Format with alejandra

This commit is contained in:
blahai 2024-12-20 15:11:42 +02:00
parent 4771948682
commit e08f66d286
Signed by: blahai
SSH key fingerprint: SHA256:ZfCryi+V64yG+vC1ZIIsqgvBCmA31tTi7RJ6M8CvpRc
31 changed files with 398 additions and 278 deletions

View file

@ -434,11 +434,11 @@
"nixvim": "nixvim"
},
"locked": {
"lastModified": 1734646427,
"narHash": "sha256-+OxSwGt6O6qzGvUTAlZgLivHnYPlrZF2JybyTfdsOP0=",
"lastModified": 1734699281,
"narHash": "sha256-pjlbWc1bgrlk5amtIOFoj5g1pHAMOWKWoYlIok8NAIs=",
"ref": "refs/heads/main",
"rev": "6809b030bcdad17e2007a03b8ca5ccf772c072ed",
"revCount": 467,
"rev": "81db83c82f89b5db7095b2288e5d8fc21fd254d5",
"revCount": 469,
"type": "git",
"url": "ssh://git@github.com/blahai/haivim"
},

View file

@ -32,7 +32,7 @@
# as that is where I *borrowed* the base from
haivim = {
url = "git+ssh://git@github.com/blahai/haivim";
inputs = { nixpkgs.follows = "nixpkgs"; };
inputs = {nixpkgs.follows = "nixpkgs";};
};
deploy-rs = {
@ -67,16 +67,22 @@
wezterm.url = "github:wez/wezterm?dir=nix";
catppuccin = { url = "github:catppuccin/nix"; };
catppuccin = {url = "github:catppuccin/nix";};
hyprland.url = "github:hyprwm/Hyprland";
zen-browser.url = "github:ch4og/zen-browser-flake";
};
outputs = { nixpkgs, nixpkgs-smol, chaotic, home-manager, disko, ... }@inputs:
let system = "x86_64-linux";
outputs = {
nixpkgs,
nixpkgs-smol,
chaotic,
home-manager,
disko,
...
} @ inputs: let
system = "x86_64-linux";
in {
nixosConfigurations = {
nyx = nixpkgs.lib.nixosSystem {
@ -103,17 +109,15 @@
# };
theia = nixpkgs.lib.nixosSystem {
modules =
[ ./hosts/theia/configuration.nix disko.nixosModules.disko ];
modules = [./hosts/theia/configuration.nix disko.nixosModules.disko];
};
epimetheus = nixpkgs.lib.nixosSystem {
specialArgs = {
inherit inputs;
pkgs-smol = import nixpkgs-smol { inherit system; };
pkgs-smol = import nixpkgs-smol {inherit system;};
};
modules =
[ ./hosts/epimetheus/configuration.nix disko.nixosModules.disko ];
modules = [./hosts/epimetheus/configuration.nix disko.nixosModules.disko];
};
};
};

View file

@ -1,15 +1,21 @@
{ pkgs, pkgs-smol, lib, modulesPath, config, ... }: {
imports = [ "${modulesPath}/installer/cd-dvd/installation-cd-minimal.nix" ];
{
pkgs,
pkgs-smol,
lib,
modulesPath,
config,
...
}: {
imports = ["${modulesPath}/installer/cd-dvd/installation-cd-minimal.nix"];
boot = {
supportedFilesystems = [ "zfs" ];
supportedFilesystems = ["zfs"];
zfs = {
forceImportRoot = false;
package = pkgs-smol.zfs;
};
kernelPackages = pkgs-smol.linuxPackages_6_12;
kernelParams = lib.mkAfter [ "noquiet" "toram" ];
kernelParams = lib.mkAfter ["noquiet" "toram"];
enableContainers = false;
};
@ -30,7 +36,6 @@
dnf5 # Fedora
debootstrap # Debin and ubuntu
apt # Ubuntu
];
documentation = {
@ -56,7 +61,7 @@
environment = {
stub-ld.enable = lib.mkForce false;
defaultPackages = [ ];
defaultPackages = [];
};
xdg = {
@ -68,10 +73,10 @@
nix = {
package = pkgs.lix;
nixPath = [ "nixpkgs=${config.nix.registry.nixpkgs.to.path}" ];
nixPath = ["nixpkgs=${config.nix.registry.nixpkgs.to.path}"];
channel.enable = false;
settings = {
experimental-features = [ "nix-command" "flakes" "auto-allocate-uids" ];
experimental-features = ["nix-command" "flakes" "auto-allocate-uids"];
max-jobs = "auto";
sandbox = true;
auto-optimise-store = true;
@ -92,10 +97,8 @@
"anyrun.cachix.org-1:pqBobmOjI7nKlsUMV25u9QHa9btJK65/C8vnO3p346s="
"wezterm.cachix.org-1:kAbhjYUC9qvblTE+s7S+kl5XM1zVa4skO+E/1IDWdH0="
];
};
};
hardware.enableRedistributableFirmware = true;
}

View file

@ -1,6 +1,4 @@
{ config, pkgs, pkgs-smol, inputs, system, lib, ... }:
{
{ config, pkgs, pkgs-smol, inputs, lib, ... }: {
imports = [
./hardware-configuration.nix
../../modules/nixos/default.nix
@ -84,7 +82,6 @@
};
gnome.gnome-keyring.enable = true;
};
hardware.pulseaudio.enable = false;
@ -131,7 +128,6 @@
TimeoutStopSec = 10;
};
};
};
programs = {
@ -248,7 +244,8 @@
lua-language-server
nil
nixd
nixfmt-classic
nix-output-monitor
alejandra
zip
nodejs
typescript
@ -274,7 +271,6 @@
imagemagick
wireguard-tools
mission-center
nix-output-monitor
speedcrunch
geogebra
];
@ -298,6 +294,11 @@
enableSSHSupport = true;
};
programs.localsend = {
enable = true;
openFirewall = true;
};
services.openssh = {
enable = true;
settings = {
@ -307,5 +308,4 @@
};
system.stateVersion = "24.05";
}

View file

@ -1,78 +1,95 @@
{ config, lib, pkgs, modulesPath, ... }:
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [(modulesPath + "/installer/scan/not-detected.nix")];
boot.initrd.availableKernelModules = [ "nvme" "ahci" "xhci_pci" "usbhid" "hid_generic" "uas" "sd_mod" ];
boot.initrd.kernelModules = [ "amdgpu" ];
boot.kernelModules = [ "kvm-amd" "amd-pstate" ];
boot.extraModulePackages = [ ];
boot.initrd.availableKernelModules = ["nvme" "ahci" "xhci_pci" "usbhid" "hid_generic" "uas" "sd_mod"];
boot.initrd.kernelModules = ["amdgpu"];
boot.kernelModules = ["kvm-amd" "amd-pstate"];
boot.extraModulePackages = [];
fileSystems."/" = {
device = "zpool/root";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
fileSystems."/nix" = {
device = "zpool/nix";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
fileSystems."/var" = {
device = "zpool/var";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
fileSystems."/home" = {
device = "zpool/home";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
fileSystems."/var/lib/virt/images" = {
device = "zpool/virt/images";
fsType = "zfs";
options = ["zfsutil"];
};
fileSystems."/var/lib/virt/disks" = {
device = "zpool/virt/disks";
fsType = "zfs";
options = ["zfsutil"];
};
fileSystems."/mnt/zootfs/Storage" = {
device = "zootfs/Storage";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
fileSystems."/mnt/zootfs/Media" = {
device = "zootfs/Media";
fsType = "zfs";
options = [ "zfsutil" ];
options = ["zfsutil"];
};
# https://github.com/atuinsh/atuin/issues/952#issuecomment-1902164562
fileSystems."/home/pingu/.local/share/atuin" = {
device = "/dev/zvol/zpool/nixos/atuin";
fsType = "ext4";
options = [ "async" "auto" "nofail" ];
options = ["async" "auto" "nofail"];
};
fileSystems."/boot" = {
device = "/dev/disk/by-label/BOOT";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
options = ["fmask=0022" "dmask=0022"];
};
fileSystems."/mnt/ssd" = {
device = "/dev/disk/by-uuid/e4c31e1c-6667-4582-8d6a-d142d6118ce2";
fsType = "btrfs";
options = [ "async" "auto" "noatime" "rw" ];
options = ["async" "auto" "noatime" "rw"];
};
fileSystems."/mnt/ext" = {
device = "/dev/disk/by-uuid/43280a82-cf9a-452e-9bdc-a8cc66ccd7c8";
fsType = "btrfs";
options = [ "async" "auto" "nofail" "noatime" ];
options = ["async" "auto" "nofail" "noatime"];
};
swapDevices = [{ device = "/dev/disk/by-uuid/04281bd7-784a-4287-b4f2-ce406d2ab6ac"; }];
swapDevices = [{device = "/dev/disk/by-uuid/04281bd7-784a-4287-b4f2-ce406d2ab6ac";}];
# networking.useDHCP = lib.mkDefault true;
hardware.enableRedistributableFirmware = true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = true;
}

View file

@ -1,4 +1,9 @@
{ inputs, config, pkgs, ... }: {
{
inputs,
config,
pkgs,
...
}: {
imports = [
../../modules/home-manager/default.nix
inputs.catppuccin.homeManagerModules.catppuccin
@ -23,10 +28,10 @@
autocrlf = "input";
};
url = {
"ssh://git@github.com/" = { insteadOf = "https://github.com/"; };
"ssh://git@github.com/" = {insteadOf = "https://github.com/";};
};
gpg = { format = "ssh"; };
init = { defaultBranch = "main"; };
gpg = {format = "ssh";};
init = {defaultBranch = "main";};
};
};
@ -45,12 +50,15 @@
gtk = {
enable = true;
};
catppuccin = {
gtk = {
enable = true;
flavor = "mocha";
accent = "pink";
size = "standard";
tweaks = [ "normal" ];
tweaks = ["normal"];
icon.enable = true;
};
};
@ -64,9 +72,12 @@
home.stateVersion = "24.11";
home.packages = with pkgs; [ obsidian ];
home.packages = with pkgs; [
obsidian
inputs.haivim.packages.${pkgs.system}.default
];
home.sessionVariables = { EDITOR = "nvim"; };
home.sessionVariables = {EDITOR = "nvim";};
# Let Home Manager install and manage itself.
programs.home-manager.enable = true;

View file

@ -1,7 +1,13 @@
{ config, modulesPath, lib, pkgs, ... }: {
{
config,
modulesPath,
lib,
pkgs,
...
}: {
system.stateVersion = "24.11";
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
imports = [(modulesPath + "/profiles/qemu-guest.nix")];
boot = {
initrd.availableKernelModules = [
@ -14,9 +20,9 @@
"sr_mod"
"virtio_blk"
];
initrd.kernelModules = [ ];
initrd.kernelModules = [];
kernelPackages = pkgs.linuxPackages_6_12;
kernelModules = [ "kvm-amd" ];
kernelModules = ["kvm-amd"];
kernel = {
sysctl = {
"vm.max_map_count" = 2147483642;
@ -28,7 +34,7 @@
"net.ipv6.conf.all.forwarding" = 1;
};
};
extraModulePackages = [ ];
extraModulePackages = [];
loader.grub = {
enable = true;
device = "/dev/vda";
@ -38,7 +44,7 @@
nix = {
package = pkgs.lix;
settings = {
experimental-features = [ "nix-command" "flakes" ];
experimental-features = ["nix-command" "flakes"];
auto-optimise-store = true;
sandbox = true;
};
@ -58,13 +64,15 @@
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/FED3-A372";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
options = ["fmask=0022" "dmask=0022"];
};
swapDevices = [{
swapDevices = [
{
device = "/var/lib/swapfile";
size = 16 * 1024;
}];
}
];
networking = {
enableIPv6 = false; # Had to disable for now due to problems with resolving
@ -82,7 +90,7 @@
];
};
hostName = "theia";
nameservers = [ "1.1.1.1" "8.8.8.8" "9.9.9.9" ];
nameservers = ["1.1.1.1" "8.8.8.8" "9.9.9.9"];
domain = "theia.blahai.gay";
useDHCP = lib.mkDefault false;
defaultGateway = {
@ -93,15 +101,19 @@
interfaces = {
ens3 = {
ipv4 = {
addresses = [{
addresses = [
{
address = "178.63.118.252";
prefixLength = 32;
}];
}
];
routes = [{
routes = [
{
address = "178.63.247.183";
prefixLength = 32;
}];
}
];
};
};
};
@ -117,7 +129,7 @@
networkd-dispatcher = {
enable = true;
rules."50-tailscale" = {
onState = [ "routable" ];
onState = ["routable"];
script = ''
${
lib.getExe pkgs.ethtool
@ -142,13 +154,12 @@
"n?vim"
];
prefer =
lib.concatStringsSep "|" [ "dotnet" "java.*" "nix" "npm" "node" ];
lib.concatStringsSep "|" ["dotnet" "java.*" "nix" "npm" "node"];
in [
"-g"
"--avoid '(^|/)(${avoid})'" # things that we want to avoid killing
"--prefer '(^|/)(${prefer})'" # things we want to remove fast
];
};
caddy = {
@ -184,7 +195,7 @@
uptime-kuma = {
enable = true;
settings = { PORT = "3001"; };
settings = {PORT = "3001";};
};
forgejo = {
@ -227,10 +238,9 @@
use_default_settings = true;
server = {
port = 8888;
secret_key =
"7360d3df7c08ce681cf6d5122e3e182de2c5205e962766abd3e6dfc8dec1b683";
secret_key = "7360d3df7c08ce681cf6d5122e3e182de2c5205e962766abd3e6dfc8dec1b683";
};
ui = { infinite_scroll = true; };
ui = {infinite_scroll = true;};
general = {
instance_name = "searchai";
@ -247,7 +257,7 @@
openssh = {
enable = true;
openFirewall = true;
settings = { PasswordAuthentication = false; };
settings = {PasswordAuthentication = false;};
};
fail2ban = {
@ -261,26 +271,24 @@
};
};
programs = { nix-ld.enable = true; };
programs = {nix-ld.enable = true;};
users.users.root = {
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILPbmiNqoyeKXk/VopFm2cFfEnV4cKCFBhbhyYB69Fuu"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILLqPq70t6RbnI8UejEshYcfBP66I4OrLFjvGLLfIEXD"
];
initialHashedPassword =
"$y$j9T$TzqbL4iMGLjli6EEXfRCZ0$AhFJ4iCFxRlstth5owic3M5nq74Sp1qhtctjSBcgAl8";
initialHashedPassword = "$y$j9T$TzqbL4iMGLjli6EEXfRCZ0$AhFJ4iCFxRlstth5owic3M5nq74Sp1qhtctjSBcgAl8";
};
users.users.pingu = {
isNormalUser = true;
extraGroups = [ "wheel" ];
extraGroups = ["wheel"];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILPbmiNqoyeKXk/VopFm2cFfEnV4cKCFBhbhyYB69Fuu"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILLqPq70t6RbnI8UejEshYcfBP66I4OrLFjvGLLfIEXD"
];
initialHashedPassword =
"$y$j9T$cxwKGmzYyC1eLeIysr8r/.$dsxxxV4NvXY.Wpd9LO.RiuMQuy2lYyy2HGrk52BJX08";
initialHashedPassword = "$y$j9T$cxwKGmzYyC1eLeIysr8r/.$dsxxxV4NvXY.Wpd9LO.RiuMQuy2lYyy2HGrk52BJX08";
};
users.users.minecraft = {
@ -295,10 +303,8 @@
openjdk21
openjdk17
screen
];
initialHashedPassword =
"$y$j9T$KpQYYLB6eWfHAUo9.o/uy1$gnj/UlWLrx5XBZDm2GNdjHs2G5D3XxxqqtrCIf5MX43";
initialHashedPassword = "$y$j9T$KpQYYLB6eWfHAUo9.o/uy1$gnj/UlWLrx5XBZDm2GNdjHs2G5D3XxxqqtrCIf5MX43";
};
environment.systemPackages = with pkgs; [

View file

@ -1,5 +1,4 @@
{ lib, ... }:
{
{lib, ...}: {
disko.devices = {
disk.disk1 = {
device = lib.mkDefault "/dev/vda";

View file

@ -1,6 +1,11 @@
{ inputs, pkgs, lib, ... }: {
{
inputs,
pkgs,
lib,
...
}: {
# add the home manager module
imports = [ inputs.ags.homeManagerModules.default ];
imports = [inputs.ags.homeManagerModules.default];
home.packages = with pkgs; [
bun

View file

@ -1,5 +1,9 @@
{ pkgs, lib, config, ... } :
{
pkgs,
lib,
config,
...
}: {
programs.alacritty = {
enable = true;

View file

@ -1,4 +1,9 @@
{ pkgs, lib, config, ... }: {
{
pkgs,
lib,
config,
...
}: {
home.file."Pictures/gay.png".source = ./gay.png;
programs.fastfetch = {
enable = true;
@ -9,7 +14,7 @@
width = 32;
};
display = { separator = " "; };
display = {separator = " ";};
modules = [
{

View file

@ -1,4 +1,9 @@
{ config, lib, pkgs, ... }: {
{
config,
lib,
pkgs,
...
}: {
home.packages = with pkgs; [
neofetch
];
@ -80,7 +85,6 @@
mkcd = ''
mkdir -p -- $argv[1] && cd $argv; or return $status
'';
};
};

View file

@ -1,4 +1,9 @@
{ pkgs, lib, config, ... }: {
{
pkgs,
lib,
config,
...
}: {
programs.foot = {
enable = true;
settings = {
@ -15,7 +20,7 @@
style = "beam";
beam-thickness = 1.5;
};
colors = { alpha = 0.9; };
colors = {alpha = 0.9;};
};
};
}

View file

@ -1,5 +1,9 @@
{ config, lib, pkgs, ... }:
{
config,
lib,
pkgs,
...
}: {
programs.starship = {
enable = true;
enableFishIntegration = true;

View file

@ -1,5 +1,10 @@
{ inputs, pkgs, lib, config, ... }:
{
inputs,
pkgs,
lib,
config,
...
}: {
home.packages = with pkgs; [
inputs.wezterm.packages.${pkgs.system}.default
];

View file

@ -1,4 +1,4 @@
{ ... }: {
{...}: {
imports = [
./cli/default.nix
./hypr/default.nix

View file

@ -1,5 +1,10 @@
{ pkgs, config, inputs, lib, ... }: {
{
pkgs,
config,
inputs,
lib,
...
}: {
imports = [
./hyprland/rules.nix
./hyprland/keybinds.nix
@ -22,7 +27,7 @@
xdg.portal = {
enable = true;
configPackages = [ config.wayland.windowManager.hyprland.package ];
configPackages = [config.wayland.windowManager.hyprland.package];
extraPortals = [
pkgs.xdg-desktop-portal-gtk
inputs.hyprland.packages.${pkgs.system}.xdg-desktop-portal-hyprland
@ -35,7 +40,6 @@
package = inputs.hyprland.packages."${pkgs.system}".hyprland;
settings = {
monitor = [
",prefered,auto,1"
];
@ -159,9 +163,6 @@
initial_workspace_tracking = false;
};
};
};
}

View file

@ -1,4 +1,9 @@
{ pkgs, config, inputs, ... }: {
{
pkgs,
config,
inputs,
...
}: {
wayland.windowManager.hyprland.settings = {
exec-once = [
"${pkgs.swww}/bin/swww-daemon --format xrgb"

View file

@ -1,22 +1,28 @@
{ pkgs, config, inputs, ... }: {
{
pkgs,
config,
inputs,
...
}: {
wayland.windowManager.hyprland.settings = {
bindle = [
",XF86AudioMute, exec, playerctl --player=spotify,%any play-pause"
",XF86AudioRaiseVolume, exec, wpctl set-volume @DEFAULT_AUDIO_SINK@ 5%+"
",XF86AudioLowerVolume, exec, wpctl set-volume @DEFAULT_AUDIO_SINK@ 5%-"
];
bindm = [ "Super, mouse:272, movewindow" "Super, mouse:273, resizewindow" ];
bindm = ["Super, mouse:272, movewindow" "Super, mouse:273, resizewindow"];
bindn = [ " , up, pass, JKPS" ];
bindn = [" , up, pass, JKPS"];
binde = [ # Window split ratio
binde = [
# Window split ratio
"Super, Semicolon, splitratio, -0.1"
"Super, Apostrophe, splitratio, 0.1"
];
bind = [
bind =
[
"Super, mouse_up, workspace, +1"
"Super, mouse_down, workspace, -1"
"Super, Page_up, workspace, -1"
@ -59,14 +65,20 @@
# Fullscreen
"Super+Shift, F, fullscreen, 0"
] ++ map (n:
"Alt, ${toString n}, movetoworkspacesilent, ${
toString (if n == 0 then 10 else n)
}") [ 1 2 3 4 5 6 7 8 9 0 ] ++ map (n:
"Super, ${toString n}, workspace, ${
toString (if n == 0 then 10 else n)
}") [ 1 2 3 4 5 6 7 8 9 0 ];
]
++ map (n: "Alt, ${toString n}, movetoworkspacesilent, ${
toString (
if n == 0
then 10
else n
)
}") [1 2 3 4 5 6 7 8 9 0]
++ map (n: "Super, ${toString n}, workspace, ${
toString (
if n == 0
then 10
else n
)
}") [1 2 3 4 5 6 7 8 9 0];
};
}

View file

@ -1,7 +1,11 @@
{ pkgs, config, inputs, lib, ... }:
{
pkgs,
config,
inputs,
lib,
...
}: {
wayland.windowManager.hyprland.settings = {
workspace = [
"special:special, on-created-empty:exec spotify"
];
@ -22,7 +26,6 @@
];
windowrulev2 = [
];
layerrule = [
@ -73,6 +76,5 @@
"blur, osk"
"ignorealpha 0.20, osk"
];
};
}

View file

@ -1,5 +1,4 @@
{ config, ... }: {
{config, ...}: {
programs.hyprlock = {
enable = true;
settings = {
@ -10,9 +9,10 @@
no_fade_out = true;
};
backgruond = { color = "rgba(000000FF)"; };
backgruond = {color = "rgba(000000FF)";};
input-field = [{
input-field = [
{
monitor = "";
size = "250, 50";
outline_thickness = 2;
@ -25,10 +25,12 @@
position = "0, 20";
halign = "center";
valign = "center";
}];
}
];
label = [
{ # Clock
{
# Clock
monitor = "";
text = "$TIME";
shadow_passes = 1;
@ -40,7 +42,8 @@
position = "0, 300";
}
{ # Greeting
{
# Greeting
monitor = "";
text = "Hi $USER !!!";
shadow_passes = 1;
@ -54,7 +57,8 @@
valign = "center";
}
{ # lock icon
{
# lock icon
monitor = "";
text = "lock";
shadow_passes = 1;
@ -68,7 +72,8 @@
valign = "center";
}
{ # "locked" text
{
# "locked" text
monitor = "";
text = "locked";
shadow_passes = 1;
@ -91,7 +96,6 @@
# font_family = "Rubik Light";
#}
];
};
};
}

View file

@ -1,21 +1,24 @@
{ pkgs, lib, config, inputs, ... }: {
{
pkgs,
lib,
config,
inputs,
...
}: {
imports = [
inputs.spicetify-nix.homeManagerModules.default
];
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
nixpkgs.config.allowUnfreePredicate = pkg:
builtins.elem (lib.getName pkg) [
"spotify"
];
programs.spicetify =
let
programs.spicetify = let
spicePkgs = inputs.spicetify-nix.legacyPackages.${pkgs.system};
in
{
in {
enable = true;
enabledExtensions = with spicePkgs.extensions; [
hidePodcasts
];
theme = spicePkgs.themes.comfy;

View file

@ -1,6 +1,5 @@
{ inputs, ... }:
{
imports = [ inputs.catppuccin.nixosModules.catppuccin ];
{inputs, ...}: {
imports = [inputs.catppuccin.nixosModules.catppuccin];
config.catppuccin = {
enable = true;

View file

@ -1,8 +1,12 @@
{ config, pkgs, inputs, ... }: {
{
config,
pkgs,
inputs,
...
}: {
nixpkgs = {
overlays = [ inputs.nur.overlays.default ];
config = { allowUnfree = true; };
overlays = [inputs.nur.overlays.default];
config = {allowUnfree = true;};
};
environment.systemPackages = with pkgs; [

View file

@ -1,7 +1,11 @@
{ pkgs, config, ... }: {
{
pkgs,
config,
...
}: {
hardware.bluetooth = {
enable = true;
settings = { General = { Experimental = true; }; };
settings = {General = {Experimental = true;};};
};
services.blueman.enable = true;
}

View file

@ -1,5 +1,4 @@
{ ... }:
{
{...}: {
imports = [
./pipewire.nix
./tailscale.nix

View file

@ -1,4 +1,4 @@
{ pkgs, ... }: {
{pkgs, ...}: {
services.jellyfin = {
enable = true;
openFirewall = true;

View file

@ -1,4 +1,9 @@
{ config, lib, pkgs, ... }: {
{
config,
lib,
pkgs,
...
}: {
services = {
pipewire = {
enable = true;
@ -17,10 +22,12 @@
};
};
pipewire-pulse."92-low-latency" = {
"context.properties" = [{
"context.properties" = [
{
name = "libpipewire-module-protocol-pulse";
args = { };
}];
args = {};
}
];
"pulse.properties" = {
"pulse.min.req" = "32/48000";
"pulse.default.req" = "32/48000";

View file

@ -1,4 +1,4 @@
{ pkgs, ... }: {
{pkgs, ...}: {
services.tailscale = {
enable = true;
useRoutingFeatures = "client";

View file

@ -1,5 +1,10 @@
{ pkgs, lib, config, ... }:
let enableIOMMU = true;
{
pkgs,
lib,
config,
...
}: let
enableIOMMU = true;
in {
boot = lib.mkIf enableIOMMU {
initrd.kernelModules = lib.mkBefore [
@ -35,13 +40,12 @@ in {
};
};
docker = { enable = true; };
docker = {enable = true;};
};
programs = { virt-manager = { enable = true; }; };
programs = {virt-manager = {enable = true;};};
users.users.pingu.extraGroups =
[ "qemu-libvirtd" "libvirtd" "disk" "kvm" "docker" ];
users.users.pingu.extraGroups = ["qemu-libvirtd" "libvirtd" "disk" "kvm" "docker"];
environment.systemPackages = with pkgs; [
python3 # scripts, cba to use nix shell all the time

View file

@ -1,5 +1,9 @@
{ inputs, config, ... }: {
imports = [ inputs.sops-nix.nixosModules.sops ];
{
inputs,
config,
...
}: {
imports = [inputs.sops-nix.nixosModules.sops];
sops = {
defaultSopsFile = ./secrets.yaml;