Compare commits

..

No commits in common. "3350d19a45ba0b6da2daa3966b72bc33fc1ea15d" and "be1df0d8267c9fb22ae68609b0ecc01d261a91ca" have entirely different histories.

80 changed files with 543 additions and 464 deletions

View file

@ -112,7 +112,7 @@
"devshell_2": {
"inputs": {
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -198,7 +198,7 @@
"flake-parts_2": {
"inputs": {
"nixpkgs-lib": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -291,18 +291,18 @@
"git-hooks": {
"inputs": {
"flake-compat": [
"nixvim",
"nixvim-config",
"nixvim",
"flake-compat"
],
"gitignore": "gitignore_2",
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
],
"nixpkgs-stable": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -346,7 +346,7 @@
"gitignore_2": {
"inputs": {
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"git-hooks",
"nixpkgs"
@ -411,7 +411,7 @@
"home-manager_3": {
"inputs": {
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -448,7 +448,7 @@
"nix-darwin": {
"inputs": {
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -612,26 +612,6 @@
}
},
"nixvim": {
"inputs": {
"flake-parts": "flake-parts",
"nixpkgs": "nixpkgs_4",
"nixvim": "nixvim_2"
},
"locked": {
"lastModified": 1723012155,
"narHash": "sha256-7AlUEGsbIOCQmIRc+lH/k2CJ32pdEkFszyMekTOVoJc=",
"ref": "refs/heads/master",
"rev": "e3dc3f07d69bcb0c9df5875aefd7dbf3877be794",
"revCount": 14,
"type": "git",
"url": "https://git.sajenim.dev/jasmine/nvim.nix.git"
},
"original": {
"type": "git",
"url": "https://git.sajenim.dev/jasmine/nvim.nix.git"
}
},
"nixvim_2": {
"inputs": {
"devshell": "devshell_2",
"flake-compat": "flake-compat_3",
@ -657,11 +637,31 @@
"type": "github"
}
},
"nixvim-config": {
"inputs": {
"flake-parts": "flake-parts",
"nixpkgs": "nixpkgs_4",
"nixvim": "nixvim"
},
"locked": {
"lastModified": 1723012155,
"narHash": "sha256-7AlUEGsbIOCQmIRc+lH/k2CJ32pdEkFszyMekTOVoJc=",
"ref": "refs/heads/master",
"rev": "e3dc3f07d69bcb0c9df5875aefd7dbf3877be794",
"revCount": 14,
"type": "git",
"url": "https://git.sajenim.dev/jasmine/nvim.nix.git"
},
"original": {
"type": "git",
"url": "https://git.sajenim.dev/jasmine/nvim.nix.git"
}
},
"nuschtosSearch": {
"inputs": {
"flake-utils": "flake-utils_4",
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]
@ -718,7 +718,7 @@
"nix-minecraft": "nix-minecraft",
"nixpkgs": "nixpkgs_3",
"nixpkgs-unstable": "nixpkgs-unstable",
"nixvim": "nixvim"
"nixvim-config": "nixvim-config"
}
},
"systems": {
@ -814,7 +814,7 @@
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"nixvim",
"nixvim-config",
"nixvim",
"nixpkgs"
]

View file

@ -28,15 +28,11 @@
# Add any other flake you might need.
nix-minecraft.url = "github:Infinidoge/nix-minecraft";
nixvim.url = "git+https://git.sajenim.dev/jasmine/nvim.nix.git";
nixvim-config.url = "git+https://git.sajenim.dev/jasmine/nvim.nix.git";
};
outputs = {
self,
nixpkgs,
home-manager,
...
} @ inputs: let
outputs = { self, nixpkgs, home-manager, ... }@inputs:
let
inherit (self) outputs;
# Supported systems for your flake packages, shell, etc.
systems = [
@ -49,7 +45,8 @@
# This is a function that generates an attribute by calling a function you
# pass to it, with each system as an argument
forAllSystems = nixpkgs.lib.genAttrs systems;
in {
in
{
# Your custom packages
# Acessible through 'nix build', 'nix shell', etc
packages = forAllSystems (system: import ./pkgs nixpkgs.legacyPackages.${system});

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
imports = [
./git.nix
./nvim.nix

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home.packages = with pkgs; [
lazygit
];

View file

@ -1,8 +1,7 @@
{ inputs, ... }:
{
inputs,
pkgs,
...
}: {
# Install our nixvim configuration for neovim.
home.packages = [inputs.nixvim.packages.${pkgs.system}.default];
home.packages = [ inputs.nixvim-config.packages.x86_64-linux.default ];
}

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home.packages = with pkgs; [
fzf # command-line fuzzy finder
];
@ -64,3 +66,4 @@
'';
};
}

View file

@ -1,4 +1,5 @@
{pkgs, ...}: let
{ pkgs, ... }:
let
awesome = pkgs.awesome.overrideAttrs (oa: {
version = "ad0290bc1aac3ec2391aa14784146a53ebf9d1f0";
src = pkgs.fetchFromGitHub {
@ -14,12 +15,10 @@
patchShebangs tests/examples/_postprocess.lua
'';
});
in {
in
{
xdg.configFile = {
awesome = {
source = ./config;
recursive = true;
};
awesome = { source = ./config; recursive = true; };
};
xsession.windowManager.awesome = {
@ -27,3 +26,4 @@ in {
package = awesome;
};
}

View file

@ -1,8 +1,6 @@
{ inputs, pkgs, ... }:
{
inputs,
pkgs,
...
}: {
imports = [
./discord
./rofi

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
nixpkgs.overlays = [
(final: prev: {
discord = prev.discord.override { withOpenASAR = true; };

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home.packages = with pkgs; [
# protonmail-bridge requires password manager
pass
@ -113,3 +115,4 @@
];
};
}

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home.packages = with pkgs; [
weechat
];
@ -14,3 +16,4 @@
];
};
}

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
services.mpd = {
enable = true;
musicDirectory = "nfs://viridian.kanto.dev/srv/multimedia/library/music";

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.picom = {
enable = true;
shadow = true;

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
programs.rofi = {
enable = true;
font = "Fisa Code 10";
@ -14,3 +16,4 @@
recursive = true;
};
}

View file

@ -1,12 +1,12 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home.packages = with pkgs.unstable; [
wezterm
];
xdg.configFile = {
wezterm = {
source = ./config;
recursive = true;
};
wezterm = { source = ./config; recursive = true; };
};
}

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
imports = [
./mangohud.nix
];

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
programs.mangohud = {
enable = true;
package = pkgs.mangohud;

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
home = {
packages = with pkgs; [
blender

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
imports = [
./global
./features/desktop
@ -49,3 +51,4 @@
};
};
}

View file

@ -1,8 +1,4 @@
{
inputs,
outputs,
...
}: {
{ inputs, outputs, ... }: {
imports = [
inputs.impermanence.nixosModules.home-manager.impermanence
../features/cli
@ -16,7 +12,7 @@
];
config = {
allowUnfree = true;
allowUnfreePredicate = _: true;
allowUnfreePredicate = (_: true);
};
};

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
imports = [
./global
];

View file

@ -1,5 +1,6 @@
# Add your reusable home-manager modules to this directory, on their own file (https://nixos.wiki/wiki/Module).
# These should be stuff you would like to share with others, not your personal configurations.
{
# List your module files here
# my-module = import ./my-module.nix;

View file

@ -1,5 +1,6 @@
# Add your reusable NixOS modules to this directory, on their own file (https://nixos.wiki/wiki/Module).
# These should be stuff you would like to share with others, not your personal configurations.
{
# List your module files here
# my-module = import ./my-module.nix;

View file

@ -1,11 +1,8 @@
{
config,
pkgs,
inputs,
...
}: let
{ config, pkgs, inputs, ... }:
let
hostname = config.networking.hostName;
in {
in
{
imports = [
inputs.agenix.nixosModules.default
inputs.agenix-rekey.nixosModules.default

View file

@ -1,4 +1,6 @@
{outputs, ...}: {
{ outputs, ... }:
{
imports = [
./age.nix
./env.nix

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
environment = {
binsh = "${pkgs.bash}/bin/bash";
shells = with pkgs; [ zsh ];

View file

@ -1,9 +1,6 @@
{ config, inputs, lib, ... }:
{
config,
inputs,
lib,
...
}: {
nix = {
gc = {
# Automatically run the garbage collector an a specified time.

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.openssh = {
enable = true;
settings = {

View file

@ -1,10 +1,8 @@
{
lib,
config,
...
}: let
{ lib, config, ... }:
let
hostname = config.networking.hostName;
in {
in
{
imports = [
./persist.nix
];

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
environment.systemPackages = with pkgs; [
# Enables files to be encrypted to age identities stored on YubiKeys
age-plugin-yubikey

View file

@ -1,4 +1,6 @@
{inputs, ...}: {
{ inputs, ... }:
{
imports = [
inputs.impermanence.nixosModules.impermanence
];

View file

@ -1,10 +1,6 @@
{ inputs, outputs, pkgs, config, ... }:
{
inputs,
outputs,
pkgs,
config,
...
}: {
imports = [
inputs.home-manager.nixosModules.home-manager
];

View file

@ -1,8 +1,6 @@
{ pkgs, config, ... }:
{
pkgs,
config,
...
}: {
age.secrets.smb-secrets = {
rekeyFile = ./smb-secrets.age;
};
@ -16,6 +14,7 @@
options = let
# this line prevents hanging on network split
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s,user,users";
in ["${automount_opts},credentials=/etc/nixos/smb-secrets,uid=1000,gid=100"];
};
@ -23,3 +22,4 @@
"nixos/smb-secrets".source = config.age.secrets.smb-secrets.path;
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
fileSystems."/home/sajenim/.local/share/Steam" = {
device = "/dev/disk/by-label/data";
fsType = "btrfs";

View file

@ -1,8 +1,6 @@
{ inputs, pkgs, ... }:
{
inputs,
pkgs,
...
}: {
imports = [
inputs.home-manager.nixosModules.home-manager
];

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
imports = [
../common/global
@ -13,7 +15,7 @@
./hardware-configuration.nix
];
# Boot configuration
/* Boot configuration */
boot = {
kernelPackages = pkgs.linuxPackages_latest;
kernelParams = [
@ -24,7 +26,7 @@
initrd.kernelModules = [ "amdgpu" ];
};
# Hardware configuration
/* Hardware configuration */
hardware = {
bluetooth = {
enable = true;
@ -47,7 +49,7 @@
};
};
# Networking configuration
/* Networking configuration */
networking = {
hostName = "fuchsia";
networkmanager.enable = true;

View file

@ -1,8 +1,6 @@
{ config, lib, ... }:
{
config,
lib,
...
}: {
imports = [
../common/optional/ephemeral-btrfs.nix
];
@ -27,8 +25,7 @@
};
swapDevices = [
{
device = "/swap/swapfile";
{ device = "/swap/swapfile";
size = 16*1024;
}
];

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
programs = {
zsh.enable = true;
# Load and unload environment variables.
@ -7,3 +9,4 @@
adb.enable = true;
};
}

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
# Our custom power state
environment.etc = {
"default/amdgpu-custom-states.card0" = {
@ -26,3 +28,4 @@
# Install our overclocking script.
environment.systemPackages = with pkgs; [ amdgpu-clocks ];
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
imports = [
./amdgpu-clocks.nix
./flatpak.nix

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
# Required to install flatpak
xdg.portal = {
enable = true;

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.libinput = {
enable = true;
mouse = { accelProfile = "flat"; };

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
# Get up and running with large language models locally.
services.ollama = {
enable = true;

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
# Enable necessary udev rules.
services.udev.packages = with pkgs; [
openrgb

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
# Setup our display server
services.xserver = {
enable = true;

View file

@ -1,4 +1,6 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
imports = [
../common/global
../common/users/sajenim
@ -63,3 +65,4 @@
# https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion
system.stateVersion = "24.05";
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
imports = [
./jellyfin.nix
./jellyseerr.nix

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "8096";
in {
in
{
virtualisation.oci-containers.containers = {
# Volunteer-built media solution that puts you in control of your media
jellyfin = {
@ -50,3 +52,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "5055";
in {
in
{
virtualisation.oci-containers.containers = {
# Request management
jellyseerr = {
@ -41,3 +43,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "8686";
in {
in
{
virtualisation.oci-containers.containers = {
# # Music collection manager for Usenet and BitTorrent users
lidarr = {
@ -44,3 +46,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "9925";
in {
in
{
virtualisation.oci-containers.containers = {
mealie = {
autoStart = true;
@ -44,4 +46,6 @@ in {
{ url = "http://127.0.0.1:${port}"; }
];
};
}

View file

@ -1,6 +1,8 @@
{config, ...}: let
{ config, ... }:
let
port = "8181";
in {
in
{
age.secrets.microbin = {
# Environment variables for microbin
rekeyFile = ./environment.age;
@ -45,3 +47,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "9696";
in {
in
{
virtualisation.oci-containers.containers = {
# Indexer manager/proxy built on the popular arr .net/reactjs base stack to integrate with your various PVR apps.
prowlarr = {
@ -41,3 +43,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "8487";
in {
in
{
virtualisation.oci-containers.containers = {
# # Open-source software alternative to µTorrent
qbittorrent = {
@ -44,3 +46,4 @@ in {
];
};
}

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "7878";
in {
in
{
virtualisation.oci-containers.containers = {
# Movie collection manager for Usenet and BitTorrent users
radarr = {
@ -43,3 +45,4 @@ in {
];
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
virtualisation.oci-containers.containers = {
# Automatically synchronize recommended settings from the TRaSH guides to your Sonarr/Radarr instances
recyclarr = {

View file

@ -1,6 +1,8 @@
{...}: let
{ ... }:
let
port = "8989";
in {
in
{
virtualisation.oci-containers.containers = {
# PVR for Usenet and BitTorrent users
sonarr = {
@ -44,3 +46,4 @@ in {
];
};
}

View file

@ -1,10 +1,8 @@
{
config,
lib,
...
}: let
{ config, lib, ... }:
let
hostname = config.networking.hostName;
in {
in
{
imports = [
../common/optional/ephemeral-btrfs.nix
];
@ -58,8 +56,7 @@ in {
};
swapDevices = [
{
device = "/swap/swapfile";
{ device = "/swap/swapfile";
size = 16*1024;
}
];

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.borgbackup.jobs = {
containers = {
paths = [
@ -31,3 +33,4 @@
};
};
}

View file

@ -1,11 +1,8 @@
{
config,
inputs,
pkgs,
...
}: let
{ config, inputs, pkgs, ... }:
let
port = "8080";
in {
in
{
imports = [
inputs.crowdsec.nixosModules.crowdsec
inputs.crowdsec.nixosModules.crowdsec-firewall-bouncer
@ -89,12 +86,9 @@ in {
environment.persistence."/persist" = {
directories = [
{
directory = "/var/lib/crowdsec";
user = "crowdsec";
group = "crowdsec";
}
{ directory = "/var/lib/crowdsec"; user = "crowdsec"; group = "crowdsec"; }
];
hideMounts = true;
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
imports = [
./traefik
./crowdsec

View file

@ -1,4 +1,6 @@
{config, ...}: {
{ config, ... }:
{
services.forgejo = {
enable = true;
stateDir = "/srv/services/forgejo";
@ -36,3 +38,4 @@
];
};
}

View file

@ -1,4 +1,6 @@
{config, ...}: {
{ config, ... }:
{
# Setup grafana our grafana instance.
services.grafana = {
enable = true;
@ -22,14 +24,12 @@
# Setup our database for grafana.
services.mysql = {
ensureUsers = [
{
ensureUsers = [{
name = "grafana";
ensurePermissions = {
"grafana.*" = "ALL PRIVILEGES";
};
}
];
}];
ensureDatabases = [ "grafana" ];
};

View file

@ -1,4 +1,6 @@
{config, ...}: {
{ config, ... }:
{
services.lighttpd = {
enable = true;
port = 5624;
@ -25,3 +27,4 @@
];
};
}

View file

@ -1,10 +1,5 @@
{
inputs,
pkgs,
lib,
config,
...
}: let
{ inputs, pkgs, lib, config, ... }:
let
modpack = pkgs.fetchPackwizModpack rec {
version = "7091175a49";
url = "https://git.sajenim.dev/jasmine/minecraft-modpack/raw/commit/${version}/pack.toml";
@ -13,7 +8,8 @@
mcVersion = modpack.manifest.versions.minecraft;
fabricVersion = modpack.manifest.versions.fabric;
serverVersion = lib.replaceStrings [ "." ] [ "_" ] "fabric-${mcVersion}";
in {
in
{
imports = [
inputs.nix-minecraft.nixosModules.minecraft-servers
];
@ -98,3 +94,4 @@ in {
];
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.mpd = {
enable = true;
musicDirectory = "/srv/multimedia/library/music";

View file

@ -1,7 +1,10 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
services.mysql = {
enable = true;
package = pkgs.mariadb;
dataDir = "/srv/services/mysql";
};
}

View file

@ -1,4 +1,6 @@
{config, ...}: {
{ config, ... }:
{
services.prometheus = {
enable = true;
port = 9001; # Port to listen on.
@ -21,12 +23,11 @@
scrapeConfigs = [
{
job_name = "node";
static_configs = [
{
static_configs = [{
targets = [ "127.0.0.1:${toString config.services.prometheus.exporters.node.port}" ];
}
];
}];
}
];
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.samba = {
enable = true;
securityType = "user";

View file

@ -1,9 +1,6 @@
{ inputs, config, pkgs, ... }:
{
inputs,
config,
pkgs,
...
}: {
disabledModules = [ "services/web-servers/traefik.nix" ];
imports = [
@ -89,13 +86,11 @@
# List of domains in our network
domains = [
# Internal services
{
main = "kanto.dev";
{ main = "kanto.dev";
sans = [ "*.kanto.dev" ];
}
# Public services
{
main = "sajenim.dev";
{ main = "sajenim.dev";
sans = [ "*.sajenim.dev" ];
}
];
@ -149,33 +144,20 @@
services.prometheus.scrapeConfigs = [
{
job_name = "traefik";
static_configs = [
{
static_configs = [{
targets = [ "127.0.0.1:8082" ];
}
];
}];
}
];
# Persist our traefik data & logs
environment.persistence."/persist" = {
directories = [
{
directory = "/var/lib/traefik";
user = "traefik";
group = "traefik";
}
{
directory = "/var/log/traefik";
user = "traefik";
group = "traefik";
}
{
directory = "/plugins-storage";
user = "traefik";
group = "traefik";
}
{ directory = "/var/lib/traefik"; user = "traefik"; group = "traefik"; }
{ directory = "/var/log/traefik"; user = "traefik"; group = "traefik"; }
{ directory = "/plugins-storage"; user = "traefik"; group = "traefik"; }
];
hideMounts = true;
};
}

View file

@ -1,4 +1,6 @@
{config, ...}: {
{ config, ... }:
{
# Crowdsec Local API key for the bouncer.
age.secrets.traefik-bouncer-key = {
rekeyFile = ../crowdsec/traefik-bouncer-key.age;
@ -55,3 +57,4 @@
};
};
}

View file

@ -1,4 +1,6 @@
{...}: {
{ ... }:
{
services.traefik.dynamicConfigOptions.http.routers = {
traefik-dashboard = {
rule = "Host(`traefik.kanto.dev`)";
@ -23,3 +25,4 @@
};
};
}

View file

@ -1,7 +1,10 @@
{...}: {
{ ... }:
{
services.traefik.dynamicConfigOptions.http.services = {
ender1.loadBalancer.servers = [
{ url = "http://192.168.1.103:80"; }
];
};
}

View file

@ -1,5 +1,7 @@
# This file defines overlays
{inputs, ...}: {
{ inputs, ... }:
{
# This one brings our custom packages from the 'pkgs' directory
additions = final: _prev: import ../pkgs final.pkgs;

View file

@ -1,10 +1,9 @@
{
stdenv,
lib,
fetchFromGitHub,
bash,
subversion,
makeWrapper,
{ stdenv
, lib
, fetchFromGitHub
, bash
, subversion
, makeWrapper
}:
stdenv.mkDerivation {
pname = "amdgpu-clocks";
@ -25,3 +24,4 @@ stdenv.mkDerivation {
--prefix PATH : ${lib.makeBinPath [ bash subversion ]}
'';
}

View file

@ -1,5 +1,6 @@
# Custom packages, that can be defined similarly to ones from nixpkgs
# You can build them using 'nix build .#example'
pkgs: {
xmobar = pkgs.callPackage ./xmobar-config { };
xmonad = pkgs.callPackage ./xmonad-config { };

View file

@ -1,4 +1,5 @@
{ pkgs }:
pkgs.haskellPackages.developPackage {
root = ./.;
}

View file

@ -1,10 +1,12 @@
{ pkgs }:
pkgs.haskellPackages.developPackage {
root = ./.;
source-overrides = {
xmonad = builtins.fetchTarball {
xmonad = (builtins.fetchTarball {
url = "https://github.com/xmonad/xmonad/archive/refs/tags/v0.18.0.tar.gz";
sha256 = "0jlc60n5jarcxgjxm1vcsgc3s2lwmn3c3n56hialhzx54wfskkbc";
};
});
};
}