update 10/10/2024

This commit is contained in:
2024-10-10 21:53:43 +09:00
parent 43b7f5dda5
commit ddd508b148
6 changed files with 19 additions and 12 deletions

18
flake.lock generated
View File

@@ -7,11 +7,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1727346017, "lastModified": 1728337164,
"narHash": "sha256-z7OCFXXxIseJhEHiCkkUOkYxD9jtLU8Kf5Q9WC0SjJ8=", "narHash": "sha256-VdRTjJFyq4Q9U7Z/UoC2Q5jK8vSo6E86lHc2OanXtvc=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "c124568e1054a62c20fbe036155cc99237633327", "rev": "038630363e7de57c36c417fd2f5d7c14773403e4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -23,11 +23,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1727040444, "lastModified": 1728269138,
"narHash": "sha256-19FNN5QT9Z11ZUMfftRplyNN+2PgcHKb3oq8KMW/hDA=", "narHash": "sha256-oKxDImsOvgUZMY4NwXVyUc/c1HiU2qInX+b5BU0yXls=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "d0cb432a9d28218df11cbd77d984a2a46caeb5ac", "rev": "ecfcd787f373f43307d764762e139a7cdeb9c22b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -39,11 +39,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1727122398, "lastModified": 1728492678,
"narHash": "sha256-o8VBeCWHBxGd4kVMceIayf5GApqTavJbTa44Xcg5Rrk=", "narHash": "sha256-9UTxR8eukdg+XZeHgxW5hQA9fIKHsKCdOIUycTryeVw=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "30439d93eb8b19861ccbe3e581abf97bdc91b093", "rev": "5633bcff0c6162b9e4b5f1264264611e950c8ec7",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -32,7 +32,7 @@
}; };
# Open ports in the firewall. # Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ]; networking.firewall.allowedTCPPorts = [ 3000 3001 ];
# networking.firewall.allowedUDPPorts = [ ... ]; # networking.firewall.allowedUDPPorts = [ ... ];
# Or disable the firewall altogether. # Or disable the firewall altogether.
# networking.firewall.enable = false; # networking.firewall.enable = false;

View File

@@ -8,6 +8,7 @@
../../user/dev/tools/gitui.nix ../../user/dev/tools/gitui.nix
../../user/dev/tools/firefox-devedition.nix ../../user/dev/tools/firefox-devedition.nix
../../user/dev/tools/dbeaver-bin.nix ../../user/dev/tools/dbeaver-bin.nix
../../user/dev/tools/tldr.nix
../../user/dev/editor/vscodium.nix ../../user/dev/editor/vscodium.nix
../../user/dev/editor/zed-editor.nix ../../user/dev/editor/zed-editor.nix
../../user/dev/lang/cc.nix ../../user/dev/lang/cc.nix

View File

@@ -56,7 +56,7 @@ read doExec
if [ "$doExec" == "y" ] || [ "$doExec" == "Y" ]; then if [ "$doExec" == "y" ] || [ "$doExec" == "Y" ]; then
cd ~/.dotfiles cd ~/.dotfiles
sudo nixos-rebuild --flake '.#system' sudo nixos-rebuild switch --flake '.#system'
else else
echo "Exiting" echo "Exiting"
exit 0 exit 0

View File

@@ -7,7 +7,7 @@
fcitx5 = { fcitx5 = {
waylandFrontend = true; waylandFrontend = true;
plasma6Support = true; plasma6Support = true;
addons = with pkgs; [ fcitx5-mozc ]; addons = with pkgs; [ fcitx5-mozc fcitx5-skk ];
}; };
}; };
}; };

6
user/dev/tools/tldr.nix Normal file
View File

@@ -0,0 +1,6 @@
{ pkgs, ... }:
{
home.packages = with pkgs; [
tldr
];
}