Compare commits
93 Commits
9735d3f0c0
...
flake-part
| Author | SHA1 | Date | |
|---|---|---|---|
| 6cbe60c784 | |||
| ba56618049 | |||
| 349181f35b | |||
| 0b8b7564a1 | |||
| 54e0f94af5 | |||
| 977aa539a3 | |||
| d56605e37a | |||
| 7d013c83bc | |||
| d42f38531d | |||
| af54219f5f | |||
| b6f59055d8 | |||
| cb990c0cd4 | |||
| c896e02bf1 | |||
| c1e031efa9 | |||
| 19f213ca8c | |||
| a0ebb3f259 | |||
| 3a994a3b8d | |||
| 3b4c0e4a63 | |||
| b15dd4ce86 | |||
| db5514062c | |||
| 7b500ee994 | |||
| 07eb4664f9 | |||
| 872f80e92c | |||
| 562f873f97 | |||
| 2f5868fcca | |||
| e1c1f6e104 | |||
| 3bdf73557b | |||
| bb9988245a | |||
| 713f5bfe8c | |||
| c26f4ccd9a | |||
| d84bfd4628 | |||
| fb6ac408e1 | |||
| f01b079931 | |||
| 78990e6414 | |||
| cef602d758 | |||
| 368e741211 | |||
| fec13e08b9 | |||
| a540ca622d | |||
| 7fb0bcdac0 | |||
| b7726fce94 | |||
| 30c987bd9b | |||
| 539e9a0b8e | |||
| 1e4593ea17 | |||
| ec8a71de95 | |||
| 0c39388b21 | |||
| ebb043b589 | |||
| fcfc9f6450 | |||
| fe3cd057cd | |||
| b9cdb9299e | |||
| 8b6ba76848 | |||
| 2e79bd9e00 | |||
| cfdc9f7001 | |||
| a12b50edfa | |||
| 194d4bcec0 | |||
| 5badb000be | |||
| 08b3f2c194 | |||
| 5f9a110464 | |||
| bcd041484d | |||
| fd3b9f20f0 | |||
| bc160af26a | |||
| a34abd0f05 | |||
| 2fd1f5ee53 | |||
| 88547dc82c | |||
| ccf38c2da2 | |||
| b1107ae904 | |||
| 48f53b3884 | |||
| 9bcca96597 | |||
| 78e219a6cb | |||
| 8b958d6a56 | |||
| 1a1aa20690 | |||
| 54952923f3 | |||
| ca20fa6c35 | |||
| c1b2b51d13 | |||
| 28f78bb67e | |||
| 114647aa96 | |||
| 64ae389f27 | |||
| fd39dbfcd4 | |||
| b13cca7173 | |||
| 7807091b83 | |||
| d3026afb97 | |||
| 152daf1230 | |||
| ffda398f8d | |||
| 3e179960de | |||
| 93e655ed27 | |||
| 710c1dedb8 | |||
| 28ec5c73d4 | |||
| fc7285bd5c | |||
| 11ee156b29 | |||
| 2dba549787 | |||
| d28c7d870c | |||
| 8bf17e74ef | |||
| 08cf457aa3 | |||
| 448002ebf4 |
@@ -1,7 +1,7 @@
|
|||||||
keys:
|
keys:
|
||||||
- &primary age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
- &primary age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
||||||
- &aspi-ssh age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
- &aspi-ssh age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
||||||
- &pianonix-ssh age1hsmfz8fjxu83sax9lr487h8xr6cyge0apdq4zpge4c8jpcjj2cksj825ct
|
- &pianonix-ssh age1tguyu2yd5xv8rgjjl50cq6dq5rr7umqgv098dgre4u9wyj30ea7sexw62c
|
||||||
- &builder-ssh age1kw4kmdm45zprvdkrrpvgq966l7585vhusmum083qlwnr0xxgd3uqatcyja
|
- &builder-ssh age1kw4kmdm45zprvdkrrpvgq966l7585vhusmum083qlwnr0xxgd3uqatcyja
|
||||||
- &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
- &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
||||||
|
|
||||||
@@ -20,7 +20,7 @@ creation_rules:
|
|||||||
- *primary
|
- *primary
|
||||||
- *builder-ssh
|
- *builder-ssh
|
||||||
|
|
||||||
- path_regex: hosts/pianonix/secrets.yaml$
|
- path_regex: hosts/pianonix/secrets*
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *primary
|
- *primary
|
||||||
|
|||||||
11
Readme.org
11
Readme.org
@@ -1,7 +1,12 @@
|
|||||||
#+title: My dotfiles
|
#+title: My dotfiles
|
||||||
|
|
||||||
My dotfiles for which I am using =nix=.
|
* Quick start for home-manger only (no need to pull this repo)
|
||||||
The structure is managed by [[https://snowfall.org/guides/lib/quickstart/][Snowfall lib]]
|
- Install nix using the https://github.com/DeterminateSystems/nix-installer
|
||||||
|
- Then run
|
||||||
|
#+begin_src shell
|
||||||
|
nix run nixpkgs#home-manager -- switch --flake git+https://gitlab.julian-mutter.de/julian/dotfiles.git#julian@quickstart
|
||||||
|
#+end_src
|
||||||
|
- Done
|
||||||
|
|
||||||
* Machine selection
|
* Machine selection
|
||||||
=home-manager= automatically searches for =user= or =user@hostname= config in the flake, so specify one of those or you will have to manually specify them:
|
=home-manager= automatically searches for =user= or =user@hostname= config in the flake, so specify one of those or you will have to manually specify them:
|
||||||
@@ -24,7 +29,7 @@ sops edit secrets/secrets.yaml
|
|||||||
** Authorize new device
|
** Authorize new device
|
||||||
- Generate public key from ssh -> Private age key generation not needed
|
- Generate public key from ssh -> Private age key generation not needed
|
||||||
#+begin_src sh
|
#+begin_src sh
|
||||||
ssh-to-age < /etc/ssh/ssh_host_ed25519_key
|
ssh-to-age < /etc/ssh/ssh_host_ed25519_key.pub
|
||||||
#+end_src
|
#+end_src
|
||||||
- Add age public key to file:.sops.yaml
|
- Add age public key to file:.sops.yaml
|
||||||
- Update keys
|
- Update keys
|
||||||
|
|||||||
@@ -52,6 +52,14 @@ in {
|
|||||||
shfmt
|
shfmt
|
||||||
pyright
|
pyright
|
||||||
clang-tools # c++ lsp etc
|
clang-tools # c++ lsp etc
|
||||||
|
ccls # alternative c++ lsp
|
||||||
|
cmake
|
||||||
|
bear
|
||||||
|
cmake-language-server
|
||||||
|
|
||||||
|
# qt6.full # qt tools and libs including lsp
|
||||||
|
tinymist # typst lsp
|
||||||
|
|
||||||
ltex-ls # latex languagetool
|
ltex-ls # latex languagetool
|
||||||
|
|
||||||
graphviz
|
graphviz
|
||||||
@@ -59,6 +67,27 @@ in {
|
|||||||
# neocmakelsp # cmake
|
# neocmakelsp # cmake
|
||||||
|
|
||||||
emacs-all-the-icons-fonts
|
emacs-all-the-icons-fonts
|
||||||
|
frajul.typst-languagetool
|
||||||
|
ltex-ls-plus
|
||||||
|
|
||||||
|
(texlive.combine {
|
||||||
|
inherit
|
||||||
|
(texlive)
|
||||||
|
scheme-basic
|
||||||
|
# for rendering latex in inkscape
|
||||||
|
standalone
|
||||||
|
amsmath
|
||||||
|
preview
|
||||||
|
# needed for org mode preview
|
||||||
|
dvisvgm
|
||||||
|
dvipng # for preview and export as html
|
||||||
|
wrapfig
|
||||||
|
# amsmath
|
||||||
|
ulem
|
||||||
|
hyperref
|
||||||
|
capt-of
|
||||||
|
;
|
||||||
|
})
|
||||||
]
|
]
|
||||||
++ lib.optional config.is-nixos emacs;
|
++ lib.optional config.is-nixos emacs;
|
||||||
|
|
||||||
@@ -27,6 +27,11 @@ with lib; {
|
|||||||
enableFishIntegration = true;
|
enableFishIntegration = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
programs.zoxide = {
|
||||||
|
enable = true;
|
||||||
|
enableFishIntegration = true;
|
||||||
|
};
|
||||||
|
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
@@ -38,14 +43,18 @@ with lib; {
|
|||||||
cd $argv
|
cd $argv
|
||||||
'';
|
'';
|
||||||
run = ''
|
run = ''
|
||||||
nix run nixpkgs#"$argv[1]" -- $argv[2..-1]
|
nix run --impure nixpkgs#"$argv[1]" -- $argv[2..-1]
|
||||||
'';
|
'';
|
||||||
shell = ''
|
shell = ''
|
||||||
set args
|
set args
|
||||||
for arg in $argv
|
for arg in $argv
|
||||||
set args $args nixpkgs#$arg
|
set args $args nixpkgs#$arg
|
||||||
end
|
end
|
||||||
nix shell $args
|
nix shell --impure $args
|
||||||
|
'';
|
||||||
|
fish_user_key_bindings = ''
|
||||||
|
bind ctrl-space 'zi; commandline -f repaint'
|
||||||
|
bind -M insert ctrl-space 'zi; commandline -f repaint'
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@@ -1,7 +1,6 @@
|
|||||||
{
|
{
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
config,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
with lib; {
|
with lib; {
|
||||||
@@ -12,7 +11,7 @@ with lib; {
|
|||||||
dejavu_fonts
|
dejavu_fonts
|
||||||
noto-fonts
|
noto-fonts
|
||||||
noto-fonts-cjk-sans
|
noto-fonts-cjk-sans
|
||||||
noto-fonts-emoji
|
noto-fonts-color-emoji
|
||||||
liberation_ttf
|
liberation_ttf
|
||||||
fira-code
|
fira-code
|
||||||
fira-code-symbols
|
fira-code-symbols
|
||||||
@@ -24,7 +24,7 @@ in {
|
|||||||
./zathura.nix
|
./zathura.nix
|
||||||
./waypipe.nix
|
./waypipe.nix
|
||||||
|
|
||||||
./hyprbars.nix
|
# ./hyprbars.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
xdg.portal = {
|
xdg.portal = {
|
||||||
@@ -152,6 +152,37 @@ in {
|
|||||||
# hyprlandPlugins.hyprbars
|
# hyprlandPlugins.hyprbars
|
||||||
];
|
];
|
||||||
|
|
||||||
|
submaps = {
|
||||||
|
"resize".settings = {
|
||||||
|
binde = [
|
||||||
|
", right, resizeactive, 20"
|
||||||
|
", left, resizeactive, -20 0"
|
||||||
|
", up, resizeactive, 0 -20"
|
||||||
|
", down, resizeactive, 0 20"
|
||||||
|
", l, resizeactive, 20"
|
||||||
|
", h, resizeactive, -20 0"
|
||||||
|
", k, resizeactive, 0 -20"
|
||||||
|
", j, resizeactive, 0 20"
|
||||||
|
];
|
||||||
|
|
||||||
|
bind = [
|
||||||
|
", q, submap, reset"
|
||||||
|
", escape, submap, reset"
|
||||||
|
|
||||||
|
", catchall, submap, reset" # make any other keypress cancel the submap
|
||||||
|
];
|
||||||
|
};
|
||||||
|
"open, reset".settings = {
|
||||||
|
bind = [
|
||||||
|
", e, exec, emacs"
|
||||||
|
", m, exec, open-messaging"
|
||||||
|
", b, exec, firefox"
|
||||||
|
|
||||||
|
", catchall, submap, reset" # make any other keypress cancel the submap
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
settings = {
|
settings = {
|
||||||
"$mod" = "SUPER";
|
"$mod" = "SUPER";
|
||||||
|
|
||||||
@@ -228,6 +259,10 @@ in {
|
|||||||
vfr = true; # power saving
|
vfr = true; # power saving
|
||||||
};
|
};
|
||||||
|
|
||||||
|
cursor = {
|
||||||
|
no_hardware_cursors = 1; # disable hardware cursors to fix tearing on kardorf
|
||||||
|
};
|
||||||
|
|
||||||
render = {
|
render = {
|
||||||
# we do, in fact, want direct scanout
|
# we do, in fact, want direct scanout
|
||||||
direct_scanout = true;
|
direct_scanout = true;
|
||||||
@@ -244,7 +279,10 @@ in {
|
|||||||
windowrulev2 = [
|
windowrulev2 = [
|
||||||
"suppressevent maximize, class:.*"
|
"suppressevent maximize, class:.*"
|
||||||
"workspace 1, class:firefox"
|
"workspace 1, class:firefox"
|
||||||
|
"workspace 8, class:Zotero"
|
||||||
"workspace 9, class:nheko"
|
"workspace 9, class:nheko"
|
||||||
|
"workspace 9, class:Element"
|
||||||
|
"workspace 9, class:discord"
|
||||||
"workspace 9, class:org.telegram.desktop"
|
"workspace 9, class:org.telegram.desktop"
|
||||||
"workspace 10, class:thunderbird"
|
"workspace 10, class:thunderbird"
|
||||||
"float, class:qalculate-gtk"
|
"float, class:qalculate-gtk"
|
||||||
@@ -274,12 +312,18 @@ in {
|
|||||||
bind =
|
bind =
|
||||||
[
|
[
|
||||||
# compositor commands
|
# compositor commands
|
||||||
"$mod, Space, focuswindow, floating"
|
#
|
||||||
"$mod SHIFT, Space, togglefloating,"
|
#
|
||||||
|
"$mod, R, submap, resize"
|
||||||
|
"$mod, O, submap, open"
|
||||||
|
#
|
||||||
|
|
||||||
|
"$mod, SPACE, focuswindow, floating"
|
||||||
|
"$mod SHIFT, SPACE, togglefloating,"
|
||||||
"$mod, F, fullscreen,"
|
"$mod, F, fullscreen,"
|
||||||
"$mod, X, killactive,"
|
"$mod, X, killactive,"
|
||||||
|
|
||||||
"$mod, O, togglesplit," # dwindle
|
"$mod, -, togglesplit," # dwindle
|
||||||
|
|
||||||
# opening applications
|
# opening applications
|
||||||
"$mod, D, exec, wofi --show drun,run"
|
"$mod, D, exec, wofi --show drun,run"
|
||||||
@@ -1,10 +1,9 @@
|
|||||||
{
|
{
|
||||||
lib,
|
|
||||||
pkgs,
|
pkgs,
|
||||||
inputs,
|
inputs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [inputs.nixvim.homeManagerModules.nixvim];
|
imports = [inputs.nixvim.homeModules.nixvim];
|
||||||
|
|
||||||
home.sessionVariables = {
|
home.sessionVariables = {
|
||||||
EDITOR = "nvim";
|
EDITOR = "nvim";
|
||||||
@@ -36,6 +35,8 @@
|
|||||||
opts = {
|
opts = {
|
||||||
number = false;
|
number = false;
|
||||||
relativenumber = false;
|
relativenumber = false;
|
||||||
|
ignorecase = true;
|
||||||
|
smartcase = true;
|
||||||
};
|
};
|
||||||
clipboard.register = "unnamedplus"; # Use system clipboard
|
clipboard.register = "unnamedplus"; # Use system clipboard
|
||||||
|
|
||||||
@@ -76,6 +77,7 @@
|
|||||||
neogit.enable = true; # like magit
|
neogit.enable = true; # like magit
|
||||||
trouble.enable = true;
|
trouble.enable = true;
|
||||||
web-devicons.enable = true;
|
web-devicons.enable = true;
|
||||||
|
orgmode.enable = true; # org-mode support
|
||||||
|
|
||||||
# Shows file trees
|
# Shows file trees
|
||||||
oil = {
|
oil = {
|
||||||
@@ -88,7 +90,7 @@
|
|||||||
# Code formatting
|
# Code formatting
|
||||||
conform-nvim = {
|
conform-nvim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings.formatters_by_ft = with pkgs; {
|
settings.formatters_by_ft = {
|
||||||
lua = ["stylua"];
|
lua = ["stylua"];
|
||||||
python = ["black"];
|
python = ["black"];
|
||||||
nix = ["nixfmt"];
|
nix = ["nixfmt"];
|
||||||
22
features-home-manager/qt-distrobox/default.nix
Normal file
22
features-home-manager/qt-distrobox/default.nix
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
{
|
||||||
|
programs.distrobox = {
|
||||||
|
enable = true;
|
||||||
|
containers."qt-distrobox" = {
|
||||||
|
image = "debian:12.2";
|
||||||
|
exported_apps = "qtcreator";
|
||||||
|
enableSystemdUnit = false; # fails in creating and does not recreate. Do distrobox-assemble create --replace --file ~/.config/distrobox/containers.ini instead
|
||||||
|
additional_packages = [
|
||||||
|
"qtcreator"
|
||||||
|
"qt6-base-dev"
|
||||||
|
"qt6-wayland"
|
||||||
|
"qt6-tools-dev-tools"
|
||||||
|
"qt6-tools-dev"
|
||||||
|
"qt6-serialbus-dev"
|
||||||
|
"qt6-websockets-dev"
|
||||||
|
"libgl1-mesa-dev"
|
||||||
|
"build-essential"
|
||||||
|
"cmake"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
bat
|
bat
|
||||||
du-dust # Like du tree but better
|
dust # Like du tree but better
|
||||||
fd # better find
|
fd # better find
|
||||||
fdupes # find and delete duplicate files
|
fdupes # find and delete duplicate files
|
||||||
ffmpeg
|
ffmpeg
|
||||||
@@ -19,12 +19,11 @@
|
|||||||
links2 # Tui web-browser
|
links2 # Tui web-browser
|
||||||
lnav # log analyzing tool
|
lnav # log analyzing tool
|
||||||
mc # Tui file browser
|
mc # Tui file browser
|
||||||
# nix-index
|
|
||||||
nmap
|
nmap
|
||||||
p7zip # unzip 7zip archives
|
p7zip # unzip 7zip archives
|
||||||
parted
|
parted
|
||||||
pciutils # lspci
|
pciutils # lspci
|
||||||
poppler_utils # Pdf utils including pdfimages
|
poppler-utils # Pdf utils including pdfimages
|
||||||
libqalculate # Nice tui calculator (qalc)
|
libqalculate # Nice tui calculator (qalc)
|
||||||
ripgrep # better grep
|
ripgrep # better grep
|
||||||
rnr # renaming tool
|
rnr # renaming tool
|
||||||
@@ -22,13 +22,15 @@
|
|||||||
calibre # ebook manager and viewer
|
calibre # ebook manager and viewer
|
||||||
# digikam
|
# digikam
|
||||||
discord
|
discord
|
||||||
|
discord-ptb # in case discord updates take their time
|
||||||
# dvdisaster
|
# dvdisaster
|
||||||
# element-desktop
|
# element-desktop
|
||||||
# rocketchat-desktop
|
# rocketchat-desktop
|
||||||
thunderbird
|
thunderbird
|
||||||
tdesktop # telegram
|
telegram-desktop # telegram
|
||||||
# schildichat-desktop # not updated regularly
|
# schildichat-desktop # not updated regularly
|
||||||
nheko
|
nheko
|
||||||
|
element-desktop
|
||||||
evince # Simple pdf reader, good for focusing on document content
|
evince # Simple pdf reader, good for focusing on document content
|
||||||
firefox
|
firefox
|
||||||
# geogebra
|
# geogebra
|
||||||
@@ -46,10 +48,10 @@
|
|||||||
qpdfview
|
qpdfview
|
||||||
# qutebrowser
|
# qutebrowser
|
||||||
# realvnc-vnc-viewer
|
# realvnc-vnc-viewer
|
||||||
rpi-imager # make isos
|
# rpi-imager # make isos
|
||||||
# rustdesk
|
# rustdesk
|
||||||
tor-browser
|
tor-browser
|
||||||
unstable.path-of-building # Path of Building
|
rusty-path-of-building # Path of Building for poe1 and poe2
|
||||||
# frajul.pob-dev-version # Path of Building
|
# frajul.pob-dev-version # Path of Building
|
||||||
vlc
|
vlc
|
||||||
wineWowPackages.stable # 32-bit and 64-bit wine
|
wineWowPackages.stable # 32-bit and 64-bit wine
|
||||||
@@ -61,8 +63,12 @@
|
|||||||
zotero # Manage papers and other sources
|
zotero # Manage papers and other sources
|
||||||
pdfpc # Present slides in pdf form
|
pdfpc # Present slides in pdf form
|
||||||
|
|
||||||
|
networkmanager-openvpn
|
||||||
|
keepassxc
|
||||||
|
|
||||||
## My scripts
|
## My scripts
|
||||||
frajul.open-messaging
|
frajul.open-messaging
|
||||||
frajul.xwacomcalibrate
|
frajul.xwacomcalibrate
|
||||||
|
frajul.pob2-frajul
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
@@ -1,4 +1,9 @@
|
|||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
|
programs.opencode = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.unstable.opencode;
|
||||||
|
};
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
watchexec # Run command when any file in current dir changes
|
watchexec # Run command when any file in current dir changes
|
||||||
android-tools # adb
|
android-tools # adb
|
||||||
@@ -9,7 +14,7 @@
|
|||||||
clippy
|
clippy
|
||||||
cntr # nix debugger
|
cntr # nix debugger
|
||||||
conda
|
conda
|
||||||
micromamba # a better, faster conda
|
# micromamba # a better, faster conda
|
||||||
devcontainer # development container
|
devcontainer # development container
|
||||||
devenv # devbox alternative
|
devenv # devbox alternative
|
||||||
dbeaver-bin
|
dbeaver-bin
|
||||||
@@ -21,20 +26,21 @@
|
|||||||
unstable.zed-editor
|
unstable.zed-editor
|
||||||
jdk
|
jdk
|
||||||
julia-bin
|
julia-bin
|
||||||
(texlive.combine {
|
# (texlive.combine {
|
||||||
# for rendering latex in inkscape
|
# # for rendering latex in inkscape
|
||||||
inherit
|
# inherit
|
||||||
(texlive)
|
# (texlive)
|
||||||
scheme-medium
|
# scheme-medium
|
||||||
standalone
|
# standalone
|
||||||
amsmath
|
# amsmath
|
||||||
preview
|
# preview
|
||||||
# needed for org mode export
|
# # needed for org mode export
|
||||||
wrapfig
|
# wrapfig
|
||||||
capt-of
|
# capt-of
|
||||||
biblatex
|
# biblatex
|
||||||
;
|
# ;
|
||||||
})
|
# })
|
||||||
|
vagrant
|
||||||
matlab # Using nix-matlab overlay defined in flake
|
matlab # Using nix-matlab overlay defined in flake
|
||||||
maven
|
maven
|
||||||
nodejs
|
nodejs
|
||||||
@@ -62,7 +68,7 @@
|
|||||||
|
|
||||||
## My scripts
|
## My scripts
|
||||||
frajul.deploy-to-pianopi
|
frajul.deploy-to-pianopi
|
||||||
frajul.rtklib
|
# frajul.rtklib
|
||||||
|
|
||||||
(pkgs.writeShellScriptBin "matlab-rsp" ''
|
(pkgs.writeShellScriptBin "matlab-rsp" ''
|
||||||
matlab -desktop -sd "/home/julian/git/uwa-channel-model" -softwareopengl
|
matlab -desktop -sd "/home/julian/git/uwa-channel-model" -softwareopengl
|
||||||
10
features-home-manager/tmux/default.nix
Normal file
10
features-home-manager/tmux/default.nix
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
{
|
||||||
|
programs.tmux = {
|
||||||
|
enable = true;
|
||||||
|
clock24 = true;
|
||||||
|
keyMode = "vi";
|
||||||
|
customPaneNavigationAndResize = true; # use hjkl
|
||||||
|
mouse = true;
|
||||||
|
prefix = "C-Space"; # use instead of C-b
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -3,14 +3,11 @@
|
|||||||
inputs,
|
inputs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
programs.zoxide.enable = true;
|
|
||||||
programs.zoxide.enableFishIntegration = true;
|
|
||||||
|
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
exiftool
|
exiftool
|
||||||
unar # extract archives
|
unar # extract archives
|
||||||
xdragon # dragndrop
|
dragon-drop # dragndrop
|
||||||
poppler_utils # pdf preview
|
poppler-utils # pdf preview
|
||||||
fd
|
fd
|
||||||
ripgrep
|
ripgrep
|
||||||
fzf
|
fzf
|
||||||
18
features-nixos/base/auto-upgrade.nix
Normal file
18
features-nixos/base/auto-upgrade.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {
|
||||||
|
inputs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
system.hydraAutoUpgrade = {
|
||||||
|
# Only enable if not dirty
|
||||||
|
enable = inputs.self ? rev;
|
||||||
|
dates = "*:0/10"; # Every 10 minutes
|
||||||
|
instance = "http://hydra.julian-mutter.de";
|
||||||
|
project = "dotfiles";
|
||||||
|
jobset = "main";
|
||||||
|
job = "hosts.${config.networking.hostName}";
|
||||||
|
oldFlakeRef = "self";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
40
features-nixos/base/default.nix
Normal file
40
features-nixos/base/default.nix
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
# Common config for all hosts
|
||||||
|
{
|
||||||
|
flake.nixosModules.base = {
|
||||||
|
inputs,
|
||||||
|
outputs,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
imports = [
|
||||||
|
inputs.home-manager.nixosModules.home-manager
|
||||||
|
];
|
||||||
|
|
||||||
|
# Replaces the (modulesPath + "/installer/scan/not-detected.nix") from default hardware-configuration.nix
|
||||||
|
# Enables non-free firmware
|
||||||
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
|
||||||
|
# Networking
|
||||||
|
networking.networkmanager = {
|
||||||
|
enable = true;
|
||||||
|
plugins = with pkgs; [
|
||||||
|
networkmanager-openconnect
|
||||||
|
];
|
||||||
|
};
|
||||||
|
services.resolved.enable = false;
|
||||||
|
# MDNS Taken by avahi
|
||||||
|
# networking.networkmanager.dns = "none";
|
||||||
|
networking.nameservers = lib.mkDefault [
|
||||||
|
"1.1.1.1"
|
||||||
|
"8.8.8.8"
|
||||||
|
];
|
||||||
|
|
||||||
|
# HM module
|
||||||
|
home-manager.useGlobalPkgs = true; # hm module uses the pkgs of the nixos config
|
||||||
|
home-manager.backupFileExtension = "hm-backup"; # backup conflicting files. So hm activation never fails
|
||||||
|
home-manager.extraSpecialArgs = {
|
||||||
|
inherit inputs outputs;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
12
features-nixos/base/fish.nix
Normal file
12
features-nixos/base/fish.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {
|
||||||
|
programs.fish = {
|
||||||
|
enable = true;
|
||||||
|
vendor = {
|
||||||
|
completions.enable = true;
|
||||||
|
config.enable = true;
|
||||||
|
functions.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
28
features-nixos/base/locale.nix
Normal file
28
features-nixos/base/locale.nix
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {
|
||||||
|
# Select internationalisation properties.
|
||||||
|
i18n.defaultLocale = "en_US.UTF-8";
|
||||||
|
|
||||||
|
i18n.extraLocaleSettings = {
|
||||||
|
LC_ADDRESS = "de_DE.UTF-8";
|
||||||
|
LC_IDENTIFICATION = "de_DE.UTF-8";
|
||||||
|
LC_MEASUREMENT = "de_DE.UTF-8";
|
||||||
|
LC_MONETARY = "de_DE.UTF-8";
|
||||||
|
LC_NAME = "de_DE.UTF-8";
|
||||||
|
LC_NUMERIC = "en_US.UTF-8";
|
||||||
|
LC_PAPER = "de_DE.UTF-8";
|
||||||
|
LC_TELEPHONE = "de_DE.UTF-8";
|
||||||
|
LC_TIME = "de_DE.UTF-8";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Keymap
|
||||||
|
services.xserver.xkb = {
|
||||||
|
layout = "de";
|
||||||
|
variant = "";
|
||||||
|
};
|
||||||
|
|
||||||
|
console.keyMap = "de";
|
||||||
|
|
||||||
|
time.timeZone = "Europe/Berlin";
|
||||||
|
};
|
||||||
|
}
|
||||||
48
features-nixos/base/nix.nix
Normal file
48
features-nixos/base/nix.nix
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {outputs, ...}: {
|
||||||
|
# Apply overlays
|
||||||
|
nixpkgs = {
|
||||||
|
# TODO: apply this to hm and nixos without duplicate code
|
||||||
|
overlays = builtins.attrValues outputs.overlays;
|
||||||
|
config = {
|
||||||
|
nvidia.acceptLicense = true;
|
||||||
|
allowUnfree = true;
|
||||||
|
allowUnfreePredicate = _: true; # TODO: what is this
|
||||||
|
warn-dirty = false;
|
||||||
|
permittedInsecurePackages = [
|
||||||
|
"olm-3.2.16"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# optimize at every build, slows down builds
|
||||||
|
# better to do optimise.automatic for regular optimising
|
||||||
|
# nix.settings.auto-optimise-store = lib.mkDefault true;
|
||||||
|
nix.settings.experimental-features = [
|
||||||
|
"nix-command"
|
||||||
|
"flakes"
|
||||||
|
"ca-derivations"
|
||||||
|
];
|
||||||
|
# warn-dirty = false;
|
||||||
|
|
||||||
|
nix.gc = {
|
||||||
|
automatic = true;
|
||||||
|
dates = "weekly";
|
||||||
|
options = "--delete-older-than 30d";
|
||||||
|
persistent = true;
|
||||||
|
};
|
||||||
|
nix.optimise = {
|
||||||
|
automatic = true;
|
||||||
|
dates = ["weekly"]; # Optional; allows customizing optimisation schedule
|
||||||
|
persistent = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.nix-ld.enable = true;
|
||||||
|
|
||||||
|
# TODO: is this useful?, what does it do?
|
||||||
|
# nix.settings.flake-registry = ""; # Disable global flake registry
|
||||||
|
# Add each flake input as a registry and nix_path
|
||||||
|
# registry = lib.mapAttrs (_: flake: { inherit flake; }) flakeInputs;
|
||||||
|
# nixPath = lib.mapAttrsToList (n: _: "${n}=flake:${n}") flakeInputs;
|
||||||
|
};
|
||||||
|
}
|
||||||
11
features-nixos/base/root.nix
Normal file
11
features-nixos/base/root.nix
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {pkgs, ...}: {
|
||||||
|
# Packages needed as root
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
vim
|
||||||
|
htop
|
||||||
|
mc
|
||||||
|
gparted-xhost # needs to be installed as system package so it can be actually opened
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -14,38 +14,38 @@ sops:
|
|||||||
- recipient: age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
- recipient: age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
||||||
enc: |
|
enc: |
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBxV2IzcEZ6eGYxbXAvaEta
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBualdnWmtBTThhZDFVdDRP
|
||||||
c3RLbmZubnVEL1EwSlNNY3ZNbkVSUXN5ZDBZClRTYWwzbHhDK1VsMzVVL0VMVzZF
|
WHlMamk1MFhUYUwwa0hyQmpobGNocC9VR0ZVCmc3N1FjcUZCNUdTTm91OVpwZDhP
|
||||||
SEQ0ZHVMdytrY0xXUEppQkpNZEZ3VFkKLS0tIG95ZkJLWTZBWWpIOEQ4bHpBNWEx
|
bTNXekp2bDd3Tjh6a2ZVTVNTSW9RTU0KLS0tIGJpcUVHb2ZlODgvelhwQ0JFU3l5
|
||||||
QXVpMTNSNzU1dTBPYjlsc1BvNHZ3dDgKMHrT9DCC5W6UwC1Mfq6YCwkvZtDs3I7j
|
WU5VanhYMTUvNklYazJxOXVveXhpM2cKCo+4FhhcbRylASEbQb9rAQUzEO1D+0AR
|
||||||
vKlnanFp8hMMyYONRVlkvh+vOGQdbgXco4Z5nr02LQDu6Rwm4jSp9g==
|
52Jzc9s9rSdypeBRE7SaSOI4eVnkEjPfyhNFvMdxiBzBj7GdocpmCw==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
- recipient: age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
- recipient: age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
||||||
enc: |
|
enc: |
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBKTnpqclVmVHR3M1ZvMDZ0
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB4STZpU0ZnRzVVOFFRUXZG
|
||||||
eEtrbnhpTW5uZlhOYWFxbktxcTJ3bXZISkhzClpud2tNVzUvT2N2SkRadWk5aVpE
|
akcwS2Z5V3lmQzRTSGNHT2hDME5JMks2QTNNClpkZzNMc0wyRjVEaVlBRFlyNFhs
|
||||||
S2VkTFlIVUhFclA0WEh5cEp0Qjg3ejgKLS0tIDNXY0lpKys4Q3NBRFcya2RoSG1F
|
M1pyeW1XdnZubnRxMzEzMFJoK0lkVVEKLS0tIENhRExzUWRWMUlObmhxazM5cU9y
|
||||||
YW0raHlNekdWT3p0WHpGMk9xMmgzWFUKCue4GvgmH3nJBa7ny7rqft5MuSWHqAsP
|
aDFyaDJackFoaEZOYWdTbWt0ODB1bm8Kg1VDAj5/i8ZbYxspIdXrI474YN5YkV4H
|
||||||
5HnaAudL+rh2j1swm635QUrf9UnpUznE5NSOGrQDmA6RCBypNM4rsw==
|
86maCRDfUxO5lvu4zBa9pOmFtJ2iuJ2MxDnmCSHTl+GOk8yyUT8JhA==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
- recipient: age1hsmfz8fjxu83sax9lr487h8xr6cyge0apdq4zpge4c8jpcjj2cksj825ct
|
- recipient: age1tguyu2yd5xv8rgjjl50cq6dq5rr7umqgv098dgre4u9wyj30ea7sexw62c
|
||||||
enc: |
|
enc: |
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBESlZOeHY0T01ra0gwMS8z
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAveE9NV2JCOW9odlN6Wmkw
|
||||||
R3c1eW45WVkyeTBuRlFMRngrb2NFL1hkcmhRCitwZ3lweXM0di9EdEdQZmF4ZUZr
|
WFEvU2pka3htV2FTTFlpc05ES2JjbGxTaFJZCjhYdG1sRVBFaEF3YjNkWEw3Ny8x
|
||||||
M1hqNkM3Q1Jrb09Kb2M0ZkhTcFZPYkkKLS0tIHpCTEFCV0JlRzQwK3hndDJ4aHVC
|
MlYyTjJBMHA2YVpHRkkwWW5hNDdrS1UKLS0tIFZXTFNVbkd6VFExc0dSVU4vd3JF
|
||||||
S1o0QVlXSVl0dmlpWUQ3ZXdqUU5maTgKY4UJPx37CU5OUgkqYWlz9+0rA+dQkrH9
|
ajlFY2pvWW13VGxOZ0hEc3dMbU9IeUUKNSf7ycj+1XHhsoghmY2iR1BwIySqfIOF
|
||||||
+/kTT/2qZ2Op67WKtlas7arC7BjU8uygM208q+nr48Lic5n1fMtnXA==
|
zawE+MQcQg0u+fy6Aik26eUGvQG3rya2Fx2+3VlAbKB+rbiP0fwsgg==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
- recipient: age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
- recipient: age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
||||||
enc: |
|
enc: |
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAvYkdwSy9vc0lEWXJIdWRw
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBxaTNJNkJ0RVJiYlRzcmlX
|
||||||
VmJ2NStaZDVxaG1LNU1NQlErdElPdkQvY3pjCkJyL1BRR2w1dmpqYnk5Tys3eHpX
|
TmEweVdLaGpoVXMxZEFDU3dOZTJCRjdiNENBCkZ3bjJUNm1vcmY1ZUpZcEo4OGxa
|
||||||
c0FJdzA1bU5GWWhrUWhOK1Jqa2lTaU0KLS0tIDMzMEQwL3I0ckVyYWFubU9VNlAr
|
UWJKSjNKL002UDhmTmJER2M0MjJ3aG8KLS0tIFMvZjBkOS83T3NDUE82M3kweVNw
|
||||||
NlBud3VHczNnMm5wOGhHdEoxTG5CNDgK4s7cFGvUCeztjjIAWtMW7TUqFP+YEQIg
|
VXhoN0VyWkVxMEJPQ3orVUNDK21rRU0KvnmuFxcCpP+LZg7v5jaStw9F0owVrQl9
|
||||||
So5A7DGxVsUcqarTUPazpIBBlO4n9zj79Qe+eQd6ti0EZG6sYX6+2Q==
|
AkIq7GUJh7xewLxcVZfiBRpXMhw/mM8LYnd2KGP8R/TfYg+v0//+5A==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2025-04-23T07:00:17Z"
|
lastmodified: "2025-04-23T07:00:17Z"
|
||||||
mac: ENC[AES256_GCM,data:JgaTIRbzD0hs2o86xUlQrPN2cPXvsuTH/zKG5xbQIDaYcEvD/mkuVa3hfnYKrA91kWg2Y1DgEi9583+o6UCl/+ldY4ptu+xpnYfyQFdhM4rB+KoP/pDt8vQKQ3zAX8fpAkugCgTTbuvm3TfQ1nt98V8boyhCn4JHNC1T0j7ZtZI=,iv:G3YJOLeDWDKuANo2mxS2JAdrRaonD87CU9BpCZZrlRs=,tag:mcKIdP5cSQUwNL2tcv/o6g==,type:str]
|
mac: ENC[AES256_GCM,data:JgaTIRbzD0hs2o86xUlQrPN2cPXvsuTH/zKG5xbQIDaYcEvD/mkuVa3hfnYKrA91kWg2Y1DgEi9583+o6UCl/+ldY4ptu+xpnYfyQFdhM4rB+KoP/pDt8vQKQ3zAX8fpAkugCgTTbuvm3TfQ1nt98V8boyhCn4JHNC1T0j7ZtZI=,iv:G3YJOLeDWDKuANo2mxS2JAdrRaonD87CU9BpCZZrlRs=,tag:mcKIdP5cSQUwNL2tcv/o6g==,type:str]
|
||||||
24
features-nixos/base/sops/sops.nix
Normal file
24
features-nixos/base/sops/sops.nix
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.base = {
|
||||||
|
inputs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
isEd25519 = k: k.type == "ed25519";
|
||||||
|
getKeyPath = k: k.path;
|
||||||
|
keys = builtins.filter isEd25519 config.services.openssh.hostKeys;
|
||||||
|
in {
|
||||||
|
imports = [inputs.sops-nix.nixosModules.sops];
|
||||||
|
|
||||||
|
sops.age = {
|
||||||
|
sshKeyPaths = map getKeyPath keys;
|
||||||
|
|
||||||
|
# TODO: remove? only rely on ssh or pgp keys (e.g. ubikey like misterio is using!!!)
|
||||||
|
# keyFile = "/home/julian/.config/sops/age/keys.txt";
|
||||||
|
# Generate key if none of the above worked. With this, building will still work, just without secrets
|
||||||
|
generateKey = false; # TODO: building should not work without secrets!?
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.defaultSopsFile = ./secrets.yaml;
|
||||||
|
};
|
||||||
|
}
|
||||||
31
features-nixos/optional/authentication.nix
Normal file
31
features-nixos/optional/authentication.nix
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.authentication = {
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
# Make programs like nextcloud client access saved passwords
|
||||||
|
services.gnome.gnome-keyring.enable = true;
|
||||||
|
|
||||||
|
programs.seahorse.enable = true;
|
||||||
|
programs.ssh.askPassword = lib.mkForce "${pkgs.seahorse}/libexec/seahorse/ssh-askpass"; # Solve conflicting definition in seahorse and plasma6
|
||||||
|
|
||||||
|
# Make authentication work for e.g. gparted
|
||||||
|
security.polkit.enable = true;
|
||||||
|
systemd = {
|
||||||
|
user.services.polkit-gnome-authentication-agent-1 = {
|
||||||
|
description = "polkit-gnome-authentication-agent-1";
|
||||||
|
wantedBy = ["graphical-session.target"];
|
||||||
|
wants = ["graphical-session.target"];
|
||||||
|
after = ["graphical-session.target"];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
ExecStart = "${pkgs.polkit_gnome}/libexec/polkit-gnome-authentication-agent-1";
|
||||||
|
Restart = "on-failure";
|
||||||
|
RestartSec = 1;
|
||||||
|
TimeoutStopSec = 10;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
14
features-nixos/optional/avahi.nix
Normal file
14
features-nixos/optional/avahi.nix
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.avahi = {
|
||||||
|
# MDNS on local network
|
||||||
|
services.avahi = {
|
||||||
|
enable = true;
|
||||||
|
nssmdns4 = true;
|
||||||
|
nssmdns6 = true;
|
||||||
|
publish.enable = true;
|
||||||
|
publish.addresses = true;
|
||||||
|
ipv4 = true;
|
||||||
|
ipv6 = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
33
features-nixos/optional/binarycaches.nix
Normal file
33
features-nixos/optional/binarycaches.nix
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.binarycaches = {
|
||||||
|
lib,
|
||||||
|
outputs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
# Setup binary caches
|
||||||
|
nix.settings = {
|
||||||
|
substituters = [
|
||||||
|
"https://nix-community.cachix.org"
|
||||||
|
"https://cache.nixos.org/"
|
||||||
|
"https://hyprland.cachix.org"
|
||||||
|
"http://binarycache.julian-mutter.de"
|
||||||
|
"https://devenv.cachix.org"
|
||||||
|
];
|
||||||
|
trusted-public-keys = [
|
||||||
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||||
|
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
|
||||||
|
"binarycache.julian-mutter.de:oJ67uRFwRhNPKL58CHzy3QQLv38Kx7OA1K+6xlEPu7E="
|
||||||
|
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
||||||
|
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="
|
||||||
|
];
|
||||||
|
|
||||||
|
trusted-users = [
|
||||||
|
"root"
|
||||||
|
"@wheel"
|
||||||
|
]; # needed for devenv to add custom caches
|
||||||
|
|
||||||
|
# Ensure we can still build when missing-server is not accessible
|
||||||
|
fallback = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
19
features-nixos/optional/boot-efi.nix
Normal file
19
features-nixos/optional/boot-efi.nix
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.boot-efi = {
|
||||||
|
# Bootloader
|
||||||
|
# Use this for simple nix boot menu, if no dual boot required
|
||||||
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
boot.loader.systemd-boot.configurationLimit = 10;
|
||||||
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
|
||||||
|
# https://github.com/NixOS/nixpkgs/blob/c32c39d6f3b1fe6514598fa40ad2cf9ce22c3fb7/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix#L66
|
||||||
|
boot.loader.systemd-boot.editor = false;
|
||||||
|
|
||||||
|
boot.supportedFilesystems = [
|
||||||
|
"btrfs"
|
||||||
|
"ntfs"
|
||||||
|
"nfs"
|
||||||
|
"cifs"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
7
features-nixos/optional/docker.nix
Normal file
7
features-nixos/optional/docker.nix
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.docker = {
|
||||||
|
virtualisation.docker = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
8
features-nixos/optional/flatpak.nix
Normal file
8
features-nixos/optional/flatpak.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.flatpak = {pkgs, ...}: {
|
||||||
|
services.flatpak.enable = true;
|
||||||
|
xdg.portal.enable = true;
|
||||||
|
xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk];
|
||||||
|
xdg.portal.config.common.default = "*"; # Use first portal implementation found
|
||||||
|
};
|
||||||
|
}
|
||||||
23
features-nixos/optional/gamemode.nix
Normal file
23
features-nixos/optional/gamemode.nix
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.gamemode = {pkgs, ...}: {
|
||||||
|
programs.gamemode = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
general = {
|
||||||
|
softrealtime = "auto";
|
||||||
|
inhibit_screensaver = 1;
|
||||||
|
renice = 5;
|
||||||
|
};
|
||||||
|
# gpu = {
|
||||||
|
# apply_gpu_optimisations = "accept-responsibility";
|
||||||
|
# gpu_device = 1;
|
||||||
|
# amd_performance_level = "high";
|
||||||
|
# };
|
||||||
|
custom = {
|
||||||
|
start = "${pkgs.libnotify}/bin/notify-send 'GameMode started'";
|
||||||
|
end = "${pkgs.libnotify}/bin/notify-send 'GameMode ended'";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
15
features-nixos/optional/gdm.nix
Normal file
15
features-nixos/optional/gdm.nix
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.gdm = {
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
services.xserver.displayManager.gdm = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# unlock GPG keyring on login
|
||||||
|
security.pam.services.gdm.enableGnomeKeyring = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
39
features-nixos/optional/greetd.nix
Normal file
39
features-nixos/optional/greetd.nix
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.greetd = {config, ...}: let
|
||||||
|
homeCfgs = config.home-manager.users;
|
||||||
|
julianCfg = homeCfgs.julian;
|
||||||
|
in {
|
||||||
|
users.extraUsers.greeter = {
|
||||||
|
# For caching
|
||||||
|
home = "/tmp/greeter-home";
|
||||||
|
createHome = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.regreet = {
|
||||||
|
enable = true;
|
||||||
|
iconTheme = julianCfg.gtk.iconTheme;
|
||||||
|
theme = julianCfg.gtk.theme;
|
||||||
|
# font = julianCfg.fontProfiles.regular; # TODO: do
|
||||||
|
cursorTheme = {
|
||||||
|
inherit (julianCfg.gtk.cursorTheme) name package;
|
||||||
|
};
|
||||||
|
cageArgs = [
|
||||||
|
"-s"
|
||||||
|
"-m"
|
||||||
|
"last"
|
||||||
|
]; # multimonitor use last monitor
|
||||||
|
# settings.background = {
|
||||||
|
# path = julianCfg.wallpaper;
|
||||||
|
# fit = "Cover";
|
||||||
|
# }; # TODO: fix
|
||||||
|
|
||||||
|
# TODO: setting keyboard language does not work
|
||||||
|
# settings = {
|
||||||
|
# env = {
|
||||||
|
# XKB_DEFAULT_LAYOUT = "de";
|
||||||
|
# # XKB_DEFAULT_VARIANT = "altgr-intl";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
18
features-nixos/optional/i3.nix
Normal file
18
features-nixos/optional/i3.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.i3 = {
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
services.xserver.windowManager.i3.enable = true;
|
||||||
|
services.xserver.windowManager.i3.package = pkgs.i3-gaps;
|
||||||
|
services.displayManager.defaultSession = "none+i3";
|
||||||
|
|
||||||
|
programs.xss-lock = {
|
||||||
|
# responds to "loginctl lock-session" via dbus
|
||||||
|
enable = true;
|
||||||
|
lockerCommand = "${pkgs.i3lock}/bin/i3lock --ignore-empty-password --color=000000";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
25
features-nixos/optional/kerberos.nix
Normal file
25
features-nixos/optional/kerberos.nix
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.kerberos = {
|
||||||
|
security.krb5.enable = true;
|
||||||
|
security.krb5.settings = {
|
||||||
|
# domain_realm = {
|
||||||
|
# ".julian-mutter.de" = "julian-mutter.de";
|
||||||
|
# "julian-mutter.de" = "julian-mutter.de";
|
||||||
|
# };
|
||||||
|
libdefaults = {
|
||||||
|
default_realm = "julian-mutter.de";
|
||||||
|
# dns_lookup_realm = true;
|
||||||
|
# dns_lookup_kdc = true;
|
||||||
|
# ticket_lifetime = "24h";
|
||||||
|
# renew_lifetime = "7d";
|
||||||
|
};
|
||||||
|
realms = {
|
||||||
|
"julian-mutter.de" = {
|
||||||
|
kdc = ["kerberos.julian-mutter.de"];
|
||||||
|
admin_server = "kerberos-admin.julian-mutter.de";
|
||||||
|
default_domain = "julian-mutter.de";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
51
features-nixos/optional/openssh.nix
Normal file
51
features-nixos/optional/openssh.nix
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.openssh = {
|
||||||
|
outputs,
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
hosts = lib.attrNames outputs.nixosConfigurations;
|
||||||
|
in {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
# Harden
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
|
||||||
|
# TODO: what does this do
|
||||||
|
# Let WAYLAND_DISPLAY be forwarded
|
||||||
|
AcceptEnv = "WAYLAND_DISPLAY";
|
||||||
|
X11Forwarding = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
hostKeys = [
|
||||||
|
{
|
||||||
|
path = "/etc/ssh/ssh_host_ed25519_key";
|
||||||
|
type = "ed25519";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# TODO: is automatic known hosts file even necessary?
|
||||||
|
# programs.ssh = {
|
||||||
|
# # Each hosts public key
|
||||||
|
# knownHosts = lib.genAttrs hosts (hostname: {
|
||||||
|
# publicKeyFile = ../../${hostname}/ssh_host_ed25519_key.pub;
|
||||||
|
# extraHostNames =
|
||||||
|
# [
|
||||||
|
# # "${hostname}.m7.rs"
|
||||||
|
# ]
|
||||||
|
# ++
|
||||||
|
# # Alias for localhost if it's the same host
|
||||||
|
# (lib.optional (hostname == config.networking.hostName) "localhost")
|
||||||
|
# # Alias to m7.rs and git.m7.rs if it's alcyone
|
||||||
|
# ++ (lib.optionals (hostname == "alcyone") [
|
||||||
|
# "m7.rs"
|
||||||
|
# "git.m7.rs"
|
||||||
|
# ]);
|
||||||
|
# });
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
}
|
||||||
11
features-nixos/optional/pcmanfm.nix
Normal file
11
features-nixos/optional/pcmanfm.nix
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.pcmanfm = {pkgs, ...}: {
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
shared-mime-info # extended mimetype support
|
||||||
|
lxmenu-data # open with "Installed Applications"
|
||||||
|
pcmanfm
|
||||||
|
];
|
||||||
|
|
||||||
|
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
||||||
|
};
|
||||||
|
}
|
||||||
30
features-nixos/optional/pipewire.nix
Normal file
30
features-nixos/optional/pipewire.nix
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.pipewire = {
|
||||||
|
security.rtkit.enable = true;
|
||||||
|
services.pulseaudio.enable = false;
|
||||||
|
services.pipewire = {
|
||||||
|
enable = true;
|
||||||
|
wireplumber.enable = true;
|
||||||
|
alsa.enable = true;
|
||||||
|
alsa.support32Bit = true;
|
||||||
|
pulse.enable = true;
|
||||||
|
jack.enable = true;
|
||||||
|
extraConfig.pipewire = {
|
||||||
|
"99-no-bell" = {
|
||||||
|
# Disable bell sound
|
||||||
|
"context.properties" = {
|
||||||
|
"module.x11.bell" = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"10-increase-buffer" = {
|
||||||
|
"context.properties" = {
|
||||||
|
"default.clock.rate" = 48000;
|
||||||
|
"default.clock.quantum" = 1024;
|
||||||
|
"default.clock.min-quantum" = 1024;
|
||||||
|
"default.clock.max-quantum" = 2048;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
12
features-nixos/optional/podman.nix
Normal file
12
features-nixos/optional/podman.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.podman = {config, ...}: let
|
||||||
|
dockerEnabled = config.virtualisation.docker.enable;
|
||||||
|
in {
|
||||||
|
virtualisation.podman = {
|
||||||
|
enable = true;
|
||||||
|
dockerCompat = !dockerEnabled;
|
||||||
|
dockerSocket.enable = !dockerEnabled;
|
||||||
|
defaultNetwork.settings.dns_enabled = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
14
features-nixos/optional/redshift.nix
Normal file
14
features-nixos/optional/redshift.nix
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.redshift = {
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
# Set location used by redshift
|
||||||
|
location.provider = "manual";
|
||||||
|
location.latitude = 47.92;
|
||||||
|
location.longitude = 10.12;
|
||||||
|
services.redshift.enable = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
36
features-nixos/optional/remote-builder.nix
Normal file
36
features-nixos/optional/remote-builder.nix
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.remote-builder = {
|
||||||
|
nix.distributedBuilds = true;
|
||||||
|
nix.settings.builders-use-substitutes = true;
|
||||||
|
|
||||||
|
nix.buildMachines = [
|
||||||
|
{
|
||||||
|
hostName = "builder.julian-mutter.de";
|
||||||
|
protocol = "ssh";
|
||||||
|
sshUser = "nix";
|
||||||
|
systems = [
|
||||||
|
"x86_64-linux"
|
||||||
|
"aarch64-linux"
|
||||||
|
];
|
||||||
|
maxJobs = 4;
|
||||||
|
speedFactor = 3;
|
||||||
|
supportedFeatures = [
|
||||||
|
"nixos-test"
|
||||||
|
"benchmark"
|
||||||
|
"big-parallel"
|
||||||
|
"kvm"
|
||||||
|
];
|
||||||
|
mandatoryFeatures = [];
|
||||||
|
}
|
||||||
|
# {
|
||||||
|
# hostName = "localhost";
|
||||||
|
# protocol = null;
|
||||||
|
# systems = [
|
||||||
|
# "x86_64-linux"
|
||||||
|
# ];
|
||||||
|
# maxJobs = 4;
|
||||||
|
# speedFactor = 1;
|
||||||
|
# }
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
18
features-nixos/optional/thunar.nix
Normal file
18
features-nixos/optional/thunar.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.thunar = {
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
programs.thunar.enable = true;
|
||||||
|
programs.xfconf.enable = true; # Persist saved preferences
|
||||||
|
programs.thunar.plugins = with pkgs.xfce; [
|
||||||
|
thunar-archive-plugin
|
||||||
|
thunar-volman
|
||||||
|
thunar-media-tags-plugin
|
||||||
|
];
|
||||||
|
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
||||||
|
services.tumbler.enable = true; # Thumbnail support for images
|
||||||
|
};
|
||||||
|
}
|
||||||
14
features-nixos/optional/virtualbox.nix
Normal file
14
features-nixos/optional/virtualbox.nix
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.virtualbox = {
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
virtualisation.virtualbox.host.enable = true;
|
||||||
|
# virtualisation.virtualbox.host.enableExtensionPack = true;
|
||||||
|
# virtualisation.virtualbox.guest.enable = true;
|
||||||
|
# virtualisation.virtualbox.guest.x11 = true;
|
||||||
|
users.extraGroups.vboxusers.members = ["julian"];
|
||||||
|
};
|
||||||
|
}
|
||||||
14
features-nixos/optional/wireguard.nix
Normal file
14
features-nixos/optional/wireguard.nix
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.wireguard = {
|
||||||
|
networking.wg-quick.interfaces = {
|
||||||
|
julian = {
|
||||||
|
configFile = "/etc/wireguard/julian.conf";
|
||||||
|
autostart = true; # This interface is started on boot
|
||||||
|
};
|
||||||
|
comu = {
|
||||||
|
configFile = "/etc/wireguard/comu.conf";
|
||||||
|
autostart = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
11
features-nixos/optional/wireshark.nix
Normal file
11
features-nixos/optional/wireshark.nix
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.wireshark = {
|
||||||
|
programs.wireshark = {
|
||||||
|
enable = true;
|
||||||
|
dumpcap.enable = true;
|
||||||
|
usbmon.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.julian.extraGroups = ["wireshark"];
|
||||||
|
};
|
||||||
|
}
|
||||||
8
features-nixos/optional/xserver.nix
Normal file
8
features-nixos/optional/xserver.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.xserver = {
|
||||||
|
services.xserver = {
|
||||||
|
enable = true;
|
||||||
|
wacom.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
52
features-nixos/users/julian/default.nix
Normal file
52
features-nixos/users/julian/default.nix
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.users.julian = {
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
|
in {
|
||||||
|
users.mutableUsers = false;
|
||||||
|
users.users.julian = {
|
||||||
|
description = "Julian";
|
||||||
|
group = "julian";
|
||||||
|
isNormalUser = true;
|
||||||
|
uid = 1000;
|
||||||
|
shell = pkgs.fish;
|
||||||
|
extraGroups = ifTheyExist [
|
||||||
|
"networkmanager"
|
||||||
|
"wheel"
|
||||||
|
"audio"
|
||||||
|
"realtime"
|
||||||
|
"rtkit"
|
||||||
|
"network"
|
||||||
|
"video"
|
||||||
|
"podman"
|
||||||
|
"docker"
|
||||||
|
"git"
|
||||||
|
"gamemode"
|
||||||
|
"dialout"
|
||||||
|
];
|
||||||
|
|
||||||
|
openssh.authorizedKeys.keys = lib.splitString "\n" (
|
||||||
|
builtins.readFile ../../../../homes/julian/ssh.pub
|
||||||
|
);
|
||||||
|
# hashedPasswordFile = config.sops.secrets.julian-password.path;
|
||||||
|
hashedPassword = "$y$j9T$N33kLJQbV8soUoCbDkpwA1$r/yahJDgOPo4GGOrAi6BUG5zLTzmaBrA5NQ4nno561A";
|
||||||
|
packages = [pkgs.home-manager];
|
||||||
|
};
|
||||||
|
users.groups.julian = {
|
||||||
|
gid = 1000;
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.secrets.julian-password = {
|
||||||
|
sopsFile = ../../secrets.yaml;
|
||||||
|
neededForUsers = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
home-manager.users.julian = import ../../../../homes/julian/${config.networking.hostName}.nix;
|
||||||
|
|
||||||
|
security.pam.services.swaylock = {}; # Make swaylock unlocking work
|
||||||
|
};
|
||||||
|
}
|
||||||
30
features-nixos/users/pob/default.nix
Normal file
30
features-nixos/users/pob/default.nix
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.users.pob = {
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
|
in {
|
||||||
|
users.mutableUsers = false;
|
||||||
|
users.users.pob = {
|
||||||
|
description = "A helper user to use another profile for some applications";
|
||||||
|
group = "pob";
|
||||||
|
isNormalUser = true;
|
||||||
|
shell = pkgs.fish;
|
||||||
|
extraGroups = ifTheyExist [
|
||||||
|
"networkmanager"
|
||||||
|
];
|
||||||
|
packages = with pkgs; [
|
||||||
|
firefox
|
||||||
|
wineWowPackages.stable # 32-bit and 64-bit wine
|
||||||
|
winetricks
|
||||||
|
];
|
||||||
|
};
|
||||||
|
users.groups.pob = {};
|
||||||
|
|
||||||
|
security.sudo.extraConfig = ''
|
||||||
|
julian ALL=(pob) NOPASSWD: ALL
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
32
features-nixos/users/wolfi/default.nix
Normal file
32
features-nixos/users/wolfi/default.nix
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.users.wolfi = {
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
|
in {
|
||||||
|
users.mutableUsers = false;
|
||||||
|
users.users.wolfi = {
|
||||||
|
description = "Wolfi";
|
||||||
|
group = "wolfi";
|
||||||
|
isNormalUser = true;
|
||||||
|
shell = pkgs.fish;
|
||||||
|
extraGroups = ifTheyExist [
|
||||||
|
"networkmanager"
|
||||||
|
"wheel"
|
||||||
|
"audio"
|
||||||
|
"network"
|
||||||
|
"video"
|
||||||
|
"podman"
|
||||||
|
"docker"
|
||||||
|
"git"
|
||||||
|
"gamemode"
|
||||||
|
];
|
||||||
|
|
||||||
|
hashedPassword = "$y$j9T$ifzWjoZaRtPUOOfMYnbJ20$uFOO1EyDApL52vRUicZYgupaTA/a6sGNUj3imZ/lcb6";
|
||||||
|
packages = [pkgs.home-manager];
|
||||||
|
};
|
||||||
|
users.groups.wolfi = {};
|
||||||
|
};
|
||||||
|
}
|
||||||
99
features-nixos/users/yukari/default.nix
Normal file
99
features-nixos/users/yukari/default.nix
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
{
|
||||||
|
flake.nixosModules.users.yukari = {
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
outputs,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
|
in {
|
||||||
|
users.mutableUsers = false;
|
||||||
|
users.users.yukari = {
|
||||||
|
description = "Yukari";
|
||||||
|
group = "yukari";
|
||||||
|
isNormalUser = true;
|
||||||
|
shell = pkgs.fish;
|
||||||
|
extraGroups = ifTheyExist [
|
||||||
|
"networkmanager"
|
||||||
|
"audio"
|
||||||
|
"network"
|
||||||
|
"video"
|
||||||
|
"podman"
|
||||||
|
"docker"
|
||||||
|
"git"
|
||||||
|
"gamemode"
|
||||||
|
];
|
||||||
|
|
||||||
|
createHome = true;
|
||||||
|
hashedPassword = "$y$j9T$rGuTL0rfiy7ht8L58BGCw0$fN.KwHjYlIitFEPHndKvV06ezgeWzP3/58o1kkviZwB";
|
||||||
|
packages = [pkgs.home-manager];
|
||||||
|
};
|
||||||
|
users.groups.yukari = {};
|
||||||
|
|
||||||
|
home-manager.users.yukari = {
|
||||||
|
imports =
|
||||||
|
[
|
||||||
|
../../../../homes/julian/features/fonts
|
||||||
|
../../../../homes/julian/features/suites/cli
|
||||||
|
]
|
||||||
|
++ (builtins.attrValues outputs.homeManagerModules);
|
||||||
|
|
||||||
|
home = {
|
||||||
|
username = lib.mkDefault "yukari";
|
||||||
|
homeDirectory = lib.mkDefault "/home/${config.home.username}";
|
||||||
|
stateVersion = lib.mkDefault "23.11";
|
||||||
|
|
||||||
|
sessionPath = ["$HOME/.local/bin"];
|
||||||
|
|
||||||
|
packages = with pkgs; [
|
||||||
|
arandr
|
||||||
|
calibre # ebook manager and viewer
|
||||||
|
# digikam
|
||||||
|
discord
|
||||||
|
discord-ptb # in case discord updates take their time
|
||||||
|
# dvdisaster
|
||||||
|
# element-desktop
|
||||||
|
# rocketchat-desktop
|
||||||
|
thunderbird
|
||||||
|
telegram-desktop # telegram
|
||||||
|
# schildichat-desktop # not updated regularly
|
||||||
|
nheko
|
||||||
|
evince # Simple pdf reader, good for focusing on document content
|
||||||
|
firefox
|
||||||
|
vivaldi
|
||||||
|
# geogebra
|
||||||
|
cheese
|
||||||
|
handbrake
|
||||||
|
# kitty # Terminal, already available as feature
|
||||||
|
libnotify
|
||||||
|
libreoffice
|
||||||
|
mate.engrampa
|
||||||
|
nomacs # Image viewer
|
||||||
|
kdePackages.okular # Pdf reader with many features, good for commenting documents
|
||||||
|
pavucontrol
|
||||||
|
qalculate-gtk # Nice gui calculator
|
||||||
|
qpdfview
|
||||||
|
# qutebrowser
|
||||||
|
# realvnc-vnc-viewer
|
||||||
|
# rustdesk
|
||||||
|
tor-browser
|
||||||
|
# frajul.pob-dev-version # Path of Building
|
||||||
|
vlc
|
||||||
|
wineWowPackages.stable # 32-bit and 64-bit wine
|
||||||
|
winetricks
|
||||||
|
xclip # x11 clipboard access from terminal
|
||||||
|
xfce.mousepad # simple text editor
|
||||||
|
xournalpp # Edit pdf files
|
||||||
|
zoom-us # Video conferencing
|
||||||
|
zotero # Manage papers and other sources
|
||||||
|
pdfpc # Present slides in pdf form
|
||||||
|
];
|
||||||
|
};
|
||||||
|
programs = {
|
||||||
|
home-manager.enable = true;
|
||||||
|
git.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
207
flake.lock
generated
207
flake.lock
generated
@@ -38,11 +38,11 @@
|
|||||||
"utils": "utils"
|
"utils": "utils"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1749105467,
|
"lastModified": 1770019181,
|
||||||
"narHash": "sha256-hXh76y/wDl15almBcqvjryB50B0BaiXJKk20f314RoE=",
|
"narHash": "sha256-hwsYgDnby50JNVpTRYlF3UR/Rrpt01OrxVuryF40CFY=",
|
||||||
"owner": "serokell",
|
"owner": "serokell",
|
||||||
"repo": "deploy-rs",
|
"repo": "deploy-rs",
|
||||||
"rev": "6bc76b872374845ba9d645a2f012b764fecd765f",
|
"rev": "77c906c0ba56aabdbc72041bf9111b565cdd6171",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -58,11 +58,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753140376,
|
"lastModified": 1769524058,
|
||||||
"narHash": "sha256-7lrVrE0jSvZHrxEzvnfHFE/Wkk9DDqb+mYCodI5uuB8=",
|
"narHash": "sha256-zygdD6X1PcVNR2PsyK4ptzrVEiAdbMqLos7utrMDEWE=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "545aba02960caa78a31bd9a8709a0ad4b6320a5c",
|
"rev": "71a3fc97d80881e91710fe721f1158d3b96ae14d",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -111,11 +111,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753121425,
|
"lastModified": 1768135262,
|
||||||
"narHash": "sha256-TVcTNvOeWWk1DXljFxVRp+E0tzG1LhrVjOGGoMHuXio=",
|
"narHash": "sha256-PVvu7OqHBGWN16zSi6tEmPwwHQ4rLPU9Plvs8/1TUBY=",
|
||||||
"owner": "hercules-ci",
|
"owner": "hercules-ci",
|
||||||
"repo": "flake-parts",
|
"repo": "flake-parts",
|
||||||
"rev": "644e0fc48951a860279da645ba77fe4a6e814c5e",
|
"rev": "80daad04eddbbf5a4d883996a73f3f542fa437ac",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -203,11 +203,33 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753470191,
|
"lastModified": 1770260404,
|
||||||
"narHash": "sha256-hOUWU5L62G9sm8NxdiLWlLIJZz9H52VuFiDllHdwmVA=",
|
"narHash": "sha256-3iVX1+7YUIt23hBx1WZsUllhbmP2EnXrV8tCRbLxHc8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "a1817d1c0e5eabe7dfdfe4caa46c94d9d8f3fdb6",
|
"rev": "0d782ee42c86b196acff08acfbf41bb7d13eed5b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"ref": "release-25.11",
|
||||||
|
"repo": "home-manager",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"home-manager_2": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"impermanence",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1768598210,
|
||||||
|
"narHash": "sha256-kkgA32s/f4jaa4UG+2f8C225Qvclxnqs76mf8zvTVPg=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "home-manager",
|
||||||
|
"rev": "c47b2cc64a629f8e075de52e4742de688f930dc6",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -217,12 +239,16 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"impermanence": {
|
"impermanence": {
|
||||||
|
"inputs": {
|
||||||
|
"home-manager": "home-manager_2",
|
||||||
|
"nixpkgs": "nixpkgs_2"
|
||||||
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1737831083,
|
"lastModified": 1769548169,
|
||||||
"narHash": "sha256-LJggUHbpyeDvNagTUrdhe/pRVp4pnS6wVKALS782gRI=",
|
"narHash": "sha256-03+JxvzmfwRu+5JafM0DLbxgHttOQZkUtDWBmeUkN8Y=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "impermanence",
|
"repo": "impermanence",
|
||||||
"rev": "4b3e914cdf97a5b536a889e939fb2fd2b043a170",
|
"rev": "7b1d382faf603b6d264f58627330f9faa5cba149",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -245,16 +271,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1748294338,
|
"lastModified": 1754860581,
|
||||||
"narHash": "sha256-FVO01jdmUNArzBS7NmaktLdGA5qA3lUMJ4B7a05Iynw=",
|
"narHash": "sha256-EM0IE63OHxXCOpDHXaTyHIOk2cNvMCGPqLt/IdtVxgk=",
|
||||||
"owner": "NuschtOS",
|
"owner": "NuschtOS",
|
||||||
"repo": "ixx",
|
"repo": "ixx",
|
||||||
"rev": "cc5f390f7caf265461d4aab37e98d2292ebbdb85",
|
"rev": "babfe85a876162c4acc9ab6fb4483df88fa1f281",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NuschtOS",
|
"owner": "NuschtOS",
|
||||||
"ref": "v0.0.8",
|
"ref": "v0.1.1",
|
||||||
"repo": "ixx",
|
"repo": "ixx",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@@ -283,7 +309,7 @@
|
|||||||
},
|
},
|
||||||
"naersk": {
|
"naersk": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": "nixpkgs_2"
|
"nixpkgs": "nixpkgs_3"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1736429655,
|
"lastModified": 1736429655,
|
||||||
@@ -327,11 +353,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1752054764,
|
"lastModified": 1762090880,
|
||||||
"narHash": "sha256-Ob/HuUhANoDs+nvYqyTKrkcPXf4ZgXoqMTQoCK0RFgQ=",
|
"narHash": "sha256-fbRQzIGPkjZa83MowjbD2ALaJf9y6KMDdJBQMKFeY/8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixgl",
|
"repo": "nixgl",
|
||||||
"rev": "a8e1ce7d49a149ed70df676785b07f63288f53c5",
|
"rev": "b6105297e6f0cd041670c3e8628394d4ee247ed5",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -340,6 +366,26 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nix-index-database": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1772945408,
|
||||||
|
"narHash": "sha256-PMt48sEQ8cgCeljQ9I/32uoBq/8t8y+7W/nAZhf72TQ=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nix-index-database",
|
||||||
|
"rev": "1c1d8ea87b047788fd7567adf531418c5da321ec",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nix-index-database",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nix-matlab": {
|
"nix-matlab": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": "flake-compat_2",
|
"flake-compat": "flake-compat_2",
|
||||||
@@ -348,11 +394,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753455814,
|
"lastModified": 1754476755,
|
||||||
"narHash": "sha256-c78Dm4hxF9z1grjKbkKPvkOccIIxIl+optGRL0UDnf4=",
|
"narHash": "sha256-vSF0VMEmPMzwNkrXIZwkhOSYmKES9BaDK/LlEe7/q8E=",
|
||||||
"owner": "doronbehar",
|
"owner": "doronbehar",
|
||||||
"repo": "nix-matlab",
|
"repo": "nix-matlab",
|
||||||
"rev": "550d8ad0c21c63991e873bf4dcfe3d69adc1a2f1",
|
"rev": "0e9c9fb660f9e1a1e4d59fd083e0212a15b513e2",
|
||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -361,13 +407,49 @@
|
|||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixlib": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1736643958,
|
||||||
|
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nixpkgs.lib",
|
||||||
|
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nixpkgs.lib",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixos-generators": {
|
||||||
|
"inputs": {
|
||||||
|
"nixlib": "nixlib",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1769813415,
|
||||||
|
"narHash": "sha256-nnVmNNKBi1YiBNPhKclNYDORoHkuKipoz7EtVnXO50A=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nixos-generators",
|
||||||
|
"rev": "8946737ff703382fda7623b9fab071d037e897d5",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "nixos-generators",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753122741,
|
"lastModified": 1770882871,
|
||||||
"narHash": "sha256-nFxE8lk9JvGelxClCmwuJYftbHqwnc01dRN4DVLUroM=",
|
"narHash": "sha256-nw5g+xl3veea+maxJ2/81tMEA/rPq9aF1H5XF35X+OE=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "cc66fddc6cb04ab479a1bb062f4d4da27c936a22",
|
"rev": "af04cb78aa85b2a4d1c15fc7270347e0d0eda97b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -407,23 +489,39 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs-stable": {
|
"nixpkgs-unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1751274312,
|
"lastModified": 1770841267,
|
||||||
"narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=",
|
"narHash": "sha256-9xejG0KoqsoKEGp2kVbXRlEYtFFcDTHjidiuX8hGO44=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "50ab793786d9de88ee30ec4e4c24fb4236fc2674",
|
"rev": "ec7c70d12ce2fc37cb92aff673dcdca89d187bae",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"ref": "nixos-24.11",
|
"ref": "nixos-unstable",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1768564909,
|
||||||
|
"narHash": "sha256-Kell/SpJYVkHWMvnhqJz/8DqQg2b6PguxVWOuadbHCc=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "e4bae1bd10c9c57b2cf517953ab70060a828ee6f",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_3": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 0,
|
"lastModified": 0,
|
||||||
"narHash": "sha256-DjkQPnkAfd7eB522PwnkGhOMuT9QVCZspDpJJYyOj60=",
|
"narHash": "sha256-DjkQPnkAfd7eB522PwnkGhOMuT9QVCZspDpJJYyOj60=",
|
||||||
@@ -435,18 +533,18 @@
|
|||||||
"type": "indirect"
|
"type": "indirect"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_3": {
|
"nixpkgs_4": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753250450,
|
"lastModified": 1770770419,
|
||||||
"narHash": "sha256-i+CQV2rPmP8wHxj0aq4siYyohHwVlsh40kV89f3nw1s=",
|
"narHash": "sha256-iKZMkr6Cm9JzWlRYW/VPoL0A9jVKtZYiU4zSrVeetIs=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "fc02ee70efb805d3b2865908a13ddd4474557ecf",
|
"rev": "6c5e707c6b5339359a9a9e215c5e66d6d802fd7a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"ref": "nixos-unstable",
|
"ref": "nixos-25.11",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@@ -461,15 +559,16 @@
|
|||||||
"systems": "systems_5"
|
"systems": "systems_5"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753487377,
|
"lastModified": 1769049374,
|
||||||
"narHash": "sha256-dEr3pYtC4/1PhP5ADIV8Fjjmxv6WC6UisQAUqtwdews=",
|
"narHash": "sha256-h0Os2qqNyycDY1FyZgtbn28VF1ySP74/n0f+LDd8j+w=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixvim",
|
"repo": "nixvim",
|
||||||
"rev": "3d09c8eaceb7a78ef9f5568024da1616f00c33e3",
|
"rev": "b8f76bf5751835647538ef8784e4e6ee8deb8f95",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
|
"ref": "nixos-25.11",
|
||||||
"repo": "nixvim",
|
"repo": "nixvim",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@@ -484,11 +583,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1753385846,
|
"lastModified": 1768249818,
|
||||||
"narHash": "sha256-XDu9T2o6Rxe0acpchwQ2aXaRfE/uEYALpVbf+9QDEO4=",
|
"narHash": "sha256-ANfn5OqIxq3HONPIXZ6zuI5sLzX1sS+2qcf/Pa0kQEc=",
|
||||||
"owner": "NuschtOS",
|
"owner": "NuschtOS",
|
||||||
"repo": "search",
|
"repo": "search",
|
||||||
"rev": "5c7e4eff303cba8447ffb443522b3c72bc47a9ba",
|
"rev": "b6f77b88e9009bfde28e2130e218e5123dc66796",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -506,10 +605,12 @@
|
|||||||
"music-reader": "music-reader",
|
"music-reader": "music-reader",
|
||||||
"nix-colors": "nix-colors",
|
"nix-colors": "nix-colors",
|
||||||
"nix-gl": "nix-gl",
|
"nix-gl": "nix-gl",
|
||||||
|
"nix-index-database": "nix-index-database",
|
||||||
"nix-matlab": "nix-matlab",
|
"nix-matlab": "nix-matlab",
|
||||||
|
"nixos-generators": "nixos-generators",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs_3",
|
"nixpkgs": "nixpkgs_4",
|
||||||
"nixpkgs-stable": "nixpkgs-stable",
|
"nixpkgs-unstable": "nixpkgs-unstable",
|
||||||
"nixvim": "nixvim",
|
"nixvim": "nixvim",
|
||||||
"sheet-organizer": "sheet-organizer",
|
"sheet-organizer": "sheet-organizer",
|
||||||
"sops-nix": "sops-nix",
|
"sops-nix": "sops-nix",
|
||||||
@@ -546,11 +647,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1752544651,
|
"lastModified": 1770683991,
|
||||||
"narHash": "sha256-GllP7cmQu7zLZTs9z0J2gIL42IZHa9CBEXwBY9szT0U=",
|
"narHash": "sha256-xVfPvXDf9QN3Eh9dV+Lw6IkWG42KSuQ1u2260HKvpnc=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "2c8def626f54708a9c38a5861866660395bb3461",
|
"rev": "8b89f44c2cc4581e402111d928869fe7ba9f7033",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -685,11 +786,11 @@
|
|||||||
"yazi-flavors": {
|
"yazi-flavors": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1751970029,
|
"lastModified": 1770522883,
|
||||||
"narHash": "sha256-RtunaCs1RUfzjefFLFu5qLRASbyk5RUILWTdavThRkc=",
|
"narHash": "sha256-tCAJXPV7s1akc+zHGdWjmdMPG4NpBE92vcO7LAvI5TI=",
|
||||||
"owner": "yazi-rs",
|
"owner": "yazi-rs",
|
||||||
"repo": "flavors",
|
"repo": "flavors",
|
||||||
"rev": "d3fd3a5d774b48b3f88845f4f0ae1b82f106d331",
|
"rev": "4c5753789ea535540e868e2764127be9230cef23",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
311
flake.nix
311
flake.nix
@@ -2,16 +2,25 @@
|
|||||||
description = "Home Manager configuration of julian";
|
description = "Home Manager configuration of julian";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.11";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
|
||||||
systems.url = "github:nix-systems/default-linux";
|
systems.url = "github:nix-systems/default-linux";
|
||||||
nixos-hardware.url = "github:nixos/nixos-hardware";
|
nixos-hardware.url = "github:nixos/nixos-hardware";
|
||||||
impermanence.url = "github:nix-community/impermanence";
|
impermanence.url = "github:nix-community/impermanence";
|
||||||
nix-colors.url = "github:misterio77/nix-colors";
|
nix-colors.url = "github:misterio77/nix-colors";
|
||||||
deploy-rs.url = "github:serokell/deploy-rs";
|
deploy-rs.url = "github:serokell/deploy-rs";
|
||||||
|
|
||||||
|
nixos-generators = {
|
||||||
|
url = "github:nix-community/nixos-generators";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager";
|
url = "github:nix-community/home-manager/release-25.11";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
nix-index-database = {
|
||||||
|
url = "github:nix-community/nix-index-database";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
sops-nix = {
|
sops-nix = {
|
||||||
@@ -27,13 +36,16 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
flake-parts.url = "github:hercules-ci/flake-parts";
|
||||||
|
import-tree.url = "github:vic/import-tree";
|
||||||
|
|
||||||
# Various flakes
|
# Various flakes
|
||||||
yazi-flavors = {
|
yazi-flavors = {
|
||||||
url = "github:yazi-rs/flavors";
|
url = "github:yazi-rs/flavors";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
nixvim = {
|
nixvim = {
|
||||||
url = "github:nix-community/nixvim";
|
url = "github:nix-community/nixvim/nixos-25.11";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
nix-matlab = {
|
nix-matlab = {
|
||||||
@@ -52,136 +64,163 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = {
|
outputs = inputs:
|
||||||
self,
|
inputs.flake-parts.lib.mkFlake {inherit inputs;} (inputs.import-tree
|
||||||
nixpkgs,
|
[
|
||||||
home-manager,
|
./hosts
|
||||||
systems,
|
./features-nixos
|
||||||
...
|
./homes
|
||||||
} @ inputs: let
|
./features-home-manager
|
||||||
inherit (self) outputs;
|
# ./modules
|
||||||
lib = nixpkgs.lib // home-manager.lib;
|
# ./overlays
|
||||||
forEachSystem = f: lib.genAttrs (import systems) (system: f pkgsFor.${system});
|
# ./packages
|
||||||
pkgsFor = lib.genAttrs (import systems) (
|
]);
|
||||||
system:
|
# let
|
||||||
import nixpkgs {
|
# inherit (self) outputs;
|
||||||
inherit system;
|
# lib = nixpkgs.lib // home-manager.lib;
|
||||||
config.allowUnfree = true;
|
# forEachSystem = f: lib.genAttrs (import systems) (system: f pkgsFor.${system});
|
||||||
config.permittedInsecurePackages = [
|
# pkgsFor = lib.genAttrs (import systems) (
|
||||||
"olm-3.2.16"
|
# system:
|
||||||
];
|
# import nixpkgs {
|
||||||
warn-dirty = false;
|
# inherit system;
|
||||||
}
|
# config.allowUnfree = true;
|
||||||
);
|
# config.permittedInsecurePackages = [
|
||||||
in {
|
# "olm-3.2.16"
|
||||||
inherit lib;
|
# ];
|
||||||
|
# warn-dirty = false;
|
||||||
nixosModules = import ./modules/nixos;
|
# }
|
||||||
homeManagerModules = import ./modules/home-manager;
|
# );
|
||||||
|
# in {
|
||||||
overlays = import ./overlays {inherit inputs outputs;};
|
# inherit lib;
|
||||||
# hydraJobs = import ./hydra.nix { inherit inputs outputs; }; # TODO add hydra jobs here?
|
|
||||||
|
# nixosModules = import ./modules/nixos;
|
||||||
packages = forEachSystem (pkgs: import ./pkgs {inherit pkgs;});
|
# homeManagerModules = import ./modules/home-manager;
|
||||||
devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;});
|
|
||||||
formatter = forEachSystem (pkgs: pkgs.alejandra);
|
# overlays = import ./overlays {inherit inputs outputs;};
|
||||||
|
# # hydraJobs = import ./hydra.nix { inherit inputs outputs; }; # TODO add hydra jobs here?
|
||||||
nixosConfigurations = {
|
|
||||||
# Main laptop
|
# packages = forEachSystem (pkgs: import ./pkgs {inherit pkgs;});
|
||||||
aspi = lib.nixosSystem {
|
# devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;});
|
||||||
modules = [./hosts/aspi];
|
# formatter = forEachSystem (pkgs: pkgs.alejandra); # nix fmt *
|
||||||
specialArgs = {
|
|
||||||
inherit inputs outputs;
|
# nixosConfigurations = {
|
||||||
};
|
# # Main laptop
|
||||||
};
|
# aspi = lib.nixosSystem {
|
||||||
# Piano raspberry pi
|
# modules = [
|
||||||
pianonix = lib.nixosSystem {
|
# ./hosts/aspi
|
||||||
modules = [./hosts/pianonix];
|
# ];
|
||||||
specialArgs = {
|
# specialArgs = {
|
||||||
inherit inputs outputs;
|
# inherit inputs outputs;
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
kardorf = lib.nixosSystem {
|
# # Piano raspberry pi
|
||||||
modules = [./hosts/kardorf];
|
# # pianonix = lib.nixosSystem {
|
||||||
specialArgs = {
|
# # modules = [./hosts/pianonix];
|
||||||
inherit inputs outputs;
|
# # specialArgs = {
|
||||||
};
|
# # inherit inputs outputs;
|
||||||
};
|
# # };
|
||||||
builder = lib.nixosSystem {
|
# # };
|
||||||
modules = [./hosts/builder];
|
# kardorf = lib.nixosSystem {
|
||||||
specialArgs = {
|
# modules = [./hosts/kardorf];
|
||||||
inherit inputs outputs;
|
# specialArgs = {
|
||||||
};
|
# inherit inputs outputs;
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
|
# builder = lib.nixosSystem {
|
||||||
# Standalone HM
|
# modules = [./hosts/builder];
|
||||||
homeConfigurations = {
|
# specialArgs = {
|
||||||
# Main laptop
|
# inherit inputs outputs;
|
||||||
"julian@aspi" = lib.homeManagerConfiguration {
|
# };
|
||||||
modules = [
|
# };
|
||||||
./homes/julian/aspi.nix
|
# };
|
||||||
./homes/julian/hm-standalone-config.nix
|
|
||||||
];
|
# # Standalone HM
|
||||||
pkgs = pkgsFor.x86_64-linux;
|
# homeConfigurations = {
|
||||||
extraSpecialArgs = {
|
# # Main laptop
|
||||||
inherit inputs outputs;
|
# "julian@aspi" = lib.homeManagerConfiguration {
|
||||||
};
|
# modules = [
|
||||||
};
|
# ./homes/julian/aspi.nix
|
||||||
# Media server (RPi)
|
# ./homes/julian/hm-standalone-config.nix
|
||||||
"julian@pianonix" = lib.homeManagerConfiguration {
|
# ];
|
||||||
modules = [
|
# pkgs = pkgsFor.x86_64-linux;
|
||||||
./homes/julian/pianonix.nix
|
# extraSpecialArgs = {
|
||||||
./homes/julian/hm-standalone-config.nix
|
# inherit inputs outputs;
|
||||||
];
|
# };
|
||||||
pkgs = pkgsFor.aarch64-linux;
|
# };
|
||||||
extraSpecialArgs = {
|
# # Media server (RPi)
|
||||||
inherit inputs outputs;
|
# # "julian@pianonix" = lib.homeManagerConfiguration {
|
||||||
};
|
# # modules = [
|
||||||
};
|
# # ./homes/julian/pianonix.nix
|
||||||
"julian@kardorf" = lib.homeManagerConfiguration {
|
# # ./homes/julian/hm-standalone-config.nix
|
||||||
modules = [
|
# # ];
|
||||||
./homes/julian/kardorf.nix
|
# # pkgs = pkgsFor.aarch64-linux;
|
||||||
./homes/julian/hm-standalone-config.nix
|
# # extraSpecialArgs = {
|
||||||
];
|
# # inherit inputs outputs;
|
||||||
pkgs = pkgsFor.x86_64-linux;
|
# # };
|
||||||
extraSpecialArgs = {
|
# # };
|
||||||
inherit inputs outputs;
|
# "julian@kardorf" = lib.homeManagerConfiguration {
|
||||||
};
|
# modules = [
|
||||||
};
|
# ./homes/julian/kardorf.nix
|
||||||
"julian@v3ms" = lib.homeManagerConfiguration {
|
# ./homes/julian/hm-standalone-config.nix
|
||||||
modules = [
|
# ];
|
||||||
./homes/julian/v3ms
|
# pkgs = pkgsFor.x86_64-linux;
|
||||||
./homes/julian/hm-standalone-config.nix
|
# extraSpecialArgs = {
|
||||||
];
|
# inherit inputs outputs;
|
||||||
pkgs = pkgsFor.x86_64-linux;
|
# };
|
||||||
extraSpecialArgs = {
|
# };
|
||||||
inherit inputs outputs;
|
# "julian@v3ms" = lib.homeManagerConfiguration {
|
||||||
};
|
# modules = [
|
||||||
};
|
# ./homes/julian/v3ms
|
||||||
};
|
# ./homes/julian/hm-standalone-config.nix
|
||||||
|
# ];
|
||||||
# deploy-rs node configuration
|
# pkgs = pkgsFor.x86_64-linux;
|
||||||
deploy.nodes = {
|
# extraSpecialArgs = {
|
||||||
pianonix = {
|
# inherit inputs outputs;
|
||||||
hostname = "pianonix.local";
|
# };
|
||||||
profiles.system = {
|
# };
|
||||||
sshUser = "root";
|
# "julian@quickstart" = lib.homeManagerConfiguration {
|
||||||
user = "root";
|
# modules = [
|
||||||
path = inputs.deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.pianonix;
|
# ./homes/julian/quickstart.nix
|
||||||
confirmTimeout = 90; # default: 30s; raspberrypi takes a little longer restarting services
|
# ./homes/julian/hm-standalone-config.nix
|
||||||
};
|
# ];
|
||||||
};
|
# pkgs = pkgsFor.x86_64-linux;
|
||||||
|
# extraSpecialArgs = {
|
||||||
builder = {
|
# inherit inputs outputs;
|
||||||
hostname = "builder.julian-mutter.de";
|
# };
|
||||||
profiles.system = {
|
# };
|
||||||
sshUser = "root";
|
# };
|
||||||
user = "root";
|
|
||||||
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.builder;
|
# # deploy-rs node configuration
|
||||||
remoteBuild = true;
|
# deploy.nodes = {
|
||||||
};
|
# # pianonix = {
|
||||||
};
|
# # hostname = "pianonix.local";
|
||||||
};
|
# # profiles.system = {
|
||||||
};
|
# # sshUser = "root";
|
||||||
|
# # user = "root";
|
||||||
|
# # path = inputs.deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.pianonix;
|
||||||
|
# # confirmTimeout = 90; # default: 30s; raspberrypi takes a little longer restarting services
|
||||||
|
# # };
|
||||||
|
# # };
|
||||||
|
|
||||||
|
# builder = {
|
||||||
|
# hostname = "builder.julian-mutter.de";
|
||||||
|
# profiles.system = {
|
||||||
|
# sshUser = "root";
|
||||||
|
# user = "root";
|
||||||
|
# path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.builder;
|
||||||
|
# remoteBuild = true;
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
|
||||||
|
# # substitutes: nixos-generate --flake .#pianonix -f sd-aarch64 --system aarch64-linux
|
||||||
|
# pianonix-image = inputs.nixos-generators.nixosGenerate {
|
||||||
|
# system = "aarch64-linux";
|
||||||
|
# format = "sd-aarch64";
|
||||||
|
# modules = [./hosts/pianonix];
|
||||||
|
# specialArgs = {
|
||||||
|
# inherit inputs outputs;
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
# };
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -11,6 +11,8 @@
|
|||||||
./features/alacritty
|
./features/alacritty
|
||||||
./features/yazi
|
./features/yazi
|
||||||
./features/emacs
|
./features/emacs
|
||||||
|
./features/tmux
|
||||||
|
./features/qt-distrobox
|
||||||
|
|
||||||
./features/hyprland
|
./features/hyprland
|
||||||
|
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
config,
|
config,
|
||||||
|
inputs,
|
||||||
outputs,
|
outputs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
@@ -9,6 +10,7 @@
|
|||||||
[
|
[
|
||||||
../features/fonts
|
../features/fonts
|
||||||
../features/nix-helper
|
../features/nix-helper
|
||||||
|
inputs.nix-index-database.homeModules.default # nix-locate
|
||||||
]
|
]
|
||||||
++ (builtins.attrValues outputs.homeManagerModules);
|
++ (builtins.attrValues outputs.homeManagerModules);
|
||||||
|
|
||||||
@@ -24,13 +26,28 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# To allow unfree with 'nix run'
|
||||||
|
xdg.configFile."nixpkgs/config.nix".text = ''
|
||||||
|
{ allowUnfree = true; }
|
||||||
|
'';
|
||||||
|
|
||||||
colorscheme.name = "catppuccin-mocha";
|
colorscheme.name = "catppuccin-mocha";
|
||||||
|
|
||||||
# systemd.user.startServices = "sd-switch"; # TODO: what is this
|
# systemd.user.startServices = "sd-switch"; # TODO: what is this
|
||||||
|
|
||||||
|
# Expire old hm generations
|
||||||
|
hm-expire = {
|
||||||
|
enable = true;
|
||||||
|
dates = "weekly";
|
||||||
|
expire = "-30 days";
|
||||||
|
};
|
||||||
|
|
||||||
programs = {
|
programs = {
|
||||||
home-manager.enable = true;
|
home-manager.enable = true;
|
||||||
git.enable = true;
|
git.enable = true;
|
||||||
|
|
||||||
|
nix-index.enable = true; # allows command-not-found
|
||||||
|
nix-index-database.comma.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
home = {
|
home = {
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user