โ„๏ธ My personnal NixOS configuration
nix-flake nixos-configuration linux dotfiles flake nix nix-config nixos nixos-flake linux-desktop
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

ใ€Œ๐Ÿ—๏ธใ€ wip: things have happened

adjoly 4f90ce18 b2040c4a

+389 -143
+235 -34
flake.lock
··· 36 36 "type": "github" 37 37 } 38 38 }, 39 + "determinate": { 40 + "inputs": { 41 + "determinate-nixd-aarch64-darwin": "determinate-nixd-aarch64-darwin", 42 + "determinate-nixd-aarch64-linux": "determinate-nixd-aarch64-linux", 43 + "determinate-nixd-x86_64-linux": "determinate-nixd-x86_64-linux", 44 + "nix": "nix", 45 + "nixpkgs": "nixpkgs_2" 46 + }, 47 + "locked": { 48 + "lastModified": 1774669632, 49 + "narHash": "sha256-OHRHymsM6sX0B7Xjpvf3m49vTgKzJGukJhw/O1O5bj4=", 50 + "rev": "2edae0b5150c83c07cf7b7e86e937ad956d78197", 51 + "revCount": 410, 52 + "type": "tarball", 53 + "url": "https://api.flakehub.com/f/pinned/DeterminateSystems/determinate/3.17.2/019d3290-fc2e-714a-bf96-59b71ef2dcb1/source.tar.gz?rev=2edae0b5150c83c07cf7b7e86e937ad956d78197&revCount=410" 54 + }, 55 + "original": { 56 + "type": "tarball", 57 + "url": "https://flakehub.com/f/DeterminateSystems/determinate/%2A" 58 + } 59 + }, 60 + "determinate-nixd-aarch64-darwin": { 61 + "flake": false, 62 + "locked": { 63 + "narHash": "sha256-T5PoERn2FTupvCwGmQhbYO/oQ0w+51nRn+0QRbnA9tg=", 64 + "type": "file", 65 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/macOS" 66 + }, 67 + "original": { 68 + "type": "file", 69 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/macOS" 70 + } 71 + }, 72 + "determinate-nixd-aarch64-linux": { 73 + "flake": false, 74 + "locked": { 75 + "narHash": "sha256-T0iRt3f+2Q+KUU1VzdGiG6GluViuxuKr+bMG5eVtPO0=", 76 + "type": "file", 77 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/aarch64-linux" 78 + }, 79 + "original": { 80 + "type": "file", 81 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/aarch64-linux" 82 + } 83 + }, 84 + "determinate-nixd-x86_64-linux": { 85 + "flake": false, 86 + "locked": { 87 + "narHash": "sha256-FDeJY4hugYM0+vB2rvKY8WpYgPNH7kNS0M082Rnk/CI=", 88 + "type": "file", 89 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/x86_64-linux" 90 + }, 91 + "original": { 92 + "type": "file", 93 + "url": "https://install.determinate.systems/determinate-nixd/tag/v3.17.2/x86_64-linux" 94 + } 95 + }, 39 96 "dgop": { 40 97 "inputs": { 41 98 "nixpkgs": [ ··· 58 115 }, 59 116 "disko": { 60 117 "inputs": { 61 - "nixpkgs": "nixpkgs" 118 + "nixpkgs": "nixpkgs_3" 62 119 }, 63 120 "locked": { 64 121 "lastModified": 1771881364, ··· 118 175 "flake-compat": { 119 176 "flake": false, 120 177 "locked": { 178 + "lastModified": 1696426674, 179 + "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=", 180 + "owner": "edolstra", 181 + "repo": "flake-compat", 182 + "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33", 183 + "type": "github" 184 + }, 185 + "original": { 186 + "owner": "edolstra", 187 + "repo": "flake-compat", 188 + "type": "github" 189 + } 190 + }, 191 + "flake-compat_2": { 192 + "flake": false, 193 + "locked": { 121 194 "lastModified": 1747046372, 122 195 "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=", 123 196 "owner": "edolstra", ··· 131 204 "type": "github" 132 205 } 133 206 }, 134 - "flake-compat_2": { 207 + "flake-compat_3": { 135 208 "flake": false, 136 209 "locked": { 137 210 "lastModified": 1767039857, ··· 150 223 "flake-parts": { 151 224 "inputs": { 152 225 "nixpkgs-lib": [ 226 + "determinate", 227 + "nix", 228 + "nixpkgs" 229 + ] 230 + }, 231 + "locked": { 232 + "lastModified": 1748821116, 233 + "narHash": "sha256-F82+gS044J1APL0n4hH50GYdPRv/5JWm34oCJYmVKdE=", 234 + "rev": "49f0870db23e8c1ca0b5259734a02cd9e1e371a1", 235 + "revCount": 377, 236 + "type": "tarball", 237 + "url": "https://api.flakehub.com/f/pinned/hercules-ci/flake-parts/0.1.377%2Brev-49f0870db23e8c1ca0b5259734a02cd9e1e371a1/01972f28-554a-73f8-91f4-d488cc502f08/source.tar.gz" 238 + }, 239 + "original": { 240 + "type": "tarball", 241 + "url": "https://flakehub.com/f/hercules-ci/flake-parts/0.1" 242 + } 243 + }, 244 + "flake-parts_2": { 245 + "inputs": { 246 + "nixpkgs-lib": [ 153 247 "lanzaboote", 154 248 "nixpkgs" 155 249 ] ··· 168 262 "type": "github" 169 263 } 170 264 }, 171 - "flake-parts_2": { 265 + "flake-parts_3": { 172 266 "inputs": { 173 267 "nixpkgs-lib": [ 174 268 "nixvim", ··· 189 283 "type": "github" 190 284 } 191 285 }, 192 - "flake-parts_3": { 286 + "flake-parts_4": { 193 287 "inputs": { 194 288 "nixpkgs-lib": "nixpkgs-lib" 195 289 }, ··· 207 301 "type": "github" 208 302 } 209 303 }, 210 - "flake-parts_4": { 304 + "flake-parts_5": { 211 305 "inputs": { 212 306 "nixpkgs-lib": "nixpkgs-lib_2" 213 307 }, ··· 243 337 "type": "github" 244 338 } 245 339 }, 340 + "git-hooks-nix": { 341 + "inputs": { 342 + "flake-compat": "flake-compat", 343 + "gitignore": [ 344 + "determinate", 345 + "nix" 346 + ], 347 + "nixpkgs": [ 348 + "determinate", 349 + "nix", 350 + "nixpkgs" 351 + ] 352 + }, 353 + "locked": { 354 + "lastModified": 1747372754, 355 + "narHash": "sha256-2Y53NGIX2vxfie1rOW0Qb86vjRZ7ngizoo+bnXU9D9k=", 356 + "rev": "80479b6ec16fefd9c1db3ea13aeb038c60530f46", 357 + "revCount": 1026, 358 + "type": "tarball", 359 + "url": "https://api.flakehub.com/f/pinned/cachix/git-hooks.nix/0.1.1026%2Brev-80479b6ec16fefd9c1db3ea13aeb038c60530f46/0196d79a-1b35-7b8e-a021-c894fb62163d/source.tar.gz" 360 + }, 361 + "original": { 362 + "type": "tarball", 363 + "url": "https://flakehub.com/f/cachix/git-hooks.nix/0.1.941" 364 + } 365 + }, 246 366 "gitignore": { 247 367 "inputs": { 248 368 "nixpkgs": [ ··· 294 414 ] 295 415 }, 296 416 "locked": { 297 - "lastModified": 1772330611, 298 - "narHash": "sha256-UZjPc/d5XRxvjDbk4veAO4XFdvx6BUum2l40V688Xq8=", 417 + "lastModified": 1773422513, 418 + "narHash": "sha256-MPjR48roW7CUMU6lu0+qQGqj92Kuh3paIulMWFZy+NQ=", 299 419 "owner": "nix-community", 300 420 "repo": "home-manager", 301 - "rev": "58fd7ff0eec2cda43e705c4c0585729ec471d400", 421 + "rev": "ef12a9a2b0f77c8fa3dda1e7e494fca668909056", 302 422 "type": "github" 303 423 }, 304 424 "original": { ··· 358 478 "lanzaboote": { 359 479 "inputs": { 360 480 "crane": "crane", 361 - "flake-compat": "flake-compat", 362 - "flake-parts": "flake-parts", 481 + "flake-compat": "flake-compat_2", 482 + "flake-parts": "flake-parts_2", 363 483 "nixpkgs": [ 364 484 "nixpkgs" 365 485 ], ··· 383 503 "type": "github" 384 504 } 385 505 }, 506 + "nix": { 507 + "inputs": { 508 + "flake-parts": "flake-parts", 509 + "git-hooks-nix": "git-hooks-nix", 510 + "nixpkgs": "nixpkgs", 511 + "nixpkgs-23-11": "nixpkgs-23-11", 512 + "nixpkgs-regression": "nixpkgs-regression" 513 + }, 514 + "locked": { 515 + "lastModified": 1774642787, 516 + "narHash": "sha256-5pg3HyPEUj/AXXwOQAwyieyDx0c1/1rf7+EsOCa1rJM=", 517 + "rev": "cb9989b5b2329842fd7a2586429351d1ede16d04", 518 + "revCount": 24851, 519 + "type": "tarball", 520 + "url": "https://api.flakehub.com/f/pinned/DeterminateSystems/nix-src/3.17.2/019d3110-f384-7933-a525-8f854039828f/source.tar.gz" 521 + }, 522 + "original": { 523 + "type": "tarball", 524 + "url": "https://flakehub.com/f/DeterminateSystems/nix-src/%2A" 525 + } 526 + }, 386 527 "nixlib": { 387 528 "locked": { 388 529 "lastModified": 1736643958, ··· 421 562 }, 422 563 "nixos-hardware": { 423 564 "locked": { 424 - "lastModified": 1764853816, 425 - "narHash": "sha256-5VW7Sv/19y4/9fEq5gO25MSp2PeA5mr0KpbElmduYFc=", 426 - "owner": "keyzox71", 565 + "lastModified": 1774567711, 566 + "narHash": "sha256-uVlOHBvt6Vc/iYNJXLPa4c3cLXwMllOCVfAaLAcphIo=", 567 + "owner": "nixos", 427 568 "repo": "nixos-hardware", 428 - "rev": "84887255b1e32d0aeb529d51879cd7e84e1ba851", 569 + "rev": "3f6f874dfc34d386d10e434c48ad966c4832243e", 429 570 "type": "github" 430 571 }, 431 572 "original": { 432 - "owner": "keyzox71", 433 - "ref": "macmini-6", 573 + "owner": "nixos", 434 574 "repo": "nixos-hardware", 435 575 "type": "github" 436 576 } 437 577 }, 438 578 "nixos-wsl": { 439 579 "inputs": { 440 - "flake-compat": "flake-compat_2", 441 - "nixpkgs": "nixpkgs_2" 580 + "flake-compat": "flake-compat_3", 581 + "nixpkgs": "nixpkgs_4" 442 582 }, 443 583 "locked": { 444 584 "lastModified": 1771563879, ··· 457 597 }, 458 598 "nixpkgs": { 459 599 "locked": { 460 - "lastModified": 1771207753, 461 - "narHash": "sha256-b9uG8yN50DRQ6A7JdZBfzq718ryYrlmGgqkRm9OOwCE=", 600 + "lastModified": 1761597516, 601 + "narHash": "sha256-wxX7u6D2rpkJLWkZ2E932SIvDJW8+ON/0Yy8+a5vsDU=", 602 + "rev": "daf6dc47aa4b44791372d6139ab7b25269184d55", 603 + "revCount": 811874, 604 + "type": "tarball", 605 + "url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.2505.811874%2Brev-daf6dc47aa4b44791372d6139ab7b25269184d55/019a3494-3498-707e-9086-1fb81badc7fe/source.tar.gz" 606 + }, 607 + "original": { 608 + "type": "tarball", 609 + "url": "https://flakehub.com/f/NixOS/nixpkgs/0.2505" 610 + } 611 + }, 612 + "nixpkgs-23-11": { 613 + "locked": { 614 + "lastModified": 1717159533, 615 + "narHash": "sha256-oamiKNfr2MS6yH64rUn99mIZjc45nGJlj9eGth/3Xuw=", 462 616 "owner": "NixOS", 463 617 "repo": "nixpkgs", 464 - "rev": "d1c15b7d5806069da59e819999d70e1cec0760bf", 618 + "rev": "a62e6edd6d5e1fa0329b8653c801147986f8d446", 465 619 "type": "github" 466 620 }, 467 621 "original": { 468 622 "owner": "NixOS", 469 - "ref": "nixpkgs-unstable", 470 623 "repo": "nixpkgs", 624 + "rev": "a62e6edd6d5e1fa0329b8653c801147986f8d446", 471 625 "type": "github" 472 626 } 473 627 }, ··· 498 652 "url": "https://github.com/NixOS/nixpkgs/archive/a5d394176e64ab29c852d03346c1fc9b0b7d33eb.tar.gz" 499 653 } 500 654 }, 655 + "nixpkgs-regression": { 656 + "locked": { 657 + "lastModified": 1643052045, 658 + "narHash": "sha256-uGJ0VXIhWKGXxkeNnq4TvV3CIOkUJ3PAoLZ3HMzNVMw=", 659 + "owner": "NixOS", 660 + "repo": "nixpkgs", 661 + "rev": "215d4d0fd80ca5163643b03a33fde804a29cc1e2", 662 + "type": "github" 663 + }, 664 + "original": { 665 + "owner": "NixOS", 666 + "repo": "nixpkgs", 667 + "rev": "215d4d0fd80ca5163643b03a33fde804a29cc1e2", 668 + "type": "github" 669 + } 670 + }, 501 671 "nixpkgs_2": { 502 672 "locked": { 673 + "lastModified": 1774273680, 674 + "narHash": "sha256-a++tZ1RQsDb1I0NHrFwdGuRlR5TORvCEUksM459wKUA=", 675 + "rev": "fdc7b8f7b30fdbedec91b71ed82f36e1637483ed", 676 + "revCount": 968305, 677 + "type": "tarball", 678 + "url": "https://api.flakehub.com/f/pinned/DeterminateSystems/nixpkgs-weekly/0.1.968305%2Brev-fdc7b8f7b30fdbedec91b71ed82f36e1637483ed/019d1e65-315b-7c50-9232-ef9e46632115/source.tar.gz" 679 + }, 680 + "original": { 681 + "type": "tarball", 682 + "url": "https://flakehub.com/f/DeterminateSystems/nixpkgs-weekly/0.1" 683 + } 684 + }, 685 + "nixpkgs_3": { 686 + "locked": { 687 + "lastModified": 1771207753, 688 + "narHash": "sha256-b9uG8yN50DRQ6A7JdZBfzq718ryYrlmGgqkRm9OOwCE=", 689 + "owner": "NixOS", 690 + "repo": "nixpkgs", 691 + "rev": "d1c15b7d5806069da59e819999d70e1cec0760bf", 692 + "type": "github" 693 + }, 694 + "original": { 695 + "owner": "NixOS", 696 + "ref": "nixpkgs-unstable", 697 + "repo": "nixpkgs", 698 + "type": "github" 699 + } 700 + }, 701 + "nixpkgs_4": { 702 + "locked": { 503 703 "lastModified": 1770019141, 504 704 "narHash": "sha256-VKS4ZLNx4PNrABoB0L8KUpc1fE7CLpQXQs985tGfaCU=", 505 705 "owner": "NixOS", ··· 514 714 "type": "github" 515 715 } 516 716 }, 517 - "nixpkgs_3": { 717 + "nixpkgs_5": { 518 718 "locked": { 519 719 "lastModified": 1772047000, 520 720 "narHash": "sha256-7DaQVv4R97cii/Qdfy4tmDZMB2xxtyIvNGSwXBBhSmo=", ··· 530 730 "type": "github" 531 731 } 532 732 }, 533 - "nixpkgs_4": { 733 + "nixpkgs_6": { 534 734 "locked": { 535 735 "lastModified": 1768323494, 536 736 "narHash": "sha256-yBXJLE6WCtrGo7LKiB6NOt6nisBEEkguC/lq/rP3zRQ=", ··· 546 746 "type": "github" 547 747 } 548 748 }, 549 - "nixpkgs_5": { 749 + "nixpkgs_7": { 550 750 "locked": { 551 751 "lastModified": 1770107345, 552 752 "narHash": "sha256-tbS0Ebx2PiA1FRW8mt8oejR0qMXmziJmPaU1d4kYY9g=", ··· 564 764 }, 565 765 "nixvim": { 566 766 "inputs": { 567 - "flake-parts": "flake-parts_2", 568 - "nixpkgs": "nixpkgs_4", 767 + "flake-parts": "flake-parts_3", 768 + "nixpkgs": "nixpkgs_6", 569 769 "nuschtosSearch": "nuschtosSearch", 570 770 "systems": "systems_2" 571 771 }, ··· 609 809 }, 610 810 "pogit": { 611 811 "inputs": { 612 - "flake-parts": "flake-parts_3", 812 + "flake-parts": "flake-parts_4", 613 813 "nixpkgs": [ 614 814 "nixpkgs" 615 815 ] ··· 630 830 }, 631 831 "pogit_2": { 632 832 "inputs": { 633 - "flake-parts": "flake-parts_4", 833 + "flake-parts": "flake-parts_5", 634 834 "nixpkgs": [ 635 835 "timmy", 636 836 "nixpkgs" ··· 701 901 "root": { 702 902 "inputs": { 703 903 "catppuccin": "catppuccin", 904 + "determinate": "determinate", 704 905 "dgop": "dgop", 705 906 "disko": "disko", 706 907 "dms": "dms", ··· 711 912 "nixos-generators": "nixos-generators", 712 913 "nixos-hardware": "nixos-hardware", 713 914 "nixos-wsl": "nixos-wsl", 714 - "nixpkgs": "nixpkgs_3", 915 + "nixpkgs": "nixpkgs_5", 715 916 "nixvim": "nixvim", 716 917 "pogit": "pogit", 717 918 "rust-overlay": "rust-overlay", ··· 794 995 }, 795 996 "treefmt-nix": { 796 997 "inputs": { 797 - "nixpkgs": "nixpkgs_5" 998 + "nixpkgs": "nixpkgs_7" 798 999 }, 799 1000 "locked": { 800 1001 "lastModified": 1770228511, ··· 834 1035 ] 835 1036 }, 836 1037 "locked": { 837 - "lastModified": 1772945022, 838 - "narHash": "sha256-Fv14NttjL/7xfi6eVwrSEBAyBvDjI00RLiRNqA5apcw=", 1038 + "lastModified": 1774605342, 1039 + "narHash": "sha256-VEcy7N8TExxCsDem0SUsqJJlTcUm0y4vaSPYCghe5W8=", 839 1040 "owner": "0xc000022070", 840 1041 "repo": "zen-browser-flake", 841 - "rev": "3a6a5ca7fb48cc8fd8183386506a06579d1d79dc", 1042 + "rev": "4916e4d7ab444c544c3f36cc9fafe58cdb0f7237", 842 1043 "type": "github" 843 1044 }, 844 1045 "original": {
+19 -15
flake.nix
··· 12 12 lanzaboote, 13 13 nixos-generators, 14 14 treefmt-nix, 15 + determinate, 15 16 ... 16 17 }: 17 18 let ··· 44 45 self.nixosModules.default 45 46 ]; 46 47 }; 47 - MINI-BOYY = nixpkgs.lib.nixosSystem { 48 - system = "x86_64-linux"; 49 - specialArgs = { inherit inputs outputs self; }; 50 - modules = [ 51 - ./hosts/MINI-BOYY/default.nix 52 - 53 - disko.nixosModules.disko 54 - catppuccin.nixosModules.catppuccin 55 - nixos-hardware.nixosModules.apple-macmini-6 56 - self.nixosModules.default 57 - ]; 58 - }; 48 + # MINI-BOYY = nixpkgs.lib.nixosSystem { 49 + # system = "x86_64-linux"; 50 + # specialArgs = { inherit inputs outputs self; }; 51 + # modules = [ 52 + # ./hosts/MINI-BOYY/default.nix 53 + # 54 + # disko.nixosModules.disko 55 + # catppuccin.nixosModules.catppuccin 56 + # nixos-hardware.nixosModules.apple-macmini-6 57 + # self.nixosModules.default 58 + # ]; 59 + # }; 59 60 LAPTOP-5530 = nixpkgs.lib.nixosSystem { 60 61 system = "x86_64-linux"; 61 62 specialArgs = { inherit inputs outputs self; }; 62 63 modules = [ 63 64 ./hosts/LAPTOP-5530/default.nix 64 65 66 + determinate.nixosModules.default 65 67 disko.nixosModules.disko 66 68 catppuccin.nixosModules.catppuccin 67 69 nixos-hardware.nixosModules.dell-precision-5530 ··· 246 248 247 249 unstablepkgs.url = "github:nixos/nixpkgs/nixos-unstable"; 248 250 249 - nixos-hardware.url = "github:keyzox71/nixos-hardware/macmini-6"; 251 + nixos-hardware.url = "github:nixos/nixos-hardware"; 250 252 # nixos-hardware.url = "git+file:///home/adjoly/workspace/nixos-hardware"; 251 253 252 254 catppuccin = { ··· 309 311 inputs.nixpkgs.follows = "nixpkgs"; 310 312 }; 311 313 312 - dms-plugin-registry = { 314 + dms-plugin-registry = { 313 315 url = "github:AvengeMedia/dms-plugin-registry"; 314 316 inputs.nixpkgs.follows = "nixpkgs"; 315 317 }; 316 318 317 - dgop = { 319 + dgop = { 318 320 url = "github:AvengeMedia/dgop"; 319 321 inputs.nixpkgs.follows = "nixpkgs"; 320 322 }; 323 + 324 + determinate.url = "https://flakehub.com/f/DeterminateSystems/determinate/*"; 321 325 }; 322 326 }
+1 -3
home/LAPTOP-5530/default.nix
··· 21 21 hypridle.sleep_timeout = 600; 22 22 hyprlock.monitor = "eDP-1"; 23 23 k9s.enable = true; 24 - ghostty.enable = true; 25 24 }; 26 25 27 - programs.ghostty.settings.font-size = 14; 28 26 programs.kitty.font.size = 13.5; 29 - programs.btop.package = pkgs.btop-cuda; 27 + programs.btop.package = pkgs.emptyDirectory; 30 28 31 29 services.batsignal = { 32 30 enable = true;
+1 -2
home/LAPTOP-5530/packages.nix
··· 9 9 unstable.feishin 10 10 mpv 11 11 12 - tradingview 12 + unstable.readest 13 13 14 14 unstable.jetbrains.goland 15 15 ··· 24 24 25 25 slack 26 26 postman 27 - mockoon 28 27 firefox 29 28 gearlever 30 29 parsec-bin
+16 -50
hosts/LAPTOP-5530/default.nix
··· 16 16 "nvidia" 17 17 ]; 18 18 19 - # services.ollama = { 20 - # enable = true; 21 - # package = pkgs.unstable.ollama-cuda.override { 22 - # cudaArches = [ "sm_61" ]; 23 - # }; 24 - # # host = "[::]"; 25 - # }; 26 - # services.open-webui = { 27 - # enable = true; 28 - # package = pkgs.unstable.open-webui; 29 - # port = 6001; 30 - # environment = { 31 - # OLLAMA_API_BASE_URL = "http://127.0.0.1:11434"; 32 - # WEBUI_AUTH = "False"; 33 - # }; 34 - # }; 35 - 36 - networking.hostName = "LAPTOP-5530"; 37 - 38 - boot.kernelModules = [ "iwlwifi" ]; 39 - # boot.extraModprobeConfig = "options iwlwifi power_save=0 11n_disable=1"; 40 - 41 - # services.gns3-server = { 19 + # services.ollama = { 20 + # enable = true; 21 + # package = pkgs.unstable.ollama-cuda.override { 22 + # cudaArches = [ "sm_61" ]; 23 + # }; 24 + # # host = "[::]"; 25 + # }; 26 + # services.open-webui = { 42 27 # enable = true; 43 - # ubridge = { 44 - # enable = true; 28 + # package = pkgs.unstable.open-webui; 29 + # port = 6001; 30 + # environment = { 31 + # OLLAMA_API_BASE_URL = "http://127.0.0.1:11434"; 32 + # WEBUI_AUTH = "False"; 45 33 # }; 46 - # }; 34 + networking.hostName = "LAPTOP-5530"; 47 35 48 - users.users.adjoly.extraGroups = [ 49 - "i2c" 50 - "vboxusers" 51 - ]; 52 36 boot = { 53 - # blacklistedKernelModules = [ 54 - # "kvm" 55 - # "kvm_intel" 56 - # "kvm_amd" 57 - # ]; 58 37 kernelPackages = pkgs.linuxKernel.packages.linux_zen; 59 38 }; 60 39 40 + programs.usbtop.enable = true; 41 + 61 42 keyzox = { 62 43 defaults = true; 63 44 wm = true; ··· 68 49 hardware = { 69 50 bluetooth.enable = true; 70 51 logitech.enable = true; 71 - nvidia.powerManagement = true; 72 52 }; 73 53 programs = { 74 54 docker.enable = true; 75 55 steam.enable = true; 76 56 }; 77 - services = { }; 78 57 }; 79 - powerManagement.enable = true; 80 - environment.systemPackages = with pkgs; [ 81 - qemu 82 - gns3-gui 83 - wireshark 84 - ]; 85 - virtualisation.libvirtd.enable = true; 86 - virtualisation.virtualbox.host.enable = true; 87 - virtualisation.docker.daemon.settings.features.cdi = true; 88 - hardware.nvidia-container-toolkit.enable = true; 89 - programs.virt-manager.enable = true; 90 - 91 - programs.wireshark.enable = true; 92 58 93 59 # This value determines the NixOS release from which the default 94 60 # settings for stateful data, like file locations and database versions
+15 -8
hosts/LAPTOP-5530/hardware-configuration.nix
··· 10 10 (modulesPath + "/installer/scan/not-detected.nix") 11 11 ]; 12 12 13 - boot.initrd.availableKernelModules = [ 14 - "xhci_pci" 15 - "ahci" 16 - "nvme" 17 - "usb_storage" 18 - "sd_mod" 19 - "rtsx_pci_sdmmc" 20 - ]; 13 + powerManagement.enable = true; 14 + 15 + boot = { 16 + initrd.availableKernelModules = [ 17 + "xhci_pci" 18 + "ahci" 19 + "nvme" 20 + "usb_storage" 21 + "sd_mod" 22 + "rtsx_pci_sdmmc" 23 + ]; 24 + kernelParams = [ 25 + "i915.enable_fbc=1" 26 + ]; 27 + }; 21 28 22 29 networking.useDHCP = lib.mkDefault true; 23 30
+14 -11
hosts/home.nix
··· 20 20 "input" 21 21 "networkmanager" 22 22 "wheel" 23 + "i2c" 24 + "render" 23 25 "wireshark" 24 26 ]; 25 27 }; ··· 36 38 sudo-rs = { 37 39 enable = true; 38 40 extraConfig = '' 39 - Defaults pwfeedback 40 - ''; 41 + Defaults pwfeedback 42 + ''; 41 43 }; 42 44 }; 43 45 nixpkgs.overlays = [ 44 - (_final: prev: { 45 - inherit (prev.lixPackageSets.stable) 46 - nixpkgs-review 47 - nix-eval-jobs 48 - nix-fast-build 49 - colmena 50 - ; 51 - }) 46 + # (_final: prev: { 47 + # inherit (prev.lixPackageSets.stable) 48 + # nixpkgs-review 49 + # nix-eval-jobs 50 + # nix-fast-build 51 + # colmena 52 + # ; 53 + # }) 52 54 (_: _: { 55 + tailscale = inputs.unstablepkgs.legacyPackages.${pkgs.stdenv.hostPlatform.system}.tailscale; 53 56 unstable = import inputs.unstablepkgs { 54 57 system = pkgs.stdenv.hostPlatform.system; 55 58 config.allowUnfree = true; ··· 57 60 }) 58 61 ]; 59 62 60 - nix.package = pkgs.lixPackageSets.stable.lix; 63 + # nix.package = pkgs.lixPackageSets.stable.lix; 61 64 }
+7
modules/home-manager/cli/cli-app.nix
··· 32 32 settings = { 33 33 color_theme = "ayu"; 34 34 vim_keys = true; 35 + update_ms = 1000; 36 + 37 + proc_left = true; 38 + proc_tree = true; 39 + proc_sorting = "cpu direct"; 40 + proc_aggregate = true; 41 + proc_filter_kernel = true; 35 42 }; 36 43 }; 37 44 };
+2 -12
modules/home-manager/gui/wm/dms.nix
··· 1 1 { 2 2 lib, 3 3 config, 4 + inputs, 4 5 pkgs, 5 6 ... 6 7 }: ··· 16 17 package = pkgs.unstable.dms-shell; 17 18 quickshell.package = pkgs.unstable.quickshell; 18 19 19 - # enableSystemMonitoring = false; 20 - dgop.package = pkgs.emptyDirectory; 21 - # enableDynamicTheming = true; 22 - # enableVPN = true; 23 - # settings = { 24 - # theme = "dark"; 25 - # dynamicTheming = true; 26 - # }; 27 - # session = { 28 - # isLightMode = false; 29 - # # Add any other session state settings here 30 - # }; 20 + dgop.package = inputs.dgop.packages.${pkgs.stdenv.hostPlatform.system}.default; 31 21 plugins = { 32 22 dankBatteryAlerts.enable = true; 33 23 };
+4 -6
modules/home-manager/gui/wm/hyprland.nix
··· 14 14 config = lib.mkMerge [ 15 15 16 16 (lib.mkIf config.keyzox.hyprland.enable { 17 - keyzox.hyprpaper.enable = lib.mkDefault true; 17 + # keyzox.hyprpaper.enable = lib.mkDefault true; 18 18 keyzox.vicinae.enable = true; 19 19 # keyzox.waybar.enable = lib.mkDefault true; 20 20 keyzox.dms.enable = lib.mkDefault true; ··· 55 55 bind = [ 56 56 "$mod, P, exec, vicinae toggle" 57 57 "$win, V, exec, vicinae vicinae://extensions/vicinae/clipboard/history" 58 - "$win, P, exec, vicinae vicinae://extensions/jomifepe/bitwarden/authenticator" 59 58 "CONTROLALT, delete, exec, hyprctl dispatch exit" 60 59 "$mod, return, exec, kitty" 61 60 "$mod, Q, killactive" 62 61 "$mod, F, fullscreen" 63 - "$win, L, exec, hyprlock" 62 + "$win, L, exec, dms ipc lock lock" 64 63 "$win + SHIFT, S, exec, grimblast --notify copysave area \"$HOME/Nextcloud/Images/Captures dโ€™รฉcran/Capture dโ€™รฉcran $(date +%F-%H%M%S).png\"" 65 - "CTRL ALT, L, exec, systemctl suspend" 64 + "CTRL ALT, L, exec, dms ipc powermenu open" 66 65 ",Print, exec, grimblast --notify copysave area \"$HOME/Nextcloud/Images/Captures dโ€™รฉcran/Capture dโ€™รฉcran $(date +%F-%H%M%S).png\"" 67 - "SUPER, B, exec, killall -SIGUSR1 .waybar-wrapped" 68 66 ] 69 67 ++ (builtins.concatLists ( 70 68 builtins.genList ( ··· 85 83 env = [ 86 84 "XCURSOR_SIZE,30" 87 85 "XDG_CURRENT_DESKTOP,Hyprland" 88 - "OBSIDIAN_USE_WAYLAND=1" 86 + "OBSIDIAN_USE_WAYLAND,1" 89 87 ]; 90 88 cursor = { 91 89 no_hardware_cursors = true;
+5
modules/home-manager/ssh.nix
··· 9 9 ft_pubKeyLocation = "/home/adjoly/.ssh/id_42.pub"; 10 10 git_pubKeyLocation = "/home/adjoly/.ssh/id_git.pub"; 11 11 tangled_pubKeyLocation = "/home/adjoly/.ssh/id_tangled.pub"; 12 + frag_pubKeyLocation = "/home/adjoly/.ssh/id_frag.pub"; 12 13 in 13 14 { 14 15 options = { ··· 20 21 "id_42.pub" = { 21 22 target = ".ssh/id_42.pub"; 22 23 text = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEkLpl9HygemfyK7obLW7HCuFf4X5UFZCuXE28oe6xDN adjoly@student.42angouleme.fr"; 24 + }; 25 + "id_frag.pub" = { 26 + target = ".ssh/id_frag.pub"; 27 + text = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL1JD0BkOFv/EEfBnNvkix9AgYL5KdGdFO4MoVWtnpLU"; 23 28 }; 24 29 "id_git.pub" = { 25 30 target = ".ssh/id_git.pub";
+1
modules/nixos/default.nix
··· 18 18 hyprland.enable = true; 19 19 app-image.enable = true; 20 20 gnome-keyring.enable = true; 21 + btop.enable = true; 21 22 }; 22 23 services = { 23 24 gdm.enable = true;
+16
modules/nixos/hardware/nvidia.nix
··· 23 23 }; 24 24 }; 25 25 26 + btopCuda = 27 + lib.mkIf 28 + ( 29 + (config.keyzox.hardware.nvidia.enable || config.keyzox.hardware.nvidia.powerManagement) 30 + && config.keyzox.programs.btop.enable 31 + ) 32 + { 33 + keyzox.programs.btop.variant = "cuda"; 34 + }; 35 + 36 + powerManageGlobal = lib.mkIf config.powerManagement.enable { 37 + keyzox.hardware.nvidia.powerManagement = true; 38 + }; 39 + 26 40 powerManage = lib.mkIf config.keyzox.hardware.nvidia.powerManagement { 27 41 hardware.nvidia.powerManagement = { 28 42 enable = lib.mkDefault true; ··· 38 52 39 53 config = lib.mkMerge [ 40 54 powerManage 55 + powerManageGlobal 41 56 activate 57 + btopCuda 42 58 ]; 43 59 }
+51
modules/nixos/programs/btop.nix
··· 1 + { 2 + lib, 3 + pkgs, 4 + config, 5 + ... 6 + }: 7 + 8 + let 9 + cudaPackage = pkgs.btop-cuda; 10 + rocmPackage = pkgs.btop-rocm; 11 + defaultPackage = pkgs.btop; 12 + in 13 + { 14 + options = { 15 + keyzox.programs.btop.enable = lib.mkEnableOption ""; 16 + keyzox.programs.btop.variant = lib.mkOption { 17 + type = lib.types.str; 18 + default = ""; 19 + example = "cuda"; 20 + description = "Can be used to select the variant of the btop package (cuda or rocm)"; 21 + }; 22 + }; 23 + 24 + config = lib.mkIf config.keyzox.programs.btop.enable ( 25 + let 26 + package = 27 + if config.keyzox.programs.btop.variant == "rocm" then 28 + rocmPackage 29 + else if config.keyzox.programs.btop.variant == "cuda" then 30 + cudaPackage 31 + else 32 + defaultPackage; 33 + in 34 + { 35 + environment.systemPackages = [ 36 + package 37 + ]; 38 + systemd.tmpfiles.rules = [ 39 + "Z /sys/class/powercap/intel-rapl:0/energy_uj 0444 root root - -" 40 + ]; 41 + security.wrappers.btop = { 42 + source = "${package}/bin/btop"; 43 + capabilities = "cap_perfmon+ep"; 44 + owner = "root"; 45 + group = "root"; 46 + permissions = "u+rx,g+rx,o+rx"; 47 + }; 48 + } 49 + ); 50 + 51 + }
+1
modules/nixos/programs/default.nix
··· 6 6 imports = [ 7 7 ./nh.nix 8 8 ./hyprland.nix 9 + ./btop.nix 9 10 ./gnome-keyring.nix 10 11 ./app-image.nix 11 12 ./steam.nix
-1
modules/nixos/services/tailscale.nix
··· 15 15 services.tailscale = { 16 16 enable = true; 17 17 extraUpFlags = lib.mkBefore [ "--accept-routes" ]; 18 - package = inputs.unstablepkgs.legacyPackages.${pkgs.stdenv.hostPlatform.system}.tailscale; 19 18 }; 20 19 }; 21 20 }
+1 -1
modules/nixos/services/xserver.nix
··· 21 21 enable = lib.mkDefault true; 22 22 mouse.accelProfile = "flat"; 23 23 }; 24 - }; 24 + }; 25 25 }