Compare commits
44 Commits
flake-part
...
flake-upda
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
95a9ca3106 | ||
|
|
0f7c5aadc4 | ||
|
|
5cc4447357 | ||
|
|
27858bba45 | ||
|
|
4c16190792 | ||
|
|
2b46ba50c4 | ||
|
|
e64b6a4d1a | ||
|
|
2d064e9418 | ||
|
|
521c012e60 | ||
|
|
b3535ea514 | ||
|
|
e827028c4a | ||
|
|
8e93af69b1 | ||
|
|
535a26d903 | ||
|
|
e32fd7e782 | ||
|
|
70f96542d2 | ||
|
|
0fdc45e5e9 | ||
|
|
4fb3e7404b | ||
|
|
51cc5048cd | ||
|
|
e43fe615ed | ||
|
|
7cda8ee329 | ||
|
|
afd5a32d4c | ||
|
|
a12971ded2 | ||
|
|
036822073c | ||
|
|
3a64f15fc0 | ||
|
|
6e3f553aaf | ||
|
|
47a6ceb6a0 | ||
|
|
19ac09afa8 | ||
|
|
40ccc7d5b3 | ||
|
|
7e2f943d88 | ||
|
|
5eb4ad2f6a | ||
|
|
50818e868e | ||
|
|
87cd547724 | ||
|
|
9194187b39 | ||
|
|
08460491d1 | ||
|
|
3caeb5c818 | ||
|
|
2332a60870 | ||
|
|
7aed55a16a | ||
| 64392b695e | |||
| 8896788bfd | |||
| eec600d1d0 | |||
| b31791b9ef | |||
| 8de280d7e5 | |||
| 8c8a6121bc | |||
| f1296e7675 |
10
.sops.yaml
10
.sops.yaml
@@ -1,17 +1,15 @@
|
|||||||
keys:
|
keys:
|
||||||
- &primary age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
- &primary age1ee5udznhadk6m7jtglu4709rep080yjyd2ukzdl8jma4mm92y3psv0slpg
|
||||||
- &aspi-ssh age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
- &aspi-ssh age1q8lc5340gz5xw2f57nglrss68wv0j0hf36py2pdtrl6ky3yrq9qqk0njr4
|
||||||
- &pianonix-ssh age1tguyu2yd5xv8rgjjl50cq6dq5rr7umqgv098dgre4u9wyj30ea7sexw62c
|
|
||||||
- &builder-ssh age1kw4kmdm45zprvdkrrpvgq966l7585vhusmum083qlwnr0xxgd3uqatcyja
|
- &builder-ssh age1kw4kmdm45zprvdkrrpvgq966l7585vhusmum083qlwnr0xxgd3uqatcyja
|
||||||
- &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
- &kardorf-ssh age15lxw97z03q40xrdscnxqqugh5ky5aqrerg2t2rphkcqm6rnllurq8v98q5
|
||||||
|
|
||||||
creation_rules:
|
creation_rules:
|
||||||
- path_regex: hosts/common/secrets.yaml$
|
- path_regex: hosts/secrets-common.yaml$
|
||||||
key_groups:
|
key_groups:
|
||||||
- age:
|
- age:
|
||||||
- *primary
|
- *primary
|
||||||
- *aspi-ssh
|
- *aspi-ssh
|
||||||
- *pianonix-ssh
|
|
||||||
- *kardorf-ssh
|
- *kardorf-ssh
|
||||||
|
|
||||||
- path_regex: hosts/builder/secrets.yaml$
|
- path_regex: hosts/builder/secrets.yaml$
|
||||||
@@ -19,9 +17,3 @@ creation_rules:
|
|||||||
- age:
|
- age:
|
||||||
- *primary
|
- *primary
|
||||||
- *builder-ssh
|
- *builder-ssh
|
||||||
|
|
||||||
- path_regex: hosts/pianonix/secrets*
|
|
||||||
key_groups:
|
|
||||||
- age:
|
|
||||||
- *primary
|
|
||||||
- *pianonix-ssh
|
|
||||||
|
|||||||
@@ -1,18 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {
|
|
||||||
inputs,
|
|
||||||
config,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
system.hydraAutoUpgrade = {
|
|
||||||
# Only enable if not dirty
|
|
||||||
enable = inputs.self ? rev;
|
|
||||||
dates = "*:0/10"; # Every 10 minutes
|
|
||||||
instance = "http://hydra.julian-mutter.de";
|
|
||||||
project = "dotfiles";
|
|
||||||
jobset = "main";
|
|
||||||
job = "hosts.${config.networking.hostName}";
|
|
||||||
oldFlakeRef = "self";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
# Common config for all hosts
|
|
||||||
{
|
|
||||||
flake.nixosModules.base = {
|
|
||||||
inputs,
|
|
||||||
outputs,
|
|
||||||
pkgs,
|
|
||||||
lib,
|
|
||||||
...
|
|
||||||
}: {
|
|
||||||
imports = [
|
|
||||||
inputs.home-manager.nixosModules.home-manager
|
|
||||||
];
|
|
||||||
|
|
||||||
# Replaces the (modulesPath + "/installer/scan/not-detected.nix") from default hardware-configuration.nix
|
|
||||||
# Enables non-free firmware
|
|
||||||
hardware.enableRedistributableFirmware = true;
|
|
||||||
|
|
||||||
# Networking
|
|
||||||
networking.networkmanager = {
|
|
||||||
enable = true;
|
|
||||||
plugins = with pkgs; [
|
|
||||||
networkmanager-openconnect
|
|
||||||
];
|
|
||||||
};
|
|
||||||
services.resolved.enable = false;
|
|
||||||
# MDNS Taken by avahi
|
|
||||||
# networking.networkmanager.dns = "none";
|
|
||||||
networking.nameservers = lib.mkDefault [
|
|
||||||
"1.1.1.1"
|
|
||||||
"8.8.8.8"
|
|
||||||
];
|
|
||||||
|
|
||||||
# HM module
|
|
||||||
home-manager.useGlobalPkgs = true; # hm module uses the pkgs of the nixos config
|
|
||||||
home-manager.backupFileExtension = "hm-backup"; # backup conflicting files. So hm activation never fails
|
|
||||||
home-manager.extraSpecialArgs = {
|
|
||||||
inherit inputs outputs;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {
|
|
||||||
programs.fish = {
|
|
||||||
enable = true;
|
|
||||||
vendor = {
|
|
||||||
completions.enable = true;
|
|
||||||
config.enable = true;
|
|
||||||
functions.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {
|
|
||||||
# Select internationalisation properties.
|
|
||||||
i18n.defaultLocale = "en_US.UTF-8";
|
|
||||||
|
|
||||||
i18n.extraLocaleSettings = {
|
|
||||||
LC_ADDRESS = "de_DE.UTF-8";
|
|
||||||
LC_IDENTIFICATION = "de_DE.UTF-8";
|
|
||||||
LC_MEASUREMENT = "de_DE.UTF-8";
|
|
||||||
LC_MONETARY = "de_DE.UTF-8";
|
|
||||||
LC_NAME = "de_DE.UTF-8";
|
|
||||||
LC_NUMERIC = "en_US.UTF-8";
|
|
||||||
LC_PAPER = "de_DE.UTF-8";
|
|
||||||
LC_TELEPHONE = "de_DE.UTF-8";
|
|
||||||
LC_TIME = "de_DE.UTF-8";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Keymap
|
|
||||||
services.xserver.xkb = {
|
|
||||||
layout = "de";
|
|
||||||
variant = "";
|
|
||||||
};
|
|
||||||
|
|
||||||
console.keyMap = "de";
|
|
||||||
|
|
||||||
time.timeZone = "Europe/Berlin";
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,48 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {outputs, ...}: {
|
|
||||||
# Apply overlays
|
|
||||||
nixpkgs = {
|
|
||||||
# TODO: apply this to hm and nixos without duplicate code
|
|
||||||
overlays = builtins.attrValues outputs.overlays;
|
|
||||||
config = {
|
|
||||||
nvidia.acceptLicense = true;
|
|
||||||
allowUnfree = true;
|
|
||||||
allowUnfreePredicate = _: true; # TODO: what is this
|
|
||||||
warn-dirty = false;
|
|
||||||
permittedInsecurePackages = [
|
|
||||||
"olm-3.2.16"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# optimize at every build, slows down builds
|
|
||||||
# better to do optimise.automatic for regular optimising
|
|
||||||
# nix.settings.auto-optimise-store = lib.mkDefault true;
|
|
||||||
nix.settings.experimental-features = [
|
|
||||||
"nix-command"
|
|
||||||
"flakes"
|
|
||||||
"ca-derivations"
|
|
||||||
];
|
|
||||||
# warn-dirty = false;
|
|
||||||
|
|
||||||
nix.gc = {
|
|
||||||
automatic = true;
|
|
||||||
dates = "weekly";
|
|
||||||
options = "--delete-older-than 30d";
|
|
||||||
persistent = true;
|
|
||||||
};
|
|
||||||
nix.optimise = {
|
|
||||||
automatic = true;
|
|
||||||
dates = ["weekly"]; # Optional; allows customizing optimisation schedule
|
|
||||||
persistent = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.nix-ld.enable = true;
|
|
||||||
|
|
||||||
# TODO: is this useful?, what does it do?
|
|
||||||
# nix.settings.flake-registry = ""; # Disable global flake registry
|
|
||||||
# Add each flake input as a registry and nix_path
|
|
||||||
# registry = lib.mapAttrs (_: flake: { inherit flake; }) flakeInputs;
|
|
||||||
# nixPath = lib.mapAttrsToList (n: _: "${n}=flake:${n}") flakeInputs;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,11 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {pkgs, ...}: {
|
|
||||||
# Packages needed as root
|
|
||||||
environment.systemPackages = with pkgs; [
|
|
||||||
vim
|
|
||||||
htop
|
|
||||||
mc
|
|
||||||
gparted-xhost # needs to be installed as system package so it can be actually opened
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,24 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.base = {
|
|
||||||
inputs,
|
|
||||||
config,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
isEd25519 = k: k.type == "ed25519";
|
|
||||||
getKeyPath = k: k.path;
|
|
||||||
keys = builtins.filter isEd25519 config.services.openssh.hostKeys;
|
|
||||||
in {
|
|
||||||
imports = [inputs.sops-nix.nixosModules.sops];
|
|
||||||
|
|
||||||
sops.age = {
|
|
||||||
sshKeyPaths = map getKeyPath keys;
|
|
||||||
|
|
||||||
# TODO: remove? only rely on ssh or pgp keys (e.g. ubikey like misterio is using!!!)
|
|
||||||
# keyFile = "/home/julian/.config/sops/age/keys.txt";
|
|
||||||
# Generate key if none of the above worked. With this, building will still work, just without secrets
|
|
||||||
generateKey = false; # TODO: building should not work without secrets!?
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.defaultSopsFile = ./secrets.yaml;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
16
features-nixos/global/auto-upgrade.nix
Normal file
16
features-nixos/global/auto-upgrade.nix
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
inputs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
system.hydraAutoUpgrade = {
|
||||||
|
# Only enable if not dirty
|
||||||
|
enable = inputs.self ? rev;
|
||||||
|
dates = "*:0/10"; # Every 10 minutes
|
||||||
|
instance = "http://hydra.julian-mutter.de";
|
||||||
|
project = "dotfiles";
|
||||||
|
jobset = "main";
|
||||||
|
job = "hosts.${config.networking.hostName}";
|
||||||
|
oldFlakeRef = "self";
|
||||||
|
};
|
||||||
|
}
|
||||||
47
features-nixos/global/default.nix
Normal file
47
features-nixos/global/default.nix
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
# Common config for all hosts
|
||||||
|
{
|
||||||
|
inputs,
|
||||||
|
outputs,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
imports =
|
||||||
|
[
|
||||||
|
./fish.nix # fish for admin
|
||||||
|
./locale.nix
|
||||||
|
./nix.nix
|
||||||
|
./sops.nix
|
||||||
|
./root.nix
|
||||||
|
]
|
||||||
|
++ [
|
||||||
|
inputs.home-manager.nixosModules.home-manager
|
||||||
|
]
|
||||||
|
++ (builtins.attrValues outputs.nixosModules);
|
||||||
|
|
||||||
|
# Replaces the (modulesPath + "/installer/scan/not-detected.nix") from default hardware-configuration.nix
|
||||||
|
# Enables non-free firmware
|
||||||
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
|
||||||
|
# Networking
|
||||||
|
networking.networkmanager = {
|
||||||
|
enable = true;
|
||||||
|
plugins = with pkgs; [
|
||||||
|
networkmanager-openconnect
|
||||||
|
];
|
||||||
|
};
|
||||||
|
services.resolved.enable = false;
|
||||||
|
# MDNS Taken by avahi
|
||||||
|
# networking.networkmanager.dns = "none";
|
||||||
|
networking.nameservers = lib.mkDefault [
|
||||||
|
"1.1.1.1"
|
||||||
|
"8.8.8.8"
|
||||||
|
];
|
||||||
|
|
||||||
|
# HM module
|
||||||
|
home-manager.useGlobalPkgs = true; # hm module uses the pkgs of the nixos config
|
||||||
|
home-manager.backupFileExtension = "hm-backup"; # backup conflicting files. So hm activation never fails
|
||||||
|
home-manager.extraSpecialArgs = {
|
||||||
|
inherit inputs outputs;
|
||||||
|
};
|
||||||
|
}
|
||||||
10
features-nixos/global/fish.nix
Normal file
10
features-nixos/global/fish.nix
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
{
|
||||||
|
programs.fish = {
|
||||||
|
enable = true;
|
||||||
|
vendor = {
|
||||||
|
completions.enable = true;
|
||||||
|
config.enable = true;
|
||||||
|
functions.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
26
features-nixos/global/locale.nix
Normal file
26
features-nixos/global/locale.nix
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
{
|
||||||
|
# Select internationalisation properties.
|
||||||
|
i18n.defaultLocale = "en_US.UTF-8";
|
||||||
|
|
||||||
|
i18n.extraLocaleSettings = {
|
||||||
|
LC_ADDRESS = "de_DE.UTF-8";
|
||||||
|
LC_IDENTIFICATION = "de_DE.UTF-8";
|
||||||
|
LC_MEASUREMENT = "de_DE.UTF-8";
|
||||||
|
LC_MONETARY = "de_DE.UTF-8";
|
||||||
|
LC_NAME = "de_DE.UTF-8";
|
||||||
|
LC_NUMERIC = "en_US.UTF-8";
|
||||||
|
LC_PAPER = "de_DE.UTF-8";
|
||||||
|
LC_TELEPHONE = "de_DE.UTF-8";
|
||||||
|
LC_TIME = "de_DE.UTF-8";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Keymap
|
||||||
|
services.xserver.xkb = {
|
||||||
|
layout = "de";
|
||||||
|
variant = "";
|
||||||
|
};
|
||||||
|
|
||||||
|
console.keyMap = "de";
|
||||||
|
|
||||||
|
time.timeZone = "Europe/Berlin";
|
||||||
|
}
|
||||||
46
features-nixos/global/nix.nix
Normal file
46
features-nixos/global/nix.nix
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
{outputs, ...}: {
|
||||||
|
# Apply overlays
|
||||||
|
nixpkgs = {
|
||||||
|
# TODO: apply this to hm and nixos without duplicate code
|
||||||
|
overlays = builtins.attrValues outputs.overlays;
|
||||||
|
config = {
|
||||||
|
nvidia.acceptLicense = true;
|
||||||
|
allowUnfree = true;
|
||||||
|
allowUnfreePredicate = _: true; # TODO: what is this
|
||||||
|
warn-dirty = false;
|
||||||
|
permittedInsecurePackages = [
|
||||||
|
"olm-3.2.16"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# optimize at every build, slows down builds
|
||||||
|
# better to do optimise.automatic for regular optimising
|
||||||
|
# nix.settings.auto-optimise-store = lib.mkDefault true;
|
||||||
|
nix.settings.experimental-features = [
|
||||||
|
"nix-command"
|
||||||
|
"flakes"
|
||||||
|
"ca-derivations"
|
||||||
|
];
|
||||||
|
# warn-dirty = false;
|
||||||
|
|
||||||
|
nix.gc = {
|
||||||
|
automatic = true;
|
||||||
|
dates = "weekly";
|
||||||
|
options = "--delete-older-than 30d";
|
||||||
|
persistent = true;
|
||||||
|
};
|
||||||
|
nix.optimise = {
|
||||||
|
automatic = true;
|
||||||
|
dates = ["weekly"]; # Optional; allows customizing optimisation schedule
|
||||||
|
persistent = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
programs.nix-ld.enable = true;
|
||||||
|
|
||||||
|
# TODO: is this useful?, what does it do?
|
||||||
|
# nix.settings.flake-registry = ""; # Disable global flake registry
|
||||||
|
# Add each flake input as a registry and nix_path
|
||||||
|
# registry = lib.mapAttrs (_: flake: { inherit flake; }) flakeInputs;
|
||||||
|
# nixPath = lib.mapAttrsToList (n: _: "${n}=flake:${n}") flakeInputs;
|
||||||
|
}
|
||||||
9
features-nixos/global/root.nix
Normal file
9
features-nixos/global/root.nix
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{pkgs, ...}: {
|
||||||
|
# Packages needed as root
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
vim
|
||||||
|
htop
|
||||||
|
mc
|
||||||
|
gparted-xhost # needs to be installed as system package so it can be actually opened
|
||||||
|
];
|
||||||
|
}
|
||||||
23
features-nixos/global/sops.nix
Normal file
23
features-nixos/global/sops.nix
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
{
|
||||||
|
pwd,
|
||||||
|
inputs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
isEd25519 = k: k.type == "ed25519";
|
||||||
|
getKeyPath = k: k.path;
|
||||||
|
keys = builtins.filter isEd25519 config.services.openssh.hostKeys;
|
||||||
|
in {
|
||||||
|
imports = [inputs.sops-nix.nixosModules.sops];
|
||||||
|
|
||||||
|
sops.age = {
|
||||||
|
sshKeyPaths = map getKeyPath keys;
|
||||||
|
|
||||||
|
# TODO: remove? only rely on ssh or pgp keys (e.g. ubikey like misterio is using!!!)
|
||||||
|
# keyFile = "/home/julian/.config/sops/age/keys.txt";
|
||||||
|
# Generate key if none of the above worked. With this, building will still work, just without secrets
|
||||||
|
generateKey = false; # TODO: building should not work without secrets!?
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.defaultSopsFile = "${pwd}/hosts/secrets-common.yaml";
|
||||||
|
}
|
||||||
@@ -1,30 +1,28 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.authentication = {
|
pkgs,
|
||||||
pkgs,
|
lib,
|
||||||
lib,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
# Make programs like nextcloud client access saved passwords
|
||||||
# Make programs like nextcloud client access saved passwords
|
services.gnome.gnome-keyring.enable = true;
|
||||||
services.gnome.gnome-keyring.enable = true;
|
|
||||||
|
|
||||||
programs.seahorse.enable = true;
|
programs.seahorse.enable = true;
|
||||||
programs.ssh.askPassword = lib.mkForce "${pkgs.seahorse}/libexec/seahorse/ssh-askpass"; # Solve conflicting definition in seahorse and plasma6
|
programs.ssh.askPassword = lib.mkForce "${pkgs.seahorse}/libexec/seahorse/ssh-askpass"; # Solve conflicting definition in seahorse and plasma6
|
||||||
|
|
||||||
# Make authentication work for e.g. gparted
|
# Make authentication work for e.g. gparted
|
||||||
security.polkit.enable = true;
|
security.polkit.enable = true;
|
||||||
systemd = {
|
systemd = {
|
||||||
user.services.polkit-gnome-authentication-agent-1 = {
|
user.services.polkit-gnome-authentication-agent-1 = {
|
||||||
description = "polkit-gnome-authentication-agent-1";
|
description = "polkit-gnome-authentication-agent-1";
|
||||||
wantedBy = ["graphical-session.target"];
|
wantedBy = ["graphical-session.target"];
|
||||||
wants = ["graphical-session.target"];
|
wants = ["graphical-session.target"];
|
||||||
after = ["graphical-session.target"];
|
after = ["graphical-session.target"];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
ExecStart = "${pkgs.polkit_gnome}/libexec/polkit-gnome-authentication-agent-1";
|
ExecStart = "${pkgs.polkit_gnome}/libexec/polkit-gnome-authentication-agent-1";
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
RestartSec = 1;
|
RestartSec = 1;
|
||||||
TimeoutStopSec = 10;
|
TimeoutStopSec = 10;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,14 +1,12 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.avahi = {
|
# MDNS on local network
|
||||||
# MDNS on local network
|
services.avahi = {
|
||||||
services.avahi = {
|
enable = true;
|
||||||
enable = true;
|
nssmdns4 = true;
|
||||||
nssmdns4 = true;
|
nssmdns6 = true;
|
||||||
nssmdns6 = true;
|
publish.enable = true;
|
||||||
publish.enable = true;
|
publish.addresses = true;
|
||||||
publish.addresses = true;
|
ipv4 = true;
|
||||||
ipv4 = true;
|
ipv6 = true;
|
||||||
ipv6 = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,33 +1,31 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.binarycaches = {
|
lib,
|
||||||
lib,
|
outputs,
|
||||||
outputs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
# Setup binary caches
|
||||||
# Setup binary caches
|
nix.settings = {
|
||||||
nix.settings = {
|
substituters = [
|
||||||
substituters = [
|
"https://nix-community.cachix.org"
|
||||||
"https://nix-community.cachix.org"
|
"https://cache.nixos.org/"
|
||||||
"https://cache.nixos.org/"
|
"https://hyprland.cachix.org"
|
||||||
"https://hyprland.cachix.org"
|
"http://binarycache.julian-mutter.de"
|
||||||
"http://binarycache.julian-mutter.de"
|
"https://devenv.cachix.org"
|
||||||
"https://devenv.cachix.org"
|
];
|
||||||
];
|
trusted-public-keys = [
|
||||||
trusted-public-keys = [
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||||
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
|
||||||
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
|
"binarycache.julian-mutter.de:oJ67uRFwRhNPKL58CHzy3QQLv38Kx7OA1K+6xlEPu7E="
|
||||||
"binarycache.julian-mutter.de:oJ67uRFwRhNPKL58CHzy3QQLv38Kx7OA1K+6xlEPu7E="
|
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
||||||
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="
|
||||||
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="
|
];
|
||||||
];
|
|
||||||
|
|
||||||
trusted-users = [
|
trusted-users = [
|
||||||
"root"
|
"root"
|
||||||
"@wheel"
|
"@wheel"
|
||||||
]; # needed for devenv to add custom caches
|
]; # needed for devenv to add custom caches
|
||||||
|
|
||||||
# Ensure we can still build when missing-server is not accessible
|
# Ensure we can still build when missing-server is not accessible
|
||||||
fallback = true;
|
fallback = true;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,19 +1,17 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.boot-efi = {
|
# Bootloader
|
||||||
# Bootloader
|
# Use this for simple nix boot menu, if no dual boot required
|
||||||
# Use this for simple nix boot menu, if no dual boot required
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.configurationLimit = 10;
|
||||||
boot.loader.systemd-boot.configurationLimit = 10;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
|
||||||
|
|
||||||
# https://github.com/NixOS/nixpkgs/blob/c32c39d6f3b1fe6514598fa40ad2cf9ce22c3fb7/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix#L66
|
# https://github.com/NixOS/nixpkgs/blob/c32c39d6f3b1fe6514598fa40ad2cf9ce22c3fb7/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix#L66
|
||||||
boot.loader.systemd-boot.editor = false;
|
boot.loader.systemd-boot.editor = false;
|
||||||
|
|
||||||
boot.supportedFilesystems = [
|
boot.supportedFilesystems = [
|
||||||
"btrfs"
|
"btrfs"
|
||||||
"ntfs"
|
"ntfs"
|
||||||
"nfs"
|
"nfs"
|
||||||
"cifs"
|
"cifs"
|
||||||
];
|
];
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.docker = {
|
virtualisation.docker = {
|
||||||
virtualisation.docker = {
|
enable = true;
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
flake.nixosModules.flatpak = {pkgs, ...}: {
|
services.flatpak.enable = true;
|
||||||
services.flatpak.enable = true;
|
xdg.portal.enable = true;
|
||||||
xdg.portal.enable = true;
|
xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk];
|
||||||
xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk];
|
xdg.portal.config.common.default = "*"; # Use first portal implementation found
|
||||||
xdg.portal.config.common.default = "*"; # Use first portal implementation found
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,22 +1,20 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
flake.nixosModules.gamemode = {pkgs, ...}: {
|
programs.gamemode = {
|
||||||
programs.gamemode = {
|
enable = true;
|
||||||
enable = true;
|
settings = {
|
||||||
settings = {
|
general = {
|
||||||
general = {
|
softrealtime = "auto";
|
||||||
softrealtime = "auto";
|
inhibit_screensaver = 1;
|
||||||
inhibit_screensaver = 1;
|
renice = 5;
|
||||||
renice = 5;
|
};
|
||||||
};
|
# gpu = {
|
||||||
# gpu = {
|
# apply_gpu_optimisations = "accept-responsibility";
|
||||||
# apply_gpu_optimisations = "accept-responsibility";
|
# gpu_device = 1;
|
||||||
# gpu_device = 1;
|
# amd_performance_level = "high";
|
||||||
# amd_performance_level = "high";
|
# };
|
||||||
# };
|
custom = {
|
||||||
custom = {
|
start = "${pkgs.libnotify}/bin/notify-send 'GameMode started'";
|
||||||
start = "${pkgs.libnotify}/bin/notify-send 'GameMode started'";
|
end = "${pkgs.libnotify}/bin/notify-send 'GameMode ended'";
|
||||||
end = "${pkgs.libnotify}/bin/notify-send 'GameMode ended'";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,15 +1,13 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.gdm = {
|
config,
|
||||||
config,
|
lib,
|
||||||
lib,
|
pkgs,
|
||||||
pkgs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
services.xserver.displayManager.gdm = {
|
||||||
services.xserver.displayManager.gdm = {
|
enable = true;
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
# unlock GPG keyring on login
|
|
||||||
security.pam.services.gdm.enableGnomeKeyring = true;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# unlock GPG keyring on login
|
||||||
|
security.pam.services.gdm.enableGnomeKeyring = true;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,39 +1,37 @@
|
|||||||
{
|
{config, ...}: let
|
||||||
flake.nixosModules.greetd = {config, ...}: let
|
homeCfgs = config.home-manager.users;
|
||||||
homeCfgs = config.home-manager.users;
|
julianCfg = homeCfgs.julian;
|
||||||
julianCfg = homeCfgs.julian;
|
in {
|
||||||
in {
|
users.extraUsers.greeter = {
|
||||||
users.extraUsers.greeter = {
|
# For caching
|
||||||
# For caching
|
home = "/tmp/greeter-home";
|
||||||
home = "/tmp/greeter-home";
|
createHome = true;
|
||||||
createHome = true;
|
};
|
||||||
};
|
|
||||||
|
|
||||||
programs.regreet = {
|
programs.regreet = {
|
||||||
enable = true;
|
enable = true;
|
||||||
iconTheme = julianCfg.gtk.iconTheme;
|
iconTheme = julianCfg.gtk.iconTheme;
|
||||||
theme = julianCfg.gtk.theme;
|
theme = julianCfg.gtk.theme;
|
||||||
# font = julianCfg.fontProfiles.regular; # TODO: do
|
# font = julianCfg.fontProfiles.regular; # TODO: do
|
||||||
cursorTheme = {
|
cursorTheme = {
|
||||||
inherit (julianCfg.gtk.cursorTheme) name package;
|
inherit (julianCfg.gtk.cursorTheme) name package;
|
||||||
};
|
|
||||||
cageArgs = [
|
|
||||||
"-s"
|
|
||||||
"-m"
|
|
||||||
"last"
|
|
||||||
]; # multimonitor use last monitor
|
|
||||||
# settings.background = {
|
|
||||||
# path = julianCfg.wallpaper;
|
|
||||||
# fit = "Cover";
|
|
||||||
# }; # TODO: fix
|
|
||||||
|
|
||||||
# TODO: setting keyboard language does not work
|
|
||||||
# settings = {
|
|
||||||
# env = {
|
|
||||||
# XKB_DEFAULT_LAYOUT = "de";
|
|
||||||
# # XKB_DEFAULT_VARIANT = "altgr-intl";
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
};
|
};
|
||||||
|
cageArgs = [
|
||||||
|
"-s"
|
||||||
|
"-m"
|
||||||
|
"last"
|
||||||
|
]; # multimonitor use last monitor
|
||||||
|
# settings.background = {
|
||||||
|
# path = julianCfg.wallpaper;
|
||||||
|
# fit = "Cover";
|
||||||
|
# }; # TODO: fix
|
||||||
|
|
||||||
|
# TODO: setting keyboard language does not work
|
||||||
|
# settings = {
|
||||||
|
# env = {
|
||||||
|
# XKB_DEFAULT_LAYOUT = "de";
|
||||||
|
# # XKB_DEFAULT_VARIANT = "altgr-intl";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,18 +1,16 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.i3 = {
|
config,
|
||||||
config,
|
lib,
|
||||||
lib,
|
pkgs,
|
||||||
pkgs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
services.xserver.windowManager.i3.enable = true;
|
||||||
services.xserver.windowManager.i3.enable = true;
|
services.xserver.windowManager.i3.package = pkgs.i3-gaps;
|
||||||
services.xserver.windowManager.i3.package = pkgs.i3-gaps;
|
services.displayManager.defaultSession = "none+i3";
|
||||||
services.displayManager.defaultSession = "none+i3";
|
|
||||||
|
|
||||||
programs.xss-lock = {
|
programs.xss-lock = {
|
||||||
# responds to "loginctl lock-session" via dbus
|
# responds to "loginctl lock-session" via dbus
|
||||||
enable = true;
|
enable = true;
|
||||||
lockerCommand = "${pkgs.i3lock}/bin/i3lock --ignore-empty-password --color=000000";
|
lockerCommand = "${pkgs.i3lock}/bin/i3lock --ignore-empty-password --color=000000";
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,24 +1,22 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.kerberos = {
|
security.krb5.enable = true;
|
||||||
security.krb5.enable = true;
|
security.krb5.settings = {
|
||||||
security.krb5.settings = {
|
# domain_realm = {
|
||||||
# domain_realm = {
|
# ".julian-mutter.de" = "julian-mutter.de";
|
||||||
# ".julian-mutter.de" = "julian-mutter.de";
|
# "julian-mutter.de" = "julian-mutter.de";
|
||||||
# "julian-mutter.de" = "julian-mutter.de";
|
# };
|
||||||
# };
|
libdefaults = {
|
||||||
libdefaults = {
|
default_realm = "julian-mutter.de";
|
||||||
default_realm = "julian-mutter.de";
|
# dns_lookup_realm = true;
|
||||||
# dns_lookup_realm = true;
|
# dns_lookup_kdc = true;
|
||||||
# dns_lookup_kdc = true;
|
# ticket_lifetime = "24h";
|
||||||
# ticket_lifetime = "24h";
|
# renew_lifetime = "7d";
|
||||||
# renew_lifetime = "7d";
|
};
|
||||||
};
|
realms = {
|
||||||
realms = {
|
"julian-mutter.de" = {
|
||||||
"julian-mutter.de" = {
|
kdc = ["kerberos.julian-mutter.de"];
|
||||||
kdc = ["kerberos.julian-mutter.de"];
|
admin_server = "kerberos-admin.julian-mutter.de";
|
||||||
admin_server = "kerberos-admin.julian-mutter.de";
|
default_domain = "julian-mutter.de";
|
||||||
default_domain = "julian-mutter.de";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,51 +1,49 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.openssh = {
|
outputs,
|
||||||
outputs,
|
lib,
|
||||||
lib,
|
config,
|
||||||
config,
|
...
|
||||||
...
|
}: let
|
||||||
}: let
|
hosts = lib.attrNames outputs.nixosConfigurations;
|
||||||
hosts = lib.attrNames outputs.nixosConfigurations;
|
in {
|
||||||
in {
|
services.openssh = {
|
||||||
services.openssh = {
|
enable = true;
|
||||||
enable = true;
|
settings = {
|
||||||
settings = {
|
# Harden
|
||||||
# Harden
|
PasswordAuthentication = false;
|
||||||
PasswordAuthentication = false;
|
PermitRootLogin = "no";
|
||||||
PermitRootLogin = "no";
|
|
||||||
|
|
||||||
# TODO: what does this do
|
# TODO: what does this do
|
||||||
# Let WAYLAND_DISPLAY be forwarded
|
# Let WAYLAND_DISPLAY be forwarded
|
||||||
AcceptEnv = "WAYLAND_DISPLAY";
|
AcceptEnv = "WAYLAND_DISPLAY";
|
||||||
X11Forwarding = true;
|
X11Forwarding = true;
|
||||||
};
|
|
||||||
|
|
||||||
hostKeys = [
|
|
||||||
{
|
|
||||||
path = "/etc/ssh/ssh_host_ed25519_key";
|
|
||||||
type = "ed25519";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: is automatic known hosts file even necessary?
|
hostKeys = [
|
||||||
# programs.ssh = {
|
{
|
||||||
# # Each hosts public key
|
path = "/etc/ssh/ssh_host_ed25519_key";
|
||||||
# knownHosts = lib.genAttrs hosts (hostname: {
|
type = "ed25519";
|
||||||
# publicKeyFile = ../../${hostname}/ssh_host_ed25519_key.pub;
|
}
|
||||||
# extraHostNames =
|
];
|
||||||
# [
|
|
||||||
# # "${hostname}.m7.rs"
|
|
||||||
# ]
|
|
||||||
# ++
|
|
||||||
# # Alias for localhost if it's the same host
|
|
||||||
# (lib.optional (hostname == config.networking.hostName) "localhost")
|
|
||||||
# # Alias to m7.rs and git.m7.rs if it's alcyone
|
|
||||||
# ++ (lib.optionals (hostname == "alcyone") [
|
|
||||||
# "m7.rs"
|
|
||||||
# "git.m7.rs"
|
|
||||||
# ]);
|
|
||||||
# });
|
|
||||||
# };
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# TODO: is automatic known hosts file even necessary?
|
||||||
|
# programs.ssh = {
|
||||||
|
# # Each hosts public key
|
||||||
|
# knownHosts = lib.genAttrs hosts (hostname: {
|
||||||
|
# publicKeyFile = ../../${hostname}/ssh_host_ed25519_key.pub;
|
||||||
|
# extraHostNames =
|
||||||
|
# [
|
||||||
|
# # "${hostname}.m7.rs"
|
||||||
|
# ]
|
||||||
|
# ++
|
||||||
|
# # Alias for localhost if it's the same host
|
||||||
|
# (lib.optional (hostname == config.networking.hostName) "localhost")
|
||||||
|
# # Alias to m7.rs and git.m7.rs if it's alcyone
|
||||||
|
# ++ (lib.optionals (hostname == "alcyone") [
|
||||||
|
# "m7.rs"
|
||||||
|
# "git.m7.rs"
|
||||||
|
# ]);
|
||||||
|
# });
|
||||||
|
# };
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,11 +1,9 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
flake.nixosModules.pcmanfm = {pkgs, ...}: {
|
environment.systemPackages = with pkgs; [
|
||||||
environment.systemPackages = with pkgs; [
|
shared-mime-info # extended mimetype support
|
||||||
shared-mime-info # extended mimetype support
|
lxmenu-data # open with "Installed Applications"
|
||||||
lxmenu-data # open with "Installed Applications"
|
pcmanfm
|
||||||
pcmanfm
|
];
|
||||||
];
|
|
||||||
|
|
||||||
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,28 +1,26 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.pipewire = {
|
security.rtkit.enable = true;
|
||||||
security.rtkit.enable = true;
|
services.pulseaudio.enable = false;
|
||||||
services.pulseaudio.enable = false;
|
services.pipewire = {
|
||||||
services.pipewire = {
|
enable = true;
|
||||||
enable = true;
|
wireplumber.enable = true;
|
||||||
wireplumber.enable = true;
|
alsa.enable = true;
|
||||||
alsa.enable = true;
|
alsa.support32Bit = true;
|
||||||
alsa.support32Bit = true;
|
pulse.enable = true;
|
||||||
pulse.enable = true;
|
jack.enable = true;
|
||||||
jack.enable = true;
|
extraConfig.pipewire = {
|
||||||
extraConfig.pipewire = {
|
"99-no-bell" = {
|
||||||
"99-no-bell" = {
|
# Disable bell sound
|
||||||
# Disable bell sound
|
"context.properties" = {
|
||||||
"context.properties" = {
|
"module.x11.bell" = false;
|
||||||
"module.x11.bell" = false;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
"10-increase-buffer" = {
|
};
|
||||||
"context.properties" = {
|
"10-increase-buffer" = {
|
||||||
"default.clock.rate" = 48000;
|
"context.properties" = {
|
||||||
"default.clock.quantum" = 1024;
|
"default.clock.rate" = 48000;
|
||||||
"default.clock.min-quantum" = 1024;
|
"default.clock.quantum" = 1024;
|
||||||
"default.clock.max-quantum" = 2048;
|
"default.clock.min-quantum" = 1024;
|
||||||
};
|
"default.clock.max-quantum" = 2048;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,12 +1,10 @@
|
|||||||
{
|
{config, ...}: let
|
||||||
flake.nixosModules.podman = {config, ...}: let
|
dockerEnabled = config.virtualisation.docker.enable;
|
||||||
dockerEnabled = config.virtualisation.docker.enable;
|
in {
|
||||||
in {
|
virtualisation.podman = {
|
||||||
virtualisation.podman = {
|
enable = true;
|
||||||
enable = true;
|
dockerCompat = !dockerEnabled;
|
||||||
dockerCompat = !dockerEnabled;
|
dockerSocket.enable = !dockerEnabled;
|
||||||
dockerSocket.enable = !dockerEnabled;
|
defaultNetwork.settings.dns_enabled = true;
|
||||||
defaultNetwork.settings.dns_enabled = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,14 +1,12 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.redshift = {
|
config,
|
||||||
config,
|
lib,
|
||||||
lib,
|
pkgs,
|
||||||
pkgs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
# Set location used by redshift
|
||||||
# Set location used by redshift
|
location.provider = "manual";
|
||||||
location.provider = "manual";
|
location.latitude = 47.92;
|
||||||
location.latitude = 47.92;
|
location.longitude = 10.12;
|
||||||
location.longitude = 10.12;
|
services.redshift.enable = true;
|
||||||
services.redshift.enable = true;
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,36 +1,34 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.remote-builder = {
|
nix.distributedBuilds = true;
|
||||||
nix.distributedBuilds = true;
|
nix.settings.builders-use-substitutes = true;
|
||||||
nix.settings.builders-use-substitutes = true;
|
|
||||||
|
|
||||||
nix.buildMachines = [
|
nix.buildMachines = [
|
||||||
{
|
{
|
||||||
hostName = "builder.julian-mutter.de";
|
hostName = "builder.julian-mutter.de";
|
||||||
protocol = "ssh";
|
protocol = "ssh";
|
||||||
sshUser = "nix";
|
sshUser = "nix";
|
||||||
systems = [
|
systems = [
|
||||||
"x86_64-linux"
|
"x86_64-linux"
|
||||||
"aarch64-linux"
|
"aarch64-linux"
|
||||||
];
|
];
|
||||||
maxJobs = 4;
|
maxJobs = 4;
|
||||||
speedFactor = 3;
|
speedFactor = 3;
|
||||||
supportedFeatures = [
|
supportedFeatures = [
|
||||||
"nixos-test"
|
"nixos-test"
|
||||||
"benchmark"
|
"benchmark"
|
||||||
"big-parallel"
|
"big-parallel"
|
||||||
"kvm"
|
"kvm"
|
||||||
];
|
];
|
||||||
mandatoryFeatures = [];
|
mandatoryFeatures = [];
|
||||||
}
|
}
|
||||||
# {
|
# {
|
||||||
# hostName = "localhost";
|
# hostName = "localhost";
|
||||||
# protocol = null;
|
# protocol = null;
|
||||||
# systems = [
|
# systems = [
|
||||||
# "x86_64-linux"
|
# "x86_64-linux"
|
||||||
# ];
|
# ];
|
||||||
# maxJobs = 4;
|
# maxJobs = 4;
|
||||||
# speedFactor = 1;
|
# speedFactor = 1;
|
||||||
# }
|
# }
|
||||||
];
|
];
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,18 +1,16 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.thunar = {
|
config,
|
||||||
config,
|
lib,
|
||||||
lib,
|
pkgs,
|
||||||
pkgs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
programs.thunar.enable = true;
|
||||||
programs.thunar.enable = true;
|
programs.xfconf.enable = true; # Persist saved preferences
|
||||||
programs.xfconf.enable = true; # Persist saved preferences
|
programs.thunar.plugins = with pkgs.xfce; [
|
||||||
programs.thunar.plugins = with pkgs.xfce; [
|
thunar-archive-plugin
|
||||||
thunar-archive-plugin
|
thunar-volman
|
||||||
thunar-volman
|
thunar-media-tags-plugin
|
||||||
thunar-media-tags-plugin
|
];
|
||||||
];
|
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
||||||
services.gvfs.enable = true; # Mount, trash, and other functionalities
|
services.tumbler.enable = true; # Thumbnail support for images
|
||||||
services.tumbler.enable = true; # Thumbnail support for images
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,14 +1,12 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.virtualbox = {
|
config,
|
||||||
config,
|
lib,
|
||||||
lib,
|
pkgs,
|
||||||
pkgs,
|
...
|
||||||
...
|
}: {
|
||||||
}: {
|
virtualisation.virtualbox.host.enable = true;
|
||||||
virtualisation.virtualbox.host.enable = true;
|
# virtualisation.virtualbox.host.enableExtensionPack = true;
|
||||||
# virtualisation.virtualbox.host.enableExtensionPack = true;
|
# virtualisation.virtualbox.guest.enable = true;
|
||||||
# virtualisation.virtualbox.guest.enable = true;
|
# virtualisation.virtualbox.guest.x11 = true;
|
||||||
# virtualisation.virtualbox.guest.x11 = true;
|
users.extraGroups.vboxusers.members = ["julian"];
|
||||||
users.extraGroups.vboxusers.members = ["julian"];
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,14 +1,12 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.wireguard = {
|
networking.wg-quick.interfaces = {
|
||||||
networking.wg-quick.interfaces = {
|
julian = {
|
||||||
julian = {
|
configFile = "/etc/wireguard/julian.conf";
|
||||||
configFile = "/etc/wireguard/julian.conf";
|
autostart = true; # This interface is started on boot
|
||||||
autostart = true; # This interface is started on boot
|
};
|
||||||
};
|
comu = {
|
||||||
comu = {
|
configFile = "/etc/wireguard/comu.conf";
|
||||||
configFile = "/etc/wireguard/comu.conf";
|
autostart = false;
|
||||||
autostart = false;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,11 +1,9 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.wireshark = {
|
programs.wireshark = {
|
||||||
programs.wireshark = {
|
enable = true;
|
||||||
enable = true;
|
dumpcap.enable = true;
|
||||||
dumpcap.enable = true;
|
usbmon.enable = true;
|
||||||
usbmon.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
users.users.julian.extraGroups = ["wireshark"];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
users.users.julian.extraGroups = ["wireshark"];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.xserver = {
|
services.xserver = {
|
||||||
services.xserver = {
|
enable = true;
|
||||||
enable = true;
|
wacom.enable = true;
|
||||||
wacom.enable = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,52 +1,51 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.users.julian = {
|
pwd,
|
||||||
pkgs,
|
pkgs,
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
in {
|
in {
|
||||||
users.mutableUsers = false;
|
users.mutableUsers = false;
|
||||||
users.users.julian = {
|
users.users.julian = {
|
||||||
description = "Julian";
|
description = "Julian";
|
||||||
group = "julian";
|
group = "julian";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
uid = 1000;
|
uid = 1000;
|
||||||
shell = pkgs.fish;
|
shell = pkgs.fish;
|
||||||
extraGroups = ifTheyExist [
|
extraGroups = ifTheyExist [
|
||||||
"networkmanager"
|
"networkmanager"
|
||||||
"wheel"
|
"wheel"
|
||||||
"audio"
|
"audio"
|
||||||
"realtime"
|
"realtime"
|
||||||
"rtkit"
|
"rtkit"
|
||||||
"network"
|
"network"
|
||||||
"video"
|
"video"
|
||||||
"podman"
|
"podman"
|
||||||
"docker"
|
"docker"
|
||||||
"git"
|
"git"
|
||||||
"gamemode"
|
"gamemode"
|
||||||
"dialout"
|
"dialout"
|
||||||
];
|
];
|
||||||
|
|
||||||
openssh.authorizedKeys.keys = lib.splitString "\n" (
|
openssh.authorizedKeys.keys = lib.splitString "\n" (
|
||||||
builtins.readFile ../../../../homes/julian/ssh.pub
|
builtins.readFile ./ssh.pub
|
||||||
);
|
);
|
||||||
# hashedPasswordFile = config.sops.secrets.julian-password.path;
|
# hashedPasswordFile = config.sops.secrets.julian-password.path;
|
||||||
hashedPassword = "$y$j9T$N33kLJQbV8soUoCbDkpwA1$r/yahJDgOPo4GGOrAi6BUG5zLTzmaBrA5NQ4nno561A";
|
hashedPassword = "$y$j9T$N33kLJQbV8soUoCbDkpwA1$r/yahJDgOPo4GGOrAi6BUG5zLTzmaBrA5NQ4nno561A";
|
||||||
packages = [pkgs.home-manager];
|
packages = [pkgs.home-manager];
|
||||||
};
|
|
||||||
users.groups.julian = {
|
|
||||||
gid = 1000;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets.julian-password = {
|
|
||||||
sopsFile = ../../secrets.yaml;
|
|
||||||
neededForUsers = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
home-manager.users.julian = import ../../../../homes/julian/${config.networking.hostName}.nix;
|
|
||||||
|
|
||||||
security.pam.services.swaylock = {}; # Make swaylock unlocking work
|
|
||||||
};
|
};
|
||||||
|
users.groups.julian = {
|
||||||
|
gid = 1000;
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.secrets.julian-password = {
|
||||||
|
sopsFile = "${pwd}/hosts/secrets-common.yaml";
|
||||||
|
neededForUsers = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
home-manager.users.julian = import "${pwd}/homes/julian/${config.networking.hostName}.nix";
|
||||||
|
|
||||||
|
security.pam.services.swaylock = {}; # Make swaylock unlocking work
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,30 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.users.pob = {
|
|
||||||
pkgs,
|
|
||||||
config,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
|
||||||
in {
|
|
||||||
users.mutableUsers = false;
|
|
||||||
users.users.pob = {
|
|
||||||
description = "A helper user to use another profile for some applications";
|
|
||||||
group = "pob";
|
|
||||||
isNormalUser = true;
|
|
||||||
shell = pkgs.fish;
|
|
||||||
extraGroups = ifTheyExist [
|
|
||||||
"networkmanager"
|
|
||||||
];
|
|
||||||
packages = with pkgs; [
|
|
||||||
firefox
|
|
||||||
wineWowPackages.stable # 32-bit and 64-bit wine
|
|
||||||
winetricks
|
|
||||||
];
|
|
||||||
};
|
|
||||||
users.groups.pob = {};
|
|
||||||
|
|
||||||
security.sudo.extraConfig = ''
|
|
||||||
julian ALL=(pob) NOPASSWD: ALL
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -1,32 +1,30 @@
|
|||||||
{
|
{
|
||||||
flake.nixosModules.users.wolfi = {
|
pkgs,
|
||||||
pkgs,
|
config,
|
||||||
config,
|
...
|
||||||
...
|
}: let
|
||||||
}: let
|
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
||||||
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
in {
|
||||||
in {
|
users.mutableUsers = false;
|
||||||
users.mutableUsers = false;
|
users.users.wolfi = {
|
||||||
users.users.wolfi = {
|
description = "Wolfi";
|
||||||
description = "Wolfi";
|
group = "wolfi";
|
||||||
group = "wolfi";
|
isNormalUser = true;
|
||||||
isNormalUser = true;
|
shell = pkgs.fish;
|
||||||
shell = pkgs.fish;
|
extraGroups = ifTheyExist [
|
||||||
extraGroups = ifTheyExist [
|
"networkmanager"
|
||||||
"networkmanager"
|
"wheel"
|
||||||
"wheel"
|
"audio"
|
||||||
"audio"
|
"network"
|
||||||
"network"
|
"video"
|
||||||
"video"
|
"podman"
|
||||||
"podman"
|
"docker"
|
||||||
"docker"
|
"git"
|
||||||
"git"
|
"gamemode"
|
||||||
"gamemode"
|
];
|
||||||
];
|
|
||||||
|
|
||||||
hashedPassword = "$y$j9T$ifzWjoZaRtPUOOfMYnbJ20$uFOO1EyDApL52vRUicZYgupaTA/a6sGNUj3imZ/lcb6";
|
hashedPassword = "$y$j9T$ifzWjoZaRtPUOOfMYnbJ20$uFOO1EyDApL52vRUicZYgupaTA/a6sGNUj3imZ/lcb6";
|
||||||
packages = [pkgs.home-manager];
|
packages = [pkgs.home-manager];
|
||||||
};
|
|
||||||
users.groups.wolfi = {};
|
|
||||||
};
|
};
|
||||||
|
users.groups.wolfi = {};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,99 +0,0 @@
|
|||||||
{
|
|
||||||
flake.nixosModules.users.yukari = {
|
|
||||||
pkgs,
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
outputs,
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
ifTheyExist = groups: builtins.filter (group: builtins.hasAttr group config.users.groups) groups;
|
|
||||||
in {
|
|
||||||
users.mutableUsers = false;
|
|
||||||
users.users.yukari = {
|
|
||||||
description = "Yukari";
|
|
||||||
group = "yukari";
|
|
||||||
isNormalUser = true;
|
|
||||||
shell = pkgs.fish;
|
|
||||||
extraGroups = ifTheyExist [
|
|
||||||
"networkmanager"
|
|
||||||
"audio"
|
|
||||||
"network"
|
|
||||||
"video"
|
|
||||||
"podman"
|
|
||||||
"docker"
|
|
||||||
"git"
|
|
||||||
"gamemode"
|
|
||||||
];
|
|
||||||
|
|
||||||
createHome = true;
|
|
||||||
hashedPassword = "$y$j9T$rGuTL0rfiy7ht8L58BGCw0$fN.KwHjYlIitFEPHndKvV06ezgeWzP3/58o1kkviZwB";
|
|
||||||
packages = [pkgs.home-manager];
|
|
||||||
};
|
|
||||||
users.groups.yukari = {};
|
|
||||||
|
|
||||||
home-manager.users.yukari = {
|
|
||||||
imports =
|
|
||||||
[
|
|
||||||
../../../../homes/julian/features/fonts
|
|
||||||
../../../../homes/julian/features/suites/cli
|
|
||||||
]
|
|
||||||
++ (builtins.attrValues outputs.homeManagerModules);
|
|
||||||
|
|
||||||
home = {
|
|
||||||
username = lib.mkDefault "yukari";
|
|
||||||
homeDirectory = lib.mkDefault "/home/${config.home.username}";
|
|
||||||
stateVersion = lib.mkDefault "23.11";
|
|
||||||
|
|
||||||
sessionPath = ["$HOME/.local/bin"];
|
|
||||||
|
|
||||||
packages = with pkgs; [
|
|
||||||
arandr
|
|
||||||
calibre # ebook manager and viewer
|
|
||||||
# digikam
|
|
||||||
discord
|
|
||||||
discord-ptb # in case discord updates take their time
|
|
||||||
# dvdisaster
|
|
||||||
# element-desktop
|
|
||||||
# rocketchat-desktop
|
|
||||||
thunderbird
|
|
||||||
telegram-desktop # telegram
|
|
||||||
# schildichat-desktop # not updated regularly
|
|
||||||
nheko
|
|
||||||
evince # Simple pdf reader, good for focusing on document content
|
|
||||||
firefox
|
|
||||||
vivaldi
|
|
||||||
# geogebra
|
|
||||||
cheese
|
|
||||||
handbrake
|
|
||||||
# kitty # Terminal, already available as feature
|
|
||||||
libnotify
|
|
||||||
libreoffice
|
|
||||||
mate.engrampa
|
|
||||||
nomacs # Image viewer
|
|
||||||
kdePackages.okular # Pdf reader with many features, good for commenting documents
|
|
||||||
pavucontrol
|
|
||||||
qalculate-gtk # Nice gui calculator
|
|
||||||
qpdfview
|
|
||||||
# qutebrowser
|
|
||||||
# realvnc-vnc-viewer
|
|
||||||
# rustdesk
|
|
||||||
tor-browser
|
|
||||||
# frajul.pob-dev-version # Path of Building
|
|
||||||
vlc
|
|
||||||
wineWowPackages.stable # 32-bit and 64-bit wine
|
|
||||||
winetricks
|
|
||||||
xclip # x11 clipboard access from terminal
|
|
||||||
xfce.mousepad # simple text editor
|
|
||||||
xournalpp # Edit pdf files
|
|
||||||
zoom-us # Video conferencing
|
|
||||||
zotero # Manage papers and other sources
|
|
||||||
pdfpc # Present slides in pdf form
|
|
||||||
];
|
|
||||||
};
|
|
||||||
programs = {
|
|
||||||
home-manager.enable = true;
|
|
||||||
git.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
782
flake.lock
generated
782
flake.lock
generated
@@ -1,5 +1,54 @@
|
|||||||
{
|
{
|
||||||
"nodes": {
|
"nodes": {
|
||||||
|
"alacritty-theme": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1745230862,
|
||||||
|
"narHash": "sha256-TFomYP13Wa2VSoxKGKaTDyIj8K1/Oi4LOhR93z07Ot4=",
|
||||||
|
"owner": "alacritty",
|
||||||
|
"repo": "alacritty-theme",
|
||||||
|
"rev": "0520b1f8f3eb25678444c0817a97636b6601ac85",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "alacritty",
|
||||||
|
"repo": "alacritty-theme",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"aquamarine": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprutils": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprutils"
|
||||||
|
],
|
||||||
|
"hyprwayland-scanner": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprwayland-scanner"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1744289235,
|
||||||
|
"narHash": "sha256-ZFkHLdimtFzQACsVVyZkZlfYdj4iNy3PkzXfrwmlse8=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "aquamarine",
|
||||||
|
"rev": "c8282f4982b56dfa5e9b9f659809da93f8d37e7a",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "aquamarine",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"base16-schemes": {
|
"base16-schemes": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
@@ -51,6 +100,48 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"devshell": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nix-topology",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1728330715,
|
||||||
|
"narHash": "sha256-xRJ2nPOXb//u1jaBnDP56M7v5ldavjbtR6lfGqSvcKg=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"rev": "dd6b80932022cea34a019e2bb32f6fa9e494dfef",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"devshell_2": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixvim",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1741473158,
|
||||||
|
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"disko": {
|
"disko": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -58,11 +149,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769524058,
|
"lastModified": 1745502102,
|
||||||
"narHash": "sha256-zygdD6X1PcVNR2PsyK4ptzrVEiAdbMqLos7utrMDEWE=",
|
"narHash": "sha256-LqhRwzvIVPEjH0TaPgwzqpyhW6DtCrvz7FnUJDoUZh8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "71a3fc97d80881e91710fe721f1158d3b96ae14d",
|
"rev": "ca27b88c88948d96feeee9ed814cbd34f53d0d70",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -196,6 +287,116 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"flake-utils_5": {
|
||||||
|
"inputs": {
|
||||||
|
"systems": "systems_7"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1694529238,
|
||||||
|
"narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"rev": "ff7b65b44d01cf9ba6a71320833626af21126384",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"git-hooks": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": [
|
||||||
|
"nixvim",
|
||||||
|
"flake-compat"
|
||||||
|
],
|
||||||
|
"gitignore": "gitignore_3",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixvim",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1742649964,
|
||||||
|
"narHash": "sha256-DwOTp7nvfi8mRfuL1escHDXabVXFGT1VlPD1JHrtrco=",
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "git-hooks.nix",
|
||||||
|
"rev": "dcf5072734cb576d2b0c59b2ac44f5050b5eac82",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "git-hooks.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"gitignore": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"pre-commit-hooks",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1709087332,
|
||||||
|
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"gitignore_2": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nix-topology",
|
||||||
|
"pre-commit-hooks",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1709087332,
|
||||||
|
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"gitignore_3": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixvim",
|
||||||
|
"git-hooks",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1709087332,
|
||||||
|
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hercules-ci",
|
||||||
|
"repo": "gitignore.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"home-manager": {
|
"home-manager": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -203,11 +404,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1770260404,
|
"lastModified": 1745557122,
|
||||||
"narHash": "sha256-3iVX1+7YUIt23hBx1WZsUllhbmP2EnXrV8tCRbLxHc8=",
|
"narHash": "sha256-eqSo9ugzsqhFgaDFYUZj943nurlX4L6f+AW0skJ4W+M=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "0d782ee42c86b196acff08acfbf41bb7d13eed5b",
|
"rev": "dd26f75fb4ec1c731d4b1396eaf4439ce40a91c1",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -244,16 +445,306 @@
|
|||||||
"nixpkgs": "nixpkgs_2"
|
"nixpkgs": "nixpkgs_2"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769548169,
|
"lastModified": 1744743431,
|
||||||
"narHash": "sha256-03+JxvzmfwRu+5JafM0DLbxgHttOQZkUtDWBmeUkN8Y=",
|
"narHash": "sha256-iyn/WBYDc7OtjSawbegINDe/gIkok888kQxk3aVnkgg=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "impermanence",
|
"repo": "home-manager",
|
||||||
"rev": "7b1d382faf603b6d264f58627330f9faa5cba149",
|
"rev": "c61bfe3ae692f42ce688b5865fac9e0de58e1387",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "impermanence",
|
"ref": "release-24.11",
|
||||||
|
"repo": "home-manager",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprcursor": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprlang": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprlang"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1742215578,
|
||||||
|
"narHash": "sha256-zfs71PXVVPEe56WEyNi2TJQPs0wabU4WAlq0XV7GcdE=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprcursor",
|
||||||
|
"rev": "2fd36421c21aa87e2fe3bee11067540ae612f719",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprcursor",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprgraphics": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprutils": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprutils"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1745015490,
|
||||||
|
"narHash": "sha256-apEJ9zoSzmslhJ2vOKFcXTMZLUFYzh1ghfB6Rbw3Low=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprgraphics",
|
||||||
|
"rev": "60754910946b4e2dc1377b967b7156cb989c5873",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprgraphics",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprland": {
|
||||||
|
"inputs": {
|
||||||
|
"aquamarine": "aquamarine",
|
||||||
|
"hyprcursor": "hyprcursor",
|
||||||
|
"hyprgraphics": "hyprgraphics",
|
||||||
|
"hyprland-protocols": "hyprland-protocols",
|
||||||
|
"hyprland-qtutils": "hyprland-qtutils",
|
||||||
|
"hyprlang": "hyprlang",
|
||||||
|
"hyprutils": "hyprutils",
|
||||||
|
"hyprwayland-scanner": "hyprwayland-scanner",
|
||||||
|
"nixpkgs": "nixpkgs_2",
|
||||||
|
"pre-commit-hooks": "pre-commit-hooks",
|
||||||
|
"systems": "systems_2",
|
||||||
|
"xdph": "xdph"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1745795931,
|
||||||
|
"narHash": "sha256-i4zlEa2lnANuOZA1aA/X0cNGM7x9MLZqqmKP6fwfPEA=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "Hyprland",
|
||||||
|
"rev": "f5c5cfa960c157c8df50b496f621290234ac4505",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "Hyprland",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprland-plugins": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprland": [
|
||||||
|
"hyprland"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland-plugins",
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland-plugins",
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1745610646,
|
||||||
|
"narHash": "sha256-R8rWH3oFV5/jwl87t7HyVoFgndrPw8QR/2pLwyKJLYM=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-plugins",
|
||||||
|
"rev": "61ab0385c8d9d456bf89539c76dd9e73becefde3",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-plugins",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprland-protocols": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1743714874,
|
||||||
|
"narHash": "sha256-yt8F7NhMFCFHUHy/lNjH/pjZyIDFNk52Q4tivQ31WFo=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-protocols",
|
||||||
|
"rev": "3a5c2bda1c1a4e55cc1330c782547695a93f05b2",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-protocols",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprland-qt-support": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprlang": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprland-qtutils",
|
||||||
|
"hyprlang"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprland-qtutils",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprland-qtutils",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1737634706,
|
||||||
|
"narHash": "sha256-nGCibkfsXz7ARx5R+SnisRtMq21IQIhazp6viBU8I/A=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-qt-support",
|
||||||
|
"rev": "8810df502cdee755993cb803eba7b23f189db795",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-qt-support",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprland-qtutils": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprland-qt-support": "hyprland-qt-support",
|
||||||
|
"hyprlang": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprlang"
|
||||||
|
],
|
||||||
|
"hyprutils": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprland-qtutils",
|
||||||
|
"hyprlang",
|
||||||
|
"hyprutils"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1739048983,
|
||||||
|
"narHash": "sha256-REhTcXq4qs3B3cCDtLlYDz0GZvmsBSh947Ub6pQWGTQ=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-qtutils",
|
||||||
|
"rev": "3504a293c8f8db4127cb0f7cfc1a318ffb4316f8",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprland-qtutils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprlang": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprutils": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprutils"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1744468525,
|
||||||
|
"narHash": "sha256-9HySx+EtsbbKlZDlY+naqqOV679VdxP6x6fP3wxDXJk=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprlang",
|
||||||
|
"rev": "f1000c54d266e6e4e9d646df0774fac5b8a652df",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprlang",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprutils": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1743950287,
|
||||||
|
"narHash": "sha256-/6IAEWyb8gC/NKZElxiHChkouiUOrVYNq9YqG0Pzm4Y=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprutils",
|
||||||
|
"rev": "f2dc70e448b994cef627a157ee340135bd68fbc6",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprutils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"hyprwayland-scanner": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1739870480,
|
||||||
|
"narHash": "sha256-SiDN5BGxa/1hAsqhgJsS03C3t2QrLgBT8u+ENJ0Qzwc=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprwayland-scanner",
|
||||||
|
"rev": "206367a08dc5ac4ba7ad31bdca391d098082e64b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "hyprwayland-scanner",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -345,7 +836,29 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nix-gl": {
|
"nix-darwin": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixvim",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1743127615,
|
||||||
|
"narHash": "sha256-+sMGqywrSr50BGMLMeY789mSrzjkoxZiu61eWjYS/8o=",
|
||||||
|
"owner": "lnl7",
|
||||||
|
"repo": "nix-darwin",
|
||||||
|
"rev": "fc843893cecc1838a59713ee3e50e9e7edc6207c",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "lnl7",
|
||||||
|
"ref": "nix-darwin-24.11",
|
||||||
|
"repo": "nix-darwin",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nix-ld": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-utils": "flake-utils_2",
|
"flake-utils": "flake-utils_2",
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -353,11 +866,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1762090880,
|
"lastModified": 1744621833,
|
||||||
"narHash": "sha256-fbRQzIGPkjZa83MowjbD2ALaJf9y6KMDdJBQMKFeY/8=",
|
"narHash": "sha256-II6a32kRc+KbLhU/jS8EbuXYt1PNCvsRvuBw2becgQM=",
|
||||||
"owner": "nix-community",
|
"owner": "Mic92",
|
||||||
"repo": "nixgl",
|
"repo": "nix-ld",
|
||||||
"rev": "b6105297e6f0cd041670c3e8628394d4ee247ed5",
|
"rev": "9a3812797e25def1d4aed62b517606b7b93989dc",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -394,11 +907,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1754476755,
|
"lastModified": 1745506915,
|
||||||
"narHash": "sha256-vSF0VMEmPMzwNkrXIZwkhOSYmKES9BaDK/LlEe7/q8E=",
|
"narHash": "sha256-ZonLQ5fDqRRbvHVwf4P53ktwUG2e+OTexXvbxyxForI=",
|
||||||
"owner": "doronbehar",
|
"owner": "doronbehar",
|
||||||
"repo": "nix-matlab",
|
"repo": "nix-matlab",
|
||||||
"rev": "0e9c9fb660f9e1a1e4d59fd083e0212a15b513e2",
|
"rev": "68da9ca66d2e6c51c45e71d624c8bf0ca20846fb",
|
||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -407,49 +920,36 @@
|
|||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixlib": {
|
"nix-topology": {
|
||||||
"locked": {
|
|
||||||
"lastModified": 1736643958,
|
|
||||||
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "nixpkgs.lib",
|
|
||||||
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "nixpkgs.lib",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixos-generators": {
|
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixlib": "nixlib",
|
"devshell": "devshell",
|
||||||
|
"flake-utils": "flake-utils_2",
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
],
|
||||||
|
"pre-commit-hooks": "pre-commit-hooks_2"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769813415,
|
"lastModified": 1744142264,
|
||||||
"narHash": "sha256-nnVmNNKBi1YiBNPhKclNYDORoHkuKipoz7EtVnXO50A=",
|
"narHash": "sha256-h5KyodobZm8dx/HSNN+basgdmjxrQxudjrss4gAQpZk=",
|
||||||
"owner": "nix-community",
|
"owner": "oddlama",
|
||||||
"repo": "nixos-generators",
|
"repo": "nix-topology",
|
||||||
"rev": "8946737ff703382fda7623b9fab071d037e897d5",
|
"rev": "f49121cbbf4a86c560638ade406d99ee58deb7aa",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "oddlama",
|
||||||
"repo": "nixos-generators",
|
"repo": "nix-topology",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1770882871,
|
"lastModified": 1745503349,
|
||||||
"narHash": "sha256-nw5g+xl3veea+maxJ2/81tMEA/rPq9aF1H5XF35X+OE=",
|
"narHash": "sha256-bUGjvaPVsOfQeTz9/rLTNLDyqbzhl0CQtJJlhFPhIYw=",
|
||||||
"owner": "nixos",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "af04cb78aa85b2a4d1c15fc7270347e0d0eda97b",
|
"rev": "f7bee55a5e551bd8e7b5b82c9bc559bc50d868d1",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -491,11 +991,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-unstable": {
|
"nixpkgs-unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1770841267,
|
"lastModified": 1745526057,
|
||||||
"narHash": "sha256-9xejG0KoqsoKEGp2kVbXRlEYtFFcDTHjidiuX8hGO44=",
|
"narHash": "sha256-ITSpPDwvLBZBnPRS2bUcHY3gZSwis/uTe255QgMtTLA=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "ec7c70d12ce2fc37cb92aff673dcdca89d187bae",
|
"rev": "f771eb401a46846c1aebd20552521b233dd7e18b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -507,15 +1007,15 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1768564909,
|
"lastModified": 1744932701,
|
||||||
"narHash": "sha256-Kell/SpJYVkHWMvnhqJz/8DqQg2b6PguxVWOuadbHCc=",
|
"narHash": "sha256-fusHbZCyv126cyArUwwKrLdCkgVAIaa/fQJYFlCEqiU=",
|
||||||
"owner": "nixos",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "e4bae1bd10c9c57b2cf517953ab70060a828ee6f",
|
"rev": "b024ced1aac25639f8ca8fdfc2f8c4fbd66c48ef",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-unstable",
|
"ref": "nixos-unstable",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
@@ -535,11 +1035,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs_4": {
|
"nixpkgs_4": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1770770419,
|
"lastModified": 1745487689,
|
||||||
"narHash": "sha256-iKZMkr6Cm9JzWlRYW/VPoL0A9jVKtZYiU4zSrVeetIs=",
|
"narHash": "sha256-FQoi3R0NjQeBAsEOo49b5tbDPcJSMWc3QhhaIi9eddw=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "6c5e707c6b5339359a9a9e215c5e66d6d802fd7a",
|
"rev": "5630cf13cceac06cefe9fc607e8dfa8fb342dde3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -559,11 +1059,11 @@
|
|||||||
"systems": "systems_5"
|
"systems": "systems_5"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769049374,
|
"lastModified": 1745068593,
|
||||||
"narHash": "sha256-h0Os2qqNyycDY1FyZgtbn28VF1ySP74/n0f+LDd8j+w=",
|
"narHash": "sha256-YuQRMvqLVu+ghl2XzqXyVg/YevH/t3XHVCl7w+UrCH8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixvim",
|
"repo": "nixvim",
|
||||||
"rev": "b8f76bf5751835647538ef8784e4e6ee8deb8f95",
|
"rev": "d35dc6dfcae3ff1a0c72f2d59491a7d83e5505a3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -583,11 +1083,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1768249818,
|
"lastModified": 1745046075,
|
||||||
"narHash": "sha256-ANfn5OqIxq3HONPIXZ6zuI5sLzX1sS+2qcf/Pa0kQEc=",
|
"narHash": "sha256-8v4y6k16Ra/fiecb4DxhsoOGtzLKgKlS+9/XJ9z0T2I=",
|
||||||
"owner": "NuschtOS",
|
"owner": "NuschtOS",
|
||||||
"repo": "search",
|
"repo": "search",
|
||||||
"rev": "b6f77b88e9009bfde28e2130e218e5123dc66796",
|
"rev": "066afe8643274470f4a294442aadd988356a478f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -596,6 +1096,56 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"pre-commit-hooks": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": "flake-compat_2",
|
||||||
|
"gitignore": "gitignore",
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1742649964,
|
||||||
|
"narHash": "sha256-DwOTp7nvfi8mRfuL1escHDXabVXFGT1VlPD1JHrtrco=",
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "git-hooks.nix",
|
||||||
|
"rev": "dcf5072734cb576d2b0c59b2ac44f5050b5eac82",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "git-hooks.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"pre-commit-hooks_2": {
|
||||||
|
"inputs": {
|
||||||
|
"flake-compat": "flake-compat_4",
|
||||||
|
"gitignore": "gitignore_2",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nix-topology",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"nixpkgs-stable": [
|
||||||
|
"nix-topology",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1730797577,
|
||||||
|
"narHash": "sha256-SrID5yVpyUfknUTGWgYkTyvdr9J1LxUym4om3SVGPkg=",
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "pre-commit-hooks.nix",
|
||||||
|
"rev": "1864030ed24a2b8b4e4d386a5eeaf0c5369e50a9",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "cachix",
|
||||||
|
"repo": "pre-commit-hooks.nix",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"deploy-rs": "deploy-rs",
|
"deploy-rs": "deploy-rs",
|
||||||
@@ -647,11 +1197,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1770683991,
|
"lastModified": 1745310711,
|
||||||
"narHash": "sha256-xVfPvXDf9QN3Eh9dV+Lw6IkWG42KSuQ1u2260HKvpnc=",
|
"narHash": "sha256-ePyTpKEJTgX0gvgNQWd7tQYQ3glIkbqcW778RpHlqgA=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "8b89f44c2cc4581e402111d928869fe7ba9f7033",
|
"rev": "5e3e92b16d6fdf9923425a8d4df7496b2434f39c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -761,7 +1311,58 @@
|
|||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-systems",
|
"owner": "nix-systems",
|
||||||
"repo": "default-linux",
|
"repo": "default",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"systems_6": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1681028828,
|
||||||
|
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"systems_7": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1681028828,
|
||||||
|
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"treefmt-nix": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixvim",
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1744961264,
|
||||||
|
"narHash": "sha256-aRmUh0AMwcbdjJHnytg1e5h5ECcaWtIFQa6d9gI85AI=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "treefmt-nix",
|
||||||
|
"rev": "8d404a69efe76146368885110f29a2ca3700bee6",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "treefmt-nix",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -783,6 +1384,47 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"xdph": {
|
||||||
|
"inputs": {
|
||||||
|
"hyprland-protocols": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprland-protocols"
|
||||||
|
],
|
||||||
|
"hyprlang": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprlang"
|
||||||
|
],
|
||||||
|
"hyprutils": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprutils"
|
||||||
|
],
|
||||||
|
"hyprwayland-scanner": [
|
||||||
|
"hyprland",
|
||||||
|
"hyprwayland-scanner"
|
||||||
|
],
|
||||||
|
"nixpkgs": [
|
||||||
|
"hyprland",
|
||||||
|
"nixpkgs"
|
||||||
|
],
|
||||||
|
"systems": [
|
||||||
|
"hyprland",
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1744644585,
|
||||||
|
"narHash": "sha256-p0D/e4J6Sv6GSb+9u8OQcVHSE2gPNYB5ygIfGDyEiXQ=",
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "xdg-desktop-portal-hyprland",
|
||||||
|
"rev": "be6771e754345f18244fb00aae5c9e5ab21ccc26",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "hyprwm",
|
||||||
|
"repo": "xdg-desktop-portal-hyprland",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"yazi-flavors": {
|
"yazi-flavors": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
|
|||||||
245
flake.nix
245
flake.nix
@@ -36,9 +36,6 @@
|
|||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
flake-parts.url = "github:hercules-ci/flake-parts";
|
|
||||||
import-tree.url = "github:vic/import-tree";
|
|
||||||
|
|
||||||
# Various flakes
|
# Various flakes
|
||||||
yazi-flavors = {
|
yazi-flavors = {
|
||||||
url = "github:yazi-rs/flavors";
|
url = "github:yazi-rs/flavors";
|
||||||
@@ -64,163 +61,99 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = inputs:
|
outputs = {
|
||||||
inputs.flake-parts.lib.mkFlake {inherit inputs;} (inputs.import-tree
|
self,
|
||||||
[
|
nixpkgs,
|
||||||
./hosts
|
home-manager,
|
||||||
./features-nixos
|
systems,
|
||||||
./homes
|
...
|
||||||
./features-home-manager
|
} @ inputs: let
|
||||||
# ./modules
|
inherit (self) outputs;
|
||||||
# ./overlays
|
lib = nixpkgs.lib // home-manager.lib;
|
||||||
# ./packages
|
forEachSystem = f: lib.genAttrs (import systems) (system: f pkgsFor.${system});
|
||||||
]);
|
pkgsFor = lib.genAttrs (import systems) (
|
||||||
# let
|
system:
|
||||||
# inherit (self) outputs;
|
import nixpkgs {
|
||||||
# lib = nixpkgs.lib // home-manager.lib;
|
inherit system;
|
||||||
# forEachSystem = f: lib.genAttrs (import systems) (system: f pkgsFor.${system});
|
config.allowUnfree = true;
|
||||||
# pkgsFor = lib.genAttrs (import systems) (
|
}
|
||||||
# system:
|
);
|
||||||
# import nixpkgs {
|
in {
|
||||||
# inherit system;
|
inherit lib;
|
||||||
# config.allowUnfree = true;
|
|
||||||
# config.permittedInsecurePackages = [
|
|
||||||
# "olm-3.2.16"
|
|
||||||
# ];
|
|
||||||
# warn-dirty = false;
|
|
||||||
# }
|
|
||||||
# );
|
|
||||||
# in {
|
|
||||||
# inherit lib;
|
|
||||||
|
|
||||||
# nixosModules = import ./modules/nixos;
|
nixosModules = import ./modules/nixos;
|
||||||
# homeManagerModules = import ./modules/home-manager;
|
homeManagerModules = import ./modules/home-manager;
|
||||||
|
|
||||||
# overlays = import ./overlays {inherit inputs outputs;};
|
overlays = import ./overlays {inherit inputs outputs;};
|
||||||
# # hydraJobs = import ./hydra.nix { inherit inputs outputs; }; # TODO add hydra jobs here?
|
|
||||||
|
|
||||||
# packages = forEachSystem (pkgs: import ./pkgs {inherit pkgs;});
|
packages = forEachSystem (pkgs: import ./packages {inherit pkgs;});
|
||||||
# devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;});
|
devShells = forEachSystem (pkgs: import ./shell.nix {inherit pkgs;});
|
||||||
# formatter = forEachSystem (pkgs: pkgs.alejandra); # nix fmt *
|
formatter = forEachSystem (pkgs: pkgs.alejandra); # nix fmt *
|
||||||
|
|
||||||
# nixosConfigurations = {
|
nixosConfigurations = {
|
||||||
# # Main laptop
|
# Main laptop
|
||||||
# aspi = lib.nixosSystem {
|
aspi = lib.nixosSystem {
|
||||||
# modules = [
|
modules = [
|
||||||
# ./hosts/aspi
|
./hosts/aspi
|
||||||
# ];
|
];
|
||||||
# specialArgs = {
|
specialArgs = {
|
||||||
# inherit inputs outputs;
|
inherit inputs outputs;
|
||||||
# };
|
pwd = "${self}";
|
||||||
# };
|
};
|
||||||
# # Piano raspberry pi
|
};
|
||||||
# # pianonix = lib.nixosSystem {
|
kardorf = lib.nixosSystem {
|
||||||
# # modules = [./hosts/pianonix];
|
modules = [./hosts/kardorf];
|
||||||
# # specialArgs = {
|
specialArgs = {
|
||||||
# # inherit inputs outputs;
|
inherit inputs outputs;
|
||||||
# # };
|
pwd = "${self}";
|
||||||
# # };
|
};
|
||||||
# kardorf = lib.nixosSystem {
|
};
|
||||||
# modules = [./hosts/kardorf];
|
builder = lib.nixosSystem {
|
||||||
# specialArgs = {
|
modules = [./hosts/builder];
|
||||||
# inherit inputs outputs;
|
specialArgs = {
|
||||||
# };
|
inherit inputs outputs;
|
||||||
# };
|
pwd = "${self}";
|
||||||
# builder = lib.nixosSystem {
|
};
|
||||||
# modules = [./hosts/builder];
|
};
|
||||||
# specialArgs = {
|
};
|
||||||
# inherit inputs outputs;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
# # Standalone HM
|
# Standalone HM
|
||||||
# homeConfigurations = {
|
homeConfigurations = {
|
||||||
# # Main laptop
|
"julian@v3ms" = lib.homeManagerConfiguration {
|
||||||
# "julian@aspi" = lib.homeManagerConfiguration {
|
modules = [
|
||||||
# modules = [
|
./homes/julian/v3ms
|
||||||
# ./homes/julian/aspi.nix
|
./homes/julian/hm-standalone-config.nix
|
||||||
# ./homes/julian/hm-standalone-config.nix
|
];
|
||||||
# ];
|
pkgs = pkgsFor.x86_64-linux;
|
||||||
# pkgs = pkgsFor.x86_64-linux;
|
extraSpecialArgs = {
|
||||||
# extraSpecialArgs = {
|
inherit inputs outputs;
|
||||||
# inherit inputs outputs;
|
pwd = "${self}";
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
# # Media server (RPi)
|
"julian@quickstart" = lib.homeManagerConfiguration {
|
||||||
# # "julian@pianonix" = lib.homeManagerConfiguration {
|
modules = [
|
||||||
# # modules = [
|
./homes/julian/quickstart.nix
|
||||||
# # ./homes/julian/pianonix.nix
|
./homes/julian/hm-standalone-config.nix
|
||||||
# # ./homes/julian/hm-standalone-config.nix
|
];
|
||||||
# # ];
|
pkgs = pkgsFor.x86_64-linux;
|
||||||
# # pkgs = pkgsFor.aarch64-linux;
|
extraSpecialArgs = {
|
||||||
# # extraSpecialArgs = {
|
inherit inputs outputs;
|
||||||
# # inherit inputs outputs;
|
pwd = "${self}";
|
||||||
# # };
|
};
|
||||||
# # };
|
};
|
||||||
# "julian@kardorf" = lib.homeManagerConfiguration {
|
};
|
||||||
# modules = [
|
|
||||||
# ./homes/julian/kardorf.nix
|
|
||||||
# ./homes/julian/hm-standalone-config.nix
|
|
||||||
# ];
|
|
||||||
# pkgs = pkgsFor.x86_64-linux;
|
|
||||||
# extraSpecialArgs = {
|
|
||||||
# inherit inputs outputs;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# "julian@v3ms" = lib.homeManagerConfiguration {
|
|
||||||
# modules = [
|
|
||||||
# ./homes/julian/v3ms
|
|
||||||
# ./homes/julian/hm-standalone-config.nix
|
|
||||||
# ];
|
|
||||||
# pkgs = pkgsFor.x86_64-linux;
|
|
||||||
# extraSpecialArgs = {
|
|
||||||
# inherit inputs outputs;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# "julian@quickstart" = lib.homeManagerConfiguration {
|
|
||||||
# modules = [
|
|
||||||
# ./homes/julian/quickstart.nix
|
|
||||||
# ./homes/julian/hm-standalone-config.nix
|
|
||||||
# ];
|
|
||||||
# pkgs = pkgsFor.x86_64-linux;
|
|
||||||
# extraSpecialArgs = {
|
|
||||||
# inherit inputs outputs;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
# # deploy-rs node configuration
|
# deploy-rs node configuration
|
||||||
# deploy.nodes = {
|
deploy.nodes = {
|
||||||
# # pianonix = {
|
builder = {
|
||||||
# # hostname = "pianonix.local";
|
hostname = "builder.julian-mutter.de";
|
||||||
# # profiles.system = {
|
profiles.system = {
|
||||||
# # sshUser = "root";
|
sshUser = "root";
|
||||||
# # user = "root";
|
user = "root";
|
||||||
# # path = inputs.deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.pianonix;
|
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.builder;
|
||||||
# # confirmTimeout = 90; # default: 30s; raspberrypi takes a little longer restarting services
|
remoteBuild = true;
|
||||||
# # };
|
};
|
||||||
# # };
|
};
|
||||||
|
};
|
||||||
# builder = {
|
};
|
||||||
# hostname = "builder.julian-mutter.de";
|
|
||||||
# profiles.system = {
|
|
||||||
# sshUser = "root";
|
|
||||||
# user = "root";
|
|
||||||
# path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.builder;
|
|
||||||
# remoteBuild = true;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
# # substitutes: nixos-generate --flake .#pianonix -f sd-aarch64 --system aarch64-linux
|
|
||||||
# pianonix-image = inputs.nixos-generators.nixosGenerate {
|
|
||||||
# system = "aarch64-linux";
|
|
||||||
# format = "sd-aarch64";
|
|
||||||
# modules = [./hosts/pianonix];
|
|
||||||
# specialArgs = {
|
|
||||||
# inherit inputs outputs;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -52,7 +52,6 @@
|
|||||||
# rustdesk
|
# rustdesk
|
||||||
tor-browser
|
tor-browser
|
||||||
rusty-path-of-building # Path of Building for poe1 and poe2
|
rusty-path-of-building # Path of Building for poe1 and poe2
|
||||||
# frajul.pob-dev-version # Path of Building
|
|
||||||
vlc
|
vlc
|
||||||
wineWowPackages.stable # 32-bit and 64-bit wine
|
wineWowPackages.stable # 32-bit and 64-bit wine
|
||||||
winetricks
|
winetricks
|
||||||
@@ -69,6 +68,5 @@
|
|||||||
## My scripts
|
## My scripts
|
||||||
frajul.open-messaging
|
frajul.open-messaging
|
||||||
frajul.xwacomcalibrate
|
frajul.xwacomcalibrate
|
||||||
frajul.pob2-frajul
|
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user