Compare commits

...

15 Commits

Author SHA1 Message Date
823040c27a auto up 04:40:43 up 1 day 16:08, 2 users, load average: 1.69, 1.81, 1.46 2025-12-24 04:59:48 +01:00
18a56d33d8 Bump to new version 2025-12-24 04:59:48 +01:00
5350b68825 auto up 01:47:18 up 0:00, 2 users, load average: 1.77, 0.41, 0.13
auto up  01:53:18  up   0:06,  2 users,  load average: 0.90, 0.66, 0.33

auto up  01:59:32  up   0:01,  2 users,  load average: 0.71, 0.35, 0.13

auto up  14:23:31  up   3:05,  2 users,  load average: 0.68, 0.71, 0.72

auto up  11:42:06  up   1:56,  2 users,  load average: 0.03, 0.13, 0.17

auto up  22:33:03  up   0:49,  2 users,  load average: 0.27, 0.65, 0.85

auto up  21:17:45  up   0:54,  2 users,  load average: 2.57, 2.26, 1.66

auto up  22:35:16  up   2:12,  2 users,  load average: 1.32, 1.67, 1.83
2025-12-24 04:59:48 +01:00
1351937f2c Full kmonad 2025-12-24 04:59:48 +01:00
0277f01cd6 Remove all 2025-12-24 04:59:48 +01:00
6315fec2e9 Have kmonad as a seperate service not managed by nixos 2025-12-24 04:59:48 +01:00
17841a26a5 First test 2025-12-24 04:59:48 +01:00
877b8fbb35 auto up 00:24:13 up 0:32, 2 users, load average: 0.84, 0.77, 0.74
auto up  01:08:17  up   6:30,  2 users,  load average: 0.62, 0.57, 0.51

auto up  01:59:20  up   7:21,  2 users,  load average: 0.17, 0.29, 0.37

auto up  02:38:43  up   0:05,  3 users,  load average: 0.52, 0.53, 0.25

auto up  10:53:19  up   0:00,  2 users,  load average: 1.01, 0.25, 0.08

auto up  11:12:59  up   0:20,  2 users,  load average: 0.61, 0.62, 0.36

auto up  16:24:24  up   1:02,  2 users,  load average: 0.54, 0.27, 0.10

auto up  23:01:45  up   8:51,  2 users,  load average: 0.57, 0.67, 0.74

auto up  15:03:56  up   0:02,  2 users,  load average: 0.32, 0.20, 0.09

auto up  11:49:23  up   0:19,  2 users,  load average: 0.09, 0.27, 0.37
2025-12-24 04:59:48 +01:00
c574bf8e0f auto up 2025-11-01 23:13:42 +01:00
4e000023c7 Add grayscale 2025-11-01 21:44:23 +01:00
a8fdabe1d8 Better filemanager 2025-10-30 09:24:23 +01:00
0d1d0018ff Nextcloud 2025-10-17 12:08:07 +02:00
f7533d4ffa Some improves 2025-10-17 09:31:17 +02:00
2ea3065c4f Updates 2025-10-15 23:04:43 +02:00
f8557c66ea Minimal with flake update 2025-10-14 11:09:14 +02:00
20 changed files with 358 additions and 1029 deletions

699
flake.lock generated
View File

@@ -1,132 +1,5 @@
{ {
"nodes": { "nodes": {
"aquamarine": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751740947,
"narHash": "sha256-35040CHH7P3JGmhGVfEb2oJHL/A5mI2IXumhkxrBnao=",
"owner": "hyprwm",
"repo": "aquamarine",
"rev": "dfc1db15a08c4cd234288f66e1199c653495301f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "aquamarine",
"type": "github"
}
},
"crane": {
"locked": {
"lastModified": 1751562746,
"narHash": "sha256-smpugNIkmDeicNz301Ll1bD7nFOty97T79m4GUMUczA=",
"owner": "ipetkov",
"repo": "crane",
"rev": "aed2020fd3dc26e1e857d4107a5a67a33ab6c1fd",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"devshell": {
"inputs": {
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1741473158,
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
"owner": "numtide",
"repo": "devshell",
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "devshell",
"type": "github"
}
},
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1751413152,
"narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"pre-commit-hooks",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"home-manager": { "home-manager": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@@ -134,356 +7,42 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1756245065, "lastModified": 1765979862,
"narHash": "sha256-aAZNbGcWrVRZgWgkQbkabSGcDVRDMgON4BipMy69gvI=", "narHash": "sha256-/r9/1KamvbHJx6I40H4HsSXnEcBAkj46ZwibhBx9kg0=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "54b2879ce622d44415e727905925e21b8f833a98", "rev": "d3135ab747fd9dac250ffb90b4a7e80634eacbe9",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-25.05", "ref": "release-25.11",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
}, },
"home-manager_2": {
"inputs": {
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1751990210,
"narHash": "sha256-krWErNDl9ggMLSfK00Q2BcoSk3+IRTSON/DiDgUzzMw=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "218da00bfa73f2a61682417efe74549416c16ba6",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"hyprcursor": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749155331,
"narHash": "sha256-XR9fsI0zwLiFWfqi/pdS/VD+YNorKb3XIykgTg4l1nA=",
"owner": "hyprwm",
"repo": "hyprcursor",
"rev": "45fcc10b4c282746d93ec406a740c43b48b4ef80",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprcursor",
"type": "github"
}
},
"hyprgraphics": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751808145,
"narHash": "sha256-OXgL0XaKMmfX2rRQkt9SkJw+QNfv0jExlySt1D6O72g=",
"owner": "hyprwm",
"repo": "hyprgraphics",
"rev": "b841473a0bd4a1a74a0b64f1ec2ab199035c349f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprgraphics",
"type": "github"
}
},
"hyprland": {
"inputs": {
"aquamarine": "aquamarine",
"hyprcursor": "hyprcursor",
"hyprgraphics": "hyprgraphics",
"hyprland-protocols": "hyprland-protocols",
"hyprland-qtutils": "hyprland-qtutils",
"hyprlang": "hyprlang",
"hyprutils": "hyprutils",
"hyprwayland-scanner": "hyprwayland-scanner",
"nixpkgs": "nixpkgs_4",
"pre-commit-hooks": "pre-commit-hooks",
"systems": "systems",
"xdph": "xdph"
},
"locked": {
"lastModified": 1751995875,
"narHash": "sha256-ud9sl1RjmzAzalH2ocmGPs182xvr7GktjVIYvzJamwo=",
"owner": "hyprwm",
"repo": "Hyprland",
"rev": "9517d0eaa4ef93de67dc80fecca7a826f7ad556d",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "Hyprland",
"type": "github"
}
},
"hyprland-protocols": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749046714,
"narHash": "sha256-kymV5FMnddYGI+UjwIw8ceDjdeg7ToDVjbHCvUlhn14=",
"owner": "hyprwm",
"repo": "hyprland-protocols",
"rev": "613878cb6f459c5e323aaafe1e6f388ac8a36330",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-protocols",
"type": "github"
}
},
"hyprland-qt-support": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"systems"
]
},
"locked": {
"lastModified": 1749154592,
"narHash": "sha256-DO7z5CeT/ddSGDEnK9mAXm1qlGL47L3VAHLlLXoCjhE=",
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"rev": "4c8053c3c888138a30c3a6c45c2e45f5484f2074",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"type": "github"
}
},
"hyprland-qtutils": {
"inputs": {
"hyprland-qt-support": "hyprland-qt-support",
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371812,
"narHash": "sha256-D868K1dVEACw17elVxRgXC6hOxY+54wIEjURztDWLk8=",
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"rev": "b13c7481e37856f322177010bdf75fccacd1adc8",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"type": "github"
}
},
"hyprlang": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371198,
"narHash": "sha256-/iuJ1paQOBoSLqHflRNNGyroqfF/yvPNurxzcCT0cAE=",
"owner": "hyprwm",
"repo": "hyprlang",
"rev": "cee01452bca58d6cadb3224e21e370de8bc20f0b",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprlang",
"type": "github"
}
},
"hyprutils": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751888065,
"narHash": "sha256-F2SV9WGqgtRsXIdUrl3sRe0wXlQD+kRRZcSfbepjPJY=",
"owner": "hyprwm",
"repo": "hyprutils",
"rev": "a8229739cf36d159001cfc203871917b83fdf917",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprutils",
"type": "github"
}
},
"hyprwayland-scanner": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751881472,
"narHash": "sha256-meB0SnXbwIe2trD041MLKEv6R7NZ759QwBcVIhlSBfE=",
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"rev": "8fb426b3e5452fd9169453fd6c10f8c14ca37120",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"type": "github"
}
},
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1756469547, "lastModified": 1765838191,
"narHash": "sha256-YvtD2E7MYsQ3r7K9K2G7nCslCKMPShoSEAtbjHLtH0k=", "narHash": "sha256-m5KWt1nOm76ILk/JSCxBM4MfK3rYY7Wq9/TZIIeGnT8=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "41d292bfc37309790f70f4c120b79280ce40af16", "rev": "c6f52ebd45e5925c188d1a20119978aa4ffd5ef6",
"type": "github" "type": "github"
}, },
"original": { "original": {
"id": "nixpkgs", "id": "nixpkgs",
"ref": "nixos-25.05", "ref": "nixos-25.11",
"type": "indirect" "type": "indirect"
} }
}, },
"nixpkgs-lib": {
"locked": {
"lastModified": 1751159883,
"narHash": "sha256-urW/Ylk9FIfvXfliA1ywh75yszAbiTEVgpPeinFyVZo=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "14a40a1d7fb9afa4739275ac642ed7301a9ba1ab",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1756542300, "lastModified": 1766070988,
"narHash": "sha256-tlOn88coG5fzdyqz6R93SQL5Gpq+m/DsWpekNFhqPQk=", "narHash": "sha256-G/WVghka6c4bAzMhTwT2vjLccg/awmHkdKSd2JrycLc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d7600c775f877cd87b4f5a831c28aa94137377aa", "rev": "c6245e83d836d0433170a16eb185cefe0572f8b8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -492,117 +51,12 @@
"type": "indirect" "type": "indirect"
} }
}, },
"nixpkgs_2": {
"locked": {
"lastModified": 1722073938,
"narHash": "sha256-OpX0StkL8vpXyWOGUD6G+MA26wAXK6SpT94kLJXo6B4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "e36e9f57337d0ff0cf77aceb58af4c805472bfae",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1751637120,
"narHash": "sha256-xVNy/XopSfIG9c46nRmPaKfH1Gn/56vQ8++xWA8itO4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5c724ed1388e53cc231ed98330a60eb2f7be4be3",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1751792365,
"narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_5": {
"locked": {
"lastModified": 1751949589,
"narHash": "sha256-mgFxAPLWw0Kq+C8P3dRrZrOYEQXOtKuYVlo9xvPntt8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9b008d60392981ad674e04016d25619281550a9d",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_6": {
"locked": {
"lastModified": 1747958103,
"narHash": "sha256-qmmFCrfBwSHoWw7cVK4Aj+fns+c54EBP8cGqp/yK410=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "fe51d34885f7b5e3e7b59572796e1bcb427eccb1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"pre-commit-hooks": {
"inputs": {
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
]
},
"locked": {
"lastModified": 1750779888,
"narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"home-manager": "home-manager", "home-manager": "home-manager",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nixpkgs-unstable": "nixpkgs-unstable", "nixpkgs-unstable": "nixpkgs-unstable",
"sops-nix": "sops-nix", "sops-nix": "sops-nix"
"xremap-flake": "xremap-flake"
} }
}, },
"sops-nix": { "sops-nix": {
@@ -612,11 +66,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1754988908, "lastModified": 1765836173,
"narHash": "sha256-t+voe2961vCgrzPFtZxha0/kmFSHFobzF00sT8p9h0U=", "narHash": "sha256-hWRYfdH2ONI7HXbqZqW8Q1y9IRbnXWvtvt/ONZovSNY=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "3223c7a92724b5d804e9988c6b447a0d09017d48", "rev": "443a7f2e7e118c4fc63b7fae05ab3080dd0e5c63",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -624,129 +78,6 @@
"repo": "sops-nix", "repo": "sops-nix",
"type": "github" "type": "github"
} }
},
"systems": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": "nixpkgs_6"
},
"locked": {
"lastModified": 1750931469,
"narHash": "sha256-0IEdQB1nS+uViQw4k3VGUXntjkDp7aAlqcxdewb/hAc=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "ac8e6f32e11e9c7f153823abc3ab007f2a65d3e1",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
},
"xdph": {
"inputs": {
"hyprland-protocols": [
"xremap-flake",
"hyprland",
"hyprland-protocols"
],
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751300244,
"narHash": "sha256-PFuv1TZVYvQhha0ac53E3YgdtmLShrN0t4T6xqHl0jE=",
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"rev": "6115f3fdcb2c1a57b4a80a69f3c797e47607b90a",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"type": "github"
}
},
"xremap": {
"flake": false,
"locked": {
"lastModified": 1752020210,
"narHash": "sha256-yRYffVAqSriU3AebfL1JFIKP9gUSTq5OC8CyyBTx9KQ=",
"owner": "k0kubun",
"repo": "xremap",
"rev": "a00d6ad9e7a180f6b641b8188f53a8c66ae8379a",
"type": "github"
},
"original": {
"owner": "k0kubun",
"ref": "v0.10.13",
"repo": "xremap",
"type": "github"
}
},
"xremap-flake": {
"inputs": {
"crane": "crane",
"devshell": "devshell",
"flake-parts": "flake-parts",
"home-manager": "home-manager_2",
"hyprland": "hyprland",
"nixpkgs": "nixpkgs_5",
"treefmt-nix": "treefmt-nix",
"xremap": "xremap"
},
"locked": {
"lastModified": 1752027487,
"narHash": "sha256-240ngBRC7SbAwpWqbkZzHXwc3wA3U4fLPJwjRg8+Fqg=",
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
},
"original": {
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
}
} }
}, },
"root": "root", "root": "root",

View File

@@ -2,7 +2,7 @@
description = "Main nixos system configuration management by Jonas Hahn"; description = "Main nixos system configuration management by Jonas Hahn";
inputs = { inputs = {
nixpkgs.url = "nixpkgs/nixos-25.05"; nixpkgs.url = "nixpkgs/nixos-25.11";
nixpkgs-unstable.url = "nixpkgs/nixos-unstable"; nixpkgs-unstable.url = "nixpkgs/nixos-unstable";
sops-nix = { sops-nix = {
@@ -11,14 +11,12 @@
}; };
home-manager = { home-manager = {
url = "github:nix-community/home-manager/release-25.05"; url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
xremap-flake.url =
"github:xremap/nix-flake?rev=8001f37b1ffe86e76b62f36afadee2f4acf90e70"; # One commit behind head
}; };
# Understand what everything does
outputs = outputs =
{ self, nixpkgs, nixpkgs-unstable, sops-nix, home-manager, ... }@inputs: { self, nixpkgs, nixpkgs-unstable, sops-nix, home-manager, ... }@inputs:
let let

View File

@@ -9,44 +9,49 @@
./../../modules/essential.nix ./../../modules/essential.nix
./../../modules/common/sops.nix ./../../modules/common/sops.nix
# This is buggy right now
#./../../modules/services/webdav.nix
# Not working right now due to nvidia problems
# It worked fine on another machine thats why I am wondering
#./../../modules/services/ai.nix
./../../modules/graphics/workstation.nix ./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/hardware/nvidia.nix ./../../modules/hardware/nvidia.nix
./../../modules/hardware/boot.nix ./../../modules/hardware/boot.nix
./../../modules/hardware/xremap.nix
]; ];
networking.hostName = "minoxy"; networking.hostName = "minoxy";
enableCuda = false;
systemd.targets.sleep.enable = true;
systemd.targets.suspend.enable = true;
programs.ydotool.enable = true;
services.input-remapper.enable = true;
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/8CEA-13E3"; # use lsblk -f
fsType = "exfat";
options = [ "defaults" "uid=1000" "gid=100" "umask=000" ];
};
# Testing
#environment.etc."mnt/jousb".source = "/mnt/jousb"; # ensures directory exists
#services.udev.extraRules = ''
# ACTION=="add", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.mount}/bin/mount /dev/disk/by-label/JOUSB /mnt/jousb"
# ACTION=="remove", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.umount}/bin/umount /mnt/jousb"
#'';
virtualisation.docker.enable = true; virtualisation.docker.enable = true;
# Add file systems
boot.supportedFilesystems = [ "ntfs" "exfat" ];
# Hide the windows disk in the file explorer
services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
SUBSYSTEM=="block", ENV{ID_FS_UUID}=="A09C8D5E9C8D2FB8", ENV{UDISKS_IGNORE}="1"
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
# TODO: Make all your working systems go to ext4 on the full disk for ease of use and storage
virtualisation.docker.storageDriver = "btrfs"; virtualisation.docker.storageDriver = "btrfs";
security.sudo.extraConfig = ''
# Sudoers config goes here
'';
services = {
syncthing = {
enable = true;
user = "jonas";
dataDir = "/home/jonas/Syncthing"; # Default folder for new synced folders
configDir = "/home/jonas/.config/syncthing"; # Folder for Syncthing's settings and keys
};
};
networking.extraHosts = ''
127.0.0.1 jonas.local
'';
fonts.fontDir.enable = true;
# Never change this! # Never change this!
system.stateVersion = "25.05"; system.stateVersion = "25.05";
} }

View File

@@ -4,41 +4,45 @@
{ config, lib, pkgs, modulesPath, ... }: { config, lib, pkgs, modulesPath, ... }:
{ {
imports = imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ]; boot.initrd.availableKernelModules =
[ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "uinput" "kvm-intel" "ecryptfs" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/554a844e-e1de-4c4d-bba6-0102e49751cd"; # use lsblk -f
fsType = "ext4";
#options = [ "uid=1000" "gid=100" "umask=000" ];
};
# FUll btrfs config # FUll btrfs config
fileSystems."/" = fileSystems."/" = {
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc"; device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=root" ]; options = [ "subvol=root" ];
}; };
fileSystems."/home" = fileSystems."/home" = {
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc"; device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=home" ]; options = [ "subvol=home" ];
}; };
fileSystems."/nix" = fileSystems."/nix" = {
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc"; device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs"; fsType = "btrfs";
options = [ "subvol=nix" ]; options = [ "subvol=nix" ];
}; };
fileSystems."/boot" = fileSystems."/boot" = {
{ device = "/dev/disk/by-uuid/3091-F0BF"; device = "/dev/disk/by-uuid/3091-F0BF";
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ]; options = [ "fmask=0022" "dmask=0022" ];
}; };
swapDevices = swapDevices =
[ { device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; } [{ device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; }];
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's
@@ -49,5 +53,6 @@
# networking.interfaces.wlp112s0.useDHCP = lib.mkDefault true; # networking.interfaces.wlp112s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.intel.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
} }

View File

@@ -9,16 +9,14 @@
./../../modules/essential.nix ./../../modules/essential.nix
./../../modules/common/sops.nix ./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix ./../../modules/hardware/boot.nix
./../../modules/laptop/powersave.nix ./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix ./../../modules/laptop/battery.nix
./../../modules/graphics/workstation.nix ./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
#./../../modules/services/webdav.nix ./../../modules/services/printer.nix
./../../modules/services/scanning.nix
]; ];
networking.hostName = "nixyos"; networking.hostName = "nixyos";

View File

@@ -9,7 +9,7 @@
]; ];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "sd_mod" "rtsx_usb_sdmmc" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "sd_mod" "rtsx_usb_sdmmc" ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" "ecryptfs" ];
fileSystems."/" = fileSystems."/" =
{ device = "/dev/disk/by-uuid/881615c5-5c12-46c5-8bd2-1959f9347980"; { device = "/dev/disk/by-uuid/881615c5-5c12-46c5-8bd2-1959f9347980";

View File

@@ -9,33 +9,31 @@
./../../modules/essential.nix ./../../modules/essential.nix
./../../modules/common/sops.nix ./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix ./../../modules/hardware/boot.nix
./../../modules/graphics/workstation.nix ./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/laptop/powersave.nix ./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix ./../../modules/laptop/battery.nix
./../../modules/services/printer.nix
#./../../modules/services/webdav.nix
./../../modules/services/scanning.nix
]; ];
networking.hostName = "thinix"; networking.hostName = "thinix";
batMode = "double"; batMode = "double";
# Cannot have this and tlp
#services.power-profiles-daemon.enable = true;
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
swapDevices = [{ swapDevices = [{
device = "/swapfile"; device = "/swapfile";
size = 4096; size = 4096;
}]; }];
networking.firewall = {
enable = true;
allowedTCPPorts = [ 80 443 8080 ];
};
system.stateVersion = "24.11"; services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
system.stateVersion = "24.11"; # Dont change this
} }

View File

@@ -8,6 +8,7 @@
[ (modulesPath + "/installer/scan/not-detected.nix") [ (modulesPath + "/installer/scan/not-detected.nix")
]; ];
#boot.kernelModules = [ "ecryptfs" ];
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" ];
fileSystems = { fileSystems = {

View File

@@ -5,10 +5,37 @@
services.locate.enable = true; services.locate.enable = true;
services.openssh.enable = true; services.openssh.enable = true;
hardware.enableAllFirmware = true;
services = {
udisks2.enable = true;
gvfs.enable = true;
};
security.polkit.enable = true;
security.pam.services.login.enableGnomeKeyring = true;
services.gnome.gnome-keyring.enable = true;
#security.pam.enableEcryptfs = true;
security.polkit.extraConfig = ''
polkit.addRule(function(action, subject) {
if (action.id == "org.freedesktop.udisks2.filesystem-mount-system" &&
subject.isInGroup("wheel")) {
return polkit.Result.YES;
}
});
'';
# Nix fun # Nix fun
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
nix.settings.experimental-features = [ "flakes" "nix-command" ]; nix.settings.experimental-features = [ "flakes" "nix-command" ];
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";
programs.nix-ld.enable = true; # Linking support programs.nix-ld.enable = true; # Linking support
@@ -16,7 +43,9 @@
services.avahi.enable = true; services.avahi.enable = true;
services.avahi.nssmdns4 = true; services.avahi.nssmdns4 = true;
environment = { systemPackages = with pkgs; [ xorg.xrandr git starship zoxide rsync ]; }; environment = {
systemPackages = with pkgs; [ yazi tmux git starship zoxide rsync xorg.libX11.dev rclone neovim alacritty gtk4.dev ];
};
nix.optimise.automatic = true; nix.optimise.automatic = true;
@@ -43,4 +72,6 @@
[ "history-substring-search" "git" "zoxide" "vi-mode" "systemadmin" ]; [ "history-substring-search" "git" "zoxide" "vi-mode" "systemadmin" ];
}; };
}; };
programs.ydotool.enable = true;
} }

View File

@@ -0,0 +1,28 @@
{ config, pkgs, ... }:
let
user = "jonas";
uid = "1000";
in {
systemd.user.services.hyprshade-toggle = {
description = "Toggle Hyprshade grayscale";
enable = true;
serviceConfig = {
Type = "oneshot";
ExecStart = "${pkgs.bash}/bin/bash /home/${user}/projects/scripts/shell/toggle_grayscale.sh";
Environment = ''
PATH=/home/jonas/.nix-profile/bin:/run/current-system/sw/bin:/usr/bin:${pkgs.hyprshade}/bin
'';
};
};
systemd.user.timers.hyprshade-toggle = {
description = "Run hyprshade toggle";
timerConfig = {
OnBootSec = "1min";
OnUnitActiveSec = "3min";
AccuracySec = "30s";
};
wantedBy = [ "timers.target" ];
};
}

View File

@@ -7,6 +7,7 @@
QT_QPA_PLATFORMTHEME = "qt6ct"; QT_QPA_PLATFORMTHEME = "qt6ct";
QT_STYLE_OVERRIDE = "kvantum"; QT_STYLE_OVERRIDE = "kvantum";
QT_QPA_PLATFORM = "xcb"; QT_QPA_PLATFORM = "xcb";
TERM = "alacritty";
}; };
}; };
@@ -16,6 +17,7 @@
programs = { programs = {
hyprland.enable = true; hyprland.enable = true;
niri.enable = true;
firefox.enable = true; firefox.enable = true;
}; };
} }

View File

@@ -6,10 +6,6 @@ in {
enableCuda = mkOption { enableCuda = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = ''
Enable CUDA support for Blender and other packages.
Warning: This can cause very long build times.
'';
}; };
nvidiaOpen = mkOption { nvidiaOpen = mkOption {
type = types.bool; type = types.bool;
@@ -29,16 +25,5 @@ in {
nvidiaSettings = true; nvidiaSettings = true;
package = config.boot.kernelPackages.nvidiaPackages.stable; package = config.boot.kernelPackages.nvidiaPackages.stable;
}; };
# Apply CUDA-specific settings if enabled
nixpkgs.config.cudaSupport = config.enableCuda;
hardware.enableAllFirmware = true;
environment.systemPackages = (if config.enableCuda then
[
(pkgs.blender.override { cudaSupport = true; })
]
else
[ ]);
}; };
} }

View File

@@ -1,37 +0,0 @@
{ inputs, ... }:
{
imports = [ inputs.xremap-flake.nixosModules.default ];
services.xremap = {
withHypr = true;
userName = "jonas";
config = {
modmap = [
{
name = "Capslock to esc and ctrl";
remap = {
"CAPSLOCK" = {
"alone" = "ESC";
"held" = "CTRL_L";
};
"ESC" = "CAPSLOCK";
};
}
{
name = "Switch super and alt";
remap = {
"SUPER_L" = {
"alone" = "ALT_L";
"held" = "ALT_L";
};
"ALT_L" = {
"alone" = "SUPER_L";
"held" = "SUPER_L";
};
};
}
];
};
};
}

View File

@@ -1,10 +0,0 @@
{ ... }:
{
imports = [ ../hardware/nvidia.nix ];
services.ollama = {
enable = true;
acceleration = "cuda";
};
}

View File

@@ -6,4 +6,6 @@
hardware.sane.extraBackends = [ pkgs.sane-airscan ]; hardware.sane.extraBackends = [ pkgs.sane-airscan ];
hardware.sane.disabledDefaultBackends = [ "escl" ]; hardware.sane.disabledDefaultBackends = [ "escl" ];
services.udev.packages = [ pkgs.sane-airscan ]; services.udev.packages = [ pkgs.sane-airscan ];
services.printing.enable = true;
} }

View File

@@ -1,5 +0,0 @@
{ ... }:
{
services.printing.enable = true;
}

View File

@@ -1,34 +0,0 @@
{ ... }:
{
# For web mounting
services.davfs2.enable = true;
# Load the secret
sops = {
secrets = {
webdav_authstring = {
mode = "0600";
path = "/etc/davfs2/secrets";
};
};
};
systemd.mounts = [{
description = "Webdav mount point";
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
what = "https://dav.hahn1.one";
where = "/webdav";
type = "davfs";
options = "uid=1000,gid=1000,file_mode=0664,dir_mode=2775,_netdev";
mountConfig.TimeoutSec = "5s";
}];
systemd.automounts = [{
description = "Webdav automount";
where = "/webdav";
wantedBy = [ "multi-user.target" ];
automountConfig = { TimeoutIdleSec = "2m"; };
}];
}

View File

@@ -3,8 +3,6 @@
{ {
imports = [ ./packages.nix ]; imports = [ ./packages.nix ];
services.gnome-keyring.enable = true;
xdg.mimeApps = { xdg.mimeApps = {
enable = true; enable = true;
defaultApplications = { defaultApplications = {
@@ -20,6 +18,46 @@
}; };
}; };
# Enable and configure the gnome terminal for the nemo file manager
programs.gnome-terminal = {
enable = true;
showMenubar = false;
themeVariant = "dark";
profile."17ef1520-f08d-403f-b033-d8ccee6b01f9" = {
visibleName = "MainHome";
transparencyPercent = 60;
font = "FiraCode Nerd Font 12"; # Fira is installed on the system by the nixos config
default = true;
audibleBell = false;
cursorBlinkMode = "off";
colors = {
backgroundColor = "#1d1d1d";
cursor = {
foreground = "#1d1d1d"; # text inside cursor
background = "#ffb86c"; # light orange block
};
foregroundColor = "#f7f6ec";
palette = [ "#343835" "#ce3e60" "#7bb75b" "#e8b32a" "#4c99d3" "#a57fc4" "#389aac" "#f9faf6"
"#585a58" "#d18ea6" "#767e2b" "#77592e" "#337879" "#7f5190" "#76bbca" "#b1b5ae" ];
};
};
};
services.udiskie = {
enable = true;
notify = true;
automount = true;
tray = "auto";
settings = {
# workaround for
# https://github.com/nix-community/home-manager/issues/632
program_options = {
# replace with your favorite file manager
file_manager = "${pkgs.nemo-with-extensions}/bin/nemo";
};
};
};
xdg.desktopEntries.fehcustom = { xdg.desktopEntries.fehcustom = {
name = "FehCustom"; name = "FehCustom";
terminal = false; terminal = false;
@@ -37,6 +75,7 @@
}; };
}; };
# Theming for ease of use of gui apps
gtk = { gtk = {
enable = true; enable = true;
iconTheme = { iconTheme = {
@@ -48,21 +87,25 @@
package = pkgs.gnome-themes-extra; package = pkgs.gnome-themes-extra;
}; };
}; };
qt = { qt = {
enable = true; enable = true;
platformTheme.name = "qtct"; platformTheme.name = "qtct";
style.name = "Kvantum"; style.name = "kvantum";
}; };
xdg.configFile."Kvantum/kvantum.kvconfig".source = xdg.configFile."Kvantum/kvantum.kvconfig".source =
(pkgs.formats.ini { }).generate "kvantum.kvconfig" { (pkgs.formats.ini { }).generate "kvantum.kvconfig" {
General.theme = "Catppuccin-Frappe-Rosewater"; General.theme = "KvAdaptaDark";
}; };
xdg.configFile."qt6ct/qt6ct.conf".source = pkgs.writeTextFile { xdg.configFile."qt6ct/qt6ct.conf".source = pkgs.writeTextFile {
name = "qt6ct.conf"; name = "qt6ct.conf";
text = text =
" [Appearance]\n color_scheme_path=${pkgs.qt6ct}/share/qt6ct/colors/airy.conf\n custom_palette=false\n icon_theme=Papirus-Dark\n standard_dialogs=default\n style=kvantum\n"; ''
[Appearance]
icon_theme=Papirus-Dark
style=kvantum
standard_dialogs=default
'';
}; };
programs.starship = { programs.starship = {
@@ -83,5 +126,5 @@
# Let Home Manager install and manage itself. # Let Home Manager install and manage itself.
programs.home-manager.enable = true; programs.home-manager.enable = true;
home.stateVersion = "24.11"; home.stateVersion = "24.11"; # Dont change
} }

View File

@@ -2,185 +2,168 @@
{ {
home.packages = with pkgs; [ home.packages = with pkgs; [
weechat ########################################
clang # GUI #
libcxx ########################################
just
deno # --- Core GUI ---
alacritty alacritty
ffmpeg kitty
pavucontrol
iamb
sdkmanager
air
nmap
wakeonlan
wiki-tui
ansible
terraform
android-tools
vscode vscode
libreoffice
unstable.sioyek
zathura
qalculate-qt
# --- Communication & Internet ---
discord
thunderbird
tor-browser
unstable.signal-desktop
qbittorrent
ausweisapp
nextcloud-client
owncloud-client
spotify
# --- Media & Desktop Tools ---
simple-scan simple-scan
obsidian
rclone
sops
gimp gimp
audio-recorder audio-recorder
cheese cheese
age mpv
git-lfs
tor
torsocks
w3m
timer
qbittorrent
discord
blender
audacity
zoom-us
vlc
thunderbird
obsidian obsidian
obs-studio rnote
prismlauncher nemo-with-extensions
inkscape xournalpp
anki
shotcut hyprshot # All the hypr stuff
hyprpicker
hyprlock
hypridle
hyprshade
hyprsunset
hyprpaper
todo-txt-cli waybar
systemctl-tui dunst
acpi networkmanagerapplet
pavucontrol
feh feh
dragon-drop
watson tofi
slides
imagemagick
xdragon
luarocks
gradle
openjdk
findutils.locate
ethtool
qalculate-qt
wl-clip-persist
btop
fastfetch
zathura
eza
fuzzel fuzzel
networkmanagerapplet ########################################
gdu # CLI #
hyprpaper ########################################
tokei
fzf
glibc
gnumake
ninja
cmake
meson
lld
vscode-langservers-extracted # --- Essentials & Navigation ---
clang
clang-tools # Provides clangd
go
bitwarden-desktop
libinput
cudaPackages.cudatoolkit
ydotool
input-remapper
ausweisapp
spotify
pgadmin4
dig
lazydocker
libtool
love
lua
zig
cargo
tor-browser
bitwarden-cli
rpi-imager
cppcheck
lazygit
nodejs
ripgrep ripgrep
signal-desktop
unison
php
intelephense
trash-cli
# Full haskell development environment
haskellPackages.ghc
haskellPackages.cabal-install
haskellPackages.stack
haskellPackages.hoogle
haskellPackages.haskell-language-server
python3
fd fd
ttyper gcr # Keyring
zoxide fzf
vim eza
tofi
bat bat
dunst vim
killall unstable.neovim
libreoffice unstable.zellij
perl unstable.helix
pipx unstable.jujutsu
waybar jjui
stow uv
brightnessctl nap
anki
unstable.typst
mediainfo
powertop
exiftool
curl
sioyek
xournalpp
rnote
emacs emacs
hyprshot inotify-tools
hyprpicker stow
hyprsunset
wl-clipboard wl-clipboard
wl-clip-persist
mpv killall
gitui trash-cli
keepassxc file
kitty
unstable.yazi
neovim
htop
alpine
wget
tmux
zip zip
xz xz
unzip unzip
file # --- System & Network ---
gnupg btop
iotop
fastfetch
acpi
brightnessctl
ethtool
findutils
nmap
wakeonlan
tor
torsocks
w3m
curl
wget
libinput
mtr
gdu
timer
nix-output-monitor # --- Productivity & Misc ---
just
todo-txt-cli
typst
systemctl-tui
wiki-tui
watson
slides
imagemagick
immich-cli
parted
lsof
tt
bitwarden-cli
lazydocker
poppler-utils
unstable.kmonad
unstable.simple-completion-language-server
xorg.setxkbmap
prismlauncher
entr
yq
lazygit
gitui
tokei
dig
unstable.yazi
# --- Languages & Package Managers ---
python3
nodejs
go
lua
luarocks
deno
pipx
gradle
openjdk
# --- Build Tools ---
#clang
gcc
clang-tools
gnumake
cmake
ninja
meson
lld
# --- DevOps & Versioning ---
git-lfs
sops
age
ecryptfs
ansible
android-tools
sdkmanager
air
vscode-langservers-extracted
]; ];
} }

View File

@@ -2,14 +2,19 @@
{ {
users.defaultUserShell = pkgs.zsh; users.defaultUserShell = pkgs.zsh;
users.groups = { uinput = {}; };
users.users = { users.users = {
jonas = { jonas = {
isNormalUser = true; isNormalUser = true;
uid = 1000;
extraGroups = [ extraGroups = [
"docker" "docker"
"input" "input"
"uinput"
"scanner" "scanner"
"lp" "lp"
"dialout"
"uucp"
"davfs2" "davfs2"
"wheel" "wheel"
"ydotool" "ydotool"