applied nixfmt

This commit is contained in:
Osman Faruk Bayram 2024-10-18 00:01:32 +03:00
parent 3dcfac3066
commit 0e00b442e1
2 changed files with 28 additions and 31 deletions

View file

@ -5,10 +5,9 @@
{ config, pkgs, pkgs-unstable, system-label, ... }: { config, pkgs, pkgs-unstable, system-label, ... }:
{ {
imports = imports = [ # Include the results of the hardware scan.
[ # Include the results of the hardware scan. ./hardware-configuration.nix
./hardware-configuration.nix ];
];
# Bootloader. # Bootloader.
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
@ -96,7 +95,7 @@
users.users.osbm = { users.users.osbm = {
isNormalUser = true; isNormalUser = true;
description = "osbm"; description = "osbm";
extraGroups = [ "networkmanager" "wheel" "docker"]; extraGroups = [ "networkmanager" "wheel" "docker" ];
packages = with pkgs; [ packages = with pkgs; [
kdePackages.kate kdePackages.kate
vscode vscode
@ -117,7 +116,7 @@
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
# enable nix flakes # enable nix flakes
nix.settings.experimental-features = [ "nix-command" "flakes"]; nix.settings.experimental-features = [ "nix-command" "flakes" ];
nix.gc = { nix.gc = {
automatic = true; automatic = true;
@ -130,12 +129,14 @@
programs.steam = { programs.steam = {
enable = true; enable = true;
remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play remotePlay.openFirewall =
dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server true; # Open ports in the firewall for Steam Remote Play
localNetworkGameTransfers.openFirewall = true; # Open ports in the firewall for Steam Local Network Game Transfers dedicatedServer.openFirewall =
true; # Open ports in the firewall for Source Dedicated Server
localNetworkGameTransfers.openFirewall =
true; # Open ports in the firewall for Steam Local Network Game Transfers
}; };
# List packages installed in system profile. To search, run: # List packages installed in system profile. To search, run:
# $ nix search wget # $ nix search wget
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
@ -174,11 +175,11 @@
enabled = "fcitx5"; enabled = "fcitx5";
# waylandFrontend = true; # waylandFrontend = true;
fcitx5.addons = with pkgs; [ fcitx5.addons = with pkgs; [
fcitx5-gtk # alternatively, kdePackages.fcitx5-qt fcitx5-gtk # alternatively, kdePackages.fcitx5-qt
fcitx5-mozc # table input method support fcitx5-mozc # table input method support
fcitx5-nord # a color theme fcitx5-nord # a color theme
]; ];
}; };
# List services that you want to enable: # List services that you want to enable:
# Enable the OpenSSH daemon. # Enable the OpenSSH daemon.

View file

@ -7,25 +7,21 @@
}; };
outputs = inputs@{ outputs = inputs@{ self, nixpkgs, nixpkgs-unstable, ... }: {
self, nixosConfigurations = {
nixpkgs, # revision = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown";
nixpkgs-unstable, tartarus = nixpkgs.lib.nixosSystem rec {
... system = "x86_64-linux";
}: { modules = [ ./configuration.nix ];
nixosConfigurations = { specialArgs = {
# revision = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown"; pkgs-unstable = import nixpkgs-unstable {
tartarus = nixpkgs.lib.nixosSystem rec { inherit system;
system = "x86_64-linux"; config.allowUnfree = true;
modules = [ ./configuration.nix ];
specialArgs = {
pkgs-unstable = import nixpkgs-unstable {
inherit system;
config.allowUnfree = true;
};
system-label = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown";
}; };
system-label =
self.shortRev or self.dirtyShortRev or self.lastModified or "unknown";
}; };
}; };
}; };
};
} }