this repo has no description
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

Finalize black mesa, try install

Ben C ba94e94a bcd557cd

+306 -305
+18 -22
flake.nix
··· 37 37 }; 38 38 }; 39 39 40 - outputs = 41 - inputs@{ 42 - self, 43 - nixpkgs, 44 - flakelight, 45 - nix-index-db, 46 - hm, 47 - nixos-hardware, 48 - lanzaboote, 49 - wayland-mpris-idle-inhibit, 50 - fenix, 51 - catppuccin, 52 - nixvim, 53 - imperm, 54 - nu_plugin_dbus, 55 - bingus, 56 - spoon, 57 - gh-grader-preview, 58 - }: 40 + outputs = inputs @ { 41 + self, 42 + nixpkgs, 43 + flakelight, 44 + nix-index-db, 45 + hm, 46 + nixos-hardware, 47 + lanzaboote, 48 + wayland-mpris-idle-inhibit, 49 + fenix, 50 + catppuccin, 51 + nixvim, 52 + imperm, 53 + nu_plugin_dbus, 54 + bingus, 55 + spoon, 56 + gh-grader-preview, 57 + }: 59 58 flakelight ./. { 60 59 # imports = [ 61 60 # spoon.flakelightModules.repl ··· 67 66 "*.sh" = "shfmt -w ."; 68 67 }; 69 68 70 - packages = nixpkgs.lib.genAttrs [ "wayland-mpris-idle-inhibit" "nu_plugin_dbus" ] ( 71 - i: { pkgs }: inputs.${i}.packages.${pkgs.system}.default 72 - ); 73 69 nixDir = ./.; 74 70 legacyPackages = pkgs: pkgs; 75 71 nixpkgs.config = {
+4 -2
homeModules/gdi.nix
··· 381 381 desc = "Battery Notification Service"; 382 382 383 383 service = { 384 - ExecStart = "${pkgs.nushell}/bin/nu ${../res/battery_notif.nu}"; 384 + ExecStart = "${pkgs.nushell}/bin/nu --plugins ${ 385 + inputs.nu_plugin_dbus.packages.${pkgs.system}.default 386 + } ${../res/battery_notif.nu}"; 385 387 Restart = "on-failure"; 386 388 RestartSec = "10"; 387 389 }; ··· 679 681 location = "center"; 680 682 }; 681 683 nushell.extraConfig = '' 682 - plugin add ${pkgs.nu_plugin_dbus}/bin/nu_plugin_dbus 684 + plugin add ${inputs.nu_plugin_dbus.packages.${pkgs.system}.default}/bin/nu_plugin_dbus 683 685 ''; 684 686 685 687 wezterm = {
+55 -56
homeModules/nushell.nix
··· 1 - { ... }: 2 - { 1 + {...}: { 3 2 config, 4 3 pkgs, 5 4 lib, 6 5 ... 7 - }: 8 - { 6 + }: { 9 7 options.cow.nushell = { 10 8 enable = lib.mkEnableOption "Nushell + Customizations"; 11 9 commandNotFound = lib.mkEnableOption "Custom Nix Command Not Found for Nushell"; 12 10 completers = { 13 - carapace = (lib.mkEnableOption "Carapace Completer In Nushell") // { 14 - default = true; 15 - }; 11 + carapace = 12 + (lib.mkEnableOption "Carapace Completer In Nushell") 13 + // { 14 + default = true; 15 + }; 16 16 }; 17 17 }; 18 18 19 - config = 20 - let 21 - conf = config.cow.nushell; 22 - in 19 + config = let 20 + conf = config.cow.nushell; 21 + in 23 22 lib.mkIf conf.enable { 24 - cow.imperm.keep = [ ".local/share/zoxide" ]; 25 - cow.imperm.keepFiles = [ ".config/nushell/history.txt" ]; 23 + cow.imperm.keep = [".local/share/zoxide"]; 24 + cow.imperm.keepFiles = [".config/nushell/history.txt"]; 26 25 27 26 programs = { 28 27 zoxide.enable = true; 29 28 command-not-found.enable = !conf.commandNotFound; 30 - nushell = 31 - let 32 - carapaceComplete = builtins.replaceStrings [ "__carapace__" ] [ "${pkgs.carapace}/bin/carapace" ] ( 33 - lib.fileContents ../res/nushellCompletions/carapace.nu 34 - ); 35 - cnf = lib.fileContents ../res/command_not_found.nu; 36 - nu_config = 37 - let 38 - doCompletions = builtins.any (x: x) (builtins.attrValues conf.completers); 39 - in 40 - '' 41 - { 42 - show_banner: false, 43 - completions: { 44 - external: { 45 - enable: ${builtins.toJSON doCompletions} 46 - completer: ${if doCompletions then carapaceComplete else ''{|spans| []}''} 47 - }, 48 - }, 49 - hooks: { 50 - ${lib.optionalString conf.commandNotFound '' 51 - command_not_found: ${cnf} 52 - ''} 53 - } 54 - } 55 - ''; 56 - init-starship = pkgs.runCommand "starship-init" { } '' 57 - ${pkgs.starship}/bin/starship init nu > $out 58 - ''; 59 - in 60 - { 61 - enable = true; 62 - configFile.text = '' 63 - $env.config = ${nu_config} 29 + nushell = let 30 + carapaceComplete = builtins.replaceStrings ["__carapace__"] ["${pkgs.carapace}/bin/carapace"] ( 31 + lib.fileContents ../res/nushellCompletions/carapace.nu 32 + ); 33 + cnf = lib.fileContents ../res/command_not_found.nu; 34 + nu_config = let 35 + doCompletions = builtins.any (x: x) (builtins.attrValues conf.completers); 36 + in '' 37 + { 38 + show_banner: false, 39 + completions: { 40 + external: { 41 + enable: ${builtins.toJSON doCompletions} 42 + completer: ${ 43 + if doCompletions 44 + then carapaceComplete 45 + else ''{|spans| []}'' 46 + } 47 + }, 48 + }, 49 + hooks: { 50 + ${lib.optionalString conf.commandNotFound '' 51 + command_not_found: ${cnf} 52 + ''} 53 + } 54 + } 55 + ''; 56 + init-starship = pkgs.runCommand "starship-init" {} '' 57 + ${pkgs.starship}/bin/starship init nu > $out 58 + ''; 59 + in { 60 + enable = true; 61 + configFile.text = '' 62 + $env.config = ${nu_config} 64 63 65 - ${lib.optionalString config.cow.starship.enable '' 66 - source ${init-starship} 67 - ''} 68 - ''; 69 - shellAliases = { 70 - "cd" = "z"; 71 - "py" = "python"; 72 - "🥺" = "sudo"; 73 - }; 64 + ${lib.optionalString config.cow.starship.enable '' 65 + source ${init-starship} 66 + ''} 67 + ''; 68 + shellAliases = { 69 + "cd" = "z"; 70 + "py" = "python"; 71 + "🥺" = "sudo"; 74 72 }; 73 + }; 75 74 }; 76 75 }; 77 76 }
+2 -2
homeModules/waybar.nix
··· 1 - {...}: { 1 + {inputs, ...}: { 2 2 config, 3 3 lib, 4 4 pkgs, ··· 317 317 tooltip-format = "{:%F at %T in %Z (UTC%Ez)}"; 318 318 }; 319 319 "custom/kde-connect" = { 320 - exec = "${pkgs.nushell}/bin/nu ${../res/custom_waybar_modules/kdeconnect.nu}"; 320 + exec = "${pkgs.nushell}/bin/nu --plugins ${inputs.nu_plugin_dbus.packages.${pkgs.system}.default} ${../res/custom_waybar_modules/kdeconnect.nu}"; 321 321 format = "{}"; 322 322 interval = 30; 323 323 on-click = "kdeconnect-settings";
+42 -42
nixosConfigurations/aperture.nix
··· 3 3 inputs, 4 4 outputs, 5 5 ... 6 - }: 7 - { 6 + }: { 8 7 system = "x86_64-linux"; 9 8 10 - modules = (builtins.attrValues outputs.nixosModules) ++ [ 11 - inputs.nixos-hardware.nixosModules.framework-13th-gen-intel 12 - { 13 - home-manager.users.bean.home.stateVersion = "25.05"; 14 - system.stateVersion = "25.05"; 15 - networking.hostName = "aperture"; 9 + modules = 10 + (builtins.attrValues outputs.nixosModules) 11 + ++ [ 12 + inputs.nixos-hardware.nixosModules.framework-13th-gen-intel 13 + { 14 + home-manager.users.bean.home.stateVersion = "25.05"; 15 + system.stateVersion = "25.05"; 16 + networking.hostName = "aperture"; 16 17 17 - users.users = 18 - let 18 + users.users = let 19 19 secureRoot = "/nix/persist/secure"; 20 - in 21 - { 20 + in { 22 21 bean.password = "qaswedfr"; 23 22 # bean.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 24 23 root.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 25 24 }; 26 25 27 - cow = { 28 - lanzaboote.enable = true; 29 - role-laptop = { 30 - enable = true; 31 - fingerPrintSensor = true; 32 - }; 33 - gaming.enable = true; 34 - imperm.enable = true; 35 - disks = { 36 - enable = true; 37 - swap = true; 38 - luks = true; 26 + cow = { 27 + bean.sudoer = true; 28 + lanzaboote.enable = true; 29 + role-laptop = { 30 + enable = true; 31 + fingerPrintSensor = true; 32 + }; 33 + gaming.enable = true; 34 + imperm.enable = true; 35 + disks = { 36 + enable = true; 37 + swap = true; 38 + luks = true; 39 + }; 39 40 }; 40 - }; 41 41 42 - boot.initrd.availableKernelModules = [ 43 - "xhci_pci" 44 - "thunderbolt" 45 - "nvme" 46 - "usb_storage" 47 - "sd_mod" 48 - ]; 49 - boot.initrd.kernelModules = [ ]; 50 - boot.kernelModules = [ "kvm-intel" ]; 51 - boot.extraModulePackages = [ ]; 52 - boot.binfmt.emulatedSystems = [ "aarch64-linux" ]; 42 + boot.initrd.availableKernelModules = [ 43 + "xhci_pci" 44 + "thunderbolt" 45 + "nvme" 46 + "usb_storage" 47 + "sd_mod" 48 + ]; 49 + boot.initrd.kernelModules = []; 50 + boot.kernelModules = ["kvm-intel"]; 51 + boot.extraModulePackages = []; 52 + boot.binfmt.emulatedSystems = ["aarch64-linux"]; 53 53 54 - hardware.framework.enableKmod = false; 54 + hardware.framework.enableKmod = false; 55 55 56 - powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; 57 - hardware.enableRedistributableFirmware = lib.mkDefault true; 58 - hardware.cpu.intel.updateMicrocode = true; 59 - } 60 - ]; 56 + powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; 57 + hardware.enableRedistributableFirmware = lib.mkDefault true; 58 + hardware.cpu.intel.updateMicrocode = true; 59 + } 60 + ]; 61 61 }
+78 -67
nixosConfigurations/black-mesa.nix
··· 2 2 inputs, 3 3 outputs, 4 4 ... 5 - }: 6 - { 5 + }: { 7 6 system = "x86_64-linux"; 8 7 9 - modules = (builtins.attrValues outputs.nixosModules) ++ [ 10 - inputs.nixos-hardware.nixosModules.common-gpu-amd 11 - inputs.nixos-hardware.nixosModules.common-cpu-amd 12 - { 13 - home-manager.users.bean.home.stateVersion = "25.05"; 14 - system.stateVersion = "25.05"; 15 - networking.hostName = "black-mesa"; 8 + modules = 9 + (builtins.attrValues outputs.nixosModules) 10 + ++ [ 11 + inputs.nixos-hardware.nixosModules.common-gpu-amd 12 + inputs.nixos-hardware.nixosModules.common-cpu-amd 13 + { 14 + home-manager.users.bean.home.stateVersion = "25.05"; 15 + system.stateVersion = "25.05"; 16 + networking.hostName = "black-mesa"; 16 17 17 - powerManagement.cpuFreqGovernor = "performance"; 18 + powerManagement.cpuFreqGovernor = "performance"; 18 19 19 - boot.initrd.availableKernelModules = [ 20 - "nvme" 21 - "xhci_pci" 22 - "ahci" 23 - "usbhid" 24 - "usb_storage" 25 - "sd_mod" 26 - ]; 27 - boot.kernelModules = [ "kvm-amd" ]; 28 - boot.extraModulePackages = [ ]; 20 + boot.initrd.availableKernelModules = [ 21 + "nvme" 22 + "xhci_pci" 23 + "ahci" 24 + "usbhid" 25 + "usb_storage" 26 + "sd_mod" 27 + ]; 28 + boot.kernelModules = ["kvm-amd"]; 29 + boot.extraModulePackages = []; 29 30 30 - # Other disks handled by cow.disks 31 - fileSystems."/mnt/storage" = { 32 - device = "/dev/sda1"; 33 - fsType = "btrfs"; 34 - }; 31 + # Other disks handled by cow.disks 32 + fileSystems."/mnt/storage" = { 33 + device = "/dev/sda1"; 34 + fsType = "btrfs"; 35 + }; 35 36 36 - users.users = 37 - let 37 + users.users = let 38 38 secureRoot = "/nix/persist/secure"; 39 - in 40 - { 39 + in { 41 40 bean.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 42 41 root.hashedPasswordFile = "${secureRoot}/hashed-passwd"; 43 42 }; 44 43 45 - cow = { 46 - lanzaboote.enable = true; 47 - ssh-server.enable = true; 48 - role-desktop.enable = true; 49 - gaming.enable = true; 50 - imperm.enable = true; 51 - disks = { 52 - enable = true; 53 - swap = false; 54 - luks = true; 44 + home-manager.users.bean.cow = { 45 + sync.enable = true; 46 + dev.enable = true; 47 + }; 48 + 49 + cow = { 50 + bean.sudoer = true; 51 + lanzaboote.enable = true; 52 + ssh-server.enable = true; 53 + role-desktop.enable = true; 54 + gaming.enable = true; 55 + imperm.enable = true; 56 + disks = { 57 + enable = true; 58 + partition-prefix = "cow-bm"; 59 + swap = false; 60 + luks = true; 61 + }; 55 62 }; 56 - }; 57 - } 58 - { 59 - # Bingus! 60 - imports = [ inputs.bingus.nixosModules.default ]; 61 - nixpkgs.overlays = [ inputs.bingus.overlays.default ]; 63 + } 64 + { 65 + # Bingus! 66 + imports = [inputs.bingus.nixosModules.default]; 67 + nixpkgs.overlays = [inputs.bingus.overlays.default]; 62 68 63 - services.bingus-bot = { 64 - enable = true; 65 - replyChannels = [ 66 - 1295447496948191262 67 - 1295245646542143489 69 + cow.imperm.keep = [ 70 + "/var/lib/private/bingus" 68 71 ]; 69 - }; 70 - } 71 - { 72 - # for WOL 73 - systemd.network.links."79-eth-wol" = { 74 - matchConfig = { 75 - Type = "ether"; 76 - Driver = "!veth"; 77 - Virtualization = "false"; 72 + 73 + services.bingus-bot = { 74 + enable = true; 75 + tokenFile = "/nix/persist/secure/bingus-token"; 76 + replyChannels = [ 77 + 1295447496948191262 78 + 1295245646542143489 79 + ]; 78 80 }; 79 - linkConfig = { 80 - WakeOnLan = "magic"; 81 - NamePolicy = "keep kernel database onboard slot path"; 82 - AlternativeNamesPolicy = "database onboard slot path mac"; 83 - MACAddressPolicy = "persistent"; 81 + } 82 + { 83 + # for WOL 84 + systemd.network.links."79-eth-wol" = { 85 + matchConfig = { 86 + Type = "ether"; 87 + Driver = "!veth"; 88 + Virtualization = "false"; 89 + }; 90 + linkConfig = { 91 + WakeOnLan = "magic"; 92 + NamePolicy = "keep kernel database onboard slot path"; 93 + AlternativeNamesPolicy = "database onboard slot path mac"; 94 + MACAddressPolicy = "persistent"; 95 + }; 84 96 }; 85 - }; 86 - } 87 - ]; 97 + } 98 + ]; 88 99 }
+64 -67
nixosConfigurations/installer.nix
··· 2 2 lib, 3 3 outputs, 4 4 ... 5 - }: 6 - { 5 + }: { 7 6 system = "x86_64-linux"; 8 7 9 - modules = (builtins.attrValues outputs.nixosModules) ++ [ 10 - ( 11 - { 12 - modulesPath, 13 - pkgs, 14 - ... 15 - }: 16 - { 17 - imports = [ 18 - "${modulesPath}/installer/cd-dvd/installation-cd-minimal.nix" 19 - ]; 20 - 21 - services.kmscon = { 22 - enable = true; 23 - autologinUser = "root"; 24 - fonts = [ 25 - { 26 - name = "FiraMono Nerd Font Mono"; 27 - package = pkgs.nerd-fonts.fira-mono; 28 - } 8 + modules = 9 + (builtins.attrValues outputs.nixosModules) 10 + ++ [ 11 + ( 12 + { 13 + modulesPath, 14 + pkgs, 15 + ... 16 + }: { 17 + imports = [ 18 + "${modulesPath}/installer/cd-dvd/installation-cd-minimal.nix" 29 19 ]; 30 - }; 20 + 21 + services.kmscon = { 22 + enable = true; 23 + autologinUser = "root"; 24 + fonts = [ 25 + { 26 + name = "FiraMono Nerd Font Mono"; 27 + package = pkgs.nerd-fonts.fira-mono; 28 + } 29 + ]; 30 + }; 31 31 32 - boot = 33 - let 32 + boot = let 34 33 supportedFilesystems = { 35 34 btrfs = true; 36 35 reiserfs = lib.mkForce false; ··· 41 40 cifs = true; 42 41 zfs = lib.mkForce false; 43 42 }; 44 - in 45 - { 43 + in { 46 44 initrd.systemd.enable = false; 47 45 inherit supportedFilesystems; 48 46 initrd = { ··· 50 48 }; 51 49 }; 52 50 53 - system.extraDependencies = [ 54 - outputs.nixosConfigurations.aperture.config.system.build.toplevel 55 - outputs.nixosConfigurations.black-mesa.config.system.build.toplevel 56 - ]; 51 + system.extraDependencies = [ 52 + outputs.nixosConfigurations.aperture.config.system.build.toplevel 53 + outputs.nixosConfigurations.black-mesa.config.system.build.toplevel 54 + ]; 57 55 58 - environment.systemPackages = with pkgs; [ 59 - disko 60 - sbctl 61 - ]; 62 - } 63 - ) 64 - ( 65 - { pkgs, ... }: 66 - { 67 - system.stateVersion = "25.05"; 68 - networking.hostName = "cow-installer"; 56 + environment.systemPackages = with pkgs; [ 57 + disko 58 + sbctl 59 + ]; 60 + } 61 + ) 62 + ( 63 + {pkgs, ...}: { 64 + system.stateVersion = "25.05"; 65 + networking.hostName = "cow-installer"; 69 66 70 - networking.networkmanager.enable = lib.mkForce false; 67 + networking.networkmanager.enable = lib.mkForce false; 71 68 72 - users.users.root = { 73 - shell = pkgs.nushell; 74 - }; 69 + users.users.root = { 70 + shell = pkgs.nushell; 71 + }; 75 72 76 - home-manager.users.root.home.stateVersion = "25.05"; 77 - home-manager.users.root.cow = { 78 - nushell = { 79 - enable = true; 80 - commandNotFound = true; 73 + home-manager.users.root.home.stateVersion = "25.05"; 74 + home-manager.users.root.cow = { 75 + nushell = { 76 + enable = true; 77 + commandNotFound = true; 78 + }; 79 + neovim.enable = true; 80 + htop.enable = true; 81 + starship.enable = true; 82 + yazi.enable = true; 83 + dev.enable = false; 84 + comma.enable = true; 85 + cat.enable = true; 81 86 }; 82 - neovim.enable = true; 83 - htop.enable = true; 84 - starship.enable = true; 85 - yazi.enable = true; 86 - dev.enable = false; 87 - comma.enable = true; 88 - cat.enable = true; 89 - }; 90 87 91 - cow = { 92 - network.wireless = true; 93 - hm.enable = true; 94 - cat.enable = true; 95 - }; 96 - } 97 - ) 98 - ]; 88 + cow = { 89 + network.wireless = true; 90 + hm.enable = true; 91 + cat.enable = true; 92 + }; 93 + } 94 + ) 95 + ]; 99 96 }
+38 -30
nixosModules/disks.nix
··· 1 - { ... }: 2 - { 1 + {...}: { 3 2 config, 4 3 lib, 5 4 ... 6 - }: 7 - { 5 + }: { 8 6 options.cow.disks = { 9 7 enable = lib.mkEnableOption "allowing cow to create a UEFI-compatible layout"; 10 8 swap = lib.mkEnableOption "look for and swapon a swap device"; ··· 16 14 }; 17 15 }; 18 16 19 - config = 20 - let 21 - conf = config.cow.disks; 22 - prefix = if conf.partition-prefix == null then "" else "${conf.partition-prefix}-"; 23 - primaryPart = "/dev/disk/by-partlabel/${prefix}NIXOS"; 24 - swapPart = "/dev/disk/by-partlabel/${prefix}SWAP"; 25 - bootPart = "/dev/disk/by-partlabel/${prefix}BOOT"; 26 - cryptroot = "/dev/mapper/cryptroot"; 27 - cryptswap = "/dev/mapper/cryptswap"; 28 - in 17 + config = let 18 + conf = config.cow.disks; 19 + prefix = 20 + if conf.partition-prefix == null 21 + then "" 22 + else "${conf.partition-prefix}-"; 23 + primaryPart = "/dev/disk/by-partlabel/${prefix}NIXOS"; 24 + swapPart = "/dev/disk/by-partlabel/${prefix}SWAP"; 25 + bootPart = "/dev/disk/by-partlabel/${prefix}BOOT"; 26 + cryptroot = "/dev/mapper/cryptroot"; 27 + cryptswap = "/dev/mapper/cryptswap"; 28 + in 29 29 lib.mkIf config.cow.disks.enable { 30 30 boot.initrd.kernelModules = [ 31 31 "nvme" ··· 45 45 }; 46 46 swapDevices = [ 47 47 { 48 - device = if conf.luks then cryptswap else swapPart; 48 + device = 49 + if conf.luks 50 + then cryptswap 51 + else swapPart; 49 52 } 50 53 ]; 51 54 fileSystems."/boot" = { ··· 61 64 ]; 62 65 }; 63 66 fileSystems."/nix" = lib.mkIf config.cow.imperm.enable { 64 - device = if conf.luks then cryptroot else primaryPart; 67 + device = 68 + if conf.luks 69 + then cryptroot 70 + else primaryPart; 65 71 fsType = "ext4"; 66 72 options = [ 67 73 "lazytime" ··· 71 77 neededForBoot = true; 72 78 }; 73 79 fileSystems."/" = 74 - if config.cow.imperm.enable then 75 - { 76 - fsType = "tmpfs"; 77 - options = [ 78 - "size=512M" 79 - "mode=755" 80 - ]; 81 - neededForBoot = true; 82 - } 83 - else 84 - { 85 - device = if conf.luks then cryptroot else primaryPart; 86 - fsType = "ext4"; 87 - }; 80 + if config.cow.imperm.enable 81 + then { 82 + fsType = "tmpfs"; 83 + options = [ 84 + "size=512M" 85 + "mode=755" 86 + ]; 87 + neededForBoot = true; 88 + } 89 + else { 90 + device = 91 + if conf.luks 92 + then cryptroot 93 + else primaryPart; 94 + fsType = "ext4"; 95 + }; 88 96 fileSystems."/home" = lib.mkIf config.cow.imperm.enable { 89 97 fsType = "tmpfs"; 90 98 options = [
-9
nixosModules/role-desktop.nix
··· 10 10 config = lib.mkIf config.cow.role-desktop.enable { 11 11 security.sudo.wheelNeedsPassword = false; 12 12 13 - home-manager.users.bean.cow = { 14 - music.enable = true; 15 - news.enable = true; 16 - qmplay2.enable = true; 17 - sync.enable = true; 18 - kde-connect.enable = true; 19 - dev.enable = true; 20 - }; 21 - 22 13 cow = { 23 14 bean.enable = true; 24 15 firewall.openForUsers = true;
+4 -7
nixosModules/user-bean.nix
··· 1 - { ... }: 2 - { 1 + {...}: { 3 2 config, 4 3 lib, 5 4 pkgs, 6 5 ... 7 - }: 8 - let 6 + }: let 9 7 pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKsVzdJra+x5aEuwTjL1FBOiMh9bftvs8QwsM1xyEbdd"; 10 - in 11 - { 8 + in { 12 9 options.cow.bean = { 13 10 enable = lib.mkEnableOption "Bean user"; 14 11 sudoer = lib.mkEnableOption "Bean being a sudoer"; ··· 20 17 description = "Ben C"; 21 18 extraGroups = lib.optional config.cow.bean.sudoer "wheel"; 22 19 shell = pkgs.nushell; 23 - openssh.authorizedKeys.keys = [ pubkey ]; 20 + openssh.authorizedKeys.keys = [pubkey]; 24 21 }; 25 22 26 23 home-manager.users.bean = {
+1 -1
res/battery_notif.nu
··· 70 70 71 71 let devices = list_devices; 72 72 73 - print "===========" "Device List" ($devices | select friendly_name upower_path Type) "-----------"; 73 + # print "===========" "Device List" ($devices | select friendly_name upower_path Type) "-----------"; 74 74 75 75 for dev in $devices { 76 76 if (($shown_notifs | get -o $dev.upower_path | get -o 0) == null) {