Compare commits

..

No commits in common. "3f95cc7bc2759530cf5168e4652b1db6643feb00" and "e1456e2b3a1bd38272698e635b0ab358951aa358" have entirely different histories.

5 changed files with 17 additions and 55 deletions

View file

@ -43,7 +43,6 @@ with inputs.nixpkgs.lib; {
fluffychat = (import nixpkgs-pr-fluffychat {inherit system;}).fluffychat; fluffychat = (import nixpkgs-pr-fluffychat {inherit system;}).fluffychat;
feishin = (import nixpkgs-pr-feishin {inherit system;}).feishin; feishin = (import nixpkgs-pr-feishin {inherit system;}).feishin;
webone = pkgs.callPackage ./packages/webone {}; webone = pkgs.callPackage ./packages/webone {};
yazi-flavour-gruvbox-dark = pkgs.callPackage ./packages/yazi-flavour-gruvbox {};
}; };
in in
{ {

View file

@ -20,6 +20,12 @@
}; };
}; };
# Open ports for DHCP server.
networking.firewall.allowedUDPPorts = [
53
67
];
# Enable WebOne HTTP proxy. # Enable WebOne HTTP proxy.
services.webone.enable = true; services.webone.enable = true;
@ -27,22 +33,11 @@
services.netatalk = { services.netatalk = {
enable = true; enable = true;
settings = { settings = {
Global = { Global."uam list" = "uams_guest.so";
"uam list" = "uams_guest.so";
};
iMac = { iMac = {
path = "/srv/iMac"; path = "/srv/iMac";
browsable = "yes"; "read-only" = true;
"read-only" = "yes";
}; };
}; };
}; };
# Open ports for services.
networking.firewall = {
allowedUDPPorts = [
53 # DHCP server.
67 # DHCP server.
];
allowedTCPPorts = [8080 548]; # WebOne & Netatalk.
};
} }

View file

@ -1,21 +0,0 @@
{
pkgs,
fetchFromGitHub,
}: let
flavor = "gruvbox-dark";
in
pkgs.stdenv.mkDerivation {
pname = "yazi-flavor-${flavor}";
version = "2025.04.24";
src = fetchFromGitHub {
owner = "bennyyip";
repo = "${flavor}.yazi";
rev = "91fdfa70f6d593934e62aba1e449f4ec3d3ccc90";
hash = "sha256-RWqyAdETD/EkDVGcnBPiMcw1mSd78Aayky9yoxSsry4=";
};
installPhase = ''
mkdir -p $out
cp $src/* $out/
'';
}

View file

@ -1,6 +1,5 @@
{ {
nixpkgs, nixpkgs,
userPackages,
pkgs, pkgs,
lib, lib,
hostname, hostname,
@ -71,7 +70,7 @@ with lib; {
enable = true; enable = true;
interactiveShellInit = '' interactiveShellInit = ''
# set gruvbox theme # set gruvbox theme
theme_gruvbox dark hard theme_gruvbox
# yazi cd on quit. # yazi cd on quit.
function y function y
@ -218,14 +217,6 @@ with lib; {
}; };
}; };
programs.yazi = {
enable = true;
flavors."gruvbox-dark.yazi" = userPackages.yazi-flavour-gruvbox-dark;
settings.theme = {
flavor.dark = "gruvbox-dark";
};
};
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
aria2 aria2
btop btop
@ -235,6 +226,7 @@ with lib; {
rsync rsync
tmux tmux
trash-cli trash-cli
yazi
]; ];
# Enable avahi hostname resolution. # Enable avahi hostname resolution.
@ -245,7 +237,6 @@ with lib; {
enable = true; enable = true;
addresses = true; addresses = true;
domain = true; domain = true;
userServices = true;
}; };
}; };
} }

View file

@ -20,16 +20,14 @@ with lib; {
}; };
}; };
users.users.${user} = { users.users.${user}.openssh.authorizedKeys.keys = [
openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIETPyuxUVEmYyEW6PVC6BXqkhULHd/RvMm8fMbYhjTMV fern@muskduck"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIETPyuxUVEmYyEW6PVC6BXqkhULHd/RvMm8fMbYhjTMV fern@muskduck" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKzW4epTmK01kGVXcuAXUNJQPltnogf4uab9FA5m8S3n fern@pardalote"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKzW4epTmK01kGVXcuAXUNJQPltnogf4uab9FA5m8S3n fern@pardalote" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBEJYq1fMxVOzCMfE/td6DtWS8nUk76U9seYD3Z9RYAz u0_a399@fairywren"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBEJYq1fMxVOzCMfE/td6DtWS8nUk76U9seYD3Z9RYAz u0_a399@fairywren" "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIMoJvPcUJDVVzO4dHROCFNlgJdDZSP5xyPx2s40zcx5QAAAABHNzaDo= YubiKey5NFC"
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIMoJvPcUJDVVzO4dHROCFNlgJdDZSP5xyPx2s40zcx5QAAAABHNzaDo= YubiKey5NFC" ];
];
extraGroups = mkIf (user == "docker") ["docker"]; # if docker is enabled.
};
# Enable docker. # Enable docker.
virtualisation.docker.enable = mkIf (user == "docker") true; virtualisation.docker.enable = mkIf (user == "docker") true;
users.users.${user}.extraGroups = mkIf (user == "docker") ["docker"];
} }