q2F3gAOEQpU1H5xHtX/2fs=",
"owner": "YaLTeR",
"repo": "niri",
"rev": "8ba57fcf25d2fc9565131684a839d58703f1dae7",
"type": "github"
},
"original": {
"owner": "YaLTeR",
"ref": "v25.05.1",
"repo": "niri",
"type": "github"
}
},
"niri-unstable": {
"flake": false,
"locked": {
"lastModified": 1750791124,
"narHash": "sha256-F5iVU/hjoSHSSe0gllxm0PcAaseEtGNanYK5Ha3k2Tg=",
"owner": "YaLTeR",
"repo": "niri",
"rev": "37458d94b288945f6cfbd3c5c233f634d59f246c",
"type": "github"
},
"original": {
"owner": "YaLTeR",
"repo": "niri",
"type": "github"
}
},
"nix-colors": {
"inputs": {
"base16-schemes": "base16-schemes",
@@ -72,34 +269,13 @@
"type": "github"
}
},
"nixos-cosmic": {
"inputs": {
"flake-compat": "flake-compat",
"nixpkgs": "nixpkgs",
"nixpkgs-stable": "nixpkgs-stable",
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1733708804,
"narHash": "sha256-PiUrztTiR4aVRC2fMdNcOWYWF1ojvqbrSUYmhtp3970=",
"owner": "lilyinstarlight",
"repo": "nixos-cosmic",
"rev": "1531210f371ecf966ff67e87975f684553bdbbf7",
"type": "github"
},
"original": {
"owner": "lilyinstarlight",
"repo": "nixos-cosmic",
"type": "github"
}
},
"nixos-hardware": {
"locked": {
"lastModified": 1733481457,
"narHash": "sha256-IS3bxa4N1VMSh3/P6vhEAHQZecQ3oAlKCDvzCQSO5Is=",
"lastModified": 1752048960,
"narHash": "sha256-gATnkOe37eeVwKKYCsL+OnS2gU4MmLuZFzzWCtaKLI8=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "e563803af3526852b6b1d77107a81908c66a9fcf",
"rev": "7ced9122cff2163c6a0212b8d1ec8c33a1660806",
"type": "github"
},
"original": {
@@ -111,11 +287,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1733581040,
"narHash": "sha256-Qn3nPMSopRQJgmvHzVqPcE3I03zJyl8cSbgnnltfFDY=",
"lastModified": 1751792365,
"narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "22c3f2cf41a0e70184334a958e6b124fb0ce3e01",
"rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
@@ -142,27 +318,27 @@
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1733412085,
"narHash": "sha256-FillH0qdWDt/nlO6ED7h4cmN+G9uXwGjwmCnHs0QVYM=",
"lastModified": 1751943650,
"narHash": "sha256-7orTnNqkGGru8Je6Un6mq1T8YVVU/O5kyW4+f9C1mZQ=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "4dc2fc4e62dbf62b84132fe526356fbac7b03541",
"rev": "88983d4b665fb491861005137ce2b11a9f89f203",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.11",
"ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1733581040,
"narHash": "sha256-Qn3nPMSopRQJgmvHzVqPcE3I03zJyl8cSbgnnltfFDY=",
"lastModified": 1751792365,
"narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "22c3f2cf41a0e70184334a958e6b124fb0ce3e01",
"rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
@@ -171,37 +347,291 @@
"type": "indirect"
}
},
"root": {
"inputs": {
"home-manager": "home-manager",
"nix-colors": "nix-colors",
"nixos-cosmic": "nixos-cosmic",
"nixos-hardware": "nixos-hardware",
"nixpkgs": [
"nixos-cosmic",
"nixpkgs-stable"
],
"nixpkgs-unstable": "nixpkgs-unstable"
"nixpkgs_2": {
"locked": {
"lastModified": 1751943650,
"narHash": "sha256-7orTnNqkGGru8Je6Un6mq1T8YVVU/O5kyW4+f9C1mZQ=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "88983d4b665fb491861005137ce2b11a9f89f203",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-25.05",
"type": "indirect"
}
},
"rust-overlay": {
"nixpkgs_3": {
"locked": {
"lastModified": 1744868846,
"narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1751211869,
"narHash": "sha256-1Cu92i1KSPbhPCKxoiVG5qnoRiKTgR5CcGSRyLpOd7Y=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b43c397f6c213918d6cfe6e3550abfe79b5d1c51",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nur": {
"inputs": {
"flake-parts": [
"stylix",
"flake-parts"
],
"nixpkgs": [
"stylix",
"nixpkgs"
],
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1751320053,
"narHash": "sha256-3m6RMw0FbbaUUa01PNaMLoO7D99aBClmY5ed9V3vz+0=",
"owner": "nix-community",
"repo": "NUR",
"rev": "cbde1735782f9c2bb2c63d5e05fba171a14a4670",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "NUR",
"type": "github"
}
},
"root": {
"inputs": {
"disko": "disko",
"home-manager": "home-manager",
"niri": "niri",
"nix-colors": "nix-colors",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs_2",
"nixpkgs-unstable": "nixpkgs-unstable",
"sops-nix": "sops-nix",
"stylix": "stylix"
}
},
"sops-nix": {
"inputs": {
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1751606940,
"narHash": "sha256-KrDPXobG7DFKTOteqdSVeL1bMVitDcy7otpVZWDE6MA=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "3633fc4acf03f43b260244d94c71e9e14a2f6e0d",
"type": "github"
},
"original": {
"owner": "Mic92",
"repo": "sops-nix",
"type": "github"
}
},
"stylix": {
"inputs": {
"base16": "base16",
"base16-fish": "base16-fish",
"base16-helix": "base16-helix",
"base16-vim": "base16-vim",
"firefox-gnome-theme": "firefox-gnome-theme",
"flake-parts": "flake-parts",
"gnome-shell": "gnome-shell",
"nixpkgs": "nixpkgs_4",
"nur": "nur",
"systems": "systems",
"tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes",
"tinted-tmux": "tinted-tmux",
"tinted-zed": "tinted-zed"
},
"locked": {
"lastModified": 1752014016,
"narHash": "sha256-Gn6cnUPchPenxUFDt+dh7836CNu3GM13aghTabfZUrU=",
"owner": "danth",
"repo": "stylix",
"rev": "26042c1f59ae868193fa4378f85e4f6240f25ff8",
"type": "github"
},
"original": {
"owner": "danth",
"ref": "release-25.05",
"repo": "stylix",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": {
"flake": false,
"locked": {
"lastModified": 1726913040,
"narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=",
"owner": "tinted-theming",
"repo": "tinted-foot",
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-foot",
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
"type": "github"
}
},
"tinted-kitty": {
"flake": false,
"locked": {
"lastModified": 1735730497,
"narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=",
"owner": "tinted-theming",
"repo": "tinted-kitty",
"rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-kitty",
"type": "github"
}
},
"tinted-schemes": {
"flake": false,
"locked": {
"lastModified": 1750770351,
"narHash": "sha256-LI+BnRoFNRa2ffbe3dcuIRYAUcGklBx0+EcFxlHj0SY=",
"owner": "tinted-theming",
"repo": "schemes",
"rev": "5a775c6ffd6e6125947b393872cde95867d85a2a",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "schemes",
"type": "github"
}
},
"tinted-tmux": {
"flake": false,
"locked": {
"lastModified": 1751159871,
"narHash": "sha256-UOHBN1fgHIEzvPmdNMHaDvdRMgLmEJh2hNmDrp3d3LE=",
"owner": "tinted-theming",
"repo": "tinted-tmux",
"rev": "bded5e24407cec9d01bd47a317d15b9223a1546c",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-tmux",
"type": "github"
}
},
"tinted-zed": {
"flake": false,
"locked": {
"lastModified": 1751158968,
"narHash": "sha256-ksOyv7D3SRRtebpXxgpG4TK8gZSKFc4TIZpR+C98jX8=",
"owner": "tinted-theming",
"repo": "base16-zed",
"rev": "86a470d94204f7652b906ab0d378e4231a5b3384",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-zed",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"nixos-cosmic",
"stylix",
"nur",
"nixpkgs"
]
},
"locked": {
"lastModified": 1733625333,
"narHash": "sha256-tIML2axjm4AnlKP29upVJxzBpj4Cy4ak+PKonqQtXmc=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "430c8b054e45ea44fd2c9521a378306ada507a6c",
"lastModified": 1733222881,
"narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "49717b5af6f80172275d47a418c9719a31a78b53",
"type": "github"
},
"original": {
"owner": "oxalica",
"repo": "rust-overlay",
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
},
"xwayland-satellite-stable": {
"flake": false,
"locked": {
"lastModified": 1748488455,
"narHash": "sha256-IiLr1alzKFIy5tGGpDlabQbe6LV1c9ABvkH6T5WmyRI=",
"owner": "Supreeeme",
"repo": "xwayland-satellite",
"rev": "3ba30b149f9eb2bbf42cf4758d2158ca8cceef73",
"type": "github"
},
"original": {
"owner": "Supreeeme",
"ref": "v0.6",
"repo": "xwayland-satellite",
"type": "github"
}
},
"xwayland-satellite-unstable": {
"flake": false,
"locked": {
"lastModified": 1751228685,
"narHash": "sha256-MENtauGBhJ+kDeFaawvWGXaFG3Il6qQzjaP0RmtfM0k=",
"owner": "Supreeeme",
"repo": "xwayland-satellite",
"rev": "557ebeb616e03d5e4a8049862bbbd1f02c6f020b",
"type": "github"
},
"original": {
"owner": "Supreeeme",
"repo": "xwayland-satellite",
"type": "github"
}
}

182
flake.nix
View File

@@ -1,13 +1,13 @@
{
description = "Nixos configuration for Xeovalyte";
description = "Nixos configuration for Timo";
inputs = {
nixpkgs.url = "nixpkgs/nixos-24.11";
nixpkgs.url = "nixpkgs/nixos-25.05";
nixpkgs-unstable.url = "nixpkgs/nixos-unstable";
home-manager = {
url = "github:nix-community/home-manager/release-24.11";
url = "github:nix-community/home-manager/release-25.05";
inputs.nixpkgs.follows = "nixpkgs";
};
@@ -15,96 +15,140 @@
nix-colors.url = "github:misterio77/nix-colors";
nixpkgs.follows = "nixos-cosmic/nixpkgs-stable";
stylix.url = "github:danth/stylix/release-25.05";
nixos-cosmic = {
url = "github:lilyinstarlight/nixos-cosmic";
};
sops-nix.url = "github:Mic92/sops-nix";
niri.url = "github:sodiboo/niri-flake";
disko.url = "github:nix-community/disko";
disko.inputs.nixpkgs.follows = "nixpkgs";
};
outputs = inputs@{ self, nixpkgs, nixpkgs-unstable, home-manager, nix-colors, nixos-cosmic, ... }:
let
system = "x86_64-linux";
overlay-unstable = final: prev: {
unstable = import nixpkgs-unstable {
config.allowUnfree = true;
localSystem = { inherit system; };
};
};
outputs = {
self,
nixpkgs,
home-manager,
nix-colors,
stylix,
sops-nix,
niri,
disko,
...
} @ inputs: let
inherit (self) outputs;
systems = [
"x86_64-linux"
"aarch64-linux"
];
forAllSystems = nixpkgs.lib.genAttrs systems;
in
{
# Laptop Configuration
packages = forAllSystems (system: import ./pkgs nixpkgs.legacyPackages.${system} );
overlays = import ./overlays { inherit inputs; };
nixosConfigurations = {
xv-laptop = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs; };
ti-clt-lpt01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
({ config, pkgs, ... }: { nixpkgs.overlays = [ overlay-unstable ]; })
inputs.nixos-hardware.nixosModules.framework-13-7040-amd
nixos-cosmic.nixosModules.default
./hosts/laptop
./hosts/ti-clt-lpt01/configuration.nix
];
};
ch-clt-dsk01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
./hosts/ch-clt-dsk01/configuration.nix
];
};
ti-clt-tbl01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
inputs.nixos-hardware.nixosModules.microsoft-surface-go
./hosts/ti-clt-tbl01/configuration.nix
];
};
# Timo's desktop
ti-clt-dsk01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
./hosts/ti-clt-dsk01/configuration.nix
];
};
v-th-ctr-01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
./hosts/v-th-ctr-01/configuration.nix
];
};
# Raspberry pi
p-th-rpi-01 = nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs outputs; };
modules = [
./hosts/p-th-rpi-01/configuration.nix
];
};
};
homeConfigurations = {
"xeovalyte@xv-laptop" = home-manager.lib.homeManagerConfiguration {
# Timo
"xeovalyte@ti-clt-lpt01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.x86_64-linux;
extraSpecialArgs = { inherit inputs nix-colors; };
extraSpecialArgs = { inherit inputs outputs; };
modules = [
({ config, pkgs, ... }: { nixpkgs.overlays = [ overlay-unstable ]; })
./hosts/laptop/home.nix
./hosts/ti-clt-lpt01/home.nix
];
};
};
nixosConfigurations = {
xv-desktop = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs; };
modules = [
({ config, pkgs, ... }: { nixpkgs.overlays = [ overlay-unstable ]; })
./hosts/desktop
home-manager.nixosModules.home-manager
{
home-manager.useGlobalPkgs = true;
home-manager.backupFileExtension = "backup";
home-manager.extraSpecialArgs = { inherit inputs nix-colors; };
home-manager.users.xeovalyte.imports = [ ./hosts/desktop/home.nix ];
}
];
};
};
# pm01vm01 Configuration
nixosConfigurations = {
pm01vm01 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs; };
modules = [
({ config, pkgs, ... }: { nixpkgs.overlays = [ overlay-unstable ]; })
./hosts/pm01vm01
];
};
};
homeConfigurations = {
"xeovalyte@pm01vm01" = home-manager.lib.homeManagerConfiguration {
"xeovalyte@ti-clt-tbl01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.x86_64-linux;
extraSpecialArgs = { inherit inputs nix-colors; };
extraSpecialArgs = { inherit inputs outputs; };
modules = [
({ config, pkgs, ... }: { nixpkgs.overlays = [ overlay-unstable ]; })
./hosts/pm01vm01/home.nix
./hosts/ti-clt-tbl01/home.nix
];
};
"xeovalyte@ti-clt-dsk01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.x86_64-linux;
extraSpecialArgs = { inherit inputs outputs; };
modules = [
./hosts/ti-clt-dsk01/home.nix
];
};
# Christa
"kiiwy@ch-clt-dsk01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.x86_64-linux;
extraSpecialArgs = { inherit inputs outputs; };
modules = [
./hosts/ch-clt-dsk01/home.nix
];
};
# Deploy
"deploy@v-th-ctr-01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.x86_64-linux;
extraSpecialArgs = { inherit inputs outputs; };
modules = [
./hosts/v-th-ctr-01/home.nix
];
};
# Deploy
"deploy@p-th-rpi-01" = home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.aarch64-linux;
extraSpecialArgs = { inherit inputs outputs; };
modules = [
./hosts/p-th-rpi-01/home.nix
];
};
};
};
}

2
homelab/.gitignore vendored
View File

@@ -1,2 +0,0 @@
secrets/
.env

View File

@@ -1,44 +0,0 @@
# Configuration steps
## 1. Install [NixOS](https://nixos.org/)
Follow the steps from the [NixOS Manual Installation](https://nixos.org/manual/nixos/stable/#sec-installation-manual)
> At the edit configuration.nix step you must:
>
> - Add a user to the configuration file and set a password
> - Enable openssh
## 2. Configuring flake
1. Clone this repository
2. Copy hardware configuration to host<br>
`cp /etc/nixos/hardware-configuration.nix ~/nix/hosts/<host>/hardware-configuration.nix`
3. Rebuild system
`sudo nixos-rebuild switch --flake .#<host>`
4. Rebuild home-manager
`home-manager switch --flake .#<user>@<host>`
5. Reboot
## 3. Configuring docker containers
1. Create proxy network<br>
`docker network create proxy`
2. Configure [Adguard](./adguard/README.md)
3. Configure [Caddy](./caddy/README.md)
4. Configure [Authelia](./authelia/README.md)
5. Configure the rest of the services
# Services
| Name | Use | Domain | Auth |
| ------- | -------------- | ----------------------------- | ------ |
| Adguard | DNS | https://adguard.timo.bmrs.nl/ | local |
| Caddy | Reverse proxy | - | - |
| Forgejo | Git | https://git.timo.bmrs.nl/ | Openid |
| Ldap | User directory | https://ldap.timo.bmrs.nl/ | - |
# Services to try out
- [Beszel](https://github.com/henrygd/beszel)

View File

@@ -1,7 +0,0 @@
# Adguard Home
1. Temporaraly edit ports in docker-compose file to setup
2. Configuration screen<br>
1. Change listen interface to port 3000
3. Add DNS rewrite for *.timo.bmrs.nl
4. Delete temporaraly port edit in docker-compose

View File

@@ -1,21 +0,0 @@
services:
adguardhome:
image: adguard/adguardhome:latest
container_name: adguardhome
restart: unless-stopped
ports:
- 53:53/tcp
- 53:53/udp
# - 80:3000 # Only use during setup
volumes:
- work:/opt/adguardhome/work
- conf:/opt/adguardhome/conf
volumes:
work:
conf:
networks:
default:
name: proxy
external: true

View File

@@ -1 +0,0 @@
keys/

View File

@@ -1,13 +0,0 @@
# Authelia
1. Edit environment variables.
1. For HMAC_SECRET, JWT_SECRET, ADMIN_PASSWORD, SESSION_SECRET, STORAGE_ENCRYPTION_KEY, LLDAP_KEY_SEED use an random alphanumeric string of at least 64 characters
2. For CLIENT_SECRET, CLIEND_ID: [Generate client identifier](https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#how-do-i-generate-a-client-identifier-or-client-secret)
1. Use single quotes for the client secret
2. Generate PAM file using and save it to the /config/keys directory: [Generating keypair](https://www.authelia.com/reference/guides/generating-secure-values/#generating-an-rsa-keypair)
1. Save the random password
3. Configure LLDAP
1. Create a user in LLDAP with the group: lldap_password_manager
2. Create groups: forgejo

File diff suppressed because it is too large Load Diff

View File

@@ -1,44 +0,0 @@
services:
authelia:
image: authelia/authelia:latest
container_name: authelia
restart: unless-stopped
depends_on:
- lldap
volumes:
- ./config/configuration.yml:/config/configuration.yml
- ./config/keys:/keys
- data_authelia:/config
environment:
X_AUTHELIA_CONFIG_FILTERS: template
JWT_SECRET: ${AUTHELIA_JWT_SECRET}
SESSION_SECRET: ${AUTHELIA_SESSION_SECRET}
STORAGE_ENCRYPTION_KEY: ${AUTHELIA_STORAGE_ENCRYPTION_KEY}
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD: ${LLDAP_ADMIN_PASSWORD}
HMAC_SECRET: ${AUTHELIA_HMAC_SECRET}
CLIENT_SECRET_FORGEJO: ${AUTHELIA_CLIENT_SECRET_FORGEJO}
CLIENT_ID_FORGEJO: ${AUTHELIA_CLIENT_ID_FORGEJO}
CLIENT_SECRET_PAPERLESS: ${AUTHELIA_CLIENT_SECRET_PAPERLESS}
CLIENT_ID_PAPERLESS: ${AUTHELIA_CLIENT_ID_PAPERLESS}
lldap:
image: lldap/lldap:latest
container_name: lldap
restart: unless-stopped
volumes:
- data_lldap:/data
environment:
LLDAP_JWT_SECRET: ${LLDAP_JWT_SECRET}
LLDAP_KEY_SEED: ${LLDAP_KEY_SEED}
LLDAP_LDAP_BASE_DN: dc=bmrs,dc=nl
LLDAP_LDAP_USER_PASS: ${LLDAP_ADMIN_PASSWORD}
volumes:
data_lldap:
data_authelia:
networks:
default:
name: proxy
external: true

View File

@@ -1,4 +0,0 @@
# Caddy reverse proxy
1. Obtain cloudflare tokens: [Caddy Cloudflare](https://github.com/caddy-dns/cloudflare)
2. Set environment variables

View File

@@ -1,21 +0,0 @@
localhost {
respond "Hello world!"
}
*.timo.bmrs.nl timo.bmrs.nl {
tls {
dns cloudflare {
zone_token {env.CF_ZONE_TOKEN}
api_token {env.CF_API_TOKEN}
}
resolvers 1.1.1.1
}
forward_auth authelia:9091 {
uri /api/authz/forward-auth
copy_headers Remote-User Remote-Groups Remote-Email Remote-Name
}
import routes/*
}

View File

@@ -1,4 +0,0 @@
@adguard host adguard.timo.bmrs.nl
handle @adguard {
reverse_proxy adguardhome:3000
}

View File

@@ -1,9 +0,0 @@
@ldap host ldap.timo.bmrs.nl
handle @ldap {
reverse_proxy lldap:17170
}
@authelia host auth.timo.bmrs.nl
handle @authelia {
reverse_proxy authelia:9091
}

View File

@@ -1,9 +0,0 @@
@dozzle host dozzle.timo.bmrs.nl
handle @dozzle {
forward_auth authelia:9091 {
uri /api/authz/forward-auth
copy_headers Remote-User Remote-Groups Remote-Name Remote-Email
}
reverse_proxy dozzle:8080
}

View File

@@ -1,4 +0,0 @@
@forgejo host git.timo.bmrs.nl
handle @forgejo {
reverse_proxy forgejo:3000
}

View File

@@ -1,4 +0,0 @@
@homeassistant host homeassistant.timo.bmrs.nl
handle @homeassistant {
reverse_proxy homeassistant:8123
}

View File

@@ -1,4 +0,0 @@
@homepage host home.timo.bmrs.nl
handle @homepage {
reverse_proxy homepage:3000
}

View File

@@ -1,4 +0,0 @@
@immich host immich.timo.bmrs.nl
handle @immich {
reverse_proxy immich:2283
}

View File

@@ -1,12 +0,0 @@
@nextcloud host cloud.timo.bmrs.nl
handle @nextcloud {
redir /.well-known/carddav /remote.php/dav/ 301
redir /.well-known/caldav /remote.php/dav/ 301
reverse_proxy nextcloud:80
}
@office host office.timo.bmrs.nl
handle @office {
reverse_proxy nextcloud-office:9980
}

View File

@@ -1,4 +0,0 @@
@paperless-ngx host paperless.timo.bmrs.nl
handle @paperless-ngx {
reverse_proxy paperless-ngx:8000
}

View File

@@ -1,4 +0,0 @@
@searxng host search.timo.bmrs.nl
handle @searxng {
reverse_proxy searxng:8080
}

View File

@@ -1,4 +0,0 @@
@uptime-kuma host uptime.timo.bmrs.nl
handle @uptime-kuma {
reverse_proxy uptime-kuma:3001
}

View File

@@ -1,4 +0,0 @@
@vaultwarden host bitwarden.timo.bmrs.nl
handle @vaultwarden {
reverse_proxy vaultwarden:80
}

View File

@@ -1,33 +0,0 @@
services:
caddy:
build: .
container_name: caddy
restart: unless-stopped
cap_add:
- NET_ADMIN
ports:
- 80:80
- 443:443
- 443:443/udp
volumes:
- data:/data
- config:/config
- ./caddyfiles:/etc/caddy/
environment:
CF_ZONE_TOKEN: ${CF_ZONE_TOKEN}
CF_API_TOKEN: ${CF_API_TOKEN}
networks:
proxy:
aliases:
- auth.timo.bmrs.nl
- cloud.timo.bmrs.nl
- office.timo.bmrs.nl
volumes:
data:
config:
networks:
proxy:
name: proxy
external: true

View File

@@ -1,15 +0,0 @@
services:
dozzle:
image: amir20/dozzle:latest
container_name: dozzle
restart: unless-stopped
volumes:
- /run/user/1000/docker.sock:/var/run/docker.sock:ro
environment:
DOZZLE_ENABLE_ACTIONS: true
DOZZLE_AUTH_PROVIDER: forward-proxy
networks:
default:
external: true
name: proxy

File diff suppressed because it is too large Load Diff

View File

@@ -1,40 +0,0 @@
services:
forgejo:
image: codeberg.org/forgejo/forgejo:9
container_name: forgejo
restart: unless-stopped
depends_on:
- db
ports:
- 222:22
volumes:
- data:/data
- ./config/app.ini:/etc/forgejo/app.ini
- /etc/timezone:/etc/timezone:ro
- /etc/localtime:/etc/localtime:ro
environment:
FORGEJO__database__DB_TYPE: postgres
FORGEJO__database__HOST: "forgejo-db"
FORGEJO__database__NAME: forgejo
FORGEJO__database__USER: forgejo
FORGEJO__database__PASSWD: ${DB_PASSWORD}
db:
image: postgres:14
container_name: forgejo-db
restart: unless-stopped
volumes:
- data_db:/var/lib/postgresql/data
environment:
POSTGRES_USER: forgejo
POSTGRES_PASSWORD: ${DB_PASSWORD}
POSTGES_DB: forgejo
volumes:
data:
data_db:
networks:
default:
name: proxy
external: true

View File

@@ -1,15 +0,0 @@
# Loads default set of integrations. Do not remove.
default_config:
# Load frontend themes from the themes folder
frontend:
themes: !include_dir_merge_named themes
automation: !include automations.yaml
script: !include scripts.yaml
scene: !include scenes.yaml
http:
use_x_forwarded_for: true
trusted_proxies:
- 172.18.0.0/24

View File

@@ -1,17 +0,0 @@
services:
homeassistant:
image: ghcr.io/home-assistant/home-assistant:stable
container_name: homeassistant
restart: unless-stopped
volumes:
- config:/config
- ./config/configuration.yaml:/config/configuration.yaml
- /etc/localtime:/etc/localtime:ro
volumes:
config:
networks:
default:
name: proxy
external: true

View File

@@ -1 +0,0 @@
logs/

View File

@@ -1,3 +0,0 @@
---
# For configuration options and examples, please see:
# https://gethomepage.dev/configs/bookmarks

View File

@@ -1,10 +0,0 @@
---
# For configuration options and examples, please see:
# https://gethomepage.dev/configs/docker/
# my-docker:
# host: 127.0.0.1
# port: 2375
docker:
socket: /var/run/docker.sock

View File

@@ -1,2 +0,0 @@
---
# sample kubernetes config

View File

@@ -1,56 +0,0 @@
---
# For configuration options and examples, please see:
# https://gethomepage.dev/configs/services
- Primary Services:
- Adguard:
href: https://adguard.timo.bmrs.nl/
description: DNS
icon: adguard-home
server: docker
container: adguardhome
widget:
type: adguard
url: http://adguardhome:3000
username: xeovalyte
password: {{HOMEPAGE_VAR_ADGUARD_PASSWORD}}
- Forgejo:
href: https://git.timo.bmrs.nl/
description: Git
icon: forgejo
server: docker
container: forgejo
- Uptime Kuma:
href: https://uptime.timo.bmrs.nl/
description: Uptime monitoring
icon: uptime-kuma
server: docker
container: uptime-kuma
- Vaultwarden:
href: https://bitwarden.timo.bmrs.nl/
description: Password manager
icon: bitwarden
server: docker
container: vaultwarden
- Backend Services:
- Authelia:
description: SSO
icon: authelia
server: docker
container: authelia
- Caddy:
description: Reverse proxy
icon: caddy
server: docker
container: caddy
- LLDAP:
description: Active directory
href: https://ldap.timo.bmrs.nl/
server: docker
container: lldap

View File

@@ -1,21 +0,0 @@
---
# For configuration options and examples, please see:
# https://gethomepage.dev/configs/settings
providers:
openweathermap: openweathermapapikey
weatherapi: weatherapiapikey
title: Xeovalyte's Dashboard
color: slate
headerStyle: boxedWidgets
layout:
Primary Services:
style: row
columns: 3
Backend Services:
style: row
columns: 4

View File

@@ -1,12 +0,0 @@
---
# For configuration options and examples, please see:
# https://gethomepage.dev/configs/service-widgets
- resources:
cpu: true
memory: true
disk: /
- search:
provider: duckduckgo
target: _blank

View File

@@ -1,19 +0,0 @@
services:
homepage:
image: ghcr.io/gethomepage/homepage:latest
container_name: homepage
restart: unless-stopped
volumes:
- ./config:/app/config
- logs:/app/config/logs
- /run/user/1000/docker.sock:/var/run/docker.sock
environment:
HOMEPAGE_VAR_ADGUARD_PASSWORD: $ADGUARD_PASSWORD
volumes:
logs:
networks:
default:
name: proxy
external: true

View File

@@ -1,78 +0,0 @@
services:
immich:
image: ghcr.io/immich-app/immich-server:release
container_name: immich
restart: unless-stopped
volumes:
- data:/usr/src/app/upload
- /etc/localtime:/etc/localtime:ro
environment:
DB_HOSTNAME: "immich-db"
env_file:
- .env
depends_on:
- redis
- db
immich-machine-learning:
image: ghcr.io/immich-app/immich-machine-learning:release
container_name: immich-machine-learning
restart: unless-stopped
volumes:
- cache:/cache
env_file:
- .env
redis:
image: docker.io/redis:6.2-alpine@sha256:2ba50e1ac3a0ea17b736ce9db2b0a9f6f8b85d4c27d5f5accc6a416d8f42c6d5
container_name: immich-redis
restart: unless-stopped
healthcheck:
test: redis-cli ping || exit 1
volumes:
- data_redis:/data
db:
image: docker.io/tensorchord/pgvecto-rs:pg14-v0.2.0@sha256:90724186f0a3517cf6914295b5ab410db9ce23190a2d9d0b9dd6463e3fa298f0
container_name: immich-db
restart: unless-stopped
volumes:
# Do not edit the next line. If you want to change the database storage location on your system, edit the value of DB_DATA_LOCATION in the .env file
- data_db:/var/lib/postgresql/data
healthcheck:
test: pg_isready --dbname='${DB_DATABASE_NAME}' --username='${DB_USERNAME}' || exit 1; Chksum="$$(psql --dbname='${DB_DATABASE_NAME}' --username='${DB_USERNAME}' --tuples-only --no-align --command='SELECT COALESCE(SUM(checksum_failures), 0) FROM pg_stat_database')"; echo "checksum failure count is $$Chksum"; [ "$$Chksum" = '0' ] || exit 1
interval: 5m
start_interval: 30s
start_period: 5m
command:
[
'postgres',
'-c',
'shared_preload_libraries=vectors.so',
'-c',
'search_path="$$user", public, vectors',
'-c',
'logging_collector=on',
'-c',
'max_wal_size=2GB',
'-c',
'shared_buffers=512MB',
'-c',
'wal_compression=on',
]
environment:
POSTGRES_PASSWORD: ${DB_PASSWORD}
POSTGRES_USER: ${DB_USERNAME}
POSTGRES_DB: ${DB_DATABASE_NAME}
POSTGRES_INITDB_ARGS: '--data-checksums'
volumes:
data:
data_db:
data_redis:
cache:
networks:
default:
name: proxy
external: true

View File

@@ -1,4 +0,0 @@
# Nextcloud
1. Configure environment variables
2. Update office configuration

View File

@@ -1,54 +0,0 @@
services:
nextcloud:
image: nextcloud:apache
container_name: nextcloud
restart: unless-stopped
volumes:
- data:/var/www/html
environment:
POSTGRES_HOST: nextcloud-db
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
POSTGRES_DB: nextcloud
POSTGRES_USER: nextcloud
REDIS_HOST: nextcloud-redis
TRUSTED_PROXIES: "172.23.0.0/24"
depends_on:
- db
- redis
db:
image: postgres:16
container_name: nextcloud-db
restart: unless-stopped
volumes:
- data_db:/var/lib/postgresql/data
environment:
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
POSTGRES_DB: nextcloud
POSTGRES_USER: nextcloud
redis:
image: redis:alpine
container_name: nextcloud-redis
restart: unless-stopped
volumes:
- data_redis:/data
office:
image: collabora/code
container_name: nextcloud-office
restart: unless-stopped
environment:
DOMAIN: "cloud.timo.bmrs.nl"
extra_params: "--o:ssl.enable=false --o:ssl.termination=true"
volumes:
data:
data_db:
data_redis:
networks:
default:
name: proxy
external: true

View File

@@ -1,3 +0,0 @@
# Paperless NGX
- Create super user: `docker compose exec paperless-ngx python3 manage.py createsuperuser`
- Follow [Paperless wiki](https://www.authelia.com/integration/openid-connect/paperless/) for configuring oauth

View File

@@ -1,50 +0,0 @@
services:
paperless-ngx:
image: ghcr.io/paperless-ngx/paperless-ngx:latest
container_name: paperless-ngx
restart: unless-stopped
depends_on:
- broker
- db
volumes:
- data:/usr/src/paperless/data
- media:/usr/src/paperless/media
environment:
PAPERLESS_REDIS: redis://paperless-ngx-broker:6379
PAPERLESS_DBHOST: paperless-ngx-db
PAPERLESS_DBPASS: ${POSTGRES_PASSWORD}
PAPERLESS_URL: https://paperless.timo.bmrs.nl
PAPERLESS_DISABLE_REGULAR_LOGIN: true
PAPERLESS_APPS: allauth.socialaccount.providers.openid_connect
PAPERLESS_SOCIALACCOUNT_PROVIDERS: ${PAPERLESS_SOCIALACCOUNT_PROVIDERS}
broker:
image: docker.io/library/redis:7
container_name: paperless-ngx-broker
restart: unless-stopped
volumes:
- data_redis:/data
db:
image: docker.io/library/postgres:16
container_name: paperless-ngx-db
restart: unless-stopped
volumes:
- data_db:/var/lib/postgresql/data
environment:
POSTGRES_DB: paperless
POSTGRES_USER: paperless
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
volumes:
data:
data_db:
data_redis:
media:
networks:
default:
name: proxy
external: true

File diff suppressed because it is too large Load Diff

View File

@@ -1,54 +0,0 @@
[uwsgi]
# Who will run the code
uid = searxng
gid = searxng
# Number of workers (usually CPU count)
# default value: %k (= number of CPU core, see Dockerfile)
workers = %k
# Number of threads per worker
# default value: 4 (see Dockerfile)
threads = 4
# The right granted on the created socket
chmod-socket = 666
# Plugin to use and interpreter config
single-interpreter = true
master = true
plugin = python3
lazy-apps = true
enable-threads = 4
# Module to import
module = searx.webapp
# Virtualenv and python path
pythonpath = /usr/local/searxng/
chdir = /usr/local/searxng/searx/
# automatically set processes name to something meaningful
auto-procname = true
# Disable request logging for privacy
disable-logging = true
log-5xx = true
# Set the max size of a request (request-body excluded)
buffer-size = 8192
# No keep alive
# See https://github.com/searx/searx-docker/issues/24
add-header = Connection: close
# Follow SIGTERM convention
# See https://github.com/searxng/searxng/issues/3427
die-on-term
# uwsgi serves the static files
static-map = /static=/usr/local/searxng/searx/static
# expires set to one day
static-expires = /* 86400
static-gzip-all = True
offload-threads = 4

View File

@@ -1,15 +0,0 @@
services:
searxng:
image: searxng/searxng
container_name: searxng
restart: unless-stopped
volumes:
- ./config:/etc/searxng
environment:
BASE_URL: "https://search.timo.bmrs.nl/"
SEARXNG_SECRET: "PO8rO5ZW7K67sroemisMS8wpiq5pXEHecvXzGs4CdAgTQIQvAI09m65vFKGVVkZW"
networks:
default:
external: true
name: proxy

View File

@@ -1,15 +0,0 @@
services:
uptime-kuma:
image: louislam/uptime-kuma:1
container_name: uptime-kuma
restart: unless-stopped
volumes:
- data:/app/data
volumes:
data:
networks:
default:
name: proxy
external: true

View File

@@ -1,17 +0,0 @@
services:
vaultwarden:
image: vaultwarden/server:latest
container_name: vaultwarden
restart: unless-stopped
volumes:
- data:/data
environment:
SIGNUPS_ALLOWED: "true"
volumes:
data:
networks:
default:
name: proxy
external: true

View File

@@ -0,0 +1,58 @@
{ pkgs, ... }:
{
imports = [
# Import hardware configuration
./hardware-configuration.nix
# Import modules
../../modules/system
];
settings = {
hostname = "ch-clt-dsk01";
display-manager = "gdm";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = true;
};
applications = {
common.enable = true;
steam.enable = true;
thunar.enable = false;
};
services = {
docker.enable = false;
quickemu.enable = false;
sunshine.enable = false;
garbage-collection.enable = true;
};
hardware = {
fprint.enable = false;
printing.enable = true;
bluetooth.enable = false;
firewall.enable = true;
locale.enable = true;
nvidia.enable = true;
};
};
# Users
users.users.kiiwy = {
isNormalUser = true;
description = "Christa Boomers";
extraGroups = [ "networkmanager" "wheel" "dialout" ];
};
# Bootloader
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
configurationLimit = 32;
};
system.stateVersion = "24.11";
}

View File

@@ -0,0 +1,61 @@
{ pkgs, lib, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "kiiwy";
homeDirectory = "/home/kiiwy";
};
settings = {
host = "c-clt-dsk01";
applications.common.enable = true;
applications.alacritty.enable = true;
applications.devenv.enable = false;
applications.firefox.enable = true;
applications.git.enable = true;
applications.helix.enable = true;
applications.zsh.enable = true;
applications.ssh.enable = true;
applications.thunderbird.enable = false;
applications.yazi.enable = false;
applications.zellij.enable = false;
applications.wezterm.enable = false;
services.nextcloud-sync.enable = false;
theming.fonts.enable = true;
theming.stylix.enable = true;
theming.stylix.wallpaper = "kiiwy.png";
theming.stylix.theme = "theme";
desktop-environments.hyprland.enable = false;
};
home.packages = with pkgs; [
# Desktop Applications
prismlauncher
unstable.signal-desktop
unstable.vesktop
unstable.webcord
unstable.prusa-slicer
blender
brave
# Office
libreoffice
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -1,52 +0,0 @@
{ config, pkgs, ... }:
{
imports = [ # Include the results of the hardware scan.
./hardware-configuration.nix
# GUI
../../modules/system/gui/steam.nix
../../modules/system/gui/hyprland.nix
../../modules/system/gui/thunar.nix
# CLI
../../modules/system/cli/common.nix
# Hardware
../../modules/system/hardware/firewall.nix
../../modules/system/hardware/garbage-collection.nix
../../modules/system/hardware/locale.nix
../../modules/system/hardware/nvidia.nix
];
nix.settings = {
experimental-features = [ "nix-command" "flakes" ];
substituters = [
"https://nix-community.cachix.org"
];
};
# Bootloader.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
};
networking.hostName = "xv-desktop"; # Define your hostname.
networking.interfaces.enp7s0.wakeOnLan.enable = true;
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "networkmanager" "wheel" "dialout" "fuse" ];
};
boot.kernelPackages = pkgs.linuxPackages_latest;
system.stateVersion = "24.05";
}

View File

@@ -1,46 +0,0 @@
{ pkgs, lib, ... }:
{
imports = [
# GUI
../../modules/home/gui/common
../../modules/home/gui/hyprland
../../modules/home/gui/nextcloud.nix
../../modules/home/gui/theming.nix
# CLI
../../modules/home/cli/common
];
options = {
host = lib.mkOption {
type = with lib.types; str;
description = ''
Define the host of the machine
'';
};
headless = lib.mkOption {
type = with lib.types; bool;
description = ''
Is this machine headless?
'';
};
};
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
host = "xv-desktop";
headless = false;
home.packages = with pkgs; [
unstable.prismlauncher
];
home.stateVersion = "24.05";
};
}

View File

@@ -1,85 +0,0 @@
{ config, pkgs, inputs, ... }:
{
imports = [
./hardware-configuration.nix
# GUI
../../modules/system/gui/hyprland.nix
../../modules/system/gui/steam.nix
../../modules/system/gui/thunar.nix
# ../../modules/system/gui/plasma.nix
# CLI
../../modules/system/cli/common.nix
../../modules/system/cli/docker.nix
# Hardware
# ../../modules/system/hardware/amd.nix
../../modules/system/hardware/bluetooth.nix
../../modules/system/hardware/firewall.nix
../../modules/system/hardware/garbage-collection.nix
../../modules/system/hardware/laptop.nix
../../modules/system/hardware/locale.nix
../../modules/system/hardware/printing.nix
../../modules/system/hardware/fprint.nix
../../modules/system/hardware/virt.nix
];
nix.settings = {
experimental-features = [ "nix-command" "flakes" ];
substituters = [
"https://nix-community.cachix.org"
"https://cosmic.cachix.org/"
];
trusted-public-keys = [
"cosmic.cachix.org-1:Dya9IyXD4xdBehWjrkPv6rtxpmMdRel02smYzA85dPE="
];
};
# Configure hardware
# Bootloader.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
configurationLimit = 32;
};
networking.hostName = "xv-laptop"; # Define your hostname.
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "networkmanager" "wheel" "dialout" ];
};
nix.settings.trusted-users = [ "root" "xeovalyte" ];
# Enable cosmic desktop eenvironment
services.desktopManager.cosmic.enable = true;
services.displayManager.cosmic-greeter.enable = true;
# Prevent system freeze on high load
services.earlyoom = {
enable = true;
};
boot.kernelPackages = pkgs.linuxPackages_latest;
# Configure wacom tablet
hardware.opentabletdriver = {
enable = true;
package = pkgs.unstable.opentabletdriver;
};
services.libinput.enable = true;
services.fwupd.enable = true;
system.stateVersion = "24.05";
}

View File

@@ -1,93 +0,0 @@
{ pkgs, lib, ... }:
{
imports = [
# GUI
../../modules/home/gui/common
../../modules/home/gui/hyprland
../../modules/home/gui/nextcloud.nix
../../modules/home/gui/theming.nix
../../modules/home/gui/thunderbird.nix
# CLI
../../modules/home/cli/common
../../modules/home/cli/develop.nix
../../modules/home/cli/ssh.nix
../../modules/home/cli/yazi.nix
];
options = {
host = lib.mkOption {
type = with lib.types; str;
description = ''
Define the host of the machine
'';
};
headless = lib.mkOption {
type = with lib.types; bool;
description = ''
Is this machine headless?
'';
};
};
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
host = "xv-laptop";
headless = false;
home.packages = with pkgs; [
# Desktop Applications
kdenlive
prismlauncher
unstable.modrinth-app
unstable.joplin-desktop
unstable.prusa-slicer
unstable.font-manager
signal-desktop
unstable.vesktop
unstable.webcord
blender
unstable.freecad-wayland
loupe
unstable.rnote
unstable.bottles
resources
# Office
libreoffice
# Image editing
gimp
inkscape
unstable.obs-studio
# Development
unstable.drawio
# Scripts
(import ../../modules/scripts/save_image.nix { inherit pkgs; })
];
# Enable home-manager
programs.home-manager.enable = true;
# Enable default applications
xdg.mimeApps = {
enable = true;
defaultApplications = {
"application/pdf" = "firefox.desktop";
"application/rnote" = "rnote.desktop";
};
};
home.stateVersion = "24.05";
};
}

View File

@@ -0,0 +1,69 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ modulesPath, ... }:
{
imports = [
./hardware-configuration.nix
# Include the container-specific autogenerated configuration.
../../modules/system/default.nix
];
settings = {
hostname = "p-th-rpi-01";
display-manager = "none";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = false;
};
applications = {
common.enable = true;
steam.enable = false;
thunar.enable = false;
};
services = {
docker.enable = false;
podman.enable = true;
quickemu.enable = false;
sunshine.enable = false;
garbage-collection.enable = true;
incus.enable = false;
ssh.enable = true;
};
hardware = {
fprint.enable = false;
printing.enable = false;
bluetooth.enable = false;
firewall.enable = true;
locale.enable = true;
nvidia.enable = false;
};
};
users.users.deploy = {
isNormalUser = true;
description = "Deploy";
extraGroups = [ "networkmanager" "wheel" "dialout" ];
linger = true;
};
# networking
networking = {
dhcpcd.enable = false;
useDHCP = false;
useHostResolvConf = false;
};
networking.hosts = {
"127.0.0.1" = [ "tbmrs.nl" ];
};
networking.firewall = {
enable = true;
allowedTCPPorts = [ 1080 1443 1053 ];
allowedUDPPorts = [ 1080 1443 1053 ];
};
}

View File

@@ -0,0 +1,76 @@
{ pkgs, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "deploy";
homeDirectory = "/home/deploy";
};
settings = {
host = "p-th-rpi-01";
applications.common.enable = false;
applications.alacritty.enable = false;
applications.devenv.enable = false;
applications.firefox.enable = false;
applications.git.enable = false;
applications.helix.enable = true;
applications.zsh.enable = true;
applications.ssh.enable = true;
applications.thunderbird.enable = false;
applications.yazi.enable = true;
applications.zellij.enable = true;
applications.wezterm.enable = false;
services.nextcloud-sync.enable = false;
services.podman.enable = true;
services.sops.enable = true;
theming.fonts.enable = false;
theming.stylix.enable = false;
theming.stylix.wallpaper = "wallpaper-2.png";
theming.stylix.theme = "da-one-ocean";
desktop-environments.hyprland.enable = false;
containers = {
network.enable = true;
nginx.enable = false;
caddy.enable = true;
kanidm.enable = false;
forgejo.enable = false;
immich.enable = false;
homepage.enable = false;
uptime-kuma.enable = false;
pingvin-share.enable = false;
vaultwarden.enable = false;
paperless-ngx.enable = false;
beszel.enable = false;
storage.enable = false;
homeassistant.enable = false;
karakeep.enable = false;
vikunja.enable = false;
stalwart.enable = false;
linkding.enable = false;
static.enable = true;
};
};
home.packages = with pkgs; [
unstable.helix
lazygit
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -1,48 +0,0 @@
{ config, pkgs, ... }:
{
imports = [
./hardware-configuration.nix
# CLI
../../modules/system/cli/common.nix
../../modules/system/cli/docker.nix
# Hardware
../../modules/system/hardware/firewall.nix
../../modules/system/hardware/garbage-collection.nix
../../modules/system/hardware/locale.nix
];
nix.settings = {
experimental-features = [ "nix-command" "flakes" ];
substituters = [
"https://nix-community.cachix.org"
];
};
# Bootloader.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.systemd-boot.enable = true;
networking.hostName = "pm01vm01"; # Define your hostname.
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "networkmanager" "wheel" ];
};
# Enable ssh
services.openssh.enable = true;
# Forward ports
networking.firewall = {
allowedTCPPorts = [ 80 443 53 ];
allowedUDPPorts = [ 53 ];
};
system.stateVersion = "24.05";
}

View File

@@ -1,48 +0,0 @@
{ pkgs, lib, config, ... }:
{
imports = [
# Gui
../../modules/home/gui/theming.nix
# CLI
../../modules/home/cli/common
../../modules/home/cli/yazi.nix
];
options = {
host = lib.mkOption {
type = with lib.types; str;
description = ''
Define the host of the machine
'';
};
headless = lib.mkOption {
type = with lib.types; bool;
description = ''
Is this machine headless?
'';
};
};
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
host = "pm01vm01";
headless = true;
home.packages = with pkgs; [
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -0,0 +1,97 @@
{ inputs, outputs, pkgs, lib, ... }:
{
imports = [
./hardware-configuration.nix
../../modules/system
];
settings = {
hostname = "ti-clt-dsk01";
display-manager = "greetd";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = false;
niri.enable = true;
};
applications = {
common.enable = true;
steam.enable = true;
thunar.enable = false;
};
services = {
docker.enable = true;
quickemu.enable = false;
sunshine.enable = true;
garbage-collection.enable = true;
ssh.enable = true;
};
hardware = {
fprint.enable = false;
printing.enable = true;
bluetooth.enable = true;
firewall.enable = true;
locale.enable = true;
nvidia.enable = true;
};
};
# Users
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "wheel" ];
};
# Boot
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
};
# Networking
networking.interfaces.enp7s0.wakeOnLan.enable = true;
networking.hosts = {
"192.168.100.118" = [
"tbmrs.nl"
"auth.tbmrs.nl"
"git.tbmrs.nl"
"photos.tbmrs.nl"
"home.tbmrs.nl"
"uptime.tbmrs.nl"
"share.tbmrs.nl"
"files.tbmrs.nl"
"mail.tbmrs.nl"
"vault.local.tbmrs.nl"
"paperless.local.tbmrs.nl"
"monitor.local.tbmrs.nl"
"syncthing.local.tbmrs.nl"
"home-assistant.local.tbmrs.nl"
"tasks.local.tbmrs.nl"
"links.local.tbmrs.nl"
"stream.local.tbmrs.nl"
];
};
# Temp keyboard override
environment.systemPackages = with pkgs; [
via
vial
];
services.udev.packages = with pkgs; [
via
vial
];
# manual udev override
# services.udev.extraRules = ''
# KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{serial}=="*vial:f64c2b3c*", ATTRS{idVendor}=="320f", ATTRS{idProduct}=="5055", MODE="0660", GROUP="users", TAG+="uaccess", TAG+="udev-acl"
# '';
# state version
system.stateVersion = "24.11";
}

View File

@@ -8,18 +8,18 @@
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/b4cefbc5-dd3d-4a4b-84d0-031b2ed7655c";
{ device = "/dev/disk/by-uuid/f8dc500b-2b36-4ca8-940b-1716742d6cf3";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/9A7D-7464";
{ device = "/dev/disk/by-uuid/029A-9287";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};

View File

@@ -0,0 +1,81 @@
{ pkgs, lib, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
settings = {
host = "ti-clt-dsk01";
applications.common.enable = true;
applications.alacritty.enable = false;
applications.devenv.enable = true;
applications.firefox.enable = true;
applications.git.enable = true;
applications.helix = {
enable = true;
markdown = true;
rust = true;
systemverilog = true;
nix = true;
latex = true;
vue = true;
};
applications.zsh.enable = true;
applications.ssh.enable = true;
applications.thunderbird.enable = true;
applications.yazi.enable = true;
applications.zellij.enable = true;
applications.wezterm.enable = true;
applications.typst.enable = true;
applications.obs-studio.enable = true;
services.nextcloud-sync.enable = true;
theming.fonts.enable = true;
theming.stylix.enable = true;
theming.stylix.wallpaper = "wallpaper-2.png";
theming.stylix.theme = "da-one-ocean";
desktop-environments.hyprland.enable = false;
desktop-environments.niri.enable = true;
};
home.packages = with pkgs; [
unstable.prismlauncher
vesktop
unstable.rnote
unstable.inkscape
unstable.gimp
unstable.brave
unstable.freecad
hoppscotch
unstable.blender
unstable.signal-desktop
unstable.ladybird
unstable.prusa-slicer
unstable.surfer # waveform viewer
pomodoro-gtk
# Office
libreoffice
# Scripts
(import ../../modules/scripts/save_image.nix { inherit pkgs; })
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -0,0 +1,109 @@
{ pkgs, ... }:
{
imports = [
# Import hardware configuration
./hardware-configuration.nix
# Import modules
../../modules/system
];
settings = {
hostname = "ti-clt-lpt01";
display-manager = "greetd";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = false;
niri.enable = true;
};
applications = {
common.enable = true;
steam.enable = true;
thunar.enable = true;
};
services = {
docker.enable = false;
quickemu.enable = true;
sunshine.enable = false;
garbage-collection.enable = true;
incus.enable = true;
};
hardware = {
fprint.enable = true;
printing.enable = true;
bluetooth.enable = true;
firewall.enable = true;
locale.enable = true;
nvidia.enable = false;
};
};
# Users
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "networkmanager" "wheel" "dialout" "adbusers" ];
};
networking.networkmanager.enable = true;
programs.nix-ld.enable = true;
programs.adb.enable = true;
services.power-profiles-daemon.enable = true;
# Boot.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
configurationLimit = 32;
};
boot.kernelPackages = pkgs.linuxPackages_latest;
boot.supportedFilesystems = [ "nfs" ];
# Networking
networking.hosts = {
"127.0.0.1" = [
"tbmrs.nl"
"auth.tbmrs.nl"
"git.tbmrs.nl"
"photos.tbmrs.nl"
"home.tbmrs.nl"
"uptime.tbmrs.nl"
"share.tbmrs.nl"
"vault.local.tbmrs.nl"
"paperless.local.tbmrs.nl"
"monitor.local.tbmrs.nl"
];
};
networking.firewall = {
enable = true;
allowedTCPPorts = [ 22 80 443 53 ];
allowedUDPPorts = [ 80 443 53 ];
};
# Obs
programs.obs-studio = {
enable = true;
# optional Nvidia hardware acceleration
package = (
pkgs.obs-studio.override {
cudaSupport = true;
}
);
plugins = with pkgs.obs-studio-plugins; [
wlrobs
obs-vaapi #optional AMD hardware acceleration
obs-gstreamer
obs-vkcapture
];
};
system.stateVersion = "24.05";
}

View File

@@ -0,0 +1,90 @@
{ pkgs, lib, inputs, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
settings = {
host = "ti-clt-lpt01";
applications.common.enable = true;
applications.alacritty.enable = true;
applications.devenv.enable = true;
applications.firefox.enable = true;
applications.git.enable = true;
applications.helix = {
enable = true;
markdown = true;
rust = true;
systemverilog = true;
nix = true;
latex = true;
vue = true;
};
applications.zsh.enable = true;
applications.ssh.enable = true;
applications.thunderbird.enable = true;
applications.yazi.enable = true;
applications.zellij.enable = true;
applications.wezterm.enable = true;
applications.nushell.enable = false;
applications.typst.enable = true;
# applications.obs-studio.enable = true;
services.nextcloud-sync.enable = true;
theming.fonts.enable = true;
theming.stylix.enable = true;
theming.stylix.wallpaper = "wallpaper-2.png";
theming.stylix.theme = "da-one-ocean";
desktop-environments.hyprland.enable = false;
desktop-environments.niri.enable = true;
};
home.packages = with pkgs; [
# Desktop Applications
prismlauncher
unstable.prusa-slicer
signal-desktop
unstable.vesktop
unstable.webcord
blender
unstable.freecad-wayland
loupe
unstable.rnote
unstable.bottles
unstable.hoppscotch
unstable.apostrophe
unstable.surfer # waveform viewer
unstable.vscode
pomodoro-gtk
unstable.brave
# Office
libreoffice
# Image editing
gimp
inkscape
unstable.moonlight-qt
# Scripts
(import ../../modules/scripts/save_image.nix { inherit pkgs; })
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -0,0 +1,60 @@
{ lib, pkgs, ... }:
{
imports = [
# Import hardware configuration
./hardware-configuration.nix
# Import modules
../../modules/system
];
settings = {
hostname = "ti-clt-tbl01";
display-manager = "gdm";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = true;
};
applications = {
common.enable = true;
steam.enable = false;
thunar.enable = false;
};
services = {
docker.enable = false;
quickemu.enable = false;
sunshine.enable = false;
garbage-collection.enable = true;
};
hardware = {
fprint.enable = false;
printing.enable = false;
bluetooth.enable = true;
firewall.enable = true;
locale.enable = true;
nvidia.enable = false;
};
};
# Users
users.users.xeovalyte = {
isNormalUser = true;
description = "Timo Boomers";
extraGroups = [ "networkmanager" "wheel" "dialout" ];
};
# Bootloader.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub = {
enable = true;
efiSupport = true;
device = "nodev";
configurationLimit = 32;
};
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_latest;
system.stateVersion = "24.11";
}

View File

@@ -5,33 +5,36 @@
{
imports =
[ (modulesPath + "/profiles/qemu-guest.nix")
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ohci_pci" "ehci_pci" "virtio_pci" "ahci" "usbhid" "sr_mod" "virtio_blk" ];
boot.initrd.availableKernelModules = [ "xhci_pci" "usb_storage" "usbhid" "sd_mod" "sdhci_pci" "rtsx_pci_sdmmc" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/47301fe6-a7db-4ffd-854a-beddd53b6d99";
{ device = "/dev/disk/by-uuid/4d44a7fb-9a4f-4d55-8daf-1c93f08485dd";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/6A5B-F811";
{ device = "/dev/disk/by-uuid/30EC-F045";
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
swapDevices = [ ];
swapDevices =
[ { device = "/dev/disk/by-uuid/e803d3e2-28f0-427d-88e2-e0daf62f47fa"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp0s8.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -0,0 +1,53 @@
{ pkgs, lib, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "xeovalyte";
homeDirectory = "/home/xeovalyte";
};
settings = {
host = "ti-clt-tbl01";
applications.common.enable = true;
applications.alacritty.enable = false;
applications.devenv.enable = false;
applications.firefox.enable = true;
applications.git.enable = true;
applications.helix.enable = true;
applications.zsh.enable = true;
applications.ssh.enable = false;
applications.thunderbird.enable = false;
applications.yazi.enable = true;
applications.zellij.enable = false;
applications.wezterm.enable = false;
services.nextcloud-sync.enable = true;
theming.fonts.enable = true;
theming.stylix.enable = true;
theming.stylix.wallpaper = "wallpaper-2.png";
theming.stylix.theme = "da-one-ocean";
desktop-environments.hyprland.enable = false;
};
home.packages = with pkgs; [
# Desktop Applications
unstable.rnote
unstable.xournalpp
unstable.koreader
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -0,0 +1,84 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ modulesPath, lib, ... }:
{
imports = [
# Include the default incus configuration.
"${modulesPath}/virtualisation/lxc-container.nix"
# Include the container-specific autogenerated configuration.
../../modules/system/default.nix
];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
settings = {
hostname = "v-th-ctr-01";
display-manager = "none";
desktop-environments = {
cosmic.enable = false;
hyprland.enable = false;
gnome.enable = false;
};
applications = {
common.enable = true;
steam.enable = false;
thunar.enable = false;
};
services = {
docker.enable = false;
podman.enable = true;
quickemu.enable = false;
sunshine.enable = false;
garbage-collection.enable = true;
incus.enable = false;
ssh.enable = true;
};
hardware = {
fprint.enable = false;
printing.enable = false;
bluetooth.enable = false;
firewall.enable = true;
locale.enable = true;
nvidia.enable = false;
};
};
users.users.deploy = {
isNormalUser = true;
description = "Deploy";
extraGroups = [ "networkmanager" "wheel" "dialout" ];
linger = true;
};
# networking
networking = {
dhcpcd.enable = false;
useDHCP = false;
useHostResolvConf = false;
};
networking.hosts = {
"127.0.0.1" = [ "tbmrs.nl" ];
};
networking.firewall = {
enable = true;
allowedTCPPorts = [ 1080 1443 1053 ];
allowedUDPPorts = [ 1080 1443 1053 ];
};
systemd.network = {
enable = true;
networks."50-eth0" = {
matchConfig.Name = "eth0";
networkConfig = {
DHCP = "ipv4";
IPv6AcceptRA = true;
};
linkConfig.RequiredForOnline = "routable";
};
};
}

View File

@@ -0,0 +1,76 @@
{ pkgs, ... }:
{
imports = [
# Modules
../../modules/home/default.nix
];
config = {
home = {
username = "deploy";
homeDirectory = "/home/deploy";
};
settings = {
host = "v-th-ctr-01";
applications.common.enable = false;
applications.alacritty.enable = false;
applications.devenv.enable = false;
applications.firefox.enable = false;
applications.git.enable = false;
applications.helix.enable = true;
applications.zsh.enable = true;
applications.ssh.enable = true;
applications.thunderbird.enable = false;
applications.yazi.enable = true;
applications.zellij.enable = true;
applications.wezterm.enable = false;
services.nextcloud-sync.enable = false;
services.podman.enable = true;
services.sops.enable = true;
theming.fonts.enable = false;
theming.stylix.enable = false;
theming.stylix.wallpaper = "wallpaper-2.png";
theming.stylix.theme = "da-one-ocean";
desktop-environments.hyprland.enable = false;
containers = {
network.enable = true;
nginx.enable = true;
caddy.enable = true;
kanidm.enable = true;
forgejo.enable = true;
immich.enable = true;
homepage.enable = true;
uptime-kuma.enable = true;
pingvin-share.enable = true;
vaultwarden.enable = true;
paperless-ngx.enable = true;
beszel.enable = true;
storage.enable = true;
homeassistant.enable = true;
karakeep.enable = false;
vikunja.enable = true;
stalwart.enable = true;
linkding.enable = true;
jellyfin.enable = true;
};
};
home.packages = with pkgs; [
unstable.helix
lazygit
];
# Enable home-manager
programs.home-manager.enable = true;
home.stateVersion = "24.05";
};
}

View File

@@ -1,12 +1,39 @@
set unstable
default:
@just --choose
@just --list
rebuild:
update:
git pull
sudo nixos-rebuild switch --flake .
home-manager switch --flake .
clean:
sudo nix-collect-garbage -d
nix-collect-garbage -d
fmt:
nix fmt
alias s := switch
switch:
sudo nixos-rebuild switch --flake .
home-manager switch --flake .
rebuild-system:
alias sw := switch-system
switch-system:
sudo nixos-rebuild switch --flake .
rebuild-home-manager:
alias sh := switch-home-manager
switch-home-manager:
home-manager switch --flake .
alias gc := collect-garbage
collect-garbage:
sudo nix-collect-garbage -d
nix-collect-garbage -d

View File

@@ -0,0 +1,62 @@
{ config, lib, ... }:
with lib;
let
cfg = config.settings.applications.alacritty;
in {
options = {
settings.applications.alacritty.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable alacritty terimnal
'';
};
};
config = mkIf cfg.enable {
programs.alacritty = {
enable = true;
settings = {
# font = {
# normal = { family = "DejaVuSansM Nerd Font"; style = "Regular"; };
# };
# window = {
# opacity = 0.8;
# padding = { x = 10; y = 10; };
# };
# colors = {
# draw_bold_text_with_bright_colors = false;
# primary = {
# background = "0x${config.colorScheme.palette.base00}";
# foreground = "0x${config.colorScheme.palette.base05}";
# };
# cursor = {
# text = "0x${config.colorScheme.palette.base00}";
# cursor = "0x${config.colorScheme.palette.base05}";
# };
# normal = {
# black = "0x${config.colorScheme.palette.base00}";
# red = "0x${config.colorScheme.palette.base08}";
# green = "0x${config.colorScheme.palette.base0B}";
# yellow = "0x${config.colorScheme.palette.base0A}";
# blue = "0x${config.colorScheme.palette.base0D}";
# magenta = "0x${config.colorScheme.palette.base0E}";
# cyan = "0x${config.colorScheme.palette.base0C}";
# white = "0x${config.colorScheme.palette.base05}";
# };
# bright = {
# black = "0x${config.colorScheme.palette.base03}";
# red = "0x${config.colorScheme.palette.base09}";
# green = "0x${config.colorScheme.palette.base01}";
# yellow = "0x${config.colorScheme.palette.base02}";
# blue = "0x${config.colorScheme.palette.base04}";
# magenta = "0x${config.colorScheme.palette.base06}";
# cyan = "0x${config.colorScheme.palette.base0F}";
# white = "0x${config.colorScheme.palette.base07}";
# };
# };
};
};
};
}

View File

@@ -0,0 +1,24 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.common;
in {
options = {
settings.applications.common.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable common applications
'';
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
vlc
unstable.bitwarden
pavucontrol
];
};
}

View File

@@ -0,0 +1,29 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.devenv;
in {
options = {
settings.applications.devenv.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable common applications
'';
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
unstable.devenv
cloc
];
programs.direnv = {
enable = true;
enableBashIntegration = true;
};
};
}

View File

@@ -0,0 +1,182 @@
{ config, lib, pkgs, ... }:
# about:policies
# Check about:support for extension/add-on ID strings.
# Check about:config for options.
with lib;
let
cfg = config.settings.applications.firefox;
in {
options = {
settings.applications.firefox.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable firefox
'';
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
unstable.firefoxpwa
];
stylix.targets.firefox.profileNames = [ "${config.home.username}" ];
programs.firefox = lib.mkMerge [
{
enable = true;
}
(lib.mkIf (config.home.username == "xeovalyte") {
nativeMessagingHosts = [ pkgs.unstable.firefoxpwa ];
policies = {
DisableTelemetry = true;
DisableFirefoxStudies = true;
EnableTrackingProtection = {
Value = true;
Locked = true;
Cryptomining = true;
Fingerprinting = true;
};
DisablePocket = true;
DisableFirefoxAccounts = true;
DisableAccounts = true;
DontCheckDefaultBrowser = true;
DisplayBookmarksToolbar = "newpage";
ExtensionSettings = {
"nl-NL@dictionaries.addons.mozilla.org" = {
install_url = "https://addons.mozilla.org/firefox/downloads/latest/woordenboek-nederlands/latest.xpi";
installation_mode = "force_installed";
};
"uBlock0@raymondhill.net" = {
install_url = "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi";
installation_mode = "force_installed";
};
"{446900e4-71c2-419f-a6a7-df9c091e268b}" = {
install_url = "https://addons.mozilla.org/firefox/downloads/latest/bitwarden-password-manager/latest.xpi";
installation_mode = "force_installed";
};
"firefoxpwa@filips.si" = {
install_url = "https://addons.mozilla.org/firefox/downloads/latest/pwas-for-firefox/latest.xpi";
installation_mode = "force_installed";
};
"markdown-viewer@outofindex.com" = {
install_url = "https://addons.mozilla.org/firefox/downloads/latest/markdown-viewer-chrome/latest.xpi";
installation_mode = "force_installed";
};
};
};
profiles.${config.home.username} = {
bookmarks.force = true;
bookmarks.settings = [
{
name = "Toolbar";
toolbar = true;
bookmarks = [
{
name = "Brightspace";
bookmarks = [
{
name = "Books";
url = "https://drive.google.com/drive/folders/1L5OTbn5p3i7_Nc80hc5PztiEGHKwi-I4";
}
{
name = "Linear algebra and Differential equations";
url = "https://brightspace.tudelft.nl/d2l/le/content/681028/Home";
}
{
name = "Electrical Energy Fundamentals";
url = "https://brightspace.tudelft.nl/d2l/le/content/681016/Home";
}
{
name = "IP 2";
url = "https://brightspace.tudelft.nl/d2l/le/content/681022/Home";
}
];
}
];
}
];
search.engines = {
"Nix" = {
urls = [{
template = "https://mynixos.com/search";
params = [
{ name = "q"; value = "{searchTerms}"; }
];
}];
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
definedAliases = [ "@nix" ];
};
"SearXNG" = {
urls = [{
template = "https:/search.xeovalyte.dev/search";
params = [
{ name = "q"; value = "{searchTerms}"; }
];
}];
definedAliases = [ "@searxng" ];
};
"Startpage" = {
urls = [{
template = "https:/startpage.com/sp/search";
params = [
{ name = "q"; value = "{searchTerms}"; }
];
}];
definedAliases = [ "@sp" ];
};
"bing".metaData.hidden = true;
"google".metaData.hidden = true;
"ebay".metaData.hidden = true;
};
search.force = true;
search.default = "ddg";
settings = {
"browser.disableResetPrompt" = true;
"browser.download.panel.shown" = true;
"browser.download.useDownloadDir" = false;
"browser.newtabpage.activity-stream.showSponsoredTopSites" = false;
"browser.shell.checkDefaultBrowser" = false;
"browser.shell.defaultBrowserCheckCount" = 1;
"dom.security.https_only_mode" = true;
"privacy.trackingProtection.enabled" = true;
"browser.toolbars.bookmarks.visibility" = "newtab";
"browser.translations.neverTranslateLanguages" = "nl";
"browser.newtabpage.pinned" = [
{
label = "Server";
url = "https://home.xeovalyte.dev";
}
{
label = "Youtube";
url = "https://youtube.com";
}
{
label = "My TU Delft";
url = "https://my.tudelft.nl/";
}
{
label = "Vikunja";
url = "https://vikunja.xeovalyte.dev/";
}
];
"signon.rememberSignons" = false;
};
};
})
];
};
}

View File

@@ -0,0 +1,46 @@
{ config, lib, ... }:
with lib;
let
cfg = config.settings.applications.git;
in {
options = {
settings.applications.git.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable git version control
'';
};
settings.applications.git.lazygit.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable lazygit
'';
default = true;
};
};
config = mkIf cfg.enable {
programs.lazygit = {
enable = true;
settings = {
services = {
"gitea.xeovalyte.dev" = "gitea:gitea.xeovalyte.dev";
};
};
};
programs.git = mkIf cfg.lazygit.enable {
enable = true;
userEmail = "me+gitea@xeovalyte.dev";
userName = "Timo Boomers";
extraConfig = {
commit.gpgsign = true;
gpg.format = "ssh";
user.signingkey = "~/.ssh/gitea.pub";
};
};
};
}

View File

@@ -0,0 +1,204 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.helix;
in {
options = {
settings.applications.helix.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable helix text editor
'';
};
settings.applications.helix.markdown = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Enable markdown language support
'';
};
settings.applications.helix.systemverilog = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Enable systemverilog language support
'';
};
settings.applications.helix.nix = lib.mkOption {
type = lib.types.bool;
default = true;
description = ''
Enable nix language support
'';
};
settings.applications.helix.latex = lib.mkOption {
type = lib.types.bool;
default = true;
description = ''
Enable latex language support
'';
};
settings.applications.helix.vue = lib.mkOption {
type = lib.types.bool;
default = true;
description = ''
Enable vue/nuxt language support
'';
};
settings.applications.helix.rust = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Enable rust language support
'';
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; lib.concatLists [
(lib.optionals cfg.markdown [ unstable.marksman unstable.markdown-oxide dprint ])
(lib.optionals cfg.systemverilog [ unstable.svls ])
(lib.optionals cfg.nix [ unstable.nix unstable.nixpkgs-fmt ])
(lib.optionals cfg.latex [ tectonic unstable.texlab ])
(lib.optionals cfg.vue [ unstable.vue-language-server unstable.typescript unstable.typescript-language-server ])
];
# Markdown
home.file.".config/.dprint.json" = lib.mkIf cfg.markdown {
text = ''
{
"markdown": {
"lineWidth":120,
},
"excludes": [],
"plugins": [
"https://plugins.dprint.dev/markdown-0.16.1.wasm"
]
}
'';
};
programs.helix = {
enable = true;
package = pkgs.unstable.helix;
defaultEditor = true;
settings = {
editor.cursor-shape = {
insert = "bar";
};
editor.end-of-line-diagnostics = "hint";
};
languages = {
# Rust
language-server.rust-analyzer.config = lib.mkIf cfg.rust {
cargo = {
features = "all";
};
};
# Systemverilog
language-server.svls = lib.mkIf cfg.systemverilog {
command = "svls";
};
# Latex
language-server.texlab = lib.mkIf cfg.latex {
config = {
texlab.chktex = {
onOpenAndSave = true;
onEdit = true;
};
texlab.forwardSearch = {
executable = "zathura";
args = [
"--synctex-forward"
"%l:%c:%f"
"%p"
];
};
texlab.build = {
auxDirectory = "build";
logDirectory = "build";
pdfDirectory = "build";
forwardSearchAfter = true;
onSave = true;
executable = "tectonic";
args = [
"-X"
"compile"
"--synctex"
"--keep-logs"
"--keep-intermediates"
"--outdir=build"
"%f"
];
};
};
};
language-server.typescript-language-server.config = lib.mkIf cfg.vue {
# tsserver = {
# path = "${pkgs.unstable.typescript}/bin/tsserver";
# };
plugins = [
{
name = "@vue/typescript-plugin";
location = "${pkgs.unstable.vue-language-server}/bin/vue-language-server}";
languages = ["vue"];
}
];
vue.inlayHints = {
includeInlayEnumMemberValueHints = true;
includeInlayFunctionLikeReturnTypeHints = true;
includeInlayFunctionParameterTypeHints = true;
includeInlayParameterNameHints = "all";
includeInlayParameterNameHintsWhenArgumentMatchesName = true;
includeInlayPropertyDeclarationTypeHints = true;
includeInlayVariableTypeHints = true;
};
};
# language-server.vue-language-server = {
# command = "${pkgs.vue-language-server}/bin/vue-language-server";
# args = [ "--stdio" ];
# config = {
# typescript = {
# tsdk = "${pkgs.typescript}/bin/";
# };
# };
# };
language = lib.concatLists [
(lib.optionals cfg.systemverilog [{
name = "verilog";
language-servers = [ "svls" ];
}])
(lib.optionals cfg.markdown [{
name = "markdown";
auto-format = true;
language-servers = [ "markdown-oxide" ];
formatter.command = "dprint";
formatter.args = ["fmt" "--stdin" "md" "--config" "/home/xeovalyte/.config/.dprint.json"];
}
{
name = "typst";
auto-format = false;
formatter.command = "${pkgs.typstfmt}/bin/typstfmt";
}])
(lib.optionals cfg.vue [{
name = "vue";
language-servers = ["vuels" "typescript-language-server"];
}])
];
};
};
};
}

View File

@@ -0,0 +1,37 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.nushell;
in {
options = {
settings.applications.nushell.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable nushell shell
'';
default = false;
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
eza
bat
];
programs.bash = {
enable = false;
};
programs.nushell = {
enable = true;
};
programs.starship = {
enable = true;
enableNushellIntegration = true;
};
};
}

View File

@@ -0,0 +1,27 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.obs-studio;
in {
options = {
settings.applications.obs-studio.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable obs studio with optional plugins
'';
default = false;
};
};
config = mkIf cfg.enable {
programs.obs-studio = {
enable = true;
plugins = with pkgs.obs-studio-plugins; [
wlrobs
obs-vaapi #optional AMD hardware acceleration
];
};
};
}

View File

@@ -0,0 +1,43 @@
{ config, lib, ... }:
with lib;
let
cfg = config.settings.applications.ssh;
in {
options = {
settings.applications.ssh.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable ssh and configure some endpoints
'';
};
};
config = mkIf cfg.enable {
programs.ssh = {
enable = true;
matchBlocks = {
archserver = {
hostname = "192.168.1.20";
user = "xeovalyte";
identityFile = "~/.ssh/archserver";
};
"gitea.xeovalyte.dev" = {
hostname = "gitea.xeovalyte.dev";
port = 2222;
user = "git";
identityFile = "~/.ssh/gitea";
};
"gitlab.ewi.tudelft.nl" = {
hostname = "gitlab.ewi.tudelft.nl";
user = "tboomers";
identityFile = "~/.ssh/gitlab_tudelft";
};
};
addKeysToAgent = "yes";
};
};
}

View File

@@ -0,0 +1,101 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.thunderbird;
in {
options = {
settings.applications.thunderbird.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable thunderbird mail
'';
};
};
config = mkIf cfg.enable {
programs.thunderbird = {
enable = true;
package = pkgs.unstable.thunderbird;
profiles = {
default = {
isDefault = true;
};
};
};
accounts.email.accounts = {
ziggo = {
imap = {
host = "imap.ziggo.nl";
port = 993;
tls = {
enable = true;
};
};
smtp = {
host = "smtp.ziggo.nl";
port = 587;
tls = {
enable = true;
useStartTls = true;
};
};
address = "timo.boomers@ziggo.nl";
realName = "Timo Boomers";
userName = "timo.boomers@ziggo.nl";
primary = true;
thunderbird.enable = true;
thunderbird.profiles = [ "default" ];
};
tudelft = {
imap = {
host = "outlook.office365.com";
port = 993;
tls = {
enable = true;
};
};
smtp = {
host = "smtp.office365.com";
port = 587;
tls = {
enable = true;
useStartTls = false;
};
};
address = "tboomers@tudelft.nl";
realName = "Timo Boomers";
userName = "tboomers@tudelft.nl";
primary = false;
thunderbird.enable = true;
thunderbird.profiles = [ "default" ];
};
xeovalyte = {
imap = {
host = "mail.xeovalyte.dev";
port = 993;
tls = {
enable = true;
};
};
smtp = {
host = "mail.xeovalyte.dev";
port = 587;
tls = {
enable = true;
useStartTls = true;
};
};
address = "timo@xeovalyte.dev";
aliases = [ "me@xeovalyte.dev" "contact@xeovalyte.dev" ];
realName = "Timo Boomers";
userName = "me@xeovalyte.dev";
primary = false;
thunderbird.enable = true;
thunderbird.profiles = [ "default" ];
};
};
};
}

View File

@@ -0,0 +1,24 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.typst;
in {
options = {
settings.applications.typst.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable typst
'';
default = false;
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
unstable.typst
unstable.typst-live
];
};
}

View File

@@ -0,0 +1,107 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.wezterm;
in {
options = {
settings.applications.wezterm.enable = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Enable wezterm terminal
'';
};
};
config = mkIf cfg.enable {
programs.wezterm = {
enable = true;
enableZshIntegration = true;
package = pkgs.unstable.wezterm;
extraConfig = /* lua */ ''
-- Pull in the wezterm API
local wezterm = require 'wezterm'
-- This will hold the configuration.
local config = wezterm.config_builder()
local act = wezterm.action
-- This is where you actually apply your config choices
-- For example, changing the color scheme:
config.enable_tab_bar = true
config.use_fancy_tab_bar = false
config.window_decorations = "NONE"
config.tab_bar_at_bottom = true
config.keys = {
-- Pane controls
{
key = 'h',
mods = 'CTRL',
action = act.ActivatePaneDirection 'Left',
},
{
key = 'l',
mods = 'CTRL',
action = act.ActivatePaneDirection 'Right',
},
{
key = 'k',
mods = 'CTRL',
action = act.ActivatePaneDirection 'Up',
},
{
key = 'j',
mods = 'CTRL',
action = act.ActivatePaneDirection 'Down',
},
-- Pane resizing
{
key = 'H',
mods = 'CTRL',
action = act.AdjustPaneSize { 'Left', 5 },
},
{
key = 'L',
mods = 'CTRL',
action = act.AdjustPaneSize { 'Right', 5 },
},
{
key = 'K',
mods = 'CTRL',
action = act.AdjustPaneSize { 'Up', 5 },
},
{
key = 'J',
mods = 'CTRL',
action = act.AdjustPaneSize { 'Down', 5 },
},
{
key = 'q',
mods = 'CTRL',
action = act.CloseCurrentPane { confirm = false },
},
-- Tab management
{ key = '1', mods = 'ALT', action = act.ActivateTab(0) },
{ key = '2', mods = 'ALT', action = act.ActivateTab(1) },
{ key = '3', mods = 'ALT', action = act.ActivateTab(2) },
{ key = '4', mods = 'ALT', action = act.ActivateTab(3) },
{ key = '5', mods = 'ALT', action = act.ActivateTab(4) },
{
key = 'q',
mods = 'ALT',
action = act.CloseCurrentTab { confirm = false },
},
}
-- and finally, return the configuration to wezterm
return config
'';
};
};
}

View File

@@ -0,0 +1,35 @@
{ config, lib, ... }:
with lib;
let
cfg = config.settings.applications.yazi;
in {
options = {
settings.applications.yazi.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable yazi terminal file manager
'';
};
};
config = mkIf cfg.enable {
programs.yazi = {
enable = true;
enableZshIntegration = true;
settings = {
opener = {
open = [
{ run = "xdg-open $@"; desc = "xdg"; orphan = true; }
];
};
open = {
prepend_rules = [
{ name = "*.rnote"; use = "open"; }
];
};
};
};
};
}

View File

@@ -0,0 +1,99 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.zellij;
sesh = pkgs.writeScriptBin "sesh" ''
#! /usr/bin/env sh
# Taken from https://github.com/zellij-org/zellij/issues/884#issuecomment-1851136980
# select a directory using zoxide
ZOXIDE_RESULT=$(${pkgs.zoxide}/bin/zoxide query --interactive)
# checks whether a directory has been selected
if [[ -z "$ZOXIDE_RESULT" ]]; then
# if there was no directory, select returns without executing
exit 0
fi
# extracts the directory name from the absolute path
SESSION_TITLE=$(echo "$ZOXIDE_RESULT" | sed 's#.*/##')
# get the list of sessions
SESSION_LIST=$(zellij list-sessions -n | awk '{print $1}')
# checks if SESSION_TITLE is in the session list
if echo "$SESSION_LIST" | grep -q "^$SESSION_TITLE$"; then
# if so, attach to existing session
zellij attach "$SESSION_TITLE"
else
# if not, create a new session
echo "Creating new session $SESSION_TITLE and CD $ZOXIDE_RESULT"
cd $ZOXIDE_RESULT
zellij attach -c "$SESSION_TITLE"
fi
'';
in {
options = {
settings.applications.zellij.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable zellij tool
'';
};
};
config = mkIf cfg.enable {
programs.zellij = {
enable = true;
};
programs.zoxide = {
enable = true;
enableZshIntegration = true;
};
home.packages = [
sesh
];
home.file.zellij = {
target = ".config/zellij/config.kdl";
text = ''
pane_frames true
keybinds {
normal {
bind "Ctrl e" { ToggleFloatingPanes; SwitchToMode "normal"; }
bind "Ctrl d" { Detach; }
bind "Alt 1" { GoToTab 1; }
bind "Alt 2" { GoToTab 2; }
bind "Alt 3" { GoToTab 3; }
bind "Alt 4" { GoToTab 4; }
bind "Alt 5" { GoToTab 5; }
}
}
'';
};
home.file.zellij-layout-default = {
target = ".config/zellij/layouts/default.kdl";
text = ''
layout {
pane borderless=true {}
floating_panes {
pane {
width "80%"
height "80%"
x "10%"
y "10%"
}
}
pane size=1 borderless=true {
plugin location="zellij:tab-bar"
}
}
'';
};
};
}

View File

@@ -0,0 +1,49 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.settings.applications.zsh;
in {
options = {
settings.applications.zsh.enable = lib.mkOption {
type = lib.types.bool;
description = ''
Enable zsh shell
'';
};
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
eza
bat
];
home.shellAliases = {
ls = "eza";
};
programs.bash = {
enable = false;
};
programs.zsh = {
enable = true;
enableCompletion = true;
autosuggestion.enable = true;
syntaxHighlighting.enable = true;
};
programs.starship = {
enable = true;
enableBashIntegration = true;
enableZshIntegration = true;
};
programs.skim = {
enable = true;
enableZshIntegration = true;
};
};
}

View File

@@ -1,9 +0,0 @@
{ ... }:
{
imports = [
./git.nix
./shell.nix
./helix.nix
];
}

View File

@@ -1,23 +0,0 @@
{ pkgs, ... }:
{
programs.lazygit = {
enable = true;
settings = {
services = {
"gitea.xeovalyte.dev" = "gitea:gitea.xeovalyte.dev";
};
};
};
programs.git = {
enable = true;
userEmail = "me+gitea@xeovalyte.dev";
userName = "xeovalyte";
extraConfig = {
commit.gpgsign = true;
gpg.format = "ssh";
user.signingkey = "~/.ssh/gitea.pub";
};
};
}

View File

@@ -1,203 +0,0 @@
{ config, pkgs, ... }:
{
home.packages = with pkgs; [
unstable.marksman
unstable.markdown-oxide
unstable.svls
unstable.nil
unstable.nixpkgs-fmt
unstable.tectonic
unstable.texlab
dprint
];
home.file.".config/.dprint.json".text =''
{
"markdown": {
"lineWidth":120,
},
"excludes": [],
"plugins": [
"https://plugins.dprint.dev/markdown-0.16.1.wasm"
]
}
'';
programs.helix = {
enable = true;
package = pkgs.unstable.helix;
defaultEditor = true;
settings = {
theme = "base16";
editor.cursor-shape = {
insert = "bar";
};
};
languages = {
# Rust
language-server.rust-analyzer.config = {
cargo = {
features = "all";
};
};
# Systemverilog
language-server.svls = {
command = "svls";
};
language-server.texlab = {
config = {
texlab.chktex = {
onOpenAndSave = true;
onEdit = true;
};
texlab.forwardSearch = {
executable = "zathura";
args = [
"--synctex-forward"
"%l:%c:%f"
"%p"
];
};
texlab.build = {
auxDirectory = "build";
logDirectory = "build";
pdfDirectory = "build";
forwardSearchAfter = true;
onSave = true;
executable = "tectonic";
args = [
"-X"
"compile"
"--synctex"
"--keep-logs"
"--keep-intermediates"
"--outdir=build"
"%f"
];
};
};
};
language = [
{
name = "verilog";
language-servers = [ "svls" ];
}
{
name = "html";
language-servers = [ "vscode-html-language-server" "tailwindcss-ls" ];
}
{
name = "css";
language-servers = [ "vscode-html-language-server" "tailwindcss-ls" ];
}
{
name = "markdown";
auto-format = true;
language-servers = [ "markdown-oxide" ];
formatter.command = "dprint";
formatter.args = ["fmt" "--stdin" "md" "--config" "/home/xeovalyte/.config/.dprint.json"];
}
{
name = "typst";
auto-format = false;
formatter.command = "${pkgs.typstfmt}/bin/typstfmt";
}
];
};
themes = {
base16 = let
base00 = "#${config.colorScheme.palette.base00}";
base01 = "#${config.colorScheme.palette.base01}";
base02 = "#${config.colorScheme.palette.base02}";
base03 = "#${config.colorScheme.palette.base03}";
base04 = "#${config.colorScheme.palette.base04}";
base05 = "#${config.colorScheme.palette.base05}";
base06 = "#${config.colorScheme.palette.base06}";
base07 = "#${config.colorScheme.palette.base07}";
base08 = "#${config.colorScheme.palette.base08}";
base09 = "#${config.colorScheme.palette.base09}";
base0A = "#${config.colorScheme.palette.base0A}";
base0B = "#${config.colorScheme.palette.base0B}";
base0C = "#${config.colorScheme.palette.base0C}";
base0D = "#${config.colorScheme.palette.base0D}";
base0E = "#${config.colorScheme.palette.base0E}";
base0F = "#${config.colorScheme.palette.base0F}";
in {
"attributes" = base09;
"comment" = { fg = base03; modifiers = ["italic"]; };
"constant" = base09;
"constant.character.escape" = base0C;
"constant.numeric" = base09;
"constructor" = base0D;
"debug" = base03;
"diagnostic" = { modifiers = ["underlined"]; };
"diff.delta" = base09;
"diff.minus" = base08;
"diff.plus" = base0B;
"error" = base08;
"function" = base0D;
"hint" = base03;
"info" = base0D;
"keyword" = base0E;
"label" = base0E;
"namespace" = base0E;
"operator" = base05;
"special" = base0D;
"string" = base0B;
"type" = base0A;
"variable" = base08;
"variable.other.member" = base0B;
"warning" = base09;
"markup.bold" = { fg = base0A; modifiers = ["bold"]; };
"markup.heading" = base0D;
"markup.italic" = { fg = base0E; modifiers = ["italic"]; };
"markup.link.text" = base08;
"markup.link.url" = { fg = base09; modifiers = ["underlined"]; };
"markup.list" = base08;
"markup.quote" = base0C;
"markup.raw" = base0B;
"markup.strikethrough" = { modifiers = ["crossed_out"]; };
"diagnostic.hint" = { underline = { style = "curl"; }; };
"diagnostic.info" = { underline = { style = "curl"; }; };
"diagnostic.warning" = { underline = { style = "curl"; }; };
"diagnostic.error" = { underline = { style = "curl"; }; };
# "ui.background" = { bg = base00; };
"ui.bufferline.active" = { fg = base00; bg = base03; modifiers = ["bold"]; };
"ui.bufferline" = { fg = base04; bg = base00; };
"ui.cursor" = { fg = base0A; modifiers = ["reversed"]; };
"ui.cursor.insert" = { fg = base0A; modifiers = ["reversed"]; };
"ui.cursorline.primary" = { fg = base05; bg = base01; };
"ui.cursor.match" = { fg = base0A; modifiers = ["reversed"]; };
"ui.cursor.select" = { fg = base0A; modifiers = ["reversed"]; };
"ui.gutter" = { bg = base00; };
"ui.help" = { fg = base06; bg = base01; };
"ui.linenr" = { fg = base03; bg = base00; };
"ui.linenr.selected" = { fg = base04; bg = base01; modifiers = ["bold"]; };
"ui.menu" = { fg = base05; bg = base01; };
"ui.menu.scroll" = { fg = base03; bg = base01; };
"ui.menu.selected" = { fg = base01; bg = base04; };
"ui.popup" = { bg = base01; };
"ui.selection" = { bg = base02; };
"ui.selection.primary" = { bg = base02; };
"ui.statusline" = { fg = base04; bg = base01; };
"ui.statusline.inactive" = { bg = base01; fg = base03; };
"ui.statusline.insert" = { fg = base00; bg = base0B; };
"ui.statusline.normal" = { fg = base00; bg = base03; };
"ui.statusline.select" = { fg = base00; bg = base0F; };
"ui.text" = base05;
"ui.text.focus" = base05;
"ui.virtual.indent-guide" = { fg = base03; };
"ui.virtual.inlay-hint" = { fg = base01; };
"ui.virtual.ruler" = { bg = base01; };
"ui.window" = { bg = base01; };
};
};
};
}

View File

@@ -1,34 +0,0 @@
{ pkgs, ... }:
{
home.packages = with pkgs; [
eza
bat
];
home.shellAliases = {
ls = "eza";
};
programs.bash = {
enable = false;
};
programs.zsh = {
enable = true;
enableCompletion = true;
autosuggestion.enable = true;
syntaxHighlighting.enable = true;
};
programs.starship = {
enable = true;
enableBashIntegration = true;
enableZshIntegration = true;
};
programs.skim = {
enable = true;
enableZshIntegration = true;
};
}

View File

@@ -1,87 +0,0 @@
{ pkgs, ... }:
{
home.packages = with pkgs; [
unstable.devenv
cloc
];
programs.direnv = {
enable = true;
enableBashIntegration = true;
};
programs.zellij = {
enable = true;
# enableBashIntegration = true;
};
home.file.zellij = {
target = ".config/zellij/config.kdl";
text = ''
pane_frames false
keybinds {
normal {
bind "Ctrl e" { ToggleFloatingPanes; SwitchToMode "normal"; }
bind "Ctrl 1" { GoToTab 1; }
bind "Ctrl 2" { GoToTab 2; }
bind "Ctrl 3" { GoToTab 3; }
bind "Ctrl 4" { GoToTab 4; }
bind "Ctrl 5" { GoToTab 5; }
}
}
'';
};
home.file.zellij-layout-default = {
target = ".config/zellij/layouts/default.kdl";
text = ''
layout {
pane
floating_panes {
pane {
width "80%"
height "80%"
x "10%"
y "10%"
}
}
}
'';
};
home.file.zellij-layout-dioxus = {
target = ".config/zellij/layouts/dioxus.kdl";
text = ''
layout {
tab {
pane {
command "hx"
args "."
focus true
}
floating_panes {
pane {
width "80%"
height "80%"
x "10%"
y "10%"
}
}
}
tab {
pane {
command "dx"
args "serve"
}
}
tab {
pane {
command "devenv"
args "up"
}
}
}
'';
};
}

View File

@@ -1,24 +0,0 @@
local api = vim.api
api.nvim_create_autocmd(
"FileType",
{ pattern = "markdown", command = "setlocal spell" }
)
api.nvim_create_autocmd(
"FileType",
{ pattern = "markdown", command = "setlocal complete+=kspell" }
)
api.nvim_create_autocmd({
"BufNewFile", "BufRead"
},
{ pattern = "*.mcfunction", command = "set filetype=mcfunction" }
)
api.nvim_create_autocmd({
"VimEnter"
},
{ callback = require('lualine').setup }
)

Some files were not shown because too many files have changed in this diff Show More