Reformat nix source file using nixfmt

This commit is contained in:
ulic-youthlic 2025-07-13 06:04:55 +08:00
parent 2e4a532958
commit 9201969c1b
Signed by: youthlic
GPG key ID: 63E86C3C14A0D721
220 changed files with 3169 additions and 2487 deletions

View file

@ -1,46 +1,53 @@
{
description = "A simple NixOS flakes";
outputs = {
flake-parts,
flake-utils,
home-manager,
treefmt-nix,
nixpkgs,
...
} @ inputs: let
nixpkgs-lib = nixpkgs.lib;
lib = nixpkgs-lib.extend (import ./lib);
in
flake-parts.lib.mkFlake {
inherit inputs;
specialArgs = {
inherit lib;
rootPath = ./.;
};
} ({lib, ...}: {
systems = flake-utils.lib.defaultSystems;
imports =
[
home-manager.flakeModules.home-manager
treefmt-nix.flakeModule
]
++ lib.youthlic.loadImports ./flake;
flake = {
inherit lib;
nix.settings = {
# substituters shared in home-manager and nixos configuration
substituters = let
cachix = x: "https://${x}.cachix.org";
in
lib.flatten [
(cachix "nix-community")
"https://cache.nixos.org"
(cachix "cosmic")
];
outputs =
{
flake-parts,
flake-utils,
home-manager,
treefmt-nix,
nixpkgs,
...
}@inputs:
let
nixpkgs-lib = nixpkgs.lib;
lib = nixpkgs-lib.extend (import ./lib);
in
flake-parts.lib.mkFlake
{
inherit inputs;
specialArgs = {
inherit lib;
rootPath = ./.;
};
};
});
}
(
{ lib, ... }:
{
systems = flake-utils.lib.defaultSystems;
imports = [
home-manager.flakeModules.home-manager
treefmt-nix.flakeModule
]
++ lib.youthlic.loadImports ./flake;
flake = {
inherit lib;
nix.settings = {
# substituters shared in home-manager and nixos configuration
substituters =
let
cachix = x: "https://${x}.cachix.org";
in
lib.flatten [
(cachix "nix-community")
"https://cache.nixos.org"
(cachix "cosmic")
];
};
};
}
);
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";

View file

@ -4,30 +4,32 @@
flake-parts-lib,
self,
...
}: let
}:
let
inherit (self) outputs;
inherit (inputs) deploy-rs;
mkDeployNode = {
hostName,
unixName ? "deploy",
system ? "x86_64-linux",
sshName ? hostName,
}: {
"${hostName}" = {
hostname = "${sshName}";
sshUser = "${unixName}";
interactiveSudo = true;
profiles = {
system = {
user = "root";
path =
deploy-rs.lib."${system}".activate.nixos
outputs.nixosConfigurations."${hostName}";
mkDeployNode =
{
hostName,
unixName ? "deploy",
system ? "x86_64-linux",
sshName ? hostName,
}:
{
"${hostName}" = {
hostname = "${sshName}";
sshUser = "${unixName}";
interactiveSudo = true;
profiles = {
system = {
user = "root";
path = deploy-rs.lib."${system}".activate.nixos outputs.nixosConfigurations."${hostName}";
};
};
};
};
};
in {
in
{
options = {
flake = flake-parts-lib.mkSubmoduleOptions {
deploy = lib.mkOption {
@ -43,10 +45,10 @@ in {
]
|> map (
hostName:
mkDeployNode {
inherit hostName;
}
mkDeployNode {
inherit hostName;
}
)
|> lib.foldr (a: b: a // b) {};
|> lib.foldr (a: b: a // b) { };
};
}

View file

@ -4,7 +4,8 @@
self,
rootPath,
...
}: let
}:
let
inherit (self) outputs;
homeModules =
(
@ -13,10 +14,10 @@
|> lib.filterAttrs (_key: value: value == "directory")
|> lib.filterAttrs (
key: _value:
!builtins.elem key [
"modules"
"extra"
]
!builtins.elem key [
"modules"
"extra"
]
)
|> builtins.attrNames
|> (with lib; flip genAttrs (name: import (rootPath + "/home/${name}/modules")))
@ -25,19 +26,20 @@
default = import "${toString rootPath}/home/modules";
extra = import "${toString rootPath}/home/extra";
};
makeHomeConfiguration = {
hostName,
unixName ? "david",
system ? "x86_64-linux",
nixpkgs ? inputs.nixpkgs,
home-manager ? inputs.home-manager,
}: {
"${unixName}@${hostName}" = home-manager.lib.homeManagerConfiguration {
pkgs = import nixpkgs {
inherit system;
};
modules =
[
makeHomeConfiguration =
{
hostName,
unixName ? "david",
system ? "x86_64-linux",
nixpkgs ? inputs.nixpkgs,
home-manager ? inputs.home-manager,
}:
{
"${unixName}@${hostName}" = home-manager.lib.homeManagerConfiguration {
pkgs = import nixpkgs {
inherit system;
};
modules = [
(rootPath + "/home/${unixName}/configurations/${hostName}")
]
++ (with homeModules; [
@ -49,28 +51,29 @@
]
++ [
{
lib = {inherit (lib) youthlic;};
lib = { inherit (lib) youthlic; };
}
];
extraSpecialArgs = {
inherit
inputs
outputs
unixName
hostName
system
rootPath
;
extraSpecialArgs = {
inherit
inputs
outputs
unixName
hostName
system
rootPath
;
};
};
};
};
in {
in
{
flake = {
homeConfigurations = lib.foldr (a: b: a // b) {} (
homeConfigurations = lib.foldr (a: b: a // b) { } (
[
# Hostname
]
|> map (hostName: makeHomeConfiguration {inherit hostName;})
|> map (hostName: makeHomeConfiguration { inherit hostName; })
);
inherit homeModules;
};

View file

@ -4,31 +4,37 @@
self,
rootPath,
...
}: let
}:
let
inherit (self) outputs;
in {
in
{
flake = {
nixosModules = {
default = import (rootPath + "/nixos/modules/top-level");
gui = import (rootPath + "/nixos/modules/top-level/gui.nix");
};
nixosConfigurations = let
makeNixosConfiguration = hostName:
lib.nixosSystem {
modules = [(rootPath + "/nixos/configurations/${hostName}")];
specialArgs = {
inherit inputs outputs rootPath lib;
nixosConfigurations =
let
makeNixosConfiguration =
hostName:
lib.nixosSystem {
modules = [ (rootPath + "/nixos/configurations/${hostName}") ];
specialArgs = {
inherit
inputs
outputs
rootPath
lib
;
};
};
};
in
in
[
"Tytonidae"
"Cape"
"Akun"
]
|> (
with lib;
flip genAttrs makeNixosConfiguration
);
|> (with lib; flip genAttrs makeNixosConfiguration);
};
}

View file

@ -4,10 +4,12 @@
lib,
rootPath,
...
}: let
}:
let
inherit (self) outputs;
importWithArgs = lib.flip import {inherit inputs outputs;};
in {
importWithArgs = lib.flip import { inherit inputs outputs; };
in
{
flake.overlays =
[
"modifications"

View file

@ -2,66 +2,72 @@
inputs,
rootPath,
...
}: {
}:
{
imports = [
(rootPath + "/treefmt.nix")
];
perSystem = {
pkgs,
system,
lib,
self',
inputs',
...
}: let
inherit (inputs) nixpkgs;
in {
_module.args.pkgs = import nixpkgs {
inherit system;
config = {
allowUnfree = true;
};
overlays = [(_final: _prev: {inherit lib;})];
};
devShells.default = pkgs.mkShell {
name = "nixos-shell";
packages = with pkgs; [
nixd
nil
typos
typos-lsp
just
nvfetcher
];
};
legacyPackages = let
inputsScope = lib.makeScope pkgs.newScope (self: {
inherit inputs rootPath;
srcs = self.callPackage (rootPath + "/_sources/generated.nix") {};
inherit (inputs'.nixvim.legacyPackages) makeNixvim makeNixvimWithModule;
inherit (self'.legacyPackages) nixvimPlugins;
neovim_git = inputs'.neovim-nightly.packages.default;
});
perSystem =
{
pkgs,
system,
lib,
self',
inputs',
...
}:
let
inherit (inputs) nixpkgs;
in
lib.packagesFromDirectoryRecursive {
inherit (inputsScope) callPackage;
directory = rootPath + "/pkgs";
{
_module.args.pkgs = import nixpkgs {
inherit system;
config = {
allowUnfree = true;
};
overlays = [ (_final: _prev: { inherit lib; }) ];
};
packages = let
flattenPkgs = path: value:
if lib.isDerivation value
then {
${lib.concatStringsSep "/" path} = value;
}
else if lib.isAttrs value
then lib.concatMapAttrs (name: flattenPkgs (path ++ [name])) value
else {};
in
flattenPkgs [] self'.legacyPackages;
checks =
lib.concatMapAttrs (name: value: {
devShells.default = pkgs.mkShell {
name = "nixos-shell";
packages = with pkgs; [
nixd
nil
typos
typos-lsp
just
nvfetcher
];
};
legacyPackages =
let
inputsScope = lib.makeScope pkgs.newScope (self: {
inherit inputs rootPath;
srcs = self.callPackage (rootPath + "/_sources/generated.nix") { };
inherit (inputs'.nixvim.legacyPackages) makeNixvim makeNixvimWithModule;
inherit (self'.legacyPackages) nixvimPlugins;
neovim_git = inputs'.neovim-nightly.packages.default;
});
in
lib.packagesFromDirectoryRecursive {
inherit (inputsScope) callPackage;
directory = rootPath + "/pkgs";
};
packages =
let
flattenPkgs =
path: value:
if lib.isDerivation value then
{
${lib.concatStringsSep "/" path} = value;
}
else if lib.isAttrs value then
lib.concatMapAttrs (name: flattenPkgs (path ++ [ name ])) value
else
{ };
in
flattenPkgs [ ] self'.legacyPackages;
checks = lib.concatMapAttrs (name: value: {
"package-${name}" = value;
})
self'.packages;
};
}) self'.packages;
};
}

View file

@ -3,7 +3,8 @@
lib,
rootPath,
...
}: {
}:
{
options = {
flake = flake-parts-lib.mkSubmoduleOptions {
templates = lib.mkOption {

View file

@ -2,7 +2,8 @@
pkgs,
unixName,
...
}: {
}:
{
youthlic = {
xdg-dirs.enable = true;
programs = {

View file

@ -1 +1 @@
{...}: {}
{ ... }: { }

View file

@ -4,32 +4,35 @@
unixName,
config,
...
}: {
}:
{
imports = lib.youthlic.loadImports ./.;
youthlic = {
xdg-dirs.enable = true;
programs = let
email = config.accounts.email.accounts.ulic-youthlic;
inherit (email) address name;
signKey = email.gpg.key;
in {
gpg.enable = true;
git = {
inherit name signKey;
email = address;
encrypt-credential = true;
programs =
let
email = config.accounts.email.accounts.ulic-youthlic;
inherit (email) address name;
signKey = email.gpg.key;
in
{
gpg.enable = true;
git = {
inherit name signKey;
email = address;
encrypt-credential = true;
};
fish.enable = true;
bash.enable = true;
jujutsu = {
enable = true;
inherit name signKey;
email = address;
};
starship.enable = true;
sops.enable = true;
atuin.enable = true;
};
fish.enable = true;
bash.enable = true;
jujutsu = {
enable = true;
inherit name signKey;
email = address;
};
starship.enable = true;
sops.enable = true;
atuin.enable = true;
};
};
david = {

View file

@ -2,13 +2,17 @@
config,
inputs,
...
}: let
}:
let
inherit (inputs.niri-flake.lib.kdl) node leaf flag;
in {
in
{
david.programs.niri = {
waybar.settings = let
cfg = config.david.programs.niri.waybar;
in [(cfg.template // (cfg.helper.mkBacklight "intel_backlight") // {output = "eDP-1";})];
waybar.settings =
let
cfg = config.david.programs.niri.waybar;
in
[ (cfg.template // (cfg.helper.mkBacklight "intel_backlight") // { output = "eDP-1"; }) ];
wluma.extraSettings = {
output = {
backlight = [
@ -20,21 +24,26 @@ in {
];
};
};
extraConfig = let
output = node "output";
in [
(output ["eDP-1"] [
(leaf "mode" ["1920x1200@60.018"])
(leaf "scale" [1.0])
(flag "focus-at-startup")
(leaf "position" [
{
x = 0;
y = 0;
}
])
(leaf "transform" ["normal"])
])
];
extraConfig =
let
output = node "output";
in
[
(output
[ "eDP-1" ]
[
(leaf "mode" [ "1920x1200@60.018" ])
(leaf "scale" [ 1.0 ])
(flag "focus-at-startup")
(leaf "position" [
{
x = 0;
y = 0;
}
])
(leaf "transform" [ "normal" ])
]
)
];
};
}

View file

@ -4,40 +4,43 @@
config,
unixName,
...
}: {
}:
{
imports = lib.youthlic.loadImports ./.;
youthlic = {
xdg-dirs.enable = true;
programs = let
email = config.accounts.email.accounts.ulic-youthlic;
inherit (email) name address;
signKey = email.gpg.key;
in {
rustypaste-cli.enable = true;
gpg.enable = true;
jujutsu = {
enable = true;
inherit name signKey;
email = address;
programs =
let
email = config.accounts.email.accounts.ulic-youthlic;
inherit (email) name address;
signKey = email.gpg.key;
in
{
rustypaste-cli.enable = true;
gpg.enable = true;
jujutsu = {
enable = true;
inherit name signKey;
email = address;
};
git = {
inherit name signKey;
email = address;
encrypt-credential = true;
};
fish.enable = true;
bash.enable = true;
starship.enable = true;
sops.enable = true;
kvm.enable = true;
atuin.enable = true;
ion.enable = true;
awscli = {
enable = true;
url = "http://localhost:8491";
};
doom.enable = true;
};
git = {
inherit name signKey;
email = address;
encrypt-credential = true;
};
fish.enable = true;
bash.enable = true;
starship.enable = true;
sops.enable = true;
kvm.enable = true;
atuin.enable = true;
ion.enable = true;
awscli = {
enable = true;
url = "http://localhost:8491";
};
doom.enable = true;
};
};
david = {

View file

@ -1,11 +1,14 @@
{config, ...}: {
{ config, ... }:
{
david.programs.niri = {
waybar.settings = let
cfg = config.david.programs.niri.waybar;
in [
(cfg.template // (cfg.helper.mkBacklight "ddcci13") // {output = "DP-3";})
(cfg.template // (cfg.helper.mkBacklight "nvidia_0") // {output = "eDP-1";})
];
waybar.settings =
let
cfg = config.david.programs.niri.waybar;
in
[
(cfg.template // (cfg.helper.mkBacklight "ddcci13") // { output = "DP-3"; })
(cfg.template // (cfg.helper.mkBacklight "nvidia_0") // { output = "eDP-1"; })
];
wluma.extraSettings = {
output = {
backlight = [
@ -28,6 +31,6 @@
}
];
};
extraConfig = [];
extraConfig = [ ];
};
}

View file

@ -2,7 +2,8 @@
lib,
pkgs,
...
}: {
}:
{
imports = lib.youthlic.loadImports ./.;
config = {
youthlic.programs = {

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.accounts.email;
in {
in
{
options = {
david.accounts.email = {
enable = lib.mkEnableOption "emails";

View file

@ -3,9 +3,11 @@
config,
pkgs,
...
}: let
}:
let
cfg = config.david.programs.alacritty;
in {
in
{
options = {
david.programs.alacritty = {
enable = lib.mkEnableOption "alacritty";
@ -15,16 +17,14 @@ in {
programs.alacritty = {
enable = true;
package = pkgs.alacritty_git;
settings =
(./alacritty.toml |> builtins.readFile |> builtins.fromTOML)
// {
colors = lib.mkForce {};
font.size = lib.mkForce 16;
window.opacity = lib.mkForce 0.8;
general.import = [
"${pkgs.alacritty-theme}/share/alacritty-theme/gruvbox_dark.toml"
];
};
settings = (./alacritty.toml |> builtins.readFile |> builtins.fromTOML) // {
colors = lib.mkForce { };
font.size = lib.mkForce 16;
window.opacity = lib.mkForce 0.8;
general.import = [
"${pkgs.alacritty-theme}/share/alacritty-theme/gruvbox_dark.toml"
];
};
};
};
}

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.david.programs.chromium;
in {
in
{
options = {
david.programs.chromium = {
enable = lib.mkEnableOption "chromium";

View file

@ -3,9 +3,11 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.david.programs.espanso;
in {
in
{
options = {
david.programs.espanso = {
enable = lib.mkEnableOption "espanso";
@ -16,7 +18,7 @@ in {
enable = true;
package = pkgs.espanso-wayland;
configs = {
default = {};
default = { };
};
matches = {
base = {

View file

@ -3,9 +3,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.david.programs.firefox;
in {
in
{
options = {
david.programs.firefox = {
enable = lib.mkEnableOption "firefox";
@ -92,7 +94,7 @@ in {
}
];
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
definedAliases = ["@np"];
definedAliases = [ "@np" ];
};
"Nix Options" = {
urls = [
@ -110,7 +112,7 @@ in {
];
}
];
definedAliases = ["@no"];
definedAliases = [ "@no" ];
};
"Home Manager Options" = {
urls = [
@ -128,7 +130,7 @@ in {
];
}
];
definedAliases = ["hm"];
definedAliases = [ "hm" ];
};
"NUR Packages" = {
urls = [
@ -136,7 +138,7 @@ in {
template = "https://nur.nix-community.org/";
}
];
definedAliases = ["nu"];
definedAliases = [ "nu" ];
};
"Nix Flakes" = {
urls = [
@ -154,7 +156,7 @@ in {
];
}
];
definedAliases = ["nf"];
definedAliases = [ "nf" ];
};
"NixOS Wiki" = {
urls = [
@ -168,7 +170,7 @@ in {
];
}
];
definedAliases = ["nw"];
definedAliases = [ "nw" ];
};
"bing".metaData.hidden = true;
"google".metaData.alias = "@g"; # builtin engines only support specifying one additional alias

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.foot;
in {
in
{
options = {
david.programs.foot = {
enable = lib.mkEnableOption "foot";

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.fuzzel;
in {
in
{
options = {
david.programs.fuzzel = {
enable = lib.mkEnableOption "fuzzel";

View file

@ -3,58 +3,61 @@
config,
lib,
...
}: {
}:
{
options = {
david.programs.ghostty = {
enable = lib.mkEnableOption "ghostty";
};
};
config = let
cfg = config.david.programs.ghostty;
in (lib.mkIf cfg.enable {
programs.ghostty = lib.mkMerge [
{
enable = true;
package = pkgs.ghostty;
settings = {
# font-family = "FiraCode Nerd Font";
# font-feature = [
# "calt=1"
# "clig=1"
# "liga=1"
# "cv01"
# "cv02"
# "cv06"
# "zero"
# "onum"
# "cv17"
# "ss05"
# "ss03"
# "cv16"
# "cv31"
# "cv29"
# "cv30"
# ];
config =
let
cfg = config.david.programs.ghostty;
in
(lib.mkIf cfg.enable {
programs.ghostty = lib.mkMerge [
{
enable = true;
package = pkgs.ghostty;
settings = {
# font-family = "FiraCode Nerd Font";
# font-feature = [
# "calt=1"
# "clig=1"
# "liga=1"
# "cv01"
# "cv02"
# "cv06"
# "zero"
# "onum"
# "cv17"
# "ss05"
# "ss03"
# "cv16"
# "cv31"
# "cv29"
# "cv30"
# ];
# font-family = "Maple Mono NF CN";
font-feature = [
"calt"
"zero"
"cv03"
"ss08"
];
font-size = lib.mkForce 17;
# theme = "ayu";
background-opacity = lib.mkForce 0.8;
confirm-close-surface = "false";
};
}
(lib.mkIf config.youthlic.programs.fish.enable {
enableFishIntegration = true;
})
(lib.mkIf config.youthlic.programs.bash.enable {
enableBashIntegration = true;
})
];
});
# font-family = "Maple Mono NF CN";
font-feature = [
"calt"
"zero"
"cv03"
"ss08"
];
font-size = lib.mkForce 17;
# theme = "ayu";
background-opacity = lib.mkForce 0.8;
confirm-close-surface = "false";
};
}
(lib.mkIf config.youthlic.programs.fish.enable {
enableFishIntegration = true;
})
(lib.mkIf config.youthlic.programs.bash.enable {
enableBashIntegration = true;
})
];
});
}

View file

@ -3,9 +3,11 @@
config,
pkgs,
...
}: let
}:
let
cfg = config.david.programs.helix;
in {
in
{
options = {
david.programs.helix = {
enable = lib.mkEnableOption "helix";

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.david.programs.kanshi;
in {
in
{
options = {
david.programs.kanshi = {
enable = lib.mkEnableOption "kanshi";

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.david.programs.mpv;
in {
in
{
options = {
david.programs.mpv = {
enable = lib.mkEnableOption "mpv";

File diff suppressed because it is too large Load diff

View file

@ -6,10 +6,12 @@
osConfig ? null,
options,
...
} @ args: let
}@args:
let
cfg = config.david.programs.niri;
niri = osConfig.programs.niri.package;
in {
in
{
options = {
david.programs.niri = {
enable = lib.mkEnableOption "niri";
@ -40,37 +42,37 @@ in {
{
david.programs.niri.enable = osConfig.youthlic.gui.enabled == "niri";
}
(
lib.mkIf cfg.enable {
home.packages =
(with pkgs; [
swaynotificationcenter
kdePackages.polkit-kde-agent-1
wl-clipboard
cliphist
swayimg
])
++ [niri];
qt = {
enable = true;
};
xdg.portal = {
configPackages = [niri];
enable = true;
extraPortals = lib.mkIf (
!niri.cargoBuildNoDefaultFeatures || builtins.elem "xdp-gnome-screencast" niri.cargoBuildFeatures
) [pkgs.xdg-desktop-portal-gnome];
};
xdg.configFile = let
qtctConf =
''
[Appearance]
standard_dialogs=xdgdesktopportal
''
+ lib.optionalString (config.qt.style ? name) ''
style=${config.qt.style.name}
'';
in {
(lib.mkIf cfg.enable {
home.packages =
(with pkgs; [
swaynotificationcenter
kdePackages.polkit-kde-agent-1
wl-clipboard
cliphist
swayimg
])
++ [ niri ];
qt = {
enable = true;
};
xdg.portal = {
configPackages = [ niri ];
enable = true;
extraPortals = lib.mkIf (
!niri.cargoBuildNoDefaultFeatures || builtins.elem "xdp-gnome-screencast" niri.cargoBuildFeatures
) [ pkgs.xdg-desktop-portal-gnome ];
};
xdg.configFile =
let
qtctConf = ''
[Appearance]
standard_dialogs=xdgdesktopportal
''
+ lib.optionalString (config.qt.style ? name) ''
style=${config.qt.style.name}
'';
in
{
"qt5ct/qt5ct.conf" = lib.mkForce {
text = qtctConf;
};
@ -78,28 +80,26 @@ in {
text = qtctConf;
};
};
david.programs = {
fuzzel.enable = true;
waybar = {
enable = true;
inherit (cfg.waybar) settings;
};
wluma = {
enable = true;
inherit (cfg.wluma) extraSettings;
};
swaync.enable = true;
swaylock.enable = true;
waypaper.enable = true;
kanshi.enable = true;
david.programs = {
fuzzel.enable = true;
waybar = {
enable = true;
inherit (cfg.waybar) settings;
};
programs.niri = {
config =
(lib.toList (import ./config.nix (args // {inherit pkgs;})))
++ (lib.toList cfg.extraConfig);
package = niri;
wluma = {
enable = true;
inherit (cfg.wluma) extraSettings;
};
}
)
swaync.enable = true;
swaylock.enable = true;
waypaper.enable = true;
kanshi.enable = true;
};
programs.niri = {
config =
(lib.toList (import ./config.nix (args // { inherit pkgs; }))) ++ (lib.toList cfg.extraConfig);
package = niri;
};
})
];
}

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.openssh;
in {
in
{
options = {
david.programs.openssh = {
enable = lib.mkEnableOption "openssh";
@ -35,7 +37,7 @@ in {
};
})
(lib.mkIf (cfg.enable && config.youthlic.programs.sops.enable) {
programs.ssh.includes = [config.sops.secrets.ssh-config.path];
programs.ssh.includes = [ config.sops.secrets.ssh-config.path ];
sops.secrets = {
"ssh-private-key/tytonidae" = {
mode = "0600";

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.swaylock;
in {
in
{
options = {
david.programs.swaylock = {
enable = lib.mkEnableOption "swaylock";

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.david.programs.swaync;
in {
in
{
options = {
david.programs.swaync = {
enable = lib.mkEnableOption "swaync";
@ -18,7 +20,7 @@ in {
};
})
(lib.mkIf (!cfg.systemd.enable) {
systemd.user.services.swaync = lib.mkForce {};
systemd.user.services.swaync = lib.mkForce { };
})
];
}

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.thunderbird;
in {
in
{
options = {
david.programs.thunderbird = {
enable = lib.mkEnableOption "thunderbird";

View file

@ -4,9 +4,11 @@
lib,
options,
...
}: let
}:
let
cfg = config.david.programs.waybar;
in {
in
{
options = {
david.programs.waybar = {
enable = lib.mkEnableOption "waybar";
@ -23,7 +25,7 @@ in {
"niri/workspaces"
"wlr/taskbar"
];
modules-center = ["clock"];
modules-center = [ "clock" ];
modules-right = [
"tray"
"idle_inhibitor"
@ -37,7 +39,7 @@ in {
on-click = "activate";
};
"niri/worksapces" = {};
"niri/worksapces" = { };
"niri/taskbar" = {
icon-size = 15;
on-click = "activate";

View file

@ -3,16 +3,22 @@
config,
pkgs,
...
}: let
}:
let
cfg = config.david.programs.waypaper;
in {
in
{
options = {
david.programs.waypaper = {
enable = lib.mkEnableOption "waypaper";
};
};
config = lib.mkIf cfg.enable {
home.packages = with pkgs; [waypaper socat mpvpaper];
home.packages = with pkgs; [
waypaper
socat
mpvpaper
];
systemd.user = {
timers."waypaper" = {
Unit = {
@ -23,7 +29,7 @@ in {
OnCalendar = "*:0/10";
};
Install = {
WantedBy = ["timers.target"];
WantedBy = [ "timers.target" ];
};
};
services."waypaper" = {

View file

@ -3,9 +3,11 @@
config,
options,
...
}: let
}:
let
cfg = config.david.programs.wluma;
in {
in
{
options = {
david.programs.wluma = {
enable = lib.mkEnableOption "wluma";
@ -33,23 +35,22 @@ in {
config = lib.mkIf cfg.enable {
services.wluma = {
enable = true;
settings =
{
als = {
webcam = {
video = 0;
thresholds = {
"0" = "night";
"15" = "dark";
"30" = "dim";
"45" = "normal";
"60" = "bright";
"75" = "outdoors";
};
settings = {
als = {
webcam = {
video = 0;
thresholds = {
"0" = "night";
"15" = "dark";
"30" = "dim";
"45" = "normal";
"60" = "bright";
"75" = "outdoors";
};
};
}
// cfg.extraSettings;
};
}
// cfg.extraSettings;
systemd = {
enable = true;
};

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.david.programs.zed-editor;
in {
in
{
options = {
david.programs.zed-editor = {
enable = lib.mkEnableOption "zed-editor";
@ -57,13 +59,17 @@ in {
ty = {
binary = {
path = lib.getExe pkgs.ty;
arguments = ["server"];
arguments = [ "server" ];
};
};
};
languages = {
Python = {
language_servers = ["ty" "ruff" "pyright"];
language_servers = [
"ty"
"ruff"
"pyright"
];
formatter = [
{
language_server = {
@ -79,11 +85,13 @@ in {
];
};
Nix = {
language_servers = ["nixd" "nil"];
language_servers = [
"nixd"
"nil"
];
formatter = {
external = {
command = "alejandra";
arguments = ["--quiet" "--"];
command = "nixfmt";
};
};
};

View file

@ -3,9 +3,11 @@
config,
pkgs,
...
}: let
}:
let
cfg = config.david.wallpaper;
in {
in
{
options = {
david.wallpaper = {
enable = lib.mkEnableOption "wallpaper";

View file

@ -2,7 +2,8 @@
lib,
inputs,
...
}: {
}:
{
imports =
(with inputs; [
niri-flake.homeModules.niri

View file

@ -4,7 +4,8 @@
pkgs,
inputs,
...
}: {
}:
{
config = {
nixpkgs = {
config = {

View file

@ -2,7 +2,8 @@
lib,
inputs,
...
}: {
}:
{
imports =
(with inputs; [
sops-nix.homeManagerModules.sops

View file

@ -2,7 +2,8 @@
osConfig ? null,
lib,
...
}: {
}:
{
config = lib.mkIf (osConfig != null) {
xdg.dataFile = {
"fcitx5/rime/default.custom.yaml".source = ./default.custom.yaml;

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.youthlic.programs.atuin;
in {
in
{
options = {
youthlic.programs.atuin = {
enable = lib.mkEnableOption "atuin";

View file

@ -3,9 +3,11 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.programs.awscli;
in {
in
{
options = {
youthlic.programs.awscli = {
enable = lib.mkEnableOption "awscli";
@ -16,7 +18,7 @@ in {
};
};
config = lib.mkIf cfg.enable {
sops.secrets."awscli" = {};
sops.secrets."awscli" = { };
programs.awscli = {
enable = true;
credentials = {

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.bash;
in {
in
{
options = {
youthlic.programs.bash = {
enable = lib.mkEnableOption "bash";

View file

@ -3,9 +3,11 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.programs.doom;
in {
in
{
options = {
youthlic.programs.doom = {
enable = lib.mkEnableOption "doom";
@ -16,8 +18,8 @@ in {
programs.doom-emacs = {
enable = true;
emacs = pkgs.emacs-pgtk;
extraPackages = emacsPackages:
with emacsPackages; [
extraPackages =
emacsPackages: with emacsPackages; [
melpaPackages.telega
];
extraBinPackages = with pkgs; [

View file

@ -2,12 +2,14 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.eza;
fish-cfg = config.youthlic.programs.fish;
bash-cfg = config.youthlic.programs.bash;
ion-cfg = config.youthlic.programs.ion;
in {
in
{
options = {
youthlic.programs.eza = {
enable = lib.mkEnableOption "eza";

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.fish;
in {
in
{
options = {
youthlic.programs.fish = {
enable = lib.mkEnableOption "fish";

View file

@ -2,11 +2,13 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.fzf;
fish-cfg = config.youthlic.programs.fish;
bash-cfg = config.youthlic.programs.bash;
in {
in
{
options = {
youthlic.programs.fzf = {
enable = lib.mkEnableOption "fzf";

View file

@ -2,7 +2,8 @@
config,
lib,
...
}: {
}:
{
options = {
youthlic.programs.git = {
email = lib.mkOption {
@ -30,9 +31,10 @@
encrypt-credential = lib.mkEnableOption "encrypt git credential";
};
};
config = let
cfg = config.youthlic.programs.git;
in
config =
let
cfg = config.youthlic.programs.git;
in
lib.mkMerge [
{
programs.lazygit = {

View file

@ -4,15 +4,17 @@
lib,
outputs,
...
}: {
}:
{
options = {
youthlic.programs.gpg = {
enable = lib.mkEnableOption "gpg";
};
};
config = let
cfg = config.youthlic.programs.gpg;
in
config =
let
cfg = config.youthlic.programs.gpg;
in
lib.mkIf cfg.enable {
services.gpg-agent = lib.mkMerge [
{

View file

@ -3,36 +3,44 @@
pkgs,
config,
...
}: let
}:
let
cfg = config.youthlic.programs.helix;
defaultLanguagesSettings = config.programs.helix.package.passthru.languages.language;
in {
in
{
options = {
youthlic.programs.helix = {
enable = lib.mkEnableOption "helix";
languageSettings = lib.mkOption {
type = lib.types.attrsOf (lib.types.submodule ({...}: {
freeformType = lib.types.anything;
options = {
language-servers = lib.mkOption {
type = lib.types.listOf (lib.types.either lib.types.str lib.types.anything);
default = ["typos-lsp"];
example = ["rust-analyzer"];
apply = lib.unique;
};
};
}));
type = lib.types.attrsOf (
lib.types.submodule (
{ ... }:
{
freeformType = lib.types.anything;
options = {
language-servers = lib.mkOption {
type = lib.types.listOf (lib.types.either lib.types.str lib.types.anything);
default = [ "typos-lsp" ];
example = [ "rust-analyzer" ];
apply = lib.unique;
};
};
}
)
);
default = lib.pipe defaultLanguagesSettings [
(map (lang: lib.nameValuePair lang.name (lib.removeAttrs lang ["name"])))
(map (lang: lib.nameValuePair lang.name (lib.removeAttrs lang [ "name" ])))
lib.listToAttrs
];
apply = lib.mapAttrsToList (name: value: {inherit name;} // value);
apply = lib.mapAttrsToList (name: value: { inherit name; } // value);
};
extraPackages = lib.mkOption {
type = lib.types.listOf lib.types.package;
default = [];
default = [ ];
example = (
with pkgs; [
with pkgs;
[
deno
]
);
@ -49,224 +57,224 @@ in {
defaultEditor = true;
extraPackages = cfg.extraPackages;
settings = ./config.toml |> builtins.readFile |> builtins.fromTOML;
languages =
lib.recursiveUpdate
{
language-server = {
neocmakelsp = {
command = "neocmakelsp";
args = [
"stdio"
];
};
fish-lsp = {
command = "fish-lsp";
args = [
"start"
];
};
ty = {
command = "ty";
args = [
"server"
];
};
typos-lsp = {
command = "typos-lsp";
};
languages = lib.recursiveUpdate {
language-server = {
neocmakelsp = {
command = "neocmakelsp";
args = [
"stdio"
];
};
}
{language = cfg.languageSettings;};
fish-lsp = {
command = "fish-lsp";
args = [
"start"
];
};
ty = {
command = "ty";
args = [
"server"
];
};
typos-lsp = {
command = "typos-lsp";
};
};
} { language = cfg.languageSettings; };
};
})
(lib.mkIf cfg.enable {
youthlic.programs.helix.languageSettings = lib.pipe defaultLanguagesSettings [
(map ({name, ...}: lib.nameValuePair name {language-servers = ["typos-lsp"];}))
(map ({ name, ... }: lib.nameValuePair name { language-servers = [ "typos-lsp" ]; }))
lib.listToAttrs
];
})
(lib.mkIf cfg.enable {
youthlic.programs.helix.languageSettings =
lib.recursiveUpdate
(lib.pipe defaultLanguagesSettings [(map (lang: lib.nameValuePair lang.name (lib.removeAttrs lang ["name"]))) lib.listToAttrs])
{
cmake = {
language-servers = [
"neocmakelsp"
"cmake-language-server"
];
};
kdl = {
formatter = {
command = "kdlfmt";
args = [
"format"
"-"
(lib.pipe defaultLanguagesSettings [
(map (lang: lib.nameValuePair lang.name (lib.removeAttrs lang [ "name" ])))
lib.listToAttrs
])
{
cmake = {
language-servers = [
"neocmakelsp"
"cmake-language-server"
];
};
};
just = {
formatter = {
command = "just";
args = [
"--dump"
kdl = {
formatter = {
command = "kdlfmt";
args = [
"format"
"-"
];
};
};
just = {
formatter = {
command = "just";
args = [
"--dump"
];
};
};
nix = {
formatter = {
command = "nixfmt";
};
};
xml = {
formatter = {
command = "xmllint";
args = [
"--format"
"-"
];
};
};
typst = {
formatter = {
command = "typstyle";
};
};
c = {
formatter = {
command = "clang-format";
};
};
cpp = {
formatter = {
command = "clang-format";
};
};
python = {
formatter = {
command = "ruff";
args = [
"format"
"-s"
"--line-length"
"88"
"-"
];
};
language-servers = [
"pyright"
"ruff"
"ty"
];
};
};
nix = {
formatter = {
command = "alejandra";
go = {
formatter = {
command = "goimports";
};
};
};
xml = {
formatter = {
command = "xmllint";
args = [
"--format"
"-"
awk = {
formatter = {
command = "awk";
timeout = 5;
args = [
"--file=/dev/stdin"
"--pretty-print=/dev/stdout"
];
};
};
fish = {
language-servers = [
"fish-lsp"
];
};
};
typst = {
formatter = {
command = "typstyle";
yaml = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"yaml"
];
};
};
};
c = {
formatter = {
command = "clang-format";
};
};
cpp = {
formatter = {
command = "clang-format";
};
};
python = {
formatter = {
command = "ruff";
args = [
"format"
"-s"
"--line-length"
"88"
"-"
html = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"html"
];
};
language-servers = [
"vscode-html-language-server"
];
};
language-servers = [
"pyright"
"ruff"
"ty"
];
};
go = {
formatter = {
command = "goimports";
};
};
awk = {
formatter = {
command = "awk";
timeout = 5;
args = [
"--file=/dev/stdin"
"--pretty-print=/dev/stdout"
css = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"css"
];
};
language-servers = [
"vscode-css-language-server"
];
};
};
fish = {
language-servers = [
"fish-lsp"
];
};
yaml = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"yaml"
toml = {
formatter = {
command = "taplo";
args = [
"fmt"
"-"
];
};
};
markdown = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"md"
];
};
};
json = {
language-servers = [
"vscode-json-language-server"
];
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"json"
];
};
};
jsonc = {
language-servers = [
"vscode-json-language-server"
];
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"jsonc"
];
};
};
};
html = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"html"
];
};
language-servers = [
"vscode-html-language-server"
];
};
css = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"css"
];
};
language-servers = [
"vscode-css-language-server"
];
};
toml = {
formatter = {
command = "taplo";
args = [
"fmt"
"-"
];
};
};
markdown = {
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"md"
];
};
};
json = {
language-servers = [
"vscode-json-language-server"
];
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"json"
];
};
};
jsonc = {
language-servers = [
"vscode-json-language-server"
];
formatter = {
command = "deno";
args = [
"fmt"
"-"
"--ext"
"jsonc"
];
};
};
};
})
];
}

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.youthlic.programs.ion;
in {
in
{
options = {
youthlic.programs.ion = {
enable = lib.mkEnableOption "ion";

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.jujutsu;
in {
in
{
options = {
youthlic.programs.jujutsu = {
enable = lib.mkEnableOption "jujutsu";

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.kvm;
in {
in
{
options = {
youthlic.programs.kvm = {
enable = lib.mkEnableOption "kvm";
@ -14,8 +16,8 @@ in {
dconf = {
settings = {
"org/virt-manager/virt-manager/connections" = {
autoconnect = ["qemu:///system"];
uris = ["qemu:///system"];
autoconnect = [ "qemu:///system" ];
uris = [ "qemu:///system" ];
};
};
};

View file

@ -3,20 +3,22 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.programs.rustypaste-cli;
in {
in
{
options = {
youthlic.programs.rustypaste-cli = {
enable = lib.mkEnableOption "rustypaste-cli";
};
};
config = lib.mkIf cfg.enable {
home.packages = [pkgs.rustypaste-cli];
home.packages = [ pkgs.rustypaste-cli ];
sops = {
secrets = {
"rustypaste/auth" = {};
"rustypaste/delete" = {};
"rustypaste/auth" = { };
"rustypaste/delete" = { };
};
templates."rustypaste-config.toml" = {
path = "${config.xdg.configHome}/rustypaste/config.toml";

View file

@ -4,7 +4,8 @@
pkgs,
rootPath,
...
}: {
}:
{
options = {
youthlic.programs.sops = {
enable = lib.mkOption {
@ -24,12 +25,14 @@
};
};
};
config = let
cfg = config.youthlic.programs.sops;
in
config =
let
cfg = config.youthlic.programs.sops;
in
lib.mkIf cfg.enable {
home.packages = (
with pkgs; [
with pkgs;
[
sops
age
]

View file

@ -2,30 +2,31 @@
lib,
config,
...
}: let
}:
let
cfg = config.youthlic.programs.starship;
fish-cfg = config.youthlic.programs.fish;
bash-cfg = config.youthlic.programs.bash;
ion-cfg = config.youthlic.programs.ion;
in {
in
{
options = {
youthlic.programs.starship = {
enable = lib.mkEnableOption "starship";
};
};
config = lib.mkMerge [
(
lib.mkIf cfg.enable {
programs.starship = {
enable = true;
enableTransience = true;
settings = let
(lib.mkIf cfg.enable {
programs.starship = {
enable = true;
enableTransience = true;
settings =
let
config-file = builtins.readFile ./config.toml;
in
builtins.fromTOML config-file;
};
}
)
builtins.fromTOML config-file;
};
})
(lib.mkIf (cfg.enable && fish-cfg.enable) {
programs.starship.enableFishIntegration = true;
programs.fish.functions = {

View file

@ -3,11 +3,13 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.programs.yazi;
fish-cfg = config.youthlic.programs.fish;
bash-cfg = config.youthlic.programs.bash;
in {
in
{
options = {
youthlic.programs.yazi = {
enable = lib.mkEnableOption "yazi";
@ -21,7 +23,15 @@ in {
programs.yazi = {
enable = true;
plugins = {
inherit (pkgs.yaziPlugins) ouch starship piper chmod smart-enter git full-border;
inherit (pkgs.yaziPlugins)
ouch
starship
piper
chmod
smart-enter
git
full-border
;
};
initLua =
#lua
@ -63,12 +73,15 @@ in {
mgr = {
prepend_keymap = [
{
on = ["c" "m"];
on = [
"c"
"m"
];
run = "plugin chmod";
desc = "Chmod on selected files";
}
{
on = ["l"];
on = [ "l" ];
run = "plugin smart-enter";
desc = "Enter the child directory, or open the file";
}

View file

@ -2,11 +2,13 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.programs.zoxide;
fish-cfg = config.youthlic.programs.fish;
bash-cfg = config.youthlic.programs.bash;
in {
in
{
options = {
youthlic.programs.zoxide = {
enable = lib.mkEnableOption "zoxide";

View file

@ -2,9 +2,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.youthlic.xdg-dirs;
in {
in
{
options = {
youthlic.xdg-dirs = {
enable = lib.mkEnableOption "xdg-dirs";

View file

@ -1,35 +1,38 @@
final: _prev: {
youthlic = {
loadImports' = dir: f:
loadImports' =
dir: f:
final.pipe dir [
final.youthlic.loadImports
f
];
loadImports = dir:
loadImports =
dir:
with final;
if !(pathExists dir && builtins.readFileType dir == "directory")
then []
else let
items = pipe dir [builtins.readDir attrNames];
in
pipe items [
(concatMap
(name: let
path = dir + "/${name}";
type = builtins.readFileType path;
in
if type == "directory"
then
if pathExists (path + "/default.nix")
then [path]
else youthlic.loadImports path
else if type == "regular"
then
if hasSuffix ".nix" name
then [path]
else []
else []))
(filter (name: !hasSuffix "/default.nix" (toString name)))
if !(pathExists dir && builtins.readFileType dir == "directory") then
[ ]
else
let
items = pipe dir [
builtins.readDir
attrNames
];
in
pipe items [
(concatMap (
name:
let
path = dir + "/${name}";
type = builtins.readFileType path;
in
if type == "directory" then
if pathExists (path + "/default.nix") then [ path ] else youthlic.loadImports path
else if type == "regular" then
if hasSuffix ".nix" name then [ path ] else [ ]
else
[ ]
))
(filter (name: !hasSuffix "/default.nix" (toString name)))
];
};
}

View file

@ -4,7 +4,8 @@
lib,
outputs,
...
}: {
}:
{
imports =
(with inputs.nixos-hardware.nixosModules; [
common-cpu-intel
@ -75,9 +76,13 @@
kernelPackages = pkgs.linuxPackages_cachyos;
loader.systemd-boot.enable = true;
loader.efi.canTouchEfiVariables = true;
kernelParams = ["i915.enable_guc=2"];
kernelParams = [ "i915.enable_guc=2" ];
};
nix = {
settings = {
system-features = [ "gccarch-skylake" ];
};
};
nix = {settings = {system-features = ["gccarch-skylake"];};};
hardware = {
graphics.package = pkgs.mesa_git;
intelgpu = {

View file

@ -49,7 +49,7 @@
];
content = {
type = "btrfs";
extraArgs = ["-f"];
extraArgs = [ "-f" ];
subvolumes = {
"@root" = {
mountpoint = "/";

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
youthlic.gui = {
enabled = "niri";
};

View file

@ -7,15 +7,23 @@
pkgs,
modulesPath,
...
}: {
}:
{
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
boot.initrd.availableKernelModules = [
"xhci_pci"
"ahci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
systemd.network = {
enable = true;
wait-online.enable = false;

View file

@ -2,7 +2,8 @@
pkgs,
rootPath,
...
}: {
}:
{
stylix = {
enable = true;
image = rootPath + "/assets/wallpaper/01.png";

View file

@ -2,7 +2,8 @@
lib,
pkgs,
...
}: {
}:
{
users = {
mutableUsers = true;
users.david = {

View file

@ -3,12 +3,12 @@
lib,
outputs,
...
}: {
imports =
[
outputs.nixosModules.default
]
++ (lib.youthlic.loadImports ./.);
}:
{
imports = [
outputs.nixosModules.default
]
++ (lib.youthlic.loadImports ./.);
youthlic = {
home-manager = {
@ -68,7 +68,7 @@
};
nix = {
settings = {
system-features = ["gccarch-ivybridge"];
system-features = [ "gccarch-ivybridge" ];
};
};

View file

@ -15,7 +15,7 @@
size = "100%";
content = {
type = "btrfs";
extraArgs = ["-f"];
extraArgs = [ "-f" ];
subvolumes = {
"@root" = {
mountpoint = "/";

View file

@ -1,11 +1,12 @@
{config, ...}: {
{ config, ... }:
{
youthlic.containers.forgejo = {
enable = true;
domain = "forgejo.youthlic.social";
sshPort = 2222;
httpPort = 8480;
};
networking.firewall.allowedTCPPorts = [2222];
networking.firewall.allowedTCPPorts = [ 2222 ];
services.caddy.virtualHosts = {
"forgejo.${config.youthlic.programs.caddy.baseDomain}" = {
extraConfig = ''

View file

@ -7,15 +7,22 @@
pkgs,
modulesPath,
...
}: {
}:
{
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
boot.initrd.availableKernelModules = [
"ata_piix"
"uhci_hcd"
"virtio_pci"
"sr_mod"
"virtio_blk"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -1,4 +1,5 @@
{config, ...}: {
{ config, ... }:
{
sops.secrets."miniflux" = {
};
youthlic.containers.miniflux = {

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
systemd.network = {
enable = true;
wait-online.enable = true;

View file

@ -1,5 +1,6 @@
{config, ...}: {
sops.secrets."ssh-private-key/radicle/Cape" = {};
{ config, ... }:
{
sops.secrets."ssh-private-key/radicle/Cape" = { };
youthlic.programs.radicle = {
enable = true;
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBbQrJNWcWsFncTX4w/hkhz6zPNwHrTjA+6lnq5dmu/s radicle";

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
stylix = {
enable = false;
};

View file

@ -1,4 +1,5 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
users.users.alice = {
initialHashedPassword = "$y$j9T$eS5zCi4W.4IPpf3P8Tb/o1$xhumXY1.PJKmTguNi/zlljLbLemNGiubWoUEc878S36";
isNormalUser = true;

View file

@ -4,7 +4,8 @@
inputs,
outputs,
...
}: {
}:
{
imports =
(with inputs.nixos-hardware.nixosModules; [
common-hidpi
@ -17,7 +18,7 @@
++ (with outputs; [
nixosModules.gui
])
++ [inputs.lanzaboote.nixosModules.lanzaboote]
++ [ inputs.lanzaboote.nixosModules.lanzaboote ]
++ (lib.youthlic.loadImports ./.);
youthlic = {

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
disko.devices = {
disk = {
disk1 = {

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
youthlic.gui = {
enabled = "niri";
};

View file

@ -7,15 +7,22 @@
pkgs,
modulesPath,
...
}: {
}:
{
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = ["xhci_pci" "thunderbolt" "nvme" "usb_storage" "sd_mod"];
boot.initrd.kernelModules = [];
boot.kernelModules = ["kvm-intel"];
boot.extraModulePackages = [];
boot.initrd.availableKernelModules = [
"xhci_pci"
"thunderbolt"
"nvme"
"usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -3,7 +3,8 @@
lib,
config,
...
}: {
}:
{
nixpkgs.config.cudaSupport = true;
services = {
hardware.bolt.enable = true;
@ -13,11 +14,15 @@
enableUdevRules = true;
};
};
nix = {settings = {system-features = ["gccarch-alderlake"];};};
nix = {
settings = {
system-features = [ "gccarch-alderlake" ];
};
};
hardware = {
openrazer = {
enable = true;
users = ["david"];
users = [ "david" ];
};
graphics.package = pkgs.mesa_git;
intelgpu = {
@ -35,8 +40,12 @@
};
};
boot = {
extraModulePackages = with config.boot.kernelPackages; [ddcci-driver];
kernelModules = ["ddcci" "ddcci-backlight" "i2c-dev"];
extraModulePackages = with config.boot.kernelPackages; [ ddcci-driver ];
kernelModules = [
"ddcci"
"ddcci-backlight"
"i2c-dev"
];
binfmt = {
emulatedSystems = [
"aarch64-linux"
@ -47,33 +56,38 @@
};
systemd.services."ddcci@" = {
description = "ddcci handler";
after = ["graphical.target"];
before = ["shutdown.target"];
conflicts = ["shutdown.target"];
after = [ "graphical.target" ];
before = [ "shutdown.target" ];
conflicts = [ "shutdown.target" ];
serviceConfig = {
Type = "oneshot";
ExecStart = let
script = pkgs.writeShellApplication {
name = "ddcci-handler";
runtimeInputs = with pkgs; [coreutils ddcutil];
text = ''
echo Trying to attach ddcci to "$1"
success=0
i=0
id=$(echo "$1" | cut -d "-" -f 2)
while ((success < 1)) && ((i++ < 5)); do
if ddcutil getvcp 10 -b "$id"; then
if echo ddcci 0x37 > "/sys/bus/i2c/devices/$1/new_device"; then
success=1
echo ddcci attached to "$1"
ExecStart =
let
script = pkgs.writeShellApplication {
name = "ddcci-handler";
runtimeInputs = with pkgs; [
coreutils
ddcutil
];
text = ''
echo Trying to attach ddcci to "$1"
success=0
i=0
id=$(echo "$1" | cut -d "-" -f 2)
while ((success < 1)) && ((i++ < 5)); do
if ddcutil getvcp 10 -b "$id"; then
if echo ddcci 0x37 > "/sys/bus/i2c/devices/$1/new_device"; then
success=1
echo ddcci attached to "$1"
fi
fi
fi
echo "Try $i"
sleep 1;
done
'';
};
in "${lib.getExe' script "ddcci-handler"} %i";
echo "Try $i"
sleep 1;
done
'';
};
in
"${lib.getExe' script "ddcci-handler"} %i";
};
};
services.udev.extraRules = ''

View file

@ -1,4 +1,5 @@
{...}: {
{ ... }:
{
systemd.network = {
enable = true;
wait-online.enable = false;

View file

@ -1,4 +1,5 @@
{lib, ...}: {
{ lib, ... }:
{
config.specialisation.kde = {
inheritParentConfig = true;
configuration = {

View file

@ -2,7 +2,8 @@
inputs,
lib,
...
}: let
}:
let
extraConfig = ''
output "DP-1" {
mode "2560x1440@169.900"
@ -22,11 +23,12 @@
open-on-output "DP-1"
}
'';
in {
in
{
config.specialisation.niri-hybrid = {
inheritParentConfig = true;
configuration = {
imports = [inputs.nixos-hardware.nixosModules.common-gpu-nvidia];
imports = [ inputs.nixos-hardware.nixosModules.common-gpu-nvidia ];
youthlic.gui.niri.extraConfig = lib.mkForce extraConfig;
hardware.nvidia.prime.reverseSync.enable = lib.mkForce false;
};

View file

@ -2,7 +2,8 @@
pkgs,
rootPath,
...
}: {
}:
{
stylix = {
enable = true;
image = rootPath + "/assets/wallpaper/01.png";

View file

@ -2,7 +2,8 @@
lib,
pkgs,
...
}: {
}:
{
users.users.david = {
initialHashedPassword = "$y$j9T$eS5zCi4W.4IPpf3P8Tb/o1$xhumXY1.PJKmTguNi/zlljLbLemNGiubWoUEc878S36";
isNormalUser = true;

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.containers;
in {
in
{
imports = lib.youthlic.loadImports ./.;
options = {
youthlic.containers = {

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.containers.forgejo;
in {
in
{
options = {
youthlic.containers.forgejo = {
enable = lib.mkEnableOption "forgejo container";
@ -54,62 +56,64 @@ in {
}
];
config = {lib, ...}: {
imports = [
./../programs/forgejo.nix
./../programs/postgresql.nix
];
config =
{ lib, ... }:
{
imports = [
./../programs/forgejo.nix
./../programs/postgresql.nix
];
nixpkgs.pkgs = pkgs;
nixpkgs.pkgs = pkgs;
systemd.tmpfiles.rules = [
"d /var/lib/forgejo 770 forgejo forgejo -"
"d /var/lib/postgresql 770 postgres postgres -"
];
systemd.tmpfiles.rules = [
"d /var/lib/forgejo 770 forgejo forgejo -"
"d /var/lib/postgresql 770 postgres postgres -"
];
youthlic.programs = {
forgejo = {
enable = true;
domain = cfg.domain;
sshPort = cfg.sshPort;
httpPort = cfg.httpPort;
database = {
user = "forgejo";
youthlic.programs = {
forgejo = {
enable = true;
domain = cfg.domain;
sshPort = cfg.sshPort;
httpPort = cfg.httpPort;
database = {
user = "forgejo";
};
};
postgresql = {
enable = true;
database = "forgejo";
auth_method = "peer";
version = "17";
};
};
postgresql = {
enable = true;
database = "forgejo";
auth_method = "peer";
version = "17";
};
};
systemd.services.forgejo = {
wants = ["postgresql.service"];
requires = ["postgresql.service"];
after = ["postgresql.service"];
wantedBy = ["default.target"];
};
networking = {
defaultGateway = "192.168.111.1";
firewall = {
enable = true;
allowedTCPPorts = [
cfg.httpPort
cfg.sshPort
];
allowedUDPPorts = [
cfg.httpPort
cfg.sshPort
];
systemd.services.forgejo = {
wants = [ "postgresql.service" ];
requires = [ "postgresql.service" ];
after = [ "postgresql.service" ];
wantedBy = [ "default.target" ];
};
useHostResolvConf = lib.mkForce false;
networking = {
defaultGateway = "192.168.111.1";
firewall = {
enable = true;
allowedTCPPorts = [
cfg.httpPort
cfg.sshPort
];
allowedUDPPorts = [
cfg.httpPort
cfg.sshPort
];
};
useHostResolvConf = lib.mkForce false;
};
services.resolved.enable = true;
system.stateVersion = "24.11";
};
services.resolved.enable = true;
system.stateVersion = "24.11";
};
};
};
}

View file

@ -3,9 +3,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.containers.miniflux;
in {
in
{
options = {
youthlic.containers.miniflux = {
enable = lib.mkEnableOption "miniflux container";
@ -36,55 +38,57 @@ in {
};
};
config = {lib, ...}: {
imports = [
./../programs/miniflux.nix
./../programs/postgresql.nix
];
config =
{ lib, ... }:
{
imports = [
./../programs/miniflux.nix
./../programs/postgresql.nix
];
nixpkgs.pkgs = pkgs;
nixpkgs.pkgs = pkgs;
systemd.tmpfiles.rules = [
"d /var/lib/miniflux 770 miniflux miniflux -"
"d /var/lib/postgresql 770 postgres postgres -"
"d /run/secrets 770 root miniflux -"
];
systemd.tmpfiles.rules = [
"d /var/lib/miniflux 770 miniflux miniflux -"
"d /var/lib/postgresql 770 postgres postgres -"
"d /run/secrets 770 root miniflux -"
];
youthlic.programs = {
miniflux = {
enable = true;
database = {
user = "miniflux";
youthlic.programs = {
miniflux = {
enable = true;
database = {
user = "miniflux";
};
adminCredentialsFile = cfg.adminCredentialsFile;
};
postgresql = {
enable = true;
database = "miniflux";
auth_method = "peer";
version = "17";
};
adminCredentialsFile = cfg.adminCredentialsFile;
};
postgresql = {
enable = true;
database = "miniflux";
auth_method = "peer";
version = "17";
};
};
systemd.services.miniflux = {
wants = ["postgresql.service"];
requires = ["postgresql.service"];
after = ["postgresql.service"];
wantedBy = ["default.target"];
};
networking = {
defaultGateway = "192.168.111.1";
firewall = {
enable = true;
allowedTCPPorts = [8485];
allowedUDPPorts = [8485];
systemd.services.miniflux = {
wants = [ "postgresql.service" ];
requires = [ "postgresql.service" ];
after = [ "postgresql.service" ];
wantedBy = [ "default.target" ];
};
useHostResolvConf = lib.mkForce false;
networking = {
defaultGateway = "192.168.111.1";
firewall = {
enable = true;
allowedTCPPorts = [ 8485 ];
allowedUDPPorts = [ 8485 ];
};
useHostResolvConf = lib.mkForce false;
};
services.resolved.enable = true;
system.stateVersion = "24.11";
};
services.resolved.enable = true;
system.stateVersion = "24.11";
};
};
};
}

View file

@ -1,3 +1,6 @@
{lib, ...}: {
imports = with lib; youthlic.loadImports' ./. (filter (name: !hasSuffix "/top-level" (toString name)));
{ lib, ... }:
{
imports =
with lib;
youthlic.loadImports' ./. (filter (name: !hasSuffix "/top-level" (toString name)));
}

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.users.deploy;
in {
in
{
options = {
youthlic.users.deploy = {
enable = lib.mkEnableOption "deploy";

View file

@ -6,119 +6,125 @@
}:
lib.mkMerge [
{
environment.systemPackages = with pkgs; [man-pages man-pages-posix];
environment.systemPackages = with pkgs; [
man-pages
man-pages-posix
];
documentation = {
info.enable = true;
nixos.enable = false;
dev.enable = true;
};
}
(let
inherit (pkgs.writers) writeFish;
cfg = config.documentation.man.man-db;
cachePath = "/var/cache/man/nixos";
in {
documentation.man.generateCaches = false;
(
let
inherit (pkgs.writers) writeFish;
cfg = config.documentation.man.man-db;
cachePath = "/var/cache/man/nixos";
in
{
documentation.man.generateCaches = false;
systemd.services."man-db" = {
requires = ["sysinit-reactivation.target"];
after = ["sysinit-reactivation.target"];
partOf = ["sysinit-reactivation.target"];
wantedBy = ["default.target"];
path = [
cfg.package
pkgs.gawk
];
systemd.services."man-db" = {
requires = [ "sysinit-reactivation.target" ];
after = [ "sysinit-reactivation.target" ];
partOf = [ "sysinit-reactivation.target" ];
wantedBy = [ "default.target" ];
path = [
cfg.package
pkgs.gawk
];
serviceConfig = {
Nice = 19;
IOSchedulingClass = "idle";
IOSchedulingPrioriry = 7;
ExecStart =
writeFish "mandbsvc" # fish
''
set -l SystemManLoc "/run/current-system/sw/share/man"
set -l ContentRecord "${cachePath}/man-db-state"
serviceConfig = {
Nice = 19;
IOSchedulingClass = "idle";
IOSchedulingPrioriry = 7;
ExecStart =
writeFish "mandbsvc" # fish
if [ ! -d "${cachePath}" ]
mkdir -pv "${cachePath}" || exit 1
end
''
set -l SystemManLoc "/run/current-system/sw/share/man"
set -l ContentRecord "${cachePath}/man-db-state"
if [ ! -f "$ContentRecord" ]
touch "$ContentRecord" || exit 1
end
# 1) Collect list of all manpage files and calculate hashes
# of them
#
# man1/ls.1.gz
# man3/func.3.gz
#
# hash ->
#
# bbbbbbbbbbbb (man1/ls.1.gz)
# aaaaaaaaaaaa (man3/func.3.gz)
set -l hashes "$(
find -L "$SystemManLoc" -type f -iname "*.gz" \
-exec sha256sum "{}" "+" \
| awk '{ print $1 }'
or exit 1
)"
if [ ! -d "${cachePath}" ]
mkdir -pv "${cachePath}" || exit 1
end
# 2) Sort the hashes to make them "stable",
# and then join them toghther into a big long string,
# and then hash this big string to get the hash of the directory
#
# bbbbbbbbbbbb
# aaaaaaaaaaaa
#
# sort ->
#
# aaaaaaaaaaaa
# bbbbbbbbbbbb
#
# join ->
#
# aaaaaaaaaaaabbbbbbbbbbbb
#
# hash ->
#
# cccccccccccc
set -l ultimate_hash (
echo $hashes \
| sort \
| string join "" \
| sha256sum - \
| awk '{ print $1 }'
or exit 1
)
if [ ! -f "$ContentRecord" ]
touch "$ContentRecord" || exit 1
end
# 1) Collect list of all manpage files and calculate hashes
# of them
#
# man1/ls.1.gz
# man3/func.3.gz
#
# hash ->
#
# bbbbbbbbbbbb (man1/ls.1.gz)
# aaaaaaaaaaaa (man3/func.3.gz)
set -l hashes "$(
find -L "$SystemManLoc" -type f -iname "*.gz" \
-exec sha256sum "{}" "+" \
| awk '{ print $1 }'
or exit 1
)"
set -l old_hash "$( string collect < "$ContentRecord" )"
# 2) Sort the hashes to make them "stable",
# and then join them toghther into a big long string,
# and then hash this big string to get the hash of the directory
#
# bbbbbbbbbbbb
# aaaaaaaaaaaa
#
# sort ->
#
# aaaaaaaaaaaa
# bbbbbbbbbbbb
#
# join ->
#
# aaaaaaaaaaaabbbbbbbbbbbb
#
# hash ->
#
# cccccccccccc
set -l ultimate_hash (
echo $hashes \
| sort \
| string join "" \
| sha256sum - \
| awk '{ print $1 }'
or exit 1
)
echo "Old hash: $old_hash"
echo "New hash: $ultimate_hash"
set -l old_hash "$( string collect < "$ContentRecord" )"
if [ "$old_hash" != "$ultimate_hash" ]
echo "Hash changed, do a full man-db rebuild"
mandb -psc || exit 1
echo "Write new hash"
echo "$ultimate_hash" > "$ContentRecord"
else
echo "Hash not changed, skip"
end
'';
echo "Old hash: $old_hash"
echo "New hash: $ultimate_hash"
if [ "$old_hash" != "$ultimate_hash" ]
echo "Hash changed, do a full man-db rebuild"
mandb -psc || exit 1
echo "Write new hash"
echo "$ultimate_hash" > "$ContentRecord"
else
echo "Hash not changed, skip"
end
'';
};
};
};
environment.extraSetup =
# bash
''
find "$out/share/man" \
-mindepth 1 -maxdepth 1 \
-not -name "man[1-8]" \
-exec rm -r "{}" ";"
environment.extraSetup =
# bash
''
find "$out/share/man" \
-mindepth 1 -maxdepth 1 \
-not -name "man[1-8]" \
-exec rm -r "{}" ";"
rm -r "$out/share/man/man3"
'';
})
rm -r "$out/share/man/man3"
'';
}
)
]

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.gui;
in {
in
{
config = lib.mkIf (cfg.enabled == "cosmic") {
# Enable the X11 windowing system.
# You can disable this if you're only using the Wayland session.

View file

@ -3,9 +3,11 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.gui;
in {
in
{
imports = with lib; youthlic.loadImports ./.;
options = {
youthlic.gui = {

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.gui;
in {
in
{
config = lib.mkIf (cfg.enabled == "kde") {
services = {
desktopManager.plasma6.enable = true;

View file

@ -3,9 +3,11 @@
lib,
pkgs,
...
}: let
}:
let
cfg = config.youthlic.gui;
in {
in
{
options = {
youthlic.gui.niri = {
};
@ -27,7 +29,7 @@ in {
terminal-exec = {
enable = true;
settings = {
default = ["Alacritty.desktop"];
default = [ "Alacritty.desktop" ];
};
};
mime = {
@ -59,7 +61,7 @@ in {
"firefox.desktop"
"chromium-browser.desktop"
];
"x-scheme-handler/tg" = ["telegramdesktop.desktop"];
"x-scheme-handler/tg" = [ "telegramdesktop.desktop" ];
"x-scheme-handler/unknown" = [
"firefox.desktop"
"chromium-browser.desktop"
@ -97,7 +99,11 @@ in {
programs = {
regreet = {
enable = true;
cageArgs = ["-s" "-m" "last"];
cageArgs = [
"-s"
"-m"
"last"
];
};
niri = {
enable = true;

View file

@ -2,9 +2,11 @@
config,
lib,
...
}: let
}:
let
cfg = config.youthlic.hardware;
in {
in
{
options = {
youthlic.hardware = {
asus = {

View file

@ -6,7 +6,8 @@
pkgs,
rootPath,
...
}: {
}:
{
options.youthlic.home-manager = {
enable = lib.mkOption {
type = lib.types.bool;
@ -32,17 +33,19 @@
'';
};
};
config = let
cfg = config.youthlic.home-manager;
unixName = cfg.unixName;
hostName = cfg.hostName;
in
config =
let
cfg = config.youthlic.home-manager;
unixName = cfg.unixName;
hostName = cfg.hostName;
in
lib.mkIf cfg.enable {
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
users."${cfg.unixName}" = (
{...}: {
{ ... }:
{
imports = [
outputs.homeModules."${unixName}"
(rootPath + "/home/${unixName}/configurations/${hostName}")
@ -55,7 +58,7 @@
inherit (pkgs) system;
};
backupFileExtension = "backup";
sharedModules = [outputs.homeModules.default];
sharedModules = [ outputs.homeModules.default ];
};
};
}

View file

@ -3,9 +3,11 @@
lib,
config,
...
}: let
}:
let
cfg = config.youthlic.i18n;
in {
in
{
options = {
youthlic.i18n = {
enable = lib.mkEnableOption "zh env";

View file

@ -5,18 +5,22 @@
pkgs,
lib,
...
}: {
}:
{
config = {
environment.etc =
inputs
|> lib.mapAttrs' (name: value:
|> lib.mapAttrs' (
name: value:
lib.nameValuePair "nix/inputs/${name}" {
source = value;
});
}
);
nixpkgs = {
config = {
allowUnfree = true;
allowInsecurePredicate = p:
allowInsecurePredicate =
p:
builtins.elem (lib.getName p) [
# for fluffychat and neochat
"olm"
@ -29,7 +33,7 @@
mode = "0444";
};
nix = {
nixPath = ["/etc/nix/inputs"];
nixPath = [ "/etc/nix/inputs" ];
extraOptions = ''
!include ${config.sops.secrets."access-tokens".path}
'';
@ -44,13 +48,12 @@
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
];
auto-optimise-store = lib.mkDefault true;
experimental-features =
[
"nix-command"
"flakes"
]
++ (lib.optional config.lix.enable "pipe-operator")
++ (lib.optional (!config.lix.enable) "pipe-operators");
experimental-features = [
"nix-command"
"flakes"
]
++ (lib.optional config.lix.enable "pipe-operator")
++ (lib.optional (!config.lix.enable) "pipe-operators");
warn-dirty = false;
system-features = [
"kvm"
@ -63,11 +66,13 @@
registry =
inputs
|> lib.filterAttrs (name: _value: name != "nixpkgs")
|> lib.mapAttrs (_name: value: {
flake = lib.mkForce {
outPath = value;
};
});
|> lib.mapAttrs (
_name: value: {
flake = lib.mkForce {
outPath = value;
};
}
);
};
};
}

Some files were not shown because too many files have changed in this diff Show more