Compare commits
48 Commits
80508b51b3
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| 4abb2bf1eb | |||
| 9a336f76dc | |||
| b0d8309d65 | |||
| d319db25bb | |||
| 961e9c475e | |||
|
|
27fb3915b6 | ||
| 73de596c29 | |||
| 37a04ee295 | |||
| a175338e9d | |||
|
|
90a2fcdc43 | ||
| 1ed75f156b | |||
| 709f96436d | |||
| 367e86389a | |||
| e30d2d5641 | |||
| 5ad6fa0f09 | |||
|
|
c18d5adbc3 | ||
| 033dabbd17 | |||
| fcf06511d4 | |||
| f9bfcbac85 | |||
| 493f1bc25e | |||
| eacb5795b6 | |||
| bbda5534f4 | |||
| ee4185f519 | |||
| 0d693c6e11 | |||
| f5e8be7432 | |||
| 639dfb6276 | |||
| a89996a6df | |||
| ee4e8d6b1e | |||
| 9d061556ff | |||
| 3b7e77e9d8 | |||
| e105020552 | |||
|
|
933ebb980a | ||
|
|
bda184fc02 | ||
| c2dc087510 | |||
| 0c522ead1f | |||
|
|
1cb02d2249 | ||
|
|
06b4c1b187 | ||
|
|
7286b93459 | ||
|
|
7fa5f7e492 | ||
|
|
f5f8476652 | ||
| e7dead2c9e | |||
| b68f3829b7 | |||
| a7fa0cefc7 | |||
| 115a7c334b | |||
|
|
681759c8a7 | ||
|
|
3211b0c84f | ||
| 0f0d4ca519 | |||
| d7e1e8e018 |
71
CLAUDE.md
Normal file
71
CLAUDE.md
Normal file
@@ -0,0 +1,71 @@
|
|||||||
|
# CLAUDE.md
|
||||||
|
|
||||||
|
This file provides guidance to Claude Code (claude.ai/code) when working with code in this repository.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
NixOS dotfiles repository using Nix Flakes for managing multiple machines. Configuration is in French (comments, docs).
|
||||||
|
|
||||||
|
## Build & Deploy Commands
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Rebuild and switch configuration (local)
|
||||||
|
sudo nixos-rebuild switch --flake .#<hostname>
|
||||||
|
|
||||||
|
# Rebuild on remote machine
|
||||||
|
nixos-rebuild switch --flake .#<hostname> --target-host beastie@<ip> --sudo
|
||||||
|
|
||||||
|
# Bootstrap new machine with nixos-anywhere
|
||||||
|
nixos-anywhere --flake .#generic --target-host root@<ip> \
|
||||||
|
--generate-hardware-config nixos-generate-config ./hosts/generic/hardware-configuration.nix
|
||||||
|
|
||||||
|
# Generate custom ISO
|
||||||
|
nixos-generate --format iso --configuration ./iso/customiso.nix -o ~/Downloads/nixos.iso
|
||||||
|
|
||||||
|
# Update flake inputs
|
||||||
|
nix flake update
|
||||||
|
|
||||||
|
# Update secrets after adding new host key
|
||||||
|
sops updatekeys secrets.yaml
|
||||||
|
nix flake update mysecrets
|
||||||
|
```
|
||||||
|
|
||||||
|
## Architecture
|
||||||
|
|
||||||
|
**Flake Inputs:**
|
||||||
|
- `nixpkgs-stable` (25.05) and `nixpkgs-unstable` channels
|
||||||
|
- `disko` for declarative disk partitioning
|
||||||
|
- `sops-nix` for encrypted secrets
|
||||||
|
- `mysecrets` - local git repo at `/home/beastie/nixos/secrets` (required dependency)
|
||||||
|
|
||||||
|
**Hosts:** `generic` (ISO), `test-kvm` (stable), `home-nix` (unstable), `work-nix` (unstable)
|
||||||
|
|
||||||
|
**Module Hierarchy:**
|
||||||
|
1. `modules/core/` - Applied to ALL hosts (grub, ssh, packages, users, tty, system)
|
||||||
|
2. `modules/optionnals/` - Selectively imported per host
|
||||||
|
3. `modules/optionnals/hosts/<hostname>.nix` - Host-specific networking, services
|
||||||
|
4. `modules/optionnals/desktop/` - Desktop environment modules (Hyprland, apps)
|
||||||
|
|
||||||
|
## Key Patterns
|
||||||
|
|
||||||
|
**Custom Options** (`modules/optionnals/options.nix`):
|
||||||
|
- `my.laninterface`, `my.ipv4address`, `my.ipv4netmask`, `my.ipv4gateway`, `my.wolipv6address`
|
||||||
|
|
||||||
|
**Special Args** passed to all modules via flake.nix:
|
||||||
|
- `hostname` and `username` - used for host/user-specific configuration
|
||||||
|
|
||||||
|
**Secrets (sops-nix):**
|
||||||
|
- Encrypted YAML in separate `mysecrets` repo
|
||||||
|
- Referenced via `config.sops.secrets.<name>.path` or `config.sops.templates`
|
||||||
|
- Age encryption with SSH host keys
|
||||||
|
|
||||||
|
**XDG Config Distribution:**
|
||||||
|
- Desktop configs (hyprland, waybar, kitty, rofi) use `environment.etc."xdg/<app>".source`
|
||||||
|
- Host-specific variants: `hyprland-${hostname}.conf`
|
||||||
|
|
||||||
|
## Important Considerations
|
||||||
|
|
||||||
|
- Test changes on `test-kvm` before deploying to production hosts
|
||||||
|
- `mysecrets` flake input must exist locally at `/home/beastie/nixos/secrets`
|
||||||
|
- Different hosts use different `stateVersion` (25.05 vs 25.11)
|
||||||
|
- Core module changes affect ALL machines
|
||||||
51
flake.lock
generated
51
flake.lock
generated
@@ -3,15 +3,15 @@
|
|||||||
"disko": {
|
"disko": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs-unstable"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1758287904,
|
"lastModified": 1769524058,
|
||||||
"narHash": "sha256-IGmaEf3Do8o5Cwp1kXBN1wQmZwQN3NLfq5t4nHtVtcU=",
|
"narHash": "sha256-zygdD6X1PcVNR2PsyK4ptzrVEiAdbMqLos7utrMDEWE=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "67ff9807dd148e704baadbd4fd783b54282ca627",
|
"rev": "71a3fc97d80881e91710fe721f1158d3b96ae14d",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -23,11 +23,11 @@
|
|||||||
"mysecrets": {
|
"mysecrets": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1759883911,
|
"lastModified": 1769035388,
|
||||||
"narHash": "sha256-IAKCQ9dIeMAdoi4fQdJAdWlLrNh/PURqGz7pmlo9cUw=",
|
"narHash": "sha256-Uaih4r++akPmfACCTAUZ21tb5wKD6ms2dLtzqE8f304=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "7e39f4cde171d9273efddf2153d972d6fbf2a710",
|
"rev": "d3c44cb624ae2c1a13a172346fb5422d27e59348",
|
||||||
"revCount": 15,
|
"revCount": 20,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "file:///home/beastie/nixos/secrets"
|
"url": "file:///home/beastie/nixos/secrets"
|
||||||
},
|
},
|
||||||
@@ -36,13 +36,29 @@
|
|||||||
"url": "file:///home/beastie/nixos/secrets"
|
"url": "file:///home/beastie/nixos/secrets"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1760038930,
|
"lastModified": 1767313136,
|
||||||
"narHash": "sha256-Oncbh0UmHjSlxO7ErQDM3KM0A5/Znfofj2BSzlHLeVw=",
|
"narHash": "sha256-16KkgfdYqjaeRGBaYsNrhPRRENs0qzkQVUooNHtoy2w=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "ac62194c3917d5f474c1a844b6fd6da2db95077d",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "nixos-25.05",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs-unstable": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1770115704,
|
||||||
|
"narHash": "sha256-KHFT9UWOF2yRPlAnSXQJh6uVcgNcWlFqqiAZ7OVlHNc=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "0b4defa2584313f3b781240b29d61f6f9f7e0df3",
|
"rev": "e6eae2ee2110f3d31110d5c222cd395303343b08",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -56,22 +72,23 @@
|
|||||||
"inputs": {
|
"inputs": {
|
||||||
"disko": "disko",
|
"disko": "disko",
|
||||||
"mysecrets": "mysecrets",
|
"mysecrets": "mysecrets",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs-stable": "nixpkgs-stable",
|
||||||
|
"nixpkgs-unstable": "nixpkgs-unstable",
|
||||||
"sops-nix": "sops-nix"
|
"sops-nix": "sops-nix"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"sops-nix": {
|
"sops-nix": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs-unstable"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1759635238,
|
"lastModified": 1770145881,
|
||||||
"narHash": "sha256-UvzKi02LMFP74csFfwLPAZ0mrE7k6EiYaKecplyX9Qk=",
|
"narHash": "sha256-ktjWTq+D5MTXQcL9N6cDZXUf9kX8JBLLBLT0ZyOTSYY=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "6e5a38e08a2c31ae687504196a230ae00ea95133",
|
"rev": "17eea6f3816ba6568b8c81db8a4e6ca438b30b7c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
15
flake.nix
15
flake.nix
@@ -2,16 +2,17 @@
|
|||||||
description = "A very basic flake";
|
description = "A very basic flake";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs-stable.url = "github:NixOS/nixpkgs/nixos-25.05";
|
||||||
|
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
disko = {
|
disko = {
|
||||||
url = "github:nix-community/disko";
|
url = "github:nix-community/disko";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs-unstable";
|
||||||
};
|
};
|
||||||
|
|
||||||
sops-nix = {
|
sops-nix = {
|
||||||
url = "github:Mic92/sops-nix";
|
url = "github:Mic92/sops-nix";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs-unstable";
|
||||||
};
|
};
|
||||||
|
|
||||||
mysecrets = {
|
mysecrets = {
|
||||||
@@ -46,10 +47,10 @@
|
|||||||
{
|
{
|
||||||
nixosConfigurations = {
|
nixosConfigurations = {
|
||||||
#nixos-anywhere -- --flake './#generic' --generate-hardware-config nixos-generate-config ./hosts/generic/hardware-configuration.nix --target-host beastie@192.168.122.204
|
#nixos-anywhere -- --flake './#generic' --generate-hardware-config nixos-generate-config ./hosts/generic/hardware-configuration.nix --target-host beastie@192.168.122.204
|
||||||
generic = mkSystem inputs.nixpkgs "x86_64-linux" "generic" "beastie";
|
generic = mkSystem inputs.nixpkgs-stable "x86_64-linux" "generic" "beastie";
|
||||||
test-kvm = mkSystem inputs.nixpkgs "x86_64-linux" "test-kvm" "beastie";
|
test-kvm = mkSystem inputs.nixpkgs-stable "x86_64-linux" "test-kvm" "beastie";
|
||||||
home-nix = mkSystem inputs.nixpkgs "x86_64-linux" "home-nix" "beastie";
|
home-nix = mkSystem inputs.nixpkgs-unstable "x86_64-linux" "home-nix" "beastie";
|
||||||
work-nix = mkSystem inputs.nixpkgs "x86_64-linux" "work-nix" "beastie";
|
work-nix = mkSystem inputs.nixpkgs-unstable "x86_64-linux" "work-nix" "beastie";
|
||||||
# live-usb = mkSystem inputs.nixpkgs "x86_64-linux" "live-usb" "beastie";
|
# live-usb = mkSystem inputs.nixpkgs "x86_64-linux" "live-usb" "beastie";
|
||||||
#nixos-rebuild switch --flake ./#home-nix --sudo
|
#nixos-rebuild switch --flake ./#home-nix --sudo
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -5,7 +5,7 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
system.stateVersion = "25.11";
|
system.stateVersion = "25.05";
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
@@ -83,6 +83,7 @@
|
|||||||
pkgs.nixos-anywhere
|
pkgs.nixos-anywhere
|
||||||
pkgs.nixos-generators
|
pkgs.nixos-generators
|
||||||
pkgs.ssh-to-age
|
pkgs.ssh-to-age
|
||||||
|
pkgs.htop
|
||||||
];
|
];
|
||||||
|
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
|
|||||||
@@ -6,7 +6,7 @@
|
|||||||
disk = {
|
disk = {
|
||||||
main = {
|
main = {
|
||||||
type = "disk";
|
type = "disk";
|
||||||
device = "/dev/nvme0n1";
|
device = "/dev/vda";
|
||||||
content = {
|
content = {
|
||||||
type = "gpt";
|
type = "gpt";
|
||||||
partitions = {
|
partitions = {
|
||||||
@@ -23,42 +23,88 @@
|
|||||||
};
|
};
|
||||||
SYS = {
|
SYS = {
|
||||||
size = "100%";
|
size = "100%";
|
||||||
type = "8309";
|
type = "8300";
|
||||||
name = "SYS";
|
name = "SYS";
|
||||||
content = {
|
content = {
|
||||||
type = "luks";
|
type = "btrfs";
|
||||||
name = "rootfs";
|
extraArgs = [ "-f --nodiscard --label root" ];
|
||||||
settings = {
|
subvolumes = {
|
||||||
allowDiscards = true;
|
"@" = {
|
||||||
};
|
mountpoint = "/";
|
||||||
content = {
|
mountOptions = [
|
||||||
type = "btrfs";
|
"defaults"
|
||||||
extraArgs = [ "-f --nodiscard --label root" ];
|
"ssd"
|
||||||
subvolumes = {
|
"compress=zstd"
|
||||||
"@" = {
|
"autodefrag"
|
||||||
mountpoint = "/";
|
"noatime"
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
"nodiscard"
|
||||||
};
|
];
|
||||||
"@root" = {
|
};
|
||||||
mountpoint = "/root";
|
"@root" = {
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountpoint = "/root";
|
||||||
};
|
mountOptions = [
|
||||||
"@home" = {
|
"defaults"
|
||||||
mountpoint = "/home";
|
"ssd"
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
"compress=zstd"
|
||||||
};
|
"autodefrag"
|
||||||
"@nix" = {
|
"noatime"
|
||||||
mountpoint = "/nix";
|
"nodiscard"
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
];
|
||||||
};
|
};
|
||||||
"@var" = {
|
"@home" = {
|
||||||
mountpoint = "/var";
|
mountpoint = "/home";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
};
|
"defaults"
|
||||||
"@games" = {
|
"ssd"
|
||||||
mountpoint = "/games";
|
"compress=zstd"
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
"autodefrag"
|
||||||
};
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@nix" = {
|
||||||
|
mountpoint = "/nix";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@var" = {
|
||||||
|
mountpoint = "/var";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@data" = {
|
||||||
|
mountpoint = "/games";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@backups" = {
|
||||||
|
mountpoint = "/games";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -5,14 +5,13 @@
|
|||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" ];
|
boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk" ];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,4 @@
|
|||||||
{
|
{
|
||||||
pkgs,
|
|
||||||
username,
|
|
||||||
hostname,
|
hostname,
|
||||||
modulesPath,
|
modulesPath,
|
||||||
inputs,
|
inputs,
|
||||||
|
|||||||
@@ -37,27 +37,69 @@
|
|||||||
subvolumes = {
|
subvolumes = {
|
||||||
"@" = {
|
"@" = {
|
||||||
mountpoint = "/";
|
mountpoint = "/";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
"@root" = {
|
"@root" = {
|
||||||
mountpoint = "/root";
|
mountpoint = "/root";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
"@home" = {
|
"@home" = {
|
||||||
mountpoint = "/home";
|
mountpoint = "/home";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
"@nix" = {
|
"@nix" = {
|
||||||
mountpoint = "/nix";
|
mountpoint = "/nix";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
"@var" = {
|
"@var" = {
|
||||||
mountpoint = "/var";
|
mountpoint = "/var";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
"@games" = {
|
"@games" = {
|
||||||
mountpoint = "/games";
|
mountpoint = "/games";
|
||||||
mountOptions = [ "defaults" "ssd" "compress=zstd" "autodefrag" "noatime" "nodiscard" ];
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,18 +1,47 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
modulesPath,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports = [
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" ];
|
boot.initrd.availableKernelModules = [
|
||||||
|
"xhci_pci"
|
||||||
|
"ehci_pci"
|
||||||
|
"ahci"
|
||||||
|
"nvme"
|
||||||
|
"usbhid"
|
||||||
|
"usb_storage"
|
||||||
|
"sd_mod"
|
||||||
|
];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
|
environment.etc."crypttab".text = ''
|
||||||
|
datafs UUID=5ca962a7-537f-46ce-ba50-9cc9cefd012b /etc/secrets/datafs.key luks
|
||||||
|
'';
|
||||||
|
|
||||||
|
fileSystems."/data" = {
|
||||||
|
device = "/dev/disk/by-uuid/a8ea6a7b-3733-40d8-bee8-45806aaacfe1";
|
||||||
|
fsType = "btrfs";
|
||||||
|
options = [
|
||||||
|
"defaults"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nofail"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,50 +7,13 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
system.stateVersion = "25.11";
|
system.stateVersion = "25.05";
|
||||||
|
|
||||||
imports = builtins.trace "${inputs.mysecrets}" [
|
imports = builtins.trace "${inputs.mysecrets}" [
|
||||||
(modulesPath + "/installer/scan/not-detected.nix")
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
./network.nix
|
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
../../modules/core
|
../../modules/core
|
||||||
../../modules/optionnals/hosts/${hostname}.nix
|
../../modules/optionnals/hosts/${hostname}.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
|
||||||
|
|
||||||
time.timeZone = "Europe/Paris";
|
|
||||||
|
|
||||||
nix = {
|
|
||||||
settings = {
|
|
||||||
## Enable flakes
|
|
||||||
experimental-features = [
|
|
||||||
"nix-command"
|
|
||||||
"flakes"
|
|
||||||
];
|
|
||||||
## Users trusted to use flake command
|
|
||||||
trusted-users = [
|
|
||||||
"root"
|
|
||||||
"${username}"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
## Enable virtualisation guest settings
|
|
||||||
services.qemuGuest.enable = true;
|
|
||||||
services.spice-vdagentd.enable = true;
|
|
||||||
services.xserver = {
|
|
||||||
videoDrivers = [ "modesetting" ]; # Driver vidéo optimisé pour QEMU/KVM
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages = [
|
|
||||||
pkgs.spice-gtk # Outils SPICE
|
|
||||||
pkgs.spice-protocol # Protocoles SPICE
|
|
||||||
];
|
|
||||||
|
|
||||||
#fileSystems."/" = {
|
|
||||||
# device = "/dev/vda2"; # Disque virtuel typique
|
|
||||||
# fsType = "btrfs";
|
|
||||||
#};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -10,22 +10,103 @@
|
|||||||
content = {
|
content = {
|
||||||
type = "gpt";
|
type = "gpt";
|
||||||
partitions = {
|
partitions = {
|
||||||
ESP = {
|
EFI = {
|
||||||
size = "512M";
|
size = "512M";
|
||||||
type = "EF00";
|
type = "EF00";
|
||||||
|
name = "EFI";
|
||||||
content = {
|
content = {
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "vfat";
|
format = "vfat";
|
||||||
mountpoint = "/boot";
|
mountpoint = "/boot";
|
||||||
|
mountOptions = [ "umask=0077" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
root = {
|
SYS = {
|
||||||
size = "100%";
|
size = "100%";
|
||||||
type = "8300";
|
type = "8300";
|
||||||
|
name = "SYS";
|
||||||
content = {
|
content = {
|
||||||
type = "filesystem";
|
type = "btrfs";
|
||||||
format = "btrfs";
|
extraArgs = [ "-f --nodiscard --label root" ];
|
||||||
mountpoint = "/";
|
subvolumes = {
|
||||||
|
"@" = {
|
||||||
|
mountpoint = "/";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@root" = {
|
||||||
|
mountpoint = "/root";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@home" = {
|
||||||
|
mountpoint = "/home";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@nix" = {
|
||||||
|
mountpoint = "/nix";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@var" = {
|
||||||
|
mountpoint = "/var";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@data" = {
|
||||||
|
mountpoint = "/games";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"@backups" = {
|
||||||
|
mountpoint = "/games";
|
||||||
|
mountOptions = [
|
||||||
|
"defaults"
|
||||||
|
"ssd"
|
||||||
|
"compress=zstd"
|
||||||
|
"autodefrag"
|
||||||
|
"noatime"
|
||||||
|
"nodiscard"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,38 +1,16 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{
|
{ config, lib, pkgs, modulesPath, ... }:
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
modulesPath,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports =
|
||||||
(modulesPath + "/profiles/qemu-guest.nix")
|
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [
|
boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk" ];
|
||||||
"ahci"
|
boot.initrd.kernelModules = [ ];
|
||||||
"xhci_pci"
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
"virtio_pci"
|
|
||||||
"sr_mod"
|
|
||||||
"virtio_blk"
|
|
||||||
"virtio_scsi"
|
|
||||||
"virtio_net"
|
|
||||||
"virtio_blk"
|
|
||||||
];
|
|
||||||
boot.initrd.kernelModules = [
|
|
||||||
"virtio_balloon"
|
|
||||||
"virtio_console"
|
|
||||||
"virtio_rng"
|
|
||||||
];
|
|
||||||
boot.kernelModules = [
|
|
||||||
"kvm-intel"
|
|
||||||
"virtio-gpu"
|
|
||||||
];
|
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
|||||||
@@ -1,6 +1,4 @@
|
|||||||
{
|
{
|
||||||
pkgs,
|
|
||||||
username,
|
|
||||||
hostname,
|
hostname,
|
||||||
modulesPath,
|
modulesPath,
|
||||||
inputs,
|
inputs,
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./grub.nix
|
./grub.nix
|
||||||
./packages.nix
|
./packages.nix
|
||||||
|
./sops.nix
|
||||||
./ssh.nix
|
./ssh.nix
|
||||||
./system.nix
|
./system.nix
|
||||||
./tty.nix
|
./tty.nix
|
||||||
|
|||||||
@@ -15,6 +15,7 @@
|
|||||||
pkgs.unzip
|
pkgs.unzip
|
||||||
pkgs.sops
|
pkgs.sops
|
||||||
pkgs.ssh-to-age
|
pkgs.ssh-to-age
|
||||||
|
pkgs.age
|
||||||
pkgs.nixos-anywhere
|
pkgs.nixos-anywhere
|
||||||
pkgs.nixos-generators
|
pkgs.nixos-generators
|
||||||
pkgs.efibootmgr
|
pkgs.efibootmgr
|
||||||
@@ -23,6 +24,9 @@
|
|||||||
pkgs.jq
|
pkgs.jq
|
||||||
pkgs.bash
|
pkgs.bash
|
||||||
pkgs.fzf
|
pkgs.fzf
|
||||||
|
pkgs.bc
|
||||||
|
pkgs.wakeonlan
|
||||||
|
pkgs.openssl
|
||||||
];
|
];
|
||||||
services = {
|
services = {
|
||||||
locate = {
|
locate = {
|
||||||
|
|||||||
19
modules/core/sops.nix
Normal file
19
modules/core/sops.nix
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
{
|
||||||
|
inputs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
secretsPath = builtins.toString inputs.mysecrets;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
sops = {
|
||||||
|
defaultSopsFile = "${secretsPath}/secrets.yaml";
|
||||||
|
age = {
|
||||||
|
sshKeyPaths = [
|
||||||
|
"/etc/ssh/ssh_host_ed25519_key"
|
||||||
|
];
|
||||||
|
keyFile = "/var/lib/sops-nix/key.txt";
|
||||||
|
generateKey = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -2,8 +2,6 @@
|
|||||||
pkgs,
|
pkgs,
|
||||||
username,
|
username,
|
||||||
hostname,
|
hostname,
|
||||||
modulesPath,
|
|
||||||
inputs,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
@@ -23,12 +21,14 @@
|
|||||||
"root"
|
"root"
|
||||||
"${username}"
|
"${username}"
|
||||||
];
|
];
|
||||||
|
## Use 24 cores during building phases
|
||||||
|
cores = 24;
|
||||||
|
max-jobs = "auto";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "${hostname}";
|
hostName = "${hostname}";
|
||||||
networkmanager.enable = true;
|
|
||||||
firewall.enable = true;
|
firewall.enable = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
@@ -17,6 +17,7 @@
|
|||||||
df = "df -h";
|
df = "df -h";
|
||||||
du = "du -h";
|
du = "du -h";
|
||||||
};
|
};
|
||||||
|
# Defined in /etc/set-environnement. Require session restart
|
||||||
variables = {
|
variables = {
|
||||||
XDG_CONFIG_HOME = "$HOME/.config";
|
XDG_CONFIG_HOME = "$HOME/.config";
|
||||||
XDG_CACHE_HOME = "$HOME/.cache";
|
XDG_CACHE_HOME = "$HOME/.cache";
|
||||||
@@ -33,22 +34,12 @@
|
|||||||
enable = true;
|
enable = true;
|
||||||
enableCompletion = true;
|
enableCompletion = true;
|
||||||
syntaxHighlighting.enable = true;
|
syntaxHighlighting.enable = true;
|
||||||
autosuggestions.enable = false;
|
autosuggestions.enable = true;
|
||||||
histSize = 200000;
|
histSize = 200000;
|
||||||
histFile = "$HOME/.config/zsh/.zsh_history";
|
histFile = "$HOME/.config/zsh/.zsh_history";
|
||||||
setOptions = [
|
setOptions = [
|
||||||
"SHARE_HISTORY"
|
"SHARE_HISTORY"
|
||||||
];
|
];
|
||||||
# shellInit = ''
|
|
||||||
# export XDG_CONFIG_HOME=$HOME/.config
|
|
||||||
# export XDG_CACHE_HOME=$HOME/.cache
|
|
||||||
# export XDG_DATA_HOME=$HOME/.local/share
|
|
||||||
# export ZDOTDIR=$HOME/.config/zsh
|
|
||||||
# export TERMINAL=kitty
|
|
||||||
# export EDITOR=nvim
|
|
||||||
# export BROWSER=firefox
|
|
||||||
# export SAVEHIST=200000
|
|
||||||
# '';
|
|
||||||
promptInit = ''
|
promptInit = ''
|
||||||
stty stop undef # Disable ctrl+s to freeze terminal
|
stty stop undef # Disable ctrl+s to freeze terminal
|
||||||
|
|
||||||
@@ -59,6 +50,9 @@
|
|||||||
zstyle ':completion:*' menu select
|
zstyle ':completion:*' menu select
|
||||||
zmodload zsh/complist
|
zmodload zsh/complist
|
||||||
|
|
||||||
|
# enable dotfiles in tab directory completion
|
||||||
|
setopt globdots
|
||||||
|
|
||||||
fzf-history() {
|
fzf-history() {
|
||||||
local selected
|
local selected
|
||||||
selected=$(fc -l 1 | fzf --tac --no-sort | sed 's/^[ ]*[0-9]*[ ]*//')
|
selected=$(fc -l 1 | fzf --tac --no-sort | sed 's/^[ ]*[0-9]*[ ]*//')
|
||||||
|
|||||||
@@ -5,6 +5,11 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
sops.secrets = {
|
||||||
|
"users_password/beastie" = {
|
||||||
|
neededForUsers = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
users = {
|
users = {
|
||||||
users = {
|
users = {
|
||||||
${username} = {
|
${username} = {
|
||||||
@@ -14,7 +19,6 @@
|
|||||||
description = "Admin account";
|
description = "Admin account";
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
"wheel"
|
"wheel"
|
||||||
"networkmanager"
|
|
||||||
"audio"
|
"audio"
|
||||||
"video"
|
"video"
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -4,37 +4,43 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
# Activer Ollama comme service
|
# Activer Ollama comme service
|
||||||
services.ollama = {
|
# services.ollama = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
acceleration = "cuda";
|
# acceleration = "cuda";
|
||||||
environmentVariables = {
|
# environmentVariables = {
|
||||||
OLLAMA_FLASH_ATTENTION = "1"; # ← Flash Attention
|
# OLLAMA_FLASH_ATTENTION = "1"; # ← Flash Attention
|
||||||
OLLAMA_NUM_PARALLEL = "2"; # ← Requêtes parallèles
|
# OLLAMA_NUM_PARALLEL = "2"; # ← Requêtes parallèles
|
||||||
OLLAMA_MAX_LOADED_MODELS = "1"; # ← Garder 2 modèles en VRAM
|
# OLLAMA_MAX_LOADED_MODELS = "1"; # ← Garder 2 modèles en VRAM
|
||||||
OLLAMA_KEEP_ALIVE = "5m";
|
# OLLAMA_KEEP_ALIVE = "5m";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
# services.open-webui = {
|
||||||
|
# enable = true;
|
||||||
|
# port = 8080; # Port par défaut
|
||||||
|
# host = "127.0.0.1"; # Localhost uniquement
|
||||||
|
# openFirewall = true;
|
||||||
|
# # Pour accès réseau : host = "0.0.0.0";
|
||||||
|
# environment = {
|
||||||
|
# ANONYMIZED_TELEMETRY = "True";
|
||||||
|
# DO_NOT_TRACK = "True";
|
||||||
|
# SCARF_NO_ANALYTICS = "True";
|
||||||
|
# # URL d'Ollama (local)
|
||||||
|
# OLLAMA_BASE_URL = "http://127.0.0.1:11434";
|
||||||
|
# # Autres options optionnelles (https://docs.openwebui.com/getting-started/env-configuration/#web-search)
|
||||||
|
# WEBUI_AUTH = "False"; # Desactive l'authentification
|
||||||
|
# # ENABLE_WEB_SEARCH = "True";
|
||||||
|
# # ENABLE_SEARCH_QUERY_GENERATION = "True";
|
||||||
|
# # WEB_SEARCH_ENGINE = "duckduckgo";
|
||||||
|
# # WEB_LOADER_ENGINE = "safe_web";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
environment = {
|
||||||
|
systemPackages = [
|
||||||
|
pkgs.lmstudio
|
||||||
|
pkgs.aider-chat-full
|
||||||
|
];
|
||||||
|
variables = {
|
||||||
|
OLLAMA_API_BASE = "http://localhost:11434";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.open-webui = {
|
|
||||||
enable = true;
|
|
||||||
port = 8080; # Port par défaut
|
|
||||||
host = "127.0.0.1"; # Localhost uniquement
|
|
||||||
openFirewall = true;
|
|
||||||
# Pour accès réseau : host = "0.0.0.0";
|
|
||||||
environment = {
|
|
||||||
ANONYMIZED_TELEMETRY = "True";
|
|
||||||
DO_NOT_TRACK = "True";
|
|
||||||
SCARF_NO_ANALYTICS = "True";
|
|
||||||
# URL d'Ollama (local)
|
|
||||||
OLLAMA_BASE_URL = "http://127.0.0.1:11434";
|
|
||||||
# Autres options optionnelles (https://docs.openwebui.com/getting-started/env-configuration/#web-search)
|
|
||||||
WEBUI_AUTH = "False"; # Desactive l'authentification
|
|
||||||
# ENABLE_WEB_SEARCH = "True";
|
|
||||||
# ENABLE_SEARCH_QUERY_GENERATION = "True";
|
|
||||||
# WEB_SEARCH_ENGINE = "duckduckgo";
|
|
||||||
# WEB_LOADER_ENGINE = "safe_web";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages = [ pkgs.lmstudio ];
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -71,27 +71,31 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(pkgs.vscode-with-extensions.override {
|
# (pkgs.vscode-with-extensions.override {
|
||||||
vscode = pkgs.vscodium;
|
# vscode = pkgs.vscodium;
|
||||||
vscodeExtensions = [
|
# vscodeExtensions = [
|
||||||
pkgs.vscode-extensions.continue.continue
|
# # pkgs.vscode-extensions.continue.continue
|
||||||
pkgs.vscode-extensions.catppuccin.catppuccin-vsc
|
# pkgs.vscode-extensions.catppuccin.catppuccin-vsc
|
||||||
pkgs.vscode-extensions.catppuccin.catppuccin-vsc-icons
|
# pkgs.vscode-extensions.catppuccin.catppuccin-vsc-icons
|
||||||
pkgs.vscode-extensions.jnoortheen.nix-ide
|
# pkgs.vscode-extensions.jnoortheen.nix-ide
|
||||||
pkgs.vscode-extensions.redhat.ansible
|
# pkgs.vscode-extensions.redhat.ansible
|
||||||
pkgs.vscode-extensions.redhat.vscode-yaml
|
# pkgs.vscode-extensions.redhat.vscode-yaml
|
||||||
pkgs.vscode-extensions.ms-azuretools.vscode-docker
|
# pkgs.vscode-extensions.ms-azuretools.vscode-docker
|
||||||
pkgs.vscode-extensions.mads-hartmann.bash-ide-vscode
|
# pkgs.vscode-extensions.mads-hartmann.bash-ide-vscode
|
||||||
]
|
# ]
|
||||||
++ [ open-remote-ssh ];
|
# ++ [ open-remote-ssh ];
|
||||||
})
|
# })
|
||||||
|
pkgs.vscodium
|
||||||
pkgs.nodejs_24
|
pkgs.nodejs_24
|
||||||
pkgs.nodePackages.npm
|
pkgs.nodePackages.npm
|
||||||
pkgs.gcc
|
pkgs.gcc
|
||||||
pkgs.gnumake
|
pkgs.gnumake
|
||||||
pkgs.nixd
|
pkgs.nixd
|
||||||
pkgs.nixfmt-rfc-style
|
pkgs.nixfmt
|
||||||
pkgs.ansible
|
pkgs.ansible
|
||||||
pkgs.python313
|
pkgs.python313
|
||||||
|
pkgs.claude-code
|
||||||
|
pkgs.nodejs
|
||||||
|
pkgs.php
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,3 +13,5 @@ workspace = 5, monitor:HDMI-A-2
|
|||||||
workspace = 6, monitor:HDMI-A-2
|
workspace = 6, monitor:HDMI-A-2
|
||||||
workspace = 7, monitor:HDMI-A-2
|
workspace = 7, monitor:HDMI-A-2
|
||||||
workspace = 8, monitor:HDMI-A-2
|
workspace = 8, monitor:HDMI-A-2
|
||||||
|
|
||||||
|
exec-once = nextcloud
|
||||||
@@ -14,7 +14,6 @@ ecosystem {
|
|||||||
###################
|
###################
|
||||||
|
|
||||||
$terminal = kitty
|
$terminal = kitty
|
||||||
source = /etc/xdg/hypr/rofi.conf
|
|
||||||
|
|
||||||
#################
|
#################
|
||||||
### AUTOSTART ###
|
### AUTOSTART ###
|
||||||
@@ -23,7 +22,6 @@ source = /etc/xdg/hypr/rofi.conf
|
|||||||
exec-once = hyprpaper
|
exec-once = hyprpaper
|
||||||
exec-once = waybar
|
exec-once = waybar
|
||||||
|
|
||||||
|
|
||||||
#############################
|
#############################
|
||||||
### ENVIRONMENT VARIABLES ###
|
### ENVIRONMENT VARIABLES ###
|
||||||
#############################
|
#############################
|
||||||
@@ -166,8 +164,8 @@ master {
|
|||||||
|
|
||||||
# https://wiki.hyprland.org/Configuring/Variables/#misc
|
# https://wiki.hyprland.org/Configuring/Variables/#misc
|
||||||
misc {
|
misc {
|
||||||
force_default_wallpaper = -1 # Set to 0 or 1 to disable the anime mascot wallpapers
|
force_default_wallpaper = 1 # Set to 0 or 1 to disable the anime mascot wallpapers
|
||||||
disable_hyprland_logo = false # If true disables the random hyprland logo / anime girl background. :(
|
disable_hyprland_logo = true # If true disables the random hyprland logo / anime girl background. :(
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -211,9 +209,10 @@ device {
|
|||||||
|
|
||||||
$mainMod = SUPER # Sets "Windows" key as main modifier
|
$mainMod = SUPER # Sets "Windows" key as main modifier
|
||||||
# Apps shortcut
|
# Apps shortcut
|
||||||
bind = $mainMod, D, exec, $rofi
|
bind = $mainMod, D, exec, rofi -show drun -show-icons -config /etc/xdg/rofi/config.rasi
|
||||||
bind = $mainMod, L, exec, /etc/xdg/scripts/wayland-disconnect.sh
|
bind = $mainMod, L, exec, /etc/xdg/scripts/wayland-disconnect.sh
|
||||||
bind = $mainMod, M, exec, /etc/xdg/scripts/wayland-mpv.sh
|
bind = $mainMod, M, exec, /etc/xdg/scripts/wayland-mpv.sh
|
||||||
|
bind = $mainMod, K, exec, /etc/xdg/scripts/rofi-ssh.sh
|
||||||
bind = $mainMod SHIFT, P, exec, pavucontrol
|
bind = $mainMod SHIFT, P, exec, pavucontrol
|
||||||
bind = $mainMod SHIFT, T, exec, teams-for-linux
|
bind = $mainMod SHIFT, T, exec, teams-for-linux
|
||||||
bind = $mainMod SHIFT, D, exec, discord
|
bind = $mainMod SHIFT, D, exec, discord
|
||||||
@@ -309,15 +308,17 @@ bindl = , XF86AudioPrev, exec, playerctl previous
|
|||||||
# windowrule = float,class:^(kitty)$,title:^(kitty)$
|
# windowrule = float,class:^(kitty)$,title:^(kitty)$
|
||||||
|
|
||||||
# Ignore maximize requests from apps. You'll probably like this.
|
# Ignore maximize requests from apps. You'll probably like this.
|
||||||
windowrule = suppressevent maximize, class:.*
|
# windowrule = suppressevent maximize, class:.*
|
||||||
|
|
||||||
# Fix some dragging issues with XWayland
|
# Fix some dragging issues with XWayland
|
||||||
windowrule = nofocus,class:^$,title:^$,xwayland:1,floating:1,fullscreen:0,pinned:0
|
# windowrule = nofocus,class:^$,title:^$,xwayland:1,floating:1,fullscreen:0,pinned:0
|
||||||
|
|
||||||
# Supprimer la transparence pour des applications spécifiques
|
# Supprimer la transparence pour des applications spécifiques
|
||||||
windowrulev2 = opacity 1.0 override,class:firefox
|
# Opacity order : active, inactive, fullscreen
|
||||||
windowrulev2 = opacity 1.0 override,class:^(chromium)$
|
windowrule = match:class firefox, opacity 1.0 override 0.95 override 1.0 override
|
||||||
windowrulev2 = opacity 1.0 override,class:^(mpv)$
|
windowrule = match:class chromium, opacity 1.0 override 0.95 override 1.0 override
|
||||||
windowrulev2 = opacity 1.0 override,class:^(mpv)$
|
windowrule = match:class mpv, opacity 0.95 override 0.80 override 1.0 override
|
||||||
|
|
||||||
|
#windowrule = match:class mpv, fullscreen override
|
||||||
|
#windowrulev2 = fullscreen,class:^(mpv)$
|
||||||
|
|
||||||
windowrulev2 = fullscreen,class:^(mpv)$
|
|
||||||
|
|||||||
@@ -1,2 +1,7 @@
|
|||||||
preload = ~/Downloads/wallpaper.jpeg
|
wallpaper {
|
||||||
wallpaper = , ~/Downloads/wallpaper.jpeg
|
monitor =
|
||||||
|
path = ~/Downloads/wallpaper.jpeg
|
||||||
|
fit_mode = cover
|
||||||
|
}
|
||||||
|
|
||||||
|
splash = false
|
||||||
|
|||||||
16
modules/optionnals/desktop/config/etc/xdg/rofi/mpv.rasi
Normal file
16
modules/optionnals/desktop/config/etc/xdg/rofi/mpv.rasi
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
@import "launcher.rasi"
|
||||||
|
window {
|
||||||
|
width: 50%;
|
||||||
|
height: 50%;
|
||||||
|
margin: 0px;
|
||||||
|
location: center;
|
||||||
|
anchor: center;
|
||||||
|
}
|
||||||
|
|
||||||
|
mainbox {
|
||||||
|
children: [inputbar,listview];
|
||||||
|
}
|
||||||
|
|
||||||
|
listview {
|
||||||
|
columns: 1;
|
||||||
|
}
|
||||||
12
modules/optionnals/desktop/config/etc/xdg/rofi/ssh.rasi
Normal file
12
modules/optionnals/desktop/config/etc/xdg/rofi/ssh.rasi
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
@import "launcher.rasi"
|
||||||
|
window {
|
||||||
|
width: 50%;
|
||||||
|
height: 50%;
|
||||||
|
margin: 0px;
|
||||||
|
location: center;
|
||||||
|
anchor: center;
|
||||||
|
}
|
||||||
|
|
||||||
|
mainbox {
|
||||||
|
children: [inputbar,listview];
|
||||||
|
}
|
||||||
7
modules/optionnals/desktop/config/etc/xdg/scripts/rofi-ssh.sh
Executable file
7
modules/optionnals/desktop/config/etc/xdg/scripts/rofi-ssh.sh
Executable file
@@ -0,0 +1,7 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
selected=$(cat ~/.config/zsh/.zsh_history | sed 's/^[ ]*[0-9]*[ ]*//' | grep '^ssh ' | rofi -dmenu -i -theme /etc/xdg/rofi/ssh.rasi -p SSH)
|
||||||
|
|
||||||
|
if [[ -n "$selected" ]]; then
|
||||||
|
kitty -e $selected
|
||||||
|
fi
|
||||||
26
modules/optionnals/desktop/config/etc/xdg/scripts/waybar-mailbox.sh
Executable file
26
modules/optionnals/desktop/config/etc/xdg/scripts/waybar-mailbox.sh
Executable file
@@ -0,0 +1,26 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
_USER=beastie
|
||||||
|
_PASSWD=$(cat /run/secrets/ldap_unxiyourbrain/password)
|
||||||
|
_SERVER=unixyourbrain.org
|
||||||
|
_FOLDER=Admin
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
cd -- "$(dirname -- "$0")"
|
||||||
|
_DIRNAME="$(pwd)"
|
||||||
|
|
||||||
|
### Sourcer à partir des secrets
|
||||||
|
#source ~/.config/polybar/imap_creds
|
||||||
|
|
||||||
|
|
||||||
|
_COUNT=$(curl -u "$_USER:$_PASSWD" "imaps://$_SERVER" -X "STATUS $_FOLDER (UNSEEN)" 2>/dev/null | \
|
||||||
|
sed -e 's/)\r//' -e 's/.*UNSEEN //')
|
||||||
|
|
||||||
|
_UNSEEN=$(curl -u "$_USER:$_PASSWD" "imaps://$_SERVER/$_FOLDER" -X "SEARCH UNSEEN" 2>/dev/null | \
|
||||||
|
sed -e "s|\\r||" -e "s|* SEARCH ||" -e "s| |,|g")
|
||||||
|
|
||||||
|
_MAILS=$(curl -v -u "$_USER:$_PASSWD" "imaps://$_SERVER/$_FOLDER" -X "FETCH $_UNSEEN BODY.PEEK[HEADER.FIELDS (From Subject)]" 2>&1 | \
|
||||||
|
sed -e "s|\\r||" | awk '/< Subject|< From/ {sub(/^< /, ""); printf "%s\\n", $0}')
|
||||||
|
|
||||||
|
printf '{"text": "%s ", "tooltip": "%s"}' "$_COUNT" "$_MAILS"
|
||||||
@@ -3,13 +3,13 @@
|
|||||||
cd ~/nixos/dotfiles || exit
|
cd ~/nixos/dotfiles || exit
|
||||||
|
|
||||||
# Obtenir le hash actuel
|
# Obtenir le hash actuel
|
||||||
current_hash=$(nix flake metadata --json 2>/dev/null | jq -r '.locks.nodes.nixpkgs.locked.rev')
|
current_hash=$(nix flake metadata --json 2>/dev/null | jq -r '.locks.nodes."nixpkgs-unstable".locked.rev')
|
||||||
|
|
||||||
# Obtenir le hash le plus récent
|
# Obtenir le hash le plus récent
|
||||||
latest_hash=$(nix flake metadata github:NixOS/nixpkgs/nixos-unstable --json | jq -r '.locked.rev')
|
latest_hash=$(nix flake metadata github:NixOS/nixpkgs/nixos-unstable --json | jq -r '.locked.rev')
|
||||||
|
|
||||||
# Date du commit local
|
# Date du commit local
|
||||||
local_commit_date=$(nix flake metadata --json 2>/dev/null | jq -r '.locks.nodes.nixpkgs.locked.lastModified')
|
local_commit_date=$(nix flake metadata --json 2>/dev/null | jq -r '.locks.nodes."nixpkgs-unstable".locked.lastModified')
|
||||||
local_commit_date=$(date -d "@${local_commit_date}" "+%d/%m/%Y à %H:%M")
|
local_commit_date=$(date -d "@${local_commit_date}" "+%d/%m/%Y à %H:%M")
|
||||||
|
|
||||||
if [ "$current_hash" != "$latest_hash" ]; then
|
if [ "$current_hash" != "$latest_hash" ]; then
|
||||||
@@ -17,7 +17,7 @@ if [ "$current_hash" != "$latest_hash" ]; then
|
|||||||
maj_count=$(curl -s "https://api.github.com/repos/NixOS/nixpkgs/compare/${current_hash}...${latest_hash}" | jq -r '.ahead_by // 0' 2>/dev/null || echo "?")
|
maj_count=$(curl -s "https://api.github.com/repos/NixOS/nixpkgs/compare/${current_hash}...${latest_hash}" | jq -r '.ahead_by // 0' 2>/dev/null || echo "?")
|
||||||
|
|
||||||
# Date du commit distant
|
# Date du commit distant
|
||||||
remote_commit_date=$(curl -s https://api.github.com/repos/NixOS/nixpkgs/commits/c87b95e25065c028d31a94f06a62927d18763fdf | jq -r '.commit.author.date')
|
remote_commit_date=$(curl -s https://api.github.com/repos/NixOS/nixpkgs/commits/${latest_hash} | jq -r '.commit.author.date')
|
||||||
remote_commit_date=$(date -d "${remote_commit_date}" "+%d/%m/%Y à %H:%M")
|
remote_commit_date=$(date -d "${remote_commit_date}" "+%d/%m/%Y à %H:%M")
|
||||||
printf '{"text": "%s ", "tooltip": "Commit distant : %s\\nCommit local : %s"}' "${maj_count}" "${remote_commit_date}" "${local_commit_date}"
|
printf '{"text": "%s ", "tooltip": "Commit distant : %s\\nCommit local : %s"}' "${maj_count}" "${remote_commit_date}" "${local_commit_date}"
|
||||||
# Compter les commits entre les deux
|
# Compter les commits entre les deux
|
||||||
31
modules/optionnals/desktop/config/etc/xdg/scripts/wayland-disconnect.sh
Executable file
31
modules/optionnals/desktop/config/etc/xdg/scripts/wayland-disconnect.sh
Executable file
@@ -0,0 +1,31 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
selected=$(printf "Lock\0icon\x1fsystem-lock-screen
|
||||||
|
Update\0icon\x1fsystem-software-update
|
||||||
|
Shutdown\0icon\x1fsystem-shutdown
|
||||||
|
Reboot\0icon\x1fsystem-reboot
|
||||||
|
Exit hyprland\0icon\x1fsystem-log-out
|
||||||
|
Reload hyprland\0icon\x1fsystem-log-out" | rofi -dmenu -show-icons -i -theme /etc/xdg/rofi/disconnect.rasi -p System)
|
||||||
|
|
||||||
|
echo "$selected"
|
||||||
|
|
||||||
|
case $selected in
|
||||||
|
"Lock")
|
||||||
|
/nix/store/4pwvyyjrc7frwkycbszakd7z6nf44qgv-hyprlock-0.9.2/bin/hyprlock
|
||||||
|
;;
|
||||||
|
"Update")
|
||||||
|
kitty /usr/local/share/dotfiles/scripts/update.sh
|
||||||
|
;;
|
||||||
|
"Shutdown")
|
||||||
|
systemctl poweroff
|
||||||
|
;;
|
||||||
|
"Reboot")
|
||||||
|
reboot
|
||||||
|
;;
|
||||||
|
"Exit hyprland")
|
||||||
|
hyprctl dispatch exit
|
||||||
|
;;
|
||||||
|
"Reload hyprland")
|
||||||
|
hyprctl reload
|
||||||
|
;;
|
||||||
|
esac
|
||||||
31
modules/optionnals/desktop/config/etc/xdg/scripts/wayland-mpv.sh
Executable file
31
modules/optionnals/desktop/config/etc/xdg/scripts/wayland-mpv.sh
Executable file
@@ -0,0 +1,31 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
cd -- "$(dirname -- "$0")" || exit
|
||||||
|
|
||||||
|
## if not $1
|
||||||
|
if [[ -z $1 ]]
|
||||||
|
then
|
||||||
|
_LINES=$(curl "http://10.0.0.1:2013" 2>/dev/null | sed -e "s|.*<a href=\"\([^\"]*\).*|$1\1|" -e "s/.*<.*\|.*C=D.*\|.*\/\/$\|.*.nfo//" -e "/^$/d")
|
||||||
|
else
|
||||||
|
_LINES="$(curl "http://10.0.0.1:2013/$1" 2>/dev/null | sed -e "s|.*<a href=\"\([^\"]*\).*|$1\1|" -e "s/.*<.*\|.*C=D.*\|.*\/\/$\|.*.nfo//" -e "/^$/d")"
|
||||||
|
fi
|
||||||
|
|
||||||
|
_RESULT=$(rofi -dmenu -i -theme /etc/xdg/rofi/mpv.rasi -p Mpv <<< "$_LINES")
|
||||||
|
|
||||||
|
# If no output
|
||||||
|
echo "$_RESULT"
|
||||||
|
if [[ -z $_RESULT ]]
|
||||||
|
then
|
||||||
|
echo "no output, exiting"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
#if line end vith /
|
||||||
|
if [[ "$_RESULT" =~ .*/$ ]]
|
||||||
|
then
|
||||||
|
echo "output is a directory"
|
||||||
|
./wayland-mpv.sh "$_RESULT"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
mpv "http://10.0.0.1:2013/$_RESULT"
|
||||||
@@ -7,12 +7,13 @@
|
|||||||
"memory",
|
"memory",
|
||||||
"disk",
|
"disk",
|
||||||
"network",
|
"network",
|
||||||
"pulseaudio",
|
"pulseaudio"
|
||||||
],
|
],
|
||||||
"modules-center": [
|
"modules-center": [
|
||||||
"hyprland/workspaces"
|
"hyprland/workspaces"
|
||||||
],
|
],
|
||||||
"modules-right": [
|
"modules-right": [
|
||||||
|
"custom/alert",
|
||||||
"custom/maj",
|
"custom/maj",
|
||||||
"clock",
|
"clock",
|
||||||
"tray"
|
"tray"
|
||||||
@@ -78,11 +79,20 @@
|
|||||||
},
|
},
|
||||||
"format": "{name}",
|
"format": "{name}",
|
||||||
"format-icons": {
|
"format-icons": {
|
||||||
"default": "",
|
"default": ""
|
||||||
},
|
}
|
||||||
|
},
|
||||||
|
"custom/alert": {
|
||||||
|
"exec": "/etc/xdg/scripts/waybar-mailbox.sh",
|
||||||
|
"interval": 300,
|
||||||
|
"return-type": "json",
|
||||||
|
"format": "{icon}{text}",
|
||||||
|
"format-icons": {
|
||||||
|
"default": " "
|
||||||
|
}
|
||||||
},
|
},
|
||||||
"custom/maj": {
|
"custom/maj": {
|
||||||
"exec": "/etc/xdg/scripts/update.sh",
|
"exec": "/etc/xdg/scripts/waybar-update.sh",
|
||||||
"interval": 300,
|
"interval": 300,
|
||||||
"return-type": "json",
|
"return-type": "json",
|
||||||
"format": "{icon}{text}",
|
"format": "{icon}{text}",
|
||||||
|
|||||||
@@ -7,12 +7,13 @@
|
|||||||
"memory",
|
"memory",
|
||||||
"disk",
|
"disk",
|
||||||
"network",
|
"network",
|
||||||
"pulseaudio",
|
"pulseaudio"
|
||||||
],
|
],
|
||||||
"modules-center": [
|
"modules-center": [
|
||||||
"hyprland/workspaces"
|
"hyprland/workspaces"
|
||||||
],
|
],
|
||||||
"modules-right": [
|
"modules-right": [
|
||||||
|
"custom/alert",
|
||||||
"custom/maj",
|
"custom/maj",
|
||||||
"clock",
|
"clock",
|
||||||
"tray"
|
"tray"
|
||||||
@@ -79,11 +80,20 @@
|
|||||||
},
|
},
|
||||||
"format": "{name}",
|
"format": "{name}",
|
||||||
"format-icons": {
|
"format-icons": {
|
||||||
"default": "",
|
"default": ""
|
||||||
},
|
}
|
||||||
|
},
|
||||||
|
"custom/alert": {
|
||||||
|
"exec": "/etc/xdg/scripts/waybar-mailbox.sh",
|
||||||
|
"interval": 300,
|
||||||
|
"return-type": "json",
|
||||||
|
"format": "{icon}{text}",
|
||||||
|
"format-icons": {
|
||||||
|
"default": " "
|
||||||
|
}
|
||||||
},
|
},
|
||||||
"custom/maj": {
|
"custom/maj": {
|
||||||
"exec": "/etc/xdg/scripts/update.sh",
|
"exec": "/etc/xdg/scripts/waybar-update.sh",
|
||||||
"interval": 300,
|
"interval": 300,
|
||||||
"return-type": "json",
|
"return-type": "json",
|
||||||
"format": "{icon}{text}",
|
"format": "{icon}{text}",
|
||||||
|
|||||||
@@ -24,6 +24,7 @@
|
|||||||
#disk,
|
#disk,
|
||||||
#network,
|
#network,
|
||||||
#workspaces,
|
#workspaces,
|
||||||
|
#custom-alert,
|
||||||
#custom-maj,
|
#custom-maj,
|
||||||
#pulseaudio,
|
#pulseaudio,
|
||||||
#memory,
|
#memory,
|
||||||
@@ -87,24 +88,40 @@
|
|||||||
background: @red;
|
background: @red;
|
||||||
}
|
}
|
||||||
|
|
||||||
#network {
|
#custom-logo {
|
||||||
color: @pink;
|
color: @red;
|
||||||
}
|
|
||||||
|
|
||||||
#pulseaudio {
|
|
||||||
color: @yellow;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#cpu {
|
#cpu {
|
||||||
color: @blue;
|
color: @peach;
|
||||||
}
|
}
|
||||||
|
|
||||||
#memory {
|
#memory {
|
||||||
color: @green;
|
color: @maroon;
|
||||||
|
}
|
||||||
|
|
||||||
|
#disk {
|
||||||
|
color: @pink;
|
||||||
|
}
|
||||||
|
|
||||||
|
#network {
|
||||||
|
color: @flamingo;
|
||||||
|
}
|
||||||
|
|
||||||
|
#pulseaudio {
|
||||||
|
color: @rosewater;
|
||||||
|
}
|
||||||
|
|
||||||
|
#custom-alert {
|
||||||
|
color: @sky;
|
||||||
|
}
|
||||||
|
|
||||||
|
#custom-maj {
|
||||||
|
color: @sapphire;
|
||||||
}
|
}
|
||||||
|
|
||||||
#clock {
|
#clock {
|
||||||
color: @red;
|
color: @blue;
|
||||||
}
|
}
|
||||||
|
|
||||||
#tray {
|
#tray {
|
||||||
|
|||||||
18
modules/optionnals/desktop/gaming.nix
Normal file
18
modules/optionnals/desktop/gaming.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
hardware.graphics.enable32Bit = true;
|
||||||
|
programs.steam.enable = true;
|
||||||
|
programs.steam.gamescopeSession.enable = true;
|
||||||
|
programs.gamemode.enable = true;
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
vulkan-tools
|
||||||
|
lutris
|
||||||
|
wine-staging
|
||||||
|
winetricks
|
||||||
|
mangohud
|
||||||
|
protonup-ng
|
||||||
|
];
|
||||||
|
}
|
||||||
@@ -23,7 +23,7 @@
|
|||||||
[[ "$TERM" == "xterm-kitty" ]] && export TERM="xterm-256color"
|
[[ "$TERM" == "xterm-kitty" ]] && export TERM="xterm-256color"
|
||||||
[[ -f ${pkgs.nitch}/bin/nitch ]] && nitch
|
[[ -f ${pkgs.nitch}/bin/nitch ]] && nitch
|
||||||
if [[ -z $DISPLAY ]] && [[ $(tty) = /dev/tty1 ]]; then
|
if [[ -z $DISPLAY ]] && [[ $(tty) = /dev/tty1 ]]; then
|
||||||
hyprland --config /etc/xdg/hypr/hyprland.conf
|
start-hyprland -- --config /etc/xdg/hypr/hyprland.conf
|
||||||
fi
|
fi
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|||||||
12
modules/optionnals/desktop/nextcloud.nix
Normal file
12
modules/optionnals/desktop/nextcloud.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
{
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
services.gnome.gnome-keyring.enable = true;
|
||||||
|
|
||||||
|
environment.systemPackages = [
|
||||||
|
pkgs.nextcloud-client
|
||||||
|
pkgs.seahorse
|
||||||
|
];
|
||||||
|
}
|
||||||
@@ -20,5 +20,7 @@
|
|||||||
package = config.boot.kernelPackages.nvidiaPackages.latest;
|
package = config.boot.kernelPackages.nvidiaPackages.latest;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.nvtopPackages.full ];
|
environment.systemPackages = [
|
||||||
|
pkgs.nvtopPackages.full
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,9 +6,11 @@
|
|||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
pkgs.remmina
|
pkgs.remmina
|
||||||
pkgs.mpv
|
pkgs.mpv
|
||||||
|
pkgs.jellyfin-mpv-shim
|
||||||
pkgs.yt-dlp
|
pkgs.yt-dlp
|
||||||
pkgs.chromium
|
pkgs.chromium
|
||||||
pkgs.firefox
|
pkgs.firefox
|
||||||
|
pkgs.thunderbird
|
||||||
pkgs.keepassxc
|
pkgs.keepassxc
|
||||||
pkgs.nwg-look
|
pkgs.nwg-look
|
||||||
pkgs.gimp
|
pkgs.gimp
|
||||||
@@ -24,6 +26,11 @@
|
|||||||
pkgs.catppuccin-cursors
|
pkgs.catppuccin-cursors
|
||||||
pkgs.catppuccin-gtk
|
pkgs.catppuccin-gtk
|
||||||
pkgs.postman
|
pkgs.postman
|
||||||
|
pkgs.samba
|
||||||
|
pkgs.openldap
|
||||||
|
pkgs.argocd
|
||||||
|
pkgs.talosctl
|
||||||
|
pkgs.talhelper
|
||||||
];
|
];
|
||||||
fonts.packages = [
|
fonts.packages = [
|
||||||
pkgs.nerd-fonts.dejavu-sans-mono
|
pkgs.nerd-fonts.dejavu-sans-mono
|
||||||
|
|||||||
@@ -6,78 +6,6 @@
|
|||||||
environment = {
|
environment = {
|
||||||
etc = {
|
etc = {
|
||||||
"xdg/rofi".source = ./config/etc/xdg/rofi;
|
"xdg/rofi".source = ./config/etc/xdg/rofi;
|
||||||
"xdg/scripts/wayland-disconnect.sh" = {
|
|
||||||
text = ''
|
|
||||||
#!/usr/bin/env bash
|
|
||||||
|
|
||||||
selected=$(printf "Lock\0icon\x1fsystem-lock-screen
|
|
||||||
Update\0icon\x1fsystem-software-update
|
|
||||||
Shutdown\0icon\x1fsystem-shutdown
|
|
||||||
Reboot\0icon\x1fsystem-reboot
|
|
||||||
Exit hyprland\0icon\x1fsystem-log-out
|
|
||||||
Reload hyprland\0icon\x1fsystem-log-out" | ${pkgs.rofi}/bin/rofi -dmenu -show-icons -i -theme /etc/xdg/rofi/disconnect.rasi -p System)
|
|
||||||
|
|
||||||
echo "$selected"
|
|
||||||
|
|
||||||
case $selected in
|
|
||||||
"Lock")
|
|
||||||
${pkgs.hyprlock}/bin/hyprlock
|
|
||||||
;;
|
|
||||||
"Update")
|
|
||||||
kitty /usr/local/share/dotfiles/scripts/update.sh
|
|
||||||
;;
|
|
||||||
"Shutdown")
|
|
||||||
systemctl poweroff
|
|
||||||
;;
|
|
||||||
"Reboot")
|
|
||||||
reboot
|
|
||||||
;;
|
|
||||||
"Exit hyprland")
|
|
||||||
hyprctl dispatch exit
|
|
||||||
;;
|
|
||||||
"Reload hyprland")
|
|
||||||
hyprctl reload
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
'';
|
|
||||||
mode = "0755";
|
|
||||||
};
|
|
||||||
"xdg/scripts/wayland-mpv.sh" = {
|
|
||||||
text = ''
|
|
||||||
#!/usr/bin/env bash
|
|
||||||
|
|
||||||
cd -- "$(dirname -- "$0")" || exit
|
|
||||||
|
|
||||||
## if not $1
|
|
||||||
if [[ -z $1 ]]
|
|
||||||
then
|
|
||||||
_LINES=$(curl "http://10.0.0.1:2013" 2>/dev/null | sed -e "s|.*<a href=\"\([^\"]*\).*|$1\1|" -e "s/.*<.*\|.*C=D.*\|.*\/\/$\|.*.nfo//" -e "/^$/d")
|
|
||||||
else
|
|
||||||
_LINES="$(curl "http://10.0.0.1:2013/$1" 2>/dev/null | sed -e "s|.*<a href=\"\([^\"]*\).*|$1\1|" -e "s/.*<.*\|.*C=D.*\|.*\/\/$\|.*.nfo//" -e "/^$/d")"
|
|
||||||
fi
|
|
||||||
|
|
||||||
_RESULT=$(${pkgs.rofi}/bin/rofi -dmenu -config /etc/xdg/rofi/config.rasi -i <<< "$_LINES")
|
|
||||||
|
|
||||||
# If no output
|
|
||||||
echo "$_RESULT"
|
|
||||||
if [[ -z $_RESULT ]]
|
|
||||||
then
|
|
||||||
echo "no output, exiting"
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
#if line end vith /
|
|
||||||
if [[ "$_RESULT" =~ .*/$ ]]
|
|
||||||
then
|
|
||||||
echo "output is a directory"
|
|
||||||
./wayland-mpv.sh "$_RESULT"
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
mpv "http://10.0.0.1:2013/$_RESULT"
|
|
||||||
'';
|
|
||||||
mode = "0755";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
{
|
{
|
||||||
pkgs,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
|||||||
7
modules/optionnals/desktop/virt-manager.nix
Normal file
7
modules/optionnals/desktop/virt-manager.nix
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
{
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
programs.virt-manager.enable = true;
|
||||||
|
virtualisation.spiceUSBRedirection.enable = true;
|
||||||
|
}
|
||||||
@@ -28,16 +28,16 @@
|
|||||||
"xdg/hypr/hyprland-host.conf".source = ./config/etc/xdg/hypr/hyprland-${hostname}.conf;
|
"xdg/hypr/hyprland-host.conf".source = ./config/etc/xdg/hypr/hyprland-${hostname}.conf;
|
||||||
"xdg/hypr/hyprlock.conf".source = ./config/etc/xdg/hypr/hyprlock.conf;
|
"xdg/hypr/hyprlock.conf".source = ./config/etc/xdg/hypr/hyprlock.conf;
|
||||||
"xdg/hypr/hyprpaper.conf".source = ./config/etc/xdg/hypr/hyprpaper.conf;
|
"xdg/hypr/hyprpaper.conf".source = ./config/etc/xdg/hypr/hyprpaper.conf;
|
||||||
"xdg/hypr/rofi.conf" = {
|
|
||||||
text = ''
|
|
||||||
$rofi = ${pkgs.rofi}/bin/rofi -show drun -show-icons -config /etc/xdg/rofi/config.rasi
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
"xdg/waybar/colors.css".source = ./config/etc/xdg/waybar/colors.css;
|
"xdg/waybar/colors.css".source = ./config/etc/xdg/waybar/colors.css;
|
||||||
"xdg/waybar/config.jsonc".source = ./config/etc/xdg/waybar/config-${hostname}.jsonc;
|
"xdg/waybar/config.jsonc".source = ./config/etc/xdg/waybar/config-${hostname}.jsonc;
|
||||||
"xdg/waybar/style.css".source = ./config/etc/xdg/waybar/style.css;
|
"xdg/waybar/style.css".source = ./config/etc/xdg/waybar/style.css;
|
||||||
"xdg/waybar/custom.css".source = ./config/etc/xdg/waybar/custom-${hostname}.css;
|
"xdg/waybar/custom.css".source = ./config/etc/xdg/waybar/custom-${hostname}.css;
|
||||||
"xdg/scripts/update.sh".source = ./config/etc/xdg/scripts/update.sh;
|
|
||||||
|
"xdg/scripts/rofi-ssh.sh".source = ./config/etc/xdg/scripts/rofi-ssh.sh;
|
||||||
|
"xdg/scripts/waybar-mailbox.sh".source = ./config/etc/xdg/scripts/waybar-mailbox.sh;
|
||||||
|
"xdg/scripts/waybar-update.sh".source = ./config/etc/xdg/scripts/waybar-update.sh;
|
||||||
|
"xdg/scripts/wayland-disconnect.sh".source = ./config/etc/xdg/scripts/wayland-disconnect.sh;
|
||||||
|
"xdg/scripts/wayland-mpv.sh".source = ./config/etc/xdg/scripts/wayland-mpv.sh;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
sops = {
|
sops = {
|
||||||
|
|||||||
8
modules/optionnals/docker.nix
Normal file
8
modules/optionnals/docker.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{
|
||||||
|
username,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
virtualisation.docker.enable = true;
|
||||||
|
users.users.${username}.extraGroups = [ "docker" ];
|
||||||
|
}
|
||||||
@@ -5,30 +5,42 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
../ai.nix
|
#../ai.nix
|
||||||
../autologin.nix
|
../autologin.nix
|
||||||
|
../docker.nix
|
||||||
../k8s.nix
|
../k8s.nix
|
||||||
|
../libvirt.nix
|
||||||
../openfortivpn.nix
|
../openfortivpn.nix
|
||||||
|
../options.nix
|
||||||
../packages.nix
|
../packages.nix
|
||||||
../sops-desktop.nix
|
../sops-desktop.nix
|
||||||
../ssh.nix
|
../ssh.nix
|
||||||
../sudo-nopasswd.nix
|
../sudo-nopasswd.nix
|
||||||
|
../wakeonlan.nix
|
||||||
|
|
||||||
### Import GUI modules
|
### Import GUI modules
|
||||||
../desktop/code.nix
|
../desktop/code.nix
|
||||||
../desktop/dunst.nix
|
../desktop/dunst.nix
|
||||||
|
../desktop/gaming.nix
|
||||||
../desktop/kitty.nix
|
../desktop/kitty.nix
|
||||||
|
../desktop/nextcloud.nix
|
||||||
../desktop/packages.nix
|
../desktop/packages.nix
|
||||||
../desktop/pipewire.nix
|
../desktop/pipewire.nix
|
||||||
../desktop/qwerty-fr.nix
|
../desktop/qwerty-fr.nix
|
||||||
../desktop/rofi.nix
|
../desktop/rofi.nix
|
||||||
../desktop/starship.nix
|
../desktop/starship.nix
|
||||||
|
../desktop/virt-manager.nix
|
||||||
../desktop/wayland.nix
|
../desktop/wayland.nix
|
||||||
|
|
||||||
### Import Graphics modules
|
### Import Graphics modules
|
||||||
../desktop/nvidia.nix
|
../desktop/nvidia.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
|
my.laninterface = "enp5s0";
|
||||||
|
my.ipv4address = "192.168.0.2";
|
||||||
|
my.ipv4netmask = 24;
|
||||||
|
my.ipv4gateway = "192.168.0.254";
|
||||||
|
|
||||||
sops = {
|
sops = {
|
||||||
secrets = {
|
secrets = {
|
||||||
"wireguard_home/publickey" = { };
|
"wireguard_home/publickey" = { };
|
||||||
@@ -37,25 +49,31 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
#services.resolved.enable = false;
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
interfaces.enp5s0 = {
|
#useNetworkd = true;
|
||||||
|
#useHostResolvConf = false;
|
||||||
|
interfaces.${config.my.laninterface} = {
|
||||||
ipv4.addresses = [
|
ipv4.addresses = [
|
||||||
{
|
{
|
||||||
address = "192.168.0.2";
|
address = config.my.ipv4address;
|
||||||
prefixLength = 24;
|
prefixLength = config.my.ipv4netmask;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
defaultGateway = {
|
defaultGateway = {
|
||||||
address = "192.168.0.254";
|
address = config.my.ipv4gateway;
|
||||||
interface = "enp5s0";
|
interface = config.my.laninterface;
|
||||||
};
|
};
|
||||||
nameservers = [
|
nameservers = [
|
||||||
#"9.9.9.9"
|
"10.0.0.1"
|
||||||
|
"9.9.9.9"
|
||||||
"2001:41d0:303:20da::1"
|
"2001:41d0:303:20da::1"
|
||||||
"217.182.138.218"
|
"217.182.138.218"
|
||||||
];
|
];
|
||||||
extraHosts = ''
|
extraHosts = ''
|
||||||
|
#172.18.229.240 test-mycarto.grandbesancon.fr
|
||||||
172.18.21.172 errorpages.grandbesancon.fr
|
172.18.21.172 errorpages.grandbesancon.fr
|
||||||
#172.18.23.4 dozzle.grandbesancon.fr
|
#172.18.23.4 dozzle.grandbesancon.fr
|
||||||
#172.18.22.206 toto.grandbesancon.fr
|
#172.18.22.206 toto.grandbesancon.fr
|
||||||
@@ -63,6 +81,8 @@
|
|||||||
#172.18.20.37 sso.grandbesancon.fr
|
#172.18.20.37 sso.grandbesancon.fr
|
||||||
#172.18.20.229 auth.grandbesancon.fr
|
#172.18.20.229 auth.grandbesancon.fr
|
||||||
#172.18.20.181 traefikauth.grandbesancon.fr
|
#172.18.20.181 traefikauth.grandbesancon.fr
|
||||||
|
172.18.21.174 test-patchmon.grandbesancon.fr
|
||||||
|
172.18.229.240 test-mycarto-autonome.grandbesancon.fr
|
||||||
'';
|
'';
|
||||||
wireguard = {
|
wireguard = {
|
||||||
interfaces = {
|
interfaces = {
|
||||||
@@ -90,5 +110,29 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.tor-browser ];
|
|
||||||
|
sops.secrets."home-nix/myipv6address" = { };
|
||||||
|
|
||||||
|
systemd.services.ipv6-setup = {
|
||||||
|
description = "Configure IPv6";
|
||||||
|
after = [
|
||||||
|
"network.target"
|
||||||
|
"sops-nix.service"
|
||||||
|
];
|
||||||
|
wants = [ "sops-nix.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
ExecStart = pkgs.writeShellScript "setup-ipv6" ''
|
||||||
|
${pkgs.iproute2}/bin/ip -6 addr add $(cat ${
|
||||||
|
config.sops.secrets."home-nix/myipv6address".path
|
||||||
|
})/64 dev ${config.my.laninterface} || true
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [
|
||||||
|
pkgs.tor-browser
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
{
|
{
|
||||||
|
pkgs,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
@@ -6,14 +7,70 @@
|
|||||||
../sops-desktop.nix
|
../sops-desktop.nix
|
||||||
../sudo-nopasswd.nix
|
../sudo-nopasswd.nix
|
||||||
../autologin.nix
|
../autologin.nix
|
||||||
../ssh.nix
|
../packages.nix
|
||||||
|
|
||||||
### Import GUI modules
|
## Server
|
||||||
../desktop/dunst.nix
|
../server/starship.nix
|
||||||
../desktop/kitty.nix
|
../server/wireguard-ui.nix
|
||||||
../desktop/packages.nix
|
|
||||||
../desktop/qwerty-fr.nix
|
|
||||||
../desktop/rofi.nix
|
|
||||||
../desktop/wayland.nix
|
|
||||||
];
|
];
|
||||||
|
|
||||||
|
## Enable virtualisation guest settings
|
||||||
|
services.qemuGuest.enable = true;
|
||||||
|
services.spice-vdagentd.enable = true;
|
||||||
|
services.xserver = {
|
||||||
|
videoDrivers = [ "modesetting" ]; # Driver vidéo optimisé pour QEMU/KVM
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [
|
||||||
|
pkgs.spice-gtk # Outils SPICE
|
||||||
|
pkgs.spice-protocol # Protocoles SPICE
|
||||||
|
];
|
||||||
|
|
||||||
|
systemd.network.links."10-eth0" = {
|
||||||
|
matchConfig.MACAddress = "52:54:00:a3:d7:56";
|
||||||
|
linkConfig.Name = "eth0";
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.network.netdevs."10-dummy0" = {
|
||||||
|
netdevConfig = {
|
||||||
|
Kind = "dummy";
|
||||||
|
Name = "dummy0";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
useNetworkd = true;
|
||||||
|
useDHCP = false;
|
||||||
|
|
||||||
|
interfaces = {
|
||||||
|
dummy0 = {
|
||||||
|
ipv4.addresses = [
|
||||||
|
{
|
||||||
|
address = "192.168.2.1";
|
||||||
|
prefixLength = 24;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
eth0 = {
|
||||||
|
ipv4.addresses = [
|
||||||
|
{
|
||||||
|
address = "192.168.122.10";
|
||||||
|
prefixLength = 24;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
defaultGateway = {
|
||||||
|
address = "192.168.122.1";
|
||||||
|
interface = "eth0";
|
||||||
|
};
|
||||||
|
nameservers = [
|
||||||
|
#"9.9.9.9"
|
||||||
|
"2001:41d0:303:20da::1"
|
||||||
|
"217.182.138.218"
|
||||||
|
];
|
||||||
|
extraHosts = ''
|
||||||
|
172.18.21.172 errorpages.grandbesancon.fr
|
||||||
|
'';
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,11 +1,14 @@
|
|||||||
{
|
{
|
||||||
pkgs,
|
pkgs,
|
||||||
|
username,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
../autologin.nix
|
../autologin.nix
|
||||||
|
../docker.nix
|
||||||
../k8s.nix
|
../k8s.nix
|
||||||
|
../libvirt.nix
|
||||||
../openfortivpn.nix
|
../openfortivpn.nix
|
||||||
../packages.nix
|
../packages.nix
|
||||||
../sops-desktop.nix
|
../sops-desktop.nix
|
||||||
@@ -22,12 +25,27 @@
|
|||||||
../desktop/qwerty-fr.nix
|
../desktop/qwerty-fr.nix
|
||||||
../desktop/rofi.nix
|
../desktop/rofi.nix
|
||||||
../desktop/starship.nix
|
../desktop/starship.nix
|
||||||
|
../desktop/virt-manager.nix
|
||||||
../desktop/wayland.nix
|
../desktop/wayland.nix
|
||||||
|
|
||||||
### Import Graphics modules
|
### Import Graphics modules
|
||||||
../desktop/amd.nix
|
../desktop/amd.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.wireless.iwd.enable = true;
|
networking = {
|
||||||
|
networkmanager.enable = true;
|
||||||
|
extraHosts = ''
|
||||||
|
carto-interavtive 172.18.20.134
|
||||||
|
test-patchmon.grandbesancon.fr 172.18.21.174
|
||||||
|
test-crowdsec.grandbesancon.fr 172.18.21.67
|
||||||
|
test-syslog.grandbesancon.fr 172.18.21.67
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
users.users.${username} = {
|
||||||
|
extraGroups = [ "networkmanager" ];
|
||||||
|
};
|
||||||
programs.nm-applet.enable = true;
|
programs.nm-applet.enable = true;
|
||||||
|
environment.systemPackages = [
|
||||||
|
pkgs.wireguard-tools
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
27
modules/optionnals/libvirt.nix
Normal file
27
modules/optionnals/libvirt.nix
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
{
|
||||||
|
pkgs,
|
||||||
|
username,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
users.users.${username} = {
|
||||||
|
extraGroups = [ "libvirtd" ];
|
||||||
|
};
|
||||||
|
virtualisation = {
|
||||||
|
libvirtd = {
|
||||||
|
enable = true;
|
||||||
|
qemu = {
|
||||||
|
package = pkgs.qemu_full;
|
||||||
|
#package = pkgs.qemu;
|
||||||
|
runAsRoot = true;
|
||||||
|
swtpm.enable = true;
|
||||||
|
vhostUserPackages = [
|
||||||
|
pkgs.virtiofsd
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
virtiofsd
|
||||||
|
];
|
||||||
|
}
|
||||||
26
modules/optionnals/options.nix
Normal file
26
modules/optionnals/options.nix
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
{
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
options.my.laninterface = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "enp5s0";
|
||||||
|
};
|
||||||
|
options.my.ipv4address = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "127.0.0.1";
|
||||||
|
};
|
||||||
|
options.my.ipv4netmask = lib.mkOption {
|
||||||
|
type = lib.types.int;
|
||||||
|
default = 8;
|
||||||
|
};
|
||||||
|
options.my.ipv4gateway = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "127.0.0.254";
|
||||||
|
};
|
||||||
|
options.my.wolipv6address = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "fc::0";
|
||||||
|
};
|
||||||
|
}
|
||||||
101
modules/optionnals/server/starship.nix
Normal file
101
modules/optionnals/server/starship.nix
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
{
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
environment.sessionVariables = {
|
||||||
|
KUBECONFIG = "$HOME/.kube/config";
|
||||||
|
};
|
||||||
|
programs.starship = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
add_newline = true;
|
||||||
|
command_timeout = 1300;
|
||||||
|
scan_timeout = 50;
|
||||||
|
format = "[┌─](fg:surface1)$hostname$username$directory$git_branch$git_status[](fg:base bg:sky)$fill$kubernetes$time[─┐ ](fg:surface1)$line_break[└ ](fg:surface1)";
|
||||||
|
right_format = "[┘](fg:surface1)";
|
||||||
|
palette = "catppuccin_frappe";
|
||||||
|
|
||||||
|
hostname = {
|
||||||
|
ssh_only = false;
|
||||||
|
format = "[](bg:base fg:mauve)[ $hostname ](bg:mauve fg:base)[](bg:mauve fg:blue)";
|
||||||
|
disabled = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
username = {
|
||||||
|
style_user = "bg:blue fg:base";
|
||||||
|
style_root = "bg:red fg:base bold";
|
||||||
|
format = "[ $user ]($style)[](bg:blue fg:sapphire)";
|
||||||
|
show_always = true;
|
||||||
|
disabled = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
directory = {
|
||||||
|
format = "[ $path ](bg:sapphire fg:base)[](bg:sapphire fg:sky)";
|
||||||
|
truncation_length = 3;
|
||||||
|
truncation_symbol = "…/";
|
||||||
|
};
|
||||||
|
|
||||||
|
git_branch = {
|
||||||
|
symbol = " ";
|
||||||
|
format = "[ $symbol$branch(:$remote_branch) ](fg:base bg:sky)";
|
||||||
|
disabled = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
git_status = {
|
||||||
|
format = "([$all_status$ahead_behind ](fg:base bg:sky))";
|
||||||
|
conflicted = "😵";
|
||||||
|
ahead = "";
|
||||||
|
behind = "";
|
||||||
|
diverged = "😵";
|
||||||
|
up_to_date = "✓";
|
||||||
|
untracked = "★";
|
||||||
|
stashed = "📦";
|
||||||
|
modified = "✗";
|
||||||
|
#staged = "[($count)](fg:base bg:sapphire)"
|
||||||
|
staged = "";
|
||||||
|
renamed = "";
|
||||||
|
deleted = "";
|
||||||
|
disabled = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
fill = {
|
||||||
|
symbol = "─";
|
||||||
|
style = "surface1";
|
||||||
|
};
|
||||||
|
|
||||||
|
kubernetes = {
|
||||||
|
disabled = false;
|
||||||
|
format = "[](fg:blue bg:base)[ ($namespace)/($cluster) ](fg:base bg:blue)[](bg:blue fg:mauve)";
|
||||||
|
};
|
||||||
|
|
||||||
|
palettes.catppuccin_frappe = {
|
||||||
|
rosewater = "#f2d5cf";
|
||||||
|
flamingo = "#eebebe";
|
||||||
|
pink = "#f4b8e4";
|
||||||
|
mauve = "#ca9ee6";
|
||||||
|
red = "#e78284";
|
||||||
|
maroon = "#ea999c";
|
||||||
|
peach = "#ef9f76";
|
||||||
|
yellow = "#e5c890";
|
||||||
|
green = "#a6d189";
|
||||||
|
teal = "#81c8be";
|
||||||
|
sky = "#99d1db";
|
||||||
|
sapphire = "#85c1dc";
|
||||||
|
blue = "#8caaee";
|
||||||
|
lavender = "#babbf1";
|
||||||
|
text = "#c6d0f5";
|
||||||
|
subtext1 = "#b5bfe2";
|
||||||
|
subtext0 = "#a5adce";
|
||||||
|
overlay2 = "#949cbb";
|
||||||
|
overlay1 = "#838ba7";
|
||||||
|
overlay0 = "#737994";
|
||||||
|
surface2 = "#626880";
|
||||||
|
surface1 = "#51576d";
|
||||||
|
surface0 = "#414559";
|
||||||
|
base = "#303446";
|
||||||
|
mantle = "#292c3c";
|
||||||
|
crust = "#232634";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
97
modules/optionnals/server/wireguard-ui.nix
Normal file
97
modules/optionnals/server/wireguard-ui.nix
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
{
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
|
{
|
||||||
|
environment.systemPackages = [
|
||||||
|
pkgs.wireguard-tools
|
||||||
|
pkgs.wireguard-ui
|
||||||
|
];
|
||||||
|
|
||||||
|
users.users.wireguard-ui = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "wireguard-ui";
|
||||||
|
home = "/var/lib/wireguard-ui";
|
||||||
|
createHome = true;
|
||||||
|
description = "WireGuard UI service user";
|
||||||
|
};
|
||||||
|
|
||||||
|
users.groups.wireguard-ui = { };
|
||||||
|
|
||||||
|
systemd = {
|
||||||
|
tmpfiles.rules = [
|
||||||
|
"d /etc/wireguard 0750 wireguard-ui wireguard-ui -"
|
||||||
|
"d /var/lib/wireguard-ui 0750 wireguard-ui wireguard-ui -"
|
||||||
|
];
|
||||||
|
|
||||||
|
services = {
|
||||||
|
wg-quick-wg0 = {
|
||||||
|
description = "WireGuard via wg-quick(8) for wg0";
|
||||||
|
after = [
|
||||||
|
"network-online.target"
|
||||||
|
"wireguard-ui.service"
|
||||||
|
];
|
||||||
|
wants = [ "network-online.target" ];
|
||||||
|
wantedBy = [
|
||||||
|
"multi-user.target"
|
||||||
|
"sshd.service"
|
||||||
|
];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
ExecStart = "${pkgs.wireguard-tools}/bin/wg-quick up wg0";
|
||||||
|
ExecStop = "${pkgs.wireguard-tools}/bin/wg-quick down wg0";
|
||||||
|
ExecReload = "${pkgs.bash}/bin/bash -c 'exec ${pkgs.wireguard-tools}/bin/wg syncconf wg0 <(exec ${pkgs.wireguard-tools}/bin/wg-quick strip wg0)'";
|
||||||
|
Environment = [ "WG_ENDPOINT_RESOLUTION_RETRIES=infinity" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
wireguard-ui = {
|
||||||
|
description = "WireGuard UI";
|
||||||
|
documentation = [ "https://github.com/ngoduykhanh/wireguard-ui" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.wireguard-ui}/bin/wireguard-ui";
|
||||||
|
Restart = "on-failure";
|
||||||
|
WorkingDirectory = "/var/lib/wireguard-ui";
|
||||||
|
StateDirectory = "wireguard-ui";
|
||||||
|
User = "wireguard-ui";
|
||||||
|
Group = "wireguard-ui";
|
||||||
|
ReadWritePaths = [
|
||||||
|
"/var/lib/wireguard-ui"
|
||||||
|
"/etc/wireguard"
|
||||||
|
];
|
||||||
|
|
||||||
|
Environment = [
|
||||||
|
# "WGUI_ENDPOINT_ADDRESS=${config.custom.wireguard-ui.endpointAddress}"
|
||||||
|
# "WGUI_DNS=${config.custom.wireguard-ui.dns}"
|
||||||
|
];
|
||||||
|
|
||||||
|
AmbientCapabilities = "CAP_NET_ADMIN";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
wg-quick-wg0-reload = {
|
||||||
|
description = "Reload WireGuard config";
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
ExecStart = "${pkgs.systemd}/bin/systemctl reload wg-quick-wg0.service";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
paths.wg-quick-wg0-reload = {
|
||||||
|
description = "Watch /etc/wireguard/wg0.conf for changes";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
pathConfig = {
|
||||||
|
PathModified = "/etc/wireguard/wg0.conf";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
networking.firewall.allowedTCPPorts = [ 5000 ];
|
||||||
|
networking.firewall.allowedUDPPorts = [ 51820 ];
|
||||||
|
}
|
||||||
@@ -1,66 +1,61 @@
|
|||||||
{
|
{
|
||||||
inputs,
|
|
||||||
username,
|
username,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
|
||||||
secretsPath = builtins.toString inputs.mysecrets;
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
sops = {
|
sops.secrets = {
|
||||||
defaultSopsFile = "${secretsPath}/secrets.yaml";
|
"users_password/beastie" = {
|
||||||
age = {
|
neededForUsers = true;
|
||||||
sshKeyPaths = [
|
|
||||||
"/etc/ssh/ssh_host_ed25519_key"
|
|
||||||
];
|
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
generateKey = true;
|
|
||||||
};
|
};
|
||||||
|
"ssh_keys/default_pub" = {
|
||||||
secrets = {
|
owner = "${username}";
|
||||||
"users_password/beastie" = {
|
mode = "0644";
|
||||||
neededForUsers = true;
|
path = "/home/${username}/.ssh/id_ed25519.pub";
|
||||||
};
|
};
|
||||||
"ssh_keys/default_pub" = {
|
"ssh_keys/default_priv" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0644";
|
mode = "0600";
|
||||||
path = "/home/${username}/.ssh/id_ed25519.pub";
|
path = "/home/${username}/.ssh/id_ed25519";
|
||||||
};
|
};
|
||||||
"ssh_keys/default_priv" = {
|
"ssh_keys/ansible_pub" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0600";
|
mode = "0644";
|
||||||
path = "/home/${username}/.ssh/id_ed25519";
|
path = "/home/${username}/.ssh/id_ed25519_ansible.pub";
|
||||||
};
|
};
|
||||||
"ssh_keys/ansible_pub" = {
|
"ssh_keys/ansible_priv" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0644";
|
mode = "0600";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_ansible.pub";
|
path = "/home/${username}/.ssh/id_ed25519_ansible";
|
||||||
};
|
};
|
||||||
"ssh_keys/ansible_priv" = {
|
"ssh_keys/beastie_pub" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0600";
|
mode = "0644";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_ansible";
|
path = "/home/${username}/.ssh/id_ed25519_beastie.pub";
|
||||||
};
|
};
|
||||||
"ssh_keys/beastie_pub" = {
|
"ssh_keys/beastie_priv" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0644";
|
mode = "0600";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_beastie.pub";
|
path = "/home/${username}/.ssh/id_ed25519_beastie";
|
||||||
};
|
};
|
||||||
"ssh_keys/beastie_priv" = {
|
"ssh_keys/gitea_semaphore_pub" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0600";
|
mode = "0644";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_beastie";
|
path = "/home/${username}/.ssh/id_ed25519_gitea_semaphore.pub";
|
||||||
};
|
};
|
||||||
"ssh_keys/gitea_semaphore_pub" = {
|
"ssh_keys/gitea_semaphore_priv" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0644";
|
mode = "0600";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_gitea_semaphore.pub";
|
path = "/home/${username}/.ssh/id_ed25519_gitea_semaphore";
|
||||||
};
|
};
|
||||||
"ssh_keys/gitea_semaphore_priv" = {
|
"ssh_keys/wol_pub" = {
|
||||||
owner = "${username}";
|
owner = "${username}";
|
||||||
mode = "0600";
|
mode = "0644";
|
||||||
path = "/home/${username}/.ssh/id_ed25519_gitea_semaphore";
|
path = "/home/${username}/.ssh/id_ed25519_wol";
|
||||||
};
|
};
|
||||||
|
"ssh_keys/wol_priv" = {
|
||||||
|
owner = "${username}";
|
||||||
|
mode = "0600";
|
||||||
|
path = "/home/${username}/.ssh/id_ed25519_wol.priv";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
47
modules/optionnals/wakeonlan.nix
Normal file
47
modules/optionnals/wakeonlan.nix
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
hostname,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
systemd.services."wol${config.my.laninterface}" = {
|
||||||
|
description = "Wake-on-LAN for ${config.my.laninterface}";
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
ExecStart = "${pkgs.ethtool}/bin/ethtool -s ${config.my.laninterface} wol g";
|
||||||
|
RandomizedDelaySec = "30s";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
environment.systemPackages = [ pkgs.ethtool ];
|
||||||
|
|
||||||
|
my.wolipv6address = "2a01:e0a:f5d:3400:6b2c:41d7:e9f5";
|
||||||
|
|
||||||
|
boot.initrd = {
|
||||||
|
network = {
|
||||||
|
enable = true;
|
||||||
|
ssh = {
|
||||||
|
enable = true;
|
||||||
|
port = 65234;
|
||||||
|
authorizedKeys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ2+PXfG/37rsvcVr2RAHzXmGHMr8+8iBH//1YS+zWd3"
|
||||||
|
]; # ta clé publique
|
||||||
|
hostKeys = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
||||||
|
};
|
||||||
|
postCommands = ''
|
||||||
|
ip -6 addr add ${config.my.wolipv6address}/64 dev ${config.my.laninterface}
|
||||||
|
ip -6 route add default via fe80::3a07:16ff:fe11:45a8 dev ${config.my.laninterface}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
availableKernelModules = [ "r8169" ];
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
boot = {
|
||||||
|
kernelParams = [
|
||||||
|
"ip=${config.my.ipv4address}::255.255.255.0:${config.my.ipv4gateway}:${hostname}:${config.my.laninterface}:off"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user