NixOS configuration 🪄

Compare changes

Choose any two refs to compare.

assets/wallpaper/catppuccin-cat.png

This is a binary file and will not be displayed.

+270 -431
flake.lock
··· 9 9 "rust-overlay": "rust-overlay" 10 10 }, 11 11 "locked": { 12 - "lastModified": 1762188647, 13 - "narHash": "sha256-OAXK4p7WIYUcp8xx9m0RZUpV6XUDEhkoM4efI8dzPiU=", 12 + "lastModified": 1767520119, 13 + "narHash": "sha256-+OmNQLA9Fv5WBaxYHlPghS9XmnYWDaLt+AatCGhG+hc=", 14 14 "owner": "ezKEa", 15 15 "repo": "aagl-gtk-on-nix", 16 - "rev": "1172be1377bc65581004f4d5927b58c5c7d96639", 16 + "rev": "5720d3282844b6b23b26dfac075a5f1f58ea8844", 17 17 "type": "github" 18 18 }, 19 19 "original": { ··· 48 48 "systems": "systems" 49 49 }, 50 50 "locked": { 51 - "lastModified": 1761656077, 52 - "narHash": "sha256-lsNWuj4Z+pE7s0bd2OKicOFq9bK86JE0ZGeKJbNqb94=", 51 + "lastModified": 1762618334, 52 + "narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=", 53 53 "owner": "ryantm", 54 54 "repo": "agenix", 55 - "rev": "9ba0d85de3eaa7afeab493fed622008b6e4924f5", 55 + "rev": "fcdea223397448d35d9b31f798479227e80183f6", 56 56 "type": "github" 57 57 }, 58 58 "original": { ··· 85 85 "type": "github" 86 86 } 87 87 }, 88 - "base16": { 89 - "inputs": { 90 - "fromYaml": "fromYaml" 91 - }, 92 - "locked": { 93 - "lastModified": 1755819240, 94 - "narHash": "sha256-qcMhnL7aGAuFuutH4rq9fvAhCpJWVHLcHVZLtPctPlo=", 95 - "owner": "SenchoPens", 96 - "repo": "base16.nix", 97 - "rev": "75ed5e5e3fce37df22e49125181fa37899c3ccd6", 98 - "type": "github" 99 - }, 100 - "original": { 101 - "owner": "SenchoPens", 102 - "repo": "base16.nix", 103 - "type": "github" 104 - } 105 - }, 106 - "base16-fish": { 107 - "flake": false, 108 - "locked": { 109 - "lastModified": 1754405784, 110 - "narHash": "sha256-l9xHIy+85FN+bEo6yquq2IjD1rSg9fjfjpyGP1W8YXo=", 111 - "owner": "tomyun", 112 - "repo": "base16-fish", 113 - "rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561", 114 - "type": "github" 115 - }, 116 - "original": { 117 - "owner": "tomyun", 118 - "repo": "base16-fish", 119 - "rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561", 120 - "type": "github" 121 - } 122 - }, 123 - "base16-helix": { 124 - "flake": false, 125 - "locked": { 126 - "lastModified": 1752979451, 127 - "narHash": "sha256-0CQM+FkYy0fOO/sMGhOoNL80ftsAzYCg9VhIrodqusM=", 128 - "owner": "tinted-theming", 129 - "repo": "base16-helix", 130 - "rev": "27cf1e66e50abc622fb76a3019012dc07c678fac", 131 - "type": "github" 132 - }, 133 - "original": { 134 - "owner": "tinted-theming", 135 - "repo": "base16-helix", 136 - "type": "github" 137 - } 138 - }, 139 - "base16-vim": { 140 - "flake": false, 141 - "locked": { 142 - "lastModified": 1732806396, 143 - "narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=", 144 - "owner": "tinted-theming", 145 - "repo": "base16-vim", 146 - "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", 147 - "type": "github" 148 - }, 149 - "original": { 150 - "owner": "tinted-theming", 151 - "repo": "base16-vim", 152 - "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", 153 - "type": "github" 154 - } 155 - }, 156 88 "cachix": { 157 89 "inputs": { 158 90 "devenv": [ ··· 189 121 "type": "github" 190 122 } 191 123 }, 124 + "catppuccin": { 125 + "inputs": { 126 + "nixpkgs": "nixpkgs_2" 127 + }, 128 + "locked": { 129 + "lastModified": 1767720192, 130 + "narHash": "sha256-gA2dpQr/REM9D4SUdMwioAATnXmOZz/eVIladxEISRA=", 131 + "owner": "catppuccin", 132 + "repo": "nix", 133 + "rev": "bbda4b492ba33c1ca04385792c93dda1a3a28f64", 134 + "type": "github" 135 + }, 136 + "original": { 137 + "owner": "catppuccin", 138 + "repo": "nix", 139 + "type": "github" 140 + } 141 + }, 192 142 "darwin": { 193 143 "inputs": { 194 144 "nixpkgs": [ ··· 215 165 "inputs": { 216 166 "cachix": "cachix", 217 167 "flake-compat": "flake-compat_6", 218 - "flake-parts": "flake-parts_7", 168 + "flake-parts": "flake-parts_6", 219 169 "git-hooks": "git-hooks", 220 170 "nix": "nix", 221 - "nixpkgs": "nixpkgs_6" 171 + "nixpkgs": "nixpkgs_9" 222 172 }, 223 173 "locked": { 224 174 "lastModified": 1760162706, ··· 270 220 "type": "github" 271 221 } 272 222 }, 273 - "firefox-gnome-theme": { 274 - "flake": false, 275 - "locked": { 276 - "lastModified": 1758112371, 277 - "narHash": "sha256-lizRM2pj6PHrR25yimjyFn04OS4wcdbc38DCdBVa2rk=", 278 - "owner": "rafaelmardojai", 279 - "repo": "firefox-gnome-theme", 280 - "rev": "0909cfe4a2af8d358ad13b20246a350e14c2473d", 281 - "type": "github" 282 - }, 283 - "original": { 284 - "owner": "rafaelmardojai", 285 - "repo": "firefox-gnome-theme", 286 - "type": "github" 287 - } 288 - }, 289 223 "flake-compat": { 290 224 "flake": false, 291 225 "locked": { ··· 341 275 "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", 342 276 "revCount": 69, 343 277 "type": "tarball", 344 - "url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz?rev=ff81ac966bb2cae68946d5ed5fc4994f96d0ffec&revCount=69" 278 + "url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz" 345 279 }, 346 280 "original": { 347 281 "type": "tarball", ··· 406 340 ] 407 341 }, 408 342 "locked": { 409 - "lastModified": 1762040540, 410 - "narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=", 343 + "lastModified": 1767609335, 344 + "narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=", 411 345 "owner": "hercules-ci", 412 346 "repo": "flake-parts", 413 - "rev": "0010412d62a25d959151790968765a70c436598b", 347 + "rev": "250481aafeb741edfe23d29195671c19b36b6dca", 414 348 "type": "github" 415 349 }, 416 350 "original": { ··· 424 358 "nixpkgs-lib": "nixpkgs-lib" 425 359 }, 426 360 "locked": { 427 - "lastModified": 1762040540, 428 - "narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=", 361 + "lastModified": 1765835352, 362 + "narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=", 429 363 "owner": "hercules-ci", 430 364 "repo": "flake-parts", 431 - "rev": "0010412d62a25d959151790968765a70c436598b", 365 + "rev": "a34fae9c08a15ad73f295041fec82323541400a9", 432 366 "type": "github" 433 367 }, 434 368 "original": { ··· 442 376 "nixpkgs-lib": "nixpkgs-lib_2" 443 377 }, 444 378 "locked": { 445 - "lastModified": 1754091436, 446 - "narHash": "sha256-XKqDMN1/Qj1DKivQvscI4vmHfDfvYR2pfuFOJiCeewM=", 379 + "lastModified": 1765835352, 380 + "narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=", 447 381 "owner": "hercules-ci", 448 382 "repo": "flake-parts", 449 - "rev": "67df8c627c2c39c41dbec76a1f201929929ab0bd", 383 + "rev": "a34fae9c08a15ad73f295041fec82323541400a9", 450 384 "type": "github" 451 385 }, 452 386 "original": { ··· 463 397 ] 464 398 }, 465 399 "locked": { 466 - "lastModified": 1760948891, 467 - "narHash": "sha256-TmWcdiUUaWk8J4lpjzu4gCGxWY6/Ok7mOK4fIFfBuU4=", 400 + "lastModified": 1765835352, 401 + "narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=", 468 402 "owner": "hercules-ci", 469 403 "repo": "flake-parts", 470 - "rev": "864599284fc7c0ba6357ed89ed5e2cd5040f0c04", 404 + "rev": "a34fae9c08a15ad73f295041fec82323541400a9", 471 405 "type": "github" 472 406 }, 473 407 "original": { ··· 479 413 "flake-parts_6": { 480 414 "inputs": { 481 415 "nixpkgs-lib": [ 482 - "stylix", 483 - "nixpkgs" 484 - ] 485 - }, 486 - "locked": { 487 - "lastModified": 1756770412, 488 - "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=", 489 - "owner": "hercules-ci", 490 - "repo": "flake-parts", 491 - "rev": "4524271976b625a4a605beefd893f270620fd751", 492 - "type": "github" 493 - }, 494 - "original": { 495 - "owner": "hercules-ci", 496 - "repo": "flake-parts", 497 - "type": "github" 498 - } 499 - }, 500 - "flake-parts_7": { 501 - "inputs": { 502 - "nixpkgs-lib": [ 503 416 "tidaLuna", 504 417 "devenv", 505 418 "nixpkgs" ··· 519 432 "type": "github" 520 433 } 521 434 }, 522 - "flake-parts_8": { 435 + "flake-parts_7": { 523 436 "inputs": { 524 437 "nixpkgs-lib": "nixpkgs-lib_3" 525 438 }, ··· 556 469 }, 557 470 "flake-utils_2": { 558 471 "inputs": { 559 - "systems": "systems_6" 472 + "systems": "systems_3" 560 473 }, 561 474 "locked": { 562 - "lastModified": 1694529238, 563 - "narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=", 475 + "lastModified": 1731533236, 476 + "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", 564 477 "owner": "numtide", 565 478 "repo": "flake-utils", 566 - "rev": "ff7b65b44d01cf9ba6a71320833626af21126384", 479 + "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", 567 480 "type": "github" 568 481 }, 569 482 "original": { ··· 574 487 }, 575 488 "flake-utils_3": { 576 489 "inputs": { 577 - "systems": "systems_8" 490 + "systems": "systems_6" 578 491 }, 579 492 "locked": { 580 493 "lastModified": 1731533236, ··· 587 500 "original": { 588 501 "owner": "numtide", 589 502 "repo": "flake-utils", 590 - "type": "github" 591 - } 592 - }, 593 - "fromYaml": { 594 - "flake": false, 595 - "locked": { 596 - "lastModified": 1731966426, 597 - "narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=", 598 - "owner": "SenchoPens", 599 - "repo": "fromYaml", 600 - "rev": "106af9e2f715e2d828df706c386a685698f3223b", 601 - "type": "github" 602 - }, 603 - "original": { 604 - "owner": "SenchoPens", 605 - "repo": "fromYaml", 606 503 "type": "github" 607 504 } 608 505 }, ··· 679 576 "type": "github" 680 577 } 681 578 }, 682 - "gnome-shell": { 683 - "flake": false, 684 - "locked": { 685 - "lastModified": 1748186689, 686 - "narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=", 687 - "owner": "GNOME", 688 - "repo": "gnome-shell", 689 - "rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0", 690 - "type": "github" 691 - }, 692 - "original": { 693 - "owner": "GNOME", 694 - "ref": "48.2", 695 - "repo": "gnome-shell", 696 - "type": "github" 697 - } 698 - }, 699 579 "gomod2nix": { 700 580 "inputs": { 701 - "flake-utils": "flake-utils_2", 581 + "flake-utils": "flake-utils_3", 702 582 "nixpkgs": [ 703 583 "tangled", 704 584 "nixpkgs" 705 585 ] 706 586 }, 707 587 "locked": { 708 - "lastModified": 1754078208, 709 - "narHash": "sha256-YVoIFDCDpYuU3riaDEJ3xiGdPOtsx4sR5eTzHTytPV8=", 588 + "lastModified": 1763982521, 589 + "narHash": "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ=", 710 590 "owner": "nix-community", 711 591 "repo": "gomod2nix", 712 - "rev": "7f963246a71626c7fc70b431a315c4388a0c95cf", 592 + "rev": "02e63a239d6eabd595db56852535992c898eba72", 713 593 "type": "github" 714 594 }, 715 595 "original": { ··· 741 621 }, 742 622 "home-manager_2": { 743 623 "inputs": { 744 - "nixpkgs": "nixpkgs_2" 624 + "nixpkgs": "nixpkgs_3" 745 625 }, 746 626 "locked": { 747 - "lastModified": 1762296971, 748 - "narHash": "sha256-Jyv3L5rrUYpecON+9zyFz2VqgTSTsIG35fXuCyuCQv0=", 627 + "lastModified": 1767702900, 628 + "narHash": "sha256-xMzHmNytl7JgFRov2jHf2GYsLVp/sAfYO0JvbZt0uDo=", 749 629 "owner": "nix-community", 750 630 "repo": "home-manager", 751 - "rev": "34fe48801d2a5301b814eaa1efb496499d06cebc", 631 + "rev": "38e187fd2f9efac197e03be0c25f3ee215974144", 752 632 "type": "github" 753 633 }, 754 634 "original": { ··· 823 703 "url": "https://github.com/rsms/inter/releases/download/v4.1/Inter-4.1.zip" 824 704 } 825 705 }, 826 - "ixx": { 827 - "inputs": { 828 - "flake-utils": [ 829 - "nixvim", 830 - "nuschtosSearch", 831 - "flake-utils" 832 - ], 833 - "nixpkgs": [ 834 - "nixvim", 835 - "nuschtosSearch", 836 - "nixpkgs" 837 - ] 838 - }, 839 - "locked": { 840 - "lastModified": 1754860581, 841 - "narHash": "sha256-EM0IE63OHxXCOpDHXaTyHIOk2cNvMCGPqLt/IdtVxgk=", 842 - "owner": "NuschtOS", 843 - "repo": "ixx", 844 - "rev": "babfe85a876162c4acc9ab6fb4483df88fa1f281", 845 - "type": "github" 846 - }, 847 - "original": { 848 - "owner": "NuschtOS", 849 - "ref": "v0.1.1", 850 - "repo": "ixx", 851 - "type": "github" 852 - } 853 - }, 854 706 "lix": { 855 707 "inputs": { 856 708 "flake-compat": "flake-compat_3", ··· 863 715 "pre-commit-hooks": "pre-commit-hooks_2" 864 716 }, 865 717 "locked": { 866 - "lastModified": 1762212942, 867 - "narHash": "sha256-DTwYxw0oiJfe6FtdJ+6KbqQeKUoV9E0nEUUwtwcF42U=", 868 - "rev": "f369c711dd8bd6eec6905645dab9a153ebbba0a8", 718 + "lastModified": 1767713749, 719 + "narHash": "sha256-56x//7ognPbg9wNs7zJTwT7PjNR992PyYbIUQA4dHoc=", 720 + "rev": "b97b2e858babef00faa46fa557d9afe9e089a12a", 869 721 "type": "tarball", 870 - "url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/f369c711dd8bd6eec6905645dab9a153ebbba0a8.tar.gz?rev=f369c711dd8bd6eec6905645dab9a153ebbba0a8" 722 + "url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/b97b2e858babef00faa46fa557d9afe9e089a12a.tar.gz?rev=b97b2e858babef00faa46fa557d9afe9e089a12a" 871 723 }, 872 724 "original": { 873 725 "type": "tarball", ··· 957 809 ] 958 810 }, 959 811 "locked": { 960 - "lastModified": 1762307771, 961 - "narHash": "sha256-IJWQ1NlFRATSrGa5eZdg9kQynDJOwT6WAY/P5KHAMBc=", 812 + "lastModified": 1767579768, 813 + "narHash": "sha256-MDyl7tiem57OAOcPuCJrONh1PCcKj5OzJEesBrka3dk=", 962 814 "owner": "fufexan", 963 815 "repo": "nix-gaming", 964 - "rev": "4e3340a53ea9f6b79168050a3e4b9c3944ff158e", 816 + "rev": "4199abcbc86b52e6878d1021da61c4e8e308e00e", 965 817 "type": "github" 966 818 }, 967 819 "original": { ··· 970 822 "type": "github" 971 823 } 972 824 }, 825 + "nix-jetbrains-plugins": { 826 + "inputs": { 827 + "flake-utils": "flake-utils", 828 + "nix-rust-wrangler": "nix-rust-wrangler", 829 + "nixpkgs": "nixpkgs_5", 830 + "rust-overlay": "rust-overlay_3" 831 + }, 832 + "locked": { 833 + "lastModified": 1767845296, 834 + "narHash": "sha256-o2EXCxnfi0WgCq3Mbmcn4aNwcXxfHV6/idZO+VFNIjY=", 835 + "owner": "Janrupf", 836 + "repo": "nix-jetbrains-plugin-repository", 837 + "rev": "09765ba1158410cb098880161f06b8e2607c8bef", 838 + "type": "github" 839 + }, 840 + "original": { 841 + "owner": "Janrupf", 842 + "repo": "nix-jetbrains-plugin-repository", 843 + "type": "github" 844 + } 845 + }, 846 + "nix-rust-wrangler": { 847 + "inputs": { 848 + "flake-utils": "flake-utils_2", 849 + "nixpkgs": [ 850 + "nix-jetbrains-plugins", 851 + "nixpkgs" 852 + ], 853 + "rust-overlay": "rust-overlay_2" 854 + }, 855 + "locked": { 856 + "lastModified": 1764906652, 857 + "narHash": "sha256-4eY+9dKYhTWx1X7AGVNfwxNlruR0Pjx16Anrm6ifnVo=", 858 + "owner": "Janrupf", 859 + "repo": "nix-rust-wrangler", 860 + "rev": "ab6b5ea4d654a05fea9e1ea53359a9be16777800", 861 + "type": "github" 862 + }, 863 + "original": { 864 + "owner": "Janrupf", 865 + "repo": "nix-rust-wrangler", 866 + "type": "github" 867 + } 868 + }, 973 869 "nix2container": { 974 870 "flake": false, 975 871 "locked": { ··· 993 889 "flake-compat" 994 890 ], 995 891 "lowdown-src": "lowdown-src", 996 - "nixpkgs": "nixpkgs_3", 892 + "nixpkgs": "nixpkgs_4", 997 893 "nixpkgs-regression": [ 998 894 "lix", 999 895 "nixpkgs-regression" ··· 1023 919 ] 1024 920 }, 1025 921 "locked": { 1026 - "lastModified": 1758701706, 1027 - "narHash": "sha256-aEwPAnMQ/FIisvGswjm9T+QkIptuXDzeUo8vxTTX/Io=", 1028 - "owner": "xaiyadev", 922 + "lastModified": 1767715368, 923 + "narHash": "sha256-3JkfCB4MwVMLlC8N/ATth3saUF9kD1WQiIF/quDpvNo=", 924 + "owner": "KaylorBen", 1029 925 "repo": "nixcord", 1030 - "rev": "418e383f8dc3a47b60e3ea16b06c7671b0e65ec2", 926 + "rev": "f391c270ad2c74a94d99cbc9ad6a57478111c6de", 1031 927 "type": "github" 1032 928 }, 1033 929 "original": { 1034 - "owner": "xaiyadev", 1035 - "ref": "fix/user-cfg-no-option", 930 + "owner": "KaylorBen", 1036 931 "repo": "nixcord", 1037 932 "type": "github" 1038 933 } 1039 934 }, 1040 935 "nixos-hardware": { 1041 936 "locked": { 1042 - "lastModified": 1762336257, 1043 - "narHash": "sha256-2u5rstcMTqpAr4UF+exs5WGOT62VJRb4yauR6JJHJXs=", 937 + "lastModified": 1767185284, 938 + "narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=", 1044 939 "owner": "NixOS", 1045 940 "repo": "nixos-hardware", 1046 - "rev": "d48e8f0e1691e0200a675c13df7c85e275090a15", 941 + "rev": "40b1a28dce561bea34858287fbb23052c3ee63fe", 1047 942 "type": "github" 1048 943 }, 1049 944 "original": { ··· 1071 966 }, 1072 967 "nixpkgs-lib": { 1073 968 "locked": { 1074 - "lastModified": 1761765539, 1075 - "narHash": "sha256-b0yj6kfvO8ApcSE+QmA6mUfu8IYG6/uU28OFn4PaC8M=", 969 + "lastModified": 1765674936, 970 + "narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=", 1076 971 "owner": "nix-community", 1077 972 "repo": "nixpkgs.lib", 1078 - "rev": "719359f4562934ae99f5443f20aa06c2ffff91fc", 973 + "rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85", 1079 974 "type": "github" 1080 975 }, 1081 976 "original": { ··· 1086 981 }, 1087 982 "nixpkgs-lib_2": { 1088 983 "locked": { 1089 - "lastModified": 1753579242, 1090 - "narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=", 984 + "lastModified": 1765674936, 985 + "narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=", 1091 986 "owner": "nix-community", 1092 987 "repo": "nixpkgs.lib", 1093 - "rev": "0f36c44e01a6129be94e3ade315a5883f0228a6e", 988 + "rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85", 1094 989 "type": "github" 1095 990 }, 1096 991 "original": { ··· 1130 1025 "type": "github" 1131 1026 } 1132 1027 }, 1028 + "nixpkgs_10": { 1029 + "locked": { 1030 + "lastModified": 1760103332, 1031 + "narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=", 1032 + "owner": "NixOS", 1033 + "repo": "nixpkgs", 1034 + "rev": "870493f9a8cb0b074ae5b411b2f232015db19a65", 1035 + "type": "github" 1036 + }, 1037 + "original": { 1038 + "owner": "NixOS", 1039 + "ref": "nixpkgs-unstable", 1040 + "repo": "nixpkgs", 1041 + "type": "github" 1042 + } 1043 + }, 1133 1044 "nixpkgs_2": { 1134 1045 "locked": { 1135 - "lastModified": 1761907660, 1136 - "narHash": "sha256-kJ8lIZsiPOmbkJypG+B5sReDXSD1KGu2VEPNqhRa/ew=", 1046 + "lastModified": 1767116409, 1047 + "narHash": "sha256-5vKw92l1GyTnjoLzEagJy5V5mDFck72LiQWZSOnSicw=", 1137 1048 "owner": "NixOS", 1138 1049 "repo": "nixpkgs", 1139 - "rev": "2fb006b87f04c4d3bdf08cfdbc7fab9c13d94a15", 1050 + "rev": "cad22e7d996aea55ecab064e84834289143e44a0", 1140 1051 "type": "github" 1141 1052 }, 1142 1053 "original": { ··· 1148 1059 }, 1149 1060 "nixpkgs_3": { 1150 1061 "locked": { 1151 - "lastModified": 1705033721, 1152 - "narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=", 1062 + "lastModified": 1766902085, 1063 + "narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=", 1153 1064 "owner": "NixOS", 1154 1065 "repo": "nixpkgs", 1155 - "rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea", 1066 + "rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4", 1156 1067 "type": "github" 1157 1068 }, 1158 1069 "original": { 1159 1070 "owner": "NixOS", 1160 - "ref": "nixos-23.05-small", 1071 + "ref": "nixos-unstable", 1161 1072 "repo": "nixpkgs", 1162 1073 "type": "github" 1163 1074 } 1164 1075 }, 1165 1076 "nixpkgs_4": { 1166 1077 "locked": { 1167 - "lastModified": 1762111121, 1168 - "narHash": "sha256-4vhDuZ7OZaZmKKrnDpxLZZpGIJvAeMtK6FKLJYUtAdw=", 1078 + "lastModified": 1705033721, 1079 + "narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=", 1169 1080 "owner": "NixOS", 1170 1081 "repo": "nixpkgs", 1171 - "rev": "b3d51a0365f6695e7dd5cdf3e180604530ed33b4", 1082 + "rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea", 1172 1083 "type": "github" 1173 1084 }, 1174 1085 "original": { 1175 1086 "owner": "NixOS", 1176 - "ref": "nixos-unstable", 1087 + "ref": "nixos-23.05-small", 1177 1088 "repo": "nixpkgs", 1178 1089 "type": "github" 1179 1090 } 1180 1091 }, 1181 1092 "nixpkgs_5": { 1182 1093 "locked": { 1183 - "lastModified": 1761656231, 1184 - "narHash": "sha256-EiED5k6gXTWoAIS8yQqi5mAX6ojnzpHwAQTS3ykeYMg=", 1094 + "lastModified": 1765472234, 1095 + "narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=", 1185 1096 "owner": "NixOS", 1186 1097 "repo": "nixpkgs", 1187 - "rev": "e99366c665bdd53b7b500ccdc5226675cfc51f45", 1098 + "rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b", 1188 1099 "type": "github" 1189 1100 }, 1190 1101 "original": { 1191 1102 "owner": "NixOS", 1192 - "ref": "nixpkgs-unstable", 1103 + "ref": "nixos-unstable", 1193 1104 "repo": "nixpkgs", 1194 1105 "type": "github" 1195 1106 } 1196 1107 }, 1197 1108 "nixpkgs_6": { 1198 1109 "locked": { 1199 - "lastModified": 1758532697, 1200 - "narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=", 1201 - "owner": "cachix", 1202 - "repo": "devenv-nixpkgs", 1203 - "rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f", 1110 + "lastModified": 1767640445, 1111 + "narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=", 1112 + "owner": "NixOS", 1113 + "repo": "nixpkgs", 1114 + "rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5", 1204 1115 "type": "github" 1205 1116 }, 1206 1117 "original": { 1207 - "owner": "cachix", 1208 - "ref": "rolling", 1209 - "repo": "devenv-nixpkgs", 1118 + "owner": "NixOS", 1119 + "ref": "nixos-unstable", 1120 + "repo": "nixpkgs", 1210 1121 "type": "github" 1211 1122 } 1212 1123 }, 1213 1124 "nixpkgs_7": { 1214 1125 "locked": { 1215 - "lastModified": 1760103332, 1216 - "narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=", 1126 + "lastModified": 1767026758, 1127 + "narHash": "sha256-7fsac/f7nh/VaKJ/qm3I338+wAJa/3J57cOGpXi0Sbg=", 1217 1128 "owner": "NixOS", 1218 1129 "repo": "nixpkgs", 1219 - "rev": "870493f9a8cb0b074ae5b411b2f232015db19a65", 1130 + "rev": "346dd96ad74dc4457a9db9de4f4f57dab2e5731d", 1220 1131 "type": "github" 1221 1132 }, 1222 1133 "original": { ··· 1226 1137 "type": "github" 1227 1138 } 1228 1139 }, 1229 - "nixvim": { 1230 - "inputs": { 1231 - "flake-parts": "flake-parts_5", 1232 - "nixpkgs": "nixpkgs_5", 1233 - "nuschtosSearch": "nuschtosSearch", 1234 - "systems": "systems_3" 1235 - }, 1140 + "nixpkgs_8": { 1236 1141 "locked": { 1237 - "lastModified": 1762293638, 1238 - "narHash": "sha256-svsYLbxNq8EZoVtNF97wCAElZ2py5Q1p7viG6lTUixA=", 1239 - "owner": "nix-community", 1240 - "repo": "nixvim", 1241 - "rev": "aa3a1dfb028cd09b8061862f9dd8d859467fc7ed", 1242 - "type": "github" 1142 + "lastModified": 1767364772, 1143 + "narHash": "sha256-G6ie+qOCRSV7wzOY+6L1o8GvcH1qDcE/DTzDT4CRdNw=", 1144 + "rev": "16c7794d0a28b5a37904d55bcca36003b9109aaa", 1145 + "type": "tarball", 1146 + "url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre921317.16c7794d0a28/nixexprs.tar.xz?lastModified=1767364772&rev=16c7794d0a28b5a37904d55bcca36003b9109aaa" 1243 1147 }, 1244 1148 "original": { 1245 - "owner": "nix-community", 1246 - "repo": "nixvim", 1247 - "type": "github" 1149 + "type": "tarball", 1150 + "url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz" 1248 1151 } 1249 1152 }, 1250 - "nur": { 1251 - "inputs": { 1252 - "flake-parts": [ 1253 - "stylix", 1254 - "flake-parts" 1255 - ], 1256 - "nixpkgs": [ 1257 - "stylix", 1258 - "nixpkgs" 1259 - ] 1260 - }, 1153 + "nixpkgs_9": { 1261 1154 "locked": { 1262 - "lastModified": 1758998580, 1263 - "narHash": "sha256-VLx0z396gDCGSiowLMFz5XRO/XuNV+4EnDYjdJhHvUk=", 1264 - "owner": "nix-community", 1265 - "repo": "NUR", 1266 - "rev": "ba8d9c98f5f4630bcb0e815ab456afd90c930728", 1155 + "lastModified": 1758532697, 1156 + "narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=", 1157 + "owner": "cachix", 1158 + "repo": "devenv-nixpkgs", 1159 + "rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f", 1267 1160 "type": "github" 1268 1161 }, 1269 1162 "original": { 1270 - "owner": "nix-community", 1271 - "repo": "NUR", 1163 + "owner": "cachix", 1164 + "ref": "rolling", 1165 + "repo": "devenv-nixpkgs", 1272 1166 "type": "github" 1273 1167 } 1274 1168 }, 1275 - "nuschtosSearch": { 1169 + "nixvim": { 1276 1170 "inputs": { 1277 - "flake-utils": "flake-utils", 1278 - "ixx": "ixx", 1279 - "nixpkgs": [ 1280 - "nixvim", 1281 - "nixpkgs" 1282 - ] 1171 + "flake-parts": "flake-parts_5", 1172 + "nixpkgs": "nixpkgs_7", 1173 + "systems": "systems_4" 1283 1174 }, 1284 1175 "locked": { 1285 - "lastModified": 1761730856, 1286 - "narHash": "sha256-t1i5p/vSWwueZSC0Z2BImxx3BjoUDNKyC2mk24krcMY=", 1287 - "owner": "NuschtOS", 1288 - "repo": "search", 1289 - "rev": "e29de6db0cb3182e9aee75a3b1fd1919d995d85b", 1176 + "lastModified": 1767608728, 1177 + "narHash": "sha256-kmSJCTgrx+BxgqQOTPHAOkohvO+lbRsPWqu+PSPcz3I=", 1178 + "owner": "nix-community", 1179 + "repo": "nixvim", 1180 + "rev": "851399eebd0fb383d2fd76269d859f16021dc7a8", 1290 1181 "type": "github" 1291 1182 }, 1292 1183 "original": { 1293 - "owner": "NuschtOS", 1294 - "repo": "search", 1184 + "owner": "nix-community", 1185 + "repo": "nixvim", 1295 1186 "type": "github" 1296 1187 } 1297 1188 }, ··· 1339 1230 "aagl": "aagl", 1340 1231 "agenix": "agenix", 1341 1232 "agenix-rekey": "agenix-rekey", 1233 + "catppuccin": "catppuccin", 1342 1234 "easy-hosts": "easy-hosts", 1343 1235 "flake-parts": "flake-parts_2", 1344 1236 "home-manager": "home-manager_2", 1345 1237 "lix": "lix", 1346 1238 "nix-gaming": "nix-gaming", 1239 + "nix-jetbrains-plugins": "nix-jetbrains-plugins", 1347 1240 "nixcord": "nixcord", 1348 1241 "nixos-hardware": "nixos-hardware", 1349 - "nixpkgs": "nixpkgs_4", 1242 + "nixpkgs": "nixpkgs_6", 1350 1243 "nixvim": "nixvim", 1351 - "stylix": "stylix", 1352 1244 "systems": "systems_5", 1353 1245 "tangled": "tangled", 1246 + "tgirlpkgs": "tgirlpkgs", 1354 1247 "tidaLuna": "tidaLuna", 1355 1248 "tinted-theming-schemes": "tinted-theming-schemes", 1356 1249 "vicinae": "vicinae" ··· 1361 1254 "nixpkgs": "nixpkgs" 1362 1255 }, 1363 1256 "locked": { 1364 - "lastModified": 1761791894, 1365 - "narHash": "sha256-myRIDh+PxaREz+z9LzbqBJF+SnTFJwkthKDX9zMyddY=", 1257 + "lastModified": 1764470739, 1258 + "narHash": "sha256-sa9f81B1dWO16QtgDTWHX8DQbiHKzHndpaunY5EQtwE=", 1366 1259 "owner": "oxalica", 1367 1260 "repo": "rust-overlay", 1368 - "rev": "59c45eb69d9222a4362673141e00ff77842cd219", 1261 + "rev": "3bfa664055e1a09c6aedab5533c5fc8d6ca5741a", 1369 1262 "type": "github" 1370 1263 }, 1371 1264 "original": { ··· 1374 1267 "type": "github" 1375 1268 } 1376 1269 }, 1377 - "sqlite-lib-src": { 1378 - "flake": false, 1270 + "rust-overlay_2": { 1271 + "inputs": { 1272 + "nixpkgs": [ 1273 + "nix-jetbrains-plugins", 1274 + "nix-rust-wrangler", 1275 + "nixpkgs" 1276 + ] 1277 + }, 1379 1278 "locked": { 1380 - "lastModified": 1706631843, 1381 - "narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=", 1382 - "type": "tarball", 1383 - "url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip" 1279 + "lastModified": 1764902447, 1280 + "narHash": "sha256-wNqkDBj+tjK619sTHPEA7uhjr7DHHEY8OsFou31dxy0=", 1281 + "owner": "oxalica", 1282 + "repo": "rust-overlay", 1283 + "rev": "d914a744a83098eeb28125d2848ad383b209223f", 1284 + "type": "github" 1384 1285 }, 1385 1286 "original": { 1386 - "type": "tarball", 1387 - "url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip" 1287 + "owner": "oxalica", 1288 + "repo": "rust-overlay", 1289 + "type": "github" 1388 1290 } 1389 1291 }, 1390 - "stylix": { 1292 + "rust-overlay_3": { 1391 1293 "inputs": { 1392 - "base16": "base16", 1393 - "base16-fish": "base16-fish", 1394 - "base16-helix": "base16-helix", 1395 - "base16-vim": "base16-vim", 1396 - "firefox-gnome-theme": "firefox-gnome-theme", 1397 - "flake-parts": "flake-parts_6", 1398 - "gnome-shell": "gnome-shell", 1399 1294 "nixpkgs": [ 1295 + "nix-jetbrains-plugins", 1400 1296 "nixpkgs" 1401 - ], 1402 - "nur": "nur", 1403 - "systems": "systems_4", 1404 - "tinted-foot": "tinted-foot", 1405 - "tinted-kitty": "tinted-kitty", 1406 - "tinted-schemes": "tinted-schemes", 1407 - "tinted-tmux": "tinted-tmux", 1408 - "tinted-zed": "tinted-zed" 1297 + ] 1409 1298 }, 1410 1299 "locked": { 1411 - "lastModified": 1762264356, 1412 - "narHash": "sha256-QVfC53Ri+8n3e7Ujx9kq6all3+TLBRRPRnc6No5qY5w=", 1413 - "owner": "danth", 1414 - "repo": "stylix", 1415 - "rev": "647bb8dd96a206a1b79c4fd714affc88b409e10b", 1300 + "lastModified": 1767840362, 1301 + "narHash": "sha256-ZtsFqUhilubohNZ1TgpQIFsi4biZTwRH9rjZsDRDik8=", 1302 + "owner": "oxalica", 1303 + "repo": "rust-overlay", 1304 + "rev": "d159ea1fc321c60f88a616ac28bab660092a227d", 1416 1305 "type": "github" 1417 1306 }, 1418 1307 "original": { 1419 - "owner": "danth", 1420 - "repo": "stylix", 1308 + "owner": "oxalica", 1309 + "repo": "rust-overlay", 1421 1310 "type": "github" 1311 + } 1312 + }, 1313 + "sqlite-lib-src": { 1314 + "flake": false, 1315 + "locked": { 1316 + "lastModified": 1706631843, 1317 + "narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=", 1318 + "type": "tarball", 1319 + "url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip" 1320 + }, 1321 + "original": { 1322 + "type": "tarball", 1323 + "url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip" 1422 1324 } 1423 1325 }, 1424 1326 "systems": { ··· 1558 1460 "sqlite-lib-src": "sqlite-lib-src" 1559 1461 }, 1560 1462 "locked": { 1561 - "lastModified": 1763438625, 1562 - "narHash": "sha256-INS8/F1kLnA/RmGe9oXNHKfo5WR0OTXkh/Y0SB2gpyE=", 1463 + "lastModified": 1767683698, 1464 + "narHash": "sha256-MFrfNmTKTdOOsyXUvvqPwH6zqvDZZpURnd7QdJkVOgU=", 1563 1465 "ref": "refs/heads/master", 1564 - "rev": "2be5f4ac9581e4ff1c5656f698e494c99630202c", 1565 - "revCount": 1674, 1466 + "rev": "b31a2a3590fefc4c70817f94a20076df2428b4d3", 1467 + "revCount": 1791, 1566 1468 "type": "git", 1567 1469 "url": "https://tangled.org/tangled.org/core" 1568 1470 }, ··· 1571 1473 "url": "https://tangled.org/tangled.org/core" 1572 1474 } 1573 1475 }, 1574 - "tidaLuna": { 1476 + "tgirlpkgs": { 1575 1477 "inputs": { 1576 - "devenv": "devenv", 1577 - "flake-parts": "flake-parts_8", 1578 - "nixpkgs": "nixpkgs_7", 1579 - "systems": "systems_7" 1478 + "nixpkgs": "nixpkgs_8" 1580 1479 }, 1581 1480 "locked": { 1582 - "lastModified": 1762313683, 1583 - "narHash": "sha256-m9M2MdX2yygsCNfH0P56aeJtEt4ax/t/cOhk4Mehs5c=", 1584 - "owner": "Inrixia", 1585 - "repo": "TidaLuna", 1586 - "rev": "649bdd566fb5dcc1b45a3d5ef4d3a81ddbc333cd", 1481 + "lastModified": 1767660739, 1482 + "narHash": "sha256-BuDIrsTL90jorWks/TAy0VVZIkeMn6p3CQCkvWeTzyA=", 1483 + "owner": "tgirlcloud", 1484 + "repo": "pkgs", 1485 + "rev": "3e5419554c59db95844713444be102611c922740", 1587 1486 "type": "github" 1588 1487 }, 1589 1488 "original": { 1590 - "owner": "Inrixia", 1591 - "repo": "TidaLuna", 1489 + "owner": "tgirlcloud", 1490 + "repo": "pkgs", 1592 1491 "type": "github" 1593 1492 } 1594 1493 }, 1595 - "tinted-foot": { 1596 - "flake": false, 1597 - "locked": { 1598 - "lastModified": 1726913040, 1599 - "narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=", 1600 - "owner": "tinted-theming", 1601 - "repo": "tinted-foot", 1602 - "rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4", 1603 - "type": "github" 1494 + "tidaLuna": { 1495 + "inputs": { 1496 + "devenv": "devenv", 1497 + "flake-parts": "flake-parts_7", 1498 + "nixpkgs": "nixpkgs_10", 1499 + "systems": "systems_7" 1604 1500 }, 1605 - "original": { 1606 - "owner": "tinted-theming", 1607 - "repo": "tinted-foot", 1608 - "rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4", 1609 - "type": "github" 1610 - } 1611 - }, 1612 - "tinted-kitty": { 1613 - "flake": false, 1614 1501 "locked": { 1615 - "lastModified": 1735730497, 1616 - "narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=", 1617 - "owner": "tinted-theming", 1618 - "repo": "tinted-kitty", 1619 - "rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa", 1620 - "type": "github" 1621 - }, 1622 - "original": { 1623 - "owner": "tinted-theming", 1624 - "repo": "tinted-kitty", 1625 - "type": "github" 1626 - } 1627 - }, 1628 - "tinted-schemes": { 1629 - "flake": false, 1630 - "locked": { 1631 - "lastModified": 1757716333, 1632 - "narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=", 1633 - "owner": "tinted-theming", 1634 - "repo": "schemes", 1635 - "rev": "317a5e10c35825a6c905d912e480dfe8e71c7559", 1502 + "lastModified": 1765158153, 1503 + "narHash": "sha256-7+BABZopsekmRjFBLl8Ni8bY5sIOtk2niiSnD7EuubM=", 1504 + "owner": "Inrixia", 1505 + "repo": "TidaLuna", 1506 + "rev": "94c277909f395922c4cee2729de771adf3f82d87", 1636 1507 "type": "github" 1637 1508 }, 1638 1509 "original": { 1639 - "owner": "tinted-theming", 1640 - "repo": "schemes", 1510 + "owner": "Inrixia", 1511 + "repo": "TidaLuna", 1641 1512 "type": "github" 1642 1513 } 1643 1514 }, 1644 1515 "tinted-theming-schemes": { 1645 1516 "flake": false, 1646 1517 "locked": { 1647 - "lastModified": 1757716333, 1648 - "narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=", 1518 + "lastModified": 1767710407, 1519 + "narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=", 1649 1520 "owner": "tinted-theming", 1650 1521 "repo": "schemes", 1651 - "rev": "317a5e10c35825a6c905d912e480dfe8e71c7559", 1522 + "rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2", 1652 1523 "type": "github" 1653 1524 }, 1654 1525 "original": { ··· 1657 1528 "type": "github" 1658 1529 } 1659 1530 }, 1660 - "tinted-tmux": { 1661 - "flake": false, 1662 - "locked": { 1663 - "lastModified": 1757811970, 1664 - "narHash": "sha256-n5ZJgmzGZXOD9pZdAl1OnBu3PIqD+X3vEBUGbTi4JiI=", 1665 - "owner": "tinted-theming", 1666 - "repo": "tinted-tmux", 1667 - "rev": "d217ba31c846006e9e0ae70775b0ee0f00aa6b1e", 1668 - "type": "github" 1669 - }, 1670 - "original": { 1671 - "owner": "tinted-theming", 1672 - "repo": "tinted-tmux", 1673 - "type": "github" 1674 - } 1675 - }, 1676 - "tinted-zed": { 1677 - "flake": false, 1678 - "locked": { 1679 - "lastModified": 1757811247, 1680 - "narHash": "sha256-4EFOUyLj85NRL3OacHoLGEo0wjiRJzfsXtR4CZWAn6w=", 1681 - "owner": "tinted-theming", 1682 - "repo": "base16-zed", 1683 - "rev": "824fe0aacf82b3c26690d14e8d2cedd56e18404e", 1684 - "type": "github" 1685 - }, 1686 - "original": { 1687 - "owner": "tinted-theming", 1688 - "repo": "base16-zed", 1689 - "type": "github" 1690 - } 1691 - }, 1692 1531 "treefmt-nix": { 1693 1532 "inputs": { 1694 1533 "nixpkgs": [ ··· 1712 1551 }, 1713 1552 "vicinae": { 1714 1553 "inputs": { 1715 - "flake-utils": "flake-utils_3", 1716 1554 "nixpkgs": [ 1717 1555 "nixpkgs" 1718 - ] 1556 + ], 1557 + "systems": "systems_8" 1719 1558 }, 1720 1559 "locked": { 1721 - "lastModified": 1762327833, 1722 - "narHash": "sha256-mw+2Tylv6otpiXpyN5bBqxrsZvEVYPSKgaNUI2yzazQ=", 1560 + "lastModified": 1767715269, 1561 + "narHash": "sha256-0QV6SuVyt16rTVNoB9W3ZwRm7FhJ1pwuDMUH2VkOI6A=", 1723 1562 "owner": "vicinaehq", 1724 1563 "repo": "vicinae", 1725 - "rev": "de12226d691f084bd2033239be8243a11451f3c3", 1564 + "rev": "cd95054a199bba898c79ffa23fa41bac7326a375", 1726 1565 "type": "github" 1727 1566 }, 1728 1567 "original": {
+20 -10
flake.nix
··· 11 11 inputs.nixpkgs.follows = "nixpkgs"; 12 12 }; 13 13 14 + nix-jetbrains-plugins = { 15 + type = "github"; 16 + owner = "Janrupf"; 17 + repo = "nix-jetbrains-plugin-repository"; 18 + }; 19 + 20 + catppuccin = { 21 + type = "github"; 22 + owner = "catppuccin"; 23 + repo = "nix"; 24 + }; 25 + 14 26 # Tangled knots 15 27 tangled = { 16 28 url = "git+https://tangled.org/tangled.org/core"; ··· 23 35 owner = "NixOS"; 24 36 repo = "nixpkgs"; 25 37 ref = "nixos-unstable"; 38 + }; 39 + 40 + # Package collection 41 + tgirlpkgs = { 42 + type = "github"; 43 + owner = "tgirlcloud"; 44 + repo = "pkgs"; 26 45 }; 27 46 28 47 nixvim = { ··· 91 110 repo = "TidaLuna"; 92 111 }; 93 112 94 - stylix = { 95 - type = "github"; 96 - owner = "danth"; 97 - repo = "stylix"; 98 - 99 - inputs.nixpkgs.follows = "nixpkgs"; 100 - }; 101 - 102 113 tinted-theming-schemes = { 103 114 type = "github"; 104 115 owner = "tinted-theming"; ··· 108 119 109 120 nixcord = { 110 121 type = "github"; 111 - owner = "xaiyadev"; 122 + owner = "KaylorBen"; 112 123 repo = "nixcord"; 113 - ref = "fix/user-cfg-no-option"; 114 124 115 125 inputs.nixpkgs.follows = "nixpkgs"; 116 126 };
+2
home/blmedia/default.nix
··· 9 9 programs = { 10 10 librewolf.enable = true; 11 11 discord.enable = true; 12 + 13 + jetbrains.phpstorm.enable = true; 12 14 }; 13 15 14 16 cli = {
-3
home/blmedia/packages.nix
··· 4 4 home.packages = [ 5 5 pkgs.enpass 6 6 7 - pkgs.jetbrains.phpstorm # Mainly using neovim, but for some work stuff still needed 8 7 pkgs.obsidian # Notes taking app 9 8 10 9 pkgs.mpv # Music streaming 11 10 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 12 - 13 - pkgs.wasistlos # Whatsapp for linux 14 11 15 12 pkgs.teams-for-linux # Teams; Need that for school and work 16 13
+2
home/default.nix
··· 3 3 config, 4 4 self, 5 5 inputs', 6 + system, 6 7 inputs, 7 8 ... 8 9 }: ··· 29 30 self 30 31 inputs 31 32 inputs' 33 + system 32 34 ; 33 35 }; 34 36
+2
home/xaiya/default.nix
··· 9 9 librewolf.enable = true; 10 10 discord.enable = true; 11 11 lutris.enable = true; 12 + 13 + jetbrains.webstorm.enable = true; 12 14 }; 13 15 14 16 cli.neovim.enable = true;
+1 -3
home/xaiya/packages.nix
··· 1 1 # Packages that are not configurable/are not configured will land here 2 - { pkgs, inputs', ... }: 2 + { pkgs, inputs', osConfig, ... }: 3 3 { 4 4 home.packages = [ 5 5 pkgs.obsidian # Notes taking app ··· 11 11 # Music/Media players 12 12 pkgs.mpv # Music streaming 13 13 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 14 - 15 - pkgs.wasistlos # Whatsapp for linux 16 14 17 15 pkgs.teams-for-linux # Teams; Need that for school and work 18 16 #pkgs.ciscoPacketTracer8 # Cisco software that I need for school
-7
modules/base/default.nix
··· 1 1 # Basic variables and configurations 2 - { lib, self, ... }: 3 - let 4 - inherit (lib.tpes) str; 5 - inherit (self.lib.modules) mkOpt; 6 - in 7 2 { 8 - 9 3 imports = [ 10 4 ./profiles.nix 11 - ./theme.nix 12 5 ]; 13 6 }
-30
modules/base/theme.nix
··· 1 - { 2 - self, 3 - lib, 4 - config, 5 - inputs, 6 - pkgs, 7 - ... 8 - }: 9 - let 10 - inherit (lib.types) 11 - path 12 - enum 13 - nullOr 14 - str 15 - package 16 - ; 17 - 18 - inherit (self.lib.modules) mkOpt; 19 - 20 - cfg = config.sylveon.system.theme; 21 - in 22 - { 23 - options.sylveon.system.theme = { 24 - name = mkOpt (nullOr (enum [ "rose-pine" ])) "rose-pine" "The theme that should be loaded"; 25 - 26 - base16 = 27 - mkOpt path "${inputs.tinted-theming-schemes}/base16/${cfg.name}.yaml" 28 - "Path to base16 file for your theme"; 29 - }; 30 - }
-4
modules/home/cli/kitty.nix
··· 22 22 config = mkIf (cfg.enable || sway.enable) { 23 23 programs.kitty = { 24 24 enable = true; 25 - inherit (cfg) package; 26 25 27 26 shellIntegration.enableZshIntegration = config.programs.zsh.enable; 28 27 enableGitIntegration = true; 29 - themeFile = "rose-pine"; 30 28 31 29 # removing annoying things 32 30 settings.enable_audio_bell = false; 33 31 }; 34 - 35 - stylix.targets.kitty.enable = false; # Using the kitty theme instead of base16 36 32 }; 37 33 }
+1 -6
modules/home/cli/neovim/default.nix
··· 35 35 ./social.nix 36 36 ]; 37 37 38 + # Neovim should be used as a lightweigt editor (used for small changes) 38 39 options.sylveon.cli.neovim = { 39 40 enable = mkOpt bool false "vim editor, only better"; 40 41 anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)"; ··· 112 113 lz-n.enable = true; # Lazy loading 113 114 }; 114 115 }; 115 - 116 - stylix.targets.nixvim = { 117 - plugin = "mini.base16"; 118 - transparentBackground.main = true; 119 - }; 120 - 121 116 }; 122 117 }
+1 -1
modules/home/cli/neovim/telescope.nix
··· 20 20 sorting_strategy = "ascending"; 21 21 layout_config = { 22 22 prompt_position = "top"; 23 - preview_width = 0.5; 23 + # preview_width = 0.5; 24 24 width = 0.40; 25 25 height = 0.40; 26 26 };
-27
modules/home/desktop/cursor.nix
··· 1 - { 2 - self, 3 - lib, 4 - pkgs, 5 - osConfig, 6 - ... 7 - }: 8 - let 9 - inherit (lib) mkIf; 10 - 11 - prof = osConfig.sylveon.profiles; 12 - in 13 - { 14 - 15 - config = mkIf prof.graphical.enable { 16 - home.pointerCursor = { 17 - enable = true; 18 - 19 - name = "BreezeX-RosePineDawn-Linux"; 20 - package = pkgs.rose-pine-cursor; 21 - size = 32; 22 - 23 - sway.enable = true; 24 - gtk.enable = true; 25 - }; 26 - }; 27 - }
+2 -2
modules/home/desktop/default.nix
··· 1 1 { 2 2 imports = [ 3 - ./stylix.nix # easier and better styling 4 - ./cursor.nix # cursor configuration 3 + ./style.nix # Style configuration 4 + 5 5 ./vicinae.nix # Application selector + manager 6 6 7 7 ./sway # Window Manager
+31
modules/home/desktop/kanshi/docked_office.nix
··· 72 72 ]; 73 73 }; 74 74 } 75 + 76 + { 77 + profile = { 78 + name = "${name}-elvis"; 79 + outputs = [ 80 + { 81 + criteria = "${office_screen_2} ULTRAFINE 404NTGY9M335"; 82 + position = "2560,132"; 83 + 84 + scale = 1.2; 85 + mode = "3840x2160@60.000Hz"; 86 + } 87 + 88 + { 89 + criteria = "${office_screen_2} ULTRAFINE 404NTYT9M282"; 90 + position = "5762,132"; 91 + 92 + scale = 1.2; 93 + mode = "3840x2160@60.000Hz"; 94 + } 95 + 96 + { 97 + criteria = "eDP-2"; 98 + position = "0,99"; 99 + 100 + mode = "2560x1600@165.000Hz"; 101 + scale = 1.3; 102 + } 103 + ]; 104 + }; 105 + } 75 106 ]; 76 107 }
+64
modules/home/desktop/style.nix
··· 1 + { 2 + osConfig, 3 + lib, 4 + inputs, 5 + pkgs, 6 + config, 7 + ... 8 + }: 9 + let 10 + inherit (lib) mkIf; 11 + cfg = config.catppuccin; 12 + in 13 + { 14 + imports = [ inputs.catppuccin.homeModules.catppuccin ]; 15 + 16 + # Use the global catppuccin configuration 17 + /* 18 + TODO: applications that need to be manaul integrated/need nix integration 19 + - TidaLuna 20 + */ 21 + config = mkIf osConfig.catppuccin.enable { 22 + catppuccin = { 23 + enable = true; 24 + 25 + inherit (osConfig.catppuccin) 26 + accent 27 + flavor 28 + ; 29 + }; 30 + 31 + gtk = { 32 + enable = true; 33 + 34 + theme = { 35 + name = "catppuccin-${cfg.flavor}-${cfg.accent}-standard"; 36 + package = pkgs.catppuccin-gtk.override { 37 + size = "standard"; 38 + accents = [ cfg.accent ]; 39 + variant = cfg.flavor; 40 + }; 41 + }; 42 + 43 + gtk3.extraConfig = { 44 + gtk-application-prefer-dark-theme = true; 45 + }; 46 + 47 + gtk4.extraConfig = { 48 + # make things look nice 49 + gtk-application-prefer-dark-theme = true; 50 + }; 51 + }; 52 + 53 + home.pointerCursor = { 54 + enable = true; 55 + 56 + name = "catppuccin-mocha-flamingo-cursors"; 57 + package = pkgs.catppuccin-cursors.mochaFlamingo; 58 + size = 24; 59 + 60 + sway.enable = true; 61 + gtk.enable = true; 62 + }; 63 + }; 64 + }
-28
modules/home/desktop/stylix.nix
··· 1 - { 2 - osConfig, 3 - lib, 4 - self, 5 - inputs, 6 - ... 7 - }: 8 - let 9 - inherit (lib) mkIf; 10 - 11 - prof = osConfig.sylveon.profiles; 12 - theme = osConfig.sylveon.system.theme; 13 - in 14 - { 15 - imports = [ inputs.stylix.homeModules.stylix ]; 16 - 17 - config = mkIf prof.graphical.enable { # TODO: deprecate this 18 - stylix = { 19 - enable = true; 20 - enableReleaseChecks = false; # Stylix is sometimes behind home-manager, nothing we can do 21 - overlays.enable = false; # Should be automaticly disabled, but it just... doesnt do it? ;-; 22 - 23 - image = "${self}/assets/wallpaper/infinity-nikki-1.jpg"; 24 - base16Scheme = theme.base16; 25 - polarity = "dark"; 26 - }; 27 - }; 28 - }
+4 -2
modules/home/desktop/sway/config/applications.nix
··· 11 11 { 12 12 wayland.windowManager.sway.config = { 13 13 window = { 14 - border = 3; 14 + border = 1; 15 15 titlebar = false; 16 16 }; 17 + 17 18 gaps = { 18 - inner = 5; 19 + inner = 8; 20 + outer = 3; 19 21 }; 20 22 21 23 floating = {
+5 -1
modules/home/desktop/sway/config/workspaces.nix
··· 1 - { config, lib, ... }: 1 + { config, lib, self, ... }: 2 2 let 3 3 inherit (lib) 4 4 forEach ··· 13 13 in 14 14 { 15 15 wayland.windowManager.sway.config = { 16 + # Configure wallpaper 17 + output."*" = { 18 + bg = "${self}/assets/wallpaper/catppuccin-cat.png fill"; 19 + }; 16 20 defaultWorkspace = "1"; 17 21 18 22 workspaceOutputAssign = mkMerge [
+31
modules/home/desktop/sway/default.nix
··· 16 16 17 17 modifier = "Mod4"; 18 18 sway = osConfig.sylveon.system.graphical.sway; 19 + cfg = config.wayland.windowManager.sway.config; 19 20 in 20 21 { 21 22 imports = [ ··· 38 39 config = { 39 40 inherit modifier; 40 41 terminal = "${getExe config.programs.kitty.package}"; 42 + 43 + colors = 44 + let 45 + submodule = { 46 + childBorder = "$base"; 47 + indicator = submodule.childBorder; 48 + 49 + # Configuration needed only if using the title bar 50 + text = "$text"; 51 + border = submodule.childBorder; 52 + background = "$base"; 53 + }; 54 + in 55 + { 56 + focused = submodule // rec { 57 + childBorder = "\$${config.catppuccin.accent}"; 58 + indicator = childBorder; 59 + border = childBorder; 60 + }; 61 + 62 + urgent = submodule // rec { 63 + childBorder = "$red"; 64 + indicator = childBorder; 65 + border = childBorder; 66 + }; 67 + 68 + placeholder = submodule; 69 + focusedInactive = submodule; 70 + unfocused = submodule; 71 + }; 41 72 42 73 keybindings = mkOptionDefault { 43 74 "${modifier}+Escape" = "exec ${getExe config.programs.swaylock.package}";
+2 -8
modules/home/desktop/sway/packages/swayidle.nix
··· 20 20 command = "exec ${config.programs.swaylock.package}/bin/swaylock"; 21 21 } 22 22 ]; 23 - 24 - events = [ 25 - { 26 - event = "before-sleep"; 27 - command = "exec ${config.programs.swaylock.package}/bin/swaylock"; 28 - } 29 - ]; 30 - 23 + 24 + events."before-sleep" = "exec ${config.programs.swaylock.package}/bin/swaylock"; 31 25 }; 32 26 }
+2 -1
modules/home/desktop/sway/packages/swaync.nix
··· 6 6 in 7 7 { 8 8 9 - # SwayNC is right now only used for the notification popup 10 9 services.swaync = mkIf sway.enable { 11 10 enable = true; 12 11 13 12 settings = { 14 13 positionX = "right"; 15 14 positionY = "top"; 15 + 16 + image-visibility = "never"; 16 17 }; 17 18 }; 18 19 }
+8 -11
modules/home/desktop/sway/packages/waybar/default.nix
··· 8 8 let 9 9 inherit (lib) 10 10 mkIf 11 - concatStringsSep 12 11 ; 13 12 14 13 sway = osConfig.sylveon.system.graphical.sway; ··· 23 22 # replace default bar with waybar 24 23 wayland.windowManager.sway.config.bars = [ { command = "${pkgs.waybar}/bin/waybar"; } ]; 25 24 26 - # only add colors and fonts from stylix 27 - stylix.targets.waybar.addCss = false; 25 + catppuccin.waybar.enable = true; 28 26 29 - programs.waybar = { 27 + programs.waybar = { # TODO: replace? 30 28 enable = true; 31 29 32 30 settings = { ··· 35 33 position = "top"; 36 34 fixed-center = true; 37 35 38 - height = 35; 39 - margin-top = 5; 40 - margin-left = 5; 41 - margin-right = 5; 36 + height = 30; 37 + margin-top = 10; 38 + margin-left = 10; 39 + margin-right = 10; 42 40 43 - margin-bottom = 3; 41 + margin-bottom = 10; 44 42 45 43 # Enable modules in the right positions 46 44 modules-left = [ 47 - "image#nix" 45 + # "image#nix" 48 46 "sway/workspaces" 49 47 "sway/window" 50 48 ]; ··· 53 51 "clock" 54 52 ]; 55 53 modules-right = [ 56 - "mpris" 57 54 "pulseaudio" 58 55 "network" 59 56 "bluetooth"
+21 -22
modules/home/desktop/sway/packages/waybar/style.css
··· 4 4 * { 5 5 background-color: transparent; 6 6 font-family: "JetBrainsMono Nerd Font", sans-serif; 7 - color: @base04; 7 + font-size: 14px; 8 + color: @text; 8 9 9 10 min-height: 0; 10 11 padding: 0; ··· 14 15 border: unset; 15 16 } 16 17 17 - window { background-color: transparent; } 18 - tooltip { background-color: @base00; } 19 - #tray menu { background-color: @base00; } 18 + window#waybar { 19 + background-color: @base; 20 + border-radius: 5px; 21 + } 22 + 23 + tooltip { background-color: @crust; } 24 + #tray menu { background-color: @crust; } 20 25 21 26 .module { 22 - background-color: @base00; 23 - border-radius: 13px; 27 + background-color: transparent; 24 28 25 29 min-width: 20px; 26 30 27 - padding: 0 13px; 31 + padding: 5px 11px; 28 32 margin: 0 3px; 29 33 } 30 34 ··· 51 55 padding: 0; 52 56 } 53 57 54 - #workspaces button { 55 - padding: 0 0 0 3px; 56 - margin: 0 3px; 57 - transition: 0.5s; 58 + #workspaces button.focused label { 59 + font-weight: bolder; 60 + font-size: 15px; 61 + color: @flamingo; 58 62 } 59 63 60 - #workspaces button.focused { 61 - box-shadow: inset 0 -2px @base0A; 64 + #workspaces button.urgent label { 65 + color: @red; 62 66 } 63 67 64 - #workspaces button.urgent { 65 - box-shadow: inset 0 -2px @base08; 68 + .module#battery.warning label { 69 + color: @rosewater; 66 70 } 67 71 68 - .module#battery.warning { 69 - box-shadow: inset 0 -4px @base0E; 72 + .module#battery.critical label { 73 + color: @red; 70 74 } 71 - 72 - .module#battery.critical { 73 - 74 - box-shadow: inset 0 -4px @base08; 75 - }
+20 -10
modules/home/desktop/vicinae.nix
··· 1 1 { 2 2 config, 3 + pkgs, 3 4 inputs, 4 5 inputs', 5 6 osConfig, ··· 10 11 inherit (lib) 11 12 mkIf 12 13 getExe 14 + mkForce 13 15 ; 14 16 15 17 sway = osConfig.sylveon.system.graphical.sway; ··· 23 25 config = mkIf sway.enable { 24 26 services.vicinae = { 25 27 enable = true; 26 - autoStart = false; # Is started through sway 27 - package = inputs'.vicinae.packages.default; 28 + package = pkgs.vicinae; # Outdated but more stable version built by hydra 29 + systemd.enable = false; # Is started through sway 28 30 29 31 settings = { 30 - closeOnFocusLoss = true; 32 + pop_to_root_on_close = true; 31 33 font.size = 10; 32 - faviconService = "google"; 34 + favicon_service = "twenty"; 33 35 34 - theme = { 35 - iconTheme = "BreezeX-RoséPine"; 36 - name = "rosepine-base.json"; 36 + # Theme configuration with catppuccin currently bugged 37 + # https://github.com/catppuccin/nix/pull/800 38 + theme = 39 + let 40 + ctp = config.catppuccin; 41 + in 42 + { 43 + dark = { 44 + name = "catppuccin-${ctp.flavor}"; 45 + iconTheme = "Catppuccin ${lib.toSentenceCase ctp.flavor} ${lib.toSentenceCase ctp.accent}"; 46 + }; 37 47 }; 38 - 39 - window = { 48 + 49 + launcher_window = { 40 50 csd = true; 41 - opacity = 1; 51 + opacity = 0.95; 42 52 rounding = 10; 43 53 }; 44 54 };
+2
modules/home/programs/default.nix
··· 3 3 ./librewolf.nix 4 4 ./discord.nix 5 5 ./lutris.nix 6 + 7 + ./jetbrains 6 8 ]; 7 9 }
+27 -5
modules/home/programs/discord.nix
··· 9 9 let 10 10 inherit (lib) 11 11 mkIf 12 + mkForce 13 + mkMerge 14 + forEach 15 + ; 16 + 17 + inherit (lib.strings) 18 + splitString 19 + ; 20 + 21 + inherit (lib.lists) 22 + last 12 23 ; 13 24 14 25 inherit (lib.types) bool; 15 26 16 27 inherit (self.lib.modules) mkOpt; 17 28 cfg = config.sylveon.programs.discord; 29 + nixcordcfg = config.programs.nixcord.config; 18 30 in 19 31 { 20 32 options.sylveon.programs.discord.enable = mkOpt bool false "Whether or not to enable discord"; ··· 24 36 config = mkIf cfg.enable { 25 37 programs.nixcord = { 26 38 enable = true; 27 - discord.enable = true; 39 + discord = { 40 + vencord.enable = mkForce false; 41 + equicord.enable = true; 42 + }; 28 43 29 44 config = { 45 + # Themes based on files is currently bugged with equicord (TODO) 46 + themeLinks = [ "https://catppuccin.github.io/discord/dist/catppuccin-mocha-flamingo.theme.css" ]; 47 + transparent = true; 30 48 31 49 # Activate and Configure Plugins 32 50 plugins = { ··· 36 54 betterGifPicker.enable = true; 37 55 betterSessions.enable = true; 38 56 betterSettings.enable = true; 39 - blurNSFW.enable = true; 57 + BlurNSFW.enable = true; 40 58 callTimer.enable = true; 41 - clearURLs.enable = true; 42 - copyUserURLs.enable = true; 59 + ClearURLs.enable = true; 60 + CopyUserURLs.enable = true; 43 61 disableCallIdle.enable = true; 44 62 dontRoundMyTimestamps.enable = true; 45 63 favoriteEmojiFirst.enable = true; ··· 65 83 66 84 platformIndicators = { 67 85 enable = true; 68 - lists = false; 86 + list = false; 69 87 messages = false; 70 88 }; 71 89 ··· 80 98 whoReacted.enable = true; 81 99 youtubeAdblock.enable = true; 82 100 }; 101 + }; 102 + 103 + extraConfig = { 104 + enabledThemeLinks = nixcordcfg.themeLinks; 83 105 }; 84 106 }; 85 107 };
+16
modules/home/programs/jetbrains/.ideavimrc
··· 1 + " You can find a list of commands here: https://jb.gg/h38q75 2 + " Find more examples here: https://jb.gg/share-ideavimrc 3 + 4 + source ~/.vimrc 5 + 6 + " Keymaps just for jetbrains ide 7 + map <C-N> <A>1<CR> 8 + 9 + " Move around tabs 10 + map <A-l> :tabnext<cr> 11 + map <A-h> :tabNext<cr> 12 + 13 + 14 + " Enabling Plugins 15 + Plug 'tpope/vim-commentary' " Commentary plugin 16 + Plug 'machakann/vim-highlightedyank' " Highlight copied text
+26
modules/home/programs/jetbrains/.vimrc
··· 1 + map Q gq 2 + 3 + set scrolloff=7 4 + set autoread 5 + 6 + set ignorecase 7 + set smartcase 8 + set hlsearch 9 + set incsearch 10 + 11 + set showmatch 12 + set mat=2 13 + 14 + " disable sounds 15 + set noerrorbells 16 + set novisualbell 17 + set tm=500 18 + 19 + syntax enable 20 + 21 + set expandtab 22 + set smarttab 23 + 24 + " Clipboard support 25 + set clipboard+=unnamed 26 + set clipboard+=ideaput
+74
modules/home/programs/jetbrains/default.nix
··· 1 + { 2 + config, 3 + lib, 4 + self, 5 + pkgs, 6 + inputs, 7 + osConfig, 8 + ... 9 + }: 10 + let 11 + 12 + inherit (lib) 13 + mkIf 14 + mkMerge 15 + ; 16 + 17 + inherit (lib.types) bool package; 18 + inherit (self.lib.modules) mkOpt; 19 + 20 + cfg = config.sylveon.programs.jetbrains; 21 + cfgFolder = ''.config/Jetbrains/${cfg.webstorm.package.version}''; 22 + in 23 + { 24 + 25 + options.sylveon.programs.jetbrains = { 26 + phpstorm = { 27 + enable = mkOpt bool false "Whether or not to enable the jetbrains php-editor"; 28 + package = mkOpt package pkgs.jetbrains.phpstorm "What package to use for the jetbrains php-editor"; 29 + }; 30 + 31 + webstorm = { 32 + enable = mkOpt bool false "Whether or not to enable the jetbrains web-editor"; 33 + package = mkOpt package pkgs.jetbrains.webstorm "What package to use for the jetbrains web-editor"; 34 + }; 35 + }; 36 + 37 + config = mkIf (cfg.phpstorm.enable || cfg.webstorm.enable) { 38 + 39 + home.file.".vimrc".source = ./.vimrc; # TODO: move to a new vim configuration 40 + home.file.".ideavimrc".source = ./.ideavimrc; 41 + 42 + home.packages = 43 + let 44 + defaultPlugins = with pkgs.jetbrains-plugins; [ 45 + com.github.catppuccin.jetbrains 46 + com.mallowigi # Atom material icons 47 + 48 + # com.wakatime.intellij.plugin TODO 49 + 50 + IdeaVIM 51 + 52 + nix-idea 53 + com.jetbrains.plugins.ini4idea 54 + ]; 55 + in 56 + lib.optionals cfg.phpstorm.enable [ 57 + (pkgs.jetbrains-plugins.lib.buildIdeWithPlugins 58 + cfg.phpstorm.package 59 + (with pkgs.jetbrains-plugins; [ 60 + # adrienbrault.idea.symfony2plugin Not available? 61 + ] ++ defaultPlugins) 62 + ) 63 + ] 64 + 65 + ++ lib.optionals cfg.webstorm.enable [ 66 + (pkgs.jetbrains-plugins.lib.buildIdeWithPlugins 67 + cfg.webstorm.package 68 + (with pkgs.jetbrains-plugins; [ 69 + io.github.pandier.intellijdiscordrp 70 + ] ++ defaultPlugins) 71 + ) 72 + ]; 73 + }; 74 + }
+66 -48
modules/home/programs/librewolf.nix
··· 12 12 genAttrs 13 13 ; 14 14 15 + inherit (builtins) 16 + fromJSON 17 + readFile 18 + fetchurl 19 + ; 20 + 15 21 inherit (lib.types) bool; 16 22 17 23 inherit (self.lib.modules) mkOpt; ··· 28 34 programs.librewolf = { 29 35 enable = true; 30 36 31 - # Install German and english languages 32 - languagePacks = [ 33 - "en-GB" 34 - "de" 35 - ]; 37 + languagePacks = [ "en-GB" "de" ]; 36 38 37 39 settings = { 40 + "browser.fullscreen.autohide" = false; 41 + 42 + "webgl.disabled" = false; 43 + "privacy.fingerprintingProtection" = false; 44 + "browser.translations.enable" = false; 45 + 46 + "media.ffmpeg.vaapi.enabled" = true; 47 + "media.rdd-ffmpeg.enabled" = true; 48 + 49 + "extensions.abuseReport.enabled" = false; 50 + "extensions.formautofill.creditCards.enabled" = false; 51 + "browser.contentblocking.report.lockwise.enabled" = false; 52 + 53 + "identity.fxaccounts.enabled" = false; 54 + "identity.fxaccounts.toolbar.enabled" = false; 55 + "identity.fxaccounts.pairing.enabled" = false; 56 + "identity.fxaccounts.commands.enabled" = false; 57 + "privacy.clearOnShutdown.history" = false; 38 58 "privacy.clearOnShutdown.cookies" = false; 39 59 "network.cookie.lifetimePolicy" = 0; 40 60 41 - # Enable Canvas 42 - "webgl.disabled" = false; 43 - "privacy.fingerprintingProtection" = false; 61 + # disable notifications 62 + "dom.push.enabled" = false; 63 + "dom.push.connection.enabled" = false; 64 + "dom.battery.enabled" = false; 44 65 }; 45 66 46 67 policies = { 68 + DisplayBookmarksToolbar = "never"; 69 + DisableFirefoxAccounts = true; 70 + DisableFeedbackCommands = true; 71 + 47 72 ExtensionSettings = 48 73 genAttrs 49 74 [ 50 75 "uBlock0@raymondhill.net" 51 - "languagetool-webextension@languagetool.org" 52 76 "sponsorBlocker@ajay.app" 53 77 "FirefoxColor@mozilla.com" 54 78 "firefox-enpass@enpass.io" 79 + "{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}" # Stylus 80 + "{446900e4-71c2-419f-a6a7-df9c091e268b}" # Bitwarden 55 81 ] 56 82 (ext: { 57 83 installation_mode = "force_installed"; 58 - private_browsing = true; 59 84 install_url = "https://addons.mozilla.org/firefox/downloads/latest/${ext}/latest.xpi"; 60 85 }); 61 - 62 - DisplayBookmarksToolbar = "never"; 63 86 }; 64 87 65 - profiles = { 66 - default = { 67 - 68 - # Extensions are managed via policies, not here! 69 - extensions = { 70 - force = true; 71 - settings = { 72 - # ColorTheme is managed by stylix 73 - "{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = { 74 - dbInChromeStorage = true; # required for Stylus 75 - }; 88 + profiles.default = { 89 + extensions = { 90 + force = true; # Needed for catppuccin 76 91 92 + settings = { 93 + # stylus themes need to be manually imported from now 94 + # please create and import a new style file from here: https://catppuccin-userstyles-customizer.uncenter.dev/ 95 + "{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = { 96 + dbInChromeStorage = true; # required for Stylus 77 97 }; 78 98 }; 99 + }; 100 + 101 + settings = { 102 + # Default page should be my homepage 103 + "browser.startup.homepage" = "https://xaiya.dev"; 104 + }; 79 105 80 - search = { 81 - force = true; 82 - default = "google"; 106 + search = { 107 + force = true; 108 + default = "ddg"; 83 109 84 - engines = { 85 - MyNixOS = { 86 - name = "MyNixOS"; 87 - urls = [ 88 - { 89 - template = "https://mynixos.com/search"; 90 - params = [ 91 - { 92 - name = "q"; 93 - value = "{searchTerms}"; 94 - } 95 - ]; 96 - } 97 - ]; 98 - icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg"; 99 - definedAliases = [ "@nix" ]; 100 - }; 110 + engines = { 111 + MyNixOS = { 112 + name = "MyNixOS"; 113 + urls = [{ 114 + template = "https://mynixos.com/search"; 115 + params = [ { name = "q"; value = "{searchTerms}"; } ]; 116 + }]; 101 117 102 - ddg.metaData.hidden = true; 103 - wikipedia.metaData.hidden = true; 118 + icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg"; 119 + definedAliases = [ "@n" ]; 104 120 }; 121 + 122 + google.metaData.alias = "@g"; 105 123 }; 106 124 }; 107 125 }; 108 126 }; 109 127 110 - stylix.targets.librewolf = { 111 - colorTheme.enable = true; 112 - profileNames = [ "default" ]; # https://stylix.danth.me/options/modules/firefox.html 128 + catppuccin.librewolf = { 129 + force = true; 130 + profiles.default.force = true; 113 131 }; 114 132 }; 115 133 }
+6 -1
modules/nixos/default.nix
··· 1 - { 1 + { inputs, ... }: { 2 2 imports = [ 3 + # General module imports 4 + inputs.tgirlpkgs.nixosModules.default 5 + 6 + # Modules import 3 7 ./hardware # hardware configuration (e.g gpu, cpu, networking, etc.) 4 8 ./nix # specific configuration for the nix environment 5 9 ./environment # environment variables and configurations (e.g fonts, time etc.) ··· 7 11 ./system # configuration for our system 8 12 ./services 9 13 14 + ./style.nix 10 15 ./users.nix # load and create users 11 16 ./extraPackages.nix # packages that need to be loaded but are not big enough to be an own module 12 17 ];
+6 -4
modules/nixos/nix/caches.nix
··· 1 1 { 2 2 nix.settings = { 3 3 substituters = [ 4 + "https://nix-community.cachix.org" # nix-community cache 4 5 "https://ezkea.cachix.org" # AAGL caches 5 6 "https://nix-gaming.cachix.org" # gaming packages 6 - "https://vicinae.cachix.org" # Vicinae 7 + "https://catppuccin.cachix.org" # a cache for all catppuccin ports 7 8 ]; 8 9 9 10 trusted-public-keys = [ 10 - "ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" # AAGL caches 11 - "nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" # gaming packages 12 - "vicinae.cachix.org-1:1kDrfienkGHPYbkpNj1mWTr7Fm1+zcenzgTizIcI3oc=" # Vicinae 11 + "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" 12 + "ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" 13 + "nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" 14 + "catppuccin.cachix.org-1:noG/4HkbhJb+lUAdKrph6LaozJvAeEEZj4N732IysmU=" 13 15 ]; 14 16 }; 15 17 }
+2 -1
modules/nixos/nix/nixpkgs.nix
··· 1 - { 1 + { inputs, ... }: { 2 2 # TODO: evaluation warning (cant use nixpkgs.config when using home-manager.useGlobalPkgs) 3 3 nixpkgs.config = { 4 4 # Allowance of packages ··· 15 15 16 16 nixpkgs.overlays = [ 17 17 (import ./overlays/mpv.nix) 18 + inputs.nix-jetbrains-plugins.overlays.default 18 19 ]; 19 20 }
-5
modules/nixos/services/atprotocol/default.nix
··· 1 - { 2 - imports = [ 3 - ./tangled.nix 4 - ]; 5 - }
-82
modules/nixos/services/atprotocol/tangled.nix
··· 1 - { inputs, lib, self, config, ... }: 2 - let 3 - inherit (lib) mkMerge mkIf; 4 - inherit (lib.types) str; 5 - inherit (self.lib.modules) mkServiceOpt mkOpt; 6 - 7 - cfg = config.sylveon.services.atprotocol.tangled; 8 - in 9 - { 10 - 11 - imports = [ 12 - inputs.tangled.nixosModules.knot 13 - inputs.tangled.nixosModules.spindle 14 - ]; 15 - 16 - options.sylveon.services.atprotocol.tangled = { 17 - owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance"; 18 - 19 - knot = 20 - mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; }; 21 - 22 - spindle = 23 - mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; }; 24 - }; 25 - 26 - config = { 27 - services = mkMerge [ 28 - (mkIf cfg.knot.enable { 29 - tangled.knot = { 30 - enable = true; 31 - 32 - server = { 33 - inherit (cfg) owner; 34 - hostname = cfg.knot.domain; 35 - }; 36 - 37 - motd = '' 38 - >> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner}) 39 - ''; 40 - }; 41 - 42 - # Create proxy entry 43 - nginx.virtualHosts.${cfg.knot.domain} = { 44 - enableACME = true; 45 - forceSSL = true; 46 - 47 - locations."/" = { 48 - proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}"; 49 - proxyWebsockets = true; 50 - }; 51 - 52 - extraConfig = "proxy_ssl_server_name on;"; 53 - }; 54 - }) 55 - 56 - (mkIf cfg.spindle.enable { 57 - tangled.spindle = { 58 - enable = true; 59 - 60 - server = { 61 - inherit (cfg) owner; 62 - hostname = cfg.spindle.domain; 63 - }; 64 - }; 65 - 66 - 67 - # Create proxy entry 68 - nginx.virtualHosts.${cfg.spindle.domain} = { 69 - enableACME = true; 70 - forceSSL = true; 71 - 72 - locations."/" = { 73 - proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}"; 74 - proxyWebsockets = true; 75 - }; 76 - 77 - extraConfig = "proxy_ssl_server_name on;"; 78 - }; 79 - }) 80 - ]; 81 - }; 82 - }
+2 -1
modules/nixos/services/default.nix
··· 10 10 ./glance 11 11 ./kitchenowl.nix 12 12 13 - ./atprotocol 13 + ./tangled.nix 14 + ./piper.nix 14 15 15 16 ./plex.nix 16 17 ];
+1 -1
modules/nixos/services/docker.nix
··· 20 20 config = mkIf cfg.enable { 21 21 virtualisation.docker = { 22 22 enable = true; 23 - # storageDriver = "btrfs"; TODO: 0 // change if redoing apricot 23 + storageDriver = "overlay2"; 24 24 25 25 rootless = { 26 26 enable = true;
+1 -1
modules/nixos/services/glance/default.nix
··· 36 36 proxied = true; 37 37 }; 38 38 39 - # rose-pine color theme 39 + # rose-pine color theme TODO 40 40 theme = { 41 41 constrat-multiplier = 1.3; 42 42 background-color = "249 22 12"; # Base
+2 -3
modules/nixos/services/kitchenowl.nix
··· 13 13 in 14 14 { 15 15 options.sylveon.services.kitchenowl = 16 - mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; }; 16 + mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; host = "127.0.0.1"; }; 17 17 18 18 config = mkIf cfg.enable { 19 19 # Create secrets ··· 22 22 # Enable the kitchenowl container 23 23 virtualisation.oci-containers.containers.kitchenowl = { 24 24 image = "tombursch/kitchenowl:latest"; 25 - ports = [ "${builtins.toString cfg.port}:${builtins.toString cfg.port}" ]; 25 + ports = [ "${builtins.toString cfg.port}:8080" ]; 26 26 27 27 environmentFiles = [ config.age.secrets.kitchenowl-env.path ]; 28 28 volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ]; ··· 35 35 36 36 locations."/" = { 37 37 proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}"; 38 - proxyWebsockets = true; 39 38 }; 40 39 41 40 extraConfig = "proxy_ssl_server_name on;";
+12 -7
modules/nixos/services/minecraft.nix
··· 16 16 17 17 options.sylveon.services.minecraft = { 18 18 enable = mkOpt bool false "Enable a Minecraft server"; 19 - package = mkOpt package pkgs.papermcServers.papermc "On what package this server should be based on"; 19 + package = mkOpt package pkgs.papermcServers.papermc-1_21_9 "On what package this server should be based on"; 20 20 }; 21 21 22 22 config = mkIf cfg.enable { 23 + 24 + # Open Minecraft port and proximity port 25 + networking.firewall = { 26 + allowedUDPPorts = [ 24454 25565 ]; 27 + allowedTCPPorts = [ 24454 25565 ]; 28 + }; 29 + 23 30 services.minecraft-server = { 24 31 enable = true; 25 32 inherit (cfg) package; 26 33 27 34 # What world I want to use (TODO: needs some changes) 28 - dataDir = "/mnt/raid/services/minecraft/01"; 35 + dataDir = "/mnt/raid/services/minecraft/02"; 29 36 30 37 eula = true; 31 - openFirewall = true; 32 - 33 38 declarative = true; 34 39 35 40 whitelist = { ··· 51 56 52 57 serverProperties = { 53 58 difficulty = "hard"; 54 - 55 59 spawn-protection = 0; 56 60 57 61 gamemode = 0; 58 62 force-gamemode = true; 59 63 60 64 max-players = 10; 61 - view-dance = 32; 65 + view-dance = 18; 66 + simulation-distance = 8; 62 67 63 68 white-list = true; 64 69 motd = "Sylveon Network"; 65 70 }; 66 71 67 - jvmOpts = "-Xms4092M -Xmx4092M"; 72 + jvmOpts = "-Xms2G -Xmx8G"; 68 73 }; 69 74 }; 70 75 }
+47
modules/nixos/services/piper.nix
··· 1 + { 2 + config, 3 + lib, 4 + self, 5 + ... 6 + }: 7 + let 8 + inherit (lib) mkIf; 9 + inherit (self.lib.modules) mkServiceOpt; 10 + 11 + cfg = config.sylveon.services.piper; 12 + in 13 + { 14 + 15 + options.sylveon.services.piper = 16 + mkServiceOpt "piper" { port = 3015; domain = "piper.xaiya.dev"; }; 17 + 18 + config = mkIf cfg.enable { 19 + # Create secrets 20 + age.secrets.piper-env.rekeyFile = "${self}/secrets/piper-env.age"; 21 + 22 + services = { 23 + piper = { # TODO: Spotify API is currently blocked, cant create APP 24 + enable = true; 25 + environmentFiles = [ config.age.secrets.piper-env.path ]; 26 + 27 + settings = { 28 + SERVER_PORT = cfg.port; 29 + SERVER_ROOT_URL = "https://${cfg.domain}"; 30 + }; 31 + }; 32 + 33 + # Create proxy entry 34 + nginx.virtualHosts.${cfg.domain} = { 35 + enableACME = true; 36 + forceSSL = true; 37 + 38 + locations."/" = { 39 + proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}"; 40 + }; 41 + 42 + extraConfig = "proxy_ssl_server_name on;"; 43 + 44 + }; 45 + }; 46 + }; 47 + }
+82
modules/nixos/services/tangled.nix
··· 1 + { inputs, lib, self, config, ... }: 2 + let 3 + inherit (lib) mkMerge mkIf; 4 + inherit (lib.types) str; 5 + inherit (self.lib.modules) mkServiceOpt mkOpt; 6 + 7 + cfg = config.sylveon.services.tangled; 8 + in 9 + { 10 + 11 + imports = [ 12 + inputs.tangled.nixosModules.knot 13 + inputs.tangled.nixosModules.spindle 14 + ]; 15 + 16 + options.sylveon.services.tangled = { 17 + owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance"; 18 + 19 + knot = 20 + mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; }; 21 + 22 + spindle = 23 + mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; }; 24 + }; 25 + 26 + config = { 27 + services = mkMerge [ 28 + (mkIf cfg.knot.enable { 29 + tangled.knot = { 30 + enable = true; 31 + 32 + server = { 33 + inherit (cfg) owner; 34 + hostname = cfg.knot.domain; 35 + }; 36 + 37 + motd = '' 38 + >> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner}) 39 + ''; 40 + }; 41 + 42 + # Create proxy entry 43 + nginx.virtualHosts.${cfg.knot.domain} = { 44 + enableACME = true; 45 + forceSSL = true; 46 + 47 + locations."/" = { 48 + proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}"; 49 + proxyWebsockets = true; 50 + }; 51 + 52 + extraConfig = "proxy_ssl_server_name on;"; 53 + }; 54 + }) 55 + 56 + (mkIf cfg.spindle.enable { 57 + tangled.spindle = { 58 + enable = true; 59 + 60 + server = { 61 + inherit (cfg) owner; 62 + hostname = cfg.spindle.domain; 63 + }; 64 + }; 65 + 66 + 67 + # Create proxy entry 68 + nginx.virtualHosts.${cfg.spindle.domain} = { 69 + enableACME = true; 70 + forceSSL = true; 71 + 72 + locations."/" = { 73 + proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}"; 74 + proxyWebsockets = true; 75 + }; 76 + 77 + extraConfig = "proxy_ssl_server_name on;"; 78 + }; 79 + }) 80 + ]; 81 + }; 82 + }
+45
modules/nixos/style.nix
··· 1 + { 2 + inputs, 3 + config, 4 + lib, 5 + ... 6 + }: 7 + let 8 + prof = config.sylveon.profiles; 9 + in 10 + { 11 + # Some catppuccin configuration only work on nixos 12 + # This file might be changed because the idea of theming will be renewed 13 + 14 + imports = [ inputs.catppuccin.nixosModules.catppuccin ]; 15 + 16 + config = { 17 + catppuccin = { 18 + inherit (prof.graphical) enable; 19 + cache.enable = true; 20 + 21 + accent = "flamingo"; 22 + flavor = "mocha"; 23 + }; 24 + 25 + # https://github.com/isabelroses/dotfiles/blob/88d1cb29e2da4ef977b4a06fcbf9a22efbd398a7/modules/nixos/catppuccin.nix#L21 26 + console.colors = lib.mkIf config.catppuccin.enable [ 27 + "1e1e2e" 28 + "f38ba8" 29 + "a6e3a1" 30 + "f9e2af" 31 + "89b4fa" 32 + "f5c2e7" 33 + "94e2d5" 34 + "bac2de" 35 + "585b70" 36 + "f38ba8" 37 + "a6e3a1" 38 + "f9e2af" 39 + "89b4fa" 40 + "f5c2e7" 41 + "94e2d5" 42 + "a6adc8" 43 + ]; 44 + }; 45 + }
+9
secrets/piper-env.age
··· 1 + age-encryption.org/v1 2 + -> piv-p256 3eMZ2w Ayqd3HhxKkUWfKgQPMYVAubp9epHJyniP9sKb9fpTBLY 3 + aaAyZ4lqXYArnlRiunmEg869BSFXj4YbyyTnRxlpVDU 4 + -> po}y-grease ;IcPr [r|%9 {2xK,: 5 + KO+GNHYFrAOMlGhb2fwHNqovaDtox4IfDxOzom407c2gOl56lSq7e2odJYMdUvf2 6 + /aClPQoFOAGVipSrkRU 7 + --- AqUx53QjjAlOllgZzPC/3S6YmSXmqYYioxeMqmYHuds 8 + B$�P���B�a37�u�L��pa}���dN�f�J�#��.;�N�7:�n� 9 + �s׮���]o��b5�g�a-*tw�7�v�H ���* �o�\��6�����L�)��s�Fk��㡯)LѬDfқ��\J���� �I 0���!i;ya�*���ީt�Nj�g�eKr�a��&��8Z�$����:m٩
+5 -9
systems/apricot/default.nix
··· 12 12 networking.hostName = "apricot"; 13 13 14 14 sylveon = { 15 - profiles = { 16 - server.enable = true; 17 - }; 15 + profiles.server.enable = true; 18 16 19 17 device.cpu = "intel"; 20 18 ··· 31 29 glance.enable = true; 32 30 kitchenowl.enable = true; 33 31 34 - atprotocol = { 35 - tangled = { 36 - knot.enable = true; 37 - spindle.enable = true; 38 - }; 32 + tangled = { 33 + knot.enable = true; 34 + spindle.enable = true; 39 35 }; 36 + piper.enable = true; 40 37 41 38 plex.enable = true; 42 - 43 39 minecraft.enable = true; 44 40 }; 45 41 };
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age

This is a binary file and will not be displayed.