Start the process of switching to nixpkgs-unstable
This commit is contained in:
parent
346d1b78d9
commit
a81103f78e
|
@ -13,7 +13,7 @@ let
|
||||||
|
|
||||||
catppuccin-latte = {
|
catppuccin-latte = {
|
||||||
stylix = {
|
stylix = {
|
||||||
image = ./wallpapers/watercag.png;
|
image = ./wallpapers/needygirloverdose.jpg;
|
||||||
base16Scheme = "${inputs.catppuccin-base16}/base16/latte.yaml";
|
base16Scheme = "${inputs.catppuccin-base16}/base16/latte.yaml";
|
||||||
polarity = "light";
|
polarity = "light";
|
||||||
};
|
};
|
||||||
|
|
|
@ -52,8 +52,8 @@ local abbreviations = {
|
||||||
{ "tmat", "^T" }, -- Tranpose of a matrix
|
{ "tmat", "^T" }, -- Tranpose of a matrix
|
||||||
{ "cmat", "^*" }, -- Conjugate of a matrix
|
{ "cmat", "^*" }, -- Conjugate of a matrix
|
||||||
{ "sneg", "^C" }, -- Set complement
|
{ "sneg", "^C" }, -- Set complement
|
||||||
{ "ortco", "^{\\bot}" }, -- Orthogonal complement
|
{ "ortco", "^\\bot" }, -- Orthogonal complement
|
||||||
{ "sinter", "^{\\circ}" }, -- Interior of a set
|
{ "sinter", "^\\circ" }, -- Interior of a set
|
||||||
|
|
||||||
-- Basic commands
|
-- Basic commands
|
||||||
{ "mangle", "\\measuredangle" },
|
{ "mangle", "\\measuredangle" },
|
||||||
|
|
|
@ -21,6 +21,7 @@ return {
|
||||||
prepend_note_id = true,
|
prepend_note_id = true,
|
||||||
},
|
},
|
||||||
mappings = {},
|
mappings = {},
|
||||||
|
disable_frontmatter = true,
|
||||||
},
|
},
|
||||||
keys = {
|
keys = {
|
||||||
{ "<C-O>", "<cmd>ObsidianQuickSwitch<cr>" },
|
{ "<C-O>", "<cmd>ObsidianQuickSwitch<cr>" },
|
||||||
|
|
722
flake.lock
722
flake.lock
File diff suppressed because it is too large
Load diff
|
@ -4,13 +4,13 @@
|
||||||
# {{{ Inputs
|
# {{{ Inputs
|
||||||
inputs = {
|
inputs = {
|
||||||
# Nixpkgs
|
# Nixpkgs
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-23.05";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
# Nixpkgs-unstable
|
# Nixpkgs-unstable
|
||||||
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
# Home manager
|
# Home manager
|
||||||
home-manager.url = "github:nix-community/home-manager/release-23.05";
|
home-manager.url = "github:nix-community/home-manager";
|
||||||
home-manager.inputs.nixpkgs.follows = "nixpkgs";
|
home-manager.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|
||||||
# NUR
|
# NUR
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{ pkgs, inputs, ... }: {
|
{ pkgs, inputs, ... }: {
|
||||||
imports = [
|
imports = [
|
||||||
./exa.nix
|
./eza.nix
|
||||||
./bat.nix
|
./bat.nix
|
||||||
./ssh.nix
|
./ssh.nix
|
||||||
./gpg.nix
|
./gpg.nix
|
||||||
|
|
|
@ -1,16 +1,17 @@
|
||||||
{ pkgs, ... }: {
|
{ upkgs, lib, ... }: {
|
||||||
home.packages = [ pkgs.exa ];
|
# REASON: not yet in nixpkgs-stable
|
||||||
|
home.packages = [ upkgs.eza ];
|
||||||
|
|
||||||
# TODO: generalize alias creation to all shells
|
# TODO: generalize alias creation to all shells
|
||||||
programs.fish.shellAliases =
|
programs.fish.shellAliases =
|
||||||
let exa = "${pkgs.exa}/bin/exa";
|
let eza = lib.getExe upkgs.eza;
|
||||||
in
|
in
|
||||||
rec {
|
rec {
|
||||||
ls = "${exa} --icons --long";
|
ls = "${eza} --icons --long";
|
||||||
la = "${ls} --all";
|
la = "${ls} --all";
|
||||||
lt = "${ls} --tree"; # Similar to tree, but also has --long!
|
lt = "${ls} --tree"; # Similar to tree, but also has --long!
|
||||||
|
|
||||||
# I am used to using pkgs.tree, so this is nice to have!
|
# I am used to using pkgs.tree, so this is nice to have!
|
||||||
tree = "${exa} --icons --tree";
|
tree = "${eza} --icons --tree";
|
||||||
};
|
};
|
||||||
}
|
}
|
|
@ -12,7 +12,8 @@ let
|
||||||
nil # nix
|
nil # nix
|
||||||
inputs.nixd.packages.${system}.nixd # nix
|
inputs.nixd.packages.${system}.nixd # nix
|
||||||
haskell-language-server # haskell
|
haskell-language-server # haskell
|
||||||
dhall-lsp-server # dhall
|
# REASON: marked as broken
|
||||||
|
# dhall-lsp-server # dhall
|
||||||
tectonic # something related to latex (?)
|
tectonic # something related to latex (?)
|
||||||
texlab # latex
|
texlab # latex
|
||||||
nodePackages_latest.vscode-langservers-extracted # web stuff
|
nodePackages_latest.vscode-langservers-extracted # web stuff
|
||||||
|
|
|
@ -14,7 +14,8 @@ in
|
||||||
|
|
||||||
wayland.windowManager.hyprland = {
|
wayland.windowManager.hyprland = {
|
||||||
enable = true;
|
enable = true;
|
||||||
recommendedEnvironment = true;
|
package = inputs.hyprland.packages.${pkgs.system}.hyprland;
|
||||||
|
settings = { };
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
${builtins.readFile ./hyprland.conf}
|
${builtins.readFile ./hyprland.conf}
|
||||||
${hyprland-monitors}
|
${hyprland-monitors}
|
||||||
|
|
|
@ -6,7 +6,6 @@ let
|
||||||
inputs.homeage.homeManagerModules.homeage
|
inputs.homeage.homeManagerModules.homeage
|
||||||
inputs.nur.nixosModules.nur
|
inputs.nur.nixosModules.nur
|
||||||
inputs.impermanence.nixosModules.home-manager.impermanence
|
inputs.impermanence.nixosModules.home-manager.impermanence
|
||||||
inputs.hyprland.homeManagerModules.default
|
|
||||||
inputs.spicetify-nix.homeManagerModules.spicetify
|
inputs.spicetify-nix.homeManagerModules.spicetify
|
||||||
inputs.anyrun.homeManagerModules.default
|
inputs.anyrun.homeManagerModules.default
|
||||||
|
|
||||||
|
|
|
@ -40,7 +40,7 @@ in
|
||||||
|
|
||||||
# Passwordless sudo when SSH'ing with keys
|
# Passwordless sudo when SSH'ing with keys
|
||||||
# TODO: is this safe? Can we ssh back and gain root access this way?
|
# TODO: is this safe? Can we ssh back and gain root access this way?
|
||||||
security.pam.enableSSHAgentAuth = true;
|
# security.pam.enableSSHAgentAuth = true;
|
||||||
|
|
||||||
# SSH on slow connections
|
# SSH on slow connections
|
||||||
programs.mosh.enable = true;
|
programs.mosh.enable = true;
|
||||||
|
|
|
@ -1,3 +1,6 @@
|
||||||
{
|
{ inputs, pkgs, ... }: {
|
||||||
|
|
||||||
programs.hyprland.enable = true;
|
programs.hyprland.enable = true;
|
||||||
|
programs.hyprland.package =
|
||||||
|
inputs.hyprland.packages.${pkgs.system}.hyprland;
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,7 @@ in
|
||||||
overrideDevices = true;
|
overrideDevices = true;
|
||||||
overrideFolders = true;
|
overrideFolders = true;
|
||||||
|
|
||||||
|
settings = {
|
||||||
devices = {
|
devices = {
|
||||||
enceladus.id = "QWOAERM-V2FNXPI-TB7NFUS-LKW7JTB-IZY4OEZ-FYDPJNP-6IKPW4Y-YREXDQM";
|
enceladus.id = "QWOAERM-V2FNXPI-TB7NFUS-LKW7JTB-IZY4OEZ-FYDPJNP-6IKPW4Y-YREXDQM";
|
||||||
lapetus.id = "VVHM7RC-ZSDOZJI-EGBIJR4-2DOGAXG-OEJZWSH-OYUK5XT-7CDMWSL-3AVM2AZ";
|
lapetus.id = "VVHM7RC-ZSDOZJI-EGBIJR4-2DOGAXG-OEJZWSH-OYUK5XT-7CDMWSL-3AVM2AZ";
|
||||||
|
@ -27,4 +28,5 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
|
||||||
# File containing my password, managed by agenix
|
# File containing my password, managed by agenix
|
||||||
passwordFile = config.age.secrets.adrielusPassword.path;
|
hashedPasswordFile = config.age.secrets.adrielusPassword.path;
|
||||||
|
|
||||||
# Set default shell
|
# Set default shell
|
||||||
shell = pkgs.fish;
|
shell = pkgs.fish;
|
||||||
|
|
|
@ -6,6 +6,6 @@
|
||||||
services.syncthing = {
|
services.syncthing = {
|
||||||
guiAddress = "0.0.0.0:8384"; # TODO: put this behind nginx
|
guiAddress = "0.0.0.0:8384"; # TODO: put this behind nginx
|
||||||
|
|
||||||
folders = { };
|
settings.folders = { };
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
imports = [ ../../common/optional/syncthing.nix ];
|
imports = [ ../../common/optional/syncthing.nix ];
|
||||||
|
|
||||||
services.syncthing.folders = {
|
services.syncthing.settings.folders = {
|
||||||
"mythical-vault" = {
|
"mythical-vault" = {
|
||||||
path = "/home/adrielus/.password-store";
|
path = "/home/adrielus/.password-store";
|
||||||
devices = [ "enceladus" "lapetus" ];
|
devices = [ "enceladus" "lapetus" ];
|
||||||
|
|
|
@ -2,5 +2,4 @@
|
||||||
|
|
||||||
{
|
{
|
||||||
# example = import ./example.nix;
|
# example = import ./example.nix;
|
||||||
font-compat = import ./font-compat.nix;
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +0,0 @@
|
||||||
{ lib, config, ... }: {
|
|
||||||
options.fonts.packages = lib.mkOption {
|
|
||||||
type = lib.types.listOf lib.types.package;
|
|
||||||
};
|
|
||||||
|
|
||||||
config.fonts.fonts = config.fonts.packages;
|
|
||||||
}
|
|
|
@ -15,13 +15,15 @@ let vimclip = pkgs.stdenv.mkDerivation rec {
|
||||||
cp ./vimclip $out/bin/vimclip
|
cp ./vimclip $out/bin/vimclip
|
||||||
chmod +x $out/bin/vimclip
|
chmod +x $out/bin/vimclip
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
meta.mainProgram = "vimclip";
|
||||||
}; in
|
}; in
|
||||||
pkgs.writeShellScriptBin "vimclip" ''
|
pkgs.writeShellScriptBin "vimclip" ''
|
||||||
if [ "wayland" = $XDG_SESSION_TYPE ]
|
if [ "wayland" = $XDG_SESSION_TYPE ]
|
||||||
then
|
then
|
||||||
export VIMCLIP_CLIPBOARD_COMMAND=${pkgs.wl-clipboard}/bin/wl-copy
|
export VIMCLIP_CLIPBOARD_COMMAND=${pkgs.wl-clipboard}/bin/wl-copy
|
||||||
else
|
else
|
||||||
export VIMCLIP_CLIPBOARD_COMMAND=${lib.getExe pkgs.xsel}
|
export VIMCLIP_CLIPBOARD_COMMAND=${pkgs.xsel}/bin/xsel
|
||||||
fi
|
fi
|
||||||
|
|
||||||
${lib.getExe vimclip}
|
${lib.getExe vimclip}
|
||||||
|
|
Loading…
Reference in a new issue