this repo has no description
2
fork

Configure Feed

Select the types of activity you want to include in your feed.

idk a bunch more updates

+182 -34
+6 -6
flake.lock
··· 695 695 ] 696 696 }, 697 697 "locked": { 698 - "lastModified": 1757230583, 699 - "narHash": "sha256-4uqu7sFPOaVTCogsxaGMgbzZ2vK40GVGMfUmrvK3/LY=", 698 + "lastModified": 1762951919, 699 + "narHash": "sha256-ma/xMEGf4J6n/RdZFdxXBJUQhP53HVEPQOC6Dp2TrkQ=", 700 700 "owner": "Jovian-Experiments", 701 701 "repo": "Jovian-NixOS", 702 - "rev": "fc3960e6c32c9d4f95fff2ef84444284d24d3bea", 702 + "rev": "3d248f6e8f877218dd2573fef8925ac997889922", 703 703 "type": "github" 704 704 }, 705 705 "original": { ··· 1351 1351 }, 1352 1352 "unstable": { 1353 1353 "locked": { 1354 - "lastModified": 1758690382, 1355 - "narHash": "sha256-NY3kSorgqE5LMm1LqNwGne3ZLMF2/ILgLpFr1fS4X3o=", 1354 + "lastModified": 1762844143, 1355 + "narHash": "sha256-SlybxLZ1/e4T2lb1czEtWVzDCVSTvk9WLwGhmxFmBxI=", 1356 1356 "owner": "nixos", 1357 1357 "repo": "nixpkgs", 1358 - "rev": "e643668fd71b949c53f8626614b21ff71a07379d", 1358 + "rev": "9da7f1cf7f8a6e2a7cb3001b048546c92a8258b4", 1359 1359 "type": "github" 1360 1360 }, 1361 1361 "original": {
+22 -19
flake.nix
··· 205 205 "steam" 206 206 "steam-original" 207 207 "steam-runtime" 208 + "steamdeck-hw-theme" 209 + "steam-jupiter-unwrapped" 208 210 ]; 209 211 }; 210 212 overlays = [ ··· 325 327 ]; 326 328 }; 327 329 328 - deck = unstable.lib.nixosSystem rec { 329 - specialArgs = { inherit inputs self; }; 330 - system = "x86_64-linux"; 331 - pkgs = deckPkgsFor.${system}; 332 - modules = [ 333 - ./hosts/deck 334 - jovian.nixosModules.default 335 - self.nixosModules.wireguard 336 - agenix.nixosModules.age 337 - self.nixosModules.backup 338 - home-manager.nixosModules.home-manager 339 - { 340 - nix.registry.nixpkgs.flake = unstable; 341 - home-manager.useGlobalPkgs = true; 342 - home-manager.useUserPackages = true; 343 - home-manager.users.anish = import ./home/gui; 344 - } 345 - ]; 346 - }; 330 + # new version of unstable has many changes I couldn't be bothered to deal with rn 331 + #deck = unstable.lib.nixosSystem rec { 332 + # specialArgs = { inherit inputs self; }; 333 + # system = "x86_64-linux"; 334 + # pkgs = deckPkgsFor.${system}; 335 + # modules = [ 336 + # ./hosts/deck 337 + # jovian.nixosModules.default 338 + # self.nixosModules.wireguard 339 + # agenix.nixosModules.age 340 + # self.nixosModules.backup 341 + # home-manager.nixosModules.home-manager 342 + # { 343 + # nix.registry.nixpkgs.flake = unstable; 344 + # home-manager.useGlobalPkgs = true; 345 + # home-manager.useUserPackages = true; 346 + # home-manager.users.anish = import ./home/gui; 347 + # } 348 + # ]; 349 + #}; 347 350 }; 348 351 349 352 # Darwin configuration entrypoint
+2 -1
home/profiles/cli/default.nix
··· 31 31 bat 32 32 fd 33 33 ncdu 34 - du-dust 34 + dust 35 35 # dia-cli 36 36 duf 37 37 trash-cli ··· 63 63 taskwarrior-tui 64 64 # vimwiki-cli 65 65 zk 66 + unstable.opencode 66 67 67 68 (pkgs.writeScriptBin "jq-repl" '' 68 69 #!/usr/bin/env bash
+9 -2
home/profiles/nvim/default.nix
··· 1 - { pkgs, ... }: 1 + { pkgs, config, ... }: 2 2 let 3 3 customPlugins = { 4 4 vim-zettel = pkgs.vimUtils.buildVimPlugin { ··· 138 138 " match with %link 139 139 syntax match VimwikiPlaceholder /^\s*%link\ze\%(\s.*\)\?$/ nextgroup=VimwikiPlaceholderParam skipwhite 140 140 ''; 141 + 142 + # Private mode plugin for concealing buffer content (out of store symlink for live editing) 143 + home.file.".config/nvim/lua/private-mode.lua".source = config.lib.file.mkOutOfStoreSymlink "${toString ./.}/private-mode.lua"; 141 144 142 145 #environment.systemPackages = with customPlugins; [ tidal ]; 143 146 programs.neovim = { ··· 481 484 local line, col = unpack(vim.api.nvim_win_get_cursor(0)) 482 485 return col ~= 0 and vim.api.nvim_buf_get_lines(0, line - 1, line, true)[1]:sub(col, col):match("%s") == nil 483 486 end 487 + 488 + -- private mode 489 + -- Setup private mode 490 + require('private-mode').setup({ keymap = '<leader>pm' }) 484 491 485 492 local luasnip = require("luasnip") 486 493 local lspkind = require("lspkind") ··· 1206 1213 owner = "sourcegraph"; 1207 1214 repo = "amp.nvim"; 1208 1215 rev = "main"; 1209 - sha256 = "1n6d8nbakyg6yiq8mhhrvmsp9z0zb8cb67820jsg3wl6vqd1vwv5"; 1216 + sha256 = "sha256-+jIbAZjRpt30gcrIiwW+yZhT9CFLnW9ARf92GEfioZ0="; 1210 1217 }; 1211 1218 }) 1212 1219 ];
+95
home/profiles/nvim/private-mode.lua
··· 1 + local M = {} 2 + 3 + local ns_id = vim.api.nvim_create_namespace('private_mode') 4 + local enabled = false 5 + local concealed_char = '•' -- Character to show instead of text 6 + 7 + local function conceal_buffer() 8 + local buf = vim.api.nvim_get_current_buf() 9 + local line_count = vim.api.nvim_buf_line_count(buf) 10 + 11 + vim.api.nvim_buf_clear_namespace(buf, ns_id, 0, -1) 12 + 13 + for i = 0, line_count - 1 do 14 + local line = vim.api.nvim_buf_get_lines(buf, i, i + 1, false)[1] 15 + if line and #line > 0 then 16 + -- Conceal each character individually 17 + for col = 0, #line - 1 do 18 + vim.api.nvim_buf_set_extmark(buf, ns_id, i, col, { 19 + end_col = col + 1, 20 + conceal = concealed_char, 21 + }) 22 + end 23 + end 24 + end 25 + end 26 + 27 + local function reveal_current_line() 28 + local buf = vim.api.nvim_get_current_buf() 29 + local cursor = vim.api.nvim_win_get_cursor(0) 30 + local current_line = cursor[1] - 1 31 + 32 + -- Clear concealment for current line only 33 + vim.api.nvim_buf_clear_namespace(buf, ns_id, current_line, current_line + 1) 34 + end 35 + 36 + local function update_display() 37 + if not enabled then return end 38 + 39 + conceal_buffer() 40 + local mode = vim.fn.mode() 41 + 42 + -- Reveal current line in insert mode 43 + if mode == 'i' or mode == 'R' then 44 + reveal_current_line() 45 + end 46 + end 47 + 48 + function M.toggle() 49 + enabled = not enabled 50 + 51 + if enabled then 52 + -- Set concealment options 53 + vim.opt_local.conceallevel = 2 54 + vim.opt_local.concealcursor = 'nvc' 55 + 56 + -- Initial concealment 57 + update_display() 58 + 59 + -- Set up autocommands 60 + local group = vim.api.nvim_create_augroup('PrivateMode', { clear = true }) 61 + 62 + vim.api.nvim_create_autocmd({'ModeChanged', 'CursorMoved', 'CursorMovedI', 'TextChanged', 'TextChangedI'}, { 63 + group = group, 64 + callback = update_display, 65 + }) 66 + 67 + print("Private mode enabled") 68 + else 69 + -- Clear all concealment 70 + local buf = vim.api.nvim_get_current_buf() 71 + vim.api.nvim_buf_clear_namespace(buf, ns_id, 0, -1) 72 + 73 + -- Clear autocommands 74 + vim.api.nvim_create_augroup('PrivateMode', { clear = true }) 75 + 76 + print("Private mode disabled") 77 + end 78 + end 79 + 80 + function M.setup(opts) 81 + opts = opts or {} 82 + concealed_char = opts.conceal_char or '•' 83 + 84 + -- Create user command 85 + vim.api.nvim_create_user_command('PrivateMode', function() 86 + M.toggle() 87 + end, {}) 88 + 89 + -- Optional: Set up a keybinding 90 + if opts.keymap then 91 + vim.keymap.set('n', opts.keymap, M.toggle, { desc = 'Toggle private mode' }) 92 + end 93 + end 94 + 95 + return M
+9
hosts/box/default.nix
··· 57 57 # seafile 58 58 }; 59 59 60 + # for vibe code stuff, over wireguard 61 + networking.firewall = { 62 + allowedTCPPorts = [ 22 3000 4173 ]; # allow ssh, vibe, and vibekanban 63 + allowedTCPPortRanges = [{ 64 + from = 6666; 65 + to = 7666; 66 + }]; 67 + }; 68 + 60 69 environment.systemPackages = with pkgs; [ lm_sensors ]; 61 70 hardware.fancontrol = { 62 71 enable = false;
+2 -3
hosts/deck/default.nix
··· 8 8 # ../profiles/music 9 9 ../profiles/sync/cal 10 10 ../profiles/wifi 11 - ../profiles/desktop 11 + # ../profiles/desktop # Disabled: conflicts with jovian desktop manager 12 12 ../profiles/mimetypes 13 13 ../profiles/syncthing 14 14 ../profiles/mossnet-hosts ··· 35 35 jovian.devices.steamdeck.enable = true; 36 36 jovian.steam.user = "anish"; 37 37 jovian.steam.autoStart = true; 38 - jovian.steam.desktopSession = "gnome"; 39 - # jovian.steam.desktopSession = "none+bspwm"; 38 + jovian.steam.desktopSession = "gamescope-wayland"; 40 39 41 40 # Install XR drivers 42 41 # environment.systemPackages = with pkgs; [
-2
hosts/profiles/desktop/default.nix
··· 57 57 }; 58 58 59 59 environment.systemPackages = with pkgs; [ 60 - #unstable.sublime-music 61 60 # olm-3.2.16 is now insecure 62 61 # some reason I can't set insecure packages that will be respected 63 62 nheko ··· 67 66 unstable.liferea 68 67 unstable.gh 69 68 unstable.flyctl 70 - unstable.sublime-music 71 69 72 70 kooha 73 71 light
+1
hosts/profiles/immich/default.nix
··· 2 2 { 3 3 services.immich = { 4 4 enable = true; 5 + package = pkgs.unstable.immich; 5 6 database = { 6 7 enable = true; 7 8 };
+1 -1
hosts/profiles/nfs/default.nix
··· 14 14 exports = '' 15 15 /home/ftp 192.168.1.0/24(rw) 16 16 /mnt/one 192.168.1.0/24(rw) 17 - /mnt/two 192.168.1.0/24(rw,no_subtree_check) 10.0.69.0/24(rw,no_subtree_check) 17 + /mnt/two 192.168.1.0/24(rw,async,no_subtree_check) 10.0.69.0/24(rw,async,no_subtree_check) 18 18 /mnt/three 192.168.1.0/24(rw) 19 19 ''; 20 20 };
+35
modules/nixos/wireguard.nix
··· 50 50 ]; 51 51 }; 52 52 }; 53 + 54 + # Ensure WireGuard restarts on failure 55 + systemd.services.wireguard-wg0 = { 56 + serviceConfig = { 57 + Restart = "on-failure"; 58 + RestartSec = "5s"; 59 + }; 60 + }; 61 + 62 + # Periodic connection health check and reconnect 63 + systemd.services.wireguard-wg0-healthcheck = { 64 + description = "WireGuard wg0 connection health check"; 65 + after = [ "network-online.target" "wireguard-wg0.service" ]; 66 + wants = [ "network-online.target" ]; 67 + serviceConfig = { 68 + Type = "oneshot"; 69 + ExecStart = pkgs.writeShellScript "wg0-healthcheck" '' 70 + # Check if we can ping the WireGuard gateway 71 + if ! ${pkgs.iputils}/bin/ping -c 1 -W 5 10.0.69.1 &>/dev/null; then 72 + echo "WireGuard connection down, restarting..." 73 + ${pkgs.systemd}/bin/systemctl restart wireguard-wg0.service 74 + fi 75 + ''; 76 + }; 77 + }; 78 + 79 + systemd.timers.wireguard-wg0-healthcheck = { 80 + description = "Timer for WireGuard wg0 health check"; 81 + wantedBy = [ "timers.target" ]; 82 + timerConfig = { 83 + OnBootSec = "2min"; 84 + OnUnitActiveSec = "2min"; 85 + Unit = "wireguard-wg0-healthcheck.service"; 86 + }; 87 + }; 53 88 }; 54 89 }