Compare commits
1 Commits
ecfb399127
...
fix-zotero
| Author | SHA1 | Date | |
|---|---|---|---|
| 262f6779b1 |
6
flake.lock
generated
6
flake.lock
generated
@@ -76,11 +76,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1762095388,
|
"lastModified": 1774411715,
|
||||||
"narHash": "sha256-7Q8LtcvKWHbP8znARRTOY2tpU5WoV6FHwp5TZJOI8Us=",
|
"narHash": "sha256-mceIHtVMXpLAfr1W0VK9ceTBX5yKu4gGWpVbThWTsAA=",
|
||||||
"owner": "9001",
|
"owner": "9001",
|
||||||
"repo": "copyparty",
|
"repo": "copyparty",
|
||||||
"rev": "ac085b8149ff50e03d260128596dd130ed1c7cae",
|
"rev": "26e663d111e39ca96c63702ad27a05b6736607cf",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
@@ -58,7 +58,7 @@
|
|||||||
lldap.pam.enable = true;
|
lldap.pam.enable = true;
|
||||||
nginx.enable = true;
|
nginx.enable = true;
|
||||||
slskd.enable = true;
|
slskd.enable = true;
|
||||||
webdav.enable = true;
|
# webdav.enable = true;
|
||||||
copyparty.enable = true;
|
copyparty.enable = true;
|
||||||
syncthing.enable = true;
|
syncthing.enable = true;
|
||||||
cache.enable = true;
|
cache.enable = true;
|
||||||
|
|||||||
@@ -19,9 +19,8 @@
|
|||||||
slippi.enable = true;
|
slippi.enable = true;
|
||||||
niri.enable = true;
|
niri.enable = true;
|
||||||
stylix.enable = true;
|
stylix.enable = true;
|
||||||
# qemu.enable = true;
|
qemu.enable = true;
|
||||||
flatpak.enable = true;
|
flatpak.enable = true;
|
||||||
gtav-battleye-hack.enable = true;
|
|
||||||
# gdm.enable = true;
|
# gdm.enable = true;
|
||||||
openssh.enable = true;
|
openssh.enable = true;
|
||||||
sydpkgs.overlay.enable = true;
|
sydpkgs.overlay.enable = true;
|
||||||
|
|||||||
@@ -56,12 +56,7 @@ in {
|
|||||||
Extra arguments to pass to the final wrapProgram call.
|
Extra arguments to pass to the final wrapProgram call.
|
||||||
'';
|
'';
|
||||||
default = [];
|
default = [];
|
||||||
type = with lib.types;
|
type = lib.types.listOf lib.types.str;
|
||||||
listOf
|
|
||||||
(coercedTo
|
|
||||||
(oneOf [str package])
|
|
||||||
builtins.toString
|
|
||||||
str);
|
|
||||||
apply = lib.escapeShellArgs;
|
apply = lib.escapeShellArgs;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -9,6 +9,14 @@ in {
|
|||||||
type = lib.types.nullOr lib.types.path;
|
type = lib.types.nullOr lib.types.path;
|
||||||
default = config.stylix.image;
|
default = config.stylix.image;
|
||||||
};
|
};
|
||||||
|
# xwayland-satellite implements rootless Xwayland in a separate application,
|
||||||
|
# without the host compositor's involvement. It makes X11 windows appear as
|
||||||
|
# normal windows, just like a native Xwayland integration. While it is still
|
||||||
|
# somewhat experimental, it handles a lot of applications correctly, like
|
||||||
|
# Steam, games and Discord.
|
||||||
|
xwayland-satellite.enable =
|
||||||
|
lib.mkEnableOption "xwayland-satellite starting with Niri"
|
||||||
|
// { default = true; };
|
||||||
polkit.enable =
|
polkit.enable =
|
||||||
lib.mkEnableOption "Niri/Gnome Polkit" // { default = true; };
|
lib.mkEnableOption "Niri/Gnome Polkit" // { default = true; };
|
||||||
swaylock.enable =
|
swaylock.enable =
|
||||||
@@ -59,17 +67,26 @@ in {
|
|||||||
stylix.targets.swaylock.enable = cfg.swaylock.enable;
|
stylix.targets.swaylock.enable = cfg.swaylock.enable;
|
||||||
|
|
||||||
services.polkit-gnome.enable = cfg.polkit.enable;
|
services.polkit-gnome.enable = cfg.polkit.enable;
|
||||||
sydnix.xwayland-satellite.enable = lib.mkDefault true;
|
|
||||||
|
|
||||||
# File-picker.
|
# File-picker.
|
||||||
home.packages = [ pkgs.nautilus ];
|
home.packages = [ pkgs.nautilus ];
|
||||||
|
|
||||||
|
systemd.user.services.xwayland-satellite =
|
||||||
|
lib.mkIf cfg.xwayland-satellite.enable {
|
||||||
|
Service.ExecStart =
|
||||||
|
["${pkgs.xwayland-satellite}/bin/xwayland-satellite"];
|
||||||
|
Unit.After = ["niri.service"];
|
||||||
|
Unit.PartOf = ["niri.service"];
|
||||||
|
Install.WantedBy = ["niri.service"];
|
||||||
|
};
|
||||||
|
|
||||||
programs.niri = {
|
programs.niri = {
|
||||||
settings = {
|
settings = {
|
||||||
# Activates some Nixpkgs patches to help run Electron applications under
|
# Activates some Nixpkgs patches to help run Electron applications under
|
||||||
# Wayland.
|
# Wayland.
|
||||||
environment = {
|
environment = {
|
||||||
NIXOS_OZONE_WL = "1";
|
NIXOS_OZONE_WL = "1";
|
||||||
|
DISPLAY = ":0";
|
||||||
XDG_CURRENT_DESKTOP = "niri";
|
XDG_CURRENT_DESKTOP = "niri";
|
||||||
QT_QPA_PLATFORM = "wayland";
|
QT_QPA_PLATFORM = "wayland";
|
||||||
ELECTRON_OZONE_PLATFORM_HINT = "auto";
|
ELECTRON_OZONE_PLATFORM_HINT = "auto";
|
||||||
|
|||||||
@@ -51,10 +51,6 @@ in {
|
|||||||
pkgs.nerd-fonts.victor-mono
|
pkgs.nerd-fonts.victor-mono
|
||||||
pkgs.ibm-plex
|
pkgs.ibm-plex
|
||||||
];
|
];
|
||||||
extraWrapProgramArgs = [
|
|
||||||
"--set" "ESHELL_ALIASES_FILE"
|
|
||||||
config.home.sessionVariables.ESHELL_ALIASES_FILE
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
11
modules/home/users/msyds/emacs/bookmarks
Normal file
11
modules/home/users/msyds/emacs/bookmarks
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
;;;; Emacs Bookmark Format Version 1;;;; -*- coding: utf-8-emacs; mode: lisp-data -*-
|
||||||
|
;;; This format is meant to be slightly human-readable;
|
||||||
|
;;; nevertheless, you probably don't want to edit it.
|
||||||
|
;;; -*- End Of Bookmark File Format Version Stamp -*-
|
||||||
|
(("org-capture-last-stored"
|
||||||
|
(filename . "~/org/daily/2026-03-26.org")
|
||||||
|
(front-context-string . "* The significan")
|
||||||
|
(rear-context-string . "le: 2026-03-26\n\n")
|
||||||
|
(position . 89)
|
||||||
|
(last-modified 27077 32462 617656 528000))
|
||||||
|
)
|
||||||
@@ -2,10 +2,7 @@
|
|||||||
|
|
||||||
(require 'syd/base)
|
(require 'syd/base)
|
||||||
|
|
||||||
(use-package auctex)
|
(use-package auctex
|
||||||
|
|
||||||
(use-package tex
|
|
||||||
:straight nil ; Part of auctex.
|
|
||||||
:config
|
:config
|
||||||
(add-to-list 'TeX-view-program-selection '(output-pdf "Sioyek")))
|
(add-to-list 'TeX-view-program-selection '(output-pdf "Sioyek")))
|
||||||
|
|
||||||
|
|||||||
@@ -27,7 +27,8 @@
|
|||||||
cider-doc-buffer)
|
cider-doc-buffer)
|
||||||
(defun syd-clojure-eval-region (beg end)
|
(defun syd-clojure-eval-region (beg end)
|
||||||
(cider-eval-region beg end))
|
(cider-eval-region beg end))
|
||||||
(syd-handle '(clojure-mode clojurescript-mode cider-repl-mode)
|
(syd-handle '(clojure-mode clojurescript-mode cider-repl-mode
|
||||||
|
cider-clojure-interaction-mode)
|
||||||
:docs #'cider-doc
|
:docs #'cider-doc
|
||||||
:eval-region #'syd-clojure-eval-region
|
:eval-region #'syd-clojure-eval-region
|
||||||
:load-buffer #'cider-load-buffer)
|
:load-buffer #'cider-load-buffer)
|
||||||
|
|||||||
@@ -3,8 +3,8 @@
|
|||||||
(require 'syd/base)
|
(require 'syd/base)
|
||||||
|
|
||||||
(use-package fcitx
|
(use-package fcitx
|
||||||
|
:custom ((fcitx-remote-command "fcitx5-remote"))
|
||||||
:config
|
:config
|
||||||
(setq fcitx-remote-command "fcitx5-remote")
|
|
||||||
(fcitx-aggressive-setup))
|
(fcitx-aggressive-setup))
|
||||||
|
|
||||||
(provide 'syd/fcitx)
|
(provide 'syd/fcitx)
|
||||||
|
|||||||
@@ -22,16 +22,11 @@
|
|||||||
"/*" "/=" "/>" "//" "__" "~~" "(*" "*)"
|
"/*" "/=" "/>" "//" "__" "~~" "(*" "*)"
|
||||||
"\\\\" "://"))
|
"\\\\" "://"))
|
||||||
;; Sitelen pona glyphs.
|
;; Sitelen pona glyphs.
|
||||||
(rx-let ((ideograph (any (#xF1900 . #xF198C)))
|
(rx-let ((ideograph (any (#xF1900 . #xF198C))))
|
||||||
(tok-punct (any "" ""))
|
|
||||||
(arrow (any "←-↙"))
|
|
||||||
(zwj ""))
|
|
||||||
(ligature-set-ligatures
|
(ligature-set-ligatures
|
||||||
'fundamental-mode
|
'fundamental-mode
|
||||||
`(("" ,(rx (* (or ideograph tok-punct))))
|
`(("" ,(rx (* ideograph)))
|
||||||
("" ,(rx "" (* (or ideograph tok-punct)) ""))
|
("" ,(rx "" (* ideograph))))))
|
||||||
("" ,(rx zwj arrow))
|
|
||||||
("" ,(rx zwj ideograph)))))
|
|
||||||
(global-ligature-mode 1))
|
(global-ligature-mode 1))
|
||||||
|
|
||||||
(provide 'syd/ligature)
|
(provide 'syd/ligature)
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
;;; -*- lexical-binding: t; -*-
|
;;; -*- lexical-binding: t; -*-
|
||||||
|
|
||||||
(require 'syd/base)
|
(require 'syd/base)
|
||||||
(require 'syd/keymaps)
|
|
||||||
(require 'syd/completion) ; For `consult'.
|
(require 'syd/completion) ; For `consult'.
|
||||||
(require 'consult)
|
(require 'consult)
|
||||||
|
|
||||||
|
|||||||
1
modules/home/users/msyds/emacs/transient/history.el
Normal file
1
modules/home/users/msyds/emacs/transient/history.el
Normal file
@@ -0,0 +1 @@
|
|||||||
|
nil
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let cfg = config.sydnix.xwayland-satellite;
|
|
||||||
in {
|
|
||||||
options.sydnix.xwayland-satellite = {
|
|
||||||
# xwayland-satellite implements rootless Xwayland in a separate
|
|
||||||
# application, without the host compositor's involvement. It makes
|
|
||||||
# X11 windows appear as normal windows, just like a native
|
|
||||||
# Xwayland integration. While it is still somewhat experimental,
|
|
||||||
# it handles a lot of applications correctly, like Steam, games
|
|
||||||
# and Discord.
|
|
||||||
enable = lib.mkEnableOption "XWayland outside your Wayland";
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
systemd.user.services.xwayland-satellite =
|
|
||||||
let xwayland-satellite =
|
|
||||||
pkgs.xwayland-satellite.override { withSystemd = true; };
|
|
||||||
in {
|
|
||||||
Unit = {
|
|
||||||
Description = "Xwayland outside your Wayland";
|
|
||||||
BindsTo = [ "graphical-session.target" ];
|
|
||||||
PartOf = [ "graphical-session.target" ];
|
|
||||||
After = [ "graphical-session.target" ];
|
|
||||||
Requisite = [ "graphical-session.target" ];
|
|
||||||
};
|
|
||||||
Service = {
|
|
||||||
Type = "notify";
|
|
||||||
NotifyAccess = "all";
|
|
||||||
ExecStart = lib.getExe xwayland-satellite;
|
|
||||||
StandardOutput = "journal";
|
|
||||||
ExecStartPost = "systemctl --user set-environment DISPLAY=:0";
|
|
||||||
ExecStop = "systemctl --user unset-environment DISPLAY";
|
|
||||||
};
|
|
||||||
Install.WantedBy = [ "graphical-session.target" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -12,13 +12,6 @@ in {
|
|||||||
enableDynamicTheming = false;
|
enableDynamicTheming = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Start after xwayland-satellite, if possible. So DMS can start
|
|
||||||
# with the DISPLAY env var set.
|
|
||||||
systemd.user.services.dms = {
|
|
||||||
wants = ["xwayland-satellite.service"];
|
|
||||||
after = ["xwayland-satellite.service"];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.displayManager.dms-greeter = {
|
services.displayManager.dms-greeter = {
|
||||||
enable = true;
|
enable = true;
|
||||||
compositor.name = assert config.sydnix.niri.enable; "niri";
|
compositor.name = assert config.sydnix.niri.enable; "niri";
|
||||||
|
|||||||
@@ -13,10 +13,14 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
imports = [ ./copyparty/vault.nix ];
|
imports = [
|
||||||
|
./copyparty/vault.nix
|
||||||
|
./copyparty/webdav.nix
|
||||||
|
];
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
sydnix.deertopia.copyparty.vault.enable = true;
|
sydnix.deertopia.copyparty.vault.enable = true;
|
||||||
|
sydnix.deertopia.copyparty.webdav.enable = true;
|
||||||
|
|
||||||
sydnix.impermanence.directories = [
|
sydnix.impermanence.directories = [
|
||||||
"/var/lib/copyparty"
|
"/var/lib/copyparty"
|
||||||
@@ -29,8 +33,8 @@ in {
|
|||||||
"media"
|
"media"
|
||||||
];
|
];
|
||||||
|
|
||||||
# HACK: Make files created by copyparty.service initialise with the mode
|
# HACK: Make files created by copyparty.service initialise with
|
||||||
# 775.
|
# the mode 775.
|
||||||
systemd.services.copyparty.serviceConfig.UMask = lib.mkForce "002";
|
systemd.services.copyparty.serviceConfig.UMask = lib.mkForce "002";
|
||||||
|
|
||||||
services.copyparty = {
|
services.copyparty = {
|
||||||
@@ -56,7 +60,7 @@ in {
|
|||||||
"/Media library" = {
|
"/Media library" = {
|
||||||
path = "/media/library";
|
path = "/media/library";
|
||||||
# View and upload, but no deleting.
|
# View and upload, but no deleting.
|
||||||
access.rw = "*";
|
access.r = "*";
|
||||||
access.rwmd = "@jellyfin-admin";
|
access.rwmd = "@jellyfin-admin";
|
||||||
};
|
};
|
||||||
"/Torrents" = {
|
"/Torrents" = {
|
||||||
|
|||||||
@@ -36,6 +36,12 @@ in {
|
|||||||
access.A = [ "msyds" ];
|
access.A = [ "msyds" ];
|
||||||
access.rwmd = [ "zotero" ];
|
access.rwmd = [ "zotero" ];
|
||||||
};
|
};
|
||||||
|
"/msyds/zotero-root" = {
|
||||||
|
path = "/vault/msyds/zotero-root";
|
||||||
|
flags.daw = true;
|
||||||
|
access.A = [ "msyds" ];
|
||||||
|
access.rwmd = [ "zotero" ];
|
||||||
|
};
|
||||||
"/~msyds/public" = {
|
"/~msyds/public" = {
|
||||||
path = "/vault/~msyds/public";
|
path = "/vault/~msyds/public";
|
||||||
access.A = [ "msyds" ];
|
access.A = [ "msyds" ];
|
||||||
|
|||||||
57
modules/nixos/deertopia/copyparty/webdav.nix
Normal file
57
modules/nixos/deertopia/copyparty/webdav.nix
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
let cfg = config.sydnix.deertopia.copyparty.webdav;
|
||||||
|
in {
|
||||||
|
options.sydnix.deertopia.copyparty.webdav = {
|
||||||
|
enable = lib.mkEnableOption "WebDAV via copyparty";
|
||||||
|
port = lib.mkOption {
|
||||||
|
type = lib.types.port;
|
||||||
|
description = ''
|
||||||
|
Port on which Copyparty shall listen for WebDAV traffic.
|
||||||
|
'';
|
||||||
|
default = 3924;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# https://github.com/9001/copyparty/issues/1142
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.copyparty.settings = {
|
||||||
|
rproxy = -1;
|
||||||
|
xff-src = "lan";
|
||||||
|
daw = true;
|
||||||
|
dav-auth = true;
|
||||||
|
ihead = "*";
|
||||||
|
ohead = "*";
|
||||||
|
dav-port = cfg.port;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.authelia.instances.deertopia.settings =
|
||||||
|
lib.mkIf config.sydnix.deertopia.authelia.enable {
|
||||||
|
access_control.rules = lib.mkBefore [
|
||||||
|
{
|
||||||
|
domain = "dav.deertopia.net";
|
||||||
|
policy = "bypass";
|
||||||
|
methods = [ "OPTIONS" "PROPFIND" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
sydnix.deertopia.nginx.vhosts."dav" = {
|
||||||
|
directory = null;
|
||||||
|
vhost = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
extraConfig = ''
|
||||||
|
include ${../authelia/authelia-location.conf};
|
||||||
|
# Increase limit of upload sizes.
|
||||||
|
client_max_body_size 20G;
|
||||||
|
'';
|
||||||
|
locations."/".extraConfig = ''
|
||||||
|
include ${../authelia/authelia-authrequest.conf};
|
||||||
|
include ${../authelia/proxy.conf};
|
||||||
|
proxy_pass http://localhost:${builtins.toString cfg.port};
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let cfg = config.sydnix.gtav-battleye-hack;
|
|
||||||
in {
|
|
||||||
options.sydnix.gtav-battleye-hack = {
|
|
||||||
enable = lib.mkEnableOption
|
|
||||||
"Grand Theft Auto V Online BattlEye workaround";
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
networking.hosts."0.0.0.0" = [
|
|
||||||
"paradise-s1.battleye.com"
|
|
||||||
"test-s1.battleye.com"
|
|
||||||
"paradiseenhanced-s1.battleye.com"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -46,8 +46,7 @@
|
|||||||
kdeconnect.enable = true;
|
kdeconnect.enable = true;
|
||||||
qalculate.enable = true;
|
qalculate.enable = true;
|
||||||
toki-pona.enable = true;
|
toki-pona.enable = true;
|
||||||
prism-launcher.enable = on "sydpc";
|
prism-launcher.enable = true;
|
||||||
flatpak.enable = on "sydpc";
|
|
||||||
sops = {
|
sops = {
|
||||||
enable = true;
|
enable = true;
|
||||||
keyFile = "/persist/private-keys/age/crumb";
|
keyFile = "/persist/private-keys/age/crumb";
|
||||||
|
|||||||
Reference in New Issue
Block a user