NixOS configuration 🪄

Compare changes

Choose any two refs to compare.

+276 -74
flake.lock
··· 9 "rust-overlay": "rust-overlay" 10 }, 11 "locked": { 12 - "lastModified": 1766424259, 13 - "narHash": "sha256-ikKwd1/8rLIz8I+B8kwLaNwW5Hh75bkgGRalC+gEpw0=", 14 "owner": "ezKEa", 15 "repo": "aagl-gtk-on-nix", 16 - "rev": "37c289121c7ed44f723c326b6c079cd8aaeb35cf", 17 "type": "github" 18 }, 19 "original": { ··· 126 "nixpkgs": "nixpkgs_2" 127 }, 128 "locked": { 129 - "lastModified": 1765990358, 130 - "narHash": "sha256-l8x0gU8mnYaGMl+gWrsSHKBJlZWD8KXJfHTkRlFiPI0=", 131 "owner": "catppuccin", 132 "repo": "nix", 133 - "rev": "de1b60ca45a578f59f7d84c8d338b346017b2161", 134 "type": "github" 135 }, 136 "original": { ··· 168 "flake-parts": "flake-parts_6", 169 "git-hooks": "git-hooks", 170 "nix": "nix", 171 - "nixpkgs": "nixpkgs_7" 172 }, 173 "locked": { 174 "lastModified": 1760162706, ··· 340 ] 341 }, 342 "locked": { 343 - "lastModified": 1765835352, 344 - "narHash": "sha256-XswHlK/Qtjasvhd1nOa1e8MgZ8GS//jBoTqWtrS1Giw=", 345 "owner": "hercules-ci", 346 "repo": "flake-parts", 347 - "rev": "a34fae9c08a15ad73f295041fec82323541400a9", 348 "type": "github" 349 }, 350 "original": { ··· 451 }, 452 "flake-utils": { 453 "inputs": { 454 - "systems": "systems_4" 455 }, 456 "locked": { 457 "lastModified": 1731533236, ··· 542 }, 543 "gomod2nix": { 544 "inputs": { 545 - "flake-utils": "flake-utils", 546 "nixpkgs": [ 547 "tangled", 548 "nixpkgs" ··· 588 "nixpkgs": "nixpkgs_3" 589 }, 590 "locked": { 591 - "lastModified": 1767104570, 592 - "narHash": "sha256-GKgwu5//R+cLdKysZjGqvUEEOGXXLdt93sNXeb2M/Lk=", 593 "owner": "nix-community", 594 "repo": "home-manager", 595 - "rev": "e4e78a2cbeaddd07ab7238971b16468cc1d14daf", 596 "type": "github" 597 }, 598 "original": { ··· 679 "pre-commit-hooks": "pre-commit-hooks_2" 680 }, 681 "locked": { 682 - "lastModified": 1767099799, 683 - "narHash": "sha256-/62ITamWPT5ve84xJ2NDL0Wm+EVZMXn6dV9wo1KjxGQ=", 684 - "rev": "570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5", 685 "type": "tarball", 686 - "url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5.tar.gz?rev=570f5b8d1f7ad4e3146dd307a223e8a6993ddcc5" 687 }, 688 "original": { 689 "type": "tarball", ··· 773 ] 774 }, 775 "locked": { 776 - "lastModified": 1767060285, 777 - "narHash": "sha256-E8oSyoOQnqVCSg7+D0512fnL8JeltFqWaKETJrmo1Q8=", 778 "owner": "fufexan", 779 "repo": "nix-gaming", 780 - "rev": "45ce6a5470514514079e2d65eea7dddafba6bfc8", 781 "type": "github" 782 }, 783 "original": { ··· 786 "type": "github" 787 } 788 }, 789 "nix2container": { 790 "flake": false, 791 "locked": { ··· 839 ] 840 }, 841 "locked": { 842 - "lastModified": 1767132685, 843 - "narHash": "sha256-aZSb3+XU/7bkbB3kixcObU71/3fJSL6umDG6FdYZQo0=", 844 "owner": "KaylorBen", 845 "repo": "nixcord", 846 - "rev": "21c7a88f3c9ca24af054122fc9f0a27ad5fe2b16", 847 "type": "github" 848 }, 849 "original": { ··· 854 }, 855 "nixos-hardware": { 856 "locked": { 857 - "lastModified": 1767070591, 858 - "narHash": "sha256-b0aM3221Pw6vbACFqZrVzZjMNqXVPi1dvgLr8QTbajc=", 859 "owner": "NixOS", 860 "repo": "nixos-hardware", 861 - "rev": "9b3c38bf6c260d0e88154ef07fa833fa845bfd14", 862 "type": "github" 863 }, 864 "original": { ··· 945 "type": "github" 946 } 947 }, 948 "nixpkgs_2": { 949 "locked": { 950 - "lastModified": 1763966396, 951 - "narHash": "sha256-6eeL1YPcY1MV3DDStIDIdy/zZCDKgHdkCmsrLJFiZf0=", 952 "owner": "NixOS", 953 "repo": "nixpkgs", 954 - "rev": "5ae3b07d8d6527c42f17c876e404993199144b6a", 955 "type": "github" 956 }, 957 "original": { ··· 995 }, 996 "nixpkgs_5": { 997 "locked": { 998 - "lastModified": 1766902085, 999 - "narHash": "sha256-coBu0ONtFzlwwVBzmjacUQwj3G+lybcZ1oeNSQkgC0M=", 1000 "owner": "NixOS", 1001 "repo": "nixpkgs", 1002 - "rev": "c0b0e0fddf73fd517c3471e546c0df87a42d53f4", 1003 "type": "github" 1004 }, 1005 "original": { ··· 1011 }, 1012 "nixpkgs_6": { 1013 "locked": { 1014 - "lastModified": 1766840161, 1015 - "narHash": "sha256-Ss/LHpJJsng8vz1Pe33RSGIWUOcqM1fjrehjUkdrWio=", 1016 "owner": "NixOS", 1017 "repo": "nixpkgs", 1018 - "rev": "3edc4a30ed3903fdf6f90c837f961fa6b49582d1", 1019 "type": "github" 1020 }, 1021 "original": { 1022 "owner": "NixOS", 1023 - "ref": "nixpkgs-unstable", 1024 "repo": "nixpkgs", 1025 "type": "github" 1026 } 1027 }, 1028 "nixpkgs_7": { 1029 "locked": { 1030 - "lastModified": 1758532697, 1031 - "narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=", 1032 - "owner": "cachix", 1033 - "repo": "devenv-nixpkgs", 1034 - "rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f", 1035 "type": "github" 1036 }, 1037 "original": { 1038 - "owner": "cachix", 1039 - "ref": "rolling", 1040 - "repo": "devenv-nixpkgs", 1041 "type": "github" 1042 } 1043 }, 1044 "nixpkgs_8": { 1045 "locked": { 1046 - "lastModified": 1760103332, 1047 - "narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=", 1048 - "owner": "NixOS", 1049 - "repo": "nixpkgs", 1050 - "rev": "870493f9a8cb0b074ae5b411b2f232015db19a65", 1051 "type": "github" 1052 }, 1053 "original": { 1054 - "owner": "NixOS", 1055 - "ref": "nixpkgs-unstable", 1056 - "repo": "nixpkgs", 1057 "type": "github" 1058 } 1059 }, 1060 "nixvim": { 1061 "inputs": { 1062 "flake-parts": "flake-parts_5", 1063 - "nixpkgs": "nixpkgs_6", 1064 - "systems": "systems_2" 1065 }, 1066 "locked": { 1067 - "lastModified": 1767002962, 1068 - "narHash": "sha256-HGFRwMRUwt56E+SiVX9YQOzpOwHy0/rtEqMoEbkF8Yg=", 1069 "owner": "nix-community", 1070 "repo": "nixvim", 1071 - "rev": "63c957603751f0a107c4d9c2cbaff1c8749fc9f1", 1072 "type": "github" 1073 }, 1074 "original": { ··· 1127 "home-manager": "home-manager_2", 1128 "lix": "lix", 1129 "nix-gaming": "nix-gaming", 1130 "nixcord": "nixcord", 1131 "nixos-hardware": "nixos-hardware", 1132 - "nixpkgs": "nixpkgs_5", 1133 "nixvim": "nixvim", 1134 - "systems": "systems_3", 1135 "tangled": "tangled", 1136 "tidaLuna": "tidaLuna", 1137 "tinted-theming-schemes": "tinted-theming-schemes", 1138 "vicinae": "vicinae" ··· 1156 "type": "github" 1157 } 1158 }, 1159 "sqlite-lib-src": { 1160 "flake": false, 1161 "locked": { ··· 1259 "type": "github" 1260 } 1261 }, 1262 "tangled": { 1263 "inputs": { 1264 "actor-typeahead-src": "actor-typeahead-src", ··· 1276 "sqlite-lib-src": "sqlite-lib-src" 1277 }, 1278 "locked": { 1279 - "lastModified": 1767063361, 1280 - "narHash": "sha256-MyxjxAfOw6LgPGbv/m/am5E080jtc+FunlYFu5HIVUU=", 1281 "ref": "refs/heads/master", 1282 - "rev": "4bdc9dfe9bb5ed8f5dfea30b9a45bc93b1430535", 1283 - "revCount": 1779, 1284 "type": "git", 1285 "url": "https://tangled.org/tangled.org/core" 1286 }, ··· 1289 "url": "https://tangled.org/tangled.org/core" 1290 } 1291 }, 1292 "tidaLuna": { 1293 "inputs": { 1294 "devenv": "devenv", 1295 "flake-parts": "flake-parts_7", 1296 - "nixpkgs": "nixpkgs_8", 1297 - "systems": "systems_5" 1298 }, 1299 "locked": { 1300 "lastModified": 1765158153, ··· 1313 "tinted-theming-schemes": { 1314 "flake": false, 1315 "locked": { 1316 - "lastModified": 1765356580, 1317 - "narHash": "sha256-sZkRpDXWfAlf9oZWPzYQXuZ10uw48rq0Unwa9KS6DfE=", 1318 "owner": "tinted-theming", 1319 "repo": "schemes", 1320 - "rev": "6563443434dd05b006782f6c3ca63026b4249733", 1321 "type": "github" 1322 }, 1323 "original": { ··· 1352 "nixpkgs": [ 1353 "nixpkgs" 1354 ], 1355 - "systems": "systems_6" 1356 }, 1357 "locked": { 1358 - "lastModified": 1766947253, 1359 - "narHash": "sha256-bzdD637oY/d23QH7CKbyndBmmTBIM19HsnPtj49xCM0=", 1360 "owner": "vicinaehq", 1361 "repo": "vicinae", 1362 - "rev": "68faea42c62862614e071cee329486d907b3641a", 1363 "type": "github" 1364 }, 1365 "original": {
··· 9 "rust-overlay": "rust-overlay" 10 }, 11 "locked": { 12 + "lastModified": 1767520119, 13 + "narHash": "sha256-+OmNQLA9Fv5WBaxYHlPghS9XmnYWDaLt+AatCGhG+hc=", 14 "owner": "ezKEa", 15 "repo": "aagl-gtk-on-nix", 16 + "rev": "5720d3282844b6b23b26dfac075a5f1f58ea8844", 17 "type": "github" 18 }, 19 "original": { ··· 126 "nixpkgs": "nixpkgs_2" 127 }, 128 "locked": { 129 + "lastModified": 1767720192, 130 + "narHash": "sha256-gA2dpQr/REM9D4SUdMwioAATnXmOZz/eVIladxEISRA=", 131 "owner": "catppuccin", 132 "repo": "nix", 133 + "rev": "bbda4b492ba33c1ca04385792c93dda1a3a28f64", 134 "type": "github" 135 }, 136 "original": { ··· 168 "flake-parts": "flake-parts_6", 169 "git-hooks": "git-hooks", 170 "nix": "nix", 171 + "nixpkgs": "nixpkgs_9" 172 }, 173 "locked": { 174 "lastModified": 1760162706, ··· 340 ] 341 }, 342 "locked": { 343 + "lastModified": 1767609335, 344 + "narHash": "sha256-feveD98mQpptwrAEggBQKJTYbvwwglSbOv53uCfH9PY=", 345 "owner": "hercules-ci", 346 "repo": "flake-parts", 347 + "rev": "250481aafeb741edfe23d29195671c19b36b6dca", 348 "type": "github" 349 }, 350 "original": { ··· 451 }, 452 "flake-utils": { 453 "inputs": { 454 + "systems": "systems_2" 455 + }, 456 + "locked": { 457 + "lastModified": 1731533236, 458 + "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", 459 + "owner": "numtide", 460 + "repo": "flake-utils", 461 + "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", 462 + "type": "github" 463 + }, 464 + "original": { 465 + "owner": "numtide", 466 + "repo": "flake-utils", 467 + "type": "github" 468 + } 469 + }, 470 + "flake-utils_2": { 471 + "inputs": { 472 + "systems": "systems_3" 473 + }, 474 + "locked": { 475 + "lastModified": 1731533236, 476 + "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", 477 + "owner": "numtide", 478 + "repo": "flake-utils", 479 + "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", 480 + "type": "github" 481 + }, 482 + "original": { 483 + "owner": "numtide", 484 + "repo": "flake-utils", 485 + "type": "github" 486 + } 487 + }, 488 + "flake-utils_3": { 489 + "inputs": { 490 + "systems": "systems_6" 491 }, 492 "locked": { 493 "lastModified": 1731533236, ··· 578 }, 579 "gomod2nix": { 580 "inputs": { 581 + "flake-utils": "flake-utils_3", 582 "nixpkgs": [ 583 "tangled", 584 "nixpkgs" ··· 624 "nixpkgs": "nixpkgs_3" 625 }, 626 "locked": { 627 + "lastModified": 1767702900, 628 + "narHash": "sha256-xMzHmNytl7JgFRov2jHf2GYsLVp/sAfYO0JvbZt0uDo=", 629 "owner": "nix-community", 630 "repo": "home-manager", 631 + "rev": "38e187fd2f9efac197e03be0c25f3ee215974144", 632 "type": "github" 633 }, 634 "original": { ··· 715 "pre-commit-hooks": "pre-commit-hooks_2" 716 }, 717 "locked": { 718 + "lastModified": 1767713749, 719 + "narHash": "sha256-56x//7ognPbg9wNs7zJTwT7PjNR992PyYbIUQA4dHoc=", 720 + "rev": "b97b2e858babef00faa46fa557d9afe9e089a12a", 721 "type": "tarball", 722 + "url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/b97b2e858babef00faa46fa557d9afe9e089a12a.tar.gz?rev=b97b2e858babef00faa46fa557d9afe9e089a12a" 723 }, 724 "original": { 725 "type": "tarball", ··· 809 ] 810 }, 811 "locked": { 812 + "lastModified": 1767579768, 813 + "narHash": "sha256-MDyl7tiem57OAOcPuCJrONh1PCcKj5OzJEesBrka3dk=", 814 "owner": "fufexan", 815 "repo": "nix-gaming", 816 + "rev": "4199abcbc86b52e6878d1021da61c4e8e308e00e", 817 "type": "github" 818 }, 819 "original": { ··· 822 "type": "github" 823 } 824 }, 825 + "nix-jetbrains-plugins": { 826 + "inputs": { 827 + "flake-utils": "flake-utils", 828 + "nix-rust-wrangler": "nix-rust-wrangler", 829 + "nixpkgs": "nixpkgs_5", 830 + "rust-overlay": "rust-overlay_3" 831 + }, 832 + "locked": { 833 + "lastModified": 1767845296, 834 + "narHash": "sha256-o2EXCxnfi0WgCq3Mbmcn4aNwcXxfHV6/idZO+VFNIjY=", 835 + "owner": "Janrupf", 836 + "repo": "nix-jetbrains-plugin-repository", 837 + "rev": "09765ba1158410cb098880161f06b8e2607c8bef", 838 + "type": "github" 839 + }, 840 + "original": { 841 + "owner": "Janrupf", 842 + "repo": "nix-jetbrains-plugin-repository", 843 + "type": "github" 844 + } 845 + }, 846 + "nix-rust-wrangler": { 847 + "inputs": { 848 + "flake-utils": "flake-utils_2", 849 + "nixpkgs": [ 850 + "nix-jetbrains-plugins", 851 + "nixpkgs" 852 + ], 853 + "rust-overlay": "rust-overlay_2" 854 + }, 855 + "locked": { 856 + "lastModified": 1764906652, 857 + "narHash": "sha256-4eY+9dKYhTWx1X7AGVNfwxNlruR0Pjx16Anrm6ifnVo=", 858 + "owner": "Janrupf", 859 + "repo": "nix-rust-wrangler", 860 + "rev": "ab6b5ea4d654a05fea9e1ea53359a9be16777800", 861 + "type": "github" 862 + }, 863 + "original": { 864 + "owner": "Janrupf", 865 + "repo": "nix-rust-wrangler", 866 + "type": "github" 867 + } 868 + }, 869 "nix2container": { 870 "flake": false, 871 "locked": { ··· 919 ] 920 }, 921 "locked": { 922 + "lastModified": 1767715368, 923 + "narHash": "sha256-3JkfCB4MwVMLlC8N/ATth3saUF9kD1WQiIF/quDpvNo=", 924 "owner": "KaylorBen", 925 "repo": "nixcord", 926 + "rev": "f391c270ad2c74a94d99cbc9ad6a57478111c6de", 927 "type": "github" 928 }, 929 "original": { ··· 934 }, 935 "nixos-hardware": { 936 "locked": { 937 + "lastModified": 1767185284, 938 + "narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=", 939 "owner": "NixOS", 940 "repo": "nixos-hardware", 941 + "rev": "40b1a28dce561bea34858287fbb23052c3ee63fe", 942 "type": "github" 943 }, 944 "original": { ··· 1025 "type": "github" 1026 } 1027 }, 1028 + "nixpkgs_10": { 1029 + "locked": { 1030 + "lastModified": 1760103332, 1031 + "narHash": "sha256-BMsGVfKl4Q80Pr9T1AkCRljO1bpwCmY8rTBVj8XGuhA=", 1032 + "owner": "NixOS", 1033 + "repo": "nixpkgs", 1034 + "rev": "870493f9a8cb0b074ae5b411b2f232015db19a65", 1035 + "type": "github" 1036 + }, 1037 + "original": { 1038 + "owner": "NixOS", 1039 + "ref": "nixpkgs-unstable", 1040 + "repo": "nixpkgs", 1041 + "type": "github" 1042 + } 1043 + }, 1044 "nixpkgs_2": { 1045 "locked": { 1046 + "lastModified": 1767116409, 1047 + "narHash": "sha256-5vKw92l1GyTnjoLzEagJy5V5mDFck72LiQWZSOnSicw=", 1048 "owner": "NixOS", 1049 "repo": "nixpkgs", 1050 + "rev": "cad22e7d996aea55ecab064e84834289143e44a0", 1051 "type": "github" 1052 }, 1053 "original": { ··· 1091 }, 1092 "nixpkgs_5": { 1093 "locked": { 1094 + "lastModified": 1765472234, 1095 + "narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=", 1096 "owner": "NixOS", 1097 "repo": "nixpkgs", 1098 + "rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b", 1099 "type": "github" 1100 }, 1101 "original": { ··· 1107 }, 1108 "nixpkgs_6": { 1109 "locked": { 1110 + "lastModified": 1767640445, 1111 + "narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=", 1112 "owner": "NixOS", 1113 "repo": "nixpkgs", 1114 + "rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5", 1115 "type": "github" 1116 }, 1117 "original": { 1118 "owner": "NixOS", 1119 + "ref": "nixos-unstable", 1120 "repo": "nixpkgs", 1121 "type": "github" 1122 } 1123 }, 1124 "nixpkgs_7": { 1125 "locked": { 1126 + "lastModified": 1767026758, 1127 + "narHash": "sha256-7fsac/f7nh/VaKJ/qm3I338+wAJa/3J57cOGpXi0Sbg=", 1128 + "owner": "NixOS", 1129 + "repo": "nixpkgs", 1130 + "rev": "346dd96ad74dc4457a9db9de4f4f57dab2e5731d", 1131 "type": "github" 1132 }, 1133 "original": { 1134 + "owner": "NixOS", 1135 + "ref": "nixpkgs-unstable", 1136 + "repo": "nixpkgs", 1137 "type": "github" 1138 } 1139 }, 1140 "nixpkgs_8": { 1141 "locked": { 1142 + "lastModified": 1767364772, 1143 + "narHash": "sha256-G6ie+qOCRSV7wzOY+6L1o8GvcH1qDcE/DTzDT4CRdNw=", 1144 + "rev": "16c7794d0a28b5a37904d55bcca36003b9109aaa", 1145 + "type": "tarball", 1146 + "url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre921317.16c7794d0a28/nixexprs.tar.xz?lastModified=1767364772&rev=16c7794d0a28b5a37904d55bcca36003b9109aaa" 1147 + }, 1148 + "original": { 1149 + "type": "tarball", 1150 + "url": "https://channels.nixos.org/nixpkgs-unstable/nixexprs.tar.xz" 1151 + } 1152 + }, 1153 + "nixpkgs_9": { 1154 + "locked": { 1155 + "lastModified": 1758532697, 1156 + "narHash": "sha256-bhop0bR3u7DCw9/PtLCwr7GwEWDlBSxHp+eVQhCW9t4=", 1157 + "owner": "cachix", 1158 + "repo": "devenv-nixpkgs", 1159 + "rev": "207a4cb0e1253c7658c6736becc6eb9cace1f25f", 1160 "type": "github" 1161 }, 1162 "original": { 1163 + "owner": "cachix", 1164 + "ref": "rolling", 1165 + "repo": "devenv-nixpkgs", 1166 "type": "github" 1167 } 1168 }, 1169 "nixvim": { 1170 "inputs": { 1171 "flake-parts": "flake-parts_5", 1172 + "nixpkgs": "nixpkgs_7", 1173 + "systems": "systems_4" 1174 }, 1175 "locked": { 1176 + "lastModified": 1767608728, 1177 + "narHash": "sha256-kmSJCTgrx+BxgqQOTPHAOkohvO+lbRsPWqu+PSPcz3I=", 1178 "owner": "nix-community", 1179 "repo": "nixvim", 1180 + "rev": "851399eebd0fb383d2fd76269d859f16021dc7a8", 1181 "type": "github" 1182 }, 1183 "original": { ··· 1236 "home-manager": "home-manager_2", 1237 "lix": "lix", 1238 "nix-gaming": "nix-gaming", 1239 + "nix-jetbrains-plugins": "nix-jetbrains-plugins", 1240 "nixcord": "nixcord", 1241 "nixos-hardware": "nixos-hardware", 1242 + "nixpkgs": "nixpkgs_6", 1243 "nixvim": "nixvim", 1244 + "systems": "systems_5", 1245 "tangled": "tangled", 1246 + "tgirlpkgs": "tgirlpkgs", 1247 "tidaLuna": "tidaLuna", 1248 "tinted-theming-schemes": "tinted-theming-schemes", 1249 "vicinae": "vicinae" ··· 1267 "type": "github" 1268 } 1269 }, 1270 + "rust-overlay_2": { 1271 + "inputs": { 1272 + "nixpkgs": [ 1273 + "nix-jetbrains-plugins", 1274 + "nix-rust-wrangler", 1275 + "nixpkgs" 1276 + ] 1277 + }, 1278 + "locked": { 1279 + "lastModified": 1764902447, 1280 + "narHash": "sha256-wNqkDBj+tjK619sTHPEA7uhjr7DHHEY8OsFou31dxy0=", 1281 + "owner": "oxalica", 1282 + "repo": "rust-overlay", 1283 + "rev": "d914a744a83098eeb28125d2848ad383b209223f", 1284 + "type": "github" 1285 + }, 1286 + "original": { 1287 + "owner": "oxalica", 1288 + "repo": "rust-overlay", 1289 + "type": "github" 1290 + } 1291 + }, 1292 + "rust-overlay_3": { 1293 + "inputs": { 1294 + "nixpkgs": [ 1295 + "nix-jetbrains-plugins", 1296 + "nixpkgs" 1297 + ] 1298 + }, 1299 + "locked": { 1300 + "lastModified": 1767840362, 1301 + "narHash": "sha256-ZtsFqUhilubohNZ1TgpQIFsi4biZTwRH9rjZsDRDik8=", 1302 + "owner": "oxalica", 1303 + "repo": "rust-overlay", 1304 + "rev": "d159ea1fc321c60f88a616ac28bab660092a227d", 1305 + "type": "github" 1306 + }, 1307 + "original": { 1308 + "owner": "oxalica", 1309 + "repo": "rust-overlay", 1310 + "type": "github" 1311 + } 1312 + }, 1313 "sqlite-lib-src": { 1314 "flake": false, 1315 "locked": { ··· 1413 "type": "github" 1414 } 1415 }, 1416 + "systems_7": { 1417 + "locked": { 1418 + "lastModified": 1681028828, 1419 + "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", 1420 + "owner": "nix-systems", 1421 + "repo": "default", 1422 + "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", 1423 + "type": "github" 1424 + }, 1425 + "original": { 1426 + "owner": "nix-systems", 1427 + "repo": "default", 1428 + "type": "github" 1429 + } 1430 + }, 1431 + "systems_8": { 1432 + "locked": { 1433 + "lastModified": 1681028828, 1434 + "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", 1435 + "owner": "nix-systems", 1436 + "repo": "default", 1437 + "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", 1438 + "type": "github" 1439 + }, 1440 + "original": { 1441 + "owner": "nix-systems", 1442 + "repo": "default", 1443 + "type": "github" 1444 + } 1445 + }, 1446 "tangled": { 1447 "inputs": { 1448 "actor-typeahead-src": "actor-typeahead-src", ··· 1460 "sqlite-lib-src": "sqlite-lib-src" 1461 }, 1462 "locked": { 1463 + "lastModified": 1767683698, 1464 + "narHash": "sha256-MFrfNmTKTdOOsyXUvvqPwH6zqvDZZpURnd7QdJkVOgU=", 1465 "ref": "refs/heads/master", 1466 + "rev": "b31a2a3590fefc4c70817f94a20076df2428b4d3", 1467 + "revCount": 1791, 1468 "type": "git", 1469 "url": "https://tangled.org/tangled.org/core" 1470 }, ··· 1473 "url": "https://tangled.org/tangled.org/core" 1474 } 1475 }, 1476 + "tgirlpkgs": { 1477 + "inputs": { 1478 + "nixpkgs": "nixpkgs_8" 1479 + }, 1480 + "locked": { 1481 + "lastModified": 1767660739, 1482 + "narHash": "sha256-BuDIrsTL90jorWks/TAy0VVZIkeMn6p3CQCkvWeTzyA=", 1483 + "owner": "tgirlcloud", 1484 + "repo": "pkgs", 1485 + "rev": "3e5419554c59db95844713444be102611c922740", 1486 + "type": "github" 1487 + }, 1488 + "original": { 1489 + "owner": "tgirlcloud", 1490 + "repo": "pkgs", 1491 + "type": "github" 1492 + } 1493 + }, 1494 "tidaLuna": { 1495 "inputs": { 1496 "devenv": "devenv", 1497 "flake-parts": "flake-parts_7", 1498 + "nixpkgs": "nixpkgs_10", 1499 + "systems": "systems_7" 1500 }, 1501 "locked": { 1502 "lastModified": 1765158153, ··· 1515 "tinted-theming-schemes": { 1516 "flake": false, 1517 "locked": { 1518 + "lastModified": 1767710407, 1519 + "narHash": "sha256-+W1EB79Jl0/gm4JqmO0Nuc5C7hRdp4vfsV/VdzI+des=", 1520 "owner": "tinted-theming", 1521 "repo": "schemes", 1522 + "rev": "2800e2b8ac90f678d7e4acebe4fa253f602e05b2", 1523 "type": "github" 1524 }, 1525 "original": { ··· 1554 "nixpkgs": [ 1555 "nixpkgs" 1556 ], 1557 + "systems": "systems_8" 1558 }, 1559 "locked": { 1560 + "lastModified": 1767715269, 1561 + "narHash": "sha256-0QV6SuVyt16rTVNoB9W3ZwRm7FhJ1pwuDMUH2VkOI6A=", 1562 "owner": "vicinaehq", 1563 "repo": "vicinae", 1564 + "rev": "cd95054a199bba898c79ffa23fa41bac7326a375", 1565 "type": "github" 1566 }, 1567 "original": {
+13
flake.nix
··· 11 inputs.nixpkgs.follows = "nixpkgs"; 12 }; 13 14 catppuccin = { 15 type = "github"; 16 owner = "catppuccin"; ··· 29 owner = "NixOS"; 30 repo = "nixpkgs"; 31 ref = "nixos-unstable"; 32 }; 33 34 nixvim = {
··· 11 inputs.nixpkgs.follows = "nixpkgs"; 12 }; 13 14 + nix-jetbrains-plugins = { 15 + type = "github"; 16 + owner = "Janrupf"; 17 + repo = "nix-jetbrains-plugin-repository"; 18 + }; 19 + 20 catppuccin = { 21 type = "github"; 22 owner = "catppuccin"; ··· 35 owner = "NixOS"; 36 repo = "nixpkgs"; 37 ref = "nixos-unstable"; 38 + }; 39 + 40 + # Package collection 41 + tgirlpkgs = { 42 + type = "github"; 43 + owner = "tgirlcloud"; 44 + repo = "pkgs"; 45 }; 46 47 nixvim = {
+2
home/blmedia/default.nix
··· 9 programs = { 10 librewolf.enable = true; 11 discord.enable = true; 12 }; 13 14 cli = {
··· 9 programs = { 10 librewolf.enable = true; 11 discord.enable = true; 12 + 13 + jetbrains.phpstorm.enable = true; 14 }; 15 16 cli = {
-3
home/blmedia/packages.nix
··· 4 home.packages = [ 5 pkgs.enpass 6 7 - pkgs.jetbrains.phpstorm # Mainly using neovim, but for some work stuff still needed 8 pkgs.obsidian # Notes taking app 9 10 pkgs.mpv # Music streaming 11 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 12 - 13 - pkgs.wasistlos # Whatsapp for linux 14 15 pkgs.teams-for-linux # Teams; Need that for school and work 16
··· 4 home.packages = [ 5 pkgs.enpass 6 7 pkgs.obsidian # Notes taking app 8 9 pkgs.mpv # Music streaming 10 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 11 12 pkgs.teams-for-linux # Teams; Need that for school and work 13
+2
home/default.nix
··· 3 config, 4 self, 5 inputs', 6 inputs, 7 ... 8 }: ··· 29 self 30 inputs 31 inputs' 32 ; 33 }; 34
··· 3 config, 4 self, 5 inputs', 6 + system, 7 inputs, 8 ... 9 }: ··· 30 self 31 inputs 32 inputs' 33 + system 34 ; 35 }; 36
+2
home/xaiya/default.nix
··· 9 librewolf.enable = true; 10 discord.enable = true; 11 lutris.enable = true; 12 }; 13 14 cli.neovim.enable = true;
··· 9 librewolf.enable = true; 10 discord.enable = true; 11 lutris.enable = true; 12 + 13 + jetbrains.webstorm.enable = true; 14 }; 15 16 cli.neovim.enable = true;
-2
home/xaiya/packages.nix
··· 12 pkgs.mpv # Music streaming 13 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 14 15 - pkgs.wasistlos # Whatsapp for linux 16 - 17 pkgs.teams-for-linux # Teams; Need that for school and work 18 #pkgs.ciscoPacketTracer8 # Cisco software that I need for school 19
··· 12 pkgs.mpv # Music streaming 13 inputs'.tidaLuna.packages.default # Music Streaming Service (injected) 14 15 pkgs.teams-for-linux # Teams; Need that for school and work 16 #pkgs.ciscoPacketTracer8 # Cisco software that I need for school 17
+1
modules/home/cli/neovim/default.nix
··· 35 ./social.nix 36 ]; 37 38 options.sylveon.cli.neovim = { 39 enable = mkOpt bool false "vim editor, only better"; 40 anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
··· 35 ./social.nix 36 ]; 37 38 + # Neovim should be used as a lightweigt editor (used for small changes) 39 options.sylveon.cli.neovim = { 40 enable = mkOpt bool false "vim editor, only better"; 41 anonymous = mkOpt bool false "If the file data should be anonymous to people (e.g discord rpc)";
+2
modules/home/programs/default.nix
··· 3 ./librewolf.nix 4 ./discord.nix 5 ./lutris.nix 6 ]; 7 }
··· 3 ./librewolf.nix 4 ./discord.nix 5 ./lutris.nix 6 + 7 + ./jetbrains 8 ]; 9 }
+16
modules/home/programs/jetbrains/.ideavimrc
···
··· 1 + " You can find a list of commands here: https://jb.gg/h38q75 2 + " Find more examples here: https://jb.gg/share-ideavimrc 3 + 4 + source ~/.vimrc 5 + 6 + " Keymaps just for jetbrains ide 7 + map <C-N> <A>1<CR> 8 + 9 + " Move around tabs 10 + map <A-l> :tabnext<cr> 11 + map <A-h> :tabNext<cr> 12 + 13 + 14 + " Enabling Plugins 15 + Plug 'tpope/vim-commentary' " Commentary plugin 16 + Plug 'machakann/vim-highlightedyank' " Highlight copied text
+26
modules/home/programs/jetbrains/.vimrc
···
··· 1 + map Q gq 2 + 3 + set scrolloff=7 4 + set autoread 5 + 6 + set ignorecase 7 + set smartcase 8 + set hlsearch 9 + set incsearch 10 + 11 + set showmatch 12 + set mat=2 13 + 14 + " disable sounds 15 + set noerrorbells 16 + set novisualbell 17 + set tm=500 18 + 19 + syntax enable 20 + 21 + set expandtab 22 + set smarttab 23 + 24 + " Clipboard support 25 + set clipboard+=unnamed 26 + set clipboard+=ideaput
+74
modules/home/programs/jetbrains/default.nix
···
··· 1 + { 2 + config, 3 + lib, 4 + self, 5 + pkgs, 6 + inputs, 7 + osConfig, 8 + ... 9 + }: 10 + let 11 + 12 + inherit (lib) 13 + mkIf 14 + mkMerge 15 + ; 16 + 17 + inherit (lib.types) bool package; 18 + inherit (self.lib.modules) mkOpt; 19 + 20 + cfg = config.sylveon.programs.jetbrains; 21 + cfgFolder = ''.config/Jetbrains/${cfg.webstorm.package.version}''; 22 + in 23 + { 24 + 25 + options.sylveon.programs.jetbrains = { 26 + phpstorm = { 27 + enable = mkOpt bool false "Whether or not to enable the jetbrains php-editor"; 28 + package = mkOpt package pkgs.jetbrains.phpstorm "What package to use for the jetbrains php-editor"; 29 + }; 30 + 31 + webstorm = { 32 + enable = mkOpt bool false "Whether or not to enable the jetbrains web-editor"; 33 + package = mkOpt package pkgs.jetbrains.webstorm "What package to use for the jetbrains web-editor"; 34 + }; 35 + }; 36 + 37 + config = mkIf (cfg.phpstorm.enable || cfg.webstorm.enable) { 38 + 39 + home.file.".vimrc".source = ./.vimrc; # TODO: move to a new vim configuration 40 + home.file.".ideavimrc".source = ./.ideavimrc; 41 + 42 + home.packages = 43 + let 44 + defaultPlugins = with pkgs.jetbrains-plugins; [ 45 + com.github.catppuccin.jetbrains 46 + com.mallowigi # Atom material icons 47 + 48 + # com.wakatime.intellij.plugin TODO 49 + 50 + IdeaVIM 51 + 52 + nix-idea 53 + com.jetbrains.plugins.ini4idea 54 + ]; 55 + in 56 + lib.optionals cfg.phpstorm.enable [ 57 + (pkgs.jetbrains-plugins.lib.buildIdeWithPlugins 58 + cfg.phpstorm.package 59 + (with pkgs.jetbrains-plugins; [ 60 + # adrienbrault.idea.symfony2plugin Not available? 61 + ] ++ defaultPlugins) 62 + ) 63 + ] 64 + 65 + ++ lib.optionals cfg.webstorm.enable [ 66 + (pkgs.jetbrains-plugins.lib.buildIdeWithPlugins 67 + cfg.webstorm.package 68 + (with pkgs.jetbrains-plugins; [ 69 + io.github.pandier.intellijdiscordrp 70 + ] ++ defaultPlugins) 71 + ) 72 + ]; 73 + }; 74 + }
+5 -1
modules/nixos/default.nix
··· 1 - { 2 imports = [ 3 ./hardware # hardware configuration (e.g gpu, cpu, networking, etc.) 4 ./nix # specific configuration for the nix environment 5 ./environment # environment variables and configurations (e.g fonts, time etc.)
··· 1 + { inputs, ... }: { 2 imports = [ 3 + # General module imports 4 + inputs.tgirlpkgs.nixosModules.default 5 + 6 + # Modules import 7 ./hardware # hardware configuration (e.g gpu, cpu, networking, etc.) 8 ./nix # specific configuration for the nix environment 9 ./environment # environment variables and configurations (e.g fonts, time etc.)
+2 -1
modules/nixos/nix/nixpkgs.nix
··· 1 - { 2 # TODO: evaluation warning (cant use nixpkgs.config when using home-manager.useGlobalPkgs) 3 nixpkgs.config = { 4 # Allowance of packages ··· 15 16 nixpkgs.overlays = [ 17 (import ./overlays/mpv.nix) 18 ]; 19 }
··· 1 + { inputs, ... }: { 2 # TODO: evaluation warning (cant use nixpkgs.config when using home-manager.useGlobalPkgs) 3 nixpkgs.config = { 4 # Allowance of packages ··· 15 16 nixpkgs.overlays = [ 17 (import ./overlays/mpv.nix) 18 + inputs.nix-jetbrains-plugins.overlays.default 19 ]; 20 }
-5
modules/nixos/services/atprotocol/default.nix
··· 1 - { 2 - imports = [ 3 - ./tangled.nix 4 - ]; 5 - }
···
-82
modules/nixos/services/atprotocol/tangled.nix
··· 1 - { inputs, lib, self, config, ... }: 2 - let 3 - inherit (lib) mkMerge mkIf; 4 - inherit (lib.types) str; 5 - inherit (self.lib.modules) mkServiceOpt mkOpt; 6 - 7 - cfg = config.sylveon.services.atprotocol.tangled; 8 - in 9 - { 10 - 11 - imports = [ 12 - inputs.tangled.nixosModules.knot 13 - inputs.tangled.nixosModules.spindle 14 - ]; 15 - 16 - options.sylveon.services.atprotocol.tangled = { 17 - owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance"; 18 - 19 - knot = 20 - mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; }; 21 - 22 - spindle = 23 - mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; }; 24 - }; 25 - 26 - config = { 27 - services = mkMerge [ 28 - (mkIf cfg.knot.enable { 29 - tangled.knot = { 30 - enable = true; 31 - 32 - server = { 33 - inherit (cfg) owner; 34 - hostname = cfg.knot.domain; 35 - }; 36 - 37 - motd = '' 38 - >> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner}) 39 - ''; 40 - }; 41 - 42 - # Create proxy entry 43 - nginx.virtualHosts.${cfg.knot.domain} = { 44 - enableACME = true; 45 - forceSSL = true; 46 - 47 - locations."/" = { 48 - proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}"; 49 - proxyWebsockets = true; 50 - }; 51 - 52 - extraConfig = "proxy_ssl_server_name on;"; 53 - }; 54 - }) 55 - 56 - (mkIf cfg.spindle.enable { 57 - tangled.spindle = { 58 - enable = true; 59 - 60 - server = { 61 - inherit (cfg) owner; 62 - hostname = cfg.spindle.domain; 63 - }; 64 - }; 65 - 66 - 67 - # Create proxy entry 68 - nginx.virtualHosts.${cfg.spindle.domain} = { 69 - enableACME = true; 70 - forceSSL = true; 71 - 72 - locations."/" = { 73 - proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}"; 74 - proxyWebsockets = true; 75 - }; 76 - 77 - extraConfig = "proxy_ssl_server_name on;"; 78 - }; 79 - }) 80 - ]; 81 - }; 82 - }
···
+2 -1
modules/nixos/services/default.nix
··· 10 ./glance 11 ./kitchenowl.nix 12 13 - ./atprotocol 14 15 ./plex.nix 16 ];
··· 10 ./glance 11 ./kitchenowl.nix 12 13 + ./tangled.nix 14 + ./piper.nix 15 16 ./plex.nix 17 ];
+1 -1
modules/nixos/services/glance/default.nix
··· 36 proxied = true; 37 }; 38 39 - # rose-pine color theme 40 theme = { 41 constrat-multiplier = 1.3; 42 background-color = "249 22 12"; # Base
··· 36 proxied = true; 37 }; 38 39 + # rose-pine color theme TODO 40 theme = { 41 constrat-multiplier = 1.3; 42 background-color = "249 22 12"; # Base
+2 -3
modules/nixos/services/kitchenowl.nix
··· 13 in 14 { 15 options.sylveon.services.kitchenowl = 16 - mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; }; 17 18 config = mkIf cfg.enable { 19 # Create secrets ··· 22 # Enable the kitchenowl container 23 virtualisation.oci-containers.containers.kitchenowl = { 24 image = "tombursch/kitchenowl:latest"; 25 - ports = [ "${builtins.toString cfg.port}:${builtins.toString cfg.port}" ]; 26 27 environmentFiles = [ config.age.secrets.kitchenowl-env.path ]; 28 volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ]; ··· 35 36 locations."/" = { 37 proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}"; 38 - proxyWebsockets = true; 39 }; 40 41 extraConfig = "proxy_ssl_server_name on;";
··· 13 in 14 { 15 options.sylveon.services.kitchenowl = 16 + mkServiceOpt "Kitchenowl" { port = 8050; domain = "kitchen.xaiya.dev"; host = "127.0.0.1"; }; 17 18 config = mkIf cfg.enable { 19 # Create secrets ··· 22 # Enable the kitchenowl container 23 virtualisation.oci-containers.containers.kitchenowl = { 24 image = "tombursch/kitchenowl:latest"; 25 + ports = [ "${builtins.toString cfg.port}:8080" ]; 26 27 environmentFiles = [ config.age.secrets.kitchenowl-env.path ]; 28 volumes = [ "/mnt/raid/services/kitchenowl/data:/data" ]; ··· 35 36 locations."/" = { 37 proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}"; 38 }; 39 40 extraConfig = "proxy_ssl_server_name on;";
+47
modules/nixos/services/piper.nix
···
··· 1 + { 2 + config, 3 + lib, 4 + self, 5 + ... 6 + }: 7 + let 8 + inherit (lib) mkIf; 9 + inherit (self.lib.modules) mkServiceOpt; 10 + 11 + cfg = config.sylveon.services.piper; 12 + in 13 + { 14 + 15 + options.sylveon.services.piper = 16 + mkServiceOpt "piper" { port = 3015; domain = "piper.xaiya.dev"; }; 17 + 18 + config = mkIf cfg.enable { 19 + # Create secrets 20 + age.secrets.piper-env.rekeyFile = "${self}/secrets/piper-env.age"; 21 + 22 + services = { 23 + piper = { # TODO: Spotify API is currently blocked, cant create APP 24 + enable = true; 25 + environmentFiles = [ config.age.secrets.piper-env.path ]; 26 + 27 + settings = { 28 + SERVER_PORT = cfg.port; 29 + SERVER_ROOT_URL = "https://${cfg.domain}"; 30 + }; 31 + }; 32 + 33 + # Create proxy entry 34 + nginx.virtualHosts.${cfg.domain} = { 35 + enableACME = true; 36 + forceSSL = true; 37 + 38 + locations."/" = { 39 + proxyPass = "http://${cfg.host}:${builtins.toString cfg.port}"; 40 + }; 41 + 42 + extraConfig = "proxy_ssl_server_name on;"; 43 + 44 + }; 45 + }; 46 + }; 47 + }
+82
modules/nixos/services/tangled.nix
···
··· 1 + { inputs, lib, self, config, ... }: 2 + let 3 + inherit (lib) mkMerge mkIf; 4 + inherit (lib.types) str; 5 + inherit (self.lib.modules) mkServiceOpt mkOpt; 6 + 7 + cfg = config.sylveon.services.tangled; 8 + in 9 + { 10 + 11 + imports = [ 12 + inputs.tangled.nixosModules.knot 13 + inputs.tangled.nixosModules.spindle 14 + ]; 15 + 16 + options.sylveon.services.tangled = { 17 + owner = mkOpt str "did:plc:mycafjhyplj5z7a6qi5qjcil" "The owner of this tangled instance"; 18 + 19 + knot = 20 + mkServiceOpt "Tangled knot" { port = 5555; domain = "knot.xaiya.dev"; }; 21 + 22 + spindle = 23 + mkServiceOpt "Tangled spindle" { port = 6555; domain = "spindle.xaiya.dev"; }; 24 + }; 25 + 26 + config = { 27 + services = mkMerge [ 28 + (mkIf cfg.knot.enable { 29 + tangled.knot = { 30 + enable = true; 31 + 32 + server = { 33 + inherit (cfg) owner; 34 + hostname = cfg.knot.domain; 35 + }; 36 + 37 + motd = '' 38 + >> Tangled Knot !! (owned by: ${config.services.tangled.knot.server.owner}) 39 + ''; 40 + }; 41 + 42 + # Create proxy entry 43 + nginx.virtualHosts.${cfg.knot.domain} = { 44 + enableACME = true; 45 + forceSSL = true; 46 + 47 + locations."/" = { 48 + proxyPass = "http://${cfg.knot.host}:${builtins.toString cfg.knot.port}"; 49 + proxyWebsockets = true; 50 + }; 51 + 52 + extraConfig = "proxy_ssl_server_name on;"; 53 + }; 54 + }) 55 + 56 + (mkIf cfg.spindle.enable { 57 + tangled.spindle = { 58 + enable = true; 59 + 60 + server = { 61 + inherit (cfg) owner; 62 + hostname = cfg.spindle.domain; 63 + }; 64 + }; 65 + 66 + 67 + # Create proxy entry 68 + nginx.virtualHosts.${cfg.spindle.domain} = { 69 + enableACME = true; 70 + forceSSL = true; 71 + 72 + locations."/" = { 73 + proxyPass = "http://${cfg.spindle.host}:${builtins.toString cfg.spindle.port}"; 74 + proxyWebsockets = true; 75 + }; 76 + 77 + extraConfig = "proxy_ssl_server_name on;"; 78 + }; 79 + }) 80 + ]; 81 + }; 82 + }
+9
secrets/piper-env.age
···
··· 1 + age-encryption.org/v1 2 + -> piv-p256 3eMZ2w Ayqd3HhxKkUWfKgQPMYVAubp9epHJyniP9sKb9fpTBLY 3 + aaAyZ4lqXYArnlRiunmEg869BSFXj4YbyyTnRxlpVDU 4 + -> po}y-grease ;IcPr [r|%9 {2xK,: 5 + KO+GNHYFrAOMlGhb2fwHNqovaDtox4IfDxOzom407c2gOl56lSq7e2odJYMdUvf2 6 + /aClPQoFOAGVipSrkRU 7 + --- AqUx53QjjAlOllgZzPC/3S6YmSXmqYYioxeMqmYHuds 8 + B$�P���B�a37�u�L��pa}���dN�f�J�#��.;�N�7:�n� 9 + �s׮���]o��b5�g�a-*tw�7�v�H ���* �o�\��6�����L�)��s�Fk��㡯)LѬDfқ��\J���� �I 0���!i;ya�*���ީt�Nj�g�eKr�a��&��8Z�$����:m٩
+5 -8
systems/apricot/default.nix
··· 12 networking.hostName = "apricot"; 13 14 sylveon = { 15 - profiles = { 16 - server.enable = true; 17 - }; 18 19 device.cpu = "intel"; 20 ··· 31 glance.enable = true; 32 kitchenowl.enable = true; 33 34 - atprotocol = { 35 - tangled = { 36 - knot.enable = true; 37 - spindle.enable = true; 38 - }; 39 }; 40 41 plex.enable = true; 42 minecraft.enable = true;
··· 12 networking.hostName = "apricot"; 13 14 sylveon = { 15 + profiles.server.enable = true; 16 17 device.cpu = "intel"; 18 ··· 29 glance.enable = true; 30 kitchenowl.enable = true; 31 32 + tangled = { 33 + knot.enable = true; 34 + spindle.enable = true; 35 }; 36 + piper.enable = true; 37 38 plex.enable = true; 39 minecraft.enable = true;
systems/apricot/secrets/9a308c26d6fe239a0ea1efa8b1934973-piper-env.age

This is a binary file and will not be displayed.