Compare commits

..

44 Commits

Author SHA1 Message Date
3bcd4c3c13 chore: update lockfile 2026-05-06 19:41:05 +02:00
d975d49844 fix(nvim): allow unfree nvim plugins 2026-05-06 19:41:00 +02:00
1ead7fe7be chore: update lockfile 2026-04-30 18:33:01 +02:00
7dd2fc7e59 chore: update lockfile 2026-04-30 18:28:53 +02:00
95ffe7b908 refactor: derive host name solely from host directory name 2026-04-30 17:20:02 +02:00
ce02cc5538 fix(desktops): resolve xdg portal error on 'work' host 2026-04-30 15:31:07 +02:00
0dbc007a90 feat(database): add redis to database module 2026-04-30 15:07:10 +02:00
57e0d49278 fix(nvim): add missing dependencies 2026-04-30 15:06:51 +02:00
ee44b26147 feat(ai): add 'ai-tools' 'skills' submodule 2026-04-29 18:37:43 +02:00
675306ec91 refactor: modularize 'ai-tools' 2026-04-29 18:37:42 +02:00
a829f160fb fix(gnome): don't use monospace font for 'dconf' 2026-04-29 18:37:07 +02:00
4cfe0387e2 chore: update 'nvim' flake dependencies 2026-04-29 18:37:06 +02:00
2efccdb4de feat(hydra): add hydra-repl filetype integration 2026-04-26 19:07:55 +02:00
8aafaf7d35 chore: disable 'mcp-nixos' temporarily (failed test) 2026-04-26 19:07:55 +02:00
dce57f907a chore(ai): enable 'claude-code' on 'andromache,astyanax' hosts 2026-04-26 19:07:55 +02:00
1bda05280e refactor(desktops): give all desktop modules own subdirectory 2026-04-26 19:07:55 +02:00
d39071da06 refactor(desktops): extract 'logind' module 2026-04-26 19:07:55 +02:00
781f379aff refactor: simplify zk file completion 2026-04-26 19:07:55 +02:00
2203b48cde fix: scope markdown file name echo to zk 2026-04-26 19:07:55 +02:00
35f6f7890f chore: add 'nodejs_24' dependency to 'nvim' flake 2026-04-26 19:07:55 +02:00
83958847f4 fix: enable 'boot.tmp.useTmpfs' based on host 'highRam' flag 2026-04-26 15:00:57 +02:00
b66b0c4003 fix: resolve current zettel path issue 2026-04-26 14:40:26 +02:00
efd2771d8c fix: remove tmux hooks 2026-04-26 14:33:19 +02:00
94331531e2 chore: disable 'lutris' temporarily (failed openldap test) 2026-04-26 14:32:20 +02:00
5b1e7efcd2 chore: update lockfile 2026-04-26 14:32:20 +02:00
730dd23967 fix: centralize and nixifiy in 'zk' module 2026-04-26 14:32:20 +02:00
8f5caaed41 fix(nvim): disable neotest check phase 2026-04-21 22:24:48 +02:00
db2bbb86ba chore: update lockfile 2026-04-21 22:08:28 +02:00
72c3710a3c refactor(secrets): simplify secrets 2026-04-21 22:08:28 +02:00
b62f3c20ac refactor(backups): simplify backups module 2026-04-21 21:39:23 +02:00
dd31da5a8f fix: add home manager 'secrets' module to andromache 2026-04-21 21:39:17 +02:00
bc6d8b6305 fix: remove nodeNixpkgs from colmena 2026-04-21 21:38:55 +02:00
fce3aa45ec refactor: modularize utils 2026-04-21 21:37:31 +02:00
949917a809 feat(direnv): set up direnv using '.envrc' 2026-04-21 21:37:25 +02:00
0dd1ecef91 feat: set up tailscale on 'eetion' host 2026-04-21 21:37:17 +02:00
fcdb52cc42 chore: update lockfile 2026-04-21 17:14:17 +02:00
b6500b97ff refactor(stylix): extract shared stylix overrides into 'targets.nix' 2026-04-21 17:11:16 +02:00
8f756554ad refactor(stylix): do not hardcode 'dconf' font 2026-04-21 17:11:10 +02:00
583b9ea5f3 refactor(deploy): move deployment config into '<host>/meta.nix' 2026-04-21 17:11:04 +02:00
6a30a431f8 refactor: simplify 'user' options 2026-04-21 17:10:42 +02:00
38818e7508 refactor: merge '<host>/system.nix' into '<host>/meta.nix' 2026-04-21 15:51:25 +02:00
94c64e9d33 fix: remove task count limits 2026-04-21 15:51:21 +02:00
a9854ac144 feat: alias 'kubectl' to 'k' 2026-04-21 15:51:17 +02:00
8b109af08b fix: add 'devenv' to 'astyanax' and 'work' hosts 2026-04-21 15:51:12 +02:00
89 changed files with 799 additions and 624 deletions

1
.envrc Normal file
View File

@@ -0,0 +1 @@
use flake

3
.gitignore vendored
View File

@@ -9,4 +9,5 @@ result-*
nixos-efi-vars.fd nixos-efi-vars.fd
/.pre-commit-config.yaml .direnv/
.pre-commit-config.yaml

View File

@@ -8,28 +8,20 @@ let
utils = import ../utils { inherit lib; }; utils = import ../utils { inherit lib; };
hostDirNames = utils.dirNames ../hosts; hostDirNames = utils.dirNames ../hosts;
mkNode = hostname: tags: { mkNode = hostname: meta: {
imports = [ ../hosts/${hostname} ]; imports = [ ../hosts/${hostname} ];
deployment = { deployment = {
targetHost = self.nixosConfigurations.${hostname}.config.ssh.publicHostname; inherit (meta.deployment) targetHost targetUser tags;
targetUser = self.nixosConfigurations.${hostname}.config.ssh.username; buildOnTarget = builtins.any (t: t != "local" && t != "arm") meta.deployment.tags;
buildOnTarget = builtins.any (t: t != "local" && t != "arm") tags;
inherit tags;
}; };
}; };
nodes = lib.genAttrs hostDirNames ( nodes = lib.genAttrs hostDirNames (hostname: mkNode hostname (utils.hostMeta ../hosts/${hostname}));
hostname: mkNode hostname (utils.hostMeta ../hosts/${hostname}).deployment.tags
);
in in
inputs.colmena.lib.makeHive ( inputs.colmena.lib.makeHive (
{ {
meta = { meta = {
nixpkgs = import inputs.nixpkgs { nixpkgs = import inputs.nixpkgs { localSystem = "x86_64-linux"; };
localSystem = "x86_64-linux";
};
nodeNixpkgs = builtins.mapAttrs (_: v: v.pkgs) self.nixosConfigurations;
specialArgs = { specialArgs = {
inherit inputs; inherit inputs;
outputs = self; outputs = self;

View File

@@ -1,4 +0,0 @@
#!/usr/bin/env bash
cd "$ZK_PATH" || echo "No zettelkasten directory found"
git a . && git commit -m "Update" && git push

View File

@@ -1,20 +0,0 @@
#!/bin/bash
if [ ! -d ~/.zk ]; then
echo "[zk] Setting up zettelkasten"
gh repo clone zk ~/.zk
else
echo "[zk] Zettelkasten already set up."
fi
read -p "Would you like open your zettelkasten? [y/N] " -n 1 -r
echo
if [[ $REPLY =~ ^[Yy]$ ]]; then
if [ -x "$(command -v zk)" ]; then
zk
else
echo "Error: 'zk' command not found or not executable"
exit 1
fi
fi

View File

@@ -0,0 +1,35 @@
local hydra_repl = "hydra-repl"
if not vim.fn.executable(hydra_repl) then
return
end
local function send(lines)
vim.system({ hydra_repl, table.concat(lines, "\n") })
end
local function get_paragraph(buf)
local start_ = vim.fn.search("^$", "bnW")
local end_ = vim.fn.search("^$", "nW") - 1
if end_ < vim.api.nvim_win_get_cursor(0)[1] then
end_ = vim.api.nvim_buf_line_count(buf)
end
return vim.api.nvim_buf_get_lines(buf, start_, end_, false)
end
local function get_selection(buf)
return vim.api.nvim_buf_get_lines(buf, vim.fn.line("'<") - 1, vim.fn.line("'>"), false)
end
vim.api.nvim_create_autocmd("FileType", {
pattern = "javascript",
callback = function(e)
if vim.fn.fnamemodify(vim.api.nvim_buf_get_name(e.buf), ":e") ~= "hydra" then
return
end
local buf = e.buf
vim.keymap.set("n", "<CR>", function() send(get_paragraph(buf)) end, { buffer = buf, desc = "hydra: send block" })
vim.keymap.set("v", "<CR>", function() send(get_selection(buf)) end, { buffer = buf, desc = "hydra: send selection" })
end,
})

View File

@@ -1,6 +1,8 @@
require("zk.utils")
vim.cmd([[ vim.cmd([[
" Change local buffer to directory of current file after the plugin has loaded " Change local buffer to directory of current file after the plugin has loaded
autocmd VimEnter * lcd %:p:h execute 'autocmd BufEnter' g:zk_path . '/*.md' 'silent lcd %:p:h'
" " Override wiki index mapping to also cd into the wiki " " Override wiki index mapping to also cd into the wiki
nm <leader>ww <plug>(wiki-index) nm <leader>ww <plug>(wiki-index)
@@ -11,11 +13,16 @@ nm <leader>ww <plug>(wiki-index)
" nm <leader>s <plug>(wiki-link-follow-split) " nm <leader>s <plug>(wiki-link-follow-split)
" nm <leader>v <plug>(wiki-link-follow-vsplit) " nm <leader>v <plug>(wiki-link-follow-vsplit)
autocmd BufEnter *.md if expand('%:t') =~ '_' | echo 'hierarchical relation' | endif function! ZKContextualEcho()
autocmd BufEnter *.md if expand('%:t') =~ '--' | echo 'relation' | endif let l:name = expand('%:t')
autocmd BufEnter *.md if expand('%:t') =~ '<>' | echo 'dichotomy' | endif if l:name =~ '_' | echo 'hierarchical relation'
autocmd BufEnter *.md if expand('%:t') =~ 'my-' | echo 'personal file' | endif elseif l:name =~ '--' | echo 'relation'
autocmd BufEnter *.md if expand('%:t') =~ 'project_' | echo 'project file' | endif elseif l:name =~ '<>' | echo 'dichotomy'
elseif l:name =~ 'my-' | echo 'personal file'
elseif l:name =~ 'project_' | echo 'project file'
endif
endfunction
execute 'autocmd BufEnter' g:zk_path . '/*.md' 'call ZKContextualEcho()'
" Only load wiki.vim for zk directory " Only load wiki.vim for zk directory
let g:wiki_index_name='index' let g:wiki_index_name='index'
@@ -76,7 +83,7 @@ let g:wiki_templates = [
" "
let g:wiki_filetypes=['md'] let g:wiki_filetypes=['md']
let g:wiki_root='~/.zk' let g:wiki_root=g:zk_path
let g:wiki_global_load=0 let g:wiki_global_load=0
let g:wiki_link_creation = { let g:wiki_link_creation = {
\ 'md': { \ 'md': {

View File

@@ -42,11 +42,11 @@
}, },
"nixCats": { "nixCats": {
"locked": { "locked": {
"lastModified": 1774835836, "lastModified": 1777273601,
"narHash": "sha256-6ok7iv/9R82vl6MYe3Lwyyb6S5bmW2PxEZtmjzlqyPs=", "narHash": "sha256-xBUa8Tl9V7IXI+VmLEuDc81La/EhoSn1C3EVSnJ3cfU=",
"owner": "BirdeeHub", "owner": "BirdeeHub",
"repo": "nixCats-nvim", "repo": "nixCats-nvim",
"rev": "ebb9f279a55ca60ff4e37e4accf6518dc627aa8d", "rev": "f69ea013e328841a7def7037ed59788a76be8816",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -73,11 +73,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1775608838, "lastModified": 1777270315,
"narHash": "sha256-2ySoGH+SAi34U0PeuQgABC0WiH9LQ3tkyHTiE93KUeg=", "narHash": "sha256-yKB4G6cKsQsWN7M6rZGk6gkJPDNPIzT05y4qzRyCDlI=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "9a01fad67a57e44e1b3e1d905c6881bcfb209e8a", "rev": "6368eda62c9775c38ef7f714b2555a741c20c72d",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -45,13 +45,38 @@
inherit (nixCats) utils; inherit (nixCats) utils;
luaPath = ./.; luaPath = ./.;
forEachSystem = utils.eachSystem nixpkgs.lib.platforms.all; forEachSystem = utils.eachSystem nixpkgs.lib.platforms.all;
extra_pkg_config = { }; extra_pkg_config = {
allowUnfreePredicate =
pkg:
builtins.elem (nixpkgs.lib.getName pkg) [
"vim-sandwich"
"jupytext.nvim"
"eyeliner.nvim"
"context_filetype.vim"
"editorconfig-vim"
"unicode.vim"
"quarto-nvim"
"vim-openscad"
"lsp_lines.nvim"
"nvim-highlight-colors"
"nvim-lint"
];
};
mkDependencyOverlays = system: [ mkDependencyOverlays = system: [
(utils.standardPluginOverlay inputs) (utils.standardPluginOverlay inputs)
(_final: _prev: { (_final: _prev: {
mcp-hub = inputs.mcp-hub.packages.${system}.default; mcp-hub = inputs.mcp-hub.packages.${system}.default;
}) })
(_: prev: {
luajitPackages = prev.luajitPackages.overrideScope (
_: lprev: {
neotest = lprev.neotest.overrideAttrs (_: {
doCheck = false;
});
}
);
})
]; ];
categoryDefinitions = categoryDefinitions =
@@ -62,9 +87,11 @@
{ {
lspsAndRuntimeDeps = with pkgs; { lspsAndRuntimeDeps = with pkgs; {
general = [ general = [
nodejs_24
black black
clang clang
clang-tools clang-tools
curl # → plenary-nvim, mcp-hub
delta delta
emmet-language-server emmet-language-server
eslint_d eslint_d
@@ -78,6 +105,8 @@
mcp-hub mcp-hub
nixd nixd
nixfmt nixfmt
prettier
typescript-language-server
ormolu ormolu
prettierd prettierd
rust-analyzer rust-analyzer
@@ -86,6 +115,7 @@
stylelint stylelint
stylua stylua
tree-sitter tree-sitter
tailwindcss-language-server
typescript-language-server typescript-language-server
vscode-langservers-extracted vscode-langservers-extracted
vtsls vtsls

View File

@@ -9,5 +9,6 @@ vim.filetype.add({
["%.env.*"] = "dotenv", ["%.env.*"] = "dotenv",
["%.pl$"] = "prolog", ["%.pl$"] = "prolog",
[".*.containerfile.*"] = "dockerfile", [".*.containerfile.*"] = "dockerfile",
["%.hydra$"] = "javascript",
}, },
}) })

View File

@@ -13,13 +13,19 @@ local function get_markdown_files(base)
return items return items
end end
function source:get_keyword_pattern()
return "[%w%./%-]*"
end
function source:complete(params, callback) function source:complete(params, callback)
local cursor_before_line = params.context.cursor_before_line local cursor_before_line = params.context.cursor_before_line
local cursor_after_line = params.context.cursor_after_line or "" local cursor_after_line = params.context.cursor_after_line or ""
local trigger = cursor_before_line:match("%[[^%]]*%]%(([^)]*)$") if not cursor_before_line:match("%[[^%]]*%]%(") then
callback({})
return
end
if trigger ~= nil then
local items = get_markdown_files(".") local items = get_markdown_files(".")
local next_char = cursor_after_line:sub(1, 1) local next_char = cursor_after_line:sub(1, 1)
@@ -32,9 +38,6 @@ function source:complete(params, callback)
end end
callback(items) callback(items)
else
callback({})
end
end end
function source:get_trigger_characters() function source:get_trigger_characters()

View File

@@ -1,9 +1,10 @@
require("zk.cmp") require("zk.cmp")
require("zk.utils")
vim.cmd([[ vim.cmd([[
let s:zk_preview_enabled = 0 let s:zk_preview_enabled = 0
let s:live_server_job = -1 let s:live_server_job = -1
au BufEnter /home/h/.zk/*.md silent exe '!echo "%" > /home/h/.zk/current-zettel.txt' execute 'au BufEnter' g:zk_path . '/*.md' 'silent exe "!echo %" ">" g:zk_path . "/current-zettel.txt"'
function! ToggleZKPreview() function! ToggleZKPreview()
if s:zk_preview_enabled == 1 if s:zk_preview_enabled == 1
let s:zk_preview_enabled = 0 let s:zk_preview_enabled = 0
@@ -11,10 +12,10 @@ function! ToggleZKPreview()
au! ZKPreview au! ZKPreview
else else
let s:zk_preview_enabled = 1 let s:zk_preview_enabled = 1
let s:live_server_job = jobstart('live-server --watch=/home/h/.zk/current-zettel-content.html --open=current-zettel-content.html --port=8080') let s:live_server_job = jobstart('live-server --watch=' . g:zk_path . '/current-zettel-content.html --open=current-zettel-content.html --port=8080')
augroup ZKPreview augroup ZKPreview
au BufEnter /home/h/.zk/*.md silent exe '!cat "%:r.html" > /home/h/.zk/current-zettel-content.html' execute 'au BufEnter' g:zk_path . '/*.md' 'silent exe "!cat %:r.html" ">" g:zk_path . "/current-zettel-content.html"'
au BufWritePost /home/h/.zk/*.md silent exe '!make && cat "%:r.html" > /home/h/.zk/current-zettel-content.html' execute 'au BufWritePost' g:zk_path . '/*.md' 'silent exe "!make && cat %:r.html" ">" g:zk_path . "/current-zettel-content.html"'
augroup END augroup END
endif endif
endfunction endfunction

View File

@@ -0,0 +1,2 @@
vim.g.zk_path = os.getenv("ZK_PATH") or (os.getenv("HOME") .. "/.zk")
return vim.g.zk_path

View File

@@ -1 +0,0 @@
set -g status-style bg=colour12,fg=colour0

View File

@@ -70,8 +70,6 @@ set -g status-right '#(uptime | cut -f 4-5 -d " " | cut -f 1 -d ",") %a %l:%M:%S
set -g default-terminal "tmux-256color" set -g default-terminal "tmux-256color"
set-hook -g after-new-session 'if -F "#{==:#{session_name},ssh}" "source ${XDG_CONFIG_HOME}/tmux/hooks/tmux.ssh.conf" "source ${XDG_CONFIG_HOME}/tmux/hooks/tmux.regular.conf"'
# Vi copypaste mode # Vi copypaste mode
if-shell "test '\( #{$TMUX_VERSION_MAJOR} -eq 2 -a #{$TMUX_VERSION_MINOR} -ge 4 \)'" 'bind-key -Tcopy-mode-vi v send -X begin-selection; bind-key -Tcopy-mode-vi y send -X copy-selection-and-cancel' if-shell "test '\( #{$TMUX_VERSION_MAJOR} -eq 2 -a #{$TMUX_VERSION_MINOR} -ge 4 \)'" 'bind-key -Tcopy-mode-vi v send -X begin-selection; bind-key -Tcopy-mode-vi y send -X copy-selection-and-cancel'
if-shell '\( #{$TMUX_VERSION_MAJOR} -eq 2 -a #{$TMUX_VERSION_MINOR} -lt 4\) -o #{$TMUX_VERSION_MAJOR} -le 1' 'bind-key -t vi-copy v begin-selection; bind-key -t vi-copy y copy-selection' if-shell '\( #{$TMUX_VERSION_MAJOR} -eq 2 -a #{$TMUX_VERSION_MINOR} -lt 4\) -o #{$TMUX_VERSION_MAJOR} -le 1' 'bind-key -t vi-copy v begin-selection; bind-key -t vi-copy y copy-selection'

90
flake.lock generated
View File

@@ -38,11 +38,11 @@
"base16-helix": { "base16-helix": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1760703920, "lastModified": 1776754714,
"narHash": "sha256-m82fGUYns4uHd+ZTdoLX2vlHikzwzdu2s2rYM2bNwzw=", "narHash": "sha256-E3OAK27smtATTmX45uoTSRsVD+Y+ZiVVfgM/tjpbtYg=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-helix", "repo": "base16-helix",
"rev": "d646af9b7d14bff08824538164af99d0c521b185", "rev": "4d508123037e7851ad36ebf7d9c48b0e9e1eb581",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -121,11 +121,11 @@
}, },
"locked": { "locked": {
"dir": "pkgs/firefox-addons", "dir": "pkgs/firefox-addons",
"lastModified": 1776398575, "lastModified": 1778040175,
"narHash": "sha256-WArU6WOdWxzbzGqYk4w1Mucg+bw/SCl6MoSp+/cZMio=", "narHash": "sha256-SSXJp3BMjO2LrW/VLjNdGGcjd3RFEyV4FemYA6OGrYw=",
"owner": "rycee", "owner": "rycee",
"repo": "nur-expressions", "repo": "nur-expressions",
"rev": "05815686caf4e3678f5aeb5fd36e567886ab0d30", "rev": "3bd76b0f41e65661866bddcac57ebe83aeadb581",
"type": "gitlab" "type": "gitlab"
}, },
"original": { "original": {
@@ -138,11 +138,11 @@
"firefox-gnome-theme": { "firefox-gnome-theme": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1775176642, "lastModified": 1776136500,
"narHash": "sha256-2veEED0Fg7Fsh81tvVDNYR6SzjqQxa7hbi18Jv4LWpM=", "narHash": "sha256-r0gN2brVWA351zwMV0Flmlcd6SGMvYqFbvC3DfKFM8Y=",
"owner": "rafaelmardojai", "owner": "rafaelmardojai",
"repo": "firefox-gnome-theme", "repo": "firefox-gnome-theme",
"rev": "179704030c5286c729b5b0522037d1d51341022c", "rev": "0f8ba203d475587f477e7ae12661bd8459e225b7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -284,11 +284,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1775585728, "lastModified": 1776796298,
"narHash": "sha256-8Psjt+TWvE4thRKktJsXfR6PA/fWWsZ04DVaY6PUhr4=", "narHash": "sha256-PcRvlWayisPSjd0UcRQbhG8Oqw78AcPE6x872cPRHN8=",
"owner": "cachix", "owner": "cachix",
"repo": "git-hooks.nix", "repo": "git-hooks.nix",
"rev": "580633fa3fe5fc0379905986543fd7495481913d", "rev": "3cfd774b0a530725a077e17354fbdb87ea1c4aad",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -342,11 +342,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1776373306, "lastModified": 1778009629,
"narHash": "sha256-iAJIzHngGZeLIkjzuuWI6VBsYJ1n89a/Esq0m8R1vjs=", "narHash": "sha256-nUoQtf4Zq7DRYJrfv904hjrxjAlWVP6a1pNNFKx3FCg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "d401492e2acd4fea42f7705a3c266cea739c9c36", "rev": "00ed86e58bb6979a7921859fd1615d19382eac5c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -398,10 +398,10 @@
"nix-secrets": { "nix-secrets": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1776422417, "lastModified": 1776723456,
"narHash": "sha256-9R4MePj/UT0tqkWEq4Afg7Lp/zdfYHkW+qmpVGchKIs=", "narHash": "sha256-GBbbm05oXYqSZ2EgxQPsNpTKl16wNhvrlUxdmv0FbSU=",
"ref": "main", "ref": "main",
"rev": "75759a14e8d46421fca4306393a38b5ad5240f09", "rev": "135b681d24af6ee4508bbf7c657982d7be8743d4",
"shallow": true, "shallow": true,
"type": "git", "type": "git",
"url": "ssh://git@github.com/hektor/nix-secrets" "url": "ssh://git@github.com/hektor/nix-secrets"
@@ -415,11 +415,11 @@
}, },
"nixCats": { "nixCats": {
"locked": { "locked": {
"lastModified": 1774835836, "lastModified": 1777273601,
"narHash": "sha256-6ok7iv/9R82vl6MYe3Lwyyb6S5bmW2PxEZtmjzlqyPs=", "narHash": "sha256-xBUa8Tl9V7IXI+VmLEuDc81La/EhoSn1C3EVSnJ3cfU=",
"owner": "BirdeeHub", "owner": "BirdeeHub",
"repo": "nixCats-nvim", "repo": "nixCats-nvim",
"rev": "ebb9f279a55ca60ff4e37e4accf6518dc627aa8d", "rev": "f69ea013e328841a7def7037ed59788a76be8816",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -451,11 +451,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1775490113, "lastModified": 1777917524,
"narHash": "sha256-2ZBhDNZZwYkRmefK5XLOusCJHnoeKkoN95hoSGgMxWM=", "narHash": "sha256-k+LVe9YaO2BEPB9AaCtTtOMCeGi4dxDo6gt4Un3qoPY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "c775c2772ba56e906cbeb4e0b2db19079ef11ff7", "rev": "df7783100babf59001340a7a874ba3824e441ecb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -467,11 +467,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1776169885, "lastModified": 1777954456,
"narHash": "sha256-l/iNYDZ4bGOAFQY2q8y5OAfBBtrDAaPuRQqWaFHVRXM=", "narHash": "sha256-hGdgeU2Nk87RAuZyYjyDjFL6LK7dAZN5RE9+hrDTkDU=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "4bd9165a9165d7b5e33ae57f3eecbcb28fb231c9", "rev": "549bd84d6279f9852cae6225e372cc67fb91a4c1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -509,11 +509,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1775228139, "lastModified": 1777598946,
"narHash": "sha256-ebbeHmg+V7w8050bwQOuhmQHoLOEOfqKzM1KgCTexK4=", "narHash": "sha256-X239dAGaU1+gfDj8jKH8GzlqKMcxaVfXOio+uzBOkeE=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "601971b9c89e0304561977f2c28fa25e73aa7132", "rev": "5d55af01c0f86be583931fe99207fc56c14134b3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -665,11 +665,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1776119890, "lastModified": 1777944972,
"narHash": "sha256-Zm6bxLNnEOYuS/SzrAGsYuXSwk3cbkRQZY0fJnk8a5M=", "narHash": "sha256-VfGRo1qTBKOe3s2gOv8LSoA6Fk19PvBlwQ1ECN0Evn8=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "d4971dd58c6627bfee52a1ad4237637c0a2fb0cd", "rev": "c591bf665727040c6cc5cb409079acb22dcce33c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -714,11 +714,11 @@
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1776170745, "lastModified": 1777835090,
"narHash": "sha256-Tl1aZVP5EIlT+k0+iAKH018GLHJpLz3hhJ0LNQOWxCc=", "narHash": "sha256-VLH8zPweblCOvpnQXp4fVs7f6Q79YhXF5XFKlOrvIFk=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "e3861617645a43c9bbefde1aa6ac54dd0a44bfa9", "rev": "7989a1054b01153212dede6005abfd1576b8328c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -776,11 +776,11 @@
"tinted-schemes": { "tinted-schemes": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1772661346, "lastModified": 1777041405,
"narHash": "sha256-4eu3LqB9tPqe0Vaqxd4wkZiBbthLbpb7llcoE/p5HT0=", "narHash": "sha256-BAGZ7ObFV/9Z61OJZun7ifPyhkuHqNuW1QIhQ8LuzCo=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "schemes", "repo": "schemes",
"rev": "13b5b0c299982bb361039601e2d72587d6846294", "rev": "5f868b3a338b6904c47f3833b9c411be641983a8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -792,11 +792,11 @@
"tinted-tmux": { "tinted-tmux": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1772934010, "lastModified": 1777169200,
"narHash": "sha256-x+6+4UvaG+RBRQ6UaX+o6DjEg28u4eqhVRM9kpgJGjQ=", "narHash": "sha256-h7dDbIzP5hDr9v97w9PL6jdAgXawmj6krcH+959rqpU=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "tinted-tmux", "repo": "tinted-tmux",
"rev": "c3529673a5ab6e1b6830f618c45d9ce1bcdd829d", "rev": "f798c2dce44ef815bb6b8f05a82135c7942d35ac",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -808,11 +808,11 @@
"tinted-zed": { "tinted-zed": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1772909925, "lastModified": 1777463218,
"narHash": "sha256-jx/5+pgYR0noHa3hk2esin18VMbnPSvWPL5bBjfTIAU=", "narHash": "sha256-Bhkozqtq3BKLqWTlmKm8uAptfX4aRGI8QX3eEL54Vpc=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-zed", "repo": "base16-zed",
"rev": "b4d3a1b3bcbd090937ef609a0a3b37237af974df", "rev": "5768d08ed2e7944a26a958868cdb073cb8856dae",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -76,7 +76,10 @@
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
modules = [ modules = [
./hosts/${host} ./hosts/${host}
{ nixpkgs.hostPlatform = import ./hosts/${host}/system.nix; } {
nixpkgs.hostPlatform = (myUtils.hostMeta ./hosts/${host}).system;
host.name = host;
}
]; ];
specialArgs = { specialArgs = {
inherit inherit

View File

@@ -25,10 +25,12 @@
../../modules/nvim ../../modules/nvim
../../modules/pandoc ../../modules/pandoc
../../modules/photography ../../modules/photography
../../modules/secrets
../../modules/shell ../../modules/shell
../../modules/ssh ../../modules/ssh
../../modules/taskwarrior ../../modules/taskwarrior
../../modules/terminal ../../modules/terminal
../../modules/zk
../../modules/torrenting ../../modules/torrenting
]; ];
@@ -45,7 +47,10 @@
printing.enable = true; printing.enable = true;
modeling.enable = true; modeling.enable = true;
}; };
ai-tools.opencode.enable = true; ai-tools = {
claude-code.enable = true;
opencode.enable = true;
};
browser.primary = "librewolf"; browser.primary = "librewolf";
cloud.hetzner.enable = true; cloud.hetzner.enable = true;
comms.signal.enable = true; comms.signal.enable = true;
@@ -53,6 +58,7 @@
shell.bash.aliases.lang-js = true; shell.bash.aliases.lang-js = true;
shell.bash.addBinToPath = true; shell.bash.addBinToPath = true;
torrenting.enable = true; torrenting.enable = true;
zk.enable = true;
programs = { programs = {
home-manager.enable = true; home-manager.enable = true;

View File

@@ -43,7 +43,10 @@
}; };
modules."3d".printing.enable = true; modules."3d".printing.enable = true;
ai-tools.opencode.enable = true; ai-tools = {
claude-code.enable = true;
opencode.enable = true;
};
browser.primary = "librewolf"; browser.primary = "librewolf";
cloud.hetzner.enable = true; cloud.hetzner.enable = true;
comms.signal.enable = true; comms.signal.enable = true;

View File

@@ -5,9 +5,6 @@
... ...
}: }:
let
username = "hektor";
in
{ {
imports = [ imports = [
inputs.sops-nix.homeManagerModules.sops inputs.sops-nix.homeManagerModules.sops
@@ -57,8 +54,8 @@ in
home = { home = {
stateVersion = "25.05"; stateVersion = "25.05";
inherit username; username = "hektor";
homeDirectory = "/home/${username}"; homeDirectory = "/home/${config.home.username}";
}; };
targets.genericLinux.nixGL = { targets.genericLinux.nixGL = {
@@ -76,8 +73,11 @@ in
tirith.enable = true; tirith.enable = true;
opencode.enable = true; opencode.enable = true;
}; };
database.mssql.enable = true; database = {
database.postgresql.enable = true; mssql.enable = true;
postgresql.enable = true;
redis.enable = true;
};
git.github.enable = true; git.github.enable = true;
git.gitlab.enable = true; git.gitlab.enable = true;
secrets.vault.enable = true; secrets.vault.enable = true;

View File

@@ -0,0 +1,60 @@
{
lib,
config,
pkgs,
...
}:
let
cfg = config.ai-tools.claude-code;
rtk-version = "0.18.1";
in
{
options.ai-tools.claude-code.enable = lib.mkEnableOption "claude code with rtk and ccline";
config = lib.mkIf cfg.enable {
programs.claude-code.enable = true;
home.packages = with pkgs; [
(stdenv.mkDerivation {
name = "ccline";
src = fetchurl {
url = "https://github.com/Haleclipse/CCometixLine/releases/download/v1.0.8/ccline-linux-x64.tar.gz";
hash = "sha256-Joe3Dd6uSMGi66QT6xr2oY/Tz8rA5RuKa6ckBVJIzI0=";
};
unpackPhase = "tar xzf $src";
installPhase = ''
mkdir -p $out/bin
cp ccline $out/bin/
chmod +x $out/bin/ccline
'';
meta = {
description = "CCometixLine Linux x64 CLI (Claude Code statusline)";
homepage = "https://github.com/Haleclipse/CCometixLine";
license = lib.licenses.mit;
platforms = [ "x86_64-linux" ];
};
})
(stdenv.mkDerivation {
name = "rtk-${rtk-version}";
version = rtk-version;
src = fetchurl {
url = "https://github.com/rtk-ai/rtk/releases/download/v${rtk-version}/rtk-x86_64-unknown-linux-gnu.tar.gz";
hash = "sha256-XoTia5K8b00OzcKYCufwx8ApkAS31DxUCpGSU0jFs2Q=";
};
unpackPhase = "tar xzf $src";
installPhase = ''
mkdir -p $out/bin
cp rtk $out/bin/
chmod +x $out/bin/rtk
'';
meta = {
description = "RTK - AI coding tool enhancer";
homepage = "https://www.rtk-ai.app";
license = lib.licenses.mit;
platforms = [ "x86_64-linux" ];
};
})
mcp-nixos
];
};
}

View File

@@ -1,116 +1,8 @@
{ {
lib, imports = [
config, ./claude-code.nix
pkgs, ./opencode.nix
... ./skills.nix
}: ./tirith.nix
let
cfg = config.ai-tools;
rtk-version = "0.18.1";
in
{
options.ai-tools = {
claude-code.enable = lib.mkEnableOption "claude code with rtk and ccline";
tirith.enable = lib.mkEnableOption "tirith shell security guard";
opencode.enable = lib.mkEnableOption "opencode";
};
config = lib.mkMerge [
(lib.mkIf cfg.claude-code.enable {
home.packages = with pkgs; [
claude-code
(pkgs.stdenv.mkDerivation {
name = "ccline";
src = pkgs.fetchurl {
url = "https://github.com/Haleclipse/CCometixLine/releases/download/v1.0.8/ccline-linux-x64.tar.gz";
hash = "sha256-Joe3Dd6uSMGi66QT6xr2oY/Tz8rA5RuKa6ckBVJIzI0=";
};
unpackPhase = ''
tar xzf $src
'';
installPhase = ''
mkdir -p $out/bin
cp ccline $out/bin/
chmod +x $out/bin/ccline
'';
meta = with pkgs.lib; {
description = "CCometixLine Linux x64 CLI (Claude Code statusline)";
homepage = "https://github.com/Haleclipse/CCometixLine";
license = licenses.mit;
platforms = [ "x86_64-linux" ];
};
})
(pkgs.stdenv.mkDerivation {
name = "rtk-${rtk-version}";
version = rtk-version;
src = pkgs.fetchurl {
url = "https://github.com/rtk-ai/rtk/releases/download/v${rtk-version}/rtk-x86_64-unknown-linux-gnu.tar.gz";
hash = "sha256-XoTia5K8b00OzcKYCufwx8ApkAS31DxUCpGSU0jFs2Q=";
};
unpackPhase = ''
tar xzf $src
'';
installPhase = ''
mkdir -p $out/bin
cp rtk $out/bin/
chmod +x $out/bin/rtk
'';
meta = with pkgs.lib; {
description = "RTK - AI coding tool enhancer";
homepage = "https://www.rtk-ai.app";
license = licenses.mit;
platforms = [ "x86_64-linux" ];
};
})
mcp-nixos
];
})
(lib.mkIf cfg.tirith.enable {
home.packages = with pkgs; [
tirith
];
})
(lib.mkIf (cfg.tirith.enable && cfg.claude-code.enable) {
home.file.".claude/hooks/tirith-check.py" = {
source = ./tirith-check.py;
executable = true;
};
home.activation.tirith-claude-code = lib.hm.dag.entryAfter [ "writeBoundary" ] ''
${pkgs.tirith}/bin/tirith setup claude-code --with-mcp --scope user --force 2>/dev/null || true
'';
})
(lib.mkIf cfg.opencode.enable {
home.packages = with pkgs; [
opencode
];
home.file.".config/opencode/opencode.json".text = builtins.toJSON {
"$schema" = "https://opencode.ai/config.json";
permission = {
external_directory = {
"/run/secrets/" = "deny";
"~/.config/sops/age/keys.txt" = "deny";
"~/.ssh/id_rsa" = "deny";
"~/.ssh/id_ed25519" = "deny";
"~/.ssh/id_ecdsa" = "deny";
"~/.ssh/id_dsa" = "deny";
"/etc/ssh/ssh_host_rsa_key" = "deny";
"/etc/ssh/ssh_host_ed25519_key" = "deny";
"/etc/ssh/ssh_host_ecdsa_key" = "deny";
"/etc/ssh/ssh_host_dsa_key" = "deny";
};
command = {
sops = "deny";
};
};
plugin = [ "@mohak34/opencode-notifier@latest" ];
};
})
]; ];
} }

View File

@@ -0,0 +1,40 @@
{
lib,
config,
pkgs,
...
}:
let
cfg = config.ai-tools.opencode;
in
{
options.ai-tools.opencode = {
enable = lib.mkEnableOption "opencode";
};
config = lib.mkIf cfg.enable {
home.packages = [ pkgs.opencode ];
home.file.".config/opencode/opencode.json".text = builtins.toJSON {
"$schema" = "https://opencode.ai/config.json";
permission = {
external_directory = {
"/run/secrets/" = "deny";
"~/.config/sops/age/keys.txt" = "deny";
"~/.ssh/id_rsa" = "deny";
"~/.ssh/id_ed25519" = "deny";
"~/.ssh/id_ecdsa" = "deny";
"~/.ssh/id_dsa" = "deny";
"/etc/ssh/ssh_host_rsa_key" = "deny";
"/etc/ssh/ssh_host_ed25519_key" = "deny";
"/etc/ssh/ssh_host_ecdsa_key" = "deny";
"/etc/ssh/ssh_host_dsa_key" = "deny";
};
command = {
sops = "deny";
};
};
plugin = [ "@mohak34/opencode-notifier@latest" ];
};
};
}

View File

@@ -0,0 +1,49 @@
{
lib,
config,
pkgs,
...
}:
let
cfg = config.ai-tools.claude-code;
skillType = lib.types.submodule {
options = {
owner = lib.mkOption { type = lib.types.str; };
repo = lib.mkOption { type = lib.types.str; };
rev = lib.mkOption { type = lib.types.str; };
hash = lib.mkOption { type = lib.types.str; };
skill = lib.mkOption { type = lib.types.str; };
};
};
fetchSkill =
skill:
let
src = pkgs.fetchFromGitHub {
inherit (skill)
owner
repo
rev
hash
;
};
in
{
name = ".claude/skills/${skill.skill}";
value = {
source = "${src}/${skill.skill}";
recursive = true;
};
};
in
{
options.ai-tools.claude-code.skills = lib.mkOption {
type = lib.types.listOf skillType;
default = [ ];
};
config = lib.mkIf cfg.enable {
home.file = builtins.listToAttrs (map fetchSkill cfg.skills);
};
}

View File

@@ -0,0 +1,30 @@
{
lib,
config,
pkgs,
...
}:
let
cfg = config.ai-tools.tirith;
in
{
options.ai-tools.tirith = {
enable = lib.mkEnableOption "tirith shell security guard";
};
config = lib.mkMerge [
(lib.mkIf cfg.enable {
home.packages = [ pkgs.tirith ];
})
(lib.mkIf (cfg.enable && config.ai-tools.claude-code.enable) {
home.file.".claude/hooks/tirith-check.py" = {
source = ./tirith-check.py;
executable = true;
};
home.activation.tirith-claude-code = lib.hm.dag.entryAfter [ "writeBoundary" ] ''
${pkgs.tirith}/bin/tirith setup claude-code --with-mcp --scope user --force 2>/dev/null || true
'';
})
];
}

View File

@@ -13,10 +13,12 @@ let
standalone = osConfig == null; standalone = osConfig == null;
in in
lib.optionalAttrs standalone { lib.optionalAttrs standalone {
sops.secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" "anki" [ sops.secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" null {
anki = [
"sync-user" "sync-user"
"sync-key" "sync-key"
] { }; ];
};
} }
// { // {
warnings = lib.optional ( warnings = lib.optional (

View File

@@ -9,14 +9,18 @@
options.database = { options.database = {
mssql.enable = lib.mkEnableOption "MSSQL"; mssql.enable = lib.mkEnableOption "MSSQL";
postgresql.enable = lib.mkEnableOption "PostgreSQL"; postgresql.enable = lib.mkEnableOption "PostgreSQL";
redis.enable = lib.mkEnableOption "Redis";
}; };
config = lib.mkMerge [ config = lib.mkMerge [
(lib.mkIf config.database.mssql.enable { (lib.mkIf config.database.mssql.enable {
home.packages = [ (config.nixgl.wrap pkgs.dbeaver-bin) ]; home.packages = with pkgs; [ (config.nixgl.wrap dbeaver-bin) ];
}) })
(lib.mkIf config.database.postgresql.enable { (lib.mkIf config.database.postgresql.enable {
home.packages = [ (config.nixgl.wrap pkgs.pgadmin4-desktopmode) ]; home.packages = with pkgs; [ (config.nixgl.wrap pgadmin4-desktopmode) ];
})
(lib.mkIf config.database.postgresql.enable {
home.packages = with pkgs; [ redis ];
}) })
]; ];
} }

View File

@@ -3,6 +3,7 @@
let let
terminal = "kitty"; terminal = "kitty";
browser = config.browser.primary; browser = config.browser.primary;
font = "${config.stylix.fonts.monospace.name} ${toString config.stylix.fonts.sizes.applications}";
in in
{ {
dconf.settings = { dconf.settings = {
@@ -40,9 +41,9 @@ in
clock-show-weekday = true; clock-show-weekday = true;
color-scheme = "prefer-dark"; color-scheme = "prefer-dark";
enable-hot-corners = false; enable-hot-corners = false;
font-name = "Iosevka Term SS08 12"; # font-name = font;
locate-pointer = true; locate-pointer = true;
monospace-font-name = "Iosevka Term SS08 12"; monospace-font-name = font;
}; };
"org/gnome/desktop/wm/keybindings" = { "org/gnome/desktop/wm/keybindings" = {

View File

@@ -6,13 +6,19 @@
}: }:
{ {
options.nixgl.wrap = lib.mkOption { options = {
host.username = lib.mkOption {
type = lib.types.str;
default = config.home.username;
};
nixgl.wrap = lib.mkOption {
type = lib.types.functionTo lib.types.package; type = lib.types.functionTo lib.types.package;
default = if config.lib ? nixGL then config.lib.nixGL.wrap else lib.id; default = if config.lib ? nixGL then config.lib.nixGL.wrap else lib.id;
readOnly = true; readOnly = true;
}; };
options.wrapApp = lib.mkOption { wrapApp = lib.mkOption {
type = lib.types.raw; type = lib.types.raw;
default = default =
pkg: flags: pkg: flags:
@@ -27,4 +33,5 @@
pkg; pkg;
readOnly = true; readOnly = true;
}; };
};
} }

View File

@@ -1,18 +1,15 @@
{ {
outputs, myUtils,
lib, lib,
pkgs, pkgs,
... ...
}: }:
let let
nixosConfigs = builtins.attrNames outputs.nixosConfigurations; hostDir = ../../hosts;
homeConfigs = map (n: lib.last (lib.splitString "@" n)) ( hostNames = myUtils.dirNames hostDir;
builtins.attrNames outputs.homeConfigurations
);
allHosts = lib.unique (homeConfigs ++ nixosConfigs);
hostsWithKeys = lib.filter ( hostsWithKeys = lib.filter (
hostname: builtins.pathExists ../../hosts/${hostname}/ssh_host.pub hostname: builtins.pathExists (hostDir + "/${hostname}/ssh_host.pub")
) allHosts; ) hostNames;
in in
{ {
home.packages = with pkgs; [ sshfs ]; home.packages = with pkgs; [ sshfs ];
@@ -25,15 +22,14 @@ in
lib.genAttrs hostsWithKeys ( lib.genAttrs hostsWithKeys (
hostname: hostname:
let let
hostConfig = outputs.nixosConfigurations.${hostname}.config; meta = myUtils.hostMeta (hostDir + "/${hostname}");
inherit (hostConfig.ssh) publicHostname username;
in in
{ {
host = hostname; host = hostname;
user = username; user = meta.deployment.targetUser;
} }
// lib.optionalAttrs (publicHostname != "") { // lib.optionalAttrs (meta.deployment.targetHost != "") {
hostname = publicHostname; hostname = meta.deployment.targetHost;
} }
) )
// { // {

View File

@@ -25,21 +25,6 @@ in
sansSerif = config.stylix.fonts.monospace; sansSerif = config.stylix.fonts.monospace;
emoji = config.stylix.fonts.monospace; emoji = config.stylix.fonts.monospace;
}; };
targets = { targets = import ../../../modules/stylix/targets.nix;
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
gnome.enable = false;
gtk.enable = false;
kitty = {
variant256Colors = true;
};
nixvim.enable = false;
};
}; };
} }

View File

@@ -15,11 +15,13 @@ let
in in
lib.optionalAttrs standalone { lib.optionalAttrs standalone {
sops = { sops = {
secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" "taskwarrior" [ secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" null {
taskwarrior = [
"sync-server-url" "sync-server-url"
"sync-server-client-id" "sync-server-client-id"
"sync-encryption-secret" "sync-encryption-secret"
] { }; ];
};
templates."taskrc.d/sync" = { templates."taskrc.d/sync" = {
content = '' content = ''

View File

@@ -11,9 +11,5 @@
enable = true; enable = true;
extraConfig = builtins.readFile (dotsPath + "/.config/tmux/tmux.conf"); extraConfig = builtins.readFile (dotsPath + "/.config/tmux/tmux.conf");
}; };
home.file = {
".config/tmux/hooks/tmux.ssh.conf".source = dotsPath + "/.config/tmux/hooks/tmux.ssh.conf";
};
}; };
} }

View File

@@ -0,0 +1,45 @@
{
config,
lib,
pkgs,
...
}:
let
cfg = config.zk;
in
{
options.zk = {
enable = lib.mkEnableOption "zettelkasten";
path = lib.mkOption {
type = lib.types.str;
default = config.home.homeDirectory + "/.zk";
description = "Path to the zettelkasten directory";
};
};
config = lib.mkIf cfg.enable {
home = {
sessionVariables.ZK_PATH = cfg.path;
packages = [
(pkgs.writeShellApplication {
name = "zk";
runtimeInputs = with pkgs; [ tmux ];
text = builtins.readFile ./scripts/zk.sh;
})
(pkgs.writeShellApplication {
name = "save-zk";
runtimeInputs = with pkgs; [ git ];
text = builtins.readFile ./scripts/save-zk.sh;
})
(pkgs.writeShellApplication {
name = "setup-zk";
runtimeInputs = with pkgs; [ gh ];
text = builtins.readFile ./scripts/setup-zk.sh;
})
];
};
};
}

View File

@@ -0,0 +1,2 @@
cd "$ZK_PATH" || { echo "No zettelkasten directory found"; exit 1; }
git add . && git commit -m "Update" && git push

View File

@@ -0,0 +1,13 @@
if [ ! -d "$ZK_PATH" ]; then
echo "[zk] Setting up zettelkasten"
gh repo clone zk "$ZK_PATH"
else
echo "[zk] Zettelkasten already set up."
fi
read -p "Would you like open your zettelkasten? [y/N] " -n 1 -r
echo
if [[ $REPLY =~ ^[Yy]$ ]]; then
$EDITOR "$ZK_PATH"
fi

14
dots/.bin/zk → home/modules/zk/scripts/zk.sh Executable file → Normal file
View File

@@ -1,8 +1,6 @@
#!/usr/bin/env bash current_zettel_path="$(cat "$ZK_PATH/current-zettel.txt")"
current_zettel_path="$ZK_PATH/$(cat "$ZK_PATH/current-zettel.txt")" if [ -n "${TMUX:-}" ]; then
if [ "$TERM_PROGRAM" = tmux ]; then
cd "$ZK_PATH" && $EDITOR "$current_zettel_path" cd "$ZK_PATH" && $EDITOR "$current_zettel_path"
else else
echo 'Not in tmux' echo 'Not in tmux'
@@ -12,13 +10,9 @@ else
read -r -p 'Enter your choice: ' choice read -r -p 'Enter your choice: ' choice
case $choice in case $choice in
1) 1)
# Check if a tmux session is running with a window named zk if tmux has-session -t zk 2>/dev/null; then
if tmux list-windows -F '#{window_name}' | grep -q zk; then tmux attach -t zk
# Attach to the session containing the 'zk' window
session="$(tmux list-windows -F '#{window_name} #{session_name}' | grep zk | head -n 1 | awk '{ print $2 }')"
tmux attach -t "$session"
else else
# Create session with a window named 'zk' and start nvim
tmux new-session -s zk -n zk -d tmux new-session -s zk -n zk -d
tmux send-keys -t zk:zk "cd $ZK_PATH && $EDITOR $current_zettel_path" Enter tmux send-keys -t zk:zk "cd $ZK_PATH && $EDITOR $current_zettel_path" Enter
tmux attach -t zk tmux attach -t zk

View File

@@ -51,31 +51,16 @@ in
../../modules/yubikey ../../modules/yubikey
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/andromache { home-manager.users.${config.host.username} = import ../../home/hosts/${config.host.name};
inherit
inputs
config
pkgs
lib
;
};
ssh.username = config.host.username; secrets.nixSigningKey.enable = true;
ssh.authorizedHosts = [ "astyanax" ];
secrets = {
inherit (config.host) username;
nixSigningKey.enable = true;
};
restic-backup.enable = true;
tailscale.enable = true; tailscale.enable = true;
docker.user = config.host.username; docker.enable = true;
hcloud = { hcloud.enable = true;
enable = true;
inherit (config.host) username;
};
disko.devices = { disko.devices = {
disk.data = { disk.data = {
@@ -107,7 +92,6 @@ in
my.yubikey = { my.yubikey = {
enable = false; enable = false;
inherit (config.host) username;
keys = [ keys = [
{ {
handle = "<KeyHandle1>"; handle = "<KeyHandle1>";

View File

@@ -1,6 +1,7 @@
{ {
host = { host = {
username = "h"; username = "h";
name = "andromache"; highRam = true;
admin = true;
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "desktop"; role = "desktop";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -47,26 +47,14 @@ in
../../modules/yubikey ../../modules/yubikey
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/astyanax { home-manager.users.${config.host.username} = import ../../home/hosts/${config.host.name};
inherit
inputs
config
pkgs
lib
;
};
ssh.username = config.host.username; secrets.nixSigningKey.enable = true;
ssh.authorizedHosts = [ "andromache" ];
secrets = {
inherit (config.host) username;
nixSigningKey.enable = true;
};
restic-backup.enable = true;
tailscale.enable = true; tailscale.enable = true;
docker.user = config.host.username; docker.enable = true;
nfc.user = config.host.username; nfc.enable = true;
desktop.ly.enable = true; desktop.ly.enable = true;
audio.automation.enable = true; audio.automation.enable = true;

View File

@@ -1,6 +1,7 @@
{ {
host = { host = {
username = "h"; username = "h";
name = "astyanax"; highRam = true;
admin = true;
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "laptop"; role = "laptop";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -11,15 +11,6 @@
../../modules/ssh ../../modules/ssh
]; ];
ssh = {
inherit (config.host) username;
publicHostname = config.host.name;
authorizedHosts = [
"andromache"
"astyanax"
];
};
boot = { boot = {
kernelParams = [ kernelParams = [
"console=ttyS1,115200n8" "console=ttyS1,115200n8"

View File

@@ -1,6 +1,5 @@
{ {
host = { host = {
username = "h"; username = "h";
name = "eetion-02";
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "arm" ]; system = "aarch64-linux";
deployment = {
tags = [ "arm" ];
targetHost = "eetion-02";
targetUser = "h";
};
role = "embedded"; role = "embedded";
} }

View File

@@ -1 +0,0 @@
"aarch64-linux"

View File

@@ -9,17 +9,11 @@
./host.nix ./host.nix
../../modules/common ../../modules/common
../../modules/ssh ../../modules/ssh
../../modules/tailscale
# ../../modules/uptime-kuma # ../../modules/uptime-kuma
]; ];
ssh = { tailscale.enable = true;
inherit (config.host) username;
publicHostname = config.host.name;
authorizedHosts = [
"andromache"
"astyanax"
];
};
boot.loader = { boot.loader = {
grub.enable = false; grub.enable = false;

View File

@@ -1,6 +1,5 @@
{ {
host = { host = {
username = "h"; username = "h";
name = "eetion";
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "arm" ]; system = "aarch64-linux";
deployment = {
tags = [ "arm" ];
targetHost = "eetion";
targetUser = "h";
};
role = "embedded"; role = "embedded";
} }

View File

@@ -1 +0,0 @@
"aarch64-linux"

View File

@@ -18,16 +18,7 @@
]; ];
networking.hostName = config.host.name; networking.hostName = config.host.name;
ssh = { docker.enable = true;
inherit (config.host) username;
publicHostname = "server.hektormisplon.xyz";
authorizedHosts = [
"andromache"
"astyanax"
];
};
docker.user = config.host.username;
fileSystems."/" = { fileSystems."/" = {
device = "/dev/disk/by-label/nixos"; device = "/dev/disk/by-label/nixos";

View File

@@ -1,6 +1,5 @@
{ {
host = { host = {
username = "username"; username = "username";
name = "hecuba";
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "cloud" ]; system = "x86_64-linux";
deployment = {
tags = [ "cloud" ];
targetHost = "server.hektormisplon.xyz";
targetUser = "username";
};
role = "server"; role = "server";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -1,7 +1,6 @@
{ {
inputs, inputs,
config, config,
pkgs,
... ...
}: }:
{ {
@@ -29,13 +28,7 @@
../../modules/x ../../modules/x
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/vm { home-manager.users.${config.host.username} = import ../../home/hosts/vm;
inherit inputs config pkgs;
};
ssh.username = config.host.username;
secrets.username = config.host.username;
disko = { disko = {
devices.disk.main = { devices.disk.main = {

View File

@@ -1,6 +1,5 @@
{ {
host = { host = {
username = "h"; username = "h";
name = "vm";
}; };
} }

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "vm"; role = "vm";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -12,14 +12,14 @@ let
in in
{ {
imports = [ imports = [
../modules/common/host.nix
../modules/ssh ../modules/ssh
]; ];
ssh.username = username; host = {
ssh.authorizedHosts = [ inherit username;
"andromache" name = "orange-pi";
"astyanax" };
];
nix.settings.experimental-features = [ nix.settings.experimental-features = [
"nix-command" "nix-command"

View File

@@ -12,14 +12,14 @@ let
in in
{ {
imports = [ imports = [
../modules/common/host.nix
../modules/ssh ../modules/ssh
]; ];
ssh.username = username; host = {
ssh.authorizedHosts = [ inherit username;
"andromache" name = "raspberry-pi";
"astyanax" };
];
boot.kernelParams = [ boot.kernelParams = [
"console=ttyS1,115200n8" "console=ttyS1,115200n8"

View File

@@ -1,14 +1,15 @@
{ config, myUtils, ... }: { config, ... }:
let let
inherit (config.secrets) sopsDir username; inherit (config.host) username;
owner = config.users.users.${username}.name; inherit (config.secrets) owner;
in in
{ {
config.sops = { config = {
secrets = myUtils.mkSopsSecrets sopsDir "opencode" [ "api-key" ] { inherit owner; }; nixpkgs.allowedUnfree = [ "claude-code" ];
secrets.groups.opencode = [ "api-key" ];
templates."opencode/auth.json" = { sops.templates."opencode/auth.json" = {
inherit owner; inherit owner;
path = "/home/${username}/.local/share/opencode/auth.json"; path = "/home/${username}/.local/share/opencode/auth.json";
content = '' content = ''

View File

@@ -1,11 +1,6 @@
{ config, myUtils, ... }:
let
inherit (config.secrets) sopsDir username;
owner = config.users.users.${username}.name;
in
{ {
config.sops = { config.secrets.groups.anki = [
secrets = myUtils.mkSopsSecrets sopsDir "anki" [ "sync-user" "sync-key" ] { inherit owner; }; "sync-user"
}; "sync-key"
];
} }

View File

@@ -1,21 +1,16 @@
{ {
lib, lib,
config, config,
myUtils,
... ...
}: }:
let let
cfg = config.restic-backup; cfg = config.restic-backup;
inherit (config.secrets) sopsDir; host = config.networking.hostName;
in in
{ {
options = { options.restic-backup = {
restic-backup = { enable = lib.mkEnableOption "restic backups";
repository = lib.mkOption {
type = lib.types.str;
default = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${config.networking.hostName}";
};
passwordFile = lib.mkOption { passwordFile = lib.mkOption {
type = lib.types.str; type = lib.types.str;
@@ -27,31 +22,32 @@ in
default = [ "/home" ]; default = [ "/home" ];
}; };
}; };
config = lib.mkIf cfg.enable {
secrets.groups = {
restic = [ "password" ];
backblaze-b2 = [
"bucket-name"
"account-id"
"account-key"
];
}; };
config = { sops.templates = {
sops = { "restic/repo-${host}" = {
secrets = lib.mkMerge [ content = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${host}";
(myUtils.mkSopsSecrets sopsDir "restic" [ "password" ] { })
(myUtils.mkSopsSecrets sopsDir "backblaze-b2" [ "bucket-name" "account-id" "account-key" ] { })
];
templates = {
"restic/repo-${config.networking.hostName}" = {
content = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${config.networking.hostName}";
}; };
"restic/b2-env-${config.networking.hostName}" = { "restic/b2-env-${host}" = {
content = '' content = ''
B2_ACCOUNT_ID=${config.sops.placeholder."backblaze-b2/account-id"} B2_ACCOUNT_ID=${config.sops.placeholder."backblaze-b2/account-id"}
B2_ACCOUNT_KEY=${config.sops.placeholder."backblaze-b2/account-key"} B2_ACCOUNT_KEY=${config.sops.placeholder."backblaze-b2/account-key"}
''; '';
}; };
}; };
};
services.restic.backups.home = { services.restic.backups.home = {
repositoryFile = config.sops.templates."restic/repo-${config.networking.hostName}".path; repositoryFile = config.sops.templates."restic/repo-${host}".path;
inherit (cfg) passwordFile; inherit (cfg) passwordFile paths;
inherit (cfg) paths;
timerConfig = { timerConfig = {
OnCalendar = "daily"; OnCalendar = "daily";
Persistent = true; Persistent = true;
@@ -64,7 +60,7 @@ in
"--keep-monthly 6" "--keep-monthly 6"
"--keep-yearly 1" "--keep-yearly 1"
]; ];
environmentFile = config.sops.templates."restic/b2-env-${config.networking.hostName}".path; environmentFile = config.sops.templates."restic/b2-env-${host}".path;
}; };
}; };
} }

View File

@@ -1,4 +1,11 @@
{ config, ... }:
{ {
boot.loader.systemd-boot.enable = true; boot = {
boot.loader.efi.canTouchEfiVariables = true; loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;
};
tmp.useTmpfs = config.host.highRam;
};
} }

View File

@@ -73,6 +73,11 @@ in
myUtils myUtils
; ;
}; };
sharedModules = [
{
host.username = lib.mkDefault config.host.username;
}
];
}; };
}; };
} }

View File

@@ -19,5 +19,15 @@
type = lib.types.str; type = lib.types.str;
default = "en_US.UTF-8"; default = "en_US.UTF-8";
}; };
highRam = lib.mkOption {
type = lib.types.bool;
default = false;
};
admin = lib.mkOption {
type = lib.types.bool;
default = false;
};
}; };
} }

View File

@@ -0,0 +1,7 @@
{
services.logind.settings.Login = {
HandleLidSwitch = "suspend";
IdleAction = "suspend";
IdleActionSec = 1800;
};
}

View File

@@ -9,6 +9,8 @@ let
cfg = config.desktop; cfg = config.desktop;
in in
{ {
imports = [ ../logind.nix ];
options.desktop = { options.desktop = {
ly = { ly = {
enable = lib.mkOption { enable = lib.mkOption {
@@ -35,15 +37,23 @@ in
]; ];
}; };
# error:
# Failed assertions:
# - h profile: xdg.portal: since you installed Home Manager via its NixOS module and
# 'home-manager.useUserPackages' is enabled, you need to add
#
# environment.pathsToLink = [ `/share/applications` `/share/xdg-desktop-portal` ];
#
# to your NixOS configuration so that the portal definitions and DE
# provided configurations get linked.
environment.pathsToLink = [
"/share/applications"
"/share/xdg-desktop-portal"
];
services = { services = {
gnome.gnome-keyring.enable = false; gnome.gnome-keyring.enable = false;
dbus.enable = true; dbus.enable = true;
logind.settings.Login = {
HandleLidSwitch = "suspend";
IdleAction = "suspend";
IdleActionSec = 1800;
};
displayManager.ly = lib.mkIf cfg.ly.enable { displayManager.ly = lib.mkIf cfg.ly.enable {
enable = true; enable = true;
}; };

View File

@@ -2,29 +2,17 @@
let let
cfg = config.docker; cfg = config.docker;
inherit (config.host) username;
in in
{ {
options.docker = { options.docker = {
enable = lib.mkEnableOption "docker";
rootless = lib.mkOption { rootless = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
default = false; default = false;
}; };
user = lib.mkOption {
type = lib.types.nullOr lib.types.str;
default = null;
};
}; };
config = lib.mkMerge [ config = lib.mkMerge [
{
warnings = lib.flatten [
(lib.optional (
cfg.rootless && cfg.user != null
) "'virtualisation.docker.user' is ignored when rootless mode is enabled")
(lib.optional (
!cfg.rootless && cfg.user == null
) "'virtualisation.docker.user' is not set (no user is added to the docker group)")
];
}
(lib.mkIf cfg.rootless { (lib.mkIf cfg.rootless {
virtualisation.docker = { virtualisation.docker = {
enable = false; enable = false;
@@ -34,11 +22,9 @@ in
}; };
}; };
}) })
(lib.mkIf (!cfg.rootless && cfg.user != null) { (lib.mkIf (cfg.enable && !cfg.rootless) {
virtualisation.docker = { virtualisation.docker.enable = true;
enable = true; users.users.${username}.extraGroups = [ "docker" ];
};
users.users.${cfg.user}.extraGroups = [ "docker" ];
}) })
]; ];
} }

View File

@@ -29,7 +29,7 @@
programs.gamemode.enable = true; programs.gamemode.enable = true;
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
lutris # lutris
mangohud mangohud
]; ];

View File

@@ -4,7 +4,7 @@
}: }:
let let
inherit (config.secrets) username; inherit (config.host) username;
owner = config.users.users.${username}.name; owner = config.users.users.${username}.name;
in in
{ {

View File

@@ -1,31 +1,25 @@
{ {
lib, lib,
config, config,
myUtils,
... ...
}: }:
let let
cfg = config.hcloud; cfg = config.hcloud;
inherit (config.secrets) sopsDir; inherit (config.host) username;
inherit (config.secrets) owner;
in in
{ {
options.hcloud = { options.hcloud = {
enable = lib.mkEnableOption "hcloud CLI configuration"; enable = lib.mkEnableOption "hcloud CLI configuration";
username = lib.mkOption {
type = lib.types.str;
description = "Username for hcloud CLI configuration";
};
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
sops.secrets = myUtils.mkSopsSecrets sopsDir "hcloud" [ "api-token" ] { secrets.groups.hcloud = [ "api-token" ];
owner = config.users.users.${cfg.username}.name;
};
sops.templates."hcloud/cli.toml" = { sops.templates."hcloud/cli.toml" = {
owner = config.users.users.${cfg.username}.name; inherit owner;
path = "/home/${cfg.username}/.config/hcloud/cli.toml"; path = "/home/${username}/.config/hcloud/cli.toml";
content = '' content = ''
active_context = "server" active_context = "server"

View File

@@ -2,15 +2,13 @@
let let
cfg = config.nfc; cfg = config.nfc;
inherit (config.host) username;
in in
{ {
options.nfc = { options.nfc = {
user = lib.mkOption { enable = lib.mkEnableOption "NFC device access";
type = lib.types.nullOr lib.types.str;
default = null;
}; };
}; config = lib.mkIf cfg.enable {
config = lib.mkIf (cfg.user != null) { users.users.${username}.extraGroups = [ "dialout" ];
users.users.${cfg.user}.extraGroups = [ "dialout" ];
}; };
} }

View File

@@ -9,24 +9,29 @@
let let
cfg = config.secrets; cfg = config.secrets;
inherit (config.host) username;
inherit (cfg) sopsDir; inherit (cfg) sopsDir;
owner = config.users.users.${cfg.username}.name; owner = config.users.users.${username}.name;
mkSopsSecrets = myUtils.mkSopsSecrets sopsDir;
in in
{ {
imports = [ inputs.sops-nix.nixosModules.sops ]; imports = [ inputs.sops-nix.nixosModules.sops ];
options = { options = {
secrets = { secrets = {
username = lib.mkOption {
type = lib.types.str;
};
sopsDir = lib.mkOption { sopsDir = lib.mkOption {
type = lib.types.str; type = lib.types.str;
default = "${toString inputs.nix-secrets}/secrets"; default = "${toString inputs.nix-secrets}/secrets";
}; };
groups = lib.mkOption {
type = lib.types.attrsOf (lib.types.listOf lib.types.str);
default = { };
};
owner = lib.mkOption {
type = lib.types.unspecified;
};
nixSigningKey = { nixSigningKey = {
enable = lib.mkEnableOption "nix signing key configuration"; enable = lib.mkEnableOption "nix signing key configuration";
}; };
@@ -38,27 +43,28 @@ in
}; };
config = { config = {
secrets = {
inherit owner;
groups = {
email = [
"personal"
"work"
];
nix = lib.optional cfg.nixSigningKey.enable "signing-key";
};
};
sops = { sops = {
# for yubikey, generate as follows: # for yubikey, generate as follows:
# ``` # ```
# age-plugin-yubikey --identity > <keyfile-path> # age-plugin-yubikey --identity > <keyfile-path>
# ``` # ```
age.keyFile = "/home/${cfg.username}/.config/sops/age/keys.txt"; age.keyFile = "/home/${username}/.config/sops/age/keys.txt";
secrets = myUtils.mkSopsSecrets sopsDir owner cfg.groups;
secrets = lib.mkMerge [
(mkSopsSecrets "email" [ "personal" "work" ] { inherit owner; })
(lib.mkIf cfg.nixSigningKey.enable {
nix-signing-key = {
sopsFile = "${sopsDir}/nix.yaml";
key = "signing-key";
inherit owner;
};
})
];
}; };
nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [ nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [
config.sops.secrets.nix-signing-key.path config.sops.secrets."nix/signing-key".path
]; ];
services = { services = {

View File

@@ -1,28 +1,29 @@
{ lib, config, ... }: {
lib,
config,
...
}:
let
inherit (config.host) username;
adminHosts = (import ../../utils { inherit lib; }).adminHosts ../../hosts;
in
{ {
options.ssh = { options.ssh = {
authorizedHosts = lib.mkOption { authorizedHosts = lib.mkOption {
type = lib.types.listOf lib.types.str; type = lib.types.listOf lib.types.str;
default = [ ]; default = [ ];
}; };
username = lib.mkOption {
type = lib.types.str;
default = "h";
};
publicHostname = lib.mkOption {
type = lib.types.str;
default = "";
};
}; };
# auto generate authorized_keys from `authorizedHosts` # auto generate authorized_keys from `authorizedHosts`
config.users.users.${config.ssh.username}.openssh.authorizedKeys.keys = lib.flatten ( config.users.users.${username}.openssh.authorizedKeys.keys = lib.flatten (
map ( map (
hostname: hostname:
let let
keyFile = ../../hosts/${hostname}/ssh_user.pub; keyFile = ../../hosts/${hostname}/ssh_user.pub;
in in
lib.optionals (builtins.pathExists keyFile) (lib.splitString "\n" (builtins.readFile keyFile)) lib.optionals (builtins.pathExists keyFile) (lib.splitString "\n" (builtins.readFile keyFile))
) config.ssh.authorizedHosts ) ((builtins.filter (h: h != config.host.name) adminHosts) ++ config.ssh.authorizedHosts)
); );
} }

View File

@@ -1,6 +1,6 @@
{ lib, config, ... }: { lib, config, ... }:
let let
inherit (config.ssh) username; inherit (config.host) username;
in in
{ {
# auto extract SSH keys # auto extract SSH keys

View File

@@ -30,20 +30,7 @@ in
home-manager.sharedModules = [ home-manager.sharedModules = [
{ {
stylix.targets = { stylix.targets = import ./targets.nix;
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
kitty.variant256Colors = true;
gnome.enable = false;
gtk.enable = false;
nixvim.enable = false;
};
} }
]; ];
} }

View File

@@ -0,0 +1,14 @@
{
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
kitty.variant256Colors = true;
gnome.enable = false;
gtk.enable = false;
nixvim.enable = false;
}

View File

@@ -7,23 +7,18 @@
with lib; with lib;
let let
cfg = config.my.syncthing; inherit (config.host) username;
in in
{ {
options.my.syncthing.username = mkOption {
type = types.str;
default = "h";
};
config = { config = {
users.groups.${cfg.username} = { }; users.groups.${username} = { };
users.users.${cfg.username}.extraGroups = [ cfg.username ]; users.users.${username}.extraGroups = [ username ];
services.syncthing = { services.syncthing = {
enable = true; enable = true;
user = cfg.username; user = username;
group = cfg.username; group = username;
configDir = "/home/${cfg.username}/.local/state/syncthing"; configDir = "/home/${username}/.local/state/syncthing";
openDefaultPorts = true; openDefaultPorts = true;
}; };
}; };

View File

@@ -1,18 +1,17 @@
{ config, myUtils, ... }: { config, ... }:
let let
inherit (config.secrets) sopsDir username; inherit (config.secrets) owner;
owner = config.users.users.${username}.name;
in in
{ {
config.sops = { config = {
secrets = myUtils.mkSopsSecrets sopsDir "taskwarrior" [ secrets.groups.taskwarrior = [
"sync-server-url" "sync-server-url"
"sync-server-client-id" "sync-server-client-id"
"sync-encryption-secret" "sync-encryption-secret"
] { inherit owner; }; ];
templates."taskrc.d/sync" = { sops.templates."taskrc.d/sync" = {
inherit owner; inherit owner;
content = '' content = ''
sync.server.url=${config.sops.placeholder."taskwarrior/sync-server-url"} sync.server.url=${config.sops.placeholder."taskwarrior/sync-server-url"}

View File

@@ -9,18 +9,14 @@ with lib;
let let
cfg = config.my.yubikey; cfg = config.my.yubikey;
inherit (config.host) username;
formatKey = key: ":${key.handle},${key.userKey},${key.coseType},${key.options}"; formatKey = key: ":${key.handle},${key.userKey},${key.coseType},${key.options}";
authfileContent = username: keys: username + lib.concatMapStrings formatKey keys; authfileContent = u: keys: u + lib.concatMapStrings formatKey keys;
in in
{ {
options.my.yubikey = { options.my.yubikey = {
enable = mkEnableOption "yubiKey U2F authentication"; enable = mkEnableOption "yubiKey U2F authentication";
username = mkOption {
type = types.str;
default = "h";
};
origin = mkOption { origin = mkOption {
type = types.str; type = types.str;
default = "pam://yubi"; default = "pam://yubi";
@@ -61,7 +57,7 @@ in
interactive = true; interactive = true;
cue = true; cue = true;
inherit (cfg) origin; inherit (cfg) origin;
authfile = pkgs.writeText "u2f-mappings" (authfileContent cfg.username cfg.keys); authfile = pkgs.writeText "u2f-mappings" (authfileContent username cfg.keys);
}; };
}; };
services = { services = {

View File

@@ -1,41 +1,8 @@
{ lib }: { lib }:
{ let
dirNames = fs = import ./fs.nix { inherit lib; };
path: builtins.attrNames (lib.filterAttrs (_: type: type == "directory") (builtins.readDir path)); hosts = import ./hosts.nix { inherit lib; };
secrets = import ./secrets.nix { inherit lib; };
hostMeta = in
hostDir: fs // hosts // secrets
if builtins.pathExists (hostDir + "/meta.nix") then
import (hostDir + "/meta.nix")
else
throw "meta.nix required in ${hostDir}";
mkSopsSecrets =
sopsDir: group: names: extraOpts:
let
file = "${group}.yaml";
in
lib.foldl' lib.mergeAttrs { } (
map (name: {
"${group}/${name}" = {
sopsFile = "${sopsDir}/${file}";
key = name;
}
// extraOpts;
}) names
);
sopsAvailability =
config: osConfig:
let
osSopsAvailable = osConfig != null && osConfig ? sops && osConfig.sops ? secrets;
hmSopsAvailable = config ? sops && config.sops ? secrets;
preferOs = osSopsAvailable;
in
{
available = osSopsAvailable || hmSopsAvailable;
secrets = if preferOs then osConfig.sops.secrets else config.sops.secrets;
templates = if preferOs then osConfig.sops.templates else config.sops.templates;
};
}

6
utils/fs.nix Normal file
View File

@@ -0,0 +1,6 @@
{ lib }:
{
dirNames =
path: builtins.attrNames (lib.filterAttrs (_: t: t == "directory") (builtins.readDir path));
}

19
utils/hosts.nix Normal file
View File

@@ -0,0 +1,19 @@
{ lib }:
let
fs = import ./fs.nix { inherit lib; };
in
{
hostMeta =
hostDir:
if builtins.pathExists (hostDir + "/meta.nix") then
import (hostDir + "/meta.nix")
else
throw "meta.nix required in ${hostDir}";
adminHosts =
hostsPath:
builtins.filter (host: ((import (hostsPath + "/${host}/host.nix")).host.admin or false)) (
fs.dirNames hostsPath
);
}

37
utils/secrets.nix Normal file
View File

@@ -0,0 +1,37 @@
{ lib }:
{
mkSopsSecrets =
sopsDir: owner: groups:
let
opts = lib.optionalAttrs (owner != null) { inherit owner; };
mkGroup =
group: names:
let
file = "${group}.yaml";
in
lib.foldl' lib.mergeAttrs { } (
map (name: {
"${group}/${name}" = {
sopsFile = "${sopsDir}/${file}";
key = name;
}
// opts;
}) names
);
in
lib.foldl' lib.mergeAttrs { } (lib.mapAttrsToList mkGroup groups);
sopsAvailability =
config: osConfig:
let
osSopsAvailable = osConfig != null && osConfig ? sops && osConfig.sops ? secrets;
hmSopsAvailable = config ? sops && config.sops ? secrets;
preferOs = osSopsAvailable;
in
{
available = osSopsAvailable || hmSopsAvailable;
secrets = if preferOs then osConfig.sops.secrets else config.sops.secrets;
templates = if preferOs then osConfig.sops.templates else config.sops.templates;
};
}