nix fmt rcf-style

This commit is contained in:
Vinzenz Schroeter 2024-10-27 12:33:35 +01:00
parent b78e40ad6a
commit b9adba3225
35 changed files with 270 additions and 238 deletions

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
imports = [ imports = [
./nixpkgs.nix ./nixpkgs.nix
./globalinstalls.nix ./globalinstalls.nix

View file

@ -1,7 +1,8 @@
{pkgs, ...}: { { pkgs, ... }:
{
config = { config = {
environment = { environment = {
pathsToLink = ["/share/zsh"]; pathsToLink = [ "/share/zsh" ];
systemPackages = with pkgs; [ systemPackages = with pkgs; [
ncdu ncdu
glances glances

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
config = { config = {
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";
i18n = { i18n = {

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
config = { config = {
services.openssh = { services.openssh = {
enable = true; enable = true;

View file

@ -1,12 +1,9 @@
{ config, lib, ... }:
{ {
config,
lib,
...
}: {
options.allowedUnfreePackages = lib.mkOption { options.allowedUnfreePackages = lib.mkOption {
type = lib.types.listOf lib.types.str; type = lib.types.listOf lib.types.str;
default = []; default = [ ];
example = ["steam"]; example = [ "steam" ];
}; };
config = { config = {
nixpkgs.config = { nixpkgs.config = {
@ -16,9 +13,15 @@
nix = { nix = {
settings = { settings = {
substituters = ["https://nix-community.cachix.org" "https://cache.nixos.org/"]; substituters = [
trusted-public-keys = ["nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="]; "https://nix-community.cachix.org"
experimental-features = ["nix-command" "flakes"]; "https://cache.nixos.org/"
];
trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" ];
experimental-features = [
"nix-command"
"flakes"
];
}; };
gc = { gc = {
automatic = true; automatic = true;

View file

@ -11,32 +11,41 @@
}; };
}; };
outputs = { outputs =
nixpkgs, {
home-manager, nixpkgs,
lix-module, home-manager,
... lix-module,
}: { ...
nixosConfigurations = let }:
host-params = { {
inherit nixpkgs; nixosConfigurations =
inherit home-manager; let
inherit lix-module; host-params = {
common-modules = [ inherit nixpkgs;
lix-module.nixosModules.default inherit home-manager;
./common inherit lix-module;
]; common-modules = [
desktop-modules = [ lix-module.nixosModules.default
home-manager.nixosModules.home-manager ./common
./home ];
./modules/desktop-environment.nix desktop-modules = [
./modules/desktop-hardware.nix home-manager.nixosModules.home-manager
]; ./home
./modules/desktop-environment.nix
./modules/desktop-hardware.nix
];
};
in
{
vinzenz-lpt2 = import ./hosts/vinzenz-lpt2 host-params;
vinzenz-pc2 = import ./hosts/vinzenz-pc2 host-params;
hetzner-vpn1 = import ./hosts/hetzner-vpn1 host-params;
};
formatter = {
x86_64-linux = nixpkgs.legacyPackages.x86_64-linux.nixfmt-rfc-style;
aarch64-linux = nixpkgs.legacyPackages.aarch64-linux.nixfmt-rfc-style;
}; };
in {
vinzenz-lpt2 = import ./hosts/vinzenz-lpt2 host-params;
vinzenz-pc2 = import ./hosts/vinzenz-pc2 host-params;
hetzner-vpn1 = import ./hosts/hetzner-vpn1 host-params;
}; };
};
} }

View file

@ -1,4 +1,5 @@
{config, ...}: { { config, ... }:
{
config = { config = {
home-manager = { home-manager = {
useGlobalPkgs = true; useGlobalPkgs = true;

View file

@ -20,7 +20,7 @@
}; };
"org/gnome/shell" = { "org/gnome/shell" = {
disable-user-extensions = false; disable-user-extensions = false;
disabled-extensions = []; disabled-extensions = [ ];
enabled-extensions = [ enabled-extensions = [
"appindicatorsupport@rgcjonas.gmail.com" "appindicatorsupport@rgcjonas.gmail.com"
"workspace-indicator@gnome-shell-extensions.gcampax.github.com" "workspace-indicator@gnome-shell-extensions.gcampax.github.com"
@ -34,9 +34,9 @@
show-warning = false; show-warning = false;
}; };
"org/gnome/desktop/wm/keybindings" = { "org/gnome/desktop/wm/keybindings" = {
switch-windows = ["<Alt>Tab"]; switch-windows = [ "<Alt>Tab" ];
switch-windows-backward = ["<Shift><Alt>Tab"]; switch-windows-backward = [ "<Shift><Alt>Tab" ];
switch-applications = ["<Super>Tab"]; switch-applications = [ "<Super>Tab" ];
switch-applications-backward = ["<Shift><Super>Tab"]; switch-applications-backward = [ "<Shift><Super>Tab" ];
}; };
} }

View file

@ -1,15 +1,11 @@
{ config, pkgs, ... }:
{ {
config, imports = [ ../modules/gnome.nix ];
pkgs,
...
}: {
imports = [
../modules/gnome.nix
];
config = { config = {
home-manager.sharedModules = [ home-manager.sharedModules = [
{ {
home.packages = with pkgs; home.packages =
with pkgs;
[ [
amberol amberol
gitg gitg
@ -48,14 +44,8 @@
} }
{ {
home.packages = with pkgs; home.packages = with pkgs; [ trayscale ] ++ (with gnomeExtensions; [ tailscale-qs ]);
[ dconf.settings."org/gnome/shell".enabled-extensions = [ "tailscale@joaophi.github.com" ];
trayscale
]
++ (with gnomeExtensions; [
tailscale-qs
]);
dconf.settings."org/gnome/shell".enabled-extensions = ["tailscale@joaophi.github.com"];
} }
]; ];
}; };

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
home.packages = with pkgs; [ home.packages = with pkgs; [
## Apps ## Apps
telegram-desktop telegram-desktop
@ -22,7 +19,11 @@
oh-my-zsh = { oh-my-zsh = {
enable = true; enable = true;
theme = "agnoster"; theme = "agnoster";
plugins = ["git" "sudo" "systemadmin"]; plugins = [
"git"
"sudo"
"systemadmin"
];
}; };
}; };

View file

@ -1,8 +1,6 @@
[ [
# set stateVersion # set stateVersion
{ { home.stateVersion = "22.11"; }
home.stateVersion = "22.11";
}
# make nano the default editor # make nano the default editor
{ {
home = { home = {

View file

@ -1,4 +1,5 @@
inputs @ {pkgs, ...}: { inputs@{ pkgs, ... }:
{
programs = { programs = {
home-manager.enable = true; home-manager.enable = true;
fzf.enable = true; fzf.enable = true;

View file

@ -1,4 +1,5 @@
{pkgs, ...}: { { pkgs, ... }:
{
enable = true; enable = true;
package = pkgs.vscodium; package = pkgs.vscodium;
enableUpdateCheck = false; enableUpdateCheck = false;

View file

@ -1,4 +1,5 @@
{config, ...}: { { config, ... }:
{
initExtra = '' initExtra = ''
eval "$(direnv hook zsh)"; eval "$(direnv hook zsh)";
export PATH=$PATH:/home/vinzenz/.cargo/bin export PATH=$PATH:/home/vinzenz/.cargo/bin
@ -24,6 +25,11 @@
oh-my-zsh = { oh-my-zsh = {
enable = true; enable = true;
theme = "agnoster"; theme = "agnoster";
plugins = ["git" "sudo" "docker" "systemadmin"]; plugins = [
"git"
"sudo"
"docker"
"systemadmin"
];
}; };
} }

View file

@ -1,42 +1,34 @@
{ { nixpkgs, common-modules, ... }:
nixpkgs,
common-modules,
...
}:
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
system = "aarch64-linux"; system = "aarch64-linux";
modules = modules = common-modules ++ [
common-modules ./hardware.nix
++ [ ./nginx.nix
./hardware.nix ../../users/vinzenz.nix
./nginx.nix ../../users/ronja.nix
../../users/vinzenz.nix { networking.hostName = "hetzner-vpn1"; }
../../users/ronja.nix {
{ # uncomment for build check on non arm system (requires --impure)
networking.hostName = "hetzner-vpn1"; # nixpkgs.buildPlatform = builtins.currentSystem;
} }
{ {
# uncomment for build check on non arm system (requires --impure) users.users = {
# nixpkgs.buildPlatform = builtins.currentSystem; root.openssh.authorizedKeys.keys = [
} ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICdYqY3Y1/f1bsAi5Qfyr/UWuX9ixu96IeAlhoQaJkbf''
{ ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCJUpbpB3KEKVoKWsKoar9J4RNah8gmQoSH6jQEw5dY vinzenz-pixel-JuiceSSH''
users.users = { ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO1CRn4yYTL4XUdCebE8Z4ZeuMujBjorTdWifg911EOv vinzenz-pc2 home roaming''
root.openssh.authorizedKeys.keys = [ ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDNpLDmctyqGpow/ElQvdhY4BLBPS/sigDJ1QEcC7wC vinzenz-lpt2-roaming''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICdYqY3Y1/f1bsAi5Qfyr/UWuX9ixu96IeAlhoQaJkbf'' ];
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCJUpbpB3KEKVoKWsKoar9J4RNah8gmQoSH6jQEw5dY vinzenz-pixel-JuiceSSH'' vinzenz.openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO1CRn4yYTL4XUdCebE8Z4ZeuMujBjorTdWifg911EOv vinzenz-pc2 home roaming'' ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICdYqY3Y1/f1bsAi5Qfyr/UWuX9ixu96IeAlhoQaJkbf''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDNpLDmctyqGpow/ElQvdhY4BLBPS/sigDJ1QEcC7wC vinzenz-lpt2-roaming'' ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCJUpbpB3KEKVoKWsKoar9J4RNah8gmQoSH6jQEw5dY vinzenz-pixel-JuiceSSH''
]; ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO1CRn4yYTL4XUdCebE8Z4ZeuMujBjorTdWifg911EOv vinzenz-pc2 home roaming''
vinzenz.openssh.authorizedKeys.keys = [ ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDNpLDmctyqGpow/ElQvdhY4BLBPS/sigDJ1QEcC7wC vinzenz-lpt2-roaming''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICdYqY3Y1/f1bsAi5Qfyr/UWuX9ixu96IeAlhoQaJkbf'' ];
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCJUpbpB3KEKVoKWsKoar9J4RNah8gmQoSH6jQEw5dY vinzenz-pixel-JuiceSSH'' ronja.openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO1CRn4yYTL4XUdCebE8Z4ZeuMujBjorTdWifg911EOv vinzenz-pc2 home roaming'' ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIALWKm+d6KL6Vl3grPOcGouiNTkvdhXuWJmcrdEBY2nw ronja-ssh-host-key''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDNpLDmctyqGpow/ElQvdhY4BLBPS/sigDJ1QEcC7wC vinzenz-lpt2-roaming'' ];
]; };
ronja.openssh.authorizedKeys.keys = [ }
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIALWKm+d6KL6Vl3grPOcGouiNTkvdhXuWJmcrdEBY2nw ronja-ssh-host-key'' ];
];
};
}
];
} }

View file

@ -1,11 +1,6 @@
{ lib, modulesPath, ... }:
{ {
lib, imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
modulesPath,
...
}: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
config = { config = {
nixpkgs = { nixpkgs = {
@ -26,8 +21,12 @@
}; };
}; };
initrd = { initrd = {
availableKernelModules = ["ata_piix" "uhci_hcd" "xen_blkfront"]; availableKernelModules = [
kernelModules = ["nvme"]; "ata_piix"
"uhci_hcd"
"xen_blkfront"
];
kernelModules = [ "nvme" ];
}; };
}; };
@ -48,7 +47,7 @@
# This file was populated at runtime with the networking # This file was populated at runtime with the networking
# details gathered from the active system. # details gathered from the active system.
networking = { networking = {
nameservers = ["8.8.8.8"]; nameservers = [ "8.8.8.8" ];
defaultGateway = "172.31.1.1"; defaultGateway = "172.31.1.1";
defaultGateway6 = { defaultGateway6 = {
address = "fe80::1"; address = "fe80::1";

View file

@ -1,8 +1,5 @@
{ pkgs, lib, ... }:
{ {
pkgs,
lib,
...
}: {
security.acme = { security.acme = {
acceptTerms = true; acceptTerms = true;
defaults.email = "acme@zerforschen.plus"; defaults.email = "acme@zerforschen.plus";
@ -10,46 +7,51 @@
security.pam.services.nginx.setEnvironment = false; security.pam.services.nginx.setEnvironment = false;
systemd.services.nginx.serviceConfig = { systemd.services.nginx.serviceConfig = {
SupplementaryGroups = ["shadow"]; SupplementaryGroups = [ "shadow" ];
}; };
services.nginx = { services.nginx = {
enable = true; enable = true;
additionalModules = [pkgs.nginxModules.pam]; additionalModules = [ pkgs.nginxModules.pam ];
recommendedProxySettings = true; recommendedProxySettings = true;
recommendedTlsSettings = true; recommendedTlsSettings = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;
virtualHosts = let virtualHosts =
servicesDomain = "services.zerforschen.plus"; let
mkServiceConfig = host: port: { servicesDomain = "services.zerforschen.plus";
addSSL = true; mkServiceConfig = host: port: {
enableACME = true; addSSL = true;
locations."/" = { enableACME = true;
proxyPass = "http://${host}:${toString port}/"; locations."/" = {
extraConfig = '' proxyPass = "http://${host}:${toString port}/";
# bind to tailscale ip extraConfig = ''
proxy_bind 100.88.118.60; # bind to tailscale ip
# pam auth proxy_bind 100.88.118.60;
limit_except OPTIONS { # pam auth
auth_pam "Password Required"; limit_except OPTIONS {
auth_pam_service_name "nginx"; auth_pam "Password Required";
} auth_pam_service_name "nginx";
''; }
'';
};
}; };
pc2 = "vinzenz-pc2.donkey-pentatonic.ts.net";
in
{
"vscode.${servicesDomain}" = lib.mkMerge [
(mkServiceConfig pc2 8542)
{ locations."/".proxyWebsockets = true; }
];
"preon-app.${servicesDomain}" = mkServiceConfig pc2 8543;
"preon-api.${servicesDomain}" = mkServiceConfig pc2 8544;
}; };
pc2 = "vinzenz-pc2.donkey-pentatonic.ts.net";
in {
"vscode.${servicesDomain}" = lib.mkMerge [
(mkServiceConfig pc2 8542)
{locations."/" .proxyWebsockets = true;}
];
"preon-app.${servicesDomain}" = mkServiceConfig pc2 8543;
"preon-api.${servicesDomain}" = mkServiceConfig pc2 8544;
};
}; };
networking.firewall.allowedTCPPorts = [80 443]; networking.firewall.allowedTCPPorts = [
80
443
];
} }

View file

@ -23,7 +23,7 @@ nixpkgs.lib.nixosSystem {
{ {
networking.hostName = "vinzenz-lpt2"; networking.hostName = "vinzenz-lpt2";
nix.settings.extra-platforms = ["aarch64-linux"]; nix.settings.extra-platforms = [ "aarch64-linux" ];
} }
{ {

View file

@ -1,10 +1,9 @@
{lib, ...}: { { lib, ... }:
imports = [ {
../../modules/intel-graphics.nix imports = [ ../../modules/intel-graphics.nix ];
];
config = { config = {
# intel cpu # intel cpu
boot.kernelModules = ["kvm-intel"]; boot.kernelModules = [ "kvm-intel" ];
hardware.cpu.intel.updateMicrocode = true; hardware.cpu.intel.updateMicrocode = true;
boot.loader = { boot.loader = {
@ -23,7 +22,11 @@
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
boot.initrd = { boot.initrd = {
availableKernelModules = ["xhci_pci" "thunderbolt" "nvme"]; availableKernelModules = [
"xhci_pci"
"thunderbolt"
"nvme"
];
luks.devices = { luks.devices = {
"luks-2c654ff2-3c42-48d3-a1e3-9545679afaa3" = { "luks-2c654ff2-3c42-48d3-a1e3-9545679afaa3" = {
device = "/dev/disk/by-uuid/2c654ff2-3c42-48d3-a1e3-9545679afaa3"; device = "/dev/disk/by-uuid/2c654ff2-3c42-48d3-a1e3-9545679afaa3";
@ -35,7 +38,7 @@
"/" = { "/" = {
device = "/dev/disk/by-uuid/e4dad0c8-26a1-45e9-bbd9-48565eb6574e"; device = "/dev/disk/by-uuid/e4dad0c8-26a1-45e9-bbd9-48565eb6574e";
fsType = "btrfs"; fsType = "btrfs";
options = ["subvol=@"]; options = [ "subvol=@" ];
}; };
"/boot" = { "/boot" = {

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
services.nginx = { services.nginx = {
enable = true; enable = true;
@ -14,13 +15,17 @@
proxyWebsockets = true; proxyWebsockets = true;
}; };
serverAliases = ["172.23.42.96"]; serverAliases = [ "172.23.42.96" ];
}; };
}; };
}; };
networking.firewall = { networking.firewall = {
allowedTCPPorts = [80 8001 3000]; allowedTCPPorts = [
allowedUDPPorts = [2342]; 80
8001
3000
];
allowedUDPPorts = [ 2342 ];
}; };
} }

View file

@ -19,9 +19,7 @@ nixpkgs.lib.nixosSystem {
../../modules/gaming.nix ../../modules/gaming.nix
../../modules/printing.nix ../../modules/printing.nix
../../modules/podman.nix ../../modules/podman.nix
{ { networking.hostName = "vinzenz-pc2"; }
networking.hostName = "vinzenz-pc2";
}
{ {
home-manager.users = { home-manager.users = {
vinzenz = import ../../home/vinzenz; vinzenz = import ../../home/vinzenz;

View file

@ -2,19 +2,19 @@
"/" = { "/" = {
device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8"; device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8";
fsType = "btrfs"; fsType = "btrfs";
options = ["subvol=@"]; options = [ "subvol=@" ];
}; };
"/home" = { "/home" = {
device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8"; device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8";
fsType = "btrfs"; fsType = "btrfs";
options = ["subvol=@home"]; options = [ "subvol=@home" ];
}; };
"/games" = { "/games" = {
device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8"; device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8";
fsType = "btrfs"; fsType = "btrfs";
options = ["subvol=@games"]; options = [ "subvol=@games" ];
}; };
"/boot" = { "/boot" = {
@ -27,7 +27,7 @@
# this is convenient for managing the flat subvolume hierarchy # this is convenient for managing the flat subvolume hierarchy
device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8"; device = "/dev/disk/by-uuid/0e9c983a-e733-447e-8181-f41d6670c4b8";
fsType = "btrfs"; fsType = "btrfs";
options = ["subvolid=5"]; options = [ "subvolid=5" ];
}; };
"/mnt/ssd2" = { "/mnt/ssd2" = {

View file

@ -1,19 +1,24 @@
{...}: { { ... }:
imports = [ {
../../modules/amd-graphics.nix imports = [ ../../modules/amd-graphics.nix ];
];
config = { config = {
# amd cpu # amd cpu
boot.kernelModules = ["kvm-amd"]; boot.kernelModules = [ "kvm-amd" ];
hardware.cpu.amd.updateMicrocode = true; hardware.cpu.amd.updateMicrocode = true;
boot = { boot = {
initrd.availableKernelModules = ["nvme" "xhci_pci" "ahci" "usbhid" "sd_mod"]; # "usb_storage" initrd.availableKernelModules = [
"nvme"
"xhci_pci"
"ahci"
"usbhid"
"sd_mod"
]; # "usb_storage"
loader.efi.efiSysMountPoint = "/boot"; loader.efi.efiSysMountPoint = "/boot";
}; };
fileSystems = import ./fstab.nix; fileSystems = import ./fstab.nix;
swapDevices = []; swapDevices = [ ];
networking.interfaces.eno1.wakeOnLan.enable = true; networking.interfaces.eno1.wakeOnLan.enable = true;
}; };

View file

@ -1,16 +1,27 @@
{pkgs, ...}: { { pkgs, ... }:
{
services.openvscode-server = { services.openvscode-server = {
enable = true; enable = true;
telemetryLevel = "off"; telemetryLevel = "off";
port = 8542; port = 8542;
host = "100.125.93.127"; # tailscale host = "100.125.93.127"; # tailscale
withoutConnectionToken = true; withoutConnectionToken = true;
extraPackages = with pkgs; [nodejs git gh direnv]; extraPackages = with pkgs; [
nodejs
git
gh
direnv
];
}; };
networking = { networking = {
firewall = { firewall = {
allowedTCPPorts = [8542 8543 8544 80]; allowedTCPPorts = [
8542
8543
8544
80
];
}; };
}; };
} }

View file

@ -1,22 +1,14 @@
{ pkgs, ... }:
{ {
pkgs,
...
}: {
config = { config = {
boot.kernelModules = ["amdgpu"]; boot.kernelModules = [ "amdgpu" ];
services.xserver.videoDrivers = ["amdgpu"]; services.xserver.videoDrivers = [ "amdgpu" ];
hardware.opengl = { hardware.opengl = {
extraPackages = with pkgs; [ extraPackages = with pkgs; [ amdvlk ];
amdvlk extraPackages32 = with pkgs; [ driversi686Linux.amdvlk ];
];
extraPackages32 = with pkgs; [
driversi686Linux.amdvlk
];
}; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [ nvtopPackages.amd ];
nvtopPackages.amd
];
}; };
} }

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
config = { config = {
services = { services = {
xserver.enable = true; xserver.enable = true;
@ -31,7 +28,10 @@
kdeconnect.enable = true; kdeconnect.enable = true;
firefox = { firefox = {
enable = true; enable = true;
languagePacks = ["en-US" "de"]; languagePacks = [
"en-US"
"de"
];
}; };
nix-ld = { nix-ld = {
enable = true; enable = true;
@ -101,10 +101,8 @@
fonts = { fonts = {
enableDefaultPackages = true; enableDefaultPackages = true;
fontconfig.defaultFonts.monospace = ["FiraCode Nerd Font"]; fontconfig.defaultFonts.monospace = [ "FiraCode Nerd Font" ];
packages = with pkgs; [ packages = with pkgs; [ (nerdfonts.override { fonts = [ "FiraCode" ]; }) ];
(nerdfonts.override {fonts = ["FiraCode"];})
];
}; };
hardware.logitech.wireless = { hardware.logitech.wireless = {

View file

@ -3,13 +3,17 @@
pkgs, pkgs,
config, config,
... ...
}: { }:
{
config = { config = {
boot = { boot = {
kernelPackages = pkgs.linuxPackages_zen; kernelPackages = pkgs.linuxPackages_zen;
kernelParams = ["quiet" "udev.log_level=3"]; kernelParams = [
supportedFilesystems = ["btrfs"]; "quiet"
initrd.supportedFilesystems = ["btrfs"]; "udev.log_level=3"
];
supportedFilesystems = [ "btrfs" ];
initrd.supportedFilesystems = [ "btrfs" ];
consoleLogLevel = 0; consoleLogLevel = 0;
initrd.verbose = false; initrd.verbose = false;
plymouth.enable = true; plymouth.enable = true;

View file

@ -1,15 +1,12 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
config = { config = {
hardware = { hardware = {
opengl = { opengl = {
driSupport = true; driSupport = true;
driSupport32Bit = true; driSupport32Bit = true;
extraPackages = with pkgs; [mangohud]; extraPackages = with pkgs; [ mangohud ];
extraPackages32 = with pkgs; [mangohud]; extraPackages32 = with pkgs; [ mangohud ];
}; };
steam-hardware.enable = true; steam-hardware.enable = true;

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
config = { config = {
services = { services = {
xserver = { xserver = {
@ -41,9 +38,12 @@
pkgs.gnome-tour pkgs.gnome-tour
]; ];
environment.systemPackages = with pkgs; [gnome.ghex impression]; environment.systemPackages = with pkgs; [
gnome.ghex
impression
];
# RDP connections # RDP connections
networking.firewall.allowedTCPPorts = [3389]; networking.firewall.allowedTCPPorts = [ 3389 ];
}; };
} }

View file

@ -1,8 +1,5 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
config = { config = {
hardware.opengl = { hardware.opengl = {
extraPackages = with pkgs; [ extraPackages = with pkgs; [
@ -19,9 +16,7 @@
libvdpau-va-gl libvdpau-va-gl
]; ];
}; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [ nvtopPackages.intel ];
nvtopPackages.intel allowedUnfreePackages = [ "intel-ocl" ];
];
allowedUnfreePackages = ["intel-ocl"];
}; };
} }

View file

@ -1,4 +1,5 @@
{pkgs, ...}: { { pkgs, ... }:
{
config = { config = {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
fontconfig fontconfig

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
virtualisation = { virtualisation = {
containers.enable = true; containers.enable = true;
podman = { podman = {

View file

@ -1,4 +1,5 @@
{...}: { { ... }:
{
config = { config = {
services = { services = {
# Enable CUPS to print documents. # Enable CUPS to print documents.

View file

@ -1,4 +1,5 @@
{pkgs, ...}: { { pkgs, ... }:
{
config = { config = {
# Define user account # Define user account
users.users.ronja = { users.users.ronja = {
@ -6,7 +7,12 @@
name = "ronja"; name = "ronja";
description = "Ronja"; description = "Ronja";
home = "/home/ronja"; home = "/home/ronja";
extraGroups = ["networkmanager" "wheel" "games" "podman"]; extraGroups = [
"networkmanager"
"wheel"
"games"
"podman"
];
shell = pkgs.zsh; shell = pkgs.zsh;
}; };
}; };

View file

@ -1,11 +1,19 @@
{pkgs, ...}: { { pkgs, ... }:
{
config = { config = {
users.users.vinzenz = { users.users.vinzenz = {
isNormalUser = true; isNormalUser = true;
name = "vinzenz"; name = "vinzenz";
description = "Vinzenz"; description = "Vinzenz";
home = "/home/vinzenz"; home = "/home/vinzenz";
extraGroups = ["networkmanager" "wheel" "games" "dialout" "podman" "nginx"]; extraGroups = [
"networkmanager"
"wheel"
"games"
"dialout"
"podman"
"nginx"
];
shell = pkgs.zsh; shell = pkgs.zsh;
autoSubUidGidRange = true; autoSubUidGidRange = true;
}; };