-11
.sops.yaml
-11
.sops.yaml
-10
common/development/default.nix
-10
common/development/default.nix
-9
common/development/python.nix
-9
common/development/python.nix
-6
common/development/sh.nix
-6
common/development/sh.nix
-9
common/development/typst.nix
-9
common/development/typst.nix
-6
common/development/zig.nix
-6
common/development/zig.nix
-14
common/editor.nix
-14
common/editor.nix
-6
common/scripts/default.nix
-6
common/scripts/default.nix
-121
flake.lock
-121
flake.lock
···
1
-
{
2
-
"nodes": {
3
-
"home-manager": {
4
-
"inputs": {
5
-
"nixpkgs": [
6
-
"nixpkgs"
7
-
]
8
-
},
9
-
"locked": {
10
-
"lastModified": 1714515075,
11
-
"narHash": "sha256-azMK7aWH0eUc3IqU4Fg5rwZdB9WZBvimOGG3piqvtsY=",
12
-
"owner": "nix-community",
13
-
"repo": "home-manager",
14
-
"rev": "6d3b6dc9222c12b951169becdf4b0592ee9576ef",
15
-
"type": "github"
16
-
},
17
-
"original": {
18
-
"owner": "nix-community",
19
-
"repo": "home-manager",
20
-
"type": "github"
21
-
}
22
-
},
23
-
"nixpkgs": {
24
-
"locked": {
25
-
"lastModified": 1714253743,
26
-
"narHash": "sha256-mdTQw2XlariysyScCv2tTE45QSU9v/ezLcHJ22f0Nxc=",
27
-
"owner": "NixOS",
28
-
"repo": "nixpkgs",
29
-
"rev": "58a1abdbae3217ca6b702f03d3b35125d88a2994",
30
-
"type": "github"
31
-
},
32
-
"original": {
33
-
"owner": "NixOS",
34
-
"ref": "nixos-unstable",
35
-
"repo": "nixpkgs",
36
-
"type": "github"
37
-
}
38
-
},
39
-
"nixpkgs-stable": {
40
-
"locked": {
41
-
"lastModified": 1713638189,
42
-
"narHash": "sha256-q7APLfB6FmmSMI1Su5ihW9IwntBsk2hWNXh8XtSdSIk=",
43
-
"owner": "NixOS",
44
-
"repo": "nixpkgs",
45
-
"rev": "74574c38577914733b4f7a775dd77d24245081dd",
46
-
"type": "github"
47
-
},
48
-
"original": {
49
-
"owner": "NixOS",
50
-
"ref": "release-23.11",
51
-
"repo": "nixpkgs",
52
-
"type": "github"
53
-
}
54
-
},
55
-
"nixpkgs_2": {
56
-
"locked": {
57
-
"lastModified": 1713596654,
58
-
"narHash": "sha256-LJbHQQ5aX1LVth2ST+Kkse/DRzgxlVhTL1rxthvyhZc=",
59
-
"owner": "NixOS",
60
-
"repo": "nixpkgs",
61
-
"rev": "fd16bb6d3bcca96039b11aa52038fafeb6e4f4be",
62
-
"type": "github"
63
-
},
64
-
"original": {
65
-
"owner": "NixOS",
66
-
"ref": "nixpkgs-unstable",
67
-
"repo": "nixpkgs",
68
-
"type": "github"
69
-
}
70
-
},
71
-
"root": {
72
-
"inputs": {
73
-
"home-manager": "home-manager",
74
-
"nixpkgs": "nixpkgs",
75
-
"sops-nix": "sops-nix",
76
-
"yemou-scripts": "yemou-scripts"
77
-
}
78
-
},
79
-
"sops-nix": {
80
-
"inputs": {
81
-
"nixpkgs": "nixpkgs_2",
82
-
"nixpkgs-stable": "nixpkgs-stable"
83
-
},
84
-
"locked": {
85
-
"lastModified": 1713892811,
86
-
"narHash": "sha256-uIGmA2xq41vVFETCF1WW4fFWFT2tqBln+aXnWrvjGRE=",
87
-
"owner": "Mic92",
88
-
"repo": "sops-nix",
89
-
"rev": "f1b0adc27265274e3b0c9b872a8f476a098679bd",
90
-
"type": "github"
91
-
},
92
-
"original": {
93
-
"owner": "Mic92",
94
-
"repo": "sops-nix",
95
-
"type": "github"
96
-
}
97
-
},
98
-
"yemou-scripts": {
99
-
"inputs": {
100
-
"nixpkgs": [
101
-
"nixpkgs"
102
-
]
103
-
},
104
-
"locked": {
105
-
"lastModified": 1705635077,
106
-
"narHash": "sha256-itxXV1qG8plLbiW6beGabzuKUMf7DzOObLAT5miRUOs=",
107
-
"owner": "yemou",
108
-
"repo": "scripts",
109
-
"rev": "b5bcc101b1ea4b1d9544d14e45a00507e19b9a78",
110
-
"type": "gitlab"
111
-
},
112
-
"original": {
113
-
"owner": "yemou",
114
-
"repo": "scripts",
115
-
"type": "gitlab"
116
-
}
117
-
}
118
-
},
119
-
"root": "root",
120
-
"version": 7
121
-
}
-35
flake.nix
-35
flake.nix
···
1
-
{
2
-
inputs = {
3
-
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
4
-
home-manager = {
5
-
url = "github:nix-community/home-manager";
6
-
inputs.nixpkgs.follows = "nixpkgs";
7
-
};
8
-
sops-nix.url = "github:Mic92/sops-nix";
9
-
yemou-scripts = {
10
-
url = "gitlab:yemou/scripts";
11
-
# url = "path:/home/mou/misc/repos/scripts";
12
-
inputs.nixpkgs.follows = "nixpkgs";
13
-
};
14
-
};
15
-
16
-
outputs = { self, nixpkgs, sops-nix, home-manager, ... }@attrs: {
17
-
nixosConfigurations = {
18
-
lutea = nixpkgs.lib.nixosSystem {
19
-
system = "x86_64-linux";
20
-
specialArgs = attrs;
21
-
modules = [
22
-
./lutea/config.nix
23
-
sops-nix.nixosModules.sops
24
-
home-manager.nixosModules.home-manager
25
-
{
26
-
home-manager.extraSpecialArgs = attrs;
27
-
home-manager.useGlobalPkgs = true;
28
-
home-manager.useUserPackages = true;
29
-
home-manager.users.mou = import ./lutea/home.nix;
30
-
}
31
-
];
32
-
};
33
-
};
34
-
};
35
-
}
-173
lutea/config.nix
-173
lutea/config.nix
···
1
-
{ config, lib, pkgs, ... }: {
2
-
imports = [
3
-
./hardware.nix
4
-
./packages.nix
5
-
];
6
-
7
-
sops = {
8
-
defaultSopsFile = ../secrets/lutea.yaml;
9
-
defaultSopsFormat = "yaml";
10
-
age.keyFile = "/home/mou/.app/config/sops/age/keys.txt";
11
-
secrets = {
12
-
"passwordHashes/root".neededForUsers = true;
13
-
"passwordHashes/mou".neededForUsers = true;
14
-
};
15
-
};
16
-
17
-
networking.hostName = "lutea";
18
-
time.timeZone = "America/New_York";
19
-
20
-
virtualisation.libvirtd.enable = true;
21
-
22
-
# Move to home-manager?
23
-
qt = {
24
-
enable = true;
25
-
platformTheme = "gnome";
26
-
style = "adwaita";
27
-
};
28
-
29
-
fonts = {
30
-
enableDefaultPackages = true;
31
-
packages = with pkgs; [
32
-
corefonts
33
-
ibm-plex
34
-
];
35
-
fontconfig.defaultFonts = {
36
-
serif = [ "IBM Plex Serif" ];
37
-
sansSerif = [ "IBM Plex Sans" ];
38
-
monospace = [ "IBM Plex Mono" ];
39
-
};
40
-
};
41
-
42
-
security = {
43
-
polkit.enable = true;
44
-
rtkit.enable = true;
45
-
pam.services.swaylock = { }; # Needed for swaylock to work
46
-
};
47
-
48
-
services = {
49
-
acpid.enable = true;
50
-
dbus.enable = true;
51
-
flatpak.enable = true;
52
-
fwupd.enable = true;
53
-
greetd = {
54
-
enable = true;
55
-
settings = {
56
-
default_session = {
57
-
# TODO: When the next release occurs (currently on 0.8.0), the `-x` option will be available
58
-
# NOTE: A future release may check these directories automatically instead of requiring
59
-
# me to set them explicitly
60
-
command = ''
61
-
${pkgs.greetd.tuigreet}/bin/tuigreet \
62
-
-s /run/current-system/sw/share/wayland-sessions:/run/current-system/sw/share/xsessions \
63
-
-t --time-format '%F %A %R' \
64
-
-r --remember-user-session \
65
-
--power-shutdown 'systemctl poweroff' \
66
-
--power-reboot 'systemctl reboot'
67
-
'';
68
-
};
69
-
};
70
-
};
71
-
pipewire = {
72
-
enable = true;
73
-
alsa.enable = true;
74
-
jack.enable = true;
75
-
pulse.enable = true;
76
-
};
77
-
printing.enable = true;
78
-
ratbagd.enable = true;
79
-
smartd.enable = true;
80
-
thermald.enable = true;
81
-
udev.packages = with pkgs; [ game-devices-udev-rules ];
82
-
xserver = {
83
-
desktopManager = {
84
-
# plasma5 = {
85
-
# enable = true;
86
-
# # useQtScaling = true; # I'm not sure what this does.
87
-
# };
88
-
};
89
-
wacom.enable = true;
90
-
};
91
-
};
92
-
93
-
94
-
xdg = {
95
-
mime.enable = true;
96
-
icons.enable = true;
97
-
portal = {
98
-
enable = true;
99
-
wlr.enable = true;
100
-
extraPortals = with pkgs; [ xdg-desktop-portal-gtk ];
101
-
};
102
-
};
103
-
104
-
# These are set in two places at the moment, once here and once with home-manager.
105
-
# If the following issue is dealt with, I could get rid of the home-manager ones.
106
-
environment = {
107
-
loginShellInit = ''
108
-
if [ -e "/etc/profiles/per-user/$USER/etc/profile.d/hm-session-vars.sh" ]
109
-
then
110
-
. "/etc/profiles/per-user/$USER/etc/profile.d/hm-session-vars.sh"
111
-
fi
112
-
'';
113
-
pathsToLink = [
114
-
"/share/xsessions"
115
-
"/share/wayland-sessions"
116
-
];
117
-
# plasma5.excludePackages = with pkgs.plasma5Packages; [
118
-
# konsole
119
-
# oxygen
120
-
# pkgs.aha
121
-
# plasma-browser-integration
122
-
# qtvirtualkeyboard
123
-
# plasma-workspace-wallpapers
124
-
# ];
125
-
sessionVariables = {
126
-
XDG_CACHE_HOME = "$HOME/.app/cache";
127
-
XDG_CONFIG_HOME = "$HOME/.app/config";
128
-
XDG_DATA_HOME = "$HOME/.app/data";
129
-
XDG_STATE_HOME = "$HOME/.app/state";
130
-
};
131
-
};
132
-
133
-
users = {
134
-
groups.mou.gid = 1000;
135
-
users = {
136
-
root.hashedPasswordFile = config.sops.secrets."passwordHashes/root".path;
137
-
mou = {
138
-
isNormalUser = true;
139
-
group = "mou";
140
-
extraGroups = [
141
-
"gamemode"
142
-
"libvirtd"
143
-
"users"
144
-
"wheel"
145
-
];
146
-
shell = pkgs.loksh;
147
-
hashedPasswordFile = config.sops.secrets."passwordHashes/mou".path;
148
-
};
149
-
};
150
-
};
151
-
152
-
nix = {
153
-
optimise.automatic = true;
154
-
gc.automatic = true;
155
-
settings = {
156
-
auto-optimise-store = true;
157
-
experimental-features = [ "nix-command" "flakes" ];
158
-
use-xdg-base-directories = true;
159
-
};
160
-
};
161
-
162
-
# This option defines the first version of NixOS you have installed on this particular machine,
163
-
# and is used to maintain compatibility with application data (e.g. databases) created on older
164
-
# NixOS versions. Most users should NEVER change this value after the initial install, for any
165
-
# reason, even if you've upgraded your system to a new NixOS release. This value does NOT affect
166
-
# the Nixpkgs version your packages and OS are pulled from, so changing it will NOT upgrade your
167
-
# system. This value being lower than the current NixOS release does NOT mean your system is out
168
-
# of date, out of support, or vulnerable. Do NOT change this value unless you have manually
169
-
# inspected all the changes it would make to your configuration, and migrated your data
170
-
# accordingly. For more information, see `man configuration.nix` or
171
-
# https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
172
-
system.stateVersion = "24.05"; # Did you read the comment?
173
-
}
-95
lutea/hardware.nix
-95
lutea/hardware.nix
···
1
-
{ lib, pkgs, modulesPath, ... }:
2
-
3
-
{
4
-
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
5
-
6
-
boot = {
7
-
initrd = {
8
-
availableKernelModules = [
9
-
"xhci_pci"
10
-
"ahci"
11
-
"nvme"
12
-
"usbhid"
13
-
"usb_storage"
14
-
"sd_mod"
15
-
];
16
-
kernelModules = [ ];
17
-
};
18
-
kernel.sysctl = {
19
-
"vm.max_map_count" = 2147483642;
20
-
};
21
-
kernelModules = [ "kvm-intel" ];
22
-
kernelPackages = pkgs.linuxPackages_latest;
23
-
loader = {
24
-
efi.canTouchEfiVariables = true;
25
-
systemd-boot = {
26
-
consoleMode = "auto";
27
-
editor = false;
28
-
enable = true;
29
-
};
30
-
timeout = 0;
31
-
};
32
-
supportedFilesystems = [ "ntfs" ];
33
-
tmp.useTmpfs = true;
34
-
};
35
-
36
-
fileSystems = {
37
-
"/" = {
38
-
device = "UUID=e0b979fb-2c29-4e0b-910f-c89e4959c9a0";
39
-
fsType = "bcachefs";
40
-
};
41
-
"/boot" = {
42
-
device = "/dev/disk/by-uuid/862D-85DB";
43
-
fsType = "vfat";
44
-
options = [ "fmask=0077" "dmask=0077" "defaults" ];
45
-
};
46
-
47
-
# # Impermanence
48
-
# "/" = {
49
-
# device = "none";
50
-
# fsType = "tmpfs";
51
-
# options = [ "mode=755" ];
52
-
# };
53
-
# "/boot" = {
54
-
# device = "/dev/disk/by-uuid/862D-85DB";
55
-
# fsType = "vfat";
56
-
# options = [ "defaults" "fmask=0077" "dmask=0077" ];
57
-
# };
58
-
#"/nix" = {
59
-
# device = "UUID=e0b979fb-2c29-4e0b-910f-c89e4959c9a0";
60
-
# fsType = "bcachefs";
61
-
# options = [ "defaults" "X-mount.subdir=nix-store" ];
62
-
#};
63
-
#"/home-mou" = {
64
-
# device = "UUID=e0b979fb-2c29-4e0b-910f-c89e4959c9a0";
65
-
# fsType = "bcachefs";
66
-
# options = [ "defaults" "X-mount.subdir=home-mou" ];
67
-
# neededForBoot = true; # This has the decryption key
68
-
#};
69
-
#"/home/mou" = {
70
-
# device = "none";
71
-
# fsType = "tmpfs";
72
-
# options = [ "mode=750" "gid=1000" "uid=1000" ];
73
-
#};
74
-
};
75
-
76
-
hardware = {
77
-
enableRedistributableFirmware = true;
78
-
bluetooth = {
79
-
enable = true;
80
-
powerOnBoot = true;
81
-
};
82
-
cpu.intel.updateMicrocode = true;
83
-
uinput.enable = true;
84
-
opengl = {
85
-
enable = true;
86
-
driSupport = true;
87
-
driSupport32Bit = true;
88
-
extraPackages = with pkgs; [ intel-media-driver ];
89
-
};
90
-
};
91
-
92
-
powerManagement.cpuFreqGovernor = "performance";
93
-
networking.useDHCP = lib.mkDefault true;
94
-
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
95
-
}
-112
lutea/home.nix
-112
lutea/home.nix
···
1
-
{ config, lib, ... }:
2
-
{
3
-
home.username = "mou";
4
-
home.homeDirectory = "/home/${config.home.username}";
5
-
6
-
xdg = {
7
-
enable = true;
8
-
cacheHome = "${config.home.homeDirectory}/.app/cache";
9
-
configHome = "${config.home.homeDirectory}/.app/config";
10
-
dataHome = "${config.home.homeDirectory}/.app/data";
11
-
stateHome = "${config.home.homeDirectory}/.app/state";
12
-
userDirs = {
13
-
enable = true;
14
-
desktop = "${config.home.homeDirectory}/misc/.desktop";
15
-
documents = "${config.home.homeDirectory}/docs";
16
-
download = "${config.home.homeDirectory}/dls";
17
-
music = "${config.home.homeDirectory}/aud";
18
-
pictures = "${config.home.homeDirectory}/pics";
19
-
publicShare = "${config.home.homeDirectory}/misc/.public";
20
-
templates = "${config.home.homeDirectory}/misc/.templates";
21
-
videos = "${config.home.homeDirectory}/vids";
22
-
};
23
-
configFile = {
24
-
"autostart" = {
25
-
source = config.lib.file.mkOutOfStoreSymlink
26
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/autostart";
27
-
};
28
-
"foot" = {
29
-
source = config.lib.file.mkOutOfStoreSymlink
30
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/foot";
31
-
};
32
-
"gtk-3.0" = {
33
-
source = config.lib.file.mkOutOfStoreSymlink
34
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/gtk-3.0";
35
-
};
36
-
"kak" = {
37
-
source = config.lib.file.mkOutOfStoreSymlink
38
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/kak";
39
-
recursive = true;
40
-
};
41
-
"kak-lsp" = {
42
-
source = config.lib.file.mkOutOfStoreSymlink
43
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/kak-lsp";
44
-
};
45
-
"kanshi" = {
46
-
source = config.lib.file.mkOutOfStoreSymlink
47
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/kanshi";
48
-
};
49
-
"loksh" = {
50
-
source = config.lib.file.mkOutOfStoreSymlink
51
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/loksh";
52
-
};
53
-
"mpv" = {
54
-
source = config.lib.file.mkOutOfStoreSymlink
55
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/mpv";
56
-
};
57
-
"sway" = {
58
-
source = config.lib.file.mkOutOfStoreSymlink
59
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/sway";
60
-
};
61
-
"scr" = {
62
-
source = config.lib.file.mkOutOfStoreSymlink
63
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/scr";
64
-
};
65
-
"thm" = {
66
-
source = config.lib.file.mkOutOfStoreSymlink
67
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/thm";
68
-
};
69
-
"waybar" = {
70
-
source = config.lib.file.mkOutOfStoreSymlink
71
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/waybar";
72
-
};
73
-
"wayfire.ini" = {
74
-
source = config.lib.file.mkOutOfStoreSymlink
75
-
"${config.home.homeDirectory}/misc/repos/setup/data/configs/wayfire.ini";
76
-
};
77
-
};
78
-
};
79
-
80
-
fonts.fontconfig.enable = true;
81
-
# gtk = {
82
-
# enable = true;
83
-
# };
84
-
85
-
# home.pointerCursor = {
86
-
# package = pkgs.vanilla-dmz;
87
-
# name = "Vanilla-DMZ";
88
-
# gtk.enable = true;
89
-
# };
90
-
91
-
# Fix shell scripts to use full paths and then replace this
92
-
# Bring it back once we get a sessionPrependPath or something similar
93
-
# home.sessionPath = [ "${config.home.homeDirectory}/misc/exes" ];
94
-
home.sessionVariables = {
95
-
ENV = "${config.xdg.configHome}/loksh/rc";
96
-
HISTCONTROL = "ignoredups:ignorespace";
97
-
HISTFILE = "${config.xdg.cacheHome}/loksh_history";
98
-
PATH = "${config.home.homeDirectory}/misc/exes:$PATH";
99
-
SLURP_ARGS = "-b 00000040 -w 0";
100
-
XDG_DATA_DIRS = "${config.home.homeDirectory}/.app/data/flatpak/exports/share:$XDG_DATA_DIRS";
101
-
};
102
-
103
-
programs = {
104
-
git = {
105
-
enable = true;
106
-
userEmail = "yemou@butwho.xyz";
107
-
userName = "yemou";
108
-
};
109
-
};
110
-
111
-
home.stateVersion = "24.05";
112
-
}
-114
lutea/packages.nix
-114
lutea/packages.nix
···
1
-
{ lib, pkgs, yemou-scripts, ... }:
2
-
{
3
-
# nixpkgs.config.allowUnfree = true;
4
-
nixpkgs.config.allowUnfreePredicate = pkg:
5
-
builtins.elem (lib.getName pkg) [
6
-
"steam" # The steam flatpak doesn't work for my current setup (~/.var as a symlink)
7
-
"steam-original"
8
-
"steam-run"
9
-
"corefonts"
10
-
];
11
-
12
-
# nixpkgs.config.permittedInsecurePackages = [ ];
13
-
14
-
imports = [
15
-
../common/development
16
-
../common/editor.nix
17
-
../common/scripts
18
-
];
19
-
nixpkgs.overlays = [ yemou-scripts.overlays.default ];
20
-
21
-
# system.replaceRuntimeDependencies = [
22
-
# ({
23
-
# original = pkgs.mesa;
24
-
# replacement = nixpkgs-staging.legacyPackages.x86_64-linux.mesa;
25
-
# })
26
-
# ];
27
-
28
-
# System Packages
29
-
environment.systemPackages = with pkgs; [
30
-
git
31
-
htop
32
-
man-pages
33
-
man-pages-posix
34
-
];
35
-
36
-
# User Packages
37
-
users.users.mou.packages =
38
-
let
39
-
# Upstream this
40
-
ffmpegthumbnailerFixed = pkgs.ffmpegthumbnailer.overrideAttrs (finalAttrs: previousAttrs: {
41
-
postPatch = previousAttrs.postPatch + ''
42
-
substituteInPlace ./dist/ffmpegthumbnailer.thumbnailer \
43
-
--replace ffmpegthumbnailer $out/bin/ffmpegthumbnailer
44
-
'';
45
-
});
46
-
in
47
-
with pkgs; [
48
-
age
49
-
blender
50
-
chromium
51
-
clang-tools
52
-
dex
53
-
ffmpegthumbnailerFixed
54
-
foot
55
-
gnome.adwaita-icon-theme
56
-
gnome.nautilus
57
-
godot_4
58
-
inkscape
59
-
intel-gpu-tools
60
-
kak-lsp
61
-
kanshi
62
-
libnotify
63
-
lmms
64
-
lsof
65
-
magic-wormhole
66
-
mako
67
-
mpv
68
-
nethogs
69
-
nil
70
-
nixpkgs-fmt
71
-
openssh
72
-
pavucontrol # Are there pipewire specific tools for this?
73
-
piper
74
-
playerctl
75
-
pulseaudio # Are there pipewire specific tools for this?
76
-
rnnoise
77
-
rpcs3
78
-
shellcheck
79
-
sops
80
-
superTuxKart
81
-
swayidle
82
-
swaylock
83
-
syncthing
84
-
wl-clipboard
85
-
wlsunset
86
-
xdg-user-dirs
87
-
yemou-scripts.packages."x86_64-linux".default
88
-
];
89
-
90
-
programs = {
91
-
dconf.enable = true; # Move to home-manager?
92
-
firefox.enable = true; # Move to home-manager?
93
-
gamemode.enable = true;
94
-
gamescope = {
95
-
enable = true;
96
-
capSysNice = true;
97
-
};
98
-
steam.enable = true;
99
-
sway = {
100
-
enable = true;
101
-
extraPackages = lib.mkForce [ ];
102
-
};
103
-
virt-manager.enable = true;
104
-
wayfire = {
105
-
enable = true;
106
-
package = pkgs.wayfire-with-plugins;
107
-
plugins = with pkgs.wayfirePlugins; [
108
-
wayfire-plugins-extra
109
-
windecor
110
-
];
111
-
};
112
-
xwayland.enable = true;
113
-
};
114
-
}
-23
secrets/lutea.yaml
-23
secrets/lutea.yaml
···
1
-
passwordHashes:
2
-
mou: ENC[AES256_GCM,data:DrHL+dy8P4tT+qDXMAxc9d0IuZns5XBAut04eLdkqli9f78i2+7j4B9bmDUSpWePPXLngbTIjrV7S2+WDGlydbN1Uhuez+peRA==,iv:qHXBgvHiRJaWZkWrlT7Es0IfQs/qDfcv6RXoubHQEz0=,tag:XmTAICxNc6odQOjV5NIsNQ==,type:str]
3
-
root: ENC[AES256_GCM,data:nMgGToEB6f0LSQtAcHLwP7DNKv3qFA1NQaPvg7sCxJKW7W34nEtimtghWefbTOyrXsgMSmhZLsDVJ1kgyiet6dfllzB54UuEQg==,iv:bvJJMSI+dVPWB4CwHAH5Hg0DIxtg1xJTlwJVPdxlI8Q=,tag:/Tw4nPnqgsumsz4gxGPkZA==,type:str]
4
-
sops:
5
-
kms: []
6
-
gcp_kms: []
7
-
azure_kv: []
8
-
hc_vault: []
9
-
age:
10
-
- recipient: age1p55em5e3uk3fprj2mpum7ulrslcqgly63pjsyw2yv6hx99trdsnsvvv9ex
11
-
enc: |
12
-
-----BEGIN AGE ENCRYPTED FILE-----
13
-
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAydFlHRDJuWjVtK2F3Rlp6
14
-
ajVHZnFGZUltTTVRTTV5MlhuMkgvdHBvMWlnCnBjNHpwYjFmVytZLzFqWUtsQVg0
15
-
QmVaMFVJQldtYkdIcDBPeHUwRjVRaDQKLS0tIFFJK1I1NTloUm14Ni9YZEd4ci9N
16
-
ZWI2RWEwZllOUDRYV2tCNXZnZFpBS1kKYktM+w+tQbJMcmZBUpuKpeiioChqrWzd
17
-
FU4qWfJw3tEZKdTWECGYaQuCUQm7s+PJBc1HQlxd+eFm8YZMPwoa/Q==
18
-
-----END AGE ENCRYPTED FILE-----
19
-
lastmodified: "2024-02-02T07:22:22Z"
20
-
mac: ENC[AES256_GCM,data:c7v+ayXZLoNxsI7ikafEz54Xns9SyspUkk3GS/pX/MreQmrsugzorP3BtrOGf9rTCTCjwKCCp5DuLZA82tzw8go4VF5ezqzMTGr0CjONDL9XOesDF0pNaO9UjM6spDEpyT6pyFzEjYXsy7HoUn9lgi/f5Xt/mf32WwVw4oqPyHQ=,iv:IJSHrvMd6nRrbCrV9BnmBJ8hJInAVGi/L95Khyt7aGY=,tag:OUTrqQYvYSF3OehAkpKC2w==,type:str]
21
-
pgp: []
22
-
unencrypted_suffix: _unencrypted
23
-
version: 3.8.1