From 057e8959a006d2ecd509e747285e983ae6c4071d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:29:32 +0200
Subject: [PATCH 1/7] feat: initial microvm framework
---
SwarselSystems.org | 104 +++++++++++++++++++++++
flake.nix | 4 +
modules/nixos/optional/microvm-guest.nix | 64 ++++++++++++++
modules/nixos/optional/microvm-host.nix | 15 ++++
modules/shared/options.nix | 1 +
nix/hosts.nix | 5 ++
6 files changed, 193 insertions(+)
create mode 100644 modules/nixos/optional/microvm-guest.nix
create mode 100644 modules/nixos/optional/microvm-host.nix
diff --git a/SwarselSystems.org b/SwarselSystems.org
index 940be17..4ce21c1 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -483,6 +483,10 @@ A short overview over each input and what it does:
url = "github:sodiboo/niri-flake";
inputs.nixpkgs.follows = "nixpkgs";
};
+ microvm = {
+ url = "github:astro/microvm.nix";
+ inputs.nixpkgs.follows = "nixpkgs";
+ };
};
outputs =
@@ -851,10 +855,15 @@ The rest of the outputs either define or help define the actual configurations:
inputs.nswitch-rcm-nix.nixosModules.nswitch-rcm
inputs.swarsel-modules.nixosModules.default
inputs.niri-flake.nixosModules.niri
+ inputs.microvm.nixosModules.host
+ inputs.microvm.nixosModules.microvm
"${self}/hosts/nixos/${configName}"
"${self}/profiles/nixos"
"${self}/modules/nixos"
{
+
+ microvm.guest.enable = lib.mkDefault false;
+
node = {
name = configName;
secretsDir = ../hosts/nixos/${configName}/secrets;
@@ -10771,6 +10780,100 @@ Options that I need specifically at work. There are more options at [[#h:f0b2ea9
}
#+end_src
+**** microvm-host
+
+Some standard options that should be set for every microvm host.
+
+#+begin_src nix-ts :tangle modules/nixos/optional/microvm-host.nix
+ { lib, config, ... }:
+ {
+ options.swarselmodules.optional.microvmHost = lib.mkEnableOption "optional microvmHost settings";
+ # imports = [
+ # inputs.microvm.nixosModules.host
+ # ];
+
+ config = lib.mkIf (config.swarselmodules.optional.microvmHost && config.swarselsystems.withMicroVMs) {
+
+ microvm = {
+ hypervisor = lib.mkDefault "qemu";
+ };
+ };
+
+ }
+#+end_src
+
+**** microvm-guest
+
+Some standard options that should be set vor every microvm guest. We set the default
+
+#+begin_src nix-ts :tangle modules/nixos/optional/microvm-guest.nix
+ { lib, config, ... }:
+ {
+ options.swarselmodules.optional.microvmGuest = lib.mkEnableOption "optional microvmGuest settings";
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+ config = lib.mkIf config.swarselmodules.optional.microvmGuest
+ {
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+
+ boot.kernelParams = [ "systemd.hostname=${config.networking.hostName}" ];
+
+ node.name = config;
+ documentation.enable = lib.mkForce false;
+
+ microvm = {
+ guest.enable = lib.mkForce true;
+ hypervisor = lib.mkDefault "qemu";
+ mem = lib.mkDefault 1024 * 4;
+ vcpu = lib.mkDefault 4;
+ optimize.enable = false;
+ writableStoreOverlay = "/nix/.rw-store";
+
+ # interfaces = flip lib.mapAttrsToList guestCfg.microvm.interfaces (
+ # _: { mac, hostLink, ...}:
+ # {
+ # type = "macvtap";
+ # id = "vm-${replaceStrings [ ":" ] [ "" ] mac}";
+ # inherit mac;
+ # macvtap = {
+ # link = hostLink;
+ # mode = "bridge";
+ # };
+ # }
+ # );
+ shares =
+ [
+ {
+ source = "/nix/store";
+ mountPoint = "/nix/.ro-store";
+ tag = "ro-store";
+ proto = "virtiofs";
+ }
+ ];
+ };
+ # systemd.network.networks = lib.flip lib.concatMapAttrs guestCfg.microvm.interfaces (
+ # name:
+ # { mac, ... }:
+ # {
+ # "10-${name}".matchConfig = mkForce {
+ # MACAddress = mac;
+ # };
+ # }
+ # );
+
+ };
+ }
+
+#+end_src
+
** Home-manager
:PROPERTIES:
:CUSTOM_ID: h:08ded95b-9c43-475d-a0b2-fc088a512287
@@ -14953,6 +15056,7 @@ TODO: check which of these can be replaced but builtin functions.
default = "swarsel";
};
isCrypted = lib.mkEnableOption "uses full disk encryption";
+ withMicroVMs = lib.mkEnableOption "enable MicroVMs on this host";
isImpermanence = lib.mkEnableOption "use impermanence on this system";
isSecureBoot = lib.mkEnableOption "use secure boot on this system";
diff --git a/flake.nix b/flake.nix
index c6036ef..c7a9310 100644
--- a/flake.nix
+++ b/flake.nix
@@ -90,6 +90,10 @@
url = "github:sodiboo/niri-flake";
inputs.nixpkgs.follows = "nixpkgs";
};
+ microvm = {
+ url = "github:astro/microvm.nix";
+ inputs.nixpkgs.follows = "nixpkgs";
+ };
};
outputs =
diff --git a/modules/nixos/optional/microvm-guest.nix b/modules/nixos/optional/microvm-guest.nix
new file mode 100644
index 0000000..2eed2f8
--- /dev/null
+++ b/modules/nixos/optional/microvm-guest.nix
@@ -0,0 +1,64 @@
+{ lib, config, ... }:
+{
+ options.swarselmodules.optional.microvmGuest = lib.mkEnableOption "optional microvmGuest settings";
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+ config = lib.mkIf config.swarselmodules.optional.microvmGuest
+ {
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+
+ boot.kernelParams = [ "systemd.hostname=${config.networking.hostName}" ];
+
+ node.name = config;
+ documentation.enable = lib.mkForce false;
+
+ microvm = {
+ guest.enable = lib.mkForce true;
+ hypervisor = lib.mkDefault "qemu";
+ mem = lib.mkDefault 1024 * 4;
+ vcpu = lib.mkDefault 4;
+ optimize.enable = false;
+ writableStoreOverlay = "/nix/.rw-store";
+
+ # interfaces = flip lib.mapAttrsToList guestCfg.microvm.interfaces (
+ # _: { mac, hostLink, ...}:
+ # {
+ # type = "macvtap";
+ # id = "vm-${replaceStrings [ ":" ] [ "" ] mac}";
+ # inherit mac;
+ # macvtap = {
+ # link = hostLink;
+ # mode = "bridge";
+ # };
+ # }
+ # );
+ shares =
+ [
+ {
+ source = "/nix/store";
+ mountPoint = "/nix/.ro-store";
+ tag = "ro-store";
+ proto = "virtiofs";
+ }
+ ];
+ };
+ # systemd.network.networks = lib.flip lib.concatMapAttrs guestCfg.microvm.interfaces (
+ # name:
+ # { mac, ... }:
+ # {
+ # "10-${name}".matchConfig = mkForce {
+ # MACAddress = mac;
+ # };
+ # }
+ # );
+
+ };
+}
diff --git a/modules/nixos/optional/microvm-host.nix b/modules/nixos/optional/microvm-host.nix
new file mode 100644
index 0000000..73dac40
--- /dev/null
+++ b/modules/nixos/optional/microvm-host.nix
@@ -0,0 +1,15 @@
+{ lib, config, ... }:
+{
+ options.swarselmodules.optional.microvmHost = lib.mkEnableOption "optional microvmHost settings";
+ # imports = [
+ # inputs.microvm.nixosModules.host
+ # ];
+
+ config = lib.mkIf (config.swarselmodules.optional.microvmHost && config.swarselsystems.withMicroVMs) {
+
+ microvm = {
+ hypervisor = lib.mkDefault "qemu";
+ };
+ };
+
+}
diff --git a/modules/shared/options.nix b/modules/shared/options.nix
index f126351..d73c0a2 100644
--- a/modules/shared/options.nix
+++ b/modules/shared/options.nix
@@ -22,6 +22,7 @@
default = "swarsel";
};
isCrypted = lib.mkEnableOption "uses full disk encryption";
+ withMicroVMs = lib.mkEnableOption "enable MicroVMs on this host";
isImpermanence = lib.mkEnableOption "use impermanence on this system";
isSecureBoot = lib.mkEnableOption "use secure boot on this system";
diff --git a/nix/hosts.nix b/nix/hosts.nix
index 972ddca..2eb1b92 100644
--- a/nix/hosts.nix
+++ b/nix/hosts.nix
@@ -20,10 +20,15 @@
inputs.nswitch-rcm-nix.nixosModules.nswitch-rcm
inputs.swarsel-modules.nixosModules.default
inputs.niri-flake.nixosModules.niri
+ inputs.microvm.nixosModules.host
+ inputs.microvm.nixosModules.microvm
"${self}/hosts/nixos/${configName}"
"${self}/profiles/nixos"
"${self}/modules/nixos"
{
+
+ microvm.guest.enable = lib.mkDefault false;
+
node = {
name = configName;
secretsDir = ../hosts/nixos/${configName}/secrets;
From edf45b7be5f233fc44a53f77dff540660f1b4a86 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:31:48 +0200
Subject: [PATCH 2/7] chore[work]: make app startup consistent
---
SwarselSystems.org | 247 ++++++++++++++++--
modules/home/common/anki-tray.nix | 27 ++
modules/home/common/blueman-applet.nix | 7 +
modules/home/common/element-tray.nix | 27 ++
.../home/common/network-manager-applet.nix | 8 +
modules/home/common/niri.nix | 10 +-
modules/home/common/obsidian-tray.nix | 27 ++
modules/home/common/sway.nix | 10 +-
modules/home/common/vesktop-tray.nix | 27 ++
modules/home/optional/work.nix | 67 ++++-
profiles/home/personal/default.nix | 7 +-
11 files changed, 418 insertions(+), 46 deletions(-)
create mode 100644 modules/home/common/anki-tray.nix
create mode 100644 modules/home/common/blueman-applet.nix
create mode 100644 modules/home/common/element-tray.nix
create mode 100644 modules/home/common/network-manager-applet.nix
create mode 100644 modules/home/common/obsidian-tray.nix
create mode 100644 modules/home/common/vesktop-tray.nix
diff --git a/SwarselSystems.org b/SwarselSystems.org
index 4ce21c1..c3cd341 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -13370,6 +13370,159 @@ The `extraConfig` section here CANNOT be reindented. This has something to do wi
}
#+end_src
+***** blueman-applet
+
+#+begin_src nix-ts :tangle modules/home/common/blueman-applet.nix
+ { lib, config, ... }:
+ {
+ options.swarselmodules.blueman-applet = lib.mkEnableOption "enable blueman applet for tray";
+ config = lib.mkIf config.swarselmodules.blueman-applet {
+ services.blueman-applet.enable = true;
+ };
+ }
+#+end_src
+
+***** network-manager-applet
+
+#+begin_src nix-ts :tangle modules/home/common/network-manager-applet.nix
+ { lib, config, ... }:
+ {
+ options.swarselmodules.nm-applet = lib.mkEnableOption "enable network manager applet for tray";
+ config = lib.mkIf config.swarselmodules.nm-applet {
+ services.network-manager-applet.enable = true;
+ xsession.preferStatusNotifierItems = true; # needed for indicator icon to show
+ };
+ }
+#+end_src
+
+***** obsidian service for tray
+
+#+begin_src nix-ts :tangle modules/home/common/obsidian-tray.nix
+ { lib, config, pkgs, ... }:
+ {
+ options.swarselmodules.obsidian-tray = lib.mkEnableOption "enable obsidian applet for tray";
+ config = lib.mkIf config.swarselmodules.obsidian-tray {
+
+ systemd.user.services.obsidian-applet = {
+ Unit = {
+ Description = "Obsidian applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.obsidian}/bin/obsidian";
+ };
+ };
+ };
+
+ }
+#+end_src
+
+***** anki service for tray
+
+#+begin_src nix-ts :tangle modules/home/common/anki-tray.nix
+ { lib, config, pkgs, ... }:
+ {
+ options.swarselmodules.anki-tray = lib.mkEnableOption "enable anki applet for tray";
+ config = lib.mkIf config.swarselmodules.anki-tray {
+
+ systemd.user.services.anki-applet = {
+ Unit = {
+ Description = "Anki applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.anki-bin}/bin/anki-bin";
+ };
+ };
+
+ };
+ }
+#+end_src
+
+***** element service for tray
+
+#+begin_src nix-ts :tangle modules/home/common/element-tray.nix
+ { lib, config, pkgs, ... }:
+ {
+ options.swarselmodules.element-tray = lib.mkEnableOption "enable element applet for tray";
+ config = lib.mkIf config.swarselmodules.element-tray {
+
+ systemd.user.services.element-applet = {
+ Unit = {
+ Description = "Element applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.element-desktop}/bin/element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds";
+ };
+ };
+ };
+
+ }
+#+end_src
+
+***** vesktop service for tray
+
+#+begin_src nix-ts :tangle modules/home/common/vesktop-tray.nix
+ { lib, config, pkgs, ... }:
+ {
+ options.swarselmodules.vesktop-tray = lib.mkEnableOption "enable vesktop applet for tray";
+ config = lib.mkIf config.swarselmodules.vesktop-tray {
+
+ systemd.user.services.vesktop-applet = {
+ Unit = {
+ Description = "Vesktop applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.vesktop}/bin/vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime";
+ };
+ };
+ };
+
+ }
+#+end_src
+
**** Sway
:PROPERTIES:
:CUSTOM_ID: h:02df9dfc-d1af-4a37-a7a0-d8da0af96a20
@@ -13407,11 +13560,11 @@ Currently, I am too lazy to explain every option here, but most of it is very se
type = lib.types.listOf (lib.types.attrsOf lib.types.str);
default = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
];
};
@@ -13998,11 +14151,11 @@ Currently, I am too lazy to explain every option here, but most of it is very se
"Mod+Shift+0".action = move-column-to-index 0;
};
spawn-at-startup = [
- { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
- { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
- { command = [ "anki" ]; }
- { command = [ "obsidian" ]; }
- { command = [ "nm-applet" ]; }
+ # { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
+ # { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
+ # { command = [ "anki" ]; }
+ # { command = [ "obsidian" ]; }
+ # { command = [ "nm-applet" ]; }
{ command = [ "niri" "msg" "action" "focus-workspace" "2" ]; }
];
workspaces = {
@@ -14783,11 +14936,54 @@ The rest of the settings is at [[#h:bbf2ecb6-c8ff-4462-b5d5-d45b28604ddf][work]]
};
};
- systemd.user.services.pizauth.Service = {
- ExecStartPost = [
- "${pkgs.toybox}/bin/sleep 1"
- "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
- ];
+ systemd.user.services = {
+ pizauth.Service = {
+ ExecStartPost = [
+ "${pkgs.toybox}/bin/sleep 1"
+ "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
+ ];
+ };
+
+ teams-applet = {
+ Unit = {
+ Description = "teams applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.stable.teams-for-linux}/bin/teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true";
+ };
+ };
+
+ onepassword-applet = {
+ Unit = {
+ Description = "1password applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs._1password-gui}/bin/1password";
+ };
+ };
+
};
swarselservices.pizauth = {
@@ -14864,14 +15060,14 @@ The rest of the settings is at [[#h:bbf2ecb6-c8ff-4462-b5d5-d45b28604ddf][work]]
swarselsystems = {
startup = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
- { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
- { command = "1password"; }
+ # { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
+ # { command = "1password"; }
];
monitors = {
work_back_middle = rec {
@@ -17661,7 +17857,12 @@ This holds modules that are to be used on most hosts. These are also the most im
gpgagent = lib.mkDefault true;
gammastep = lib.mkDefault true;
spicetify = lib.mkDefault true;
-
+ blueman-applet = lib.mkDefault true;
+ nm-applet = lib.mkDefault true;
+ obsidian-tray = lib.mkDefault true;
+ anki-tray = lib.mkDefault true;
+ element-tray = lib.mkDefault true;
+ vesktop-tray = lib.mkDefault true;
};
};
diff --git a/modules/home/common/anki-tray.nix b/modules/home/common/anki-tray.nix
new file mode 100644
index 0000000..3cb0f64
--- /dev/null
+++ b/modules/home/common/anki-tray.nix
@@ -0,0 +1,27 @@
+{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.anki-tray = lib.mkEnableOption "enable anki applet for tray";
+ config = lib.mkIf config.swarselmodules.anki-tray {
+
+ systemd.user.services.anki-applet = {
+ Unit = {
+ Description = "Anki applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.anki-bin}/bin/anki-bin";
+ };
+ };
+
+ };
+}
diff --git a/modules/home/common/blueman-applet.nix b/modules/home/common/blueman-applet.nix
new file mode 100644
index 0000000..26e5edd
--- /dev/null
+++ b/modules/home/common/blueman-applet.nix
@@ -0,0 +1,7 @@
+{ lib, config, ... }:
+{
+ options.swarselmodules.blueman-applet = lib.mkEnableOption "enable blueman applet for tray";
+ config = lib.mkIf config.swarselmodules.blueman-applet {
+ services.blueman-applet.enable = true;
+ };
+}
diff --git a/modules/home/common/element-tray.nix b/modules/home/common/element-tray.nix
new file mode 100644
index 0000000..8f8ba76
--- /dev/null
+++ b/modules/home/common/element-tray.nix
@@ -0,0 +1,27 @@
+{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.element-tray = lib.mkEnableOption "enable element applet for tray";
+ config = lib.mkIf config.swarselmodules.element-tray {
+
+ systemd.user.services.element-applet = {
+ Unit = {
+ Description = "Element applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.element-desktop}/bin/element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds";
+ };
+ };
+ };
+
+}
diff --git a/modules/home/common/network-manager-applet.nix b/modules/home/common/network-manager-applet.nix
new file mode 100644
index 0000000..a237ef7
--- /dev/null
+++ b/modules/home/common/network-manager-applet.nix
@@ -0,0 +1,8 @@
+{ lib, config, ... }:
+{
+ options.swarselmodules.nm-applet = lib.mkEnableOption "enable network manager applet for tray";
+ config = lib.mkIf config.swarselmodules.nm-applet {
+ services.network-manager-applet.enable = true;
+ xsession.preferStatusNotifierItems = true; # needed for indicator icon to show
+ };
+}
diff --git a/modules/home/common/niri.nix b/modules/home/common/niri.nix
index 16f173b..e90219c 100644
--- a/modules/home/common/niri.nix
+++ b/modules/home/common/niri.nix
@@ -182,11 +182,11 @@
"Mod+Shift+0".action = move-column-to-index 0;
};
spawn-at-startup = [
- { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
- { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
- { command = [ "anki" ]; }
- { command = [ "obsidian" ]; }
- { command = [ "nm-applet" ]; }
+ # { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
+ # { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
+ # { command = [ "anki" ]; }
+ # { command = [ "obsidian" ]; }
+ # { command = [ "nm-applet" ]; }
{ command = [ "niri" "msg" "action" "focus-workspace" "2" ]; }
];
workspaces = {
diff --git a/modules/home/common/obsidian-tray.nix b/modules/home/common/obsidian-tray.nix
new file mode 100644
index 0000000..b6863c3
--- /dev/null
+++ b/modules/home/common/obsidian-tray.nix
@@ -0,0 +1,27 @@
+{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.obsidian-tray = lib.mkEnableOption "enable obsidian applet for tray";
+ config = lib.mkIf config.swarselmodules.obsidian-tray {
+
+ systemd.user.services.obsidian-applet = {
+ Unit = {
+ Description = "Obsidian applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.obsidian}/bin/obsidian";
+ };
+ };
+ };
+
+}
diff --git a/modules/home/common/sway.nix b/modules/home/common/sway.nix
index a903b0a..6977c49 100644
--- a/modules/home/common/sway.nix
+++ b/modules/home/common/sway.nix
@@ -25,11 +25,11 @@ in
type = lib.types.listOf (lib.types.attrsOf lib.types.str);
default = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
];
};
diff --git a/modules/home/common/vesktop-tray.nix b/modules/home/common/vesktop-tray.nix
new file mode 100644
index 0000000..1d258d7
--- /dev/null
+++ b/modules/home/common/vesktop-tray.nix
@@ -0,0 +1,27 @@
+{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.vesktop-tray = lib.mkEnableOption "enable vesktop applet for tray";
+ config = lib.mkIf config.swarselmodules.vesktop-tray {
+
+ systemd.user.services.vesktop-applet = {
+ Unit = {
+ Description = "Vesktop applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.vesktop}/bin/vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime";
+ };
+ };
+ };
+
+}
diff --git a/modules/home/optional/work.nix b/modules/home/optional/work.nix
index 54e50fe..ef5ca2d 100644
--- a/modules/home/optional/work.nix
+++ b/modules/home/optional/work.nix
@@ -390,11 +390,54 @@ in
};
};
- systemd.user.services.pizauth.Service = {
- ExecStartPost = [
- "${pkgs.toybox}/bin/sleep 1"
- "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
- ];
+ systemd.user.services = {
+ pizauth.Service = {
+ ExecStartPost = [
+ "${pkgs.toybox}/bin/sleep 1"
+ "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
+ ];
+ };
+
+ teams-applet = {
+ Unit = {
+ Description = "teams applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.stable.teams-for-linux}/bin/teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true";
+ };
+ };
+
+ onepassword-applet = {
+ Unit = {
+ Description = "1password applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs._1password-gui}/bin/1password";
+ };
+ };
+
};
swarselservices.pizauth = {
@@ -471,14 +514,14 @@ in
swarselsystems = {
startup = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
- { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
- { command = "1password"; }
+ # { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
+ # { command = "1password"; }
];
monitors = {
work_back_middle = rec {
diff --git a/profiles/home/personal/default.nix b/profiles/home/personal/default.nix
index 6cb38ec..45cb791 100644
--- a/profiles/home/personal/default.nix
+++ b/profiles/home/personal/default.nix
@@ -42,7 +42,12 @@
gpgagent = lib.mkDefault true;
gammastep = lib.mkDefault true;
spicetify = lib.mkDefault true;
-
+ blueman-applet = lib.mkDefault true;
+ nm-applet = lib.mkDefault true;
+ obsidian-tray = lib.mkDefault true;
+ anki-tray = lib.mkDefault true;
+ element-tray = lib.mkDefault true;
+ vesktop-tray = lib.mkDefault true;
};
};
From 8379703b93907e299eef9d2ad503693422b29b0b Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:33:17 +0200
Subject: [PATCH 3/7] fix[servers]: fix several issues
- winters: flake path was set wrongly
- spotifyd: could not connect (added hosts entry)
- nextcloud: plugins used outdated nextcloud version
- nextcloud: allow all upload sizes on proxy
- matrix: adapt to new bridge config schema
---
SwarselSystems.org | 37 ++++++++++++++++++++++--------
hosts/nixos/winters/default.nix | 1 +
modules/nixos/client/network.nix | 3 +++
modules/nixos/server/matrix.nix | 16 ++++++-------
modules/nixos/server/nextcloud.nix | 5 +++-
modules/nixos/server/spotifyd.nix | 12 +++++++++-
6 files changed, 54 insertions(+), 20 deletions(-)
diff --git a/SwarselSystems.org b/SwarselSystems.org
index c3cd341..79fa927 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -2383,6 +2383,7 @@ This is my main server that I run at home. It handles most tasks that require bi
swarselsystems = {
info = "ASRock J4105-ITX, 32GB RAM";
+ flakePath = "/root/.dotfiles";
isImpermanence = false;
isSecureBoot = true;
isCrypted = true;
@@ -4971,6 +4972,9 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
networking = {
inherit (config.swarselsystems) hostName;
+ hosts = {
+ "192.168.178.24" = [ "store.swarsel.win" ];
+ };
wireless.iwd = {
enable = true;
settings = {
@@ -6786,6 +6790,13 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
services.pipewire.systemWide = true;
+ # https://github.com/Spotifyd/spotifyd/issues/1366
+ networking.hosts."0.0.0.0" = [ "apresolve.spotify.com" ];
+
+ # hacky way to enable multi-session
+ # when another user connects, the service will crash and the new user will login
+ systemd.services.spotifyd.serviceConfig.RestartSec = lib.mkForce 1;
+
services.spotifyd = {
enable = true;
settings = {
@@ -6793,8 +6804,11 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
dbus_type = "session";
use_mpris = false;
device = "sysdefault:CARD=PCH";
+ # device = "default";
device_name = "SwarselSpot";
- mixer = "alsa";
+ # backend = "pulseaudio";
+ backend = "alsa";
+ # mixer = "alsa";
zeroconf_port = servicePort;
};
};
@@ -7154,14 +7168,14 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString whatsappPort}";
hostname = "0.0.0.0";
port = whatsappPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .FullName .PushName .JID}} (WA)";
@@ -7201,14 +7215,14 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-signal?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString signalPort}";
hostname = "0.0.0.0";
port = signalPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-signal?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .ContactName .ProfileName .PhoneNumber}} (Signal)";
@@ -7332,7 +7346,7 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
configureRedis = true;
maxUploadSize = "4G";
extraApps = {
- inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
+ inherit (pkgs.nextcloud31Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
};
extraAppsEnable = true;
config = {
@@ -7359,6 +7373,9 @@ Here I am forcing =startWhenNeeded= to false so that the value will not be set t
locations = {
"/" = {
proxyPass = "http://${serviceName}";
+ extraConfig = ''
+ client_max_body_size 0;
+ '';
};
};
};
diff --git a/hosts/nixos/winters/default.nix b/hosts/nixos/winters/default.nix
index 0c60f22..38207d8 100644
--- a/hosts/nixos/winters/default.nix
+++ b/hosts/nixos/winters/default.nix
@@ -22,6 +22,7 @@
swarselsystems = {
info = "ASRock J4105-ITX, 32GB RAM";
+ flakePath = "/root/.dotfiles";
isImpermanence = false;
isSecureBoot = true;
isCrypted = true;
diff --git a/modules/nixos/client/network.nix b/modules/nixos/client/network.nix
index 7c23b32..763b3da 100644
--- a/modules/nixos/client/network.nix
+++ b/modules/nixos/client/network.nix
@@ -49,6 +49,9 @@ in
networking = {
inherit (config.swarselsystems) hostName;
+ hosts = {
+ "192.168.178.24" = [ "store.swarsel.win" ];
+ };
wireless.iwd = {
enable = true;
settings = {
diff --git a/modules/nixos/server/matrix.nix b/modules/nixos/server/matrix.nix
index 1544331..24f4530 100644
--- a/modules/nixos/server/matrix.nix
+++ b/modules/nixos/server/matrix.nix
@@ -215,14 +215,14 @@ in
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString whatsappPort}";
hostname = "0.0.0.0";
port = whatsappPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .FullName .PushName .JID}} (WA)";
@@ -262,14 +262,14 @@ in
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-signal?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString signalPort}";
hostname = "0.0.0.0";
port = signalPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-signal?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .ContactName .ProfileName .PhoneNumber}} (Signal)";
diff --git a/modules/nixos/server/nextcloud.nix b/modules/nixos/server/nextcloud.nix
index 13d671d..36765d2 100644
--- a/modules/nixos/server/nextcloud.nix
+++ b/modules/nixos/server/nextcloud.nix
@@ -37,7 +37,7 @@ in
configureRedis = true;
maxUploadSize = "4G";
extraApps = {
- inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
+ inherit (pkgs.nextcloud31Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
};
extraAppsEnable = true;
config = {
@@ -64,6 +64,9 @@ in
locations = {
"/" = {
proxyPass = "http://${serviceName}";
+ extraConfig = ''
+ client_max_body_size 0;
+ '';
};
};
};
diff --git a/modules/nixos/server/spotifyd.nix b/modules/nixos/server/spotifyd.nix
index ef4babd..fd12435 100644
--- a/modules/nixos/server/spotifyd.nix
+++ b/modules/nixos/server/spotifyd.nix
@@ -23,6 +23,13 @@ in
services.pipewire.systemWide = true;
+ # https://github.com/Spotifyd/spotifyd/issues/1366
+ networking.hosts."0.0.0.0" = [ "apresolve.spotify.com" ];
+
+ # hacky way to enable multi-session
+ # when another user connects, the service will crash and the new user will login
+ systemd.services.spotifyd.serviceConfig.RestartSec = lib.mkForce 1;
+
services.spotifyd = {
enable = true;
settings = {
@@ -30,8 +37,11 @@ in
dbus_type = "session";
use_mpris = false;
device = "sysdefault:CARD=PCH";
+ # device = "default";
device_name = "SwarselSpot";
- mixer = "alsa";
+ # backend = "pulseaudio";
+ backend = "alsa";
+ # mixer = "alsa";
zeroconf_port = servicePort;
};
};
From f4d9a0e5d31217c7fbfc131e7a30b4194a431586 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:37:47 +0200
Subject: [PATCH 4/7] chore: update flake
---
SwarselSystems.org | 78 +-
flake.lock | 3450 +++++++++++++----
flake.nix | 11 +-
.../nixos/pyramid/hardware-configuration.nix | 3 +-
modules/home/common/desktop.nix | 51 +-
modules/home/common/programs.nix | 6 +-
modules/nixos/client/packages.nix | 1 -
modules/nixos/optional/amdgpu.nix | 9 +-
modules/nixos/optional/framework.nix | 7 +-
modules/nixos/optional/work.nix | 3 +-
10 files changed, 2848 insertions(+), 771 deletions(-)
diff --git a/SwarselSystems.org b/SwarselSystems.org
index 79fa927..323f4d1 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -1979,7 +1979,8 @@ My work machine. Built for more security, this is the gold standard of my config
# '';
boot = {
- kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ # kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ kernelPackages = lib.mkDefault pkgs.linuxPackages_latest;
binfmt.emulatedSystems = [ "aarch64-linux" ];
initrd = {
availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "cryptd" "usbhid" "sd_mod" "r8152" ];
@@ -4694,7 +4695,6 @@ Mostly used to install some compilers and lsp's that I want to have available wh
nixd
zig
zls
- ansible-language-server
elk-to-svg
@@ -10439,11 +10439,8 @@ This smashes Atmosphere 1.3.2 on the switch, which is what I am currenty using.
This holds configuration that is specific to framework laptops.
#+begin_src nix-ts :tangle modules/nixos/optional/framework.nix
- { lib, config, inputs, ... }:
+ { lib, config, ... }:
{
- # imports = [
- # inputs.fw-fanctrl.nixosModules.default
- # ];
options.swarselmodules.optional.framework = lib.mkEnableOption "optional framework machine settings";
config = lib.mkIf config.swarselmodules.optional.framework {
services = {
@@ -10502,10 +10499,11 @@ This holds configuration that is specific to framework laptops.
hardware = {
amdgpu = {
opencl.enable = true;
- amdvlk = {
- enable = true;
- support32Bit.enable = true;
- };
+ initrd.enable = true;
+ # amdvlk = {
+ # enable = true;
+ # support32Bit.enable = true;
+ # };
};
};
};
@@ -10732,7 +10730,8 @@ Options that I need specifically at work. There are more options at [[#h:f0b2ea9
govc
terraform
opentofu
- dev.terragrunt
+ # dev.terragrunt
+ terragrunt
graphviz
azure-cli
@@ -11546,46 +11545,47 @@ TODO: Non-NixOS machines (=sp3) should not use these by default, but instead the
};
xdg.mimeApps = {
-
enable = true;
defaultApplications = {
- "x-scheme-handler/http" = [ "firefox.desktop" ];
- "x-scheme-handler/https" = [ "firefox.desktop" ];
- "x-scheme-handler/chrome" = [ "firefox.desktop" ];
- "text/plain" = [ "emacsclient.desktop" ];
- "text/csv" = [ "emacsclient.desktop" ];
- "text/html" = [ "firefox.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
+ "application/metalink+xml" = [ "emacsclient.desktop" ];
+ "application/msword" = [ "writer.desktop" ];
+ "application/pdf" = [ "org.gnome.Evince.desktop" ];
+ "application/sql" = [ "emacsclient.desktop" ];
+ "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
"application/x-extension-htm" = [ "firefox.desktop" ];
"application/x-extension-html" = [ "firefox.desktop" ];
"application/x-extension-shtml" = [ "firefox.desktop" ];
- "application/xhtml+xml" = [ "firefox.desktop" ];
- "application/x-extension-xhtml" = [ "firefox.desktop" ];
"application/x-extension-xht" = [ "firefox.desktop" ];
- "image/png" = [ "imv.desktop" ];
- "image/jpeg" = [ "imv.desktop" ];
- "image/gif" = [ "imv.desktop" ];
- "image/svg" = [ "imv.desktop" ];
- "image/webp" = [ "firefox.desktop" ];
- "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
- "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "application/x-extension-xhtml" = [ "firefox.desktop" ];
+ "application/xhtml+xml" = [ "firefox.desktop" ];
"audio/flac" = [ "mpv.desktop" ];
"audio/mp3" = [ "mpv.desktop" ];
"audio/ogg" = [ "mpv.desktop" ];
"audio/wav" = [ "mpv.desktop" ];
- "video/mp4" = [ "umpv.desktop" ];
- "video/mkv" = [ "umpv.desktop" ];
- "video/flv" = [ "umpv.desktop" ];
+ "image/gif" = [ "imv.desktop" ];
+ "image/jpeg" = [ "imv.desktop" ];
+ "image/png" = [ "imv.desktop" ];
+ "image/svg" = [ "imv.desktop" ];
+ "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
+ "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "image/webp" = [ "firefox.desktop" ];
+ "text/csv" = [ "emacsclient.desktop" ];
+ "text/html" = [ "firefox.desktop" ];
+ "text/plain" = [ "emacsclient.desktop" ];
"video/3gp" = [ "umpv.desktop" ];
- "application/pdf" = [ "org.gnome.Evince.desktop" ];
- "application/metalink+xml" = [ "emacsclient.desktop" ];
- "application/sql" = [ "emacsclient.desktop" ];
- "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
- "application/msword" = [ "writer.desktop" ];
- "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "video/flv" = [ "umpv.desktop" ];
+ "video/mkv" = [ "umpv.desktop" ];
+ "video/mp4" = [ "umpv.desktop" ];
+ "x-scheme-handler/chrome" = [ "firefox.desktop" ];
+ "x-scheme-handler/http" = [ "firefox.desktop" ];
+ "x-scheme-handler/https" = [ "firefox.desktop" ];
};
associations = {
added = {
"application/x-zerosize" = [ "emacsclient.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
};
};
};
@@ -11714,7 +11714,11 @@ This section is for programs that require no further configuration. zsh Integrat
jq.enable = true;
ripgrep.enable = true;
pandoc.enable = true;
- # fzf.enable = true;
+ fzf = {
+ enable = true;
+ enableBashIntegration = false;
+ enableZshIntegration = false;
+ };
zoxide = {
enable = true;
enableZshIntegration = true;
diff --git a/flake.lock b/flake.lock
index b385dcf..f5b7234 100644
--- a/flake.lock
+++ b/flake.lock
@@ -98,6 +98,22 @@
"type": "github"
}
},
+ "base16-fish_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1622559957,
+ "narHash": "sha256-PebymhVYbL8trDVVXxCvZgc0S5VxI7I1Hv4RMSquTpA=",
+ "owner": "tomyun",
+ "repo": "base16-fish",
+ "rev": "2f6dd973a9075dabccd26f1cded09508180bf5fe",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tomyun",
+ "repo": "base16-fish",
+ "type": "github"
+ }
+ },
"base16-helix": {
"flake": false,
"locked": {
@@ -147,6 +163,22 @@
}
},
"base16-helix_4": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1752979451,
+ "narHash": "sha256-0CQM+FkYy0fOO/sMGhOoNL80ftsAzYCg9VhIrodqusM=",
+ "owner": "tinted-theming",
+ "repo": "base16-helix",
+ "rev": "27cf1e66e50abc622fb76a3019012dc07c678fac",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "base16-helix",
+ "type": "github"
+ }
+ },
+ "base16-helix_5": {
"flake": false,
"locked": {
"lastModified": 1748408240,
@@ -162,7 +194,7 @@
"type": "github"
}
},
- "base16-helix_5": {
+ "base16-helix_6": {
"flake": false,
"locked": {
"lastModified": 1748408240,
@@ -263,6 +295,23 @@
"type": "github"
}
},
+ "base16-vim_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1732806396,
+ "narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
+ "owner": "tinted-theming",
+ "repo": "base16-vim",
+ "rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "base16-vim",
+ "rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
+ "type": "github"
+ }
+ },
"base16_2": {
"inputs": {
"fromYaml": "fromYaml_2"
@@ -286,11 +335,11 @@
"fromYaml": "fromYaml_3"
},
"locked": {
- "lastModified": 1746562888,
- "narHash": "sha256-YgNJQyB5dQiwavdDFBMNKk1wyS77AtdgDk/VtU6wEaI=",
+ "lastModified": 1755819240,
+ "narHash": "sha256-qcMhnL7aGAuFuutH4rq9fvAhCpJWVHLcHVZLtPctPlo=",
"owner": "SenchoPens",
"repo": "base16.nix",
- "rev": "806a1777a5db2a1ef9d5d6f493ef2381047f2b89",
+ "rev": "75ed5e5e3fce37df22e49125181fa37899c3ccd6",
"type": "github"
},
"original": {
@@ -335,6 +384,24 @@
"type": "github"
}
},
+ "base16_6": {
+ "inputs": {
+ "fromYaml": "fromYaml_6"
+ },
+ "locked": {
+ "lastModified": 1746562888,
+ "narHash": "sha256-YgNJQyB5dQiwavdDFBMNKk1wyS77AtdgDk/VtU6wEaI=",
+ "owner": "SenchoPens",
+ "repo": "base16.nix",
+ "rev": "806a1777a5db2a1ef9d5d6f493ef2381047f2b89",
+ "type": "github"
+ },
+ "original": {
+ "owner": "SenchoPens",
+ "repo": "base16.nix",
+ "type": "github"
+ }
+ },
"crane": {
"locked": {
"lastModified": 1754269165,
@@ -365,6 +432,36 @@
"type": "github"
}
},
+ "crane_11": {
+ "locked": {
+ "lastModified": 1754269165,
+ "narHash": "sha256-0tcS8FHd4QjbCVoxN9jI+PjHgA4vc/IjkUSp+N3zy0U=",
+ "owner": "ipetkov",
+ "repo": "crane",
+ "rev": "444e81206df3f7d92780680e45858e31d2f07a08",
+ "type": "github"
+ },
+ "original": {
+ "owner": "ipetkov",
+ "repo": "crane",
+ "type": "github"
+ }
+ },
+ "crane_12": {
+ "locked": {
+ "lastModified": 1754269165,
+ "narHash": "sha256-0tcS8FHd4QjbCVoxN9jI+PjHgA4vc/IjkUSp+N3zy0U=",
+ "owner": "ipetkov",
+ "repo": "crane",
+ "rev": "444e81206df3f7d92780680e45858e31d2f07a08",
+ "type": "github"
+ },
+ "original": {
+ "owner": "ipetkov",
+ "repo": "crane",
+ "type": "github"
+ }
+ },
"crane_2": {
"locked": {
"lastModified": 1754269165,
@@ -397,11 +494,11 @@
},
"crane_4": {
"locked": {
- "lastModified": 1750266157,
- "narHash": "sha256-tL42YoNg9y30u7zAqtoGDNdTyXTi8EALDeCB13FtbQA=",
+ "lastModified": 1754269165,
+ "narHash": "sha256-0tcS8FHd4QjbCVoxN9jI+PjHgA4vc/IjkUSp+N3zy0U=",
"owner": "ipetkov",
"repo": "crane",
- "rev": "e37c943371b73ed87faf33f7583860f81f1d5a48",
+ "rev": "444e81206df3f7d92780680e45858e31d2f07a08",
"type": "github"
},
"original": {
@@ -472,11 +569,11 @@
},
"crane_9": {
"locked": {
- "lastModified": 1754269165,
- "narHash": "sha256-0tcS8FHd4QjbCVoxN9jI+PjHgA4vc/IjkUSp+N3zy0U=",
+ "lastModified": 1750266157,
+ "narHash": "sha256-tL42YoNg9y30u7zAqtoGDNdTyXTi8EALDeCB13FtbQA=",
"owner": "ipetkov",
"repo": "crane",
- "rev": "444e81206df3f7d92780680e45858e31d2f07a08",
+ "rev": "e37c943371b73ed87faf33f7583860f81f1d5a48",
"type": "github"
},
"original": {
@@ -530,6 +627,57 @@
"type": "github"
}
},
+ "devshell_11": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1741473158,
+ "narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
+ "owner": "numtide",
+ "repo": "devshell",
+ "rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "devshell",
+ "type": "github"
+ }
+ },
+ "devshell_12": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-topology",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1728330715,
+ "narHash": "sha256-xRJ2nPOXb//u1jaBnDP56M7v5ldavjbtR6lfGqSvcKg=",
+ "owner": "numtide",
+ "repo": "devshell",
+ "rev": "dd6b80932022cea34a019e2bb32f6fa9e494dfef",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "devshell",
+ "type": "github"
+ }
+ },
"devshell_2": {
"inputs": {
"nixpkgs": [
@@ -738,11 +886,11 @@
]
},
"locked": {
- "lastModified": 1757508292,
- "narHash": "sha256-7lVWL5bC6xBIMWWDal41LlGAG+9u2zUorqo3QCUL4p4=",
+ "lastModified": 1758287904,
+ "narHash": "sha256-IGmaEf3Do8o5Cwp1kXBN1wQmZwQN3NLfq5t4nHtVtcU=",
"owner": "nix-community",
"repo": "disko",
- "rev": "146f45bee02b8bd88812cfce6ffc0f933788875a",
+ "rev": "67ff9807dd148e704baadbd4fd783b54282ca627",
"type": "github"
},
"original": {
@@ -760,11 +908,11 @@
]
},
"locked": {
- "lastModified": 1753140376,
- "narHash": "sha256-7lrVrE0jSvZHrxEzvnfHFE/Wkk9DDqb+mYCodI5uuB8=",
+ "lastModified": 1757508292,
+ "narHash": "sha256-7lVWL5bC6xBIMWWDal41LlGAG+9u2zUorqo3QCUL4p4=",
"owner": "nix-community",
"repo": "disko",
- "rev": "545aba02960caa78a31bd9a8709a0ad4b6320a5c",
+ "rev": "146f45bee02b8bd88812cfce6ffc0f933788875a",
"type": "github"
},
"original": {
@@ -783,11 +931,11 @@
]
},
"locked": {
- "lastModified": 1751854533,
- "narHash": "sha256-U/OQFplExOR1jazZY4KkaQkJqOl59xlh21HP9mI79Vc=",
+ "lastModified": 1753140376,
+ "narHash": "sha256-7lrVrE0jSvZHrxEzvnfHFE/Wkk9DDqb+mYCodI5uuB8=",
"owner": "nix-community",
"repo": "disko",
- "rev": "16b74a1e304197248a1bc663280f2548dbfcae3c",
+ "rev": "545aba02960caa78a31bd9a8709a0ad4b6320a5c",
"type": "github"
},
"original": {
@@ -820,6 +968,31 @@
"type": "github"
}
},
+ "disko_6": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1751854533,
+ "narHash": "sha256-U/OQFplExOR1jazZY4KkaQkJqOl59xlh21HP9mI79Vc=",
+ "owner": "nix-community",
+ "repo": "disko",
+ "rev": "16b74a1e304197248a1bc663280f2548dbfcae3c",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "disko",
+ "type": "github"
+ }
+ },
"emacs-overlay": {
"inputs": {
"nixpkgs": [
@@ -828,11 +1001,11 @@
"nixpkgs-stable": "nixpkgs-stable"
},
"locked": {
- "lastModified": 1758705066,
- "narHash": "sha256-CFVYMyz/p4c/w0E2BLz/dCmjl4zfJRUS+ERUJmaZj+E=",
+ "lastModified": 1759770590,
+ "narHash": "sha256-ex/JTut0wrrVHFWwNIuBAlnR71R7dletYxcJEH9NYAw=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "d8da68a0986380aca8ee9d277dfc4bcb0761a278",
+ "rev": "4e4ed8f8beda9d47887cf4411720cb8a83a43e90",
"type": "github"
},
"original": {
@@ -850,11 +1023,11 @@
"nixpkgs-stable": "nixpkgs-stable_4"
},
"locked": {
- "lastModified": 1757927471,
- "narHash": "sha256-odfHgmioy0yGxiAFTnAq7SMYTLUv1JApKES5i2KfS4c=",
+ "lastModified": 1758705066,
+ "narHash": "sha256-CFVYMyz/p4c/w0E2BLz/dCmjl4zfJRUS+ERUJmaZj+E=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "6302a8a5904203bc18532e71b3d61f4b324d20fb",
+ "rev": "d8da68a0986380aca8ee9d277dfc4bcb0761a278",
"type": "github"
},
"original": {
@@ -873,11 +1046,11 @@
"nixpkgs-stable": "nixpkgs-stable_7"
},
"locked": {
- "lastModified": 1754705618,
- "narHash": "sha256-JYwLLpnzJz0+ihJrwZUTAodx2+iBPWfnmfhJy3lpSw4=",
+ "lastModified": 1757927471,
+ "narHash": "sha256-odfHgmioy0yGxiAFTnAq7SMYTLUv1JApKES5i2KfS4c=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "c5aea4616a2c482eb3f1765f90de9771ba1d134a",
+ "rev": "6302a8a5904203bc18532e71b3d61f4b324d20fb",
"type": "github"
},
"original": {
@@ -897,11 +1070,11 @@
"nixpkgs-stable": "nixpkgs-stable_10"
},
"locked": {
- "lastModified": 1751908357,
- "narHash": "sha256-7JeYhMYTdfzHsFfGZRUM+t0nx4HdYa3oaMH2B/qz9MA=",
+ "lastModified": 1754705618,
+ "narHash": "sha256-JYwLLpnzJz0+ihJrwZUTAodx2+iBPWfnmfhJy3lpSw4=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "8e4ecd7c43c5e061dd2fc4d9d1994ec4d67cab2e",
+ "rev": "c5aea4616a2c482eb3f1765f90de9771ba1d134a",
"type": "github"
},
"original": {
@@ -919,7 +1092,33 @@
"swarsel",
"nixpkgs"
],
- "nixpkgs-stable": "nixpkgs-stable_12"
+ "nixpkgs-stable": "nixpkgs-stable_13"
+ },
+ "locked": {
+ "lastModified": 1751908357,
+ "narHash": "sha256-7JeYhMYTdfzHsFfGZRUM+t0nx4HdYa3oaMH2B/qz9MA=",
+ "owner": "nix-community",
+ "repo": "emacs-overlay",
+ "rev": "8e4ecd7c43c5e061dd2fc4d9d1994ec4d67cab2e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "emacs-overlay",
+ "type": "github"
+ }
+ },
+ "emacs-overlay_6": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ],
+ "nixpkgs-stable": "nixpkgs-stable_15"
},
"locked": {
"lastModified": 1751908357,
@@ -938,11 +1137,11 @@
"firefox-gnome-theme": {
"flake": false,
"locked": {
- "lastModified": 1756083905,
- "narHash": "sha256-UqYGTBgI5ypGh0Kf6zZjom/vABg7HQocB4gmxzl12uo=",
+ "lastModified": 1758112371,
+ "narHash": "sha256-lizRM2pj6PHrR25yimjyFn04OS4wcdbc38DCdBVa2rk=",
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
- "rev": "b655eaf16d4cbec9c3472f62eee285d4b419a808",
+ "rev": "0909cfe4a2af8d358ad13b20246a350e14c2473d",
"type": "github"
},
"original": {
@@ -970,11 +1169,11 @@
"firefox-gnome-theme_3": {
"flake": false,
"locked": {
- "lastModified": 1748383148,
- "narHash": "sha256-pGvD/RGuuPf/4oogsfeRaeMm6ipUIznI2QSILKjKzeA=",
+ "lastModified": 1756083905,
+ "narHash": "sha256-UqYGTBgI5ypGh0Kf6zZjom/vABg7HQocB4gmxzl12uo=",
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
- "rev": "4eb2714fbed2b80e234312611a947d6cb7d70caf",
+ "rev": "b655eaf16d4cbec9c3472f62eee285d4b419a808",
"type": "github"
},
"original": {
@@ -1015,14 +1214,30 @@
"type": "github"
}
},
+ "firefox-gnome-theme_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1748383148,
+ "narHash": "sha256-pGvD/RGuuPf/4oogsfeRaeMm6ipUIznI2QSILKjKzeA=",
+ "owner": "rafaelmardojai",
+ "repo": "firefox-gnome-theme",
+ "rev": "4eb2714fbed2b80e234312611a947d6cb7d70caf",
+ "type": "github"
+ },
+ "original": {
+ "owner": "rafaelmardojai",
+ "repo": "firefox-gnome-theme",
+ "type": "github"
+ }
+ },
"flake-compat": {
"flake": false,
"locked": {
- "lastModified": 1733328505,
- "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
"type": "github"
},
"original": {
@@ -1034,11 +1249,11 @@
"flake-compat_10": {
"flake": false,
"locked": {
- "lastModified": 1747046372,
- "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
@@ -1050,11 +1265,11 @@
"flake-compat_11": {
"flake": false,
"locked": {
- "lastModified": 1696426674,
- "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
"type": "github"
},
"original": {
@@ -1066,11 +1281,11 @@
"flake-compat_12": {
"flake": false,
"locked": {
- "lastModified": 1747046372,
- "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+ "lastModified": 1733328505,
+ "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+ "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
"type": "github"
},
"original": {
@@ -1082,11 +1297,11 @@
"flake-compat_13": {
"flake": false,
"locked": {
- "lastModified": 1733328505,
- "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
"type": "github"
},
"original": {
@@ -1096,6 +1311,22 @@
}
},
"flake-compat_14": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
+ "flake-compat_15": {
"flake": false,
"locked": {
"lastModified": 1747046372,
@@ -1111,39 +1342,7 @@
"type": "github"
}
},
- "flake-compat_15": {
- "flake": false,
- "locked": {
- "lastModified": 1696426674,
- "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
- "owner": "edolstra",
- "repo": "flake-compat",
- "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
- "type": "github"
- },
- "original": {
- "owner": "edolstra",
- "repo": "flake-compat",
- "type": "github"
- }
- },
"flake-compat_16": {
- "flake": false,
- "locked": {
- "lastModified": 1696426674,
- "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
- "owner": "edolstra",
- "repo": "flake-compat",
- "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
- "type": "github"
- },
- "original": {
- "owner": "edolstra",
- "repo": "flake-compat",
- "type": "github"
- }
- },
- "flake-compat_17": {
"flake": false,
"locked": {
"lastModified": 1733328505,
@@ -1159,7 +1358,7 @@
"type": "github"
}
},
- "flake-compat_18": {
+ "flake-compat_17": {
"flake": false,
"locked": {
"lastModified": 1747046372,
@@ -1175,6 +1374,22 @@
"type": "github"
}
},
+ "flake-compat_18": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
"flake-compat_19": {
"flake": false,
"locked": {
@@ -1192,6 +1407,38 @@
}
},
"flake-compat_2": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
+ "flake-compat_20": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1733328505,
+ "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
+ "flake-compat_21": {
"flake": false,
"locked": {
"lastModified": 1747046372,
@@ -1207,7 +1454,23 @@
"type": "github"
}
},
- "flake-compat_20": {
+ "flake-compat_22": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
+ "flake-compat_23": {
"flake": false,
"locked": {
"lastModified": 1696426674,
@@ -1226,11 +1489,11 @@
"flake-compat_3": {
"flake": false,
"locked": {
- "lastModified": 1696426674,
- "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
"type": "github"
},
"original": {
@@ -1240,22 +1503,6 @@
}
},
"flake-compat_4": {
- "flake": false,
- "locked": {
- "lastModified": 1747046372,
- "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
- "owner": "edolstra",
- "repo": "flake-compat",
- "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
- "type": "github"
- },
- "original": {
- "owner": "edolstra",
- "repo": "flake-compat",
- "type": "github"
- }
- },
- "flake-compat_5": {
"flake": false,
"locked": {
"lastModified": 1733328505,
@@ -1271,7 +1518,7 @@
"type": "github"
}
},
- "flake-compat_6": {
+ "flake-compat_5": {
"flake": false,
"locked": {
"lastModified": 1747046372,
@@ -1287,7 +1534,7 @@
"type": "github"
}
},
- "flake-compat_7": {
+ "flake-compat_6": {
"flake": false,
"locked": {
"lastModified": 1696426674,
@@ -1303,7 +1550,7 @@
"type": "github"
}
},
- "flake-compat_8": {
+ "flake-compat_7": {
"flake": false,
"locked": {
"lastModified": 1747046372,
@@ -1319,7 +1566,7 @@
"type": "github"
}
},
- "flake-compat_9": {
+ "flake-compat_8": {
"flake": false,
"locked": {
"lastModified": 1733328505,
@@ -1335,16 +1582,32 @@
"type": "github"
}
},
+ "flake-compat_9": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1747046372,
+ "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+ "type": "github"
+ },
+ "original": {
+ "owner": "edolstra",
+ "repo": "flake-compat",
+ "type": "github"
+ }
+ },
"flake-parts": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
- "lastModified": 1756770412,
- "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
+ "lastModified": 1759362264,
+ "narHash": "sha256-wfG0S7pltlYyZTM+qqlhJ7GMw2fTF4mLKCIVhLii/4M=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "4524271976b625a4a605beefd893f270620fd751",
+ "rev": "758cf7296bee11f1706a574c77d072b8a7baa881",
"type": "github"
},
"original": {
@@ -1380,11 +1643,11 @@
"nixpkgs-lib": "nixpkgs-lib_5"
},
"locked": {
- "lastModified": 1754487366,
- "narHash": "sha256-pHYj8gUBapuUzKV/kN/tR3Zvqc7o6gdFB9XKXIp1SQ8=",
+ "lastModified": 1756770412,
+ "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "af66ad14b28a127c5c0f3bbb298218fc63528a18",
+ "rev": "4524271976b625a4a605beefd893f270620fd751",
"type": "github"
},
"original": {
@@ -1466,11 +1729,11 @@
]
},
"locked": {
- "lastModified": 1751413152,
- "narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
+ "lastModified": 1756770412,
+ "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
+ "rev": "4524271976b625a4a605beefd893f270620fd751",
"type": "github"
},
"original": {
@@ -1484,11 +1747,11 @@
"nixpkgs-lib": "nixpkgs-lib_7"
},
"locked": {
- "lastModified": 1751413152,
- "narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
+ "lastModified": 1754487366,
+ "narHash": "sha256-pHYj8gUBapuUzKV/kN/tR3Zvqc7o6gdFB9XKXIp1SQ8=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
+ "rev": "af66ad14b28a127c5c0f3bbb298218fc63528a18",
"type": "github"
},
"original": {
@@ -1508,11 +1771,11 @@
]
},
"locked": {
- "lastModified": 1749398372,
- "narHash": "sha256-tYBdgS56eXYaWVW3fsnPQ/nFlgWi/Z2Ymhyu21zVM98=",
+ "lastModified": 1754091436,
+ "narHash": "sha256-XKqDMN1/Qj1DKivQvscI4vmHfDfvYR2pfuFOJiCeewM=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "9305fe4e5c2a6fcf5ba6a3ff155720fbe4076569",
+ "rev": "67df8c627c2c39c41dbec76a1f201929929ab0bd",
"type": "github"
},
"original": {
@@ -1594,11 +1857,11 @@
]
},
"locked": {
- "lastModified": 1743550720,
- "narHash": "sha256-hIshGgKZCgWh6AYJpJmRgFdR3WUbkY04o82X05xqQiY=",
+ "lastModified": 1751413152,
+ "narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "c621e8422220273271f52058f618c94e405bb0f5",
+ "rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
"type": "github"
},
"original": {
@@ -1722,11 +1985,11 @@
"nixpkgs-lib": "nixpkgs-lib_11"
},
"locked": {
- "lastModified": 1754487366,
- "narHash": "sha256-pHYj8gUBapuUzKV/kN/tR3Zvqc7o6gdFB9XKXIp1SQ8=",
+ "lastModified": 1751413152,
+ "narHash": "sha256-Tyw1RjYEsp5scoigs1384gIg6e0GoBVjms4aXFfRssQ=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "af66ad14b28a127c5c0f3bbb298218fc63528a18",
+ "rev": "77826244401ea9de6e3bac47c2db46005e1f30b5",
"type": "github"
},
"original": {
@@ -1737,14 +2000,22 @@
},
"flake-parts_27": {
"inputs": {
- "nixpkgs-lib": "nixpkgs-lib_12"
+ "nixpkgs-lib": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "lanzaboote",
+ "nixpkgs"
+ ]
},
"locked": {
- "lastModified": 1756770412,
- "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
+ "lastModified": 1749398372,
+ "narHash": "sha256-tYBdgS56eXYaWVW3fsnPQ/nFlgWi/Z2Ymhyu21zVM98=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "4524271976b625a4a605beefd893f270620fd751",
+ "rev": "9305fe4e5c2a6fcf5ba6a3ff155720fbe4076569",
"type": "github"
},
"original": {
@@ -1755,14 +2026,39 @@
},
"flake-parts_28": {
"inputs": {
- "nixpkgs-lib": "nixpkgs-lib_13"
+ "nixpkgs-lib": "nixpkgs-lib_12"
},
"locked": {
- "lastModified": 1756770412,
- "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
+ "lastModified": 1719994518,
+ "narHash": "sha256-pQMhCCHyQGRzdfAkdJ4cIWiw+JNuWsTX7f0ZYSyz0VY=",
"owner": "hercules-ci",
"repo": "flake-parts",
- "rev": "4524271976b625a4a605beefd893f270620fd751",
+ "rev": "9227223f6d922fee3c7b190b2cc238a99527bbb7",
+ "type": "github"
+ },
+ "original": {
+ "id": "flake-parts",
+ "type": "indirect"
+ }
+ },
+ "flake-parts_29": {
+ "inputs": {
+ "nixpkgs-lib": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nur",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1733312601,
+ "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github"
},
"original": {
@@ -1788,6 +2084,104 @@
"type": "indirect"
}
},
+ "flake-parts_30": {
+ "inputs": {
+ "nixpkgs-lib": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "stylix",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1743550720,
+ "narHash": "sha256-hIshGgKZCgWh6AYJpJmRgFdR3WUbkY04o82X05xqQiY=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "c621e8422220273271f52058f618c94e405bb0f5",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "type": "github"
+ }
+ },
+ "flake-parts_31": {
+ "inputs": {
+ "nixpkgs-lib": "nixpkgs-lib_13"
+ },
+ "locked": {
+ "lastModified": 1754487366,
+ "narHash": "sha256-pHYj8gUBapuUzKV/kN/tR3Zvqc7o6gdFB9XKXIp1SQ8=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "af66ad14b28a127c5c0f3bbb298218fc63528a18",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "type": "github"
+ }
+ },
+ "flake-parts_32": {
+ "inputs": {
+ "nixpkgs-lib": "nixpkgs-lib_14"
+ },
+ "locked": {
+ "lastModified": 1756770412,
+ "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "4524271976b625a4a605beefd893f270620fd751",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "type": "github"
+ }
+ },
+ "flake-parts_33": {
+ "inputs": {
+ "nixpkgs-lib": "nixpkgs-lib_15"
+ },
+ "locked": {
+ "lastModified": 1756770412,
+ "narHash": "sha256-+uWLQZccFHwqpGqr2Yt5VsW/PbeJVTn9Dk6SHWhNRPw=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "4524271976b625a4a605beefd893f270620fd751",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "type": "github"
+ }
+ },
+ "flake-parts_34": {
+ "inputs": {
+ "nixpkgs-lib": "nixpkgs-lib_16"
+ },
+ "locked": {
+ "lastModified": 1759362264,
+ "narHash": "sha256-wfG0S7pltlYyZTM+qqlhJ7GMw2fTF4mLKCIVhLii/4M=",
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "rev": "758cf7296bee11f1706a574c77d072b8a7baa881",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "flake-parts",
+ "type": "github"
+ }
+ },
"flake-parts_4": {
"inputs": {
"nixpkgs-lib": [
@@ -1913,24 +2307,6 @@
"inputs": {
"systems": "systems"
},
- "locked": {
- "lastModified": 1726560853,
- "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
- "owner": "numtide",
- "repo": "flake-utils",
- "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
- "type": "github"
- },
- "original": {
- "owner": "numtide",
- "repo": "flake-utils",
- "type": "github"
- }
- },
- "flake-utils_10": {
- "inputs": {
- "systems": "systems_17"
- },
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
@@ -1945,9 +2321,27 @@
"type": "github"
}
},
+ "flake-utils_10": {
+ "inputs": {
+ "systems": "systems_18"
+ },
+ "locked": {
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
"flake-utils_11": {
"inputs": {
- "systems": "systems_21"
+ "systems": "systems_19"
},
"locked": {
"lastModified": 1731533236,
@@ -1965,14 +2359,14 @@
},
"flake-utils_12": {
"inputs": {
- "systems": "systems_24"
+ "systems": "systems_21"
},
"locked": {
- "lastModified": 1731533236,
- "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
"type": "github"
},
"original": {
@@ -1983,7 +2377,7 @@
},
"flake-utils_13": {
"inputs": {
- "systems": "systems_28"
+ "systems": "systems_22"
},
"locked": {
"lastModified": 1731533236,
@@ -2001,7 +2395,7 @@
},
"flake-utils_14": {
"inputs": {
- "systems": "systems_32"
+ "systems": "systems_26"
},
"locked": {
"lastModified": 1731533236,
@@ -2019,7 +2413,79 @@
},
"flake-utils_15": {
"inputs": {
- "systems": "systems_36"
+ "systems": "systems_29"
+ },
+ "locked": {
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
+ "flake-utils_16": {
+ "inputs": {
+ "systems": "systems_33"
+ },
+ "locked": {
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
+ "flake-utils_17": {
+ "inputs": {
+ "systems": "systems_37"
+ },
+ "locked": {
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
+ "flake-utils_18": {
+ "inputs": {
+ "systems": "systems_41"
+ },
+ "locked": {
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "numtide",
+ "repo": "flake-utils",
+ "type": "github"
+ }
+ },
+ "flake-utils_19": {
+ "inputs": {
+ "systems": "systems_45"
},
"locked": {
"lastModified": 1731533236,
@@ -2040,11 +2506,11 @@
"systems": "systems_2"
},
"locked": {
- "lastModified": 1731533236,
- "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
"type": "github"
},
"original": {
@@ -2055,14 +2521,14 @@
},
"flake-utils_3": {
"inputs": {
- "systems": "systems_5"
+ "systems": "systems_3"
},
"locked": {
- "lastModified": 1726560853,
- "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@@ -2076,11 +2542,11 @@
"systems": "systems_6"
},
"locked": {
- "lastModified": 1731533236,
- "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
"type": "github"
},
"original": {
@@ -2091,14 +2557,14 @@
},
"flake-utils_5": {
"inputs": {
- "systems": "systems_9"
+ "systems": "systems_7"
},
"locked": {
- "lastModified": 1726560853,
- "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@@ -2112,11 +2578,11 @@
"systems": "systems_10"
},
"locked": {
- "lastModified": 1731533236,
- "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
"type": "github"
},
"original": {
@@ -2127,14 +2593,14 @@
},
"flake-utils_7": {
"inputs": {
- "systems": "systems_13"
+ "systems": "systems_11"
},
"locked": {
- "lastModified": 1726560853,
- "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@@ -2148,11 +2614,11 @@
"systems": "systems_14"
},
"locked": {
- "lastModified": 1731533236,
- "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
+ "lastModified": 1726560853,
+ "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
+ "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
"type": "github"
},
"original": {
@@ -2163,14 +2629,14 @@
},
"flake-utils_9": {
"inputs": {
- "systems": "systems_16"
+ "systems": "systems_15"
},
"locked": {
- "lastModified": 1726560853,
- "narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
+ "lastModified": 1731533236,
+ "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
+ "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@@ -2259,10 +2725,27 @@
"type": "github"
}
},
+ "fromYaml_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1731966426,
+ "narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=",
+ "owner": "SenchoPens",
+ "repo": "fromYaml",
+ "rev": "106af9e2f715e2d828df706c386a685698f3223b",
+ "type": "github"
+ },
+ "original": {
+ "owner": "SenchoPens",
+ "repo": "fromYaml",
+ "type": "github"
+ }
+ },
"fw-fanctrl": {
"inputs": {
- "flake-compat": "flake-compat",
+ "flake-compat": "flake-compat_4",
"nixpkgs": [
+ "swarsel",
"nixpkgs"
]
},
@@ -2283,8 +2766,9 @@
},
"fw-fanctrl_2": {
"inputs": {
- "flake-compat": "flake-compat_5",
+ "flake-compat": "flake-compat_8",
"nixpkgs": [
+ "swarsel",
"swarsel",
"nixpkgs"
]
@@ -2306,8 +2790,9 @@
},
"fw-fanctrl_3": {
"inputs": {
- "flake-compat": "flake-compat_9",
+ "flake-compat": "flake-compat_12",
"nixpkgs": [
+ "swarsel",
"swarsel",
"swarsel",
"nixpkgs"
@@ -2330,11 +2815,12 @@
},
"fw-fanctrl_4": {
"inputs": {
- "flake-compat": "flake-compat_13",
+ "flake-compat": "flake-compat_16",
"nixpkgs": [
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
]
},
@@ -2355,12 +2841,13 @@
},
"fw-fanctrl_5": {
"inputs": {
- "flake-compat": "flake-compat_17",
+ "flake-compat": "flake-compat_20",
"nixpkgs": [
"swarsel",
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
]
},
@@ -2552,6 +3039,86 @@
"type": "github"
}
},
+ "gitignore_16": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "lanzaboote",
+ "pre-commit-hooks-nix",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1709087332,
+ "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "type": "github"
+ }
+ },
+ "gitignore_17": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-topology",
+ "pre-commit-hooks",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1709087332,
+ "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "type": "github"
+ }
+ },
+ "gitignore_18": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "pre-commit-hooks",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1709087332,
+ "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
+ "type": "github"
+ },
+ "original": {
+ "owner": "hercules-ci",
+ "repo": "gitignore.nix",
+ "type": "github"
+ }
+ },
"gitignore_2": {
"inputs": {
"nixpkgs": [
@@ -2819,6 +3386,23 @@
"type": "github"
}
},
+ "gnome-shell_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1748186689,
+ "narHash": "sha256-UaD7Y9f8iuLBMGHXeJlRu6U1Ggw5B9JnkFs3enZlap0=",
+ "owner": "GNOME",
+ "repo": "gnome-shell",
+ "rev": "8c88f917db0f1f0d80fa55206c863d3746fa18d0",
+ "type": "github"
+ },
+ "original": {
+ "owner": "GNOME",
+ "ref": "48.2",
+ "repo": "gnome-shell",
+ "type": "github"
+ }
+ },
"home-manager": {
"inputs": {
"nixpkgs": [
@@ -2826,11 +3410,11 @@
]
},
"locked": {
- "lastModified": 1758692005,
- "narHash": "sha256-bNRMXWSLM4K9cF1YaHYjLol60KIAWW4GzAoJDp5tA0w=",
+ "lastModified": 1759761710,
+ "narHash": "sha256-6ZG7VZZsbg39gtziGSvCJKurhIahIuiCn+W6TGB5kOU=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "6ce2e18007ff022db41d9cc042f8838e8c51ed66",
+ "rev": "929535c3082afdf0b18afec5ea1ef14d7689ff1c",
"type": "github"
},
"original": {
@@ -2864,6 +3448,57 @@
"type": "github"
}
},
+ "home-manager_11": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1751824240,
+ "narHash": "sha256-aDDC0CHTlL7QDKWWhdbEgVPK6KwWt+ca0QkmHYZxMzI=",
+ "owner": "nix-community",
+ "repo": "home-manager",
+ "rev": "fd9e55f5fac45a26f6169310afca64d56b681935",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "home-manager",
+ "type": "github"
+ }
+ },
+ "home-manager_12": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-on-droid",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1709445365,
+ "narHash": "sha256-DVv6nd9FQBbMWbOmhq0KVqmlc3y3FMSYl49UXmMcO+0=",
+ "owner": "nix-community",
+ "repo": "home-manager",
+ "rev": "4de84265d7ec7634a69ba75028696d74de9a44a7",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "home-manager",
+ "type": "github"
+ }
+ },
"home-manager_2": {
"inputs": {
"nixpkgs": [
@@ -2893,11 +3528,11 @@
]
},
"locked": {
- "lastModified": 1757920978,
- "narHash": "sha256-Mv16aegXLulgyDunijP6SPFJNm8lSXb2w3Q0X+vZ9TY=",
+ "lastModified": 1758692005,
+ "narHash": "sha256-bNRMXWSLM4K9cF1YaHYjLol60KIAWW4GzAoJDp5tA0w=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "11cc5449c50e0e5b785be3dfcb88245232633eb8",
+ "rev": "6ce2e18007ff022db41d9cc042f8838e8c51ed66",
"type": "github"
},
"original": {
@@ -2937,11 +3572,11 @@
]
},
"locked": {
- "lastModified": 1754756528,
- "narHash": "sha256-W1jYKMetZSOHP5m2Z5Wokdj/ct17swPHs+MiY2WT1HQ=",
+ "lastModified": 1757920978,
+ "narHash": "sha256-Mv16aegXLulgyDunijP6SPFJNm8lSXb2w3Q0X+vZ9TY=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "3ec1cd9a0703fbd55d865b7fd2b07d08374f0355",
+ "rev": "11cc5449c50e0e5b785be3dfcb88245232633eb8",
"type": "github"
},
"original": {
@@ -2983,11 +3618,11 @@
]
},
"locked": {
- "lastModified": 1751824240,
- "narHash": "sha256-aDDC0CHTlL7QDKWWhdbEgVPK6KwWt+ca0QkmHYZxMzI=",
+ "lastModified": 1754756528,
+ "narHash": "sha256-W1jYKMetZSOHP5m2Z5Wokdj/ct17swPHs+MiY2WT1HQ=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "fd9e55f5fac45a26f6169310afca64d56b681935",
+ "rev": "3ec1cd9a0703fbd55d865b7fd2b07d08374f0355",
"type": "github"
},
"original": {
@@ -3119,10 +3754,25 @@
"type": "github"
}
},
+ "impermanence_6": {
+ "locked": {
+ "lastModified": 1737831083,
+ "narHash": "sha256-LJggUHbpyeDvNagTUrdhe/pRVp4pnS6wVKALS782gRI=",
+ "owner": "nix-community",
+ "repo": "impermanence",
+ "rev": "4b3e914cdf97a5b536a889e939fb2fd2b043a170",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "impermanence",
+ "type": "github"
+ }
+ },
"lanzaboote": {
"inputs": {
"crane": "crane",
- "flake-compat": "flake-compat_2",
+ "flake-compat": "flake-compat",
"flake-parts": "flake-parts_2",
"nixpkgs": "nixpkgs",
"pre-commit-hooks-nix": "pre-commit-hooks-nix",
@@ -3145,7 +3795,7 @@
"lanzaboote_2": {
"inputs": {
"crane": "crane_2",
- "flake-compat": "flake-compat_6",
+ "flake-compat": "flake-compat_5",
"flake-parts": "flake-parts_7",
"nixpkgs": "nixpkgs_9",
"pre-commit-hooks-nix": "pre-commit-hooks-nix_2",
@@ -3168,12 +3818,35 @@
"lanzaboote_3": {
"inputs": {
"crane": "crane_3",
- "flake-compat": "flake-compat_10",
+ "flake-compat": "flake-compat_9",
"flake-parts": "flake-parts_12",
"nixpkgs": "nixpkgs_17",
"pre-commit-hooks-nix": "pre-commit-hooks-nix_3",
"rust-overlay": "rust-overlay_3"
},
+ "locked": {
+ "lastModified": 1756744479,
+ "narHash": "sha256-EyZXusK/wRD3V9vDh00W2Re3Eg8UQ+LjVBQrrH9dq1U=",
+ "owner": "nix-community",
+ "repo": "lanzaboote",
+ "rev": "747b7912f49e2885090c83364d88cf853a020ac1",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "lanzaboote",
+ "type": "github"
+ }
+ },
+ "lanzaboote_4": {
+ "inputs": {
+ "crane": "crane_4",
+ "flake-compat": "flake-compat_13",
+ "flake-parts": "flake-parts_17",
+ "nixpkgs": "nixpkgs_25",
+ "pre-commit-hooks-nix": "pre-commit-hooks-nix_4",
+ "rust-overlay": "rust-overlay_4"
+ },
"locked": {
"lastModified": 1754297745,
"narHash": "sha256-aD6/scLN3L4ZszmNbhhd3JQ9Pzv1ScYFphz14wHinfs=",
@@ -3188,33 +3861,10 @@
"type": "github"
}
},
- "lanzaboote_4": {
- "inputs": {
- "crane": "crane_4",
- "flake-compat": "flake-compat_14",
- "flake-parts": "flake-parts_17",
- "nixpkgs": "nixpkgs_25",
- "pre-commit-hooks-nix": "pre-commit-hooks-nix_4",
- "rust-overlay": "rust-overlay_4"
- },
- "locked": {
- "lastModified": 1751381593,
- "narHash": "sha256-js1XwtJpYhvQrrTaVzViybpztkHJVZ63aXOlFAcTENM=",
- "owner": "nix-community",
- "repo": "lanzaboote",
- "rev": "f4eb75540307c2b33521322c04b7fea74e48a66f",
- "type": "github"
- },
- "original": {
- "owner": "nix-community",
- "repo": "lanzaboote",
- "type": "github"
- }
- },
"lanzaboote_5": {
"inputs": {
"crane": "crane_5",
- "flake-compat": "flake-compat_18",
+ "flake-compat": "flake-compat_17",
"flake-parts": "flake-parts_22",
"nixpkgs": "nixpkgs_33",
"pre-commit-hooks-nix": "pre-commit-hooks-nix_5",
@@ -3234,6 +3884,51 @@
"type": "github"
}
},
+ "lanzaboote_6": {
+ "inputs": {
+ "crane": "crane_6",
+ "flake-compat": "flake-compat_21",
+ "flake-parts": "flake-parts_27",
+ "nixpkgs": "nixpkgs_41",
+ "pre-commit-hooks-nix": "pre-commit-hooks-nix_6",
+ "rust-overlay": "rust-overlay_6"
+ },
+ "locked": {
+ "lastModified": 1751381593,
+ "narHash": "sha256-js1XwtJpYhvQrrTaVzViybpztkHJVZ63aXOlFAcTENM=",
+ "owner": "nix-community",
+ "repo": "lanzaboote",
+ "rev": "f4eb75540307c2b33521322c04b7fea74e48a66f",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "lanzaboote",
+ "type": "github"
+ }
+ },
+ "microvm": {
+ "inputs": {
+ "flake-utils": "flake-utils",
+ "nixpkgs": [
+ "nixpkgs"
+ ],
+ "spectrum": "spectrum"
+ },
+ "locked": {
+ "lastModified": 1759708185,
+ "narHash": "sha256-s8bRMSQVILQlhbBqCKBFtIcsxbcuH2oX35JJ7FHw4BI=",
+ "owner": "astro",
+ "repo": "microvm.nix",
+ "rev": "901c80e256d41f63d8036b042d1675c745c1a617",
+ "type": "github"
+ },
+ "original": {
+ "owner": "astro",
+ "repo": "microvm.nix",
+ "type": "github"
+ }
+ },
"niri-flake": {
"inputs": {
"niri-stable": "niri-stable",
@@ -3246,11 +3941,11 @@
"xwayland-satellite-unstable": "xwayland-satellite-unstable"
},
"locked": {
- "lastModified": 1758697829,
- "narHash": "sha256-1pO4A16ssvjHNyHilpvxo15mBkAifCSOiLs3hBlrYdU=",
+ "lastModified": 1759711756,
+ "narHash": "sha256-gdX1IM8MT3vTqLSXLDc9HNg30EcHkAgUXeNh4UpcyYU=",
"owner": "sodiboo",
"repo": "niri-flake",
- "rev": "9dbeb8f613d2da107bff8375c2db7182a2bb79bb",
+ "rev": "372ecde34b3af73ae523d4b055f5bcdab00b5ee6",
"type": "github"
},
"original": {
@@ -3272,11 +3967,11 @@
"xwayland-satellite-unstable": "xwayland-satellite-unstable_2"
},
"locked": {
- "lastModified": 1757870947,
- "narHash": "sha256-0N8w6SB6a68kWioFmlr+KfwfG44KVjPjJIBSQKNdNhE=",
+ "lastModified": 1758697829,
+ "narHash": "sha256-1pO4A16ssvjHNyHilpvxo15mBkAifCSOiLs3hBlrYdU=",
"owner": "sodiboo",
"repo": "niri-flake",
- "rev": "8e9b1a571399104e42d8fa5de6c28c63bff0c16a",
+ "rev": "9dbeb8f613d2da107bff8375c2db7182a2bb79bb",
"type": "github"
},
"original": {
@@ -3298,6 +3993,34 @@
"xwayland-satellite-stable": "xwayland-satellite-stable_3",
"xwayland-satellite-unstable": "xwayland-satellite-unstable_3"
},
+ "locked": {
+ "lastModified": 1757870947,
+ "narHash": "sha256-0N8w6SB6a68kWioFmlr+KfwfG44KVjPjJIBSQKNdNhE=",
+ "owner": "sodiboo",
+ "repo": "niri-flake",
+ "rev": "8e9b1a571399104e42d8fa5de6c28c63bff0c16a",
+ "type": "github"
+ },
+ "original": {
+ "owner": "sodiboo",
+ "repo": "niri-flake",
+ "type": "github"
+ }
+ },
+ "niri-flake_4": {
+ "inputs": {
+ "niri-stable": "niri-stable_4",
+ "niri-unstable": "niri-unstable_4",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ],
+ "nixpkgs-stable": "nixpkgs-stable_11",
+ "xwayland-satellite-stable": "xwayland-satellite-stable_4",
+ "xwayland-satellite-unstable": "xwayland-satellite-unstable_4"
+ },
"locked": {
"lastModified": 1754797984,
"narHash": "sha256-t2WFkdB2qUyZt5rdqmJ340kqhvQWWOCJBJIc1nQ/Hg4=",
@@ -3347,6 +4070,23 @@
}
},
"niri-stable_3": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1756556321,
+ "narHash": "sha256-RLD89dfjN0RVO86C/Mot0T7aduCygPGaYbog566F0Qo=",
+ "owner": "YaLTeR",
+ "repo": "niri",
+ "rev": "01be0e65f4eb91a9cd624ac0b76aaeab765c7294",
+ "type": "github"
+ },
+ "original": {
+ "owner": "YaLTeR",
+ "ref": "v25.08",
+ "repo": "niri",
+ "type": "github"
+ }
+ },
+ "niri-stable_4": {
"flake": false,
"locked": {
"lastModified": 1748151941,
@@ -3364,6 +4104,22 @@
}
},
"niri-unstable": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1759395653,
+ "narHash": "sha256-sv9J1z6CrTPf9lRJLyCN90fZVdQz7LFeX7pIlInH8BQ=",
+ "owner": "YaLTeR",
+ "repo": "niri",
+ "rev": "ba6e5e082a79901dc89b0d49c5da1b769d652aec",
+ "type": "github"
+ },
+ "original": {
+ "owner": "YaLTeR",
+ "repo": "niri",
+ "type": "github"
+ }
+ },
+ "niri-unstable_2": {
"flake": false,
"locked": {
"lastModified": 1758691861,
@@ -3379,7 +4135,7 @@
"type": "github"
}
},
- "niri-unstable_2": {
+ "niri-unstable_3": {
"flake": false,
"locked": {
"lastModified": 1757832020,
@@ -3395,7 +4151,7 @@
"type": "github"
}
},
- "niri-unstable_3": {
+ "niri-unstable_4": {
"flake": false,
"locked": {
"lastModified": 1754742008,
@@ -3418,11 +4174,11 @@
]
},
"locked": {
- "lastModified": 1758447883,
- "narHash": "sha256-yGA6MV0E4JSEXqLTb4ZZkmdJZcoQ8HUzihRRX12Bvpg=",
+ "lastModified": 1758805352,
+ "narHash": "sha256-BHdc43Lkayd+72W/NXRKHzX5AZ+28F3xaUs3a88/Uew=",
"owner": "lnl7",
"repo": "nix-darwin",
- "rev": "25381509d5c91bbf3c30e23abc6d8476d2143cd1",
+ "rev": "c48e963a5558eb1c3827d59d21c5193622a1477c",
"type": "github"
},
"original": {
@@ -3439,11 +4195,11 @@
]
},
"locked": {
- "lastModified": 1757430124,
- "narHash": "sha256-MhDltfXesGH8VkGv3hmJ1QEKl1ChTIj9wmGAFfWj/Wk=",
+ "lastModified": 1758447883,
+ "narHash": "sha256-yGA6MV0E4JSEXqLTb4ZZkmdJZcoQ8HUzihRRX12Bvpg=",
"owner": "lnl7",
"repo": "nix-darwin",
- "rev": "830b3f0b50045cf0bcfd4dab65fad05bf882e196",
+ "rev": "25381509d5c91bbf3c30e23abc6d8476d2143cd1",
"type": "github"
},
"original": {
@@ -3461,11 +4217,11 @@
]
},
"locked": {
- "lastModified": 1751313918,
- "narHash": "sha256-HsJM3XLa43WpG+665aGEh8iS8AfEwOIQWk3Mke3e7nk=",
+ "lastModified": 1757430124,
+ "narHash": "sha256-MhDltfXesGH8VkGv3hmJ1QEKl1ChTIj9wmGAFfWj/Wk=",
"owner": "lnl7",
"repo": "nix-darwin",
- "rev": "e04a388232d9a6ba56967ce5b53a8a6f713cdfcf",
+ "rev": "830b3f0b50045cf0bcfd4dab65fad05bf882e196",
"type": "github"
},
"original": {
@@ -3521,6 +4277,31 @@
"type": "github"
}
},
+ "nix-darwin_6": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1751313918,
+ "narHash": "sha256-HsJM3XLa43WpG+665aGEh8iS8AfEwOIQWk3Mke3e7nk=",
+ "owner": "lnl7",
+ "repo": "nix-darwin",
+ "rev": "e04a388232d9a6ba56967ce5b53a8a6f713cdfcf",
+ "type": "github"
+ },
+ "original": {
+ "owner": "lnl7",
+ "repo": "nix-darwin",
+ "type": "github"
+ }
+ },
"nix-formatter-pack": {
"inputs": {
"nixpkgs": [
@@ -3646,12 +4427,61 @@
"type": "github"
}
},
+ "nix-formatter-pack_6": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-on-droid",
+ "nixpkgs"
+ ],
+ "nmd": "nmd_11",
+ "nmt": "nmt_6"
+ },
+ "locked": {
+ "lastModified": 1705252799,
+ "narHash": "sha256-HgSTREh7VoXjGgNDwKQUYcYo13rPkltW7IitHrTPA5c=",
+ "owner": "Gerschtli",
+ "repo": "nix-formatter-pack",
+ "rev": "2de39dedd79aab14c01b9e2934842051a160ffa5",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Gerschtli",
+ "repo": "nix-formatter-pack",
+ "type": "github"
+ }
+ },
"nix-index-database": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
+ "locked": {
+ "lastModified": 1759637156,
+ "narHash": "sha256-8NI1SqntLfKl6Q0Luemc3aIboezSJElofUrqipF5g78=",
+ "owner": "nix-community",
+ "repo": "nix-index-database",
+ "rev": "0ca69684091aa3a6b1fe994c4afeff305b15e915",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "nix-index-database",
+ "type": "github"
+ }
+ },
+ "nix-index-database_2": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
"locked": {
"lastModified": 1758427679,
"narHash": "sha256-xwjWRJTKDCjQ0iwfh7WhDhgcS0Wt3d1Yscg83mKBCn4=",
@@ -3666,9 +4496,10 @@
"type": "github"
}
},
- "nix-index-database_2": {
+ "nix-index-database_3": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"nixpkgs"
]
@@ -3687,9 +4518,10 @@
"type": "github"
}
},
- "nix-index-database_3": {
+ "nix-index-database_4": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"swarsel",
"nixpkgs"
@@ -3709,12 +4541,13 @@
"type": "github"
}
},
- "nix-index-database_4": {
+ "nix-index-database_5": {
"inputs": {
"nixpkgs": [
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
]
},
@@ -3732,13 +4565,14 @@
"type": "github"
}
},
- "nix-index-database_5": {
+ "nix-index-database_6": {
"inputs": {
"nixpkgs": [
"swarsel",
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
]
},
@@ -3896,10 +4730,41 @@
"type": "github"
}
},
+ "nix-on-droid_6": {
+ "inputs": {
+ "home-manager": "home-manager_12",
+ "nix-formatter-pack": "nix-formatter-pack_6",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ],
+ "nixpkgs-docs": "nixpkgs-docs_6",
+ "nixpkgs-for-bootstrap": "nixpkgs-for-bootstrap_6",
+ "nmd": "nmd_12"
+ },
+ "locked": {
+ "lastModified": 1720396533,
+ "narHash": "sha256-UFzk/hZWO1VkciIO5UPaSpJN8s765wsngUSvtJM6d5Q=",
+ "owner": "nix-community",
+ "repo": "nix-on-droid",
+ "rev": "f3d3b8294039f2f9a8fb7ea82c320f29c6b0fe25",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "ref": "release-24.05",
+ "repo": "nix-on-droid",
+ "type": "github"
+ }
+ },
"nix-topology": {
"inputs": {
"devshell": "devshell_2",
- "flake-utils": "flake-utils",
+ "flake-utils": "flake-utils_2",
"nixpkgs": "nixpkgs_2",
"pre-commit-hooks": "pre-commit-hooks"
},
@@ -3920,7 +4785,7 @@
"nix-topology_2": {
"inputs": {
"devshell": "devshell_4",
- "flake-utils": "flake-utils_3",
+ "flake-utils": "flake-utils_4",
"nixpkgs": "nixpkgs_10",
"pre-commit-hooks": "pre-commit-hooks_3"
},
@@ -3941,7 +4806,7 @@
"nix-topology_3": {
"inputs": {
"devshell": "devshell_6",
- "flake-utils": "flake-utils_5",
+ "flake-utils": "flake-utils_6",
"nixpkgs": "nixpkgs_18",
"pre-commit-hooks": "pre-commit-hooks_5"
},
@@ -3962,16 +4827,16 @@
"nix-topology_4": {
"inputs": {
"devshell": "devshell_8",
- "flake-utils": "flake-utils_7",
+ "flake-utils": "flake-utils_8",
"nixpkgs": "nixpkgs_26",
"pre-commit-hooks": "pre-commit-hooks_7"
},
"locked": {
- "lastModified": 1744142264,
- "narHash": "sha256-h5KyodobZm8dx/HSNN+basgdmjxrQxudjrss4gAQpZk=",
+ "lastModified": 1752093877,
+ "narHash": "sha256-P0TySh6sQl1EhfxjW9ZqGxEyUBSsEpdnchOe1QB0pLA=",
"owner": "oddlama",
"repo": "nix-topology",
- "rev": "f49121cbbf4a86c560638ade406d99ee58deb7aa",
+ "rev": "6a536c4b686ee4bcf07a7b0f8b823584560e2633",
"type": "github"
},
"original": {
@@ -3983,7 +4848,7 @@
"nix-topology_5": {
"inputs": {
"devshell": "devshell_10",
- "flake-utils": "flake-utils_9",
+ "flake-utils": "flake-utils_10",
"nixpkgs": "nixpkgs_34",
"pre-commit-hooks": "pre-commit-hooks_9"
},
@@ -4001,9 +4866,30 @@
"type": "github"
}
},
+ "nix-topology_6": {
+ "inputs": {
+ "devshell": "devshell_12",
+ "flake-utils": "flake-utils_12",
+ "nixpkgs": "nixpkgs_42",
+ "pre-commit-hooks": "pre-commit-hooks_11"
+ },
+ "locked": {
+ "lastModified": 1744142264,
+ "narHash": "sha256-h5KyodobZm8dx/HSNN+basgdmjxrQxudjrss4gAQpZk=",
+ "owner": "oddlama",
+ "repo": "nix-topology",
+ "rev": "f49121cbbf4a86c560638ade406d99ee58deb7aa",
+ "type": "github"
+ },
+ "original": {
+ "owner": "oddlama",
+ "repo": "nix-topology",
+ "type": "github"
+ }
+ },
"nixgl": {
"inputs": {
- "flake-utils": "flake-utils_2",
+ "flake-utils": "flake-utils_3",
"nixpkgs": "nixpkgs_3"
},
"locked": {
@@ -4022,7 +4908,7 @@
},
"nixgl_2": {
"inputs": {
- "flake-utils": "flake-utils_4",
+ "flake-utils": "flake-utils_5",
"nixpkgs": "nixpkgs_11"
},
"locked": {
@@ -4041,7 +4927,7 @@
},
"nixgl_3": {
"inputs": {
- "flake-utils": "flake-utils_6",
+ "flake-utils": "flake-utils_7",
"nixpkgs": "nixpkgs_19"
},
"locked": {
@@ -4060,9 +4946,28 @@
},
"nixgl_4": {
"inputs": {
- "flake-utils": "flake-utils_8",
+ "flake-utils": "flake-utils_9",
"nixpkgs": "nixpkgs_27"
},
+ "locked": {
+ "lastModified": 1752054764,
+ "narHash": "sha256-Ob/HuUhANoDs+nvYqyTKrkcPXf4ZgXoqMTQoCK0RFgQ=",
+ "owner": "guibou",
+ "repo": "nixGL",
+ "rev": "a8e1ce7d49a149ed70df676785b07f63288f53c5",
+ "type": "github"
+ },
+ "original": {
+ "owner": "guibou",
+ "repo": "nixGL",
+ "type": "github"
+ }
+ },
+ "nixgl_5": {
+ "inputs": {
+ "flake-utils": "flake-utils_11",
+ "nixpkgs": "nixpkgs_35"
+ },
"locked": {
"lastModified": 1751696036,
"narHash": "sha256-hXq4IOgSdAAaF/9q/2U8TBDL7aXZyQmtq4wl6USZjKo=",
@@ -4077,10 +4982,10 @@
"type": "github"
}
},
- "nixgl_5": {
+ "nixgl_6": {
"inputs": {
- "flake-utils": "flake-utils_10",
- "nixpkgs": "nixpkgs_35"
+ "flake-utils": "flake-utils_13",
+ "nixpkgs": "nixpkgs_43"
},
"locked": {
"lastModified": 1751696036,
@@ -4171,6 +5076,21 @@
"type": "github"
}
},
+ "nixlib_6": {
+ "locked": {
+ "lastModified": 1736643958,
+ "narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "type": "github"
+ }
+ },
"nixos-generators": {
"inputs": {
"nixlib": "nixlib",
@@ -4286,7 +5206,49 @@
"type": "github"
}
},
+ "nixos-generators_6": {
+ "inputs": {
+ "nixlib": "nixlib_6",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1751903740,
+ "narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=",
+ "owner": "nix-community",
+ "repo": "nixos-generators",
+ "rev": "032decf9db65efed428afd2fa39d80f7089085eb",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "nixos-generators",
+ "type": "github"
+ }
+ },
"nixos-hardware": {
+ "locked": {
+ "lastModified": 1759582739,
+ "narHash": "sha256-spZegilADH0q5OngM86u6NmXxduCNv5eX9vCiUPhOYc=",
+ "owner": "NixOS",
+ "repo": "nixos-hardware",
+ "rev": "3441b5242af7577230a78ffb03542add264179ab",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "master",
+ "repo": "nixos-hardware",
+ "type": "github"
+ }
+ },
+ "nixos-hardware_2": {
"locked": {
"lastModified": 1758663926,
"narHash": "sha256-6CFdj7Xs616t1W4jLDH7IohAAvl5Dyib3qEv/Uqw1rk=",
@@ -4302,7 +5264,7 @@
"type": "github"
}
},
- "nixos-hardware_2": {
+ "nixos-hardware_3": {
"locked": {
"lastModified": 1757891025,
"narHash": "sha256-NfiTk59huy/YK9H4W4wVwRYyiP2u86QqROM5KK4f5F4=",
@@ -4318,7 +5280,7 @@
"type": "github"
}
},
- "nixos-hardware_3": {
+ "nixos-hardware_4": {
"locked": {
"lastModified": 1754564048,
"narHash": "sha256-dz303vGuzWjzOPOaYkS9xSW+B93PSAJxvBd6CambXVA=",
@@ -4334,7 +5296,7 @@
"type": "github"
}
},
- "nixos-hardware_4": {
+ "nixos-hardware_5": {
"locked": {
"lastModified": 1751432711,
"narHash": "sha256-136MeWtckSHTN9Z2WRNRdZ8oRP3vyx3L8UxeBYE+J9w=",
@@ -4350,7 +5312,7 @@
"type": "github"
}
},
- "nixos-hardware_5": {
+ "nixos-hardware_6": {
"locked": {
"lastModified": 1751432711,
"narHash": "sha256-136MeWtckSHTN9Z2WRNRdZ8oRP3vyx3L8UxeBYE+J9w=",
@@ -4384,11 +5346,11 @@
},
"nixpkgs-dev": {
"locked": {
- "lastModified": 1758012660,
- "narHash": "sha256-f3jC14FeFhapXEKzk4Hfy3LXxZ2PIpmCxciVniHXSLA=",
+ "lastModified": 1759233809,
+ "narHash": "sha256-ww6JlKuclxzcBb+cb4GCnVw4PtI+7xd3J9/ctINWKeA=",
"owner": "Swarsel",
"repo": "nixpkgs",
- "rev": "3c0bb56bf5189fd91ead7e1443976301a42fac37",
+ "rev": "d3e334a2a4f9d50568bf03ec62cd445faac7ce9e",
"type": "github"
},
"original": {
@@ -4415,6 +5377,22 @@
}
},
"nixpkgs-dev_3": {
+ "locked": {
+ "lastModified": 1758012660,
+ "narHash": "sha256-f3jC14FeFhapXEKzk4Hfy3LXxZ2PIpmCxciVniHXSLA=",
+ "owner": "Swarsel",
+ "repo": "nixpkgs",
+ "rev": "3c0bb56bf5189fd91ead7e1443976301a42fac37",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Swarsel",
+ "ref": "main",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs-dev_4": {
"locked": {
"lastModified": 1756088794,
"narHash": "sha256-aBaRmk3lNNUm/1H1Jf6hA8miLg3HsYEhcuxUXTGa2gw=",
@@ -4430,7 +5408,7 @@
"type": "github"
}
},
- "nixpkgs-dev_4": {
+ "nixpkgs-dev_5": {
"locked": {
"lastModified": 1752736260,
"narHash": "sha256-90Gt98hmw/20aOAd7KaSW6otXu7MOBctRmI9RlXD/s0=",
@@ -4446,7 +5424,7 @@
"type": "github"
}
},
- "nixpkgs-dev_5": {
+ "nixpkgs-dev_6": {
"locked": {
"lastModified": 1752440522,
"narHash": "sha256-CInQkEG3f8XwIBQxYFhuFCT+T++JPstThfifAMD0yRk=",
@@ -4542,6 +5520,22 @@
"type": "github"
}
},
+ "nixpkgs-docs_6": {
+ "locked": {
+ "lastModified": 1705957679,
+ "narHash": "sha256-Q8LJaVZGJ9wo33wBafvZSzapYsjOaNjP/pOnSiKVGHY=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "9a333eaa80901efe01df07eade2c16d183761fa3",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "release-23.05",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
"nixpkgs-for-bootstrap": {
"locked": {
"lastModified": 1720244366,
@@ -4622,6 +5616,22 @@
"type": "github"
}
},
+ "nixpkgs-for-bootstrap_6": {
+ "locked": {
+ "lastModified": 1720244366,
+ "narHash": "sha256-WrDV0FPMVd2Sq9hkR5LNHudS3OSMmUrs90JUTN+MXpA=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "49ee0e94463abada1de470c9c07bfc12b36dcf40",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "49ee0e94463abada1de470c9c07bfc12b36dcf40",
+ "type": "github"
+ }
+ },
"nixpkgs-kernel": {
"locked": {
"lastModified": 1748026106,
@@ -4707,6 +5717,23 @@
"type": "github"
}
},
+ "nixpkgs-kernel_6": {
+ "locked": {
+ "lastModified": 1748026106,
+ "narHash": "sha256-6m1Y3/4pVw1RWTsrkAK2VMYSzG4MMIj7sqUy7o8th1o=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "063f43f2dbdef86376cc29ad646c45c46e93234c",
+ "type": "github"
+ },
+ "original": {
+ "narHash": "sha256-6m1Y3/4pVw1RWTsrkAK2VMYSzG4MMIj7sqUy7o8th1o=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "063f43f2dbdef86376cc29ad646c45c46e93234c",
+ "type": "github"
+ }
+ },
"nixpkgs-lib": {
"locked": {
"lastModified": 1754788789,
@@ -4735,6 +5762,33 @@
}
},
"nixpkgs-lib_11": {
+ "locked": {
+ "lastModified": 1751159883,
+ "narHash": "sha256-urW/Ylk9FIfvXfliA1ywh75yszAbiTEVgpPeinFyVZo=",
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "rev": "14a40a1d7fb9afa4739275ac642ed7301a9ba1ab",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "type": "github"
+ }
+ },
+ "nixpkgs-lib_12": {
+ "locked": {
+ "lastModified": 1719876945,
+ "narHash": "sha256-Fm2rDDs86sHy0/1jxTOKB1118Q0O3Uc7EC0iXvXKpbI=",
+ "type": "tarball",
+ "url": "https://github.com/NixOS/nixpkgs/archive/5daf0514482af3f97abaefc78a6606365c9108e2.tar.gz"
+ },
+ "original": {
+ "type": "tarball",
+ "url": "https://github.com/NixOS/nixpkgs/archive/5daf0514482af3f97abaefc78a6606365c9108e2.tar.gz"
+ }
+ },
+ "nixpkgs-lib_13": {
"locked": {
"lastModified": 1753579242,
"narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=",
@@ -4749,7 +5803,7 @@
"type": "github"
}
},
- "nixpkgs-lib_12": {
+ "nixpkgs-lib_14": {
"locked": {
"lastModified": 1754788789,
"narHash": "sha256-x2rJ+Ovzq0sCMpgfgGaaqgBSwY+LST+WbZ6TytnT9Rk=",
@@ -4764,7 +5818,22 @@
"type": "github"
}
},
- "nixpkgs-lib_13": {
+ "nixpkgs-lib_15": {
+ "locked": {
+ "lastModified": 1754788789,
+ "narHash": "sha256-x2rJ+Ovzq0sCMpgfgGaaqgBSwY+LST+WbZ6TytnT9Rk=",
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "rev": "a73b9c743612e4244d865a2fdee11865283c04e6",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "nixpkgs.lib",
+ "type": "github"
+ }
+ },
+ "nixpkgs-lib_16": {
"locked": {
"lastModified": 1754788789,
"narHash": "sha256-x2rJ+Ovzq0sCMpgfgGaaqgBSwY+LST+WbZ6TytnT9Rk=",
@@ -4820,11 +5889,11 @@
},
"nixpkgs-lib_5": {
"locked": {
- "lastModified": 1753579242,
- "narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=",
+ "lastModified": 1754788789,
+ "narHash": "sha256-x2rJ+Ovzq0sCMpgfgGaaqgBSwY+LST+WbZ6TytnT9Rk=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
- "rev": "0f36c44e01a6129be94e3ade315a5883f0228a6e",
+ "rev": "a73b9c743612e4244d865a2fdee11865283c04e6",
"type": "github"
},
"original": {
@@ -4847,11 +5916,11 @@
},
"nixpkgs-lib_7": {
"locked": {
- "lastModified": 1751159883,
- "narHash": "sha256-urW/Ylk9FIfvXfliA1ywh75yszAbiTEVgpPeinFyVZo=",
+ "lastModified": 1753579242,
+ "narHash": "sha256-zvaMGVn14/Zz8hnp4VWT9xVnhc8vuL3TStRqwk22biA=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
- "rev": "14a40a1d7fb9afa4739275ac642ed7301a9ba1ab",
+ "rev": "0f36c44e01a6129be94e3ade315a5883f0228a6e",
"type": "github"
},
"original": {
@@ -4889,16 +5958,16 @@
},
"nixpkgs-stable": {
"locked": {
- "lastModified": 1751274312,
- "narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=",
+ "lastModified": 1759580034,
+ "narHash": "sha256-YWo57PL7mGZU7D4WeKFMiW4ex/O6ZolUS6UNBHTZfkI=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "50ab793786d9de88ee30ec4e4c24fb4236fc2674",
+ "rev": "3bcc93c5f7a4b30335d31f21e2f1281cba68c318",
"type": "github"
},
"original": {
"owner": "NixOS",
- "ref": "nixos-24.11",
+ "ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
@@ -4983,6 +6052,22 @@
"type": "github"
}
},
+ "nixpkgs-stable24_05_6": {
+ "locked": {
+ "lastModified": 1735563628,
+ "narHash": "sha256-OnSAY7XDSx7CtDoqNh8jwVwh4xNL/2HaJxGjryLWzX8=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "b134951a4c9f3c995fd7be05f3243f8ecd65d798",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-24.05",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
"nixpkgs-stable24_11": {
"locked": {
"lastModified": 1751274312,
@@ -5063,6 +6148,22 @@
"type": "github"
}
},
+ "nixpkgs-stable24_11_6": {
+ "locked": {
+ "lastModified": 1751274312,
+ "narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "50ab793786d9de88ee30ec4e4c24fb4236fc2674",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-24.11",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
"nixpkgs-stable_10": {
"locked": {
"lastModified": 1751274312,
@@ -5081,11 +6182,11 @@
},
"nixpkgs-stable_11": {
"locked": {
- "lastModified": 1751741127,
- "narHash": "sha256-t75Shs76NgxjZSgvvZZ9qOmz5zuBE8buUaYD28BMTxg=",
+ "lastModified": 1754689972,
+ "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "29e290002bfff26af1db6f64d070698019460302",
+ "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
"type": "github"
},
"original": {
@@ -5096,6 +6197,22 @@
}
},
"nixpkgs-stable_12": {
+ "locked": {
+ "lastModified": 1754689972,
+ "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-25.05",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs-stable_13": {
"locked": {
"lastModified": 1751274312,
"narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=",
@@ -5111,7 +6228,39 @@
"type": "github"
}
},
- "nixpkgs-stable_13": {
+ "nixpkgs-stable_14": {
+ "locked": {
+ "lastModified": 1751741127,
+ "narHash": "sha256-t75Shs76NgxjZSgvvZZ9qOmz5zuBE8buUaYD28BMTxg=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "29e290002bfff26af1db6f64d070698019460302",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-25.05",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs-stable_15": {
+ "locked": {
+ "lastModified": 1751274312,
+ "narHash": "sha256-/bVBlRpECLVzjV19t5KMdMFWSwKLtb5RyXdjz3LJT+g=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "50ab793786d9de88ee30ec4e4c24fb4236fc2674",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-24.11",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs-stable_16": {
"locked": {
"lastModified": 1751741127,
"narHash": "sha256-t75Shs76NgxjZSgvvZZ9qOmz5zuBE8buUaYD28BMTxg=",
@@ -5129,11 +6278,11 @@
},
"nixpkgs-stable_2": {
"locked": {
- "lastModified": 1758589230,
- "narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=",
+ "lastModified": 1759580034,
+ "narHash": "sha256-YWo57PL7mGZU7D4WeKFMiW4ex/O6ZolUS6UNBHTZfkI=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0",
+ "rev": "3bcc93c5f7a4b30335d31f21e2f1281cba68c318",
"type": "github"
},
"original": {
@@ -5145,11 +6294,11 @@
},
"nixpkgs-stable_3": {
"locked": {
- "lastModified": 1758589230,
- "narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=",
+ "lastModified": 1759580034,
+ "narHash": "sha256-YWo57PL7mGZU7D4WeKFMiW4ex/O6ZolUS6UNBHTZfkI=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0",
+ "rev": "3bcc93c5f7a4b30335d31f21e2f1281cba68c318",
"type": "github"
},
"original": {
@@ -5177,11 +6326,11 @@
},
"nixpkgs-stable_5": {
"locked": {
- "lastModified": 1757810152,
- "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
+ "lastModified": 1758589230,
+ "narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
+ "rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0",
"type": "github"
},
"original": {
@@ -5193,11 +6342,11 @@
},
"nixpkgs-stable_6": {
"locked": {
- "lastModified": 1757810152,
- "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
+ "lastModified": 1758589230,
+ "narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
+ "rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0",
"type": "github"
},
"original": {
@@ -5225,11 +6374,11 @@
},
"nixpkgs-stable_8": {
"locked": {
- "lastModified": 1754689972,
- "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
+ "lastModified": 1757810152,
+ "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
+ "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
"type": "github"
},
"original": {
@@ -5241,11 +6390,11 @@
},
"nixpkgs-stable_9": {
"locked": {
- "lastModified": 1754689972,
- "narHash": "sha256-eogqv6FqZXHgqrbZzHnq43GalnRbLTkbBbFtEfm1RSc=",
+ "lastModified": 1757810152,
+ "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "fc756aa6f5d3e2e5666efcf865d190701fef150a",
+ "rev": "9a094440e02a699be5c57453a092a8baf569bdad",
"type": "github"
},
"original": {
@@ -5288,11 +6437,11 @@
},
"nixpkgs_12": {
"locked": {
- "lastModified": 1757745802,
- "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
+ "lastModified": 1758427187,
+ "narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
+ "rev": "554be6495561ff07b6c724047bdd7e0716aa7b46",
"type": "github"
},
"original": {
@@ -5320,11 +6469,11 @@
},
"nixpkgs_14": {
"locked": {
- "lastModified": 1757745802,
- "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
+ "lastModified": 1758427187,
+ "narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
+ "rev": "554be6495561ff07b6c724047bdd7e0716aa7b46",
"type": "github"
},
"original": {
@@ -5336,11 +6485,11 @@
},
"nixpkgs_15": {
"locked": {
- "lastModified": 1757746433,
- "narHash": "sha256-fEvTiU4s9lWgW7mYEU/1QUPirgkn+odUBTaindgiziY=",
+ "lastModified": 1758262103,
+ "narHash": "sha256-aBGl3XEOsjWw6W3AHiKibN7FeoG73dutQQEqnd/etR8=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "6d7ec06d6868ac6d94c371458fc2391ded9ff13d",
+ "rev": "12bd230118a1901a4a5d393f9f56b6ad7e571d01",
"type": "github"
},
"original": {
@@ -5431,11 +6580,11 @@
},
"nixpkgs_20": {
"locked": {
- "lastModified": 1754498491,
- "narHash": "sha256-erbiH2agUTD0Z30xcVSFcDHzkRvkRXOQ3lb887bcVrs=",
+ "lastModified": 1757745802,
+ "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "c2ae88e026f9525daf89587f3cbee584b92b6134",
+ "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
"type": "github"
},
"original": {
@@ -5463,11 +6612,11 @@
},
"nixpkgs_22": {
"locked": {
- "lastModified": 1754498491,
- "narHash": "sha256-erbiH2agUTD0Z30xcVSFcDHzkRvkRXOQ3lb887bcVrs=",
+ "lastModified": 1757745802,
+ "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "c2ae88e026f9525daf89587f3cbee584b92b6134",
+ "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
"type": "github"
},
"original": {
@@ -5479,11 +6628,11 @@
},
"nixpkgs_23": {
"locked": {
- "lastModified": 1744868846,
- "narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=",
+ "lastModified": 1757746433,
+ "narHash": "sha256-fEvTiU4s9lWgW7mYEU/1QUPirgkn+odUBTaindgiziY=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c",
+ "rev": "6d7ec06d6868ac6d94c371458fc2391ded9ff13d",
"type": "github"
},
"original": {
@@ -5495,11 +6644,11 @@
},
"nixpkgs_24": {
"locked": {
- "lastModified": 1751792365,
- "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
+ "lastModified": 1756819007,
+ "narHash": "sha256-12V64nKG/O/guxSYnr5/nq1EfqwJCdD2+cIGmhz3nrE=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
+ "rev": "aaff8c16d7fc04991cac6245bee1baa31f72b1e1",
"type": "github"
},
"original": {
@@ -5511,11 +6660,11 @@
},
"nixpkgs_25": {
"locked": {
- "lastModified": 1751203939,
- "narHash": "sha256-omYD+H5LlSihz2DRfv90I8Oeo7JNEwvcHPHX+6nMIM4=",
+ "lastModified": 1754243818,
+ "narHash": "sha256-sEPw2W01UPf0xNGnMGNZIaE1XHkk7O+lLLetYEXVZHk=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "650e71cbf76de8dd16f5648a96981b726c4ef8fe",
+ "rev": "c460617dfb709a67d18bb31e15e455390ee4ee1c",
"type": "github"
},
"original": {
@@ -5558,11 +6707,11 @@
},
"nixpkgs_28": {
"locked": {
- "lastModified": 1751792365,
- "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
+ "lastModified": 1754498491,
+ "narHash": "sha256-erbiH2agUTD0Z30xcVSFcDHzkRvkRXOQ3lb887bcVrs=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
+ "rev": "c2ae88e026f9525daf89587f3cbee584b92b6134",
"type": "github"
},
"original": {
@@ -5605,11 +6754,11 @@
},
"nixpkgs_30": {
"locked": {
- "lastModified": 1751792365,
- "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
+ "lastModified": 1754498491,
+ "narHash": "sha256-erbiH2agUTD0Z30xcVSFcDHzkRvkRXOQ3lb887bcVrs=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
+ "rev": "c2ae88e026f9525daf89587f3cbee584b92b6134",
"type": "github"
},
"original": {
@@ -5637,11 +6786,11 @@
},
"nixpkgs_32": {
"locked": {
- "lastModified": 1748460289,
- "narHash": "sha256-7doLyJBzCllvqX4gszYtmZUToxKvMUrg45EUWaUYmBg=",
+ "lastModified": 1751792365,
+ "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "96ec055edbe5ee227f28cdbc3f1ddf1df5965102",
+ "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
@@ -5764,11 +6913,11 @@
},
"nixpkgs_4": {
"locked": {
- "lastModified": 1758427187,
- "narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
+ "lastModified": 1759381078,
+ "narHash": "sha256-gTrEEp5gEspIcCOx9PD8kMaF1iEmfBcTbO0Jag2QhQs=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "554be6495561ff07b6c724047bdd7e0716aa7b46",
+ "rev": "7df7ff7d8e00218376575f0acdcc5d66741351ee",
"type": "github"
},
"original": {
@@ -5796,43 +6945,58 @@
},
"nixpkgs_41": {
"locked": {
- "lastModified": 1750865895,
- "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
+ "lastModified": 1751203939,
+ "narHash": "sha256-omYD+H5LlSihz2DRfv90I8Oeo7JNEwvcHPHX+6nMIM4=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
+ "rev": "650e71cbf76de8dd16f5648a96981b726c4ef8fe",
"type": "github"
},
"original": {
"owner": "NixOS",
- "ref": "nixpkgs-unstable",
+ "ref": "nixos-unstable-small",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_42": {
"locked": {
- "lastModified": 1750865895,
- "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
+ "lastModified": 1730531603,
+ "narHash": "sha256-Dqg6si5CqIzm87sp57j5nTaeBbWhHFaVyG7V6L8k3lY=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
+ "rev": "7ffd9ae656aec493492b44d0ddfb28e79a1ea25d",
"type": "github"
},
"original": {
"owner": "NixOS",
- "ref": "nixpkgs-unstable",
+ "ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_43": {
"locked": {
- "lastModified": 1755615617,
- "narHash": "sha256-HMwfAJBdrr8wXAkbGhtcby1zGFvs+StOp19xNsbqdOg=",
+ "lastModified": 1746378225,
+ "narHash": "sha256-OeRSuL8PUjIfL3Q0fTbNJD/fmv1R+K2JAOqWJd3Oceg=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "20075955deac2583bb12f07151c2df830ef346b4",
+ "rev": "93e8cdce7afc64297cfec447c311470788131cd9",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_44": {
+ "locked": {
+ "lastModified": 1751792365,
+ "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
@@ -5842,29 +7006,13 @@
"type": "github"
}
},
- "nixpkgs_44": {
- "locked": {
- "lastModified": 1750865895,
- "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
- "type": "github"
- },
- "original": {
- "owner": "NixOS",
- "ref": "nixpkgs-unstable",
- "repo": "nixpkgs",
- "type": "github"
- }
- },
"nixpkgs_45": {
"locked": {
- "lastModified": 1757745802,
- "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
+ "lastModified": 1720957393,
+ "narHash": "sha256-oedh2RwpjEa+TNxhg5Je9Ch6d3W1NKi7DbRO1ziHemA=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
+ "rev": "693bc46d169f5af9c992095736e82c3488bf7dbb",
"type": "github"
},
"original": {
@@ -5876,27 +7024,11 @@
},
"nixpkgs_46": {
"locked": {
- "lastModified": 1754800730,
- "narHash": "sha256-HfVZCXic9XLBgybP0318ym3cDnGwBs/+H5MgxFVYF4I=",
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "641d909c4a7538f1539da9240dedb1755c907e40",
- "type": "github"
- },
- "original": {
- "owner": "NixOS",
- "ref": "nixpkgs-unstable",
- "repo": "nixpkgs",
- "type": "github"
- }
- },
- "nixpkgs_47": {
- "locked": {
- "lastModified": 1758427187,
- "narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
+ "lastModified": 1751792365,
+ "narHash": "sha256-J1kI6oAj25IG4EdVlg2hQz8NZTBNYvIS0l4wpr9KcUo=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "554be6495561ff07b6c724047bdd7e0716aa7b46",
+ "rev": "1fd8bada0b6117e6c7eb54aad5813023eed37ccb",
"type": "github"
},
"original": {
@@ -5906,13 +7038,45 @@
"type": "github"
}
},
- "nixpkgs_48": {
+ "nixpkgs_47": {
"locked": {
- "lastModified": 1754800730,
- "narHash": "sha256-HfVZCXic9XLBgybP0318ym3cDnGwBs/+H5MgxFVYF4I=",
+ "lastModified": 1744868846,
+ "narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "641d909c4a7538f1539da9240dedb1755c907e40",
+ "rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_48": {
+ "locked": {
+ "lastModified": 1748460289,
+ "narHash": "sha256-7doLyJBzCllvqX4gszYtmZUToxKvMUrg45EUWaUYmBg=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "96ec055edbe5ee227f28cdbc3f1ddf1df5965102",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixos-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_49": {
+ "locked": {
+ "lastModified": 1750865895,
+ "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
"type": "github"
},
"original": {
@@ -5938,7 +7102,87 @@
"type": "github"
}
},
- "nixpkgs_6": {
+ "nixpkgs_50": {
+ "locked": {
+ "lastModified": 1750865895,
+ "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_51": {
+ "locked": {
+ "lastModified": 1755615617,
+ "narHash": "sha256-HMwfAJBdrr8wXAkbGhtcby1zGFvs+StOp19xNsbqdOg=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "20075955deac2583bb12f07151c2df830ef346b4",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "ref": "nixos-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_52": {
+ "locked": {
+ "lastModified": 1750865895,
+ "narHash": "sha256-p2dWAQcLVzquy9LxYCZPwyUdugw78Qv3ChvnX755qHA=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "61c0f513911459945e2cb8bf333dc849f1b976ff",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_53": {
+ "locked": {
+ "lastModified": 1757745802,
+ "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "ref": "nixos-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_54": {
+ "locked": {
+ "lastModified": 1754800730,
+ "narHash": "sha256-HfVZCXic9XLBgybP0318ym3cDnGwBs/+H5MgxFVYF4I=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "641d909c4a7538f1539da9240dedb1755c907e40",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_55": {
"locked": {
"lastModified": 1758427187,
"narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
@@ -5954,13 +7198,77 @@
"type": "github"
}
},
- "nixpkgs_7": {
+ "nixpkgs_56": {
"locked": {
- "lastModified": 1758262103,
- "narHash": "sha256-aBGl3XEOsjWw6W3AHiKibN7FeoG73dutQQEqnd/etR8=",
+ "lastModified": 1754800730,
+ "narHash": "sha256-HfVZCXic9XLBgybP0318ym3cDnGwBs/+H5MgxFVYF4I=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "12bd230118a1901a4a5d393f9f56b6ad7e571d01",
+ "rev": "641d909c4a7538f1539da9240dedb1755c907e40",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_57": {
+ "locked": {
+ "lastModified": 1759381078,
+ "narHash": "sha256-gTrEEp5gEspIcCOx9PD8kMaF1iEmfBcTbO0Jag2QhQs=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "7df7ff7d8e00218376575f0acdcc5d66741351ee",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "ref": "nixos-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_58": {
+ "locked": {
+ "lastModified": 1754800730,
+ "narHash": "sha256-HfVZCXic9XLBgybP0318ym3cDnGwBs/+H5MgxFVYF4I=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "641d909c4a7538f1539da9240dedb1755c907e40",
+ "type": "github"
+ },
+ "original": {
+ "owner": "NixOS",
+ "ref": "nixpkgs-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_6": {
+ "locked": {
+ "lastModified": 1759381078,
+ "narHash": "sha256-gTrEEp5gEspIcCOx9PD8kMaF1iEmfBcTbO0Jag2QhQs=",
+ "owner": "nixos",
+ "repo": "nixpkgs",
+ "rev": "7df7ff7d8e00218376575f0acdcc5d66741351ee",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nixos",
+ "ref": "nixos-unstable",
+ "repo": "nixpkgs",
+ "type": "github"
+ }
+ },
+ "nixpkgs_7": {
+ "locked": {
+ "lastModified": 1759570798,
+ "narHash": "sha256-kbkzsUKYzKhuvMOuxt/aTwWU2mnrwoY964yN3Y4dE98=",
+ "owner": "NixOS",
+ "repo": "nixpkgs",
+ "rev": "0d4f673a88f8405ae14484e6a1ea870e0ba4ca26",
"type": "github"
},
"original": {
@@ -5972,11 +7280,11 @@
},
"nixpkgs_8": {
"locked": {
- "lastModified": 1756819007,
- "narHash": "sha256-12V64nKG/O/guxSYnr5/nq1EfqwJCdD2+cIGmhz3nrE=",
+ "lastModified": 1758690382,
+ "narHash": "sha256-NY3kSorgqE5LMm1LqNwGne3ZLMF2/ILgLpFr1fS4X3o=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "aaff8c16d7fc04991cac6245bee1baa31f72b1e1",
+ "rev": "e643668fd71b949c53f8626614b21ff71a07379d",
"type": "github"
},
"original": {
@@ -6044,6 +7352,49 @@
"type": "sourcehut"
}
},
+ "nmd_11": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1666190571,
+ "narHash": "sha256-Z1hc7M9X6L+H83o9vOprijpzhTfOBjd0KmUTnpHAVjA=",
+ "owner": "rycee",
+ "repo": "nmd",
+ "rev": "b75d312b4f33bd3294cd8ae5c2ca8c6da2afc169",
+ "type": "gitlab"
+ },
+ "original": {
+ "owner": "rycee",
+ "repo": "nmd",
+ "type": "gitlab"
+ }
+ },
+ "nmd_12": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-on-droid",
+ "nixpkgs-docs"
+ ],
+ "scss-reset": "scss-reset_6"
+ },
+ "locked": {
+ "lastModified": 1705050560,
+ "narHash": "sha256-x3zzcdvhJpodsmdjqB4t5mkVW22V3wqHLOun0KRBzUI=",
+ "owner": "~rycee",
+ "repo": "nmd",
+ "rev": "66d9334933119c36f91a78d565c152a4fdc8d3d3",
+ "type": "sourcehut"
+ },
+ "original": {
+ "owner": "~rycee",
+ "repo": "nmd",
+ "type": "sourcehut"
+ }
+ },
"nmd_2": {
"inputs": {
"nixpkgs": [
@@ -6282,6 +7633,22 @@
"type": "gitlab"
}
},
+ "nmt_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1648075362,
+ "narHash": "sha256-u36WgzoA84dMVsGXzml4wZ5ckGgfnvS0ryzo/3zn/Pc=",
+ "owner": "rycee",
+ "repo": "nmt",
+ "rev": "d83601002c99b78c89ea80e5e6ba21addcfe12ae",
+ "type": "gitlab"
+ },
+ "original": {
+ "owner": "rycee",
+ "repo": "nmt",
+ "type": "gitlab"
+ }
+ },
"nswitch-rcm-nix": {
"inputs": {
"flake-parts": "flake-parts_3",
@@ -6377,17 +7744,36 @@
"type": "github"
}
},
+ "nswitch-rcm-nix_6": {
+ "inputs": {
+ "flake-parts": "flake-parts_28",
+ "nixpkgs": "nixpkgs_45"
+ },
+ "locked": {
+ "lastModified": 1721304043,
+ "narHash": "sha256-8mY9tdjo44E23xGMcUFA2a1tUcEpz7oK5upuZZ9v5SU=",
+ "owner": "Swarsel",
+ "repo": "nswitch-rcm-nix",
+ "rev": "b45dc5d673631c97a4b8379926de89a66561d6dc",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Swarsel",
+ "repo": "nswitch-rcm-nix",
+ "type": "github"
+ }
+ },
"nur": {
"inputs": {
"flake-parts": "flake-parts_4",
"nixpkgs": "nixpkgs_6"
},
"locked": {
- "lastModified": 1758706012,
- "narHash": "sha256-Gee6jqg2BLBwG6uv/U7xEQRuBobbKJOLIm5/KfpcYq4=",
+ "lastModified": 1759783224,
+ "narHash": "sha256-QTsVtR+MhvH6QTFcn31Jubm7qXltInAhTFdtsPifcbA=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "8f016c352545dc7d55969e1ab3f1dc2f01cdb3e4",
+ "rev": "9d6e275d4f74ac272aef29fb9845ea7da6559de6",
"type": "github"
},
"original": {
@@ -6414,6 +7800,61 @@
"stylix",
"nixpkgs"
],
+ "treefmt-nix": "treefmt-nix"
+ },
+ "locked": {
+ "lastModified": 1748730660,
+ "narHash": "sha256-5LKmRYKdPuhm8j5GFe3AfrJL8dd8o57BQ34AGjJl1R0=",
+ "owner": "nix-community",
+ "repo": "NUR",
+ "rev": "2c0bc52fe14681e9ef60e3553888c4f086e46ecb",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "NUR",
+ "type": "github"
+ }
+ },
+ "nur_11": {
+ "inputs": {
+ "flake-parts": "flake-parts_29",
+ "nixpkgs": "nixpkgs_46"
+ },
+ "locked": {
+ "lastModified": 1751906969,
+ "narHash": "sha256-BSQAOdPnzdpOuCdAGSJmefSDlqmStFNScEnrWzSqKPw=",
+ "owner": "nix-community",
+ "repo": "NUR",
+ "rev": "ddb679f4131e819efe3bbc6457ba19d7ad116f25",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "repo": "NUR",
+ "type": "github"
+ }
+ },
+ "nur_12": {
+ "inputs": {
+ "flake-parts": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "stylix",
+ "flake-parts"
+ ],
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "stylix",
+ "nixpkgs"
+ ],
"treefmt-nix": "treefmt-nix_2"
},
"locked": {
@@ -6442,11 +7883,11 @@
]
},
"locked": {
- "lastModified": 1756961635,
- "narHash": "sha256-hETvQcILTg5kChjYNns1fD5ELdsYB/VVgVmBtqKQj9A=",
+ "lastModified": 1758998580,
+ "narHash": "sha256-VLx0z396gDCGSiowLMFz5XRO/XuNV+4EnDYjdJhHvUk=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "6ca27b2654ac55e3f6e0ca434c1b4589ae22b370",
+ "rev": "ba8d9c98f5f4630bcb0e815ab456afd90c930728",
"type": "github"
},
"original": {
@@ -6461,11 +7902,11 @@
"nixpkgs": "nixpkgs_14"
},
"locked": {
- "lastModified": 1757935448,
- "narHash": "sha256-dIk3hiBlSsHZJViknedzOyTb7VjHFmty6d2P59/DRi4=",
+ "lastModified": 1758706012,
+ "narHash": "sha256-Gee6jqg2BLBwG6uv/U7xEQRuBobbKJOLIm5/KfpcYq4=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "b8ed69c1bcb6c358bb1df56e2a2e64323f6572c6",
+ "rev": "8f016c352545dc7d55969e1ab3f1dc2f01cdb3e4",
"type": "github"
},
"original": {
@@ -6507,11 +7948,11 @@
"nixpkgs": "nixpkgs_22"
},
"locked": {
- "lastModified": 1754726338,
- "narHash": "sha256-Zz4zAgAvgXwAzkJuhuoYFpQ9eJs/vtaYCso+rfwahsw=",
+ "lastModified": 1757935448,
+ "narHash": "sha256-dIk3hiBlSsHZJViknedzOyTb7VjHFmty6d2P59/DRi4=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "ab1e2e53a418b3907f87c24ce277975438f1bd78",
+ "rev": "b8ed69c1bcb6c358bb1df56e2a2e64323f6572c6",
"type": "github"
},
"original": {
@@ -6536,11 +7977,11 @@
]
},
"locked": {
- "lastModified": 1751906969,
- "narHash": "sha256-BSQAOdPnzdpOuCdAGSJmefSDlqmStFNScEnrWzSqKPw=",
+ "lastModified": 1756961635,
+ "narHash": "sha256-hETvQcILTg5kChjYNns1fD5ELdsYB/VVgVmBtqKQj9A=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "ddb679f4131e819efe3bbc6457ba19d7ad116f25",
+ "rev": "6ca27b2654ac55e3f6e0ca434c1b4589ae22b370",
"type": "github"
},
"original": {
@@ -6555,11 +7996,11 @@
"nixpkgs": "nixpkgs_30"
},
"locked": {
- "lastModified": 1751906969,
- "narHash": "sha256-BSQAOdPnzdpOuCdAGSJmefSDlqmStFNScEnrWzSqKPw=",
+ "lastModified": 1754726338,
+ "narHash": "sha256-Zz4zAgAvgXwAzkJuhuoYFpQ9eJs/vtaYCso+rfwahsw=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "ddb679f4131e819efe3bbc6457ba19d7ad116f25",
+ "rev": "ab1e2e53a418b3907f87c24ce277975438f1bd78",
"type": "github"
},
"original": {
@@ -6583,15 +8024,14 @@
"swarsel",
"stylix",
"nixpkgs"
- ],
- "treefmt-nix": "treefmt-nix"
+ ]
},
"locked": {
- "lastModified": 1748730660,
- "narHash": "sha256-5LKmRYKdPuhm8j5GFe3AfrJL8dd8o57BQ34AGjJl1R0=",
+ "lastModified": 1751906969,
+ "narHash": "sha256-BSQAOdPnzdpOuCdAGSJmefSDlqmStFNScEnrWzSqKPw=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "2c0bc52fe14681e9ef60e3553888c4f086e46ecb",
+ "rev": "ddb679f4131e819efe3bbc6457ba19d7ad116f25",
"type": "github"
},
"original": {
@@ -6621,7 +8061,7 @@
},
"pre-commit-hooks": {
"inputs": {
- "flake-compat": "flake-compat_3",
+ "flake-compat": "flake-compat_2",
"gitignore": "gitignore_2",
"nixpkgs": [
"nix-topology",
@@ -6796,9 +8236,45 @@
"type": "github"
}
},
+ "pre-commit-hooks-nix_6": {
+ "inputs": {
+ "flake-compat": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "lanzaboote",
+ "flake-compat"
+ ],
+ "gitignore": "gitignore_16",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "lanzaboote",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1750779888,
+ "narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
+ "owner": "cachix",
+ "repo": "pre-commit-hooks.nix",
+ "rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
+ "type": "github"
+ },
+ "original": {
+ "owner": "cachix",
+ "repo": "pre-commit-hooks.nix",
+ "type": "github"
+ }
+ },
"pre-commit-hooks_10": {
"inputs": {
- "flake-compat": "flake-compat_20",
+ "flake-compat": "flake-compat_19",
"gitignore": "gitignore_15",
"nixpkgs": [
"swarsel",
@@ -6822,20 +8298,84 @@
"type": "github"
}
},
+ "pre-commit-hooks_11": {
+ "inputs": {
+ "flake-compat": "flake-compat_22",
+ "gitignore": "gitignore_17",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-topology",
+ "nixpkgs"
+ ],
+ "nixpkgs-stable": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nix-topology",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1730797577,
+ "narHash": "sha256-SrID5yVpyUfknUTGWgYkTyvdr9J1LxUym4om3SVGPkg=",
+ "owner": "cachix",
+ "repo": "pre-commit-hooks.nix",
+ "rev": "1864030ed24a2b8b4e4d386a5eeaf0c5369e50a9",
+ "type": "github"
+ },
+ "original": {
+ "owner": "cachix",
+ "repo": "pre-commit-hooks.nix",
+ "type": "github"
+ }
+ },
+ "pre-commit-hooks_12": {
+ "inputs": {
+ "flake-compat": "flake-compat_23",
+ "gitignore": "gitignore_18",
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "swarsel",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1750779888,
+ "narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
+ "owner": "cachix",
+ "repo": "git-hooks.nix",
+ "rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
+ "type": "github"
+ },
+ "original": {
+ "owner": "cachix",
+ "repo": "git-hooks.nix",
+ "type": "github"
+ }
+ },
"pre-commit-hooks_2": {
"inputs": {
- "flake-compat": "flake-compat_4",
+ "flake-compat": "flake-compat_3",
"gitignore": "gitignore_3",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
- "lastModified": 1758108966,
- "narHash": "sha256-ytw7ROXaWZ7OfwHrQ9xvjpUWeGVm86pwnEd1QhzawIo=",
+ "lastModified": 1759523803,
+ "narHash": "sha256-PTod9NG+i3XbbnBKMl/e5uHDBYpwIWivQ3gOWSEuIEM=",
"owner": "cachix",
"repo": "git-hooks.nix",
- "rev": "54df955a695a84cd47d4a43e08e1feaf90b1fd9b",
+ "rev": "cfc9f7bb163ad8542029d303e599c0f7eee09835",
"type": "github"
},
"original": {
@@ -6846,7 +8386,7 @@
},
"pre-commit-hooks_3": {
"inputs": {
- "flake-compat": "flake-compat_7",
+ "flake-compat": "flake-compat_6",
"gitignore": "gitignore_5",
"nixpkgs": [
"swarsel",
@@ -6875,7 +8415,7 @@
},
"pre-commit-hooks_4": {
"inputs": {
- "flake-compat": "flake-compat_8",
+ "flake-compat": "flake-compat_7",
"gitignore": "gitignore_6",
"nixpkgs": [
"swarsel",
@@ -6883,11 +8423,11 @@
]
},
"locked": {
- "lastModified": 1757588530,
- "narHash": "sha256-tJ7A8mID3ct69n9WCvZ3PzIIl3rXTdptn/lZmqSS95U=",
+ "lastModified": 1758108966,
+ "narHash": "sha256-ytw7ROXaWZ7OfwHrQ9xvjpUWeGVm86pwnEd1QhzawIo=",
"owner": "cachix",
"repo": "git-hooks.nix",
- "rev": "b084b2c2b6bc23e83bbfe583b03664eb0b18c411",
+ "rev": "54df955a695a84cd47d4a43e08e1feaf90b1fd9b",
"type": "github"
},
"original": {
@@ -6898,7 +8438,7 @@
},
"pre-commit-hooks_5": {
"inputs": {
- "flake-compat": "flake-compat_11",
+ "flake-compat": "flake-compat_10",
"gitignore": "gitignore_8",
"nixpkgs": [
"swarsel",
@@ -6929,7 +8469,7 @@
},
"pre-commit-hooks_6": {
"inputs": {
- "flake-compat": "flake-compat_12",
+ "flake-compat": "flake-compat_11",
"gitignore": "gitignore_9",
"nixpkgs": [
"swarsel",
@@ -6938,11 +8478,11 @@
]
},
"locked": {
- "lastModified": 1754416808,
- "narHash": "sha256-c6yg0EQ9xVESx6HGDOCMcyRSjaTpNJP10ef+6fRcofA=",
+ "lastModified": 1757588530,
+ "narHash": "sha256-tJ7A8mID3ct69n9WCvZ3PzIIl3rXTdptn/lZmqSS95U=",
"owner": "cachix",
"repo": "git-hooks.nix",
- "rev": "9c52372878df6911f9afc1e2a1391f55e4dfc864",
+ "rev": "b084b2c2b6bc23e83bbfe583b03664eb0b18c411",
"type": "github"
},
"original": {
@@ -6953,7 +8493,7 @@
},
"pre-commit-hooks_7": {
"inputs": {
- "flake-compat": "flake-compat_15",
+ "flake-compat": "flake-compat_14",
"gitignore": "gitignore_11",
"nixpkgs": [
"swarsel",
@@ -6986,7 +8526,7 @@
},
"pre-commit-hooks_8": {
"inputs": {
- "flake-compat": "flake-compat_16",
+ "flake-compat": "flake-compat_15",
"gitignore": "gitignore_12",
"nixpkgs": [
"swarsel",
@@ -6996,11 +8536,11 @@
]
},
"locked": {
- "lastModified": 1750779888,
- "narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
+ "lastModified": 1754416808,
+ "narHash": "sha256-c6yg0EQ9xVESx6HGDOCMcyRSjaTpNJP10ef+6fRcofA=",
"owner": "cachix",
"repo": "git-hooks.nix",
- "rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
+ "rev": "9c52372878df6911f9afc1e2a1391f55e4dfc864",
"type": "github"
},
"original": {
@@ -7011,7 +8551,7 @@
},
"pre-commit-hooks_9": {
"inputs": {
- "flake-compat": "flake-compat_19",
+ "flake-compat": "flake-compat_18",
"gitignore": "gitignore_14",
"nixpkgs": [
"swarsel",
@@ -7050,10 +8590,10 @@
"disko": "disko",
"emacs-overlay": "emacs-overlay",
"flake-parts": "flake-parts",
- "fw-fanctrl": "fw-fanctrl",
"home-manager": "home-manager",
"impermanence": "impermanence",
"lanzaboote": "lanzaboote",
+ "microvm": "microvm",
"niri-flake": "niri-flake",
"nix-darwin": "nix-darwin",
"nix-index-database": "nix-index-database",
@@ -7075,10 +8615,10 @@
"spicetify-nix": "spicetify-nix",
"stylix": "stylix",
"swarsel": "swarsel",
- "swarsel-modules": "swarsel-modules_3",
- "systems": "systems_34",
- "vbc-nix": "vbc-nix_5",
- "zjstatus": "zjstatus_5"
+ "swarsel-modules": "swarsel-modules_4",
+ "systems": "systems_43",
+ "vbc-nix": "vbc-nix_6",
+ "zjstatus": "zjstatus_6"
}
},
"rust-overlay": {
@@ -7103,6 +8643,51 @@
}
},
"rust-overlay_10": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "swarsel",
+ "zjstatus",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1754880555,
+ "narHash": "sha256-tG6l0wiX8V8IvG4HFYY8IYN5vpNAxQ+UWunjjpE6SqU=",
+ "owner": "oxalica",
+ "repo": "rust-overlay",
+ "rev": "17c591a44e4eb77f05f27cd37e1cfc3f219c7fc4",
+ "type": "github"
+ },
+ "original": {
+ "owner": "oxalica",
+ "repo": "rust-overlay",
+ "type": "github"
+ }
+ },
+ "rust-overlay_11": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "zjstatus",
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1754880555,
+ "narHash": "sha256-tG6l0wiX8V8IvG4HFYY8IYN5vpNAxQ+UWunjjpE6SqU=",
+ "owner": "oxalica",
+ "repo": "rust-overlay",
+ "rev": "17c591a44e4eb77f05f27cd37e1cfc3f219c7fc4",
+ "type": "github"
+ },
+ "original": {
+ "owner": "oxalica",
+ "repo": "rust-overlay",
+ "type": "github"
+ }
+ },
+ "rust-overlay_12": {
"inputs": {
"nixpkgs": [
"zjstatus",
@@ -7179,11 +8764,11 @@
]
},
"locked": {
- "lastModified": 1751165203,
- "narHash": "sha256-3QhlpAk2yn+ExwvRLtaixWsVW1q3OX3KXXe0l8VMLl4=",
+ "lastModified": 1754189623,
+ "narHash": "sha256-fstu5eb30UYwsxow0aQqkzxNxGn80UZjyehQVNVHuBk=",
"owner": "oxalica",
"repo": "rust-overlay",
- "rev": "90f547b90e73d3c6025e66c5b742d6db51c418c3",
+ "rev": "c582ff7f0d8a7ea689ae836dfb1773f1814f472a",
"type": "github"
},
"original": {
@@ -7224,16 +8809,17 @@
"swarsel",
"swarsel",
"swarsel",
- "zjstatus",
+ "swarsel",
+ "lanzaboote",
"nixpkgs"
]
},
"locked": {
- "lastModified": 1750905536,
- "narHash": "sha256-Mo7yXM5IvMGNvJPiNkFsVT2UERmnvjsKgnY6UyDdySQ=",
+ "lastModified": 1751165203,
+ "narHash": "sha256-3QhlpAk2yn+ExwvRLtaixWsVW1q3OX3KXXe0l8VMLl4=",
"owner": "oxalica",
"repo": "rust-overlay",
- "rev": "2fa7c0aabd15fa0ccc1dc7e675a4fcf0272ad9a1",
+ "rev": "90f547b90e73d3c6025e66c5b742d6db51c418c3",
"type": "github"
},
"original": {
@@ -7245,6 +8831,8 @@
"rust-overlay_7": {
"inputs": {
"nixpkgs": [
+ "swarsel",
+ "swarsel",
"swarsel",
"swarsel",
"swarsel",
@@ -7269,6 +8857,8 @@
"rust-overlay_8": {
"inputs": {
"nixpkgs": [
+ "swarsel",
+ "swarsel",
"swarsel",
"swarsel",
"zjstatus",
@@ -7292,17 +8882,19 @@
"rust-overlay_9": {
"inputs": {
"nixpkgs": [
+ "swarsel",
+ "swarsel",
"swarsel",
"zjstatus",
"nixpkgs"
]
},
"locked": {
- "lastModified": 1754880555,
- "narHash": "sha256-tG6l0wiX8V8IvG4HFYY8IYN5vpNAxQ+UWunjjpE6SqU=",
+ "lastModified": 1750905536,
+ "narHash": "sha256-Mo7yXM5IvMGNvJPiNkFsVT2UERmnvjsKgnY6UyDdySQ=",
"owner": "oxalica",
"repo": "rust-overlay",
- "rev": "17c591a44e4eb77f05f27cd37e1cfc3f219c7fc4",
+ "rev": "2fa7c0aabd15fa0ccc1dc7e675a4fcf0272ad9a1",
"type": "github"
},
"original": {
@@ -7391,10 +8983,44 @@
"type": "github"
}
},
+ "scss-reset_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1631450058,
+ "narHash": "sha256-muDlZJPtXDIGevSEWkicPP0HQ6VtucbkMNygpGlBEUM=",
+ "owner": "andreymatin",
+ "repo": "scss-reset",
+ "rev": "0cf50e27a4e95e9bb5b1715eedf9c54dee1a5a91",
+ "type": "github"
+ },
+ "original": {
+ "owner": "andreymatin",
+ "repo": "scss-reset",
+ "type": "github"
+ }
+ },
"sops-nix": {
"inputs": {
"nixpkgs": "nixpkgs_7"
},
+ "locked": {
+ "lastModified": 1759635238,
+ "narHash": "sha256-UvzKi02LMFP74csFfwLPAZ0mrE7k6EiYaKecplyX9Qk=",
+ "owner": "Mic92",
+ "repo": "sops-nix",
+ "rev": "6e5a38e08a2c31ae687504196a230ae00ea95133",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Mic92",
+ "repo": "sops-nix",
+ "type": "github"
+ }
+ },
+ "sops-nix_2": {
+ "inputs": {
+ "nixpkgs": "nixpkgs_15"
+ },
"locked": {
"lastModified": 1758425756,
"narHash": "sha256-L3N8zV6wsViXiD8i3WFyrvjDdz76g3tXKEdZ4FkgQ+Y=",
@@ -7409,9 +9035,9 @@
"type": "github"
}
},
- "sops-nix_2": {
+ "sops-nix_3": {
"inputs": {
- "nixpkgs": "nixpkgs_15"
+ "nixpkgs": "nixpkgs_23"
},
"locked": {
"lastModified": 1757847158,
@@ -7427,9 +9053,9 @@
"type": "github"
}
},
- "sops-nix_3": {
+ "sops-nix_4": {
"inputs": {
- "nixpkgs": "nixpkgs_23"
+ "nixpkgs": "nixpkgs_31"
},
"locked": {
"lastModified": 1754328224,
@@ -7445,24 +9071,6 @@
"type": "github"
}
},
- "sops-nix_4": {
- "inputs": {
- "nixpkgs": "nixpkgs_31"
- },
- "locked": {
- "lastModified": 1751606940,
- "narHash": "sha256-KrDPXobG7DFKTOteqdSVeL1bMVitDcy7otpVZWDE6MA=",
- "owner": "Mic92",
- "repo": "sops-nix",
- "rev": "3633fc4acf03f43b260244d94c71e9e14a2f6e0d",
- "type": "github"
- },
- "original": {
- "owner": "Mic92",
- "repo": "sops-nix",
- "type": "github"
- }
- },
"sops-nix_5": {
"inputs": {
"nixpkgs": "nixpkgs_39"
@@ -7481,12 +9089,68 @@
"type": "github"
}
},
+ "sops-nix_6": {
+ "inputs": {
+ "nixpkgs": "nixpkgs_47"
+ },
+ "locked": {
+ "lastModified": 1751606940,
+ "narHash": "sha256-KrDPXobG7DFKTOteqdSVeL1bMVitDcy7otpVZWDE6MA=",
+ "owner": "Mic92",
+ "repo": "sops-nix",
+ "rev": "3633fc4acf03f43b260244d94c71e9e14a2f6e0d",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Mic92",
+ "repo": "sops-nix",
+ "type": "github"
+ }
+ },
+ "spectrum": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1759482047,
+ "narHash": "sha256-H1wiXRQHxxPyMMlP39ce3ROKCwI5/tUn36P8x6dFiiQ=",
+ "ref": "refs/heads/main",
+ "rev": "c5d5786d3dc938af0b279c542d1e43bce381b4b9",
+ "revCount": 996,
+ "type": "git",
+ "url": "https://spectrum-os.org/git/spectrum"
+ },
+ "original": {
+ "type": "git",
+ "url": "https://spectrum-os.org/git/spectrum"
+ }
+ },
"spicetify-nix": {
"inputs": {
"nixpkgs": [
"nixpkgs"
],
- "systems": "systems_3"
+ "systems": "systems_4"
+ },
+ "locked": {
+ "lastModified": 1759638324,
+ "narHash": "sha256-bj0L3n2UWE/DjqFjsydWsSzO74+dqUA4tiOX4At6LbM=",
+ "owner": "Gerg-l",
+ "repo": "spicetify-nix",
+ "rev": "c39a58510e55c4970e57176ab14b722a978e5f01",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Gerg-l",
+ "repo": "spicetify-nix",
+ "type": "github"
+ }
+ },
+ "spicetify-nix_2": {
+ "inputs": {
+ "nixpkgs": [
+ "swarsel",
+ "nixpkgs"
+ ],
+ "systems": "systems_8"
},
"locked": {
"lastModified": 1758584568,
@@ -7502,13 +9166,14 @@
"type": "github"
}
},
- "spicetify-nix_2": {
+ "spicetify-nix_3": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"nixpkgs"
],
- "systems": "systems_7"
+ "systems": "systems_12"
},
"locked": {
"lastModified": 1757824114,
@@ -7524,14 +9189,15 @@
"type": "github"
}
},
- "spicetify-nix_3": {
+ "spicetify-nix_4": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"swarsel",
"nixpkgs"
],
- "systems": "systems_11"
+ "systems": "systems_16"
},
"locked": {
"lastModified": 1754196919,
@@ -7558,7 +9224,7 @@
"gnome-shell": "gnome-shell",
"nixpkgs": "nixpkgs_8",
"nur": "nur_2",
- "systems": "systems_4",
+ "systems": "systems_5",
"tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes",
@@ -7566,11 +9232,11 @@
"tinted-zed": "tinted-zed"
},
"locked": {
- "lastModified": 1758698745,
- "narHash": "sha256-IonbUp7KTYzXS1UGraXPAa7QJFgLJrAZGswE5CfUILU=",
+ "lastModified": 1759690047,
+ "narHash": "sha256-Vlpa0d1xOgPO9waHwxJNi6LcD2PYqB3EjwLRtSxXlHc=",
"owner": "danth",
"repo": "stylix",
- "rev": "799c811ac53ef9820dd007b6ddf33390964c6bef",
+ "rev": "09022804b2bcd217f3a41a644d26b23d30375d12",
"type": "github"
},
"original": {
@@ -7590,7 +9256,7 @@
"gnome-shell": "gnome-shell_2",
"nixpkgs": "nixpkgs_16",
"nur": "nur_4",
- "systems": "systems_8",
+ "systems": "systems_9",
"tinted-foot": "tinted-foot_2",
"tinted-kitty": "tinted-kitty_2",
"tinted-schemes": "tinted-schemes_2",
@@ -7598,11 +9264,11 @@
"tinted-zed": "tinted-zed_2"
},
"locked": {
- "lastModified": 1757360005,
- "narHash": "sha256-VwzdFEQCpYMU9mc7BSQGQe5wA1MuTYPJnRc9TQCTMcM=",
+ "lastModified": 1758698745,
+ "narHash": "sha256-IonbUp7KTYzXS1UGraXPAa7QJFgLJrAZGswE5CfUILU=",
"owner": "danth",
"repo": "stylix",
- "rev": "834a743c11d66ea18e8c54872fbcc72ce48bc57f",
+ "rev": "799c811ac53ef9820dd007b6ddf33390964c6bef",
"type": "github"
},
"original": {
@@ -7622,7 +9288,7 @@
"gnome-shell": "gnome-shell_3",
"nixpkgs": "nixpkgs_24",
"nur": "nur_6",
- "systems": "systems_12",
+ "systems": "systems_13",
"tinted-foot": "tinted-foot_3",
"tinted-kitty": "tinted-kitty_3",
"tinted-schemes": "tinted-schemes_3",
@@ -7630,11 +9296,11 @@
"tinted-zed": "tinted-zed_3"
},
"locked": {
- "lastModified": 1754597531,
- "narHash": "sha256-OpC9/PBIuL2WEJUkcuD/wVxI8r+3o6f5RylSIefjHo4=",
+ "lastModified": 1757360005,
+ "narHash": "sha256-VwzdFEQCpYMU9mc7BSQGQe5wA1MuTYPJnRc9TQCTMcM=",
"owner": "danth",
"repo": "stylix",
- "rev": "63bb34a66ad7d1af2e95ee20dd675896b2074c32",
+ "rev": "834a743c11d66ea18e8c54872fbcc72ce48bc57f",
"type": "github"
},
"original": {
@@ -7654,7 +9320,7 @@
"gnome-shell": "gnome-shell_4",
"nixpkgs": "nixpkgs_32",
"nur": "nur_8",
- "systems": "systems_15",
+ "systems": "systems_17",
"tinted-foot": "tinted-foot_4",
"tinted-kitty": "tinted-kitty_4",
"tinted-schemes": "tinted-schemes_4",
@@ -7662,11 +9328,11 @@
"tinted-zed": "tinted-zed_4"
},
"locked": {
- "lastModified": 1751906932,
- "narHash": "sha256-vRZH3bq24I/heef0AIFnaBmDGdQSpTmyjT4vtpa7qqk=",
+ "lastModified": 1754597531,
+ "narHash": "sha256-OpC9/PBIuL2WEJUkcuD/wVxI8r+3o6f5RylSIefjHo4=",
"owner": "danth",
"repo": "stylix",
- "rev": "c538d1a3571386eaaca31aef7bb5fd5c155327b0",
+ "rev": "63bb34a66ad7d1af2e95ee20dd675896b2074c32",
"type": "github"
},
"original": {
@@ -7686,7 +9352,7 @@
"gnome-shell": "gnome-shell_5",
"nixpkgs": "nixpkgs_40",
"nur": "nur_10",
- "systems": "systems_18",
+ "systems": "systems_20",
"tinted-foot": "tinted-foot_5",
"tinted-kitty": "tinted-kitty_5",
"tinted-schemes": "tinted-schemes_5",
@@ -7707,13 +9373,45 @@
"type": "github"
}
},
+ "stylix_6": {
+ "inputs": {
+ "base16": "base16_6",
+ "base16-fish": "base16-fish_6",
+ "base16-helix": "base16-helix_6",
+ "base16-vim": "base16-vim_6",
+ "firefox-gnome-theme": "firefox-gnome-theme_6",
+ "flake-parts": "flake-parts_30",
+ "gnome-shell": "gnome-shell_6",
+ "nixpkgs": "nixpkgs_48",
+ "nur": "nur_12",
+ "systems": "systems_23",
+ "tinted-foot": "tinted-foot_6",
+ "tinted-kitty": "tinted-kitty_6",
+ "tinted-schemes": "tinted-schemes_6",
+ "tinted-tmux": "tinted-tmux_6",
+ "tinted-zed": "tinted-zed_6"
+ },
+ "locked": {
+ "lastModified": 1751906932,
+ "narHash": "sha256-vRZH3bq24I/heef0AIFnaBmDGdQSpTmyjT4vtpa7qqk=",
+ "owner": "danth",
+ "repo": "stylix",
+ "rev": "c538d1a3571386eaaca31aef7bb5fd5c155327b0",
+ "type": "github"
+ },
+ "original": {
+ "owner": "danth",
+ "repo": "stylix",
+ "type": "github"
+ }
+ },
"swarsel": {
"inputs": {
"devshell": "devshell_3",
"disko": "disko_2",
"emacs-overlay": "emacs-overlay_2",
"flake-parts": "flake-parts_6",
- "fw-fanctrl": "fw-fanctrl_2",
+ "fw-fanctrl": "fw-fanctrl",
"home-manager": "home-manager_3",
"impermanence": "impermanence_2",
"lanzaboote": "lanzaboote_2",
@@ -7738,17 +9436,17 @@
"spicetify-nix": "spicetify-nix_2",
"stylix": "stylix_2",
"swarsel": "swarsel_2",
- "swarsel-modules": "swarsel-modules_2",
- "systems": "systems_30",
- "vbc-nix": "vbc-nix_4",
- "zjstatus": "zjstatus_4"
+ "swarsel-modules": "swarsel-modules_3",
+ "systems": "systems_39",
+ "vbc-nix": "vbc-nix_5",
+ "zjstatus": "zjstatus_5"
},
"locked": {
- "lastModified": 1758712194,
- "narHash": "sha256-ySYaSpCWBd0tlhnuJJY9XqcUNGXrACGMXVhTiigThhg=",
+ "lastModified": 1758869406,
+ "narHash": "sha256-TulduD1ANpUvR9WNm3Hci+crvfTETd0Y3RevczQR8SQ=",
"owner": "Swarsel",
"repo": ".dotfiles",
- "rev": "355cf03bd13a9325bb8ef10912900fe3623771ac",
+ "rev": "a896d5eb5db719b7539825d355ab1bb8ec563b4b",
"type": "github"
},
"original": {
@@ -7759,9 +9457,9 @@
},
"swarsel-modules": {
"inputs": {
- "flake-parts": "flake-parts_26",
- "nixpkgs": "nixpkgs_43",
- "systems": "systems_25"
+ "flake-parts": "flake-parts_31",
+ "nixpkgs": "nixpkgs_51",
+ "systems": "systems_30"
},
"locked": {
"lastModified": 1756088962,
@@ -7780,9 +9478,9 @@
},
"swarsel-modules_2": {
"inputs": {
- "flake-parts": "flake-parts_27",
- "nixpkgs": "nixpkgs_45",
- "systems": "systems_29"
+ "flake-parts": "flake-parts_32",
+ "nixpkgs": "nixpkgs_53",
+ "systems": "systems_34"
},
"locked": {
"lastModified": 1756090249,
@@ -7801,9 +9499,30 @@
},
"swarsel-modules_3": {
"inputs": {
- "flake-parts": "flake-parts_28",
- "nixpkgs": "nixpkgs_47",
- "systems": "systems_33"
+ "flake-parts": "flake-parts_33",
+ "nixpkgs": "nixpkgs_55",
+ "systems": "systems_38"
+ },
+ "locked": {
+ "lastModified": 1757950182,
+ "narHash": "sha256-+dfxuorjUbaTvn+GNJMyCTbJjUVkkGTEIIaWpK2lGWM=",
+ "owner": "Swarsel",
+ "repo": "swarsel-modules",
+ "rev": "161c215217c9d6037658b00eebca9d420a44a733",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Swarsel",
+ "ref": "main",
+ "repo": "swarsel-modules",
+ "type": "github"
+ }
+ },
+ "swarsel-modules_4": {
+ "inputs": {
+ "flake-parts": "flake-parts_34",
+ "nixpkgs": "nixpkgs_57",
+ "systems": "systems_42"
},
"locked": {
"lastModified": 1757950182,
@@ -7826,7 +9545,7 @@
"disko": "disko_3",
"emacs-overlay": "emacs-overlay_3",
"flake-parts": "flake-parts_11",
- "fw-fanctrl": "fw-fanctrl_3",
+ "fw-fanctrl": "fw-fanctrl_2",
"home-manager": "home-manager_5",
"impermanence": "impermanence_3",
"lanzaboote": "lanzaboote_3",
@@ -7851,8 +9570,58 @@
"spicetify-nix": "spicetify-nix_3",
"stylix": "stylix_3",
"swarsel": "swarsel_3",
+ "swarsel-modules": "swarsel-modules_2",
+ "systems": "systems_35",
+ "vbc-nix": "vbc-nix_4",
+ "zjstatus": "zjstatus_4"
+ },
+ "locked": {
+ "lastModified": 1758712194,
+ "narHash": "sha256-ySYaSpCWBd0tlhnuJJY9XqcUNGXrACGMXVhTiigThhg=",
+ "owner": "Swarsel",
+ "repo": ".dotfiles",
+ "rev": "355cf03bd13a9325bb8ef10912900fe3623771ac",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Swarsel",
+ "repo": ".dotfiles",
+ "type": "github"
+ }
+ },
+ "swarsel_3": {
+ "inputs": {
+ "devshell": "devshell_7",
+ "disko": "disko_4",
+ "emacs-overlay": "emacs-overlay_4",
+ "flake-parts": "flake-parts_16",
+ "fw-fanctrl": "fw-fanctrl_3",
+ "home-manager": "home-manager_7",
+ "impermanence": "impermanence_4",
+ "lanzaboote": "lanzaboote_4",
+ "niri-flake": "niri-flake_4",
+ "nix-darwin": "nix-darwin_4",
+ "nix-index-database": "nix-index-database_4",
+ "nix-on-droid": "nix-on-droid_4",
+ "nix-topology": "nix-topology_4",
+ "nixgl": "nixgl_4",
+ "nixos-generators": "nixos-generators_4",
+ "nixos-hardware": "nixos-hardware_4",
+ "nixpkgs": "nixpkgs_28",
+ "nixpkgs-dev": "nixpkgs-dev_4",
+ "nixpkgs-kernel": "nixpkgs-kernel_4",
+ "nixpkgs-stable": "nixpkgs-stable_12",
+ "nixpkgs-stable24_05": "nixpkgs-stable24_05_4",
+ "nixpkgs-stable24_11": "nixpkgs-stable24_11_4",
+ "nswitch-rcm-nix": "nswitch-rcm-nix_4",
+ "nur": "nur_7",
+ "pre-commit-hooks": "pre-commit-hooks_8",
+ "sops-nix": "sops-nix_4",
+ "spicetify-nix": "spicetify-nix_4",
+ "stylix": "stylix_4",
+ "swarsel": "swarsel_4",
"swarsel-modules": "swarsel-modules",
- "systems": "systems_26",
+ "systems": "systems_31",
"vbc-nix": "vbc-nix_3",
"zjstatus": "zjstatus_3"
},
@@ -7870,36 +9639,36 @@
"type": "github"
}
},
- "swarsel_3": {
+ "swarsel_4": {
"inputs": {
- "devshell": "devshell_7",
- "disko": "disko_4",
- "emacs-overlay": "emacs-overlay_4",
- "flake-parts": "flake-parts_16",
+ "devshell": "devshell_9",
+ "disko": "disko_5",
+ "emacs-overlay": "emacs-overlay_5",
+ "flake-parts": "flake-parts_21",
"fw-fanctrl": "fw-fanctrl_4",
- "home-manager": "home-manager_7",
- "impermanence": "impermanence_4",
- "lanzaboote": "lanzaboote_4",
- "nix-darwin": "nix-darwin_4",
- "nix-index-database": "nix-index-database_4",
- "nix-on-droid": "nix-on-droid_4",
- "nix-topology": "nix-topology_4",
- "nixgl": "nixgl_4",
- "nixos-generators": "nixos-generators_4",
- "nixos-hardware": "nixos-hardware_4",
- "nixpkgs": "nixpkgs_28",
- "nixpkgs-dev": "nixpkgs-dev_4",
- "nixpkgs-kernel": "nixpkgs-kernel_4",
- "nixpkgs-stable": "nixpkgs-stable_11",
- "nixpkgs-stable24_05": "nixpkgs-stable24_05_4",
- "nixpkgs-stable24_11": "nixpkgs-stable24_11_4",
- "nswitch-rcm-nix": "nswitch-rcm-nix_4",
- "nur": "nur_7",
- "pre-commit-hooks": "pre-commit-hooks_8",
- "sops-nix": "sops-nix_4",
- "stylix": "stylix_4",
- "swarsel": "swarsel_4",
- "systems": "systems_22",
+ "home-manager": "home-manager_9",
+ "impermanence": "impermanence_5",
+ "lanzaboote": "lanzaboote_5",
+ "nix-darwin": "nix-darwin_5",
+ "nix-index-database": "nix-index-database_5",
+ "nix-on-droid": "nix-on-droid_5",
+ "nix-topology": "nix-topology_5",
+ "nixgl": "nixgl_5",
+ "nixos-generators": "nixos-generators_5",
+ "nixos-hardware": "nixos-hardware_5",
+ "nixpkgs": "nixpkgs_36",
+ "nixpkgs-dev": "nixpkgs-dev_5",
+ "nixpkgs-kernel": "nixpkgs-kernel_5",
+ "nixpkgs-stable": "nixpkgs-stable_14",
+ "nixpkgs-stable24_05": "nixpkgs-stable24_05_5",
+ "nixpkgs-stable24_11": "nixpkgs-stable24_11_5",
+ "nswitch-rcm-nix": "nswitch-rcm-nix_5",
+ "nur": "nur_9",
+ "pre-commit-hooks": "pre-commit-hooks_10",
+ "sops-nix": "sops-nix_5",
+ "stylix": "stylix_5",
+ "swarsel": "swarsel_5",
+ "systems": "systems_27",
"vbc-nix": "vbc-nix_2",
"zjstatus": "zjstatus_2"
},
@@ -7917,35 +9686,35 @@
"type": "github"
}
},
- "swarsel_4": {
+ "swarsel_5": {
"inputs": {
- "devshell": "devshell_9",
- "disko": "disko_5",
- "emacs-overlay": "emacs-overlay_5",
- "flake-parts": "flake-parts_21",
+ "devshell": "devshell_11",
+ "disko": "disko_6",
+ "emacs-overlay": "emacs-overlay_6",
+ "flake-parts": "flake-parts_26",
"fw-fanctrl": "fw-fanctrl_5",
- "home-manager": "home-manager_9",
- "impermanence": "impermanence_5",
- "lanzaboote": "lanzaboote_5",
- "nix-darwin": "nix-darwin_5",
- "nix-index-database": "nix-index-database_5",
- "nix-on-droid": "nix-on-droid_5",
- "nix-topology": "nix-topology_5",
- "nixgl": "nixgl_5",
- "nixos-generators": "nixos-generators_5",
- "nixos-hardware": "nixos-hardware_5",
- "nixpkgs": "nixpkgs_36",
- "nixpkgs-dev": "nixpkgs-dev_5",
- "nixpkgs-kernel": "nixpkgs-kernel_5",
- "nixpkgs-stable": "nixpkgs-stable_13",
- "nixpkgs-stable24_05": "nixpkgs-stable24_05_5",
- "nixpkgs-stable24_11": "nixpkgs-stable24_11_5",
- "nswitch-rcm-nix": "nswitch-rcm-nix_5",
- "nur": "nur_9",
- "pre-commit-hooks": "pre-commit-hooks_10",
- "sops-nix": "sops-nix_5",
- "stylix": "stylix_5",
- "systems": "systems_19",
+ "home-manager": "home-manager_11",
+ "impermanence": "impermanence_6",
+ "lanzaboote": "lanzaboote_6",
+ "nix-darwin": "nix-darwin_6",
+ "nix-index-database": "nix-index-database_6",
+ "nix-on-droid": "nix-on-droid_6",
+ "nix-topology": "nix-topology_6",
+ "nixgl": "nixgl_6",
+ "nixos-generators": "nixos-generators_6",
+ "nixos-hardware": "nixos-hardware_6",
+ "nixpkgs": "nixpkgs_44",
+ "nixpkgs-dev": "nixpkgs-dev_6",
+ "nixpkgs-kernel": "nixpkgs-kernel_6",
+ "nixpkgs-stable": "nixpkgs-stable_16",
+ "nixpkgs-stable24_05": "nixpkgs-stable24_05_6",
+ "nixpkgs-stable24_11": "nixpkgs-stable24_11_6",
+ "nswitch-rcm-nix": "nswitch-rcm-nix_6",
+ "nur": "nur_11",
+ "pre-commit-hooks": "pre-commit-hooks_12",
+ "sops-nix": "sops-nix_6",
+ "stylix": "stylix_6",
+ "systems": "systems_24",
"vbc-nix": "vbc-nix",
"zjstatus": "zjstatus"
},
@@ -8145,16 +9914,16 @@
},
"systems_20": {
"locked": {
- "lastModified": 1689347949,
- "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
- "repo": "default-linux",
- "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
- "repo": "default-linux",
+ "repo": "default",
"type": "github"
}
},
@@ -8190,16 +9959,16 @@
},
"systems_23": {
"locked": {
- "lastModified": 1689347949,
- "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
- "repo": "default-linux",
- "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
- "repo": "default-linux",
+ "repo": "default",
"type": "github"
}
},
@@ -8220,16 +9989,16 @@
},
"systems_25": {
"locked": {
- "lastModified": 1681028828,
- "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "lastModified": 1689347949,
+ "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
- "repo": "default",
- "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "repo": "default-linux",
+ "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
- "repo": "default",
+ "repo": "default-linux",
"type": "github"
}
},
@@ -8249,21 +10018,6 @@
}
},
"systems_27": {
- "locked": {
- "lastModified": 1689347949,
- "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
- "owner": "nix-systems",
- "repo": "default-linux",
- "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
- "type": "github"
- },
- "original": {
- "owner": "nix-systems",
- "repo": "default-linux",
- "type": "github"
- }
- },
- "systems_28": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
@@ -8278,6 +10032,21 @@
"type": "github"
}
},
+ "systems_28": {
+ "locked": {
+ "lastModified": 1689347949,
+ "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "type": "github"
+ }
+ },
"systems_29": {
"locked": {
"lastModified": 1681028828,
@@ -8324,21 +10093,6 @@
}
},
"systems_31": {
- "locked": {
- "lastModified": 1689347949,
- "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
- "owner": "nix-systems",
- "repo": "default-linux",
- "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
- "type": "github"
- },
- "original": {
- "owner": "nix-systems",
- "repo": "default-linux",
- "type": "github"
- }
- },
- "systems_32": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
@@ -8353,6 +10107,21 @@
"type": "github"
}
},
+ "systems_32": {
+ "locked": {
+ "lastModified": 1689347949,
+ "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "type": "github"
+ }
+ },
"systems_33": {
"locked": {
"lastModified": 1681028828,
@@ -8384,6 +10153,21 @@
}
},
"systems_35": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_36": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
@@ -8398,7 +10182,37 @@
"type": "github"
}
},
- "systems_36": {
+ "systems_37": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_38": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_39": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
@@ -8428,6 +10242,96 @@
"type": "github"
}
},
+ "systems_40": {
+ "locked": {
+ "lastModified": 1689347949,
+ "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "type": "github"
+ }
+ },
+ "systems_41": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_42": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_43": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
+ "systems_44": {
+ "locked": {
+ "lastModified": 1689347949,
+ "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default-linux",
+ "type": "github"
+ }
+ },
+ "systems_45": {
+ "locked": {
+ "lastModified": 1681028828,
+ "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
+ "owner": "nix-systems",
+ "repo": "default",
+ "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-systems",
+ "repo": "default",
+ "type": "github"
+ }
+ },
"systems_5": {
"locked": {
"lastModified": 1681028828,
@@ -8588,6 +10492,23 @@
"type": "github"
}
},
+ "tinted-foot_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1726913040,
+ "narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=",
+ "owner": "tinted-theming",
+ "repo": "tinted-foot",
+ "rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "tinted-foot",
+ "rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
+ "type": "github"
+ }
+ },
"tinted-kitty": {
"flake": false,
"locked": {
@@ -8668,14 +10589,30 @@
"type": "github"
}
},
+ "tinted-kitty_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1735730497,
+ "narHash": "sha256-4KtB+FiUzIeK/4aHCKce3V9HwRvYaxX+F1edUrfgzb8=",
+ "owner": "tinted-theming",
+ "repo": "tinted-kitty",
+ "rev": "de6f888497f2c6b2279361bfc790f164bfd0f3fa",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "tinted-kitty",
+ "type": "github"
+ }
+ },
"tinted-schemes": {
"flake": false,
"locked": {
- "lastModified": 1754779259,
- "narHash": "sha256-8KG2lXGaXLUE0F/JVwLQe7kOVm21IDfNEo0gfga5P4M=",
+ "lastModified": 1757716333,
+ "narHash": "sha256-d4km8W7w2zCUEmPAPUoLk1NlYrGODuVa3P7St+UrqkM=",
"owner": "tinted-theming",
"repo": "schemes",
- "rev": "097d751b9e3c8b97ce158e7d141e5a292545b502",
+ "rev": "317a5e10c35825a6c905d912e480dfe8e71c7559",
"type": "github"
},
"original": {
@@ -8703,11 +10640,11 @@
"tinted-schemes_3": {
"flake": false,
"locked": {
- "lastModified": 1750770351,
- "narHash": "sha256-LI+BnRoFNRa2ffbe3dcuIRYAUcGklBx0+EcFxlHj0SY=",
+ "lastModified": 1754779259,
+ "narHash": "sha256-8KG2lXGaXLUE0F/JVwLQe7kOVm21IDfNEo0gfga5P4M=",
"owner": "tinted-theming",
"repo": "schemes",
- "rev": "5a775c6ffd6e6125947b393872cde95867d85a2a",
+ "rev": "097d751b9e3c8b97ce158e7d141e5a292545b502",
"type": "github"
},
"original": {
@@ -8719,11 +10656,11 @@
"tinted-schemes_4": {
"flake": false,
"locked": {
- "lastModified": 1748180480,
- "narHash": "sha256-7n0XiZiEHl2zRhDwZd/g+p38xwEoWtT0/aESwTMXWG4=",
+ "lastModified": 1750770351,
+ "narHash": "sha256-LI+BnRoFNRa2ffbe3dcuIRYAUcGklBx0+EcFxlHj0SY=",
"owner": "tinted-theming",
"repo": "schemes",
- "rev": "87d652edd26f5c0c99deda5ae13dfb8ece2ffe31",
+ "rev": "5a775c6ffd6e6125947b393872cde95867d85a2a",
"type": "github"
},
"original": {
@@ -8748,14 +10685,30 @@
"type": "github"
}
},
+ "tinted-schemes_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1748180480,
+ "narHash": "sha256-7n0XiZiEHl2zRhDwZd/g+p38xwEoWtT0/aESwTMXWG4=",
+ "owner": "tinted-theming",
+ "repo": "schemes",
+ "rev": "87d652edd26f5c0c99deda5ae13dfb8ece2ffe31",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "schemes",
+ "type": "github"
+ }
+ },
"tinted-tmux": {
"flake": false,
"locked": {
- "lastModified": 1754788770,
- "narHash": "sha256-LAu5nBr7pM/jD9jwFc6/kyFY4h7Us4bZz7dvVvehuwo=",
+ "lastModified": 1757811970,
+ "narHash": "sha256-n5ZJgmzGZXOD9pZdAl1OnBu3PIqD+X3vEBUGbTi4JiI=",
"owner": "tinted-theming",
"repo": "tinted-tmux",
- "rev": "fb2175accef8935f6955503ec9dd3c973eec385c",
+ "rev": "d217ba31c846006e9e0ae70775b0ee0f00aa6b1e",
"type": "github"
},
"original": {
@@ -8783,11 +10736,11 @@
"tinted-tmux_3": {
"flake": false,
"locked": {
- "lastModified": 1751159871,
- "narHash": "sha256-UOHBN1fgHIEzvPmdNMHaDvdRMgLmEJh2hNmDrp3d3LE=",
+ "lastModified": 1754788770,
+ "narHash": "sha256-LAu5nBr7pM/jD9jwFc6/kyFY4h7Us4bZz7dvVvehuwo=",
"owner": "tinted-theming",
"repo": "tinted-tmux",
- "rev": "bded5e24407cec9d01bd47a317d15b9223a1546c",
+ "rev": "fb2175accef8935f6955503ec9dd3c973eec385c",
"type": "github"
},
"original": {
@@ -8799,11 +10752,11 @@
"tinted-tmux_4": {
"flake": false,
"locked": {
- "lastModified": 1748740859,
- "narHash": "sha256-OEM12bg7F4N5WjZOcV7FHJbqRI6jtCqL6u8FtPrlZz4=",
+ "lastModified": 1751159871,
+ "narHash": "sha256-UOHBN1fgHIEzvPmdNMHaDvdRMgLmEJh2hNmDrp3d3LE=",
"owner": "tinted-theming",
"repo": "tinted-tmux",
- "rev": "57d5f9683ff9a3b590643beeaf0364da819aedda",
+ "rev": "bded5e24407cec9d01bd47a317d15b9223a1546c",
"type": "github"
},
"original": {
@@ -8828,14 +10781,30 @@
"type": "github"
}
},
+ "tinted-tmux_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1748740859,
+ "narHash": "sha256-OEM12bg7F4N5WjZOcV7FHJbqRI6jtCqL6u8FtPrlZz4=",
+ "owner": "tinted-theming",
+ "repo": "tinted-tmux",
+ "rev": "57d5f9683ff9a3b590643beeaf0364da819aedda",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "tinted-tmux",
+ "type": "github"
+ }
+ },
"tinted-zed": {
"flake": false,
"locked": {
- "lastModified": 1755613540,
- "narHash": "sha256-zBFrrTxHLDMDX/OYxkCwGGbAhPXLi8FrnLhYLsSOKeY=",
+ "lastModified": 1757811247,
+ "narHash": "sha256-4EFOUyLj85NRL3OacHoLGEo0wjiRJzfsXtR4CZWAn6w=",
"owner": "tinted-theming",
"repo": "base16-zed",
- "rev": "937bada16cd3200bdbd3a2f5776fc3b686d5cba0",
+ "rev": "824fe0aacf82b3c26690d14e8d2cedd56e18404e",
"type": "github"
},
"original": {
@@ -8863,11 +10832,11 @@
"tinted-zed_3": {
"flake": false,
"locked": {
- "lastModified": 1751158968,
- "narHash": "sha256-ksOyv7D3SRRtebpXxgpG4TK8gZSKFc4TIZpR+C98jX8=",
+ "lastModified": 1755613540,
+ "narHash": "sha256-zBFrrTxHLDMDX/OYxkCwGGbAhPXLi8FrnLhYLsSOKeY=",
"owner": "tinted-theming",
"repo": "base16-zed",
- "rev": "86a470d94204f7652b906ab0d378e4231a5b3384",
+ "rev": "937bada16cd3200bdbd3a2f5776fc3b686d5cba0",
"type": "github"
},
"original": {
@@ -8879,11 +10848,11 @@
"tinted-zed_4": {
"flake": false,
"locked": {
- "lastModified": 1725758778,
- "narHash": "sha256-8P1b6mJWyYcu36WRlSVbuj575QWIFZALZMTg5ID/sM4=",
+ "lastModified": 1751158968,
+ "narHash": "sha256-ksOyv7D3SRRtebpXxgpG4TK8gZSKFc4TIZpR+C98jX8=",
"owner": "tinted-theming",
"repo": "base16-zed",
- "rev": "122c9e5c0e6f27211361a04fae92df97940eccf9",
+ "rev": "86a470d94204f7652b906ab0d378e4231a5b3384",
"type": "github"
},
"original": {
@@ -8908,12 +10877,29 @@
"type": "github"
}
},
+ "tinted-zed_6": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1725758778,
+ "narHash": "sha256-8P1b6mJWyYcu36WRlSVbuj575QWIFZALZMTg5ID/sM4=",
+ "owner": "tinted-theming",
+ "repo": "base16-zed",
+ "rev": "122c9e5c0e6f27211361a04fae92df97940eccf9",
+ "type": "github"
+ },
+ "original": {
+ "owner": "tinted-theming",
+ "repo": "base16-zed",
+ "type": "github"
+ }
+ },
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"stylix",
"nur",
"nixpkgs"
@@ -8940,6 +10926,7 @@
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"stylix",
"nur",
"nixpkgs"
@@ -8966,9 +10953,10 @@
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
],
- "systems": "systems_20"
+ "systems": "systems_25"
},
"locked": {
"lastModified": 1742477270,
@@ -8991,9 +10979,10 @@
"swarsel",
"swarsel",
"swarsel",
+ "swarsel",
"nixpkgs"
],
- "systems": "systems_23"
+ "systems": "systems_28"
},
"locked": {
"lastModified": 1742477270,
@@ -9013,11 +11002,12 @@
"vbc-nix_3": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"swarsel",
"nixpkgs"
],
- "systems": "systems_27"
+ "systems": "systems_32"
},
"locked": {
"lastModified": 1742477270,
@@ -9037,10 +11027,11 @@
"vbc-nix_4": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"swarsel",
"nixpkgs"
],
- "systems": "systems_31"
+ "systems": "systems_36"
},
"locked": {
"lastModified": 1742477270,
@@ -9060,9 +11051,32 @@
"vbc-nix_5": {
"inputs": {
"nixpkgs": [
+ "swarsel",
"nixpkgs"
],
- "systems": "systems_35"
+ "systems": "systems_40"
+ },
+ "locked": {
+ "lastModified": 1742477270,
+ "narHash": "sha256-u78SeVemHqEkN6J+PieL1Kymu+n7LWiTPrUXNd+uePA=",
+ "ref": "main",
+ "rev": "0525ad64e2729077ed2cf313d2022e8b8c51153f",
+ "revCount": 2,
+ "type": "git",
+ "url": "ssh://git@github.com/vbc-it/vbc-nix.git"
+ },
+ "original": {
+ "ref": "main",
+ "type": "git",
+ "url": "ssh://git@github.com/vbc-it/vbc-nix.git"
+ }
+ },
+ "vbc-nix_6": {
+ "inputs": {
+ "nixpkgs": [
+ "nixpkgs"
+ ],
+ "systems": "systems_44"
},
"locked": {
"lastModified": 1742477270,
@@ -9114,6 +11128,23 @@
}
},
"xwayland-satellite-stable_3": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1755491097,
+ "narHash": "sha256-m+9tUfsmBeF2Gn4HWa6vSITZ4Gz1eA1F5Kh62B0N4oE=",
+ "owner": "Supreeeme",
+ "repo": "xwayland-satellite",
+ "rev": "388d291e82ffbc73be18169d39470f340707edaa",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Supreeeme",
+ "ref": "v0.7",
+ "repo": "xwayland-satellite",
+ "type": "github"
+ }
+ },
+ "xwayland-satellite-stable_4": {
"flake": false,
"locked": {
"lastModified": 1748488455,
@@ -9131,6 +11162,22 @@
}
},
"xwayland-satellite-unstable": {
+ "flake": false,
+ "locked": {
+ "lastModified": 1759707084,
+ "narHash": "sha256-0pkftKs6/LReNvxw7DVTN2AJEheZVgyeK0Aarbagi70=",
+ "owner": "Supreeeme",
+ "repo": "xwayland-satellite",
+ "rev": "a9188e70bd748118b4d56a529871b9de5adb9988",
+ "type": "github"
+ },
+ "original": {
+ "owner": "Supreeeme",
+ "repo": "xwayland-satellite",
+ "type": "github"
+ }
+ },
+ "xwayland-satellite-unstable_2": {
"flake": false,
"locked": {
"lastModified": 1758577423,
@@ -9146,7 +11193,7 @@
"type": "github"
}
},
- "xwayland-satellite-unstable_2": {
+ "xwayland-satellite-unstable_3": {
"flake": false,
"locked": {
"lastModified": 1757179758,
@@ -9162,7 +11209,7 @@
"type": "github"
}
},
- "xwayland-satellite-unstable_3": {
+ "xwayland-satellite-unstable_4": {
"flake": false,
"locked": {
"lastModified": 1754533920,
@@ -9180,10 +11227,10 @@
},
"zjstatus": {
"inputs": {
- "crane": "crane_6",
- "flake-utils": "flake-utils_11",
- "nixpkgs": "nixpkgs_41",
- "rust-overlay": "rust-overlay_6"
+ "crane": "crane_7",
+ "flake-utils": "flake-utils_14",
+ "nixpkgs": "nixpkgs_49",
+ "rust-overlay": "rust-overlay_7"
},
"locked": {
"lastModified": 1750957292,
@@ -9201,10 +11248,10 @@
},
"zjstatus_2": {
"inputs": {
- "crane": "crane_7",
- "flake-utils": "flake-utils_12",
- "nixpkgs": "nixpkgs_42",
- "rust-overlay": "rust-overlay_7"
+ "crane": "crane_8",
+ "flake-utils": "flake-utils_15",
+ "nixpkgs": "nixpkgs_50",
+ "rust-overlay": "rust-overlay_8"
},
"locked": {
"lastModified": 1750957292,
@@ -9222,10 +11269,10 @@
},
"zjstatus_3": {
"inputs": {
- "crane": "crane_8",
- "flake-utils": "flake-utils_13",
- "nixpkgs": "nixpkgs_44",
- "rust-overlay": "rust-overlay_8"
+ "crane": "crane_9",
+ "flake-utils": "flake-utils_16",
+ "nixpkgs": "nixpkgs_52",
+ "rust-overlay": "rust-overlay_9"
},
"locked": {
"lastModified": 1753722377,
@@ -9243,10 +11290,10 @@
},
"zjstatus_4": {
"inputs": {
- "crane": "crane_9",
- "flake-utils": "flake-utils_14",
- "nixpkgs": "nixpkgs_46",
- "rust-overlay": "rust-overlay_9"
+ "crane": "crane_10",
+ "flake-utils": "flake-utils_17",
+ "nixpkgs": "nixpkgs_54",
+ "rust-overlay": "rust-overlay_10"
},
"locked": {
"lastModified": 1757256304,
@@ -9264,10 +11311,31 @@
},
"zjstatus_5": {
"inputs": {
- "crane": "crane_10",
- "flake-utils": "flake-utils_15",
- "nixpkgs": "nixpkgs_48",
- "rust-overlay": "rust-overlay_10"
+ "crane": "crane_11",
+ "flake-utils": "flake-utils_18",
+ "nixpkgs": "nixpkgs_56",
+ "rust-overlay": "rust-overlay_11"
+ },
+ "locked": {
+ "lastModified": 1757256304,
+ "narHash": "sha256-qANK2Hwhi4Nbpcsy6lunncyt725gthaSX/0dLluBxtw=",
+ "owner": "dj95",
+ "repo": "zjstatus",
+ "rev": "e2ea91819408f0b0dd7ee15249341cace6eb09cc",
+ "type": "github"
+ },
+ "original": {
+ "owner": "dj95",
+ "repo": "zjstatus",
+ "type": "github"
+ }
+ },
+ "zjstatus_6": {
+ "inputs": {
+ "crane": "crane_12",
+ "flake-utils": "flake-utils_19",
+ "nixpkgs": "nixpkgs_58",
+ "rust-overlay": "rust-overlay_12"
},
"locked": {
"lastModified": 1757256304,
diff --git a/flake.nix b/flake.nix
index c7a9310..ac839db 100644
--- a/flake.nix
+++ b/flake.nix
@@ -59,11 +59,12 @@
zjstatus = {
url = "github:dj95/zjstatus";
};
- fw-fanctrl = {
- # url = "github:TamtamHero/fw-fanctrl/packaging/nix";
- url = "github:Swarsel/fw-fanctrl/packaging/nix";
- inputs.nixpkgs.follows = "nixpkgs";
- };
+ # has been upstreamed
+ # fw-fanctrl = {
+ # # url = "github:TamtamHero/fw-fanctrl/packaging/nix";
+ # url = "github:Swarsel/fw-fanctrl/packaging/nix";
+ # inputs.nixpkgs.follows = "nixpkgs";
+ # };
nix-darwin = {
url = "github:lnl7/nix-darwin";
inputs.nixpkgs.follows = "nixpkgs";
diff --git a/hosts/nixos/pyramid/hardware-configuration.nix b/hosts/nixos/pyramid/hardware-configuration.nix
index 18047d6..8ee6c63 100644
--- a/hosts/nixos/pyramid/hardware-configuration.nix
+++ b/hosts/nixos/pyramid/hardware-configuration.nix
@@ -22,7 +22,8 @@
# '';
boot = {
- kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ # kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ kernelPackages = lib.mkDefault pkgs.linuxPackages_latest;
binfmt.emulatedSystems = [ "aarch64-linux" ];
initrd = {
availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "cryptd" "usbhid" "sd_mod" "r8152" ];
diff --git a/modules/home/common/desktop.nix b/modules/home/common/desktop.nix
index a24eb94..cf04c2a 100644
--- a/modules/home/common/desktop.nix
+++ b/modules/home/common/desktop.nix
@@ -56,46 +56,47 @@
};
xdg.mimeApps = {
-
enable = true;
defaultApplications = {
- "x-scheme-handler/http" = [ "firefox.desktop" ];
- "x-scheme-handler/https" = [ "firefox.desktop" ];
- "x-scheme-handler/chrome" = [ "firefox.desktop" ];
- "text/plain" = [ "emacsclient.desktop" ];
- "text/csv" = [ "emacsclient.desktop" ];
- "text/html" = [ "firefox.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
+ "application/metalink+xml" = [ "emacsclient.desktop" ];
+ "application/msword" = [ "writer.desktop" ];
+ "application/pdf" = [ "org.gnome.Evince.desktop" ];
+ "application/sql" = [ "emacsclient.desktop" ];
+ "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
"application/x-extension-htm" = [ "firefox.desktop" ];
"application/x-extension-html" = [ "firefox.desktop" ];
"application/x-extension-shtml" = [ "firefox.desktop" ];
- "application/xhtml+xml" = [ "firefox.desktop" ];
- "application/x-extension-xhtml" = [ "firefox.desktop" ];
"application/x-extension-xht" = [ "firefox.desktop" ];
- "image/png" = [ "imv.desktop" ];
- "image/jpeg" = [ "imv.desktop" ];
- "image/gif" = [ "imv.desktop" ];
- "image/svg" = [ "imv.desktop" ];
- "image/webp" = [ "firefox.desktop" ];
- "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
- "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "application/x-extension-xhtml" = [ "firefox.desktop" ];
+ "application/xhtml+xml" = [ "firefox.desktop" ];
"audio/flac" = [ "mpv.desktop" ];
"audio/mp3" = [ "mpv.desktop" ];
"audio/ogg" = [ "mpv.desktop" ];
"audio/wav" = [ "mpv.desktop" ];
- "video/mp4" = [ "umpv.desktop" ];
- "video/mkv" = [ "umpv.desktop" ];
- "video/flv" = [ "umpv.desktop" ];
+ "image/gif" = [ "imv.desktop" ];
+ "image/jpeg" = [ "imv.desktop" ];
+ "image/png" = [ "imv.desktop" ];
+ "image/svg" = [ "imv.desktop" ];
+ "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
+ "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "image/webp" = [ "firefox.desktop" ];
+ "text/csv" = [ "emacsclient.desktop" ];
+ "text/html" = [ "firefox.desktop" ];
+ "text/plain" = [ "emacsclient.desktop" ];
"video/3gp" = [ "umpv.desktop" ];
- "application/pdf" = [ "org.gnome.Evince.desktop" ];
- "application/metalink+xml" = [ "emacsclient.desktop" ];
- "application/sql" = [ "emacsclient.desktop" ];
- "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
- "application/msword" = [ "writer.desktop" ];
- "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "video/flv" = [ "umpv.desktop" ];
+ "video/mkv" = [ "umpv.desktop" ];
+ "video/mp4" = [ "umpv.desktop" ];
+ "x-scheme-handler/chrome" = [ "firefox.desktop" ];
+ "x-scheme-handler/http" = [ "firefox.desktop" ];
+ "x-scheme-handler/https" = [ "firefox.desktop" ];
};
associations = {
added = {
"application/x-zerosize" = [ "emacsclient.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
};
};
};
diff --git a/modules/home/common/programs.nix b/modules/home/common/programs.nix
index 26f2619..f971174 100644
--- a/modules/home/common/programs.nix
+++ b/modules/home/common/programs.nix
@@ -18,7 +18,11 @@
jq.enable = true;
ripgrep.enable = true;
pandoc.enable = true;
- # fzf.enable = true;
+ fzf = {
+ enable = true;
+ enableBashIntegration = false;
+ enableZshIntegration = false;
+ };
zoxide = {
enable = true;
enableZshIntegration = true;
diff --git a/modules/nixos/client/packages.nix b/modules/nixos/client/packages.nix
index ce4d934..2ac4386 100644
--- a/modules/nixos/client/packages.nix
+++ b/modules/nixos/client/packages.nix
@@ -68,7 +68,6 @@
nixd
zig
zls
- ansible-language-server
elk-to-svg
diff --git a/modules/nixos/optional/amdgpu.nix b/modules/nixos/optional/amdgpu.nix
index c6aa61f..7af14c6 100644
--- a/modules/nixos/optional/amdgpu.nix
+++ b/modules/nixos/optional/amdgpu.nix
@@ -5,10 +5,11 @@
hardware = {
amdgpu = {
opencl.enable = true;
- amdvlk = {
- enable = true;
- support32Bit.enable = true;
- };
+ initrd.enable = true;
+ # amdvlk = {
+ # enable = true;
+ # support32Bit.enable = true;
+ # };
};
};
};
diff --git a/modules/nixos/optional/framework.nix b/modules/nixos/optional/framework.nix
index 949cc82..5f0d00d 100644
--- a/modules/nixos/optional/framework.nix
+++ b/modules/nixos/optional/framework.nix
@@ -1,8 +1,5 @@
-{ lib, config, inputs, ... }:
+{ lib, config, ... }:
{
- imports = [
- inputs.fw-fanctrl.nixosModules.default
- ];
options.swarselmodules.optional.framework = lib.mkEnableOption "optional framework machine settings";
config = lib.mkIf config.swarselmodules.optional.framework {
services = {
@@ -20,7 +17,7 @@
ACTION=="add", SUBSYSTEM=="i2c", DRIVERS=="i2c_hid_acpi", ATTRS{name}=="PIXA3854:00", ATTR{power/wakeup}="disabled"
'';
};
- programs.fw-fanctrl = {
+ hardware.fw-fanctrl = {
enable = true;
config = {
defaultStrategy = "lazy";
diff --git a/modules/nixos/optional/work.nix b/modules/nixos/optional/work.nix
index cd9eebf..855aac3 100644
--- a/modules/nixos/optional/work.nix
+++ b/modules/nixos/optional/work.nix
@@ -161,7 +161,8 @@ in
govc
terraform
opentofu
- dev.terragrunt
+ # dev.terragrunt
+ terragrunt
graphviz
azure-cli
From bddc0bedc7972cfa65ffb15e64f0d9a82c3dbbfc Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:38:01 +0200
Subject: [PATCH 5/7] fix[client]: use virtualbox with kvm
---
SwarselSystems.org | 46 ++++++++++++++++-----------
modules/nixos/optional/virtualbox.nix | 46 ++++++++++++++++-----------
2 files changed, 54 insertions(+), 38 deletions(-)
diff --git a/SwarselSystems.org b/SwarselSystems.org
index 323f4d1..eef296d 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -10362,27 +10362,35 @@ This sets the VirtualBox configuration. Guest should not be enabled if not direl
{
options.swarselmodules.optional.virtualbox = lib.mkEnableOption "optional VBox settings";
config = lib.mkIf config.swarselmodules.optional.virtualbox {
- specialisation = {
- VBox.configuration = {
- virtualisation.virtualbox = {
- host = {
- enable = true;
- enableExtensionPack = true;
- };
- # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
- guest = {
- enable = false;
- };
- };
- # run an older kernel to provide compatibility with windows vm
- boot = {
- kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
- # kernelParams = [
- # "amd_iommu=on"
- # ];
- };
+ # specialisation = {
+ # VBox.configuration = {
+ virtualisation.virtualbox = {
+ host = {
+ enable = true;
+ enableKvm = true;
+ addNetworkInterface = lib.mkIf config.virtualisation.virtualbox.host.enableKvm false;
+ package = pkgs.stable.virtualbox;
+ enableExtensionPack = true;
+ };
+ # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
+ guest = {
+ enable = false;
};
};
+ # run an older kernel to provide compatibility with windows vm
+ # boot = {
+ # kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
+ # # kernelParams = [
+ # # "amd_iommu=on"
+ # # ];
+ # };
+
+
+ # fixes the issue of running together with QEMU
+ # NOTE: once you start a QEMU VM (use kvm) VirtualBox will fail to start VMs
+ # boot.kernelParams = [ "kvm.enable_virt_at_load=0" ];
+ # };
+ # };
};
}
diff --git a/modules/nixos/optional/virtualbox.nix b/modules/nixos/optional/virtualbox.nix
index ee5a4b7..dc5aa61 100644
--- a/modules/nixos/optional/virtualbox.nix
+++ b/modules/nixos/optional/virtualbox.nix
@@ -2,27 +2,35 @@
{
options.swarselmodules.optional.virtualbox = lib.mkEnableOption "optional VBox settings";
config = lib.mkIf config.swarselmodules.optional.virtualbox {
- specialisation = {
- VBox.configuration = {
- virtualisation.virtualbox = {
- host = {
- enable = true;
- enableExtensionPack = true;
- };
- # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
- guest = {
- enable = false;
- };
- };
- # run an older kernel to provide compatibility with windows vm
- boot = {
- kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
- # kernelParams = [
- # "amd_iommu=on"
- # ];
- };
+ # specialisation = {
+ # VBox.configuration = {
+ virtualisation.virtualbox = {
+ host = {
+ enable = true;
+ enableKvm = true;
+ addNetworkInterface = lib.mkIf config.virtualisation.virtualbox.host.enableKvm false;
+ package = pkgs.stable.virtualbox;
+ enableExtensionPack = true;
+ };
+ # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
+ guest = {
+ enable = false;
};
};
+ # run an older kernel to provide compatibility with windows vm
+ # boot = {
+ # kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
+ # # kernelParams = [
+ # # "amd_iommu=on"
+ # # ];
+ # };
+
+
+ # fixes the issue of running together with QEMU
+ # NOTE: once you start a QEMU VM (use kvm) VirtualBox will fail to start VMs
+ # boot.kernelParams = [ "kvm.enable_virt_at_load=0" ];
+ # };
+ # };
};
}
From 65b0c41069c225f07ccf3d2259a0cf820290ffdf Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 19:58:57 +0200
Subject: [PATCH 6/7] chore[work]: remove documents folder from sync
---
SwarselSystems.org | 2 +-
modules/nixos/optional/work.nix | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/SwarselSystems.org b/SwarselSystems.org
index eef296d..f7d2222 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -10776,7 +10776,7 @@ Options that I need specifically at work. There are more options at [[#h:f0b2ea9
folders = {
"Documents" = {
path = "${homeDir}/Documents";
- devices = [ "magicant" "winters" "moonside@oracle" ];
+ devices = [ "moonside@oracle" ];
id = "hgr3d-pfu3w";
};
};
diff --git a/modules/nixos/optional/work.nix b/modules/nixos/optional/work.nix
index 855aac3..bb7c3a0 100644
--- a/modules/nixos/optional/work.nix
+++ b/modules/nixos/optional/work.nix
@@ -199,7 +199,7 @@ in
folders = {
"Documents" = {
path = "${homeDir}/Documents";
- devices = [ "magicant" "winters" "moonside@oracle" ];
+ devices = [ "moonside@oracle" ];
id = "hgr3d-pfu3w";
};
};
From b89e63e0f2e0e3d03eb6a82769313c704d3fb1c6 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
Date: Tue, 7 Oct 2025 21:23:11 +0200
Subject: [PATCH 7/7] chore[work]: make network connection consistent
---
SwarselSystems.org | 28 +-
index.html | 600 ++++++++++++++++++++++++-------
modules/nixos/client/network.nix | 26 +-
modules/nixos/optional/work.nix | 2 +
4 files changed, 486 insertions(+), 170 deletions(-)
diff --git a/SwarselSystems.org b/SwarselSystems.org
index f7d2222..93e6425 100644
--- a/SwarselSystems.org
+++ b/SwarselSystems.org
@@ -4926,7 +4926,7 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
certsSopsFile = self + /secrets/certs/secrets.yaml;
clientSopsFile = self + /secrets/${config.node.name}/secrets.yaml;
- inherit (config.repo.secrets.common.network) wlan1 wlan2 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
+ inherit (config.repo.secrets.common.network) wlan1 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
iwd = config.networking.networkmanager.wifi.backend == "iwd";
in
@@ -5026,6 +5026,7 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
id = wlan1;
# permissions = "";
type = "wifi";
+ autoconnect-priority = "999";
};
ipv4 = {
# dns-search = "";
@@ -5113,32 +5114,11 @@ Here I only enable =networkmanager= and a few default networks. The rest of the
proxy = { };
};
- ${wlan2} = {
- connection = {
- id = wlan2;
- type = "wifi";
- };
- ipv4 = { method = "auto"; };
- ipv6 = {
- addr-gen-mode = "stable-privacy";
- method = "auto";
- };
- proxy = { };
- wifi = {
- band = "bg";
- mode = "infrastructure";
- ssid = wlan2;
- };
- wifi-security = {
- key-mgmt = "wpa-psk";
- psk = "$WLAN2_PW";
- };
- };
-
${mobile1} = {
connection = {
id = mobile1;
type = "wifi";
+ autoconnect-priority = "500";
};
ipv4 = { method = "auto"; };
ipv6 = {
@@ -10670,6 +10650,8 @@ Options that I need specifically at work. There are more options at [[#h:f0b2ea9
connection = {
id = "VBC";
type = "wifi";
+ autoconnect-priority = "500";
+ secondaries = "48d09de4-0521-47d7-9bd5-43f97e23ff82"; # vpn uuid
};
ipv4 = { method = "auto"; };
ipv6 = {
diff --git a/index.html b/index.html
index 70ff103..8e78e79 100644
--- a/index.html
+++ b/index.html
@@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-
+
SwarselSystems: NixOS + Emacs Configurationo
@@ -443,6 +443,8 @@
3.2.5.8. Hibernation
3.2.5.9. BTRFS
3.2.5.10. work
+3.2.5.11. microvm-host
+3.2.5.12. microvm-guest
@@ -492,6 +494,12 @@
3.3.1.30.3. Mako
3.3.1.30.4. SwayOSD
3.3.1.30.5. yubikey-touch-detector
+3.3.1.30.6. blueman-applet
+3.3.1.30.7. network-manager-applet
+3.3.1.30.8. obsidian service for tray
+3.3.1.30.9. anki service for tray
+3.3.1.30.10. element service for tray
+3.3.1.30.11. vesktop service for tray
3.3.1.31. Sway
@@ -564,7 +572,7 @@
3.5.31. swarsel-build
3.5.32. swarsel-instantiate
3.5.33. sshrm
-3.5.34. endme
+3.5.34. endme
3.6. Profiles
@@ -573,7 +581,7 @@
- 3.6.1.1. Personal
- 3.6.1.2. Minimal
-- 3.6.1.3. Optionals
+- 3.6.1.3. Optionals
- 3.6.1.4. Chaostheatre
- 3.6.1.5. Work
- 3.6.1.6. Uni
@@ -816,7 +824,7 @@
-This file has 93279 words spanning 23800 lines and was last revised on 2025-09-26 08:49:32 +0200.
+This file has 94167 words spanning 24116 lines and was last revised on 2025-10-07 21:23:03 +0200.
@@ -885,7 +893,7 @@ This section defines my Emacs configuration. For a while, I considered to use ry
-My emacs is built using the emacs-overlay nix flake, which builds a bleeding edge emacs on wayland (pgtk) with utilities like treesitter support. By executing the below source block, the current build setting can be updated at any time, and you can see my most up-to-date build options (last updated: 2025-09-26 08:49:32 +0200)
+My emacs is built using the emacs-overlay nix flake, which builds a bleeding edge emacs on wayland (pgtk) with utilities like treesitter support. By executing the below source block, the current build setting can be updated at any time, and you can see my most up-to-date build options (last updated: 2025-10-07 21:23:03 +0200)
@@ -897,7 +905,7 @@ system-configuration-options
---prefix=/nix/store/4gbb3sfa5p6l3lhhnf0khvfj6w7qbqk5-emacs-git-pgtk-20250914.0 --disable-build-details --with-modules --with-pgtk --with-compress-install --with-toolkit-scroll-bars --with-native-compilation --without-imagemagick --with-mailutils --without-small-ja-dic --with-tree-sitter --without-xinput2 --without-xwidgets --with-dbus --with-selinux
+--prefix=/nix/store/qrqw5n6fivwcqfpg83x28bj1klpgfzg8-emacs-git-pgtk-20250928.0 --disable-build-details --with-modules --with-pgtk --with-compress-install --with-toolkit-scroll-bars --with-native-compilation --without-imagemagick --with-mailutils --without-small-ja-dic --with-tree-sitter --without-xinput2 --without-xwidgets --with-dbus --with-selinux
@@ -1403,6 +1411,10 @@ This provides devshell support for flake-parts
url = "github:sodiboo/niri-flake";
inputs.nixpkgs.follows = "nixpkgs";
};
+ microvm = {
+ url = "github:astro/microvm.nix";
+ inputs.nixpkgs.follows = "nixpkgs";
+ };
};
outputs =
@@ -1835,10 +1847,15 @@ The rest of the outputs either define or help define the actual configurations:
inputs.nswitch-rcm-nix.nixosModules.nswitch-rcm
inputs.swarsel-modules.nixosModules.default
inputs.niri-flake.nixosModules.niri
+ inputs.microvm.nixosModules.host
+ inputs.microvm.nixosModules.microvm
"${self}/hosts/nixos/${configName}"
"${self}/profiles/nixos"
"${self}/modules/nixos"
{
+
+ microvm.guest.enable = lib.mkDefault false;
+
node = {
name = configName;
secretsDir = ../hosts/nixos/${configName}/secrets;
@@ -3036,7 +3053,8 @@ in
# '';
boot = {
- kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ # kernelPackages = lib.mkDefault pkgs.kernel.linuxPackages;
+ kernelPackages = lib.mkDefault pkgs.linuxPackages_latest;
binfmt.emulatedSystems = [ "aarch64-linux" ];
initrd = {
availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "cryptd" "usbhid" "sd_mod" "r8152" ];
@@ -3448,6 +3466,7 @@ This is my main server that I run at home. It handles most tasks that require bi
swarselsystems = {
info = "ASRock J4105-ITX, 32GB RAM";
+ flakePath = "/root/.dotfiles";
isImpermanence = false;
isSecureBoot = true;
isCrypted = true;
@@ -5832,7 +5851,6 @@ Mostly used to install some compilers and lsp's that I want to have available wh
nixd
zig
zls
- ansible-language-server
elk-to-svg
@@ -6080,7 +6098,7 @@ let
certsSopsFile = self + /secrets/certs/secrets.yaml;
clientSopsFile = self + /secrets/${config.node.name}/secrets.yaml;
- inherit (config.repo.secrets.common.network) wlan1 wlan2 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
+ inherit (config.repo.secrets.common.network) wlan1 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
iwd = config.networking.networkmanager.wifi.backend == "iwd";
in
@@ -6126,6 +6144,9 @@ in
networking = {
inherit (config.swarselsystems) hostName;
+ hosts = {
+ "192.168.178.24" = [ "store.swarsel.win" ];
+ };
wireless.iwd = {
enable = true;
settings = {
@@ -6177,6 +6198,7 @@ in
id = wlan1;
# permissions = "";
type = "wifi";
+ autoconnect-priority = "999";
};
ipv4 = {
# dns-search = "";
@@ -6264,32 +6286,11 @@ in
proxy = { };
};
- ${wlan2} = {
- connection = {
- id = wlan2;
- type = "wifi";
- };
- ipv4 = { method = "auto"; };
- ipv6 = {
- addr-gen-mode = "stable-privacy";
- method = "auto";
- };
- proxy = { };
- wifi = {
- band = "bg";
- mode = "infrastructure";
- ssid = wlan2;
- };
- wifi-security = {
- key-mgmt = "wpa-psk";
- psk = "$WLAN2_PW";
- };
- };
-
${mobile1} = {
connection = {
id = mobile1;
type = "wifi";
+ autoconnect-priority = "500";
};
ipv4 = { method = "auto"; };
ipv6 = {
@@ -8024,6 +8025,13 @@ in
services.pipewire.systemWide = true;
+ # https://github.com/Spotifyd/spotifyd/issues/1366
+ networking.hosts."0.0.0.0" = [ "apresolve.spotify.com" ];
+
+ # hacky way to enable multi-session
+ # when another user connects, the service will crash and the new user will login
+ systemd.services.spotifyd.serviceConfig.RestartSec = lib.mkForce 1;
+
services.spotifyd = {
enable = true;
settings = {
@@ -8031,8 +8039,11 @@ in
dbus_type = "session";
use_mpris = false;
device = "sysdefault:CARD=PCH";
+ # device = "default";
device_name = "SwarselSpot";
- mixer = "alsa";
+ # backend = "pulseaudio";
+ backend = "alsa";
+ # mixer = "alsa";
zeroconf_port = servicePort;
};
};
@@ -8392,14 +8403,14 @@ in
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString whatsappPort}";
hostname = "0.0.0.0";
port = whatsappPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-whatsapp?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .FullName .PushName .JID}} (WA)";
@@ -8439,14 +8450,14 @@ in
address = "http://localhost:${builtins.toString servicePort}";
domain = serviceDomain;
};
+ database = {
+ type = "postgres";
+ uri = "postgresql:///mautrix-signal?host=/run/postgresql";
+ };
appservice = {
address = "http://localhost:${builtins.toString signalPort}";
hostname = "0.0.0.0";
port = signalPort;
- database = {
- type = "postgres";
- uri = "postgresql:///mautrix-signal?host=/run/postgresql";
- };
};
bridge = {
displayname_template = "{{or .ContactName .ProfileName .PhoneNumber}} (Signal)";
@@ -8570,7 +8581,7 @@ in
configureRedis = true;
maxUploadSize = "4G";
extraApps = {
- inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
+ inherit (pkgs.nextcloud31Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
};
extraAppsEnable = true;
config = {
@@ -8597,6 +8608,9 @@ in
locations = {
"/" = {
proxyPass = "http://${serviceName}";
+ extraConfig = ''
+ client_max_body_size 0;
+ '';
};
};
};
@@ -11624,27 +11638,35 @@ This sets the VirtualBox configuration. Guest should not be enabled if not direl
{
options.swarselmodules.optional.virtualbox = lib.mkEnableOption "optional VBox settings";
config = lib.mkIf config.swarselmodules.optional.virtualbox {
- specialisation = {
- VBox.configuration = {
- virtualisation.virtualbox = {
- host = {
- enable = true;
- enableExtensionPack = true;
- };
- # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
- guest = {
- enable = false;
- };
- };
- # run an older kernel to provide compatibility with windows vm
- boot = {
- kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
- # kernelParams = [
- # "amd_iommu=on"
- # ];
- };
+ # specialisation = {
+ # VBox.configuration = {
+ virtualisation.virtualbox = {
+ host = {
+ enable = true;
+ enableKvm = true;
+ addNetworkInterface = lib.mkIf config.virtualisation.virtualbox.host.enableKvm false;
+ package = pkgs.stable.virtualbox;
+ enableExtensionPack = true;
+ };
+ # leaving this here for future notice. setting guest.enable = true will make 'restarting sysinit-reactivation.target' take till timeout on nixos-rebuild switch
+ guest = {
+ enable = false;
};
};
+ # run an older kernel to provide compatibility with windows vm
+ # boot = {
+ # kernelPackages = lib.mkForce pkgs.stable24_05.linuxPackages;
+ # # kernelParams = [
+ # # "amd_iommu=on"
+ # # ];
+ # };
+
+
+ # fixes the issue of running together with QEMU
+ # NOTE: once you start a QEMU VM (use kvm) VirtualBox will fail to start VMs
+ # boot.kernelParams = [ "kvm.enable_virt_at_load=0" ];
+ # };
+ # };
};
}
@@ -11706,11 +11728,8 @@ This holds configuration that is specific to framework laptops.
-
{ lib, config, inputs, ... }:
+{ lib, config, ... }:
{
- # imports = [
- # inputs.fw-fanctrl.nixosModules.default
- # ];
options.swarselmodules.optional.framework = lib.mkEnableOption "optional framework machine settings";
config = lib.mkIf config.swarselmodules.optional.framework {
services = {
@@ -11768,10 +11787,11 @@ This holds configuration that is specific to framework laptops.
hardware = {
amdgpu = {
opencl.enable = true;
- amdvlk = {
- enable = true;
- support32Bit.enable = true;
- };
+ initrd.enable = true;
+ # amdvlk = {
+ # enable = true;
+ # support32Bit.enable = true;
+ # };
};
};
};
@@ -11932,6 +11952,8 @@ in
connection = {
id = "VBC";
type = "wifi";
+ autoconnect-priority = "500";
+ secondaries = "48d09de4-0521-47d7-9bd5-43f97e23ff82"; # vpn uuid
};
ipv4 = { method = "auto"; };
ipv6 = {
@@ -12000,7 +12022,8 @@ in
govc
terraform
opentofu
- dev.terragrunt
+ # dev.terragrunt
+ terragrunt
graphviz
azure-cli
@@ -12037,7 +12060,7 @@ in
folders = {
"Documents" = {
path = "${homeDir}/Documents";
- devices = [ "magicant" "winters" "moonside@oracle" ];
+ devices = [ "moonside@oracle" ];
id = "hgr3d-pfu3w";
};
};
@@ -12063,6 +12086,110 @@ in
};
}
+
+
+
+
+
+
3.2.5.11. microvm-host
+
+
+Some standard options that should be set for every microvm host.
+
+
+
+
{ lib, config, ... }:
+{
+ options.swarselmodules.optional.microvmHost = lib.mkEnableOption "optional microvmHost settings";
+ # imports = [
+ # inputs.microvm.nixosModules.host
+ # ];
+
+ config = lib.mkIf (config.swarselmodules.optional.microvmHost && config.swarselsystems.withMicroVMs) {
+
+ microvm = {
+ hypervisor = lib.mkDefault "qemu";
+ };
+ };
+
+}
+
+
+
+
+
+
3.2.5.12. microvm-guest
+
+
+Some standard options that should be set vor every microvm guest. We set the default
+
+
+
+
{ lib, config, ... }:
+{
+ options.swarselmodules.optional.microvmGuest = lib.mkEnableOption "optional microvmGuest settings";
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+ config = lib.mkIf config.swarselmodules.optional.microvmGuest
+ {
+ # imports = [
+ # inputs.microvm.nixosModules.microvm
+
+ # "${self}/profiles/nixos"
+ # "${self}/modules/nixos"
+ # ];
+
+ boot.kernelParams = [ "systemd.hostname=${config.networking.hostName}" ];
+
+ node.name = config;
+ documentation.enable = lib.mkForce false;
+
+ microvm = {
+ guest.enable = lib.mkForce true;
+ hypervisor = lib.mkDefault "qemu";
+ mem = lib.mkDefault 1024 * 4;
+ vcpu = lib.mkDefault 4;
+ optimize.enable = false;
+ writableStoreOverlay = "/nix/.rw-store";
+
+ # interfaces = flip lib.mapAttrsToList guestCfg.microvm.interfaces (
+ # _: { mac, hostLink, ...}:
+ # {
+ # type = "macvtap";
+ # id = "vm-${replaceStrings [ ":" ] [ "" ] mac}";
+ # inherit mac;
+ # macvtap = {
+ # link = hostLink;
+ # mode = "bridge";
+ # };
+ # }
+ # );
+ shares =
+ [
+ {
+ source = "/nix/store";
+ mountPoint = "/nix/.ro-store";
+ tag = "ro-store";
+ proto = "virtiofs";
+ }
+ ];
+ };
+ # systemd.network.networks = lib.flip lib.concatMapAttrs guestCfg.microvm.interfaces (
+ # name:
+ # { mac, ... }:
+ # {
+ # "10-${name}".matchConfig = mkForce {
+ # MACAddress = mac;
+ # };
+ # }
+ # );
+
+ };
+}
+
@@ -12761,46 +12888,47 @@ TODO: Non-NixOS machines (=sp3) should not use these by default, but instead the
};
xdg.mimeApps = {
-
enable = true;
defaultApplications = {
- "x-scheme-handler/http" = [ "firefox.desktop" ];
- "x-scheme-handler/https" = [ "firefox.desktop" ];
- "x-scheme-handler/chrome" = [ "firefox.desktop" ];
- "text/plain" = [ "emacsclient.desktop" ];
- "text/csv" = [ "emacsclient.desktop" ];
- "text/html" = [ "firefox.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
+ "application/metalink+xml" = [ "emacsclient.desktop" ];
+ "application/msword" = [ "writer.desktop" ];
+ "application/pdf" = [ "org.gnome.Evince.desktop" ];
+ "application/sql" = [ "emacsclient.desktop" ];
+ "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
"application/x-extension-htm" = [ "firefox.desktop" ];
"application/x-extension-html" = [ "firefox.desktop" ];
"application/x-extension-shtml" = [ "firefox.desktop" ];
- "application/xhtml+xml" = [ "firefox.desktop" ];
- "application/x-extension-xhtml" = [ "firefox.desktop" ];
"application/x-extension-xht" = [ "firefox.desktop" ];
- "image/png" = [ "imv.desktop" ];
- "image/jpeg" = [ "imv.desktop" ];
- "image/gif" = [ "imv.desktop" ];
- "image/svg" = [ "imv.desktop" ];
- "image/webp" = [ "firefox.desktop" ];
- "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
- "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "application/x-extension-xhtml" = [ "firefox.desktop" ];
+ "application/xhtml+xml" = [ "firefox.desktop" ];
"audio/flac" = [ "mpv.desktop" ];
"audio/mp3" = [ "mpv.desktop" ];
"audio/ogg" = [ "mpv.desktop" ];
"audio/wav" = [ "mpv.desktop" ];
- "video/mp4" = [ "umpv.desktop" ];
- "video/mkv" = [ "umpv.desktop" ];
- "video/flv" = [ "umpv.desktop" ];
+ "image/gif" = [ "imv.desktop" ];
+ "image/jpeg" = [ "imv.desktop" ];
+ "image/png" = [ "imv.desktop" ];
+ "image/svg" = [ "imv.desktop" ];
+ "image/vnd.adobe.photoshop" = [ "gimp.desktop" ];
+ "image/vnd.dxf" = [ "org.inkscape.Inkscape.desktop" ];
+ "image/webp" = [ "firefox.desktop" ];
+ "text/csv" = [ "emacsclient.desktop" ];
+ "text/html" = [ "firefox.desktop" ];
+ "text/plain" = [ "emacsclient.desktop" ];
"video/3gp" = [ "umpv.desktop" ];
- "application/pdf" = [ "org.gnome.Evince.desktop" ];
- "application/metalink+xml" = [ "emacsclient.desktop" ];
- "application/sql" = [ "emacsclient.desktop" ];
- "application/vnd.ms-powerpoint" = [ "impress.desktop" ];
- "application/msword" = [ "writer.desktop" ];
- "application/vnd.ms-excel" = [ "calc.desktop" ];
+ "video/flv" = [ "umpv.desktop" ];
+ "video/mkv" = [ "umpv.desktop" ];
+ "video/mp4" = [ "umpv.desktop" ];
+ "x-scheme-handler/chrome" = [ "firefox.desktop" ];
+ "x-scheme-handler/http" = [ "firefox.desktop" ];
+ "x-scheme-handler/https" = [ "firefox.desktop" ];
};
associations = {
added = {
"application/x-zerosize" = [ "emacsclient.desktop" ];
+ "application/epub+zip" = [ "calibre-ebook-viewer.desktop" ];
};
};
};
@@ -12939,7 +13067,11 @@ This section is for programs that require no further configuration. zsh Integrat
jq.enable = true;
ripgrep.enable = true;
pandoc.enable = true;
- # fzf.enable = true;
+ fzf = {
+ enable = true;
+ enableBashIntegration = false;
+ enableZshIntegration = false;
+ };
zoxide = {
enable = true;
enableZshIntegration = true;
@@ -14683,6 +14815,177 @@ The `extraConfig` section here CANNOT be reindented. This has something to do wi
+
+
3.3.1.30.6. blueman-applet
+
+
+
{ lib, config, ... }:
+{
+ options.swarselmodules.blueman-applet = lib.mkEnableOption "enable blueman applet for tray";
+ config = lib.mkIf config.swarselmodules.blueman-applet {
+ services.blueman-applet.enable = true;
+ };
+}
+
+
+
+
+
+
3.3.1.30.7. network-manager-applet
+
+
+
{ lib, config, ... }:
+{
+ options.swarselmodules.nm-applet = lib.mkEnableOption "enable network manager applet for tray";
+ config = lib.mkIf config.swarselmodules.nm-applet {
+ services.network-manager-applet.enable = true;
+ xsession.preferStatusNotifierItems = true; # needed for indicator icon to show
+ };
+}
+
+
+
+
+
+
3.3.1.30.8. obsidian service for tray
+
+
+
{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.obsidian-tray = lib.mkEnableOption "enable obsidian applet for tray";
+ config = lib.mkIf config.swarselmodules.obsidian-tray {
+
+ systemd.user.services.obsidian-applet = {
+ Unit = {
+ Description = "Obsidian applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.obsidian}/bin/obsidian";
+ };
+ };
+ };
+
+}
+
+
+
+
+
+
3.3.1.30.9. anki service for tray
+
+
+
{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.anki-tray = lib.mkEnableOption "enable anki applet for tray";
+ config = lib.mkIf config.swarselmodules.anki-tray {
+
+ systemd.user.services.anki-applet = {
+ Unit = {
+ Description = "Anki applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.anki-bin}/bin/anki-bin";
+ };
+ };
+
+ };
+}
+
+
+
+
+
+
3.3.1.30.10. element service for tray
+
+
+
{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.element-tray = lib.mkEnableOption "enable element applet for tray";
+ config = lib.mkIf config.swarselmodules.element-tray {
+
+ systemd.user.services.element-applet = {
+ Unit = {
+ Description = "Element applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.element-desktop}/bin/element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds";
+ };
+ };
+ };
+
+}
+
+
+
+
+
+
3.3.1.30.11. vesktop service for tray
+
+
+
{ lib, config, pkgs, ... }:
+{
+ options.swarselmodules.vesktop-tray = lib.mkEnableOption "enable vesktop applet for tray";
+ config = lib.mkIf config.swarselmodules.vesktop-tray {
+
+ systemd.user.services.vesktop-applet = {
+ Unit = {
+ Description = "Vesktop applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.vesktop}/bin/vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime";
+ };
+ };
+ };
+
+}
+
+
+
+
3.3.1.31. Sway
@@ -14723,11 +15026,11 @@ Currently, I am too lazy to explain every option here, but most of it is very se
type = lib.types.listOf (lib.types.attrsOf lib.types.str);
default = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=useozoneplatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
];
};
@@ -15314,11 +15617,11 @@ exec_always autotiling
"Mod+Shift+0".action = move-column-to-index 0;
};
spawn-at-startup = [
- { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
- { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
- { command = [ "anki" ]; }
- { command = [ "obsidian" ]; }
- { command = [ "nm-applet" ]; }
+ # { command = [ "vesktop" "--start-minimized" "--enable-speech-dispatcher" "--ozone-platform-hint=auto" "--enable-features=WaylandWindowDecorations" "--enable-wayland-ime" ]; }
+ # { command = [ "element-desktop" "--hidden" "--enable-features=UseOzonePlatform" "--ozone-platform=wayland" "--disable-gpu-driver-bug-workarounds" ]; }
+ # { command = [ "anki" ]; }
+ # { command = [ "obsidian" ]; }
+ # { command = [ "nm-applet" ]; }
{ command = [ "niri" "msg" "action" "focus-workspace" "2" ]; }
];
workspaces = {
@@ -16117,11 +16420,54 @@ in
};
};
- systemd.user.services.pizauth.Service = {
- ExecStartPost = [
- "${pkgs.toybox}/bin/sleep 1"
- "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
- ];
+ systemd.user.services = {
+ pizauth.Service = {
+ ExecStartPost = [
+ "${pkgs.toybox}/bin/sleep 1"
+ "//bin/sh -c '${lib.getExe pkgs.pizauth} restore < ${homeDir}/.pizauth.state'"
+ ];
+ };
+
+ teams-applet = {
+ Unit = {
+ Description = "teams applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs.stable.teams-for-linux}/bin/teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true";
+ };
+ };
+
+ onepassword-applet = {
+ Unit = {
+ Description = "1password applet";
+ Requires = [ "tray.target" ];
+ After = [
+ "graphical-session.target"
+ "tray.target"
+ ];
+ PartOf = [ "graphical-session.target" ];
+ };
+
+ Install = {
+ WantedBy = [ "graphical-session.target" ];
+ };
+
+ Service = {
+ ExecStart = "${pkgs._1password-gui}/bin/1password";
+ };
+ };
+
};
swarselservices.pizauth = {
@@ -16198,14 +16544,14 @@ in
swarselsystems = {
startup = [
# { command = "nextcloud --background"; }
- { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
- { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
- { command = "anki"; }
- { command = "obsidian"; }
- { command = "nm-applet"; }
+ # { command = "vesktop --start-minimized --enable-speech-dispatcher --ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime"; }
+ # { command = "element-desktop --hidden --enable-features=UseOzonePlatform --ozone-platform=wayland --disable-gpu-driver-bug-workarounds"; }
+ # { command = "anki"; }
+ # { command = "obsidian"; }
+ # { command = "nm-applet"; }
# { command = "feishin"; }
- { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
- { command = "1password"; }
+ # { command = "teams-for-linux --disableGpu=true --minimized=true --trayIconEnabled=true"; }
+ # { command = "1password"; }
];
monitors = {
work_back_middle = rec {
@@ -16399,6 +16745,7 @@ TODO: check which of these can be replaced but builtin functions.
default = "swarsel";
};
isCrypted = lib.mkEnableOption "uses full disk encryption";
+ withMicroVMs = lib.mkEnableOption "enable MicroVMs on this host";
isImpermanence = lib.mkEnableOption "use impermanence on this system";
isSecureBoot = lib.mkEnableOption "use secure boot on this system";
@@ -18652,8 +18999,8 @@ writeShellApplication {
-
-
3.5.34. endme
+
+
3.5.34. endme
Sometimes my DE crashes after putting it to suspend - to be precise, it happens when I put it into suspend when I have multiple screens plugged in. I have never taken the time to debug the issue, but instead just switch to a different TTY and then use this script to kill the hanging session.
@@ -18813,8 +19160,8 @@ in
-
-
3.6.1.3. Optionals
+
+
3.6.1.3. Optionals
{ lib, config, ... }:
@@ -19083,7 +19430,12 @@ in
gpgagent = lib.mkDefault true;
gammastep = lib.mkDefault true;
spicetify = lib.mkDefault true;
-
+ blueman-applet = lib.mkDefault true;
+ nm-applet = lib.mkDefault true;
+ obsidian-tray = lib.mkDefault true;
+ anki-tray = lib.mkDefault true;
+ element-tray = lib.mkDefault true;
+ vesktop-tray = lib.mkDefault true;
};
};
@@ -25866,7 +26218,7 @@ similarly, there exists an version that starts from the right.
Author: Leon Schwarzäugl
-
Created: 2025-09-26 Fr 08:49
+
Created: 2025-10-07 Di 21:23
Validate
diff --git a/modules/nixos/client/network.nix b/modules/nixos/client/network.nix
index 763b3da..9dc06c7 100644
--- a/modules/nixos/client/network.nix
+++ b/modules/nixos/client/network.nix
@@ -3,7 +3,7 @@ let
certsSopsFile = self + /secrets/certs/secrets.yaml;
clientSopsFile = self + /secrets/${config.node.name}/secrets.yaml;
- inherit (config.repo.secrets.common.network) wlan1 wlan2 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
+ inherit (config.repo.secrets.common.network) wlan1 mobile1 vpn1-location vpn1-cipher vpn1-address eduroam-anon;
iwd = config.networking.networkmanager.wifi.backend == "iwd";
in
@@ -103,6 +103,7 @@ in
id = wlan1;
# permissions = "";
type = "wifi";
+ autoconnect-priority = "999";
};
ipv4 = {
# dns-search = "";
@@ -190,32 +191,11 @@ in
proxy = { };
};
- ${wlan2} = {
- connection = {
- id = wlan2;
- type = "wifi";
- };
- ipv4 = { method = "auto"; };
- ipv6 = {
- addr-gen-mode = "stable-privacy";
- method = "auto";
- };
- proxy = { };
- wifi = {
- band = "bg";
- mode = "infrastructure";
- ssid = wlan2;
- };
- wifi-security = {
- key-mgmt = "wpa-psk";
- psk = "$WLAN2_PW";
- };
- };
-
${mobile1} = {
connection = {
id = mobile1;
type = "wifi";
+ autoconnect-priority = "500";
};
ipv4 = { method = "auto"; };
ipv6 = {
diff --git a/modules/nixos/optional/work.nix b/modules/nixos/optional/work.nix
index bb7c3a0..747a9f3 100644
--- a/modules/nixos/optional/work.nix
+++ b/modules/nixos/optional/work.nix
@@ -93,6 +93,8 @@ in
connection = {
id = "VBC";
type = "wifi";
+ autoconnect-priority = "500";
+ secondaries = "48d09de4-0521-47d7-9bd5-43f97e23ff82"; # vpn uuid
};
ipv4 = { method = "auto"; };
ipv6 = {