treewide: format using nixfmt-rfc-style
This commit is contained in:
		
							parent
							
								
									dba047b845
								
							
						
					
					
						commit
						399eafe9ed
					
				
					 98 changed files with 1930 additions and 990 deletions
				
			
		| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.blueman.enable = true;
 | 
			
		||||
  hardware.bluetooth = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
| 
						 | 
				
			
			@ -8,7 +9,9 @@
 | 
			
		|||
        # Discoverable = true;
 | 
			
		||||
        AlwaysPairable = true;
 | 
			
		||||
      };
 | 
			
		||||
      Policy = { AutoEnable = true; };
 | 
			
		||||
      Policy = {
 | 
			
		||||
        AutoEnable = true;
 | 
			
		||||
      };
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,11 @@
 | 
			
		|||
{ config, pkgs, lib, inputs, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  console = {
 | 
			
		||||
    font = "${pkgs.terminus_font}/share/consolefonts/ter-120n.psf.gz";
 | 
			
		||||
    packages = [ pkgs.terminus_font ];
 | 
			
		||||
| 
						 | 
				
			
			@ -38,9 +45,7 @@
 | 
			
		|||
      enable = true;
 | 
			
		||||
      theme = lib.mkIf (pkgs.uservars.desktop == "sway") "red_loader";
 | 
			
		||||
      themePackages = with pkgs; [
 | 
			
		||||
        (adi1090x-plymouth-themes.override {
 | 
			
		||||
          selected_themes = [ "red_loader" ];
 | 
			
		||||
        })
 | 
			
		||||
        (adi1090x-plymouth-themes.override { selected_themes = [ "red_loader" ]; })
 | 
			
		||||
      ];
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,10 @@
 | 
			
		|||
{ pkgs, lib, config, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  config,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  services.cachix-watch-store = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    cacheName = "lelgenio";
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,7 +1,13 @@
 | 
			
		|||
# Edit this configuration file to define what should be installed on
 | 
			
		||||
# your system.  Help is available in the configuration.nix(5) man page
 | 
			
		||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
 | 
			
		||||
{ config, pkgs, inputs, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./gamemode.nix
 | 
			
		||||
    ./cachix.nix
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.flatpak.enable = true;
 | 
			
		||||
  virtualisation.docker.enable = true;
 | 
			
		||||
  virtualisation.docker.autoPrune.enable = true;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  fonts.enableDefaultPackages = true;
 | 
			
		||||
  fonts.packages = with pkgs; [
 | 
			
		||||
    noto-fonts
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,8 +1,16 @@
 | 
			
		|||
{ config, pkgs, inputs, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  programs.gamemode.enable = true;
 | 
			
		||||
  programs.gamemode.enableRenice = true;
 | 
			
		||||
  programs.gamemode.settings = {
 | 
			
		||||
    general = { renice = 10; };
 | 
			
		||||
    general = {
 | 
			
		||||
      renice = 10;
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    # Warning: GPU optimisations have the potential to damage hardware
 | 
			
		||||
    gpu = {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,40 +1,52 @@
 | 
			
		|||
{ pkgs, lib, ... }: {
 | 
			
		||||
  mkNixRunner = registrationConfigFile: with lib; rec {
 | 
			
		||||
    # File should contain at least these two variables:
 | 
			
		||||
    # `CI_SERVER_URL`
 | 
			
		||||
    # `REGISTRATION_TOKEN`
 | 
			
		||||
    inherit registrationConfigFile; # 2
 | 
			
		||||
    dockerImage = "alpine:3.18.2";
 | 
			
		||||
    dockerAllowedImages = [ dockerImage ];
 | 
			
		||||
    dockerVolumes = [
 | 
			
		||||
      "/etc/nix/nix.conf:/etc/nix/nix.conf:ro"
 | 
			
		||||
      "/nix/store:/nix/store:ro"
 | 
			
		||||
      "/nix/var/nix/db:/nix/var/nix/db:ro"
 | 
			
		||||
      "/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
 | 
			
		||||
    ];
 | 
			
		||||
    dockerDisableCache = true;
 | 
			
		||||
    preBuildScript = pkgs.writeScript "setup-container" ''
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/log/nix/drvs
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/nix/gcroots
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/nix/profiles
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/nix/temproots
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/nix/userpool
 | 
			
		||||
      mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
 | 
			
		||||
      mkdir -p -m 1777 /nix/var/nix/profiles/per-user
 | 
			
		||||
      mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
 | 
			
		||||
      mkdir -p -m 0700 "$HOME/.nix-defexpr"
 | 
			
		||||
{ pkgs, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  mkNixRunner =
 | 
			
		||||
    registrationConfigFile: with lib; rec {
 | 
			
		||||
      # File should contain at least these two variables:
 | 
			
		||||
      # `CI_SERVER_URL`
 | 
			
		||||
      # `REGISTRATION_TOKEN`
 | 
			
		||||
      inherit registrationConfigFile; # 2
 | 
			
		||||
      dockerImage = "alpine:3.18.2";
 | 
			
		||||
      dockerAllowedImages = [ dockerImage ];
 | 
			
		||||
      dockerVolumes = [
 | 
			
		||||
        "/etc/nix/nix.conf:/etc/nix/nix.conf:ro"
 | 
			
		||||
        "/nix/store:/nix/store:ro"
 | 
			
		||||
        "/nix/var/nix/db:/nix/var/nix/db:ro"
 | 
			
		||||
        "/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
 | 
			
		||||
      ];
 | 
			
		||||
      dockerDisableCache = true;
 | 
			
		||||
      preBuildScript = pkgs.writeScript "setup-container" ''
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/log/nix/drvs
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/nix/gcroots
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/nix/profiles
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/nix/temproots
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/nix/userpool
 | 
			
		||||
        mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
 | 
			
		||||
        mkdir -p -m 1777 /nix/var/nix/profiles/per-user
 | 
			
		||||
        mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
 | 
			
		||||
        mkdir -p -m 0700 "$HOME/.nix-defexpr"
 | 
			
		||||
 | 
			
		||||
      . ${pkgs.nix}/etc/profile.d/nix.sh
 | 
			
		||||
        . ${pkgs.nix}/etc/profile.d/nix.sh
 | 
			
		||||
 | 
			
		||||
      ${pkgs.nix}/bin/nix-env -i ${concatStringsSep " " (with pkgs; [ nix cacert git openssh ])}
 | 
			
		||||
    '';
 | 
			
		||||
    environmentVariables = {
 | 
			
		||||
      ENV = "/etc/profile";
 | 
			
		||||
      USER = "root";
 | 
			
		||||
      NIX_REMOTE = "daemon";
 | 
			
		||||
      PATH = "/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin";
 | 
			
		||||
      NIX_SSL_CERT_FILE = "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt";
 | 
			
		||||
        ${pkgs.nix}/bin/nix-env -i ${
 | 
			
		||||
          concatStringsSep " " (
 | 
			
		||||
            with pkgs;
 | 
			
		||||
            [
 | 
			
		||||
              nix
 | 
			
		||||
              cacert
 | 
			
		||||
              git
 | 
			
		||||
              openssh
 | 
			
		||||
            ]
 | 
			
		||||
          )
 | 
			
		||||
        }
 | 
			
		||||
      '';
 | 
			
		||||
      environmentVariables = {
 | 
			
		||||
        ENV = "/etc/profile";
 | 
			
		||||
        USER = "root";
 | 
			
		||||
        NIX_REMOTE = "daemon";
 | 
			
		||||
        PATH = "/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin";
 | 
			
		||||
        NIX_SSL_CERT_FILE = "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt";
 | 
			
		||||
      };
 | 
			
		||||
      tagList = [ "nix" ];
 | 
			
		||||
    };
 | 
			
		||||
    tagList = [ "nix" ];
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,7 +1,8 @@
 | 
			
		|||
# Edit this configuration file to define what should be installed on
 | 
			
		||||
# your system.  Help is available in the configuration.nix(5) man page
 | 
			
		||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
 | 
			
		||||
{ config, pkgs, ... }: {
 | 
			
		||||
{ config, pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  # Enable the X11 windowing system.
 | 
			
		||||
  services.xserver.enable = true;
 | 
			
		||||
  # Enable the GNOME Desktop Environment.
 | 
			
		||||
| 
						 | 
				
			
			@ -19,11 +20,14 @@
 | 
			
		|||
  };
 | 
			
		||||
 | 
			
		||||
  # services.xserver.displayManager.autologin.user = "lelgenio";
 | 
			
		||||
  environment.systemPackages = with pkgs; with gnome; [
 | 
			
		||||
    gnome-tweaks
 | 
			
		||||
    dconf-editor
 | 
			
		||||
  environment.systemPackages =
 | 
			
		||||
    with pkgs;
 | 
			
		||||
    with gnome;
 | 
			
		||||
    [
 | 
			
		||||
      gnome-tweaks
 | 
			
		||||
      dconf-editor
 | 
			
		||||
 | 
			
		||||
    chrome-gnome-shell
 | 
			
		||||
    gnomeExtensions.quick-settings-audio-devices-hider
 | 
			
		||||
  ];
 | 
			
		||||
      chrome-gnome-shell
 | 
			
		||||
      gnomeExtensions.quick-settings-audio-devices-hider
 | 
			
		||||
    ];
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,6 +1,17 @@
 | 
			
		|||
{ lib, pkgs, config, ... }:
 | 
			
		||||
{
 | 
			
		||||
  lib,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  config,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
let
 | 
			
		||||
  inherit (pkgs.uservars) key accent font theme desktop;
 | 
			
		||||
  inherit (pkgs.uservars)
 | 
			
		||||
    key
 | 
			
		||||
    accent
 | 
			
		||||
    font
 | 
			
		||||
    theme
 | 
			
		||||
    desktop
 | 
			
		||||
    ;
 | 
			
		||||
 | 
			
		||||
  cfg = config.login-manager.greetd;
 | 
			
		||||
in
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ config, pkgs, ... }: {
 | 
			
		||||
{ config, pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  # Enable the X11 windowing system.
 | 
			
		||||
  services.xserver.enable = true;
 | 
			
		||||
  # Enable the KDE Desktop Environment.
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, config, ... }: {
 | 
			
		||||
{ pkgs, config, ... }:
 | 
			
		||||
{
 | 
			
		||||
  time.timeZone = "America/Sao_Paulo";
 | 
			
		||||
  environment.variables.TZ = config.time.timeZone;
 | 
			
		||||
  i18n.defaultLocale = "pt_BR.utf8";
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,6 +1,13 @@
 | 
			
		|||
{ config, pkgs, lib, ... }:
 | 
			
		||||
let cfg = config.packages.media-packages;
 | 
			
		||||
in {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
let
 | 
			
		||||
  cfg = config.packages.media-packages;
 | 
			
		||||
in
 | 
			
		||||
{
 | 
			
		||||
  options.packages.media-packages = {
 | 
			
		||||
    enable = lib.mkEnableOption "media packages";
 | 
			
		||||
  };
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, config, ... }: {
 | 
			
		||||
{ pkgs, config, ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.gitea-actions-runner = {
 | 
			
		||||
    package = pkgs.forgejo-actions-runner;
 | 
			
		||||
    instances.default = {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,9 @@
 | 
			
		|||
{ config, pkgs, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
let
 | 
			
		||||
  inherit (pkgs.callPackage ./gitlab-runner.nix { }) mkNixRunner;
 | 
			
		||||
in
 | 
			
		||||
| 
						 | 
				
			
			@ -15,7 +20,8 @@ in
 | 
			
		|||
      #   dockerPrivileged = true;
 | 
			
		||||
      # };
 | 
			
		||||
      thoreb_builder = {
 | 
			
		||||
        registrationConfigFile = config.age.secrets.monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.path;
 | 
			
		||||
        registrationConfigFile =
 | 
			
		||||
          config.age.secrets.monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.path;
 | 
			
		||||
        dockerImage = "debian";
 | 
			
		||||
        dockerPrivileged = true;
 | 
			
		||||
      };
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  # networking.wireless.enable = true;  # Enables wireless support via wpa_supplicant.
 | 
			
		||||
  # Configure network proxy if necessary
 | 
			
		||||
  # networking.proxy.default = "http://user:password@proxy:port/";
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,10 @@
 | 
			
		|||
{ config, pkgs, lib, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  services.nix-serve = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    secretKeyFile = config.age.secrets.monolith-nix-serve-privkey.path;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,7 +1,13 @@
 | 
			
		|||
{ lib, config, pkgs, inputs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  lib,
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
let
 | 
			
		||||
  collectFlakeInputs = input:
 | 
			
		||||
    [ input ] ++ lib.concatMap collectFlakeInputs (builtins.attrValues (input.inputs or { }));
 | 
			
		||||
  collectFlakeInputs =
 | 
			
		||||
    input: [ input ] ++ lib.concatMap collectFlakeInputs (builtins.attrValues (input.inputs or { }));
 | 
			
		||||
in
 | 
			
		||||
{
 | 
			
		||||
  system.extraDependencies = collectFlakeInputs inputs.self;
 | 
			
		||||
| 
						 | 
				
			
			@ -17,7 +23,10 @@ in
 | 
			
		|||
    optimise.automatic = true;
 | 
			
		||||
    settings = {
 | 
			
		||||
      auto-optimise-store = true;
 | 
			
		||||
      trusted-users = [ "root" "@wheel" ];
 | 
			
		||||
      trusted-users = [
 | 
			
		||||
        "root"
 | 
			
		||||
        "@wheel"
 | 
			
		||||
      ];
 | 
			
		||||
      substituters = [
 | 
			
		||||
        "https://cache.nixos.org"
 | 
			
		||||
        "https://nix-community.cachix.org"
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,9 @@
 | 
			
		|||
{ config, pkgs, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  lib,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
let
 | 
			
		||||
  inherit (pkgs.callPackage ./gitlab-runner.nix { }) mkNixRunner;
 | 
			
		||||
in
 | 
			
		||||
| 
						 | 
				
			
			@ -15,7 +20,8 @@ in
 | 
			
		|||
      #   dockerPrivileged = true;
 | 
			
		||||
      # };
 | 
			
		||||
      thoreb_builder = {
 | 
			
		||||
        registrationConfigFile = config.age.secrets.rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.path;
 | 
			
		||||
        registrationConfigFile =
 | 
			
		||||
          config.age.secrets.rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.path;
 | 
			
		||||
        dockerImage = "debian";
 | 
			
		||||
        dockerPrivileged = true;
 | 
			
		||||
      };
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,18 +1,13 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  age = {
 | 
			
		||||
    identityPaths = [ "/root/.ssh/id_rsa" ];
 | 
			
		||||
    secrets.lelgenio-cachix.file = ../secrets/lelgenio-cachix.age;
 | 
			
		||||
    secrets.monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.file =
 | 
			
		||||
      ../secrets/monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.age;
 | 
			
		||||
    secrets.gitlab-runner-thoreb-telemetria-registrationConfigFile.file =
 | 
			
		||||
      ../secrets/gitlab-runner-thoreb-telemetria-registrationConfigFile.age;
 | 
			
		||||
    secrets.monolith-forgejo-runner-token.file =
 | 
			
		||||
      ../secrets/monolith-forgejo-runner-token.age;
 | 
			
		||||
    secrets.rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.file =
 | 
			
		||||
      ../secrets/rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.age;
 | 
			
		||||
    secrets.monolith-nix-serve-privkey.file =
 | 
			
		||||
      ../secrets/monolith-nix-serve-privkey.age;
 | 
			
		||||
    secrets.phantom-forgejo-mailer-password.file =
 | 
			
		||||
      ../secrets/phantom-forgejo-mailer-password.age;
 | 
			
		||||
    secrets.monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.file = ../secrets/monolith-gitlab-runner-thoreb-itinerario-registrationConfigFile.age;
 | 
			
		||||
    secrets.gitlab-runner-thoreb-telemetria-registrationConfigFile.file = ../secrets/gitlab-runner-thoreb-telemetria-registrationConfigFile.age;
 | 
			
		||||
    secrets.monolith-forgejo-runner-token.file = ../secrets/monolith-forgejo-runner-token.age;
 | 
			
		||||
    secrets.rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.file = ../secrets/rainbow-gitlab-runner-thoreb-itinerario-registrationConfigFile.age;
 | 
			
		||||
    secrets.monolith-nix-serve-privkey.file = ../secrets/monolith-nix-serve-privkey.age;
 | 
			
		||||
    secrets.phantom-forgejo-mailer-password.file = ../secrets/phantom-forgejo-mailer-password.age;
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  sound.enable = true;
 | 
			
		||||
  hardware.pulseaudio.enable = false;
 | 
			
		||||
  services.pipewire = {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,10 +1,7 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  specialisation.dark-theme.configuration = {
 | 
			
		||||
    nixpkgs.overlays = [
 | 
			
		||||
      (final: prev: {
 | 
			
		||||
        uservars = prev.uservars;
 | 
			
		||||
      })
 | 
			
		||||
    ];
 | 
			
		||||
    nixpkgs.overlays = [ (final: prev: { uservars = prev.uservars; }) ];
 | 
			
		||||
  };
 | 
			
		||||
  specialisation.light-theme.configuration = {
 | 
			
		||||
    nixpkgs.overlays = [
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,17 +1,27 @@
 | 
			
		|||
{ config, pkgs, inputs, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  programs.steam.enable = true;
 | 
			
		||||
  programs.steam.package = pkgs.steam.override {
 | 
			
		||||
    extraLibraries = pkgs: with config.hardware.opengl;
 | 
			
		||||
      if pkgs.hostPlatform.is64bit
 | 
			
		||||
      then [ package ] ++ extraPackages
 | 
			
		||||
      else [ package32 ] ++ extraPackages32;
 | 
			
		||||
    extraLibraries =
 | 
			
		||||
      pkgs:
 | 
			
		||||
      with config.hardware.opengl;
 | 
			
		||||
      if pkgs.hostPlatform.is64bit then
 | 
			
		||||
        [ package ] ++ extraPackages
 | 
			
		||||
      else
 | 
			
		||||
        [ package32 ] ++ extraPackages32;
 | 
			
		||||
 | 
			
		||||
    extraPkgs = pkgs: with pkgs; [
 | 
			
		||||
      capitaine-cursors
 | 
			
		||||
      bibata-cursors
 | 
			
		||||
      mangohud
 | 
			
		||||
      xdg-user-dirs
 | 
			
		||||
    ];
 | 
			
		||||
    extraPkgs =
 | 
			
		||||
      pkgs: with pkgs; [
 | 
			
		||||
        capitaine-cursors
 | 
			
		||||
        bibata-cursors
 | 
			
		||||
        mangohud
 | 
			
		||||
        xdg-user-dirs
 | 
			
		||||
      ];
 | 
			
		||||
  };
 | 
			
		||||
  environment.systemPackages = with pkgs; [
 | 
			
		||||
    protontricks
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,10 @@
 | 
			
		|||
{ config, pkgs, inputs, ... }: {
 | 
			
		||||
{
 | 
			
		||||
  config,
 | 
			
		||||
  pkgs,
 | 
			
		||||
  inputs,
 | 
			
		||||
  ...
 | 
			
		||||
}:
 | 
			
		||||
{
 | 
			
		||||
  programs.thunar = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    plugins = with pkgs.xfce; [
 | 
			
		||||
| 
						 | 
				
			
			@ -12,17 +18,15 @@
 | 
			
		|||
  services.tumbler.enable = true;
 | 
			
		||||
 | 
			
		||||
  environment.systemPackages = [
 | 
			
		||||
    (
 | 
			
		||||
      pkgs.writeTextFile {
 | 
			
		||||
        name = "thumbs";
 | 
			
		||||
        text = ''
 | 
			
		||||
          [Thumbnailer Entry]
 | 
			
		||||
          TryExec=unzip
 | 
			
		||||
          Exec=sh -c "${pkgs.unzip}/bin/unzip -p %i preview.png > %o"
 | 
			
		||||
          MimeType=application/x-krita;
 | 
			
		||||
        '';
 | 
			
		||||
        destination = "/share/thumbnailers/kra.thumbnailer";
 | 
			
		||||
      }
 | 
			
		||||
    )
 | 
			
		||||
    (pkgs.writeTextFile {
 | 
			
		||||
      name = "thumbs";
 | 
			
		||||
      text = ''
 | 
			
		||||
        [Thumbnailer Entry]
 | 
			
		||||
        TryExec=unzip
 | 
			
		||||
        Exec=sh -c "${pkgs.unzip}/bin/unzip -p %i preview.png > %o"
 | 
			
		||||
        MimeType=application/x-krita;
 | 
			
		||||
      '';
 | 
			
		||||
      destination = "/share/thumbnailers/kra.thumbnailer";
 | 
			
		||||
    })
 | 
			
		||||
  ];
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,4 +1,5 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
{ pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  security.sudo.wheelNeedsPassword = false;
 | 
			
		||||
 | 
			
		||||
  # services.getty.autologinUser = "lelgenio";
 | 
			
		||||
| 
						 | 
				
			
			@ -10,7 +11,15 @@
 | 
			
		|||
    isNormalUser = true;
 | 
			
		||||
    description = "Leonardo Eugênio";
 | 
			
		||||
    hashedPassword = "$y$j9T$0e/rczjOVCy7PuwC3pG0V/$gTHZhfO4wQSlFvbDyfghbCnGI2uDI0a52zSrQ/yOA5A";
 | 
			
		||||
    extraGroups = [ "networkmanager" "wheel" "docker" "adbusers" "bluetooth" "corectrl" "vboxusers" ];
 | 
			
		||||
    extraGroups = [
 | 
			
		||||
      "networkmanager"
 | 
			
		||||
      "wheel"
 | 
			
		||||
      "docker"
 | 
			
		||||
      "adbusers"
 | 
			
		||||
      "bluetooth"
 | 
			
		||||
      "corectrl"
 | 
			
		||||
      "vboxusers"
 | 
			
		||||
    ];
 | 
			
		||||
    shell = pkgs.fish;
 | 
			
		||||
    openssh.authorizedKeys.keys = [
 | 
			
		||||
      "ssh-rsa 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 lelgenio@i15"
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue