Compare commits

...

5 Commits

9 changed files with 125 additions and 12 deletions

View File

@@ -0,0 +1,9 @@
{ inputs, ... }: {
flake.modules.nixos.tux = {
imports = with inputs.self.modules.nixos;
with inputs.self.factory; [
development-tools
docker
];
};
}

View File

@@ -9,8 +9,7 @@
(autologin "weckyy702") (autologin "weckyy702")
development-tools home-vpn
tailscale
opentablet opentablet
#TODO: laptop specific aspects like powertop #TODO: laptop specific aspects like powertop

View File

@@ -0,0 +1,5 @@
{
flake.modules.nixos.tux = {
users.users.weckyy702.extraGroups = [ "docker" ];
};
}

View File

@@ -6,9 +6,84 @@
}; };
}; };
flake.modules.homeManager.browser = { pkgs, ... }: { flake.modules.homeManager.browser =
{ pkgs
, lib
, ...
}:
let
mkExtension = shortId: guid: {
name = guid;
value = {
install_url = "https://addons.mozilla.org/en-US/firefox/downloads/latest/${shortId}/latest.xpi";
installation_mode = "normal_installed";
};
};
zen-pkg =
inputs.zen-browser.packages.${pkgs.stdenv.hostPlatform.system}.zen-browser-unwrapped;
prefs = {
"zen.tabs.vertical.right-side" = true;
"zen.workspaces.force-container-workspace" = true;
"zen.view.compact.enable-at-startup" = true;
"zen.pinned-tab-manager.restore-pinned-tabs-to-pinned-url" = true;
"zen.welcome-screen.seen" = true;
"sidebar.visibility" = "hide-sidebar";
"browser.ctrlTab.sortByRecentlyUsed" = true;
"privacy.fingerprintingProtection" = true;
"privacy.globalprivacycontrol.was_ever_enabled" = true;
"privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs3" = true;
"privacy.trackingprotection.allow_list.convenience.enabled" = false;
"privacy.trackingprotection.allow_list.hasMigratedCategoryPrefs" = true;
"privacy.trackingprotection.allow_list.hasUserInteractedWithETPSettings" = true;
"privacy.trackingprotection.emailtracking.enabled" = true;
"privacy.trackingprotection.enabled" = true;
"privacy.trackingprotection.socialtracking.enabled" = true;
};
extensions = [
# To add additional extensions, find it on addons.mozilla.org, find
# the short ID in the url (like https://addons.mozilla.org/en-US/firefox/addon/!SHORT_ID!/)
# Then go to https://addons.mozilla.org/api/v5/addons/addon/!SHORT_ID!/ to get the guid
(mkExtension "ublock-origin" "uBlock0@raymondhill.net")
(mkExtension "darkreader" "addon@darkreader.org")
(mkExtension "bitwarden-password-manager" "{446900e4-71c2-419f-a6a7-df9c091e268b}")
# ...
];
in
{
home.packages = [ home.packages = [
inputs.zen-browser.packages.${pkgs.stdenv.hostPlatform.system}.default (
pkgs.wrapFirefox zen-pkg
{
extraPrefs = lib.concatLines (
lib.mapAttrsToList
(
name: value: ''lockPref(${lib.strings.toJSON name}, ${lib.strings.toJSON value});''
)
prefs
);
extraPolicies = {
DisableTelemetry = true;
ExtensionSettings = builtins.listToAttrs extensions;
SearchEngines = {
Default = "ddg";
Add = [
{
Name = "nixpkgs packages";
URLTemplate = "https://search.nixos.org/packages?query={searchTerms}";
IconURL = "https://wiki.nixos.org/favicon.ico";
Alias = "@np";
}
];
};
};
}
)
]; ];
}; };
} }

View File

@@ -1,9 +1,5 @@
{ inputs, ... }: { { inputs, ... }: {
flake.modules.nixos.development-tools = { pkgs, ... }: { flake.modules.nixos.development-tools = { pkgs, ... }: {
imports = with inputs.self.modules.nixos; [
rust
];
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
cmake cmake
gnumake gnumake

View File

@@ -6,7 +6,7 @@
}; };
}; };
flake.modules.nixos.rust = { pkgs, ... }: { flake.modules.nixos.development-tools = { pkgs, ... }: {
nixpkgs.overlays = [ nixpkgs.overlays = [
inputs.rust-overlay.overlays.default inputs.rust-overlay.overlays.default
]; ];

View File

@@ -0,0 +1,8 @@
{
flake.modules.nixos.docker = {
virtualisation.docker = {
enable = true;
autoPrune.enable = true;
};
};
}

View File

@@ -0,0 +1,14 @@
{ self, ... }: {
flake.modules.nixos.home-vpn = {
imports = with self.modules.nixos; [
tailscale
resolved
];
services.resolved.extraConfig = ''
[Resolve]
DNS=10.10.0.1
Domains=~veltnet
'';
};
}

View File

@@ -0,0 +1,7 @@
{
flake.modules.nixos.resolved = {
services.resolved.enable = true;
networking.networkmanager.dns = "systemd-resolved";
};
}