assets/wallpaper/catppuccin-cat.png
assets/wallpaper/catppuccin-cat.png
This is a binary file and will not be displayed.
+270
-431
flake.lock
+270
-431
flake.lock
···
9
"rust-overlay": "rust-overlay"
10
},
11
"locked": {
12
-
"lastModified": 1762188647,
13
-
"narHash": "sha256-OAXK4p7WIYUcp8xx9m0RZUpV6XUDEhkoM4efI8dzPiU=",
14
"owner": "ezKEa",
15
"repo": "aagl-gtk-on-nix",
16
-
"rev": "1172be1377bc65581004f4d5927b58c5c7d96639",
17
"type": "github"
18
},
19
"original": {
···
48
"systems": "systems"
49
},
50
"locked": {
51
-
"lastModified": 1761656077,
52
-
"narHash": "sha256-lsNWuj4Z+pE7s0bd2OKicOFq9bK86JE0ZGeKJbNqb94=",
53
"owner": "ryantm",
54
"repo": "agenix",
55
-
"rev": "9ba0d85de3eaa7afeab493fed622008b6e4924f5",
56
"type": "github"
57
},
58
"original": {
···
85
"type": "github"
86
}
87
},
88
-
"base16": {
89
-
"inputs": {
90
-
"fromYaml": "fromYaml"
91
-
},
92
-
"locked": {
93
-
"lastModified": 1755819240,
94
-
"narHash": "sha256-qcMhnL7aGAuFuutH4rq9fvAhCpJWVHLcHVZLtPctPlo=",
95
-
"owner": "SenchoPens",
96
-
"repo": "base16.nix",
97
-
"rev": "75ed5e5e3fce37df22e49125181fa37899c3ccd6",
98
-
"type": "github"
99
-
},
100
-
"original": {
101
-
"owner": "SenchoPens",
102
-
"repo": "base16.nix",
103
-
"type": "github"
104
-
}
105
-
},
106
-
"base16-fish": {
107
-
"flake": false,
108
-
"locked": {
109
-
"lastModified": 1754405784,
110
-
"narHash": "sha256-l9xHIy+85FN+bEo6yquq2IjD1rSg9fjfjpyGP1W8YXo=",
111
-
"owner": "tomyun",
112
-
"repo": "base16-fish",
113
-
"rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561",
114
-
"type": "github"
115
-
},
116
-
"original": {
117
-
"owner": "tomyun",
118
-
"repo": "base16-fish",
119
-
"rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561",
120
-
"type": "github"
121
-
}
122
-
},
123
-
"base16-helix": {
124
-
"flake": false,
125
-
"locked": {
126
-
"lastModified": 1752979451,
127
-
"narHash": "sha256-0CQM+FkYy0fOO/sMGhOoNL80ftsAzYCg9VhIrodqusM=",
128
-
"owner": "tinted-theming",
129
-
"repo": "base16-helix",
130
-
"rev": "27cf1e66e50abc622fb76a3019012dc07c678fac",
131
-
"type": "github"
132
-
},
133
-
"original": {
134
-
"owner": "tinted-theming",
135
-
"repo": "base16-helix",
136
-
"type": "github"
137
-
}
138
-
},
139
-
"base16-vim": {
140
-
"flake": false,
141
-
"locked": {
142
-
"lastModified": 1732806396,
143
-
"narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
144
-
"owner": "tinted-theming",
145
-
"repo": "base16-vim",
146
-
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
147
-
"type": "github"
148
-
},
149
-
"original": {
150
-
"owner": "tinted-theming",
151
-
"repo": "base16-vim",
152
-
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
153
-
"type": "github"
154
-
}
155
-
},
156
"cachix": {
157
"inputs": {
158
"devenv": [
···
189
"type": "github"
190
}
191
},
192
"darwin": {
193
"inputs": {
194
"nixpkgs": [
···
215
"inputs": {
216
"cachix": "cachix",
217
"flake-compat": "flake-compat_6",
218
-
"flake-parts": "flake-parts_7",
219
"git-hooks": "git-hooks",
220
"nix": "nix",
221
-
"nixpkgs": "nixpkgs_6"
222
},
223
"locked": {
224
"lastModified": 1760162706,
···
270
"type": "github"
271
}
272
},
273
-
"firefox-gnome-theme": {
274
-
"flake": false,
275
-
"locked": {
276
-
"lastModified": 1758112371,
277
-
"narHash": "sha256-lizRM2pj6PHrR25yimjyFn04OS4wcdbc38DCdBVa2rk=",
278
-
"owner": "rafaelmardojai",
279
-
"repo": "firefox-gnome-theme",
280
-
"rev": "0909cfe4a2af8d358ad13b20246a350e14c2473d",
281
-
"type": "github"
282
-
},
283
-
"original": {
284
-
"owner": "rafaelmardojai",
285
-
"repo": "firefox-gnome-theme",
286
-
"type": "github"
287
-
}
288
-
},
289
"flake-compat": {
290
"flake": false,
291
"locked": {
···
341
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
342
"revCount": 69,
343
"type": "tarball",
344
-
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz?rev=ff81ac966bb2cae68946d5ed5fc4994f96d0ffec&revCount=69"
345
},
346
"original": {
347
"type": "tarball",
···
406
]
407
},
408
"locked": {
409
-
"lastModified": 1762040540,
410
-
"narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=",
411
"owner": "hercules-ci",
412
"repo": "flake-parts",
413
-
"rev": "0010412d62a25d959151790968765a70c436598b",
414
"type": "github"
415
},
416
"original": {
···
424
"nixpkgs-lib": "nixpkgs-lib"
425
},
426
"locked": {
427
-
"lastModified": 1762040540,
428
-
"narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=",
429
"owner": "hercules-ci",
430
"repo": "flake-parts",
431
-
"rev": "0010412d62a25d959151790968765a70c436598b",
432
"type": "github"
433
},
434
"original": {
···
442
"nixpkgs-lib": "nixpkgs-lib_2"
443
},
444
"locked": {
445
-
"lastModified": 1754091436,
446
-
"narHash": "sha256-XKqDMN1/Qj1DKivQvscI4vmHfDfvYR2pfuFOJiCeewM=",
447
"owner": "hercules-ci",
448
"repo": "flake-parts",
449
-
"rev": "67df8c627c2c39c41dbec76a1f201929929ab0bd",
450
"type": "github"
451
},
452
"original": {
···
463
]
464
},
465
"locked": {
466
-
"lastModified": 1760948891,
467
-
"narHash": "sha256-TmWcdiUUaWk8J4lpjzu4gCGxWY6/Ok7mOK4fIFfBuU4=",
468
"owner": "hercules-ci",
469
"repo": "flake-parts",
470
-
"rev": "864599284fc7c0ba6357ed89ed5e2cd5040f0c04",
471
"type": "github"
472
},
473
"original": {
···
479
"flake-parts_6": {
480
"inputs": {
481
"nixpkgs-lib": [
482
-
"stylix",
483
-
"nixpkgs"
484
-
]
485
-
},
486
-
"locked": {
487
-
"lastModified": 1756770412,
488
-
"narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
489
-
"owner": "hercules-ci",
490
-
"repo": "flake-parts",
491
-
"rev": "4524271976b625a4a605beefd893f270620fd751",
492
-
"type": "github"
493
-
},
494
-
"original": {
495
-
"owner": "hercules-ci",
496
-
"repo": "flake-parts",
497
-
"type": "github"
498
-
}
499
-
},
500
-
"flake-parts_7": {
501
-
"inputs": {
502
-
"nixpkgs-lib": [
503
"tidaLuna",
504
"devenv",
505
"nixpkgs"
···
519
"type": "github"
520
}
521
},
522
-
"flake-parts_8": {
523
"inputs": {
524
"nixpkgs-lib": "nixpkgs-lib_3"
525
},
···
556
},
557
"flake-utils_2": {
558
"inputs": {
559
-
"systems": "systems_6"
560
},
561
"locked": {
562
-
"lastModified": 1694529238,
563
-
"narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=",
564
"owner": "numtide",
565
"repo": "flake-utils",
566
-
"rev": "ff7b65b44d01cf9ba6a71320833626af21126384",
567
"type": "github"
568
},
569
"original": {
···
574
},
575
"flake-utils_3": {
576
"inputs": {
577
-
"systems": "systems_8"
578
},
579
"locked": {
580
"lastModified": 1731533236,
···
587
"original": {
588
"owner": "numtide",
589
"repo": "flake-utils",
590
-
"type": "github"
591
-
}
592
-
},
593
-
"fromYaml": {
594
-
"flake": false,
595
-
"locked": {
596
-
"lastModified": 1731966426,
597
-
"narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=",
598
-
"owner": "SenchoPens",
599
-
"repo": "fromYaml",
600
-
"rev": "106af9e2f715e2d828df706c386a685698f3223b",
601
-
"type": "github"
602
-
},
603
-
"original": {
604
-
"owner": "SenchoPens",
605
-
"repo": "fromYaml",
606
"type": "github"
607
}
608
},
···
679
"type": "github"
680
}
681
},
682
-
"gnome-shell": {
683
-
"flake": false,
684
-
"locked": {
685
-
"lastModified": 1748186689,
686
-
"narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=",
687
-
"owner": "GNOME",
688
-
"repo": "gnome-shell",
689
-
"rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0",
690
-
"type": "github"
691
-
},
692
-
"original": {
693
-
"owner": "GNOME",
694
-
"ref": "48.2",
695
-
"repo": "gnome-shell",
696
-
"type": "github"
697
-
}
698
-
},
699
"gomod2nix": {
700
"inputs": {
701
-
"flake-utils": "flake-utils_2",
702
"nixpkgs": [
703
"tangled",
704
"nixpkgs"
705
]
706
},
707
"locked": {
708
-
"lastModified": 1754078208,
709
-
"narHash": "sha256-YVoIFDCDpYuU3riaDEJ3xiGdPOtsx4sR5eTzHTytPV8=",
710
"owner": "nix-community",
711
"repo": "gomod2nix",
712
-
"rev": "7f963246a71626c7fc70b431a315c4388a0c95cf",
713
"type": "github"
714
},
715
"original": {
···
741
},
742
"home-manager_2": {
743
"inputs": {
744
-
"nixpkgs": "nixpkgs_2"
745
},
746
"locked": {
747
-
"lastModified": 1762296971,
748
-
"narHash": "sha256-Jyv3L5rrUYpecON+9zyFz2VqgTSTsIG35fXuCyuCQv0=",
749
"owner": "nix-community",
750
"repo": "home-manager",
751
-
"rev": "34fe48801d2a5301b814eaa1efb496499d06cebc",
752
"type": "github"
753
},
754
"original": {
···
823
"url": "https://github.com/rsms/inter/releases/download/v4.1/Inter-4.1.zip"
824
}
825
},
826
-
"ixx": {
827
-
"inputs": {
828
-
"flake-utils": [
829
-
"nixvim",
830
-
"nuschtosSearch",
831
-
"flake-utils"
832
-
],
833
-
"nixpkgs": [
834
-
"nixvim",
835
-
"nuschtosSearch",
836
-
"nixpkgs"
837
-
]
838
-
},
839
-
"locked": {
840
-
"lastModified": 1754860581,
841
-
"narHash": "sha256-EM0IE63OHxXCOpDHXaTyHIOk2cNvMCGPqLt/IdtVxgk=",
842
-
"owner": "NuschtOS",
843
-
"repo": "ixx",
844
-
"rev": "babfe85a876162c4acc9ab6fb4483df88fa1f281",
845
-
"type": "github"
846
-
},
847
-
"original": {
848
-
"owner": "NuschtOS",
849
-
"ref": "v0.1.1",
850
-
"repo": "ixx",
851
-
"type": "github"
852
-
}
853
-
},
854
"lix": {
855
"inputs": {
856
"flake-compat": "flake-compat_3",
···
863
"pre-commit-hooks": "pre-commit-hooks_2"
864
},
865
"locked": {
866
-
"lastModified": 1762212942,
867
-
"narHash": "sha256-DTwYxw0oiJfe6FtdJ+6KbqQeKUoV9E0nEUUwtwcF42U=",
868
-
"rev": "f369c711dd8bd6eec6905645dab9a153ebbba0a8",
869
"type": "tarball",
870
-
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/f369c711dd8bd6eec6905645dab9a153ebbba0a8.tar.gz?rev=f369c711dd8bd6eec6905645dab9a153ebbba0a8"
871
},
872
"original": {
873
"type": "tarball",
···
957
]
958
},
959
"locked": {
960
-
"lastModified": 1762307771,
961
-
"narHash": "sha256-IJWQ1NlFRATSrGa5eZdg9kQynDJOwT6WAY/P5KHAMBc=",
962
"owner": "fufexan",
963
"repo": "nix-gaming",
964
-
"rev": "4e3340a53ea9f6b79168050a3e4b9c3944ff158e",
965
"type": "github"
966
},
967
"original": {
···
970
"type": "github"
971
}
972
},
973
"nix2container": {
974
"flake": false,
975
"locked": {
···
993
"flake-compat"
994
],
995
"lowdown-src": "lowdown-src",
996
-
"nixpkgs": "nixpkgs_3",
997
"nixpkgs-regression": [
998
"lix",
999
"nixpkgs-regression"
···
1023
]
1024
},
1025
"locked": {
1026
-
"lastModified": 1758701706,
1027
-
"narHash": "sha256-aEwPAnMQ/FIisvGswjm9T+QkIptuXDzeUo8vxTTX/Io=",
1028
-
"owner": "xaiyadev",
1029
"repo": "nixcord",
1030
-
"rev": "418e383f8dc3a47b60e3ea16b06c7671b0e65ec2",
1031
"type": "github"
1032
},
1033
"original": {
1034
-
"owner": "xaiyadev",
1035
-
"ref": "fix/user-cfg-no-option",
1036
"repo": "nixcord",
1037
"type": "github"
1038
}
1039
},
1040
"nixos-hardware": {
1041
"locked": {
1042
-
"lastModified": 1762336257,
1043
-
"narHash": "sha256-2u5rstcMTqpAr4UF+exs5WGOT62VJRb4yauR6JJHJXs=",
1044
"owner": "NixOS",
1045
"repo": "nixos-hardware",
1046
-
"rev": "d48e8f0e1691e0200a675c13df7c85e275090a15",
1047
"type": "github"
1048
},
1049
"original": {
···
1071
},
1072
"nixpkgs-lib": {
1073
"locked": {
1074
-
"lastModified": 1761765539,
1075
-
"narHash": "sha256-b0yj6kfvO8ApcSE+QmA6mUfu8IYG6/uU28OFn4PaC8M=",
1076
"owner": "nix-community",
1077
"repo": "nixpkgs.lib",
1078
-
"rev": "719359f4562934ae99f5443f20aa06c2ffff91fc",
1079
"type": "github"
1080
},
1081
"original": {
···
1086
},
1087
"nixpkgs-lib_2": {
1088
"locked": {
1089
-
"lastModified": 1753579242,
1090
-
"narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=",
1091
"owner": "nix-community",
1092
"repo": "nixpkgs.lib",
1093
-
"rev": "0f36c44e01a6129be94e3ade315a5883f0228a6e",
1094
"type": "github"
1095
},
1096
"original": {
···
1130
"type": "github"
1131
}
1132
},
1133
"nixpkgs_2": {
1134
"locked": {
1135
-
"lastModified": 1761907660,
1136
-
"narHash": "sha256-kJ8lIZsiPOmbkJypG+B5sReDXSD1KGu2VEPNqhRa/ew=",
1137
"owner": "NixOS",
1138
"repo": "nixpkgs",
1139
-
"rev": "2fb006b87f04c4d3bdf08cfdbc7fab9c13d94a15",
1140
"type": "github"
1141
},
1142
"original": {
···
1148
},
1149
"nixpkgs_3": {
1150
"locked": {
1151
-
"lastModified": 1705033721,
1152
-
"narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=",
1153
"owner": "NixOS",
1154
"repo": "nixpkgs",
1155
-
"rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea",
1156
"type": "github"
1157
},
1158
"original": {
1159
"owner": "NixOS",
1160
-
"ref": "nixos-23.05-small",
1161
"repo": "nixpkgs",
1162
"type": "github"
1163
}
1164
},
1165
"nixpkgs_4": {
1166
"locked": {
1167
-
"lastModified": 1762111121,
1168
-
"narHash": "sha256-4vhDuZ7OZaZmKKrnDpxLZZpGIJvAeMtK6FKLJYUtAdw=",
1169
"owner": "NixOS",
1170
"repo": "nixpkgs",
1171
-
"rev": "b3d51a0365f6695e7dd5cdf3e180604530ed33b4",
1172
"type": "github"
1173
},
1174
"original": {
1175
"owner": "NixOS",
1176
-
"ref": "nixos-unstable",
1177
"repo": "nixpkgs",
1178
"type": "github"
1179
}
1180
},
1181
"nixpkgs_5": {
1182
"locked": {
1183
-
"lastModified": 1761656231,
1184
-
"narHash": "sha256-EiED5k6gXTWoAIS8yQqi5mAX6ojnzpHwAQTS3ykeYMg=",
1185
"owner": "NixOS",
1186
"repo": "nixpkgs",
1187
-
"rev": "e99366c665bdd53b7b500ccdc5226675cfc51f45",
1188
"type": "github"
1189
},
1190
"original": {
1191
"owner": "NixOS",
1192
-
"ref": "nixpkgs-unstable",
1193
"repo": "nixpkgs",
1194
"type": "github"
1195
}
1196
},
1197
"nixpkgs_6": {
1198
"locked": {
1199
-
"lastModified": 1758532697,
1200
-
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1201
-
"owner": "cachix",
1202
-
"repo": "devenv-nixpkgs",
1203
-
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1204
"type": "github"
1205
},
1206
"original": {
1207
-
"owner": "cachix",
1208
-
"ref": "rolling",
1209
-
"repo": "devenv-nixpkgs",
1210
"type": "github"
1211
}
1212
},
1213
"nixpkgs_7": {
1214
"locked": {
1215
-
"lastModified": 1760103332,
1216
-
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1217
"owner": "NixOS",
1218
"repo": "nixpkgs",
1219
-
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1220
"type": "github"
1221
},
1222
"original": {
···
1226
"type": "github"
1227
}
1228
},
1229
-
"nixvim": {
1230
-
"inputs": {
1231
-
"flake-parts": "flake-parts_5",
1232
-
"nixpkgs": "nixpkgs_5",
1233
-
"nuschtosSearch": "nuschtosSearch",
1234
-
"systems": "systems_3"
1235
-
},
1236
"locked": {
1237
-
"lastModified": 1762293638,
1238
-
"narHash": "sha256-svsYLbxNq8EZoVtNF97wCAElZ2py5Q1p7viG6lTUixA=",
1239
-
"owner": "nix-community",
1240
-
"repo": "nixvim",
1241
-
"rev": "aa3a1dfb028cd09b8061862f9dd8d859467fc7ed",
1242
-
"type": "github"
1243
},
1244
"original": {
1245
-
"owner": "nix-community",
1246
-
"repo": "nixvim",
1247
-
"type": "github"
1248
}
1249
},
1250
-
"nur": {
1251
-
"inputs": {
1252
-
"flake-parts": [
1253
-
"stylix",
1254
-
"flake-parts"
1255
-
],
1256
-
"nixpkgs": [
1257
-
"stylix",
1258
-
"nixpkgs"
1259
-
]
1260
-
},
1261
"locked": {
1262
-
"lastModified": 1758998580,
1263
-
"narHash": "sha256-VLx0z396gDCGSiowLMFz5XRO/XuNV+4EnDYjdJhHvUk=",
1264
-
"owner": "nix-community",
1265
-
"repo": "NUR",
1266
-
"rev": "ba8d9c98f5f4630bcb0e815ab456afd90c930728",
1267
"type": "github"
1268
},
1269
"original": {
1270
-
"owner": "nix-community",
1271
-
"repo": "NUR",
1272
"type": "github"
1273
}
1274
},
1275
-
"nuschtosSearch": {
1276
"inputs": {
1277
-
"flake-utils": "flake-utils",
1278
-
"ixx": "ixx",
1279
-
"nixpkgs": [
1280
-
"nixvim",
1281
-
"nixpkgs"
1282
-
]
1283
},
1284
"locked": {
1285
-
"lastModified": 1761730856,
1286
-
"narHash": "sha256-t1i5p/vSWwueZSC0Z2BImxx3BjoUDNKyC2mk24krcMY=",
1287
-
"owner": "NuschtOS",
1288
-
"repo": "search",
1289
-
"rev": "e29de6db0cb3182e9aee75a3b1fd1919d995d85b",
1290
"type": "github"
1291
},
1292
"original": {
1293
-
"owner": "NuschtOS",
1294
-
"repo": "search",
1295
"type": "github"
1296
}
1297
},
···
1339
"aagl": "aagl",
1340
"agenix": "agenix",
1341
"agenix-rekey": "agenix-rekey",
1342
"easy-hosts": "easy-hosts",
1343
"flake-parts": "flake-parts_2",
1344
"home-manager": "home-manager_2",
1345
"lix": "lix",
1346
"nix-gaming": "nix-gaming",
1347
"nixcord": "nixcord",
1348
"nixos-hardware": "nixos-hardware",
1349
-
"nixpkgs": "nixpkgs_4",
1350
"nixvim": "nixvim",
1351
-
"stylix": "stylix",
1352
"systems": "systems_5",
1353
"tangled": "tangled",
1354
"tidaLuna": "tidaLuna",
1355
"tinted-theming-schemes": "tinted-theming-schemes",
1356
"vicinae": "vicinae"
···
1361
"nixpkgs": "nixpkgs"
1362
},
1363
"locked": {
1364
-
"lastModified": 1761791894,
1365
-
"narHash": "sha256-myRIDh+PxaREz+z9LzbqBJF+SnTFJwkthKDX9zMyddY=",
1366
"owner": "oxalica",
1367
"repo": "rust-overlay",
1368
-
"rev": "59c45eb69d9222a4362673141e00ff77842cd219",
1369
"type": "github"
1370
},
1371
"original": {
···
1374
"type": "github"
1375
}
1376
},
1377
-
"sqlite-lib-src": {
1378
-
"flake": false,
1379
"locked": {
1380
-
"lastModified": 1706631843,
1381
-
"narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=",
1382
-
"type": "tarball",
1383
-
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1384
},
1385
"original": {
1386
-
"type": "tarball",
1387
-
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1388
}
1389
},
1390
-
"stylix": {
1391
"inputs": {
1392
-
"base16": "base16",
1393
-
"base16-fish": "base16-fish",
1394
-
"base16-helix": "base16-helix",
1395
-
"base16-vim": "base16-vim",
1396
-
"firefox-gnome-theme": "firefox-gnome-theme",
1397
-
"flake-parts": "flake-parts_6",
1398
-
"gnome-shell": "gnome-shell",
1399
"nixpkgs": [
1400
"nixpkgs"
1401
-
],
1402
-
"nur": "nur",
1403
-
"systems": "systems_4",
1404
-
"tinted-foot": "tinted-foot",
1405
-
"tinted-kitty": "tinted-kitty",
1406
-
"tinted-schemes": "tinted-schemes",
1407
-
"tinted-tmux": "tinted-tmux",
1408
-
"tinted-zed": "tinted-zed"
1409
},
1410
"locked": {
1411
-
"lastModified": 1762264356,
1412
-
"narHash": "sha256-QVfC53Ri+8n3e7Ujx9kq6all3+TLBRRPRnc6No5qY5w=",
1413
-
"owner": "danth",
1414
-
"repo": "stylix",
1415
-
"rev": "647bb8dd96a206a1b79c4fd714affc88b409e10b",
1416
"type": "github"
1417
},
1418
"original": {
1419
-
"owner": "danth",
1420
-
"repo": "stylix",
1421
"type": "github"
1422
}
1423
},
1424
"systems": {
···
1558
"sqlite-lib-src": "sqlite-lib-src"
1559
},
1560
"locked": {
1561
-
"lastModified": 1763438625,
1562
-
"narHash": "sha256-INS8/F1kLnA/RmGe9oXNHKfo5WR0OTXkh/Y0SB2gpyE=",
1563
"ref": "refs/heads/master",
1564
-
"rev": "2be5f4ac9581e4ff1c5656f698e494c99630202c",
1565
-
"revCount": 1674,
1566
"type": "git",
1567
"url": "https://tangled.org/tangled.org/core"
1568
},
···
1571
"url": "https://tangled.org/tangled.org/core"
1572
}
1573
},
1574
-
"tidaLuna": {
1575
"inputs": {
1576
-
"devenv": "devenv",
1577
-
"flake-parts": "flake-parts_8",
1578
-
"nixpkgs": "nixpkgs_7",
1579
-
"systems": "systems_7"
1580
},
1581
"locked": {
1582
-
"lastModified": 1762313683,
1583
-
"narHash": "sha256-m9M2MdX2yygsCNfH0P56aeJtEt4ax/t/cOhk4Mehs5c=",
1584
-
"owner": "Inrixia",
1585
-
"repo": "TidaLuna",
1586
-
"rev": "649bdd566fb5dcc1b45a3d5ef4d3a81ddbc333cd",
1587
"type": "github"
1588
},
1589
"original": {
1590
-
"owner": "Inrixia",
1591
-
"repo": "TidaLuna",
1592
"type": "github"
1593
}
1594
},
1595
-
"tinted-foot": {
1596
-
"flake": false,
1597
-
"locked": {
1598
-
"lastModified": 1726913040,
1599
-
"narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=",
1600
-
"owner": "tinted-theming",
1601
-
"repo": "tinted-foot",
1602
-
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
1603
-
"type": "github"
1604
},
1605
-
"original": {
1606
-
"owner": "tinted-theming",
1607
-
"repo": "tinted-foot",
1608
-
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
1609
-
"type": "github"
1610
-
}
1611
-
},
1612
-
"tinted-kitty": {
1613
-
"flake": false,
1614
"locked": {
1615
-
"lastModified": 1735730497,
1616
-
"narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=",
1617
-
"owner": "tinted-theming",
1618
-
"repo": "tinted-kitty",
1619
-
"rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa",
1620
-
"type": "github"
1621
-
},
1622
-
"original": {
1623
-
"owner": "tinted-theming",
1624
-
"repo": "tinted-kitty",
1625
-
"type": "github"
1626
-
}
1627
-
},
1628
-
"tinted-schemes": {
1629
-
"flake": false,
1630
-
"locked": {
1631
-
"lastModified": 1757716333,
1632
-
"narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=",
1633
-
"owner": "tinted-theming",
1634
-
"repo": "schemes",
1635
-
"rev": "317a5e10c35825a6c905d912e480dfe8e71c7559",
1636
"type": "github"
1637
},
1638
"original": {
1639
-
"owner": "tinted-theming",
1640
-
"repo": "schemes",
1641
"type": "github"
1642
}
1643
},
1644
"tinted-theming-schemes": {
1645
"flake": false,
1646
"locked": {
1647
-
"lastModified": 1757716333,
1648
-
"narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=",
1649
"owner": "tinted-theming",
1650
"repo": "schemes",
1651
-
"rev": "317a5e10c35825a6c905d912e480dfe8e71c7559",
1652
"type": "github"
1653
},
1654
"original": {
···
1657
"type": "github"
1658
}
1659
},
1660
-
"tinted-tmux": {
1661
-
"flake": false,
1662
-
"locked": {
1663
-
"lastModified": 1757811970,
1664
-
"narHash": "sha256-n5ZJgmzGZXOD9pZdAl1OnBu3PIqD+X3vEBUGbTi4JiI=",
1665
-
"owner": "tinted-theming",
1666
-
"repo": "tinted-tmux",
1667
-
"rev": "d217ba31c846006e9e0ae70775b0ee0f00aa6b1e",
1668
-
"type": "github"
1669
-
},
1670
-
"original": {
1671
-
"owner": "tinted-theming",
1672
-
"repo": "tinted-tmux",
1673
-
"type": "github"
1674
-
}
1675
-
},
1676
-
"tinted-zed": {
1677
-
"flake": false,
1678
-
"locked": {
1679
-
"lastModified": 1757811247,
1680
-
"narHash": "sha256-4EFOUyLj85NRL3OacHoLGEo0wjiRJzfsXtR4CZWAn6w=",
1681
-
"owner": "tinted-theming",
1682
-
"repo": "base16-zed",
1683
-
"rev": "824fe0aacf82b3c26690d14e8d2cedd56e18404e",
1684
-
"type": "github"
1685
-
},
1686
-
"original": {
1687
-
"owner": "tinted-theming",
1688
-
"repo": "base16-zed",
1689
-
"type": "github"
1690
-
}
1691
-
},
1692
"treefmt-nix": {
1693
"inputs": {
1694
"nixpkgs": [
···
1712
},
1713
"vicinae": {
1714
"inputs": {
1715
-
"flake-utils": "flake-utils_3",
1716
"nixpkgs": [
1717
"nixpkgs"
1718
-
]
1719
},
1720
"locked": {
1721
-
"lastModified": 1762327833,
1722
-
"narHash": "sha256-mw+2Tylv6otpiXpyN5bBqxrsZvEVYPSKgaNUI2yzazQ=",
1723
"owner": "vicinaehq",
1724
"repo": "vicinae",
1725
-
"rev": "de12226d691f084bd2033239be8243a11451f3c3",
1726
"type": "github"
1727
},
1728
"original": {
···
9
"rust-overlay": "rust-overlay"
10
},
11
"locked": {
12
+
"lastModified": 1767520119,
13
+
"narHash": "sha256-+OmNQLA9Fv5WBaxYHlPghS9XmnYWDaLt+AatCGhG+hc=",
14
"owner": "ezKEa",
15
"repo": "aagl-gtk-on-nix",
16
+
"rev": "5720d3282844b6b23b26dfac075a5f1f58ea8844",
17
"type": "github"
18
},
19
"original": {
···
48
"systems": "systems"
49
},
50
"locked": {
51
+
"lastModified": 1762618334,
52
+
"narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=",
53
"owner": "ryantm",
54
"repo": "agenix",
55
+
"rev": "fcdea223397448d35d9b31f798479227e80183f6",
56
"type": "github"
57
},
58
"original": {
···
85
"type": "github"
86
}
87
},
88
"cachix": {
89
"inputs": {
90
"devenv": [
···
121
"type": "github"
122
}
123
},
124
+
"catppuccin": {
125
+
"inputs": {
126
+
"nixpkgs": "nixpkgs_2"
127
+
},
128
+
"locked": {
129
+
"lastModified": 1767720192,
130
+
"narHash": "sha256-gA2dpQr/REM9D4SUdMwioAATnXmOZz/eVIladxEISRA=",
131
+
"owner": "catppuccin",
132
+
"repo": "nix",
133
+
"rev": "bbda4b492ba33c1ca04385792c93dda1a3a28f64",
134
+
"type": "github"
135
+
},
136
+
"original": {
137
+
"owner": "catppuccin",
138
+
"repo": "nix",
139
+
"type": "github"
140
+
}
141
+
},
142
"darwin": {
143
"inputs": {
144
"nixpkgs": [
···
165
"inputs": {
166
"cachix": "cachix",
167
"flake-compat": "flake-compat_6",
168
+
"flake-parts": "flake-parts_6",
169
"git-hooks": "git-hooks",
170
"nix": "nix",
171
+
"nixpkgs": "nixpkgs_9"
172
},
173
"locked": {
174
"lastModified": 1760162706,
···
220
"type": "github"
221
}
222
},
223
"flake-compat": {
224
"flake": false,
225
"locked": {
···
275
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
276
"revCount": 69,
277
"type": "tarball",
278
+
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz"
279
},
280
"original": {
281
"type": "tarball",
···
340
]
341
},
342
"locked": {
343
+
"lastModified": 1767609335,
344
+
"narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=",
345
"owner": "hercules-ci",
346
"repo": "flake-parts",
347
+
"rev": "250481aafeb741edfe23d29195671c19b36b6dca",
348
"type": "github"
349
},
350
"original": {
···
358
"nixpkgs-lib": "nixpkgs-lib"
359
},
360
"locked": {
361
+
"lastModified": 1765835352,
362
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
363
"owner": "hercules-ci",
364
"repo": "flake-parts",
365
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
366
"type": "github"
367
},
368
"original": {
···
376
"nixpkgs-lib": "nixpkgs-lib_2"
377
},
378
"locked": {
379
+
"lastModified": 1765835352,
380
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
381
"owner": "hercules-ci",
382
"repo": "flake-parts",
383
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
384
"type": "github"
385
},
386
"original": {
···
397
]
398
},
399
"locked": {
400
+
"lastModified": 1765835352,
401
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
402
"owner": "hercules-ci",
403
"repo": "flake-parts",
404
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
405
"type": "github"
406
},
407
"original": {
···
413
"flake-parts_6": {
414
"inputs": {
415
"nixpkgs-lib": [
416
"tidaLuna",
417
"devenv",
418
"nixpkgs"
···
432
"type": "github"
433
}
434
},
435
+
"flake-parts_7": {
436
"inputs": {
437
"nixpkgs-lib": "nixpkgs-lib_3"
438
},
···
469
},
470
"flake-utils_2": {
471
"inputs": {
472
+
"systems": "systems_3"
473
},
474
"locked": {
475
+
"lastModified": 1731533236,
476
+
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
477
"owner": "numtide",
478
"repo": "flake-utils",
479
+
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
480
"type": "github"
481
},
482
"original": {
···
487
},
488
"flake-utils_3": {
489
"inputs": {
490
+
"systems": "systems_6"
491
},
492
"locked": {
493
"lastModified": 1731533236,
···
500
"original": {
501
"owner": "numtide",
502
"repo": "flake-utils",
503
"type": "github"
504
}
505
},
···
576
"type": "github"
577
}
578
},
579
"gomod2nix": {
580
"inputs": {
581
+
"flake-utils": "flake-utils_3",
582
"nixpkgs": [
583
"tangled",
584
"nixpkgs"
585
]
586
},
587
"locked": {
588
+
"lastModified": 1763982521,
589
+
"narHash": "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ=",
590
"owner": "nix-community",
591
"repo": "gomod2nix",
592
+
"rev": "02e63a239d6eabd595db56852535992c898eba72",
593
"type": "github"
594
},
595
"original": {
···
621
},
622
"home-manager_2": {
623
"inputs": {
624
+
"nixpkgs": "nixpkgs_3"
625
},
626
"locked": {
627
+
"lastModified": 1767702900,
628
+
"narHash": "sha256-xMzHmNytl7JgFRov2jHf2GYsLVp/sAfYO0JvbZt0uDo=",
629
"owner": "nix-community",
630
"repo": "home-manager",
631
+
"rev": "38e187fd2f9efac197e03be0c25f3ee215974144",
632
"type": "github"
633
},
634
"original": {
···
703
"url": "https://github.com/rsms/inter/releases/download/v4.1/Inter-4.1.zip"
704
}
705
},
706
"lix": {
707
"inputs": {
708
"flake-compat": "flake-compat_3",
···
715
"pre-commit-hooks": "pre-commit-hooks_2"
716
},
717
"locked": {
718
+
"lastModified": 1767713749,
719
+
"narHash": "sha256-56x//7ognPbg9wNs7zJTwT7PjNR992PyYbIUQA4dHoc=",
720
+
"rev": "b97b2e858babef00faa46fa557d9afe9e089a12a",
721
"type": "tarball",
722
+
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/b97b2e858babef00faa46fa557d9afe9e089a12a.tar.gz?rev=b97b2e858babef00faa46fa557d9afe9e089a12a"
723
},
724
"original": {
725
"type": "tarball",
···
809
]
810
},
811
"locked": {
812
+
"lastModified": 1767579768,
813
+
"narHash": "sha256-MDyl7tiem57OAOcPuCJrONh1PCcKj5OzJEesBrka3dk=",
814
"owner": "fufexan",
815
"repo": "nix-gaming",
816
+
"rev": "4199abcbc86b52e6878d1021da61c4e8e308e00e",
817
"type": "github"
818
},
819
"original": {
···
822
"type": "github"
823
}
824
},
825
+
"nix-jetbrains-plugins": {
826
+
"inputs": {
827
+
"flake-utils": "flake-utils",
828
+
"nix-rust-wrangler": "nix-rust-wrangler",
829
+
"nixpkgs": "nixpkgs_5",
830
+
"rust-overlay": "rust-overlay_3"
831
+
},
832
+
"locked": {
833
+
"lastModified": 1767845296,
834
+
"narHash": "sha256-o2EXCxnfi0WgCq3Mbmcn4aNwcXxfHV6/idZO+VFNIjY=",
835
+
"owner": "Janrupf",
836
+
"repo": "nix-jetbrains-plugin-repository",
837
+
"rev": "09765ba1158410cb098880161f06b8e2607c8bef",
838
+
"type": "github"
839
+
},
840
+
"original": {
841
+
"owner": "Janrupf",
842
+
"repo": "nix-jetbrains-plugin-repository",
843
+
"type": "github"
844
+
}
845
+
},
846
+
"nix-rust-wrangler": {
847
+
"inputs": {
848
+
"flake-utils": "flake-utils_2",
849
+
"nixpkgs": [
850
+
"nix-jetbrains-plugins",
851
+
"nixpkgs"
852
+
],
853
+
"rust-overlay": "rust-overlay_2"
854
+
},
855
+
"locked": {
856
+
"lastModified": 1764906652,
857
+
"narHash": "sha256-4eY+9dKYhTWx1X7AGVNfwxNlruR0Pjx16Anrm6ifnVo=",
858
+
"owner": "Janrupf",
859
+
"repo": "nix-rust-wrangler",
860
+
"rev": "ab6b5ea4d654a05fea9e1ea53359a9be16777800",
861
+
"type": "github"
862
+
},
863
+
"original": {
864
+
"owner": "Janrupf",
865
+
"repo": "nix-rust-wrangler",
866
+
"type": "github"
867
+
}
868
+
},
869
"nix2container": {
870
"flake": false,
871
"locked": {
···
889
"flake-compat"
890
],
891
"lowdown-src": "lowdown-src",
892
+
"nixpkgs": "nixpkgs_4",
893
"nixpkgs-regression": [
894
"lix",
895
"nixpkgs-regression"
···
919
]
920
},
921
"locked": {
922
+
"lastModified": 1767715368,
923
+
"narHash": "sha256-3JkfCB4MwVMLlC8N/ATth3saUF9kD1WQiIF/quDpvNo=",
924
+
"owner": "KaylorBen",
925
"repo": "nixcord",
926
+
"rev": "f391c270ad2c74a94d99cbc9ad6a57478111c6de",
927
"type": "github"
928
},
929
"original": {
930
+
"owner": "KaylorBen",
931
"repo": "nixcord",
932
"type": "github"
933
}
934
},
935
"nixos-hardware": {
936
"locked": {
937
+
"lastModified": 1767185284,
938
+
"narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=",
939
"owner": "NixOS",
940
"repo": "nixos-hardware",
941
+
"rev": "40b1a28dce561bea34858287fbb23052c3ee63fe",
942
"type": "github"
943
},
944
"original": {
···
966
},
967
"nixpkgs-lib": {
968
"locked": {
969
+
"lastModified": 1765674936,
970
+
"narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=",
971
"owner": "nix-community",
972
"repo": "nixpkgs.lib",
973
+
"rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85",
974
"type": "github"
975
},
976
"original": {
···
981
},
982
"nixpkgs-lib_2": {
983
"locked": {
984
+
"lastModified": 1765674936,
985
+
"narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=",
986
"owner": "nix-community",
987
"repo": "nixpkgs.lib",
988
+
"rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85",
989
"type": "github"
990
},
991
"original": {
···
1025
"type": "github"
1026
}
1027
},
1028
+
"nixpkgs_10": {
1029
+
"locked": {
1030
+
"lastModified": 1760103332,
1031
+
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1032
+
"owner": "NixOS",
1033
+
"repo": "nixpkgs",
1034
+
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1035
+
"type": "github"
1036
+
},
1037
+
"original": {
1038
+
"owner": "NixOS",
1039
+
"ref": "nixpkgs-unstable",
1040
+
"repo": "nixpkgs",
1041
+
"type": "github"
1042
+
}
1043
+
},
1044
"nixpkgs_2": {
1045
"locked": {
1046
+
"lastModified": 1767116409,
1047
+
"narHash": "sha256-5vKw92l1GyTnjoLzEagJy5V5mDFck72LiQWZSOnSicw=",
1048
"owner": "NixOS",
1049
"repo": "nixpkgs",
1050
+
"rev": "cad22e7d996aea55ecab064e84834289143e44a0",
1051
"type": "github"
1052
},
1053
"original": {
···
1059
},
1060
"nixpkgs_3": {
1061
"locked": {
1062
+
"lastModified": 1766902085,
1063
+
"narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=",
1064
"owner": "NixOS",
1065
"repo": "nixpkgs",
1066
+
"rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4",
1067
"type": "github"
1068
},
1069
"original": {
1070
"owner": "NixOS",
1071
+
"ref": "nixos-unstable",
1072
"repo": "nixpkgs",
1073
"type": "github"
1074
}
1075
},
1076
"nixpkgs_4": {
1077
"locked": {
1078
+
"lastModified": 1705033721,
1079
+
"narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=",
1080
"owner": "NixOS",
1081
"repo": "nixpkgs",
1082
+
"rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea",
1083
"type": "github"
1084
},
1085
"original": {
1086
"owner": "NixOS",
1087
+
"ref": "nixos-23.05-small",
1088
"repo": "nixpkgs",
1089
"type": "github"
1090
}
1091
},
1092
"nixpkgs_5": {
1093
"locked": {
1094
+
"lastModified": 1765472234,
1095
+
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
1096
"owner": "NixOS",
1097
"repo": "nixpkgs",
1098
+
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
1099
"type": "github"
1100
},
1101
"original": {
1102
"owner": "NixOS",
1103
+
"ref": "nixos-unstable",
1104
"repo": "nixpkgs",
1105
"type": "github"
1106
}
1107
},
1108
"nixpkgs_6": {
1109
"locked": {
1110
+
"lastModified": 1767640445,
1111
+
"narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=",
1112
+
"owner": "NixOS",
1113
+
"repo": "nixpkgs",
1114
+
"rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5",
1115
"type": "github"
1116
},
1117
"original": {
1118
+
"owner": "NixOS",
1119
+
"ref": "nixos-unstable",
1120
+
"repo": "nixpkgs",
1121
"type": "github"
1122
}
1123
},
1124
"nixpkgs_7": {
1125
"locked": {
1126
+
"lastModified": 1767026758,
1127
+
"narHash": "sha256-7fsac/f7nh/VaKJ/qm3I338+wAJa/3J57cOGpXi0Sbg=",
1128
"owner": "NixOS",
1129
"repo": "nixpkgs",
1130
+
"rev": "346dd96ad74dc4457a9db9de4f4f57dab2e5731d",
1131
"type": "github"
1132
},
1133
"original": {
···
1137
"type": "github"
1138
}
1139
},
1140
+
"nixpkgs_8": {
1141
"locked": {
1142
+
"lastModified": 1767364772,
1143
+
"narHash": "sha256-G6ie+qOCRSV7wzOY+6L1o8GvcH1qDcE/DTzDT4CRdNw=",
1144
+
"rev": "16c7794d0a28b5a37904d55bcca36003b9109aaa",
1145
+
"type": "tarball",
1146
+
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre921317.16c7794d0a28/nixexprs.tar.xz?lastModified=1767364772&rev=16c7794d0a28b5a37904d55bcca36003b9109aaa"
1147
},
1148
"original": {
1149
+
"type": "tarball",
1150
+
"url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz"
1151
}
1152
},
1153
+
"nixpkgs_9": {
1154
"locked": {
1155
+
"lastModified": 1758532697,
1156
+
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1157
+
"owner": "cachix",
1158
+
"repo": "devenv-nixpkgs",
1159
+
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1160
"type": "github"
1161
},
1162
"original": {
1163
+
"owner": "cachix",
1164
+
"ref": "rolling",
1165
+
"repo": "devenv-nixpkgs",
1166
"type": "github"
1167
}
1168
},
1169
+
"nixvim": {
1170
"inputs": {
1171
+
"flake-parts": "flake-parts_5",
1172
+
"nixpkgs": "nixpkgs_7",
1173
+
"systems": "systems_4"
1174
},
1175
"locked": {
1176
+
"lastModified": 1767608728,
1177
+
"narHash": "sha256-kmSJCTgrx+BxgqQOTPHAOkohvO+lbRsPWqu+PSPcz3I=",
1178
+
"owner": "nix-community",
1179
+
"repo": "nixvim",
1180
+
"rev": "851399eebd0fb383d2fd76269d859f16021dc7a8",
1181
"type": "github"
1182
},
1183
"original": {
1184
+
"owner": "nix-community",
1185
+
"repo": "nixvim",
1186
"type": "github"
1187
}
1188
},
···
1230
"aagl": "aagl",
1231
"agenix": "agenix",
1232
"agenix-rekey": "agenix-rekey",
1233
+
"catppuccin": "catppuccin",
1234
"easy-hosts": "easy-hosts",
1235
"flake-parts": "flake-parts_2",
1236
"home-manager": "home-manager_2",
1237
"lix": "lix",
1238
"nix-gaming": "nix-gaming",
1239
+
"nix-jetbrains-plugins": "nix-jetbrains-plugins",
1240
"nixcord": "nixcord",
1241
"nixos-hardware": "nixos-hardware",
1242
+
"nixpkgs": "nixpkgs_6",
1243
"nixvim": "nixvim",
1244
"systems": "systems_5",
1245
"tangled": "tangled",
1246
+
"tgirlpkgs": "tgirlpkgs",
1247
"tidaLuna": "tidaLuna",
1248
"tinted-theming-schemes": "tinted-theming-schemes",
1249
"vicinae": "vicinae"
···
1254
"nixpkgs": "nixpkgs"
1255
},
1256
"locked": {
1257
+
"lastModified": 1764470739,
1258
+
"narHash": "sha256-sa9f81B1dWO16QtgDTWHX8DQbiHKzHndpaunY5EQtwE=",
1259
"owner": "oxalica",
1260
"repo": "rust-overlay",
1261
+
"rev": "3bfa664055e1a09c6aedab5533c5fc8d6ca5741a",
1262
"type": "github"
1263
},
1264
"original": {
···
1267
"type": "github"
1268
}
1269
},
1270
+
"rust-overlay_2": {
1271
+
"inputs": {
1272
+
"nixpkgs": [
1273
+
"nix-jetbrains-plugins",
1274
+
"nix-rust-wrangler",
1275
+
"nixpkgs"
1276
+
]
1277
+
},
1278
"locked": {
1279
+
"lastModified": 1764902447,
1280
+
"narHash": "sha256-wNqkDBj+tjK619sTHPEA7uhjr7DHHEY8OsFou31dxy0=",
1281
+
"owner": "oxalica",
1282
+
"repo": "rust-overlay",
1283
+
"rev": "d914a744a83098eeb28125d2848ad383b209223f",
1284
+
"type": "github"
1285
},
1286
"original": {
1287
+
"owner": "oxalica",
1288
+
"repo": "rust-overlay",
1289
+
"type": "github"
1290
}
1291
},
1292
+
"rust-overlay_3": {
1293
"inputs": {
1294
"nixpkgs": [
1295
+
"nix-jetbrains-plugins",
1296
"nixpkgs"
1297
+
]
1298
},
1299
"locked": {
1300
+
"lastModified": 1767840362,
1301
+
"narHash": "sha256-ZtsFqUhilubohNZ1TgpQIFsi4biZTwRH9rjZsDRDik8=",
1302
+
"owner": "oxalica",
1303
+
"repo": "rust-overlay",
1304
+
"rev": "d159ea1fc321c60f88a616ac28bab660092a227d",
1305
"type": "github"
1306
},
1307
"original": {
1308
+
"owner": "oxalica",
1309
+
"repo": "rust-overlay",
1310
"type": "github"
1311
+
}
1312
+
},
1313
+
"sqlite-lib-src": {
1314
+
"flake": false,
1315
+
"locked": {
1316
+
"lastModified": 1706631843,
1317
+
"narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=",
1318
+
"type": "tarball",
1319
+
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1320
+
},
1321
+
"original": {
1322
+
"type": "tarball",
1323
+
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1324
}
1325
},
1326
"systems": {
···
1460
"sqlite-lib-src": "sqlite-lib-src"
1461
},
1462
"locked": {
1463
+
"lastModified": 1767683698,
1464
+
"narHash": "sha256-MFrfNmTKTdOOsyXUvvqPwH6zqvDZZpURnd7QdJkVOgU=",
1465
"ref": "refs/heads/master",
1466
+
"rev": "b31a2a3590fefc4c70817f94a20076df2428b4d3",
1467
+
"revCount": 1791,
1468
"type": "git",
1469
"url": "https://tangled.org/tangled.org/core"
1470
},
···
1473
"url": "https://tangled.org/tangled.org/core"
1474
}
1475
},
1476
+
"tgirlpkgs": {
1477
"inputs": {
1478
+
"nixpkgs": "nixpkgs_8"
1479
},
1480
"locked": {
1481
+
"lastModified": 1767660739,
1482
+
"narHash": "sha256-BuDIrsTL90jorWks/TAy0VVZIkeMn6p3CQCkvWeTzyA=",
1483
+
"owner": "tgirlcloud",
1484
+
"repo": "pkgs",
1485
+
"rev": "3e5419554c59db95844713444be102611c922740",
1486
"type": "github"
1487
},
1488
"original": {
1489
+
"owner": "tgirlcloud",
1490
+
"repo": "pkgs",
1491
"type": "github"
1492
}
1493
},
1494
+
"tidaLuna": {
1495
+
"inputs": {
1496
+
"devenv": "devenv",
1497
+
"flake-parts": "flake-parts_7",
1498
+
"nixpkgs": "nixpkgs_10",
1499
+
"systems": "systems_7"
1500
},
1501
"locked": {
1502
+
"lastModified": 1765158153,
1503
+
"narHash": "sha256-7+BABZopsekmRjFBLl8Ni8bY5sIOtk2niiSnD7EuubM=",
1504
+
"owner": "Inrixia",
1505
+
"repo": "TidaLuna",
1506
+
"rev": "94c277909f395922c4cee2729de771adf3f82d87",
1507
"type": "github"
1508
},
1509
"original": {
1510
+
"owner": "Inrixia",
1511
+
"repo": "TidaLuna",
1512
"type": "github"
1513
}
1514
},
1515
"tinted-theming-schemes": {
1516
"flake": false,
1517
"locked": {
1518
+
"lastModified": 1767710407,
1519
+
"narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=",
1520
"owner": "tinted-theming",
1521
"repo": "schemes",
1522
+
"rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2",
1523
"type": "github"
1524
},
1525
"original": {
···
1528
"type": "github"
1529
}
1530
},
1531
"treefmt-nix": {
1532
"inputs": {
1533
"nixpkgs": [
···
1551
},
1552
"vicinae": {
1553
"inputs": {
1554
"nixpkgs": [
1555
"nixpkgs"
1556
+
],
1557
+
"systems": "systems_8"
1558
},
1559
"locked": {
1560
+
"lastModified": 1767715269,
1561
+
"narHash": "sha256-0QV6SuVyt16rTVNoB9W3ZwRm7FhJ1pwuDMUH2VkOI6A=",
1562
"owner": "vicinaehq",
1563
"repo": "vicinae",
1564
+
"rev": "cd95054a199bba898c79ffa23fa41bac7326a375",
1565
"type": "github"
1566
},
1567
"original": {
+20
-10
flake.nix
+20
-10
flake.nix
···
11
inputs.nixpkgs.follows = "nixpkgs";
12
};
13
14
# Tangled knots
15
tangled = {
16
url = "git+https://tangled.org/tangled.org/core";
···
23
owner = "NixOS";
24
repo = "nixpkgs";
25
ref = "nixos-unstable";
26
};
27
28
nixvim = {
···
91
repo = "TidaLuna";
92
};
93
94
-
stylix = {
95
-
type = "github";
96
-
owner = "danth";
97
-
repo = "stylix";
98
-
99
-
inputs.nixpkgs.follows = "nixpkgs";
100
-
};
101
-
102
tinted-theming-schemes = {
103
type = "github";
104
owner = "tinted-theming";
···
108
109
nixcord = {
110
type = "github";
111
-
owner = "xaiyadev";
112
repo = "nixcord";
113
-
ref = "fix/user-cfg-no-option";
114
115
inputs.nixpkgs.follows = "nixpkgs";
116
};
···
11
inputs.nixpkgs.follows = "nixpkgs";
12
};
13
14
+
nix-jetbrains-plugins = {
15
+
type = "github";
16
+
owner = "Janrupf";
17
+
repo = "nix-jetbrains-plugin-repository";
18
+
};
19
+
20
+
catppuccin = {
21
+
type = "github";
22
+
owner = "catppuccin";
23
+
repo = "nix";
24
+
};
25
+
26
# Tangled knots
27
tangled = {
28
url = "git+https://tangled.org/tangled.org/core";
···
35
owner = "NixOS";
36
repo = "nixpkgs";
37
ref = "nixos-unstable";
38
+
};
39
+
40
+
# Package collection
41
+
tgirlpkgs = {
42
+
type = "github";
43
+
owner = "tgirlcloud";
44
+
repo = "pkgs";
45
};
46
47
nixvim = {
···
110
repo = "TidaLuna";
111
};
112
113
tinted-theming-schemes = {
114
type = "github";
115
owner = "tinted-theming";
···
119
120
nixcord = {
121
type = "github";
122
+
owner = "KaylorBen";
123
repo = "nixcord";
124
125
inputs.nixpkgs.follows = "nixpkgs";
126
};
+2
home/blmedia/default.nix
+2
home/blmedia/default.nix
-3
home/blmedia/packages.nix
-3
home/blmedia/packages.nix
···
4
home.packages = [
5
pkgs.enpass
6
7
-
pkgs.jetbrains.phpstorm # Mainly using neovim, but for some work stuff still needed
8
pkgs.obsidian # Notes taking app
9
10
pkgs.mpv # Music streaming
11
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
12
-
13
-
pkgs.wasistlos # Whatsapp for linux
14
15
pkgs.teams-for-linux # Teams; Need that for school and work
16
+2
home/default.nix
+2
home/default.nix
+2
home/xaiya/default.nix
+2
home/xaiya/default.nix
+1
-3
home/xaiya/packages.nix
+1
-3
home/xaiya/packages.nix
···
1
# Packages that are not configurable/are not configured will land here
2
-
{ pkgs, inputs', ... }:
3
{
4
home.packages = [
5
pkgs.obsidian # Notes taking app
···
11
# Music/Media players
12
pkgs.mpv # Music streaming
13
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
14
-
15
-
pkgs.wasistlos # Whatsapp for linux
16
17
pkgs.teams-for-linux # Teams; Need that for school and work
18
#pkgs.ciscoPacketTracer8 # Cisco software that I need for school
···
1
# Packages that are not configurable/are not configured will land here
2
+
{ pkgs, inputs', osConfig, ... }:
3
{
4
home.packages = [
5
pkgs.obsidian # Notes taking app
···
11
# Music/Media players
12
pkgs.mpv # Music streaming
13
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
14
15
pkgs.teams-for-linux # Teams; Need that for school and work
16
#pkgs.ciscoPacketTracer8 # Cisco software that I need for school
-7
modules/base/default.nix
-7
modules/base/default.nix
-30
modules/base/theme.nix
-30
modules/base/theme.nix
···
1
-
{
2
-
self,
3
-
lib,
4
-
config,
5
-
inputs,
6
-
pkgs,
7
-
...
8
-
}:
9
-
let
10
-
inherit (lib.types)
11
-
path
12
-
enum
13
-
nullOr
14
-
str
15
-
package
16
-
;
17
-
18
-
inherit (self.lib.modules) mkOpt;
19
-
20
-
cfg = config.sylveon.system.theme;
21
-
in
22
-
{
23
-
options.sylveon.system.theme = {
24
-
name = mkOpt (nullOr (enum [ "rose-pine" ])) "rose-pine" "The theme that should be loaded";
25
-
26
-
base16 =
27
-
mkOpt path "${inputs.tinted-theming-schemes}/base16/${cfg.name}.yaml"
28
-
"Path to base16 file for your theme";
29
-
};
30
-
}
···
-4
modules/home/cli/kitty.nix
-4
modules/home/cli/kitty.nix
···
22
config = mkIf (cfg.enable || sway.enable) {
23
programs.kitty = {
24
enable = true;
25
-
inherit (cfg) package;
26
27
shellIntegration.enableZshIntegration = config.programs.zsh.enable;
28
enableGitIntegration = true;
29
-
themeFile = "rose-pine";
30
31
# removing annoying things
32
settings.enable_audio_bell = false;
33
};
34
-
35
-
stylix.targets.kitty.enable = false; # Using the kitty theme instead of base16
36
};
37
}
+1
-6
modules/home/cli/neovim/default.nix
+1
-6
modules/home/cli/neovim/default.nix
···
35
./social.nix
36
];
37
38
options.sylveon.cli.neovim = {
39
enable = mkOpt bool false "vim editor, only better";
40
anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
···
112
lz-n.enable = true; # Lazy loading
113
};
114
};
115
-
116
-
stylix.targets.nixvim = {
117
-
plugin = "mini.base16";
118
-
transparentBackground.main = true;
119
-
};
120
-
121
};
122
}
···
35
./social.nix
36
];
37
38
+
# Neovim should be used as a lightweigt editor (used for small changes)
39
options.sylveon.cli.neovim = {
40
enable = mkOpt bool false "vim editor, only better";
41
anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
···
113
lz-n.enable = true; # Lazy loading
114
};
115
};
116
};
117
}
+1
-1
modules/home/cli/neovim/telescope.nix
+1
-1
modules/home/cli/neovim/telescope.nix
-27
modules/home/desktop/cursor.nix
-27
modules/home/desktop/cursor.nix
···
1
-
{
2
-
self,
3
-
lib,
4
-
pkgs,
5
-
osConfig,
6
-
...
7
-
}:
8
-
let
9
-
inherit (lib) mkIf;
10
-
11
-
prof = osConfig.sylveon.profiles;
12
-
in
13
-
{
14
-
15
-
config = mkIf prof.graphical.enable {
16
-
home.pointerCursor = {
17
-
enable = true;
18
-
19
-
name = "BreezeX-RosePineDawn-Linux";
20
-
package = pkgs.rose-pine-cursor;
21
-
size = 32;
22
-
23
-
sway.enable = true;
24
-
gtk.enable = true;
25
-
};
26
-
};
27
-
}
···
+2
-2
modules/home/desktop/default.nix
+2
-2
modules/home/desktop/default.nix
+31
modules/home/desktop/kanshi/docked_office.nix
+31
modules/home/desktop/kanshi/docked_office.nix
···
72
];
73
};
74
}
75
+
76
+
{
77
+
profile = {
78
+
name = "${name}-elvis";
79
+
outputs = [
80
+
{
81
+
criteria = "${office_screen_2} ULTRAFINE 404NTGY9M335";
82
+
position = "2560,132";
83
+
84
+
scale = 1.2;
85
+
mode = "3840x2160@60.000Hz";
86
+
}
87
+
88
+
{
89
+
criteria = "${office_screen_2} ULTRAFINE 404NTYT9M282";
90
+
position = "5762,132";
91
+
92
+
scale = 1.2;
93
+
mode = "3840x2160@60.000Hz";
94
+
}
95
+
96
+
{
97
+
criteria = "eDP-2";
98
+
position = "0,99";
99
+
100
+
mode = "2560x1600@165.000Hz";
101
+
scale = 1.3;
102
+
}
103
+
];
104
+
};
105
+
}
106
];
107
}
+64
modules/home/desktop/style.nix
+64
modules/home/desktop/style.nix
···
···
1
+
{
2
+
osConfig,
3
+
lib,
4
+
inputs,
5
+
pkgs,
6
+
config,
7
+
...
8
+
}:
9
+
let
10
+
inherit (lib) mkIf;
11
+
cfg = config.catppuccin;
12
+
in
13
+
{
14
+
imports = [ inputs.catppuccin.homeModules.catppuccin ];
15
+
16
+
# Use the global catppuccin configuration
17
+
/*
18
+
TODO: applications that need to be manaul integrated/need nix integration
19
+
- TidaLuna
20
+
*/
21
+
config = mkIf osConfig.catppuccin.enable {
22
+
catppuccin = {
23
+
enable = true;
24
+
25
+
inherit (osConfig.catppuccin)
26
+
accent
27
+
flavor
28
+
;
29
+
};
30
+
31
+
gtk = {
32
+
enable = true;
33
+
34
+
theme = {
35
+
name = "catppuccin-${cfg.flavor}-${cfg.accent}-standard";
36
+
package = pkgs.catppuccin-gtk.override {
37
+
size = "standard";
38
+
accents = [ cfg.accent ];
39
+
variant = cfg.flavor;
40
+
};
41
+
};
42
+
43
+
gtk3.extraConfig = {
44
+
gtk-application-prefer-dark-theme = true;
45
+
};
46
+
47
+
gtk4.extraConfig = {
48
+
# make things look nice
49
+
gtk-application-prefer-dark-theme = true;
50
+
};
51
+
};
52
+
53
+
home.pointerCursor = {
54
+
enable = true;
55
+
56
+
name = "catppuccin-mocha-flamingo-cursors";
57
+
package = pkgs.catppuccin-cursors.mochaFlamingo;
58
+
size = 24;
59
+
60
+
sway.enable = true;
61
+
gtk.enable = true;
62
+
};
63
+
};
64
+
}
-28
modules/home/desktop/stylix.nix
-28
modules/home/desktop/stylix.nix
···
1
-
{
2
-
osConfig,
3
-
lib,
4
-
self,
5
-
inputs,
6
-
...
7
-
}:
8
-
let
9
-
inherit (lib) mkIf;
10
-
11
-
prof = osConfig.sylveon.profiles;
12
-
theme = osConfig.sylveon.system.theme;
13
-
in
14
-
{
15
-
imports = [ inputs.stylix.homeModules.stylix ];
16
-
17
-
config = mkIf prof.graphical.enable { # TODO: deprecate this
18
-
stylix = {
19
-
enable = true;
20
-
enableReleaseChecks = false; # Stylix is sometimes behind home-manager, nothing we can do
21
-
overlays.enable = false; # Should be automaticly disabled, but it just... doesnt do it? ;-;
22
-
23
-
image = "${self}/assets/wallpaper/infinity-nikki-1.jpg";
24
-
base16Scheme = theme.base16;
25
-
polarity = "dark";
26
-
};
27
-
};
28
-
}
···
+4
-2
modules/home/desktop/sway/config/applications.nix
+4
-2
modules/home/desktop/sway/config/applications.nix
+5
-1
modules/home/desktop/sway/config/workspaces.nix
+5
-1
modules/home/desktop/sway/config/workspaces.nix
···
1
+
{ config, lib, self, ... }:
2
let
3
inherit (lib)
4
forEach
···
13
in
14
{
15
wayland.windowManager.sway.config = {
16
+
# Configure wallpaper
17
+
output."*" = {
18
+
bg = "${self}/assets/wallpaper/catppuccin-cat.png fill";
19
+
};
20
defaultWorkspace = "1";
21
22
workspaceOutputAssign = mkMerge [
+31
modules/home/desktop/sway/default.nix
+31
modules/home/desktop/sway/default.nix
···
16
17
modifier = "Mod4";
18
sway = osConfig.sylveon.system.graphical.sway;
19
in
20
{
21
imports = [
···
38
config = {
39
inherit modifier;
40
terminal = "${getExe config.programs.kitty.package}";
41
42
keybindings = mkOptionDefault {
43
"${modifier}+Escape" = "exec ${getExe config.programs.swaylock.package}";
···
16
17
modifier = "Mod4";
18
sway = osConfig.sylveon.system.graphical.sway;
19
+
cfg = config.wayland.windowManager.sway.config;
20
in
21
{
22
imports = [
···
39
config = {
40
inherit modifier;
41
terminal = "${getExe config.programs.kitty.package}";
42
+
43
+
colors =
44
+
let
45
+
submodule = {
46
+
childBorder = "$base";
47
+
indicator = submodule.childBorder;
48
+
49
+
# Configuration needed only if using the title bar
50
+
text = "$text";
51
+
border = submodule.childBorder;
52
+
background = "$base";
53
+
};
54
+
in
55
+
{
56
+
focused = submodule // rec {
57
+
childBorder = "\$${config.catppuccin.accent}";
58
+
indicator = childBorder;
59
+
border = childBorder;
60
+
};
61
+
62
+
urgent = submodule // rec {
63
+
childBorder = "$red";
64
+
indicator = childBorder;
65
+
border = childBorder;
66
+
};
67
+
68
+
placeholder = submodule;
69
+
focusedInactive = submodule;
70
+
unfocused = submodule;
71
+
};
72
73
keybindings = mkOptionDefault {
74
"${modifier}+Escape" = "exec ${getExe config.programs.swaylock.package}";
+2
-8
modules/home/desktop/sway/packages/swayidle.nix
+2
-8
modules/home/desktop/sway/packages/swayidle.nix
+2
-1
modules/home/desktop/sway/packages/swaync.nix
+2
-1
modules/home/desktop/sway/packages/swaync.nix
+8
-11
modules/home/desktop/sway/packages/waybar/default.nix
+8
-11
modules/home/desktop/sway/packages/waybar/default.nix
···
8
let
9
inherit (lib)
10
mkIf
11
-
concatStringsSep
12
;
13
14
sway = osConfig.sylveon.system.graphical.sway;
···
23
# replace default bar with waybar
24
wayland.windowManager.sway.config.bars = [ { command = "${pkgs.waybar}/bin/waybar"; } ];
25
26
-
# only add colors and fonts from stylix
27
-
stylix.targets.waybar.addCss = false;
28
29
-
programs.waybar = {
30
enable = true;
31
32
settings = {
···
35
position = "top";
36
fixed-center = true;
37
38
-
height = 35;
39
-
margin-top = 5;
40
-
margin-left = 5;
41
-
margin-right = 5;
42
43
-
margin-bottom = 3;
44
45
# Enable modules in the right positions
46
modules-left = [
47
-
"image#nix"
48
"sway/workspaces"
49
"sway/window"
50
];
···
53
"clock"
54
];
55
modules-right = [
56
-
"mpris"
57
"pulseaudio"
58
"network"
59
"bluetooth"
···
8
let
9
inherit (lib)
10
mkIf
11
;
12
13
sway = osConfig.sylveon.system.graphical.sway;
···
22
# replace default bar with waybar
23
wayland.windowManager.sway.config.bars = [ { command = "${pkgs.waybar}/bin/waybar"; } ];
24
25
+
catppuccin.waybar.enable = true;
26
27
+
programs.waybar = { # TODO: replace?
28
enable = true;
29
30
settings = {
···
33
position = "top";
34
fixed-center = true;
35
36
+
height = 30;
37
+
margin-top = 10;
38
+
margin-left = 10;
39
+
margin-right = 10;
40
41
+
margin-bottom = 10;
42
43
# Enable modules in the right positions
44
modules-left = [
45
+
# "image#nix"
46
"sway/workspaces"
47
"sway/window"
48
];
···
51
"clock"
52
];
53
modules-right = [
54
"pulseaudio"
55
"network"
56
"bluetooth"
+21
-22
modules/home/desktop/sway/packages/waybar/style.css
+21
-22
modules/home/desktop/sway/packages/waybar/style.css
···
4
* {
5
background-color: transparent;
6
font-family: "JetBrainsMono Nerd Font", sans-serif;
7
-
color: @base04;
8
9
min-height: 0;
10
padding: 0;
···
14
border: unset;
15
}
16
17
-
window { background-color: transparent; }
18
-
tooltip { background-color: @base00; }
19
-
#tray menu { background-color: @base00; }
20
21
.module {
22
-
background-color: @base00;
23
-
border-radius: 13px;
24
25
min-width: 20px;
26
27
-
padding: 0 13px;
28
margin: 0 3px;
29
}
30
···
51
padding: 0;
52
}
53
54
-
#workspaces button {
55
-
padding: 0 0 0 3px;
56
-
margin: 0 3px;
57
-
transition: 0.5s;
58
}
59
60
-
#workspaces button.focused {
61
-
box-shadow: inset 0 -2px @base0A;
62
}
63
64
-
#workspaces button.urgent {
65
-
box-shadow: inset 0 -2px @base08;
66
}
67
68
-
.module#battery.warning {
69
-
box-shadow: inset 0 -4px @base0E;
70
}
71
-
72
-
.module#battery.critical {
73
-
74
-
box-shadow: inset 0 -4px @base08;
75
-
}
···
4
* {
5
background-color: transparent;
6
font-family: "JetBrainsMono Nerd Font", sans-serif;
7
+
font-size: 14px;
8
+
color: @text;
9
10
min-height: 0;
11
padding: 0;
···
15
border: unset;
16
}
17
18
+
window#waybar {
19
+
background-color: @base;
20
+
border-radius: 5px;
21
+
}
22
+
23
+
tooltip { background-color: @crust; }
24
+
#tray menu { background-color: @crust; }
25
26
.module {
27
+
background-color: transparent;
28
29
min-width: 20px;
30
31
+
padding: 5px 11px;
32
margin: 0 3px;
33
}
34
···
55
padding: 0;
56
}
57
58
+
#workspaces button.focused label {
59
+
font-weight: bolder;
60
+
font-size: 15px;
61
+
color: @flamingo;
62
}
63
64
+
#workspaces button.urgent label {
65
+
color: @red;
66
}
67
68
+
.module#battery.warning label {
69
+
color: @rosewater;
70
}
71
72
+
.module#battery.critical label {
73
+
color: @red;
74
}
+20
-10
modules/home/desktop/vicinae.nix
+20
-10
modules/home/desktop/vicinae.nix
···
1
{
2
config,
3
inputs,
4
inputs',
5
osConfig,
···
10
inherit (lib)
11
mkIf
12
getExe
13
;
14
15
sway = osConfig.sylveon.system.graphical.sway;
···
23
config = mkIf sway.enable {
24
services.vicinae = {
25
enable = true;
26
-
autoStart = false; # Is started through sway
27
-
package = inputs'.vicinae.packages.default;
28
29
settings = {
30
-
closeOnFocusLoss = true;
31
font.size = 10;
32
-
faviconService = "google";
33
34
-
theme = {
35
-
iconTheme = "BreezeX-RoséPine";
36
-
name = "rosepine-base.json";
37
};
38
-
39
-
window = {
40
csd = true;
41
-
opacity = 1;
42
rounding = 10;
43
};
44
};
···
1
{
2
config,
3
+
pkgs,
4
inputs,
5
inputs',
6
osConfig,
···
11
inherit (lib)
12
mkIf
13
getExe
14
+
mkForce
15
;
16
17
sway = osConfig.sylveon.system.graphical.sway;
···
25
config = mkIf sway.enable {
26
services.vicinae = {
27
enable = true;
28
+
package = pkgs.vicinae; # Outdated but more stable version built by hydra
29
+
systemd.enable = false; # Is started through sway
30
31
settings = {
32
+
pop_to_root_on_close = true;
33
font.size = 10;
34
+
favicon_service = "twenty";
35
36
+
# Theme configuration with catppuccin currently bugged
37
+
# https://github.com/catppuccin/nix/pull/800
38
+
theme =
39
+
let
40
+
ctp = config.catppuccin;
41
+
in
42
+
{
43
+
dark = {
44
+
name = "catppuccin-${ctp.flavor}";
45
+
iconTheme = "Catppuccin ${lib.toSentenceCase ctp.flavor} ${lib.toSentenceCase ctp.accent}";
46
+
};
47
};
48
+
49
+
launcher_window = {
50
csd = true;
51
+
opacity = 0.95;
52
rounding = 10;
53
};
54
};
+2
modules/home/programs/default.nix
+2
modules/home/programs/default.nix
+27
-5
modules/home/programs/discord.nix
+27
-5
modules/home/programs/discord.nix
···
9
let
10
inherit (lib)
11
mkIf
12
;
13
14
inherit (lib.types) bool;
15
16
inherit (self.lib.modules) mkOpt;
17
cfg = config.sylveon.programs.discord;
18
in
19
{
20
options.sylveon.programs.discord.enable = mkOpt bool false "Whether or not to enable discord";
···
24
config = mkIf cfg.enable {
25
programs.nixcord = {
26
enable = true;
27
-
discord.enable = true;
28
29
config = {
30
31
# Activate and Configure Plugins
32
plugins = {
···
36
betterGifPicker.enable = true;
37
betterSessions.enable = true;
38
betterSettings.enable = true;
39
-
blurNSFW.enable = true;
40
callTimer.enable = true;
41
-
clearURLs.enable = true;
42
-
copyUserURLs.enable = true;
43
disableCallIdle.enable = true;
44
dontRoundMyTimestamps.enable = true;
45
favoriteEmojiFirst.enable = true;
···
65
66
platformIndicators = {
67
enable = true;
68
-
lists = false;
69
messages = false;
70
};
71
···
80
whoReacted.enable = true;
81
youtubeAdblock.enable = true;
82
};
83
};
84
};
85
};
···
9
let
10
inherit (lib)
11
mkIf
12
+
mkForce
13
+
mkMerge
14
+
forEach
15
+
;
16
+
17
+
inherit (lib.strings)
18
+
splitString
19
+
;
20
+
21
+
inherit (lib.lists)
22
+
last
23
;
24
25
inherit (lib.types) bool;
26
27
inherit (self.lib.modules) mkOpt;
28
cfg = config.sylveon.programs.discord;
29
+
nixcordcfg = config.programs.nixcord.config;
30
in
31
{
32
options.sylveon.programs.discord.enable = mkOpt bool false "Whether or not to enable discord";
···
36
config = mkIf cfg.enable {
37
programs.nixcord = {
38
enable = true;
39
+
discord = {
40
+
vencord.enable = mkForce false;
41
+
equicord.enable = true;
42
+
};
43
44
config = {
45
+
# Themes based on files is currently bugged with equicord (TODO)
46
+
themeLinks = [ "https://catppuccin.github.io/discord/dist/catppuccin-mocha-flamingo.theme.css" ];
47
+
transparent = true;
48
49
# Activate and Configure Plugins
50
plugins = {
···
54
betterGifPicker.enable = true;
55
betterSessions.enable = true;
56
betterSettings.enable = true;
57
+
BlurNSFW.enable = true;
58
callTimer.enable = true;
59
+
ClearURLs.enable = true;
60
+
CopyUserURLs.enable = true;
61
disableCallIdle.enable = true;
62
dontRoundMyTimestamps.enable = true;
63
favoriteEmojiFirst.enable = true;
···
83
84
platformIndicators = {
85
enable = true;
86
+
list = false;
87
messages = false;
88
};
89
···
98
whoReacted.enable = true;
99
youtubeAdblock.enable = true;
100
};
101
+
};
102
+
103
+
extraConfig = {
104
+
enabledThemeLinks = nixcordcfg.themeLinks;
105
};
106
};
107
};
+16
modules/home/programs/jetbrains/.ideavimrc
+16
modules/home/programs/jetbrains/.ideavimrc
···
···
1
+
" You can find a list of commands here: https://jb.gg/h38q75
2
+
" Find more examples here: https://jb.gg/share-ideavimrc
3
+
4
+
source ~/.vimrc
5
+
6
+
" Keymaps just for jetbrains ide
7
+
map <C-N> <A>1<CR>
8
+
9
+
" Move around tabs
10
+
map <A-l> :tabnext<cr>
11
+
map <A-h> :tabNext<cr>
12
+
13
+
14
+
" Enabling Plugins
15
+
Plug 'tpope/vim-commentary' " Commentary plugin
16
+
Plug 'machakann/vim-highlightedyank' " Highlight copied text
+26
modules/home/programs/jetbrains/.vimrc
+26
modules/home/programs/jetbrains/.vimrc
···
···
1
+
map Q gq
2
+
3
+
set scrolloff=7
4
+
set autoread
5
+
6
+
set ignorecase
7
+
set smartcase
8
+
set hlsearch
9
+
set incsearch
10
+
11
+
set showmatch
12
+
set mat=2
13
+
14
+
" disable sounds
15
+
set noerrorbells
16
+
set novisualbell
17
+
set tm=500
18
+
19
+
syntax enable
20
+
21
+
set expandtab
22
+
set smarttab
23
+
24
+
" Clipboard support
25
+
set clipboard+=unnamed
26
+
set clipboard+=ideaput
+74
modules/home/programs/jetbrains/default.nix
+74
modules/home/programs/jetbrains/default.nix
···
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
pkgs,
6
+
inputs,
7
+
osConfig,
8
+
...
9
+
}:
10
+
let
11
+
12
+
inherit (lib)
13
+
mkIf
14
+
mkMerge
15
+
;
16
+
17
+
inherit (lib.types) bool package;
18
+
inherit (self.lib.modules) mkOpt;
19
+
20
+
cfg = config.sylveon.programs.jetbrains;
21
+
cfgFolder = ''.config/Jetbrains/${cfg.webstorm.package.version}'';
22
+
in
23
+
{
24
+
25
+
options.sylveon.programs.jetbrains = {
26
+
phpstorm = {
27
+
enable = mkOpt bool false "Whether or not to enable the jetbrains php-editor";
28
+
package = mkOpt package pkgs.jetbrains.phpstorm "What package to use for the jetbrains php-editor";
29
+
};
30
+
31
+
webstorm = {
32
+
enable = mkOpt bool false "Whether or not to enable the jetbrains web-editor";
33
+
package = mkOpt package pkgs.jetbrains.webstorm "What package to use for the jetbrains web-editor";
34
+
};
35
+
};
36
+
37
+
config = mkIf (cfg.phpstorm.enable || cfg.webstorm.enable) {
38
+
39
+
home.file.".vimrc".source = ./.vimrc; # TODO: move to a new vim configuration
40
+
home.file.".ideavimrc".source = ./.ideavimrc;
41
+
42
+
home.packages =
43
+
let
44
+
defaultPlugins = with pkgs.jetbrains-plugins; [
45
+
com.github.catppuccin.jetbrains
46
+
com.mallowigi # Atom material icons
47
+
48
+
# com.wakatime.intellij.plugin TODO
49
+
50
+
IdeaVIM
51
+
52
+
nix-idea
53
+
com.jetbrains.plugins.ini4idea
54
+
];
55
+
in
56
+
lib.optionals cfg.phpstorm.enable [
57
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
58
+
cfg.phpstorm.package
59
+
(with pkgs.jetbrains-plugins; [
60
+
# adrienbrault.idea.symfony2plugin Not available?
61
+
] ++ defaultPlugins)
62
+
)
63
+
]
64
+
65
+
++ lib.optionals cfg.webstorm.enable [
66
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
67
+
cfg.webstorm.package
68
+
(with pkgs.jetbrains-plugins; [
69
+
io.github.pandier.intellijdiscordrp
70
+
] ++ defaultPlugins)
71
+
)
72
+
];
73
+
};
74
+
}
+66
-48
modules/home/programs/librewolf.nix
+66
-48
modules/home/programs/librewolf.nix
···
12
genAttrs
13
;
14
15
inherit (lib.types) bool;
16
17
inherit (self.lib.modules) mkOpt;
···
28
programs.librewolf = {
29
enable = true;
30
31
-
# Install German and english languages
32
-
languagePacks = [
33
-
"en-GB"
34
-
"de"
35
-
];
36
37
settings = {
38
"privacy.clearOnShutdown.cookies" = false;
39
"network.cookie.lifetimePolicy" = 0;
40
41
-
# Enable Canvas
42
-
"webgl.disabled" = false;
43
-
"privacy.fingerprintingProtection" = false;
44
};
45
46
policies = {
47
ExtensionSettings =
48
genAttrs
49
[
50
"uBlock0@raymondhill.net"
51
-
"languagetool-webextension@languagetool.org"
52
"sponsorBlocker@ajay.app"
53
"FirefoxColor@mozilla.com"
54
"firefox-enpass@enpass.io"
55
]
56
(ext: {
57
installation_mode = "force_installed";
58
-
private_browsing = true;
59
install_url = "https://addons.mozilla.org/firefox/downloads/latest/${ext}/latest.xpi";
60
});
61
-
62
-
DisplayBookmarksToolbar = "never";
63
};
64
65
-
profiles = {
66
-
default = {
67
-
68
-
# Extensions are managed via policies, not here!
69
-
extensions = {
70
-
force = true;
71
-
settings = {
72
-
# ColorTheme is managed by stylix
73
-
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = {
74
-
dbInChromeStorage = true; # required for Stylus
75
-
};
76
77
};
78
};
79
80
-
search = {
81
-
force = true;
82
-
default = "google";
83
84
-
engines = {
85
-
MyNixOS = {
86
-
name = "MyNixOS";
87
-
urls = [
88
-
{
89
-
template = "https://mynixos.com/search";
90
-
params = [
91
-
{
92
-
name = "q";
93
-
value = "{searchTerms}";
94
-
}
95
-
];
96
-
}
97
-
];
98
-
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg";
99
-
definedAliases = [ "@nix" ];
100
-
};
101
102
-
ddg.metaData.hidden = true;
103
-
wikipedia.metaData.hidden = true;
104
};
105
};
106
};
107
};
108
};
109
110
-
stylix.targets.librewolf = {
111
-
colorTheme.enable = true;
112
-
profileNames = [ "default" ]; # https://stylix.danth.me/options/modules/firefox.html
113
};
114
};
115
}
···
12
genAttrs
13
;
14
15
+
inherit (builtins)
16
+
fromJSON
17
+
readFile
18
+
fetchurl
19
+
;
20
+
21
inherit (lib.types) bool;
22
23
inherit (self.lib.modules) mkOpt;
···
34
programs.librewolf = {
35
enable = true;
36
37
+
languagePacks = [ "en-GB" "de" ];
38
39
settings = {
40
+
"browser.fullscreen.autohide" = false;
41
+
42
+
"webgl.disabled" = false;
43
+
"privacy.fingerprintingProtection" = false;
44
+
"browser.translations.enable" = false;
45
+
46
+
"media.ffmpeg.vaapi.enabled" = true;
47
+
"media.rdd-ffmpeg.enabled" = true;
48
+
49
+
"extensions.abuseReport.enabled" = false;
50
+
"extensions.formautofill.creditCards.enabled" = false;
51
+
"browser.contentblocking.report.lockwise.enabled" = false;
52
+
53
+
"identity.fxaccounts.enabled" = false;
54
+
"identity.fxaccounts.toolbar.enabled" = false;
55
+
"identity.fxaccounts.pairing.enabled" = false;
56
+
"identity.fxaccounts.commands.enabled" = false;
57
+
"privacy.clearOnShutdown.history" = false;
58
"privacy.clearOnShutdown.cookies" = false;
59
"network.cookie.lifetimePolicy" = 0;
60
61
+
# disable notifications
62
+
"dom.push.enabled" = false;
63
+
"dom.push.connection.enabled" = false;
64
+
"dom.battery.enabled" = false;
65
};
66
67
policies = {
68
+
DisplayBookmarksToolbar = "never";
69
+
DisableFirefoxAccounts = true;
70
+
DisableFeedbackCommands = true;
71
+
72
ExtensionSettings =
73
genAttrs
74
[
75
"uBlock0@raymondhill.net"
76
"sponsorBlocker@ajay.app"
77
"FirefoxColor@mozilla.com"
78
"firefox-enpass@enpass.io"
79
+
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}" # Stylus
80
+
"{446900e4-71c2-419f-a6a7-df9c091e268b}" # Bitwarden
81
]
82
(ext: {
83
installation_mode = "force_installed";
84
install_url = "https://addons.mozilla.org/firefox/downloads/latest/${ext}/latest.xpi";
85
});
86
};
87
88
+
profiles.default = {
89
+
extensions = {
90
+
force = true; # Needed for catppuccin
91
92
+
settings = {
93
+
# stylus themes need to be manually imported from now
94
+
# please create and import a new style file from here: https://catppuccin-userstyles-customizer.uncenter.dev/
95
+
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = {
96
+
dbInChromeStorage = true; # required for Stylus
97
};
98
};
99
+
};
100
+
101
+
settings = {
102
+
# Default page should be my homepage
103
+
"browser.startup.homepage" = "https://xaiya.dev";
104
+
};
105
106
+
search = {
107
+
force = true;
108
+
default = "ddg";
109
110
+
engines = {
111
+
MyNixOS = {
112
+
name = "MyNixOS";
113
+
urls = [{
114
+
template = "https://mynixos.com/search";
115
+
params = [ { name = "q"; value = "{searchTerms}"; } ];
116
+
}];
117
118
+
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg";
119
+
definedAliases = [ "@n" ];
120
};
121
+
122
+
google.metaData.alias = "@g";
123
};
124
};
125
};
126
};
127
128
+
catppuccin.librewolf = {
129
+
force = true;
130
+
profiles.default.force = true;
131
};
132
};
133
}
+6
-1
modules/nixos/default.nix
+6
-1
modules/nixos/default.nix
···
1
-
{
2
imports = [
3
./hardware # hardware configuration (e.g gpu, cpu, networking, etc.)
4
./nix # specific configuration for the nix environment
5
./environment # environment variables and configurations (e.g fonts, time etc.)
···
7
./system # configuration for our system
8
./services
9
10
./users.nix # load and create users
11
./extraPackages.nix # packages that need to be loaded but are not big enough to be an own module
12
];
···
1
+
{ inputs, ... }: {
2
imports = [
3
+
# General module imports
4
+
inputs.tgirlpkgs.nixosModules.default
5
+
6
+
# Modules import
7
./hardware # hardware configuration (e.g gpu, cpu, networking, etc.)
8
./nix # specific configuration for the nix environment
9
./environment # environment variables and configurations (e.g fonts, time etc.)
···
11
./system # configuration for our system
12
./services
13
14
+
./style.nix
15
./users.nix # load and create users
16
./extraPackages.nix # packages that need to be loaded but are not big enough to be an own module
17
];
+6
-4
modules/nixos/nix/caches.nix
+6
-4
modules/nixos/nix/caches.nix
···
1
{
2
nix.settings = {
3
substituters = [
4
"https://ezkea.cachix.org" # AAGL caches
5
"https://nix-gaming.cachix.org" # gaming packages
6
-
"https://vicinae.cachix.org" # Vicinae
7
];
8
9
trusted-public-keys = [
10
-
"ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" # AAGL caches
11
-
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" # gaming packages
12
-
"vicinae.cachix.org-1:1kDrfienkGHPYbkpNj1mWTr7Fm1+zcenzgTizIcI3oc=" # Vicinae
13
];
14
};
15
}
···
1
{
2
nix.settings = {
3
substituters = [
4
+
"https://nix-community.cachix.org" # nix-community cache
5
"https://ezkea.cachix.org" # AAGL caches
6
"https://nix-gaming.cachix.org" # gaming packages
7
+
"https://catppuccin.cachix.org" # a cache for all catppuccin ports
8
];
9
10
trusted-public-keys = [
11
+
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
12
+
"ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI="
13
+
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4="
14
+
"catppuccin.cachix.org-1:noG/4HkbhJb+lUAdKrph6LaozJvAeEEZj4N732IysmU="
15
];
16
};
17
}
+2
-1
modules/nixos/nix/nixpkgs.nix
+2
-1
modules/nixos/nix/nixpkgs.nix
-5
modules/nixos/services/atprotocol/default.nix
-5
modules/nixos/services/atprotocol/default.nix
-82
modules/nixos/services/atprotocol/tangled.nix
-82
modules/nixos/services/atprotocol/tangled.nix
···
1
-
{ inputs, lib, self, config, ... }:
2
-
let
3
-
inherit (lib) mkMerge mkIf;
4
-
inherit (lib.types) str;
5
-
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
-
7
-
cfg = config.sylveon.services.atprotocol.tangled;
8
-
in
9
-
{
10
-
11
-
imports = [
12
-
inputs.tangled.nixosModules.knot
13
-
inputs.tangled.nixosModules.spindle
14
-
];
15
-
16
-
options.sylveon.services.atprotocol.tangled = {
17
-
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
-
19
-
knot =
20
-
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
-
22
-
spindle =
23
-
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
-
};
25
-
26
-
config = {
27
-
services = mkMerge [
28
-
(mkIf cfg.knot.enable {
29
-
tangled.knot = {
30
-
enable = true;
31
-
32
-
server = {
33
-
inherit (cfg) owner;
34
-
hostname = cfg.knot.domain;
35
-
};
36
-
37
-
motd = ''
38
-
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
-
'';
40
-
};
41
-
42
-
# Create proxy entry
43
-
nginx.virtualHosts.${cfg.knot.domain} = {
44
-
enableACME = true;
45
-
forceSSL = true;
46
-
47
-
locations."/" = {
48
-
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
-
proxyWebsockets = true;
50
-
};
51
-
52
-
extraConfig = "proxy_ssl_server_name on;";
53
-
};
54
-
})
55
-
56
-
(mkIf cfg.spindle.enable {
57
-
tangled.spindle = {
58
-
enable = true;
59
-
60
-
server = {
61
-
inherit (cfg) owner;
62
-
hostname = cfg.spindle.domain;
63
-
};
64
-
};
65
-
66
-
67
-
# Create proxy entry
68
-
nginx.virtualHosts.${cfg.spindle.domain} = {
69
-
enableACME = true;
70
-
forceSSL = true;
71
-
72
-
locations."/" = {
73
-
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
-
proxyWebsockets = true;
75
-
};
76
-
77
-
extraConfig = "proxy_ssl_server_name on;";
78
-
};
79
-
})
80
-
];
81
-
};
82
-
}
···
+2
-1
modules/nixos/services/default.nix
+2
-1
modules/nixos/services/default.nix
+1
-1
modules/nixos/services/docker.nix
+1
-1
modules/nixos/services/docker.nix
+1
-1
modules/nixos/services/glance/default.nix
+1
-1
modules/nixos/services/glance/default.nix
+2
-3
modules/nixos/services/kitchenowl.nix
+2
-3
modules/nixos/services/kitchenowl.nix
···
13
in
14
{
15
options.sylveon.services.kitchenowl =
16
-
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; };
17
18
config = mkIf cfg.enable {
19
# Create secrets
···
22
# Enable the kitchenowl container
23
virtualisation.oci-containers.containers.kitchenowl = {
24
image = "tombursch/kitchenowl:latest";
25
-
ports = [ "${builtins.toString cfg.port}:${builtins.toString cfg.port}" ];
26
27
environmentFiles = [ config.age.secrets.kitchenowl-env.path ];
28
volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ];
···
35
36
locations."/" = {
37
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
38
-
proxyWebsockets = true;
39
};
40
41
extraConfig = "proxy_ssl_server_name on;";
···
13
in
14
{
15
options.sylveon.services.kitchenowl =
16
+
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; host = "127.0.0.1"; };
17
18
config = mkIf cfg.enable {
19
# Create secrets
···
22
# Enable the kitchenowl container
23
virtualisation.oci-containers.containers.kitchenowl = {
24
image = "tombursch/kitchenowl:latest";
25
+
ports = [ "${builtins.toString cfg.port}:8080" ];
26
27
environmentFiles = [ config.age.secrets.kitchenowl-env.path ];
28
volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ];
···
35
36
locations."/" = {
37
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
38
};
39
40
extraConfig = "proxy_ssl_server_name on;";
+12
-7
modules/nixos/services/minecraft.nix
+12
-7
modules/nixos/services/minecraft.nix
···
16
17
options.sylveon.services.minecraft = {
18
enable = mkOpt bool false "Enable a Minecraft server";
19
-
package = mkOpt package pkgs.papermcServers.papermc "On what package this server should be based on";
20
};
21
22
config = mkIf cfg.enable {
23
services.minecraft-server = {
24
enable = true;
25
inherit (cfg) package;
26
27
# What world I want to use (TODO: needs some changes)
28
-
dataDir = "/mnt/raid/services/minecraft/01";
29
30
eula = true;
31
-
openFirewall = true;
32
-
33
declarative = true;
34
35
whitelist = {
···
51
52
serverProperties = {
53
difficulty = "hard";
54
-
55
spawn-protection = 0;
56
57
gamemode = 0;
58
force-gamemode = true;
59
60
max-players = 10;
61
-
view-dance = 32;
62
63
white-list = true;
64
motd = "Sylveon Network";
65
};
66
67
-
jvmOpts = "-Xms4092M -Xmx4092M";
68
};
69
};
70
}
···
16
17
options.sylveon.services.minecraft = {
18
enable = mkOpt bool false "Enable a Minecraft server";
19
+
package = mkOpt package pkgs.papermcServers.papermc-1_21_9 "On what package this server should be based on";
20
};
21
22
config = mkIf cfg.enable {
23
+
24
+
# Open Minecraft port and proximity port
25
+
networking.firewall = {
26
+
allowedUDPPorts = [ 24454 25565 ];
27
+
allowedTCPPorts = [ 24454 25565 ];
28
+
};
29
+
30
services.minecraft-server = {
31
enable = true;
32
inherit (cfg) package;
33
34
# What world I want to use (TODO: needs some changes)
35
+
dataDir = "/mnt/raid/services/minecraft/02";
36
37
eula = true;
38
declarative = true;
39
40
whitelist = {
···
56
57
serverProperties = {
58
difficulty = "hard";
59
spawn-protection = 0;
60
61
gamemode = 0;
62
force-gamemode = true;
63
64
max-players = 10;
65
+
view-dance = 18;
66
+
simulation-distance = 8;
67
68
white-list = true;
69
motd = "Sylveon Network";
70
};
71
72
+
jvmOpts = "-Xms2G -Xmx8G";
73
};
74
};
75
}
+47
modules/nixos/services/piper.nix
+47
modules/nixos/services/piper.nix
···
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
...
6
+
}:
7
+
let
8
+
inherit (lib) mkIf;
9
+
inherit (self.lib.modules) mkServiceOpt;
10
+
11
+
cfg = config.sylveon.services.piper;
12
+
in
13
+
{
14
+
15
+
options.sylveon.services.piper =
16
+
mkServiceOpt "piper" { port = 3015; domain = "piper.xaiya.dev"; };
17
+
18
+
config = mkIf cfg.enable {
19
+
# Create secrets
20
+
age.secrets.piper-env.rekeyFile = "${self}/secrets/piper-env.age";
21
+
22
+
services = {
23
+
piper = { # TODO: Spotify API is currently blocked, cant create APP
24
+
enable = true;
25
+
environmentFiles = [ config.age.secrets.piper-env.path ];
26
+
27
+
settings = {
28
+
SERVER_PORT = cfg.port;
29
+
SERVER_ROOT_URL = "https://${cfg.domain}";
30
+
};
31
+
};
32
+
33
+
# Create proxy entry
34
+
nginx.virtualHosts.${cfg.domain} = {
35
+
enableACME = true;
36
+
forceSSL = true;
37
+
38
+
locations."/" = {
39
+
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
40
+
};
41
+
42
+
extraConfig = "proxy_ssl_server_name on;";
43
+
44
+
};
45
+
};
46
+
};
47
+
}
+82
modules/nixos/services/tangled.nix
+82
modules/nixos/services/tangled.nix
···
···
1
+
{ inputs, lib, self, config, ... }:
2
+
let
3
+
inherit (lib) mkMerge mkIf;
4
+
inherit (lib.types) str;
5
+
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
+
7
+
cfg = config.sylveon.services.tangled;
8
+
in
9
+
{
10
+
11
+
imports = [
12
+
inputs.tangled.nixosModules.knot
13
+
inputs.tangled.nixosModules.spindle
14
+
];
15
+
16
+
options.sylveon.services.tangled = {
17
+
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
+
19
+
knot =
20
+
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
+
22
+
spindle =
23
+
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
+
};
25
+
26
+
config = {
27
+
services = mkMerge [
28
+
(mkIf cfg.knot.enable {
29
+
tangled.knot = {
30
+
enable = true;
31
+
32
+
server = {
33
+
inherit (cfg) owner;
34
+
hostname = cfg.knot.domain;
35
+
};
36
+
37
+
motd = ''
38
+
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
+
'';
40
+
};
41
+
42
+
# Create proxy entry
43
+
nginx.virtualHosts.${cfg.knot.domain} = {
44
+
enableACME = true;
45
+
forceSSL = true;
46
+
47
+
locations."/" = {
48
+
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
+
proxyWebsockets = true;
50
+
};
51
+
52
+
extraConfig = "proxy_ssl_server_name on;";
53
+
};
54
+
})
55
+
56
+
(mkIf cfg.spindle.enable {
57
+
tangled.spindle = {
58
+
enable = true;
59
+
60
+
server = {
61
+
inherit (cfg) owner;
62
+
hostname = cfg.spindle.domain;
63
+
};
64
+
};
65
+
66
+
67
+
# Create proxy entry
68
+
nginx.virtualHosts.${cfg.spindle.domain} = {
69
+
enableACME = true;
70
+
forceSSL = true;
71
+
72
+
locations."/" = {
73
+
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
+
proxyWebsockets = true;
75
+
};
76
+
77
+
extraConfig = "proxy_ssl_server_name on;";
78
+
};
79
+
})
80
+
];
81
+
};
82
+
}
+45
modules/nixos/style.nix
+45
modules/nixos/style.nix
···
···
1
+
{
2
+
inputs,
3
+
config,
4
+
lib,
5
+
...
6
+
}:
7
+
let
8
+
prof = config.sylveon.profiles;
9
+
in
10
+
{
11
+
# Some catppuccin configuration only work on nixos
12
+
# This file might be changed because the idea of theming will be renewed
13
+
14
+
imports = [ inputs.catppuccin.nixosModules.catppuccin ];
15
+
16
+
config = {
17
+
catppuccin = {
18
+
inherit (prof.graphical) enable;
19
+
cache.enable = true;
20
+
21
+
accent = "flamingo";
22
+
flavor = "mocha";
23
+
};
24
+
25
+
# https://github.com/isabelroses/dotfiles/blob/88d1cb29e2da4ef977b4a06fcbf9a22efbd398a7/modules/nixos/catppuccin.nix#L21
26
+
console.colors = lib.mkIf config.catppuccin.enable [
27
+
"1e1e2e"
28
+
"f38ba8"
29
+
"a6e3a1"
30
+
"f9e2af"
31
+
"89b4fa"
32
+
"f5c2e7"
33
+
"94e2d5"
34
+
"bac2de"
35
+
"585b70"
36
+
"f38ba8"
37
+
"a6e3a1"
38
+
"f9e2af"
39
+
"89b4fa"
40
+
"f5c2e7"
41
+
"94e2d5"
42
+
"a6adc8"
43
+
];
44
+
};
45
+
}
+9
secrets/piper-env.age
+9
secrets/piper-env.age
···
···
1
+
age-encryption.org/v1
2
+
-> piv-p256 3eMZ2w Ayqd3HhxKkUWfKgQPMYVAubp9epHJyniP9sKb9fpTBLY
3
+
aaAyZ4lqXYArnlRiunmEg869BSFXj4YbyyTnRxlpVDU
4
+
-> po}y-grease ;IcPr [r|%9 {2xK,:
5
+
KO+GNHYFrAOMlGhb2fwHNqovaDtox4IfDxOzom407c2gOl56lSq7e2odJYMdUvf2
6
+
/aClPQoFOAGVipSrkRU
7
+
--- AqUx53QjjAlOllgZzPC/3S6YmSXmqYYioxeMqmYHuds
8
+
B$�P���B�a37�u�L��pa}���dN�f�J�#��.;�N�7:�n�
9
+
�s���]o��b5�g�a-*tw�7�v�H���* �o�\��6�����L�)��s�Fk��㡯)LѬDfқ��\J�����I
0���!i;ya�*���ީt�Nj�g�eKr�a��&��8Z�$����:m٩
+5
-9
systems/apricot/default.nix
+5
-9
systems/apricot/default.nix
···
12
networking.hostName = "apricot";
13
14
sylveon = {
15
-
profiles = {
16
-
server.enable = true;
17
-
};
18
19
device.cpu = "intel";
20
···
31
glance.enable = true;
32
kitchenowl.enable = true;
33
34
-
atprotocol = {
35
-
tangled = {
36
-
knot.enable = true;
37
-
spindle.enable = true;
38
-
};
39
};
40
41
plex.enable = true;
42
-
43
minecraft.enable = true;
44
};
45
};
···
12
networking.hostName = "apricot";
13
14
sylveon = {
15
+
profiles.server.enable = true;
16
17
device.cpu = "intel";
18
···
29
glance.enable = true;
30
kitchenowl.enable = true;
31
32
+
tangled = {
33
+
knot.enable = true;
34
+
spindle.enable = true;
35
};
36
+
piper.enable = true;
37
38
plex.enable = true;
39
minecraft.enable = true;
40
};
41
};
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
This is a binary file and will not be displayed.