Compare commits
No commits in common. "6e32ea5dee9e986ea685fdb9c4c2d9015d0474da" and "a50ae21c820de29f47fbc5cca3ecbc8de5d63414" have entirely different histories.
6e32ea5dee
...
a50ae21c82
110
flake.lock
generated
110
flake.lock
generated
@ -33,6 +33,22 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"flake-compat_2": {
|
"flake-compat_2": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1673956053,
|
||||||
|
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=",
|
||||||
|
"owner": "edolstra",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "edolstra",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-compat_3": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1696426674,
|
"lastModified": 1696426674,
|
||||||
@ -48,6 +64,24 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"flake-utils": {
|
||||||
|
"inputs": {
|
||||||
|
"systems": "systems"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1681202837,
|
||||||
|
"narHash": "sha256-H+Rh19JDwRtpVPAWp64F+rlEtxUWBAQW28eAi3SRSzg=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"rev": "cfacdce06f30d2b68473a46042957675eebb3401",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"home-manager": {
|
"home-manager": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@ -55,16 +89,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1747556831,
|
"lastModified": 1739757849,
|
||||||
"narHash": "sha256-Qb84nbYFFk0DzFeqVoHltS2RodAYY5/HZQKE8WnBDsc=",
|
"narHash": "sha256-Gs076ot1YuAAsYVcyidLKUMIc4ooOaRGO0PqTY7sBzA=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "d0bbd221482c2713cccb80220f3c9d16a6e20a33",
|
"rev": "9d3d080aec2a35e05a15cedd281c2384767c2cfe",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"ref": "release-25.05",
|
"ref": "release-24.11",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -92,16 +126,16 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1747953325,
|
"lastModified": 1741445498,
|
||||||
"narHash": "sha256-y2ZtlIlNTuVJUZCqzZAhIw5rrKP4DOSklev6c8PyCkQ=",
|
"narHash": "sha256-F5Em0iv/CxkN5mZ9hRn3vPknpoWdcdCyR0e4WklHwiE=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "55d1f923c480dadce40f5231feb472e81b0bab48",
|
"rev": "52e3095f6d812b91b22fb7ad0bfc1ab416453634",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"ref": "nixos-25.05",
|
"ref": "nixos-24.11",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -128,11 +162,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1748077877,
|
"lastModified": 1736528609,
|
||||||
"narHash": "sha256-sxWrjcRygvs7Fz9gxjSm54ul8+NtU29V+PLAPR6ZfY0=",
|
"narHash": "sha256-p0tYmTVnnFghamXEXD4w/lldCi604zIWDV4Ol9ubQ5g=",
|
||||||
"ref": "refs/heads/master",
|
"ref": "refs/heads/master",
|
||||||
"rev": "b23265403c87af272c74cda484a840b0f22306f5",
|
"rev": "8245a48cc75cc74dea1b3ca89cb58f24f8e14f85",
|
||||||
"revCount": 43,
|
"revCount": 42,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.project-cloud.net/asmir/nvim_flake"
|
"url": "https://git.project-cloud.net/asmir/nvim_flake"
|
||||||
},
|
},
|
||||||
@ -141,6 +175,28 @@
|
|||||||
"url": "https://git.project-cloud.net/asmir/nvim_flake"
|
"url": "https://git.project-cloud.net/asmir/nvim_flake"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"peerix": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": "flake-compat_2",
|
||||||
|
"flake-utils": "flake-utils",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1684706914,
|
||||||
|
"narHash": "sha256-pBlTtsC28e/5MUTe4NWeNNOc/4Kf6EzGQGppQEQ/ioo=",
|
||||||
|
"owner": "asmir.abdulahovic",
|
||||||
|
"repo": "peerix",
|
||||||
|
"rev": "8fdbbd0039240e05b4f93bbd5b454d5643e8a8d1",
|
||||||
|
"type": "gitlab"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "asmir.abdulahovic",
|
||||||
|
"repo": "peerix",
|
||||||
|
"type": "gitlab"
|
||||||
|
}
|
||||||
|
},
|
||||||
"project-cloud": {
|
"project-cloud": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@ -169,6 +225,7 @@
|
|||||||
"nix-xilinx": "nix-xilinx",
|
"nix-xilinx": "nix-xilinx",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nvim": "nvim",
|
"nvim": "nvim",
|
||||||
|
"peerix": "peerix",
|
||||||
"project-cloud": "project-cloud",
|
"project-cloud": "project-cloud",
|
||||||
"simple-nixos-mailserver": "simple-nixos-mailserver",
|
"simple-nixos-mailserver": "simple-nixos-mailserver",
|
||||||
"sops-nix": "sops-nix",
|
"sops-nix": "sops-nix",
|
||||||
@ -179,18 +236,18 @@
|
|||||||
"simple-nixos-mailserver": {
|
"simple-nixos-mailserver": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"blobs": "blobs",
|
"blobs": "blobs",
|
||||||
"flake-compat": "flake-compat_2",
|
"flake-compat": "flake-compat_3",
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"nixpkgs-24_11": "nixpkgs-24_11"
|
"nixpkgs-24_11": "nixpkgs-24_11"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1746937334,
|
"lastModified": 1740437053,
|
||||||
"narHash": "sha256-7g2GSePdYbpD1v5BxEVSCJ2Ogf4K5rc9sBB81FervUY=",
|
"narHash": "sha256-exPTta4qI1ka9sk+jPcLogGffJ1OVXnAsTRqpeAXeNw=",
|
||||||
"owner": "simple-nixos-mailserver",
|
"owner": "simple-nixos-mailserver",
|
||||||
"repo": "nixos-mailserver",
|
"repo": "nixos-mailserver",
|
||||||
"rev": "da66510f688b7eac54e3cac7c75be4b8dd78ce8b",
|
"rev": "c8ec4d5e432f5df4838eacd39c11828d23ce66ec",
|
||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -206,11 +263,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1746485181,
|
"lastModified": 1741043164,
|
||||||
"narHash": "sha256-PxrrSFLaC7YuItShxmYbMgSuFFuwxBB+qsl9BZUnRvg=",
|
"narHash": "sha256-9lfmSZLz6eq9Ygr6cCmvQiiBEaPb54pUBcjvbEMPORc=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "e93ee1d900ad264d65e9701a5c6f895683433386",
|
"rev": "3f2412536eeece783f0d0ad3861417f347219f4d",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -239,6 +296,21 @@
|
|||||||
"url": "https://git.project-cloud.net/asmir/swaysw"
|
"url": "https://git.project-cloud.net/asmir/swaysw"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"systems": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1681028828,
|
||||||
|
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"theme_anemone": {
|
"theme_anemone": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
|
34
flake.nix
34
flake.nix
@ -2,13 +2,18 @@
|
|||||||
description = "NixOS configuration";
|
description = "NixOS configuration";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.05";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11";
|
||||||
|
|
||||||
nix-xilinx = {
|
nix-xilinx = {
|
||||||
url = "gitlab:asmir.abdulahovic/nix-xilinx";
|
url = "gitlab:asmir.abdulahovic/nix-xilinx";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
peerix = {
|
||||||
|
url = "gitlab:asmir.abdulahovic/peerix";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
zremap = {
|
zremap = {
|
||||||
url = "git+https://git.project-cloud.net/asmir/zremap";
|
url = "git+https://git.project-cloud.net/asmir/zremap";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
@ -30,7 +35,7 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager/release-25.05";
|
url = "github:nix-community/home-manager/release-24.11";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -51,6 +56,7 @@
|
|||||||
nixpkgs,
|
nixpkgs,
|
||||||
nix-xilinx,
|
nix-xilinx,
|
||||||
nvim,
|
nvim,
|
||||||
|
peerix,
|
||||||
project-cloud,
|
project-cloud,
|
||||||
simple-nixos-mailserver,
|
simple-nixos-mailserver,
|
||||||
sops-nix,
|
sops-nix,
|
||||||
@ -82,6 +88,18 @@
|
|||||||
home-manager.extraSpecialArgs = { inherit inputs system; };
|
home-manager.extraSpecialArgs = { inherit inputs system; };
|
||||||
home-manager.backupFileExtension = "home_backup";
|
home-manager.backupFileExtension = "home_backup";
|
||||||
}
|
}
|
||||||
|
peerix.nixosModules.peerix
|
||||||
|
{
|
||||||
|
services.peerix = {
|
||||||
|
enable = true;
|
||||||
|
globalCacheTTL = 10;
|
||||||
|
package = peerix.packages.x86_64-linux.peerix;
|
||||||
|
openFirewall = true; # UDP/12304
|
||||||
|
privateKeyFile = nixy.config.sops.secrets."peerix/private".path;
|
||||||
|
publicKeyFile = ./nixy/peerix-public;
|
||||||
|
publicKey = "peerix-mediabox:UDgG3xdQYv7bmx2l4ZPNRPJtp2zMmY++H/fnGeJ9BQw=";
|
||||||
|
};
|
||||||
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -104,6 +122,18 @@
|
|||||||
home-manager.users.akill = import ./home/home.nix;
|
home-manager.users.akill = import ./home/home.nix;
|
||||||
home-manager.extraSpecialArgs = { inherit inputs system; };
|
home-manager.extraSpecialArgs = { inherit inputs system; };
|
||||||
}
|
}
|
||||||
|
peerix.nixosModules.peerix
|
||||||
|
{
|
||||||
|
services.peerix = {
|
||||||
|
enable = true;
|
||||||
|
globalCacheTTL = 10;
|
||||||
|
package = peerix.packages.x86_64-linux.peerix;
|
||||||
|
openFirewall = true; # UDP/12304
|
||||||
|
privateKeyFile = mediabox.config.sops.secrets."peerix/private".path;
|
||||||
|
publicKeyFile = ./mediabox/peerix-public;
|
||||||
|
publicKey = "peerix-nixy:8THqS0R2zWF/47ai0RFmqJnieYTZ1jaWOD9tnzpvA6s=";
|
||||||
|
};
|
||||||
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -88,7 +88,7 @@ in
|
|||||||
ao = "pipewire";
|
ao = "pipewire";
|
||||||
osd-bar = "no";
|
osd-bar = "no";
|
||||||
border = "no";
|
border = "no";
|
||||||
script-opts-set = "";
|
script-opts-set = "ytdl_hook-ytdl_path=yt-dlp,sponsorblock-local_database=no,sponsorblock-skip_categories=[sponsor,intro,selfpromo]";
|
||||||
ytdl-format = "bestvideo[height<=?1080]+bestaudio/best";
|
ytdl-format = "bestvideo[height<=?1080]+bestaudio/best";
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -162,6 +162,7 @@ in
|
|||||||
|
|
||||||
qutebrowser = {
|
qutebrowser = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
package = qutebrowser_firejail;
|
||||||
keyBindings = {
|
keyBindings = {
|
||||||
normal = {
|
normal = {
|
||||||
"j" = "scroll-px 0 25";
|
"j" = "scroll-px 0 25";
|
||||||
@ -252,26 +253,18 @@ in
|
|||||||
swayidle =
|
swayidle =
|
||||||
let
|
let
|
||||||
locker = pkgs.writeShellScriptBin "swaylock_fancy" ''
|
locker = pkgs.writeShellScriptBin "swaylock_fancy" ''
|
||||||
ALL_IMGS=""
|
|
||||||
LOCK_ARGS=""
|
|
||||||
for OUTPUT in $(${pkgs.sway}/bin/swaymsg -t get_outputs | ${lib.getExe pkgs.jq} -r '.[].name')
|
|
||||||
do
|
|
||||||
TMP_FILE=$(${pkgs.coreutils}/bin/mktemp /tmp/.swaylock_ss_XXXXXX.jpg)
|
TMP_FILE=$(${pkgs.coreutils}/bin/mktemp /tmp/.swaylock_ss_XXXXXX.jpg)
|
||||||
${lib.getExe pkgs.grim} -t ppm -o $OUTPUT - | \
|
${lib.getExe pkgs.grim} -t ppm - | ${pkgs.imagemagick}/bin/convert - -blur 0x12 "$TMP_FILE"
|
||||||
${lib.getExe pkgs.ffmpeg} -y -loglevel 0 -i - -vframes 1 -vf "boxblur=10" "$TMP_FILE"
|
${lib.getExe pkgs.swaylock} -f -i "$TMP_FILE"
|
||||||
LOCK_ARGS="$LOCK_ARGS --image $OUTPUT:$TMP_FILE"
|
${pkgs.coreutils}/bin/shred "$TMP_FILE"
|
||||||
ALL_IMGS="$ALL_IMGS $TMP_FILE"
|
${pkgs.coreutils}/bin/rm "$TMP_FILE"
|
||||||
done
|
|
||||||
${lib.getExe pkgs.swaylock} -f $LOCK_ARGS
|
|
||||||
${pkgs.coreutils}/bin/shred $ALL_IMGS
|
|
||||||
${pkgs.coreutils}/bin/rm $ALL_IMGS
|
|
||||||
'';
|
'';
|
||||||
in
|
|
||||||
/*
|
/*
|
||||||
refresh_i3status = pkgs.writeShellScriptBin "refresh_i3status" ''
|
refresh_i3status = pkgs.writeShellScriptBin "refresh_i3status" ''
|
||||||
${pkgs.coreutils}/bin/sleep 1 && ${pkgs.procps}/bin/pkill -USR1 i3status-rs
|
${pkgs.coreutils}/bin/sleep 1 && ${pkgs.procps}/bin/pkill -USR1 i3status-rs
|
||||||
'';
|
'';
|
||||||
*/
|
*/
|
||||||
|
in
|
||||||
{
|
{
|
||||||
enable = true;
|
enable = true;
|
||||||
events = [
|
events = [
|
||||||
|
@ -55,6 +55,7 @@ in
|
|||||||
[
|
[
|
||||||
anydesk
|
anydesk
|
||||||
appimage-run
|
appimage-run
|
||||||
|
ark
|
||||||
arp-scan
|
arp-scan
|
||||||
birdtray
|
birdtray
|
||||||
blackmagic
|
blackmagic
|
||||||
@ -63,10 +64,9 @@ in
|
|||||||
cached-nix-shell
|
cached-nix-shell
|
||||||
caddy
|
caddy
|
||||||
cargo
|
cargo
|
||||||
|
ungoogled-chromium
|
||||||
cmake
|
cmake
|
||||||
compsize
|
compsize
|
||||||
kdePackages.ark
|
|
||||||
ungoogled-chromium
|
|
||||||
# cura
|
# cura
|
||||||
deluge
|
deluge
|
||||||
dfu-util
|
dfu-util
|
||||||
@ -92,7 +92,7 @@ in
|
|||||||
imv
|
imv
|
||||||
inkscape
|
inkscape
|
||||||
jellyfin-media-player
|
jellyfin-media-player
|
||||||
kdePackages.kdenlive
|
kdenlive
|
||||||
kicad
|
kicad
|
||||||
kodi-wayland
|
kodi-wayland
|
||||||
krita
|
krita
|
||||||
@ -148,7 +148,6 @@ in
|
|||||||
thunderbird
|
thunderbird
|
||||||
typst
|
typst
|
||||||
upx
|
upx
|
||||||
viber
|
|
||||||
waybar
|
waybar
|
||||||
wdisplays
|
wdisplays
|
||||||
weechat
|
weechat
|
||||||
@ -178,6 +177,7 @@ in
|
|||||||
]
|
]
|
||||||
++ [
|
++ [
|
||||||
inputs.swaysw.packages.${system}.swaysw
|
inputs.swaysw.packages.${system}.swaysw
|
||||||
|
(pkgs.callPackage ../packages/viber/default.nix { })
|
||||||
(pkgs.callPackage ../packages/bubblewrap/default.nix { })
|
(pkgs.callPackage ../packages/bubblewrap/default.nix { })
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -17,6 +17,7 @@ let
|
|||||||
${lib.getExe pkgs.grim} -g "$GEOM" - | ${pkgs.wl-clipboard}/bin/wl-copy
|
${lib.getExe pkgs.grim} -g "$GEOM" - | ${pkgs.wl-clipboard}/bin/wl-copy
|
||||||
'';
|
'';
|
||||||
swaysw = inputs.swaysw.packages.${system}.swaysw;
|
swaysw = inputs.swaysw.packages.${system}.swaysw;
|
||||||
|
viber = pkgs.callPackage ../packages/viber/default.nix { };
|
||||||
term = "${pkgs.foot}/bin/footclient";
|
term = "${pkgs.foot}/bin/footclient";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
@ -145,7 +146,7 @@ in
|
|||||||
"Mod4+j" =
|
"Mod4+j" =
|
||||||
"exec ${pkgs.sway}/bin/swaymsg [app_id=com.rtosta.zapzap] scratchpad show || exec ${lib.getExe pkgs.zapzap}";
|
"exec ${pkgs.sway}/bin/swaymsg [app_id=com.rtosta.zapzap] scratchpad show || exec ${lib.getExe pkgs.zapzap}";
|
||||||
"Mod4+h" =
|
"Mod4+h" =
|
||||||
"exec ${pkgs.sway}/bin/swaymsg [app_id=com.viber] scratchpad show || exec ${pkgs.viber}/bin/viber";
|
"exec ${pkgs.sway}/bin/swaymsg [app_id=com.viber] scratchpad show || exec ${viber}/bin/viber";
|
||||||
"Mod4+y" =
|
"Mod4+y" =
|
||||||
''exec ${pkgs.sway}/bin/swaymsg [app_id="pulsemixer"] scratchpad show || exec ${term} -a pulsemixer ${lib.getExe pkgs.pulsemixer}'';
|
''exec ${pkgs.sway}/bin/swaymsg [app_id="pulsemixer"] scratchpad show || exec ${term} -a pulsemixer ${lib.getExe pkgs.pulsemixer}'';
|
||||||
"Mod4+p" = "exec ${lib.getExe pkgs.tessen} -a copy";
|
"Mod4+p" = "exec ${lib.getExe pkgs.tessen} -a copy";
|
||||||
|
@ -72,7 +72,7 @@
|
|||||||
|
|
||||||
envExtra = '''';
|
envExtra = '''';
|
||||||
|
|
||||||
initContent = ''
|
initExtra = ''
|
||||||
# binds
|
# binds
|
||||||
bindkey '^K' fzf-file-widget
|
bindkey '^K' fzf-file-widget
|
||||||
|
|
||||||
|
@ -366,13 +366,13 @@
|
|||||||
|
|
||||||
# This allows the wireguard server to route your traffic to the internet and hence be like a VPN
|
# This allows the wireguard server to route your traffic to the internet and hence be like a VPN
|
||||||
# For this to work you have to set the dnsserver IP of your router (or dnsserver of choice) in your clients
|
# For this to work you have to set the dnsserver IP of your router (or dnsserver of choice) in your clients
|
||||||
#postSetup = ''
|
postSetup = ''
|
||||||
# ${pkgs.nftables}/bin/nft add rule ip nat POSTROUTING oifname "eth0" ip saddr 10.100.0.0/24 counter masquerade
|
${pkgs.nftables}/bin/nft add rule ip nat POSTROUTING oifname "eth0" ip saddr 10.100.0.0/24 counter masquerade
|
||||||
#'';
|
'';
|
||||||
# This undoes the above command, TODO fix command below to be more specific
|
# This undoes the above command, TODO fix command below to be more specific
|
||||||
#postShutdown = ''
|
postShutdown = ''
|
||||||
# ${pkgs.nftables}/bin/nft flush table ip nat
|
${pkgs.nftables}/bin/nft flush table ip nat
|
||||||
#'';
|
'';
|
||||||
privateKeyFile = config.sops.secrets."wg_privkey".path;
|
privateKeyFile = config.sops.secrets."wg_privkey".path;
|
||||||
|
|
||||||
peers = [
|
peers = [
|
||||||
|
@ -16,7 +16,7 @@ in
|
|||||||
system.stateVersion = "23.05";
|
system.stateVersion = "23.05";
|
||||||
system.autoUpgrade.enable = false;
|
system.autoUpgrade.enable = false;
|
||||||
system.switch = {
|
system.switch = {
|
||||||
enable = true;
|
enable = false;
|
||||||
enableNg = true;
|
enableNg = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -237,7 +237,7 @@ in
|
|||||||
binfmt = true;
|
binfmt = true;
|
||||||
};
|
};
|
||||||
nix-ld = {
|
nix-ld = {
|
||||||
enable = false;
|
enable = true;
|
||||||
libraries = with pkgs; [
|
libraries = with pkgs; [
|
||||||
stdenv.cc.cc.lib
|
stdenv.cc.cc.lib
|
||||||
zlib
|
zlib
|
||||||
|
Loading…
Reference in New Issue
Block a user