mirror of
https://github.com/RichieCahill/dotfiles.git
synced 2026-04-21 06:39:09 -04:00
Compare commits
27 Commits
feature/te
...
feature/te
| Author | SHA1 | Date | |
|---|---|---|---|
| 28a48a3889 | |||
| 6d9334d343 | |||
| ecd25820b3 | |||
| 75b19254aa | |||
| 6c760d4f84 | |||
| 9dde857047 | |||
| dea58e0413 | |||
| af71cb796e | |||
| 9869f88a3e | |||
| 2d0c2baee4 | |||
| 436b9e7efd | |||
| 4c22c3e764 | |||
| f887375c8d | |||
| 2d5fbb8555 | |||
| 88fd69ab9f | |||
| 86025d17c4 | |||
| 151e444a07 | |||
| 0f03542255 | |||
| 10277825eb | |||
| c1c0c28a13 | |||
| c72934fb3c | |||
| d99bf1b27b | |||
| 47e01ac591 | |||
| d706ca8fb3 | |||
| 366f7f2a7b | |||
| 5eb99e11a3 | |||
| e88d017014 |
24
.github/workflows/kernel_packages_update.sh
vendored
24
.github/workflows/kernel_packages_update.sh
vendored
@@ -1,24 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
# Update ZFS package to match the latest supported Linux kernel version
|
|
||||||
|
|
||||||
echo "geting latest ZFS version"
|
|
||||||
raw_zfs_max_kernel_version=$(curl -s https://raw.githubusercontent.com/openzfs/zfs/master/META | grep Linux-Maximum | cut -d" " -f2)
|
|
||||||
|
|
||||||
zfs_max_kernel_version="${raw_zfs_max_kernel_version//./_}"
|
|
||||||
|
|
||||||
echo "geting latest ZFS version"
|
|
||||||
|
|
||||||
|
|
||||||
if grep "linuxPackages_$zfs_max_kernel_version" systems/common/global/default.nix; then
|
|
||||||
echo "No changes needed"
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
sed -i "s/linuxPackages_6_[0-9]\+/linuxPackages_$zfs_max_kernel_version/" systems/common/global/default.nix
|
|
||||||
|
|
||||||
# Commit the changes
|
|
||||||
git config user.name "GitHub Actions Bot"
|
|
||||||
git config user.email "<>"
|
|
||||||
git add systems/common/global/default.nix
|
|
||||||
git commit -m "Update Linux kernel and ZFS packages"
|
|
||||||
27
.github/workflows/kernel_packages_update.yml
vendored
27
.github/workflows/kernel_packages_update.yml
vendored
@@ -1,27 +0,0 @@
|
|||||||
name: Kernel Packages Update
|
|
||||||
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
- cron: "0 0 * * *"
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
create-pull-request:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Check out repository
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- name: Make changes
|
|
||||||
run: bash ${GITHUB_WORKSPACE}/.github/workflows/kernel_packages_update.sh
|
|
||||||
|
|
||||||
- name: Create Pull Request
|
|
||||||
uses: peter-evans/create-pull-request@v7
|
|
||||||
with:
|
|
||||||
token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
commit-message: Base linuxPackages update
|
|
||||||
title: Base linuxPackages update
|
|
||||||
body: |
|
|
||||||
Update linuxPackages
|
|
||||||
branch: daily-update
|
|
||||||
delete-branch: true
|
|
||||||
7
.vscode/settings.json
vendored
7
.vscode/settings.json
vendored
@@ -60,6 +60,7 @@
|
|||||||
"extest",
|
"extest",
|
||||||
"fastforwardteam",
|
"fastforwardteam",
|
||||||
"FASTFOX",
|
"FASTFOX",
|
||||||
|
"ffmpegthumbnailer",
|
||||||
"filebot",
|
"filebot",
|
||||||
"filebrowser",
|
"filebrowser",
|
||||||
"fileroller",
|
"fileroller",
|
||||||
@@ -97,6 +98,7 @@
|
|||||||
"isal",
|
"isal",
|
||||||
"jnoortheen",
|
"jnoortheen",
|
||||||
"jsbc",
|
"jsbc",
|
||||||
|
"kagi",
|
||||||
"kuma",
|
"kuma",
|
||||||
"levelname",
|
"levelname",
|
||||||
"libglvnd",
|
"libglvnd",
|
||||||
@@ -122,6 +124,7 @@
|
|||||||
"mountpoints",
|
"mountpoints",
|
||||||
"mousewheel",
|
"mousewheel",
|
||||||
"mtxr",
|
"mtxr",
|
||||||
|
"muninn",
|
||||||
"ncdu",
|
"ncdu",
|
||||||
"nemo",
|
"nemo",
|
||||||
"neofetch",
|
"neofetch",
|
||||||
@@ -158,8 +161,10 @@
|
|||||||
"pipewire",
|
"pipewire",
|
||||||
"pkgs",
|
"pkgs",
|
||||||
"plugdev",
|
"plugdev",
|
||||||
|
"poppler",
|
||||||
"posixacl",
|
"posixacl",
|
||||||
"primarycache",
|
"primarycache",
|
||||||
|
"prismlauncher",
|
||||||
"privatebrowsing",
|
"privatebrowsing",
|
||||||
"PRIVOXY",
|
"PRIVOXY",
|
||||||
"prowlarr",
|
"prowlarr",
|
||||||
@@ -223,6 +228,7 @@
|
|||||||
"uaccess",
|
"uaccess",
|
||||||
"ublock",
|
"ublock",
|
||||||
"uitour",
|
"uitour",
|
||||||
|
"unrar",
|
||||||
"unsubmitted",
|
"unsubmitted",
|
||||||
"urlbar",
|
"urlbar",
|
||||||
"urlclassifier",
|
"urlclassifier",
|
||||||
@@ -241,6 +247,7 @@
|
|||||||
"Workqueues",
|
"Workqueues",
|
||||||
"xattr",
|
"xattr",
|
||||||
"xhci",
|
"xhci",
|
||||||
|
"yazi",
|
||||||
"yubikey",
|
"yubikey",
|
||||||
"yubioath",
|
"yubioath",
|
||||||
"yzhang",
|
"yzhang",
|
||||||
|
|||||||
@@ -2,7 +2,6 @@
|
|||||||
inputs,
|
inputs,
|
||||||
lib,
|
lib,
|
||||||
outputs,
|
outputs,
|
||||||
pkgs,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
@@ -10,6 +9,7 @@
|
|||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
./docker.nix
|
./docker.nix
|
||||||
./fail2ban.nix
|
./fail2ban.nix
|
||||||
|
./fonts.nix
|
||||||
./libs.nix
|
./libs.nix
|
||||||
./locale.nix
|
./locale.nix
|
||||||
./nh.nix
|
./nh.nix
|
||||||
@@ -19,10 +19,7 @@
|
|||||||
./snapshot_manager.nix
|
./snapshot_manager.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot = {
|
boot.tmp.useTmpfs = true;
|
||||||
kernelPackages = lib.mkDefault pkgs.linuxPackages_6_10;
|
|
||||||
tmp.useTmpfs = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
hardware.enableRedistributableFirmware = true;
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
|
||||||
@@ -32,7 +29,12 @@
|
|||||||
extraSpecialArgs = {inherit inputs outputs;};
|
extraSpecialArgs = {inherit inputs outputs;};
|
||||||
};
|
};
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs = {
|
||||||
|
overlays = builtins.attrValues outputs.overlays;
|
||||||
|
config = {
|
||||||
|
allowUnfree = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
programs = {
|
programs = {
|
||||||
zsh.enable = true;
|
zsh.enable = true;
|
||||||
|
|||||||
10
common/global/fonts.nix
Normal file
10
common/global/fonts.nix
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
fonts = {
|
||||||
|
fontconfig.enable = true;
|
||||||
|
enableDefaultPackages = true;
|
||||||
|
packages = with pkgs; [
|
||||||
|
nerdfonts
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,4 +1,9 @@
|
|||||||
|
{ lib, pkgs, ... }:
|
||||||
{
|
{
|
||||||
|
boot = {
|
||||||
|
kernelPackages = lib.mkDefault pkgs.master.linuxPackages_zen;
|
||||||
|
zfs.package = pkgs.master.zfs_unstable;
|
||||||
|
};
|
||||||
services = {
|
services = {
|
||||||
desktopManager.plasma6.enable = true;
|
desktopManager.plasma6.enable = true;
|
||||||
xserver = {
|
xserver = {
|
||||||
|
|||||||
71
flake.lock
generated
71
flake.lock
generated
@@ -9,11 +9,11 @@
|
|||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"dir": "pkgs/firefox-addons",
|
"dir": "pkgs/firefox-addons",
|
||||||
"lastModified": 1729414746,
|
"lastModified": 1730520198,
|
||||||
"narHash": "sha256-B7wGWFjIL6/BllPaTXyp31srxG7+4I0hlsBkL6S8pIM=",
|
"narHash": "sha256-0G4QIsCmQyfwdWUws7UDZQYcCn5l9m42AE9c3Ak0+DY=",
|
||||||
"owner": "rycee",
|
"owner": "rycee",
|
||||||
"repo": "nur-expressions",
|
"repo": "nur-expressions",
|
||||||
"rev": "7bd3068e495e1f430e1a640b5f9ee683e4e5e616",
|
"rev": "ca0f5e3fd8a37605a6960fee549f6b79d3f83c28",
|
||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -79,11 +79,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729414726,
|
"lastModified": 1730490306,
|
||||||
"narHash": "sha256-Dtmm1OU8Ymiy9hVWn/a2B8DhRYo9Eoyx9veERdOBR4o=",
|
"narHash": "sha256-AvCVDswOUM9D368HxYD25RsSKp+5o0L0/JHADjLoD38=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "fe56302339bb28e3471632379d733547caec8103",
|
"rev": "1743615b61c7285976f85b303a36cdf88a556503",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -124,11 +124,11 @@
|
|||||||
"rust-overlay": "rust-overlay"
|
"rust-overlay": "rust-overlay"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729388162,
|
"lastModified": 1730511796,
|
||||||
"narHash": "sha256-ARCVRKnANfAb1iwGVpNOujXTXsTdyHz80ocFxjpswv8=",
|
"narHash": "sha256-+ZBaUiJWig7LumIKi1fOExUke8XubkKJUlcrEa+UN+M=",
|
||||||
"owner": "lilyinstarlight",
|
"owner": "lilyinstarlight",
|
||||||
"repo": "nixos-cosmic",
|
"repo": "nixos-cosmic",
|
||||||
"rev": "1bfff37ff0178721ff4c0a7ed2fb39689b8db796",
|
"rev": "1d5a818e3b5188f6aa106eed5f66e454787c5d70",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -139,11 +139,11 @@
|
|||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729417461,
|
"lastModified": 1730537918,
|
||||||
"narHash": "sha256-p0j/sUs7noqZw0W+SEuZXskzOfgOH7yY80ksIM0fCi4=",
|
"narHash": "sha256-GJB1/aaTnAtt9sso/EQ77TAGJ/rt6uvlP0RqZFnWue8=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "8f38d8a4754cf673c2609c4ed399630db87e678b",
|
"rev": "f6e0cd5c47d150c4718199084e5764f968f1b560",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -155,11 +155,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729256560,
|
"lastModified": 1730200266,
|
||||||
"narHash": "sha256-/uilDXvCIEs3C9l73JTACm4quuHUsIHcns1c+cHUJwA=",
|
"narHash": "sha256-l253w0XMT8nWHGXuXqyiIC/bMvh1VRszGXgdpQlfhvU=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "4c2fcb090b1f3e5b47eaa7bd33913b574a11e0a0",
|
"rev": "807e9154dcb16384b1b765ebe9cd2bba2ac287fd",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -169,13 +169,29 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixpkgs-master": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1730587346,
|
||||||
|
"narHash": "sha256-YAzfNPNFtztrOYe1Nhi6cTiT7kedRwmlfpijA9T2uuk=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "a8ffc2295c358629bc1bda569bf8b3bbb21aa1be",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "master",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixpkgs-stable": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729181673,
|
"lastModified": 1730327045,
|
||||||
"narHash": "sha256-LDiPhQ3l+fBjRATNtnuDZsBS7hqoBtPkKBkhpoBHv3I=",
|
"narHash": "sha256-xKel5kd1AbExymxoIfQ7pgcX6hjw9jCgbiBjiUfSVJ8=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "4eb33fe664af7b41a4c446f87d20c9a0a6321fa3",
|
"rev": "080166c15633801df010977d9d7474b4a6c549d7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -187,11 +203,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-stable_2": {
|
"nixpkgs-stable_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729181673,
|
"lastModified": 1730327045,
|
||||||
"narHash": "sha256-LDiPhQ3l+fBjRATNtnuDZsBS7hqoBtPkKBkhpoBHv3I=",
|
"narHash": "sha256-xKel5kd1AbExymxoIfQ7pgcX6hjw9jCgbiBjiUfSVJ8=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "4eb33fe664af7b41a4c446f87d20c9a0a6321fa3",
|
"rev": "080166c15633801df010977d9d7474b4a6c549d7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -236,6 +252,7 @@
|
|||||||
"nixos-cosmic": "nixos-cosmic",
|
"nixos-cosmic": "nixos-cosmic",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
|
"nixpkgs-master": "nixpkgs-master",
|
||||||
"nixpkgs-stable": "nixpkgs-stable_2",
|
"nixpkgs-stable": "nixpkgs-stable_2",
|
||||||
"system_tools": "system_tools",
|
"system_tools": "system_tools",
|
||||||
"systems": "systems_3"
|
"systems": "systems_3"
|
||||||
@@ -249,11 +266,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729304879,
|
"lastModified": 1730428392,
|
||||||
"narHash": "sha256-H7KGGJUU9BcDNnfXiATBGgs6FJKWQdfftNJS+/v2aMU=",
|
"narHash": "sha256-2aRfq1P0usr+TlW9LUCoefqqpPum873ac0TgZzXYHKI=",
|
||||||
"owner": "oxalica",
|
"owner": "oxalica",
|
||||||
"repo": "rust-overlay",
|
"repo": "rust-overlay",
|
||||||
"rev": "b259ef799b5ac014604da71ecd92d4a52603ed2d",
|
"rev": "17eda17f5596a84e92ba94160139eb70f3c3e734",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -271,11 +288,11 @@
|
|||||||
"poetry2nix": "poetry2nix"
|
"poetry2nix": "poetry2nix"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729435836,
|
"lastModified": 1729617389,
|
||||||
"narHash": "sha256-wDhbznFihvVh8sm93HUAeFDw0t8hoe9RGEyWBMkB4yw=",
|
"narHash": "sha256-Q05Nhw84FprGiuQHd1ahOhKKIbxzp1rpeCqddjXUSVM=",
|
||||||
"owner": "RichieCahill",
|
"owner": "RichieCahill",
|
||||||
"repo": "system_tools",
|
"repo": "system_tools",
|
||||||
"rev": "84f9ef479e6561fe1daac304cddf195303d855dc",
|
"rev": "2a2aa711fcf67ed5e4db484e507a4a511b9b4230",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
@@ -18,6 +18,7 @@
|
|||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.05";
|
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.05";
|
||||||
|
nixpkgs-master.url = "github:nixos/nixpkgs/master";
|
||||||
systems.url = "github:nix-systems/default-linux";
|
systems.url = "github:nix-systems/default-linux";
|
||||||
|
|
||||||
nixos-hardware.url = "github:nixos/nixos-hardware/master";
|
nixos-hardware.url = "github:nixos/nixos-hardware/master";
|
||||||
@@ -81,6 +82,10 @@
|
|||||||
modules = [./systems/rhapsody-in-green];
|
modules = [./systems/rhapsody-in-green];
|
||||||
specialArgs = {inherit inputs outputs;};
|
specialArgs = {inherit inputs outputs;};
|
||||||
};
|
};
|
||||||
|
muninn = lib.nixosSystem {
|
||||||
|
modules = [./systems/muninn];
|
||||||
|
specialArgs = {inherit inputs outputs;};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,4 +6,11 @@
|
|||||||
config.allowUnfree = true;
|
config.allowUnfree = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
# When applied, the master nixpkgs set (declared in the flake inputs) will be accessible through 'pkgs.master'
|
||||||
|
master = final: _prev: {
|
||||||
|
master = import inputs.nixpkgs-master {
|
||||||
|
system = final.system;
|
||||||
|
config.allowUnfree = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,8 +16,9 @@
|
|||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "bob";
|
hostName = "bob";
|
||||||
networkmanager.enable = true;
|
|
||||||
hostId = "7c678a41";
|
hostId = "7c678a41";
|
||||||
|
firewall.enable = true;
|
||||||
|
networkmanager.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
hardware = {
|
hardware = {
|
||||||
|
|||||||
@@ -24,17 +24,29 @@ in
|
|||||||
"torrenting"
|
"torrenting"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ 7654 ];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
openssh.ports = [ 629 ];
|
openssh.ports = [ 629 ];
|
||||||
|
|
||||||
nix-serve = {
|
nix-serve = {
|
||||||
enable = true;
|
enable = true;
|
||||||
secretKeyFile = "${vars.storage_secrets}/services/nix-cache/cache-priv-key.pem";
|
secretKeyFile = "${vars.storage_secrets}/services/nix-cache/cache-priv-key.pem";
|
||||||
|
openFirewall = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
plex = {
|
plex = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dataDir = vars.media_plex;
|
dataDir = vars.media_plex;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
tang = {
|
||||||
|
enable = true;
|
||||||
|
ipAddressAllow = [
|
||||||
|
"192.168.98.1/24"
|
||||||
|
"192.168.95.1/24"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
smartd.enable = true;
|
smartd.enable = true;
|
||||||
|
|||||||
19
systems/jeeves/docker/audiobookshelf.nix
Normal file
19
systems/jeeves/docker/audiobookshelf.nix
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
virtualisation.oci-containers.containers.audiobookshelf = {
|
||||||
|
image = "ghcr.io/advplyr/audiobookshelf:latest";
|
||||||
|
volumes = [
|
||||||
|
"${vars.media_docker_configs}/audiobookshelf:/config"
|
||||||
|
"${vars.media_docker_configs}/audiobookshelf:/metadata"
|
||||||
|
"${vars.storage_library}/audiobooks:/audiobooks"
|
||||||
|
"${vars.storage_library}/books:/books"
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
TZ = "America/New_York";
|
||||||
|
};
|
||||||
|
extraOptions = [ "--network=web" ];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
12
systems/jeeves/docker/grafana.nix
Normal file
12
systems/jeeves/docker/grafana.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
virtualisation.oci-containers.containers.grafana = {
|
||||||
|
image = "grafana/grafana-enterprise:latest";
|
||||||
|
volumes = [ "${vars.media_docker_configs}/grafana:/var/lib/grafana" ];
|
||||||
|
user = "600:600";
|
||||||
|
extraOptions = [ "--network=web" ];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -30,6 +30,7 @@ frontend ContentSwitching
|
|||||||
acl host_filebrowser hdr(host) -i filebrowser.tmmworkshop.com
|
acl host_filebrowser hdr(host) -i filebrowser.tmmworkshop.com
|
||||||
acl host_grafana hdr(host) -i grafana.tmmworkshop.com
|
acl host_grafana hdr(host) -i grafana.tmmworkshop.com
|
||||||
acl host_mirror hdr(host) -i mirror.tmmworkshop.com
|
acl host_mirror hdr(host) -i mirror.tmmworkshop.com
|
||||||
|
acl host_photoprism hdr(host) -i photoprism.tmmworkshop.com
|
||||||
acl host_uptime_kuma hdr(host) -i uptimekuma-jeeves.tmmworkshop.com
|
acl host_uptime_kuma hdr(host) -i uptimekuma-jeeves.tmmworkshop.com
|
||||||
|
|
||||||
use_backend audiobookshelf_nodes if host_audiobookshelf
|
use_backend audiobookshelf_nodes if host_audiobookshelf
|
||||||
@@ -37,15 +38,16 @@ frontend ContentSwitching
|
|||||||
use_backend filebrowser_nodes if host_filebrowser
|
use_backend filebrowser_nodes if host_filebrowser
|
||||||
use_backend grafana_nodes if host_grafana
|
use_backend grafana_nodes if host_grafana
|
||||||
use_backend mirror_nodes if host_mirror
|
use_backend mirror_nodes if host_mirror
|
||||||
|
use_backend photoprism_nodes if host_photoprism
|
||||||
use_backend uptime_kuma_nodes if host_uptime_kuma
|
use_backend uptime_kuma_nodes if host_uptime_kuma
|
||||||
|
|
||||||
backend mirror_nodes
|
backend audiobookshelf_nodes
|
||||||
mode http
|
mode http
|
||||||
server server arch_mirror:80
|
server server audiobookshelf:80
|
||||||
|
|
||||||
backend mirror_rsync
|
backend cache_nodes
|
||||||
mode http
|
mode http
|
||||||
server server arch_mirror:873
|
server server 192.168.90.40:5000
|
||||||
|
|
||||||
backend grafana_nodes
|
backend grafana_nodes
|
||||||
mode http
|
mode http
|
||||||
@@ -55,14 +57,15 @@ backend filebrowser_nodes
|
|||||||
mode http
|
mode http
|
||||||
server server filebrowser:8080
|
server server filebrowser:8080
|
||||||
|
|
||||||
|
backend mirror_nodes
|
||||||
|
mode http
|
||||||
|
server server arch_mirror:80
|
||||||
|
|
||||||
|
backend photoprism_nodes
|
||||||
|
mode http
|
||||||
|
server server photoprism:2342
|
||||||
|
|
||||||
backend uptime_kuma_nodes
|
backend uptime_kuma_nodes
|
||||||
mode http
|
mode http
|
||||||
server server uptime_kuma:3001
|
server server uptime_kuma:3001
|
||||||
|
|
||||||
backend cache_nodes
|
|
||||||
mode http
|
|
||||||
server server 192.168.90.40:5000
|
|
||||||
|
|
||||||
backend audiobookshelf_nodes
|
|
||||||
mode http
|
|
||||||
server server audiobookshelf:80
|
|
||||||
|
|||||||
@@ -1,85 +0,0 @@
|
|||||||
let
|
|
||||||
vars = import ../vars.nix;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
qbit = {
|
|
||||||
image = "ghcr.io/linuxserver/qbittorrent:latest";
|
|
||||||
ports = [
|
|
||||||
"6881:6881"
|
|
||||||
"6881:6881/udp"
|
|
||||||
"8082:8082"
|
|
||||||
"29432:29432"
|
|
||||||
];
|
|
||||||
volumes = [
|
|
||||||
"${vars.media_docker_configs}/qbit:/config"
|
|
||||||
"${vars.torrenting_qbit}:/data"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
PUID = "600";
|
|
||||||
PGID = "100";
|
|
||||||
TZ = "America/New_York";
|
|
||||||
WEBUI_PORT = "8082";
|
|
||||||
};
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
qbitvpn = {
|
|
||||||
image = "binhex/arch-qbittorrentvpn:latest";
|
|
||||||
extraOptions = [ "--cap-add=NET_ADMIN" ];
|
|
||||||
ports = [
|
|
||||||
"6882:6881"
|
|
||||||
"6882:6881/udp"
|
|
||||||
"8081:8081"
|
|
||||||
"8118:8118"
|
|
||||||
];
|
|
||||||
volumes = [
|
|
||||||
"${vars.media_docker_configs}/qbitvpn:/config"
|
|
||||||
"${vars.torrenting_qbitvpn}:/data"
|
|
||||||
"/etc/localtime:/etc/localtime:ro"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
WEBUI_PORT = "8081";
|
|
||||||
PUID = "600";
|
|
||||||
PGID = "100";
|
|
||||||
VPN_ENABLED = "yes";
|
|
||||||
VPN_CLIENT = "openvpn";
|
|
||||||
STRICT_PORT_FORWARD = "yes";
|
|
||||||
ENABLE_PRIVOXY = "yes";
|
|
||||||
LAN_NETWORK = "192.168.90.0/24";
|
|
||||||
NAME_SERVERS = "1.1.1.1,1.0.0.1";
|
|
||||||
UMASK = "000";
|
|
||||||
DEBUG = "false";
|
|
||||||
DELUGE_DAEMON_LOG_LEVEL = "debug";
|
|
||||||
DELUGE_WEB_LOG_LEVEL = "debug";
|
|
||||||
};
|
|
||||||
environmentFiles = ["${vars.storage_secrets}/docker/qbitvpn"];
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
prowlarr = {
|
|
||||||
image = "ghcr.io/linuxserver/prowlarr:latest";
|
|
||||||
ports = [ "9696:9696" ];
|
|
||||||
environment = {
|
|
||||||
PUID = "600";
|
|
||||||
PGID = "100";
|
|
||||||
TZ = "America/New_York";
|
|
||||||
};
|
|
||||||
volumes = [ "${vars.media_docker_configs}/prowlarr:/config" ];
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
sonarr = {
|
|
||||||
image = "ghcr.io/linuxserver/sonarr:latest";
|
|
||||||
ports = [ "8989:8989" ];
|
|
||||||
environment = {
|
|
||||||
PUID = "600";
|
|
||||||
PGID = "100";
|
|
||||||
TZ = "America/New_York";
|
|
||||||
};
|
|
||||||
volumes = [
|
|
||||||
"${vars.media_docker_configs}/sonarr:/config"
|
|
||||||
"${vars.storage_plex}/tv:/tv"
|
|
||||||
"${vars.torrenting_qbitvpn}:/data"
|
|
||||||
];
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -2,12 +2,8 @@ let
|
|||||||
vars = import ../vars.nix;
|
vars = import ../vars.nix;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
virtualisation.oci-containers.containers.photoprism = {
|
||||||
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
photoprism = {
|
|
||||||
image = "photoprism/photoprism:latest";
|
image = "photoprism/photoprism:latest";
|
||||||
ports = [ "2342:2342" ];
|
|
||||||
volumes = [
|
volumes = [
|
||||||
"${vars.media_docker_configs}/photoprism:/photoprism/storage"
|
"${vars.media_docker_configs}/photoprism:/photoprism/storage"
|
||||||
"${vars.storage_photos}/originals:/photoprism/originals"
|
"${vars.storage_photos}/originals:/photoprism/originals"
|
||||||
@@ -41,10 +37,7 @@ in
|
|||||||
PHOTOPRISM_AUTO_IMPORT= "-1";
|
PHOTOPRISM_AUTO_IMPORT= "-1";
|
||||||
PHOTOPRISM_DETECT_NSFW="false";
|
PHOTOPRISM_DETECT_NSFW="false";
|
||||||
PHOTOPRISM_UPLOAD_NSFW="true";
|
PHOTOPRISM_UPLOAD_NSFW="true";
|
||||||
PHOTOPRISM_DATABASE_DRIVER="mysql";
|
PHOTOPRISM_DATABASE_DRIVER="sqlite";
|
||||||
PHOTOPRISM_DATABASE_SERVER="photoprism_mariadb:3306";
|
|
||||||
PHOTOPRISM_DATABASE_NAME="photoprism";
|
|
||||||
PHOTOPRISM_DATABASE_USER="photoprism";
|
|
||||||
PHOTOPRISM_SITE_CAPTION="AI-Powered Photos App";
|
PHOTOPRISM_SITE_CAPTION="AI-Powered Photos App";
|
||||||
PHOTOPRISM_SITE_DESCRIPTION="";
|
PHOTOPRISM_SITE_DESCRIPTION="";
|
||||||
PHOTOPRISM_SITE_AUTHOR="";
|
PHOTOPRISM_SITE_AUTHOR="";
|
||||||
@@ -54,23 +47,7 @@ in
|
|||||||
};
|
};
|
||||||
environmentFiles = ["${vars.storage_secrets}/docker/photoprism"];
|
environmentFiles = ["${vars.storage_secrets}/docker/photoprism"];
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
dependsOn = [ "photoprism_mariadb" ];
|
|
||||||
extraOptions = [ "--network=web" ];
|
extraOptions = [ "--network=web" ];
|
||||||
};
|
};
|
||||||
photoprism_mariadb = {
|
|
||||||
image = "mariadb:11";
|
|
||||||
volumes = [ "${vars.media_database}/photoprism_mariadb:/var/lib/photoprism_mariadb" ];
|
|
||||||
environment = {
|
|
||||||
MARIADB_AUTO_UPGRADE = "1";
|
|
||||||
MARIADB_INITDB_SKIP_TZINFO = "1";
|
|
||||||
MARIADB_DATABASE = "photoprism";
|
|
||||||
MARIADB_USER = "photoprism";
|
|
||||||
};
|
|
||||||
environmentFiles = ["${vars.storage_secrets}/docker/photoprism"];
|
|
||||||
cmd = [ "--innodb-buffer-pool-size=512M" "--transaction-isolation=READ-COMMITTED" "--character-set-server=utf8mb4" "--collation-server=utf8mb4_unicode_ci" "--max-connections=512" "--innodb-rollback-on-timeout=OFF" "--innodb-lock-wait-timeout=120" ];
|
|
||||||
autoStart = true;
|
|
||||||
extraOptions = [ "--network=web" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
17
systems/jeeves/docker/prowlarr.nix
Normal file
17
systems/jeeves/docker/prowlarr.nix
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
networking.firewall.allowedTCPPorts = [ 9696 ];
|
||||||
|
virtualisation.oci-containers.containers.prowlarr = {
|
||||||
|
image = "ghcr.io/linuxserver/prowlarr:latest";
|
||||||
|
ports = [ "9696:9696" ];
|
||||||
|
environment = {
|
||||||
|
PUID = "600";
|
||||||
|
PGID = "100";
|
||||||
|
TZ = "America/New_York";
|
||||||
|
};
|
||||||
|
volumes = [ "${vars.media_docker_configs}/prowlarr:/config" ];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
29
systems/jeeves/docker/qbit.nix
Normal file
29
systems/jeeves/docker/qbit.nix
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
networking.firewall = {
|
||||||
|
allowedTCPPorts = [ 6881 8082 29432 ];
|
||||||
|
allowedUDPPorts = [ 6881 ];
|
||||||
|
};
|
||||||
|
virtualisation.oci-containers.containers.qbit = {
|
||||||
|
image = "ghcr.io/linuxserver/qbittorrent:latest";
|
||||||
|
ports = [
|
||||||
|
"6881:6881"
|
||||||
|
"6881:6881/udp"
|
||||||
|
"8082:8082"
|
||||||
|
"29432:29432"
|
||||||
|
];
|
||||||
|
volumes = [
|
||||||
|
"${vars.media_docker_configs}/qbit:/config"
|
||||||
|
"${vars.torrenting_qbit}:/data"
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
PUID = "600";
|
||||||
|
PGID = "100";
|
||||||
|
TZ = "America/New_York";
|
||||||
|
WEBUI_PORT = "8082";
|
||||||
|
};
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
41
systems/jeeves/docker/qbitvpn.nix
Normal file
41
systems/jeeves/docker/qbitvpn.nix
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
networking.firewall = {
|
||||||
|
allowedTCPPorts = [ 6882 8081 8118 ];
|
||||||
|
allowedUDPPorts = [ 6882 ];
|
||||||
|
};
|
||||||
|
virtualisation.oci-containers.containers.qbitvpn = {
|
||||||
|
image = "binhex/arch-qbittorrentvpn:latest";
|
||||||
|
extraOptions = [ "--cap-add=NET_ADMIN" ];
|
||||||
|
ports = [
|
||||||
|
"6882:6881"
|
||||||
|
"6882:6881/udp"
|
||||||
|
"8081:8081"
|
||||||
|
"8118:8118"
|
||||||
|
];
|
||||||
|
volumes = [
|
||||||
|
"${vars.media_docker_configs}/qbitvpn:/config"
|
||||||
|
"${vars.torrenting_qbitvpn}:/data"
|
||||||
|
"/etc/localtime:/etc/localtime:ro"
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
WEBUI_PORT = "8081";
|
||||||
|
PUID = "600";
|
||||||
|
PGID = "100";
|
||||||
|
VPN_ENABLED = "yes";
|
||||||
|
VPN_CLIENT = "openvpn";
|
||||||
|
STRICT_PORT_FORWARD = "yes";
|
||||||
|
ENABLE_PRIVOXY = "yes";
|
||||||
|
LAN_NETWORK = "192.168.90.0/24";
|
||||||
|
NAME_SERVERS = "1.1.1.1,1.0.0.1";
|
||||||
|
UMASK = "000";
|
||||||
|
DEBUG = "false";
|
||||||
|
DELUGE_DAEMON_LOG_LEVEL = "debug";
|
||||||
|
DELUGE_WEB_LOG_LEVEL = "debug";
|
||||||
|
};
|
||||||
|
environmentFiles = ["${vars.storage_secrets}/docker/qbitvpn"];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -3,28 +3,6 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
audiobookshelf = {
|
|
||||||
image = "ghcr.io/advplyr/audiobookshelf:latest";
|
|
||||||
ports = [ "13378:80" ];
|
|
||||||
volumes = [
|
|
||||||
"${vars.media_docker_configs}/audiobookshelf:/config"
|
|
||||||
"${vars.media_docker_configs}/audiobookshelf:/metadata"
|
|
||||||
"${vars.storage_library}/audiobooks:/audiobooks"
|
|
||||||
"${vars.storage_library}/books:/books"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
TZ = "America/New_York";
|
|
||||||
};
|
|
||||||
extraOptions = [ "--network=web" ];
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
grafana = {
|
|
||||||
image = "grafana/grafana-enterprise:latest";
|
|
||||||
volumes = [ "${vars.media_docker_configs}/grafana:/var/lib/grafana" ];
|
|
||||||
user = "600:600";
|
|
||||||
extraOptions = [ "--network=web" ];
|
|
||||||
autoStart = true;
|
|
||||||
};
|
|
||||||
haproxy = {
|
haproxy = {
|
||||||
image = "haproxy:latest";
|
image = "haproxy:latest";
|
||||||
user = "600:600";
|
user = "600:600";
|
||||||
@@ -40,6 +18,7 @@ in
|
|||||||
"audiobookshelf"
|
"audiobookshelf"
|
||||||
"filebrowser"
|
"filebrowser"
|
||||||
"grafana"
|
"grafana"
|
||||||
|
"photoprism"
|
||||||
"uptime_kuma"
|
"uptime_kuma"
|
||||||
];
|
];
|
||||||
extraOptions = [ "--network=web" ];
|
extraOptions = [ "--network=web" ];
|
||||||
21
systems/jeeves/docker/sonarr.nix
Normal file
21
systems/jeeves/docker/sonarr.nix
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
let
|
||||||
|
vars = import ../vars.nix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
networking.firewall.allowedTCPPorts = [ 9696 8989 ];
|
||||||
|
virtualisation.oci-containers.containers.sonarr = {
|
||||||
|
image = "ghcr.io/linuxserver/sonarr:latest";
|
||||||
|
ports = [ "8989:8989" ];
|
||||||
|
environment = {
|
||||||
|
PUID = "600";
|
||||||
|
PGID = "100";
|
||||||
|
TZ = "America/New_York";
|
||||||
|
};
|
||||||
|
volumes = [
|
||||||
|
"${vars.media_docker_configs}/sonarr:/config"
|
||||||
|
"${vars.storage_plex}/tv:/tv"
|
||||||
|
"${vars.torrenting_qbitvpn}:/data"
|
||||||
|
];
|
||||||
|
autoStart = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -2,7 +2,7 @@
|
|||||||
networking = {
|
networking = {
|
||||||
hostName = "jeeves";
|
hostName = "jeeves";
|
||||||
hostId = "0e15ce35";
|
hostId = "0e15ce35";
|
||||||
firewall.enable = false;
|
firewall.enable = true;
|
||||||
useNetworkd = true;
|
useNetworkd = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -3,16 +3,16 @@
|
|||||||
# zpools
|
# zpools
|
||||||
|
|
||||||
# media
|
# media
|
||||||
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O zstd -m /zfs/media media mirror
|
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O compression=zstd -m /zfs/media media mirror
|
||||||
sudo zpool add media -o ashift=12 special mirror
|
sudo zpool add media -o ashift=12 special mirror
|
||||||
|
|
||||||
# storage
|
# storage
|
||||||
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O zstd -m /zfs/storage storage
|
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O compression=zstd -m /zfs/storage storage
|
||||||
sudo zpool add storage -o ashift=12 special mirror
|
sudo zpool add storage -o ashift=12 special mirror
|
||||||
sudo zpool add storage -o ashift=12 logs mirror
|
sudo zpool add storage -o ashift=12 logs mirror
|
||||||
|
|
||||||
# torrenting
|
# torrenting
|
||||||
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O zstd -m /zfs/torrenting torrenting
|
sudo zpool create -o ashift=12 -O acltype=posixacl -O atime=off -O dnodesize=auto -O xattr=sa -O compression=zstd -m /zfs/torrenting torrenting
|
||||||
sudo zpool add torrenting -o ashift=12 special
|
sudo zpool add torrenting -o ashift=12 special
|
||||||
|
|
||||||
# media datasets
|
# media datasets
|
||||||
52
systems/muninn/default.nix
Normal file
52
systems/muninn/default.nix
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
{
|
||||||
|
imports = [
|
||||||
|
../../users/richie
|
||||||
|
../../common/global
|
||||||
|
../../common/optional/desktop.nix
|
||||||
|
../../common/optional/steam.nix
|
||||||
|
../../common/optional/systemd-boot.nix
|
||||||
|
./hardware.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
hostName = "muninn";
|
||||||
|
hostId = "a43179c5";
|
||||||
|
firewall.enable = true;
|
||||||
|
networkmanager.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
hardware = {
|
||||||
|
pulseaudio.enable = false;
|
||||||
|
bluetooth = {
|
||||||
|
enable = true;
|
||||||
|
powerOnBoot = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
security.rtkit.enable = true;
|
||||||
|
|
||||||
|
services = {
|
||||||
|
|
||||||
|
displayManager.sddm.enable = true;
|
||||||
|
|
||||||
|
openssh.ports = [ 262 ];
|
||||||
|
|
||||||
|
printing.enable = true;
|
||||||
|
|
||||||
|
pipewire = {
|
||||||
|
enable = true;
|
||||||
|
alsa.enable = true;
|
||||||
|
alsa.support32Bit = true;
|
||||||
|
pulse.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
snapshot_manager.enable = true;
|
||||||
|
|
||||||
|
zfs = {
|
||||||
|
trim.enable = true;
|
||||||
|
autoScrub.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = "24.05";
|
||||||
|
}
|
||||||
61
systems/muninn/hardware.nix
Normal file
61
systems/muninn/hardware.nix
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
{ config, lib, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||||
|
|
||||||
|
boot = {
|
||||||
|
initrd = {
|
||||||
|
availableKernelModules = [
|
||||||
|
"nvme"
|
||||||
|
"xhci_pci"
|
||||||
|
"thunderbolt"
|
||||||
|
"usb_storage"
|
||||||
|
"sd_mod"
|
||||||
|
];
|
||||||
|
kernelModules = [ ];
|
||||||
|
luks.devices."luks-root-pool-nvme-INTEL_SSDPEKKW256G7_BTPY63820XBH256D-part2" = {
|
||||||
|
device = "/dev/disk/by-id/nvme-INTEL_SSDPEKKW256G7_BTPY63820XBH256D-part2";
|
||||||
|
bypassWorkqueues = true;
|
||||||
|
allowDiscards = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
kernelModules = [ "kvm-intel" ];
|
||||||
|
extraModulePackages = [ ];
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems = {
|
||||||
|
"/" = lib.mkDefault {
|
||||||
|
device = "root_pool/root";
|
||||||
|
fsType = "zfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
"/home" = {
|
||||||
|
device = "root_pool/home";
|
||||||
|
fsType = "zfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
"/nix" = {
|
||||||
|
device = "root_pool/nix";
|
||||||
|
fsType = "zfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
"/var" = {
|
||||||
|
device = "root_pool/var";
|
||||||
|
fsType = "zfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
"/boot" = {
|
||||||
|
device = "/dev/disk/by-uuid/12CE-A600";
|
||||||
|
fsType = "vfat";
|
||||||
|
options = [
|
||||||
|
"fmask=0077"
|
||||||
|
"dmask=0077"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices = [ ];
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
}
|
||||||
@@ -15,8 +15,9 @@
|
|||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "rhapsody-in-green";
|
hostName = "rhapsody-in-green";
|
||||||
networkmanager.enable = true;
|
|
||||||
hostId = "6404140d";
|
hostId = "6404140d";
|
||||||
|
firewall.enable = true;
|
||||||
|
networkmanager.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
hardware = {
|
hardware = {
|
||||||
|
|||||||
@@ -110,7 +110,6 @@ def create_zfs_pool(pool_disks: Sequence[str], mnt_dir: str) -> None:
|
|||||||
"-O relatime=on "
|
"-O relatime=on "
|
||||||
"-O xattr=sa "
|
"-O xattr=sa "
|
||||||
"-O mountpoint=none "
|
"-O mountpoint=none "
|
||||||
"-O primarycache=metadata "
|
|
||||||
"root_pool "
|
"root_pool "
|
||||||
)
|
)
|
||||||
if len(pool_disks) == 1:
|
if len(pool_disks) == 1:
|
||||||
@@ -1,8 +1,8 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
./direnv.nix
|
||||||
./git.nix
|
./git.nix
|
||||||
./zsh.nix
|
./zsh.nix
|
||||||
./direnv.nix
|
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.starship.enable = true;
|
programs.starship.enable = true;
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./firefox.nix
|
./firefox
|
||||||
./vscode
|
./vscode
|
||||||
];
|
];
|
||||||
|
|
||||||
@@ -15,6 +15,7 @@
|
|||||||
nemo-fileroller
|
nemo-fileroller
|
||||||
obs-studio
|
obs-studio
|
||||||
obsidian
|
obsidian
|
||||||
|
prismlauncher
|
||||||
proxychains
|
proxychains
|
||||||
prusa-slicer
|
prusa-slicer
|
||||||
signal-desktop
|
signal-desktop
|
||||||
|
|||||||
@@ -1,9 +1,7 @@
|
|||||||
|
{ inputs, ... }:
|
||||||
{
|
{
|
||||||
pkgs,
|
imports = [ ./search_engines.nix ];
|
||||||
inputs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
|
||||||
programs.firefox = {
|
programs.firefox = {
|
||||||
enable = true;
|
enable = true;
|
||||||
profiles.richie = {
|
profiles.richie = {
|
||||||
@@ -16,55 +14,11 @@
|
|||||||
sponsorblock
|
sponsorblock
|
||||||
ublock-origin
|
ublock-origin
|
||||||
];
|
];
|
||||||
search.engines = {
|
search = {
|
||||||
"Nix Options" = {
|
force = true;
|
||||||
urls = [
|
default = "kagi";
|
||||||
{
|
order = [ "kagi" "DuckDuckGo" "Google" ];
|
||||||
template = "https://search.nixos.org/options";
|
|
||||||
params = [
|
|
||||||
{
|
|
||||||
name = "type";
|
|
||||||
value = "packages";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "channel";
|
|
||||||
value = "unstable";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "query";
|
|
||||||
value = "{searchTerms}";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
|
|
||||||
definedAliases = [ "@o" ];
|
|
||||||
};
|
};
|
||||||
"Nix Packages" = {
|
|
||||||
urls = [
|
|
||||||
{
|
|
||||||
template = "https://search.nixos.org/packages";
|
|
||||||
params = [
|
|
||||||
{
|
|
||||||
name = "type";
|
|
||||||
value = "packages";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "channel";
|
|
||||||
value = "unstable";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "query";
|
|
||||||
value = "{searchTerms}";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
|
|
||||||
definedAliases = [ "@n" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
search.force = true;
|
|
||||||
settings = {
|
settings = {
|
||||||
# SECTION: FASTFOX
|
# SECTION: FASTFOX
|
||||||
# GENERAL
|
# GENERAL
|
||||||
BIN
users/richie/home/gui/firefox/kagi.png
Normal file
BIN
users/richie/home/gui/firefox/kagi.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 924 B |
65
users/richie/home/gui/firefox/search_engines.nix
Normal file
65
users/richie/home/gui/firefox/search_engines.nix
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
programs.firefox.profiles.richie.search.engines = {
|
||||||
|
"Nix Options" = {
|
||||||
|
urls = [
|
||||||
|
{
|
||||||
|
template = "https://search.nixos.org/options";
|
||||||
|
params = [
|
||||||
|
{
|
||||||
|
name = "type";
|
||||||
|
value = "packages";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "channel";
|
||||||
|
value = "unstable";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "query";
|
||||||
|
value = "{searchTerms}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
|
||||||
|
definedAliases = [ "@o" ];
|
||||||
|
};
|
||||||
|
"Nix Packages" = {
|
||||||
|
urls = [
|
||||||
|
{
|
||||||
|
template = "https://search.nixos.org/packages";
|
||||||
|
params = [
|
||||||
|
{
|
||||||
|
name = "type";
|
||||||
|
value = "packages";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "channel";
|
||||||
|
value = "unstable";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "query";
|
||||||
|
value = "{searchTerms}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
|
||||||
|
definedAliases = [ "@n" ];
|
||||||
|
};
|
||||||
|
"kagi" = {
|
||||||
|
urls = [
|
||||||
|
{
|
||||||
|
template = "https://kagi.com/search?";
|
||||||
|
params = [
|
||||||
|
{
|
||||||
|
name = "q";
|
||||||
|
value = "{searchTerms}";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
icon = ./kagi.png;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -5,14 +5,23 @@
|
|||||||
bat
|
bat
|
||||||
btop
|
btop
|
||||||
eza
|
eza
|
||||||
|
fd
|
||||||
|
ffmpegthumbnailer
|
||||||
|
fzf
|
||||||
git
|
git
|
||||||
gnupg
|
gnupg
|
||||||
|
imagemagick
|
||||||
|
jq
|
||||||
ncdu
|
ncdu
|
||||||
neofetch
|
neofetch
|
||||||
|
p7zip
|
||||||
|
poppler
|
||||||
rar
|
rar
|
||||||
ripgrep
|
ripgrep
|
||||||
starship
|
starship
|
||||||
tmux
|
tmux
|
||||||
|
unzip
|
||||||
|
yazi
|
||||||
zoxide
|
zoxide
|
||||||
# system info
|
# system info
|
||||||
hwloc
|
hwloc
|
||||||
|
|||||||
6
users/richie/systems/muninn.nix
Normal file
6
users/richie/systems/muninn.nix
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
{
|
||||||
|
imports = [
|
||||||
|
../home/global.nix
|
||||||
|
../home/gui
|
||||||
|
];
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user