README.md
README.md
+1
-1
common/desktop/core.nix
+1
-1
common/desktop/core.nix
+9
-2
common/desktop/sway.nix
+9
-2
common/desktop/sway.nix
···
17
17
mako
18
18
];
19
19
20
-
services.gnome.gnome-keyring.enable = true;
21
-
22
20
programs.sway = {
23
21
enable = true;
24
22
wrapperFeatures.gtk = true;
25
23
};
24
+
25
+
environment.sessionVariables = {
26
+
NIXOS_OZONE_WL = "1";
27
+
GTK_USE_PORTAL=0;
28
+
};
29
+
30
+
services.gvfs.enable = true;
31
+
services.gnome.gnome-keyring.enable = true;
32
+
programs.dconf.enable = true;
26
33
27
34
services.greetd = {
28
35
enable = true;
common/efi.nix
common/efi.nix
common/nvidia.nix
common/nvidia.nix
common/services.nix
common/services.nix
common/system.nix
common/system.nix
common/users.nix
common/users.nix
flake.lock
flake.lock
flake.nix
flake.nix
+19
-3
home/regent/home.nix
+19
-3
home/regent/home.nix
···
11
11
/*waybar = { doesnt work for some reason
12
12
enable = true;
13
13
};*/
14
+
ghostty.enable = true;
15
+
ghostty.flavor = "mocha";
14
16
};
17
+
18
+
programs.ghostty.enable = true;
19
+
programs.ghostty.settings = {
20
+
font-size = 24;
21
+
theme = "catppuccin-mocha";
22
+
};
23
+
24
+
home.pointerCursor = {
25
+
gtk.enable = true;
26
+
package = pkgs.phinger-cursors;
27
+
name = "Phinger-cursors-light";
28
+
size = 48;
29
+
};
15
30
16
31
programs.waybar = {
17
32
enable = true;
···
55
70
padding: 0px;
56
71
margin: 0px;
57
72
border: 0px;
58
-
background-color:rgb(0, 0, 0);
73
+
/*background-color:rgb(0, 0, 0);*/
74
+
background-color: rgba(0, 0, 0, 0.9);
59
75
color: @text;
60
76
}
61
77
62
-
window#waybar.empty {
78
+
/*window#waybar.empty {
63
79
background-color:rgba(255, 255, 255, 0);
64
-
}
80
+
}*/
65
81
66
82
#workspaces {
67
83
border-radius: 1rem;
host-secrets.nix
host-secrets.nix
hosts/buer/default.nix
hosts/buer/default.nix
hosts/buer/hardware.nix
hosts/buer/hardware.nix
hosts/buer/secrets.nix
hosts/buer/secrets.nix
+41
hosts/focalor/backup.nix
+41
hosts/focalor/backup.nix
···
1
+
# Do not modify this file! It was generated by ‘nixos-generate-config’
2
+
# and may be overwritten by future invocations. Please make changes
3
+
# to /etc/nixos/configuration.nix instead.
4
+
{ config, lib, pkgs, modulesPath, ... }:
5
+
6
+
{
7
+
imports =
8
+
[ (modulesPath + "/installer/scan/not-detected.nix")
9
+
];
10
+
11
+
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "uas" "usbhid" "sd_mod" ];
12
+
boot.initrd.kernelModules = [ ];
13
+
boot.kernelModules = [ "kvm-amd" ];
14
+
boot.extraModulePackages = [ ];
15
+
16
+
fileSystems."/" =
17
+
{ device = "/dev/disk/by-uuid/2009b305-f22d-4a5c-c49a2303232b";
18
+
fsType = "ext4";
19
+
};
20
+
21
+
fileSystems."/boot" =
22
+
{ device = "/dev/disk/by-uuid/E53C-502F";
23
+
fsType = "vfat";
24
+
options = [ "fmask=0077" "dmask=0077" ];
25
+
};
26
+
27
+
swapDevices =
28
+
[ #{ device = "/dev/disk/by-uuid/3029e270-a5f5-4a97-a29b-f2bc3e3a33a8"; }
29
+
];
30
+
31
+
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
32
+
# (the default) this is the recommended approach. When using systemd-networkd it's
33
+
# still possible to use this option, but it's recommended to use it in conjunction
34
+
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
35
+
networking.useDHCP = lib.mkDefault true;
36
+
# networking.interfaces.enp5s0.useDHCP = lib.mkDefault true;
37
+
# networking.interfaces.wlp4s0.useDHCP = lib.mkDefault true;
38
+
39
+
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
40
+
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
41
+
}
+9
hosts/focalor/default.nix
+9
hosts/focalor/default.nix
+12
-7
hosts/focalor/hardware.nix
+12
-7
hosts/focalor/hardware.nix
···
8
8
[ (modulesPath + "/installer/scan/not-detected.nix")
9
9
];
10
10
11
-
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "uas" "usbhid" "sd_mod" ];
12
-
boot.initrd.kernelModules = [ ];
11
+
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "sd_mod" ];
12
+
boot.initrd.kernelModules = [
13
+
"vfio" "vfio_iommu_type1" "vfio_pci"
14
+
"nvidia" "nvidia-modeset" "nvidia_uvm" "nvidia_drm"
15
+
];
13
16
boot.kernelModules = [ "kvm-amd" ];
17
+
boot.kernelParams = [
18
+
"amd_iommu=on"
19
+
"vfio-pci.ids=10de:2484,10de228b,1022:149c"
20
+
];
14
21
boot.extraModulePackages = [ ];
15
22
16
23
fileSystems."/" =
17
-
{ device = "/dev/disk/by-uuid/01c4129c-ace4-495a-941e-c5fa893a0bb4";
24
+
{ device = "/dev/disk/by-uuid/2009b305-f22d-4d5c-a9d3-c49a2303232b";
18
25
fsType = "ext4";
19
26
};
20
27
21
28
fileSystems."/boot" =
22
-
{ device = "/dev/disk/by-uuid/6CCE-47E4";
29
+
{ device = "/dev/disk/by-uuid/E53C-502F";
23
30
fsType = "vfat";
24
31
options = [ "fmask=0077" "dmask=0077" ];
25
32
};
26
33
27
-
swapDevices =
28
-
[ { device = "/dev/disk/by-uuid/3029e270-a5f5-4a97-a29b-f2bc3e3a33a8"; }
29
-
];
34
+
swapDevices = [ ];
30
35
31
36
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
32
37
# (the default) this is the recommended approach. When using systemd-networkd it's
hosts/focalor/secrets.nix
hosts/focalor/secrets.nix
+19
hosts/focalor/vfio.nix
+19
hosts/focalor/vfio.nix
···
1
+
programs.virt-manager.enable = true;
2
+
virtualisation.spiceUSBRedirection.enable = true;
3
+
virtualisation.libvirtd = {
4
+
enable = true;
5
+
qemu = {
6
+
package = pkgs.qemu_kvm;
7
+
runAsRoot = true;
8
+
swtpm.enable = true;
9
+
ovmf = {
10
+
enable = true;
11
+
packages = [(pkgs.OVMF.override {
12
+
secureBoot = true;
13
+
tpmSupport = true;
14
+
}).fd];
15
+
};
16
+
};
17
+
};
18
+
19
+
users.extraUsers.regent.extraGroups = [ "libvirtd" ];
hosts/morax/default.nix
hosts/morax/default.nix
hosts/morax/hardware.nix
hosts/morax/hardware.nix
hosts/morax/secrets.nix
hosts/morax/secrets.nix
hosts/valefar/default.nix
hosts/valefar/default.nix
hosts/valefar/hardware.nix
hosts/valefar/hardware.nix
hosts/valefar/secrets.nix
hosts/valefar/secrets.nix
modules/caddy/default.nix
modules/caddy/default.nix
modules/forgejo/default.nix
modules/forgejo/default.nix
modules/garage/default.nix
modules/garage/default.nix
modules/github-runners/default.nix
modules/github-runners/default.nix
secrets/build-token.age
secrets/build-token.age
secrets/garage-admin-token.age
secrets/garage-admin-token.age
secrets/garage-metrics-token.age
secrets/garage-metrics-token.age
secrets/garage-rpc-secret.age
secrets/garage-rpc-secret.age
secrets/secrets.nix
secrets/secrets.nix