Compare commits

..

30 Commits

Author SHA1 Message Date
29dbae8566 Bump to new version 2025-12-22 12:33:10 +01:00
38ded1bfba auto up 22:35:16 up 2:12, 2 users, load average: 1.32, 1.67, 1.83 2025-12-18 22:35:18 +01:00
1dfe545732 auto up 21:17:45 up 0:54, 2 users, load average: 2.57, 2.26, 1.66 2025-12-18 21:17:47 +01:00
32a3a2f42b auto up 22:33:03 up 0:49, 2 users, load average: 0.27, 0.65, 0.85 2025-11-28 22:33:05 +01:00
ecb2db42cb auto up 11:42:06 up 1:56, 2 users, load average: 0.03, 0.13, 0.17 2025-11-26 11:42:06 +01:00
f61cb5b97d auto up 14:23:31 up 3:05, 2 users, load average: 0.68, 0.71, 0.72 2025-11-24 14:23:34 +01:00
92456379d1 auto up 01:59:32 up 0:01, 2 users, load average: 0.71, 0.35, 0.13 2025-11-21 01:59:34 +01:00
3d411b7667 auto up 01:53:18 up 0:06, 2 users, load average: 0.90, 0.66, 0.33 2025-11-21 01:53:20 +01:00
36fab75201 auto up 01:47:18 up 0:00, 2 users, load average: 1.77, 0.41, 0.13 2025-11-21 01:47:39 +01:00
3fb80233b6 Full kmonad 2025-11-21 00:16:29 +01:00
0183a2a3b8 Remove all 2025-11-20 21:05:46 +01:00
cb0286ac07 Have kmonad as a seperate service not managed by nixos 2025-11-20 21:01:54 +01:00
4addd84301 First test 2025-11-20 20:48:23 +01:00
dc1e64865f auto up 11:49:23 up 0:19, 2 users, load average: 0.09, 0.27, 0.37 2025-11-20 11:49:25 +01:00
0274f875c4 auto up 15:03:56 up 0:02, 2 users, load average: 0.32, 0.20, 0.09 2025-11-19 15:03:58 +01:00
4cb53654c9 auto up 23:01:45 up 8:51, 2 users, load average: 0.57, 0.67, 0.74 2025-11-16 23:01:47 +01:00
b6a66eaa4d auto up 16:24:24 up 1:02, 2 users, load average: 0.54, 0.27, 0.10 2025-11-14 16:24:26 +01:00
2668919af5 auto up 11:12:59 up 0:20, 2 users, load average: 0.61, 0.62, 0.36 2025-11-06 11:13:01 +01:00
725e46b62d auto up 10:53:19 up 0:00, 2 users, load average: 1.01, 0.25, 0.08 2025-11-06 10:53:20 +01:00
1f67fd271e auto up 02:38:43 up 0:05, 3 users, load average: 0.52, 0.53, 0.25 2025-11-06 02:38:44 +01:00
d073da6b38 auto up 01:59:20 up 7:21, 2 users, load average: 0.17, 0.29, 0.37 2025-11-06 01:59:21 +01:00
4729da1505 auto up 01:08:17 up 6:30, 2 users, load average: 0.62, 0.57, 0.51 2025-11-06 01:08:18 +01:00
0ada014d4a auto up 00:24:13 up 0:32, 2 users, load average: 0.84, 0.77, 0.74 2025-11-02 00:24:15 +01:00
c574bf8e0f auto up 2025-11-01 23:13:42 +01:00
4e000023c7 Add grayscale 2025-11-01 21:44:23 +01:00
a8fdabe1d8 Better filemanager 2025-10-30 09:24:23 +01:00
0d1d0018ff Nextcloud 2025-10-17 12:08:07 +02:00
f7533d4ffa Some improves 2025-10-17 09:31:17 +02:00
2ea3065c4f Updates 2025-10-15 23:04:43 +02:00
f8557c66ea Minimal with flake update 2025-10-14 11:09:14 +02:00
20 changed files with 357 additions and 1029 deletions

699
flake.lock generated
View File

@@ -1,132 +1,5 @@
{
"nodes": {
"aquamarine": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751740947,
"narHash": "sha256-35040CHH7P3JGmhGVfEb2oJHL/A5mI2IXumhkxrBnao=",
"owner": "hyprwm",
"repo": "aquamarine",
"rev": "dfc1db15a08c4cd234288f66e1199c653495301f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "aquamarine",
"type": "github"
}
},
"crane": {
"locked": {
"lastModified": 1751562746,
"narHash": "sha256-smpugNIkmDeicNz301Ll1bD7nFOty97T79m4GUMUczA=",
"owner": "ipetkov",
"repo": "crane",
"rev": "aed2020fd3dc26e1e857d4107a5a67a33ab6c1fd",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"devshell": {
"inputs": {
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1741473158,
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
"owner": "numtide",
"repo": "devshell",
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "devshell",
"type": "github"
}
},
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1751413152,
"narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"pre-commit-hooks",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
@@ -134,356 +7,42 @@
]
},
"locked": {
"lastModified": 1756245065,
"narHash": "sha256-aAZNbGcWrVRZgWgkQbkabSGcDVRDMgON4BipMy69gvI=",
"lastModified": 1765979862,
"narHash": "sha256-/r9/1KamvbHJx6I40H4HsSXnEcBAkj46ZwibhBx9kg0=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "54b2879ce622d44415e727905925e21b8f833a98",
"rev": "d3135ab747fd9dac250ffb90b4a7e80634eacbe9",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-25.05",
"ref": "release-25.11",
"repo": "home-manager",
"type": "github"
}
},
"home-manager_2": {
"inputs": {
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1751990210,
"narHash": "sha256-krWErNDl9ggMLSfK00Q2BcoSk3+IRTSON/DiDgUzzMw=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "218da00bfa73f2a61682417efe74549416c16ba6",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"hyprcursor": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749155331,
"narHash": "sha256-XR9fsI0zwLiFWfqi/pdS/VD+YNorKb3XIykgTg4l1nA=",
"owner": "hyprwm",
"repo": "hyprcursor",
"rev": "45fcc10b4c282746d93ec406a740c43b48b4ef80",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprcursor",
"type": "github"
}
},
"hyprgraphics": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751808145,
"narHash": "sha256-OXgL0XaKMmfX2rRQkt9SkJw+QNfv0jExlySt1D6O72g=",
"owner": "hyprwm",
"repo": "hyprgraphics",
"rev": "b841473a0bd4a1a74a0b64f1ec2ab199035c349f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprgraphics",
"type": "github"
}
},
"hyprland": {
"inputs": {
"aquamarine": "aquamarine",
"hyprcursor": "hyprcursor",
"hyprgraphics": "hyprgraphics",
"hyprland-protocols": "hyprland-protocols",
"hyprland-qtutils": "hyprland-qtutils",
"hyprlang": "hyprlang",
"hyprutils": "hyprutils",
"hyprwayland-scanner": "hyprwayland-scanner",
"nixpkgs": "nixpkgs_4",
"pre-commit-hooks": "pre-commit-hooks",
"systems": "systems",
"xdph": "xdph"
},
"locked": {
"lastModified": 1751995875,
"narHash": "sha256-ud9sl1RjmzAzalH2ocmGPs182xvr7GktjVIYvzJamwo=",
"owner": "hyprwm",
"repo": "Hyprland",
"rev": "9517d0eaa4ef93de67dc80fecca7a826f7ad556d",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "Hyprland",
"type": "github"
}
},
"hyprland-protocols": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749046714,
"narHash": "sha256-kymV5FMnddYGI+UjwIw8ceDjdeg7ToDVjbHCvUlhn14=",
"owner": "hyprwm",
"repo": "hyprland-protocols",
"rev": "613878cb6f459c5e323aaafe1e6f388ac8a36330",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-protocols",
"type": "github"
}
},
"hyprland-qt-support": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"systems"
]
},
"locked": {
"lastModified": 1749154592,
"narHash": "sha256-DO7z5CeT/ddSGDEnK9mAXm1qlGL47L3VAHLlLXoCjhE=",
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"rev": "4c8053c3c888138a30c3a6c45c2e45f5484f2074",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"type": "github"
}
},
"hyprland-qtutils": {
"inputs": {
"hyprland-qt-support": "hyprland-qt-support",
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371812,
"narHash": "sha256-D868K1dVEACw17elVxRgXC6hOxY+54wIEjURztDWLk8=",
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"rev": "b13c7481e37856f322177010bdf75fccacd1adc8",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"type": "github"
}
},
"hyprlang": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371198,
"narHash": "sha256-/iuJ1paQOBoSLqHflRNNGyroqfF/yvPNurxzcCT0cAE=",
"owner": "hyprwm",
"repo": "hyprlang",
"rev": "cee01452bca58d6cadb3224e21e370de8bc20f0b",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprlang",
"type": "github"
}
},
"hyprutils": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751888065,
"narHash": "sha256-F2SV9WGqgtRsXIdUrl3sRe0wXlQD+kRRZcSfbepjPJY=",
"owner": "hyprwm",
"repo": "hyprutils",
"rev": "a8229739cf36d159001cfc203871917b83fdf917",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprutils",
"type": "github"
}
},
"hyprwayland-scanner": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751881472,
"narHash": "sha256-meB0SnXbwIe2trD041MLKEv6R7NZ759QwBcVIhlSBfE=",
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"rev": "8fb426b3e5452fd9169453fd6c10f8c14ca37120",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1756469547,
"narHash": "sha256-YvtD2E7MYsQ3r7K9K2G7nCslCKMPShoSEAtbjHLtH0k=",
"lastModified": 1765838191,
"narHash": "sha256-m5KWt1nOm76ILk/JSCxBM4MfK3rYY7Wq9/TZIIeGnT8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "41d292bfc37309790f70f4c120b79280ce40af16",
"rev": "c6f52ebd45e5925c188d1a20119978aa4ffd5ef6",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-25.05",
"ref": "nixos-25.11",
"type": "indirect"
}
},
"nixpkgs-lib": {
"locked": {
"lastModified": 1751159883,
"narHash": "sha256-urW/Ylk9FIfvXfliA1ywh75yszAbiTEVgpPeinFyVZo=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "14a40a1d7fb9afa4739275ac642ed7301a9ba1ab",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1756542300,
"narHash": "sha256-tlOn88coG5fzdyqz6R93SQL5Gpq+m/DsWpekNFhqPQk=",
"lastModified": 1766070988,
"narHash": "sha256-G/WVghka6c4bAzMhTwT2vjLccg/awmHkdKSd2JrycLc=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "d7600c775f877cd87b4f5a831c28aa94137377aa",
"rev": "c6245e83d836d0433170a16eb185cefe0572f8b8",
"type": "github"
},
"original": {
@@ -492,117 +51,12 @@
"type": "indirect"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1722073938,
"narHash": "sha256-OpX0StkL8vpXyWOGUD6G+MA26wAXK6SpT94kLJXo6B4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "e36e9f57337d0ff0cf77aceb58af4c805472bfae",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1751637120,
"narHash": "sha256-xVNy/XopSfIG9c46nRmPaKfH1Gn/56vQ8++xWA8itO4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5c724ed1388e53cc231ed98330a60eb2f7be4be3",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1751792365,
"narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_5": {
"locked": {
"lastModified": 1751949589,
"narHash": "sha256-mgFxAPLWw0Kq+C8P3dRrZrOYEQXOtKuYVlo9xvPntt8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9b008d60392981ad674e04016d25619281550a9d",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_6": {
"locked": {
"lastModified": 1747958103,
"narHash": "sha256-qmmFCrfBwSHoWw7cVK4Aj+fns+c54EBP8cGqp/yK410=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "fe51d34885f7b5e3e7b59572796e1bcb427eccb1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"pre-commit-hooks": {
"inputs": {
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
]
},
"locked": {
"lastModified": 1750779888,
"narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"root": {
"inputs": {
"home-manager": "home-manager",
"nixpkgs": "nixpkgs",
"nixpkgs-unstable": "nixpkgs-unstable",
"sops-nix": "sops-nix",
"xremap-flake": "xremap-flake"
"sops-nix": "sops-nix"
}
},
"sops-nix": {
@@ -612,11 +66,11 @@
]
},
"locked": {
"lastModified": 1754988908,
"narHash": "sha256-t+voe2961vCgrzPFtZxha0/kmFSHFobzF00sT8p9h0U=",
"lastModified": 1765836173,
"narHash": "sha256-hWRYfdH2ONI7HXbqZqW8Q1y9IRbnXWvtvt/ONZovSNY=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "3223c7a92724b5d804e9988c6b447a0d09017d48",
"rev": "443a7f2e7e118c4fc63b7fae05ab3080dd0e5c63",
"type": "github"
},
"original": {
@@ -624,129 +78,6 @@
"repo": "sops-nix",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": "nixpkgs_6"
},
"locked": {
"lastModified": 1750931469,
"narHash": "sha256-0IEdQB1nS+uViQw4k3VGUXntjkDp7aAlqcxdewb/hAc=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "ac8e6f32e11e9c7f153823abc3ab007f2a65d3e1",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
},
"xdph": {
"inputs": {
"hyprland-protocols": [
"xremap-flake",
"hyprland",
"hyprland-protocols"
],
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751300244,
"narHash": "sha256-PFuv1TZVYvQhha0ac53E3YgdtmLShrN0t4T6xqHl0jE=",
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"rev": "6115f3fdcb2c1a57b4a80a69f3c797e47607b90a",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"type": "github"
}
},
"xremap": {
"flake": false,
"locked": {
"lastModified": 1752020210,
"narHash": "sha256-yRYffVAqSriU3AebfL1JFIKP9gUSTq5OC8CyyBTx9KQ=",
"owner": "k0kubun",
"repo": "xremap",
"rev": "a00d6ad9e7a180f6b641b8188f53a8c66ae8379a",
"type": "github"
},
"original": {
"owner": "k0kubun",
"ref": "v0.10.13",
"repo": "xremap",
"type": "github"
}
},
"xremap-flake": {
"inputs": {
"crane": "crane",
"devshell": "devshell",
"flake-parts": "flake-parts",
"home-manager": "home-manager_2",
"hyprland": "hyprland",
"nixpkgs": "nixpkgs_5",
"treefmt-nix": "treefmt-nix",
"xremap": "xremap"
},
"locked": {
"lastModified": 1752027487,
"narHash": "sha256-240ngBRC7SbAwpWqbkZzHXwc3wA3U4fLPJwjRg8+Fqg=",
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
},
"original": {
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
}
}
},
"root": "root",

View File

@@ -2,7 +2,7 @@
description = "Main nixos system configuration management by Jonas Hahn";
inputs = {
nixpkgs.url = "nixpkgs/nixos-25.05";
nixpkgs.url = "nixpkgs/nixos-25.11";
nixpkgs-unstable.url = "nixpkgs/nixos-unstable";
sops-nix = {
@@ -11,14 +11,12 @@
};
home-manager = {
url = "github:nix-community/home-manager/release-25.05";
url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs";
};
xremap-flake.url =
"github:xremap/nix-flake?rev=8001f37b1ffe86e76b62f36afadee2f4acf90e70"; # One commit behind head
};
# Understand what everything does
outputs =
{ self, nixpkgs, nixpkgs-unstable, sops-nix, home-manager, ... }@inputs:
let

View File

@@ -9,44 +9,49 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
# This is buggy right now
#./../../modules/services/webdav.nix
# Not working right now due to nvidia problems
# It worked fine on another machine thats why I am wondering
#./../../modules/services/ai.nix
./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/hardware/nvidia.nix
./../../modules/hardware/boot.nix
./../../modules/hardware/xremap.nix
];
networking.hostName = "minoxy";
enableCuda = false;
systemd.targets.sleep.enable = true;
systemd.targets.suspend.enable = true;
programs.ydotool.enable = true;
services.input-remapper.enable = true;
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/8CEA-13E3"; # use lsblk -f
fsType = "exfat";
options = [ "defaults" "uid=1000" "gid=100" "umask=000" ];
};
# Testing
#environment.etc."mnt/jousb".source = "/mnt/jousb"; # ensures directory exists
#services.udev.extraRules = ''
# ACTION=="add", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.mount}/bin/mount /dev/disk/by-label/JOUSB /mnt/jousb"
# ACTION=="remove", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.umount}/bin/umount /mnt/jousb"
#'';
virtualisation.docker.enable = true;
# Add file systems
boot.supportedFilesystems = [ "ntfs" "exfat" ];
# Hide the windows disk in the file explorer
services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
SUBSYSTEM=="block", ENV{ID_FS_UUID}=="A09C8D5E9C8D2FB8", ENV{UDISKS_IGNORE}="1"
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
# TODO: Make all your working systems go to ext4 on the full disk for ease of use and storage
virtualisation.docker.storageDriver = "btrfs";
security.sudo.extraConfig = ''
# Sudoers config goes here
'';
services = {
syncthing = {
enable = true;
user = "jonas";
dataDir = "/home/jonas/Syncthing"; # Default folder for new synced folders
configDir = "/home/jonas/.config/syncthing"; # Folder for Syncthing's settings and keys
};
};
networking.extraHosts = ''
127.0.0.1 jonas.local
'';
fonts.fontDir.enable = true;
# Never change this!
system.stateVersion = "25.05";
}

View File

@@ -4,41 +4,45 @@
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
boot.initrd.availableKernelModules =
[ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.kernelModules = [ "uinput" "kvm-intel" "ecryptfs" ];
boot.extraModulePackages = [ ];
# FUll btrfs config
fileSystems."/" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/home" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/554a844e-e1de-4c4d-bba6-0102e49751cd"; # use lsblk -f
fsType = "ext4";
#options = [ "uid=1000" "gid=100" "umask=000" ];
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/3091-F0BF";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
# FUll btrfs config
fileSystems."/" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/home" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/nix" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/3091-F0BF";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; }
];
[{ device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; }];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
@@ -49,5 +53,6 @@
# networking.interfaces.wlp112s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
hardware.cpu.intel.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -9,16 +9,14 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix
./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix
./../../modules/graphics/workstation.nix
#./../../modules/services/webdav.nix
./../../modules/services/scanning.nix
./../../modules/graphics/grayscale.nix
./../../modules/services/printer.nix
];
networking.hostName = "nixyos";

View File

@@ -9,7 +9,7 @@
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "sd_mod" "rtsx_usb_sdmmc" ];
boot.kernelModules = [ "kvm-intel" ];
boot.kernelModules = [ "kvm-intel" "ecryptfs" ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/881615c5-5c12-46c5-8bd2-1959f9347980";

View File

@@ -9,33 +9,31 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix
./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix
#./../../modules/services/webdav.nix
./../../modules/services/scanning.nix
./../../modules/services/printer.nix
];
networking.hostName = "thinix";
batMode = "double";
# Cannot have this and tlp
#services.power-profiles-daemon.enable = true;
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
swapDevices = [{
device = "/swapfile";
size = 4096;
}];
networking.firewall = {
enable = true;
allowedTCPPorts = [ 80 443 8080 ];
};
system.stateVersion = "24.11";
services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
system.stateVersion = "24.11"; # Dont change this
}

View File

@@ -8,6 +8,7 @@
[ (modulesPath + "/installer/scan/not-detected.nix")
];
#boot.kernelModules = [ "ecryptfs" ];
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" ];
fileSystems = {

View File

@@ -5,10 +5,37 @@
services.locate.enable = true;
services.openssh.enable = true;
hardware.enableAllFirmware = true;
services = {
udisks2.enable = true;
gvfs.enable = true;
};
security.polkit.enable = true;
security.pam.services.login.enableGnomeKeyring = true;
services.gnome.gnome-keyring.enable = true;
#security.pam.enableEcryptfs = true;
security.polkit.extraConfig = ''
polkit.addRule(function(action, subject) {
if (action.id == "org.freedesktop.udisks2.filesystem-mount-system" &&
subject.isInGroup("wheel")) {
return polkit.Result.YES;
}
});
'';
# Nix fun
nixpkgs.config.allowUnfree = true;
nix.settings.experimental-features = [ "flakes" "nix-command" ];
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
time.timeZone = "Europe/Berlin";
programs.nix-ld.enable = true; # Linking support
@@ -16,7 +43,9 @@
services.avahi.enable = true;
services.avahi.nssmdns4 = true;
environment = { systemPackages = with pkgs; [ xorg.xrandr git starship zoxide rsync ]; };
environment = {
systemPackages = with pkgs; [ yazi tmux git starship zoxide rsync xorg.libX11.dev rclone neovim alacritty gtk4.dev ];
};
nix.optimise.automatic = true;
@@ -43,4 +72,6 @@
[ "history-substring-search" "git" "zoxide" "vi-mode" "systemadmin" ];
};
};
programs.ydotool.enable = true;
}

View File

@@ -0,0 +1,28 @@
{ config, pkgs, ... }:
let
user = "jonas";
uid = "1000";
in {
systemd.user.services.hyprshade-toggle = {
description = "Toggle Hyprshade grayscale";
enable = true;
serviceConfig = {
Type = "oneshot";
ExecStart = "${pkgs.bash}/bin/bash /home/${user}/projects/scripts/shell/toggle_grayscale.sh";
Environment = ''
PATH=/home/jonas/.nix-profile/bin:/run/current-system/sw/bin:/usr/bin:${pkgs.hyprshade}/bin
'';
};
};
systemd.user.timers.hyprshade-toggle = {
description = "Run hyprshade toggle";
timerConfig = {
OnBootSec = "1min";
OnUnitActiveSec = "3min";
AccuracySec = "30s";
};
wantedBy = [ "timers.target" ];
};
}

View File

@@ -7,6 +7,7 @@
QT_QPA_PLATFORMTHEME = "qt6ct";
QT_STYLE_OVERRIDE = "kvantum";
QT_QPA_PLATFORM = "xcb";
TERM = "alacritty";
};
};
@@ -16,6 +17,7 @@
programs = {
hyprland.enable = true;
niri.enable = true;
firefox.enable = true;
};
}

View File

@@ -6,10 +6,6 @@ in {
enableCuda = mkOption {
type = types.bool;
default = false;
description = ''
Enable CUDA support for Blender and other packages.
Warning: This can cause very long build times.
'';
};
nvidiaOpen = mkOption {
type = types.bool;
@@ -29,16 +25,5 @@ in {
nvidiaSettings = true;
package = config.boot.kernelPackages.nvidiaPackages.stable;
};
# Apply CUDA-specific settings if enabled
nixpkgs.config.cudaSupport = config.enableCuda;
hardware.enableAllFirmware = true;
environment.systemPackages = (if config.enableCuda then
[
(pkgs.blender.override { cudaSupport = true; })
]
else
[ ]);
};
}

View File

@@ -1,37 +0,0 @@
{ inputs, ... }:
{
imports = [ inputs.xremap-flake.nixosModules.default ];
services.xremap = {
withHypr = true;
userName = "jonas";
config = {
modmap = [
{
name = "Capslock to esc and ctrl";
remap = {
"CAPSLOCK" = {
"alone" = "ESC";
"held" = "CTRL_L";
};
"ESC" = "CAPSLOCK";
};
}
{
name = "Switch super and alt";
remap = {
"SUPER_L" = {
"alone" = "ALT_L";
"held" = "ALT_L";
};
"ALT_L" = {
"alone" = "SUPER_L";
"held" = "SUPER_L";
};
};
}
];
};
};
}

View File

@@ -1,10 +0,0 @@
{ ... }:
{
imports = [ ../hardware/nvidia.nix ];
services.ollama = {
enable = true;
acceleration = "cuda";
};
}

View File

@@ -6,4 +6,6 @@
hardware.sane.extraBackends = [ pkgs.sane-airscan ];
hardware.sane.disabledDefaultBackends = [ "escl" ];
services.udev.packages = [ pkgs.sane-airscan ];
services.printing.enable = true;
}

View File

@@ -1,5 +0,0 @@
{ ... }:
{
services.printing.enable = true;
}

View File

@@ -1,34 +0,0 @@
{ ... }:
{
# For web mounting
services.davfs2.enable = true;
# Load the secret
sops = {
secrets = {
webdav_authstring = {
mode = "0600";
path = "/etc/davfs2/secrets";
};
};
};
systemd.mounts = [{
description = "Webdav mount point";
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
what = "https://dav.hahn1.one";
where = "/webdav";
type = "davfs";
options = "uid=1000,gid=1000,file_mode=0664,dir_mode=2775,_netdev";
mountConfig.TimeoutSec = "5s";
}];
systemd.automounts = [{
description = "Webdav automount";
where = "/webdav";
wantedBy = [ "multi-user.target" ];
automountConfig = { TimeoutIdleSec = "2m"; };
}];
}

View File

@@ -3,8 +3,6 @@
{
imports = [ ./packages.nix ];
services.gnome-keyring.enable = true;
xdg.mimeApps = {
enable = true;
defaultApplications = {
@@ -20,6 +18,46 @@
};
};
# Enable and configure the gnome terminal for the nemo file manager
programs.gnome-terminal = {
enable = true;
showMenubar = false;
themeVariant = "dark";
profile."17ef1520-f08d-403f-b033-d8ccee6b01f9" = {
visibleName = "MainHome";
transparencyPercent = 60;
font = "FiraCode Nerd Font 12"; # Fira is installed on the system by the nixos config
default = true;
audibleBell = false;
cursorBlinkMode = "off";
colors = {
backgroundColor = "#1d1d1d";
cursor = {
foreground = "#1d1d1d"; # text inside cursor
background = "#ffb86c"; # light orange block
};
foregroundColor = "#f7f6ec";
palette = [ "#343835" "#ce3e60" "#7bb75b" "#e8b32a" "#4c99d3" "#a57fc4" "#389aac" "#f9faf6"
"#585a58" "#d18ea6" "#767e2b" "#77592e" "#337879" "#7f5190" "#76bbca" "#b1b5ae" ];
};
};
};
services.udiskie = {
enable = true;
notify = true;
automount = true;
tray = "auto";
settings = {
# workaround for
# https://github.com/nix-community/home-manager/issues/632
program_options = {
# replace with your favorite file manager
file_manager = "${pkgs.nemo-with-extensions}/bin/nemo";
};
};
};
xdg.desktopEntries.fehcustom = {
name = "FehCustom";
terminal = false;
@@ -37,6 +75,7 @@
};
};
# Theming for ease of use of gui apps
gtk = {
enable = true;
iconTheme = {
@@ -48,21 +87,25 @@
package = pkgs.gnome-themes-extra;
};
};
qt = {
enable = true;
platformTheme.name = "qtct";
style.name = "Kvantum";
style.name = "kvantum";
};
xdg.configFile."Kvantum/kvantum.kvconfig".source =
(pkgs.formats.ini { }).generate "kvantum.kvconfig" {
General.theme = "Catppuccin-Frappe-Rosewater";
General.theme = "KvAdaptaDark";
};
xdg.configFile."qt6ct/qt6ct.conf".source = pkgs.writeTextFile {
name = "qt6ct.conf";
text =
" [Appearance]\n color_scheme_path=${pkgs.qt6ct}/share/qt6ct/colors/airy.conf\n custom_palette=false\n icon_theme=Papirus-Dark\n standard_dialogs=default\n style=kvantum\n";
''
[Appearance]
icon_theme=Papirus-Dark
style=kvantum
standard_dialogs=default
'';
};
programs.starship = {
@@ -83,5 +126,5 @@
# Let Home Manager install and manage itself.
programs.home-manager.enable = true;
home.stateVersion = "24.11";
home.stateVersion = "24.11"; # Dont change
}

View File

@@ -2,185 +2,167 @@
{
home.packages = with pkgs; [
weechat
clang
libcxx
just
deno
########################################
# GUI #
########################################
# --- Core GUI ---
alacritty
ffmpeg
pavucontrol
iamb
sdkmanager
air
nmap
wakeonlan
wiki-tui
ansible
terraform
android-tools
kitty
vscode
libreoffice
unstable.sioyek
zathura
qalculate-qt
# --- Communication & Internet ---
discord
thunderbird
tor-browser
unstable.signal-desktop
qbittorrent
ausweisapp
nextcloud-client
owncloud-client
spotify
# --- Media & Desktop Tools ---
simple-scan
obsidian
rclone
sops
gimp
audio-recorder
cheese
age
git-lfs
tor
torsocks
w3m
timer
qbittorrent
discord
blender
audacity
zoom-us
vlc
thunderbird
mpv
obsidian
obs-studio
prismlauncher
inkscape
rnote
nemo-with-extensions
xournalpp
anki
shotcut
hyprshot # All the hypr stuff
hyprpicker
hyprlock
hypridle
hyprshade
hyprsunset
hyprpaper
todo-txt-cli
systemctl-tui
acpi
waybar
dunst
networkmanagerapplet
pavucontrol
feh
watson
slides
imagemagick
xdragon
luarocks
gradle
openjdk
findutils.locate
ethtool
qalculate-qt
wl-clip-persist
btop
fastfetch
zathura
eza
dragon-drop
tofi
fuzzel
networkmanagerapplet
gdu
hyprpaper
tokei
fzf
glibc
gnumake
ninja
cmake
meson
lld
########################################
# CLI #
########################################
vscode-langservers-extracted
clang
clang-tools # Provides clangd
go
bitwarden-desktop
libinput
cudaPackages.cudatoolkit
ydotool
input-remapper
ausweisapp
spotify
pgadmin4
dig
lazydocker
libtool
love
lua
zig
cargo
tor-browser
bitwarden-cli
rpi-imager
cppcheck
lazygit
nodejs
# --- Essentials & Navigation ---
ripgrep
signal-desktop
unison
php
intelephense
trash-cli
# Full haskell development environment
haskellPackages.ghc
haskellPackages.cabal-install
haskellPackages.stack
haskellPackages.hoogle
haskellPackages.haskell-language-server
python3
fd
ttyper
zoxide
vim
tofi
gcr # Keyring
fzf
eza
bat
dunst
killall
libreoffice
perl
pipx
waybar
stow
brightnessctl
anki
unstable.typst
mediainfo
powertop
exiftool
curl
sioyek
xournalpp
rnote
vim
unstable.neovim
unstable.zellij
unstable.helix
unstable.jujutsu
jjui
uv
nap
emacs
hyprshot
hyprpicker
hyprsunset
inotify-tools
stow
wl-clipboard
mpv
gitui
keepassxc
kitty
unstable.yazi
neovim
htop
alpine
wget
tmux
wl-clip-persist
killall
trash-cli
file
zip
xz
unzip
file
gnupg
# --- System & Network ---
btop
iotop
fastfetch
acpi
brightnessctl
ethtool
findutils
nmap
wakeonlan
tor
torsocks
w3m
curl
wget
libinput
mtr
gdu
timer
nix-output-monitor
# --- Productivity & Misc ---
just
todo-txt-cli
typst
systemctl-tui
wiki-tui
watson
slides
imagemagick
immich-cli
parted
lsof
tt
bitwarden-cli
lazydocker
poppler-utils
unstable.kmonad
xorg.setxkbmap
prismlauncher
entr
yq
lazygit
gitui
tokei
dig
unstable.yazi
# --- Languages & Package Managers ---
python3
nodejs
go
lua
luarocks
deno
pipx
gradle
openjdk
# --- Build Tools ---
#clang
gcc
clang-tools
gnumake
cmake
ninja
meson
lld
# --- DevOps & Versioning ---
git-lfs
sops
age
ecryptfs
ansible
android-tools
sdkmanager
air
vscode-langservers-extracted
];
}

View File

@@ -2,14 +2,19 @@
{
users.defaultUserShell = pkgs.zsh;
users.groups = { uinput = {}; };
users.users = {
jonas = {
isNormalUser = true;
uid = 1000;
extraGroups = [
"docker"
"input"
"uinput"
"scanner"
"lp"
"dialout"
"uucp"
"davfs2"
"wheel"
"ydotool"