Compare commits

...

2 commits

Author SHA1 Message Date
b72c2a344d
feat: add powermenu using configured dmenu tool 2024-12-31 01:00:57 +01:00
8745cf3eff
feat: add ntfy 2024-12-31 01:00:45 +01:00
5 changed files with 42 additions and 18 deletions

View file

@ -5,8 +5,9 @@
... ...
}: }:
let let
inherit (pkgs.writers) writeFishBin; inherit (pkgs.writers) writeFishBin writeBashBin;
inherit (lib.my) getExe; inherit (lib.my) getExe;
runner = config.modules.system.roles.desktop.runner;
nixos-rebuild = nixos-rebuild =
name: word: name: word:
writeFishBin name '' writeFishBin name ''
@ -111,4 +112,15 @@ in
--use-remote-sudo &| ${getExe pkgs.nix-output-monitor} --use-remote-sudo &| ${getExe pkgs.nix-output-monitor}
''; '';
powerMenu = writeBashBin "power-menu" ''
case "$(echo -e "Shutdown\nRestart\nHibernate\nLogout\nSuspend\nLock" | ${runner.dmenu} )" in
Shutdown) exec systemctl poweroff ;;
Restart) exec systemctl reboot ;;
Logout) exec loginctl terminate-session "$${XDG_SESSION_ID-}" ;;
Hibernate) exec systemctl hibernate ;;
Suspend) exec systemctl suspend ;;
Lock) exec loginctl lock-session "$${XDG_SESSION_ID-}" ;;
esac
'';
} }

View file

@ -63,7 +63,7 @@ lib.mkIf osConfig.programs.sway.enable {
lib.mkOptionDefault { lib.mkOptionDefault {
"${mod}+p" = "exec ${getExe pkgs.hyprlock}"; "${mod}+p" = "exec ${getExe pkgs.hyprlock}";
"${mod}+Shift+p" = "exec ${getExe pkgs.rofi} -show p -modi p:${getExe pkgs.rofi-power-menu}"; "${mod}+Shift+p" = "exec ${getExe pkgs.scripts.powerMenu}";
# Reload the config file # Reload the config file
"${mod}+Shift+c" = "reload"; "${mod}+Shift+c" = "reload";
# Kill the focused window # Kill the focused window

View file

@ -22,7 +22,10 @@ in
auth_attempts = 5; auth_attempts = 5;
block_auth_min = 10; block_auth_min = 10;
dns = { dns = {
bind_hosts = [ "0.0.0.0" ]; bind_hosts = [
"192.168.178.27"
"100.64.0.4"
];
port = 53; port = 53;
upstream_mode = "load_balance"; upstream_mode = "load_balance";
upstream_dns_file = config.age.secrets.adguard-dns-list.path; upstream_dns_file = config.age.secrets.adguard-dns-list.path;

View file

@ -159,20 +159,29 @@
}; };
}; };
}; };
};
networking.firewall.allowedTCPPorts = [ 5232 ];
# security.acme = { ntfy-sh = {
#acceptTerms = true; enable = true;
#certs = { settings =
#"ccnlc.eu" = { let
#email = "dns@ccnlc.eu"; root = "/var/lib/ntfy-sh";
#dnsProvider = "ovh"; in
#extraDomainNames = [ "*.ccnlc.eu" ]; {
#environmentFile = "/var/secrets/ovh-ccnlc"; base-url = "https://ntfy.ccnlc.eu";
#}; listen-http = "0.0.0.0:9393";
#}; auth-default-access = "deny-all";
#}; behind-proxy = true;
attachment-cache-dir = "${root}/attachments";
enable-signup = true;
enable-login = true;
};
};
};
networking.firewall.allowedTCPPorts = [
5232
9393
];
fileSystems = { fileSystems = {
"/mnt/shows" = { "/mnt/shows" = {

View file

@ -1,7 +1,7 @@
{ config, lib, ... }: { config, lib, ... }:
let let
cfg = config.modules.container; cfg = config.modules.container;
inherit (lib) mkIf mkEnableOption; inherit (lib) mkIf mkEnableOption mkForce;
in in
{ {
imports = [ imports = [
@ -20,7 +20,7 @@ in
dockerCompat = true; dockerCompat = true;
defaultNetwork.settings = { defaultNetwork.settings = {
# Required for container networking to be able to use names. # Required for container networking to be able to use names.
dns_enabled = false; dns_enabled = mkForce false;
}; };
}; };
virtualisation.oci-containers.backend = "podman"; virtualisation.oci-containers.backend = "podman";