this repo has no description
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

Update

Ben C 4418b81a 0cb829cf

+114 -38
+31 -29
flake.lock
··· 31 31 ] 32 32 }, 33 33 "locked": { 34 - "lastModified": 1761553912, 35 - "narHash": "sha256-3UOEQPBlZo9OixT9L1zoD67QheopTG8/EfRPGKyP9bg=", 34 + "lastModified": 1761906071, 35 + "narHash": "sha256-uq0X0KRzZkKGlkU1ARM+LWCAVvSYJZtTMpuzMO6LXRs=", 36 36 "owner": "catppuccin", 37 37 "repo": "nix", 38 - "rev": "7b42c91911c143ae3ea32a79cc8582b5920f24e3", 38 + "rev": "fd1bc7b1af0a576edb13c166c4b1f7b5c7555a73", 39 39 "type": "github" 40 40 }, 41 41 "original": { ··· 105 105 "rust-analyzer-src": "rust-analyzer-src" 106 106 }, 107 107 "locked": { 108 - "lastModified": 1759301100, 109 - "narHash": "sha256-hmiTEoVAqLnn80UkreCNunnRKPucKvcg5T4/CELEtbw=", 108 + "lastModified": 1761979010, 109 + "narHash": "sha256-isqMvjTk3jdTHN6KA/BWQvOSVe7O35OQKAZNtLK76OY=", 110 110 "owner": "nix-community", 111 111 "repo": "fenix", 112 - "rev": "0956bc5d1df2ea800010172c6bc4470d9a22cb81", 112 + "rev": "3107255abfe4f2d1c3eee7a3e2f5a5eb6f2200fe", 113 113 "type": "github" 114 114 }, 115 115 "original": { ··· 410 410 ] 411 411 }, 412 412 "locked": { 413 - "lastModified": 1761660375, 414 - "narHash": "sha256-04hmZlwuV8OjzvsBvFMnmcyC5IWcVnIU1V8i0P60jXU=", 413 + "lastModified": 1762041416, 414 + "narHash": "sha256-rmJKABRXnhFjjI6RB/MnEvLTQa569zu684Th9y6UlOI=", 415 415 "owner": "nix-community", 416 416 "repo": "home-manager", 417 - "rev": "d47259b685b1145b610fd8c28e7498304a97fa78", 417 + "rev": "c0016dd14773f4ca0b467b74c7cdcc501570df4b", 418 418 "type": "github" 419 419 }, 420 420 "original": { ··· 475 475 "nixpkgs" 476 476 ], 477 477 "pre-commit-hooks-nix": "pre-commit-hooks-nix", 478 - "rust-overlay": "rust-overlay" 478 + "rust-overlay": [ 479 + "rust-overlay" 480 + ] 479 481 }, 480 482 "locked": { 481 483 "lastModified": 1756744479, ··· 513 515 }, 514 516 "nixos-hardware": { 515 517 "locked": { 516 - "lastModified": 1760958188, 517 - "narHash": "sha256-2m1S4jl+GEDtlt2QqeHil8Ny456dcGSKJAM7q3j/BFU=", 518 + "lastModified": 1761933221, 519 + "narHash": "sha256-rNHeoG3ZrA94jczyLSjxCtu67YYPYIlXXr0uhG3wNxM=", 518 520 "owner": "NixOS", 519 521 "repo": "nixos-hardware", 520 - "rev": "d6645c340ef7d821602fd2cd199e8d1eed10afbc", 522 + "rev": "7467f155fcba189eb088a7601f44fbef7688669b", 521 523 "type": "github" 522 524 }, 523 525 "original": { ··· 528 530 }, 529 531 "nixpkgs": { 530 532 "locked": { 531 - "lastModified": 1761373498, 532 - "narHash": "sha256-Q/uhWNvd7V7k1H1ZPMy/vkx3F8C13ZcdrKjO7Jv7v0c=", 533 + "lastModified": 1761907660, 534 + "narHash": "sha256-kJ8lIZsiPOmbkJypG+B5sReDXSD1KGu2VEPNqhRa/ew=", 533 535 "owner": "NixOS", 534 536 "repo": "nixpkgs", 535 - "rev": "6a08e6bb4e46ff7fcbb53d409b253f6bad8a28ce", 537 + "rev": "2fb006b87f04c4d3bdf08cfdbc7fab9c13d94a15", 536 538 "type": "github" 537 539 }, 538 540 "original": { ··· 552 554 "systems": "systems_2" 553 555 }, 554 556 "locked": { 555 - "lastModified": 1761657569, 556 - "narHash": "sha256-2D4Tw5Vp52RU5amnBvq0/z+zgZqafwl4bhg8dJBBjXI=", 557 + "lastModified": 1762041710, 558 + "narHash": "sha256-DRLLVmPzfWJx9x3FyHX7IkuY56C2M9ENcqbzcCvQKlU=", 557 559 "owner": "nix-community", 558 560 "repo": "nixvim", 559 - "rev": "03c0dabb9a63f52bc2ebf571f3755720df1ca81e", 561 + "rev": "d3118a96caae448ba4b362ee7d54b2e702f7739a", 560 562 "type": "github" 561 563 }, 562 564 "original": { ··· 596 598 ] 597 599 }, 598 600 "locked": { 599 - "lastModified": 1760652422, 600 - "narHash": "sha256-C88Pgz38QIl9JxQceexqL2G7sw9vodHWx1Uaq+NRJrw=", 601 + "lastModified": 1761730856, 602 + "narHash": "sha256-t1i5p/vSWwueZSC0Z2BImxx3BjoUDNKyC2mk24krcMY=", 601 603 "owner": "NuschtOS", 602 604 "repo": "search", 603 - "rev": "3ebeebe8b6a49dfb11f771f761e0310f7c48d726", 605 + "rev": "e29de6db0cb3182e9aee75a3b1fd1919d995d85b", 604 606 "type": "github" 605 607 }, 606 608 "original": { ··· 700 702 "nixpkgs": "nixpkgs", 701 703 "nixvim": "nixvim", 702 704 "nu_plugin_dbus": "nu_plugin_dbus", 705 + "rust-overlay": "rust-overlay", 703 706 "spoon": "spoon", 704 707 "wayland-mpris-idle-inhibit": "wayland-mpris-idle-inhibit" 705 708 } ··· 707 710 "rust-analyzer-src": { 708 711 "flake": false, 709 712 "locked": { 710 - "lastModified": 1759245522, 711 - "narHash": "sha256-H4Hx/EuMJ9qi1WzPV4UG2bbZiDCdREtrtDvYcHr0kmk=", 713 + "lastModified": 1761894503, 714 + "narHash": "sha256-SreGV62DEv7kLJEcOBrw2V6Kup0siT4wS3Ye8PlFTdE=", 712 715 "owner": "rust-lang", 713 716 "repo": "rust-analyzer", 714 - "rev": "a6bc4a4bbe6a65b71cbf76a0cf528c47a8d9f97f", 717 + "rev": "2e2e3ebec91215078de9b754363fc9a7b0fdef13", 715 718 "type": "github" 716 719 }, 717 720 "original": { ··· 741 744 "rust-overlay": { 742 745 "inputs": { 743 746 "nixpkgs": [ 744 - "lanzaboote", 745 747 "nixpkgs" 746 748 ] 747 749 }, 748 750 "locked": { 749 - "lastModified": 1754189623, 750 - "narHash": "sha256-fstu5eb30UYwsxow0aQqkzxNxGn80UZjyehQVNVHuBk=", 751 + "lastModified": 1762051177, 752 + "narHash": "sha256-pESNTx/m3WnrYx+OujBtDP5Bj0/mAyHa4MgEwzkgkLE=", 751 753 "owner": "oxalica", 752 754 "repo": "rust-overlay", 753 - "rev": "c582ff7f0d8a7ea689ae836dfb1773f1814f472a", 755 + "rev": "08c33e87c4829bbdd42b5af247cf7a19e126369f", 754 756 "type": "github" 755 757 }, 756 758 "original": {
+15 -2
flake.nix
··· 10 10 hm.url = "github:nix-community/home-manager"; 11 11 hm.inputs.nixpkgs.follows = "nixpkgs"; 12 12 nixos-hardware.url = "github:NixOS/nixos-hardware"; 13 - lanzaboote.url = "github:nix-community/lanzaboote"; 14 - lanzaboote.inputs.nixpkgs.follows = "nixpkgs"; 13 + # lanzaboote.url = "github:nix-community/lanzaboote"; 14 + # lanzaboote.inputs.nixpkgs.follows = "nixpkgs"; 15 15 wayland-mpris-idle-inhibit.url = "github:Bwc9876/wayland-mpris-idle-inhibit"; 16 16 wayland-mpris-idle-inhibit.inputs.nixpkgs.follows = "nixpkgs"; 17 17 fenix.url = "github:nix-community/fenix/monthly"; ··· 28 28 bingus.url = "github:Bwc9876/bingus-bot"; 29 29 bingus.inputs.nixpkgs.follows = "nixpkgs"; 30 30 31 + lanzaboote = { 32 + url = "github:nix-community/lanzaboote"; 33 + inputs = { 34 + nixpkgs.follows = "nixpkgs"; 35 + rust-overlay.follows = "rust-overlay"; 36 + }; 37 + }; 38 + rust-overlay = { 39 + url = "github:oxalica/rust-overlay"; 40 + inputs.nixpkgs.follows = "nixpkgs"; 41 + }; 42 + 31 43 spoon.url = "git+https://codeberg.org/spoonbaker/mono"; 32 44 spoon.inputs = { 33 45 nixpkgs.follows = "nixpkgs"; ··· 54 66 bingus, 55 67 spoon, 56 68 gh-grader-preview, 69 + rust-overlay, 57 70 }: 58 71 flakelight ./. { 59 72 imports = [
+3 -1
homeModules/dev.nix
··· 15 15 nix = mkLangOpt "Nix dev stuff"; 16 16 python = mkLangOpt "Python dev stuff"; 17 17 dotnet = mkLangOpt ".NET dev stuff"; 18 + cutter = mkLangOpt "Cutter"; 18 19 }; 19 20 20 21 config = let ··· 102 103 dotnet-runtime 103 104 mono 104 105 dotnetPackages.Nuget 105 - ]); 106 + ]) 107 + ++ (lib.optional conf.cutter (cutter.withPlugins (p: with p; [rz-ghidra]))); 106 108 }; 107 109 }
+12 -1
homeModules/kde-connect.nix
··· 3 3 lib, 4 4 ... 5 5 }: { 6 - options.cow.kde-connect.enable = lib.mkEnableOption "KDE connect to connect to phones"; 6 + options.cow.kde-connect = { 7 + enable = lib.mkEnableOption "KDE connect to connect to phones"; 8 + dev-name = lib.mkOption { 9 + type = lib.types.str; 10 + description = "Name of the device in KDE connect"; 11 + }; 12 + }; 7 13 8 14 config = lib.mkIf config.cow.kde-connect.enable { 9 15 cow.imperm.keepCache = [".config/kdeconnect"]; 10 16 cow.firewall.tcp = lib.range 1714 1764; 17 + xdg.configFile."kdeconnect/config".text = '' 18 + [General] 19 + name=${config.cow.kde-connect.dev-name} 20 + ''; 21 + services.kdeconnect.enable = true; 11 22 systemd.user.services.kdeconnect.Service.Environment = lib.mkForce []; 12 23 }; 13 24 }
+11
homeModules/user-bean.nix
··· 1 1 {...}: { 2 + pkgs, 2 3 lib, 3 4 config, 4 5 ... ··· 36 37 }; 37 38 }; 38 39 }; 40 + 41 + home.packages = with pkgs; [ 42 + libreoffice-qt6 43 + obs-studio 44 + loupe 45 + inkscape 46 + lorien 47 + zoom-us 48 + tuxpaint 49 + ]; 39 50 40 51 home.sessionVariables = { 41 52 "EDITOR" = "nvim";
+9 -2
nixosConfigurations/aperture.nix
··· 18 18 users.users = let 19 19 secureRoot = "/nix/persist/secure"; 20 20 in { 21 - bean.password = "qaswedfr"; 22 - # bean.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 21 + bean.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 23 22 root.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 24 23 }; 25 24 25 + home-manager.users.bean.cow = { 26 + kde-connect = { 27 + enable = true; 28 + dev-name = "APERTURE"; 29 + }; 30 + }; 31 + 26 32 cow = { 27 33 bean.sudoer = true; 28 34 lanzaboote.enable = true; 35 + hypervisor.enable = true; 29 36 role-laptop = { 30 37 enable = true; 31 38 fingerPrintSensor = true;
+30
nixosModules/hypervisor.nix
··· 1 + { ... }: 2 + { 3 + config, 4 + lib, 5 + pkgs, 6 + ... 7 + }: 8 + { 9 + options.cow.hypervisor = { 10 + enable = lib.mkEnableOption "Enable running VMs"; 11 + }; 12 + 13 + config = lib.mkIf config.cow.hypervisor.enable { 14 + users.users.bean.extraGroups = lib.mkIf config.cow.bean.enable [ "libvirtd" ]; 15 + 16 + cow.imperm.keep = [ "/var/lib/libvirt" ]; 17 + 18 + programs.virt-manager.enable = config.cow.gdi.enable; 19 + 20 + environment.systemPackages = with pkgs; [ 21 + libtpms # For win 11 22 + ]; 23 + 24 + virtualisation.libvirtd = { 25 + enable = true; 26 + qemu.swtpm.enable = true; # Win 11 27 + onBoot = "ignore"; # I don't want VMs to start again on reboot 28 + }; 29 + }; 30 + }
+2 -3
nixosModules/role-laptop.nix
··· 9 9 }; 10 10 11 11 config = lib.mkIf config.cow.role-laptop.enable { 12 - home-manager.users.bean.cow = { 12 + home-manager.users.bean.cow = lib.mkIf config.cow.bean.enable { 13 13 music.enable = true; 14 14 news.enable = true; 15 15 qmplay2.enable = true; 16 16 sync.enable = true; 17 - kde-connect.enable = true; 18 17 dev.enable = true; 19 18 }; 20 19 ··· 34 33 showGreet = true; 35 34 }; 36 35 audio.enable = true; 37 - imperm.keep = lib.optional config.cow.role-laptop.fingerPrintSensor "/var/lib/fprintd"; 36 + imperm.keep = lib.optional config.cow.role-laptop.fingerPrintSensor "/var/lib/fprint"; 38 37 }; 39 38 40 39 services.fprintd = lib.mkIf config.cow.role-laptop.fingerPrintSensor {
+1
oldNixosModules/hypervisor.nix
··· 7 7 8 8 virtualisation.libvirtd = { 9 9 enable = true; 10 + qemu.swtpm.enable = true; # Win 11 needs TPM 10 11 onBoot = "ignore"; # I don't want VMs to start again on reboot 11 12 }; 12 13 }