my NixOS and nix-darwin config
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

idk

+26 -40
+1 -22
flake.lock
··· 60 60 "inputs": { 61 61 "darwin": "darwin", 62 62 "home-manager": "home-manager", 63 - "nixpkgs": "nixpkgs", 64 - "rust-overlay": "rust-overlay" 65 - } 66 - }, 67 - "rust-overlay": { 68 - "inputs": { 69 - "nixpkgs": [ 70 - "nixpkgs" 71 - ] 72 - }, 73 - "locked": { 74 - "lastModified": 1765161692, 75 - "narHash": "sha256-XdY9AFzmgRPYIhP4N+WiCHMNxPoifP5/Ld+orMYBD8c=", 76 - "owner": "oxalica", 77 - "repo": "rust-overlay", 78 - "rev": "7ed7e8c74be95906275805db68201e74e9904f07", 79 - "type": "github" 80 - }, 81 - "original": { 82 - "owner": "oxalica", 83 - "repo": "rust-overlay", 84 - "type": "github" 63 + "nixpkgs": "nixpkgs" 85 64 } 86 65 } 87 66 },
+18 -4
hosts/Daedalus/default.nix
··· 1 - { pkgs, outputs, ... }: { 1 + { pkgs, outputs, ... }: 2 + { 3 + 4 + imports = [ 5 + 6 + ../../modules/system/fonts.nix 2 7 3 - imports = [ ../../modules/system/fonts.nix ]; 8 + ]; 4 9 5 10 # List packages installed in system profile. To search by name, run: 6 11 # $ nix-env -qaP | grep wget 7 12 # dont remove zellij and fzf, just trust me 8 - environment.systemPackages = with pkgs; [ vim git nh zellij fzf ]; 13 + environment.systemPackages = with pkgs; [ 14 + vim 15 + git 16 + nh 17 + zellij 18 + fzf 19 + ]; 9 20 10 21 system.primaryUser = "suri"; 11 22 ··· 39 50 "soduto" 40 51 "spotify" 41 52 "mac-mouse-fix" 53 + "tailscale" 42 54 ]; 43 - masApps = { "whatsapp" = 310633997; }; 55 + masApps = { 56 + "whatsapp" = 310633997; 57 + }; 44 58 onActivation = { 45 59 autoUpdate = true; 46 60 upgrade = true;
+7 -14
modules/system/tailscale.nix
··· 3 3 config, 4 4 ... 5 5 }: 6 - with lib; 7 - let 8 - cfg = config.nyx.tailscale; 9 - in 10 6 { 11 7 12 - options.nyx.tailscale = { 13 - enable = mkEnableOption "Tailscale"; 14 - }; 8 + services.tailscale = { 9 + enable = true; 15 10 16 - config = mkIf (cfg.enable) { 11 + openFirewall = true; 12 + authKeyFile = "/var/lib/secrets/tailscale_key"; 17 13 18 - services.tailscale.enable = true; 19 - 20 - networking.firewall = { 21 - trustedInterfaces = [ "tailscale0" ]; 22 - allowedUDPPorts = [ config.services.tailscale.port ]; 23 - }; 14 + }; 24 15 16 + networking.firewall = { 17 + trustedInterfaces = [ "tailscale0" ]; 25 18 }; 26 19 27 20 }