Compare commits
1 Commits
ixion-buil
...
shell-inhi
Author | SHA1 | Date | |
---|---|---|---|
4feb5b89e8 |
72
flake.lock
generated
72
flake.lock
generated
@@ -7,11 +7,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1757432263,
|
"lastModified": 1749744770,
|
||||||
"narHash": "sha256-qHn+/0+IOz5cG68BZUwL9BV3EO/e9eNKCjH3+N7wMdI=",
|
"narHash": "sha256-MEM9XXHgBF/Cyv1RES1t6gqAX7/tvayBC1r/KPyK1ls=",
|
||||||
"owner": "lnl7",
|
"owner": "lnl7",
|
||||||
"repo": "nix-darwin",
|
"repo": "nix-darwin",
|
||||||
"rev": "1fef4404de4d1596aa5ab2bd68078370e1b9dcdb",
|
"rev": "536f951efb1ccda9b968e3c9dee39fbeb6d3fdeb",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -64,11 +64,11 @@
|
|||||||
"zon2nix": "zon2nix"
|
"zon2nix": "zon2nix"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1759330332,
|
"lastModified": 1754941490,
|
||||||
"narHash": "sha256-ZKyOgOOm9Itjbc5xi89xMtw+cnnOFfl79zndPMTzKpU=",
|
"narHash": "sha256-2AJf0q4u1zakqjr0y4dCyqzdDSil8P5m2YpZxAAzJJw=",
|
||||||
"owner": "ghostty-org",
|
"owner": "ghostty-org",
|
||||||
"repo": "ghostty",
|
"repo": "ghostty",
|
||||||
"rev": "a5aff0e347b0016e2735d4ec4b4cdca96b5438d1",
|
"rev": "5bf632e9cc0e77a578bad983b0cbdf0451ce87d4",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -84,11 +84,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1758463745,
|
"lastModified": 1753592768,
|
||||||
"narHash": "sha256-uhzsV0Q0I9j2y/rfweWeGif5AWe0MGrgZ/3TjpDYdGA=",
|
"narHash": "sha256-oV695RvbAE4+R9pcsT9shmp6zE/+IZe6evHWX63f2Qg=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "3b955f5f0a942f9f60cdc9cacb7844335d0f21c3",
|
"rev": "fc3add429f21450359369af74c2375cb34a2d204",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -129,24 +129,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1758360447,
|
"lastModified": 1754767907,
|
||||||
"narHash": "sha256-XDY3A83bclygHDtesRoaRTafUd80Q30D/Daf9KSG6bs=",
|
"narHash": "sha256-8OnUzRQZkqtUol9vuUuQC30hzpMreKptNyET2T9lB6g=",
|
||||||
"rev": "8eaee110344796db060382e15d3af0a9fc396e0e",
|
|
||||||
"type": "tarball",
|
|
||||||
"url": "https://releases.nixos.org/nixos/unstable/nixos-25.11pre864002.8eaee1103447/nixexprs.tar.xz"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"type": "tarball",
|
|
||||||
"url": "https://channels.nixos.org/nixos-unstable/nixexprs.tar.xz"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs_3": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1759281824,
|
|
||||||
"narHash": "sha256-FIBE1qXv9TKvSNwst6FumyHwCRH3BlWDpfsnqRDCll0=",
|
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "5b5be50345d4113d04ba58c444348849f5585b4a",
|
"rev": "c5f08b62ed75415439d48152c2a784e36909b1bc",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -156,29 +143,13 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"quadlet-nix": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1758631655,
|
|
||||||
"narHash": "sha256-EGeZ963L7xsNAY7snvP1JHQe7LWLVCM6f49+PzWjhEE=",
|
|
||||||
"owner": "SEIAROTg",
|
|
||||||
"repo": "quadlet-nix",
|
|
||||||
"rev": "2ebe01b175e2e1e6de3f172d23f0c3b88713eec9",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "SEIAROTg",
|
|
||||||
"repo": "quadlet-nix",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"darwin": "darwin",
|
"darwin": "darwin",
|
||||||
"ghostty": "ghostty",
|
"ghostty": "ghostty",
|
||||||
"home-manager": "home-manager",
|
"home-manager": "home-manager",
|
||||||
"nix-flatpak": "nix-flatpak",
|
"nix-flatpak": "nix-flatpak",
|
||||||
"nixpkgs": "nixpkgs_3",
|
"nixpkgs": "nixpkgs_2"
|
||||||
"quadlet-nix": "quadlet-nix"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"systems": {
|
"systems": {
|
||||||
@@ -227,20 +198,27 @@
|
|||||||
},
|
},
|
||||||
"zon2nix": {
|
"zon2nix": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": "nixpkgs_2"
|
"flake-utils": [
|
||||||
|
"ghostty",
|
||||||
|
"flake-utils"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"ghostty",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1758405547,
|
"lastModified": 1742104771,
|
||||||
"narHash": "sha256-WgaDgvIZMPvlZcZrpPMjkaalTBnGF2lTG+62znXctWM=",
|
"narHash": "sha256-LhidlyEA9MP8jGe1rEnyjGFCzLLgCdDpYeWggibayr0=",
|
||||||
"owner": "jcollie",
|
"owner": "jcollie",
|
||||||
"repo": "zon2nix",
|
"repo": "zon2nix",
|
||||||
"rev": "bf983aa90ff169372b9fa8c02e57ea75e0b42245",
|
"rev": "56c159be489cc6c0e73c3930bd908ddc6fe89613",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "jcollie",
|
"owner": "jcollie",
|
||||||
"repo": "zon2nix",
|
"repo": "zon2nix",
|
||||||
"rev": "bf983aa90ff169372b9fa8c02e57ea75e0b42245",
|
"rev": "56c159be489cc6c0e73c3930bd908ddc6fe89613",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
65
flake.nix
65
flake.nix
@@ -12,7 +12,6 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
ghostty.url = "github:ghostty-org/ghostty";
|
ghostty.url = "github:ghostty-org/ghostty";
|
||||||
quadlet-nix.url = "github:SEIAROTg/quadlet-nix";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = inputs @ {
|
outputs = inputs @ {
|
||||||
@@ -22,15 +21,12 @@
|
|||||||
darwin,
|
darwin,
|
||||||
home-manager,
|
home-manager,
|
||||||
ghostty,
|
ghostty,
|
||||||
quadlet-nix,
|
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
userName = "wyatt";
|
userName = "wyatt";
|
||||||
userEmail = "wyatt@wyattjmiller.com";
|
userEmail = "wyatt@wyattjmiller.com";
|
||||||
|
extraSpecialArgs = {
|
||||||
# use this variable to take inputs and use them as arguments in your modules, this will be the common one
|
inherit userName userEmail ghostty;
|
||||||
customArgs = {
|
|
||||||
inherit userName userEmail ghostty quadlet-nix;
|
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
meta = import ./meta;
|
meta = import ./meta;
|
||||||
@@ -38,7 +34,8 @@
|
|||||||
# Primary laptop - MacBook Pro (2023, M3)
|
# Primary laptop - MacBook Pro (2023, M3)
|
||||||
darwinConfigurations."sephiroth" = darwin.lib.darwinSystem {
|
darwinConfigurations."sephiroth" = darwin.lib.darwinSystem {
|
||||||
system = "aarch64-darwin";
|
system = "aarch64-darwin";
|
||||||
specialArgs = customArgs // {
|
specialArgs = {
|
||||||
|
inherit userName userEmail ghostty;
|
||||||
hostname = "sephiroth";
|
hostname = "sephiroth";
|
||||||
role = "devel";
|
role = "devel";
|
||||||
};
|
};
|
||||||
@@ -50,9 +47,7 @@
|
|||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = customArgs // {
|
home-manager.extraSpecialArgs = extraSpecialArgs;
|
||||||
inherit home-manager;
|
|
||||||
};
|
|
||||||
home-manager.users.${userName} = import ./home;
|
home-manager.users.${userName} = import ./home;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
@@ -61,7 +56,8 @@
|
|||||||
# Primary desktop computer
|
# Primary desktop computer
|
||||||
nixosConfigurations."cloud" = nixpkgs.lib.nixosSystem {
|
nixosConfigurations."cloud" = nixpkgs.lib.nixosSystem {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = customArgs // {
|
specialArgs = {
|
||||||
|
inherit userName userEmail ghostty;
|
||||||
hostname = "cloud";
|
hostname = "cloud";
|
||||||
role = "devel";
|
role = "devel";
|
||||||
};
|
};
|
||||||
@@ -74,9 +70,7 @@
|
|||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = customArgs // {
|
home-manager.extraSpecialArgs = extraSpecialArgs;
|
||||||
inherit home-manager;
|
|
||||||
};
|
|
||||||
home-manager.users.${userName}.imports = [
|
home-manager.users.${userName}.imports = [
|
||||||
./home
|
./home
|
||||||
];
|
];
|
||||||
@@ -87,7 +81,8 @@
|
|||||||
# Apartment appliance server
|
# Apartment appliance server
|
||||||
nixosConfigurations."valefor" = nixpkgs.lib.nixosSystem {
|
nixosConfigurations."valefor" = nixpkgs.lib.nixosSystem {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = customArgs // {
|
specialArgs = {
|
||||||
|
inherit userName userEmail;
|
||||||
hostname = "valefor";
|
hostname = "valefor";
|
||||||
role = "server";
|
role = "server";
|
||||||
};
|
};
|
||||||
@@ -99,9 +94,7 @@
|
|||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = customArgs // {
|
home-manager.extraSpecialArgs = extraSpecialArgs;
|
||||||
inherit home-manager;
|
|
||||||
};
|
|
||||||
home-manager.users.${userName}.imports = [
|
home-manager.users.${userName}.imports = [
|
||||||
./home
|
./home
|
||||||
];
|
];
|
||||||
@@ -112,25 +105,29 @@
|
|||||||
# Storage, status, game, and media server
|
# Storage, status, game, and media server
|
||||||
nixosConfigurations."ixion" = nixpkgs.lib.nixosSystem {
|
nixosConfigurations."ixion" = nixpkgs.lib.nixosSystem {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
specialArgs = customArgs // {
|
specialArgs = {
|
||||||
|
inherit userName userEmail;
|
||||||
hostname = "ixion";
|
hostname = "ixion";
|
||||||
role = "server";
|
role = "server";
|
||||||
};
|
};
|
||||||
modules = [
|
# modules = [
|
||||||
quadlet-nix.nixosModules.quadlet
|
# nix-flatpak.nixosModules.nix-flatpak
|
||||||
./modules/common
|
# nix-ld.nixosModules.nix-ld
|
||||||
./modules/machine/ixion
|
# ./modules/nixos/hardware-configuration.nix
|
||||||
|
# ./modules/nix-core.nix
|
||||||
home-manager.nixosModules.home-manager
|
# ./modules/nixos/configuration.nix
|
||||||
{
|
# ./modules/host-users.nix
|
||||||
home-manager.useGlobalPkgs = true;
|
#
|
||||||
home-manager.useUserPackages = true;
|
# home-manager.nixosModules.home-manager
|
||||||
home-manager.extraSpecialArgs = customArgs;
|
# {
|
||||||
home-manager.users.${userName}.imports = [
|
# home-manager.useGlobalPkgs = true;
|
||||||
./home
|
# home-manager.useUserPackages = true;
|
||||||
];
|
# home-manager.extraSpecialArgs = extraSpecialArgs;
|
||||||
}
|
# home-manager.users.${userName}.imports = [
|
||||||
];
|
# ./home
|
||||||
|
# ];
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
217
home/shell.nix
217
home/shell.nix
@@ -1,106 +1,125 @@
|
|||||||
{pkgs, lib, ...}: {
|
{
|
||||||
programs.fish = {
|
lib,
|
||||||
enable = true;
|
pkgs,
|
||||||
# initExtra = ''
|
userName,
|
||||||
# export PATH="$PATH:$HOME/bin:$HOME/.local/bin:$HOME/go/bin"
|
...
|
||||||
# '';
|
}: {
|
||||||
|
programs = {
|
||||||
|
fish = {
|
||||||
|
enable = true;
|
||||||
|
shellAliases = {
|
||||||
|
# ls aliases
|
||||||
|
ls = "eza --color";
|
||||||
|
la = "eza -l -all --color";
|
||||||
|
ll = "eza -l --color";
|
||||||
|
lt = "eza -l --color --git";
|
||||||
|
# lazygit alias
|
||||||
|
lg = "lazygit";
|
||||||
|
# cat, less, more alias
|
||||||
|
cat = "bat";
|
||||||
|
less = "bat";
|
||||||
|
more = "bat";
|
||||||
|
# top alias
|
||||||
|
top = "btm";
|
||||||
|
};
|
||||||
|
functions =
|
||||||
|
{
|
||||||
|
fish_greeting = {
|
||||||
|
body = ''
|
||||||
|
set memes \
|
||||||
|
"Crazy? I was crazy once. They locked me in a room. A rubber room. A rubber room with rats. And rats make me crazy." \
|
||||||
|
"Daddy, chill!" \
|
||||||
|
"What the hell is even that?!" \
|
||||||
|
"Road work ahead? Yeah, I sure hope it does!" \
|
||||||
|
"Look at all those chickens!" \
|
||||||
|
"I smell like beef" \
|
||||||
|
"Say, Coloardo - I'M A GIRAFFE" \
|
||||||
|
"I didn't get no sleep cause of y'all, y'all not gone get any sleep cause of me!" \
|
||||||
|
"This is the dollar store, how good can it be?" \
|
||||||
|
"That was legitness" \
|
||||||
|
"Deez nuts" \
|
||||||
|
"I wanna be a cowboy baby" \
|
||||||
|
"Can I get a waffle? Can I please get a waffle?" \
|
||||||
|
"I'm lesbian. I thought you were American." \
|
||||||
|
"You gotta give 'em that 'hawk tuah' and spit on that thang!" \
|
||||||
|
"We don't do that here..." \
|
||||||
|
"What are those?! They are my crocs..." \
|
||||||
|
"It's an avocado... Thanks!" \
|
||||||
|
"I am once again asking for your financial support" \
|
||||||
|
"Is that a weed?" \
|
||||||
|
"No, this is Patrick!" \
|
||||||
|
"Come ride, heroes, ride" \
|
||||||
|
"Away with the tide" \
|
||||||
|
"Concede your mind unto the fiend" \
|
||||||
|
"Darkness come, rend the shield of light" \
|
||||||
|
"The sun is setting, darkness taking over - a date with chaos and you're dressed to the nines" \
|
||||||
|
"Now kneel overdweller, your lord commands, there's no salvation for the sons of man" \
|
||||||
|
"Snap click clank whirr whizz wham boom!" \
|
||||||
|
"Rohs an kyn ala na"
|
||||||
|
|
||||||
shellAliases = {
|
set choose_meme (random)"%"(count $memes)
|
||||||
# ls aliases
|
set choose_meme $memes[(math $choose_meme"+1")]
|
||||||
ls = "eza --color";
|
printf (set_color F90)"%s\n" $choose_meme
|
||||||
la = "eza -l -all --color";
|
'';
|
||||||
ll = "eza -l --color";
|
# onEvent = "fish_greeting";
|
||||||
lt = "eza -l --color --git";
|
};
|
||||||
|
} // (lib.mkIf pkgs.stdenv.isLinux {
|
||||||
# lazygit alias
|
block = {
|
||||||
lg = "lazygit";
|
body = ''
|
||||||
|
echo "Starting systemd-inhibit..."
|
||||||
# cat, less, more alias
|
set inhibit_pid_file /tmp/fish_inhibit_pid_(whoami)
|
||||||
cat = "bat";
|
bash -c 'systemd-inhibit --no-ask-password --what=idle --who="'${userName}'" --why="manual invocation" sh & echo $! > '"$inhibit_pid_file"' && disown'
|
||||||
less = "bat";
|
if test -f $inhibit_pid_file
|
||||||
more = "bat";
|
set -g INHIBIT_PID (cat $inhibit_pid_file)
|
||||||
|
echo "Inhibit process started with PID: $INHIBIT_PID"
|
||||||
# top alias
|
else
|
||||||
top = "btm";
|
echo "Failed to start inhibit process"
|
||||||
|
return 1
|
||||||
|
end
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
unblock = {
|
||||||
|
body = ''
|
||||||
|
set inhibit_pid_file /tmp/fish_inhibit_pid_(whoami)
|
||||||
|
if test -f $inhibit_pid_file
|
||||||
|
set INHIBIT_PID (cat $inhibit_pid_file)
|
||||||
|
echo "Killing inhibit process: $INHIBIT_PID"
|
||||||
|
kill -SIGTERM $INHIBIT_PID 2>/dev/null; or kill -SIGKILL $INHIBIT_PID 2>/dev/null
|
||||||
|
rm -f $inhibit_pid_file
|
||||||
|
set -e INHIBIT_PID
|
||||||
|
echo "Inhibit process terminated"
|
||||||
|
else
|
||||||
|
echo "No inhibit process file found"
|
||||||
|
end
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
});
|
||||||
};
|
};
|
||||||
|
zsh = {
|
||||||
functions = {
|
enable = true;
|
||||||
fish_greeting = {
|
initContent = ''
|
||||||
body = ''
|
if [[ -z "$BASH_EXECUTION_STRING" ]]; then
|
||||||
set memes \
|
if [[ -n "$ZSH_VERSION" ]]; then
|
||||||
"Crazy? I was crazy once. They locked me in a room. A rubber room. A rubber room with rats. And rats make me crazy." \
|
LOGIN_OPTION="--login"
|
||||||
"Daddy, chill!" \
|
|
||||||
"What the hell is even that?!" \
|
|
||||||
"Road work ahead? Yeah, I sure hope it does!" \
|
|
||||||
"Look at all those chickens!" \
|
|
||||||
"I smell like beef" \
|
|
||||||
"Say, Coloardo - I'M A GIRAFFE" \
|
|
||||||
"I didn't get no sleep cause of y'all, y'all not gone get any sleep cause of me!" \
|
|
||||||
"This is the dollar store, how good can it be?" \
|
|
||||||
"That was legitness" \
|
|
||||||
"Deez nuts" \
|
|
||||||
"I wanna be a cowboy baby" \
|
|
||||||
"Can I get a waffle? Can I please get a waffle?" \
|
|
||||||
"I'm lesbian. I thought you were American." \
|
|
||||||
"You gotta give 'em that 'hawk tuah' and spit on that thang!" \
|
|
||||||
"We don't do that here..."
|
|
||||||
|
|
||||||
set choose_meme (random)"%"(count $memes)
|
|
||||||
set choose_meme $memes[(math $choose_meme"+1")]
|
|
||||||
|
|
||||||
printf (set_color F90)"%s\n" $choose_meme
|
|
||||||
'';
|
|
||||||
onEvent = "fish_greeting";
|
|
||||||
};
|
|
||||||
} // lib.optionalAttrs pkgs.stdenv.isLinux {
|
|
||||||
block = {
|
|
||||||
body = ''
|
|
||||||
systemd-inhibit --what=sleep --who="$USER" --why="manual invocation" --mode=block sleep infinity &
|
|
||||||
set -g INHIBIT_PID $last_pid
|
|
||||||
echo "Sleep inhibited. PID: $INHIBIT_PID"
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
unblock = {
|
|
||||||
body = ''
|
|
||||||
if set -q INHIBIT_PID
|
|
||||||
kill $INHIBIT_PID 2>/dev/null
|
|
||||||
and echo "Sleep inhibitor removed. PID: $INHIBIT_PID"
|
|
||||||
or echo "Failed to kill process or already terminated."
|
|
||||||
set -e INHIBIT_PID
|
|
||||||
else
|
else
|
||||||
echo "No active sleep inhibitor found."
|
LOGIN_OPTION=""
|
||||||
end
|
fi
|
||||||
'';
|
exec ${pkgs.fish}/bin/fish $LOGIN_OPTION
|
||||||
};
|
fi
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
};
|
bash = {
|
||||||
|
enable = true;
|
||||||
programs.zsh = {
|
initExtra = ''
|
||||||
enable = true;
|
if [[ -z "$BASH_EXECUTION_STRING" ]]; then
|
||||||
initContent = ''
|
if [[ -n "$ZSH_VERSION" ]]; then
|
||||||
if [[ -z "$BASH_EXECUTION_STRING" ]]; then
|
LOGIN_OPTION="--login"
|
||||||
if [[ -n "$ZSH_VERSION" ]]; then
|
else
|
||||||
LOGIN_OPTION="--login"
|
LOGIN_OPTION=""
|
||||||
else
|
fi
|
||||||
LOGIN_OPTION=""
|
exec ${pkgs.fish}/bin/fish $LOGIN_OPTION
|
||||||
fi
|
fi
|
||||||
exec ${pkgs.fish}/bin/fish $LOGIN_OPTION
|
'';
|
||||||
fi
|
};
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.bash = {
|
|
||||||
enable = true;
|
|
||||||
initExtra = ''
|
|
||||||
if [[ -z "$BASH_EXECUTION_STRING" ]]; then
|
|
||||||
if [[ -n "$ZSH_VERSION" ]]; then
|
|
||||||
LOGIN_OPTION="--login"
|
|
||||||
else
|
|
||||||
LOGIN_OPTION=""
|
|
||||||
fi
|
|
||||||
exec ${pkgs.fish}/bin/fish $LOGIN_OPTION
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@@ -1,23 +1,20 @@
|
|||||||
{ lib, pkgs, ... }: {
|
{ lib, pkgs, ... }: {
|
||||||
|
# Common packages that every system will use
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
git
|
git
|
||||||
vim
|
vim
|
||||||
neovim
|
neovim
|
||||||
usbutils
|
usbutils
|
||||||
coreutils
|
coreutils
|
||||||
|
lshw
|
||||||
|
systemd
|
||||||
|
dmidecode
|
||||||
pciutils
|
pciutils
|
||||||
|
nix-ld
|
||||||
patchelf
|
patchelf
|
||||||
htop
|
htop
|
||||||
] ++
|
];
|
||||||
lib.optionals pkgs.stdenv.isLinux (with pkgs; [
|
|
||||||
systemd
|
|
||||||
lshw
|
|
||||||
dmidecode
|
|
||||||
nix-ld
|
|
||||||
]) ++
|
|
||||||
lib.optionals pkgs.stdenv.isDarwin (with pkgs; [
|
|
||||||
# nothing here, yet ;)
|
|
||||||
]);
|
|
||||||
|
|
||||||
|
# Common environment variables that every system will use
|
||||||
environment.variables.EDITOR = "nvim";
|
environment.variables.EDITOR = "nvim";
|
||||||
}
|
}
|
||||||
|
@@ -1,23 +1,30 @@
|
|||||||
{ lib, pkgs, userName, hostname, ... }:
|
|
||||||
|
|
||||||
{
|
{
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
userName,
|
||||||
|
hostname,
|
||||||
|
...
|
||||||
|
} @ args: {
|
||||||
networking.hostName = hostname;
|
networking.hostName = hostname;
|
||||||
|
|
||||||
users.users."${userName}" = {
|
|
||||||
home = if pkgs.stdenv.isDarwin
|
|
||||||
then "/Users/${userName}"
|
|
||||||
else "/home/${userName}";
|
|
||||||
description = userName;
|
|
||||||
} // lib.optionalAttrs pkgs.stdenv.isLinux {
|
|
||||||
group = "${userName}";
|
|
||||||
isNormalUser = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
users.groups.wyatt = {};
|
|
||||||
nix.settings.trusted-users = [userName];
|
|
||||||
|
|
||||||
security = lib.optionalAttrs pkgs.stdenv.isLinux {
|
# Don't forget to set a password with ‘passwd’!
|
||||||
sudo.extraRules = [
|
users.users."${userName}" = lib.mkMerge [
|
||||||
|
{
|
||||||
|
home =
|
||||||
|
if pkgs.stdenv.isDarwin
|
||||||
|
then "/Users/${userName}"
|
||||||
|
else "/home/${userName}";
|
||||||
|
description = userName;
|
||||||
|
}
|
||||||
|
|
||||||
|
(lib.mkIf (pkgs.stdenv.isLinux) {
|
||||||
|
group = "${userName}";
|
||||||
|
isNormalUser = true;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
|
security.sudo = {
|
||||||
|
extraRules = [
|
||||||
{
|
{
|
||||||
groups = [ "wheel" ];
|
groups = [ "wheel" ];
|
||||||
commands = [
|
commands = [
|
||||||
@@ -30,9 +37,7 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
environment = lib.optionalAttrs pkgs.stdenv.isDarwin {
|
users.groups.wyatt = {};
|
||||||
etc."sudoers.d/wheel-nopasswd".text = ''
|
|
||||||
%wheel ALL=(ALL:ALL) NOPASSWD: SETENV: ALL
|
nix.settings.trusted-users = [userName];
|
||||||
'';
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
@@ -1,84 +0,0 @@
|
|||||||
{
|
|
||||||
pkgs,
|
|
||||||
userName,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
imports = [
|
|
||||||
../../pwrMgmt
|
|
||||||
../../networking/core.nix
|
|
||||||
../../virtualization/podman.nix
|
|
||||||
../../virtualization/quadlet.nix
|
|
||||||
../../virtualization/hardware.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
# Enable flakes for NixOS
|
|
||||||
nix.settings.experimental-features = ["nix-command" "flakes"];
|
|
||||||
|
|
||||||
# Custom kernel/boot stuff
|
|
||||||
boot = {
|
|
||||||
kernelPackages = pkgs.linuxPackages_latest;
|
|
||||||
loader = {
|
|
||||||
systemd-boot.enable = true;
|
|
||||||
efi.canTouchEfiVariables = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Enable Polkit
|
|
||||||
security.polkit.enable = true;
|
|
||||||
|
|
||||||
# Make sure Bluetooth is off!
|
|
||||||
hardware.bluetooth.enable = false;
|
|
||||||
|
|
||||||
# Set your timezone
|
|
||||||
time.timeZone = "America/Detroit";
|
|
||||||
|
|
||||||
# Power management module
|
|
||||||
pwrMgmt = {
|
|
||||||
enable = true;
|
|
||||||
cpuFreqGovernor = "performance";
|
|
||||||
powertop.enable = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Podman module (see ../../virtualization/podman.nix)
|
|
||||||
podman = {
|
|
||||||
enable = true;
|
|
||||||
extraPackages = with pkgs; [
|
|
||||||
docker-credential-helpers
|
|
||||||
toolbox
|
|
||||||
cosign
|
|
||||||
crane
|
|
||||||
podman-tui
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
# Core networking module (see ../../networking/core.nix)
|
|
||||||
network = {
|
|
||||||
firewall.enable = true;
|
|
||||||
networkManager.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs = {
|
|
||||||
# Enable GnuPG
|
|
||||||
gnupg.agent = {
|
|
||||||
enable = true;
|
|
||||||
enableSSHSupport = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Enable SUID wrappers (some programs need them)
|
|
||||||
mtr.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
users.users.${userName}.extraGroups = ["wheel" "video" "podman" "network"];
|
|
||||||
|
|
||||||
services = {
|
|
||||||
# Enable OpenSSH
|
|
||||||
openssh.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Install packages to be installed system-wide
|
|
||||||
environment.systemPackages = with pkgs; [
|
|
||||||
wireguard-tools
|
|
||||||
];
|
|
||||||
|
|
||||||
system.stateVersion = "25.05";
|
|
||||||
}
|
|
@@ -1,6 +0,0 @@
|
|||||||
{...}: {
|
|
||||||
imports = [
|
|
||||||
./configuration.nix
|
|
||||||
./hardware-configuration.nix
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,46 +0,0 @@
|
|||||||
# --- DO NOT USE ---
|
|
||||||
#
|
|
||||||
# this is copied from ../valefor/hardware-configuration.nix
|
|
||||||
# generate a new hardware-configuration.nix before using this!
|
|
||||||
#
|
|
||||||
# ------------------
|
|
||||||
#
|
|
||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
|
||||||
# and may be overwritten by future invocations. Please make changes
|
|
||||||
# to /etc/nixos/configuration.nix instead.
|
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports =
|
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
|
||||||
];
|
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ];
|
|
||||||
boot.initrd.kernelModules = [ ];
|
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
|
||||||
boot.extraModulePackages = [ ];
|
|
||||||
|
|
||||||
fileSystems."/" =
|
|
||||||
{ device = "/dev/disk/by-uuid/ff89bde1-4b33-4277-b649-b92700b2406c";
|
|
||||||
fsType = "xfs";
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/boot" =
|
|
||||||
{ device = "/dev/disk/by-uuid/3A4B-6866";
|
|
||||||
fsType = "vfat";
|
|
||||||
options = [ "fmask=0022" "dmask=0022" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
swapDevices = [ ];
|
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true;
|
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
|
||||||
}
|
|
@@ -1,12 +1,12 @@
|
|||||||
# Power management modules
|
# Power management modules
|
||||||
|
|
||||||
This directory houses my own custom defined power management settings as NixOS modules. These are set in the machine-specific configurations (typically).
|
This directory houses my own custom defined power management settings. These are set in the machine-specific configurations (typically).
|
||||||
|
|
||||||
## Examples
|
## Examples
|
||||||
|
|
||||||
Given that this configuration is in the `machine/<hostname>` directory (where hostname is the name of the computer your configuring):
|
Given that this configuration is in the `machine/<hostname>` directory (where hostname is the name of the computer your configuring):
|
||||||
|
|
||||||
### Desktop/server configuration
|
### Desktop configuration
|
||||||
|
|
||||||
```nix
|
```nix
|
||||||
imports = [
|
imports = [
|
||||||
|
@@ -5,7 +5,7 @@
|
|||||||
}:
|
}:
|
||||||
with lib; {
|
with lib; {
|
||||||
options = {
|
options = {
|
||||||
security.sudoers = {
|
security.sudo = {
|
||||||
needsPassword = mkOption {
|
needsPassword = mkOption {
|
||||||
type = types.bool;
|
type = types.bool;
|
||||||
default = true;
|
default = true;
|
||||||
|
@@ -40,13 +40,7 @@ Example:
|
|||||||
};
|
};
|
||||||
```
|
```
|
||||||
|
|
||||||
To get a full, comprehensive list of what you can do with the podman module, please check out [podman.nix](./podman.nix)!
|
To get a full, comprehensive list of what you can do with the podman module, please check out (podman.nix)[./podman.nix]!
|
||||||
|
|
||||||
### Podman Quadlets
|
|
||||||
|
|
||||||
This is a wrapper around a project called [`quadlet-nix`](https://github.com/SEIAROTg/quadlet-nix), a way of defining systemd services as containers with Nix! Since I have existing services running inside of containers and don't want to risk breaking _everything_ that I have running, I figured this would be a safe, transitionary approach to handle this.
|
|
||||||
|
|
||||||
This is still a work-in-progress, check back soon on progress on this.
|
|
||||||
|
|
||||||
## Kubernetes
|
## Kubernetes
|
||||||
|
|
||||||
|
@@ -1,47 +0,0 @@
|
|||||||
# ----------------------
|
|
||||||
# Wrapper for defining Quadlets in Nix via quadlet-nix
|
|
||||||
#
|
|
||||||
# Still WIP
|
|
||||||
# ----------------------
|
|
||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
cfg = config.quadlet;
|
|
||||||
in {
|
|
||||||
options = {
|
|
||||||
quadlet = {
|
|
||||||
enable = lib.mkEnableOption "Enable Podman's Quadlet systemd integration";
|
|
||||||
|
|
||||||
autoUpdate = {
|
|
||||||
enable = lib.mkEnableOption "Enable the auto update mechanism";
|
|
||||||
|
|
||||||
calendar = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
default = "*-*-* 03:30:00";
|
|
||||||
description = "When the auto update mechanism is triggered, the calendar option will tell the auto update when to start";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
extraPackages = lib.mkOption {
|
|
||||||
type = lib.types.listOf lib.types.package;
|
|
||||||
default = [];
|
|
||||||
description = "Additional container-related packages to install (these likely will be installed with Podman though)";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
virtualisation.quadlet = {
|
|
||||||
enable = true;
|
|
||||||
autoUpdate = {
|
|
||||||
enable = cfg.autoUpdate.enable;
|
|
||||||
calendar = cfg.autoUpdate.calendar;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages = cfg.extraPackages;
|
|
||||||
};
|
|
||||||
}
|
|
Reference in New Issue
Block a user