Personal Nix setup
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Update pepper/linux

+25 -18
+4 -4
flake.lock
··· 1039 1039 "sqlite-lib-src": "sqlite-lib-src" 1040 1040 }, 1041 1041 "locked": { 1042 - "lastModified": 1756753599, 1043 - "narHash": "sha256-yD8PMlRjUI2sN5PvkDJRfGz96zCp4gejaguDVmZ4utg=", 1042 + "lastModified": 1757078979, 1043 + "narHash": "sha256-3ax8YuYp3MIUYIdov8l2cmXIwO/TSGsc1TUv3r1yIAg=", 1044 1044 "ref": "refs/heads/master", 1045 - "rev": "da3540c0c134331c10f1a8d124ee0925e57f8112", 1046 - "revCount": 1279, 1045 + "rev": "02b54de9c4f391f75eb8287e3857ecda30d483a4", 1046 + "revCount": 1291, 1047 1047 "type": "git", 1048 1048 "url": "ssh://git@tangled.sh/tangled.sh/core" 1049 1049 },
-1
flake.nix
··· 145 145 inherit overlays; 146 146 system = "aarch64-linux"; 147 147 hostname = "ramune"; 148 - modules = [ inputs.tangled.nixosModules.knot ]; 149 148 }; 150 149 151 150 overlays = {
home/base/encrypt/DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5.key.age

This is a binary file and will not be displayed.

+18 -11
home/base/gpg.nix
··· 22 22 publicKeys = [ 23 23 { source = ./assets/pubring.asc; trust = "ultimate"; } 24 24 ]; 25 + scdaemonSettings = { 26 + disable-ccid = true; 27 + }; 25 28 }; 26 29 27 30 services.gpg-agent = { 28 31 enable = true; 29 32 enableSshSupport = true; 33 + enableScDaemon = false; 30 34 verbose = true; 31 - sshKeys = [ "DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5" ]; 32 - defaultCacheTtl = 1; 33 - defaultCacheTtlSsh = 1; 34 - maxCacheTtl = 10; 35 - maxCacheTtlSsh = 10; 35 + defaultCacheTtl = 20; 36 + defaultCacheTtlSsh = 20; 37 + maxCacheTtl = 60; 38 + maxCacheTtlSsh = 60; 36 39 noAllowExternalCache = true; 37 - pinentry = helpers.mkIfDarwin { 38 - package = pkgs.pinentry-touchid; 39 - program = "pinentry-touchid"; 40 - }; 40 + pinentry = mkMerge [ 41 + (helpers.mkIfDarwin { 42 + package = pkgs.pinentry-touchid; 43 + program = "pinentry-touchid"; 44 + }) 45 + (helpers.mkIfLinux { 46 + package = pkgs.pinentry-all; 47 + program = "pinentry-qt"; 48 + }) 49 + ]; 41 50 }; 42 51 43 52 systemd.user.services.gpg-agent.Service.Slice = "session.slice"; 44 53 45 54 modules.git.signingKey = mkDefault "4EAF3D43CDBB01C9"; 46 - 47 - home.file."${home}/sshcontrol".text = "DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5"; 48 55 49 56 # ed25519 2025-09-06 [C] 50 57 age.secrets."147CBD801C5E0D0C27DD006653D3D96FF952F652.key" = {
+1
lib/system.nix
··· 77 77 nixpkgs.lib.nixosSystem { 78 78 inherit system specialArgs lib; 79 79 modules = systemModules ++ [ 80 + inputs.tangled.nixosModules.knot 80 81 inputs.yeetmouse.nixosModules.default 81 82 inputs.agenix.nixosModules.default 82 83 home-manager.nixosModules.home-manager {
+1 -1
modules/desktop/hyprland.nix
··· 25 25 kb_model=${cfg.hyprland.input.kb_model} 26 26 kb_variant=${cfg.hyprland.input.kb_variant} 27 27 sensitivity=${toString cfg.hyprland.input.sensitivity} 28 + accel_profile = "flat" 28 29 } 29 30 30 31 misc { ··· 34 35 } 35 36 36 37 render { 37 - explicit_sync=0 38 38 direct_scanout=1 39 39 expand_undersized_textures=false 40 40 cm_fs_passthrough=1
+1 -1
modules/desktop/session.nix
··· 56 56 }; 57 57 upower.enable = true; 58 58 gvfs.enable = true; 59 - logind = { 59 + logind.settings.Login = { 60 60 powerKey = "suspend"; 61 61 powerKeyLongPress = "poweroff"; 62 62 lidSwitch = "suspend";