mirror of
https://github.com/oddlama/nix-config.git
synced 2025-10-11 07:10:39 +02:00
chore: update persist immich containers, add nix-ld on kroma, disable
STT until jaxlib is fixed
This commit is contained in:
parent
09c4531854
commit
fe75b5b78c
7 changed files with 45 additions and 41 deletions
|
@ -105,5 +105,6 @@
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
|
programs.nix-ld.enable = true;
|
||||||
topology.self.icon = "devices.desktop";
|
topology.self.icon = "devices.desktop";
|
||||||
}
|
}
|
||||||
|
|
|
@ -149,6 +149,13 @@ in {
|
||||||
# Forwarding required to masquerade podman network
|
# Forwarding required to masquerade podman network
|
||||||
boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
|
boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
|
||||||
|
|
||||||
|
environment.persistence."/state".directories = [
|
||||||
|
{
|
||||||
|
directory = "/var/lib/containers";
|
||||||
|
mode = "0755";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
# Mirror the original oauth2 secret
|
# Mirror the original oauth2 secret
|
||||||
age.secrets.immich-oauth2-client-secret = {
|
age.secrets.immich-oauth2-client-secret = {
|
||||||
inherit (nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-immich) rekeyFile;
|
inherit (nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-immich) rekeyFile;
|
||||||
|
|
|
@ -112,7 +112,6 @@
|
||||||
};
|
};
|
||||||
dhcpPrefixDelegationConfig.UplinkInterface = "wan";
|
dhcpPrefixDelegationConfig.UplinkInterface = "wan";
|
||||||
dhcpPrefixDelegationConfig.Token = "::ff";
|
dhcpPrefixDelegationConfig.Token = "::ff";
|
||||||
ipv6SendRAConfig.Managed = true;
|
|
||||||
# Announce a static prefix
|
# Announce a static prefix
|
||||||
ipv6Prefixes = [
|
ipv6Prefixes = [
|
||||||
{Prefix = globals.net.home-lan.cidrv6;}
|
{Prefix = globals.net.home-lan.cidrv6;}
|
||||||
|
@ -122,10 +121,12 @@
|
||||||
SubnetId = "22";
|
SubnetId = "22";
|
||||||
};
|
};
|
||||||
# Provide a DNS resolver
|
# Provide a DNS resolver
|
||||||
ipv6SendRAConfig = {
|
# ipv6SendRAConfig = {
|
||||||
EmitDNS = true;
|
# Managed = true;
|
||||||
DNS = globals.net.home-lan.hosts.ward-adguardhome.ipv6;
|
# EmitDNS = true;
|
||||||
};
|
# FIXME: this is not the true ipv6 of adguardhome DNS = globals.net.home-lan.hosts.ward-adguardhome.ipv6;
|
||||||
|
# FIXME: todo assign static additional to reservation in kea
|
||||||
|
# };
|
||||||
linkConfig.RequiredForOnline = "routable";
|
linkConfig.RequiredForOnline = "routable";
|
||||||
};
|
};
|
||||||
# Remaining macvtap interfaces should not be touched.
|
# Remaining macvtap interfaces should not be touched.
|
||||||
|
|
BIN
pkgs/TransferOrb.png
Normal file
BIN
pkgs/TransferOrb.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 13 KiB |
|
@ -17,11 +17,6 @@
|
||||||
Categories=Game
|
Categories=Game
|
||||||
'';
|
'';
|
||||||
file = "Awakened-PoE-Trade-${version}.AppImage";
|
file = "Awakened-PoE-Trade-${version}.AppImage";
|
||||||
|
|
||||||
icon = pkgs.fetchurl {
|
|
||||||
url = "https://web.poecdn.com/image/Art/2DItems/Currency/TransferOrb.png";
|
|
||||||
hash = "sha256-K6cG5ybC3uIveu/4JIcc5mGQFgDlQSw8L9aSzbkLe1w=";
|
|
||||||
};
|
|
||||||
in
|
in
|
||||||
pkgs.appimageTools.wrapType2 {
|
pkgs.appimageTools.wrapType2 {
|
||||||
name = "awakened-poe-trade";
|
name = "awakened-poe-trade";
|
||||||
|
@ -32,7 +27,7 @@ in
|
||||||
|
|
||||||
extraInstallCommands = ''
|
extraInstallCommands = ''
|
||||||
mkdir -p $out/share/applications
|
mkdir -p $out/share/applications
|
||||||
cp ${icon} $out/share/applications/awakened-poe-trade.png
|
cp ${./TransferOrb.png} $out/share/applications/awakened-poe-trade.png
|
||||||
cp ${desktopEntry} $out/share/applications/${name}.desktop
|
cp ${desktopEntry} $out/share/applications/${name}.desktop
|
||||||
substituteInPlace $out/share/applications/awakened-poe-trade.desktop --replace /share/ $out/share/
|
substituteInPlace $out/share/applications/awakened-poe-trade.desktop --replace /share/ $out/share/
|
||||||
'';
|
'';
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
"tray"
|
"tray"
|
||||||
"hyprland/submap"
|
"hyprland/submap"
|
||||||
"privacy"
|
"privacy"
|
||||||
"custom/whisper_overlay"
|
#"custom/whisper_overlay"
|
||||||
];
|
];
|
||||||
modules-center = [
|
modules-center = [
|
||||||
"hyprland/window"
|
"hyprland/window"
|
||||||
|
@ -90,34 +90,34 @@
|
||||||
escape = true;
|
escape = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
"custom/whisper_overlay" = {
|
#"custom/whisper_overlay" = {
|
||||||
tooltip = true;
|
# tooltip = true;
|
||||||
format = "{icon}";
|
# format = "{icon}";
|
||||||
format-icons = {
|
# format-icons = {
|
||||||
disconnected = "<span foreground='gray'></span>";
|
# disconnected = "<span foreground='gray'></span>";
|
||||||
connected = "<span foreground='#4ab0fa'></span>";
|
# connected = "<span foreground='#4ab0fa'></span>";
|
||||||
connected-active = "<span foreground='red'></span>";
|
# connected-active = "<span foreground='red'></span>";
|
||||||
};
|
# };
|
||||||
return-type = "json";
|
# return-type = "json";
|
||||||
exec = "${lib.getExe pkgs.whisper-overlay} waybar-status";
|
# exec = "${lib.getExe pkgs.whisper-overlay} waybar-status";
|
||||||
on-click-right = lib.getExe (pkgs.writeShellApplication {
|
# on-click-right = lib.getExe (pkgs.writeShellApplication {
|
||||||
name = "toggle-realtime-stt-server";
|
# name = "toggle-realtime-stt-server";
|
||||||
runtimeInputs = [
|
# runtimeInputs = [
|
||||||
pkgs.systemd
|
# pkgs.systemd
|
||||||
pkgs.libnotify
|
# pkgs.libnotify
|
||||||
];
|
# ];
|
||||||
text = ''
|
# text = ''
|
||||||
if systemctl --user is-active --quiet realtime-stt-server; then
|
# if systemctl --user is-active --quiet realtime-stt-server; then
|
||||||
systemctl --user stop realtime-stt-server.service
|
# systemctl --user stop realtime-stt-server.service
|
||||||
notify-send "Stopped realtime-stt-server" "⛔ Stopped" --transient || true
|
# notify-send "Stopped realtime-stt-server" "⛔ Stopped" --transient || true
|
||||||
else
|
# else
|
||||||
systemctl --user start realtime-stt-server.service
|
# systemctl --user start realtime-stt-server.service
|
||||||
notify-send "Started realtime-stt-server" "✅ Started" --transient || true
|
# notify-send "Started realtime-stt-server" "✅ Started" --transient || true
|
||||||
fi
|
# fi
|
||||||
'';
|
# '';
|
||||||
});
|
# });
|
||||||
escape = true;
|
# escape = true;
|
||||||
};
|
#};
|
||||||
|
|
||||||
privacy = {
|
privacy = {
|
||||||
icon-spacing = 4;
|
icon-spacing = 4;
|
||||||
|
|
|
@ -3,5 +3,5 @@
|
||||||
".local/state/realtime-stt-server"
|
".local/state/realtime-stt-server"
|
||||||
];
|
];
|
||||||
|
|
||||||
services.realtime-stt-server.enable = true;
|
#services.realtime-stt-server.enable = true;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue