Reformatted with nixfmt

This commit is contained in:
alejandro-angulo 2025-03-31 22:34:25 -07:00
parent f51256c3ae
commit 3f16537322
Signed by: alejandro-angulo
GPG key ID: 75579581C74554B6
80 changed files with 1454 additions and 992 deletions

View file

@ -35,7 +35,8 @@
powerlevel10k.flake = false; powerlevel10k.flake = false;
}; };
outputs = inputs: outputs =
inputs:
inputs.snowfall-lib.mkFlake { inputs.snowfall-lib.mkFlake {
inherit inputs; inherit inputs;
src = ./.; src = ./.;
@ -51,7 +52,7 @@
home-manager.nixosModules.home-manager home-manager.nixosModules.home-manager
]; ];
homes.modules = with inputs; [catppuccin.homeManagerModules.catppuccin]; homes.modules = with inputs; [ catppuccin.homeManagerModules.catppuccin ];
deploy.nodes = { deploy.nodes = {
node = { node = {
@ -60,7 +61,7 @@
user = "root"; user = "root";
sshUser = "alejandro"; sshUser = "alejandro";
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.node; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.node;
sshOpts = ["-A"]; sshOpts = [ "-A" ];
}; };
}; };
@ -70,13 +71,14 @@
user = "root"; user = "root";
sshUser = "alejandro"; sshUser = "alejandro";
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.git; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.git;
sshOpts = ["-A"]; sshOpts = [ "-A" ];
}; };
}; };
pi4 = let pi4 =
let
system = "aarch64-linux"; system = "aarch64-linux";
pkgs = import inputs.nixpkgs {inherit system;}; pkgs = import inputs.nixpkgs { inherit system; };
deployPkgs = import inputs.nixpkgs { deployPkgs = import inputs.nixpkgs {
inherit system; inherit system;
overlays = [ overlays = [
@ -89,7 +91,8 @@
}) })
]; ];
}; };
in { in
{
hostname = "pi4"; hostname = "pi4";
profiles.system = { profiles.system = {
user = "root"; user = "root";
@ -106,19 +109,20 @@
# dependencies for architectures other than the host machine # dependencies for architectures other than the host machine
# checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks inputs.self.deploy) inputs.deploy-rs.lib; # checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks inputs.self.deploy) inputs.deploy-rs.lib;
hydraJobs = let hydraJobs =
let
systems_to_build = [ systems_to_build = [
"gospel" "gospel"
"node" "node"
"carbon" "carbon"
]; ];
in { in
{
# Only have a builder for x86_64-linux atm # Only have a builder for x86_64-linux atm
packages = inputs.self.packages.x86_64-linux; packages = inputs.self.packages.x86_64-linux;
systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build ( systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build (
name: name: inputs.self.nixosConfigurations."${name}".config.system.build.toplevel
inputs.self.nixosConfigurations."${name}".config.system.build.toplevel
); );
}; };
}; };

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
aa = { aa = {
apps = { apps = {
bat.enable = true; bat.enable = true;

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
aa = { aa = {
installDefaults = false; installDefaults = false;

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
aa.isHeadless = false; aa.isHeadless = false;
services.spotifyd = { services.spotifyd = {
enable = true; enable = true;

View file

@ -1,3 +1,4 @@
{...}: { { ... }:
{
aa.installDefaults = false; aa.installDefaults = false;
} }

View file

@ -1,2 +1,3 @@
{...}: { { ... }:
{
} }

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.apps.bat; cfg = config.${namespace}.apps.bat;
in { in
{
options.${namespace}.apps.bat = { options.${namespace}.apps.bat = {
enable = mkEnableOption "bat"; enable = mkEnableOption "bat";
}; };

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.apps.btop; cfg = config.${namespace}.apps.btop;
in { in
{
options.${namespace}.apps.btop = { options.${namespace}.apps.btop = {
enable = mkEnableOption "btop"; enable = mkEnableOption "btop";
}; };

View file

@ -4,7 +4,8 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption; inherit (lib) mkEnableOption;
inherit (pkgs) tmuxPlugins; inherit (pkgs) tmuxPlugins;
@ -20,13 +21,14 @@
} }
]; ];
}; };
in { in
{
options.${namespace}.apps.tmux = { options.${namespace}.apps.tmux = {
enable = mkEnableOption "tmux"; enable = mkEnableOption "tmux";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
home.packages = [pkgs.tmux-sessionizer]; home.packages = [ pkgs.tmux-sessionizer ];
catppuccin.tmux = { catppuccin.tmux = {
enable = true; enable = true;
@ -102,6 +104,6 @@ in {
''; '';
}; };
xdg.configFile."tms/config.toml".source = (pkgs.formats.toml {}).generate "tms-config" tmsConfig; xdg.configFile."tms/config.toml".source = (pkgs.formats.toml { }).generate "tms-config" tmsConfig;
}; };
} }

View file

@ -4,9 +4,11 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.fonts; cfg = config.${namespace}.fonts;
in { in
{
options.${namespace}.fonts = { options.${namespace}.fonts = {
enable = lib.mkEnableOption "font config"; enable = lib.mkEnableOption "font config";
}; };
@ -24,10 +26,10 @@ in {
fonts.fontconfig = { fonts.fontconfig = {
enable = true; enable = true;
defaultFonts = { defaultFonts = {
monospace = ["Hack Nerd Font"]; monospace = [ "Hack Nerd Font" ];
emoji = ["Noto Color Emoji"]; emoji = [ "Noto Color Emoji" ];
serif = ["Noto Serif"]; serif = [ "Noto Serif" ];
sansSerif = ["Noto Sans"]; sansSerif = [ "Noto Sans" ];
}; };
}; };
}; };

View file

@ -1,10 +1,11 @@
{ {
config, config,
lib, lib,
osConfig ? {}, osConfig ? { },
namespace, namespace,
... ...
}: { }:
{
options.${namespace} = { options.${namespace} = {
isHeadless = lib.mkOption { isHeadless = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
@ -20,15 +21,13 @@
}; };
config = lib.mkMerge [ config = lib.mkMerge [
( (lib.mkIf (!config.${namespace}.isHeadless) {
lib.mkIf (!config.${namespace}.isHeadless) {
${namespace} = { ${namespace} = {
programs.firefox.enable = true; programs.firefox.enable = true;
programs.kitty.enable = true; programs.kitty.enable = true;
windowManagers.sway.enable = true; windowManagers.sway.enable = true;
}; };
} })
)
(lib.mkIf (config.${namespace}.installDefaults) { (lib.mkIf (config.${namespace}.installDefaults) {
${namespace} = { ${namespace} = {
apps = { apps = {

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.programs.firefox; cfg = config.${namespace}.programs.firefox;
in { in
{
options.${namespace}.programs.firefox = { options.${namespace}.programs.firefox = {
enable = mkEnableOption "firefox"; enable = mkEnableOption "firefox";
}; };

View file

@ -4,15 +4,17 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.fuzzel; cfg = config.${namespace}.programs.fuzzel;
in { in
{
options.${namespace}.programs.fuzzel = { options.${namespace}.programs.fuzzel = {
enable = lib.mkEnableOption "fuzzel"; enable = lib.mkEnableOption "fuzzel";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
home.packages = [pkgs.bemoji]; home.packages = [ pkgs.bemoji ];
catppuccin.fuzzel.enable = true; catppuccin.fuzzel.enable = true;
programs.fuzzel.enable = true; programs.fuzzel.enable = true;

View file

@ -3,9 +3,11 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.fzf; cfg = config.${namespace}.programs.fzf;
in { in
{
options.${namespace}.programs.fzf = { options.${namespace}.programs.fzf = {
enable = lib.mkEnableOption "fzf"; enable = lib.mkEnableOption "fzf";
}; };

View file

@ -5,11 +5,13 @@
namespace, namespace,
system, system,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.programs.gpg; cfg = config.${namespace}.programs.gpg;
in { in
{
options.${namespace}.programs.gpg = { options.${namespace}.programs.gpg = {
enable = mkEnableOption "gpg"; enable = mkEnableOption "gpg";
}; };
@ -33,9 +35,7 @@ in {
services.gpg-agent = mkIf (system == "x86_64-linux") { services.gpg-agent = mkIf (system == "x86_64-linux") {
enable = true; enable = true;
pinentryPackage = pinentryPackage =
if config.${namespace}.windowManagers.sway.enable if config.${namespace}.windowManagers.sway.enable then pkgs.pinentry-qt else pkgs.pinentry-curses;
then pkgs.pinentry-qt
else pkgs.pinentry-curses;
enableZshIntegration = true; enableZshIntegration = true;
enableSshSupport = true; enableSshSupport = true;
sshKeys = [ sshKeys = [

View file

@ -3,9 +3,11 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.k9s; cfg = config.${namespace}.programs.k9s;
in { in
{
options.${namespace}.programs.k9s = { options.${namespace}.programs.k9s = {
enable = lib.mkEnableOption "k9s"; enable = lib.mkEnableOption "k9s";
}; };

View file

@ -4,11 +4,13 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.programs.kitty; cfg = config.${namespace}.programs.kitty;
in { in
{
options.${namespace}.programs.kitty = { options.${namespace}.programs.kitty = {
enable = mkEnableOption "kitty"; enable = mkEnableOption "kitty";
}; };

View file

@ -4,9 +4,11 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.neovim; cfg = config.${namespace}.programs.neovim;
in { in
{
options.${namespace}.programs.neovim = { options.${namespace}.programs.neovim = {
enable = lib.mkEnableOption "neovim"; enable = lib.mkEnableOption "neovim";
lazygit.enable = lib.mkOption { lazygit.enable = lib.mkOption {
@ -21,8 +23,9 @@ in {
}; };
}; };
config = lib.mkIf cfg.enable (lib.mkMerge [ config = lib.mkIf cfg.enable (
{home.packages = [pkgs.neovim];} lib.mkMerge [
{ home.packages = [ pkgs.neovim ]; }
(lib.mkIf cfg.lazygit.enable { (lib.mkIf cfg.lazygit.enable {
programs.zsh.shellAliases = { programs.zsh.shellAliases = {
nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe"; nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe";
@ -35,5 +38,6 @@ in {
''; '';
}; };
}) })
]); ]
);
} }

View file

@ -4,11 +4,13 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.programs.rofi; cfg = config.${namespace}.programs.rofi;
in { in
{
options.${namespace}.programs.rofi = { options.${namespace}.programs.rofi = {
enable = mkEnableOption "rofi"; enable = mkEnableOption "rofi";
}; };
@ -19,7 +21,7 @@ in {
# TODO: How to ensure this font is installed? # TODO: How to ensure this font is installed?
font = "Hack Nerd Font 10"; font = "Hack Nerd Font 10";
catppuccin.enable = true; catppuccin.enable = true;
plugins = [pkgs.rofi-emoji]; plugins = [ pkgs.rofi-emoji ];
extraConfig = { extraConfig = {
show-icons = true; show-icons = true;
modi = "window,run,ssh,emoji"; modi = "window,run,ssh,emoji";

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.programs.swaylock; cfg = config.${namespace}.programs.swaylock;
in { in
{
options.${namespace}.programs.swaylock = { options.${namespace}.programs.swaylock = {
enable = mkEnableOption "swaylock"; enable = mkEnableOption "swaylock";
}; };

View file

@ -4,11 +4,18 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
types
;
cfg = config.${namespace}.programs.waybar; cfg = config.${namespace}.programs.waybar;
in { in
{
options.aa.programs.waybar = { options.aa.programs.waybar = {
enable = mkEnableOption "waybar"; enable = mkEnableOption "waybar";
@ -33,8 +40,8 @@ in {
layer = "top"; layer = "top";
position = "bottom"; position = "bottom";
height = 20; height = 20;
modules-left = ["sway/workspaces"]; modules-left = [ "sway/workspaces" ];
modules-center = ["clock"]; modules-center = [ "clock" ];
modules-right = [ modules-right = [
"idle_inhibitor" "idle_inhibitor"
"temperature" "temperature"
@ -76,7 +83,11 @@ in {
temperature = { temperature = {
critical-threshold = 80; critical-threshold = 80;
format = "{icon}{temperatureC}°C"; format = "{icon}{temperatureC}°C";
format-icons = [" " " " " "]; format-icons = [
" "
" "
" "
];
thermal-zone = cfg.thermal-zone; thermal-zone = cfg.thermal-zone;
}; };
@ -99,7 +110,11 @@ in {
phone = " "; phone = " ";
portable = " "; portable = " ";
car = " "; car = " ";
default = [" " " " " "]; default = [
" "
" "
" "
];
}; };
tooltip-format = "{desc}, {volume}%"; tooltip-format = "{desc}, {volume}%";
# TODO: Figure out how to get pactl binary? # TODO: Figure out how to get pactl binary?
@ -118,7 +133,13 @@ in {
format-charging = "󰂄 {capacity}%"; format-charging = "󰂄 {capacity}%";
format-plugged = " "; format-plugged = " ";
format-alt = "{time} {icon}"; format-alt = "{time} {icon}";
format-icons = [" " " " " " " " " "]; format-icons = [
" "
" "
" "
" "
" "
];
}; };
memory = { memory = {
@ -127,7 +148,10 @@ in {
backlight = { backlight = {
format = "{icon} {percent}%"; format = "{icon} {percent}%";
format-icons = ["󰃞`" "󰃚"]; format-icons = [
"󰃞`"
"󰃚"
];
on-scroll-up = "light -A 1"; on-scroll-up = "light -A 1";
on-scroll-down = "light -U 1"; on-scroll-down = "light -U 1";
}; };
@ -168,6 +192,6 @@ in {
]; ];
}; };
wayland.windowManager.sway.config.bars = []; wayland.windowManager.sway.config.bars = [ ];
}; };
} }

View file

@ -3,9 +3,11 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.yazi; cfg = config.${namespace}.programs.yazi;
in { in
{
options.${namespace}.programs.yazi = { options.${namespace}.programs.yazi = {
enable = lib.mkEnableOption "yazi"; enable = lib.mkEnableOption "yazi";
}; };

View file

@ -4,19 +4,21 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.zoxide; cfg = config.${namespace}.programs.zoxide;
in { in
{
options.${namespace}.programs.zoxide = { options.${namespace}.programs.zoxide = {
enable = lib.mkEnableOption "zoxide"; enable = lib.mkEnableOption "zoxide";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
home.packages = [pkgs.zoxide]; home.packages = [ pkgs.zoxide ];
programs.zoxide = { programs.zoxide = {
enable = true; enable = true;
options = ["--cmd cd"]; options = [ "--cmd cd" ];
}; };
}; };
} }

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.services.gammastep; cfg = config.${namespace}.services.gammastep;
in { in
{
options.${namespace}.services.gammastep = { options.${namespace}.services.gammastep = {
enable = mkEnableOption "gammastep"; enable = mkEnableOption "gammastep";
}; };

View file

@ -4,17 +4,19 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.services.playerctld; cfg = config.${namespace}.services.playerctld;
in { in
{
options.${namespace}.services.playerctld = { options.${namespace}.services.playerctld = {
enable = mkEnableOption "playerctl"; enable = mkEnableOption "playerctl";
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
home.packages = [pkgs.playerctl]; home.packages = [ pkgs.playerctl ];
services.playerctld.enable = true; services.playerctld.enable = true;
}; };
} }

View file

@ -4,17 +4,19 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.services.swayidle; cfg = config.${namespace}.services.swayidle;
in { in
{
options.${namespace}.services.swayidle = { options.${namespace}.services.swayidle = {
enable = mkEnableOption "swayidle"; enable = mkEnableOption "swayidle";
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
home.packages = [pkgs.swayidle]; home.packages = [ pkgs.swayidle ];
services.swayidle = { services.swayidle = {
enable = true; enable = true;

View file

@ -4,22 +4,29 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.services.swaync; cfg = config.${namespace}.services.swaync;
in { in
{
options.${namespace}.services.swaync = { options.${namespace}.services.swaync = {
enable = mkEnableOption "sway notification center"; enable = mkEnableOption "sway notification center";
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
home.packages = [pkgs.libnotify]; home.packages = [ pkgs.libnotify ];
services.swaync = { services.swaync = {
enable = true; enable = true;
settings = { settings = {
widgets = ["title" "dnd" "notifications" "mpris"]; widgets = [
"title"
"dnd"
"notifications"
"mpris"
];
}; };
}; };

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.tools.direnv; cfg = config.${namespace}.tools.direnv;
in { in
{
options.${namespace}.tools.direnv = { options.${namespace}.tools.direnv = {
enable = mkEnableOption "direnv"; enable = mkEnableOption "direnv";
}; };

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.tools.eza; cfg = config.${namespace}.tools.eza;
in { in
{
options.${namespace}.tools.eza = { options.${namespace}.tools.eza = {
enable = mkEnableOption "eza"; enable = mkEnableOption "eza";
}; };

View file

@ -4,11 +4,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption mkDefault; inherit (lib) mkIf mkEnableOption mkDefault;
cfg = config.${namespace}.tools.git; cfg = config.${namespace}.tools.git;
in { in
{
options.${namespace}.tools.git = { options.${namespace}.tools.git = {
enable = mkEnableOption "git"; enable = mkEnableOption "git";
userName = lib.options.mkOption { userName = lib.options.mkOption {

View file

@ -5,11 +5,13 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.tools.zsh; cfg = config.${namespace}.tools.zsh;
in { in
{
options.${namespace}.tools.zsh = { options.${namespace}.tools.zsh = {
enable = mkEnableOption "zsh"; enable = mkEnableOption "zsh";
}; };

View file

@ -3,9 +3,11 @@
pkgs, pkgs,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.apps.steam; cfg = config.aa.apps.steam;
in { in
{
options.aa.apps.steam = { options.aa.apps.steam = {
enable = lib.options.mkEnableOption "steam"; enable = lib.options.mkEnableOption "steam";
}; };

View file

@ -3,11 +3,13 @@
pkgs, pkgs,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.aa.apps.yubikey; cfg = config.aa.apps.yubikey;
in { in
{
options.aa.apps.yubikey = { options.aa.apps.yubikey = {
enable = mkEnableOption "yubikey"; enable = mkEnableOption "yubikey";
}; };

View file

@ -2,11 +2,13 @@
config, config,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.aa.archetypes.workstation; cfg = config.aa.archetypes.workstation;
in { in
{
options.aa.archetypes.workstation = { options.aa.archetypes.workstation = {
enable = mkEnableOption "workstation archetype"; enable = mkEnableOption "workstation archetype";
}; };

View file

@ -3,17 +3,19 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.aa.hardware.audio; cfg = config.aa.hardware.audio;
in { in
{
options.aa.hardware.audio = { options.aa.hardware.audio = {
enable = mkEnableOption "audio"; enable = mkEnableOption "audio";
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.systemPackages = with pkgs; [pamixer]; environment.systemPackages = with pkgs; [ pamixer ];
security.rtkit.enable = true; security.rtkit.enable = true;
services.pipewire = { services.pipewire = {
enable = true; enable = true;

View file

@ -2,11 +2,13 @@
config, config,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.aa.hardware.bluetooth; cfg = config.aa.hardware.bluetooth;
in { in
{
options.aa.hardware.bluetooth = { options.aa.hardware.bluetooth = {
enable = mkEnableOption "bluetooth"; enable = mkEnableOption "bluetooth";
}; };

View file

@ -4,12 +4,14 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.${namespace}.hardware.logitech; cfg = config.${namespace}.hardware.logitech;
username = config.${namespace}.user.name; username = config.${namespace}.user.name;
in { in
{
options.${namespace}.hardware.logitech = { options.${namespace}.hardware.logitech = {
enable = mkEnableOption "logitech devices"; enable = mkEnableOption "logitech devices";
}; };
@ -22,13 +24,15 @@ in {
systemd.user.services.solaar = { systemd.user.services.solaar = {
description = "Linux device manager for Logitech devices"; description = "Linux device manager for Logitech devices";
documentation = ["https://pwr-solaar.github.io/Solaar/"]; documentation = [ "https://pwr-solaar.github.io/Solaar/" ];
partOf = ["graphical-session.target"]; partOf = [ "graphical-session.target" ];
serviceConfig = { serviceConfig = {
Type = "simple"; Type = "simple";
ExecStart = "${pkgs.solaar}/bin/solaar -w hide"; ExecStart = "${pkgs.solaar}/bin/solaar -w hide";
}; };
}; };
systemd.user.services.solaar.wantedBy = mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable ["sway-session.target"]; systemd.user.services.solaar.wantedBy =
mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable
[ "sway-session.target" ];
}; };
} }

View file

@ -2,11 +2,13 @@
config, config,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.aa.hardware.tlp; cfg = config.aa.hardware.tlp;
in { in
{
options.aa.hardware.tlp = { options.aa.hardware.tlp = {
enable = mkEnableOption "tlp"; enable = mkEnableOption "tlp";
}; };

View file

@ -5,10 +5,12 @@
inputs, inputs,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkAliasDefinitions mkOption; inherit (lib) mkAliasDefinitions mkOption;
inherit (lib.types) attrs; inherit (lib.types) attrs;
in { in
{
imports = with inputs; [ imports = with inputs; [
home-manager.nixosModules.home-manager home-manager.nixosModules.home-manager
]; ];
@ -16,22 +18,22 @@ in {
options.${namespace}.home = { options.${namespace}.home = {
file = mkOption { file = mkOption {
type = attrs; type = attrs;
default = {}; default = { };
description = "A set of files to be manged by home-manager's <option>home.file</option> option."; description = "A set of files to be manged by home-manager's <option>home.file</option> option.";
}; };
configFile = mkOption { configFile = mkOption {
type = attrs; type = attrs;
default = {}; default = { };
description = "A set of files to be managed by home-manager's <option>xdg.configFile</option>."; description = "A set of files to be managed by home-manager's <option>xdg.configFile</option>.";
}; };
dataFile = mkOption { dataFile = mkOption {
type = attrs; type = attrs;
default = {}; default = { };
description = "A set of files to be managed by home-manager's <option>xdg.dataFile</option>."; description = "A set of files to be managed by home-manager's <option>xdg.dataFile</option>.";
}; };
extraOptions = mkOption { extraOptions = mkOption {
type = attrs; type = attrs;
default = {}; default = { };
description = "Options to pass directly to home-manager."; description = "Options to pass directly to home-manager.";
}; };
}; };
@ -50,8 +52,7 @@ in {
home-manager = { home-manager = {
useUserPackages = true; useUserPackages = true;
users.${config.aa.user.name} = users.${config.aa.user.name} = mkAliasDefinitions options.aa.home.extraOptions;
mkAliasDefinitions options.aa.home.extraOptions;
}; };
}; };
} }

View file

@ -3,12 +3,19 @@
pkgs, pkgs,
lib, lib,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
types
;
cfg = config.aa.nix; cfg = config.aa.nix;
selfHostedCacheHost = "https://cache.kilonull.com/"; selfHostedCacheHost = "https://cache.kilonull.com/";
in { in
{
options.aa.nix = { options.aa.nix = {
enable = mkEnableOption "manage nix configuration."; enable = mkEnableOption "manage nix configuration.";
package = mkOption { package = mkOption {
@ -26,9 +33,14 @@ in {
nixfmt-rfc-style nixfmt-rfc-style
]; ];
nix = let nix =
users = ["root" config.aa.user.name]; let
in { users = [
"root"
config.aa.user.name
];
in
{
package = cfg.package; package = cfg.package;
settings = { settings = {
@ -38,16 +50,17 @@ in {
builders-use-substitutes = cfg.useSelfhostedCache; builders-use-substitutes = cfg.useSelfhostedCache;
substituters = substituters =
if cfg.useSelfhostedCache if cfg.useSelfhostedCache then
then [ [
# TESTING # TESTING
"https://minio.kilonull.com/nix-store" "https://minio.kilonull.com/nix-store"
selfHostedCacheHost selfHostedCacheHost
] ]
else []; else
trusted-public-keys = [ ];
mkIf cfg.useSelfhostedCache trusted-public-keys = mkIf cfg.useSelfhostedCache [
["gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc="]; "gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc="
];
}; };
# TODO: Configure distributedBuilds and buildMachines? # TODO: Configure distributedBuilds and buildMachines?

View file

@ -4,18 +4,20 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.programs.android-studio; cfg = config.${namespace}.programs.android-studio;
in { in
{
options.${namespace}.programs.android-studio = { options.${namespace}.programs.android-studio = {
enable = lib.mkEnableOption "Android Studio"; enable = lib.mkEnableOption "Android Studio";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
${namespace}.user.extraGroups = ["kvm"]; ${namespace}.user.extraGroups = [ "kvm" ];
programs.adb.enable = true; programs.adb.enable = true;
environment.systemPackages = [pkgs.android-studio]; environment.systemPackages = [ pkgs.android-studio ];
}; };
} }

View file

@ -3,11 +3,18 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
inherit (lib) mkOption mkEnableOption mkIf types; let
inherit (lib)
mkOption
mkEnableOption
mkIf
types
;
cfg = config.aa.security.acme; cfg = config.aa.security.acme;
in { in
{
options.aa.security.acme = { options.aa.security.acme = {
enable = mkEnableOption "Automatic Certificate Management Environment (ACME)"; enable = mkEnableOption "Automatic Certificate Management Environment (ACME)";
useStaging = mkOption { useStaging = mkOption {
@ -53,7 +60,7 @@ in {
# own DNS to make `lego` happy (will resolve names to a public IP). # own DNS to make `lego` happy (will resolve names to a public IP).
dnsResolver = "1.1.1.1:53"; dnsResolver = "1.1.1.1:53";
credentialsFile = cfg.dnsCredentialsFile; credentialsFile = cfg.dnsCredentialsFile;
extraDomainNames = mkIf cfg.isWildcard [("*." + cfg.domainName)]; extraDomainNames = mkIf cfg.isWildcard [ ("*." + cfg.domainName) ];
}; };
}; };
}; };

View file

@ -3,11 +3,18 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
types
;
cfg = config.${namespace}.services.adguardhome; cfg = config.${namespace}.services.adguardhome;
in { in
{
options.${namespace}.services.adguardhome = { options.${namespace}.services.adguardhome = {
enable = mkEnableOption "adguardhome"; enable = mkEnableOption "adguardhome";
acmeCertName = mkOption { acmeCertName = mkOption {

View file

@ -4,12 +4,19 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
types
;
cfg = config.${namespace}.services.forgejo; cfg = config.${namespace}.services.forgejo;
forgejo_cfg = config.services.forgejo; forgejo_cfg = config.services.forgejo;
in { in
{
options.${namespace}.services.forgejo = { options.${namespace}.services.forgejo = {
enable = mkEnableOption "forgejo"; enable = mkEnableOption "forgejo";
domain = mkOption { domain = mkOption {

View file

@ -4,13 +4,20 @@
pkgs, pkgs,
namespace, namespace,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
types
;
cfg = config.${namespace}.services.grafana; cfg = config.${namespace}.services.grafana;
server_settings = config.services.grafana.settings.server; server_settings = config.services.grafana.settings.server;
grafana_dashboards = pkgs.${namespace}.teslamate-grafana-dashboards; grafana_dashboards = pkgs.${namespace}.teslamate-grafana-dashboards;
in { in
{
options.${namespace}.services.grafana = { options.${namespace}.services.grafana = {
enable = mkEnableOption "grafana"; enable = mkEnableOption "grafana";
acmeCertName = mkOption { acmeCertName = mkOption {
@ -120,7 +127,10 @@ in {
}; };
networking.firewall = { networking.firewall = {
allowedTCPPorts = [80 443]; allowedTCPPorts = [
80
443
];
}; };
}; };
} }

View file

@ -3,9 +3,11 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.services.hydra; cfg = config.${namespace}.services.hydra;
in { in
{
options.${namespace}.services.hydra = with lib; { options.${namespace}.services.hydra = with lib; {
enable = mkEnableOption "hydra"; enable = mkEnableOption "hydra";
hostname = mkOption { hostname = mkOption {
@ -72,7 +74,7 @@ in {
enable = true; enable = true;
hydraURL = "https://${cfg.hostname}"; hydraURL = "https://${cfg.hostname}";
notificationSender = "hydra@localhost"; notificationSender = "hydra@localhost";
buildMachinesFiles = []; buildMachinesFiles = [ ];
useSubstitutes = true; useSubstitutes = true;
extraConfig = '' extraConfig = ''
store_uri = s3://${cfg.s3Bucket}?compression=zstd&parallel-compression=true&write-nar-listing=1&ls-compression=br&log-compression=br&scheme=${cfg.s3Scheme}&endpoint=${cfg.s3Endpoint}&secret-key=${cfg.secretKeyPath} store_uri = s3://${cfg.s3Bucket}?compression=zstd&parallel-compression=true&write-nar-listing=1&ls-compression=br&log-compression=br&scheme=${cfg.s3Scheme}&endpoint=${cfg.s3Endpoint}&secret-key=${cfg.secretKeyPath}
@ -103,7 +105,10 @@ in {
"hydra" "hydra"
"hydra-www" "hydra-www"
]; ];
allowed-uris = ["github:" "git+https://git.alejandr0angul0.dev/"]; allowed-uris = [
"github:"
"git+https://git.alejandr0angul0.dev/"
];
}; };
}; };
} }

View file

@ -3,10 +3,12 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.services.loki; cfg = config.${namespace}.services.loki;
loki = config.services.loki; loki = config.services.loki;
in { in
{
options.${namespace}.services.loki = with lib; { options.${namespace}.services.loki = with lib; {
enable = mkEnableOption "loki"; enable = mkEnableOption "loki";
}; };
@ -102,7 +104,7 @@ in {
}; };
networking.firewall = { networking.firewall = {
allowedTCPPorts = [loki.configuration.server.http_listen_port]; allowedTCPPorts = [ loki.configuration.server.http_listen_port ];
}; };
}; };
} }

View file

@ -3,9 +3,11 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
cfg = config.${namespace}.services.minio; cfg = config.${namespace}.services.minio;
in { in
{
options.${namespace}.services.minio = with lib; { options.${namespace}.services.minio = with lib; {
enable = mkEnableOption "minio"; enable = mkEnableOption "minio";
acmeCertName = mkOption { acmeCertName = mkOption {

View file

@ -2,9 +2,11 @@
config, config,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.services.mosquitto; cfg = config.aa.services.mosquitto;
in { in
{
options.aa.services.mosquitto = with lib; { options.aa.services.mosquitto = with lib; {
enable = mkEnableOption "home assistant"; enable = mkEnableOption "home assistant";
}; };
@ -36,7 +38,7 @@ in {
passwordFile = config.age.secrets.theengs_ble_mqtt.path; passwordFile = config.age.secrets.theengs_ble_mqtt.path;
}; };
teslamate = { teslamate = {
acl = ["readwrite teslamate/#"]; acl = [ "readwrite teslamate/#" ];
passwordFile = config.age.secrets.teslamate_mqtt.path; passwordFile = config.age.secrets.teslamate_mqtt.path;
}; };
}; };
@ -44,6 +46,6 @@ in {
]; ];
}; };
networking.firewall.allowedTCPPorts = [1883]; networking.firewall.allowedTCPPorts = [ 1883 ];
}; };
} }

View file

@ -3,9 +3,11 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }:
let
cfg = config.aa.services.nix-serve; cfg = config.aa.services.nix-serve;
in { in
{
options.aa.services.nix-serve = with lib; { options.aa.services.nix-serve = with lib; {
enable = mkEnableOption "nix-serve"; enable = mkEnableOption "nix-serve";
domain_name = mkOption { domain_name = mkOption {
@ -28,11 +30,11 @@ in {
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
nix.settings = { nix.settings = {
allowed-users = ["nix-serve"]; allowed-users = [ "nix-serve" ];
trusted-users = ["nix-serve"]; trusted-users = [ "nix-serve" ];
}; };
environment.systemPackages = [pkgs.nix-serve]; environment.systemPackages = [ pkgs.nix-serve ];
services = { services = {
nix-serve = { nix-serve = {
@ -45,7 +47,7 @@ in {
enable = true; enable = true;
virtualHosts."${cfg.subdomain_name}.${cfg.domain_name}" = virtualHosts."${cfg.subdomain_name}.${cfg.domain_name}" =
{ {
serverAliases = ["${cfg.subdomain_name}"]; serverAliases = [ "${cfg.subdomain_name}" ];
locations."/".extraConfig = '' locations."/".extraConfig = ''
proxy_pass http://localhost:${toString config.services.nix-serve.port}; proxy_pass http://localhost:${toString config.services.nix-serve.port};
proxy_set_header Host $host; proxy_set_header Host $host;
@ -61,7 +63,10 @@ in {
}; };
networking.firewall = { networking.firewall = {
allowedTCPPorts = [80 443]; allowedTCPPorts = [
80
443
];
}; };
}; };
} }

View file

@ -2,9 +2,11 @@
config, config,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.services.octoprint; cfg = config.aa.services.octoprint;
in { in
{
options.aa.services.octoprint = with lib; { options.aa.services.octoprint = with lib; {
enable = mkEnableOption "octoprint"; enable = mkEnableOption "octoprint";
acmeCertName = mkOption { acmeCertName = mkOption {
@ -39,6 +41,9 @@ in {
}; };
}; };
networking.firewall.allowedTCPPorts = [80 443]; networking.firewall.allowedTCPPorts = [
80
443
];
}; };
} }

View file

@ -3,17 +3,25 @@
lib, lib,
format, format,
... ...
}: let }:
inherit (lib) mkIf mkEnableOption mkOption mkDefault types; let
inherit (lib)
mkIf
mkEnableOption
mkOption
mkDefault
types
;
cfg = config.aa.services.openssh; cfg = config.aa.services.openssh;
default-key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmPdQcM0KCQ3YunF1gwN+B+i1Q8KrIfiUvNtgFQjTy2"; default-key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmPdQcM0KCQ3YunF1gwN+B+i1Q8KrIfiUvNtgFQjTy2";
in { in
{
options.aa.services.openssh = { options.aa.services.openssh = {
enable = mkEnableOption "ssh"; enable = mkEnableOption "ssh";
authorizedKeys = mkOption { authorizedKeys = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = [default-key]; default = [ default-key ];
description = "The public keys to authorize"; description = "The public keys to authorize";
}; };
}; };
@ -23,11 +31,7 @@ in {
enable = true; enable = true;
settings = { settings = {
PasswordAuthentication = false; PasswordAuthentication = false;
PermitRootLogin = mkDefault ( PermitRootLogin = mkDefault (if format == "install-iso" then "yes" else "no");
if format == "install-iso"
then "yes"
else "no"
);
}; };
}; };

View file

@ -2,9 +2,11 @@
config, config,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.apps.steam; cfg = config.aa.apps.steam;
in { in
{
options.aa.services.printing = with lib; { options.aa.services.printing = with lib; {
enable = mkEnableOption "printing"; enable = mkEnableOption "printing";
}; };

View file

@ -2,12 +2,14 @@
config, config,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkIf; inherit (lib) mkIf;
cfg = config.aa.services.prometheus; cfg = config.aa.services.prometheus;
exporters = config.services.prometheus.exporters; exporters = config.services.prometheus.exporters;
in { in
{
options.aa.services.prometheus = with lib; { options.aa.services.prometheus = with lib; {
enable = mkEnableOption "prometheus"; enable = mkEnableOption "prometheus";
enableServer = mkOption { enableServer = mkOption {
@ -28,7 +30,7 @@ in {
exporters = { exporters = {
node = { node = {
enable = cfg.enableNodeExporter; enable = cfg.enableNodeExporter;
enabledCollectors = ["systemd"]; enabledCollectors = [ "systemd" ];
port = 9002; port = 9002;
openFirewall = true; openFirewall = true;
}; };
@ -52,7 +54,7 @@ in {
}; };
networking.firewall = mkIf cfg.enableServer { networking.firewall = mkIf cfg.enableServer {
allowedTCPPorts = [config.services.prometheus.port]; allowedTCPPorts = [ config.services.prometheus.port ];
}; };
}; };
} }

View file

@ -2,9 +2,11 @@
config, config,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.services.promtail; cfg = config.aa.services.promtail;
in { in
{
options.aa.services.promtail = with lib; { options.aa.services.promtail = with lib; {
enable = mkEnableOption "promtail"; enable = mkEnableOption "promtail";
}; };
@ -38,7 +40,7 @@ in {
}; };
relabel_configs = [ relabel_configs = [
{ {
source_labels = ["__journal__systemd_unit"]; source_labels = [ "__journal__systemd_unit" ];
target_label = "unit"; target_label = "unit";
} }
]; ];

View file

@ -3,11 +3,13 @@
pkgs, pkgs,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkIf; inherit (lib) mkIf;
cfg = config.aa.services.tailscale; cfg = config.aa.services.tailscale;
in { in
{
options.aa.services.tailscale = with lib; { options.aa.services.tailscale = with lib; {
enable = mkEnableOption "tailscale"; enable = mkEnableOption "tailscale";
configureClientRouting = mkOption { configureClientRouting = mkOption {
@ -35,18 +37,14 @@ in {
tailscale tailscale
tailscale-systray tailscale-systray
]; ];
networking.firewall.allowedUDPPorts = [config.services.tailscale.port]; networking.firewall.allowedUDPPorts = [ config.services.tailscale.port ];
services.tailscale = { services.tailscale = {
enable = true; enable = true;
useRoutingFeatures = mkIf (cfg.configureClientRouting || cfg.configureServerRouting) ( useRoutingFeatures = mkIf (cfg.configureClientRouting || cfg.configureServerRouting) (
if (cfg.configureClientRouting && cfg.configureServerRouting) if (cfg.configureClientRouting && cfg.configureServerRouting) then
then "both" "both"
else else
( (if cfg.configureClientRouting then "client" else "server")
if cfg.configureClientRouting
then "client"
else "server"
)
); );
}; };
}; };

View file

@ -2,9 +2,11 @@
config, config,
lib, lib,
... ...
}: let }:
let
cfg = config.aa.services.teslamate; cfg = config.aa.services.teslamate;
in { in
{
options.aa.services.teslamate = with lib; { options.aa.services.teslamate = with lib; {
enable = mkEnableOption "teslamate"; enable = mkEnableOption "teslamate";
@ -104,7 +106,7 @@ in {
backend = "docker"; backend = "docker";
containers."teslamate" = { containers."teslamate" = {
image = "teslamate/teslamate:1.32"; image = "teslamate/teslamate:1.32";
environmentFiles = ["/var/lib/teslamate/env"]; environmentFiles = [ "/var/lib/teslamate/env" ];
environment = { environment = {
# TODO: Make this configurable # TODO: Make this configurable
PORT = "4000"; PORT = "4000";
@ -116,9 +118,12 @@ in {
MQTT_USERNAME = "teslamate"; MQTT_USERNAME = "teslamate";
TZ = "America/Los_Angeles"; TZ = "America/Los_Angeles";
}; };
extraOptions = ["--cap-drop=all" "--network=host"]; extraOptions = [
"--cap-drop=all"
"--network=host"
];
# TODO: Make this configurable # TODO: Make this configurable
ports = ["4000:4000"]; ports = [ "4000:4000" ];
}; };
}; };
@ -126,12 +131,12 @@ in {
isSystemUser = true; isSystemUser = true;
group = cfg.group; group = cfg.group;
}; };
users.groups.${cfg.group} = {}; users.groups.${cfg.group} = { };
services.postgresql = lib.optionalAttrs cfg.database.createDatabase { services.postgresql = lib.optionalAttrs cfg.database.createDatabase {
enable = lib.mkDefault true; enable = lib.mkDefault true;
ensureDatabases = [cfg.database.name]; ensureDatabases = [ cfg.database.name ];
ensureUsers = [ ensureUsers = [
{ {
name = cfg.database.user; name = cfg.database.user;
@ -157,6 +162,6 @@ in {
}; };
}; };
networking.firewall.allowedTCPPorts = [4000]; networking.firewall.allowedTCPPorts = [ 4000 ];
}; };
} }

View file

@ -3,11 +3,13 @@
lib, lib,
namespace, namespace,
... ...
}: let }:
let
inherit (lib) mkEnableOption mkIf; inherit (lib) mkEnableOption mkIf;
cfg = config.${namespace}.suites.desktop; cfg = config.${namespace}.suites.desktop;
in { in
{
options.${namespace}.suites.desktop = { options.${namespace}.suites.desktop = {
enable = mkEnableOption "common desktop configuration"; enable = mkEnableOption "common desktop configuration";
}; };
@ -19,7 +21,7 @@ in {
# The following fixes an issue with using swaylcock as a home module # The following fixes an issue with using swaylcock as a home module
# Workaround for https://github.com/NixOS/nixpkgs/issues/158025 # Workaround for https://github.com/NixOS/nixpkgs/issues/158025
# This comment specifically: https://github.com/NixOS/nixpkgs/issues/158025#issuecomment-1344766809 # This comment specifically: https://github.com/NixOS/nixpkgs/issues/158025#issuecomment-1344766809
security.pam.services.swaylock = {}; security.pam.services.swaylock = { };
# Required for GUIs (like sway) to work correctly. # Required for GUIs (like sway) to work correctly.
hardware.graphics.enable = true; hardware.graphics.enable = true;

View file

@ -3,10 +3,12 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.aa.suites.development; cfg = config.aa.suites.development;
in { in
{
options.aa.suites.development = { options.aa.suites.development = {
enable = mkEnableOption "common configuration"; enable = mkEnableOption "common configuration";
}; };

View file

@ -5,9 +5,11 @@
pkgs, pkgs,
... ...
}: }:
with lib; let with lib;
let
cfg = config.aa.suites.gaming; cfg = config.aa.suites.gaming;
in { in
{
options.aa.suites.gaming = with lib.types; { options.aa.suites.gaming = with lib.types; {
enable = mkEnableOption "gaming configuration"; enable = mkEnableOption "gaming configuration";
}; };

View file

@ -4,11 +4,13 @@
pkgs, pkgs,
inputs, inputs,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.aa.suites.utils; cfg = config.aa.suites.utils;
in { in
{
options.aa.suites.utils = { options.aa.suites.utils = {
enable = mkEnableOption "common configuration"; enable = mkEnableOption "common configuration";
}; };
@ -38,6 +40,6 @@ in {
usbutils usbutils
wget wget
]) ])
++ [inputs.agenix.packages.x86_64-linux.default]; ++ [ inputs.agenix.packages.x86_64-linux.default ];
}; };
} }

View file

@ -5,9 +5,11 @@
lib, lib,
... ...
}: }:
with lib; let with lib;
let
cfg = config.aa.system.fonts; cfg = config.aa.system.fonts;
in { in
{
options.aa.system.fonts = with types; { options.aa.system.fonts = with types; {
enable = mkEnableOption "manage fonts"; enable = mkEnableOption "manage fonts";
}; };

View file

@ -3,11 +3,13 @@
pkgs, pkgs,
lib, lib,
... ...
}: let }:
let
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption;
cfg = config.aa.system.monitoring; cfg = config.aa.system.monitoring;
in { in
{
options.aa.system.monitoring = { options.aa.system.monitoring = {
enable = mkEnableOption "monitoring"; enable = mkEnableOption "monitoring";
}; };

View file

@ -5,16 +5,18 @@
lib, lib,
... ...
}: }:
with lib; let with lib;
let
cfg = config.aa.system.zfs; cfg = config.aa.system.zfs;
in { in
{
options.aa.system.zfs = with types; { options.aa.system.zfs = with types; {
enable = mkEnableOption "zfs"; enable = mkEnableOption "zfs";
# TODO: Introduce a zfsOnRoot option # TODO: Introduce a zfsOnRoot option
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.systemPackages = [pkgs.zfs-prune-snapshots]; environment.systemPackages = [ pkgs.zfs-prune-snapshots ];
services.zfs = { services.zfs = {
autoScrub.enable = true; autoScrub.enable = true;

View file

@ -5,9 +5,11 @@
lib, lib,
... ...
}: }:
with lib; let with lib;
let
cfg = config.aa.user; cfg = config.aa.user;
in { in
{
options.aa.user = with types; { options.aa.user = with types; {
name = mkOption { name = mkOption {
type = str; type = str;
@ -26,12 +28,15 @@ in {
}; };
extraGroups = mkOption { extraGroups = mkOption {
type = listOf str; type = listOf str;
default = ["video" "networkmanager"]; default = [
"video"
"networkmanager"
];
description = "Groups to for the user to be assigned."; description = "Groups to for the user to be assigned.";
}; };
extraOptions = mkOption { extraOptions = mkOption {
type = attrs; type = attrs;
default = {}; default = { };
description = "Extra options passed to <option>users.users.<name></option>."; description = "Extra options passed to <option>users.users.<name></option>.";
}; };
}; };
@ -42,8 +47,7 @@ in {
# Refer to modules/tools/zsh/default.nix # Refer to modules/tools/zsh/default.nix
programs.zsh.enable = true; programs.zsh.enable = true;
users.users.${cfg.name} = users.users.${cfg.name} = {
{
isNormalUser = true; isNormalUser = true;
inherit (cfg) name; inherit (cfg) name;
@ -53,8 +57,7 @@ in {
shell = pkgs.zsh; shell = pkgs.zsh;
extraGroups = ["wheel"] ++ cfg.extraGroups; extraGroups = [ "wheel" ] ++ cfg.extraGroups;
} } // cfg.extraOptions;
// cfg.extraOptions;
}; };
} }

View file

@ -1,3 +1,4 @@
{nixvim, ...}: (final: prev: { { nixvim, ... }:
(final: prev: {
neovim = nixvim.packages.${prev.system}.default; neovim = nixvim.packages.${prev.system}.default;
}) })

View file

@ -7,7 +7,8 @@
nodejs, nodejs,
breakpointHook, breakpointHook,
... ...
}: let }:
let
pname = "teslamate"; pname = "teslamate";
version = "1.28.2"; version = "1.28.2";
@ -23,12 +24,12 @@
overrides = ( overrides = (
final: prev: final: prev:
(lib.mapAttrs (lib.mapAttrs (
(_: value: _: value:
value.override { value.override {
appConfigPath = src + "/config"; appConfigPath = src + "/config";
}) }
prev) ) prev)
// { // {
ex_cldr = prev.ex_cldr.overrideAttrs (old: rec { ex_cldr = prev.ex_cldr.overrideAttrs (old: rec {
# Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47 # Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47
@ -54,7 +55,7 @@
inherit version; inherit version;
src = "${src}/assets"; src = "${src}/assets";
npmDepsHash = "sha256-h92i/cRf4I0c4vUc6oBt5T4yvM0JNQMkoDy2YHcVWS4="; npmDepsHash = "sha256-h92i/cRf4I0c4vUc6oBt5T4yvM0JNQMkoDy2YHcVWS4=";
patches = [./deploy_output.patch]; patches = [ ./deploy_output.patch ];
dontNpmBuild = true; dontNpmBuild = true;
installPhase = '' installPhase = ''
runHook preinstall runHook preinstall
@ -74,10 +75,15 @@
''; '';
}; };
in in
beamPackages.mixRelease { beamPackages.mixRelease {
inherit pname version src mixNixDeps; inherit
pname
version
src
mixNixDeps
;
nativeBuildInputs = [nodejs]; nativeBuildInputs = [ nodejs ];
preBuild = '' preBuild = ''
mkdir -p priv/static/assets mkdir -p priv/static/assets
@ -90,4 +96,4 @@ in
# https://github.com/phoenixframework/phoenix/issues/2690 # https://github.com/phoenixframework/phoenix/issues/2690
mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite
''; '';
} }

View file

@ -1,4 +1,8 @@
{ lib, beamPackages, overrides ? (x: y: {}) }: {
lib,
beamPackages,
overrides ? (x: y: { }),
}:
let let
buildRebar3 = lib.makeOverridable beamPackages.buildRebar3; buildRebar3 = lib.makeOverridable beamPackages.buildRebar3;
@ -7,7 +11,10 @@ let
self = packages // (overrides self packages); self = packages // (overrides self packages);
packages = with beamPackages; with self; { packages =
with beamPackages;
with self;
{
bunt = buildMix rec { bunt = buildMix rec {
name = "bunt"; name = "bunt";
version = "0.2.1"; version = "0.2.1";
@ -18,7 +25,7 @@ let
sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5"; sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5";
}; };
beamDeps = []; beamDeps = [ ];
}; };
castore = buildMix rec { castore = buildMix rec {
@ -31,7 +38,7 @@ let
sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8"; sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8";
}; };
beamDeps = []; beamDeps = [ ];
}; };
certifi = buildRebar3 rec { certifi = buildRebar3 rec {
@ -44,7 +51,7 @@ let
sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c"; sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c";
}; };
beamDeps = []; beamDeps = [ ];
}; };
cldr_utils = buildMix rec { cldr_utils = buildMix rec {
@ -57,7 +64,11 @@ let
sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf"; sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf";
}; };
beamDeps = [ castore certifi decimal ]; beamDeps = [
castore
certifi
decimal
];
}; };
cloak = buildMix rec { cloak = buildMix rec {
@ -83,7 +94,10 @@ let
sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f"; sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f";
}; };
beamDeps = [ cloak ecto ]; beamDeps = [
cloak
ecto
];
}; };
combine = buildMix rec { combine = buildMix rec {
@ -96,7 +110,7 @@ let
sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b"; sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b";
}; };
beamDeps = []; beamDeps = [ ];
}; };
cowboy = buildErlangMk rec { cowboy = buildErlangMk rec {
@ -109,7 +123,10 @@ let
sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b"; sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b";
}; };
beamDeps = [ cowlib ranch ]; beamDeps = [
cowlib
ranch
];
}; };
cowboy_telemetry = buildRebar3 rec { cowboy_telemetry = buildRebar3 rec {
@ -122,7 +139,10 @@ let
sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de"; sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de";
}; };
beamDeps = [ cowboy telemetry ]; beamDeps = [
cowboy
telemetry
];
}; };
cowlib = buildRebar3 rec { cowlib = buildRebar3 rec {
@ -135,7 +155,7 @@ let
sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0"; sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0";
}; };
beamDeps = []; beamDeps = [ ];
}; };
credo = buildMix rec { credo = buildMix rec {
@ -148,7 +168,11 @@ let
sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2"; sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2";
}; };
beamDeps = [ bunt file_system jason ]; beamDeps = [
bunt
file_system
jason
];
}; };
db_connection = buildMix rec { db_connection = buildMix rec {
@ -174,7 +198,7 @@ let
sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc"; sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc";
}; };
beamDeps = []; beamDeps = [ ];
}; };
dialyxir = buildMix rec { dialyxir = buildMix rec {
@ -200,7 +224,11 @@ let
sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433"; sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433";
}; };
beamDeps = [ decimal jason telemetry ]; beamDeps = [
decimal
jason
telemetry
];
}; };
ecto_sql = buildMix rec { ecto_sql = buildMix rec {
@ -213,7 +241,12 @@ let
sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007"; sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007";
}; };
beamDeps = [ db_connection ecto postgrex telemetry ]; beamDeps = [
db_connection
ecto
postgrex
telemetry
];
}; };
erlex = buildMix rec { erlex = buildMix rec {
@ -226,7 +259,7 @@ let
sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75"; sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75";
}; };
beamDeps = []; beamDeps = [ ];
}; };
ex_cldr = buildMix rec { ex_cldr = buildMix rec {
@ -239,7 +272,12 @@ let
sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479"; sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479";
}; };
beamDeps = [ cldr_utils decimal gettext jason ]; beamDeps = [
cldr_utils
decimal
gettext
jason
];
}; };
ex_cldr_plugs = buildMix rec { ex_cldr_plugs = buildMix rec {
@ -252,7 +290,12 @@ let
sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe"; sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe";
}; };
beamDeps = [ ex_cldr gettext jason plug ]; beamDeps = [
ex_cldr
gettext
jason
plug
];
}; };
excoveralls = buildMix rec { excoveralls = buildMix rec {
@ -265,7 +308,10 @@ let
sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b"; sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b";
}; };
beamDeps = [ castore jason ]; beamDeps = [
castore
jason
];
}; };
expo = buildMix rec { expo = buildMix rec {
@ -278,7 +324,7 @@ let
sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47"; sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47";
}; };
beamDeps = []; beamDeps = [ ];
}; };
file_system = buildMix rec { file_system = buildMix rec {
@ -291,7 +337,7 @@ let
sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc"; sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc";
}; };
beamDeps = []; beamDeps = [ ];
}; };
finch = buildMix rec { finch = buildMix rec {
@ -304,7 +350,14 @@ let
sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5"; sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5";
}; };
beamDeps = [ castore mime mint nimble_options nimble_pool telemetry ]; beamDeps = [
castore
mime
mint
nimble_options
nimble_pool
telemetry
];
}; };
floki = buildMix rec { floki = buildMix rec {
@ -317,7 +370,7 @@ let
sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9"; sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9";
}; };
beamDeps = []; beamDeps = [ ];
}; };
fuse = buildRebar3 rec { fuse = buildRebar3 rec {
@ -330,7 +383,7 @@ let
sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef"; sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef";
}; };
beamDeps = []; beamDeps = [ ];
}; };
gen_state_machine = buildMix rec { gen_state_machine = buildMix rec {
@ -343,7 +396,7 @@ let
sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15"; sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15";
}; };
beamDeps = []; beamDeps = [ ];
}; };
gettext = buildMix rec { gettext = buildMix rec {
@ -369,7 +422,15 @@ let
sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3"; sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3";
}; };
beamDeps = [ certifi idna metrics mimerl parse_trans ssl_verify_fun unicode_util_compat ]; beamDeps = [
certifi
idna
metrics
mimerl
parse_trans
ssl_verify_fun
unicode_util_compat
];
}; };
hpax = buildMix rec { hpax = buildMix rec {
@ -382,7 +443,7 @@ let
sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13"; sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13";
}; };
beamDeps = []; beamDeps = [ ];
}; };
idna = buildRebar3 rec { idna = buildRebar3 rec {
@ -421,7 +482,7 @@ let
sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826"; sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826";
}; };
beamDeps = []; beamDeps = [ ];
}; };
metrics = buildRebar3 rec { metrics = buildRebar3 rec {
@ -434,7 +495,7 @@ let
sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16"; sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16";
}; };
beamDeps = []; beamDeps = [ ];
}; };
mime = buildMix rec { mime = buildMix rec {
@ -447,7 +508,7 @@ let
sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c"; sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c";
}; };
beamDeps = []; beamDeps = [ ];
}; };
mimerl = buildRebar3 rec { mimerl = buildRebar3 rec {
@ -460,7 +521,7 @@ let
sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323"; sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323";
}; };
beamDeps = []; beamDeps = [ ];
}; };
mint = buildMix rec { mint = buildMix rec {
@ -473,7 +534,10 @@ let
sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e"; sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e";
}; };
beamDeps = [ castore hpax ]; beamDeps = [
castore
hpax
];
}; };
mock = buildMix rec { mock = buildMix rec {
@ -499,7 +563,7 @@ let
sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a"; sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a";
}; };
beamDeps = []; beamDeps = [ ];
}; };
nimble_options = buildMix rec { nimble_options = buildMix rec {
@ -512,7 +576,7 @@ let
sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8"; sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8";
}; };
beamDeps = []; beamDeps = [ ];
}; };
nimble_pool = buildMix rec { nimble_pool = buildMix rec {
@ -525,7 +589,7 @@ let
sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a"; sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a";
}; };
beamDeps = []; beamDeps = [ ];
}; };
parse_trans = buildRebar3 rec { parse_trans = buildRebar3 rec {
@ -538,7 +602,7 @@ let
sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a"; sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a";
}; };
beamDeps = []; beamDeps = [ ];
}; };
phoenix = buildMix rec { phoenix = buildMix rec {
@ -551,7 +615,16 @@ let
sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39"; sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39";
}; };
beamDeps = [ castore jason phoenix_pubsub phoenix_view plug plug_cowboy plug_crypto telemetry ]; beamDeps = [
castore
jason
phoenix_pubsub
phoenix_view
plug
plug_cowboy
plug_crypto
telemetry
];
}; };
phoenix_ecto = buildMix rec { phoenix_ecto = buildMix rec {
@ -564,7 +637,11 @@ let
sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07"; sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07";
}; };
beamDeps = [ ecto phoenix_html plug ]; beamDeps = [
ecto
phoenix_html
plug
];
}; };
phoenix_html = buildMix rec { phoenix_html = buildMix rec {
@ -590,7 +667,10 @@ let
sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab"; sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab";
}; };
beamDeps = [ file_system phoenix ]; beamDeps = [
file_system
phoenix
];
}; };
phoenix_live_view = buildMix rec { phoenix_live_view = buildMix rec {
@ -603,7 +683,12 @@ let
sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3"; sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3";
}; };
beamDeps = [ jason phoenix phoenix_html telemetry ]; beamDeps = [
jason
phoenix
phoenix_html
telemetry
];
}; };
phoenix_pubsub = buildMix rec { phoenix_pubsub = buildMix rec {
@ -616,7 +701,7 @@ let
sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502"; sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502";
}; };
beamDeps = []; beamDeps = [ ];
}; };
phoenix_template = buildMix rec { phoenix_template = buildMix rec {
@ -642,7 +727,10 @@ let
sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64"; sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64";
}; };
beamDeps = [ phoenix_html phoenix_template ]; beamDeps = [
phoenix_html
phoenix_template
];
}; };
plug = buildMix rec { plug = buildMix rec {
@ -655,7 +743,11 @@ let
sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30"; sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30";
}; };
beamDeps = [ mime plug_crypto telemetry ]; beamDeps = [
mime
plug_crypto
telemetry
];
}; };
plug_cowboy = buildMix rec { plug_cowboy = buildMix rec {
@ -668,7 +760,11 @@ let
sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613"; sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613";
}; };
beamDeps = [ cowboy cowboy_telemetry plug ]; beamDeps = [
cowboy
cowboy_telemetry
plug
];
}; };
plug_crypto = buildMix rec { plug_crypto = buildMix rec {
@ -681,7 +777,7 @@ let
sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842"; sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842";
}; };
beamDeps = []; beamDeps = [ ];
}; };
postgrex = buildMix rec { postgrex = buildMix rec {
@ -694,7 +790,11 @@ let
sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d"; sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d";
}; };
beamDeps = [ db_connection decimal jason ]; beamDeps = [
db_connection
decimal
jason
];
}; };
ranch = buildRebar3 rec { ranch = buildRebar3 rec {
@ -707,7 +807,7 @@ let
sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5"; sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5";
}; };
beamDeps = []; beamDeps = [ ];
}; };
srtm = buildMix rec { srtm = buildMix rec {
@ -733,7 +833,7 @@ let
sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8"; sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8";
}; };
beamDeps = []; beamDeps = [ ];
}; };
telemetry = buildRebar3 rec { telemetry = buildRebar3 rec {
@ -746,7 +846,7 @@ let
sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5"; sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5";
}; };
beamDeps = []; beamDeps = [ ];
}; };
tesla = buildMix rec { tesla = buildMix rec {
@ -759,7 +859,16 @@ let
sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f"; sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f";
}; };
beamDeps = [ castore finch fuse hackney jason mime mint telemetry ]; beamDeps = [
castore
finch
fuse
hackney
jason
mime
mint
telemetry
];
}; };
timex = buildMix rec { timex = buildMix rec {
@ -772,7 +881,11 @@ let
sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa"; sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa";
}; };
beamDeps = [ combine gettext tzdata ]; beamDeps = [
combine
gettext
tzdata
];
}; };
tortoise = buildMix rec { tortoise = buildMix rec {
@ -811,7 +924,7 @@ let
sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521"; sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521";
}; };
beamDeps = []; beamDeps = [ ];
}; };
websockex = buildMix rec { websockex = buildMix rec {
@ -824,8 +937,8 @@ let
sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4"; sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4";
}; };
beamDeps = []; beamDeps = [ ];
}; };
}; };
in self in
self

View file

@ -0,0 +1,7 @@
# Serial: 20472382, Slot: 1
# Name: age_alejandro
# Created: Fri, 30 Jun 2023 03:32:36 +0000
# PIN policy: Once (A PIN is required once per session, if set)
# Touch policy: Always (A physical touch is required for every decryption)
# Recipient: age1yubikey1qdwgvfqrcqmyw56ux7azuvqr6f8nanszu27nztvxmn4utmplgxctzt90g25
AGE-PLUGIN-YUBIKEY-18E3RSQVZ2ZQSDNS67QTTC

View file

@ -9,18 +9,69 @@ let
proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl"; proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl";
git = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN8JLy/ipBfOet3/KT7rXOXHDjjmt+VqqQb3V+ILIuDN"; git = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN8JLy/ipBfOet3/KT7rXOXHDjjmt+VqqQb3V+ILIuDN";
}; };
in { in
"cf_dns_kilonull.age".publicKeys = [users.me machines.node machines.gospel machines.pi4 machines.proxy]; {
"gitea-runner-gospel.age".publicKeys = [users.me machines.gospel]; "cf_dns_kilonull.age".publicKeys = [
"hass_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel]; users.me
"hydra-aws-creds.age".publicKeys = [users.me machines.gospel]; machines.node
"nextcloud_admin.age".publicKeys = [users.me machines.node machines.gospel]; machines.gospel
"nextcloud_restic_env.age".publicKeys = [users.me machines.node]; machines.pi4
"nextcloud_restic_password.age".publicKeys = [users.me machines.node]; machines.proxy
"nextcloud_restic_repo.age".publicKeys = [users.me machines.node]; ];
"tailscale_git_server.age".publicKeys = [users.me machines.git]; # This key expires, might have to update "gitea-runner-gospel.age".publicKeys = [
"teslamate_db.age".publicKeys = [users.me machines.node machines.gospel]; users.me
"teslamate_encryption.age".publicKeys = [users.me machines.node machines.gospel]; machines.gospel
"teslamate_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel]; ];
"theengs_ble_mqtt.age".publicKeys = [users.me machines.pi4 machines.gospel]; "hass_mqtt.age".publicKeys = [
users.me
machines.pi4
machines.node
machines.gospel
];
"hydra-aws-creds.age".publicKeys = [
users.me
machines.gospel
];
"nextcloud_admin.age".publicKeys = [
users.me
machines.node
machines.gospel
];
"nextcloud_restic_env.age".publicKeys = [
users.me
machines.node
];
"nextcloud_restic_password.age".publicKeys = [
users.me
machines.node
];
"nextcloud_restic_repo.age".publicKeys = [
users.me
machines.node
];
"tailscale_git_server.age".publicKeys = [
users.me
machines.git
]; # This key expires, might have to update
"teslamate_db.age".publicKeys = [
users.me
machines.node
machines.gospel
];
"teslamate_encryption.age".publicKeys = [
users.me
machines.node
machines.gospel
];
"teslamate_mqtt.age".publicKeys = [
users.me
machines.pi4
machines.node
machines.gospel
];
"theengs_ble_mqtt.age".publicKeys = [
users.me
machines.pi4
machines.gospel
];
} }

View file

@ -4,7 +4,8 @@
inputs, inputs,
modulesPath, modulesPath,
... ...
}: { }:
{
imports = [ imports = [
(modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/scan/not-detected.nix")
(modulesPath + "/installer/sd-card/sd-image-aarch64.nix") (modulesPath + "/installer/sd-card/sd-image-aarch64.nix")
@ -15,8 +16,7 @@
# See here: https://github.com/NixOS/nixpkgs/issues/109280#issuecomment-973636212 # See here: https://github.com/NixOS/nixpkgs/issues/109280#issuecomment-973636212
nixpkgs.overlays = [ nixpkgs.overlays = [
(final: super: { (final: super: {
makeModulesClosure = x: makeModulesClosure = x: super.makeModulesClosure (x // { allowMissing = true; });
super.makeModulesClosure (x // {allowMissing = true;});
}) })
]; ];
@ -57,7 +57,10 @@
hostName = "pi4"; hostName = "pi4";
useDHCP = false; useDHCP = false;
defaultGateway = "192.168.113.1"; defaultGateway = "192.168.113.1";
nameservers = ["192.168.113.13" "1.1.1.1"]; nameservers = [
"192.168.113.13"
"1.1.1.1"
];
interfaces.end0.ipv4.addresses = [ interfaces.end0.ipv4.addresses = [
{ {
address = "192.168.113.42"; address = "192.168.113.42";

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
aa = { aa = {
nix.enable = true; nix.enable = true;

View file

@ -7,104 +7,151 @@
pkgs, pkgs,
modulesPath, modulesPath,
... ...
}: { }:
{
imports = [ imports = [
(modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = ["xhci_pci" "nvme" "usb_storage" "sd_mod"]; boot.initrd.availableKernelModules = [
boot.initrd.kernelModules = []; "xhci_pci"
boot.kernelModules = ["kvm-intel"]; "nvme"
boot.extraModulePackages = []; "usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" = {
device = "rpool_/nixos/ROOT/default"; device = "rpool_/nixos/ROOT/default";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/boot" = { fileSystems."/boot" = {
device = "bpool_/nixos/BOOT/default"; device = "bpool_/nixos/BOOT/default";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/home" = { fileSystems."/home" = {
device = "rpool_/nixos/DATA/default/home"; device = "rpool_/nixos/DATA/default/home";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/root" = { fileSystems."/root" = {
device = "rpool_/nixos/DATA/default/root"; device = "rpool_/nixos/DATA/default/root";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/srv" = { fileSystems."/srv" = {
device = "rpool_/nixos/DATA/default/srv"; device = "rpool_/nixos/DATA/default/srv";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/usr/local" = { fileSystems."/usr/local" = {
device = "rpool_/nixos/DATA/default/usr/local"; device = "rpool_/nixos/DATA/default/usr/local";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/var/log" = { fileSystems."/var/log" = {
device = "rpool_/nixos/DATA/default/var/log"; device = "rpool_/nixos/DATA/default/var/log";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/var/spool" = { fileSystems."/var/spool" = {
device = "rpool_/nixos/DATA/default/var/spool"; device = "rpool_/nixos/DATA/default/var/spool";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/nix" = { fileSystems."/nix" = {
device = "rpool_/nixos/DATA/local/nix"; device = "rpool_/nixos/DATA/local/nix";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/state" = { fileSystems."/state" = {
device = "rpool_/nixos/DATA/default/state"; device = "rpool_/nixos/DATA/default/state";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/etc/nixos" = { fileSystems."/etc/nixos" = {
device = "/state/etc/nixos"; device = "/state/etc/nixos";
fsType = "none"; fsType = "none";
options = ["bind"]; options = [ "bind" ];
}; };
fileSystems."/etc/cryptkey.d" = { fileSystems."/etc/cryptkey.d" = {
device = "/state/etc/cryptkey.d"; device = "/state/etc/cryptkey.d";
fsType = "none"; fsType = "none";
options = ["bind"]; options = [ "bind" ];
}; };
fileSystems."/boot/efis/nvme-SAMSUNG_MZVLW256HEHP-000L7_S35ENX1K539085-part1" = { fileSystems."/boot/efis/nvme-SAMSUNG_MZVLW256HEHP-000L7_S35ENX1K539085-part1" = {
device = "/dev/disk/by-uuid/F429-235F"; device = "/dev/disk/by-uuid/F429-235F";
fsType = "vfat"; fsType = "vfat";
options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"]; options = [
"x-systemd.idle-timeout=1min"
"x-systemd.automount"
"noauto"
];
}; };
fileSystems."/boot/efis/nvme-WDC_PC_SN520_SDAPTUW-512G_182747800010-part1" = { fileSystems."/boot/efis/nvme-WDC_PC_SN520_SDAPTUW-512G_182747800010-part1" = {
device = "/dev/disk/by-uuid/F429-AB41"; device = "/dev/disk/by-uuid/F429-AB41";
fsType = "vfat"; fsType = "vfat";
options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"]; options = [
"x-systemd.idle-timeout=1min"
"x-systemd.automount"
"noauto"
];
}; };
fileSystems."/var/lib/docker" = { fileSystems."/var/lib/docker" = {
device = "rpool_/nixos/DATA/default/var/lib/docker"; device = "rpool_/nixos/DATA/default/var/lib/docker";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";

View file

@ -1,5 +1,6 @@
{pkgs, ...}: { { pkgs, ... }:
boot.supportedFilesystems = ["zfs"]; {
boot.supportedFilesystems = [ "zfs" ];
networking.hostId = "b2d25606"; networking.hostId = "b2d25606";
boot.zfs.devNodes = "/dev/disk/by-id"; boot.zfs.devNodes = "/dev/disk/by-id";
swapDevices = [ swapDevices = [

View file

@ -2,11 +2,13 @@
inputs, inputs,
config, config,
... ...
}: let }:
let
domain = "git.alejandr0angul0.dev"; domain = "git.alejandr0angul0.dev";
secrets = config.age.secrets; secrets = config.age.secrets;
in { in
imports = ["${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix"]; {
imports = [ "${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix" ];
age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age; age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age;
@ -38,7 +40,7 @@ in {
services.tailscale = { services.tailscale = {
authKeyFile = secrets.authKeyFile.path; authKeyFile = secrets.authKeyFile.path;
extraUpFlags = ["--ssh"]; extraUpFlags = [ "--ssh" ];
}; };
security.acme = { security.acme = {

View file

@ -6,37 +6,57 @@
lib, lib,
modulesPath, modulesPath,
... ...
}: { }:
{
imports = [ imports = [
(modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod"]; boot.initrd.availableKernelModules = [
boot.initrd.kernelModules = []; "xhci_pci"
boot.kernelModules = ["kvm-intel"]; "ahci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
fileSystems."/" = { fileSystems."/" = {
device = "rpool/nixos/root"; device = "rpool/nixos/root";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/home" = { fileSystems."/home" = {
device = "rpool/nixos/home"; device = "rpool/nixos/home";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/var/lib" = { fileSystems."/var/lib" = {
device = "rpool/nixos/var/lib"; device = "rpool/nixos/var/lib";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/var/log" = { fileSystems."/var/log" = {
device = "rpool/nixos/var/log"; device = "rpool/nixos/var/log";
fsType = "zfs"; fsType = "zfs";
options = ["zfsutil" "X-mount.mkdir"]; options = [
"zfsutil"
"X-mount.mkdir"
];
}; };
fileSystems."/boot" = { fileSystems."/boot" = {
@ -44,7 +64,7 @@
fsType = "vfat"; fsType = "vfat";
}; };
swapDevices = []; swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -1,5 +1,6 @@
{...}: { { ... }:
boot.supportedFilesystems = ["zfs"]; {
boot.supportedFilesystems = [ "zfs" ];
networking.hostId = "f8616592"; networking.hostId = "f8616592";
boot.loader.efi.canTouchEfiVariables = false; boot.loader.efi.canTouchEfiVariables = false;
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;

View file

@ -7,15 +7,23 @@
pkgs, pkgs,
modulesPath, modulesPath,
... ...
}: { }:
{
imports = [ imports = [
(modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod"]; boot.initrd.availableKernelModules = [
boot.initrd.kernelModules = []; "xhci_pci"
boot.kernelModules = ["kvm-amd"]; "ahci"
boot.extraModulePackages = []; "nvme"
"usb_storage"
"usbhid"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" = {
device = "/dev/disk/by-label/NIXROOT"; device = "/dev/disk/by-label/NIXROOT";
@ -27,7 +35,7 @@
fsType = "vfat"; fsType = "vfat";
}; };
swapDevices = []; swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -2,8 +2,9 @@
config, config,
pkgs, pkgs,
... ...
}: { }:
boot.supportedFilesystems = ["zfs"]; {
boot.zfs.extraPools = ["tank"]; boot.supportedFilesystems = [ "zfs" ];
boot.zfs.extraPools = [ "tank" ];
networking.hostId = "db616c9e"; networking.hostId = "db616c9e";
} }

View file

@ -3,8 +3,9 @@
lib, lib,
... ...
}: }:
with lib; { with lib;
virtualisation.qemu.options = ["-vga qxl"]; {
virtualisation.qemu.options = [ "-vga qxl" ];
# For sway to work with home manager # For sway to work with home manager
security.polkit.enable = true; security.polkit.enable = true;
@ -23,7 +24,7 @@ with lib; {
users.users.virt = { users.users.virt = {
isNormalUser = true; isNormalUser = true;
extraGroups = ["wheel"]; extraGroups = [ "wheel" ];
hashedPassword = "$6$nOlwKVf1u0Wt//zU$43xhafbe2CAWTjOemAUm1J1Dpw7to0ZTbGhFk7CkVTRB3E80a1lhhQ175VnkcJ/X1HI6lsyV8fNMc3GF7JTAP0"; hashedPassword = "$6$nOlwKVf1u0Wt//zU$43xhafbe2CAWTjOemAUm1J1Dpw7to0ZTbGhFk7CkVTRB3E80a1lhhQ175VnkcJ/X1HI6lsyV8fNMc3GF7JTAP0";
}; };
@ -31,6 +32,8 @@ with lib; {
systemPackages = with pkgs; [ systemPackages = with pkgs; [
wayland-utils wayland-utils
]; ];
variables = {"WLR_RENDERER_ALLOW_SOFTWARE" = "1";}; variables = {
"WLR_RENDERER_ALLOW_SOFTWARE" = "1";
};
}; };
} }