+276
-74
flake.lock
+276
-74
flake.lock
···
9
9
"rust-overlay": "rust-overlay"
10
10
},
11
11
"locked": {
12
-
"lastModified": 1766424259,
13
-
"narHash": "sha256-ikKwd1/8rLIz8I+B8kwLaNwW5Hh75bkgGRalC+gEpw0=",
12
+
"lastModified": 1767520119,
13
+
"narHash": "sha256-+OmNQLA9Fv5WBaxYHlPghS9XmnYWDaLt+AatCGhG+hc=",
14
14
"owner": "ezKEa",
15
15
"repo": "aagl-gtk-on-nix",
16
-
"rev": "37c289121c7ed44f723c326b6c079cd8aaeb35cf",
16
+
"rev": "5720d3282844b6b23b26dfac075a5f1f58ea8844",
17
17
"type": "github"
18
18
},
19
19
"original": {
···
126
126
"nixpkgs": "nixpkgs_2"
127
127
},
128
128
"locked": {
129
-
"lastModified": 1765990358,
130
-
"narHash": "sha256-l8x0gU8mnYaGMl+gWrsSHKBJlZWD8KXJfHTkRlFiPI0=",
129
+
"lastModified": 1767720192,
130
+
"narHash": "sha256-gA2dpQr/REM9D4SUdMwioAATnXmOZz/eVIladxEISRA=",
131
131
"owner": "catppuccin",
132
132
"repo": "nix",
133
-
"rev": "de1b60ca45a578f59f7d84c8d338b346017b2161",
133
+
"rev": "bbda4b492ba33c1ca04385792c93dda1a3a28f64",
134
134
"type": "github"
135
135
},
136
136
"original": {
···
168
168
"flake-parts": "flake-parts_6",
169
169
"git-hooks": "git-hooks",
170
170
"nix": "nix",
171
-
"nixpkgs": "nixpkgs_7"
171
+
"nixpkgs": "nixpkgs_9"
172
172
},
173
173
"locked": {
174
174
"lastModified": 1760162706,
···
340
340
]
341
341
},
342
342
"locked": {
343
-
"lastModified": 1765835352,
344
-
"narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=",
343
+
"lastModified": 1767609335,
344
+
"narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=",
345
345
"owner": "hercules-ci",
346
346
"repo": "flake-parts",
347
-
"rev": "a34fae9c08a15ad73f295041fec82323541400a9",
347
+
"rev": "250481aafeb741edfe23d29195671c19b36b6dca",
348
348
"type": "github"
349
349
},
350
350
"original": {
···
451
451
},
452
452
"flake-utils": {
453
453
"inputs": {
454
-
"systems": "systems_4"
454
+
"systems": "systems_2"
455
+
},
456
+
"locked": {
457
+
"lastModified": 1731533236,
458
+
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
459
+
"owner": "numtide",
460
+
"repo": "flake-utils",
461
+
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
462
+
"type": "github"
463
+
},
464
+
"original": {
465
+
"owner": "numtide",
466
+
"repo": "flake-utils",
467
+
"type": "github"
468
+
}
469
+
},
470
+
"flake-utils_2": {
471
+
"inputs": {
472
+
"systems": "systems_3"
473
+
},
474
+
"locked": {
475
+
"lastModified": 1731533236,
476
+
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
477
+
"owner": "numtide",
478
+
"repo": "flake-utils",
479
+
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
480
+
"type": "github"
481
+
},
482
+
"original": {
483
+
"owner": "numtide",
484
+
"repo": "flake-utils",
485
+
"type": "github"
486
+
}
487
+
},
488
+
"flake-utils_3": {
489
+
"inputs": {
490
+
"systems": "systems_6"
455
491
},
456
492
"locked": {
457
493
"lastModified": 1731533236,
···
542
578
},
543
579
"gomod2nix": {
544
580
"inputs": {
545
-
"flake-utils": "flake-utils",
581
+
"flake-utils": "flake-utils_3",
546
582
"nixpkgs": [
547
583
"tangled",
548
584
"nixpkgs"
···
588
624
"nixpkgs": "nixpkgs_3"
589
625
},
590
626
"locked": {
591
-
"lastModified": 1767104570,
592
-
"narHash": "sha256-GKgwu5//R+cLdKysZjGqvUEEOGXXLdt93sNXeb2M/Lk=",
627
+
"lastModified": 1767702900,
628
+
"narHash": "sha256-xMzHmNytl7JgFRov2jHf2GYsLVp/sAfYO0JvbZt0uDo=",
593
629
"owner": "nix-community",
594
630
"repo": "home-manager",
595
-
"rev": "e4e78a2cbeaddd07ab7238971b16468cc1d14daf",
631
+
"rev": "38e187fd2f9efac197e03be0c25f3ee215974144",
596
632
"type": "github"
597
633
},
598
634
"original": {
···
679
715
"pre-commit-hooks": "pre-commit-hooks_2"
680
716
},
681
717
"locked": {
682
-
"lastModified": 1767099799,
683
-
"narHash": "sha256-/62ITamWPT5ve84xJ2NDL0Wm+EVZMXn6dV9wo1KjxGQ=",
684
-
"rev": "570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5",
718
+
"lastModified": 1767713749,
719
+
"narHash": "sha256-56x//7ognPbg9wNs7zJTwT7PjNR992PyYbIUQA4dHoc=",
720
+
"rev": "b97b2e858babef00faa46fa557d9afe9e089a12a",
685
721
"type": "tarball",
686
-
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5.tar.gz?rev=570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5"
722
+
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/b97b2e858babef00faa46fa557d9afe9e089a12a.tar.gz?rev=b97b2e858babef00faa46fa557d9afe9e089a12a"
687
723
},
688
724
"original": {
689
725
"type": "tarball",
···
773
809
]
774
810
},
775
811
"locked": {
776
-
"lastModified": 1767060285,
777
-
"narHash": "sha256-E8oSyoOQnqVCSg7+D0512fnL8JeltFqWaKETJrmo1Q8=",
812
+
"lastModified": 1767579768,
813
+
"narHash": "sha256-MDyl7tiem57OAOcPuCJrONh1PCcKj5OzJEesBrka3dk=",
778
814
"owner": "fufexan",
779
815
"repo": "nix-gaming",
780
-
"rev": "45ce6a5470514514079e2d65eea7dddafba6bfc8",
816
+
"rev": "4199abcbc86b52e6878d1021da61c4e8e308e00e",
781
817
"type": "github"
782
818
},
783
819
"original": {
···
786
822
"type": "github"
787
823
}
788
824
},
825
+
"nix-jetbrains-plugins": {
826
+
"inputs": {
827
+
"flake-utils": "flake-utils",
828
+
"nix-rust-wrangler": "nix-rust-wrangler",
829
+
"nixpkgs": "nixpkgs_5",
830
+
"rust-overlay": "rust-overlay_3"
831
+
},
832
+
"locked": {
833
+
"lastModified": 1767845296,
834
+
"narHash": "sha256-o2EXCxnfi0WgCq3Mbmcn4aNwcXxfHV6/idZO+VFNIjY=",
835
+
"owner": "Janrupf",
836
+
"repo": "nix-jetbrains-plugin-repository",
837
+
"rev": "09765ba1158410cb098880161f06b8e2607c8bef",
838
+
"type": "github"
839
+
},
840
+
"original": {
841
+
"owner": "Janrupf",
842
+
"repo": "nix-jetbrains-plugin-repository",
843
+
"type": "github"
844
+
}
845
+
},
846
+
"nix-rust-wrangler": {
847
+
"inputs": {
848
+
"flake-utils": "flake-utils_2",
849
+
"nixpkgs": [
850
+
"nix-jetbrains-plugins",
851
+
"nixpkgs"
852
+
],
853
+
"rust-overlay": "rust-overlay_2"
854
+
},
855
+
"locked": {
856
+
"lastModified": 1764906652,
857
+
"narHash": "sha256-4eY+9dKYhTWx1X7AGVNfwxNlruR0Pjx16Anrm6ifnVo=",
858
+
"owner": "Janrupf",
859
+
"repo": "nix-rust-wrangler",
860
+
"rev": "ab6b5ea4d654a05fea9e1ea53359a9be16777800",
861
+
"type": "github"
862
+
},
863
+
"original": {
864
+
"owner": "Janrupf",
865
+
"repo": "nix-rust-wrangler",
866
+
"type": "github"
867
+
}
868
+
},
789
869
"nix2container": {
790
870
"flake": false,
791
871
"locked": {
···
839
919
]
840
920
},
841
921
"locked": {
842
-
"lastModified": 1767132685,
843
-
"narHash": "sha256-aZSb3+XU/7bkbB3kixcObU71/3fJSL6umDG6FdYZQo0=",
922
+
"lastModified": 1767715368,
923
+
"narHash": "sha256-3JkfCB4MwVMLlC8N/ATth3saUF9kD1WQiIF/quDpvNo=",
844
924
"owner": "KaylorBen",
845
925
"repo": "nixcord",
846
-
"rev": "21c7a88f3c9ca24af054122fc9f0a27ad5fe2b16",
926
+
"rev": "f391c270ad2c74a94d99cbc9ad6a57478111c6de",
847
927
"type": "github"
848
928
},
849
929
"original": {
···
854
934
},
855
935
"nixos-hardware": {
856
936
"locked": {
857
-
"lastModified": 1767070591,
858
-
"narHash": "sha256-b0aM3221Pw6vbACFqZrVzZjMNqXVPi1dvgLr8QTbajc=",
937
+
"lastModified": 1767185284,
938
+
"narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=",
859
939
"owner": "NixOS",
860
940
"repo": "nixos-hardware",
861
-
"rev": "9b3c38bf6c260d0e88154ef07fa833fa845bfd14",
941
+
"rev": "40b1a28dce561bea34858287fbb23052c3ee63fe",
862
942
"type": "github"
863
943
},
864
944
"original": {
···
945
1025
"type": "github"
946
1026
}
947
1027
},
1028
+
"nixpkgs_10": {
1029
+
"locked": {
1030
+
"lastModified": 1760103332,
1031
+
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1032
+
"owner": "NixOS",
1033
+
"repo": "nixpkgs",
1034
+
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1035
+
"type": "github"
1036
+
},
1037
+
"original": {
1038
+
"owner": "NixOS",
1039
+
"ref": "nixpkgs-unstable",
1040
+
"repo": "nixpkgs",
1041
+
"type": "github"
1042
+
}
1043
+
},
948
1044
"nixpkgs_2": {
949
1045
"locked": {
950
-
"lastModified": 1763966396,
951
-
"narHash": "sha256-6eeL1YPcY1MV3DDStIDIdy/zZCDKgHdkCmsrLJFiZf0=",
1046
+
"lastModified": 1767116409,
1047
+
"narHash": "sha256-5vKw92l1GyTnjoLzEagJy5V5mDFck72LiQWZSOnSicw=",
952
1048
"owner": "NixOS",
953
1049
"repo": "nixpkgs",
954
-
"rev": "5ae3b07d8d6527c42f17c876e404993199144b6a",
1050
+
"rev": "cad22e7d996aea55ecab064e84834289143e44a0",
955
1051
"type": "github"
956
1052
},
957
1053
"original": {
···
995
1091
},
996
1092
"nixpkgs_5": {
997
1093
"locked": {
998
-
"lastModified": 1766902085,
999
-
"narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=",
1094
+
"lastModified": 1765472234,
1095
+
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
1000
1096
"owner": "NixOS",
1001
1097
"repo": "nixpkgs",
1002
-
"rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4",
1098
+
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
1003
1099
"type": "github"
1004
1100
},
1005
1101
"original": {
···
1011
1107
},
1012
1108
"nixpkgs_6": {
1013
1109
"locked": {
1014
-
"lastModified": 1766840161,
1015
-
"narHash": "sha256-Ss/LHpJJsng8vz1Pe33RSGIWUOcqM1fjrehjUkdrWio=",
1110
+
"lastModified": 1767640445,
1111
+
"narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=",
1016
1112
"owner": "NixOS",
1017
1113
"repo": "nixpkgs",
1018
-
"rev": "3edc4a30ed3903fdf6f90c837f961fa6b49582d1",
1114
+
"rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5",
1019
1115
"type": "github"
1020
1116
},
1021
1117
"original": {
1022
1118
"owner": "NixOS",
1023
-
"ref": "nixpkgs-unstable",
1119
+
"ref": "nixos-unstable",
1024
1120
"repo": "nixpkgs",
1025
1121
"type": "github"
1026
1122
}
1027
1123
},
1028
1124
"nixpkgs_7": {
1029
1125
"locked": {
1030
-
"lastModified": 1758532697,
1031
-
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1032
-
"owner": "cachix",
1033
-
"repo": "devenv-nixpkgs",
1034
-
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1126
+
"lastModified": 1767026758,
1127
+
"narHash": "sha256-7fsac/f7nh/VaKJ/qm3I338+wAJa/3J57cOGpXi0Sbg=",
1128
+
"owner": "NixOS",
1129
+
"repo": "nixpkgs",
1130
+
"rev": "346dd96ad74dc4457a9db9de4f4f57dab2e5731d",
1035
1131
"type": "github"
1036
1132
},
1037
1133
"original": {
1038
-
"owner": "cachix",
1039
-
"ref": "rolling",
1040
-
"repo": "devenv-nixpkgs",
1134
+
"owner": "NixOS",
1135
+
"ref": "nixpkgs-unstable",
1136
+
"repo": "nixpkgs",
1041
1137
"type": "github"
1042
1138
}
1043
1139
},
1044
1140
"nixpkgs_8": {
1045
1141
"locked": {
1046
-
"lastModified": 1760103332,
1047
-
"narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=",
1048
-
"owner": "NixOS",
1049
-
"repo": "nixpkgs",
1050
-
"rev": "870493f9a8cb0b074ae5b411b2f232015db19a65",
1142
+
"lastModified": 1767364772,
1143
+
"narHash": "sha256-G6ie+qOCRSV7wzOY+6L1o8GvcH1qDcE/DTzDT4CRdNw=",
1144
+
"rev": "16c7794d0a28b5a37904d55bcca36003b9109aaa",
1145
+
"type": "tarball",
1146
+
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre921317.16c7794d0a28/nixexprs.tar.xz?lastModified=1767364772&rev=16c7794d0a28b5a37904d55bcca36003b9109aaa"
1147
+
},
1148
+
"original": {
1149
+
"type": "tarball",
1150
+
"url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz"
1151
+
}
1152
+
},
1153
+
"nixpkgs_9": {
1154
+
"locked": {
1155
+
"lastModified": 1758532697,
1156
+
"narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=",
1157
+
"owner": "cachix",
1158
+
"repo": "devenv-nixpkgs",
1159
+
"rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f",
1051
1160
"type": "github"
1052
1161
},
1053
1162
"original": {
1054
-
"owner": "NixOS",
1055
-
"ref": "nixpkgs-unstable",
1056
-
"repo": "nixpkgs",
1163
+
"owner": "cachix",
1164
+
"ref": "rolling",
1165
+
"repo": "devenv-nixpkgs",
1057
1166
"type": "github"
1058
1167
}
1059
1168
},
1060
1169
"nixvim": {
1061
1170
"inputs": {
1062
1171
"flake-parts": "flake-parts_5",
1063
-
"nixpkgs": "nixpkgs_6",
1064
-
"systems": "systems_2"
1172
+
"nixpkgs": "nixpkgs_7",
1173
+
"systems": "systems_4"
1065
1174
},
1066
1175
"locked": {
1067
-
"lastModified": 1767002962,
1068
-
"narHash": "sha256-HGFRwMRUwt56E+SiVX9YQOzpOwHy0/rtEqMoEbkF8Yg=",
1176
+
"lastModified": 1767608728,
1177
+
"narHash": "sha256-kmSJCTgrx+BxgqQOTPHAOkohvO+lbRsPWqu+PSPcz3I=",
1069
1178
"owner": "nix-community",
1070
1179
"repo": "nixvim",
1071
-
"rev": "63c957603751f0a107c4d9c2cbaff1c8749fc9f1",
1180
+
"rev": "851399eebd0fb383d2fd76269d859f16021dc7a8",
1072
1181
"type": "github"
1073
1182
},
1074
1183
"original": {
···
1127
1236
"home-manager": "home-manager_2",
1128
1237
"lix": "lix",
1129
1238
"nix-gaming": "nix-gaming",
1239
+
"nix-jetbrains-plugins": "nix-jetbrains-plugins",
1130
1240
"nixcord": "nixcord",
1131
1241
"nixos-hardware": "nixos-hardware",
1132
-
"nixpkgs": "nixpkgs_5",
1242
+
"nixpkgs": "nixpkgs_6",
1133
1243
"nixvim": "nixvim",
1134
-
"systems": "systems_3",
1244
+
"systems": "systems_5",
1135
1245
"tangled": "tangled",
1246
+
"tgirlpkgs": "tgirlpkgs",
1136
1247
"tidaLuna": "tidaLuna",
1137
1248
"tinted-theming-schemes": "tinted-theming-schemes",
1138
1249
"vicinae": "vicinae"
···
1156
1267
"type": "github"
1157
1268
}
1158
1269
},
1270
+
"rust-overlay_2": {
1271
+
"inputs": {
1272
+
"nixpkgs": [
1273
+
"nix-jetbrains-plugins",
1274
+
"nix-rust-wrangler",
1275
+
"nixpkgs"
1276
+
]
1277
+
},
1278
+
"locked": {
1279
+
"lastModified": 1764902447,
1280
+
"narHash": "sha256-wNqkDBj+tjK619sTHPEA7uhjr7DHHEY8OsFou31dxy0=",
1281
+
"owner": "oxalica",
1282
+
"repo": "rust-overlay",
1283
+
"rev": "d914a744a83098eeb28125d2848ad383b209223f",
1284
+
"type": "github"
1285
+
},
1286
+
"original": {
1287
+
"owner": "oxalica",
1288
+
"repo": "rust-overlay",
1289
+
"type": "github"
1290
+
}
1291
+
},
1292
+
"rust-overlay_3": {
1293
+
"inputs": {
1294
+
"nixpkgs": [
1295
+
"nix-jetbrains-plugins",
1296
+
"nixpkgs"
1297
+
]
1298
+
},
1299
+
"locked": {
1300
+
"lastModified": 1767840362,
1301
+
"narHash": "sha256-ZtsFqUhilubohNZ1TgpQIFsi4biZTwRH9rjZsDRDik8=",
1302
+
"owner": "oxalica",
1303
+
"repo": "rust-overlay",
1304
+
"rev": "d159ea1fc321c60f88a616ac28bab660092a227d",
1305
+
"type": "github"
1306
+
},
1307
+
"original": {
1308
+
"owner": "oxalica",
1309
+
"repo": "rust-overlay",
1310
+
"type": "github"
1311
+
}
1312
+
},
1159
1313
"sqlite-lib-src": {
1160
1314
"flake": false,
1161
1315
"locked": {
···
1259
1413
"type": "github"
1260
1414
}
1261
1415
},
1416
+
"systems_7": {
1417
+
"locked": {
1418
+
"lastModified": 1681028828,
1419
+
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
1420
+
"owner": "nix-systems",
1421
+
"repo": "default",
1422
+
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
1423
+
"type": "github"
1424
+
},
1425
+
"original": {
1426
+
"owner": "nix-systems",
1427
+
"repo": "default",
1428
+
"type": "github"
1429
+
}
1430
+
},
1431
+
"systems_8": {
1432
+
"locked": {
1433
+
"lastModified": 1681028828,
1434
+
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
1435
+
"owner": "nix-systems",
1436
+
"repo": "default",
1437
+
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
1438
+
"type": "github"
1439
+
},
1440
+
"original": {
1441
+
"owner": "nix-systems",
1442
+
"repo": "default",
1443
+
"type": "github"
1444
+
}
1445
+
},
1262
1446
"tangled": {
1263
1447
"inputs": {
1264
1448
"actor-typeahead-src": "actor-typeahead-src",
···
1276
1460
"sqlite-lib-src": "sqlite-lib-src"
1277
1461
},
1278
1462
"locked": {
1279
-
"lastModified": 1767063361,
1280
-
"narHash": "sha256-MyxjxAfOw6LgPGbv/m/am5E080jtc+FunlYFu5HIVUU=",
1463
+
"lastModified": 1767683698,
1464
+
"narHash": "sha256-MFrfNmTKTdOOsyXUvvqPwH6zqvDZZpURnd7QdJkVOgU=",
1281
1465
"ref": "refs/heads/master",
1282
-
"rev": "4bdc9dfe9bb5ed8f5dfea30b9a45bc93b1430535",
1283
-
"revCount": 1779,
1466
+
"rev": "b31a2a3590fefc4c70817f94a20076df2428b4d3",
1467
+
"revCount": 1791,
1284
1468
"type": "git",
1285
1469
"url": "https://tangled.org/tangled.org/core"
1286
1470
},
···
1289
1473
"url": "https://tangled.org/tangled.org/core"
1290
1474
}
1291
1475
},
1476
+
"tgirlpkgs": {
1477
+
"inputs": {
1478
+
"nixpkgs": "nixpkgs_8"
1479
+
},
1480
+
"locked": {
1481
+
"lastModified": 1767660739,
1482
+
"narHash": "sha256-BuDIrsTL90jorWks/TAy0VVZIkeMn6p3CQCkvWeTzyA=",
1483
+
"owner": "tgirlcloud",
1484
+
"repo": "pkgs",
1485
+
"rev": "3e5419554c59db95844713444be102611c922740",
1486
+
"type": "github"
1487
+
},
1488
+
"original": {
1489
+
"owner": "tgirlcloud",
1490
+
"repo": "pkgs",
1491
+
"type": "github"
1492
+
}
1493
+
},
1292
1494
"tidaLuna": {
1293
1495
"inputs": {
1294
1496
"devenv": "devenv",
1295
1497
"flake-parts": "flake-parts_7",
1296
-
"nixpkgs": "nixpkgs_8",
1297
-
"systems": "systems_5"
1498
+
"nixpkgs": "nixpkgs_10",
1499
+
"systems": "systems_7"
1298
1500
},
1299
1501
"locked": {
1300
1502
"lastModified": 1765158153,
···
1313
1515
"tinted-theming-schemes": {
1314
1516
"flake": false,
1315
1517
"locked": {
1316
-
"lastModified": 1765356580,
1317
-
"narHash": "sha256-sZkRpDXWfAlf9oZWPzYQXuZ10uw48rq0Unwa9KS6DfE=",
1518
+
"lastModified": 1767710407,
1519
+
"narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=",
1318
1520
"owner": "tinted-theming",
1319
1521
"repo": "schemes",
1320
-
"rev": "6563443434dd05b006782f6c3ca63026b4249733",
1522
+
"rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2",
1321
1523
"type": "github"
1322
1524
},
1323
1525
"original": {
···
1352
1554
"nixpkgs": [
1353
1555
"nixpkgs"
1354
1556
],
1355
-
"systems": "systems_6"
1557
+
"systems": "systems_8"
1356
1558
},
1357
1559
"locked": {
1358
-
"lastModified": 1766947253,
1359
-
"narHash": "sha256-bzdD637oY/d23QH7CKbyndBmmTBIM19HsnPtj49xCM0=",
1560
+
"lastModified": 1767715269,
1561
+
"narHash": "sha256-0QV6SuVyt16rTVNoB9W3ZwRm7FhJ1pwuDMUH2VkOI6A=",
1360
1562
"owner": "vicinaehq",
1361
1563
"repo": "vicinae",
1362
-
"rev": "68faea42c62862614e071cee329486d907b3641a",
1564
+
"rev": "cd95054a199bba898c79ffa23fa41bac7326a375",
1363
1565
"type": "github"
1364
1566
},
1365
1567
"original": {
+13
flake.nix
+13
flake.nix
···
11
11
inputs.nixpkgs.follows = "nixpkgs";
12
12
};
13
13
14
+
nix-jetbrains-plugins = {
15
+
type = "github";
16
+
owner = "Janrupf";
17
+
repo = "nix-jetbrains-plugin-repository";
18
+
};
19
+
14
20
catppuccin = {
15
21
type = "github";
16
22
owner = "catppuccin";
···
29
35
owner = "NixOS";
30
36
repo = "nixpkgs";
31
37
ref = "nixos-unstable";
38
+
};
39
+
40
+
# Package collection
41
+
tgirlpkgs = {
42
+
type = "github";
43
+
owner = "tgirlcloud";
44
+
repo = "pkgs";
32
45
};
33
46
34
47
nixvim = {
+2
home/blmedia/default.nix
+2
home/blmedia/default.nix
-3
home/blmedia/packages.nix
-3
home/blmedia/packages.nix
···
4
4
home.packages = [
5
5
pkgs.enpass
6
6
7
-
pkgs.jetbrains.phpstorm # Mainly using neovim, but for some work stuff still needed
8
7
pkgs.obsidian # Notes taking app
9
8
10
9
pkgs.mpv # Music streaming
11
10
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
12
-
13
-
pkgs.wasistlos # Whatsapp for linux
14
11
15
12
pkgs.teams-for-linux # Teams; Need that for school and work
16
13
+2
home/default.nix
+2
home/default.nix
+2
home/xaiya/default.nix
+2
home/xaiya/default.nix
-2
home/xaiya/packages.nix
-2
home/xaiya/packages.nix
···
12
12
pkgs.mpv # Music streaming
13
13
inputs'.tidaLuna.packages.default # Music Streaming Service (injected)
14
14
15
-
pkgs.wasistlos # Whatsapp for linux
16
-
17
15
pkgs.teams-for-linux # Teams; Need that for school and work
18
16
#pkgs.ciscoPacketTracer8 # Cisco software that I need for school
19
17
+1
modules/home/cli/neovim/default.nix
+1
modules/home/cli/neovim/default.nix
···
35
35
./social.nix
36
36
];
37
37
38
+
# Neovim should be used as a lightweigt editor (used for small changes)
38
39
options.sylveon.cli.neovim = {
39
40
enable = mkOpt bool false "vim editor, only better";
40
41
anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
+2
modules/home/programs/default.nix
+2
modules/home/programs/default.nix
+16
modules/home/programs/jetbrains/.ideavimrc
+16
modules/home/programs/jetbrains/.ideavimrc
···
1
+
" You can find a list of commands here: https://jb.gg/h38q75
2
+
" Find more examples here: https://jb.gg/share-ideavimrc
3
+
4
+
source ~/.vimrc
5
+
6
+
" Keymaps just for jetbrains ide
7
+
map <C-N> <A>1<CR>
8
+
9
+
" Move around tabs
10
+
map <A-l> :tabnext<cr>
11
+
map <A-h> :tabNext<cr>
12
+
13
+
14
+
" Enabling Plugins
15
+
Plug 'tpope/vim-commentary' " Commentary plugin
16
+
Plug 'machakann/vim-highlightedyank' " Highlight copied text
+26
modules/home/programs/jetbrains/.vimrc
+26
modules/home/programs/jetbrains/.vimrc
···
1
+
map Q gq
2
+
3
+
set scrolloff=7
4
+
set autoread
5
+
6
+
set ignorecase
7
+
set smartcase
8
+
set hlsearch
9
+
set incsearch
10
+
11
+
set showmatch
12
+
set mat=2
13
+
14
+
" disable sounds
15
+
set noerrorbells
16
+
set novisualbell
17
+
set tm=500
18
+
19
+
syntax enable
20
+
21
+
set expandtab
22
+
set smarttab
23
+
24
+
" Clipboard support
25
+
set clipboard+=unnamed
26
+
set clipboard+=ideaput
+74
modules/home/programs/jetbrains/default.nix
+74
modules/home/programs/jetbrains/default.nix
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
pkgs,
6
+
inputs,
7
+
osConfig,
8
+
...
9
+
}:
10
+
let
11
+
12
+
inherit (lib)
13
+
mkIf
14
+
mkMerge
15
+
;
16
+
17
+
inherit (lib.types) bool package;
18
+
inherit (self.lib.modules) mkOpt;
19
+
20
+
cfg = config.sylveon.programs.jetbrains;
21
+
cfgFolder = ''.config/Jetbrains/${cfg.webstorm.package.version}'';
22
+
in
23
+
{
24
+
25
+
options.sylveon.programs.jetbrains = {
26
+
phpstorm = {
27
+
enable = mkOpt bool false "Whether or not to enable the jetbrains php-editor";
28
+
package = mkOpt package pkgs.jetbrains.phpstorm "What package to use for the jetbrains php-editor";
29
+
};
30
+
31
+
webstorm = {
32
+
enable = mkOpt bool false "Whether or not to enable the jetbrains web-editor";
33
+
package = mkOpt package pkgs.jetbrains.webstorm "What package to use for the jetbrains web-editor";
34
+
};
35
+
};
36
+
37
+
config = mkIf (cfg.phpstorm.enable || cfg.webstorm.enable) {
38
+
39
+
home.file.".vimrc".source = ./.vimrc; # TODO: move to a new vim configuration
40
+
home.file.".ideavimrc".source = ./.ideavimrc;
41
+
42
+
home.packages =
43
+
let
44
+
defaultPlugins = with pkgs.jetbrains-plugins; [
45
+
com.github.catppuccin.jetbrains
46
+
com.mallowigi # Atom material icons
47
+
48
+
# com.wakatime.intellij.plugin TODO
49
+
50
+
IdeaVIM
51
+
52
+
nix-idea
53
+
com.jetbrains.plugins.ini4idea
54
+
];
55
+
in
56
+
lib.optionals cfg.phpstorm.enable [
57
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
58
+
cfg.phpstorm.package
59
+
(with pkgs.jetbrains-plugins; [
60
+
# adrienbrault.idea.symfony2plugin Not available?
61
+
] ++ defaultPlugins)
62
+
)
63
+
]
64
+
65
+
++ lib.optionals cfg.webstorm.enable [
66
+
(pkgs.jetbrains-plugins.lib.buildIdeWithPlugins
67
+
cfg.webstorm.package
68
+
(with pkgs.jetbrains-plugins; [
69
+
io.github.pandier.intellijdiscordrp
70
+
] ++ defaultPlugins)
71
+
)
72
+
];
73
+
};
74
+
}
+5
-1
modules/nixos/default.nix
+5
-1
modules/nixos/default.nix
···
1
-
{
1
+
{ inputs, ... }: {
2
2
imports = [
3
+
# General module imports
4
+
inputs.tgirlpkgs.nixosModules.default
5
+
6
+
# Modules import
3
7
./hardware # hardware configuration (e.g gpu, cpu, networking, etc.)
4
8
./nix # specific configuration for the nix environment
5
9
./environment # environment variables and configurations (e.g fonts, time etc.)
+2
-1
modules/nixos/nix/nixpkgs.nix
+2
-1
modules/nixos/nix/nixpkgs.nix
···
1
-
{
1
+
{ inputs, ... }: {
2
2
# TODO: evaluation warning (cant use nixpkgs.config when using home-manager.useGlobalPkgs)
3
3
nixpkgs.config = {
4
4
# Allowance of packages
···
15
15
16
16
nixpkgs.overlays = [
17
17
(import ./overlays/mpv.nix)
18
+
inputs.nix-jetbrains-plugins.overlays.default
18
19
];
19
20
}
-5
modules/nixos/services/atprotocol/default.nix
-5
modules/nixos/services/atprotocol/default.nix
-82
modules/nixos/services/atprotocol/tangled.nix
-82
modules/nixos/services/atprotocol/tangled.nix
···
1
-
{ inputs, lib, self, config, ... }:
2
-
let
3
-
inherit (lib) mkMerge mkIf;
4
-
inherit (lib.types) str;
5
-
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
-
7
-
cfg = config.sylveon.services.atprotocol.tangled;
8
-
in
9
-
{
10
-
11
-
imports = [
12
-
inputs.tangled.nixosModules.knot
13
-
inputs.tangled.nixosModules.spindle
14
-
];
15
-
16
-
options.sylveon.services.atprotocol.tangled = {
17
-
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
-
19
-
knot =
20
-
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
-
22
-
spindle =
23
-
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
-
};
25
-
26
-
config = {
27
-
services = mkMerge [
28
-
(mkIf cfg.knot.enable {
29
-
tangled.knot = {
30
-
enable = true;
31
-
32
-
server = {
33
-
inherit (cfg) owner;
34
-
hostname = cfg.knot.domain;
35
-
};
36
-
37
-
motd = ''
38
-
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
-
'';
40
-
};
41
-
42
-
# Create proxy entry
43
-
nginx.virtualHosts.${cfg.knot.domain} = {
44
-
enableACME = true;
45
-
forceSSL = true;
46
-
47
-
locations."/" = {
48
-
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
-
proxyWebsockets = true;
50
-
};
51
-
52
-
extraConfig = "proxy_ssl_server_name on;";
53
-
};
54
-
})
55
-
56
-
(mkIf cfg.spindle.enable {
57
-
tangled.spindle = {
58
-
enable = true;
59
-
60
-
server = {
61
-
inherit (cfg) owner;
62
-
hostname = cfg.spindle.domain;
63
-
};
64
-
};
65
-
66
-
67
-
# Create proxy entry
68
-
nginx.virtualHosts.${cfg.spindle.domain} = {
69
-
enableACME = true;
70
-
forceSSL = true;
71
-
72
-
locations."/" = {
73
-
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
-
proxyWebsockets = true;
75
-
};
76
-
77
-
extraConfig = "proxy_ssl_server_name on;";
78
-
};
79
-
})
80
-
];
81
-
};
82
-
}
+2
-1
modules/nixos/services/default.nix
+2
-1
modules/nixos/services/default.nix
+1
-1
modules/nixos/services/glance/default.nix
+1
-1
modules/nixos/services/glance/default.nix
+2
-3
modules/nixos/services/kitchenowl.nix
+2
-3
modules/nixos/services/kitchenowl.nix
···
13
13
in
14
14
{
15
15
options.sylveon.services.kitchenowl =
16
-
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; };
16
+
mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; host = "127.0.0.1"; };
17
17
18
18
config = mkIf cfg.enable {
19
19
# Create secrets
···
22
22
# Enable the kitchenowl container
23
23
virtualisation.oci-containers.containers.kitchenowl = {
24
24
image = "tombursch/kitchenowl:latest";
25
-
ports = [ "${builtins.toString cfg.port}:${builtins.toString cfg.port}" ];
25
+
ports = [ "${builtins.toString cfg.port}:8080" ];
26
26
27
27
environmentFiles = [ config.age.secrets.kitchenowl-env.path ];
28
28
volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ];
···
35
35
36
36
locations."/" = {
37
37
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
38
-
proxyWebsockets = true;
39
38
};
40
39
41
40
extraConfig = "proxy_ssl_server_name on;";
+47
modules/nixos/services/piper.nix
+47
modules/nixos/services/piper.nix
···
1
+
{
2
+
config,
3
+
lib,
4
+
self,
5
+
...
6
+
}:
7
+
let
8
+
inherit (lib) mkIf;
9
+
inherit (self.lib.modules) mkServiceOpt;
10
+
11
+
cfg = config.sylveon.services.piper;
12
+
in
13
+
{
14
+
15
+
options.sylveon.services.piper =
16
+
mkServiceOpt "piper" { port = 3015; domain = "piper.xaiya.dev"; };
17
+
18
+
config = mkIf cfg.enable {
19
+
# Create secrets
20
+
age.secrets.piper-env.rekeyFile = "${self}/secrets/piper-env.age";
21
+
22
+
services = {
23
+
piper = { # TODO: Spotify API is currently blocked, cant create APP
24
+
enable = true;
25
+
environmentFiles = [ config.age.secrets.piper-env.path ];
26
+
27
+
settings = {
28
+
SERVER_PORT = cfg.port;
29
+
SERVER_ROOT_URL = "https://${cfg.domain}";
30
+
};
31
+
};
32
+
33
+
# Create proxy entry
34
+
nginx.virtualHosts.${cfg.domain} = {
35
+
enableACME = true;
36
+
forceSSL = true;
37
+
38
+
locations."/" = {
39
+
proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}";
40
+
};
41
+
42
+
extraConfig = "proxy_ssl_server_name on;";
43
+
44
+
};
45
+
};
46
+
};
47
+
}
+82
modules/nixos/services/tangled.nix
+82
modules/nixos/services/tangled.nix
···
1
+
{ inputs, lib, self, config, ... }:
2
+
let
3
+
inherit (lib) mkMerge mkIf;
4
+
inherit (lib.types) str;
5
+
inherit (self.lib.modules) mkServiceOpt mkOpt;
6
+
7
+
cfg = config.sylveon.services.tangled;
8
+
in
9
+
{
10
+
11
+
imports = [
12
+
inputs.tangled.nixosModules.knot
13
+
inputs.tangled.nixosModules.spindle
14
+
];
15
+
16
+
options.sylveon.services.tangled = {
17
+
owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance";
18
+
19
+
knot =
20
+
mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; };
21
+
22
+
spindle =
23
+
mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; };
24
+
};
25
+
26
+
config = {
27
+
services = mkMerge [
28
+
(mkIf cfg.knot.enable {
29
+
tangled.knot = {
30
+
enable = true;
31
+
32
+
server = {
33
+
inherit (cfg) owner;
34
+
hostname = cfg.knot.domain;
35
+
};
36
+
37
+
motd = ''
38
+
>> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner})
39
+
'';
40
+
};
41
+
42
+
# Create proxy entry
43
+
nginx.virtualHosts.${cfg.knot.domain} = {
44
+
enableACME = true;
45
+
forceSSL = true;
46
+
47
+
locations."/" = {
48
+
proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}";
49
+
proxyWebsockets = true;
50
+
};
51
+
52
+
extraConfig = "proxy_ssl_server_name on;";
53
+
};
54
+
})
55
+
56
+
(mkIf cfg.spindle.enable {
57
+
tangled.spindle = {
58
+
enable = true;
59
+
60
+
server = {
61
+
inherit (cfg) owner;
62
+
hostname = cfg.spindle.domain;
63
+
};
64
+
};
65
+
66
+
67
+
# Create proxy entry
68
+
nginx.virtualHosts.${cfg.spindle.domain} = {
69
+
enableACME = true;
70
+
forceSSL = true;
71
+
72
+
locations."/" = {
73
+
proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}";
74
+
proxyWebsockets = true;
75
+
};
76
+
77
+
extraConfig = "proxy_ssl_server_name on;";
78
+
};
79
+
})
80
+
];
81
+
};
82
+
}
+9
secrets/piper-env.age
+9
secrets/piper-env.age
···
1
+
age-encryption.org/v1
2
+
-> piv-p256 3eMZ2w Ayqd3HhxKkUWfKgQPMYVAubp9epHJyniP9sKb9fpTBLY
3
+
aaAyZ4lqXYArnlRiunmEg869BSFXj4YbyyTnRxlpVDU
4
+
-> po}y-grease ;IcPr [r|%9 {2xK,:
5
+
KO+GNHYFrAOMlGhb2fwHNqovaDtox4IfDxOzom407c2gOl56lSq7e2odJYMdUvf2
6
+
/aClPQoFOAGVipSrkRU
7
+
--- AqUx53QjjAlOllgZzPC/3S6YmSXmqYYioxeMqmYHuds
8
+
B$�P���B�a37�u�L��pa}���dN�f�J�#��.;�N�7:�n�
9
+
�s���]o��b5�g�a-*tw�7�v�H���* �o�\��6�����L�)��s�Fk��㡯)LѬDfқ��\J�����I
0���!i;ya�*���ީt�Nj�g�eKr�a��&��8Z�$����:m٩
+5
-8
systems/apricot/default.nix
+5
-8
systems/apricot/default.nix
···
12
12
networking.hostName = "apricot";
13
13
14
14
sylveon = {
15
-
profiles = {
16
-
server.enable = true;
17
-
};
15
+
profiles.server.enable = true;
18
16
19
17
device.cpu = "intel";
20
18
···
31
29
glance.enable = true;
32
30
kitchenowl.enable = true;
33
31
34
-
atprotocol = {
35
-
tangled = {
36
-
knot.enable = true;
37
-
spindle.enable = true;
38
-
};
32
+
tangled = {
33
+
knot.enable = true;
34
+
spindle.enable = true;
39
35
};
36
+
piper.enable = true;
40
37
41
38
plex.enable = true;
42
39
minecraft.enable = true;
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age
This is a binary file and will not be displayed.