Merge remote-tracking branch 'origin/master'

This commit is contained in:
Ivan Malison 2021-08-21 19:09:56 +00:00
commit 962dd7a8c9
9 changed files with 223 additions and 129 deletions

View File

@ -0,0 +1,8 @@
#!/usr/bin/env sh
function get_chrome_folder_from_address {
cat ~/.config/google-chrome/Local\ State |
jq -r ".profile.info_cache | to_entries | .[] | select(.value.user_name == \"$1\") | .key"
}
get_chrome_folder_from_address "$@"

View File

@ -0,0 +1,9 @@
#!/usr/bin/env sh
function start_chrome_for {
email=$1
shift
google-chrome-stable --profile-directory="$(get_chrome_folder_from_address "$email")" "$@"
}
start_chrome_for "$@"

View File

@ -1,4 +1,4 @@
{ config, pkgs, options, ... }: { config, pkgs, options, inputs, ... }:
{ {
imports = [ imports = [
./users.nix ./users.nix
@ -7,6 +7,22 @@
./environment.nix ./environment.nix
]; ];
nix = {
extraOptions = ''
experimental-features = nix-command flakes ca-references
'';
registry.nixpkgs.flake = inputs.nixpkgs;
};
nixpkgs.overlays = with inputs; [
nix.overlay
xmonad.overlay
xmonad-contrib.overlay
notifications-tray-icon.overlay
(import ../dotfiles/config/taffybar/overlay.nix)
(import ./overlay.nix)
] ++ taffybar.overlays;
# Allow all the things # Allow all the things
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
nixpkgs.config.permittedInsecurePackages = [ nixpkgs.config.permittedInsecurePackages = [

View File

@ -2,11 +2,11 @@
"nodes": { "nodes": {
"flake-utils": { "flake-utils": {
"locked": { "locked": {
"lastModified": 1623875721, "lastModified": 1629481132,
"narHash": "sha256-A8BU7bjS5GirpAUv4QA+QnJ4CceLHkcXdRp4xITDB0s=", "narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "f7e004a55b120c02ecb6219596820fcd32ca8772", "rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -17,11 +17,11 @@
}, },
"flake-utils_2": { "flake-utils_2": {
"locked": { "locked": {
"lastModified": 1623875721, "lastModified": 1629481132,
"narHash": "sha256-A8BU7bjS5GirpAUv4QA+QnJ4CceLHkcXdRp4xITDB0s=", "narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "f7e004a55b120c02ecb6219596820fcd32ca8772", "rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -32,11 +32,11 @@
}, },
"flake-utils_3": { "flake-utils_3": {
"locked": { "locked": {
"lastModified": 1623875721, "lastModified": 1629481132,
"narHash": "sha256-A8BU7bjS5GirpAUv4QA+QnJ4CceLHkcXdRp4xITDB0s=", "narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "f7e004a55b120c02ecb6219596820fcd32ca8772", "rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -47,11 +47,11 @@
}, },
"flake-utils_4": { "flake-utils_4": {
"locked": { "locked": {
"lastModified": 1623875721, "lastModified": 1629481132,
"narHash": "sha256-A8BU7bjS5GirpAUv4QA+QnJ4CceLHkcXdRp4xITDB0s=", "narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "f7e004a55b120c02ecb6219596820fcd32ca8772", "rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -62,11 +62,41 @@
}, },
"flake-utils_5": { "flake-utils_5": {
"locked": { "locked": {
"lastModified": 1623875721, "lastModified": 1629481132,
"narHash": "sha256-A8BU7bjS5GirpAUv4QA+QnJ4CceLHkcXdRp4xITDB0s=", "narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "f7e004a55b120c02ecb6219596820fcd32ca8772", "rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_6": {
"locked": {
"lastModified": 1629481132,
"narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_7": {
"locked": {
"lastModified": 1629481132,
"narHash": "sha256-JHgasjPR0/J1J3DRm4KxM4zTyAj4IOJY8vIl75v/kPI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "997f7efcb746a9c140ce1f13c72263189225f482",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -170,7 +200,7 @@
"type": "github" "type": "github"
} }
}, },
"gitIgnoreNix": { "git-ignore-nix_6": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_10" "nixpkgs": "nixpkgs_10"
}, },
@ -184,6 +214,26 @@
}, },
"original": { "original": {
"owner": "IvanMalison", "owner": "IvanMalison",
"ref": "master",
"repo": "gitignore.nix",
"type": "github"
}
},
"git-ignore-nix_7": {
"inputs": {
"nixpkgs": "nixpkgs_11"
},
"locked": {
"lastModified": 1626413882,
"narHash": "sha256-ZHw1YVsrs7rG9jPEH0ZabbbCTdnVr48FAwK6GCQPSF4=",
"owner": "IvanMalison",
"repo": "gitignore.nix",
"rev": "a2ffb0bfd0145ca57d792a6f9f76f5c305ca29b7",
"type": "github"
},
"original": {
"owner": "IvanMalison",
"ref": "master",
"repo": "gitignore.nix", "repo": "gitignore.nix",
"type": "github" "type": "github"
} }
@ -196,11 +246,11 @@
"status-notifier-item": "status-notifier-item" "status-notifier-item": "status-notifier-item"
}, },
"locked": { "locked": {
"lastModified": 1627764331, "lastModified": 1629321512,
"narHash": "sha256-AgJGmLGNSraNr/zL+IIYF/qFUY0fEfivxfIoqIsiRWk=", "narHash": "sha256-lct3R797Om6p005J5ONk6+kt7x46ZW18ssVKSMTFios=",
"owner": "taffybar", "owner": "taffybar",
"repo": "gtk-sni-tray", "repo": "gtk-sni-tray",
"rev": "ceb15d9c0980d4359ad1b0374ba221229a14acb7", "rev": "da7492a9e5d93b11b09a131d79241566f6595ff0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -217,7 +267,7 @@
] ]
}, },
"locked": { "locked": {
"narHash": "sha256-FNXyt5dlC8JG/0Tsf8nrJ+DDP5uip9Tsqt3WllmAkk8=", "narHash": "sha256-OP6//kExfQ29B8EkQyR1jcfPva59mA8HYqi0iwzBhHU=",
"path": "./home-manager", "path": "./home-manager",
"type": "path" "type": "path"
}, },
@ -267,11 +317,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1626836098, "lastModified": 1629492688,
"narHash": "sha256-EYWAa8d2iIVgS2r0BVMDQ/fNxv8s65CWFDGkI0TY+hM=", "narHash": "sha256-PiAsDsUQTYhv4LErkn/mZ/XFczbJysvyFIXlEqoNxq0=",
"owner": "IvanMalison", "owner": "IvanMalison",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "360b5a7bedf955275fa3fc89bcbe28a2a85bf62b", "rev": "2845eec0eaab351617855630e3cce7eb724d99d7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -282,7 +332,7 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "./nixpkgs", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
@ -293,8 +343,19 @@
}, },
"nixpkgs_10": { "nixpkgs_10": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"nixpkgs_11": {
"locked": {
"narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -304,8 +365,8 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -315,8 +376,8 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -326,8 +387,8 @@
}, },
"nixpkgs_4": { "nixpkgs_4": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -337,8 +398,8 @@
}, },
"nixpkgs_5": { "nixpkgs_5": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -348,8 +409,8 @@
}, },
"nixpkgs_6": { "nixpkgs_6": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -359,8 +420,8 @@
}, },
"nixpkgs_7": { "nixpkgs_7": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -370,8 +431,8 @@
}, },
"nixpkgs_8": { "nixpkgs_8": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -381,8 +442,8 @@
}, },
"nixpkgs_9": { "nixpkgs_9": {
"locked": { "locked": {
"narHash": "sha256-Iv7J5n9zN4ejsQjnAJLDv+/+/+BH/kgfPAzMXrcqsZ0=", "narHash": "sha256-5ex8yM3LhIDs/f1bdWLzhKmQ+L69CGr977U+8OgmwM8=",
"path": "/nix/store/j2f79wqwpx91rrbn3hpajxnhg76bgwsz-source", "path": "./nixpkgs",
"type": "path" "type": "path"
}, },
"original": { "original": {
@ -454,7 +515,7 @@
] ]
}, },
"locked": { "locked": {
"narHash": "sha256-mN5ZDg16JysS4+JYBgfr8klx34lND5c6qLS/DOYMWZA=", "narHash": "sha256-VwnrQr20b8q/zUjMs0u/EIcH0Bj3IXiZupVH5/Emnp0=",
"path": "../dotfiles/config/taffybar/taffybar", "path": "../dotfiles/config/taffybar/taffybar",
"type": "path" "type": "path"
}, },
@ -472,7 +533,7 @@
] ]
}, },
"locked": { "locked": {
"narHash": "sha256-LsqmlW82Zmyj4PW8T3kJTm+p599/lG1fOcEa1Sgcjg4=", "narHash": "sha256-1wHlyJ2n6a9CXBU+j9DB03Eu2qLBt8xIMJA1xpy2DR0=",
"path": "../dotfiles/config/xmonad/xmonad", "path": "../dotfiles/config/xmonad/xmonad",
"type": "path" "type": "path"
}, },
@ -483,13 +544,15 @@
}, },
"xmonad-contrib": { "xmonad-contrib": {
"inputs": { "inputs": {
"gitIgnoreNix": "gitIgnoreNix", "flake-utils": "flake-utils_6",
"git-ignore-nix": "git-ignore-nix_6",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
] ],
"xmonad": "xmonad_2"
}, },
"locked": { "locked": {
"narHash": "sha256-RsCxI72sx+LIQTz8uAj+8qvgmPhENOhFDDyZjHbPohU=", "narHash": "sha256-+vkBl4/9+DRRa9oJJ+5aW5I65oUk+h1Z3vJzkSerC0U=",
"path": "../dotfiles/config/xmonad/xmonad-contrib", "path": "../dotfiles/config/xmonad/xmonad-contrib",
"type": "path" "type": "path"
}, },
@ -497,6 +560,28 @@
"path": "../dotfiles/config/xmonad/xmonad-contrib", "path": "../dotfiles/config/xmonad/xmonad-contrib",
"type": "path" "type": "path"
} }
},
"xmonad_2": {
"inputs": {
"flake-utils": "flake-utils_7",
"git-ignore-nix": "git-ignore-nix_7",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1629223797,
"narHash": "sha256-lY07x2c/4qPaXLvpnd3D4gK61ViQV/XFIUisimSiIvk=",
"owner": "xmonad",
"repo": "xmonad",
"rev": "aa18707c3ef96db88208509c2a18c6670e831661",
"type": "github"
},
"original": {
"owner": "xmonad",
"repo": "xmonad",
"type": "github"
}
} }
}, },
"root": "root", "root": "root",

View File

@ -32,51 +32,46 @@
self, nix, nixpkgs, nixos-hardware, home-manager, taffybar, xmonad, self, nix, nixpkgs, nixos-hardware, home-manager, taffybar, xmonad,
xmonad-contrib, notifications-tray-icon xmonad-contrib, notifications-tray-icon
}: }:
let forAll = ({ ... }: { let
nix = { mkConfig =
extraOptions = '' args@
experimental-features = nix-command flakes ca-references { system ? "x86_64-linux"
''; , baseModules ? []
registry.nixpkgs.flake = nixpkgs; , modules ? []
, specialArgs ? {}
, ...
}:
nixpkgs.lib.nixosSystem (args // {
inherit system;
modules = baseModules ++ modules;
specialArgs = { inherit inputs; } // specialArgs;
});
machineFilenames = builtins.attrNames (builtins.readDir ./machines);
machineNameFromFilename = filename: builtins.head (builtins.split "\\." filename);
mkConfigurationParams = filename: {
name = machineNameFromFilename filename;
value = {
modules = [ (./machines + ("/" + filename)) ];
};
}; };
nixpkgs.overlays = [ defaultConfigurationParams =
nix.overlay xmonad.overlay xmonad-contrib.overlay builtins.listToAttrs (map mkConfigurationParams machineFilenames);
notifications-tray-icon.overlay (import ../dotfiles/config/taffybar/overlay.nix) customParams = {
(import ./overlay.nix) biskcomp = {
] ++ taffybar.overlays; system = "aarch64-linux";
imports = [ };
home-manager.nixosModule air-gapped-pi = {
]; system = "aarch64-linux";
home-manager.useGlobalPkgs = true; };
home-manager.useUserPackages = true; };
home-manager.users.imalison = import ./home-manager.nix;
});
mkNixosConfig = args@{ system ? "x86_64-linux", baseModules ? [ forAll ], modules ? [], specialArgs ? {}, ... }:
nixpkgs.lib.nixosSystem (args // {
inherit system;
modules = baseModules ++ modules;
specialArgs = { inherit inputs; } // specialArgs;
});
in in
{ {
nixosConfigurations = { nixosConfigurations = builtins.mapAttrs (machineName: params:
ivanm-dfinity-razer = mkNixosConfig { let machineParams =
modules = [ ./machines/ivanm-dfinity-razer.nix ]; if builtins.hasAttr machineName customParams
}; then (builtins.getAttr machineName customParams)
ryzen-shine = mkNixosConfig { else {};
modules = [ ./machines/ryzen-shine.nix ]; in mkConfig (params // machineParams)
}; ) defaultConfigurationParams;
adele = mkNixosConfig {
modules = [ ./machines/adele.nix ];
};
biskcomp = mkNixosConfig {
system = "aarch64-linux";
modules = [ ./machines/biskcomp.nix ];
};
air-gapped-pi = mkNixosConfig {
system = "aarch64-linux";
modules = [ ./machines/air-gapped-pi.nix ];
};
};
}; };
} }

View File

@ -7,7 +7,6 @@
networking.hostName = "air-gapped-pi"; networking.hostName = "air-gapped-pi";
hardware.video.hidpi.enable = true; hardware.video.hidpi.enable = true;
networking.enable = false;
system.stateVersion = "21.05"; system.stateVersion = "21.05";
} }

View File

@ -2,11 +2,12 @@
{ {
imports = [ imports = [
<nixpkgs/nixos/modules/installer/scan/not-detected.nix> ../users.nix
../full.nix ../full.nix
# ../cachix.nix
]; ];
hardware.enableRedistributableFirmware = true;
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "sd_mod" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "sd_mod" ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
@ -45,43 +46,15 @@
nix.maxJobs = lib.mkDefault 4; nix.maxJobs = lib.mkDefault 4;
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
boot.initrd.luks.devices = [ # boot.initrd.luks.devices."cryptroot" = {
{ # name = "root";
name = "root"; # device = "/dev/sda3";
device = "/dev/sda3"; # preLVM = true;
preLVM = true; # };
}
];
networking.hostName = "imalison-home"; networking.hostName = "imalison-home";
boot.loader.efi.canTouchEfiVariables = true; boot.loader.efi.canTouchEfiVariables = true;
services.samba = {
enable = true;
syncPasswordsByPam = true;
extraConfig = ''
workgroup = WORKGROUP
server string = smbnix
netbios name = smbnix
#use sendfile = yes
#max protocol = smb2
hosts allow = 192.168.0 localhost
hosts deny = 0.0.0.0/0
'';
shares = {
private = {
path = "/backups";
browseable = "yes";
"read only" = "no";
"guest ok" = "no";
"create mask" = "0644";
"directory mask" = "0755";
"force user" = "username";
"force group" = "groupname";
};
};
};
services.xserver = { services.xserver = {
screenSection = '' screenSection = ''
DefaultDepth 24 DefaultDepth 24

View File

@ -2,12 +2,13 @@
{ {
imports = [ imports = [
<nixpkgs/nixos/modules/installer/scan/not-detected.nix>
../full.nix ../full.nix
../games.nix ../games.nix
../extra.nix ../extra.nix
]; ];
hardware.enableRedistributableFirmware = true;
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "sd_mod" ]; boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "sd_mod" ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ pkgs.linuxPackages.rtl8814au ]; boot.extraModulePackages = [ pkgs.linuxPackages.rtl8814au ];

View File

@ -1,4 +1,4 @@
{ pkgs, ... }: { pkgs, inputs, ... }:
{ {
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
users.extraUsers = let users.extraUsers = let
@ -39,4 +39,12 @@
}; };
nix.trustedUsers = [ "root" "imalison" "kat" ]; nix.trustedUsers = [ "root" "imalison" "kat" ];
imports = [
inputs.home-manager.nixosModule
];
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.imalison = import ./home-manager.nix;
} }