228 current 2024-10-22 01:13:05 24.05.20241019.a9b86fc 6.11.4 *
This commit is contained in:
parent
a83e3592b2
commit
d312b9e299
7 changed files with 47 additions and 20 deletions
24
flake.lock
generated
24
flake.lock
generated
|
@ -23,11 +23,11 @@
|
||||||
},
|
},
|
||||||
"nix-flatpak": {
|
"nix-flatpak": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1728416205,
|
"lastModified": 1729453639,
|
||||||
"narHash": "sha256-t30gsrwiBc2oBsd89DwdsVZuEbMT5ed81PYY57CIOJE=",
|
"narHash": "sha256-L19R5CXCfTU9IFs9FAaYhDiteegfhJQMiAHLfls4Pdw=",
|
||||||
"owner": "gmodena",
|
"owner": "gmodena",
|
||||||
"repo": "nix-flatpak",
|
"repo": "nix-flatpak",
|
||||||
"rev": "d65dbf59900de4beaaaba8b42a15994f8433c1bc",
|
"rev": "68bc646058386e2ffbd9d78d79d6558e684f6b8c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -38,11 +38,11 @@
|
||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1728729581,
|
"lastModified": 1729509737,
|
||||||
"narHash": "sha256-oazkQ/z7r43YkDLLQdMg8oIB3CwWNb+2ZrYOxtLEWTQ=",
|
"narHash": "sha256-8OHgqz+tFo21h3hg4/GHizFPws+MMzpEru/+62Z0E8c=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "a8dd1b21995964b115b1e3ec639dd6ce24ab9806",
|
"rev": "cc2d3c0e060f981905d52337340ee6ec8b8eb037",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -54,11 +54,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1728740863,
|
"lastModified": 1729307008,
|
||||||
"narHash": "sha256-u+rxA79a0lyhG+u+oPBRtTDtzz8kvkc9a6SWSt9ekVc=",
|
"narHash": "sha256-QUvb6epgKi9pCu9CttRQW4y5NqJ+snKr1FZpG/x3Wtc=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "a3f9ad65a0bf298ed5847629a57808b97e6e8077",
|
"rev": "a9b86fc2290b69375c5542b622088eb6eca2a7c3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -70,11 +70,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs-unstable": {
|
"nixpkgs-unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1728888510,
|
"lastModified": 1729256560,
|
||||||
"narHash": "sha256-nsNdSldaAyu6PE3YUA+YQLqUDJh+gRbBooMMekZJwvI=",
|
"narHash": "sha256-/uilDXvCIEs3C9l73JTACm4quuHUsIHcns1c+cHUJwA=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "a3c0b3b21515f74fd2665903d4ce6bc4dc81c77c",
|
"rev": "4c2fcb090b1f3e5b47eaa7bd33913b574a11e0a0",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
@ -58,7 +58,7 @@
|
||||||
../../modules/pkg_mgrmnt/store_pkg_file.nix
|
../../modules/pkg_mgrmnt/store_pkg_file.nix
|
||||||
|
|
||||||
../../modules/software/nix-helper/index.nix
|
../../modules/software/nix-helper/index.nix
|
||||||
../../modules/software/nix-helper/doc.nix
|
#../../modules/software/nix-helper/doc.nix
|
||||||
../../modules/software/nix-helper/nix-ld.nix
|
../../modules/software/nix-helper/nix-ld.nix
|
||||||
|
|
||||||
../../modules/software/browser/firefox.nix
|
../../modules/software/browser/firefox.nix
|
||||||
|
|
|
@ -54,6 +54,10 @@
|
||||||
origin = "flathub";
|
origin = "flathub";
|
||||||
appId = "dev.vencord.Vesktop";
|
appId = "dev.vencord.Vesktop";
|
||||||
} # More usable discord for linux
|
} # More usable discord for linux
|
||||||
|
{
|
||||||
|
origin = "flathub";
|
||||||
|
appId = "io.github.Soundux";
|
||||||
|
} # More usable discord for linux
|
||||||
|
|
||||||
#"com.obsproject.Studio" #this is another way to write it
|
#"com.obsproject.Studio" #this is another way to write it
|
||||||
];
|
];
|
||||||
|
|
|
@ -33,6 +33,17 @@
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nuclear = {
|
||||||
|
executable = "${pkgs.nuclear}/bin/nuclear";
|
||||||
|
profile = "${pkgs.firejail}/etc/firejail/nuclear.profile";
|
||||||
|
extraArgs = [
|
||||||
|
# Enforce dark mode
|
||||||
|
"--env=GTK_THEME=Adwaita:dark"
|
||||||
|
# Enable system notifications
|
||||||
|
"--dbus-user.talk=org.freedesktop.Notifications"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
brave = {
|
brave = {
|
||||||
executable = "${pkgs.brave}/bin/brave";
|
executable = "${pkgs.brave}/bin/brave";
|
||||||
profile = "${pkgs.firejail}/etc/firejail/brave.profile";
|
profile = "${pkgs.firejail}/etc/firejail/brave.profile";
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
|
|
||||||
# This is using a rec (recursive) expression to set and access XDG_BIN_HOME within the expression
|
# This is using a rec (recursive) expression to set and access XDG_BIN_HOME within the expression
|
||||||
# For more on rec expressions see https://nix.dev/tutorials/first-steps/nix-language#recursive-attribute-set-rec
|
# For more on rec expressions see https://nix.dev/tutorials/first-steps/nix-language#recursive-attribute-set-rec
|
||||||
environment.sessionVariables = rec {
|
environment.sessionVariables = {
|
||||||
SSH_AUTH_SOCK = "$XDG_RUNTIME_DIR/ssh-agent";
|
SSH_AUTH_SOCK = "$XDG_RUNTIME_DIR/ssh-agent";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -3,8 +3,8 @@
|
||||||
inputs,
|
inputs,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
unstable_list = [
|
unstable_list = with inputs.nixpkgs-unstable.legacyPackages."x86_64-linux"; [
|
||||||
inputs.nixpkgs-unstable.legacyPackages."x86_64-linux".neovim
|
neovim
|
||||||
];
|
];
|
||||||
in {
|
in {
|
||||||
# also opens the TCP and UDP port from 1714 to 1764
|
# also opens the TCP and UDP port from 1714 to 1764
|
||||||
|
@ -57,6 +57,7 @@ in {
|
||||||
file
|
file
|
||||||
unzip
|
unzip
|
||||||
tmux
|
tmux
|
||||||
|
ripgrep
|
||||||
qemu
|
qemu
|
||||||
home-manager
|
home-manager
|
||||||
|
|
||||||
|
@ -64,6 +65,7 @@ in {
|
||||||
mumble
|
mumble
|
||||||
amberol_wrapper
|
amberol_wrapper
|
||||||
amberol
|
amberol
|
||||||
|
nuclear
|
||||||
mpv
|
mpv
|
||||||
zathura
|
zathura
|
||||||
feh
|
feh
|
||||||
|
|
|
@ -1,4 +1,8 @@
|
||||||
{pkgs, ...}: {
|
{
|
||||||
|
pkgs,
|
||||||
|
inputs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
# Enable the X11 windowing system.
|
# Enable the X11 windowing system.
|
||||||
# You can disable this if you're only using the Wayland session.
|
# You can disable this if you're only using the Wayland session.
|
||||||
services.xserver.enable = false;
|
services.xserver.enable = false;
|
||||||
|
@ -17,17 +21,23 @@
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Enable the hyprland window manager with additions
|
# Enable the hyprland window manager with additions
|
||||||
programs = {
|
programs = {
|
||||||
hyprland = {
|
hyprland = {
|
||||||
enable = true;
|
enable = true;
|
||||||
xwayland.enable = true;
|
xwayland.enable = true;
|
||||||
systemd.setPath.enable = true;
|
systemd.setPath.enable = true;
|
||||||
|
#package = pkgs.unstable.hyprland;
|
||||||
};
|
};
|
||||||
hyprlock.enable = true;
|
hyprlock = {
|
||||||
|
enable = true;
|
||||||
|
#package = pkgs.unstable.hyprlock;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.hypridle = {
|
||||||
|
enable = true;
|
||||||
|
#package = pkgs.unstable.hypridle;
|
||||||
};
|
};
|
||||||
services.hypridle.enable = true;
|
|
||||||
|
|
||||||
# for mounting stuff, also needs a auth agent like lxqt.lxqt-policykit
|
# for mounting stuff, also needs a auth agent like lxqt.lxqt-policykit
|
||||||
services.gvfs.enable = true;
|
services.gvfs.enable = true;
|
||||||
|
|
Loading…
Add table
Reference in a new issue