code: nixpkgs-fmt to format code
This commit is contained in:
parent
8ecb892244
commit
04ad6ac1cd
|
@ -14,7 +14,7 @@ let
|
||||||
value = let host = builtins.elemAt hosts i; in
|
value = let host = builtins.elemAt hosts i; in
|
||||||
materusFlake.nixosConfigurations.${host}.materusCfg.hm.lib.homeManagerConfiguration {
|
materusFlake.nixosConfigurations.${host}.materusCfg.hm.lib.homeManagerConfiguration {
|
||||||
pkgs = materusFlake.nixosConfigurations.${host}.pkgs;
|
pkgs = materusFlake.nixosConfigurations.${host}.pkgs;
|
||||||
extraSpecialArgs = { materusCfg = materusFlake.nixosConfigurations.${host}.materusCfg // {homePath = materusFlake.selfPath + "/configurations/home/${username}"; isHm = true;}; };
|
extraSpecialArgs = { materusCfg = materusFlake.nixosConfigurations.${host}.materusCfg // { homePath = materusFlake.selfPath + "/configurations/home/${username}"; isHm = true; }; };
|
||||||
modules = [
|
modules = [
|
||||||
./${username}
|
./${username}
|
||||||
../host/${host}/extraHome.nix
|
../host/${host}/extraHome.nix
|
||||||
|
@ -30,7 +30,8 @@ let
|
||||||
(builtins.listToAttrs (_for 0)) // {
|
(builtins.listToAttrs (_for 0)) // {
|
||||||
#Make generic x86_64-linux user profile "username"
|
#Make generic x86_64-linux user profile "username"
|
||||||
${username} =
|
${username} =
|
||||||
let materusCfg = {
|
let
|
||||||
|
materusCfg = {
|
||||||
stable = false;
|
stable = false;
|
||||||
inherit materusFlake;
|
inherit materusFlake;
|
||||||
host = "Generic";
|
host = "Generic";
|
||||||
|
@ -40,7 +41,8 @@ let
|
||||||
path = materusFlake.selfPath;
|
path = materusFlake.selfPath;
|
||||||
homePath = materusFlake.selfPath + "/configurations/home/${username}";
|
homePath = materusFlake.selfPath + "/configurations/home/${username}";
|
||||||
isHm = true;
|
isHm = true;
|
||||||
}; in
|
};
|
||||||
|
in
|
||||||
inputs.configInputs.home-manager.lib.homeManagerConfiguration {
|
inputs.configInputs.home-manager.lib.homeManagerConfiguration {
|
||||||
pkgs = import inputs.nixpkgs { system = "x86_64-linux"; config = { allowUnfree = true; }; };
|
pkgs = import inputs.nixpkgs { system = "x86_64-linux"; config = { allowUnfree = true; }; };
|
||||||
extraSpecialArgs = { inherit materusCfg; };
|
extraSpecialArgs = { inherit materusCfg; };
|
||||||
|
|
|
@ -137,7 +137,7 @@ in
|
||||||
services.fstrim = {
|
services.fstrim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
interval = "weekly";
|
interval = "weekly";
|
||||||
};
|
};
|
||||||
# Configure network proxy if necessary
|
# Configure network proxy if necessary
|
||||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
# networking.proxy.default = "http://user:password@proxy:port/";
|
||||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||||||
|
@ -665,7 +665,7 @@ in
|
||||||
fonts.fontconfig.enable = true;
|
fonts.fontconfig.enable = true;
|
||||||
fonts.fontconfig.cache32Bit = true;
|
fonts.fontconfig.cache32Bit = true;
|
||||||
fonts.fontconfig.defaultFonts.sansSerif = [ "Noto Sans" "DejaVu Sans" "WenQuanYi Zen Hei" "Noto Color Emoji" ];
|
fonts.fontconfig.defaultFonts.sansSerif = [ "Noto Sans" "DejaVu Sans" "WenQuanYi Zen Hei" "Noto Color Emoji" ];
|
||||||
fonts.fontconfig.defaultFonts.serif = [ "Noto Serif" "DejaVu Serif" "WenQuanYi Zen Hei" "Noto Color Emoji"];
|
fonts.fontconfig.defaultFonts.serif = [ "Noto Serif" "DejaVu Serif" "WenQuanYi Zen Hei" "Noto Color Emoji" ];
|
||||||
fonts.fontconfig.defaultFonts.emoji = [ "Noto Color Emoji" "OpenMoji Color" ];
|
fonts.fontconfig.defaultFonts.emoji = [ "Noto Color Emoji" "OpenMoji Color" ];
|
||||||
fonts.fontconfig.defaultFonts.monospace = [ "FiraCode Nerd Font Mono" "Noto Sans Mono" "WenQuanYi Zen Hei Mono" ];
|
fonts.fontconfig.defaultFonts.monospace = [ "FiraCode Nerd Font Mono" "Noto Sans Mono" "WenQuanYi Zen Hei Mono" ];
|
||||||
|
|
||||||
|
@ -753,8 +753,8 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
networking.firewall.allowedTCPPorts = [ 24800 5900 5357 4656];
|
networking.firewall.allowedTCPPorts = [ 24800 5900 5357 4656 ];
|
||||||
networking.firewall.allowedUDPPorts = [ 24800 5900 3702 4656];
|
networking.firewall.allowedUDPPorts = [ 24800 5900 3702 4656 ];
|
||||||
# Or disable the firewall altogether.
|
# Or disable the firewall altogether.
|
||||||
networking.firewall.enable = true;
|
networking.firewall.enable = true;
|
||||||
|
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
enableTerminalExtra = lib.mkDefault true;
|
enableTerminalExtra = lib.mkDefault true;
|
||||||
enableNixDevel = lib.mkDefault true;
|
enableNixDevel = lib.mkDefault true;
|
||||||
editor.code.fhs.enable = true;
|
editor.code.fhs.enable = true;
|
||||||
editor.code.fhs.packages = (ps: with ps; let llvmpkgs = llvmPackages_16; in[
|
editor.code.fhs.packages = (ps: with ps; let llvmpkgs = llvmPackages_16; in [
|
||||||
llvmpkgs.clang
|
llvmpkgs.clang
|
||||||
llvmpkgs.llvm
|
llvmpkgs.llvm
|
||||||
llvmpkgs.bintools
|
llvmpkgs.bintools
|
||||||
|
|
|
@ -5,14 +5,15 @@
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
[
|
||||||
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
boot.kernel.sysctl = {"vm.swappiness" = 10;};
|
boot.kernel.sysctl = { "vm.swappiness" = 10; };
|
||||||
swapDevices = [
|
swapDevices = [
|
||||||
{
|
{
|
||||||
device = "/swapfile";
|
device = "/swapfile";
|
||||||
|
@ -20,42 +21,49 @@
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Root";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Root";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@" "noatime" "ssd" "space_cache=v2" ];
|
options = [ "subvol=@" "noatime" "ssd" "space_cache=v2" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/nix" =
|
fileSystems."/nix" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Root";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Root";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@nix" "noatime" "compress=zstd" "ssd" "space_cache=v2" ];
|
options = [ "subvol=@nix" "noatime" "compress=zstd" "ssd" "space_cache=v2" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/materus" =
|
fileSystems."/materus" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Root";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Root";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@materus" "noatime" "compress=zstd" "ssd" "space_cache=v2"];
|
options = [ "subvol=@materus" "noatime" "compress=zstd" "ssd" "space_cache=v2" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/etc/nixos" =
|
fileSystems."/etc/nixos" =
|
||||||
{ device = "/materus/config/nixos-config";
|
{
|
||||||
|
device = "/materus/config/nixos-config";
|
||||||
fsType = "none";
|
fsType = "none";
|
||||||
options = [ "bind" ];
|
options = [ "bind" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/home" =
|
fileSystems."/home" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Home";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Home";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@home" "nossd" "noatime" "compress=zstd" "space_cache=v2" "autodefrag" ];
|
options = [ "subvol=@home" "nossd" "noatime" "compress=zstd" "space_cache=v2" "autodefrag" ];
|
||||||
};
|
};
|
||||||
fileSystems."/materus/data" =
|
fileSystems."/materus/data" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Home";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Home";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@data" "nossd" "noatime" "compress=zstd" "space_cache=v2" "autodefrag" ];
|
options = [ "subvol=@data" "nossd" "noatime" "compress=zstd" "space_cache=v2" "autodefrag" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/boot" =
|
fileSystems."/boot" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_Root";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_Root";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@boot" "ssd" ];
|
options = [ "subvol=@boot" "ssd" ];
|
||||||
};
|
};
|
||||||
|
@ -63,7 +71,8 @@
|
||||||
|
|
||||||
|
|
||||||
fileSystems."/boot/efi" =
|
fileSystems."/boot/efi" =
|
||||||
{ device = "/dev/disk/by-label/NixOS_EFI";
|
{
|
||||||
|
device = "/dev/disk/by-label/NixOS_EFI";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -14,7 +14,8 @@
|
||||||
};
|
};
|
||||||
hardware.pulseaudio.enable = false;
|
hardware.pulseaudio.enable = false;
|
||||||
|
|
||||||
environment.sessionVariables = let
|
environment.sessionVariables =
|
||||||
|
let
|
||||||
makePluginPath = format:
|
makePluginPath = format:
|
||||||
(lib.makeSearchPath format [
|
(lib.makeSearchPath format [
|
||||||
"$HOME/.nix-profile/lib"
|
"$HOME/.nix-profile/lib"
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
|
{ config, pkgs, lib, ... }:
|
||||||
{ config, pkgs, lib,... }:
|
|
||||||
{
|
{
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -29,7 +29,7 @@ in
|
||||||
services.xserver.displayManager.sddm.settings = {
|
services.xserver.displayManager.sddm.settings = {
|
||||||
General = {
|
General = {
|
||||||
#DisplayServer = "wayland";
|
#DisplayServer = "wayland";
|
||||||
InputMethod="";
|
InputMethod = "";
|
||||||
};
|
};
|
||||||
Theme = {
|
Theme = {
|
||||||
CursorTheme = "breeze_cursors";
|
CursorTheme = "breeze_cursors";
|
||||||
|
@ -50,12 +50,12 @@ in
|
||||||
#KWIN_DRM_NO_AMS = "1";
|
#KWIN_DRM_NO_AMS = "1";
|
||||||
|
|
||||||
#Fix for amdgpu crashes
|
#Fix for amdgpu crashes
|
||||||
KWIN_DRM_USE_MODIFIERS="0";
|
KWIN_DRM_USE_MODIFIERS = "0";
|
||||||
KWIN_DRM_NO_DIRECT_SCANOUT="1";
|
KWIN_DRM_NO_DIRECT_SCANOUT = "1";
|
||||||
};
|
};
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
||||||
];
|
];
|
||||||
|
|
||||||
materus.profile.steam.extraPkgs = [pkgs.kdePackages.breeze pkgs.kdePackages.breeze-gtk pkgs.kdePackages.dolphin];
|
materus.profile.steam.extraPkgs = [ pkgs.kdePackages.breeze pkgs.kdePackages.breeze-gtk pkgs.kdePackages.dolphin ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,8 +6,8 @@
|
||||||
networking.networkmanager.enable = true;
|
networking.networkmanager.enable = true;
|
||||||
#networking.networkmanager.wifi.backend = "iwd";
|
#networking.networkmanager.wifi.backend = "iwd";
|
||||||
networking.firewall.enable = true;
|
networking.firewall.enable = true;
|
||||||
networking.firewall.allowedTCPPorts = [ 24800 5900 5357 4656 8080 9943 9944];
|
networking.firewall.allowedTCPPorts = [ 24800 5900 5357 4656 8080 9943 9944 ];
|
||||||
networking.firewall.allowedUDPPorts = [ 24800 5900 3702 4656 6000 9943 9944];
|
networking.firewall.allowedUDPPorts = [ 24800 5900 3702 4656 6000 9943 9944 ];
|
||||||
#Fix warning
|
#Fix warning
|
||||||
networking.networkmanager.extraConfig = lib.mkDefault ''
|
networking.networkmanager.extraConfig = lib.mkDefault ''
|
||||||
[connectivity]
|
[connectivity]
|
||||||
|
|
|
@ -1,46 +1,46 @@
|
||||||
{ config, pkgs, lib, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
let
|
let
|
||||||
valkyrie-sync = pkgs.writeShellScriptBin "valkyrie-sync" ''
|
valkyrie-sync = pkgs.writeShellScriptBin "valkyrie-sync" ''
|
||||||
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" --exclude "flake.lock" /materus/config/nixos-config materus@valkyrie:/materus/config/ && \
|
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" --exclude "flake.lock" /materus/config/nixos-config materus@valkyrie:/materus/config/ && \
|
||||||
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" /materus/config/private/valkyrie materus@valkyrie:/materus/config/private
|
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" /materus/config/private/valkyrie materus@valkyrie:/materus/config/private
|
||||||
'';
|
'';
|
||||||
|
|
||||||
valkyrie-flakelock = pkgs.writeShellScriptBin "valkyrie-flakelock" ''
|
valkyrie-flakelock = pkgs.writeShellScriptBin "valkyrie-flakelock" ''
|
||||||
${pkgs.openssh}/bin/ssh materus@valkyrie "nix flake update /materus/config/nixos-config --override-input nixpkgs github:NixOS/nixpkgs/23.05 \
|
${pkgs.openssh}/bin/ssh materus@valkyrie "nix flake update /materus/config/nixos-config --override-input nixpkgs github:NixOS/nixpkgs/23.05 \
|
||||||
--override-input home-manager github:nix-community/home-manager/release-23.05 \
|
--override-input home-manager github:nix-community/home-manager/release-23.05 \
|
||||||
--override-input private /materus/config/private/valkyrie/flake"
|
--override-input private /materus/config/private/valkyrie/flake"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
valkyrie-rebuild-boot = pkgs.writeShellScriptBin "valkyrie-rebuild-boot" ''
|
valkyrie-rebuild-boot = pkgs.writeShellScriptBin "valkyrie-rebuild-boot" ''
|
||||||
${pkgs.openssh}/bin/ssh -t materus@valkyrie "sudo nixos-rebuild boot --flake /materus/config/nixos-config#valkyrie \
|
${pkgs.openssh}/bin/ssh -t materus@valkyrie "sudo nixos-rebuild boot --flake /materus/config/nixos-config#valkyrie \
|
||||||
--override-input private /materus/config/private/valkyrie/flake"
|
--override-input private /materus/config/private/valkyrie/flake"
|
||||||
'';
|
'';
|
||||||
valkyrie-rebuild-switch = pkgs.writeShellScriptBin "valkyrie-rebuild-switch" ''
|
valkyrie-rebuild-switch = pkgs.writeShellScriptBin "valkyrie-rebuild-switch" ''
|
||||||
${pkgs.openssh}/bin/ssh -t materus@valkyrie "sudo nixos-rebuild switch --flake /materus/config/nixos-config#valkyrie \
|
${pkgs.openssh}/bin/ssh -t materus@valkyrie "sudo nixos-rebuild switch --flake /materus/config/nixos-config#valkyrie \
|
||||||
--override-input private /materus/config/private/valkyrie/flake"
|
--override-input private /materus/config/private/valkyrie/flake"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
flamaster-sync = pkgs.writeShellScriptBin "flamaster-sync" ''
|
flamaster-sync = pkgs.writeShellScriptBin "flamaster-sync" ''
|
||||||
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" --exclude "flake.lock" /materus/config/nixos-config materus@flamaster:/materus/config/ && \
|
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" --exclude "flake.lock" /materus/config/nixos-config materus@flamaster:/materus/config/ && \
|
||||||
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" /materus/config/private/flamaster materus@flamaster:/materus/config/private
|
${pkgs.rsync}/bin/rsync -avzrh --delete --exclude ".git*" /materus/config/private/flamaster materus@flamaster:/materus/config/private
|
||||||
'';
|
'';
|
||||||
|
|
||||||
flamaster-flakelock = pkgs.writeShellScriptBin "flamaster-flakelock" ''
|
flamaster-flakelock = pkgs.writeShellScriptBin "flamaster-flakelock" ''
|
||||||
${pkgs.openssh}/bin/ssh materus@flamaster "nix flake update /materus/config/nixos-config --override-input nixpkgs github:NixOS/nixpkgs/23.05 \
|
${pkgs.openssh}/bin/ssh materus@flamaster "nix flake update /materus/config/nixos-config --override-input nixpkgs github:NixOS/nixpkgs/23.05 \
|
||||||
--override-input home-manager github:nix-community/home-manager/release-23.05 \
|
--override-input home-manager github:nix-community/home-manager/release-23.05 \
|
||||||
--override-input private /materus/config/private/flamaster/flake"
|
--override-input private /materus/config/private/flamaster/flake"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
flamaster-rebuild-boot = pkgs.writeShellScriptBin "flamaster-rebuild-boot" ''
|
flamaster-rebuild-boot = pkgs.writeShellScriptBin "flamaster-rebuild-boot" ''
|
||||||
${pkgs.openssh}/bin/ssh -t materus@flamaster "sudo nixos-rebuild boot --flake /materus/config/nixos-config#flamaster \
|
${pkgs.openssh}/bin/ssh -t materus@flamaster "sudo nixos-rebuild boot --flake /materus/config/nixos-config#flamaster \
|
||||||
--override-input private /materus/config/private/flamaster/flake"
|
--override-input private /materus/config/private/flamaster/flake"
|
||||||
'';
|
'';
|
||||||
flamaster-rebuild-switch = pkgs.writeShellScriptBin "flamaster-rebuild-switch" ''
|
flamaster-rebuild-switch = pkgs.writeShellScriptBin "flamaster-rebuild-switch" ''
|
||||||
${pkgs.openssh}/bin/ssh -t materus@flamaster "sudo nixos-rebuild switch --flake /materus/config/nixos-config#flamaster \
|
${pkgs.openssh}/bin/ssh -t materus@flamaster "sudo nixos-rebuild switch --flake /materus/config/nixos-config#flamaster \
|
||||||
--override-input private /materus/config/private/flamaster/flake"
|
--override-input private /materus/config/private/flamaster/flake"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
|
||||||
in
|
in
|
||||||
|
|
|
@ -3,13 +3,13 @@
|
||||||
imports =
|
imports =
|
||||||
[
|
[
|
||||||
|
|
||||||
] ++ (if (materusCfg.materusFlake.decrypted) then [ ./private ] else [] );
|
] ++ (if (materusCfg.materusFlake.decrypted) then [ ./private ] else [ ]);
|
||||||
|
|
||||||
sops.age.generateKey = false;
|
sops.age.generateKey = false;
|
||||||
sops.gnupg.home = null;
|
sops.gnupg.home = null;
|
||||||
sops.gnupg.sshKeyPaths = [];
|
sops.gnupg.sshKeyPaths = [ ];
|
||||||
sops.defaultSopsFile = materusCfg.hostPath + "/secrets/secrets.yaml";
|
sops.defaultSopsFile = materusCfg.hostPath + "/secrets/secrets.yaml";
|
||||||
sops.secrets."users/materus" = {};
|
sops.secrets."users/materus" = { };
|
||||||
|
|
||||||
services.openssh.hostKeys = [
|
services.openssh.hostKeys = [
|
||||||
{
|
{
|
||||||
|
|
|
@ -103,10 +103,10 @@
|
||||||
XDG_BIN_HOME = "\${HOME}/.local/bin";
|
XDG_BIN_HOME = "\${HOME}/.local/bin";
|
||||||
XDG_DATA_HOME = "\${HOME}/.local/share";
|
XDG_DATA_HOME = "\${HOME}/.local/share";
|
||||||
QT_XKB_CONFIG_ROOT = "\${XKB_CONFIG_ROOT}";
|
QT_XKB_CONFIG_ROOT = "\${XKB_CONFIG_ROOT}";
|
||||||
GTK_IM_MODULE="fcitx";
|
GTK_IM_MODULE = "fcitx";
|
||||||
QT_IM_MODULE="fcitx";
|
QT_IM_MODULE = "fcitx";
|
||||||
XMODIFIERS="@im=fcitx";
|
XMODIFIERS = "@im=fcitx";
|
||||||
SDL_IM_MODULE="fcitx";
|
SDL_IM_MODULE = "fcitx";
|
||||||
#SDL_AUDIODRIVER = "pipewire";
|
#SDL_AUDIODRIVER = "pipewire";
|
||||||
|
|
||||||
#SSH_ASKPASS_REQUIRE = "prefer";
|
#SSH_ASKPASS_REQUIRE = "prefer";
|
||||||
|
@ -122,7 +122,7 @@
|
||||||
'';
|
'';
|
||||||
|
|
||||||
i18n.inputMethod.enabled = "fcitx5";
|
i18n.inputMethod.enabled = "fcitx5";
|
||||||
i18n.inputMethod.fcitx5.addons = [ pkgs.fcitx5-configtool pkgs.fcitx5-lua pkgs.fcitx5-mozc pkgs.fcitx5-gtk pkgs.kdePackages.fcitx5-qt];
|
i18n.inputMethod.fcitx5.addons = [ pkgs.fcitx5-configtool pkgs.fcitx5-lua pkgs.fcitx5-mozc pkgs.fcitx5-gtk pkgs.kdePackages.fcitx5-qt ];
|
||||||
|
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
# Some programs need SUID wrappers, can be configured further or are
|
||||||
|
|
|
@ -5,17 +5,20 @@
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.mounts = [
|
systemd.mounts = [
|
||||||
{ where = "/dev/hugepages";
|
{
|
||||||
|
where = "/dev/hugepages";
|
||||||
enable = false;
|
enable = false;
|
||||||
}
|
}
|
||||||
{ where = "/dev/hugepages/hugepages-2048kB";
|
{
|
||||||
|
where = "/dev/hugepages/hugepages-2048kB";
|
||||||
enable = true;
|
enable = true;
|
||||||
what = "hugetlbfs";
|
what = "hugetlbfs";
|
||||||
type = "hugetlbfs";
|
type = "hugetlbfs";
|
||||||
options = "pagesize=2M";
|
options = "pagesize=2M";
|
||||||
requiredBy = [ "basic.target" ];
|
requiredBy = [ "basic.target" ];
|
||||||
}
|
}
|
||||||
{ where = "/dev/hugepages/hugepages-1048576kB";
|
{
|
||||||
|
where = "/dev/hugepages/hugepages-1048576kB";
|
||||||
enable = true;
|
enable = true;
|
||||||
what = "hugetlbfs";
|
what = "hugetlbfs";
|
||||||
type = "hugetlbfs";
|
type = "hugetlbfs";
|
||||||
|
|
|
@ -1,18 +1,20 @@
|
||||||
{ config, pkgs, lib, materusArg, ... }:
|
{ config, pkgs, lib, materusArg, ... }:
|
||||||
{
|
{
|
||||||
options.valkyrieService.pihole.enable = materusArg.pkgs.lib.mkBoolOpt false "Enable pihole";
|
options.valkyrieService.pihole.enable = materusArg.pkgs.lib.mkBoolOpt false "Enable pihole";
|
||||||
options.valkyrieService.pihole.dnsIP = lib.mkOption { default = "127.0.0.1";};
|
options.valkyrieService.pihole.dnsIP = lib.mkOption { default = "127.0.0.1"; };
|
||||||
options.valkyrieService.pihole.webIP = lib.mkOption { default = "127.0.0.1";};
|
options.valkyrieService.pihole.webIP = lib.mkOption { default = "127.0.0.1"; };
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
config = let
|
config =
|
||||||
|
let
|
||||||
cfg = config.valkyrieService.pihole;
|
cfg = config.valkyrieService.pihole;
|
||||||
dnsmasqConf = pkgs.writeText "02-dnsmasq-custom.conf" ''
|
dnsmasqConf = pkgs.writeText "02-dnsmasq-custom.conf" ''
|
||||||
no-hosts
|
no-hosts
|
||||||
'';
|
'';
|
||||||
|
|
||||||
in lib.mkIf config.valkyrieService.pihole.enable {
|
in
|
||||||
|
lib.mkIf config.valkyrieService.pihole.enable {
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d /var/lib/dnsmasq.d 0776 root root -"
|
"d /var/lib/dnsmasq.d 0776 root root -"
|
||||||
"d /var/lib/pihole 0776 root root -"
|
"d /var/lib/pihole 0776 root root -"
|
||||||
|
@ -29,10 +31,10 @@
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
TZ = "Europe/Warsaw";
|
TZ = "Europe/Warsaw";
|
||||||
FTLCONF_LOCAL_IPV4="127.0.0.1";
|
FTLCONF_LOCAL_IPV4 = "127.0.0.1";
|
||||||
DNSMASQ_USER="root";
|
DNSMASQ_USER = "root";
|
||||||
VIRTUAL_HOST="pi.hole";
|
VIRTUAL_HOST = "pi.hole";
|
||||||
PROXY_LOCATION="pi.hole";
|
PROXY_LOCATION = "pi.hole";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/var/lib/pihole/:/etc/pihole/"
|
"/var/lib/pihole/:/etc/pihole/"
|
||||||
|
|
|
@ -6,7 +6,8 @@
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ # Include the results of the hardware scan.
|
[
|
||||||
|
# Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
];
|
];
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
@ -37,7 +38,7 @@
|
||||||
"https://cache.nixos.org/"
|
"https://cache.nixos.org/"
|
||||||
"https://nixerus.cachix.org/"
|
"https://nixerus.cachix.org/"
|
||||||
];
|
];
|
||||||
trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nixerus.cachix.org-1:2x7sIG7y1vAoxc8BNRJwsfapZsiX4hIl4aTi9V5ZDdE="];
|
trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nixerus.cachix.org-1:2x7sIG7y1vAoxc8BNRJwsfapZsiX4hIl4aTi9V5ZDdE=" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# Use the extlinux boot loader. (NixOS wants to enable GRUB by default)
|
# Use the extlinux boot loader. (NixOS wants to enable GRUB by default)
|
||||||
|
|
|
@ -5,7 +5,8 @@
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
[
|
||||||
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
];
|
];
|
||||||
boot.kernelPackages = pkgs.linuxPackages_rpi4;
|
boot.kernelPackages = pkgs.linuxPackages_rpi4;
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "usb_storage" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "usb_storage" ];
|
||||||
|
@ -16,7 +17,8 @@
|
||||||
"vm.swappiness" = 10;
|
"vm.swappiness" = 10;
|
||||||
};
|
};
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{ device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
{
|
||||||
|
device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
||||||
fsType = "ext4";
|
fsType = "ext4";
|
||||||
};
|
};
|
||||||
fileSystems."/etc/nixos" =
|
fileSystems."/etc/nixos" =
|
||||||
|
|
|
@ -1,17 +1,17 @@
|
||||||
{ config, pkgs, lib, materusCfg, ... }:
|
{ config, pkgs, lib, materusCfg, ... }:
|
||||||
let
|
let
|
||||||
materusArg = {
|
materusArg = {
|
||||||
pkgs = (import materusCfg.nixerus { inherit pkgs; }) //
|
pkgs = (import materusCfg.nixerus { inherit pkgs; }) //
|
||||||
(if pkgs.system == "x86_64-linux" then { i686Linux = import materusCfg.nixerus { pkgs = pkgs.pkgsi686Linux; }; } else { });
|
(if pkgs.system == "x86_64-linux" then { i686Linux = import materusCfg.nixerus { pkgs = pkgs.pkgsi686Linux; }; } else { });
|
||||||
cfg = materusCfg;
|
cfg = materusCfg;
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./nixpkgs.nix
|
./nixpkgs.nix
|
||||||
./packages
|
./packages
|
||||||
];
|
];
|
||||||
options.materus.materusArg = lib.mkOption {default = {};};
|
options.materus.materusArg = lib.mkOption { default = { }; };
|
||||||
config._module.args.materusArg = config.materus.materusArg // materusArg;
|
config._module.args.materusArg = config.materus.materusArg // materusArg;
|
||||||
config.warnings = lib.mkIf (!materusCfg.materusFlake.decrypted) ["Repository not decrypted, private configs not loaded, use crypt.sh to decrypt"];
|
config.warnings = lib.mkIf (!materusCfg.materusFlake.decrypted) [ "Repository not decrypted, private configs not loaded, use crypt.sh to decrypt" ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,12 +14,12 @@ in
|
||||||
options.materus.profile.nixpkgs.enableOverlays = mkBoolOpt (cfg.enable) "Enable materus overlays";
|
options.materus.profile.nixpkgs.enableOverlays = mkBoolOpt (cfg.enable) "Enable materus overlays";
|
||||||
options.materus.profile.nix.enableRegistry = mkBoolOpt (!materusCfg.isHm) "Enable materus nix registry";
|
options.materus.profile.nix.enableRegistry = mkBoolOpt (!materusCfg.isHm) "Enable materus nix registry";
|
||||||
|
|
||||||
config.nixpkgs.config = lib.mkIf cfg.enable{
|
config.nixpkgs.config = lib.mkIf cfg.enable {
|
||||||
allowUnfree = lib.mkDefault true;
|
allowUnfree = lib.mkDefault true;
|
||||||
joypixels.acceptLicense = lib.mkDefault true;
|
joypixels.acceptLicense = lib.mkDefault true;
|
||||||
firefox.enablePlasmaBrowserIntegration = true;
|
firefox.enablePlasmaBrowserIntegration = true;
|
||||||
};
|
};
|
||||||
config.nixpkgs.overlays = lib.mkIf cfg.enableOverlays [materusArg.cfg.configInputs.emacs-overlay.overlay];
|
config.nixpkgs.overlays = lib.mkIf cfg.enableOverlays [ materusArg.cfg.configInputs.emacs-overlay.overlay ];
|
||||||
|
|
||||||
config.nix.package = lib.mkDefault pkgs.nixUnstable;
|
config.nix.package = lib.mkDefault pkgs.nixUnstable;
|
||||||
config.nix.registry = lib.mkIf config.materus.profile.nix.enableRegistry {
|
config.nix.registry = lib.mkIf config.materus.profile.nix.enableRegistry {
|
||||||
|
|
|
@ -16,7 +16,7 @@ let
|
||||||
pkgs.noto-fonts-cjk-serif
|
pkgs.noto-fonts-cjk-serif
|
||||||
pkgs.wqy_zenhei
|
pkgs.wqy_zenhei
|
||||||
pkgs.corefonts
|
pkgs.corefonts
|
||||||
(pkgs.nerdfonts.override { fonts = [ "FiraCode"]; })
|
(pkgs.nerdfonts.override { fonts = [ "FiraCode" ]; })
|
||||||
|
|
||||||
] ++ defaultFonts;
|
] ++ defaultFonts;
|
||||||
|
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
{ config, lib, pkgs, materusArg, ... }:
|
{ config, lib, pkgs, materusArg, ... }:
|
||||||
let
|
let
|
||||||
cfg = config.materus.profile.browser;
|
cfg = config.materus.profile.browser;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|
||||||
options= let mkBoolOpt = materusArg.pkgs.lib.mkBoolOpt; in{
|
options = let mkBoolOpt = materusArg.pkgs.lib.mkBoolOpt; in {
|
||||||
materus.profile.browser.firefox.enable = mkBoolOpt config.materus.profile.enableDesktop "Enable Firefox with materus cfg";
|
materus.profile.browser.firefox.enable = mkBoolOpt config.materus.profile.enableDesktop "Enable Firefox with materus cfg";
|
||||||
materus.profile.browser.vivaldi.enable = mkBoolOpt config.materus.profile.enableDesktop "Enable Vivaldi with materus cfg";
|
materus.profile.browser.vivaldi.enable = mkBoolOpt config.materus.profile.enableDesktop "Enable Vivaldi with materus cfg";
|
||||||
materus.profile.browser.brave.enable = mkBoolOpt false "Enable Brave with materus cfg";
|
materus.profile.browser.brave.enable = mkBoolOpt false "Enable Brave with materus cfg";
|
||||||
|
|
|
@ -20,9 +20,9 @@ in
|
||||||
config =
|
config =
|
||||||
{
|
{
|
||||||
|
|
||||||
home.packages = (if cfg.enableDesktop then packages.list.desktopApps else []) ++
|
home.packages = (if cfg.enableDesktop then packages.list.desktopApps else [ ]) ++
|
||||||
(if cfg.enableNixDevel then packages.list.nixRelated else []) ++
|
(if cfg.enableNixDevel then packages.list.nixRelated else [ ]) ++
|
||||||
(if cfg.enableTerminal then packages.list.terminalApps else []);
|
(if cfg.enableTerminal then packages.list.terminalApps else [ ]);
|
||||||
#Desktop
|
#Desktop
|
||||||
programs.feh.enable = lib.mkDefault cfg.enableDesktop;
|
programs.feh.enable = lib.mkDefault cfg.enableDesktop;
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@ in
|
||||||
{
|
{
|
||||||
options.materus.profile.editor.code.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableDesktop "Enable VSCodium with materus cfg";
|
options.materus.profile.editor.code.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableDesktop "Enable VSCodium with materus cfg";
|
||||||
options.materus.profile.editor.code.fhs.enable = materusArg.pkgs.lib.mkBoolOpt false "Use fhs vscodium";
|
options.materus.profile.editor.code.fhs.enable = materusArg.pkgs.lib.mkBoolOpt false "Use fhs vscodium";
|
||||||
options.materus.profile.editor.code.fhs.packages = lib.mkOption { default = (ps: []);};
|
options.materus.profile.editor.code.fhs.packages = lib.mkOption { default = (ps: [ ]); };
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
programs.vscode = {
|
programs.vscode = {
|
||||||
enable = lib.mkDefault true;
|
enable = lib.mkDefault true;
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
let
|
let
|
||||||
configPath = "${materusArg.cfg.path}" + "/extraFiles/config/emacs/";
|
configPath = "${materusArg.cfg.path}" + "/extraFiles/config/emacs/";
|
||||||
|
|
||||||
inits = import ./init.nix {path = configPath; inherit pkgs;};
|
inits = import ./init.nix { path = configPath; inherit pkgs; };
|
||||||
packages = epkgs: with epkgs; [
|
packages = epkgs: with epkgs; [
|
||||||
load-relative
|
load-relative
|
||||||
elcord
|
elcord
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{path, pkgs}:
|
{ path, pkgs }:
|
||||||
{
|
{
|
||||||
|
|
||||||
earlyInitText = ''
|
earlyInitText = ''
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{ config, lib, pkgs, materusArg, ... }:
|
{ config, lib, pkgs, materusArg, ... }:
|
||||||
let
|
let
|
||||||
cfg = config.materus.profile.editor.neovim;
|
cfg = config.materus.profile.editor.neovim;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.materus.profile.editor.neovim.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable neovim with materus cfg";
|
options.materus.profile.editor.neovim.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable neovim with materus cfg";
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{ config, pkgs, lib, materusArg, ... }:
|
{ config, pkgs, lib, materusArg, ... }:
|
||||||
let
|
let
|
||||||
cfg = config.materus.profile.bash;
|
cfg = config.materus.profile.bash;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.materus.profile.bash.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminal "Enable materus bash config";
|
options.materus.profile.bash.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminal "Enable materus bash config";
|
||||||
|
@ -12,7 +12,7 @@ in
|
||||||
enable = lib.mkDefault true;
|
enable = lib.mkDefault true;
|
||||||
enableCompletion = lib.mkDefault true;
|
enableCompletion = lib.mkDefault true;
|
||||||
enableVteIntegration = lib.mkDefault true;
|
enableVteIntegration = lib.mkDefault true;
|
||||||
historyControl = lib.mkDefault ["erasedups" "ignorespace"];
|
historyControl = lib.mkDefault [ "erasedups" "ignorespace" ];
|
||||||
shellOptions = lib.mkDefault [ "autocd" "checkwinsize" "cmdhist" "expand_aliases" "extglob" "globstar" "checkjobs" "nocaseglob" ];
|
shellOptions = lib.mkDefault [ "autocd" "checkwinsize" "cmdhist" "expand_aliases" "extglob" "globstar" "checkjobs" "nocaseglob" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{ config, pkgs, lib, materusArg, ... }:
|
{ config, pkgs, lib, materusArg, ... }:
|
||||||
let
|
let
|
||||||
cfg = config.materus.profile.fish;
|
cfg = config.materus.profile.fish;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.materus.profile.fish.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable materus fish config";
|
options.materus.profile.fish.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable materus fish config";
|
||||||
|
|
|
@ -28,8 +28,8 @@ in
|
||||||
shell = {
|
shell = {
|
||||||
disabled = false;
|
disabled = false;
|
||||||
fish_indicator = "fish";
|
fish_indicator = "fish";
|
||||||
bash_indicator= "bash";
|
bash_indicator = "bash";
|
||||||
zsh_indicator= "zsh";
|
zsh_indicator = "zsh";
|
||||||
style = "blue bold";
|
style = "blue bold";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,8 @@
|
||||||
let
|
let
|
||||||
|
|
||||||
relToDotDir = file: (lib.optionalString (config.programs.zsh.dotDir != null) (config.programs.zsh.dotDir + "/")) + file;
|
relToDotDir = file: (lib.optionalString (config.programs.zsh.dotDir != null) (config.programs.zsh.dotDir + "/")) + file;
|
||||||
pluginsDir = if config.programs.zsh.dotDir != null then
|
pluginsDir =
|
||||||
|
if config.programs.zsh.dotDir != null then
|
||||||
relToDotDir "plugins" else ".zsh/plugins";
|
relToDotDir "plugins" else ".zsh/plugins";
|
||||||
|
|
||||||
|
|
||||||
|
@ -44,7 +45,7 @@ in
|
||||||
{
|
{
|
||||||
options.materus.profile.zsh.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable materus zsh config";
|
options.materus.profile.zsh.enable = materusArg.pkgs.lib.mkBoolOpt config.materus.profile.enableTerminalExtra "Enable materus zsh config";
|
||||||
options.materus.profile.zsh.prompt = lib.mkOption {
|
options.materus.profile.zsh.prompt = lib.mkOption {
|
||||||
type = lib.types.enum ["p10k" "starship"];
|
type = lib.types.enum [ "p10k" "starship" ];
|
||||||
example = "p10k";
|
example = "p10k";
|
||||||
default = "p10k";
|
default = "p10k";
|
||||||
};
|
};
|
||||||
|
@ -55,7 +56,7 @@ in
|
||||||
pkgs.ripgrep
|
pkgs.ripgrep
|
||||||
];
|
];
|
||||||
|
|
||||||
home.file = builtins.foldl' (a: b: a // b) {} (builtins.map (plugin: {${plugin.path}.source = plugin.src;})(builtins.attrValues extraPlugins));
|
home.file = builtins.foldl' (a: b: a // b) { } (builtins.map (plugin: { ${plugin.path}.source = plugin.src; }) (builtins.attrValues extraPlugins));
|
||||||
|
|
||||||
programs.zsh = {
|
programs.zsh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
|
|
||||||
./games
|
./games
|
||||||
];
|
];
|
||||||
/*
|
/*
|
||||||
users.users.nixos-rebuild = {
|
users.users.nixos-rebuild = {
|
||||||
#isSystemUser = true;
|
#isSystemUser = true;
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
|
|
@ -109,7 +109,7 @@ in
|
||||||
description = "Package used by steam";
|
description = "Package used by steam";
|
||||||
};
|
};
|
||||||
options.materus.profile.steam.extraPkgs = lib.mkOption {
|
options.materus.profile.steam.extraPkgs = lib.mkOption {
|
||||||
default = [];
|
default = [ ];
|
||||||
description = "Extra packages for steam";
|
description = "Extra packages for steam";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ in
|
||||||
"https://cache.nixos.org/"
|
"https://cache.nixos.org/"
|
||||||
"https://nixerus.cachix.org/"
|
"https://nixerus.cachix.org/"
|
||||||
];
|
];
|
||||||
trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nixerus.cachix.org-1:2x7sIG7y1vAoxc8BNRJwsfapZsiX4hIl4aTi9V5ZDdE="];
|
trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nixerus.cachix.org-1:2x7sIG7y1vAoxc8BNRJwsfapZsiX4hIl4aTi9V5ZDdE=" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue