assets/wallpaper/catppuccin-cat.png
assets/wallpaper/catppuccin-cat.png
This is a binary file and will not be displayed.
+270
-431
flake.lock
+270
-431
flake.lock
···
9
9
"rust-overlay": "rust-overlay"
10
10
},
11
11
"locked": {
12
-
"lastModified": 1762188647,
13
-
"narHash": "sha256-OAXK4p7WIYUcp8xx9m0RZUpV6XUDEhkoM4efI8dzPiU=",
12
+
"lastModified": 1767520119,
13
+
"narHash": "sha256-+OmNQLA9Fv5WBaxYHlPghS9XmnYWDaLt+AatCGhG+hc=",
14
14
"owner": "ezKEa",
15
15
"repo": "aagl-gtk-on-nix",
16
-
"rev": "1172be1377bc65581004f4d5927b58c5c7d96639",
16
+
"rev": "5720d3282844b6b23b26dfac075a5f1f58ea8844",
17
17
"type": "github"
18
18
},
19
19
"original": {
···
48
48
"systems": "systems"
49
49
},
50
50
"locked": {
51
-
"lastModified": 1761656077,
52
-
"narHash": "sha256-lsNWuj4Z+pE7s0bd2OKicOFq9bK86JE0ZGeKJbNqb94=",
51
+
"lastModified": 1762618334,
52
+
"narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=",
53
53
"owner": "ryantm",
54
54
"repo": "agenix",
55
-
"rev": "9ba0d85de3eaa7afeab493fed622008b6e4924f5",
55
+
"rev": "fcdea223397448d35d9b31f798479227e80183f6",
56
56
"type": "github"
57
57
},
58
58
"original": {
···
85
85
"type": "github"
86
86
}
87
87
},
88
-
"base16": {
89
-
"inputs": {
90
-
"fromYaml": "fromYaml"
91
-
},
92
-
"locked": {
93
-
"lastModified": 1755819240,
94
-
"narHash": "sha256-qcMhnL7aGAuFuutH4rq9fvAhCpJWVHLcHVZLtPctPlo=",
95
-
"owner": "SenchoPens",
96
-
"repo": "base16.nix",
97
-
"rev": "75ed5e5e3fce37df22e49125181fa37899c3ccd6",
98
-
"type": "github"
99
-
},
100
-
"original": {
101
-
"owner": "SenchoPens",
102
-
"repo": "base16.nix",
103
-
"type": "github"
104
-
}
105
-
},
106
-
"base16-fish": {
107
-
"flake": false,
108
-
"locked": {
109
-
"lastModified": 1754405784,
110
-
"narHash": "sha256-l9xHIy+85FN+bEo6yquq2IjD1rSg9fjfjpyGP1W8YXo=",
111
-
"owner": "tomyun",
112
-
"repo": "base16-fish",
113
-
"rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561",
114
-
"type": "github"
115
-
},
116
-
"original": {
117
-
"owner": "tomyun",
118
-
"repo": "base16-fish",
119
-
"rev": "23ae20a0093dca0d7b39d76ba2401af0ccf9c561",
120
-
"type": "github"
121
-
}
122
-
},
123
-
"base16-helix": {
124
-
"flake": false,
125
-
"locked": {
126
-
"lastModified": 1752979451,
127
-
"narHash": "sha256-0CQM+FkYy0fOO/sMGhOoNL80ftsAzYCg9VhIrodqusM=",
128
-
"owner": "tinted-theming",
129
-
"repo": "base16-helix",
130
-
"rev": "27cf1e66e50abc622fb76a3019012dc07c678fac",
131
-
"type": "github"
132
-
},
133
-
"original": {
134
-
"owner": "tinted-theming",
135
-
"repo": "base16-helix",
136
-
"type": "github"
137
-
}
138
-
},
139
-
"base16-vim": {
140
-
"flake": false,
141
-
"locked": {
142
-
"lastModified": 1732806396,
143
-
"narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
144
-
"owner": "tinted-theming",
145
-
"repo": "base16-vim",
146
-
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
147
-
"type": "github"
148
-
},
149
-
"original": {
150
-
"owner": "tinted-theming",
151
-
"repo": "base16-vim",
152
-
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
153
-
"type": "github"
154
-
}
155
-
},
156
88
"cachix": {
157
89
"inputs": {
158
90
"devenv": [
···
189
121
"type": "github"
190
122
}
191
123
},
124
+
"catppuccin": {
125
+
"inputs": {
126
+
"nixpkgs": "nixpkgs_2"
127
+
},
128
+
"locked": {
129
+
"lastModified": 1767720192,
130
+
"narHash": "sha256-gA2dpQr/REM9D4SUdMwioAATnXmOZz/eVIladxEISRA=",
131
+
"owner": "catppuccin",
132
+
"repo": "nix",
133
+
"rev": "bbda4b492ba33c1ca04385792c93dda1a3a28f64",
134
+
"type": "github"
135
+
},
136
+
"original": {
137
+
"owner": "catppuccin",
138
+
"repo": "nix",
139
+
"type": "github"
140
+
}
141
+
},
192
142
"darwin": {
193
143
"inputs": {
194
144
"nixpkgs": [
···
215
165
"inputs": {
216
166
"cachix": "cachix",
217
167
"flake-compat": "flake-compat_6",
218
-
"flake-parts": "flake-parts_7",
168
+
"flake-parts": "flake-parts_6",
219
169
"git-hooks": "git-hooks",
220
170
"nix": "nix",
221
-
"nixpkgs": "nixpkgs_6"
171
+
"nixpkgs": "nixpkgs_9"
222
172
},
223
173
"locked": {
224
174
"lastModified": 1760162706,
···
270
220
"type": "github"
271
221
}
272
222
},
273
-
"firefox-gnome-theme": {
274
-
"flake": false,
275
-
"locked": {
276
-
"lastModified": 1758112371,
277
-
"narHash": "sha256-lizRM2pj6PHrR25yimjyFn04OS4wcdbc38DCdBVa2rk=",
278
-
"owner": "rafaelmardojai",
279
-
"repo": "firefox-gnome-theme",
280
-
"rev": "0909cfe4a2af8d358ad13b20246a350e14c2473d",
281
-
"type": "github"
282
-
},
283
-
"original": {
284
-
"owner": "rafaelmardojai",
285
-
"repo": "firefox-gnome-theme",
286
-
"type": "github"
287
-
}
288
-
},
289
223
"flake-compat": {
290
224
"flake": false,
291
225
"locked": {
···
341
275
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
342
276
"revCount": 69,
343
277
"type": "tarball",
344
-
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz?rev=ff81ac966bb2cae68946d5ed5fc4994f96d0ffec&revCount=69"
278
+
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz"
345
279
},
346
280
"original": {
347
281
"type": "tarball",
···
406
340
]
407
341
},
408
342
"locked": {
409
-
"lastModified": 1762040540,
410
-
"narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=",
343
+
"lastModified": 1767609335,
344
+
"narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=",
411
345
"owner": "hercules-ci",
412
346
"repo": "flake-parts",
413
-
"rev": "0010412d62a25d959151790968765a70c436598b",
347
+
"rev": "250481aafeb741edfe23d29195671c19b36b6dca",
414
348
"type": "github"
415
349
},
416
350
"original": {
···
424
358
"nixpkgs-lib": "nixpkgs-lib"
425
359
},
426
360
"locked": {
427
-
"lastModified": 1762040540,
428
-
"narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=",
361
+
"lastModified": 1765835352,
362
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
429
363
"owner": "hercules-ci",
430
364
"repo": "flake-parts",
431
-
"rev": "0010412d62a25d959151790968765a70c436598b",
365
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
432
366
"type": "github"
433
367
},
434
368
"original": {
···
442
376
"nixpkgs-lib": "nixpkgs-lib_2"
443
377
},
444
378
"locked": {
445
-
"lastModified": 1754091436,
446
-
"narHash": "sha256-XKqDMN1/Qj1DKivQvscI4vmHfDfvYR2pfuFOJiCeewM=",
379
+
"lastModified": 1765835352,
380
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
447
381
"owner": "hercules-ci",
448
382
"repo": "flake-parts",
449
-
"rev": "67df8c627c2c39c41dbec76a1f201929929ab0bd",
383
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
450
384
"type": "github"
451
385
},
452
386
"original": {
···
463
397
]
464
398
},
465
399
"locked": {
466
-
"lastModified": 1760948891,
467
-
"narHash": "sha256-TmWcdiUUaWk8J4lpjzu4gCGxWY6/Ok7mOK4fIFfBuU4=",
400
+
"lastModified": 1765835352,
401
+
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
468
402
"owner": "hercules-ci",
469
403
"repo": "flake-parts",
470
-
"rev": "864599284fc7c0ba6357ed89ed5e2cd5040f0c04",
404
+
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
471
405
"type": "github"
472
406
},
473
407
"original": {
···
479
413
"flake-parts_6": {
480
414
"inputs": {
481
415
"nixpkgs-lib": [
482
-
"stylix",
483
-
"nixpkgs"
484
-
]
485
-
},
486
-
"locked": {
487
-
"lastModified": 1756770412,
488
-
"narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
489
-
"owner": "hercules-ci",
490
-
"repo": "flake-parts",
491
-
"rev": "4524271976b625a4a605beefd893f270620fd751",
492
-
"type": "github"
493
-
},
494
-
"original": {
495
-
"owner": "hercules-ci",
496
-
"repo": "flake-parts",
497
-
"type": "github"
498
-
}
499
-
},
500
-
"flake-parts_7": {
501
-
"inputs": {
502
-
"nixpkgs-lib": [
503
416
"tidaLuna",
504
417
"devenv",
505
418
"nixpkgs"
···
519
432
"type": "github"
520
433
}
521
434
},
522
-
"flake-parts_8": {
435
+
"flake-parts_7": {
523
436
"inputs": {
524
437
"nixpkgs-lib": "nixpkgs-lib_3"
525
438
},
···
556
469
},
557
470
"flake-utils_2": {
558
471
"inputs": {
559
-
"systems": "systems_6"
472
+
"systems": "systems_3"
560
473
},
561
474
"locked": {
562
-
"lastModified": 1694529238,
563
-
"narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=",
475
+
"lastModified": 1731533236,
476
+
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
564
477
"owner": "numtide",
565
478
"repo": "flake-utils",
566
-
"rev": "ff7b65b44d01cf9ba6a71320833626af21126384",
479
+
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
567
480
"type": "github"
568
481
},
569
482
"original": {
···
574
487
},
575
488
"flake-utils_3": {
576
489
"inputs": {
577
-
"systems": "systems_8"
490
+
"systems": "systems_6"
578
491
},
579
492
"locked": {
580
493
"lastModified": 1731533236,
···
587
500
"original": {
588
501
"owner": "numtide",
589
502
"repo": "flake-utils",
590
-
"type": "github"
591
-
}
592
-
},
593
-
"fromYaml": {
594
-
"flake": false,
595
-
"locked": {
596
-
"lastModified": 1731966426,
597
-
"narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=",
598
-
"owner": "SenchoPens",
599
-
"repo": "fromYaml",
600
-
"rev": "106af9e2f715e2d828df706c386a685698f3223b",
601
-
"type": "github"
602
-
},
603
-
"original": {
604
-
"owner": "SenchoPens",
605
-
"repo": "fromYaml",
606
503
"type": "github"
607
504
}
608
505
},
···
679
576
"type": "github"
680
577
}
681
578
},
682
-
"gnome-shell": {
683
-
"flake": false,
684
-
"locked": {
685
-
"lastModified": 1748186689,
686
-
"narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=",
687
-
"owner": "GNOME",
688
-
"repo": "gnome-shell",
689
-
"rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0",
690
-
"type": "github"
691
-
},
692
-
"original": {
693
-
"owner": "GNOME",
694
-
"ref": "48.2",
695
-
"repo": "gnome-shell",
696
-
"type": "github"
697
-
}
698
-
},
699
579
"gomod2nix": {
700
580
"inputs": {
701
-
"flake-utils": "flake-utils_2",
581
+
"flake-utils": "flake-utils_3",
702
582
"nixpkgs": [
703
583
"tangled",
704
584
"nixpkgs"
705
585
]
706
586
},
707
587
"locked": {
708
-
"lastModified": 1754078208,
709
-
"narHash": "sha256-YVoIFDCDpYuU3riaDEJ3xiGdPOtsx4sR5eTzHTytPV8=",
588
+
"lastModified": 1763982521,
589
+
"narHash": "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ=",
710
590
"owner": "nix-community",
711
591
"repo": "gomod2nix",
712
-
"rev": "7f963246a71626c7fc70b431a315c4388a0c95cf",
592
+
"rev": "02e63a239d6eabd595db56852535992c898eba72",
713
593
"type": "github"
714
594
},
715
595
"original": {
···
741
621
},
742
622
"home-manager_2": {
743
623
"inputs": {
744
-
"nixpkgs": "nixpkgs_2"
624
+
"nixpkgs": "nixpkgs_3"
745
625
},
746
626
"locked": {
747
-
"lastModified": 1762296971,
748
-
"narHash": "sha256-Jyv3L5rrUYpecON+9zyFz2VqgTSTsIG35fXuCyuCQv0=",
627
+
"lastModified": 1767702900,
628
+
"narHash": "sha256-xMzHmNytl7JgFRov2jHf2GYsLVp/sAfYO0JvbZt0uDo=",
749
629
"owner": "nix-community",
750
630
"repo": "home-manager",
751
-
"rev": "34fe48801d2a5301b814eaa1efb496499d06cebc",
631
+
"rev": "38e187fd2f9efac197e03be0c25f3ee215974144",
752
632
"type": "github"
753
633
},
754
634
"original": {
···
823
703
"url": "https://github.com/rsms/inter/releases/download/v4.1/Inter-4.1.zip"
824
704
}
825
705
},
826
-
"ixx": {
827
-
"inputs": {
828
-
"flake-utils": [
829
-
"nixvim",
830
-
"nuschtosSearch",
831
-
"flake-utils"
832
-
],
833
-
"nixpkgs": [
834
-
"nixvim",
835
-
"nuschtosSearch",
836
-
"nixpkgs"
837
-
]
838
-
},
839
-
"locked": {
840
-
"lastModified": 1754860581,
841
-
"narHash": "sha256-EM0IE63OHxXCOpDHXaTyHIOk2cNvMCGPqLt/IdtVxgk=",
842
-
"owner": "NuschtOS",
843
-
"repo": "ixx",
844
-
"rev": "babfe85a876162c4acc9ab6fb4483df88fa1f281",
845
-
"type": "github"
846
-
},
847
-
"original": {
848
-
"owner": "NuschtOS",
849
-
"ref": "v0.1.1",
850
-
"repo": "ixx",
851
-
"type": "github"
852
-
}
853
-
},
854
706
"lix": {
855
707
"inputs": {
856
708
"flake-compat": "flake-compat_3",
···
863
715
"pre-commit-hooks": "pre-commit-hooks_2"
864
716
},
865
717
"locked": {
866
-
"lastModified": 1762212942,
867
-
"narHash": "sha256-DTwYxw0oiJfe6FtdJ+6KbqQeKUoV9E0nEUUwtwcF42U=",
868
-
"rev": "f369c711dd8bd6eec6905645dab9a153ebbba0a8",
718
+
"lastModified": 1767713749,
719
+
"narHash": "sha256-56x//7ognPbg9wNs7zJTwT7PjNR992PyYbIUQA4dHoc=",
720
+
"rev": "b97b2e858babef00faa46fa557d9afe9e089a12a",
869
721
"type": "tarball",
870
-
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/f369c711dd8bd6eec6905645dab9a153ebbba0a8.tar.gz?rev=f369c711dd8bd6eec6905645dab9a153ebbba0a8"
722
+
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/b97b2e858babef00faa46fa557d9afe9e089a12a.tar.gz?rev=b97b2e858babef00faa46fa557d9afe9e089a12a"
871
723
},
872
724
"original": {
873
725
"type": "tarball",
···
957
809
]
958
810
},
959
811
"locked": {
960
-
"lastModified": 1762307771,
961
-
"narHash": "sha256-IJWQ1NlFRATSrGa5eZdg9kQynDJOwT6WAY/P5KHAMBc=",
812
+
"lastModified": 1767579768,
813
+
"narHash": "sha256-MDyl7tiem57OAOcPuCJrONh1PCcKj5OzJEesBrka3dk=",
962
814
"owner": "fufexan",
963
815
"repo": "nix-gaming",
964
-
"rev": "4e3340a53ea9f6b79168050a3e4b9c3944ff158e",
816
+
"rev": "4199abcbc86b52e6878d1021da61c4e8e308e00e",
965
817
"type": "github"
966
818
},
967
819
"original": {
···
970
822
"type": "github"
971
823
}
972
824
},
825
+
"nix-jetbrains-plugins": {
826
+
"inputs": {
827
+
"flake-utils": "flake-utils",
828
+
"nix-rust-wrangler": "nix-rust-wrangler",
829
+
"nixpkgs": "nixpkgs_5",
830
+
"rust-overlay": "rust-overlay_3"
831
+
},
832
+
"locked": {
833
+
"lastModified": 1767845296,
834
+
"narHash": "sha256-o2EXCxnfi0WgCq3Mbmcn4aNwcXxfHV6/idZO+VFNIjY=",
835
+
"owner": "Janrupf",
836
+
"repo": "nix-jetbrains-plugin-repository",
837
+
"rev": "09765ba1158410cb098880161f06b8e2607c8bef",
838
+
"type": "github"
839
+
},
840
+
"original": {
841
+
"owner": "Janrupf",
842
+
"repo": "nix-jetbrains-plugin-repository",
843
+
"type": "github"
844
+
}
845
+
},
846
+
"nix-rust-wrangler": {
847
+
"inputs": {
848
+
"flake-utils": "flake-utils_2",
849
+
"nixpkgs": [
850
+
"nix-jetbrains-plugins",
851
+
"nixpkgs"
852
+
],
853
+
"rust-overlay": "rust-overlay_2"
854
+
},
855
+
"locked": {
856
+
"lastModified": 1764906652,
857
+
"narHash": "sha256-4eY+9dKYhTWx1X7AGVNfwxNlruR0Pjx16Anrm6ifnVo=",
858
+
"owner": "Janrupf",
859
+
"repo": "nix-rust-wrangler",
860
+
"rev": "ab6b5ea4d654a05fea9e1ea53359a9be16777800",
861
+
"type": "github"
862
+
},
863
+
"original": {
864
+
"owner": "Janrupf",
865
+
"repo": "nix-rust-wrangler",
866
+
"type": "github"
867
+
}
868
+
},
973
869
"nix2container": {
974
870
"flake": false,
975
871
"locked": {
···
993
889
"flake-compat"
994
890
],
995
891
"lowdown-src": "lowdown-src",
996
-
"nixpkgs": "nixpkgs_3",
892
+
"nixpkgs": "nixpkgs_4",
997
893
"nixpkgs-regression": [
998
894
"lix",
999
895
"nixpkgs-regression"
···
1023
919
]
1024
920
},
1025
921
"locked": {
1026
-
"lastModified": 1758701706,
1027
-
"narHash": "sha256-aEwPAnMQ/FIisvGswjm9T+QkIptuXDzeUo8vxTTX/Io=",
1028
-
"owner": "xaiyadev",
922
+
"lastModified": 1767715368,
923
+
"narHash": "sha256-3JkfCB4MwVMLlC8N/ATth3saUF9kD1WQiIF/quDpvNo=",
924
+
"owner": "KaylorBen",
1029
925
"repo": "nixcord",
1030
-
"rev": "418e383f8dc3a47b60e3ea16b06c7671b0e65ec2",
926
+
"rev": "f391c270ad2c74a94d99cbc9ad6a57478111c6de",
1031
927
"type": "github"
1032
928
},
1033
929
"original": {
1034
-
"owner": "xaiyadev",
1035
-
"ref": "fix/user-cfg-no-option",
930
+
"owner": "KaylorBen",
1036
931
"repo": "nixcord",
1037
932
"type": "github"
1038
933
}
1039
934
},
1040
935
"nixos-hardware": {
1041
936
"locked": {
1042
-
"lastModified": 1762336257,
1043
-
"narHash": "sha256-2u5rstcMTqpAr4UF+exs5WGOT62VJRb4yauR6JJHJXs=",
937
+
"lastModified": 1767185284,
938
+
"narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=",
1044
939
"owner": "NixOS",
1045
940
"repo": "nixos-hardware",
1046
-
"rev": "d48e8f0e1691e0200a675c13df7c85e275090a15",
941
+
"rev": "40b1a28dce561bea34858287fbb23052c3ee63fe",
1047
942
"type": "github"
1048
943
},
1049
944
"original": {
···
1071
966
},
1072
967
"nixpkgs-lib": {
1073
968
"locked": {
1074
-
"lastModified": 1761765539,
1075
-
"narHash": "sha256-b0yj6kfvO8ApcSE+QmA6mUfu8IYG6/uU28OFn4PaC8M=",
969
+
"lastModified": 1765674936,
970
+
"narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=",
1076
971
"owner": "nix-community",
1077
972
"repo": "nixpkgs.lib",
1078
-
"rev": "719359f4562934ae99f5443f20aa06c2ffff91fc",
973
+
"rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85",
1079
974
"type": "github"
1080
975
},
1081
976
"original": {
···
1086
981
},
1087
982
"nixpkgs-lib_2": {
1088
983
"locked": {
1089
-
"lastModified": 1753579242,
1090
-
"narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=",
984
+
"lastModified": 1765674936,
985
+
"narHash": "sha256-k00uTP4JNfmejrCLJOwdObYC9jHRrr/5M/a/8L2EIdo=",
1091
986
"owner": "nix-community",
1092
987
"repo": "nixpkgs.lib",
1093
-
"rev": "0f36c44e01a6129be94e3ade315a5883f0228a6e",
988
+
"rev": "2075416fcb47225d9b68ac469a5c4801a9c4dd85",
1094
989
"type": "github"
1095
990
},
1096
991
"original": {
···
1130
1025
"type": "github"
1131
1026
}
1132
1027
},
1028
+
"nixpkgs_10": {
1029
+
"locked": {
1030
+
"lastModified": 1760103332,
1031
+
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1032
+
"owner": "NixOS",
1033
+
"repo": "nixpkgs",
1034
+
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1035
+
"type": "github"
1036
+
},
1037
+
"original": {
1038
+
"owner": "NixOS",
1039
+
"ref": "nixpkgs-unstable",
1040
+
"repo": "nixpkgs",
1041
+
"type": "github"
1042
+
}
1043
+
},
1133
1044
"nixpkgs_2": {
1134
1045
"locked": {
1135
-
"lastModified": 1761907660,
1136
-
"narHash": "sha256-kJ8lIZsiPOmbkJypG+B5sReDXSD1KGu2VEPNqhRa/ew=",
1046
+
"lastModified": 1767116409,
1047
+
"narHash": "sha256-5vKw92l1GyTnjoLzEagJy5V5mDFck72LiQWZSOnSicw=",
1137
1048
"owner": "NixOS",
1138
1049
"repo": "nixpkgs",
1139
-
"rev": "2fb006b87f04c4d3bdf08cfdbc7fab9c13d94a15",
1050
+
"rev": "cad22e7d996aea55ecab064e84834289143e44a0",
1140
1051
"type": "github"
1141
1052
},
1142
1053
"original": {
···
1148
1059
},
1149
1060
"nixpkgs_3": {
1150
1061
"locked": {
1151
-
"lastModified": 1705033721,
1152
-
"narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=",
1062
+
"lastModified": 1766902085,
1063
+
"narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=",
1153
1064
"owner": "NixOS",
1154
1065
"repo": "nixpkgs",
1155
-
"rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea",
1066
+
"rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4",
1156
1067
"type": "github"
1157
1068
},
1158
1069
"original": {
1159
1070
"owner": "NixOS",
1160
-
"ref": "nixos-23.05-small",
1071
+
"ref": "nixos-unstable",
1161
1072
"repo": "nixpkgs",
1162
1073
"type": "github"
1163
1074
}
1164
1075
},
1165
1076
"nixpkgs_4": {
1166
1077
"locked": {
1167
-
"lastModified": 1762111121,
1168
-
"narHash": "sha256-4vhDuZ7OZaZmKKrnDpxLZZpGIJvAeMtK6FKLJYUtAdw=",
1078
+
"lastModified": 1705033721,
1079
+
"narHash": "sha256-K5eJHmL1/kev6WuqyqqbS1cdNnSidIZ3jeqJ7GbrYnQ=",
1169
1080
"owner": "NixOS",
1170
1081
"repo": "nixpkgs",
1171
-
"rev": "b3d51a0365f6695e7dd5cdf3e180604530ed33b4",
1082
+
"rev": "a1982c92d8980a0114372973cbdfe0a307f1bdea",
1172
1083
"type": "github"
1173
1084
},
1174
1085
"original": {
1175
1086
"owner": "NixOS",
1176
-
"ref": "nixos-unstable",
1087
+
"ref": "nixos-23.05-small",
1177
1088
"repo": "nixpkgs",
1178
1089
"type": "github"
1179
1090
}
1180
1091
},
1181
1092
"nixpkgs_5": {
1182
1093
"locked": {
1183
-
"lastModified": 1761656231,
1184
-
"narHash": "sha256-EiED5k6gXTWoAIS8yQqi5mAX6ojnzpHwAQTS3ykeYMg=",
1094
+
"lastModified": 1765472234,
1095
+
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
1185
1096
"owner": "NixOS",
1186
1097
"repo": "nixpkgs",
1187
-
"rev": "e99366c665bdd53b7b500ccdc5226675cfc51f45",
1098
+
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
1188
1099
"type": "github"
1189
1100
},
1190
1101
"original": {
1191
1102
"owner": "NixOS",
1192
-
"ref": "nixpkgs-unstable",
1103
+
"ref": "nixos-unstable",
1193
1104
"repo": "nixpkgs",
1194
1105
"type": "github"
1195
1106
}
1196
1107
},
1197
1108
"nixpkgs_6": {
1198
1109
"locked": {
1199
-
"lastModified": 1758532697,
1200
-
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1201
-
"owner": "cachix",
1202
-
"repo": "devenv-nixpkgs",
1203
-
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1110
+
"lastModified": 1767640445,
1111
+
"narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=",
1112
+
"owner": "NixOS",
1113
+
"repo": "nixpkgs",
1114
+
"rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5",
1204
1115
"type": "github"
1205
1116
},
1206
1117
"original": {
1207
-
"owner": "cachix",
1208
-
"ref": "rolling",
1209
-
"repo": "devenv-nixpkgs",
1118
+
"owner": "NixOS",
1119
+
"ref": "nixos-unstable",
1120
+
"repo": "nixpkgs",
1210
1121
"type": "github"
1211
1122
}
1212
1123
},
1213
1124
"nixpkgs_7": {
1214
1125
"locked": {
1215
-
"lastModified": 1760103332,
1216
-
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1126
+
"lastModified": 1767026758,
1127
+
"narHash": "sha256-7fsac/f7nh/VaKJ/qm3I338+wAJa/3J57cOGpXi0Sbg=",
1217
1128
"owner": "NixOS",
1218
1129
"repo": "nixpkgs",
1219
-
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1130
+
"rev": "346dd96ad74dc4457a9db9de4f4f57dab2e5731d",
1220
1131
"type": "github"
1221
1132
},
1222
1133
"original": {
···
1226
1137
"type": "github"
1227
1138
}
1228
1139
},
1229
-
"nixvim": {
1230
-
"inputs": {
1231
-
"flake-parts": "flake-parts_5",
1232
-
"nixpkgs": "nixpkgs_5",
1233
-
"nuschtosSearch": "nuschtosSearch",
1234
-
"systems": "systems_3"
1235
-
},
1140
+
"nixpkgs_8": {
1236
1141
"locked": {
1237
-
"lastModified": 1762293638,
1238
-
"narHash": "sha256-svsYLbxNq8EZoVtNF97wCAElZ2py5Q1p7viG6lTUixA=",
1239
-
"owner": "nix-community",
1240
-
"repo": "nixvim",
1241
-
"rev": "aa3a1dfb028cd09b8061862f9dd8d859467fc7ed",
1242
-
"type": "github"
1142
+
"lastModified": 1767364772,
1143
+
"narHash": "sha256-G6ie+qOCRSV7wzOY+6L1o8GvcH1qDcE/DTzDT4CRdNw=",
1144
+
"rev": "16c7794d0a28b5a37904d55bcca36003b9109aaa",
1145
+
"type": "tarball",
1146
+
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre921317.16c7794d0a28/nixexprs.tar.xz?lastModified=1767364772&rev=16c7794d0a28b5a37904d55bcca36003b9109aaa"
1243
1147
},
1244
1148
"original": {
1245
-
"owner": "nix-community",
1246
-
"repo": "nixvim",
1247
-
"type": "github"
1149
+
"type": "tarball",
1150
+
"url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz"
1248
1151
}
1249
1152
},
1250
-
"nur": {
1251
-
"inputs": {
1252
-
"flake-parts": [
1253
-
"stylix",
1254
-
"flake-parts"
1255
-
],
1256
-
"nixpkgs": [
1257
-
"stylix",
1258
-
"nixpkgs"
1259
-
]
1260
-
},
1153
+
"nixpkgs_9": {
1261
1154
"locked": {
1262
-
"lastModified": 1758998580,
1263
-
"narHash": "sha256-VLx0z396gDCGSiowLMFz5XRO/XuNV+4EnDYjdJhHvUk=",
1264
-
"owner": "nix-community",
1265
-
"repo": "NUR",
1266
-
"rev": "ba8d9c98f5f4630bcb0e815ab456afd90c930728",
1155
+
"lastModified": 1758532697,
1156
+
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1157
+
"owner": "cachix",
1158
+
"repo": "devenv-nixpkgs",
1159
+
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1267
1160
"type": "github"
1268
1161
},
1269
1162
"original": {
1270
-
"owner": "nix-community",
1271
-
"repo": "NUR",
1163
+
"owner": "cachix",
1164
+
"ref": "rolling",
1165
+
"repo": "devenv-nixpkgs",
1272
1166
"type": "github"
1273
1167
}
1274
1168
},
1275
-
"nuschtosSearch": {
1169
+
"nixvim": {
1276
1170
"inputs": {
1277
-
"flake-utils": "flake-utils",
1278
-
"ixx": "ixx",
1279
-
"nixpkgs": [
1280
-
"nixvim",
1281
-
"nixpkgs"
1282
-
]
1171
+
"flake-parts": "flake-parts_5",
1172
+
"nixpkgs": "nixpkgs_7",
1173
+
"systems": "systems_4"
1283
1174
},
1284
1175
"locked": {
1285
-
"lastModified": 1761730856,
1286
-
"narHash": "sha256-t1i5p/vSWwueZSC0Z2BImxx3BjoUDNKyC2mk24krcMY=",
1287
-
"owner": "NuschtOS",
1288
-
"repo": "search",
1289
-
"rev": "e29de6db0cb3182e9aee75a3b1fd1919d995d85b",
1176
+
"lastModified": 1767608728,
1177
+
"narHash": "sha256-kmSJCTgrx+BxgqQOTPHAOkohvO+lbRsPWqu+PSPcz3I=",
1178
+
"owner": "nix-community",
1179
+
"repo": "nixvim",
1180
+
"rev": "851399eebd0fb383d2fd76269d859f16021dc7a8",
1290
1181
"type": "github"
1291
1182
},
1292
1183
"original": {
1293
-
"owner": "NuschtOS",
1294
-
"repo": "search",
1184
+
"owner": "nix-community",
1185
+
"repo": "nixvim",
1295
1186
"type": "github"
1296
1187
}
1297
1188
},
···
1339
1230
"aagl": "aagl",
1340
1231
"agenix": "agenix",
1341
1232
"agenix-rekey": "agenix-rekey",
1233
+
"catppuccin": "catppuccin",
1342
1234
"easy-hosts": "easy-hosts",
1343
1235
"flake-parts": "flake-parts_2",
1344
1236
"home-manager": "home-manager_2",
1345
1237
"lix": "lix",
1346
1238
"nix-gaming": "nix-gaming",
1239
+
"nix-jetbrains-plugins": "nix-jetbrains-plugins",
1347
1240
"nixcord": "nixcord",
1348
1241
"nixos-hardware": "nixos-hardware",
1349
-
"nixpkgs": "nixpkgs_4",
1242
+
"nixpkgs": "nixpkgs_6",
1350
1243
"nixvim": "nixvim",
1351
-
"stylix": "stylix",
1352
1244
"systems": "systems_5",
1353
1245
"tangled": "tangled",
1246
+
"tgirlpkgs": "tgirlpkgs",
1354
1247
"tidaLuna": "tidaLuna",
1355
1248
"tinted-theming-schemes": "tinted-theming-schemes",
1356
1249
"vicinae": "vicinae"
···
1361
1254
"nixpkgs": "nixpkgs"
1362
1255
},
1363
1256
"locked": {
1364
-
"lastModified": 1761791894,
1365
-
"narHash": "sha256-myRIDh+PxaREz+z9LzbqBJF+SnTFJwkthKDX9zMyddY=",
1257
+
"lastModified": 1764470739,
1258
+
"narHash": "sha256-sa9f81B1dWO16QtgDTWHX8DQbiHKzHndpaunY5EQtwE=",
1366
1259
"owner": "oxalica",
1367
1260
"repo": "rust-overlay",
1368
-
"rev": "59c45eb69d9222a4362673141e00ff77842cd219",
1261
+
"rev": "3bfa664055e1a09c6aedab5533c5fc8d6ca5741a",
1369
1262
"type": "github"
1370
1263
},
1371
1264
"original": {
···
1374
1267
"type": "github"
1375
1268
}
1376
1269
},
1377
-
"sqlite-lib-src": {
1378
-
"flake": false,
1270
+
"rust-overlay_2": {
1271
+
"inputs": {
1272
+
"nixpkgs": [
1273
+
"nix-jetbrains-plugins",
1274
+
"nix-rust-wrangler",
1275
+
"nixpkgs"
1276
+
]
1277
+
},
1379
1278
"locked": {
1380
-
"lastModified": 1706631843,
1381
-
"narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=",
1382
-
"type": "tarball",
1383
-
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1279
+
"lastModified": 1764902447,
1280
+
"narHash": "sha256-wNqkDBj+tjK619sTHPEA7uhjr7DHHEY8OsFou31dxy0=",
1281
+
"owner": "oxalica",
1282
+
"repo": "rust-overlay",
1283
+
"rev": "d914a744a83098eeb28125d2848ad383b209223f",
1284
+
"type": "github"
1384
1285
},
1385
1286
"original": {
1386
-
"type": "tarball",
1387
-
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1287
+
"owner": "oxalica",
1288
+
"repo": "rust-overlay",
1289
+
"type": "github"
1388
1290
}
1389
1291
},
1390
-
"stylix": {
1292
+
"rust-overlay_3": {
1391
1293
"inputs": {
1392
-
"base16": "base16",
1393
-
"base16-fish": "base16-fish",
1394
-
"base16-helix": "base16-helix",
1395
-
"base16-vim": "base16-vim",
1396
-
"firefox-gnome-theme": "firefox-gnome-theme",
1397
-
"flake-parts": "flake-parts_6",
1398
-
"gnome-shell": "gnome-shell",
1399
1294
"nixpkgs": [
1295
+
"nix-jetbrains-plugins",
1400
1296
"nixpkgs"
1401
-
],
1402
-
"nur": "nur",
1403
-
"systems": "systems_4",
1404
-
"tinted-foot": "tinted-foot",
1405
-
"tinted-kitty": "tinted-kitty",
1406
-
"tinted-schemes": "tinted-schemes",
1407
-
"tinted-tmux": "tinted-tmux",
1408
-
"tinted-zed": "tinted-zed"
1297
+
]
1409
1298
},
1410
1299
"locked": {
1411
-
"lastModified": 1762264356,
1412
-
"narHash": "sha256-QVfC53Ri+8n3e7Ujx9kq6all3+TLBRRPRnc6No5qY5w=",
1413
-
"owner": "danth",
1414
-
"repo": "stylix",
1415
-
"rev": "647bb8dd96a206a1b79c4fd714affc88b409e10b",
1300
+
"lastModified": 1767840362,
1301
+
"narHash": "sha256-ZtsFqUhilubohNZ1TgpQIFsi4biZTwRH9rjZsDRDik8=",
1302
+
"owner": "oxalica",
1303
+
"repo": "rust-overlay",
1304
+
"rev": "d159ea1fc321c60f88a616ac28bab660092a227d",
1416
1305
"type": "github"
1417
1306
},
1418
1307
"original": {
1419
-
"owner": "danth",
1420
-
"repo": "stylix",
1308
+
"owner": "oxalica",
1309
+
"repo": "rust-overlay",
1421
1310
"type": "github"
1311
+
}
1312
+
},
1313
+
"sqlite-lib-src": {
1314
+
"flake": false,
1315
+
"locked": {
1316
+
"lastModified": 1706631843,
1317
+
"narHash": "sha256-bJoMjirsBjm2Qk9KPiy3yV3+8b/POlYe76/FQbciHro=",
1318
+
"type": "tarball",
1319
+
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1320
+
},
1321
+
"original": {
1322
+
"type": "tarball",
1323
+
"url": "https://sqlite.org/2024/sqlite-amalgamation-3450100.zip"
1422
1324
}
1423
1325
},
1424
1326
"systems": {
···
1558
1460
"sqlite-lib-src": "sqlite-lib-src"
1559
1461
},
1560
1462
"locked": {
1561
-
"lastModified": 1763438625,
1562
-
"narHash": "sha256-INS8/F1kLnA/RmGe9oXNHKfo5WR0OTXkh/Y0SB2gpyE=",
1463
+
"lastModified": 1767683698,
1464
+
"narHash": "sha256-MFrfNmTKTdOOsyXUvvqPwH6zqvDZZpURnd7QdJkVOgU=",
1563
1465
"ref": "refs/heads/master",
1564
-
"rev": "2be5f4ac9581e4ff1c5656f698e494c99630202c",
1565
-
"revCount": 1674,
1466
+
"rev": "b31a2a3590fefc4c70817f94a20076df2428b4d3",
1467
+
"revCount": 1791,
1566
1468
"type": "git",
1567
1469
"url": "https://tangled.org/tangled.org/core"
1568
1470
},
···
1571
1473
"url": "https://tangled.org/tangled.org/core"
1572
1474
}
1573
1475
},
1574
-
"tidaLuna": {
1476
+
"tgirlpkgs": {
1575
1477
"inputs": {
1576
-
"devenv": "devenv",
1577
-
"flake-parts": "flake-parts_8",
1578
-
"nixpkgs": "nixpkgs_7",
1579
-
"systems": "systems_7"
1478
+
"nixpkgs": "nixpkgs_8"
1580
1479
},
1581
1480
"locked": {
1582
-
"lastModified": 1762313683,
1583
-
"narHash": "sha256-m9M2MdX2yygsCNfH0P56aeJtEt4ax/t/cOhk4Mehs5c=",
1584
-
"owner": "Inrixia",
1585
-
"repo": "TidaLuna",
1586
-
"rev": "649bdd566fb5dcc1b45a3d5ef4d3a81ddbc333cd",
1481
+
"lastModified": 1767660739,
1482
+
"narHash": "sha256-BuDIrsTL90jorWks/TAy0VVZIkeMn6p3CQCkvWeTzyA=",
1483
+
"owner": "tgirlcloud",
1484
+
"repo": "pkgs",
1485
+
"rev": "3e5419554c59db95844713444be102611c922740",
1587
1486
"type": "github"
1588
1487
},
1589
1488
"original": {
1590
-
"owner": "Inrixia",
1591
-
"repo": "TidaLuna",
1489
+
"owner": "tgirlcloud",
1490
+
"repo": "pkgs",
1592
1491
"type": "github"
1593
1492
}
1594
1493
},
1595
-
"tinted-foot": {
1596
-
"flake": false,
1597
-
"locked": {
1598
-
"lastModified": 1726913040,
1599
-
"narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=",
1600
-
"owner": "tinted-theming",
1601
-
"repo": "tinted-foot",
1602
-
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
1603
-
"type": "github"
1494
+
"tidaLuna": {
1495
+
"inputs": {
1496
+
"devenv": "devenv",
1497
+
"flake-parts": "flake-parts_7",
1498
+
"nixpkgs": "nixpkgs_10",
1499
+
"systems": "systems_7"
1604
1500
},
1605
-
"original": {
1606
-
"owner": "tinted-theming",
1607
-
"repo": "tinted-foot",
1608
-
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
1609
-
"type": "github"
1610
-
}
1611
-
},
1612
-
"tinted-kitty": {
1613
-
"flake": false,
1614
1501
"locked": {
1615
-
"lastModified": 1735730497,
1616
-
"narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=",
1617
-
"owner": "tinted-theming",
1618
-
"repo": "tinted-kitty",
1619
-
"rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa",
1620
-
"type": "github"
1621
-
},
1622
-
"original": {
1623
-
"owner": "tinted-theming",
1624
-
"repo": "tinted-kitty",
1625
-
"type": "github"
1626
-
}
1627
-
},
1628
-
"tinted-schemes": {
1629
-
"flake": false,
1630
-
"locked": {
1631
-
"lastModified": 1757716333,
1632
-
"narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=",
1633
-
"owner": "tinted-theming",
1634
-
"repo": "schemes",
1635
-
"rev": "317a5e10c35825a6c905d912e480dfe8e71c7559",
1502
+
"lastModified": 1765158153,
1503
+
"narHash": "sha256-7+BABZopsekmRjFBLl8Ni8bY5sIOtk2niiSnD7EuubM=",
1504
+
"owner": "Inrixia",
1505
+
"repo": "TidaLuna",
1506
+
"rev": "94c277909f395922c4cee2729de771adf3f82d87",
1636
1507
"type": "github"
1637
1508
},
1638
1509
"original": {
1639
-
"owner": "tinted-theming",
1640
-
"repo": "schemes",
1510
+
"owner": "Inrixia",
1511
+
"repo": "TidaLuna",
1641
1512
"type": "github"
1642
1513
}
1643
1514
},
1644
1515
"tinted-theming-schemes": {
1645
1516
"flake": false,
1646
1517
"locked": {
1647
-
"lastModified": 1757716333,
1648
-
"narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=",
1518
+
"lastModified": 1767710407,
1519
+
"narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=",
1649
1520
"owner": "tinted-theming",
1650
1521
"repo": "schemes",
1651
-
"rev": "317a5e10c35825a6c905d912e480dfe8e71c7559",
1522
+
"rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2",
1652
1523
"type": "github"
1653
1524
},
1654
1525
"original": {
···
1657
1528
"type": "github"
1658
1529
}
1659
1530
},
1660
-
"tinted-tmux": {
1661
-
"flake": false,
1662
-
"locked": {
1663
-
"lastModified": 1757811970,
1664
-
"narHash": "sha256-n5ZJgmzGZXOD9pZdAl1OnBu3PIqD+X3vEBUGbTi4JiI=",
1665
-
"owner": "tinted-theming",
1666
-
"repo": "tinted-tmux",
1667
-
"rev": "d217ba31c846006e9e0ae70775b0ee0f00aa6b1e",
1668
-
"type": "github"
1669
-
},
1670
-
"original": {
1671
-
"owner": "tinted-theming",
1672
-
"repo": "tinted-tmux",
1673
-
"type": "github"
1674
-
}
1675
-
},
1676
-
"tinted-zed": {
1677
-
"flake": false,
1678
-
"locked": {
1679
-
"lastModified": 1757811247,
1680
-
"narHash": "sha256-4EFOUyLj85NRL3OacHoLGEo0wjiRJzfsXtR4CZWAn6w=",
1681
-
"owner": "tinted-theming",
1682
-
"repo": "base16-zed",
1683
-
"rev": "824fe0aacf82b3c26690d14e8d2cedd56e18404e",
1684
-
"type": "github"
1685
-
},
1686
-
"original": {
1687
-
"owner": "tinted-theming",
1688
-
"repo": "base16-zed",
1689
-
"type": "github"
1690
-
}
1691
-
},
1692
1531
"treefmt-nix": {
1693
1532
"inputs": {
1694
1533
"nixpkgs": [
···
1712
1551
},
1713
1552
"vicinae": {
1714
1553
"inputs": {
1715
-
"flake-utils": "flake-utils_3",
1716
1554
"nixpkgs": [
1717
1555
"nixpkgs"
1718
-
]
1556
+
],
1557
+
"systems": "systems_8"
1719
1558
},
1720
1559
"locked": {
1721
-
"lastModified": 1762327833,
1722
-
"narHash": "sha256-mw+2Tylv6otpiXpyN5bBqxrsZvEVYPSKgaNUI2yzazQ=",
1560
+
"lastModified": 1767715269,
1561
+
"narHash": "sha256-0QV6SuVyt16rTVNoB9W3ZwRm7FhJ1pwuDMUH2VkOI6A=",
1723
1562
"owner": "vicinaehq",
1724
1563
"repo": "vicinae",
1725
-
"rev": "de12226d691f084bd2033239be8243a11451f3c3",
1564
+
"rev": "cd95054a199bba898c79ffa23fa41bac7326a375",
1726
1565
"type": "github"
1727
1566
},
1728
1567
"original": {
+20
-10
flake.nix
+20
-10
flake.nix
···
11
11
inputs.nixpkgs.follows = "nixpkgs";
12
12
};
13
13
14
+
nix-jetbrains-plugins = {
15
+
type = "github";
16
+
owner = "Janrupf";
17
+
repo = "nix-jetbrains-plugin-repository";
18
+
};
19
+
20
+
catppuccin = {
21
+
type = "github";
22
+
owner = "catppuccin";
23
+
repo = "nix";
24
+
};
25
+
14
26
# Tangled knots
15
27
tangled = {
16
28
url = "git+https://tangled.org/tangled.org/core";
···
23
35
owner = "NixOS";
24
36
repo = "nixpkgs";
25
37
ref = "nixos-unstable";
38
+
};
39
+
40
+
# Package collection
41
+
tgirlpkgs = {
42
+
type = "github";
43
+
owner = "tgirlcloud";
44
+
repo = "pkgs";
26
45
};
27
46
28
47
nixvim = {
···
91
110
repo = "TidaLuna";
92
111
};
93
112
94
-
stylix = {
95
-
type = "github";
96
-
owner = "danth";
97
-
repo = "stylix";
98
-
99
-
inputs.nixpkgs.follows = "nixpkgs";
100
-
};
101
-
102
113
tinted-theming-schemes = {
103
114
type = "github";
104
115
owner = "tinted-theming";
···
108
119
109
120
nixcord = {
110
121
type = "github";
111
-
owner = "xaiyadev";
122
+
owner = "KaylorBen";
112
123
repo = "nixcord";
113
-
ref = "fix/user-cfg-no-option";
114
124
115
125
inputs.nixpkgs.follows = "nixpkgs";
116
126
};
+2
home/blmedia/default.nix
+2
home/blmedia/default.nix
-3
home/blmedia/packages.nix
-3
home/blmedia/packages.nix
···
4
4
home.packages = [
5
5
pkgs.enpass
6
6
7
-
pkgs.jetbrains.phpstorm # Mainly using neovim, but for some work stuff still needed
8
7
pkgs.obsidian # Notes taking app
9
8
10
9
pkgs.mpv # Music streaming
11
10
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
12
-
13
-
pkgs.wasistlos # Whatsapp for linux
14
11
15
12
pkgs.teams-for-linux # Teams; Need that for school and work
16
13
+2
home/default.nix
+2
home/default.nix
+2
home/xaiya/default.nix
+2
home/xaiya/default.nix
+1
-3
home/xaiya/packages.nix
+1
-3
home/xaiya/packages.nix
···
1
1
# Packages that are not configurable/are not configured will land here
2
-
{ pkgs, inputs', ... }:
2
+
{ pkgs, inputs', osConfig, ... }:
3
3
{
4
4
home.packages = [
5
5
pkgs.obsidian # Notes taking app
···
11
11
# Music/Media players
12
12
pkgs.mpv # Music streaming
13
13
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
14
-
15
-
pkgs.wasistlos # Whatsapp for linux
16
14
17
15
pkgs.teams-for-linux # Teams; Need that for school and work
18
16
#pkgs.ciscoPacketTracer8 # Cisco software that I need for school
-7
modules/base/default.nix
-7
modules/base/default.nix
-30
modules/base/theme.nix
-30
modules/base/theme.nix
···
1
-
{
2
-
self,
3
-
lib,
4
-
config,
5
-
inputs,
6
-
pkgs,
7
-
...
8
-
}:
9
-
let
10
-
inherit (lib.types)
11
-
path
12
-
enum
13
-
nullOr
14
-
str
15
-
package
16
-
;
17
-
18
-
inherit (self.lib.modules) mkOpt;
19
-
20
-
cfg = config.sylveon.system.theme;
21
-
in
22
-
{
23
-
options.sylveon.system.theme = {
24
-
name = mkOpt (nullOr (enum [ "rose-pine" ])) "rose-pine" "The theme that should be loaded";
25
-
26
-
base16 =
27
-
mkOpt path "${inputs.tinted-theming-schemes}/base16/${cfg.name}.yaml"
28
-
"Path to base16 file for your theme";
29
-
};
30
-
}
-4
modules/home/cli/kitty.nix
-4
modules/home/cli/kitty.nix
···
22
22
config = mkIf (cfg.enable || sway.enable) {
23
23
programs.kitty = {
24
24
enable = true;
25
-
inherit (cfg) package;
26
25
27
26
shellIntegration.enableZshIntegration = config.programs.zsh.enable;
28
27
enableGitIntegration = true;
29
-
themeFile = "rose-pine";
30
28
31
29
# removing annoying things
32
30
settings.enable_audio_bell = false;
33
31
};
34
-
35
-
stylix.targets.kitty.enable = false; # Using the kitty theme instead of base16
36
32
};
37
33
}
+1
-6
modules/home/cli/neovim/default.nix
+1
-6
modules/home/cli/neovim/default.nix
···
35
35
./social.nix
36
36
];
37
37
38
+
# Neovim should be used as a lightweigt editor (used for small changes)
38
39
options.sylveon.cli.neovim = {
39
40
enable = mkOpt bool false "vim editor, only better";
40
41
anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
···
112
113
lz-n.enable = true; # Lazy loading
113
114
};
114
115
};
115
-
116
-
stylix.targets.nixvim = {
117
-
plugin = "mini.base16";
118
-
transparentBackground.main = true;
119
-
};
120
-
121
116
};
122
117
}
+1
-1
modules/home/cli/neovim/telescope.nix
+1
-1
modules/home/cli/neovim/telescope.nix
-27
modules/home/desktop/cursor.nix
-27
modules/home/desktop/cursor.nix
···
1
-
{
2
-
self,
3
-
lib,
4
-
pkgs,
5
-
osConfig,
6
-
...
7
-
}:
8
-
let
9
-
inherit (lib) mkIf;
10
-
11
-
prof = osConfig.sylveon.profiles;
12
-
in
13
-
{
14
-
15
-
config = mkIf prof.graphical.enable {
16
-
home.pointerCursor = {
17
-
enable = true;
18
-
19
-
name = "BreezeX-RosePineDawn-Linux";
20
-
package = pkgs.rose-pine-cursor;
21
-
size = 32;
22
-
23
-
sway.enable = true;
24
-
gtk.enable = true;
25
-
};
26
-
};
27
-
}
+2
-2
modules/home/desktop/default.nix
+2
-2
modules/home/desktop/default.nix
+31
modules/home/desktop/kanshi/docked_office.nix
+31
modules/home/desktop/kanshi/docked_office.nix
···
72
72
];
73
73
};
74
74
}
75
+
76
+
{
77
+
profile = {
78
+
name = "${name}-elvis";
79
+
outputs = [
80
+
{
81
+
criteria = "${office_screen_2} ULTRAFINE 404NTGY9M335";
82
+
position = "2560,132";
83
+
84
+
scale = 1.2;
85
+
mode = "3840x2160@60.000Hz";
86
+
}
87
+
88
+
{
89
+
criteria = "${office_screen_2} ULTRAFINE 404NTYT9M282";
90
+
position = "5762,132";
91
+
92
+
scale = 1.2;
93
+
mode = "3840x2160@60.000Hz";
94
+
}
95
+
96
+
{
97
+
criteria = "eDP-2";
98
+
position = "0,99";
99
+
100
+
mode = "2560x1600@165.000Hz";
101
+
scale = 1.3;
102
+
}
103
+
];
104
+
};
105
+
}
75
106
];
76
107
}
+64
modules/home/desktop/style.nix
+64
modules/home/desktop/style.nix
···
1
+
{
2
+
osConfig,
3
+
lib,
4
+
inputs,
5
+
pkgs,
6
+
config,
7
+
...
8
+
}:
9
+
let
10
+
inherit (lib) mkIf;
11
+
cfg = config.catppuccin;
12
+
in
13
+
{
14
+
imports = [ inputs.catppuccin.homeModules.catppuccin ];
15
+
16
+
# Use the global catppuccin configuration
17
+
/*
18
+
TODO: applications that need to be manaul integrated/need nix integration
19
+
- TidaLuna
20
+
*/
21
+
config = mkIf osConfig.catppuccin.enable {
22
+
catppuccin = {
23
+
enable = true;
24
+
25
+
inherit (osConfig.catppuccin)
26
+
accent
27
+
flavor
28
+
;
29
+
};
30
+
31
+
gtk = {
32
+
enable = true;
33
+
34
+
theme = {
35
+
name = "catppuccin-${cfg.flavor}-${cfg.accent}-standard";
36
+
package = pkgs.catppuccin-gtk.override {
37
+
size = "standard";
38
+
accents = [ cfg.accent ];
39
+
variant = cfg.flavor;
40
+
};
41
+
};
42
+
43
+
gtk3.extraConfig = {
44
+
gtk-application-prefer-dark-theme = true;
45
+
};
46
+
47
+
gtk4.extraConfig = {
48
+
# make things look nice
49
+
gtk-application-prefer-dark-theme = true;
50
+
};
51
+
};
52
+
53
+
home.pointerCursor = {
54
+
enable = true;
55
+
56
+
name = "catppuccin-mocha-flamingo-cursors";
57
+
package = pkgs.catppuccin-cursors.mochaFlamingo;
58
+
size = 24;
59
+
60
+
sway.enable = true;
61
+
gtk.enable = true;
62
+
};
63
+
};
64
+
}
-28
modules/home/desktop/stylix.nix
-28
modules/home/desktop/stylix.nix
···
1
-
{
2
-
osConfig,
3
-
lib,
4
-
self,
5
-
inputs,
6
-
...
7
-
}:
8
-
let
9
-
inherit (lib) mkIf;
10
-
11
-
prof = osConfig.sylveon.profiles;
12
-
theme = osConfig.sylveon.system.theme;
13
-
in
14
-
{
15
-
imports = [ inputs.stylix.homeModules.stylix ];
16
-
17
-
config = mkIf prof.graphical.enable { # TODO: deprecate this
18
-
stylix = {
19
-
enable = true;
20
-
enableReleaseChecks = false; # Stylix is sometimes behind home-manager, nothing we can do
21
-
overlays.enable = false; # Should be automaticly disabled, but it just... doesnt do it? ;-;
22
-
23
-
image = "${self}/assets/wallpaper/infinity-nikki-1.jpg";
24
-
base16Scheme = theme.base16;
25
-
polarity = "dark";
26
-
};
27
-
};
28
-
}
+4
-2
modules/home/desktop/sway/config/applications.nix
+4
-2
modules/home/desktop/sway/config/applications.nix
+5
-1
modules/home/desktop/sway/config/workspaces.nix
+5
-1
modules/home/desktop/sway/config/workspaces.nix
···
1
-
{ config, lib, ... }:
1
+
{ config, lib, self, ... }:
2
2
let
3
3
inherit (lib)
4
4
forEach
···
13
13
in
14
14
{
15
15
wayland.windowManager.sway.config = {
16
+
# Configure wallpaper
17
+
output."*" = {
18
+
bg = "${self}/assets/wallpaper/catppuccin-cat.png fill";
19
+
};
16
20
defaultWorkspace = "1";
17
21
18
22
workspaceOutputAssign = mkMerge [
+31
modules/home/desktop/sway/default.nix
+31
modules/home/desktop/sway/default.nix
···
16
16
17
17
modifier = "Mod4";
18
18
sway = osConfig.sylveon.system.graphical.sway;
19
+
cfg = config.wayland.windowManager.sway.config;
19
20
in
20
21
{
21
22
imports = [
···
38
39
config = {
39
40
inherit modifier;
40
41
terminal = "${getExe config.programs.kitty.package}";
42
+
43
+
colors =
44
+
let
45
+
submodule = {
46
+
childBorder = "$base";
47
+
indicator = submodule.childBorder;
48
+
49
+
# Configuration needed only if using the title bar
50
+
text = "$text";
51
+
border = submodule.childBorder;
52
+
background = "$base";
53
+
};
54
+
in
55
+
{
56
+
focused = submodule // rec {
57
+
childBorder = "\$${config.catppuccin.accent}";
58
+
indicator = childBorder;
59
+
border = childBorder;
60
+
};
61
+
62
+
urgent = submodule // rec {
63
+
childBorder = "$red";
64
+
indicator = childBorder;
65
+
border = childBorder;
66
+
};
67
+
68
+
placeholder = submodule;
69
+
focusedInactive = submodule;
70
+
unfocused = submodule;
71
+
};
41
72
42
73
keybindings = mkOptionDefault {
43
74
"${modifier}+Escape" = "exec ${getExe config.programs.swaylock.package}";
+2
-8
modules/home/desktop/sway/packages/swayidle.nix
+2
-8
modules/home/desktop/sway/packages/swayidle.nix
···
20
20
command = "exec ${config.programs.swaylock.package}/bin/swaylock";
21
21
}
22
22
];
23
-
24
-
events = [
25
-
{
26
-
event = "before-sleep";
27
-
command = "exec ${config.programs.swaylock.package}/bin/swaylock";
28
-
}
29
-
];
30
-
23
+
24
+
events."before-sleep" = "exec ${config.programs.swaylock.package}/bin/swaylock";
31
25
};
32
26
}
+2
-1
modules/home/desktop/sway/packages/swaync.nix
+2
-1
modules/home/desktop/sway/packages/swaync.nix
+8
-11
modules/home/desktop/sway/packages/waybar/default.nix
+8
-11
modules/home/desktop/sway/packages/waybar/default.nix
···
8
8
let
9
9
inherit (lib)
10
10
mkIf
11
-
concatStringsSep
12
11
;
13
12
14
13
sway = osConfig.sylveon.system.graphical.sway;
···
23
22
# replace default bar with waybar
24
23
wayland.windowManager.sway.config.bars = [ { command = "${pkgs.waybar}/bin/waybar"; } ];
25
24
26
-
# only add colors and fonts from stylix
27
-
stylix.targets.waybar.addCss = false;
25
+
catppuccin.waybar.enable = true;
28
26
29
-
programs.waybar = {
27
+
programs.waybar = { # TODO: replace?
30
28
enable = true;
31
29
32
30
settings = {
···
35
33
position = "top";
36
34
fixed-center = true;
37
35
38
-
height = 35;
39
-
margin-top = 5;
40
-
margin-left = 5;
41
-
margin-right = 5;
36
+
height = 30;
37
+
margin-top = 10;
38
+
margin-left = 10;
39
+
margin-right = 10;
42
40
43
-
margin-bottom = 3;
41
+
margin-bottom = 10;
44
42
45
43
# Enable modules in the right positions
46
44
modules-left = [
47
-
"image#nix"
45
+
# "image#nix"
48
46
"sway/workspaces"
49
47
"sway/window"
50
48
];
···
53
51
"clock"
54
52
];
55
53
modules-right = [
56
-
"mpris"
57
54
"pulseaudio"
58
55
"network"
59
56
"bluetooth"
+21
-22
modules/home/desktop/sway/packages/waybar/style.css
+21
-22
modules/home/desktop/sway/packages/waybar/style.css
···
4
4
* {
5
5
background-color: transparent;
6
6
font-family: "JetBrainsMono Nerd Font", sans-serif;
7
-
color: @base04;
7
+
font-size: 14px;
8
+
color: @text;
8
9
9
10
min-height: 0;
10
11
padding: 0;
···
14
15
border: unset;
15
16
}
16
17
17
-
window { background-color: transparent; }
18
-
tooltip { background-color: @base00; }
19
-
#tray menu { background-color: @base00; }
18
+
window#waybar {
19
+
background-color: @base;
20
+
border-radius: 5px;
21
+
}
22
+
23
+
tooltip { background-color: @crust; }
24
+
#tray menu { background-color: @crust; }
20
25
21
26
.module {
22
-
background-color: @base00;
23
-
border-radius: 13px;
27
+
background-color: transparent;
24
28
25
29
min-width: 20px;
26
30
27
-
padding: 0 13px;
31
+
padding: 5px 11px;
28
32
margin: 0 3px;
29
33
}
30
34
···
51
55
padding: 0;
52
56
}
53
57
54
-
#workspaces button {
55
-
padding: 0 0 0 3px;
56
-
margin: 0 3px;
57
-
transition: 0.5s;
58
+
#workspaces button.focused label {
59
+
font-weight: bolder;
60
+
font-size: 15px;
61
+
color: @flamingo;
58
62
}
59
63
60
-
#workspaces button.focused {
61
-
box-shadow: inset 0 -2px @base0A;
64
+
#workspaces button.urgent label {
65
+
color: @red;
62
66
}
63
67
64
-
#workspaces button.urgent {
65
-
box-shadow: inset 0 -2px @base08;
68
+
.module#battery.warning label {
69
+
color: @rosewater;
66
70
}
67
71
68
-
.module#battery.warning {
69
-
box-shadow: inset 0 -4px @base0E;
72
+
.module#battery.critical label {
73
+
color: @red;
70
74
}
71
-
72
-
.module#battery.critical {
73
-
74
-
box-shadow: inset 0 -4px @base08;
75
-
}
+20
-10
modules/home/desktop/vicinae.nix
+20
-10
modules/home/desktop/vicinae.nix
···
1
1
{
2
2
config,
3
+
pkgs,
3
4
inputs,
4
5
inputs',
5
6
osConfig,
···
10
11
inherit (lib)
11
12
mkIf
12
13
getExe
14
+
mkForce
13
15
;
14
16
15
17
sway = osConfig.sylveon.system.graphical.sway;
···
23
25
config = mkIf sway.enable {
24
26
services.vicinae = {
25
27
enable = true;
26
-
autoStart = false; # Is started through sway
27
-
package = inputs'.vicinae.packages.default;
28
+
package = pkgs.vicinae; # Outdated but more stable version built by hydra
29
+
systemd.enable = false; # Is started through sway
28
30
29
31
settings = {
30
-
closeOnFocusLoss = true;
32
+
pop_to_root_on_close = true;
31
33
font.size = 10;
32
-
faviconService = "google";
34
+
favicon_service = "twenty";
33
35
34
-
theme = {
35
-
iconTheme = "BreezeX-RoséPine";
36
-
name = "rosepine-base.json";
36
+
# Theme configuration with catppuccin currently bugged
37
+
# https://github.com/catppuccin/nix/pull/800
38
+
theme =
39
+
let
40
+
ctp = config.catppuccin;
41
+
in
42
+
{
43
+
dark = {
44
+
name = "catppuccin-${ctp.flavor}";
45
+
iconTheme = "Catppuccin ${lib.toSentenceCase ctp.flavor} ${lib.toSentenceCase ctp.accent}";
46
+
};
37
47
};
38
-
39
-
window = {
48
+
49
+
launcher_window = {
40
50
csd = true;
41
-
opacity = 1;
51
+
opacity = 0.95;
42
52
rounding = 10;
43
53
};
44
54
};
+2
modules/home/programs/default.nix
+2
modules/home/programs/default.nix
+27
-5
modules/home/programs/discord.nix
+27
-5
modules/home/programs/discord.nix
···
9
9
let
10
10
inherit (lib)
11
11
mkIf
12
+
mkForce
13
+
mkMerge
14
+
forEach
15
+
;
16
+
17
+
inherit (lib.strings)
18
+
splitString
19
+
;
20
+
21
+
inherit (lib.lists)
22
+
last
12
23
;
13
24
14
25
inherit (lib.types) bool;
15
26
16
27
inherit (self.lib.modules) mkOpt;
17
28
cfg = config.sylveon.programs.discord;
29
+
nixcordcfg = config.programs.nixcord.config;
18
30
in
19
31
{
20
32
options.sylveon.programs.discord.enable = mkOpt bool false "Whether or not to enable discord";
···
24
36
config = mkIf cfg.enable {
25
37
programs.nixcord = {
26
38
enable = true;
27
-
discord.enable = true;
39
+
discord = {
40
+
vencord.enable = mkForce false;
41
+
equicord.enable = true;
42
+
};
28
43
29
44
config = {
45
+
# Themes based on files is currently bugged with equicord (TODO)
46
+
themeLinks = [ "https://catppuccin.github.io/discord/dist/catppuccin-mocha-flamingo.theme.css" ];
47
+
transparent = true;
30
48
31
49
# Activate and Configure Plugins
32
50
plugins = {
···
36
54
betterGifPicker.enable = true;
37
55
betterSessions.enable = true;
38
56
betterSettings.enable = true;
39
-
blurNSFW.enable = true;
57
+
BlurNSFW.enable = true;
40
58
callTimer.enable = true;
41
-
clearURLs.enable = true;
42
-
copyUserURLs.enable = true;
59
+
ClearURLs.enable = true;
60
+
CopyUserURLs.enable = true;
43
61
disableCallIdle.enable = true;
44
62
dontRoundMyTimestamps.enable = true;
45
63
favoriteEmojiFirst.enable = true;
···
65
83
66
84
platformIndicators = {
67
85
enable = true;
68
-
lists = false;
86
+
list = false;
69
87
messages = false;
70
88
};
71
89
···
80
98
whoReacted.enable = true;
81
99
youtubeAdblock.enable = true;
82
100
};
101
+
};
102
+
103
+
extraConfig = {
104
+
enabledThemeLinks = nixcordcfg.themeLinks;
83
105
};
84
106
};
85
107
};
+16
modules/home/programs/jetbrains/.ideavimrc
+16
modules/home/programs/jetbrains/.ideavimrc
···
1
+
" You can find a list of commands here: https://jb.gg/h38q75
2
+
" Find more examples here: https://jb.gg/share-ideavimrc
3
+
4
+
source ~/.vimrc
5
+
6
+
" Keymaps just for jetbrains ide
7
+
map <C-N> <A>1<CR>
8
+
9
+
" Move around tabs
10
+
map <A-l> :tabnext<cr>
11
+
map <A-h> :tabNext<cr>
12
+
13
+
14
+
" Enabling Plugins
15
+
Plug 'tpope/vim-commentary' " Commentary plugin
16
+
Plug 'machakann/vim-highlightedyank' " Highlight copied text
+26
modules/home/programs/jetbrains/.vimrc
+26
modules/home/programs/jetbrains/.vimrc
···
1
+
map Q gq
2
+
3
+
set scrolloff=7
4
+
set autoread
5
+
6
+
set ignorecase
7
+
set smartcase
8
+
set hlsearch
9
+
set incsearch
10
+
11
+
set showmatch
12
+
set mat=2
13
+
14
+
" disable sounds
15
+
set noerrorbells
16
+
set novisualbell
17
+
set tm=500
18
+
19
+
syntax enable
20
+
21
+
set expandtab
22
+
set smarttab
23
+
24
+
" Clipboard support
25
+
set clipboard+=unnamed
26
+
set clipboard+=ideaput
+74
modules/home/programs/jetbrains/default.nix
+74
modules/home/programs/jetbrains/default.nix
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
pkgs,
6
+
inputs,
7
+
osConfig,
8
+
...
9
+
}:
10
+
let
11
+
12
+
inherit (lib)
13
+
mkIf
14
+
mkMerge
15
+
;
16
+
17
+
inherit (lib.types) bool package;
18
+
inherit (self.lib.modules) mkOpt;
19
+
20
+
cfg = config.sylveon.programs.jetbrains;
21
+
cfgFolder = ''.config/Jetbrains/${cfg.webstorm.package.version}'';
22
+
in
23
+
{
24
+
25
+
options.sylveon.programs.jetbrains = {
26
+
phpstorm = {
27
+
enable = mkOpt bool false "Whether or not to enable the jetbrains php-editor";
28
+
package = mkOpt package pkgs.jetbrains.phpstorm "What package to use for the jetbrains php-editor";
29
+
};
30
+
31
+
webstorm = {
32
+
enable = mkOpt bool false "Whether or not to enable the jetbrains web-editor";
33
+
package = mkOpt package pkgs.jetbrains.webstorm "What package to use for the jetbrains web-editor";
34
+
};
35
+
};
36
+
37
+
config = mkIf (cfg.phpstorm.enable || cfg.webstorm.enable) {
38
+
39
+
home.file.".vimrc".source = ./.vimrc; # TODO: move to a new vim configuration
40
+
home.file.".ideavimrc".source = ./.ideavimrc;
41
+
42
+
home.packages =
43
+
let
44
+
defaultPlugins = with pkgs.jetbrains-plugins; [
45
+
com.github.catppuccin.jetbrains
46
+
com.mallowigi # Atom material icons
47
+
48
+
# com.wakatime.intellij.plugin TODO
49
+
50
+
IdeaVIM
51
+
52
+
nix-idea
53
+
com.jetbrains.plugins.ini4idea
54
+
];
55
+
in
56
+
lib.optionals cfg.phpstorm.enable [
57
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
58
+
cfg.phpstorm.package
59
+
(with pkgs.jetbrains-plugins; [
60
+
# adrienbrault.idea.symfony2plugin Not available?
61
+
] ++ defaultPlugins)
62
+
)
63
+
]
64
+
65
+
++ lib.optionals cfg.webstorm.enable [
66
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
67
+
cfg.webstorm.package
68
+
(with pkgs.jetbrains-plugins; [
69
+
io.github.pandier.intellijdiscordrp
70
+
] ++ defaultPlugins)
71
+
)
72
+
];
73
+
};
74
+
}
+66
-48
modules/home/programs/librewolf.nix
+66
-48
modules/home/programs/librewolf.nix
···
12
12
genAttrs
13
13
;
14
14
15
+
inherit (builtins)
16
+
fromJSON
17
+
readFile
18
+
fetchurl
19
+
;
20
+
15
21
inherit (lib.types) bool;
16
22
17
23
inherit (self.lib.modules) mkOpt;
···
28
34
programs.librewolf = {
29
35
enable = true;
30
36
31
-
# Install German and english languages
32
-
languagePacks = [
33
-
"en-GB"
34
-
"de"
35
-
];
37
+
languagePacks = [ "en-GB" "de" ];
36
38
37
39
settings = {
40
+
"browser.fullscreen.autohide" = false;
41
+
42
+
"webgl.disabled" = false;
43
+
"privacy.fingerprintingProtection" = false;
44
+
"browser.translations.enable" = false;
45
+
46
+
"media.ffmpeg.vaapi.enabled" = true;
47
+
"media.rdd-ffmpeg.enabled" = true;
48
+
49
+
"extensions.abuseReport.enabled" = false;
50
+
"extensions.formautofill.creditCards.enabled" = false;
51
+
"browser.contentblocking.report.lockwise.enabled" = false;
52
+
53
+
"identity.fxaccounts.enabled" = false;
54
+
"identity.fxaccounts.toolbar.enabled" = false;
55
+
"identity.fxaccounts.pairing.enabled" = false;
56
+
"identity.fxaccounts.commands.enabled" = false;
57
+
"privacy.clearOnShutdown.history" = false;
38
58
"privacy.clearOnShutdown.cookies" = false;
39
59
"network.cookie.lifetimePolicy" = 0;
40
60
41
-
# Enable Canvas
42
-
"webgl.disabled" = false;
43
-
"privacy.fingerprintingProtection" = false;
61
+
# disable notifications
62
+
"dom.push.enabled" = false;
63
+
"dom.push.connection.enabled" = false;
64
+
"dom.battery.enabled" = false;
44
65
};
45
66
46
67
policies = {
68
+
DisplayBookmarksToolbar = "never";
69
+
DisableFirefoxAccounts = true;
70
+
DisableFeedbackCommands = true;
71
+
47
72
ExtensionSettings =
48
73
genAttrs
49
74
[
50
75
"uBlock0@raymondhill.net"
51
-
"languagetool-webextension@languagetool.org"
52
76
"sponsorBlocker@ajay.app"
53
77
"FirefoxColor@mozilla.com"
54
78
"firefox-enpass@enpass.io"
79
+
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}" # Stylus
80
+
"{446900e4-71c2-419f-a6a7-df9c091e268b}" # Bitwarden
55
81
]
56
82
(ext: {
57
83
installation_mode = "force_installed";
58
-
private_browsing = true;
59
84
install_url = "https://addons.mozilla.org/firefox/downloads/latest/${ext}/latest.xpi";
60
85
});
61
-
62
-
DisplayBookmarksToolbar = "never";
63
86
};
64
87
65
-
profiles = {
66
-
default = {
67
-
68
-
# Extensions are managed via policies, not here!
69
-
extensions = {
70
-
force = true;
71
-
settings = {
72
-
# ColorTheme is managed by stylix
73
-
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = {
74
-
dbInChromeStorage = true; # required for Stylus
75
-
};
88
+
profiles.default = {
89
+
extensions = {
90
+
force = true; # Needed for catppuccin
76
91
92
+
settings = {
93
+
# stylus themes need to be manually imported from now
94
+
# please create and import a new style file from here: https://catppuccin-userstyles-customizer.uncenter.dev/
95
+
"{7a7a4a92-a2a0-41d1-9fd7-1e92480d612d}".settings = {
96
+
dbInChromeStorage = true; # required for Stylus
77
97
};
78
98
};
99
+
};
100
+
101
+
settings = {
102
+
# Default page should be my homepage
103
+
"browser.startup.homepage" = "https://xaiya.dev";
104
+
};
79
105
80
-
search = {
81
-
force = true;
82
-
default = "google";
106
+
search = {
107
+
force = true;
108
+
default = "ddg";
83
109
84
-
engines = {
85
-
MyNixOS = {
86
-
name = "MyNixOS";
87
-
urls = [
88
-
{
89
-
template = "https://mynixos.com/search";
90
-
params = [
91
-
{
92
-
name = "q";
93
-
value = "{searchTerms}";
94
-
}
95
-
];
96
-
}
97
-
];
98
-
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg";
99
-
definedAliases = [ "@nix" ];
100
-
};
110
+
engines = {
111
+
MyNixOS = {
112
+
name = "MyNixOS";
113
+
urls = [{
114
+
template = "https://mynixos.com/search";
115
+
params = [ { name = "q"; value = "{searchTerms}"; } ];
116
+
}];
101
117
102
-
ddg.metaData.hidden = true;
103
-
wikipedia.metaData.hidden = true;
118
+
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake-white.svg";
119
+
definedAliases = [ "@n" ];
104
120
};
121
+
122
+
google.metaData.alias = "@g";
105
123
};
106
124
};
107
125
};
108
126
};
109
127
110
-
stylix.targets.librewolf = {
111
-
colorTheme.enable = true;
112
-
profileNames = [ "default" ]; # https://stylix.danth.me/options/modules/firefox.html
128
+
catppuccin.librewolf = {
129
+
force = true;
130
+
profiles.default.force = true;
113
131
};
114
132
};
115
133
}
+6
-1
modules/nixos/default.nix
+6
-1
modules/nixos/default.nix
···
1
-
{
1
+
{ inputs, ... }: {
2
2
imports = [
3
+
# General module imports
4
+
inputs.tgirlpkgs.nixosModules.default
5
+
6
+
# Modules import
3
7
./hardware # hardware configuration (e.g gpu, cpu, networking, etc.)
4
8
./nix # specific configuration for the nix environment
5
9
./environment # environment variables and configurations (e.g fonts, time etc.)
···
7
11
./system # configuration for our system
8
12
./services
9
13
14
+
./style.nix
10
15
./users.nix # load and create users
11
16
./extraPackages.nix # packages that need to be loaded but are not big enough to be an own module
12
17
];
+6
-4
modules/nixos/nix/caches.nix
+6
-4
modules/nixos/nix/caches.nix
···
1
1
{
2
2
nix.settings = {
3
3
substituters = [
4
+
"https://nix-community.cachix.org" # nix-community cache
4
5
"https://ezkea.cachix.org" # AAGL caches
5
6
"https://nix-gaming.cachix.org" # gaming packages
6
-
"https://vicinae.cachix.org" # Vicinae
7
+
"https://catppuccin.cachix.org" # a cache for all catppuccin ports
7
8
];
8
9
9
10
trusted-public-keys = [
10
-
"ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" # AAGL caches
11
-
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" # gaming packages
12
-
"vicinae.cachix.org-1:1kDrfienkGHPYbkpNj1mWTr7Fm1+zcenzgTizIcI3oc=" # Vicinae
11
+
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
12
+
"ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI="
13
+
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4="
14
+
"catppuccin.cachix.org-1:noG/4HkbhJb+lUAdKrph6LaozJvAeEEZj4N732IysmU="
13
15
];
14
16
};
15
17
}
+2
-1
modules/nixos/nix/nixpkgs.nix
+2
-1
modules/nixos/nix/nixpkgs.nix
···
1
-
{
1
+
{ inputs, ... }: {
2
2
# TODO: evaluation warning (cant use nixpkgs.config when using home-manager.useGlobalPkgs)
3
3
nixpkgs.config = {
4
4
# Allowance of packages
···
15
15
16
16
nixpkgs.overlays = [
17
17
(import ./overlays/mpv.nix)
18
+
inputs.nix-jetbrains-plugins.overlays.default
18
19
];
19
20
}
-5
modules/nixos/services/atprotocol/default.nix
-5
modules/nixos/services/atprotocol/default.nix
-82
modules/nixos/services/atprotocol/tangled.nix
-82
modules/nixos/services/atprotocol/tangled.nix
···
1
-
{ inputs, lib, self, config, ... }:
2
-
let
3
-
inherit (lib) mkMerge mkIf;
4
-
inherit (lib.types) str;
5
-
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
-
7
-
cfg = config.sylveon.services.atprotocol.tangled;
8
-
in
9
-
{
10
-
11
-
imports = [
12
-
inputs.tangled.nixosModules.knot
13
-
inputs.tangled.nixosModules.spindle
14
-
];
15
-
16
-
options.sylveon.services.atprotocol.tangled = {
17
-
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
-
19
-
knot =
20
-
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
-
22
-
spindle =
23
-
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
-
};
25
-
26
-
config = {
27
-
services = mkMerge [
28
-
(mkIf cfg.knot.enable {
29
-
tangled.knot = {
30
-
enable = true;
31
-
32
-
server = {
33
-
inherit (cfg) owner;
34
-
hostname = cfg.knot.domain;
35
-
};
36
-
37
-
motd = ''
38
-
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
-
'';
40
-
};
41
-
42
-
# Create proxy entry
43
-
nginx.virtualHosts.${cfg.knot.domain} = {
44
-
enableACME = true;
45
-
forceSSL = true;
46
-
47
-
locations."/" = {
48
-
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
-
proxyWebsockets = true;
50
-
};
51
-
52
-
extraConfig = "proxy_ssl_server_name on;";
53
-
};
54
-
})
55
-
56
-
(mkIf cfg.spindle.enable {
57
-
tangled.spindle = {
58
-
enable = true;
59
-
60
-
server = {
61
-
inherit (cfg) owner;
62
-
hostname = cfg.spindle.domain;
63
-
};
64
-
};
65
-
66
-
67
-
# Create proxy entry
68
-
nginx.virtualHosts.${cfg.spindle.domain} = {
69
-
enableACME = true;
70
-
forceSSL = true;
71
-
72
-
locations."/" = {
73
-
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
-
proxyWebsockets = true;
75
-
};
76
-
77
-
extraConfig = "proxy_ssl_server_name on;";
78
-
};
79
-
})
80
-
];
81
-
};
82
-
}
+2
-1
modules/nixos/services/default.nix
+2
-1
modules/nixos/services/default.nix
+1
-1
modules/nixos/services/docker.nix
+1
-1
modules/nixos/services/docker.nix
+1
-1
modules/nixos/services/glance/default.nix
+1
-1
modules/nixos/services/glance/default.nix
+2
-3
modules/nixos/services/kitchenowl.nix
+2
-3
modules/nixos/services/kitchenowl.nix
···
13
13
in
14
14
{
15
15
options.sylveon.services.kitchenowl =
16
-
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; };
16
+
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; host = "127.0.0.1"; };
17
17
18
18
config = mkIf cfg.enable {
19
19
# Create secrets
···
22
22
# Enable the kitchenowl container
23
23
virtualisation.oci-containers.containers.kitchenowl = {
24
24
image = "tombursch/kitchenowl:latest";
25
-
ports = [ "${builtins.toString cfg.port}:${builtins.toString cfg.port}" ];
25
+
ports = [ "${builtins.toString cfg.port}:8080" ];
26
26
27
27
environmentFiles = [ config.age.secrets.kitchenowl-env.path ];
28
28
volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ];
···
35
35
36
36
locations."/" = {
37
37
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
38
-
proxyWebsockets = true;
39
38
};
40
39
41
40
extraConfig = "proxy_ssl_server_name on;";
+12
-7
modules/nixos/services/minecraft.nix
+12
-7
modules/nixos/services/minecraft.nix
···
16
16
17
17
options.sylveon.services.minecraft = {
18
18
enable = mkOpt bool false "Enable a Minecraft server";
19
-
package = mkOpt package pkgs.papermcServers.papermc "On what package this server should be based on";
19
+
package = mkOpt package pkgs.papermcServers.papermc-1_21_9 "On what package this server should be based on";
20
20
};
21
21
22
22
config = mkIf cfg.enable {
23
+
24
+
# Open Minecraft port and proximity port
25
+
networking.firewall = {
26
+
allowedUDPPorts = [ 24454 25565 ];
27
+
allowedTCPPorts = [ 24454 25565 ];
28
+
};
29
+
23
30
services.minecraft-server = {
24
31
enable = true;
25
32
inherit (cfg) package;
26
33
27
34
# What world I want to use (TODO: needs some changes)
28
-
dataDir = "/mnt/raid/services/minecraft/01";
35
+
dataDir = "/mnt/raid/services/minecraft/02";
29
36
30
37
eula = true;
31
-
openFirewall = true;
32
-
33
38
declarative = true;
34
39
35
40
whitelist = {
···
51
56
52
57
serverProperties = {
53
58
difficulty = "hard";
54
-
55
59
spawn-protection = 0;
56
60
57
61
gamemode = 0;
58
62
force-gamemode = true;
59
63
60
64
max-players = 10;
61
-
view-dance = 32;
65
+
view-dance = 18;
66
+
simulation-distance = 8;
62
67
63
68
white-list = true;
64
69
motd = "Sylveon Network";
65
70
};
66
71
67
-
jvmOpts = "-Xms4092M -Xmx4092M";
72
+
jvmOpts = "-Xms2G -Xmx8G";
68
73
};
69
74
};
70
75
}
+47
modules/nixos/services/piper.nix
+47
modules/nixos/services/piper.nix
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
...
6
+
}:
7
+
let
8
+
inherit (lib) mkIf;
9
+
inherit (self.lib.modules) mkServiceOpt;
10
+
11
+
cfg = config.sylveon.services.piper;
12
+
in
13
+
{
14
+
15
+
options.sylveon.services.piper =
16
+
mkServiceOpt "piper" { port = 3015; domain = "piper.xaiya.dev"; };
17
+
18
+
config = mkIf cfg.enable {
19
+
# Create secrets
20
+
age.secrets.piper-env.rekeyFile = "${self}/secrets/piper-env.age";
21
+
22
+
services = {
23
+
piper = { # TODO: Spotify API is currently blocked, cant create APP
24
+
enable = true;
25
+
environmentFiles = [ config.age.secrets.piper-env.path ];
26
+
27
+
settings = {
28
+
SERVER_PORT = cfg.port;
29
+
SERVER_ROOT_URL = "https://${cfg.domain}";
30
+
};
31
+
};
32
+
33
+
# Create proxy entry
34
+
nginx.virtualHosts.${cfg.domain} = {
35
+
enableACME = true;
36
+
forceSSL = true;
37
+
38
+
locations."/" = {
39
+
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
40
+
};
41
+
42
+
extraConfig = "proxy_ssl_server_name on;";
43
+
44
+
};
45
+
};
46
+
};
47
+
}
+82
modules/nixos/services/tangled.nix
+82
modules/nixos/services/tangled.nix
···
1
+
{ inputs, lib, self, config, ... }:
2
+
let
3
+
inherit (lib) mkMerge mkIf;
4
+
inherit (lib.types) str;
5
+
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
+
7
+
cfg = config.sylveon.services.tangled;
8
+
in
9
+
{
10
+
11
+
imports = [
12
+
inputs.tangled.nixosModules.knot
13
+
inputs.tangled.nixosModules.spindle
14
+
];
15
+
16
+
options.sylveon.services.tangled = {
17
+
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
+
19
+
knot =
20
+
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
+
22
+
spindle =
23
+
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
+
};
25
+
26
+
config = {
27
+
services = mkMerge [
28
+
(mkIf cfg.knot.enable {
29
+
tangled.knot = {
30
+
enable = true;
31
+
32
+
server = {
33
+
inherit (cfg) owner;
34
+
hostname = cfg.knot.domain;
35
+
};
36
+
37
+
motd = ''
38
+
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
+
'';
40
+
};
41
+
42
+
# Create proxy entry
43
+
nginx.virtualHosts.${cfg.knot.domain} = {
44
+
enableACME = true;
45
+
forceSSL = true;
46
+
47
+
locations."/" = {
48
+
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
+
proxyWebsockets = true;
50
+
};
51
+
52
+
extraConfig = "proxy_ssl_server_name on;";
53
+
};
54
+
})
55
+
56
+
(mkIf cfg.spindle.enable {
57
+
tangled.spindle = {
58
+
enable = true;
59
+
60
+
server = {
61
+
inherit (cfg) owner;
62
+
hostname = cfg.spindle.domain;
63
+
};
64
+
};
65
+
66
+
67
+
# Create proxy entry
68
+
nginx.virtualHosts.${cfg.spindle.domain} = {
69
+
enableACME = true;
70
+
forceSSL = true;
71
+
72
+
locations."/" = {
73
+
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
+
proxyWebsockets = true;
75
+
};
76
+
77
+
extraConfig = "proxy_ssl_server_name on;";
78
+
};
79
+
})
80
+
];
81
+
};
82
+
}
+45
modules/nixos/style.nix
+45
modules/nixos/style.nix
···
1
+
{
2
+
inputs,
3
+
config,
4
+
lib,
5
+
...
6
+
}:
7
+
let
8
+
prof = config.sylveon.profiles;
9
+
in
10
+
{
11
+
# Some catppuccin configuration only work on nixos
12
+
# This file might be changed because the idea of theming will be renewed
13
+
14
+
imports = [ inputs.catppuccin.nixosModules.catppuccin ];
15
+
16
+
config = {
17
+
catppuccin = {
18
+
inherit (prof.graphical) enable;
19
+
cache.enable = true;
20
+
21
+
accent = "flamingo";
22
+
flavor = "mocha";
23
+
};
24
+
25
+
# https://github.com/isabelroses/dotfiles/blob/88d1cb29e2da4ef977b4a06fcbf9a22efbd398a7/modules/nixos/catppuccin.nix#L21
26
+
console.colors = lib.mkIf config.catppuccin.enable [
27
+
"1e1e2e"
28
+
"f38ba8"
29
+
"a6e3a1"
30
+
"f9e2af"
31
+
"89b4fa"
32
+
"f5c2e7"
33
+
"94e2d5"
34
+
"bac2de"
35
+
"585b70"
36
+
"f38ba8"
37
+
"a6e3a1"
38
+
"f9e2af"
39
+
"89b4fa"
40
+
"f5c2e7"
41
+
"94e2d5"
42
+
"a6adc8"
43
+
];
44
+
};
45
+
}
+9
secrets/piper-env.age
+9
secrets/piper-env.age
···
1
+
age-encryption.org/v1
2
+
-> piv-p256 3eMZ2w Ayqd3HhxKkUWfKgQPMYVAubp9epHJyniP9sKb9fpTBLY
3
+
aaAyZ4lqXYArnlRiunmEg869BSFXj4YbyyTnRxlpVDU
4
+
-> po}y-grease ;IcPr [r|%9 {2xK,:
5
+
KO+GNHYFrAOMlGhb2fwHNqovaDtox4IfDxOzom407c2gOl56lSq7e2odJYMdUvf2
6
+
/aClPQoFOAGVipSrkRU
7
+
--- AqUx53QjjAlOllgZzPC/3S6YmSXmqYYioxeMqmYHuds
8
+
B$�P���B�a37�u�L��pa}���dN�f�J�#��.;�N�7:�n�
9
+
�s���]o��b5�g�a-*tw�7�v�H���* �o�\��6�����L�)��s�Fk��㡯)LѬDfқ��\J�����I
0���!i;ya�*���ީt�Nj�g�eKr�a��&��8Z�$����:m٩
+5
-9
systems/apricot/default.nix
+5
-9
systems/apricot/default.nix
···
12
12
networking.hostName = "apricot";
13
13
14
14
sylveon = {
15
-
profiles = {
16
-
server.enable = true;
17
-
};
15
+
profiles.server.enable = true;
18
16
19
17
device.cpu = "intel";
20
18
···
31
29
glance.enable = true;
32
30
kitchenowl.enable = true;
33
31
34
-
atprotocol = {
35
-
tangled = {
36
-
knot.enable = true;
37
-
spindle.enable = true;
38
-
};
32
+
tangled = {
33
+
knot.enable = true;
34
+
spindle.enable = true;
39
35
};
36
+
piper.enable = true;
40
37
41
38
plex.enable = true;
42
-
43
39
minecraft.enable = true;
44
40
};
45
41
};
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
This is a binary file and will not be displayed.