Moved vscodium definition.

added caddyfile plugin to vscodium.
used nixfmt.
This commit is contained in:
Ittihadyya 2024-11-22 14:34:14 +02:00
parent 91c0a203fc
commit 7bbf371287
12 changed files with 123 additions and 91 deletions

View file

@ -59,7 +59,7 @@
signal-desktop
discord
obsidian
# calibre # still borked apparently, what the hell # still!!!
# calibre # still borked apparently, what the hell # still!!!
libreoffice
];
@ -70,19 +70,7 @@
terminator = {
enable = true;
};
vscode = {
enable = true;
package = pkgs.vscodium;
mutableExtensionsDir = false;
extensions = with pkgs.vscode-extensions; [
rust-lang.rust-analyzer
tuttieee.emacs-mcx
tamasfe.even-better-toml
vadimcn.vscode-lldb
jnoortheen.nix-ide
mkhl.direnv
];
};
};
}
)

View file

@ -3,22 +3,24 @@
({
users.users.emv.extraGroups = [
"podman"
# "docker"
# "docker"
];
})
];
sucrose.modules = [
/* ({
virtualisation.docker = {
enable = true;
storageDriver = "btrfs";
daemon.settings = {
userland-proxy = false;
ipv6 = false;
data-root = "/home/emv/docker-data-root/";
/*
({
virtualisation.docker = {
enable = true;
storageDriver = "btrfs";
daemon.settings = {
userland-proxy = false;
ipv6 = false;
data-root = "/home/emv/docker-data-root/";
};
};
};
})*/
})
*/
(
{ pkgs, ... }:
{

View file

@ -15,6 +15,27 @@
};
}
];
personal.home_modules = [
(
{ pkgs, ... }:
{
programs.vscode = {
enable = true;
package = pkgs.vscodium;
mutableExtensionsDir = false;
extensions = with pkgs.vscode-extensions; [
rust-lang.rust-analyzer
tuttieee.emacs-mcx
tamasfe.even-better-toml
vadimcn.vscode-lldb
jnoortheen.nix-ide
mkhl.direnv
matthewpi.caddyfile-support
];
};
}
)
];
personal.modules = [
(
{ pkgs, ... }:

View file

@ -43,7 +43,7 @@ in
{
environment.systemPackages = with pkgs; [ mergerfs ];
hardware.enableRedistributableFirmware = true;
boot.kernelPackages = pkgs.linuxPackages_latest; # hope this doesn't break anything -e
boot.kernelPackages = pkgs.linuxPackages_latest; # hope this doesn't break anything -e
networking.useDHCP = lib.mkDefault true;
}
)

View file

@ -8,7 +8,7 @@
enable = true;
plugins = lib.mkForce [ ]; # networkmanager has a shit ton of vpn plugins by default. which we do not care about because we use wireguard. -e
};
systemd.services.NetworkManager-wait-online.enable = false; ## disable networkmanager's waitonline because it fucks up switches
systemd.services.NetworkManager-wait-online.enable = false; # # disable networkmanager's waitonline because it fucks up switches
networking.usePredictableInterfaceNames = false;
users.users.emv.extraGroups = [ "networkmanager" ];
environment.systemPackages = with pkgs; [

View file

@ -16,7 +16,10 @@
];
fructose.modules = [
{
services.openssh.ports = [ 22 222 ];
services.openssh.ports = [
22
222
];
}
];
personal.home_modules = [

View file

@ -39,11 +39,14 @@
}
];
/*sucrose.modules = [
{
services.tailscale.extraSetFlags = [
"--advertise-exit-node"
];
}
];*/ # this is not needed, currently -e
/*
sucrose.modules = [
{
services.tailscale.extraSetFlags = [
"--advertise-exit-node"
];
}
];
*/
# this is not needed, currently -e
}

View file

@ -97,7 +97,7 @@ in
'';
})
];
# nix.package = pkgs.nix-monitored;
# nix.package = pkgs.nix-monitored;
environment.systemPackages = [ pkgs.nixmon ];
programs.nh.enable = true;
}
@ -179,39 +179,41 @@ in
secretKeyFile = config.sops.secrets.binary-cache-secret.path;
};
/* systemd.timers."auto-update-rebuild" = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "5m";
OnUnitInactiveSec = "1h";
Unit = "auto-update-rebuild.service";
/*
systemd.timers."auto-update-rebuild" = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "5m";
OnUnitInactiveSec = "1h";
Unit = "auto-update-rebuild.service";
};
};
};
systemd.services."auto-update-rebuild" = {
script = ''
mkdir -p /tmp/auto-update-rebuild && cd /tmp/auto-update-rebuild
systemd.services."auto-update-rebuild" = {
script = ''
mkdir -p /tmp/auto-update-rebuild && cd /tmp/auto-update-rebuild
export PATH=${
lib.makeBinPath (
with pkgs;
[
nix
git
coreutils
]
)
}
export PATH=${
lib.makeBinPath (
with pkgs;
[
nix
git
coreutils
]
)
}
nix flake update --flake /home/emv/adyya-flake
'';
nix flake update --flake /home/emv/adyya-flake
'';
serviceConfig = {
Restart = "on-failure";
RestartSec = "15m";
Type = "oneshot";
serviceConfig = {
Restart = "on-failure";
RestartSec = "15m";
Type = "oneshot";
};
};
};*/
*/
}
)
garbage-collection-module

View file

@ -25,7 +25,8 @@
type = "tar.gz";
};
settings = { # this directly drops stuff in the forgejo app.ini
settings = {
# this directly drops stuff in the forgejo app.ini
server = {
DOMAIN = "git.collective-conciousness.monster";
PROTOCOL = "http";

View file

@ -42,8 +42,8 @@
cache.memory-target = "500MiB";
### Web config
# web-template-base-dir = "/var/gts/web/template/";
# web-asset-base-dir = "/var/gts/web/assets/";
# web-template-base-dir = "/var/gts/web/template/";
# web-asset-base-dir = "/var/gts/web/assets/";
### Instance config
instance-languages = [

View file

@ -1,21 +1,29 @@
{
glucose.modules = [
({pkgs, config, lib, ...}: {
services.murmur = {
enable = true;
(
{
pkgs,
config,
lib,
...
}:
{
services.murmur = {
enable = true;
environmentFile = "${config.sops.templates."murmur.env.secrets.yaml".path}";
# the environment variables are provided by, evidently, the environment file.
welcometext = "$MURMUR_WELCOME_MESSAGE";
# registerPassword = "$MURMUR_REGISTRY_PASSWORD"; # removed as we realized we don't actually want it to be a public server.
password = "$MURMUR_LOGIN_PASSWORD";
environmentFile = "${config.sops.templates."murmur.env.secrets.yaml".path}";
# the environment variables are provided by, evidently, the environment file.
welcometext = "$MURMUR_WELCOME_MESSAGE";
# registerPassword = "$MURMUR_REGISTRY_PASSWORD"; # removed as we realized we don't actually want it to be a public server.
password = "$MURMUR_LOGIN_PASSWORD";
port = 64738; # tcp/udp - this is the default but i'm writing it out as to not have to dig into the declaration every time i need to know which port it is.
openFirewall = true; # this is fine since glucose is not public-facing. otherwise i would prefer to do it through `networking`
registerName = "Adyya's cave of hushed tones";
registerUrl = "https://mumble.collective-conciousness.monster";
registerHostname = "mumble.collective-conciousness.mosnter"; # i vaguely know what the difference between these two are but it is a bit strange, i guess.
};
})
port = 64738; # tcp/udp - this is the default but i'm writing it out as to not have to dig into the declaration every time i need to know which port it is.
openFirewall = true; # this is fine since glucose is not public-facing. otherwise i would prefer to do it through `networking`
registerName = "Adyya's cave of hushed tones";
registerUrl = "https://mumble.collective-conciousness.monster";
registerHostname = "mumble.collective-conciousness.mosnter"; # i vaguely know what the difference between these two are but it is a bit strange, i guess.
};
}
)
];
}
}

View file

@ -48,14 +48,17 @@
'';
}
)
({config, ...}:{
sops.secrets.murmur_login_password = { };
sops.secrets.murmur_welcome_message = { };
sops.templates."murmur.env.secrets.yaml".content = ''
MURMUR_LOGIN_PASSWORD="${config.sops.placeholder."murmur_login_password"}"
MURMUR_WELCOME_MESSAGE="${config.sops.placeholder."murmur_welcome_message"}"
'';
})
(
{ config, ... }:
{
sops.secrets.murmur_login_password = { };
sops.secrets.murmur_welcome_message = { };
sops.templates."murmur.env.secrets.yaml".content = ''
MURMUR_LOGIN_PASSWORD="${config.sops.placeholder."murmur_login_password"}"
MURMUR_WELCOME_MESSAGE="${config.sops.placeholder."murmur_welcome_message"}"
'';
}
)
];
fructose.modules = [
(
@ -68,7 +71,8 @@
}
)
(
{config, ...}: {
{ config, ... }:
{
sops.secrets.postgresdb_admin_password = { };
sops.secrets.forgejo_db_pass = { };
sops.templates."postgresdb.env.secrets.yaml".content = ''