Nix Flakes configuration for MacOS, NixOS and WSL
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

fix: desktop cannot be launched from systemd

unknown reason for the moment

+23 -145
+17 -136
flake.lock
··· 1 1 { 2 2 "nodes": { 3 - "chaotic": { 4 - "inputs": { 5 - "flake-schemas": "flake-schemas", 6 - "home-manager": "home-manager", 7 - "jovian": "jovian", 8 - "nixpkgs": "nixpkgs" 9 - }, 10 - "locked": { 11 - "lastModified": 1731866540, 12 - "narHash": "sha256-wAz/S5GLm+9Vp0kmUPsva3Mxp+VUnbEUZ8aBM1aEhhY=", 13 - "owner": "chaotic-cx", 14 - "repo": "nyx", 15 - "rev": "0857914b69d90ba758e614298452636c6fdc9c7c", 16 - "type": "github" 17 - }, 18 - "original": { 19 - "owner": "chaotic-cx", 20 - "ref": "nyxpkgs-unstable", 21 - "repo": "nyx", 22 - "type": "github" 23 - } 24 - }, 25 3 "darwin": { 26 4 "inputs": { 27 5 "nixpkgs": [ ··· 29 7 ] 30 8 }, 31 9 "locked": { 32 - "lastModified": 1731885500, 33 - "narHash": "sha256-ZrztYfSOS33J+ewq5alBOSdnIyZ0/sr1iy7FyBe9zIg=", 10 + "lastModified": 1732016537, 11 + "narHash": "sha256-XwXUK+meYnlhdQz2TVE4Wv+tsx1CkdGbDPt1tRzCNH4=", 34 12 "owner": "LnL7", 35 13 "repo": "nix-darwin", 36 - "rev": "c60b5c924c6188a0b3ca2e139ead3d0f92ae5db5", 14 + "rev": "61cee20168a3ebb71a9efd70a55adebaadfbe4d4", 37 15 "type": "github" 38 16 }, 39 17 "original": { ··· 74 52 "type": "github" 75 53 } 76 54 }, 77 - "flake-schemas": { 78 - "locked": { 79 - "lastModified": 1721999734, 80 - "narHash": "sha256-G5CxYeJVm4lcEtaO87LKzOsVnWeTcHGKbKxNamNWgOw=", 81 - "rev": "0a5c42297d870156d9c57d8f99e476b738dcd982", 82 - "revCount": 75, 83 - "type": "tarball", 84 - "url": "https://api.flakehub.com/f/pinned/DeterminateSystems/flake-schemas/0.1.5/0190ef2f-61e0-794b-ba14-e82f225e55e6/source.tar.gz" 85 - }, 86 - "original": { 87 - "type": "tarball", 88 - "url": "https://flakehub.com/f/DeterminateSystems/flake-schemas/%3D0.1.5.tar.gz" 89 - } 90 - }, 91 55 "flake-utils": { 92 56 "inputs": { 93 57 "systems": "systems" ··· 146 110 "home-manager": { 147 111 "inputs": { 148 112 "nixpkgs": [ 149 - "chaotic", 150 113 "nixpkgs" 151 114 ] 152 115 }, 153 116 "locked": { 154 - "lastModified": 1731535640, 155 - "narHash": "sha256-2EckCJn4wxran/TsRiCOFcmVpep2m9EBKl99NBh2GnM=", 117 + "lastModified": 1732025103, 118 + "narHash": "sha256-qjEI64RKvDxRyEarY0jTzrZMa8ebezh2DEZmJJrpVdo=", 156 119 "owner": "nix-community", 157 120 "repo": "home-manager", 158 - "rev": "35b055009afd0107b69c286fca34d2ad98940d57", 121 + "rev": "a46e702093a5c46e192243edbd977d5749e7f294", 159 122 "type": "github" 160 123 }, 161 124 "original": { ··· 164 127 "type": "github" 165 128 } 166 129 }, 167 - "home-manager_2": { 168 - "inputs": { 169 - "nixpkgs": [ 170 - "nixpkgs" 171 - ] 172 - }, 173 - "locked": { 174 - "lastModified": 1731887066, 175 - "narHash": "sha256-uw7K/RsYioJicV79Nl39yjtfhdfTDU2aRxnBgvFhkZ8=", 176 - "owner": "nix-community", 177 - "repo": "home-manager", 178 - "rev": "f3a2ff69586f3a54b461526e5702b1a2f81e740a", 179 - "type": "github" 180 - }, 181 - "original": { 182 - "owner": "nix-community", 183 - "repo": "home-manager", 184 - "type": "github" 185 - } 186 - }, 187 - "jovian": { 188 - "inputs": { 189 - "nix-github-actions": "nix-github-actions", 190 - "nixpkgs": [ 191 - "chaotic", 192 - "nixpkgs" 193 - ] 194 - }, 195 - "locked": { 196 - "lastModified": 1731227601, 197 - "narHash": "sha256-aGUQ6W/Oxd9xjH9RQbnUtC61sTK2fWlKr+J7kavT/RQ=", 198 - "owner": "Jovian-Experiments", 199 - "repo": "Jovian-NixOS", 200 - "rev": "7691d0ac1deb6ac7482c5a22fe1a14a34ca608b0", 201 - "type": "github" 202 - }, 203 - "original": { 204 - "owner": "Jovian-Experiments", 205 - "repo": "Jovian-NixOS", 206 - "type": "github" 207 - } 208 - }, 209 - "nix-github-actions": { 210 - "inputs": { 211 - "nixpkgs": [ 212 - "chaotic", 213 - "jovian", 214 - "nixpkgs" 215 - ] 216 - }, 217 - "locked": { 218 - "lastModified": 1729697500, 219 - "narHash": "sha256-VFTWrbzDlZyFHHb1AlKRiD/qqCJIripXKiCSFS8fAOY=", 220 - "owner": "zhaofengli", 221 - "repo": "nix-github-actions", 222 - "rev": "e418aeb728b6aa5ca8c5c71974e7159c2df1d8cf", 223 - "type": "github" 224 - }, 225 - "original": { 226 - "owner": "zhaofengli", 227 - "ref": "matrix-name", 228 - "repo": "nix-github-actions", 229 - "type": "github" 230 - } 231 - }, 232 130 "nixos-wsl": { 233 131 "inputs": { 234 132 "flake-compat": "flake-compat", ··· 255 153 "locked": { 256 154 "lastModified": 1731676054, 257 155 "narHash": "sha256-OZiZ3m8SCMfh3B6bfGC/Bm4x3qc1m2SVEAlkV6iY7Yg=", 258 - "owner": "NixOS", 156 + "owner": "nixos", 259 157 "repo": "nixpkgs", 260 158 "rev": "5e4fbfb6b3de1aa2872b76d49fafc942626e2add", 261 159 "type": "github" 262 160 }, 263 161 "original": { 264 - "owner": "NixOS", 162 + "owner": "nixos", 265 163 "ref": "nixos-unstable", 266 164 "repo": "nixpkgs", 267 165 "type": "github" ··· 269 167 }, 270 168 "nixpkgs_2": { 271 169 "locked": { 272 - "lastModified": 1731676054, 273 - "narHash": "sha256-OZiZ3m8SCMfh3B6bfGC/Bm4x3qc1m2SVEAlkV6iY7Yg=", 170 + "lastModified": 1731139594, 171 + "narHash": "sha256-IigrKK3vYRpUu+HEjPL/phrfh7Ox881er1UEsZvw9Q4=", 274 172 "owner": "nixos", 275 173 "repo": "nixpkgs", 276 - "rev": "5e4fbfb6b3de1aa2872b76d49fafc942626e2add", 174 + "rev": "76612b17c0ce71689921ca12d9ffdc9c23ce40b2", 277 175 "type": "github" 278 176 }, 279 177 "original": { ··· 283 181 "type": "github" 284 182 } 285 183 }, 286 - "nixpkgs_3": { 287 - "locked": { 288 - "lastModified": 1731319897, 289 - "narHash": "sha256-PbABj4tnbWFMfBp6OcUK5iGy1QY+/Z96ZcLpooIbuEI=", 290 - "owner": "NixOS", 291 - "repo": "nixpkgs", 292 - "rev": "dc460ec76cbff0e66e269457d7b728432263166c", 293 - "type": "github" 294 - }, 295 - "original": { 296 - "owner": "NixOS", 297 - "ref": "nixos-unstable", 298 - "repo": "nixpkgs", 299 - "type": "github" 300 - } 301 - }, 302 184 "root": { 303 185 "inputs": { 304 - "chaotic": "chaotic", 305 186 "darwin": "darwin", 306 - "home-manager": "home-manager_2", 187 + "home-manager": "home-manager", 307 188 "nixos-wsl": "nixos-wsl", 308 - "nixpkgs": "nixpkgs_2", 189 + "nixpkgs": "nixpkgs", 309 190 "snowfall-lib": "snowfall-lib", 310 191 "zen-browser": "zen-browser" 311 192 } ··· 364 245 }, 365 246 "zen-browser": { 366 247 "inputs": { 367 - "nixpkgs": "nixpkgs_3" 248 + "nixpkgs": "nixpkgs_2" 368 249 }, 369 250 "locked": { 370 - "lastModified": 1731689384, 371 - "narHash": "sha256-L1Aabt+k92BvxH1h/B6SwVwDtglPtQ0yBbSNm3wfUGw=", 251 + "lastModified": 1732047915, 252 + "narHash": "sha256-bSvczDRlTAZtjJeGTfglDjopCuvogwGkZlI/pxDiWkU=", 372 253 "owner": "0xc000022070", 373 254 "repo": "zen-browser-flake", 374 - "rev": "9808c80cb90626f0b3f6a58b36892c44daaf24bd", 255 + "rev": "e5f1e12791208a336e7d6d503719e47135443267", 375 256 "type": "github" 376 257 }, 377 258 "original": {
+1 -2
flake.nix
··· 26 26 27 27 # Additionnal pkgs 28 28 zen-browser.url = "github:0xc000022070/zen-browser-flake"; 29 - chaotic.url = "github:chaotic-cx/nyx/nyxpkgs-unstable"; 29 + # chaotic.url = "github:chaotic-cx/nyx/nyxpkgs-unstable"; 30 30 }; 31 31 outputs = inputs : inputs.snowfall-lib.mkFlake { 32 32 inherit inputs; ··· 40 40 41 41 systems.modules.nixos = with inputs; [ 42 42 home-manager.nixosModules.home-manager 43 - inputs.chaotic.nixosModules.default 44 43 ]; 45 44 46 45 systems.modules.darwin = with inputs; [
+1 -1
homes/x86_64-linux/cosmeak@loki/default.nix
··· 6 6 brave 7 7 btop 8 8 # discord 9 - discord-krisp 10 9 deno 11 10 github-desktop 12 11 just ··· 15 14 modrinth-app 16 15 nodejs_20 17 16 obs-studio 17 + obsidian 18 18 php83 19 19 php83Packages.composer 20 20 prismlauncher
+1 -2
modules/nixos/hardware/gpu/nvidia/default.nix
··· 13 13 # Enable OpenGL 14 14 hardware.graphics = { 15 15 enable = true; 16 - # driSupport = true; 17 16 enable32Bit = true; 18 17 }; 19 18 20 19 services.xserver.videoDrivers = [ "nvidia" ]; 21 20 hardware.nvidia = { 22 - package = config.boot.kernelPackages.nvidiaPackages.stable; # 550 Driver 21 + package = config.boot.kernelPackages.nvidiaPackages.production; 23 22 modesetting.enable = true; 24 23 powerManagement.enable = false; 25 24 powerManagement.finegrained = false;
+3 -4
systems/x86_64-linux/loki/default.nix
··· 27 27 }; 28 28 }; 29 29 30 - boot.kernelPackages = pkgs.linuxPackages_cachyos; 31 - chaotic.scx.enable = true; # by default uses scx_rustland scheduler 32 - chaotic.scx.scheduler = "scx_rusty"; 30 + # boot.kernelPackages = pkgs.linuxPackages_cachyos; 31 + # chaotic.scx.enable = true; # by default uses scx_rustland scheduler 32 + # chaotic.scx.scheduler = "scx_rusty"; 33 33 34 34 # Enable automatic login for the user. 35 35 services.displayManager.autoLogin.enable = true; ··· 41 41 mangohud 42 42 protonup 43 43 kitty 44 - obsidian 45 44 ]; 46 45 47 46 # Define a user account. Don't forget to set a password with ‘passwd’.