{ config, lib, pkgs, ... }: { nixpkgs.config.allowUnfree = true; boot = { kernelPackages = pkgs.linuxPackages_xanmod_latest; extraModulePackages = with config.boot.kernelPackages; [ v4l2loopback ]; kernelModules = [ "v4l2loopback" ]; kernelParams = [ "video=eDP-1:2560x1440@165" ]; }; time.timeZone = "Europe/Warsaw"; nix = { settings = { max-jobs = 2; cores = 3; substituters = [ "https://nix-community.cachix.org" "https://nixpkgs-wayland.cachix.org" "https://viperml.cachix.org" ]; trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA=" "viperml.cachix.org-1:qZhKBMTfmcLL+OG6fj/hzsMEedgKvZVFRRAhq7j8Vh8=" ]; }; }; programs.dconf.enable = true; security.sudo.package = pkgs.sudo.override { withInsults = true; }; security.polkit.enable = true; users.users.${config.myOptions.other.system.username} = { extraGroups = [ "video" "wireshark" ]; }; environment.sessionVariables = { CHROME_EXECUTABLE = "${pkgs.ungoogled-chromium}/bin/chromium"; }; hardware = { sensor.iio.enable = true; ipu6 = { enable = true; platform = "ipu6"; }; opengl = { enable = true; driSupport = true; driSupport32Bit = true; extraPackages = with pkgs; [ mesa libdrm libva vaapiVdpau libvdpau-va-gl ]; extraPackages32 = with pkgs; [ driversi686Linux.mesa driversi686Linux.vaapiVdpau driversi686Linux.libvdpau-va-gl ]; }; }; services = { pcscd.enable = true; udisks2.enable = true; dbus.enable = true; fwupd = { enable = true; }; ratbagd.enable = true; fprintd = { enable = true; tod = { enable = true; driver = pkgs.libfprint-2-tod1-goodix; }; }; }; services.btrfs = { autoScrub = { enable = true; interval = "weekly"; }; }; services.journald = { extraConfig = '' SystemMaxUse=100M ''; }; services.udev = { packages = with pkgs; [ yubikey-personalization ]; }; programs.wireshark = { enable = true; package = pkgs.wireshark; }; # this makes usb devices autosuspend #powerManagement.powertop.enable = true; programs.kdeconnect.enable = true; programs.noisetorch.enable = true; virtualisation.waydroid.enable = true; # https://github.com/NixOS/nixpkgs/issues/270809 systemd.services.ModemManager = { enable = lib.mkForce true; path = [ pkgs.libqmi ]; wantedBy = [ "multi-user.target" "network.target" ]; }; networking.networkmanager = { enable = true; ensureProfiles.profiles = { sim = { connection = { id = "sim"; uuid = "91d0e582-a24a-4835-baa9-98709b7793f9"; type = "gsm"; autoconnect = false; permissions = "user:jacek:;"; }; gsm = { apn = "internet"; username = "internet"; password = "internet"; }; ipv4.method = "auto"; ipv6 = { addr-gen-mode = "default"; method = "auto"; }; }; }; }; myOptions = { other = { system = { hostname = "del"; username = "jacek"; }; home-manager = { enable = true; enableDirenv = true; }; }; programs = { git = { enable = true; userName = "jacekpoz"; userEmail = "jacekpoz@cock.li"; signingKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHXD1EM4mQz99vJhmZX1r7kwMd8yewogOuoTUuv1xWZB"; defaultBranch = "master"; }; starship.enable = true; zsh = { enable = true; extraAliases = { #u = "nh os switch \"/home/jacek/niksos\" -H niks -- --use-remote-sudo"; #us = "NIX_SSHOPTS='-t' nh os switch \"/home/jacek/niksos\" -H chmura -- --use-remote-sudo --target-host chmura"; u = "nixos-rebuild switch --flake \"/home/jacek/niksos#del\" -L --use-remote-sudo"; us = "NIX_SSHOPTS='-t' nixos-rebuild switch --flake \"/home/jacek/niksos#chmura\" -L --use-remote-sudo --target-host chmura"; }; profiling = false; }; anyrun.enable = true; armcord.enable = true; vesktop.enable = true; btop.enable = true; firefox = { enable = true; defaultSearchEngine = "NotASearx"; searchEngines = { "NotASearx" = { url = "https://search.notashelf.dev/search?q={searchTerms}"; faviconUrl = "https://search.notashelf.dev/favicon.ico"; aliases = [ "!sx" ]; }; "NixOS Packages" = { url = "https://search.nixos.org/packages?channel=unstable&query={searchTerms}"; faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg"; aliases = [ "!np" ]; }; "NixOS Options" = { url = "https://search.nixos.org/options?channel=unstable&query={searchTerms}"; faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg"; aliases = [ "!no" ]; }; "NixOS Wiki" = { url = "https://nixos.wiki/index.php?search={searchTerms}"; faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg"; aliases = [ "!nw" ]; }; "Home Manger Option Search" = { url = "https://mipmip.github.io/home-manager-option-search?query={searchTerms}"; faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg"; aliases = [ "!hm" ]; }; "Arch Wiki" = { url = "https://wiki.archlinux.org/index.php?search={searchTerms}"; faviconUrl = "https://archlinux.org/favicon.ico"; aliases = [ "!aw" ]; }; "Gentoo Wiki" = { url = "https://wiki.gentoo.org/index.php?search={searchTerms}"; faviconUrl = "https://www.gentoo.org/favicon.ico"; aliases = [ "!gw" ]; }; "Debian Wiki" = { url = "https://wiki.debian.org/FrontPage?action=fullsearch&value={searchTerms}"; faviconUrl = "https://www.debian.org/favicon.ico"; aliases = [ "!dw" ]; }; }; }; foot.enable = true; mpv.enable = true; osu = { enable = false; enableStable = false; }; neovim.enable = true; zathura.enable = true; hypr = { land.enable = true; lock.enable = true; }; helix.enable = false; newsboat.enable = true; }; themes = { cursor = { enable = true; package = pkgs.bibata-cursors; name = "Bibata-Modern-Classic"; size = 24; }; gtk = { enable = true; package = pkgs.catppuccin-gtk; name = "Catppuccin-Mocha-Standard-Green-Dark"; variant = "mocha"; accentColour = "green"; iconTheme = { name = "Papirus-Dark"; package = pkgs.catppuccin-papirus-folders; }; }; qt = { enable = true; package = pkgs.catppuccin-kde; name = "Catppuccin-Mocha-Dark"; variant = "mocha"; accentColour = "green"; }; }; services = { dunst.enable = true; mpd.enable = true; greetd = { enable = true; greeter = "gtkgreet"; launchOptions = [ "Hyprland" "sway" "zsh" "reboot" "shutdown now" ]; }; ssh = { daemon.enable = false; agent = { enable = true; hostAliases = rec { github = { hostName = "github.com"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBjhNPiKUGyAdhI6jXQsDVj5jqklIh+gVEoCGZEEaC62"; }; codeberg = { hostName = "codeberg.org"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILZReNUB66x+SkVx0hlbA1lyfEBMpT8IvQ6LPRn52oBl"; }; gitlab = { hostName = "gitlab.com"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA/4XLNm1/ea2jtLj2AvPWMigA/xo9mLbRUGurVthiqm"; }; aur = { hostName = "aur.archlinux.org"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPrCofD7GLXfASLMdYFnnMxs77Ys0nu9PsCo6IKVB6Wd"; user = "aur"; }; jacekpoz = { hostName = "git.jacekpoz.pl"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJSxvSM0y5Z958VrgU9JNCYS4oZmV4nNXP3hIrw6zr8R"; user = "forgejo"; }; chmura = { hostName = "192.168.15.2"; publicKey = "ssh-rsa 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"; user = "chmura"; }; chmura2 = chmura // { hostName = "jacekpoz.pl"; }; malina = { hostName = "192.168.15.3"; publicKey = "ssh-rsa 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"; user = "malina"; }; outfoxxed = { hostName = "git.outfoxxed.me"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGqsfan2BERiFSgXEv6KCTbzpKmtkq4gNd2409ZuKbgh"; }; kik_haslo = { hostName = "156.17.7.16"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJAC03lGubkSRl02cX1TJ3ItkcozS8aocEHeysv/WY4v"; port = 10002; user = "auth"; }; kik_oceny = { hostName = "156.17.7.45"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJAC03lGubkSRl02cX1TJ3ItkcozS8aocEHeysv/WY4v"; port = 19999; user = "view"; }; tramwaj = { hostName = "asi.pwr.wroc.pl"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINnqXeczgwYduhAd3LT16qTor8CcU1b8J+YyUwKhkxqD"; port = 2137; user = "poz"; }; }; }; }; pipewire.enable = true; }; }; system.stateVersion = "23.11"; }