# # Specific system configuration settings for desktop # # flake.nix # ├─ ./hosts # │ └─ ./laptop # │ ├─ default.nix * # │ └─ hardware-configuration.nix # └─ ./modules # ├─ ./desktop # │ ├─ ./bspwm # │ │ └─ default.nix # │ └─ ./virtualisation # │ └─ docker.nix # └─ ./hardware # └─ default.nix # { pkgs, lib, ... }: { imports = [ ./hardware-configuration.nix ]; nixos-config.isLaptop = true; profiles.virtualisation.enable = true; profiles.desktop.qtile.enable = true; profiles.desktop.gnome.enable = true; profiles.vpn.enable = true; profiles.sync.enable = true; profiles.development = { enable = true; fpga.cables = [ "vivado" "ise" ]; mcu.cables = [ "tiva-c" "st-link" "trezor" ]; }; networking.hostName = "laptop-phobos"; boot = { # Boot options kernelPackages = pkgs.linuxPackages_latest; # Secure boot lanzaboote = { enable = true; pkiBundle = "/etc/secureboot"; }; loader = { # EFI Boot efi = { canTouchEfiVariables = true; }; systemd-boot = { enable = lib.mkForce false; # lanzaboote is used instead editor = false; # Better security, disallows passing /bin/sh to start as root configurationLimit = 5; }; timeout = 0; }; initrd.systemd.enable = true; initrd.luks.devices = { "crypted-linux-root" = { device = "/dev/disk/by-label/crypted-linux-root"; allowDiscards = true; keyFileSize = 256; keyFile = "/dev/disk/by-id/usb-VendorCo_ProductCode_92073160DC061126104-0:0"; keyFileTimeout = 10; }; }; }; # TODO under qtile hardware = { # No xbacklight, this is the alterantive brillo.enable = true; }; # TODO under qtile programs = { xss-lock = let xsecurelock = (pkgs.xsecurelock.overrideAttrs(attrs: { postInstall = attrs.postInstall or "" + '' wrapProgram $out/bin/xsecurelock --set XSECURELOCK_COMPOSITE_OBSCURER 0 ''; })); in { enable = true; lockerCommand = "${xsecurelock}/bin/xsecurelock"; }; }; services = { logind.lidSwitch = "suspend"; # suspend on lid close xserver.libinput = { enable = true; touchpad = { naturalScrolling = true; tapping = true; }; }; printing = { enable = true; drivers = [ pkgs.splix pkgs.samsung-unified-linux-driver ]; }; }; # Wireguard profiles.vpn.lanIp = "192.168.32.25"; }