Compare commits

...

6 commits

11 changed files with 62 additions and 62 deletions

16
flake.lock generated
View file

@ -124,16 +124,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1700392168, "lastModified": 1700814205,
"narHash": "sha256-v5LprEFx3u4+1vmds9K0/i7sHjT0IYGs7u9v54iz/OA=", "narHash": "sha256-lWqDPKHRbQfi+zNIivf031BUeyciVOtwCwTjyrhDB5g=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "28535c3a34d79071f2ccb68671971ce0c0984d7e", "rev": "aeb2232d7a32530d3448318790534d196bf9427a",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-23.05", "ref": "release-23.11",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
@ -270,16 +270,16 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1700989516, "lastModified": 1701263465,
"narHash": "sha256-oKbmPa2wpTHh9XB3+zIx97uMZGNnp97GPliKKG2/plo=", "narHash": "sha256-lNXUIlkfyDyp9Ox21hr+wsEf/IBklLvb6bYcyeXbdRc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d2e4de209881b38392933fabf303cde3454b0b4c", "rev": "50aa30a13c4ab5e7ba282da460a3e3d44e9d0eb3",
"type": "github" "type": "github"
}, },
"original": { "original": {
"id": "nixpkgs", "id": "nixpkgs",
"ref": "nixos-23.05", "ref": "nixos-23.11",
"type": "indirect" "type": "indirect"
} }
}, },

View file

@ -2,7 +2,7 @@
description = "Configuration for Everest"; description = "Configuration for Everest";
inputs = { inputs = {
nixpkgs.url = "nixpkgs/nixos-23.05"; nixpkgs.url = "nixpkgs/nixos-23.11";
nixpkgs-unstable.url = "nixpkgs/nixos-unstable"; nixpkgs-unstable.url = "nixpkgs/nixos-unstable";
agenix = { agenix = {
@ -14,7 +14,7 @@
}; };
home-manager = { home-manager = {
url = "github:nix-community/home-manager/release-23.05"; url = "github:nix-community/home-manager/release-23.11";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };

View file

@ -28,7 +28,11 @@
prefixLength = 24; prefixLength = 24;
} ]; } ];
}; };
defaultGateway = "192.168.0.1"; # I use networkd, so I need to declare the interface for the default gateway
defaultGateway = {
address = "192.168.0.1";
interface = "eno1";
};
nameservers = [ "8.8.8.8" ]; nameservers = [ "8.8.8.8" ];
}; };

View file

@ -69,7 +69,7 @@
useGlobalPkgs = true; useGlobalPkgs = true;
verbose = true; verbose = true;
users.toast = { config, ... }: { users.toast = { config, ... }: {
home.stateVersion = "23.05"; home.stateVersion = "23.11";
xdg = { xdg = {
userDirs = { userDirs = {
enable = true; enable = true;
@ -100,7 +100,7 @@
*/ */
system = { system = {
stateVersion = "23.05"; stateVersion = "23.11";
# Nix on nixos 23.05 does not have dirtyRev # Nix on nixos 23.05 does not have dirtyRev
configurationRevision = flakeSelf.sourceInfo.rev or flakeSelf.sourceInfo.dirtyRev or "dirty"; configurationRevision = flakeSelf.sourceInfo.rev or flakeSelf.sourceInfo.dirtyRev or "dirty";
nixos.variant_id = lib.strings.toLower config.networking.hostName; nixos.variant_id = lib.strings.toLower config.networking.hostName;

View file

@ -1,17 +1,5 @@
{ config, pkgs, ... }: { config, pkgs, ... }:
let
# Home manager on 23.05 doesn't understand the new format, so I'll use the old one until 23.11 becomes stable
newformat = {
src = pkgs.fetchFromGitHub {
owner = "catppuccin";
repo = "bat";
rev = "master";
hash = "sha256-6WVKQErGdaqb++oaXnY3i6/GuH2FhTgK0v4TN4Y0Wbw=";
};
file = "Catppuccin-mocha.tmTheme";
};
oldformat = builtins.readFile (newformat.src + "/${newformat.file}");
in
{ {
home-manager = { home-manager = {
users.toast.programs.bat = { users.toast.programs.bat = {
@ -20,7 +8,15 @@ in
theme = "catppuccin-mocha"; theme = "catppuccin-mocha";
}; };
themes = { themes = {
catppuccin-mocha = oldformat; catppuccin-mocha = {
src = pkgs.fetchFromGitHub {
owner = "catppuccin";
repo = "bat";
rev = "master";
hash = "sha256-6WVKQErGdaqb++oaXnY3i6/GuH2FhTgK0v4TN4Y0Wbw=";
};
file = "Catppuccin-mocha.tmTheme";
};
}; };
}; };
}; };

View file

@ -5,11 +5,10 @@
overrideDevices = true; overrideDevices = true;
overrideFolders = true; overrideFolders = true;
openDefaultPorts = true; openDefaultPorts = true;
extraOptions = { settings = {
options = { options = {
urAccepted = 3; urAccepted = 3;
}; };
};
# Set up devices and folders common to every device # Set up devices and folders common to every device
devices = { devices = {
"phone" = { "phone" = {
@ -41,4 +40,5 @@
}; };
}; };
}; };
};
} }

View file

@ -9,7 +9,7 @@
users.users.toast.extraGroups = [ "scanner" ]; users.users.toast.extraGroups = [ "scanner" ];
# Set up fonts # Set up fonts
fonts.fonts = [ fonts.packages = [
( pkgs.nerdfonts.override { fonts = [ "Hack" "JetBrainsMono" ]; } ) ( pkgs.nerdfonts.override { fonts = [ "Hack" "JetBrainsMono" ]; } )
]; ];

View file

@ -6,7 +6,7 @@
user = "toast"; user = "toast";
group = "users"; group = "users";
dataDir = config.users.users.toast.home; dataDir = config.users.users.toast.home;
folders."passwords".path = "~/Documents/Passwords"; settings.folders."passwords".path = "~/Documents/Passwords";
}; };
# Allow regular users to stop syncthing # Allow regular users to stop syncthing
# https://stackoverflow.com/questions/61480914/using-policykit-to-allow-non-root-users-to-start-and-stop-a-service # https://stackoverflow.com/questions/61480914/using-policykit-to-allow-non-root-users-to-start-and-stop-a-service

View file

@ -6,7 +6,7 @@
TODO: turn this into a module eventually TODO: turn this into a module eventually
*/ */
services.syncthing.folders = { services.syncthing.settings.folders = {
"steam-201810" = { "steam-201810" = {
label = "Wolfenstein The New Order Saves"; label = "Wolfenstein The New Order Saves";
id = "laxxf-t2wmy"; id = "laxxf-t2wmy";

View file

@ -1,7 +1,7 @@
{ config, ... }: { config, ... }:
{ {
services.syncthing.folders = { services.syncthing.settings.folders = {
"school-things" = { "school-things" = {
label = "School things"; label = "School things";
id = "z6alc-nfoqr"; id = "z6alc-nfoqr";

View file

@ -11,7 +11,7 @@
key = config.age.secrets.syncthingKey.path; key = config.age.secrets.syncthingKey.path;
cert = config.age.secrets.syncthingCert.path; cert = config.age.secrets.syncthingCert.path;
guiAddress = "0.0.0.0:8384"; guiAddress = "0.0.0.0:8384";
folders = { settings.folders = {
"passwords" = { "passwords" = {
path = "${config.services.syncthing.dataDir}/passwords"; path = "${config.services.syncthing.dataDir}/passwords";
}; };