Compare commits

...

5 commits

Author SHA1 Message Date
2eb00aa92b
refactor: hjemify foot & keepassxc
Some checks failed
/ test (push) Failing after 1s
2025-02-10 17:55:19 +01:00
fd52404b93
chore: update nysh
Some checks failed
/ test (push) Failing after 2s
2025-02-10 15:30:38 +01:00
d878a12f5b
feat: add hass ip 2025-02-10 15:30:10 +01:00
e9efefd7d2
feat: add meta for tailscale ip and use it in headsale ACL parameters
Some checks failed
/ test (push) Failing after 1s
2025-02-08 12:47:03 +01:00
7c247098cb
chore: shuffle forgejo files in raptus around 2025-02-05 16:56:30 +01:00
19 changed files with 105 additions and 37 deletions

53
flake.lock generated
View file

@ -156,6 +156,49 @@
"type": "github" "type": "github"
} }
}, },
"hjem": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1737619027,
"narHash": "sha256-jEzZs9dHdmVP5X9HCC/7jrv08aWFfqZV5cZ+cZWYGA4=",
"owner": "feel-co",
"repo": "hjem",
"rev": "48cfa21987672a31a358b7e4d582fc174556e633",
"type": "github"
},
"original": {
"owner": "feel-co",
"repo": "hjem",
"type": "github"
}
},
"hjem-rum": {
"inputs": {
"hjem": [
"hjem"
],
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1738790283,
"narHash": "sha256-SKz3KfmK7iupR+Ef022pQQZccxXlm/2w5HxpSv+PAGE=",
"owner": "nydragon",
"repo": "hjem-rum",
"rev": "ac4bf585731b813ad37cb3822ad44b1e3bb16a7e",
"type": "github"
},
"original": {
"owner": "nydragon",
"repo": "hjem-rum",
"type": "github"
}
},
"home-manager": { "home-manager": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@ -282,11 +325,11 @@
"quickshell": "quickshell" "quickshell": "quickshell"
}, },
"locked": { "locked": {
"lastModified": 1738528812, "lastModified": 1739197721,
"narHash": "sha256-NgGylCEFg500fF8bDZfKhS+wSGT4wkHIg567XAwrFZ0=", "narHash": "sha256-+EYoZfeHycIH52SJMEkGtmsTddXa8dW06aDJCVg+lcI=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "f269a01ec07c12a19482caacbf67223a4eab22d3", "rev": "603e1c09b39ee57f6ea94f45b117360736816358",
"revCount": 104, "revCount": 106,
"type": "git", "type": "git",
"url": "https://git.ccnlc.eu/nydragon/nysh.git" "url": "https://git.ccnlc.eu/nydragon/nysh.git"
}, },
@ -340,6 +383,8 @@
"agenix": "agenix", "agenix": "agenix",
"disko": "disko", "disko": "disko",
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"hjem": "hjem",
"hjem-rum": "hjem-rum",
"home-manager": "home-manager", "home-manager": "home-manager",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs_2", "nixpkgs": "nixpkgs_2",

View file

@ -35,6 +35,16 @@
url = "git+https://git.ccnlc.eu/nydragon/nur.git"; url = "git+https://git.ccnlc.eu/nydragon/nur.git";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
hjem = {
url = "github:feel-co/hjem";
inputs.nixpkgs.follows = "nixpkgs";
};
hjem-rum = {
url = "github:nydragon/hjem-rum";
inputs.nixpkgs.follows = "nixpkgs";
inputs.hjem.follows = "hjem";
};
}; };
outputs = outputs =

View file

@ -7,7 +7,6 @@
./hyprland ./hyprland
./hyprlock ./hyprlock
./services ./services
./foot.nix
./rofi ./rofi
./sway ./sway
./waybar ./waybar

View file

@ -6,7 +6,6 @@
./fuzzel.nix ./fuzzel.nix
./gammastep.nix # default because I need to protect my peepers ./gammastep.nix # default because I need to protect my peepers
./swww.nix ./swww.nix
./keepassxc.nix
./swayidle.nix ./swayidle.nix
./swaylock.nix ./swaylock.nix
]; ];

View file

@ -5,7 +5,6 @@
./git ./git
./fish ./fish
./btop.nix ./btop.nix
./hyfetch.nix
./beets.nix ./beets.nix
]; ];
} }

View file

@ -1,15 +0,0 @@
{
programs.fastfetch.enable = true;
programs.hyfetch = {
enable = true;
settings = {
mode = "rgb"; # dunno the other value :sob:
lightness = 0.7; # u may change this
distro = "nixos";
preset = "pansexual"; # sexuality
light_dark = "dark"; # u not crazy are u
backend = "fastfetch";
color_align.mode = "horizontal"; # looks better
};
};
}

View file

@ -12,6 +12,7 @@ in
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./home.nix ./home.nix
../../users/ny
]; ];
boot.loader = { boot.loader = {
@ -37,6 +38,7 @@ in
modules = { modules = {
system = { system = {
roles.desktop.enable = true; roles.desktop.enable = true;
roles.gaming.enable = true;
outputs = { outputs = {
"DP-2" = { "DP-2" = {

View file

@ -25,7 +25,11 @@ in
inherit username; inherit username;
hostname = "brontes"; hostname = "brontes";
system = "x86_64-linux"; system = "x86_64-linux";
extraModules = [ inputs.agenix.nixosModules.default ]; extraModules = [
inputs.agenix.nixosModules.default
inputs.hjem.nixosModules.default
inputs.hjem-rum.nixosModules.default
];
}) })
(mkSystem' { (mkSystem' {

View file

@ -13,8 +13,7 @@ in
imports = [ imports = [
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
./disk-config.nix ./disk-config.nix
./forgejo.nix ./forgejo
./forgejo-runner.nix
./headscale ./headscale
./fail2ban.nix ./fail2ban.nix
]; ];

View file

@ -4,6 +4,10 @@ let
sshPort = 2222; sshPort = 2222;
in in
{ {
imports = [
./runner.nix
];
systemd.tmpfiles.rules = systemd.tmpfiles.rules =
let let
# Disallow crawlers from indexing this site. # Disallow crawlers from indexing this site.

View file

@ -2,6 +2,7 @@
pkgs, pkgs,
options, options,
lib, lib,
self,
... ...
}: }:
let let
@ -13,6 +14,9 @@ let
action = "accept"; action = "accept";
inherit src dst users; inherit src dst users;
}; };
shanMeta = self.nixosConfigurations.shan.config.modules.meta;
homeAIp = "100.64.0.9";
in in
{ {
services.headscale.settings.policy.path = pkgs.writeTextFile { services.headscale.settings.policy.path = pkgs.writeTextFile {
@ -39,7 +43,7 @@ in
[ [
"tag:guest" "tag:guest"
] ]
[ "100.64.0.4:443" ] [ "${shanMeta.tailscale.ip}:443" "${homeAIp}:80" ]
) )
]; ];

View file

@ -28,6 +28,9 @@
}; };
modules = { modules = {
meta = {
tailscale.ip = "100.64.0.4";
};
system.networking.bluetooth.enable = true; system.networking.bluetooth.enable = true;
container = { container = {
kitchenowl = { kitchenowl = {

View file

@ -1,7 +1,7 @@
{ lib, ... }: { lib, ... }:
let let
inherit (lib) mkOption stringLength; inherit (lib) mkOption stringLength;
inherit (lib.types) str strMatching; inherit (lib.types) str strMatching nullOr;
validateUserName = validateUserName =
x: x:
@ -24,5 +24,11 @@ in
# Should handle multiple users one day? maybe... # Should handle multiple users one day? maybe...
description = "This system's primary user."; description = "This system's primary user.";
}; };
tailscale = {
ip = mkOption {
default = null;
type = nullOr str;
};
};
}; };
} }

1
users/default.nix Normal file
View file

@ -0,0 +1 @@
{ imports = [ ./ny ]; }

9
users/ny/default.nix Normal file
View file

@ -0,0 +1,9 @@
{
hjem = {
users.ny = {
enable = true;
imports = [ ./programs ];
};
clobberByDefault = true;
};
}

View file

@ -0,0 +1,6 @@
{
imports = [
./foot.nix
./keepassxc.nix
];
}

View file

@ -1,5 +1,5 @@
{ {
programs.foot = { rum.programs.foot = {
enable = true; enable = true;
settings = { settings = {
main = { main = {

View file

@ -1,12 +1,7 @@
{ pkgs, ... }:
let
ini = pkgs.formats.ini { };
in
{ {
home.file."keepassxc" = { rum.programs.keepassxc = {
enable = true; enable = true;
settings = {
source = ini.generate "keepassxc.ini" {
General = { General = {
BackupBeforeSave = true; BackupBeforeSave = true;
ConfigVersion = 2; ConfigVersion = 2;
@ -24,7 +19,5 @@ in
TrayIconAppearance = "colorful"; TrayIconAppearance = "colorful";
}; };
}; };
target = ".config/keepassxc/keepassxc.ini";
}; };
} }