mirror of
https://github.com/deltathetawastaken/dotfiles.git
synced 2025-12-06 07:16:37 +03:00
small edits on huanan + intelnuc
This commit is contained in:
parent
78b1e4eb20
commit
c016a23c7e
|
|
@ -8,9 +8,16 @@
|
||||||
services.flatpak.enable = true;
|
services.flatpak.enable = true;
|
||||||
services.printing.enable = true;
|
services.printing.enable = true;
|
||||||
services.pcscd.enable = true;
|
services.pcscd.enable = true;
|
||||||
|
|
||||||
services.udev.packages = [
|
services.udev.packages = [
|
||||||
pkgs.gnome.gnome-settings-daemon
|
pkgs.gnome.gnome-settings-daemon
|
||||||
pkgs.android-udev-rules
|
pkgs.android-udev-rules
|
||||||
pkgs.yubikey-personalization
|
pkgs.yubikey-personalization
|
||||||
];
|
];
|
||||||
|
|
||||||
|
users.groups.cloudflared = { };
|
||||||
|
users.users.cloudflared = {
|
||||||
|
group = "cloudflared";
|
||||||
|
isSystemUser = true;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
@ -31,6 +31,7 @@
|
||||||
excludePackages = [ pkgs.xterm ];
|
excludePackages = [ pkgs.xterm ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.services.NetworkManager-wait-online.enable = false; #just makes boot time longer
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "huanan";
|
hostName = "huanan";
|
||||||
nameservers = [ "192.168.3.53" ];
|
nameservers = [ "192.168.3.53" ];
|
||||||
|
|
|
||||||
|
|
@ -4,8 +4,8 @@
|
||||||
services.nginx.virtualHosts."grafana" = {
|
services.nginx.virtualHosts."grafana" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -31,8 +31,8 @@
|
||||||
services.nginx.virtualHosts."keycloak" = {
|
services.nginx.virtualHosts."keycloak" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -50,8 +50,8 @@
|
||||||
services.nginx.virtualHosts."kibana" = {
|
services.nginx.virtualHosts."kibana" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -68,8 +68,8 @@
|
||||||
services.nginx.virtualHosts."zabbix" = {
|
services.nginx.virtualHosts."zabbix" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -87,8 +87,8 @@
|
||||||
services.nginx.virtualHosts."prox-1" = {
|
services.nginx.virtualHosts."prox-1" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -113,8 +113,8 @@
|
||||||
services.nginx.virtualHosts."prox-2" = {
|
services.nginx.virtualHosts."prox-2" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
@ -139,8 +139,8 @@
|
||||||
services.nginx.virtualHosts."prox-3" = {
|
services.nginx.virtualHosts."prox-3" = {
|
||||||
forceSSL = false;
|
forceSSL = false;
|
||||||
listen = [
|
listen = [
|
||||||
{port = 80; addr = "0.0.0.0"; ssl = false;} # Listen on port 80 for HTTP
|
{port = 80; addr = "100.92.15.128"; ssl = false;} # Listen on port 80 for HTTP
|
||||||
{port = 443; addr = "0.0.0.0"; ssl = true;} # Listen on port 443 for HTTPS
|
{port = 443; addr = "100.92.15.128"; ssl = true;} # Listen on port 443 for HTTPS
|
||||||
];
|
];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
ssl_certificate /run/secrets/cert;
|
ssl_certificate /run/secrets/cert;
|
||||||
|
|
|
||||||
|
|
@ -361,6 +361,7 @@ bind = $mainMod, RETURN, exec, footclient
|
||||||
bind = $mainMod, Q, exec, footclient
|
bind = $mainMod, Q, exec, footclient
|
||||||
# bind = ALT, RETURN, exec, sh -c "/home/delta/.config/hypr/hdrop -g '30' -h '98' -p t -f kitty --class kitty_drop"
|
# bind = ALT, RETURN, exec, sh -c "/home/delta/.config/hypr/hdrop -g '30' -h '98' -p t -f kitty --class kitty_drop"
|
||||||
bind = ALT, RETURN, exec, hyprdrop kitty -i kitty_hyprdrop
|
bind = ALT, RETURN, exec, hyprdrop kitty -i kitty_hyprdrop
|
||||||
|
bind = ALT, RETURN, exec, hyprctl dispatch centerwindow 1
|
||||||
bind = ALT, X, exec, sh -c "/home/delta/.config/hypr/hdrop -g '30' -h '60' -f 'keepassxc_lite' --class org.keepassxc.KeePassXC"
|
bind = ALT, X, exec, sh -c "/home/delta/.config/hypr/hdrop -g '30' -h '60' -f 'keepassxc_lite' --class org.keepassxc.KeePassXC"
|
||||||
# bind = ALT, T, exec, sh -c "QT_QPA_PLATFORM=xcb /home/delta/.config/hypr/hdrop -h '60' -g '30' -f 'telegram-desktop' --class TelegramDesktop"
|
# bind = ALT, T, exec, sh -c "QT_QPA_PLATFORM=xcb /home/delta/.config/hypr/hdrop -h '60' -g '30' -f 'telegram-desktop' --class TelegramDesktop"
|
||||||
#bind = $mainMod SHIFT, RETURN, exec, alacritty #open the terminal
|
#bind = $mainMod SHIFT, RETURN, exec, alacritty #open the terminal
|
||||||
|
|
@ -400,8 +401,8 @@ bind = ALT, SPACE, exec, pypr shift_monitors +1 # K R A S I V O
|
||||||
bind = $mainMod, P, pseudo, # dwindle
|
bind = $mainMod, P, pseudo, # dwindle
|
||||||
#bind = $mainMod, J, togglesplit, # dwindle
|
#bind = $mainMod, J, togglesplit, # dwindle
|
||||||
#bind = $mainMod, S, exec, grim -g "$(slurp)" - | tee >(swappy -f -) | wl-copy # take a screenshot
|
#bind = $mainMod, S, exec, grim -g "$(slurp)" - | tee >(swappy -f -) | wl-copy # take a screenshot
|
||||||
bind = $mainMod, S, exec, grimblast --freeze copy area # take a screenshot
|
bind = $mainMod, S, exec,XCURSOR_SIZE=16 grimblast --freeze copy area # take a screenshot
|
||||||
bind = $mainMod SHIFT, S, exec, grim -g "$(slurp)" - | qrtool decode | tee >(wl-copy) >(notify-send --icon=clipboard "QR Code Content" "$(cat)")
|
bind = $mainMod SHIFT, S, exec,XCURSOR_SIZE=16 sh -c 'grim -g "$(slurp)" - | qrtool decode | tee >(wl-copy) >(notify-send --icon=clipboard "QR Code Content" "$(cat)")'
|
||||||
bind = $mainMod, Print, exec, /home/delta/.config/hypr/grimblast.sh # take a screenshot
|
bind = $mainMod, Print, exec, /home/delta/.config/hypr/grimblast.sh # take a screenshot
|
||||||
# bind = $mainMod, Print, exec, /home/delta/scripts/screenshoter.sh # take a screenshot
|
# bind = $mainMod, Print, exec, /home/delta/scripts/screenshoter.sh # take a screenshot
|
||||||
bind = ,Print , exec, wl-paste | swappy -f - # take a screenshot
|
bind = ,Print , exec, wl-paste | swappy -f - # take a screenshot
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,7 @@
|
||||||
{ pkgs, lib, inputs, ... }:
|
{ pkgs, lib, inputs, ... }:
|
||||||
let
|
let
|
||||||
nixpkgs2305 = import inputs.nixpkgs2305 { system = "${pkgs.system}"; config = { allowUnfree = true; }; };
|
nixpkgs2305 = import inputs.nixpkgs2305 { system = "${pkgs.system}"; config = { allowUnfree = true; }; };
|
||||||
|
|
||||||
socksBuilder = { name, script, autostart ? true, socketConfig ? null }:
|
socksBuilder = { name, script, autostart ? true, socketConfig ? null }:
|
||||||
{
|
{
|
||||||
inherit name;
|
inherit name;
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
* {
|
* {
|
||||||
border: none;
|
border: none;
|
||||||
border-radius: 0;
|
border-radius: 0;
|
||||||
font-family: "IosevkaDiosevka";
|
font-family: "Iosevka Comfy Wide Duo";
|
||||||
font-weight: bold;
|
font-weight: bold;
|
||||||
font-size: 16px;
|
font-size: 16px;
|
||||||
min-height: 0;
|
min-height: 0;
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue