Compare commits
45 Commits
6dbfc5805e
...
yshtola-bu
| Author | SHA1 | Date | |
|---|---|---|---|
| e556dae87d | |||
| 313177eff7 | |||
| 1b20e6d215 | |||
| 11e6274e37 | |||
| a3d0c56204 | |||
| 6bdff15117 | |||
| b3954838d2 | |||
| 6b586d80ab | |||
| 0718c9f18d | |||
| 14dbc1363e | |||
| 7e0d58c097 | |||
| f2ae159c67 | |||
| aea71bb49b | |||
| e7b2a1bc1e | |||
| bdf4d54e99 | |||
| 26662e1419 | |||
| b8db103e08 | |||
| 08adc255d6 | |||
| c81ca5ee4c | |||
| 9cfe456cb9 | |||
| 2592a1cd72 | |||
| 1f9ff31234 | |||
| be6cab1ab2 | |||
| 7f0fdbc6bb | |||
| e3b134e48a | |||
| 0fa26e2840 | |||
| adcd58dce9 | |||
| 45ca395962 | |||
| 923cebd9c9 | |||
| 98ce7410c2 | |||
| b7f65a6eeb | |||
| 70691c16e5 | |||
| c81b48a0ee | |||
| 75f08c16bc | |||
| 14a0160309 | |||
| 43654c2946 | |||
| 8dd4513997 | |||
| 1d95ffb81a | |||
| c53db46ca7 | |||
| c546e6242b | |||
| 05bb811e42 | |||
| 7615d1a1d5 | |||
| 9eea820f3b | |||
| 6024b77535 | |||
| 257fab9832 |
267
flake.lock
generated
267
flake.lock
generated
@@ -1,5 +1,27 @@
|
|||||||
{
|
{
|
||||||
"nodes": {
|
"nodes": {
|
||||||
|
"aagl": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": "flake-compat",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"rust-overlay": "rust-overlay"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1771170334,
|
||||||
|
"narHash": "sha256-tCgoCWORfNHaRXTh2QS44LwxlV8q28jVvjN5ioMicv8=",
|
||||||
|
"owner": "ezKEa",
|
||||||
|
"repo": "aagl-gtk-on-nix",
|
||||||
|
"rev": "821b4f92c2c0981ea5b571b03403df87d2b2e2ae",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "ezKEa",
|
||||||
|
"repo": "aagl-gtk-on-nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"darwin": {
|
"darwin": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -24,11 +46,11 @@
|
|||||||
"flake-compat": {
|
"flake-compat": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761588595,
|
"lastModified": 1767039857,
|
||||||
"narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
|
"narHash": "sha256-vNpUSpF5Nuw8xvDLj2KCwwksIbjua2LZCqhV1LNRDns=",
|
||||||
"owner": "edolstra",
|
"owner": "edolstra",
|
||||||
"repo": "flake-compat",
|
"repo": "flake-compat",
|
||||||
"rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
|
"rev": "5edf11c44bc78a0d334f6334cdaf7d60d732daab",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -37,80 +59,46 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"flake-utils": {
|
"flake-schemas": {
|
||||||
"inputs": {
|
|
||||||
"systems": "systems"
|
|
||||||
},
|
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1731533236,
|
"lastModified": 1761577921,
|
||||||
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
"narHash": "sha256-eK3/xbUOrxp9fFlei09XNjqcdiHXxndzrTXp7jFpOk8=",
|
||||||
"owner": "numtide",
|
"rev": "47849c7625e223d36766968cc6dc23ba0e135922",
|
||||||
"repo": "flake-utils",
|
"revCount": 107,
|
||||||
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
"type": "tarball",
|
||||||
"type": "github"
|
"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/flake-schemas/0.2.0/019a4a84-544d-7c59-b26d-e334e320c932/source.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "numtide",
|
"type": "tarball",
|
||||||
"repo": "flake-utils",
|
"url": "https://flakehub.com/f/DeterminateSystems/flake-schemas/%2A"
|
||||||
"type": "github"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"ghostty": {
|
"flake-schemas_2": {
|
||||||
"inputs": {
|
|
||||||
"flake-compat": "flake-compat",
|
|
||||||
"flake-utils": "flake-utils",
|
|
||||||
"home-manager": "home-manager",
|
|
||||||
"nixpkgs": "nixpkgs",
|
|
||||||
"zig": "zig",
|
|
||||||
"zon2nix": "zon2nix"
|
|
||||||
},
|
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769985646,
|
"lastModified": 1761577921,
|
||||||
"narHash": "sha256-ubfC9fLfdQ0xpQuFmGQCYIRyEEmOzXd+ya5rShM217k=",
|
"narHash": "sha256-eK3/xbUOrxp9fFlei09XNjqcdiHXxndzrTXp7jFpOk8=",
|
||||||
"owner": "ghostty-org",
|
"rev": "47849c7625e223d36766968cc6dc23ba0e135922",
|
||||||
"repo": "ghostty",
|
"revCount": 107,
|
||||||
"rev": "769fff5dfb322594c0dc7a379ee70897a7db773f",
|
"type": "tarball",
|
||||||
"type": "github"
|
"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/flake-schemas/0.2.0/019a4a84-544d-7c59-b26d-e334e320c932/source.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "ghostty-org",
|
"type": "tarball",
|
||||||
"repo": "ghostty",
|
"url": "https://flakehub.com/f/DeterminateSystems/flake-schemas/%2A"
|
||||||
"type": "github"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"home-manager": {
|
"home-manager": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"ghostty",
|
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1768068402,
|
"lastModified": 1770260404,
|
||||||
"narHash": "sha256-bAXnnJZKJiF7Xr6eNW6+PhBf1lg2P1aFUO9+xgWkXfA=",
|
"narHash": "sha256-3iVX1+7YUIt23hBx1WZsUllhbmP2EnXrV8tCRbLxHc8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "8bc5473b6bc2b6e1529a9c4040411e1199c43b4c",
|
"rev": "0d782ee42c86b196acff08acfbf41bb7d13eed5b",
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "home-manager",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"home-manager_2": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1769580047,
|
|
||||||
"narHash": "sha256-tNqCP/+2+peAXXQ2V8RwsBkenlfWMERb+Uy6xmevyhM=",
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "home-manager",
|
|
||||||
"rev": "366d78c2856de6ab3411c15c1cb4fb4c2bf5c826",
|
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -138,24 +126,27 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1768032153,
|
"lastModified": 1744536153,
|
||||||
"narHash": "sha256-zvxtwlM8ZlulmZKyYCQAPpkm5dngSEnnHjmjV7Teloc=",
|
"narHash": "sha256-awS2zRgF4uTwrOKwwiJcByDzDOdo3Q1rPZbiHQg/N38=",
|
||||||
"rev": "3146c6aa9995e7351a398e17470e15305e6e18ff",
|
"owner": "NixOS",
|
||||||
"type": "tarball",
|
"repo": "nixpkgs",
|
||||||
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre925418.3146c6aa9995/nixexprs.tar.xz"
|
"rev": "18dd725c29603f582cf1900e0d25f9f1063dbf11",
|
||||||
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"owner": "NixOS",
|
||||||
"url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz"
|
"ref": "nixpkgs-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769900590,
|
"lastModified": 1771043024,
|
||||||
"narHash": "sha256-I7Lmgj3owOTBGuauy9FL6qdpeK2umDoe07lM4V+PnyA=",
|
"narHash": "sha256-O1XDr7EWbRp+kHrNNgLWgIrB0/US5wvw9K6RERWAj6I=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "41e216c0ca66c83b12ab7a98cc326b5db01db646",
|
"rev": "3aadb7ca9eac2891d52a9dec199d9580a6e2bf44",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -181,26 +172,74 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixpkgs_4": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1766201043,
|
||||||
|
"narHash": "sha256-eplAP+rorKKd0gNjV3rA6+0WMzb1X1i16F5m5pASnjA=",
|
||||||
|
"rev": "b3aad468604d3e488d627c0b43984eb60e75e782",
|
||||||
|
"revCount": 904049,
|
||||||
|
"type": "tarball",
|
||||||
|
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.2511.904049%2Brev-b3aad468604d3e488d627c0b43984eb60e75e782/019b3f6c-8b33-7edb-b858-9979590f270b/source.tar.gz"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"type": "tarball",
|
||||||
|
"url": "https://flakehub.com/f/NixOS/nixpkgs/%2A"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_5": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1769089682,
|
||||||
|
"narHash": "sha256-9yA/LIuAVQq0lXelrZPjLuLVuZdm03p8tfmHhnDIkms=",
|
||||||
|
"rev": "078d69f03934859a181e81ba987c2bb033eebfc5",
|
||||||
|
"revCount": 906333,
|
||||||
|
"type": "tarball",
|
||||||
|
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.2511.906333%2Brev-078d69f03934859a181e81ba987c2bb033eebfc5/019bebf2-031c-7119-8fdc-ce9d29d005fa/source.tar.gz"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"type": "tarball",
|
||||||
|
"url": "https://flakehub.com/f/NixOS/nixpkgs/%2A"
|
||||||
|
}
|
||||||
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
|
"aagl": "aagl",
|
||||||
"darwin": "darwin",
|
"darwin": "darwin",
|
||||||
"ghostty": "ghostty",
|
"home-manager": "home-manager",
|
||||||
"home-manager": "home-manager_2",
|
|
||||||
"nix-flatpak": "nix-flatpak",
|
"nix-flatpak": "nix-flatpak",
|
||||||
"nixpkgs": "nixpkgs_2",
|
"nixpkgs": "nixpkgs_2",
|
||||||
"rust-overlay": "rust-overlay"
|
"rust-overlay": "rust-overlay_2",
|
||||||
|
"swaytreesave": "swaytreesave",
|
||||||
|
"vintage-story": "vintage-story"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"rust-overlay": {
|
"rust-overlay": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": "nixpkgs"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1770952264,
|
||||||
|
"narHash": "sha256-CjymNrJZWBtpavyuTkfPVPaZkwzIzGaf0E/3WgcwM14=",
|
||||||
|
"owner": "oxalica",
|
||||||
|
"repo": "rust-overlay",
|
||||||
|
"rev": "ec6a3d5cdf14bb5a1dd03652bd3f6351004d2188",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "oxalica",
|
||||||
|
"repo": "rust-overlay",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"rust-overlay_2": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": "nixpkgs_3"
|
"nixpkgs": "nixpkgs_3"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769915446,
|
"lastModified": 1771211437,
|
||||||
"narHash": "sha256-f1F/umtX3ZD7fF9DHSloVHc0mnAT0ry0YK2jI/6E0aI=",
|
"narHash": "sha256-lcNK438i4DGtyA+bPXXyVLHVmJjYpVKmpux9WASa3ro=",
|
||||||
"owner": "oxalica",
|
"owner": "oxalica",
|
||||||
"repo": "rust-overlay",
|
"repo": "rust-overlay",
|
||||||
"rev": "bc00300f010275e46feb3c3974df6587ff7b7808",
|
"rev": "c62195b3d6e1bb11e0c2fb2a494117d3b55d410f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -209,70 +248,42 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"systems": {
|
"swaytreesave": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-schemas": "flake-schemas",
|
||||||
|
"nixpkgs": "nixpkgs_4"
|
||||||
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681028828,
|
"lastModified": 1767148467,
|
||||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
"narHash": "sha256-W0O7SWq8ucokt4ctEAEvRvNoSM/oF7fBfb2kTN+lwTs=",
|
||||||
"owner": "nix-systems",
|
"ref": "refs/heads/master",
|
||||||
"repo": "default",
|
"rev": "0f4bb9bb450b28aa4f29d5eb2062deac6c26687a",
|
||||||
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
"revCount": 4,
|
||||||
"type": "github"
|
"type": "git",
|
||||||
|
"url": "https://scm.wyattjmiller.com/wymiller/swaytreesave-nix.git"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-systems",
|
"type": "git",
|
||||||
"repo": "default",
|
"url": "https://scm.wyattjmiller.com/wymiller/swaytreesave-nix.git"
|
||||||
"type": "github"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"zig": {
|
"vintage-story": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": [
|
"flake-schemas": "flake-schemas_2",
|
||||||
"ghostty",
|
"nixpkgs": "nixpkgs_5"
|
||||||
"flake-compat"
|
|
||||||
],
|
|
||||||
"flake-utils": [
|
|
||||||
"ghostty",
|
|
||||||
"flake-utils"
|
|
||||||
],
|
|
||||||
"nixpkgs": [
|
|
||||||
"ghostty",
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1763295135,
|
"lastModified": 1769397199,
|
||||||
"narHash": "sha256-sGv/NHCmEnJivguGwB5w8LRmVqr1P72OjS+NzcJsssE=",
|
"narHash": "sha256-MSajncUGZtlpl88rqFdj42eGGyWnk2jw84VbK3AgUBA=",
|
||||||
"owner": "mitchellh",
|
"ref": "refs/heads/master",
|
||||||
"repo": "zig-overlay",
|
"rev": "4d2313c50933645040a0d12556016fc2916bfa65",
|
||||||
"rev": "64f8b42cfc615b2cf99144adf2b7728c7847c72a",
|
"revCount": 1,
|
||||||
"type": "github"
|
"type": "git",
|
||||||
|
"url": "https://scm.wyattjmiller.com/wymiller/vintage-story-nix.git"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "mitchellh",
|
"type": "git",
|
||||||
"repo": "zig-overlay",
|
"url": "https://scm.wyattjmiller.com/wymiller/vintage-story-nix.git"
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"zon2nix": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"ghostty",
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1768231828,
|
|
||||||
"narHash": "sha256-wL/8Iij4T2OLkhHcc4NieOjf7YeJffaUYbCiCqKv/+0=",
|
|
||||||
"owner": "jcollie",
|
|
||||||
"repo": "zon2nix",
|
|
||||||
"rev": "c28e93f3ba133d4c1b1d65224e2eebede61fd071",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "jcollie",
|
|
||||||
"repo": "zon2nix",
|
|
||||||
"rev": "c28e93f3ba133d4c1b1d65224e2eebede61fd071",
|
|
||||||
"type": "github"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|||||||
42
flake.nix
42
flake.nix
@@ -11,8 +11,15 @@
|
|||||||
url = "github:lnl7/nix-darwin/nix-darwin-25.11";
|
url = "github:lnl7/nix-darwin/nix-darwin-25.11";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
ghostty.url = "github:ghostty-org/ghostty";
|
|
||||||
rust-overlay.url = "github:oxalica/rust-overlay";
|
rust-overlay.url = "github:oxalica/rust-overlay";
|
||||||
|
aagl = {
|
||||||
|
url = "github:ezKEa/aagl-gtk-on-nix";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
|
# My personal flakes
|
||||||
|
swaytreesave.url = "git+https://scm.wyattjmiller.com/wymiller/swaytreesave-nix.git";
|
||||||
|
vintage-story.url = "git+https://scm.wyattjmiller.com/wymiller/vintage-story-nix.git";
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = inputs @ {
|
outputs = inputs @ {
|
||||||
@@ -22,17 +29,21 @@
|
|||||||
darwin,
|
darwin,
|
||||||
home-manager,
|
home-manager,
|
||||||
rust-overlay,
|
rust-overlay,
|
||||||
|
aagl,
|
||||||
|
swaytreesave,
|
||||||
|
vintage-story,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
userName = "wyatt";
|
userName = "wyatt";
|
||||||
userEmail = "wyatt@wyattjmiller.com";
|
userEmail = "wyatt@wyattjmiller.com";
|
||||||
extraSpecialArgs = {
|
extraSpecialArgs = {
|
||||||
inherit userName userEmail;
|
inherit userName userEmail swaytreesave;
|
||||||
};
|
};
|
||||||
|
|
||||||
myOverlays = { ... }: {
|
myOverlays = { ... }: {
|
||||||
nixpkgs.overlays = [
|
nixpkgs.overlays = [
|
||||||
rust-overlay.overlays.default
|
rust-overlay.overlays.default
|
||||||
|
aagl.overlays.default
|
||||||
self.common.overlays
|
self.common.overlays
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
@@ -72,7 +83,7 @@
|
|||||||
nixosConfigurations."cloud" = nixpkgs.lib.nixosSystem {
|
nixosConfigurations."cloud" = nixpkgs.lib.nixosSystem {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
inherit userName userEmail;
|
inherit userName userEmail aagl vintage-story;
|
||||||
hostname = "cloud";
|
hostname = "cloud";
|
||||||
role = "workstation";
|
role = "workstation";
|
||||||
};
|
};
|
||||||
@@ -151,6 +162,31 @@
|
|||||||
# ];
|
# ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nixosConfigurations."yshtola" = nixpkgs.lib.nixosSystem {
|
||||||
|
system = "x86_64-linux";
|
||||||
|
specialArgs = {
|
||||||
|
inherit userName userEmail;
|
||||||
|
hostname = "yshtola";
|
||||||
|
role = "server";
|
||||||
|
};
|
||||||
|
modules = [
|
||||||
|
myOverlays
|
||||||
|
./modules/common
|
||||||
|
./modules/machine/yshtola
|
||||||
|
|
||||||
|
home-manager.nixosModules.home-manager
|
||||||
|
{
|
||||||
|
home-manager.useGlobalPkgs = true;
|
||||||
|
home-manager.useUserPackages = true;
|
||||||
|
home-manager.extraSpecialArgs = extraSpecialArgs // { isNixOS = true; role = "server"; };
|
||||||
|
home-manager.backupFileExtension = "bak";
|
||||||
|
home-manager.users.${userName}.imports = [
|
||||||
|
./home
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
# generic non-NixOS Linux machine
|
# generic non-NixOS Linux machine
|
||||||
homeConfigurations."generic" = let
|
homeConfigurations."generic" = let
|
||||||
hostname = builtins.getEnv "HOSTNAME";
|
hostname = builtins.getEnv "HOSTNAME";
|
||||||
|
|||||||
@@ -41,14 +41,37 @@
|
|||||||
id = "cjpalhdlnbpafiamejdnhcphjbkeiagm";
|
id = "cjpalhdlnbpafiamejdnhcphjbkeiagm";
|
||||||
sha256 = "sha256:0pdh1v0vx1d5vnl1zh7nbk6j1fh4k4hhwp1ljs203icn306lahsn";
|
sha256 = "sha256:0pdh1v0vx1d5vnl1zh7nbk6j1fh4k4hhwp1ljs203icn306lahsn";
|
||||||
# sha256 = lib.fakeSha256;
|
# sha256 = lib.fakeSha256;
|
||||||
version = "1.64.0";
|
version = "1.67.0";
|
||||||
})
|
})
|
||||||
(createChromiumExtension {
|
(createChromiumExtension {
|
||||||
# bitwarden
|
# bitwarden
|
||||||
id = "nngceckbapebfimnlniiiahkandclblb";
|
id = "nngceckbapebfimnlniiiahkandclblb";
|
||||||
sha256 = "sha256:0jxk3cqmgd5qj8hnw7s0k5s4bfrcmr0w0rckp3x0bmng07azw4gi";
|
sha256 = "sha256:0jxk3cqmgd5qj8hnw7s0k5s4bfrcmr0w0rckp3x0bmng07azw4gi";
|
||||||
# sha256 = lib.fakeSha256;
|
version = "2025.10.0";
|
||||||
version = "2025.5.0";
|
})
|
||||||
|
(createChromiumExtension {
|
||||||
|
# react dev tools
|
||||||
|
id = "fmkadmapgofadopljbjfkapdkoienihi";
|
||||||
|
sha256 = "sha256:01vy0x7hdkj4g3m2l4kw5rwldhhpkcxmd2miy5rj2dzxdnbchw2z";
|
||||||
|
version = "7.0.1";
|
||||||
|
})
|
||||||
|
(createChromiumExtension {
|
||||||
|
# wappalyzer
|
||||||
|
id = "gppongmhjkpfnbhagpmjfkannfbllamg";
|
||||||
|
sha256 = "sha256:1mi1wpm714r8yp0zh0yg6kccnld36rj4xb8j4y0c18y9176vc6wx";
|
||||||
|
version = "6.10.86";
|
||||||
|
})
|
||||||
|
(createChromiumExtension {
|
||||||
|
# obsidian web clipper
|
||||||
|
id = "cnjifjpddelmedmihgijeibhnjfabmlf";
|
||||||
|
sha256 = "sha256:0bp6g63g9hk2xbq054lpf5hzwmn73jzh3hswyjfp9r7yqj83mzgy";
|
||||||
|
version = "0.12.0";
|
||||||
|
})
|
||||||
|
(createChromiumExtension {
|
||||||
|
# dark reader
|
||||||
|
id = "eimadpbcbfnmbkopoojfekhnkhdbieeh";
|
||||||
|
sha256 = "sha256:06a9dz589i1da519kivzp7bljksl2xxsd151y7ww0hx28jd1694b";
|
||||||
|
version = "4.9.113";
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,11 +1,12 @@
|
|||||||
{ lib
|
{ lib
|
||||||
, pkgs
|
, pkgs
|
||||||
, userName
|
, userName
|
||||||
|
, swaytreesave
|
||||||
, isNixOS ? true
|
, isNixOS ? true
|
||||||
, ...
|
, ...
|
||||||
}:
|
}: let
|
||||||
let
|
# Have a file sturcture that holds all the configuration files that can't be configured by Nix
|
||||||
# TODO: Have a file structure that holds all the configuration files that can't be configured by Nix (or I haven't found the time to do so)
|
# or maybe I'm too lazy to do anything about it? I dunno
|
||||||
dirs = {
|
dirs = {
|
||||||
defaults = ../defaults;
|
defaults = ../defaults;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,4 +1,8 @@
|
|||||||
{dirs, ...}: {
|
{...}: let
|
||||||
|
dirs = {
|
||||||
|
defaults = ../defaults;
|
||||||
|
};
|
||||||
|
in {
|
||||||
programs.neovim = {
|
programs.neovim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
defaultEditor = true;
|
defaultEditor = true;
|
||||||
|
|||||||
@@ -31,7 +31,6 @@
|
|||||||
fzf
|
fzf
|
||||||
aria2
|
aria2
|
||||||
gnupg
|
gnupg
|
||||||
inetutils
|
|
||||||
|
|
||||||
# misc
|
# misc
|
||||||
file
|
file
|
||||||
|
|||||||
@@ -1,16 +1,4 @@
|
|||||||
{ lib, pkgs, isNixOS ? true, ... }:
|
{ lib, pkgs, isNixOS ? true, ... }:
|
||||||
lib.mkIf pkgs.stdenv.isLinux {
|
lib.mkIf pkgs.stdenv.isLinux {
|
||||||
home.packages = with pkgs; [
|
|
||||||
imv
|
|
||||||
xdg-utils
|
|
||||||
] ++ lib.optionals isNixOS [
|
|
||||||
betterdiscordctl
|
|
||||||
vesktop
|
|
||||||
xfce.thunar
|
|
||||||
pavucontrol
|
|
||||||
godot
|
|
||||||
aseprite
|
|
||||||
gpu-screen-recorder
|
|
||||||
gpu-screen-recorder-gtk
|
|
||||||
];
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
{
|
{
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
|
swaytreesave,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
dirs = {
|
dirs = {
|
||||||
@@ -15,6 +16,12 @@
|
|||||||
hash = "sha256-ZDFbI69ECsUTjbhlw2kHRufZbQMu+FQSMmncCJ5pagg=";
|
hash = "sha256-ZDFbI69ECsUTjbhlw2kHRufZbQMu+FQSMmncCJ5pagg=";
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
|
imports = [
|
||||||
|
swaytreesave.homeManagerModules.default
|
||||||
|
];
|
||||||
|
|
||||||
|
programs.swaytreesave.enable = if pkgs.stdenv.isLinux then true else false;
|
||||||
|
|
||||||
wayland.windowManager.sway = {
|
wayland.windowManager.sway = {
|
||||||
enable = pkgs.stdenv.isLinux;
|
enable = pkgs.stdenv.isLinux;
|
||||||
extraOptions = []; # Extra arguments to pass into sway. If sway goes haywire, we might need something in here
|
extraOptions = []; # Extra arguments to pass into sway. If sway goes haywire, we might need something in here
|
||||||
@@ -148,4 +155,5 @@ in {
|
|||||||
enable = pkgs.stdenv.isLinux;
|
enable = pkgs.stdenv.isLinux;
|
||||||
systemd.enable = true;
|
systemd.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,11 +1,17 @@
|
|||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
|
aagl,
|
||||||
|
vintage-story,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
cfg = config.gaming;
|
cfg = config.gaming;
|
||||||
in {
|
in {
|
||||||
|
imports = [
|
||||||
|
aagl.nixosModules.default
|
||||||
|
];
|
||||||
|
|
||||||
options.gaming = {
|
options.gaming = {
|
||||||
steam = {
|
steam = {
|
||||||
enable = lib.mkEnableOption "Steam gaming platform";
|
enable = lib.mkEnableOption "Steam gaming platform";
|
||||||
@@ -62,6 +68,14 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
vkbasalt = {
|
||||||
|
enable = lib.mkEnableOption "vkBasalt/ReShade/GShade post processing shaders";
|
||||||
|
};
|
||||||
|
|
||||||
|
mangohud = {
|
||||||
|
enable = lib.mkEnableOption "OpenGL/Vulkan overlay tool shown in games presenting FPS, CPU/GPU/memory utilization, load, etc.";
|
||||||
|
};
|
||||||
|
|
||||||
lutris = {
|
lutris = {
|
||||||
enable = lib.mkEnableOption "Lutris game manager and launcher";
|
enable = lib.mkEnableOption "Lutris game manager and launcher";
|
||||||
package = lib.mkOption {
|
package = lib.mkOption {
|
||||||
@@ -108,9 +122,38 @@ in {
|
|||||||
ffxiv = {
|
ffxiv = {
|
||||||
enable = lib.mkEnableOption "Final Fantasy XIV and it's accompanied (unofficial) launcher";
|
enable = lib.mkEnableOption "Final Fantasy XIV and it's accompanied (unofficial) launcher";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# TODO: when aagl gets it's unified launcher all finished/in a stable state, transition to that launcher
|
||||||
|
aagl = {
|
||||||
|
anime-game-launcher = {
|
||||||
|
enable = lib.mkEnableOption "Genshin Impact launcher (legacy)";
|
||||||
|
};
|
||||||
|
|
||||||
|
honkers-railway-launcher = {
|
||||||
|
enable = lib.mkEnableOption "Honkai: Star Rail launcher";
|
||||||
|
};
|
||||||
|
|
||||||
|
honkers-launcher = {
|
||||||
|
enable = lib.mkEnableOption "Honkai: Impact 3rd launcher";
|
||||||
|
};
|
||||||
|
|
||||||
|
wavey-launcher = {
|
||||||
|
enable = lib.mkEnableOption "Wuthering Waves launcher";
|
||||||
|
};
|
||||||
|
|
||||||
|
sleepy-launcher = {
|
||||||
|
enable = lib.mkEnableOption "Zenless Zone Zero (ZZZ) launcher";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
vintage-story = {
|
||||||
|
enable = lib.mkEnableOption "Vintage Story client and server";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = {
|
config = let
|
||||||
|
agl = cfg.aagl;
|
||||||
|
in {
|
||||||
programs.steam = lib.mkIf cfg.steam.enable {
|
programs.steam = lib.mkIf cfg.steam.enable {
|
||||||
enable = true;
|
enable = true;
|
||||||
remotePlay.openFirewall = cfg.steam.firewall.remotePlay;
|
remotePlay.openFirewall = cfg.steam.firewall.remotePlay;
|
||||||
@@ -139,6 +182,26 @@ in {
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
programs.anime-game-launcher = lib.mkIf agl.anime-game-launcher.enable {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.honkers-railway-launcher = lib.mkIf agl.honkers-railway-launcher.enable {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.honkers-launcher = lib.mkIf agl.honkers-launcher.enable {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.wavey-launcher = lib.mkIf agl.wavey-launcher.enable {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.sleepy-launcher = lib.mkIf agl.sleepy-launcher.enable {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
environment.systemPackages =
|
environment.systemPackages =
|
||||||
(lib.optionals cfg.lutris.enable (
|
(lib.optionals cfg.lutris.enable (
|
||||||
[cfg.lutris.package] ++
|
[cfg.lutris.package] ++
|
||||||
@@ -154,6 +217,20 @@ in {
|
|||||||
cfg.lutris.extraPackages
|
cfg.lutris.extraPackages
|
||||||
)) ++
|
)) ++
|
||||||
(lib.optionals cfg.minecraft.enable [pkgs.prismlauncher]) ++
|
(lib.optionals cfg.minecraft.enable [pkgs.prismlauncher]) ++
|
||||||
(lib.optionals cfg.ffxiv.enable [pkgs.xivlauncher]);
|
(lib.optionals cfg.ffxiv.enable [pkgs.xivlauncher pkgs.fflogs]) ++
|
||||||
|
(lib.optionals cfg.vintage-story.enable [vintage-story.packages.${pkgs.system}.default]) ++
|
||||||
|
(lib.optionals cfg.vkbasalt.enable [pkgs.vkbasalt pkgs.vkbasalt-cli]) ++
|
||||||
|
(lib.optionals cfg.mangohud.enable [pkgs.mangohud]) ++
|
||||||
|
(lib.optionals (cfg.vkbasalt.enable || cfg.mangohud.enable) [pkgs.goverlay pkgs.mesa-demos pkgs.vulkan-tools]);
|
||||||
|
|
||||||
|
nix.settings = let
|
||||||
|
inherit agl;
|
||||||
|
in (lib.mkIf
|
||||||
|
(agl.anime-game-launcher.enable || agl.honkers-railway-laucher.enable || agl.honkers-launcher.enable || agl.wavey-launcher.enable || agl.sleepy-launcher.enable)
|
||||||
|
{
|
||||||
|
substituters = [ "https://ezkea.cachix.org" ];
|
||||||
|
trusted-public-keys = [ "ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" ];
|
||||||
|
}
|
||||||
|
);
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,3 +7,11 @@ Licensed by the Mozilla Public License v2
|
|||||||
## Synopsis
|
## Synopsis
|
||||||
|
|
||||||
This is the directory that holds shared configuration files amongst computers that I own. They are called by the root `flake.nix` file.
|
This is the directory that holds shared configuration files amongst computers that I own. They are called by the root `flake.nix` file.
|
||||||
|
|
||||||
|
Here's a quick synopsis of each file:
|
||||||
|
|
||||||
|
- core: Sane Nix options that I set for myself
|
||||||
|
- environment: Core packages and environment variables to be set and installed
|
||||||
|
- fonts: Fonts and icons that are to be installed
|
||||||
|
- overlays: Customized packages tailored to my needs
|
||||||
|
- users: Users to be set on my system
|
||||||
|
|||||||
@@ -13,7 +13,6 @@
|
|||||||
systemd
|
systemd
|
||||||
lshw
|
lshw
|
||||||
dmidecode
|
dmidecode
|
||||||
nix-ld
|
|
||||||
]) ++
|
]) ++
|
||||||
lib.optionals pkgs.stdenv.isDarwin (with pkgs; [
|
lib.optionals pkgs.stdenv.isDarwin (with pkgs; [
|
||||||
# nothing here, yet ;)
|
# nothing here, yet ;)
|
||||||
|
|||||||
@@ -6,10 +6,14 @@
|
|||||||
fonts.packages = with pkgs;
|
fonts.packages = with pkgs;
|
||||||
[
|
[
|
||||||
noto-fonts
|
noto-fonts
|
||||||
noto-fonts-emoji
|
noto-fonts-color-emoji
|
||||||
liberation_ttf
|
liberation_ttf
|
||||||
noto-fonts-cjk-sans
|
noto-fonts-cjk-sans
|
||||||
monaspace
|
monaspace
|
||||||
]
|
]
|
||||||
++ builtins.filter lib.attrsets.isDerivation (builtins.attrValues pkgs.nerd-fonts);
|
++ builtins.filter lib.attrsets.isDerivation (builtins.attrValues pkgs.nerd-fonts);
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
adwaita-icon-theme
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
62
modules/common/linker.nix
Normal file
62
modules/common/linker.nix
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
{ pkgs, ... }: {
|
||||||
|
programs.nix-ld = {
|
||||||
|
enable = true;
|
||||||
|
libraries = with pkgs;
|
||||||
|
[
|
||||||
|
acl
|
||||||
|
attr
|
||||||
|
bzip2
|
||||||
|
dbus
|
||||||
|
expat
|
||||||
|
fontconfig
|
||||||
|
freetype
|
||||||
|
fuse3
|
||||||
|
icu
|
||||||
|
libnotify
|
||||||
|
libsodium
|
||||||
|
libssh
|
||||||
|
libunwind
|
||||||
|
libusb1
|
||||||
|
libuuid
|
||||||
|
nspr
|
||||||
|
nss
|
||||||
|
stdenv.cc.cc
|
||||||
|
util-linux
|
||||||
|
zlib
|
||||||
|
zstd
|
||||||
|
pipewire
|
||||||
|
cups
|
||||||
|
libxkbcommon
|
||||||
|
pango
|
||||||
|
mesa
|
||||||
|
libdrm
|
||||||
|
libglvnd
|
||||||
|
libpulseaudio
|
||||||
|
atk
|
||||||
|
cairo
|
||||||
|
alsa-lib
|
||||||
|
at-spi2-atk
|
||||||
|
at-spi2-core
|
||||||
|
gdk-pixbuf
|
||||||
|
glib
|
||||||
|
gtk3
|
||||||
|
libGL
|
||||||
|
libappindicator-gtk3
|
||||||
|
vulkan-loader
|
||||||
|
xorg.libX11
|
||||||
|
xorg.libXScrnSaver
|
||||||
|
xorg.libXcomposite
|
||||||
|
xorg.libXcursor
|
||||||
|
xorg.libXdamage
|
||||||
|
xorg.libXext
|
||||||
|
xorg.libXfixes
|
||||||
|
xorg.libXi
|
||||||
|
xorg.libXrandr
|
||||||
|
xorg.libXrender
|
||||||
|
xorg.libXtst
|
||||||
|
xorg.libxcb
|
||||||
|
xorg.libxkbfile
|
||||||
|
xorg.libxshmfence
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -40,7 +40,6 @@ in {
|
|||||||
config = mkIf cfg.enable (mkMerge [
|
config = mkIf cfg.enable (mkMerge [
|
||||||
{
|
{
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
glxinfo
|
|
||||||
vulkan-tools
|
vulkan-tools
|
||||||
mesa-demos
|
mesa-demos
|
||||||
];
|
];
|
||||||
@@ -62,9 +61,9 @@ in {
|
|||||||
|
|
||||||
(mkIf (cfg.gpuVendor == "amd") {
|
(mkIf (cfg.gpuVendor == "amd") {
|
||||||
services.xserver.videoDrivers = ["amdgpu"];
|
services.xserver.videoDrivers = ["amdgpu"];
|
||||||
hardware.graphics.extraPackages = with pkgs; [
|
# hardware.graphics.extraPackages = with pkgs; [
|
||||||
amdvlk
|
# amdvlk
|
||||||
];
|
# ];
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
radeontop
|
radeontop
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -12,4 +12,4 @@ These are named after Final Fantasy VII characters.
|
|||||||
|
|
||||||
### Servers/Network Infrastructure
|
### Servers/Network Infrastructure
|
||||||
|
|
||||||
These are named after Final Fantasy summons.
|
These are named after Final Fantasy summons. There is some infrastructure missing here like my routers and switches that I also name after summons.
|
||||||
|
|||||||
@@ -1,8 +1,8 @@
|
|||||||
{
|
{
|
||||||
config,
|
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
userName,
|
userName,
|
||||||
|
aagl,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
flatpakPackages = [
|
flatpakPackages = [
|
||||||
@@ -18,7 +18,7 @@
|
|||||||
in {
|
in {
|
||||||
imports = [
|
imports = [
|
||||||
(import ../../apps/flatpak.nix {
|
(import ../../apps/flatpak.nix {
|
||||||
inherit lib pkgs flatpakPackages userName;
|
inherit lib pkgs flatpakPackages userName aagl;
|
||||||
})
|
})
|
||||||
../../apps/gaming.nix
|
../../apps/gaming.nix
|
||||||
../../apps/appimage.nix
|
../../apps/appimage.nix
|
||||||
@@ -89,8 +89,10 @@ in {
|
|||||||
localNetworkGameTransfers = true;
|
localNetworkGameTransfers = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
vkbasalt.enable = true;
|
||||||
gamemode.enable = true;
|
gamemode.enable = true;
|
||||||
gamescope.enable = true;
|
gamescope.enable = true;
|
||||||
|
mangohud.enable = true;
|
||||||
lutris = {
|
lutris = {
|
||||||
enable = true;
|
enable = true;
|
||||||
wine = {
|
wine = {
|
||||||
@@ -100,14 +102,12 @@ in {
|
|||||||
compatibility = {
|
compatibility = {
|
||||||
protonSupport = true;
|
protonSupport = true;
|
||||||
};
|
};
|
||||||
extraPackages = with pkgs; [
|
|
||||||
gamemode
|
|
||||||
mangohud
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
ffxiv.enable = true;
|
ffxiv.enable = true;
|
||||||
minecraft.enable = true;
|
minecraft.enable = true;
|
||||||
|
aagl.anime-game-launcher.enable = true;
|
||||||
|
vintage-story.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Power management (see ../../pwrMgmt/default.nix)
|
# Power management (see ../../pwrMgmt/default.nix)
|
||||||
@@ -151,7 +151,7 @@ in {
|
|||||||
};
|
};
|
||||||
|
|
||||||
# Add username to groups "wheel" and "video" - more may be added here later
|
# Add username to groups "wheel" and "video" - more may be added here later
|
||||||
users.users.${userName}.extraGroups = ["wheel" "video" "gamemode" "podman" "network"];
|
users.users.${userName}.extraGroups = ["wheel" "video" "gamemode" "podman" "network" "libvirtd"];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
# Enable OpenSSH
|
# Enable OpenSSH
|
||||||
@@ -191,5 +191,23 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# sched_ext userspace CPU scheduling stuff - idk
|
||||||
|
services.scx = {
|
||||||
|
enable = true;
|
||||||
|
scheduler = "scx_bpfland";
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.obs-studio = {
|
||||||
|
enable = true;
|
||||||
|
plugins = with pkgs.obs-studio-plugins; [
|
||||||
|
wlrobs
|
||||||
|
obs-backgroundremoval
|
||||||
|
obs-pipewire-audio-capture
|
||||||
|
obs-vaapi #optional AMD hardware acceleration
|
||||||
|
obs-gstreamer
|
||||||
|
obs-vkcapture
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
system.stateVersion = "24.11";
|
system.stateVersion = "24.11";
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,5 +2,6 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./configuration.nix
|
./configuration.nix
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
../../common/linker.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
393
modules/machine/yshtola/configuration.nix
Normal file
393
modules/machine/yshtola/configuration.nix
Normal file
@@ -0,0 +1,393 @@
|
|||||||
|
{
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
userName,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
# INFO: set these to your liking
|
||||||
|
matrixFqdn = "chat.wyattjmiller.com";
|
||||||
|
rtcFqdn = "rtc.wyattjmiller.com";
|
||||||
|
|
||||||
|
supportEmail = "wyatt@wyattjmiller.com";
|
||||||
|
livekitKeyFile = "/var/lib/livekit/livekit.key";
|
||||||
|
matrixRegistrationTokenFile = "/var/lib/matrix.key";
|
||||||
|
mastodonFqdn = "social.wyattjmiller.com";
|
||||||
|
mastodonSecretsDir = "/var/lib/mastodon/secrets";
|
||||||
|
|
||||||
|
# After deploying Mastodon, register an OAuth application at
|
||||||
|
# https://social.wyattjmiller.com/settings/applications and write the
|
||||||
|
# client ID / secret to these paths (chmod 400, owned by the tuwunel user):
|
||||||
|
mastodonOauthClientIdFile = "/var/lib/tuwunel/mastodon-oauth-client-id";
|
||||||
|
mastodonOauthClientSecretFile = "/var/lib/tuwunel/mastodon-oauth-client-secret";
|
||||||
|
in {
|
||||||
|
imports = [
|
||||||
|
../../pwrMgmt
|
||||||
|
];
|
||||||
|
|
||||||
|
# Enable flakes for NixOS
|
||||||
|
nix.settings.experimental-features = ["nix-command" "flakes"];
|
||||||
|
|
||||||
|
nix.settings = {
|
||||||
|
download-buffer-size = 134217728; # 128 MiB in bytes
|
||||||
|
};
|
||||||
|
|
||||||
|
# Custom kernel/boot stuff
|
||||||
|
boot.kernelPackages = pkgs.linuxPackages_latest;
|
||||||
|
|
||||||
|
# Set your timezone
|
||||||
|
time.timeZone = "America/Detroit";
|
||||||
|
|
||||||
|
# Enable OpenSSH
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings.PermitRootLogin = "no";
|
||||||
|
settings.PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Enable keyring
|
||||||
|
services.gnome.gnome-keyring.enable = true;
|
||||||
|
|
||||||
|
# Enable GnuPG
|
||||||
|
programs.gnupg.agent = {
|
||||||
|
enable = true;
|
||||||
|
enableSSHSupport = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Enable SUID wrappers (some programs need them)
|
||||||
|
programs.mtr.enable = true;
|
||||||
|
|
||||||
|
# Enable Polkit
|
||||||
|
security.polkit.enable = true;
|
||||||
|
|
||||||
|
# Power management (see ../../pwrMgmt/default.nix)
|
||||||
|
pwrMgmt = {
|
||||||
|
enable = true;
|
||||||
|
cpuFreqGovernor = "performance";
|
||||||
|
powertop.enable = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Firewall settings (fallback, upstream way of doing things)
|
||||||
|
networking.firewall = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
allowedTCPPorts = [
|
||||||
|
80
|
||||||
|
443
|
||||||
|
8448
|
||||||
|
3478
|
||||||
|
5349
|
||||||
|
7880
|
||||||
|
7881
|
||||||
|
8080
|
||||||
|
8081
|
||||||
|
];
|
||||||
|
|
||||||
|
allowedUDPPorts = [
|
||||||
|
3478
|
||||||
|
7881
|
||||||
|
8448
|
||||||
|
];
|
||||||
|
|
||||||
|
allowedUDPPortRanges =[
|
||||||
|
# TURN UDP relays
|
||||||
|
{
|
||||||
|
from = 49000;
|
||||||
|
to = 50000;
|
||||||
|
}
|
||||||
|
#
|
||||||
|
{
|
||||||
|
from = 50100;
|
||||||
|
to = 50200;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Add username to groups "wheel" and "video" - more may be added here later
|
||||||
|
users.users.caddy.extraGroups = [ "mastodon" ];
|
||||||
|
|
||||||
|
users.users.${userName} = {
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFV9eSc9L+aJLoKoexq2f/jb5rpyZnhuGiyhS8YQAbaS wyatt@wyattjmiller.com"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO4WKvKnnYpTbzZHFEslOKyfiiMqWxhW3AfX6E7ACmYU wyatt@wyattjmiller.com"
|
||||||
|
];
|
||||||
|
extraGroups = ["wheel" "video" "network"];
|
||||||
|
};
|
||||||
|
|
||||||
|
# fail2ban
|
||||||
|
services.fail2ban = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.fail2ban;
|
||||||
|
maxretry = 5;
|
||||||
|
bantime = "3h";
|
||||||
|
bantime-increment = {
|
||||||
|
enable = true;
|
||||||
|
rndtime = "10m";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Mastodon service — social.wyattjmiller.com
|
||||||
|
services.mastodon = {
|
||||||
|
enable = true;
|
||||||
|
localDomain = mastodonFqdn;
|
||||||
|
configureNginx = false;
|
||||||
|
secretKeyBaseFile = "${mastodonSecretsDir}/secret_key_base";
|
||||||
|
otpSecretFile = "${mastodonSecretsDir}/otp_secret";
|
||||||
|
vapidPrivateKeyFile = "${mastodonSecretsDir}/vapid_private_key";
|
||||||
|
vapidPublicKeyFile = "${mastodonSecretsDir}/vapid_public_key";
|
||||||
|
# Configure SMTP after initial deploy via mastodonSecretsDir or a separate
|
||||||
|
# NixOS secrets manager (sops-nix / agenix).
|
||||||
|
smtp = {
|
||||||
|
host = "mail.wyattjmiller.com";
|
||||||
|
port = 25;
|
||||||
|
fromAddress = "notifications@${mastodonFqdn}";
|
||||||
|
authenticate = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Matrix server
|
||||||
|
services.matrix-tuwunel = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.matrix-tuwunel;
|
||||||
|
settings = {
|
||||||
|
global = {
|
||||||
|
server_name = matrixFqdn;
|
||||||
|
allow_encryption = true;
|
||||||
|
allow_federation = true;
|
||||||
|
allow_registration = true;
|
||||||
|
registration_token = matrixRegistrationTokenFile;
|
||||||
|
allow_unstable_room_versions = false;
|
||||||
|
allow_experimental_room_versions = false;
|
||||||
|
zstd_compression = true;
|
||||||
|
new_user_displayname_suffix = "✨";
|
||||||
|
max_request_size = 1048575600; # 100MB in bytes, for file uploads
|
||||||
|
database_backup_path = "/var/lib/tuwunel/database_backups";
|
||||||
|
database_backups_to_keep = 2;
|
||||||
|
|
||||||
|
address = [
|
||||||
|
"127.0.0.1"
|
||||||
|
"::1"
|
||||||
|
];
|
||||||
|
port = [ 8008 ];
|
||||||
|
|
||||||
|
well_known = {
|
||||||
|
client = "https://${matrixFqdn}";
|
||||||
|
server = "${matrixFqdn}:443";
|
||||||
|
support_email = supportEmail;
|
||||||
|
support_mxid = "@wymiller:${matrixFqdn}";
|
||||||
|
|
||||||
|
rtc_transports = [{
|
||||||
|
type = "livekit";
|
||||||
|
livekit_service_url = "https://${rtcFqdn}";
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Mastodon as OIDC provider for Matrix login.
|
||||||
|
# Mastodon 4.3+ exposes OpenID Connect discovery at
|
||||||
|
# https://<domain>/.well-known/openid-configuration.
|
||||||
|
#
|
||||||
|
# REQUIRED RUNTIME SETUP (once, after first Mastodon deploy):
|
||||||
|
# 1. Visit https://social.wyattjmiller.com/settings/applications
|
||||||
|
# 2. Create a new application with the redirect URI:
|
||||||
|
# https://chat.wyattjmiller.com/_matrix/client/v3/login/sso/redirect/oidc-mastodon
|
||||||
|
# and scopes: read:accounts
|
||||||
|
# 3. Write the Application ID → /var/lib/tuwunel/mastodon-oauth-client-id (chmod 400, owned by tuwunel)
|
||||||
|
# Write the Client Secret → /var/lib/tuwunel/mastodon-oauth-client-secret
|
||||||
|
# 4. nixos-rebuild switch (or restart tuwunel.service)
|
||||||
|
identity_provider= [
|
||||||
|
{
|
||||||
|
brand = "Mastodon";
|
||||||
|
issuer_url = "https://${mastodonFqdn}";
|
||||||
|
id = "oidc-mastodon";
|
||||||
|
client_id = mastodonOauthClientIdFile;
|
||||||
|
client_secret = mastodonOauthClientSecretFile;
|
||||||
|
scope = ["openid" "read:accounts"];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# LiveKit (Matrix RTC)
|
||||||
|
services.livekit = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.livekit;
|
||||||
|
openFirewall = true;
|
||||||
|
keyFile = livekitKeyFile;
|
||||||
|
settings = {
|
||||||
|
port = 7880;
|
||||||
|
room.auto_create = true;
|
||||||
|
rtc = {
|
||||||
|
use_external_ip = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Reverse proxy
|
||||||
|
services.caddy = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.caddy;
|
||||||
|
virtualHosts = {
|
||||||
|
"${mastodonFqdn}" = {
|
||||||
|
extraConfig = ''
|
||||||
|
encode zstd gzip
|
||||||
|
|
||||||
|
root * ${config.services.mastodon.package}/public
|
||||||
|
|
||||||
|
handle /system/* {
|
||||||
|
uri strip_prefix /system
|
||||||
|
root * /var/lib/mastodon/public-system
|
||||||
|
file_server
|
||||||
|
}
|
||||||
|
|
||||||
|
@streaming path /api/v1/streaming*
|
||||||
|
handle @streaming {
|
||||||
|
reverse_proxy localhost:4000
|
||||||
|
}
|
||||||
|
|
||||||
|
handle {
|
||||||
|
@notfile not file
|
||||||
|
handle @notfile {
|
||||||
|
reverse_proxy localhost:3000
|
||||||
|
}
|
||||||
|
file_server
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"${matrixFqdn}" = {
|
||||||
|
extraConfig = ''
|
||||||
|
encode zstd gzip
|
||||||
|
reverse_proxy localhost:8008
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"${matrixFqdn}:8448" = {
|
||||||
|
extraConfig = ''
|
||||||
|
encode zstd gzip
|
||||||
|
reverse_proxy localhost:8008
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"${rtcFqdn}" = {
|
||||||
|
extraConfig = ''
|
||||||
|
@jwt_service {
|
||||||
|
path /sfu/get* /healthz*
|
||||||
|
}
|
||||||
|
|
||||||
|
handle @jwt_service {
|
||||||
|
reverse_proxy localhost:8080
|
||||||
|
}
|
||||||
|
|
||||||
|
handle {
|
||||||
|
reverse_proxy localhost:7880 {
|
||||||
|
header_up Connection "upgrade"
|
||||||
|
header_up Upgrade {http.request.header.Upgrade}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# LiveKit JWT service
|
||||||
|
services.lk-jwt-service = {
|
||||||
|
enable = true;
|
||||||
|
port = 8080;
|
||||||
|
livekitUrl = "wss://rtc.wyattjmiller.com";
|
||||||
|
keyFile = livekitKeyFile;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Generate LiveKit key if it doesn't exist
|
||||||
|
systemd.services = {
|
||||||
|
matrix-registration-token-gen = {
|
||||||
|
before = [ "tuwunel.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
path = with pkgs; [ coreutils openssl ];
|
||||||
|
script = ''
|
||||||
|
set -eu
|
||||||
|
|
||||||
|
if [ -f "${matrixRegistrationTokenFile}" ]; then
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
install -d -m 0700 "$(dirname "${matrixRegistrationTokenFile}")"
|
||||||
|
|
||||||
|
TOKEN="$(openssl rand -hex 32)"
|
||||||
|
|
||||||
|
umask 077
|
||||||
|
printf '%s\n' "$TOKEN" > "${matrixRegistrationTokenFile}"
|
||||||
|
'';
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
User = "root";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
livekit-key-gen = {
|
||||||
|
before = [ "lk-jwt-service.service" "livekit.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
path = with pkgs; [ coreutils openssl ];
|
||||||
|
script = ''
|
||||||
|
set -eu
|
||||||
|
|
||||||
|
if [ -f "${livekitKeyFile}" ]; then
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
install -d -m 0700 "$(dirname "${livekitKeyFile}")"
|
||||||
|
|
||||||
|
API_KEY="$(openssl rand -hex 8)"
|
||||||
|
API_SECRET="$(openssl rand -hex 32)"
|
||||||
|
|
||||||
|
umask 077
|
||||||
|
printf '%s: %s\n' "$API_KEY" "$API_SECRET" > "${livekitKeyFile}"
|
||||||
|
'';
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
User = "root";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
mastodon-secrets-gen = {
|
||||||
|
before = [ "mastodon-web.service" "mastodon-sidekiq-0.service" "mastodon-streaming.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
path = with pkgs; [ coreutils openssl ruby_3_4 ];
|
||||||
|
script = ''
|
||||||
|
set -eu
|
||||||
|
|
||||||
|
dir="${mastodonSecretsDir}"
|
||||||
|
install -d -m 0750 -o mastodon -g mastodon "$dir"
|
||||||
|
|
||||||
|
gen_hex() {
|
||||||
|
local f="$1"
|
||||||
|
if [ ! -f "$f" ]; then
|
||||||
|
umask 077
|
||||||
|
openssl rand -hex 64 | install -o mastodon -g mastodon -m 0400 /dev/stdin "$f"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
gen_hex "$dir/secret_key_base"
|
||||||
|
gen_hex "$dir/otp_secret"
|
||||||
|
|
||||||
|
if [ ! -f "$dir/vapid_private_key" ]; then
|
||||||
|
umask 077
|
||||||
|
ruby -ropenssl -rbase64 -e '
|
||||||
|
key = OpenSSL::PKey::EC.generate("prime256v1")
|
||||||
|
priv = Base64.urlsafe_encode64(key.private_key.to_s(2).rjust(32, "\x00"), padding: false)
|
||||||
|
pub = Base64.urlsafe_encode64(key.public_key.to_bn.to_s(2), padding: false)
|
||||||
|
File.write(ARGV[0], priv)
|
||||||
|
File.write(ARGV[1], pub)
|
||||||
|
' \
|
||||||
|
"$dir/vapid_private_key" \
|
||||||
|
"$dir/vapid_public_key"
|
||||||
|
chown mastodon:mastodon "$dir/vapid_private_key" "$dir/vapid_public_key"
|
||||||
|
chmod 0400 "$dir/vapid_private_key" "$dir/vapid_public_key"
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
User = "root";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = "25.11";
|
||||||
|
}
|
||||||
6
modules/machine/yshtola/default.nix
Normal file
6
modules/machine/yshtola/default.nix
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
{ ... }: {
|
||||||
|
imports = [
|
||||||
|
./configuration.nix
|
||||||
|
./hardware-configuration.nix
|
||||||
|
];
|
||||||
|
}
|
||||||
35
modules/machine/yshtola/hardware-configuration.nix
Normal file
35
modules/machine/yshtola/hardware-configuration.nix
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
|
# and may be overwritten by future invocations. Please make changes
|
||||||
|
# to /etc/nixos/configuration.nix instead.
|
||||||
|
{ config, lib, pkgs, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports =
|
||||||
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" "sd_mod" ];
|
||||||
|
boot.kernelParams = [ "console=ttyS0,19200n8" ];
|
||||||
|
boot.kernelModules = [ ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
boot.loader.grub.extraConfig = ''
|
||||||
|
serial --speed=19200 --unit=0 --word=8 --parity=no --stop=1;
|
||||||
|
terminal_input serial;
|
||||||
|
terminal_output serial;
|
||||||
|
'';
|
||||||
|
boot.loader.grub.forceInstall = true;
|
||||||
|
# boot.loader.grub.enable = true;
|
||||||
|
boot.loader.grub.device = "nodev";
|
||||||
|
boot.loader.timeout = 10;
|
||||||
|
|
||||||
|
fileSystems."/" =
|
||||||
|
{ device = "/dev/sda";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices =
|
||||||
|
[ { device = "/dev/sdb"; }
|
||||||
|
];
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
}
|
||||||
@@ -1,6 +1,11 @@
|
|||||||
{...}: {
|
# TODO: refactor into module
|
||||||
|
{ pkgs, ...}: {
|
||||||
services.pipewire = {
|
services.pipewire = {
|
||||||
enable = true;
|
enable = true;
|
||||||
pulse.enable = true;
|
pulse.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
helvum
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,10 @@
|
|||||||
{...}: {
|
{ pkgs, ... }: {
|
||||||
virtualisation.libvirtd.enable = true;
|
virtualisation.libvirtd.enable = true;
|
||||||
programs.virt-manager.enable = true;
|
programs.virt-manager.enable = true;
|
||||||
|
services.qemuGuest.enable = true;
|
||||||
|
services.spice-vdagentd.enable = true;
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
qemu
|
||||||
|
quickemu
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user