Compare commits
99 Commits
b6fa6c1bcf
...
feat/rustf
| Author | SHA1 | Date | |
|---|---|---|---|
| b7dd7f2bf7 | |||
| 90e417525b | |||
| a455789bee | |||
| 2078d6bccd | |||
| 5cbb975c78 | |||
| f2ecd13780 | |||
| ab1bdc9848 | |||
| 1692a34f6e | |||
| 2403e54039 | |||
|
|
3e8c95944c | ||
| fbc555feeb | |||
| 6a5d8f0011 | |||
| 9c3d10836f | |||
| a615ab61e8 | |||
| 193b8c0115 | |||
|
|
f76c4dd5d4 | ||
|
|
05dc6bf608 | ||
| d524864fc3 | |||
|
|
09e2ba8538 | ||
|
|
a427f319d4 | ||
|
|
936eb13794 | ||
|
|
5b0e6cbd5d | ||
|
|
2302810d11 | ||
|
|
25ac47a422 | ||
|
|
e6cfcc346b | ||
|
|
09bc9da6d9 | ||
|
|
eb06533174 | ||
|
|
0d81b0e5e9 | ||
|
|
0ea8b8d2eb | ||
|
|
30a9a23de2 | ||
|
|
6d0149ee6e | ||
|
|
d19b87f8cd | ||
|
|
8f5d076d7b | ||
|
|
3c9a107608 | ||
|
|
cc01c1d0aa | ||
|
|
d59a6b82b6 | ||
|
|
d44bdad73a | ||
|
|
797ffb2b8a | ||
|
|
73bd2b1f2e | ||
|
|
f3749c5679 | ||
|
|
9908b9e335 | ||
|
|
06b430e067 | ||
|
|
1b5bcae686 | ||
|
|
b1eb50a350 | ||
|
|
383f4ef56f | ||
|
|
d47680aef7 | ||
|
|
047b60a6a8 | ||
|
|
382b4c8c98 | ||
| 90fbdfe346 | |||
|
|
7e0d60c95b | ||
| e289698960 | |||
|
|
24e39d19e3 | ||
| 197704ee95 | |||
|
|
53a30c7af3 | ||
|
|
4684c5dc3e | ||
|
|
55aac2c910 | ||
| fa608ae399 | |||
| 717e7b0291 | |||
|
|
40507bb930 | ||
|
|
7bf686481c | ||
|
|
3868f69958 | ||
|
|
ab3332e45b | ||
|
|
c92868308b | ||
|
|
6a58b3656a | ||
|
|
6853bb3063 | ||
|
|
38c27eff1c | ||
|
|
d9d4b6cd85 | ||
|
|
44c0234739 | ||
|
|
4f0a92e43b | ||
|
|
87939ce630 | ||
|
|
1bc1616a4f | ||
|
|
43523cf2d8 | ||
|
|
08baa5ee83 | ||
|
|
114644ce63 | ||
|
|
411c67d2c6 | ||
|
|
e9f20d7dda | ||
|
|
4ae2bb0f48 | ||
|
|
b08be9132b | ||
|
|
e4195230a5 | ||
|
|
674ce6957c | ||
|
|
a9022a4f55 | ||
|
|
fa9747f3e9 | ||
|
|
4920029c65 | ||
|
|
a12958b68f | ||
|
|
2e550b91f5 | ||
|
|
1d3564f360 | ||
|
|
8ead26a791 | ||
|
|
87baf2377f | ||
|
|
7b9caedaa4 | ||
|
|
105e573c53 | ||
|
|
eda9f2a1f9 | ||
|
|
f3536919f0 | ||
|
|
5c0fe5abda | ||
|
|
f80e907277 | ||
|
|
ffed020289 | ||
|
|
a7ac2232ee | ||
|
|
c28c1953d0 | ||
|
|
f7a1591451 | ||
|
|
b6dab69d42 |
86
.beads/.gitignore
vendored
86
.beads/.gitignore
vendored
@@ -1,39 +1,73 @@
|
|||||||
# SQLite databases
|
# Dolt database (managed by Dolt, not git)
|
||||||
*.db
|
dolt/
|
||||||
*.db?*
|
embeddeddolt/
|
||||||
*.db-journal
|
|
||||||
*.db-wal
|
|
||||||
*.db-shm
|
|
||||||
|
|
||||||
# Daemon runtime files
|
# Runtime files
|
||||||
daemon.lock
|
|
||||||
daemon.log
|
|
||||||
daemon.pid
|
|
||||||
bd.sock
|
bd.sock
|
||||||
|
bd.sock.startlock
|
||||||
sync-state.json
|
sync-state.json
|
||||||
last-touched
|
last-touched
|
||||||
|
.exclusive-lock
|
||||||
|
|
||||||
|
# Daemon runtime (lock, log, pid)
|
||||||
|
daemon.*
|
||||||
|
|
||||||
|
# Interactions log (runtime, not versioned)
|
||||||
|
interactions.jsonl
|
||||||
|
|
||||||
|
# Push state (runtime, per-machine)
|
||||||
|
push-state.json
|
||||||
|
|
||||||
|
# Lock files (various runtime locks)
|
||||||
|
*.lock
|
||||||
|
|
||||||
|
# Credential key (encryption key for federation peer auth — never commit)
|
||||||
|
.beads-credential-key
|
||||||
|
|
||||||
# Local version tracking (prevents upgrade notification spam after git ops)
|
# Local version tracking (prevents upgrade notification spam after git ops)
|
||||||
.local_version
|
.local_version
|
||||||
|
|
||||||
# Legacy database files
|
|
||||||
db.sqlite
|
|
||||||
bd.db
|
|
||||||
|
|
||||||
# Worktree redirect file (contains relative path to main repo's .beads/)
|
# Worktree redirect file (contains relative path to main repo's .beads/)
|
||||||
# Must not be committed as paths would be wrong in other clones
|
# Must not be committed as paths would be wrong in other clones
|
||||||
redirect
|
redirect
|
||||||
|
|
||||||
# Merge artifacts (temporary files from 3-way merge)
|
# Sync state (local-only, per-machine)
|
||||||
beads.base.jsonl
|
# These files are machine-specific and should not be shared across clones
|
||||||
beads.base.meta.json
|
.sync.lock
|
||||||
beads.left.jsonl
|
export-state/
|
||||||
beads.left.meta.json
|
export-state.json
|
||||||
beads.right.jsonl
|
|
||||||
beads.right.meta.json
|
|
||||||
|
|
||||||
# NOTE: Do NOT add negation patterns (e.g., !issues.jsonl) here.
|
# Ephemeral store (SQLite - wisps/molecules, intentionally not versioned)
|
||||||
# They would override fork protection in .git/info/exclude, allowing
|
ephemeral.sqlite3
|
||||||
# contributors to accidentally commit upstream issue databases.
|
ephemeral.sqlite3-journal
|
||||||
# The JSONL files (issues.jsonl, interactions.jsonl) and config files
|
ephemeral.sqlite3-wal
|
||||||
# are tracked by git by default since no pattern above ignores them.
|
ephemeral.sqlite3-shm
|
||||||
|
|
||||||
|
# Dolt server management (auto-started by bd)
|
||||||
|
dolt-server.pid
|
||||||
|
dolt-server.log
|
||||||
|
dolt-server.lock
|
||||||
|
dolt-server.port
|
||||||
|
dolt-server.activity
|
||||||
|
|
||||||
|
# Corrupt backup directories (created by bd doctor --fix recovery)
|
||||||
|
*.corrupt.backup/
|
||||||
|
|
||||||
|
# Backup data (auto-exported JSONL, local-only)
|
||||||
|
backup/
|
||||||
|
|
||||||
|
# Per-project environment file (Dolt connection config, GH#2520)
|
||||||
|
.env
|
||||||
|
|
||||||
|
# Legacy files (from pre-Dolt versions)
|
||||||
|
*.db
|
||||||
|
*.db?*
|
||||||
|
*.db-journal
|
||||||
|
*.db-wal
|
||||||
|
*.db-shm
|
||||||
|
db.sqlite
|
||||||
|
bd.db
|
||||||
|
# NOTE: Do NOT add negation patterns here.
|
||||||
|
# They would override fork protection in .git/info/exclude.
|
||||||
|
# Config files (metadata.json, config.yaml) are tracked by git by default
|
||||||
|
# since no pattern above ignores them.
|
||||||
|
|||||||
@@ -23,17 +23,17 @@ bd list
|
|||||||
bd show <issue-id>
|
bd show <issue-id>
|
||||||
|
|
||||||
# Update issue status
|
# Update issue status
|
||||||
bd update <issue-id> --status in_progress
|
bd update <issue-id> --claim
|
||||||
bd update <issue-id> --status done
|
bd update <issue-id> --status done
|
||||||
|
|
||||||
# Sync with git remote
|
# Sync with Dolt remote
|
||||||
bd sync
|
bd dolt push
|
||||||
```
|
```
|
||||||
|
|
||||||
### Working with Issues
|
### Working with Issues
|
||||||
|
|
||||||
Issues in Beads are:
|
Issues in Beads are:
|
||||||
- **Git-native**: Stored in `.beads/issues.jsonl` and synced like code
|
- **Git-native**: Stored in Dolt database with version control and branching
|
||||||
- **AI-friendly**: CLI-first design works perfectly with AI coding agents
|
- **AI-friendly**: CLI-first design works perfectly with AI coding agents
|
||||||
- **Branch-aware**: Issues can follow your branch workflow
|
- **Branch-aware**: Issues can follow your branch workflow
|
||||||
- **Always in sync**: Auto-syncs with your commits
|
- **Always in sync**: Auto-syncs with your commits
|
||||||
@@ -53,7 +53,7 @@ Issues in Beads are:
|
|||||||
🔧 **Git Integration**
|
🔧 **Git Integration**
|
||||||
- Automatic sync with git commits
|
- Automatic sync with git commits
|
||||||
- Branch-aware issue tracking
|
- Branch-aware issue tracking
|
||||||
- Intelligent JSONL merge resolution
|
- Dolt-native three-way merge resolution
|
||||||
|
|
||||||
## Get Started with Beads
|
## Get Started with Beads
|
||||||
|
|
||||||
|
|||||||
56
.beads/config.yaml
Normal file
56
.beads/config.yaml
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
# Beads Configuration File
|
||||||
|
# This file configures default behavior for all bd commands in this repository
|
||||||
|
# All settings can also be set via environment variables (BD_* prefix)
|
||||||
|
# or overridden with command-line flags
|
||||||
|
|
||||||
|
# Issue prefix for this repository (used by bd init)
|
||||||
|
# If not set, bd init will auto-detect from directory name
|
||||||
|
# Example: issue-prefix: "myproject" creates issues like "myproject-1", "myproject-2", etc.
|
||||||
|
# issue-prefix: ""
|
||||||
|
|
||||||
|
# Use no-db mode: JSONL-only, no Dolt database
|
||||||
|
# When true, bd will use .beads/issues.jsonl as the source of truth
|
||||||
|
# no-db: false
|
||||||
|
|
||||||
|
# Enable JSON output by default
|
||||||
|
# json: false
|
||||||
|
|
||||||
|
# Feedback title formatting for mutating commands (create/update/close/dep/edit)
|
||||||
|
# 0 = hide titles, N > 0 = truncate to N characters
|
||||||
|
# output:
|
||||||
|
# title-length: 255
|
||||||
|
|
||||||
|
# Default actor for audit trails (overridden by BEADS_ACTOR or --actor)
|
||||||
|
# actor: ""
|
||||||
|
|
||||||
|
# Export events (audit trail) to .beads/events.jsonl on each flush/sync
|
||||||
|
# When enabled, new events are appended incrementally using a high-water mark.
|
||||||
|
# Use 'bd export --events' to trigger manually regardless of this setting.
|
||||||
|
# events-export: false
|
||||||
|
|
||||||
|
# Multi-repo configuration (experimental - bd-307)
|
||||||
|
# Allows hydrating from multiple repositories and routing writes to the correct database
|
||||||
|
# repos:
|
||||||
|
# primary: "." # Primary repo (where this database lives)
|
||||||
|
# additional: # Additional repos to hydrate from (read-only)
|
||||||
|
# - ~/beads-planning # Personal planning repo
|
||||||
|
# - ~/work-planning # Work planning repo
|
||||||
|
|
||||||
|
# JSONL backup (periodic export for off-machine recovery)
|
||||||
|
# Auto-enabled when a git remote exists. Override explicitly:
|
||||||
|
# backup:
|
||||||
|
# enabled: false # Disable auto-backup entirely
|
||||||
|
# interval: 15m # Minimum time between auto-exports
|
||||||
|
# git-push: false # Disable git push (export locally only)
|
||||||
|
# git-repo: "" # Separate git repo for backups (default: project repo)
|
||||||
|
|
||||||
|
# Integration settings (access with 'bd config get/set')
|
||||||
|
# These are stored in the database, not in this file:
|
||||||
|
# - jira.url
|
||||||
|
# - jira.project
|
||||||
|
# - linear.url
|
||||||
|
# - linear.api-key
|
||||||
|
# - github.org
|
||||||
|
# - github.repo
|
||||||
|
|
||||||
|
sync.remote: "git+ssh://gitea@code.m3ta.dev/m3tam3re/nixos-config.git"
|
||||||
24
.beads/hooks/post-checkout
Executable file
24
.beads/hooks/post-checkout
Executable file
@@ -0,0 +1,24 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
# --- BEGIN BEADS INTEGRATION v1.0.2 ---
|
||||||
|
# This section is managed by beads. Do not remove these markers.
|
||||||
|
if command -v bd >/dev/null 2>&1; then
|
||||||
|
export BD_GIT_HOOK=1
|
||||||
|
_bd_timeout=${BEADS_HOOK_TIMEOUT:-300}
|
||||||
|
if command -v timeout >/dev/null 2>&1; then
|
||||||
|
timeout "$_bd_timeout" bd hooks run post-checkout "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
if [ $_bd_exit -eq 124 ]; then
|
||||||
|
echo >&2 "beads: hook 'post-checkout' timed out after ${_bd_timeout}s — continuing without beads"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
bd hooks run post-checkout "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -eq 3 ]; then
|
||||||
|
echo >&2 "beads: database not initialized — skipping hook 'post-checkout'"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -ne 0 ]; then exit $_bd_exit; fi
|
||||||
|
fi
|
||||||
|
# --- END BEADS INTEGRATION v1.0.2 ---
|
||||||
24
.beads/hooks/post-merge
Executable file
24
.beads/hooks/post-merge
Executable file
@@ -0,0 +1,24 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
# --- BEGIN BEADS INTEGRATION v1.0.2 ---
|
||||||
|
# This section is managed by beads. Do not remove these markers.
|
||||||
|
if command -v bd >/dev/null 2>&1; then
|
||||||
|
export BD_GIT_HOOK=1
|
||||||
|
_bd_timeout=${BEADS_HOOK_TIMEOUT:-300}
|
||||||
|
if command -v timeout >/dev/null 2>&1; then
|
||||||
|
timeout "$_bd_timeout" bd hooks run post-merge "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
if [ $_bd_exit -eq 124 ]; then
|
||||||
|
echo >&2 "beads: hook 'post-merge' timed out after ${_bd_timeout}s — continuing without beads"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
bd hooks run post-merge "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -eq 3 ]; then
|
||||||
|
echo >&2 "beads: database not initialized — skipping hook 'post-merge'"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -ne 0 ]; then exit $_bd_exit; fi
|
||||||
|
fi
|
||||||
|
# --- END BEADS INTEGRATION v1.0.2 ---
|
||||||
24
.beads/hooks/pre-commit
Executable file
24
.beads/hooks/pre-commit
Executable file
@@ -0,0 +1,24 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
# --- BEGIN BEADS INTEGRATION v1.0.2 ---
|
||||||
|
# This section is managed by beads. Do not remove these markers.
|
||||||
|
if command -v bd >/dev/null 2>&1; then
|
||||||
|
export BD_GIT_HOOK=1
|
||||||
|
_bd_timeout=${BEADS_HOOK_TIMEOUT:-300}
|
||||||
|
if command -v timeout >/dev/null 2>&1; then
|
||||||
|
timeout "$_bd_timeout" bd hooks run pre-commit "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
if [ $_bd_exit -eq 124 ]; then
|
||||||
|
echo >&2 "beads: hook 'pre-commit' timed out after ${_bd_timeout}s — continuing without beads"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
bd hooks run pre-commit "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -eq 3 ]; then
|
||||||
|
echo >&2 "beads: database not initialized — skipping hook 'pre-commit'"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -ne 0 ]; then exit $_bd_exit; fi
|
||||||
|
fi
|
||||||
|
# --- END BEADS INTEGRATION v1.0.2 ---
|
||||||
24
.beads/hooks/pre-push
Executable file
24
.beads/hooks/pre-push
Executable file
@@ -0,0 +1,24 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
# --- BEGIN BEADS INTEGRATION v1.0.2 ---
|
||||||
|
# This section is managed by beads. Do not remove these markers.
|
||||||
|
if command -v bd >/dev/null 2>&1; then
|
||||||
|
export BD_GIT_HOOK=1
|
||||||
|
_bd_timeout=${BEADS_HOOK_TIMEOUT:-300}
|
||||||
|
if command -v timeout >/dev/null 2>&1; then
|
||||||
|
timeout "$_bd_timeout" bd hooks run pre-push "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
if [ $_bd_exit -eq 124 ]; then
|
||||||
|
echo >&2 "beads: hook 'pre-push' timed out after ${_bd_timeout}s — continuing without beads"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
bd hooks run pre-push "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -eq 3 ]; then
|
||||||
|
echo >&2 "beads: database not initialized — skipping hook 'pre-push'"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -ne 0 ]; then exit $_bd_exit; fi
|
||||||
|
fi
|
||||||
|
# --- END BEADS INTEGRATION v1.0.2 ---
|
||||||
24
.beads/hooks/prepare-commit-msg
Executable file
24
.beads/hooks/prepare-commit-msg
Executable file
@@ -0,0 +1,24 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
# --- BEGIN BEADS INTEGRATION v1.0.2 ---
|
||||||
|
# This section is managed by beads. Do not remove these markers.
|
||||||
|
if command -v bd >/dev/null 2>&1; then
|
||||||
|
export BD_GIT_HOOK=1
|
||||||
|
_bd_timeout=${BEADS_HOOK_TIMEOUT:-300}
|
||||||
|
if command -v timeout >/dev/null 2>&1; then
|
||||||
|
timeout "$_bd_timeout" bd hooks run prepare-commit-msg "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
if [ $_bd_exit -eq 124 ]; then
|
||||||
|
echo >&2 "beads: hook 'prepare-commit-msg' timed out after ${_bd_timeout}s — continuing without beads"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
bd hooks run prepare-commit-msg "$@"
|
||||||
|
_bd_exit=$?
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -eq 3 ]; then
|
||||||
|
echo >&2 "beads: database not initialized — skipping hook 'prepare-commit-msg'"
|
||||||
|
_bd_exit=0
|
||||||
|
fi
|
||||||
|
if [ $_bd_exit -ne 0 ]; then exit $_bd_exit; fi
|
||||||
|
fi
|
||||||
|
# --- END BEADS INTEGRATION v1.0.2 ---
|
||||||
@@ -1,2 +1,3 @@
|
|||||||
{"id":"nixos-config-gx2","title":"form","status":"tombstone","priority":2,"issue_type":"task","created_at":"2026-01-11T11:49:21.688289476+01:00","created_by":"m3tam3re","updated_at":"2026-01-11T11:51:36.426124223+01:00","deleted_at":"2026-01-11T11:51:36.426124223+01:00","deleted_by":"daemon","delete_reason":"delete","original_type":"task"}
|
{"id":"home-profile-restructuring-edz","title":"Create copy-hermes-skills systemd service","status":"closed","priority":1,"issue_type":"task","assignee":"m3tm3re","owner":"p@m3ta.dev","estimated_minutes":1,"created_at":"2026-04-26T12:30:10Z","created_by":"m3tm3re","updated_at":"2026-04-26T12:44:42Z","started_at":"2026-04-26T12:36:30Z","closed_at":"2026-04-26T12:44:42Z","close_reason":"Created systemd service in hosts/m3-hermes/services/hermes-agent.nix - copies skills to /var/lib/hermes/.agents/skills before hermes-agent starts","labels":["hermes-agent","nixos"],"dependencies":[{"issue_id":"home-profile-restructuring-edz","depends_on_id":"home-profile-restructuring-ycz","type":"blocks","created_at":"2026-04-26T14:30:57Z","created_by":"m3tm3re","metadata":"{}"}],"dependency_count":1,"dependent_count":1,"comment_count":0}
|
||||||
{"id":"nixos-config-n4l","title":"Create Gitea action for nix-update package updates","description":"Create a Gitea action to automatically update packages in this nixos-config repository using nix-update.\n\n**Context:**\n- Gitea instance is already running on m3-atlas at code.m3ta.dev (configured in hosts/m3-atlas/services/gitea.nix)\n- The repository is self-hosted on this Gitea instance\n- nix-update is already referenced in home/features/cli/default.nix\n- Currently no Gitea workflows exist (.gitea/ directory does not exist)\n\n**Goal:**\nAutomate package updates by creating a Gitea Actions workflow that:\n1. Runs nix-update periodically (e.g., weekly or on schedule)\n2. Updates package definitions in pkgs/ directory\n3. Creates pull requests with the updates\n4. Uses appropriate secrets/credentials for the Gitea instance\n\n**Requirements:**\n- Create .gitea/workflows/ directory structure\n- Define workflow file with nix-update command\n- Configure triggers (schedule, manual, or on repository events)\n- Set up proper permissions and secrets\n- Test the workflow execution\n\n**Current Repository State:**\n- pkgs/default.nix exists but is minimal (currently just a comment)\n- Multiple nixpkgs inputs are used (unstable, 25.11, locked, master)\n- Custom m3ta-nixpkgs overlay at code.m3ta.dev/m3tam3re/nixpkgs\n- Uses agenix for secrets management\n\n**Related Files:**\n- hosts/m3-atlas/services/gitea.nix (existing Gitea configuration)\n- hosts/common/ports.nix (port management)\n- home/features/cli/default.nix (nix-update reference)\n\n**Acceptance Criteria:**\n- [ ] Create .gitea/workflows directory\n- [ ] Implement nix-update workflow YAML\n- [ ] Configure appropriate triggers\n- [ ] Test workflow on the repository\n- [ ] Document setup and configuration","status":"closed","priority":2,"issue_type":"feature","owner":"p@m3ta.dev","created_at":"2026-01-13T20:39:49.838916335+01:00","created_by":"m3tm3re","updated_at":"2026-01-13T20:51:43.833041989+01:00","closed_at":"2026-01-13T20:51:43.833041989+01:00","close_reason":"Closed"}
|
{"id":"home-profile-restructuring-ycz","title":"Build hermes-agent skills using mkOpencodeSkills","status":"closed","priority":1,"issue_type":"task","assignee":"m3tm3re","owner":"p@m3ta.dev","estimated_minutes":2,"created_at":"2026-04-26T12:30:09Z","created_by":"m3tm3re","updated_at":"2026-04-26T12:35:15Z","started_at":"2026-04-26T12:31:35Z","closed_at":"2026-04-26T12:35:15Z","close_reason":"Added inputs to module signature and defined hermesSkills via inputs.agents.lib.mkOpencodeSkills with basecamp, anthropic, and kestra external skills. Verified with nixos-rebuild dry-run --flake .#m3-hermes (no errors).","labels":["hermes-agent","nixos"],"dependency_count":0,"dependent_count":1,"comment_count":0}
|
||||||
|
{"id":"home-profile-restructuring-cxa","title":"Verify skills available at /var/lib/hermes/.agents/skills","status":"closed","priority":2,"issue_type":"task","assignee":"m3tm3re","owner":"p@m3ta.dev","estimated_minutes":1,"created_at":"2026-04-26T12:30:10Z","created_by":"m3tm3re","updated_at":"2026-04-26T12:50:58Z","started_at":"2026-04-26T12:38:15Z","closed_at":"2026-04-26T12:50:58Z","close_reason":"Manually verified - skills are present at /var/lib/hermes/.agents/skills on m3-hermes","labels":["hermes-agent","testing"],"dependencies":[{"issue_id":"home-profile-restructuring-cxa","depends_on_id":"home-profile-restructuring-edz","type":"blocks","created_at":"2026-04-26T14:30:57Z","created_by":"m3tm3re","metadata":"{}"}],"dependency_count":1,"dependent_count":0,"comment_count":0}
|
||||||
|
|||||||
@@ -1,4 +1,7 @@
|
|||||||
{
|
{
|
||||||
"database": "beads.db",
|
"database": "dolt",
|
||||||
"jsonl_export": "issues.jsonl"
|
"backend": "dolt",
|
||||||
|
"dolt_mode": "embedded",
|
||||||
|
"dolt_database": "home_profile_restructuring",
|
||||||
|
"project_id": "664fc7e3-94eb-4874-aab6-e47835abe9d8"
|
||||||
}
|
}
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
{"id":"nixos-config-gx2","title":"form","status":"tombstone","priority":2,"issue_type":"task","created_at":"2026-01-11T11:49:21.688289476+01:00","created_by":"m3tam3re","updated_at":"2026-01-11T11:51:36.426124223+01:00","deleted_at":"2026-01-11T11:51:36.426124223+01:00","deleted_by":"daemon","delete_reason":"delete","original_type":"task"}
|
|
||||||
{"id":"nixos-config-n4l","title":"Create Gitea action for nix-update package updates","description":"Create a Gitea action to automatically update packages in this nixos-config repository using nix-update.\n\n**Context:**\n- Gitea instance is already running on m3-atlas at code.m3ta.dev (configured in hosts/m3-atlas/services/gitea.nix)\n- The repository is self-hosted on this Gitea instance\n- nix-update is already referenced in home/features/cli/default.nix\n- Currently no Gitea workflows exist (.gitea/ directory does not exist)\n\n**Goal:**\nAutomate package updates by creating a Gitea Actions workflow that:\n1. Runs nix-update periodically (e.g., weekly or on schedule)\n2. Updates package definitions in pkgs/ directory\n3. Creates pull requests with the updates\n4. Uses appropriate secrets/credentials for the Gitea instance\n\n**Requirements:**\n- Create .gitea/workflows/ directory structure\n- Define workflow file with nix-update command\n- Configure triggers (schedule, manual, or on repository events)\n- Set up proper permissions and secrets\n- Test the workflow execution\n\n**Current Repository State:**\n- pkgs/default.nix exists but is minimal (currently just a comment)\n- Multiple nixpkgs inputs are used (unstable, 25.11, locked, master)\n- Custom m3ta-nixpkgs overlay at code.m3ta.dev/m3tam3re/nixpkgs\n- Uses agenix for secrets management\n\n**Related Files:**\n- hosts/m3-atlas/services/gitea.nix (existing Gitea configuration)\n- hosts/common/ports.nix (port management)\n- home/features/cli/default.nix (nix-update reference)\n\n**Acceptance Criteria:**\n- [ ] Create .gitea/workflows directory\n- [ ] Implement nix-update workflow YAML\n- [ ] Configure appropriate triggers\n- [ ] Test workflow on the repository\n- [ ] Document setup and configuration","status":"closed","priority":2,"issue_type":"feature","owner":"p@m3ta.dev","created_at":"2026-01-13T20:39:49.838916335+01:00","created_by":"m3tm3re","updated_at":"2026-01-13T20:51:43.833041989+01:00","closed_at":"2026-01-13T20:51:43.833041989+01:00","close_reason":"Closed"}
|
|
||||||
46
.gitignore
vendored
Normal file
46
.gitignore
vendored
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
# Sisyphus work session data
|
||||||
|
.sisyphus/
|
||||||
|
|
||||||
|
# Editor files
|
||||||
|
*~
|
||||||
|
.*.swp
|
||||||
|
.*.swo
|
||||||
|
.*.swx
|
||||||
|
|
||||||
|
# Build artifacts
|
||||||
|
result
|
||||||
|
result-*
|
||||||
|
.direnv/
|
||||||
|
|
||||||
|
# IDE
|
||||||
|
.vscode/
|
||||||
|
.idea/
|
||||||
|
*.iml
|
||||||
|
|
||||||
|
# OS
|
||||||
|
.DS_Store
|
||||||
|
Thumbs.db
|
||||||
|
|
||||||
|
# Opencode rules
|
||||||
|
.opencode-rules
|
||||||
|
opencode.json
|
||||||
|
|
||||||
|
# AI agent state
|
||||||
|
.sidecar/
|
||||||
|
.sidecar-*
|
||||||
|
.sisyphus/
|
||||||
|
.sidecar-agent
|
||||||
|
.sidecar-task
|
||||||
|
.sidecar-pr
|
||||||
|
.sidecar-start.sh
|
||||||
|
.sidecar-base
|
||||||
|
.td-root
|
||||||
|
.cache
|
||||||
|
.pi*
|
||||||
|
.worktrees/
|
||||||
|
docs/plans/
|
||||||
|
|
||||||
|
# Beads / Dolt files (added by bd init)
|
||||||
|
.dolt/
|
||||||
|
*.db
|
||||||
|
.beads-credential-key
|
||||||
562
AGENTS.md
562
AGENTS.md
@@ -1,157 +1,445 @@
|
|||||||
# NIXOS CONFIGURATION KNOWLEDGE BASE
|
# Agent Instructions
|
||||||
|
|
||||||
**Generated:** 2025-12-31 16:13:40 UTC
|
This project uses **bd** (beads) for issue tracking. Run `bd prime` for full workflow context.
|
||||||
**Commit:** ebc8291
|
|
||||||
**Branch:** HEAD
|
|
||||||
|
|
||||||
## OVERVIEW
|
## Quick Reference
|
||||||
Personal NixOS configuration managing 6 hosts (4 servers, 2 desktops) using flakes, agenix secrets, and feature-based home-manager setup.
|
|
||||||
|
|
||||||
## STRUCTURE
|
|
||||||
```
|
|
||||||
./
|
|
||||||
├── flake.nix # Main entry: host definitions, inputs, outputs
|
|
||||||
├── secrets.nix # Agenix public key mappings
|
|
||||||
├── hosts/
|
|
||||||
│ ├── common/ # Shared: base config, users, extraServices, ports
|
|
||||||
│ ├── m3-atlas/ # Server: 20+ containerized services with Traefik
|
|
||||||
│ ├── m3-helios/ # Server: AdGuard, internal routing
|
|
||||||
│ ├── m3-ares/ # Desktop: NVIDIA GPU, Btrfs
|
|
||||||
│ ├── m3-kratos/ # Desktop: AMD GPU, ZFS
|
|
||||||
│ └── m3-aether/ # Cloud VM
|
|
||||||
├── home/
|
|
||||||
│ ├── common/ # Home-manager base config
|
|
||||||
│ ├── features/ # Modular feature toggles (cli, desktop, coding)
|
|
||||||
│ └── m3tam3re/ # Per-host user configs
|
|
||||||
├── modules/ # Custom NixOS/home-manager modules
|
|
||||||
├── overlays/ # Package overlays (stable, locked, pinned, master)
|
|
||||||
├── pkgs/ # Custom package definitions
|
|
||||||
└── secrets/ # Agenix encrypted .age files (19 secrets)
|
|
||||||
```
|
|
||||||
|
|
||||||
## WHERE TO LOOK
|
|
||||||
|
|
||||||
| Task | Location | Notes |
|
|
||||||
|------|----------|-------|
|
|
||||||
| Add new host | `flake.nix` + `hosts/<name>/` | Copy template from m3-atlas (server) or m3-ares (desktop) |
|
|
||||||
| Add service to m3-atlas | `hosts/m3-atlas/services/` | See containers/ for Podman + Traefik pattern |
|
|
||||||
| Configure desktop features | `home/features/desktop/` | Feature toggles with mkEnableOption |
|
|
||||||
| Add CLI tool | `home/features/cli/` | Fish + Nushell integration expected |
|
|
||||||
| Manage secrets | `secrets.nix` + `agenix -e` | SSH keys defined in secrets.nix |
|
|
||||||
| Define ports | `hosts/common/ports.nix` | Centralized port registry |
|
|
||||||
| Add user | `hosts/common/users/` | Shared across all hosts |
|
|
||||||
| Custom packages | `pkgs/default.nix` | Exposed via flake outputs |
|
|
||||||
|
|
||||||
## CONVENTIONS
|
|
||||||
|
|
||||||
### Secrets (agenix)
|
|
||||||
- **Create**: `agenix -e secrets/<name>.age` after adding keys to `secrets.nix`
|
|
||||||
- **Reference**: `config.age.secrets.<name>.path` in service configs
|
|
||||||
- **Pattern**: Service env files use `environmentFiles = [config.age.secrets.<service>-env.path]`
|
|
||||||
|
|
||||||
### Service Organization
|
|
||||||
- **Native services**: `hosts/<host>/services/<service>.nix`
|
|
||||||
- **Containers**: `hosts/<host>/services/containers/<service>.nix`
|
|
||||||
- **Traefik integration**: All m3-atlas services include dynamic config for SSL + routing
|
|
||||||
- **Networking**: Containers use dedicated `web` network (10.89.0.0/24) with static IPs
|
|
||||||
|
|
||||||
### Port Management
|
|
||||||
- **Registry**: All ports defined in `hosts/common/ports.nix`
|
|
||||||
- **Access**: `config.m3ta.ports.get "service-name"`
|
|
||||||
- **Convention**: Internal services use 3000-3020 range
|
|
||||||
|
|
||||||
### Home-Manager Features
|
|
||||||
- **Enable**: `features.<category>.<feature>.enable = true` in user config
|
|
||||||
- **Categories**: `cli`, `desktop`, `coding`
|
|
||||||
- **Pattern**: Features are opt-in modules with default.nix aggregators
|
|
||||||
|
|
||||||
### Multiple nixpkgs Inputs
|
|
||||||
- **stable**: 25.11 release
|
|
||||||
- **locked/pinned**: Specific commits for compatibility
|
|
||||||
- **master**: Bleeding edge
|
|
||||||
- **m3ta-nixpkgs**: Custom local overlay at `path:/home/m3tam3re/p/nix/nixpkgs`
|
|
||||||
|
|
||||||
## COMMANDS
|
|
||||||
```bash
|
```bash
|
||||||
# Build/deploy specific host
|
bd ready # Find available work
|
||||||
sudo nixos-rebuild switch --flake .#m3-ares
|
bd show <id> # View issue details
|
||||||
|
bd update <id> --claim # Claim work atomically
|
||||||
# Build/deploy current host
|
bd close <id> # Complete work
|
||||||
sudo nixos-rebuild switch --flake .#$(uname -n)
|
bd dolt push # Push beads data to remote
|
||||||
|
|
||||||
# Home-manager update
|
|
||||||
home-manager --flake . switch
|
|
||||||
|
|
||||||
# Update all flake inputs
|
|
||||||
nix flake update
|
|
||||||
|
|
||||||
# Add/edit secret
|
|
||||||
agenix -e secrets/<name>.age
|
|
||||||
|
|
||||||
# Infrastructure shell (OpenTofu)
|
|
||||||
nix develop .#infraShell
|
|
||||||
|
|
||||||
# Check configuration (no activation)
|
|
||||||
nixos-rebuild dry-build --flake .#<hostname>
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## TRAEFIK PATTERNS (m3-atlas only)
|
## Non-Interactive Shell Commands
|
||||||
|
|
||||||
### SSL Termination
|
**ALWAYS use non-interactive flags** with file operations to avoid hanging on confirmation prompts.
|
||||||
- **Provider**: Godaddy DNS challenge
|
|
||||||
- **Cert storage**: `/var/lib/traefik/acme.json`
|
Shell commands like `cp`, `mv`, and `rm` may be aliased to include `-i` (interactive) mode on some systems, causing the agent to hang indefinitely waiting for y/n input.
|
||||||
- **Config**: `hosts/m3-atlas/services/traefik.nix`
|
|
||||||
|
**Use these forms instead:**
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Force overwrite without prompting
|
||||||
|
cp -f source dest # NOT: cp source dest
|
||||||
|
mv -f source dest # NOT: mv source dest
|
||||||
|
rm -f file # NOT: rm file
|
||||||
|
|
||||||
|
# For recursive operations
|
||||||
|
rm -rf directory # NOT: rm -r directory
|
||||||
|
cp -rf source dest # NOT: cp -r source dest
|
||||||
|
```
|
||||||
|
|
||||||
|
**Other commands that may prompt:**
|
||||||
|
|
||||||
|
- `scp` - use `-o BatchMode=yes` for non-interactive
|
||||||
|
- `ssh` - use `-o BatchMode=yes` to fail instead of prompting
|
||||||
|
- `apt-get` - use `-y` flag
|
||||||
|
- `brew` - use `HOMEBREW_NO_AUTO_UPDATE=1` env var
|
||||||
|
|
||||||
|
<!-- BEGIN BEADS INTEGRATION v:1 profile:minimal hash:ca08a54f -->
|
||||||
|
|
||||||
|
## Beads Issue Tracker
|
||||||
|
|
||||||
|
This project uses **bd (beads)** for persistent task tracking. Run `bd prime` for full workflow context.
|
||||||
|
|
||||||
|
### Why Beads?
|
||||||
|
|
||||||
|
- **Prefer Beads over ad-hoc markdown TODO lists** — Beads provides structured, queryable, shareable issue tracking with dependency management
|
||||||
|
- **Never use `bd edit`** — it opens an interactive editor which blocks agent workflows
|
||||||
|
- **Use flags and stdin instead** — `bd update <id> --claim`, `bd create --title "..." --estimate 2`
|
||||||
|
|
||||||
|
### Slash Commands (Agent Workflow)
|
||||||
|
|
||||||
|
| Command | Purpose |
|
||||||
|
|---------|---------|
|
||||||
|
| `/beads:ready` | Find unblocked issues |
|
||||||
|
| `/beads:create` | Create a new issue |
|
||||||
|
| `/beads:update` | Update an issue (claim, status) |
|
||||||
|
| `/beads:close` | Close completed work |
|
||||||
|
| `/beads:stats` | Project-level snapshot |
|
||||||
|
|
||||||
|
### Core Workflow (6 Steps)
|
||||||
|
|
||||||
|
#### 1. Find Unblocked Work
|
||||||
|
```bash
|
||||||
|
bd ready --json
|
||||||
|
```
|
||||||
|
Lists issues with no blocking dependencies that are ready to work on.
|
||||||
|
|
||||||
|
#### 2. Claim Work
|
||||||
|
```bash
|
||||||
|
bd update <id> --claim
|
||||||
|
```
|
||||||
|
Atomically assigns the issue to you (sets status to "in-progress").
|
||||||
|
|
||||||
|
#### 3. Inspect Details
|
||||||
|
```bash
|
||||||
|
bd show <id>
|
||||||
|
```
|
||||||
|
View full issue details including:
|
||||||
|
- Description and acceptance criteria
|
||||||
|
- Blocking/blocked-by dependencies
|
||||||
|
- Time estimates
|
||||||
|
- Status history
|
||||||
|
|
||||||
|
#### 4. Create Newly Discovered Work
|
||||||
|
```bash
|
||||||
|
# Create a new issue
|
||||||
|
bd create \
|
||||||
|
--title "Fix audio on m3-helios" \
|
||||||
|
--estimate 2 \
|
||||||
|
--priority high \
|
||||||
|
--labels nixos,audio
|
||||||
|
|
||||||
|
# Link dependencies
|
||||||
|
bd dep <id> --blocks <blocked-id> # This issue blocks another
|
||||||
|
bd dep <id> --after <after-id> # This issue after another completes
|
||||||
|
bd dep <id> --requires <requires-id> # This issue requires another
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 5. Complete Work
|
||||||
|
```bash
|
||||||
|
bd close <id> --reason "Added PulseAudio fallback to configuration.nix"
|
||||||
|
```
|
||||||
|
Provide a concise summary of what was done. The `--reason` is mandatory.
|
||||||
|
|
||||||
|
#### 6. Project Snapshot
|
||||||
|
```bash
|
||||||
|
bd status --json # Current state of all issues
|
||||||
|
bd stats # Metrics: velocity, cycle time, bottlenecks
|
||||||
|
```
|
||||||
|
|
||||||
|
### Example Complete Workflow
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Start session - find work
|
||||||
|
bd ready --json
|
||||||
|
|
||||||
|
# Claim available issue
|
||||||
|
bd update 42 --claim
|
||||||
|
|
||||||
|
# Do the work...
|
||||||
|
|
||||||
|
# Discover something else needed
|
||||||
|
bd create --title "Document hermes-agent setup" --estimate 1
|
||||||
|
# Link as related
|
||||||
|
bd dep 43 --after 42
|
||||||
|
|
||||||
|
# Complete original
|
||||||
|
bd close 42 --reason "Added Hyprland idle timeout config"
|
||||||
|
|
||||||
|
# Close related
|
||||||
|
bd close 43 --reason "Added setup docs to AGENTS.md"
|
||||||
|
|
||||||
|
# Push state to remote
|
||||||
|
bd dolt push
|
||||||
|
```
|
||||||
|
|
||||||
|
### Rules
|
||||||
|
|
||||||
|
- Use `bd` for ALL task tracking — do NOT use TodoWrite, TaskCreate, or markdown TODO lists
|
||||||
|
- Run `bd prime` for detailed command reference and session close protocol
|
||||||
|
- Use `bd remember` for persistent knowledge — do NOT use MEMORY.md files
|
||||||
|
|
||||||
|
## Session Completion
|
||||||
|
|
||||||
|
**When ending a work session**, you MUST complete ALL steps below. Work is NOT complete until `git push` succeeds.
|
||||||
|
|
||||||
|
**MANDATORY WORKFLOW:**
|
||||||
|
|
||||||
|
1. **File issues for remaining work** - Create issues for anything that needs follow-up
|
||||||
|
2. **Run quality gates** (if code changed) - Tests, linters, builds
|
||||||
|
3. **Update issue status** - Close finished work, update in-progress items
|
||||||
|
4. **PUSH TO REMOTE** - This is MANDATORY:
|
||||||
|
```bash
|
||||||
|
git pull --rebase
|
||||||
|
bd dolt push
|
||||||
|
git push
|
||||||
|
git status # MUST show "up to date with origin"
|
||||||
|
```
|
||||||
|
5. **Clean up** - Clear stashes, prune remote branches
|
||||||
|
6. **Verify** - All changes committed AND pushed
|
||||||
|
7. **Hand off** - Provide context for next session
|
||||||
|
|
||||||
|
**CRITICAL RULES:**
|
||||||
|
|
||||||
|
- Work is NOT complete until `git push` succeeds
|
||||||
|
- NEVER stop before pushing - that leaves work stranded locally
|
||||||
|
- NEVER say "ready to push when you are" - YOU must push
|
||||||
|
- If push fails, resolve and retry until it succeeds
|
||||||
|
<!-- END BEADS INTEGRATION -->
|
||||||
|
|
||||||
|
# Project Agent
|
||||||
|
|
||||||
|
**Workspace Path:** `/home/m3tam3re/p/NIX/nixos-config`
|
||||||
|
_(Note to Pi: Your file write/edit tools run in a different directory by default. You MUST use absolute paths starting with the Workspace Path above for ALL file operations!)_
|
||||||
|
|
||||||
|
**Generated:** 2026-04-26
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Stack
|
||||||
|
|
||||||
|
| Component | Version/Source |
|
||||||
|
| ---------------- | --------------------------------- |
|
||||||
|
| **Nixpkgs** | nixos-unstable + 25.05 stable |
|
||||||
|
| **Home Manager** | github:nix-community/home-manager |
|
||||||
|
| **m3ta-home** | code.m3ta.dev/m3tam3re/m3ta-home |
|
||||||
|
| **m3ta-nixpkgs** | code.m3ta.dev/m3tam3re/nixpkgs |
|
||||||
|
| **Agenix** | github:ryantm/agenix |
|
||||||
|
| **Disko** | github:nix-community/disko |
|
||||||
|
| **NUR** | github:nix-community/NUR |
|
||||||
|
| **Formatter** | alejandra |
|
||||||
|
| **Linters** | statix, deadnix |
|
||||||
|
| **IDE** | nixd |
|
||||||
|
| **Hermes Agent** | NousResearch/hermes-agent |
|
||||||
|
| **LLM Agents** | numtide/llm-agents.nix |
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Structure
|
||||||
|
|
||||||
|
```
|
||||||
|
nixos-config/
|
||||||
|
├── flake.nix # Entry point: hosts, overlays, dev shells, m3ta-home input
|
||||||
|
├── coding-rules.json # Opencode rules configuration
|
||||||
|
│
|
||||||
|
├── hosts/ # Per-host NixOS configurations
|
||||||
|
│ ├── common/ # Shared across all hosts
|
||||||
|
│ │ ├── users/
|
||||||
|
│ │ │ └── m3tam3re.nix # ← Central user + m3ta-home integration
|
||||||
|
│ │ ├── default.nix # Shared NixOS settings, overlays, home-manager setup
|
||||||
|
│ │ ├── ports.nix # Network ports config
|
||||||
|
│ │ └── extraServices/ # Common service toggles
|
||||||
|
│ ├── m3-ares/ # TUXEDO laptop (desktop)
|
||||||
|
│ │ └── home.nix # Hyprland: eDP-1 + HDMI, XDG/MIME
|
||||||
|
│ ├── m3-kratos/ # AMD desktop (desktop)
|
||||||
|
│ │ └── home.nix # Hyprland: dual DP, XDG/MIME
|
||||||
|
│ ├── m3-daedalus/ # Portable laptop (desktop, no Hyprland)
|
||||||
|
│ │ └── home.nix # XDG/MIME only
|
||||||
|
│ ├── m3-atlas/ # Primary server (server + coding)
|
||||||
|
│ ├── m3-helios/ # AdGuard DNS server (minimal server)
|
||||||
|
│ ├── m3-hermes/ # Secondary server (minimal server)
|
||||||
|
│ └── m3-aether/ # Cloud VM (minimal server)
|
||||||
|
│
|
||||||
|
├── modules/ # Reusable NixOS modules
|
||||||
|
│ └── nixos/ # NixOS-specific modules
|
||||||
|
│
|
||||||
|
├── overlays/ # Package overlays (stable/locked/master/pinned)
|
||||||
|
│ ├── default.nix
|
||||||
|
│ └── mods/
|
||||||
|
│
|
||||||
|
├── pkgs/ # Custom packages
|
||||||
|
│
|
||||||
|
├── secrets/ # Encrypted secrets (agenix)
|
||||||
|
│ └── secrets.nix
|
||||||
|
│
|
||||||
|
├── .opencode-rules/ # Opencode AI rules
|
||||||
|
│ ├── concerns/
|
||||||
|
│ ├── languages/nix.md
|
||||||
|
│ └── USAGE.md
|
||||||
|
│
|
||||||
|
└── .pi/ # Agent configuration
|
||||||
|
```
|
||||||
|
|
||||||
|
### Home-Manager Integration
|
||||||
|
|
||||||
|
Home-Manager configs are managed centrally in the **`m3ta-home`** repository:
|
||||||
|
- **Repo**: `code.m3ta.dev/m3tam3re/m3ta-home`
|
||||||
|
- **Docs**: See m3ta-home README for full documentation
|
||||||
|
|
||||||
|
What lives where:
|
||||||
|
|
||||||
|
| Concern | Location | Why |
|
||||||
|
|---------|----------|-----|
|
||||||
|
| Shell, CLI tools, editors, apps | `m3ta-home/profiles/` | Portable across all hosts |
|
||||||
|
| User identity (git, SSH, JJ) | `m3ta-home/users/` | Switchable: private vs work |
|
||||||
|
| Feature flags (enable/disable) | `nixos-config/hosts/common/users/m3tam3re.nix` | Per-host decisions |
|
||||||
|
| Monitor layouts, window rules | `nixos-config/hosts/<name>/home.nix` | Hardware-specific |
|
||||||
|
| XDG/MIME defaults | `nixos-config/hosts/<name>/home.nix` | Host-specific preferences |
|
||||||
|
| NixOS overlays | `nixos-config/overlays/` | System-level package management |
|
||||||
|
|
||||||
|
#### Host → Profile Mapping
|
||||||
|
|
||||||
|
Defined in `hosts/common/users/m3tam3re.nix`:
|
||||||
|
|
||||||
### Service Integration Template
|
|
||||||
```nix
|
```nix
|
||||||
services.traefik.dynamicConfigOptions.http = {
|
hostProfiles = {
|
||||||
services.<name>.loadBalancer.servers = [{ url = "http://127.0.0.1:<port>"; }];
|
# Desktop hosts
|
||||||
routers.<name> = {
|
m3-ares = { context = "desktop"; sets = ["coding" "gaming" "media"]; };
|
||||||
rule = "Host(`<subdomain>.m3ta.dev`)";
|
m3-kratos = { context = "desktop"; sets = ["coding" "gaming" "media"]; };
|
||||||
service = "<name>";
|
m3-daedalus = { context = "desktop"; sets = ["coding" "media"]; };
|
||||||
tls.certResolver = "godaddy";
|
# Server hosts
|
||||||
};
|
m3-atlas = { context = "server"; sets = ["coding"]; };
|
||||||
|
m3-helios = { context = "server"; sets = []; };
|
||||||
|
m3-hermes = { context = "server"; sets = []; };
|
||||||
|
m3-aether = { context = "server"; sets = []; };
|
||||||
};
|
};
|
||||||
```
|
```
|
||||||
|
|
||||||
### Container Pattern
|
#### Work Identity Use Case
|
||||||
- **Network**: `--network=web --ip=10.89.0.<sequential>`
|
|
||||||
- **Ports**: Bind localhost only (`127.0.0.1:<external>:<internal>`)
|
|
||||||
- **Database access**: `--add-host=mysql:10.89.0.1` (gateway IP)
|
|
||||||
|
|
||||||
## HOST ROLES
|
The same `m3ta-home` repo supports a **work identity** for company machines:
|
||||||
|
|
||||||
| Host | Type | Hardware | Purpose |
|
```nix
|
||||||
|------|------|----------|---------|
|
# On a work NixOS machine:
|
||||||
| m3-atlas | Server | x86_64, disko | 20+ services, Traefik hub, PostgreSQL, MySQL |
|
(m3ta-lib.mkHome {
|
||||||
| m3-helios | Server | x86_64, disko | AdGuard DNS, internal routing |
|
user = "m3tam3re";
|
||||||
| m3-ares | Desktop | NVIDIA, Btrfs | Personal workstation, n8n, PostgreSQL |
|
identity = "work"; # ← switches git to sascha.koenig, SSH to AZ hosts
|
||||||
| m3-kratos | Desktop | AMD, ZFS | Workstation, mem0, PostgreSQL |
|
context = "desktop";
|
||||||
| m3-aether | Cloud | QEMU | General purpose VM |
|
sets = ["coding"];
|
||||||
| m3-daedalus | Laptop | home-only | Portable (no full NixOS config) |
|
})
|
||||||
|
```
|
||||||
|
|
||||||
## ANTI-PATTERNS (THIS PROJECT)
|
This provides the familiar shell/editor/CLI setup but with work git credentials and SSH configuration.
|
||||||
|
|
||||||
- **DON'T** add secrets to `secrets/` without updating `secrets.nix` public keys
|
---
|
||||||
- **DON'T** hardcode ports - use `config.m3ta.ports.get` or add to registry
|
|
||||||
- **DON'T** create containers outside the `web` network on m3-atlas
|
|
||||||
- **DON'T** skip Traefik config for public-facing services on m3-atlas
|
|
||||||
- **DON'T** bypass extraServices flags - use `hosts/common/extraServices/` pattern
|
|
||||||
- **DON'T** commit unencrypted secrets or test with real credentials
|
|
||||||
|
|
||||||
## UNIQUE TO THIS CONFIG
|
## Commands
|
||||||
|
|
||||||
- **Custom m3ta-nixpkgs**: Local overlay for unreleased/patched packages
|
| Action | Command | Notes |
|
||||||
- **extraServices abstraction**: Boolean flags to toggle Podman, Ollama, virtualisation per host
|
| -------------------- | ---------------------------------------------------------------------- | ------------------------------------------------- |
|
||||||
- **Mythological naming**: All hosts named after Greek mythology
|
| **Enter dev shell** | `nix develop` | Includes alejandra, nixd, agenix, statix, deadnix |
|
||||||
- **Dual domain strategy**: New services on `m3ta.dev`, legacy redirects from `m3tam3re.com`
|
| **Build host** | `sudo nixos-rebuild switch --flake .#m3-ares` | Replace hostname as needed |
|
||||||
- **Per-host nixpkgs versions**: Different hosts can use different nixpkgs commits via specialArgs
|
| **Dry run build** | `sudo nixos-rebuild dry-run --flake .#m3-ares` | Validate without applying |
|
||||||
- **Container IP registry**: Static IP assignments in 10.89.0.0/24 subnet for predictable networking
|
| **List hosts** | `nix flake show` | Shows all NixOS configurations |
|
||||||
|
| **Update flake** | `sudo nixos-rebuild switch --flake .#m3-ares --update-input nixpkgs` | Update specific input |
|
||||||
|
| **Format code** | `alejandra .` | Run before committing |
|
||||||
|
| **Check lint** | `statix check .` | Run statix for antipatterns |
|
||||||
|
| **Remove dead code** | `deadnix -w .` | Clean up unused let bindings |
|
||||||
|
| **Build ISO** | `nix build .#nixosConfigurations.m3-ares.config.system.build.isoImage` | Generate install ISO |
|
||||||
|
|
||||||
## NOTES
|
---
|
||||||
|
|
||||||
- m3-atlas is the service hub - most complex configuration
|
## Conventions
|
||||||
- Secrets require host SSH keys defined in `secrets.nix` before `agenix -e` works
|
|
||||||
- Fish and Nushell both configured - choose per-user with shell aliases
|
### Formatting & Style
|
||||||
- Color scheme (Dracula) applied via nix-colors across all visual tools
|
|
||||||
- See subdirectory AGENTS.md for deep dives on containers, desktop features, CLI tools
|
- **Formatter:** `alejandra` (mandatory, run before commits)
|
||||||
|
- **Indentation:** 2 spaces (alejandra default)
|
||||||
|
- **Variables:** camelCase (e.g., `maxRetryAttempts`)
|
||||||
|
- **Types/Modules:** PascalCase (e.g., `MyService`)
|
||||||
|
- **Constants:** UPPER_SNAKE_CASE (e.g., `MAX_RETRIES`)
|
||||||
|
- **Files:** hyphen-case (e.g., `my-file.nix`)
|
||||||
|
|
||||||
|
### Nix Module Patterns
|
||||||
|
|
||||||
|
```nix
|
||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
{
|
||||||
|
options.myService.enable = lib.mkEnableOption "my service";
|
||||||
|
config = lib.mkIf config.myService.enable {
|
||||||
|
services.myService.enable = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Conditionals
|
||||||
|
|
||||||
|
```nix
|
||||||
|
config = lib.mkMerge [
|
||||||
|
(lib.mkIf cfg.enable { ... })
|
||||||
|
(lib.mkIf cfg.extraConfig { ... })
|
||||||
|
];
|
||||||
|
```
|
||||||
|
|
||||||
|
### Anti-Patterns (AVOID)
|
||||||
|
|
||||||
|
- **Never use `with pkgs;`** — always use explicit package references
|
||||||
|
- **Never use `builtins.fetchTarball`** — use flake inputs instead
|
||||||
|
- **Never use `import <nixpkgs>`** — always use inputs
|
||||||
|
- **Never use `builtins.getAttr/hasAttr`** — use `lib.attrByPath` or `lib.optionalAttrs`
|
||||||
|
- **Avoid anonymous functions in config** — extract to named lets
|
||||||
|
|
||||||
|
### Imports
|
||||||
|
|
||||||
|
- Use flake inputs for dependencies (e.g., `inputs.home-manager.nixosModules.home-manager`)
|
||||||
|
- Import relative paths with `./` or `../`
|
||||||
|
- Never use absolute paths in imports
|
||||||
|
|
||||||
|
### Secrets
|
||||||
|
|
||||||
|
- Secrets managed via **agenix** in `secrets/` directory
|
||||||
|
- Never commit plaintext secrets
|
||||||
|
- Use `.nix` extension for secret files
|
||||||
|
|
||||||
|
### Flake Input URLs
|
||||||
|
|
||||||
|
All `code.m3ta.dev` inputs use **SSH** URLs:
|
||||||
|
```nix
|
||||||
|
url = "git+ssh://gitea@code.m3ta.dev/m3tam3re/<repo>";
|
||||||
|
```
|
||||||
|
Anonymous HTTPS git on Gitea is unreliable and prompts for auth. SSH works with configured keys.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Key Files
|
||||||
|
|
||||||
|
| File | Purpose |
|
||||||
|
| ---------------------------------- | ------------------------------------------------------------------------------------------ |
|
||||||
|
| `flake.nix` | Central entry point defining all hosts, overlays, packages, dev shells, and nixpkgs config |
|
||||||
|
| `hosts/common/default.nix` | Shared Nix settings, nixpkgs overlays, home-manager setup (`useGlobalPkgs = true`) |
|
||||||
|
| `hosts/common/users/m3tam3re.nix` | User definition + m3ta-home mkHome integration + per-host feature flags |
|
||||||
|
| `hosts/<name>/home.nix` | Host-specific overrides: monitors, workspaces, window rules, XDG/MIME |
|
||||||
|
| `overlays/default.nix` | Package version overrides (stable/locked/master branches) |
|
||||||
|
| `.opencode-rules/languages/nix.md` | Nix-specific conventions and patterns |
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## What to Avoid
|
||||||
|
|
||||||
|
1. **Don't modify `flake.lock`** directly — use `nix flake update`
|
||||||
|
2. **Don't use impure operations** — this is a pure flake-based config
|
||||||
|
3. **Don't commit without formatting** — always run `alejandra .` first
|
||||||
|
4. **Don't add packages to hosts directly** — prefer adding to overlays or using NUR
|
||||||
|
5. **Don't hardcode paths** — use `inputs` and relative imports
|
||||||
|
6. **Don't create monolithic modules** — keep functions under 20 lines
|
||||||
|
7. **Don't skip the dry-run** — always test with `--dry-run` before switching
|
||||||
|
8. **Don't use lib.mkDefault lightly** — understand the precedence implications
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Notes
|
||||||
|
|
||||||
|
### Adding a New Host
|
||||||
|
|
||||||
|
1. Add entry to `flake.nix` → `nixosConfigurations`
|
||||||
|
2. Create directory in `hosts/` with:
|
||||||
|
- `default.nix` — imports common + specific configs
|
||||||
|
- `configuration.nix` — host-specific system config
|
||||||
|
- `hardware-configuration.nix` — from `nixos-generate-config`
|
||||||
|
- `programs.nix`, `services/`, `secrets.nix` as needed
|
||||||
|
3. Add entry to `hostProfiles` in `hosts/common/users/m3tam3re.nix`
|
||||||
|
4. Add feature flags in the `hostFlags` section
|
||||||
|
5. Create `hosts/<name>/home.nix` if the host needs monitor/XDG overrides
|
||||||
|
6. Run `sudo nixos-generate-config --dir ./hosts/new-host` first time
|
||||||
|
|
||||||
|
### Adding a New Package
|
||||||
|
|
||||||
|
1. For simple packages: add to appropriate overlay in `overlays/default.nix`
|
||||||
|
2. For complex packages: create in `pkgs/` directory
|
||||||
|
3. For upstream packages: use NUR or add as flake input
|
||||||
|
|
||||||
|
### Adding a New Home-Manager Feature
|
||||||
|
|
||||||
|
1. Create the module in `m3ta-home` under the appropriate profile directory
|
||||||
|
2. Add the import to the parent `default.nix` in m3ta-home
|
||||||
|
3. Enable it per-host via feature flags in `hosts/common/users/m3tam3re.nix`
|
||||||
|
|
||||||
|
### Development Workflow
|
||||||
|
|
||||||
|
1. Edit config files
|
||||||
|
2. Run `alejandra .` to format
|
||||||
|
3. Run `statix check .` for linting
|
||||||
|
4. Run `sudo nixos-rebuild dry-run --flake .#m3-ares`
|
||||||
|
5. If successful: `sudo nixos-rebuild switch --flake .#m3-ares`
|
||||||
|
|
||||||
|
### Remote Building
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Build on remote machine
|
||||||
|
nix copy --to ssh://user@host .#nixosConfigurations.m3-ares.config.system.build.toplevel
|
||||||
|
ssh user@host 'sudo nixos-rebuild switch --flake /nix/store/...-closure'
|
||||||
|
```
|
||||||
|
|||||||
1
coding-rules.json
Normal file
1
coding-rules.json
Normal file
@@ -0,0 +1 @@
|
|||||||
|
{"$schema":"https://opencode.ai/config.json","instructions":[".opencode-rules/concerns/coding-style.md",".opencode-rules/concerns/naming.md",".opencode-rules/concerns/documentation.md",".opencode-rules/concerns/testing.md",".opencode-rules/concerns/git-workflow.md",".opencode-rules/concerns/project-structure.md",".opencode-rules/languages/nix.md"]}
|
||||||
1173
flake.lock
generated
1173
flake.lock
generated
File diff suppressed because it is too large
Load Diff
117
flake.nix
117
flake.nix
@@ -22,8 +22,9 @@
|
|||||||
nixpkgs-9e58ed7.url = "github:nixos/nixpkgs/9e58ed7ba759d81c98f033b7f5eba21ca68f53b0";
|
nixpkgs-9e58ed7.url = "github:nixos/nixpkgs/9e58ed7ba759d81c98f033b7f5eba21ca68f53b0";
|
||||||
nixpkgs-master.url = "github:nixos/nixpkgs/master";
|
nixpkgs-master.url = "github:nixos/nixpkgs/master";
|
||||||
|
|
||||||
m3ta-nixpkgs.url = "git+https://code.m3ta.dev/m3tam3re/nixpkgs";
|
m3ta-nixpkgs.url = "git+ssh://gitea@code.m3ta.dev/m3tam3re/nixpkgs";
|
||||||
# m3ta-nixpkgs.url = "path:/home/m3tam3re/p/NIX/nixpkgs";
|
llm-agents.url = "github:numtide/llm-agents.nix";
|
||||||
|
|
||||||
#
|
#
|
||||||
nur = {
|
nur = {
|
||||||
url = "github:nix-community/NUR";
|
url = "github:nix-community/NUR";
|
||||||
@@ -36,19 +37,48 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
nixos-generators = {
|
nixos-generators = {url = "github:nix-community/nixos-generators";};
|
||||||
url = "github:nix-community/nixos-generators";
|
|
||||||
};
|
|
||||||
|
|
||||||
hyprpanel.url = "github:Jas-SinghFSU/HyprPanel";
|
hyprpanel.url = "github:Jas-SinghFSU/HyprPanel";
|
||||||
rose-pine-hyprcursor.url = "github:ndom91/rose-pine-hyprcursor";
|
rose-pine-hyprcursor.url = "github:ndom91/rose-pine-hyprcursor";
|
||||||
nix-colors.url = "github:misterio77/nix-colors";
|
nix-colors.url = "github:misterio77/nix-colors";
|
||||||
|
|
||||||
|
m3ta-home = {
|
||||||
|
url = "git+ssh://gitea@code.m3ta.dev/m3tam3re/m3ta-home";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
agents = {
|
agents = {
|
||||||
url = "path:/home/m3tam3re/p/MISC/AGENTS";
|
# url = "path:/home/m3tam3re/p/AI/AGENTS";
|
||||||
# url = "git+https://code.m3ta.dev/m3tam3re/AGENTS";
|
url = "git+ssh://gitea@code.m3ta.dev/m3tam3re/AGENTS";
|
||||||
|
};
|
||||||
|
## Skills
|
||||||
|
skills-basecamp = {
|
||||||
|
url = "github:basecamp/basecamp-cli";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
|
skills-anthropic = {
|
||||||
|
url = "github:anthropics/skills";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
skills-kestra = {
|
||||||
|
url = "github:kestra-io/agent-skills";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
skills-superpowers = {
|
||||||
|
url = "github:obra/superpowers";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
skills-vercel = {
|
||||||
|
url = "github:vercel-labs/skills";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
hermes-agent.url = "github:NousResearch/hermes-agent/v2026.4.30";
|
||||||
|
|
||||||
|
rustfs = {
|
||||||
|
url = "github:rustfs/rustfs-flake";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = {
|
outputs = {
|
||||||
@@ -58,6 +88,7 @@
|
|||||||
nixpkgs,
|
nixpkgs,
|
||||||
m3ta-nixpkgs,
|
m3ta-nixpkgs,
|
||||||
nur,
|
nur,
|
||||||
|
agents,
|
||||||
...
|
...
|
||||||
} @ inputs: let
|
} @ inputs: let
|
||||||
inherit (self) outputs;
|
inherit (self) outputs;
|
||||||
@@ -69,37 +100,45 @@
|
|||||||
"x86_64-darwin"
|
"x86_64-darwin"
|
||||||
];
|
];
|
||||||
forAllSystems = nixpkgs.lib.genAttrs systems;
|
forAllSystems = nixpkgs.lib.genAttrs systems;
|
||||||
|
allOverlays = import ./overlays {inherit inputs outputs;};
|
||||||
in {
|
in {
|
||||||
packages =
|
packages =
|
||||||
forAllSystems (system: import ./pkgs nixpkgs.legacyPackages.${system});
|
forAllSystems (system: import ./pkgs nixpkgs.legacyPackages.${system});
|
||||||
overlays = import ./overlays {inherit inputs outputs;};
|
overlays = builtins.removeAttrs allOverlays ["mkLlmAgentsOverlay"];
|
||||||
|
lib.mkLlmAgentsOverlay = allOverlays.mkLlmAgentsOverlay;
|
||||||
homeManagerModules = import ./modules/home-manager;
|
homeManagerModules = import ./modules/home-manager;
|
||||||
|
|
||||||
nixosConfigurations = {
|
nixosConfigurations = {
|
||||||
m3-ares = nixpkgs.lib.nixosSystem {
|
m3-ares = nixpkgs.lib.nixosSystem {
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
inherit inputs outputs;
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
hostname = "m3-ares";
|
hostname = "m3-ares";
|
||||||
};
|
};
|
||||||
modules = [
|
modules = [
|
||||||
./hosts/m3-ares
|
./hosts/m3-ares
|
||||||
agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
m3ta-nixpkgs.nixosModules.default
|
m3ta-nixpkgs.nixosModules.default
|
||||||
|
inputs.hermes-agent.nixosModules.default
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
m3-atlas = nixpkgs.lib.nixosSystem {
|
m3-atlas = nixpkgs.lib.nixosSystem {
|
||||||
specialArgs = {inherit inputs outputs;};
|
specialArgs = {
|
||||||
system = "x86_64-linux";
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
|
};
|
||||||
modules = [
|
modules = [
|
||||||
./hosts/m3-atlas
|
./hosts/m3-atlas
|
||||||
inputs.disko.nixosModules.disko
|
inputs.disko.nixosModules.disko
|
||||||
agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
m3ta-nixpkgs.nixosModules.default
|
m3ta-nixpkgs.nixosModules.default
|
||||||
|
inputs.rustfs.nixosModules.rustfs
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
m3-kratos = nixpkgs.lib.nixosSystem {
|
m3-kratos = nixpkgs.lib.nixosSystem {
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
inherit inputs outputs;
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
hostname = "m3-kratos";
|
hostname = "m3-kratos";
|
||||||
};
|
};
|
||||||
modules = [
|
modules = [
|
||||||
@@ -107,11 +146,14 @@
|
|||||||
agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
nur.modules.nixos.default
|
nur.modules.nixos.default
|
||||||
m3ta-nixpkgs.nixosModules.default
|
m3ta-nixpkgs.nixosModules.default
|
||||||
|
inputs.hermes-agent.nixosModules.default
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
m3-helios = nixpkgs.lib.nixosSystem {
|
m3-helios = nixpkgs.lib.nixosSystem {
|
||||||
specialArgs = {inherit inputs outputs;};
|
specialArgs = {
|
||||||
system = "x86_64-linux";
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
|
};
|
||||||
modules = [
|
modules = [
|
||||||
./hosts/m3-helios
|
./hosts/m3-helios
|
||||||
inputs.disko.nixosModules.disko
|
inputs.disko.nixosModules.disko
|
||||||
@@ -119,32 +161,53 @@
|
|||||||
m3ta-nixpkgs.nixosModules.default
|
m3ta-nixpkgs.nixosModules.default
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
m3-hermes = nixpkgs.lib.nixosSystem {
|
||||||
|
specialArgs = {
|
||||||
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
|
};
|
||||||
|
modules = [
|
||||||
|
./hosts/m3-hermes
|
||||||
|
inputs.disko.nixosModules.disko
|
||||||
|
agenix.nixosModules.default
|
||||||
|
m3ta-nixpkgs.nixosModules.default
|
||||||
|
inputs.hermes-agent.nixosModules.default
|
||||||
|
];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
homeConfigurations = {
|
homeConfigurations = {
|
||||||
"m3tam3re@m3-daedalus" = home-manager.lib.homeManagerConfiguration {
|
"m3tam3re@m3-daedalus" = home-manager.lib.homeManagerConfiguration {
|
||||||
pkgs = nixpkgs.legacyPackages."x86_64-linux";
|
pkgs = nixpkgs.legacyPackages."x86_64-linux";
|
||||||
extraSpecialArgs = {
|
extraSpecialArgs = {
|
||||||
inherit inputs outputs;
|
inherit inputs outputs;
|
||||||
|
system = "x86_64-linux";
|
||||||
hostname = "m3-daedalus";
|
hostname = "m3-daedalus";
|
||||||
};
|
};
|
||||||
modules = [./home/m3tam3re/m3-daedalus.nix];
|
modules = [./home/m3tam3re/m3-daedalus.nix];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
devShells.x86_64-linux.infraShell = let
|
devShells = forAllSystems (system: let
|
||||||
pkgs = nixpkgs.legacyPackages.x86_64-linux;
|
pkgs = import nixpkgs {
|
||||||
in
|
inherit system;
|
||||||
pkgs.mkShell {
|
config.allowUnfree = true; # Allow unfree packages in devShell
|
||||||
buildInputs = with pkgs; [
|
|
||||||
opentofu
|
|
||||||
nixos-anywhere
|
|
||||||
];
|
|
||||||
shellHook = ''
|
|
||||||
echo "Infrastructure Management Shell"
|
|
||||||
echo "Commands:"
|
|
||||||
echo " - cd infra/proxmox && tofu init"
|
|
||||||
echo " - tofu plan"
|
|
||||||
echo " - tofu apply"
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
|
m3taLib = m3ta-nixpkgs.lib.x86_64-linux;
|
||||||
|
rules = m3taLib.coding-rules.mkCodingRules {
|
||||||
|
inherit agents;
|
||||||
|
languages = ["nix"];
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
default = pkgs.mkShell {
|
||||||
|
buildInputs = with pkgs; [
|
||||||
|
alejandra
|
||||||
|
nixd
|
||||||
|
openssh
|
||||||
|
agenix.packages.${system}.default
|
||||||
|
statix
|
||||||
|
deadnix
|
||||||
|
];
|
||||||
|
inherit (rules) instructions shellHook;
|
||||||
|
};
|
||||||
|
});
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,55 +0,0 @@
|
|||||||
{
|
|
||||||
inputs,
|
|
||||||
lib,
|
|
||||||
outputs,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
imports = [
|
|
||||||
inputs.nix-colors.homeManagerModules.default
|
|
||||||
inputs.m3ta-nixpkgs.homeManagerModules.default
|
|
||||||
]; #imports = builtins.attrValues outputs.homeManagerModules;
|
|
||||||
nixpkgs = {
|
|
||||||
# You can add overlays here
|
|
||||||
overlays = [
|
|
||||||
# Add overlays your own flake exports (from overlays and pkgs dir):
|
|
||||||
#outputs.overlays.additions
|
|
||||||
#outputs.overlays.modifications
|
|
||||||
outputs.overlays.temp-packages
|
|
||||||
outputs.overlays.stable-packages
|
|
||||||
outputs.overlays.locked-packages
|
|
||||||
outputs.overlays.pinned-packages
|
|
||||||
outputs.overlays.master-packages
|
|
||||||
|
|
||||||
inputs.nur.overlays.default
|
|
||||||
inputs.m3ta-nixpkgs.overlays.default
|
|
||||||
inputs.m3ta-nixpkgs.overlays.modifications
|
|
||||||
|
|
||||||
# You can also add overlays exported from other flakes:
|
|
||||||
# neovim-nightly-overlay.overlays.default
|
|
||||||
|
|
||||||
# Or define it inline, for example:
|
|
||||||
# (final: prev: {
|
|
||||||
# hi = final.hello.overrideAttrs (oldAttrs: {
|
|
||||||
# patches = [ ./change-hello-to-hi.patch ];
|
|
||||||
# });
|
|
||||||
# })
|
|
||||||
];
|
|
||||||
# Configure your nixpkgs instance
|
|
||||||
config = {
|
|
||||||
# Disable if you don't want unfree packages
|
|
||||||
allowUnfree = true;
|
|
||||||
# Workaround for https://github.com/nix-community/home-manager/issues/2942
|
|
||||||
allowUnfreePredicate = _: true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
nix = {
|
|
||||||
package = lib.mkDefault pkgs.nix;
|
|
||||||
settings = {
|
|
||||||
experimental-features = ["nix-command" "flakes"];
|
|
||||||
warn-dirty = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
colorScheme = inputs.nix-colors.colorSchemes.dracula;
|
|
||||||
}
|
|
||||||
@@ -1,65 +0,0 @@
|
|||||||
# CLI FEATURES (home-manager)
|
|
||||||
|
|
||||||
**Shell and terminal tooling with Fish + Nushell dual configuration**
|
|
||||||
|
|
||||||
## OVERVIEW
|
|
||||||
8 CLI modules with integrated tooling across Fish and Nushell shells.
|
|
||||||
|
|
||||||
## STRUCTURE
|
|
||||||
```
|
|
||||||
cli/
|
|
||||||
├── default.nix # Imports + shared tools (bat, eza, direnv)
|
|
||||||
├── fish.nix # Fish shell + aliases
|
|
||||||
├── fzf.nix # Fuzzy finder
|
|
||||||
├── nitch.nix # System info tool
|
|
||||||
├── nushell.nix # Nushell + aliases
|
|
||||||
├── secrets.nix # Password-store integration
|
|
||||||
├── starship.nix # Shell prompt
|
|
||||||
└── zellij.nix # Terminal multiplexer
|
|
||||||
```
|
|
||||||
|
|
||||||
## WHERE TO LOOK
|
|
||||||
|
|
||||||
| Task | Location | Notes |
|
|
||||||
|------|----------|-------|
|
|
||||||
| Add CLI tool | default.nix home.packages | Check if shell integration needed |
|
|
||||||
| Shell aliases | fish.nix or nushell.nix | Kept in sync between shells |
|
|
||||||
| Prompt config | starship.nix | Uses nerd-fonts symbols |
|
|
||||||
| Secret access | secrets.nix | Agenix integration |
|
|
||||||
|
|
||||||
## CONVENTIONS
|
|
||||||
|
|
||||||
### Shell Integration Pattern
|
|
||||||
Tools with shell hooks enabled in both Fish and Nushell:
|
|
||||||
- **carapace**: Completions
|
|
||||||
- **zoxide**: Smart cd
|
|
||||||
- **eza**: ls replacement
|
|
||||||
- **direnv**: Directory environments
|
|
||||||
- **fzf**: Fuzzy finding
|
|
||||||
|
|
||||||
### NixOS Rebuild Aliases (both shells)
|
|
||||||
```
|
|
||||||
nr/nrs - nixos-rebuild [switch]
|
|
||||||
snr/snrs - sudo nixos-rebuild [switch]
|
|
||||||
hms - home-manager switch
|
|
||||||
```
|
|
||||||
|
|
||||||
### Bat Theme
|
|
||||||
Custom `universal` theme generated from nix-colors palette in default.nix (lines 34-157).
|
|
||||||
|
|
||||||
### Secrets Integration
|
|
||||||
Fish/Nushell source `$HOME/.secrets` if `secrets.enable = true` (CLI secrets feature).
|
|
||||||
|
|
||||||
## ANTI-PATTERNS
|
|
||||||
|
|
||||||
- **DON'T** add aliases to only one shell - keep Fish/Nushell in sync
|
|
||||||
- **DON'T** use `programs.bash` - Nushell is default shell
|
|
||||||
- **DON'T** bypass carapace for completions - integrated by default
|
|
||||||
|
|
||||||
## NOTES
|
|
||||||
|
|
||||||
- zellij-ps custom package for project session management
|
|
||||||
- Default shell set to Nushell in hosts/common/default.nix
|
|
||||||
- Bat theme dynamically generated (no external theme files)
|
|
||||||
- lf file manager uses bat for previews
|
|
||||||
- Agenix CLI (agenix-cli) included for secret management
|
|
||||||
@@ -1,237 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
videoDrivers,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
imports = [
|
|
||||||
./fish.nix
|
|
||||||
./fzf.nix
|
|
||||||
./nitch.nix
|
|
||||||
./nushell.nix
|
|
||||||
./secrets.nix
|
|
||||||
./starship.nix
|
|
||||||
./zellij.nix
|
|
||||||
];
|
|
||||||
cli.stt-ptt = {
|
|
||||||
enable = true;
|
|
||||||
whisperPackage =
|
|
||||||
if videoDrivers == ["nvidia"]
|
|
||||||
then pkgs.whisper-cpp.override {cudaSupport = true;}
|
|
||||||
else if videoDrivers == ["amdgpu"]
|
|
||||||
then pkgs.whisper-cpp-vulkan
|
|
||||||
else pkgs.whisper-cpp;
|
|
||||||
model = "ggml-large-v3-turbo";
|
|
||||||
notifyTimeout = 2000;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.carapace = {
|
|
||||||
enable = true;
|
|
||||||
enableFishIntegration = true;
|
|
||||||
enableNushellIntegration = true;
|
|
||||||
enableBashIntegration = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.zoxide = {
|
|
||||||
enable = true;
|
|
||||||
enableFishIntegration = true;
|
|
||||||
enableNushellIntegration = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.bat = {
|
|
||||||
enable = true;
|
|
||||||
config = {theme = "universal";};
|
|
||||||
themes = {
|
|
||||||
universal = {
|
|
||||||
src = pkgs.writeText "universal.tmTheme" ''
|
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
|
||||||
<plist version="1.0">
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Universal (nix-colors)</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<array>
|
|
||||||
<dict>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>background</key>
|
|
||||||
<string>#${config.colorScheme.palette.base00}</string>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base05}</string>
|
|
||||||
<key>caret</key>
|
|
||||||
<string>#${config.colorScheme.palette.base05}</string>
|
|
||||||
<key>selection</key>
|
|
||||||
<string>#${config.colorScheme.palette.base02}</string>
|
|
||||||
<key>selectionForeground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base05}</string>
|
|
||||||
<key>lineHighlight</key>
|
|
||||||
<string>#${config.colorScheme.palette.base01}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Comment</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>comment</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base03}</string>
|
|
||||||
<key>fontStyle</key>
|
|
||||||
<string>italic</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>String</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>string</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base0A}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Number</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>constant.numeric</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base0E}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Keyword</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>keyword</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base08}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Function</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>entity.name.function</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base0B}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Type</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>entity.name.type, storage.type</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base0D}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Variable</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>variable</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base05}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
<dict>
|
|
||||||
<key>name</key>
|
|
||||||
<string>Constant</string>
|
|
||||||
<key>scope</key>
|
|
||||||
<string>constant</string>
|
|
||||||
<key>settings</key>
|
|
||||||
<dict>
|
|
||||||
<key>foreground</key>
|
|
||||||
<string>#${config.colorScheme.palette.base0E}</string>
|
|
||||||
</dict>
|
|
||||||
</dict>
|
|
||||||
</array>
|
|
||||||
</dict>
|
|
||||||
</plist>
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.direnv = {
|
|
||||||
enable = true;
|
|
||||||
enableNushellIntegration = true;
|
|
||||||
nix-direnv.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.eza = {
|
|
||||||
enable = true;
|
|
||||||
enableFishIntegration = true;
|
|
||||||
enableBashIntegration = true;
|
|
||||||
extraOptions = ["-l" "--icons" "--git" "-a"];
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.lf = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
preview = true;
|
|
||||||
drawbox = true;
|
|
||||||
hidden = true;
|
|
||||||
icons = true;
|
|
||||||
theme = "Dracula";
|
|
||||||
previewer = "bat";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
cli.zellij-ps = {
|
|
||||||
enable = true;
|
|
||||||
projectFolders = ["/home/m3tam3re/p"];
|
|
||||||
};
|
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
comma
|
|
||||||
coreutils
|
|
||||||
devenv
|
|
||||||
fabric-ai
|
|
||||||
fd
|
|
||||||
gcc
|
|
||||||
go
|
|
||||||
htop
|
|
||||||
httpie
|
|
||||||
hyprpaper-random
|
|
||||||
jq
|
|
||||||
just
|
|
||||||
lazygit
|
|
||||||
llm
|
|
||||||
lf
|
|
||||||
nix-index
|
|
||||||
nix-update
|
|
||||||
libnotify
|
|
||||||
nushellPlugins.skim
|
|
||||||
progress
|
|
||||||
ripgrep
|
|
||||||
rocmPackages.rocm-smi
|
|
||||||
rocmPackages.rocminfo
|
|
||||||
rocmPackages.rocm-runtime
|
|
||||||
tldr
|
|
||||||
pomodoro-timer
|
|
||||||
trash-cli
|
|
||||||
unimatrix
|
|
||||||
unzip
|
|
||||||
vulkan-tools
|
|
||||||
wttrbar
|
|
||||||
wireguard-tools
|
|
||||||
yazi
|
|
||||||
zellij-ps
|
|
||||||
zip
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -1,116 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.fish;
|
|
||||||
in {
|
|
||||||
options.features.cli.fish.enable = mkEnableOption "enable fish shell";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.fish = {
|
|
||||||
enable = true;
|
|
||||||
interactiveShellInit = ''
|
|
||||||
# Fish colors using universal nix-colors palette
|
|
||||||
# Text colors
|
|
||||||
set -g fish_color_normal ${config.colorScheme.palette.base05} # text
|
|
||||||
set -g fish_color_param ${config.colorScheme.palette.base05} # text
|
|
||||||
set -g fish_color_comment ${config.colorScheme.palette.base03} # muted
|
|
||||||
set -g fish_color_autosuggestion ${config.colorScheme.palette.base03} # muted
|
|
||||||
|
|
||||||
# Command colors
|
|
||||||
set -g fish_color_command ${config.colorScheme.palette.base0D} # accent6 (blue)
|
|
||||||
set -g fish_color_quote ${config.colorScheme.palette.base0A} # accent3 (yellow)
|
|
||||||
set -g fish_color_redirection ${config.colorScheme.palette.base0E} # accent7 (purple)
|
|
||||||
set -g fish_color_end ${config.colorScheme.palette.base08} # accent1 (red)
|
|
||||||
set -g fish_color_error ${config.colorScheme.palette.base08} # accent1 (red)
|
|
||||||
set -g fish_color_operator ${config.colorScheme.palette.base0C} # accent5 (cyan)
|
|
||||||
set -g fish_color_escape ${config.colorScheme.palette.base09} # accent2 (orange)
|
|
||||||
|
|
||||||
# Path colors
|
|
||||||
set -g fish_color_cwd ${config.colorScheme.palette.base0B} # accent4 (green)
|
|
||||||
set -g fish_color_cwd_root ${config.colorScheme.palette.base08} # accent1 (red)
|
|
||||||
set -g fish_color_valid_path --underline
|
|
||||||
|
|
||||||
# Interactive colors
|
|
||||||
set -g fish_color_match ${config.colorScheme.palette.base0B} # accent4 (green)
|
|
||||||
set -g fish_color_selection --background=${config.colorScheme.palette.base02} # overlay
|
|
||||||
set -g fish_color_search_match --background=${config.colorScheme.palette.base02} # overlay
|
|
||||||
set -g fish_color_history_current --bold
|
|
||||||
set -g fish_color_user ${config.colorScheme.palette.base0B} # accent4 (green)
|
|
||||||
set -g fish_color_host ${config.colorScheme.palette.base0D} # accent6 (blue)
|
|
||||||
set -g fish_color_cancel -r
|
|
||||||
|
|
||||||
# Pager colors
|
|
||||||
set -g fish_pager_color_completion normal
|
|
||||||
set -g fish_pager_color_description ${config.colorScheme.palette.base03} # muted
|
|
||||||
set -g fish_pager_color_prefix ${config.colorScheme.palette.base0E} # accent7 (purple)
|
|
||||||
set -g fish_pager_color_progress ${config.colorScheme.palette.base0B} # accent4 (green)
|
|
||||||
'';
|
|
||||||
loginShellInit = ''
|
|
||||||
set -x NIX_PATH nixpkgs=channel:nixos-unstable
|
|
||||||
set -x NIX_LOG info
|
|
||||||
set -x WEBKIT_DISABLE_COMPOSITING_MODE 1
|
|
||||||
set -x TERMINAL kitty
|
|
||||||
set -x EDITOR nvim
|
|
||||||
set -x VISUAL zed
|
|
||||||
set -x XDG_DATA_HOME $HOME/.local/share
|
|
||||||
set -x FZF_CTRL_R_OPTS "
|
|
||||||
--preview='bat --color=always -n {}'
|
|
||||||
--preview-window up:3:hidden:wrap
|
|
||||||
--bind 'ctrl-/:toggle-preview'
|
|
||||||
--bind 'ctrl-y:execute-silent(echo -n {2..} | wl-copy)+abort'
|
|
||||||
--color header:bold
|
|
||||||
--header 'Press CTRL-Y to copy command into clipboard'"
|
|
||||||
set -x FZF_DEFAULT_COMMAND fd --type f --exclude .git --follow --hidden
|
|
||||||
set -x FZF_CTRL_T_COMMAND "$FZF_DEFAULT_COMMAND"
|
|
||||||
set -x FLAKE $HOME/p/nixos/nixos-config
|
|
||||||
source /run/agenix/${config.home.username}-secrets
|
|
||||||
|
|
||||||
if test (tty) = "/dev/tty1"
|
|
||||||
exec uwsm start -F /run/current-system/sw/bin/Hyprland
|
|
||||||
end
|
|
||||||
if test (tty) = "/dev/tty2"
|
|
||||||
exec gamescope -O HDMI-A-1 -W 1920 -H 1080 --adaptive-sync --hdr-enabled --rt --steam -- steam -pipewire-dmabuf -tenfoot
|
|
||||||
end
|
|
||||||
'';
|
|
||||||
shellAbbrs = {
|
|
||||||
".." = "cd ..";
|
|
||||||
"..." = "cd ../..";
|
|
||||||
b = "yazi";
|
|
||||||
ls = "eza";
|
|
||||||
l = "eza -l --icons --git -a";
|
|
||||||
lt = "eza --tree --level=2 --long --icons --git";
|
|
||||||
grep = "rg";
|
|
||||||
ps = "procs";
|
|
||||||
just = "just --unstable";
|
|
||||||
node = "bun";
|
|
||||||
npx = "bunx";
|
|
||||||
fs = "du -ah . | sort -hr | head -n 10";
|
|
||||||
|
|
||||||
n = "nix";
|
|
||||||
nd = "nix develop -c $SHELL";
|
|
||||||
ns = "nix shell";
|
|
||||||
nsn = "nix shell nixpkgs#";
|
|
||||||
nb = "nix build";
|
|
||||||
nbn = "nix build nixpkgs#";
|
|
||||||
nf = "nix flake";
|
|
||||||
|
|
||||||
nr = "sudo nixos-rebuild --flake .";
|
|
||||||
nrs = "sudo nixos-rebuild switch --flake .#(uname -n)";
|
|
||||||
snr = "sudo nixos-rebuild --flake .";
|
|
||||||
snrs = "sudo nixos-rebuild --flake . switch";
|
|
||||||
hm = "home-manager --flake .";
|
|
||||||
hms = "home-manager --flake . switch";
|
|
||||||
hmr = "cd ~/projects/nix-configurations; nix flake lock --update-input dotfiles; home-manager --flake .#(whoami)@(hostname) switch";
|
|
||||||
|
|
||||||
tsu = "sudo tailscale up";
|
|
||||||
tsd = "sudo tailscale down";
|
|
||||||
|
|
||||||
vi = "nvim";
|
|
||||||
vim = "nvim";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.fzf;
|
|
||||||
in {
|
|
||||||
options.features.cli.fzf.enable = mkEnableOption "enable fuzzy finder";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.fzf = {
|
|
||||||
enable = true;
|
|
||||||
enableFishIntegration = true;
|
|
||||||
colors = {
|
|
||||||
"fg" = "#${config.colorScheme.palette.base05}";
|
|
||||||
"bg" = "#${config.colorScheme.palette.base00}";
|
|
||||||
"hl" = "#${config.colorScheme.palette.base0E}";
|
|
||||||
"fg+" = "#${config.colorScheme.palette.base05}";
|
|
||||||
"bg+" = "#${config.colorScheme.palette.base02}";
|
|
||||||
"hl+" = "#${config.colorScheme.palette.base0E}";
|
|
||||||
"info" = "#${config.colorScheme.palette.base09}";
|
|
||||||
"prompt" = "#${config.colorScheme.palette.base0B}";
|
|
||||||
"pointer" = "#${config.colorScheme.palette.base08}";
|
|
||||||
"marker" = "#${config.colorScheme.palette.base08}";
|
|
||||||
"spinner" = "#${config.colorScheme.palette.base09}";
|
|
||||||
"header" = "#${config.colorScheme.palette.base03}";
|
|
||||||
};
|
|
||||||
defaultOptions = [
|
|
||||||
"--preview='bat --color=always -n {}'"
|
|
||||||
"--bind 'ctrl-/:toggle-preview'"
|
|
||||||
"--header 'Press CTRL-Y to copy command into clipboard'"
|
|
||||||
"--bind 'ctrl-/:toggle-preview'"
|
|
||||||
"--bind 'ctrl-y:execute-silent(echo -n {2..} | wl-copy)+abort'"
|
|
||||||
];
|
|
||||||
defaultCommand = "fd --type f --exclude .git --follow --hidden";
|
|
||||||
changeDirWidgetCommand = "fd --type d --exclude .git --follow --hidden";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,15 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.nitch;
|
|
||||||
in {
|
|
||||||
options.features.cli.nitch.enable = mkEnableOption "enable nitch";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [nitch];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,182 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.nushell;
|
|
||||||
in {
|
|
||||||
options.features.cli.nushell.enable = mkEnableOption "enable nushell";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.nushell = {
|
|
||||||
enable = true;
|
|
||||||
envFile.text = ''
|
|
||||||
$env.config.show_banner = false
|
|
||||||
$env.NIX_PATH = "nixpkgs=channel:nixos-unstable"
|
|
||||||
$env.NIX_LOG = "iunfo"
|
|
||||||
$env.WEBKIT_DISABLE_COMPOSITING_MODE = "1"
|
|
||||||
$env.TERMINAL = "kitty"
|
|
||||||
$env.EDITOR = "nvim"
|
|
||||||
$env.VISUAL = "zed"
|
|
||||||
$env.FZF_DEFAULT_COMMAND = "fd --type f --exclude .git --follow --hidden"
|
|
||||||
$env.FZF_DEFAULT_OPTS = "--preview='bat --color=always --style=numbers --line-range=:500 {}' --bind 'ctrl-/:toggle-preview' --header 'Press CTRL-Y to copy to clipboard' --bind 'ctrl-y:execute-silent(echo {} | wl-copy)' --color bg:#${config.colorScheme.palette.base00},bg+:#${config.colorScheme.palette.base02},fg:#${config.colorScheme.palette.base05},fg+:#${config.colorScheme.palette.base05},header:#${config.colorScheme.palette.base03},hl:#${config.colorScheme.palette.base0E},hl+:#${config.colorScheme.palette.base0E},info:#${config.colorScheme.palette.base09},marker:#${config.colorScheme.palette.base08},pointer:#${config.colorScheme.palette.base08},prompt:#${config.colorScheme.palette.base0B},spinner:#${config.colorScheme.palette.base09}"
|
|
||||||
$env.XDG_DATA_HOME = $"($env.HOME)/.local/share"
|
|
||||||
$env.FZF_DEFAULT_COMMAND = "fd --type f --exclude .git --follow --hidden"
|
|
||||||
$env.SSH_AUTH_SOCK = "/run/user/1000/gnupg/S.gpg-agent.ssh"
|
|
||||||
$env.FLAKE = $"($env.HOME)/p/nixos/nixos-config"
|
|
||||||
$env.PATH = ($env.PATH | split row (char esep) | append "/home/m3tam3re/.cache/.bun/bin" | uniq)
|
|
||||||
source /run/agenix/${config.home.username}-secrets
|
|
||||||
'';
|
|
||||||
configFile.text = ''
|
|
||||||
# FZF integration functions for nushell
|
|
||||||
def fzf-file [] {
|
|
||||||
fd --type f --exclude .git --follow --hidden | fzf --preview 'bat --color=always --style=numbers --line-range=:500 {}' --bind 'ctrl-y:execute-silent(echo {} | wl-copy)'
|
|
||||||
}
|
|
||||||
|
|
||||||
def fzf-dir [] {
|
|
||||||
fd --type d --exclude .git --follow --hidden | fzf --preview 'ls -la {}'
|
|
||||||
}
|
|
||||||
|
|
||||||
def fzf-history [] {
|
|
||||||
history | get command | reverse | fzf --bind 'ctrl-y:execute-silent(echo {} | wl-copy)'
|
|
||||||
}
|
|
||||||
|
|
||||||
# Key bindings for FZF
|
|
||||||
$env.config = {
|
|
||||||
keybindings: [
|
|
||||||
{
|
|
||||||
name: fzf_file
|
|
||||||
modifier: control
|
|
||||||
keycode: char_t
|
|
||||||
mode: [emacs, vi_normal, vi_insert]
|
|
||||||
event: {
|
|
||||||
send: executehostcommand
|
|
||||||
cmd: "commandline edit --insert (fzf-file)"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name: fzf_history
|
|
||||||
modifier: control
|
|
||||||
keycode: char_r
|
|
||||||
mode: [emacs, vi_normal, vi_insert]
|
|
||||||
event: {
|
|
||||||
send: executehostcommand
|
|
||||||
cmd: "commandline edit --replace (fzf-history)"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
|
|
||||||
# Aliases
|
|
||||||
alias .. = cd ..
|
|
||||||
alias ... = cd ...
|
|
||||||
alias h = cd $env.HOME
|
|
||||||
alias b = yazi
|
|
||||||
alias lt = eza --tree --level=2 --long --icons --git
|
|
||||||
alias grep = rg
|
|
||||||
alias just = just --unstable
|
|
||||||
alias node = bun
|
|
||||||
alias npx = bunx
|
|
||||||
|
|
||||||
alias n = nix
|
|
||||||
alias nd = nix develop -c $nu.current-shell
|
|
||||||
alias ns = nix shell
|
|
||||||
alias nsn = nix shell nixpkgs#
|
|
||||||
alias nb = nix build
|
|
||||||
alias nbn = nix build nixpkgs#
|
|
||||||
alias nf = nix flake
|
|
||||||
|
|
||||||
alias nr = sudo nixos-rebuild --flake .
|
|
||||||
alias nrs = sudo nixos-rebuild switch --flake .#(sys host | get hostname)
|
|
||||||
alias snr = sudo nixos-rebuild --flake .
|
|
||||||
alias snrs = sudo nixos-rebuild --flake . switch
|
|
||||||
alias hm = home-manager --flake .
|
|
||||||
alias hms = home-manager --flake . switch
|
|
||||||
alias hmr = do { cd ~/projects/nix-configurations; nix flake lock --update-input dotfiles; home-manager --flake .#(whoami)@(hostname) switch }
|
|
||||||
|
|
||||||
alias tsu = sudo tailscale up
|
|
||||||
alias tsd = sudo tailscale down
|
|
||||||
|
|
||||||
alias vi = nvim
|
|
||||||
alias vim = nvim
|
|
||||||
|
|
||||||
def history_fuzzy [] {
|
|
||||||
let selected = (
|
|
||||||
history
|
|
||||||
| reverse
|
|
||||||
| get command
|
|
||||||
| uniq
|
|
||||||
| to text
|
|
||||||
| ^fzf
|
|
||||||
)
|
|
||||||
if ($selected | is-not-empty) {
|
|
||||||
commandline edit ($selected)
|
|
||||||
} else {
|
|
||||||
null
|
|
||||||
}
|
|
||||||
}
|
|
||||||
def --env dir_fuzzy [] {
|
|
||||||
let selected = (
|
|
||||||
fd --type directory
|
|
||||||
| ^fzf
|
|
||||||
)
|
|
||||||
cd $selected
|
|
||||||
}
|
|
||||||
def find_fuzzy [] {
|
|
||||||
# Find non-hidden text files with matches for any content and select one via fuzzy search
|
|
||||||
let selected = (
|
|
||||||
^fd --type file --no-hidden -X rg -l --files-with-matches .
|
|
||||||
| lines
|
|
||||||
| to text
|
|
||||||
| ^fzf
|
|
||||||
)
|
|
||||||
if ($selected | is-not-empty) {
|
|
||||||
^$env.EDITOR $selected
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$env.config = {
|
|
||||||
keybindings: [
|
|
||||||
{
|
|
||||||
name: history_fuzzy
|
|
||||||
modifier: control
|
|
||||||
keycode: char_r
|
|
||||||
mode: [emacs, vi_insert, vi_normal]
|
|
||||||
event: [
|
|
||||||
{
|
|
||||||
send: executehostcommand
|
|
||||||
cmd: "history_fuzzy"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name: dir_fuzzy
|
|
||||||
modifier: alt
|
|
||||||
keycode: char_c
|
|
||||||
mode: [emacs, vi_insert, vi_normal]
|
|
||||||
event: [
|
|
||||||
{
|
|
||||||
send: executehostcommand
|
|
||||||
cmd: "dir_fuzzy"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name: history_fuzzy
|
|
||||||
modifier: control
|
|
||||||
keycode: char_t
|
|
||||||
mode: [emacs, vi_insert, vi_normal]
|
|
||||||
event: [
|
|
||||||
{
|
|
||||||
send: executehostcommand
|
|
||||||
cmd: "find_fuzzy"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.secrets;
|
|
||||||
in {
|
|
||||||
options.features.cli.secrets.enable = mkEnableOption "enable secrets";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.password-store = {
|
|
||||||
enable = true;
|
|
||||||
package =
|
|
||||||
pkgs.pass-wayland.withExtensions
|
|
||||||
(exts: [exts.pass-otp exts.pass-import]);
|
|
||||||
};
|
|
||||||
home.packages = with pkgs; [pinentry-gnome3];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,68 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.starship;
|
|
||||||
in {
|
|
||||||
options.features.cli.starship.enable = mkEnableOption "enable starship prompt";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.starship = {
|
|
||||||
enable = true;
|
|
||||||
enableFishIntegration = true;
|
|
||||||
enableNushellIntegration = true;
|
|
||||||
settings = {
|
|
||||||
format = "$all$character";
|
|
||||||
palette = "universal";
|
|
||||||
|
|
||||||
palettes.universal = {
|
|
||||||
background = "#${config.colorScheme.palette.base00}";
|
|
||||||
surface = "#${config.colorScheme.palette.base01}";
|
|
||||||
muted = "#${config.colorScheme.palette.base03}";
|
|
||||||
text = "#${config.colorScheme.palette.base05}";
|
|
||||||
bright = "#${config.colorScheme.palette.base07}";
|
|
||||||
accent1 = "#${config.colorScheme.palette.base08}";
|
|
||||||
accent2 = "#${config.colorScheme.palette.base09}";
|
|
||||||
accent3 = "#${config.colorScheme.palette.base0A}";
|
|
||||||
accent4 = "#${config.colorScheme.palette.base0B}";
|
|
||||||
accent5 = "#${config.colorScheme.palette.base0C}";
|
|
||||||
accent6 = "#${config.colorScheme.palette.base0D}";
|
|
||||||
accent7 = "#${config.colorScheme.palette.base0E}";
|
|
||||||
};
|
|
||||||
|
|
||||||
character = {
|
|
||||||
success_symbol = "[❯](accent7)";
|
|
||||||
error_symbol = "[❯](accent1)";
|
|
||||||
};
|
|
||||||
|
|
||||||
directory = {
|
|
||||||
style = "accent6";
|
|
||||||
truncation_length = 3;
|
|
||||||
truncate_to_repo = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
git_branch = {
|
|
||||||
style = "accent7";
|
|
||||||
};
|
|
||||||
|
|
||||||
git_status = {
|
|
||||||
style = "accent5";
|
|
||||||
};
|
|
||||||
|
|
||||||
cmd_duration = {
|
|
||||||
style = "accent3";
|
|
||||||
};
|
|
||||||
|
|
||||||
hostname = {
|
|
||||||
style = "accent4";
|
|
||||||
};
|
|
||||||
|
|
||||||
username = {
|
|
||||||
style_user = "accent2";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.cli.zellij;
|
|
||||||
in {
|
|
||||||
options.features.cli.zellij.enable = mkEnableOption "enable tmux";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.zellij = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
theme = "universal";
|
|
||||||
themes.universal = {
|
|
||||||
bg = "#${config.colorScheme.palette.base00}";
|
|
||||||
fg = "#${config.colorScheme.palette.base05}";
|
|
||||||
black = "#${config.colorScheme.palette.base01}";
|
|
||||||
red = "#${config.colorScheme.palette.base08}";
|
|
||||||
green = "#${config.colorScheme.palette.base0B}";
|
|
||||||
yellow = "#${config.colorScheme.palette.base0A}";
|
|
||||||
blue = "#${config.colorScheme.palette.base0D}";
|
|
||||||
magenta = "#${config.colorScheme.palette.base0E}";
|
|
||||||
cyan = "#${config.colorScheme.palette.base0C}";
|
|
||||||
white = "#${config.colorScheme.palette.base07}";
|
|
||||||
orange = "#${config.colorScheme.palette.base09}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,33 +0,0 @@
|
|||||||
{pkgs, ...}: {
|
|
||||||
imports = [
|
|
||||||
./opencode.nix
|
|
||||||
];
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
agenix-cli
|
|
||||||
alejandra
|
|
||||||
beads
|
|
||||||
bc
|
|
||||||
bun
|
|
||||||
claude-code
|
|
||||||
devpod
|
|
||||||
#devpod-desktop
|
|
||||||
code2prompt
|
|
||||||
nur.repos.charmbracelet.crush
|
|
||||||
(python3.withPackages (ps:
|
|
||||||
with ps; [
|
|
||||||
pip
|
|
||||||
uv
|
|
||||||
# Scientific packages
|
|
||||||
numba
|
|
||||||
numpy
|
|
||||||
torch
|
|
||||||
srt
|
|
||||||
]))
|
|
||||||
opencode-desktop
|
|
||||||
pyrefly
|
|
||||||
nixd
|
|
||||||
alejandra
|
|
||||||
tailwindcss
|
|
||||||
tailwindcss-language-server
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -1,260 +0,0 @@
|
|||||||
{inputs, ...}: {
|
|
||||||
xdg.configFile = {
|
|
||||||
"opencode/command" = {
|
|
||||||
source = "${inputs.agents}/command";
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
"opencode/context" = {
|
|
||||||
source = "${inputs.agents}/context";
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
"opencode/prompts" = {
|
|
||||||
source = "${inputs.agents}/prompts";
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
"opencode/skill" = {
|
|
||||||
source = "${inputs.agents}/skill";
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.opencode = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
theme = "opencode";
|
|
||||||
plugin = ["oh-my-opencode" "opencode-beads" "opencode-antigravity-auth@beta"];
|
|
||||||
agent =
|
|
||||||
builtins.fromJSON
|
|
||||||
(builtins.readFile "${inputs.agents}/agent/agents.json");
|
|
||||||
formatter = {
|
|
||||||
alejandra = {
|
|
||||||
command = ["alejandra" "-q" "-"];
|
|
||||||
extensions = [".nix"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
mcp = {
|
|
||||||
Ref = {
|
|
||||||
type = "local";
|
|
||||||
command = [
|
|
||||||
"sh"
|
|
||||||
"-c"
|
|
||||||
"REF_API_KEY=$(cat /run/agenix/ref-key) exec bunx ref-tools-mcp@latest"
|
|
||||||
];
|
|
||||||
enabled = true;
|
|
||||||
};
|
|
||||||
Anytype = {
|
|
||||||
type = "local";
|
|
||||||
command = [
|
|
||||||
"sh"
|
|
||||||
"-c"
|
|
||||||
"OPENAPI_MCP_HEADERS=$(cat /run/agenix/anytype-key) exec bunx @anyproto/anytype-mcp"
|
|
||||||
];
|
|
||||||
enabled = false;
|
|
||||||
};
|
|
||||||
Basecamp = {
|
|
||||||
type = "local";
|
|
||||||
command = [
|
|
||||||
"/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/venv/bin/python"
|
|
||||||
"/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/basecamp_fastmcp.py"
|
|
||||||
];
|
|
||||||
environment = {
|
|
||||||
PYTHONPATH = "/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server";
|
|
||||||
VIRTUAL_ENV = "/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/venv";
|
|
||||||
BASECAMP_ACCOUNT_ID = "5996442";
|
|
||||||
};
|
|
||||||
enabled = false;
|
|
||||||
};
|
|
||||||
Exa = {
|
|
||||||
type = "local";
|
|
||||||
command = [
|
|
||||||
"sh"
|
|
||||||
"-c"
|
|
||||||
"EXA_API_KEY=$(cat /run/agenix/exa-key) exec bunx exa-mcp-server@latest tools=web_search_exa"
|
|
||||||
];
|
|
||||||
enabled = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
provider = {
|
|
||||||
google = {
|
|
||||||
models = {
|
|
||||||
antigravity-gemini-3-pro = {
|
|
||||||
name = "Gemini 3 Pro (Antigravity)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65535;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
variants = {
|
|
||||||
low = {thinkingLevel = "low";};
|
|
||||||
high = {thinkingLevel = "high";};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
antigravity-gemini-3-flash = {
|
|
||||||
name = "Gemini 3 Flash (Antigravity)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65536;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
variants = {
|
|
||||||
minimal = {thinkingLevel = "minimal";};
|
|
||||||
low = {thinkingLevel = "low";};
|
|
||||||
medium = {thinkingLevel = "medium";};
|
|
||||||
high = {thinkingLevel = "high";};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
antigravity-claude-sonnet-4-5 = {
|
|
||||||
name = "Claude Sonnet 4.5 (Antigravity)";
|
|
||||||
limit = {
|
|
||||||
context = 200000;
|
|
||||||
output = 64000;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
antigravity-claude-sonnet-4-5-thinking = {
|
|
||||||
name = "Claude Sonnet 4.5 Thinking (Antigravity)";
|
|
||||||
limit = {
|
|
||||||
context = 200000;
|
|
||||||
output = 64000;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
variants = {
|
|
||||||
low = {thinkingConfig = {thinkingBudget = 8192;};};
|
|
||||||
max = {thinkingConfig = {thinkingBudget = 32768;};};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
antigravity-claude-opus-4-5-thinking = {
|
|
||||||
name = "Claude Opus 4.5 Thinking (Antigravity)";
|
|
||||||
limit = {
|
|
||||||
context = 200000;
|
|
||||||
output = 64000;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
variants = {
|
|
||||||
low = {thinkingConfig = {thinkingBudget = 8192;};};
|
|
||||||
max = {thinkingConfig = {thinkingBudget = 32768;};};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
"gemini-2.5-flash" = {
|
|
||||||
name = "Gemini 2.5 Flash (Gemini CLI)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65536;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
"gemini-2.5-pro" = {
|
|
||||||
name = "Gemini 2.5 Pro (Gemini CLI)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65536;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
"gemini-3-flash-preview" = {
|
|
||||||
name = "Gemini 3 Flash Preview (Gemini CLI)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65536;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
"gemini-3-pro-preview" = {
|
|
||||||
name = "Gemini 3 Pro Preview (Gemini CLI)";
|
|
||||||
limit = {
|
|
||||||
context = 1048576;
|
|
||||||
output = 65535;
|
|
||||||
};
|
|
||||||
modalities = {
|
|
||||||
input = ["text" "image" "pdf"];
|
|
||||||
output = ["text"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
home.file.".config/opencode/oh-my-opencode.json".text = builtins.toJSON {
|
|
||||||
"$schema" = "https://raw.githubusercontent.com/code-yeongyu/oh-my-opencode/master/assets/oh-my-opencode.schema.json";
|
|
||||||
google_auth = false;
|
|
||||||
agents = {
|
|
||||||
sisyphus = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
oracle = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
librarian = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
explore = {
|
|
||||||
model = "zai-coding-plan/glm-4.5-air";
|
|
||||||
};
|
|
||||||
multimodal-looker = {
|
|
||||||
model = "zai-coding-plan/glm-4.6v";
|
|
||||||
};
|
|
||||||
prometheus = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
metis = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
momus = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
atlas = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
categories = {
|
|
||||||
visual-engineering = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
ultrabrain = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
artistry = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
quick = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
unspecified-low = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
unspecified-high = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
writing = {
|
|
||||||
model = "zai-coding-plan/glm-4.7";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
disabled_mcps = ["context7" "websearch"];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,79 +0,0 @@
|
|||||||
# DESKTOP FEATURES (home-manager)
|
|
||||||
|
|
||||||
**Wayland/Hyprland environment with color-coordinated tooling**
|
|
||||||
|
|
||||||
## OVERVIEW
|
|
||||||
12 modular desktop features with nix-colors (Dracula) integration across all components.
|
|
||||||
|
|
||||||
## STRUCTURE
|
|
||||||
```
|
|
||||||
desktop/
|
|
||||||
├── default.nix # Imports + XDG + Kitty config
|
|
||||||
├── coding.nix # Development tools (VSCode, etc.)
|
|
||||||
├── crypto.nix # Crypto wallets/tools
|
|
||||||
├── fonts.nix # Font packages
|
|
||||||
├── gaming.nix # Gaming tools/Steam
|
|
||||||
├── hyprland.nix # Hyprland WM configuration
|
|
||||||
├── media.nix # Media players/editors
|
|
||||||
├── office.nix # LibreOffice, document tools
|
|
||||||
├── rofi.nix # Application launcher
|
|
||||||
├── theme.nix # GTK/Qt theming
|
|
||||||
├── wayland.nix # Wayland utilities
|
|
||||||
└── webapps.nix # Browser-based apps
|
|
||||||
```
|
|
||||||
|
|
||||||
## WHERE TO LOOK
|
|
||||||
|
|
||||||
| Task | Location | Notes |
|
|
||||||
|------|----------|-------|
|
|
||||||
| Add desktop app | Relevant feature .nix | Update home.packages |
|
|
||||||
| Configure Hyprland | hyprland.nix | Window manager settings |
|
|
||||||
| Fix colors | Check colorScheme references | Uses config.colorScheme.palette.base* |
|
|
||||||
| Add font | fonts.nix | Increases system closure size |
|
|
||||||
|
|
||||||
## CONVENTIONS
|
|
||||||
|
|
||||||
### Color Scheme Integration
|
|
||||||
All color-aware tools reference `config.colorScheme.palette.base00` through `base0F`:
|
|
||||||
- **base00-07**: Grayscale (dark to light)
|
|
||||||
- **base08**: Red/errors
|
|
||||||
- **base09**: Orange
|
|
||||||
- **base0A**: Yellow/strings
|
|
||||||
- **base0B**: Green/functions
|
|
||||||
- **base0C**: Cyan
|
|
||||||
- **base0D**: Blue/types
|
|
||||||
- **base0E**: Purple/constants
|
|
||||||
- **base0F**: Brown
|
|
||||||
|
|
||||||
Template:
|
|
||||||
```nix
|
|
||||||
foreground = "#${config.colorScheme.palette.base05}";
|
|
||||||
background = "#${config.colorScheme.palette.base00}";
|
|
||||||
```
|
|
||||||
|
|
||||||
### Session Variables
|
|
||||||
Set in default.nix for Wayland/Hyprland:
|
|
||||||
```nix
|
|
||||||
NIXOS_OZONE_WL = "1";
|
|
||||||
QT_QPA_PLATFORM = "wayland";
|
|
||||||
XDG_CURRENT_DESKTOP = "Hyprland";
|
|
||||||
```
|
|
||||||
|
|
||||||
### XDG Defaults
|
|
||||||
- **PDF**: okular
|
|
||||||
- **Text**: nvim
|
|
||||||
- **Browser**: Zen (io.github.zen_browser.zen)
|
|
||||||
- **Archive**: file-roller
|
|
||||||
|
|
||||||
## ANTI-PATTERNS
|
|
||||||
|
|
||||||
- **DON'T** hardcode hex colors - use colorScheme palette
|
|
||||||
- **DON'T** install fonts globally - keep in user packages
|
|
||||||
- **DON'T** bypass XDG defaults - set in mimeApps
|
|
||||||
|
|
||||||
## NOTES
|
|
||||||
|
|
||||||
- Kitty terminal configured in default.nix (not separate file)
|
|
||||||
- Bibata-Modern-Ice cursor theme hardcoded
|
|
||||||
- Session path includes cargo, npm-global, bun
|
|
||||||
- Desktop features are always-enabled (no feature flags in this dir)
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.coding;
|
|
||||||
in {
|
|
||||||
options.features.desktop.coding.enable =
|
|
||||||
mkEnableOption "install coding related stuff";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
bruno
|
|
||||||
insomnia
|
|
||||||
];
|
|
||||||
coding.editors = {
|
|
||||||
neovim.enable = true;
|
|
||||||
zed.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,15 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.crypto;
|
|
||||||
in {
|
|
||||||
options.features.desktop.crypto.enable = mkEnableOption "Enable Crypto";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [bisq2 monero-gui trezor-suite];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,177 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
imports = [
|
|
||||||
./coding.nix
|
|
||||||
./crypto.nix
|
|
||||||
./fonts.nix
|
|
||||||
./gaming.nix
|
|
||||||
./hyprland.nix
|
|
||||||
./media.nix
|
|
||||||
./office.nix
|
|
||||||
./rofi.nix
|
|
||||||
./theme.nix
|
|
||||||
./wallpapers.nix
|
|
||||||
./wayland.nix
|
|
||||||
./webapps.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
xdg = {
|
|
||||||
enable = true;
|
|
||||||
configFile."mimeapps.list".force = true;
|
|
||||||
mimeApps = {
|
|
||||||
enable = true;
|
|
||||||
associations.added = {
|
|
||||||
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
|
||||||
"application/csv" = ["calc.desktop"];
|
|
||||||
"application/pdf" = ["okularApplication_pdf.desktop"];
|
|
||||||
};
|
|
||||||
defaultApplications = {
|
|
||||||
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
|
||||||
"application/csv" = ["calc.desktop"];
|
|
||||||
"application/pdf" = ["okularApplication_pdf.desktop"];
|
|
||||||
"application/md" = ["nvim.desktop"];
|
|
||||||
"application/text" = ["nvim.desktop"];
|
|
||||||
"x-scheme-handler/http" = ["io.github.zen_browser.zen"];
|
|
||||||
"x-scheme-handler/https" = ["io.github.zen_browser.zen"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
userDirs = {
|
|
||||||
enable = true;
|
|
||||||
createDirectories = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
home.sessionVariables = {
|
|
||||||
WEBKIT_DISABLE_COMPOSITING_MODE = "1";
|
|
||||||
NIXOS_OZONE_WL = "1";
|
|
||||||
TERMINAL = "kitty";
|
|
||||||
QT_QPA_PLATFORM = "wayland";
|
|
||||||
XDG_CURRENT_DESKTOP = "Hyprland";
|
|
||||||
XDG_SESSION_TYPE = "wayland";
|
|
||||||
XDG_SESSION_DESKTOP = "Hyprland";
|
|
||||||
};
|
|
||||||
home.sessionPath = ["\${XDG_BIN_HOME}" "\${HOME}/.cargo/bin" "$HOME/.npm-global/bin" "$HOME/.cache/.bun/bin"];
|
|
||||||
|
|
||||||
fonts.fontconfig.enable = true;
|
|
||||||
|
|
||||||
programs.kitty = {
|
|
||||||
enable = true;
|
|
||||||
shellIntegration = {
|
|
||||||
enableFishIntegration = true;
|
|
||||||
enableBashIntegration = true;
|
|
||||||
};
|
|
||||||
font = {name = "Fira Code";};
|
|
||||||
|
|
||||||
settings = {
|
|
||||||
copy_on_select = "yes";
|
|
||||||
|
|
||||||
# Base colors
|
|
||||||
foreground = "#${config.colorScheme.palette.base05}";
|
|
||||||
background = "#${config.colorScheme.palette.base00}";
|
|
||||||
selection_foreground = "#${config.colorScheme.palette.base07}";
|
|
||||||
selection_background = "#${config.colorScheme.palette.base02}";
|
|
||||||
|
|
||||||
# URL color
|
|
||||||
url_color = "#${config.colorScheme.palette.base08}";
|
|
||||||
|
|
||||||
# Cursor
|
|
||||||
cursor = "#${config.colorScheme.palette.base05}";
|
|
||||||
cursor_text_color = "#${config.colorScheme.palette.base00}";
|
|
||||||
|
|
||||||
# Colors 0-15
|
|
||||||
color0 = "#${config.colorScheme.palette.base01}";
|
|
||||||
color8 = "#${config.colorScheme.palette.base03}";
|
|
||||||
|
|
||||||
color1 = "#${config.colorScheme.palette.base08}";
|
|
||||||
color9 = "#${config.colorScheme.palette.base08}";
|
|
||||||
|
|
||||||
color2 = "#${config.colorScheme.palette.base0B}";
|
|
||||||
color10 = "#${config.colorScheme.palette.base0B}";
|
|
||||||
|
|
||||||
color3 = "#${config.colorScheme.palette.base0A}";
|
|
||||||
color11 = "#${config.colorScheme.palette.base0A}";
|
|
||||||
|
|
||||||
color4 = "#${config.colorScheme.palette.base0D}";
|
|
||||||
color12 = "#${config.colorScheme.palette.base0D}";
|
|
||||||
|
|
||||||
color5 = "#${config.colorScheme.palette.base0E}";
|
|
||||||
color13 = "#${config.colorScheme.palette.base0E}";
|
|
||||||
|
|
||||||
color6 = "#${config.colorScheme.palette.base0C}";
|
|
||||||
color14 = "#${config.colorScheme.palette.base0C}";
|
|
||||||
|
|
||||||
color7 = "#${config.colorScheme.palette.base05}";
|
|
||||||
color15 = "#${config.colorScheme.palette.base07}";
|
|
||||||
|
|
||||||
# Tab colors
|
|
||||||
active_tab_foreground = "#${config.colorScheme.palette.base00}";
|
|
||||||
active_tab_background = "#${config.colorScheme.palette.base05}";
|
|
||||||
inactive_tab_foreground = "#${config.colorScheme.palette.base05}";
|
|
||||||
inactive_tab_background = "#${config.colorScheme.palette.base01}";
|
|
||||||
|
|
||||||
# Mark colors
|
|
||||||
mark1_foreground = "#${config.colorScheme.palette.base00}";
|
|
||||||
mark1_background = "#${config.colorScheme.palette.base08}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
home.pointerCursor = {
|
|
||||||
gtk.enable = true;
|
|
||||||
package = pkgs.bibata-cursors;
|
|
||||||
name = "Bibata-Modern-Ice";
|
|
||||||
size = 20;
|
|
||||||
};
|
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
appimage-run
|
|
||||||
stable.anytype
|
|
||||||
# blueberry
|
|
||||||
bemoji
|
|
||||||
brave
|
|
||||||
# brightnessctl
|
|
||||||
# clipman
|
|
||||||
distrobox
|
|
||||||
launch-webapp
|
|
||||||
# eww
|
|
||||||
# firefox-devedition
|
|
||||||
file-roller
|
|
||||||
hyprpanel
|
|
||||||
seahorse
|
|
||||||
sushi
|
|
||||||
# glib
|
|
||||||
# google-chrome
|
|
||||||
# gsettings-desktop-schemas
|
|
||||||
# graphviz
|
|
||||||
ksnip
|
|
||||||
msty-studio
|
|
||||||
nwg-look
|
|
||||||
# pamixer
|
|
||||||
# pavucontrol
|
|
||||||
# libsForQt5.qtstyleplugins
|
|
||||||
# stable.nyxt
|
|
||||||
# pcmanfm
|
|
||||||
rose-pine-hyprcursor
|
|
||||||
# qt5ct
|
|
||||||
# qt6.qtwayland
|
|
||||||
#rustdesk
|
|
||||||
# socat
|
|
||||||
# unrar
|
|
||||||
# unzip
|
|
||||||
# usbutils
|
|
||||||
# v4l-utils
|
|
||||||
remmina
|
|
||||||
slack
|
|
||||||
telegram-desktop
|
|
||||||
vivaldi
|
|
||||||
vivaldi-ffmpeg-codecs
|
|
||||||
# wl-clipboard
|
|
||||||
# wlogout
|
|
||||||
# wtype
|
|
||||||
# xdg-utils
|
|
||||||
# ydotool
|
|
||||||
# zip
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -1,24 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.fonts;
|
|
||||||
in {
|
|
||||||
options.features.desktop.fonts.enable =
|
|
||||||
mkEnableOption "install additional fonts for desktop apps";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
fira-code
|
|
||||||
fira-code-symbols
|
|
||||||
nerd-fonts.fira-code
|
|
||||||
nerd-fonts.jetbrains-mono
|
|
||||||
font-manager
|
|
||||||
font-awesome_5
|
|
||||||
noto-fonts
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.gaming;
|
|
||||||
in {
|
|
||||||
options.features.desktop.gaming.enable =
|
|
||||||
mkEnableOption "install gaming related stuff";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
gamescope
|
|
||||||
gamemode
|
|
||||||
goverlay
|
|
||||||
mangohud
|
|
||||||
protonplus
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,316 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.hyprland;
|
|
||||||
in {
|
|
||||||
options.features.desktop.hyprland.enable =
|
|
||||||
mkEnableOption "Hyprland related stuff";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
wayland.windowManager.hyprland = {
|
|
||||||
settings = {
|
|
||||||
xwayland = {
|
|
||||||
force_zero_scaling = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
exec-once = [
|
|
||||||
"hyprpanel"
|
|
||||||
"while ! hyprpaper-random; do sleep 0.5; done"
|
|
||||||
"wl-paste --type text --watch cliphist store" # Stores only text data
|
|
||||||
"wl-paste --type image --watch cliphist store" # Stores only image data "wl-paste -p -t text --watch clipman store -P --histpath=\"~/.local/share/clipman-primary.json\""
|
|
||||||
];
|
|
||||||
|
|
||||||
env = [
|
|
||||||
"XCURSOR_SIZE,32"
|
|
||||||
"HYPRCURSOR_THEME,Bibata-Modern-Ice"
|
|
||||||
"WLR_NO_HARDWARE_CURSORS,1"
|
|
||||||
"GTK_THEME,Dracula"
|
|
||||||
"XDG_CURRENT_DESKTOP,Hyprland"
|
|
||||||
"XDG_SESSION_TYPE,wayland"
|
|
||||||
"XDG_SESSION_DESKTOP,Hyprland"
|
|
||||||
"NIXOS_OZONE_WL,1"
|
|
||||||
];
|
|
||||||
|
|
||||||
input = {
|
|
||||||
kb_layout = "de,us";
|
|
||||||
kb_variant = "";
|
|
||||||
kb_model = "";
|
|
||||||
kb_rules = "";
|
|
||||||
kb_options = "ctrl:nocaps";
|
|
||||||
follow_mouse = 1;
|
|
||||||
};
|
|
||||||
|
|
||||||
general = {
|
|
||||||
gaps_in = 5;
|
|
||||||
gaps_out = 5;
|
|
||||||
border_size = 1;
|
|
||||||
# Keeping the existing active border as requested
|
|
||||||
"col.active_border" = "rgba(9742b5ee) rgba(9742b5ee) 45deg";
|
|
||||||
"col.inactive_border" = "rgba(${config.colorScheme.palette.base03}aa)";
|
|
||||||
layout = "dwindle";
|
|
||||||
};
|
|
||||||
|
|
||||||
decoration = {
|
|
||||||
shadow = {
|
|
||||||
enabled = true;
|
|
||||||
range = 60;
|
|
||||||
render_power = 3;
|
|
||||||
color = "rgba(${config.colorScheme.palette.base00}66)";
|
|
||||||
offset = "1 2";
|
|
||||||
scale = 0.97;
|
|
||||||
};
|
|
||||||
rounding = 8;
|
|
||||||
blur = {
|
|
||||||
enabled = true;
|
|
||||||
size = 3;
|
|
||||||
passes = 3;
|
|
||||||
};
|
|
||||||
active_opacity = 0.9;
|
|
||||||
inactive_opacity = 0.5;
|
|
||||||
};
|
|
||||||
|
|
||||||
animations = {
|
|
||||||
enabled = true;
|
|
||||||
bezier = "myBezier, 0.05, 0.9, 0.1, 1.05";
|
|
||||||
animation = [
|
|
||||||
"windows, 1, 7, myBezier"
|
|
||||||
"windowsOut, 1, 7, default, popin 80%"
|
|
||||||
"border, 1, 10, default"
|
|
||||||
"borderangle, 1, 8, default"
|
|
||||||
"fade, 1, 7, default"
|
|
||||||
"workspaces, 1, 6, default"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
dwindle = {
|
|
||||||
pseudotile = true;
|
|
||||||
preserve_split = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
master = {
|
|
||||||
new_status = "master";
|
|
||||||
};
|
|
||||||
|
|
||||||
device = [
|
|
||||||
{
|
|
||||||
name = "epic-mouse-v1";
|
|
||||||
sensitivity = -0.5;
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "zsa-technology-labs-moonlander-mark-i";
|
|
||||||
kb_layout = "us";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
name = "keychron-keychron-k7";
|
|
||||||
kb_layout = "us";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
windowrule = [
|
|
||||||
# Floating dialogs
|
|
||||||
"match:class file_progress, float on"
|
|
||||||
"match:class confirm, float on"
|
|
||||||
"match:class dialog, float on"
|
|
||||||
"match:class download, float on"
|
|
||||||
"match:class notification, float on"
|
|
||||||
"match:class error, float on"
|
|
||||||
"match:class splash, float on"
|
|
||||||
"match:class confirmreset, float on"
|
|
||||||
"match:title Open File, float on"
|
|
||||||
"match:title branchdialog, float on"
|
|
||||||
"match:class pavucontrol-qt, float on"
|
|
||||||
"match:class pavucontrol, float on"
|
|
||||||
# wlogout
|
|
||||||
"match:class wlogout, fullscreen on"
|
|
||||||
"match:title wlogout, float on"
|
|
||||||
"match:title wlogout, fullscreen on"
|
|
||||||
# mpv
|
|
||||||
"match:class mpv, float on"
|
|
||||||
"match:class mpv, idle_inhibit focus"
|
|
||||||
"match:class mpv, opacity 1.0 override"
|
|
||||||
# Media/Volume/PiP
|
|
||||||
"match:title ^(Media viewer)$, float on"
|
|
||||||
"match:title ^(Volume Control)$, float on"
|
|
||||||
"match:title ^(Picture-in-Picture)$, float on"
|
|
||||||
# Pomodoro timer
|
|
||||||
"match:title ^(floating-pomodoro)$, float on"
|
|
||||||
"match:title ^(floating-pomodoro)$, size 250 50"
|
|
||||||
"match:title ^(floating-pomodoro)$, move 12 (monitor_h-150)"
|
|
||||||
"match:title ^(floating-pomodoro)$, pin on"
|
|
||||||
# Streamlabs overlays
|
|
||||||
"match:initial_title .*streamlabs.com.*, float on"
|
|
||||||
"match:initial_title .*streamlabs.com.*, pin on"
|
|
||||||
"match:initial_title .*streamlabs.com.*, size 800 400"
|
|
||||||
"match:initial_title .*alert-box.*, move 100%-820 102"
|
|
||||||
"match:initial_title .*chat-box.*, move 100%-820 512"
|
|
||||||
"match:initial_title .*streamlabs.com.*, opacity 0.5 override"
|
|
||||||
"match:initial_title .*streamlabs.com.*, idle_inhibit focus"
|
|
||||||
"match:initial_title .*streamlabs.com.*, no_anim on"
|
|
||||||
"match:initial_title .*streamlabs.com.*, decorate off"
|
|
||||||
"match:initial_title .*streamlabs.com.*, no_shadow on"
|
|
||||||
"match:initial_title .*streamlabs.com.*, no_blur on"
|
|
||||||
"border_color rgb(ffffff), match:xwayland 1"
|
|
||||||
];
|
|
||||||
"$mainMod" = "SUPER";
|
|
||||||
"$terminal" = "kitty";
|
|
||||||
|
|
||||||
bind = [
|
|
||||||
"$mainMod, return, exec, $terminal nu -c zellij-ps"
|
|
||||||
# "$mainMod, t, exec, warp-terminal"
|
|
||||||
"$mainMod, t, exec, $terminal -e nu -c 'nitch; exec nu'"
|
|
||||||
"$mainMod SHIFT, t, exec, launch-timer"
|
|
||||||
"$mainMod, n, exec, $terminal -e nvim"
|
|
||||||
"$mainMod, z, exec, uwsm app -- zeditor"
|
|
||||||
"$mainMod, o, exec, hyprctl setprop activewindow opaque toggle"
|
|
||||||
"$mainMod, r, exec, hyprctl dispatch focuswindow \"initialtitle:.*alert-box.*\" && hyprctl dispatch moveactive exact 4300 102 && hyprctl dispatch focuswindow \"initialtitle:.*chat-box.*\" && hyprctl dispatch moveactive exact 4300 512"
|
|
||||||
"$mainMod, b, exec, uwsm app -- thunar"
|
|
||||||
"$mainMod SHIFT, B, exec, uwsm app -- vivaldi"
|
|
||||||
"$mainMod, Escape, exec, uwsm app -- wlogout -p layer-shell"
|
|
||||||
"$mainMod, Space, togglefloating"
|
|
||||||
"$mainMod, q, killactive"
|
|
||||||
"$mainMod, M, exit"
|
|
||||||
"$mainMod, F, fullscreen"
|
|
||||||
"$mainMod SHIFT, V, togglefloating"
|
|
||||||
"$mainMod, D, exec, uwsm app -- rofi -show drun -run-command \"uwsm app -- {cmd}\""
|
|
||||||
"$mainMod, V, exec, uwsm app -- cliphist list | rofi -dmenu | cliphist decode | wl-copy"
|
|
||||||
"$mainMod, C, exec, bash -c 'FILE=/tmp/screenshot_$(date +%s).png; grim -g \"$(slurp)\" \"$FILE\" && ksnip \"$FILE\"'"
|
|
||||||
"$mainMod SHIFT, S, exec, uwsm app -- rofi -show emoji"
|
|
||||||
"$mainMod, P, exec, uwsm app -- rofi-pass"
|
|
||||||
"$mainMod SHIFT, P, pseudo"
|
|
||||||
"$mainMod, R, exec, stt-ptt start"
|
|
||||||
"$mainMod, J, togglesplit"
|
|
||||||
"$mainMod, h, movefocus, l"
|
|
||||||
"$mainMod, l, movefocus, r"
|
|
||||||
"$mainMod, k, movefocus, u"
|
|
||||||
"$mainMod, j, movefocus, d"
|
|
||||||
"$mainMod, 1, workspace, 1"
|
|
||||||
"$mainMod, 2, workspace, 2"
|
|
||||||
"$mainMod, 3, workspace, 3"
|
|
||||||
"$mainMod, 4, workspace, 4"
|
|
||||||
"$mainMod, 5, workspace, 5"
|
|
||||||
"$mainMod, 6, workspace, 6"
|
|
||||||
"$mainMod, 7, workspace, 7"
|
|
||||||
"$mainMod, 8, workspace, 8"
|
|
||||||
"$mainMod, 9, workspace, 9"
|
|
||||||
"$mainMod, 0, workspace, 10"
|
|
||||||
"$mainMod SHIFT, 1, movetoworkspace, 1"
|
|
||||||
"$mainMod SHIFT, 2, movetoworkspace, 2"
|
|
||||||
"$mainMod SHIFT, 3, movetoworkspace, 3"
|
|
||||||
"$mainMod SHIFT, 4, movetoworkspace, 4"
|
|
||||||
"$mainMod SHIFT, 5, movetoworkspace, 5"
|
|
||||||
"$mainMod SHIFT, 6, movetoworkspace, 6"
|
|
||||||
"$mainMod SHIFT, 7, movetoworkspace, 7"
|
|
||||||
"$mainMod SHIFT, 8, movetoworkspace, 8"
|
|
||||||
"$mainMod SHIFT, 9, movetoworkspace, 9"
|
|
||||||
"$mainMod SHIFT, 0, movetoworkspace, 10"
|
|
||||||
"$mainMod, mouse_down, workspace, e+1"
|
|
||||||
"$mainMod, mouse_up, workspace, e-1"
|
|
||||||
];
|
|
||||||
bindr = [
|
|
||||||
"$mainMod, R, exec, stt-ptt stop"
|
|
||||||
];
|
|
||||||
bindm = [
|
|
||||||
"$mainMod, mouse:272, movewindow"
|
|
||||||
"$mainMod, mouse:273, resizewindow"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
services.hypridle = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
general = {
|
|
||||||
before_sleep_cmd = "hyprlock";
|
|
||||||
after_sleep_cmd = "hyprctl dispatch dpms on";
|
|
||||||
inhibit_sleep = 3;
|
|
||||||
};
|
|
||||||
|
|
||||||
listener = [
|
|
||||||
{
|
|
||||||
timeout = 300; # 5 min
|
|
||||||
on-timeout = "hyprlock";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
timeout = 420; # 5.5 min
|
|
||||||
on-timeout = "hyprctl dispatch dpms off";
|
|
||||||
on-resume = "hyprctl dispatch dpms on";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.hyprpaper.enable = true;
|
|
||||||
|
|
||||||
programs.hyprlock = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
"$font" = "JetBrainsMono Nerd Font";
|
|
||||||
"$base" = "rgb(${config.colorScheme.palette.base00})";
|
|
||||||
"$text" = "rgb(${config.colorScheme.palette.base05})";
|
|
||||||
"$textAlpha" = "${config.colorScheme.palette.base05}";
|
|
||||||
"$accentAlpha" = "${config.colorScheme.palette.base0D}";
|
|
||||||
"$red" = "rgb(${config.colorScheme.palette.base08})";
|
|
||||||
"$yellow" = "rgb(${config.colorScheme.palette.base0A})";
|
|
||||||
|
|
||||||
general = {
|
|
||||||
hide_cursor = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
background = {
|
|
||||||
monitor = "";
|
|
||||||
path = "${config.home.homeDirectory}/.config/hypr/wallpapers/wallhaven-lmmo8r.jpg";
|
|
||||||
blur_passes = 0;
|
|
||||||
color = "rgb(${config.colorScheme.palette.base00})";
|
|
||||||
};
|
|
||||||
|
|
||||||
label = [
|
|
||||||
{
|
|
||||||
monitor = "";
|
|
||||||
text = "$TIME";
|
|
||||||
color = "$text";
|
|
||||||
font_size = 90;
|
|
||||||
font_family = "$font";
|
|
||||||
position = "30, 0";
|
|
||||||
halign = "left";
|
|
||||||
valign = "top";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
monitor = "";
|
|
||||||
text = ''cmd[update:43200000] echo "$(date +"%A, %d %B %Y")"'';
|
|
||||||
color = "$text";
|
|
||||||
font_size = 25;
|
|
||||||
font_family = "$font";
|
|
||||||
position = "30, -150";
|
|
||||||
halign = "left";
|
|
||||||
valign = "top";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
input-field = [
|
|
||||||
{
|
|
||||||
monitor = "";
|
|
||||||
size = "300, 60";
|
|
||||||
outline_thickness = 4;
|
|
||||||
dots_size = 0.2;
|
|
||||||
dots_spacing = 0.2;
|
|
||||||
dots_center = true;
|
|
||||||
outer_color = "rgb(${config.colorScheme.palette.base0D})";
|
|
||||||
inner_color = "rgb(${config.colorScheme.palette.base00})";
|
|
||||||
font_color = "rgb(${config.colorScheme.palette.base05})";
|
|
||||||
fade_on_empty = false;
|
|
||||||
placeholder_text = ''<span foreground="##${config.colorScheme.palette.base05}"> Logged in as <span foreground="##${config.colorScheme.palette.base0D}">$USER</span></span>'';
|
|
||||||
hide_input = false;
|
|
||||||
check_color = "rgb(${config.colorScheme.palette.base0D})";
|
|
||||||
fail_color = "rgb(${config.colorScheme.palette.base08})";
|
|
||||||
fail_text = ''<i>$FAIL <b>($ATTEMPTS)</b></i>'';
|
|
||||||
capslock_color = "rgb(${config.colorScheme.palette.base0A})";
|
|
||||||
position = "0, -35";
|
|
||||||
halign = "center";
|
|
||||||
valign = "center";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,56 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.media;
|
|
||||||
in {
|
|
||||||
options.features.desktop.media.enable =
|
|
||||||
mkEnableOption "enable media features";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
# handbrake
|
|
||||||
# kdePackages.kdenlive
|
|
||||||
# makemkv
|
|
||||||
# mediainfo
|
|
||||||
amf
|
|
||||||
blueberry
|
|
||||||
ffmpeg_6-full
|
|
||||||
gst_all_1.gstreamer
|
|
||||||
gst_all_1.gst-vaapi
|
|
||||||
handbrake
|
|
||||||
inkscape
|
|
||||||
kdePackages.kdenlive
|
|
||||||
krita
|
|
||||||
libation
|
|
||||||
#makemkv
|
|
||||||
pamixer
|
|
||||||
pavucontrol
|
|
||||||
qpwgraph
|
|
||||||
v4l-utils
|
|
||||||
#plexamp
|
|
||||||
# uxplay
|
|
||||||
# vlc
|
|
||||||
# webcord
|
|
||||||
# yt-dlp
|
|
||||||
unimatrix
|
|
||||||
];
|
|
||||||
|
|
||||||
programs = {
|
|
||||||
mpv = {
|
|
||||||
enable = true;
|
|
||||||
bindings = {
|
|
||||||
WHEEL_UP = "seek 10";
|
|
||||||
WHEEL_DOWN = "seek -10";
|
|
||||||
};
|
|
||||||
config = {
|
|
||||||
profile = "gpu-hq";
|
|
||||||
ytdl-format = "bestvideo+bestaudio";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.office;
|
|
||||||
in {
|
|
||||||
options.features.desktop.office.enable =
|
|
||||||
mkEnableOption "install office and paperwork stuff";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
libreoffice-fresh
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,206 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.rofi;
|
|
||||||
in {
|
|
||||||
options.features.desktop.rofi.enable = mkEnableOption "enable rofi";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
programs.rofi = with pkgs; {
|
|
||||||
enable = true;
|
|
||||||
package = rofi.override {
|
|
||||||
plugins = [
|
|
||||||
rofi-calc
|
|
||||||
rofi-emoji
|
|
||||||
stable.rofi-file-browser
|
|
||||||
];
|
|
||||||
};
|
|
||||||
pass = {
|
|
||||||
enable = true;
|
|
||||||
package = rofi-pass-wayland;
|
|
||||||
};
|
|
||||||
terminal = "\${pkgs.kitty}/bin/kitty";
|
|
||||||
font = "Fira Code";
|
|
||||||
extraConfig = {
|
|
||||||
show-icons = true;
|
|
||||||
disable-history = false;
|
|
||||||
modi = "drun,calc,emoji,filebrowser";
|
|
||||||
kb-primary-paste = "Control+V,Shift+Insert";
|
|
||||||
kb-secondary-paste = "Control+v,Insert";
|
|
||||||
};
|
|
||||||
theme = let
|
|
||||||
inherit (config.colorScheme) palette;
|
|
||||||
in
|
|
||||||
builtins.toString (pkgs.writeText "rofi-universal-theme.rasi" ''
|
|
||||||
* {
|
|
||||||
/* Universal theme colors from nix-colors */
|
|
||||||
background: #${palette.base00};
|
|
||||||
surface: #${palette.base01};
|
|
||||||
overlay: #${palette.base02};
|
|
||||||
muted: #${palette.base03};
|
|
||||||
subtle: #${palette.base04};
|
|
||||||
text: #${palette.base05};
|
|
||||||
bright-text: #${palette.base06};
|
|
||||||
highlight: #${palette.base07};
|
|
||||||
accent1: #${palette.base08};
|
|
||||||
accent2: #${palette.base09};
|
|
||||||
accent3: #${palette.base0A};
|
|
||||||
accent4: #${palette.base0B};
|
|
||||||
accent5: #${palette.base0C};
|
|
||||||
accent6: #${palette.base0D};
|
|
||||||
accent7: #${palette.base0E};
|
|
||||||
accent8: #${palette.base0F};
|
|
||||||
|
|
||||||
/* Global properties */
|
|
||||||
background-color: @background;
|
|
||||||
text-color: @text;
|
|
||||||
font: "Fira Code 12";
|
|
||||||
border: 0;
|
|
||||||
margin: 0;
|
|
||||||
padding: 0;
|
|
||||||
spacing: 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
window {
|
|
||||||
background-color: @background;
|
|
||||||
border: 1px;
|
|
||||||
border-color: @accent7;
|
|
||||||
border-radius: 6px;
|
|
||||||
width: 40%;
|
|
||||||
padding: 16px;
|
|
||||||
}
|
|
||||||
|
|
||||||
inputbar {
|
|
||||||
children: [ prompt, entry ];
|
|
||||||
spacing: 12px;
|
|
||||||
padding: 8px;
|
|
||||||
border-radius: 4px;
|
|
||||||
background-color: @surface;
|
|
||||||
}
|
|
||||||
|
|
||||||
prompt {
|
|
||||||
text-color: @accent7;
|
|
||||||
background-color: transparent;
|
|
||||||
}
|
|
||||||
|
|
||||||
entry {
|
|
||||||
placeholder: "Search...";
|
|
||||||
placeholder-color: @subtle;
|
|
||||||
text-color: @text;
|
|
||||||
background-color: transparent;
|
|
||||||
cursor-color: @accent7;
|
|
||||||
}
|
|
||||||
|
|
||||||
message {
|
|
||||||
background-color: @surface;
|
|
||||||
border-radius: 4px;
|
|
||||||
padding: 8px;
|
|
||||||
margin: 8px 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
textbox {
|
|
||||||
text-color: @text;
|
|
||||||
background-color: transparent;
|
|
||||||
}
|
|
||||||
|
|
||||||
listview {
|
|
||||||
background-color: transparent;
|
|
||||||
margin: 8px 0 0;
|
|
||||||
lines: 10;
|
|
||||||
columns: 1;
|
|
||||||
fixed-height: true;
|
|
||||||
scrollbar: false;
|
|
||||||
}
|
|
||||||
|
|
||||||
element {
|
|
||||||
background-color: transparent;
|
|
||||||
text-color: @text;
|
|
||||||
padding: 8px;
|
|
||||||
border-radius: 4px;
|
|
||||||
spacing: 8px;
|
|
||||||
}
|
|
||||||
|
|
||||||
element normal.normal {
|
|
||||||
background-color: transparent;
|
|
||||||
text-color: @text;
|
|
||||||
}
|
|
||||||
|
|
||||||
element selected.normal {
|
|
||||||
background-color: @accent7;
|
|
||||||
text-color: @background;
|
|
||||||
}
|
|
||||||
|
|
||||||
element alternate.normal {
|
|
||||||
background-color: transparent;
|
|
||||||
text-color: @text;
|
|
||||||
}
|
|
||||||
|
|
||||||
element-icon {
|
|
||||||
background-color: transparent;
|
|
||||||
size: 24px;
|
|
||||||
}
|
|
||||||
|
|
||||||
element-text {
|
|
||||||
background-color: transparent;
|
|
||||||
text-color: inherit;
|
|
||||||
vertical-align: 0.5;
|
|
||||||
}
|
|
||||||
|
|
||||||
mode-switcher {
|
|
||||||
spacing: 0;
|
|
||||||
background-color: @surface;
|
|
||||||
border-radius: 4px;
|
|
||||||
margin: 8px 0 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
button {
|
|
||||||
padding: 8px 16px;
|
|
||||||
background-color: transparent;
|
|
||||||
text-color: @text;
|
|
||||||
border-radius: 4px;
|
|
||||||
}
|
|
||||||
|
|
||||||
button selected {
|
|
||||||
background-color: @accent7;
|
|
||||||
text-color: @background;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Scrollbar */
|
|
||||||
scrollbar {
|
|
||||||
width: 4px;
|
|
||||||
border: 0;
|
|
||||||
handle-color: @accent7;
|
|
||||||
handle-width: 4px;
|
|
||||||
padding: 0;
|
|
||||||
}
|
|
||||||
'');
|
|
||||||
};
|
|
||||||
cli.rofi-project-opener = {
|
|
||||||
enable = true;
|
|
||||||
projectDirs = {
|
|
||||||
AI = {
|
|
||||||
path = "~/p/AI";
|
|
||||||
args = "";
|
|
||||||
};
|
|
||||||
CHAT = {
|
|
||||||
path = "~/p/CHAT";
|
|
||||||
args = "--agent chiron";
|
|
||||||
};
|
|
||||||
MISC = {
|
|
||||||
path = "~/p/MISC";
|
|
||||||
args = "--agent chiron-forge";
|
|
||||||
};
|
|
||||||
NIX = {
|
|
||||||
path = "~/p/NIX";
|
|
||||||
args = "";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
terminal = pkgs.kitty;
|
|
||||||
terminalCommand = "opencode %a";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
{
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
qt = {
|
|
||||||
enable = true;
|
|
||||||
platformTheme.name = "gtk";
|
|
||||||
};
|
|
||||||
gtk = {
|
|
||||||
enable = true;
|
|
||||||
theme = {
|
|
||||||
name = "Dracula";
|
|
||||||
package = pkgs.dracula-theme;
|
|
||||||
};
|
|
||||||
iconTheme = {
|
|
||||||
name = "Dracula";
|
|
||||||
package = pkgs.dracula-icon-theme;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.wallpapers;
|
|
||||||
in {
|
|
||||||
options.features.desktop.wallpapers = mkEnableOption "Wallpapers for Hyprland";
|
|
||||||
|
|
||||||
config = mkIf cfg {
|
|
||||||
xdg.configFile."hypr/wallpapers" = {
|
|
||||||
source = ../../m3tam3re/wallpapers;
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.wayland;
|
|
||||||
in {
|
|
||||||
options.features.desktop.wayland.enable = mkEnableOption "wayland extra tools and config";
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
grim
|
|
||||||
hyprcursor
|
|
||||||
hyprlock
|
|
||||||
hyprpaper
|
|
||||||
qt6.qtwayland
|
|
||||||
slurp
|
|
||||||
waypipe
|
|
||||||
wl-clipboard
|
|
||||||
wf-recorder
|
|
||||||
wl-mirror
|
|
||||||
wlogout
|
|
||||||
wtype
|
|
||||||
ydotool
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,55 +0,0 @@
|
|||||||
{
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
icons = {
|
|
||||||
teams = pkgs.fetchurl {
|
|
||||||
url = "https://cdn.jsdelivr.net/gh/homarr-labs/dashboard-icons/svg/microsoft-teams.svg";
|
|
||||||
sha256 = "sha256-Pr9QS8nnXJq97r4/G3c6JXi34zxHl0ps9gcyI8cN/s8=";
|
|
||||||
};
|
|
||||||
outlook = pkgs.fetchurl {
|
|
||||||
url = "https://cdn.jsdelivr.net/gh/homarr-labs/dashboard-icons/svg/microsoft-outlook.svg";
|
|
||||||
sha256 = "sha256-3u8t5QNHFZvrAegxBiGicO4PjtMWhEaQSCv7MSSfLLc=";
|
|
||||||
};
|
|
||||||
opencode = pkgs.fetchurl {
|
|
||||||
url = "https://cdn.jsdelivr.net/gh/homarr-labs/dashboard-icons/svg/opencode-dark.svg";
|
|
||||||
sha256 = "1lms4f8habamvdh2qqqz9psx4py9wx23mmlkkds44pvrbq3bkj3n";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in {
|
|
||||||
xdg.desktopEntries = {
|
|
||||||
teams = {
|
|
||||||
name = "Microsoft Teams";
|
|
||||||
exec = "launch-webapp https://teams.microsoft.com";
|
|
||||||
comment = "Open Microsoft Teams as a Desktop App";
|
|
||||||
categories = ["Application" "Network" "Chat"];
|
|
||||||
terminal = false;
|
|
||||||
icon = icons.teams;
|
|
||||||
};
|
|
||||||
outlook = {
|
|
||||||
name = "Microsoft Outlook";
|
|
||||||
exec = "launch-webapp https://outlook.office.com/mail/";
|
|
||||||
comment = "Open Microsoft Outlook as a Desktop App";
|
|
||||||
categories = ["Application" "Network"];
|
|
||||||
terminal = false;
|
|
||||||
icon = icons.outlook;
|
|
||||||
};
|
|
||||||
basecamp = {
|
|
||||||
name = "Basecamp";
|
|
||||||
exec = "launch-webapp https://3.basecamp.com/5996442/";
|
|
||||||
comment = "Open Basecamp as a Desktop App";
|
|
||||||
categories = ["Application" "Network"];
|
|
||||||
terminal = false;
|
|
||||||
icon = "/home/sascha.koenig/.local/share/icons/basecamp-logo.png";
|
|
||||||
};
|
|
||||||
opencode = {
|
|
||||||
name = "Opencode";
|
|
||||||
exec = "rofi-project-opener";
|
|
||||||
comment = "Open Opencode Terminal App";
|
|
||||||
categories = ["Application" "Development"];
|
|
||||||
terminal = false;
|
|
||||||
icon = icons.opencode;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,120 +0,0 @@
|
|||||||
# This is a default home.nix generated by the follwing hone-manager command
|
|
||||||
#
|
|
||||||
# home-manager init ./
|
|
||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
# Home Manager needs a bit of information about you and the paths it should
|
|
||||||
# manage.
|
|
||||||
home.username = lib.mkDefault "your-name";
|
|
||||||
home.homeDirectory = lib.mkDefault "/home/${config.home.username}";
|
|
||||||
|
|
||||||
# This value determines the Home Manager release that your configuration is
|
|
||||||
# compatible with. This helps avoid breakage when a new Home Manager release
|
|
||||||
# introduces backwards incompatible changes.
|
|
||||||
#
|
|
||||||
# You should not change this value, even if you update Home Manager. If you do
|
|
||||||
# want to update the value, then make sure to first check the Home Manager
|
|
||||||
# release notes.
|
|
||||||
home.stateVersion = "24.11"; # Please read the comment before changing.
|
|
||||||
|
|
||||||
# The home.packages option allows you to install Nix packages into your
|
|
||||||
# environment.
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
# # Adds the 'hello' command to your environment. It prints a friendly
|
|
||||||
# # "Hello, world!" when run.
|
|
||||||
# pkgs.hello
|
|
||||||
|
|
||||||
# # It is sometimes useful to fine-tune packages, for example, by applying
|
|
||||||
# # overrides. You can do that directly here, just don't forget the
|
|
||||||
# # parentheses. Maybe you want to install Nerd Fonts with a limited number of
|
|
||||||
# # fonts?
|
|
||||||
# (pkgs.nerdfonts.override { fonts = [ "FantasqueSansMono" ]; })
|
|
||||||
|
|
||||||
# # You can also create simple shell scripts directly inside your
|
|
||||||
# # configuration. For example, this adds a command 'my-hello' to your
|
|
||||||
# # environment:
|
|
||||||
# (pkgs.writeShellScriptBin "my-hello" ''
|
|
||||||
# echo "Hello, ${config.home.username}!"
|
|
||||||
# '')
|
|
||||||
];
|
|
||||||
|
|
||||||
# Home Manager is pretty good at managing dotfiles. The primary way to manage
|
|
||||||
# plain files is through 'home.file'.
|
|
||||||
home.file = {
|
|
||||||
# # Building this configuration will create a copy of 'dotfiles/screenrc' in
|
|
||||||
# # the Nix store. Activating the configuration will then make '~/.screenrc' a
|
|
||||||
# # symlink to the Nix store copy.
|
|
||||||
# ".screenrc".source = dotfiles/screenrc;
|
|
||||||
|
|
||||||
# # You can also set the file content immediately.
|
|
||||||
# ".gradle/gradle.properties".text = ''
|
|
||||||
# org.gradle.console=verbose
|
|
||||||
# org.gradle.daemon.idletimeout=3600000
|
|
||||||
# '';
|
|
||||||
};
|
|
||||||
|
|
||||||
# Home Manager can also manage your environment variables through
|
|
||||||
# 'home.sessionVariables'. If you don't want to manage your shell through Home
|
|
||||||
# Manager then you have to manually source 'hm-session-vars.sh' located at
|
|
||||||
# either
|
|
||||||
#
|
|
||||||
# ~/.nix-profile/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
# or
|
|
||||||
#
|
|
||||||
# ~/.local/state/nix/profiles/profile/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
# or
|
|
||||||
#
|
|
||||||
# /etc/profiles/per-user/m3tam3re/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
home.sessionVariables = {
|
|
||||||
# EDITOR = "emacs";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Let Home Manager install and manage itself.
|
|
||||||
programs.home-manager.enable = true;
|
|
||||||
|
|
||||||
programs.git = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
user = {
|
|
||||||
name = "m3tm3re";
|
|
||||||
email = "p@m3ta.dev";
|
|
||||||
};
|
|
||||||
core.excludesfile = "~/.gitignore_global";
|
|
||||||
init.defaultBranch = "master";
|
|
||||||
alias = {
|
|
||||||
st = "status";
|
|
||||||
logd = "log --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# programs.zellij-ps = {
|
|
||||||
# enable = true;
|
|
||||||
# projectFolders = [
|
|
||||||
# "${config.home.homeDirectory}/p/c"
|
|
||||||
# "${config.home.homeDirectory}/p"
|
|
||||||
# "${config.home.homeDirectory}/.config"
|
|
||||||
# ];
|
|
||||||
# layout = ''
|
|
||||||
# layout {
|
|
||||||
# pane size=1 borderless=true {
|
|
||||||
# plugin location="zellij:tab-bar"
|
|
||||||
# }
|
|
||||||
# pane size="70%" command="nvim"
|
|
||||||
# pane split_direction="vertical" {
|
|
||||||
# pane
|
|
||||||
# pane command="unimatrix"
|
|
||||||
# }
|
|
||||||
# pane size=1 borderless=true {
|
|
||||||
# plugin location="zellij:status-bar"
|
|
||||||
# }
|
|
||||||
# }
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
}
|
|
||||||
@@ -1,250 +0,0 @@
|
|||||||
# This is a default home.nix generated by the follwing hone-manager command
|
|
||||||
#
|
|
||||||
# home-manager init ./
|
|
||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
# Home Manager needs a bit of information about you and the paths it should
|
|
||||||
# manage.
|
|
||||||
home.username = lib.mkDefault "your-name";
|
|
||||||
home.homeDirectory = lib.mkDefault "/home/${config.home.username}";
|
|
||||||
|
|
||||||
# This value determines the Home Manager release that your configuration is
|
|
||||||
# compatible with. This helps avoid breakage when a new Home Manager release
|
|
||||||
# introduces backwards incompatible changes.
|
|
||||||
#
|
|
||||||
# You should not change this value, even if you update Home Manager. If you do
|
|
||||||
# want to update the value, then make sure to first check the Home Manager
|
|
||||||
# release notes.
|
|
||||||
home.stateVersion = "24.11"; # Please read the comment before changing.
|
|
||||||
|
|
||||||
# The home.packages option allows you to install Nix packages into your
|
|
||||||
# environment.
|
|
||||||
home.packages = with pkgs; [
|
|
||||||
libgtop
|
|
||||||
# # Adds the 'hello' command to your environment. It prints a friendly
|
|
||||||
# # "Hello, world!" when run.
|
|
||||||
# pkgs.hello
|
|
||||||
|
|
||||||
# # It is sometimes useful to fine-tune packages, for example, by applying
|
|
||||||
# # overrides. You can do that directly here, just don't forget the
|
|
||||||
# # parentheses. Maybe you want to install Nerd Fonts with a limited number of
|
|
||||||
# # fonts?
|
|
||||||
# (pkgs.nerdfonts.override { fonts = [ "FantasqueSansMono" ]; })
|
|
||||||
|
|
||||||
# # You can also create simple shell scripts directly inside your
|
|
||||||
# # configuration. For example, this adds a command 'my-hello' to your
|
|
||||||
# # environment:
|
|
||||||
# (pkgs.writeShellScriptBin "my-hello" ''
|
|
||||||
# echo "Hello, ${config.home.username}!"
|
|
||||||
# '')
|
|
||||||
];
|
|
||||||
|
|
||||||
# Home Manager is pretty good at managing dotfiles. The primary way to manage
|
|
||||||
# plain files is through 'home.file'.
|
|
||||||
home.file = {
|
|
||||||
# # Building this configuration will create a copy of 'dotfiles/screenrc' in
|
|
||||||
# # the Nix store. Activating the configuration will then make '~/.screenrc' a
|
|
||||||
# # symlink to the Nix store copy.
|
|
||||||
# ".screenrc".source = dotfiles/screenrc;
|
|
||||||
|
|
||||||
# # You can also set the file content immediately.
|
|
||||||
# ".gradle/gradle.properties".text = ''
|
|
||||||
# org.gradle.console=verbose
|
|
||||||
# org.gradle.daemon.idletimeout=3600000
|
|
||||||
# '';
|
|
||||||
};
|
|
||||||
|
|
||||||
# Home Manager can also manage your environment variables through
|
|
||||||
# 'home.sessionVariables'. If you don't want to manage your shell through Home
|
|
||||||
# Manager then you have to manually source 'hm-session-vars.sh' located at
|
|
||||||
# either
|
|
||||||
#
|
|
||||||
# ~/.nix-profile/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
# or
|
|
||||||
#
|
|
||||||
# ~/.local/state/nix/profiles/profile/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
# or
|
|
||||||
#
|
|
||||||
# /etc/profiles/per-user/m3tam3re/etc/profile.d/hm-session-vars.sh
|
|
||||||
#
|
|
||||||
home.sessionVariables = {
|
|
||||||
# EDITOR = "emacs";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Let Home Manager install and manage itself.
|
|
||||||
programs.home-manager.enable = true;
|
|
||||||
|
|
||||||
services.cliphist = {
|
|
||||||
enable = true;
|
|
||||||
allowImages = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.git = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
user = {
|
|
||||||
name = "m3tm3re";
|
|
||||||
email = "p@m3ta.dev";
|
|
||||||
};
|
|
||||||
core.excludesfile = "~/.gitignore_global";
|
|
||||||
init.defaultBranch = "master";
|
|
||||||
alias = {
|
|
||||||
st = "status";
|
|
||||||
logd = "log --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.difftastic.enable = true;
|
|
||||||
|
|
||||||
programs.jujutsu = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
user = {
|
|
||||||
email = "m@m3tam3re.com";
|
|
||||||
name = "Sascha Koenig";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.ssh = {
|
|
||||||
enable = true;
|
|
||||||
enableDefaultConfig = false;
|
|
||||||
matchBlocks = {
|
|
||||||
"AZ-CLD-1" = {
|
|
||||||
hostname = "152.53.186.119";
|
|
||||||
user = "sascha.koenig";
|
|
||||||
port = 2022;
|
|
||||||
identityFile = "~/.ssh/sascha.koenig";
|
|
||||||
};
|
|
||||||
"github.com" = {
|
|
||||||
hostname = "github.com";
|
|
||||||
user = "m3tam3re";
|
|
||||||
port = 22;
|
|
||||||
identityFile = "~/.ssh/github";
|
|
||||||
};
|
|
||||||
"nikhil" = {
|
|
||||||
hostname = "91.99.176.80";
|
|
||||||
user = "nikhilmaddirala";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"code.m3ta.dev" = {
|
|
||||||
hostname = "code.m3ta.dev";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/gitea";
|
|
||||||
};
|
|
||||||
"git.az-gruppe.com" = {
|
|
||||||
hostname = "git.az-gruppe.com";
|
|
||||||
port = 2022;
|
|
||||||
user = "sascha.koenig";
|
|
||||||
identityFile = "~/.ssh/sascha.koenig";
|
|
||||||
};
|
|
||||||
"lkk-nix-1" = {
|
|
||||||
hostname = "89.58.10.189";
|
|
||||||
user = "lkk-admin";
|
|
||||||
identityFile = "~/.ssh/lkk-admin";
|
|
||||||
};
|
|
||||||
"m3-r1" = {
|
|
||||||
hostname = "202.61.226.110";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"lkk-prod-test" = {
|
|
||||||
hostname = "192.168.122.215";
|
|
||||||
user = "root";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"lkk-prod-1" = {
|
|
||||||
hostname = "192.168.0.24";
|
|
||||||
user = "root";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"lkk-prod-2" = {
|
|
||||||
hostname = "192.168.0.20";
|
|
||||||
user = "root";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-deck" = {
|
|
||||||
hostname = "192.168.178.193";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-kratos-vm" = {
|
|
||||||
hostname = "192.168.122.43";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-helios" = {
|
|
||||||
hostname = "192.168.178.210";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-ares" = {
|
|
||||||
hostname = "192.168.1.30";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-atlas" = {
|
|
||||||
hostname = "152.53.85.162";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-zelda" = {
|
|
||||||
hostname = "95.217.189.186";
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-skynet" = {
|
|
||||||
hostname = "m3-skynet";
|
|
||||||
user = "admin";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"m3-prox-1" = {
|
|
||||||
hostname = "192.168.1.110";
|
|
||||||
user = "root";
|
|
||||||
identityFile = "~/.ssh/m3tam3re";
|
|
||||||
};
|
|
||||||
"shp-old" = {
|
|
||||||
hostname = "95.217.3.250";
|
|
||||||
port = 2222;
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/self-host-playbook";
|
|
||||||
};
|
|
||||||
"shp-1" = {
|
|
||||||
hostname = "95.217.189.186";
|
|
||||||
port = 2222;
|
|
||||||
user = "m3tam3re";
|
|
||||||
identityFile = "~/.ssh/self-host-playbook";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# programs.zellij-ps = {
|
|
||||||
# enable = true;
|
|
||||||
# projectFolders = [
|
|
||||||
# "${config.home.homeDirectory}/p/c"
|
|
||||||
# "${config.home.homeDirectory}/p"
|
|
||||||
# "${config.home.homeDirectory}/.config"
|
|
||||||
# ];
|
|
||||||
# layout = ''
|
|
||||||
# layout {
|
|
||||||
# pane size=1 borderless=true {
|
|
||||||
# plugin location="zellij:tab-bar"
|
|
||||||
# }
|
|
||||||
# pane size="70%" command="nvim"
|
|
||||||
# pane split_direction="vertical" {
|
|
||||||
# pane
|
|
||||||
# pane command="unimatrix"
|
|
||||||
# }
|
|
||||||
# pane size=1 borderless=true {
|
|
||||||
# plugin location="zellij:status-bar"
|
|
||||||
# }
|
|
||||||
# }
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
}
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
{
|
|
||||||
imports = [
|
|
||||||
../common
|
|
||||||
../features/cli
|
|
||||||
./home-server.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
features = {
|
|
||||||
cli = {
|
|
||||||
fish.enable = true;
|
|
||||||
fzf.enable = true;
|
|
||||||
nitch.enable = true;
|
|
||||||
secrets.enable = false;
|
|
||||||
starship.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
{
|
|
||||||
imports = [
|
|
||||||
../common
|
|
||||||
../features/cli
|
|
||||||
./home-server.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
features = {
|
|
||||||
cli = {
|
|
||||||
nushell.enable = true;
|
|
||||||
fzf.enable = true;
|
|
||||||
nitch.enable = true;
|
|
||||||
secrets.enable = false;
|
|
||||||
starship.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,101 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.features.desktop.hyprland;
|
|
||||||
in {
|
|
||||||
imports = [
|
|
||||||
../common
|
|
||||||
./home.nix
|
|
||||||
../features/cli
|
|
||||||
../features/coding
|
|
||||||
../features/desktop
|
|
||||||
#./services/librechat.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
options.features.desktop.hyprland.enable =
|
|
||||||
mkEnableOption "enable Hyprland";
|
|
||||||
|
|
||||||
config = mkMerge [
|
|
||||||
# Base configuration
|
|
||||||
{
|
|
||||||
xdg = {
|
|
||||||
# TODO: better structure
|
|
||||||
enable = true;
|
|
||||||
configFile."mimeapps.list".force = true;
|
|
||||||
mimeApps = {
|
|
||||||
enable = true;
|
|
||||||
associations.added = {
|
|
||||||
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
|
||||||
"application/csv" = ["calc.desktop"];
|
|
||||||
"application/pdf" = ["vivaldi-stable.desktop"];
|
|
||||||
"x-scheme-handler/http" = ["vivaldi-stable.desktop"];
|
|
||||||
"x-scheme-handler/https" = ["vivaldi-stable.desktop"];
|
|
||||||
};
|
|
||||||
defaultApplications = {
|
|
||||||
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
|
||||||
"application/csv" = ["calc.desktop"];
|
|
||||||
"application/pdf" = ["vivaldi-stable.desktop"];
|
|
||||||
"application/md" = ["dev.zed.Zed.desktop"];
|
|
||||||
"application/text" = ["dev.zed.Zed.desktop"];
|
|
||||||
"x-scheme-handler/http" = ["vivaldi-stable.desktop"];
|
|
||||||
"x-scheme-handler/https" = ["vivaldi-stable.desktop"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
features = {
|
|
||||||
cli = {
|
|
||||||
fish.enable = true;
|
|
||||||
nushell.enable = true;
|
|
||||||
fzf.enable = true;
|
|
||||||
nitch.enable = true;
|
|
||||||
secrets.enable = true;
|
|
||||||
starship.enable = true;
|
|
||||||
};
|
|
||||||
desktop = {
|
|
||||||
coding.enable = true;
|
|
||||||
crypto.enable = false;
|
|
||||||
gaming.enable = false;
|
|
||||||
hyprland.enable = false;
|
|
||||||
media.enable = true;
|
|
||||||
office.enable = false;
|
|
||||||
rofi.enable = true;
|
|
||||||
fonts.enable = true;
|
|
||||||
wayland.enable = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
(mkIf cfg.enable {
|
|
||||||
wayland.windowManager.hyprland = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
monitor = [
|
|
||||||
"eDP-1,preferred,0x0,1.25"
|
|
||||||
"HDMI-A-1,preferred,2560x0,1"
|
|
||||||
];
|
|
||||||
workspace = [
|
|
||||||
"1, monitor:eDP-1, default:true"
|
|
||||||
"2, monitor:eDP-1"
|
|
||||||
"3, monitor:eDP-1"
|
|
||||||
"4, monitor:HDMI-A-1"
|
|
||||||
"5, monitor:HDMI-A-1,border:false,rounding:false"
|
|
||||||
"6, monitor:HDMI-A-1"
|
|
||||||
];
|
|
||||||
windowrule = [
|
|
||||||
"match:class dev.zed.Zed, workspace 1"
|
|
||||||
"match:class Msty, workspace 1"
|
|
||||||
"match:class ^(com.obsproject.Studio)$, workspace 2"
|
|
||||||
"match:class ^(brave-browser)$, workspace 4, opacity 1.0"
|
|
||||||
"match:class ^(vivaldi-stable)$, workspace 4, opacity 1.0"
|
|
||||||
"match:class ^steam_app_\\d+$, fullscreen on"
|
|
||||||
"match:class ^steam_app_\\d+$, workspace 5"
|
|
||||||
"match:class ^steam_app_\\d+$, idle_inhibit focus"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
})
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
{
|
|
||||||
imports = [
|
|
||||||
../common
|
|
||||||
../features/cli
|
|
||||||
./home-server.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
features = {
|
|
||||||
cli = {
|
|
||||||
fish.enable = true;
|
|
||||||
fzf.enable = true;
|
|
||||||
nitch.enable = true;
|
|
||||||
secrets.enable = false;
|
|
||||||
starship.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
Binary file not shown.
|
Before Width: | Height: | Size: 3.3 MiB |
Binary file not shown.
|
Before Width: | Height: | Size: 5.4 MiB |
Binary file not shown.
|
Before Width: | Height: | Size: 6.7 MiB |
Binary file not shown.
|
Before Width: | Height: | Size: 4.5 MiB |
Binary file not shown.
|
Before Width: | Height: | Size: 4.3 MiB |
@@ -1,5 +1,13 @@
|
|||||||
# Common configuration for all hosts
|
# Common configuration for all hosts
|
||||||
{ config, pkgs, lib, inputs, outputs, ... }: {
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
inputs,
|
||||||
|
outputs,
|
||||||
|
system,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
imports = [
|
imports = [
|
||||||
./extraServices
|
./extraServices
|
||||||
./ports.nix
|
./ports.nix
|
||||||
@@ -7,14 +15,14 @@
|
|||||||
inputs.home-manager.nixosModules.home-manager
|
inputs.home-manager.nixosModules.home-manager
|
||||||
];
|
];
|
||||||
|
|
||||||
environment.pathsToLink =
|
environment.pathsToLink = ["/share/xdg-desktop-portal" "/share/applications"];
|
||||||
[ "/share/xdg-desktop-portal" "/share/applications" ];
|
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
|
useGlobalPkgs = true;
|
||||||
useUserPackages = true;
|
useUserPackages = true;
|
||||||
extraSpecialArgs = {
|
extraSpecialArgs = {
|
||||||
inherit inputs outputs;
|
inherit inputs outputs system;
|
||||||
videoDrivers = config.services.xserver.videoDrivers or [ ];
|
videoDrivers = config.services.xserver.videoDrivers or [];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -31,7 +39,7 @@
|
|||||||
|
|
||||||
inputs.m3ta-nixpkgs.overlays.default
|
inputs.m3ta-nixpkgs.overlays.default
|
||||||
inputs.m3ta-nixpkgs.overlays.modifications
|
inputs.m3ta-nixpkgs.overlays.modifications
|
||||||
|
(outputs.lib.mkLlmAgentsOverlay system)
|
||||||
# You can also add overlays exported from other flakes:
|
# You can also add overlays exported from other flakes:
|
||||||
# neovim-nightly-overlay.overlays.default
|
# neovim-nightly-overlay.overlays.default
|
||||||
|
|
||||||
@@ -65,9 +73,10 @@
|
|||||||
options = "--delete-older-than 30d";
|
options = "--delete-older-than 30d";
|
||||||
};
|
};
|
||||||
optimise.automatic = true;
|
optimise.automatic = true;
|
||||||
registry = (lib.mapAttrs (_: flake: { inherit flake; }))
|
registry =
|
||||||
|
(lib.mapAttrs (_: flake: {inherit flake;}))
|
||||||
((lib.filterAttrs (_: lib.isType "flake")) inputs);
|
((lib.filterAttrs (_: lib.isType "flake")) inputs);
|
||||||
nixPath = [ "/etc/nix/path" ];
|
nixPath = ["/etc/nix/path"];
|
||||||
};
|
};
|
||||||
users.defaultUserShell = pkgs.nushell;
|
users.defaultUserShell = pkgs.nushell;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -21,6 +21,7 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
programs.virt-manager.enable = true;
|
programs.virt-manager.enable = true;
|
||||||
|
systemd.services.virt-secret-init-encryption.enable = false;
|
||||||
environment = {
|
environment = {
|
||||||
systemPackages = [pkgs.qemu];
|
systemPackages = [pkgs.qemu];
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -18,6 +18,10 @@
|
|||||||
wireguard = 51820;
|
wireguard = 51820;
|
||||||
tailscale = 41641;
|
tailscale = 41641;
|
||||||
headscale = 3009;
|
headscale = 3009;
|
||||||
|
netbird-stun = 3478;
|
||||||
|
netbird-proxy = 8443;
|
||||||
|
netbird-metrics = 9090;
|
||||||
|
netbird-health = 9000;
|
||||||
|
|
||||||
# Containers & web apps
|
# Containers & web apps
|
||||||
gitea = 3030;
|
gitea = 3030;
|
||||||
@@ -33,9 +37,8 @@
|
|||||||
slash-nemoti = 3016;
|
slash-nemoti = 3016;
|
||||||
kestra = 3018;
|
kestra = 3018;
|
||||||
outline = 3019;
|
outline = 3019;
|
||||||
pangolin = 3020;
|
authentik = 3023;
|
||||||
pangolin-api = 3021;
|
tuwunel = 3024;
|
||||||
pangolin-ws = 3022;
|
|
||||||
|
|
||||||
# Home automation
|
# Home automation
|
||||||
homarr = 7575;
|
homarr = 7575;
|
||||||
|
|||||||
@@ -1,11 +1,211 @@
|
|||||||
|
# hosts/common/users/m3tam3re.nix — Central user definition with m3ta-home integration.
|
||||||
|
#
|
||||||
|
# This module:
|
||||||
|
# 1. Creates the m3tam3re NixOS user
|
||||||
|
# 2. Loads the m3ta-home profile system via mkHome
|
||||||
|
# 3. Sets per-host feature flags based on a host profile mapping
|
||||||
|
# 4. Imports per-host home.nix overrides (monitors, HW-specific config)
|
||||||
|
#
|
||||||
|
# To add a new host:
|
||||||
|
# 1. Add entry to hostProfiles below
|
||||||
|
# 2. Add feature flags in the hostFlags section
|
||||||
|
# 3. Create hosts/<hostname>/home.nix if the host needs overrides (monitors, etc.)
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
inputs,
|
inputs,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
|
hostname = config.networking.hostName;
|
||||||
|
|
||||||
|
# ── Per-host profile mapping ──
|
||||||
|
# Determines which m3ta-home context and sets each host gets.
|
||||||
|
hostProfiles = {
|
||||||
|
# ── Desktop hosts ──
|
||||||
|
m3-ares = {
|
||||||
|
context = "desktop";
|
||||||
|
sets = ["coding" "gaming" "media"];
|
||||||
|
};
|
||||||
|
m3-kratos = {
|
||||||
|
context = "desktop";
|
||||||
|
sets = ["coding" "gaming" "media"];
|
||||||
|
};
|
||||||
|
m3-daedalus = {
|
||||||
|
context = "desktop";
|
||||||
|
sets = ["coding" "media"];
|
||||||
|
};
|
||||||
|
# ── Server hosts ──
|
||||||
|
m3-atlas = {
|
||||||
|
context = "server";
|
||||||
|
sets = ["coding"];
|
||||||
|
};
|
||||||
|
m3-helios = {
|
||||||
|
context = "server";
|
||||||
|
sets = [];
|
||||||
|
};
|
||||||
|
m3-hermes = {
|
||||||
|
context = "server";
|
||||||
|
sets = [];
|
||||||
|
};
|
||||||
|
m3-aether = {
|
||||||
|
context = "server";
|
||||||
|
sets = [];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
profile = hostProfiles.${hostname} or {
|
||||||
|
context = "server";
|
||||||
|
sets = [];
|
||||||
|
};
|
||||||
|
m3ta-lib = inputs.m3ta-home.lib;
|
||||||
|
|
||||||
|
# Check if a per-host home.nix exists
|
||||||
|
hostHomeFile = ./../../${hostname}/home.nix;
|
||||||
|
hostHomeExists = builtins.pathExists hostHomeFile;
|
||||||
|
|
||||||
|
# ── Per-host feature flags ──
|
||||||
|
# These enable/disable specific m3ta-home modules per host.
|
||||||
|
hostFlags =
|
||||||
|
if hostname == "m3-ares" || hostname == "m3-kratos"
|
||||||
|
then {
|
||||||
|
# Full desktop workstation
|
||||||
|
base = {
|
||||||
|
shell = {
|
||||||
|
fish.enable = true;
|
||||||
|
nushell.enable = true;
|
||||||
|
starship.enable = true;
|
||||||
|
};
|
||||||
|
cliTools = {
|
||||||
|
fzf.enable = true;
|
||||||
|
nitch.enable = true;
|
||||||
|
television.enable = true;
|
||||||
|
};
|
||||||
|
secrets.enable = true;
|
||||||
|
};
|
||||||
|
desktop = {
|
||||||
|
wm = {
|
||||||
|
hyprland.enable = true;
|
||||||
|
rofi.enable = true;
|
||||||
|
wayland.enable = true;
|
||||||
|
};
|
||||||
|
apps = {
|
||||||
|
crypto.enable = true;
|
||||||
|
obsidian.enable = true;
|
||||||
|
office.enable = true;
|
||||||
|
};
|
||||||
|
theme = {
|
||||||
|
fonts.enable = true;
|
||||||
|
wallpapers.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
coding = {
|
||||||
|
editors = {
|
||||||
|
neovim.enable = true;
|
||||||
|
zed.enable = true;
|
||||||
|
};
|
||||||
|
lsp.enable = true;
|
||||||
|
packages.enable = true;
|
||||||
|
languages = {
|
||||||
|
python.enable = true;
|
||||||
|
javascript.enable = true;
|
||||||
|
rustToolchain.enable = true;
|
||||||
|
go.enable = true;
|
||||||
|
typescript.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
profiles.gaming = {
|
||||||
|
steam.enable = true;
|
||||||
|
gamescope.enable = true;
|
||||||
|
};
|
||||||
|
profiles.media = {
|
||||||
|
obs.enable = true;
|
||||||
|
ffmpeg.enable = true;
|
||||||
|
kdenlive.enable = true;
|
||||||
|
ytDlp.enable = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
else if hostname == "m3-daedalus"
|
||||||
|
then {
|
||||||
|
# Portable laptop — desktop without gaming, no Hyprland
|
||||||
|
base = {
|
||||||
|
shell = {
|
||||||
|
fish.enable = true;
|
||||||
|
nushell.enable = true;
|
||||||
|
starship.enable = true;
|
||||||
|
};
|
||||||
|
cliTools = {
|
||||||
|
fzf.enable = true;
|
||||||
|
nitch.enable = true;
|
||||||
|
television.enable = true;
|
||||||
|
};
|
||||||
|
secrets.enable = true;
|
||||||
|
};
|
||||||
|
desktop = {
|
||||||
|
wm = {
|
||||||
|
hyprland.enable = false;
|
||||||
|
wayland.enable = false;
|
||||||
|
};
|
||||||
|
apps = {
|
||||||
|
crypto.enable = false;
|
||||||
|
obsidian.enable = true;
|
||||||
|
office.enable = false;
|
||||||
|
};
|
||||||
|
theme = {
|
||||||
|
fonts.enable = true;
|
||||||
|
wallpapers.enable = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
coding = {
|
||||||
|
editors = {
|
||||||
|
neovim.enable = true;
|
||||||
|
zed.enable = true;
|
||||||
|
};
|
||||||
|
lsp.enable = true;
|
||||||
|
packages.enable = true;
|
||||||
|
languages = {
|
||||||
|
python.enable = true;
|
||||||
|
javascript.enable = true;
|
||||||
|
rustToolchain.enable = true;
|
||||||
|
go.enable = true;
|
||||||
|
typescript.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
profiles.media = {
|
||||||
|
ytDlp.enable = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
else if hostname == "m3-atlas"
|
||||||
|
then {
|
||||||
|
# Primary server — coding capable
|
||||||
|
base = {
|
||||||
|
shell = {
|
||||||
|
nushell.enable = true;
|
||||||
|
starship.enable = true;
|
||||||
|
};
|
||||||
|
cliTools = {
|
||||||
|
fzf.enable = true;
|
||||||
|
nitch.enable = true;
|
||||||
|
zellij.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
coding.editors.neovim.enable = true;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
# m3-helios, m3-hermes, m3-aether — minimal server
|
||||||
|
base = {
|
||||||
|
shell = {
|
||||||
|
fish.enable = true;
|
||||||
|
starship.enable = true;
|
||||||
|
};
|
||||||
|
cliTools = {
|
||||||
|
fzf.enable = true;
|
||||||
|
nitch.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
# ── NixOS user definition ──
|
||||||
users.users.m3tam3re = {
|
users.users.m3tam3re = {
|
||||||
#initialHashedPassword = "$y$j9T$IoChbWGYRh.rKfmm0G86X0$bYgsWqDRkvX.EBzJTX.Z0RsTlwspADpvEF3QErNyCMC";
|
|
||||||
password = "12345";
|
password = "12345";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
description = "m3tam3re";
|
description = "m3tam3re";
|
||||||
@@ -24,9 +224,30 @@
|
|||||||
];
|
];
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-rsa 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 m3tam3re@m3-nix"
|
"ssh-rsa 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 m3tam3re@m3-nix"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBZcjCKl0DRuOUOMXbM0GKY5JjvmyFpVZ/tRlTKWu/zp razr"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEZbg/Z9mnflXuLahGY8WOSBMqbgeqVIkIwRkquys1Ml sascha.koenig@azintec.com"
|
||||||
];
|
];
|
||||||
packages = [inputs.home-manager.packages.${pkgs.stdenv.hostPlatform.system}.default];
|
packages = [inputs.home-manager.packages.${pkgs.stdenv.hostPlatform.system}.default];
|
||||||
};
|
};
|
||||||
home-manager.users.m3tam3re =
|
|
||||||
import ../../../home/m3tam3re/${config.networking.hostName}.nix;
|
# ── Home-Manager configuration via m3ta-home ──
|
||||||
|
home-manager.users.m3tam3re = {
|
||||||
|
imports =
|
||||||
|
[
|
||||||
|
# Load m3ta-home composition engine
|
||||||
|
(m3ta-lib.mkHome {
|
||||||
|
user = "m3tam3re";
|
||||||
|
identity = "private";
|
||||||
|
inherit (profile) context sets;
|
||||||
|
})
|
||||||
|
# Per-host feature flags
|
||||||
|
hostFlags
|
||||||
|
]
|
||||||
|
# Per-host home.nix (Hyprland monitors, XDG/MIME, HW-specific overrides)
|
||||||
|
++ (
|
||||||
|
if hostHomeExists
|
||||||
|
then [hostHomeFile]
|
||||||
|
else []
|
||||||
|
);
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,24 +1,28 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
{
|
||||||
|
config,
|
||||||
{
|
lib,
|
||||||
imports =
|
pkgs,
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
modulesPath,
|
||||||
];
|
...
|
||||||
|
}: {
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
|
imports = [
|
||||||
boot.initrd.kernelModules = [ ];
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
boot.kernelModules = [ ];
|
];
|
||||||
boot.extraModulePackages = [ ];
|
|
||||||
|
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod"];
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
boot.initrd.kernelModules = [];
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
boot.kernelModules = [];
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
boot.extraModulePackages = [];
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# networking.interfaces.ens18.useDHCP = lib.mkDefault true;
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
}
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
# networking.interfaces.ens18.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
}
|
||||||
|
|||||||
@@ -2,10 +2,4 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./cloud-init.nix
|
./cloud-init.nix
|
||||||
];
|
];
|
||||||
systemd.sleep.extraConfig = ''
|
|
||||||
AllowSuspend=no
|
|
||||||
AllowHibernation=no
|
|
||||||
AllowHybridSleep=no
|
|
||||||
AllowSuspendThenHibernate=no
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -44,7 +44,7 @@
|
|||||||
|
|
||||||
extraServices = {
|
extraServices = {
|
||||||
flatpak.enable = true;
|
flatpak.enable = true;
|
||||||
ollama.enable = true;
|
ollama.enable = false;
|
||||||
podman.enable = true;
|
podman.enable = true;
|
||||||
virtualisation.enable = true;
|
virtualisation.enable = true;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,9 +1,14 @@
|
|||||||
{ config, pkgs, inputs, ... }: {
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
inputs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
# Workaround for tuxedo-drivers module bug in unstable (nixpkgs#480391)
|
# Workaround for tuxedo-drivers module bug in unstable (nixpkgs#480391)
|
||||||
# The unstable module has a type error - use stable module until fix propagates
|
# The unstable module has a type error - use stable module until fix propagates
|
||||||
disabledModules = [ "hardware/tuxedo-drivers.nix" ];
|
# disabledModules = [ "hardware/tuxedo-drivers.nix" ];
|
||||||
imports =
|
# imports =
|
||||||
[ "${inputs.nixpkgs-stable}/nixos/modules/hardware/tuxedo-drivers.nix" ];
|
# [ "${inputs.nixpkgs-stable}/nixos/modules/hardware/tuxedo-drivers.nix" ];
|
||||||
|
|
||||||
hardware.nvidia = {
|
hardware.nvidia = {
|
||||||
prime = {
|
prime = {
|
||||||
@@ -38,12 +43,16 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [ tuxedo-backlight ];
|
environment.systemPackages = with pkgs; [tuxedo-backlight];
|
||||||
security.sudo.extraRules = [{
|
security.sudo.extraRules = [
|
||||||
users = [ "@wheel" ];
|
{
|
||||||
commands = [{
|
users = ["@wheel"];
|
||||||
command = "/run/current-system/sw/bin/set-backlight";
|
commands = [
|
||||||
options = [ "NOPASSWD" ];
|
{
|
||||||
}];
|
command = "/run/current-system/sw/bin/set-backlight";
|
||||||
}];
|
options = ["NOPASSWD"];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,21 +1,17 @@
|
|||||||
|
# hosts/m3-ares/home.nix — Host-specific home-manager overrides.
|
||||||
|
# TUXEDO laptop: eDP-1 + HDMI-A-1 external monitor.
|
||||||
|
# Everything else (shell, editors, gaming, media, theme, etc.) comes from
|
||||||
|
# m3ta-home via the profile mapping in hosts/common/users/m3tam3re.nix.
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
with lib; {
|
with lib; {
|
||||||
imports = [
|
|
||||||
../common
|
|
||||||
./home.nix
|
|
||||||
../features/cli
|
|
||||||
../features/coding
|
|
||||||
../features/desktop
|
|
||||||
];
|
|
||||||
|
|
||||||
config = mkMerge [
|
config = mkMerge [
|
||||||
|
# ── XDG / MIME defaults ──
|
||||||
{
|
{
|
||||||
xdg = {
|
xdg = {
|
||||||
# TODO: better structure
|
|
||||||
enable = true;
|
enable = true;
|
||||||
configFile."mimeapps.list".force = true;
|
configFile."mimeapps.list".force = true;
|
||||||
mimeApps = {
|
mimeApps = {
|
||||||
@@ -38,31 +34,10 @@ with lib; {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
features = {
|
|
||||||
cli = {
|
|
||||||
fish.enable = true;
|
|
||||||
nushell.enable = true;
|
|
||||||
fzf.enable = true;
|
|
||||||
nitch.enable = true;
|
|
||||||
secrets.enable = true;
|
|
||||||
starship.enable = true;
|
|
||||||
};
|
|
||||||
desktop = {
|
|
||||||
coding.enable = true;
|
|
||||||
crypto.enable = true;
|
|
||||||
gaming.enable = true;
|
|
||||||
hyprland.enable = true;
|
|
||||||
media.enable = true;
|
|
||||||
office.enable = true;
|
|
||||||
rofi.enable = true;
|
|
||||||
fonts.enable = true;
|
|
||||||
wayland.enable = true;
|
|
||||||
wallpapers = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
||||||
(mkIf config.features.desktop.hyprland.enable {
|
# ── Hyprland monitor layout ──
|
||||||
|
(mkIf config.desktop.wm.hyprland.enable {
|
||||||
wayland.windowManager.hyprland = {
|
wayland.windowManager.hyprland = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
@@ -75,7 +50,7 @@ with lib; {
|
|||||||
"1, monitor:eDP-1, default:true"
|
"1, monitor:eDP-1, default:true"
|
||||||
"2, monitor:eDP-1"
|
"2, monitor:eDP-1"
|
||||||
"3, monitor:eDP-1"
|
"3, monitor:eDP-1"
|
||||||
"4, monitor:HDMI-A-1,"
|
"4, monitor:HDMI-A-1"
|
||||||
"5, monitor:HDMI-A-1,border:false,rounding:false"
|
"5, monitor:HDMI-A-1,border:false,rounding:false"
|
||||||
"6, monitor:HDMI-A-1"
|
"6, monitor:HDMI-A-1"
|
||||||
];
|
];
|
||||||
@@ -33,6 +33,10 @@
|
|||||||
file = ../../secrets/exa-key.age;
|
file = ../../secrets/exa-key.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
|
outline-key = {
|
||||||
|
file = ../../secrets/outline-key.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
basecamp-client-id = {
|
basecamp-client-id = {
|
||||||
file = ../../secrets/basecamp-client-id.age;
|
file = ../../secrets/basecamp-client-id.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
@@ -46,6 +50,10 @@
|
|||||||
file = ../../secrets/m3tam3re-secrets.age;
|
file = ../../secrets/m3tam3re-secrets.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
|
hermes-env = {
|
||||||
|
file = ../../secrets/hermes-env.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,20 +1,35 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
imports = [
|
imports = [
|
||||||
./containers
|
./containers
|
||||||
|
./hermes-agent.nix
|
||||||
|
./netbird.nix
|
||||||
#./n8n.nix
|
#./n8n.nix
|
||||||
|
./mem0.nix
|
||||||
./postgres.nix
|
./postgres.nix
|
||||||
./restic.nix
|
./restic.nix
|
||||||
./sound.nix
|
./sound.nix
|
||||||
./tailscale.nix
|
|
||||||
./udev.nix
|
./udev.nix
|
||||||
./wireguard.nix
|
./wireguard.nix
|
||||||
];
|
];
|
||||||
|
# console.useXkbConfig = true;
|
||||||
|
|
||||||
|
# services.xserver.xkb = {
|
||||||
|
# layout = "de,us";
|
||||||
|
# options = "ctrl:nocaps";
|
||||||
|
# };
|
||||||
|
|
||||||
|
# optional, falls du auch die TTY-Konsole deutsch willst:
|
||||||
services = {
|
services = {
|
||||||
hypridle.enable = true;
|
hypridle.enable = true;
|
||||||
|
espanso = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.espanso-wayland;
|
||||||
|
};
|
||||||
printing.enable = true;
|
printing.enable = true;
|
||||||
gvfs.enable = true;
|
gvfs.enable = true;
|
||||||
trezord.enable = true;
|
trezord.enable = true;
|
||||||
gnome.gnome-keyring.enable = true;
|
gnome.gnome-keyring.enable = true;
|
||||||
|
qdrant.enable = true;
|
||||||
# qdrant = {
|
# qdrant = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# settings = {
|
# settings = {
|
||||||
@@ -35,10 +50,4 @@
|
|||||||
};
|
};
|
||||||
displayManager.gdm.enable = true;
|
displayManager.gdm.enable = true;
|
||||||
};
|
};
|
||||||
systemd.sleep.extraConfig = ''
|
|
||||||
AllowSuspend=no
|
|
||||||
AllowHibernation=no
|
|
||||||
AllowHybridSleep=no
|
|
||||||
AllowSuspendThenHibernate=no
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
184
hosts/m3-ares/services/hermes-agent.nix
Normal file
184
hosts/m3-ares/services/hermes-agent.nix
Normal file
@@ -0,0 +1,184 @@
|
|||||||
|
{config, ...}: let
|
||||||
|
# Default ElevenLabs voice: Bella (German-capable female)
|
||||||
|
elevenlabsVoiceId = "hpp4J3VqNfWAUOO0d1Us";
|
||||||
|
in {
|
||||||
|
services.hermes-agent = {
|
||||||
|
enable = true;
|
||||||
|
addToSystemPackages = true;
|
||||||
|
|
||||||
|
# Secrets via agenix
|
||||||
|
environmentFiles = [config.age.secrets."hermes-env".path];
|
||||||
|
|
||||||
|
# Non-secret environment variables
|
||||||
|
environment = {
|
||||||
|
GLM_BASE_URL = "https://api.z.ai/api/coding/paas/v4/";
|
||||||
|
};
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
# ── Model ──────────────────────────────────────────────────────────
|
||||||
|
model = {
|
||||||
|
default = "glm-5.1";
|
||||||
|
provider = "zai";
|
||||||
|
};
|
||||||
|
|
||||||
|
credential_pool_strategies = {
|
||||||
|
zai = "fill_first";
|
||||||
|
};
|
||||||
|
|
||||||
|
toolsets = ["all"];
|
||||||
|
|
||||||
|
# ── Agent ──────────────────────────────────────────────────────────
|
||||||
|
agent = {
|
||||||
|
max_turns = 90;
|
||||||
|
gateway_timeout = 1800;
|
||||||
|
tool_use_enforcement = "auto";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Terminal ───────────────────────────────────────────────────────
|
||||||
|
terminal = {
|
||||||
|
backend = "ssh";
|
||||||
|
modal_mode = "auto";
|
||||||
|
cwd = ".";
|
||||||
|
timeout = 180;
|
||||||
|
persistent_shell = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Browser ────────────────────────────────────────────────────────
|
||||||
|
browser = {
|
||||||
|
inactivity_timeout = 120;
|
||||||
|
command_timeout = 30;
|
||||||
|
cloud_provider = "local";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Checkpoints / Compression ──────────────────────────────────────
|
||||||
|
checkpoints = {
|
||||||
|
enabled = true;
|
||||||
|
max_snapshots = 50;
|
||||||
|
};
|
||||||
|
|
||||||
|
file_read_max_chars = 100000;
|
||||||
|
|
||||||
|
compression = {
|
||||||
|
enabled = true;
|
||||||
|
threshold = 0.5;
|
||||||
|
target_ratio = 0.2;
|
||||||
|
protect_last_n = 20;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Display ────────────────────────────────────────────────────────
|
||||||
|
display = {
|
||||||
|
compact = false;
|
||||||
|
personality = "kawaii";
|
||||||
|
resume_display = "full";
|
||||||
|
busy_input_mode = "interrupt";
|
||||||
|
inline_diffs = true;
|
||||||
|
skin = "default";
|
||||||
|
tool_progress = "all";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── TTS / STT / Voice ──────────────────────────────────────────────
|
||||||
|
tts = {
|
||||||
|
provider = "elevenlabs";
|
||||||
|
elevenlabs = {
|
||||||
|
voice_id = elevenlabsVoiceId;
|
||||||
|
model_id = "eleven_multilingual_v2";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
stt = {
|
||||||
|
enabled = true;
|
||||||
|
provider = "local";
|
||||||
|
local = {model = "base";};
|
||||||
|
};
|
||||||
|
|
||||||
|
voice = {
|
||||||
|
record_key = "ctrl+b";
|
||||||
|
max_recording_seconds = 120;
|
||||||
|
silence_threshold = 200;
|
||||||
|
silence_duration = 3.0;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Memory ─────────────────────────────────────────────────────────
|
||||||
|
memory = {
|
||||||
|
memory_enabled = true;
|
||||||
|
user_profile_enabled = true;
|
||||||
|
memory_char_limit = 2200;
|
||||||
|
user_char_limit = 1375;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Delegation ─────────────────────────────────────────────────────
|
||||||
|
delegation = {
|
||||||
|
max_iterations = 50;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Discord ────────────────────────────────────────────────────────
|
||||||
|
discord = {
|
||||||
|
require_mention = true;
|
||||||
|
auto_thread = true;
|
||||||
|
reactions = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Approvals / Security ───────────────────────────────────────────
|
||||||
|
approvals = {
|
||||||
|
mode = "manual";
|
||||||
|
timeout = 60;
|
||||||
|
};
|
||||||
|
|
||||||
|
security = {
|
||||||
|
redact_secrets = true;
|
||||||
|
tirith_enabled = true;
|
||||||
|
tirith_fail_open = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Cron / Session ─────────────────────────────────────────────────
|
||||||
|
cron = {wrap_response = true;};
|
||||||
|
|
||||||
|
session_reset = {
|
||||||
|
mode = "both";
|
||||||
|
idle_minutes = 1440;
|
||||||
|
at_hour = 4;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Web ────────────────────────────────────────────────────────────
|
||||||
|
web = {backend = "exa";};
|
||||||
|
|
||||||
|
# ── Platform Toolsets ──────────────────────────────────────────────
|
||||||
|
platform_toolsets = {
|
||||||
|
cli = [
|
||||||
|
"browser"
|
||||||
|
"clarify"
|
||||||
|
"code_execution"
|
||||||
|
"cronjob"
|
||||||
|
"delegation"
|
||||||
|
"file"
|
||||||
|
"image_gen"
|
||||||
|
"memory"
|
||||||
|
"session_search"
|
||||||
|
"skills"
|
||||||
|
"terminal"
|
||||||
|
"todo"
|
||||||
|
"tts"
|
||||||
|
"vision"
|
||||||
|
"web"
|
||||||
|
];
|
||||||
|
telegram = [
|
||||||
|
"browser"
|
||||||
|
"clarify"
|
||||||
|
"code_execution"
|
||||||
|
"cronjob"
|
||||||
|
"delegation"
|
||||||
|
"file"
|
||||||
|
"image_gen"
|
||||||
|
"memory"
|
||||||
|
"session_search"
|
||||||
|
"skills"
|
||||||
|
"terminal"
|
||||||
|
"todo"
|
||||||
|
"tts"
|
||||||
|
"vision"
|
||||||
|
"web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
23
hosts/m3-ares/services/mem0.nix
Normal file
23
hosts/m3-ares/services/mem0.nix
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
{
|
||||||
|
m3ta.mem0 = {
|
||||||
|
enable = true;
|
||||||
|
port = 8000;
|
||||||
|
host = "127.0.0.1";
|
||||||
|
|
||||||
|
# LLM Configuration
|
||||||
|
llm = {
|
||||||
|
provider = "openai";
|
||||||
|
apiKeyFile = "/var/lib/mem0/openai-api-key-1"; # Use agenix or sops-nix
|
||||||
|
};
|
||||||
|
|
||||||
|
# Vector Storage Configuration
|
||||||
|
vectorStore = {
|
||||||
|
provider = "qdrant"; # or "chroma", "pinecone", etc.
|
||||||
|
config = {
|
||||||
|
host = "localhost";
|
||||||
|
port = 6333;
|
||||||
|
collection_name = "mem0_alice";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
29
hosts/m3-ares/services/netbird.nix
Normal file
29
hosts/m3-ares/services/netbird.nix
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
{pkgs, ...}: {
|
||||||
|
services.netbird.enable = true;
|
||||||
|
environment.systemPackages = with pkgs; [netbird-ui];
|
||||||
|
|
||||||
|
systemd.services.netbird = {
|
||||||
|
environment = {
|
||||||
|
NB_DISABLE_SSH_CONFIG = "true";
|
||||||
|
};
|
||||||
|
path = [
|
||||||
|
pkgs.shadow
|
||||||
|
pkgs.util-linux
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.ssh.extraConfig = ''
|
||||||
|
Match exec "${pkgs.netbird}/bin/netbird ssh detect %h %p"
|
||||||
|
PreferredAuthentications password,publickey,keyboard-interactive
|
||||||
|
PasswordAuthentication yes
|
||||||
|
PubkeyAuthentication yes
|
||||||
|
BatchMode no
|
||||||
|
ProxyCommand ${pkgs.netbird}/bin/netbird ssh proxy %h %p
|
||||||
|
StrictHostKeyChecking no
|
||||||
|
UserKnownHostsFile /dev/null
|
||||||
|
CheckHostIP no
|
||||||
|
LogLevel ERROR
|
||||||
|
'';
|
||||||
|
|
||||||
|
networking.firewall.checkReversePath = "loose";
|
||||||
|
}
|
||||||
@@ -1,7 +1,4 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.postgresql_17;
|
package = pkgs.postgresql_17;
|
||||||
|
|||||||
@@ -1,11 +0,0 @@
|
|||||||
{config, ...}: {
|
|
||||||
services.tailscale = {
|
|
||||||
enable = false;
|
|
||||||
authKeyFile = config.age.secrets.tailscale-key.path;
|
|
||||||
useRoutingFeatures = "both";
|
|
||||||
extraUpFlags = [
|
|
||||||
"--login-server=https://va.m3tam3re.com"
|
|
||||||
"--accept-routes"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -2,7 +2,8 @@
|
|||||||
services.udev.extraRules = ''
|
services.udev.extraRules = ''
|
||||||
SUBSYSTEM=="usb", MODE="0666"
|
SUBSYSTEM=="usb", MODE="0666"
|
||||||
SUBSYSTEM=="leds", KERNEL=="rgb:kbd_backlight*", ACTION=="add", RUN+="${pkgs.coreutils}/bin/chmod a+w /sys/class/leds/%k/multi_intensity"
|
SUBSYSTEM=="leds", KERNEL=="rgb:kbd_backlight*", ACTION=="add", RUN+="${pkgs.coreutils}/bin/chmod a+w /sys/class/leds/%k/multi_intensity"
|
||||||
'';
|
KERNEL=="uinput", MODE="0660", GROUP="input", OPTIONS+="static_node=uinput"
|
||||||
|
KERNEL=="event*", SUBSYSTEM=="input", MODE="0660", GROUP="input" '';
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
zsa-udev-rules
|
zsa-udev-rules
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -59,7 +59,11 @@
|
|||||||
|
|
||||||
# List packages installed in system profile. To search, run:
|
# List packages installed in system profile. To search, run:
|
||||||
# $ nix search wget
|
# $ nix search wget
|
||||||
environment.systemPackages = with pkgs; [neovim git];
|
environment.systemPackages = with pkgs; [
|
||||||
|
neovim
|
||||||
|
git
|
||||||
|
ghostty.terminfo
|
||||||
|
];
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
# Some programs need SUID wrappers, can be configured further or are
|
||||||
# started in user sessions.
|
# started in user sessions.
|
||||||
|
|||||||
@@ -1,25 +1,49 @@
|
|||||||
{
|
{
|
||||||
age = {
|
age = {
|
||||||
secrets = {
|
secrets = {
|
||||||
baserow-env = { file = ../../secrets/baserow-env.age; };
|
baserow-env = {file = ../../secrets/baserow-env.age;};
|
||||||
ghost-env = { file = ../../secrets/ghost-env.age; };
|
ghost-env = {file = ../../secrets/ghost-env.age;};
|
||||||
kestra-config = {
|
kestra-config = {
|
||||||
file = ../../secrets/kestra-config.age;
|
file = ../../secrets/kestra-config.age;
|
||||||
mode = "644";
|
mode = "644";
|
||||||
};
|
};
|
||||||
kestra-env = { file = ../../secrets/kestra-env.age; };
|
kestra-env = {file = ../../secrets/kestra-env.age;};
|
||||||
littlelink-m3tam3re = { file = ../../secrets/littlelink-m3tam3re.age; };
|
littlelink-m3tam3re = {file = ../../secrets/littlelink-m3tam3re.age;};
|
||||||
minio-root-cred = { file = ../../secrets/minio-root-cred.age; };
|
minio-root-cred = {file = ../../secrets/minio-root-cred.age;};
|
||||||
n8n-env = { file = ../../secrets/n8n-env.age; };
|
rustfs-access-key = {file = ../../secrets/rustfs-access-key.age;};
|
||||||
paperless-key = { file = ../../secrets/paperless-key.age; };
|
rustfs-secret-key = {file = ../../secrets/rustfs-secret-key.age;};
|
||||||
restreamer-env = { file = ../../secrets/restreamer-env.age; };
|
n8n-env = {file = ../../secrets/n8n-env.age;};
|
||||||
searx = { file = ../../secrets/searx.age; };
|
netbird-auth-secret = {
|
||||||
tailscale-key = { file = ../../secrets/tailscale-key.age; };
|
file = ../../secrets/netbird-auth-secret.age;
|
||||||
|
};
|
||||||
|
netbird-db-password = {
|
||||||
|
file = ../../secrets/netbird-db-password.age;
|
||||||
|
};
|
||||||
|
netbird-encryption-key = {
|
||||||
|
file = ../../secrets/netbird-encryption-key.age;
|
||||||
|
};
|
||||||
|
netbird-dashboard-env = {
|
||||||
|
file = ../../secrets/netbird-dashboard-env.age;
|
||||||
|
};
|
||||||
|
netbird-server-env = {
|
||||||
|
file = ../../secrets/netbird-server-env.age;
|
||||||
|
};
|
||||||
|
netbird-proxy-env = {
|
||||||
|
file = ../../secrets/netbird-proxy-env.age;
|
||||||
|
};
|
||||||
|
paperless-key = {file = ../../secrets/paperless-key.age;};
|
||||||
|
restreamer-env = {file = ../../secrets/restreamer-env.age;};
|
||||||
|
searx = {file = ../../secrets/searx.age;};
|
||||||
|
tailscale-key = {file = ../../secrets/tailscale-key.age;};
|
||||||
|
tuwunel-registration-token = {
|
||||||
|
file = ../../secrets/tuwunel-registration-token.age;
|
||||||
|
owner = "tuwunel";
|
||||||
|
};
|
||||||
traefik = {
|
traefik = {
|
||||||
file = ../../secrets/traefik.age;
|
file = ../../secrets/traefik.age;
|
||||||
owner = "traefik";
|
owner = "traefik";
|
||||||
};
|
};
|
||||||
vaultwarden-env = { file = ../../secrets/vaultwarden-env.age; };
|
vaultwarden-env = {file = ../../secrets/vaultwarden-env.age;};
|
||||||
m3tam3re-secrets = {
|
m3tam3re-secrets = {
|
||||||
file = ../../secrets/m3tam3re-secrets.age;
|
file = ../../secrets/m3tam3re-secrets.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
@@ -30,6 +54,23 @@
|
|||||||
owner = "gitea-runner";
|
owner = "gitea-runner";
|
||||||
group = "gitea-runner";
|
group = "gitea-runner";
|
||||||
};
|
};
|
||||||
|
ref-key = {
|
||||||
|
file = ../../secrets/ref-key.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
exa-key = {
|
||||||
|
file = ../../secrets/exa-key.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
basecamp-client-id = {
|
||||||
|
file = ../../secrets/basecamp-client-id.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
basecamp-client-secret = {
|
||||||
|
file = ../../secrets/basecamp-client-secret.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
authentik-env = {file = ../../secrets/authentik-env.age;};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
67
hosts/m3-atlas/services/containers/authentik.nix
Normal file
67
hosts/m3-atlas/services/containers/authentik.nix
Normal file
@@ -0,0 +1,67 @@
|
|||||||
|
{config, ...}: let
|
||||||
|
image = "ghcr.io/goauthentik/server:2026.2.0";
|
||||||
|
|
||||||
|
serverIp = "10.89.0.22";
|
||||||
|
workerIp = "10.89.0.23";
|
||||||
|
|
||||||
|
postgresHost = "10.89.0.1";
|
||||||
|
postgresPort = config.m3ta.ports.get "postgres";
|
||||||
|
authentikPort = config.m3ta.ports.get "authentik";
|
||||||
|
|
||||||
|
sharedEnv = {
|
||||||
|
AUTHENTIK_POSTGRESQL__HOST = postgresHost;
|
||||||
|
AUTHENTIK_POSTGRESQL__PORT = toString postgresPort;
|
||||||
|
AUTHENTIK_POSTGRESQL__USER = "authentik";
|
||||||
|
AUTHENTIK_POSTGRESQL__NAME = "authentik";
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
virtualisation.oci-containers.containers = {
|
||||||
|
"authentik-server" = {
|
||||||
|
inherit image;
|
||||||
|
cmd = ["server"];
|
||||||
|
environment = sharedEnv;
|
||||||
|
environmentFiles = [config.age.secrets.authentik-env.path];
|
||||||
|
ports = ["127.0.0.1:${toString authentikPort}:9000"];
|
||||||
|
volumes = [
|
||||||
|
"authentik_media:/media"
|
||||||
|
"authentik_templates:/templates"
|
||||||
|
];
|
||||||
|
extraOptions = [
|
||||||
|
"--add-host=postgres:${postgresHost}"
|
||||||
|
"--ip=${serverIp}"
|
||||||
|
"--network=web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
"authentik-worker" = {
|
||||||
|
inherit image;
|
||||||
|
cmd = ["worker"];
|
||||||
|
user = "root";
|
||||||
|
environment = sharedEnv;
|
||||||
|
environmentFiles = [config.age.secrets.authentik-env.path];
|
||||||
|
volumes = [
|
||||||
|
"authentik_media:/media"
|
||||||
|
"authentik_certs:/certs"
|
||||||
|
"authentik_templates:/templates"
|
||||||
|
];
|
||||||
|
extraOptions = [
|
||||||
|
"--add-host=postgres:${postgresHost}"
|
||||||
|
"--ip=${workerIp}"
|
||||||
|
"--network=web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.traefik.dynamicConfigOptions.http = {
|
||||||
|
services.authentik.loadBalancer.servers = [
|
||||||
|
{url = "http://localhost:${toString authentikPort}/";}
|
||||||
|
];
|
||||||
|
|
||||||
|
routers.authentik = {
|
||||||
|
rule = "Host(`auth.m3ta.dev`)";
|
||||||
|
tls = {certResolver = "godaddy";};
|
||||||
|
service = "authentik";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -5,11 +5,13 @@
|
|||||||
./kestra.nix
|
./kestra.nix
|
||||||
./littlelink.nix
|
./littlelink.nix
|
||||||
./matomo.nix
|
./matomo.nix
|
||||||
|
./netbird.nix
|
||||||
# ./n8n.nix
|
# ./n8n.nix
|
||||||
# ./pangolin.nix
|
# ./pangolin.nix
|
||||||
./restreamer.nix
|
./restreamer.nix
|
||||||
./slash.nix
|
./slash.nix
|
||||||
./slash-nemoti.nix
|
./slash-nemoti.nix
|
||||||
|
./authentik.nix
|
||||||
];
|
];
|
||||||
system.activationScripts.createPodmanNetworkWeb = lib.mkAfter ''
|
system.activationScripts.createPodmanNetworkWeb = lib.mkAfter ''
|
||||||
if ! /run/current-system/sw/bin/podman network exists web; then
|
if ! /run/current-system/sw/bin/podman network exists web; then
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
{ config, ... }: {
|
{config, ...}: {
|
||||||
virtualisation.oci-containers.containers."kestra" = {
|
virtualisation.oci-containers.containers."kestra" = {
|
||||||
image = "docker.io/kestra/kestra:latest";
|
image = "docker.io/kestra/kestra:latest";
|
||||||
environmentFiles = [ config.age.secrets.kestra-env.path ];
|
environmentFiles = [config.age.secrets.kestra-env.path];
|
||||||
cmd = [ "server" "standalone" "--config" "/etc/config/application.yaml"];
|
cmd = ["server" "standalone" "--config" "/etc/config/application.yaml"];
|
||||||
ports = [ "127.0.0.1:3018:8080" ];
|
ports = ["127.0.0.1:3018:8080"];
|
||||||
user = "root";
|
user = "root";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/var/run/docker.sock:/var/run/docker.sock"
|
"/var/run/docker.sock:/var/run/docker.sock"
|
||||||
@@ -11,8 +11,7 @@
|
|||||||
"kestra_data:/app/storage"
|
"kestra_data:/app/storage"
|
||||||
"/tmp/kestra-wd:/tmp/kestra-wd"
|
"/tmp/kestra-wd:/tmp/kestra-wd"
|
||||||
];
|
];
|
||||||
extraOptions =
|
extraOptions = ["--add-host=postgres:10.89.0.1" "--ip=10.89.0.18" "--network=web"];
|
||||||
[ "--add-host=postgres:10.89.0.1" "--ip=10.89.0.18" "--network=web" ];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
@@ -21,12 +20,11 @@
|
|||||||
|
|
||||||
# Traefik configuration specific to littlelink
|
# Traefik configuration specific to littlelink
|
||||||
services.traefik.dynamicConfigOptions.http = {
|
services.traefik.dynamicConfigOptions.http = {
|
||||||
services.kestra.loadBalancer.servers =
|
services.kestra.loadBalancer.servers = [{url = "http://localhost:3018/";}];
|
||||||
[{ url = "http://localhost:3018/"; }];
|
|
||||||
|
|
||||||
routers.kestra = {
|
routers.kestra = {
|
||||||
rule = "Host(`k.m3ta.dev`)";
|
rule = "Host(`k.m3ta.dev`)";
|
||||||
tls = { certResolver = "godaddy"; };
|
tls = {certResolver = "godaddy";};
|
||||||
service = "kestra";
|
service = "kestra";
|
||||||
entrypoints = "websecure";
|
entrypoints = "websecure";
|
||||||
};
|
};
|
||||||
|
|||||||
244
hosts/m3-atlas/services/containers/netbird.nix
Normal file
244
hosts/m3-atlas/services/containers/netbird.nix
Normal file
@@ -0,0 +1,244 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
serviceName = "netbird";
|
||||||
|
|
||||||
|
stunPort = config.m3ta.ports.get "netbird-stun";
|
||||||
|
proxyTlsPort = config.m3ta.ports.get "netbird-proxy";
|
||||||
|
metricsPort = config.m3ta.ports.get "netbird-metrics";
|
||||||
|
healthPort = config.m3ta.ports.get "netbird-health";
|
||||||
|
postgresPort = config.m3ta.ports.get "postgres";
|
||||||
|
wireguardPort = config.m3ta.ports.get "wireguard";
|
||||||
|
|
||||||
|
domain = "v.m3ta.dev";
|
||||||
|
proxyDomain = "p.m3ta.dev";
|
||||||
|
|
||||||
|
ipBase = "10.89.0";
|
||||||
|
ipOffset = 50;
|
||||||
|
|
||||||
|
dashboardIp = "${ipBase}.${toString ipOffset}";
|
||||||
|
serverIp = "${ipBase}.${toString (ipOffset + 1)}";
|
||||||
|
proxyIp = "${ipBase}.${toString (ipOffset + 2)}";
|
||||||
|
|
||||||
|
# Database configuration
|
||||||
|
dbName = "netbird";
|
||||||
|
dbUser = "netbird";
|
||||||
|
dbHost = "${ipBase}.1";
|
||||||
|
|
||||||
|
# NetBird config as Nix attribute set
|
||||||
|
netbirdConfig = {
|
||||||
|
server = {
|
||||||
|
listenAddress = ":80";
|
||||||
|
exposedAddress = "https://${domain}:443";
|
||||||
|
stunPorts = [stunPort];
|
||||||
|
metricsPort = metricsPort;
|
||||||
|
healthcheckAddress = ":${toString healthPort}";
|
||||||
|
logLevel = "info";
|
||||||
|
logFile = "console";
|
||||||
|
dataDir = "/var/lib/netbird";
|
||||||
|
|
||||||
|
auth = {
|
||||||
|
issuer = "https://${domain}/oauth2";
|
||||||
|
localAuthDisabled = true;
|
||||||
|
signKeyRefreshEnabled = true;
|
||||||
|
dashboardRedirectURIs = [
|
||||||
|
"https://${domain}/nb-auth"
|
||||||
|
"https://${domain}/nb-silent-auth"
|
||||||
|
];
|
||||||
|
cliRedirectURIs = ["http://localhost:53000/"];
|
||||||
|
};
|
||||||
|
|
||||||
|
reverseProxy = {
|
||||||
|
trustedHTTPProxies = ["${ipBase}.1/32"];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Proxy feature
|
||||||
|
proxy = {
|
||||||
|
enabled = true;
|
||||||
|
domain = proxyDomain;
|
||||||
|
};
|
||||||
|
|
||||||
|
store = {
|
||||||
|
engine = "postgres";
|
||||||
|
postgres = {
|
||||||
|
host = dbHost;
|
||||||
|
port = postgresPort;
|
||||||
|
database = dbName;
|
||||||
|
username = dbUser;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Generate YAML from Nix attribute set
|
||||||
|
yamlFormat = pkgs.formats.yaml {};
|
||||||
|
configYamlBase = yamlFormat.generate "netbird-config-base.yaml" netbirdConfig;
|
||||||
|
|
||||||
|
# Script that injects secrets at runtime
|
||||||
|
configGenScript = pkgs.writeShellScript "netbird-gen-config" ''
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
AUTH_SECRET=$(cat "$1")
|
||||||
|
DB_PASSWORD=$(cat "$2")
|
||||||
|
ENCRYPTION_KEY=$(cat "$3")
|
||||||
|
|
||||||
|
${pkgs.yq-go}/bin/yq eval "
|
||||||
|
.server.authSecret = \"$AUTH_SECRET\" |
|
||||||
|
.server.store.encryptionKey = \"$ENCRYPTION_KEY\" |
|
||||||
|
.server.store.postgres.password = \"$DB_PASSWORD\"
|
||||||
|
" ${configYamlBase}
|
||||||
|
'';
|
||||||
|
in {
|
||||||
|
age.secrets."${serviceName}-auth-secret".file = ../../../../secrets/${serviceName}-auth-secret.age;
|
||||||
|
age.secrets."${serviceName}-db-password".file = ../../../../secrets/${serviceName}-db-password.age;
|
||||||
|
age.secrets."${serviceName}-encryption-key".file = ../../../../secrets/${serviceName}-encryption-key.age;
|
||||||
|
age.secrets."${serviceName}-dashboard-env".file = ../../../../secrets/${serviceName}-dashboard-env.age;
|
||||||
|
age.secrets."${serviceName}-server-env".file = ../../../../secrets/${serviceName}-server-env.age;
|
||||||
|
age.secrets."${serviceName}-proxy-env".file = ../../../../secrets/${serviceName}-proxy-env.age;
|
||||||
|
# Oneshot systemd service that generates the config with injected secrets
|
||||||
|
systemd.services."${serviceName}-config" = {
|
||||||
|
description = "Generate NetBird config with secrets";
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
before = ["podman-${serviceName}-server.service"];
|
||||||
|
requiredBy = ["podman-${serviceName}-server.service"];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
ExecStart = pkgs.writeShellScript "netbird-write-config" ''
|
||||||
|
mkdir -p /var/lib/${serviceName}
|
||||||
|
${configGenScript} \
|
||||||
|
${config.age.secrets."${serviceName}-auth-secret".path} \
|
||||||
|
${config.age.secrets."${serviceName}-db-password".path} \
|
||||||
|
${config.age.secrets."${serviceName}-encryption-key".path} \
|
||||||
|
> /var/lib/${serviceName}/config.yaml
|
||||||
|
chmod 600 /var/lib/${serviceName}/config.yaml
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
virtualisation.oci-containers.containers = {
|
||||||
|
"${serviceName}-dashboard" = {
|
||||||
|
image = "netbirdio/dashboard:latest";
|
||||||
|
autoStart = true;
|
||||||
|
environmentFiles = [config.age.secrets."${serviceName}-dashboard-env".path];
|
||||||
|
extraOptions = [
|
||||||
|
"--ip=${dashboardIp}"
|
||||||
|
"--network=web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
"${serviceName}-server" = {
|
||||||
|
image = "netbirdio/netbird-server:latest";
|
||||||
|
autoStart = true;
|
||||||
|
ports = ["${toString stunPort}:${toString stunPort}/udp"];
|
||||||
|
environmentFiles = [config.age.secrets."${serviceName}-server-env".path];
|
||||||
|
volumes = [
|
||||||
|
"${serviceName}_data:/var/lib/netbird"
|
||||||
|
"/var/lib/${serviceName}/config.yaml:/etc/netbird/config.yaml:ro"
|
||||||
|
];
|
||||||
|
cmd = ["--config" "/etc/netbird/config.yaml"];
|
||||||
|
extraOptions = [
|
||||||
|
"--ip=${serverIp}"
|
||||||
|
"--network=web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
"${serviceName}-proxy" = {
|
||||||
|
image = "netbirdio/reverse-proxy:latest";
|
||||||
|
autoStart = true;
|
||||||
|
ports = ["${toString wireguardPort}:${toString wireguardPort}/udp"];
|
||||||
|
volumes = [
|
||||||
|
"${serviceName}_proxy_certs:/certs"
|
||||||
|
];
|
||||||
|
environmentFiles = [config.age.secrets."${serviceName}-proxy-env".path];
|
||||||
|
cmd = [
|
||||||
|
"--domain=${proxyDomain}"
|
||||||
|
"--mgmt=https://${domain}:443"
|
||||||
|
"--addr=:${toString proxyTlsPort}"
|
||||||
|
"--cert-dir=/certs"
|
||||||
|
"--acme-certs"
|
||||||
|
"--trusted-proxies=${ipBase}.1/32"
|
||||||
|
];
|
||||||
|
dependsOn = ["${serviceName}-server"];
|
||||||
|
extraOptions = [
|
||||||
|
"--ip=${proxyIp}"
|
||||||
|
"--network=web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.traefik.dynamicConfigOptions = {
|
||||||
|
# HTTP services and routers
|
||||||
|
http = {
|
||||||
|
services = {
|
||||||
|
"${serviceName}-dashboard".loadBalancer.servers = [
|
||||||
|
{url = "http://${dashboardIp}:80/";}
|
||||||
|
];
|
||||||
|
|
||||||
|
"${serviceName}-server".loadBalancer.servers = [
|
||||||
|
{url = "http://${serverIp}:80/";}
|
||||||
|
];
|
||||||
|
|
||||||
|
"${serviceName}-server-h2c".loadBalancer.servers = [
|
||||||
|
{url = "h2c://${serverIp}:80";}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
routers = {
|
||||||
|
# gRPC (Signal + Management)
|
||||||
|
"${serviceName}-grpc" = {
|
||||||
|
rule = "Host(`${domain}`) && (PathPrefix(`/signalexchange.SignalExchange/`) || PathPrefix(`/management.ManagementService/`) || PathPrefix(`/management.ProxyService/`))";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
tls.certResolver = "godaddy";
|
||||||
|
service = "${serviceName}-server-h2c";
|
||||||
|
priority = 100;
|
||||||
|
};
|
||||||
|
# Backend (relay, WebSocket, API, OAuth2)
|
||||||
|
"${serviceName}-backend" = {
|
||||||
|
rule = "Host(`${domain}`) && (PathPrefix(`/relay`) || PathPrefix(`/ws-proxy/`) || PathPrefix(`/api`) || PathPrefix(`/oauth2`))";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
tls.certResolver = "godaddy";
|
||||||
|
service = "${serviceName}-server";
|
||||||
|
priority = 100;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Dashboard (catch-all, lowest priority)
|
||||||
|
"${serviceName}-dashboard" = {
|
||||||
|
rule = "Host(`${domain}`)";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
tls.certResolver = "godaddy";
|
||||||
|
service = "${serviceName}-dashboard";
|
||||||
|
priority = 1;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# TCP for proxy TLS passthrough
|
||||||
|
tcp = {
|
||||||
|
services."${serviceName}-proxy-tls".loadBalancer.servers = [
|
||||||
|
{address = "${proxyIp}:${toString proxyTlsPort}";}
|
||||||
|
];
|
||||||
|
|
||||||
|
routers."${serviceName}-proxy-passthrough" = {
|
||||||
|
entryPoints = ["websecure"];
|
||||||
|
rule = "HostSNI(`*`)";
|
||||||
|
service = "${serviceName}-proxy-tls";
|
||||||
|
priority = 1;
|
||||||
|
tls.passthrough = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# ServersTransport for Proxy Protocol v2 (optional)
|
||||||
|
serversTransports."pp-v2" = {
|
||||||
|
proxyProtocol.version = 2;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.allowedUDPPorts = [
|
||||||
|
stunPort # STUN
|
||||||
|
wireguardPort # WireGuard for proxy
|
||||||
|
];
|
||||||
|
}
|
||||||
@@ -1,211 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
# Define the Pangolin configuration as a Nix attribute set
|
|
||||||
pangolinConfig = {
|
|
||||||
app = {
|
|
||||||
dashboard_url = "https://vpn.m3tam3re.com";
|
|
||||||
log_level = "info";
|
|
||||||
save_logs = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
domains = {
|
|
||||||
vpn = {
|
|
||||||
base_domain = "m3tam3re.com";
|
|
||||||
cert_resolver = "godaddy";
|
|
||||||
prefer_wildcard_cert = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
server = {
|
|
||||||
external_port = 3000;
|
|
||||||
internal_port = 3001;
|
|
||||||
next_port = 3002;
|
|
||||||
internal_hostname = "pangolin";
|
|
||||||
session_cookie_name = "p_session_token";
|
|
||||||
resource_access_token_param = "p_token";
|
|
||||||
resource_session_request_param = "p_session_request";
|
|
||||||
};
|
|
||||||
|
|
||||||
traefik = {
|
|
||||||
cert_resolver = "godaddy";
|
|
||||||
http_entrypoint = "web";
|
|
||||||
https_entrypoint = "websecure";
|
|
||||||
};
|
|
||||||
|
|
||||||
gerbil = {
|
|
||||||
start_port = 51820;
|
|
||||||
base_endpoint = "vpn.m3tam3re.com";
|
|
||||||
use_subdomain = false;
|
|
||||||
block_size = 24;
|
|
||||||
site_block_size = 30;
|
|
||||||
subnet_group = "100.89.137.0/20";
|
|
||||||
};
|
|
||||||
|
|
||||||
rate_limits = {
|
|
||||||
global = {
|
|
||||||
window_minutes = 1;
|
|
||||||
max_requests = 100;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
email = {
|
|
||||||
smtp_host = config.age.secrets.smtp-host.path;
|
|
||||||
smtp_port = 587;
|
|
||||||
smtp_user = config.age.secrets.smtp-user.path;
|
|
||||||
smtp_pass = config.age.secrets.smtp-pass.path;
|
|
||||||
no_reply = config.age.secrets.smtp-user.path;
|
|
||||||
};
|
|
||||||
|
|
||||||
users = {
|
|
||||||
server_admin = {
|
|
||||||
email = "admin@m3tam3re.com";
|
|
||||||
password = config.age.secrets.pangolin-admin-password.path;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
flags = {
|
|
||||||
require_email_verification = true;
|
|
||||||
disable_signup_without_invite = true;
|
|
||||||
disable_user_create_org = true;
|
|
||||||
allow_raw_resources = true;
|
|
||||||
allow_base_domain_resources = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Convert Nix attribute set to YAML using a simpler approach
|
|
||||||
pangolinConfigYaml = pkgs.writeTextFile {
|
|
||||||
name = "config.yml";
|
|
||||||
text = lib.generators.toYAML {} pangolinConfig;
|
|
||||||
};
|
|
||||||
in {
|
|
||||||
# Define the containers
|
|
||||||
virtualisation.oci-containers.containers = {
|
|
||||||
"pangolin" = {
|
|
||||||
image = "fosrl/pangolin:1.1.0";
|
|
||||||
autoStart = true;
|
|
||||||
volumes = [
|
|
||||||
"${pangolinConfigYaml}:/app/config/config.yml:ro" # Mount the config file directly
|
|
||||||
"pangolin_config:/app/config/data" # Volume for persistent data
|
|
||||||
];
|
|
||||||
ports = [
|
|
||||||
"127.0.0.1:3020:3001" # API server
|
|
||||||
"127.0.0.1:3021:3002" # Next.js server
|
|
||||||
"127.0.0.1:3022:3000" # API/WebSocket server
|
|
||||||
];
|
|
||||||
extraOptions = ["--ip=10.89.0.20" "--network=web"];
|
|
||||||
};
|
|
||||||
|
|
||||||
"gerbil" = {
|
|
||||||
image = "fosrl/gerbil:1.0.0";
|
|
||||||
autoStart = true;
|
|
||||||
volumes = [
|
|
||||||
"pangolin_config:/var/config" # Share the volume for persistent data
|
|
||||||
];
|
|
||||||
cmd = [
|
|
||||||
"--reachableAt=http://gerbil:3003"
|
|
||||||
"--generateAndSaveKeyTo=/var/config/key"
|
|
||||||
"--remoteConfig=http://pangolin:3001/api/v1/gerbil/get-config"
|
|
||||||
"--reportBandwidthTo=http://pangolin:3001/api/v1/gerbil/receive-bandwidth"
|
|
||||||
];
|
|
||||||
ports = [
|
|
||||||
"51820:51820/udp" # WireGuard port
|
|
||||||
];
|
|
||||||
extraOptions = [
|
|
||||||
"--ip=10.89.0.21"
|
|
||||||
"--network=web"
|
|
||||||
"--cap-add=NET_ADMIN"
|
|
||||||
"--cap-add=SYS_MODULE"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Secrets for Pangolin
|
|
||||||
# age.secrets = {
|
|
||||||
# "smtp-host" = {
|
|
||||||
# file = ../secrets/smtp-host.age;
|
|
||||||
# owner = "root";
|
|
||||||
# group = "root";
|
|
||||||
# mode = "0400";
|
|
||||||
# };
|
|
||||||
# "smtp-user" = {
|
|
||||||
# file = ../secrets/smtp-user.age;
|
|
||||||
# owner = "root";
|
|
||||||
# group = "root";
|
|
||||||
# mode = "0400";
|
|
||||||
# };
|
|
||||||
# "smtp-pass" = {
|
|
||||||
# file = ../secrets/smtp-pass.age;
|
|
||||||
# owner = "root";
|
|
||||||
# group = "root";
|
|
||||||
# mode = "0400";
|
|
||||||
# };
|
|
||||||
# "pangolin-admin-password" = {
|
|
||||||
# file = ../secrets/pangolin-admin-password.age;
|
|
||||||
# owner = "root";
|
|
||||||
# group = "root";
|
|
||||||
# mode = "0400";
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
# Traefik configuration for Pangolin
|
|
||||||
services.traefik.dynamicConfigOptions = {
|
|
||||||
http = {
|
|
||||||
# Next.js service (front-end)
|
|
||||||
services.pangolin-next-service.loadBalancer.servers = [
|
|
||||||
{url = "http://localhost:3021";}
|
|
||||||
];
|
|
||||||
|
|
||||||
# API service
|
|
||||||
services.pangolin-api-service.loadBalancer.servers = [
|
|
||||||
{url = "http://localhost:3022";}
|
|
||||||
];
|
|
||||||
|
|
||||||
# Routers
|
|
||||||
routers = {
|
|
||||||
# Next.js router (handles everything except API paths)
|
|
||||||
"pangolin-next" = {
|
|
||||||
rule = "Host(`vpn.m3tam3re.com`) && !PathPrefix(`/api/v1`)";
|
|
||||||
service = "pangolin-next-service";
|
|
||||||
entrypoints = ["websecure"];
|
|
||||||
tls = {
|
|
||||||
certResolver = "godaddy";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# API router
|
|
||||||
"pangolin-api" = {
|
|
||||||
rule = "Host(`vpn.m3tam3re.com`) && PathPrefix(`/api/v1`)";
|
|
||||||
service = "pangolin-api-service";
|
|
||||||
entrypoints = ["websecure"];
|
|
||||||
tls = {
|
|
||||||
certResolver = "godaddy";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Add HTTP provider to Traefik for dynamic configuration from Pangolin
|
|
||||||
services.traefik.staticConfigOptions.providers.http = {
|
|
||||||
endpoint = "http://localhost:3020/api/v1/traefik-config";
|
|
||||||
pollInterval = "5s";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Add experimental section for Badger plugin
|
|
||||||
services.traefik.staticConfigOptions.experimental = {
|
|
||||||
plugins = {
|
|
||||||
#TODO create an overlay for the plugin
|
|
||||||
badger = {
|
|
||||||
moduleName = "github.com/fosrl/badger";
|
|
||||||
version = "v1.0.0";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Firewall configuration for WireGuard
|
|
||||||
networking.firewall.allowedUDPPorts = [51820]; # WireGuard port
|
|
||||||
}
|
|
||||||
@@ -1,17 +1,16 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
./tuwunel.nix
|
||||||
./containers
|
./containers
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
./gitea-actions-runner.nix
|
./gitea-actions-runner.nix
|
||||||
./headscale.nix
|
./rustfs.nix
|
||||||
./minio.nix
|
|
||||||
./mysql.nix
|
./mysql.nix
|
||||||
|
./netbird.nix
|
||||||
./n8n.nix
|
./n8n.nix
|
||||||
./outline.nix
|
|
||||||
./paperless.nix
|
./paperless.nix
|
||||||
./postgres.nix
|
./postgres.nix
|
||||||
./searx.nix
|
./searx.nix
|
||||||
./tailscale.nix
|
|
||||||
./traefik.nix
|
./traefik.nix
|
||||||
./vaultwarden.nix
|
./vaultwarden.nix
|
||||||
./wastebin.nix
|
./wastebin.nix
|
||||||
|
|||||||
@@ -1,119 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
# Define a new option for the admin user
|
|
||||||
options.services.headscale = {
|
|
||||||
adminUser = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
default = "m3tam3re";
|
|
||||||
description = "Username for the headscale admin user";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = let
|
|
||||||
adminUser = config.services.headscale.adminUser;
|
|
||||||
|
|
||||||
aclConfig = {
|
|
||||||
# Groups definition
|
|
||||||
groups = {
|
|
||||||
"group:admins" = ["${adminUser}"];
|
|
||||||
};
|
|
||||||
|
|
||||||
acls = [
|
|
||||||
# Allow all connections within the tailnet
|
|
||||||
{
|
|
||||||
action = "accept";
|
|
||||||
src = ["*"];
|
|
||||||
dst = ["*:*"];
|
|
||||||
}
|
|
||||||
# Allow admin to connect to their own services
|
|
||||||
{
|
|
||||||
action = "accept";
|
|
||||||
src = ["${adminUser}"];
|
|
||||||
dst = ["${adminUser}:*"];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
# Auto-approvers section for routes
|
|
||||||
autoApprovers = {
|
|
||||||
routes = {
|
|
||||||
"0.0.0.0/0" = ["${adminUser}"];
|
|
||||||
"10.0.0.0/8" = ["${adminUser}"];
|
|
||||||
"192.168.0.0/16" = ["${adminUser}"];
|
|
||||||
};
|
|
||||||
|
|
||||||
exitNode = ["${adminUser}"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# Convert to HuJSON format with comments
|
|
||||||
aclHuJson = ''
|
|
||||||
// Headscale ACL Policy - Generated by NixOS
|
|
||||||
// Admin user: ${adminUser}
|
|
||||||
|
|
||||||
${builtins.toJSON aclConfig}
|
|
||||||
'';
|
|
||||||
aclFile = pkgs.writeText "acl-policy.hujson" aclHuJson;
|
|
||||||
in {
|
|
||||||
services = {
|
|
||||||
headscale = {
|
|
||||||
enable = true;
|
|
||||||
adminUser = "m3tam3re@m3ta.loc";
|
|
||||||
port = 3009;
|
|
||||||
settings = {
|
|
||||||
server_url = "https://va.m3tam3re.com";
|
|
||||||
dns = {
|
|
||||||
base_domain = "m3ta.loc";
|
|
||||||
nameservers.global = ["8.8.8.8"];
|
|
||||||
};
|
|
||||||
logtail.enabled = false;
|
|
||||||
policy.path = "${aclFile}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Create a systemd service to ensure the admin user exists
|
|
||||||
systemd.services.headscale-ensure-admin = lib.mkIf config.services.headscale.enable {
|
|
||||||
description = "Ensure Headscale admin user exists";
|
|
||||||
after = ["headscale.service"];
|
|
||||||
requires = ["headscale.service"];
|
|
||||||
wantedBy = ["multi-user.target"];
|
|
||||||
serviceConfig = {
|
|
||||||
Type = "oneshot";
|
|
||||||
RemainAfterExit = true;
|
|
||||||
User = "headscale";
|
|
||||||
Group = "headscale";
|
|
||||||
};
|
|
||||||
|
|
||||||
script = ''
|
|
||||||
# Check if user exists and create if needed
|
|
||||||
if ! ${pkgs.headscale}/bin/headscale users list | grep -q "${adminUser}"; then
|
|
||||||
echo "Creating headscale admin user: ${adminUser}"
|
|
||||||
${pkgs.headscale}/bin/headscale users create "${adminUser}"
|
|
||||||
else
|
|
||||||
echo "Headscale admin user ${adminUser} already exists"
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
# Traefik configuration for headscale
|
|
||||||
services.traefik.dynamicConfigOptions.http = {
|
|
||||||
services.headscale.loadBalancer.servers = [
|
|
||||||
{
|
|
||||||
url = "http://localhost:3009/";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
routers.headscale = {
|
|
||||||
rule = "Host(`va.m3tam3re.com`)";
|
|
||||||
tls = {
|
|
||||||
certResolver = "godaddy";
|
|
||||||
};
|
|
||||||
service = "headscale";
|
|
||||||
entrypoints = "websecure";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
191
hosts/m3-atlas/services/hermes-agent.nix
Normal file
191
hosts/m3-atlas/services/hermes-agent.nix
Normal file
@@ -0,0 +1,191 @@
|
|||||||
|
{config, ...}: let
|
||||||
|
# Default ElevenLabs voice: Bella (German-capable female)
|
||||||
|
elevenlabsVoiceId = "hpp4J3VqNfWAUOO0d1Us";
|
||||||
|
in {
|
||||||
|
services.hermes-agent = {
|
||||||
|
enable = true;
|
||||||
|
addToSystemPackages = true;
|
||||||
|
|
||||||
|
# Secrets via agenix
|
||||||
|
environmentFiles = [config.age.secrets."hermes-env".path];
|
||||||
|
|
||||||
|
# Non-secret environment variables
|
||||||
|
environment = {
|
||||||
|
#
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Container mode (podman) ──────────────────────────────────────────
|
||||||
|
container = {
|
||||||
|
enable = true;
|
||||||
|
backend = "podman";
|
||||||
|
};
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
# ── Model ──────────────────────────────────────────────────────────
|
||||||
|
model = {
|
||||||
|
default = "glm-5.1";
|
||||||
|
provider = "zai";
|
||||||
|
base_url = "https://api.z.ai/api/coding/paas/v4/";
|
||||||
|
};
|
||||||
|
|
||||||
|
credential_pool_strategies = {
|
||||||
|
zai = "fill_first";
|
||||||
|
};
|
||||||
|
|
||||||
|
toolsets = ["all"];
|
||||||
|
|
||||||
|
# ── Agent ──────────────────────────────────────────────────────────
|
||||||
|
agent = {
|
||||||
|
max_turns = 90;
|
||||||
|
gateway_timeout = 1800;
|
||||||
|
tool_use_enforcement = "auto";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Terminal ───────────────────────────────────────────────────────
|
||||||
|
terminal = {
|
||||||
|
backend = "local";
|
||||||
|
modal_mode = "auto";
|
||||||
|
cwd = ".";
|
||||||
|
timeout = 180;
|
||||||
|
persistent_shell = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Browser ────────────────────────────────────────────────────────
|
||||||
|
browser = {
|
||||||
|
inactivity_timeout = 120;
|
||||||
|
command_timeout = 30;
|
||||||
|
cloud_provider = "local";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Checkpoints / Compression ──────────────────────────────────────
|
||||||
|
checkpoints = {
|
||||||
|
enabled = true;
|
||||||
|
max_snapshots = 50;
|
||||||
|
};
|
||||||
|
|
||||||
|
file_read_max_chars = 100000;
|
||||||
|
|
||||||
|
compression = {
|
||||||
|
enabled = true;
|
||||||
|
threshold = 0.5;
|
||||||
|
target_ratio = 0.2;
|
||||||
|
protect_last_n = 20;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Display ────────────────────────────────────────────────────────
|
||||||
|
display = {
|
||||||
|
compact = false;
|
||||||
|
personality = "kawaii";
|
||||||
|
resume_display = "full";
|
||||||
|
busy_input_mode = "interrupt";
|
||||||
|
inline_diffs = true;
|
||||||
|
skin = "default";
|
||||||
|
tool_progress = "all";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── TTS / STT / Voice ──────────────────────────────────────────────
|
||||||
|
tts = {
|
||||||
|
provider = "elevenlabs";
|
||||||
|
elevenlabs = {
|
||||||
|
voice_id = elevenlabsVoiceId;
|
||||||
|
model_id = "eleven_multilingual_v2";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
stt = {
|
||||||
|
enabled = true;
|
||||||
|
provider = "local";
|
||||||
|
local = {model = "base";};
|
||||||
|
};
|
||||||
|
|
||||||
|
voice = {
|
||||||
|
record_key = "ctrl+b";
|
||||||
|
max_recording_seconds = 120;
|
||||||
|
silence_threshold = 200;
|
||||||
|
silence_duration = 3.0;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Memory ─────────────────────────────────────────────────────────
|
||||||
|
memory = {
|
||||||
|
memory_enabled = true;
|
||||||
|
user_profile_enabled = true;
|
||||||
|
memory_char_limit = 2200;
|
||||||
|
user_char_limit = 1375;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Delegation ─────────────────────────────────────────────────────
|
||||||
|
delegation = {
|
||||||
|
max_iterations = 50;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Discord ────────────────────────────────────────────────────────
|
||||||
|
discord = {
|
||||||
|
require_mention = true;
|
||||||
|
auto_thread = true;
|
||||||
|
reactions = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Approvals / Security ───────────────────────────────────────────
|
||||||
|
approvals = {
|
||||||
|
mode = "manual";
|
||||||
|
timeout = 60;
|
||||||
|
};
|
||||||
|
|
||||||
|
security = {
|
||||||
|
redact_secrets = true;
|
||||||
|
tirith_enabled = true;
|
||||||
|
tirith_fail_open = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Cron / Session ─────────────────────────────────────────────────
|
||||||
|
cron = {wrap_response = true;};
|
||||||
|
|
||||||
|
session_reset = {
|
||||||
|
mode = "both";
|
||||||
|
idle_minutes = 1440;
|
||||||
|
at_hour = 4;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Web ────────────────────────────────────────────────────────────
|
||||||
|
web = {backend = "exa";};
|
||||||
|
|
||||||
|
# ── Platform Toolsets ──────────────────────────────────────────────
|
||||||
|
platform_toolsets = {
|
||||||
|
cli = [
|
||||||
|
"browser"
|
||||||
|
"clarify"
|
||||||
|
"code_execution"
|
||||||
|
"cronjob"
|
||||||
|
"delegation"
|
||||||
|
"file"
|
||||||
|
"image_gen"
|
||||||
|
"memory"
|
||||||
|
"session_search"
|
||||||
|
"skills"
|
||||||
|
"terminal"
|
||||||
|
"todo"
|
||||||
|
"tts"
|
||||||
|
"vision"
|
||||||
|
"web"
|
||||||
|
];
|
||||||
|
telegram = [
|
||||||
|
"browser"
|
||||||
|
"clarify"
|
||||||
|
"code_execution"
|
||||||
|
"cronjob"
|
||||||
|
"delegation"
|
||||||
|
"file"
|
||||||
|
"image_gen"
|
||||||
|
"memory"
|
||||||
|
"session_search"
|
||||||
|
"skills"
|
||||||
|
"terminal"
|
||||||
|
"todo"
|
||||||
|
"tts"
|
||||||
|
"vision"
|
||||||
|
"web"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,8 +1,16 @@
|
|||||||
{config, ...}: {
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
services.n8n = {
|
services.n8n = {
|
||||||
enable = true;
|
enable = true;
|
||||||
environment.WEBHOOK_URL = "https://wf.m3tam3re.com";
|
environment.WEBHOOK_URL = "https://wf.m3tam3re.com";
|
||||||
};
|
};
|
||||||
|
# Temporary fix for upstream module
|
||||||
|
systemd.services.n8n.serviceConfig.LoadCredential = lib.mkForce [];
|
||||||
|
systemd.services.n8n.environment.N8N_RUNNERS_AUTH_TOKEN_FILE = lib.mkForce null;
|
||||||
|
|
||||||
systemd.services.n8n.serviceConfig = {
|
systemd.services.n8n.serviceConfig = {
|
||||||
EnvironmentFile = ["${config.age.secrets.n8n-env.path}"];
|
EnvironmentFile = ["${config.age.secrets.n8n-env.path}"];
|
||||||
};
|
};
|
||||||
|
|||||||
28
hosts/m3-atlas/services/netbird.nix
Normal file
28
hosts/m3-atlas/services/netbird.nix
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
{pkgs, ...}: {
|
||||||
|
services.netbird.enable = true;
|
||||||
|
|
||||||
|
systemd.services.netbird = {
|
||||||
|
environment = {
|
||||||
|
NB_DISABLE_SSH_CONFIG = "true";
|
||||||
|
};
|
||||||
|
path = [
|
||||||
|
pkgs.shadow
|
||||||
|
pkgs.util-linux
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.ssh.extraConfig = ''
|
||||||
|
Match exec "${pkgs.netbird}/bin/netbird ssh detect %h %p"
|
||||||
|
PreferredAuthentications password,publickey,keyboard-interactive
|
||||||
|
PasswordAuthentication yes
|
||||||
|
PubkeyAuthentication yes
|
||||||
|
BatchMode no
|
||||||
|
ProxyCommand ${pkgs.netbird}/bin/netbird ssh proxy %h %p
|
||||||
|
StrictHostKeyChecking no
|
||||||
|
UserKnownHostsFile /dev/null
|
||||||
|
CheckHostIP no
|
||||||
|
LogLevel ERROR
|
||||||
|
'';
|
||||||
|
|
||||||
|
networking.firewall.checkReversePath = "loose";
|
||||||
|
}
|
||||||
@@ -1,33 +0,0 @@
|
|||||||
{
|
|
||||||
services.outline = {
|
|
||||||
enable = true;
|
|
||||||
port = 3019;
|
|
||||||
publicUrl = "https://ol.m3ta.dev";
|
|
||||||
databaseUrl = "postgresql://outline:outline@127.0.0.1:5432/outline";
|
|
||||||
storage = {
|
|
||||||
storageType = "local";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
systemd.services.outline.serviceConfig = {
|
|
||||||
Environment = [
|
|
||||||
"PGSSLMODE=disable"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
# Traefik configuration specific to littlelink
|
|
||||||
services.traefik.dynamicConfigOptions.http = {
|
|
||||||
services.outline.loadBalancer.servers = [
|
|
||||||
{
|
|
||||||
url = "http://localhost:3019/";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
routers.outline = {
|
|
||||||
rule = "Host(`ol.m3ta.dev`)";
|
|
||||||
tls = {
|
|
||||||
certResolver = "godaddy";
|
|
||||||
};
|
|
||||||
service = "outline";
|
|
||||||
entrypoints = "websecure";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -26,6 +26,8 @@
|
|||||||
# Podman network connections for Baserow
|
# Podman network connections for Baserow
|
||||||
host baserow baserow 10.89.0.0/24 scram-sha-256
|
host baserow baserow 10.89.0.0/24 scram-sha-256
|
||||||
host kestra kestra 10.89.0.0/24 scram-sha-256
|
host kestra kestra 10.89.0.0/24 scram-sha-256
|
||||||
|
host netbird netbird 10.89.0.0/24 scram-sha-256
|
||||||
|
host authentik authentik 10.89.0.0/24 scram-sha-256
|
||||||
|
|
||||||
# Deny all other connections
|
# Deny all other connections
|
||||||
local all all reject
|
local all all reject
|
||||||
@@ -36,7 +38,7 @@
|
|||||||
services.postgresqlBackup = {
|
services.postgresqlBackup = {
|
||||||
enable = true;
|
enable = true;
|
||||||
startAt = "03:10:00";
|
startAt = "03:10:00";
|
||||||
databases = ["baserow" "paperless" "kestra"];
|
databases = ["baserow" "paperless" "kestra" "authentik" "netbird"];
|
||||||
};
|
};
|
||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
extraCommands = ''
|
extraCommands = ''
|
||||||
|
|||||||
@@ -1,14 +1,29 @@
|
|||||||
{config, ...}: {
|
{
|
||||||
services.minio = {
|
config,
|
||||||
|
inputs,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
services.rustfs = {
|
||||||
enable = true;
|
enable = true;
|
||||||
region = "eu-central-1";
|
package = inputs.rustfs.packages.${pkgs.stdenv.hostPlatform.system}.default;
|
||||||
|
|
||||||
|
# Reuse existing MinIO data directory
|
||||||
|
volumes = "/var/storage/s3";
|
||||||
|
|
||||||
|
# Keep same ports as MinIO to avoid changing Traefik and client configs
|
||||||
|
address = ":3008";
|
||||||
|
consoleEnable = true;
|
||||||
consoleAddress = ":3007";
|
consoleAddress = ":3007";
|
||||||
listenAddress = ":3008";
|
|
||||||
browser = true;
|
# Credentials via agenix
|
||||||
rootCredentialsFile = config.age.secrets.minio-root-cred.path;
|
accessKeyFile = config.age.secrets.rustfs-access-key.path;
|
||||||
dataDir = ["/var/storage/s3"];
|
secretKeyFile = config.age.secrets.rustfs-secret-key.path;
|
||||||
|
|
||||||
|
logLevel = "info";
|
||||||
};
|
};
|
||||||
# Traefik configuration specific to minio
|
|
||||||
|
# Traefik configuration — same routes as before
|
||||||
services.traefik.dynamicConfigOptions.http = {
|
services.traefik.dynamicConfigOptions.http = {
|
||||||
services.minio-console.loadBalancer.servers = [
|
services.minio-console.loadBalancer.servers = [
|
||||||
{
|
{
|
||||||
@@ -1,27 +0,0 @@
|
|||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
services.tailscale = {
|
|
||||||
enable = true;
|
|
||||||
authKeyFile = config.age.secrets.tailscale-key.path;
|
|
||||||
useRoutingFeatures = "both";
|
|
||||||
extraUpFlags = [
|
|
||||||
"--login-server=${config.services.headscale.settings.server_url}"
|
|
||||||
"--advertise-exit-node"
|
|
||||||
"--accept-routes"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
services.networkd-dispatcher = lib.mkIf config.services.tailscale.enable {
|
|
||||||
enable = true;
|
|
||||||
rules."50-tailscale" = {
|
|
||||||
onState = ["routable"];
|
|
||||||
script = ''
|
|
||||||
NETDEV=$(ip -o route get 8.8.8.8 | cut -f 5 -d " ")
|
|
||||||
${pkgs.ethtool}/bin/ethtool -K "$NETDEV" rx-udp-gro-forwarding on rx-gro-list off
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
50
hosts/m3-atlas/services/tuwunel.nix
Normal file
50
hosts/m3-atlas/services/tuwunel.nix
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
{config, ...}: let
|
||||||
|
# Tuwunel uses a list for ports
|
||||||
|
tuwunel-port = config.m3ta.ports.get "tuwunel";
|
||||||
|
in {
|
||||||
|
services.matrix-tuwunel = {
|
||||||
|
enable = true;
|
||||||
|
settings.global = {
|
||||||
|
server_name = "m3ta.dev";
|
||||||
|
address = ["127.0.0.1"];
|
||||||
|
port = [tuwunel-port];
|
||||||
|
max_request_size = 20000000;
|
||||||
|
allow_registration = true;
|
||||||
|
registration_token_file = config.age.secrets."tuwunel-registration-token".path;
|
||||||
|
allow_encryption = true;
|
||||||
|
allow_federation = true;
|
||||||
|
trusted_servers = ["matrix.org"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Traefik configuration for Tuwunel
|
||||||
|
services.traefik.dynamicConfigOptions.http = {
|
||||||
|
services.tuwunel.loadBalancer.servers = [
|
||||||
|
{
|
||||||
|
url = "http://localhost:${toString tuwunel-port}/";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
routers.tuwunel = {
|
||||||
|
rule = "Host(`matrix.m3ta.dev`)";
|
||||||
|
tls = {
|
||||||
|
certResolver = "godaddy";
|
||||||
|
};
|
||||||
|
service = "tuwunel";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Federation endpoint on base domain
|
||||||
|
routers.tuwunel-federation = {
|
||||||
|
rule = "Host(`m3ta.dev`) && PathPrefix(`/_matrix`)";
|
||||||
|
tls = {
|
||||||
|
certResolver = "godaddy";
|
||||||
|
};
|
||||||
|
service = "tuwunel";
|
||||||
|
entrypoints = "websecure";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Open federation port
|
||||||
|
networking.firewall.allowedTCPPorts = [8448];
|
||||||
|
}
|
||||||
37
hosts/m3-daedalus/home.nix
Normal file
37
hosts/m3-daedalus/home.nix
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
# hosts/m3-daedalus/home.nix — Host-specific home-manager overrides.
|
||||||
|
# Portable laptop: no Hyprland, no external monitors.
|
||||||
|
# Everything else (shell, editors, media, theme, etc.) comes from
|
||||||
|
# m3ta-home via the profile mapping in hosts/common/users/m3tam3re.nix.
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
with lib; {
|
||||||
|
config = {
|
||||||
|
# ── XDG / MIME defaults ──
|
||||||
|
xdg = {
|
||||||
|
enable = true;
|
||||||
|
configFile."mimeapps.list".force = true;
|
||||||
|
mimeApps = {
|
||||||
|
enable = true;
|
||||||
|
associations.added = {
|
||||||
|
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
||||||
|
"application/csv" = ["calc.desktop"];
|
||||||
|
"application/pdf" = ["vivaldi-stable.desktop"];
|
||||||
|
"x-scheme-handler/http" = ["vivaldi-stable.desktop"];
|
||||||
|
"x-scheme-handler/https" = ["vivaldi-stable.desktop"];
|
||||||
|
};
|
||||||
|
defaultApplications = {
|
||||||
|
"application/zip" = ["org.gnome.FileRoller.desktop"];
|
||||||
|
"application/csv" = ["calc.desktop"];
|
||||||
|
"application/pdf" = ["vivaldi-stable.desktop"];
|
||||||
|
"application/md" = ["dev.zed.Zed.desktop"];
|
||||||
|
"application/text" = ["dev.zed.Zed.desktop"];
|
||||||
|
"x-scheme-handler/http" = ["vivaldi-stable.desktop"];
|
||||||
|
"x-scheme-handler/https" = ["vivaldi-stable.desktop"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,24 +1,28 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
{
|
||||||
|
config,
|
||||||
{
|
lib,
|
||||||
imports =
|
pkgs,
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
modulesPath,
|
||||||
];
|
...
|
||||||
|
}: {
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
|
imports = [
|
||||||
boot.initrd.kernelModules = [ ];
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
boot.kernelModules = [ ];
|
];
|
||||||
boot.extraModulePackages = [ ];
|
|
||||||
|
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod"];
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
boot.initrd.kernelModules = [];
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
boot.kernelModules = [];
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
boot.extraModulePackages = [];
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# networking.interfaces.ens18.useDHCP = lib.mkDefault true;
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
}
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
# networking.interfaces.ens18.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
}
|
||||||
|
|||||||
@@ -4,10 +4,4 @@
|
|||||||
./containers
|
./containers
|
||||||
./traefik.nix
|
./traefik.nix
|
||||||
];
|
];
|
||||||
systemd.sleep.extraConfig = ''
|
|
||||||
AllowSuspend=no
|
|
||||||
AllowHibernation=no
|
|
||||||
AllowHybridSleep=no
|
|
||||||
AllowSuspendThenHibernate=no
|
|
||||||
'';
|
|
||||||
}
|
}
|
||||||
|
|||||||
61
hosts/m3-hermes/configuration.nix
Normal file
61
hosts/m3-hermes/configuration.nix
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
{pkgs, ...}: {
|
||||||
|
imports = [
|
||||||
|
./disko-config.nix
|
||||||
|
./hardware-configuration.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
# Bootloader.
|
||||||
|
boot.loader.grub = {
|
||||||
|
efiSupport = true;
|
||||||
|
efiInstallAsRemovable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.hostName = "m3-hermes";
|
||||||
|
networking.hostId = "a1b2c3d4"; # TODO: Generate unique hostId
|
||||||
|
networking.networkmanager.enable = true;
|
||||||
|
time.timeZone = "Europe/Berlin";
|
||||||
|
i18n.defaultLocale = "en_US.UTF-8";
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
neovim
|
||||||
|
git
|
||||||
|
tea
|
||||||
|
ghostty.terminfo
|
||||||
|
uv
|
||||||
|
];
|
||||||
|
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
security.sudo.extraRules = [
|
||||||
|
{
|
||||||
|
users = ["hermes"];
|
||||||
|
commands = [
|
||||||
|
{
|
||||||
|
command = "/run/current-system/sw/bin/podman";
|
||||||
|
options = ["NOPASSWD"];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
services.fstrim = {
|
||||||
|
enable = true;
|
||||||
|
interval = "weekly";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Firewall: outbound only, SSH inbound
|
||||||
|
networking.firewall = {
|
||||||
|
enable = true;
|
||||||
|
allowedTCPPorts = [22]; # SSH only
|
||||||
|
allowedUDPPorts = [];
|
||||||
|
allowPing = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = "25.05";
|
||||||
|
}
|
||||||
16
hosts/m3-hermes/default.nix
Normal file
16
hosts/m3-hermes/default.nix
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
imports = [
|
||||||
|
../common
|
||||||
|
./configuration.nix
|
||||||
|
./programs.nix
|
||||||
|
./secrets.nix
|
||||||
|
./services
|
||||||
|
];
|
||||||
|
|
||||||
|
extraServices = {
|
||||||
|
flatpak.enable = false;
|
||||||
|
ollama.enable = false;
|
||||||
|
podman.enable = false;
|
||||||
|
virtualisation.enable = false;
|
||||||
|
};
|
||||||
|
}
|
||||||
39
hosts/m3-hermes/disko-config.nix
Normal file
39
hosts/m3-hermes/disko-config.nix
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
{
|
||||||
|
disko.devices = {
|
||||||
|
disk = {
|
||||||
|
main = {
|
||||||
|
type = "disk";
|
||||||
|
device = "/dev/sda";
|
||||||
|
content = {
|
||||||
|
type = "gpt";
|
||||||
|
partitions = {
|
||||||
|
boot = {
|
||||||
|
size = "1M";
|
||||||
|
type = "EF02"; # for GRUB MBR
|
||||||
|
priority = 1;
|
||||||
|
};
|
||||||
|
esp = {
|
||||||
|
size = "512M";
|
||||||
|
type = "EF00";
|
||||||
|
content = {
|
||||||
|
type = "filesystem";
|
||||||
|
format = "vfat";
|
||||||
|
mountpoint = "/boot";
|
||||||
|
mountOptions = ["defaults" "umask=0077"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
root = {
|
||||||
|
size = "100%";
|
||||||
|
content = {
|
||||||
|
type = "filesystem";
|
||||||
|
format = "ext4";
|
||||||
|
mountpoint = "/";
|
||||||
|
mountOptions = ["noatime" "nodiratime" "discard"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
23
hosts/m3-hermes/hardware-configuration.nix
Normal file
23
hosts/m3-hermes/hardware-configuration.nix
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
# Do not modify this file! It was generated by 'nixos-generate-config'
|
||||||
|
# and may be overwritten by future invocations. Please make changes
|
||||||
|
# to configuration.nix instead.
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
modulesPath,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
imports = [
|
||||||
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod"];
|
||||||
|
boot.initrd.kernelModules = [];
|
||||||
|
boot.kernelModules = [];
|
||||||
|
boot.extraModulePackages = [];
|
||||||
|
|
||||||
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
}
|
||||||
11
hosts/m3-hermes/programs.nix
Normal file
11
hosts/m3-hermes/programs.nix
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
{pkgs, ...}: {
|
||||||
|
programs.nix-ld.enable = true;
|
||||||
|
programs.nix-ld.libraries = with pkgs; [];
|
||||||
|
programs.fish.enable = true;
|
||||||
|
programs.nh = {
|
||||||
|
enable = true;
|
||||||
|
clean.enable = true;
|
||||||
|
clean.extraArgs = "--keep-since 4d --keep 3";
|
||||||
|
flake = "/home/m3tam3re/p/nix/nixos-config";
|
||||||
|
};
|
||||||
|
}
|
||||||
12
hosts/m3-hermes/secrets.nix
Normal file
12
hosts/m3-hermes/secrets.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
{
|
||||||
|
age = {
|
||||||
|
secrets = {
|
||||||
|
hermes-env = {
|
||||||
|
file = ../../secrets/hermes-env.age;
|
||||||
|
};
|
||||||
|
hermes-cloud-env = {
|
||||||
|
file = ../../secrets/hermes-cloud-env.age;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
5
hosts/m3-hermes/services/default.nix
Normal file
5
hosts/m3-hermes/services/default.nix
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
{
|
||||||
|
imports = [
|
||||||
|
./hermes-agent.nix
|
||||||
|
];
|
||||||
|
}
|
||||||
258
hosts/m3-hermes/services/hermes-agent.nix
Normal file
258
hosts/m3-hermes/services/hermes-agent.nix
Normal file
@@ -0,0 +1,258 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
inputs,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
# Edge TTS: Seraphina — friendly, multilingual German female voice (free, no API key)
|
||||||
|
edgeVoice = "de-DE-SeraphinaMultilingualNeural";
|
||||||
|
|
||||||
|
# Extra Python packages from the container's writable venv layer.
|
||||||
|
# matrix-nio is installed via pip in /home/hermes/.venv but the hermes
|
||||||
|
# process uses the read-only Nix store Python, so we inject the venv's
|
||||||
|
# site-packages via PYTHONPATH and provide libstdc++ for libolm (e2e).
|
||||||
|
venvSitePackages = "/home/hermes/.venv/lib/python3.11/site-packages";
|
||||||
|
gccLibPath = "${pkgs.stdenv.cc.cc.lib}/lib";
|
||||||
|
|
||||||
|
# Build skills using agents flake lib for hermes user
|
||||||
|
hermesSkills = inputs.agents.lib.mkOpencodeSkills {
|
||||||
|
inherit pkgs;
|
||||||
|
customSkills = "${inputs.agents}/skills";
|
||||||
|
externalSkills = [
|
||||||
|
{
|
||||||
|
src = inputs.skills-basecamp;
|
||||||
|
skillsDir = "skills";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
src = inputs.skills-anthropic;
|
||||||
|
skillsDir = "skills";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
src = inputs.skills-kestra;
|
||||||
|
skillsDir = "skills";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
virtualisation.docker.enable = true;
|
||||||
|
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d /home/hermes/.config 0755 hermes hermes -"
|
||||||
|
"d /home/hermes/.config/tea 0755 hermes hermes -"
|
||||||
|
"L+ /home/hermes/.config/tea/yml - - - - ${pkgs.writeText "tea-yml" ''
|
||||||
|
logins:
|
||||||
|
- name: m3ta
|
||||||
|
url: https://code.m3ta.dev
|
||||||
|
token:
|
||||||
|
ssh_host: code.m3ta.dev
|
||||||
|
user: m3ta-chiron
|
||||||
|
default: true
|
||||||
|
''}"
|
||||||
|
"f /home/hermes/.gitconfig 0644 hermes hermes - ${pkgs.writeText "gitconfig" ''
|
||||||
|
[user]
|
||||||
|
name = m3ta-chiron
|
||||||
|
email = m3ta-chiron@agentmail.to
|
||||||
|
[init]
|
||||||
|
defaultBranch = main
|
||||||
|
''}"
|
||||||
|
];
|
||||||
|
|
||||||
|
systemd.services.copy-hermes-skills = {
|
||||||
|
description = "Copy agent skills to hermes home directory";
|
||||||
|
wantedBy = ["hermes-agent.service"];
|
||||||
|
before = ["hermes-agent.service"];
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
serviceConfig.RemainAfterExit = true;
|
||||||
|
script = ''
|
||||||
|
mkdir -p /var/lib/hermes/.agents
|
||||||
|
cp -rT ${hermesSkills} /var/lib/hermes/.agents/skills
|
||||||
|
chown -R hermes:hermes /var/lib/hermes/.agents
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
# Ensure 'uv' is in the hermes-agent service PATH so CronJobs and terminal
|
||||||
|
# sessions can use 'uv run' for PEP 723 scripts (e.g. garmin-daily.py).
|
||||||
|
systemd.services.hermes-agent.path = [pkgs.uv];
|
||||||
|
|
||||||
|
services.hermes-agent = {
|
||||||
|
enable = true;
|
||||||
|
addToSystemPackages = true;
|
||||||
|
|
||||||
|
extraPackages = with pkgs; [docker git tea];
|
||||||
|
|
||||||
|
# Secrets via agenix
|
||||||
|
environmentFiles = [
|
||||||
|
config.age.secrets."hermes-env".path
|
||||||
|
config.age.secrets."hermes-cloud-env".path
|
||||||
|
];
|
||||||
|
|
||||||
|
# Non-secret environment variables
|
||||||
|
environment = {
|
||||||
|
GLM_BASE_URL = "https://api.z.ai/api/coding/paas/v4/";
|
||||||
|
GIT_AUTHOR_NAME = "m3ta-chiron";
|
||||||
|
GIT_AUTHOR_EMAIL = "m3ta-chiron@agentmail.to";
|
||||||
|
GIT_COMMITTER_NAME = "m3ta-chiron";
|
||||||
|
GIT_COMMITTER_EMAIL = "m3ta-chiron@agentmail.to";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Container mode (podman) ──────────────────────────────────────────
|
||||||
|
container = {
|
||||||
|
enable = false;
|
||||||
|
backend = "podman";
|
||||||
|
extraVolumes = ["/home/m3tam3re/p:/projects:rw"];
|
||||||
|
extraOptions = [
|
||||||
|
"--env"
|
||||||
|
"PYTHONPATH=${venvSitePackages}"
|
||||||
|
"--env"
|
||||||
|
"LD_LIBRARY_PATH=${gccLibPath}"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
# ── Model ──────────────────────────────────────────────────────────
|
||||||
|
model = {
|
||||||
|
default = "glm-5.1";
|
||||||
|
provider = "zai";
|
||||||
|
};
|
||||||
|
|
||||||
|
credential_pool_strategies = {
|
||||||
|
zai = "fill_first";
|
||||||
|
};
|
||||||
|
|
||||||
|
toolsets = ["all"];
|
||||||
|
|
||||||
|
# ── Agent ──────────────────────────────────────────────────────────
|
||||||
|
agent = {
|
||||||
|
max_turns = 90;
|
||||||
|
gateway_timeout = 1800;
|
||||||
|
tool_use_enforcement = "auto";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Skills ─────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
skills = {
|
||||||
|
external_dirs = [
|
||||||
|
"/var/lib/hermes/.agents/skills"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Terminal ───────────────────────────────────────────────────────
|
||||||
|
terminal = {
|
||||||
|
backend = "local";
|
||||||
|
modal_mode = "auto";
|
||||||
|
cwd = ".";
|
||||||
|
timeout = 180;
|
||||||
|
persistent_shell = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Browser ────────────────────────────────────────────────────────
|
||||||
|
browser = {
|
||||||
|
inactivity_timeout = 120;
|
||||||
|
command_timeout = 30;
|
||||||
|
cloud_provider = "local";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Checkpoints / Compression ──────────────────────────────────────
|
||||||
|
checkpoints = {
|
||||||
|
enabled = true;
|
||||||
|
max_snapshots = 50;
|
||||||
|
};
|
||||||
|
|
||||||
|
file_read_max_chars = 100000;
|
||||||
|
|
||||||
|
compression = {
|
||||||
|
enabled = true;
|
||||||
|
threshold = 0.5;
|
||||||
|
target_ratio = 0.2;
|
||||||
|
protect_last_n = 20;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Display ────────────────────────────────────────────────────────
|
||||||
|
display = {
|
||||||
|
compact = false;
|
||||||
|
personality = "kawaii";
|
||||||
|
resume_display = "full";
|
||||||
|
busy_input_mode = "interrupt";
|
||||||
|
inline_diffs = true;
|
||||||
|
skin = "default";
|
||||||
|
tool_progress = "all";
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── TTS / STT / Voice ──────────────────────────────────────────────
|
||||||
|
tts = {
|
||||||
|
provider = "edge";
|
||||||
|
edge = {
|
||||||
|
voice = edgeVoice;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
stt = {
|
||||||
|
enabled = true;
|
||||||
|
provider = "local";
|
||||||
|
local = {model = "base";};
|
||||||
|
};
|
||||||
|
|
||||||
|
voice = {
|
||||||
|
record_key = "ctrl+b";
|
||||||
|
max_recording_seconds = 120;
|
||||||
|
silence_threshold = 200;
|
||||||
|
silence_duration = 3.0;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Memory ─────────────────────────────────────────────────────────
|
||||||
|
memory = {
|
||||||
|
provider = "honcho";
|
||||||
|
memory_enabled = true;
|
||||||
|
user_profile_enabled = true;
|
||||||
|
memory_char_limit = 2200;
|
||||||
|
user_char_limit = 1375;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Delegation / Orchestrator ────────────────────────────────────────
|
||||||
|
delegation = {
|
||||||
|
max_iterations = 50;
|
||||||
|
orchestrator_enabled = true;
|
||||||
|
max_spawn_depth = 2;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Matrix ────────────────────────────────────────────────────────
|
||||||
|
matrix = {
|
||||||
|
homeserver = "https://matrix.m3ta.dev";
|
||||||
|
user_id = "@chiron:m3ta.dev";
|
||||||
|
allowed_users = ["@m3tam3re:m3ta.dev"];
|
||||||
|
encryption = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Approvals / Security ───────────────────────────────────────────
|
||||||
|
approvals = {
|
||||||
|
mode = "manual";
|
||||||
|
timeout = 60;
|
||||||
|
};
|
||||||
|
|
||||||
|
security = {
|
||||||
|
redact_secrets = true;
|
||||||
|
tirith_enabled = true;
|
||||||
|
tirith_fail_open = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Cron / Session ─────────────────────────────────────────────────
|
||||||
|
cron = {wrap_response = true;};
|
||||||
|
|
||||||
|
session_reset = {
|
||||||
|
mode = "both";
|
||||||
|
idle_minutes = 1440;
|
||||||
|
at_hour = 4;
|
||||||
|
};
|
||||||
|
|
||||||
|
# ── Web ────────────────────────────────────────────────────────────
|
||||||
|
web = {backend = "exa";};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.hermes = {
|
||||||
|
isNormalUser = false;
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICAVF7jGP1S6vc5CxeBFD/UxiImHOgbPlKg8WYyNtOA3"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user