Compare commits

...

14 commits

Author SHA1 Message Date
41a6aad6f3 Update dev.nix configuration 2026-02-16 10:28:16 +01:00
2697efb170 Add agent-deck package 2026-02-16 10:28:14 +01:00
6ba945b00f Add shell configuration for endurance 2026-02-16 10:27:43 +01:00
8e7c1fbf16 Exclude writeNushellApplication from import-tree auto-import 2026-02-16 10:25:56 +01:00
9456a8906e Remove modules/flake/default.nix (replaced by import-tree) 2026-02-16 10:25:00 +01:00
0b7ebe7cb5 Add import-tree input 2026-02-16 10:23:11 +01:00
23750cdbb4
Add nixmate
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:18:09 +01:00
e07cb4ae8b
Remove xdg-desktop-portal packages
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:11:54 +01:00
874c439c6f
Add jugglinglab
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:11:32 +01:00
93fafdbfb9
Add wakatime module
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:11:30 +01:00
420d2f687b
Add damon
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:11:14 +01:00
b8f86f26e4
Add portfolio, pytr, and tabiew
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:10:50 +01:00
5d68a3edb9
Add pytr overlay
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:10:31 +01:00
bb333784f6
Update unstable nixpkgs
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 23:10:10 +01:00
14 changed files with 191 additions and 20 deletions

117
flake.lock generated
View file

@ -561,6 +561,24 @@
"type": "github"
}
},
"flake-utils_3": {
"inputs": {
"systems": "systems_5"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flatpak": {
"locked": {
"lastModified": 1739444422,
@ -743,6 +761,21 @@
"type": "github"
}
},
"import-tree": {
"locked": {
"lastModified": 1771045967,
"narHash": "sha256-oYO4poyw0Sb/db2PigqugMlDwsvwLg6CSpFrMUWxA3Q=",
"owner": "vic",
"repo": "import-tree",
"rev": "c968d3b54d12cf5d9c13f16f7c545a06c9d1fde6",
"type": "github"
},
"original": {
"owner": "vic",
"repo": "import-tree",
"type": "github"
}
},
"master": {
"locked": {
"lastModified": 1767143992,
@ -879,6 +912,26 @@
"type": "github"
}
},
"nixmate": {
"inputs": {
"flake-utils": "flake-utils_3",
"nixpkgs": "nixpkgs_6",
"rust-overlay": "rust-overlay"
},
"locked": {
"lastModified": 1770757353,
"narHash": "sha256-u8lSQe2z961yTbzm9K/nHV5AvjUps8Y8k+ZYvJ6qaWg=",
"owner": "daskladas",
"repo": "nixmate",
"rev": "7bb722d3a4d198d3b9403dea2ed7e953b5b82663",
"type": "github"
},
"original": {
"owner": "daskladas",
"repo": "nixmate",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1767051569,
@ -1021,6 +1074,22 @@
}
},
"nixpkgs_6": {
"locked": {
"lastModified": 1770562336,
"narHash": "sha256-ub1gpAONMFsT/GU2hV6ZWJjur8rJ6kKxdm9IlCT0j84=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "d6c71932130818840fc8fe9509cf50be8c64634f",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_7": {
"locked": {
"lastModified": 1764983851,
"narHash": "sha256-y7RPKl/jJ/KAP/VKLMghMgXTlvNIJMHKskl8/Uuar7o=",
@ -1207,11 +1276,13 @@
"flatpak": "flatpak",
"git-global-log": "git-global-log",
"home-manager": "home-manager_2",
"import-tree": "import-tree",
"master": "master",
"musnix": "musnix",
"ngipkgs": "ngipkgs",
"niri": "niri",
"nixpkgs": "nixpkgs_6",
"nixmate": "nixmate",
"nixpkgs": "nixpkgs_7",
"noctalia": "noctalia",
"nur": "nur",
"stylix": "stylix",
@ -1219,6 +1290,27 @@
"waka-victoriametrics": "waka-victoriametrics"
}
},
"rust-overlay": {
"inputs": {
"nixpkgs": [
"nixmate",
"nixpkgs"
]
},
"locked": {
"lastModified": 1770606655,
"narHash": "sha256-rpJf+kxvLWv32ivcgu8d+JeJooog3boJCT8J3joJvvM=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "11a396520bf911e4ed01e78e11633d3fc63b350e",
"type": "github"
},
"original": {
"owner": "oxalica",
"repo": "rust-overlay",
"type": "github"
}
},
"sbt-derivation": {
"inputs": {
"flake-utils": [
@ -1301,7 +1393,7 @@
"nixpkgs"
],
"nur": "nur_2",
"systems": "systems_5",
"systems": "systems_6",
"tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes",
@ -1397,6 +1489,21 @@
"type": "github"
}
},
"systems_6": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": {
"flake": false,
"locked": {
@ -1522,11 +1629,11 @@
},
"unstable": {
"locked": {
"lastModified": 1770197578,
"narHash": "sha256-AYqlWrX09+HvGs8zM6ebZ1pwUqjkfpnv8mewYwAo+iM=",
"lastModified": 1770562336,
"narHash": "sha256-ub1gpAONMFsT/GU2hV6ZWJjur8rJ6kKxdm9IlCT0j84=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "00c21e4c93d963c50d4c0c89bfa84ed6e0694df2",
"rev": "d6c71932130818840fc8fe9509cf50be8c64634f",
"type": "github"
},
"original": {

View file

@ -9,6 +9,7 @@
# Flake framework
flake-parts.url = "github:hercules-ci/flake-parts";
import-tree.url = "github:vic/import-tree";
easy-hosts.url = "github:tgirlcloud/easy-hosts";
deploy-rs.url = "github:serokell/deploy-rs";
@ -51,6 +52,7 @@
musnix.url = "github:musnix/musnix";
flatpak.url = "github:gmodena/nix-flatpak/?ref=v0.6.0";
git-global-log.url = "github:tophcodes/git-global-log";
nixmate.url = "github:daskladas/nixmate";
nur = {
url = "github:nix-community/NUR";
inputs.nixpkgs.follows = "nixpkgs";
@ -87,7 +89,7 @@
}: {
imports = [
inputs.agenix-rekey.flakeModules.default
./modules/flake
(inputs.import-tree ./modules/flake)
];
});
}

View file

@ -1,6 +1,7 @@
{
pkgs,
config,
inputs,
...
}: {
home.packages = with pkgs; [
@ -36,6 +37,7 @@
devenv
gitui
tea
harbor.agent-deck # Terminal session manager for AI coding agents
harbor.oryx # TUI for sniffing network traffic using eBPF
# BMAD
@ -57,6 +59,8 @@
bun
nomad
damon
inputs.nixmate.packages.${pkgs.stdenv.hostPlatform.system}.default
];
bosun.secrets.npmrc = {

View file

@ -0,0 +1,14 @@
{pkgs, ...}: {
programs.fish = {
enable = true;
interactiveShellInit = ''
# Kitty shell integration - enables command markers and sticky command display
if set -q KITTY_INSTALLATION_DIR
set --global KITTY_SHELL_INTEGRATION enabled
source "$KITTY_INSTALLATION_DIR/shell-integration/fish/vendor_conf.d/kitty-shell-integration.fish"
set --prepend fish_complete_path "$KITTY_INSTALLATION_DIR/shell-integration/fish/vendor_completions.d"
end
'';
};
}

View file

@ -12,6 +12,7 @@
./gaming.nix
./ssh.nix
./communication.nix
./wakatime.nix
./gpg
./niri
./stylix.nix

View file

@ -15,6 +15,8 @@
# gimpPlugins.bimp # batch image manipulation, broken atm
# rawtherapee
jugglinglab
# CAD
freecad
openscad

View file

@ -15,6 +15,9 @@
bottom # System resource monitor
grim # Screenshots
slurp # Region selection
portfolio
pytr
tabiew # csv viewer
# Productivity
obsidian # Note taking

View file

@ -186,9 +186,6 @@
nix-tree
nix-output-monitor
xdg-desktop-portal
xdg-desktop-portal-gtk
];
# Quirky workaround for this not being set in portals for some reason

View file

@ -20,7 +20,7 @@
overlays = [
(final: prev: {
writeNushellApplication = import ./lib/writeNushellApplication.nix {
writeNushellApplication = import ./lib/_writeNushellApplication.nix {
inherit lib;
pkgs = prev;
};

View file

@ -1,10 +0,0 @@
{...}: {
imports = [
./hosts.nix
./homes.nix
./args.nix
./formatter.nix
./packages.nix
./lib
];
}

View file

@ -43,6 +43,7 @@
];
permittedInsecurePackages = [
"python3.13-ecdsa-0.19.1" # pytr
# "nixos-config"
# "electron-36.9.5"
# "dotnet-sdk-6.0.428"

View file

@ -33,4 +33,5 @@ in [
(withChannels (import ./packages.nix))
(withChannels (import ./unstable.nix))
(withChannels (import ./spacedrive.nix))
(withChannels (import ./pytr.nix))
]

11
overlays/pytr.nix Normal file
View file

@ -0,0 +1,11 @@
{...}: final: prev: {
pytr = prev.pytr.overrideAttrs (old: {
version = "0.4.5";
src = prev.fetchFromGitHub {
owner = "pytr-org";
repo = "pytr";
rev = "3cd0bb3b1301d89ff9c39de3cb34dc82c0c9af6d";
hash = "sha256-UStDQaZecrpbL9+IApyV49gVQZrGI7eDURtgHZJazrk=";
};
});
}

View file

@ -0,0 +1,38 @@
{
lib,
buildGoModule,
fetchFromGitHub,
git,
tmux,
makeWrapper,
}:
buildGoModule rec {
pname = "agent-deck";
version = "0.15.0";
src = fetchFromGitHub {
owner = "asheshgoplani";
repo = "agent-deck";
rev = "v${version}";
hash = "sha256-R/hDPhb+CtGXreHaKlSH2E6QEpfigj41Sq3BDVxLtaw=";
};
vendorHash = "sha256-k0jRlsFmBJNbfX3u2UQlnx/Z25KII8fYegU+Z77/EO0=";
subPackages = ["cmd/agent-deck"];
nativeBuildInputs = [makeWrapper];
nativeCheckInputs = [git];
postInstall = ''
wrapProgram $out/bin/agent-deck \
--prefix PATH : ${lib.makeBinPath [tmux]}
'';
meta = {
description = "Terminal-based session manager for AI coding agents";
homepage = "https://github.com/asheshgoplani/agent-deck";
license = lib.licenses.mit;
mainProgram = "agent-deck";
};
}