Fix errors so system builds

This commit is contained in:
Julia Lange 2024-04-09 00:00:42 -07:00
parent 73142b1bdf
commit a43df02076
9 changed files with 45 additions and 66 deletions

76
flake.lock generated
View file

@ -53,11 +53,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1712339458, "lastModified": 1712434681,
"narHash": "sha256-j8pv3tL2EFLGuvFoO64dHWD8YzNvD77hRb4EEx5ADgE=", "narHash": "sha256-qwmR2p1oc48Bj7gUDvb1oGL19Rjs2PmEmk4ChV01A5o=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "hyprcursor", "repo": "hyprcursor",
"rev": "981b6617822dadc40246a6c70194d02dfc12e4c6", "rev": "818d8c4b69e0997483d60b75f701fe14b561a7a3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -71,17 +71,19 @@
"hyprcursor": "hyprcursor", "hyprcursor": "hyprcursor",
"hyprland-protocols": "hyprland-protocols", "hyprland-protocols": "hyprland-protocols",
"hyprlang": "hyprlang", "hyprlang": "hyprlang",
"nixpkgs": "nixpkgs", "nixpkgs": [
"nixpkgs"
],
"systems": "systems", "systems": "systems",
"wlroots": "wlroots", "wlroots": "wlroots",
"xdph": "xdph" "xdph": "xdph"
}, },
"locked": { "locked": {
"lastModified": 1712457111, "lastModified": 1712635734,
"narHash": "sha256-hTRMWHl49SYfui2W3qCq790MHnX8JTBfYQcxgwjbQ0g=", "narHash": "sha256-x4vfyFFVh8X2Y84gKkhUqeM92u/2hpkD8lx9RAscqFw=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "Hyprland", "repo": "Hyprland",
"rev": "f2a848cbcc41f29fb62ee67aef95136ae1a650da", "rev": "d0d1ba5918206f16128e56988dd4db5d6d143338",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -142,27 +144,26 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1712163089, "lastModified": 1712439257,
"narHash": "sha256-Um+8kTIrC19vD4/lUCN9/cU9kcOsD1O1m+axJqQPyMM=", "narHash": "sha256-aSpiNepFOMk9932HOax0XwNxbA38GOUVOiXfUVPOrck=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "fd281bd6b7d3e32ddfa399853946f782553163b5", "rev": "ff0dbd94265ac470dda06a657d5fe49de93b4599",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "id": "nixpkgs",
"ref": "nixos-unstable", "ref": "nixos-unstable",
"repo": "nixpkgs", "type": "indirect"
"type": "github"
} }
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1712310679, "lastModified": 1712437997,
"narHash": "sha256-XgC/a/giEeNkhme/AV1ToipoZ/IVm1MV2ntiK4Tm+pw=", "narHash": "sha256-g0whLLwRvgO2FsyhY8fNk+TWenS3jg5UdlWL4uqgFeo=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "72da83d9515b43550436891f538ff41d68eecc7f", "rev": "e38d7cb66ea4f7a0eb6681920615dfcc30fc2920",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -187,57 +188,28 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs_2": {
"locked": {
"lastModified": 1712163089,
"narHash": "sha256-Um+8kTIrC19vD4/lUCN9/cU9kcOsD1O1m+axJqQPyMM=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "fd281bd6b7d3e32ddfa399853946f782553163b5",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-unstable",
"type": "indirect"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1712420723,
"narHash": "sha256-VnG0Eu394Ga2FCe8Q66m6OEQF8iAqjDYsjmtl+N2omk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9e7f26f82acb057498335362905fde6fea4ca50a",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"aagl": "aagl", "aagl": "aagl",
"hyprland": "hyprland", "hyprland": "hyprland",
"nixpkgs": "nixpkgs_2", "nixpkgs": "nixpkgs",
"nixpkgs-stable": "nixpkgs-stable", "nixpkgs-stable": "nixpkgs-stable",
"sops-nix": "sops-nix" "sops-nix": "sops-nix"
} }
}, },
"sops-nix": { "sops-nix": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_3", "nixpkgs": [
"nixpkgs"
],
"nixpkgs-stable": "nixpkgs-stable_2" "nixpkgs-stable": "nixpkgs-stable_2"
}, },
"locked": { "locked": {
"lastModified": 1712458908, "lastModified": 1712617241,
"narHash": "sha256-DMgBS+jNHDg8z3g9GkwqL8xTKXCRQ/0FGsAyrniVonc=", "narHash": "sha256-a4hbls4vlLRMciv62YrYT/Xs/3Cubce8WFHPUDWwzf8=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "39191e8e6265b106c9a2ba0cfd3a4dafe98a31c6", "rev": "538c114cfdf1f0458f507087b1dcf018ce1c0c4c",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -2,15 +2,16 @@
inputs = { inputs = {
nixpkgs.url = "nixpkgs/nixos-unstable"; nixpkgs.url = "nixpkgs/nixos-unstable";
nixpkgs-stable.url = "nixpkgs/nixos-23.11"; nixpkgs-stable.url = "nixpkgs/nixos-23.11";
hyprland.url = "github:hyprwm/Hyprland"; hyprland.url = "github:hyprwm/Hyprland";
aagl = { hyprland.inputs.nixpkgs.follows = "nixpkgs";
url = "github:ezKEa/aagl-gtk-on-nix";
inputs.nixpkgs.follows = "nixpkgs-stable";
};
sops-nix.url = "github:Mic92/sops-nix"; sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
aagl.url = "github:ezKEa/aagl-gtk-on-nix";
aagl.inputs.nixpkgs.follows = "nixpkgs-stable";
}; };
outputs = { self, nixpkgs, hyprland, aagl, sops-nix, ... }@inputs: outputs = { self, nixpkgs, ... }@inputs:
let let
defaultConfig = extraModules: nixpkgs.lib.nixosSystem { defaultConfig = extraModules: nixpkgs.lib.nixosSystem {
specialArgs = { inherit inputs; }; specialArgs = { inherit inputs; };

View file

@ -12,8 +12,9 @@
"Enables honkai 3rd impact"; "Enables honkai 3rd impact";
}; };
imports = [ inputs.aagl.nixosModules.default ];
config = lib.mkIf config.aagl.enable { config = lib.mkIf config.aagl.enable {
imports = [ inputs.aagl.nixosModules.default ];
nix.settings = inputs.aagl.nixConfig; nix.settings = inputs.aagl.nixConfig;
programs.honkers-railway-launcher.enable = programs.honkers-railway-launcher.enable =

View file

@ -1,12 +1,16 @@
{ inputs, config, pkgs, lib, ... }: { inputs, config, pkgs, lib, ... }:
{ {
options = { options = {
hyprland.enable = lib.mkEnableOption "Enables hyprland"; hyprland.enable = lib.mkEnableOption "Enables hyprland";
}; };
imports = [
inputs.hyprland.nixosModules.default
];
config = lib.mkIf config.hyprland.enable { config = lib.mkIf config.hyprland.enable {
imports = [ inputs.hyprland.nixosModules.default ];
programs.hyprland.enable = true; programs.hyprland.enable = true;
nix.settings = { nix.settings = {
substituters = [ "https://hyprland.cachix.org" ]; substituters = [ "https://hyprland.cachix.org" ];

View file

@ -5,7 +5,7 @@
wireless.enable = lib.mkEnableOption "Enables wireless"; wireless.enable = lib.mkEnableOption "Enables wireless";
}; };
config = lib.mkIf confi.wireless.enable { config = lib.mkIf config.wireless.enable {
networking.wireless = { networking.wireless = {
enable = true; enable = true;
userControlled = { userControlled = {

View file

@ -13,9 +13,9 @@
alsa.enable = false; alsa.enable = false;
alsa.support32Bit = false; alsa.support32Bit = false;
pulse.enable = true; pulse.enable = true;
environment.systemPackages = with pkgs; [
pulsemixer
];
}; };
environment.systemPackages = with pkgs; [
pulsemixer
];
}; };
} }

View file

@ -10,5 +10,5 @@
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
polkit-kde-agent polkit-kde-agent
]; ];
} };
} }

View file

@ -5,8 +5,9 @@ let rootPath = ./.; in
sops-nix.enable = lib.mkEnableOption "Enables nix-sops for secret management"; sops-nix.enable = lib.mkEnableOption "Enables nix-sops for secret management";
}; };
imports = [ inputs.sops-nix.nixosModules.sops ];
config = lib.mkIf config.sops-nix.enable { config = lib.mkIf config.sops-nix.enable {
imports = [ inputs.sops-nix.nixosModules.sops ];
sops = { sops = {
defaultSopsFile = rootPath + "secrets.yaml"; defaultSopsFile = rootPath + "secrets.yaml";

View file

@ -4,7 +4,7 @@
options = { options = {
user.name = lib.mkOption { default = "pan"; }; user.name = lib.mkOption { default = "pan"; };
user.timezone = lib.mkOption { default = "America/Los_Angeles"; }; user.timezone = lib.mkOption { default = "America/Los_Angeles"; };
font.extraFonts = lib.mkOption { default = []; }; system.extraFonts = lib.mkOption { default = []; };
}; };
config = { config = {