+6
-6
.envrc
+6
-6
.envrc
···-source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.0.6/direnvrc" "sha256-RYcUJaRMf8oF5LznDrlCXbkOQrywm0HDv1VjYGaJGdM="+source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.1.0/direnvrc" "sha256-yMJ2OVMzrFaDPn7q8nCBZFRYpL/f0RcHzhmw/i6btJM="
+31
.nvim.lua
+31
.nvim.lua
···+expr = "(builtins.getFlake (builtins.toString ./.)).nixosConfigurations.zaphod.options.home-manager.users.type.getSubOptions []",+exper = "(pkgs.lib.evalModules { modules = (builtins.getFlake (builtins.toString ./.)).nixosModules; }).options",
+1
.shellcheckrc
+1
.shellcheckrc
···
+4
-2
Justfile
+4
-2
Justfile
···
+30
-18
README.md
+30
-18
README.md
···-This is PyroNet's (relatively) production-grade NixOS config repo. It contains configurations for 3 different machines, as well as `home-manager` configurations.-I try to keep the configuration organized. All home-manager related items go in `/home`, host configurations go in `/hosts`, and custom packages are in `/pkgs`, among other folders.+This is PyroNet's (relatively) production-grade NixOS config repo. It contains configurations for 3 different machines,-* [My blog](https://blog.pyrox.dev), and the [root domain](https://pyrox.dev) which are served by [OMG.LOL](https://omg.lol).-I highly recommend their services, as you get a great domain name at a company that cares about you. If you do sign up, consider using [my referral link](https://omg.lol?refer=py), as I get 3 months of service credit if you sign up through it.+I try to keep the configuration organized. All home-manager related items go in `/home`, host configurations go in+- [My blog](https://blog.pyrox.dev), and the [root domain](https://pyrox.dev) which are served by+[OMG.LOL](https://omg.lol). I highly recommend their services, as you get a great domain name at a company that cares+about you. If you do sign up, consider using [my referral link](https://omg.lol?refer=py), as I get 3 months of-* A Tailscale tunnel from `marvin` to `prefect` which allows me to run services on `marvin` while having them be externally accessible.-* Email services for my domains, also run on `prefect`, with all email data backed up hourly to `marvin`, ensuring data reliability.+- A Tailscale tunnel from `marvin` to `prefect` which allows me to run services on `marvin` while having them be+- Email services for my domains, also run on `prefect`, with all email data backed up hourly to `marvin`, ensuring data-If you have any questions about any of the services I run, or would like to reach out, my contact info is on my profile [here](https://pyrox.dev)+If you have any questions about any of the services I run, or would like to reach out, my contact info is on my profile+Copyright (c) 2023 Pyrox and PyroNet. All rights reserved. This Source Code Form is subject to the terms of the Mozilla+Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at
-2
TODO.md
-2
TODO.md
···- https://github.com/felschr/nixos-config/blob/main/services/immich.nix for an example of how to do it
+7
devShells/default/default.nix
+7
devShells/default/default.nix
···
+1
-4
devShells/default.nix
+1
-4
devShells/default.nix
+145
-110
flake.lock
+145
-110
flake.lock
···················································-"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"-"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"···············-"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre885943.e99366c665bd/nixexprs.tar.xz"+"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre904683.23258e03aaa4/nixexprs.tar.xz"···············
+33
-3
flake.nix
+33
-3
flake.nix
···············
+1
-1
homeModules/profiles/base/default.nix
+1
-1
homeModules/profiles/base/default.nix
+7
-1
homeModules/profiles/cli/rbw-config.json
+7
-1
homeModules/profiles/cli/rbw-config.json
+14
-11
homeModules/profiles/desktop/default.nix
+14
-11
homeModules/profiles/desktop/default.nix
······
+8
-2
homeModules/programs/caelestia/caelestia-cli.json
+8
-2
homeModules/programs/caelestia/caelestia-cli.json
······
+1
-2
homeModules/programs/caelestia/caelestia-shell.json
+1
-2
homeModules/programs/caelestia/caelestia-shell.json
+2
homeModules/programs/default.nix
+2
homeModules/programs/default.nix
+6
-4
homeModules/programs/git/default.nix
+6
-4
homeModules/programs/git/default.nix
···
+1
-1
homeModules/programs/helix/default.nix
+1
-1
homeModules/programs/helix/default.nix
+6
-6
homeModules/programs/neovim/default.nix
+6
-6
homeModules/programs/neovim/default.nix
···
+2
-3
homeModules/wayland/default.nix
+2
-3
homeModules/wayland/default.nix
······# Per https://nix-community.github.io/home-manager/options.xhtml#opt-wayland.windowManager.hyprland.package
+1
-1
homeModules/wayland/hypridle.nix
+1
-1
homeModules/wayland/hypridle.nix
+2
-2
homeModules/wayland/settings.nix
+2
-2
homeModules/wayland/settings.nix
···
+3
hosts/default.nix
+3
hosts/default.nix
+4
-5
hosts/marvin/default.nix
+4
-5
hosts/marvin/default.nix
······
+3
hosts/marvin/services/anubis.nix
+3
hosts/marvin/services/anubis.nix
······
-92
hosts/marvin/services/authentik.nix
-92
hosts/marvin/services/authentik.nix
···
-5
hosts/marvin/services/bookstack.nix
-5
hosts/marvin/services/bookstack.nix
+1
-1
hosts/marvin/services/gdq-cals.nix
+1
-1
hosts/marvin/services/gdq-cals.nix
···+ExecStart = "${lib.getExe pyWithLibs} gdq_cal_ics_exporter.py --fatales --gcal --disable_general";
+5
-5
hosts/marvin/services/git.nix
+5
-5
hosts/marvin/services/git.nix
·········
-7
hosts/marvin/services/golink.nix
-7
hosts/marvin/services/golink.nix
+4
-4
hosts/marvin/services/grafana.nix
+4
-4
hosts/marvin/services/grafana.nix
······
-97
hosts/marvin/services/iceshrimp.nix
-97
hosts/marvin/services/iceshrimp.nix
···
+223
hosts/marvin/services/immich-config.json
+223
hosts/marvin/services/immich-config.json
···
+51
hosts/marvin/services/immich.nix
+51
hosts/marvin/services/immich.nix
···
-2
hosts/marvin/services/miniflux.nix
-2
hosts/marvin/services/miniflux.nix
······
-11
hosts/marvin/services/minio.nix
-11
hosts/marvin/services/minio.nix
+1
-1
hosts/marvin/services/nextcloud/office.nix
+1
-1
hosts/marvin/services/nextcloud/office.nix
+1
-1
hosts/marvin/services/pinchflat.nix
+1
-1
hosts/marvin/services/pinchflat.nix
-130
hosts/marvin/services/pingvin-share.nix
-130
hosts/marvin/services/pingvin-share.nix
···
+97
-30
hosts/marvin/services/planka.nix
+97
-30
hosts/marvin/services/planka.nix
···
-2
hosts/marvin/services/pocket-id.nix
-2
hosts/marvin/services/pocket-id.nix
+23
-23
hosts/marvin/services/postgres.nix
+23
-23
hosts/marvin/services/postgres.nix
······-ExecStart = "${cfg.package}/bin/vacuumdb --all --echo --jobs=6 --parallel=5 --analyze --verbose";+# ExecStart = "${cfg.package}/bin/vacuumdb --all --echo --jobs=6 --parallel=5 --analyze --verbose";
-14
hosts/marvin/services/prosody.nix
-14
hosts/marvin/services/prosody.nix
-12
hosts/marvin/services/redlib.nix
-12
hosts/marvin/services/redlib.nix
+1
-1
hosts/marvin/services/scrutiny.nix
+1
-1
hosts/marvin/services/scrutiny.nix
-23
hosts/marvin/services/secrets/iceshrimp-db-password.age
-23
hosts/marvin/services/secrets/iceshrimp-db-password.age
···
hosts/marvin/services/secrets/iceshrimp-secret-config.age
hosts/marvin/services/secrets/iceshrimp-secret-config.age
This is a binary file and will not be displayed.
+19
hosts/marvin/services/secrets/immich/mail-pw.age
+19
hosts/marvin/services/secrets/immich/mail-pw.age
···
+19
hosts/marvin/services/secrets/immich/oauth-secret.age
+19
hosts/marvin/services/secrets/immich/oauth-secret.age
···
-20
hosts/marvin/services/secrets/pingvin-secrets.age
-20
hosts/marvin/services/secrets/pingvin-secrets.age
···
+2
-3
hosts/marvin/services/secrets/secrets.nix
+2
-3
hosts/marvin/services/secrets/secrets.nix
···
+27
-23
hosts/marvin/services/tangled.nix
+27
-23
hosts/marvin/services/tangled.nix
···
+2
-27
hosts/marvin/services/vaultwarden.nix
+2
-27
hosts/marvin/services/vaultwarden.nix
·····················systemd.services.vaultwarden.environment.PGPASSFILE = config.age.secrets.vaultwarden-pgpass.path;
-23
hosts/marvin/services/webmentiond.nix
-23
hosts/marvin/services/webmentiond.nix
···
+4
-4
hosts/prefect/bootloader.nix
+4
-4
hosts/prefect/bootloader.nix
···
+2
-1
hosts/prefect/default.nix
+2
-1
hosts/prefect/default.nix
-109
hosts/prefect/dn42/bgp.nix
-109
hosts/prefect/dn42/bgp.nix
···
-315
hosts/prefect/dn42/bird.conf
-315
hosts/prefect/dn42/bird.conf
···-else if (64511, 22) ~ bgp_community then { bgp_community.delete([(64511, 23..29)]); return 22; }-else if (64511, 23) ~ bgp_community then { bgp_community.delete([(64511, 24..29)]); return 23; }-else if (64511, 24) ~ bgp_community then { bgp_community.delete([(64511, 25..29)]); return 24; }-else if (64511, 25) ~ bgp_community then { bgp_community.delete([(64511, 26..29)]); return 25; }-else if (64511, 26) ~ bgp_community then { bgp_community.delete([(64511, 27..29)]); return 26; }-else if (64511, 27) ~ bgp_community then { bgp_community.delete([(64511, 28..29)]); return 27; }-else if (64511, 28) ~ bgp_community then { bgp_community.delete([(64511, 29..29)]); return 28; }-else if (64511, 32) ~ bgp_community then { bgp_community.delete([(64511, 33..34)]); return 32; }-else if (64511, 33) ~ bgp_community then { bgp_community.delete([(64511, 34..34)]); return 33; }-if (is_valid_network() && !is_self_net()) || (is_valid_network_v6() && !is_self_net_v6()) then {-if roa_check(dn42_roa, net, bgp_path.last) != ROA_VALID && roa_check(dn42_roa_v6, net, bgp_path.last) != ROA_VALID then {-# if roa_check(dn42_roa, net, bgp_path.last) != ROA_VALID && roa_check(dn42_roa_v6, net, bgp_path.last) != ROA_VALID then {
+56
-20
hosts/prefect/dn42/default.nix
+56
-20
hosts/prefect/dn42/default.nix
···
+25
hosts/prefect/dn42/peers/bandura.nix
+25
hosts/prefect/dn42/peers/bandura.nix
···
+26
hosts/prefect/dn42/peers/catgirls.nix
+26
hosts/prefect/dn42/peers/catgirls.nix
···
+26
hosts/prefect/dn42/peers/chrismoos.nix
+26
hosts/prefect/dn42/peers/chrismoos.nix
···
+29
hosts/prefect/dn42/peers/darkpoint.nix
+29
hosts/prefect/dn42/peers/darkpoint.nix
···
+23
hosts/prefect/dn42/peers/default.nix
+23
hosts/prefect/dn42/peers/default.nix
···
+26
hosts/prefect/dn42/peers/iedon.nix
+26
hosts/prefect/dn42/peers/iedon.nix
···
+27
hosts/prefect/dn42/peers/kioubit.nix
+27
hosts/prefect/dn42/peers/kioubit.nix
···
+25
hosts/prefect/dn42/peers/lare.nix
+25
hosts/prefect/dn42/peers/lare.nix
···
+26
hosts/prefect/dn42/peers/potato.nix
+26
hosts/prefect/dn42/peers/potato.nix
···
+26
hosts/prefect/dn42/peers/prefixlabs.nix
+26
hosts/prefect/dn42/peers/prefixlabs.nix
···
+26
hosts/prefect/dn42/peers/routedbits.nix
+26
hosts/prefect/dn42/peers/routedbits.nix
···
+26
hosts/prefect/dn42/peers/sunnet.nix
+26
hosts/prefect/dn42/peers/sunnet.nix
···
+26
hosts/prefect/dn42/peers/uffsalot.nix
+26
hosts/prefect/dn42/peers/uffsalot.nix
···
-71
hosts/prefect/dn42/services.nix
-71
hosts/prefect/dn42/services.nix
···-${pkgs.curl}/bin/curl -sfSLR {-o,-z}/etc/bird/roa_dn42_v6.conf https://dn42.burble.com/roa/dn42_roa_bird2_6.conf-${pkgs.curl}/bin/curl -sfSLR {-o,-z}/etc/bird/roa_dn42.conf https://dn42.burble.com/roa/dn42_roa_bird2_4.conf-"\n ipv4 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "-"\n ipv6 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "
-86
hosts/prefect/dn42/tunnels.nix
-86
hosts/prefect/dn42/tunnels.nix
···
+63
hosts/prefect/dn42/types.nix
+63
hosts/prefect/dn42/types.nix
···
-59
hosts/prefect/dn42/wireguard.nix
-59
hosts/prefect/dn42/wireguard.nix
···-listenPort: privKeyFile: peerPubKey: endpoint: name: peerIPv4: peerIPv6: localIPv4: localIPv6: isOspf: {-+ lib.optionalString isOspf "${pkgs.iproute2}/bin/ip -6 addr add ${defaultLocalIPv6} dev ${name}";-customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 localIPv4 localIPv6-customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 defaultLocalIPv4
+2
-17
hosts/prefect/firewall.nix
+2
-17
hosts/prefect/firewall.nix
···
-1
hosts/prefect/secrets/secrets.nix
-1
hosts/prefect/secrets/secrets.nix
···yubi-back = "ssh-rsa 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";
+13
-18
hosts/prefect/services/caddy.nix
+13
-18
hosts/prefect/services/caddy.nix
············
-1
hosts/prefect/services/mailserver/default.nix
-1
hosts/prefect/services/mailserver/default.nix
···
-1
hosts/prefect/services/tailscale.nix
-1
hosts/prefect/services/tailscale.nix
-10
hosts/thought/secrets/secrets.nix
-10
hosts/thought/secrets/secrets.nix
···-yubi-back = "ssh-rsa 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";-backup = "ssh-rsa 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";
+2
hosts/zaphod/hardware.nix
+2
hosts/zaphod/hardware.nix
+6
-8
hosts/zaphod/packages.nix
+6
-8
hosts/zaphod/packages.nix
···
+1
-1
hosts/zaphod/services/fprintd.nix
+1
-1
hosts/zaphod/services/fprintd.nix
-1
hosts/zaphod/services/greeter.nix
-1
hosts/zaphod/services/greeter.nix
+1
-2
hosts/zaphod/services/misc.nix
+1
-2
hosts/zaphod/services/misc.nix
···+(lib.versionOlder (lib.versions.majorMinor lib.version) "21.05") || !config.services.power-profiles-daemon.enable
+7
lib/data/services.toml
+7
lib/data/services.toml
···# tsHost: (optional) What Tailscale host this service will run on, for services only available via Tailscale.# # Should only be set if this is available externally, if at all, since TS-only services aren't able to be scraped.···
+1
-4
lib/default.nix
+1
-4
lib/default.nix
+1
-1
lib/deploy/default.nix
+1
-1
lib/deploy/default.nix
+5
-2
nixosModules/default-config/default.nix
+5
-2
nixosModules/default-config/default.nix
···
+2
-4
nixosModules/default-config/nixConfig.nix
+2
-4
nixosModules/default-config/nixConfig.nix
······
-1
nixosModules/default-config/programs/default.nix
-1
nixosModules/default-config/programs/default.nix
-8
nixosModules/default-config/programs/nh.nix
-8
nixosModules/default-config/programs/nh.nix
+8
-5
nixosModules/default-config/security.nix
+8
-5
nixosModules/default-config/security.nix
······
+3
-4
nixosModules/default.nix
+3
-4
nixosModules/default.nix
···
+125
nixosModules/dn42Wireguard/default.nix
+125
nixosModules/dn42Wireguard/default.nix
···+) "${pkgs.iproute2}/bin/ip addr add ${fc.localAddrs.v4} peer ${fc.peerAddrs.v4} dev wg42_${name}"}+) "${pkgs.iproute2}/bin/ip addr add ${fc.localAddrs.v6} peer ${fc.peerAddrs.v6} dev wg42_${name}"}+trustedInterfaces = lib.mapAttrsToList (name: _: "wg42_" + name) (lib.filterAttrs (_: v: v.enable) cfg.tunnels);
+1
-1
nixosModules/homes/pyrox/default.nix
+1
-1
nixosModules/homes/pyrox/default.nix
+1
-1
nixosModules/homes/thehedgehog/default.nix
+1
-1
nixosModules/homes/thehedgehog/default.nix
+2
nixosModules/homes/thehedgehog-zaphod/default.nix
+2
nixosModules/homes/thehedgehog-zaphod/default.nix
-2
nixosModules/programs/firefox/extensions.nix
-2
nixosModules/programs/firefox/extensions.nix
···
+4
-6
nixosModules/programs/misc/default.nix
+4
-6
nixosModules/programs/misc/default.nix
···
+1
-3
nixosModules/services/forgejo-runner/default.nix
+1
-3
nixosModules/services/forgejo-runner/default.nix
······
+4
optnix.toml
+4
optnix.toml
+1
-1
overlays/cinny/default.nix
+1
-1
overlays/cinny/default.nix
+1
-1
overlays/hy3-fixes/default.nix
+1
-1
overlays/hy3-fixes/default.nix
+1
-1
overlays/openssh-fixperms/default.nix
+1
-1
overlays/openssh-fixperms/default.nix
-20
packages/anubis-files/default.nix
-20
packages/anubis-files/default.nix
···
+20
packages/anubis-files/package.nix
+20
packages/anubis-files/package.nix
···
+56
packages/anubis-files/src/policies/default.yaml
+56
packages/anubis-files/src/policies/default.yaml
···
+59
-6
packages/anubis-files/src/policies/forgejo.yaml
+59
-6
packages/anubis-files/src/policies/forgejo.yaml
···
-7
packages/anubis-files/src/policies/grafana.yaml
-7
packages/anubis-files/src/policies/grafana.yaml
+54
packages/anubis-files/src/policies/meta/base.yaml
+54
packages/anubis-files/src/policies/meta/base.yaml
···+- '( userAgent.contains("Firefox") ) || ( userAgent.contains("Chrome") ) || ( userAgent.contains("Safari") )'+- '( headers["Accept-Encoding"].contains("zstd") || headers["Accept-Encoding"].contains("br") )'
packages/anubis-files/src/policies/meta/openGraph.yaml
packages/anubis-files/src/policies/meta/openGraph.yaml
This is a binary file and will not be displayed.
-7
packages/anubis-files/src/policies/miniflux.yaml
-7
packages/anubis-files/src/policies/miniflux.yaml
+50
-7
packages/anubis-files/src/policies/nextcloud-office.yaml
+50
-7
packages/anubis-files/src/policies/nextcloud-office.yaml
···
+54
-12
packages/anubis-files/src/policies/nextcloud.yaml
+54
-12
packages/anubis-files/src/policies/nextcloud.yaml
······
-7
packages/anubis-files/src/policies/pingvin-share.yaml
-7
packages/anubis-files/src/policies/pingvin-share.yaml
-7
packages/anubis-files/src/policies/planka.yaml
-7
packages/anubis-files/src/policies/planka.yaml
-7
packages/anubis-files/src/policies/pocket-id.yaml
-7
packages/anubis-files/src/policies/pocket-id.yaml
+54
-7
packages/anubis-files/src/policies/vaultwarden.yaml
+54
-7
packages/anubis-files/src/policies/vaultwarden.yaml
······
-828
packages/anubis-files/src/rules/block/alibaba-cloud.yaml
-828
packages/anubis-files/src/rules/block/alibaba-cloud.yaml
···
-4
packages/anubis-files/src/rules/challenge/generic-browser.yaml
-4
packages/anubis-files/src/rules/challenge/generic-browser.yaml
+26
packages/bgutil-pot-server/librusty_v8.nix
+26
packages/bgutil-pot-server/librusty_v8.nix
···+url = "https://github.com/denoland/rusty_v8/releases/download/v${args.version}/librusty_v8_release_${stdenv.hostPlatform.rust.rustcTarget}.a";
+49
packages/bgutil-pot-server/package.nix
+49
packages/bgutil-pot-server/package.nix
···+changelog = "https://github.com/jim60105/bgutil-ytdlp-pot-provider-rs/releases/tag/v${finalAttrs.version}";
+45
packages/bgutil-pot-server/update-librusty.sh
+45
packages/bgutil-pot-server/update-librusty.sh
···+BGUTIL_LATEST_VERSION=$(curl ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} --silent --fail --location "https://api.github.com/repos/jim60105/bgutil-ytdlp-pot-provider-rs/releases/latest" | jq --raw-output .tag_name)+CARGO_LOCK=$(curl ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} --silent --fail --location "https://github.com/jim60105/bgutil-ytdlp-pot-provider-rs/raw/$BGUTIL_LATEST_VERSION/Cargo.lock")+NEW_VERSION=$(echo "$CARGO_LOCK" | grep --after-context 5 'name = "v8"' | grep 'version =' | sed -E 's/version = "//;s/"//')+x86Hash="$(nix-prefetch-url --type sha256 https://github.com/denoland/rusty_v8/releases/download/v"$NEW_V")"
-31
packages/default.nix
-31
packages/default.nix
···
-24
packages/doc2dash/default.nix
-24
packages/doc2dash/default.nix
···
+34
packages/doc2dash/package.nix
+34
packages/doc2dash/package.nix
···
+147
packages/glide-browser-bin/package.nix
+147
packages/glide-browser-bin/package.nix
···+url = "https://github.com/glide-browser/glide/releases/download/${finalAttrs.version}/glide.linux-x86_64.tar.xz";+description = "Extensible and keyboard-focused web browser, based on Firefox (binary package)";
-34
packages/jellyfin-exporter/default.nix
-34
packages/jellyfin-exporter/default.nix
···-# We need to patch the tests since we don't move the binary to `$GOPATH/bin`, but to `$out/bin` instead.-changelog = "https://github.com/rebelcore/jellyfin_exporter/blob/v${finalAttrs.version}/CHANGELOG.md";
+34
packages/jellyfin-exporter/package.nix
+34
packages/jellyfin-exporter/package.nix
···+# We need to patch the tests since we don't move the binary to `$GOPATH/bin`, but to `$out/bin` instead.+changelog = "https://github.com/rebelcore/jellyfin_exporter/blob/v${finalAttrs.version}/CHANGELOG.md";
-19
packages/pingvin-share-config/default.nix
-19
packages/pingvin-share-config/default.nix
···
+138
packages/planka/package.nix
+138
packages/planka/package.nix
···+--replace-fail 'compilerCommand = (() => {' 'compilerCommand = (() => { return ["${lib.getExe dart-sass}"];'
+26
packages.nix
+26
packages.nix
···