Compare commits

...

999 commits
v0.1 ... main

Author SHA1 Message Date
02bcc3ede9
fix: deprecations 2025-07-27 17:19:13 +02:00
67b04a636c
fix(checks): formating 2025-07-27 17:16:00 +02:00
730a4b80b5
feat(agares): remove unused host 2025-07-27 17:14:11 +02:00
578d4526e5
chore: clean up nixos configurations
Consolidate nixpkgs instances into once for all x86 systems
2025-07-27 15:13:36 +02:00
712cca5909
feat(stolas): use larger swapfile 2025-07-27 01:23:13 +02:00
9ec0688652
chore(stolas): remove unused option for combined sleep target 2025-07-27 01:00:17 +02:00
03c6c141ee
feat(stolas): replace zram with zswap 2025-07-27 00:55:31 +02:00
0909933ba9
chore(stolas): cleanup config 2025-07-27 00:29:42 +02:00
618a4b3a73
fix(stolas): suspend from disk and wifi suspend 2025-07-27 00:21:39 +02:00
b12aac6421
feat(ninurta): remove hydra 2025-07-26 21:32:35 +02:00
76f29fae24
fix(ninurta): remove unused postresql backup 2025-07-26 21:22:08 +02:00
763d8f4783
fix(admin): set shell always from admins.nix 2025-07-26 21:21:46 +02:00
5d55e620da
chore: fix formatting and add treefmt 2025-07-26 20:56:40 +02:00
a26418c9c3
fix(ninurta): only run snapshots daily to limit noise 2025-07-26 20:23:08 +02:00
66fceb6b15
feat(stolas): add snapper snapshots 2025-07-26 20:23:08 +02:00
651ecbc9c4
chore(secrets): rekey 2025-07-26 18:28:19 +02:00
8908833eb3
feat(stolas): migrate paperless 2025-07-26 18:24:16 +02:00
cfb4b8d160
fix(stolas): wheel needs password to sudo 2025-07-26 18:16:17 +02:00
2e8aa80b70
feat(stolas): enable admin module 2025-07-26 16:07:13 +02:00
5f9eac5700
chore(flake): update lockfile 2025-07-26 15:45:37 +02:00
77cdf773c0
feat(stolas): enable TPM2 LUKS keyslot 2025-07-26 15:24:04 +02:00
215f4313bd
fixup: backup secrets 2025-07-21 21:25:30 +02:00
a45a48cf17
fix(stolas): comment out paperless secrets config 2025-07-21 21:21:53 +02:00
49722f705a
fix(stolas): disable GS location backup 2025-07-21 21:20:12 +02:00
ae419eb19a
chore: rekey 2025-07-21 21:15:35 +02:00
427b62fe07
fix(stolas): name of dm-crypt container 2025-07-21 21:06:18 +02:00
fc2f547919
fix(stolas): allow unfree firmware 2025-07-21 20:07:54 +02:00
b8be17a9a9
fix(stolas): enable lanzaboote and additional firmware 2025-07-21 20:05:29 +02:00
502d9aa4dc
fix(stolas): add UUID for root luks device to kernel commandline 2025-07-21 18:14:56 +02:00
d81761e519
fix(stolas): update hardware config 2025-07-21 17:39:21 +02:00
d618890198
feat(stolas): add name of NVME device 2025-07-21 17:22:31 +02:00
bdeb5584de
fix: move paperless config to module 2025-07-17 21:47:49 +02:00
f602f150ba
feat(stolas): add backup config 2025-07-17 21:41:56 +02:00
e58a47af3f
feat(stolas): disko for disk setup 2025-07-13 21:53:43 +02:00
0b08beee35
feat(stolas): set initial hashed password 2025-07-13 20:41:06 +02:00
0e9b76da48
fix: some deprecations 2025-07-13 20:36:26 +02:00
1f9c599c40
chore: Update flake.lock
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/a4bac2b9ba2f9bd68032880da8ae6b44fbc46047' (2025-06-24)
  → 'github:nix-community/home-manager/392ddb642abec771d63688c49fa7bcbb9d2a5717' (2025-07-12)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/ee07ba0d36c38e9915c55d2ac5a8fb0f05f2afcc' (2025-05-19)
  → 'github:nix-community/nixos-generators/032decf9db65efed428afd2fa39d80f7089085eb' (2025-07-07)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/1552a9f4513f3f0ceedcf90320e48d3d47165712' (2025-06-20)
  → 'github:NixOS/nixos-hardware/7ced9122cff2163c6a0212b8d1ec8c33a1660806' (2025-07-09)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/4206c4cb56751df534751b058295ea61357bbbaa' (2025-06-21)
  → 'github:NixOS/nixpkgs/9807714d6944a957c2e036f84b0ff8caf9930bc0' (2025-07-08)
• Updated input 'nixpkgs-small':
    'github:NixOS/nixpkgs/4396a137499b6cc9f9fe9f3c266577bd52d455a4' (2025-06-24)
  → 'github:NixOS/nixpkgs/d3807bc34e7d086b4754e1c842505570e23f9d01' (2025-07-12)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/a05be418a1af1198ca0f63facb13c985db4cb3c5' (2025-06-06)
  → 'github:numtide/treefmt-nix/c9d477b5d5bd7f26adddd3f96cfd6a904768d4f9' (2025-07-09)
2025-07-12 09:57:54 +02:00
a414e85e51
feat: add driver package for ticket printer 2025-07-12 09:56:07 +02:00
f23cbdf69c
fix(flake): update inputs 2025-06-24 19:04:13 +02:00
c53d67a788
fix(gorgon): comment out failing ensurePrinters 2025-06-24 15:10:32 +02:00
89b763e9f8
fix(home): replace broken http-prompt 2025-06-24 14:46:01 +02:00
e1b8001407
fix: replace redundant home-manager input 2025-06-24 14:45:47 +02:00
205358ae77
chore(flake): update 2025-06-24 13:59:46 +02:00
b8bab96d14
feat(gorgon): enable zram swap 2025-06-24 13:53:31 +02:00
60a71a7805
chore(flake.lock): Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/4835b1dc898959d8547a871ef484930675cb47f1' (2025-05-18)
  → 'github:ryantm/agenix/531beac616433bac6f9e2a19feb8e99a22a66baf' (2025-06-17)
• Updated input 'home-manager':
    'github:nix-community/home-manager/06451df423dd5e555f39857438ffc16c5b765862' (2025-06-08)
  → 'github:nix-community/home-manager/4c9e99e8e8e36bcdfa9cdb102e45e4dc95aa5c5b' (2025-06-23)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/4602f7e1d3f197b3cb540d5accf5669121629628' (2025-06-06)
  → 'github:NixOS/nixos-hardware/1552a9f4513f3f0ceedcf90320e48d3d47165712' (2025-06-20)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/d3d2d80a2191a73d1e86456a751b83aa13085d7d' (2025-06-05)
  → 'github:NixOS/nixpkgs/4206c4cb56751df534751b058295ea61357bbbaa' (2025-06-21)
• Updated input 'nixpkgs-small':
    'github:NixOS/nixpkgs/6dbd508802ef3f74cf792a25b653861ed8360a80' (2025-06-07)
  → 'github:NixOS/nixpkgs/3233bc422b7c868fe5c853e82888d5dbbbd9f0c6' (2025-06-23)
2025-06-23 13:15:02 +02:00
1c96f0b762
feat(home): add thunderbird 2025-06-23 13:13:28 +02:00
56af1ef221
chore: update dependencies 2025-06-08 15:37:30 +02:00
1402ee13cc
chore: reformat 2025-06-03 20:04:44 +02:00
b638c4125b
chore: update dependencies 2025-06-03 19:51:43 +02:00
74fd474e4a
fix: put tmps into RAM 2025-05-25 14:47:09 +02:00
22a525b5b3
feat: switch to KDE 2025-05-25 14:35:05 +02:00
0c12c8de35
fix(surgat): initrd networking 2025-05-17 15:02:31 +02:00
33bc06ee10
fix(surgat): ssh initrd unlock 2025-05-17 14:01:36 +02:00
cb69d8edb0
fix: set maximum log retention to 100 days 2025-05-17 13:43:46 +02:00
0d892a1b7e
feat: switch to lix from nixpkgs 2025-05-17 13:05:33 +02:00
6ca9dde866
chore: update nixpkgs 2025-05-17 12:49:05 +02:00
091c4243fe
chore: update nixpkgs 2025-05-17 12:38:15 +02:00
787ff18874
Revert "chore: make prompt and shell pretty"
This reverts commit 65720489b5.
2025-05-17 12:36:19 +02:00
8baeff1f36
Revert "feat: switch to black on white theme"
This reverts commit cde3f39c11.
2025-05-17 12:34:08 +02:00
8d54f859a0
Revert "fix: bw theme popovers in tmux and helix"
This reverts commit 5acfc7ecdd.
2025-05-17 12:34:06 +02:00
2917f96631
chore: update lix module 2025-05-17 12:30:20 +02:00
210fa098ae
fix: remove commented out line 2025-05-17 12:27:36 +02:00
033328e893
feat(home): add poweralertd 2025-05-17 12:27:21 +02:00
65720489b5
chore: make prompt and shell pretty 2025-04-27 21:45:36 +02:00
a934dca7b6
feat: add dune 3d 2025-04-27 19:47:43 +02:00
687cb32400
feat: switch to unstable channel for gorgon 2025-04-27 19:38:01 +02:00
fce74c64a9
chore: update inputs 2025-04-19 15:23:46 +02:00
5acfc7ecdd
fix: bw theme popovers in tmux and helix 2025-04-15 20:37:03 +02:00
cde3f39c11
feat: switch to black on white theme 2025-04-13 20:56:56 +02:00
d257a18c2c
feat: add chromium 2025-04-13 19:09:17 +02:00
cc80c71f88
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/de6fc5551121c59c01e2a3d45b277a6d05077bc4' (2025-03-31)
  → 'github:NixOS/nixos-hardware/1fe3cc2bc5d2dc9c81cb4e63d2f67c1543340df1' (2025-04-11)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/db8f4fe18ce772a9c8f3adf321416981c8fe9371' (2025-04-07)
  → 'github:NixOS/nixpkgs/86484f6076aac9141df2bfcddbf7dcfce5e0c6bb' (2025-04-12)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/a880f49904d68b5e53338d1e8c7bf80f59903928' (2025-04-06)
  → 'github:NixOS/nixpkgs/26d499fc9f1d567283d5d56fcf367edd815dba1d' (2025-04-12)
2025-04-13 15:33:20 +02:00
eb0b01a17d
fix: sway scaling, wallpaper, gaps 2025-04-13 15:32:01 +02:00
cf328ce296
update flake 2025-04-08 20:40:39 +02:00
5049c9f019
feat: add nix-output-monitor 2025-04-06 18:06:06 +02:00
eff41d31e6
chore: update inputs 2025-04-05 18:53:39 +02:00
5e160905c0
feat: add fuzzel 2025-03-31 20:31:17 +02:00
d3c2fd9fad
feat: android studio 2025-03-31 20:22:22 +02:00
3be5c51bc7
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/f7795ede5b02664b57035b3b757876703e2c3eac' (2024-12-31)
  → 'github:numtide/devshell/7c9e793ebe66bcba8292989a68c0419b737a22a0' (2025-03-08)
• Updated input 'home-manager':
    'github:nix-community/home-manager/9d3d080aec2a35e05a15cedd281c2384767c2cfe' (2025-02-17)
  → 'github:nix-community/home-manager/0948aeedc296f964140d9429223c7e4a0702a1ff' (2025-03-22)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/507911df8c35939050ae324caccc7cf4ffb76565' (2025-03-02)
  → 'github:nix-community/nixos-generators/42ee229088490e3777ed7d1162cb9e9d8c3dbb11' (2025-03-21)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/b48cc4dab0f9711af296fc367b6108cf7b8ccb16' (2025-03-07)
  → 'github:NixOS/nixos-hardware/ecaa2d911e77c265c2a5bac8b583c40b0f151726' (2025-03-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/9290fda826610430b3fc8cc98443c3a2faaaf151' (2025-03-07)
  → 'github:NixOS/nixpkgs/d02d88f8de5b882ccdde0465d8fa2db3aa1169f7' (2025-03-25)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/48913d8f9127ea6530a2a2f1bd4daa1b8685d8a3' (2025-03-05)
  → 'github:NixOS/nixpkgs/f0946fa5f1fb876a9dc2e1850d9d3a4e3f914092' (2025-03-23)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/3d0579f5cc93436052d94b73925b48973a104204' (2025-02-17)
  → 'github:numtide/treefmt-nix/61c88349bf6dff49fa52d7dfc39b21026c2a8881' (2025-03-26)
2025-03-26 20:36:16 +01:00
4ea70d86d2
feat(home): bind swaylock to mod end 2025-03-26 20:33:35 +01:00
b5318b48ad
gorgon: add working printer config 2025-03-13 20:35:36 +01:00
87cb376d4d
chore: update inputs 2025-03-07 17:55:27 +01:00
8cfa70e239
chore: update nixpkgs 2025-02-24 20:57:18 +01:00
86e5c155bf
fix(home): adwaita cursor 2025-02-02 13:07:59 +01:00
5f67272146
feat(home): move swaybar to bottom 2025-02-02 11:27:52 +01:00
77e6017e57
chore: update flake lock 2025-02-01 19:48:37 +01:00
b954f71819
feat(home): template sway config with colors 2025-01-25 17:43:38 +01:00
d68d4fb0d0
fix(home): prefer adwaita light theme variant 2025-01-25 14:38:52 +01:00
230d105a47
feat: add kanshictl to path 2025-01-25 14:04:14 +01:00
2977d1712e
feat: lock password DB before locking screen 2025-01-25 14:03:39 +01:00
2688a624dd
feat: bind swaylock 2025-01-25 13:41:53 +01:00
e4c603b692
chore: update flake.lock
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/74b8e31dd709760c86eed16b6c1d0b88d7360937' (2025-01-13)
  → 'github:nix-community/nixos-generators/d002ce9b6e7eb467cd1c6bb9aef9c35d191b5453' (2025-01-16)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/8870dcaff63dfc6647fb10648b827e9d40b0a337' (2025-01-09)
  → 'github:NixOS/nixos-hardware/dfad538f751a5aa5d4436d9781ab27a6128ec9d4' (2025-01-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/a78c63a084314c55196488cf2252c5f6ea5c67a4' (2025-01-14)
  → 'github:NixOS/nixpkgs/035f8c0853c2977b24ffc4d0a42c74f00b182cd8' (2025-01-23)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/67e9c880898889470f153157a96b595e758167fc' (2025-01-13)
  → 'github:NixOS/nixpkgs/035f8c0853c2977b24ffc4d0a42c74f00b182cd8' (2025-01-23)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/13c913f5deb3a5c08bb810efd89dc8cb24dd968b' (2025-01-06)
  → 'github:numtide/treefmt-nix/f2cc121df15418d028a59c9737d38e3a90fbaf8f' (2025-01-21)
2025-01-25 13:17:14 +01:00
c5a0cf2dd8
feat(home): add vegur font 2025-01-25 13:15:14 +01:00
99e3eaa034
fix: rotate SSH key
Too many PIN attempts.
2025-01-16 18:38:51 +01:00
2486f4c1a6
feat: remove weechat 2025-01-14 20:16:06 +01:00
7cd9d8c480
fix: disable huge swapfile 2025-01-14 20:10:36 +01:00
02fcfe7b1d
fix: formating 2025-01-14 19:59:42 +01:00
21ad250fe7
chore: update flake.lock 2025-01-14 19:57:35 +01:00
6719d76de8
chore: Update flake.lock
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/dd6b80932022cea34a019e2bb32f6fa9e494dfef' (2024-10-07)
  → 'github:numtide/devshell/f7795ede5b02664b57035b3b757876703e2c3eac' (2024-12-31)
• Updated input 'home-manager':
    'github:nix-community/home-manager/80b0fdf483c5d1cb75aaad909bd390d48673857f' (2024-12-16)
  → 'github:nix-community/home-manager/bd65bc3cde04c16755955630b344bc9e35272c56' (2025-01-08)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/def1d472c832d77885f174089b0d34854b007198' (2024-12-23)
  → 'github:NixOS/nixos-hardware/8870dcaff63dfc6647fb10648b827e9d40b0a337' (2025-01-09)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/1dd8f51e62c0ff199e551744ab46fc4fbe6f827a' (2024-12-26)
  → 'github:NixOS/nixpkgs/87d46406d6280e1c064bc5df10ebd09ce3113cb3' (2025-01-12)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/4005c3ff7505313cbc21081776ad0ce5dfd7a3ce' (2024-12-25)
  → 'github:NixOS/nixpkgs/1dab772dd4a68a7bba5d9460685547ff8e17d899' (2025-01-10)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/9e09d30a644c57257715902efbb3adc56c79cf28' (2024-12-25)
  → 'github:numtide/treefmt-nix/13c913f5deb3a5c08bb810efd89dc8cb24dd968b' (2025-01-06)
2025-01-12 19:44:42 +01:00
da0069de8c
feat: install nixfmt-rfc-style 2024-12-27 16:41:09 +01:00
4e869e2cf0
fix: formating issues in prompt 2024-12-27 15:30:19 +01:00
835bd775ae
chore: update flake lock 2024-12-26 20:35:53 +01:00
09ca9341f9
feat(ninurta): make firewall configuration a little more restrictive 2024-12-20 23:53:38 +01:00
12b4614fc7
feat(ninurta): disable hydra 2024-12-20 23:53:21 +01:00
fe7dd57bc1
feat(gorgon): adapt power management options 2024-12-20 23:27:42 +01:00
87649ec999
fix(ninurta): printer address 2024-12-20 23:09:09 +01:00
f67e77eaa1
fix(ninurta): configure bridge 2024-12-16 19:28:20 +01:00
2129924e78
feat: add bridge device for home assistant 2024-12-16 18:59:14 +01:00
022507887d
feat: allow connection to ssh via 2222 2024-12-15 21:03:31 +01:00
28200e1a8f
fix: update lix 2024-12-14 21:40:19 +01:00
10876b113e
feat(devshell): add nixd, remove nil 2024-12-14 21:21:04 +01:00
da45c02655
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/c7ffc9727d115e433fd884a62dc164b587ff651d' (2024-12-07)
  → 'github:nix-community/home-manager/1318c3f3b068cdcea922fa7c1a0a1f0c96c22f5f' (2024-12-11)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/8cdaf8885c9c85d9d27b594dbe882406aadfe00e' (2024-12-05)
  → 'github:nix-community/nixos-generators/d162ffdf0a30f3d19e67df5091d6744ab8b9229f' (2024-12-12)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/0e4fdd4a0ab733276b6d2274ff84ae353f17129e' (2024-12-01)
  → 'github:nix-community/nixpkgs.lib/f4dc9a6c02e5e14d91d158522f69f6ab4194eb5b' (2024-12-08)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/e563803af3526852b6b1d77107a81908c66a9fcf' (2024-12-06)
  → 'github:NixOS/nixos-hardware/cf737e2eba82b603f54f71b10cb8fd09d22ce3f5' (2024-12-10)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/5e7591e5e8c8cddc1e9c7cad01033e6c2d560cd0' (2024-12-08)
  → 'github:NixOS/nixpkgs/8e21c38b7d24eadf3ef672a65a1cc927015d2197' (2024-12-13)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/4dc2fc4e62dbf62b84132fe526356fbac7b03541' (2024-12-05)
  → 'github:NixOS/nixpkgs/a0f3e10d94359665dba45b71b4227b0aeb851f8e' (2024-12-10)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/50862ba6a8a0255b87377b9d2d4565e96f29b410' (2024-12-05)
  → 'github:numtide/treefmt-nix/0ce9d149d99bc383d1f2d85f31f6ebd146e46085' (2024-12-09)
2024-12-14 21:13:53 +01:00
b059d11f63
feat(ninurta): remove desktop config 2024-12-08 13:32:44 +01:00
3b12ac46af
chore(flake.lock): update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/f3111f62a23451114433888902a55cf0692b408d' (2024-11-24)
  → 'github:nix-community/home-manager/c7ffc9727d115e433fd884a62dc164b587ff651d' (2024-12-07)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/098e8b6ff72c86944a8d54b64ddd7b7e6635830a' (2024-11-25)
  → 'github:nix-community/nixos-generators/8cdaf8885c9c85d9d27b594dbe882406aadfe00e' (2024-12-05)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/87b6978992e2eb605732fba842cad0a7e14b2047' (2024-11-24)
  → 'github:nix-community/nixpkgs.lib/0e4fdd4a0ab733276b6d2274ff84ae353f17129e' (2024-12-01)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/45348ad6fb8ac0e8415f6e5e96efe47dd7f39405' (2024-11-24)
  → 'github:NixOS/nixos-hardware/e563803af3526852b6b1d77107a81908c66a9fcf' (2024-12-06)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/d44a276324b63ff7ca4254b7ea51d5bac7eb6c64' (2024-12-01)
  → 'github:NixOS/nixpkgs/5e7591e5e8c8cddc1e9c7cad01033e6c2d560cd0' (2024-12-08)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/62c435d93bf046a5396f3016472e8f7c8e2aed65' (2024-11-30)
  → 'github:NixOS/nixpkgs/4dc2fc4e62dbf62b84132fe526356fbac7b03541' (2024-12-05)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/6209c381904cab55796c5d7350e89681d3b2a8ef' (2024-11-29)
  → 'github:numtide/treefmt-nix/50862ba6a8a0255b87377b9d2d4565e96f29b410' (2024-12-05)
2024-12-08 13:29:58 +01:00
96dcd17947
feat(gorgon): enable ssh-agent 2024-12-08 13:10:22 +01:00
776f7d2000
feat(laptop): remove ssh agent enable by default 2024-12-08 13:04:37 +01:00
4e44dc164a
fix: enable backup1 2024-12-08 13:03:45 +01:00
fc4521750d
fix(ninurta): ssh port 2024-12-01 19:05:49 +01:00
eb81a1fedf
feat: count failed units in status 2024-12-01 15:16:01 +01:00
dbb636e7df
fix: remove failing units 2024-12-01 14:43:32 +01:00
165c9822b9
chore(flake.lock): Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/3280fdde8c8f0276c9f5286ad5c0f433dfa5d56c' (2024-11-21)
  → 'github:nix-community/nixos-generators/098e8b6ff72c86944a8d54b64ddd7b7e6635830a' (2024-11-25)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/b9f04e3cf71c23bea21d2768051e6b3068d44734' (2024-11-17)
  → 'github:nix-community/nixpkgs.lib/87b6978992e2eb605732fba842cad0a7e14b2047' (2024-11-24)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/672ac2ac86f7dff2f6f3406405bddecf960e0db6' (2024-11-16)
  → 'github:NixOS/nixos-hardware/45348ad6fb8ac0e8415f6e5e96efe47dd7f39405' (2024-11-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/9bbcb9a5a7e54369faaced5fb0ddad1fda21b751' (2024-11-22)
  → 'github:NixOS/nixpkgs/d44a276324b63ff7ca4254b7ea51d5bac7eb6c64' (2024-12-01)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/057f63b6dc1a2c67301286152eb5af20747a9cb4' (2024-11-16)
  → 'github:NixOS/nixpkgs/62c435d93bf046a5396f3016472e8f7c8e2aed65' (2024-11-30)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/705df92694af7093dfbb27109ce16d828a79155f' (2024-11-22)
  → 'github:numtide/treefmt-nix/6209c381904cab55796c5d7350e89681d3b2a8ef' (2024-11-29)
2024-12-01 14:12:39 +01:00
429f906a1a
feat: add status script 2024-11-30 21:06:38 +01:00
cf26daecee
fix: actually start kanshi 2024-11-25 00:03:44 +01:00
71de974847
fix: disable shared shell history
There is some bug preventing the fzf history selection from the widget
to be pasted.
2024-11-25 00:02:41 +01:00
bd89f8498e
feat: update wallpaper 2024-11-25 00:02:08 +01:00
168056ce39
chore: upgrade to 24.11 2024-11-24 19:16:34 +01:00
0a6e4f99c4
feat: configure sway 2024-11-24 18:48:14 +01:00
4e9118e373
feat(home): add foot config 2024-11-24 18:28:34 +01:00
3bf0f03c0b
feat: remove unused nixos/sway module 2024-11-24 16:08:10 +01:00
c70621ece1
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/06ffce1a8d95e95c06a4bcfa117dd960b14a7101' (2024-11-14)
  → 'github:nix-community/nixos-generators/3280fdde8c8f0276c9f5286ad5c0f433dfa5d56c' (2024-11-21)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/e04234d263750db01c78a412690363dc2226e68a' (2024-11-10)
  → 'github:nix-community/nixpkgs.lib/b9f04e3cf71c23bea21d2768051e6b3068d44734' (2024-11-17)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/035d434d48f4375ac5d3a620954cf5fda7dd7c36' (2024-11-15)
  → 'github:NixOS/nixpkgs/df94f897ffe1af1bcd60cb68697c5d8e6431346e' (2024-11-22)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/c21b77913ea840f8bcf9adf4c41cecc2abffd38d' (2024-11-15)
  → 'github:NixOS/nixpkgs/e8c38b73aeb218e27163376a2d617e61a2ad9b59' (2024-11-16)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/746901bb8dba96d154b66492a29f5db0693dbfcc' (2024-10-30)
  → 'github:numtide/treefmt-nix/705df92694af7093dfbb27109ce16d828a79155f' (2024-11-22)
2024-11-24 16:00:50 +01:00
806da7a646
feat: add udev rules from libsigrok 2024-11-24 15:58:42 +01:00
b7ed2f7ec0
feat(home): remove jujutsu from pkgs 2024-11-17 00:50:21 +01:00
3824effcb6
chore: update dependencies 2024-11-17 00:36:34 +01:00
80bbfb43ac
feat(ninurta): remove agares from monitoring 2024-11-10 15:34:29 +01:00
c256637ddd
chore: update flake.lock
Flake lock file updates:

• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/64d900abe40057393148bc0283d35c2254dd4f57' (2024-10-23)
  → 'github:NixOS/nixos-hardware/07d15e8990d5d86a631641b4c429bc0a7400cfb8' (2024-10-29)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/f885d67e3dbd2afe0c779a9f763ddf7a4b603d97' (2024-10-23)
  → 'github:NixOS/nixpkgs/6aa8749b515f9dec000b24794b2787b64037db51' (2024-10-29)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/89172919243df199fe237ba0f776c3e3e3d72367' (2024-10-20)
  → 'github:NixOS/nixpkgs/64b80bfb316b57cdb8919a9110ef63393d74382a' (2024-10-28)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/aac86347fb5063960eccb19493e0cadcdb4205ca' (2024-10-22)
  → 'github:numtide/treefmt-nix/9ef337e492a5555d8e17a51c911ff1f02635be15' (2024-10-28)
2024-10-30 21:08:35 +01:00
61530cc513
feat: power management settings 2024-10-30 21:00:27 +01:00
8317113c6b
chore: update nixpkgs 2024-10-23 21:33:16 +02:00
0ea73f3187
fix: enable ACME for weechat.dadada.li 2024-10-09 21:18:56 +02:00
34ae7f3748
chore: update flake inputs 2024-09-26 10:16:38 +02:00
11ac1b84b7
feat: upgrade to Lix 2024-09-20 18:23:32 +02:00
532c25a0c5
chore: update flake inputs 2024-09-20 16:34:40 +02:00
9d91b03886
chore: update homepage 2024-08-25 17:53:19 +02:00
fc616b7be6
fix: use tar.gz archive instead of git URL 2024-08-16 15:33:58 +02:00
16e42c3177
fix: gitea urls 2024-08-16 15:24:22 +02:00
b4889eec64
chore: update flake inputs 2024-08-13 17:35:33 +02:00
e809610a63
feat: install krita and solvespace 2024-08-13 17:34:10 +02:00
5c9eec85a1
feat: add switcher extension to gnome shell 2024-08-13 17:33:48 +02:00
879370e4a8
fix: nar hash of homepage 2024-08-13 17:33:29 +02:00
54988b2d84
flake.lock: Update
Flake lock file updates:

• Updated input 'homepage':
    'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-PdJ1RA11vx3tM09YYAv3qAlKzENCZZITefHv6KbYhcY%3D'
  → 'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-/ir2S0iPNVw5btUtMpmeMy9gKGe/CC7KPrZiK1SFpEQ%3D'
2024-08-08 22:27:26 +02:00
09ee4d5f16
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/1ebbe68d57457c8cae98145410b164b5477761f4' (2024-06-03)
  → 'github:numtide/devshell/67cce7359e4cd3c45296fb4aaf6a19e2a9c757ae' (2024-07-27)
• Removed input 'devshell/flake-utils'
• Removed input 'devshell/flake-utils/systems'
• Updated input 'homepage':
    'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-o3OFsygZjTRTzGQk231dii8LWZ9raLCRHxRr0sQwu%2Bc%3D'
  → 'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-0bBtcABZHBgodfmNPNXpp8Tr3SH7Hufx18xfiSb8cWo%3D'
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/076ea5b672bb1ea535ee84cfdabd0c2f0b7f20c7' (2024-07-13)
  → 'github:nix-community/nixos-generators/75cbb2a5e19c18840d105a72d036c6c92fc46c5d' (2024-07-29)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/1bba8a624b3b9d4f68db94fb63aaeb46039ce9e6' (2024-06-30)
  → 'github:nix-community/nixpkgs.lib/d15f6f6021693898fcd2c6a9bb13707383da9bbc' (2024-07-28)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/c5013aa7ce2c7ec90acee5d965d950c8348db751' (2024-07-11)
  → 'github:NixOS/nixos-hardware/14c333162ba53c02853add87a0000cbd7aa230c2' (2024-07-30)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/732b4f3a3afdfe6a6c4fcb2511e529588d4e5ccd' (2024-07-15)
  → 'github:NixOS/nixpkgs/15ed5d4537fd46399513bb040bf98415c825281b' (2024-08-02)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/53e81e790209e41f0c1efa9ff26ff2fd7ab35e27' (2024-07-14)
  → 'github:NixOS/nixpkgs/05405724efa137a0b899cce5ab4dde463b4fd30b' (2024-08-01)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/0fb28f237f83295b4dd05e342f333b447c097398' (2024-07-15)
  → 'github:numtide/treefmt-nix/768acdb06968e53aa1ee8de207fd955335c754b7' (2024-07-30)
2024-08-03 14:22:20 +02:00
d8dd90a8a6
flake.lock: Update
Flake lock file updates:

• Updated input 'homepage':
    'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-Q6hzrC9mtLnk1EA%2Bh262S09CGliVL1HsLnh8f3dqAn4%3D'
  → 'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-o3OFsygZjTRTzGQk231dii8LWZ9raLCRHxRr0sQwu%2Bc%3D'
2024-07-17 23:14:28 +02:00
0fa98de9c4
feat: enable system-monitor gnome extension 2024-07-17 23:06:44 +02:00
0a5fe27bac
fix: replace youtube-dl with yt-dlp 2024-07-17 21:17:45 +02:00
cae0564766
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/391ca6e950c2525b4f853cbe29922452c14eda82' (2024-07-01)
  → 'github:nix-community/home-manager/e1391fb22e18a36f57e6999c7a9f966dc80ac073' (2024-07-03)
• Updated input 'homepage':
    'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-3uMz0OG3OopSIilqI9Gx2fyQZe76YEOhRUx0qJM2kP4%3D'
  → 'https://git.dadada.li/dadada/dadada.li.git?narHash=sha256-Q6hzrC9mtLnk1EA%2Bh262S09CGliVL1HsLnh8f3dqAn4%3D'
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/140dcc2b9a0eb87ba5e9011076a1a7af19179ab1' (2024-07-01)
  → 'github:nix-community/nixos-generators/076ea5b672bb1ea535ee84cfdabd0c2f0b7f20c7' (2024-07-13)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/6e253f12b1009053eff5344be5e835f604bb64cd' (2024-07-02)
  → 'github:NixOS/nixos-hardware/c5013aa7ce2c7ec90acee5d965d950c8348db751' (2024-07-11)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/10c832d0548e9e3a6df7eb51e68c2783212a303e' (2024-07-01)
  → 'github:NixOS/nixpkgs/732b4f3a3afdfe6a6c4fcb2511e529588d4e5ccd' (2024-07-15)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/d032c1a6dfad4eedec7e35e91986becc699d7d69' (2024-07-01)
  → 'github:NixOS/nixpkgs/53e81e790209e41f0c1efa9ff26ff2fd7ab35e27' (2024-07-14)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/bdb6355009562d8f9313d9460c0d3860f525bc6c' (2024-07-02)
  → 'github:numtide/treefmt-nix/0fb28f237f83295b4dd05e342f333b447c097398' (2024-07-15)
2024-07-17 20:40:29 +02:00
4678969432
feat: add more supported locals
To enable more units.
2024-07-05 00:24:26 +02:00
b104e57b4d
feat: change remote to git.dadada.li 2024-07-05 00:23:42 +02:00
149a431301
fix: allow forgejo to bind to tcp port 22 2024-07-04 23:12:12 +02:00
7e464a5f26
fix: overwrite flake registry set by NixOS 2024-07-02 12:14:49 +02:00
04ed7401af
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/f7a029d41e49ff0747888105e1ed4314dca8436f' (2024-07-01)
  → 'github:nix-community/nixos-generators/140dcc2b9a0eb87ba5e9011076a1a7af19179ab1' (2024-07-01)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/a59f00f5ac65b19382617ba00f360f8bc07ed3ac' (2024-06-29)
  → 'github:NixOS/nixos-hardware/6e253f12b1009053eff5344be5e835f604bb64cd' (2024-07-02)
• Updated input 'nixpkgs-full':
    'github:NixOS/nixpkgs/7dca15289a1c2990efbe4680f0923ce14139b042' (2024-06-30)
  → 'github:NixOS/nixpkgs/d032c1a6dfad4eedec7e35e91986becc699d7d69' (2024-07-01)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/8df5ff62195d4e67e2264df0b7f5e8c9995fd0bd' (2024-06-30)
  → 'github:numtide/treefmt-nix/bdb6355009562d8f9313d9460c0d3860f525bc6c' (2024-07-02)
2024-07-02 12:07:19 +02:00
c25ecee64a
fix: all snapperd configs 2024-07-01 15:14:28 +02:00
25f782e2fa
fix: snapperd config 2024-07-01 15:12:47 +02:00
0015d9d8e1
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/845a5c4c073f74105022533907703441e0464bc3' (2024-06-04)
  → 'github:nix-community/home-manager/391ca6e950c2525b4f853cbe29922452c14eda82' (2024-07-01)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/35c20ba421dfa5059e20e0ef2343c875372bdcf3' (2024-06-10)
  → 'github:nix-community/nixos-generators/f7a029d41e49ff0747888105e1ed4314dca8436f' (2024-07-01)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/3c62b6a12571c9a7f65ab037173ee153d539905f' (2024-04-07)
  → 'github:nix-community/nixpkgs.lib/1bba8a624b3b9d4f68db94fb63aaeb46039ce9e6' (2024-06-30)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/58b52b0dd191af70f538c707c66c682331cfdffc' (2024-06-10)
  → 'github:NixOS/nixos-hardware/a59f00f5ac65b19382617ba00f360f8bc07ed3ac' (2024-06-29)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/e980b1051c444c81afcf2fee7e4a4c78489f1863' (2024-07-01)
  → 'github:NixOS/nixpkgs/10c832d0548e9e3a6df7eb51e68c2783212a303e' (2024-07-01)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/1cb529bffa880746a1d0ec4e0f5076876af931f1' (2024-06-11)
  → 'github:numtide/treefmt-nix/8df5ff62195d4e67e2264df0b7f5e8c9995fd0bd' (2024-06-30)
2024-07-01 14:42:27 +02:00
b66b445553
feat: move SSH to non-default port 2024-07-01 14:42:26 +02:00
3c7d611197
flake: use nixos-*-small by default 2024-07-01 14:40:51 +02:00
116468e4af
fix: remove mitigation after update 2024-07-01 14:35:58 +02:00
82655a38a7
fix: mitigation for CVE-2024-6387 2024-07-01 13:26:45 +02:00
d6ef9e0685
Fix typo 2024-06-22 12:23:07 +02:00
3d489f8cad
Added additional backup for password database 2024-06-22 11:50:21 +02:00
0d36fec85d
fix Rust toolchain not working 2024-06-22 11:34:42 +02:00
5b4cc979a9
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/d14b286322c7f4f897ca4b1726ce38cb68596c94' (2024-05-20)
  → 'github:nix-community/nixos-generators/35c20ba421dfa5059e20e0ef2343c875372bdcf3' (2024-06-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/d6c6cf6f5fead4057d8fb2d5f30aa8ac1727f177' (2024-06-05)
  → 'github:NixOS/nixos-hardware/58b52b0dd191af70f538c707c66c682331cfdffc' (2024-06-10)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/0b8e7a1ae5a94da2e1ee3f3030a32020f6254105' (2024-06-05)
  → 'github:NixOS/nixpkgs/47b604b07d1e8146d5398b42d3306fdebd343986' (2024-06-11)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/3eb96ca1ae9edf792a8e0963cc92fddfa5a87706' (2024-06-01)
  → 'github:numtide/treefmt-nix/1cb529bffa880746a1d0ec4e0f5076876af931f1' (2024-06-11)
2024-06-12 16:35:00 +02:00
bc462eefa7
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/12e914740a25ea1891ec619bb53cf5e6ca922e40' (2024-04-19)
  → 'github:numtide/devshell/1ebbe68d57457c8cae98145410b164b5477761f4' (2024-06-03)
• Updated input 'flake-registry':
    'github:NixOS/flake-registry/9c69f7bd2363e71fe5cd7f608113290c7614dcdd' (2024-01-15)
  → 'github:NixOS/flake-registry/895a65f8d5acf848136ee8fe8e8f736f0d27df96' (2024-06-03)
• Updated input 'home-manager':
    'github:nix-community/home-manager/a631666f5ec18271e86a5cde998cba68c33d9ac6' (2024-05-26)
  → 'github:nix-community/home-manager/845a5c4c073f74105022533907703441e0464bc3' (2024-06-04)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/7b49d3967613d9aacac5b340ef158d493906ba79' (2024-06-01)
  → 'github:NixOS/nixos-hardware/d6c6cf6f5fead4057d8fb2d5f30aa8ac1727f177' (2024-06-05)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/805a384895c696f802a9bf5bf4720f37385df547' (2024-05-31)
  → 'github:NixOS/nixpkgs/0b8e7a1ae5a94da2e1ee3f3030a32020f6254105' (2024-06-05)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/03b982b77df58d5974c61c6022085bafe780c1cf' (2024-05-31)
  → 'github:numtide/treefmt-nix/3eb96ca1ae9edf792a8e0963cc92fddfa5a87706' (2024-06-01)
2024-06-06 17:57:30 +02:00
eb94ce1313
gitea: migrate to forgejo 2024-06-04 20:27:02 +02:00
431ad5ad9e
Revert "gorgon: disable syncthing temporarily"
This reverts commit 95fd1b26ec.
2024-06-03 23:45:47 +02:00
52bd13e283
home: fix font-name
Otherwise gnome-shell will not display text.
2024-06-02 00:56:44 +02:00
30e6a941a7
gorgon: renamed option 2024-06-01 21:54:18 +02:00
2ec9448b94
gorgon: switch to plasma 6 2024-06-01 21:51:06 +02:00
eb0acd229d
ninurta/printing: fix renamed option 2024-06-01 21:47:42 +02:00
48d3044763
modules/zsh: fix renamed options 2024-06-01 21:47:40 +02:00
9d1c9974cd
base: remove redundant zsh config 2024-06-01 21:47:38 +02:00
df242bd3de
profiles/server: only enable btrfs if have btrfs filesystems 2024-06-01 21:47:36 +02:00
37ce933a6e
home: add sieveshell 2024-06-01 21:47:34 +02:00
7b3d12bbcb
home: remove dateutil 2024-06-01 21:47:34 +02:00
5df269cd5c
home: remove pinentryFlavor
Since it has not effect
2024-06-01 21:47:32 +02:00
5a9f9eaefe
home: add unixtools.xxd
xxd moved from vim package to unixtools.xxd
2024-06-01 21:47:32 +02:00
192734c323
base: remove nixpkgs from closure of non-interactive systems 2024-06-01 21:47:29 +02:00
71e92dd437
gorgon: enable nix-ld 2024-06-01 21:47:28 +02:00
e4a53b4048
flake: ugrade to 24.05 2024-06-01 21:47:24 +02:00
13a7abf56c
home: disable use of gnome-keyring 2024-06-01 19:41:29 +02:00
63fe114dd1
fixup! gorgon: disable syncthing temporarily 2024-06-01 15:58:56 +02:00
c32f5b4633
gorgon: install v4l2loopback kernel module 2024-06-01 10:36:31 +02:00
c6d2c74b80
update flake.lock 2024-05-30 11:28:25 +02:00
35a609f12c
ddns: also update A records 2024-05-30 11:27:52 +02:00
95fd1b26ec
gorgon: disable syncthing temporarily 2024-05-30 11:12:33 +02:00
ba010e4e08
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/ab5542e9dbd13d0100f8baae2bc2d68af901f4b4' (2024-05-10)
  → 'github:nix-community/home-manager/2c78a57c544dd19b07442350727ced097e1aa6e6' (2024-05-26)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/722b512eb7e6915882f39fff0e4c9dd44f42b77e' (2024-04-22)
  → 'github:nix-community/nixos-generators/d14b286322c7f4f897ca4b1726ce38cb68596c94' (2024-05-20)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/d68be3e5e21d829ebce080d96747508fc27ea4e3' (2024-05-16)
  → 'github:NixOS/nixos-hardware/2e7d6c568063c83355fe066b8a8917ee758de1b8' (2024-05-26)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/9ddcaffecdf098822d944d4147dd8da30b4e6843' (2024-05-14)
  → 'github:NixOS/nixpkgs/46397778ef1f73414b03ed553a3368f0e7e33c2f' (2024-05-22)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/c6aaf729f34a36c445618580a9f95a48f5e4e03f' (2024-04-25)
  → 'github:numtide/treefmt-nix/2fba33a182602b9d49f0b2440513e5ee091d838b' (2024-05-17)
2024-05-26 20:44:12 +02:00
cbbc9ff77f
feat: enable auto-scrub on all servers 2024-05-26 20:40:28 +02:00
e251d9865c
gorgon: add smartmon 2024-05-17 21:21:29 +02:00
4d77f9184b
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/86853e31dc1b62c6eeed11c667e8cdd0285d4411' (2024-04-25)
  → 'github:nix-community/home-manager/ab5542e9dbd13d0100f8baae2bc2d68af901f4b4' (2024-05-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/a4e2b7909fc1bdf30c30ef21d388fde0b5cdde4a' (2024-05-08)
  → 'github:NixOS/nixos-hardware/d68be3e5e21d829ebce080d96747508fc27ea4e3' (2024-05-16)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/27c13997bf450a01219899f5a83bd6ffbfc70d3c' (2024-05-06)
  → 'github:NixOS/nixpkgs/9ddcaffecdf098822d944d4147dd8da30b4e6843' (2024-05-14)
2024-05-16 19:43:52 +02:00
729eb4b60c
ninurta: fix monitoring 2024-05-09 13:20:19 +02:00
7af31af847
agares: do not require some links to be online 2024-05-09 13:19:16 +02:00
8de153467a
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/2d45b54ca4a183f2fdcf4b19c895b64fbf620ee8' (2024-03-22)
  → 'github:numtide/devshell/12e914740a25ea1891ec619bb53cf5e6ca922e40' (2024-04-19)
• Updated input 'home-manager':
    'github:nix-community/home-manager/d6bb9f934f2870e5cbc5b94c79e9db22246141ff' (2024-04-06)
  → 'github:nix-community/home-manager/86853e31dc1b62c6eeed11c667e8cdd0285d4411' (2024-04-25)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/d942db8df8ee860556a38754f15b8d03bf7e6933' (2024-04-08)
  → 'github:nix-community/nixos-generators/722b512eb7e6915882f39fff0e4c9dd44f42b77e' (2024-04-22)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/f58b25254be441cd2a9b4b444ed83f1e51244f1f' (2024-04-12)
  → 'github:NixOS/nixos-hardware/a4e2b7909fc1bdf30c30ef21d388fde0b5cdde4a' (2024-05-08)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/51651a540816273b67bc4dedea2d37d116c5f7fe' (2024-04-11)
  → 'github:NixOS/nixpkgs/27c13997bf450a01219899f5a83bd6ffbfc70d3c' (2024-05-06)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/49dc4a92b02b8e68798abd99184f228243b6e3ac' (2024-04-01)
  → 'github:numtide/treefmt-nix/c6aaf729f34a36c445618580a9f95a48f5e4e03f' (2024-04-25)
2024-05-09 13:03:57 +02:00
db4923fa91
home: add zk 2024-05-09 13:02:49 +02:00
895aa749e8
git: set name 2024-05-02 21:18:00 +02:00
66055e2d2d
rename homePage to homepage 2024-04-28 20:19:21 +02:00
871c1b8fa8
flake: update homePage 2024-04-28 20:16:30 +02:00
cf396ba220
home: update color scheme to solarized 2024-04-28 20:15:36 +02:00
d3c7b429c7
feat: it's summer, use light theme 2024-04-14 19:31:46 +02:00
557a5c7ce9
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/f33900124c23c4eca5831b9b5eb32ea5894375ce' (2024-03-19)
  → 'github:nix-community/home-manager/d6bb9f934f2870e5cbc5b94c79e9db22246141ff' (2024-04-06)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/0c15e76bed5432d7775a22e8d22059511f59d23a' (2024-04-04)
  → 'github:nix-community/nixos-generators/d942db8df8ee860556a38754f15b8d03bf7e6933' (2024-04-08)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/90b1a963ff84dc532db92f678296ff2499a60a87' (2024-03-31)
  → 'github:nix-community/nixpkgs.lib/3c62b6a12571c9a7f65ab037173ee153d539905f' (2024-04-07)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/f3b959627bca46a9f7052b8fbc464b8323e68c2c' (2024-04-05)
  → 'github:NixOS/nixos-hardware/f58b25254be441cd2a9b4b444ed83f1e51244f1f' (2024-04-12)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/1487bdea619e4a7a53a4590c475deabb5a9d1bfb' (2024-04-03)
  → 'github:NixOS/nixpkgs/51651a540816273b67bc4dedea2d37d116c5f7fe' (2024-04-11)
2024-04-14 13:40:20 +02:00
e1f1332728
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/417a857dfb824e60930881a254dd67d6796f5884' (2024-03-22)
  → 'github:nix-community/nixos-generators/0c15e76bed5432d7775a22e8d22059511f59d23a' (2024-04-04)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/fa827dda806c5aa98f454da4c567991ab8ce422c' (2024-03-17)
  → 'github:nix-community/nixpkgs.lib/90b1a963ff84dc532db92f678296ff2499a60a87' (2024-03-31)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/1e679b9a9970780cd5d4dfe755a74a8f96d33388' (2024-03-18)
  → 'github:NixOS/nixos-hardware/f3b959627bca46a9f7052b8fbc464b8323e68c2c' (2024-04-05)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/56528ee42526794d413d6f244648aaee4a7b56c0' (2024-03-22)
  → 'github:NixOS/nixpkgs/1487bdea619e4a7a53a4590c475deabb5a9d1bfb' (2024-04-03)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/7ee5aaac63c30d3c97a8c56efe89f3b2aa9ae564' (2024-03-18)
  → 'github:numtide/treefmt-nix/49dc4a92b02b8e68798abd99184f228243b6e3ac' (2024-04-01)
2024-04-05 21:02:26 +02:00
d8a261d68f
fix: DHCP config in management LAN 2024-03-25 20:57:27 +01:00
79c9b0bb75
secure munin-node with firewall 2024-03-23 21:10:14 +01:00
bd0d73cc33
Remove override for hydra_unstable 2024-03-23 21:10:13 +01:00
37badcc336
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/5ddecd67edbd568ebe0a55905273e56cc82aabe3' (2024-02-26)
  → 'github:numtide/devshell/2d45b54ca4a183f2fdcf4b19c895b64fbf620ee8' (2024-03-22)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/d465f4819400de7c8d874d50b982301f28a84605' (2024-02-28)
  → 'github:numtide/flake-utils/b1d9ab70662946ef0850d488da1c9019f3a9752a' (2024-03-11)
• Updated input 'home-manager':
    'github:nix-community/home-manager/652fda4ca6dafeb090943422c34ae9145787af37' (2024-02-03)
  → 'github:nix-community/home-manager/f33900124c23c4eca5831b9b5eb32ea5894375ce' (2024-03-19)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/bef32a05496d9480b02be586fa7827748b9e597b' (2024-03-08)
  → 'github:nix-community/nixos-generators/417a857dfb824e60930881a254dd67d6796f5884' (2024-03-22)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/7873d84a89ae6e4841528ff7f5697ddcb5bdfe6c' (2024-03-03)
  → 'github:nix-community/nixpkgs.lib/fa827dda806c5aa98f454da4c567991ab8ce422c' (2024-03-17)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/59e37017b9ed31dee303dbbd4531c594df95cfbc' (2024-03-02)
  → 'github:NixOS/nixos-hardware/1e679b9a9970780cd5d4dfe755a74a8f96d33388' (2024-03-18)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/2be119add7b37dc535da2dd4cba68e2cf8d1517e' (2024-03-08)
  → 'github:NixOS/nixpkgs/56528ee42526794d413d6f244648aaee4a7b56c0' (2024-03-22)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/9c57261c71871d2208a6dd4394774cca226c6dbc' (2024-03-08)
  → 'github:numtide/treefmt-nix/7ee5aaac63c30d3c97a8c56efe89f3b2aa9ae564' (2024-03-18)
2024-03-23 21:10:12 +01:00
7d1047e5fe
tunnel munin node traffic on lan through wireguard 2024-03-23 21:10:08 +01:00
dependabot[bot]
017725d2cf build(deps): bump DeterminateSystems/update-flake-lock from 20 to 21
Bumps [DeterminateSystems/update-flake-lock](https://github.com/determinatesystems/update-flake-lock) from 20 to 21.
- [Release notes](https://github.com/determinatesystems/update-flake-lock/releases)
- [Commits](https://github.com/determinatesystems/update-flake-lock/compare/v20...v21)

---
updated-dependencies:
- dependency-name: DeterminateSystems/update-flake-lock
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-20 19:06:54 +01:00
dependabot[bot]
fb48bac8c5 build(deps): bump DeterminateSystems/nix-installer-action from 9 to 10
Bumps [DeterminateSystems/nix-installer-action](https://github.com/determinatesystems/nix-installer-action) from 9 to 10.
- [Release notes](https://github.com/determinatesystems/nix-installer-action/releases)
- [Commits](https://github.com/determinatesystems/nix-installer-action/compare/v9...v10)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-20 19:06:08 +01:00
dependabot[bot]
8de346de28 build(deps): bump cachix/install-nix-action from 25 to 26
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 25 to 26.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v25...v26)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-20 19:05:46 +01:00
056753909a
fix: override hydra's nix version
nix-2.17 is marked as insecure
2024-03-11 21:02:46 +01:00
dependabot[bot]
a7e1206319 build(deps): bump cachix/install-nix-action from 23 to 25
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 23 to 25.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v23...v25)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-11 20:11:16 +01:00
dependabot[bot]
ac9c6a43d1 build(deps): bump DeterminateSystems/nix-installer-action from 8 to 9
Bumps [DeterminateSystems/nix-installer-action](https://github.com/determinatesystems/nix-installer-action) from 8 to 9.
- [Release notes](https://github.com/determinatesystems/nix-installer-action/releases)
- [Commits](https://github.com/determinatesystems/nix-installer-action/compare/v8...v9)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-11 20:10:58 +01:00
dependabot[bot]
64ad2b6a23 build(deps): bump cachix/cachix-action from 12 to 14
Bumps [cachix/cachix-action](https://github.com/cachix/cachix-action) from 12 to 14.
- [Release notes](https://github.com/cachix/cachix-action/releases)
- [Commits](https://github.com/cachix/cachix-action/compare/v12...v14)

---
updated-dependencies:
- dependency-name: cachix/cachix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-03-11 20:10:39 +01:00
03a6a9c934
feat!: remove uwu 2024-03-09 22:59:30 +01:00
5957c26c93
feat: zeal 2024-03-09 22:58:41 +01:00
7d291c2c73
fix: formatting 2024-03-09 18:22:00 +01:00
11af2dc5a5
fix: eval error with default nix version when building nixd 2024-03-09 17:46:57 +01:00
0b8b9127b7
fix: replace rnix with nixd 2024-03-09 17:42:24 +01:00
e44daad69a
feat: upgrade state version of gorgon 2024-03-09 17:26:32 +01:00
9334844c6e
fix: remove cachix 2024-03-09 17:03:39 +01:00
af5418a995
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/2c9562e7624fa1b50983fc18d504bf86202bef49' (2024-02-29)
  → 'github:nix-community/nixos-generators/bef32a05496d9480b02be586fa7827748b9e597b' (2024-03-08)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/479831ed8b3c9c7b80533999f880c7d0bf6a491b' (2024-02-25)
  → 'github:nix-community/nixpkgs.lib/7873d84a89ae6e4841528ff7f5697ddcb5bdfe6c' (2024-03-03)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/33a97b5814d36ddd65ad678ad07ce43b1a67f159' (2024-02-28)
  → 'github:NixOS/nixos-hardware/59e37017b9ed31dee303dbbd4531c594df95cfbc' (2024-03-02)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/79baff8812a0d68e24a836df0a364c678089e2c7' (2024-03-01)
  → 'github:NixOS/nixpkgs/2be119add7b37dc535da2dd4cba68e2cf8d1517e' (2024-03-08)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/093f82e5707bb6f14ee38a742748f9fb4ab1488e' (2024-03-02)
  → 'github:numtide/treefmt-nix/9c57261c71871d2208a6dd4394774cca226c6dbc' (2024-03-08)
2024-03-09 16:48:48 +01:00
b7d12303a3
remove service VLAN and route to backup1 using wireguard 2024-03-04 22:10:18 +01:00
72f8cf91bc
Revert "borg: switch to ourly backups"
This reverts commit cb6f66c6c8.
2024-03-02 22:11:36 +01:00
cb6f66c6c8
borg: switch to ourly backups 2024-03-02 22:10:22 +01:00
3fcebd1de0
fix(git): fix formatting 2024-03-02 12:23:36 +01:00
0a0cdf7188
home: automatically create set of HM modules 2024-03-02 12:23:11 +01:00
cfe49c73fc
home: remove unsused modules 2024-03-02 11:36:22 +01:00
a7c4a7f064
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/83cb93d6d063ad290beee669f4badf9914cc16ec' (2024-01-15)
  → 'github:numtide/devshell/5ddecd67edbd568ebe0a55905273e56cc82aabe3' (2024-02-26)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/1ef2e671c3b0c19053962c07dbda38332dcebf26' (2024-01-15)
  → 'github:numtide/flake-utils/d465f4819400de7c8d874d50b982301f28a84605' (2024-02-28)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/0aa24e93f75370454f0e03747b6836ac2a2c9fca' (2024-02-14)
  → 'github:nix-community/nixos-generators/2c9562e7624fa1b50983fc18d504bf86202bef49' (2024-02-29)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/f5af57d3ef9947a70ac86e42695231ac1ad00c25' (2023-09-03)
  → 'github:nix-community/nixpkgs.lib/479831ed8b3c9c7b80533999f880c7d0bf6a491b' (2024-02-25)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/106d3fec43bcea19cb2e061ca02531d54b542ce3' (2024-02-16)
  → 'github:NixOS/nixos-hardware/33a97b5814d36ddd65ad678ad07ce43b1a67f159' (2024-02-28)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/1d1817869c47682a6bee85b5b0a6537b6c0fba26' (2024-02-16)
  → 'github:NixOS/nixpkgs/79baff8812a0d68e24a836df0a364c678089e2c7' (2024-03-01)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/ac599dab59a66304eb511af07b3883114f061b9d' (2024-02-07)
  → 'github:numtide/treefmt-nix/093f82e5707bb6f14ee38a742748f9fb4ab1488e' (2024-03-02)
2024-03-02 11:17:53 +01:00
bb80b9942b
Update git config 2024-02-17 23:29:18 +01:00
afed0d7701
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/896f6589db5b25023b812bbb6c1f5d3a499b1132' (2024-01-24)
  → 'github:nix-community/nixos-generators/0aa24e93f75370454f0e03747b6836ac2a2c9fca' (2024-02-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/83e571bb291161682b9c3ccd48318f115143a550' (2024-02-02)
  → 'github:NixOS/nixos-hardware/106d3fec43bcea19cb2e061ca02531d54b542ce3' (2024-02-16)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/25e3d4c0d3591c99929b1ec07883177f6ea70c9d' (2024-02-01)
  → 'github:NixOS/nixpkgs/1d1817869c47682a6bee85b5b0a6537b6c0fba26' (2024-02-16)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/c6153c2a3ff4c38d231e3ae99af29b87f1df5901' (2024-01-28)
  → 'github:numtide/treefmt-nix/ac599dab59a66304eb511af07b3883114f061b9d' (2024-02-07)
2024-02-17 21:59:06 +01:00
870b18fa1f
pkgs: remove ultimate plumber 2024-02-17 21:58:35 +01:00
6bea52d957
home: add h 2024-02-17 21:58:34 +01:00
d920884e63
helix: fix reflow 2024-02-10 18:28:59 +01:00
c0e9239f19
ninurta: fix formatting 2024-02-04 18:26:17 +01:00
0b874cf252
ninurta: monitoring with munin 2024-02-04 17:39:40 +01:00
c66a0f847c
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/10cd9c53115061aa6a0a90aad0b0dde6a999cdb9' (2024-01-19)
  → 'github:nix-community/home-manager/652fda4ca6dafeb090943422c34ae9145787af37' (2024-02-03)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/f84eaffc35d1a655e84749228cde19922fcf55f1' (2024-01-25)
  → 'github:NixOS/nixos-hardware/83e571bb291161682b9c3ccd48318f115143a550' (2024-02-02)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/56911ef3403a9318b7621ce745f5452fb9ef6867' (2024-01-27)
  → 'github:NixOS/nixpkgs/25e3d4c0d3591c99929b1ec07883177f6ea70c9d' (2024-02-01)
2024-02-03 21:17:13 +01:00
ddf470a8be
ninurta: fix typo 2024-01-31 19:10:36 +01:00
687c6fb157
flake: remove override for non-existant input 2024-01-31 19:08:43 +01:00
afe89df208
ninurta: enable libvirtd 2024-01-31 19:04:50 +01:00
10d4ac31e6
home: remove gnucash 2024-01-30 21:19:52 +01:00
6d11ae845d
agares: set RTT for CAKE 2024-01-30 18:58:32 +01:00
f93fc7abdc
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/ed8ab00e8d92076a7cac1b428881b4d5304bb771' (2024-01-22)
  → 'github:nix-community/nixos-generators/896f6589db5b25023b812bbb6c1f5d3a499b1132' (2024-01-24)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/bee2202bec57e521e3bd8acd526884b9767d7fa0' (2024-01-15)
  → 'github:NixOS/nixos-hardware/f84eaffc35d1a655e84749228cde19922fcf55f1' (2024-01-25)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/1b64fc1287991a9cce717a01c1973ef86cb1af0b' (2024-01-20)
  → 'github:NixOS/nixpkgs/56911ef3403a9318b7621ce745f5452fb9ef6867' (2024-01-27)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/9d458726fed1cc00e48031bb7214dfa3c16b7a0f' (2024-01-22)
  → 'github:numtide/treefmt-nix/c6153c2a3ff4c38d231e3ae99af29b87f1df5901' (2024-01-28)
2024-01-29 19:12:40 +01:00
c139794af5
agares: fix traffic shaping bandwidth on inbound traffic via ppp0 2024-01-29 18:36:18 +01:00
bc82597d05
agares: fix listening range of DNS server 2024-01-25 18:55:49 +01:00
d81fee6842
fix naming of roadwarrior interface 2024-01-25 18:45:27 +01:00
d6583b24fc
agares: roadw interface addresses 2024-01-24 23:22:45 +01:00
47234f72bb
agares: fixup 2024-01-24 22:43:49 +01:00
c67b752975
agares: fix local-data 2024-01-24 22:21:46 +01:00
bcc4d5e189
agares: add DNS and NTP options (RA and DHCP) 2024-01-24 21:46:57 +01:00
958dacbac5
agares: configure local-data for unbound 2024-01-24 20:51:55 +01:00
96ec8c0e1b
ninurta: allow flareflo access to fginfo-git and fginfo backups 2024-01-23 20:15:01 +01:00
0412258bf4
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/f54745fd4aae92443817ddc566ce06572b178b5a' (2024-01-07)
  → 'github:numtide/devshell/83cb93d6d063ad290beee669f4badf9914cc16ec' (2024-01-15)
• Updated input 'flake-registry':
    'github:NixOS/flake-registry/3f641cbae15d3c74370aa9b97fd0ac478a114305' (2023-08-23)
  → 'github:NixOS/flake-registry/9c69f7bd2363e71fe5cd7f608113290c7614dcdd' (2024-01-15)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/4022d587cbbfd70fe950c1e2083a02621806a725' (2023-12-04)
  → 'github:numtide/flake-utils/1ef2e671c3b0c19053962c07dbda38332dcebf26' (2024-01-15)
• Updated input 'home-manager':
    'github:nix-community/home-manager/7e398b3d76bc1503171b1364c9d4a07ac06f3851' (2024-01-01)
  → 'github:nix-community/home-manager/10cd9c53115061aa6a0a90aad0b0dde6a999cdb9' (2024-01-19)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/246219bc21b943c6f6812bb7744218ba0df08600' (2023-12-04)
  → 'github:nix-community/nixos-generators/ed8ab00e8d92076a7cac1b428881b4d5304bb771' (2024-01-22)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/c478b3d56969006e015e55aaece4931f3600c1b2' (2024-01-07)
  → 'github:NixOS/nixos-hardware/bee2202bec57e521e3bd8acd526884b9767d7fa0' (2024-01-15)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/c1be43e8e837b8dbee2b3665a007e761680f0c3d' (2024-01-05)
  → 'github:NixOS/nixpkgs/1b64fc1287991a9cce717a01c1973ef86cb1af0b' (2024-01-20)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/04f25d7bec9fb29d2c3bacaa48a3304840000d36' (2024-01-07)
  → 'github:numtide/treefmt-nix/9d458726fed1cc00e48031bb7214dfa3c16b7a0f' (2024-01-22)
2024-01-22 20:38:12 +01:00
edd3352e3c
Update flake inputs 2024-01-07 20:38:39 +01:00
71629c7966
overlays: add recipemd
Remove unused overlays
2024-01-01 17:22:40 +01:00
31b1843677
gorgon: fix uwu DNS 2024-01-01 16:20:46 +01:00
78328291db
ninurta: change brother ppl 2023-12-31 17:28:40 +01:00
7c9ffc4f2f
Remove eza and jujutsu inputs 2023-12-24 12:25:17 +01:00
3ffb8ac916
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/0c2353d5d930c3d93724df6858aef064a31b3c00' (2023-12-20)
  → 'github:nix-community/home-manager/d5824a76bc6bb93d1dce9ebbbcb09a9b6abcc224' (2023-12-23)
• Updated input 'jujutsu':
    'github:martinvonz/jj/7a44e590dcdd6f9613df3559572ee5ded159a9af' (2023-12-22)
  → 'github:martinvonz/jj/320d15412b0326b96e69e00421e465f6bb9b49b8' (2023-12-23)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/b8c487832712f4e3e6f9e81b70e6654eb907abfc' (2023-12-22)
  → 'github:oxalica/rust-overlay/cb6395cb3c2f69ad028914c90bce833e51d339c9' (2023-12-24)
2023-12-24 12:17:44 +01:00
f9c2a592f9
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/1aed986e3c81a4f6698e85a7452cbfcc4b31a36e' (2023-10-27)
  → 'github:numtide/devshell/44ddedcbcfc2d52a76b64fb6122f209881bd3e1e' (2023-12-05)
• Updated input 'eza':
    'github:eza-community/eza/cf0c57d7ad160f3b73462892609cc9185964b298' (2023-11-13)
  → 'github:eza-community/eza/cd4038726c695ca7bbfa71ff230804cc24d3dddf' (2023-12-21)
• Updated input 'eza/advisory-db':
    'github:rustsec/advisory-db/088ec034cfc17c918d8c1d4f9fbb832b935011b0' (2023-11-02)
  → 'github:rustsec/advisory-db/6ef1d1fd84c57e46253ff16bf7379c115e1062eb' (2023-12-09)
• Updated input 'eza/powertest':
    'http://rime.cx/v1/github/eza-community/powertest/b/main.tar.gz?narHash=sha256-DaBLTu/GCq7lDWyR9HKj9H1t5mfX7T1eFwrIwJICXZo%3D'
  → 'http://rime.cx/v1/github/eza-community/powertest.tar.gz?narHash=sha256-%2B5jKG/KmYOopvHwBAGu5iPVFqoug16Bkyk/InwB40tc%3D' (2023-11-16)
• Updated input 'eza/pre-commit-hooks':
    'http://rime.cx/v1/github/semnix/pre-commit-hooks.nix.tar.gz?narHash=sha256-Fi5H9jbaQLmLw9qBi/mkR33CoFjNbobo5xWdX4tKz1Q%3D'
  → 'http://rime.cx/v1/github/semnix/pre-commit-hooks.nix.tar.gz?narHash=sha256-ej2fch/T584b5K9sk1UhmZF7W6wEfDHuoUYpFN8dtvM%3D' (2023-11-25)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/ff7b65b44d01cf9ba6a71320833626af21126384' (2023-09-12)
  → 'github:numtide/flake-utils/4022d587cbbfd70fe950c1e2083a02621806a725' (2023-12-04)
• Updated input 'home-manager':
    'github:nix-community/home-manager/aeb2232d7a32530d3448318790534d196bf9427a' (2023-11-24)
  → 'github:nix-community/home-manager/0c2353d5d930c3d93724df6858aef064a31b3c00' (2023-12-20)
• Updated input 'homePage':
    'github:dadada/dadada.li/210dc82ee943943377500667a182046ff647ab9e' (2023-11-14)
  → 'github:dadada/dadada.li/61500a9a71ddf2a2df4005d3724ac38c6b78ab08' (2023-11-14)
• Updated input 'jujutsu':
    'github:martinvonz/jj/39b065f7ab16f95174c4239842f45c6a6dc9a50e' (2023-11-14)
  → 'github:martinvonz/jj/7a44e590dcdd6f9613df3559572ee5ded159a9af' (2023-12-22)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/150f38bd1e09e20987feacb1b0d5991357532fb5' (2023-09-30)
  → 'github:nix-community/nixos-generators/246219bc21b943c6f6812bb7744218ba0df08600' (2023-12-04)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/df9bb8a436607da124e8cfa0fd19e70e9d9e0b7b' (2023-11-14)
  → 'github:NixOS/nixos-hardware/7763c6fd1f299cb9361ff2abf755ed9619ef01d6' (2023-12-13)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/5de0b32be6e85dc1a9404c75131316e4ffbc634c' (2023-12-01)
  → 'github:NixOS/nixpkgs/d65bceaee0fb1e64363f7871bc43dc1c6ecad99f' (2023-12-20)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/e485313fc485700a9f1f9b8b272ddc0621d08357' (2023-11-14)
  → 'github:oxalica/rust-overlay/b8c487832712f4e3e6f9e81b70e6654eb907abfc' (2023-12-22)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/e82f32aa7f06bbbd56d7b12186d555223dc399d1' (2023-11-12)
  → 'github:numtide/treefmt-nix/2961375283668d867e64129c22af532de8e77734' (2023-12-19)
2023-12-22 21:28:21 +01:00
6cd183b90a
Clean up home config 2023-12-09 20:11:58 +01:00
af6e077382
Add dconf config 2023-12-09 20:11:43 +01:00
dfff146068
home/helix: fix language server settings 2023-12-03 09:28:25 +01:00
c7e697284e
Remove tubslatex overlay
Use tubslatex-nix flake instead
2023-12-03 09:28:24 +01:00
dependabot[bot]
194f9adf67 build(deps): bump DeterminateSystems/nix-installer-action from 6 to 8
Bumps [DeterminateSystems/nix-installer-action](https://github.com/determinatesystems/nix-installer-action) from 6 to 8.
- [Release notes](https://github.com/determinatesystems/nix-installer-action/releases)
- [Commits](https://github.com/determinatesystems/nix-installer-action/compare/v6...v8)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-12-03 09:14:10 +01:00
eb9cd9d8cf
updgrade to 23.11 2023-12-02 16:24:28 +01:00
2c0f9dd7f8
surgat: update state version 20.09 -> 23.05 2023-12-02 16:12:43 +01:00
2da556f18c
add upgrade-pg-cluster 2023-12-02 16:06:46 +01:00
e1a78e7508
flake.lock: Update
Flake lock file updates:

• Updated input 'homePage':
    'github:dadada/dadada.li/eeac83e13265b4f8562e0fada86b8f8f756023bf' (2023-11-13)
  → 'github:dadada/dadada.li/210dc82ee943943377500667a182046ff647ab9e' (2023-11-14)
• Updated input 'jujutsu':
    'github:martinvonz/jj/ab214145eb617d7c5305647bada62d4d3312c415' (2023-11-13)
  → 'github:martinvonz/jj/39b065f7ab16f95174c4239842f45c6a6dc9a50e' (2023-11-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/b689465d0c5d88e158e7d76094fca08cc0223aad' (2023-11-11)
  → 'github:NixOS/nixos-hardware/df9bb8a436607da124e8cfa0fd19e70e9d9e0b7b' (2023-11-14)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/05c34b45e276a9939d1170b025faafe7a5fab2c8' (2023-11-13)
  → 'github:oxalica/rust-overlay/e485313fc485700a9f1f9b8b272ddc0621d08357' (2023-11-14)
2023-11-14 19:07:42 +01:00
2375e4ed4d
home: Install prettier 2023-11-14 19:03:42 +01:00
ca17dccf51
flake.lock: Update
Flake lock file updates:

• Updated input 'homePage':
    'github:dadada/dadada.li/0793a08c126688cbc6df047156f830bb152bd163' (2023-11-12)
  → 'github:dadada/dadada.li/eeac83e13265b4f8562e0fada86b8f8f756023bf' (2023-11-13)
2023-11-13 22:10:52 +01:00
9d9be054e8
Update dependencies 2023-11-13 22:08:50 +01:00
6d25719a61
Update website 2023-11-13 21:57:02 +01:00
1ab59d7994
soft-serve: update 2023-11-12 22:58:50 +01:00
470c600e90
agares: fix interface for DDNS client 2023-11-12 19:08:02 +01:00
c7998f489f
Update homePage input 2023-11-12 14:21:58 +01:00
8247b5a51c
Update input homePage 2023-11-12 14:08:30 +01:00
d39b08468c
ninurta: disable nginx 2023-11-12 13:31:52 +01:00
0e35ae1108
agares: clean up unused definitions 2023-11-11 15:32:27 +01:00
2b11e2acb9
agares: fix CAKE settings 2023-11-11 15:30:07 +01:00
a6b9c42d47
flake.lock: Update
Flake lock file updates:

• Updated input 'eza':
    'github:eza-community/eza/0c75e4cc971d6f79160f527024d399829ff1e0a8' (2023-11-04)
  → 'github:eza-community/eza/9683862a42089a7ffc30948d5c246893056e150a' (2023-11-09)
• Updated input 'jujutsu':
    'github:martinvonz/jj/e701b08f4294811429e5222f95c1ad27d24292d8' (2023-11-04)
  → 'github:martinvonz/jj/9533177422e788c1bc8ada48f22b91dd0d72ce0d' (2023-11-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/87f8403371fa74d9ad21ed677403cc235f37b96c' (2023-11-03)
  → 'github:NixOS/nixos-hardware/b689465d0c5d88e158e7d76094fca08cc0223aad' (2023-11-11)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/621f51253edffa1d6f08d5fce4f08614c852d17e' (2023-11-02)
  → 'github:NixOS/nixpkgs/41de143fda10e33be0f47eab2bfe08a50f234267' (2023-11-06)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/321affd863e3e4e669990a1db5fdabef98387b95' (2023-11-03)
  → 'github:oxalica/rust-overlay/efd15e11c8954051a47679e7718b4c2a9b68ce27' (2023-11-11)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/5deb8dc125a9f83b65ca86cf0c8167c46593e0b1' (2023-10-27)
  → 'github:numtide/treefmt-nix/8b25ad882a6fc9905fa515c2b61d196b42ca79a3' (2023-11-10)
2023-11-11 13:51:02 +01:00
7614142c11
ninurta: fix path to binary in udev rule 2023-11-05 00:57:34 +01:00
39a33ac0d2
agares: add firewall rules allowing some traffic from services 2023-11-05 00:57:05 +01:00
972f729438 secrets: rekey 2023-11-05 00:17:33 +01:00
21add79ffa agares: use as router 2023-11-05 00:17:33 +01:00
572d813eed
home: fix formatting 2023-11-04 15:10:29 +01:00
684f27eca6
flake.lock: Update
Flake lock file updates:

• Updated input 'eza':
    'github:eza-community/eza/73298f0b0afc9cd11aa45aa4be20c244b9e61ca8' (2023-10-26)
  → 'github:eza-community/eza/0c75e4cc971d6f79160f527024d399829ff1e0a8' (2023-11-04)
• Added input 'eza/advisory-db':
    'github:rustsec/advisory-db/088ec034cfc17c918d8c1d4f9fbb832b935011b0' (2023-11-02)
• Added input 'eza/pre-commit-hooks':
    'http://rime.cx/v1/github/semnix/pre-commit-hooks.nix.tar.gz?narHash=sha256-Fi5H9jbaQLmLw9qBi%2fmkR33CoFjNbobo5xWdX4tKz1Q='
• Added input 'eza/pre-commit-hooks/flake-compat':
    'github:edolstra/flake-compat/35bb57c0c8d8b62bbfd284272c928ceb64ddbde9' (2023-01-17)
• Added input 'eza/pre-commit-hooks/flake-utils':
    follows 'eza/flake-utils'
• Added input 'eza/pre-commit-hooks/gitignore':
    'github:hercules-ci/gitignore.nix/a20de23b925fd8264fd7fad6454652e142fd7f73' (2022-08-14)
• Added input 'eza/pre-commit-hooks/gitignore/nixpkgs':
    follows 'eza/pre-commit-hooks/nixpkgs'
• Added input 'eza/pre-commit-hooks/nixpkgs':
    follows 'eza/nixpkgs'
• Added input 'eza/pre-commit-hooks/nixpkgs-stable':
    'github:NixOS/nixpkgs/c37ca420157f4abc31e26f436c1145f8951ff373' (2023-06-03)
• Updated input 'jujutsu':
    'github:martinvonz/jj/e5fa5910f22337d2828eab19b2cd09bc808c7e8a' (2023-10-29)
  → 'github:martinvonz/jj/e701b08f4294811429e5222f95c1ad27d24292d8' (2023-11-04)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/80d98a7d55c6e27954a166cb583a41325e9512d7' (2023-10-23)
  → 'github:NixOS/nixos-hardware/87f8403371fa74d9ad21ed677403cc235f37b96c' (2023-11-03)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/60b9db998f71ea49e1a9c41824d09aa274be1344' (2023-10-26)
  → 'github:NixOS/nixpkgs/621f51253edffa1d6f08d5fce4f08614c852d17e' (2023-11-02)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/571fee291b386dd6fe0d125bc20a7c7b3ad042ac' (2023-10-28)
  → 'github:oxalica/rust-overlay/321affd863e3e4e669990a1db5fdabef98387b95' (2023-11-03)
2023-11-04 14:49:01 +01:00
afe3d8683c
Update agenix 2023-11-04 14:48:58 +01:00
4ca056cc28
home: remove fluffychat and fractal-next, add element-desktop 2023-11-04 14:33:07 +01:00
db86e3902b
Backup keepassxc DB 2023-10-31 03:27:03 +01:00
2083708a45 ninurta: enable printer sharing 2023-10-30 16:21:25 +01:00
e135f57101 Replace power-up and power-down snippets with udev rule 2023-10-30 00:00:28 +01:00
4944d5790b
Remove apps.nix
File was not referenced
2023-10-29 20:03:14 +01:00
9ab1221dc0
Remove zotero (marked as insecure) 2023-10-29 20:01:37 +01:00
github-actions[bot]
f218b39961 flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/cd4e2fda3150dd2f689caeac07b7f47df5197c31' (2023-09-29)
  → 'github:numtide/devshell/1aed986e3c81a4f6698e85a7452cbfcc4b31a36e' (2023-10-27)
• Updated input 'eza':
    'github:eza-community/eza/7b743992578a9cb1f666f118d8b4edc218d60577' (2023-10-12)
  → 'github:eza-community/eza/73298f0b0afc9cd11aa45aa4be20c244b9e61ca8' (2023-10-26)
• Updated input 'jujutsu':
    'github:martinvonz/jj/69a30b47aff18e9d6caacaec8c539cc0b463d3c7' (2023-10-12)
  → 'github:martinvonz/jj/e5fa5910f22337d2828eab19b2cd09bc808c7e8a' (2023-10-29)
• Updated input 'naersk':
    'github:nix-community/naersk/3f976d822b7b37fc6fb8e6f157c2dd05e7e94e89' (2023-09-07)
  → 'github:nix-community/naersk/aeb58d5e8faead8980a807c840232697982d47b9' (2023-10-27)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/fb6af288f6cf0f00d3af60cf9d5110433b954565' (2023-10-12)
  → 'github:NixOS/nixos-hardware/80d98a7d55c6e27954a166cb583a41325e9512d7' (2023-10-23)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/bd1cde45c77891214131cbbea5b1203e485a9d51' (2023-10-11)
  → 'github:NixOS/nixpkgs/60b9db998f71ea49e1a9c41824d09aa274be1344' (2023-10-26)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/aa7584f5bbf5947716ad8ec14eccc0334f0d28f0' (2023-10-12)
  → 'github:oxalica/rust-overlay/571fee291b386dd6fe0d125bc20a7c7b3ad042ac' (2023-10-28)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/0b2ffeb3ae1a7449a48a952f3e731cfa41eaf780' (2023-10-11)
  → 'github:numtide/treefmt-nix/5deb8dc125a9f83b65ca86cf0c8167c46593e0b1' (2023-10-27)
2023-10-29 19:59:22 +01:00
e4c9dee575 Remove networking module 2023-10-29 19:58:51 +01:00
dc685affee Remove non-existent hosts 2023-10-29 19:58:51 +01:00
dependabot[bot]
01d1eea0cc build(deps): bump DeterminateSystems/nix-installer-action from 5 to 6
Bumps [DeterminateSystems/nix-installer-action](https://github.com/determinatesystems/nix-installer-action) from 5 to 6.
- [Release notes](https://github.com/determinatesystems/nix-installer-action/releases)
- [Commits](https://github.com/determinatesystems/nix-installer-action/compare/v5...v6)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-10-29 18:50:34 +01:00
990a8892c2
ninurta: wait for LUKS2 passphrase from SSH 2023-10-27 23:58:17 +02:00
c996f8c153
ninurta: spin-down disks more aggressively 2023-10-27 23:19:41 +02:00
118daab449
home: install fluffychat 2023-10-20 17:42:49 +02:00
6ff38c30d9
Set ayu_dark theme in helix 2023-10-20 17:39:34 +02:00
ee6531b01c
Enable tor for remote admin on fginfo 2023-10-18 16:05:24 +02:00
bee36981a9
flake.lock: Update
Flake lock file updates:

• Updated input 'eza':
    'github:eza-community/eza/522d20c8d2b86db0412e10bdc41780c9a83c790d' (2023-09-30)
  → 'github:eza-community/eza/7b743992578a9cb1f666f118d8b4edc218d60577' (2023-10-12)
• Updated input 'jujutsu':
    'github:martinvonz/jj/f0f1d72cf3a5542309839d27f578aa315b998407' (2023-09-30)
  → 'github:martinvonz/jj/69a30b47aff18e9d6caacaec8c539cc0b463d3c7' (2023-10-12)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/adcfd6aa860d1d129055039696bc457af7d50d0e' (2023-09-28)
  → 'github:NixOS/nixos-hardware/fb6af288f6cf0f00d3af60cf9d5110433b954565' (2023-10-12)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/5cfafa12d57374f48bcc36fda3274ada276cf69e' (2023-09-27)
  → 'github:NixOS/nixpkgs/bd1cde45c77891214131cbbea5b1203e485a9d51' (2023-10-11)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/a4c3c904ab29e04a20d3a6da6626d66030385773' (2023-09-30)
  → 'github:oxalica/rust-overlay/aa7584f5bbf5947716ad8ec14eccc0334f0d28f0' (2023-10-12)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/720bd006d855b08e60664e4683ccddb7a9ff614a' (2023-09-27)
  → 'github:numtide/treefmt-nix/0b2ffeb3ae1a7449a48a952f3e731cfa41eaf780' (2023-10-11)
2023-10-12 21:33:19 +02:00
7a54252172
Switch alacritty color scheme to blue for more readable blue color 2023-10-12 21:32:35 +02:00
dependabot[bot]
5891c3e4de build(deps): bump DeterminateSystems/nix-installer-action from 4 to 5
Bumps [DeterminateSystems/nix-installer-action](https://github.com/determinatesystems/nix-installer-action) from 4 to 5.
- [Release notes](https://github.com/determinatesystems/nix-installer-action/releases)
- [Commits](https://github.com/determinatesystems/nix-installer-action/compare/v4...v5)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-10-11 19:07:26 +02:00
56bdafd54a
Fix formatting 2023-10-09 00:19:52 +02:00
b4907407fc
Switch to systemd stage 1 2023-10-08 12:24:31 +02:00
c09793669b
Fix updates 2023-10-08 00:42:44 +02:00
c29d21b186
Use ssh-agent 2023-10-08 00:40:32 +02:00
34db2b3098
Add backup key 2023-10-07 23:49:34 +02:00
3ae6b7619b
Add backup key 2023-10-07 23:22:14 +02:00
49245cee2e
Enable yubikey and upgrade keys 2023-10-07 23:14:54 +02:00
75cb0fb634
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/05d40d17bf3459606316e3e9ec683b784ff28f16' (2023-09-20)
  → 'github:numtide/devshell/cd4e2fda3150dd2f689caeac07b7f47df5197c31' (2023-09-29)
• Updated input 'eza':
    'github:eza-community/eza/cdf22c57c58c234257176c3a0ec0d6423b787716' (2023-09-26)
  → 'github:eza-community/eza/522d20c8d2b86db0412e10bdc41780c9a83c790d' (2023-09-30)
• Updated input 'jujutsu':
    'github:martinvonz/jj/9938051d99cc7cbe13e577437afe07717a20d66d' (2023-09-26)
  → 'github:martinvonz/jj/f0f1d72cf3a5542309839d27f578aa315b998407' (2023-09-30)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/8ee78470029e641cddbd8721496da1316b47d3b4' (2023-09-04)
  → 'github:nix-community/nixos-generators/150f38bd1e09e20987feacb1b0d5991357532fb5' (2023-09-30)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/61283b30d11f27d5b76439d43f20d0c0c8ff5296' (2023-09-24)
  → 'github:NixOS/nixos-hardware/adcfd6aa860d1d129055039696bc457af7d50d0e' (2023-09-28)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/261abe8a44a7e8392598d038d2e01f7b33cf26d0' (2023-09-24)
  → 'github:NixOS/nixpkgs/5cfafa12d57374f48bcc36fda3274ada276cf69e' (2023-09-27)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/c89a55d2d91cf55234466934b25deeffa365188a' (2023-09-26)
  → 'github:oxalica/rust-overlay/a4c3c904ab29e04a20d3a6da6626d66030385773' (2023-09-30)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/e951529be2e7c669487de78f5aef8597bbae5fca' (2023-09-21)
  → 'github:numtide/treefmt-nix/720bd006d855b08e60664e4683ccddb7a9ff614a' (2023-09-27)
2023-09-30 19:47:26 +02:00
dependabot[bot]
76052cb731 build(deps): bump actions/checkout from 2 to 4
Bumps [actions/checkout](https://github.com/actions/checkout) from 2 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v2...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-09-30 19:12:35 +02:00
dependabot[bot]
43a20d60f6 build(deps): bump cachix/install-nix-action from 22 to 23
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 22 to 23.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v22...v23)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-09-30 19:11:20 +02:00
1f27149cd9
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/f6aec2e8b1cdddcab10ce7fc2eac66886e3deaad' (2023-09-11)
  → 'github:numtide/devshell/05d40d17bf3459606316e3e9ec683b784ff28f16' (2023-09-20)
• Updated input 'home-manager':
    'github:nix-community/home-manager/9787dffff5d315c9593d3f9fb0f9bf2097e1b57b' (2023-09-11)
  → 'github:nix-community/home-manager/07682fff75d41f18327a871088d20af2710d4744' (2023-09-19)
• Updated input 'jujutsu':
    'github:martinvonz/jj/39c0f0d2d568adb0149fbe5532b0cf10c52e0a17' (2023-09-18)
  → 'github:martinvonz/jj/9938051d99cc7cbe13e577437afe07717a20d66d' (2023-09-26)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/570256327eb6ca6f7bebe8d93af49459092a0c43' (2023-09-14)
  → 'github:NixOS/nixos-hardware/61283b30d11f27d5b76439d43f20d0c0c8ff5296' (2023-09-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/e5f018cf150e29aac26c61dac0790ea023c46b24' (2023-09-12)
  → 'github:NixOS/nixpkgs/261abe8a44a7e8392598d038d2e01f7b33cf26d0' (2023-09-24)
2023-09-26 18:18:51 +02:00
23cbf5c1cb
alias exa=eza 2023-09-26 18:16:49 +02:00
719c251d6e
Replace exa with eza
Override inputs to keep number of transitive inputs small
2023-09-26 18:07:54 +02:00
703c86352a
use newer jj version
fix dependencies of homepage
2023-09-18 19:37:49 +02:00
41f3ade99f
Install jujutsu git frontend 2023-09-18 18:11:38 +02:00
4f9349afce
Deduplicate some inputs 2023-09-17 19:50:19 +02:00
43f46c1fdc
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/65114ea495a8d3cc1352368bf170d67ef005aa5a' (2023-09-04)
  → 'github:numtide/devshell/f6aec2e8b1cdddcab10ce7fc2eac66886e3deaad' (2023-09-11)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/f9e7cf818399d17d347f847525c5a5a8032e4e44' (2023-08-23)
  → 'github:numtide/flake-utils/ff7b65b44d01cf9ba6a71320833626af21126384' (2023-09-12)
• Updated input 'home-manager':
    'github:nix-community/home-manager/5bac4a1c06cd77cf8fc35a658ccb035a6c50cd2c' (2023-08-28)
  → 'github:nix-community/home-manager/9787dffff5d315c9593d3f9fb0f9bf2097e1b57b' (2023-09-11)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/793de77d9f83418b428e8ba70d1e42c6507d0d35' (2023-09-03)
  → 'github:NixOS/nixos-hardware/570256327eb6ca6f7bebe8d93af49459092a0c43' (2023-09-14)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/da5adce0ffaff10f6d0fee72a02a5ed9d01b52fc' (2023-09-03)
  → 'github:NixOS/nixpkgs/e5f018cf150e29aac26c61dac0790ea023c46b24' (2023-09-12)
2023-09-14 21:07:56 +02:00
bd68216219
update alacritty colors 2023-09-10 14:41:56 +02:00
ff447a0cc3
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/f9238ec3d75cefbb2b42a44948c4e8fb1ae9a205' (2023-07-03)
  → 'github:numtide/devshell/65114ea495a8d3cc1352368bf170d67ef005aa5a' (2023-09-04)
• Updated input 'flake-registry':
    'github:NixOS/flake-registry/5d8dc3eb692809ffd9a2f22cdb8015aa11972905' (2023-07-14)
  → 'github:NixOS/flake-registry/3f641cbae15d3c74370aa9b97fd0ac478a114305' (2023-08-23)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/919d646de7be200f3bf08cb76ae1f09402b6f9b4' (2023-07-11)
  → 'github:numtide/flake-utils/f9e7cf818399d17d347f847525c5a5a8032e4e44' (2023-08-23)
• Updated input 'home-manager':
    'github:nix-community/home-manager/07c347bb50994691d7b0095f45ebd8838cf6bc38' (2023-06-27)
  → 'github:nix-community/home-manager/5bac4a1c06cd77cf8fc35a658ccb035a6c50cd2c' (2023-08-28)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/b1171de4d362c022130c92d7c8adc4bf2b83d586' (2023-07-23)
  → 'github:nix-community/nixos-generators/8ee78470029e641cddbd8721496da1316b47d3b4' (2023-09-04)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/02fea408f27186f139153e1ae88f8ab2abd9c22c' (2023-07-16)
  → 'github:nix-community/nixpkgs.lib/f5af57d3ef9947a70ac86e42695231ac1ad00c25' (2023-09-03)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/430a56dd16fe583a812b2df44dca002acab2f4f6' (2023-08-12)
  → 'github:NixOS/nixos-hardware/793de77d9f83418b428e8ba70d1e42c6507d0d35' (2023-09-03)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/3fe694c4156b84dac12627685c7ae592a71e2206' (2023-08-12)
  → 'github:NixOS/nixpkgs/da5adce0ffaff10f6d0fee72a02a5ed9d01b52fc' (2023-09-03)
2023-09-04 19:52:55 +02:00
cf221f554e
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/96e5a0a0e8568c998135ea05575a9ed2c87f5492' (2023-07-30)
  → 'github:NixOS/nixos-hardware/430a56dd16fe583a812b2df44dca002acab2f4f6' (2023-08-12)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/48e82fe1b1c863ee26a33ce9bd39621d2ada0a33' (2023-07-28)
  → 'github:NixOS/nixpkgs/3fe694c4156b84dac12627685c7ae592a71e2206' (2023-08-12)
2023-08-13 17:54:32 +02:00
7ac3e6add6
inputs: switch back to nixos-hardware master branch 2023-07-30 13:03:31 +02:00
7fe3575f0d
flake: fix rtw89 firmware dependency 2023-07-29 18:58:15 +02:00
f699d43eeb
git: use dark theme for diff viewer 2023-07-29 17:22:38 +02:00
ed0dd8fa36
ninurta: remove unused reference 2023-07-29 17:19:18 +02:00
fae51f11c9
ninurta: create snapshots subvolumes for snapper
See also https://github.com/NixOS/nixpkgs/pull/78046
2023-07-29 17:17:10 +02:00
0d02c7ddd8
flake.lock: Update
Flake lock file updates:

• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/11c98929963a95ad3830960a9216d00e2f792502' (2023-07-17)
  → 'github:nix-community/nixos-generators/b1171de4d362c022130c92d7c8adc4bf2b83d586' (2023-07-23)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/d4ea64f2063820120c05f6ba93ee02e6d4671d6b' (2023-07-14)
  → 'github:NixOS/nixos-hardware/ba9650b14e83b365fb9e731f7d7c803f22d2aecf' (2023-07-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/53657afe29748b3e462f1f892287b7e254c26d77' (2023-07-17)
  → 'github:NixOS/nixpkgs/48e82fe1b1c863ee26a33ce9bd39621d2ada0a33' (2023-07-28)
2023-07-29 15:37:31 +02:00
a0351bb03c
Update README 2023-07-18 19:07:49 +02:00
a429417650
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-registry':
    'github:NixOS/flake-registry/8054bfa00d60437297d670ab3296a117e7059a10' (2023-04-25)
  → 'github:NixOS/flake-registry/5d8dc3eb692809ffd9a2f22cdb8015aa11972905' (2023-07-14)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/dbabf0ca0c0c4bce6ea5eaf65af5cb694d2082c7' (2023-06-25)
  → 'github:numtide/flake-utils/919d646de7be200f3bf08cb76ae1f09402b6f9b4' (2023-07-11)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/9191c85aab6b1a7ad395c13d340f2aa0e3ddf552' (2023-07-07)
  → 'github:nix-community/nixos-generators/11c98929963a95ad3830960a9216d00e2f792502' (2023-07-17)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/a92befce80a487380ea5e92ae515fe33cebd3ac6' (2023-07-02)
  → 'github:nix-community/nixpkgs.lib/02fea408f27186f139153e1ae88f8ab2abd9c22c' (2023-07-16)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/429f232fe1dc398c5afea19a51aad6931ee0fb89' (2023-06-15)
  → 'github:NixOS/nixos-hardware/d4ea64f2063820120c05f6ba93ee02e6d4671d6b' (2023-07-14)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/e11142026e2cef35ea52c9205703823df225c947' (2023-07-05)
  → 'github:NixOS/nixpkgs/53657afe29748b3e462f1f892287b7e254c26d77' (2023-07-17)
2023-07-18 19:07:25 +02:00
dependabot[bot]
76c8a45ba6 build(deps): bump cachix/install-nix-action from 21 to 22
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 21 to 22.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v21...v22)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-07-18 19:06:27 +02:00
dependabot[bot]
241ad61896 build(deps): bump DeterminateSystems/nix-installer-action from 3 to 4
Bumps [DeterminateSystems/nix-installer-action](https://github.com/DeterminateSystems/nix-installer-action) from 3 to 4.
- [Release notes](https://github.com/DeterminateSystems/nix-installer-action/releases)
- [Commits](https://github.com/DeterminateSystems/nix-installer-action/compare/v3...v4)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-07-18 19:06:19 +02:00
e81b73157f
borg-server: increase quotas 2023-07-13 21:41:15 +02:00
14934251b9
dark theme 2023-07-13 19:05:37 +02:00
ea0f94ea49
fix formatting 2023-07-12 22:21:28 +02:00
22365053c5
soft-serve: fix missing bash 2023-07-09 02:26:14 +02:00
9480ab3246
Install soft-serve on ninurta 2023-07-09 01:11:47 +02:00
4225de2ae9
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/fd6223370774dd9c33354e87a007004b5fd36442' (2023-06-13)
  → 'github:numtide/devshell/f9238ec3d75cefbb2b42a44948c4e8fb1ae9a205' (2023-07-03)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/a1720a10a6cfe8234c0e93907ffe81be440f4cef' (2023-05-31)
  → 'github:numtide/flake-utils/dbabf0ca0c0c4bce6ea5eaf65af5cb694d2082c7' (2023-06-25)
• Updated input 'home-manager':
    'github:nix-community/home-manager/61e5d1c38ef04ba30a9119825b159bce9c6010be' (2023-06-13)
  → 'github:nix-community/home-manager/07c347bb50994691d7b0095f45ebd8838cf6bc38' (2023-06-27)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/a54683aa7eff00ee5b33dec225525d0eb6ab02de' (2023-06-16)
  → 'github:nix-community/nixos-generators/9191c85aab6b1a7ad395c13d340f2aa0e3ddf552' (2023-07-07)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/961e99baaaa57f5f7042fe7ce089a88786c839f4' (2023-06-04)
  → 'github:nix-community/nixpkgs.lib/a92befce80a487380ea5e92ae515fe33cebd3ac6' (2023-07-02)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/c7ff1b9b95620ce8728c0d7bd501c458e6da9e04' (2023-06-16)
  → 'github:NixOS/nixpkgs/e11142026e2cef35ea52c9205703823df225c947' (2023-07-05)
2023-07-07 20:47:54 +02:00
4c032f7ceb
home: remove citrix 2023-06-25 23:13:56 +02:00
575fed8443
Use helix from nixpkgs 2023-06-25 22:17:50 +02:00
e53a688e51
Upgrade flake.nix 2023-06-25 22:15:30 +02:00
ee0fd8835c
Remove emacs config 2023-06-25 21:38:07 +02:00
fa9e81589b
fix hydra networking and remove unused hydra config files 2023-06-25 21:35:31 +02:00
dc83848eb0
Sanbox ddns service and fix auth problems 2023-06-21 16:45:20 +02:00
f3098f45b6
Drop legacy IP from DDNS client 2023-06-21 16:20:35 +02:00
4da21e0649
Fix DNS server address 2023-06-21 16:18:19 +02:00
f763d99273
ninurta: fix network config 2023-06-21 16:18:19 +02:00
7a8203e58c
use backup VLAN and configure DDNS 2023-06-21 15:04:41 +02:00
eed2c88bcc
Add interface and credentials path options for DDNS client 2023-06-21 14:27:49 +02:00
68702a27da
surgat: make postgressql backups 2023-06-21 14:01:24 +02:00
0dfbe5e35b
surgat: Change backup location 2023-06-21 13:46:41 +02:00
685e2e6fd1
Remove old git modules 2023-06-21 13:43:29 +02:00
fc64fa0cf7
Add missing newline 2023-06-18 19:51:26 +02:00
af8ce81c90
ninurta: backup to backup2 2023-06-18 19:39:30 +02:00
61bed7f861
backup1: Fixup backup path 2023-06-18 19:28:12 +02:00
414e596e99
ninurta: offsite backup 2023-06-18 19:19:08 +02:00
f40634e545
activate backup to new location 2023-06-18 18:53:36 +02:00
57d04d981f
gorgon: set up offsite backup 2023-06-18 14:46:22 +02:00
8dcc5a1f2f
ninurta: activate the hydra 2023-06-18 13:37:17 +02:00
423bc19958
ninurta: index.txt 2023-06-18 12:43:44 +02:00
2f032a07f9
ninurta: Fix tunnels 2023-06-18 12:38:12 +02:00
d70b976f87
Fix backup client 2023-06-18 12:00:58 +02:00
7945f2ef0c
ninurta: Make backups 2023-06-18 11:49:06 +02:00
b18260a8a6
ninurta: Activate hydra. Snapper on storage. Do not wait for wlan to come online 2023-06-18 10:42:00 +02:00
175413771d
Prevent automatic reboot for encrypted systems 2023-06-18 10:14:09 +02:00
1f13ba6019
ninurta: spin down disks after 10 min and activate backup server 2023-06-18 01:34:40 +02:00
d8f717cf23
ninurta: Add storage 2023-06-17 21:35:06 +02:00
0c9c4ef704
Fix routing via VPN 2023-06-17 20:55:17 +02:00
a3053b98c7
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/6b2554d28d46bfa6e24b941e999a145760dad0e1' (2023-06-05)
  → 'github:numtide/devshell/fd6223370774dd9c33354e87a007004b5fd36442' (2023-06-13)
• Updated input 'home-manager':
    'github:nix-community/home-manager/93db05480c0c0f30382d3e80779e8386dcb4f9dd' (2023-06-01)
  → 'github:nix-community/home-manager/61e5d1c38ef04ba30a9119825b159bce9c6010be' (2023-06-13)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/122dcc32cadf14c5015aa021fae8882c5058263a' (2023-06-05)
  → 'github:nix-community/nixos-generators/a54683aa7eff00ee5b33dec225525d0eb6ab02de' (2023-06-16)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/e4b34b90f27696ec3965fa15dcbacc351293dc67' (2023-06-08)
  → 'github:NixOS/nixos-hardware/429f232fe1dc398c5afea19a51aad6931ee0fb89' (2023-06-15)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/a558f7ac29f50c4b937fb5c102f587678ae1c9fb' (2023-06-06)
  → 'github:NixOS/nixpkgs/c7ff1b9b95620ce8728c0d7bd501c458e6da9e04' (2023-06-16)
2023-06-17 11:13:10 +02:00
dcab8483da
Revert "ninurta: directly ask for password on ssh"
This reverts commit 224570ac3f.
2023-06-17 11:12:38 +02:00
e3da8eabd7
remove global additional binary caches 2023-06-09 19:31:42 +02:00
6b7642dc76
update and replace nixd with nil 2023-06-09 00:50:52 +02:00
51c656a344
Fix DNSSEC on VPN 2023-06-09 00:50:36 +02:00
7cc9501220
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/5143ea68647c4cf5227e4ad2100db6671fc4c369' (2023-05-09)
  → 'github:numtide/devshell/6b2554d28d46bfa6e24b941e999a145760dad0e1' (2023-06-05)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/cfacdce06f30d2b68473a46042957675eebb3401' (2023-04-11)
  → 'github:numtide/flake-utils/a1720a10a6cfe8234c0e93907ffe81be440f4cef' (2023-05-31)
• Updated input 'home-manager':
    'github:nix-community/home-manager/2d963854ae2499193c0c72fd67435fee34d3e4fd' (2023-05-27)
  → 'github:nix-community/home-manager/93db05480c0c0f30382d3e80779e8386dcb4f9dd' (2023-06-01)
• Updated input 'nixd':
    'github:nix-community/nixd/8f3251fc2d8d1e3cac140e20e785ac733d76ed4a' (2023-05-31)
  → 'github:nix-community/nixd/b5079c4d79905048d3c0b39e1a2a6a66067f1111' (2023-06-08)
• Updated input 'nixd/flake-parts':
    'github:hercules-ci/flake-parts/006c75898cf814ef9497252b022e91c946ba8e17' (2023-05-08)
  → 'github:hercules-ci/flake-parts/71fb97f0d875fd4de4994dfb849f2c75e17eb6c3' (2023-06-01)
• Updated input 'nixd/flake-parts/nixpkgs-lib':
    'github:NixOS/nixpkgs/da45bf6ec7bbcc5d1e14d3795c025199f28e0de0?dir=lib' (2023-04-30)
  → 'github:NixOS/nixpkgs/4f53efe34b3a8877ac923b9350c874e3dcd5dc0a?dir=lib' (2023-05-31)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/05bef004794f352ea12475a89f3f55b4102c0728' (2023-05-25)
  → 'github:nix-community/nixos-generators/122dcc32cadf14c5015aa021fae8882c5058263a' (2023-06-05)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/367c0e1086a4eb4502b24d872cea2c7acdd557f4' (2023-04-09)
  → 'github:nix-community/nixpkgs.lib/961e99baaaa57f5f7042fe7ce089a88786c839f4' (2023-06-04)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/4cc688ee711159b9bcb5a367be44007934e1a49d' (2023-05-24)
  → 'github:NixOS/nixos-hardware/e4b34b90f27696ec3965fa15dcbacc351293dc67' (2023-06-08)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/551a52bfdd02e7b75be5faf9b42f864112d88654' (2023-05-26)
  → 'github:NixOS/nixpkgs/a558f7ac29f50c4b937fb5c102f587678ae1c9fb' (2023-06-06)
2023-06-09 00:46:55 +02:00
0c52861ef8
Enable IPv4 routing via VPN 2023-06-04 19:52:01 +02:00
0e0415e81e
Fix per link DNS resolvers 2023-06-04 19:01:57 +02:00
224570ac3f
ninurta: directly ask for password on ssh 2023-06-04 04:24:31 +02:00
f2f06c4eae
ninurta: Update path to key 2023-06-04 03:13:48 +02:00
d26c08e27f
secrets: rekey for ninurta 2023-06-04 02:57:09 +02:00
85419b9ce6
ninurta: fixup 2023-06-04 02:44:15 +02:00
98590345f3
secrets: rekey for ninurta 2023-06-04 02:39:36 +02:00
41dc68ae6f
ninurta: use initrd ssh key from agenix 2023-06-04 02:38:42 +02:00
1524f02094
secrets: add backup keys for ninurta 2023-06-04 02:04:30 +02:00
5e105bdbfc
ninurta: disable backups for now 2023-06-04 01:57:03 +02:00
a89dc8a8ec
ninurta: fix path to secrets 2023-06-04 01:52:19 +02:00
589516b230
secrets: rekey for ninurta 2023-06-04 01:48:08 +02:00
4614971ab3
ninurta: disable stage1 systemd 2023-06-04 01:41:33 +02:00
26463da687
ninurta: fix gnome config 2023-06-04 00:37:30 +02:00
8678193fc2
ninurta: configure persistent MAC address policy and no suspending 2023-06-04 00:24:01 +02:00
af47fff022
ninurta: configure networking in initrd and persistent MAC 2023-06-03 23:19:18 +02:00
5dfb385d54
ninurta: update private key location for initrd 2023-06-03 19:18:25 +02:00
295a2e9b3b
Update ninurta config 2023-06-03 18:53:54 +02:00
4587a39620
Add package for installer iso image 2023-06-03 15:11:29 +02:00
5344688a20
add more caches and nixd 2023-05-31 22:20:31 +02:00
3da66c1cd3
fix formatting 2023-05-30 22:20:40 +02:00
dependabot[bot]
af283c5764 build(deps): bump DeterminateSystems/nix-installer-action from 1 to 3
Bumps [DeterminateSystems/nix-installer-action](https://github.com/DeterminateSystems/nix-installer-action) from 1 to 3.
- [Release notes](https://github.com/DeterminateSystems/nix-installer-action/releases)
- [Commits](https://github.com/DeterminateSystems/nix-installer-action/compare/v1...v3)

---
updated-dependencies:
- dependency-name: DeterminateSystems/nix-installer-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-05-30 19:05:29 +02:00
dependabot[bot]
0d79e63ff6 build(deps): bump cachix/install-nix-action from 20 to 21
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 20 to 21.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v20...v21)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-05-30 19:05:21 +02:00
9014457aad ifrit: use networkd and resolved 2023-05-30 19:05:07 +02:00
5c61ed2479 configure fallback DNS 2023-05-30 19:05:07 +02:00
4252ec1133 Make surgat use networkd 2023-05-30 19:05:07 +02:00
7f1a46c0dd Upgrade to 23.05 2023-05-28 14:51:13 +02:00
5152b7c9bb
gorgon: upgrade systemState 2023-05-27 01:27:16 +02:00
adeba61fd5
enable podman 2023-05-27 01:25:54 +02:00
ec51a9fd8a
Switch to gnome color scheme 2023-05-27 00:07:14 +02:00
417eb39099 Update nix-flake-update.yml 2023-05-24 21:30:20 +02:00
dependabot[bot]
b31f32d57c build(deps): bump peter-evans/create-pull-request from 3 to 5
Bumps [peter-evans/create-pull-request](https://github.com/peter-evans/create-pull-request) from 3 to 5.
- [Release notes](https://github.com/peter-evans/create-pull-request/releases)
- [Commits](https://github.com/peter-evans/create-pull-request/compare/v3...v5)

---
updated-dependencies:
- dependency-name: peter-evans/create-pull-request
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-05-24 21:24:53 +02:00
3c5b875c5b
Install offlineimap 2023-05-24 20:10:37 +02:00
b2b874ac6f
flake.lock: Update
Flake lock file updates:

• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/6c591e7adc514090a77209f56c9d0c551ab8530d' (2023-05-16)
  → 'github:NixOS/nixpkgs/628d4bb6e9f4f0c30cfd9b23d3c1cdcec9d3cb5c' (2023-05-18)
2023-05-20 14:54:28 +02:00
59d7c03022
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/fb6673fe9fe4409e3f43ca86968261e970918a83' (2023-04-28)
  → 'github:numtide/devshell/5143ea68647c4cf5227e4ad2100db6671fc4c369' (2023-05-09)
• Removed input 'devshell/flake-utils'
• Added input 'devshell/systems':
    'github:nix-systems/default/da67096a3b9bf56a91d16901293e51ba5b49a27e' (2023-04-09)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/8e981bbc0f146e87ac5e8cc98a84dd6702648adb' (2023-05-01)
  → 'github:nix-community/nixos-generators/10079333313ff62446e6f2b0e7c5231c7431d269' (2023-05-08)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/7dc46304675f4ff2d6be921ef60883efd31363c4' (2023-05-02)
  → 'github:NixOS/nixos-hardware/71ce85372a614d418d5e303dd5702a79d1545c04' (2023-05-15)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/5dab6490fe6d72b3f120ae8660181e20f396fbdf' (2023-05-02)
  → 'github:NixOS/nixpkgs/6c591e7adc514090a77209f56c9d0c551ab8530d' (2023-05-16)
2023-05-18 19:33:25 +02:00
14b0840ba4
Fix color in diff viewer 2023-05-18 19:30:09 +02:00
af2092ced2
Update colors 2023-05-18 19:24:10 +02:00
4dcaef4d00
Fix backup
Enable citrix_workspace
2023-05-18 14:19:34 +02:00
7921e3fa97
Enable paperless group to put files into consumption directory for paperless 2023-05-12 20:12:05 +02:00
4b1ca22b9f
Setup paperless 2023-05-12 19:03:34 +02:00
c649f0f3c2
Install helix from master branch 2023-05-12 18:35:28 +02:00
a81a68713d
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/3e0e60ab37cd0bf7ab59888f5c32499d851edb47' (2023-03-16)
  → 'github:numtide/devshell/fb6673fe9fe4409e3f43ca86968261e970918a83' (2023-04-28)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/d774aeedc0685e5871be1e1ee0511900deeb21c2' (2023-04-24)
  → 'github:nix-community/nixos-generators/8e981bbc0f146e87ac5e8cc98a84dd6702648adb' (2023-05-01)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/3006d2860a6ed5e01b0c3e7ffb730e9b293116e2' (2023-04-07)
  → 'github:NixOS/nixos-hardware/7dc46304675f4ff2d6be921ef60883efd31363c4' (2023-05-02)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/f5364316e314436f6b9c8fd50592b18920ab18f9' (2023-04-24)
  → 'github:NixOS/nixpkgs/5dab6490fe6d72b3f120ae8660181e20f396fbdf' (2023-05-02)
2023-05-03 20:39:04 +02:00
b3f3916ff2
gorgon: disable local resolver 2023-04-26 12:09:55 +02:00
2fdf3fd5e8
Revert "uwupn -> wg-quick"
This reverts commit 90476f057d.
2023-04-26 12:09:18 +02:00
320a8864b7
gorgon: disable local resolver 2023-04-26 11:25:42 +02:00
90476f057d
uwupn -> wg-quick 2023-04-25 10:01:59 +02:00
e4cdc83a1f
add rule to allow access to keychron keyboard 2023-04-23 19:00:42 +02:00
050593d919
enable smartd only on hosts with spinning disks 2023-04-23 11:39:57 +02:00
9b2a6ee723
use local resolver on surgat 2023-04-23 11:36:47 +02:00
7041edcc55
remove librewolf from profile 2023-04-14 19:02:23 +02:00
1febc53be2
update helix 2023-04-14 19:00:10 +02:00
1995291712
update helix 2023-04-14 18:41:24 +02:00
aede09aa16
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/033b9f258ca96a10e543d4442071f614dc3f8412' (2023-04-09)
  → 'github:numtide/flake-utils/cfacdce06f30d2b68473a46042957675eebb3401' (2023-04-11)
• Updated input 'home-manager':
    'github:nix-community/home-manager/d6f3ba090ed090ae664ab5bac329654093aae725' (2023-04-03)
  → 'github:nix-community/home-manager/f9edbedaf015013eb35f8caacbe0c9666bbc16af' (2023-04-10)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/15ae4065acbf414989a8677097804326fe7c0532' (2023-04-06)
  → 'github:nix-community/nixos-generators/5ad9f98194cfe7aa990929fb8cae28c500da7620' (2023-04-14)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/b18d328214ca3c627d3cc3f51fd9d1397fdbcd7a' (2023-04-02)
  → 'github:nix-community/nixpkgs.lib/367c0e1086a4eb4502b24d872cea2c7acdd557f4' (2023-04-09)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/48dcbaf7fa799509cbec85d55b8d62dcf1477d57' (2023-04-09)
  → 'github:NixOS/nixpkgs/87edbd74246ccdfa64503f334ed86fa04010bab9' (2023-04-12)
2023-04-14 17:48:19 +02:00
8ffb48fd0f
enable smartd on all hosts 2023-04-14 17:24:48 +02:00
62567d1f90
server: enable smartd 2023-04-13 22:16:26 +02:00
15f62ba841
use firefox with wayland backend 2023-04-10 16:40:07 +02:00
f4d514b492
use firefox module from nixpkgs instead home-manager 2023-04-10 16:31:42 +02:00
d2b756a693
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-registry':
    'github:NixOS/flake-registry/507c028d8d189b6647592dfd10ee677578de45a1' (2023-01-20)
  → 'github:NixOS/flake-registry/4ea5076e347dda44283714b8f4d580f6922064e9' (2023-04-09)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/93a2b84fc4b70d9e089d029deacc3583435c2ed6' (2023-03-15)
  → 'github:numtide/flake-utils/033b9f258ca96a10e543d4442071f614dc3f8412' (2023-04-09)
• Added input 'flake-utils/systems':
    'github:nix-systems/default/da67096a3b9bf56a91d16901293e51ba5b49a27e' (2023-04-09)
• Updated input 'home-manager':
    'github:nix-community/home-manager/83110c259889230b324bb2d35bef78bf5f214a1f' (2023-03-25)
  → 'github:nix-community/home-manager/d6f3ba090ed090ae664ab5bac329654093aae725' (2023-04-03)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/d5cd198c80ee62a801a078ad991c99c0175971cf' (2023-03-22)
  → 'github:nix-community/nixos-generators/15ae4065acbf414989a8677097804326fe7c0532' (2023-04-06)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/44214417fe4595438b31bdb9469be92536a61455' (2023-03-19)
  → 'github:nix-community/nixpkgs.lib/b18d328214ca3c627d3cc3f51fd9d1397fdbcd7a' (2023-04-02)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/a6aa8174fa61e55bd7e62d35464d3092aefe0421' (2023-03-29)
  → 'github:NixOS/nixos-hardware/3006d2860a6ed5e01b0c3e7ffb730e9b293116e2' (2023-04-07)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/884e3b68be02ff9d61a042bc9bd9dd2a358f95da' (2023-04-01)
  → 'github:NixOS/nixpkgs/48dcbaf7fa799509cbec85d55b8d62dcf1477d57' (2023-04-09)
2023-04-10 08:22:57 +02:00
52d316a56f
flake.lock: Update
Flake lock file updates:

• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/a575c243c23e2851b78c00e9fa245232926ec32f' (2023-03-29)
  → 'github:NixOS/nixpkgs/884e3b68be02ff9d61a042bc9bd9dd2a358f95da' (2023-04-01)
2023-04-02 21:32:10 +02:00
f2d472d3c8
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/9154cd519a8942728038819682d6b3ff33f321bb' (2023-03-17)
  → 'github:nix-community/home-manager/83110c259889230b324bb2d35bef78bf5f214a1f' (2023-03-25)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/0c043999b16caba6fb571af2d228775729829943' (2023-03-09)
  → 'github:nix-community/nixos-generators/d5cd198c80ee62a801a078ad991c99c0175971cf' (2023-03-22)
• Updated input 'nixos-generators/nixlib':
    'github:nix-community/nixpkgs.lib/c9d4f2476046c6a7a2ce3c2118c48455bf0272ea' (2023-02-26)
  → 'github:nix-community/nixpkgs.lib/44214417fe4595438b31bdb9469be92536a61455' (2023-03-19)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/994584bb26ffa1deeaf56099601ef4bcc487273e' (2023-03-17)
  → 'github:NixOS/nixos-hardware/a6aa8174fa61e55bd7e62d35464d3092aefe0421' (2023-03-29)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/cd34d6ed7ba7d5c4e44b04a53dc97edb52f2766c' (2023-03-16)
  → 'github:NixOS/nixpkgs/a575c243c23e2851b78c00e9fa245232926ec32f' (2023-03-29)
2023-03-30 21:38:35 +02:00
59a9326729
fix flake inputs 2023-03-18 14:17:24 +01:00
1f9e544478
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/643d1857fea4e71e7f251cb574f59b1d63778085' (2023-03-03)
  → 'github:numtide/devshell/3e0e60ab37cd0bf7ab59888f5c32499d851edb47' (2023-03-16)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/3db36a8b464d0c4532ba1c7dda728f4576d6d073' (2023-02-13)
  → 'github:numtide/flake-utils/93a2b84fc4b70d9e089d029deacc3583435c2ed6' (2023-03-15)
• Updated input 'home-manager':
    'github:nix-community/home-manager/b0be47978de5cfd729a79c3f57ace4c86364ff45' (2023-03-08)
  → 'github:nix-community/home-manager/9154cd519a8942728038819682d6b3ff33f321bb' (2023-03-17)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/22ef358f5fc72445bb920ae1395f5258e9838df7' (2023-03-09)
  → 'github:NixOS/nixos-hardware/994584bb26ffa1deeaf56099601ef4bcc487273e' (2023-03-17)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/a7cc81913bb3cd1ef05ed0ece048b773e1839e51' (2023-03-07)
  → 'github:NixOS/nixpkgs/cd34d6ed7ba7d5c4e44b04a53dc97edb52f2766c' (2023-03-16)
2023-03-18 13:51:38 +01:00
c75427cf69
pin flake registry 2023-03-17 23:40:29 +01:00
dependabot[bot]
a3fb63cff6 build(deps): bump cachix/install-nix-action from 19 to 20
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 19 to 20.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v19...v20)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-03-12 14:05:02 +01:00
9118d608c9
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/86bb69b0b1e10d99a30c4352f230f03106dd0f8a' (2023-03-02)
  → 'github:nix-community/home-manager/b0be47978de5cfd729a79c3f57ace4c86364ff45' (2023-03-08)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/59d63c5bb0574048d3519c268fccf73e57220bf5' (2023-03-03)
  → 'github:nix-community/nixos-generators/0c043999b16caba6fb571af2d228775729829943' (2023-03-09)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/77de4cd09db4dbee9551ed2853cfcf113d7dc5ce' (2023-02-28)
  → 'github:NixOS/nixos-hardware/22ef358f5fc72445bb920ae1395f5258e9838df7' (2023-03-09)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/96e18717904dfedcd884541e5a92bf9ff632cf39' (2023-03-02)
  → 'github:NixOS/nixpkgs/a7cc81913bb3cd1ef05ed0ece048b773e1839e51' (2023-03-07)
2023-03-09 20:38:15 +01:00
ee5ecc47f7
enable wireshark 2023-03-08 17:42:45 +01:00
bf64dc2c90
uninstall element-desktop 2023-03-05 13:06:26 +01:00
fc2dd0ac42
install fractal-next 2023-03-05 13:04:29 +01:00
fb9a0076e8
disable reboot after upgrade on agares 2023-03-04 12:30:16 +01:00
56dc4fcaee
fix cache name 2023-03-04 12:08:58 +01:00
ebfe5f8dd2
remove some flake inputs 2023-03-04 12:03:11 +01:00
79767236bb
use flakes in ci 2023-03-04 11:32:40 +01:00
3e1e140f8d
update cachix CI action 2023-03-04 11:28:21 +01:00
dependabot[bot]
fad936a040 build(deps): bump cachix/install-nix-action from 18 to 19
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 18 to 19.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v18...v19)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-03-04 11:24:18 +01:00
9a2feac45d
add rules for saleae logic analyzer 2023-03-04 11:22:24 +01:00
33e5ba9123
update nixpkgs and install saleae-logic-2 2023-03-03 13:30:14 +01:00
02359f7303
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/6fe837bb4f540a1832522ec54604c453757836b2' (2023-02-07)
  → 'github:numtide/devshell/71e3022e3ab20bbf1342640547ef5bc14fb43bf4' (2023-02-13)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
  → 'github:numtide/flake-utils/3db36a8b464d0c4532ba1c7dda728f4576d6d073' (2023-02-13)
• Updated input 'home-manager':
    'github:nix-community/home-manager/65c47ced082e3353113614f77b1bc18822dc731f' (2023-01-23)
  → 'github:nix-community/home-manager/2cb27c79117a2a75ff3416c3199a2dc57af6a527' (2023-02-13)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/103fe0800b9d739c279997561c9da9d242d5b6b8' (2023-02-11)
  → 'github:NixOS/nixpkgs/e19f25b587f15871d26442cfa1abe4418a815d7d' (2023-02-20)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/6a5dc1d3d557ea7b5c19b15ff91955124d0400fa' (2023-01-25)
  → 'github:nix-community/nixos-generators/1e0a05219f2a557d4622bc38f542abb360518795' (2023-02-13)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/44ae00e02e8036a66c08f4decdece7e3bbbefee2' (2023-02-09)
  → 'github:NixOS/nixos-hardware/d24ea777c57b69c6b143cf11d83184ef71b0dbbf' (2023-02-20)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
  → 'github:numtide/flake-utils/3db36a8b464d0c4532ba1c7dda728f4576d6d073' (2023-02-13)
2023-02-21 19:53:55 +01:00
f55b129a65
add element-desktop and librewolf 2023-02-21 19:52:56 +01:00
0854dcc130
fix formatting 2023-02-12 16:09:03 +01:00
8942c54251
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/2e19b92980a79118351ec12496a81c49bd674d8a' (2023-02-02)
  → 'github:numtide/devshell/6fe837bb4f540a1832522ec54604c453757836b2' (2023-02-07)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/8e8240194eda25b61449f29bb5131e02b28a5486' (2023-02-04)
  → 'github:NixOS/nixpkgs/103fe0800b9d739c279997561c9da9d242d5b6b8' (2023-02-11)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/b7ac0a56029e4f9e6743b9993037a5aaafd57103' (2023-01-24)
  → 'github:NixOS/nixos-hardware/44ae00e02e8036a66c08f4decdece7e3bbbefee2' (2023-02-09)
2023-02-12 15:21:30 +01:00
a5ce8ed73e
add ninurta 2023-02-05 17:56:03 +01:00
dfcbbcf70b
always use IPv6 for borg connections
There is no A record for backup0
2023-02-04 23:53:24 +01:00
28290de97a
switch to last agenix release 2023-02-04 23:28:16 +01:00
920bfc1da5
rekey secrets 2023-02-04 18:38:01 +01:00
87d883664f
disable noXlibs
Causes recompilation of many things...
2023-02-04 18:26:22 +01:00
9c27dbc6c3
surgat: add sshd to initrd 2023-02-04 17:56:30 +01:00
f252b99469
refactor profiles 2023-02-04 16:08:50 +01:00
738b86369a
remove thunderbird 2023-02-03 20:14:52 +01:00
71176977a3
fix secrets path 2023-02-03 20:10:17 +01:00
8f05af8f4b
install evolution 2023-02-03 20:05:23 +01:00
7523493890
move GS backup client config 2023-02-03 19:26:10 +01:00
f20b488b4f
fix flake update url 2023-02-03 19:20:25 +01:00
73cb331166
flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/49798e535ebc07fec82256b283d35be36d8c6c9a' (2023-01-29)
  → 'github:ryantm/agenix/b7ffcfe77f817d9ee992640ba1f270718d197f28' (2023-01-31)
• Added input 'agenix/darwin':
    'github:lnl7/nix-darwin/87b9d090ad39b25b2400029c64825fc2a8868943' (2023-01-09)
• Added input 'agenix/darwin/nixpkgs':
    follows 'agenix/nixpkgs'
• Updated input 'devshell':
    'github:numtide/devshell/5aa3a8039c68b4bf869327446590f4cdf90bb634' (2022-12-19)
  → 'github:numtide/devshell/2e19b92980a79118351ec12496a81c49bd674d8a' (2023-02-02)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/f413457e0dd7a42adefdbcea4391dd9751509025' (2023-01-30)
  → 'github:NixOS/nixpkgs/285b3ff0660640575186a4086e1f8dc0df2874b5' (2023-02-01)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/e92e5b6021b1ad4290e051111010ba51921507cd' (2023-01-27)
  → 'github:nix-community/nix-doom-emacs/8de922e4e23158790970a266234a853305b1928d' (2023-02-03)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/acff9f41c4962704acb8008e5ff5b90a43cf7758' (2023-01-26)
  → 'github:nix-community/emacs-overlay/a018577287e390e01654a8b44d57d183a51b72b2' (2023-02-02)
2023-02-03 18:41:31 +01:00
3a704f62c4
home: add picocom 2023-02-02 12:23:54 +01:00
d9b0ccc12e update and remove deploy-rs
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/42d371d861a227149dc9a7e03350c9ab8b8ddd68' (2023-01-09)
  → 'github:ryantm/agenix/49798e535ebc07fec82256b283d35be36d8c6c9a' (2023-01-29)
• Updated input 'home-manager':
    'github:nix-community/home-manager/89a8ba0b5b43b3350ff2e3ef37b66736b2ef8706' (2022-12-28)
  → 'github:nix-community/home-manager/65c47ced082e3353113614f77b1bc18822dc731f' (2023-01-23)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/cdead16a444a3e5de7bc9b0af8e198b11bb01804' (2023-01-20)
  → 'github:NixOS/nixpkgs/f413457e0dd7a42adefdbcea4391dd9751509025' (2023-01-30)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/cac2195c172b084562f028542cd2332ef6d6f27c' (2023-01-20)
  → 'github:nix-community/nix-doom-emacs/e92e5b6021b1ad4290e051111010ba51921507cd' (2023-01-27)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/fa7dedfa5e1171a76ff78a1260064e1b20ec93bb' (2023-01-19)
  → 'github:nix-community/emacs-overlay/acff9f41c4962704acb8008e5ff5b90a43cf7758' (2023-01-26)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/6510916b9f55a8f3110030bcdd1aee1b7fb77b6f' (2023-01-18)
  → 'github:hakimel/reveal.js/b1a9842b2f4544a2fda546383db38cc7a81f6b74' (2023-01-25)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/7bd6b87b3712e68007823e8dd5c37ee9b114fee3' (2023-01-15)
  → 'github:NixOS/nixos-hardware/b7ac0a56029e4f9e6743b9993037a5aaafd57103' (2023-01-24)
2023-01-31 10:38:52 +01:00
dependabot[bot]
e4583f784f
build(deps): bump cachix/cachix-action from 11 to 12 ()
Bumps [cachix/cachix-action](https://github.com/cachix/cachix-action) from 11 to 12.
- [Release notes](https://github.com/cachix/cachix-action/releases)
- [Commits](https://github.com/cachix/cachix-action/compare/v11...v12)

---
updated-dependencies:
- dependency-name: cachix/cachix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-01-30 21:00:58 +01:00
dependabot[bot]
ce130e2d0c
build(deps): bump cachix/install-nix-action from 15 to 18 ()
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 15 to 18.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v15...v18)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-01-30 21:00:41 +01:00
bde44cff9b
fix backup auto-mount 2023-01-22 20:18:15 +01:00
c5a07ff3cb
enable auto-deploy 2023-01-22 14:43:51 +01:00
81f0db14ac
flake.lock: Update
Flake lock file updates:

• Updated input 'deploy-rs':
    'github:serokell/deploy-rs/a5619f5660a00f58c2b7c16d89058e92327ac9b8' (2022-12-29)
  → 'github:serokell/deploy-rs/8c9ea9605eed20528bf60fae35a2b613b901fd77' (2023-01-19)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/a83ed85c14fcf242653df6f4b0974b7e1c73c6c6' (2023-01-14)
  → 'github:NixOS/nixpkgs/cdead16a444a3e5de7bc9b0af8e198b11bb01804' (2023-01-20)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/85a48dbec84e9c26785b58fecdefa1cfc580aea7' (2022-12-23)
  → 'github:nix-community/nix-doom-emacs/cac2195c172b084562f028542cd2332ef6d6f27c' (2023-01-20)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/9c95614e0b1a2f6a3f4cf9b99b17439887ea0373' (2022-12-22)
  → 'github:nix-community/emacs-overlay/fa7dedfa5e1171a76ff78a1260064e1b20ec93bb' (2023-01-19)
• Updated input 'nix-doom-emacs/flake-compat':
    'github:edolstra/flake-compat/009399224d5e398d03b22badca40a37ac85412a1' (2022-11-17)
  → 'github:edolstra/flake-compat/35bb57c0c8d8b62bbfd284272c928ceb64ddbde9' (2023-01-17)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/42153ea2fec66f90c1623be25d6774d96ecf8062' (2022-12-10)
  → 'github:emacs-straight/org-mode/ecb62e2e317b1a4b5b8a6c0f111ed7ef18413040' (2023-01-12)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/4fe3946cb43de57f79aaa7b646aee7e78f4bcc75' (2022-12-07)
  → 'github:hakimel/reveal.js/6510916b9f55a8f3110030bcdd1aee1b7fb77b6f' (2023-01-18)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/a64f5252a66253852bef1c627cea9e39928e6392' (2022-12-19)
  → 'github:jcs-elpa/ts-fold/75d6f9ed317b042b5bc7cb21503596d1c7a1b8c0' (2023-01-10)
2023-01-22 14:37:50 +01:00
4d380ff601
fix gs backup 2023-01-22 14:36:16 +01:00
b253f2b6b4
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/6a3f9996408c970b99b8b992b11bb249d1455b62' (2023-01-12)
  → 'github:NixOS/nixpkgs/a83ed85c14fcf242653df6f4b0974b7e1c73c6c6' (2023-01-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/88016c96c3c338aa801695cdd9f186820bcfe4d6' (2023-01-11)
  → 'github:NixOS/nixos-hardware/7bd6b87b3712e68007823e8dd5c37ee9b114fee3' (2023-01-15)
2023-01-16 12:01:21 +01:00
62c6956182
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/54644f409ab471e87014bb305eac8c50190bcf48' (2023-01-10)
  → 'github:NixOS/nixpkgs/6a3f9996408c970b99b8b992b11bb249d1455b62' (2023-01-12)
2023-01-13 19:44:07 +01:00
bf4b918fb5
improve udev rule for xilinx JTAG 2023-01-13 17:04:29 +01:00
0ad2548567
fix accessing Zynq via JTAG 2023-01-13 16:41:49 +01:00
979d013d9d
disable docker and libvirtd 2023-01-12 10:52:11 +01:00
7192681abe
flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/a630400067c6d03c9b3e0455347dc8559db14288' (2022-10-15)
  → 'github:ryantm/agenix/42d371d861a227149dc9a7e03350c9ab8b8ddd68' (2023-01-09)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/6a0d2701705c3cf6f42c15aa92b7885f1f8a477f' (2022-12-30)
  → 'github:NixOS/nixpkgs/54644f409ab471e87014bb305eac8c50190bcf48' (2023-01-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/ca29e25c39b8e117d4d76a81f1e229824a9b3a26' (2023-01-02)
  → 'github:NixOS/nixos-hardware/88016c96c3c338aa801695cdd9f186820bcfe4d6' (2023-01-11)
2023-01-12 10:34:56 +01:00
40d4500f9d
disable serving expired DNS entries
This should be fine, since popular names are prefetched and should therefore not expire that often.
2023-01-03 11:36:10 +01:00
7cde861e0b
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/913a47cd064cc06440ea84e5e0452039a85781f0' (2022-12-29)
  → 'github:NixOS/nixpkgs/6a0d2701705c3cf6f42c15aa92b7885f1f8a477f' (2022-12-30)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/0517e81e8ce24a0f4f9eebedbd7bbefcac97c058' (2023-01-01)
  → 'github:NixOS/nixos-hardware/ca29e25c39b8e117d4d76a81f1e229824a9b3a26' (2023-01-02)
2023-01-02 20:27:00 +01:00
43bf429929
flake.lock: Update
Flake lock file updates:

• Updated input 'deploy-rs':
    'github:serokell/deploy-rs/2a3c5f70eee04a465aa534d8bd4fcc9bb3c4a8ce' (2022-11-18)
  → 'github:serokell/deploy-rs/a5619f5660a00f58c2b7c16d89058e92327ac9b8' (2022-12-29)
• Updated input 'deploy-rs/flake-compat':
    'github:edolstra/flake-compat/64a525ee38886ab9028e6f61790de0832aa3ef03' (2022-03-25)
  → 'github:edolstra/flake-compat/009399224d5e398d03b22badca40a37ac85412a1' (2022-11-17)
• Updated input 'deploy-rs/utils':
    'github:numtide/flake-utils/0f8662f1319ad6abf89b3380dd2722369fc51ade' (2022-03-26)
  → 'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/dac57a4eccf1442e8bf4030df6fcbb55883cb682' (2022-12-24)
  → 'github:NixOS/nixpkgs/913a47cd064cc06440ea84e5e0452039a85781f0' (2022-12-29)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/9577ab1eaf01a738b015a7a7ab2a4616e158b6cd' (2022-12-21)
  → 'github:NixOS/nixos-hardware/0517e81e8ce24a0f4f9eebedbd7bbefcac97c058' (2023-01-01)
2023-01-01 14:58:34 +01:00
7fb03dbe2e
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/0e8125916b420e41bf0d23a0aa33fadd0328beb3' (2022-12-05)
  → 'github:nix-community/home-manager/89a8ba0b5b43b3350ff2e3ef37b66736b2ef8706' (2022-12-28)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/0938d73bb143f4ae037143572f11f4338c7b2d1c' (2022-12-17)
  → 'github:NixOS/nixpkgs/dac57a4eccf1442e8bf4030df6fcbb55883cb682' (2022-12-24)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/2150fd40b2110bbd11dcb62fa5f307ec345b0fb0' (2022-12-16)
  → 'github:nix-community/nix-doom-emacs/85a48dbec84e9c26785b58fecdefa1cfc580aea7' (2022-12-23)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/c873175c2f8d96cd77c5b6552f411ddd0959e483' (2022-12-15)
  → 'github:nix-community/emacs-overlay/9c95614e0b1a2f6a3f4cf9b99b17439887ea0373' (2022-12-22)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/85db0117ead108213cc2a4210f72746d8ad8d20a' (2022-12-10)
  → 'github:jcs-elpa/ts-fold/a64f5252a66253852bef1c627cea9e39928e6392' (2022-12-19)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/25010a042c23695ae457a97aad60e9b1d49f2ecc' (2022-12-19)
  → 'github:NixOS/nixos-hardware/9577ab1eaf01a738b015a7a7ab2a4616e158b6cd' (2022-12-21)
2022-12-29 14:21:25 +01:00
d911164488
fix DNS search domain in space 2022-12-20 19:44:32 +01:00
01b5fdb887
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/96a9dd12b8a447840cc246e17a47b81a4268bba7' (2022-10-31)
  → 'github:numtide/devshell/5aa3a8039c68b4bf869327446590f4cdf90bb634' (2022-12-19)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/7a6a010c3a1d00f8470a5ca888f2f927f1860a19' (2022-12-08)
  → 'github:NixOS/nixpkgs/0938d73bb143f4ae037143572f11f4338c7b2d1c' (2022-12-17)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/c852431c25a9d2b8f9322505a38868d4cee6b8d6' (2022-12-09)
  → 'github:nix-community/nix-doom-emacs/2150fd40b2110bbd11dcb62fa5f307ec345b0fb0' (2022-12-16)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/1b6e5b25af402e9f2fd49cf210cada9444c32504' (2022-12-08)
  → 'github:nix-community/emacs-overlay/c873175c2f8d96cd77c5b6552f411ddd0959e483' (2022-12-15)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/0737112852afe835a5a5833a2dd0a6852c04e0f0' (2022-11-19)
  → 'github:emacs-straight/org-mode/42153ea2fec66f90c1623be25d6774d96ecf8062' (2022-12-10)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/fb91989a9489755b890bf9e1957e5f29eaef59f6' (2022-12-04)
  → 'github:jcs-elpa/ts-fold/85db0117ead108213cc2a4210f72746d8ad8d20a' (2022-12-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/9d87bc030a0bf3f00e953dbf095a7d8e852dab6b' (2022-12-04)
  → 'github:NixOS/nixos-hardware/25010a042c23695ae457a97aad60e9b1d49f2ecc' (2022-12-19)
2022-12-20 13:26:06 +01:00
157c109a00
exclude borg config directory from backups 2022-12-17 13:42:15 +01:00
2277e25eca
fix formatting 2022-12-17 03:36:59 +01:00
7855de6a3e
fix backup 2022-12-17 02:46:37 +01:00
62db411fdd
update home-manager 2022-12-10 12:26:15 +01:00
c4ed2cbad9
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/660e7737851506374da39c0fa550c202c824a17c' (2022-12-02)
  → 'github:NixOS/nixpkgs/7a6a010c3a1d00f8470a5ca888f2f927f1860a19' (2022-12-08)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/3c02175dd06714c15ddd2f73708de9b4dacc6aa9' (2022-11-25)
  → 'github:nix-community/nix-doom-emacs/c852431c25a9d2b8f9322505a38868d4cee6b8d6' (2022-12-09)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/49d5cbd389a3fb843793cd7503ad7abdb4f40a9d' (2022-11-24)
  → 'github:nix-community/emacs-overlay/1b6e5b25af402e9f2fd49cf210cada9444c32504' (2022-12-08)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/9f1f7789bfbf689d9c1615e523d5c6262771e90f' (2022-11-17)
  → 'github:hakimel/reveal.js/4fe3946cb43de57f79aaa7b646aee7e78f4bcc75' (2022-12-07)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/c3da5520b988720f7f6e9e5e11b60746598112e0' (2022-09-14)
  → 'github:jcs-elpa/ts-fold/fb91989a9489755b890bf9e1957e5f29eaef59f6' (2022-12-04)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/0099253ad0b5283f06ffe31cf010af3f9ad7837d' (2022-11-22)
  → 'github:NixOS/nixos-hardware/9d87bc030a0bf3f00e953dbf095a7d8e852dab6b' (2022-12-04)
• Updated input 'nvd':
    'git+https://gitlab.com/khumba/nvd.git?ref=master&rev=f87f29530beb039d283530ab533d700c53120b83' (2022-10-15)
  → 'git+https://gitlab.com/khumba/nvd.git?ref=refs%2fheads%2fmaster&rev=f87f29530beb039d283530ab533d700c53120b83' (2022-10-15)
2022-12-10 12:09:09 +01:00
69259f389b
migrate gitea settings 2022-12-10 12:06:21 +01:00
d271d95e78
use clippy in rust-analyzer and use hx as EDITOR 2022-12-08 17:00:01 +01:00
3e7b277578
pkgs: remove jetbrains IDEs 2022-12-03 21:50:39 +01:00
e87cabaf6c
pkgs: remove PHP 7.4 composer 2022-12-03 21:06:29 +01:00
b207e698d8
update to nixpkgs release 22.11 2022-12-03 20:59:01 +01:00
b970326df9
install cachix 2022-11-29 11:54:23 +01:00
d4b144c523
fix cache name 2022-11-27 17:16:12 +01:00
37750df89a
fix conflicting defaults 2022-11-27 16:43:22 +01:00
01d1abdb36
flake.lock: Update
Flake lock file updates:

• Updated input 'deploy-rs':
    'github:serokell/deploy-rs/41f15759dd8b638e7b4f299730d94d5aa46ab7eb' (2022-08-05)
  → 'github:serokell/deploy-rs/2a3c5f70eee04a465aa534d8bd4fcc9bb3c4a8ce' (2022-11-18)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/ebf65554b18ee053311f43e5faa5a3f36626c52e' (2022-11-07)
  → 'github:NixOS/nixpkgs/695b3515251873e0a7e2021add4bba643c56cde3' (2022-11-25)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/c38ccd08345f58001cac2c2578e71d3f29b59bc0' (2022-11-06)
  → 'github:nix-community/nix-doom-emacs/3c02175dd06714c15ddd2f73708de9b4dacc6aa9' (2022-11-25)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/ccefa5f7ddbb036656d8617ed2862fe057d60fb4' (2022-11-03)
  → 'github:nix-community/emacs-overlay/49d5cbd389a3fb843793cd7503ad7abdb4f40a9d' (2022-11-24)
• Updated input 'nix-doom-emacs/flake-compat':
    'github:edolstra/flake-compat/b4a34015c698c7793d592d66adbab377907a2be8' (2022-04-19)
  → 'github:edolstra/flake-compat/009399224d5e398d03b22badca40a37ac85412a1' (2022-11-17)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/48b237d9e21a4edf528d4bd1ed99d1f3757e4931' (2022-10-24)
  → 'github:emacs-straight/org-mode/0737112852afe835a5a5833a2dd0a6852c04e0f0' (2022-11-19)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/f6f657b627f9703e32414d8d3f16fb49d41031cb' (2022-10-17)
  → 'github:hakimel/reveal.js/9f1f7789bfbf689d9c1615e523d5c6262771e90f' (2022-11-17)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/f6483e0def85efb9c1e884efbaff45a5e7aabb34' (2022-11-06)
  → 'github:NixOS/nixos-hardware/0099253ad0b5283f06ffe31cf010af3f9ad7837d' (2022-11-22)
2022-11-27 16:36:11 +01:00
6319224d52
update CI 2022-11-27 16:35:41 +01:00
f5a8805a86
update colors 2022-11-21 21:23:43 +01:00
a1f033c4cb
enable avahi 2022-11-15 12:08:10 +01:00
5f4ef64f6c
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/6ee9ebb6b1ee695d2cacc4faa053a7b9baa76817' (2022-10-29)
  → 'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
• Updated input 'home-manager':
    'github:nix-community/home-manager/f0ecd4b1db5e15103e955b18cb94bea4296e5c45' (2022-11-01)
  → 'github:nix-community/home-manager/6639e3a837fc5deb6f99554072789724997bc8e5' (2022-11-08)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/b3a8f7ed267e0a7ed100eb7d716c9137ff120fe3' (2022-11-01)
  → 'github:NixOS/nixpkgs/ebf65554b18ee053311f43e5faa5a3f36626c52e' (2022-11-07)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/e9a0c496d813c79857e38511708eefc80ea1f4fe' (2022-10-29)
  → 'github:nix-community/nix-doom-emacs/c38ccd08345f58001cac2c2578e71d3f29b59bc0' (2022-11-06)
• Removed input 'nix-doom-emacs/doom-modeline'
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/b3f81bcbda84bf2ef957cfff6cf89aedbdfa2be9' (2022-10-27)
  → 'github:nix-community/emacs-overlay/ccefa5f7ddbb036656d8617ed2862fe057d60fb4' (2022-11-03)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
  → 'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
• Updated input 'nix-doom-emacs/nix-straight':
    'github:nix-community/nix-straight.el/fb8dd5c44cde70abd13380766e40af7a63888942' (2022-07-01)
  → 'github:nix-community/nix-straight.el/ad10364d64f472c904115fd38d194efe1c3f1226' (2022-10-28)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/18934557eeba8fa2e575b0fd4ab95186e2e3bde3' (2022-11-01)
  → 'github:NixOS/nixos-hardware/f6483e0def85efb9c1e884efbaff45a5e7aabb34' (2022-11-06)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/6ee9ebb6b1ee695d2cacc4faa053a7b9baa76817' (2022-10-29)
  → 'github:numtide/flake-utils/5aed5285a952e0b949eb3ba02c12fa4fcfef535f' (2022-11-02)
2022-11-08 20:29:04 +01:00
14a5877b50
switch to simpler color scheme 2022-11-07 16:32:53 +01:00
f8333ce288
home: add GitHub cli 2022-11-05 15:31:10 +01:00
b571f1d1eb
helix: add command to reflow paragraph 2022-11-04 11:37:04 +01:00
08f2d58fb2
use default theme 2022-11-03 18:39:02 +01:00
7a925ab447
switch to onedark theme 2022-11-03 18:11:58 +01:00
6898659149
update EDITOR 2022-11-03 13:47:11 +01:00
0003ee9ca0
flake.lock: Update
Flake lock file updates:

• Updated input 'devshell':
    'github:numtide/devshell/c8ce8ed81726079c398f5f29c4b68a7d6a3c2fa2' (2022-10-23)
  → 'github:numtide/devshell/96a9dd12b8a447840cc246e17a47b81a4268bba7' (2022-10-31)
• Updated input 'flake-utils':
    'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
  → 'github:numtide/flake-utils/6ee9ebb6b1ee695d2cacc4faa053a7b9baa76817' (2022-10-29)
• Updated input 'helix/nixCargoIntegration':
    'github:yusdacra/nix-cargo-integration/b89e3d7b0f7e2d0301891586456267435fc54aaa' (2022-11-02)
  → 'github:yusdacra/nix-cargo-integration/9eb74345b30cd2e536d9dac9d4435d3c475605c7' (2022-06-28)
• Updated input 'helix/nixCargoIntegration/devshell':
    'github:numtide/devshell/96a9dd12b8a447840cc246e17a47b81a4268bba7' (2022-10-31)
  → 'github:numtide/devshell/899ca4629020592a13a46783587f6e674179d1db' (2022-06-23)
• Updated input 'helix/nixCargoIntegration/dream2nix':
    'github:nix-community/dream2nix/4b3a139c506582f40ce733eb4a91988242e17358' (2022-10-31)
  → 'github:nix-community/dream2nix/4e75e665ec3a1cddae5266bed0dd72fce0b74a23' (2022-06-23)
• Removed input 'helix/nixCargoIntegration/dream2nix/all-cabal-json'
• Updated input 'helix/nixCargoIntegration/dream2nix/crane':
    'github:ipetkov/crane/d9f394e4e20e97c2a60c3ad82c2b6ef99be19e24' (2022-08-30)
  → 'github:ipetkov/crane/db5482bf225acc3160899124a1df5a617cfa27b5' (2022-06-05)
• Removed input 'helix/nixCargoIntegration/dream2nix/ghc-utils'
• Added input 'helix/nixCargoIntegration/dream2nix/node2nix':
    follows 'helix/nixCargoIntegration/nixpkgs'
• Updated input 'helix/nixpkgs':
    'github:nixos/nixpkgs/d40fea9aeb8840fea0d377baa4b38e39b9582458' (2022-10-31)
  → 'github:nixos/nixpkgs/0d68d7c857fe301d49cdcd56130e0beea4ecd5aa' (2022-06-19)
• Updated input 'helix/rust-overlay':
    'github:oxalica/rust-overlay/8f81faec35508647ced65c44fd3e8648a5518afb' (2022-10-31)
  → 'github:oxalica/rust-overlay/8159585609a772b041cce6019d5c21d240709244' (2022-06-21)
• Updated input 'helix/rust-overlay/flake-utils':
    'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
  → 'github:numtide/flake-utils/bba5dcc8e0b20ab664967ad83d24d64cb64ec4f4' (2021-11-15)
• Updated input 'home-manager':
    'github:nix-community/home-manager/b81e128fc053ab3159d7b464d9b7dedc9d6a6891' (2022-10-17)
  → 'github:nix-community/home-manager/f0ecd4b1db5e15103e955b18cb94bea4296e5c45' (2022-11-01)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/c132d0837dfb9035701dcd8fc91786c605c855c3' (2022-10-27)
  → 'github:NixOS/nixpkgs/b3a8f7ed267e0a7ed100eb7d716c9137ff120fe3' (2022-11-01)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/17673891a41c747d485b9407cb3b50b3156395ee' (2022-10-25)
  → 'github:nix-community/nix-doom-emacs/e9a0c496d813c79857e38511708eefc80ea1f4fe' (2022-10-29)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/b8e24cec99ff68f8a875b6f842a10b6b2ab398d3' (2022-10-20)
  → 'github:nix-community/emacs-overlay/b3f81bcbda84bf2ef957cfff6cf89aedbdfa2be9' (2022-10-27)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/98cae03b7d9a612334d5ea461e73ac0b37b0285d' (2022-10-20)
  → 'github:emacs-straight/org-mode/48b237d9e21a4edf528d4bd1ed99d1f3757e4931' (2022-10-24)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/419dcc0ec767803182ed01a326f134230578bf60' (2022-10-27)
  → 'github:NixOS/nixos-hardware/18934557eeba8fa2e575b0fd4ab95186e2e3bde3' (2022-11-01)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
  → 'github:numtide/flake-utils/6ee9ebb6b1ee695d2cacc4faa053a7b9baa76817' (2022-10-29)
2022-11-02 12:16:24 +01:00
0695685e73
override helix with newer version 2022-11-02 11:59:55 +01:00
16666b8adf
Fix cs ()
* fix format

* make pre-push hook into pre-commit-hook
2022-11-01 19:38:55 +01:00
f70053b110
home: add config for helix () 2022-11-01 19:14:49 +01:00
dependabot[bot]
4aa4296d23
build(deps): bump cachix/install-nix-action from 17 to 18 ()
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 17 to 18.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v17...v18)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-10-31 15:23:29 +01:00
0ee7ca426a
remove sway config from home 2022-10-31 15:12:23 +01:00
6e6424bddf
gorgon: disable sway 2022-10-31 15:10:58 +01:00
4982dbdb5a
add config for sway 2022-10-31 14:39:23 +01:00
8f4ffd1d45
miniflux: move into module 2022-10-29 13:12:30 +02:00
3c3868c88b
add correct module 2022-10-28 22:15:42 +02:00
2fd3cbdd6d
add missing module to devshell 2022-10-28 22:14:22 +02:00
845b7e0a58
add pre-push hook 2022-10-28 22:09:21 +02:00
771e718335
add devshell cli 2022-10-28 18:31:51 +02:00
c781508dee
flake.lock: Update
Flake lock file updates:

• Added input 'devshell':
    'github:numtide/devshell/c8ce8ed81726079c398f5f29c4b68a7d6a3c2fa2' (2022-10-23)
• Added input 'devshell/flake-utils':
    'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
• Added input 'devshell/nixpkgs':
    follows 'myNixpkgs'
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/44fc3cb097324c9f9f93313dd3f103e78d722968' (2022-10-20)
  → 'github:NixOS/nixpkgs/c132d0837dfb9035701dcd8fc91786c605c855c3' (2022-10-27)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/b65e204ce9d20b376acc38ec205d08007eccdaef' (2022-10-01)
  → 'github:nix-community/nix-doom-emacs/17673891a41c747d485b9407cb3b50b3156395ee' (2022-10-25)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/c44bc81a05f3758ceaa28921dd9c830b9c571e61' (2022-08-19)
  → 'github:doomemacs/doomemacs/3853dff5e11655e858d0bfae64b70cb12ef685ac' (2022-09-06)
• Added input 'nix-doom-emacs/doom-modeline':
    'github:seagle0128/doom-modeline/ce9899f00af40edb78f58b9af5c3685d67c8eed2' (2022-03-28)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/6c78924bc5b6daaf98c0dbe63bdfcf80e6433f4b' (2022-09-29)
  → 'github:nix-community/emacs-overlay/b8e24cec99ff68f8a875b6f842a10b6b2ab398d3' (2022-10-20)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/fe1f4f2ccf040deff9c57288d987f17cc2da321f' (2022-09-29)
  → 'github:emacs-straight/org-mode/98cae03b7d9a612334d5ea461e73ac0b37b0285d' (2022-10-20)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/468132320d6e072abd1297d7cc24766a2b7a832d' (2022-09-24)
  → 'github:hakimel/reveal.js/f6f657b627f9703e32414d8d3f16fb49d41031cb' (2022-10-17)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/0e6593630071440eb89cd97a52921497482b22c6' (2022-10-17)
  → 'github:NixOS/nixos-hardware/419dcc0ec767803182ed01a326f134230578bf60' (2022-10-27)
2022-10-28 16:53:00 +02:00
a440500b0c
install map on gorgon 2022-10-23 18:26:25 +02:00
6e82d7dee6
add package map to config 2022-10-23 18:25:01 +02:00
c4ed80d667
map: init at 0.1.1 2022-10-23 15:36:05 +02:00
c00a6f612a
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/17208be516fc36e2ab0ceb064d931e90eb88b2a3' (2022-10-11)
  → 'github:nix-community/home-manager/b81e128fc053ab3159d7b464d9b7dedc9d6a6891' (2022-10-17)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/78a37aa630faa41944060a966607d4f1128ea94b' (2022-10-14)
  → 'github:NixOS/nixpkgs/44fc3cb097324c9f9f93313dd3f103e78d722968' (2022-10-20)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/674d05f9ae2249d606a0e6fc63e522d2031a27ac' (2022-10-15)
  → 'github:NixOS/nixos-hardware/0e6593630071440eb89cd97a52921497482b22c6' (2022-10-17)
2022-10-21 18:53:16 +02:00
55a4cfe1e2
hydra: allow dokuwiki-template-bootstrap3 2022-10-16 18:56:49 +02:00
611204f036
allow dokuwiki-plugin-icalevents in inputs 2022-10-16 18:33:21 +02:00
5c9706685a
fixup: spec.json 2022-10-16 17:54:38 +02:00
2f0d803f21
fixup: spec.json 2022-10-16 17:39:49 +02:00
7518b75c23
fixup spec.json 2022-10-16 17:30:06 +02:00
d6d7a20b3f
add hydra jobsets spec 2022-10-16 16:58:08 +02:00
b164977b2e
flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/6acb1fe5f8597d5ce63fc82bc7fcac7774b1cdf0' (2022-09-25)
  → 'github:ryantm/agenix/a630400067c6d03c9b3e0455347dc8559db14288' (2022-10-15)
• Updated input 'home-manager':
    'github:nix-community/home-manager/4a3d01fb53f52ac83194081272795aa4612c2381' (2022-06-25)
  → 'github:nix-community/home-manager/17208be516fc36e2ab0ceb064d931e90eb88b2a3' (2022-10-11)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/ed9b904c5eba055a6d6f5c1ccb89ba8f0a056dc6' (2022-10-06)
  → 'github:NixOS/nixpkgs/78a37aa630faa41944060a966607d4f1128ea94b' (2022-10-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/47fd70289491c1f0c0d9a1f44fb5a9e2801120c9' (2022-10-06)
  → 'github:NixOS/nixos-hardware/674d05f9ae2249d606a0e6fc63e522d2031a27ac' (2022-10-15)
• Updated input 'nvd':
    'git+https://gitlab.com/khumba/nvd.git?ref=master&rev=b082bd23f54d164765fab1737d40d47d4f649ae2' (2022-05-28)
  → 'git+https://gitlab.com/khumba/nvd.git?ref=master&rev=f87f29530beb039d283530ab533d700c53120b83' (2022-10-15)
2022-10-16 15:19:57 +02:00
f43f6a6894
make github token accessible to hydra-notify 2022-10-08 18:10:44 +02:00
502171ec57
fixup permissions 2022-10-08 18:06:52 +02:00
f65d24bf1e
set up gihubstatus 2022-10-08 17:48:24 +02:00
6655fc776f
hydra-jobs: run checks in CI 2022-10-08 16:40:47 +02:00
85b2bbcf46
gitea: hopefully fix redis connection 2022-10-08 16:19:06 +02:00
f5b63983fb
remove scripts package 2022-10-08 15:55:15 +02:00
dc03d3f41e
pruflas: allow some inputs in nix when running in restricted mode (Hydra) 2022-10-08 15:47:55 +02:00
e13a5a6b89
pruflas: update keys 2022-10-08 13:21:22 +02:00
2da7cc10be
pruflas: fixup hydra listen host 2022-10-08 13:11:43 +02:00
ff50c0d632
pruflas: fixup webserver 2022-10-08 13:01:42 +02:00
a7a49bff68
pruflas: connect hydra to proxy 2022-10-08 12:25:09 +02:00
103d849791
pruflas: add web server 2022-10-07 23:30:30 +02:00
4607ebdd98
flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/c96da5835b76d3d8e8d99a0fec6fe32f8539ee2e' (2022-09-03)
  → 'github:ryantm/agenix/6acb1fe5f8597d5ce63fc82bc7fcac7774b1cdf0' (2022-09-25)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/178fea1414ae708a5704490f4c49ec3320be9815' (2022-09-15)
  → 'github:NixOS/nixpkgs/ed9b904c5eba055a6d6f5c1ccb89ba8f0a056dc6' (2022-10-06)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/acbf1b70335d4fd6a6c05bc417d7f3ca44739437' (2022-09-10)
  → 'github:nix-community/nix-doom-emacs/b65e204ce9d20b376acc38ec205d08007eccdaef' (2022-10-01)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/70e241d5b189982dabc1fe55829475c5c483c89d' (2022-09-08)
  → 'github:nix-community/emacs-overlay/6c78924bc5b6daaf98c0dbe63bdfcf80e6433f4b' (2022-09-29)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/eb5ef0ae1424a725f933ef3929e5396a2ab727ab' (2022-09-08)
  → 'github:emacs-straight/org-mode/fe1f4f2ccf040deff9c57288d987f17cc2da321f' (2022-09-29)
• Updated input 'nix-doom-emacs/org-contrib':
    'github:emacsmirror/org-contrib/0740bd3fe69c4b327420185d931dcf0a9900a80e' (2022-08-20)
  → 'github:emacsmirror/org-contrib/aa104c0bbc3113f6d3d167b20bd8d6bf6a285f0f' (2022-09-27)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/8a97ad58b04045fe5a9c964aa31659bd27e665c5' (2022-09-05)
  → 'github:hakimel/reveal.js/468132320d6e072abd1297d7cc24766a2b7a832d' (2022-09-24)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/017402713bd2f1fd7a691aa48afb4330f5397432' (2022-09-05)
  → 'github:jcs-elpa/ts-fold/c3da5520b988720f7f6e9e5e11b60746598112e0' (2022-09-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/a0df6cd6e199df4a78c833c273781ea92fa62cfb' (2022-09-15)
  → 'github:NixOS/nixos-hardware/47fd70289491c1f0c0d9a1f44fb5a9e2801120c9' (2022-10-06)
2022-10-07 23:08:25 +02:00
84efbb1c75
Merge branch 'pruflas-vpn' 2022-10-07 23:07:40 +02:00
b62c3ed945
fix dev-shell 2022-10-07 23:07:30 +02:00
7f36dee66b
add pruflas vpn 2022-10-07 23:07:30 +02:00
4c4b642f62
add TODO 2022-10-07 22:17:32 +02:00
fda6dd5da2
set plain-text password of public media playback user 2022-10-02 22:40:20 +02:00
8fb158edce
fix path to back secrets 2022-09-18 18:22:12 +02:00
cf6ed4a87e
agenix: import server.nix 2022-09-18 18:17:59 +02:00
e69ffedc06
fixup devshell 2022-09-18 18:08:33 +02:00
59f636f216
disable emacs module 2022-09-18 17:33:28 +02:00
2aafcc9b49
refactor configuration 2022-09-18 17:33:24 +02:00
d016cc67bc
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/d86a4619b7e80bddb6c01bc01a954f368c56d1df' (2022-09-13)
  → 'github:NixOS/nixpkgs/178fea1414ae708a5704490f4c49ec3320be9815' (2022-09-15)
2022-09-17 18:15:12 +02:00
aa609943bd
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/45b56b5321aed52d4464dc9af94dc1b20d477ac5' (2022-09-09)
  → 'github:NixOS/nixpkgs/d86a4619b7e80bddb6c01bc01a954f368c56d1df' (2022-09-13)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/1fec8fda86dac5701146c77d5f8a414b14ed1ff6' (2022-09-09)
  → 'github:NixOS/nixos-hardware/a0df6cd6e199df4a78c833c273781ea92fa62cfb' (2022-09-15)
2022-09-15 18:51:22 +02:00
f0ab5d3d97
add deployment scripts to dev-shell 2022-09-12 20:58:37 +02:00
742abb1a81
fix nixos module warnings
redis and acme
2022-09-11 15:03:17 +02:00
533e70633e
clean up packages and overlays 2022-09-11 14:44:22 +02:00
02f0a5d8bd
remove unused lib 2022-09-11 14:34:14 +02:00
9df7faaaf9
remove unused tests.nix 2022-09-11 14:33:30 +02:00
2cffeb9149
clean up commented out line 2022-09-11 14:32:06 +02:00
fcb17cc9d1
add legacy utility scripts 2022-09-11 14:31:10 +02:00
fdd2030235
add update script 2022-09-11 14:29:18 +02:00
789feac618
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/67e45078141102f45eff1589a831aeaa3182b41e' (2022-09-02)
  → 'github:NixOS/nixpkgs/45b56b5321aed52d4464dc9af94dc1b20d477ac5' (2022-09-09)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/7b8c1c53537840f2656cacce267697eca7032727' (2022-09-03)
  → 'github:nix-community/nix-doom-emacs/acbf1b70335d4fd6a6c05bc417d7f3ca44739437' (2022-09-10)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:doomemacs/snippets/f957f8d195872f19c7ab0a777d592c611e10e9bb' (2022-08-07)
  → 'github:doomemacs/snippets/03a62fe7edf7e87fdbd925713fbd3bf292d14b00' (2022-09-08)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/6b4445aa659fa26b4f36d9975b34632312699a85' (2022-09-01)
  → 'github:nix-community/emacs-overlay/70e241d5b189982dabc1fe55829475c5c483c89d' (2022-09-08)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/e36c3cc21b8b1471e1f7928a118de693819c3f12' (2022-09-01)
  → 'github:emacs-straight/org-mode/eb5ef0ae1424a725f933ef3929e5396a2ab727ab' (2022-09-08)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/b23d15c4304a9a1b72f484171fc97682e5ed85a3' (2022-08-14)
  → 'github:hakimel/reveal.js/8a97ad58b04045fe5a9c964aa31659bd27e665c5' (2022-09-05)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/28409a0ceede0751ed9d520c6a19d1f5f1211502' (2022-09-01)
  → 'github:jcs-elpa/ts-fold/017402713bd2f1fd7a691aa48afb4330f5397432' (2022-09-05)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/504b32caf83986b7e6b9c79c1c13008f83290f19' (2022-09-06)
  → 'github:NixOS/nixos-hardware/1fec8fda86dac5701146c77d5f8a414b14ed1ff6' (2022-09-09)
2022-09-11 14:23:10 +02:00
651a1600ed
reformat 2022-09-08 20:54:02 +02:00
34e89ac8c2
rekey 2022-09-08 20:52:13 +02:00
7d43dbe5a8
pruflas: update host key 2022-09-08 20:50:23 +02:00
3b0e89e2da
pruflas: disable network manager 2022-09-08 20:47:53 +02:00
467d41638b
pruflas: update efi partition uuid 2022-09-08 20:30:45 +02:00
7db500680b
update pruflas config 2022-09-08 20:14:57 +02:00
628edc7e98
update hardware config of pruflas 2022-09-08 19:31:19 +02:00
305c11f26e
surgat: remove vpn client 2022-09-06 20:45:00 +02:00
eac5306021
flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/7e5e58b98c3dcbf497543ff6f22591552ebfe65b' (2022-05-16)
  → 'github:ryantm/agenix/c96da5835b76d3d8e8d99a0fec6fe32f8539ee2e' (2022-09-03)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/23534df34c1c499a6c82ce690df06d8c6e4e759d' (2022-08-21)
  → 'github:NixOS/nixpkgs/67e45078141102f45eff1589a831aeaa3182b41e' (2022-09-02)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/b62e04967ad303f0395025d5f2340beef8a67a57' (2022-08-19)
  → 'github:nix-community/nix-doom-emacs/7b8c1c53537840f2656cacce267697eca7032727' (2022-09-03)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/4c9df9bfc63d2c3a9e20e20deaa854072e379f47' (2022-08-18)
  → 'github:doomemacs/doomemacs/c44bc81a05f3758ceaa28921dd9c830b9c571e61' (2022-08-19)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/14443210f27375d5efc0cc554ad477d052e47b59' (2022-08-18)
  → 'github:nix-community/emacs-overlay/6b4445aa659fa26b4f36d9975b34632312699a85' (2022-09-01)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/f28288c255e293591725cbcd02637707bc9a77c2' (2022-08-18)
  → 'github:emacs-straight/org-mode/e36c3cc21b8b1471e1f7928a118de693819c3f12' (2022-09-01)
• Updated input 'nix-doom-emacs/org-contrib':
    'github:emacsmirror/org-contrib/39e2abc5629c1be6186bb6489ec4f76524edf82a' (2022-07-28)
  → 'github:emacsmirror/org-contrib/0740bd3fe69c4b327420185d931dcf0a9900a80e' (2022-08-20)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/f0804a243544fbbf593791e4390d838b5d1187b0' (2022-08-11)
  → 'github:jcs-elpa/ts-fold/28409a0ceede0751ed9d520c6a19d1f5f1211502' (2022-09-01)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/12620020f76b1b5d2b0e6fbbda831ed4f5fe56e1' (2022-08-13)
  → 'github:NixOS/nixos-hardware/504b32caf83986b7e6b9c79c1c13008f83290f19' (2022-09-06)
2022-09-06 20:15:26 +02:00
35f33fbec3
remove redundant newline 2022-09-06 20:13:21 +02:00
400ec335ac
actually enable admin access to pruflas 2022-08-24 00:39:06 +02:00
c2ec59d1cb
fix path to deploy in apps 2022-08-24 00:27:46 +02:00
8a057c3cdf
use system variable from nixos configuration 2022-08-24 00:01:23 +02:00
f17a0fd99f
add remaining nodes to deploy config 2022-08-23 23:52:37 +02:00
5bdcf5c658
remove old deploy script 2022-08-23 23:51:17 +02:00
d1f4753462
add deploy config for pruflas 2022-08-23 23:15:36 +02:00
9ccc374d39
add deply config for ifrit 2022-08-23 23:05:41 +02:00
69f462d3c6
support multiple hosts in deploy script 2022-08-23 21:31:07 +02:00
fb88564fcd
disable auto-updater 2022-08-22 17:23:20 +02:00
7e9b29a502
fix typo 2022-08-22 17:21:10 +02:00
c244f45636
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/879121648fe522b38cc1cf75aef160a14a1f2e7b' (2022-08-14)
  → 'github:NixOS/nixpkgs/23534df34c1c499a6c82ce690df06d8c6e4e759d' (2022-08-21)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/20ca56a17dc33d67ed7d61b0e84205c617394b5b' (2022-08-10)
  → 'github:nix-community/nix-doom-emacs/b62e04967ad303f0395025d5f2340beef8a67a57' (2022-08-19)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/b06fd63dcb686045d0c105f93e07f80cb8de6800' (2022-08-08)
  → 'github:doomemacs/doomemacs/4c9df9bfc63d2c3a9e20e20deaa854072e379f47' (2022-08-18)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:doomemacs/snippets/6b2bd5a77c536ed414794ecf71d37a60ebd4663e' (2022-06-22)
  → 'github:doomemacs/snippets/f957f8d195872f19c7ab0a777d592c611e10e9bb' (2022-08-07)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/a151f9ff5b9fa813ac8918f3a3a67c643e7e2edc' (2022-08-04)
  → 'github:nix-community/emacs-overlay/14443210f27375d5efc0cc554ad477d052e47b59' (2022-08-18)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
  → 'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/4702a73031c77ba03b480b0848c137d5d8773e07' (2022-08-03)
  → 'github:emacs-straight/org-mode/f28288c255e293591725cbcd02637707bc9a77c2' (2022-08-18)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/039972c730690af7a83a5cb832056a7cc8b565d7' (2022-05-31)
  → 'github:hakimel/reveal.js/b23d15c4304a9a1b72f484171fc97682e5ed85a3' (2022-08-14)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/17d131f69a717d7e8cc6d3af9dfa7d2b5e2b78ef' (2022-07-30)
  → 'github:jcs-elpa/ts-fold/f0804a243544fbbf593791e4390d838b5d1187b0' (2022-08-11)
2022-08-22 17:12:59 +02:00
bf33bb3365
fix typo 2022-08-15 19:50:56 +02:00
c515110fc9
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/5c211b47aeadcc178c5320afd4e74c7eed5c389f' (2022-08-12)
  → 'github:NixOS/nixpkgs/879121648fe522b38cc1cf75aef160a14a1f2e7b' (2022-08-14)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/78f56d8ec2c67a1f80f2de649ca9aadc284f65b6' (2022-08-12)
  → 'github:NixOS/nixos-hardware/12620020f76b1b5d2b0e6fbbda831ed4f5fe56e1' (2022-08-13)
2022-08-15 19:37:38 +02:00
5b97801911
refactor outputs.nix
Splits everything into separate files.
2022-08-15 19:33:27 +02:00
afb2ca459e
move dev shell to flake 2022-08-15 18:52:51 +02:00
af679b644f
disable jupyter because of CVE-2022-34749 2022-08-13 11:43:53 +02:00
a0bf817db1
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/72f492e275fc29d44b3a4daf952fbeffc4aed5b8' (2022-08-06)
  → 'github:NixOS/nixpkgs/5c211b47aeadcc178c5320afd4e74c7eed5c389f' (2022-08-12)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/b7d44a76ea4f352b751b1ccba18f70f686838622' (2022-08-05)
  → 'github:nix-community/nix-doom-emacs/20ca56a17dc33d67ed7d61b0e84205c617394b5b' (2022-08-10)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/35a89bdfa6064e507f8848b1d162433fe92ca829' (2022-07-28)
  → 'github:doomemacs/doomemacs/b06fd63dcb686045d0c105f93e07f80cb8de6800' (2022-08-08)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/ea3efc80f8ab83cb73aec39f4e76fe87afb15a08' (2022-08-01)
  → 'github:NixOS/nixos-hardware/78f56d8ec2c67a1f80f2de649ca9aadc284f65b6' (2022-08-12)
2022-08-13 11:03:11 +02:00
90425a4d18
allow xlibs to be able to use qemu from substituter 2022-08-07 15:23:12 +02:00
1a6ab16854
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
  → 'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/478f3cbc8448b5852539d785fbfe9a53304133be' (2022-08-03)
  → 'github:NixOS/nixpkgs/72f492e275fc29d44b3a4daf952fbeffc4aed5b8' (2022-08-06)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/72290846feecd198d3f63181c166ddaa50a2cb70' (2022-07-29)
  → 'github:nix-community/nix-doom-emacs/b7d44a76ea4f352b751b1ccba18f70f686838622' (2022-08-05)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/30a3d95bb4d9812e26822260b6ac45efde0d7700' (2022-07-29)
  → 'github:nix-community/emacs-overlay/a151f9ff5b9fa813ac8918f3a3a67c643e7e2edc' (2022-08-04)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/d37c0ee5fa7dc4be4bbe3aa9b6f4e79d4b1e638d' (2022-07-28)
  → 'github:emacs-straight/org-mode/4702a73031c77ba03b480b0848c137d5d8773e07' (2022-08-03)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/401aad7380c8395e948c7bc8780479ccb0a26b82' (2022-07-29)
  → 'github:jcs-elpa/ts-fold/17d131f69a717d7e8cc6d3af9dfa7d2b5e2b78ef' (2022-07-30)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
  → 'github:numtide/flake-utils/c0e246b9b83f637f4681389ecabcb2681b4f3af0' (2022-08-07)
2022-08-07 15:23:11 +02:00
3fccfe3b67
add backup secrets to config for hosts 2022-08-07 15:23:08 +02:00
c43341a8b2
switch to nixpkgs-fmt 2022-08-04 21:13:54 +02:00
8cd6ed1502
add code formatter and reformat 2022-08-04 21:05:37 +02:00
a055f4fa40
move admin config to top-level 2022-08-04 20:52:43 +02:00
81c9ecd6dc
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/ede02b4ccb13557b95058d66146640a2b0bb198f' (2022-07-31)
  → 'github:NixOS/nixpkgs/478f3cbc8448b5852539d785fbfe9a53304133be' (2022-08-03)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/727a099e871ff10ae09a1ebd056a5ba4b9dbe50f' (2022-07-31)
  → 'github:NixOS/nixos-hardware/ea3efc80f8ab83cb73aec39f4e76fe87afb15a08' (2022-08-01)
2022-08-04 20:06:13 +02:00
b7a085e167
install IDEA 2022-08-01 11:54:58 +02:00
e20a4fbf4f
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/f0fa012b649a47e408291e96a15672a4fe925d65' (2022-07-25)
  → 'github:NixOS/nixpkgs/ede02b4ccb13557b95058d66146640a2b0bb198f' (2022-07-31)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/f7fd8620be427c6489f496645513d536e380c50c' (2022-07-22)
  → 'github:nix-community/nix-doom-emacs/72290846feecd198d3f63181c166ddaa50a2cb70' (2022-07-29)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/33c5f3721a704c72e49efc5960be3785d1a80b81' (2022-07-09)
  → 'github:doomemacs/doomemacs/35a89bdfa6064e507f8848b1d162433fe92ca829' (2022-07-28)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/6c868dbad387da912e2a47f63a913c8a62555127' (2022-07-21)
  → 'github:nix-community/emacs-overlay/30a3d95bb4d9812e26822260b6ac45efde0d7700' (2022-07-29)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/99681ce38937ba993a0407cee4fd6a7f869211bf' (2022-07-21)
  → 'github:emacs-straight/org-mode/d37c0ee5fa7dc4be4bbe3aa9b6f4e79d4b1e638d' (2022-07-28)
• Updated input 'nix-doom-emacs/org-contrib':
    'github:emacsmirror/org-contrib/c1e0980fd7a57ca2042fd78acfb1dfb5c3bc03fa' (2022-05-15)
  → 'github:emacsmirror/org-contrib/39e2abc5629c1be6186bb6489ec4f76524edf82a' (2022-07-28)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/ea554f10e79ed9846662b1639adc4b86783ecfc6' (2022-07-19)
  → 'github:jcs-elpa/ts-fold/401aad7380c8395e948c7bc8780479ccb0a26b82' (2022-07-29)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/83009edccc2e24afe3d0165ed98b60ff7471a5f8' (2022-07-21)
  → 'github:NixOS/nixos-hardware/727a099e871ff10ae09a1ebd056a5ba4b9dbe50f' (2022-07-31)
2022-08-01 09:15:14 +02:00
dbaac6fb80
add admin users to trusted users for nix daemon 2022-07-31 17:41:51 +02:00
d3c1c378a7
remove automatic RCE :P 2022-07-28 14:18:39 +02:00
674b97f1ac
add vim command Silent
Adds a command that executes a subprocess silently and forces a redraw
to avoid display issues.
2022-07-28 14:17:25 +02:00
e9991167e7
fix tab expansion in latex 2022-07-27 11:59:35 +02:00
1cbaf0339b
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/e3583ad6e533a9d8dd78f90bfa93812d390ea187' (2022-07-22)
  → 'github:NixOS/nixpkgs/f0fa012b649a47e408291e96a15672a4fe925d65' (2022-07-25)
2022-07-27 11:05:52 +02:00
1d3cb3d2b4
update filetype config for latex 2022-07-26 16:54:00 +02:00
68ef923dae
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/e732e1fdbf79bec59f7ade4a3675b091b4a9f6d6' (2022-07-19)
  → 'github:NixOS/nixpkgs/e3583ad6e533a9d8dd78f90bfa93812d390ea187' (2022-07-22)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/7c35a9d90e1c07254c0926fc02e2c27bd0d5d9cc' (2022-07-15)
  → 'github:nix-community/nix-doom-emacs/f7fd8620be427c6489f496645513d536e380c50c' (2022-07-22)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/b51bea50371cc7a98863fb64bf1aaa1126a68a36' (2022-07-14)
  → 'github:nix-community/emacs-overlay/6c868dbad387da912e2a47f63a913c8a62555127' (2022-07-21)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/d9479887226ad79a1a8de739e7be0fc1fffec536' (2022-07-14)
  → 'github:emacs-straight/org-mode/99681ce38937ba993a0407cee4fd6a7f869211bf' (2022-07-21)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/33e3fb561e71cf0ab83833d45c55909583fc3899' (2022-07-12)
  → 'github:jcs-elpa/ts-fold/ea554f10e79ed9846662b1639adc4b86783ecfc6' (2022-07-19)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/0015f5cc098fae520aae458b8547e44a38aacf92' (2022-07-19)
  → 'github:NixOS/nixos-hardware/83009edccc2e24afe3d0165ed98b60ff7471a5f8' (2022-07-21)
2022-07-23 19:09:08 +02:00
5b49059af5
add this flake to registry 2022-07-21 00:43:55 +02:00
cc133ee143
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/71d7a4c037dc4f3e98d5c4a81b941933cf5bf675' (2022-07-08)
  → 'github:NixOS/nixpkgs/e732e1fdbf79bec59f7ade4a3675b091b4a9f6d6' (2022-07-19)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/a59295c11efb6377b0c5eb4c8259bb49d94ec1d5' (2022-07-09)
  → 'github:nix-community/nix-doom-emacs/7c35a9d90e1c07254c0926fc02e2c27bd0d5d9cc' (2022-07-15)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/9ec60d9ab9eb5d9b098e2452395156b622cce624' (2022-07-05)
  → 'github:doomemacs/doomemacs/33c5f3721a704c72e49efc5960be3785d1a80b81' (2022-07-09)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/22448c09bae21969ca14d1558a120dafe9853c73' (2022-07-08)
  → 'github:nix-community/emacs-overlay/b51bea50371cc7a98863fb64bf1aaa1126a68a36' (2022-07-14)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/71359820221ec18d27fab28403d4fd3537ca0491' (2022-07-05)
  → 'github:emacs-straight/org-mode/d9479887226ad79a1a8de739e7be0fc1fffec536' (2022-07-14)
• Updated input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/dcd5b9fe5c2cb72261ff6c714beb8d0198b8522b' (2022-07-06)
  → 'github:jcs-elpa/ts-fold/33e3fb561e71cf0ab83833d45c55909583fc3899' (2022-07-12)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/3bf48d3587d3f34f745a19ebc968b002ef5b5c5a' (2022-07-04)
  → 'github:NixOS/nixos-hardware/0015f5cc098fae520aae458b8547e44a38aacf92' (2022-07-19)
2022-07-19 21:37:51 +02:00
9b01699b0c
add app nixos-switch 2022-07-19 21:22:28 +02:00
d1c7a721cc
backupClient: add option for SSH identity file 2022-07-19 20:27:59 +02:00
fa2ff2bd39
expose the path to the backup passphrase as an option 2022-07-17 20:40:12 +02:00
c0202bbdef
pkgs: add some commandline tools 2022-07-09 13:41:31 +02:00
1fa8eb8962
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/316b762afdb9e142a803f29c49a88b4a47db80ee' (2022-07-06)
  → 'github:NixOS/nixpkgs/71d7a4c037dc4f3e98d5c4a81b941933cf5bf675' (2022-07-08)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/2ef02b2c7cebfdce5932192c5c45f588bf00deec' (2022-07-05)
  → 'github:nix-community/nix-doom-emacs/a59295c11efb6377b0c5eb4c8259bb49d94ec1d5' (2022-07-09)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/c2f8476c8641fcc9a1371d873ed3b5924952a059' (2022-06-29)
  → 'github:doomemacs/doomemacs/9ec60d9ab9eb5d9b098e2452395156b622cce624' (2022-07-05)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/46492f286aefae3a4993d3c65f182618f98956e9' (2022-07-01)
  → 'github:nix-community/emacs-overlay/22448c09bae21969ca14d1558a120dafe9853c73' (2022-07-08)
• Added input 'nix-doom-emacs/flake-compat':
    'github:edolstra/flake-compat/b4a34015c698c7793d592d66adbab377907a2be8' (2022-04-19)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/bee6a7250dd1b01844a2de7e02e4df7d8a0a206c' (2022-06-24)
  → 'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/381a2ae4dd439b5f246873ae6630c1e303c35287' (2022-06-30)
  → 'github:emacs-straight/org-mode/71359820221ec18d27fab28403d4fd3537ca0491' (2022-07-05)
• Updated input 'nix-doom-emacs/org-contrib':
    'git+https://git.sr.ht/~bzg/org-contrib?ref=refs%2fheads%2fmaster&rev=c6aef31ccfc7c4418c3b51e98f7c3bd8e255f5e6' (2022-06-05)
  → 'github:emacsmirror/org-contrib/c1e0980fd7a57ca2042fd78acfb1dfb5c3bc03fa' (2022-05-15)
• Added input 'nix-doom-emacs/ts-fold':
    'github:jcs-elpa/ts-fold/dcd5b9fe5c2cb72261ff6c714beb8d0198b8522b' (2022-07-06)
• Updated input 'nvd':
    'git+https://gitlab.com/khumba/nvd.git?ref=refs%2fheads%2fmaster&rev=b082bd23f54d164765fab1737d40d47d4f649ae2' (2022-05-28)
  → 'git+https://gitlab.com/khumba/nvd.git?ref=master&rev=b082bd23f54d164765fab1737d40d47d4f649ae2' (2022-05-28)
2022-07-09 13:08:22 +02:00
4d5b3810c7
prevent garbage collection for dev environments 2022-07-09 13:06:28 +02:00
a58ac63547
disable ipv6 temporary addresses on servers 2022-07-07 22:12:16 +02:00
02926921ce
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/09c32b0bda4db98d6454e910206188e85d5b04cc' (2022-07-02)
  → 'github:NixOS/nixpkgs/316b762afdb9e142a803f29c49a88b4a47db80ee' (2022-07-06)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/4717e4e835a424258e526888b3a1f475bfe98805' (2022-07-01)
  → 'github:nix-community/nix-doom-emacs/2ef02b2c7cebfdce5932192c5c45f588bf00deec' (2022-07-05)
• Added input 'nix-doom-emacs/evil-escape':
    'github:hlissner/evil-escape/819f1ee1cf3f69a1ae920e6004f2c0baeebbe077' (2020-05-02)
• Added input 'nix-doom-emacs/sln-mode':
    'github:sensorflo/sln-mode/0f91d1b957c7d2a7bab9278ec57b54d57f1dbd9c' (2015-02-12)
• Added input 'nix-doom-emacs/ws-butler':
    'github:hlissner/ws-butler/572a10c11b6cb88293de48acbb59a059d36f9ba5' (2021-10-17)
2022-07-07 22:03:10 +02:00
e3d4675201
Revert "pruflas: remove hydra"
This reverts commit 65d06f563f.
2022-07-04 23:15:45 +02:00
89990f9fd1
pruflas: update config to work for laptop and do not try to recompile gnome without xlibs 2022-07-04 23:13:42 +02:00
3ecc868128
pruflas: import hardware-configuration.nix 2022-07-04 22:54:20 +02:00
65d06f563f
pruflas: remove hydra 2022-07-04 22:46:21 +02:00
b1900734b3
pruflas: update config 2022-07-04 22:33:17 +02:00
a88ee19627
pkgs: remove idea. add phpstorm 2022-07-04 22:19:13 +02:00
bf6591d387
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/bee6a7250dd1b01844a2de7e02e4df7d8a0a206c' (2022-06-24)
  → 'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/915f5a5b3cc4f8ba206afd0b70e52ba4c6a2796b' (2022-07-01)
  → 'github:NixOS/nixpkgs/09c32b0bda4db98d6454e910206188e85d5b04cc' (2022-07-02)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/c5308381432cdbf14d5b1128747a2845f5c6871e' (2022-07-01)
  → 'github:NixOS/nixos-hardware/3bf48d3587d3f34f745a19ebc968b002ef5b5c5a' (2022-07-04)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/bee6a7250dd1b01844a2de7e02e4df7d8a0a206c' (2022-06-24)
  → 'github:numtide/flake-utils/7e2a3b3dfd9af950a856d66b0a7d01e3c18aa249' (2022-07-04)
2022-07-04 21:59:30 +02:00
6d8e2d35c2
pruflas: switch to lxqt 2022-07-03 17:25:54 +02:00
43ddb876ed
gorgon: use default kernel packages from nixpkgs 2022-07-03 17:05:47 +02:00
b4faf281dc
pruflas: disable printing 2022-07-03 16:57:28 +02:00
80472613d3
add some settings to pruflas to allow for media playback 2022-07-03 14:43:00 +02:00
c5515106aa
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/cd90e773eae83ba7733d2377b6cdf84d45558780' (2022-06-26)
  → 'github:NixOS/nixpkgs/915f5a5b3cc4f8ba206afd0b70e52ba4c6a2796b' (2022-07-01)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/d296d6d44b27a5090c4096ff9a7ded37803a558d' (2022-06-17)
  → 'github:nix-community/nix-doom-emacs/4717e4e835a424258e526888b3a1f475bfe98805' (2022-07-01)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:doomemacs/doomemacs/bea3cc161c0a803dcf574f32ee555dccf565a5ce' (2022-06-04)
  → 'github:doomemacs/doomemacs/c2f8476c8641fcc9a1371d873ed3b5924952a059' (2022-06-29)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:doomemacs/snippets/f74b11b1e0fe8481e20f3065e355efe627e635de' (2022-05-05)
  → 'github:doomemacs/snippets/6b2bd5a77c536ed414794ecf71d37a60ebd4663e' (2022-06-22)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/270d5e914b4c0425a4982cf585c91d6760e78777' (2022-06-16)
  → 'github:nix-community/emacs-overlay/46492f286aefae3a4993d3c65f182618f98956e9' (2022-07-01)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/1ed9fb1935d260de5fe1c2f7ee0ebaae17ed2fa1' (2022-05-30)
  → 'github:numtide/flake-utils/bee6a7250dd1b01844a2de7e02e4df7d8a0a206c' (2022-06-24)
• Updated input 'nix-doom-emacs/nix-straight':
    'github:nix-community/nix-straight.el/08d75e5651cb52f8a07e03408ed19e04bee07505' (2022-01-29)
  → 'github:nix-community/nix-straight.el/fb8dd5c44cde70abd13380766e40af7a63888942' (2022-07-01)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/e9da29b6fafe63abbc2774e9d485ac13d2811b65' (2022-06-16)
  → 'github:emacs-straight/org-mode/381a2ae4dd439b5f246873ae6630c1e303c35287' (2022-06-30)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/78e7c2c397b0376526e83162b58de921362e3399' (2022-06-27)
  → 'github:NixOS/nixos-hardware/c5308381432cdbf14d5b1128747a2845f5c6871e' (2022-07-01)
2022-07-03 14:33:48 +02:00
f33df4daef
pruflas: set cpu frequency governor to 'performance' 2022-07-03 14:33:06 +02:00
74f63afb19
fix kanboard data dir 2022-06-28 21:46:29 +02:00
1c3918a3c3
override kanban 2022-06-28 21:42:53 +02:00
e49137272e
add kanboard 2022-06-28 21:04:08 +02:00
24e76078a1
use home-manager current release 2022-06-28 20:35:39 +02:00
14b875cd41
update flake lock 2022-06-28 20:33:29 +02:00
c40e6a6194
pkgs: add prusa-slicer 2022-06-25 17:26:34 +02:00
76752373c2
pkgs: add openscad 2022-06-25 16:18:04 +02:00
4abaeff6b2
configure tex in vim 2022-06-25 00:57:05 +02:00
21d7e234d5
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/87d30c164849a7471d99749aa4d2d28b81564f69' (2022-06-14)
  → 'github:nix-community/home-manager/3d8265c5efd5e4d3ad8a90686bc81d49353fdb08' (2022-06-19)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/9ff91ce2e4c5d70551d4c8fd8830931c6c6b26b8' (2022-06-14)
  → 'github:NixOS/nixpkgs/d17a56d90ecbd1b8fc908d49598fb854ef188461' (2022-06-17)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/ba55ef6f304969dba4e6db00098a6327d3f76813' (2022-06-12)
  → 'github:nix-community/nix-doom-emacs/d296d6d44b27a5090c4096ff9a7ded37803a558d' (2022-06-17)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/a73897fc387a83c8dd2142ed597041113954ec23' (2022-06-12)
  → 'github:nix-community/emacs-overlay/270d5e914b4c0425a4982cf585c91d6760e78777' (2022-06-16)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/ed6f8dc67f5f1abf6b20929bdb571def2c191006' (2022-06-11)
  → 'github:emacs-straight/org-mode/e9da29b6fafe63abbc2774e9d485ac13d2811b65' (2022-06-16)
2022-06-20 23:12:56 +02:00
9758807078
downgrade nixpkgs to 22.05 2022-06-15 17:47:15 +02:00
91dca194ec
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/70824bb5c790b820b189f62f643f795b1d2ade2e' (2022-06-07)
  → 'github:nix-community/home-manager/87d30c164849a7471d99749aa4d2d28b81564f69' (2022-06-14)
• Updated input 'homePage':
    'github:dadada/dadada.li/7c92c4c6383750601ebdf34858ea126c16209ebe' (2021-08-29)
  → 'github:dadada/dadada.li/fa49858d6bc479ab14b5aecdf88c34d3004756fd' (2022-06-14)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/e0169d7a9d324afebf5679551407756c77af8930' (2022-06-08)
  → 'github:NixOS/nixpkgs/13f08d71ceff5101321e0291854495a1ec153a5e' (2022-06-13)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/a7566fc638faa25757b22cfb5108f8e8cda111fa' (2022-06-09)
  → 'github:nix-community/nix-doom-emacs/ba55ef6f304969dba4e6db00098a6327d3f76813' (2022-06-12)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/80cd7557e147ccd0abef05ff4eafb93fe9545ad4' (2022-05-05)
  → 'github:doomemacs/doomemacs/bea3cc161c0a803dcf574f32ee555dccf565a5ce' (2022-06-04)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:hlissner/doom-snippets/2596cead5e03896996b7268d057c1d734180547f' (2022-05-05)
  → 'github:doomemacs/snippets/f74b11b1e0fe8481e20f3065e355efe627e635de' (2022-05-05)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/1deb4d66be3117dd0d9dbf31fd458035e0f3c4de' (2022-05-05)
  → 'github:nix-community/emacs-overlay/a73897fc387a83c8dd2142ed597041113954ec23' (2022-06-12)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
  → 'github:numtide/flake-utils/1ed9fb1935d260de5fe1c2f7ee0ebaae17ed2fa1' (2022-05-30)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/d2a459d2596a0cfb1389207b117533389fa59e0f' (2022-05-04)
  → 'github:emacs-straight/org-mode/ed6f8dc67f5f1abf6b20929bdb571def2c191006' (2022-06-11)
• Updated input 'nix-doom-emacs/org-contrib':
    'git+https://git.sr.ht/~bzg/org-contrib?ref=master&rev=5766ff1088191e4df5fecd55007ba4271e609bcc' (2021-12-17)
  → 'git+https://git.sr.ht/~bzg/org-contrib?ref=refs%2fheads%2fmaster&rev=c6aef31ccfc7c4418c3b51e98f7c3bd8e255f5e6' (2022-06-05)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/0ca389721c5c7eff5db6f67159cbb1cdd51a3d7f' (2022-05-02)
  → 'github:hakimel/reveal.js/039972c730690af7a83a5cb832056a7cc8b565d7' (2022-05-31)
2022-06-14 19:30:38 +02:00
31b034ec52
add zotero 2022-06-11 01:16:57 +02:00
ba255c057f
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/20703892473d01c70fb10248442231fe94f4ceb4' (2022-06-05)
  → 'github:nix-community/home-manager/70824bb5c790b820b189f62f643f795b1d2ade2e' (2022-06-07)
• Added input 'home-manager/flake-compat':
    'github:edolstra/flake-compat/b4a34015c698c7793d592d66adbab377907a2be8' (2022-04-19)
• Added input 'home-manager/nmd':
    'gitlab:rycee/nmd/9e7a20e6ee3f6751f699f79c0b299390f81f7bcd' (2022-05-23)
• Added input 'home-manager/nmt':
    'gitlab:rycee/nmt/d83601002c99b78c89ea80e5e6ba21addcfe12ae' (2022-03-23)
• Added input 'home-manager/utils':
    'github:numtide/flake-utils/1ed9fb1935d260de5fe1c2f7ee0ebaae17ed2fa1' (2022-05-30)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/236cc2971ac72acd90f0ae3a797f9f83098b17ec' (2022-06-03)
  → 'github:NixOS/nixpkgs/e0169d7a9d324afebf5679551407756c77af8930' (2022-06-08)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/edbe868dd5f8bf447eaffd4cff85167d0771ce0f' (2022-05-10)
  → 'github:nix-community/nix-doom-emacs/a7566fc638faa25757b22cfb5108f8e8cda111fa' (2022-06-09)
2022-06-09 21:25:18 +02:00
a87df82d84
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/04c1b180862888302ddfb2e3ad9eaa63afc60cf8' (2022-05-17)
  → 'github:numtide/flake-utils/1ed9fb1935d260de5fe1c2f7ee0ebaae17ed2fa1' (2022-05-30)
• Updated input 'home-manager':
    'github:nix-community/home-manager/64831f938bd413cefde0b0cf871febc494afaa4f' (2022-05-25)
  → 'github:nix-community/home-manager/20703892473d01c70fb10248442231fe94f4ceb4' (2022-06-05)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/83658b28fe638a170a19b8933aa008b30640fbd1' (2022-05-26)
  → 'github:NixOS/nixpkgs/236cc2971ac72acd90f0ae3a797f9f83098b17ec' (2022-06-03)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/39a7bfc496d2ddfce73fe9542af1f2029ba4fe39' (2022-05-25)
  → 'github:NixOS/nixos-hardware/0cab18a48de7914ef8cad35dca0bb36868f3e1af' (2022-06-01)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/04c1b180862888302ddfb2e3ad9eaa63afc60cf8' (2022-05-17)
  → 'github:numtide/flake-utils/1ed9fb1935d260de5fe1c2f7ee0ebaae17ed2fa1' (2022-05-30)
2022-06-05 22:53:48 +02:00
f7b02ad710
remove wireguard allowed UDP port from ifrit 2022-05-29 21:40:39 +02:00
7becb4366d
remove vpn bridge 2022-05-29 19:30:01 +02:00
195bb6f159
update vpn public key 2022-05-29 18:23:07 +02:00
394ce54810
remove mag 2022-05-29 18:17:07 +02:00
c02bea215b
remove vpn config from ifrit 2022-05-29 15:40:06 +02:00
3f26ad2856
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/e66f0ff69a6c0698b35034b842c4b68814440778' (2022-05-23)
  → 'github:nix-community/home-manager/64831f938bd413cefde0b0cf871febc494afaa4f' (2022-05-25)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/dfd82985c273aac6eced03625f454b334daae2e8' (2022-05-20)
  → 'github:NixOS/nixpkgs/83658b28fe638a170a19b8933aa008b30640fbd1' (2022-05-26)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/8b5e1bf2fd62adefff05ae67cd49440be93ea193' (2022-05-21)
  → 'github:NixOS/nixos-hardware/39a7bfc496d2ddfce73fe9542af1f2029ba4fe39' (2022-05-25)
• Updated input 'nvd':
    'git+https://gitlab.com/khumba/nvd.git?ref=master&rev=0d3aba5510d611cdbd4123f7ef6358c19d3f4171' (2021-11-06)
  → 'git+https://gitlab.com/khumba/nvd.git?ref=refs%2fheads%2fmaster&rev=b082bd23f54d164765fab1737d40d47d4f649ae2' (2022-05-28)
2022-05-29 15:21:23 +02:00
aebf32e573
add mag 2022-05-29 15:20:56 +02:00
d9ea10c456
reformat ddns script 2022-05-29 13:47:57 +02:00
2bfb0295e6
disable ipv4 ddns 2022-05-29 13:30:37 +02:00
b0a8a89162
remove old hostfile entries 2022-05-29 13:30:23 +02:00
4ccbfb5206
refine forwarding configuration for vpn 2022-05-25 22:37:07 +02:00
2c8b80cb2c
switch to light GTK theme 2022-05-24 19:45:41 +02:00
539252c8bc
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/94780dd888881bf35165dfdd334a57ef6b14ead8' (2022-05-21)
  → 'github:nix-community/home-manager/e66f0ff69a6c0698b35034b842c4b68814440778' (2022-05-23)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/48037fd90426e44e4bf03e6479e88a11453b9b66' (2022-05-18)
  → 'github:NixOS/nixpkgs/dfd82985c273aac6eced03625f454b334daae2e8' (2022-05-20)
2022-05-24 19:06:26 +02:00
f17c7c67d2
fix nix flake check
Also adds a workaround for https://github.com/nix-community/home-manager/issues/2942
2022-05-21 20:24:00 +02:00
0655fab820
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/12806d31a381e7cd169a6bac35590e7b36dc5fe5' (2022-05-14)
  → 'github:numtide/flake-utils/04c1b180862888302ddfb2e3ad9eaa63afc60cf8' (2022-05-17)
• Updated input 'home-manager':
    'github:nix-community/home-manager/32a7da69dc53c9eb5ad0675eb7fdc58f7fe35272' (2022-05-13)
  → 'github:nix-community/home-manager/94780dd888881bf35165dfdd334a57ef6b14ead8' (2022-05-21)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/43ff6cb1c027d13dc938b88eb099462210fea52f' (2022-05-14)
  → 'github:NixOS/nixpkgs/48037fd90426e44e4bf03e6479e88a11453b9b66' (2022-05-18)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/6b4ebea9093c997c5f275c820e679108de4871ab' (2022-04-21)
  → 'github:NixOS/nixos-hardware/8b5e1bf2fd62adefff05ae67cd49440be93ea193' (2022-05-21)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/12806d31a381e7cd169a6bac35590e7b36dc5fe5' (2022-05-14)
  → 'github:numtide/flake-utils/04c1b180862888302ddfb2e3ad9eaa63afc60cf8' (2022-05-17)
2022-05-21 20:13:57 +02:00
16b5b70e09
update actions 2022-05-21 20:02:49 +02:00
4cc8427d3a
Merge pull request from dadada/dependabot/github_actions/cachix/install-nix-action-17
Bump cachix/install-nix-action from 13 to 17
2022-05-21 20:00:03 +02:00
196e467672
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
  → 'github:numtide/flake-utils/12806d31a381e7cd169a6bac35590e7b36dc5fe5' (2022-05-14)
• Updated input 'home-manager':
    'github:nix-community/home-manager/26858fc0dbed71fa0609490fc2f2643e0d175328' (2022-05-01)
  → 'github:nix-community/home-manager/32a7da69dc53c9eb5ad0675eb7fdc58f7fe35272' (2022-05-13)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/e10da1c7f542515b609f8dfbcf788f3d85b14936' (2022-04-26)
  → 'github:NixOS/nixpkgs/43ff6cb1c027d13dc938b88eb099462210fea52f' (2022-05-14)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/8e818ce70f399fcb11211296cf5bcb332203d7f2' (2022-04-22)
  → 'github:nix-community/nix-doom-emacs/edbe868dd5f8bf447eaffd4cff85167d0771ce0f' (2022-05-10)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/d41cff489f6d8ad326abcb2ccb53d716690b2c16' (2022-04-21)
  → 'github:hlissner/doom-emacs/80cd7557e147ccd0abef05ff4eafb93fe9545ad4' (2022-05-05)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:hlissner/doom-snippets/d1c00c5b12d842dcc786be8dbb129743dc1b68f1' (2022-04-21)
  → 'github:hlissner/doom-snippets/2596cead5e03896996b7268d057c1d734180547f' (2022-05-05)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/fef4e2e46ee8e42b68571cabc0bd73998e0d078f' (2022-04-21)
  → 'github:nix-community/emacs-overlay/1deb4d66be3117dd0d9dbf31fd458035e0f3c4de' (2022-05-05)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/adccb81d5415d0288b10b061c186c0c55dba3aa4' (2022-04-21)
  → 'github:emacs-straight/org-mode/d2a459d2596a0cfb1389207b117533389fa59e0f' (2022-05-04)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/9415ad5d7f329ccd8fbc82627789396a57fdbb3d' (2022-04-06)
  → 'github:hakimel/reveal.js/0ca389721c5c7eff5db6f67159cbb1cdd51a3d7f' (2022-05-02)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
  → 'github:numtide/flake-utils/12806d31a381e7cd169a6bac35590e7b36dc5fe5' (2022-05-14)
2022-05-16 18:16:58 +02:00
f019f023b5
install JOSM 2022-05-16 18:16:26 +02:00
226e8af7b5
fix split horizon DNS 2022-05-04 20:46:31 +02:00
1f5e1174ab
enable unbound control socket 2022-05-04 20:46:18 +02:00
c3c9146e89
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/778af87a981eb2bfa3566dff8c3fb510856329ef' (2022-04-26)
  → 'github:nix-community/home-manager/26858fc0dbed71fa0609490fc2f2643e0d175328' (2022-05-01)
2022-05-02 19:20:09 +02:00
0308d6668a
fix vpn config 2022-05-02 18:44:33 +02:00
34feb8a8a5
activate ttyS0 on ifrit 2022-05-02 18:44:24 +02:00
1dc4944d34
add virt-manager to home packages list 2022-04-27 21:31:47 +02:00
b698aaea6b
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/93a69d07389311ffd6ce1f4d01836bbc2faec644' (2022-04-20)
  → 'github:nix-community/home-manager/778af87a981eb2bfa3566dff8c3fb510856329ef' (2022-04-26)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/1ffba9f2f683063c2b14c9f4d12c55ad5f4ed887' (2022-04-17)
  → 'github:NixOS/nixpkgs/e10da1c7f542515b609f8dfbcf788f3d85b14936' (2022-04-26)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/f1ca1906a5f0ff319cb08d9ab478cf377e327c92' (2022-04-15)
  → 'github:nix-community/nix-doom-emacs/8e818ce70f399fcb11211296cf5bcb332203d7f2' (2022-04-22)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/0e48c22c3e4d22bdaa4700e9c9f3484d2ce84973' (2022-04-12)
  → 'github:hlissner/doom-emacs/d41cff489f6d8ad326abcb2ccb53d716690b2c16' (2022-04-21)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:hlissner/doom-snippets/f61c23ece1ad47c0522059ac45085fd283ce4452' (2022-03-02)
  → 'github:hlissner/doom-snippets/d1c00c5b12d842dcc786be8dbb129743dc1b68f1' (2022-04-21)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/82f83fbd561c08e83faeb4a8c37fb43375d88bd1' (2022-04-14)
  → 'github:nix-community/emacs-overlay/fef4e2e46ee8e42b68571cabc0bd73998e0d078f' (2022-04-21)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
  → 'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/f6813dbea9ef0c6be19bf68b4d9227ceb64c9449' (2022-04-07)
  → 'github:emacs-straight/org-mode/adccb81d5415d0288b10b061c186c0c55dba3aa4' (2022-04-21)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/1a0ccdbf4583ed0fce37eea7955e8ef90f840a9f' (2022-04-13)
  → 'github:NixOS/nixos-hardware/6b4ebea9093c997c5f275c820e679108de4871ab' (2022-04-21)
2022-04-27 21:31:10 +02:00
c98f24e703
fixup vpn routing config 2022-04-27 20:17:30 +02:00
c05dd7536b
add more loggig to wireguard setup 2022-04-27 19:46:38 +02:00
23e7c85827
fixup: route -> rule 2022-04-27 19:40:55 +02:00
b8f2c5c531
enable forwarding on vpn 2022-04-27 19:37:25 +02:00
d415aa10be
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/e39a9d0103e3b2e42059c986a8c633824b96c193' (2022-04-11)
  → 'github:nix-community/home-manager/93a69d07389311ffd6ce1f4d01836bbc2faec644' (2022-04-20)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/33772708c6d0e33f697426ba386aa0149cbcbecb' (2022-04-11)
  → 'github:NixOS/nixpkgs/1ffba9f2f683063c2b14c9f4d12c55ad5f4ed887' (2022-04-17)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/f3f40f333c3214c9614c23b6abd1ae498af3e5b5' (2022-04-09)
  → 'github:nix-community/nix-doom-emacs/f1ca1906a5f0ff319cb08d9ab478cf377e327c92' (2022-04-15)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/42e5763782fdc1aabb9f2624d468248d6978abe2' (2022-02-23)
  → 'github:hlissner/doom-emacs/0e48c22c3e4d22bdaa4700e9c9f3484d2ce84973' (2022-04-12)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/c875f360337cd71890c6b682cf277cc06218dbfa' (2022-03-10)
  → 'github:nix-community/emacs-overlay/82f83fbd561c08e83faeb4a8c37fb43375d88bd1' (2022-04-14)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/91681fc03334285dc0879fcb9a27583bd7ab9782' (2022-03-03)
  → 'github:emacs-straight/org-mode/f6813dbea9ef0c6be19bf68b4d9227ceb64c9449' (2022-04-07)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/37861335a225a3cc9f67e98977aceda3c2a9eca9' (2022-03-09)
  → 'github:hakimel/reveal.js/9415ad5d7f329ccd8fbc82627789396a57fdbb3d' (2022-04-06)
2022-04-20 23:07:09 +02:00
7d4f36d831
add option TCPKeepAlive to borg ssh connection 2022-04-16 08:22:39 +02:00
790d62a58f
allow renaming borg backups 2022-04-15 19:45:58 +02:00
5419038e75
fix borg behaviour with relative paths by using absolute paths
If a relative path is given to a repository that already exists, but
borg did not backup to previously, borg tries to create a backup
relative to this path.

Might also be due to path restrictio in borg serve...
2022-04-15 18:10:03 +02:00
38e910fb46
fixup hostname for vpn 2022-04-15 11:16:50 +02:00
743b84363c
Disable dhcp on ens7 on ifrit 2022-04-13 17:24:21 +02:00
6d90e97f9e
Updated interface config on ifrit 2022-04-13 17:18:02 +02:00
5a556254a8
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/0f8662f1319ad6abf89b3380dd2722369fc51ade' (2022-03-26)
  → 'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
• Updated input 'home-manager':
    'github:nix-community/home-manager/f911ebbec927e8e9b582f2e32e2b35f730074cfc' (2022-04-08)
  → 'github:nix-community/home-manager/e39a9d0103e3b2e42059c986a8c633824b96c193' (2022-04-11)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/42948b300670223ca8286aaf916bc381f66a5313' (2022-04-08)
  → 'github:NixOS/nixpkgs/33772708c6d0e33f697426ba386aa0149cbcbecb' (2022-04-11)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/850308db3ef0bcc7454155063b5fec28b4ffbc8c' (2022-04-09)
  → 'github:NixOS/nixos-hardware/1a0ccdbf4583ed0fce37eea7955e8ef90f840a9f' (2022-04-13)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/0f8662f1319ad6abf89b3380dd2722369fc51ade' (2022-03-26)
  → 'github:numtide/flake-utils/a4b154ebbdc88c8498a5c7b01589addc9e9cb678' (2022-04-11)
2022-04-13 17:01:05 +02:00
dependabot[bot]
3bf7ca48b0
Bump cachix/install-nix-action from 13 to 17
Bumps [cachix/install-nix-action](https://github.com/cachix/install-nix-action) from 13 to 17.
- [Release notes](https://github.com/cachix/install-nix-action/releases)
- [Commits](https://github.com/cachix/install-nix-action/compare/v13...v17)

---
updated-dependencies:
- dependency-name: cachix/install-nix-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-04-11 00:40:06 +00:00
7bd28525cb
Configure bridges 2022-04-10 21:22:01 +02:00
85c5e1a744
fix vlan config 2022-04-10 18:40:26 +02:00
ee3816fc80
update vlan config 2022-04-10 16:56:55 +02:00
ec63b1c032
Update vpn config 2022-04-10 16:10:04 +02:00
f901a0f775
Update backup config 2022-04-10 16:07:17 +02:00
8c404eb2db
Fixed vpn prefix 2022-04-10 14:42:52 +02:00
04ee4a1507
Updated VPN addresses 2022-04-10 14:20:56 +02:00
f7f6d03ee2
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/9580f6c42af2535dc7890edb681ead090f5105f2' (2022-03-30)
  → 'github:nix-community/home-manager/f911ebbec927e8e9b582f2e32e2b35f730074cfc' (2022-04-08)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/710fed5a2483f945b14f4a58af2cd3676b42d8c8' (2022-03-30)
  → 'github:NixOS/nixpkgs/42948b300670223ca8286aaf916bc381f66a5313' (2022-04-08)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/5b51499d0c776ad4a713a5ef0eb2c605443b5a01' (2022-03-11)
  → 'github:nix-community/nix-doom-emacs/f3f40f333c3214c9614c23b6abd1ae498af3e5b5' (2022-04-09)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/feceb4d24f582817d8f6e737cd40af9e162dee05' (2022-03-24)
  → 'github:NixOS/nixos-hardware/850308db3ef0bcc7454155063b5fec28b4ffbc8c' (2022-04-09)
2022-04-10 11:52:35 +02:00
2e3a548f09
Fix typo 2022-04-10 11:49:15 +02:00
f749d99ed6
Add vlan vpn to agares 2022-04-10 11:35:37 +02:00
d6dd36cc25
Updated DNS 2022-04-10 00:59:23 +02:00
a8548bfdc9
Added iommu support 2022-04-04 21:49:07 +02:00
7795c68ca0
Disabled dhcp for interfaces to be passed through 2022-04-03 19:38:23 +02:00
edfd136f26
Enable AMD IOMMU on agares for PCI passthrough 2022-04-03 19:35:26 +02:00
71d33dcb70
Automatically add admin users to libvirtd group 2022-04-03 18:48:47 +02:00
9ca35af57c
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
  → 'github:numtide/flake-utils/0f8662f1319ad6abf89b3380dd2722369fc51ade' (2022-03-26)
• Updated input 'home-manager':
    'github:nix-community/home-manager/ac9404115362c901ffe5c5c215f76f74b79d5eda' (2022-03-23)
  → 'github:nix-community/home-manager/9580f6c42af2535dc7890edb681ead090f5105f2' (2022-03-30)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/1d08ea2bd83abef174fb43cbfb8a856b8ef2ce26' (2022-03-23)
  → 'github:NixOS/nixpkgs/710fed5a2483f945b14f4a58af2cd3676b42d8c8' (2022-03-30)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
  → 'github:numtide/flake-utils/0f8662f1319ad6abf89b3380dd2722369fc51ade' (2022-03-26)
2022-03-31 19:17:28 +02:00
9932e4386c
Disable file share on ifrit 2022-03-26 13:50:56 +01:00
d05c6751e7
Update ifrit address 2022-03-26 13:48:31 +01:00
a855ade5e4
Add tty access to agares 2022-03-25 21:39:37 +01:00
5e1a05eba5
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/57476b5d286aa9416ed4472d19d37bbd93d30191' (2022-03-20)
  → 'github:nix-community/home-manager/ac9404115362c901ffe5c5c215f76f74b79d5eda' (2022-03-23)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/73ad5f9e147c0d2a2061f1d4bd91e05078dc0b58' (2022-03-14)
  → 'github:NixOS/nixpkgs/1d08ea2bd83abef174fb43cbfb8a856b8ef2ce26' (2022-03-23)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/32f61571b486efc987baca553fb35df22532ba63' (2022-03-16)
  → 'github:NixOS/nixos-hardware/feceb4d24f582817d8f6e737cd40af9e162dee05' (2022-03-24)
2022-03-25 20:49:02 +01:00
a24fb237a9
Add agares configuration 2022-03-25 20:48:12 +01:00
98eb4e7327
Fix audio on laptop 2022-03-25 20:28:33 +01:00
93ad118b22
Fixed renamed maxJobs option 2022-03-20 18:38:02 +01:00
633707e81d
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/e2a85ac43f06859a50d067a029f0a303c4ca5264' (2022-03-18)
  → 'github:nix-community/home-manager/57476b5d286aa9416ed4472d19d37bbd93d30191' (2022-03-20)
2022-03-20 18:34:32 +01:00
8fdf45fb41
Fixed docker hanging on reboot 2022-03-20 18:34:14 +01:00
ff9aa4738b
Fixed nix renamed options and broken post-build hook 2022-03-19 00:11:41 +01:00
efefa0c8be
Fixed deprecated ale setting 2022-03-19 00:11:41 +01:00
8924a6c1a3
Fixed zsh key bindings 2022-03-19 00:11:41 +01:00
0c4523cbf5
Fixed emacs flake 2022-03-19 00:11:41 +01:00
6f47c876f6
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/afe96e7433c513bf82375d41473c57d1f66b4e68' (2022-03-06)
  → 'github:nix-community/home-manager/e2a85ac43f06859a50d067a029f0a303c4ca5264' (2022-03-18)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/fcd48a5a0693f016a5c370460d0c2a8243b882dc' (2022-03-10)
  → 'github:NixOS/nixpkgs/73ad5f9e147c0d2a2061f1d4bd91e05078dc0b58' (2022-03-14)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/fc868105cefc6ce0091fc61f0fc4d8ccb653a048' (2022-02-14)
  → 'github:hlissner/doom-emacs/42e5763782fdc1aabb9f2624d468248d6978abe2' (2022-02-23)
• Updated input 'nix-doom-emacs/doom-snippets':
    'github:hlissner/doom-snippets/3083b2342f95fa55c1fd3b4a16229c5d867a02b0' (2021-11-24)
  → 'github:hlissner/doom-snippets/f61c23ece1ad47c0522059ac45085fd283ce4452' (2022-03-02)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/4079646746c264818338cd2733f38c33050f821f' (2022-02-14)
  → 'github:nix-community/emacs-overlay/c875f360337cd71890c6b682cf277cc06218dbfa' (2022-03-10)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/fe4a60dffa80951ab9641ddb034d01c6bc9dd675' (2022-02-13)
  → 'github:emacs-straight/org-mode/91681fc03334285dc0879fcb9a27583bd7ab9782' (2022-03-03)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/ff20051861f16da2f69fe9de8cc5dc54b2a79207' (2022-02-10)
  → 'github:hakimel/reveal.js/37861335a225a3cc9f67e98977aceda3c2a9eca9' (2022-03-09)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/816a935bf5aa5f77cb1f03ebfe20ab13b112d0f1' (2022-03-09)
  → 'github:NixOS/nixos-hardware/32f61571b486efc987baca553fb35df22532ba63' (2022-03-16)
2022-03-18 23:05:45 +01:00
2b3b2a603c
Moved recipemd package 2022-03-18 18:00:59 +01:00
9be4ce9855
flake.lock: Update
Flake lock file updates:

• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/062a0c5437b68f950b081bbfc8a699d57a4ee026' (2022-03-05)
  → 'github:NixOS/nixpkgs/fcd48a5a0693f016a5c370460d0c2a8243b882dc' (2022-03-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/86fa91c21f911d7cb0427baed3b177744b82e068' (2022-03-07)
  → 'github:NixOS/nixos-hardware/816a935bf5aa5f77cb1f03ebfe20ab13b112d0f1' (2022-03-09)
• Updated input 'recipemd':
    'github:dadada/recipemd/54103675dd9bb5e5a88e96462efa30311836cb37' (2021-06-24)
  → 'github:dadada/recipemd/ef3ce521ce4fdc4e2cedb92102433c8a0a9d0335' (2022-03-11)
• Updated input 'recipemd/nixpkgs':
    'github:NixOS/nixpkgs/1905f5f2e55e0db0bb6244cfe62cb6c0dbda391d' (2021-06-23)
  → 'path:/nix/store/n04lw5nrskzmz7rv17p09qrnjanfkg5d-source?narHash=sha256-Ccpot1h%2frV8MgcngDp5OrdmLTMaUTbStZTR5%2fsI7zW0='
2022-03-12 20:22:56 +01:00
bc9ca96546
Fixed rename 2022-03-07 22:05:44 +01:00
fdf8200223
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/7c2ae0bdd20ddcaafe41ef669226a1df67f8aa06' (2022-02-12)
  → 'github:nix-community/home-manager/0b1745b4ef4c35ec5d554b176539730fcb5ec141' (2022-02-23)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/48d63e924a2666baf37f4f14a18f19347fbd54a2' (2022-02-10)
  → 'github:NixOS/nixpkgs/7f9b6e2babf232412682c09e57ed666d8f84ac2d' (2022-02-21)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/ba6ef3c7d5c8b236fb06ddde1c513af804d72f45' (2022-01-29)
  → 'github:nix-community/nix-doom-emacs/505182141d6176d765347f85b8fb0cc204d8c44e' (2022-02-15)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/a5ebd0b04778409c2d513830791e919646e6f980' (2022-01-27)
  → 'github:hlissner/doom-emacs/fc868105cefc6ce0091fc61f0fc4d8ccb653a048' (2022-02-14)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/011ec0706fa17de340c96d7d393c00af41f65cab' (2022-01-27)
  → 'github:nix-community/emacs-overlay/4079646746c264818338cd2733f38c33050f821f' (2022-02-14)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
  → 'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/22e6ed6b89755047b44f8666ac20aac0c50afc34' (2022-01-26)
  → 'github:emacs-straight/org-mode/fe4a60dffa80951ab9641ddb034d01c6bc9dd675' (2022-02-13)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/61055ed02bd7dbff30ea827591084cce7c22303c' (2022-01-19)
  → 'github:hakimel/reveal.js/ff20051861f16da2f69fe9de8cc5dc54b2a79207' (2022-02-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/c361b954759195c2ac085fbbed5ad7d513e1585b' (2022-02-12)
  → 'github:NixOS/nixos-hardware/1ccfe243aa6e94bf80f2a66f6be41d086d37fc87' (2022-02-20)
2022-03-07 21:28:09 +01:00
3a8339638f
Fixed android studio startup 2022-02-23 18:43:24 +01:00
dbc36bb08f
Removed packages with build failures 2022-02-13 10:27:43 +01:00
d05d4de09e
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/6d9d9294d09b5e88df65f8c6651efb8a4d7d2476' (2022-02-10)
  → 'github:nix-community/home-manager/7c2ae0bdd20ddcaafe41ef669226a1df67f8aa06' (2022-02-12)
2022-02-13 00:32:14 +01:00
6cb0c987a7
Removed kitty 2022-02-13 00:26:31 +01:00
013a077b90
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/e2aa1f598674aa9c06f28f5db60b89f37f1e961b' (2022-02-08)
  → 'github:nix-community/home-manager/6d9d9294d09b5e88df65f8c6651efb8a4d7d2476' (2022-02-10)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/c5051e2b5fe9fab43a64f0e0d06b62c81a890b90' (2022-02-08)
  → 'github:NixOS/nixpkgs/48d63e924a2666baf37f4f14a18f19347fbd54a2' (2022-02-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/9886a06e4745edb31587d0e9481ad82d35f0d593' (2022-02-04)
  → 'github:NixOS/nixos-hardware/c361b954759195c2ac085fbbed5ad7d513e1585b' (2022-02-12)
2022-02-12 23:04:03 +01:00
d0fd572ffe
flake.lock: Update
Flake lock file updates:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
  → 'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
• Updated input 'home-manager':
    'github:nix-community/home-manager/a52aed72c84a2a10102a92397339fa01fc0fe9cf' (2022-01-30)
  → 'github:nix-community/home-manager/e2aa1f598674aa9c06f28f5db60b89f37f1e961b' (2022-02-08)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/efeefb2af1469a5d1f0ae7ca8f0dfd9bb87d5cfb' (2022-01-30)
  → 'github:NixOS/nixpkgs/c5051e2b5fe9fab43a64f0e0d06b62c81a890b90' (2022-02-08)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/87a35a0d58f546dc23f37b4f6af575d0e4be6a7a' (2022-01-12)
  → 'github:NixOS/nixos-hardware/9886a06e4745edb31587d0e9481ad82d35f0d593' (2022-02-04)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
  → 'github:numtide/flake-utils/3cecb5b042f7f209c56ffd8371b2711a290ec797' (2022-02-07)
2022-02-09 20:51:21 +01:00
18271fd6a0
Updated ftplugin for go 2022-02-08 21:39:22 +01:00
d3642a6525
By default use four spaces to indent 2022-02-08 21:26:27 +01:00
68049539aa
Added s0 2022-02-05 14:32:29 +01:00
62e288ea68
Added config for uwupn 2022-02-05 14:05:13 +01:00
e659af4ae8
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/95d39e13a4a7a818c87f2701b59820d3ac0e674c' (2022-01-30)
  → 'github:nix-community/home-manager/a52aed72c84a2a10102a92397339fa01fc0fe9cf' (2022-01-30)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/5bb20f9dc70e9ee16e21cc404b6508654931ce41' (2022-01-28)
  → 'github:NixOS/nixpkgs/efeefb2af1469a5d1f0ae7ca8f0dfd9bb87d5cfb' (2022-01-30)
2022-02-01 11:24:14 +01:00
fef678283c
flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/4e92ec84f93a293042a64c3ed56ac8aee62fb6e1' (2022-01-27)
  → 'github:nix-community/home-manager/95d39e13a4a7a818c87f2701b59820d3ac0e674c' (2022-01-30)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/945ec499041db73043f745fad3b2a3a01e826081' (2022-01-26)
  → 'github:NixOS/nixpkgs/5bb20f9dc70e9ee16e21cc404b6508654931ce41' (2022-01-28)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/2df4f288c7eb9ef9d3984ed458fec24f4f53cdb5' (2022-01-24)
  → 'github:nix-community/nix-doom-emacs/ba6ef3c7d5c8b236fb06ddde1c513af804d72f45' (2022-01-29)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/35865ef5e89442e3809b8095199977053dd4210f' (2022-01-14)
  → 'github:hlissner/doom-emacs/a5ebd0b04778409c2d513830791e919646e6f980' (2022-01-27)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/4075922d23e44a2b4c73e8c08f8b008ec6391ef2' (2022-01-20)
  → 'github:nix-community/emacs-overlay/011ec0706fa17de340c96d7d393c00af41f65cab' (2022-01-27)
• Updated input 'nix-doom-emacs/nix-straight':
    'github:nix-community/nix-straight.el/866ef703fa96c970624d6d4ad33110a0708fcfef' (2021-12-10)
  → 'github:nix-community/nix-straight.el/08d75e5651cb52f8a07e03408ed19e04bee07505' (2022-01-29)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/5d05f5911a9078e8c77851c40dc6a77d2a4c3955' (2022-01-19)
  → 'github:emacs-straight/org-mode/22e6ed6b89755047b44f8666ac20aac0c50afc34' (2022-01-26)
2022-01-31 10:30:22 +01:00
3532144ad2
Activated local resolver for all servers 2022-01-30 16:41:07 +01:00
558c726efc
Updated unbound config 2022-01-30 16:38:42 +01:00
62304d38da
Added even more git options 2022-01-30 16:30:58 +01:00
dfe9de1d0f
Fixed terminal true-color 2022-01-30 13:19:40 +01:00
2ab386ce5c
Added more git config 2022-01-30 12:30:08 +01:00
24a082f22c
Added git options 2022-01-29 21:43:24 +01:00
e3f72d719c
Changed font size 2022-01-29 21:27:44 +01:00
098012a8ae
Commented out broken packages 2022-01-29 21:27:18 +01:00
b2645b8cfa
flake.lock: Update
Flake lock file changes:

• Updated input 'flake-utils':
    'github:numtide/flake-utils/74f7e4319258e287b0f9cb95426c9853b282730b' (2021-11-28)
  → 'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
• Updated input 'home-manager':
    'github:nix-community/home-manager/a5dd5d5f197724f3065fd39c59c7ccea3c8dcb8f' (2022-01-13)
  → 'github:nix-community/home-manager/4e92ec84f93a293042a64c3ed56ac8aee62fb6e1' (2022-01-27)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/5aaed40d22f0d9376330b6fa413223435ad6fee5' (2022-01-13)
  → 'github:NixOS/nixpkgs/945ec499041db73043f745fad3b2a3a01e826081' (2022-01-26)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/9d05798e16691e832f97aacf2bbb884adbe4bfed' (2022-01-14)
  → 'github:nix-community/nix-doom-emacs/2df4f288c7eb9ef9d3984ed458fec24f4f53cdb5' (2022-01-24)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/655fb295edc47207a37097c6e4b7ad86cd552e45' (2022-01-14)
  → 'github:hlissner/doom-emacs/35865ef5e89442e3809b8095199977053dd4210f' (2022-01-14)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/50c206818dd137d6c28f61143319691fd910b0c7' (2022-01-13)
  → 'github:nix-community/emacs-overlay/4075922d23e44a2b4c73e8c08f8b008ec6391ef2' (2022-01-20)
• Updated input 'nix-doom-emacs/flake-utils':
    'github:numtide/flake-utils/74f7e4319258e287b0f9cb95426c9853b282730b' (2021-11-28)
  → 'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/1537bb402953f6622e087b140eb1b6dd629b1c78' (2022-01-12)
  → 'github:emacs-straight/org-mode/5d05f5911a9078e8c77851c40dc6a77d2a4c3955' (2022-01-19)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/f7c59649fe9d72a148860220a66511cefd142907' (2022-01-11)
  → 'github:hakimel/reveal.js/61055ed02bd7dbff30ea827591084cce7c22303c' (2022-01-19)
• Updated input 'nvd/flake-utils':
    'github:numtide/flake-utils/74f7e4319258e287b0f9cb95426c9853b282730b' (2021-11-28)
  → 'github:numtide/flake-utils/846b2ae0fc4cc943637d3d1def4454213e203cba' (2022-01-20)
2022-01-27 20:56:51 +01:00
230a5a6dfc
flake.lock: Update
Flake lock file changes:

• Updated input 'home-manager':
    'github:nix-community/home-manager/0b197562ab7bf114dd5f6716f41d4b5be6ccd357' (2021-12-27)
  → 'github:nix-community/home-manager/a5dd5d5f197724f3065fd39c59c7ccea3c8dcb8f' (2022-01-13)
• Updated input 'myNixpkgs':
    'github:NixOS/nixpkgs/ac169ec6371f0d835542db654a65e0f2feb07838' (2021-12-26)
  → 'github:NixOS/nixpkgs/5aaed40d22f0d9376330b6fa413223435ad6fee5' (2022-01-13)
• Updated input 'nix-doom-emacs':
    'github:nix-community/nix-doom-emacs/3209f69db760959331e2f8201de17758fbe08015' (2021-12-28)
  → 'github:nix-community/nix-doom-emacs/9d05798e16691e832f97aacf2bbb884adbe4bfed' (2022-01-14)
• Updated input 'nix-doom-emacs/doom-emacs':
    'github:hlissner/doom-emacs/af7c1d79bd63d78410aafc410d52ee5c1109ec26' (2021-12-18)
  → 'github:hlissner/doom-emacs/655fb295edc47207a37097c6e4b7ad86cd552e45' (2022-01-14)
• Updated input 'nix-doom-emacs/emacs-overlay':
    'github:nix-community/emacs-overlay/085a34df847458952c13b29d94e12c0333828bbc' (2021-12-24)
  → 'github:nix-community/emacs-overlay/50c206818dd137d6c28f61143319691fd910b0c7' (2022-01-13)
• Updated input 'nix-doom-emacs/org':
    'github:emacs-straight/org-mode/be03334a7e5dae4f04b52a1cd1614024d5473ceb' (2021-12-21)
  → 'github:emacs-straight/org-mode/1537bb402953f6622e087b140eb1b6dd629b1c78' (2022-01-12)
• Updated input 'nix-doom-emacs/revealjs':
    'github:hakimel/reveal.js/38b32c66199a29cf21f60f920c30a4ead150c654' (2021-12-20)
  → 'github:hakimel/reveal.js/f7c59649fe9d72a148860220a66511cefd142907' (2022-01-11)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/46df95ca81e7e4cf3458cdb4b7d1714b5fce9da5' (2021-12-28)
  → 'github:NixOS/nixos-hardware/87a35a0d58f546dc23f37b4f6af575d0e4be6a7a' (2022-01-12)
2022-01-15 18:36:54 +01:00
650ff13f74
Enabled libvirtd service on gorgon 2022-01-15 18:36:15 +01:00
5f8ab3d8b0
Added ghidra-bin to pkgs 2022-01-15 18:35:59 +01:00
e1239fa84d
Disabled vi mode in zsh 2022-01-15 18:35:35 +01:00
4ddab0af86
Changed opening of tmux windows and panes to open previous directory 2021-12-28 23:32:31 +01:00
0a8480b555
Updated tmux and zsh configs 2021-12-28 18:49:02 +01:00
d9d8d49278
Updated flakes 2021-12-28 18:19:57 +01:00
4db6bd1e0a
Updated flakes 2021-12-28 15:26:40 +01:00
9cd63df146
Added nix-index to packages 2021-12-12 17:46:44 +01:00
1cd04cab09
Removed old deploy script 2021-12-11 23:35:11 +01:00
c1fe091ec5
Fixed import-from-derivation when using keys from package 2021-12-11 23:20:41 +01:00
ddc4fb3086
Disabled building of HM configuration in HM configuration exposed by flake 2021-12-11 23:15:24 +01:00
aca8c411cd
Removed work configuration 2021-12-11 23:13:02 +01:00
b5c1342a9c
Fixed documentation updated 2021-12-11 21:41:19 +01:00
e64c7da47a
Disabled HM documentation 2021-12-11 21:40:56 +01:00
d7c51d57e4
Updated flakes 2021-12-11 20:29:21 +01:00
91f626e2d4
Changed font to Jetbrains Mono 2021-12-10 22:23:05 +01:00
896c519e90
Added glow to packages 2021-12-10 22:22:49 +01:00
397f9ed02e
Switched to darker theme 2021-12-05 16:24:00 +01:00
57fd940c0e
Added spotify 2021-12-05 16:23:53 +01:00
f0b7461b0d
Removed python27.dbus-python from dependencies
Not needed anymore and build is broken in nixpkgs.
2021-12-01 22:36:45 +01:00
2000662eaf
Updated flakes 2021-12-01 21:03:35 +01:00
302fa702f2
Activated direnv support for nix 2021-11-29 22:53:15 +01:00
b7344bc03a
Update flakes 2021-11-20 13:41:39 +01:00
86f5cd79d1
Switch GTK theme to Adwaita 2021-11-20 13:40:01 +01:00
96e1acbbcb
update flakes 2021-11-18 22:14:17 +01:00
90b549f5a9
clean up nix config 2021-11-14 13:06:18 +01:00
fe0b5710e6
fix zsh completions and git prompt 2021-11-14 12:13:06 +01:00
521f39cebd
prevent warning while switching config 2021-11-14 02:21:23 +01:00
68e8cac04e
use home-manager nixos module 2021-11-14 02:20:07 +01:00
bd1477f9f8
increase font size 2021-11-14 01:43:18 +01:00
58cc357ad9
update flakes 2021-11-14 01:05:47 +01:00
83dc018a4f
Enabled automatic upgrades on surgat 2021-11-06 15:14:53 +01:00
577cd8c02c
update flakes 2021-11-06 14:55:56 +01:00
fa608a6c28
fix ui stuff 2021-11-06 14:52:34 +01:00
d306493bb7
Remove GTK theming 2021-10-29 22:48:45 +02:00
4408b60421
update flakes 2021-10-27 21:39:38 +02:00
dcc567f1cb
update flakes 2021-10-18 19:35:35 +02:00
ea7ab01ea1
journald: keep at least 2G of free space 2021-10-04 23:06:52 +02:00
825501bbd6
fix backup 🤦 2021-10-04 22:28:54 +02:00
31c5046fe5
update flakes 2021-10-04 22:28:48 +02:00
b897b3ec7b
add some packages 2021-10-04 22:27:50 +02:00
67e321cd65
disable some emacs packages 2021-09-21 15:52:48 +02:00
614485b66a
update flakes 2021-09-21 15:52:37 +02:00
d83db28bc7
add shortwave 2021-09-21 13:58:21 +02:00
01abd84068
update flakes 2021-09-19 21:02:30 +02:00
52bf26db1e
update flakes 2021-09-10 13:39:36 +02:00
572ae2bb81
update flakes 2021-09-01 11:13:13 +02:00
6dc0d91f0d
fix homepage 2021-08-27 17:49:14 +02:00
499b893f3e
update flakes 2021-08-27 17:48:55 +02:00
53e9374d85
update flakes 2021-08-18 22:18:25 +02:00
6ab7a2683f
chromium with hardware accel 2021-08-17 18:30:43 +02:00
3df49038a3
update flakes 2021-08-17 18:30:15 +02:00
9c46081556
Merge branch 'emacs-tree-sitter' 2021-08-09 00:27:26 +02:00
1b0c4b3924
fix emacs-tree-sitter 2021-08-09 00:23:54 +02:00
bb600e1cec
update flakes 2021-08-05 22:33:04 +02:00
75d78bfb84
Revert "remove nix community cache"
This reverts commit df7004d876.
2021-08-05 22:32:46 +02:00
9822045da5
WIP 2021-08-05 22:15:23 +02:00
2136801950
github: fix action 2021-08-01 19:41:02 +02:00
dd8408e5e9
flake: update lock file 2021-08-01 19:37:01 +02:00
1e56cd9c83
remove scripts package and use flake 2021-08-01 19:37:01 +02:00
7ff1c1922f
github: disable building in nix flake check 2021-08-01 19:18:32 +02:00
df7004d876
remove nix community cache 2021-07-31 23:05:06 +02:00
af9cdfe5ae
add empty set of hydra tests 2021-07-31 22:30:34 +02:00
c5737aba86
add outputs for each default system 2021-07-31 22:12:52 +02:00
6faa8eea0d
fix deploy script path 2021-07-31 00:02:36 +02:00
d31ba40683
remove disabled tlp 2021-07-30 22:06:05 +02:00
9f2ae7286a
fix unbound config 2021-07-25 17:04:57 +02:00
a343fb0edc
update flakes 2021-07-25 16:19:16 +02:00
9084296d39
home: add OBS 2021-07-25 16:17:02 +02:00
d475af894e
vim: fix perlcritic 2021-07-22 20:24:21 +02:00
ac7eb6fc40
disable printing because tests are broken 2021-07-22 20:14:15 +02:00
d54b95313b
update nvd url 2021-07-22 20:14:08 +02:00
5208ff8b7e
override nixpkgs inputs 2021-07-22 20:04:28 +02:00
c08af9115a
update flakes 2021-07-22 20:00:09 +02:00
2f05857671
add nix-community binary cache 2021-07-22 19:58:37 +02:00
a73740239c
reenable gs backup 2021-07-22 19:55:41 +02:00
5494df6b21
update flakes 2021-07-14 21:19:45 +02:00
46bf68609c
Merge pull request from dadada/add-nix-doom-emacs
add doom-emacs
2021-07-11 19:47:22 +02:00
4c8e42ee1c
add doom-emacs 2021-07-11 19:41:27 +02:00
2d34226036
Merge pull request from dadada/fix-hm-modules
fix hmModule
2021-07-11 19:31:30 +02:00
cdabd0cc44
fix hmModule 2021-07-11 19:30:31 +02:00
4f62f30421
Merge pull request from dadada/fix-nixos-modules
fix nixosModules
2021-07-11 18:54:09 +02:00
d63c116b9f
fix nixosModules 2021-07-11 18:53:24 +02:00
2c0ea20ad5
update flakes 2021-07-10 20:15:45 +02:00
db3665fb7e
Merge pull request from dadada/add-nvd
add nvd
2021-07-06 23:28:39 +02:00
553749fea4
add nvd 2021-07-06 23:26:24 +02:00
253e746020
Merge pull request from dadada/flake-update
update flakes
2021-07-04 17:02:13 +02:00
be5e43f9fd
update flakes 2021-07-04 17:01:17 +02:00
014a01a2a1
Merge pull request from dadada/readme
update readme
2021-06-27 23:12:31 +02:00
abe1adba49
update readme 2021-06-27 23:11:16 +02:00
96fa4e6854
Merge pull request from dadada/flakes
port to flakes
2021-06-27 23:02:25 +02:00
2d9150098e
port to flakes 2021-06-27 22:45:34 +02:00
deaa4fb75c
Merge branch 'fix-caches-2' 2021-06-27 22:28:55 +02:00
1f8922a61e
fix homepage 2021-06-27 22:01:29 +02:00
aa9e99557f
add dependabot.yml 2021-06-27 13:19:44 +02:00
b3e8080fe7
fix caches 2 2021-06-20 14:04:22 +02:00
64c49efa5f
enable nix flakes 2021-06-12 19:05:25 +02:00
8a576e79e7
git command aliases 2021-06-12 02:12:21 +02:00
479e043340
fancy exa options 2021-06-12 00:57:04 +02:00
fde26938db
fix zsh highlighting 2021-06-12 00:11:57 +02:00
9b8bb5e88d
wip 2021-06-02 21:58:57 +02:00
2dcf9e12a7
gnome3 to gnome4 2021-06-02 20:36:24 +02:00
d62566250f
Revert "remove references to stdenv and replace with lib"
This reverts commit 0dd9ecdafe.
2021-06-02 20:25:59 +02:00
0dd9ecdafe
remove references to stdenv and replace with lib 2021-06-02 20:20:32 +02:00
ba1078adfc
disable tests on recipemd (broken upstream) 2021-06-02 20:09:59 +02:00
e29c3e4cf4
pkgs: add bash 2021-06-02 20:09:32 +02:00
bcb652ce7d
recipemd: generate completions for bash and tcsh 2021-05-30 20:11:49 +02:00
9f8288895f
remove tubslatex from default 2021-05-30 16:54:40 +02:00
abedd7aa03
make pythonPackages into lambda instead of path 2021-05-30 16:47:03 +02:00
0644371745
gorgon: disable avahi 2021-05-30 01:02:10 +02:00
b24b412ecf
pkgs: add jetbrains-idea 2021-05-24 16:21:44 +02:00
434524e68d
networking: reresolve wg dns hourly 2021-05-23 11:58:10 +02:00
4d7719ea99
ifrit: disable ipv6 temp addresses 2021-05-23 11:18:50 +02:00
02fecf50d6
fixup 2021-05-09 15:05:36 +02:00
0151e59f49
add fginfo-git to backups 2021-05-09 14:40:43 +02:00
f1f2a69dfb
add fginfo wg client 2021-05-09 13:39:34 +02:00
b15834cec3
ifrit: add backup repo for fginfo 2021-05-09 13:21:55 +02:00
237bd212e6
fixup gnome 2021-05-08 13:11:24 +02:00
9486b673d1
replace gnome-shell with sway 2021-05-06 20:45:04 +02:00
f72d770fb2
add simple dns update script 2021-05-02 16:48:23 +02:00
f2c80100fe
update 2021-05-02 14:23:49 +02:00
9f6cdf0db4
update homepage 2021-05-02 14:21:07 +02:00
8b198550cb
Remove sudo overlay 2021-04-24 14:30:33 +02:00
ca0d3de726
vim: bind ALEFix 2021-04-20 21:45:15 +02:00
6e540a51e3
Change VIM keybindings 2021-04-20 21:33:54 +02:00
89d331cd95
Fix unbearable colors 2021-04-20 21:33:17 +02:00
089a73bdb2
Set font to Source Code Pro 2021-04-13 22:41:28 +02:00
e28d0c2bc3
recipemd: adapt to upstream changes 2021-04-13 22:12:39 +02:00
9ec4671420
Switch to light theme 2021-04-13 22:12:22 +02:00
398bcc77e1
Add ripgrep to env 2021-04-13 22:12:09 +02:00
9513f5883a
Remove phpstorm from home packages 2021-04-13 22:11:55 +02:00
075ad734c2
Switch to xwayland backend for Firefox 2021-04-13 22:11:00 +02:00
98d20da14b
Disable GS backup because of failing mount unit 2021-04-13 22:10:26 +02:00
1175edd77a
Enable gs backup on gorgon 2021-04-01 18:05:17 +02:00
5449f8abc5
Reduce number of old generations kept by default 2021-03-30 19:55:34 +02:00
42113468aa
samba: fixup 2021-03-27 22:58:10 +01:00
d67ea4585c
samba: fixup 2021-03-27 22:32:34 +01:00
88ab6a38ae
samba: fixup 2021-03-27 22:24:02 +01:00
9fdfd91d4e
samba: fixup 2021-03-27 22:22:21 +01:00
77252690ca
samba: fixup 2021-03-27 22:17:51 +01:00
44495608b9
samba: fixup 2021-03-27 22:08:43 +01:00
463041dfa9
samba: fix min_protocol 2021-03-27 22:01:42 +01:00
77e62d58a7
samba: fix allowlist 2021-03-27 21:35:53 +01:00
405888988d
Adapt firewall 2021-03-27 18:13:09 +01:00
f2bd759493
Add evolution 2021-03-27 18:12:54 +01:00
13b59363d5
Add ghostscript to systemPackages 2021-03-27 11:38:28 +01:00
d2d58a7612
Switch from kitty to alacritty 2021-03-20 15:28:15 +01:00
cd21dba137
Fix copy-paste in tmux 2021-03-20 14:26:11 +01:00
b498fd2ba0
Add php stuff 2021-03-20 14:25:56 +01:00
3ee34dbdc2
Fix content remaining in copy-paste buffers 2021-03-18 19:28:36 +01:00
eb87259747
Fix link to recipemd 2021-03-16 14:59:55 +01:00
5a12fd3a96
Remove hmModules 2021-03-16 14:57:08 +01:00
0937877842
Update reserved names of default.nix 2021-03-16 14:55:42 +01:00
f760a9e002
Make NFS share readonly 2021-03-16 14:27:05 +01:00
7bccc0b7ef
Update recipemd package 2021-03-15 18:13:16 +01:00
5297979b92
Add pythonPackages 2021-03-14 22:18:22 +01:00
950b23bc40
Add recipemd 2021-03-14 22:16:36 +01:00
8d3acd5270
Make users mutable on laptop 2021-03-13 14:08:07 +01:00
90e51c3455
Remove user tim.schubert 2021-03-12 22:39:12 +01:00
66fdba6e77
Fix default font on hidpi 2021-03-12 15:46:37 +01:00
359be73973
Enable backup on gorgon 2021-03-12 11:26:31 +01:00
d143afc023
Sync 2021-03-08 10:08:22 +01:00
9e1f423048
Enable docker 2021-02-23 10:19:09 +01:00
b6a929c338
Enable shellcheck and perlcritic 2021-02-01 23:14:38 +01:00
5d52018e36
Add filetype config for Perl and Bash 2021-02-01 23:09:40 +01:00
04f3af3fa6
Sync vim copy-paste buffer with system 2021-01-30 23:55:34 +01:00
9d1b8ae533
Enable easier text selection in tmux 2021-01-30 23:48:48 +01:00
bb37feb230
Enable VIM mouse support 2021-01-30 22:27:53 +01:00
76240f4392
Add sudo patch to pruflas 2021-01-30 18:02:04 +01:00
52a74c426c
Patch sudo 2021-01-30 17:50:18 +01:00
bfc765f031
Update sway config 2021-01-30 15:15:35 +01:00
2c2ce07568
Add gitgutter to vim plugins 2021-01-30 00:43:03 +01:00
52b62d5575
Add vim-buftabline 2021-01-30 00:22:06 +01:00
8131024685
Remove initial password 2021-01-30 00:21:43 +01:00
f2d601dcbe
Fix tmux 2021-01-29 23:50:08 +01:00
b178815db6
Fix network manager startup 2021-01-29 23:49:42 +01:00
bc59bfdac2
Enable auto-upgrade 2021-01-27 19:19:51 +01:00
dbc2795324
Fixup 2021-01-25 22:16:28 +01:00
73eff3459e
Add scripts 2021-01-24 19:55:39 +01:00
4be94e5ed8
gorgon/home: rewrite using genAttrs 2021-01-24 18:21:13 +01:00
de6bad0dcb
sway: Fix undefined variable 2021-01-24 18:20:46 +01:00
9131504b38
Fixup 2021-01-16 20:17:11 +01:00
3bdf95ce25
Add .envrc 2021-01-16 19:49:25 +01:00
939c10aacd
Add shell.nix 2021-01-16 19:47:36 +01:00
04ef7f0bb5
Add dadada-deploy pkg 2021-01-16 19:34:09 +01:00
439e5c6953
Refactor deploy script 2021-01-16 19:03:27 +01:00
9a5f573be1
Add rollback on failure 2021-01-16 18:57:59 +01:00
e19bc8eddb
Remove todo that is done 2021-01-10 17:10:23 +01:00
d71ea225fe
Add LICENSE 2021-01-10 17:08:28 +01:00
eb6e32284d
Clean up arguments to deploy 2021-01-07 22:15:25 +01:00
30549b5e4e
Add system state version 2021-01-07 22:01:32 +01:00
e9ccff4b52
Enable auto-upgrade and newer kernel on laptop 2021-01-07 21:47:58 +01:00
438c05f4eb
Add mpv and languagetool to work profile 2021-01-04 21:52:04 +01:00
458e4838ce
Add pkgs.lab to installed packages 2021-01-04 21:51:20 +01:00
eac0b53b62
Cleanup laptop profile 2021-01-04 09:13:31 +01:00
01f2c749c8
Add unit for languagetool server 2021-01-04 09:12:59 +01:00
a4a5abc7bb
Add work profile 2021-01-04 09:12:24 +01:00
42c9150902
Enable caching for gitea 2021-01-03 18:56:40 +01:00
d6a6d87307
Add logo 2021-01-03 12:41:12 +01:00
119c0cc493
pruflas: enable nix flakes 2021-01-02 23:08:14 +01:00
16d1b3a2bd
gorgon: fixup 2021-01-02 21:40:14 +01:00
f923bbb38e
Disable lid switch 2021-01-02 20:53:57 +01:00
1b27c2fb11
Fixup 2021-01-02 20:25:47 +01:00
92920ebabd
Fixup 2021-01-02 20:14:09 +01:00
354d04c838
Fixup 2021-01-02 20:02:22 +01:00
060c312336
Fixup 2021-01-02 20:00:51 +01:00
0568af61cf
Fixup 2021-01-02 19:48:50 +01:00
20cdd676d2
Fixup 2021-01-02 19:44:21 +01:00
a042a5546e
Fixup 2021-01-02 19:43:21 +01:00
6e2cba1c8d
Fixup 2021-01-02 19:40:46 +01:00
707d83ba45
Fixup 2021-01-02 19:37:19 +01:00
f09c26e146
Fixup 2021-01-02 19:34:11 +01:00
bc44e473d6
Fixup 2021-01-02 19:31:42 +01:00
4d331d93b6
Fixup 2021-01-02 19:26:10 +01:00
0472fbefa2
Fixup 2021-01-02 19:23:22 +01:00
f8402f1c70
Fixup 2021-01-02 19:21:53 +01:00
dc54552eba
Fixup 2021-01-02 19:20:35 +01:00
fa4708235f
Fixup 2021-01-02 19:16:56 +01:00
9ce2e1514c
Fixup 2021-01-02 19:13:32 +01:00
c3714e34c9
Fixup 2021-01-02 19:05:49 +01:00
9ab3ac5ed5
Fixup 2021-01-02 19:04:28 +01:00
aa79902aad
Fixup 2021-01-02 19:02:12 +01:00
5ce05ee534
Fixup proxy 2021-01-02 19:00:04 +01:00
6f06fe69a5
Fixup 2021-01-02 18:53:15 +01:00
28f312aa1f
Let Hydra only listen on tunnel 2021-01-02 18:51:18 +01:00
800ad1a9e7
Use IPv4 inside tunnel because of Hydra 2021-01-02 18:47:51 +01:00
e4bc29ff4a
Fixup 2021-01-02 18:14:06 +01:00
d0470595ff
Fixup 2021-01-02 18:07:16 +01:00
b444906e42
pruflas: open hydra port to tunnel 2021-01-02 18:00:40 +01:00
e3a797a98f
surgat: hydra proxy-pass 2021-01-02 17:55:25 +01:00
c3bdc36fc3
surgat, pruflas: open WG ports 2021-01-02 17:44:53 +01:00
1bcfcb26b8
Set up hydra VPN 2021-01-02 17:42:11 +01:00
5b5c0c174b
Add pruflas backup 2021-01-02 17:17:40 +01:00
cae687147f
Add pruflas VPN 2021-01-02 17:06:48 +01:00
e1da18608e
Fixup DHCP 2021-01-02 16:57:41 +01:00
032a1d31bc
Fixup DHCP 2021-01-02 16:45:22 +01:00
13ff1792cb
Use EFI bootloader 2021-01-02 16:40:16 +01:00
cd7ef95c15
Add pruflas 2021-01-02 16:30:50 +01:00
a7dee80a71
Revert "Disable share on surgat"
This reverts commit 288520c18a.
2021-01-02 16:04:14 +01:00
288520c18a
Disable share on surgat 2021-01-02 16:02:05 +01:00
998f83ff6a
Disable wayland in firefox
Breaks copy-paste in gnome shell
2021-01-02 14:30:50 +01:00
5a734099bf
Reformat using nixpkgs-fmt 2021-01-02 14:23:50 +01:00
368ed0797d
Fixup 2021-01-02 13:05:58 +01:00
0a7fa02ecd
Add gitea 2021-01-02 12:42:34 +01:00
359c18bb5d
Update readme 2021-01-02 11:25:24 +01:00
166 changed files with 5255 additions and 2232 deletions

5
.envrc Normal file
View file

@ -0,0 +1,5 @@
#!/bin/sh
watch_file devshell.nix
use flake

7
.github/dependabot.yml vendored Normal file
View file

@ -0,0 +1,7 @@
version: 2
updates:
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
assignees: ["dadada"]

24
.github/workflows/nix-flake-check.yml vendored Normal file
View file

@ -0,0 +1,24 @@
name: Continuous Integration
on:
pull_request:
push:
branches: [main]
jobs:
checks:
name: "Checks"
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: cachix/install-nix-action@v26
with:
nix_path: nixpkgs=channel:nixos-stable
extra_nix_config: |
experimental-features = nix-command flakes
access-tokens = github.com=${{ secrets.GITHUB_TOKEN }}
system-features = nixos-test benchmark big-parallel kvm
- uses: cachix/cachix-action@v14
with:
name: dadada
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
- run: nix flake check

20
.github/workflows/nix-flake-update.yml vendored Normal file
View file

@ -0,0 +1,20 @@
name: update-flake-lock
on:
workflow_dispatch: # allows manual triggering
schedule:
- cron: '0 0 * * 0' # runs weekly on Sunday at 00:00
jobs:
lockfile:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Install Nix
uses: DeterminateSystems/nix-installer-action@v10
- name: Update flake.lock
uses: DeterminateSystems/update-flake-lock@v21
with:
pr-title: "Update flake.lock" # Title of PR to be created
pr-labels: | # Labels to be set on the PR
dependencies
automated

1
.gitignore vendored
View file

@ -5,3 +5,4 @@ result
*.zip
*.qcow2
work.nix
.direnv/

3
.gitmodules vendored
View file

@ -1,3 +0,0 @@
[submodule "nur-packages"]
path = nur-packages
url = git@github.com:dadada/nur-packages.git

21
LICENSE Normal file
View file

@ -0,0 +1,21 @@
MIT License
Copyright (c) 2021 Tim Schubert
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

View file

@ -1,29 +1,3 @@
# nix configuration
```nix
{
imports = [
./modules/profiles/gorgon.nix
./private/metis
];
}
```
```nix
{ config, pkgs, lib, ... }:
let
dadada = import (builtins.fetchGit {
url = "https://github.com/dadada/nix-config.git";
sha256 = "1a661h3ssy35yha66xnhldlwlr9safzw4h83z5mg82assgbbh9fz";
}) {};
in {
imports = [
./secrets.nix
./hardware-configuration.nix
dadada.hosts.ifrit
];
system.stateVersion = "20.03";
}
```
Use at your own risk.

9
admins.nix Normal file
View file

@ -0,0 +1,9 @@
{
dadada = {
shell = "zsh";
keys = [
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIHrT9sQhJWrTPIMOEsZ8UzkY7BKJYYK2Aj/Q3NZu2z7uAAAABHNzaDo= dadada@gorgon"
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIOFHB9T6fjkuIU8jW9gGiYGSEFSfrnY/6GJUfmfMx10HAAAABHNzaDo= Backup dadada <dadada@dadada.li>"
];
};
}

View file

@ -1,18 +0,0 @@
{ pkgs }:
with pkgs;
rec {
lib = import ./lib { inherit pkgs; };
modules = import ./modules;
hmModules = import ./modules/home;
overlays = import ./overlays;
profiles = import ./modules/profiles;
hmProfiles = import ./modules/home/profiles;
hosts = import ./hosts;
tubslatex = callPackage ./pkgs/tubslatex {};
keys = callPackage ./pkgs/keys {};
homePage = callPackage ./pkgs/homePage {};
}

39
deploy
View file

@ -1,39 +0,0 @@
#!/usr/bin/env bash
set -e
set -o pipefail
if [ -z "$1" ]
then
echo "usage: deploy <hostname>"
exit 1
fi
git push
function hash {
archive="$(mktemp /tmp/nix-config.XXX.tar.gz)"
git archive "$1" | gzip > "$archive"
nix-prefetch-url --unpack --type sha256 "file:$archive" 2>/dev/null
rm "$archive"
}
host="${1}"
rev="$(git rev-parse HEAD)"
url="https://github.com/dadada/nix-config/archive/${rev}.tar.gz"
sha256=$(hash "$rev")
cat <<EOF | ssh "${host}".dadada.li 'sudo nix-shell -p tmux --run "cat - > /etc/nixos/deploy.nix && tmux new -d \"nixos-rebuild switch |& tee /var/log/dadada-deploy.log\""'
{ config, pkgs, lib, ... }:
let
dadada = import (builtins.fetchTarball {
url = ${url};
sha256 = "${sha256}";
}) { inherit pkgs; };
in {
imports = [
./hardware-configuration.nix
dadada.hosts."${host}"
];
}
EOF

49
devshell.nix Normal file
View file

@ -0,0 +1,49 @@
{ pkgs, extraModules, ... }:
(pkgs.devshell.mkShell {
imports = extraModules;
name = "dadada/nix-config";
packages = with pkgs; [
agenix
nixos-rebuild
];
commands = [
{
name = "switch";
help = "Switch the configuration on the current system.";
command = ''
flake=$(nix flake metadata --json ${./.} | jq -r .url)
${pkgs.nixos-rebuild}/bin/nixos-rebuild switch --flake ".#" --use-remote-sudo
'';
category = "deploy";
}
{
name = "format";
help = "Format the project";
command = ''
treefmt .
'';
category = "dev";
}
{
name = "update";
help = "Update the project";
command = ''
nix flake update --commit-lock-file
'';
category = "dev";
}
{
name = "check";
help = "Run checks";
category = "dev";
command = "nix flake check";
}
];
git.hooks = {
pre-commit.text = "nix flake check";
};
})

462
flake.lock generated Normal file
View file

@ -0,0 +1,462 @@
{
"nodes": {
"agenix": {
"inputs": {
"darwin": "darwin",
"home-manager": [
"home-manager"
],
"nixpkgs": [
"nixpkgs"
],
"systems": "systems"
},
"locked": {
"lastModified": 1750173260,
"narHash": "sha256-9P1FziAwl5+3edkfFcr5HeGtQUtrSdk/MksX39GieoA=",
"owner": "ryantm",
"repo": "agenix",
"rev": "531beac616433bac6f9e2a19feb8e99a22a66baf",
"type": "github"
},
"original": {
"owner": "ryantm",
"repo": "agenix",
"type": "github"
}
},
"crane": {
"locked": {
"lastModified": 1731098351,
"narHash": "sha256-HQkYvKvaLQqNa10KEFGgWHfMAbWBfFp+4cAgkut+NNE=",
"owner": "ipetkov",
"repo": "crane",
"rev": "ef80ead953c1b28316cc3f8613904edc2eb90c28",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"darwin": {
"inputs": {
"nixpkgs": [
"agenix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1744478979,
"narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=",
"owner": "lnl7",
"repo": "nix-darwin",
"rev": "43975d782b418ebf4969e9ccba82466728c2851b",
"type": "github"
},
"original": {
"owner": "lnl7",
"ref": "master",
"repo": "nix-darwin",
"type": "github"
}
},
"devshell": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1741473158,
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
"owner": "numtide",
"repo": "devshell",
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "devshell",
"type": "github"
}
},
"disko": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1753140376,
"narHash": "sha256-7lrVrE0jSvZHrxEzvnfHFE/Wkk9DDqb+mYCodI5uuB8=",
"owner": "nix-community",
"repo": "disko",
"rev": "545aba02960caa78a31bd9a8709a0ad4b6320a5c",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "disko",
"type": "github"
}
},
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": [
"lanzaboote",
"nixpkgs"
]
},
"locked": {
"lastModified": 1730504689,
"narHash": "sha256-hgmguH29K2fvs9szpq2r3pz2/8cJd2LPS+b4tfNFCwE=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "506278e768c2a08bec68eb62932193e341f55c90",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-registry": {
"flake": false,
"locked": {
"lastModified": 1744623129,
"narHash": "sha256-nlQTQrHqM+ywXN0evDXnYEV6z6WWZB5BFQ2TkXsduKw=",
"owner": "NixOS",
"repo": "flake-registry",
"rev": "1322f33d5836ae757d2e6190239252cf8402acf6",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "flake-registry",
"type": "github"
}
},
"flake-utils": {
"inputs": {
"systems": [
"systems"
]
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"lanzaboote",
"pre-commit-hooks-nix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1753470191,
"narHash": "sha256-hOUWU5L62G9sm8NxdiLWlLIJZz9H52VuFiDllHdwmVA=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "a1817d1c0e5eabe7dfdfe4caa46c94d9d8f3fdb6",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"homepage": {
"flake": false,
"locked": {
"lastModified": 1727338449,
"narHash": "sha256-VwOGtT1WB+isk0z/D/Be05GgeaTFfsXTGt7aScCAfec=",
"rev": "60398d3d728a0057b4cad49879ef637c06b28371",
"type": "tarball",
"url": "https://git.dadada.li/api/v1/repos/dadada/dadada.li/archive/60398d3d728a0057b4cad49879ef637c06b28371.tar.gz?rev=60398d3d728a0057b4cad49879ef637c06b28371"
},
"original": {
"type": "tarball",
"url": "https://git.dadada.li/dadada/dadada.li/archive/main.tar.gz"
}
},
"lanzaboote": {
"inputs": {
"crane": "crane",
"flake-compat": "flake-compat",
"flake-parts": "flake-parts",
"nixpkgs": [
"nixpkgs"
],
"pre-commit-hooks-nix": "pre-commit-hooks-nix",
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1737639419,
"narHash": "sha256-AEEDktApTEZ5PZXNDkry2YV2k6t0dTgLPEmAZbnigXU=",
"owner": "nix-community",
"repo": "lanzaboote",
"rev": "a65905a09e2c43ff63be8c0e86a93712361f871e",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "v0.4.2",
"repo": "lanzaboote",
"type": "github"
}
},
"nixlib": {
"locked": {
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixos-generators": {
"inputs": {
"nixlib": "nixlib",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1751903740,
"narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "032decf9db65efed428afd2fa39d80f7089085eb",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixos-generators",
"type": "github"
}
},
"nixos-hardware": {
"locked": {
"lastModified": 1753122741,
"narHash": "sha256-nFxE8lk9JvGelxClCmwuJYftbHqwnc01dRN4DVLUroM=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "cc66fddc6cb04ab479a1bb062f4d4da27c936a22",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "master",
"repo": "nixos-hardware",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1753429684,
"narHash": "sha256-9h7+4/53cSfQ/uA3pSvCaBepmZaz/dLlLVJnbQ+SJjk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "7fd36ee82c0275fb545775cc5e4d30542899511d",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1730741070,
"narHash": "sha256-edm8WG19kWozJ/GqyYx2VjW99EdhjKwbY3ZwdlPAAlo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "d063c1dd113c91ab27959ba540c0d9753409edf3",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.05",
"repo": "nixpkgs",
"type": "github"
}
},
"pre-commit-hooks-nix": {
"inputs": {
"flake-compat": [
"lanzaboote",
"flake-compat"
],
"gitignore": "gitignore",
"nixpkgs": [
"lanzaboote",
"nixpkgs"
],
"nixpkgs-stable": "nixpkgs-stable"
},
"locked": {
"lastModified": 1731363552,
"narHash": "sha256-vFta1uHnD29VUY4HJOO/D6p6rxyObnf+InnSMT4jlMU=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"rev": "cd1af27aa85026ac759d5d3fccf650abe7e1bbf0",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"type": "github"
}
},
"root": {
"inputs": {
"agenix": "agenix",
"devshell": "devshell",
"disko": "disko",
"flake-registry": "flake-registry",
"flake-utils": "flake-utils",
"home-manager": "home-manager",
"homepage": "homepage",
"lanzaboote": "lanzaboote",
"nixos-generators": "nixos-generators",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs",
"systems": "systems_2",
"treefmt-nix": "treefmt-nix"
}
},
"rust-overlay": {
"inputs": {
"nixpkgs": [
"lanzaboote",
"nixpkgs"
]
},
"locked": {
"lastModified": 1731897198,
"narHash": "sha256-Ou7vLETSKwmE/HRQz4cImXXJBr/k9gp4J4z/PF8LzTE=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "0be641045af6d8666c11c2c40e45ffc9667839b5",
"type": "github"
},
"original": {
"owner": "oxalica",
"repo": "rust-overlay",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1753439394,
"narHash": "sha256-Bv9h1AJegLI8uAhiJ1sZ4XAndYxhgf38tMgCQwiEpmc=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "2673921c03d6e75fdf4aa93e025772608d1482cf",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
}
},
"root": "root",
"version": 7
}

52
flake.nix Normal file
View file

@ -0,0 +1,52 @@
{
description = "dadada's nix flake";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
disko = {
url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs";
};
flake-utils = {
url = "github:numtide/flake-utils";
inputs.systems.follows = "systems";
};
home-manager = {
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs";
};
lanzaboote = {
url = "github:nix-community/lanzaboote/v0.4.2";
inputs.nixpkgs.follows = "nixpkgs";
};
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
homepage = {
url = "https://git.dadada.li/dadada/dadada.li/archive/main.tar.gz";
flake = false;
};
agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.home-manager.follows = "home-manager";
};
devshell = {
url = "github:numtide/devshell";
inputs.nixpkgs.follows = "nixpkgs";
};
nixos-generators = {
url = "github:nix-community/nixos-generators";
inputs.nixpkgs.follows = "nixpkgs";
};
flake-registry = {
url = "github:NixOS/flake-registry";
flake = false;
};
systems.url = "github:nix-systems/default";
treefmt-nix = {
url = "github:numtide/treefmt-nix";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = { ... }@args: import ./outputs.nix args;
}

209
home/dconf.nix Normal file
View file

@ -0,0 +1,209 @@
{ lib, pkgs, ... }:
with lib.hm.gvariant;
{
home.packages = [
pkgs.adwaita-icon-theme
pkgs.adwaita-qt
];
dconf.settings = with lib.hm.gvariant; {
"org/gnome/shell" = {
favorite-apps = [
"alacritty.desktop"
"element.desktop"
"evolution.desktop"
"firefox.desktop"
"spotify.desktop"
];
};
"org/gnome/shell" = {
disable-user-extensions = false;
enabled-extensions = [
"system-monitor@gnome-shell-extensions.gcampax.github.com"
"switcher@landau.fi"
];
};
"org/gnome/desktop/calendar" = {
show-weekdate = true;
};
"org/gnome/desktop/input-sources" = {
current = mkUint32 0;
per-window = false;
show-all-sources = true;
sources = [
(mkTuple [
"xkb"
"eu"
])
(mkTuple [
"xkb"
"de"
])
];
xkb-options = [
"lv3:ralt_switch"
"caps:escape"
];
};
"org/gnome/desktop/interface" = {
clock-show-date = true;
clock-show-seconds = false;
clock-show-weekday = true;
cursor-theme = "Adwaita";
enable-animations = true;
enable-hot-corners = false;
font-antialiasing = "grayscale";
font-hinting = "slight";
font-name = "Cantarell 10";
gtk-enable-primary-paste = false;
gtk-key-theme = "Emacs";
gtk-theme = "Adwaita";
color-scheme = "prefer-light";
icon-theme = "Adwaita";
locate-pointer = false;
monospace-font-name = "JetBrains Mono 10";
show-battery-percentage = false;
#text-scaling-factor = 1.0;
toolkit-accessibility = false;
};
"org/gnome/desktop/peripherals/keyboard" = {
numlock-state = false;
};
"org/gnome/desktop/peripherals/mouse" = {
accel-profile = "default";
natural-scroll = true;
};
"org/gnome/desktop/peripherals/touchpad" = {
send-events = "enabled";
tap-to-click = true;
two-finger-scrolling-enabled = true;
};
"org/gnome/desktop/privacy" = {
disable-microphone = false;
old-files-age = mkUint32 30;
recent-files-max-age = -1;
report-technical-problems = false;
};
"org/gnome/desktop/screensaver" = {
color-shading-type = "solid";
lock-delay = mkUint32 30;
lock-enabled = true;
};
"org/gnome/desktop/session" = {
idle-delay = mkUint32 0;
};
"org/gnome/desktop/sound" = {
event-sounds = false;
theme-name = "__custom";
};
"org/gnome/evince/default" = {
continuous = true;
dual-page = false;
dual-page-odd-left = false;
enable-spellchecking = true;
fullscreen = false;
inverted-colors = false;
show-sidebar = false;
sidebar-page = "links";
sidebar-size = 132;
sizing-mode = "free";
};
"org/gnome/evolution/calendar" = {
editor-show-timezone = true;
use-24hour-format = true;
week-start-day-name = "monday";
work-day-friday = true;
work-day-monday = true;
work-day-saturday = false;
work-day-sunday = false;
work-day-thursday = true;
work-day-tuesday = true;
work-day-wednesday = true;
};
"org/gnome/evolution/mail" = {
browser-close-on-reply-policy = "always";
composer-attribution-language = "de_DE";
composer-reply-start-bottom = false;
composer-signature-in-new-only = true;
composer-spell-languages = [
"de"
"en_US"
];
composer-top-signature = false;
composer-unicode-smileys = false;
composer-visually-wrap-long-lines = true;
composer-wrap-quoted-text-in-replies = false;
forward-style = 0;
forward-style-name = "attached";
headers-collapsed = false;
image-loading-policy = "never";
junk-check-custom-header = true;
junk-check-incoming = true;
junk-empty-on-exit-days = 0;
junk-lookup-addressbook = false;
notify-remote-content = true;
prompt-check-if-default-mailer = false;
prompt-on-composer-mode-switch = true;
prompt-on-empty-subject = true;
prompt-on-expunge = true;
prompt-on-mark-all-read = false;
prompt-on-mark-as-junk = true;
prompt-on-reply-close-browser = "always";
prompt-on-unwanted-html = true;
reply-style = 0;
reply-style-name = "quoted";
search-gravatar-for-photo = false;
};
"org/gnome/evolution/plugin/prefer-plain" = {
mode = "only_plain";
show-suppressed = true;
};
"org/gnome/gnome-screenshot" = {
border-effect = "none";
delay = 0;
include-border = true;
include-pointer = false;
last-save-directory = "file:///home/dadada/lib/pictures/Screenshots";
};
"org/gnome/mutter" = {
attach-modal-dialogs = true;
center-new-windows = true;
dynamic-workspaces = true;
edge-tiling = true;
experimental-features = [ ];
focus-change-on-pointer-rest = true;
overlay-key = "Super_L";
workspaces-only-on-primary = true;
};
"org/gnome/settings-daemon/plugins/power" = {
idle-dim = true;
power-button-action = "interactive";
power-saver-profile-on-low-battery = true;
sleep-inactive-ac-type = "blank";
sleep-inactive-battery-timeout = 600;
sleep-inactive-battery-type = "suspend";
};
"org/gnome/system/location" = {
enabled = false;
};
};
}

441
home/default.nix Normal file
View file

@ -0,0 +1,441 @@
{
pkgs,
lib,
...
}:
let
useFeatures = [
"alacritty"
#"emacs"
"direnv"
"git"
"gpg"
#"gtk"
#"keyring"
"syncthing"
"tmux"
"xdg"
"zsh"
"helix"
];
colors = {
background = "fdf6e3";
foreground = "657b83";
regular0 = "eee8d5"; # background darker
regular1 = "dc322f"; # red
regular2 = "859900"; # green
regular3 = "b58900"; # dark orange
regular4 = "268bd2"; # azure blue
regular5 = "d33682"; # hot pink
regular6 = "2aa198"; # petrol
regular7 = "073642"; # navy
bright0 = "cb4b16"; # orange
bright1 = "fdf6e3"; # foreground
bright2 = "93a1a1"; # grey
bright3 = "839496"; # slightly darker grey
bright4 = "657b83"; # even slightly darker grey
bright5 = "6c71c4"; # purple
bright6 = "586e75"; # pretty dark grey
bright7 = "002b36"; # dark navy blue
};
in
{
imports = [
./dconf.nix
];
home.stateVersion = "20.09";
programs.gpg.settings.default-key = "99658A3EB5CD7C13";
dadada.home =
lib.attrsets.genAttrs useFeatures (useFeatures: {
enable = true;
})
// {
session = {
enable = true;
sessionVars = {
EDITOR = "hx";
PAGER = "less";
MAILDIR = "\$HOME/.var/mail";
MBLAZE = "\$HOME/.config/mblaze";
NOTMUCH_CONFIG = "\$HOME/.config/notmuch/config";
};
};
};
# Languagetool server for web extension
systemd.user.services."languagetool-http-server" = {
Unit = {
Description = "Languagetool HTTP server";
PartOf = [ "graphical-session-pre.target" ];
After = [ "graphical-session.target" ];
};
Service = {
Type = "simple";
ExecStart = "${pkgs.languagetool}/bin/languagetool-http-server org.languagetool.server.HTTPServer --allow-origin '*'";
Restart = "always";
};
Install = {
WantedBy = [ "graphical-session.target" ];
};
};
programs.offlineimap.enable = false;
xdg.configFile."offlineimap/config".text = ''
[general]
accounts = tu-bs,mailbox
[Account tu-bs]
localrepository = tu-bs-local
remoterepository = tu-bs-remote
[Repository tu-bs-local]
type = Maildir
localfolders = ~/lib/backup/y0067212@tu-bs.de
[Repository tu-bs-remote]
type = IMAP
remotehost = mail.tu-braunschweig.de
remoteuser = y0067212
sslcacertfile = /etc/ssl/certs/ca-certificates.crt
[Account mailbox]
localrepository = mailbox-local
remoterepository = mailbox-remote
[Repository mailbox-local]
type = Maildir
localfolders = ~/lib/backup/mailbox.org
[Repository mailbox-remote]
type = IMAP
remotehost = imap.mailbox.org
remoteuser = dadada@dadada.li
sslcacertfile = /etc/ssl/certs/ca-certificates.crt
'';
home.file.".jjconfig.toml".source = ./jjconfig.toml;
systemd.user.timers."backup-keepassxc" = {
Unit.Description = "Backup password DB";
Timer = {
OnBootSec = "15min";
OnUnitActiveSec = "1d";
};
Install.WantedBy = [ "timers.target" ];
};
systemd.user.services."backup-keepassxc" = {
Unit.Description = "Backup password DB";
Unit.Type = "oneshot";
Service.ExecStart = "${pkgs.openssh}/bin/scp -P 23 -i /home/dadada/.ssh/keepassxc-backup /home/dadada/lib/sync/Personal.kdbx u355513-sub4@u355513-sub4.your-storagebox.de:Personal.kdbx";
Install.WantedBy = [ "multi-user.target" ];
};
systemd.user.timers."backup-keepassxc-ninurta" = {
Unit.Description = "Backup password DB to ninurta";
Timer = {
OnBootSec = "15min";
OnUnitActiveSec = "1d";
};
Install.WantedBy = [ "timers.target" ];
};
systemd.user.services."backup-keepassxc-ninurta" = {
Unit.Description = "Backup password DB to ninurta";
Unit.Type = "oneshot";
Service.ExecStart = "${pkgs.openssh}/bin/scp -P 22 -i /home/dadada/.ssh/keepassxc-backup /home/dadada/lib/sync/Personal.kdbx backup-keepassxc@ninurta.bs.dadada.li:/mnt/storage/backups/backup-keepassxc/Personal.kdbx";
Install.WantedBy = [ "multi-user.target" ];
};
programs.foot = {
enable = true;
server.enable = false;
settings = {
inherit colors;
main = {
shell = "tmux";
font = "Jetbrains Mono:size=8";
dpi-aware = false;
};
mouse.hide-when-typing = true;
csd.preferred = "none";
cursor.color = "fdf6e3 586e75";
bell = {
urgent = true;
visual = false;
};
};
};
home.file.".config/sway/config".text = with colors; ''
# Read `man 5 sway` for a complete reference.
### Variables
#
# Logo key. Use Mod1 for Alt.
set $mod Mod4
# Home row direction keys, like vim
set $left h
set $down j
set $up k
set $right l
# Your preferred terminal emulator
set $term foot
# Your preferred application launcher
# Note: pass the final command to swaymsg so that the resulting window can be opened
# on the original workspace that the command was run on.
set $menu fuzzel
set $wallpaper "~/lib/pictures/wallpaper.jpg"
### Idle configuration
#
# Example configuration:
#
exec swayidle -w \
timeout 300 'swaylock -f -i $wallpaper -s fill' \
timeout 600 'swaymsg "output * power off"' resume 'swaymsg "output * power on"' \
before-sleep 'swaylock -f -i $wallpaper -s fill'
#
# This will lock your screen after 300 seconds of inactivity, then turn off
# your displays after another 300 seconds, and turn your screens back on when
# resumed. It will also lock your screen before your computer goes to sleep.
input * {
xkb_layout eu
xkb_model pc105+inet
xkb_options caps:escape
drag_lock enabled
drag enabled
dwt enabled
tap enabled
tap_button_map lrm
natural_scroll enabled
}
### Key bindings
#
# Basics:
#
# Start a terminal
bindsym $mod+Return exec $term
# Kill focused window
bindsym $mod+Shift+q kill
# Start your launcher
bindsym $mod+d exec $menu
# Drag floating windows by holding down $mod and left mouse button.
# Resize them with right mouse button + $mod.
# Despite the name, also works for non-floating windows.
# Change normal to inverse to use left mouse button for resizing and right
# mouse button for dragging.
floating_modifier $mod normal
# Lock the screen
bindsym XF86Sleep exec 'swaylock -f -c ${background}'
bindsym $mod+End exec 'swaylock -f -c ${background}'
# Reload the configuration file
bindsym $mod+Shift+c reload
# Exit sway (logs you out of your Wayland session)
bindsym $mod+Shift+e exec swaynag -t warning -m 'You pressed the exit shortcut. Do you really want to exit sway? This will end your Wayland session.' -B 'Yes, exit sway' 'swaymsg exit'
# Brightness
bindsym --locked XF86MonBrightnessDown exec light -U 10
bindsym --locked XF86MonBrightnessUp exec light -A 10
# Volume
bindsym --locked XF86AudioRaiseVolume exec 'pactl set-sink-volume @DEFAULT_SINK@ +1%'
bindsym --locked XF86AudioLowerVolume exec 'pactl set-sink-volume @DEFAULT_SINK@ -1%'
bindsym --locked XF86AudioMute exec 'pactl set-sink-mute @DEFAULT_SINK@ toggle'
#
# Moving around:
#
# Move your focus around
bindsym $mod+$left focus left
bindsym $mod+$down focus down
bindsym $mod+$up focus up
bindsym $mod+$right focus right
# Or use $mod+[up|down|left|right]
bindsym $mod+Left focus left
bindsym $mod+Down focus down
bindsym $mod+Up focus up
bindsym $mod+Right focus right
# Move the focused window with the same, but add Shift
bindsym $mod+Shift+$left move left
bindsym $mod+Shift+$down move down
bindsym $mod+Shift+$up move up
bindsym $mod+Shift+$right move right
# Ditto, with arrow keys
bindsym $mod+Shift+Left move left
bindsym $mod+Shift+Down move down
bindsym $mod+Shift+Up move up
bindsym $mod+Shift+Right move right
#
# Workspaces:
#
# Switch to workspace
bindsym $mod+1 workspace number 1
bindsym $mod+2 workspace number 2
bindsym $mod+3 workspace number 3
bindsym $mod+4 workspace number 4
bindsym $mod+5 workspace number 5
bindsym $mod+6 workspace number 6
bindsym $mod+7 workspace number 7
bindsym $mod+8 workspace number 8
bindsym $mod+9 workspace number 9
bindsym $mod+0 workspace number 10
# Move focused container to workspace
bindsym $mod+Shift+1 move container to workspace number 1
bindsym $mod+Shift+2 move container to workspace number 2
bindsym $mod+Shift+3 move container to workspace number 3
bindsym $mod+Shift+4 move container to workspace number 4
bindsym $mod+Shift+5 move container to workspace number 5
bindsym $mod+Shift+6 move container to workspace number 6
bindsym $mod+Shift+7 move container to workspace number 7
bindsym $mod+Shift+8 move container to workspace number 8
bindsym $mod+Shift+9 move container to workspace number 9
bindsym $mod+Shift+0 move container to workspace number 10
# Note: workspaces can have any name you want, not just numbers.
# We just use 1-10 as the default.
#
# Layout stuff:
#
# You can "split" the current object of your focus with
# $mod+b or $mod+v, for horizontal and vertical splits
# respectively.
bindsym $mod+b splith
bindsym $mod+v splitv
# Switch the current container between different layout styles
bindsym $mod+s layout stacking
bindsym $mod+w layout tabbed
bindsym $mod+e layout toggle split
# Make the current focus fullscreen
bindsym $mod+f fullscreen
# Toggle the current focus between tiling and floating mode
bindsym $mod+Shift+space floating toggle
# Swap focus between the tiling area and the floating area
bindsym $mod+space focus mode_toggle
# Move focus to the parent container
bindsym $mod+a focus parent
#
# Font
#
font "pango:Jetbrains Mono 8"
#
# Scratchpad:
#
# Sway has a "scratchpad", which is a bag of holding for windows.
# You can send windows there and get them back later.
# Move the currently focused window to the scratchpad
bindsym $mod+Shift+minus move scratchpad
# Show the next scratchpad window or hide the focused scratchpad window.
# If there are multiple scratchpad windows, this command cycles through them.
bindsym $mod+minus scratchpad show
#
# Resizing containers:
#
mode "resize" {
# left will shrink the containers width
# right will grow the containers width
# up will shrink the containers height
# down will grow the containers height
bindsym $left resize shrink width 10px
bindsym $down resize grow height 10px
bindsym $up resize shrink height 10px
bindsym $right resize grow width 10px
# Ditto, with arrow keys
bindsym Left resize shrink width 10px
bindsym Down resize grow height 10px
bindsym Up resize shrink height 10px
bindsym Right resize grow width 10px
# Return to default mode
bindsym Return mode "default"
bindsym Escape mode "default"
}
bindsym $mod+r mode "resize"
#
# Status Bar:
#
# Read `man 5 sway-bar` for more information about this section.
bar {
position bottom
# When the status_command prints a new line to stdout, swaybar updates.
# The default just shows the current date and time.
status_command ~/.config/sway/status
colors {
statusline ${foreground}
background ${background}
inactive_workspace ${background}ee ${background}ee ${foreground}ee
}
}
# Gaps between multiple tiling windows
gaps inner 10
smart_gaps on
bindsym $mod+grave exec busctl --user call org.keepassxc.KeePassXC.MainWindow /keepassxc org.keepassxc.KeePassXC.MainWindow lockAllDatabases && swaylock -c #fdf6e3
# class border backgr. text indicator child_border
client.focused #${bright6} #${foreground} #${background} #${bright5} #${regular4}
client.focused_inactive #${regular0} #${regular0} #${foreground} #${bright5} #${regular0}
client.unfocused #${regular0} #${background} #${bright2} #${bright5} #${regular0}
client.urgent #${bright1} #${bright0} #${regular4} #${background} #${bright0}
client.placeholder #${background} #${bright2} #${foreground} #${background} #${bright2}
client.background #${foreground}
include /etc/sway/config.d/*
exec sleep 5; systemctl --user restart kanshi.service
exec sleep 5; swaymsg output '*' bg $wallpaper fill
'';
home.file.".config/sway/status".source = ./status;
home.file.".config/kanshi/config".text = ''
profile Laptop {
output eDP-1 enable
}
profile Docked {
output eDP-1 disable
output "LG Electronics LG HDR 4K 0x000354D1" {
enable
scale 1.4
position 0,0
}
}
'';
#services.poweralertd.enable = true;
# Let Home Manager install and manage itself.
programs.home-manager.enable = true;
home.packages = import ./pkgs.nix { pkgs = pkgs; };
}

8
home/jjconfig.toml Normal file
View file

@ -0,0 +1,8 @@
[user]
name = "Tim Schubert"
email = "dadada@dadada.li"
[ui]
diff-editor = ["scm-diff-editor", "--dir-diff", "$left", "$right"]
diff-instructions = false
merge-editor = ["meld"]

13
home/modules.nix Normal file
View file

@ -0,0 +1,13 @@
{ lib, ... }:
with lib;
let
modules' =
dir:
filterAttrs (name: type: (hasSuffix ".nix" name) || (type == "directory")) (builtins.readDir dir);
modules =
dir:
mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}"))) (
modules' dir
);
in
(modules ./modules)

View file

@ -0,0 +1,28 @@
# Colors (Solarized Light)
# Default colors
[colors.primary]
background = '#fdf6e3'
foreground = '#586e75'
# Normal colors
[colors.normal]
black = '#073642'
red = '#dc322f'
green = '#859900'
yellow = '#b58900'
blue = '#268bd2'
magenta = '#d33682'
cyan = '#2aa198'
white = '#eee8d5'
# Bright colors
[colors.bright]
black = '#002b36'
red = '#cb4b16'
green = '#586e75'
yellow = '#657b83'
blue = '#839496'
magenta = '#6c71c4'
cyan = '#93a1a1'
white = '#fdf6e3'

View file

@ -0,0 +1,49 @@
{
pkgs,
lib,
config,
...
}:
with lib;
let
cfg = config.dadada.home.alacritty;
in
{
options.dadada.home.alacritty = {
enable = mkEnableOption "Enable alacritty config";
};
config = mkIf cfg.enable {
home.packages = [
pkgs.jetbrains-mono
];
programs.alacritty = {
enable = true;
settings = {
env.TERM = "xterm-256color";
scrolling.history = 0;
font = {
size = 9;
normal = {
family = "Jetbrains Mono";
style = "Regular";
};
bold = {
family = "Jetbrains Mono";
style = "Bold";
};
italic = {
family = "Jetbrains Mono";
style = "Italic";
};
bold_italic = {
family = "Jetbrains Mono";
style = "Bold Italic";
};
};
shell.program = "tmux";
window.decorations = "none";
colors = (lib.trivial.importTOML ./colors.toml).colors;
};
};
};
}

View file

@ -1,4 +1,8 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
{
options.dadada.home.colors = mkOption {
@ -13,21 +17,21 @@ with lib;
cursor = "#e8e8e8";
cursorForeground = "#1f2022";
background = "#292b2e";
color0 = "#1f2022";
color8 = "#585858";
color7 = "#a3a3a3";
color0 = "#1f2022";
color8 = "#585858";
color7 = "#a3a3a3";
color15 = "#f8f8f8";
color1 = "#f2241f";
color9 = "#f2241f";
color2 = "#67b11d";
color1 = "#f2241f";
color9 = "#f2241f";
color2 = "#67b11d";
color10 = "#67b11d";
color3 = "#b1951d";
color3 = "#b1951d";
color11 = "#b1951d";
color4 = "#4f97d7";
color4 = "#4f97d7";
color12 = "#4f97d7";
color5 = "#a31db1";
color5 = "#a31db1";
color13 = "#a31db1";
color6 = "#2d9574";
color6 = "#2d9574";
color14 = "#2d9574";
color16 = "#ffa500";
color17 = "#b03060";

View file

@ -1,4 +1,9 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.direnv;
@ -11,7 +16,7 @@ in
programs.direnv = {
enable = true;
enableZshIntegration = true;
enableNixDirenvIntegration = true;
nix-direnv.enable = true;
};
};
}

107
home/modules/git.nix Normal file
View file

@ -0,0 +1,107 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.dadada.home.git;
allowedSigners = pkgs.writeTextFile {
name = "allowed-signers";
text = ''
dadada@dadada.li sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIKu+pA5Vy0QPHJMjn2S5DCsqKg2UvDhOsBwvvJLf4HbyAAAABHNzaDo= dadada <dadada@dadada.li>
dadada@dadada.li ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFKRuecjbtDh4jyDZH3ccU9t0QFcAgZDBFO8ZWZBA9iT dadada@gorgon
'';
};
in
{
options.dadada.home.git = {
enable = mkEnableOption "Enable git config";
};
config = mkIf cfg.enable {
programs.git = {
enable = true;
extraConfig = {
commit = {
gpgSign = true;
verbose = true;
};
gpg = {
format = "ssh";
ssh.allowedSignersFile = "${allowedSigners}";
ssh.program = "ssh-keygen";
};
tag.gpgSign = true;
user = {
email = "dadada@dadada.li";
name = "Tim Schubert";
signingKey = "key::ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFKRuecjbtDh4jyDZH3ccU9t0QFcAgZDBFO8ZWZBA9iT dadada@gorgon";
};
core = {
whitespace = {
tab-in-indent = true;
tabwidth = 4;
};
alias = { };
pager = "delta";
};
column.ui = "never";
checkout.defaultRemote = "origin";
delta = {
navigate = true; # use n and N to move between diff sections
side-by-side = false;
line-numbers = true;
light = true;
};
diff = {
renames = "copies";
algorithm = "histogram";
colorMoved = "default";
};
interactive.diffFilter = "delta --color-only";
merge = {
conflictstyle = "zdiff3";
keepbackup = false;
tool = "meld";
};
status = {
short = true;
branch = true;
showUntrackedFiled = "all";
};
log.date = "iso8601-local";
fetch.prune = true;
pull = {
prune = true;
ff = "only";
rebase = "interactive";
};
push = {
default = "current";
autoSetupRemote = true;
};
rebase = {
abbreviateCommands = true;
# Automatically force-update any branches that point to commits that are being rebased.
updateRefs = true;
};
rerere.enabled = true;
transfer.fsckobjects = true;
fetch.fsckobjects = true;
receive.fsckObjects = true;
branch.sort = "-committerdate";
};
};
home.packages = with pkgs; [
delta
git-branchless
git-lfs
gitAndTools.hub
gitAndTools.lab
gitAndTools.git-absorb
meld
];
};
}

View file

@ -1,8 +1,13 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.gpg;
in {
in
{
options.dadada.home.gpg = {
enable = mkEnableOption "Enable GnuPG config";
};
@ -24,11 +29,6 @@ in {
enable = true;
defaultCacheTtl = 1800;
enableSshSupport = false;
pinentryFlavor = "gnome3";
};
programs.git.extraConfig = {
commit = { gpgSign = true; };
};
};
}

20
home/modules/gtk.nix Normal file
View file

@ -0,0 +1,20 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.dadada.home.gtk;
in
{
options.dadada.home.gtk = {
enable = mkEnableOption "Enable GTK config";
};
config = mkIf cfg.enable {
gtk = {
enable = true;
};
};
}

View file

@ -0,0 +1,12 @@
theme = "solarized_light"
[editor]
line-number = "relative"
mouse = true
auto-completion = true
[editor.soft-wrap]
enable = true
[keys.normal]
C-q = [ ":reflow 80" ]

View file

@ -0,0 +1,35 @@
[language-server.rust-analyzer]
config = { rust-analyzer = { checkOnSave = { command = "clippy" }, procMacro.enable = true } }
[language-server.nixd]
command = "nixd"
[language-server.ltex-ls]
command = "ltex-ls"
[language-server.zk]
command = "zk"
args = ["lsp"]
[[language]]
name = "rust"
language-servers = [ {name="rust-analyzer"} ]
[[language]]
name = "latex"
language-servers = [{ name = "ltex-ls" }]
file-types = ["tex"]
scope = "source.latex"
roots = []
[[language]]
name = "nix"
file-types = ["nix"]
language-servers = [{ name = "nixd" }]
[[language]]
name = "markdown"
scope = "source.md"
injection-regex = "md|markdown"
file-types = ["md", "markdown"]
roots = [".zk"]

View file

@ -0,0 +1,27 @@
{
config,
pkgs,
lib,
...
}:
let
cfg = config.dadada.home.helix;
in
{
options.dadada.home.helix = {
enable = lib.mkEnableOption "Enable helix editor";
package = lib.mkOption {
type = lib.types.package;
description = "Helix editor package to use";
default = pkgs.helix;
};
};
config = lib.mkIf cfg.enable {
home.file.".config/helix".source = ./config;
home.packages = [
cfg.package
#pkgs.nixd
];
};
}

View file

@ -1,15 +1,20 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.keyring;
in {
in
{
options.dadada.home.keyring = {
enable = mkEnableOption "Enable keyring config";
};
config = mkIf cfg.enable {
services.gnome-keyring = {
enable = false;
components = [ "pkcs11" "secrets" ];
components = [ "secrets" ];
};
};
}

View file

@ -1,16 +1,21 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.session;
in {
in
{
options.dadada.home.session = {
enable = mkEnableOption "Enable session variable management";
sessionVars = mkOption {
description = "Session variables";
type = types.attrs;
default = {};
default = { };
example = ''
EDITOR = "vim";
EDITOR = "hx";
PAGER = "less";
'';
};

View file

@ -1,8 +1,13 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.ssh;
in {
in
{
options.dadada.home.ssh = {
enable = mkEnableOption "Enable SSH config";
};

View file

@ -1,8 +1,14 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.syncthing;
in {
in
{
options.dadada.home.syncthing = {
enable = mkEnableOption "Enable Syncthing config";
};

34
home/modules/tmux.nix Normal file
View file

@ -0,0 +1,34 @@
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.tmux;
in
{
options.dadada.home.tmux = {
enable = mkEnableOption "Enable tmux config";
};
config = mkIf cfg.enable {
programs.tmux = {
enable = true;
terminal = "tmux-256color";
extraConfig = ''
setw -g mode-keys vi
set -g mouse on
set -g set-clipboard external
set -g set-titles on
set -g status on
set -ga terminal-overrides ',*256col*:Tc'
set-option -g status-interval 5
set-option -g automatic-rename on
set-option -g automatic-rename-format '#{b:pane_current_path}'
bind '"' split-window -c "#{pane_current_path}"
bind % split-window -h -c "#{pane_current_path}"
bind c new-window -c "#{pane_current_path}"
'';
};
};
}

View file

@ -1,9 +1,14 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
apps = {
"x-scheme-handler/mailto" = "userapp-Thunderbird-PB7NI0.desktop";
"message/rfc822" = "userapp-Thunderbird-PB7NI0.desktop";
"x-scheme-handler/mailto" = "evolution.desktop";
"message/rfc822" = "evolution.desktop";
"x-scheme-handler/http" = "firefox.desktop";
"x-scheme-handler/https" = "firefox.desktop";
"x-scheme-handler/ftp" = "firefox.desktop";
@ -15,35 +20,36 @@ let
"application/xhtml+xml" = "firefox.desktop";
"application/x-extension-xhtml" = "firefox.desktop";
"application/x-extension-xht" = "firefox.desktop";
"text/plain" = "vim.desktop";
"application/pdf" = "org.pwmt.zathura.desktop";
"application/pdf" = "evince.desktop";
};
cfg = config.dadada.home.xdg;
in {
in
{
options.dadada.home.xdg = {
enable = mkEnableOption "Enable XDG config";
};
config = mkIf cfg.enable {
xdg = {
enable = true;
configHome = "${config.home.homeDirectory}/.config";
mimeApps = {
enable = false;
associations.added = apps;
defaultApplications = apps;
};
userDirs = {
download ="\$HOME/tmp";
desktop = "\$HOME/.desktop";
download = "\$HOME/tmp";
music = "\$HOME/lib/music";
videos ="\$HOME/lib/videos";
videos = "\$HOME/lib/videos";
pictures = "\$HOME/lib/pictures";
documents = "\$HOME/lib";
desktop = "$HOME/tmp";
};
};
home.packages = with pkgs; [
firefox-bin
xdg_utils
zathura
evince
firefox
xdg-utils
];
};
}

83
home/modules/zsh.nix Normal file
View file

@ -0,0 +1,83 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.home.zsh;
in
{
options.dadada.home.zsh = {
enable = mkEnableOption "Enable ZSH config";
};
config = mkIf cfg.enable {
programs.fzf.enableZshIntegration = true;
programs.zsh = {
enable = true;
enableCompletion = true;
enableVteIntegration = true;
autosuggestion.enable = true;
autocd = true;
sessionVariables = {
EDITOR = "hx";
};
history = {
extended = true;
ignoreDups = true;
ignoreSpace = true;
save = 100000;
# FIXME https://github.com/junegunn/fzf/issues/4061
#share = true;
share = false;
};
plugins = [
];
initContent = ''
source ${pkgs.zsh-git-prompt}/share/zsh-git-prompt/zshrc.sh
source ${pkgs.fzf}/share/fzf/key-bindings.zsh
source ${pkgs.fzf}/share/fzf/completion.zsh
eval "$(${pkgs.h}/bin/h --setup ~/src)"
bindkey -e '^n' autosuggest-accept
preexec() { echo -n -e "\033]0;$1\007" }
PROMPT="%F{red}%?%f %F{green}%m%f:%F{blue}%~%f"$'\n'"> "
RPROMPT='$(git_super_status)'
'';
profileExtra = '''';
shellAliases = {
ga = "git add";
gc = "git commit";
gd = "git diff";
gdw = "git diff --color-words";
gf = "git fetch";
gl = "git log";
gpu = "git push";
gpul = "git pull";
grb = "git rebase";
gre = "git reflog";
gs = "git status";
gsh = "git show";
gst = "git status";
gsta = "git stash";
gstap = "git stash apply";
exa = "eza";
ls = "exa";
la = "exa -a";
ll = "exa -la --no-filesize --changed --time-style=long-iso --git --octal-permissions --no-permissions --no-user --ignore-glob=\".git\"";
mv = "mv -i";
cp = "cp -i";
};
};
home.packages = with pkgs; [
fzf
eza
zsh-git-prompt
tmux
];
};
}

151
home/pkgs.nix Normal file
View file

@ -0,0 +1,151 @@
{ pkgs }:
with pkgs;
[
anki
aqbanking
aria2
aspell
aspellDicts.de
aspellDicts.en
aspellDicts.en-computers
aspellDicts.en-science
bash
bat # cat with syntax highlighting and git integration
binutils
bluez-tools
btop # htop
choose # alternative to cut and awk with more readable syntax
chromium
colordiff
darcs
delta # feature-rich diff viewer
dig
direnv
duf # disk usage
dune3d
dyff # diff tool for YAML
element-desktop
evince
evolution
ffmpeg
file
fuzzel
fx # themable json viewer
fzf
fzf
gdb
gh
ghidra-bin
gimp
glow
glow # render markdown
gnumake
gnupg
gping # ping with graphs
graphviz
grim
gron # make json grepable
h # Manage git repos
hexyl # hex viewer
htop
httpie
hub
hyperfine # A command-line benchmarking tool.
icdiff
imagemagick
inkscape
inotify-tools
ioping # ping but for block devices
iproute2
iputils # tracepath
irssi
jameica
jc # convert output to json
josm
jq
kanshi
keepassxc
kubetail
krita
ldns
liboping # oping, ping multiple hosts at once
libreoffice
libvirt
lsof
lynis
man-pages
mblaze
mkpasswd
mpv
mtr
mumble
nix-output-monitor
ncurses
newsflash
nixd
nixfmt-rfc-style
nfs-utils
niv
nix-index
nmap
nmon
nodePackages.prettier
map-cmd
obs-studio
offlineimap
openscad
openssl
p7zip
pandoc # document converter and templater
pass
pavucontrol
picocom
playerctl
procs # ps in rust
prusa-slicer
pv
pwgen
(python3.withPackages (pkgs: [
pkgs.pandas
pkgs.requests
]))
ranger
reptyr
ripgrep
ripgrep
saleae-logic-2
sd # search and displace like sed but with better syntax
sieveshell
signal-desktop
silver-searcher
skim # fzf in Rust
slurp
socat
solvespace
spotify
sqlite
sshfs-fuse
taplo
tcpdump
tdesktop
thunderbird
tmux
ttyd
unzip
usbutils
vegur
virt-manager
viu # view images from the terminal
vscodium
whois
wireshark
xdg-utils
xmlstarlet
unixtools.xxd
xxh # portable shells
yt-dlp
# zotero Marked as insecure
zeal
zk
zsh
]

138
home/status Executable file
View file

@ -0,0 +1,138 @@
#!/usr/bin/env python3
import json
import sys
import time
import requests
import logging
import subprocess
from datetime import datetime
logger = logging.getLogger(__name__)
class Status:
def status(self):
return None
class Cat(Status):
index = 0
def status(self):
cat_width = 200
index = self.index
catwalk = "🐈🏳️‍🌈" + " " * index
self.index = (index + 1) % cat_width
return {"full_text": catwalk}
class Space(Status):
backoff = 0
c_status = None
def status(self):
backoff = self.backoff
if self.backoff == 0:
self.update()
return {"full_text": self.c_status}
def update(self):
spacestatus_url = "https://status.stratum0.org/status.json"
resp = requests.get(url=spacestatus_url)
self.backoff = (self.backoff + 1) % 120
data = resp.json()
if data["isOpen"]:
since = datetime.strptime(data["since"], "%Y-%m-%dT%H:%M:%S.%f").strftime("%A at %H:%M")
spacestatus = f"Space is open since {since}"
else:
spacestatus = "Space is closed"
self.c_status = spacestatus
class Battery(Status):
capacity_file = open('/sys/class/power_supply/BAT0/capacity', 'r')
status_file = open('/sys/class/power_supply/BAT0/status', 'r')
def status(self):
self.status_file.seek(0)
status = self.status_file.read().rstrip()
self.capacity_file.seek(0)
capacity = self.capacity_file.read().rstrip()
battery = f"{status} {capacity}%"
return {"full_text": battery}
class Time(Status):
def status(self):
now = datetime.now()
match now.isocalendar().week % 10:
case 1:
th = "st"
case 2:
th = "nd"
case 3:
th = "rd"
case _:
th = "th"
return {"full_text": now.strftime(f"%V{th} %A %H:%M") }
class FailedUnits(Status):
def status(self):
proc = subprocess.run(["systemctl", "list-units", "--failed"], capture_output = True)
stdout = proc.stdout.decode('utf-8')
failed = 0
for line in stdout:
if 'failed' in line:
failed += 1
if failed == 0:
return {"full_text": f"No failed units"}
else:
return {"full_text": f"There are {failed} failed units", "color": "#ff0000"}
def print_header():
header = {
"version": 1,
"click_events": False,
}
print(json.dumps(header))
print("[")
def run(interval, widgets):
print_header()
while True:
body = []
for widget in widgets:
try:
status = widget.status()
except Exception as e:
logger.error(e)
if status:
body += status,
print(json.dumps(body), ",", flush=True)
ts = interval - (time.time() % interval)
time.sleep(ts)
if __name__ == "__main__":
logging.basicConfig(level=logging.INFO)
# Interval in seconds
interval = 1.0
widgets = [Cat(), FailedUnits(), Space(), Battery(), Time()]
run(interval, widgets)

View file

@ -1,5 +0,0 @@
{
ifrit = ./ifrit;
gorgon = ./gorgon;
surgat = ./surgat;
}

View file

@ -1,124 +0,0 @@
{ config, pkgs, lib, ... }:
let
this = import ../.. { inherit pkgs; };
nixos-hardware = buildins.fetchTarball {
url = "https://github.com/NixOS/nixos-hardware/archive/c242378e63b0ec334e964ac0c0fbbdd2b3e89ebf.tar.gz";
sha256 = "1z4cr5gsyfdpcy31vqg4ikalbxmnnac6jjk1nl8mxj0h0ix7pp36";
};
in
{
imports = (lib.attrValues this.modules) ++ [
../../modules/profiles/laptop
"${nixos-hardware}/lenovo/thinkpad/t14s"
];
boot.kernelModules = [ "kvm-amd" ];
virtualisation = {
libvirtd.enable = true;
docker.enable = false;
};
networking.hostName = "gorgon";
dadada = {
admin.enable = false;
steam.enable = true;
fido2 = {
credential = "04ea2813a116f634e90f9728dbbb45f1c0f93b7811941a5a14fb75e711794df0c26552dae2262619c1da2be7562ec9dd94888c71a9326fea70dfe16214b5ea8ec01473070000";
enablePam = true;
};
luks.uuid = "3d0e5b93-90ca-412a-b4e0-3e6bfa47d3f4";
networking = {
wanInterfaces = [ "enp2s0f0" "wlp3s0" ];
enableBsShare = true;
vpnExtension = "3";
};
};
boot.kernel.sysctl = {
"vm.swappiness" = 90;
};
# Use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
programs.adb.enable = true;
services.fstrim.enable = true;
# Enable CUPS to print documents.
services.printing = {
enable = true;
browsing = true;
drivers = with pkgs; [
hplip
brlaser
brgenml1lpr
brgenml1cupswrapper
];
};
hardware = {
bluetooth.enable = true;
pulseaudio = {
enable = true;
extraModules = [ pkgs.pulseaudio-modules-bt ];
extraConfig = ''
set-source-volume 1 10000
'';
package = pkgs.pulseaudioFull;
};
};
services.avahi.enable = true;
networking.firewall = {
enable = true;
allowedTCPPorts = [
22000 # Syncthing
];
allowedUDPPorts = [
21027 # Syncthing
];
};
services.xserver.enable = true;
services.xserver.displayManager.gdm.enable = true;
services.xserver.desktopManager.gnome3.enable = true;
xdg.mime.enable = true;
users.users = {
dadada = {
isNormalUser = true;
extraGroups = [ "wheel" "networkmanager" "libvirtd" "adbusers" "kvm" "video" "scanner" "lp" "docker" ];
shell = "/run/current-system/sw/bin/zsh";
initialHashedPassword = "nopass";
};
"tim.schubert" = {
isNormalUser = true;
extraGroups = [ "networkmanager" "libvirtd" "adbusers" "kvm" "video" "scanner" "lp" "docker" ];
shell = "/run/current-system/sw/bin/zsh";
initialHashedPassword = "nopass";
};
};
networking.hosts = {
"fd42:dead:beef:0:5054:ff:fefb:7361" = [
"media.dadada.li"
"ifrit.dadada.li"
];
"192.168.42.103" = [
"media.dadada.li"
"ifrit.dadada.li"
];
"fd42:dead:beef::5054:ff:fe8b:58df" = [ "iot.dadada.li" ];
"fd42:dead:beef::20d:b9ff:fe4c:c9ac" = [ "agares.dadada.li" ];
"192.168.42.15" = [ "agares.dadada.li" "agares" ];
"192.168.42.11" = [ "wohnzimmerpi.dadada.li" "wohnzimmerpi" ];
"10.1.2.9" = [ "fgprinter.fginfo.tu-bs.de" ];
};
}

View file

@ -1,43 +0,0 @@
{ config, pkgs, lib, ... }:
let
this = import ../../.. { inherit pkgs; };
in
{
nixpkgs.overlays = [
this.overlays.tubslatex
];
imports = lib.attrValues this.hmModules;
dadada.home = {
vim.enable = true;
direnv.enable = true;
git.enable = true;
gpg.enable = true;
gtk.enable = true;
keyring.enable = true;
kitty.enable = true;
ssh.enable = true;
syncthing.enable = true;
tmux.enable = true;
xdg.enable = true;
zsh.enable = true;
session = {
enable = true;
sessionVars = {
EDITOR = "vim";
PAGER = "less";
MAILDIR = "\$HOME/.var/mail";
MBLAZE = "\$HOME/.config/mblaze";
NOTMUCH_CONFIG = "\$HOME/.config/notmuch/config";
MOZ_ENABLE_WAYLAND= "1";
};
};
};
# Let Home Manager install and manage itself.
programs.home-manager.enable = true;
home.packages = import ./pkgs.nix { pkgs = pkgs; };
}

View file

@ -1,85 +0,0 @@
{ pkgs }:
with pkgs; [
android-studio
anki
aspell
aspellDicts.de
aspellDicts.en
aspellDicts.en-computers
aspellDicts.en-science
aqbanking
bluez-tools
chromium
clang
clang-tools
darcs
direnv
element-desktop
evince
ffmpeg
file
firefox-bin
fractal
fzf
gimp
git-lfs
gitAndTools.hub
gnome3.gnome-tweak-tool
gnome3.nautilus
gnome3.vinagre
gnucash
gnumake
gnupg
graphviz
grim
imagemagick
inkscape
inotify-tools
irssi
jameica
jq
kcachegrind
keepassxc
#keys
kitty
ldns
libreoffice
libvirt
lsof
mblaze
mkpasswd
mpv
mumble
ncurses
nfs-utils
niv
nmap
openssl
p7zip
pass
pavucontrol
pinentry-gnome
playerctl
pwgen
python27Packages.dbus-python
python3
python38Packages.dateutil
python38Packages.managesieve
python38Packages.solo-python
signal-desktop
slurp
sqlite
sshfs-fuse
steam
tcpdump
tdesktop
tubslatex
thunderbird-bin
unzip
usbutils
virtmanager
whois
wireshark
xdg_utils
youtube-dl
]

View file

@ -1,148 +0,0 @@
{ config, pkgs, lib, ... }:
let
hostAliases = [
"ifrit.dadada.li"
"bs.vpn.dadada.li"
"media.dadada.li"
"media.local"
];
backups = "/mnt/storage/backup";
in {
imports = [
../../modules/profiles/base
];
dadada = {
admin.enable = true;
fileShare.enable = true;
vpnServer.enable = true;
vpnServer.peers = {
"metis" = {
id = "1";
key = "u+HCYDbK0zwbIEfGf+LVQErlJ0vchf5ZYj0N93NB5ns=";
};
"morax" = {
id = "2";
key = "Lq5QLGoI3r3BXEJ72dWH9UTmY/8uaYRPLQB5WWHqJUE=";
};
"gorgon" = {
id = "3";
key = "0eWP1hzkyoXlrjPSOq+6Y1u8tnFH+SejBJs8f8lf+iU=";
};
"surgat" = {
id = "4";
key = "+paiOqOITdLy3oqoI2DhOj4k8gncAcjFLkJrxJl0iBE=";
};
};
};
services.borgbackup.repos = {
"metis" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDnc1gCi8lbhlLmPKvaExtCxVaAni8RrOuHUQO6wTbzR root@metis" ];
authorizedKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyTgdVPPxQeL5KZo9frZQlDIv2QkelJw3gNGoGtUMfw tim@metis" ];
path = "${backups}/metis";
quota = "1T";
};
"gorgon" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP6p9b2D7y2W+9BGee2yk2xsCRewNNaE6oS3CqlW61ti root@gorgon" ];
authorizedKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyTgdVPPxQeL5KZo9frZQlDIv2QkelJw3gNGoGtUMfw tim@metis" ];
path = "${backups}/gorgon";
quota = "1T";
};
"surgat" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGhatanrNG+M6jAkU7Yi44mJmTreJkqyZ6Z+qiEgV7O root@surgat" ];
authorizedKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyTgdVPPxQeL5KZo9frZQlDIv2QkelJw3gNGoGtUMfw tim@metis" ];
path = "${backups}/surgat";
quota = "100G";
};
"wohnzimmerpi" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK6uZ8mPQJWOL984gZKKPyxp7VLcxk42TpTh5iPP6N6k root@wohnzimmerpi" ];
authorizedKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyTgdVPPxQeL5KZo9frZQlDIv2QkelJw3gNGoGtUMfw tim@metis" ];
path = "${backups}/wohnzimmerpi";
quota = "50G";
};
};
networking.hostName = "ifrit";
networking.domain = "dadada.li";
networking.hosts = {
"127.0.0.1" = hostAliases;
"::1" = hostAliases;
};
networking.nameservers = [
"1.1.1.1"
"1.0.0.1"
];
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/sda";
i18n.defaultLocale = "en_US.UTF-8";
console = {
font = "Lat2-Terminus16";
keyMap = "us";
};
networking.useDHCP = false;
networking.interfaces.ens3.useDHCP = true;
fileSystems."/mnt/storage" = {
device = "/dev/disk/by-uuid/a34e36fc-d7dd-4ceb-93c4-48f9c2727cb7";
mountPoint = "/mnt/storage";
neededForBoot = false;
options = [ "nofail" ];
};
networking.firewall = {
enable = true;
allowPing = true;
allowedTCPPorts = [
22 # SSH
80 443 # HTTP(S)
111 2049 # NFS
137 138 139 445 # SMB
];
allowedUDPPorts = [
137 138 139 445 # SMB
111 2049 # NFS
51234 # Wireguard
];
};
security.acme = {
email = "d553a78d-0349-48db-9c20-5b27af3a1dfc@dadada.li";
acceptTerms = true;
# certs."webchat.dadada.li" = {
# credentialsFile = "/var/lib/lego/acme-joker.env";
# dnsProvider = "joker";
# postRun = "systemctl reload nginx.service";
# };
# certs."weechat.dadada.li" = {
# credentialsFile = "/var/lib/lego/acme-joker.env";
# dnsProvider = "joker";
# postRun = "systemctl reload nginx.service";
# };
};
users.users."mist" = {
isNormalUser = true;
};
services.avahi = {
enable = false;
publish = {
enable = true;
addresses = true;
workstation = false;
};
};
}

View file

@ -1,86 +0,0 @@
{ config, pkgs, lib, ... }:
let
hostName = "surgat";
this = import ../.. { inherit pkgs; };
in {
imports = [ this.profiles.base ];
networking.hostName = hostName;
services.nginx = {
recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedGzipSettings = true;
logError = "/dev/null";
appendHttpConfig = ''
access_log off;
'';
};
dadada.admin = {
enable = true;
users = {
"dadada" = [ "${pkgs.dadadaKeys}/dadada.pub" ];
};
};
dadada.element.enable = true;
dadada.networking.vpnExtension = "4";
dadada.weechat.enable = true;
dadada.homePage.enable = true;
dadada.share.enable = true;
dadada.backupClient = {
enable = true;
bs = true;
};
networking.useDHCP = false;
networking.interfaces.ens3.useDHCP = true;
networking.firewall = {
enable = true;
allowPing = true;
allowedTCPPorts = [
22 # SSH
80 443 # HTTPS
];
allowedUDPPorts = [
51234 # Wireguard
];
};
security.acme = {
email = "d553a78d-0349-48db-9c20-5b27af3a1dfc@dadada.li";
acceptTerms = true;
};
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/sda";
networking.interfaces."ens3".ipv6.addresses = [ {
address = "2a01:4f8:c17:1d70::";
prefixLength = 64;
} ];
networking.defaultGateway6 = {
address = "fe80::1";
interface = "ens3";
};
#boot.initrd.network.ssh = {
# enable = true;
# port = 22;
# authorizedKeys = "${keys}/dadada.pub";
# hostKeys = [
# ];
#};
swapDevices = [
{
device = "/var/swapfile";
size = 4096;
}
];
}

View file

@ -1,5 +0,0 @@
{ pkgs }:
with pkgs.lib; {
# TODO
}

View file

@ -1,57 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.dadada.admin;
in {
options.dadada.admin = {
enable = mkEnableOption "Enable admin access";
users = mkOption {
type = with types; attrsOf (listOf path);
default = [];
description = ''
List of admin users with root access to all the machine.
'';
example = literalExample "\"user1\" = [ /path/to/key1 /path/to/key2 ]";
};
rat = mkOption {
type = types.bool;
default = false;
description = ''
Enable NAT and firewall traversal for SSH via tor hidden service
'';
};
};
config = mkIf cfg.enable {
services.sshd.enable = true;
services.openssh.passwordAuthentication = false;
security.sudo.wheelNeedsPassword = false;
users.mutableUsers = false;
users.users = mapAttrs (user: keys: (
{
extraGroups = [ "wheel" ];
isNormalUser = true;
openssh.authorizedKeys.keyFiles = keys;
})) cfg.users;
networking.firewall.allowedTCPPorts = [ 22 ];
environment.systemPackages = with pkgs; [
vim
tmux
];
services.tor.hiddenServices = {
"rat" = mkIf cfg.rat.enable {
name = "rat";
map = [ { port = 22; } ];
};
};
};
}

View file

@ -1,82 +0,0 @@
{ config, pkgs, lib, ...}:
with lib;
let
backupExcludes = [
"/backup"
"/dev"
"/efi"
"/home/*/.cache"
"/home/*/.config/Riot/Cache"
"/home/iserv"
"/lost+found"
"/mnt"
"/nix"
"/proc"
"/run"
"/sys"
"/tmp"
"/var/cache"
"/var/log"
"/var/tmp"
];
cfg = config.dadada.backupClient;
in {
options.dadada.backupClient = {
enable = mkEnableOption "Enable backup client";
gs = mkEnableOption "Enable backup to GS location";
bs = mkEnableOption "Enable backup to BS location";
};
config = mkIf cfg.enable {
fileSystems = mkIf cfg.gs {
"/backup" = {
device = "/dev/disk/by-uuid/0fdab735-cc3e-493a-b4ec-cbf6a77d48d5";
fsType = "ext4";
options = [ "x-systemd.automount" "noauto" "x-systemd.idle-timeout=600" ];
};
};
services.borgbackup.jobs.gs = mkIf cfg.gs {
paths = "/";
exclude = backupExcludes;
repo = "/backup/${config.networking.hostName}";
doInit = false;
encryption = {
mode = "repokey";
passCommand = "cat /var/lib/borgbackup/gs/passphrase";
};
compression = "auto,lz4";
prune.keep = {
within = "1d"; # Keep all archives from the last day
daily = 7;
weekly = 2;
monthly = -1; # Keep at least one archive for each month
yearly = -1; # Keep at least one archive for each year
};
startAt = "monthly";
};
networking.hosts = mkIf cfg.bs {
"fd42:dead:beef:0:5054:ff:fefb:7361" = [
"media.dadada.li"
];
};
services.borgbackup.jobs.bs = mkIf cfg.bs{
paths = "/";
exclude = backupExcludes;
repo = "borg@media.dadada.li:/mnt/storage/backup/${config.networking.hostName}";
doInit = true;
environment = {
BORG_RSH = "ssh -i /var/lib/borgbackup/bs/id_ed25519 -o 'StrictHostKeyChecking accept-new'";
};
encryption = {
mode = "repokey";
passCommand = "cat /var/lib/borgbackup/bs/passphrase";
};
compression = "auto,lz4";
startAt = "daily";
};
};
}

View file

@ -1,14 +0,0 @@
{
admin = ./admin.nix;
backup = ./backup.nix;
homePage = ./homepage.nix;
element = ./element.nix;
fido2 = ./fido2.nix;
fileShare = ./fileShare.nix;
networking = ./networking.nix;
share = ./share.nix;
steam = ./steam.nix;
update = ./update.nix;
vpnServer = ./vpnServer.nix;
weechat = ./weechat.nix;
}

View file

@ -1,56 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
luks = config.dadada.luks;
fido2 = config.dadada.fido2;
in {
options = {
dadada.luks = {
uuid = mkOption {
type = with types; nullOr str;
description = "Device UUID";
default = null;
};
};
dadada.fido2 = {
enablePam = mkEnableOption "Enable PAM U2F";
credential = mkOption {
type = with types; nullOr str;
description = "FIDO2 credential string";
default = null;
};
};
};
config = {
boot.initrd.luks.devices = mkIf (luks.uuid != null) {
root = {
device = "/dev/disk/by-uuid/${luks.uuid}";
preLVM = true;
allowDiscards = true;
fido2 = mkIf (fido2.credential != null) {
credential = fido2.credential;
passwordLess = true;
};
};
};
boot.initrd.luks.fido2Support = mkIf (fido2.credential != null) true;
environment.systemPackages = mkIf (fido2.credential != null) (with pkgs; [
linuxPackages.acpi_call
fido2luks
python27Packages.dbus-python
python38Packages.solo-python
]);
security.pam.u2f = mkIf fido2.enablePam {
enable = true;
control = "sufficient";
cue = true;
};
};
}

View file

@ -1,20 +0,0 @@
{
colors = ./colors.nix;
direnv = ./direnv.nix;
fish = ./fish.nix;
git = ./git.nix;
gpg = ./gpg.nix;
gtk = ./gtk.nix;
keyring = ./keyring.nix;
kitty = ./kitty;
mako = ./mako.nix;
session = ./session.nix;
ssh = ./ssh.nix;
sway = ./sway;
syncthing = ./syncthing.nix;
termite = ./termite.nix;
tmux = ./tmux.nix;
vim = ./vim;
xdg = ./xdg.nix;
zsh = ./zsh.nix;
}

View file

@ -1,79 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.dadada.home.fish;
in {
options.dadada.home.fish = {
enable = mkEnableOption "Enable fish config";
};
config = mkIf cfg.enable {
programs.fish = {
enable = true;
plugins = with pkgs; [{
name = "fzf";
src = pkgs.fetchFromGitHub {
owner = "jethrokuan";
repo = "fzf";
rev = "c3defd4a922e97120503b45e26efa775bc672b50";
sha256 = "1k5b0nva0mbqc9830qhbcwxsi8d9b2p4ws1fq0bw9nkf2ripyp4p";
};
}];
interactiveShellInit = ''
# fish git prompt
set __fish_git_prompt_show_informative_status 'yes'
set __fish_git_prompt_showdirtystate 'yes'
set __fish_git_prompt_showstashstate 'yes'
set __fish_git_prompt_showuntrackedfiles 'yes'
set __fish_git_prompt_showupstream 'yes'
set __fish_git_prompt_showcolorhints 'yes'
set fish_greeting
# disable path shortening
set fish_prompt_pwd_dir_length 0
set -U FZF_LEGACY_KEYBINDINGS 0
set -x TERM xterm-256color
set -U fish_user_paths ~/bin $fish_user_paths
#if status is-interactive
#and not status is-login
#and not set -q TMUX
#and string match -qr "^xterm-.*" "$TERM"
# exec tmux
#end
'';
promptInit = ''
function fish_prompt
set last_status $status
printf '%s %s:%s ' \
(set_color red
echo $last_status) \
(set_color green
hostname) \
(set_color blue
prompt_pwd)
set_color normal
end
function fish_right_prompt
printf '%s' (__fish_git_prompt)
end
'';
shellAliases = {
gst = "git status";
gco = "git commit";
glo = "git log";
gad = "git add";
ls = "exa";
ll = "exa -l";
la = "exa -la";
mv = "mv -i";
cp = "cp -i";
};
};
home.packages = [ pkgs.exa ];
};
}

View file

@ -1,13 +0,0 @@
{ config, lib, ... }:
with lib;
let
cfg = config.dadada.home.git;
in
{
options.dadada.home.git = {
enable = mkEnableOption "Enable git config";
};
config = mkIf cfg.enable {
programs.git.enable = true;
};
}

View file

@ -1,25 +0,0 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.dadada.home.gtk;
in
{
options.dadada.home.gtk = {
enable = mkEnableOption "Enable GTK config";
};
config = mkIf cfg.enable {
gtk = {
enable = true;
theme.package = pkgs.gnome3.gnome-themes-extra;
theme.name = "Adwaita-dark";
iconTheme.package = pkgs.gnome3.adwaita-icon-theme;
iconTheme.name = "Adwaita";
font.package = pkgs.cantarell-fonts;
font.name = "Cantarell";
};
qt = {
enable = true;
platformTheme = "gtk";
};
};
}

View file

@ -1,42 +0,0 @@
enable_audio_bell = false;
background #1f2022
foreground #a3a3a3
selection_background #a3a3a3
selection_foreground #1f2022
url_color #b8b8b8
cursor #a3a3a3
active_border_color #585858
inactive_border_color #282828
active_tab_background #1f2022
active_tab_foreground #a3a3a3
inactive_tab_background #282828
inactive_tab_foreground #b8b8b8
tab_bar_background #282828
# normal
color0 #1f2022
color1 #f2241f
color2 #67b11d
color3 #b1951d
color4 #4f97d7
color5 #a31db1
color6 #2d9574
color7 #a3a3a3
# bright
color8 #585858
color9 #f2241f
color10 #67b11d
color11 #b1951d
color12 #4f97d7
color13 #a31db1
color14 #2d9574
color15 #f8f8f8
# extended base16 colors
color16 #ffa500
color17 #b03060
color18 #282828
color19 #444155
color20 #b8b8b8
color21 #e8e8e8

View file

@ -1,19 +0,0 @@
{ pkgs, lib, config, ... }:
with lib;
let
cfg = config.dadada.home.kitty;
in {
options.dadada.home.kitty = {
enable = mkEnableOption "Enable kitty config";
};
config = mkIf cfg.enable {
programs.kitty = {
enable = true;
font = {
package = pkgs.source-code-pro;
name = "Source Code Pro 8";
};
extraConfig = builtins.readFile ./config;
};
};
}

View file

@ -1,32 +0,0 @@
{ config, lib, pkgs, colors, ...}:
with lib;
let
cfg = config.dadada.home.mako;
in {
options.dadada.home.mako = {
enable = mkEnableOption "Enable mako config";
};
config = mkIf cfg.enable {
programs.mako = {
enable = true;
anchor = "bottom-right";
backgroundColor = colors.color8;
borderColor = colors.color0;
#defaultTimeout = -1;
font = "Source Code Pro 10";
format = ''<b>%a</b> %s\n%b'';
height = 100;
#groupBy = "app-name";
icons = false;
ignoreTimeout = false;
layer = "overlay";
margin = "0,0,0";
maxVisible = 200;
padding = "0";
progressColor = colors.color4;
sort = "+time";
textColor = colors.foreground;
width = 400;
};
};
}

View file

@ -1,20 +0,0 @@
[
./colors.nix
./direnv.nix
./fish.nix
./git.nix
./gpg.nix
./gtk.nix
./keyring.nix
./kitty
./mako.nix
./session.nix
./ssh.nix
./sway
./syncthing.nix
./termite.nix
./tmux.nix
./vim
./xdg.nix
./zsh.nix
]

View file

@ -1,306 +0,0 @@
set $wallpaper ~/.config/nixpkgs/modules/sway/wallpaper
set $foreground #a3a3a3ff
set $background #1f2022e5
set $dark_black #1f2022ff
set $light_black #282828ff
set $dark_red #444155ff
set $light_red #585858ff
set $dark_green #b8b8b8ff
set $light_green #a3a3a3ff
set $dark_yellow #e8e8e8ff
set $light_yellow #f8f8f8ff
set $dark_blue #f2241fff
set $light_blue #ffa500ff
set $dark_magenta #b1951dff
set $light_magenta #67b11dff
set $dark_cyan #2d9574ff
set $light_cyan #4f97d7ff
set $dark_white #a31db1ff
set $light_white #b03060ff
xwayland enable
# global modifier key
set $mod Mod4
# reload the configuration file
bindsym $mod+Shift+c reload
# restart i3 inplace (preserves your layout/session, can be used to upgrade i3)
bindsym $mod+Shift+r restart
# the font to be used for i3bar and window decorations
font pango:Source Code Pro 8
bindsym $mod+Return exec termite
bindsym $mod+Space exec bemenu-run
# switch keyboard to neo
#bindsym $mod+F1 exec neo-key
#bindsym $mod+F2 exec eu-key
# kill focused window
bindsym $mod+Shift+q kill
# toggle moving floating windows with the mouse
floating_modifier $mod
# toggle tiling / floating
bindsym $mod+Shift+f floating toggle
# resize window (you can also use the mouse for that)
mode "resize" {
# resize windows with hjkl
bindsym h resize shrink width 10 px or 10 ppt
bindsym j resize grow height 10 px or 10 ppt
bindsym k resize shrink height 10 px or 10 ppt
bindsym l resize grow width 10 px or 10 ppt
# back to normal mode
bindsym Return mode "default"
bindsym Escape mode "default"
}
# switch to resize mode
bindsym $mod+r mode "resize"
# set border width of new window
default_border pixel 1
# keep focus within current container?
focus_wrapping no
# focus goes to window if mouse is moved onto it
focus_follows_mouse yes
# enter fullscreen mode for the focused container
bindsym $mod+o fullscreen
# default orientation of new windows
default_orientation horizontal
# split in horizontal orientation
bindsym $mod+b split h
# split in vertical orientation
bindsym $mod+shift+b split v
# change container layout (stacked, tabbed, toggle split)
bindsym $mod+x layout toggle all
# name workspaces
set $1 1
set $2 2
set $3 3
set $4 4
set $5 5
set $6 6
set $7 7
set $8 8
set $9 9
set $10 10
# default mode
workspace_layout tabbed
# automatically jump back to previous workspace
workspace_auto_back_and_forth yes
# messaging
workspace 2 output LVDS-1
# web and doc
workspace 1 output VGA-1
# editor and IDE
workspace 3 output DP-2
# change focus
bindsym $mod+h focus left
bindsym $mod+j focus down
bindsym $mod+k focus up
bindsym $mod+l focus right
# focus latest urgent window
bindsym $mod+Shift+1 [urgent=latest] focus
# focus the parent container
bindsym $mod+Up focus parent
# focus the child container
bindsym $mod+Down focus child
# focus tiling/floating
bindsym $mod+f focus mode_toggle
# focus workspace
bindsym $mod+1 workspace number $1
bindsym $mod+2 workspace number $2
bindsym $mod+3 workspace number $3
bindsym $mod+4 workspace number $4
bindsym $mod+5 workspace number $5
bindsym $mod+6 workspace number $6
bindsym $mod+7 workspace number $7
bindsym $mod+8 workspace number $8
bindsym $mod+9 workspace number $9
bindsym $mod+0 workspace number $10
bindsym $mod+n workspace next_on_output
bindsym $mod+p workspace prev_on_output
# focus different outputs (displays)
bindsym $mod+shift+h focus output left
bindsym $mod+shift+j focus output down
bindsym $mod+shift+k focus output up
bindsym $mod+shift+l focus output right
# show the first scratchpad window
bindsym $mod+minus scratchpad show
set $mode_move "move"
bindsym $mod+m mode "$mode_move"
mode "$mode_move" {
# move focused container
bindsym h move left ;mode "default"
bindsym j move down ;mode "default"
bindsym k move up ;mode "default"
bindsym l move right;mode "default"
bindsym 1 move container to workspace number $1 ;mode "default"
bindsym 2 move container to workspace number $2 ;mode "default"
bindsym 3 move container to workspace number $3 ;mode "default"
bindsym 4 move container to workspace number $4 ;mode "default"
bindsym 5 move container to workspace number $5 ;mode "default"
bindsym 6 move container to workspace number $6 ;mode "default"
bindsym 7 move container to workspace number $7 ;mode "default"
bindsym 8 move container to workspace number $8 ;mode "default"
bindsym 9 move container to workspace number $9 ;mode "default"
bindsym 0 move container to workspace number $10 ;mode "default"
bindsym n move container to workspace next_on_output;mode "default"
bindsym p move container to workspace prev_on_output;mode "default"
# move focused workspace to output
bindsym shift+h move workspace to output left ; mode "default"
bindsym shift+j move workspace to output down ; mode "default"
bindsym shift+k move workspace to output up ; mode "default"
bindsym shift+l move workspace to output right ; mode "default"
bindsym shift+n move container to output next ; mode "default"
bindsym shift+p move container to output prev ; mode "default"
# make the currently focused window a scratchpad
bindsym minus move scratchpad; mode "default"
# Move container to the current position of the cursor
bindsym m move position mouse; mode "default"
bindsym Escape mode "default"
}
# lock the screen
bindsym $mod+equal exec ~/bin/lock-session
# control volume
bindsym --locked XF86AudioRaiseVolume exec amixer set 'Master' 5%+ && pkill -RTMIN+10 i3blocks
bindsym --locked XF86AudioLowerVolume exec amixer set 'Master' 5%- && pkill -RTMIN+10 i3blocks
bindsym --locked XF86AudioMute exec amixer set Master toggle && pkill -RTMIN+10 i3blocks
bindsym --locked --to-code XF86AudioMicMute exec --no-startup-id pactl set-source-mute 1 toggle
# control media player
bindsym --locked XF86AudioPlay exec playerctl play-pause && pkill -RTMIN+11 i3blocks
bindsym --locked XF86LaunchA exec playerctl play-pause && pkill -RTMIN+11 i3blocks
bindsym --locked XF86AudioNext exec playerctl next && pkill -RTMIN+11 i3blocks
bindsym --locked XF86Explorer exec playerctl next && pkill -RTMIN+11 i3blocks
bindsym --locked XF86AudioPrev exec playerctl previous && pkill -RTMIN+11 i3blocks
bindsym --locked XF86Search exec playerctl previous && pkill -RTMIN+11 i3blocks
# control screen brightness
bindsym --locked XF86MonBrightnessUp exec brightnessctl set -d intel_backlight +5%
bindsym --locked XF86MonBrightnessDown exec brightnessctl set -d intel_backlight 5%-
# Basic bar configuration using the Base16 variables.
bar {
id bar
status_command i3blocks
mode dock
modifier $mod
position bottom
strip_workspace_numbers yes
workspace_buttons yes
#output LVDS-1
colors {
background $background
separator $light_green
statusline $foreground
# State Border BG Text
focused_workspace $light_black $dark_cyan $background
active_workspace $light_black $dark_green $background
inactive_workspace $dark_black $background $foreground
urgent_workspace $light_black $dark_red $background
binding_mode $light_black $dark_magenta $background
}
}
#hide_edge_borders both
bindsym XF86Launch1 exec aplay ~/lib/sounds/wortwitzklingel-mono.wav
# Basic color configuration using the Base16 variables for windows and borders.
# Property Name Border BG Text Indicator Child Border
client.focused $light_black $dark_cyan $background $dark_cyan $dark_cyan
client.focused_inactive $light_black $dark_green $background $dark_green $dark_green
client.unfocused $light_black $background $foreground $dark_white $dark_white
client.urgent $light_black $dark_red $background $dark_red $dark_red
client.placeholder $light_black $dark_magenta $background $dark_magenta $dark_magenta
input * {
xkb_layout eu
xkb_model pc105+inet
xkb_options caps:escape
natural_scroll enabled
}
input 2:7:SynPS/2_Synaptics_TouchPad {
# disables the input device
events disabled
}
output VGA-1 {
background $wallpaper fill
pos 0 0
}
output DP-2 {
background $wallpaper fill
pos 1280 0
}
output LVDS-1 {
background $wallpaper fill
pos 3840 0
}
seat * {
hide_cursor 5000
}
assign [app_id="thunderbird"] workspace 1
assign [app_id="telegramdesktop"] workspace 1
assign [app_id="firefox" title="Riot.*"] workspace 1
assign [app_id="firefox" title="Instant messaging.*"] workspace 1
assign [app_id="firefox" title="Threema Web.*"] workspace 1
assign [app_id="firefox" title="chaos\.social.*"] workspace 1
assign [app_id="thunderbird" title="Write:.*"] workspace 3
assign [app_id="firefox"] workspace 2
assign [app_id="jetbrains-studio"] workspace 3
assign [app_id="org.keepassxc.KeePassXC"] workspace 10
exec xset s off
exec mako
#exec swayidle -w timeout 300 '$HOME/bin/lock-session' timeout 240 'swaymsg "output * dpms off"' resume 'swaymsg "output * dpms on"' before-sleep '$HOME/bin/lock-session' lock '$HOME/bin/lock-session'
#exec redshift
#exec keepassxc
#exec firefox
#exec thunderbird
#exec riot-desktop

View file

@ -1,39 +0,0 @@
{ config, pkgs, lib, colors, ...}:
with lib;
let
cfg = config.dadada.home.sway;
in {
options.dadada.home.sway = {
enable = mkEnableOption "Enable Sway config";
};
config = mkIf cfg.enable {
home.packages = with pkgs; [
qt5.qtwayland
swayidle
xwayland
mako
kanshi
i3blocks
termite
bemenu
xss-lock
] ++ (with unstable; [
swaylock
]);
wayland.windowManager.sway = {
enable = true;
config = null;
extraConfig = (builtins.readFile ./config);
extraSessionCommands = ''
export SDL_VIDEODRIVER=wayland
# needs qt5.qtwayland in systemPackages
export QT_QPA_PLATFORM=wayland
export QT_WAYLAND_DISABLE_WINDOWDECORATION="1"
# Fix for some Java AWT applications (e.g. Android Studio),
# use this if they aren't displayed properly:
export _JAVA_AWT_WM_NONREPARENTING=1
'';
};
};
}

View file

@ -1,69 +0,0 @@
{
config,
lib,
pkgs,
colors ? ../../lib/colors.nix,
...
}:
with lib;
let
cfg = config.dadada.home.termite;
in {
options.dadada.home.termite = {
enable = mkEnableOption "Enable termite config";
};
config = mkIf cfg.enable {
programs.termite = {
enable = true;
allowBold = true;
audibleBell = false;
clickableUrl = true;
dynamicTitle = true;
font = "Source Code Pro 10";
mouseAutohide = false;
scrollOnOutput = false;
scrollOnKeystroke = true;
scrollbackLines = -1;
searchWrap = true;
urgentOnBell = true;
cursorBlink = "off";
cursorShape = "block";
sizeHints = false;
scrollbar = "off";
colorsExtra = ''
foreground = ${colors.foreground}
foreground_bold = ${colors.foregroundBold}
cursor = ${colors.cursor}
cursor_foreground = ${colors.cursorForeground}
background = ${colors.background}
color0 = ${colors.background}
color8 = ${colors.color8}
color7 = ${colors.color7}
color15 = ${colors.color15}
color1 = ${colors.color1}
color9 = ${colors.color9}
color2 = ${colors.color2}
color10 = ${colors.color10}
color3 = ${colors.color3}
color11 = ${colors.color11}
color4 = ${colors.color4}
color12 = ${colors.color12}
color5 = ${colors.color5}
color13 = ${colors.color13}
color6 = ${colors.color6}
color14 = ${colors.color14}
color16 = ${colors.color16}
color17 = ${colors.color17}
color18 = ${colors.color18}
color19 = ${colors.color19}
color20 = ${colors.color20}
color21 = ${colors.color21}
'';
};
# Add font that is used in config
home.packages = [
pkgs.source-code-pro
];
};
}

View file

@ -1,21 +0,0 @@
{ config, lib, ... }:
with lib;
let
cfg = config.dadada.home.tmux;
in {
options.dadada.home.tmux = {
enable = mkEnableOption "Enable tmux config";
};
config = mkIf cfg.enable {
programs.tmux = {
enable = true;
terminal = "xterm-256color";
extraConfig = ''
set -g status on
set-option -g set-titles on
set-option -g automatic-rename on
set-window-option -g mode-keys vi
'';
};
};
}

View file

@ -1,37 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.dadada.home.vim;
vimPlugins = pkgs.callPackage ../../../pkgs/vimPlugins {};
in
{
options.dadada.home.vim = {
enable = mkEnableOption "Enable VIM config";
};
config = mkIf cfg.enable {
programs.vim = {
enable = true;
extraConfig = builtins.readFile ./vimrc;
plugins = [
pkgs.vimPlugins.vim-nix
#pkgs.vimPlugins.kotlin-vim
pkgs.vimPlugins.ale
pkgs.vimPlugins.fzf-vim
pkgs.vimPlugins.rust-vim
pkgs.vimPlugins.base16-vim
pkgs.vimPlugins.typescript-vim
pkgs.vimPlugins.vim-airline
pkgs.vimPlugins.vim-airline-themes
pkgs.vimPlugins.vim-fish
vimPlugins.spacemacsTheme
vimPlugins.filetype
#pkgs.vimPlugins.vim-gnupg
#pkgs.vimPlugins.vim-l9
pkgs.vimPlugins.vim-ledger
#pkgs.vimPlugins.clang_complete
];
};
home.packages = [ pkgs.languagetool ];
};
}

View file

@ -1,144 +0,0 @@
filetype plugin on
filetype indent on
set autoread
" :W sudo saves the file
" (useful for handling the permission-denied error)
command W w !sudo tee % > /dev/null
" no command execution from modeline
set nomodeline
" Turn on the Wild menu
set wildmenu
" Enable hidden buffers
set hidden
" Clipboard copy & paste
"set clipboard=unnamedplus
" Always show current position
set ruler
" When searching try to be smart about cases
set smartcase
" Highlight search results
set hlsearch
" Inenteremental search
set incsearch
" Don't redraw while executing macros (good performance config)
set lazyredraw
" Do not show matching brackets when text indicator is over them
" set noshowmatch
" let loaded_matchparen = 1
" No annoying sound on errors
set noerrorbells
set novisualbell
set wrap
set linebreak
set nolist " list disables linebreak
" Enable syntax highlighting
syntax enable
if (has("termguicolors"))
set termguicolors
endif
set t_Co=256
set background=dark
colorscheme spacemacs-theme
" Use tabs for indent
set smarttab
set smartindent
set autoindent
set copyindent
set preserveindent
set wildmode=longest,list,full
set wildmenu
set cursorline
set number
set relativenumber
" Transparency
"hi Normal guibg=NONE ctermbg=NONE
"set list!
"set listchars=trail:⛤,extends:⟩,precedes:⟨,nbsp:␣,conceal:…
" Map leader to do extra key combinations
let mapleader = " "
" Toggle paste mode on and off
map <leader>pp :setlocal paste!<Enter>
" Fast saving
nmap <leader>w :w!<Enter>
" Buffer switching
nmap <leader>bb :Buffers<Enter>
nmap <leader>bl :Buffers<Enter>
nmap <leader>bn :bnext<Enter>
nmap <leader>bp :bprevious<Enter>
nmap <leader>ll :Lines<Enter>
nmap <leader>mm :Marks<Enter>
nmap <leader>ww :Windows<Enter>
nmap <leader>hh :History/<Enter>
nmap <leader>rr :reg<Enter>
" finding files
nmap <leader>ff :Files<Enter>
nmap <leader>pp :FufDir<Enter>
set statusline+=%#warningmsg#
set statusline+=%{SyntasticStatuslineFlag()}
set statusline+=%*
"let g:syntastic_always_populate_loc_list = 1
"let g:syntastic_auto_loc_list = 1
"let g:syntastic_check_on_open = 1
"let g:syntastic_check_on_wq = 0
nmap <leader>sp :ALEFindReferences<Enter>
nmap <leader>ss :ALESymbolSearch<Enter>
nmap <leader>gd :ALEGoToDefinition<Enter>
nmap <leader>?? :ALEHover<Enter>
" Enable completion where available.
" This setting must be set before ALE is loaded.
let g:ale_completion_enabled = 1
let g:ale_fix_on_save = 1
let g:ale_warn_about_trailing_whitespace = 1
let g:ale_warn_about_trailing_lines = 1
let g:ale_completion_tsserver_autoimport = 1
let g:ale_languagetool_executable = 'languagetool-commandline'
"let g:ale_lint_on_text_changed = 'never'
" You can disable this option too
" if you don't want linters to run on opening a file
"let g:ale_lint_on_enter = 0
" Set airline theme
let g:airline_theme='base16_spacemacs'
" Load all plugins now.
" Plugins need to be added to runtimepath before helptags can be generated.
packloadall
" Load all of the helptags now, after plugins have been loaded.
" All messages and errors will be ignored.
silent! helptags ALL
set omnifunc=ale#completion#OmniFunc

View file

@ -1,65 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.dadada.home.zsh;
in {
options.dadada.home.zsh = {
enable = mkEnableOption "Enable ZSH config";
};
config = mkIf cfg.enable {
programs.fzf.enableZshIntegration = true;
programs.zsh = {
enable = true;
enableAutosuggestions = true;
enableCompletion = true;
autocd = true;
sessionVariables = {
EDITOR = "vim";
};
history = {
extended = true;
ignoreDups = true;
ignoreSpace = true;
save = 100000;
share = true;
};
plugins = [
];
initExtra = ''
source ~/.nix-profile/share/zsh-git-prompt/zshrc.sh
source ~/.nix-profile/share/fzf/key-bindings.zsh
source ~/.nix-profile/share/fzf/completion.zsh
preexec() { echo -n -e "\033]0;$1\007" }
PROMPT="%F{red}%?%f %F{green}%m%f:%F{blue}%~%f "
RPROMPT='$(git_super_status)'
#NIX_BUILD_SHELL="${pkgs.zsh}/bin/zsh"
if [ "$TMUX" = "" ]
then
tmux
fi
'';
profileExtra = ''
'';
shellAliases = {
gst = "git status";
gco = "git commit";
glo = "git log";
gad = "git add";
ls = "exa";
ll = "exa -l";
la = "exa -la";
mv = "mv -i";
cp = "cp -i";
};
};
home.packages = with pkgs; [
fzf
exa
zsh-git-prompt
tmux
];
};
}

View file

@ -1,18 +0,0 @@
{ config, pkgs, lib, ... }:
let
cfg = config.dadada.homePage;
in with lib; {
options.dadada.homePage = {
enable = mkEnableOption "Enable home page";
};
config = mkIf cfg.enable {
services.nginx.enable = true;
services.nginx.virtualHosts."dadada.li" = {
enableACME = true;
forceSSL = true;
root = pkgs.homePage;
};
};
}

View file

@ -1,14 +0,0 @@
[
./admin.nix
./backup.nix
./element.nix
./fido2.nix
./fileShare.nix
./homepage.nix
./networking.nix
./share.nix
./steam.nix
./update.nix
./vpnServer.nix
./weechat.nix
]

View file

@ -1,80 +0,0 @@
{ config, pkgs, lib, ...}:
with lib;
let
cfg = config.dadada.networking;
in {
options.dadada.networking = {
useLocalResolver = mkEnableOption "Enable local caching name server";
wanInterfaces = mkOption {
type = with types; listOf str;
description = "WAN network interfaces";
default = [];
};
vpnExtension = mkOption {
type = with types; nullOr str;
description = "Last part of VPN address";
default = null;
};
enableBsShare = mkEnableOption "Enable network share at BS location";
};
config = {
networking.resolvconf.useLocalResolver = mkIf cfg.useLocalResolver true;
services.unbound = mkIf cfg.useLocalResolver {
enable = true;
allowedAccess = [
"127.0.0.1/8"
"::1"
];
extraConfig = ''
tls-upstream: yes
tls-cert-bundle: "/etc/ssl/certs/ca-bundle.crt"
forward-zone:
name: .
forward-tls-upstream: yes
forward-addr: 2606:4700:4700::1001@853#cloudflare-dns.com
forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com
forward-addr: 1.1.1.1@853#cloudflare-dns.com
forward-addr: 1.0.0.1@853#cloudflare-dns.com
'';
};
networking.useDHCP = false;
networking.interfaces = listToAttrs (forEach cfg.wanInterfaces (i: nameValuePair i {
useDHCP = true;
}));
networking.wireguard.interfaces = mkIf (cfg.vpnExtension != null) {
bs = {
ips = [ "fd42:dead:beef:1337::${cfg.vpnExtension}/64" ];
listenPort = 51234;
privateKeyFile = "/var/lib/wireguard/privkey";
peers = [
{
publicKey = "lFB2DWtzp55ajV0Fk/OWdO9JlGvN9QsayYKQQHV3GEs=";
allowedIPs = [ "fd42:dead:beef::/48" ];
endpoint = "bs.vpn.dadada.li:51234";
persistentKeepalive = 25;
}
];
};
};
fileSystems."/mnt/media.dadada.li" = mkIf cfg.enableBsShare {
device = "media.dadada.li:/mnt/storage/share";
fsType = "nfs";
options = [ "x-systemd.automount" "noauto" "x-systemd.idle-timeout=600" ];
};
networking.firewall = {
enable = true;
allowedUDPPorts = [
51234 # Wireguard
5353 # mDNS
];
};
};
}

View file

@ -1,26 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
{
nixpkgs.overlays = attrValues (import ../../../overlays);
imports = import ../../module-list.nix;
networking.domain = mkDefault "dadada.li";
dadada.admin.users = {
"dadada" = [ "${pkgs.dadadaKeys}/dadada.pub" ];
};
#dadada.autoUpgrade = mkDefault true;
environment.noXlibs = mkDefault true;
documentation.enable = mkDefault false;
documentation.nixos.enable = mkDefault false;
i18n.defaultLocale = mkDefault "en_US.UTF-8";
console = mkDefault {
font = "Lat2-Terminus16";
keyMap = "us";
};
}

View file

@ -1,4 +0,0 @@
{
base = ./base;
laptop = ./laptop;
}

View file

@ -1,37 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
{
imports = [
../base
];
dadada = {
networking = {
useLocalResolver = mkDefault true;
};
};
services.fwupd.enable = true;
fonts.fonts = mkDefault (with pkgs; [
source-code-pro
]);
time.timeZone = mkDefault "Europe/Berlin";
programs.zsh = mkDefault {
enable = true;
autosuggestions.enable = true;
enableCompletion = true;
histSize = 100000;
vteIntegration = true;
syntaxHighlighting = {
enable = true;
highlighters = [ "main" "brackets" "pattern" "cursor" "root" "line" ];
};
};
environment.noXlibs = false;
documentation.enable = true;
documentation.nixos.enable = true;
}

View file

@ -1,27 +0,0 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.dadada.autoUpgrade;
in {
options.dadada.autoUpgrade = {
enable = mkEnableOption "Enable automatic upgrades";
};
config = mkIf cfg.enable {
nix = {
autoOptimiseStore = true;
useSandbox = true;
gc = {
automatic = true;
dates = "weekly";
options = "--delete-older-than 30d";
};
};
system.autoUpgrade = {
enable = true;
dates = "daily";
};
};
}

View file

@ -1,47 +0,0 @@
{ config, lib, ... }:
with lib;
let
cfg = config.dadada.vpnServer;
wgPeer = { name, ... }: {
options = {
name = mkOption {
internal = true;
default = name;
};
id = mkOption {
description = "VPN client id";
default = 0;
type = types.str;
};
key = mkOption {
description = "VPN client public key";
default = "";
type = types.str;
};
};
};
in {
options.dadada.vpnServer = {
enable = mkEnableOption "Enable wireguard gateway";
peers = mkOption {
description = "Set of extensions and public keys of peers";
type = with types; attrsOf (submodule wgPeer);
default = {};
};
};
config = mkIf cfg.enable {
networking.wireguard.enable = true;
networking.wireguard.interfaces."wg0" = {
allowedIPsAsRoutes = true;
privateKeyFile = "/var/lib/wireguard/wg0-key";
ips = [ "fd42:dead:beef:1337::0/64" ];
listenPort = 51234;
peers = map (peer: (
{
allowedIPs = [ "fd42:dead:beef:1337::${peer.id}/128" ];
publicKey = peer.key;
})) (attrValues cfg.peers);
};
};
}

110
nixos/configurations.nix Normal file
View file

@ -0,0 +1,110 @@
{
self,
agenix,
disko,
home-manager,
homepage,
lanzaboote,
nixos-hardware,
nixos-generators,
nixpkgs,
...
}@inputs:
let
# create a new instance allowing some unfree packages
nixpkgsx86 = import nixpkgs {
system = "x86_64-linux";
config.allowUnfreePredicate =
pkg:
builtins.elem (nixpkgs.lib.getName pkg) [
"aspell-dict-en-science"
"brgenml1lpr"
"saleae-logic-2"
"spotify"
];
};
nixosSystem = nixpkgs.lib.nixosSystem;
baseModule =
{ lib, ... }:
{
_module.args.inputs = inputs;
imports = [
inputs.agenix.nixosModules.age
inputs.disko.nixosModules.disko
inputs.home-manager.nixosModules.home-manager
(
{ pkgs, ... }:
{
dadada.homepage.package = homepage;
dadada.pkgs = inputs.self.packages.${pkgs.system};
dadada.inputs = inputs // {
dadada = inputs.self;
};
}
)
inputs.lanzaboote.nixosModules.lanzaboote
]
++ (lib.attrValues inputs.self.nixosModules);
};
homeModule = ./modules/profiles/home.nix;
in
{
stolas = nixosSystem {
modules = [
{ nixpkgs.pkgs = nixpkgsx86; }
baseModule
nixos-hardware.nixosModules.framework-amd-ai-300-series
homeModule
./stolas
];
};
gorgon = nixosSystem {
modules = [
{ nixpkgs.pkgs = nixpkgsx86; }
baseModule
nixos-hardware.nixosModules.lenovo-thinkpad-t14s-amd-gen1
homeModule
./gorgon/configuration.nix
];
};
surgat = nixosSystem {
modules = [
{ nixpkgs.pkgs = nixpkgsx86; }
baseModule
./surgat/configuration.nix
];
};
installer = nixosSystem {
modules = [
nixos-generators.nixosModules.install-iso
inputs.self.nixosModules.admin
(
{ lib, ... }:
{
nixpkgs.pkgs = nixpkgs.legacyPackages."x86_64-linux";
isoImage.isoName = lib.mkForce "dadada-nixos-installer.iso";
networking.tempAddresses = "disabled";
dadada.admin.enable = true;
documentation.enable = true;
documentation.nixos.enable = true;
i18n.defaultLocale = "en_US.UTF-8";
console = {
font = "Lat2-Terminus16";
keyMap = "us";
};
}
)
];
};
ninurta = nixosSystem {
modules = [
{ nixpkgs.pkgs = nixpkgsx86; }
baseModule
./ninurta/configuration.nix
];
};
}

View file

@ -0,0 +1,284 @@
{
config,
pkgs,
lib,
...
}:
let
secretsPath = config.dadada.secrets.path;
xilinxJtag = pkgs.writeTextFile {
name = "xilinx-jtag";
text = ''
ATTRS{idVendor}=="0403", ATTRS{idProduct}=="6010", TAG+="uaccess"
'';
destination = "/etc/udev/rules.d/61-xilinx-jtag.rules";
};
saleaeLogic = pkgs.writeTextFile {
name = "saleae-logic";
text = ''
# Saleae Logic analyzer (USB Based)
ATTRS{idVendor}=="21a9", ATTRS{idProduct}=="1006", TAG+="uaccess"
'';
destination = "/etc/udev/rules.d/61-saleae-logic.rules";
};
keychron = pkgs.writeTextFile {
name = "keychron";
text = ''
# Saleae Logic analyzer (USB Based)
ATTRS{idVendor}=="3434", ATTRS{idProduct}=="0280", TAG+="uaccess"
'';
destination = "/etc/udev/rules.d/61-keychron.rules";
};
in
{
imports = [
../modules/profiles/laptop.nix
./hardware-configuration.nix
];
dadada.backupClient.bs.enable = false;
dadada.backupClient.backup1.enable = true;
dadada.backupClient.backup2 = {
enable = true;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase".path;
sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path;
repo = "u355513-sub1@u355513-sub1.your-storagebox.de:/home/backup";
};
dadada.backupClient.gs = {
enable = true;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase-gs".path;
};
age.secrets."${config.networking.hostName}-backup-passphrase-gs".file =
"${secretsPath}/${config.networking.hostName}-backup-passphrase-gs.age";
programs.ssh.startAgent = true;
nix.extraOptions = ''
experimental-features = nix-command flakes
# Prevent garbage collection for nix shell and direnv
keep-outputs = true
keep-derivations = true
'';
boot = {
kernelModules = [ "kvm-amd" ];
extraModulePackages = [ pkgs.linuxPackages.v4l2loopback ];
kernelParams = [ "resume=/dev/disk/by-label/swap" ];
initrd = {
systemd.enable = true;
luks.devices = {
root = {
device = "/dev/disk/by-uuid/3d0e5b93-90ca-412a-b4e0-3e6bfa47d3f4";
preLVM = true;
allowDiscards = true;
crypttabExtraOpts = [ "fido2-device=auto" ];
};
};
};
};
zramSwap.enable = true;
networking.hostName = "gorgon";
dadada = {
steam.enable = false;
yubikey.enable = true;
};
programs.adb.enable = true;
programs.firefox = {
enable = true;
package = pkgs.firefox-wayland;
};
programs.wireshark.enable = true;
services.avahi.enable = true;
services.smartd.enable = true;
services.tor = {
enable = true;
client.enable = true;
};
services.paperless = {
enable = true;
passwordFile = config.age.secrets.paperless.path;
};
systemd.tmpfiles.rules =
let
cfg = config.services.paperless;
in
[
(
if cfg.consumptionDirIsPublic then
"d '${cfg.consumptionDir}' 777 - - - -"
else
"d '${cfg.consumptionDir}' 770 ${cfg.user} ${config.users.users.${cfg.user}.group} - -"
)
];
age.secrets.paperless = {
file = "${config.dadada.secrets.path}/paperless.age";
mode = "700";
owner = "paperless";
};
# Enable CUPS to print documents.
services.printing = {
enable = true;
browsing = true;
drivers = with pkgs; [
config.dadada.pkgs.citizen-cups
hplip
brlaser
brgenml1lpr
brgenml1cupswrapper
];
};
#hardware.printers.ensurePrinters = [
# {
# name = "Brother_HL-L2300D";
# model = "everywhere";
# location = "BS";
# deviceUri = "ipp://192.168.101.29:631/printers/Brother_HL-L2300D";
# }
#];
environment.systemPackages = with pkgs; [
ghostscript
smartmontools
dmenu
grim # screenshot functionality
slurp # screenshot functionality
#mako # notification system developed by swaywm maintainer
pulseaudio
# KDE apps
kdePackages.kmail
kdePackages.kmail-account-wizard
];
networking.firewall = {
enable = true;
allowedTCPPorts = [
22000 # Syncthing
];
allowedUDPPorts = [
21027 # Syncthing
];
};
systemd.services.modem-manager.enable = lib.mkForce false;
systemd.services."dbus-org.freedesktop.ModemManager1".enable = lib.mkForce false;
systemd.sleep.extraConfig = ''
HibernateDelaySec=1h
'';
services.udev.packages = [
xilinxJtag
saleaeLogic
keychron
pkgs.libsigrok
]; # noMtpUdevRules ];
virtualisation.libvirtd.enable = true;
virtualisation.podman = {
enable = true;
dockerCompat = true;
};
users.users = {
dadada = {
isNormalUser = true;
extraGroups = [
"wheel"
"networkmanager"
"libvirtd"
"adbusers"
"kvm"
"video"
"scanner"
"lp"
"docker"
"dialout"
"wireshark"
"paperless"
];
shell = "/run/current-system/sw/bin/zsh";
};
};
networking.hosts = {
"127.0.0.2" = [ "kanboard.dadada.li" ];
};
services.gnome.gnome-keyring.enable = lib.mkForce false;
programs.gnupg.agent.enable = true;
# KDE
services = {
desktopManager.plasma6.enable = true;
displayManager.sddm.enable = true;
displayManager.sddm.wayland.enable = true;
};
services.greetd = {
enable = false;
settings = {
default_session = {
command = "${pkgs.greetd.tuigreet}/bin/tuigreet --time --cmd sway";
user = "greeter";
};
};
};
systemd.user.services.kanshi = {
enable = false;
description = "kanshi daemon";
environment = {
WAYLAND_DISPLAY = "wayland-1";
DISPLAY = ":0";
};
serviceConfig = {
Type = "simple";
ExecStart = ''${pkgs.kanshi}/bin/kanshi'';
};
};
# enable Sway window manager
programs.sway = {
enable = false;
wrapperFeatures.gtk = true;
};
programs.light.enable = true;
xdg.portal.wlr.enable = false;
hardware.bluetooth.enable = true;
hardware.graphics = {
enable = true;
extraPackages = with pkgs; [
vaapiVdpau
libvdpau-va-gl
];
};
powerManagement = {
enable = true;
powertop.enable = true;
cpuFreqGovernor = "schedutil";
powerUpCommands = ''
echo 40 > /sys/class/power_supply/BAT0/charge_control_start_threshold
echo 80 > /sys/class/power_supply/BAT0/charge_control_stop_threshold
'';
};
services.tlp.enable = false;
system.stateVersion = "23.11";
}

View file

@ -0,0 +1,53 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
pkgs,
modulesPath,
...
}:
{
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [
"nvme"
"ehci_pci"
"xhci_pci"
"usb_storage"
"sd_mod"
"rtsx_pci_sdmmc"
];
boot.initrd.kernelModules = [ "dm-snapshot" ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" = {
device = "/dev/disk/by-uuid/2478e089-e5d6-480c-8530-4ea46988f9f7";
fsType = "ext4";
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/5B90-D460";
fsType = "vfat";
};
fileSystems."/home" = {
device = "/dev/disk/by-uuid/a617625e-9325-4612-a086-954fb4b99ee0";
fsType = "ext4";
};
fileSystems."/nix" = {
device = "/dev/disk/by-uuid/1f6ab0fb-ef4d-45b1-a731-ad0e7a440eef";
fsType = "ext4";
};
swapDevices = [
{ device = "/dev/disk/by-uuid/92310a00-7f69-4775-85cb-38e1790f71db"; }
];
nix.settings.max-jobs = lib.mkDefault 16;
}

122
nixos/modules/admin.nix Normal file
View file

@ -0,0 +1,122 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.admin;
extraGroups = [
"wheel"
"libvirtd"
];
shells = {
"bash" = pkgs.bashInteractive;
"zsh" = pkgs.zsh;
"fish" = pkgs.fish;
};
shellNames = builtins.attrNames shells;
adminOpts =
{
name,
config,
...
}:
{
options = {
keys = mkOption {
type = types.listOf types.str;
default = [ ];
apply =
x:
assert (builtins.length x > 0 || abort "Please specify at least one key to be able to log in");
x;
description = ''
The keys that should be able to access the account.
'';
};
shell = mkOption {
type = types.nullOr types.str;
apply =
x:
assert (
builtins.elem x shellNames || abort "Please specify one of ${builtins.toString shellNames}"
);
x;
default = "zsh";
defaultText = literalExpression "zsh";
example = literalExpression "bash";
description = ''
One of ${builtins.toString shellNames}
'';
};
};
};
in
{
options = {
dadada.admin = {
enable = mkEnableOption "Enable admin access";
users = mkOption {
type = with types; attrsOf (submodule adminOpts);
default = import ../../admins.nix;
description = ''
Admin users with root access machine.
'';
example = literalExample "\"user1\" = { shell = pkgs.bashInteractive; keys = [ 'ssh-rsa 123456789' ]; }";
};
rat = mkOption {
type = types.bool;
default = false;
description = ''
Enable NAT and firewall traversal for SSH via tor hidden service
'';
};
};
};
config = mkIf cfg.enable {
assertions = [
{
assertion = cfg.users != [ ];
message = "Must provide at least one admin, if the admin module is enabled.";
}
];
programs.zsh.enable = mkDefault true;
services.sshd.enable = true;
services.openssh.settings.PasswordAuthentication = false;
security.sudo.wheelNeedsPassword = lib.mkDefault false;
services.openssh.openFirewall = true;
users.users = mapAttrs (user: keys: {
shell = shells."${keys.shell}";
extraGroups = lib.mkDefault extraGroups;
isNormalUser = true;
openssh.authorizedKeys.keys = keys.keys;
}) cfg.users;
nix.settings.trusted-users = builtins.attrNames cfg.users;
users.mutableUsers = mkDefault false;
environment.systemPackages = with pkgs; [
helix
tmux
];
services.tor.relay.onionServices = {
"rat" = mkIf cfg.rat.enable {
name = "rat";
map = [ { port = 22; } ];
};
};
};
}

196
nixos/modules/backup.nix Normal file
View file

@ -0,0 +1,196 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
backupExcludes = [
"/backup"
"/dev"
"/efi"
"/home/*/.cache"
"/home/*/.config/Riot/Cache"
"/home/iserv"
"/lost+found"
"/mnt"
"/nix"
"/proc"
"/root"
"/run"
"/sys"
"/tmp"
"/var/cache"
"/var/lib/machines"
"/var/log"
"/var/tmp"
"/swapfile"
];
cfg = config.dadada.backupClient;
in
{
options = {
dadada.backupClient = {
gs = {
enable = mkEnableOption "Enable backup to GS location";
passphrasePath = mkOption {
type = with types; nullOr str;
description = ''
The path to the passphrase file.
'';
default = "/var/lib/borgbackup/gs/passphrase";
};
};
bs = {
enable = mkEnableOption "Enable backup to BS location";
passphrasePath = mkOption {
type = types.str;
description = ''
The path to the passphrase file.
'';
default = "/var/lib/borgbackup/bs/passphrase";
};
sshIdentityFile = mkOption {
type = types.str;
description = ''
Path to the SSH key that is used to transmit the backup.
'';
default = "/var/lib/borgbackup/bs/id_ed25519";
};
};
backup1 = {
enable = mkEnableOption "Enable backup to new BS location";
passphrasePath = mkOption {
type = types.str;
description = ''
The path to the passphrase file.
'';
default = "/var/lib/borgbackup/backup1/passphrase";
};
sshIdentityFile = mkOption {
type = types.str;
description = ''
Path to the SSH key that is used to transmit the backup.
'';
default = "/var/lib/borgbackup/backup1/id_ed25519";
};
};
backup2 = {
enable = mkEnableOption "Enable backup to Hetzner storage box";
passphrasePath = mkOption {
type = types.str;
description = "The path to the passphrase file.";
default = "/var/lib/borgbackup/backup2/passphrase";
};
sshIdentityFile = mkOption {
type = types.str;
description = "Path to the SSH key that is used to transmit the backup.";
default = "/var/lib/borgbackup/backup2/id_ed25519";
};
repo = mkOption {
type = types.str;
description = "URL to the repo inside the sub-account.";
example = "u355513-sub1@u355513-sub1.your-storagebox.de:borg";
};
};
};
};
config = {
systemd.mounts = mkIf cfg.gs.enable [
{
type = "ext4";
what = "/dev/disk/by-uuid/0fdab735-cc3e-493a-b4ec-cbf6a77d48d5";
where = "/backup";
options = "nofail,noauto";
}
];
systemd.automounts = mkIf cfg.gs.enable [
{
where = "/backup";
automountConfig.TimeoutIdleSec = "600";
}
];
services.borgbackup.jobs.gs = mkIf cfg.gs.enable {
removableDevice = true;
paths = "/";
exclude = backupExcludes;
repo = "/backup/${config.networking.hostName}";
doInit = false;
encryption = {
mode = "repokey";
passCommand = "cat ${cfg.gs.passphrasePath}";
};
compression = "auto,lz4";
prune.keep = {
within = "1d"; # Keep all archives from the last day
daily = 7;
weekly = 2;
monthly = -1; # Keep at least one archive for each month
yearly = -1; # Keep at least one archive for each year
};
startAt = "monthly";
};
systemd.services."borgbackup-job-gs".enable = mkIf cfg.gs.enable true;
systemd.services."borgbackup-job-gs".wants = mkIf cfg.gs.enable [ "backup.mount" ];
systemd.timers."borgbackup-job-gs".enable = mkIf cfg.gs.enable true;
services.borgbackup.jobs.bs = mkIf cfg.bs.enable {
paths = "/";
exclude = backupExcludes;
repo = "borg@backup0.dadada.li:/mnt/storage/backup/${config.networking.hostName}";
doInit = false;
environment = {
BORG_RSH = "ssh -6 -i ${cfg.bs.sshIdentityFile} -o 'StrictHostKeyChecking accept-new' -o 'TCPKeepAlive=yes'";
};
encryption = {
mode = "repokey";
passCommand = "cat ${cfg.bs.passphrasePath}";
};
compression = "auto,lz4";
startAt = "daily";
environment = {
BORG_RELOCATED_REPO_ACCESS_IS_OK = "yes";
};
};
services.borgbackup.jobs.backup1 = mkIf cfg.backup1.enable {
paths = "/";
exclude = backupExcludes;
repo = "borg@backup1.dadada.li:/mnt/storage/backups/${config.networking.hostName}";
doInit = true;
environment = {
BORG_RSH = "ssh -6 -i ${cfg.backup1.sshIdentityFile} -o 'StrictHostKeyChecking accept-new' -o 'TCPKeepAlive=yes'";
};
encryption = {
mode = "repokey";
passCommand = "cat ${cfg.backup1.passphrasePath}";
};
compression = "auto,lz4";
startAt = "daily";
};
services.borgbackup.jobs.backup2 = mkIf cfg.backup2.enable {
paths = "/";
exclude = backupExcludes;
repo = cfg.backup2.repo;
doInit = true;
environment = {
BORG_RSH = "ssh -6 -p23 -i ${cfg.backup2.sshIdentityFile} -o 'StrictHostKeyChecking accept-new' -o 'TCPKeepAlive=yes'";
};
encryption = {
mode = "repokey";
passCommand = "cat ${cfg.backup2.passphrasePath}";
};
compression = "auto,lz4";
startAt = "daily";
environment = {
BORG_RELOCATED_REPO_ACCESS_IS_OK = "no";
};
};
};
}

View file

@ -0,0 +1,99 @@
{ config, lib, ... }:
let
inherit (lib)
mkEnableOption
mkIf
mkOption
types
;
cfg = config.dadada.borgServer;
in
{
options = {
dadada.borgServer = {
enable = mkEnableOption "Enable Borg backup server";
path = mkOption {
type = types.path;
default = "/var/lib/backup";
example = "/mnt/storage/backup";
};
};
};
config = mkIf cfg.enable {
users.users.borg.home = cfg.path;
services.borgbackup.repos = {
"metis" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDnc1gCi8lbhlLmPKvaExtCxVaAni8RrOuHUQO6wTbzR root@metis"
];
path = "${cfg.path}/metis";
quota = "1T";
};
"gorgon" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP6p9b2D7y2W+9BGee2yk2xsCRewNNaE6oS3CqlW61ti root@gorgon"
];
path = "${cfg.path}/gorgon";
quota = "1T";
};
"stolas" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINC/mVYd3o7oA0dsA58CgkqR40CSfeuU+rikleSrSXFz dadada@gorgon"
];
path = "${cfg.path}/stolas";
quota = "1T";
};
"surgat" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGhatanrNG+M6jAkU7Yi44mJmTreJkqyZ6Z+qiEgV7O root@surgat"
];
path = "${cfg.path}/surgat";
quota = "50G";
};
"pruflas" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBk7f9DSnXCOIUsxFsjCKG23vHShV4TSzzPJunPOwa1I root@pruflas"
];
path = "${cfg.path}/pruflas";
quota = "50G";
};
"wohnzimmerpi" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK6uZ8mPQJWOL984gZKKPyxp7VLcxk42TpTh5iPP6N6k root@wohnzimmerpi"
];
path = "${cfg.path}/wohnzimmerpi";
quota = "50G";
};
"fginfo" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxsyJeZVlVix0FPE8S/Gx0DVutS1ZNESVdYvHBwo36wGlYpSsQoSy/2HSwbpxs88MOGw1QNboxvvpBxCWxZ5HyjxuO5SwYgtmpjPXvmqfVqNXXnLChhSnKgk9b+HesQJCbHyrF9ZAJXEFCOGhOL3YTgd6lTX3lQUXgh/LEDlrPrigUMDNPecPWxpPskP6Vvpe9u+duhL+ihyxXaV+CoPk8nkWrov5jCGPiM48pugbwAfqARyZDgFpmWwL7Xg2UKgVZ1ttHZCWwH+htgioVZMYpdkQW1aq6LLGwN34Hj2VKXzmJN5frh6vQoZr2AFGHNKyJwAMpqnoY//QwuREpZTrh root@fginfo.ibr.cs.tu-bs.de"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII9N+E5fXHBL2juml+zeq/0auvqeQ5D+ljUE+EOY8cQ2 flareflo@flareflo-desktop" # restore from backup
];
path = "${cfg.path}/fginfo";
quota = "50G";
};
"fginfo-git" = {
allowSubRepos = false;
authorizedKeysAppendOnly = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmI6cUv3j0T9ofFB286sDwXwwczqi41cp4MZyGH3VWQnqBPNjICqAdY3CLhgvGBCxSe6ZgKQ+5YLsGSSlU1uhrJXW2UiVKuIPd0kjMF/9e8hmNoTTh0pdk9THfz9LLAdI1vPin1EeVReuDXlZkCI7DFYuTO9yiyZ1uLZUfT1KBRoqiqyypZhut7zT3UaDs2L+Y5hho6WiTdm7INuz6HEB7qYXzrmx93hlcuLZA7fDfyMO9F4APZFUqefcUIEyDI2b+Q/8Q2/rliT2PoC69XLVlj7HyVhfgKsOnopwBDNF3rRcJ6zz4WICPM18i4ZCmfoDTL/cFr5c41Lan1X7wS5wR root@fginfo-git"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII9N+E5fXHBL2juml+zeq/0auvqeQ5D+ljUE+EOY8cQ2 flareflo@flareflo-desktop" # restore from backup
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHCNSecnVGNPpX2BEvP7EkkHzx46RzJ1L3eaAyIfLYRB flareflo@Dragoncave" # restore from backup
];
path = "${cfg.path}/fginfo-git";
quota = "50G";
};
};
systemd.tmpfiles.rules = [
"d ${cfg.path} 0750 ${config.users.users.borg.name} ${config.users.users.borg.group} - -"
];
};
}

94
nixos/modules/ddns.nix Normal file
View file

@ -0,0 +1,94 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.ddns;
ddnsConfig =
{
domains,
credentialsPath,
interface,
}:
{
systemd.timers = listToAttrs (
forEach domains (
domain:
nameValuePair "ddns-${domain}" {
wantedBy = [ "timers.target" ];
partOf = [ "ddns-${domain}.service" ];
timerConfig.OnCalendar = "hourly";
}
)
);
systemd.services = listToAttrs (
forEach domains (
domain:
nameValuePair "ddns-${domain}" {
serviceConfig = {
Type = "oneshot";
PrivateTmp = true;
PrivateDevices = true;
PrivateUsers = true;
PrivateMounts = true;
PrivateIPC = true;
ProtectHome = true;
ProtectSystem = "strict";
ProtectKernelTunables = true;
BindReadOnlyPaths = [ credentialsPath ];
NoNewPrivileges = true;
CapabilitBoundingSet = [ ];
};
script = ''
function url() {
echo "https://svc.joker.com/nic/update?username=$1&password=$2&hostname=$3"
}
IFS=':'
read -r user password < ${credentialsPath}
unset IFS
curl_url=$(url "$user" "$password" ${domain})
${pkgs.curl}/bin/curl --ipv4 "$curl_url" ${
if interface == null then "" else "--interface ${interface}"
} || true
${pkgs.curl}/bin/curl --ipv6 "$curl_url" ${
if interface == null then "" else "--interface ${interface}"
}
'';
}
)
);
};
in
{
options = {
dadada.ddns.domains = mkOption {
type = types.listOf types.str;
description = ''
Enables DDNS for these domains.
'';
example = ''
[ "example.com" ]
'';
default = [ ];
};
dadada.ddns.credentialsPath = mkOption {
type = types.path;
description = "Credentials file";
default = "/var/lib/ddns/credentials";
};
dadada.ddns.interface = mkOption {
type = types.nullOr types.str;
description = "Source interface to use";
default = null;
};
};
config = with cfg; ddnsConfig { inherit domains interface credentialsPath; };
}

16
nixos/modules/default.nix Normal file
View file

@ -0,0 +1,16 @@
{ lib, ... }:
with lib;
let
modules' =
dir:
filterAttrs (
name: type:
(name != "default.nix" && name != "profiles" && ((hasSuffix ".nix" name) || (type == "directory")))
) (builtins.readDir dir);
modules =
dir:
mapAttrs' (name: _: nameValuePair (removeSuffix ".nix" name) (import (dir + "/${name}"))) (
modules' dir
);
in
(modules ./.)

View file

@ -1,7 +1,13 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
let
cfg = config.dadada.element;
in {
in
{
options.dadada.element = {
enable = lib.mkEnableOption "Enable element webapp";
};
@ -32,4 +38,4 @@ in {
};
};
};
}
}

View file

@ -1,12 +1,16 @@
{ config, lib, ... }:
{
config,
lib,
...
}:
with lib;
let
cfg = config.dadada.fileShare;
sharePath = "/mnt/storage/share";
ipv6 = "fd42:dead:beef::/48";
ipv4 = "192.168.42.0/24";
allow = "192.168.42.0 fd42:dead:beef::";
in {
in
{
options.dadada.fileShare = {
enable = mkEnableOption "Enable file share server";
};
@ -18,11 +22,7 @@ in {
workgroup = WORKGROUP
server string = media
netbios name = media
security = user
#use sendfile = yes
#max protocol = smb2
hosts allow = ${allow} localhost
hosts deny = 0.0.0.0/0
security = user
guest account = nobody
map to guest = bad user
'';
@ -30,12 +30,13 @@ in {
public = {
path = sharePath;
browseable = "yes";
"read only" = "no";
"read only" = "yes";
"guest ok" = "yes";
"create mask" = "0644";
"directory mask" = "0755";
"force user" = "username";
"force group" = "groupname";
"guest only" = "yes";
"create mask" = "0660";
"directory mask" = "2770";
"force user" = "nobody";
"force group" = "nobody";
};
};
};
@ -47,4 +48,3 @@ in {
};
};
}

102
nixos/modules/gitea.nix Normal file
View file

@ -0,0 +1,102 @@
{
config,
pkgs,
lib,
...
}:
let
cfg = config.dadada.forgejo;
in
{
options.dadada.forgejo = {
enable = lib.mkEnableOption "Enable forgejo";
};
config = lib.mkIf cfg.enable {
services.forgejo = {
enable = true;
user = "gitea";
group = "gitea";
stateDir = "/var/lib/gitea";
database = {
type = "postgres";
name = "gitea";
user = "gitea";
};
settings = {
DEFAULT.APP_NAME = "dadada forgejo";
service = {
DISABLE_REGISTRATION = true;
};
sessions = {
COOKIE_SECURE = true;
};
server = {
ROOT_URL = "https://git.dadada.li/";
PROTOCOL = "http+unix";
LANDING_PAGE = "explore";
OFFLINE_MODE = true;
DISABLE_SSH = false;
# Use built-in SSH server
START_SSH_SERVER = true;
SSH_PORT = 22;
DOMAIN = "git.dadada.li";
};
picture = {
DISABLE_GRAVATAR = true;
REPOSITORY_AVATAR_FALLBACK = "random";
ENABLE_FEDERATED_AVATAR = false;
};
other = {
SHOW_FOOTER_BRANDING = false;
SHOW_FOOTER_VERSION = false;
SHOW_FOOTER_TEMPLATE_LOAD_TIME = false;
};
log = {
DISABLE_ROUTER_LOG = true;
LEVEL = "Error";
};
cache = {
ENABLE = true;
ADAPTER = "redis";
HOST = "network=unix,addr=${config.services.redis.servers.forgejo.unixSocket},db=0,pool_size=100,idle_timeout=180";
};
};
};
services.redis = {
servers.forgejo = {
enable = true;
user = config.services.forgejo.user;
};
vmOverCommit = true;
};
systemd.services.forgejo.serviceConfig = {
AmbientCapabilities = lib.mkForce "CAP_NET_BIND_SERVICE";
CapabilityBoundingSet = lib.mkForce "CAP_NET_BIND_SERVICE";
PrivateUsers = lib.mkForce false;
};
services.nginx.virtualHosts."git.${config.networking.domain}" = {
enableACME = true;
forceSSL = true;
locations."/".extraConfig = ''
proxy_pass http://unix:/run/forgejo/forgejo.sock:/;
'';
};
users.users.gitea = {
home = "/var/lib/gitea";
useDefaultShell = true;
group = "gitea";
isSystemUser = true;
};
users.groups.gitea = { };
};
}

View file

@ -0,0 +1,30 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.headphones;
in
{
options = {
dadada.headphones = {
enable = mkEnableOption "Enable bluetooth headphones with more audio codecs.";
};
};
config = mkIf cfg.enable {
hardware = {
bluetooth.enable = true;
pulseaudio = {
enable = true;
extraModules = [ pkgs.pulseaudio-modules-bt ];
extraConfig = ''
set-source-volume 1 10000
'';
package = pkgs.pulseaudioFull;
};
};
};
}

View file

@ -0,0 +1,27 @@
{
config,
lib,
...
}:
let
cfg = config.dadada.homepage;
in
with lib;
{
options.dadada.homepage = {
enable = mkEnableOption "Enable home page";
package = mkOption {
type = lib.types.path;
description = "Path containing the homepage";
};
};
config = mkIf cfg.enable {
services.nginx.enable = true;
services.nginx.virtualHosts."dadada.li" = {
enableACME = true;
forceSSL = true;
root = "${cfg.package}";
};
};
}

20
nixos/modules/inputs.nix Normal file
View file

@ -0,0 +1,20 @@
{
config,
pkgs,
lib,
...
}:
let
cfg = config.dadada.inputs;
in
{
options = {
dadada.inputs = lib.mkOption {
type = lib.types.attrsOf lib.types.attrs;
description = "Flake inputs that should be available inside Nix modules";
default = { };
};
};
config = { };
}

View file

@ -0,0 +1,37 @@
{ config, lib, ... }:
let
cfg = config.dadada.miniflux;
domain = "miniflux.${config.networking.domain}";
adminCredentialsFile = "miniflux-admin-credentials";
in
{
options.dadada.miniflux = {
enable = lib.mkEnableOption "Enable miniflux RSS aggregator";
};
config = lib.mkIf cfg.enable {
services.miniflux = {
enable = true;
config = {
CLEANUP_FREQUENCY = "48";
LISTEN_ADDR = "localhost:8080";
};
adminCredentialsFile = config.age.secrets.${adminCredentialsFile}.path;
};
services.nginx.virtualHosts.${domain} = {
enableACME = true;
forceSSL = true;
locations."/".extraConfig = ''
proxy_pass http://localhost:8080/;
'';
};
age.secrets.${adminCredentialsFile} = {
file = "${config.dadada.secrets.path}/${adminCredentialsFile}.age";
mode = "0600";
};
};
}

View file

@ -0,0 +1,10 @@
{ config, lib, ... }:
{
options = {
dadada.pkgs = lib.mkOption {
type = lib.types.attrsOf lib.types.package;
description = "Additional packages that are not sourced from nixpkgs";
default = { };
};
};
}

View file

@ -0,0 +1,28 @@
{ config, lib, ... }:
let
secretsPath = config.dadada.secrets.path;
in
{
dadada.backupClient.bs = {
enable = lib.mkDefault false;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase".path;
sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path;
};
dadada.backupClient.backup1 = {
enable = lib.mkDefault true;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase".path;
sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path;
};
dadada.backupClient.backup2 = {
enable = lib.mkDefault false;
passphrasePath = config.age.secrets."${config.networking.hostName}-backup-passphrase".path;
sshIdentityFile = config.age.secrets."${config.networking.hostName}-backup-ssh-key".path;
};
age.secrets."${config.networking.hostName}-backup-passphrase".file =
"${secretsPath}/${config.networking.hostName}-backup-passphrase.age";
age.secrets."${config.networking.hostName}-backup-ssh-key".file =
"${secretsPath}/${config.networking.hostName}-backup-ssh-key.age";
}

View file

@ -0,0 +1,74 @@
{
config,
lib,
pkgs,
...
}:
let
mkDefault = lib.mkDefault;
inputs = config.dadada.inputs;
in
{
imports = [
./upgrade-pg-cluster.nix
];
boot.tmp.useTmpfs = lib.mkDefault true;
boot.tmp.tmpfsSize = lib.mkDefault "50%";
i18n.defaultLocale = mkDefault "en_US.UTF-8";
console = mkDefault {
font = "Lat2-Terminus16";
keyMap = "us";
};
i18n.supportedLocales = mkDefault [
"C.UTF-8/UTF-8"
"en_US.UTF-8/UTF-8"
"de_DE.UTF-8/UTF-8"
];
time.timeZone = mkDefault "Europe/Berlin";
nix.package = pkgs.lix;
nix.settings.substituters = [ "https://cache.nixos.org/" ];
nix.settings.trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"gorgon:eEE/PToceRh34UnnoFENERhk89dGw5yXOpJ2CUbfL/Q="
];
nix.settings.require-sigs = true;
nix.settings.auto-optimise-store = true;
nix.gc = {
automatic = true;
dates = "daily";
options = "--delete-older-than 3d";
};
nix.extraOptions = ''
experimental-features = nix-command flakes
'';
networking.networkmanager.dns = mkDefault "systemd-resolved";
networking.hosts = {
"fd42:9c3b:f96d:101:4a21:bff:fe3e:9cfe" = [ "backup1.dadada.li" ];
};
services.resolved = {
enable = mkDefault true;
fallbackDns = [
"9.9.9.9#dns.quad9.net"
"2620:fe::fe:11#dns11.quad9.net"
];
};
programs.zsh.enable = mkDefault true;
# Avoid some bots
services.openssh.ports = [ 2222 ];
}

View file

@ -0,0 +1,54 @@
{ config, lib, ... }:
let
secretsPath = config.dadada.secrets.path;
initrdHostKey = "${config.networking.hostName}-ssh_host_ed25519_key";
in
{
imports = [
./server.nix
];
boot.initrd.availableKernelModules = [ "virtio-pci" ];
boot.kernelParams = [
# Wait forever for the filesystem root to show up
"rootflags=x-systemd.device-timeout=0"
# Wait forever to enter the LUKS passphrase via SSH
"rd.luks.options=timeout=0"
];
boot.initrd.network = {
enable = true;
ssh = {
enable = true;
port = 2223;
hostKeys = [
config.age.secrets."${initrdHostKey}".path
];
authorizedKeys =
with lib;
concatLists (
mapAttrsToList (
name: user: if elem "wheel" user.extraGroups then user.openssh.authorizedKeys.keys else [ ]
) config.users.users
);
};
postCommands = ''
echo 'cryptsetup-askpass' >> /root/.profile
'';
};
assertions = lib.singleton {
assertion =
(config.boot.initrd.network.ssh.hostKeys != [ ])
-> config.boot.loader.supportsInitrdSecrets == true;
message = "Refusing to store private keys in store";
};
age.secrets."${initrdHostKey}" = {
file = "${secretsPath}/initrd-${initrdHostKey}.age";
mode = "600";
path = "/etc/initrd/${initrdHostKey}";
symlink = false;
};
}

View file

@ -0,0 +1,7 @@
{ pkgs, inputs, ... }:
{
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.sharedModules = pkgs.lib.attrValues inputs.self.hmModules;
home-manager.users.dadada = inputs.self.hmConfigurations.dadada;
}

View file

@ -0,0 +1,52 @@
{
config,
lib,
...
}:
let
inputs = config.dadada.inputs;
in
with lib;
{
imports = [
./backup.nix
./base.nix
];
networking.domain = mkDefault "dadada.li";
services.fwupd.enable = mkDefault true;
programs.ssh.enableAskPassword = true;
programs.nix-ld.enable = true;
nix.nixPath = mapAttrsToList (name: value: "${name}=${value}") inputs;
nix.registry = mkForce (mapAttrs' (name: value: nameValuePair name { flake = value; }) inputs);
nix.settings.flake-registry = "${config.dadada.inputs.flake-registry}/flake-registry.json";
age.identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
users.mutableUsers = true;
# Use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = mkDefault true;
boot.loader.efi.canTouchEfiVariables = mkDefault true;
services.fstrim.enable = mkDefault true;
services.avahi.enable = mkDefault true;
networking.networkmanager.enable = mkDefault true;
networking.firewall.enable = mkDefault true;
xdg.mime.enable = mkDefault true;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
};
services.pulseaudio.enable = false;
security.sudo.wheelNeedsPassword = true;
}

View file

@ -0,0 +1,42 @@
{
config,
pkgs,
lib,
...
}:
with lib;
{
imports = [
./backup.nix
./base.nix
];
networking.domain = mkDefault "dadada.li";
networking.tempAddresses = "disabled";
dadada.admin.enable = true;
documentation.enable = mkDefault false;
documentation.nixos.enable = mkDefault false;
services.btrfs.autoScrub.enable = mkDefault (
(filterAttrs (name: fs: fs.fsType == "btrfs") config.fileSystems) != { }
);
services.journald.extraConfig = ''
SystemKeepFree = 2G
MaxRetentionSec = 100days
'';
system.autoUpgrade = {
enable = true;
flake = "https://git.dadada.li/dadada/nix-config/archive/main.tar.gz#${config.networking.hostName}";
allowReboot = mkDefault false;
randomizedDelaySec = "45min";
};
security.acme = {
defaults.email = "d553a78d-0349-48db-9c20-5b27af3a1dfc@dadada.li";
acceptTerms = true;
};
}

View file

@ -0,0 +1,37 @@
{
config,
pkgs,
lib,
...
}:
{
environment.systemPackages = lib.mkIf config.services.postgresql.enable [
(
let
# Do not forget to list the extensions you need.
newPostgres = pkgs.postgresql_15.withPackages (pp: [ ]);
in
pkgs.writeScriptBin "upgrade-pg-cluster" ''
set -eux
# XXX it's perhaps advisable to stop all services that depend on postgresql
systemctl stop postgresql
export NEWDATA="/var/lib/postgresql/${newPostgres.psqlSchema}"
export NEWBIN="${newPostgres}/bin"
export OLDDATA="${config.services.postgresql.dataDir}"
export OLDBIN="${config.services.postgresql.package}/bin"
install -d -m 0700 -o postgres -g postgres "$NEWDATA"
cd "$NEWDATA"
sudo -u postgres $NEWBIN/initdb -D "$NEWDATA"
sudo -u postgres $NEWBIN/pg_upgrade \
--old-datadir "$OLDDATA" --new-datadir "$NEWDATA" \
--old-bindir $OLDBIN --new-bindir $NEWBIN \
"$@"
''
)
];
}

10
nixos/modules/secrets.nix Normal file
View file

@ -0,0 +1,10 @@
{ config, lib, ... }:
{
options = {
dadada.secrets.path = lib.mkOption {
type = lib.types.path;
description = "Path to encrypted secrets files";
default = ../../secrets;
};
};
}

View file

@ -1,9 +1,14 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.share;
in {
in
{
options.dadada.share = {
enable = mkEnableOption "Enable file share";
};
@ -27,4 +32,3 @@ in {
};
};
}

View file

@ -1,17 +1,22 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.steam;
in {
options.dadada.steam = {
enable = mkEnableOption "Enable Steam config";
in
{
options = {
dadada.steam = {
enable = mkEnableOption "Enable Steam config";
};
};
config = mkIf cfg.enable {
nixpkgs.config.allowUnfree = true;
hardware.opengl = {
hardware.graphics = {
enable = true;
driSupport32Bit = true;
extraPackages32 = with pkgs.pkgsi686Linux; [ libva ];
};

View file

@ -0,0 +1,66 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.vpnServer;
wgPeer =
{ name, ... }:
{
options = {
name = mkOption {
internal = true;
default = name;
};
id = mkOption {
description = "VPN client id";
default = 0;
type = types.str;
};
key = mkOption {
description = "VPN client public key";
default = "";
type = types.str;
};
};
};
in
{
options.dadada.vpnServer = {
enable = mkEnableOption "Enable wireguard gateway";
peers = mkOption {
description = "Set of extensions and public keys of peers";
type = with types; attrsOf (submodule wgPeer);
default = { };
};
};
config = mkIf cfg.enable {
networking.wireguard = {
enable = true;
interfaces."wg0" = {
allowedIPsAsRoutes = true;
privateKeyFile = "/var/lib/wireguard/wg0-key";
ips = [ "fd42:9c3b:f96d:0201::0/64" ];
listenPort = 51234;
peers = map (peer: {
allowedIPs = [ "fd42:9c3b:f96d:0201::${peer.id}/128" ];
publicKey = peer.key;
}) (attrValues cfg.peers);
postSetup = ''
wg set wg0 fwmark 51234
ip -6 route add table 2468 fd42:9c3b:f96d::/48 dev ens3
ip -6 route add table 2468 fd42:9c3b:f96d:201::/64 dev wg0
ip -6 rule add fwmark 51234 table 2468
'';
};
};
boot.kernel.sysctl = {
# Enable forwarding for VPN
"net.ipv6.conf.wg0.forwarding" = true;
"net.ipv6.conf.ens3.forwarding" = true;
};
};
}

View file

@ -1,9 +1,14 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.dadada.weechat;
in {
in
{
options.dadada.weechat = {
enable = mkEnableOption "Enable weechat relay";
};
@ -31,7 +36,7 @@ in {
};
};
services.nginx.virtualHosts."weechat.dadada.li" = {
useACMEHost = "webchat.dadada.li";
enableACME = true;
forceSSL = true;
root = "${pkgs.nginx}/html";
@ -55,4 +60,3 @@ in {
};
};
}

53
nixos/modules/yubikey.nix Normal file
View file

@ -0,0 +1,53 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
yubikey = config.dadada.yubikey;
in
{
options = {
dadada.yubikey = {
enable = mkEnableOption "Enable Yubikey";
fido2Credentials = mkOption {
type = with types; listOf str;
description = "FIDO2 credential strings";
default = [ ];
};
luksUuid = mkOption {
type = with types; nullOr str;
description = "Device UUID";
default = null;
};
};
};
config = mkIf yubikey.enable {
security.pam = {
# Keys must be placed in $XDG_CONFIG_HOME/Yubico/u2f_keys
services = {
login.u2fAuth = true;
sudo.u2fAuth = true;
};
u2f = {
control = "sufficient";
settings.cue = true;
};
};
services.pcscd.enable = true;
services.udev.packages = [ pkgs.yubikey-personalization ];
environment.systemPackages = with pkgs; [
#fido2luks
#linuxPackages.acpi_call
pam_u2f
pamtester
yubioath-flutter
];
};
}

Some files were not shown because too many files have changed in this diff Show more