many changes

feat/kile-v2
Ricard Illa 2022-05-25 09:58:20 +02:00
parent 71f0315804
commit 0984026c06
No known key found for this signature in database
GPG Key ID: F69A672B72E54902
5 changed files with 110 additions and 79 deletions

View File

@ -23,6 +23,20 @@ in {
neededForBoot = true;
};
"/logs" = {
device = "/dev/mapper/root";
fsType = "btrfs";
options = [ "subvol=logs" "compress=zstd" ];
neededForBoot = true;
};
"/data" = {
device = "/dev/mapper/root";
fsType = "btrfs";
options = [ "subvol=data" "compress=zstd" ];
neededForBoot = true;
};
"/nix" = {
device = "/dev/mapper/root";
fsType = "btrfs";

View File

@ -7,11 +7,11 @@
]
},
"locked": {
"lastModified": 1653153149,
"narHash": "sha256-8B/tWWZziFq4DqnAm9uO7M4Z4PNfllYg5+teX1e5yDQ=",
"lastModified": 1653340164,
"narHash": "sha256-t6BPApyasx6FOv2cEVyFBXvkEDrknyUe7bngMbNSBkA=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "94780dd888881bf35165dfdd334a57ef6b14ead8",
"rev": "e66f0ff69a6c0698b35034b842c4b68814440778",
"type": "github"
},
"original": {

View File

@ -1,7 +1,14 @@
{ config, pkgs, ... }:
{
home.packages = with pkgs; [ black jq sqlfluff nixfmt shfmt hlint ];
home.packages = with pkgs; [
black
jq
# sqlfluff
nixfmt
shfmt
hlint
];
programs.neovim = {
enable = true;
viAlias = true;

View File

@ -42,62 +42,70 @@
./zsh
];
home.persistence."/persist/${config.home.homeDirectory}" = {
directories = [
".Slic3r"
".abook"
".bitmonero"
".cache"
".config/Element"
".config/Nextcloud"
".config/Signal"
".config/SuperCollider"
".config/ardour6"
".config/chromium"
".config/kdeconnect"
".config/kicad"
".config/whatsapp-for-linux"
".gnupg/private-keys-v1.d"
".hydrogen"
".librewolf"
".local/share/Bisq"
".local/share/SuperCollider"
".local/share/TelegramDesktop"
".local/share/dino"
".local/share/keyrings"
".local/share/mpd"
".local/share/webkitgtk"
".local/state/wireplumber"
".mozilla"
".newsboat"
".password-store"
".vagrant.d"
".vdirsyncer"
".walletwasabi"
".wine"
"Audio"
"Calendars"
"Contacts"
"Documents"
"Downloads"
"Images"
"Maildir"
"Monero"
"Nextcloud"
"code"
"configs"
"misc"
"workspace"
];
files = [
".gnupg/pubring.kbx"
".gnupg/trustdb.gpg"
".mailsynclastrun"
".ssh/known_hosts"
".zsh_history"
".lmmsrc.xml"
];
allowOther = true;
home.persistence = {
"/data/${config.home.homeDirectory}" = {
directories = [
"Audio"
"Calendars"
"Contacts"
"Documents"
"Downloads"
"Images"
"Maildir"
"Monero"
"Nextcloud"
"code"
"configs"
"misc"
"workspace"
];
allowOther = true;
};
"/persist/${config.home.homeDirectory}" = {
directories = [
".Slic3r"
".abook"
".bitmonero"
".cache"
".config/Element"
".config/Nextcloud"
".config/Signal"
".config/SuperCollider"
".config/ardour6"
".config/chromium"
".config/kdeconnect"
".config/kicad"
".config/whatsapp-for-linux"
".gnupg/private-keys-v1.d"
".hydrogen"
".librewolf"
".local/share/Bisq"
".local/share/SuperCollider"
".local/share/TelegramDesktop"
".local/share/dino"
".local/share/keyrings"
".local/share/mpd"
".local/share/webkitgtk"
".local/state/wireplumber"
".mozilla"
".newsboat"
".password-store"
".vagrant.d"
".vdirsyncer"
".walletwasabi"
".wine"
];
files = [
".gnupg/pubring.kbx"
".gnupg/trustdb.gpg"
".mailsynclastrun"
".ssh/known_hosts"
".zsh_history"
".lmmsrc.xml"
];
allowOther = true;
};
};
home.sessionVariables = {

View File

@ -230,29 +230,31 @@
fsType = "tmpfs";
options = [ "defaults" "size=2G" "mode=755" ];
};
};
swapDevices = [{ device = "/swap/swapfile"; }];
environment.persistence."/persist" = {
directories = [
"/etc/NetworkManager/system-connections"
"/etc/nixos"
"/etc/wireguard"
"/var/lib/bluetooth"
"/var/lib/docker"
"/var/lib/libvirt"
"/var/lib/systemd/coredump"
"/var/log"
];
files = [
"/etc/machine-id"
"/etc/ssh/ssh_host_ed25519_key"
"/etc/ssh/ssh_host_ed25519_key.pub"
"/etc/ssh/ssh_host_rsa_key"
"/etc/ssh/ssh_host_rsa_key.pub"
];
environment.persistence = {
"/persist" = {
directories = [
"/etc/NetworkManager/system-connections"
"/etc/nixos"
"/etc/wireguard"
"/var/lib/bluetooth"
"/var/lib/docker"
"/var/lib/libvirt"
"/var/lib/systemd/coredump"
];
files = [
"/etc/machine-id"
"/etc/ssh/ssh_host_ed25519_key"
"/etc/ssh/ssh_host_ed25519_key.pub"
"/etc/ssh/ssh_host_rsa_key"
"/etc/ssh/ssh_host_rsa_key.pub"
];
};
"/logs" = { directories = [ "/var/log" ]; };
};
# Open ports in the firewall.