Compare commits

..

No commits in common. "67f2ce05b9fdf30f9b524fbbb5e4f9ad24c2018c" and "147249d7925f6de6666a18d7f93e992978a34f4d" have entirely different histories.

35 changed files with 207 additions and 420 deletions

7
.gitignore vendored
View file

@ -1,8 +1 @@
nixos-switch.log nixos-switch.log
# make it possible to just put stuff in the repo to test things
# or to have a reference, but they don't end up upstream
**/*/scratch/
scratch
**/*/*.scratch
*.scratch

View file

@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPel38K6eMnz1kS/od+4znlq0/wqUk1HifXVerv/DZUZ srv-videoconf

341
flake.lock generated
View file

@ -1,55 +1,5 @@
{ {
"nodes": { "nodes": {
"agenix": {
"inputs": {
"agenix": "agenix_2",
"crane": "crane",
"flake-utils": "flake-utils",
"nixpkgs": [
"nix-secrets",
"nixpkgs"
],
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1744897914,
"narHash": "sha256-GIVU92o2TZBnKQXTb76zpQbWR4zjU2rFqWKNIIpXnqA=",
"owner": "yaxitech",
"repo": "ragenix",
"rev": "40f2e17ecaeab4d78ec323e96a04548c0aaa5223",
"type": "github"
},
"original": {
"owner": "yaxitech",
"repo": "ragenix",
"type": "github"
}
},
"agenix_2": {
"inputs": {
"darwin": "darwin",
"home-manager": "home-manager_2",
"nixpkgs": [
"nix-secrets",
"agenix",
"nixpkgs"
],
"systems": "systems"
},
"locked": {
"lastModified": 1736955230,
"narHash": "sha256-uenf8fv2eG5bKM8C/UvFaiJMZ4IpUFaQxk9OH5t/1gA=",
"owner": "ryantm",
"repo": "agenix",
"rev": "e600439ec4c273cf11e06fe4d9d906fb98fa097c",
"type": "github"
},
"original": {
"owner": "ryantm",
"repo": "agenix",
"type": "github"
}
},
"base16": { "base16": {
"inputs": { "inputs": {
"fromYaml": "fromYaml" "fromYaml": "fromYaml"
@ -87,11 +37,11 @@
"base16-helix": { "base16-helix": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1748408240, "lastModified": 1736852337,
"narHash": "sha256-9M2b1rMyMzJK0eusea0x3lyh3mu5nMeEDSc4RZkGm+g=", "narHash": "sha256-esD42YdgLlEh7koBrSqcT7p2fsMctPAcGl/+2sYJa2o=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-helix", "repo": "base16-helix",
"rev": "6c711ab1a9db6f51e2f6887cc3345530b33e152e", "rev": "03860521c40b0b9c04818f2218d9cc9efc21e7a5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -117,53 +67,14 @@
"type": "github" "type": "github"
} }
}, },
"crane": {
"locked": {
"lastModified": 1741481578,
"narHash": "sha256-JBTSyJFQdO3V8cgcL08VaBUByEU6P5kXbTJN6R0PFQo=",
"owner": "ipetkov",
"repo": "crane",
"rev": "bb1c9567c43e4434f54e9481eb4b8e8e0d50f0b5",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"darwin": {
"inputs": {
"nixpkgs": [
"nix-secrets",
"agenix",
"agenix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1700795494,
"narHash": "sha256-gzGLZSiOhf155FW7262kdHo2YDeugp3VuIFb4/GGng0=",
"owner": "lnl7",
"repo": "nix-darwin",
"rev": "4b9b83d5a92e8c1fbfd8eb27eda375908c11ec4d",
"type": "github"
},
"original": {
"owner": "lnl7",
"ref": "master",
"repo": "nix-darwin",
"type": "github"
}
},
"firefox-gnome-theme": { "firefox-gnome-theme": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1748383148, "lastModified": 1744642301,
"narHash": "sha256-pGvD/RGuuPf/4oogsfeRaeMm6ipUIznI2QSILKjKzeA=", "narHash": "sha256-5A6LL7T0lttn1vrKsNOKUk9V0ittdW0VEqh6AtefxJ4=",
"owner": "rafaelmardojai", "owner": "rafaelmardojai",
"repo": "firefox-gnome-theme", "repo": "firefox-gnome-theme",
"rev": "4eb2714fbed2b80e234312611a947d6cb7d70caf", "rev": "59e3de00f01e5adb851d824cf7911bd90c31083a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -172,6 +83,21 @@
"type": "github" "type": "github"
} }
}, },
"flake-compat": {
"locked": {
"lastModified": 1733328505,
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": { "flake-parts": {
"inputs": { "inputs": {
"nixpkgs-lib": [ "nixpkgs-lib": [
@ -180,11 +106,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1749398372, "lastModified": 1733312601,
"narHash": "sha256-tYBdgS56eXYaWVW3fsnPQ/nFlgWi/Z2Ymhyu21zVM98=", "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "9305fe4e5c2a6fcf5ba6a3ff155720fbe4076569", "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -193,24 +119,6 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils": {
"inputs": {
"systems": "systems_2"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"fromYaml": { "fromYaml": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -227,6 +135,54 @@
"type": "github" "type": "github"
} }
}, },
"git-hooks": {
"inputs": {
"flake-compat": [
"stylix",
"flake-compat"
],
"gitignore": "gitignore",
"nixpkgs": [
"stylix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1742649964,
"narHash": "sha256-DwOTp7nvfi8mRfuL1escHDXabVXFGT1VlPD1JHrtrco=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "dcf5072734cb576d2b0c59b2ac44f5050b5eac82",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"stylix",
"git-hooks",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"gnome-shell": { "gnome-shell": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -251,11 +207,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1756679287, "lastModified": 1749154018,
"narHash": "sha256-Xd1vOeY9ccDf5VtVK12yM0FS6qqvfUop8UQlxEB+gTQ=", "narHash": "sha256-gjN3j7joRvT3a8Zgcylnd4NFsnXeDBumqiu4HmY1RIg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "07fc025fe10487dd80f2ec694f1cd790e752d0e8", "rev": "7aae0ee71a17b19708b93b3ed448a1a0952bf111",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -268,33 +224,32 @@
"home-manager_2": { "home-manager_2": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"nix-secrets", "stylix",
"agenix",
"agenix",
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1703113217, "lastModified": 1747556831,
"narHash": "sha256-7ulcXOk63TIT2lVDSExj7XzFx09LpdSAPtvgtM7yQPE=", "narHash": "sha256-Qb84nbYFFk0DzFeqVoHltS2RodAYY5/HZQKE8WnBDsc=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "3bfaacf46133c037bb356193bd2f1765d9dc82c1", "rev": "d0bbd221482c2713cccb80220f3c9d16a6e20a33",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-25.05",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
}, },
"nix-flatpak": { "nix-flatpak": {
"locked": { "locked": {
"lastModified": 1754777568, "lastModified": 1749394952,
"narHash": "sha256-0bBqT+3XncgF8F03RFAamw9vdf0VmaDoIJLTGkjfQZs=", "narHash": "sha256-WbWkzIvB0gqAdBLghdmUpGveY7MlAS2iMj3VEJnJ9yE=",
"owner": "gmodena", "owner": "gmodena",
"repo": "nix-flatpak", "repo": "nix-flatpak",
"rev": "62f636b87ef6050760a8cb325cadb90674d1e23e", "rev": "64c6e53a3999957c19ab95cda78bde466d8374cc",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -303,24 +258,6 @@
"type": "github" "type": "github"
} }
}, },
"nix-secrets": {
"inputs": {
"agenix": "agenix",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1756408834,
"narHash": "sha256-q7CzXgleZlV2f6T6gO4Qgj6s/QjODz2oMVZrB2LzTog=",
"path": "/home/ranomier/Projects/nix-secrets",
"type": "path"
},
"original": {
"path": "/home/ranomier/Projects/nix-secrets",
"type": "path"
}
},
"nixlib": { "nixlib": {
"locked": { "locked": {
"lastModified": 1736643958, "lastModified": 1736643958,
@ -344,11 +281,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1751903740, "lastModified": 1747663185,
"narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=", "narHash": "sha256-Obh50J+O9jhUM/FgXtI3he/QRNiV9+J53+l+RlKSaAk=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-generators", "repo": "nixos-generators",
"rev": "032decf9db65efed428afd2fa39d80f7089085eb", "rev": "ee07ba0d36c38e9915c55d2ac5a8fb0f05f2afcc",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -359,11 +296,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1757103352, "lastModified": 1749832440,
"narHash": "sha256-PtT7ix43ss8PONJ1VJw3f6t2yAoGH+q462Sn8lrmWmk=", "narHash": "sha256-lfxhuxAaHlYFGr8yOrAXZqdMt8PrFLzjVqH9v3lQaoY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "11b2a10c7be726321bb854403fdeec391e798bf0", "rev": "db030f62a449568345372bd62ed8c5be4824fa49",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -375,11 +312,11 @@
}, },
"nixos-unstable": { "nixos-unstable": {
"locked": { "locked": {
"lastModified": 1756787288, "lastModified": 1749794982,
"narHash": "sha256-rw/PHa1cqiePdBxhF66V7R+WAP8WekQ0mCDG4CFqT8Y=", "narHash": "sha256-Kh9K4taXbVuaLC0IL+9HcfvxsSUx8dPB5s5weJcc9pc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d0fc30899600b9b3466ddb260fd83deb486c32f1", "rev": "ee930f9755f58096ac6e8ca94a1887e0534e2d81",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -391,11 +328,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1757020766, "lastModified": 1749727998,
"narHash": "sha256-PLoSjHRa2bUbi1x9HoXgTx2AiuzNXs54c8omhadyvp0=", "narHash": "sha256-mHv/yeUbmL91/TvV95p+mBVahm9mdQMJoqaTVTALaFw=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "fe83bbdde2ccdc2cb9573aa846abe8363f79a97a", "rev": "fd487183437963a59ba763c0cc4f27e3447dd6dd",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -418,11 +355,11 @@
"treefmt-nix": "treefmt-nix" "treefmt-nix": "treefmt-nix"
}, },
"locked": { "locked": {
"lastModified": 1751320053, "lastModified": 1746056780,
"narHash": "sha256-3m6RMw0FbbaUUa01PNaMLoO7D99aBClmY5ed9V3vz+0=", "narHash": "sha256-/emueQGaoT4vu0QjU9LDOG5roxRSfdY0K2KkxuzazcM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "cbde1735782f9c2bb2c63d5e05fba171a14a4670", "rev": "d476cd0972dd6242d76374fcc277e6735715c167",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -435,7 +372,6 @@
"inputs": { "inputs": {
"home-manager": "home-manager", "home-manager": "home-manager",
"nix-flatpak": "nix-flatpak", "nix-flatpak": "nix-flatpak",
"nix-secrets": "nix-secrets",
"nixos-generators": "nixos-generators", "nixos-generators": "nixos-generators",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixos-unstable": "nixos-unstable", "nixos-unstable": "nixos-unstable",
@ -443,28 +379,6 @@
"stylix": "stylix" "stylix": "stylix"
} }
}, },
"rust-overlay": {
"inputs": {
"nixpkgs": [
"nix-secrets",
"agenix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1741400194,
"narHash": "sha256-tEpgT+q5KlGjHSm8MnINgTPErEl8YDzX3Eps8PVc09g=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "16b6045a232fea0e9e4c69e55a6e269607dd8e3f",
"type": "github"
},
"original": {
"owner": "oxalica",
"repo": "rust-overlay",
"type": "github"
}
},
"stylix": { "stylix": {
"inputs": { "inputs": {
"base16": "base16", "base16": "base16",
@ -472,13 +386,16 @@
"base16-helix": "base16-helix", "base16-helix": "base16-helix",
"base16-vim": "base16-vim", "base16-vim": "base16-vim",
"firefox-gnome-theme": "firefox-gnome-theme", "firefox-gnome-theme": "firefox-gnome-theme",
"flake-compat": "flake-compat",
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"git-hooks": "git-hooks",
"gnome-shell": "gnome-shell", "gnome-shell": "gnome-shell",
"home-manager": "home-manager_2",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ],
"nur": "nur", "nur": "nur",
"systems": "systems_3", "systems": "systems",
"tinted-foot": "tinted-foot", "tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty", "tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes", "tinted-schemes": "tinted-schemes",
@ -486,11 +403,11 @@
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1757101897, "lastModified": 1749908208,
"narHash": "sha256-gRfs83f1bF52O5GLNpGF4o15NOtgE5EW1oYJiW8JdOw=", "narHash": "sha256-0nf9P4kRAzsBvf5jbY7M3NlnGSwBzU50kJAYGZH5Ez4=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "fbe628a289404d527c1eb3cd39cebd417c705a13", "rev": "67c8eca32f1baf158ffb9a56f28a2fc8e9852fb0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -515,36 +432,6 @@
"type": "github" "type": "github"
} }
}, },
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_3": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": { "tinted-foot": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -581,11 +468,11 @@
"tinted-schemes": { "tinted-schemes": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1750770351, "lastModified": 1744974599,
"narHash": "sha256-LI+BnRoFNRa2ffbe3dcuIRYAUcGklBx0+EcFxlHj0SY=", "narHash": "sha256-Fg+rdGs5FAgfkYNCs74lnl8vkQmiZVdBsziyPhVqrlY=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "schemes", "repo": "schemes",
"rev": "5a775c6ffd6e6125947b393872cde95867d85a2a", "rev": "28c26a621123ad4ebd5bbfb34ab39421c0144bdd",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -597,11 +484,11 @@
"tinted-tmux": { "tinted-tmux": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1751159871, "lastModified": 1745111349,
"narHash": "sha256-UOHBN1fgHIEzvPmdNMHaDvdRMgLmEJh2hNmDrp3d3LE=", "narHash": "sha256-udV+nHdpqgkJI9D0mtvvAzbqubt9jdifS/KhTTbJ45w=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "tinted-tmux", "repo": "tinted-tmux",
"rev": "bded5e24407cec9d01bd47a317d15b9223a1546c", "rev": "e009f18a01182b63559fb28f1c786eb027c3dee9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -613,11 +500,11 @@
"tinted-zed": { "tinted-zed": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1751158968, "lastModified": 1725758778,
"narHash": "sha256-ksOyv7D3SRRtebpXxgpG4TK8gZSKFc4TIZpR+C98jX8=", "narHash": "sha256-8P1b6mJWyYcu36WRlSVbuj575QWIFZALZMTg5ID/sM4=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-zed", "repo": "base16-zed",
"rev": "86a470d94204f7652b906ab0d378e4231a5b3384", "rev": "122c9e5c0e6f27211361a04fae92df97940eccf9",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -27,11 +27,6 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
nix-secrets = {
url = "path:/home/ranomier/Projects/nix-secrets";
inputs.nixpkgs.follows = "nixpkgs";
};
# for managing flatpaks, like which ones are installed and which not # for managing flatpaks, like which ones are installed and which not
nix-flatpak.url = "github:gmodena/nix-flatpak"; nix-flatpak.url = "github:gmodena/nix-flatpak";
}; };

View file

@ -1,4 +1,4 @@
{inArgs, rootPath, config, ...}: { {rootPath, ...}: {
imports = [ imports = [
./boot.nix ./boot.nix
./hardware-configuration.nix ./hardware-configuration.nix
@ -6,11 +6,8 @@
(rootPath + /modules/game/server/luanti) (rootPath + /modules/game/server/luanti)
(rootPath + /modules/pkg_mgrmnt/unattended-updates.nix) (rootPath + /modules/pkg_mgrmnt/unattended-updates.nix)
inArgs.nix-secrets.nixos-modules.game-luanti
]; ];
environment.etc."bla".source = config.age.secrets.hello.path;
users = let users = let
username = "root"; username = "root";
in { in {

View file

@ -1,12 +0,0 @@
{
# Use the GRUB 2 boot loader.
boot.loader.grub = {
enable = true;
# efiSupport = true;
# efiInstallAsRemovable = true;
# Define on which hard drive you want to install Grub.
device = "/dev/vda"; # or "nodev" for efi only
};
# boot.loader.efi.efiSysMountPoint = "/boot/efi";
}

View file

@ -1,22 +1,7 @@
{rootPath, ...}: { {rootPath, ...}: {
imports = [ imports = [
./boot.nix
./hardware-configuration.nix ./hardware-configuration.nix
(rootPath + /system_profiles/server.nix) (rootPath + /system_profiles/server.nix)
]; ];
services.galene = {
enable = true;
insecure = true;
};
users = let
username = "root";
in {
users."${username}".openssh.authorizedKeys.keyFiles = [
(rootPath + /certificates/id_ed25519_srv-videoconf.pub)
];
};
} }

View file

@ -3,6 +3,7 @@
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ {
lib, lib,
modulesPath,
... ...
}: { }: {
boot = { boot = {
@ -12,6 +13,15 @@
extraModulePackages = []; extraModulePackages = [];
}; };
fileSystems."/" = {
device = "/dev/disk/by-uuid/d290e12c-d93c-45f6-b737-135b551c1951";
fsType = "ext4";
};
swapDevices = [
{device = "/dev/disk/by-uuid/8c56f52e-568a-4e03-b22c-6d1c7de7c118";}
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction # still possible to use this option, but it's recommended to use it in conjunction

View file

@ -2,7 +2,6 @@
imports = [ imports = [
./accessibility.nix ./accessibility.nix
./customisation.nix ./customisation.nix
./direnv.nix
# should only be imported directly or via system_profiles # should only be imported directly or via system_profiles
#./dhcp-all-interfaces.nix #./dhcp-all-interfaces.nix

View file

@ -1,13 +0,0 @@
{ pkgs, ... }: {
#set to default values
programs.direnv = {
package = pkgs.direnv;
silent = false;
loadInNixShell = true;
direnvrcExtra = "";
nix-direnv = {
enable = true;
package = pkgs.nix-direnv;
};
};
}

View file

@ -2,8 +2,7 @@
imports = [ imports = [
./bluetooth.nix ./bluetooth.nix
./fwupd.nix ./fwupd.nix
./gpu-backend.nix ./gpu.nix
./gpu-frontend.nix
./print.nix ./print.nix
./scan.nix ./scan.nix
#./trackpoint.nix #./trackpoint.nix

View file

@ -1,8 +0,0 @@
{pkgs, ...}: {
environment.systemPackages = [ pkgs.lact ];
systemd = {
packages = [ pkgs.lact ];
services.lactd.wantedBy = ["multi-user.target"];
};
}

View file

@ -1,12 +1,10 @@
{ {
imports = [ imports = [
./login
./apparmor.nix ./apparmor.nix
./firejail.nix ./firejail.nix
./login-manager.nix
./ssh-client.nix ./ssh-client.nix
#./ssh-server.nix #./ssh-server.nix
./sudo-rs.nix ./sudo-rs.nix
./uwsm.nix
]; ];
} }

View file

@ -1,6 +0,0 @@
{
imports = [
./login-manager.nix
./uwsm.nix
];
}

View file

@ -1,3 +0,0 @@
{
programs.uwsm.enable = true;
}

View file

@ -1,3 +0,0 @@
{
programs.uwsm.enable = true;
}

View file

@ -1,7 +1,5 @@
{pkgs, ...}: { {
# for running android apps # for running android apps
# also starts the systemd service waydroid-container # also starts the systemd service waydroid-container
virtualisation.waydroid.enable = true; virtualisation.waydroid.enable = true;
environment.systemPackages = [ pkgs.unstable.waydroid-helper ];
} }

View file

@ -12,15 +12,9 @@
"type" = "ladspa"; "type" = "ladspa";
"name" = "rnnoise"; "name" = "rnnoise";
"plugin" = "${pkgs.rnnoise-plugin}/lib/ladspa/librnnoise_ladspa.so"; "plugin" = "${pkgs.rnnoise-plugin}/lib/ladspa/librnnoise_ladspa.so";
# mono can be replaced with stereo for double the performance as cost "label" = "noise_suppressor_stereo";
"label" = "noise_suppressor_mono";
"control" = { "control" = {
# if probability of sound being a voice is lower than this threshold - it will be silenced. In most cases the threshold between 85% - 95% would be fine. Without the VAD some loud noises may still be a bit audible when there is no voice.
"VAD Threshold (%)" = 75.0; "VAD Threshold (%)" = 75.0;
# for how long after the last voice detection the output won't be silenced. This helps when ends of words/sentences are being cut off.
"VAD Grace Period (ms)" = 200;
# similar to VAD Grace Period (ms) but for starts of words/sentences. This introduces latency!
"Retroactive VAD Grace Period (ms)" = 0;
}; };
} }
]; ];
@ -32,12 +26,10 @@
"capture.props" = { "capture.props" = {
"node.name" = "effect_input.rnnoise"; "node.name" = "effect_input.rnnoise";
"node.passive" = true; "node.passive" = true;
"audio.rate" = 48000;
}; };
"playback.props" = { "playback.props" = {
"node.name" = "effect_output.rnnoise"; "node.name" = "effect_output.rnnoise";
"media.class" = "Audio/Source"; "media.class" = "Audio/Source";
"audio.rate" = 48000;
}; };
}; };
} }

View file

@ -2,7 +2,6 @@
imports = [ imports = [
#./doc.nix #./doc.nix
./index.nix ./index.nix
./nh.nix
./nix-ld.nix ./nix-ld.nix
]; ];
} }

View file

@ -1,8 +0,0 @@
{
programs.nh = {
enable = true;
#clean.enable = true;
#clean.extraArgs = "--keep-since 4d --keep 3";
#flake = "/home/user/my-nixos-config";
};
}

View file

@ -3,7 +3,6 @@
# low level stuff # low level stuff
efibootmgr efibootmgr
#exfat #exfat
sshfs
exfatprogs exfatprogs
greetd.greetd greetd.greetd
greetd.tuigreet greetd.tuigreet
@ -16,15 +15,16 @@
lm_sensors lm_sensors
unstable.neovim unstable.neovim
gitui gitui
lazygit lazygit
meld
gnumake gnumake
gcc gcc
nodePackages.npm nodePackages.npm
nodejs-slim nodejs-slim
python3 python3
fd
nodejs-slim nodejs-slim
cargo cargo
rustc rustc
@ -34,8 +34,8 @@
unstable.yt-dlp unstable.yt-dlp
miniserve miniserve
fzf fzf
fd
qemu qemu
home-manager
dfc dfc
sops sops

View file

@ -1,4 +1,9 @@
{inArgs, pkgs, ...}: { {inArgs, pkgs, ...}: {
imports = [
inArgs.home-manager.nixosModules.home-manager
];
home-manager.useUserPackages = true;
home-manager.useGlobalPkgs = true;
home-manager.users."ranomier" = { home-manager.users."ranomier" = {
stylix.iconTheme = { stylix.iconTheme = {

View file

@ -2,6 +2,12 @@
#imports = [ #imports = [
# ./components/rofi.nix # ./components/rofi.nix
#]; #];
# Enable the X11 windowing system.
# You can disable this if you're only using the Wayland session.
services.xserver.enable = false;
# force chromium and electron apps to use wayland
environment.sessionVariables.NIXOS_OZONE_WL = "1";
xdg = { xdg = {
portal = { portal = {
@ -14,37 +20,38 @@
]; ];
}; };
}; };
# Enable the hyprland window manager with additions # Enable the hyprland window manager with additions
programs = { programs = {
hyprland = { hyprland = {
enable = true; enable = true;
#package = pkgs.unstable.hyprland;
systemd.setPath.enable = true;
withUWSM = true;
xwayland.enable = true; xwayland.enable = true;
systemd.setPath.enable = true;
#package = pkgs.unstable.hyprland;
}; };
hyprlock = { hyprlock = {
enable = true; enable = true;
#package = pkgs.unstable.hyprlock; #package = pkgs.unstable.hyprlock;
}; };
}; };
services.hypridle = {
services = {
hypridle = {
enable = true; enable = true;
#package = pkgs.unstable.hypridle; #package = pkgs.unstable.hypridle;
}; };
# for mounting stuff, also needs a auth agent like lxqt.lxqt-policykit # for mounting stuff, also needs a auth agent like lxqt.lxqt-policykit
gvfs.enable = true; services.gvfs.enable = true;
};
environment = { #qt = {
pathsToLink = ["/share/foot"]; # enable = true;
# platformTheme = "qt5ct";
# style = "kvantum";
#};
systemPackages = with pkgs; [ environment.pathsToLink = ["/share/foot"];
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
hyprsunset hyprsunset
hyprpolkitagent hyprpolkitagent
hyprutils hyprutils
@ -85,5 +92,4 @@
# file manager # file manager
nautilus nautilus
]; ];
};
} }

View file

@ -1,3 +0,0 @@
{
programs.niri = true;
}

View file

@ -1,5 +1,7 @@
{ {
config,
pkgs, pkgs,
lib,
... ...
}: { }: {
nixpkgs.overlays = [ nixpkgs.overlays = [

View file

@ -15,7 +15,7 @@ in {
nixosConfigurations = builtins.mapAttrs (hostName: hostOptions: (hostHelper hostName hostOptions)) { nixosConfigurations = builtins.mapAttrs (hostName: hostOptions: (hostHelper hostName hostOptions)) {
crocoite = {stateVersion = "24.05";}; crocoite = {stateVersion = "24.05";};
#srv-videoconf = {stateVersion = "25.05";}; #srv-videoconf = {stateVersion = "24.11";};
game-luanti = {stateVersion = "25.05";}; game-luanti = {stateVersion = "25.05";};

View file

@ -1,10 +0,0 @@
{inArgs, pkgs, lib, ...}: {
imports = [ inArgs.home-manager.nixosModules.home-manager ];
environment.systemPackages = [ pkgs.home-manager ];
home-manager = {
useUserPackages = lib.mkDefault true;
useGlobalPkgs = lib.mkDefault true;
};
}

View file

@ -1,6 +1,6 @@
# This loads some nix and nixpkgs specific settints # This loads some nix and nixpkgs specific settints
# i often need # i often need
{lib, ...}: { {lib, pkgs, ...}: {
# Disable if you don't want unfree packages # Disable if you don't want unfree packages
nixpkgs.config.allowUnfree = lib.mkDefault true; nixpkgs.config.allowUnfree = lib.mkDefault true;
@ -9,7 +9,7 @@
# Lix is a modern, delicious implementation of the Nix package manager, # Lix is a modern, delicious implementation of the Nix package manager,
# focused on correctness, usability, and growth # focused on correctness, usability, and growth
# and committed to doing right by its community. # and committed to doing right by its community.
#package = lib.mkDefault pkgs.lix; package = lib.mkDefault pkgs.lix;
channel.enable = lib.mkDefault false; channel.enable = lib.mkDefault false;

View file

@ -1,5 +1,5 @@
{lib, ...}: { {
system = { system = {
rebuild.enableNg = lib.mkDefault false; rebuild.enableNg = false;
}; };
} }

View file

@ -1,9 +0,0 @@
{lib, ...}: {
# Enable the X11 windowing system.
# You can disable this if you're only using the Wayland session.
services.xserver.enable = lib.mkDefault false;
# force chromium and electron apps to use wayland
environment.sessionVariables.NIXOS_OZONE_WL = lib.mkDefault "1";
}

View file

@ -1,6 +1,6 @@
{modulesPath, lib, ...}: { {modulesPath, ...}; {
imports = [ imports = [
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
]; ];
services.qemuGuest.enable = lib.mkDefault true; services.qemuGuest.enable = true;
} }

View file

@ -1,6 +1,6 @@
{lib, ...}: { {
boot.kernelParams = [ "console=ttyS0,115200n8" ]; boot.kernelParams = [ "console=ttyS0,115200n8" ];
boot.loader.grub.extraConfig = lib.mkDefault " boot.loader.grub.extraConfig = "
serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1 serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1
terminal_input serial terminal_input serial
terminal_output serial terminal_output serial

View file

@ -1,8 +1,6 @@
{ {
imports = [ imports = [
./components/home-manager.nix
./components/nix-defaults.nix ./components/nix-defaults.nix
./components/no-x.nix
#./components/nixpkgs-ng.nix #./components/nixpkgs-ng.nix
./importers/desktop.nix ./importers/desktop.nix