Move Nix files back to the root of the project

This commit is contained in:
Oliver Davies 2025-03-29 23:19:06 +00:00
parent 52044d9995
commit 087153a16d
223 changed files with 12 additions and 12 deletions

View file

@ -0,0 +1,5 @@
{
imports = [
./docker.nix
];
}

View file

@ -0,0 +1,18 @@
{ lib, config, ... }:
with lib;
{
options.nixosModules.docker.enable = mkEnableOption "Enable Docker";
config = mkIf config.nixosModules.docker.enable {
virtualisation.docker = {
enable = true;
autoPrune = {
enable = true;
dates = "weekly";
};
};
};
}

10
modules/nixos/default.nix Normal file
View file

@ -0,0 +1,10 @@
{
imports = [
./cli
./desktop
./gaming.nix
./homelab
./fonts.nix
./xbanish.nix
];
}

View file

@ -0,0 +1,9 @@
{
imports = [
./dwm.nix
./peek.nix
./screenkey.nix
./st.nix
./thunar.nix
];
}

View file

@ -0,0 +1,43 @@
{
config,
lib,
pkgs,
self,
...
}:
with lib;
{
options.nixosModules.dwm.enable = mkEnableOption "Enable dwm";
config = mkIf config.nixosModules.dwm.enable {
services = {
dwm-status = {
enable = true;
order = [
"audio"
"battery"
"network"
"time"
];
};
xserver = {
displayManager.startx.enable = true;
windowManager.dwm.enable = true;
};
};
systemd.user.services.dwm-status.serviceConfig.Restart = "on-failure";
environment.systemPackages = with pkgs; [
dmenu
dmenu-bluetooth
networkmanager_dmenu
slock
xdotool
];
};
}

View file

@ -0,0 +1,16 @@
{
config,
lib,
pkgs,
...
}:
with lib;
{
options.nixosModules.peek.enable = mkEnableOption "Enable peek";
config = mkIf config.nixosModules.peek.enable {
environment.systemPackages = with pkgs; [ peek ];
};
}

View file

@ -0,0 +1,25 @@
{
config,
lib,
pkgs,
username,
...
}:
with lib;
{
options.nixosModules.screenkey.enable = mkEnableOption "Enable screenkey";
config = mkIf config.nixosModules.screenkey.enable {
environment.systemPackages = with pkgs; [ screenkey ];
home-manager.users.${username}.xdg.configFile."screenkey.json".text = builtins.toJSON {
key_mode = "composed";
mods_mode = "emacs";
persist = true;
size = "small";
timeout = 0.25;
};
};
}

View file

@ -0,0 +1,374 @@
{
config,
lib,
pkgs,
...
}:
with lib;
{
options.nixosModules.st = {
enable = mkEnableOption "Enable st";
};
config = mkIf config.nixosModules.st.enable {
environment.systemPackages = with pkgs; [
(st.override {
conf = ''
static char *font = "MesloLGSNerdFontMono:pixelsize=16:antialias=true:autohint=true";
int disablebold = 1;
int disableitalic = 1;
int disableroman = 1;
static int borderpx = 2;
static char *shell = "/bin/sh";
char *utmp = NULL;
char *scroll = NULL;
char *stty_args = "stty raw pass8 nl -echo -iexten -cstopb 38400";
char *vtiden = "\033[?6c";
static float cwscale = 1.0;
static float chscale = 1.0;
wchar_t *worddelimiters = L" ";
static unsigned int doubleclicktimeout = 300;
static unsigned int tripleclicktimeout = 600;
int allowaltscreen = 1;
int allowwindowops = 0;
static double minlatency = 2;
static double maxlatency = 33;
static unsigned int blinktimeout = 800;
static unsigned int cursorthickness = 2;
static int bellvolume = 0;
char *termname = "st-256color";
unsigned int tabspaces = 8;
static const char *colorname[] = {
"black",
"red3",
"green3",
"yellow3",
"blue2",
"magenta3",
"cyan3",
"gray90",
"gray50",
"red",
"green",
"yellow",
"#5c5cff",
"magenta",
"cyan",
"white",
[255] = 0,
"#cccccc",
"#555555",
"gray90",
"black",
};
unsigned int defaultfg = 258;
unsigned int defaultbg = 259;
unsigned int defaultcs = 256;
static unsigned int defaultrcs = 257;
static unsigned int cursorshape = 2;
static unsigned int cols = 80;
static unsigned int rows = 24;
static unsigned int mouseshape = XC_xterm;
static unsigned int mousefg = 7;
static unsigned int mousebg = 0;
static unsigned int defaultattr = 11;
static uint forcemousemod = ShiftMask;
static MouseShortcut mshortcuts[] = {
{ XK_ANY_MOD, Button2, selpaste, {.i = 0}, 1 },
{ ShiftMask, Button4, ttysend, {.s = "\033[5;2~"} },
{ XK_ANY_MOD, Button4, ttysend, {.s = "\031"} },
{ ShiftMask, Button5, ttysend, {.s = "\033[6;2~"} },
{ XK_ANY_MOD, Button5, ttysend, {.s = "\005"} },
};
#define MODKEY Mod1Mask
#define TERMMOD (ControlMask|ShiftMask)
static Shortcut shortcuts[] = {
{ XK_ANY_MOD, XK_Break, sendbreak, {.i = 0} },
{ ControlMask, XK_Print, toggleprinter, {.i = 0} },
{ ShiftMask, XK_Print, printscreen, {.i = 0} },
{ XK_ANY_MOD, XK_Print, printsel, {.i = 0} },
{ TERMMOD, XK_Prior, zoom, {.f = +1} },
{ TERMMOD, XK_Next, zoom, {.f = -1} },
{ TERMMOD, XK_Home, zoomreset, {.f = 0} },
{ TERMMOD, XK_C, clipcopy, {.i = 0} },
{ TERMMOD, XK_D, zoom, {.f = -2} },
{ TERMMOD, XK_J, zoom, {.f = -1} },
{ TERMMOD, XK_K, zoom, {.f = +1} },
{ TERMMOD, XK_U, zoom, {.f = +2} },
{ TERMMOD, XK_V, clippaste, {.i = 0} },
{ TERMMOD, XK_Y, selpaste, {.i = 0} },
{ ShiftMask, XK_Insert, selpaste, {.i = 0} },
{ TERMMOD, XK_Num_Lock, numlock, {.i = 0} },
};
static KeySym mappedkeys[] = { -1 };
static uint ignoremod = Mod2Mask|XK_SWITCH_MOD;
static Key key[] = {
{ XK_KP_Home, ShiftMask, "\033[2J", 0, -1},
{ XK_KP_Home, ShiftMask, "\033[1;2H", 0, +1},
{ XK_KP_Home, XK_ANY_MOD, "\033[H", 0, -1},
{ XK_KP_Home, XK_ANY_MOD, "\033[1~", 0, +1},
{ XK_KP_Up, XK_ANY_MOD, "\033Ox", +1, 0},
{ XK_KP_Up, XK_ANY_MOD, "\033[A", 0, -1},
{ XK_KP_Up, XK_ANY_MOD, "\033OA", 0, +1},
{ XK_KP_Down, XK_ANY_MOD, "\033Or", +1, 0},
{ XK_KP_Down, XK_ANY_MOD, "\033[B", 0, -1},
{ XK_KP_Down, XK_ANY_MOD, "\033OB", 0, +1},
{ XK_KP_Left, XK_ANY_MOD, "\033Ot", +1, 0},
{ XK_KP_Left, XK_ANY_MOD, "\033[D", 0, -1},
{ XK_KP_Left, XK_ANY_MOD, "\033OD", 0, +1},
{ XK_KP_Right, XK_ANY_MOD, "\033Ov", +1, 0},
{ XK_KP_Right, XK_ANY_MOD, "\033[C", 0, -1},
{ XK_KP_Right, XK_ANY_MOD, "\033OC", 0, +1},
{ XK_KP_Prior, ShiftMask, "\033[5;2~", 0, 0},
{ XK_KP_Prior, XK_ANY_MOD, "\033[5~", 0, 0},
{ XK_KP_Begin, XK_ANY_MOD, "\033[E", 0, 0},
{ XK_KP_End, ControlMask, "\033[J", -1, 0},
{ XK_KP_End, ControlMask, "\033[1;5F", +1, 0},
{ XK_KP_End, ShiftMask, "\033[K", -1, 0},
{ XK_KP_End, ShiftMask, "\033[1;2F", +1, 0},
{ XK_KP_End, XK_ANY_MOD, "\033[4~", 0, 0},
{ XK_KP_Next, ShiftMask, "\033[6;2~", 0, 0},
{ XK_KP_Next, XK_ANY_MOD, "\033[6~", 0, 0},
{ XK_KP_Insert, ShiftMask, "\033[2;2~", +1, 0},
{ XK_KP_Insert, ShiftMask, "\033[4l", -1, 0},
{ XK_KP_Insert, ControlMask, "\033[L", -1, 0},
{ XK_KP_Insert, ControlMask, "\033[2;5~", +1, 0},
{ XK_KP_Insert, XK_ANY_MOD, "\033[4h", -1, 0},
{ XK_KP_Insert, XK_ANY_MOD, "\033[2~", +1, 0},
{ XK_KP_Delete, ControlMask, "\033[M", -1, 0},
{ XK_KP_Delete, ControlMask, "\033[3;5~", +1, 0},
{ XK_KP_Delete, ShiftMask, "\033[2K", -1, 0},
{ XK_KP_Delete, ShiftMask, "\033[3;2~", +1, 0},
{ XK_KP_Delete, XK_ANY_MOD, "\033[P", -1, 0},
{ XK_KP_Delete, XK_ANY_MOD, "\033[3~", +1, 0},
{ XK_KP_Multiply, XK_ANY_MOD, "\033Oj", +2, 0},
{ XK_KP_Add, XK_ANY_MOD, "\033Ok", +2, 0},
{ XK_KP_Enter, XK_ANY_MOD, "\033OM", +2, 0},
{ XK_KP_Enter, XK_ANY_MOD, "\r", -1, 0},
{ XK_KP_Subtract, XK_ANY_MOD, "\033Om", +2, 0},
{ XK_KP_Decimal, XK_ANY_MOD, "\033On", +2, 0},
{ XK_KP_Divide, XK_ANY_MOD, "\033Oo", +2, 0},
{ XK_KP_0, XK_ANY_MOD, "\033Op", +2, 0},
{ XK_KP_1, XK_ANY_MOD, "\033Oq", +2, 0},
{ XK_KP_2, XK_ANY_MOD, "\033Or", +2, 0},
{ XK_KP_3, XK_ANY_MOD, "\033Os", +2, 0},
{ XK_KP_4, XK_ANY_MOD, "\033Ot", +2, 0},
{ XK_KP_5, XK_ANY_MOD, "\033Ou", +2, 0},
{ XK_KP_6, XK_ANY_MOD, "\033Ov", +2, 0},
{ XK_KP_7, XK_ANY_MOD, "\033Ow", +2, 0},
{ XK_KP_8, XK_ANY_MOD, "\033Ox", +2, 0},
{ XK_KP_9, XK_ANY_MOD, "\033Oy", +2, 0},
{ XK_Up, ShiftMask, "\033[1;2A", 0, 0},
{ XK_Up, Mod1Mask, "\033[1;3A", 0, 0},
{ XK_Up, ShiftMask|Mod1Mask, "\033[1;4A", 0, 0},
{ XK_Up, ControlMask, "\033[1;5A", 0, 0},
{ XK_Up, ShiftMask|ControlMask, "\033[1;6A", 0, 0},
{ XK_Up, ControlMask|Mod1Mask, "\033[1;7A", 0, 0},
{ XK_Up, ShiftMask|ControlMask|Mod1Mask, "\033[1;8A", 0, 0},
{ XK_Up, XK_ANY_MOD, "\033[A", 0, -1},
{ XK_Up, XK_ANY_MOD, "\033OA", 0, +1},
{ XK_Down, ShiftMask, "\033[1;2B", 0, 0},
{ XK_Down, Mod1Mask, "\033[1;3B", 0, 0},
{ XK_Down, ShiftMask|Mod1Mask, "\033[1;4B", 0, 0},
{ XK_Down, ControlMask, "\033[1;5B", 0, 0},
{ XK_Down, ShiftMask|ControlMask, "\033[1;6B", 0, 0},
{ XK_Down, ControlMask|Mod1Mask, "\033[1;7B", 0, 0},
{ XK_Down, ShiftMask|ControlMask|Mod1Mask, "\033[1;8B", 0, 0},
{ XK_Down, XK_ANY_MOD, "\033[B", 0, -1},
{ XK_Down, XK_ANY_MOD, "\033OB", 0, +1},
{ XK_Left, ShiftMask, "\033[1;2D", 0, 0},
{ XK_Left, Mod1Mask, "\033[1;3D", 0, 0},
{ XK_Left, ShiftMask|Mod1Mask, "\033[1;4D", 0, 0},
{ XK_Left, ControlMask, "\033[1;5D", 0, 0},
{ XK_Left, ShiftMask|ControlMask, "\033[1;6D", 0, 0},
{ XK_Left, ControlMask|Mod1Mask, "\033[1;7D", 0, 0},
{ XK_Left, ShiftMask|ControlMask|Mod1Mask, "\033[1;8D", 0, 0},
{ XK_Left, XK_ANY_MOD, "\033[D", 0, -1},
{ XK_Left, XK_ANY_MOD, "\033OD", 0, +1},
{ XK_Right, ShiftMask, "\033[1;2C", 0, 0},
{ XK_Right, Mod1Mask, "\033[1;3C", 0, 0},
{ XK_Right, ShiftMask|Mod1Mask, "\033[1;4C", 0, 0},
{ XK_Right, ControlMask, "\033[1;5C", 0, 0},
{ XK_Right, ShiftMask|ControlMask, "\033[1;6C", 0, 0},
{ XK_Right, ControlMask|Mod1Mask, "\033[1;7C", 0, 0},
{ XK_Right, ShiftMask|ControlMask|Mod1Mask, "\033[1;8C", 0, 0},
{ XK_Right, XK_ANY_MOD, "\033[C", 0, -1},
{ XK_Right, XK_ANY_MOD, "\033OC", 0, +1},
{ XK_ISO_Left_Tab, ShiftMask, "\033[Z", 0, 0},
{ XK_Return, Mod1Mask, "\033\r", 0, 0},
{ XK_Return, XK_ANY_MOD, "\r", 0, 0},
{ XK_Insert, ShiftMask, "\033[4l", -1, 0},
{ XK_Insert, ShiftMask, "\033[2;2~", +1, 0},
{ XK_Insert, ControlMask, "\033[L", -1, 0},
{ XK_Insert, ControlMask, "\033[2;5~", +1, 0},
{ XK_Insert, XK_ANY_MOD, "\033[4h", -1, 0},
{ XK_Insert, XK_ANY_MOD, "\033[2~", +1, 0},
{ XK_Delete, ControlMask, "\033[M", -1, 0},
{ XK_Delete, ControlMask, "\033[3;5~", +1, 0},
{ XK_Delete, ShiftMask, "\033[2K", -1, 0},
{ XK_Delete, ShiftMask, "\033[3;2~", +1, 0},
{ XK_Delete, XK_ANY_MOD, "\033[P", -1, 0},
{ XK_Delete, XK_ANY_MOD, "\033[3~", +1, 0},
{ XK_BackSpace, XK_NO_MOD, "\177", 0, 0},
{ XK_BackSpace, Mod1Mask, "\033\177", 0, 0},
{ XK_Home, ShiftMask, "\033[2J", 0, -1},
{ XK_Home, ShiftMask, "\033[1;2H", 0, +1},
{ XK_Home, XK_ANY_MOD, "\033[H", 0, -1},
{ XK_Home, XK_ANY_MOD, "\033[1~", 0, +1},
{ XK_End, ControlMask, "\033[J", -1, 0},
{ XK_End, ControlMask, "\033[1;5F", +1, 0},
{ XK_End, ShiftMask, "\033[K", -1, 0},
{ XK_End, ShiftMask, "\033[1;2F", +1, 0},
{ XK_End, XK_ANY_MOD, "\033[4~", 0, 0},
{ XK_Prior, ControlMask, "\033[5;5~", 0, 0},
{ XK_Prior, ShiftMask, "\033[5;2~", 0, 0},
{ XK_Prior, XK_ANY_MOD, "\033[5~", 0, 0},
{ XK_Next, ControlMask, "\033[6;5~", 0, 0},
{ XK_Next, ShiftMask, "\033[6;2~", 0, 0},
{ XK_Next, XK_ANY_MOD, "\033[6~", 0, 0},
{ XK_F1, XK_NO_MOD, "\033OP" , 0, 0},
{ XK_F1, /* F13 */ ShiftMask, "\033[1;2P", 0, 0},
{ XK_F1, /* F25 */ ControlMask, "\033[1;5P", 0, 0},
{ XK_F1, /* F37 */ Mod4Mask, "\033[1;6P", 0, 0},
{ XK_F1, /* F49 */ Mod1Mask, "\033[1;3P", 0, 0},
{ XK_F1, /* F61 */ Mod3Mask, "\033[1;4P", 0, 0},
{ XK_F2, XK_NO_MOD, "\033OQ" , 0, 0},
{ XK_F2, /* F14 */ ShiftMask, "\033[1;2Q", 0, 0},
{ XK_F2, /* F26 */ ControlMask, "\033[1;5Q", 0, 0},
{ XK_F2, /* F38 */ Mod4Mask, "\033[1;6Q", 0, 0},
{ XK_F2, /* F50 */ Mod1Mask, "\033[1;3Q", 0, 0},
{ XK_F2, /* F62 */ Mod3Mask, "\033[1;4Q", 0, 0},
{ XK_F3, XK_NO_MOD, "\033OR" , 0, 0},
{ XK_F3, /* F15 */ ShiftMask, "\033[1;2R", 0, 0},
{ XK_F3, /* F27 */ ControlMask, "\033[1;5R", 0, 0},
{ XK_F3, /* F39 */ Mod4Mask, "\033[1;6R", 0, 0},
{ XK_F3, /* F51 */ Mod1Mask, "\033[1;3R", 0, 0},
{ XK_F3, /* F63 */ Mod3Mask, "\033[1;4R", 0, 0},
{ XK_F4, XK_NO_MOD, "\033OS" , 0, 0},
{ XK_F4, /* F16 */ ShiftMask, "\033[1;2S", 0, 0},
{ XK_F4, /* F28 */ ControlMask, "\033[1;5S", 0, 0},
{ XK_F4, /* F40 */ Mod4Mask, "\033[1;6S", 0, 0},
{ XK_F4, /* F52 */ Mod1Mask, "\033[1;3S", 0, 0},
{ XK_F5, XK_NO_MOD, "\033[15~", 0, 0},
{ XK_F5, /* F17 */ ShiftMask, "\033[15;2~", 0, 0},
{ XK_F5, /* F29 */ ControlMask, "\033[15;5~", 0, 0},
{ XK_F5, /* F41 */ Mod4Mask, "\033[15;6~", 0, 0},
{ XK_F5, /* F53 */ Mod1Mask, "\033[15;3~", 0, 0},
{ XK_F6, XK_NO_MOD, "\033[17~", 0, 0},
{ XK_F6, /* F18 */ ShiftMask, "\033[17;2~", 0, 0},
{ XK_F6, /* F30 */ ControlMask, "\033[17;5~", 0, 0},
{ XK_F6, /* F42 */ Mod4Mask, "\033[17;6~", 0, 0},
{ XK_F6, /* F54 */ Mod1Mask, "\033[17;3~", 0, 0},
{ XK_F7, XK_NO_MOD, "\033[18~", 0, 0},
{ XK_F7, /* F19 */ ShiftMask, "\033[18;2~", 0, 0},
{ XK_F7, /* F31 */ ControlMask, "\033[18;5~", 0, 0},
{ XK_F7, /* F43 */ Mod4Mask, "\033[18;6~", 0, 0},
{ XK_F7, /* F55 */ Mod1Mask, "\033[18;3~", 0, 0},
{ XK_F8, XK_NO_MOD, "\033[19~", 0, 0},
{ XK_F8, /* F20 */ ShiftMask, "\033[19;2~", 0, 0},
{ XK_F8, /* F32 */ ControlMask, "\033[19;5~", 0, 0},
{ XK_F8, /* F44 */ Mod4Mask, "\033[19;6~", 0, 0},
{ XK_F8, /* F56 */ Mod1Mask, "\033[19;3~", 0, 0},
{ XK_F9, XK_NO_MOD, "\033[20~", 0, 0},
{ XK_F9, /* F21 */ ShiftMask, "\033[20;2~", 0, 0},
{ XK_F9, /* F33 */ ControlMask, "\033[20;5~", 0, 0},
{ XK_F9, /* F45 */ Mod4Mask, "\033[20;6~", 0, 0},
{ XK_F9, /* F57 */ Mod1Mask, "\033[20;3~", 0, 0},
{ XK_F10, XK_NO_MOD, "\033[21~", 0, 0},
{ XK_F10, /* F22 */ ShiftMask, "\033[21;2~", 0, 0},
{ XK_F10, /* F34 */ ControlMask, "\033[21;5~", 0, 0},
{ XK_F10, /* F46 */ Mod4Mask, "\033[21;6~", 0, 0},
{ XK_F10, /* F58 */ Mod1Mask, "\033[21;3~", 0, 0},
{ XK_F11, XK_NO_MOD, "\033[23~", 0, 0},
{ XK_F11, /* F23 */ ShiftMask, "\033[23;2~", 0, 0},
{ XK_F11, /* F35 */ ControlMask, "\033[23;5~", 0, 0},
{ XK_F11, /* F47 */ Mod4Mask, "\033[23;6~", 0, 0},
{ XK_F11, /* F59 */ Mod1Mask, "\033[23;3~", 0, 0},
{ XK_F12, XK_NO_MOD, "\033[24~", 0, 0},
{ XK_F12, /* F24 */ ShiftMask, "\033[24;2~", 0, 0},
{ XK_F12, /* F36 */ ControlMask, "\033[24;5~", 0, 0},
{ XK_F12, /* F48 */ Mod4Mask, "\033[24;6~", 0, 0},
{ XK_F12, /* F60 */ Mod1Mask, "\033[24;3~", 0, 0},
{ XK_F13, XK_NO_MOD, "\033[1;2P", 0, 0},
{ XK_F14, XK_NO_MOD, "\033[1;2Q", 0, 0},
{ XK_F15, XK_NO_MOD, "\033[1;2R", 0, 0},
{ XK_F16, XK_NO_MOD, "\033[1;2S", 0, 0},
{ XK_F17, XK_NO_MOD, "\033[15;2~", 0, 0},
{ XK_F18, XK_NO_MOD, "\033[17;2~", 0, 0},
{ XK_F19, XK_NO_MOD, "\033[18;2~", 0, 0},
{ XK_F20, XK_NO_MOD, "\033[19;2~", 0, 0},
{ XK_F21, XK_NO_MOD, "\033[20;2~", 0, 0},
{ XK_F22, XK_NO_MOD, "\033[21;2~", 0, 0},
{ XK_F23, XK_NO_MOD, "\033[23;2~", 0, 0},
{ XK_F24, XK_NO_MOD, "\033[24;2~", 0, 0},
{ XK_F25, XK_NO_MOD, "\033[1;5P", 0, 0},
{ XK_F26, XK_NO_MOD, "\033[1;5Q", 0, 0},
{ XK_F27, XK_NO_MOD, "\033[1;5R", 0, 0},
{ XK_F28, XK_NO_MOD, "\033[1;5S", 0, 0},
{ XK_F29, XK_NO_MOD, "\033[15;5~", 0, 0},
{ XK_F30, XK_NO_MOD, "\033[17;5~", 0, 0},
{ XK_F31, XK_NO_MOD, "\033[18;5~", 0, 0},
{ XK_F32, XK_NO_MOD, "\033[19;5~", 0, 0},
{ XK_F33, XK_NO_MOD, "\033[20;5~", 0, 0},
{ XK_F34, XK_NO_MOD, "\033[21;5~", 0, 0},
{ XK_F35, XK_NO_MOD, "\033[23;5~", 0, 0},
};
static uint selmasks[] = {
[SEL_RECTANGULAR] = Mod1Mask,
};
static char ascii_printable[] =
" !\"#$%&'()*+,-./0123456789:;<=>?"
"@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_"
"`abcdefghijklmnopqrstuvwxyz{|}~";
'';
patches = [
(fetchpatch {
url = "https://st.suckless.org/patches/disable_bold_italic_fonts/st-disable-bold-italic-fonts-0.8.2.diff";
sha256 = "PG96QMqbX3Fr0EvDmF4lm/J3gj18eyBfm1bJ3M7plvQ=";
})
(fetchpatch {
url = "https://st.suckless.org/patches/anysize/st-anysize-20220718-baa9357.diff";
sha256 = "yx9VSwmPACx3EN3CAdQkxeoJKJxQ6ziC9tpBcoWuWHc=";
})
];
})
];
};
}

View file

@ -0,0 +1,24 @@
{
config,
lib,
pkgs,
...
}:
with lib;
{
options.nixosModules.thunar.enable = mkEnableOption "Enable thunar";
config = mkIf config.nixosModules.thunar.enable {
programs.thunar = {
enable = true;
plugins = with pkgs.xfce; [
thunar-archive-plugin
];
};
environment.systemPackages = with pkgs; [ xfce.tumbler ];
};
}

16
modules/nixos/fonts.nix Normal file
View file

@ -0,0 +1,16 @@
{ pkgs, ... }:
{
fonts = {
fontconfig = {
enable = true;
};
packages = with pkgs; [
nerd-fonts.jetbrains-mono
nerd-fonts.meslo-lg
terminus_font
terminus_font_ttf
];
};
}

18
modules/nixos/gaming.nix Normal file
View file

@ -0,0 +1,18 @@
{
config,
lib,
pkgs,
...
}:
with lib;
{
options.nixosModules.gaming.enable = mkEnableOption "Enable games";
config = mkIf config.nixosModules.gaming.enable {
programs.steam.enable = true;
environment.systemPackages = with pkgs; [ zeroad ];
};
}

View file

@ -0,0 +1,26 @@
{ config, lib, ... }:
with lib;
let
cfg = config.nixosModules.audiobookshelf;
in
{
options.nixosModules.audiobookshelf.enable = mkEnableOption "Enable audiobookshelf";
config = mkIf cfg.enable {
services = {
audiobookshelf = {
enable = true;
port = 4001;
};
caddy.virtualHosts."audiobookshelf.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString config.services.audiobookshelf.port}";
};
};
};
}

View file

@ -0,0 +1,102 @@
# Auto-generated using compose2nix v0.3.2-pre.
{
config,
pkgs,
lib,
...
}:
with lib;
let
cfg = config.nixosModules.beaverhabits;
port = 8084;
in
{
options.nixosModules.beaverhabits.enable = mkEnableOption "Enable beaverhabits";
config = mkIf cfg.enable {
virtualisation = {
docker = {
enable = true;
autoPrune.enable = true;
};
oci-containers = {
backend = "docker";
containers."beaverhabits" = {
image = "daya0576/beaverhabits:latest";
environment = {
"HABITS_STORAGE" = "DATABASE";
};
volumes = [
"/mnt/media/beaverhabits:/app/.user:rw"
];
ports = [
"${toString port}:8080/tcp"
];
user = "1000:1000";
log-driver = "journald";
extraOptions = [
"--network-alias=beaverhabits"
"--network=beaverhabits_default"
];
};
};
};
systemd = {
services = {
"docker-beaverhabits" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [ "docker-network-beaverhabits_default.service" ];
requires = [ "docker-network-beaverhabits_default.service" ];
partOf = [ "docker-compose-beaverhabits-root.target" ];
wantedBy = [ "docker-compose-beaverhabits-root.target" ];
};
"docker-network-beaverhabits_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f beaverhabits_default";
};
script = ''
docker network inspect beaverhabits_default || docker network create beaverhabits_default
'';
partOf = [ "docker-compose-beaverhabits-root.target" ];
wantedBy = [ "docker-compose-beaverhabits-root.target" ];
};
};
targets."docker-compose-beaverhabits-root" = {
unitConfig.Description = "Root target generated by compose2nix.";
wantedBy = [ "multi-user.target" ];
};
};
services.caddy.virtualHosts."beaverhabits.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString port}";
};
};
}

View file

@ -0,0 +1,8 @@
{
imports = [
./beaverhabits.nix
./freshrss.nix
./pi-hole.nix
./tubearchivist.nix
];
}

View file

@ -0,0 +1,109 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.nixosModules.freshrss;
port = 4003;
in
{
options.nixosModules.freshrss.enable = mkEnableOption "Enable freshrss";
config = mkIf cfg.enable {
# Auto-generated using compose2nix v0.3.2-pre.
virtualisation = {
docker = {
enable = true;
autoPrune.enable = true;
};
oci-containers.backend = "docker";
};
virtualisation.oci-containers.containers."freshrss" = {
image = "lscr.io/linuxserver/freshrss:latest";
environment = {
"PGID" = "1000";
"PUID" = "1000";
"TZ" = "Etc/UTC";
};
volumes = [
"/home/opdavies/Code/dotfiles/freshrss-config:/config:rw"
];
ports = [
"${toString port}:80/tcp"
];
log-driver = "journald";
extraOptions = [
"--network-alias=freshrss"
"--network=freshrss_default"
];
};
systemd.services."docker-freshrss" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-freshrss_default.service"
];
requires = [
"docker-network-freshrss_default.service"
];
partOf = [
"docker-compose-freshrss-root.target"
];
wantedBy = [
"docker-compose-freshrss-root.target"
];
};
systemd.services."docker-network-freshrss_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f freshrss_default";
};
script = ''
docker network inspect freshrss_default || docker network create freshrss_default
'';
partOf = [ "docker-compose-freshrss-root.target" ];
wantedBy = [ "docker-compose-freshrss-root.target" ];
};
systemd.targets."docker-compose-freshrss-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
services.caddy.virtualHosts."freshrss.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString port}";
};
};
}

View file

@ -0,0 +1,101 @@
{
config,
pkgs,
lib,
...
}:
with lib;
let
port = 8082;
in
{
options.nixosModules.pihole.enable = mkEnableOption "Enable pihole";
config = mkIf config.nixosModules.pihole.enable {
virtualisation = {
docker = {
enable = true;
autoPrune.enable = true;
};
oci-containers = {
backend = "docker";
containers."pihole" = {
image = "pihole/pihole:latest";
environment = {
"PIHOLE_DNS_1" = "8.8.8.8";
"PIHOLE_DNS_2" = "8.8.4.4";
"TZ" = "Europe/London";
};
volumes = [
"/home/opdavies/pihole/etc-dnsmasq.d:/etc/dnsmasq.d:rw"
"/home/opdavies/pihole/etc-pihole:/etc/pihole:rw"
];
ports = [
"53:53/tcp"
"53:53/udp"
"67:67/udp"
"${toString port}:80/tcp"
];
log-driver = "journald";
extraOptions = [
"--cap-add=NET_ADMIN"
"--network-alias=pihole"
"--network=pihole_default"
];
};
};
};
systemd = {
services = {
"docker-pihole" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [ "docker-network-pihole_default.service" ];
requires = [ "docker-network-pihole_default.service" ];
partOf = [ "docker-compose-pihole-root.target" ];
wantedBy = [ "docker-compose-pihole-root.target" ];
};
"docker-network-pihole_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f pihole_default";
};
script = ''
docker network inspect pihole_default || docker network create pihole_default
'';
partOf = [ "docker-compose-pihole-root.target" ];
wantedBy = [ "docker-compose-pihole-root.target" ];
};
};
targets."docker-compose-pihole-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
};
};
}

View file

@ -0,0 +1,296 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.nixosModules.tubearchivist-container;
port = 8085;
url = "tubearchivist.oliverdavies.uk";
in
{
options.nixosModules.tubearchivist-container = {
enable = mkEnableOption "Enable the tubearchivist-container service.";
};
config = mkIf cfg.enable {
virtualisation.docker = {
enable = true;
autoPrune.enable = true;
};
virtualisation.oci-containers.backend = "docker";
virtualisation.oci-containers.containers."archivist-es" = {
image = "bbilly1/tubearchivist-es";
environment = {
"ES_JAVA_OPTS" = "-Xms1g -Xmx1g";
"discovery.type" = "single-node";
"path.repo" = "/usr/share/elasticsearch/data/snapshot";
"xpack.security.enabled" = "true";
};
environmentFiles = [
config.age.secrets.tubearchivist.path
];
volumes = [
"tubearchivist_es:/usr/share/elasticsearch/data:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=archivist-es"
"--network=tubearchivist_default"
];
};
systemd.services."docker-archivist-es" = {
serviceConfig = {
Restart = mkOverride 90 "always";
RestartMaxDelaySec = mkOverride 90 "1m";
RestartSec = mkOverride 90 "100ms";
RestartSteps = mkOverride 90 9;
};
after = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_es.service"
];
requires = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_es.service"
];
partOf = [
"docker-compose-tubearchivist-root.target"
];
wantedBy = [
"docker-compose-tubearchivist-root.target"
];
};
virtualisation.oci-containers.containers."archivist-redis" = {
image = "redis/redis-stack-server";
volumes = [
"tubearchivist_redis:/data:rw"
];
dependsOn = [
"archivist-es"
];
log-driver = "journald";
extraOptions = [
"--network-alias=archivist-redis"
"--network=tubearchivist_default"
];
};
systemd.services."docker-archivist-redis" = {
serviceConfig = {
Restart = mkOverride 90 "always";
RestartMaxDelaySec = mkOverride 90 "1m";
RestartSec = mkOverride 90 "100ms";
RestartSteps = mkOverride 90 9;
};
after = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_redis.service"
];
requires = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_redis.service"
];
partOf = [
"docker-compose-tubearchivist-root.target"
];
wantedBy = [
"docker-compose-tubearchivist-root.target"
];
};
virtualisation.oci-containers.containers."tubearchivist" = {
image = "bbilly1/tubearchivist";
environment = {
"ES_URL" = "http://archivist-es:9200";
"HOST_GID" = "1000";
"HOST_UID" = "1000";
"REDIS_HOST" = "archivist-redis";
"TA_HOST" = url;
"TZ" = "Europe/London";
};
environmentFiles = [
config.age.secrets.tubearchivist.path
];
volumes = [
"/mnt/media/tubearchivist_cache:/cache:rw"
"/mnt/media/tubearchivist_media:/youtube:rw"
];
ports = [
"${toString port}:8000/tcp"
];
dependsOn = [
"archivist-es"
"archivist-redis"
];
log-driver = "journald";
extraOptions = [
"--health-cmd=[\"curl\", \"-f\", \"http://localhost:8000/health\"]"
"--health-interval=2m0s"
"--health-retries=3"
"--health-start-period=30s"
"--health-timeout=10s"
"--network-alias=tubearchivist"
"--network=tubearchivist_default"
];
};
systemd.services."docker-tubearchivist" = {
serviceConfig = {
Restart = mkOverride 90 "always";
RestartMaxDelaySec = mkOverride 90 "1m";
RestartSec = mkOverride 90 "100ms";
RestartSteps = mkOverride 90 9;
};
after = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_cache.service"
"docker-volume-tubearchivist_media.service"
];
requires = [
"docker-network-tubearchivist_default.service"
"docker-volume-tubearchivist_cache.service"
"docker-volume-tubearchivist_media.service"
];
partOf = [
"docker-compose-tubearchivist-root.target"
];
wantedBy = [
"docker-compose-tubearchivist-root.target"
];
};
systemd.services."docker-network-tubearchivist_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f tubearchivist_default";
};
script = ''
docker network inspect tubearchivist_default || docker network create tubearchivist_default
'';
partOf = [ "docker-compose-tubearchivist-root.target" ];
wantedBy = [ "docker-compose-tubearchivist-root.target" ];
};
systemd.services."docker-volume-tubearchivist_cache" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect tubearchivist_cache || docker volume create tubearchivist_cache
'';
partOf = [ "docker-compose-tubearchivist-root.target" ];
wantedBy = [ "docker-compose-tubearchivist-root.target" ];
};
systemd.services."docker-volume-tubearchivist_es" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect tubearchivist_es || docker volume create tubearchivist_es
'';
partOf = [ "docker-compose-tubearchivist-root.target" ];
wantedBy = [ "docker-compose-tubearchivist-root.target" ];
};
systemd.services."docker-volume-tubearchivist_media" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect tubearchivist_media || docker volume create tubearchivist_media
'';
partOf = [ "docker-compose-tubearchivist-root.target" ];
wantedBy = [ "docker-compose-tubearchivist-root.target" ];
};
systemd.services."docker-volume-tubearchivist_redis" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect tubearchivist_redis || docker volume create tubearchivist_redis
'';
partOf = [ "docker-compose-tubearchivist-root.target" ];
wantedBy = [ "docker-compose-tubearchivist-root.target" ];
};
systemd.targets."docker-compose-tubearchivist-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
services.caddy.virtualHosts."tubearchivist.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString port}";
};
};
}

View file

@ -0,0 +1,12 @@
{
imports = [
./audiobookshelf.nix
./containers
./forgejo.nix
./gitea.nix
./immich.nix
./jellyfin.nix
./paperless.nix
./vaultwarden.nix
];
}

View file

@ -0,0 +1,34 @@
{ config, lib, ... }:
with lib;
{
options.nixosModules.forgejo.enable = mkEnableOption "Enable forgejo";
config = mkIf config.nixosModules.forgejo.enable {
services = {
forgejo = {
enable = true;
group = "media";
stateDir = "/mnt/media/forgejo";
settings = {
server = {
DOMAIN = "forgejo.oliverdavies.uk";
HTTP_PORT = 2223;
};
service = {
DISABLE_REGISTRATION = true;
};
};
};
caddy.virtualHosts."${config.services.forgejo.settings.server.DOMAIN}" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString config.services.forgejo.settings.server.HTTP_PORT}";
};
};
};
}

View file

@ -0,0 +1,36 @@
{ config, lib, ... }:
with lib;
let
port = 2222;
in
{
options.nixosModules.gitea.enable = mkEnableOption "Enable gitea";
config = mkIf config.nixosModules.gitea.enable {
services = {
gitea = {
enable = true;
group = "media";
stateDir = "/mnt/media/gitea";
settings = {
server = {
HTTP_PORT = port;
};
service = {
DISABLE_REGISTRATION = true;
};
};
};
caddy.virtualHosts."gitea.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString port}";
};
};
};
}

View file

@ -0,0 +1,28 @@
{
config,
lib,
pkgs,
...
}:
with lib;
{
options.nixosModules.immich.enable = mkEnableOption "Enable immich";
config = mkIf config.nixosModules.immich.enable {
services.immich = {
enable = true;
group = "media";
mediaLocation = "/mnt/media/immich";
};
environment.systemPackages = [ pkgs.immich-cli ];
services.caddy.virtualHosts."immich.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString config.services.immich.port}";
};
};
}

View file

@ -0,0 +1,22 @@
{ config, lib, ... }:
with lib;
{
options.nixosModules.jellyfin.enable = mkEnableOption "Enable jellyfin";
config = mkIf config.nixosModules.jellyfin.enable {
services.jellyfin = {
enable = true;
openFirewall = true;
group = "media";
configDir = "/mnt/media/jellyfin";
};
services.caddy.virtualHosts."jellyfin.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:8096";
};
};
}

View file

@ -0,0 +1,30 @@
{ config, lib, ... }:
with lib;
let
url = "paperless.oliverdavies.uk";
in
{
options.nixosModules.paperless.enable = mkEnableOption "Enable paperless";
config = mkIf config.nixosModules.paperless.enable {
services = {
paperless = {
enable = true;
dataDir = "/mnt/media/paperless";
settings = {
PAPERLESS_URL = "https://${url}";
};
};
caddy.virtualHosts."${url}" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:28981";
};
};
};
}

View file

@ -0,0 +1,31 @@
{ config, lib, ... }:
with lib;
{
options.nixosModules.vaultwarden.enable = mkEnableOption "Enable vaultwarden";
config = mkIf config.nixosModules.vaultwarden.enable {
services = {
vaultwarden = {
enable = true;
config = {
DOMAIN = "https://vaultwarden.oliverdavies.uk";
# TODO: check registrations are disabled.
SIGNUPS_ALLOWED = false;
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_PORT = 8222;
};
};
caddy.virtualHosts."vaultwarden.oliverdavies.uk" = {
useACMEHost = "oliverdavies.uk";
extraConfig = "reverse_proxy localhost:${toString config.services.vaultwarden.config.ROCKET_PORT}";
};
};
};
}

View file

@ -0,0 +1 @@
{ services.xbanish.enable = true; }