diff options
| -rw-r--r-- | accounts/gkleen@sif/default.nix | 1 | ||||
| -rw-r--r-- | accounts/gkleen@sif/libvirt/default.nix | 1 | ||||
| -rw-r--r-- | accounts/gkleen@sif/systemd.nix | 26 | ||||
| -rw-r--r-- | flake.nix | 2 | ||||
| -rw-r--r-- | hosts/sif/default.nix | 14 | ||||
| -rw-r--r-- | hosts/sif/libvirt/default.nix | 1 |
6 files changed, 32 insertions, 13 deletions
diff --git a/accounts/gkleen@sif/default.nix b/accounts/gkleen@sif/default.nix index 7f4879f4..95fa8e48 100644 --- a/accounts/gkleen@sif/default.nix +++ b/accounts/gkleen@sif/default.nix | |||
| @@ -315,6 +315,7 @@ in { | |||
| 315 | device_config = [ | 315 | device_config = [ |
| 316 | { mount_path = "/run/etc-metadata"; ignore = true; } | 316 | { mount_path = "/run/etc-metadata"; ignore = true; } |
| 317 | ]; | 317 | ]; |
| 318 | icon_names.media = ["drive-removable-media-symbolic"]; | ||
| 318 | }; | 319 | }; |
| 319 | }; | 320 | }; |
| 320 | network-manager-applet.enable = true; | 321 | network-manager-applet.enable = true; |
diff --git a/accounts/gkleen@sif/libvirt/default.nix b/accounts/gkleen@sif/libvirt/default.nix index 70ac22b9..4e5a9b90 100644 --- a/accounts/gkleen@sif/libvirt/default.nix +++ b/accounts/gkleen@sif/libvirt/default.nix | |||
| @@ -7,6 +7,7 @@ with flakeInputs.nixVirt.lib; | |||
| 7 | config = { | 7 | config = { |
| 8 | virtualisation.libvirt = { | 8 | virtualisation.libvirt = { |
| 9 | enable = true; | 9 | enable = true; |
| 10 | swtpm.enable = true; | ||
| 10 | connections."qemu:///session" = { | 11 | connections."qemu:///session" = { |
| 11 | domains = [ | 12 | domains = [ |
| 12 | { definition = domain.writeXML (updateManyAttrsByPath [ | 13 | { definition = domain.writeXML (updateManyAttrsByPath [ |
diff --git a/accounts/gkleen@sif/systemd.nix b/accounts/gkleen@sif/systemd.nix index 7e83662f..d3a1a4c7 100644 --- a/accounts/gkleen@sif/systemd.nix +++ b/accounts/gkleen@sif/systemd.nix | |||
| @@ -207,10 +207,10 @@ in { | |||
| 207 | RuntimeDirectory = "gtklock"; | 207 | RuntimeDirectory = "gtklock"; |
| 208 | CacheDirectory = "gtklock"; | 208 | CacheDirectory = "gtklock"; |
| 209 | ExecStartPre = [ | 209 | ExecStartPre = [ |
| 210 | "${lib.getExe' pkgs.libsForQt5.qt5.qttools.bin "qdbus"} org.keepassxc.KeePassXC.MainWindow /keepassxc org.keepassxc.KeePassXC.MainWindow.lockAllDatabases" | 210 | "-${lib.getExe' pkgs.libsForQt5.qt5.qttools.bin "qdbus"} org.keepassxc.KeePassXC.MainWindow /keepassxc org.keepassxc.KeePassXC.MainWindow.lockAllDatabases" |
| 211 | "${lib.getExe' config.systemd.package "systemctl"} --user stop gpg-agent.service" | 211 | "-${lib.getExe' config.systemd.package "systemctl"} --user stop gpg-agent.service" |
| 212 | "${lib.getExe pkgs.playerctl} -a pause" | 212 | "-${lib.getExe pkgs.playerctl} -a pause" |
| 213 | (lib.getExe (pkgs.writeShellApplication { | 213 | "-${lib.getExe (pkgs.writeShellApplication { |
| 214 | name = "generate-css"; | 214 | name = "generate-css"; |
| 215 | runtimeInputs = with pkgs; [cfg.programs.wpaperd.package jq coreutils imagemagick findutils]; | 215 | runtimeInputs = with pkgs; [cfg.programs.wpaperd.package jq coreutils imagemagick findutils]; |
| 216 | text = '' | 216 | text = '' |
| @@ -250,7 +250,7 @@ in { | |||
| 250 | EOF | 250 | EOF |
| 251 | done | 251 | done |
| 252 | ''; | 252 | ''; |
| 253 | })) | 253 | })}" |
| 254 | ]; | 254 | ]; |
| 255 | NotifyAccess = "all"; | 255 | NotifyAccess = "all"; |
| 256 | ExecStart = ''${lib.getExe pkgs.gtklock} -s "''${RUNTIME_DIRECTORY}/style.css" -L ${pkgs.writeShellScript "after-lock" '' | 256 | ExecStart = ''${lib.getExe pkgs.gtklock} -s "''${RUNTIME_DIRECTORY}/style.css" -L ${pkgs.writeShellScript "after-lock" '' |
| @@ -320,6 +320,7 @@ in { | |||
| 320 | }; | 320 | }; |
| 321 | xembed-sni-proxy = { | 321 | xembed-sni-proxy = { |
| 322 | Unit = { | 322 | Unit = { |
| 323 | PartOf = lib.mkForce ["tray.target"]; | ||
| 323 | BindsTo = ["xwayland-satellite.service"]; | 324 | BindsTo = ["xwayland-satellite.service"]; |
| 324 | After = ["xwayland-satellite.service"]; | 325 | After = ["xwayland-satellite.service"]; |
| 325 | }; | 326 | }; |
| @@ -329,6 +330,21 @@ in { | |||
| 329 | After = ["graphical-session.target"]; | 330 | After = ["graphical-session.target"]; |
| 330 | }; | 331 | }; |
| 331 | }; | 332 | }; |
| 333 | network-manager-applet = { | ||
| 334 | Unit = { | ||
| 335 | PartOf = lib.mkForce ["tray.target"]; | ||
| 336 | }; | ||
| 337 | }; | ||
| 338 | udiskie = { | ||
| 339 | Unit = { | ||
| 340 | PartOf = lib.mkForce ["tray.target"]; | ||
| 341 | }; | ||
| 342 | }; | ||
| 343 | blueman-applet = { | ||
| 344 | Unit = { | ||
| 345 | PartOf = lib.mkForce ["tray.target"]; | ||
| 346 | }; | ||
| 347 | }; | ||
| 332 | } // listToAttrs (map ({host, port}: nameValuePair "proxy-to-autossh-socks@${toString port}" { | 348 | } // listToAttrs (map ({host, port}: nameValuePair "proxy-to-autossh-socks@${toString port}" { |
| 333 | Unit = { | 349 | Unit = { |
| 334 | Requires = ["autossh-socks@${host}:${toString (port + 1)}.service" "proxy-to-autossh-socks@${toString port}.socket"]; | 350 | Requires = ["autossh-socks@${host}:${toString (port + 1)}.service" "proxy-to-autossh-socks@${toString port}.socket"]; |
| @@ -335,7 +335,7 @@ | |||
| 335 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; | 335 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; |
| 336 | 336 | ||
| 337 | homeModules = nixImport rec { dir = ./home-modules; }; | 337 | homeModules = nixImport rec { dir = ./home-modules; }; |
| 338 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: configuration: nameValuePair "${username}@${hostname}" { inherit (configuration.home) activationPackage; inherit (configuration) home-files; }) nixosConfig.config.home-manager.users) self.nixosConfigurations)); | 338 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: configuration: nameValuePair "${username}@${hostname}" configuration) nixosConfig.config.home-manager.users) self.nixosConfigurations)); |
| 339 | 339 | ||
| 340 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; | 340 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; |
| 341 | 341 | ||
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix index 7db46c67..9de16de3 100644 --- a/hosts/sif/default.nix +++ b/hosts/sif/default.nix | |||
| @@ -591,13 +591,13 @@ in { | |||
| 591 | nvidia = { | 591 | nvidia = { |
| 592 | open = true; | 592 | open = true; |
| 593 | modesetting.enable = true; | 593 | modesetting.enable = true; |
| 594 | powerManagement.enable = false; | 594 | powerManagement.enable = true; |
| 595 | prime = { | 595 | # prime = { |
| 596 | nvidiaBusId = "PCI:1:0:0"; | 596 | # nvidiaBusId = "PCI:1:0:0"; |
| 597 | intelBusId = "PCI:0:2:0"; | 597 | # intelBusId = "PCI:0:2:0"; |
| 598 | reverseSync.enable = true; | 598 | # reverseSync.enable = true; |
| 599 | offload.enableOffloadCmd = true; | 599 | # offload.enableOffloadCmd = true; |
| 600 | }; | 600 | # }; |
| 601 | }; | 601 | }; |
| 602 | 602 | ||
| 603 | graphics = { | 603 | graphics = { |
diff --git a/hosts/sif/libvirt/default.nix b/hosts/sif/libvirt/default.nix index d0be7dff..9712d0d9 100644 --- a/hosts/sif/libvirt/default.nix +++ b/hosts/sif/libvirt/default.nix | |||
| @@ -8,6 +8,7 @@ with flakeInputs.nixVirt.lib; | |||
| 8 | qemu.swtpm.enable = true; | 8 | qemu.swtpm.enable = true; |
| 9 | allowedBridges = ["virbr0" "rz-0971" "rz-2403"]; | 9 | allowedBridges = ["virbr0" "rz-0971" "rz-2403"]; |
| 10 | }; | 10 | }; |
| 11 | virtualisation.spiceUSBRedirection.enable = true; | ||
| 11 | virtualisation.libvirt = { | 12 | virtualisation.libvirt = { |
| 12 | enable = true; | 13 | enable = true; |
| 13 | swtpm.enable = true; | 14 | swtpm.enable = true; |
