uuuupdate
This commit is contained in:
parent
6e143facef
commit
63c50cfa2a
27 changed files with 314 additions and 257 deletions
|
@ -1,5 +1,8 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
# Bootloader.
|
||||
boot.loader.systemd-boot.enable = true;
|
||||
boot.loader.systemd-boot.configurationLimit = 20;
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, ... }: {
|
||||
{pkgs, ...}: {
|
||||
boot = let
|
||||
theme_name = "deus_ex";
|
||||
in {
|
||||
|
@ -11,7 +11,7 @@
|
|||
themePackages = with pkgs; [
|
||||
# By default we would install all themes
|
||||
(adi1090x-plymouth-themes.override {
|
||||
selected_themes = [ theme_name ];
|
||||
selected_themes = [theme_name];
|
||||
})
|
||||
];
|
||||
};
|
||||
|
@ -32,6 +32,5 @@
|
|||
# It's still possible to open the bootloader list by pressing any key
|
||||
# It will just not appear on screen unless a key is pressed
|
||||
loader.timeout = 0;
|
||||
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,5 +1,8 @@
|
|||
{ pkgs, lib, ... }:
|
||||
{
|
||||
{
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}: {
|
||||
# Configure network proxy if necessary
|
||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||||
|
@ -30,8 +33,8 @@
|
|||
# networking.interfaces.enp5s0.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlp3s0.useDHCP = lib.mkDefault true;
|
||||
# Open ports in the firewall.
|
||||
#networking.firewall.allowedTCPPorts = [ 8080 ];
|
||||
#networking.firewall.allowedUDPPorts = [ 8080 ];
|
||||
networking.firewall.allowedTCPPorts = [8080];
|
||||
networking.firewall.allowedUDPPorts = [8080];
|
||||
# Or disable the firewall altogether.
|
||||
# networking.firewall.enable = false;
|
||||
|
||||
|
|
|
@ -1,31 +1,60 @@
|
|||
{ lib, ... }: {
|
||||
|
||||
{lib, ...}: {
|
||||
services.flatpak.enable = true;
|
||||
services.flatpak.update.auto.enable = false;
|
||||
services.flatpak.uninstallUnmanaged = true;
|
||||
|
||||
services.flatpak.remotes = lib.mkOptionDefault [
|
||||
{ name = "flathub-beta";
|
||||
location = "https://flathub.org/beta-repo/flathub-beta.flatpakrepo"; }
|
||||
{ name = "flathub";
|
||||
location = "https://dl.flathub.org/repo/flathub.flatpakrepo"; }
|
||||
{
|
||||
name = "flathub-beta";
|
||||
location = "https://flathub.org/beta-repo/flathub-beta.flatpakrepo";
|
||||
}
|
||||
{
|
||||
name = "flathub";
|
||||
location = "https://dl.flathub.org/repo/flathub.flatpakrepo";
|
||||
}
|
||||
];
|
||||
|
||||
services.flatpak.packages = [
|
||||
{ origin = "flathub"; appId = "com.github.tchx84.Flatseal"; } # flatpak permisssion gui
|
||||
{ origin = "flathub"; appId = "com.mojang.Minecraft"; } # Lego for adults
|
||||
{ origin = "flathub"; appId = "de.schmidhuberj.DieBahn"; } # Public transport connection viewer
|
||||
{ origin = "flathub"; appId = "com.github.hugolabe.Wike"; } # Wikpedia, but in nice
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "com.github.tchx84.Flatseal";
|
||||
} # flatpak permisssion gui
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "com.mojang.Minecraft";
|
||||
} # Lego for adults
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "de.schmidhuberj.DieBahn";
|
||||
} # Public transport connection viewer
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "com.github.hugolabe.Wike";
|
||||
} # Wikpedia, but in nice
|
||||
#{ origin = "flathub"; appId = "com.jeffser.Alpaca"; } # Local chat AI
|
||||
{ origin = "flathub"; appId = "io.gpt4all.gpt4all"; } # Local chat AI
|
||||
{ origin = "flathub"; appId = "md.obsidian.Obsidian"; } # note taking and brain organising
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "io.gpt4all.gpt4all";
|
||||
} # Local chat AI
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "md.obsidian.Obsidian";
|
||||
} # note taking and brain organising
|
||||
|
||||
# messenger
|
||||
{ origin = "flathub"; appId = "org.signal.Signal"; }
|
||||
{ origin = "flathub"; appId = "org.telegram.desktop"; }
|
||||
{ origin = "flathub"; appId = "dev.vencord.Vesktop"; } # More usable discord for linux
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "org.signal.Signal";
|
||||
}
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "org.telegram.desktop";
|
||||
}
|
||||
{
|
||||
origin = "flathub";
|
||||
appId = "dev.vencord.Vesktop";
|
||||
} # More usable discord for linux
|
||||
|
||||
#"com.obsproject.Studio" #this is another way to write it
|
||||
];
|
||||
|
||||
}
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
# Enable common container config files in /etc/containers
|
||||
virtualisation.containers.enable = true;
|
||||
virtualisation = {
|
||||
|
@ -12,7 +11,7 @@
|
|||
dockerSocket.enable = true;
|
||||
|
||||
# Required for containers under podman-compose to be able to talk to each other.
|
||||
defaultNetwork.settings.dns_enabled = true;
|
||||
defaultNetwork.settings.dns_enabled = true;
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -1,10 +1,13 @@
|
|||
{ config, pkgs, ... }: {
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
# creates the file /etc/current-system-packages which then contains all installed packages and versions
|
||||
environment.etc."current-system-packages".text =
|
||||
let
|
||||
packages = builtins.map (p: "${p.name}") config.environment.systemPackages;
|
||||
sortedUnique = builtins.sort builtins.lessThan (pkgs.lib.lists.unique packages);
|
||||
formatted = builtins.concatStringsSep "\n" sortedUnique;
|
||||
in
|
||||
formatted;
|
||||
environment.etc."current-system-packages".text = let
|
||||
packages = builtins.map (p: "${p.name}") config.environment.systemPackages;
|
||||
sortedUnique = builtins.sort builtins.lessThan (pkgs.lib.lists.unique packages);
|
||||
formatted = builtins.concatStringsSep "\n" sortedUnique;
|
||||
in
|
||||
formatted;
|
||||
}
|
||||
|
|
|
@ -1,9 +1,8 @@
|
|||
# TODO refine firejail it seems that / is not shielded enough and app armor does not work
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
programs.firejail = {
|
||||
enable = true;
|
||||
wrappedBinaries = {
|
||||
enable = true;
|
||||
wrappedBinaries = {
|
||||
firefox = {
|
||||
executable = "${pkgs.firefox}/bin/firefox";
|
||||
profile = "${pkgs.firejail}/etc/firejail/firefox.profile";
|
||||
|
@ -51,11 +50,10 @@
|
|||
};
|
||||
};
|
||||
environment.etc = {
|
||||
"firejail/brave.local".text = ''
|
||||
"firejail/brave.local".text = ''
|
||||
whitelist ''${HOME}/.config/brave
|
||||
whitelist ''${HOME}/.local
|
||||
whitelist ''${HOME}/Downloads
|
||||
'';
|
||||
'';
|
||||
};
|
||||
|
||||
}
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
# Enable touchpad support (enabled default in most desktopManager).
|
||||
# services.xserver.libinput.enable = true;
|
||||
services.greetd = {
|
||||
|
@ -7,14 +6,14 @@
|
|||
vt = 7;
|
||||
settings = {
|
||||
default_session = {
|
||||
command = ''${pkgs.greetd.tuigreet}/bin/tuigreet \
|
||||
--time \
|
||||
--time-format '%Y-%m-%dT%H:%M:%S %A' \
|
||||
--remember \
|
||||
--user-menu \
|
||||
--theme 'border=lightgreen;text=lightgreen;prompt=lightgreen;time=lightgreen;action=lightgreen;button=lightgreen;input=lightgreen' \
|
||||
--cmd hyprland'';
|
||||
# removed elements from theme: container
|
||||
command = '' ${pkgs.greetd.tuigreet}/bin/tuigreet \
|
||||
--time \
|
||||
--time-format '%Y-%m-%dT%H:%M:%S %A' \
|
||||
--remember \
|
||||
--user-menu \
|
||||
--theme 'border=lightgreen;text=lightgreen;prompt=lightgreen;time=lightgreen;action=lightgreen;button=lightgreen;input=lightgreen' \
|
||||
--cmd hyprland'';
|
||||
# removed elements from theme: container
|
||||
user = "greeter";
|
||||
};
|
||||
};
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
programs.ssh = {
|
||||
startAgent = true;
|
||||
enableAskPassword = true;
|
||||
|
@ -18,7 +17,6 @@
|
|||
lxqt.lxqt-openssh-askpass
|
||||
];
|
||||
|
||||
|
||||
# Some programs need SUID wrappers, can be configured further or are
|
||||
# started in user sessions.
|
||||
# programs.mtr.enable = true;
|
||||
|
|
|
@ -1,10 +1,9 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||||
users.users.ranomier = {
|
||||
isNormalUser = true;
|
||||
description = "Ranomier";
|
||||
extraGroups = [ "networkmanager" "wheel" ];
|
||||
extraGroups = ["networkmanager" "wheel"];
|
||||
#packages = with pkgs; [];
|
||||
};
|
||||
|
||||
|
@ -23,14 +22,14 @@
|
|||
# This is using a rec (recursive) expression to set and access XDG_BIN_HOME within the expression
|
||||
# For more on rec expressions see https://nix.dev/tutorials/first-steps/nix-language#recursive-attribute-set-rec
|
||||
environment.sessionVariables = rec {
|
||||
XDG_CACHE_HOME = "$HOME/.cache";
|
||||
XDG_CACHE_HOME = "$HOME/.cache";
|
||||
XDG_CONFIG_HOME = "$HOME/.config";
|
||||
XDG_DATA_HOME = "$HOME/.local/share";
|
||||
XDG_STATE_HOME = "$HOME/.local/state";
|
||||
XDG_DATA_HOME = "$HOME/.local/share";
|
||||
XDG_STATE_HOME = "$HOME/.local/state";
|
||||
|
||||
# Not officially in the specification
|
||||
XDG_BIN_HOME = "$HOME/.local/mybin";
|
||||
PATH = [
|
||||
XDG_BIN_HOME = "$HOME/.local/mybin";
|
||||
PATH = [
|
||||
"${XDG_BIN_HOME}"
|
||||
];
|
||||
};
|
||||
|
@ -48,7 +47,6 @@
|
|||
|
||||
security.apparmor.enable = true;
|
||||
|
||||
|
||||
# Some programs need SUID wrappers, can be configured further or are
|
||||
# started in user sessions.
|
||||
# programs.mtr.enable = true;
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
# Enable sound with pipewire.
|
||||
hardware.pulseaudio.enable = false;
|
||||
security.rtkit.enable = true;
|
||||
|
@ -52,5 +51,7 @@
|
|||
environment.systemPackages = with pkgs; [
|
||||
helvum
|
||||
easyeffects
|
||||
];
|
||||
pwvucontrol
|
||||
lxqt.pavucontrol-qt
|
||||
];
|
||||
}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, ... }: {
|
||||
{pkgs, ...}: {
|
||||
environment.systemPackages = with pkgs; [
|
||||
brave
|
||||
];
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
{ pkgs, ... }: {
|
||||
{pkgs, ...}: {
|
||||
# The logical browser of choice
|
||||
programs.firefox.enable = true;
|
||||
|
||||
xdg.mime.defaultApplications = let
|
||||
xdg.mime.defaultApplications = let
|
||||
browser_desktop_file = "firefox.desktop";
|
||||
in {
|
||||
"text/html" = browser_desktop_file;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ pkgs, ... }: {
|
||||
{pkgs, ...}: {
|
||||
#environment.systemPackages = with pkgs; [ ];
|
||||
# hardware.steam-hardware.enable = true; # Note that this is already enabled with programs.steam.enable = true;
|
||||
# hardware.steam-hardware.enable = true; # Note that this is already enabled with programs.steam.enable = true;
|
||||
programs.steam = {
|
||||
enable = true;
|
||||
remotePlay.openFirewall =
|
||||
|
@ -29,9 +29,9 @@
|
|||
# environment.systemPackages = with pkgs; [
|
||||
# (steam.override { /* Your overrides here */ }).run
|
||||
# ];
|
||||
# Install the game by setting the executable attribute on the installer and then running it via steam-run ./your_installer.sh. After installation, edit the "~/.local/share/applications/your_game.desktop" and replace the exec line from Exec="/home/user/game/start.sh" "" with Exec="steam-run" "/home/user/game/start.sh".
|
||||
# Install the game by setting the executable attribute on the installer and then running it via steam-run ./your_installer.sh. After installation, edit the "~/.local/share/applications/your_game.desktop" and replace the exec line from Exec="/home/user/game/start.sh" "" with Exec="steam-run" "/home/user/game/start.sh".
|
||||
|
||||
environment.systemPackages = with pkgs; [ steam-run ];
|
||||
environment.systemPackages = with pkgs; [steam-run];
|
||||
|
||||
programs.steam.extraCompatPackages = with pkgs; [ proton-ge-bin ];
|
||||
programs.steam.extraCompatPackages = with pkgs; [proton-ge-bin];
|
||||
}
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
nix.extraOptions = ''
|
||||
plugin-files = ${pkgs.nix-doc}/lib/libnix_doc_plugin.so
|
||||
'';
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
{ pkgs, ... }: {
|
||||
{pkgs, ...}: {
|
||||
environment.systemPackages = with pkgs; [
|
||||
nix-index
|
||||
];
|
||||
|
||||
programs.command-not-found.enable = false;
|
||||
# for home-manager, use programs.bash.initExtra instead
|
||||
programs.bash.interactiveShellInit = ''
|
||||
source ${pkgs.nix-index}/etc/profile.d/command-not-found.sh
|
||||
'';
|
||||
];
|
||||
|
||||
programs.command-not-found.enable = false;
|
||||
# for home-manager, use programs.bash.initExtra instead
|
||||
programs.bash.interactiveShellInit = ''
|
||||
source ${pkgs.nix-index}/etc/profile.d/command-not-found.sh
|
||||
'';
|
||||
}
|
||||
|
|
|
@ -1,9 +1,8 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
# to run normal external binaries
|
||||
programs.nix-ld.enable = true;
|
||||
programs.nix-ld.libraries = with pkgs; [
|
||||
# Add any missing dynamic libraries for unpackaged
|
||||
# Add any missing dynamic libraries for unpackaged
|
||||
# programs here, NOT in environment.systemPackages
|
||||
];
|
||||
}
|
||||
|
|
|
@ -1,5 +1,8 @@
|
|||
{ pkgs, config, ... }:
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
environment.systemPackages = [
|
||||
(pkgs.wrapOBS {
|
||||
plugins = with pkgs.obs-studio-plugins; [
|
||||
|
@ -12,7 +15,7 @@
|
|||
boot.extraModulePackages = with config.boot.kernelPackages; [
|
||||
v4l2loopback
|
||||
];
|
||||
boot.kernelModules = [ "v4l2loopback" ];
|
||||
boot.kernelModules = ["v4l2loopback"];
|
||||
boot.extraModprobeConfig = ''
|
||||
options v4l2loopback devices=1 video_nr=1 card_label="OBS Cam" exclusive_caps=1
|
||||
'';
|
||||
|
|
|
@ -1,18 +1,15 @@
|
|||
{ pkgs, inputs, config, ... }: let
|
||||
unstable_list = [ inputs.nixpkgs-unstable.legacyPackages."x86_64-linux".neovim ];
|
||||
{
|
||||
pkgs,
|
||||
inputs,
|
||||
config,
|
||||
...
|
||||
}: let
|
||||
unstable_list = [inputs.nixpkgs-unstable.legacyPackages."x86_64-linux".neovim];
|
||||
in {
|
||||
# also opens the TCP and UDP port from 1714 to 1764
|
||||
programs.kdeconnect.enable = true;
|
||||
|
||||
# for running android apps
|
||||
virtualisation.waydroid.enable =
|
||||
true; # also starts the systemd service waydroid-container
|
||||
|
||||
# virt manager, for running VM's
|
||||
virtualisation.libvirtd.enable = true;
|
||||
programs.virt-manager.enable = true;
|
||||
|
||||
environment.pathsToLink = [ "/share/foot" ];
|
||||
environment.pathsToLink = ["/share/foot"];
|
||||
|
||||
# List packages installed in system profile. To search, run:
|
||||
# $ nix search wget
|
||||
|
@ -21,59 +18,60 @@ in {
|
|||
export GDK_BACKEND='x11'
|
||||
exec "${pkgs.amberol}/bin/amberol" "$@"
|
||||
'';
|
||||
in with pkgs; [
|
||||
# low level stuff
|
||||
efibootmgr
|
||||
#exfat
|
||||
exfatprogs
|
||||
greetd.greetd
|
||||
greetd.tuigreet
|
||||
killall
|
||||
vulnix
|
||||
in
|
||||
with pkgs;
|
||||
[
|
||||
# low level stuff
|
||||
efibootmgr
|
||||
#exfat
|
||||
exfatprogs
|
||||
greetd.greetd
|
||||
greetd.tuigreet
|
||||
killall
|
||||
vulnix
|
||||
|
||||
# hardware
|
||||
brightnessctl
|
||||
usbutils
|
||||
lm_sensors
|
||||
# hardware
|
||||
brightnessctl
|
||||
usbutils
|
||||
lm_sensors
|
||||
|
||||
# neovim
|
||||
# unstable.neovim
|
||||
git
|
||||
gnumake
|
||||
gcc
|
||||
nodePackages.npm
|
||||
nodejs-slim
|
||||
python3
|
||||
fd
|
||||
nodejs-slim
|
||||
cargo
|
||||
rustc
|
||||
# neovim
|
||||
# unstable.neovim
|
||||
git
|
||||
gnumake
|
||||
gcc
|
||||
nodePackages.npm
|
||||
nodejs-slim
|
||||
python3
|
||||
fd
|
||||
nodejs-slim
|
||||
cargo
|
||||
rustc
|
||||
|
||||
# tooling
|
||||
htop
|
||||
ncdu
|
||||
wget
|
||||
miniserve
|
||||
file
|
||||
unzip
|
||||
tmux
|
||||
qemu
|
||||
home-manager
|
||||
|
||||
# move to homemanager?
|
||||
lxqt.pavucontrol-qt
|
||||
mumble
|
||||
amberol_wrapper
|
||||
amberol
|
||||
mpv
|
||||
zathura
|
||||
feh
|
||||
#unstable.obsidian
|
||||
keepassxc
|
||||
#minecraft
|
||||
element-desktop
|
||||
] ++ unstable_list;
|
||||
# tooling
|
||||
htop
|
||||
ncdu
|
||||
wget
|
||||
miniserve
|
||||
file
|
||||
unzip
|
||||
tmux
|
||||
qemu
|
||||
home-manager
|
||||
|
||||
# move to homemanager?
|
||||
mumble
|
||||
amberol_wrapper
|
||||
amberol
|
||||
mpv
|
||||
zathura
|
||||
feh
|
||||
#unstable.obsidian
|
||||
keepassxc
|
||||
#minecraft
|
||||
element-desktop
|
||||
]
|
||||
++ unstable_list;
|
||||
|
||||
fonts.packages = with pkgs; [
|
||||
noto-fonts
|
||||
|
@ -89,7 +87,7 @@ in {
|
|||
fira-code-symbols
|
||||
#droid-sans-mono
|
||||
(nerdfonts.override {
|
||||
fonts = [ "FiraCode" "DroidSansMono" "JetBrainsMono" ];
|
||||
fonts = ["FiraCode" "DroidSansMono" "JetBrainsMono"];
|
||||
})
|
||||
];
|
||||
}
|
||||
|
|
14
modules/software/virt.nix
Normal file
14
modules/software/virt.nix
Normal file
|
@ -0,0 +1,14 @@
|
|||
{
|
||||
pkgs,
|
||||
inputs,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
# for running android apps
|
||||
virtualisation.waydroid.enable =
|
||||
true; # also starts the systemd service waydroid-container
|
||||
|
||||
# virt manager, for running VM's
|
||||
virtualisation.libvirtd.enable = true;
|
||||
programs.virt-manager.enable = true;
|
||||
}
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }:{
|
||||
{...}: {
|
||||
hardware.bluetooth.enable = true; # enables support for Bluetooth
|
||||
hardware.bluetooth.powerOnBoot = false; # powers up the default Bluetooth controller on boot
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }:{
|
||||
# A system daemon to allow session software to update firmware
|
||||
{...}: {
|
||||
# A system daemon to allow session software to update firmware
|
||||
services.fwupd.enable = true;
|
||||
}
|
||||
|
|
|
@ -1,20 +1,21 @@
|
|||
{ pkgs, ... }:
|
||||
{
|
||||
{pkgs, ...}: {
|
||||
hardware.sane.enable = true; # enables support for SANE scanners
|
||||
services.ipp-usb.enable=true; # enable usb support
|
||||
services.ipp-usb.enable = true; # enable usb support
|
||||
|
||||
hardware.sane.backends-package = pkgs.sane-backends.overrideAttrs (old: {
|
||||
configureFlags = (old.configureFlags or []) ++ [
|
||||
# "--localstatedir=/var" # `sane-backends` puts e.g. lock files in here, must not be in /nix/store
|
||||
# "--with-lockdir=/var/lock/sane" # `sane-backends` puts e.g. lock files in here, must not be in /nix/store
|
||||
configureFlags =
|
||||
(old.configureFlags or [])
|
||||
++ [
|
||||
# "--localstatedir=/var" # `sane-backends` puts e.g. lock files in here, must not be in /nix/store
|
||||
# "--with-lockdir=/var/lock/sane" # `sane-backends` puts e.g. lock files in here, must not be in /nix/store
|
||||
|
||||
# Ugly workaround for https://github.com/NixOS/nixpkgs/issues/273280#issuecomment-1848873028
|
||||
# Really we should make `sane-backends` be able to provide a real lock dir (e.g. `/var/lock/sane`).
|
||||
"--disable-locking"
|
||||
];
|
||||
# Ugly workaround for https://github.com/NixOS/nixpkgs/issues/273280#issuecomment-1848873028
|
||||
# Really we should make `sane-backends` be able to provide a real lock dir (e.g. `/var/lock/sane`).
|
||||
"--disable-locking"
|
||||
];
|
||||
});
|
||||
|
||||
users.users.ranomier.extraGroups = [ "scanner" "lp" ];
|
||||
users.users.ranomier.extraGroups = ["scanner" "lp"];
|
||||
|
||||
# only for the scan and maybe print clients
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
{ pkgs, ... }: {
|
||||
|
||||
{pkgs, ...}: {
|
||||
# Enable the X11 windowing system.
|
||||
# You can disable this if you're only using the Wayland session.
|
||||
services.xserver.enable = false;
|
||||
|
@ -38,7 +37,7 @@
|
|||
platformTheme = "qt5ct";
|
||||
style = "kvantum";
|
||||
};
|
||||
|
||||
|
||||
# List packages installed in system profile. To search, run:
|
||||
# $ nix search wget
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
@ -63,7 +62,7 @@
|
|||
slurp
|
||||
satty
|
||||
flameshot
|
||||
|
||||
|
||||
# theming
|
||||
gruvbox-plus-icons
|
||||
gruvbox-gtk-theme
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue