Merge remote-tracking branch 'origin'

This commit is contained in:
Leyla Becker 2026-02-17 15:19:37 -06:00
commit 5a1cefdf6a
8 changed files with 44 additions and 56 deletions

View file

@ -71,10 +71,12 @@ nix multi user, multi system, configuration with `sops` secret management, `home
- [ ] monitor configuration in `~/.config/monitors.xml` should be sym linked to `/run/gdm/.config/monitors.xml` (https://www.reddit.com/r/NixOS/comments/u09cz9/home_manager_create_my_own_symlinks_automatically/) - [ ] monitor configuration in `~/.config/monitors.xml` should be sym linked to `/run/gdm/.config/monitors.xml` (https://www.reddit.com/r/NixOS/comments/u09cz9/home_manager_create_my_own_symlinks_automatically/)
- [ ] migrate away from flakes and move to npins - [ ] migrate away from flakes and move to npins
- [ ] `host.users` should be redone so that we just extend the base `users.users` object. Right now we cant quite do this because we have weird circular dependencies with disko/impermanence (not sure which one) and home manger enabling/disabling users per devices - [ ] `host.users` should be redone so that we just extend the base `users.users` object. Right now we cant quite do this because we have weird circular dependencies with disko/impermanence (not sure which one) and home manger enabling/disabling users per devices
- [ ] Home manager impermanence is preventing updates to the latest version of the module
## Broken things ## Broken things
- [ ] figure out steam vr things? - [ ] figure out steam vr things?
- [ ] whisper was having issues - [ ] whisper was having issues
- [ ] auto loading of ssh agent keys that we auto generate per system
## Data Integrity ## Data Integrity
- [ ] zfs email after scrubbing # TODO: test this - [ ] zfs email after scrubbing # TODO: test this
@ -102,7 +104,9 @@ nix multi user, multi system, configuration with `sops` secret management, `home
- [ ] Penpot services (need to make this custom) - [ ] Penpot services (need to make this custom)
- [ ] minecraft server with old world file - [ ] minecraft server with old world file
- [ ] storj server - [ ] storj server
- [ ] XMR miner used to heat home based on smart thermostat
- [ ] Create Tor guard/relay server - [ ] Create Tor guard/relay server
- [ ] Create i2P node
- [ ] screeps server - [ ] screeps server
- [ ] mastodon instance - [ ] mastodon instance

View file

@ -141,6 +141,12 @@
keyword = ""; keyword = "";
tags = [""]; tags = [""];
} }
{
name = "Cyberia Git";
url = "https://git.cyberia.club";
keyword = "";
tags = [""];
}
# Template # Template
# { # {
# name = ""; # name = "";

View file

@ -6,6 +6,7 @@
config.programs.vscode.profiles.default.userSettings = { config.programs.vscode.profiles.default.userSettings = {
"cSpell.userWords" = [ "cSpell.userWords" = [
"leyla" "leyla"
"Cyberia"
]; ];
"cSpell.languageSettings" = [ "cSpell.languageSettings" = [

77
flake.lock generated
View file

@ -28,11 +28,11 @@
}, },
"locked": { "locked": {
"dir": "pkgs/firefox-addons", "dir": "pkgs/firefox-addons",
"lastModified": 1767911574, "lastModified": 1768500104,
"narHash": "sha256-JsYIPaTgbJHEb1rgzwS9H+c0hCy/Sr1WaxNgtvu6xro=", "narHash": "sha256-Xa8XJaydHKAhDCLyjdKcDKjFrGgdahNcVo1boGUdZKY=",
"owner": "rycee", "owner": "rycee",
"repo": "nur-expressions", "repo": "nur-expressions",
"rev": "0d02843bec4ca8a16f7f08c25fe4e40cd829de0f", "rev": "7e517454cd248c76046c3157b56662d223de29b1",
"type": "gitlab" "type": "gitlab"
}, },
"original": { "original": {
@ -115,32 +115,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1767909183, "lastModified": 1768512489,
"narHash": "sha256-u/bcU0xePi5bgNoRsiqSIwaGBwDilKKFTz3g0hqOBAo=", "narHash": "sha256-jZi945d3e6DYhrw3K5Pew+QaL3qSgq3O6xiVaEVLgXs=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "cd6e96d56ed4b2a779ac73a1227e0bb1519b3509", "rev": "bba859cd85b90dd9e4e6fd44b2af4aa64ae801a1",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"home-manager_2": {
"inputs": {
"nixpkgs": [
"impermanence",
"nixpkgs"
]
},
"locked": {
"lastModified": 1747978958,
"narHash": "sha256-pQQnbxWpY3IiZqgelXHIe/OAE/Yv4NSQq7fch7M6nXQ=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "7419250703fd5eb50e99bdfb07a86671939103ea",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -204,9 +183,7 @@
"mcp-nixos": { "mcp-nixos": {
"inputs": { "inputs": {
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"nixpkgs": [ "nixpkgs": "nixpkgs"
"nixpkgs"
]
}, },
"locked": { "locked": {
"lastModified": 1767822362, "lastModified": 1767822362,
@ -229,11 +206,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1767718503, "lastModified": 1768220509,
"narHash": "sha256-V+VkFs0aSG0ca8p/N3gib7FAf4cq9jyr5Gm+ZBrHQpo=", "narHash": "sha256-8wMrJP/Xk5Dkm0TxzaERLt3eGFEhHTWaJKUpK3AoL4o=",
"owner": "LnL7", "owner": "LnL7",
"repo": "nix-darwin", "repo": "nix-darwin",
"rev": "9f48ffaca1f44b3e590976b4da8666a9e86e6eb1", "rev": "7b1d394e7d9112d4060e12ef3271b38a7c43e83b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -270,11 +247,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1767838417, "lastModified": 1768443224,
"narHash": "sha256-UJ6qBXzOh/FMYgP/OlM8QeKolpQYN0198onIu8oB6dM=", "narHash": "sha256-U2UHV+8Ygba2eFhFSnl15wMuKqNR884V2mo2fLO9wy0=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-vscode-extensions", "repo": "nix-vscode-extensions",
"rev": "4e92639f25e4f530990a99a32da696ee9117eb1e", "rev": "151bb82df60a9ffcd2fef1116e4c9baf133b3ec5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -285,11 +262,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1767185284, "lastModified": 1768499669,
"narHash": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=", "narHash": "sha256-jJr/zDxu5evfQxlXtMrFFF68/RNj1UrctS/eIsay4k0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "40b1a28dce561bea34858287fbb23052c3ee63fe", "rev": "7297dfc69ae9b06e984a6f69900ce25e67c76f46",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -301,15 +278,15 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1748026106, "lastModified": 1767640445,
"narHash": "sha256-6m1Y3/4pVw1RWTsrkAK2VMYSzG4MMIj7sqUy7o8th1o=", "narHash": "sha256-UWYqmD7JFBEDBHWYcqE6s6c77pWdcU/i+bwD6XxMb8A=",
"owner": "nixos", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "063f43f2dbdef86376cc29ad646c45c46e93234c", "rev": "9f0c42f8bc7151b8e7e5840fb3bd454ad850d8c5",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "NixOS",
"ref": "nixos-unstable", "ref": "nixos-unstable",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
@ -332,11 +309,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1767767207, "lastModified": 1768305791,
"narHash": "sha256-Mj3d3PfwltLmukFal5i3fFt27L6NiKXdBezC1EBuZs4=", "narHash": "sha256-AIdl6WAn9aymeaH/NvBj0H9qM+XuAuYbGMZaP0zcXAQ=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5912c1772a44e31bf1c63c0390b90501e5026886", "rev": "1412caf7bf9e660f2f962917c14b1ea1c3bc695e",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -446,11 +423,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1767826491, "lastModified": 1768481291,
"narHash": "sha256-WSBENPotD2MIhZwolL6GC9npqgaS5fkM7j07V2i/Ur8=", "narHash": "sha256-NjKtkJraCZEnLHAJxLTI+BfdU//9coAz9p5TqveZwPU=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "ea3adcb6d2a000d9a69d0e23cad1f2cacb3a9fbe", "rev": "e085e303dfcce21adcb5fec535d65aacb066f101",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -75,7 +75,7 @@
# MCP NixOS server for Claude Dev # MCP NixOS server for Claude Dev
mcp-nixos = { mcp-nixos = {
url = "github:utensils/mcp-nixos"; url = "github:utensils/mcp-nixos";
inputs.nixpkgs.follows = "nixpkgs"; # Not following nixpkgs because aws-sam-translator doesn't support Python 3.14 yet
}; };
# Noita Entangled Worlds package # Noita Entangled Worlds package

View file

@ -52,9 +52,9 @@
addKeysToAgent = "confirm"; addKeysToAgent = "confirm";
}; };
}; };
extraConfig = lib.strings.concatLines ( # extraConfig = lib.strings.concatLines (
builtins.map (hostKey: "IdentityFile ~/.ssh/${hostKey.path}") config.programs.openssh.hostKeys # builtins.map (hostKey: "IdentityFile ~/.ssh/${hostKey.path}") config.programs.openssh.hostKeys
); # );
}; };
systemd.user.services = builtins.listToAttrs ( systemd.user.services = builtins.listToAttrs (

@ -1 +1 @@
Subproject commit 6e90a73ed2e1e81ba37628fc5e5494a80d22b526 Subproject commit 22be81505a49cd205e9b5c91f51af69c0b885ed3

View file

@ -10,7 +10,7 @@
nix-syncthing = inputs.nix-syncthing; nix-syncthing = inputs.nix-syncthing;
disko = inputs.disko; disko = inputs.disko;
impermanence = inputs.impermanence; impermanence = inputs.impermanence;
lix-module = inputs.lix-module; # lix-module = inputs.lix-module;
systems = [ systems = [
"aarch64-darwin" "aarch64-darwin"