diff --git a/default.nix b/default.nix index b7f52bb2..c0ddd027 100644 --- a/default.nix +++ b/default.nix @@ -129,6 +129,6 @@ # read stable version patch notes and fix any issues # then you can change this - system.stateVersion = "23.05"; + #system.stateVersion = "23.05"; # read comment you read the comment? } diff --git a/flake.lock b/flake.lock deleted file mode 100644 index 76d919e6..00000000 --- a/flake.lock +++ /dev/null @@ -1,176 +0,0 @@ -{ - "nodes": { - "NixOS-WSL": { - "inputs": { - "flake-compat": "flake-compat", - "flake-utils": "flake-utils", - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1701387264, - "narHash": "sha256-uGZycEJqOZSYvpmoFuyDrboe5e1t0F/HB9r7HsWgssc=", - "owner": "nix-community", - "repo": "NixOS-WSL", - "rev": "1a50ab3fe98934d8f109f05528874c9ab324707b", - "type": "github" - }, - "original": { - "owner": "nix-community", - "repo": "NixOS-WSL", - "type": "github" - } - }, - "flake-compat": { - "flake": false, - "locked": { - "lastModified": 1696426674, - "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=", - "owner": "edolstra", - "repo": "flake-compat", - "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33", - "type": "github" - }, - "original": { - "owner": "edolstra", - "repo": "flake-compat", - "type": "github" - } - }, - "flake-utils": { - "inputs": { - "systems": "systems" - }, - "locked": { - "lastModified": 1694529238, - "narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=", - "owner": "numtide", - "repo": "flake-utils", - "rev": "ff7b65b44d01cf9ba6a71320833626af21126384", - "type": "github" - }, - "original": { - "owner": "numtide", - "repo": "flake-utils", - "type": "github" - } - }, - "home-manager": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1700392168, - "narHash": "sha256-v5LprEFx3u4+1vmds9K0/i7sHjT0IYGs7u9v54iz/OA=", - "owner": "nix-community", - "repo": "home-manager", - "rev": "28535c3a34d79071f2ccb68671971ce0c0984d7e", - "type": "github" - }, - "original": { - "owner": "nix-community", - "ref": "release-23.05", - "repo": "home-manager", - "type": "github" - } - }, - "nixpkgs": { - "locked": { - "lastModified": 1701362232, - "narHash": "sha256-GVdzxL0lhEadqs3hfRLuj+L1OJFGiL/L7gCcelgBlsw=", - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "d2332963662edffacfddfad59ff4f709dde80ffe", - "type": "github" - }, - "original": { - "owner": "NixOS", - "ref": "nixos-23.05", - "repo": "nixpkgs", - "type": "github" - } - }, - "nixpkgs-stable": { - "locked": { - "lastModified": 1700905716, - "narHash": "sha256-w1vHn2MbGfdC+CrP3xLZ3scsI06N0iQLU7eTHIVEFGw=", - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "dfb95385d21475da10b63da74ae96d89ab352431", - "type": "github" - }, - "original": { - "owner": "NixOS", - "ref": "release-23.05", - "repo": "nixpkgs", - "type": "github" - } - }, - "nixpkgs-unstable": { - "locked": { - "lastModified": 1701253981, - "narHash": "sha256-ztaDIyZ7HrTAfEEUt9AtTDNoCYxUdSd6NrRHaYOIxtk=", - "owner": "nixos", - "repo": "nixpkgs", - "rev": "e92039b55bcd58469325ded85d4f58dd5a4eaf58", - "type": "github" - }, - "original": { - "owner": "nixos", - "ref": "nixos-unstable", - "repo": "nixpkgs", - "type": "github" - } - }, - "root": { - "inputs": { - "NixOS-WSL": "NixOS-WSL", - "home-manager": "home-manager", - "nixpkgs": "nixpkgs", - "nixpkgs-unstable": "nixpkgs-unstable", - "sops-nix": "sops-nix" - } - }, - "sops-nix": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ], - "nixpkgs-stable": "nixpkgs-stable" - }, - "locked": { - "lastModified": 1701518298, - "narHash": "sha256-5t8yqKe0oVusV4xgfA+wW58hQJXFMmq0mmaR1gKES+Y=", - "owner": "Mic92", - "repo": "sops-nix", - "rev": "e19071f9958c8da4f4347d3d78790d97e98ba22f", - "type": "github" - }, - "original": { - "owner": "Mic92", - "repo": "sops-nix", - "type": "github" - } - }, - "systems": { - "locked": { - "lastModified": 1681028828, - "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", - "owner": "nix-systems", - "repo": "default", - "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", - "type": "github" - }, - "original": { - "owner": "nix-systems", - "repo": "default", - "type": "github" - } - } - }, - "root": "root", - "version": 7 -} diff --git a/flake.nix b/flake.nix index cd64f035..08be84dc 100644 --- a/flake.nix +++ b/flake.nix @@ -4,12 +4,12 @@ inputs = { # nixpkgs - nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05"; + nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11"; # nixpkgs unstable nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; # home-manager home-manager = { - url = "github:nix-community/home-manager/release-23.05"; + url = "github:nix-community/home-manager/release-23.11"; inputs.nixpkgs.follows = "nixpkgs"; }; diff --git a/hosts/sakopc/configuration.nix b/hosts/sakopc/configuration.nix index 98655a6c..a429ba1f 100644 --- a/hosts/sakopc/configuration.nix +++ b/hosts/sakopc/configuration.nix @@ -86,4 +86,9 @@ certs.enable = true; }; }; + + # DO NOT CHANGE THIS!!!! + # ONLY CHANGE WHEN FULLY REINSTALLING + # OR USING NEW SYSTEMS + system.stateVersion = "23.11"; } diff --git a/hosts/sakotop/configuration.nix b/hosts/sakotop/configuration.nix index a8033107..1fde892c 100644 --- a/hosts/sakotop/configuration.nix +++ b/hosts/sakotop/configuration.nix @@ -136,4 +136,9 @@ # networking.firewall.allowedUDPPorts = [ ... ]; # Or disable the firewall altogether. # networking.firewall.enable = false; + + # DO NOT CHANGE THIS!!!! + # ONLY CHANGE WHEN FULLY REINSTALLING + # OR USING NEW SYSTEMS + system.stateVersion = "23.05"; } diff --git a/hosts/sakovm/README.md b/hosts/sakovm/README.md deleted file mode 100644 index 6533836f..00000000 --- a/hosts/sakovm/README.md +++ /dev/null @@ -1,2 +0,0 @@ -# sakovm -ill use this for stupid things later diff --git a/hosts/sakovm/configuration.nix b/hosts/sakovm/configuration.nix deleted file mode 100644 index 23da4f41..00000000 --- a/hosts/sakovm/configuration.nix +++ /dev/null @@ -1,113 +0,0 @@ -# Edit this configuration file to define what should be installed on -# your system. Help is available in the configuration.nix(5) man page and in the NixOS manual (accessible by running `nixos-help`). -{ - config, - pkgs, - lib, - inputs, - outputs, - ... -}: { - imports = [ - # Include the results of the hardware scan. - ./hardware-configuration.nix - ]; - - # required for hostname specific configurations - networking.hostName = "sakovm"; # Define your hostname. - - modules = { - desktop = { - kitty.enable = true; - dwm.enable = true; - xmonad.enable = false; - picom.enable = true; - dunst.enable = true; - browsers = { - firefox.enable = true; - qutebrowser.enable = false; - chromium.enable = true; - }; - chat = { - whatsapp.enable = true; - zoom.enable = true; - }; - apps = { - nemo.enable = true; - pass.enable = true; - keepassxc.enable = true; - rssguard.enable = true; - nicotineplus.enable = true; - transmission.enable = true; - calibre.enable = true; - kindle-comic-converter.enable = true; - mangal.enable = true; - obs.enable = true; - nextcloud.enable = true; - }; - game = { - wine.enable = true; - lutris.enable = true; - steam.enable = true; - grapejuice.enable = true; - }; - media = { - gimp.enable = true; - blender.enable = true; - kdenlive.enable = true; - mpv.enable = true; - }; - }; - hardware = { - pipewire.enable = true; - }; - dev = { - editors = { - nvim.enable = true; - emacs.enable = true; - }; - nil.enable = true; - cc.enable = true; - javascript.enable = true; - python.enable = true; - rust.enable = true; - lua.enable = true; - }; - shell = { - nix = { - # makes nix search nixpkgs - # ALOT faster - search.enable = true; - # optimize store - optimize.enable = true; - }; - zsh.enable = true; - tmux.enable = true; - newsboat.enable = true; - ranger.enable = true; - }; - media = { - mpd.enable = true; - ncmpcpp.enable = true; - }; - work = { - libreoffice.enable = true; - onlyoffice.enable = true; - }; - security = { - age.enable = true; - }; - }; - - # Enable CUPS to print documents. - # services.printing.enable = true; - - # Enable the OpenSSH daemon. - # services.openssh.enable = true; - - # Open ports in the firewall. - # networking.firewall.allowedTCPPorts = [ ... ]; - # networking.firewall.allowedUDPPorts = [ ... ]; - # Or disable the firewall altogether. - # networking.firewall.enable = false; -}