2024-07-16 19:46:16 +02:00
|
|
|
|
# Edit this configuration file to define what should be installed on
|
|
|
|
|
|
# your system. Help is available in the configuration.nix(5) man page
|
|
|
|
|
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
|
|
|
|
|
2024-07-27 20:15:19 +02:00
|
|
|
|
{ pkgs, ... }:
|
2024-07-16 19:46:16 +02:00
|
|
|
|
|
2024-08-11 11:00:55 +02:00
|
|
|
|
let
|
|
|
|
|
|
sourcehut-fqdn = "sourcehut.nixos.local";
|
|
|
|
|
|
in
|
2024-07-16 19:46:16 +02:00
|
|
|
|
{
|
|
|
|
|
|
imports =
|
|
|
|
|
|
[ # Include the results of the hardware scan.
|
|
|
|
|
|
./hardware-configuration.nix
|
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
|
|
# Bootloader.
|
|
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
|
|
|
|
|
|
|
|
|
|
networking.hostName = "nixos"; # Define your hostname.
|
2024-08-11 11:00:55 +02:00
|
|
|
|
networking.extraHosts = ''
|
|
|
|
|
|
127.0.0.1 sourcehut.nixos.local
|
|
|
|
|
|
127.0.0.1 meta.sourcehut.nixos.local
|
|
|
|
|
|
127.0.0.1 man.sourcehut.nixos.local
|
|
|
|
|
|
127.0.0.1 git.sourcehut.nixos.local
|
|
|
|
|
|
'';
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
|
|
|
|
|
|
|
|
|
|
|
# Configure network proxy if necessary
|
|
|
|
|
|
# networking.proxy.default = "http://user:password@proxy:port/";
|
|
|
|
|
|
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
|
|
|
|
|
|
|
|
|
|
|
# Enable networking
|
|
|
|
|
|
networking.networkmanager.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# setup magicdns for tailscale
|
|
|
|
|
|
networking.nameservers = [ "100.100.100.100" "1.1.1.1" "8.8.8.8" ];
|
|
|
|
|
|
networking.search = [ "hummingbird-stork.ts.net" ];
|
|
|
|
|
|
|
|
|
|
|
|
# Set your time zone.
|
|
|
|
|
|
time.timeZone = "Europe/Paris";
|
|
|
|
|
|
|
|
|
|
|
|
# Select internationalisation properties.
|
|
|
|
|
|
i18n.defaultLocale = "en_US.UTF-8";
|
|
|
|
|
|
|
|
|
|
|
|
i18n.extraLocaleSettings = {
|
|
|
|
|
|
LC_ADDRESS = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_IDENTIFICATION = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_MEASUREMENT = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_MONETARY = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_NAME = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_NUMERIC = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_PAPER = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_TELEPHONE = "fr_FR.UTF-8";
|
|
|
|
|
|
LC_TIME = "fr_FR.UTF-8";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Enable the X11 windowing system.
|
|
|
|
|
|
# You can disable this if you're only using the Wayland session.
|
|
|
|
|
|
services.xserver.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Enable the KDE Plasma Desktop Environment.
|
|
|
|
|
|
services.displayManager.sddm.enable = true;
|
|
|
|
|
|
services.desktopManager.plasma6.enable = true;
|
|
|
|
|
|
|
2024-07-28 23:30:50 +02:00
|
|
|
|
# does this add river to sddm menu?
|
|
|
|
|
|
programs.river.enable = true;
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# Configure keymap in X11
|
|
|
|
|
|
services.xserver = {
|
2024-07-21 11:31:07 +02:00
|
|
|
|
layout = "fr";
|
2024-07-16 19:46:16 +02:00
|
|
|
|
xkbVariant = "";
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Configure console keymap
|
|
|
|
|
|
console.keyMap = "fr";
|
|
|
|
|
|
|
|
|
|
|
|
# Enable CUPS to print documents.
|
|
|
|
|
|
services.printing.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Enable sound with pipewire.
|
|
|
|
|
|
hardware.pulseaudio.enable = false;
|
|
|
|
|
|
security.rtkit.enable = true;
|
|
|
|
|
|
services.pipewire = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
alsa.enable = true;
|
|
|
|
|
|
alsa.support32Bit = true;
|
|
|
|
|
|
pulse.enable = true;
|
|
|
|
|
|
# If you want to use JACK applications, uncomment this
|
|
|
|
|
|
#jack.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# use the example session manager (no others are packaged yet so this is enabled by default,
|
|
|
|
|
|
# no need to redefine it in your config for now)
|
|
|
|
|
|
#media-session.enable = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Enable touchpad support (enabled default in most desktopManager).
|
|
|
|
|
|
# services.xserver.libinput.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Define a user account. Don't forget to set a password with ‘passwd’.
|
|
|
|
|
|
users.users.khais = {
|
|
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "Khaïs COLIN";
|
2024-08-10 13:57:11 +02:00
|
|
|
|
extraGroups = [ "networkmanager" "wheel" "podman" ];
|
2024-07-16 19:46:16 +02:00
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-08-05 11:40:18 +02:00
|
|
|
|
users.users.guest = {
|
|
|
|
|
|
isNormalUser = true;
|
|
|
|
|
|
description = "Guest Account";
|
|
|
|
|
|
extraGroups = [ "networkmanager" ];
|
|
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
|
|
packages = with pkgs; [
|
|
|
|
|
|
mpv
|
|
|
|
|
|
vlc
|
|
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# Install firefox.
|
|
|
|
|
|
programs.firefox.enable = true;
|
|
|
|
|
|
|
2024-07-22 20:14:52 +02:00
|
|
|
|
# chroot jail
|
|
|
|
|
|
programs.firejail.enable = true;
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# shell
|
|
|
|
|
|
programs.zsh.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Allow unfree packages
|
|
|
|
|
|
nixpkgs.config.allowUnfree = true;
|
|
|
|
|
|
|
|
|
|
|
|
# List packages installed in system profile. To search, run:
|
|
|
|
|
|
# $ nix search wget
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
|
|
neovim
|
|
|
|
|
|
home-manager
|
|
|
|
|
|
git
|
|
|
|
|
|
gnumake
|
2024-07-17 19:07:44 +02:00
|
|
|
|
cifs-utils
|
2024-07-29 12:35:03 +02:00
|
|
|
|
tailscale
|
2024-07-30 14:59:19 +02:00
|
|
|
|
wluma
|
2024-08-06 12:54:05 +02:00
|
|
|
|
# man pages
|
|
|
|
|
|
man-pages man-pages-posix
|
2024-08-07 18:02:34 +02:00
|
|
|
|
# kde
|
|
|
|
|
|
kdePackages.kate kdePackages.plasma-workspace kdePackages.dolphin
|
|
|
|
|
|
# fix kde apps having no icons
|
|
|
|
|
|
kdePackages.qtsvg
|
2024-07-16 19:46:16 +02:00
|
|
|
|
];
|
|
|
|
|
|
|
2024-07-30 09:46:43 +02:00
|
|
|
|
# set global environment variables
|
|
|
|
|
|
environment.sessionVariables = {
|
|
|
|
|
|
# I don't know what this does, but it is needed for wluma to work correctly.
|
|
|
|
|
|
# It will also slightly increase cpu usage (on wayland compositors), but shouldn't be too bad.
|
|
|
|
|
|
WLR_DRM_NO_MODIFIERS = 1;
|
2024-08-07 18:02:34 +02:00
|
|
|
|
# fix dolphin file associations not working
|
|
|
|
|
|
XDG_MENU_PREFIX = "plasma-";
|
2024-07-30 09:46:43 +02:00
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# Some programs need SUID wrappers, can be configured further or are
|
|
|
|
|
|
# started in user sessions.
|
|
|
|
|
|
# programs.mtr.enable = true;
|
|
|
|
|
|
# programs.gnupg.agent = {
|
|
|
|
|
|
# enable = true;
|
|
|
|
|
|
# enableSSHSupport = true;
|
|
|
|
|
|
# };
|
|
|
|
|
|
|
2024-07-17 19:07:44 +02:00
|
|
|
|
# automount smb music share
|
|
|
|
|
|
fileSystems."/home/khais/Music" = {
|
|
|
|
|
|
device = "//void/Music";
|
|
|
|
|
|
fsType = "cifs";
|
|
|
|
|
|
options = let
|
|
|
|
|
|
# prevent hanging when network is not reachable
|
|
|
|
|
|
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
|
|
|
|
|
|
in [ "${automount_opts},credentials=/etc/nixos/secrets/music.smb" ];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-08-05 11:42:50 +02:00
|
|
|
|
fileSystems."/home/khais/Books" = {
|
|
|
|
|
|
device = "//void/Books";
|
|
|
|
|
|
fsType = "cifs";
|
|
|
|
|
|
options = let
|
|
|
|
|
|
# prevent hanging when network is not reachable
|
|
|
|
|
|
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
|
|
|
|
|
|
in [ "${automount_opts},credentials=/etc/nixos/secrets/books.smb" ];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-27 15:03:06 +02:00
|
|
|
|
# font configuration
|
|
|
|
|
|
fonts = {
|
|
|
|
|
|
packages = with pkgs; [
|
|
|
|
|
|
nerdfonts
|
2024-08-07 12:21:58 +02:00
|
|
|
|
ibm-plex
|
|
|
|
|
|
cm_unicode
|
2024-07-27 15:03:06 +02:00
|
|
|
|
];
|
|
|
|
|
|
fontconfig = {
|
|
|
|
|
|
defaultFonts = {
|
|
|
|
|
|
monospace = [ "VictorMono NF Medium" ];
|
2024-08-07 12:21:58 +02:00
|
|
|
|
sansSerif = [ "IBM Plex Sans" ];
|
|
|
|
|
|
serif = [ "CMU Serif" ];
|
2024-07-27 15:03:06 +02:00
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
2024-07-17 19:07:44 +02:00
|
|
|
|
|
2024-07-28 14:09:28 +02:00
|
|
|
|
# fingerprint sensor setup
|
|
|
|
|
|
services.open-fprintd.enable = true;
|
|
|
|
|
|
services.python-validity.enable = true;
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# List services that you want to enable:
|
|
|
|
|
|
|
2024-07-29 12:22:12 +02:00
|
|
|
|
services.tailscale = {
|
|
|
|
|
|
enable = true;
|
2024-07-29 12:35:03 +02:00
|
|
|
|
useRoutingFeatures = "both";
|
2024-07-29 12:22:12 +02:00
|
|
|
|
extraUpFlags = [ "--ssh" ];
|
|
|
|
|
|
};
|
2024-07-16 19:46:16 +02:00
|
|
|
|
|
2024-07-30 14:59:19 +02:00
|
|
|
|
# enable wluma for automatic brightness adjustment
|
|
|
|
|
|
systemd.user.services.wluma = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
description = "Adjusting screen brightness based on screen contents and amount of ambient light";
|
|
|
|
|
|
after = [ "graphical-session.target" ];
|
|
|
|
|
|
partOf = [ "graphical-session.target" ];
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
|
|
ExecStart = "${pkgs.wluma}/bin/wluma";
|
|
|
|
|
|
Restart = "always";
|
|
|
|
|
|
};
|
|
|
|
|
|
wantedBy = [ "graphical-session.target" ];
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-08-11 11:00:55 +02:00
|
|
|
|
# enable selfhosted sourcehut instance
|
|
|
|
|
|
services.sourcehut = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
meta = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
gunicorn.extraArgs = [
|
2024-08-11 11:10:15 +02:00
|
|
|
|
"--timeout 120"
|
|
|
|
|
|
"--workers 1"
|
|
|
|
|
|
"--log-level=info"
|
|
|
|
|
|
"--bind [::1]:5000"
|
|
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
git = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
gunicorn.extraArgs = [
|
|
|
|
|
|
"--timeout 120"
|
|
|
|
|
|
"--workers 1"
|
|
|
|
|
|
"--log-level=info"
|
2024-08-11 11:12:43 +02:00
|
|
|
|
"--bind [::1]:5001"
|
2024-08-11 11:10:15 +02:00
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
man = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
gunicorn.extraArgs = [
|
2024-08-11 11:00:55 +02:00
|
|
|
|
"--timeout 120"
|
|
|
|
|
|
"--workers 1"
|
|
|
|
|
|
"--log-level=info"
|
2024-08-11 11:12:43 +02:00
|
|
|
|
"--bind [::1]:5004"
|
2024-08-11 11:00:55 +02:00
|
|
|
|
];
|
|
|
|
|
|
};
|
|
|
|
|
|
nginx.enable = true;
|
|
|
|
|
|
postgresql.enable = true;
|
|
|
|
|
|
redis.enable = true;
|
|
|
|
|
|
settings = {
|
|
|
|
|
|
"sr.ht" = {
|
|
|
|
|
|
environment = "production";
|
|
|
|
|
|
global-domain = "${sourcehut-fqdn}";
|
2024-08-11 12:16:40 +02:00
|
|
|
|
origin = "http://${sourcehut-fqdn}";
|
2024-08-11 11:00:55 +02:00
|
|
|
|
network-key = "/etc/nixos/secrets/sourcehut/network.key";
|
|
|
|
|
|
service-key = "/etc/nixos/secrets/sourcehut/service.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
"git.sr.ht" = {
|
2024-08-11 12:05:40 +02:00
|
|
|
|
oauth-client-id = "7f2819091157584f";
|
2024-08-11 11:00:55 +02:00
|
|
|
|
oauth-client-secret = "/etc/nixos/secrets/sourcehut/git.oauth";
|
2024-08-11 12:18:53 +02:00
|
|
|
|
origin = "http://git.${sourcehut-fqdn}";
|
2024-08-11 11:00:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
"man.sr.ht" = {
|
|
|
|
|
|
oauth-client-id = "man.sr.ht";
|
|
|
|
|
|
oauth-client-secret = "/etc/nixos/secrets/sourcehut/man.oauth";
|
2024-08-11 12:18:53 +02:00
|
|
|
|
origin = "http://man.${sourcehut-fqdn}";
|
|
|
|
|
|
};
|
|
|
|
|
|
"meta.sr.ht" = {
|
|
|
|
|
|
origin = "http://meta.${sourcehut-fqdn}";
|
2024-08-11 12:23:23 +02:00
|
|
|
|
onboarding-redirect = "http://meta.${sourcehut-fqdn}";
|
2024-08-11 11:00:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
mail = {
|
|
|
|
|
|
pgp-key-id = "/etc/nixos/secrets/sourcehut/mail.key.id";
|
|
|
|
|
|
pgp-privkey = "/etc/nixos/secrets/sourcehut/mail.key";
|
|
|
|
|
|
pgp-pubkey = "/etc/nixos/secrets/sourcehut/mail.key.pub";
|
|
|
|
|
|
smtp-from = "mail@${sourcehut-fqdn}";
|
|
|
|
|
|
};
|
|
|
|
|
|
webhooks.private-key = "/etc/nixos/secrets/sourcehut/webhook.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# security.acme = {
|
|
|
|
|
|
# certs."${sourcehut-fqdn}".extraDomainNames = [
|
|
|
|
|
|
# "meta.${sourcehut-fqdn}"
|
|
|
|
|
|
# "man.${sourcehut-fqdn}"
|
|
|
|
|
|
# "git.${sourcehut-fqdn}"
|
|
|
|
|
|
# ];
|
|
|
|
|
|
# acceptTerms = true;
|
|
|
|
|
|
# defaults.email = "khais.colin+letsencrypt@gmail.com";
|
|
|
|
|
|
# };
|
|
|
|
|
|
|
|
|
|
|
|
security.pki.certificateFiles = [
|
2024-08-11 11:02:04 +02:00
|
|
|
|
/etc/nixos/secrets/certs/myCA.pem
|
2024-08-11 11:00:55 +02:00
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
|
|
recommendedOptimisation = true;
|
|
|
|
|
|
recommendedGzipSettings = true;
|
|
|
|
|
|
recommendedProxySettings = true;
|
|
|
|
|
|
virtualHosts = {
|
|
|
|
|
|
"${sourcehut-fqdn}" = {
|
|
|
|
|
|
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
|
|
|
|
|
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
"meta.${sourcehut-fqdn}" = {
|
|
|
|
|
|
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
|
|
|
|
|
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
"man.${sourcehut-fqdn}" = {
|
|
|
|
|
|
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
|
|
|
|
|
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
"git.${sourcehut-fqdn}" = {
|
|
|
|
|
|
sslCertificate = "/etc/nixos/secrets/certs/sourcehut.nixos.local.crt";
|
|
|
|
|
|
sslCertificateKey = "/etc/nixos/secrets/certs/sourcehut.nixos.local.key";
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
services.postgresql.enable = true;
|
|
|
|
|
|
|
|
|
|
|
|
programs.gnupg.agent = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
enableSSHSupport = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# Enable the OpenSSH daemon.
|
2024-07-29 12:39:40 +02:00
|
|
|
|
# services.openssh.enable = true;
|
2024-07-16 19:46:16 +02:00
|
|
|
|
|
|
|
|
|
|
# Open ports in the firewall.
|
|
|
|
|
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
|
|
|
|
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
|
|
|
|
|
# Or disable the firewall altogether.
|
|
|
|
|
|
# networking.firewall.enable = false;
|
|
|
|
|
|
|
2024-08-06 12:54:05 +02:00
|
|
|
|
# enable manpages documentation
|
|
|
|
|
|
documentation = {
|
|
|
|
|
|
man = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
generateCaches = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
info.enable = true;
|
|
|
|
|
|
dev.enable = true; # linux man-pages project, dev documenation
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-08-10 13:57:11 +02:00
|
|
|
|
# enable docker virtualization
|
|
|
|
|
|
virtualisation.podman = {
|
|
|
|
|
|
enable = true;
|
|
|
|
|
|
# create alias mapping docker to podman
|
|
|
|
|
|
dockerCompat = true;
|
|
|
|
|
|
dockerSocket.enable = true;
|
|
|
|
|
|
};
|
|
|
|
|
|
|
2024-07-16 19:46:16 +02:00
|
|
|
|
# This value determines the NixOS release from which the default
|
|
|
|
|
|
# settings for stateful data, like file locations and database versions
|
|
|
|
|
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
|
|
|
|
|
# this value at the release version of the first install of this system.
|
|
|
|
|
|
# Before changing this value read the documentation for this option
|
|
|
|
|
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
|
|
|
|
|
system.stateVersion = "24.05"; # Did you read the comment?
|
|
|
|
|
|
|
|
|
|
|
|
# flakes
|
|
|
|
|
|
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
2024-07-21 18:40:17 +02:00
|
|
|
|
|
|
|
|
|
|
# automatically collect garbage
|
|
|
|
|
|
nix.gc = {
|
|
|
|
|
|
automatic = true;
|
|
|
|
|
|
dates = "weekly";
|
|
|
|
|
|
options = "--delete-older-than 60d";
|
|
|
|
|
|
};
|
2024-07-16 19:46:16 +02:00
|
|
|
|
}
|