diff options
52 files changed, 1045 insertions, 632 deletions
diff --git a/files/T-TeleSec_GlobalRoot_Class_2.crt b/files/T-TeleSec_GlobalRoot_Class_2.crt new file mode 100644 index 0000000..0911a56 --- /dev/null +++ b/files/T-TeleSec_GlobalRoot_Class_2.crt Binary files differdiff --git a/files/Telekom_Security_ServerID_OV_Class_2_CA.fullchain.pem b/files/Telekom_Security_ServerID_OV_Class_2_CA.fullchain.pem new file mode 100644 index 0000000..89ebd71 --- /dev/null +++ b/files/Telekom_Security_ServerID_OV_Class_2_CA.fullchain.pem @@ -0,0 +1,71 @@ +# +# CA Zertifikat: +#-------------------------- +# Subject: C=DE,O=Deutsche Telekom Security GmbH,CN=Telekom Security ServerID OV Class 2 CA +# Issuer: C=DE,O=T-Systems Enterprise Services GmbH,OU=T-Systems Trust Center,CN=T-TeleSec GlobalRoot Class 2 +# Ser.No.: 0xe5d298915c40431a4e1c4ca488b8ea3 +-----BEGIN CERTIFICATE----- +MIIFdTCCBF2gAwIBAgIQDl0piRXEBDGk4cTKSIuOozANBgkqhkiG9w0BAQsFADCB +gjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNl +cnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAj +BgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcNMjIwODAyMDkx +NjQ0WhcNMjcwODAyMjM1OTU5WjBoMQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1 +dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMTAwLgYDVQQDDCdUZWxla29tIFNl +Y3VyaXR5IFNlcnZlcklEIE9WIENsYXNzIDIgQ0EwggGiMA0GCSqGSIb3DQEBAQUA +A4IBjwAwggGKAoIBgQDJI0Rpfxc6t0rquSh1jjQompiuSfyNpmGhel4Nt3D+0xNa +6Vj1ed4P5eqtUZootIP8+X36Vg8c1TxZ9yX2CoUeSM7MSZ2DbyAbtnb4KH1qdmP2 +uO54tJhb6WRISzq2rjlPsQWB5s3G4Z+nD3DNuGXtlszHPPTDNEFQRj3yr17wX2V5 +Sz6KmH8ok/H/pLKhCGDktUkPeeAFaWLsWF4aUkkSPY6JRTiVE6xILq3YIFlc8vQn +/GP82Wo5H56TQpapYdKimQlygj9jG9Xj+o/0TXuTUOqPPoSTsKdvjEDuqaR63hZg +gzscFFDw6g45dapfYK5e0xyiE4hkDDWkLi1VbLjm0+Jy+xGRnPTex1vd2Pmk8GyN +Fg2nqH9DK+o/atmb1VQj+APwEj6Iu1ZlvY1A6TxDVmMwwGLvik57lcSSQicqLQCv +Ck+rJCA5RnU/Sq6iA3ke/zEu1UJaVcM1vBmtu597c857ntt1FXObUK+DEED0/RN2 +vq6hro99hlquqUoV24sCAwEAAaOCAX4wggF6MA4GA1UdDwEB/wQEAwIBBjAdBgNV +HQ4EFgQUHAWTsX+oNDCMUuCWQKByoxBd4P8wHwYDVR0jBBgwFoAUv1kgNgB5oKAi +a4zV8mHSuCzLgkowEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF +BQcDAgYIKwYBBQUHAwEwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2dyY2wyLmNy +bC50ZWxlc2VjLmRlL3JsL1QtVGVsZVNlY19HbG9iYWxSb290X0NsYXNzXzIuY3Js +MIGNBggrBgEFBQcBAQSBgDB+MC4GCCsGAQUFBzABhiJodHRwOi8vZ3JjbDIub2Nz +cC50ZWxlc2VjLmRlL29jc3ByMEwGCCsGAQUFBzAChkBodHRwOi8vZ3JjbDIuY3J0 +LnRlbGVzZWMuZGUvY3J0L1QtVGVsZVNlY19HbG9iYWxSb290X0NsYXNzXzIuY3J0 +MBMGA1UdIAQMMAowCAYGZ4EMAQICMA0GCSqGSIb3DQEBCwUAA4IBAQBTLMxV+kTs +Ij6ks1K3WOWM5MyS/IDOGYRAcjP99Dsqqsb0+Klv/DjDpqG+fNhToZkMIOLwFCVO +RG2o0lx3OLN89yUxsWsi9gbxnJl8WMdYWablIlL4SGUT79GuumemtKs53WxEOpcZ +5wKeRNz4kX6dzDp9/186Z87Fss478BuOLUvpeRyqzvHBNHNgPagqwD8DK3ab/Oja +I81PR4Ah4HgVf0IcCUhIoJeZ5Egv63G/IonqwMmmRgylu1eRENJ49PplOL70QEkf +VwnYyLPcxt13TEp8IwH1gjqmyTUO6hx3Tz/jmkrfjwAVaN8sBBREXzzCexjyeM5U +UQI/g3ovkWbg +-----END CERTIFICATE----- + + +# +# Root Zertifikat: +#-------------------------- +# Subject: C=DE,O=T-Systems Enterprise Services GmbH,OU=T-Systems Trust Center,CN=T-TeleSec GlobalRoot Class 2 +# Issuer: C=DE,O=T-Systems Enterprise Services GmbH,OU=T-Systems Trust Center,CN=T-TeleSec GlobalRoot Class 2 +# Ser.No.: 0x1 +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6Fuwg== +-----END CERTIFICATE----- + + diff --git a/flake.lock b/flake.lock index 03a69c6..a7bb945 100644 --- a/flake.lock +++ b/flake.lock @@ -16,11 +16,11 @@ ] }, "locked": { - "lastModified": 1723293904, - "narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=", + "lastModified": 1762618334, + "narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=", "owner": "ryantm", "repo": "agenix", - "rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41", + "rev": "fcdea223397448d35d9b31f798479227e80183f6", "type": "github" }, "original": { @@ -32,11 +32,11 @@ "arkenfox-user-js": { "flake": false, "locked": { - "lastModified": 1731156949, - "narHash": "sha256-0qwqVc3hrpbQMMJOhbelSrR8cZOqLLWs4T+qyeHfiAc=", + "lastModified": 1762131136, + "narHash": "sha256-LPDiiEPOZu5Ah5vCLyCMT3w1uoBhUjyqoPWCOiLVLnw=", "owner": "arkenfox", "repo": "user.js", - "rev": "eae5762d29f18115fbffd73d89bd9e2510b25427", + "rev": "0f14e030b3a9391e761c03ce3c260730a78a4db6", "type": "github" }, "original": { @@ -50,11 +50,11 @@ "fromYaml": "fromYaml" }, "locked": { - "lastModified": 1732200724, - "narHash": "sha256-+R1BH5wHhfnycySb7Sy5KbYEaTJZWm1h+LW1OtyhiTs=", + "lastModified": 1755819240, + "narHash": "sha256-qcMhnL7aGAuFuutH4rq9fvAhCpJWVHLcHVZLtPctPlo=", "owner": "SenchoPens", "repo": "base16.nix", - "rev": "153d52373b0fb2d343592871009a286ec8837aec", + "rev": "75ed5e5e3fce37df22e49125181fa37899c3ccd6", "type": "github" }, "original": { @@ -66,27 +66,28 @@ "base16-fish": { "flake": false, "locked": { - "lastModified": 1622559957, - "narHash": "sha256-PebymhVYbL8trDVVXxCvZgc0S5VxI7I1Hv4RMSquTpA=", + "lastModified": 1765809053, + "narHash": "sha256-XCUQLoLfBJ8saWms2HCIj4NEN+xNsWBlU1NrEPcQG4s=", "owner": "tomyun", "repo": "base16-fish", - "rev": "2f6dd973a9075dabccd26f1cded09508180bf5fe", + "rev": "86cbea4dca62e08fb7fd83a70e96472f92574782", "type": "github" }, "original": { "owner": "tomyun", "repo": "base16-fish", + "rev": "86cbea4dca62e08fb7fd83a70e96472f92574782", "type": "github" } }, "base16-helix": { "flake": false, "locked": { - "lastModified": 1725860795, - "narHash": "sha256-Z2o8VBPW3I+KKTSfe25kskz0EUj7MpUh8u355Z1nVsU=", + "lastModified": 1760703920, + "narHash": "sha256-m82fGUYns4uHd+ZTdoLX2vlHikzwzdu2s2rYM2bNwzw=", "owner": "tinted-theming", "repo": "base16-helix", - "rev": "7f795bf75d38e0eea9fed287264067ca187b88a9", + "rev": "d646af9b7d14bff08824538164af99d0c521b185", "type": "github" }, "original": { @@ -98,26 +99,27 @@ "base16-vim": { "flake": false, "locked": { - "lastModified": 1731949548, - "narHash": "sha256-XIDexXM66sSh5j/x70e054BnUsviibUShW7XhbDGhYo=", + "lastModified": 1732806396, + "narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=", "owner": "tinted-theming", "repo": "base16-vim", - "rev": "61165b1632409bd55e530f3dbdd4477f011cadc6", + "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", "type": "github" }, "original": { "owner": "tinted-theming", "repo": "base16-vim", + "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", "type": "github" } }, "crane": { "locked": { - "lastModified": 1734808813, - "narHash": "sha256-3aH/0Y6ajIlfy7j52FGZ+s4icVX0oHhqBzRdlOeztqg=", + "lastModified": 1768319649, + "narHash": "sha256-VFkNyxHxkqGp8gf8kfFMW1j6XeBy609kv6TE9uF/0Js=", "owner": "ipetkov", "repo": "crane", - "rev": "72e2d02dbac80c8c86bf6bf3e785536acf8ee926", + "rev": "4b6527687cfd20da3c2ef8287e01b74c2d6c705b", "type": "github" }, "original": { @@ -126,55 +128,50 @@ "type": "github" } }, - "devshell": { + "disko": { "inputs": { "nixpkgs": [ - "nixvim", "nixpkgs" ] }, "locked": { - "lastModified": 1728330715, - "narHash": "sha256-xRJ2nPOXb//u1jaBnDP56M7v5ldavjbtR6lfGqSvcKg=", - "owner": "numtide", - "repo": "devshell", - "rev": "dd6b80932022cea34a019e2bb32f6fa9e494dfef", + "lastModified": 1766150702, + "narHash": "sha256-P0kM+5o+DKnB6raXgFEk3azw8Wqg5FL6wyl9jD+G5a4=", + "owner": "nix-community", + "repo": "disko", + "rev": "916506443ecd0d0b4a0f4cf9d40a3c22ce39b378", "type": "github" }, "original": { - "owner": "numtide", - "repo": "devshell", + "owner": "nix-community", + "repo": "disko", "type": "github" } }, - "disko": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, + "firefox-gnome-theme": { + "flake": false, "locked": { - "lastModified": 1735468753, - "narHash": "sha256-2dt1nOe9zf9pDkf5Kn7FUFyPRo581s0n90jxYXJ94l0=", - "owner": "nix-community", - "repo": "disko", - "rev": "84a5b93637cc16cbfcc61b6e1684d626df61eb21", + "lastModified": 1764873433, + "narHash": "sha256-1XPewtGMi+9wN9Ispoluxunw/RwozuTRVuuQOmxzt+A=", + "owner": "rafaelmardojai", + "repo": "firefox-gnome-theme", + "rev": "f7ffd917ac0d253dbd6a3bf3da06888f57c69f92", "type": "github" }, "original": { - "owner": "nix-community", - "repo": "disko", + "owner": "rafaelmardojai", + "repo": "firefox-gnome-theme", "type": "github" } }, "flake-compat": { "flake": false, "locked": { - "lastModified": 1733328505, - "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", + "lastModified": 1767039857, + "narHash": "sha256-vNpUSpF5Nuw8xvDLj2KCwwksIbjua2LZCqhV1LNRDns=", "owner": "edolstra", "repo": "flake-compat", - "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", + "rev": "5edf11c44bc78a0d334f6334cdaf7d60d732daab", "type": "github" }, "original": { @@ -183,20 +180,6 @@ "type": "github" } }, - "flake-compat_2": { - "locked": { - "lastModified": 1696426674, - "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=", - "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33", - "revCount": 57, - "type": "tarball", - "url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.0.1/018afb31-abd1-7bff-a5e4-cff7e18efb7a/source.tar.gz" - }, - "original": { - "type": "tarball", - "url": "https://flakehub.com/f/edolstra/flake-compat/1.tar.gz" - } - }, "flake-parts": { "inputs": { "nixpkgs-lib": [ @@ -204,11 +187,11 @@ ] }, "locked": { - "lastModified": 1733312601, - "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=", + "lastModified": 1768135262, + "narHash": "sha256-PVvu7OqHBGWN16zSi6tEmPwwHQ4rLPU9Plvs8/1TUBY=", "owner": "hercules-ci", "repo": "flake-parts", - "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9", + "rev": "80daad04eddbbf5a4d883996a73f3f542fa437ac", "type": "github" }, "original": { @@ -217,48 +200,30 @@ "type": "github" } }, - "flake-utils": { + "flake-parts_2": { "inputs": { - "systems": [ - "systems" + "nixpkgs-lib": [ + "stylix", + "nixpkgs" ] }, "locked": { - "lastModified": 1731533236, - "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", - "owner": "numtide", - "repo": "flake-utils", - "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", - "type": "github" - }, - "original": { - "owner": "numtide", - "repo": "flake-utils", - "type": "github" - } - }, - "flake-utils_2": { - "inputs": { - "systems": "systems" - }, - "locked": { - "lastModified": 1731533236, - "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", - "owner": "numtide", - "repo": "flake-utils", - "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", + "lastModified": 1767609335, + "narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=", + "owner": "hercules-ci", + "repo": "flake-parts", + "rev": "250481aafeb741edfe23d29195671c19b36b6dca", "type": "github" }, "original": { - "owner": "numtide", - "repo": "flake-utils", + "owner": "hercules-ci", + "repo": "flake-parts", "type": "github" } }, - "flake-utils_3": { + "flake-utils": { "inputs": { "systems": [ - "stylix", "systems" ] }, @@ -302,17 +267,14 @@ ], "nixpkgs": [ "nixpkgs" - ], - "nixpkgs-stable": [ - "nixpkgs-stable" ] }, "locked": { - "lastModified": 1734797603, - "narHash": "sha256-ulZN7ps8nBV31SE+dwkDvKIzvN6hroRY8sYOT0w+E28=", + "lastModified": 1767281941, + "narHash": "sha256-6MkqajPICgugsuZ92OMoQcgSHnD6sJHwk8AxvMcIgTE=", "owner": "cachix", "repo": "git-hooks.nix", - "rev": "f0f0dc4920a903c3e08f5bdb9246bb572fcae498", + "rev": "f0927703b7b1c8d97511c4116eb9b4ec6645a0fa", "type": "github" }, "original": { @@ -328,11 +290,11 @@ ] }, "locked": { - "lastModified": 1709087332, - "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=", + "lastModified": 1762808025, + "narHash": "sha256-XmjITeZNMTQXGhhww6ed/Wacy2KzD6svioyCX7pkUu4=", "owner": "hercules-ci", "repo": "gitignore.nix", - "rev": "637db329424fd7e46cf4185293b9cc8c88c95394", + "rev": "cb5e3fdca1de58ccbc3ef53de65bd372b48f567c", "type": "github" }, "original": { @@ -344,18 +306,20 @@ "gnome-shell": { "flake": false, "locked": { - "lastModified": 1732369855, - "narHash": "sha256-JhUWbcYPjHO3Xs3x9/Z9RuqXbcp5yhPluGjwsdE2GMg=", + "host": "gitlab.gnome.org", + "lastModified": 1767737596, + "narHash": "sha256-eFujfIUQDgWnSJBablOuG+32hCai192yRdrNHTv0a+s=", "owner": "GNOME", "repo": "gnome-shell", - "rev": "dadd58f630eeea41d645ee225a63f719390829dc", - "type": "github" + "rev": "ef02db02bf0ff342734d525b5767814770d85b49", + "type": "gitlab" }, "original": { + "host": "gitlab.gnome.org", "owner": "GNOME", - "ref": "47.2", + "ref": "gnome-49", "repo": "gnome-shell", - "type": "github" + "type": "gitlab" } }, "home-manager": { @@ -365,11 +329,11 @@ ] }, "locked": { - "lastModified": 1735381016, - "narHash": "sha256-CyCZFhMUkuYbSD6bxB/r43EdmDE7hYeZZPTCv0GudO4=", + "lastModified": 1768530555, + "narHash": "sha256-EBXKDho4t1YSgodAL6C8M3UTm8MGMZNQ9rQnceR5+6c=", "owner": "nix-community", "repo": "home-manager", - "rev": "10e99c43cdf4a0713b4e81d90691d22c6a58bdf2", + "rev": "d21bee5abf9fb4a42b2fa7728bf671f8bb246ba6", "type": "github" }, "original": { @@ -378,46 +342,43 @@ "type": "github" } }, - "impermanence": { + "home-manager_2": { + "inputs": { + "nixpkgs": [ + "impermanence", + "nixpkgs" + ] + }, "locked": { - "lastModified": 1734945620, - "narHash": "sha256-olIfsfJK4/GFmPH8mXMmBDAkzVQ1TWJmeGT3wBGfQPY=", + "lastModified": 1747978958, + "narHash": "sha256-pQQnbxWpY3IiZqgelXHIe/OAE/Yv4NSQq7fch7M6nXQ=", "owner": "nix-community", - "repo": "impermanence", - "rev": "d000479f4f41390ff7cf9204979660ad5dd16176", + "repo": "home-manager", + "rev": "7419250703fd5eb50e99bdfb07a86671939103ea", "type": "github" }, "original": { "owner": "nix-community", - "repo": "impermanence", + "repo": "home-manager", "type": "github" } }, - "ixx": { + "impermanence": { "inputs": { - "flake-utils": [ - "nixvim", - "nuschtosSearch", - "flake-utils" - ], - "nixpkgs": [ - "nixvim", - "nuschtosSearch", - "nixpkgs" - ] + "home-manager": "home-manager_2", + "nixpkgs": "nixpkgs" }, "locked": { - "lastModified": 1729958008, - "narHash": "sha256-EiOq8jF4Z/zQe0QYVc3+qSKxRK//CFHMB84aYrYGwEs=", - "owner": "NuschtOS", - "repo": "ixx", - "rev": "9fd01aad037f345350eab2cd45e1946cc66da4eb", + "lastModified": 1767822991, + "narHash": "sha256-iyrn9AcPZCoyxX4OT8eMkBsjG7SRUQXXS/V1JzxS7rA=", + "owner": "nix-community", + "repo": "impermanence", + "rev": "82e5bc4508cab9e8d5a136626276eb5bbce5e9c5", "type": "github" }, "original": { - "owner": "NuschtOS", - "ref": "v0.0.6", - "repo": "ixx", + "owner": "nix-community", + "repo": "impermanence", "type": "github" } }, @@ -432,9 +393,6 @@ "flake-parts": [ "flake-parts" ], - "flake-utils": [ - "flake-utils" - ], "nixpkgs": [ "nixpkgs" ], @@ -446,16 +404,16 @@ ] }, "locked": { - "lastModified": 1718178907, - "narHash": "sha256-eSZyrQ9uoPB9iPQ8Y5H7gAmAgAvCw3InStmU3oEjqsE=", + "lastModified": 1737639419, + "narHash": "sha256-AEEDktApTEZ5PZXNDkry2YV2k6t0dTgLPEmAZbnigXU=", "owner": "nix-community", "repo": "lanzaboote", - "rev": "b627ccd97d0159214cee5c7db1412b75e4be6086", + "rev": "a65905a09e2c43ff63be8c0e86a93712361f871e", "type": "github" }, "original": { "owner": "nix-community", - "ref": "v0.4.1", + "ref": "v0.4.2", "repo": "lanzaboote", "type": "github" } @@ -463,11 +421,11 @@ "libnbtplusplus": { "flake": false, "locked": { - "lastModified": 1699286814, - "narHash": "sha256-yy0q+bky80LtK1GWzz7qpM+aAGrOqLuewbid8WT1ilk=", + "lastModified": 1744811532, + "narHash": "sha256-qhmjaRkt+O7A+gu6HjUkl7QzOEb4r8y8vWZMG2R/C6o=", "owner": "PrismLauncher", "repo": "libnbtplusplus", - "rev": "23b955121b8217c1c348a9ed2483167a6f3ff4ad", + "rev": "531449ba1c930c98e0bcf5d332b237a8566f9d78", "type": "github" }, "original": { @@ -483,11 +441,11 @@ ] }, "locked": { - "lastModified": 1735478292, - "narHash": "sha256-Ys9pSP9ch0SthhpbjnkCSJ9ZLfaNKnt/dcy7swjmS1A=", + "lastModified": 1768561867, + "narHash": "sha256-prGOZ+w3pZfGTRxworKcJliCNsewF0L4HUPjgU/6eaw=", "owner": "lnl7", "repo": "nix-darwin", - "rev": "71a3a075e3229a7518d76636bb762aef2bcb73ac", + "rev": "8b720b9662d4dd19048664b7e4216ce530591adc", "type": "github" }, "original": { @@ -496,21 +454,6 @@ "type": "github" } }, - "nix-filter": { - "locked": { - "lastModified": 1731533336, - "narHash": "sha256-oRam5PS1vcrr5UPgALW0eo1m/5/pls27Z/pabHNy2Ms=", - "owner": "numtide", - "repo": "nix-filter", - "rev": "f7653272fd234696ae94229839a99b73c9ab7de0", - "type": "github" - }, - "original": { - "owner": "numtide", - "repo": "nix-filter", - "type": "github" - } - }, "nix-github-actions": { "inputs": { "nixpkgs": [ @@ -518,11 +461,11 @@ ] }, "locked": { - "lastModified": 1731952509, - "narHash": "sha256-p4gB3Rhw8R6Ak4eMl8pqjCPOLCZRqaehZxdZ/mbFClM=", + "lastModified": 1737420293, + "narHash": "sha256-F1G5ifvqTpJq7fdkT34e/Jy9VCyzd5XfJ9TO8fHhJWE=", "owner": "nix-community", "repo": "nix-github-actions", - "rev": "7b5f051df789b6b20d259924d349a9ba3319b226", + "rev": "f4158fa080ef4503c8f4c820967d946c2af31ec9", "type": "github" }, "original": { @@ -533,15 +476,15 @@ }, "nixpkgs": { "locked": { - "lastModified": 1735291276, - "narHash": "sha256-NYVcA06+blsLG6wpAbSPTCyLvxD/92Hy4vlY9WxFI1M=", - "owner": "NixOs", + "lastModified": 1748026106, + "narHash": "sha256-6m1Y3/4pVw1RWTsrkAK2VMYSzG4MMIj7sqUy7o8th1o=", + "owner": "nixos", "repo": "nixpkgs", - "rev": "634fd46801442d760e09493a794c4f15db2d0cbb", + "rev": "063f43f2dbdef86376cc29ad646c45c46e93234c", "type": "github" }, "original": { - "owner": "NixOs", + "owner": "nixos", "ref": "nixos-unstable", "repo": "nixpkgs", "type": "github" @@ -550,11 +493,11 @@ "nixpkgs-lib": { "locked": { "dir": "lib", - "lastModified": 1735291276, - "narHash": "sha256-NYVcA06+blsLG6wpAbSPTCyLvxD/92Hy4vlY9WxFI1M=", + "lastModified": 1768305791, + "narHash": "sha256-AIdl6WAn9aymeaH/NvBj0H9qM+XuAuYbGMZaP0zcXAQ=", "owner": "NixOs", "repo": "nixpkgs", - "rev": "634fd46801442d760e09493a794c4f15db2d0cbb", + "rev": "1412caf7bf9e660f2f962917c14b1ea1c3bc695e", "type": "github" }, "original": { @@ -597,34 +540,38 @@ "type": "github" } }, + "nixpkgs_2": { + "locked": { + "lastModified": 1768305791, + "narHash": "sha256-AIdl6WAn9aymeaH/NvBj0H9qM+XuAuYbGMZaP0zcXAQ=", + "owner": "NixOs", + "repo": "nixpkgs", + "rev": "1412caf7bf9e660f2f962917c14b1ea1c3bc695e", + "type": "github" + }, + "original": { + "owner": "NixOs", + "ref": "nixos-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, "nixvim": { "inputs": { - "devshell": "devshell", - "flake-compat": "flake-compat_2", "flake-parts": [ "flake-parts" ], - "git-hooks": [ - "git-hooks" - ], - "home-manager": [ - "home-manager" - ], - "nix-darwin": [ - "nix-darwin" - ], "nixpkgs": [ "nixpkgs" ], - "nuschtosSearch": "nuschtosSearch", - "treefmt-nix": "treefmt-nix" + "systems": "systems" }, "locked": { - "lastModified": 1735378670, - "narHash": "sha256-A8aQA+YhJfA8mUpzXOZdlXNnKiZg2EcpCn1srgtBjTs=", + "lastModified": 1768486009, + "narHash": "sha256-I7ymDe6UQooHy9I9wrafKCCDnRbox/EMWAgJgpm7fGs=", "owner": "nix-community", "repo": "nixvim", - "rev": "f4b0b81ef9eb4e37e75f32caf1f02d5501594811", + "rev": "03a638205b5cb04ba9c2ed6c604e137b15f07fa1", "type": "github" }, "original": { @@ -633,48 +580,46 @@ "type": "github" } }, - "nuschtosSearch": { + "nur": { "inputs": { - "flake-utils": "flake-utils_2", - "ixx": "ixx", + "flake-parts": [ + "stylix", + "flake-parts" + ], "nixpkgs": [ - "nixvim", + "stylix", "nixpkgs" ] }, "locked": { - "lastModified": 1733773348, - "narHash": "sha256-Y47y+LesOCkJaLvj+dI/Oa6FAKj/T9sKVKDXLNsViPw=", - "owner": "NuschtOS", - "repo": "search", - "rev": "3051be7f403bff1d1d380e4612f0c70675b44fc9", + "lastModified": 1767810917, + "narHash": "sha256-ZKqhk772+v/bujjhla9VABwcvz+hB2IaRyeLT6CFnT0=", + "owner": "nix-community", + "repo": "NUR", + "rev": "dead29c804adc928d3a69dfe7f9f12d0eec1f1a4", "type": "github" }, "original": { - "owner": "NuschtOS", - "repo": "search", + "owner": "nix-community", + "repo": "NUR", "type": "github" } }, "prismlauncher": { "inputs": { - "flake-compat": [ - "flake-compat" - ], "libnbtplusplus": [ "libnbtplusplus" ], - "nix-filter": "nix-filter", "nixpkgs": [ "nixpkgs" ] }, "locked": { - "lastModified": 1734592619, - "narHash": "sha256-Nzpn8O7n+cWg5+DO6Y/Ca0rV3yNB8IN3jUOAv9JrHyA=", + "lastModified": 1768425852, + "narHash": "sha256-99eqrqzT1IR7bYdPb33aLZcLhtGjYKu8A/9oOI55CpQ=", "owner": "PrismLauncher", "repo": "PrismLauncher", - "rev": "0b6ce5525dbe4d617788b740dc4fefc93bee0e5f", + "rev": "5f8918771940cacbd14837159033901e630ef5ae", "type": "github" }, "original": { @@ -702,11 +647,11 @@ ] }, "locked": { - "lastModified": 1726755133, - "narHash": "sha256-03XIEjHeZEjHXctsXYUB+ZLQmM0WuhR6qWQjwekFk/M=", + "lastModified": 1761832913, + "narHash": "sha256-VCNVjjuRvrKPiYYwqhE3BAKIaReiKXGpxGp27lZ0MFM=", "owner": "yaxitech", "repo": "ragenix", - "rev": "687ee92114bce9c4724376cf6b21235abe880bfa", + "rev": "83bccfdea758241999f32869fb6b36f7ac72f1ac", "type": "github" }, "original": { @@ -732,7 +677,7 @@ "libnbtplusplus": "libnbtplusplus", "nix-darwin": "nix-darwin", "nix-github-actions": "nix-github-actions", - "nixpkgs": "nixpkgs", + "nixpkgs": "nixpkgs_2", "nixpkgs-lib": "nixpkgs-lib", "nixpkgs-pinned": "nixpkgs-pinned", "nixpkgs-stable": "nixpkgs-stable", @@ -743,8 +688,7 @@ "sops-nix": "sops-nix", "stylix": "stylix", "systems": "systems_3", - "treefmt-nix": "treefmt-nix_2", - "wl-togglescreens": "wl-togglescreens" + "treefmt-nix": "treefmt-nix" } }, "rust-overlay": { @@ -754,11 +698,11 @@ ] }, "locked": { - "lastModified": 1735439489, - "narHash": "sha256-IysonaW/cItfmMuvg43flOqMgS4N0C6yKJobCa09XOQ=", + "lastModified": 1768531678, + "narHash": "sha256-tf4xEp5Zq8+Zce0WtU8b0VNMxhQtwes67sN2phnbkpk=", "owner": "oxalica", "repo": "rust-overlay", - "rev": "915d7c42a706f9191696d1b779cf1ea1769d34a8", + "rev": "0a9de73f3c23206a2fce3c7656a42d3a3f07be9f", "type": "github" }, "original": { @@ -774,11 +718,11 @@ ] }, "locked": { - "lastModified": 1735468296, - "narHash": "sha256-ZjUjbvS06jf4fElOF4ve8EHjbpbRVHHypStoY8HGzk8=", + "lastModified": 1768481291, + "narHash": "sha256-NjKtkJraCZEnLHAJxLTI+BfdU//9coAz9p5TqveZwPU=", "owner": "Mic92", "repo": "sops-nix", - "rev": "bcb8b65aa596866eb7e5c3e1a6cccbf5d1560b27", + "rev": "e085e303dfcce21adcb5fec535d65aacb066f101", "type": "github" }, "original": { @@ -793,28 +737,26 @@ "base16-fish": "base16-fish", "base16-helix": "base16-helix", "base16-vim": "base16-vim", - "flake-compat": [ - "flake-compat" - ], - "flake-utils": "flake-utils_3", + "firefox-gnome-theme": "firefox-gnome-theme", + "flake-parts": "flake-parts_2", "gnome-shell": "gnome-shell", - "home-manager": [ - "home-manager" - ], "nixpkgs": [ "nixpkgs" ], + "nur": "nur", "systems": "systems_2", "tinted-foot": "tinted-foot", "tinted-kitty": "tinted-kitty", - "tinted-tmux": "tinted-tmux" + "tinted-schemes": "tinted-schemes", + "tinted-tmux": "tinted-tmux", + "tinted-zed": "tinted-zed" }, "locked": { - "lastModified": 1735253599, - "narHash": "sha256-aKLAUkdeMH2N5gMDNiOC7KghRNy1necLtLa9+zUcj1g=", + "lastModified": 1768492720, + "narHash": "sha256-aHos307HyVtOriYZppyUjrkcEKQzyp9F5WzxpMjPFH8=", "owner": "danth", "repo": "stylix", - "rev": "963e77a3a4fc2be670d5a9a6cbeb249b8a43808a", + "rev": "5287bc719dbb6efb26f48c1677a221c966a4a4d9", "type": "github" }, "original": { @@ -888,28 +830,43 @@ "tinted-kitty": { "flake": false, "locked": { - "lastModified": 1716423189, - "narHash": "sha256-2xF3sH7UIwegn+2gKzMpFi3pk5DlIlM18+vj17Uf82U=", + "lastModified": 1735730497, + "narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=", "owner": "tinted-theming", "repo": "tinted-kitty", - "rev": "eb39e141db14baef052893285df9f266df041ff8", + "rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa", "type": "github" }, "original": { "owner": "tinted-theming", "repo": "tinted-kitty", - "rev": "eb39e141db14baef052893285df9f266df041ff8", + "type": "github" + } + }, + "tinted-schemes": { + "flake": false, + "locked": { + "lastModified": 1767710407, + "narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=", + "owner": "tinted-theming", + "repo": "schemes", + "rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2", + "type": "github" + }, + "original": { + "owner": "tinted-theming", + "repo": "schemes", "type": "github" } }, "tinted-tmux": { "flake": false, "locked": { - "lastModified": 1729501581, - "narHash": "sha256-1ohEFMC23elnl39kxWnjzH1l2DFWWx4DhFNNYDTYt54=", + "lastModified": 1767489635, + "narHash": "sha256-e6nnFnWXKBCJjCv4QG4bbcouJ6y3yeT70V9MofL32lU=", "owner": "tinted-theming", "repo": "tinted-tmux", - "rev": "f0e7f7974a6441033eb0a172a0342e96722b4f14", + "rev": "3c32729ccae99be44fe8a125d20be06f8d7d8184", "type": "github" }, "original": { @@ -918,39 +875,34 @@ "type": "github" } }, - "treefmt-nix": { - "inputs": { - "nixpkgs": [ - "nixvim", - "nixpkgs" - ] - }, + "tinted-zed": { + "flake": false, "locked": { - "lastModified": 1734704479, - "narHash": "sha256-MMi74+WckoyEWBRcg/oaGRvXC9BVVxDZNRMpL+72wBI=", - "owner": "numtide", - "repo": "treefmt-nix", - "rev": "65712f5af67234dad91a5a4baee986a8b62dbf8f", + "lastModified": 1767488740, + "narHash": "sha256-wVOj0qyil8m+ouSsVZcNjl5ZR+1GdOOAooAatQXHbuU=", + "owner": "tinted-theming", + "repo": "base16-zed", + "rev": "11abb0b282ad3786a2aae088d3a01c60916f2e40", "type": "github" }, "original": { - "owner": "numtide", - "repo": "treefmt-nix", + "owner": "tinted-theming", + "repo": "base16-zed", "type": "github" } }, - "treefmt-nix_2": { + "treefmt-nix": { "inputs": { "nixpkgs": [ "nixpkgs" ] }, "locked": { - "lastModified": 1735135567, - "narHash": "sha256-8T3K5amndEavxnludPyfj3Z1IkcFdRpR23q+T0BVeZE=", + "lastModified": 1768158989, + "narHash": "sha256-67vyT1+xClLldnumAzCTBvU0jLZ1YBcf4vANRWP3+Ak=", "owner": "numtide", "repo": "treefmt-nix", - "rev": "9e09d30a644c57257715902efbb3adc56c79cf28", + "rev": "e96d59dff5c0d7fddb9d113ba108f03c3ef99eca", "type": "github" }, "original": { @@ -958,27 +910,6 @@ "repo": "treefmt-nix", "type": "github" } - }, - "wl-togglescreens": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1696950026, - "narHash": "sha256-+uj4G2bf+cCh3EgAfZzWzzu9keA6W0oEzM/SasNH5lw=", - "ref": "main", - "rev": "5ae8ab2e87fa345330e33604361a18b58a68cd4c", - "revCount": 11, - "type": "git", - "url": "https://git.project-insanity.org/onny/wl-togglescreens.git" - }, - "original": { - "ref": "main", - "type": "git", - "url": "https://git.project-insanity.org/onny/wl-togglescreens.git" - } } }, "root": "root", diff --git a/flake.nix b/flake.nix index a5666a0..3647895 100644 --- a/flake.nix +++ b/flake.nix @@ -30,7 +30,6 @@ flake-compat.follows = "flake-compat"; gitignore.follows = "gitignore"; nixpkgs.follows = "nixpkgs"; - nixpkgs-stable.follows = "nixpkgs-stable"; }; }; @@ -67,19 +66,15 @@ inputs = { nixpkgs.follows = "nixpkgs"; flake-parts.follows = "flake-parts"; - git-hooks.follows = "git-hooks"; - home-manager.follows = "home-manager"; - nix-darwin.follows = "nix-darwin"; }; }; lanzaboote = { - url = "github:nix-community/lanzaboote/v0.4.1"; + url = "github:nix-community/lanzaboote/v0.4.2"; inputs = { crane.follows = "crane"; nixpkgs.follows = "nixpkgs"; flake-compat.follows = "flake-compat"; flake-parts.follows = "flake-parts"; - flake-utils.follows = "flake-utils"; pre-commit-hooks-nix.follows = "git-hooks"; rust-overlay.follows = "rust-overlay"; }; @@ -90,13 +85,11 @@ url = "github:danth/stylix"; inputs = { nixpkgs.follows = "nixpkgs"; - home-manager.follows = "home-manager"; - flake-compat.follows = "flake-compat"; }; }; systems = { - url = "git+https://codeberg.org/sils/systems"; # specify systems to evaluate + url = "git+https://codeberg.org/sils/systems"; # specify systems to evaluate }; sops-nix = { url = "github:Mic92/sops-nix"; @@ -130,7 +123,6 @@ prismlauncher = { url = "github:PrismLauncher/PrismLauncher"; inputs = { - flake-compat.follows = "flake-compat"; libnbtplusplus.follows = "libnbtplusplus"; nixpkgs.follows = "nixpkgs"; }; @@ -139,10 +131,10 @@ url = "github:PrismLauncher/libnbtplusplus"; flake = false; }; - wl-togglescreens = { - url = "git+https://git.project-insanity.org/onny/wl-togglescreens.git?ref=main"; - inputs.nixpkgs.follows = "nixpkgs"; - }; + #wl-togglescreens = { + # url = "git+https://git.project-insanity.org/onny/wl-togglescreens.git?ref=main"; + # inputs.nixpkgs.follows = "nixpkgs"; + #}; arkenfox-user-js = { url = "github:arkenfox/user.js"; diff --git a/flake/default.nix b/flake/default.nix index 8b8d634..63d8446 100644 --- a/flake/default.nix +++ b/flake/default.nix @@ -21,6 +21,7 @@ inherit (hooks) shellHook; buildInputs = hooks.enabledPackages; packages = with pkgs; [ + git-bug nil statix alejandra diff --git a/hm/gpg/default.nix b/hm/gpg/default.nix index 2632874..8bbfb22 100644 --- a/hm/gpg/default.nix +++ b/hm/gpg/default.nix @@ -7,21 +7,21 @@ enable = true; }; services.gpg-agent = { - enable = true; + enable = false; defaultCacheTtl = 60 * 50; defaultCacheTtlSsh = 60 * 50; maxCacheTtl = 60 * 50; maxCacheTtlSsh = 60 * 50; - pinentryPackage = pkgs.pinentry-curses; + pinentry.package = pkgs.pinentry-curses; enableSshSupport = true; sshKeys = ["4077454831C98FE4BE4A9C167186C5A63615B790"]; }; - programs.zsh.initExtraFirst = lib.mkBefore '' - current_tty="$(tty)" - tty() { echo "$current_tty"; } - SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-ssh-socket) - gpg-connect-agent /bye - ''; + #programs.zsh.initContent = lib.mkBefore '' + # current_tty="$(tty)" + # tty() { echo "$current_tty"; } + # SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-ssh-socket) + # gpg-connect-agent /bye + #''; #home.sessionVariables = { # GNUPGHOME = lib.mkForce ""; #}; diff --git a/hm/hyfetch/default.nix b/hm/hyfetch/default.nix deleted file mode 100644 index 596b26d..0000000 --- a/hm/hyfetch/default.nix +++ /dev/null @@ -1,19 +0,0 @@ -{...}: { - programs.hyfetch = { - enable = true; - settings = { - preset = "rainbow"; - mode = "rgb"; - light_dark = "dark"; - lightness = 0.5; - color_align = { - mode = "horizontal"; - custom_colors = []; - fore_back = null; - }; - backend = "neofetch"; - distro = null; - pride_month_shown = []; - }; - }; -} diff --git a/hm/mako/default.nix b/hm/mako/default.nix deleted file mode 100644 index 503ca1b..0000000 --- a/hm/mako/default.nix +++ /dev/null @@ -1,40 +0,0 @@ -{...}: { - services.mako = { - enable = true; - #backgroundColor = "#2e3440"; - #borderColor = "#88c0d0"; - borderRadius = 25; - borderSize = 2; - defaultTimeout = 5000; - #font = "Source Code Pro 10"; - width = 500; - height = 500; - icons = true; - ignoreTimeout = true; - layer = "overlay"; - markup = true; # TODO - maxIconSize = 64; - sort = "-time"; - #extraConfig = '' - # [urgency=low] - # border-color=#cccccc - - # [urgency=normal] - # border-color=#d08770 - - # [urgency=high] - # border-size=3 - # border-color=#bf616a - # default-timeout=0 - - # [urgency=critical] - # border-size=4 - # border-color=#bf616a - # default-timeout=0 - - # [category=mpd] - # default-timeout=2000 - # group-by=category - #''; - }; -} diff --git a/hm/nixvim/config.nix b/hm/nixvim/config.nix index 58753b0..ad0faa6 100644 --- a/hm/nixvim/config.nix +++ b/hm/nixvim/config.nix @@ -9,7 +9,10 @@ pkgs: { textwidth = 83; linebreak = true; - completeopt = ["menuone" "noselect"]; + completeopt = [ + "menuone" + "noselect" + ]; wildmenu = true; wildmode = builtins.concatStringsSep "," [ "longest" @@ -19,22 +22,38 @@ pkgs: { }; keymaps = [ { - mode = ["n" "i" "t"]; + mode = [ + "n" + "i" + "t" + ]; key = "<A-h>"; action = ''<C-\><C-N><C-w>h''; } { - mode = ["n" "i" "t"]; + mode = [ + "n" + "i" + "t" + ]; key = "<A-j>"; action = ''<C-\><C-N><C-w>j''; } { - mode = ["n" "i" "t"]; + mode = [ + "n" + "i" + "t" + ]; key = "<A-k>"; action = ''<C-\><C-N><C-w>k''; } { - mode = ["n" "i" "t"]; + mode = [ + "n" + "i" + "t" + ]; key = "<A-l>"; action = ''<C-\><C-N><C-w>l''; } @@ -51,7 +70,10 @@ pkgs: { action = ":Neotree float git_status<cr>"; } { - mode = ["n" "i"]; + mode = [ + "n" + "i" + ]; key = "<Esc>"; action = "<cmd>noh<CR><Esc>"; } @@ -78,6 +100,7 @@ pkgs: { enable = true; settings = { powerline_fonts = 1; + theme = "base16_black_metal"; # "base16_gruvbox_dark_pale"; }; }; cmp = { @@ -140,7 +163,7 @@ pkgs: { lspkind = { enable = true; - cmp = { + settings.cmp = { enable = true; menu = { nvim_lsp = "[LSP]"; @@ -180,8 +203,10 @@ pkgs: { }; neo-tree = { enable = true; - autoCleanAfterSessionRestore = true; - closeIfLastWindow = true; + settings = { + auto_clean_after_session_restore = true; + close_if_last_window = true; + }; }; nvim-autopairs = { enable = true; @@ -191,6 +216,9 @@ pkgs: { }; vimtex = { enable = true; + settings = { + view_method = "zathura"; + }; }; web-devicons = { enable = true; diff --git a/hm/packages/default.nix b/hm/packages/default.nix index d37ff18..5d33f0e 100644 --- a/hm/packages/default.nix +++ b/hm/packages/default.nix @@ -2,150 +2,149 @@ nixpkgs-pinned, pkgs, prismlauncher, - wl-togglescreens, + #wl-togglescreens, ... }: let pkgs-pinned = nixpkgs-pinned.legacyPackages.${pkgs.system}; in { home.packages = with pkgs; - with pkgs.libsForQt5; [ - godot_4 # gameengine - # core tools - neofetch # a must-have - hyfetch # permanent suggestions have their moments - fd # fast find - lsd # ls in good - ripgrep # amazing grep - lf # file manager - kitty # terminal - alacritty # terminal - glow # markdown rendering - restic # backups - tree # tree view of directories - nmap # network scanning - rofi-wayland # application launcher - wofi # rofi with gtk - xdg-utils # mainly used for xdg-openA - git-crypt # obscure git repos - wl-clipboard # clipboard cli for wayland - htop # resource usage - exiftool # edit (photo) metadata - - playerctl # for music control in eww - - # notification daemon - mako - libnotify - - gnome-boxes # virtualisation - - hugo # ssg - - # wallpaper deamon - swww - - networkmanagerapplet - - nextcloud-client - - grim # screenshots - slurp # select utility - - #database - sqlitebrowser # graphical interactive sqlitedb management - - # Hardware - sbctl # secure boot management - - # text production/office - libreoffice # graphical office suite - pdfarranger # gui for pdf arranging - - # LaTeX - texlive.combined.scheme-full # LaTeX - texlab # latex language server - - pkgs-pinned.calibre # ebook management - - html-tidy # html formatter - ltex-ls # lsp language server for languagetool - - musescore # notesetting program - - # communication - signal-desktop # the ecosystem is moving :( - signal-cli # use signal without phone - mumble # voice chat - element-desktop # chat - tdesktop # telegram messenger - thunderbird # emails - briar-desktop # privacy first - - # Browser - ungoogled-chromium # just in case - tor-browser-bundle-bin # tor-browser - - # archives - unzip - zip - _7zz - - qtstyleplugin-kvantum # theming - - # image editing - inkscape # vector graphics - imagemagick # powerful cli-tool - - # multimedia - sayonara # audioplayer - vlc # audio and video - mpv # videos - pulseaudio # audio control - imv # image viewing cli - - # Compiler - gcc - execline - - # Programming Languages - jdk # java - python39 # python - - # Rust - cargo # rust package manager - rustfmt # rust formatter - rust-analyzer # rust language server - rustc # rust compiler + [ + godot_4 # gameengine + # core tools + neofetch # a must-have + lsd # ls in good + ripgrep # amazing grep + lf # file manager + kitty # terminal + alacritty # terminal + glow # markdown rendering + restic # backups + tree # tree view of directories + nmap # network scanning + xdg-utils # mainly used for xdg-openA + git-crypt # obscure git repos + wl-clipboard # clipboard cli for wayland + htop # resource usage + exiftool # edit (photo) metadata - # Nix Stuff - alejandra # nix code formatter - nil # nix language-server - statix # nix linter + gimp # image manipulation - keepassxc # password manager + playerctl # for music control in eww - styx # static site generator in nix - cmatrix # hacker tool + # notification daemon + libnotify + + logseq # structured notes + + gnome-boxes # virtualisation + + hugo # ssg + + # wallpaper deamon + swww - lutris-free # another wine manager - wineWowPackages.waylandFull # wine + networkmanagerapplet + + nextcloud-client + + grim # screenshots + slurp # select utility + + #database + sqlitebrowser # graphical interactive sqlitedb management + + # Hardware + sbctl # secure boot management + + # text production/office + libreoffice # graphical office suite + pdfarranger # gui for pdf arranging + + # LaTeX + texlive.combined.scheme-full # LaTeX + texlab # latex language server + + pkgs-pinned.calibre # ebook management + + html-tidy # html formatter + ltex-ls # lsp language server for languagetool + + musescore # notesetting program + + # communication + signal-desktop # the ecosystem is moving :( + signal-cli # use signal without phone + mumble # voice chat + element-desktop # chat + telegram-desktop # telegram messenger + thunderbird # emails + briar-desktop # privacy first + + # Browser + ungoogled-chromium # just in case + tor-browser # tor-browser + + # archives + unzip + zip + _7zz + + # image editing + inkscape # vector graphics + imagemagick # powerful cli-tool + + # multimedia + sayonara # audioplayer + vlc # audio and video + mpv # videos + pulseaudio # audio control + imv # image viewing cli + + # Compiler + gcc + execline + + # Programming Languages + jdk # java + python3 # python + + # Rust + cargo # rust package manager + rustfmt # rust formatter + rust-analyzer # rust language server + rustc # rust compiler - okular # pdf viewer + # Nix Stuff + alejandra # nix code formatter + nil # nix language-server + statix # nix linter - # windowmanager - nwg-panel - brightnessctl # control brightness - river - yambar - swaylock - swaybg # wallpaper - prismlauncher.packages.${pkgs.system}.prismlauncher # minecraft-launcher + keepassxc # password manager - wl-togglescreens.packages.${pkgs.system}.wl-togglescreens # toggle screens - wlr-randr # xrand for wayland, needed by wl-togglescreens + #styx # static site generator in nix + cmatrix # hacker tool - # soispha + lutris-free # another wine manager + wineWowPackages.waylandFull # wine - #grades.outputs.packages.${system}.default - ]; + # windowmanager + nwg-panel + brightnessctl # control brightness + yambar + swaylock + swaybg # wallpaper + prismlauncher.packages.${pkgs.system}.prismlauncher # minecraft-launcher + luanti # gameengine + + #wl-togglescreens.packages.${pkgs.system}.wl-togglescreens # toggle screens + wlr-randr # xrand for wayland, needed by wl-togglescreens + + # soispha + + #grades.outputs.packages.${system}.default + ] + ++ (with pkgs.kdePackages; [ + okular # pdf viewer + qtstyleplugin-kvantum # theming + ]); } diff --git a/hm/rofi/default.nix b/hm/rofi/default.nix index 51fb59a..ee79567 100644 --- a/hm/rofi/default.nix +++ b/hm/rofi/default.nix @@ -1,7 +1,7 @@ {pkgs, ...}: { programs.rofi = { enable = true; - package = pkgs.rofi-wayland; + package = pkgs.rofi; terminal = "${pkgs.foot}/bin/foot"; #theme = ./rounded-gray-dark.rasi; }; diff --git a/hm/silas/default.nix b/hm/silas/default.nix index e108aa4..6c54d0a 100644 --- a/hm/silas/default.nix +++ b/hm/silas/default.nix @@ -3,8 +3,6 @@ ../../modules/hm ../gpg ../gtk - ../hyfetch - ../mako ../nixvim ../packages ../rofi @@ -16,7 +14,7 @@ ../waybar ../xdg ../zsh - nixvim.homeManagerModules.nixvim + nixvim.homeModules.nixvim ]; home = { @@ -29,17 +27,24 @@ bat.enable = true; direnv.enable = true; etesync-dav.enable = true; + fd.enable = true; + fastfetch.enable = true; firefox.enable = true; foot.enable = true; + ghostty.enable = true; git.enable = true; + hyfetch.enable = true; hyprland.enable = true; + iamb.enable = true; jameica.enable = true; kdeconnect.enable = true; mail.enable = true; nextcloud.enable = true; sway.enable = true; + theming.enable = true; yt-dlp.enable = true; zathura.enable = true; + zellij.enable = true; }; programs.home-manager.enable = true; } diff --git a/hm/sils/default.nix b/hm/sils/default.nix index a078a7b..bd3ccf6 100644 --- a/hm/sils/default.nix +++ b/hm/sils/default.nix @@ -3,8 +3,6 @@ ../../modules/hm ../gpg ../gtk - ../hyfetch - ../mako ../nixvim ../packages ../rofi @@ -16,7 +14,7 @@ ../waybar ../xdg ../zsh - nixvim.homeManagerModules.nixvim + nixvim.homeModules.nixvim ]; home = { @@ -29,17 +27,27 @@ bat.enable = true; direnv.enable = true; etesync-dav.enable = true; + fd.enable = true; + fastfetch.enable = true; firefox.enable = true; foot.enable = true; + ghostty.enable = true; git.enable = true; + hyfetch.enable = true; hyprland.enable = true; + iamb.enable = true; jameica.enable = true; kdeconnect.enable = true; mail.enable = true; nextcloud.enable = true; + poweralertd.enable = true; sway.enable = true; + swaync.enable = true; + theming.enable = true; + wofi.enable = true; yt-dlp.enable = true; zathura.enable = true; + zellij.enable = true; }; programs.home-manager.enable = true; } diff --git a/hm/ssh/default.nix b/hm/ssh/default.nix index c7b8e20..d123a6a 100644 --- a/hm/ssh/default.nix +++ b/hm/ssh/default.nix @@ -1,8 +1,9 @@ {...}: { - services.ssh-agent.enable = false; + services.ssh-agent.enable = true; programs.ssh = { enable = true; + enableDefaultConfig = false; matchBlocks = let genBox = user: { inherit user; @@ -10,6 +11,18 @@ }; username = "u384702"; in { + "*" = { + forwardAgent = false; + addKeysToAgent = "no"; + compression = false; + serverAliveInterval = 0; + serverAliveCountMax = 3; + hashKnownHosts = false; + userKnownHostsFile = "~/.ssh/known_hosts"; + controlMaster = "no"; + controlPath = "~/.ssh/master-%r@%n:%p"; + controlPersist = "no"; + }; "storagebox" = genBox username; "storagebox-1" = genBox "${username}-sub1"; }; diff --git a/hm/waybar/default.nix b/hm/waybar/default.nix index 18b659c..0c14a8d 100644 --- a/hm/waybar/default.nix +++ b/hm/waybar/default.nix @@ -5,9 +5,20 @@ mainBar = { layer = "top"; position = "top"; - modules-left = ["hyprland/workspaces" "clock"]; + modules-left = [ + "hyprland/workspaces" + "clock" + ]; modules-center = ["hyprland/window"]; - modules-right = ["pulseaudio" "network" "backlight" "battery" "tray"]; + modules-right = [ + "pulseaudio" + "network" + "backlight" + "battery" + "custom/notification" + "inhibitor" + "tray" + ]; "hyprland/workspaces" = { disable-scroll = false; @@ -27,7 +38,11 @@ pulseaudio = { format = " {icon} "; format-muted = "ﱝ"; - format-icons = ["奄" "奔" "墳"]; + format-icons = [ + "奄" + "奔" + "墳" + ]; tooltip = true; tooltip-format = "{volume}%"; }; @@ -43,7 +58,17 @@ backlight = { device = "intel_backlight"; format = "{icon}"; - format-icons = ["" "" "" "" "" "" "" "" ""]; + format-icons = [ + "" + "" + "" + "" + "" + "" + "" + "" + "" + ]; tooltip = true; tooltip-format = "{percent}%"; }; @@ -52,11 +77,30 @@ states = { warning = 30; critical = 15; + catastrophic = 10; + }; + events = { + on-discharging-warning = "${pkgs.libnotify}/bin/notify-send -u normal 'Low Battery'"; + on-discharging-critical = "${pkgs.libnotify}/bin/notify-send -u critical 'Very Low Battery' 'Hibernating soon'"; + on-discharging-catastrophic = "${pkgs.libnotify}/bin/notify-send -u critical 'Very Low Battery' 'Hibernating now' && sleep 30 && ${pkgs.systemd}/bin/systemctl hibernate --check-inhibitors=no"; }; format = "{capacity}% {icon}"; format-charging = ""; format-plugged = ""; - format-icons = ["" "" "" "" "" "" "" "" "" "" "" ""]; + format-icons = [ + "" + "" + "" + "" + "" + "" + "" + "" + "" + "" + "" + "" + ]; tooltip = true; tooltip-format = "{capacity}%"; }; @@ -71,15 +115,44 @@ tooltip-format = '' <big>{:%Y %B}</big> <tt><small>{calendar}</small></tt>''; - format-alt = '' - {:%d %m %Y}''; - format = '' - {:%H %M}''; + format-alt = ''{:%d %m %Y}''; + format = ''{:%H %M}''; + }; + inhibitor = { + what = [ + "idle" + "sleep" + "handle-lid-switch" + ]; + format = ''{icon}''; + format-icons = { + activated = ""; + deactivated = ""; + }; }; - tray = { - icon-size = 21; - spacing = 10; + icon-size = 10; + spacing = 5; + }; + "custom/notification" = { + tooltip = false; + format = "{icon}"; + format-icons = { + notification = " "; + none = " "; + dnd-notification = " "; + dnd-none = " "; + inhibited-notification = " "; + inhibited-none = " "; + dnd-inhibited-notification = " "; + dnd-inhibited-none = " "; + }; + return-type = "json"; + exec-if = "which swaync-client"; + exec = "swaync-client -swb"; + on-click = "swaync-client -t -sw"; + on-click-right = "swaync-client -d -sw"; + escape = true; }; }; }; diff --git a/hm/zsh/default.nix b/hm/zsh/default.nix index 684493f..899bce5 100644 --- a/hm/zsh/default.nix +++ b/hm/zsh/default.nix @@ -2,6 +2,7 @@ config, pkgs, self, + lib, ... }: { programs.zsh = { @@ -12,7 +13,7 @@ enableCompletion = true; autocd = true; - dotDir = ".config/zsh"; + dotDir = "${config.xdg.configHome}/zsh"; history = { path = "${config.xdg.stateHome}/zsh/zsh_history"; @@ -61,12 +62,10 @@ addapache = "curl https://www.apache.org/licenses/LICENSE-2.0.txt > LICENSE"; }; - initExtraFirst = - builtins.readFile ./config/instant-prompt.zsh - + "source ${pkgs.zsh-powerlevel10k}/share/zsh-powerlevel10k/powerlevel10k.zsh-theme"; - # + - initExtra = - '' + initContent = lib.mkBefore (builtins.readFile ./config/instant-prompt.zsh + + "source ${pkgs.zsh-powerlevel10k}/share/zsh-powerlevel10k/powerlevel10k.zsh-theme" + + '' + rm -rf ~/.mozilla/firefox/default/containers.json.backup export ZSH=${pkgs.oh-my-zsh}/share/oh-my-zsh/ @@ -80,6 +79,6 @@ source $ZSH/oh-my-zsh.sh '' + builtins.readFile ./config/p10k.zsh - + builtins.readFile ./config/functions.zsh; + + builtins.readFile ./config/functions.zsh); }; } diff --git a/hosts/hplappi.nix b/hosts/hplappi.nix index 1e3dd45..ed4e189 100644 --- a/hosts/hplappi.nix +++ b/hosts/hplappi.nix @@ -1,7 +1,23 @@ -{config, ...}: { +{ + config, + lib, + pkgs, + ... +}: { role.sils = "laptop"; + + #services.xserver.enable = true; + #services.displayManager.gdm.enable = true; + #services.desktopManager.gnome.enable = true; + #services.tlp.enable = lib.mkForce false; + #services.greetd.enable = lib.mkForce false; + #services.gnome.gnome-keyring.enable = lib.mkForce false; + + environment.systemPackages = [pkgs.gnome-browser-connector]; + sils = { disks.enable = false; + docker.enable = true; meta = { bootPart = "/dev/disk/by-uuid/4064-2D6C"; globalDataDir = "/srv"; diff --git a/hosts/thinklappi-bootstrap/default.nix b/hosts/thinklappi-bootstrap/default.nix index 8fc94a7..3e1ed15 100644 --- a/hosts/thinklappi-bootstrap/default.nix +++ b/hosts/thinklappi-bootstrap/default.nix @@ -9,11 +9,12 @@ ]; hardware = { - opengl.enable = true; + graphics.enable = true; bluetooth.enable = true; + }; + services = { pulseaudio.enable = false; }; - security = { rtkit.enable = true; pam.services.swaylock = {}; diff --git a/modules/hm/sils/default.nix b/modules/hm/sils/default.nix index a3ff1ed..c27a29c 100644 --- a/modules/hm/sils/default.nix +++ b/modules/hm/sils/default.nix @@ -3,16 +3,26 @@ ./bat.nix ./direnv.nix ./etesync-dav.nix + ./fd.nix + ./fastfetch.nix ./firefox ./foot.nix + ./ghostty.nix ./git.nix + ./hyfetch.nix ./hyprland.nix + ./iamb.nix ./jameica.nix ./kdeconnect.nix ./mail.nix ./nextcloud.nix + ./poweralertd ./sway.nix + ./swaync + ./theming.nix + ./wofi ./yt-dlp.nix ./zathura.nix + ./zellij.nix ]; } diff --git a/modules/hm/sils/fastfetch.nix b/modules/hm/sils/fastfetch.nix new file mode 100644 index 0000000..f3efcab --- /dev/null +++ b/modules/hm/sils/fastfetch.nix @@ -0,0 +1,16 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.fastfetch; +in { + options.sils.fastfetch = { + enable = lib.mkEnableOption "fastfetch"; + }; + config = lib.mkIf cfg.enable { + programs.fastfetch = { + enable = true; + }; + }; +} diff --git a/modules/hm/sils/fd.nix b/modules/hm/sils/fd.nix new file mode 100644 index 0000000..7f8e35c --- /dev/null +++ b/modules/hm/sils/fd.nix @@ -0,0 +1,17 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.fd; +in { + options.sils.fd = { + enable = lib.mkEnableOption "fd, a fast find alternative"; + }; + + config = lib.mkIf cfg.enable { + programs.fd = { + enable = true; + }; + }; +} diff --git a/modules/hm/sils/firefox/default.nix b/modules/hm/sils/firefox/default.nix index b877c34..43d21b1 100644 --- a/modules/hm/sils/firefox/default.nix +++ b/modules/hm/sils/firefox/default.nix @@ -17,6 +17,7 @@ in { enable = lib.mkEnableOption "opinionated firefox configuration"; }; config = lib.mkIf cfg.enable { + stylix.targets.firefox.profileNames = ["default"]; programs.firefox = { enable = true; profiles = { @@ -38,8 +39,8 @@ in { isDefault = true; name = "default"; search = { - default = "DuckDuckGo"; - privateDefault = "DuckDuckGo"; + default = "ddg"; + privateDefault = "ddg"; force = true; }; }; diff --git a/modules/hm/sils/firefox/user-overrides.js b/modules/hm/sils/firefox/user-overrides.js index f5ff8d6..331a506 100755 --- a/modules/hm/sils/firefox/user-overrides.js +++ b/modules/hm/sils/firefox/user-overrides.js @@ -3,7 +3,7 @@ user_pref("_user.js.parrot", "overrides section syntax error"); //Fingerprinting resistance doesn't make sense in any browser other than Tor. //user_pref("privacy.window.maxInnerWidth", 1000); //user_pref("privacy.window.maxInnerHeight", 1900); -user_pref("privacy.resistFingerprinting", true); +user_pref("privacy.resistFingerprinting", false); user_pref("privacy.resistFingerprinting.letterboxing", false); /* override recipe: enable session restore ***/ @@ -17,6 +17,7 @@ user_pref("privacy.clearOnShutdown.formdata", false); // 2803 optional user_pref("privacy.cpd.history", false); // 2804 to match when you use Ctrl-Shift-Del // user_pref("privacy.cpd.cookies", false); // 2804 optional // user_pref("privacy.cpd.formdata", false); // 2804 optional +user_pref("privacy.clearOnShutdown_v2.browsingHistoryAndDownloads", false); // 2812 FF136+ user_pref("network.cookie.lifetimePolicy", 0); // I want to use Google Earth sometimes. user_pref("webgl.disabled", false); diff --git a/modules/hm/sils/ghostty.nix b/modules/hm/sils/ghostty.nix new file mode 100644 index 0000000..cd871bc --- /dev/null +++ b/modules/hm/sils/ghostty.nix @@ -0,0 +1,15 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.ghostty; +in { + options.sils.ghostty.enable = lib.mkEnableOption "the ghostty terminal emulator"; + config = lib.mkIf cfg.enable { + programs.ghostty = { + enable = true; + enableZshIntegration = true; + }; + }; +} diff --git a/modules/hm/sils/git.nix b/modules/hm/sils/git.nix index 5bd4dd2..b8cac63 100644 --- a/modules/hm/sils/git.nix +++ b/modules/hm/sils/git.nix @@ -8,13 +8,48 @@ in { options.sils.git.enable = lib.mkEnableOption "sils git config"; config = lib.mkIf cfg.enable { - programs.git = { - enable = true; - package = pkgs.gitFull; - userName = "Silas Schöffel"; - userEmail = "sils@sils.li"; + programs = { + git = { + enable = true; + package = pkgs.gitFull; + settings = { + user = { + name = "Silas Schöffel"; + email = "sils@sils.li"; + }; + signing = { + key = "467B7D129EA73AC9"; + signByDefault = false; + }; + core = { + autocrlf = "input"; + }; + safe = { + directory = "/etc/nixos"; + }; + push = { + autoSetupRemote = true; + }; + init = { + defaultBranch = "main"; + }; + commit = { + verbose = true; + }; + sendemail = { + smtpserver = "mail.foss-syndicate.org"; + smtpuser = "sils@sils.li"; + smtpencryption = "ssl"; + smtpserverport = "465"; + }; + }; + aliases = { + recommit = "commit --file=.git/COMMIT_EDITMSG --edit"; + }; + }; delta = { enable = true; + enableGitIntegration = true; options = { decorations = { commit-decoration-style = "bold purple box ul"; @@ -25,36 +60,6 @@ in { whitespace-error-style = "22 reverse"; }; }; - signing = { - key = "467B7D129EA73AC9"; - signByDefault = true; - }; - extraConfig = { - core = { - autocrlf = "input"; - }; - safe = { - directory = "/etc/nixos"; - }; - push = { - autoSetupRemote = true; - }; - init = { - defaultBranch = "main"; - }; - commit = { - verbose = true; - }; - sendemail = { - smtpserver = "server1.vhack.eu"; - smtpuser = "sils@sils.li"; - smtpencryption = "ssl"; - smtpserverport = "465"; - }; - }; - aliases = { - recommit = "commit --file=.git/COMMIT_EDITMSG --edit"; - }; }; }; } diff --git a/modules/hm/sils/hyfetch.nix b/modules/hm/sils/hyfetch.nix new file mode 100644 index 0000000..e664e0e --- /dev/null +++ b/modules/hm/sils/hyfetch.nix @@ -0,0 +1,31 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.hyfetch; +in { + options.sils.hyfetch = { + enable = lib.mkEnableOption "hyfetch"; + }; + + config = lib.mkIf cfg.enable { + programs.hyfetch = { + enable = true; + settings = { + preset = "nonbinary"; + mode = "rgb"; + light_dark = "dark"; + lightness = 0.5; + color_align = { + mode = "horizontal"; + custom_colors = []; + fore_back = null; + }; + backend = "fastfetch"; + distro = null; + pride_month_disable = true; + }; + }; + }; +} diff --git a/modules/hm/sils/hyprland.nix b/modules/hm/sils/hyprland.nix index 39f0920..b21aef2 100644 --- a/modules/hm/sils/hyprland.nix +++ b/modules/hm/sils/hyprland.nix @@ -9,6 +9,14 @@ in { options.sils.hyprland.enable = lib.mkEnableOption "sils hyprland config"; config = lib.mkIf cfg.enable { + home.pointerCursor = { + enable = true; + name = "Adwaita"; + gtk.enable = true; + x11.enable = true; + size = 24; + package = pkgs.adwaita-icon-theme; + }; wayland.windowManager.hyprland = { enable = true; settings = { @@ -23,6 +31,10 @@ in { # Source a file (multi-file configs) # source = ~/.config/hypr/myColors.conf + ecosystem = { + no_update_news = true; + }; + # Some default env vars. env = "XCURSOR_SIZE,24"; @@ -46,9 +58,9 @@ in { general = { # See https://wiki.hyprland.org/Configuring/Variables/ for more - gaps_in = "1"; - gaps_out = "2"; - border_size = "1"; + gaps_in = "5"; + gaps_out = "10"; + border_size = "3"; #"col.active_border" = "rgba(000000cc)"; #"col.inactive_border" = "rgba(595959aa)"; @@ -58,24 +70,25 @@ in { decoration = { # See https://wiki.hyprland.org/Configuring/Variables/ for more - inactive_opacity = "1"; + inactive_opacity = "0.8"; active_opacity = "1"; - rounding = "1"; + rounding = "10"; blur = { - enabled = false; - #size = "3"; - #passes = "1"; - #new_optimizations = "on"; + enabled = true; + size = "3"; + passes = "1"; + new_optimizations = "on"; }; - # drop_shadow = "yes"; - # shadow_range = "4"; - # shadow_render_power = "3"; + #drop_shadow = "yes"; + + #shadow_range = "4"; + #shadow_render_power = "3"; #"col.shadow" = "rgba(1a1a1aee)"; }; animations = { - enabled = "no"; + enabled = "yes"; # Some default animations, see https://wiki.hyprland.org/Configuring/Animations/ for more @@ -102,10 +115,9 @@ in { # new_is_master = "true"; #}; - gestures = { - # See https://wiki.hyprland.org/Configuring/Variables/ for more - workspace_swipe = "off"; - }; + gesture = [ + "3, horizontal, workspace" + ]; # Example windowrule v1 # windowrule = float, ^(kitty)$ @@ -118,12 +130,12 @@ in { # Example binds, see https://wiki.hyprland.org/Configuring/Binds/ for more bind = [ - "$mainMod, T, exec, foot" + "$mainMod, T, exec, ghostty" "$mainMod, C, killactive, " "$mainMod, M, exit, " "$mainMod, E, exec, dolphin " "$mainMod, V, togglefloating, " - "$mainMod, R, exec, rofi -show drun" + "$mainMod, R, exec, wofi --show drun" "$mainMod, P, pseudo, " # dwindle "$mainMod, J, togglesplit, " # dwindle "$mainMod, L, exec, swaylock" # screenlock @@ -138,16 +150,16 @@ in { "$mainMod, down, movefocus, d" # Switch workspaces with mainMod + [0-9] - "$mainMod, 1, focusworkspaceoncurrentmonitor, 1" - "$mainMod, 2, focusworkspaceoncurrentmonitor, 2" - "$mainMod, 3, focusworkspaceoncurrentmonitor, 3" - "$mainMod, 4, focusworkspaceoncurrentmonitor, 4" - "$mainMod, 5, focusworkspaceoncurrentmonitor, 5" - "$mainMod, 6, focusworkspaceoncurrentmonitor, 6" - "$mainMod, 7, focusworkspaceoncurrentmonitor, 7" - "$mainMod, 8, focusworkspaceoncurrentmonitor, 8" - "$mainMod, 9, focusworkspaceoncurrentmonitor, 9" - "$mainMod, 0, focusworkspaceoncurrentmonitor, 10" + "$mainMod, 1, workspace, 1" + "$mainMod, 2, workspace, 2" + "$mainMod, 3, workspace, 3" + "$mainMod, 4, workspace, 4" + "$mainMod, 5, workspace, 5" + "$mainMod, 6, workspace, 6" + "$mainMod, 7, workspace, 7" + "$mainMod, 8, workspace, 8" + "$mainMod, 9, workspace, 9" + "$mainMod, 0, workspace, 10" # Move active window to a workspace with mainMod + SHIFT + [0-9] "$mainMod SHIFT, 1, movetoworkspace, 1" @@ -186,10 +198,10 @@ in { #exec-once=bash ~/.config/hypr/start.sh #exec-once=swww init & exec-once = [ + "${pkgs.hyprland}/bin/hyprctl ${config.home.pointerCursor.name} ${toString config.home.pointerCursor.size}" #"${pkgs.nwg-panel}/bin/nwg-panel" - #"nm-applet --indicator" + "${pkgs.networkmanagerapplet}/bin/nm-applet --indicator" #"${pkgs.waybar}/bin/waybar" - "${pkgs.mako}/bin/mako" "${pkgs.swaybg}/bin/swaybg -i ${self}/files/wallpaper.jpg" ]; }; diff --git a/modules/hm/sils/iamb.nix b/modules/hm/sils/iamb.nix new file mode 100644 index 0000000..2c6932a --- /dev/null +++ b/modules/hm/sils/iamb.nix @@ -0,0 +1,38 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.iamb; +in { + options = { + sils.iamb.enable = lib.mkEnableOption "iamb, a matrix tui client"; + }; + config = lib.mkIf cfg.enable { + programs.iamb = { + enable = true; + settings = { + profiles = { + ljs = { + user_id = "@sils:linksjugend-solid.de"; + url = "https://matrix.bak-it.de"; + }; + vhack = { + user_id = "@sils:vhack.eu"; + url = "https://matrix.vhack.eu"; + }; + }; + settings = { + notifications.enabled = true; + image_preview.protocol = { + type = "kitty"; + size = { + height = 10; + width = 66; + }; + }; + }; + }; + }; + }; +} diff --git a/modules/hm/sils/mail.nix b/modules/hm/sils/mail.nix index 06f6917..85583a2 100644 --- a/modules/hm/sils/mail.nix +++ b/modules/hm/sils/mail.nix @@ -6,11 +6,11 @@ }: let cfg = config.sils.mail; vhackImap = { - host = "server1.vhack.eu"; + host = "mail.foss-syndicate.org"; port = 993; }; vhackSmtp = { - host = "server1.vhack.eu"; + host = "mail.foss-syndicate.org"; port = 993; }; in { diff --git a/modules/hm/sils/poweralertd/default.nix b/modules/hm/sils/poweralertd/default.nix new file mode 100644 index 0000000..15cfdc9 --- /dev/null +++ b/modules/hm/sils/poweralertd/default.nix @@ -0,0 +1,14 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.poweralertd; +in { + options.sils.poweralertd.enable = lib.mkEnableOption "poweralertd"; + config = lib.mkIf cfg.enable { + services.poweralertd = { + enable = true; + }; + }; +} diff --git a/modules/hm/sils/swaync/default.nix b/modules/hm/sils/swaync/default.nix new file mode 100644 index 0000000..328888b --- /dev/null +++ b/modules/hm/sils/swaync/default.nix @@ -0,0 +1,32 @@ +{ + config, + lib, + pkgs, + ... +}: let + cfg = config.sils.swaync; +in { + options.sils.swaync.enable = lib.mkEnableOption "swaync"; + config = lib.mkIf cfg.enable { + services.swaync = { + enable = true; + settings = { + positionX = "right"; + positionY = "top"; + layer = "overlay"; + control-center-layer = "top"; + layer-shell = true; + cssPriority = "application"; + control-center-margin-top = 0; + control-center-margin-bottom = 0; + control-center-margin-right = 0; + control-center-margin-left = 0; + notification-2fa-action = true; + notification-inline-replies = false; + notification-icon-size = 64; + notification-body-image-height = 100; + notification-body-image-width = 200; + }; + }; + }; +} diff --git a/modules/hm/sils/theming.nix b/modules/hm/sils/theming.nix new file mode 100644 index 0000000..9b7535c --- /dev/null +++ b/modules/hm/sils/theming.nix @@ -0,0 +1,32 @@ +{ + config, + lib, + pkgs, + ... +}: let + cfg = config.sils.theming; +in { + options.sils.theming.enable = lib.mkEnableOption "theming"; + config = lib.mkIf cfg.enable { + stylix = { + enable = true; + iconTheme = { + enable = true; + dark = "Papirus-dark"; + light = "Papirus-light"; + package = pkgs.catppuccin-papirus-folders.override { + flavor = "mocha"; + accent = "mauve"; + }; + }; + targets = { + waybar = { + enableCenterBackColors = false; + enableLeftBackColors = false; + enableRightBackColors = false; + font = "sansSerif"; + }; + }; + }; + }; +} diff --git a/modules/hm/sils/wofi/default.nix b/modules/hm/sils/wofi/default.nix new file mode 100644 index 0000000..36f5916 --- /dev/null +++ b/modules/hm/sils/wofi/default.nix @@ -0,0 +1,14 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.wofi; +in { + options.sils.wofi.enable = lib.mkEnableOption "wofi"; + config = lib.mkIf cfg.enable { + programs.wofi = { + enable = true; + }; + }; +} diff --git a/modules/hm/sils/zellij.nix b/modules/hm/sils/zellij.nix new file mode 100644 index 0000000..1038a0c --- /dev/null +++ b/modules/hm/sils/zellij.nix @@ -0,0 +1,14 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.zellij; +in { + options.sils.zellij.enable = lib.mkEnableOption "zellij"; + config = lib.mkIf cfg.enable { + programs.zellij = { + enable = true; + }; + }; +} diff --git a/modules/nixos/sils/default.nix b/modules/nixos/sils/default.nix index 0f714f7..01870c8 100644 --- a/modules/nixos/sils/default.nix +++ b/modules/nixos/sils/default.nix @@ -5,6 +5,7 @@ ./bluetooth.nix ./bootloader.nix ./disks.nix + ./docker.nix ./environment.nix ./firejail.nix ./font.nix @@ -19,6 +20,7 @@ ./plymouth.nix ./printing.nix ./roles.nix + ./sound.nix ./sudo.nix ./sway.nix ./theming diff --git a/modules/nixos/sils/docker.nix b/modules/nixos/sils/docker.nix new file mode 100644 index 0000000..7d6f046 --- /dev/null +++ b/modules/nixos/sils/docker.nix @@ -0,0 +1,24 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.docker; +in { + options.sils.docker.enable = lib.mkEnableOption "docker"; + config = lib.mkIf cfg.enable { + virtualisation.docker = { + enable = true; + storageDriver = "btrfs"; + }; + users.users.sils.extraGroups = ["docker"]; + environment.persistence."/srv".directories = [ + { + directory = "/var/lib/docker"; + user = "docker"; + group = "docker"; + mode = "0755"; + } + ]; + }; +} diff --git a/modules/nixos/sils/impermanence.nix b/modules/nixos/sils/impermanence.nix index 4acdc6f..cf67a91 100644 --- a/modules/nixos/sils/impermanence.nix +++ b/modules/nixos/sils/impermanence.nix @@ -32,6 +32,12 @@ in { group = "root"; mode = "0755"; } + { + directory = "/var/log"; + user = "root"; + group = "root"; + mode = "0755"; + } ]; }; } diff --git a/modules/nixos/sils/nix.nix b/modules/nixos/sils/nix.nix index c23fdce..9d73fcd 100644 --- a/modules/nixos/sils/nix.nix +++ b/modules/nixos/sils/nix.nix @@ -14,8 +14,8 @@ in { config = { nix = { registry = { - nixpkgs.flake = nixpkgs; - n.flake = nixpkgs; + nixpkgs.flake = self.inputs.nixpkgs; + n.flake = self.inputs.nixpkgs; self.flake = self; s.flake = self; }; diff --git a/modules/nixos/sils/printing.nix b/modules/nixos/sils/printing.nix index d447255..9247146 100644 --- a/modules/nixos/sils/printing.nix +++ b/modules/nixos/sils/printing.nix @@ -11,12 +11,33 @@ in { services = { printing = { enable = true; - #drivers = with pkgs; [hplip]; # if building again: epson-escpr + startWhenNeeded = true; + webInterface = true; + stateless = true; + drivers = with pkgs; [epson-escpr epson-escpr2 hplip]; }; avahi = { enable = true; + nssmdns4 = true; + nssmdns6 = true; openFirewall = true; }; }; + + hardware.printers = { + ensureDefaultPrinter = "EPSON_ET-2720_Series"; + ensurePrinters = [ + { + name = "EPSON_ET-2720_Series"; + description = "EPSON ET-2720 Series"; + model = "epson-inkjet-printer-escpr/Epson-ET-2720_Series-epson-escpr-en.ppd"; + location = "Home Network"; + deviceUri = "dnssd://EPSON%20ET-2720%20Series._ipp._tcp.local/?uuid=cfe92100-67c4-11d4-a45f-e0bb9edcdbb9"; + ppdOptions = { + PageSize = "A4"; + }; + } + ]; + }; }; } diff --git a/modules/nixos/sils/roles.nix b/modules/nixos/sils/roles.nix index cca3cf6..346149c 100644 --- a/modules/nixos/sils/roles.nix +++ b/modules/nixos/sils/roles.nix @@ -24,6 +24,7 @@ in { pamconfig.enable = lib.mkDefault true; plymouth.enable = lib.mkDefault true; printing.enable = lib.mkDefault true; + sound.enable = lib.mkDefault true; sway.enable = lib.mkDefault false; theming.enable = lib.mkDefault true; } @@ -45,6 +46,7 @@ in { pamconfig.enable = lib.mkDefault true; plymouth.enable = lib.mkDefault false; printing.enable = lib.mkDefault true; + sound.enable = lib.mkDefault true; sway.enable = lib.mkDefault false; theming.enable = lib.mkDefault true; } @@ -68,6 +70,7 @@ in { pamconfig.enable = lib.mkDefault true; plymouth.enable = lib.mkDefault false; printing.enable = lib.mkDefault true; + sound.enable = lib.mkDefault true; sway.enable = lib.mkDefault false; theming.enable = lib.mkDefault true; } diff --git a/modules/nixos/sils/sound.nix b/modules/nixos/sils/sound.nix new file mode 100644 index 0000000..3ad26fb --- /dev/null +++ b/modules/nixos/sils/sound.nix @@ -0,0 +1,20 @@ +{ + config, + lib, + ... +}: let + cfg = config.sils.sound; +in { + options.sils.sound.enable = lib.mkEnableOption "sound config"; + config = lib.mkIf cfg.enable { + services.pipewire = { + enable = true; + alsa = { + enable = true; + support32Bit = true; + }; + pulse.enable = true; + jack.enable = true; + }; + }; +} diff --git a/modules/nixos/sils/theming/default.nix b/modules/nixos/sils/theming/default.nix index e8cf7bf..2d5d2fd 100644 --- a/modules/nixos/sils/theming/default.nix +++ b/modules/nixos/sils/theming/default.nix @@ -1,6 +1,7 @@ { config, lib, + pkgs, ... }: let cfg = config.sils.theming; @@ -9,7 +10,7 @@ in { config = lib.mkIf cfg.enable { stylix = { enable = true; - base16Scheme = ./tokyo-night-dark.yaml; + base16Scheme = "${pkgs.base16-schemes}/share/themes/ayu-dark.yaml"; image = ../../../../files/wallpaper.jpg; polarity = "dark"; }; diff --git a/readme.md b/readme.md new file mode 100644 index 0000000..7ff6c7a --- /dev/null +++ b/readme.md @@ -0,0 +1,16 @@ +# My Nix(Os) Configuration + +This repository hosts my full NixOs Configuration. +It lacks certain features I'd like to add, but as I'm really bad at staying +focused I'll probably "finish" this someday in the not so foreseeable future. + + +## ToDos + +- [] Documentation + - [] How to add Printers (very important!) +- [] Switch back to declarative Wifi +- [] Automate Installation + - [] Make adding new Hosts interactive + - [] Build batteries included ISO +- [] Switch away from Hyprland - just to anything else diff --git a/result-man b/result-man new file mode 120000 index 0000000..6bd4f75 --- /dev/null +++ b/result-man @@ -0,0 +1 @@ +/nix/store/rw3a44jhk6jm0742yh56kpcl7f9kv4cb-libnotify-0.8.6-man \ No newline at end of file diff --git a/sys/default.nix b/sys/default.nix index 0eeeb35..ac71548 100644 --- a/sys/default.nix +++ b/sys/default.nix @@ -2,7 +2,6 @@ imports = [ ./packages ./services - ./sound ./systemd ./users ./virtualisation diff --git a/sys/packages/default.nix b/sys/packages/default.nix index 666fb21..93ec0c5 100644 --- a/sys/packages/default.nix +++ b/sys/packages/default.nix @@ -18,5 +18,7 @@ mosh # ssh in great zsh-you-should-use # reminder for aliasses + + adwaita-icon-theme ]; } diff --git a/sys/services/default.nix b/sys/services/default.nix index 7546fcc..22c7621 100644 --- a/sys/services/default.nix +++ b/sys/services/default.nix @@ -1,5 +1,6 @@ {...}: { imports = [ + ./flatpak ./fwupd ./greetd ./logind diff --git a/sys/services/flatpak/default.nix b/sys/services/flatpak/default.nix index 47f50b8..0cc6108 100644 --- a/sys/services/flatpak/default.nix +++ b/sys/services/flatpak/default.nix @@ -4,8 +4,8 @@ device = "/srv/flatpak"; options = ["bind"]; }; - #xdg.portal = { - # enable = true; - # extraPortals = [pkgs.xdg-desktop-portal-gtk]; - # }; + xdg.portal = { + enable = true; + extraPortals = [pkgs.xdg-desktop-portal-gtk]; + }; } diff --git a/sys/services/greetd/default.nix b/sys/services/greetd/default.nix index 9b9d5f6..f94828f 100644 --- a/sys/services/greetd/default.nix +++ b/sys/services/greetd/default.nix @@ -4,10 +4,10 @@ restart = true; settings = { default_session = { - command = "${pkgs.greetd.tuigreet}/bin/tuigreet --cmd Hyprland"; + command = "${pkgs.tuigreet}/bin/tuigreet --cmd Hyprland"; }; sway_session = { - command = "${pkgs.greetd.tuigreet}/bin/tuigreetswayway"; + command = "${pkgs.tuigreet}/bin/tuigreetswayway"; }; }; }; diff --git a/sys/services/logind/default.nix b/sys/services/logind/default.nix index a3dd040..b883bcb 100644 --- a/sys/services/logind/default.nix +++ b/sys/services/logind/default.nix @@ -1,10 +1,8 @@ {...}: { - services.logind = { - lidSwitch = "suspend-then-hibernate"; - extraConfig = '' - IdleAction=ignore - HandlePowerKey=hibernate - HandlePowerKeyLongPress=poweroff - ''; + services.logind.settings.Login = { + HandleLidSwitch = "suspend-then-hibernate"; + IdleAction = "ignore"; + HandlePowerKey = "hibernate"; + HandlePowerKeyLongPress = "poweroff"; }; } diff --git a/sys/sound/default.nix b/sys/sound/default.nix deleted file mode 100644 index 3007098..0000000 --- a/sys/sound/default.nix +++ /dev/null @@ -1,11 +0,0 @@ -{...}: { - services.pipewire = { - enable = true; - alsa = { - enable = true; - support32Bit = true; - }; - pulse.enable = true; - jack.enable = true; - }; -} diff --git a/sys/systemd/default.nix b/sys/systemd/default.nix index 2325e4c..b7bdbfb 100644 --- a/sys/systemd/default.nix +++ b/sys/systemd/default.nix @@ -1,5 +1,5 @@ {...}: { systemd.sleep.extraConfig = '' - HibernateDelaySec=5m + HibernateDelaySec=10m ''; } |
