flake-parts: rename lib' to conf

Signed-off-by: Amneesh Singh <natto@weirdnatto.in>
This commit is contained in:
2024-05-27 20:07:28 +05:30
parent 29acfc513e
commit c1c4714fa2
20 changed files with 40 additions and 40 deletions

View File

@@ -4,7 +4,7 @@
_module.args = { _module.args = {
inherit inputs self; inherit inputs self;
flake = self; flake = self;
lib' = { conf = {
colors = import ./colors.nix; colors = import ./colors.nix;
network = import ./network.nix; network = import ./network.nix;
}; };

View File

@@ -51,7 +51,7 @@
./hosts ./hosts
./home ./home
./pkgs ./pkgs
./lib ./conf
]; ];
perSystem = { system, pkgs, ... }: perSystem = { system, pkgs, ... }:

View File

@@ -1,10 +1,10 @@
{ config, lib', ... }: { config, conf, ... }:
{ {
services = { services = {
dunst = { dunst = {
enable = true; enable = true;
iconTheme = with config.gtk.iconTheme; { inherit name package; }; iconTheme = with config.gtk.iconTheme; { inherit name package; };
settings = with lib'.colors.hex; { settings = with conf.colors.hex; {
global = { global = {
mouse_left_click = "close_current"; mouse_left_click = "close_current";
mouse_right_click = "do_action"; mouse_right_click = "do_action";

View File

@@ -1,4 +1,4 @@
{ pkgs, config, lib', ... }: { pkgs, config, conf, ... }:
{ {
programs = { programs = {
firefox = { firefox = {
@@ -34,7 +34,7 @@
font-bold = "Fira Mono:style=Bold:pixelsize=18"; font-bold = "Fira Mono:style=Bold:pixelsize=18";
}; };
scrollback.lines = 4000; scrollback.lines = 4000;
colors = with lib'.colors.default; { colors = with conf.colors.default; {
inherit foreground background; inherit foreground background;
regular0 = surface1; regular0 = surface1;
regular1 = red; regular1 = red;

View File

@@ -1,4 +1,4 @@
{ pkgs, config, lib', inputs, ... }: { pkgs, config, conf, inputs, ... }:
{ {
wayland = { wayland = {
windowManager = { windowManager = {
@@ -14,7 +14,7 @@
+ (with config.home.pointerCursor; '' + (with config.home.pointerCursor; ''
exec-once=hyprctl setcursor ${name} ${toString size} exec-once=hyprctl setcursor ${name} ${toString size}
'') '')
+ (with lib'.colors.argb { a = "ee"; };'' + (with conf.colors.argb { a = "ee"; };''
general { general {
col.active_border = 0x${mauve} 0x${flamingo} 135deg col.active_border = 0x${mauve} 0x${flamingo} 135deg
col.inactive_border = 0x${surface0} col.inactive_border = 0x${surface0}
@@ -25,7 +25,7 @@
}; };
home.file.tofi = { home.file.tofi = {
source = pkgs.writeText "tofi-config" (pkgs.lib.generators.toKeyValue { } (with lib'.colors.default; { source = pkgs.writeText "tofi-config" (pkgs.lib.generators.toKeyValue { } (with conf.colors.default; {
# https://github.com/philj56/tofi/blob/master/themes/fullscreen # https://github.com/philj56/tofi/blob/master/themes/fullscreen
width = "100%"; width = "100%";
height = "100%"; height = "100%";

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
imports = [ imports = [
./networking.nix ./networking.nix
@@ -14,7 +14,7 @@
shell = pkgs.zsh; shell = pkgs.zsh;
home = "/home/spin"; home = "/home/spin";
extraGroups = [ "wheel" ]; extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = lib'.network.commonSSHKeys; openssh.authorizedKeys.keys = conf.network.commonSSHKeys;
}; };
programs.zsh.enable = true; programs.zsh.enable = true;

View File

@@ -1,4 +1,4 @@
{ lib, config, lib', pkgs, ... }: { lib, config, conf, pkgs, ... }:
{ {
networking = { networking = {
useDHCP = false; useDHCP = false;
@@ -17,7 +17,7 @@
}; };
}; };
wireguard.interfaces.wg0 = with lib'.network.addresses.wireguard.ips; { wireguard.interfaces.wg0 = with conf.network.addresses.wireguard.ips; {
ips = [ hina ]; ips = [ hina ];
listenPort = 17840; listenPort = 17840;
privateKeyFile = "/var/secrets/wg.key"; privateKeyFile = "/var/secrets/wg.key";
@@ -26,7 +26,7 @@
#Oracle VM1 #Oracle VM1
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM="; publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
allowedIPs = [ remilia ]; allowedIPs = [ remilia ];
endpoint = "${lib'.network.addresses.domain.natto}:17840"; endpoint = "${conf.network.addresses.domain.natto}:17840";
persistentKeepalive = 25; persistentKeepalive = 25;
} }
]; ];

View File

@@ -1,6 +1,6 @@
{ config, pkgs, lib, lib', ... }: { config, pkgs, lib, conf, ... }:
let let
domain = lib'.network.addresses.domain.natto; domain = conf.network.addresses.domain.natto;
in in
{ {
services = { services = {
@@ -20,7 +20,7 @@ in
nginx = { nginx = {
enable = true; enable = true;
virtualHosts = with lib'.network.addresses.wireguard.ips; { virtualHosts = with conf.network.addresses.wireguard.ips; {
"znc.${domain}" = { "znc.${domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
imports = [ imports = [
./networking.nix ./networking.nix
@@ -12,7 +12,7 @@
shell = pkgs.zsh; shell = pkgs.zsh;
home = "/home/spark"; home = "/home/spark";
extraGroups = [ "wheel" ]; extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = lib'.network.commonSSHKeys; openssh.authorizedKeys.keys = conf.network.commonSSHKeys;
}; };
programs.zsh.enable = true; programs.zsh.enable = true;

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
networking = { networking = {
hostName = "marisa"; hostName = "marisa";
@@ -37,7 +37,7 @@
}]; }];
}; };
}; };
wireguard.interfaces.wg0 = with lib'.network.addresses.wireguard.ips; { wireguard.interfaces.wg0 = with conf.network.addresses.wireguard.ips; {
ips = [ marisa ]; ips = [ marisa ];
listenPort = 17840; listenPort = 17840;
privateKeyFile = "/var/secrets/wg.key"; privateKeyFile = "/var/secrets/wg.key";
@@ -46,7 +46,7 @@
#Oracle VM1 #Oracle VM1
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM="; publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
allowedIPs = [ remilia ]; allowedIPs = [ remilia ];
endpoint = "${lib'.network.addresses.domain.natto}:17840"; endpoint = "${conf.network.addresses.domain.natto}:17840";
persistentKeepalive = 25; persistentKeepalive = 25;
} }
]; ];

View File

@@ -1,4 +1,4 @@
{ config, pkgs, inputs, lib', ... }: { config, pkgs, inputs, conf, ... }:
{ {
systemd.services.filehost = { systemd.services.filehost = {
enable = true; enable = true;
@@ -7,7 +7,7 @@
Type = "simple"; Type = "simple";
Environment = [ Environment = [
"TITLE=nattofiles" "TITLE=nattofiles"
"USER_URL=https://f.${lib'.network.addresses.domain.natto}" "USER_URL=https://f.${conf.network.addresses.domain.natto}"
"ROCKET_LIMITS={file=\"512MB\",data-form=\"512MB\"}" "ROCKET_LIMITS={file=\"512MB\",data-form=\"512MB\"}"
"ROCKET_LOG_LEVEL=debug" "ROCKET_LOG_LEVEL=debug"
"ROCKET_ADDRESS=0.0.0.0" "ROCKET_ADDRESS=0.0.0.0"

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
services = { services = {
gitea = rec { gitea = rec {
@@ -13,7 +13,7 @@
mailerPasswordFile = "/var/secrets/giteamailer.pass"; mailerPasswordFile = "/var/secrets/giteamailer.pass";
settings = settings =
let let
domain = lib'.network.addresses.domain.natto; domain = conf.network.addresses.domain.natto;
in in
{ {
server = rec { server = rec {

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', lib, ... }: { config, pkgs, conf, lib, ... }:
{ {
networking = { networking = {

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
imports = [ imports = [
./networking.nix ./networking.nix
@@ -15,7 +15,7 @@
shell = pkgs.zsh; shell = pkgs.zsh;
home = "/home/bat"; home = "/home/bat";
extraGroups = [ "wheel" ]; extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = lib'.network.commonSSHKeys; openssh.authorizedKeys.keys = conf.network.commonSSHKeys;
}; };
programs.zsh.enable = true; programs.zsh.enable = true;

View File

@@ -1,7 +1,7 @@
{ config, pkgs, lib', network, ... }: { config, pkgs, conf, network, ... }:
{ {
mailserver = mailserver =
let domain = lib'.network.addresses.domain.natto; in let domain = conf.network.addresses.domain.natto; in
rec { rec {
enable = true; enable = true;
fqdn = "mail.${domain}"; fqdn = "mail.${domain}";

View File

@@ -1,4 +1,4 @@
{ lib, config, lib', pkgs, ... }: { lib, config, conf, pkgs, ... }:
{ {
networking = { networking = {
useDHCP = false; useDHCP = false;
@@ -27,7 +27,7 @@
useDHCP = true; useDHCP = true;
}; };
}; };
nat = with lib'.network.addresses.wireguard.ips; { nat = with conf.network.addresses.wireguard.ips; {
enable = true; enable = true;
externalInterface = "ens3"; externalInterface = "ens3";
internalInterfaces = [ "wg0" ]; internalInterfaces = [ "wg0" ];
@@ -46,7 +46,7 @@
} }
]; ];
}; };
wireguard.interfaces = with lib'.network.addresses.wireguard; { wireguard.interfaces = with conf.network.addresses.wireguard; {
wg0 = { wg0 = {
ips = [ ips.remilia ]; ips = [ ips.remilia ];
listenPort = 17840; listenPort = 17840;

View File

@@ -1,6 +1,6 @@
{ config, pkgs, lib, lib', ... }: { config, pkgs, lib, conf, ... }:
let let
domain = lib'.network.addresses.domain.natto; domain = conf.network.addresses.domain.natto;
in in
{ {
services = { services = {
@@ -37,7 +37,7 @@ in
}; };
}; };
in in
with lib'.network.addresses.wireguard.ips; { with conf.network.addresses.wireguard.ips; {
"${domain}" = { "${domain}" = {
addSSL = true; addSSL = true;
enableACME = true; enableACME = true;

View File

@@ -1,4 +1,4 @@
{ config, pkgs, lib', ... }: { config, pkgs, conf, ... }:
{ {
networking = { networking = {
@@ -15,7 +15,7 @@
trustedInterfaces = [ "docker0" ]; trustedInterfaces = [ "docker0" ];
}; };
wireguard.interfaces.wg0 = with lib'.network.addresses.wireguard.ips; { wireguard.interfaces.wg0 = with conf.network.addresses.wireguard.ips; {
ips = [ satori ]; ips = [ satori ];
listenPort = 17840; listenPort = 17840;
privateKeyFile = "/var/secrets/wg.key"; privateKeyFile = "/var/secrets/wg.key";
@@ -23,7 +23,7 @@
#Oracle VM1 #Oracle VM1
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM="; publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
allowedIPs = [ remilia ]; allowedIPs = [ remilia ];
endpoint = "${lib'.network.addresses.domain.natto}:17840"; endpoint = "${conf.network.addresses.domain.natto}:17840";
persistentKeepalive = 25; persistentKeepalive = 25;
}]; }];
}; };