god only knows
This commit is contained in:
parent
2f2060aade
commit
37a11e11ff
23 changed files with 230 additions and 49 deletions
0
.p10k.zsh
Normal file → Executable file
0
.p10k.zsh
Normal file → Executable file
16
home/bolt.nix
Normal file
16
home/bolt.nix
Normal file
|
@ -0,0 +1,16 @@
|
|||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
|
||||
home.username = "bolt";
|
||||
home.homeDirectory = "/home/bolt";
|
||||
|
||||
home.packages = with pkgs; [
|
||||
cmus
|
||||
zellij
|
||||
steam
|
||||
xonotic
|
||||
nicotine-plus
|
||||
];
|
||||
|
||||
}
|
1
home/config.nix
Normal file
1
home/config.nix
Normal file
|
@ -0,0 +1 @@
|
|||
{ allowUnfree = true; }
|
0
home/fossil.nix
Normal file → Executable file
0
home/fossil.nix
Normal file → Executable file
17
home/home.nix
Normal file → Executable file
17
home/home.nix
Normal file → Executable file
|
@ -3,7 +3,8 @@
|
|||
{
|
||||
imports = [
|
||||
# who are you?
|
||||
./fossil.nix
|
||||
./bolt.nix
|
||||
# ./fossil.nix
|
||||
# ./plank.nix
|
||||
];
|
||||
|
||||
|
@ -17,6 +18,9 @@
|
|||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
home.packages = with pkgs; [
|
||||
|
||||
rustup
|
||||
|
||||
kitty
|
||||
thunderbird
|
||||
|
||||
|
@ -46,6 +50,7 @@
|
|||
|
||||
libsForQt5.ark
|
||||
libsForQt5.qtstyleplugin-kvantum
|
||||
libsForQt5.bismuth
|
||||
|
||||
gtk-engine-murrine
|
||||
|
||||
|
@ -53,15 +58,15 @@
|
|||
|
||||
(callPackage ./homepkgs/git-credential-keepassxc.nix { })
|
||||
(callPackage ./homepkgs/culr.nix { })
|
||||
(libsForQt5.callPackage ./homepkgs/bismuth.nix { })
|
||||
# (libsForQt5.callPackage ./homepkgs/bismuth.nix { })
|
||||
|
||||
];
|
||||
|
||||
gtk = {
|
||||
enable = true;
|
||||
theme = {
|
||||
package = pkgs.arc-theme;
|
||||
name = "Arc-Dark";
|
||||
#package = pkgs.arc-theme;
|
||||
name = "Simplewaita";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -112,7 +117,7 @@
|
|||
programs.kitty = {
|
||||
enable = true;
|
||||
font = {
|
||||
name = "MesloLGS NF Regular";
|
||||
name = "Ellograph CF";
|
||||
size = 10;
|
||||
};
|
||||
settings = {
|
||||
|
@ -292,7 +297,7 @@ fresh
|
|||
theme = "bogster";
|
||||
};
|
||||
|
||||
home.stateVersion = "22.05";
|
||||
home.stateVersion ="22.11";
|
||||
|
||||
programs.home-manager.enable = true;
|
||||
}
|
||||
|
|
0
home/homepkgs/bismuth.nix
Normal file → Executable file
0
home/homepkgs/bismuth.nix
Normal file → Executable file
0
home/homepkgs/culr.nix
Normal file → Executable file
0
home/homepkgs/culr.nix
Normal file → Executable file
0
home/homepkgs/git-credential-keepassxc.nix
Normal file → Executable file
0
home/homepkgs/git-credential-keepassxc.nix
Normal file → Executable file
28
home/homepkgs/slice.nix
Executable file
28
home/homepkgs/slice.nix
Executable file
|
@ -0,0 +1,28 @@
|
|||
{ lib
|
||||
, stdenv
|
||||
, fetchFromGitHub
|
||||
}:
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "sddm-slice";
|
||||
version = "1.5.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "EricKotato";
|
||||
repo = pname;
|
||||
rev = "v${version}";
|
||||
sha256 = "sha256-IWwFsYqoqW3924+pf8L+acIt31aU/mhqakXbT9Q4Bqw=";
|
||||
};
|
||||
|
||||
deployPhase = "
|
||||
cp -r ./* /usr/share/sddm/themes/slice/
|
||||
";
|
||||
|
||||
meta = with lib; {
|
||||
description = "an sddm theme";
|
||||
homepage = "somewhere.else";
|
||||
license = licenses.mit;
|
||||
maintainers = [];
|
||||
platforms = platforms.all;
|
||||
};
|
||||
|
||||
}
|
1
home/nixpkgs
Symbolic link
1
home/nixpkgs
Symbolic link
|
@ -0,0 +1 @@
|
|||
/home/fossil/.config/nixpkgs
|
0
home/plank.nix
Normal file → Executable file
0
home/plank.nix
Normal file → Executable file
0
kdekeys
Normal file → Executable file
0
kdekeys
Normal file → Executable file
0
system/adrift.nix
Normal file → Executable file
0
system/adrift.nix
Normal file → Executable file
0
system/cachix.nix
Normal file → Executable file
0
system/cachix.nix
Normal file → Executable file
11
system/cachix/cuda-maintainers.nix
Executable file
11
system/cachix/cuda-maintainers.nix
Executable file
|
@ -0,0 +1,11 @@
|
|||
|
||||
{
|
||||
nix = {
|
||||
binaryCaches = [
|
||||
"https://cuda-maintainers.cachix.org"
|
||||
];
|
||||
binaryCachePublicKeys = [
|
||||
"cuda-maintainers.cachix.org-1:0dq3bujKpuEPMCX6U4WylrUDZ9JyUG0VpVZa7CNfq5E="
|
||||
];
|
||||
};
|
||||
}
|
4
system/cachix/nix-community.nix
Normal file → Executable file
4
system/cachix/nix-community.nix
Normal file → Executable file
|
@ -1,10 +1,10 @@
|
|||
|
||||
{
|
||||
nix = {
|
||||
binaryCaches = [
|
||||
settings.substituters = [
|
||||
"https://nix-community.cachix.org"
|
||||
];
|
||||
binaryCachePublicKeys = [
|
||||
settings.trusted-public-keys = [
|
||||
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||
];
|
||||
};
|
||||
|
|
26
system/configuration.nix
Normal file → Executable file
26
system/configuration.nix
Normal file → Executable file
|
@ -6,8 +6,10 @@
|
|||
|
||||
imports = [
|
||||
# where are we ?
|
||||
# ./wollomi.nix
|
||||
#./wollomi.nix
|
||||
# ./adrift.nix
|
||||
./quiver.nix
|
||||
./docker.nix
|
||||
|
||||
# home manager should exist for users
|
||||
<home-manager/nixos>
|
||||
|
@ -30,8 +32,6 @@
|
|||
boot.loader.systemd-boot.configurationLimit = 2;
|
||||
boot.loader.systemd-boot.consoleMode = "max";
|
||||
boot.loader.timeout = 3;
|
||||
#boot.loader.efi.canTouchEfiVariables = true;
|
||||
#boot.plymouth.enable = true;
|
||||
|
||||
boot.kernelPackages = pkgs.linuxPackages_xanmod_latest;
|
||||
|
||||
|
@ -88,25 +88,15 @@
|
|||
|
||||
services.tailscale.enable = true;
|
||||
|
||||
# rust
|
||||
nixpkgs.overlays = [
|
||||
(import "${fetchTarball "https://github.com/nix-community/fenix/archive/main.tar.gz"}/overlay.nix")
|
||||
];
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
||||
rnix-lsp
|
||||
|
||||
rust-analyzer-nightly
|
||||
(fenix.complete.withComponents [
|
||||
"clippy"
|
||||
"rustfmt"
|
||||
])
|
||||
|
||||
tailscale
|
||||
|
||||
cachix
|
||||
|
||||
helix
|
||||
rnix-lsp
|
||||
ark
|
||||
|
||||
curl
|
||||
|
@ -116,11 +106,15 @@
|
|||
|
||||
zsh
|
||||
|
||||
libsForQt5.sddm-kcm
|
||||
|
||||
|
||||
];
|
||||
|
||||
|
||||
networking.firewall = {
|
||||
allowedUDPPorts = [ 41641 ];
|
||||
# allowedUDPPorts = [ 41641 ];
|
||||
trustedInterfaces = [ "tailscale0" ];
|
||||
checkReversePath = "loose";
|
||||
};
|
||||
|
||||
|
|
13
system/docker.nix
Executable file
13
system/docker.nix
Executable file
|
@ -0,0 +1,13 @@
|
|||
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
virtualisation.docker.enable = true;
|
||||
# virtualisation.docker.enableOnBoot = true;
|
||||
|
||||
# Nvidia Docker
|
||||
virtualisation.docker.enableNvidia = true;
|
||||
# libnvidia-container does not support cgroups v2 (prior to 1.8.0)
|
||||
# https://github.com/NVIDIA/nvidia-docker/issues/1447
|
||||
systemd.enableUnifiedCgroupHierarchy = false;
|
||||
}
|
40
system/hardware-configuration.nix
Executable file
40
system/hardware-configuration.nix
Executable file
|
@ -0,0 +1,40 @@
|
|||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbcore" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/06f59431-d939-4b48-9d91-e23606dd3ce0";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/5008-1946";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
fileSystems."/data" = {
|
||||
device = "/dev/sdb1";
|
||||
fsType = "ntfs";
|
||||
};
|
||||
swapDevices = [ ];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
73
system/quiver.nix
Executable file
73
system/quiver.nix
Executable file
|
@ -0,0 +1,73 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbcore" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [];
|
||||
boot.kernelModules = [ "kvm-amd" "i2c-dev" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
boot.kernelParams = [ "mitigations=off" "acpi_enforce_resources=lax" ];
|
||||
|
||||
boot.loader.efi.canTouchEfiVariables = true;
|
||||
boot.plymouth.enable = true;
|
||||
|
||||
boot.supportedFilesystems = [ "ntfs" ];
|
||||
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
|
||||
# dlna
|
||||
services.minidlna = {
|
||||
enable = true;
|
||||
announceInterval = 120;
|
||||
friendlyName = "PC";
|
||||
mediaDirs = [ "A,/data/Music/Slsk" ];
|
||||
};
|
||||
|
||||
services.xserver.videoDrivers = [ "nvidia" ];
|
||||
hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.stable;
|
||||
hardware.ckb-next.enable = true;
|
||||
environment.systemPackages = with pkgs; [
|
||||
ckb-next
|
||||
openrgb
|
||||
];
|
||||
|
||||
networking.hostName = "quiver"; # Define your hostname.
|
||||
users.users.bolt = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
|
||||
};
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/06f59431-d939-4b48-9d91-e23606dd3ce0";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/home" =
|
||||
{ device = "/dev/disk/by-uuid/f063e0c7-8590-4ed4-860c-5ae0c9b66898";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/5008-1946";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
fileSystems."/data" = {
|
||||
device = "/dev/disk/by-uuid/39D4F78C658E8B56";
|
||||
fsType = "ntfs";
|
||||
options = [ "rw" "uid=1001" "gid=100" ];
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
networking.firewall = {
|
||||
allowedUDPPorts = [ 1900 ];
|
||||
allowedTCPPorts = [ 8200 ];
|
||||
};
|
||||
|
||||
}
|
49
system/wollomi.nix
Normal file → Executable file
49
system/wollomi.nix
Normal file → Executable file
|
@ -5,23 +5,16 @@
|
|||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "ata_generic" "ehci_pci" "ahci" "isci" "xhci_pci" "usb_storage" "usbhid" "sd_mod" "sr_mod" ];
|
||||
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbcore" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
boot.supportedFilesystems = [ "ntfs" ];
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/5008-1946";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
|
||||
# dlna
|
||||
services.minidlna = {
|
||||
|
@ -38,27 +31,33 @@
|
|||
ckb-next
|
||||
];
|
||||
|
||||
networking.hostName = "wollomi"; # Define your hostname.
|
||||
users.users.fossil = {
|
||||
networking.hostName = "quiver"; # Define your hostname.
|
||||
users.users.bolt = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
|
||||
};
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/mapper/nix-os";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/06f59431-d939-4b48-9d91-e23606dd3ce0";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/home" = {
|
||||
device = "/dev/mapper/nix-home";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/5008-1946";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
fileSystems."/data" = {
|
||||
device = "/dev/disk/by-uuid/39D4F78C658E8B56";
|
||||
fsType = "ntfs";
|
||||
options = [ "rw" "uid=1000" "gid=100" ];
|
||||
device = "/dev/disk/by-uuid/39D4F78C658E8B56";
|
||||
fsType = "ntfs";
|
||||
options = [ "rw" "uid=1000" "gid=100" ];
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
networking.firewall = {
|
||||
allowedUDPPorts = [ 1900 ];
|
||||
allowedTCPPorts = [ 8200 ];
|
||||
};
|
||||
|
||||
# networking.firewall.enable = false;
|
||||
}
|
||||
|
|
0
top n bottom.layout.latte
Normal file → Executable file
0
top n bottom.layout.latte
Normal file → Executable file
0
wollomi-xorg.conf
Normal file → Executable file
0
wollomi-xorg.conf
Normal file → Executable file
Loading…
Add table
Add a link
Reference in a new issue