Compare commits

...

14 commits

Author SHA1 Message Date
Ranomier
a1ca221025 remove fonts 2025-04-15 18:05:53 +02:00
Ranomier
0b2af8268b fix: function 2025-04-15 18:05:36 +02:00
Ranomier
1c465fd393 make audio_video a folder 2025-04-15 18:04:50 +02:00
Ranomier
dee6a979f2 organise 2025-04-15 17:56:59 +02:00
Ranomier
be9c2dfb50 format 2025-04-12 14:53:53 +02:00
Ranomier
7443a419bd remove unneeded elipses 2025-04-12 14:53:12 +02:00
Ranomier
67ea2606c9 update 2025-04-12 14:44:17 +02:00
Ranomier
7410ca41fb deactivate home manager 2025-04-12 14:43:33 +02:00
Ranomier
baf8c080f6 347 current 2025-03-29 20:41:46 24.11.20250320.7105ae3 6.12.10-zen1 * 2025-03-29 20:41:51 +01:00
Ranomier
cec7ed3818 renaming nixpkgs-unstable to nixos-unstable 2025-03-27 19:12:25 +01:00
Ranomier
24a96cd8dc tests 2025-03-27 19:11:24 +01:00
Ranomier
2097c0a290 introducing tests 2025-03-27 19:10:47 +01:00
Ranomier
708a7304f7 342 current 2025-03-11 08:59:16 24.11.20250307.20755fa 6.12.10-zen1 * 2025-03-11 08:59:46 +01:00
Ranomier
2c908d5722 lock update 2025-03-11 08:56:35 +01:00
39 changed files with 263 additions and 162 deletions

68
flake.lock generated
View file

@ -7,11 +7,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1739757849, "lastModified": 1744117652,
"narHash": "sha256-Gs076ot1YuAAsYVcyidLKUMIc4ooOaRGO0PqTY7sBzA=", "narHash": "sha256-t7dFCDl4vIOOUMhEZnJF15aAzkpaup9x4ZRGToDFYWI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "9d3d080aec2a35e05a15cedd281c2384767c2cfe", "rev": "b4e98224ad1336751a2ac7493967a4c9f6d9cb3f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -23,11 +23,11 @@
}, },
"nix-flatpak": { "nix-flatpak": {
"locked": { "locked": {
"lastModified": 1739444422, "lastModified": 1741903049,
"narHash": "sha256-iAVVHi7X3kWORftY+LVbRiStRnQEob2TULWyjMS6dWg=", "narHash": "sha256-8Y8brH04JjSLrCLvBEbhK9vOu7lhQhqUBW4kI3tifdI=",
"owner": "gmodena", "owner": "gmodena",
"repo": "nix-flatpak", "repo": "nix-flatpak",
"rev": "5e54c3ca05a7c7d968ae1ddeabe01d2a9bc1e177", "rev": "42c7fb2702219b86a8f5969c3475ce594c28f5d0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -59,11 +59,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1737057290, "lastModified": 1742568034,
"narHash": "sha256-3Pe0yKlCc7EOeq1X/aJVDH0CtNL+tIBm49vpepwL1MQ=", "narHash": "sha256-QaMEhcnscfF2MqB7flZr+sLJMMYZPnvqO4NYf9B4G38=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-generators", "repo": "nixos-generators",
"rev": "d002ce9b6e7eb467cd1c6bb9aef9c35d191b5453", "rev": "42ee229088490e3777ed7d1162cb9e9d8c3dbb11",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -74,11 +74,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1740089251, "lastModified": 1743420942,
"narHash": "sha256-Y78mDBWoO8CLLTjQfPfII+KXFb6lAmF9GrLbyVBsIMM=", "narHash": "sha256-b/exDDQSLmENZZgbAEI3qi9yHkuXAXCPbormD8CSJXo=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "18e9f9753e9ae261bcc7d3abe15745686991fd30", "rev": "de6fc5551121c59c01e2a3d45b277a6d05077bc4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -88,29 +88,13 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs": { "nixos-unstable": {
"locked": { "locked": {
"lastModified": 1739923778, "lastModified": 1743964447,
"narHash": "sha256-BqUY8tz0AQ4to2Z4+uaKczh81zsGZSYxjgvtw+fvIfM=", "narHash": "sha256-nEo1t3Q0F+0jQ36HJfbJtiRU4OI+/0jX/iITURKe3EE=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "36864ed72f234b9540da4cf7a0c49e351d30d3f1", "rev": "063dece00c5a77e4a0ea24e5e5a5bd75232806f8",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1739866667,
"narHash": "sha256-EO1ygNKZlsAC9avfcwHkKGMsmipUk1Uc0TbrEZpkn64=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "73cf49b8ad837ade2de76f87eb53fc85ed5d4680",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -120,14 +104,30 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs": {
"locked": {
"lastModified": 1743975612,
"narHash": "sha256-o4FjFOUmjSRMK7dn0TFdAT0RRWUWD+WsspPHa+qEQT8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "a880f49904d68b5e53338d1e8c7bf80f59903928",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"home-manager": "home-manager", "home-manager": "home-manager",
"nix-flatpak": "nix-flatpak", "nix-flatpak": "nix-flatpak",
"nixos-generators": "nixos-generators", "nixos-generators": "nixos-generators",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixos-unstable": "nixos-unstable",
"nixpkgs-unstable": "nixpkgs-unstable" "nixpkgs": "nixpkgs"
} }
} }
}, },

View file

@ -19,7 +19,7 @@
}; };
# NixOS unstable channel # NixOS unstable channel
nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable"; nixos-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
# ready made hardware configurations. e.G.: Power saving # ready made hardware configurations. e.G.: Power saving
nixos-hardware.url = "github:NixOS/nixos-hardware/master"; nixos-hardware.url = "github:NixOS/nixos-hardware/master";
@ -35,7 +35,7 @@
self, self,
nixpkgs, nixpkgs,
nixos-hardware, nixos-hardware,
nixpkgs-unstable, nixos-unstable,
nix-flatpak, nix-flatpak,
home-manager, home-manager,
nixos-generators, nixos-generators,
@ -53,7 +53,7 @@
host_helper = hostname: { host_helper = hostname: {
${hostname} = nixpkgs.lib.nixosSystem { ${hostname} = nixpkgs.lib.nixosSystem {
specialArgs = {inherit inputs;}; specialArgs = {inherit inputs;} // {inherit nixos-unstable;};
modules = [ modules = [
./hosts/${hostname}/${hostname}.nix ./hosts/${hostname}/${hostname}.nix
]; ];
@ -74,7 +74,7 @@
#nixosModules = import ./modules/nixos; #nixosModules = import ./modules/nixos;
# Reusable home-manager modules you might want to export # Reusable home-manager modules you might want to export
# These are usually stuff you would upstream into home-manager # These are usually stuff you would upstream into home-manager
homeManagerModules = import ./modules/home-manager; #homeManagerModules = import ./modules/home-manager;
# NixOS configuration entrypoint # NixOS configuration entrypoint
# Available through 'nixos-rebuild --flake .#your-hostname' # Available through 'nixos-rebuild --flake .#your-hostname'

View file

@ -1,4 +1,4 @@
{...}: { {
boot.loader = { boot.loader = {
systemd-boot.enable = true; systemd-boot.enable = true;
systemd-boot.configurationLimit = 20; systemd-boot.configurationLimit = 20;

View file

@ -2,6 +2,7 @@
pkgs, pkgs,
inputs, inputs,
modulesPath, modulesPath,
nixos-unstable,
... ...
}: { }: {
networking.hostName = "crocoite"; # Define your hostname. networking.hostName = "crocoite"; # Define your hostname.
@ -78,5 +79,7 @@
../../modules/wm_and_de ../../modules/wm_and_de
../../modules/pkg_mgrmnt ../../modules/pkg_mgrmnt
# ../../tests
]; ];
} }

View file

@ -1,4 +1,4 @@
{...}: { {
# Use the GRUB 2 boot loader. # Use the GRUB 2 boot loader.
#boot.loader.grub.enable = true; #boot.loader.grub.enable = true;
# Define on which hard drive you want to install Grub. # Define on which hard drive you want to install Grub.

View file

@ -1,4 +1,4 @@
{...}: { {
services = { services = {
speechd.enable = true; speechd.enable = true;
orca.enable = true; orca.enable = true;

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
#./plymouth.nix #./plymouth.nix
./accessibility.nix ./accessibility.nix

View file

@ -1,7 +1,9 @@
{...}: { {
networking.firewall = {
enable = false;
# Open ports in the firewall. # Open ports in the firewall.
networking.firewall.allowedTCPPorts = [8080 10001 10002]; allowedTCPPorts = [8080 10001 10002];
networking.firewall.allowedUDPPorts = [8080 10001 10002]; allowedUDPPorts = [8080 10001 10002];
# Or disable the firewall altogether. };
networking.firewall.enable = false;
} }

View file

@ -1,4 +1,4 @@
{...}: { {
hardware.bluetooth.enable = true; # enables support for Bluetooth hardware.bluetooth.enable = true; # enables support for Bluetooth
hardware.bluetooth.powerOnBoot = false; # powers up the default Bluetooth controller on boot hardware.bluetooth.powerOnBoot = false; # powers up the default Bluetooth controller on boot

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./bluetooth.nix ./bluetooth.nix
./fwupd.nix ./fwupd.nix

View file

@ -1,4 +1,4 @@
{...}: { {
# A system daemon to allow session software to update firmware # A system daemon to allow session software to update firmware
services.fwupd.enable = true; services.fwupd.enable = true;
} }

View file

@ -1,4 +1,4 @@
{...}: { {
# probably does nothing on my amd laptop. need to check # probably does nothing on my amd laptop. need to check
hardware.trackpoint.speed = 200; hardware.trackpoint.speed = 200;
} }

View file

@ -1,4 +1,4 @@
{...}: { {
# Set your time zone. # Set your time zone.
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./flatpak.nix ./flatpak.nix
./podman.nix ./podman.nix

View file

@ -1,4 +1,4 @@
{...}: { {
services.flatpak = { services.flatpak = {
enable = true; enable = true;
update.auto = { update.auto = {

View file

@ -1,4 +1,4 @@
{...}: { {
nix = { nix = {
optimise = { optimise = {
automatic = true; automatic = true;

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./apparmor.nix ./apparmor.nix
./firejail.nix ./firejail.nix

View file

@ -1,4 +1,4 @@
{...}: { {
# for running android apps # for running android apps
# also starts the systemd service waydroid-container # also starts the systemd service waydroid-container
virtualisation.waydroid.enable = true; virtualisation.waydroid.enable = true;

View file

@ -1,62 +0,0 @@
{pkgs, ...}: {
# Enable sound with pipewire
hardware.pulseaudio.enable = false;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
alsa = {
enable = true;
support32Bit = true;
};
pulse.enable = true;
# If you want to use JACK applications, uncomment this
jack.enable = true;
extraConfig.pipewire."99-input-denoise" = {
"context.modules" = [
{
"name" = "libpipewire-module-filter-chain";
"args" = {
"node.description" = "Noise Canceling source";
"media.name" = "Noise Canceling source";
"filter.graph" = {
"nodes" = [
{
"type" = "ladspa";
"name" = "rnnoise";
"plugin" = "${pkgs.rnnoise-plugin}/lib/ladspa/librnnoise_ladspa.so";
"label" = "noise_suppressor_stereo";
"control" = {
"VAD Threshold (%)" = 75.0;
};
}
];
};
"audio.position" = [
"FL"
"FR"
];
"capture.props" = {
"node.name" = "effect_input.rnnoise";
"node.passive" = true;
};
"playback.props" = {
"node.name" = "effect_output.rnnoise";
"media.class" = "Audio/Source";
};
};
}
];
};
};
environment.systemPackages = with pkgs; [
helvum
pwvucontrol
lxqt.pavucontrol-qt
qpwgraph
easyeffects
non
roc-toolkit
];
}

View file

@ -0,0 +1,30 @@
{pkgs, ...}: {
# Enable sound with pipewire
hardware.pulseaudio.enable = false;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
# If you want to use JACK applications, uncomment this
jack.enable = true;
pulse.enable = true;
alsa = {
enable = true;
support32Bit = true;
};
};
environment.systemPackages = with pkgs; [
helvum
pwvucontrol
lxqt.pavucontrol-qt
qpwgraph
easyeffects
non
roc-toolkit
];
}

View file

@ -0,0 +1,6 @@
{
imports = [
./audio_video.nix
./noise_cancel.nix
];
}

View file

@ -0,0 +1,38 @@
{pkgs, ...}: {
services.pipewire.extraConfig.pipewire."99-input-denoise" = {
"context.modules" = [
{
"name" = "libpipewire-module-filter-chain";
"args" = {
"node.description" = "Noise Canceling source";
"media.name" = "Noise Canceling source";
"filter.graph" = {
"nodes" = [
{
"type" = "ladspa";
"name" = "rnnoise";
"plugin" = "${pkgs.rnnoise-plugin}/lib/ladspa/librnnoise_ladspa.so";
"label" = "noise_suppressor_stereo";
"control" = {
"VAD Threshold (%)" = 75.0;
};
}
];
};
"audio.position" = [
"FL"
"FR"
];
"capture.props" = {
"node.name" = "effect_input.rnnoise";
"node.passive" = true;
};
"playback.props" = {
"node.name" = "effect_output.rnnoise";
"media.class" = "Audio/Source";
};
};
}
];
};
}

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./brave.nix ./brave.nix
./firefox.nix ./firefox.nix

View file

@ -1,14 +1,16 @@
{...}: { {
imports = [ imports = [
./audio_video.nix
./flatpak.nix
./game.nix
./obs-studio.nix
./shell.nix
./software.nix
./virt.nix
./android.nix ./android.nix
./audio_video
./flatpak.nix
./fonts.nix
./game.nix
#./mpv.nix #./mpv.nix
./neovim.nix ./neovim.nix
./obs-studio.nix
./packages.nix
./programs.nix
./shell.nix
./virt.nix
]; ];
} }

View file

@ -1,4 +1,4 @@
{...}: { {
services.flatpak = { services.flatpak = {
packages = [ packages = [
{ {
@ -17,7 +17,6 @@
origin = "flathub"; origin = "flathub";
appId = "com.github.hugolabe.Wike"; appId = "com.github.hugolabe.Wike";
} # Wikpedia, but in nice } # Wikpedia, but in nice
#{ origin = "flathub"; appId = "com.jeffser.Alpaca"; } # Local chat AI
{ {
origin = "flathub"; origin = "flathub";
appId = "io.gpt4all.gpt4all"; appId = "io.gpt4all.gpt4all";
@ -50,6 +49,10 @@
origin = "flathub"; origin = "flathub";
appId = "com.etlegacy.ETLegacy"; appId = "com.etlegacy.ETLegacy";
} # shooter } # shooter
{
origin = "flathub";
appId = "org.js.nuclear.Nuclear";
}
#"com.obsproject.Studio" #this is another way to write it #"com.obsproject.Studio" #this is another way to write it
]; ];

View file

@ -0,0 +1,19 @@
{pkgs, ...}: {
fonts.packages = with pkgs; [
noto-fonts
noto-fonts-cjk-sans
noto-fonts-emoji
liberation_ttf
dina-font
proggyfonts
font-awesome
jetbrains-mono
fira-code
fira-code-symbols
#droid-sans-mono
(nerdfonts.override {
fonts = ["FiraCode" "DroidSansMono" "JetBrainsMono"];
})
];
}

View file

@ -1,4 +1,4 @@
{...}: { {
programs.neovim = { programs.neovim = {
enable = true; enable = true;
viAlias = true; viAlias = true;

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
#./doc.nix #./doc.nix
./index.nix ./index.nix

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./libreoffice.nix ./libreoffice.nix
]; ];

View file

@ -1,9 +1,4 @@
{pkgs, ...}: { {pkgs, ...}: {
# also opens the TCP and UDP port from 1714 to 1764
programs.kdeconnect.enable = true;
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
# low level stuff # low level stuff
efibootmgr efibootmgr
@ -51,6 +46,7 @@
# move to homemanager? # move to homemanager?
unstable.mumble unstable.mumble
amberol amberol
mpv
nuclear nuclear
#zathura #zathura
sioyek sioyek
@ -64,22 +60,4 @@
timer timer
prusa-slicer prusa-slicer
]; ];
fonts.packages = with pkgs; [
noto-fonts
noto-fonts-cjk-sans
noto-fonts-emoji
liberation_ttf
dina-font
proggyfonts
font-awesome
jetbrains-mono
fira-code
fira-code-symbols
#droid-sans-mono
(nerdfonts.override {
fonts = ["FiraCode" "DroidSansMono" "JetBrainsMono"];
})
];
} }

View file

@ -0,0 +1,4 @@
{
# also opens the TCP and UDP port from 1714 to 1764
programs.kdeconnect.enable = true;
}

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./zsh.nix ./zsh.nix
./fish.nix ./fish.nix

View file

@ -1,4 +1,4 @@
{...}: { {
system.userActivationScripts.zshrc = "touch .zshrc"; system.userActivationScripts.zshrc = "touch .zshrc";
programs.zsh = { programs.zsh = {

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./ranomier.nix ./ranomier.nix
]; ];

View file

@ -1,4 +1,4 @@
{...}: { {
services.dbus = { services.dbus = {
implementation = "broker"; implementation = "broker";
apparmor = "enabled"; apparmor = "enabled";

View file

@ -1,4 +1,4 @@
{...}: { {
imports = [ imports = [
./hyprland.nix ./hyprland.nix
#./qtile.nix #./qtile.nix

View file

@ -15,7 +15,7 @@
# When applied, the unstable nixpkgs set (declared in the flake inputs) will # When applied, the unstable nixpkgs set (declared in the flake inputs) will
# be accessible through 'pkgs.unstable' # be accessible through 'pkgs.unstable'
unstable-packages = final: _prev: { unstable-packages = final: _prev: {
unstable = import inputs.nixpkgs-unstable { unstable = import inputs.nixos-unstable {
system = final.system; system = final.system;
config.allowUnfree = true; config.allowUnfree = true;
}; };

5
tests/default.nix Normal file
View file

@ -0,0 +1,5 @@
{
imports = [
./glitchtip-container.nix
];
}

View file

@ -0,0 +1,73 @@
{
nixos-unstable,
inputs,
...
}: {
networking.nat = {
enable = true;
internalInterfaces = ["ve-+"];
externalInterface = "ens3";
# Lazy IPv6 connectivity for the container
enableIPv6 = true;
};
containers.glitchtip = {
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.10";
localAddress = "192.168.100.11";
hostAddress6 = "fc00::1";
localAddress6 = "fc00::2";
path =
(nixos-unstable.lib.nixosSystem {
system = "x86_64-linux";
modules = [
{
boot.isContainer = true;
#services.glitchtip = {
# enable = true;
# listenAddress = "0.0.0.0";
# settings = {
# GLITCHTIP_DOMAIN = "http://localhost";
# };
#};
#services = {
# logrotate.enable = lib.mkForce false;
# httpd = {
# enable = true;
# adminAddr = "admin@example.org";
# };
#};
# imports = [
# #(modulesPath + "/profiles/perlless.nix")
# (modulesPath + "/profiles/minimal.nix")
# {
# environment.defaultPackages = [ ];
# boot.kernel.enable = false;
# boot.isContainer = true;
# nixpkgs.overlays = [ (self: super: { }) ];
# }
# ];
# disabledModules = [
# (modulesPath + "/profiles/all-hardware.nix")
# (modulesPath + "/profiles/base.nix")
# ];
networking = {
firewall.allowedTCPPorts = [80];
# Use systemd-resolved inside the container
# Workaround for bug https://github.com/NixOS/nixpkgs/issues/162686
useHostResolvConf = false;
};
services.resolved.enable = true;
system.stateVersion = "25.05";
}
];
})
.outPath;
};
}