Nix Flakes configuration for MacOS, NixOS and WSL
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

fix: darwin configurations

+46 -54
+15 -15
flake.lock
··· 7 7 ] 8 8 }, 9 9 "locked": { 10 - "lastModified": 1746708654, 11 - "narHash": "sha256-GeC99gu5H6+AjBXsn5dOhP4/ApuioGCBkufdmEIWPRs=", 10 + "lastModified": 1747297701, 11 + "narHash": "sha256-R8mFJL3lREsJNDqPHbsn03imKoH2ocpzgT2kKWsWYBM=", 12 12 "owner": "LnL7", 13 13 "repo": "nix-darwin", 14 - "rev": "6cb36e8327421c61e5a3bbd08ed63491b616364a", 14 + "rev": "b6fff20c692d684d250a39453ed1853dd44c96ab", 15 15 "type": "github" 16 16 }, 17 17 "original": { ··· 38 38 }, 39 39 "hardware": { 40 40 "locked": { 41 - "lastModified": 1746814339, 42 - "narHash": "sha256-hf2lICJzwACWuzHCmZn5NI6LUAOgGdR1yh8ip+duyhk=", 41 + "lastModified": 1747129300, 42 + "narHash": "sha256-L3clA5YGeYCF47ghsI7Tcex+DnaaN/BbQ4dR2wzoiKg=", 43 43 "owner": "NixOS", 44 44 "repo": "nixos-hardware", 45 - "rev": "3c5e12673265dfb0de3d9121420c0c2153bf21e0", 45 + "rev": "e81fd167b33121269149c57806599045fd33eeed", 46 46 "type": "github" 47 47 }, 48 48 "original": { ··· 60 60 ] 61 61 }, 62 62 "locked": { 63 - "lastModified": 1746944240, 64 - "narHash": "sha256-nGGbrGOSZf0VLUSPr48Brmvz/bwTsV79zBR7hmP5/J0=", 63 + "lastModified": 1747221863, 64 + "narHash": "sha256-2sHoet8Dj16i6fiwlZh9r5Hs9mRIInKvewk8JjU91KQ=", 65 65 "owner": "Jovian-Experiments", 66 66 "repo": "Jovian-NixOS", 67 - "rev": "e2c181f9ac617dc9f77d8632b8102d175bcdf1ec", 67 + "rev": "e6189e1e6e019dea8c0ee4f7eba2a435b232e294", 68 68 "type": "github" 69 69 }, 70 70 "original": { ··· 97 97 }, 98 98 "nixpkgs": { 99 99 "locked": { 100 - "lastModified": 1746904237, 101 - "narHash": "sha256-3e+AVBczosP5dCLQmMoMEogM57gmZ2qrVSrmq9aResQ=", 100 + "lastModified": 1747179050, 101 + "narHash": "sha256-qhFMmDkeJX9KJwr5H32f1r7Prs7XbQWtO0h3V0a0rFY=", 102 102 "owner": "nixos", 103 103 "repo": "nixpkgs", 104 - "rev": "d89fc19e405cb2d55ce7cc114356846a0ee5e956", 104 + "rev": "adaa24fbf46737f3f1b5497bf64bae750f82942e", 105 105 "type": "github" 106 106 }, 107 107 "original": { ··· 113 113 }, 114 114 "nixpkgs-stable": { 115 115 "locked": { 116 - "lastModified": 1746810718, 117 - "narHash": "sha256-VljtYzyttmvkWUKTVJVW93qAsJsrBbgAzy7DdnJaQfI=", 116 + "lastModified": 1747209494, 117 + "narHash": "sha256-fLise+ys+bpyjuUUkbwqo5W/UyIELvRz9lPBPoB0fbM=", 118 118 "owner": "nixos", 119 119 "repo": "nixpkgs", 120 - "rev": "0c0bf9c057382d5f6f63d54fd61f1abd5e1c2f63", 120 + "rev": "5d736263df906c5da72ab0f372427814de2f52f8", 121 121 "type": "github" 122 122 }, 123 123 "original": {
+3
flake.nix
··· 43 43 ./modules/nixos/programs/steam.nix 44 44 ./modules/nixos/system/auto-update.nix 45 45 ./modules/nixos/system/garbage-collector.nix 46 + ./modules/common/suites/development.nix 47 + ./modules/common/suites/pentesting.nix 46 48 ]; 47 49 48 50 darwinModules = [ 49 51 ./modules/darwin/system/garbage-collector.nix 52 + ./modules/common/suites/development.nix 50 53 ]; 51 54 52 55 # Methods
+13 -14
machines/darwin/njord/default.nix
··· 5 5 ./system 6 6 ]; 7 7 8 - # pin nix group to already existant id 9 - ids.gids.nixbld = 30000; 10 - 11 8 # Enable sudo via TouchID 12 9 security.pam.services.sudo_local.touchIdAuth = true; 13 10 ··· 20 17 21 18 # System wide packages 22 19 environment.systemPackages = with pkgs; [ 23 - lazygit 24 - firefox 25 - spotify 26 - zed-editor 27 - vscodium 28 - stats # System monitoring displayed in macos top bar - will be replaced by custom script with sketchybar 29 - raycast # replacement for spotlight 30 - dbeaver-bin 31 - cyberduck 32 - utm 33 - sqlmap 20 + librewolf # web browser 21 + firefox # to delete -> will be replace by librewolf with custom css and extensions 22 + zed-editor # to delete 23 + spotify # music 24 + stats # System monitoring displayed in macos top bar - will be replaced by custom script with sketchybar 25 + raycast # replacement for spotlight 26 + alt-tab-macos # alt tab like windows on macos 27 + utm # VM emulator for macos/ios 28 + cocoapods # used for swift development 34 29 ]; 30 + 31 + programs._1password.enable = true; # Password manager (come from darwin modules) 32 + 33 + asgard.suites.development.enable = true; 35 34 36 35 # Linux builder 37 36 nix = {
+1 -2
machines/darwin/njord/homebrew/brews.nix
··· 1 1 { 2 2 homebrew.brews = [ 3 - "cocoapods" 4 - "wallpapper" 3 + "wallpapper" # to package 5 4 ]; 6 5 }
+8 -14
machines/darwin/njord/homebrew/casks.nix
··· 1 1 { 2 2 homebrew.casks = [ 3 - "insomnia" 4 - "orbstack" # replace with simple docker desktop 5 - "figma" 6 - "obsidian" 7 - "eloston-chromium" # needed a chromium based browser for testing purpose in web development 8 - "librewolf" 9 - "amethyst" # Window manager 10 - "sf-symbols" 11 - "font-hack-nerd-font" # move this to nix installation 12 - "1password" 13 - "discord" # use this one since nixpkgs doesn't have krisp 14 - # "logitech-g-hub" # Error when trying to install it 15 - "ghostty" 16 - "burp-suite" 3 + "orbstack" # Replace docker desktop -> will be replace with podman? 4 + "figma" # ux/ui 5 + "obsidian" # Markdown note taking app 6 + "amethyst" # Window manager (to package) 7 + "font-hack-nerd-font" # move this to nix installation 8 + "discord" # use this one since nixpkgs doesn't have krisp 9 + # "logitech-g-hub" # Error when trying to install it 10 + "ghostty" # terminal emulator 17 11 ]; 18 12 }
+1 -4
machines/darwin/njord/homebrew/default.nix
··· 12 12 cleanup = "zap"; # uninstall all elements not listed 13 13 }; 14 14 15 - homebrew.caskArgs.no_quarantine = true; 15 + homebrew.caskArgs.no_quarantine = true; # used for some "break" packages like librewolf 16 16 17 17 # Repository authorized for homebrew 18 18 homebrew.taps = [ 19 - "homebrew/cask-versions" 20 - "homebrew/cask-fonts" 21 - "FelixKratz/formulae" 22 19 "mczachurski/wallpapper" 23 20 ]; 24 21 }
+1 -1
machines/nixos/loki/default.nix
··· 54 54 # Global packages 55 55 environment.systemPackages = with pkgs; [ 56 56 firefox 57 - kitty 57 + ghostty 58 58 bat 59 59 eza 60 60 fzf
+2 -2
modules/common/suites/development.nix
··· 1 1 { config, pkgs, lib, ... }: 2 2 let 3 - cfg = config.asgard.suite.development; 3 + cfg = config.asgard.suites.development; 4 4 in 5 5 { 6 - options.asgard.suite.development = { 6 + options.asgard.suites.development = { 7 7 enable = lib.mkEnableOption "Enable the development suite."; 8 8 }; 9 9
+2 -2
modules/common/suites/pentesting.nix
··· 1 1 { config, pkgs, lib, ... }: 2 2 let 3 - cfg = config.asgard.suite.pentesting; 3 + cfg = config.asgard.suites.pentesting; 4 4 in 5 5 { 6 - options.asgard.suite.pentesting = { 6 + options.asgard.suites.pentesting = { 7 7 enable = lib.mkEnableOption "Enable the pentesting suite."; 8 8 }; 9 9