Compare commits

..

24 Commits

Author SHA1 Message Date
92456379d1 auto up 01:59:32 up 0:01, 2 users, load average: 0.71, 0.35, 0.13 2025-11-21 01:59:34 +01:00
3d411b7667 auto up 01:53:18 up 0:06, 2 users, load average: 0.90, 0.66, 0.33 2025-11-21 01:53:20 +01:00
36fab75201 auto up 01:47:18 up 0:00, 2 users, load average: 1.77, 0.41, 0.13 2025-11-21 01:47:39 +01:00
3fb80233b6 Full kmonad 2025-11-21 00:16:29 +01:00
0183a2a3b8 Remove all 2025-11-20 21:05:46 +01:00
cb0286ac07 Have kmonad as a seperate service not managed by nixos 2025-11-20 21:01:54 +01:00
4addd84301 First test 2025-11-20 20:48:23 +01:00
dc1e64865f auto up 11:49:23 up 0:19, 2 users, load average: 0.09, 0.27, 0.37 2025-11-20 11:49:25 +01:00
0274f875c4 auto up 15:03:56 up 0:02, 2 users, load average: 0.32, 0.20, 0.09 2025-11-19 15:03:58 +01:00
4cb53654c9 auto up 23:01:45 up 8:51, 2 users, load average: 0.57, 0.67, 0.74 2025-11-16 23:01:47 +01:00
b6a66eaa4d auto up 16:24:24 up 1:02, 2 users, load average: 0.54, 0.27, 0.10 2025-11-14 16:24:26 +01:00
2668919af5 auto up 11:12:59 up 0:20, 2 users, load average: 0.61, 0.62, 0.36 2025-11-06 11:13:01 +01:00
725e46b62d auto up 10:53:19 up 0:00, 2 users, load average: 1.01, 0.25, 0.08 2025-11-06 10:53:20 +01:00
1f67fd271e auto up 02:38:43 up 0:05, 3 users, load average: 0.52, 0.53, 0.25 2025-11-06 02:38:44 +01:00
d073da6b38 auto up 01:59:20 up 7:21, 2 users, load average: 0.17, 0.29, 0.37 2025-11-06 01:59:21 +01:00
4729da1505 auto up 01:08:17 up 6:30, 2 users, load average: 0.62, 0.57, 0.51 2025-11-06 01:08:18 +01:00
0ada014d4a auto up 00:24:13 up 0:32, 2 users, load average: 0.84, 0.77, 0.74 2025-11-02 00:24:15 +01:00
c574bf8e0f auto up 2025-11-01 23:13:42 +01:00
4e000023c7 Add grayscale 2025-11-01 21:44:23 +01:00
a8fdabe1d8 Better filemanager 2025-10-30 09:24:23 +01:00
0d1d0018ff Nextcloud 2025-10-17 12:08:07 +02:00
f7533d4ffa Some improves 2025-10-17 09:31:17 +02:00
2ea3065c4f Updates 2025-10-15 23:04:43 +02:00
f8557c66ea Minimal with flake update 2025-10-14 11:09:14 +02:00
20 changed files with 337 additions and 1024 deletions

695
flake.lock generated
View File

@@ -1,132 +1,5 @@
{
"nodes": {
"aquamarine": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751740947,
"narHash": "sha256-35040CHH7P3JGmhGVfEb2oJHL/A5mI2IXumhkxrBnao=",
"owner": "hyprwm",
"repo": "aquamarine",
"rev": "dfc1db15a08c4cd234288f66e1199c653495301f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "aquamarine",
"type": "github"
}
},
"crane": {
"locked": {
"lastModified": 1751562746,
"narHash": "sha256-smpugNIkmDeicNz301Ll1bD7nFOty97T79m4GUMUczA=",
"owner": "ipetkov",
"repo": "crane",
"rev": "aed2020fd3dc26e1e857d4107a5a67a33ab6c1fd",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"devshell": {
"inputs": {
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1741473158,
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
"owner": "numtide",
"repo": "devshell",
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "devshell",
"type": "github"
}
},
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1751413152,
"narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"pre-commit-hooks",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
@@ -134,11 +7,11 @@
]
},
"locked": {
"lastModified": 1756245065,
"narHash": "sha256-aAZNbGcWrVRZgWgkQbkabSGcDVRDMgON4BipMy69gvI=",
"lastModified": 1758463745,
"narHash": "sha256-uhzsV0Q0I9j2y/rfweWeGif5AWe0MGrgZ/3TjpDYdGA=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "54b2879ce622d44415e727905925e21b8f833a98",
"rev": "3b955f5f0a942f9f60cdc9cacb7844335d0f21c3",
"type": "github"
},
"original": {
@@ -148,312 +21,13 @@
"type": "github"
}
},
"home-manager_2": {
"inputs": {
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1751990210,
"narHash": "sha256-krWErNDl9ggMLSfK00Q2BcoSk3+IRTSON/DiDgUzzMw=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "218da00bfa73f2a61682417efe74549416c16ba6",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"hyprcursor": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749155331,
"narHash": "sha256-XR9fsI0zwLiFWfqi/pdS/VD+YNorKb3XIykgTg4l1nA=",
"owner": "hyprwm",
"repo": "hyprcursor",
"rev": "45fcc10b4c282746d93ec406a740c43b48b4ef80",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprcursor",
"type": "github"
}
},
"hyprgraphics": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751808145,
"narHash": "sha256-OXgL0XaKMmfX2rRQkt9SkJw+QNfv0jExlySt1D6O72g=",
"owner": "hyprwm",
"repo": "hyprgraphics",
"rev": "b841473a0bd4a1a74a0b64f1ec2ab199035c349f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprgraphics",
"type": "github"
}
},
"hyprland": {
"inputs": {
"aquamarine": "aquamarine",
"hyprcursor": "hyprcursor",
"hyprgraphics": "hyprgraphics",
"hyprland-protocols": "hyprland-protocols",
"hyprland-qtutils": "hyprland-qtutils",
"hyprlang": "hyprlang",
"hyprutils": "hyprutils",
"hyprwayland-scanner": "hyprwayland-scanner",
"nixpkgs": "nixpkgs_4",
"pre-commit-hooks": "pre-commit-hooks",
"systems": "systems",
"xdph": "xdph"
},
"locked": {
"lastModified": 1751995875,
"narHash": "sha256-ud9sl1RjmzAzalH2ocmGPs182xvr7GktjVIYvzJamwo=",
"owner": "hyprwm",
"repo": "Hyprland",
"rev": "9517d0eaa4ef93de67dc80fecca7a826f7ad556d",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "Hyprland",
"type": "github"
}
},
"hyprland-protocols": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1749046714,
"narHash": "sha256-kymV5FMnddYGI+UjwIw8ceDjdeg7ToDVjbHCvUlhn14=",
"owner": "hyprwm",
"repo": "hyprland-protocols",
"rev": "613878cb6f459c5e323aaafe1e6f388ac8a36330",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-protocols",
"type": "github"
}
},
"hyprland-qt-support": {
"inputs": {
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"systems"
]
},
"locked": {
"lastModified": 1749154592,
"narHash": "sha256-DO7z5CeT/ddSGDEnK9mAXm1qlGL47L3VAHLlLXoCjhE=",
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"rev": "4c8053c3c888138a30c3a6c45c2e45f5484f2074",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qt-support",
"type": "github"
}
},
"hyprland-qtutils": {
"inputs": {
"hyprland-qt-support": "hyprland-qt-support",
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprland-qtutils",
"hyprlang",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371812,
"narHash": "sha256-D868K1dVEACw17elVxRgXC6hOxY+54wIEjURztDWLk8=",
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"rev": "b13c7481e37856f322177010bdf75fccacd1adc8",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-qtutils",
"type": "github"
}
},
"hyprlang": {
"inputs": {
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1750371198,
"narHash": "sha256-/iuJ1paQOBoSLqHflRNNGyroqfF/yvPNurxzcCT0cAE=",
"owner": "hyprwm",
"repo": "hyprlang",
"rev": "cee01452bca58d6cadb3224e21e370de8bc20f0b",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprlang",
"type": "github"
}
},
"hyprutils": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751888065,
"narHash": "sha256-F2SV9WGqgtRsXIdUrl3sRe0wXlQD+kRRZcSfbepjPJY=",
"owner": "hyprwm",
"repo": "hyprutils",
"rev": "a8229739cf36d159001cfc203871917b83fdf917",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprutils",
"type": "github"
}
},
"hyprwayland-scanner": {
"inputs": {
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751881472,
"narHash": "sha256-meB0SnXbwIe2trD041MLKEv6R7NZ759QwBcVIhlSBfE=",
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"rev": "8fb426b3e5452fd9169453fd6c10f8c14ca37120",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1756469547,
"narHash": "sha256-YvtD2E7MYsQ3r7K9K2G7nCslCKMPShoSEAtbjHLtH0k=",
"lastModified": 1760139962,
"narHash": "sha256-4xggC56Rub3WInz5eD7EZWXuLXpNvJiUPahGtMkwtuc=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "41d292bfc37309790f70f4c120b79280ce40af16",
"rev": "7e297ddff44a3cc93673bb38d0374df8d0ad73e4",
"type": "github"
},
"original": {
@@ -462,28 +36,13 @@
"type": "indirect"
}
},
"nixpkgs-lib": {
"locked": {
"lastModified": 1751159883,
"narHash": "sha256-urW/Ylk9FIfvXfliA1ywh75yszAbiTEVgpPeinFyVZo=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "14a40a1d7fb9afa4739275ac642ed7301a9ba1ab",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1756542300,
"narHash": "sha256-tlOn88coG5fzdyqz6R93SQL5Gpq+m/DsWpekNFhqPQk=",
"lastModified": 1760284886,
"narHash": "sha256-TK9Kr0BYBQ/1P5kAsnNQhmWWKgmZXwUQr4ZMjCzWf2c=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "d7600c775f877cd87b4f5a831c28aa94137377aa",
"rev": "cf3f5c4def3c7b5f1fc012b3d839575dbe552d43",
"type": "github"
},
"original": {
@@ -492,117 +51,12 @@
"type": "indirect"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1722073938,
"narHash": "sha256-OpX0StkL8vpXyWOGUD6G+MA26wAXK6SpT94kLJXo6B4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "e36e9f57337d0ff0cf77aceb58af4c805472bfae",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1751637120,
"narHash": "sha256-xVNy/XopSfIG9c46nRmPaKfH1Gn/56vQ8++xWA8itO4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5c724ed1388e53cc231ed98330a60eb2f7be4be3",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": {
"lastModified": 1751792365,
"narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_5": {
"locked": {
"lastModified": 1751949589,
"narHash": "sha256-mgFxAPLWw0Kq+C8P3dRrZrOYEQXOtKuYVlo9xvPntt8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9b008d60392981ad674e04016d25619281550a9d",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_6": {
"locked": {
"lastModified": 1747958103,
"narHash": "sha256-qmmFCrfBwSHoWw7cVK4Aj+fns+c54EBP8cGqp/yK410=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "fe51d34885f7b5e3e7b59572796e1bcb427eccb1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"pre-commit-hooks": {
"inputs": {
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
]
},
"locked": {
"lastModified": 1750779888,
"narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"root": {
"inputs": {
"home-manager": "home-manager",
"nixpkgs": "nixpkgs",
"nixpkgs-unstable": "nixpkgs-unstable",
"sops-nix": "sops-nix",
"xremap-flake": "xremap-flake"
"sops-nix": "sops-nix"
}
},
"sops-nix": {
@@ -612,11 +66,11 @@
]
},
"locked": {
"lastModified": 1754988908,
"narHash": "sha256-t+voe2961vCgrzPFtZxha0/kmFSHFobzF00sT8p9h0U=",
"lastModified": 1760393368,
"narHash": "sha256-8mN3kqyqa2PKY0wwZ2UmMEYMcxvNTwLaOrrDsw6Qi4E=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "3223c7a92724b5d804e9988c6b447a0d09017d48",
"rev": "ab8d56e85b8be14cff9d93735951e30c3e86a437",
"type": "github"
},
"original": {
@@ -624,129 +78,6 @@
"repo": "sops-nix",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": "nixpkgs_6"
},
"locked": {
"lastModified": 1750931469,
"narHash": "sha256-0IEdQB1nS+uViQw4k3VGUXntjkDp7aAlqcxdewb/hAc=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "ac8e6f32e11e9c7f153823abc3ab007f2a65d3e1",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
},
"xdph": {
"inputs": {
"hyprland-protocols": [
"xremap-flake",
"hyprland",
"hyprland-protocols"
],
"hyprlang": [
"xremap-flake",
"hyprland",
"hyprlang"
],
"hyprutils": [
"xremap-flake",
"hyprland",
"hyprutils"
],
"hyprwayland-scanner": [
"xremap-flake",
"hyprland",
"hyprwayland-scanner"
],
"nixpkgs": [
"xremap-flake",
"hyprland",
"nixpkgs"
],
"systems": [
"xremap-flake",
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1751300244,
"narHash": "sha256-PFuv1TZVYvQhha0ac53E3YgdtmLShrN0t4T6xqHl0jE=",
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"rev": "6115f3fdcb2c1a57b4a80a69f3c797e47607b90a",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"type": "github"
}
},
"xremap": {
"flake": false,
"locked": {
"lastModified": 1752020210,
"narHash": "sha256-yRYffVAqSriU3AebfL1JFIKP9gUSTq5OC8CyyBTx9KQ=",
"owner": "k0kubun",
"repo": "xremap",
"rev": "a00d6ad9e7a180f6b641b8188f53a8c66ae8379a",
"type": "github"
},
"original": {
"owner": "k0kubun",
"ref": "v0.10.13",
"repo": "xremap",
"type": "github"
}
},
"xremap-flake": {
"inputs": {
"crane": "crane",
"devshell": "devshell",
"flake-parts": "flake-parts",
"home-manager": "home-manager_2",
"hyprland": "hyprland",
"nixpkgs": "nixpkgs_5",
"treefmt-nix": "treefmt-nix",
"xremap": "xremap"
},
"locked": {
"lastModified": 1752027487,
"narHash": "sha256-240ngBRC7SbAwpWqbkZzHXwc3wA3U4fLPJwjRg8+Fqg=",
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
},
"original": {
"owner": "xremap",
"repo": "nix-flake",
"rev": "8001f37b1ffe86e76b62f36afadee2f4acf90e70",
"type": "github"
}
}
},
"root": "root",

View File

@@ -14,11 +14,9 @@
url = "github:nix-community/home-manager/release-25.05";
inputs.nixpkgs.follows = "nixpkgs";
};
xremap-flake.url =
"github:xremap/nix-flake?rev=8001f37b1ffe86e76b62f36afadee2f4acf90e70"; # One commit behind head
};
# Understand what everything does
outputs =
{ self, nixpkgs, nixpkgs-unstable, sops-nix, home-manager, ... }@inputs:
let

View File

@@ -9,44 +9,49 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
# This is buggy right now
#./../../modules/services/webdav.nix
# Not working right now due to nvidia problems
# It worked fine on another machine thats why I am wondering
#./../../modules/services/ai.nix
./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/hardware/nvidia.nix
./../../modules/hardware/boot.nix
./../../modules/hardware/xremap.nix
];
networking.hostName = "minoxy";
enableCuda = false;
systemd.targets.sleep.enable = true;
systemd.targets.suspend.enable = true;
programs.ydotool.enable = true;
services.input-remapper.enable = true;
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/8CEA-13E3"; # use lsblk -f
fsType = "exfat";
options = [ "defaults" "uid=1000" "gid=100" "umask=000" ];
};
# Testing
#environment.etc."mnt/jousb".source = "/mnt/jousb"; # ensures directory exists
#services.udev.extraRules = ''
# ACTION=="add", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.mount}/bin/mount /dev/disk/by-label/JOUSB /mnt/jousb"
# ACTION=="remove", SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="JOUSB", RUN+="${pkgs.umount}/bin/umount /mnt/jousb"
#'';
virtualisation.docker.enable = true;
# Add file systems
boot.supportedFilesystems = [ "ntfs" "exfat" ];
# Hide the windows disk in the file explorer
services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
SUBSYSTEM=="block", ENV{ID_FS_UUID}=="A09C8D5E9C8D2FB8", ENV{UDISKS_IGNORE}="1"
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
# TODO: Make all your working systems go to ext4 on the full disk for ease of use and storage
virtualisation.docker.storageDriver = "btrfs";
security.sudo.extraConfig = ''
# Sudoers config goes here
'';
services = {
syncthing = {
enable = true;
user = "jonas";
dataDir = "/home/jonas/Syncthing"; # Default folder for new synced folders
configDir = "/home/jonas/.config/syncthing"; # Folder for Syncthing's settings and keys
};
};
networking.extraHosts = ''
127.0.0.1 jonas.local
'';
fonts.fontDir.enable = true;
# Never change this!
system.stateVersion = "25.05";
}

View File

@@ -4,41 +4,45 @@
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
boot.initrd.availableKernelModules =
[ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.kernelModules = [ "uinput" "kvm-intel" "ecryptfs" ];
boot.extraModulePackages = [ ];
# FUll btrfs config
fileSystems."/" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/home" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/shared" = {
device = "/dev/disk/by-uuid/8CEA-13E3"; # use lsblk -f
fsType = "exfat";
options = [ "defaults" "uid=1000" "gid=100" "umask=000" ];
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/3091-F0BF";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
# FUll btrfs config
fileSystems."/" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=root" ];
};
fileSystems."/home" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/nix" = {
device = "/dev/disk/by-uuid/e52b1440-66f3-4129-b3c0-fba3491e2bbc";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/3091-F0BF";
fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; }
];
[{ device = "/dev/disk/by-uuid/3e591e27-c6c5-4e28-900b-f899bc3d5e70"; }];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
@@ -49,5 +53,6 @@
# networking.interfaces.wlp112s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
hardware.cpu.intel.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -9,16 +9,14 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix
./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix
./../../modules/graphics/workstation.nix
#./../../modules/services/webdav.nix
./../../modules/services/scanning.nix
./../../modules/graphics/grayscale.nix
./../../modules/services/printer.nix
];
networking.hostName = "nixyos";

View File

@@ -9,7 +9,7 @@
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "sd_mod" "rtsx_usb_sdmmc" ];
boot.kernelModules = [ "kvm-intel" ];
boot.kernelModules = [ "kvm-intel" "ecryptfs" ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/881615c5-5c12-46c5-8bd2-1959f9347980";

View File

@@ -9,33 +9,27 @@
./../../modules/essential.nix
./../../modules/common/sops.nix
./../../modules/hardware/xremap.nix
./../../modules/hardware/boot.nix
./../../modules/graphics/workstation.nix
./../../modules/graphics/grayscale.nix
./../../modules/laptop/powersave.nix
./../../modules/laptop/battery.nix
#./../../modules/services/webdav.nix
./../../modules/services/scanning.nix
./../../modules/services/printer.nix
];
networking.hostName = "thinix";
batMode = "double";
# Cannot have this and tlp
#services.power-profiles-daemon.enable = true;
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
swapDevices = [{
device = "/swapfile";
size = 4096;
}];
system.stateVersion = "24.11";
services.udev.extraRules = ''
# Ignore internal NVMe Windows partition
KERNEL=="uinput", MODE="0660", GROUP="uinput", OPTIONS+="static_node=uinput"
'';
system.stateVersion = "24.11"; # Dont change this
}

View File

@@ -8,6 +8,7 @@
[ (modulesPath + "/installer/scan/not-detected.nix")
];
#boot.kernelModules = [ "ecryptfs" ];
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" ];
fileSystems = {

View File

@@ -5,10 +5,37 @@
services.locate.enable = true;
services.openssh.enable = true;
hardware.enableAllFirmware = true;
services = {
udisks2.enable = true;
gvfs.enable = true;
};
security.polkit.enable = true;
security.pam.services.login.enableGnomeKeyring = true;
services.gnome.gnome-keyring.enable = true;
#security.pam.enableEcryptfs = true;
security.polkit.extraConfig = ''
polkit.addRule(function(action, subject) {
if (action.id == "org.freedesktop.udisks2.filesystem-mount-system" &&
subject.isInGroup("wheel")) {
return polkit.Result.YES;
}
});
'';
# Nix fun
nixpkgs.config.allowUnfree = true;
nix.settings.experimental-features = [ "flakes" "nix-command" ];
programs.gnupg.agent = {
enable = true;
pinentryPackage = with pkgs; pinentry-all;
enableSSHSupport = true;
};
time.timeZone = "Europe/Berlin";
programs.nix-ld.enable = true; # Linking support
@@ -16,7 +43,9 @@
services.avahi.enable = true;
services.avahi.nssmdns4 = true;
environment = { systemPackages = with pkgs; [ xorg.xrandr git starship zoxide rsync ]; };
environment = {
systemPackages = with pkgs; [ yazi tmux git starship zoxide rsync xorg.libX11.dev rclone neovim alacritty gtk4.dev ];
};
nix.optimise.automatic = true;
@@ -43,4 +72,6 @@
[ "history-substring-search" "git" "zoxide" "vi-mode" "systemadmin" ];
};
};
programs.ydotool.enable = true;
}

View File

@@ -0,0 +1,28 @@
{ config, pkgs, ... }:
let
user = "jonas";
uid = "1000";
in {
systemd.user.services.hyprshade-toggle = {
description = "Toggle Hyprshade grayscale";
enable = true;
serviceConfig = {
Type = "oneshot";
ExecStart = "${pkgs.bash}/bin/bash /home/${user}/projects/scripts/shell/toggle_grayscale.sh";
Environment = ''
PATH=/home/jonas/.nix-profile/bin:/run/current-system/sw/bin:/usr/bin:${pkgs.hyprshade}/bin
'';
};
};
systemd.user.timers.hyprshade-toggle = {
description = "Run hyprshade toggle";
timerConfig = {
OnBootSec = "1min";
OnUnitActiveSec = "3min";
AccuracySec = "30s";
};
wantedBy = [ "timers.target" ];
};
}

View File

@@ -7,6 +7,7 @@
QT_QPA_PLATFORMTHEME = "qt6ct";
QT_STYLE_OVERRIDE = "kvantum";
QT_QPA_PLATFORM = "xcb";
TERM = "alacritty";
};
};

View File

@@ -6,10 +6,6 @@ in {
enableCuda = mkOption {
type = types.bool;
default = false;
description = ''
Enable CUDA support for Blender and other packages.
Warning: This can cause very long build times.
'';
};
nvidiaOpen = mkOption {
type = types.bool;
@@ -29,16 +25,5 @@ in {
nvidiaSettings = true;
package = config.boot.kernelPackages.nvidiaPackages.stable;
};
# Apply CUDA-specific settings if enabled
nixpkgs.config.cudaSupport = config.enableCuda;
hardware.enableAllFirmware = true;
environment.systemPackages = (if config.enableCuda then
[
(pkgs.blender.override { cudaSupport = true; })
]
else
[ ]);
};
}

View File

@@ -1,37 +0,0 @@
{ inputs, ... }:
{
imports = [ inputs.xremap-flake.nixosModules.default ];
services.xremap = {
withHypr = true;
userName = "jonas";
config = {
modmap = [
{
name = "Capslock to esc and ctrl";
remap = {
"CAPSLOCK" = {
"alone" = "ESC";
"held" = "CTRL_L";
};
"ESC" = "CAPSLOCK";
};
}
{
name = "Switch super and alt";
remap = {
"SUPER_L" = {
"alone" = "ALT_L";
"held" = "ALT_L";
};
"ALT_L" = {
"alone" = "SUPER_L";
"held" = "SUPER_L";
};
};
}
];
};
};
}

View File

@@ -1,10 +0,0 @@
{ ... }:
{
imports = [ ../hardware/nvidia.nix ];
services.ollama = {
enable = true;
acceleration = "cuda";
};
}

View File

@@ -6,4 +6,6 @@
hardware.sane.extraBackends = [ pkgs.sane-airscan ];
hardware.sane.disabledDefaultBackends = [ "escl" ];
services.udev.packages = [ pkgs.sane-airscan ];
services.printing.enable = true;
}

View File

@@ -1,5 +0,0 @@
{ ... }:
{
services.printing.enable = true;
}

View File

@@ -1,34 +0,0 @@
{ ... }:
{
# For web mounting
services.davfs2.enable = true;
# Load the secret
sops = {
secrets = {
webdav_authstring = {
mode = "0600";
path = "/etc/davfs2/secrets";
};
};
};
systemd.mounts = [{
description = "Webdav mount point";
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
what = "https://dav.hahn1.one";
where = "/webdav";
type = "davfs";
options = "uid=1000,gid=1000,file_mode=0664,dir_mode=2775,_netdev";
mountConfig.TimeoutSec = "5s";
}];
systemd.automounts = [{
description = "Webdav automount";
where = "/webdav";
wantedBy = [ "multi-user.target" ];
automountConfig = { TimeoutIdleSec = "2m"; };
}];
}

View File

@@ -3,8 +3,6 @@
{
imports = [ ./packages.nix ];
services.gnome-keyring.enable = true;
xdg.mimeApps = {
enable = true;
defaultApplications = {
@@ -20,6 +18,46 @@
};
};
# Enable and configure the gnome terminal for the nemo file manager
programs.gnome-terminal = {
enable = true;
showMenubar = false;
themeVariant = "dark";
profile."17ef1520-f08d-403f-b033-d8ccee6b01f9" = {
visibleName = "MainHome";
transparencyPercent = 60;
font = "FiraCode Nerd Font 12"; # Fira is installed on the system by the nixos config
default = true;
audibleBell = false;
cursorBlinkMode = "off";
colors = {
backgroundColor = "#1d1d1d";
cursor = {
foreground = "#1d1d1d"; # text inside cursor
background = "#ffb86c"; # light orange block
};
foregroundColor = "#f7f6ec";
palette = [ "#343835" "#ce3e60" "#7bb75b" "#e8b32a" "#4c99d3" "#a57fc4" "#389aac" "#f9faf6"
"#585a58" "#d18ea6" "#767e2b" "#77592e" "#337879" "#7f5190" "#76bbca" "#b1b5ae" ];
};
};
};
services.udiskie = {
enable = true;
notify = true;
automount = true;
tray = "auto";
settings = {
# workaround for
# https://github.com/nix-community/home-manager/issues/632
program_options = {
# replace with your favorite file manager
file_manager = "${pkgs.nemo-with-extensions}/bin/nemo";
};
};
};
xdg.desktopEntries.fehcustom = {
name = "FehCustom";
terminal = false;
@@ -37,6 +75,7 @@
};
};
# Theming for ease of use of gui apps
gtk = {
enable = true;
iconTheme = {
@@ -48,21 +87,25 @@
package = pkgs.gnome-themes-extra;
};
};
qt = {
enable = true;
platformTheme.name = "qtct";
style.name = "Kvantum";
style.name = "kvantum";
};
xdg.configFile."Kvantum/kvantum.kvconfig".source =
(pkgs.formats.ini { }).generate "kvantum.kvconfig" {
General.theme = "Catppuccin-Frappe-Rosewater";
General.theme = "KvAdaptaDark";
};
xdg.configFile."qt6ct/qt6ct.conf".source = pkgs.writeTextFile {
name = "qt6ct.conf";
text =
" [Appearance]\n color_scheme_path=${pkgs.qt6ct}/share/qt6ct/colors/airy.conf\n custom_palette=false\n icon_theme=Papirus-Dark\n standard_dialogs=default\n style=kvantum\n";
''
[Appearance]
icon_theme=Papirus-Dark
style=kvantum
standard_dialogs=default
'';
};
programs.starship = {
@@ -83,5 +126,5 @@
# Let Home Manager install and manage itself.
programs.home-manager.enable = true;
home.stateVersion = "24.11";
home.stateVersion = "24.11"; # Dont change
}

View File

@@ -2,185 +2,159 @@
{
home.packages = with pkgs; [
weechat
clang
libcxx
just
deno
########################################
# GUI #
########################################
# --- Core GUI ---
alacritty
ffmpeg
pavucontrol
iamb
sdkmanager
air
nmap
wakeonlan
wiki-tui
ansible
terraform
android-tools
kitty
vscode
libreoffice
unstable.sioyek
zathura
qalculate-qt
# --- Communication & Internet ---
discord
thunderbird
tor-browser
unstable.signal-desktop
qbittorrent
ausweisapp
nextcloud-client
spotify
# --- Media & Desktop Tools ---
simple-scan
obsidian
rclone
sops
gimp
audio-recorder
cheese
age
git-lfs
tor
torsocks
w3m
timer
qbittorrent
discord
blender
audacity
zoom-us
vlc
thunderbird
mpv
obsidian
obs-studio
prismlauncher
inkscape
rnote
nemo-with-extensions
xournalpp
anki
shotcut
hyprshot # All the hypr stuff
hyprpicker
hyprlock
hypridle
hyprshade
hyprsunset
hyprpaper
todo-txt-cli
systemctl-tui
acpi
waybar
dunst
networkmanagerapplet
pavucontrol
feh
watson
slides
imagemagick
xdragon
luarocks
gradle
openjdk
findutils.locate
ethtool
qalculate-qt
wl-clip-persist
btop
fastfetch
zathura
eza
tofi
fuzzel
networkmanagerapplet
gdu
hyprpaper
tokei
fzf
glibc
gnumake
ninja
cmake
meson
lld
########################################
# CLI #
########################################
vscode-langservers-extracted
clang
clang-tools # Provides clangd
go
bitwarden-desktop
libinput
cudaPackages.cudatoolkit
ydotool
input-remapper
ausweisapp
spotify
pgadmin4
dig
lazydocker
libtool
love
lua
zig
cargo
tor-browser
bitwarden-cli
rpi-imager
cppcheck
lazygit
nodejs
# --- Essentials & Navigation ---
ripgrep
signal-desktop
unison
php
intelephense
trash-cli
# Full haskell development environment
haskellPackages.ghc
haskellPackages.cabal-install
haskellPackages.stack
haskellPackages.hoogle
haskellPackages.haskell-language-server
python3
fd
ttyper
zoxide
vim
tofi
gcr # Keyring
fzf
eza
bat
dunst
killall
libreoffice
perl
pipx
waybar
stow
brightnessctl
anki
unstable.typst
mediainfo
powertop
exiftool
curl
sioyek
xournalpp
rnote
vim
unstable.neovim
emacs
hyprshot
hyprpicker
hyprsunset
inotify-tools
stow
wl-clipboard
mpv
gitui
keepassxc
kitty
unstable.yazi
neovim
htop
alpine
wget
tmux
wl-clip-persist
killall
trash-cli
file
zip
xz
unzip
file
gnupg
# --- System & Network ---
btop
iotop
fastfetch
acpi
brightnessctl
ethtool
findutils
nmap
wakeonlan
tor
torsocks
w3m
curl
wget
libinput
mtr
gdu
timer
nix-output-monitor
# --- Productivity & Misc ---
just
todo-txt-cli
typst
systemctl-tui
wiki-tui
watson
slides
imagemagick
immich-cli
parted
lsof
tt
bitwarden-cli
lazydocker
poppler_utils
unstable.kmonad
xorg.setxkbmap
prismlauncher
entr
yq
lazygit
gitui
tokei
dig
unstable.yazi
# --- Languages & Package Managers ---
python3
nodejs
go
lua
luarocks
deno
pipx
gradle
openjdk
# --- Build Tools ---
clang
clang-tools
gnumake
cmake
ninja
meson
lld
# --- DevOps & Versioning ---
git-lfs
sops
age
ecryptfs
ansible
android-tools
sdkmanager
air
vscode-langservers-extracted
];
}

View File

@@ -2,12 +2,15 @@
{
users.defaultUserShell = pkgs.zsh;
users.groups = { uinput = {}; };
users.users = {
jonas = {
isNormalUser = true;
uid = 1000;
extraGroups = [
"docker"
"input"
"uinput"
"scanner"
"lp"
"davfs2"