NixOS + home-manager configs, mirrored from GitLab SaaS. gitlab.com/andreijiroh-dev/nixops-config
nix-flake nixos home-manager nixpkgs nix-flakes
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

chore(global): more nixos-generator related chaos and config updates

Signed-off-by: Andrei Jiroh Halili <ajhalili2006@andreijiroh.dev>

+63 -8
+40 -3
flake.lock
··· 179 179 ] 180 180 }, 181 181 "locked": { 182 - "lastModified": 1742996658, 183 - "narHash": "sha256-snxgTLVq6ooaD3W3mPHu7LVWpoZKczhxHAUZy2ea4oA=", 182 + "lastModified": 1743082807, 183 + "narHash": "sha256-qmrCYHVqE6j0TQApfxGx8aRYNdNsqtOrZuH09A+cjTU=", 184 184 "owner": "nix-community", 185 185 "repo": "home-manager", 186 - "rev": "693840c01b9bef9e54100239cef937e53d4661bf", 186 + "rev": "171915bfce41018528fda9960211e81946d999b7", 187 187 "type": "github" 188 188 }, 189 189 "original": { ··· 235 235 "type": "github" 236 236 } 237 237 }, 238 + "nixlib": { 239 + "locked": { 240 + "lastModified": 1736643958, 241 + "narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=", 242 + "owner": "nix-community", 243 + "repo": "nixpkgs.lib", 244 + "rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181", 245 + "type": "github" 246 + }, 247 + "original": { 248 + "owner": "nix-community", 249 + "repo": "nixpkgs.lib", 250 + "type": "github" 251 + } 252 + }, 253 + "nixos-generators": { 254 + "inputs": { 255 + "nixlib": "nixlib", 256 + "nixpkgs": [ 257 + "nixpkgs" 258 + ] 259 + }, 260 + "locked": { 261 + "lastModified": 1742568034, 262 + "narHash": "sha256-QaMEhcnscfF2MqB7flZr+sLJMMYZPnvqO4NYf9B4G38=", 263 + "owner": "nix-community", 264 + "repo": "nixos-generators", 265 + "rev": "42ee229088490e3777ed7d1162cb9e9d8c3dbb11", 266 + "type": "github" 267 + }, 268 + "original": { 269 + "owner": "nix-community", 270 + "repo": "nixos-generators", 271 + "type": "github" 272 + } 273 + }, 238 274 "nixos-hardware": { 239 275 "locked": { 240 276 "lastModified": 1742806253, ··· 319 355 "flake-utils": "flake-utils", 320 356 "home-manager": "home-manager", 321 357 "nix-ld": "nix-ld", 358 + "nixos-generators": "nixos-generators", 322 359 "nixos-hardware": "nixos-hardware", 323 360 "nixpkgs": "nixpkgs_2", 324 361 "systems": "systems_2",
+8 -1
flake.nix
··· 31 31 url = "github:Mic92/nix-ld"; 32 32 inputs.nixpkgs.follows = "nixpkgs"; 33 33 }; 34 + 35 + # nixos-generators 36 + nixos-generators = { 37 + url = "github:nix-community/nixos-generators"; 38 + inputs.nixpkgs.follows = "nixpkgs"; 39 + }; 34 40 }; 35 41 36 42 outputs = { ··· 42 48 vscode-server, 43 49 nix-ld, 44 50 flake-utils, 45 - systems 51 + systems, 52 + nixos-generators 46 53 }: 47 54 { 48 55 nixosConfigurations = {
+2
hosts/stellapent-cier/configuration.nix
··· 28 28 # Bootloader. 29 29 boot.loader.systemd-boot.enable = true; 30 30 boot.loader.efi.canTouchEfiVariables = true; 31 + boot.binfmt.emulatedSystems = [ "aarch64-linux" ]; # for raspi builds I guess 31 32 32 33 networking.hostName = "stellapent-cier"; # Define your hostname. 33 34 #networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. ··· 126 127 #figma-agent 127 128 byobu 128 129 tmux 130 + rpi-imager 129 131 ]; 130 132 131 133 # Some programs need SUID wrappers, can be configured further or are
+9 -4
misc/nix/nix.custom.conf
··· 1 - # Technically shared/meta-configs.nix but as a seperate conf file 2 - # since we use Determinate Nix on our systems. 1 + # Technically shared/meta-configs.nix but as a seperate conf file since we use Determinate Nix 2 + # on our systems. 3 3 experimental-features = nix-command flakes auto-allocate-uids ca-derivations cgroups configurable-impure-env daemon-trust-override dynamic-derivations fetch-closure fetch-tree git-hashing impure-derivations local-overlay-store mounted-ssh-store no-url-literals parse-toml-timestamps read-only-local-store recursive-nix verified-fetches 4 4 5 - trusted-users = root gildedguy ajhalili2006 nixos 6 - allowed-users = gildedguy ajhalili2006 nixos 5 + # this is how it will going to work atm 6 + trusted-users = root gildedguy ajhalili2006 nixos guest rapberry 7 + allowed-users = gildedguy ajhalili2006 nixos guest raspberry 7 8 9 + # probably just list every arch we're using here for cross-host compat 10 + extra-platforms = aarch64-linux x86_64-linux 11 + 12 + # substituters and pubkeys 8 13 extra-substituters = https://cache.nixos.org https://nix-community.cachix.org https://devenv.cachix.org 9 14 extra-trusted-substituters = https://cache.nixos.org https://nix-community.cachix.org https://andreijiroh-dev.cachix.org https://ajhalili2006-nixos-builds.cachix.org https://recaptime-dev.cachix.org 10 15 extra-trusted-public-keys = cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw= ajhalili2006-nixos-builds.cachix.org-1:fA8HXvGR1i792D+CxL2iW/TQzUcyoW7zPUmC9Q4mQLg= andreijiroh-dev.cachix.org-1:7Jd0STdBOLiNu5fiA+AKwcMqQD2PA1j9zLDGyDkuyBo= recaptime-dev.cachix.org-1:b0UBO1zONf6ceTIoR06AKhgid4ZOl5kxB/gOIdZ9J6g=
+4
shared/desktop/kde-plasma.nix
··· 7 7 8 8 # Also enable KDE Connect 9 9 programs.kdeconnect.enable = true; 10 + 11 + environment.systemPackages = with pkgs; [ 12 + krfb 13 + ] 10 14 }