Compare commits

...

24 commits

Author SHA1 Message Date
github-actions[bot]
94dca60858 flake.lock: Update
Flake lock file updates:

• Updated input 'hyprland':
    'github:hyprwm/Hyprland/2d5fda4810f706a1b6e2c0a1021ce57c8ad2e7a9' (2024-03-23)
  → 'github:hyprwm/Hyprland/c7fbea3368452c34c47a4a634e642de6cd4090cb' (2024-03-23)
2024-03-24 00:40:11 +00:00
3ab1df77c6
flake.lock: Update
Flake lock file updates:

• Updated input 'hyprland':
    'github:hyprwm/Hyprland/bcba3951f45f11245d424274130eb3a0ac790d93?narHash=sha256-Uve1/UBnwD4M/9xD0E3XATnLrF8B5vL6MTBhX6Is%2BTE%3D' (2024-03-19)
  → 'github:hyprwm/Hyprland/2d5fda4810f706a1b6e2c0a1021ce57c8ad2e7a9?narHash=sha256-gMBgRKFQG7TmayqT2XoF74mdkV1GNqeQ2oTSwbHfh2I%3D' (2024-03-23)
• Updated input 'hyprland/hyprcursor':
    'github:hyprwm/hyprcursor/1761f6cefd77f4fcd2039d930c88d6716ddc4974?narHash=sha256-43re5pzE/cswFAgw92/ugsB3%2Bd5ufDaCcLtl9ztKfBo%3D' (2024-03-12)
  → 'github:hyprwm/hyprcursor/6a92473237f430399a417e1c2da9d7fcd4970086?narHash=sha256-5vvhCSUGG9TA2G1eIRgokuYizhRnZu0ZbcU1MXfHsUE%3D' (2024-03-21)
• Updated input 'hyprland/hyprlang':
    'github:hyprwm/hyprlang/a685493fdbeec01ca8ccdf1f3655c044a8ce2fe2?narHash=sha256-bR4o3mynoTa1Wi4ZTjbnsZ6iqVcPGriXp56bZh5UFTk%3D' (2024-03-08)
  → 'github:hyprwm/hyprlang/a2f39421144d42541c057be235154ce21b76c0f6?narHash=sha256-tt0UgVKWeLQ%2BtFzvqrm4uAZbzONwdGshpfiLHAQ1P2c%3D' (2024-03-20)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/4ee76323053bfae15cc05c294c7fda9997ca7fc3?narHash=sha256-U5DLWla6nNiomFyCskYn6QfNCpVyQTeyG6FOAuEKHRg%3D' (2024-03-19)
  → 'github:hyprwm/contrib/536f00c5895015da1e7aa85bbee9aa6dcd149e69?narHash=sha256-BxWizZAc845ks9BjEXosRjfBv/NMr1WwoORBQuixfII%3D' (2024-03-21)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/5710127d9693421e78cca4f74fac2db6d67162b1?narHash=sha256-/KY8hffTh9SN/tTcDn/FrEiYwTXnU8NKnr4D7/stmmA%3D' (2024-03-19)
  → 'github:nixos/nixpkgs/20bc93ca7b2158ebc99b8cef987a2173a81cde35?narHash=sha256-dkJmk/ET/tRV4007O6kU101UEg1svUwiyk/zEEX9Tdg%3D' (2024-03-23)
• Updated input 'nixpkgs-wayland':
    'github:nix-community/nixpkgs-wayland/7d053c33b7a130ddada43ba09b089244390b3a23?narHash=sha256-imrQlTr3vZsnad16djnYDI9ICVaJfKEH6rB7F9xka74%3D' (2024-03-19)
  → 'github:nix-community/nixpkgs-wayland/0d291a959d01bb5d2bd2e20689b78258fa842cca?narHash=sha256-glCjdonAlkP5vwZpP8FYD1WCaGYALF5FYRv09XsWu5c%3D' (2024-03-23)
• Updated input 'stable':
    'github:nixos/nixpkgs/614b4613980a522ba49f0d194531beddbb7220d3?narHash=sha256-3Eh7fhEID17pv9ZxrPwCLfqXnYP006RKzSs0JptsN84%3D' (2024-03-17)
  → 'github:nixos/nixpkgs/56528ee42526794d413d6f244648aaee4a7b56c0?narHash=sha256-l0zlN/3CiodvWDtfBOVxeTwYSRz93muVbXWSpaMjXxM%3D' (2024-03-22)
2024-03-23 16:36:59 -05:00
f3a5290a80
let's do some inheritance shenanigans 2024-03-21 15:59:10 -05:00
60a6311a0d
make another function to propagate 2024-03-21 15:48:48 -05:00
49b9b107a4
less boilerplate 2024-03-21 15:35:57 -05:00
7b04cf6274
add node 2024-03-21 12:23:20 -05:00
f69f2839da
actually enable hyprland 2024-03-21 11:31:43 -05:00
f373cc323b
no functor necessary 2024-03-21 11:06:07 -05:00
7facf2e749
clean up even more boilerplate 2024-03-21 11:04:01 -05:00
55f2e625ec
reduce boilerplate with mkOizysModule 2024-03-21 10:54:44 -05:00
ff7f8495f6
update tsm 2024-03-20 12:23:20 -05:00
4b8b1718a4
remove noop functions and add devshell 2024-03-20 10:46:16 -05:00
4a8eb8bf0b
flake.lock: Update
Flake lock file updates:

• Updated input 'hyprland':
    'github:hyprwm/Hyprland/0387528c56c4d9faf93946cbc9426973de6ef61b?narHash=sha256-dqYzqSsGB9PhwxG2H3oVRpqAMWziVuQ7k%2B02ASku8T4%3D' (2024-03-17)
  → 'github:hyprwm/Hyprland/bcba3951f45f11245d424274130eb3a0ac790d93?narHash=sha256-Uve1/UBnwD4M/9xD0E3XATnLrF8B5vL6MTBhX6Is%2BTE%3D' (2024-03-19)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/75420d09f93346d9d23d5a1e26b42699f6b66cd6?narHash=sha256-1qVByzzCcKoCmP8ReUSAjKU5V9pfTLHQIM4WI1tvQ9E%3D' (2024-03-14)
  → 'github:hyprwm/contrib/4ee76323053bfae15cc05c294c7fda9997ca7fc3?narHash=sha256-U5DLWla6nNiomFyCskYn6QfNCpVyQTeyG6FOAuEKHRg%3D' (2024-03-19)
• Updated input 'nix-index-database':
    'github:nix-community/nix-index-database/e76ff2df6bfd2abe06abd8e7b9f217df941c1b07?narHash=sha256-tlLuB73OCOKtU2j83bQzSYFyzjJo3rjpITZE5MoofG8%3D' (2024-03-11)
  → 'github:nix-community/nix-index-database/e25efda85e39fcdc845e371971ac4384989c4295?narHash=sha256-0fjbN5GYYDKPyPay0l8gYoH%2BtFfNqPPwP5sxxBreeA4%3D' (2024-03-17)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/9af9c1c87ed3e3ed271934cb896e0cdd33dae212?narHash=sha256-huQT4Xs0y4EeFKn2BTBVYgEwJSv8SDlm82uWgMnCMmI%3D' (2024-03-15)
  → 'github:nixos/nixpkgs/5710127d9693421e78cca4f74fac2db6d67162b1?narHash=sha256-/KY8hffTh9SN/tTcDn/FrEiYwTXnU8NKnr4D7/stmmA%3D' (2024-03-19)
• Updated input 'nixpkgs-wayland':
    'github:nix-community/nixpkgs-wayland/bce941770aa96005f08c7b60851037352bf76156?narHash=sha256-6bOCj2BUwOYDO1Lq3DgwIfrdUiieKkm1fCHFQRkLK4Y%3D' (2024-03-16)
  → 'github:nix-community/nixpkgs-wayland/7d053c33b7a130ddada43ba09b089244390b3a23?narHash=sha256-imrQlTr3vZsnad16djnYDI9ICVaJfKEH6rB7F9xka74%3D' (2024-03-19)
• Updated input 'nixpkgs-wayland/lib-aggregate':
    'github:nix-community/lib-aggregate/45b75bf534592c0c1c881a1c447f7fdb37a87eaf?narHash=sha256-FzYm4td3FJfzOAuEkCXt3KdUgZuA072OAQXqIq%2BIAMo%3D' (2024-03-11)
  → 'github:nix-community/lib-aggregate/f890211817b941d9ed9de48d62ba8553fa2c20f3?narHash=sha256-yqjXunc%2BZvqf6rcH7W9wMvhr18jMZhDvIdnretlfj78%3D' (2024-03-17)
• Updated input 'nixpkgs-wayland/lib-aggregate/nixpkgs-lib':
    'github:nix-community/nixpkgs.lib/630ebdc047ca96d8126e16bb664c7730dc52f6e6?narHash=sha256-pkUg3hOKuGWMGF9WEMPPN/G4pqqdbNGJQ54yhyQYDVY%3D' (2024-03-10)
  → 'github:nix-community/nixpkgs.lib/fa827dda806c5aa98f454da4c567991ab8ce422c?narHash=sha256-/kB%2BZWSdkZjbZ0FTqm0u84sf2jFS%2B30ysaEajmBjtoY%3D' (2024-03-17)
• Updated input 'stable':
    'github:nixos/nixpkgs/878ef7d9721bee9f81f8a80819f9211ad1f993da?narHash=sha256-MvFKESbq4rUWuaf2RKPNYENaSZEw/jaCLo2gU6oREcM%3D' (2024-03-14)
  → 'github:nixos/nixpkgs/614b4613980a522ba49f0d194531beddbb7220d3?narHash=sha256-3Eh7fhEID17pv9ZxrPwCLfqXnYP006RKzSs0JptsN84%3D' (2024-03-17)
• Updated input 'tsm':
    'github:daylinmorgan/tsm/ebdf050743bfac25a08944b2a348327909371ce2?dir=nix&narHash=sha256-QQMkhLc3UPOziGHCKHLkLffbbUxhXBOpmaarTX1LfxM%3D' (2024-03-18)
  → 'github:daylinmorgan/tsm/e3f24f710a5e1c6061f646e4ef4d644a6b715872?dir=nix&narHash=sha256-pqt1j8WPXS18IolyjneevuWTk%2Bu/5n4wrIU0UlzK2Lo%3D' (2024-03-19)
2024-03-19 13:18:11 -05:00
cec9ce730f
generalize common -> oizys and add backups option 2024-03-19 09:50:53 -05:00
9f8a1692b5
deadnix/formatting 2024-03-19 08:57:31 -05:00
4287d698b9
make unnesscary function 2024-03-19 08:54:15 -05:00
71cab562fc
add note about workaround 2024-03-19 07:43:35 -05:00
a256b441e0
make user mutable? 2024-03-19 07:37:24 -05:00
43d9ab3aec
switch to hetzner cloud from vultr 2024-03-19 07:37:24 -05:00
7f1223222a
update the other hosts 2024-03-19 07:31:31 -05:00
5e49f286e6
add enable function 2024-03-19 07:26:27 -05:00
13b42e2511
add tsm flake 2024-03-18 17:20:18 -05:00
e0a3123035
split find-modules into it's own file 2024-03-17 06:17:58 -05:00
github-actions[bot]
270c946b24 flake.lock: Update
Flake lock file updates:

• Updated input 'hyprland':
    'github:hyprwm/Hyprland/3e67ee0f5f66c74c0a0bd4f797361fd100c2e2d2' (2024-03-13)
  → 'github:hyprwm/Hyprland/0387528c56c4d9faf93946cbc9426973de6ef61b' (2024-03-17)
• Updated input 'hyprland/hyprcursor':
    'github:hyprwm/hyprcursor/05db7dfd7fc261e0195e54f8a6d655d4f370e70f' (2024-03-10)
  → 'github:hyprwm/hyprcursor/1761f6cefd77f4fcd2039d930c88d6716ddc4974' (2024-03-12)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/db001797591bf76f7b8d4c4ed3b49233391e0c97' (2024-03-14)
  → 'github:nixos/nixpkgs/9af9c1c87ed3e3ed271934cb896e0cdd33dae212' (2024-03-15)
• Updated input 'nixpkgs-wayland':
    'github:nix-community/nixpkgs-wayland/077f5833cb60efda5375053101b75150a5386e22' (2024-03-14)
  → 'github:nix-community/nixpkgs-wayland/bce941770aa96005f08c7b60851037352bf76156' (2024-03-16)
• Updated input 'stable':
    'github:nixos/nixpkgs/51063ed4f2343a59fdeebb279bb81d87d453942b' (2024-03-12)
  → 'github:nixos/nixpkgs/878ef7d9721bee9f81f8a80819f9211ad1f993da' (2024-03-14)
2024-03-16 20:08:49 -05:00
26 changed files with 414 additions and 372 deletions

View file

@ -68,11 +68,11 @@
]
},
"locked": {
"lastModified": 1710091028,
"narHash": "sha256-yFk2kc8J2kVh0RWlwT+PQf0bpfUNcROOcRYcyQJbpk4=",
"lastModified": 1711035742,
"narHash": "sha256-5vvhCSUGG9TA2G1eIRgokuYizhRnZu0ZbcU1MXfHsUE=",
"owner": "hyprwm",
"repo": "hyprcursor",
"rev": "05db7dfd7fc261e0195e54f8a6d655d4f370e70f",
"rev": "6a92473237f430399a417e1c2da9d7fcd4970086",
"type": "github"
},
"original": {
@ -94,11 +94,11 @@
"xdph": "xdph"
},
"locked": {
"lastModified": 1710344304,
"narHash": "sha256-jE+/UGqRYkKBBpLTTV5ayCtVmD9N1WsSKpufszUPzcA=",
"lastModified": 1711232090,
"narHash": "sha256-3psLgLXBg4F9UU93E+zmMqoMhcIX6e8HEphXCxlfUOY=",
"owner": "hyprwm",
"repo": "Hyprland",
"rev": "3e67ee0f5f66c74c0a0bd4f797361fd100c2e2d2",
"rev": "c7fbea3368452c34c47a4a634e642de6cd4090cb",
"type": "github"
},
"original": {
@ -115,11 +115,11 @@
]
},
"locked": {
"lastModified": 1710415616,
"narHash": "sha256-1qVByzzCcKoCmP8ReUSAjKU5V9pfTLHQIM4WI1tvQ9E=",
"lastModified": 1711036118,
"narHash": "sha256-BxWizZAc845ks9BjEXosRjfBv/NMr1WwoORBQuixfII=",
"owner": "hyprwm",
"repo": "contrib",
"rev": "75420d09f93346d9d23d5a1e26b42699f6b66cd6",
"rev": "536f00c5895015da1e7aa85bbee9aa6dcd149e69",
"type": "github"
},
"original": {
@ -188,11 +188,11 @@
]
},
"locked": {
"lastModified": 1709914708,
"narHash": "sha256-bR4o3mynoTa1Wi4ZTjbnsZ6iqVcPGriXp56bZh5UFTk=",
"lastModified": 1710960526,
"narHash": "sha256-tt0UgVKWeLQ+tFzvqrm4uAZbzONwdGshpfiLHAQ1P2c=",
"owner": "hyprwm",
"repo": "hyprlang",
"rev": "a685493fdbeec01ca8ccdf1f3655c044a8ce2fe2",
"rev": "a2f39421144d42541c057be235154ce21b76c0f6",
"type": "github"
},
"original": {
@ -207,11 +207,11 @@
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1710184940,
"narHash": "sha256-FzYm4td3FJfzOAuEkCXt3KdUgZuA072OAQXqIq+IAMo=",
"lastModified": 1710677371,
"narHash": "sha256-yqjXunc+Zvqf6rcH7W9wMvhr18jMZhDvIdnretlfj78=",
"owner": "nix-community",
"repo": "lib-aggregate",
"rev": "45b75bf534592c0c1c881a1c447f7fdb37a87eaf",
"rev": "f890211817b941d9ed9de48d62ba8553fa2c20f3",
"type": "github"
},
"original": {
@ -270,11 +270,11 @@
]
},
"locked": {
"lastModified": 1710120787,
"narHash": "sha256-tlLuB73OCOKtU2j83bQzSYFyzjJo3rjpITZE5MoofG8=",
"lastModified": 1710644923,
"narHash": "sha256-0fjbN5GYYDKPyPay0l8gYoH+tFfNqPPwP5sxxBreeA4=",
"owner": "nix-community",
"repo": "nix-index-database",
"rev": "e76ff2df6bfd2abe06abd8e7b9f217df941c1b07",
"rev": "e25efda85e39fcdc845e371971ac4384989c4295",
"type": "github"
},
"original": {
@ -285,11 +285,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1710377395,
"narHash": "sha256-KMubsUWtVr7L55pXMBibBDBdmk3xrjbBPduc0E8z28c=",
"lastModified": 1711200738,
"narHash": "sha256-dkJmk/ET/tRV4007O6kU101UEg1svUwiyk/zEEX9Tdg=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "db001797591bf76f7b8d4c4ed3b49233391e0c97",
"rev": "20bc93ca7b2158ebc99b8cef987a2173a81cde35",
"type": "github"
},
"original": {
@ -301,11 +301,11 @@
},
"nixpkgs-lib": {
"locked": {
"lastModified": 1710031547,
"narHash": "sha256-pkUg3hOKuGWMGF9WEMPPN/G4pqqdbNGJQ54yhyQYDVY=",
"lastModified": 1710636348,
"narHash": "sha256-/kB+ZWSdkZjbZ0FTqm0u84sf2jFS+30ysaEajmBjtoY=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "630ebdc047ca96d8126e16bb664c7730dc52f6e6",
"rev": "fa827dda806c5aa98f454da4c567991ab8ce422c",
"type": "github"
},
"original": {
@ -324,11 +324,11 @@
]
},
"locked": {
"lastModified": 1710422269,
"narHash": "sha256-aZEM210J8gQ+nHCDXshM9pGwp6Wac51niM8ZdWJJFYQ=",
"lastModified": 1711218979,
"narHash": "sha256-glCjdonAlkP5vwZpP8FYD1WCaGYALF5FYRv09XsWu5c=",
"owner": "nix-community",
"repo": "nixpkgs-wayland",
"rev": "077f5833cb60efda5375053101b75150a5386e22",
"rev": "0d291a959d01bb5d2bd2e20689b78258fa842cca",
"type": "github"
},
"original": {
@ -381,16 +381,17 @@
"nixpkgs": "nixpkgs",
"nixpkgs-wayland": "nixpkgs-wayland",
"pinix": "pinix",
"stable": "stable"
"stable": "stable",
"tsm": "tsm"
}
},
"stable": {
"locked": {
"lastModified": 1710283656,
"narHash": "sha256-nI+AOy4uK6jLGBi9nsbHjL1EdSIzoo8oa+9oeVhbyFc=",
"lastModified": 1711124224,
"narHash": "sha256-l0zlN/3CiodvWDtfBOVxeTwYSRz93muVbXWSpaMjXxM=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "51063ed4f2343a59fdeebb279bb81d87d453942b",
"rev": "56528ee42526794d413d6f244648aaee4a7b56c0",
"type": "github"
},
"original": {
@ -467,6 +468,28 @@
"type": "github"
}
},
"tsm": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"dir": "nix",
"lastModified": 1710955312,
"narHash": "sha256-7F88bRcAqU1NPo89pKhR/d6NKRn2JJ2FWcSLITjvzdU=",
"owner": "daylinmorgan",
"repo": "tsm",
"rev": "090dda23ad4ab87a68323a9e1924bc6d8ce6e0a6",
"type": "github"
},
"original": {
"dir": "nix",
"owner": "daylinmorgan",
"repo": "tsm",
"type": "github"
}
},
"wlroots": {
"flake": false,
"locked": {

View file

@ -1,16 +1,16 @@
{
description = "nix begat oizys";
outputs = inputs @ {self, ...}:
(import ./lib {
inherit inputs;
inherit self;
})
.oizysFlake {};
(import ./lib {inherit self inputs;}).oizysFlake;
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixpkgs-unstable";
stable.url = "github:nixos/nixpkgs/nixos-23.11";
tsm.url = "github:daylinmorgan/tsm?dir=nix";
tsm.inputs.nixpkgs.follows = "nixpkgs";
hyprland.url = "github:hyprwm/Hyprland/main";
hyprland.inputs.nixpkgs.follows = "nixpkgs";
hyprland-contrib.url = "github:hyprwm/contrib";

View file

@ -1,22 +1,28 @@
{
self,
pkgs,
lib,
...
}: {
}: let
inherit (lib) enabled;
in {
imports = with self.nixosModules; [
docker
restic
];
oizys.languages = [
"nim"
"python"
];
oizys = {
languages = [
"nim"
"node" # for docker langservers
"python"
];
docker = enabled;
backups = enabled;
};
environment.systemPackages = with pkgs; [
rclone
(pkgs.writeShellScriptBin "gitea" ''
(writeShellScriptBin "gitea" ''
ssh -p 2222 -o StrictHostKeyChecking=no git@127.0.0.1 "SSH_ORIGINAL_COMMAND=\"$SSH_ORIGINAL_COMMAND\" $0 $@"
'')
];

View file

@ -2,32 +2,34 @@
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
modulesPath,
...
}: {
imports = [];
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
boot.initrd.availableKernelModules = ["ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
fileSystems."/" = {
device = "/dev/disk/by-uuid/eb6cbf1e-e4a7-4312-a1af-4f78ad9cf138";
fsType = "btrfs";
device = "/dev/disk/by-uuid/70d6dad3-1778-43bf-8f87-76dd7f54c545";
fsType = "ext4";
};
swapDevices = [];
swapDevices = [
{device = "/dev/disk/by-uuid/a4e4cad9-1844-45dd-9bea-eb77bd71c37b";}
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.ens3.useDHCP = lib.mkDefault true;
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
virtualisation.hypervGuest.enable = true;
}

View file

@ -1,17 +1,12 @@
{lib, ...}: {
{lib, ...}: let
inherit (lib) enabled;
in {
users.motd = lib.mkRune {
number = "6";
rune = "algiz";
};
swapDevices = [
{
device = "/var/lib/swapfile";
size = 2 * 1024;
}
];
services.resolved.enable = true;
services.resolved = enabled;
services.fail2ban = {
enable = true;
@ -26,25 +21,22 @@
# networking.nameservers = [ "8.8.8.8"];
# allow tcp connections for revsere proxy
networking.firewall = {
enable = true;
allowedTCPPorts = [80 443];
};
networking.firewall =
enabled
// {
allowedTCPPorts = [80 443];
};
services.openssh.enable = true;
services.openssh.settings.PasswordAuthentication = false;
services.openssh =
enabled
// {settings.PasswordAuthentication = false;};
users.mutableUsers = false;
# users.mutableUsers = false;
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.device = "/dev/vda"; # or "nodev" for efi only
boot.loader.grub.device = "/dev/sda"; # or "nodev" for efi only
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "22.11"; # Did you read the comment?
# don't delete this you foo bar
system.stateVersion = "23.11"; # Did you read the comment?
}

View file

@ -1,9 +1,18 @@
{self, ...}: {
{
self,
lib,
...
}: let
inherit (lib) enabled;
in {
imports = with self.nixosModules; [
nix-ld
];
oizys.desktop.enable = true;
oizys = {
desktop = enabled;
nix-ld = enabled;
};
# Enable the X11 windowing system.
services.xserver = {

View file

@ -3,7 +3,9 @@
pkgs,
lib,
...
}: {
}: let
inherit (lib) enabled;
in {
users.motd = lib.mkRune {
number = "2";
rune = "mannaz";
@ -11,7 +13,7 @@
# Use the systemd-boot EFI boot loader.
boot.loader = {
systemd-boot.enable = true;
systemd-boot = enabled;
efi.canTouchEfiVariables = true;
};
@ -26,27 +28,31 @@
}
];
hardware.opengl = {
enable = true;
driSupport = true;
driSupport32Bit = true;
extraPackages = with pkgs; [
libGL
];
setLdLibraryPath = true;
};
hardware.opengl =
enabled
// {
driSupport = true;
driSupport32Bit = true;
extraPackages = with pkgs; [
libGL
];
setLdLibraryPath = true;
};
# Load nvidia driver for Xorg and Wayland
services.xserver.videoDrivers = ["nvidia"];
hardware.nvidia = {
# Modesetting is required.
modesetting.enable = true;
modesetting = enabled;
# Nvidia power management. Experimental, and can cause sleep/suspend to fail.
powerManagement.enable = false;
# Fine-grained power management. Turns off GPU when not in use.
# Experimental and only works on modern Nvidia GPUs (Turing or newer).
powerManagement.finegrained = false;
powerManagement =
enabled
// {
# Fine-grained power management. Turns off GPU when not in use.
# Experimental and only works on modern Nvidia GPUs (Turing or newer).
finegrained = false;
};
# Use the NVidia open source kernel module (not to be confused with the
# independent third-party "nouveau" open source driver).
@ -65,8 +71,8 @@
package = config.boot.kernelPackages.nvidiaPackages.stable;
};
programs.nix-ld.enable = true;
services.openssh.enable = true;
programs.nix-ld = enabled;
services.openssh = enabled;
networking.hostName = "mannaz";
# networking.wireless.enable = true;
@ -80,21 +86,6 @@
time.timeZone = "America/Chicago";
security.sudo.wheelNeedsPassword = false;
# This option defines the first version of NixOS you have installed on this particular machine,
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
#
# Most users should NEVER change this value after the initial install, for any reason,
# even if you've upgraded your system to a new NixOS release.
#
# This value does NOT affect the Nixpkgs version your packages and OS are pulled from,
# so changing it will NOT upgrade your system.
#
# This value being lower than the current NixOS release does NOT mean your system is
# out of date, out of support, or vulnerable.
#
# Do NOT change this value unless you have manually inspected all the changes it would make to your configuration,
# and migrated your data accordingly.
#
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
# don't delete this you foo bar
system.stateVersion = "23.11"; # Did you read the comment?
}

View file

@ -1,18 +1,19 @@
{
pkgs,
self,
lib,
...
}: {
imports = with self.nixosModules; [
nix-ld
restic
docker
];
}: let
inherit (lib) enabled;
in {
oizys = {
vbox.enable = true;
desktop.enable = true;
vpn.enable = true;
desktop = enabled;
hyprland = enabled;
chrome = enabled;
docker = enabled;
nix-ld = enabled;
vbox = enabled;
vpn = enabled;
backups = enabled;
languages = [
"misc"
"python"
@ -21,16 +22,12 @@
"node"
];
};
vivaldi.enable = true;
environment.systemPackages = with pkgs; [
zk
rclone
quarto
];
programs.hyprland.enable = true;
services.restic.backups.gdrive = {
user = "daylin";
repository = "rclone:g:archives/othalan";

View file

@ -2,26 +2,27 @@
pkgs,
lib,
...
}: {
networking.networkmanager.enable = true;
services.printing.enable = true;
services.fwupd.enable = true;
hardware.bluetooth.enable = true;
hardware.bluetooth.powerOnBoot = true;
}: let
inherit (lib) enabled;
in {
networking.networkmanager = enabled;
services.printing = enabled;
services.fwupd = enabled;
hardware.bluetooth = enabled // {powerOnBoot = true;};
# https://github.com/NixOS/nixos-hardware/blob/c478b3d56969006e015e55aaece4931f3600c1b2/lenovo/thinkpad/x1/9th-gen/default.nix
# https://github.com/NixOS/nixos-hardware/blob/c478b3d56969006e015e55aaece4931f3600c1b2/common/pc/ssd/default.nix
services.fstrim.enable = true;
services.fstrim = enabled;
# rtkit is optional but recommended
security.rtkit.enable = true;
services.pipewire = {
enable = true;
audio.enable = true;
pulse.enable = true;
alsa.enable = true;
alsa.support32Bit = true;
};
security.rtkit = enabled;
services.pipewire =
enabled
// {
audio = enabled;
pulse = enabled;
alsa = enabled // {support32Bit = true;};
};
environment.systemPackages = with pkgs; [
pamixer
@ -46,21 +47,6 @@
boot.loader.efi.canTouchEfiVariables = true;
# boot.kernelPackages = pkgs.linuxPackages_latest;
# This option defines the first version of NixOS you have installed on this particular machine,
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
#
# Most users should NEVER change this value after the initial install, for any reason,
# even if you've upgraded your system to a new NixOS release.
#
# This value does NOT affect the Nixpkgs version your packages and OS are pulled from,
# so changing it will NOT upgrade your system.
#
# This value being lower than the current NixOS release does NOT mean your system is
# out of date, out of support, or vulnerable.
#
# Do NOT change this value unless you have manually inspected all the changes it would make to your configuration,
# and migrated your data accordingly.
#
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
# don't delete this you foo bar
system.stateVersion = "23.11"; # Did you read the comment?
}

View file

@ -5,68 +5,53 @@
inherit (inputs) nixpkgs;
lib = nixpkgs.lib.extend (import ./extended.nix);
inherit (builtins) concatLists attrValues mapAttrs elemAt match readDir filter listToAttrs;
inherit (lib) nixosSystem genAttrs isNixFile;
inherit (builtins) mapAttrs readDir filter listToAttrs;
inherit (lib) nixosSystem genAttrs isNixFile mkDefaultOizysModule mkOizysModule;
inherit (lib.filesystem) listFilesRecursive;
inherit (import ./find-modules.nix {inherit lib;}) findModulesList;
#supportedSystems = ["x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin"];
supportedSystems = ["x86_64-linux"];
in rec {
forAllSystems = f: genAttrs supportedSystems (system: f nixpkgs.legacyPackages.${system});
buildOizys = _:
forAllSystems (
pkgs: let
pkg = pkgs.callPackage ../oizys {};
in {
oizys = pkg;
default = pkg;
}
);
nixosModules = listToAttrs (findModulesList ../modules);
mkSystem = hostname:
nixosSystem {
system = "x86_64-linux";
modules =
[
../modules/common.nix
../modules/oizys.nix
../overlays
]
++ filter
isNixFile
(listFilesRecursive (../. + "/hosts/${hostname}"));
specialArgs = {inherit inputs lib self;};
specialArgs = {inherit inputs lib self mkDefaultOizysModule mkOizysModule;};
};
mapHosts = dir: mapAttrs (name: _: mkSystem name) (readDir dir);
findModules = _: listToAttrs (findModulesList ../modules);
# https://github.com/balsoft/nixos-config/blob/73cc2c3a8bb62a9c3980a16ae70b2e97af6e1abd/flake.nix#L109-L120
findModulesList = dir:
concatLists (attrValues (mapAttrs
(name: type:
if type == "regular"
then [
{
name = elemAt (match "(.*)\\.nix" name) 0;
value = dir + "/${name}";
}
]
else if
(readDir (dir + "/${name}"))
? "default.nix"
then [
{
inherit name;
value = dir + "/${name}";
}
]
else findModulesList (dir + "/${name}")) (readDir dir)));
oizysHosts = mapAttrs (name: _: mkSystem name) (readDir ../hosts);
oizysPkg = forAllSystems (
pkgs: rec {
oizys = pkgs.callPackage ../oizys {};
default = oizys;
}
);
devShells = forAllSystems (
pkgs: {
default = pkgs.mkShell {
packages = with pkgs; [git deadnix];
};
}
);
oizysFlake = _: {
nixosModules = findModules {};
nixosConfigurations = mapHosts ../hosts;
packages = buildOizys {};
oizysFlake = {
nixosModules = nixosModules;
nixosConfigurations = oizysHosts;
packages = oizysPkg;
devShells = devShells;
formatter = forAllSystems (pkgs: pkgs.alejandra);
};
}

View file

@ -1,7 +1,25 @@
final: prev: let
inherit (final) hasSuffix;
inherit (final) hasSuffix mkEnableOption mkIf mkOption types;
runes = import ../modules/runes;
in {
in rec {
enabled = {enable = true;};
disabled = {enable = false;};
# ["a" "b"] -> {a.enable = true; b.enable = true;}
enableAttrs = attrs:
builtins.listToAttrs (map (attr: {
name = attr;
value = enabled;
})
attrs);
# ["a" "b"] -> {a.enable = false; b.enable = false;}
disableAttrs = attrs:
builtins.listToAttrs (map (attr: {
name = attr;
value = disabled;
})
attrs);
isNixFile = path: hasSuffix ".nix" path;
mkIfIn = name: list: prev.mkIf (builtins.elem name list);
mkRune = {
@ -10,4 +28,17 @@ in {
runeKind ? "braille",
}:
"[1;3${number}m\n" + runes.${rune}.${runeKind} + "\n";
mkOizysModule = config: attr: content: {
options.oizys.${attr}.enable = mkEnableOption "enable ${attr} support";
config = mkIf config.oizys.${attr}.enable content;
};
mkDefaultOizysModule = config: attr: content: {
options.oizys.${attr}.enable = mkOption {
default = true;
description = "enable ${attr} support";
type = types.bool;
};
config = mkIf config.oizys.${attr}.enable content;
};
}

25
lib/find-modules.nix Normal file
View file

@ -0,0 +1,25 @@
{...}: let
inherit (builtins) concatLists attrValues mapAttrs elemAt match readDir;
in rec {
# https://github.com/balsoft/nixos-config/blob/73cc2c3a8bb62a9c3980a16ae70b2e97af6e1abd/flake.nix#L109-L120
findModulesList = dir:
concatLists (attrValues (mapAttrs
(name: type:
if type == "regular"
then [
{
name = elemAt (match "(.*)\\.nix" name) 0;
value = dir + "/${name}";
}
]
else if
(readDir (dir + "/${name}"))
? "default.nix"
then [
{
inherit name;
value = dir + "/${name}";
}
]
else findModulesList (dir + "/${name}")) (readDir dir)));
}

View file

@ -5,9 +5,8 @@
...
}: let
inherit (lib) mkIf;
cfg = config.oizys.desktop;
in {
config = mkIf cfg.enable {
config = mkIf config.oizys.desktop.enable {
fonts.fontconfig.enable = true;
fonts.packages = with pkgs; [
(nerdfonts.override {fonts = ["FiraCode"];})

View file

@ -5,9 +5,8 @@
...
}: let
inherit (lib) mkIf;
cfg = config.oizys.desktop;
in {
config = mkIf cfg.enable {
config = mkIf config.oizys.desktop.enable {
environment.systemPackages = with pkgs; [
wezterm
alacritty

View file

@ -2,12 +2,9 @@
inputs,
pkgs,
config,
lib,
mkOizysModule,
...
}: let
inherit (lib) mkIf;
cfg = config.programs.hyprland;
lock = pkgs.writeShellApplication {
name = "lock";
runtimeInputs = with pkgs; [swaylock];
@ -15,10 +12,10 @@
swaylock -c 1e1e2e
'';
};
in {
config = mkIf cfg.enable {
in
mkOizysModule config "hyprland" {
programs.hyprland.enable = true;
security.pam.services.swaylock = {};
# programs.hyprland.package = inputs.hyprland.packages.${pkgs.system}.default;
# Optional, hint electron apps to use wayland:
environment.sessionVariables.NIXOS_OZONE_WL = "1";
@ -52,5 +49,4 @@ in {
inputs.nixpkgs-wayland.overlay
inputs.hyprland.overlays.default
];
};
}
}

View file

@ -1,37 +1,29 @@
{
config,
lib,
inputs,
pkgs,
config,
mkDefaultOizysModule,
...
}: let
inherit (lib) mkOption mkIf types;
cfg = config.oizys.cli;
in {
options.oizys.cli.enable = mkOption {
default = true;
description = "Whether to enable cli.";
type = types.bool;
}:
mkDefaultOizysModule config "cli" {
programs.direnv.enable = true;
environment.sessionVariables = {
DIRENV_LOG_FORMAT = "direnv: %s";
};
config = mkIf cfg.enable {
programs.direnv.enable = true;
environment.sessionVariables = {
DIRENV_LOG_FORMAT = "direnv: %s";
};
environment.systemPackages = with pkgs; [
chezmoi
zoxide
lsd
fzf
environment.systemPackages = with pkgs; [
chezmoi
zoxide
lsd
fzf
# utils
fd
bat
delta
ripgrep
# utils
fd
bat
delta
ripgrep
btop
];
};
btop
inputs.tsm.packages.${pkgs.system}.tsm
];
}

View file

@ -5,9 +5,8 @@
...
}: let
inherit (lib) mkIf;
cfg = config.oizys.desktop;
in {
config = mkIf cfg.enable {
config = mkIf config.oizys.desktop.enable {
environment.systemPackages = with pkgs; [
# vscode
vscode-fhs

View file

@ -1,8 +1,4 @@
{
config,
lib,
...
}: let
{lib, ...}: let
inherit (lib) mkOption types literalExpression mdDoc;
in {
imports = [./nim.nix ./tex.nix ./misc.nix ./node.nix ./python.nix];

View file

@ -1,17 +1,9 @@
{
config,
lib,
pkgs,
mkOizysModule,
...
}: let
inherit (lib) mkEnableOption mkIf;
cfg = config.oizys.vpn;
in {
options.oizys.vpn.enable = mkEnableOption ''
Whether to enable openconnect for vpn connection.
'';
config = mkIf cfg.enable {
environment.systemPackages = [pkgs.openconnect];
};
}:
mkOizysModule config "vpn" {
environment.systemPackages = [pkgs.openconnect];
}

View file

@ -1,59 +1,70 @@
{pkgs, ...}: {
programs.nix-ld.enable = true;
{
pkgs,
lib,
config,
...
}: let
inherit (lib) mkEnableOption mkIf;
cfg = config.oizys.nix-ld;
in {
options.oizys.nix-ld.enable = mkEnableOption "enable nix-ld support";
config = mkIf cfg.enable {
programs.nix-ld.enable = true;
# Packages that need at least something in this list:
# Geneious Prime
# https://github.com/Mic92/dotfiles/blob/cb180bdd3805b373e556a93ccb275b7f0f902a3b/nixos/modules/nix-ld.nix#L9C3-L60C5
programs.nix-ld.libraries = with pkgs; [
alsa-lib
at-spi2-atk
at-spi2-core
atk
cairo
cups
curl
dbus
expat
fontconfig
freetype
fuse3
gdk-pixbuf
glib
gtk3
icu
libGL
libappindicator-gtk3
libdrm
libglvnd
libnotify
libpulseaudio
libunwind
libusb1
libuuid
libxkbcommon
mesa
nspr
nss
openssl
pango
pipewire
stdenv.cc.cc
systemd
vulkan-loader
xorg.libX11
xorg.libXScrnSaver
xorg.libXcomposite
xorg.libXcursor
xorg.libXdamage
xorg.libXext
xorg.libXfixes
xorg.libXi
xorg.libXrandr
xorg.libXrender
xorg.libXtst
xorg.libxcb
xorg.libxkbfile
xorg.libxshmfence
zlib
];
# Packages that need at least something in this list:
# Geneious Prime
# https://github.com/Mic92/dotfiles/blob/cb180bdd3805b373e556a93ccb275b7f0f902a3b/nixos/modules/nix-ld.nix#L9C3-L60C5
programs.nix-ld.libraries = with pkgs; [
alsa-lib
at-spi2-atk
at-spi2-core
atk
cairo
cups
curl
dbus
expat
fontconfig
freetype
fuse3
gdk-pixbuf
glib
gtk3
icu
libGL
libappindicator-gtk3
libdrm
libglvnd
libnotify
libpulseaudio
libunwind
libusb1
libuuid
libxkbcommon
mesa
nspr
nss
openssl
pango
pipewire
stdenv.cc.cc
systemd
vulkan-loader
xorg.libX11
xorg.libXScrnSaver
xorg.libXcomposite
xorg.libXcursor
xorg.libXdamage
xorg.libXext
xorg.libXfixes
xorg.libXi
xorg.libXrandr
xorg.libXrender
xorg.libXtst
xorg.libxcb
xorg.libxkbfile
xorg.libxshmfence
zlib
];
};
}

View file

@ -2,7 +2,9 @@
lib,
self,
...
}: {
}: let
inherit (lib) mkEnableOption;
in {
imports = with self.nixosModules; [
users
nix
@ -12,23 +14,25 @@
vpn
gpg
# gui
fonts
lock
qtile
hyprland
virtualbox
docker
gui
fonts
languages
# programs
vivaldi
chrome
vscode
nix-ld
restic
];
options.oizys.desktop.enable = lib.mkEnableOption "is desktop";
options.oizys.desktop.enable = mkEnableOption "is desktop";
}

View file

@ -0,0 +1,28 @@
{
pkgs,
config,
mkOizysModule,
...
}:
mkOizysModule config "chrome" {
programs.chromium = {
enable = true;
extensions = [
"nngceckbapebfimnlniiiahkandclblb" # bitwarden
"gfbliohnnapiefjpjlpjnehglfpaknnc" # surfingkeys
"pbmlfaiicoikhdbjagjbglnbfcbcojpj" # simplify gmail
"oemmndcbldboiebfnladdacbdfmadadm" # pdf viewer
"clngdbkpkpeebahjckkjfobafhncgmne" # stylus
"cjpalhdlnbpafiamejdnhcphjbkeiagm" # ublock origin
];
};
environment.systemPackages = with pkgs; [
(google-chrome.override {
commandLineArgs = [
"--force-dark-mode"
];
})
];
}

View file

@ -1,33 +0,0 @@
{
pkgs,
config,
lib,
...
}: let
inherit (lib) mkIf mkEnableOption;
cfg = config.vivaldi;
in {
options.vivaldi.enable = mkEnableOption "enable vivaldi + extensions";
config = mkIf cfg.enable {
programs.chromium = {
enable = true;
extensions = [
"nngceckbapebfimnlniiiahkandclblb" # bitwarden
"gfbliohnnapiefjpjlpjnehglfpaknnc" # surfingkeys
"pbmlfaiicoikhdbjagjbglnbfcbcojpj" # simplify gmail
"oemmndcbldboiebfnladdacbdfmadadm" # pdf viewer
"clngdbkpkpeebahjckkjfobafhncgmne" # stylus
];
};
environment.systemPackages = with pkgs; [
(vivaldi.override {
commandLineArgs = [
"--force-dark-mode"
];
proprietaryCodecs = true;
})
];
};
}

View file

@ -1,5 +1,16 @@
{...}: {
{
config,
pkgs,
mkOizysModule,
...
}:
mkOizysModule config "backups" {
environment.systemPackages = with pkgs; [rclone];
services.restic.backups.gdrive = {
# BUG: if .conda/environments.txt doesn't exist then this won't work
# workaround for now `mkdir ~/.conda && touch ~/.conda/environments.txt`
extraBackupArgs = [
"--exclude-file /home/daylin/.config/restic/excludes.txt"
"--exclude-file /home/daylin/.conda/environments.txt"

View file

@ -1,4 +1,10 @@
{pkgs, ...}: {
{
pkgs,
config,
mkOizysModule,
...
}:
mkOizysModule config "docker" {
virtualisation.docker.enable = true;
environment.systemPackages = with pkgs; [
lazydocker

View file

@ -1,16 +1,11 @@
{
config,
lib,
mkOizysModule,
...
}: let
inherit (lib) mkEnableOption mkIf;
cfg = config.oizys.vbox;
in {
options.oizys.vbox.enable = mkEnableOption "enable virtualbox host";
config = mkIf cfg.enable {
virtualisation.virtualbox = {
host.enable = true;
};
users.extraGroups.vboxusers.members = ["daylin"];
}:
mkOizysModule config "vbox" {
virtualisation.virtualbox = {
host.enable = true;
};
users.extraGroups.vboxusers.members = ["daylin"];
}