39 Commits

Author SHA1 Message Date
NixOS Builder Bot
e3bae4db52 Weekly flake update: 2025-12-05 10:37 UTC 2025-12-05 04:37:42 -06:00
Danilo Reyes
3fe51d5901 25.11!
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 1h7m11s
2025-12-05 02:40:17 -06:00
Danilo Reyes
76f0aeb07a low latency module messes up btd600 2025-12-02 16:53:01 -06:00
NixOS Builder Bot
0904751654 Weekly flake update: 2025-12-01 11:45 UTC 2025-12-01 05:45:55 -06:00
Danilo Reyes
6e6fbc7c3f new flake
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 2h15m41s
2025-11-30 13:18:24 -06:00
Danilo Reyes
c0578a4bf4 corrupted flake 2025-11-30 13:15:30 -06:00
Danilo Reyes
bcbb624e28 changed Pictures path to capitalized 2025-11-30 13:14:54 -06:00
NixOS Builder Bot
7d1c66aa49 Weekly flake update: 2025-11-28 09:45 UTC 2025-11-28 03:45:48 -06:00
Danilo Reyes
cbb625a053 25.11 beta
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 15m7s
2025-11-26 22:58:59 -06:00
Danilo Reyes
5e08c8bfd1 flake update 2025-11-26 21:24:31 -06:00
Danilo Reyes
6b88a3970d properly declare nvidia-container-toolkit 25.11 2025-11-24 21:00:52 -06:00
Danilo Reyes
febe4251a7 tdarr port
Some checks failed
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 1h28m57s
2025-11-23 17:14:44 -06:00
Danilo Reyes
a3cc30d74c tdarr 2025-11-22 23:30:45 -06:00
Danilo Reyes
4d66cff834 enable nvidia podman if nvidia + podman are enabled 2025-11-22 20:27:10 -06:00
Danilo Reyes
2b9ef59733 qbittorrent downgrade 2025-11-22 00:42:08 -06:00
Danilo Reyes
f4c1f029fe real bump 2025-11-22 00:08:54 -06:00
Danilo Reyes
e7308ff031 servers 2025-11-21 23:20:47 -06:00
Danilo Reyes
29777a261e attempt to patch qbit_manage... 2025-11-21 23:15:45 -06:00
Danilo Reyes
3da044f396 patch 2025-11-21 23:01:27 -06:00
Danilo Reyes
b6de7127a4 qbit-manage version bump 2025-11-21 22:26:39 -06:00
Danilo Reyes
3b75b44629 new syncthing folder
Some checks failed
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 38m28s
2025-11-21 02:00:17 -06:00
Danilo Reyes
e559395fed flake update + homepage fix? 2025-11-21 01:59:01 -06:00
Danilo Reyes
2bc8391e63 ryot upgrade 2025-11-20 21:02:46 -06:00
Danilo Reyes
2fa9badd89 stylix enable gnome 39
Some checks failed
Build on Push / build-configurations (push) Has been cancelled
2025-11-20 21:00:19 -06:00
Danilo Reyes
1aba99c68e uneeded players 2025-11-20 21:00:06 -06:00
Danilo Reyes
1c3f389e28 nextcloud upgrade 2025-11-20 20:59:28 -06:00
Danilo Reyes
37f37f4a0d flake update
Some checks failed
Build on Push / build-configurations (push) Failing after 7m27s
2025-11-20 17:07:36 -06:00
Danilo Reyes
bc9c582cd0 disable stylix a bit
Some checks failed
Build on Push / build-configurations (push) Failing after 49m37s
2025-11-20 01:09:52 -06:00
Danilo Reyes
afb35b3abd push cache alias 2025-11-20 01:09:45 -06:00
Danilo Reyes
b117c3e7da changing theme
Some checks failed
Build on Push / build-configurations (push) Successful in 48m37s
Weekly NixOS Build & Cache / build-and-cache (push) Failing after 1h50m4s
2025-11-16 21:38:32 -06:00
Danilo Reyes
abb08afa46 new cachix keys 2025-11-16 21:38:25 -06:00
Danilo Reyes
a48b56d9ed I dont even use droidcam 2025-11-14 13:48:05 -06:00
Danilo Reyes
ca552337da vlc instead of mpv 2025-11-14 13:18:17 -06:00
Danilo Reyes
6c3e800227 atticd nos uses postgresql 2025-11-13 19:46:34 -06:00
Danilo Reyes
c4dc5c316c Implement retry mechanism for attic push commands in build workflows to enhance reliability and prevent pipeline failures. Update cache push logic in build-on-push, build-schemes, and weekly-build-cache workflows. 2025-11-13 18:54:29 -06:00
Danilo Reyes
1d7031b338 lidarr update 2025-11-13 14:13:04 -06:00
Danilo Reyes
b6341b79a6 Refactor lidarr-mb-gap to enhance functionality and improve configuration handling 2025-11-11 18:14:58 -06:00
Danilo Reyes
978dd75ea3 lidarr-mb-gap fully operational 2025-11-11 17:19:11 -06:00
Danilo Reyes
4201c7d8a6 Update lidarr-mb-gap configuration to conditionally include SSH key path based on user home directory 2025-11-11 15:34:57 -06:00
25 changed files with 391 additions and 193 deletions

View File

@@ -34,17 +34,57 @@ jobs:
nix build .#emacs-vm --quiet nix build .#emacs-vm --quiet
- name: Push to cache - name: Push to cache
continue-on-error: true
run: | run: |
echo "Pushing builds to cache..." echo "Pushing builds to cache..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Push all built derivations to cache # Push all built derivations to cache
if ls result* 1> /dev/null 2>&1; then if ls result* 1> /dev/null 2>&1; then
attic push servidos:nixos result* retry_attic_push "attic push servidos:nixos result*"
fi fi
# Push the specific system derivations we just built # Push the specific system derivations we just built
nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin # Get paths and push with retry (paths are already built, so this is fast)
nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin workstation_path=$(nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
nix build .#emacs-vm --print-out-paths | attic push servidos:nixos --stdin if [ -n "$workstation_path" ]; then
retry_attic_push "echo \"$workstation_path\" | attic push servidos:nixos --stdin"
fi
server_path=$(nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
if [ -n "$server_path" ]; then
retry_attic_push "echo \"$server_path\" | attic push servidos:nixos --stdin"
fi
emacs_path=$(nix build .#emacs-vm --print-out-paths 2>/dev/null || echo "")
if [ -n "$emacs_path" ]; then
retry_attic_push "echo \"$emacs_path\" | attic push servidos:nixos --stdin"
fi
- name: Summary - name: Summary
run: | run: |

View File

@@ -36,9 +36,36 @@ jobs:
attic login servidos http://127.0.0.1:2343 ${{ secrets.ATTIC_TOKEN }} attic login servidos http://127.0.0.1:2343 ${{ secrets.ATTIC_TOKEN }}
- name: Build and push all schemes - name: Build and push all schemes
continue-on-error: true
run: | run: |
echo "Building and pushing all schemes..." echo "Building and pushing all schemes..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Store original scheme # Store original scheme
ORIGINAL_SCHEME=$(grep -oP "scheme = schemesFile\.schemes\.\K\w+" config/stylix.nix) ORIGINAL_SCHEME=$(grep -oP "scheme = schemesFile\.schemes\.\K\w+" config/stylix.nix)
echo "Original scheme: $ORIGINAL_SCHEME" echo "Original scheme: $ORIGINAL_SCHEME"
@@ -61,14 +88,17 @@ jobs:
--out-link ./result-$scheme \ --out-link ./result-$scheme \
--quiet --quiet
# Push to cache # Push to cache with retry
echo "Pushing $scheme to cache..." echo "Pushing $scheme to cache..."
attic push servidos:nixos ./result-$scheme retry_attic_push "attic push servidos:nixos ./result-$scheme"
# Also push using print-out-paths for better cache coverage # Also push using print-out-paths for better cache coverage
nix build .#nixosConfigurations.${HOSTNAME}.config.system.build.toplevel \ build_path=$(nix build .#nixosConfigurations.${HOSTNAME}.config.system.build.toplevel \
--print-out-paths \ --print-out-paths \
--quiet | attic push servidos:nixos --stdin --quiet 2>/dev/null || echo "")
if [ -n "$build_path" ]; then
retry_attic_push "echo \"$build_path\" | attic push servidos:nixos --stdin"
fi
echo "✓ Completed $scheme" echo "✓ Completed $scheme"
echo "" echo ""

View File

@@ -60,17 +60,57 @@ jobs:
- name: Push to cache - name: Push to cache
if: steps.check_changes.outputs.changes == 'true' if: steps.check_changes.outputs.changes == 'true'
continue-on-error: true
run: | run: |
echo "Pushing builds to cache..." echo "Pushing builds to cache..."
# Retry function for attic push commands
retry_attic_push() {
local max_attempts=5
local attempt=1
local command="$@"
while [ $attempt -le $max_attempts ]; do
echo "Attempt $attempt/$max_attempts: $command"
if eval "$command"; then
echo "✓ Successfully pushed to cache on attempt $attempt"
return 0
else
local exit_code=$?
echo "✗ Attempt $attempt failed with exit code $exit_code"
if [ $attempt -lt $max_attempts ]; then
echo "Waiting 2 seconds before retry..."
sleep 2
fi
attempt=$((attempt + 1))
fi
done
echo "⚠️ Failed to push to cache after $max_attempts attempts. Continuing anyway..."
return 0 # Don't fail the pipeline
}
# Push all built derivations to cache # Push all built derivations to cache
if ls result* 1> /dev/null 2>&1; then if ls result* 1> /dev/null 2>&1; then
attic push servidos:nixos result* retry_attic_push "attic push servidos:nixos result*"
fi fi
# Push the specific system derivations we just built # Push the specific system derivations we just built
nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin # Get paths and push with retry (paths are already built, so this is fast)
nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths | attic push servidos:nixos --stdin workstation_path=$(nix build .#nixosConfigurations.workstation.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
nix build .#emacs-vm --print-out-paths | attic push servidos:nixos --stdin if [ -n "$workstation_path" ]; then
retry_attic_push "echo \"$workstation_path\" | attic push servidos:nixos --stdin"
fi
server_path=$(nix build .#nixosConfigurations.server.config.system.build.toplevel --print-out-paths 2>/dev/null || echo "")
if [ -n "$server_path" ]; then
retry_attic_push "echo \"$server_path\" | attic push servidos:nixos --stdin"
fi
emacs_path=$(nix build .#emacs-vm --print-out-paths 2>/dev/null || echo "")
if [ -n "$emacs_path" ]; then
retry_attic_push "echo \"$emacs_path\" | attic push servidos:nixos --stdin"
fi
- name: Commit updated flake.lock - name: Commit updated flake.lock
if: steps.check_changes.outputs.changes == 'true' if: steps.check_changes.outputs.changes == 'true'

View File

@@ -9,6 +9,7 @@
{ {
imports = [ imports = [
inputs.home-manager.nixosModules.home-manager inputs.home-manager.nixosModules.home-manager
./users.nix
./jawz.nix ./jawz.nix
../modules/modules.nix ../modules/modules.nix
]; ];
@@ -97,6 +98,7 @@
]; ];
substituters = [ substituters = [
"${config.my.servers.atticd.url}/nixos" "${config.my.servers.atticd.url}/nixos"
"${config.my.servers.atticd.url}/webref"
"https://nix-gaming.cachix.org" "https://nix-gaming.cachix.org"
"https://nixpkgs-python.cachix.org" "https://nixpkgs-python.cachix.org"
"https://devenv.cachix.org" "https://devenv.cachix.org"
@@ -106,7 +108,8 @@
"https://cosmic.cachix.org" "https://cosmic.cachix.org"
]; ];
trusted-public-keys = [ trusted-public-keys = [
"nixos:kubuWhYCk9/aZp5GDJFAScYgigM66DszP8i1Pzbq0Fc=" "nixos:GAnxnubP07Qu+6v8MErkuAa4uGCR4Npmu4acmQrUXpI="
"webref:qobPVDWPzbSJ0JIUoLBnWILcc+zbPa16CVAiN8MN6tg="
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" "nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4="
"nixpkgs-python.cachix.org-1:hxjI7pFxTyuTHn2NkvWCrAUcNZLNS3ZAvfYNuYifcEU=" "nixpkgs-python.cachix.org-1:hxjI7pFxTyuTHn2NkvWCrAUcNZLNS3ZAvfYNuYifcEU="
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw=" "devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="

View File

@@ -38,6 +38,15 @@ _final: prev: {
waybar = prev.waybar.overrideAttrs (old: { waybar = prev.waybar.overrideAttrs (old: {
mesonFlags = old.mesonFlags ++ [ "-Dexperimental=true" ]; mesonFlags = old.mesonFlags ++ [ "-Dexperimental=true" ];
}); });
qbittorrent = prev.qbittorrent.overrideAttrs (old: rec {
version = "5.1.3";
src = prev.fetchFromGitHub {
owner = "qbittorrent";
repo = "qBittorrent";
rev = "release-${version}";
hash = "sha256-RIItbrpkMFglO2NwbgpBhgBSk5+vdywatGVwnbWkNVQ=";
};
});
inherit (pkgsU) inherit (pkgsU)
code-cursor code-cursor
symbola symbola

View File

@@ -9,7 +9,7 @@ let
schemesFile = import ./schemes.nix { schemesFile = import ./schemes.nix {
inherit pkgs inputs; inherit pkgs inputs;
}; };
scheme = schemesFile.schemes.febroary; scheme = schemesFile.schemes.jesus;
cfg = config.my.stylix; cfg = config.my.stylix;
gnomeEnabled = config.services.desktopManager.gnome.enable; gnomeEnabled = config.services.desktopManager.gnome.enable;
in in

13
config/users.nix Normal file
View File

@@ -0,0 +1,13 @@
{ ... }:
{
users.users = {
sonarr = {
uid = 274;
group = "piracy";
};
radarr = {
uid = 275;
group = "piracy";
};
};
}

View File

@@ -112,8 +112,8 @@ in
"${mod} SHIFT, 8, movetoworkspace, 8" "${mod} SHIFT, 8, movetoworkspace, 8"
"${mod} SHIFT, 9, movetoworkspace, 9" "${mod} SHIFT, 9, movetoworkspace, 9"
"${mod} SHIFT, 0, movetoworkspace, 10" "${mod} SHIFT, 0, movetoworkspace, 10"
"${mod}, F3, exec, grimblast save area ~/Pictures/screenshots/$(date +'%Y-%m-%d_%H-%M-%S').png" "${mod}, F3, exec, grimblast save area ~/Pictures/Screenshots/$(date +'%Y-%m-%d_%H-%M-%S').png"
"${mod} SHIFT, F3, exec, grimblast save screen ~/Pictures/screenshots/$(date +'%Y-%m-%d_%H-%M-%S').png" "${mod} SHIFT, F3, exec, grimblast save screen ~/Pictures/Screenshots/$(date +'%Y-%m-%d_%H-%M-%S').png"
]; ];
binde = [ binde = [
"${mod} SHIFT, h, moveactive, -20 0" "${mod} SHIFT, h, moveactive, -20 0"

276
flake.lock generated
View File

@@ -20,11 +20,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762356719, "lastModified": 1764370710,
"narHash": "sha256-qwd/xdoOya1m8FENle+4hWnydCtlXUWLAW/Auk6WL7s=", "narHash": "sha256-7iZklFmziy6Vn5ZFy9mvTSuFopp3kJNuPxL5QAvtmFQ=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "aquamarine", "repo": "aquamarine",
"rev": "6d0b3567584691bf9d8fedb5d0093309e2f979c7", "rev": "561ae7fbe1ca15dfd908262ec815bf21a13eef63",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -71,11 +71,11 @@
"base16-helix": { "base16-helix": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1752979451, "lastModified": 1760703920,
"narHash": "sha256-0CQM+FkYy0fOO/sMGhOoNL80ftsAzYCg9VhIrodqusM=", "narHash": "sha256-m82fGUYns4uHd+ZTdoLX2vlHikzwzdu2s2rYM2bNwzw=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-helix", "repo": "base16-helix",
"rev": "27cf1e66e50abc622fb76a3019012dc07c678fac", "rev": "d646af9b7d14bff08824538164af99d0c521b185",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -182,11 +182,11 @@
"firefox-gnome-theme": { "firefox-gnome-theme": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1758112371, "lastModified": 1764724327,
"narHash": "sha256-lizRM2pj6PHrR25yimjyFn04OS4wcdbc38DCdBVa2rk=", "narHash": "sha256-OkFLrD3pFR952TrjQi1+Vdj604KLcMnkpa7lkW7XskI=",
"owner": "rafaelmardojai", "owner": "rafaelmardojai",
"repo": "firefox-gnome-theme", "repo": "firefox-gnome-theme",
"rev": "0909cfe4a2af8d358ad13b20246a350e14c2473d", "rev": "66b7c635763d8e6eb86bd766de5a1e1fbfcc1047",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -198,11 +198,11 @@
"flake-compat": { "flake-compat": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1747046372, "lastModified": 1761588595,
"narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=", "narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
"owner": "edolstra", "owner": "edolstra",
"repo": "flake-compat", "repo": "flake-compat",
"rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885", "rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -216,11 +216,11 @@
"nixpkgs-lib": "nixpkgs-lib" "nixpkgs-lib": "nixpkgs-lib"
}, },
"locked": { "locked": {
"lastModified": 1762440070, "lastModified": 1763759067,
"narHash": "sha256-xxdepIcb39UJ94+YydGP221rjnpkDZUlykKuF54PsqI=", "narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "26d05891e14c88eb4a5d5bee659c0db5afb609d8", "rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -234,11 +234,11 @@
"nixpkgs-lib": "nixpkgs-lib_2" "nixpkgs-lib": "nixpkgs-lib_2"
}, },
"locked": { "locked": {
"lastModified": 1762440070, "lastModified": 1763759067,
"narHash": "sha256-xxdepIcb39UJ94+YydGP221rjnpkDZUlykKuF54PsqI=", "narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "26d05891e14c88eb4a5d5bee659c0db5afb609d8", "rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -293,11 +293,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1756770412, "lastModified": 1763759067,
"narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=", "narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "4524271976b625a4a605beefd893f270620fd751", "rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -324,24 +324,6 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils_2": {
"inputs": {
"systems": "systems_4"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"fonts": { "fonts": {
"flake": false, "flake": false,
"locked": { "locked": {
@@ -399,18 +381,20 @@
"gnome-shell": { "gnome-shell": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1748186689, "host": "gitlab.gnome.org",
"narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=", "lastModified": 1764524476,
"narHash": "sha256-bTmNn3Q4tMQ0J/P0O5BfTQwqEnCiQIzOGef9/aqAZvk=",
"owner": "GNOME", "owner": "GNOME",
"repo": "gnome-shell", "repo": "gnome-shell",
"rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0", "rev": "c0e1ad9f0f703fd0519033b8f46c3267aab51a22",
"type": "github" "type": "gitlab"
}, },
"original": { "original": {
"host": "gitlab.gnome.org",
"owner": "GNOME", "owner": "GNOME",
"ref": "48.2", "ref": "gnome-49",
"repo": "gnome-shell", "repo": "gnome-shell",
"type": "github" "type": "gitlab"
} }
}, },
"home-manager": { "home-manager": {
@@ -420,15 +404,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762787259, "lastModified": 1764866045,
"narHash": "sha256-t2U/GLLXHa2+kJkwnFNRVc2fEJ/lUfyZXBE5iKzJdcs=", "narHash": "sha256-0GsEtXV9OquDQ1VclQfP16cU5VZh7NEVIOjSH4UaJuM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "37a3d97f2873e0f68711117c34d04b7c7ead8f4e", "rev": "f63d0fe9d81d36e5fc95497217a72e02b8b7bcab",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-25.11",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
@@ -478,11 +463,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762462052, "lastModified": 1763733840,
"narHash": "sha256-6roLYzcDf4V38RUMSqycsOwAnqfodL6BmhRkUtwIgdA=", "narHash": "sha256-JnET78yl5RvpGuDQy3rCycOCkiKoLr5DN1fPhRNNMco=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprgraphics", "repo": "hyprgraphics",
"rev": "ffc999d980c7b3bca85d3ebd0a9fbadf984a8162", "rev": "8f1bec691b2d198c60cccabca7a94add2df4ed1a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -501,6 +486,7 @@
"hyprlang": "hyprlang", "hyprlang": "hyprlang",
"hyprutils": "hyprutils", "hyprutils": "hyprutils",
"hyprwayland-scanner": "hyprwayland-scanner", "hyprwayland-scanner": "hyprwayland-scanner",
"hyprwire": "hyprwire",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ],
@@ -509,11 +495,11 @@
"xdph": "xdph" "xdph": "xdph"
}, },
"locked": { "locked": {
"lastModified": 1762755326, "lastModified": 1764880933,
"narHash": "sha256-YYTzQUQDnVdtN3k40sC5kq6yL70riU8bM8cQLz38jzk=", "narHash": "sha256-0EGExxEEIuDEcd+jM1hnvp69XW8bPQTKWLP7Nj/KSCU=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "Hyprland", "repo": "Hyprland",
"rev": "0b1d690676589503f0addece30e936a240733699", "rev": "52b3c8cbc699aa949f4f1887ca829898055ce4ad",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -555,11 +541,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762755186, "lastModified": 1764616927,
"narHash": "sha256-ZjjETUHtoEhVN7JI1Cbt3p/KcXpK8ZQaPHx7UkG1OgA=", "narHash": "sha256-wRT0MKkpPo11ijSX3KeMN+EQWnpSeUlRtyF3pFLtlRU=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprland-guiutils", "repo": "hyprland-guiutils",
"rev": "66356e20a8ed348aa49c1b9ceace786e224225b3", "rev": "25cedbfdc5b3ea391d8307c9a5bea315e5df3c52",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -609,11 +595,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1758927902, "lastModified": 1764612430,
"narHash": "sha256-LZgMds7M94+vuMql2bERQ6LiFFdhgsEFezE4Vn+Ys3A=", "narHash": "sha256-54ltTSbI6W+qYGMchAgCR6QnC1kOdKXN6X6pJhOWxFg=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprlang", "repo": "hyprlang",
"rev": "4dafa28d4f79877d67a7d1a654cddccf8ebf15da", "rev": "0d00dc118981531aa731150b6ea551ef037acddd",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -661,11 +647,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762463729, "lastModified": 1764592794,
"narHash": "sha256-2fYkU/mdz8WKY3dkDPlE/j6hTxIwqultsx4gMMsMns0=", "narHash": "sha256-7CcO+wbTJ1L1NBQHierHzheQGPWwkIQug/w+fhTAVuU=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprtoolkit", "repo": "hyprtoolkit",
"rev": "88483bdee5329ec985f0c8f834c519cd18cfe532", "rev": "5cfe0743f0e608e1462972303778d8a0859ee63e",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -686,11 +672,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762387740, "lastModified": 1764637132,
"narHash": "sha256-gQ9zJ+pUI4o+Gh4Z6jhJll7jjCSwi8ZqJIhCE2oqwhQ=", "narHash": "sha256-vSyiKCzSY48kA3v39GFu6qgRfigjKCU/9k1KTK475gg=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprutils", "repo": "hyprutils",
"rev": "926689ddb9c0a8787e58c02c765a62e32d63d1f7", "rev": "2f2413801beee37303913fc3c964bbe92252a963",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -711,11 +697,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1755184602, "lastModified": 1763640274,
"narHash": "sha256-RCBQN8xuADB0LEgaKbfRqwm6CdyopE1xIEhNc67FAbw=", "narHash": "sha256-Uan1Nl9i4TF/kyFoHnTq1bd/rsWh4GAK/9/jDqLbY5A=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprwayland-scanner", "repo": "hyprwayland-scanner",
"rev": "b3b0f1f40ae09d4447c20608e5a4faf8bf3c492d", "rev": "f6cf414ca0e16a4d30198fd670ec86df3c89f671",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -724,6 +710,35 @@
"type": "github" "type": "github"
} }
}, },
"hyprwire": {
"inputs": {
"hyprutils": [
"hyprland",
"hyprutils"
],
"nixpkgs": [
"hyprland",
"nixpkgs"
],
"systems": [
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1764773840,
"narHash": "sha256-9UcCdwe7vPgEcJJ64JseBQL0ZJZoxp/2iFuvfRI+9zk=",
"owner": "hyprwm",
"repo": "hyprwire",
"rev": "3f1997d6aeced318fb141810fded2255da811293",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprwire",
"type": "github"
}
},
"jawz-scripts": { "jawz-scripts": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@@ -732,11 +747,11 @@
"sudoku-solver": "sudoku-solver" "sudoku-solver": "sudoku-solver"
}, },
"locked": { "locked": {
"lastModified": 1762799327, "lastModified": 1764529970,
"narHash": "sha256-HhIC8Ucb4ZruU7Yr1gV4qGVKkhuYpAhXbRnSfAmjQoY=", "narHash": "sha256-XskTPGgQJlMXMpiD16J+EyG7G01SwybwK0MXgsfqi5E=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "6efd55712d73e65c0fb4304cfd1649723bb757ef", "rev": "e40d6fc2bb35c360078d8523b987c071591357c3",
"revCount": 120, "revCount": 122,
"type": "git", "type": "git",
"url": "https://git.lebubu.org/jawz/scripts.git" "url": "https://git.lebubu.org/jawz/scripts.git"
}, },
@@ -747,17 +762,16 @@
}, },
"lidarr-mb-gap": { "lidarr-mb-gap": {
"inputs": { "inputs": {
"flake-utils": "flake-utils_2",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1762882489, "lastModified": 1763107451,
"narHash": "sha256-YFk5GkD7TkIMbcnJzFz+IRN4vH7QJSRphpS3zje3PRU=", "narHash": "sha256-mG2RevGmQchx7FMK4F3GowUzMmD+JVva6Zt/sZnQTeQ=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "35e6c7e330868b00e7c8dbc878db776ba01f719d", "rev": "cc9521f7a402c0339d55911f3718967ec00c2666",
"revCount": 11, "revCount": 22,
"type": "git", "type": "git",
"url": "https://git.lebubu.org/vibe-coded/lidarr-mb-gap.git" "url": "https://git.lebubu.org/vibe-coded/lidarr-mb-gap.git"
}, },
@@ -774,11 +788,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762740007, "lastModified": 1764900011,
"narHash": "sha256-CtMgV9vfm16x/0NBQmQQe/Vbv423cPWeNfBtiVYcUBk=", "narHash": "sha256-iG5HqIzZ12qzTi3xCwBinw/PR0xNlJNXLLQyV2En1OY=",
"owner": "fufexan", "owner": "fufexan",
"repo": "nix-gaming", "repo": "nix-gaming",
"rev": "8dce0b23e30b03efbdc94e8db7cb27298446e4cc", "rev": "e1829ce2d33b1e289b3ecca7530dee84da8d9e85",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -810,11 +824,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1751903740, "lastModified": 1764234087,
"narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=", "narHash": "sha256-NHF7QWa0ZPT8hsJrvijREW3+nifmF2rTXgS2v0tpcEA=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-generators", "repo": "nixos-generators",
"rev": "032decf9db65efed428afd2fa39d80f7089085eb", "rev": "032a1878682fafe829edfcf5fdfad635a2efe748",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -889,27 +903,27 @@
}, },
"nixpkgs-small": { "nixpkgs-small": {
"locked": { "locked": {
"lastModified": 1762800201, "lastModified": 1764905945,
"narHash": "sha256-uSPI4VB/GKfVeH72q3V94sHB6Spy0L5uUTxTmmZH/FQ=", "narHash": "sha256-NtlwimMawcO5wSLWw/BQPOdsL1Ew98/PgE95Evf0UzQ=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "25a9ff6075a050210f8fc276a67d21399c90a797", "rev": "bb835c14c21853c531131dcaeddd16b9ffe2d0b3",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "master", "ref": "nixos-25.11-small",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1762596750, "lastModified": 1764667669,
"narHash": "sha256-rXXuz51Bq7DHBlfIjN7jO8Bu3du5TV+3DSADBX7/9YQ=", "narHash": "sha256-7WUCZfmqLAssbDqwg9cUDAXrSoXN79eEEq17qhTNM/Y=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "b6a8526db03f735b89dd5ff348f53f752e7ddc8e", "rev": "418468ac9527e799809c900eda37cbff999199b6",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -921,16 +935,16 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1762800201, "lastModified": 1764831616,
"narHash": "sha256-uSPI4VB/GKfVeH72q3V94sHB6Spy0L5uUTxTmmZH/FQ=", "narHash": "sha256-OtzF5wBvO0jgW1WW1rQU9cMGx7zuvkF7CAVJ1ypzkxA=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "25a9ff6075a050210f8fc276a67d21399c90a797", "rev": "c97c47f2bac4fa59e2cbdeba289686ae615f8ed4",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "master", "ref": "nixos-25.11",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@@ -964,11 +978,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762800743, "lastModified": 1764926586,
"narHash": "sha256-6SjknGi7vOyZV2AghcYI6wzqqKTWMeFOv9JlN5YFICQ=", "narHash": "sha256-CoTxfBQIL1jE1Ea2iWWvKX4oDjG7LozprKSrOHJ55xI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nur", "repo": "nur",
"rev": "32c80839213416ea24e3138f2fe18b316dff08eb", "rev": "18265766af189ce24259f2256a197686f627b860",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -989,11 +1003,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1758998580, "lastModified": 1764773531,
"narHash": "sha256-VLx0z396gDCGSiowLMFz5XRO/XuNV+4EnDYjdJhHvUk=", "narHash": "sha256-mCBl7MD1WZ7yCG6bR9MmpPO2VydpNkWFgnslJRIT1YU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "ba8d9c98f5f4630bcb0e815ab456afd90c930728", "rev": "1d9616689e98beded059ad0384b9951e967a17fa",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1012,11 +1026,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762441963, "lastModified": 1763988335,
"narHash": "sha256-j+rNQ119ffYUkYt2YYS6rnd6Jh/crMZmbqpkGLXaEt0=", "narHash": "sha256-QlcnByMc8KBjpU37rbq5iP7Cp97HvjRP0ucfdh+M4Qc=",
"owner": "cachix", "owner": "cachix",
"repo": "git-hooks.nix", "repo": "git-hooks.nix",
"rev": "8e7576e79b88c16d7ee3bbd112c8d90070832885", "rev": "50b9238891e388c9fdc6a5c49e49c42533a1b5ce",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1028,11 +1042,11 @@
"qbit_manage": { "qbit_manage": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1758160887, "lastModified": 1764428351,
"narHash": "sha256-cTxM3nHQQto7lpoNjShYcCbJCSYiwS9bKqw0DWAjw6A=", "narHash": "sha256-JCsbf2mPRhs7Mbekl946G/y/CSNSSvQBLvlwVy/Avcg=",
"owner": "StuffAnThings", "owner": "StuffAnThings",
"repo": "qbit_manage", "repo": "qbit_manage",
"rev": "21812368bc5366f3388dfb21769fee1da48083c5", "rev": "371627bbeb082e68f057bbe4599565c2e63a14c7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1071,11 +1085,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1762659808, "lastModified": 1764483358,
"narHash": "sha256-2Kv2mANf+FRisqhpfeZ8j9firBxb23ZvEXwdcunbpGI=", "narHash": "sha256-EyyvCzXoHrbL467YSsQBTWWg4sR96MH1sPpKoSOelB4=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "524312bc62e3f34bd9231a2f66622663d3355133", "rev": "5aca6ff67264321d47856a2ed183729271107c9c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1097,7 +1111,7 @@
"nixpkgs" "nixpkgs"
], ],
"nur": "nur_2", "nur": "nur_2",
"systems": "systems_5", "systems": "systems_4",
"tinted-foot": "tinted-foot", "tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty", "tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes", "tinted-schemes": "tinted-schemes",
@@ -1105,15 +1119,16 @@
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1762264356, "lastModified": 1764836393,
"narHash": "sha256-QVfC53Ri+8n3e7Ujx9kq6all3+TLBRRPRnc6No5qY5w=", "narHash": "sha256-J2jgYyXiXctr91MSuBQ6dwB1YaC7DpzKp+Rkj6pqS8o=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "647bb8dd96a206a1b79c4fd714affc88b409e10b", "rev": "6f3b50c8fa9c468fc787e211b700e46592bf9d56",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "danth", "owner": "danth",
"ref": "release-25.11",
"repo": "stylix", "repo": "stylix",
"type": "github" "type": "github"
} }
@@ -1195,21 +1210,6 @@
"type": "github" "type": "github"
} }
}, },
"systems_5": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": { "tinted-foot": {
"flake": false, "flake": false,
"locked": { "locked": {
@@ -1246,11 +1246,11 @@
"tinted-schemes": { "tinted-schemes": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1757716333, "lastModified": 1763914658,
"narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=", "narHash": "sha256-Hju0WtMf3iForxtOwXqGp3Ynipo0EYx1AqMKLPp9BJw=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "schemes", "repo": "schemes",
"rev": "317a5e10c35825a6c905d912e480dfe8e71c7559", "rev": "0f6be815d258e435c9b137befe5ef4ff24bea32c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1262,11 +1262,11 @@
"tinted-tmux": { "tinted-tmux": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1757811970, "lastModified": 1764465359,
"narHash": "sha256-n5ZJgmzGZXOD9pZdAl1OnBu3PIqD+X3vEBUGbTi4JiI=", "narHash": "sha256-lbSVPqLEk2SqMrnpvWuKYGCaAlfWFMA6MVmcOFJjdjE=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "tinted-tmux", "repo": "tinted-tmux",
"rev": "d217ba31c846006e9e0ae70775b0ee0f00aa6b1e", "rev": "edf89a780e239263cc691a987721f786ddc4f6aa",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -1278,11 +1278,11 @@
"tinted-zed": { "tinted-zed": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1757811247, "lastModified": 1764464512,
"narHash": "sha256-4EFOUyLj85NRL3OacHoLGEo0wjiRJzfsXtR4CZWAn6w=", "narHash": "sha256-rCD/pAhkMdCx6blsFwxIyvBJbPZZ1oL2sVFrH07lmqg=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-zed", "repo": "base16-zed",
"rev": "824fe0aacf82b3c26690d14e8d2cedd56e18404e", "rev": "907dbba5fb8cf69ebfd90b00813418a412d0a29a",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -2,19 +2,16 @@
description = "JawZ NixOS flake setup"; description = "JawZ NixOS flake setup";
inputs = { inputs = {
flake-parts.url = "github:hercules-ci/flake-parts"; flake-parts.url = "github:hercules-ci/flake-parts";
nixpkgs.url = "github:nixos/nixpkgs?ref=master"; nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-25.11";
nixpkgs-small.url = "github:nixos/nixpkgs?ref=master"; nixpkgs-small.url = "github:nixos/nixpkgs?ref=nixos-25.11-small";
# nixpkgs-small.url = "github:nixos/nixpkgs?ref=nixos-25.05-small";
nixpkgs-unstable.url = "github:nixos/nixpkgs?ref=nixos-unstable"; nixpkgs-unstable.url = "github:nixos/nixpkgs?ref=nixos-unstable";
ucodenix.url = "github:e-tho/ucodenix/ba7f0a366460e0fbea9622fc770cb982be0e4720"; ucodenix.url = "github:e-tho/ucodenix/ba7f0a366460e0fbea9622fc770cb982be0e4720";
home-manager = { home-manager = {
# url = "github:nix-community/home-manager?ref=release-25.05"; url = "github:nix-community/home-manager?ref=release-25.11";
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
stylix = { stylix = {
# url = "github:danth/stylix/release-25.05"; url = "github:danth/stylix/release-25.11";
url = "github:danth/stylix";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
doom-emacs = { doom-emacs = {

View File

@@ -26,6 +26,7 @@
22000 # syncthing relay 22000 # syncthing relay
3452 # sonarqube 3452 # sonarqube
8448 # synapse ssl 8448 # synapse ssl
8265 # tdarr
]; ];
}; };
nix.buildMachines = [ nix.buildMachines = [
@@ -45,12 +46,14 @@
lidarr-mb-gap = lib.mkIf config.my.secureHost { lidarr-mb-gap = lib.mkIf config.my.secureHost {
sopsFile = ../../secrets/env.yaml; sopsFile = ../../secrets/env.yaml;
}; };
"private_keys/lidarr-mb-gap" = lib.mkIf config.my.secureHost { "private_keys/lidarr-mb-gap" =
sopsFile = ../../secrets/keys.yaml; lib.mkIf (config.my.secureHost && config.services.lidarr-mb-gap.enable)
owner = config.users.users.lidarr-mb-gap.name; {
inherit (config.users.users.lidarr-mb-gap) group; sopsFile = ../../secrets/keys.yaml;
path = "~/.ssh/ed25519_lidarr-mb-gap"; owner = config.users.users.lidarr-mb-gap.name;
}; inherit (config.users.users.lidarr-mb-gap) group;
path = "${config.users.users.lidarr-mb-gap.home}/.ssh/ed25519_lidarr-mb-gap";
};
}; };
networking = { networking = {
hostName = "server"; hostName = "server";
@@ -88,10 +91,11 @@
lidarr-mb-gap = { lidarr-mb-gap = {
enable = true; enable = true;
package = inputs.lidarr-mb-gap.packages.${pkgs.system}.lidarr-mb-gap; package = inputs.lidarr-mb-gap.packages.${pkgs.system}.lidarr-mb-gap;
reportDir = "/var/lib/lidarr-mb-gap/reports"; home = "/var/lib/lidarr-mb-gap";
envFile = config.sops.secrets.lidarr-mb-gap.path; envFile = config.sops.secrets.lidarr-mb-gap.path;
runInterval = "weekly"; runInterval = "weekly";
syncToVPS = false; syncToVPS = true;
vpsPort = 3456;
vpsHost = "lidarr-reports@${config.my.ips.vps}"; vpsHost = "lidarr-reports@${config.my.ips.vps}";
vpsPath = "/var/www/html/lidarr-mb-gap"; vpsPath = "/var/www/html/lidarr-mb-gap";
sshKeyFile = config.sops.secrets."private_keys/lidarr-mb-gap".path; sshKeyFile = config.sops.secrets."private_keys/lidarr-mb-gap".path;

View File

@@ -88,7 +88,6 @@ in
gnome-epub-thumbnailer gnome-epub-thumbnailer
podman-compose podman-compose
scrcpy scrcpy
mpv
; ;
inherit (pkgs.libheif) out; inherit (pkgs.libheif) out;
}; };
@@ -111,7 +110,6 @@ in
enableVirtualCamera = true; enableVirtualCamera = true;
plugins = builtins.attrValues { plugins = builtins.attrValues {
inherit (pkgs.obs-studio-plugins) inherit (pkgs.obs-studio-plugins)
droidcam-obs
obs-vkcapture obs-vkcapture
obs-vaapi obs-vaapi
obs-tuna obs-tuna

View File

@@ -9,8 +9,6 @@
config = lib.mkIf config.my.apps.multimedia.enable { config = lib.mkIf config.my.apps.multimedia.enable {
users.users.jawz.packages = builtins.attrValues { users.users.jawz.packages = builtins.attrValues {
inherit (pkgs) inherit (pkgs)
recordbox # libadwaita music player
celluloid # video player
curtail # image compressor curtail # image compressor
easyeffects # equalizer easyeffects # equalizer
identity # compare images or videos identity # compare images or videos

View File

@@ -42,6 +42,11 @@ in
nix run nixpkgs#nixfmt-tree && \ nix run nixpkgs#nixfmt-tree && \
statix fix statix fix
''; '';
nix-push-cache = ''
nix build $NH_FLAKE#nixosConfigurations.${config.networking.hostName}.config.system.build.toplevel \
--print-out-paths --fallback --max-jobs 100 --cores 0 |
nix run nixpkgs#attic-client -- push lan:nixos --stdin
'';
}; };
}; };
} }

View File

@@ -17,7 +17,10 @@ in
settings = { settings = {
listen = "[::]:${toString cfg.port}"; listen = "[::]:${toString cfg.port}";
jwt = { }; jwt = { };
database.heartbeat = true; # 5 minutes database = {
heartbeat = true;
url = "postgresql:///${cfg.name}?host=${config.my.postgresSocket}";
};
chunking = { chunking = {
nar-size-threshold = 64 * 1024; # 64 KiB nar-size-threshold = 64 * 1024; # 64 KiB
min-size = 16 * 1024; # 16 KiB min-size = 16 * 1024; # 16 KiB

View File

@@ -54,5 +54,59 @@
} }
]; ];
} }
{
gpt = [
{
abbr = "GPT";
href = "http://127.0.0.1:8080";
description = "";
}
];
}
{
syncthing-workstation = [
{
abbr = "STW";
href = "http://workstation:8384";
description = "";
}
];
}
{
syncthing-server = [
{
abbr = "STS";
href = "http://server:8384";
description = "";
}
];
}
{
music-report = [
{
abbr = "MR";
href = "https://mb-report.lebubu.org";
description = "";
}
];
}
{
portfolio = [
{
abbr = "PF";
href = "https://danilo-reyes.com";
description = "";
}
];
}
{
webref = [
{
abbr = "WR";
href = "https://webref.lebubu.org";
description = "";
}
];
}
]; ];
} }

View File

@@ -11,7 +11,7 @@ in
options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686; options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686;
config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable { config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable {
autoStart = true; autoStart = true;
image = "linuxserver/lidarr:version-2.13.3.4711"; image = "linuxserver/lidarr:version-3.0.1.4866";
ports = [ "${toString cfg.port}:${toString cfg.port}" ]; ports = [ "${toString cfg.port}:${toString cfg.port}" ];
environment = { environment = {
TZ = config.my.timeZone; TZ = config.my.timeZone;

View File

@@ -65,7 +65,7 @@ in
nextcloud = { nextcloud = {
enable = true; enable = true;
https = false; # vps https = false; # vps
package = pkgs.nextcloud31; package = pkgs.nextcloud32;
appstoreEnable = true; appstoreEnable = true;
configureRedis = true; configureRedis = true;
extraAppsEnable = true; extraAppsEnable = true;

View File

@@ -39,6 +39,7 @@ let
"readeck" "readeck"
"sonarqube" "sonarqube"
"gitea" "gitea"
"atticd"
]; ];
in in
{ {

View File

@@ -12,11 +12,11 @@ let
config.allowUnfree = true; config.allowUnfree = true;
}; };
vuetorrent = pkgs.fetchzip { vuetorrent = pkgs.fetchzip {
url = "https://github.com/VueTorrent/VueTorrent/releases/download/v2.25.0/vuetorrent.zip"; url = "https://github.com/VueTorrent/VueTorrent/releases/download/v2.31.0/vuetorrent.zip";
sha256 = "sha256-sOaQNw6AnpwNFEextgTnsjEOfpl3/lpoOZFgFOz7Bos="; sha256 = "sha256-kVDnDoCoJlY2Ew71lEMeE67kNOrKTJEMqNj2OfP01qw=";
stripRoot = true; stripRoot = true;
}; };
qbit_manageEnv = pkgsU.python3.withPackages ( qbit_manageEnv = pkgs.python3.withPackages (
ps: ps:
builtins.attrValues { builtins.attrValues {
inherit (ps) inherit (ps)

View File

@@ -12,7 +12,7 @@ in
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) { config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
sops.secrets.ryot.sopsFile = ../../secrets/env.yaml; sops.secrets.ryot.sopsFile = ../../secrets/env.yaml;
virtualisation.oci-containers.containers.ryot = { virtualisation.oci-containers.containers.ryot = {
image = "ghcr.io/ignisda/ryot:v9.3.0"; image = "ghcr.io/ignisda/ryot:v9.5.0";
ports = [ "${toString cfg.port}:8000" ]; ports = [ "${toString cfg.port}:8000" ];
environmentFiles = [ config.sops.secrets.ryot.path ]; environmentFiles = [ config.sops.secrets.ryot.path ];
environment = { environment = {

View File

@@ -7,10 +7,11 @@
{ {
options.my.services.nvidia.enable = lib.mkEnableOption "NVIDIA GPU drivers and CUDA"; options.my.services.nvidia.enable = lib.mkEnableOption "NVIDIA GPU drivers and CUDA";
config = lib.mkIf config.my.services.nvidia.enable { config = lib.mkIf config.my.services.nvidia.enable {
environment.variables.CUDA_CACHE_PATH = "\${XDG_CACHE_HOME}/nv";
boot.kernelParams = lib.mkIf (config.networking.hostName == "workstation") [ "nvidia-drm.fbdev=1" ]; boot.kernelParams = lib.mkIf (config.networking.hostName == "workstation") [ "nvidia-drm.fbdev=1" ];
services.xserver.videoDrivers = [ "nvidia" ]; services.xserver.videoDrivers = [ "nvidia" ];
environment.variables.CUDA_CACHE_PATH = "\${XDG_CACHE_HOME}/nv";
hardware = { hardware = {
nvidia-container-toolkit.enable = config.virtualisation.podman.enable;
graphics = { graphics = {
enable = true; enable = true;
enable32Bit = true; enable32Bit = true;

View File

@@ -5,7 +5,7 @@
... ...
}: }:
{ {
imports = [ inputs.nix-gaming.nixosModules.pipewireLowLatency ]; # imports = [ inputs.nix-gaming.nixosModules.pipewireLowLatency ];
options.my.services.sound.enable = lib.mkEnableOption "audio system and PipeWire"; options.my.services.sound.enable = lib.mkEnableOption "audio system and PipeWire";
config = lib.mkIf config.my.services.sound.enable { config = lib.mkIf config.my.services.sound.enable {
services.pulseaudio.enable = false; services.pulseaudio.enable = false;
@@ -15,11 +15,12 @@
alsa.enable = true; alsa.enable = true;
alsa.support32Bit = true; alsa.support32Bit = true;
pulse.enable = true; pulse.enable = true;
lowLatency = { wireplumber.enable = true;
enable = true; # lowLatency = {
quantum = 64; # enable = true;
rate = 48000; # quantum = 64;
}; # rate = 48000;
# };
}; };
}; };
} }

View File

@@ -69,9 +69,10 @@ in
}; };
folders = { folders = {
cache = mkMobile "~/Downloads/cache/"; cache = mkMobile "~/Downloads/cache/";
friends = mkMobile "~/Pictures/artist/friends/"; friends = mkMobile "~/Pictures/Artist/friends/";
forme = mkMobile "~/Pictures/art for me/"; forme = mkMobile "~/Pictures/Art for me/";
comfy = mkMobile "~/Development/AI/ComfyUI/output/"; comfy = mkMobile "~/Development/AI/ComfyUI/output/";
clean = mkMobile "~/Pictures/Unorganized/unified mess/sync";
gdl = { gdl = {
path = "~/.config/jawz/"; path = "~/.config/jawz/";
ignorePerms = false; ignorePerms = false;
@@ -104,7 +105,7 @@ in
]; ];
}; };
friend_share = { friend_share = {
path = "~/Pictures/encrypted/friends"; path = "~/Pictures/Encrypted/friends";
ignorePerms = false; ignorePerms = false;
type = "sendreceive"; type = "sendreceive";
devices = [ devices = [

View File

@@ -10,7 +10,7 @@ dns: ENC[AES256_GCM,data:fQN3SOm0HzOjSjTohRAD4KlXdEu5PbQc3DvK3rLC1S4G0G4HUPkgucN
cloudflare-api: ENC[AES256_GCM,data:iNUMlY8rz5yHVitpK4HGaFSK7j+c8Pm7rOQMOQGmSJ3a8ASyrtouPgLbcnoPY/jalsJYAj991dSiui+Vwqs=,iv:qWONG/KLd9/F4tqrWF5T25Zxst3bk+kOYaOFBFSBAAY=,tag:gRFxar8KS8gnX8oaCD156Q==,type:str] cloudflare-api: ENC[AES256_GCM,data:iNUMlY8rz5yHVitpK4HGaFSK7j+c8Pm7rOQMOQGmSJ3a8ASyrtouPgLbcnoPY/jalsJYAj991dSiui+Vwqs=,iv:qWONG/KLd9/F4tqrWF5T25Zxst3bk+kOYaOFBFSBAAY=,tag:gRFxar8KS8gnX8oaCD156Q==,type:str]
synapse: ENC[AES256_GCM,data:IR0pFwQBEM4O8mzzYXrPe2FjulSUGuitzLDLms2uovr6gEU82mCkRO/UCQOybNm03iOQeXX0Whz739kpYSGSInEyx69BNG/etH+bMu+GbYeMdrTEyXHSa7kcH4Ug,iv:Vn2ILYXnCj+Op/E2kWoxV+2ZtlxYJxO6XK3Ql41KW6w=,tag:9wogJFLlmfM5PRgPdwFlcw==,type:str] synapse: ENC[AES256_GCM,data:IR0pFwQBEM4O8mzzYXrPe2FjulSUGuitzLDLms2uovr6gEU82mCkRO/UCQOybNm03iOQeXX0Whz739kpYSGSInEyx69BNG/etH+bMu+GbYeMdrTEyXHSa7kcH4Ug,iv:Vn2ILYXnCj+Op/E2kWoxV+2ZtlxYJxO6XK3Ql41KW6w=,tag:9wogJFLlmfM5PRgPdwFlcw==,type:str]
readeck: ENC[AES256_GCM,data:TsIkHLji37dDHQRt78SquBhoSREHDgvgbc6+M1k2MLrgMGJ/Ejfy5AZXCIp/Qj5sXDzKP4j6Y6xFvGLswCqe02XjqGCpX13gZVCFPuKr8Nq051Xg,iv:Rc/pjYP+Vd/DvLCYsfJjDrnAlAiUlZOcNeeYzE6O3UY=,tag:OvR+CXMmrUFbsrHvduhnjA==,type:str] readeck: ENC[AES256_GCM,data:TsIkHLji37dDHQRt78SquBhoSREHDgvgbc6+M1k2MLrgMGJ/Ejfy5AZXCIp/Qj5sXDzKP4j6Y6xFvGLswCqe02XjqGCpX13gZVCFPuKr8Nq051Xg,iv:Rc/pjYP+Vd/DvLCYsfJjDrnAlAiUlZOcNeeYzE6O3UY=,tag:OvR+CXMmrUFbsrHvduhnjA==,type:str]
lidarr-mb-gap: ENC[AES256_GCM,data:zMr1UJUxqu3BJ2YRZKeIUzcEQRsHM6xeZ9kJ7ElynTD7ay0je+L0i+pyWe3OGwVN/8UUIQnKf42Pr6C4hJSxqwetjG6jQYTUGwTWzvxr/TDr6uhZwG59wLh8e02ymLw0GMJYfkQdZqEWyicHESHNdPmBFx3kByU01/QvOQlFO82/FPTvwpY=,iv:sk57rOrV/lj5f47sF4agZYPScLRiMgtM7iwzmubnZ2Q=,tag:LNl8TK3MswXj6lqBNA9Vqw==,type:str] lidarr-mb-gap: ENC[AES256_GCM,data:bNzD9Nf9BWAPkm0Yk0J4MJbmo908QX9VsD+40Rngnfec9nzH4vZ2DrelxRllgT1kgnXMQzvoSgNhBwkDN4fgX73hz1FjkytTwahlO0wcY6R+tw4aokh0QYy0TVx5pZ4u1FEQOAp3IMgBsP8HOqaL/NEsEo3yb0K9iC3AfFihkLDJmVh26Pg=,iv:go0qS7/BcfcAMPkAdGWCoL61gNqBG5lWDev++y9DJ/I=,tag:LgtEyTZH8NfhfrKTcAigZw==,type:str]
sops: sops:
age: age:
- recipient: age1lufn6t35gs4wgevyr2gud4eec7lvkn7pgnnv4tja64ww3hef7gqq8fas37 - recipient: age1lufn6t35gs4wgevyr2gud4eec7lvkn7pgnnv4tja64ww3hef7gqq8fas37
@@ -49,7 +49,7 @@ sops:
QXRUYWtGcWZCVW11U3VYRktuUjlCbDgKsTK4WhUza/JuoDTU3uATa6fq/8eYzxtb QXRUYWtGcWZCVW11U3VYRktuUjlCbDgKsTK4WhUza/JuoDTU3uATa6fq/8eYzxtb
9BUK1ddzx9Mghea9XBMS17YGtGmW800OsLBomb3SINnOFvejcnKf8Q== 9BUK1ddzx9Mghea9XBMS17YGtGmW800OsLBomb3SINnOFvejcnKf8Q==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2025-11-11T17:47:23Z" lastmodified: "2025-11-11T23:18:34Z"
mac: ENC[AES256_GCM,data:9wWhkUbU/bNV6erUpQhwza47XLbdC7RIfw1J+bFdKW1DLjokeYr1HacZVw+O3bGDFZqKs9JomfnYLxeZay0VXKLb/e61yETi2lx3/BV3Ghp3Tsglf3Eoy4QokvErqDi3GoT7Hvc2bArq4hlYuZI5yjUU+8xvwMopU9MS1C1Muuw=,iv:WfnngiGiY8pnvZHiGueCkZtnGbF42L7ut+tCs8BMskA=,tag:x81EkcXBIk1bylD/QqXzPg==,type:str] mac: ENC[AES256_GCM,data:i3U364pjZB5Y61Wf7ETbXhNWyfH1gw0oyPcNyT+nCIJmePh8JWiP9hnHmZfLS1BKkI2powQdezbz9R0XDvU7g2SkV8EsWmn/h3rFwbopUZbeRQ2SCoX7LGFez74l1oTPQjL8zWJVdrUtfAFgbZKSEWuz7rsDieKBVhIJwWaeePY=,iv:N4z+X3eD6jH+zQfY24qec+U6wkfhLGPm4MzY8T2Km/A=,tag:yluW5YSKMZ4Kk+wcXbkj8Q==,type:str]
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.11.0 version: 3.11.0