1
1
Fork 1
mirror of https://github.com/oddlama/nix-config.git synced 2025-10-11 07:10:39 +02:00

chore: update persist immich containers, add nix-ld on kroma, disable

STT until jaxlib is fixed
This commit is contained in:
oddlama 2024-07-02 14:49:46 +02:00
parent 09c4531854
commit fe75b5b78c
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
7 changed files with 45 additions and 41 deletions

View file

@ -105,5 +105,6 @@
} }
]; ];
programs.nix-ld.enable = true;
topology.self.icon = "devices.desktop"; topology.self.icon = "devices.desktop";
} }

View file

@ -149,6 +149,13 @@ in {
# Forwarding required to masquerade podman network # Forwarding required to masquerade podman network
boot.kernel.sysctl."net.ipv4.ip_forward" = 1; boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
environment.persistence."/state".directories = [
{
directory = "/var/lib/containers";
mode = "0755";
}
];
# Mirror the original oauth2 secret # Mirror the original oauth2 secret
age.secrets.immich-oauth2-client-secret = { age.secrets.immich-oauth2-client-secret = {
inherit (nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-immich) rekeyFile; inherit (nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-immich) rekeyFile;

View file

@ -112,7 +112,6 @@
}; };
dhcpPrefixDelegationConfig.UplinkInterface = "wan"; dhcpPrefixDelegationConfig.UplinkInterface = "wan";
dhcpPrefixDelegationConfig.Token = "::ff"; dhcpPrefixDelegationConfig.Token = "::ff";
ipv6SendRAConfig.Managed = true;
# Announce a static prefix # Announce a static prefix
ipv6Prefixes = [ ipv6Prefixes = [
{Prefix = globals.net.home-lan.cidrv6;} {Prefix = globals.net.home-lan.cidrv6;}
@ -122,10 +121,12 @@
SubnetId = "22"; SubnetId = "22";
}; };
# Provide a DNS resolver # Provide a DNS resolver
ipv6SendRAConfig = { # ipv6SendRAConfig = {
EmitDNS = true; # Managed = true;
DNS = globals.net.home-lan.hosts.ward-adguardhome.ipv6; # EmitDNS = true;
}; # FIXME: this is not the true ipv6 of adguardhome DNS = globals.net.home-lan.hosts.ward-adguardhome.ipv6;
# FIXME: todo assign static additional to reservation in kea
# };
linkConfig.RequiredForOnline = "routable"; linkConfig.RequiredForOnline = "routable";
}; };
# Remaining macvtap interfaces should not be touched. # Remaining macvtap interfaces should not be touched.

BIN
pkgs/TransferOrb.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

View file

@ -17,11 +17,6 @@
Categories=Game Categories=Game
''; '';
file = "Awakened-PoE-Trade-${version}.AppImage"; file = "Awakened-PoE-Trade-${version}.AppImage";
icon = pkgs.fetchurl {
url = "https://web.poecdn.com/image/Art/2DItems/Currency/TransferOrb.png";
hash = "sha256-K6cG5ybC3uIveu/4JIcc5mGQFgDlQSw8L9aSzbkLe1w=";
};
in in
pkgs.appimageTools.wrapType2 { pkgs.appimageTools.wrapType2 {
name = "awakened-poe-trade"; name = "awakened-poe-trade";
@ -32,7 +27,7 @@ in
extraInstallCommands = '' extraInstallCommands = ''
mkdir -p $out/share/applications mkdir -p $out/share/applications
cp ${icon} $out/share/applications/awakened-poe-trade.png cp ${./TransferOrb.png} $out/share/applications/awakened-poe-trade.png
cp ${desktopEntry} $out/share/applications/${name}.desktop cp ${desktopEntry} $out/share/applications/${name}.desktop
substituteInPlace $out/share/applications/awakened-poe-trade.desktop --replace /share/ $out/share/ substituteInPlace $out/share/applications/awakened-poe-trade.desktop --replace /share/ $out/share/
''; '';

View file

@ -18,7 +18,7 @@
"tray" "tray"
"hyprland/submap" "hyprland/submap"
"privacy" "privacy"
"custom/whisper_overlay" #"custom/whisper_overlay"
]; ];
modules-center = [ modules-center = [
"hyprland/window" "hyprland/window"
@ -90,34 +90,34 @@
escape = true; escape = true;
}; };
"custom/whisper_overlay" = { #"custom/whisper_overlay" = {
tooltip = true; # tooltip = true;
format = "{icon}"; # format = "{icon}";
format-icons = { # format-icons = {
disconnected = "<span foreground='gray'></span>"; # disconnected = "<span foreground='gray'></span>";
connected = "<span foreground='#4ab0fa'></span>"; # connected = "<span foreground='#4ab0fa'></span>";
connected-active = "<span foreground='red'></span>"; # connected-active = "<span foreground='red'></span>";
}; # };
return-type = "json"; # return-type = "json";
exec = "${lib.getExe pkgs.whisper-overlay} waybar-status"; # exec = "${lib.getExe pkgs.whisper-overlay} waybar-status";
on-click-right = lib.getExe (pkgs.writeShellApplication { # on-click-right = lib.getExe (pkgs.writeShellApplication {
name = "toggle-realtime-stt-server"; # name = "toggle-realtime-stt-server";
runtimeInputs = [ # runtimeInputs = [
pkgs.systemd # pkgs.systemd
pkgs.libnotify # pkgs.libnotify
]; # ];
text = '' # text = ''
if systemctl --user is-active --quiet realtime-stt-server; then # if systemctl --user is-active --quiet realtime-stt-server; then
systemctl --user stop realtime-stt-server.service # systemctl --user stop realtime-stt-server.service
notify-send "Stopped realtime-stt-server" " Stopped" --transient || true # notify-send "Stopped realtime-stt-server" "⛔ Stopped" --transient || true
else # else
systemctl --user start realtime-stt-server.service # systemctl --user start realtime-stt-server.service
notify-send "Started realtime-stt-server" " Started" --transient || true # notify-send "Started realtime-stt-server" "✅ Started" --transient || true
fi # fi
''; # '';
}); # });
escape = true; # escape = true;
}; #};
privacy = { privacy = {
icon-spacing = 4; icon-spacing = 4;

View file

@ -3,5 +3,5 @@
".local/state/realtime-stt-server" ".local/state/realtime-stt-server"
]; ];
services.realtime-stt-server.enable = true; #services.realtime-stt-server.enable = true;
} }