Compare commits
3 commits
d22e446860
...
c0077acfa9
| Author | SHA1 | Date | |
|---|---|---|---|
| c0077acfa9 | |||
| 249a3a1f3f | |||
| b5fc81fe01 |
4 changed files with 116 additions and 167 deletions
24
flake.lock
generated
24
flake.lock
generated
|
|
@ -65,11 +65,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1774858933,
|
"lastModified": 1775815947,
|
||||||
"narHash": "sha256-rgHUoE4QhOvK3Rcl9cbuIVdjPjFjfhcTm/uPs8Y7+2w=",
|
"narHash": "sha256-zKmhefgqP+mlTwfSIJaI1Dw8IePnc17WwzrzRQ6JQ6Q=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "lanzaboote",
|
"repo": "lanzaboote",
|
||||||
"rev": "45338aab3013924c75305f5cb3543b9cda993183",
|
"rev": "a5f5623a443d37deede6bce12c31ba03caecadcd",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
@ -80,11 +80,11 @@
|
||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1774933469,
|
"lastModified": 1775490113,
|
||||||
"narHash": "sha256-OrnCQeUO2bqaWUl0lkDWyGWjKsOhtCyd7JSfTedQNUE=",
|
"narHash": "sha256-2ZBhDNZZwYkRmefK5XLOusCJHnoeKkoN95hoSGgMxWM=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "f4c4c2c0c923d7811ac2a63ccc154767e4195337",
|
"rev": "c775c2772ba56e906cbeb4e0b2db19079ef11ff7",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
@ -95,11 +95,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1774709303,
|
"lastModified": 1775710090,
|
||||||
"narHash": "sha256-D3Q07BbIA2KnTcSXIqqu9P586uWxN74zNoCH3h2ESHg=",
|
"narHash": "sha256-ar3rofg+awPB8QXDaFJhJ2jJhu+KqN/PRCXeyuXR76E=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "8110df5ad7abf5d4c0f6fb0f8f978390e77f9685",
|
"rev": "4c1018dae018162ec878d42fec712642d214fdfa",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
@ -147,11 +147,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1775013181,
|
"lastModified": 1775790837,
|
||||||
"narHash": "sha256-zPrt6oNM1r/RO5bWYaZ3hthfG9vzkr6kQdoqDd5x4Qw=",
|
"narHash": "sha256-RAHjn8sjgfF3D17BaV8iv69o3P+L9aCuE36PFwzoqHU=",
|
||||||
"owner": "oxalica",
|
"owner": "oxalica",
|
||||||
"repo": "rust-overlay",
|
"repo": "rust-overlay",
|
||||||
"rev": "e8046c1d9ccadd497c2344d8fa49dab62f22f7be",
|
"rev": "c913e0b9525311f103b7e1463ebb0f28c6865d8d",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
||||||
|
|
@ -87,6 +87,7 @@
|
||||||
8087 # paperless frontend
|
8087 # paperless frontend
|
||||||
8090 # mail
|
8090 # mail
|
||||||
8091 # mail jmap
|
8091 # mail jmap
|
||||||
|
8092 # vaultwarden
|
||||||
8080 # homepage
|
8080 # homepage
|
||||||
];
|
];
|
||||||
firewall.allowedUDPPorts = [
|
firewall.allowedUDPPorts = [
|
||||||
|
|
@ -906,6 +907,34 @@
|
||||||
capacity = 50;
|
capacity = 50;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.vaultwarden = {
|
||||||
|
enable = true;
|
||||||
|
backupDir = "/backup/vaultwarden";
|
||||||
|
# in order to avoid having ADMIN_TOKEN in the nix store it can be also set with the help of an environment file
|
||||||
|
# be aware that this file must be created by hand (or via secrets management like sops)
|
||||||
|
environmentFile = "/root/vaultwarden.env";
|
||||||
|
config = {
|
||||||
|
# Refer to https://github.com/dani-garcia/vaultwarden/blob/main/.env.template
|
||||||
|
DOMAIN = "https://bitwarden.kempinger.at";
|
||||||
|
SIGNUPS_ALLOWED = false;
|
||||||
|
|
||||||
|
ROCKET_ADDRESS = "127.0.0.1";
|
||||||
|
ROCKET_PORT = 8092;
|
||||||
|
ROCKET_LOG = "critical";
|
||||||
|
|
||||||
|
# This example assumes a mailserver running on localhost,
|
||||||
|
# thus without transport encryption.
|
||||||
|
# If you use an external mail server, follow:
|
||||||
|
# https://github.com/dani-garcia/vaultwarden/wiki/SMTP-configuration
|
||||||
|
SMTP_HOST = "127.0.0.1";
|
||||||
|
SMTP_PORT = 25;
|
||||||
|
SMTP_SSL = false;
|
||||||
|
|
||||||
|
SMTP_FROM = "admin@bitwarden.kempinger.at";
|
||||||
|
SMTP_FROM_NAME = "kempinger.at Bitwarden server";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
# nixpkgs.overlays = [
|
# nixpkgs.overlays = [
|
||||||
|
|
|
||||||
|
|
@ -100,6 +100,7 @@
|
||||||
"wireshark"
|
"wireshark"
|
||||||
"networkmanager"
|
"networkmanager"
|
||||||
"libvirtd"
|
"libvirtd"
|
||||||
|
"ydotool"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -237,6 +238,7 @@
|
||||||
#security.pam.services.swaylock = {};
|
#security.pam.services.swaylock = {};
|
||||||
#programs.waybar.enable = true; # top bar
|
#programs.waybar.enable = true; # top bar
|
||||||
|
|
||||||
|
programs.ydotool.enable= true;
|
||||||
programs.firefox.enable = true;
|
programs.firefox.enable = true;
|
||||||
programs.wireshark.enable = true;
|
programs.wireshark.enable = true;
|
||||||
programs.wireshark.package = pkgs.wireshark;
|
programs.wireshark.package = pkgs.wireshark;
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,3 @@
|
||||||
# Edit this configuration file to define what should be installed on
|
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
|
||||||
# and in the NixOS manual (accessible by running 'nixos-help').
|
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
|
@ -17,25 +14,25 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
extraPackages = with pkgs; [
|
extraPackages = with pkgs; [
|
||||||
# Required for modern Intel GPUs (Xe iGPU and ARC)
|
# Required for modern Intel GPUs (Xe iGPU and ARC)
|
||||||
intel-media-driver # VA-API (iHD) userspace
|
intel-media-driver # VA-API (iHD) userspace
|
||||||
vpl-gpu-rt # oneVPL (QSV) runtime
|
vpl-gpu-rt # oneVPL (QSV) runtime
|
||||||
|
|
||||||
# Optional (compute / tooling):
|
# Optional (compute / tooling):
|
||||||
intel-compute-runtime # OpenCL (NEO) + Level Zero for Arc/Xe
|
intel-compute-runtime # OpenCL (NEO) + Level Zero for Arc/Xe
|
||||||
# NOTE: 'intel-ocl' also exists as a legacy package; not recommended for Arc/Xe.
|
# NOTE: 'intel-ocl' also exists as a legacy package; not recommended for Arc/Xe.
|
||||||
# libvdpau-va-gl # Only if you must run VDPAU-only apps
|
# libvdpau-va-gl # Only if you must run VDPAU-only apps
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.sessionVariables = {
|
|
||||||
LIBVA_DRIVER_NAME = "iHD"; # Prefer the modern iHD backend
|
|
||||||
# VDPAU_DRIVER = "va_gl"; # Only if using libvdpau-va-gl
|
|
||||||
};
|
|
||||||
|
|
||||||
# May help if FFmpeg/VAAPI/QSV init fails (esp. on Arc with i915):
|
|
||||||
hardware.enableRedistributableFirmware = true;
|
hardware.enableRedistributableFirmware = true;
|
||||||
boot.kernelParams = [ "i915.enable_guc=3" ];
|
boot.kernelParams = [ "i915.enable_guc=3" ];
|
||||||
|
|
||||||
|
environment.sessionVariables = {
|
||||||
|
LIBVA_DRIVER_NAME = "iHD";
|
||||||
|
QT_QPA_PLATFORM = "wayland";
|
||||||
|
WLR_NO_HARDWARE_CURSORS = "1";
|
||||||
|
};
|
||||||
|
|
||||||
networking.hostName = "nixos-lnf";
|
networking.hostName = "nixos-lnf";
|
||||||
networking.wireless.enable = true;
|
networking.wireless.enable = true;
|
||||||
networking.networkmanager.enable = true;
|
networking.networkmanager.enable = true;
|
||||||
|
|
@ -65,7 +62,11 @@
|
||||||
users.users.user = {
|
users.users.user = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
description = "user";
|
description = "user";
|
||||||
extraGroups = [ "networkmanager" "wheel" "video" ];
|
extraGroups = [
|
||||||
|
"networkmanager"
|
||||||
|
"wheel"
|
||||||
|
"video"
|
||||||
|
];
|
||||||
packages = with pkgs; [ ];
|
packages = with pkgs; [ ];
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGHadFhDCUU/ta3p1FQgpm7NExHkyHNrJbNJP6np5w9 kempinger@ins.jku.at"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINGHadFhDCUU/ta3p1FQgpm7NExHkyHNrJbNJP6np5w9 kempinger@ins.jku.at"
|
||||||
|
|
@ -79,6 +80,18 @@
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
security.sudo.extraRules = [
|
||||||
|
{
|
||||||
|
users = [ "user" ];
|
||||||
|
commands = [
|
||||||
|
{
|
||||||
|
command = "/run/current-system/sw/bin/systemctl restart cage-tty1.service";
|
||||||
|
options = [ "NOPASSWD" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
@ -89,154 +102,57 @@
|
||||||
kmsxx
|
kmsxx
|
||||||
libinput
|
libinput
|
||||||
vlc
|
vlc
|
||||||
jq
|
|
||||||
sway
|
|
||||||
ffmpeg
|
ffmpeg
|
||||||
python3
|
python3
|
||||||
|
jq
|
||||||
|
bash
|
||||||
|
|
||||||
(pkgs.writeScriptBin "run-on-output" ''
|
(pkgs.writeScriptBin "kiosk-run" ''
|
||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
# Usage: run-on-output <index> <command...>
|
set -euo pipefail
|
||||||
# Example: run-on-output 1 firefox --kiosk https://example.com
|
|
||||||
# run-on-output 2 vlc --fullscreen /path/to/video.mp4
|
|
||||||
|
|
||||||
set -euo pipefail
|
if [[ $# -lt 1 ]]; then
|
||||||
|
echo "Usage: kiosk-run <command...>" >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $# -lt 2 ]]; then
|
echo "Setting command: $*"
|
||||||
echo "Usage: run-on-output <index> <command...>" >&2
|
echo "$*" > /etc/cage/current-cmd
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
IDX="$1"
|
echo "Restarting cage..."
|
||||||
shift
|
sudo systemctl kill cage-tty1.service
|
||||||
|
sudo systemctl start cage-tty1.service
|
||||||
|
|
||||||
MYUID=$(id -u)
|
echo "Done."
|
||||||
SOCK=$(ls /run/user/"$MYUID"/sway-ipc.* 2>/dev/null | head -n1)
|
'')
|
||||||
if [[ -z "$SOCK" ]]; then
|
|
||||||
echo "Error: no sway IPC socket found for uid $MYUID" >&2
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
export SWAYSOCK="$SOCK"
|
|
||||||
|
|
||||||
# Inherit Wayland env from the running sway instance
|
|
||||||
export WAYLAND_DISPLAY=$(${pkgs.sway}/bin/swaymsg -t get_version -r \
|
|
||||||
| ${pkgs.jq}/bin/jq -r '.loaded_config_file' 2>/dev/null \
|
|
||||||
| xargs -I{} sh -c 'echo "wayland-1"' 2>/dev/null || echo "wayland-1")
|
|
||||||
export XDG_RUNTIME_DIR="/run/user/$MYUID"
|
|
||||||
|
|
||||||
OUT=$(${pkgs.sway}/bin/swaymsg -t get_outputs -r \
|
|
||||||
| ${pkgs.jq}/bin/jq -r ".[$((IDX-1))].name")
|
|
||||||
|
|
||||||
if [[ "$OUT" == "null" || -z "$OUT" ]]; then
|
|
||||||
echo "Error: no output found at index $IDX" >&2
|
|
||||||
${pkgs.sway}/bin/swaymsg -t get_outputs -r \
|
|
||||||
| ${pkgs.jq}/bin/jq -r '.[].name' | nl -v1 -ba >&2
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Launching on output $IDX ($OUT): $*"
|
|
||||||
|
|
||||||
# Workspace management only — no exec via swaymsg
|
|
||||||
${pkgs.sway}/bin/swaymsg "[workspace=$IDX] kill" 2>/dev/null || true
|
|
||||||
sleep 0.3
|
|
||||||
${pkgs.sway}/bin/swaymsg "workspace $IDX; move workspace to output $OUT"
|
|
||||||
|
|
||||||
# Launch directly — inherits full PATH and Wayland env from this shell
|
|
||||||
nohup "$@" >> /tmp/run-on-output-$IDX.log 2>&1 &
|
|
||||||
|
|
||||||
echo "Launched PID $! on workspace $IDX ($OUT)"
|
|
||||||
'')
|
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.firefox.enable = true;
|
programs.firefox.enable = true;
|
||||||
|
|
||||||
# ── Sway: multi-monitor Wayland compositor ─────────────────────────────────
|
# writable by the kiosk user at runtime
|
||||||
programs.sway = {
|
environment.etc."cage/current-cmd" = {
|
||||||
enable = true;
|
mode = "0777";
|
||||||
wrapperFeatures.gtk = true;
|
text = "ls -al";
|
||||||
};
|
};
|
||||||
|
|
||||||
# Script that runs inside the sway session.
|
systemd.services.cage-tty1 = {
|
||||||
# It detects every active output, pins a numbered workspace to each,
|
serviceConfig = {
|
||||||
# then launches one VLC per workspace (→ per monitor).
|
Restart = "always";
|
||||||
environment.etc."sway/kiosk-start.sh" = {
|
RestartSec = "1s";
|
||||||
mode = "0755";
|
TimeoutStopSec = "1";
|
||||||
text = ''
|
TimeoutAbortSec = "5";
|
||||||
#!/usr/bin/env bash
|
KillSignal = "SIGKILL";
|
||||||
exec >> /tmp/kiosk-start.log 2>&1
|
|
||||||
echo "[$(date)] kiosk-start.sh running"
|
|
||||||
sleep 2 # give sway more time to settle
|
|
||||||
|
|
||||||
readarray -t outputs < <(
|
|
||||||
${pkgs.sway}/bin/swaymsg -t get_outputs \
|
|
||||||
| ${pkgs.jq}/bin/jq -r '.[] | select(.active) | .name'
|
|
||||||
)
|
|
||||||
|
|
||||||
echo "[$(date)] Found outputs: ''${outputs[*]}"
|
|
||||||
|
|
||||||
# for i in "''${!outputs[@]}"; do
|
|
||||||
# ws=$(( i + 1 ))
|
|
||||||
# output="''${outputs[$i]}"
|
|
||||||
# echo "[$(date)] Launching VLC on output $output (workspace $ws)"
|
|
||||||
|
|
||||||
# ${pkgs.sway}/bin/swaymsg "workspace $ws output $output"
|
|
||||||
# ${pkgs.sway}/bin/swaymsg "workspace $ws"
|
|
||||||
# ${pkgs.sway}/bin/swaymsg "exec ${pkgs.firefox}/bin/firefox"
|
|
||||||
# sleep 0.5
|
|
||||||
# done
|
|
||||||
|
|
||||||
echo "[$(date)] Done"
|
|
||||||
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
# # Minimal sway config for the kiosk session
|
|
||||||
# environment.etc."sway/kiosk.conf".text = ''
|
|
||||||
# output * bg #000000 solid_color
|
|
||||||
# default_border none
|
|
||||||
# hide_edge_borders both
|
|
||||||
|
|
||||||
# input * {
|
|
||||||
# xkb_layout de
|
|
||||||
# }
|
|
||||||
|
|
||||||
# for_window [app_id="vlc"] fullscreen enable, inhibit_idle open
|
|
||||||
# for_window [class="vlc"] fullscreen enable, inhibit_idle open
|
|
||||||
# for_window [title="VLC.*"] fullscreen enable, inhibit_idle open
|
|
||||||
|
|
||||||
# exec /etc/sway/kiosk-start.sh
|
|
||||||
# '';
|
|
||||||
|
|
||||||
# Minimal sway config for the kiosk session
|
|
||||||
environment.etc."sway/kiosk.conf".text = ''
|
|
||||||
output * bg #000000 solid_color
|
|
||||||
default_border none
|
|
||||||
hide_edge_borders both
|
|
||||||
|
|
||||||
input * {
|
|
||||||
xkb_layout de
|
|
||||||
}
|
|
||||||
|
|
||||||
exec /etc/sway/kiosk-start.sh
|
|
||||||
'';
|
|
||||||
|
|
||||||
environment.sessionVariables = {
|
|
||||||
QT_QPA_PLATFORM = "wayland";
|
|
||||||
WLR_NO_HARDWARE_CURSORS = "1";
|
|
||||||
};
|
|
||||||
|
|
||||||
# ── greetd: replaces cage, autologins user and starts sway ─────────────────
|
|
||||||
services.greetd = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
default_session = {
|
|
||||||
command = "${pkgs.sway}/bin/sway --config /etc/sway/kiosk.conf";
|
|
||||||
user = "user";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# ── SSH ─────────────────────────────────────────────────────────────────────
|
services.cage = {
|
||||||
|
enable = true;
|
||||||
|
user = "user";
|
||||||
|
program = "/etc/cage/current-cmd";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.getty.loginProgram = "${pkgs.coreutils}/bin/true";
|
||||||
|
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
|
@ -246,7 +162,9 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
nix.settings.experimental-features = [
|
||||||
|
"nix-command"
|
||||||
|
"flakes"
|
||||||
|
];
|
||||||
system.stateVersion = "25.11";
|
system.stateVersion = "25.11";
|
||||||
}
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue