summaryrefslogtreecommitdiff
path: root/config/shared.nix
blob: df669513101ee734d035e55dd1115ec679201db3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
{ inputs, pkgs, ... }:
{
  environment.systemPackages = with pkgs; [
    kitty

    helix
    alacritty
    firefox
    git
    git-crypt
    whatsapp-for-linux
    obsidian
    devenv

    busybox
    usbutils
    dig
    file
    gcc
    jq
    netcat
    tcpdump
    wget
    iftop
    htop
  ];

  nixpkgs.config.allowUnfree = true;
  nix.settings = {
    experimental-features = [ "nix-command" "flakes" ];
    substituters = ["https://hyprland.cachix.org"];
    trusted-public-keys = ["hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="];
  };

  nix.extraOptions = ''
    trusted-users = root jras
  '';

  programs = {
    steam.enable = true;
    mtr.enable = true;
    hyprland = {
      enable = true;
      xwayland.enable = true;
      package = inputs.hyprland.packages.${pkgs.stdenv.hostPlatform.system}.hyprland;
      portalPackage = inputs.hyprland.packages.${pkgs.stdenv.hostPlatform.system}.xdg-desktop-portal-hyprland;
    };
    gnupg.agent.enable = true;
    gnupg.agent.pinentryPackage = pkgs.pinentry-gnome3;
  };

  services = {
    pipewire = {
      enable = true;
      alsa.enable = true;
      alsa.support32Bit = true;
      pulse.enable = true;
    };
    keyd = {
      enable = true;
      keyboards = {
        default = {
          ids = [ "*" ];
          settings.main.capslock = "overload(meta, esc)";
        };
      };
    };
    greetd = {
      enable = true;
      settings = {
        default_session = {
          command = "${pkgs.hyprland}/bin/Hyprland";
          user = "jras";
        };
      };
    };
    gnome.gnome-keyring.enable = true;
    openssh = {
      enable = true;
      openFirewall = false;
      settings.AllowUsers = [ "jras" ];
    };
  };

  systemd.user.services.kanshi = {
    description = "kanshi daemon";
    environment = {
      WAYLAND_DISPLAY="wayland-1";
      DISPLAY=":0";
    };
    serviceConfig = {
      Type = "simple";
      ExecStart = ''${pkgs.kanshi}/bin/kanshi -c kanshi_config_file'';
    };
  };

  virtualisation.docker = {
    enable = true;
    enableOnBoot = true;
  };
}