Config chagnes

This commit is contained in:
2024-10-06 16:36:21 +02:00
parent 5655c8a056
commit 7d53dac96d
14 changed files with 99 additions and 130 deletions

View File

@@ -3,6 +3,9 @@
{
home.packages = with pkgs; [
unstable.marksman
unstable.svls
unstable.nil
unstable.nixpkgs-fmt
];
programs.helix = {
@@ -16,11 +19,28 @@
};
};
languages = {
# Rust
language-server.rust-analyzer.config = {
cargo = {
features = "all";
};
};
# Systemverilog
language-server.svls = {
command = "svls";
};
language = [
{
name = "verilog";
language-servers = [ "svls" ];
}
{
name = "nix";
language-servers = [ "svls" ];
}
];
};
themes = {
base16 = let

View File

@@ -1,6 +1,11 @@
{ inputs, pkgs, ... }:
{
# about:policies
# Check about:support for extension/add-on ID strings.
# Check about:config for options.
home.packages = with pkgs; [
unstable.firefoxpwa
];
@@ -42,6 +47,31 @@
};
};
profiles.xeovalyte = {
bookmarks = [
{
name = "Toolbar";
toolbar = true;
bookmarks = [
{
name = "Brightspace";
bookmarks = [
{
name = "LCA";
url = "https://brightspace.tudelft.nl/d2l/le/content/681008/Home";
}
{
name = "DSA";
url = "https://brightspace.tudelft.nl/d2l/le/content/681012/Home";
}
{
name = "iEE";
url = "https://brightspace.tudelft.nl/d2l/le/content/681018/Home";
}
];
}
];
}
];
search.engines = {
"Nix" = {
urls = [{
@@ -93,7 +123,7 @@
"browser.shell.defaultBrowserCheckCount" = 1;
"dom.security.https_only_mode" = true;
"privacy.trackingProtection.enabled" = true;
"browser.toolbars.bookmarks.visibility" = "never";
"browser.toolbars.bookmarks.visibility" = "newtab";
"browser.translations.neverTranslateLanguages" = "nl";
"browser.newtabpage.pinned" = [
{

View File

@@ -4,7 +4,7 @@
environment.systemPackages = with pkgs; [
usbutils
tree
neofetch
fastfetch
btop
git
];

View File

@@ -31,7 +31,6 @@
};
# Sound configuration
sound.enable = true;
hardware.pulseaudio.enable = false;
security.rtkit.enable = true;
services.pipewire = {

View File

@@ -3,7 +3,7 @@
{
networking.firewall = {
enable = true;
allowedTCPPorts = [ 53317 3000 ];
allowedUDPPorts = [ 53317 ];
allowedTCPPorts = [ 53317 3000 24800 ];
allowedUDPPorts = [ 53317 24800 ];
};
}

View File

@@ -3,31 +3,5 @@
{
services.fprintd.enable = true;
security.pam.services.hyprlock = {
text = ''
auth sufficient pam_unix.so try_first_pass likeauth nullok
auth sufficient ${pkgs.fprintd}/lib/security/pam_fprintd.so
auth include login
'';
};
security.pam.services.greetd = {
text = ''
account required pam_unix.so # unix (order 10900)
# Authentication management.
auth sufficient pam_unix.so likeauth nullok try_first_pass # unix (order 11600)
auth sufficient /nix/store/bz12s6mba297725i9y35p73lvsic8gd3-fprintd-1.94.2/lib/security/pam_fprintd.so # fprintd (order 11400)
auth required pam_deny.so # deny (order 12400)
# Password management.
password sufficient pam_unix.so nullok yescrypt # unix (order 10200)
# Session management.
session required pam_env.so conffile=/etc/pam/environment readenv=0 # env (order 10100)
session required pam_unix.so # unix (order 10200)
session required pam_loginuid.so # loginuid (order 10300)
session optional /nix/store/dzp7d4k1d94s1x49p9171mvcsfyxr7bj-systemd-254.6/lib/security/pam_systemd.so # systemd (order 12000) login
'';
};
security.pam.services.login.fprintAuth = false;
}

View File

@@ -1,17 +1,17 @@
{ ... }:
{
services.auto-cpufreq.enable = true;
services.auto-cpufreq.settings = {
battery = {
governor = "powersave";
turbo = "never";
};
charger = {
governor = "performance";
turbo = "auto";
};
};
# services.auto-cpufreq.enable = true;
# services.auto-cpufreq.settings = {
# battery = {
# governor = "powersave";
# turbo = "never";
# };
# charger = {
# governor = "performance";
# turbo = "auto";
# };
# };
services.power-profiles-daemon.enable = true;

View File

@@ -0,0 +1,12 @@
{ pkgs, ... }:
{
virtualisation.libvirtd.enable = true;
programs.virt-manager.enable = true;
users.users.xeovalyte.extraGroups = [ "libvirtd" ];
environment.systemPackages = with pkgs; [
quickemu
];
}