mirror of
https://codeberg.org/leana8959/.files.git
synced 2025-12-06 14:49:14 +00:00
tree-wide: format with nixfmt
Another saturday another useless formatter change. It's my dotfiles, after all alejandra doesn't handle c-style inline comments well.
This commit is contained in:
parent
ec704b5272
commit
ebf8468807
116 changed files with 1895 additions and 1689 deletions
17
default.nix
17
default.nix
|
|
@ -1,22 +1,27 @@
|
||||||
{sources ? import ./npins}: {
|
{
|
||||||
|
sources ? import ./npins,
|
||||||
|
}:
|
||||||
|
{
|
||||||
# for repl sessions
|
# for repl sessions
|
||||||
inherit sources;
|
inherit sources;
|
||||||
lib = import (sources.nixpkgs + "/lib");
|
lib = import (sources.nixpkgs + "/lib");
|
||||||
|
|
||||||
nixosConfigurations = builtins.mapAttrs (_: import (sources.nixpkgs + "/nixos/lib/eval-config.nix")) {
|
nixosConfigurations =
|
||||||
|
builtins.mapAttrs (_: import (sources.nixpkgs + "/nixos/lib/eval-config.nix"))
|
||||||
|
{
|
||||||
vanadium = {
|
vanadium = {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
modules = [./nix/configurations/vanadium.nix];
|
modules = [ ./nix/configurations/vanadium.nix ];
|
||||||
};
|
};
|
||||||
hydrogen = {
|
hydrogen = {
|
||||||
system = "aarch64-linux";
|
system = "aarch64-linux";
|
||||||
modules = [./nix/configurations/hydrogen.nix];
|
modules = [ ./nix/configurations/hydrogen.nix ];
|
||||||
};
|
};
|
||||||
installer = {
|
installer = {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
modules = [./nix/configurations/installer.nix];
|
modules = [ ./nix/configurations/installer.nix ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
packages = import ./nix/packages {inherit sources;};
|
packages = import ./nix/packages { inherit sources; };
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -4,15 +4,17 @@ let
|
||||||
hostname = "hydrogen";
|
hostname = "hydrogen";
|
||||||
username = "leana";
|
username = "leana";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
modulesPath,
|
modulesPath,
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (lib.modules) mkAliasOptionModule;
|
inherit (lib.modules) mkAliasOptionModule;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
# The generator and hardware configuration
|
# The generator and hardware configuration
|
||||||
(modulesPath + "/installer/sd-card/sd-image-aarch64.nix")
|
(modulesPath + "/installer/sd-card/sd-image-aarch64.nix")
|
||||||
|
|
@ -20,13 +22,13 @@ in
|
||||||
#
|
#
|
||||||
# Shorthands
|
# Shorthands
|
||||||
#
|
#
|
||||||
(mkAliasOptionModule ["me"] ["users" "users" username])
|
(mkAliasOptionModule [ "me" ] [ "users" "users" username ])
|
||||||
(mkAliasOptionModule ["hm"] ["home-manager" "users" username])
|
(mkAliasOptionModule [ "hm" ] [ "home-manager" "users" username ])
|
||||||
|
|
||||||
#
|
#
|
||||||
# hostname
|
# hostname
|
||||||
#
|
#
|
||||||
{_module.args = {inherit hostname;};}
|
{ _module.args = { inherit hostname; }; }
|
||||||
|
|
||||||
#
|
#
|
||||||
# nixpkgs
|
# nixpkgs
|
||||||
|
|
@ -85,14 +87,14 @@ in
|
||||||
home-manager = {
|
home-manager = {
|
||||||
useGlobalPkgs = true;
|
useGlobalPkgs = true;
|
||||||
useUserPackages = true;
|
useUserPackages = true;
|
||||||
sharedModules = [{home.stateVersion = lib.mkDefault config.system.stateVersion;}];
|
sharedModules = [ { home.stateVersion = lib.mkDefault config.system.stateVersion; } ];
|
||||||
};
|
};
|
||||||
|
|
||||||
hm.imports = [
|
hm.imports = [
|
||||||
#
|
#
|
||||||
# hostname
|
# hostname
|
||||||
#
|
#
|
||||||
{_module.args = {inherit hostname;};}
|
{ _module.args = { inherit hostname; }; }
|
||||||
|
|
||||||
#
|
#
|
||||||
# home modules
|
# home modules
|
||||||
|
|
@ -133,4 +135,4 @@ in
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
home.packages = [
|
home.packages = [
|
||||||
pkgs.nil # nix
|
pkgs.nil # nix
|
||||||
pkgs.pyright # python
|
pkgs.pyright # python
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,13 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
home.sessionVariables = let
|
{
|
||||||
|
home.sessionVariables =
|
||||||
|
let
|
||||||
fishCfg = config.programs.fish;
|
fishCfg = config.programs.fish;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
"SHELL" = lib.mkIf fishCfg.enable (lib.getExe fishCfg.package);
|
"SHELL" = lib.mkIf fishCfg.enable (lib.getExe fishCfg.package);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
users.users.root.openssh.authorizedKeys.keys = import ../../../identities.nix;
|
users.users.root.openssh.authorizedKeys.keys = import ../../../identities.nix;
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
|
|
@ -22,13 +23,12 @@
|
||||||
userControlled.enable = true;
|
userControlled.enable = true;
|
||||||
secretsFile = config.age.secrets.wpa_password.path;
|
secretsFile = config.age.secrets.wpa_password.path;
|
||||||
scanOnLowSignal = false;
|
scanOnLowSignal = false;
|
||||||
networks = let
|
networks =
|
||||||
|
let
|
||||||
fromList = import ../../../networks/wpa_supplicant-compat.nix;
|
fromList = import ../../../networks/wpa_supplicant-compat.nix;
|
||||||
networks = import ../../../networks/list.nix;
|
networks = import ../../../networks/list.nix;
|
||||||
in
|
in
|
||||||
fromList (
|
fromList (builtins.filter (x: x.ssid == "~") networks);
|
||||||
builtins.filter (x: x.ssid == "~") networks
|
|
||||||
);
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -13,8 +13,7 @@
|
||||||
# modprobe: FATAL: Module sun4i-drm not found in directory /nix/store/gvvwpdckzcr4iamp1iyrqw3nzb7bg6c4-linux-rpi-6.6.51-stable_20241008-modules/lib/modules/6.6.51
|
# modprobe: FATAL: Module sun4i-drm not found in directory /nix/store/gvvwpdckzcr4iamp1iyrqw3nzb7bg6c4-linux-rpi-6.6.51-stable_20241008-modules/lib/modules/6.6.51
|
||||||
nixpkgs.overlays = [
|
nixpkgs.overlays = [
|
||||||
(final: prev: {
|
(final: prev: {
|
||||||
makeModulesClosure = x:
|
makeModulesClosure = x: prev.makeModulesClosure (x // { allowMissing = true; });
|
||||||
prev.makeModulesClosure (x // {allowMissing = true;});
|
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
pkgs.man-pages
|
pkgs.man-pages
|
||||||
pkgs.man-pages-posix
|
pkgs.man-pages-posix
|
||||||
|
|
|
||||||
|
|
@ -9,7 +9,8 @@
|
||||||
lib,
|
lib,
|
||||||
modulesPath,
|
modulesPath,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
../nixosModules/common/system-nixconf.nix
|
../nixosModules/common/system-nixconf.nix
|
||||||
../nixosModules/common/sudo-conf.nix
|
../nixosModules/common/sudo-conf.nix
|
||||||
|
|
@ -18,10 +19,15 @@
|
||||||
];
|
];
|
||||||
|
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
extra-substituters = ["https://leana8959.cachix.org"];
|
extra-substituters = [ "https://leana8959.cachix.org" ];
|
||||||
extra-trusted-substituters = ["https://leana8959.cachix.org"];
|
extra-trusted-substituters = [ "https://leana8959.cachix.org" ];
|
||||||
extra-trusted-public-keys = ["leana8959.cachix.org-1:CxQSAp8lcgMv8Me459of0jdXRW2tcyeYRKTiiUq8z0M="];
|
extra-trusted-public-keys = [
|
||||||
experimental-features = ["nix-command" "flakes"];
|
"leana8959.cachix.org-1:CxQSAp8lcgMv8Me459of0jdXRW2tcyeYRKTiiUq8z0M="
|
||||||
|
];
|
||||||
|
experimental-features = [
|
||||||
|
"nix-command"
|
||||||
|
"flakes"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
nixpkgs = {
|
nixpkgs = {
|
||||||
|
|
@ -45,7 +51,7 @@
|
||||||
pkgs.btop
|
pkgs.btop
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [8080]; # in case you wanna nc
|
networking.firewall.allowedTCPPorts = [ 8080 ]; # in case you wanna nc
|
||||||
|
|
||||||
programs.tmux.enable = true;
|
programs.tmux.enable = true;
|
||||||
users.users.nixos.shell = pkgs.fish;
|
users.users.nixos.shell = pkgs.fish;
|
||||||
|
|
|
||||||
|
|
@ -5,25 +5,27 @@ let
|
||||||
hostname = "vanadium";
|
hostname = "vanadium";
|
||||||
username = "leana";
|
username = "leana";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (lib.modules) mkAliasOptionModule;
|
inherit (lib.modules) mkAliasOptionModule;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
#
|
#
|
||||||
# Shorthands
|
# Shorthands
|
||||||
#
|
#
|
||||||
(mkAliasOptionModule ["me"] ["users" "users" username])
|
(mkAliasOptionModule [ "me" ] [ "users" "users" username ])
|
||||||
(mkAliasOptionModule ["hm"] ["home-manager" "users" username])
|
(mkAliasOptionModule [ "hm" ] [ "home-manager" "users" username ])
|
||||||
|
|
||||||
#
|
#
|
||||||
# hostname
|
# hostname
|
||||||
#
|
#
|
||||||
{_module.args = {inherit hostname;};}
|
{ _module.args = { inherit hostname; }; }
|
||||||
|
|
||||||
#
|
#
|
||||||
# nixpkgs
|
# nixpkgs
|
||||||
|
|
@ -135,14 +137,14 @@ in
|
||||||
home-manager = {
|
home-manager = {
|
||||||
useGlobalPkgs = true;
|
useGlobalPkgs = true;
|
||||||
useUserPackages = true;
|
useUserPackages = true;
|
||||||
sharedModules = [{home.stateVersion = lib.mkDefault config.system.stateVersion;}];
|
sharedModules = [ { home.stateVersion = lib.mkDefault config.system.stateVersion; } ];
|
||||||
};
|
};
|
||||||
|
|
||||||
hm.imports = [
|
hm.imports = [
|
||||||
#
|
#
|
||||||
# hostname
|
# hostname
|
||||||
#
|
#
|
||||||
{_module.args = {inherit hostname;};}
|
{ _module.args = { inherit hostname; }; }
|
||||||
|
|
||||||
#
|
#
|
||||||
# home modules
|
# home modules
|
||||||
|
|
@ -226,4 +228,4 @@ in
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,8 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
home.packages = [
|
home.packages = [
|
||||||
# preview markdown
|
# preview markdown
|
||||||
pkgs.python3Packages.grip
|
pkgs.python3Packages.grip
|
||||||
|
|
@ -42,7 +43,8 @@
|
||||||
"haskell/cabal"
|
"haskell/cabal"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
includes = let
|
includes =
|
||||||
|
let
|
||||||
fromList = import ../../../git-identities/git-compat.nix;
|
fromList = import ../../../git-identities/git-compat.nix;
|
||||||
identities = import ../../../git-identities/list.nix;
|
identities = import ../../../git-identities/list.nix;
|
||||||
in
|
in
|
||||||
|
|
|
||||||
|
|
@ -2,9 +2,11 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (pkgs) nur;
|
inherit (pkgs) nur;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
programs.firefox = {
|
programs.firefox = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
|
|
@ -106,9 +108,11 @@ in {
|
||||||
font-family: monospace;
|
font-family: monospace;
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
extensions.packages = let
|
extensions.packages =
|
||||||
|
let
|
||||||
addons = nur.repos.rycee.firefox-addons;
|
addons = nur.repos.rycee.firefox-addons;
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
addons.sponsorblock
|
addons.sponsorblock
|
||||||
addons.return-youtube-dislikes
|
addons.return-youtube-dislikes
|
||||||
addons.consent-o-matic
|
addons.consent-o-matic
|
||||||
|
|
@ -117,15 +121,16 @@ in {
|
||||||
|
|
||||||
junk = {
|
junk = {
|
||||||
id = 1;
|
id = 1;
|
||||||
inherit
|
inherit (config.programs.firefox.profiles.default)
|
||||||
(config.programs.firefox.profiles.default)
|
|
||||||
settings
|
settings
|
||||||
userChrome
|
userChrome
|
||||||
;
|
;
|
||||||
|
|
||||||
extensions.packages = let
|
extensions.packages =
|
||||||
|
let
|
||||||
addons = nur.repos.rycee.firefox-addons;
|
addons = nur.repos.rycee.firefox-addons;
|
||||||
in [addons.multi-account-containers];
|
in
|
||||||
|
[ addons.multi-account-containers ];
|
||||||
|
|
||||||
containers = {
|
containers = {
|
||||||
raisin = {
|
raisin = {
|
||||||
|
|
@ -144,15 +149,16 @@ in {
|
||||||
# Isolate it because it's proprietary
|
# Isolate it because it's proprietary
|
||||||
tampermonkey = {
|
tampermonkey = {
|
||||||
id = 2;
|
id = 2;
|
||||||
inherit
|
inherit (config.programs.firefox.profiles.default)
|
||||||
(config.programs.firefox.profiles.default)
|
|
||||||
settings
|
settings
|
||||||
userChrome
|
userChrome
|
||||||
;
|
;
|
||||||
|
|
||||||
extensions.packages = let
|
extensions.packages =
|
||||||
|
let
|
||||||
addons = nur.repos.rycee.firefox-addons;
|
addons = nur.repos.rycee.firefox-addons;
|
||||||
in [addons.tampermonkey];
|
in
|
||||||
|
[ addons.tampermonkey ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,19 +1,23 @@
|
||||||
{
|
{
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
nixosConfig ? {},
|
nixosConfig ? { },
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
#
|
#
|
||||||
# fonts
|
# fonts
|
||||||
#
|
#
|
||||||
fonts.fontconfig = {
|
fonts.fontconfig = {
|
||||||
enable = true;
|
enable = true;
|
||||||
defaultFonts = lib.mapAttrsRecursive (_: v: v ++ ["Last Resort"]) {
|
defaultFonts = lib.mapAttrsRecursive (_: v: v ++ [ "Last Resort" ]) {
|
||||||
sansSerif = ["Ubuntu" "Noto Sans CJK TC"];
|
sansSerif = [
|
||||||
serif = ["Noto Serif CJK TC"];
|
"Ubuntu"
|
||||||
monospace = ["Iosevka"];
|
"Noto Sans CJK TC"
|
||||||
emoji = ["Noto Color Emoji"];
|
];
|
||||||
|
serif = [ "Noto Serif CJK TC" ];
|
||||||
|
monospace = [ "Iosevka" ];
|
||||||
|
emoji = [ "Noto Color Emoji" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
home.packages = [
|
home.packages = [
|
||||||
|
|
@ -39,8 +43,7 @@
|
||||||
x11.enable = true;
|
x11.enable = true;
|
||||||
gtk.enable = true;
|
gtk.enable = true;
|
||||||
|
|
||||||
inherit
|
inherit (nixosConfig.services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme)
|
||||||
(nixosConfig.services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme)
|
|
||||||
name
|
name
|
||||||
package
|
package
|
||||||
size
|
size
|
||||||
|
|
@ -55,7 +58,7 @@
|
||||||
xdg.mimeApps = {
|
xdg.mimeApps = {
|
||||||
enable = true;
|
enable = true;
|
||||||
defaultApplications = {
|
defaultApplications = {
|
||||||
"x-scheme-handler/mailto" = ["org.gnome.Evolution.desktop"];
|
"x-scheme-handler/mailto" = [ "org.gnome.Evolution.desktop" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,14 +3,17 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
home.sessionPath = [
|
home.sessionPath = [
|
||||||
"${config.home.homeDirectory}/.local/bin"
|
"${config.home.homeDirectory}/.local/bin"
|
||||||
];
|
];
|
||||||
|
|
||||||
home.sessionVariables = let
|
home.sessionVariables =
|
||||||
|
let
|
||||||
fishCfg = config.programs.fish;
|
fishCfg = config.programs.fish;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
"SHELL" = lib.mkIf fishCfg.enable (lib.getExe fishCfg.package);
|
"SHELL" = lib.mkIf fishCfg.enable (lib.getExe fishCfg.package);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -37,9 +40,7 @@
|
||||||
# lol
|
# lol
|
||||||
pkgs.macchanger
|
pkgs.macchanger
|
||||||
|
|
||||||
/*
|
# The file picker is not ergonomic enough, sadly
|
||||||
The file picker is not ergonomic enough, sadly
|
|
||||||
*/
|
|
||||||
# pkgs.helix
|
# pkgs.helix
|
||||||
# pkgs.nushell
|
# pkgs.nushell
|
||||||
|
|
||||||
|
|
@ -172,7 +173,7 @@
|
||||||
|
|
||||||
gnome-keyring = {
|
gnome-keyring = {
|
||||||
enable = true;
|
enable = true;
|
||||||
components = ["secrets"];
|
components = [ "secrets" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,7 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
home.packages = let
|
{
|
||||||
|
home.packages =
|
||||||
|
let
|
||||||
inherit (pkgs) lib;
|
inherit (pkgs) lib;
|
||||||
|
|
||||||
ghc = pkgs.haskellPackages.ghc.withPackages (haskellPackages: [
|
ghc = pkgs.haskellPackages.ghc.withPackages (haskellPackages: [
|
||||||
|
|
@ -8,14 +10,20 @@
|
||||||
|
|
||||||
wrapped-xmobar = pkgs.symlinkJoin {
|
wrapped-xmobar = pkgs.symlinkJoin {
|
||||||
name = "xmobar";
|
name = "xmobar";
|
||||||
paths = [pkgs.xmobar];
|
paths = [ pkgs.xmobar ];
|
||||||
buildInputs = [pkgs.makeWrapper];
|
buildInputs = [ pkgs.makeWrapper ];
|
||||||
postBuild = ''
|
postBuild = ''
|
||||||
wrapProgram $out/bin/xmobar \
|
wrapProgram $out/bin/xmobar \
|
||||||
--prefix PATH : "${lib.makeBinPath [ghc pkgs.libnotify]}"
|
--prefix PATH : "${
|
||||||
|
lib.makeBinPath [
|
||||||
|
ghc
|
||||||
|
pkgs.libnotify
|
||||||
|
]
|
||||||
|
}"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
wrapped-xmobar
|
wrapped-xmobar
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,8 @@
|
||||||
final: prev: let
|
final: prev:
|
||||||
|
let
|
||||||
inherit (final) lib;
|
inherit (final) lib;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
linuxPackages = final.linuxPackagesFor (
|
linuxPackages = final.linuxPackagesFor (
|
||||||
prev.linuxPackages.kernel.override {
|
prev.linuxPackages.kernel.override {
|
||||||
# TODO: The error message is quite unintuitive, maybe improve it?
|
# TODO: The error message is quite unintuitive, maybe improve it?
|
||||||
|
|
|
||||||
|
|
@ -5,5 +5,5 @@
|
||||||
jack.enable = true;
|
jack.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
me.extraGroups = ["audio"];
|
me.extraGroups = [ "audio" ];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,12 +3,16 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
# For nautilius and iOS
|
# For nautilius and iOS
|
||||||
services.gvfs.enable = true;
|
services.gvfs.enable = true;
|
||||||
# iOS
|
# iOS
|
||||||
services.usbmuxd.enable = true;
|
services.usbmuxd.enable = true;
|
||||||
environment.systemPackages = with pkgs; [libimobiledevice idevicerestore];
|
environment.systemPackages = with pkgs; [
|
||||||
|
libimobiledevice
|
||||||
|
idevicerestore
|
||||||
|
];
|
||||||
|
|
||||||
# https://unix.stackexchange.com/questions/592775/how-can-i-enable-apple-ios-fast-charge-support
|
# https://unix.stackexchange.com/questions/592775/how-can-i-enable-apple-ios-fast-charge-support
|
||||||
services.udev.extraRules = ''
|
services.udev.extraRules = ''
|
||||||
|
|
@ -34,7 +38,8 @@
|
||||||
userControlled.enable = true;
|
userControlled.enable = true;
|
||||||
secretsFile = config.age.secrets.wpa_password.path;
|
secretsFile = config.age.secrets.wpa_password.path;
|
||||||
scanOnLowSignal = false;
|
scanOnLowSignal = false;
|
||||||
networks = let
|
networks =
|
||||||
|
let
|
||||||
fromList = import ../../../networks/wpa_supplicant-compat.nix;
|
fromList = import ../../../networks/wpa_supplicant-compat.nix;
|
||||||
networks = import ../../../networks/list.nix;
|
networks = import ../../../networks/list.nix;
|
||||||
in
|
in
|
||||||
|
|
|
||||||
|
|
@ -2,13 +2,14 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
#
|
#
|
||||||
# builtin screen
|
# builtin screen
|
||||||
#
|
#
|
||||||
{
|
{
|
||||||
me.extraGroups = ["video"];
|
me.extraGroups = [ "video" ];
|
||||||
programs.light.enable = true;
|
programs.light.enable = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -16,10 +17,10 @@
|
||||||
# external screen
|
# external screen
|
||||||
#
|
#
|
||||||
{
|
{
|
||||||
me.extraGroups = ["i2c"];
|
me.extraGroups = [ "i2c" ];
|
||||||
hardware.i2c.enable = true;
|
hardware.i2c.enable = true;
|
||||||
environment.systemPackages = [pkgs.ddcutil];
|
environment.systemPackages = [ pkgs.ddcutil ];
|
||||||
boot.kernelModules = ["i2c-dev"];
|
boot.kernelModules = [ "i2c-dev" ];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
@ -33,31 +34,38 @@
|
||||||
"20_xmonad" = "${lib.getExe pkgs.haskellPackages.xmonad} --restart"; # make sure feh keeps up
|
"20_xmonad" = "${lib.getExe pkgs.haskellPackages.xmonad} --restart"; # make sure feh keeps up
|
||||||
};
|
};
|
||||||
|
|
||||||
profiles = let
|
profiles =
|
||||||
singleton = k: v: {${k} = v;};
|
let
|
||||||
|
singleton = k: v: { ${k} = v; };
|
||||||
|
|
||||||
fingerprints = {
|
fingerprints = {
|
||||||
built-in = singleton "eDP-1" "00ffffffffffff0009e5ca0b000000002f200104a51c137803de50a3544c99260f505400000001010101010101010101010101010101115cd01881e02d50302036001dbe1000001aa749d01881e02d50302036001dbe1000001a000000fe00424f452043510a202020202020000000fe004e4531333546424d2d4e34310a0073";
|
built-in = singleton "eDP-1" "00ffffffffffff0009e5ca0b000000002f200104a51c137803de50a3544c99260f505400000001010101010101010101010101010101115cd01881e02d50302036001dbe1000001aa749d01881e02d50302036001dbe1000001a000000fe00424f452043510a202020202020000000fe004e4531333546424d2d4e34310a0073";
|
||||||
amethyst = device: singleton device "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";
|
amethyst =
|
||||||
orchid = device: singleton device "00ffffffffffff0004699a24642900002416010380341d782a2ac5a4564f9e280f5054b7ef00714f814081809500b300d1c081c08100023a801871382d40582c450009252100001e000000ff0043394c4d54463031303539360a000000fd00324b185311000a202020202020000000fc00415355532056533234370a20200173020322714f0102031112130414050e0f1d1e1f10230917078301000065030c0010008c0ad08a20e02d10103e9600092521000018011d007251d01e206e28550009252100001e011d00bc52d01e20b828554009252100001e8c0ad090204031200c4055000925210000180000000000000000000000000000000000000000005d";
|
device:
|
||||||
|
singleton device "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";
|
||||||
|
orchid =
|
||||||
|
device:
|
||||||
|
singleton device "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";
|
||||||
};
|
};
|
||||||
|
|
||||||
devices = rec {
|
devices = rec {
|
||||||
built-in = "eDP-1";
|
built-in = "eDP-1";
|
||||||
# Run `xrandr` to see the max number
|
# Run `xrandr` to see the max number
|
||||||
extern = map (portNumber: "DP-${toString portNumber}") (lib.range 1 8);
|
extern = map (portNumber: "DP-${toString portNumber}") (lib.range 1 8);
|
||||||
all = [built-in] ++ extern;
|
all = [ built-in ] ++ extern;
|
||||||
};
|
};
|
||||||
|
|
||||||
switches = {
|
switches = {
|
||||||
setDPI = {dpi}:
|
setDPI =
|
||||||
|
{ dpi }:
|
||||||
singleton "10_xrdb-dpi" "${lib.getExe pkgs.xorg.xrdb} -merge ${pkgs.writeText "xrdb-dpi-config" ''
|
singleton "10_xrdb-dpi" "${lib.getExe pkgs.xorg.xrdb} -merge ${pkgs.writeText "xrdb-dpi-config" ''
|
||||||
Xcursor.size: 64
|
Xcursor.size: 64
|
||||||
Xft.dpi: ${toString dpi}
|
Xft.dpi: ${toString dpi}
|
||||||
''}";
|
''}";
|
||||||
|
|
||||||
# Is scoped to an output device, no need to be called on built-in display
|
# Is scoped to an output device, no need to be called on built-in display
|
||||||
setSoftwareBrightness = {
|
setSoftwareBrightness =
|
||||||
|
{
|
||||||
device, # obtain with `xrandr`
|
device, # obtain with `xrandr`
|
||||||
brightness, # [0..1]
|
brightness, # [0..1]
|
||||||
}:
|
}:
|
||||||
|
|
@ -66,27 +74,35 @@
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Is scoped to an output device, no need to be called on built-in display
|
# Is scoped to an output device, no need to be called on built-in display
|
||||||
setDDCBrightness = {
|
setDDCBrightness =
|
||||||
|
{
|
||||||
modelName, # obtain with `ddcutil detect`
|
modelName, # obtain with `ddcutil detect`
|
||||||
brightness, # [0..1]
|
brightness, # [0..1]
|
||||||
}:
|
}:
|
||||||
singleton "10_ddc_brightness" ''
|
singleton "10_ddc_brightness" ''
|
||||||
${lib.getExe pkgs.ddcutil} --model ${modelName} setvcp 10 ${toString (builtins.floor (brightness * 100))}
|
${lib.getExe pkgs.ddcutil} --model ${modelName} setvcp 10 ${
|
||||||
|
toString (builtins.floor (brightness * 100))
|
||||||
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
setDDCContrast = {
|
setDDCContrast =
|
||||||
|
{
|
||||||
modelName, # obtain with `ddcutil detect`
|
modelName, # obtain with `ddcutil detect`
|
||||||
contrast, # [0..1]
|
contrast, # [0..1]
|
||||||
}:
|
}:
|
||||||
singleton "10_ddc_contrast" ''
|
singleton "10_ddc_contrast" ''
|
||||||
${lib.getExe pkgs.ddcutil} --model ${modelName} setvcp 12 ${toString (builtins.floor (contrast * 100))}
|
${lib.getExe pkgs.ddcutil} --model ${modelName} setvcp 12 ${
|
||||||
|
toString (builtins.floor (contrast * 100))
|
||||||
|
}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
# Note: the "position" field corresponds to the "pos" field outputted by autorandr
|
# Note: the "position" field corresponds to the "pos" field outputted by autorandr
|
||||||
# To get the current config, run `xrandr --auto` and then `autorandr --config`
|
# To get the current config, run `xrandr --auto` and then `autorandr --config`
|
||||||
configs = {
|
configs = {
|
||||||
allOff = lib.genAttrs devices.all (_: {enable = lib.mkDefault false;});
|
allOff = lib.genAttrs devices.all (_: {
|
||||||
|
enable = lib.mkDefault false;
|
||||||
|
});
|
||||||
enableBuiltin = {
|
enableBuiltin = {
|
||||||
eDP-1 = {
|
eDP-1 = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
@ -122,7 +138,7 @@
|
||||||
configs.allOff
|
configs.allOff
|
||||||
configs.enableBuiltin
|
configs.enableBuiltin
|
||||||
];
|
];
|
||||||
hooks.postswitch = switches.setDPI {dpi = 150;};
|
hooks.postswitch = switches.setDPI { dpi = 150; };
|
||||||
};
|
};
|
||||||
|
|
||||||
mkAmethyst = name: {
|
mkAmethyst = name: {
|
||||||
|
|
@ -135,7 +151,7 @@
|
||||||
(configs.enableAmethyst name)
|
(configs.enableAmethyst name)
|
||||||
];
|
];
|
||||||
hooks.postswitch = lib.mkMerge [
|
hooks.postswitch = lib.mkMerge [
|
||||||
(switches.setDPI {dpi = 110;})
|
(switches.setDPI { dpi = 110; })
|
||||||
(switches.setSoftwareBrightness {
|
(switches.setSoftwareBrightness {
|
||||||
device = name;
|
device = name;
|
||||||
brightness = 1;
|
brightness = 1;
|
||||||
|
|
@ -162,7 +178,7 @@
|
||||||
];
|
];
|
||||||
# seems like this display doesn't support DDC
|
# seems like this display doesn't support DDC
|
||||||
hooks.postswitch = lib.mkMerge [
|
hooks.postswitch = lib.mkMerge [
|
||||||
(switches.setDPI {dpi = 100;})
|
(switches.setDPI { dpi = 100; })
|
||||||
(switches.setSoftwareBrightness {
|
(switches.setSoftwareBrightness {
|
||||||
device = name;
|
device = name;
|
||||||
brightness = 0.5;
|
brightness = 0.5;
|
||||||
|
|
@ -171,7 +187,7 @@
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
lib.mkMerge [
|
lib.mkMerge [
|
||||||
{default = frameworkBuiltin;}
|
{ default = frameworkBuiltin; }
|
||||||
(lib.genAttrs' devices.extern (name: lib.nameValuePair "amethyst-${name}" (mkAmethyst name)))
|
(lib.genAttrs' devices.extern (name: lib.nameValuePair "amethyst-${name}" (mkAmethyst name)))
|
||||||
(lib.genAttrs' devices.extern (name: lib.nameValuePair "orchid-${name}" (mkOrchid name)))
|
(lib.genAttrs' devices.extern (name: lib.nameValuePair "orchid-${name}" (mkOrchid name)))
|
||||||
];
|
];
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
services.btrfs.autoScrub = {
|
services.btrfs.autoScrub = {
|
||||||
enable = true;
|
enable = true;
|
||||||
fileSystems = [
|
fileSystems = [
|
||||||
|
|
@ -53,17 +54,19 @@
|
||||||
sgbk /dev/disk/by-uuid/21b5207e-c3cf-49da-b944-fb405ae1eee2 ${config.age.secrets.sgbk_pwd.path} noauto
|
sgbk /dev/disk/by-uuid/21b5207e-c3cf-49da-b944-fb405ae1eee2 ${config.age.secrets.sgbk_pwd.path} noauto
|
||||||
'';
|
'';
|
||||||
|
|
||||||
systemd.mounts = let
|
systemd.mounts =
|
||||||
|
let
|
||||||
bindToCryptDev = dev: {
|
bindToCryptDev = dev: {
|
||||||
what = "/dev/mapper/${dev}";
|
what = "/dev/mapper/${dev}";
|
||||||
where = "/mnt/${dev}";
|
where = "/mnt/${dev}";
|
||||||
unitConfig = {
|
unitConfig = {
|
||||||
Requires = ["systemd-cryptsetup@${dev}.service"];
|
Requires = [ "systemd-cryptsetup@${dev}.service" ];
|
||||||
After = ["systemd-cryptsetup@${dev}.service"];
|
After = [ "systemd-cryptsetup@${dev}.service" ];
|
||||||
PropagatesStopTo = ["systemd-cryptsetup@${dev}.service"];
|
PropagatesStopTo = [ "systemd-cryptsetup@${dev}.service" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
(bindToCryptDev "four")
|
(bindToCryptDev "four")
|
||||||
(bindToCryptDev "two")
|
(bindToCryptDev "two")
|
||||||
(bindToCryptDev "sgbk")
|
(bindToCryptDev "sgbk")
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
services.xserver.windowManager.xmonad = {
|
services.xserver.windowManager.xmonad = {
|
||||||
enable = true;
|
enable = true;
|
||||||
enableContribAndExtras = true;
|
enableContribAndExtras = true;
|
||||||
|
|
|
||||||
|
|
@ -7,15 +7,20 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
modulesPath,
|
modulesPath,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
(modulesPath + "/installer/scan/not-detected.nix")
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = ["nvme" "xhci_pci" "thunderbolt"];
|
boot.initrd.availableKernelModules = [
|
||||||
boot.initrd.kernelModules = ["dm-snapshot"];
|
"nvme"
|
||||||
boot.kernelModules = ["kvm-amd"];
|
"xhci_pci"
|
||||||
boot.extraModulePackages = [];
|
"thunderbolt"
|
||||||
|
];
|
||||||
|
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
||||||
|
boot.kernelModules = [ "kvm-amd" ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,7 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
me.extraGroups = ["scanner"];
|
me.extraGroups = [ "scanner" ];
|
||||||
hardware.sane = {
|
hardware.sane = {
|
||||||
enable = true;
|
enable = true;
|
||||||
brscan5.enable = true;
|
brscan5.enable = true;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{lib, ...}: {
|
{ lib, ... }:
|
||||||
|
{
|
||||||
# https://en.wikipedia.org/wiki/List_of_tz_database_time_zones
|
# https://en.wikipedia.org/wiki/List_of_tz_database_time_zones
|
||||||
# `timedatectl list-timezones`
|
# `timedatectl list-timezones`
|
||||||
time.timeZone = "Asia/Taipei";
|
time.timeZone = "Asia/Taipei";
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{config, ...}: {
|
{ config, ... }:
|
||||||
|
{
|
||||||
system.stateVersion = "24.11";
|
system.stateVersion = "24.11";
|
||||||
|
|
||||||
boot.loader = {
|
boot.loader = {
|
||||||
|
|
@ -16,6 +17,6 @@
|
||||||
|
|
||||||
# Cross building
|
# Cross building
|
||||||
# https://discourse.nixos.org/t/how-do-i-get-my-aarch64-linux-machine-to-build-x86-64-linux-extra-platforms-doesnt-seem-to-work/38106/2?u=leana8959
|
# https://discourse.nixos.org/t/how-do-i-get-my-aarch64-linux-machine-to-build-x86-64-linux-extra-platforms-doesnt-seem-to-work/38106/2?u=leana8959
|
||||||
boot.binfmt.emulatedSystems = ["aarch64-linux"];
|
boot.binfmt.emulatedSystems = [ "aarch64-linux" ];
|
||||||
nix.settings.extra-platforms = config.boot.binfmt.emulatedSystems;
|
nix.settings.extra-platforms = config.boot.binfmt.emulatedSystems;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -2,14 +2,15 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
#
|
#
|
||||||
# Docker
|
# Docker
|
||||||
#
|
#
|
||||||
{
|
{
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
me.extraGroups = ["docker"];
|
me.extraGroups = [ "docker" ];
|
||||||
}
|
}
|
||||||
|
|
||||||
# #
|
# #
|
||||||
|
|
|
||||||
|
|
@ -1,12 +1,15 @@
|
||||||
{config, ...}: {
|
{ config, ... }:
|
||||||
services.restic.backups = let
|
{
|
||||||
|
services.restic.backups =
|
||||||
|
let
|
||||||
pruneOpts = [
|
pruneOpts = [
|
||||||
"--keep-daily 7"
|
"--keep-daily 7"
|
||||||
"--keep-weekly 4"
|
"--keep-weekly 4"
|
||||||
"--keep-monthly 12"
|
"--keep-monthly 12"
|
||||||
"--keep-yearly 10"
|
"--keep-yearly 10"
|
||||||
];
|
];
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
"backblaze" = {
|
"backblaze" = {
|
||||||
paths = [
|
paths = [
|
||||||
"/home/leana/Documents"
|
"/home/leana/Documents"
|
||||||
|
|
@ -59,14 +62,14 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
"two-to-four" = {
|
"two-to-four" = {
|
||||||
paths = ["/mnt/two"];
|
paths = [ "/mnt/two" ];
|
||||||
|
|
||||||
timerConfig = null;
|
timerConfig = null;
|
||||||
|
|
||||||
repository = "/mnt/four/restic";
|
repository = "/mnt/four/restic";
|
||||||
passwordFile = config.age.secrets.restic_four_pwd.path;
|
passwordFile = config.age.secrets.restic_four_pwd.path;
|
||||||
|
|
||||||
exclude = ["lost+found"];
|
exclude = [ "lost+found" ];
|
||||||
|
|
||||||
inherit pruneOpts;
|
inherit pruneOpts;
|
||||||
};
|
};
|
||||||
|
|
@ -77,15 +80,15 @@
|
||||||
# Wait for upstream to introduce direct access to unitConfig
|
# Wait for upstream to introduce direct access to unitConfig
|
||||||
# c.f. https://github.com/NixOS/nixpkgs/pull/368234
|
# c.f. https://github.com/NixOS/nixpkgs/pull/368234
|
||||||
"restic-backups-four" = {
|
"restic-backups-four" = {
|
||||||
requires = ["mnt-four.mount"];
|
requires = [ "mnt-four.mount" ];
|
||||||
after = ["mnt-four.mount"];
|
after = [ "mnt-four.mount" ];
|
||||||
unitConfig.PropagatesStopTo = ["mnt-four.mount"];
|
unitConfig.PropagatesStopTo = [ "mnt-four.mount" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
"restic-backups-sgbk" = {
|
"restic-backups-sgbk" = {
|
||||||
requires = ["mnt-sgbk.mount"];
|
requires = [ "mnt-sgbk.mount" ];
|
||||||
after = ["mnt-sgbk.mount"];
|
after = [ "mnt-sgbk.mount" ];
|
||||||
unitConfig.PropagatesStopTo = ["mnt-sgbk.mount"];
|
unitConfig.PropagatesStopTo = [ "mnt-sgbk.mount" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
"restic-backups-two-to-four" = {
|
"restic-backups-two-to-four" = {
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,8 @@
|
||||||
{lib, ...}: {
|
{ lib, ... }:
|
||||||
|
{
|
||||||
nixpkgs.config.allowUnfreePredicate = lib.mkDefault (
|
nixpkgs.config.allowUnfreePredicate = lib.mkDefault (
|
||||||
pkg: let
|
pkg:
|
||||||
|
let
|
||||||
name = lib.getName pkg;
|
name = lib.getName pkg;
|
||||||
in
|
in
|
||||||
builtins.elem name [
|
builtins.elem name [
|
||||||
|
|
|
||||||
|
|
@ -9,9 +9,9 @@ let
|
||||||
|
|
||||||
infuse = lib.flip infuse-lib.v1.infuse;
|
infuse = lib.flip infuse-lib.v1.infuse;
|
||||||
in
|
in
|
||||||
# Why shouldn't I go crazy with overlays?
|
# Why shouldn't I go crazy with overlays?
|
||||||
final:
|
final:
|
||||||
infuse {
|
infuse {
|
||||||
cmus.__input.alsaSupport = _: false;
|
cmus.__input.alsaSupport = _: false;
|
||||||
|
|
||||||
fish.__input.usePython = _: false;
|
fish.__input.usePython = _: false;
|
||||||
|
|
@ -35,7 +35,8 @@ in
|
||||||
# TODO:
|
# TODO:
|
||||||
# pinned branch of https://github.com/astrand/xclip/tree/xerror
|
# pinned branch of https://github.com/astrand/xclip/tree/xerror
|
||||||
# use this until #43 gets resolved properly
|
# use this until #43 gets resolved properly
|
||||||
xclip.__output.src = _:
|
xclip.__output.src =
|
||||||
|
_:
|
||||||
final.fetchFromGitHub {
|
final.fetchFromGitHub {
|
||||||
owner = "astrand";
|
owner = "astrand";
|
||||||
repo = "xclip";
|
repo = "xclip";
|
||||||
|
|
@ -67,15 +68,16 @@ in
|
||||||
# Backport has failed in upstream currently <https://github.com/NixOS/nixpkgs/pull/457804>,
|
# Backport has failed in upstream currently <https://github.com/NixOS/nixpkgs/pull/457804>,
|
||||||
# might as well patch it while people are blogging about it <https://github.com/Xe/site/pull/1062>
|
# might as well patch it while people are blogging about it <https://github.com/Xe/site/pull/1062>
|
||||||
# Upstream talks about it here https://lists.x.org/archives/xorg-announce/2025-October/003635.html
|
# Upstream talks about it here https://lists.x.org/archives/xorg-announce/2025-October/003635.html
|
||||||
xorg.xorgserver.__output.version = oldVersion: let
|
xorg.xorgserver.__output.version =
|
||||||
|
oldVersion:
|
||||||
|
let
|
||||||
version = "21.1.20";
|
version = "21.1.20";
|
||||||
in
|
in
|
||||||
if oldVersion == version
|
if oldVersion == version then throw "This patch has been merged upstream" else version;
|
||||||
then throw "This patch has been merged upstream"
|
xorg.xorgserver.__output.src =
|
||||||
else version;
|
_:
|
||||||
xorg.xorgserver.__output.src = _:
|
|
||||||
final.fetchurl {
|
final.fetchurl {
|
||||||
url = "mirror://xorg/individual/xserver/xorg-server-21.1.20.tar.xz";
|
url = "mirror://xorg/individual/xserver/xorg-server-21.1.20.tar.xz";
|
||||||
sha256 = "sha256-dpW8YYJLOoG2utL3iwVADKAVAD3kAtGzIhFxBbcC6Tc=";
|
sha256 = "sha256-dpW8YYJLOoG2utL3iwVADKAVAD3kAtGzIhFxBbcC6Tc=";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -4,8 +4,11 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
{pkgs ? import sources.pin-florashell {}}:
|
{
|
||||||
pkgs.mkShell (let
|
pkgs ? import sources.pin-florashell { },
|
||||||
|
}:
|
||||||
|
pkgs.mkShell (
|
||||||
|
let
|
||||||
libs = with pkgs; [
|
libs = with pkgs; [
|
||||||
zlib
|
zlib
|
||||||
libpq
|
libpq
|
||||||
|
|
@ -14,16 +17,21 @@ in
|
||||||
|
|
||||||
hlib = pkgs.haskell.lib;
|
hlib = pkgs.haskell.lib;
|
||||||
|
|
||||||
callHackage = {
|
callHackage =
|
||||||
|
{
|
||||||
name,
|
name,
|
||||||
version,
|
version,
|
||||||
}: let
|
}:
|
||||||
pkg = pkgs.haskell.packages.ghc910.callHackage name version {};
|
let
|
||||||
|
pkg = pkgs.haskell.packages.ghc910.callHackage name version { };
|
||||||
in
|
in
|
||||||
hlib.dontCheck (hlib.doJailbreak pkg);
|
hlib.dontCheck (hlib.doJailbreak pkg);
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
name = "flora";
|
name = "flora";
|
||||||
packages = with pkgs; let
|
packages =
|
||||||
|
with pkgs;
|
||||||
|
let
|
||||||
haskellPackages = haskell.packages.ghc910;
|
haskellPackages = haskell.packages.ghc910;
|
||||||
in
|
in
|
||||||
# These don't build directly and need to be pinned
|
# These don't build directly and need to be pinned
|
||||||
|
|
@ -56,4 +64,5 @@ in
|
||||||
++ libs;
|
++ libs;
|
||||||
|
|
||||||
LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath libs;
|
LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath libs;
|
||||||
})
|
}
|
||||||
|
)
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,10 @@
|
||||||
{pkgs ? import <nixpkgs> {}}: let
|
{
|
||||||
|
pkgs ? import <nixpkgs> { },
|
||||||
|
}:
|
||||||
|
let
|
||||||
inherit (pkgs) lib;
|
inherit (pkgs) lib;
|
||||||
in
|
in
|
||||||
pkgs.mkShell {
|
pkgs.mkShell {
|
||||||
name = "forgejo";
|
name = "forgejo";
|
||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
gnumake
|
gnumake
|
||||||
|
|
@ -14,7 +17,10 @@ in
|
||||||
nodePackages.npm
|
nodePackages.npm
|
||||||
];
|
];
|
||||||
|
|
||||||
LD_LIBRARY_PATH = lib.makeLibraryPath (with pkgs; [
|
LD_LIBRARY_PATH = lib.makeLibraryPath (
|
||||||
|
with pkgs;
|
||||||
|
[
|
||||||
libuuid
|
libuuid
|
||||||
]);
|
]
|
||||||
}
|
);
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,6 @@
|
||||||
{pkgs ? import <nixpkgs> {}}:
|
{
|
||||||
|
pkgs ? import <nixpkgs> { },
|
||||||
|
}:
|
||||||
pkgs.mkShell rec {
|
pkgs.mkShell rec {
|
||||||
name = "haddock2";
|
name = "haddock2";
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,8 +1,11 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
{pkgs ? import sources.pin-masna3shell {}}:
|
{
|
||||||
pkgs.mkShell (let
|
pkgs ? import sources.pin-masna3shell { },
|
||||||
|
}:
|
||||||
|
pkgs.mkShell (
|
||||||
|
let
|
||||||
libs = with pkgs; [
|
libs = with pkgs; [
|
||||||
zlib
|
zlib
|
||||||
libpq
|
libpq
|
||||||
|
|
@ -11,20 +14,22 @@ in
|
||||||
|
|
||||||
hlib = pkgs.haskell.lib;
|
hlib = pkgs.haskell.lib;
|
||||||
|
|
||||||
callHackage = {
|
callHackage =
|
||||||
|
{
|
||||||
name,
|
name,
|
||||||
version,
|
version,
|
||||||
haskellPackages ? pkgs.haskellPackages,
|
haskellPackages ? pkgs.haskellPackages,
|
||||||
}: let
|
}:
|
||||||
pkg = haskellPackages.callHackage name version {};
|
let
|
||||||
|
pkg = haskellPackages.callHackage name version { };
|
||||||
in
|
in
|
||||||
hlib.dontCheck (hlib.doJailbreak pkg);
|
hlib.dontCheck (hlib.doJailbreak pkg);
|
||||||
|
|
||||||
haskellPackages = pkgs.haskell.packages.ghc910;
|
haskellPackages = pkgs.haskell.packages.ghc910;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
name = "masna3";
|
name = "masna3";
|
||||||
packages =
|
packages = [
|
||||||
[
|
|
||||||
pkgs.haskell.packages.ghc9102.ghc
|
pkgs.haskell.packages.ghc9102.ghc
|
||||||
pkgs.haskell.packages.ghc9102.haskell-language-server
|
pkgs.haskell.packages.ghc9102.haskell-language-server
|
||||||
|
|
||||||
|
|
@ -50,4 +55,5 @@ in
|
||||||
++ libs;
|
++ libs;
|
||||||
|
|
||||||
LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath libs;
|
LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath libs;
|
||||||
})
|
}
|
||||||
|
)
|
||||||
|
|
|
||||||
|
|
@ -1,8 +1,12 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
{pkgs ? import sources.pin-necro-man-nixpkgs {}}: let
|
{
|
||||||
shell = {
|
pkgs ? import sources.pin-necro-man-nixpkgs { },
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
shell =
|
||||||
|
{
|
||||||
mkShell,
|
mkShell,
|
||||||
#
|
#
|
||||||
pkgs,
|
pkgs,
|
||||||
|
|
@ -16,8 +20,7 @@ in
|
||||||
python310Packages.pygments
|
python310Packages.pygments
|
||||||
|
|
||||||
(texlive.combine {
|
(texlive.combine {
|
||||||
inherit
|
inherit (texlive)
|
||||||
(texlive)
|
|
||||||
scheme-medium
|
scheme-medium
|
||||||
#
|
#
|
||||||
wrapfig
|
wrapfig
|
||||||
|
|
@ -33,5 +36,5 @@ in
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
pkgs.callPackage shell {}
|
pkgs.callPackage shell { }
|
||||||
|
|
|
||||||
|
|
@ -1,8 +1,10 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
{pkgs ? import sources.pin-vim-tw {}}:
|
{
|
||||||
pkgs.mkShell {
|
pkgs ? import sources.pin-vim-tw { },
|
||||||
|
}:
|
||||||
|
pkgs.mkShell {
|
||||||
name = "vim-tw";
|
name = "vim-tw";
|
||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
haskellPackages.cabal-fmt
|
haskellPackages.cabal-fmt
|
||||||
|
|
@ -11,4 +13,4 @@ in
|
||||||
haskellPackages.haskell-language-server
|
haskellPackages.haskell-language-server
|
||||||
haskellPackages.retrie
|
haskellPackages.retrie
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "vfat";
|
format = "vfat";
|
||||||
mountpoint = "/boot";
|
mountpoint = "/boot";
|
||||||
mountOptions = ["umask=0077"];
|
mountOptions = [ "umask=0077" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -24,7 +24,7 @@
|
||||||
content = {
|
content = {
|
||||||
type = "luks";
|
type = "luks";
|
||||||
name = "crypted";
|
name = "crypted";
|
||||||
extraOpenArgs = [];
|
extraOpenArgs = [ ];
|
||||||
settings.allowDiscards = true;
|
settings.allowDiscards = true;
|
||||||
content = {
|
content = {
|
||||||
type = "lvm_pv";
|
type = "lvm_pv";
|
||||||
|
|
@ -74,12 +74,15 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
"/home" = {
|
"/home" = {
|
||||||
mountOptions = ["compress=zstd"];
|
mountOptions = [ "compress=zstd" ];
|
||||||
mountpoint = "/home";
|
mountpoint = "/home";
|
||||||
};
|
};
|
||||||
|
|
||||||
"/nix" = {
|
"/nix" = {
|
||||||
mountOptions = ["compress=zstd" "noatime"];
|
mountOptions = [
|
||||||
|
"compress=zstd"
|
||||||
|
"noatime"
|
||||||
|
];
|
||||||
mountpoint = "/nix";
|
mountpoint = "/nix";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -18,7 +18,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "vfat";
|
format = "vfat";
|
||||||
mountpoint = "/boot";
|
mountpoint = "/boot";
|
||||||
mountOptions = ["umask=0077"];
|
mountOptions = [ "umask=0077" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
luks = {
|
luks = {
|
||||||
|
|
@ -26,7 +26,7 @@
|
||||||
content = {
|
content = {
|
||||||
type = "luks";
|
type = "luks";
|
||||||
name = "crypted";
|
name = "crypted";
|
||||||
extraOpenArgs = [];
|
extraOpenArgs = [ ];
|
||||||
settings = {
|
settings = {
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
};
|
};
|
||||||
|
|
@ -50,7 +50,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "ext4";
|
format = "ext4";
|
||||||
mountpoint = "/";
|
mountpoint = "/";
|
||||||
mountOptions = ["defaults"];
|
mountOptions = [ "defaults" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
nix = {
|
nix = {
|
||||||
|
|
@ -59,7 +59,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "ext4";
|
format = "ext4";
|
||||||
mountpoint = "/nix";
|
mountpoint = "/nix";
|
||||||
mountOptions = ["noatime"];
|
mountOptions = [ "noatime" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
swap = {
|
swap = {
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "vfat";
|
format = "vfat";
|
||||||
mountpoint = "/boot";
|
mountpoint = "/boot";
|
||||||
mountOptions = ["umask=0077"];
|
mountOptions = [ "umask=0077" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -24,7 +24,7 @@
|
||||||
content = {
|
content = {
|
||||||
type = "luks";
|
type = "luks";
|
||||||
name = "crypted";
|
name = "crypted";
|
||||||
extraOpenArgs = [];
|
extraOpenArgs = [ ];
|
||||||
settings.allowDiscards = true;
|
settings.allowDiscards = true;
|
||||||
content = {
|
content = {
|
||||||
type = "lvm_pv";
|
type = "lvm_pv";
|
||||||
|
|
@ -70,17 +70,20 @@
|
||||||
|
|
||||||
subvolumes = {
|
subvolumes = {
|
||||||
"/root" = {
|
"/root" = {
|
||||||
mountOptions = ["noatime"];
|
mountOptions = [ "noatime" ];
|
||||||
mountpoint = "/";
|
mountpoint = "/";
|
||||||
};
|
};
|
||||||
|
|
||||||
"/home" = {
|
"/home" = {
|
||||||
mountOptions = ["noatime"];
|
mountOptions = [ "noatime" ];
|
||||||
mountpoint = "/home";
|
mountpoint = "/home";
|
||||||
};
|
};
|
||||||
|
|
||||||
"/nix" = {
|
"/nix" = {
|
||||||
mountOptions = ["compress=zstd" "noatime"];
|
mountOptions = [
|
||||||
|
"compress=zstd"
|
||||||
|
"noatime"
|
||||||
|
];
|
||||||
mountpoint = "/nix";
|
mountpoint = "/nix";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -15,7 +15,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "vfat";
|
format = "vfat";
|
||||||
mountpoint = "/boot";
|
mountpoint = "/boot";
|
||||||
mountOptions = ["umask=0077"];
|
mountOptions = [ "umask=0077" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
luks = {
|
luks = {
|
||||||
|
|
@ -23,7 +23,7 @@
|
||||||
content = {
|
content = {
|
||||||
type = "luks";
|
type = "luks";
|
||||||
name = "crypted";
|
name = "crypted";
|
||||||
extraOpenArgs = [];
|
extraOpenArgs = [ ];
|
||||||
settings = {
|
settings = {
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
};
|
};
|
||||||
|
|
@ -47,7 +47,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "ext4";
|
format = "ext4";
|
||||||
mountpoint = "/";
|
mountpoint = "/";
|
||||||
mountOptions = ["defaults"];
|
mountOptions = [ "defaults" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
nix = {
|
nix = {
|
||||||
|
|
@ -56,7 +56,7 @@
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "ext4";
|
format = "ext4";
|
||||||
mountpoint = "/nix";
|
mountpoint = "/nix";
|
||||||
mountOptions = ["noatime"];
|
mountOptions = [ "noatime" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
swap = {
|
swap = {
|
||||||
|
|
|
||||||
|
|
@ -1,14 +1,20 @@
|
||||||
let
|
let
|
||||||
hasconfigRemoteCondition = {
|
hasconfigRemoteCondition =
|
||||||
|
{
|
||||||
# Custom arguments
|
# Custom arguments
|
||||||
url,
|
url,
|
||||||
path ? "*/**",
|
path ? "*/**",
|
||||||
...
|
...
|
||||||
} @ cfg: let
|
}@cfg:
|
||||||
cfg' = builtins.removeAttrs cfg ["url" "path"];
|
let
|
||||||
in [
|
cfg' = builtins.removeAttrs cfg [
|
||||||
(cfg' // {condition = "hasconfig:remote.*.url:git@${url}:${path}";})
|
"url"
|
||||||
(cfg' // {condition = "hasconfig:remote.*.url:https://${url}/${path}";})
|
"path"
|
||||||
|
];
|
||||||
|
in
|
||||||
|
[
|
||||||
|
(cfg' // { condition = "hasconfig:remote.*.url:git@${url}:${path}"; })
|
||||||
|
(cfg' // { condition = "hasconfig:remote.*.url:https://${url}/${path}"; })
|
||||||
];
|
];
|
||||||
in
|
in
|
||||||
builtins.concatMap hasconfigRemoteCondition
|
builtins.concatMap hasconfigRemoteCondition
|
||||||
|
|
|
||||||
|
|
@ -16,7 +16,8 @@ let
|
||||||
blameIgnore = {
|
blameIgnore = {
|
||||||
blame.ignoreRevsFile = ".git-blame-ignore-revs";
|
blame.ignoreRevsFile = ".git-blame-ignore-revs";
|
||||||
};
|
};
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
# Univ stuff
|
# Univ stuff
|
||||||
{
|
{
|
||||||
url = "gitlab.istic.univ-rennes1.fr";
|
url = "gitlab.istic.univ-rennes1.fr";
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
programs.atuin = {
|
programs.atuin = {
|
||||||
flags = ["--disable-up-arrow"];
|
flags = [ "--disable-up-arrow" ];
|
||||||
settings = {
|
settings = {
|
||||||
history_filter = [
|
history_filter = [
|
||||||
# privacy
|
# privacy
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{config, ...}: {
|
{ config, ... }:
|
||||||
|
{
|
||||||
programs.btop = {
|
programs.btop = {
|
||||||
settings.color_theme = "${config.programs.btop.package}/share/btop/themes/onedark.theme";
|
settings.color_theme = "${config.programs.btop.package}/share/btop/themes/onedark.theme";
|
||||||
extraConfig = builtins.readFile ./btop.conf;
|
extraConfig = builtins.readFile ./btop.conf;
|
||||||
|
|
|
||||||
|
|
@ -2,8 +2,10 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
programs.cmus.extraConfig = let
|
{
|
||||||
|
programs.cmus.extraConfig =
|
||||||
|
let
|
||||||
# dispatch to multiple callbacks
|
# dispatch to multiple callbacks
|
||||||
callback-script = pkgs.writeShellApplication {
|
callback-script = pkgs.writeShellApplication {
|
||||||
name = "cmus-callback-script";
|
name = "cmus-callback-script";
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{config, ...}: {
|
{ config, ... }:
|
||||||
|
{
|
||||||
programs.direnv = {
|
programs.direnv = {
|
||||||
nix-direnv.enable = true;
|
nix-direnv.enable = true;
|
||||||
config = {
|
config = {
|
||||||
|
|
|
||||||
|
|
@ -3,9 +3,11 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.i18n.inputMethod;
|
cfg = config.i18n.inputMethod;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
i18n.inputMethod = {
|
i18n.inputMethod = {
|
||||||
fcitx5.addons = [
|
fcitx5.addons = [
|
||||||
pkgs.fcitx5-chinese-addons
|
pkgs.fcitx5-chinese-addons
|
||||||
|
|
|
||||||
|
|
@ -3,11 +3,13 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (pkgs) nur;
|
inherit (pkgs) nur;
|
||||||
|
|
||||||
cfg = config.programs.firefox;
|
cfg = config.programs.firefox;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
programs.firefox = {
|
programs.firefox = {
|
||||||
# https://mozilla.github.io/policy-templates
|
# https://mozilla.github.io/policy-templates
|
||||||
# The following have more complex logic, keep them as policies and not profiles
|
# The following have more complex logic, keep them as policies and not profiles
|
||||||
|
|
@ -19,7 +21,14 @@ in {
|
||||||
];
|
];
|
||||||
|
|
||||||
SearchEngines = {
|
SearchEngines = {
|
||||||
Remove = ["Google" "Bing" "DuckDuckGo" "Qwant" "eBay" "Perplexity"];
|
Remove = [
|
||||||
|
"Google"
|
||||||
|
"Bing"
|
||||||
|
"DuckDuckGo"
|
||||||
|
"Qwant"
|
||||||
|
"eBay"
|
||||||
|
"Perplexity"
|
||||||
|
];
|
||||||
Default = "leta";
|
Default = "leta";
|
||||||
Add = [
|
Add = [
|
||||||
{
|
{
|
||||||
|
|
@ -102,9 +111,11 @@ in {
|
||||||
"media.peerconnection.enabled" = false;
|
"media.peerconnection.enabled" = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
extensions.packages = let
|
extensions.packages =
|
||||||
|
let
|
||||||
addons = nur.repos.rycee.firefox-addons;
|
addons = nur.repos.rycee.firefox-addons;
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
addons.ublock-origin
|
addons.ublock-origin
|
||||||
addons.privacy-badger
|
addons.privacy-badger
|
||||||
addons.user-agent-string-switcher
|
addons.user-agent-string-switcher
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
shellAbbrs = lib.mkMerge [
|
shellAbbrs = lib.mkMerge [
|
||||||
(lib.mkIf pkgs.stdenv.isLinux {
|
(lib.mkIf pkgs.stdenv.isLinux {
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./aliasesAbbrs.nix
|
./aliasesAbbrs.nix
|
||||||
];
|
];
|
||||||
|
|
@ -10,7 +11,7 @@
|
||||||
#
|
#
|
||||||
# Script dependencies
|
# Script dependencies
|
||||||
#
|
#
|
||||||
home.packages = [pkgs.vivid];
|
home.packages = [ pkgs.vivid ];
|
||||||
programs = {
|
programs = {
|
||||||
fd.enable = true;
|
fd.enable = true;
|
||||||
fzf.enable = true;
|
fzf.enable = true;
|
||||||
|
|
@ -24,11 +25,9 @@
|
||||||
#
|
#
|
||||||
# Scripts and functions
|
# Scripts and functions
|
||||||
#
|
#
|
||||||
xdg.configFile =
|
xdg.configFile = lib.mapAttrs' (
|
||||||
lib.mapAttrs'
|
path: _: lib.nameValuePair "fish/functions/${path}" { source = "${./functions}/${path}"; }
|
||||||
(path: _:
|
) (builtins.readDir ./functions);
|
||||||
lib.nameValuePair "fish/functions/${path}" {source = "${./functions}/${path}";})
|
|
||||||
(builtins.readDir ./functions);
|
|
||||||
|
|
||||||
programs.fish = {
|
programs.fish = {
|
||||||
interactiveShellInit = builtins.readFile ./shellInit.fish;
|
interactiveShellInit = builtins.readFile ./shellInit.fish;
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,8 @@
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
# git plugins
|
# git plugins
|
||||||
programs.git = {
|
programs.git = {
|
||||||
lfs.enable = true;
|
lfs.enable = true;
|
||||||
|
|
@ -11,8 +12,7 @@
|
||||||
# known to fail on aarch64-linux
|
# known to fail on aarch64-linux
|
||||||
(lib.mkIf (pkgs.system == "aarch64-linux") (
|
(lib.mkIf (pkgs.system == "aarch64-linux") (
|
||||||
# TODO: investigate this
|
# TODO: investigate this
|
||||||
lib.warn "patdiff has been forcibly disabled because it has previously failed to build"
|
lib.warn "patdiff has been forcibly disabled because it has previously failed to build" lib.mkForce
|
||||||
lib.mkForce
|
|
||||||
false
|
false
|
||||||
))
|
))
|
||||||
(lib.mkDefault true)
|
(lib.mkDefault true)
|
||||||
|
|
@ -20,7 +20,8 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
# 懶惰鬼賴皮
|
# 懶惰鬼賴皮
|
||||||
programs.lazygit = let
|
programs.lazygit =
|
||||||
|
let
|
||||||
patdiffCfg = config.programs.git.patdiff;
|
patdiffCfg = config.programs.git.patdiff;
|
||||||
in
|
in
|
||||||
lib.mkIf patdiffCfg.enable {
|
lib.mkIf patdiffCfg.enable {
|
||||||
|
|
|
||||||
|
|
@ -1,24 +1,26 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
services = {
|
services = {
|
||||||
gpg-agent.defaultCacheTtl = 1209600;
|
gpg-agent.defaultCacheTtl = 1209600;
|
||||||
gpg-agent.pinentry.package = pkgs.pinentry-tty;
|
gpg-agent.pinentry.package = pkgs.pinentry-tty;
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.gpg.publicKeys = let
|
programs.gpg.publicKeys =
|
||||||
fromUrl = {
|
let
|
||||||
|
fromUrl =
|
||||||
|
{
|
||||||
url,
|
url,
|
||||||
hash,
|
hash,
|
||||||
trust ? 5,
|
trust ? 5,
|
||||||
}: {
|
}:
|
||||||
source = pkgs.fetchurl {inherit url hash;};
|
{
|
||||||
|
source = pkgs.fetchurl { inherit url hash; };
|
||||||
inherit trust;
|
inherit trust;
|
||||||
};
|
};
|
||||||
|
|
||||||
github = {user, ...} @ args:
|
github =
|
||||||
fromUrl (
|
{ user, ... }@args:
|
||||||
builtins.removeAttrs args ["user"]
|
fromUrl (builtins.removeAttrs args [ "user" ] // { url = "https://github.com/${user}.gpg"; });
|
||||||
// {url = "https://github.com/${user}.gpg";}
|
|
||||||
);
|
|
||||||
in
|
in
|
||||||
map github [
|
map github [
|
||||||
# Do not depend on my own forgejo instance / self-host server to avoid a single point of failure
|
# Do not depend on my own forgejo instance / self-host server to avoid a single point of failure
|
||||||
|
|
|
||||||
|
|
@ -3,9 +3,11 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.programs.kitty;
|
cfg = config.programs.kitty;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
home.packages = [
|
home.packages = [
|
||||||
pkgs.nerd-fonts.iosevka
|
pkgs.nerd-fonts.iosevka
|
||||||
|
|
|
||||||
|
|
@ -2,9 +2,11 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.programs.lazygit;
|
cfg = config.programs.lazygit;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
programs.tmux.extraConfig = lib.mkIf cfg.enable ''
|
programs.tmux.extraConfig = lib.mkIf cfg.enable ''
|
||||||
bind g run-shell "tmux new-window ${lib.getExe cfg.package}"
|
bind g run-shell "tmux new-window ${lib.getExe cfg.package}"
|
||||||
'';
|
'';
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,12 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
home = {
|
home = {
|
||||||
username = lib.mkDefault "leana";
|
username = lib.mkDefault "leana";
|
||||||
homeDirectory = let
|
homeDirectory =
|
||||||
|
let
|
||||||
inherit (config.home) username;
|
inherit (config.home) username;
|
||||||
in
|
in
|
||||||
lib.mkMerge [
|
lib.mkMerge [
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
nixosConfig ? null,
|
nixosConfig ? null,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
home.language = {
|
home.language = {
|
||||||
base = lib.mkDefault nixosConfig.i18n.defaultLocale or "en_US.UTF-8";
|
base = lib.mkDefault nixosConfig.i18n.defaultLocale or "en_US.UTF-8";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -2,13 +2,13 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
programs = {
|
programs = {
|
||||||
vim.enable = true;
|
vim.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
home.packages =
|
home.packages = [
|
||||||
[
|
|
||||||
pkgs.file
|
pkgs.file
|
||||||
pkgs.gnused
|
pkgs.gnused
|
||||||
pkgs.tree
|
pkgs.tree
|
||||||
|
|
|
||||||
|
|
@ -3,9 +3,11 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.programs.password-store;
|
cfg = config.programs.password-store;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
home.packages = lib.mkIf cfg.enable [
|
home.packages = lib.mkIf cfg.enable [
|
||||||
pkgs.pwgen
|
pkgs.pwgen
|
||||||
pkgs.diceware
|
pkgs.diceware
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
programs.sioyek = {
|
programs.sioyek = {
|
||||||
bindings = {
|
bindings = {
|
||||||
"move_up" = "k";
|
"move_up" = "k";
|
||||||
|
|
@ -17,8 +18,11 @@
|
||||||
"u"
|
"u"
|
||||||
"<C-u>"
|
"<C-u>"
|
||||||
];
|
];
|
||||||
"toggle_two_page_mode" = ["T"];
|
"toggle_two_page_mode" = [ "T" ];
|
||||||
"goto_mark" = ["`" "'"];
|
"goto_mark" = [
|
||||||
|
"`"
|
||||||
|
"'"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
config.should_launch_new_window = "1";
|
config.should_launch_new_window = "1";
|
||||||
|
|
@ -27,7 +31,7 @@
|
||||||
xdg.mimeApps = lib.mkIf config.programs.sioyek.enable {
|
xdg.mimeApps = lib.mkIf config.programs.sioyek.enable {
|
||||||
enable = true;
|
enable = true;
|
||||||
defaultApplications = {
|
defaultApplications = {
|
||||||
"application/pdf" = ["sioyek.desktop"];
|
"application/pdf" = [ "sioyek.desktop" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -2,9 +2,11 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.programs.starship;
|
cfg = config.programs.starship;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
xdg.configFile = lib.mkIf cfg.enable {
|
xdg.configFile = lib.mkIf cfg.enable {
|
||||||
"starship.toml".source = "${./starship.toml}";
|
"starship.toml".source = "${./starship.toml}";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
programs.tmux.extraConfig =
|
programs.tmux.extraConfig =
|
||||||
builtins.readFile ./tmux.conf
|
builtins.readFile ./tmux.conf
|
||||||
+ lib.optionalString pkgs.stdenv.isDarwin ''
|
+ lib.optionalString pkgs.stdenv.isDarwin ''
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,8 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
nix = {
|
nix = {
|
||||||
package = lib.mkDefault (nixosConfig.nix.package or pkgs.nix);
|
package = lib.mkDefault (nixosConfig.nix.package or pkgs.nix);
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,9 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
programs.vim = {
|
programs.vim = {
|
||||||
extraConfig = builtins.readFile ./vimrc;
|
extraConfig = builtins.readFile ./vimrc;
|
||||||
plugins = let
|
plugins =
|
||||||
|
let
|
||||||
vpkgs = pkgs.vimPlugins;
|
vpkgs = pkgs.vimPlugins;
|
||||||
|
|
||||||
paramount = pkgs.vimUtils.buildVimPlugin {
|
paramount = pkgs.vimUtils.buildVimPlugin {
|
||||||
|
|
@ -13,7 +15,8 @@
|
||||||
hash = "sha256-j9nMjKYK7bqrGHprYp0ddLEWs1CNMudxXD13sOROVmY=";
|
hash = "sha256-j9nMjKYK7bqrGHprYp0ddLEWs1CNMudxXD13sOROVmY=";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
vpkgs.vim-sleuth
|
vpkgs.vim-sleuth
|
||||||
vpkgs.vim-surround
|
vpkgs.vim-surround
|
||||||
vpkgs.vim-fugitive
|
vpkgs.vim-fugitive
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
home.packages = [pkgs.iosevka];
|
{
|
||||||
|
home.packages = [ pkgs.iosevka ];
|
||||||
services.wired = {
|
services.wired = {
|
||||||
config = "${./wired.ron}";
|
config = "${./wired.ron}";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,8 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
assertions = [
|
assertions = [
|
||||||
{
|
{
|
||||||
assertion = config.programs.fish.enable;
|
assertion = config.programs.fish.enable;
|
||||||
|
|
@ -22,7 +23,9 @@
|
||||||
WORKTREE_PATH = "wt";
|
WORKTREE_PATH = "wt";
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.direnv.config.whitelist.prefix = [(config.home.sessionVariables.REPO_PATH + "/leana8959")];
|
programs.direnv.config.whitelist.prefix = [
|
||||||
|
(config.home.sessionVariables.REPO_PATH + "/leana8959")
|
||||||
|
];
|
||||||
programs.tmux.extraConfig = lib.mkBefore ''
|
programs.tmux.extraConfig = lib.mkBefore ''
|
||||||
# sessionizer binds
|
# sessionizer binds
|
||||||
bind -n C-f run-shell "tmux new-window tmux-sessionizer"
|
bind -n C-f run-shell "tmux new-window tmux-sessionizer"
|
||||||
|
|
|
||||||
|
|
@ -3,9 +3,10 @@
|
||||||
nerd-font-patcher,
|
nerd-font-patcher,
|
||||||
parallel,
|
parallel,
|
||||||
stdenvNoCC,
|
stdenvNoCC,
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
font,
|
font,
|
||||||
extraArgs ? [],
|
extraArgs ? [ ],
|
||||||
useDefaultsArgs ? true,
|
useDefaultsArgs ? true,
|
||||||
}:
|
}:
|
||||||
stdenvNoCC.mkDerivation {
|
stdenvNoCC.mkDerivation {
|
||||||
|
|
@ -24,7 +25,8 @@ stdenvNoCC.mkDerivation {
|
||||||
parallel
|
parallel
|
||||||
];
|
];
|
||||||
|
|
||||||
buildPhase = let
|
buildPhase =
|
||||||
|
let
|
||||||
args =
|
args =
|
||||||
lib.optionals useDefaultsArgs [
|
lib.optionals useDefaultsArgs [
|
||||||
"--careful"
|
"--careful"
|
||||||
|
|
@ -33,7 +35,8 @@ stdenvNoCC.mkDerivation {
|
||||||
"--no-progressbars"
|
"--no-progressbars"
|
||||||
]
|
]
|
||||||
++ extraArgs;
|
++ extraArgs;
|
||||||
in ''
|
in
|
||||||
|
''
|
||||||
mkdir -p nerd-font
|
mkdir -p nerd-font
|
||||||
find \( -name \*.ttf -o -name \*.otf \) | parallel --jobs=$NIX_BUILD_CORES nerd-font-patcher {} \
|
find \( -name \*.ttf -o -name \*.otf \) | parallel --jobs=$NIX_BUILD_CORES nerd-font-patcher {} \
|
||||||
--outputdir nerd-font ${builtins.concatStringsSep " " args}
|
--outputdir nerd-font ${builtins.concatStringsSep " " args}
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@ let
|
||||||
preferredPriority = 20;
|
preferredPriority = 20;
|
||||||
privatePriority = 10;
|
privatePriority = 10;
|
||||||
limitedPriority = -10;
|
limitedPriority = -10;
|
||||||
in [
|
in
|
||||||
|
[
|
||||||
{
|
{
|
||||||
ssid = "~";
|
ssid = "~";
|
||||||
priority = preferredPriority;
|
priority = preferredPriority;
|
||||||
|
|
@ -36,7 +37,7 @@ in [
|
||||||
priority = privatePriority;
|
priority = privatePriority;
|
||||||
scanOnLowSignal = true;
|
scanOnLowSignal = true;
|
||||||
|
|
||||||
authProtocols = ["WPA-EAP"];
|
authProtocols = [ "WPA-EAP" ];
|
||||||
auth = ''
|
auth = ''
|
||||||
pairwise=CCMP
|
pairwise=CCMP
|
||||||
group=CCMP TKIP
|
group=CCMP TKIP
|
||||||
|
|
@ -81,13 +82,13 @@ in [
|
||||||
randomizeMac = true;
|
randomizeMac = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
{ssid = "_SNCF_WIFI_INOUI";}
|
{ ssid = "_SNCF_WIFI_INOUI"; }
|
||||||
{ssid = "_WIFI_LYRIA";}
|
{ ssid = "_WIFI_LYRIA"; }
|
||||||
{ssid = "EurostarTrainsWiFi";}
|
{ ssid = "EurostarTrainsWiFi"; }
|
||||||
{ssid = "SBB-FREE";}
|
{ ssid = "SBB-FREE"; }
|
||||||
{ssid = "AOT Airport Free Wi-Fi by NT";}
|
{ ssid = "AOT Airport Free Wi-Fi by NT"; }
|
||||||
{ssid = "NewTaipei";}
|
{ ssid = "NewTaipei"; }
|
||||||
{ssid = "Fami-WiFi";}
|
{ ssid = "Fami-WiFi"; }
|
||||||
|
|
||||||
{
|
{
|
||||||
ssid = "iPhone de Léana 江";
|
ssid = "iPhone de Léana 江";
|
||||||
|
|
|
||||||
|
|
@ -6,18 +6,25 @@ let
|
||||||
lib = import (sources.nixpkgs + "/lib");
|
lib = import (sources.nixpkgs + "/lib");
|
||||||
|
|
||||||
# wpa_supplicant uses `strchr` to seek to the first `=`, so the only forbidden character is `=`.
|
# wpa_supplicant uses `strchr` to seek to the first `=`, so the only forbidden character is `=`.
|
||||||
escapePwdKey = lib.replaceStrings ["="] ["_"];
|
escapePwdKey = lib.replaceStrings [ "=" ] [ "_" ];
|
||||||
|
|
||||||
go = networkArgs @ {
|
go =
|
||||||
|
networkArgs@{
|
||||||
ssid,
|
ssid,
|
||||||
# Custom fields wrapping nixpkgs module options
|
# Custom fields wrapping nixpkgs module options
|
||||||
hasPassword ? false,
|
hasPassword ? false,
|
||||||
scanOnLowSignal ? false,
|
scanOnLowSignal ? false,
|
||||||
randomizeMac ? false,
|
randomizeMac ? false,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
${ssid} = lib.mkMerge [
|
${ssid} = lib.mkMerge [
|
||||||
(builtins.removeAttrs networkArgs ["ssid" "hasPassword" "scanOnLowSignal" "randomizeMac"])
|
(builtins.removeAttrs networkArgs [
|
||||||
|
"ssid"
|
||||||
|
"hasPassword"
|
||||||
|
"scanOnLowSignal"
|
||||||
|
"randomizeMac"
|
||||||
|
])
|
||||||
(lib.optionalAttrs hasPassword {
|
(lib.optionalAttrs hasPassword {
|
||||||
pskRaw = "ext:${escapePwdKey ssid}";
|
pskRaw = "ext:${escapePwdKey ssid}";
|
||||||
})
|
})
|
||||||
|
|
@ -34,4 +41,4 @@ let
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
ns: lib.mkMerge (map go ns)
|
ns: lib.mkMerge (map go ns)
|
||||||
|
|
|
||||||
|
|
@ -1 +1 @@
|
||||||
{programs.command-not-found.enable = false;}
|
{ programs.command-not-found.enable = false; }
|
||||||
|
|
|
||||||
|
|
@ -5,15 +5,18 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
fishNixOSEnabled = config.programs.fish.enable;
|
fishNixOSEnabled = config.programs.fish.enable;
|
||||||
fishHMEnabled =
|
fishHMEnabled =
|
||||||
if config ? home-manager
|
if config ? home-manager then
|
||||||
then lib.any (userConfig: userConfig.programs.fish.enable) (lib.attrValues config.home-manager.users)
|
lib.any (userConfig: userConfig.programs.fish.enable) (lib.attrValues config.home-manager.users)
|
||||||
else false;
|
else
|
||||||
|
false;
|
||||||
|
|
||||||
fishEnabled = fishNixOSEnabled || fishHMEnabled;
|
fishEnabled = fishNixOSEnabled || fishHMEnabled;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
environment.pathsToLink = lib.mkIf fishEnabled [
|
environment.pathsToLink = lib.mkIf fishEnabled [
|
||||||
"/share/fish/vendor_conf.d"
|
"/share/fish/vendor_conf.d"
|
||||||
"/share/fish/vendor_completions.d"
|
"/share/fish/vendor_completions.d"
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{hostname, ...}: {
|
{ hostname, ... }:
|
||||||
|
{
|
||||||
networking.hostName = hostname;
|
networking.hostName = hostname;
|
||||||
|
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
security.sudo.enable = false;
|
security.sudo.enable = false;
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
|
|
@ -18,8 +19,8 @@
|
||||||
# doas's docs says it searches in a "limited subset of PATH" if it's relative.
|
# doas's docs says it searches in a "limited subset of PATH" if it's relative.
|
||||||
# I suspect that it doesn't search the PATH added ad-hoc by the nix-shell, also not a good solution.
|
# I suspect that it doesn't search the PATH added ad-hoc by the nix-shell, also not a good solution.
|
||||||
# Also, for some reason, the rule won't match.
|
# Also, for some reason, the rule won't match.
|
||||||
users = [":wheel"];
|
users = [ ":wheel" ];
|
||||||
setEnv = ["PATH"];
|
setEnv = [ "PATH" ];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,8 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
nix = {
|
nix = {
|
||||||
package = lib.mkDefault pkgs.nix;
|
package = lib.mkDefault pkgs.nix;
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -5,14 +5,16 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.services.xscreensaver;
|
cfg = config.services.xscreensaver;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
options = {
|
options = {
|
||||||
services.xscreensaver.hooks = lib.mkOption {
|
services.xscreensaver.hooks = lib.mkOption {
|
||||||
type = with lib.types; attrsOf str;
|
type = with lib.types; attrsOf str;
|
||||||
description = "An attrset of events mapped a block of shell command to be run";
|
description = "An attrset of events mapped a block of shell command to be run";
|
||||||
default = {};
|
default = { };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -20,19 +22,22 @@ in {
|
||||||
systemd.user.services = {
|
systemd.user.services = {
|
||||||
"xscreensaver-hooks" = {
|
"xscreensaver-hooks" = {
|
||||||
description = "Run commands on xscreensaver events";
|
description = "Run commands on xscreensaver events";
|
||||||
after = ["graphical-session.target" "xscreensaver.service"];
|
after = [
|
||||||
partOf = ["graphical-session.target"];
|
"graphical-session.target"
|
||||||
wantedBy = ["graphical-session.target"];
|
"xscreensaver.service"
|
||||||
script = let
|
];
|
||||||
handlers =
|
partOf = [ "graphical-session.target" ];
|
||||||
lib.concatMapAttrsStringSep "\n" (event: action: ''
|
wantedBy = [ "graphical-session.target" ];
|
||||||
|
script =
|
||||||
|
let
|
||||||
|
handlers = lib.concatMapAttrsStringSep "\n" (event: action: ''
|
||||||
"${event}")
|
"${event}")
|
||||||
( ${action}
|
( ${action}
|
||||||
)
|
)
|
||||||
;;
|
;;
|
||||||
'')
|
'') cfg.hooks;
|
||||||
cfg.hooks;
|
in
|
||||||
in ''
|
''
|
||||||
xscreensaver-command -watch | while read event rest; do
|
xscreensaver-command -watch | while read event rest; do
|
||||||
echo "The handler script got \"$event\""
|
echo "The handler script got \"$event\""
|
||||||
case $event in
|
case $event in
|
||||||
|
|
|
||||||
|
|
@ -2,21 +2,22 @@
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}:
|
||||||
|
{
|
||||||
#
|
#
|
||||||
# My user
|
# My user
|
||||||
#
|
#
|
||||||
nix.settings.trusted-users = ["leana"];
|
nix.settings.trusted-users = [ "leana" ];
|
||||||
users.users."leana" = {
|
users.users."leana" = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
home = "/home/leana";
|
home = "/home/leana";
|
||||||
description = "Leana";
|
description = "Leana";
|
||||||
group = "leana";
|
group = "leana";
|
||||||
extraGroups = ["wheel"];
|
extraGroups = [ "wheel" ];
|
||||||
shell = pkgs.bash;
|
shell = pkgs.bash;
|
||||||
openssh.authorizedKeys.keys = config.users.users.root.openssh.authorizedKeys.keys;
|
openssh.authorizedKeys.keys = config.users.users.root.openssh.authorizedKeys.keys;
|
||||||
};
|
};
|
||||||
users.groups.leana = {};
|
users.groups.leana = { };
|
||||||
|
|
||||||
#
|
#
|
||||||
# My nix binary cache
|
# My nix binary cache
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
# This will temporarily disable the dedicated graphics and boot into the system.
|
# This will temporarily disable the dedicated graphics and boot into the system.
|
||||||
# If your computer suffers from the GPU's death it won't boot unless you do this.
|
# If your computer suffers from the GPU's death it won't boot unless you do this.
|
||||||
boot.kernelParams = ["radeon.modeset=0"];
|
boot.kernelParams = [ "radeon.modeset=0" ];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,12 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.services.parrot;
|
cfg = config.services.parrot;
|
||||||
t = lib.types;
|
t = lib.types;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
options = {
|
options = {
|
||||||
services.parrot = {
|
services.parrot = {
|
||||||
enable = lib.mkEnableOption "parrot";
|
enable = lib.mkEnableOption "parrot";
|
||||||
|
|
@ -23,12 +25,12 @@ in {
|
||||||
group = "parrot";
|
group = "parrot";
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
};
|
};
|
||||||
users.groups."parrot" = {};
|
users.groups."parrot" = { };
|
||||||
|
|
||||||
systemd.services."parrot" = {
|
systemd.services."parrot" = {
|
||||||
description = " A hassle-free, highly performant, self-hosted Discord music bot with YouTube and Spotify support. Powered by yt-dlp.";
|
description = " A hassle-free, highly performant, self-hosted Discord music bot with YouTube and Spotify support. Powered by yt-dlp.";
|
||||||
after = ["network.target"];
|
after = [ "network.target" ];
|
||||||
wantedBy = ["multi-user.target"];
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
User = "parrot";
|
User = "parrot";
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,11 @@
|
||||||
# https://nixos.wiki/wiki/Encrypted_DNS
|
# https://nixos.wiki/wiki/Encrypted_DNS
|
||||||
{pkgs, ...}: {
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
networking = {
|
networking = {
|
||||||
nameservers = ["127.0.0.1" "::1"];
|
nameservers = [
|
||||||
|
"127.0.0.1"
|
||||||
|
"::1"
|
||||||
|
];
|
||||||
dhcpcd.extraConfig = "nohook resolv.conf";
|
dhcpcd.extraConfig = "nohook resolv.conf";
|
||||||
# networkmanager.dns = "none";
|
# networkmanager.dns = "none";
|
||||||
};
|
};
|
||||||
|
|
@ -13,7 +17,7 @@
|
||||||
# Settings reference:
|
# Settings reference:
|
||||||
# https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml
|
# https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml
|
||||||
settings = {
|
settings = {
|
||||||
listen_addresses = ["127.0.0.1:53"];
|
listen_addresses = [ "127.0.0.1:53" ];
|
||||||
ipv4_servers = true;
|
ipv4_servers = true;
|
||||||
|
|
||||||
require_dnssec = true;
|
require_dnssec = true;
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,12 @@
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
cfg = config.services.typst-bot;
|
cfg = config.services.typst-bot;
|
||||||
t = lib.types;
|
t = lib.types;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
options = {
|
options = {
|
||||||
services.typst-bot = {
|
services.typst-bot = {
|
||||||
enable = lib.mkEnableOption "typst-bot";
|
enable = lib.mkEnableOption "typst-bot";
|
||||||
|
|
@ -30,7 +32,7 @@ in {
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
home = cfg.dataDir;
|
home = cfg.dataDir;
|
||||||
};
|
};
|
||||||
users.groups."typst-bot" = {};
|
users.groups."typst-bot" = { };
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d ${cfg.dataDir}/cache 700 typst-bot typst-bot - -"
|
"d ${cfg.dataDir}/cache 700 typst-bot typst-bot - -"
|
||||||
|
|
@ -39,15 +41,15 @@ in {
|
||||||
|
|
||||||
systemd.services."typst-bot" = {
|
systemd.services."typst-bot" = {
|
||||||
description = "A discord bot to render Typst code";
|
description = "A discord bot to render Typst code";
|
||||||
after = ["network.target"];
|
after = [ "network.target" ];
|
||||||
wantedBy = ["multi-user.target"];
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
preStart = ''
|
preStart = ''
|
||||||
: >${cfg.dataDir}/sqlite/db.sqlite
|
: >${cfg.dataDir}/sqlite/db.sqlite
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Don't pollute the global path
|
# Don't pollute the global path
|
||||||
path = [pkgs.typst-bot];
|
path = [ pkgs.typst-bot ];
|
||||||
script = "typst-bot";
|
script = "typst-bot";
|
||||||
|
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
|
|
|
||||||
|
|
@ -1 +1 @@
|
||||||
{zramSwap.enable = true;}
|
{ zramSwap.enable = true; }
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
# Use flake so the package inputs is pinned
|
# Use flake so the package inputs is pinned
|
||||||
agenix = sources.agenix.asFlake.packages.${final.system}.default;
|
agenix = sources.agenix.asFlake.packages.${final.system}.default;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -2,8 +2,8 @@
|
||||||
final: prev: {
|
final: prev: {
|
||||||
calibre = final.symlinkJoin {
|
calibre = final.symlinkJoin {
|
||||||
name = "calibre";
|
name = "calibre";
|
||||||
paths = [prev.calibre];
|
paths = [ prev.calibre ];
|
||||||
buildInputs = [final.makeWrapper];
|
buildInputs = [ final.makeWrapper ];
|
||||||
postBuild = ''
|
postBuild = ''
|
||||||
rm -r $out/share/mime
|
rm -r $out/share/mime
|
||||||
'';
|
'';
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
disko = sources.disko.asFlake.packages.${final.system}.default;
|
disko = sources.disko.asFlake.packages.${final.system}.default;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
dix = sources.dix.asFlake.packages.${final.system}.default;
|
dix = sources.dix.asFlake.packages.${final.system}.default;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
eepy = sources.eepy.asFlake.packages.${final.system}.default;
|
eepy = sources.eepy.asFlake.packages.${final.system}.default;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,18 +1,14 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: prev: {
|
final: prev: {
|
||||||
fcitx5-table-extra = prev.fcitx5-table-extra.overrideAttrs (oldAttrs: {
|
fcitx5-table-extra = prev.fcitx5-table-extra.overrideAttrs (oldAttrs: {
|
||||||
src = sources.fcitx5-table-extra;
|
src = sources.fcitx5-table-extra;
|
||||||
nativeBuildInputs =
|
nativeBuildInputs = oldAttrs.nativeBuildInputs or [ ] ++ [
|
||||||
oldAttrs.nativeBuildInputs or []
|
|
||||||
++ [
|
|
||||||
final.python3
|
final.python3
|
||||||
];
|
];
|
||||||
preConfigure =
|
preConfigure = oldAttrs.preConfigure or "" + ''
|
||||||
oldAttrs.preConfigure or ""
|
|
||||||
+ ''
|
|
||||||
python3 ./generate.py
|
python3 ./generate.py
|
||||||
'';
|
'';
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,7 @@
|
||||||
final: prev: rec {
|
final: prev: rec {
|
||||||
nerd-fonts = let
|
nerd-fonts =
|
||||||
mkNerdFont = final.callPackage ../lib/mkNerdFont.nix {};
|
let
|
||||||
|
mkNerdFont = final.callPackage ../lib/mkNerdFont.nix { };
|
||||||
in
|
in
|
||||||
prev.nerd-fonts
|
prev.nerd-fonts
|
||||||
// {
|
// {
|
||||||
|
|
|
||||||
|
|
@ -2,21 +2,18 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
nil = let
|
nil =
|
||||||
|
let
|
||||||
pkg = sources.nil.asFlake.packages.${final.system}.default;
|
pkg = sources.nil.asFlake.packages.${final.system}.default;
|
||||||
in
|
in
|
||||||
pkg.overrideAttrs (
|
pkg.overrideAttrs (oldAttrs: {
|
||||||
oldAttrs: {
|
patches = oldAttrs.patches or [ ] ++ [
|
||||||
patches =
|
|
||||||
oldAttrs.patches or []
|
|
||||||
++ [
|
|
||||||
(final.fetchpatch {
|
(final.fetchpatch {
|
||||||
name = "fix-handling-inherit-and-patfield-in-inline-assist";
|
name = "fix-handling-inherit-and-patfield-in-inline-assist";
|
||||||
url = "https://github.com/oxalica/nil/pull/178.patch";
|
url = "https://github.com/oxalica/nil/pull/178.patch";
|
||||||
hash = "sha256-4f7DeWJtt63IyOjqlwzz0f05rv1NBYZO4JWEkFeDimk=";
|
hash = "sha256-4f7DeWJtt63IyOjqlwzz0f05rv1NBYZO4JWEkFeDimk=";
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
}
|
});
|
||||||
);
|
}
|
||||||
}
|
|
||||||
|
|
|
||||||
|
|
@ -1,12 +1,10 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
# The final nix is lix in this case
|
# The final nix is lix in this case
|
||||||
final: prev: {
|
final: prev: {
|
||||||
nix-monitored =
|
nix-monitored = sources.nix-monitored.asFlake.packages.${final.system}.default.override {
|
||||||
sources.nix-monitored.asFlake.packages.${final.system}.default
|
|
||||||
.override {
|
|
||||||
inherit (final) nix;
|
inherit (final) nix;
|
||||||
withNotify = false; # noisy, spams "command completed" even for nix shells
|
withNotify = false; # noisy, spams "command completed" even for nix shells
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,6 +3,6 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
final: _: {
|
final: _: {
|
||||||
nix-tree = (import sources.nix-tree).packages.${final.system}.default;
|
nix-tree = (import sources.nix-tree).packages.${final.system}.default;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
sources.nur.asFlake.overlays.default
|
sources.nur.asFlake.overlays.default
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
_: _: {
|
_: _: {
|
||||||
unsafe-emacs28 = (import sources.pin-emacs28 {}).emacs;
|
unsafe-emacs28 = (import sources.pin-emacs28 { }).emacs;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
_: _: {
|
_: _: {
|
||||||
# Isabelle version 2023
|
# Isabelle version 2023
|
||||||
isabelle-2023 = (import sources.pin-isabelle {}).isabelle;
|
isabelle-2023 = (import sources.pin-isabelle { }).isabelle;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,8 +1,8 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
_: _: {
|
_: _: {
|
||||||
# Wireshark bug
|
# Wireshark bug
|
||||||
# https://gitlab.com/wireshark/wireshark/-/issues/19574
|
# https://gitlab.com/wireshark/wireshark/-/issues/19574
|
||||||
inherit (import sources.pin-wireshark {}) wireshark;
|
inherit (import sources.pin-wireshark { }) wireshark;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
_: _: rec {
|
_: _: rec {
|
||||||
wallpapers_source = sources.wallpapers;
|
wallpapers_source = sources.wallpapers;
|
||||||
wallpapers = import wallpapers_source {};
|
wallpapers = import wallpapers_source { };
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
let
|
let
|
||||||
sources = import ../../npins;
|
sources = import ../../npins;
|
||||||
in
|
in
|
||||||
(import sources.wired-notify).overlays.default
|
(import sources.wired-notify).overlays.default
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,11 @@
|
||||||
fetchFromGitHub,
|
fetchFromGitHub,
|
||||||
stdenvNoCC,
|
stdenvNoCC,
|
||||||
lib,
|
lib,
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
rev = "9bb188e2701138e03f73bacebd6b19b181ca0012";
|
rev = "9bb188e2701138e03f73bacebd6b19b181ca0012";
|
||||||
in
|
in
|
||||||
stdenvNoCC.mkDerivation {
|
stdenvNoCC.mkDerivation {
|
||||||
pname = "ai_blocklist";
|
pname = "ai_blocklist";
|
||||||
version = "unstable-" + lib.substring 0 8 rev;
|
version = "unstable-" + lib.substring 0 8 rev;
|
||||||
|
|
||||||
|
|
@ -24,4 +25,4 @@ in
|
||||||
cat $out/share/hosts.txt |
|
cat $out/share/hosts.txt |
|
||||||
sed 's/^0.0.0.0 //' > $out/share/domains.txt
|
sed 's/^0.0.0.0 //' > $out/share/domains.txt
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,13 @@
|
||||||
rustPlatform,
|
rustPlatform,
|
||||||
fetchFromGitea,
|
fetchFromGitea,
|
||||||
}:
|
}:
|
||||||
rustPlatform.buildRustPackage (finalAttrs: let
|
rustPlatform.buildRustPackage (
|
||||||
|
finalAttrs:
|
||||||
|
let
|
||||||
cargoToml = fromTOML (builtins.readFile (finalAttrs.src + "/Cargo.toml"));
|
cargoToml = fromTOML (builtins.readFile (finalAttrs.src + "/Cargo.toml"));
|
||||||
cargoLock = finalAttrs.src + "/Cargo.lock";
|
cargoLock = finalAttrs.src + "/Cargo.lock";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
pname = "audio-lint";
|
pname = "audio-lint";
|
||||||
version = cargoToml.package.version;
|
version = cargoToml.package.version;
|
||||||
|
|
||||||
|
|
@ -18,4 +21,5 @@ in {
|
||||||
};
|
};
|
||||||
|
|
||||||
cargoLock.lockFile = cargoLock;
|
cargoLock.lockFile = cargoLock;
|
||||||
})
|
}
|
||||||
|
)
|
||||||
|
|
|
||||||
|
|
@ -6,10 +6,13 @@
|
||||||
libxcb,
|
libxcb,
|
||||||
fetchFromGitHub,
|
fetchFromGitHub,
|
||||||
}:
|
}:
|
||||||
rustPlatform.buildRustPackage (finalAttrs: let
|
rustPlatform.buildRustPackage (
|
||||||
|
finalAttrs:
|
||||||
|
let
|
||||||
cargoToml = fromTOML (builtins.readFile (finalAttrs.src + "/Cargo.toml"));
|
cargoToml = fromTOML (builtins.readFile (finalAttrs.src + "/Cargo.toml"));
|
||||||
cargoLock = finalAttrs.src + "/Cargo.lock";
|
cargoLock = finalAttrs.src + "/Cargo.lock";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
pname = "emoji-picker";
|
pname = "emoji-picker";
|
||||||
version = cargoToml.package.version;
|
version = cargoToml.package.version;
|
||||||
|
|
||||||
|
|
@ -31,4 +34,5 @@ in {
|
||||||
openssl.dev
|
openssl.dev
|
||||||
libxcb
|
libxcb
|
||||||
];
|
];
|
||||||
})
|
}
|
||||||
|
)
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,11 @@
|
||||||
fetchFromGitHub,
|
fetchFromGitHub,
|
||||||
stdenvNoCC,
|
stdenvNoCC,
|
||||||
lib,
|
lib,
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
rev = "cc19c050997d5f54014bb20c764b131e003dfb17";
|
rev = "cc19c050997d5f54014bb20c764b131e003dfb17";
|
||||||
in
|
in
|
||||||
stdenvNoCC.mkDerivation {
|
stdenvNoCC.mkDerivation {
|
||||||
pname = "hategroup_blocklist";
|
pname = "hategroup_blocklist";
|
||||||
version = "unstable-" + lib.substring 0 8 rev;
|
version = "unstable-" + lib.substring 0 8 rev;
|
||||||
|
|
||||||
|
|
@ -23,4 +24,4 @@ in
|
||||||
cat $out/share/domains.txt |
|
cat $out/share/domains.txt |
|
||||||
sed 's/^\([^#].*\)$/0.0.0.0 \1/' > $out/share/hosts.txt
|
sed 's/^\([^#].*\)$/0.0.0.0 \1/' > $out/share/hosts.txt
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -3,25 +3,21 @@
|
||||||
haskell,
|
haskell,
|
||||||
fetchFromGitea,
|
fetchFromGitea,
|
||||||
installShellFiles,
|
installShellFiles,
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (haskell.lib.compose) justStaticExecutables overrideCabal;
|
inherit (haskell.lib.compose) justStaticExecutables overrideCabal;
|
||||||
|
|
||||||
drv =
|
drv = haskellPackages.callCabal2nix "hbrainfuck" (fetchFromGitea {
|
||||||
haskellPackages.callCabal2nix "hbrainfuck"
|
|
||||||
(fetchFromGitea {
|
|
||||||
domain = "git.confusedcompiler.org";
|
domain = "git.confusedcompiler.org";
|
||||||
owner = "leana8959";
|
owner = "leana8959";
|
||||||
repo = "hbrainfuck";
|
repo = "hbrainfuck";
|
||||||
rev = "5eea5ff0d7efc0bd866a2273686032ba9cab5baa";
|
rev = "5eea5ff0d7efc0bd866a2273686032ba9cab5baa";
|
||||||
hash = "sha256-/htXOULUJN8+PsAYaG281Ge/9ULZoWip63IUxuVbTSg=";
|
hash = "sha256-/htXOULUJN8+PsAYaG281Ge/9ULZoWip63IUxuVbTSg=";
|
||||||
})
|
}) { };
|
||||||
{};
|
|
||||||
|
|
||||||
cabalOverrides = o: {
|
cabalOverrides = o: {
|
||||||
buildTools = o.buildTools or [] ++ [installShellFiles];
|
buildTools = o.buildTools or [ ] ++ [ installShellFiles ];
|
||||||
postInstall =
|
postInstall = o.postInstall or "" + ''
|
||||||
o.postInstall or ""
|
|
||||||
+ ''
|
|
||||||
installShellCompletion --cmd hbrainfuck \
|
installShellCompletion --cmd hbrainfuck \
|
||||||
--bash <("$out/bin/hbf" --bash-completion-script "$out/bin/hbf") \
|
--bash <("$out/bin/hbf" --bash-completion-script "$out/bin/hbf") \
|
||||||
--fish <("$out/bin/hbf" --fish-completion-script "$out/bin/hbf") \
|
--fish <("$out/bin/hbf" --fish-completion-script "$out/bin/hbf") \
|
||||||
|
|
@ -29,5 +25,4 @@
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
justStaticExecutables
|
justStaticExecutables (overrideCabal cabalOverrides drv)
|
||||||
(overrideCabal cabalOverrides drv)
|
|
||||||
|
|
|
||||||
|
|
@ -2,18 +2,16 @@
|
||||||
haskellPackages,
|
haskellPackages,
|
||||||
haskell,
|
haskell,
|
||||||
fetchFromGitea,
|
fetchFromGitea,
|
||||||
}: let
|
}:
|
||||||
|
let
|
||||||
inherit (haskell.lib.compose) justStaticExecutables;
|
inherit (haskell.lib.compose) justStaticExecutables;
|
||||||
|
|
||||||
drv =
|
drv = haskellPackages.callCabal2nix "hutils" (fetchFromGitea {
|
||||||
haskellPackages.callCabal2nix "hutils"
|
|
||||||
(fetchFromGitea {
|
|
||||||
domain = "git.confusedcompiler.org";
|
domain = "git.confusedcompiler.org";
|
||||||
owner = "leana8959";
|
owner = "leana8959";
|
||||||
repo = "hutils";
|
repo = "hutils";
|
||||||
rev = "30b503bec011f8908e26c0e1e961936d56da74cc";
|
rev = "30b503bec011f8908e26c0e1e961936d56da74cc";
|
||||||
hash = "sha256-lPwqxsz7WXdDMonjdWvTziR5HuE5HY2GyU2rQkwn0VU=";
|
hash = "sha256-lPwqxsz7WXdDMonjdWvTziR5HuE5HY2GyU2rQkwn0VU=";
|
||||||
})
|
}) { };
|
||||||
{};
|
|
||||||
in
|
in
|
||||||
justStaticExecutables drv
|
justStaticExecutables drv
|
||||||
|
|
|
||||||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue