mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 09:07:21 +01:00
feat: jenkins + darwin (and linting)
This commit is contained in:
parent
d2c8805e5b
commit
6338497d5f
42 changed files with 841 additions and 602 deletions
File diff suppressed because it is too large
Load diff
21
flake.lock
generated
21
flake.lock
generated
|
|
@ -534,6 +534,26 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nix-darwin": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1729579044,
|
||||||
|
"narHash": "sha256-0kEUVl5s8LHbK4/xEePflsdYVwG+RRFSIofSvITYmIU=",
|
||||||
|
"owner": "lnl7",
|
||||||
|
"repo": "nix-darwin",
|
||||||
|
"rev": "64d9d1ae25215c274c37e3e4016977a6779cf0d3",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "lnl7",
|
||||||
|
"repo": "nix-darwin",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nix-filter": {
|
"nix-filter": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710156097,
|
"lastModified": 1710156097,
|
||||||
|
|
@ -1069,6 +1089,7 @@
|
||||||
"impermanence": "impermanence",
|
"impermanence": "impermanence",
|
||||||
"lanzaboote": "lanzaboote",
|
"lanzaboote": "lanzaboote",
|
||||||
"nix-alien": "nix-alien",
|
"nix-alien": "nix-alien",
|
||||||
|
"nix-darwin": "nix-darwin",
|
||||||
"nix-index-database": "nix-index-database_2",
|
"nix-index-database": "nix-index-database_2",
|
||||||
"nix-on-droid": "nix-on-droid",
|
"nix-on-droid": "nix-on-droid",
|
||||||
"nixgl": "nixgl",
|
"nixgl": "nixgl",
|
||||||
|
|
|
||||||
30
flake.nix
30
flake.nix
|
|
@ -84,8 +84,8 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
disko = {
|
disko = {
|
||||||
url = "github:nix-community/disko";
|
url = "github:nix-community/disko";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
impermanence.url = "github:nix-community/impermanence";
|
impermanence.url = "github:nix-community/impermanence";
|
||||||
|
|
@ -98,6 +98,12 @@
|
||||||
url = "github:TamtamHero/fw-fanctrl/packaging/nix";
|
url = "github:TamtamHero/fw-fanctrl/packaging/nix";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nix-darwin = {
|
||||||
|
url = "github:lnl7/nix-darwin";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs =
|
outputs =
|
||||||
|
|
@ -105,6 +111,7 @@
|
||||||
, nixpkgs
|
, nixpkgs
|
||||||
, nixpkgs-stable
|
, nixpkgs-stable
|
||||||
, home-manager
|
, home-manager
|
||||||
|
, nix-darwin
|
||||||
, systems
|
, systems
|
||||||
, ...
|
, ...
|
||||||
}:
|
}:
|
||||||
|
|
@ -251,11 +258,22 @@
|
||||||
|
|
||||||
homeConfigurations = {
|
homeConfigurations = {
|
||||||
|
|
||||||
"swarsel@home-manager" = inputs.home-manager.lib.homeManagerConfiguration {
|
"swarsel@home-manager" = inputs.home-manager.lib.homeManagerConfiguration {
|
||||||
pkgs = pkgsFor.x86_64-linux;
|
pkgs = pkgsFor.x86_64-linux;
|
||||||
extraSpecialArgs = { inherit inputs outputs; };
|
extraSpecialArgs = { inherit inputs outputs; };
|
||||||
modules = homeModules ++ mixedModules ++ [
|
modules = homeModules ++ mixedModules ++ [
|
||||||
./profiles/home-manager
|
./profiles/home-manager
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
darwinConfigurations = {
|
||||||
|
|
||||||
|
"nbm-imba-166" = inputs.nix-darwin.lib.darwinSystem {
|
||||||
|
specialArgs = { inherit inputs outputs; };
|
||||||
|
modules = [
|
||||||
|
./profiles/nbm-imba-166
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -264,7 +282,7 @@
|
||||||
nixOnDroidConfigurations = {
|
nixOnDroidConfigurations = {
|
||||||
|
|
||||||
mysticant = inputs.nix-on-droid.lib.nixOnDroidConfiguration {
|
mysticant = inputs.nix-on-droid.lib.nixOnDroidConfiguration {
|
||||||
pkgs = pkgsFor.aarch64-linux;
|
pkgs = pkgsFor.aarch64-linux;
|
||||||
modules = [
|
modules = [
|
||||||
./profiles/mysticant
|
./profiles/mysticant
|
||||||
];
|
];
|
||||||
|
|
|
||||||
4
modules/home/darwin.nix
Normal file
4
modules/home/darwin.nix
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
{ lib, config, ... }:
|
||||||
|
{
|
||||||
|
options.swarselsystems.isDarwin = lib.mkEnableOption "darwin host";
|
||||||
|
}
|
||||||
|
|
@ -4,6 +4,7 @@
|
||||||
monitors = import ./monitors.nix;
|
monitors = import ./monitors.nix;
|
||||||
input = import ./input.nix;
|
input = import ./input.nix;
|
||||||
nixos = import ./nixos.nix;
|
nixos = import ./nixos.nix;
|
||||||
|
darwin = import ./darwin.nix;
|
||||||
waybar = import ./waybar.nix;
|
waybar = import ./waybar.nix;
|
||||||
startup = import ./startup.nix;
|
startup = import ./startup.nix;
|
||||||
wallpaper = import ./wallpaper.nix;
|
wallpaper = import ./wallpaper.nix;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ lib, config, ... }:
|
{ lib, ... }:
|
||||||
let
|
let
|
||||||
inherit (lib) mkOption types;
|
inherit (lib) mkOption types;
|
||||||
in
|
in
|
||||||
|
|
|
||||||
|
|
@ -23,4 +23,5 @@ in
|
||||||
options.swarselsystems.server.syncthing = lib.mkEnableOption "enable syncthing on server";
|
options.swarselsystems.server.syncthing = lib.mkEnableOption "enable syncthing on server";
|
||||||
options.swarselsystems.server.restic = lib.mkEnableOption "enable restic backups on server";
|
options.swarselsystems.server.restic = lib.mkEnableOption "enable restic backups on server";
|
||||||
options.swarselsystems.server.monitoring = lib.mkEnableOption "enable monitoring on server";
|
options.swarselsystems.server.monitoring = lib.mkEnableOption "enable monitoring on server";
|
||||||
|
options.swarselsystems.server.jenkins = lib.mkEnableOption "enable jenkins on server";
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
{ inputs, ... }: {
|
{ inputs, ... }: {
|
||||||
additions = final: _prev: import ../pkgs { pkgs = final; };
|
additions = final: _prev: import ../pkgs { pkgs = final; };
|
||||||
modifications = final: _prev: {
|
modifications = _: _prev: {
|
||||||
vesktop = _prev.vesktop.override {
|
vesktop = _prev.vesktop.override {
|
||||||
withSystemVencord = true;
|
withSystemVencord = true;
|
||||||
};
|
};
|
||||||
|
|
@ -41,7 +41,7 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
zjstatus = final: _prev: {
|
zjstatus = _: _prev: {
|
||||||
zjstatus = inputs.zjstatus.packages.${_prev.system}.default;
|
zjstatus = inputs.zjstatus.packages.${_prev.system}.default;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,7 +0,0 @@
|
||||||
{ writeShellApplication, kitty, element-desktop-wayland, discord, spotify-player, sway, jq }:
|
|
||||||
|
|
||||||
writeShellApplication {
|
|
||||||
name = "swarselcheck";
|
|
||||||
runtimeInputs = [ jq ];
|
|
||||||
text = builtins.readFile ../../scripts/check.sh;
|
|
||||||
}
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ writeShellApplication, sway }:
|
{ writeShellApplication }:
|
||||||
|
|
||||||
writeShellApplication {
|
writeShellApplication {
|
||||||
name = "fs-diff";
|
name = "fs-diff";
|
||||||
|
|
|
||||||
|
|
@ -1,7 +0,0 @@
|
||||||
{ writeShellApplication, libnotify, pass, fuzzel, wtype }:
|
|
||||||
|
|
||||||
writeShellApplication {
|
|
||||||
name = "pass-fuzzel-otp";
|
|
||||||
runtimeInputs = [ fuzzel (pass.withExtensions (exts: [ exts.pass-otp ])) ];
|
|
||||||
text = builtins.readFile ../../scripts/pass-fuzzel-otp.sh;
|
|
||||||
}
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ writeShellApplication, kitty, element-desktop-wayland, vesktop, spotify-player, sway, jq }:
|
{ writeShellApplication, kitty, element-desktop-wayland, vesktop, spotify-player, jq }:
|
||||||
|
|
||||||
writeShellApplication {
|
writeShellApplication {
|
||||||
name = "swarselcheck";
|
name = "swarselcheck";
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, pkgs, lib, ... }:
|
{ config, lib, ... }:
|
||||||
let
|
let
|
||||||
inherit (config.swarselsystems) monitors;
|
inherit (config.swarselsystems) monitors;
|
||||||
eachMonitor = _name: monitor: {
|
eachMonitor = _name: monitor: {
|
||||||
|
|
|
||||||
|
|
@ -24,7 +24,7 @@ _:
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
xdg.configFile = {
|
xdg.configFile = {
|
||||||
"tridactyl/tridactylrc".source = ../../../programs/firefox/tridactyl/tridactylrc;
|
"tridactyl/tridactylrc".source = ../../../programs/firefox/tridactyl/tridactylrc;
|
||||||
"tridactyl/themes/base16-codeschool.css".source = ../../../programs/firefox/tridactyl/themes/base16-codeschool.css;
|
"tridactyl/themes/base16-codeschool.css".source = ../../../programs/firefox/tridactyl/themes/base16-codeschool.css;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, ... }:
|
||||||
{
|
{
|
||||||
programs.waybar = {
|
programs.waybar = {
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,36 +1,37 @@
|
||||||
{ pkgs, config, ... }:
|
_:
|
||||||
let
|
# { pkgs, config, ... }:
|
||||||
inherit (config.lib.stylix) colors;
|
# let
|
||||||
sesh = pkgs.writeScriptBin "sesh" ''
|
# inherit (config.lib.stylix) colors;
|
||||||
#! /usr/bin/env sh
|
# sesh = pkgs.writeScriptBin "sesh" ''
|
||||||
|
# #! /usr/bin/env sh
|
||||||
|
|
||||||
# Taken from https://github.com/zellij-org/zellij/issues/884#issuecomment-1851136980
|
# # Taken from https://github.com/zellij-org/zellij/issues/884#issuecomment-1851136980
|
||||||
# select a directory using zoxide
|
# # select a directory using zoxide
|
||||||
ZOXIDE_RESULT=$(zoxide query --interactive)
|
# ZOXIDE_RESULT=$(zoxide query --interactive)
|
||||||
# checks whether a directory has been selected
|
# # checks whether a directory has been selected
|
||||||
if [[ -z "$ZOXIDE_RESULT" ]]; then
|
# if [[ -z "$ZOXIDE_RESULT" ]]; then
|
||||||
# if there was no directory, select returns without executing
|
# # if there was no directory, select returns without executing
|
||||||
exit 0
|
# exit 0
|
||||||
fi
|
# fi
|
||||||
# extracts the directory name from the absolute path
|
# # extracts the directory name from the absolute path
|
||||||
SESSION_TITLE=$(echo "$ZOXIDE_RESULT" | sed 's#.*/##')
|
# SESSION_TITLE=$(echo "$ZOXIDE_RESULT" | sed 's#.*/##')
|
||||||
|
|
||||||
# get the list of sessions
|
# # get the list of sessions
|
||||||
SESSION_LIST=$(zellij list-sessions -n | awk '{print $1}')
|
# SESSION_LIST=$(zellij list-sessions -n | awk '{print $1}')
|
||||||
|
|
||||||
# checks if SESSION_TITLE is in the session list
|
# # checks if SESSION_TITLE is in the session list
|
||||||
if echo "$SESSION_LIST" | grep -q "^$SESSION_TITLE$"; then
|
# if echo "$SESSION_LIST" | grep -q "^$SESSION_TITLE$"; then
|
||||||
# if so, attach to existing session
|
# # if so, attach to existing session
|
||||||
zellij attach "$SESSION_TITLE"
|
# zellij attach "$SESSION_TITLE"
|
||||||
else
|
# else
|
||||||
# if not, create a new session
|
# # if not, create a new session
|
||||||
echo "Creating new session $SESSION_TITLE and CD $ZOXIDE_RESULT"
|
# echo "Creating new session $SESSION_TITLE and CD $ZOXIDE_RESULT"
|
||||||
cd $ZOXIDE_RESULT
|
# cd $ZOXIDE_RESULT
|
||||||
zellij attach -c "$SESSION_TITLE"
|
# zellij attach -c "$SESSION_TITLE"
|
||||||
fi
|
# fi
|
||||||
'';
|
# '';
|
||||||
|
|
||||||
in
|
# in
|
||||||
{
|
{
|
||||||
programs.zellij = {
|
programs.zellij = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, pkgs, ... }:
|
_:
|
||||||
{
|
{
|
||||||
services.logind = {
|
services.logind = {
|
||||||
lidSwitch = "suspend";
|
lidSwitch = "suspend";
|
||||||
|
|
|
||||||
|
|
@ -6,25 +6,25 @@
|
||||||
extraBackends = [ pkgs.sane-airscan ];
|
extraBackends = [ pkgs.sane-airscan ];
|
||||||
};
|
};
|
||||||
|
|
||||||
# enable discovery and usage of network devices (esp. printers)
|
# enable discovery and usage of network devices (esp. printers)
|
||||||
services.printing = {
|
services.printing = {
|
||||||
enable = true;
|
enable = true;
|
||||||
drivers = [
|
drivers = [
|
||||||
pkgs.gutenprint
|
pkgs.gutenprint
|
||||||
pkgs.gutenprintBin
|
pkgs.gutenprintBin
|
||||||
];
|
];
|
||||||
browsedConf = ''
|
browsedConf = ''
|
||||||
BrowseDNSSDSubTypes _cups,_print
|
BrowseDNSSDSubTypes _cups,_print
|
||||||
BrowseLocalProtocols all
|
BrowseLocalProtocols all
|
||||||
BrowseRemoteProtocols all
|
BrowseRemoteProtocols all
|
||||||
CreateIPPPrinterQueues All
|
CreateIPPPrinterQueues All
|
||||||
BrowseProtocols all
|
BrowseProtocols all
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
services.avahi = {
|
services.avahi = {
|
||||||
enable = true;
|
enable = true;
|
||||||
nssmdns4 = true;
|
nssmdns4 = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ lib, config, pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
programs.zsh.enable = true;
|
programs.zsh.enable = true;
|
||||||
users.defaultUserShell = pkgs.zsh;
|
users.defaultUserShell = pkgs.zsh;
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
{ config, lib, modulesPath, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
|
|
|
||||||
37
profiles/nbm-imba-166/default.nix
Normal file
37
profiles/nbm-imba-166/default.nix
Normal file
|
|
@ -0,0 +1,37 @@
|
||||||
|
{ inputs, outputs, config, pkgs, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
imports = [
|
||||||
|
inputs.home-manager.darwinModules.home-manager
|
||||||
|
{
|
||||||
|
home-manager.useGlobalPkgs = true;
|
||||||
|
home-manager.useUserPackages = true;
|
||||||
|
home-manager.users."leon.schwarzaeugl".imports = [
|
||||||
|
] ++ (builtins.attrValues outputs.homeManagerModules);
|
||||||
|
}
|
||||||
|
] ++ (builtins.attrValues outputs.nixosModules);
|
||||||
|
|
||||||
|
nix.settings.experimental-features = "nix-command flakes";
|
||||||
|
nixpkgs = {
|
||||||
|
hostPlatform = "x86_64-darwin";
|
||||||
|
inherit (outputs) overlays;
|
||||||
|
config = {
|
||||||
|
allowUnfree = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Auto upgrade nix package and the daemon service.
|
||||||
|
services.nix-daemon.enable = true;
|
||||||
|
services.karabiner-elements.enable = true;
|
||||||
|
|
||||||
|
home-manager.users."leon.schwarzaeugl".home.stateVersion = "23.05";
|
||||||
|
home-manager.users."leon.schwarzaeugl".swarselsystems = {
|
||||||
|
isDarwin = true;
|
||||||
|
isLaptop = true;
|
||||||
|
isNixos = false;
|
||||||
|
isBtrfs = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = 4;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -26,10 +26,12 @@
|
||||||
zsh.shellInit = ''
|
zsh.shellInit = ''
|
||||||
export CLAD="$(cat ${config.sops.secrets.clad.path})"
|
export CLAD="$(cat ${config.sops.secrets.clad.path})"
|
||||||
export DCAD="$(cat ${config.sops.secrets.dcad.path})"
|
export DCAD="$(cat ${config.sops.secrets.dcad.path})"
|
||||||
|
export GOVC_PASSWORD="$(cat ${config.sops.secrets.dcad.path})"
|
||||||
export WSAD="$(cat ${config.sops.secrets.wsad.path})"
|
export WSAD="$(cat ${config.sops.secrets.wsad.path})"
|
||||||
export IMBAD="$(cat ${config.sops.secrets.imbad.path})"
|
export IMBAD="$(cat ${config.sops.secrets.imbad.path})"
|
||||||
export DCUSER="dc_adm_schwarzaeugl@IMP.UNIVIE.AC.AT"
|
export DCUSER="dc_adm_schwarzaeugl@IMP.UNIVIE.AC.AT"
|
||||||
export PACKER_SSH_EXTRA_ARGS='"--scp-extra-args"',"\"'-O'\""
|
export GOVC_USERNAME="dc_adm_schwarzaeugl@IMP.UNIVIE.AC.AT"
|
||||||
|
export PACKER_SSH_EXTRA_ARGS='"--scp-extra-args","'-O'"'
|
||||||
'';
|
'';
|
||||||
|
|
||||||
browserpass.enable = true;
|
browserpass.enable = true;
|
||||||
|
|
@ -53,6 +55,7 @@
|
||||||
gnumake
|
gnumake
|
||||||
libisoburn
|
libisoburn
|
||||||
govc
|
govc
|
||||||
|
terraform
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -60,7 +63,7 @@
|
||||||
openssh = {
|
openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
syncthing = {
|
syncthing = {
|
||||||
|
|
|
||||||
|
|
@ -26,6 +26,7 @@
|
||||||
./syncthing.nix
|
./syncthing.nix
|
||||||
./restic.nix
|
./restic.nix
|
||||||
./monitoring.nix
|
./monitoring.nix
|
||||||
|
./jenkins.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
nix =
|
nix =
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.immich {
|
config = lib.mkIf config.swarselsystems.server.immich {
|
||||||
|
|
||||||
|
|
|
||||||
35
profiles/server/common/jenkins.nix
Normal file
35
profiles/server/common/jenkins.nix
Normal file
|
|
@ -0,0 +1,35 @@
|
||||||
|
{ pkgs, lib, config, ... }:
|
||||||
|
{
|
||||||
|
config = lib.mkIf config.swarselsystems.server.jenkins {
|
||||||
|
|
||||||
|
services.jenkins = {
|
||||||
|
enable = true;
|
||||||
|
withCLI = true;
|
||||||
|
port = 8088;
|
||||||
|
packages = [ pkgs.stdenv pkgs.git pkgs.jdk17 config.programs.ssh.package pkgs.nix ];
|
||||||
|
listenAddress = "127.0.0.1";
|
||||||
|
home = "/Vault/apps/jenkins";
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
services.nginx = {
|
||||||
|
virtualHosts = {
|
||||||
|
"servant.swarsel.win" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
acmeRoot = null;
|
||||||
|
locations = {
|
||||||
|
"/" = {
|
||||||
|
proxyPass = "http://localhost:8088";
|
||||||
|
extraConfig = ''
|
||||||
|
client_max_body_size 0;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, lib, pkgs, modulesPath, sops, ... }:
|
{ config, lib, pkgs, sops, ... }:
|
||||||
let
|
let
|
||||||
matrixDomain = "swatrix.swarsel.win";
|
matrixDomain = "swatrix.swarsel.win";
|
||||||
baseUrl = "https://${matrixDomain}";
|
baseUrl = "https://${matrixDomain}";
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.monitoring {
|
config = lib.mkIf config.swarselsystems.server.monitoring {
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
services = {
|
services = {
|
||||||
# add a user with sudo smbpasswd -a <user>
|
# add a user with sudo smbpasswd -a <user>
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.immich {
|
config = lib.mkIf config.swarselsystems.server.paperless {
|
||||||
|
|
||||||
users.users.paperless = {
|
users.users.paperless = {
|
||||||
extraGroups = [ "users" ];
|
extraGroups = [ "users" ];
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.restic {
|
config = lib.mkIf config.swarselsystems.server.restic {
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,53 +0,0 @@
|
||||||
{ pkgs, lib, config, ... }:
|
|
||||||
{
|
|
||||||
|
|
||||||
# Network shares
|
|
||||||
# add a user with sudo smbpasswd -a <user>
|
|
||||||
samba = {
|
|
||||||
package = pkgs.samba4Full;
|
|
||||||
extraConfig = ''
|
|
||||||
workgroup = WORKGROUP
|
|
||||||
server role = standalone server
|
|
||||||
dns proxy = no
|
|
||||||
|
|
||||||
pam password change = yes
|
|
||||||
map to guest = bad user
|
|
||||||
create mask = 0664
|
|
||||||
force create mode = 0664
|
|
||||||
directory mask = 0775
|
|
||||||
force directory mode = 0775
|
|
||||||
follow symlinks = yes
|
|
||||||
'';
|
|
||||||
|
|
||||||
# ^^ `samba4Full` is compiled with avahi, ldap, AD etc support compared to the default package, `samba`
|
|
||||||
# Required for samba to register mDNS records for auto discovery
|
|
||||||
# See https://github.com/NixOS/nixpkgs/blob/592047fc9e4f7b74a4dc85d1b9f5243dfe4899e3/pkgs/top-level/all-packages.nix#L27268
|
|
||||||
enable = true;
|
|
||||||
# openFirewall = true;
|
|
||||||
shares.Eternor = {
|
|
||||||
browseable = "yes";
|
|
||||||
"read only" = "no";
|
|
||||||
"guest ok" = "no";
|
|
||||||
path = "/Vault/Eternor";
|
|
||||||
writable = "true";
|
|
||||||
comment = "Eternor";
|
|
||||||
"valid users" = "@Swarsel";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
avahi = {
|
|
||||||
publish.enable = true;
|
|
||||||
publish.userServices = true;
|
|
||||||
# ^^ Needed to allow samba to automatically register mDNS records without the need for an `extraServiceFile`
|
|
||||||
nssmdns4 = true;
|
|
||||||
# ^^ Not one hundred percent sure if this is needed- if it aint broke, don't fix it
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
samba-wsdd = {
|
|
||||||
# This enables autodiscovery on windows since SMB1 (and thus netbios) support was discontinued
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, config, ... }:
|
{ config, ... }:
|
||||||
{
|
{
|
||||||
sops = {
|
sops = {
|
||||||
age.sshKeyPaths = [ "/etc/ssh/sops" ];
|
age.sshKeyPaths = [ "/etc/ssh/sops" ];
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.spotifyd {
|
config = lib.mkIf config.swarselsystems.server.spotifyd {
|
||||||
users.groups.spotifyd = {
|
users.groups.spotifyd = {
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.swarselsystems.server.syncthing {
|
config = lib.mkIf config.swarselsystems.server.syncthing {
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,2 +0,0 @@
|
||||||
{ pkgs, lib, config, ... }:
|
|
||||||
{ }
|
|
||||||
36
profiles/server/nbm-imba-166/default.nix
Normal file
36
profiles/server/nbm-imba-166/default.nix
Normal file
|
|
@ -0,0 +1,36 @@
|
||||||
|
{ inputs, outputs, config, pkgs, lib, ... }:
|
||||||
|
{
|
||||||
|
|
||||||
|
imports = [
|
||||||
|
inputs.home-manager.darwinModules.home-manager
|
||||||
|
{
|
||||||
|
home-manager.useGlobalPkgs = true;
|
||||||
|
home-manager.useUserPackages = true;
|
||||||
|
home-manager.users."leon.schwarzaeugl".imports = [
|
||||||
|
../../common/home/emacs.nix
|
||||||
|
] ++ (builtins.attrValues outputs.homeManagerModules);
|
||||||
|
}
|
||||||
|
] ++ (builtins.attrValues outputs.nixosModules);
|
||||||
|
|
||||||
|
nix.settings.experimental-features = "nix-command flakes";
|
||||||
|
nixpkgs = {
|
||||||
|
inherit (outputs) overlays;
|
||||||
|
config = {
|
||||||
|
allowUnfree = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Auto upgrade nix package and the daemon service.
|
||||||
|
services.nix-daemon.enable = true;
|
||||||
|
services.karabiner-elements.enable = true;
|
||||||
|
|
||||||
|
home-manager.users."leon.schwarzaeugl".swarselsystems = {
|
||||||
|
isDarwin = true;
|
||||||
|
isLaptop = true;
|
||||||
|
isNixos = false;
|
||||||
|
isBtrfs = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = 4;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ inputs, outputs, config, pkgs, lib, ... }:
|
{ inputs, outputs, config, ... }:
|
||||||
{
|
{
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
|
@ -54,6 +54,7 @@
|
||||||
transmission = true;
|
transmission = true;
|
||||||
syncthing = true;
|
syncthing = true;
|
||||||
monitoring = true;
|
monitoring = true;
|
||||||
|
jenkins = false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
{ config, lib, modulesPath, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
|
|
|
||||||
|
|
@ -179,17 +179,19 @@ create a new one."
|
||||||
(shell-command "nixpkgs-fmt . > /dev/null")))
|
(shell-command "nixpkgs-fmt . > /dev/null")))
|
||||||
|
|
||||||
(defun swarsel/org-babel-tangle-config ()
|
(defun swarsel/org-babel-tangle-config ()
|
||||||
|
(interactive)
|
||||||
(when (string-equal (buffer-file-name)
|
(when (string-equal (buffer-file-name)
|
||||||
swarsel-swarsel-org-filepath)
|
swarsel-swarsel-org-filepath)
|
||||||
;; Dynamic scoping to the rescue
|
;; Dynamic scoping to the rescue
|
||||||
(let ((org-confirm-babel-evaluate nil))
|
(let ((org-confirm-babel-evaluate nil))
|
||||||
;; (org-html-export-to-html)
|
;; (org-html-export-to-html)
|
||||||
(org-babel-tangle)
|
(org-babel-tangle)
|
||||||
(swarsel/run-formatting))))
|
;; (swarsel/run-formatting)
|
||||||
|
)))
|
||||||
|
|
||||||
(setq org-html-htmlize-output-type nil)
|
(setq org-html-htmlize-output-type nil)
|
||||||
|
|
||||||
(add-hook 'org-mode-hook (lambda () (add-hook 'after-save-hook #'swarsel/org-babel-tangle-config)))
|
;; (add-hook 'org-mode-hook (lambda () (add-hook 'after-save-hook #'swarsel/org-babel-tangle-config)))
|
||||||
|
|
||||||
(defun org-fold-outer ()
|
(defun org-fold-outer ()
|
||||||
(interactive)
|
(interactive)
|
||||||
|
|
@ -976,17 +978,19 @@ create a new one."
|
||||||
|
|
||||||
(setq org-fold-core-style 'overlays)
|
(setq org-fold-core-style 'overlays)
|
||||||
|
|
||||||
(org-babel-do-load-languages
|
(setq org-src-preserve-indentation nil)
|
||||||
'org-babel-load-languages
|
|
||||||
'((emacs-lisp . t)
|
|
||||||
(python . t)
|
|
||||||
(js . t)
|
|
||||||
(shell . t)
|
|
||||||
))
|
|
||||||
|
|
||||||
(push '("conf-unix" . conf-unix) org-src-lang-modes)
|
(org-babel-do-load-languages
|
||||||
|
'org-babel-load-languages
|
||||||
|
'((emacs-lisp . t)
|
||||||
|
(python . t)
|
||||||
|
(js . t)
|
||||||
|
(shell . t)
|
||||||
|
))
|
||||||
|
|
||||||
(setq org-export-with-broken-links 'mark)
|
(push '("conf-unix" . conf-unix) org-src-lang-modes)
|
||||||
|
|
||||||
|
(setq org-export-with-broken-links 'mark)
|
||||||
|
|
||||||
(require 'org-tempo)
|
(require 'org-tempo)
|
||||||
(add-to-list 'org-structure-template-alist '("sh" . "src shell"))
|
(add-to-list 'org-structure-template-alist '("sh" . "src shell"))
|
||||||
|
|
@ -1526,6 +1530,13 @@ create a new one."
|
||||||
|
|
||||||
(defalias 'start-lsp-server #'eglot)
|
(defalias 'start-lsp-server #'eglot)
|
||||||
|
|
||||||
|
(use-package sideline-flymake
|
||||||
|
:hook (flymake-mode . sideline-mode)
|
||||||
|
:init
|
||||||
|
(setq sideline-flymake-display-mode 'point) ; 'point to show errors only on point
|
||||||
|
; 'line to show errors on the current line
|
||||||
|
(setq sideline-backends-right '(sideline-flymake)))
|
||||||
|
|
||||||
(use-package breadcrumb
|
(use-package breadcrumb
|
||||||
;; :config (breadcrumb-mode)
|
;; :config (breadcrumb-mode)
|
||||||
)
|
)
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue