Compare commits

...

21 Commits

Author SHA1 Message Date
77535b4b42 eva-02 update to 25.11 2025-12-07 02:08:30 -08:00
c96032611c updated to 25.11 2025-12-07 00:39:49 -08:00
37a7c39119 added aws cli 2025-11-28 00:45:11 -08:00
262dbf1251 updated flake, added snap 2025-11-24 01:02:33 -08:00
e809186d9b update 2025-11-18 13:36:18 -08:00
6e5474da74 updates 2025-11-11 12:26:23 -08:00
6e8d370a16 added assets folder and git lfs 2025-09-11 16:20:07 -07:00
9fca17e4a4 updated eva-03 2025-09-11 14:42:01 -07:00
e98d4893f7 updated eva-03 2025-09-11 02:01:56 -07:00
6214930d19 added back ffmpeg 2025-09-09 16:06:11 -07:00
fa802a3a50 removed ffmpeg 2025-09-09 15:43:26 -07:00
abf5c8e7a0 added a way to trackdown nix store culprits 2025-09-09 15:29:36 -07:00
910557e7ae added more shortcuts for ghostty 2025-09-09 12:37:49 -07:00
1f93e32bc7 fixed sage, updated flake 2025-09-09 05:07:27 -07:00
22bb58825f added custom nix package 2025-08-28 20:40:47 -07:00
deec6c6001 fixed fasfetch img to be per host 2025-08-23 01:14:35 -07:00
f294b93eb8 removed old vscode-server added brews for homerbrew 2025-08-20 22:42:08 -07:00
53513f0dd0 fixed vscode-server for buildbox 2025-08-20 16:41:10 -07:00
43b5892c02 darwin: added several homebrew applications 2025-08-20 15:05:22 -07:00
d1d97fdac9 darwin fixed ghostty, homebrew, vscode 2025-08-20 12:14:14 -07:00
f807d29276 darwin adding fonts 2025-08-20 08:18:52 -07:00
34 changed files with 402 additions and 296 deletions

4
.gitattributes vendored Normal file
View File

@@ -0,0 +1,4 @@
*.jpg filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.webp filter=lfs diff=lfs merge=lfs -text
*.jpeg filter=lfs diff=lfs merge=lfs -text

BIN
assets/eva-01.jpg LFS Normal file

Binary file not shown.

Binary file not shown.

Binary file not shown.

BIN
assets/pfp/Jiji.jpg LFS Normal file

Binary file not shown.

BIN
assets/pfp/jaUtSEI.jpg LFS Normal file

Binary file not shown.

BIN
assets/pfp/jiro.jpg LFS Normal file

Binary file not shown.

BIN
assets/pfp/neonNerv.png LFS Normal file

Binary file not shown.

BIN
assets/pfp/uptime-kuma.png LFS Normal file

Binary file not shown.

279
flake.lock generated
View File

@@ -1,6 +1,38 @@
{
"nodes": {
"flake-compat": {
"locked": {
"lastModified": 1733328505,
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
"revCount": 69,
"type": "tarball",
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz"
},
"original": {
"type": "tarball",
"url": "https://flakehub.com/f/edolstra/flake-compat/1.tar.gz"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1760948891,
"narHash": "sha256-TmWcdiUUaWk8J4lpjzu4gCGxWY6/Ok7mOK4fIFfBuU4=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "864599284fc7c0ba6357ed89ed5e2cd5040f0c04",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_2": {
"inputs": {
"nixpkgs-lib": [
"nixvim",
@@ -8,11 +40,11 @@
]
},
"locked": {
"lastModified": 1754487366,
"narHash": "sha256-pHYj8gUBapuUzKV/kN/tR3Zvqc7o6gdFB9XKXIp1SQ8=",
"lastModified": 1763759067,
"narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "af66ad14b28a127c5c0f3bbb298218fc63528a18",
"rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github"
},
"original": {
@@ -21,42 +53,6 @@
"type": "github"
}
},
"flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_2": {
"inputs": {
"systems": "systems_3"
},
"locked": {
"lastModified": 1681202837,
"narHash": "sha256-H+Rh19JDwRtpVPAWp64F+rlEtxUWBAQW28eAi3SRSzg=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "cfacdce06f30d2b68473a46042957675eebb3401",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
@@ -64,16 +60,16 @@
]
},
"locked": {
"lastModified": 1753592768,
"narHash": "sha256-oV695RvbAE4+R9pcsT9shmp6zE/+IZe6evHWX63f2Qg=",
"lastModified": 1764866045,
"narHash": "sha256-0GsEtXV9OquDQ1VclQfP16cU5VZh7NEVIOjSH4UaJuM=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "fc3add429f21450359369af74c2375cb34a2d204",
"rev": "f63d0fe9d81d36e5fc95497217a72e02b8b7bcab",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-25.05",
"ref": "release-25.11",
"repo": "home-manager",
"type": "github"
}
@@ -85,11 +81,11 @@
]
},
"locked": {
"lastModified": 1755625756,
"narHash": "sha256-t57ayMEdV9g1aCfHzoQjHj1Fh3LDeyblceADm2hsLHM=",
"lastModified": 1764998300,
"narHash": "sha256-fZatn/KLfHLDXnF0wy7JxXqGaZmGDTVufT4o/AOlj44=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "dd026d86420781e84d0732f2fa28e1c051117b59",
"rev": "27a6182347ccae90a88231ae0dc5dfa7d15815bb",
"type": "github"
},
"original": {
@@ -98,34 +94,6 @@
"type": "github"
}
},
"ixx": {
"inputs": {
"flake-utils": [
"nixvim",
"nuschtosSearch",
"flake-utils"
],
"nixpkgs": [
"nixvim",
"nuschtosSearch",
"nixpkgs"
]
},
"locked": {
"lastModified": 1748294338,
"narHash": "sha256-FVO01jdmUNArzBS7NmaktLdGA5qA3lUMJ4B7a05Iynw=",
"owner": "NuschtOS",
"repo": "ixx",
"rev": "cc5f390f7caf265461d4aab37e98d2292ebbdb85",
"type": "github"
},
"original": {
"owner": "NuschtOS",
"ref": "v0.0.8",
"repo": "ixx",
"type": "github"
}
},
"nix-darwin": {
"inputs": {
"nixpkgs": [
@@ -133,11 +101,11 @@
]
},
"locked": {
"lastModified": 1755275010,
"narHash": "sha256-lEApCoWUEWh0Ifc3k1JdVjpMtFFXeL2gG1qvBnoRc2I=",
"lastModified": 1765065051,
"narHash": "sha256-b7W9WsvyMOkUScNxbzS45KEJp0iiqRPyJ1I3JBE+oEE=",
"owner": "nix-darwin",
"repo": "nix-darwin",
"rev": "7220b01d679e93ede8d7b25d6f392855b81dd475",
"rev": "7e22bf538aa3e0937effcb1cee73d5f1bcc26f79",
"type": "github"
},
"original": {
@@ -147,13 +115,33 @@
"type": "github"
}
},
"nix-snapd": {
"inputs": {
"flake-compat": "flake-compat",
"flake-parts": "flake-parts",
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1761703712,
"narHash": "sha256-OKuNVXmHuZ0zi8T0aGWrBJizIfvdTqV1RiV0IN8GPZs=",
"owner": "nix-community",
"repo": "nix-snapd",
"rev": "f7694a0e26d890e285137e1b726b1b44038805c4",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nix-snapd",
"type": "github"
}
},
"nixos-hardware": {
"locked": {
"lastModified": 1754564048,
"narHash": "sha256-dz303vGuzWjzOPOaYkS9xSW+B93PSAJxvBd6CambXVA=",
"lastModified": 1764440730,
"narHash": "sha256-ZlJTNLUKQRANlLDomuRWLBCH5792x+6XUJ4YdFRjtO4=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "26ed7a0d4b8741fe1ef1ee6fa64453ca056ce113",
"rev": "9154f4569b6cdfd3c595851a6ba51bfaa472d9f3",
"type": "github"
},
"original": {
@@ -165,27 +153,41 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1754937576,
"narHash": "sha256-3sWA5WJybUE16kIMZ3+uxcxKZY/JRR4DFBqLdSLBo7w=",
"lastModified": 1761442529,
"narHash": "sha256-8aDps5fCt0Ndw56ZgeBvdT7E5zeUSFi3CJaNR7ZJKnA=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "ddae11e58c0c345bf66efbddbf2192ed0e58f896",
"rev": "75762615e96b1a7f172dcdadf62aa9f3aebedf7b",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-lib": {
"locked": {
"lastModified": 1754788789,
"narHash": "sha256-x2rJ+Ovzq0sCMpgfgGaaqgBSwY+LST+WbZ6TytnT9Rk=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "a73b9c743612e4244d865a2fdee11865283c04e6",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1755027561,
"narHash": "sha256-IVft239Bc8p8Dtvf7UAACMG5P3ZV+3/aO28gXpGtMXI=",
"lastModified": 1764950072,
"narHash": "sha256-BmPWzogsG2GsXZtlT+MTcAWeDK5hkbGRZTeZNW42fwA=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "005433b926e16227259a1843015b5b2b7f7d1fc3",
"rev": "f61125a668a320878494449750330ca58b78c557",
"type": "github"
},
"original": {
@@ -197,33 +199,34 @@
},
"nixpkgs_2": {
"locked": {
"lastModified": 1682134069,
"narHash": "sha256-TnI/ZXSmRxQDt2sjRYK/8j8iha4B4zP2cnQCZZ3vp7k=",
"owner": "NixOS",
"lastModified": 1764831616,
"narHash": "sha256-OtzF5wBvO0jgW1WW1rQU9cMGx7zuvkF7CAVJ1ypzkxA=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "fd901ef4bf93499374c5af385b2943f5801c0833",
"rev": "c97c47f2bac4fa59e2cbdeba289686ae615f8ed4",
"type": "github"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
"owner": "nixos",
"ref": "nixos-25.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixvim": {
"inputs": {
"flake-parts": "flake-parts",
"flake-parts": "flake-parts_2",
"nixpkgs": [
"nixpkgs-unstable"
],
"nuschtosSearch": "nuschtosSearch",
"systems": "systems_2"
"systems": "systems"
},
"locked": {
"lastModified": 1755095763,
"narHash": "sha256-cFwtMaONA4uKYk/rBrmFvIAQieZxZytoprzIblTn1HA=",
"lastModified": 1765043977,
"narHash": "sha256-Gcdn1s/ynXRFNqInTcYltAi1gqgmTKw8Hw6OSfFNWMY=",
"owner": "nix-community",
"repo": "nixvim",
"rev": "ecc7880e00a2a735074243d8a664a931d73beace",
"rev": "b65233d5f9736cf8d8fe9d4652e1faf610b574bc",
"type": "github"
},
"original": {
@@ -232,39 +235,16 @@
"type": "github"
}
},
"nuschtosSearch": {
"inputs": {
"flake-utils": "flake-utils",
"ixx": "ixx",
"nixpkgs": [
"nixvim",
"nixpkgs"
]
},
"locked": {
"lastModified": 1754301638,
"narHash": "sha256-aRgzcPDd2axHFOuMlPLuzmDptUM2JU8mUL3jfgbBeyc=",
"owner": "NuschtOS",
"repo": "search",
"rev": "a60091045273484c040a91f5c229ba298f8ecc27",
"type": "github"
},
"original": {
"owner": "NuschtOS",
"repo": "search",
"type": "github"
}
},
"root": {
"inputs": {
"home-manager": "home-manager",
"home-manager-unstable": "home-manager-unstable",
"nix-darwin": "nix-darwin",
"nix-snapd": "nix-snapd",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs",
"nixpkgs": "nixpkgs_2",
"nixpkgs-unstable": "nixpkgs-unstable",
"nixvim": "nixvim",
"vscode-server": "vscode-server"
"nixvim": "nixvim"
}
},
"systems": {
@@ -281,55 +261,6 @@
"repo": "default",
"type": "github"
}
},
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_3": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"vscode-server": {
"inputs": {
"flake-utils": "flake-utils_2",
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1753541826,
"narHash": "sha256-foGgZu8+bCNIGeuDqQ84jNbmKZpd+JvnrL2WlyU4tuU=",
"owner": "nix-community",
"repo": "nixos-vscode-server",
"rev": "6d5f074e4811d143d44169ba4af09b20ddb6937d",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixos-vscode-server",
"type": "github"
}
}
},
"root": "root",

View File

@@ -2,13 +2,15 @@
description = "Nixos Config Flake";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.05";
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
nix-darwin.url = "github:nix-darwin/nix-darwin/master";
nix-darwin.inputs.nixpkgs.follows = "nixpkgs-unstable";
nix-snapd.url = "github:nix-community/nix-snapd";
nix-snapd.inputs.pkgs-unstable.follows = "nixpkgs";
home-manager = {
url = "github:nix-community/home-manager/release-25.05";
url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs";
};
@@ -26,22 +28,18 @@
url = "github:NixOS/nixos-hardware/master";
inputs.nixpkgs.follows = "nixpkgs";
};
vscode-server = {
url = "github:nix-community/nixos-vscode-server";
};
};
outputs =
{ self,
nixpkgs,
nixpkgs-unstable,
nix-darwin,
home-manager,
home-manager-unstable,
nixvim,
nix-darwin,
nix-snapd,
nixos-hardware,
vscode-server,
nixpkgs,
nixpkgs-unstable,
nixvim,
...
}@inputs:
let
@@ -60,7 +58,6 @@
modules = [
./hosts/buildbox/configuration.nix
inputs.home-manager.nixosModules.default
vscode-server.nixosModules.default({ config, pkgs, ... }: {services.vscode-server.enable = true;})
];
};
@@ -71,6 +68,16 @@
./hosts/eva-01/configuration.nix
inputs.home-manager.nixosModules.default
nixos-hardware.nixosModules.lenovo-thinkpad-x1-nano-gen1
nix-snapd.nixosModules.default { services.snap.enable = true; }
];
};
eva-03 = nixpkgs.lib.nixosSystem {
specialArgs = {inherit inputs pkgs-unstable configPath;} // {hostname = "eva-03";};
system = system;
modules = [
./hosts/eva-03/configuration.nix
inputs.home-manager.nixosModules.default
];
};
};

View File

@@ -1,5 +1,6 @@
{
pkgs,
pkgs-unstable,
lib,
hostname,
...
@@ -8,6 +9,7 @@
{
imports = [
./direnv.nix
./custom/custom.nix
./eza.nix
./fastfetch/fastfetch.nix
./git.nix
@@ -23,27 +25,33 @@
age-plugin-1p
age-plugin-yubikey
agedu
awscli2
b3sum
bat
btop
cbonsai
curl
dig
dust
ffmpeg-full
# esptool
fd
fzf
ffmpeg-full
gemini-cli
git-filter-repo
graphviz
jq
kitty
lazygit
nix-du
nmap
ocamlPackages.utop
# opencode
opencode
openconnect
openssl
putty
ripgrep
tailscale
s3cmd
# sage
termusic
timg
tldr
@@ -54,6 +62,7 @@
yazi
yt-dlp
yubikey-manager
zstd
]
++ lib.optionals (hostname == "eva-01") [
# cli
@@ -63,6 +72,7 @@
# cyber
amass
bettercap
bloodhound
bully
burpsuite
cowpatty
@@ -102,7 +112,7 @@
# cli
parted
traceroute
];
];
programs = {
ssh = {

View File

@@ -0,0 +1,10 @@
# build.nix
let
# Import your nixpkgs channel. The <> syntax finds it automatically.
pkgs = import <nixpkgs> {
# Apply your overlay here
overlays = [ (import ./sage.nix) ];
};
in
# This file now evaluates to exactly one thing: the sage package.
pkgs.sage

View File

@@ -0,0 +1,12 @@
{
pkgs,
hostname,
...
}:
{
nixpkgs.overlays = [
(import ./sage.nix)
];
}

View File

@@ -0,0 +1,27 @@
final: prev: {
# We are adding a package named 'sage' to the package set
sage = prev.rustPlatform.buildRustPackage rec {
pname = "sage";
version = "0.1.0";
src = prev.fetchFromGitHub {
owner = "Rogue-King";
repo = "sage";
rev = "v${version}";
sha256 = "sha256-nR0EhRJFUHwQHnJagXHkP/A1fGIoMZtXXuJf70/iDas=";
};
# Placeholder hash for cargo dependencies - the build will tell you the correct one.
cargoHash = "sha256-BXTEUGH2KB1gYl9cERVPbhAs0soezsSabg0nDedEjRI=";
#cargoLock.lockFile = ./Cargo.lock;
meta = with prev.lib; {
description = "A tool for elegant mathematics";
homepage = "https://github.com/Rogue-King/sage";
license = licenses.mit;
platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ];
maintainers = with maintainers; [ ];
};
};
}

Binary file not shown.

Before

Width:  |  Height:  |  Size: 38 KiB

View File

@@ -1,15 +1,22 @@
{
hostname,
lib,
...
}:
{
programs = {
fastfetch = {
enable = true;
settings = {
logo = {
source = "/etc/nixos/home-manager/commands/fastfetch/assets/evangelion-mecha-neon-genesis-desktop-wallpaper-cover.jpg";
source = lib.mkIf (hostname == "eva-01") "/etc/nixos/assets/pfp/eva-01.jpg";
type = "kitty";
height = 20;
width = 60;
padding = {
top = 2; #2;
top = 2; # 2;
left = 2; # 3;
};
};

View File

@@ -8,32 +8,31 @@
programs = {
git = {
enable = true;
userName = "rogueking";
userEmail = "miguel@muniz.org";
lfs.enable = true;
settings = {
user = {
name = "rogueking";
email = "miguel@muniz.org";
};
} // lib.optionalAttrs (! (lib.elem hostname [ "buildbox" ])) {
gpg = {
format = "ssh";
ssh = lib.optionalAttrs (hostname == "eva-02") {
program = "/Applications/1Password.app/Contents/MacOS/op-ssh-sign";
};
};
};
} // lib.optionalAttrs (! (lib.elem hostname [ "buildbox" ])) {
signing = {
signByDefault = true;
signer = if hostname == "eva-02"
then
then
"/Applications/1Password.app/Contents/MacOS/op-ssh-sign"
else
"/opt/1Password/op-ssh-sign";
else
"/opt/1Password/op-ssh-sign";
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHI7zcxrwwg4VqpGduhPX31aslzXwkRXiM32+8K+aIMu";
};
extraConfig = {
gpg = {
format = "ssh";
ssh = {
program = if hostname == "eva-02"
then
"/Applications/1Password.app/Contents/MacOS/op-ssh-sign"
else
"/usr/bin/op-ssh-sign";
};
};
};
};
};
}

View File

@@ -7,7 +7,7 @@
{
imports = [
./blink-cmp.nix
#./blink-cmp.nix
./glance.nix
./illuminate.nix
./indent-blankline.nix
@@ -17,8 +17,7 @@
./startup.nix
./telescope.nix
./which-key.nix
]
++ lib.optional (hostname != "eva-02") ./codecompanion.nix;
];
programs.nixvim.plugins = {
cmp-nvim-lsp.enable = true;

View File

@@ -1,6 +1,6 @@
{
programs.nixvim.plugins = {
illuminate = {
illuminate.settings = {
enable = true;
delay = 100;
minCountToHighlight = 1;

View File

@@ -16,6 +16,7 @@
#tailwindcss.enable = true;
gopls.enable = true;
golangci_lint_ls.enable = true;
eslint.enable = true;
templ.enable = true;
pylsp.enable = true;
sqls.enable = true;

View File

@@ -2,11 +2,11 @@
programs.nixvim.plugins = {
startup = {
enable = true;
parts = [
settings.parts = [
"header"
"body"
];
sections = {
settings.sections = {
header = {
align = "center";
content = {

View File

@@ -11,7 +11,8 @@
shellAliases = {
cd = "z";
cat = "bat";
catp = "bat -p";
catp = "bat -pP";
find = "fd";
grep = "rg";
lg = "lazygit";
ll = "eza -la";
@@ -20,7 +21,11 @@
open = "xdg-open";
locate = "sudo plocate";
tulpn = "sudo netstat -tulpn";
rebuild = "sudo nixos-rebuild switch --flake /etc/nixos#$(uname -n)";
rebuild = if hostname == "eva-02"
then
"sudo darwin-rebuild switch --flake .#eva-02"
else
"sudo nixos-rebuild switch --flake /etc/nixos#$(uname -n)";
};
# profileExtra = ''

View File

@@ -1,20 +1,27 @@
{ config, pkgs, inputs, ... }:
{
config,
pkgs,
inputs,
...
}:
{
imports = [
./commands/commands.nix
./programs/programs.nix
inputs.nixvim.homeModules.nixvim
];
./commands/commands.nix
./programs/programs.nix
inputs.nixvim.homeModules.nixvim
];
# Home Manager needs a bit of information about you and the paths it should
# manage.
home.username = "rogueking";
# home.homeDirectory = "/Users/rogueking";
home.homeDirectory = if pkgs.stdenv.isDarwin
then "/Users/rogueking" # Path for macOS
else "/home/rogueking"; # Path for Linux
home.homeDirectory =
if pkgs.stdenv.isDarwin then
"/Users/rogueking" # Path for macOS
else
"/home/rogueking"; # Path for Linux
# This value determines the Home Manager release that your configuration is
# compatible with. This helps avoid breakage when a new Home Manager release
@@ -27,10 +34,14 @@
nixpkgs.config.allowUnfree = true;
# Allow specific insecure packages
nixpkgs.config.permittedInsecurePackages = [
#"python3.12-ecdsa-0.19.1"
];
# The home.packages option allows you to install Nix packages into your
# environment.
home.packages = with pkgs; [
];

View File

@@ -1,13 +1,19 @@
{
hostname,
lib,
...
}:
{
programs.ghostty = {
enable = true;
package = lib.mkIf (hostname == "eva-02") null;
enableZshIntegration = true;
settings = {
# Use explicit theme instead of relying on system theme detection
theme = "Adwaita Dark";
# Explicitly set color scheme preference to avoid GTK warnings
gtk-adwaita = true;
#gtk-adwaita = true;
gtk-single-instance = true;
@@ -28,6 +34,8 @@
cursor-invert-fg-bg = true;
keybind = [
"global:cmd+grave_accent=toggle_quick_terminal"
"super+shift+enter=new_window"
"super+shift+k=new_split:down"
"super+shift+l=new_split:right"
"super+shift+x=close_window"

View File

@@ -4,7 +4,7 @@
enable = true;
settings = {
# === Monitor configuration ===
monitor = "eDP-1, 1920x1080@60.03300, 0x0, 1.25";
monitor = "eDP-1, 2560x1440@60.03300, 0x0, 1.25";
# === Autostart / Exec commands ===
exec-once = [

View File

@@ -8,6 +8,9 @@
./hypr/hyprland.nix
./hypr/hyprlock.nix
#./hypr/waybar.nix
]
++ lib.optionals (hostname == "eva-02") [
./ghostty/ghostty.nix
];
home.packages =
@@ -18,13 +21,14 @@
brave
desmume
gparted
jellyfin-media-player
# jellyfin-media-player
kdePackages.bluedevil
kdePackages.bluez-qt
kdePackages.kate
kdePackages.kdeconnect-kde
kdePackages.oxygen-sounds
kdePackages.partitionmanager
kdePackages.isoimagewriter
libreoffice-still
librewolf
localsend
@@ -39,14 +43,12 @@
prismlauncher
protonplus
protonup-qt
putty
pwninit
pwntools
qFlipper
r2modman
remmina
rpi-imager
sdrangel
sdrpp
signal-desktop
spice
steam
@@ -55,20 +57,27 @@
tor-browser
vesktop
vlc
vscode
wireshark
yubikey-agent
# rpi-imager
]
++ lib.optionals (hostname == "eva-01") [
sonic-visualiser
cinny-desktop
calibre
])
sdrangel
sdrpp
sonic-visualiser
vscode
]
++ lib.optionals (hostname == "eva-02") [
]
++ lib.optionals (hostname == "eva-03") [
];
vscode
]);
# environment.sessionVariables.NIXOS_OZONE_WL = "1";

View File

@@ -9,12 +9,12 @@
programs.rofi = {
enable = true;
terminal = "ghostty";
package = pkgs.rofi-wayland.override {
plugins = [ pkgs.rofi-emoji-wayland ];
package = pkgs.rofi.override {
plugins = [ pkgs.rofi-emoji ];
};
font = "JetBrainsMono Nerd Font 12";
plugins = [
pkgs.rofi-emoji-wayland
pkgs.rofi-emoji
pkgs.rofi-calc
pkgs.rofi-games
pkgs.rofi-file-browser

View File

@@ -97,6 +97,11 @@
# Enable touchpad support (enabled default in most desktopManager).
# services.xserver.libinput.enable = true;
# VSCode-Server
programs.nix-ld.enable = true;
# Define a user account. Don't forget to set a password with passwd.
programs.zsh.enable = true;
@@ -146,13 +151,18 @@
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINXqriPZVIuduc/J7GS1mD171LL0gIbgEjlImsxedWVX"
];
nixpkgs.config.permittedInsecurePackages = [
"qtwebengine-5.15.19"
"python3.12-ecdsa-0.19.1"
];
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
#apps
#cider-2
guacamole-client
# sddm-astronaut
#guacamole-client
#sddm-astronaut
#cli tools
btop

View File

@@ -260,6 +260,7 @@
file
findutils
git
goose-cli
hcxdumptool
hcxtools
kopia
@@ -276,8 +277,8 @@
tlp
unzip
vim
wirelesstools
wifite2
wirelesstools
#fonts
nerd-fonts.hack

View File

@@ -52,7 +52,6 @@
# Enable Touch ID
security.pam.services.sudo_local.touchIdAuth = true;
# Define a user account. Don't forget to set a password with passwd.
system.primaryUser = "rogueking";
programs.zsh.enable = true;
@@ -70,12 +69,35 @@
homebrew = {
enable = true;
onActivation.autoUpdate = true;
user = "rogueking";
#onActivation.autoUpdate = true;
brews = [
"docker"
"esptool"
"git-lfs"
"huggingface-cli"
"putty"
"tailscale"
];
casks = [
"1password"
"1password-cli"
"docker"
"ollama"
"bambu-studio"
"blender"
"brave-browser"
"ghostty"
"imhex"
"jellyfin-media-player"
"jordanbaird-ice"
"localsend"
"melonds"
"moonlight"
"obsidian"
"signal"
"steam"
"vesktop"
"visual-studio-code"
"vlc"
];
};
@@ -124,10 +146,11 @@
openssh
openssl
ptunnel
tailscale
unzip
vim
];
fonts.packages = with pkgs; [
nerd-fonts.hack
nerd-fonts.fira-code
];

View File

@@ -2,7 +2,15 @@
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ config, pkgs, pkgs-unstable, inputs, hostname, ... }:
{
config,
configPath,
hostname,
inputs,
pkgs,
pkgs-unstable,
...
}:
{
imports =
@@ -16,16 +24,17 @@
# Bootloader.
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.systemd-boot = {
enable = true;
windows = {
"11-Pro" = {
title = "Windows 11 Pro";
efiDeviceHandle = "HD3c";
sortKey = "z_windows";
};
};
};
boot.loader.systemd-boot.enable = true;
#{
# enable = true;
# windows = {
# "11-Pro" = {
# title = "Windows 11 Pro";
# efiDeviceHandle = "HD3c";
# sortKey = "z_windows";
# };
# };
# };
nix.settings.experimental-features = ["nix-command" "flakes"];
@@ -119,7 +128,10 @@
services.displayManager.sddm.enable = true;
services.displayManager.sddm.wayland.enable = true;
services.desktopManager.plasma6.enable = true;
services.displayManager.sddm.theme = "sddm-astronaut-theme";
#services.displayManager.sddm.theme = "sddm-astronaut-theme";
# Enable Hyprland wayland compositor
programs.hyprland.enable = true;
environment.sessionVariables.NIXOS_OZONE_WL = "1";
# XRDP
@@ -128,26 +140,25 @@
services.xrdp.openFirewall = true;
# Enable Tailscale
services.tailscale.enable = true;
services.tailscale = {
enable = true;
package = pkgs-unstable.tailscale;
};
#Enable Ollama daemon
# services.ollama.enable = true;
#Enable Ollama daemon
#services.ollama.enable = true;
# Enable ollama
services.ollama = {
enable = true;
enable = false;
host = "0.0.0.0";
openFirewall = true;
acceleration = "cuda";
package = pkgs-unstable.ollama;
loadModels = [
"codegemma:7b"
"deepcoder:14b"
"gemma3:12b-it-qat"
"gemma3:27b-it-qat"
"qwq:32b"
"deepseek-r1:32b"
"HammerAI/mythomax-l2:latest"
];
};
@@ -166,12 +177,12 @@
services.printing.enable = false;
# Enable sound with pipewire.
hardware.pulseaudio.enable = false;
services.pulseaudio.enable = false;
#hardware.pulseaudio = {
# enable = true;
# package = pkgs.pulseaudioFull;
#};
hardware.bluetooth.enable = false;
hardware.bluetooth.enable = true;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
@@ -248,10 +259,9 @@
environment.systemPackages = with pkgs; [
#apps
#cider-2
amneziawg-go
fprintd
guacamole-client
sddm-astronaut
#sddm-astronaut
polonium
#cli tools
@@ -277,7 +287,6 @@
openssl
plocate
ptunnel
tailscale
tlp
unzip
vim
@@ -285,32 +294,31 @@
wirelesstools
#unstable
pkgs-unstable.vllm
pkgs-unstable.ollama
pkgs-unstable.crush
(pkgs-unstable.llama-cpp.override { cudaSupport = true; })
];
#fonts
nerd-fonts.hack
nerd-fonts.fira-code
fonts.packages = with pkgs; [
nerdfonts
];
home-manager = {
extraSpecialArgs = { inherit inputs hostname; };
extraSpecialArgs = {
inherit
# config
configPath
inputs
pkgs-unstable
hostname
;
};
users = {
"rogueking" = import ./../../home-manager/home.nix;
};
backupFileExtension = "backup";
};
#home-manager = {
# extraSpecialArgs = { inherit inputs; };
# users = {
# "rogueking" = import ../home-manager/home.nix;
# };
# backupFileExtension = "backup";
#};
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;

View File

@@ -8,24 +8,24 @@
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" "uas" "sd_mod" ];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/b325c30d-e1e9-4845-898a-f2d85a35e494";
{ device = "/dev/disk/by-uuid/c8250302-044c-4be5-89b8-a07706a8dedf";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/31E1-03D2";
{ device = "/dev/disk/by-uuid/E81D-0813";
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/432a1564-851c-4246-ba69-4f11fd0e1765"; }
[ { device = "/dev/disk/by-uuid/d8666f92-b7cf-40fb-b305-d16a84d79fa0"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking