32 Commits

Author SHA1 Message Date
NixOS Builder Bot
7d1c66aa49 Weekly flake update: 2025-11-28 09:45 UTC 2025-11-28 03:45:48 -06:00
Danilo Reyes
cbb625a053 25.11 beta
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 15m7s
2025-11-26 22:58:59 -06:00
Danilo Reyes
5e08c8bfd1 flake update 2025-11-26 21:24:31 -06:00
Danilo Reyes
6b88a3970d properly declare nvidia-container-toolkit 25.11 2025-11-24 21:00:52 -06:00
Danilo Reyes
febe4251a7 tdarr port
Some checks failed
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 1h28m57s
2025-11-23 17:14:44 -06:00
Danilo Reyes
a3cc30d74c tdarr 2025-11-22 23:30:45 -06:00
Danilo Reyes
4d66cff834 enable nvidia podman if nvidia + podman are enabled 2025-11-22 20:27:10 -06:00
Danilo Reyes
2b9ef59733 qbittorrent downgrade 2025-11-22 00:42:08 -06:00
Danilo Reyes
f4c1f029fe real bump 2025-11-22 00:08:54 -06:00
Danilo Reyes
e7308ff031 servers 2025-11-21 23:20:47 -06:00
Danilo Reyes
29777a261e attempt to patch qbit_manage... 2025-11-21 23:15:45 -06:00
Danilo Reyes
3da044f396 patch 2025-11-21 23:01:27 -06:00
Danilo Reyes
b6de7127a4 qbit-manage version bump 2025-11-21 22:26:39 -06:00
Danilo Reyes
3b75b44629 new syncthing folder
Some checks failed
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 38m28s
2025-11-21 02:00:17 -06:00
Danilo Reyes
e559395fed flake update + homepage fix? 2025-11-21 01:59:01 -06:00
Danilo Reyes
2bc8391e63 ryot upgrade 2025-11-20 21:02:46 -06:00
Danilo Reyes
2fa9badd89 stylix enable gnome 39
Some checks failed
Build on Push / build-configurations (push) Has been cancelled
2025-11-20 21:00:19 -06:00
Danilo Reyes
1aba99c68e uneeded players 2025-11-20 21:00:06 -06:00
Danilo Reyes
1c3f389e28 nextcloud upgrade 2025-11-20 20:59:28 -06:00
Danilo Reyes
37f37f4a0d flake update
Some checks failed
Build on Push / build-configurations (push) Failing after 7m27s
2025-11-20 17:07:36 -06:00
Danilo Reyes
bc9c582cd0 disable stylix a bit
Some checks failed
Build on Push / build-configurations (push) Failing after 49m37s
2025-11-20 01:09:52 -06:00
Danilo Reyes
afb35b3abd push cache alias 2025-11-20 01:09:45 -06:00
Danilo Reyes
b117c3e7da changing theme
Some checks failed
Build on Push / build-configurations (push) Successful in 48m37s
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 1h50m4s
2025-11-16 21:38:32 -06:00
Danilo Reyes
abb08afa46 new cachix keys 2025-11-16 21:38:25 -06:00
Danilo Reyes
a48b56d9ed I dont even use droidcam 2025-11-14 13:48:05 -06:00
Danilo Reyes
ca552337da vlc instead of mpv 2025-11-14 13:18:17 -06:00
Danilo Reyes
6c3e800227 atticd nos uses postgresql 2025-11-13 19:46:34 -06:00
Danilo Reyes
c4dc5c316c Implement retry mechanism for attic push commands in build workflows to enhance reliability and prevent pipeline failures. Update cache push logic in build-on-push, build-schemes, and weekly-build-cache workflows. 2025-11-13 18:54:29 -06:00
Danilo Reyes
1d7031b338 lidarr update 2025-11-13 14:13:04 -06:00
Danilo Reyes
b6341b79a6 Refactor lidarr-mb-gap to enhance functionality and improve configuration handling 2025-11-11 18:14:58 -06:00
Danilo Reyes
978dd75ea3 lidarr-mb-gap fully operational 2025-11-11 17:19:11 -06:00
Danilo Reyes
4201c7d8a6 Update lidarr-mb-gap configuration to conditionally include SSH key path based on user home directory 2025-11-11 15:34:57 -06:00
23 changed files with 328 additions and 161 deletions

View File

@@ -34,17 +34,57 @@ jobs:
nix build .#emacs-vm --quiet nix build .#emacs-vm --quiet
- name: Push to cache - name: Push to cache
continue-on-error: true
run: | run: |
echo "Pushing builds to cache..." echo "Pushing builds to cache..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Push all built derivations to cache # Push all built derivations to cache
if ls result* 1> /dev/null 2>&1; then if ls result* 1> /dev/null 2>&1; then
attic push servidos:nixos result* retry_attic_push "attic push servidos:nixos result*"
fi fi
# Push the specific system derivations we just built # Push the specific system derivations we just built
nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin # Get paths and push with retry (paths are already built, so this is fast)
nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin workstation_path=$(nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
nix build .#emacs-vm --print-out-paths | attic push servidos:nixos --stdin if [ -n "$workstation_path" ]; then
retry_attic_push "echo \"$workstation_path\" | attic push servidos:nixos --stdin"
fi
server_path=$(nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
if [ -n "$server_path" ]; then
retry_attic_push "echo \"$server_path\" | attic push servidos:nixos --stdin"
fi
emacs_path=$(nix build .#emacs-vm --print-out-paths 2>/dev/null || echo "")
if [ -n "$emacs_path" ]; then
retry_attic_push "echo \"$emacs_path\" | attic push servidos:nixos --stdin"
fi
- name: Summary - name: Summary
run: | run: |

View File

@@ -36,9 +36,36 @@ jobs:
attic login servidos http://127.0.0.1:2343 ${{ secrets.ATTIC_TOKEN }} attic login servidos http://127.0.0.1:2343 ${{ secrets.ATTIC_TOKEN }}
- name: Build and push all schemes - name: Build and push all schemes
continue-on-error: true
run: | run: |
echo "Building and pushing all schemes..." echo "Building and pushing all schemes..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Store original scheme # Store original scheme
ORIGINAL_SCHEME=$(grep -oP "scheme = schemesFile\.schemes\.\K\w+" config/stylix.nix) ORIGINAL_SCHEME=$(grep -oP "scheme = schemesFile\.schemes\.\K\w+" config/stylix.nix)
echo "Original scheme: $ORIGINAL_SCHEME" echo "Original scheme: $ORIGINAL_SCHEME"
@@ -61,14 +88,17 @@ jobs:
--out-link ./result-$scheme \ --out-link ./result-$scheme \
--quiet --quiet
# Push to cache # Push to cache with retry
echo "Pushing $scheme to cache..." echo "Pushing $scheme to cache..."
attic push servidos:nixos ./result-$scheme retry_attic_push "attic push servidos:nixos ./result-$scheme"
# Also push using print-out-paths for better cache coverage # Also push using print-out-paths for better cache coverage
nix build .#nixosConfigurations.${HOSTNAME}.config.system.build.toplevel \ build_path=$(nix build .#nixosConfigurations.${HOSTNAME}.config.system.build.toplevel \
--print-out-paths \ --print-out-paths \
--quiet | attic push servidos:nixos --stdin --quiet 2>/dev/null || echo "")
if [ -n "$build_path" ]; then
retry_attic_push "echo \"$build_path\" | attic push servidos:nixos --stdin"
fi
echo "✓ Completed $scheme" echo "✓ Completed $scheme"
echo "" echo ""

View File

@@ -60,17 +60,57 @@ jobs:
- name: Push to cache - name: Push to cache
if: steps.check_changes.outputs.changes == 'true' if: steps.check_changes.outputs.changes == 'true'
continue-on-error: true
run: | run: |
echo "Pushing builds to cache..." echo "Pushing builds to cache..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Push all built derivations to cache # Push all built derivations to cache
if ls result* 1> /dev/null 2>&1; then if ls result* 1> /dev/null 2>&1; then
attic push servidos:nixos result* retry_attic_push "attic push servidos:nixos result*"
fi fi
# Push the specific system derivations we just built # Push the specific system derivations we just built
nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin # Get paths and push with retry (paths are already built, so this is fast)
nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin workstation_path=$(nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
nix build .#emacs-vm --print-out-paths | attic push servidos:nixos --stdin if [ -n "$workstation_path" ]; then
retry_attic_push "echo \"$workstation_path\" | attic push servidos:nixos --stdin"
fi
server_path=$(nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
if [ -n "$server_path" ]; then
retry_attic_push "echo \"$server_path\" | attic push servidos:nixos --stdin"
fi
emacs_path=$(nix build .#emacs-vm --print-out-paths 2>/dev/null || echo "")
if [ -n "$emacs_path" ]; then
retry_attic_push "echo \"$emacs_path\" | attic push servidos:nixos --stdin"
fi
- name: Commit updated flake.lock - name: Commit updated flake.lock
if: steps.check_changes.outputs.changes == 'true' if: steps.check_changes.outputs.changes == 'true'

View File

@@ -9,6 +9,7 @@
{ {
imports = [ imports = [
inputs.home-manager.nixosModules.home-manager inputs.home-manager.nixosModules.home-manager
./users.nix
./jawz.nix ./jawz.nix
../modules/modules.nix ../modules/modules.nix
]; ];
@@ -97,6 +98,7 @@
]; ];
substituters = [ substituters = [
"${config.my.servers.atticd.url}/nixos" "${config.my.servers.atticd.url}/nixos"
"${config.my.servers.atticd.url}/webref"
"https://nix-gaming.cachix.org" "https://nix-gaming.cachix.org"
"https://nixpkgs-python.cachix.org" "https://nixpkgs-python.cachix.org"
"https://devenv.cachix.org" "https://devenv.cachix.org"
@@ -106,7 +108,8 @@
"https://cosmic.cachix.org" "https://cosmic.cachix.org"
]; ];
trusted-public-keys = [ trusted-public-keys = [
"nixos:kubuWhYCk9/aZp5GDJFAScYgigM66DszP8i1Pzbq0Fc=" "nixos:GAnxnubP07Qu+6v8MErkuAa4uGCR4Npmu4acmQrUXpI="
"webref:qobPVDWPzbSJ0JIUoLBnWILcc+zbPa16CVAiN8MN6tg="
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" "nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4="
"nixpkgs-python.cachix.org-1:hxjI7pFxTyuTHn2NkvWCrAUcNZLNS3ZAvfYNuYifcEU=" "nixpkgs-python.cachix.org-1:hxjI7pFxTyuTHn2NkvWCrAUcNZLNS3ZAvfYNuYifcEU="
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw=" "devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="

View File

@@ -38,6 +38,15 @@ _final: prev: {
waybar = prev.waybar.overrideAttrs (old: { waybar = prev.waybar.overrideAttrs (old: {
mesonFlags = old.mesonFlags ++ [ "-Dexperimental=true" ]; mesonFlags = old.mesonFlags ++ [ "-Dexperimental=true" ];
}); });
qbittorrent = prev.qbittorrent.overrideAttrs (old: rec {
version = "5.1.3";
src = prev.fetchFromGitHub {
owner = "qbittorrent";
repo = "qBittorrent";
rev = "release-${version}";
hash = "sha256-RIItbrpkMFglO2NwbgpBhgBSk5+vdywatGVwnbWkNVQ=";
};
});
inherit (pkgsU) inherit (pkgsU)
code-cursor code-cursor
symbola symbola

View File

@@ -9,7 +9,7 @@ let
schemesFile = import ./schemes.nix { schemesFile = import ./schemes.nix {
inherit pkgs inputs; inherit pkgs inputs;
}; };
scheme = schemesFile.schemes.febroary; scheme = schemesFile.schemes.jesus;
cfg = config.my.stylix; cfg = config.my.stylix;
gnomeEnabled = config.services.desktopManager.gnome.enable; gnomeEnabled = config.services.desktopManager.gnome.enable;
in in

13
config/users.nix Normal file
View File

@@ -0,0 +1,13 @@
{ ... }:
{
users.users = {
sonarr = {
uid = 274;
group = "piracy";
};
radarr = {
uid = 275;
group = "piracy";
};
};
}

204
flake.lock generated
View File

@@ -20,11 +20,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762356719, "lastModified": 1763922789,
"narHash": "sha256-qwd/xdoOya1m8FENle+4hWnydCtlXUWLAW/Auk6WL7s=", "narHash": "sha256-XnkWjCpeXfip9tqYdL0b0zzBDjq+dgdISvEdSVGdVyA=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "aquamarine", "repo": "aquamarine",
"rev": "6d0b3567584691bf9d8fedb5d0093309e2f979c7", "rev": "a20a0e67a33b6848378a91b871b89588d3a12573",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -198,11 +198,11 @@
"flake-compat": { "flake-compat": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1747046372, "lastModified": 1761588595,
"narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=", "narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
"owner": "edolstra", "owner": "edolstra",
"repo": "flake-compat", "repo": "flake-compat",
"rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885", "rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -216,11 +216,11 @@
"nixpkgs-lib": "nixpkgs-lib" "nixpkgs-lib": "nixpkgs-lib"
}, },
"locked": { "locked": {
"lastModified": 1762440070, "lastModified": 1763759067,
"narHash": "sha256-xxdepIcb39UJ94+YydGP221rjnpkDZUlykKuF54PsqI=", "narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "26d05891e14c88eb4a5d5bee659c0db5afb609d8", "rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -234,11 +234,11 @@
"nixpkgs-lib": "nixpkgs-lib_2" "nixpkgs-lib": "nixpkgs-lib_2"
}, },
"locked": { "locked": {
"lastModified": 1762440070, "lastModified": 1763759067,
"narHash": "sha256-xxdepIcb39UJ94+YydGP221rjnpkDZUlykKuF54PsqI=", "narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "26d05891e14c88eb4a5d5bee659c0db5afb609d8", "rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -324,24 +324,6 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils_2": {
"inputs": {
"systems": "systems_4"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"fonts": { "fonts": {
"flake": false, "flake": false,
"locked": { "locked": {
@@ -399,18 +381,20 @@
"gnome-shell": { "gnome-shell": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1748186689, "host": "gitlab.gnome.org",
"narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=", "lastModified": 1762869044,
"narHash": "sha256-nwm/GJ2Syigf7VccLAZ66mFC8mZJFqpJmIxSGKl7+Ds=",
"owner": "GNOME", "owner": "GNOME",
"repo": "gnome-shell", "repo": "gnome-shell",
"rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0", "rev": "680e3d195a92203f28d4bf8c6e8bb537cc3ed4ad",
"type": "github" "type": "gitlab"
}, },
"original": { "original": {
"host": "gitlab.gnome.org",
"owner": "GNOME", "owner": "GNOME",
"ref": "48.2", "ref": "gnome-49",
"repo": "gnome-shell", "repo": "gnome-shell",
"type": "github" "type": "gitlab"
} }
}, },
"home-manager": { "home-manager": {
@@ -420,15 +404,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762787259, "lastModified": 1764177491,
"narHash": "sha256-t2U/GLLXHa2+kJkwnFNRVc2fEJ/lUfyZXBE5iKzJdcs=", "narHash": "sha256-dhX2abFWxeXab3Aad4Pg1xGtn9W84/qetNXfmYUwktw=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "37a3d97f2873e0f68711117c34d04b7c7ead8f4e", "rev": "2217780c39169a9c77915200137550c2ef0fa974",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-25.11",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
@@ -478,11 +463,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762462052, "lastModified": 1763733840,
"narHash": "sha256-6roLYzcDf4V38RUMSqycsOwAnqfodL6BmhRkUtwIgdA=", "narHash": "sha256-JnET78yl5RvpGuDQy3rCycOCkiKoLr5DN1fPhRNNMco=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprgraphics", "repo": "hyprgraphics",
"rev": "ffc999d980c7b3bca85d3ebd0a9fbadf984a8162", "rev": "8f1bec691b2d198c60cccabca7a94add2df4ed1a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -509,11 +494,11 @@
"xdph": "xdph" "xdph": "xdph"
}, },
"locked": { "locked": {
"lastModified": 1762755326, "lastModified": 1764283894,
"narHash": "sha256-YYTzQUQDnVdtN3k40sC5kq6yL70riU8bM8cQLz38jzk=", "narHash": "sha256-5BWYZDmJKwUGxhY+43obUZItkAL6rm3xkvBYdltUWz4=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "Hyprland", "repo": "Hyprland",
"rev": "0b1d690676589503f0addece30e936a240733699", "rev": "7e1e24fea615503a3cc05218c12b06c1b6cabdc7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -555,11 +540,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762755186, "lastModified": 1763727565,
"narHash": "sha256-ZjjETUHtoEhVN7JI1Cbt3p/KcXpK8ZQaPHx7UkG1OgA=", "narHash": "sha256-vRff/2R1U1jzPBy4OODqh2kfUzmizW/nfV2ROzTDIKo=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprland-guiutils", "repo": "hyprland-guiutils",
"rev": "66356e20a8ed348aa49c1b9ceace786e224225b3", "rev": "7724d3a12a0453e7aae05f2ef39474219f05a4b4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -609,11 +594,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1758927902, "lastModified": 1763819661,
"narHash": "sha256-LZgMds7M94+vuMql2bERQ6LiFFdhgsEFezE4Vn+Ys3A=", "narHash": "sha256-0jLarTR/BLWdGlboM86bPVP2zKJNI2jvo3JietnDkOM=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprlang", "repo": "hyprlang",
"rev": "4dafa28d4f79877d67a7d1a654cddccf8ebf15da", "rev": "a318deec0c12409ec39c68d2be8096b636dc2a5c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -661,11 +646,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762463729, "lastModified": 1763503177,
"narHash": "sha256-2fYkU/mdz8WKY3dkDPlE/j6hTxIwqultsx4gMMsMns0=", "narHash": "sha256-VPoiswJBBmTLVuNncvT/8FpFR+sYcAi/LgP/zTZ+5rA=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprtoolkit", "repo": "hyprtoolkit",
"rev": "88483bdee5329ec985f0c8f834c519cd18cfe532", "rev": "f4e1e12755567ecf39090203b8f43eace8279630",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -686,11 +671,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762387740, "lastModified": 1763996058,
"narHash": "sha256-gQ9zJ+pUI4o+Gh4Z6jhJll7jjCSwi8ZqJIhCE2oqwhQ=", "narHash": "sha256-DsqzFZvrEV+aDmavjaD4/bk5qxeZwhGxPWBQdpFyM9Y=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprutils", "repo": "hyprutils",
"rev": "926689ddb9c0a8787e58c02c765a62e32d63d1f7", "rev": "0168583075baffa083032ed13a8bea8ea12f281a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -711,11 +696,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1755184602, "lastModified": 1763640274,
"narHash": "sha256-RCBQN8xuADB0LEgaKbfRqwm6CdyopE1xIEhNc67FAbw=", "narHash": "sha256-Uan1Nl9i4TF/kyFoHnTq1bd/rsWh4GAK/9/jDqLbY5A=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprwayland-scanner", "repo": "hyprwayland-scanner",
"rev": "b3b0f1f40ae09d4447c20608e5a4faf8bf3c492d", "rev": "f6cf414ca0e16a4d30198fd670ec86df3c89f671",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -732,11 +717,11 @@
"sudoku-solver": "sudoku-solver" "sudoku-solver": "sudoku-solver"
}, },
"locked": { "locked": {
"lastModified": 1762799327, "lastModified": 1763060154,
"narHash": "sha256-HhIC8Ucb4ZruU7Yr1gV4qGVKkhuYpAhXbRnSfAmjQoY=", "narHash": "sha256-Fuzkzmi5Vfwae3XCFLTLUlIVd8iAhoh2J0hjIbpjZcI=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "6efd55712d73e65c0fb4304cfd1649723bb757ef", "rev": "b1ba215f4a81e8750696cb234f010746d86b1bdb",
"revCount": 120, "revCount": 121,
"type": "git", "type": "git",
"url": "https://git.lebubu.org/jawz/scripts.git" "url": "https://git.lebubu.org/jawz/scripts.git"
}, },
@@ -747,17 +732,16 @@
}, },
"lidarr-mb-gap": { "lidarr-mb-gap": {
"inputs": { "inputs": {
"flake-utils": "flake-utils_2",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1762882489, "lastModified": 1763107451,
"narHash": "sha256-YFk5GkD7TkIMbcnJzFz+IRN4vH7QJSRphpS3zje3PRU=", "narHash": "sha256-mG2RevGmQchx7FMK4F3GowUzMmD+JVva6Zt/sZnQTeQ=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "35e6c7e330868b00e7c8dbc878db776ba01f719d", "rev": "cc9521f7a402c0339d55911f3718967ec00c2666",
"revCount": 11, "revCount": 22,
"type": "git", "type": "git",
"url": "https://git.lebubu.org/vibe-coded/lidarr-mb-gap.git" "url": "https://git.lebubu.org/vibe-coded/lidarr-mb-gap.git"
}, },
@@ -774,11 +758,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762740007, "lastModified": 1764294866,
"narHash": "sha256-CtMgV9vfm16x/0NBQmQQe/Vbv423cPWeNfBtiVYcUBk=", "narHash": "sha256-Kn0+e5avInNAX7Rf3qKlUGunpcc8ryutoZLRXzQa6BY=",
"owner": "fufexan", "owner": "fufexan",
"repo": "nix-gaming", "repo": "nix-gaming",
"rev": "8dce0b23e30b03efbdc94e8db7cb27298446e4cc", "rev": "f189ee5932ef2e0fcc4f63d12a698a968b8450e8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -810,11 +794,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1751903740, "lastModified": 1764234087,
"narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=", "narHash": "sha256-NHF7QWa0ZPT8hsJrvijREW3+nifmF2rTXgS2v0tpcEA=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-generators", "repo": "nixos-generators",
"rev": "032decf9db65efed428afd2fa39d80f7089085eb", "rev": "032a1878682fafe829edfcf5fdfad635a2efe748",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -889,27 +873,27 @@
}, },
"nixpkgs-small": { "nixpkgs-small": {
"locked": { "locked": {
"lastModified": 1762800201, "lastModified": 1764294158,
"narHash": "sha256-uSPI4VB/GKfVeH72q3V94sHB6Spy0L5uUTxTmmZH/FQ=", "narHash": "sha256-jYgxKfpElNtpjkH6iNHk3v1V84U3nDrMaK7bf6O9MeQ=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "25a9ff6075a050210f8fc276a67d21399c90a797", "rev": "c9bf37b26e96d5abc45336fc2cbdccc8e45e3e96",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "master", "ref": "nixos-25.11-small",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1762596750, "lastModified": 1764242076,
"narHash": "sha256-rXXuz51Bq7DHBlfIjN7jO8Bu3du5TV+3DSADBX7/9YQ=", "narHash": "sha256-sKoIWfnijJ0+9e4wRvIgm/HgE27bzwQxcEmo2J/gNpI=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "b6a8526db03f735b89dd5ff348f53f752e7ddc8e", "rev": "2fad6eac6077f03fe109c4d4eb171cf96791faa4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -921,16 +905,16 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1762800201, "lastModified": 1764173365,
"narHash": "sha256-uSPI4VB/GKfVeH72q3V94sHB6Spy0L5uUTxTmmZH/FQ=", "narHash": "sha256-JaNFPy3nywPNxSDpEgFFqvngQww5Igb6twG4NhMo8oc=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "25a9ff6075a050210f8fc276a67d21399c90a797", "rev": "2fecba9952096ba043c16b9ef40b92851ff3e5d9",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "master", "ref": "nixos-25.11",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@@ -964,11 +948,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762800743, "lastModified": 1764321059,
"narHash": "sha256-6SjknGi7vOyZV2AghcYI6wzqqKTWMeFOv9JlN5YFICQ=", "narHash": "sha256-OP0j9fWgJegPyOqOLVA1UsKaFXf/WQoOp+8AkVlxN9Y=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nur", "repo": "nur",
"rev": "32c80839213416ea24e3138f2fe18b316dff08eb", "rev": "5eff8a78843aad75d7712aea91583c6f8a3dbcd1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1012,11 +996,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762441963, "lastModified": 1763988335,
"narHash": "sha256-j+rNQ119ffYUkYt2YYS6rnd6Jh/crMZmbqpkGLXaEt0=", "narHash": "sha256-QlcnByMc8KBjpU37rbq5iP7Cp97HvjRP0ucfdh+M4Qc=",
"owner": "cachix", "owner": "cachix",
"repo": "git-hooks.nix", "repo": "git-hooks.nix",
"rev": "8e7576e79b88c16d7ee3bbd112c8d90070832885", "rev": "50b9238891e388c9fdc6a5c49e49c42533a1b5ce",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1028,11 +1012,11 @@
"qbit_manage": { "qbit_manage": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1758160887, "lastModified": 1763222957,
"narHash": "sha256-cTxM3nHQQto7lpoNjShYcCbJCSYiwS9bKqw0DWAjw6A=", "narHash": "sha256-F9EPEvJ8sjVb6Epa7V+3t9gEkvqwWF1opUCVQkjR6bs=",
"owner": "StuffAnThings", "owner": "StuffAnThings",
"repo": "qbit_manage", "repo": "qbit_manage",
"rev": "21812368bc5366f3388dfb21769fee1da48083c5", "rev": "b1e91d7259bcc35b0829c5dc52ea87deedaef6b5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1071,11 +1055,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762659808, "lastModified": 1764021963,
"narHash": "sha256-2Kv2mANf+FRisqhpfeZ8j9firBxb23ZvEXwdcunbpGI=", "narHash": "sha256-1m84V2ROwNEbqeS9t37/mkry23GBhfMt8qb6aHHmjuc=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "524312bc62e3f34bd9231a2f66622663d3355133", "rev": "c482a1c1bbe030be6688ed7dc84f7213f304f1ec",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1097,7 +1081,7 @@
"nixpkgs" "nixpkgs"
], ],
"nur": "nur_2", "nur": "nur_2",
"systems": "systems_5", "systems": "systems_4",
"tinted-foot": "tinted-foot", "tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty", "tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes", "tinted-schemes": "tinted-schemes",
@@ -1105,15 +1089,16 @@
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1762264356, "lastModified": 1764193603,
"narHash": "sha256-QVfC53Ri+8n3e7Ujx9kq6all3+TLBRRPRnc6No5qY5w=", "narHash": "sha256-guX30TWe8HRG2qPFiM9893F2uTw4B8D/xkE6Mq7MiYg=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "647bb8dd96a206a1b79c4fd714affc88b409e10b", "rev": "9bf8725a3d65b3ff0ba68ce13779657f5095e36b",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "danth", "owner": "danth",
"ref": "release-25.11",
"repo": "stylix", "repo": "stylix",
"type": "github" "type": "github"
} }
@@ -1195,21 +1180,6 @@
"type": "github" "type": "github"
} }
}, },
"systems_5": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": { "tinted-foot": {
"flake": false, "flake": false,
"locked": { "locked": {

View File

@@ -2,19 +2,16 @@
description = "JawZ NixOS flake setup"; description = "JawZ NixOS flake setup";
inputs = { inputs = {
flake-parts.url = "github:hercules-ci/flake-parts"; flake-parts.url = "github:hercules-ci/flake-parts";
nixpkgs.url = "github:nixos/nixpkgs?ref=master"; nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-25.11";
nixpkgs-small.url = "github:nixos/nixpkgs?ref=master"; nixpkgs-small.url = "github:nixos/nixpkgs?ref=nixos-25.11-small";
# nixpkgs-small.url = "github:nixos/nixpkgs?ref=nixos-25.05-small";
nixpkgs-unstable.url = "github:nixos/nixpkgs?ref=nixos-unstable"; nixpkgs-unstable.url = "github:nixos/nixpkgs?ref=nixos-unstable";
ucodenix.url = "github:e-tho/ucodenix/ba7f0a366460e0fbea9622fc770cb982be0e4720"; ucodenix.url = "github:e-tho/ucodenix/ba7f0a366460e0fbea9622fc770cb982be0e4720";
home-manager = { home-manager = {
# url = "github:nix-community/home-manager?ref=release-25.05"; url = "github:nix-community/home-manager?ref=release-25.11";
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
stylix = { stylix = {
# url = "github:danth/stylix/release-25.05"; url = "github:danth/stylix/release-25.11";
url = "github:danth/stylix";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
doom-emacs = { doom-emacs = {

View File

@@ -26,6 +26,7 @@
22000 # syncthing relay 22000 # syncthing relay
3452 # sonarqube 3452 # sonarqube
8448 # synapse ssl 8448 # synapse ssl
8265 # tdarr
]; ];
}; };
nix.buildMachines = [ nix.buildMachines = [
@@ -45,12 +46,14 @@
lidarr-mb-gap = lib.mkIf config.my.secureHost { lidarr-mb-gap = lib.mkIf config.my.secureHost {
sopsFile = ../../secrets/env.yaml; sopsFile = ../../secrets/env.yaml;
}; };
"private_keys/lidarr-mb-gap" = lib.mkIf config.my.secureHost { "private_keys/lidarr-mb-gap" =
sopsFile = ../../secrets/keys.yaml; lib.mkIf (config.my.secureHost && config.services.lidarr-mb-gap.enable)
owner = config.users.users.lidarr-mb-gap.name; {
inherit (config.users.users.lidarr-mb-gap) group; sopsFile = ../../secrets/keys.yaml;
path = "~/.ssh/ed25519_lidarr-mb-gap"; owner = config.users.users.lidarr-mb-gap.name;
}; inherit (config.users.users.lidarr-mb-gap) group;
path = "${config.users.users.lidarr-mb-gap.home}/.ssh/ed25519_lidarr-mb-gap";
};
}; };
networking = { networking = {
hostName = "server"; hostName = "server";
@@ -88,10 +91,11 @@
lidarr-mb-gap = { lidarr-mb-gap = {
enable = true; enable = true;
package = inputs.lidarr-mb-gap.packages.${pkgs.system}.lidarr-mb-gap; package = inputs.lidarr-mb-gap.packages.${pkgs.system}.lidarr-mb-gap;
reportDir = "/var/lib/lidarr-mb-gap/reports"; home = "/var/lib/lidarr-mb-gap";
envFile = config.sops.secrets.lidarr-mb-gap.path; envFile = config.sops.secrets.lidarr-mb-gap.path;
runInterval = "weekly"; runInterval = "weekly";
syncToVPS = false; syncToVPS = true;
vpsPort = 3456;
vpsHost = "lidarr-reports@${config.my.ips.vps}"; vpsHost = "lidarr-reports@${config.my.ips.vps}";
vpsPath = "/var/www/html/lidarr-mb-gap"; vpsPath = "/var/www/html/lidarr-mb-gap";
sshKeyFile = config.sops.secrets."private_keys/lidarr-mb-gap".path; sshKeyFile = config.sops.secrets."private_keys/lidarr-mb-gap".path;

View File

@@ -88,7 +88,6 @@ in
gnome-epub-thumbnailer gnome-epub-thumbnailer
podman-compose podman-compose
scrcpy scrcpy
mpv
; ;
inherit (pkgs.libheif) out; inherit (pkgs.libheif) out;
}; };
@@ -111,7 +110,6 @@ in
enableVirtualCamera = true; enableVirtualCamera = true;
plugins = builtins.attrValues { plugins = builtins.attrValues {
inherit (pkgs.obs-studio-plugins) inherit (pkgs.obs-studio-plugins)
droidcam-obs
obs-vkcapture obs-vkcapture
obs-vaapi obs-vaapi
obs-tuna obs-tuna

View File

@@ -9,8 +9,6 @@
config = lib.mkIf config.my.apps.multimedia.enable { config = lib.mkIf config.my.apps.multimedia.enable {
users.users.jawz.packages = builtins.attrValues { users.users.jawz.packages = builtins.attrValues {
inherit (pkgs) inherit (pkgs)
recordbox # libadwaita music player
celluloid # video player
curtail # image compressor curtail # image compressor
easyeffects # equalizer easyeffects # equalizer
identity # compare images or videos identity # compare images or videos

View File

@@ -42,6 +42,11 @@ in
nix run nixpkgs#nixfmt-tree && \ nix run nixpkgs#nixfmt-tree && \
statix fix statix fix
''; '';
nix-push-cache = ''
nix build $NH_FLAKE#nixosConfigurations.${config.networking.hostName}.config.system.build.toplevel \
--print-out-paths --fallback --max-jobs 100 --cores 0 |
nix run nixpkgs#attic-client -- push lan:nixos --stdin
'';
}; };
}; };
} }

View File

@@ -17,7 +17,10 @@ in
settings = { settings = {
listen = "[::]:${toString cfg.port}"; listen = "[::]:${toString cfg.port}";
jwt = { }; jwt = { };
database.heartbeat = true; # 5 minutes database = {
heartbeat = true;
url = "postgresql:///${cfg.name}?host=${config.my.postgresSocket}";
};
chunking = { chunking = {
nar-size-threshold = 64 * 1024; # 64 KiB nar-size-threshold = 64 * 1024; # 64 KiB
min-size = 16 * 1024; # 16 KiB min-size = 16 * 1024; # 16 KiB

View File

@@ -54,5 +54,59 @@
} }
]; ];
} }
{
gpt = [
{
abbr = "GPT";
href = "http://127.0.0.1:8080";
description = "";
}
];
}
{
syncthing-workstation = [
{
abbr = "STW";
href = "http://workstation:8384";
description = "";
}
];
}
{
syncthing-server = [
{
abbr = "STS";
href = "http://server:8384";
description = "";
}
];
}
{
music-report = [
{
abbr = "MR";
href = "https://mb-report.lebubu.org";
description = "";
}
];
}
{
portfolio = [
{
abbr = "PF";
href = "https://danilo-reyes.com";
description = "";
}
];
}
{
webref = [
{
abbr = "WR";
href = "https://webref.lebubu.org";
description = "";
}
];
}
]; ];
} }

View File

@@ -11,7 +11,7 @@ in
options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686; options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686;
config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable { config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable {
autoStart = true; autoStart = true;
image = "linuxserver/lidarr:version-2.13.3.4711"; image = "linuxserver/lidarr:version-3.0.1.4866";
ports = [ "${toString cfg.port}:${toString cfg.port}" ]; ports = [ "${toString cfg.port}:${toString cfg.port}" ];
environment = { environment = {
TZ = config.my.timeZone; TZ = config.my.timeZone;

View File

@@ -65,7 +65,7 @@ in
nextcloud = { nextcloud = {
enable = true; enable = true;
https = false; # vps https = false; # vps
package = pkgs.nextcloud31; package = pkgs.nextcloud32;
appstoreEnable = true; appstoreEnable = true;
configureRedis = true; configureRedis = true;
extraAppsEnable = true; extraAppsEnable = true;

View File

@@ -39,6 +39,7 @@ let
"readeck" "readeck"
"sonarqube" "sonarqube"
"gitea" "gitea"
"atticd"
]; ];
in in
{ {

View File

@@ -12,11 +12,11 @@ let
config.allowUnfree = true; config.allowUnfree = true;
}; };
vuetorrent = pkgs.fetchzip { vuetorrent = pkgs.fetchzip {
url = "https://github.com/VueTorrent/VueTorrent/releases/download/v2.25.0/vuetorrent.zip"; url = "https://github.com/VueTorrent/VueTorrent/releases/download/v2.31.0/vuetorrent.zip";
sha256 = "sha256-sOaQNw6AnpwNFEextgTnsjEOfpl3/lpoOZFgFOz7Bos="; sha256 = "sha256-kVDnDoCoJlY2Ew71lEMeE67kNOrKTJEMqNj2OfP01qw=";
stripRoot = true; stripRoot = true;
}; };
qbit_manageEnv = pkgsU.python3.withPackages ( qbit_manageEnv = pkgs.python3.withPackages (
ps: ps:
builtins.attrValues { builtins.attrValues {
inherit (ps) inherit (ps)

View File

@@ -12,7 +12,7 @@ in
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) { config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
sops.secrets.ryot.sopsFile = ../../secrets/env.yaml; sops.secrets.ryot.sopsFile = ../../secrets/env.yaml;
virtualisation.oci-containers.containers.ryot = { virtualisation.oci-containers.containers.ryot = {
image = "ghcr.io/ignisda/ryot:v9.3.0"; image = "ghcr.io/ignisda/ryot:v9.5.0";
ports = [ "${toString cfg.port}:8000" ]; ports = [ "${toString cfg.port}:8000" ];
environmentFiles = [ config.sops.secrets.ryot.path ]; environmentFiles = [ config.sops.secrets.ryot.path ];
environment = { environment = {

View File

@@ -7,10 +7,11 @@
{ {
options.my.services.nvidia.enable = lib.mkEnableOption "NVIDIA GPU drivers and CUDA"; options.my.services.nvidia.enable = lib.mkEnableOption "NVIDIA GPU drivers and CUDA";
config = lib.mkIf config.my.services.nvidia.enable { config = lib.mkIf config.my.services.nvidia.enable {
environment.variables.CUDA_CACHE_PATH = "\${XDG_CACHE_HOME}/nv";
boot.kernelParams = lib.mkIf (config.networking.hostName == "workstation") [ "nvidia-drm.fbdev=1" ]; boot.kernelParams = lib.mkIf (config.networking.hostName == "workstation") [ "nvidia-drm.fbdev=1" ];
services.xserver.videoDrivers = [ "nvidia" ]; services.xserver.videoDrivers = [ "nvidia" ];
environment.variables.CUDA_CACHE_PATH = "\${XDG_CACHE_HOME}/nv";
hardware = { hardware = {
nvidia-container-toolkit.enable = config.virtualisation.podman.enable;
graphics = { graphics = {
enable = true; enable = true;
enable32Bit = true; enable32Bit = true;

View File

@@ -72,6 +72,7 @@ in
friends = mkMobile "~/Pictures/artist/friends/"; friends = mkMobile "~/Pictures/artist/friends/";
forme = mkMobile "~/Pictures/art for me/"; forme = mkMobile "~/Pictures/art for me/";
comfy = mkMobile "~/Development/AI/ComfyUI/output/"; comfy = mkMobile "~/Development/AI/ComfyUI/output/";
clean = mkMobile "~/Pictures/unorganized/unified mess/sync";
gdl = { gdl = {
path = "~/.config/jawz/"; path = "~/.config/jawz/";
ignorePerms = false; ignorePerms = false;

View File

@@ -10,7 +10,7 @@ dns: ENC[AES256_GCM,data:fQN3SOm0HzOjSjTohRAD4KlXdEu5PbQc3DvK3rLC1S4G0G4HUPkgucN
cloudflare-api: ENC[AES256_GCM,data:iNUMlY8rz5yHVitpK4HGaFSK7j+c8Pm7rOQMOQGmSJ3a8ASyrtouPgLbcnoPY/jalsJYAj991dSiui+Vwqs=,iv:qWONG/KLd9/F4tqrWF5T25Zxst3bk+kOYaOFBFSBAAY=,tag:gRFxar8KS8gnX8oaCD156Q==,type:str] cloudflare-api: ENC[AES256_GCM,data:iNUMlY8rz5yHVitpK4HGaFSK7j+c8Pm7rOQMOQGmSJ3a8ASyrtouPgLbcnoPY/jalsJYAj991dSiui+Vwqs=,iv:qWONG/KLd9/F4tqrWF5T25Zxst3bk+kOYaOFBFSBAAY=,tag:gRFxar8KS8gnX8oaCD156Q==,type:str]
synapse: ENC[AES256_GCM,data:IR0pFwQBEM4O8mzzYXrPe2FjulSUGuitzLDLms2uovr6gEU82mCkRO/UCQOybNm03iOQeXX0Whz739kpYSGSInEyx69BNG/etH+bMu+GbYeMdrTEyXHSa7kcH4Ug,iv:Vn2ILYXnCj+Op/E2kWoxV+2ZtlxYJxO6XK3Ql41KW6w=,tag:9wogJFLlmfM5PRgPdwFlcw==,type:str] synapse: ENC[AES256_GCM,data:IR0pFwQBEM4O8mzzYXrPe2FjulSUGuitzLDLms2uovr6gEU82mCkRO/UCQOybNm03iOQeXX0Whz739kpYSGSInEyx69BNG/etH+bMu+GbYeMdrTEyXHSa7kcH4Ug,iv:Vn2ILYXnCj+Op/E2kWoxV+2ZtlxYJxO6XK3Ql41KW6w=,tag:9wogJFLlmfM5PRgPdwFlcw==,type:str]
readeck: ENC[AES256_GCM,data:TsIkHLji37dDHQRt78SquBhoSREHDgvgbc6+M1k2MLrgMGJ/Ejfy5AZXCIp/Qj5sXDzKP4j6Y6xFvGLswCqe02XjqGCpX13gZVCFPuKr8Nq051Xg,iv:Rc/pjYP+Vd/DvLCYsfJjDrnAlAiUlZOcNeeYzE6O3UY=,tag:OvR+CXMmrUFbsrHvduhnjA==,type:str] readeck: ENC[AES256_GCM,data:TsIkHLji37dDHQRt78SquBhoSREHDgvgbc6+M1k2MLrgMGJ/Ejfy5AZXCIp/Qj5sXDzKP4j6Y6xFvGLswCqe02XjqGCpX13gZVCFPuKr8Nq051Xg,iv:Rc/pjYP+Vd/DvLCYsfJjDrnAlAiUlZOcNeeYzE6O3UY=,tag:OvR+CXMmrUFbsrHvduhnjA==,type:str]
lidarr-mb-gap: ENC[AES256_GCM,data:zMr1UJUxqu3BJ2YRZKeIUzcEQRsHM6xeZ9kJ7ElynTD7ay0je+L0i+pyWe3OGwVN/8UUIQnKf42Pr6C4hJSxqwetjG6jQYTUGwTWzvxr/TDr6uhZwG59wLh8e02ymLw0GMJYfkQdZqEWyicHESHNdPmBFx3kByU01/QvOQlFO82/FPTvwpY=,iv:sk57rOrV/lj5f47sF4agZYPScLRiMgtM7iwzmubnZ2Q=,tag:LNl8TK3MswXj6lqBNA9Vqw==,type:str] lidarr-mb-gap: ENC[AES256_GCM,data:bNzD9Nf9BWAPkm0Yk0J4MJbmo908QX9VsD+40Rngnfec9nzH4vZ2DrelxRllgT1kgnXMQzvoSgNhBwkDN4fgX73hz1FjkytTwahlO0wcY6R+tw4aokh0QYy0TVx5pZ4u1FEQOAp3IMgBsP8HOqaL/NEsEo3yb0K9iC3AfFihkLDJmVh26Pg=,iv:go0qS7/BcfcAMPkAdGWCoL61gNqBG5lWDev++y9DJ/I=,tag:LgtEyTZH8NfhfrKTcAigZw==,type:str]
sops: sops:
age: age:
- recipient: age1lufn6t35gs4wgevyr2gud4eec7lvkn7pgnnv4tja64ww3hef7gqq8fas37 - recipient: age1lufn6t35gs4wgevyr2gud4eec7lvkn7pgnnv4tja64ww3hef7gqq8fas37
@@ -49,7 +49,7 @@ sops:
QXRUYWtGcWZCVW11U3VYRktuUjlCbDgKsTK4WhUza/JuoDTU3uATa6fq/8eYzxtb QXRUYWtGcWZCVW11U3VYRktuUjlCbDgKsTK4WhUza/JuoDTU3uATa6fq/8eYzxtb
9BUK1ddzx9Mghea9XBMS17YGtGmW800OsLBomb3SINnOFvejcnKf8Q== 9BUK1ddzx9Mghea9XBMS17YGtGmW800OsLBomb3SINnOFvejcnKf8Q==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2025-11-11T17:47:23Z" lastmodified: "2025-11-11T23:18:34Z"
mac: ENC[AES256_GCM,data:9wWhkUbU/bNV6erUpQhwza47XLbdC7RIfw1J+bFdKW1DLjokeYr1HacZVw+O3bGDFZqKs9JomfnYLxeZay0VXKLb/e61yETi2lx3/BV3Ghp3Tsglf3Eoy4QokvErqDi3GoT7Hvc2bArq4hlYuZI5yjUU+8xvwMopU9MS1C1Muuw=,iv:WfnngiGiY8pnvZHiGueCkZtnGbF42L7ut+tCs8BMskA=,tag:x81EkcXBIk1bylD/QqXzPg==,type:str] mac: ENC[AES256_GCM,data:i3U364pjZB5Y61Wf7ETbXhNWyfH1gw0oyPcNyT+nCIJmePh8JWiP9hnHmZfLS1BKkI2powQdezbz9R0XDvU7g2SkV8EsWmn/h3rFwbopUZbeRQ2SCoX7LGFez74l1oTPQjL8zWJVdrUtfAFgbZKSEWuz7rsDieKBVhIJwWaeePY=,iv:N4z+X3eD6jH+zQfY24qec+U6wkfhLGPm4MzY8T2Km/A=,tag:yluW5YSKMZ4Kk+wcXbkj8Q==,type:str]
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.11.0 version: 3.11.0