new stuff

This commit is contained in:
Henry Hiles 2024-03-26 13:11:25 -04:00
parent 771f4b6317
commit ecf789b145
10 changed files with 80 additions and 76 deletions

66
flake.lock generated
View file

@ -5,11 +5,11 @@
"fromYaml": "fromYaml" "fromYaml": "fromYaml"
}, },
"locked": { "locked": {
"lastModified": 1689633990, "lastModified": 1708890466,
"narHash": "sha256-iwvQg2Vx0IIDWZaKo8Xmzxlv1YPHg+Kp/QSv8dRv0RY=", "narHash": "sha256-LlrC09LoPi8OPYOGPXegD72v+//VapgAqhbOFS3i8sc=",
"owner": "SenchoPens", "owner": "SenchoPens",
"repo": "base16.nix", "repo": "base16.nix",
"rev": "dddf2e1c04845d43c89a8e9e37d574519649a404", "rev": "665b3c6748534eb766c777298721cece9453fdae",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -150,11 +150,11 @@
"firefox-gnome-theme": { "firefox-gnome-theme": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1707094435, "lastModified": 1711290399,
"narHash": "sha256-QZk/qZQVt1X53peCqB2qmWhpA3xtAVgY95pebSKaTFU=", "narHash": "sha256-e1xuHAHgeC8EU7cAIa3XfvzgI4Y7rzyTkAt9sBsgrfc=",
"owner": "rafaelmardojai", "owner": "rafaelmardojai",
"repo": "firefox-gnome-theme", "repo": "firefox-gnome-theme",
"rev": "d7db6e546d13de55fd70dc3204bd99195eb004c4", "rev": "33015314c12190230295cff61ced148e0f7ffe1c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -184,11 +184,11 @@
"nixpkgs-lib": "nixpkgs-lib" "nixpkgs-lib": "nixpkgs-lib"
}, },
"locked": { "locked": {
"lastModified": 1706830856, "lastModified": 1709336216,
"narHash": "sha256-a0NYyp+h9hlb7ddVz4LUn1vT/PLwqfrWYcHMvFB1xYg=", "narHash": "sha256-Dt/wOWeW6Sqm11Yh+2+t0dfEWxoMxGBvv3JpIocFl9E=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "b253292d9c0a5ead9bc98c4e9a26c6312e27d69f", "rev": "f7b3c975cf067e56e7cda6cb098ebe3fb4d74ca2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -235,11 +235,11 @@
"nixpkgs": "nixpkgs" "nixpkgs": "nixpkgs"
}, },
"locked": { "locked": {
"lastModified": 1707175763, "lastModified": 1711133180,
"narHash": "sha256-0MKHC6tQ4KEuM5rui6DjKZ/VNiSANB4E+DJ/+wPS1PU=", "narHash": "sha256-WJOahf+6115+GMl3wUfURu8fszuNeJLv9qAWFQl3Vmo=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "f99eace7c167b8a6a0871849493b1c613d0f1b80", "rev": "1c2c5e4cabba4c43504ef0f8cc3f3dfa284e2dbb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -274,11 +274,11 @@
"nixpkgs": "nixpkgs_2" "nixpkgs": "nixpkgs_2"
}, },
"locked": { "locked": {
"lastModified": 1707095568, "lastModified": 1711242788,
"narHash": "sha256-6zZifK7cs9eWiC+3MQvlMsq2JeyH7hPSP0qZ6sTny68=", "narHash": "sha256-6m6hw6uoIIvoAMR5RLhw7kGfNu3Govof9vnPAzveUgI=",
"owner": "fufexan", "owner": "fufexan",
"repo": "nix-gaming", "repo": "nix-gaming",
"rev": "9bde4efca9e4750ed691520d68c4c6eb308015e7", "rev": "04028200841ec3b4ce163de4d136296d03123001",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -289,11 +289,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1706732774, "lastModified": 1710806803,
"narHash": "sha256-hqJlyJk4MRpcItGYMF+3uHe8HvxNETWvlGtLuVpqLU0=", "narHash": "sha256-qrxvLS888pNJFwJdK+hf1wpRCSQcqA6W5+Ox202NDa0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "b8b232ae7b8b144397fdb12d20f592e5e7c1a64d", "rev": "b06025f1533a1e07b6db3e75151caa155d1c7eb3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -306,11 +306,11 @@
"nixpkgs-lib": { "nixpkgs-lib": {
"locked": { "locked": {
"dir": "lib", "dir": "lib",
"lastModified": 1706550542, "lastModified": 1709237383,
"narHash": "sha256-UcsnCG6wx++23yeER4Hg18CXWbgNpqNXcHIo5/1Y+hc=", "narHash": "sha256-cy6ArO4k5qTx+l5o+0mL9f5fa86tYUX3ozE1S+Txlds=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "97b17f32362e475016f942bbdfda4a4a72a8a652", "rev": "1536926ef5621b09bba54035ae2bb6d806d72ac8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -323,11 +323,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1706925685, "lastModified": 1711200738,
"narHash": "sha256-hVInjWMmgH4yZgA4ZtbgJM1qEAel72SYhP5nOWX4UIM=", "narHash": "sha256-dkJmk/ET/tRV4007O6kU101UEg1svUwiyk/zEEX9Tdg=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "79a13f1437e149dc7be2d1290c74d378dad60814", "rev": "20bc93ca7b2158ebc99b8cef987a2173a81cde35",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -339,11 +339,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1707092692, "lastModified": 1711163522,
"narHash": "sha256-ZbHsm+mGk/izkWtT4xwwqz38fdlwu7nUUKXTOmm4SyE=", "narHash": "sha256-YN/Ciidm+A0fmJPWlHBGvVkcarYWSC+s3NTPk/P+q3c=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "faf912b086576fd1a15fca610166c98d47bc667e", "rev": "44d0940ea560dee511026a53f0e2e2cde489b4d4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -377,11 +377,11 @@
"utils": "utils" "utils": "utils"
}, },
"locked": { "locked": {
"lastModified": 1707322565, "lastModified": 1711459416,
"narHash": "sha256-yIf/7Os4ry3iCri9IRiOYipFwBuXw/Ipky59AeMkRvM=", "narHash": "sha256-JdfYz5xOg2RPBo4S8+ykdNBnAguoI+XhZ6g3QAXuw9k=",
"owner": "wamserma", "owner": "wamserma",
"repo": "flake-programs-sqlite", "repo": "flake-programs-sqlite",
"rev": "70ccc21c9c5cec12573ac29264e34104e6db1ba6", "rev": "bba0e2e52c058c7dba0656f4a31e9db68eb62197",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -418,11 +418,11 @@
"nixpkgs": "nixpkgs_4" "nixpkgs": "nixpkgs_4"
}, },
"locked": { "locked": {
"lastModified": 1707311311, "lastModified": 1711224130,
"narHash": "sha256-Se80sgOhpKxlG/6mlpezHSJjGBDzO3X0SQTn9eL2j7o=", "narHash": "sha256-RyOvyQASi5lvKLH5ISiGGkdX1eJxYF25aQALGfN9U0k=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "9942fca8707efbd8c3f6108549f098462425d1b3", "rev": "53d3e5d5b36a5227b906e00d7e884dcfb7852403",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -28,12 +28,16 @@
opt = nixpkgs.lib.optionals; opt = nixpkgs.lib.optionals;
dirFiles = dir: map (file: "${dir}/${file}") (builtins.attrNames (builtins.readDir dir)); dirFiles = dir: map (file: "${dir}/${file}") (builtins.attrNames (builtins.readDir dir));
}; };
nixpkgs-teams = import inputs.nixpkgs-teams {
system = "x86_64-linux";
config.allowUnfree = true;
};
system = hostname: isDesktop: system = hostname: isDesktop:
with dirUtils; with dirUtils;
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
specialArgs = { specialArgs = {
inherit inputs self isDesktop dirUtils; inherit inputs self isDesktop dirUtils nixpkgs-teams;
}; };
modules = modules =

View file

@ -33,7 +33,7 @@
command = "-workbench.action.files.save"; command = "-workbench.action.files.save";
} }
]; ];
userSettings = lib.mkForce { userSettings = lib.mkForce {
"editor.guides.bracketPairs" = "active"; "editor.guides.bracketPairs" = "active";
"window.dialogStyle" = "custom"; "window.dialogStyle" = "custom";

View file

@ -1 +1 @@
{environment.localBinInPath = true;} {environment.localBinInPath = true;}

View file

@ -1,3 +1,3 @@
{ {
services.flatpak.enable = true; services.flatpak.enable = true;
} }

View file

@ -1,9 +1,9 @@
{pkgs, ...}: { {pkgs, ...}: {
environment.systemPackages = with pkgs.gnomeExtensions; [ environment.systemPackages = with pkgs.gnomeExtensions; [
open-bar
caffeine caffeine
pop-shell pop-shell
appindicator appindicator
search-light
blur-my-shell blur-my-shell
just-perfection just-perfection
burn-my-windows burn-my-windows

View file

@ -1,20 +1,20 @@
{pkgs, ...}: { {pkgs, ...}: {
environment.systemPackages = [ environment.systemPackages = [
(pkgs.writeTextDir "share/polkit-1/actions/com.henryhiles.quados.policy" '' (pkgs.writeTextDir "share/polkit-1/actions/com.henryhiles.quados.policy" ''
<!DOCTYPE policyconfig PUBLIC '-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN' 'http://www.freedesktop.org/standards/PolicyKit/1/policyconfig.dtd'> <!DOCTYPE policyconfig PUBLIC '-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN' 'http://www.freedesktop.org/standards/PolicyKit/1/policyconfig.dtd'>
<policyconfig> <policyconfig>
<action id='com.henryhiles.quados.rebuild'> <action id='com.henryhiles.quados.rebuild'>
<description>Rebuild</description> <description>Rebuild</description>
<message>Authentication is required to rebuild the system</message> <message>Authentication is required to rebuild the system</message>
<defaults> <defaults>
<allow_any>auth_admin_keep</allow_any> <allow_any>auth_admin_keep</allow_any>
<allow_inactive>auth_admin_keep</allow_inactive> <allow_inactive>auth_admin_keep</allow_inactive>
<allow_active>auth_admin_keep</allow_active> <allow_active>auth_admin_keep</allow_active>
</defaults> </defaults>
<annotate key='org.freedesktop.policykit.exec.path'>/run/current-system/sw/bin/flatpak</annotate> <annotate key='org.freedesktop.policykit.exec.path'>/run/current-system/sw/bin/flatpak</annotate>
</action> </action>
</policyconfig> </policyconfig>
'') '')
]; ];
} }

View file

@ -5,8 +5,6 @@
}: { }: {
programs.steam = { programs.steam = {
enable = true; enable = true;
package = pkgs.steam.override { extraCompatPackages = [pkgs.proton-ge-bin];
extraProfile = "export STEAM_EXTRA_COMPAT_TOOLS_PATHS='${inputs.nix-gaming.packages.${pkgs.system}.proton-ge}'";
};
}; };
} }

View file

@ -1,29 +1,33 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{ {
imports = config,
[ (modulesPath + "/installer/scan/not-detected.nix") lib,
]; pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ]; boot.initrd.availableKernelModules = ["nvme" "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod"];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [];
boot.kernelModules = [ "kvm-amd" ]; boot.kernelModules = ["kvm-amd"];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [];
fileSystems."/" = fileSystems."/" = {
{ device = "/dev/disk/by-uuid/7d01741d-d58f-49d4-b3a2-4d37d953873d"; device = "/dev/disk/by-uuid/7d01741d-d58f-49d4-b3a2-4d37d953873d";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" = {
{ device = "/dev/disk/by-uuid/E841-063C"; device = "/dev/disk/by-uuid/E841-063C";
fsType = "vfat"; fsType = "vfat";
}; };
swapDevices = [ ]; swapDevices = [];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -3,12 +3,10 @@
polarity = "dark"; polarity = "dark";
image = ./background.jpg; image = ./background.jpg;
base16Scheme = "${pkgs.base16-schemes}/share/themes/nord.yaml"; base16Scheme = "${pkgs.base16-schemes}/share/themes/nord.yaml";
targets.plymouth.blackBackground = false;
cursor = { cursor = {
name = "GoogleDot-Blue"; name = "GoogleDot-Blue";
package = pkgs.google-cursor; package = pkgs.google-cursor;
size = 24;
}; };
fonts = { fonts = {