aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorZhongheng Liu <z.liu@outlook.com.gr>2024-10-06 11:00:48 +0300
committerZhongheng Liu <z.liu@outlook.com.gr>2024-10-06 11:00:48 +0300
commit9975cd7d64587b349fc4f6825c197da9b74823e4 (patch)
treedf9ac4dd0985355f239c60d520750e05e1fca38e
parent1c5f8de4128f2bd40cfb7e1819245ded786f6453 (diff)
downloadnixos-configuration-9975cd7d64587b349fc4f6825c197da9b74823e4.tar.gz
nixos-configuration-9975cd7d64587b349fc4f6825c197da9b74823e4.tar.bz2
nixos-configuration-9975cd7d64587b349fc4f6825c197da9b74823e4.zip
chore: fmt and bump lock
-rw-r--r--flake.lock54
-rw-r--r--nixos/configuration.nix32
2 files changed, 44 insertions, 42 deletions
diff --git a/flake.lock b/flake.lock
index d885d09..117d25d 100644
--- a/flake.lock
+++ b/flake.lock
@@ -259,11 +259,11 @@
]
},
"locked": {
- "lastModified": 1727805723,
- "narHash": "sha256-b8flytpuc4Ey/g3mcvpS/ICORcD4h56QDZeP5LogevY=",
+ "lastModified": 1728092656,
+ "narHash": "sha256-eMeCTJZ5xBeQ0f9Os7K8DThNVSo9gy4umZLDfF5q6OM=",
"owner": "cachix",
"repo": "git-hooks.nix",
- "rev": "2f5ae3fc91db865eff2c5a418da85a0fbe6238a3",
+ "rev": "1211305a5b237771e13fcca0c51e60ad47326a9a",
"type": "github"
},
"original": {
@@ -318,11 +318,11 @@
]
},
"locked": {
- "lastModified": 1727817100,
- "narHash": "sha256-dlyV9/eiWkm/Y/t2+k4CFZ29tBvCANmJogEYaHeAOTw=",
+ "lastModified": 1728041527,
+ "narHash": "sha256-03liqiJtk9UP7YQHW4r8MduKCK242FQzud8iWvvlK+o=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "437ec62009fa8ceb684eb447d455ffba25911cf9",
+ "rev": "509dbf8d45606b618e9ec3bbe4e936b7c5bc6c1e",
"type": "github"
},
"original": {
@@ -339,11 +339,11 @@
]
},
"locked": {
- "lastModified": 1727383923,
- "narHash": "sha256-4/vacp3CwdGoPf8U4e/N8OsGYtO09WTcQK5FqYfJbKs=",
+ "lastModified": 1728041527,
+ "narHash": "sha256-03liqiJtk9UP7YQHW4r8MduKCK242FQzud8iWvvlK+o=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "ffe2d07e771580a005e675108212597e5b367d2d",
+ "rev": "509dbf8d45606b618e9ec3bbe4e936b7c5bc6c1e",
"type": "github"
},
"original": {
@@ -416,11 +416,11 @@
]
},
"locked": {
- "lastModified": 1727707210,
- "narHash": "sha256-8XZp5XO2FC6INZEZ2WlwErtvFVpl45ACn8CJ2hfTA0Y=",
+ "lastModified": 1727999297,
+ "narHash": "sha256-LTJuQPCsSItZ/8TieFeP30iY+uaLoD0mT0tAj1gLeyQ=",
"owner": "lnl7",
"repo": "nix-darwin",
- "rev": "f61d5f2051a387a15817007220e9fb3bbead57b3",
+ "rev": "8c8388ade72e58efdeae71b4cbb79e872c23a56b",
"type": "github"
},
"original": {
@@ -431,11 +431,11 @@
},
"nixpkgs": {
"locked": {
- "lastModified": 1727634051,
- "narHash": "sha256-S5kVU7U82LfpEukbn/ihcyNt2+EvG7Z5unsKW9H/yFA=",
+ "lastModified": 1728018373,
+ "narHash": "sha256-NOiTvBbRLIOe5F6RbHaAh6++BNjsb149fGZd1T4+KBg=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "06cf0e1da4208d3766d898b7fdab6513366d45b9",
+ "rev": "bc947f541ae55e999ffdb4013441347d83b00feb",
"type": "github"
},
"original": {
@@ -476,11 +476,11 @@
"treefmt-nix": "treefmt-nix"
},
"locked": {
- "lastModified": 1727871072,
- "narHash": "sha256-t+YLQwBB1soQnVjT6d7nQq4Tidaw7tpB8i6Zvpc+Zbs=",
+ "lastModified": 1728145679,
+ "narHash": "sha256-qd1nr2b+WUiyzJva650LBX/3hDBru0ZSVxKHSm1BE0w=",
"owner": "nix-community",
"repo": "nixvim",
- "rev": "0ca98d02104f7f0a703787a7a080a570b7f1bedd",
+ "rev": "6594472fd275f6dcf5a9fba4a83d2f7fa2cf2b8a",
"type": "github"
},
"original": {
@@ -498,11 +498,11 @@
]
},
"locked": {
- "lastModified": 1727599661,
- "narHash": "sha256-0R+1ih0Rfqrz/lcduvpNSnUw3uthUHiaGh0aWPyIqeQ=",
+ "lastModified": 1728017046,
+ "narHash": "sha256-ofWYux/uUAv8wq7sWw8XWke0sh8p4qYxSOn8d+EaJ8c=",
"owner": "NuschtOS",
"repo": "search",
- "rev": "c3c3928b8de7d300c34e9d90fdc19febd1a32062",
+ "rev": "ba81d9c1eae20fc3a1cd066062a05ac2e799e629",
"type": "github"
},
"original": {
@@ -529,11 +529,11 @@
]
},
"locked": {
- "lastModified": 1727842659,
- "narHash": "sha256-2m5hx16ayKSvRFQyHDfRXMWVZDyDpI3DMwr7ujf+3tg=",
+ "lastModified": 1728101832,
+ "narHash": "sha256-0cRtOtkcQvhcKq0vx2C/2uOVUlOmJNZQzcZiK581wto=",
"owner": "Gerg-L",
"repo": "spicetify-nix",
- "rev": "3e033244348288c6995b155a493a229e499a7c4f",
+ "rev": "277107c2bc07582899d53e7fc901e93126d944bd",
"type": "github"
},
"original": {
@@ -673,11 +673,11 @@
]
},
"locked": {
- "lastModified": 1727431250,
- "narHash": "sha256-uGRlRT47ecicF9iLD1G3g43jn2e+b5KaMptb59LHnvM=",
+ "lastModified": 1727984844,
+ "narHash": "sha256-xpRqITAoD8rHlXQafYZOLvUXCF6cnZkPfoq67ThN0Hc=",
"owner": "numtide",
"repo": "treefmt-nix",
- "rev": "879b29ae9a0378904fbbefe0dadaed43c8905754",
+ "rev": "4446c7a6fc0775df028c5a3f6727945ba8400e64",
"type": "github"
},
"original": {
diff --git a/nixos/configuration.nix b/nixos/configuration.nix
index 1639b76..57b5b02 100644
--- a/nixos/configuration.nix
+++ b/nixos/configuration.nix
@@ -62,17 +62,20 @@
wantedBy = ["default.target"];
serviceConfig.ExecStart = "${pkgs.bluez}/bin/mpris-proxy";
};
- programs.steam = {
- enable = true;
- remotePlay.openFirewall =
- true; # Open ports in the firewall for Steam Remote Play
- dedicatedServer.openFirewall =
- true; # Open ports in the firewall for Source Dedicated Server
- localNetworkGameTransfers.openFirewall =
- true; # Open ports in the firewall for Steam Local Network Game Transfers
- extraCompatPackages = with pkgs; [proton-ge-bin];
+ programs = {
+ hyprland.enable = true; # enables Hyprland DM.
+ steam = {
+ enable = true;
+ remotePlay.openFirewall =
+ true; # Open ports in the firewall for Steam Remote Play
+ dedicatedServer.openFirewall =
+ true; # Open ports in the firewall for Source Dedicated Server
+ localNetworkGameTransfers.openFirewall =
+ true; # Open ports in the firewall for Steam Local Network Game Transfers
+ extraCompatPackages = with pkgs; [proton-ge-bin];
+ };
+ gamemode.enable = true;
};
- programs.gamemode.enable = true;
boot = {
kernelPackages = pkgs.linuxPackages_zen;
supportedFilesystems = ["ntfs"];
@@ -106,7 +109,6 @@
# enable = true;
# wrapperFeatures.gtk = true;
#};
- programs.hyprland.enable = true; # enables Hyprland DM.
nixpkgs = {
overlays = [];
config = {allowUnfree = true;};
@@ -120,6 +122,9 @@
flake-registry = "";
nix-path = config.nix.nixPath;
};
+ extraOptions = ''
+ trusted-users = root stvnliu
+ '';
channel.enable = false;
registry = lib.mapAttrs (_: flake: {inherit flake;}) flakeInputs;
nixPath = lib.mapAttrsToList (n: _: "${n}=flake:${n}") flakeInputs;
@@ -133,10 +138,7 @@
initialPassword = "stevenpassword";
isNormalUser = true;
openssh.authorizedKeys.keys = [];
- packages = with pkgs; [
- nh
- gparted
- ];
+ packages = with pkgs; [nh gparted];
extraGroups = ["wheel" "input" "networkmanager"];
};
};