tangled
alpha
login
or
join now
ladas552.me
/
Flake-ocean
0
fork
atom
My NixOS config Part 3: Flake-Parts Crusaders
nix.ladas552.me
hjem
nix
nixos
impermanence
flake-parts
nvfetcher
niri
noctalia
0
fork
atom
overview
issues
pulls
pipelines
cleaning secrets, librewolf, credits
Ladas552
8 months ago
de83bd87
46b70740
+12
-39
6 changed files
expand all
collapse all
unified
split
flake.lock
hosts
NixPort
home.nix
nixosModules
Desktops
niri
bare
home.nix
secrets
default.nix
secrets
secrets.yaml
templates
elixir-phoenix
flake.nix
+3
-3
flake.lock
···
260
260
]
261
261
},
262
262
"locked": {
263
263
-
"lastModified": 1752265577,
264
264
-
"narHash": "sha256-YhnBM3oknReSFTAuc2SMwekwjl9nDd5PUhcar4DsefM=",
263
263
+
"lastModified": 1752286566,
264
264
+
"narHash": "sha256-A4nftqiNz2bNihz0bKY94Hq/6ydR6UQOcGioeL7iymY=",
265
265
"owner": "nix-community",
266
266
"repo": "home-manager",
267
267
-
"rev": "3976e0507edc9a5f332cb2be93fa20e646d22374",
267
267
+
"rev": "392ddb642abec771d63688c49fa7bcbb9d2a5717",
268
268
"type": "github"
269
269
},
270
270
"original": {
+2
-2
hosts/NixPort/home.nix
···
52
52
wl-clipboard
53
53
ffmpeg
54
54
gst_all_1.gst-libav
55
55
-
floorp
55
55
+
librewolf
56
56
hunspell
57
57
hunspellDicts.en-us-large
58
58
hunspellDicts.ru-ru
···
75
75
76
76
# Environmental Variables
77
77
home.sessionVariables = {
78
78
-
BROWSER = "floorp";
78
78
+
BROWSER = "librewolf";
79
79
};
80
80
81
81
# Let Home Manager install and manage itself.
+3
-3
nixosModules/Desktops/niri/bare/home.nix
···
49
49
natural-scroll
50
50
// scroll-method "edge"
51
51
middle-emulation
52
52
-
scroll-factor 0.2
52
52
+
scroll-factor 1
53
53
// accel-speed 0.2
54
54
// accel-profile "flat"
55
55
}
···
242
242
}
243
243
244
244
window-rule {
245
245
-
match app-id="floorp"
245
245
+
match app-id="librewolf"
246
246
match app-id="thunderbird"
247
247
248
248
open-maximized true
···
291
291
292
292
// GUI apps
293
293
Super+F { spawn "thunar"; }
294
294
-
Super+W { spawn "floorp"; }
294
294
+
Super+W { spawn "librewolf"; }
295
295
296
296
// MPD
297
297
-15
nixosModules/secrets/default.nix
···
30
30
31
31
sops.secrets."mystuff/zero_net_id".neededForUsers = true;
32
32
sops.secrets."mystuff/zero_net_id" = { };
33
33
-
34
34
-
sops.secrets."mystuff/syncthing/devices/phone".neededForUsers = true;
35
35
-
sops.secrets."mystuff/syncthing/devices/phone" = { };
36
36
-
37
37
-
sops.secrets."mystuff/syncthing/devices/tablet".neededForUsers = true;
38
38
-
sops.secrets."mystuff/syncthing/devices/tablet" = { };
39
39
-
40
40
-
sops.secrets."mystuff/syncthing/folders/Norg".neededForUsers = true;
41
41
-
sops.secrets."mystuff/syncthing/folders/Norg" = { };
42
42
-
43
43
-
sops.secrets."mystuff/syncthing/folders/Share".neededForUsers = true;
44
44
-
sops.secrets."mystuff/syncthing/folders/Share" = { };
45
45
-
46
46
-
sops.secrets."mystuff/syncthing/folders/keepass".neededForUsers = true;
47
47
-
sops.secrets."mystuff/syncthing/folders/keepass" = { };
48
33
};
49
34
}
+3
-16
secrets/secrets.yaml
···
5
5
mystuff:
6
6
host_pwd: ENC[AES256_GCM,data:FjVt4zVqMbTWOUImrnR8CKYmvAxIeyTVYsqSrUgjfL81uqJ5AMwSbHJeFwc36Xcj/iiillze7AcNjgKOMwEq2N+gnVstaxDj8Q==,iv:o4JscoUPYWuNggQUY4slR86/PQDwWN0d656S+t1Mlew=,tag:wmmjvJvjCIcCSQYFAl+9Qw==,type:str]
7
7
zero_net_id: ENC[AES256_GCM,data:lE8mB1sjunJxp6xrrC1RsA==,iv:ke7/e5yNnU3LZ8ZOpOqzCxItt9+WBMobXRT5/X59+6E=,tag:pyz79Pvb/BOCQbU5wfCLnw==,type:str]
8
8
-
syncthing:
9
9
-
devices:
10
10
-
phone: ENC[AES256_GCM,data:DoStIJKo/irumu7b80YKX2EvjqhOr8yU/Am94hhVYNb3Ec9pQBDkm7tgCUQ/9Rg3VqWEvzOwSs/UXqdkP5CG,iv:52V7t9TTj90tlODe3w1InVIfTQ3svUz8TI9ZeQEjHSA=,tag:FoaD03ImsAU4eLn00CfQtA==,type:str]
11
11
-
tablet: ENC[AES256_GCM,data:QdO1v1i8c1dpdXpGb+GSa1cbjOHkJUZWhMTXVoQL+DvwLVlQUs2qdoUj+/TQXu6jQ/hqxETGX7ztlPNVaj1w,iv:FxKz7qPMJ3lCLkE8cSpGbBU+0b1UUmsBsW6b53tFk70=,tag:YA9IURF8NqQnMo7FBvBIoA==,type:str]
12
12
-
folders:
13
13
-
Norg: ENC[AES256_GCM,data:O7JgFeLjKGRj0Zk=,iv:i0JAEg0FJSJGCxf4I9pl1j1LiDdy6/7W7bAhgy6N9MA=,tag:WE3wbDhYIqTBcvfD8Bs8bA==,type:str]
14
14
-
Share: ENC[AES256_GCM,data:zcAHhGD26T4WRlU=,iv:pzMFvxSwYbAYuLd3+cdWEVeZAExiAmhdWvsqXi/kZlk=,tag:AEbTK4f4ttI9Y3WCKvgsLA==,type:str]
15
15
-
keepass: ENC[AES256_GCM,data:SW4F8QBCvN2dEyI=,iv:Xz0ADO8AOtXMftHNIEfi20GY2XLam1ORnGswYH/RRO8=,tag:l8snO8UbXQT7gB7r5yJjxg==,type:str]
16
8
sops:
17
17
-
kms: []
18
18
-
gcp_kms: []
19
19
-
azure_kv: []
20
20
-
hc_vault: []
21
9
age:
22
10
- recipient: age18yaw2nreuzgmh2w9y2mpx7kmgfrwqzr6hf2raws0fk37ut950ydqwwctu8
23
11
enc: |
···
28
16
RkFQSEYxY3NnMkhpWXdCd1llb2ZYcHMK6BoBQQCJqntA69nPdZxPl066pkxA4c/i
29
17
k4RwkMDyyRLTnFP8jWhqH1AxUzDQluRnmGPJ4wq6DPe5mLKa6649Mg==
30
18
-----END AGE ENCRYPTED FILE-----
31
31
-
lastmodified: "2025-01-10T19:15:12Z"
32
32
-
mac: ENC[AES256_GCM,data:1Zx42GV3xQTA7iD9sM5x1v4KkoiACQOhe1EOsK++CMHnQrnp10lN8ytSa8Xkcdsu+0jiVzUERIiXUFv5vO2JB0Do6FPRZLOW+saG/jPgwwe8KIA011WubOgE6TUcOwb7jQ/Zoh7UGKr8NOBVfzp8uD2jLVZ10/xlbp5KqkTKIWM=,iv:Bqtq0Is22t0xSepzCeAiYNcQ4TOIBnj8jW1E2MjH47Q=,tag:427Nhlib11Pgr319xQ5/rw==,type:str]
33
33
-
pgp: []
19
19
+
lastmodified: "2025-07-12T16:45:08Z"
20
20
+
mac: ENC[AES256_GCM,data:oWrtmgJZQcDR/TpgowqpbtOnV4KIJ+B1FPryDxuJeKF0N3Q2lbCC18hqJbqkTebAFOLIvqCdcBL6NuX/lLnIN7TWgOTlpyI2XVePHwIE2jID6tuNMfWjhsBlJjmng11AhhCOXXA4at4rNTiXmheU2wOb6bIOSDTuD7fAUaorJA4=,iv:Mo83H+Hcy+YvHKbf6CHqZt3tG1hf820pEbl7CeyV88w=,tag:1IAZhxUJOYTK6YDdwFmnFw==,type:str]
34
21
unencrypted_suffix: _unencrypted
35
35
-
version: 3.9.2
22
22
+
version: 3.10.2
+1
templates/elixir-phoenix/flake.nix
···
1
1
{
2
2
description = "Phoenix flake";
3
3
+
# stolen from @c4710n https://elixirforum.com/t/flake-nix-phoenix-postgresql/52622/6
3
4
# The whole flake is a mess
4
5
inputs = {
5
6
nixpkgs.url = "https://channels.nixos.org/nixos-unstable/nixexprs.tar.xz";