{ lib, pkgs, homeage, ... }: { home.username = "$USER"; home.homeDirectory = "/home/$USER"; home.stateVersion = "22.11"; home.activation = { checkBemenuDraculaInZshDir = lib.hm.dag.entryAfter ["writeBoundary"] '' $DRY_RUN_CMD test -d .zsh/bemenu-dracula || echo "TODO: link bemenu-dracula to .zsh" ''; }; homeage = { # Absolute path to identity (created not through home-manager) identityPaths = [ "~/.ssh/theEd" ]; # "activation" if system doesn't support systemd installationType = "activation"; file."sops-age-keys.txt" = { # Path to encrypted file tracked by the git repository source = ./secrets/sops-keys.age; # can be "copies" or "symlink" symlinks = [".config/sops/age/keys.txt"]; }; }; # build a configuration and switch: # ➜ home-manager switch --no-out-link -b backup --flake~/utils/dotfiles#$USER # instead, install with: # nix profile install --priority 0 home-manager # hit the issue described here, waiting until resolved: # https://github.com/nix-community/home-manager/issues/2848 programs.home-manager.enable = false; programs.home-manager.path = "$HOME/utils/dotfiles"; imports = [ ./nix/programs.nix ]; home.file = { ".config/kitty/kitty.conf" = { source = .config/kitty/kitty.conf; }; # begin zsh-related. ".zshenv" = { source = ./.zshenv; }; ".zsh/aliases.zsh" = { source = .zsh/aliases.zsh; }; ".zsh/functions.zsh" = { source = .zsh/functions.zsh; }; # end zsh-related. ".cargo/config.toml" = { source = .cargo/config.toml; }; ".config/swaylock/config" = { source = .config/swaylock/config; }; ".config/tridactyl/tridactylrc" = { source = .config/tridactyl/tridactylrc; }; ".local/bin/battery.sh" = { source = bin/battery.sh; executable = true; }; ".local/bin/localbsync" = { source = bin/localbsync; executable = true; }; ".local/bin/mgp" = { source = bin/mgp; executable = true; }; ".local/bin/parec-wr" = { source = bin/parec-wr; executable = true; }; ".local/bin/pscbg" = { source = bin/pscbg; executable = true; }; ".local/bin/qst_up" = { source = bin/qst_up; executable = true; }; ".local/bin/v4l2pls" = { source = bin/v4l2pls; executable = true; }; ".local/bin/winprint.sh" = { source = bin/winprint.sh; executable = true; }; ".local/bin/authenticator.sh" = { text = '' #!/bin/sh # adopted from https://wiki.archlinux.org/index.php/Google_Authenticator # This is the path to the Google Authenticator app file. It's typically located # in /data under Android. Copy it to your PC in a safe location and specify the # path to it here. #DB="/path/to/com.google.android.apps.authenticator/databases/databases" DB="$1" if [ $# -ne 1 ]; then printf "authenticator\n" printf "usage: authenticator \n" printf "\tThis is the path to the Authenticator app owned SQLite db file.\n" printf "\tCopy it to your PC to a safe location and specify the path to it here.\n" exit 1 fi # On most Android systems with sufficient user access, the Google Authenticator # database can be copied off the device and accessed directly, as it is an # sqlite3 database. This shell script will read a Google Authenticator database # and generate live codes for each key found: sqlite3 "$DB" 'SELECT email,secret FROM accounts;' | while read A do NAME=`echo "$A" | cut -d '|' -f 1` KEY=`echo "$A" | cut -d '|' -f 2` CODE=`oathtool --totp -b "$KEY"` echo -e "\e[1;32m$CODE\e[0m - \e[1;33m$NAME\e[0m" done ''; executable = true; }; ".local/bin/createarchive.sh" = { text = '' #!/bin/bash if [ $# -ne 1 ]; then printf "createarchive\n" printf "usage: createarchive \n" printf "warning: the archive will be moved to "backups" directory (`echo $dest`)\n" exit 1 fi # what this does in short: tar, compress, timestamp, shred the tar, mv .xz to pwd and display it logdate="$(date +%Y%m%dT%H%M%S)" basedir="$1" tmpdir=$(mktemp -d "${TMPDIR:-/tmp/}$(basename $0).XXXXXXXXXX") #/run/user/$(id -u) tmpfs 0700 perms f="`cd $basedir; pwd | tr '/' ' ' | sed 's/^.* / /' | cut -c2-`" > /dev/null g="$logdate-$f.tar" dest=~/MEGA/Private/backups doathing() { cd $basedir/.. tar cfv "$tmpdir/$g" "$f" && \ xz -vzk9e "$tmpdir/$g" -S .xz && \ rsync -avP "$tmpdir/$g.xz" "$dest" && \ shred -zuv "$tmpdir/$g" "$tmpdir/$g.xz" && \ printf "\n" ls -latr "$dest/$g.xz" } if [ ! -d $1 ]; then echo "$1 is not a directory" exit 1 else echo `pwd` echo "$f" echo "$1" doathing trap "rm -rfv $tmpdir" 0 1 3 15 exit $? fi ''; executable = true; }; ".config/qutebrowser/userscripts/localhost" = { executable = true; text = '' #!/usr/bin/env bash export BEMENU_OPTS="--tb '#6272a4' --tf '#f8f8f2' --fb '#282a36' --ff '#f8f8f2' --nb '#282a36' --nf '#6272a4' --hb '#44475a' --hf '#50fa7b' --sb '#44475a' --sf '#50fa7b' --scb '#282a36' --scf '#ff79c6' -p 'localhost: ▶' --fork -l 5 --fn 'FiraCode Retina 17'" if [[ $1 -eq 'list' ]] && [[ -z $QUTE_COUNT ]]; then PORTS="$(ss -nltp | tail -n +2 | awk '{print $4}' | awk -F: '{print $2}')" QUTE_COUNT=$(echo "$PORTS" | bemenu -n ) fi # echo open -t localhost:''${QUTE_COUNT:-8080} > $QUTE_FIFO [ -n "$QUTE_COUNT" ] && echo open -t localhost:"''${QUTE_COUNT}" > $QUTE_FIFO ''; }; ".config/qutebrowser/userscripts/speak" = { executable = true; text = '' #!/bin/bash export IFS=$'\n' pkill -f qute_speak || { ~/.local/bin/gtts-cli "$QUTE_SELECTED_TEXT" | mpv --no-video --speed=1.26 - # ~/.local/bin/gtts-cli "$QUTE_SELECTED_TEXT" > /tmp/qute_speak.mp3 # mpv /tmp/qute_speak.mp3 } ''; }; ".config/qutebrowser/userscripts/dark_mode.user" = { executable = true; text = '' #!/bin/zsh # on a new system cp DR.js DarkReader.user.js darkreader_file="$HOME/.config/qutebrowser/greasemonkey/DarkReader.user.js" enabled="^//DarkReader.disable();" darkreader_enabled="$(grep -q -e "$enabled" $darkreader_file; echo $?)" # echo $darkreader_enabled if [[ "$(echo $darkreader_enabled)" == "1" ]]; then # enable DarkReader by commenting out the line that disables it. sed -i --follow-symlink 's/DarkReader.disable()/\/\/DarkReader.disable()/' "$darkreader_file" else # disable DarkReader sed -i --follow-symlink 's/\/\/DarkReader.disable()/DarkReader.disable()/' "$darkreader_file" fi ''; }; ".config/qutebrowser/greasemonkey/DR.js" = { text = '' // ==UserScript== // @name Dark Reader (Unofficial) // @icon https://darkreader.org/images/darkreader-icon-256x256.png // @namespace DarkReader // @description Inverts the brightness of pages to reduce eye strain // @version 4.9.52 // @author https://github.com/darkreader/darkreader#contributors // @homepageURL https://darkreader.org/ | https://github.com/darkreader/darkreader // @run-at document-end // @grant none // @exclude https://git.dotya.ml* // @exclude https://dotya.ml* // @exclude https://status.dotya.ml* // @exclude https://searxng.dotya.ml* // @exclude https://grafana.dotya.ml* // @exclude https://github.com* // @exclude https://dnswatch.com* // @exclude https://docs.immudb.io* // @exclude https://woodpecker-ci.org* // @exclude https://duckduckgo.com* // @exclude https://www.redit.com* // @exclude https://codeberg.org* // @include http* // @require https://cdn.jsdelivr.net/npm/darkreader/darkreader.min.js // @noframes // ==/UserScript== DarkReader.enable({ brightness: 105, contrast: 105, sepia: 0 }); DarkReader.disable(); ''; }; ".config/qutebrowser/userscripts/code_select.py" = { executable = true; source = .local/share/qutebrowser/userscripts/code_select.py; }; ".config/qutebrowser/userscripts/getbib" = { executable = true; source = .local/share/qutebrowser/userscripts/getbib; }; ".config/qutebrowser/userscripts/qute-gemini" = { executable = true; source = .local/share/qutebrowser/userscripts/qute-gemini; }; ".config/qutebrowser/userscripts/qute-gemini-tab" = { executable = true; source = .local/share/qutebrowser/userscripts/qute-gemini; }; ".config/qutebrowser/config.py" = { source = .config/qutebrowser/config.py; }; ".local/bin/workqb" = { text = '' #!/bin/zsh qutebrowser \ --restore work \ --config ~/.config/qutebrowser/config.py \ --basedir ~/.config/qutebrowser-work \ & disown ''; executable = true; }; # ref: https://go.dev/blog/pprof ".local/bin/xtime" = { text = '' #!/bin/sh /usr/bin/time -f '%Uu %Ss %er %MkB %C' "$@" ''; executable = true; }; }; }