Added stargate server

This commit is contained in:
Aleksandr Lebedev 2025-09-17 21:29:09 +02:00
parent fbac93723b
commit ba8ee5e161
8 changed files with 152 additions and 31 deletions

54
flake.lock generated
View file

@ -324,11 +324,11 @@
"quickshell": "quickshell" "quickshell": "quickshell"
}, },
"locked": { "locked": {
"lastModified": 1757882409, "lastModified": 1757904745,
"narHash": "sha256-WVwvhMcX5QOi/149MaYiPVPNgho42EByaYdeqm3XSWs=", "narHash": "sha256-CKSBaGvjrlvFQiC/ywvK9XMl8JF55Ea+kT6fkgIYTPA=",
"owner": "KyleKrein", "owner": "KyleKrein",
"repo": "DesktopShell", "repo": "DesktopShell",
"rev": "76ee483b275f7cd501c2625a1711d50e13b5101c", "rev": "8ee43de145ce8776c353d3aea0286e1c968d290c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1283,11 +1283,11 @@
}, },
"master": { "master": {
"locked": { "locked": {
"lastModified": 1757849838, "lastModified": 1757950338,
"narHash": "sha256-1z1OdFWwsmWZ87xZ6FYuzhe5fxHcmj4puDTPwvxWN7Q=", "narHash": "sha256-CM9/wKVTXc33YqSD/eK/MfFh3C5t6LIuirdSu45CGm8=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "dfa87d116e876b1e7bf85b0ed78f41abbb8e6c3a", "rev": "9f71df050317b7ab47fc0725d134d1335fae35ec",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1371,11 +1371,11 @@
"xwayland-satellite-unstable": "xwayland-satellite-unstable" "xwayland-satellite-unstable": "xwayland-satellite-unstable"
}, },
"locked": { "locked": {
"lastModified": 1757836781, "lastModified": 1757942412,
"narHash": "sha256-1OSxFylf3orQ+UjLlrYIm7gibhDUm1heXVZC/kdJ5LA=", "narHash": "sha256-iDnEKwUYNOJZU/2B4bt8tfKUwN0J7RFJ7BXmf17VJOM=",
"owner": "sodiboo", "owner": "sodiboo",
"repo": "niri-flake", "repo": "niri-flake",
"rev": "8354fa85074d42cf0743458c316cabf55c1ab553", "rev": "1da07fd6a9d44a7875d2843cccab1179085edb2c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1404,11 +1404,11 @@
"niri-unstable": { "niri-unstable": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1757832020, "lastModified": 1757916394,
"narHash": "sha256-SCdus7r4IS8l3jzF8mcMFMlDvACTdmDCcsPnGUEqll0=", "narHash": "sha256-nSmVJLjTGwQYC+pqD7GLt7Yt6oktawAMRld6oyFwMd0=",
"owner": "YaLTeR", "owner": "YaLTeR",
"repo": "niri", "repo": "niri",
"rev": "e6a8ad38479eb179dc7301755316f993e3e872ea", "rev": "cd0d45fdb88641aa5211c81e69301e85c5dd53a2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1659,11 +1659,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1757775351, "lastModified": 1757943327,
"narHash": "sha256-xWsxmNHwt9jV/yFJqzsNeilpH4BR8MPe44Yt0eaGAIM=", "narHash": "sha256-w6cDExPBqbq7fTLo4dZ1ozDGeq3yV6dSN4n/sAaS6OM=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "f89c620d3d6e584d98280b48f0af7be4f8506ab5", "rev": "67a709cfe5d0643dafd798b0b613ed579de8be05",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1679,11 +1679,11 @@
"nixpkgs": "nixpkgs_12" "nixpkgs": "nixpkgs_12"
}, },
"locked": { "locked": {
"lastModified": 1757671225, "lastModified": 1757937573,
"narHash": "sha256-ZzoQXe7GV7QX3B3Iw59BogmrtHSP5Ig7MAPPD0cOFW4=", "narHash": "sha256-B+MT526k5th4x22h213/CgzdkKWIaeaa0+Y0uuCkH/I=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NixOS-WSL", "repo": "NixOS-WSL",
"rev": "42666441c3ddf34a8583a77f07a2c7cae32513c3", "rev": "134e117c969f42277f1c5e60c8fbcac103c2c454",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1786,11 +1786,11 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1757545623, "lastModified": 1757810152,
"narHash": "sha256-mCxPABZ6jRjUQx3bPP4vjA68ETbPLNz9V2pk9tO7pRQ=", "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "8cd5ce828d5d1d16feff37340171a98fc3bf6526", "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1834,11 +1834,11 @@
}, },
"nixpkgs_12": { "nixpkgs_12": {
"locked": { "locked": {
"lastModified": 1757068644, "lastModified": 1757745802,
"narHash": "sha256-NOrUtIhTkIIumj1E/Rsv1J37Yi3xGStISEo8tZm3KW4=", "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "8eb28adfa3dc4de28e792e3bf49fcf9007ca8ac9", "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1850,11 +1850,11 @@
}, },
"nixpkgs_13": { "nixpkgs_13": {
"locked": { "locked": {
"lastModified": 1757545623, "lastModified": 1757810152,
"narHash": "sha256-mCxPABZ6jRjUQx3bPP4vjA68ETbPLNz9V2pk9tO7pRQ=", "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "8cd5ce828d5d1d16feff37340171a98fc3bf6526", "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -61,7 +61,7 @@ in
binds = with config.lib.niri.actions; let binds = with config.lib.niri.actions; let
sh = spawn "sh" "-c"; sh = spawn "sh" "-c";
emacs = action: sh "emacsclient -c --eval \"${action}\""; emacs = action: sh "emacsclient -c --eval \"${action}\"";
screenshot-annotate = sh ''${lib.getExe pkgs.grim} -g "$(${lib.getExe pkgs.slurp} -w 0)" -t ppm - | ${lib.getExe pkgs.satty} --early-exit --copy-command 'wl-copy' --filename '~/Pictures/Screenshots/Screenshot-%Y-%m-%d_%H:%M:%S.png' --initial-tool brush''; screenshot-annotate = sh ''${lib.getExe pkgs.grim} -g "$(${lib.getExe pkgs.slurp} -w 0)" -t ppm - | ${lib.getExe pkgs.satty} --early-exit --copy-command 'wl-copy' --filename='-' -o '~/Pictures/Screenshots/Screenshot-%Y-%m-%d_%H:%M:%S.png' --initial-tool brush'';
in { in {
"Mod+E".action = sh "emacsclient -c"; "Mod+E".action = sh "emacsclient -c";
"Mod+Shift+C".action = sh "nautilus"; "Mod+Shift+C".action = sh "nautilus";

View file

@ -19,7 +19,7 @@ in
programs.niri = { programs.niri = {
settings = { settings = {
cursor.theme = "Nordic-cursors"; cursor.theme = "Nordic-cursors";
}; };
}; };
} }

View file

@ -42,7 +42,7 @@ in {
"/var/lib/flatpak" "/var/lib/flatpak"
"/var/lib/zerotier-one" "/var/lib/zerotier-one"
"/var/lib/systemd/coredump" "/var/lib/systemd/coredump"
"/var/lib/systemd/timers" "/var/lib/systemd/timers"
"/var/lib/acme" "/var/lib/acme"
"/var/lib/upower" "/var/lib/upower"
"/var/lib/power-profiles-daemon" "/var/lib/power-profiles-daemon"

View file

@ -52,7 +52,7 @@ Gesture gestures[] = {
{3, SwipeUD, EdgeTop, DistanceLong, ActModeReleased, {3, SwipeUD, EdgeTop, DistanceLong, ActModeReleased,
"systemctl --user restart desktop-shell.service"}, "systemctl --user restart desktop-shell.service"},
{2, SwipeUD, EdgeTop, DistanceLong, ActModeReleased, {2, SwipeUD, EdgeTop, DistanceLong, ActModeReleased,
"grim -g \"$(slurp -w 0)\" -t ppm - | satty --early-exit --copy-command 'wl-copy' --filename '~/Pictures/Screenshots/Screenshot-%Y-%m-%d_%H:%M:%S.png' --initial-tool brush"}, "grim -g \"$(slurp -w 0)\" -t ppm - | satty --early-exit --copy-command 'wl-copy' --filename='-' -o '~/Pictures/Screenshots/Screenshot-%Y-%m-%d_%H:%M:%S.png' --initial-tool brush"},
//{2, SwipeUD, EdgeBottom, DistanceAny, ActModeReleased, //{2, SwipeUD, EdgeBottom, DistanceAny, ActModeReleased,
//"pkill -9 -f wvkbd-mobintl"}, //"pkill -9 -f wvkbd-mobintl"},
{3, SwipeDU, EdgeAny, DistanceAny, ActModeReleased, {3, SwipeDU, EdgeAny, DistanceAny, ActModeReleased,

View file

@ -0,0 +1,35 @@
{
lib,
pkgs,
inputs,
namespace,
system,
target,
format,
virtual,
systems,
config,
...
}:
with lib;
with lib.custom; {
facter.reportPath = ./facter.json;
imports = lib.snowfall.fs.get-nix-files ./.;
systemd.network.wait-online.enable = lib.mkForce false; #facter
custom.presets.disko.impermanenceBtrfsLuks = {
enable = true;
swapSize = 16;
};
custom.hardware.secureBoot = enabled;
custom.impermanence = enabled;
custom.users.kylekrein = {
enable = true;
config = {};
};
networking.firewall.allowedTCPPorts = [80 443 22];
# ======================== DO NOT CHANGE THIS ========================
system.stateVersion = "25.05";
# ======================== DO NOT CHANGE THIS ========================
}

View file

@ -0,0 +1,70 @@
{lib, ...}: let
addHdd = device: name: {
type = "disk";
inherit device;
content = {
type = "gpt";
partitions = {
luks = {
size = "100%";
label = "luks";
content = {
type = "luks";
inherit name;
extraOpenArgs = [
"--allow-discards"
"--perf-no_read_workqueue"
"--perf-no_write_workqueue"
];
# https://0pointer.net/blog/unlocking-luks2-volumes-with-tpm2-fido2-pkcs11-security-hardware-on-systemd-248.html
settings = {crypttabExtraOpts = ["fido2-device=auto" "token-timeout=10"];};
content = {
type = "zfs";
pool = "zstorage";
};
};
};
};
};
};
in {
disko.devices = {
disk = {
hdd1 = addHdd "/dev/sda" "crypt-hdd1";
hdd2 = addHdd "/dev/sdb" "crypt-hdd2";
hdd3 = addHdd "/dev/sdc" "crypt-hdd3";
hdd4 = addHdd "/dev/sdd" "crypt-hdd4";
};
zpool = {
zstorage = {
type = "zpool";
mode = "raidz2";
rootFsOptions = {
mountpoint = "none";
compression = "zstd";
acltype = "posixacl";
xattr = "sa";
"com.sun:auto-snapshot" = "true";
};
options.ashift = "12";
datasets = {
"services" = {
type = "zfs_fs";
mountpoint = "/var/lib";
options."com.sun:auto-snapshot" = "true";
};
"backups" = {
type = "zfs_fs";
mountpoint = "/backups";
options."com.sun:auto-snapshot" = "true";
};
"media" = {
type = "zfs_fs";
mountpoint = "/media";
options."com.sun:auto-snapshot" = "true";
};
};
};
};
};
}

View file

@ -0,0 +1,16 @@
{
lib,
pkgs,
inputs,
namespace,
system,
target,
format,
virtual,
systems,
config,
...
}:
with lib;
with lib.custom; {
}