Compare commits

..

No commits in common. "e29e0fefd61a3649770a69d08f38479d79b260e0" and "a010c256c711656462fd3449980d63afbb4b22c8" have entirely different histories.

6 changed files with 52 additions and 59 deletions

View File

@ -42,8 +42,8 @@
defaultRuntime = true; defaultRuntime = true;
autoStart = true; autoStart = true;
}; };
xserver.enable = true; xserver.enable = true;
displayManager.sddm.enable = true; displayManager.sddm.enable = true;
desktopManager.plasma6.enable = true; desktopManager.plasma6.enable = true;
}; };
@ -68,12 +68,12 @@
package = pkgs.nerdfonts; package = pkgs.nerdfonts;
name = "Iosevka NF"; name = "Iosevka NF";
}; };
sansSerif = { sansSerif = {
package = pkgs.nerdfonts; package = pkgs.nerdfonts;
name = "Iosevka NF"; name = "Iosevka NF";
}; };
monospace = { monospace = {
package = pkgs.nerdfonts; package = pkgs.nerdfonts;
name = "Iosevka NFM"; name = "Iosevka NFM";
@ -120,7 +120,7 @@
backupFileExtension = "bk"; backupFileExtension = "bk";
users = {"k" = import ./home.nix;}; users = {"k" = import ./home.nix;};
}; };
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave # on your system were taken. Its perfectly fine and recommended to leave

View File

@ -1,34 +1,30 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{ {
config, imports =
lib, [ (modulesPath + "/installer/scan/not-detected.nix")
pkgs, ];
modulesPath,
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod"]; boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ];
boot.initrd.kernelModules = []; boot.initrd.kernelModules = [ ];
boot.kernelModules = ["kvm-amd"]; boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = []; boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" =
device = "/dev/disk/by-uuid/aace1ae9-2a8f-4a90-9e0b-cb21779636d2"; { device = "/dev/disk/by-uuid/aace1ae9-2a8f-4a90-9e0b-cb21779636d2";
fsType = "btrfs"; fsType = "btrfs";
}; };
fileSystems."/boot" = { fileSystems."/boot" =
device = "/dev/disk/by-uuid/8D75-F095"; { device = "/dev/disk/by-uuid/8D75-F095";
fsType = "vfat"; fsType = "vfat";
options = ["fmask=0022" "dmask=0022"]; options = [ "fmask=0022" "dmask=0022" ];
}; };
swapDevices = []; swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View File

@ -21,27 +21,27 @@
khronos-ocl-icd-loader khronos-ocl-icd-loader
]; ];
}; };
# For WiVRn:
xdg.configFile."openxr/1/active_runtime.json".source = "${pkgs.wivrn}/share/openxr/1/openxr_wivrn.json";
# For WiVRn: xdg.configFile."openvr/openvrpaths.vrpath".text = ''
xdg.configFile."openxr/1/active_runtime.json".source = "${pkgs.wivrn}/share/openxr/1/openxr_wivrn.json"; {
"config" :
xdg.configFile."openvr/openvrpaths.vrpath".text = '' [
{ "${config.xdg.dataHome}/Steam/config"
"config" : ],
[ "external_drivers" : null,
"${config.xdg.dataHome}/Steam/config" "jsonid" : "vrpathreg",
], "log" :
"external_drivers" : null, [
"jsonid" : "vrpathreg", "${config.xdg.dataHome}/Steam/logs"
"log" : ],
[ "runtime" :
"${config.xdg.dataHome}/Steam/logs" [
], "${pkgs.opencomposite}/lib/opencomposite"
"runtime" : ],
[ "version" : 1
"${pkgs.opencomposite}/lib/opencomposite" }
], '';
"version" : 1
}
'';
} }

View File

@ -23,10 +23,10 @@
cat = "bat"; cat = "bat";
}; };
extraConfig = '' extraConfig = ''
$env.config = { $env.config = {
show_banner: false, show_banner: false,
} }
''; '';
}; };
carapace = { carapace = {
enable = true; enable = true;

View File

@ -35,7 +35,7 @@
k = { k = {
isNormalUser = true; isNormalUser = true;
description = "k"; description = "k";
extraGroups = ["networkmanager" "wheel" "libvirtd"]; extraGroups = ["networkmanager" "wheel"];
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPKbKVe6gneJ9ghFih3bOeL++iDNPJNIMoZSdNMOsD0I k@laptop"]; openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPKbKVe6gneJ9ghFih3bOeL++iDNPJNIMoZSdNMOsD0I k@laptop"];
packages = with pkgs; [zsh]; packages = with pkgs; [zsh];
shell = pkgs.zsh; shell = pkgs.zsh;

View File

@ -14,10 +14,7 @@
defaults.email = "markers711@gmail.com"; defaults.email = "markers711@gmail.com";
}; };
virtualisation = { virtualisation.docker = {enable = true;};
docker = {enable = true;};
libvirtd = {enable = true;};
};
services = { services = {
openssh = {enable = true;}; openssh = {enable = true;};