Rename fake modules to modules-old

This commit is contained in:
Tibo De Peuter 2023-10-17 12:15:41 +02:00
parent 82a2d7bbea
commit 97db5d05d3
28 changed files with 13 additions and 13 deletions

View file

@ -1,15 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
home-manager.users.tdpeuter = { pkgs, ... }: {
home = {
packages = with pkgs; [
alacritty
];
file = {
".config/alacritty".source = ../../../../stow/alacritty/.config/alacritty;
};
};
};
}

View file

@ -1,28 +0,0 @@
{
imports = [
./alacritty
./firefox
./kitty
./steam
./thunderbird
# ./virtualbox
];
home-manager.users.tdpeuter = { pkgs, ... }: {
home.packages = with pkgs; [
brave
caprine-bin
discord
jellyfin-media-player
libreoffice-fresh
mattermost-desktop
nextcloud-client
obsidian
pinentry_qt
qalculate-gtk
spotify
zathura
zoom-us
];
};
}

View file

@ -1,56 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
home-manager.users.tdpeuter.programs.firefox = {
enable = true;
package = pkgs.firefox.override {
cfg = {
enableTridactylNative = true;
speechSynthesisSupport = true; # Allow Text-to-speech in e.g. Discord
};
extraPolicies = {
DisableFirefoxStudies = true;
DisablePocket = true;
DisableTelemetry = true;
ExtensionSettings = {};
OfferToSaveLogins = false;
};
};
profiles.tdpeuter = {
search = {
default = "DuckDuckGo";
force = true;
engines = {
"Bing".metaData.hidden = true;
"eBay".metaData.hidden = true;
"Nix Packages" = {
urls = [{
template = "https://search.nixos.org/packages";
params = [
{ name = "type"; value = "packages"; }
{ name = "query"; value = "{searchTerms}"; }
];
}];
icon = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
definedAliases = [ "@np" ];
};
"GitHub" = {
urls = [{
template = "https://github.com/search";
params = [
{ name = "q"; value = "{searchTerms}"; }
{ name = "type"; value = "repositories"; }
];
}];
icon = "${pkgs.icosystem}/share/icons/icosystem/scalable/apps/github-mark.svg";
definedAliases = [ "@gh" ];
};
};
};
};
};
}

View file

@ -1,15 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
home-manager.users.tdpeuter = { pkgs, ... }: {
home = {
packages = with pkgs; [
kitty
];
file = {
".config/kitty".source = ../../../../stow/kitty/.config/kitty;
};
};
};
}

View file

@ -1,8 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
programs.steam = {
enable = true;
};
}

View file

@ -1,130 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
let
signatures = {
default = ''
Met vriendelijke groeten
Tibo De Peuter
'';
UGent = ''
Met vriendelijke groeten
Tibo De Peuter
Student 2Ba Informatica
'';
MrFortem = ''
Kind regards
MrFortem Fiducia
'';
};
in
{
home-manager.users.tdpeuter = {
accounts.email.accounts = {
Telenet = {
address = "tibo.depeuter@telenet.be";
userName = "tibo.depeuter@telenet.be";
imap = {
host = "imap.telenet.be";
port = 993;
tls.enable = true;
};
smtp = {
host = "smtp.telenet.be";
port = 587;
tls = {
enable = true;
useStartTls = true;
};
};
realName = "Tibo De Peuter";
signature = {
showSignature = "append";
text = signatures.default;
};
primary = true;
thunderbird = {
enable = true;
settings = id: {
"mail.identity.id_${id}.htmlSigText" = signatures.default;
};
};
};
UGent = {
flavor = "outlook.office365.com";
address = "tibo.depeuter@ugent.be";
realName = "Tibo De Peuter";
signature = {
showSignature = "append";
text = signatures.UGent;
};
thunderbird = {
enable = true;
settings = id: {
"mail.server.server_${id}.authMethod" = 10;
"mail.smtpserver.smtp_${id}.authMethod" = 10;
"mail.identity.id_${id}.htmlSigText" = signatures.UGent;
};
};
};
Gmail = {
flavor = "gmail.com";
address = "tibo.depeuter@gmail.com";
realName = "Tibo De Peuter";
signature = {
showSignature = "append";
text = signatures.default;
};
thunderbird = {
enable = true;
settings = id: {
"mail.identity.id_${id}.htmlSigText" = signatures.default;
};
};
};
MrFortem = {
flavor = "gmail.com";
address = "fortemfiducia@gmail.com";
realName = "Fortem Fiducia";
signature = {
showSignature = "attach";
text = ''
Kind regards
MrFortem Fiducia
'';
};
thunderbird = {
enable = true;
settings = id: {
"mail.server.server_${id}.directory" = ".thunderbird/tdpeuter/ImapMail/imap.gmail.com-mrfortem";
"mail.server.server_${id}.directory-rel" = "[ProfD]ImapMail/imap.gmail.com-mrfortem";
"mail.identity.id_${id}.htmlSigText" = signatures.MrFortem;
};
};
};
};
programs = {
thunderbird = {
enable = true;
profiles.tdpeuter = {
isDefault = true;
settings = {
"mailnews.default_sort_order" = 2; # Sort descending
"mailnews.mark_message_read.delay" = true;
"mailnews.start_page.enabled" = false;
"mail.pane_config.dynamic" = 2; # Vertical view
};
};
};
};
};
}

View file

@ -1,17 +0,0 @@
{
virtualisation.virtualbox = {
host = {
enable = true;
enableExtensionPack = true;
};
guest = {
enable = true;
x11 = true;
};
};
users.extraGroups.vboxusers.members = [
"user-with-access-to-virtualbox"
];
}

View file

@ -1,105 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
imports = [
./apps
./shells
./utils
];
# Nix Flakes
nix.package = pkgs.nixFlakes;
nix.extraOptions = ''
experimental-features = nix-command flakes
keep-outputs = true
keep-derivations = true
'';
fonts.fonts = with pkgs; [
corefonts # Calibri for Uni
vistafonts
letter # Personal font
];
users.users.tdpeuter = {
description = "Tibo De Peuter";
isNormalUser = true;
extraGroups = [
config.users.groups.keys.name
config.users.groups.networkmanager.name
config.users.groups.wheel.name
];
initialPassword = "ChangeMe";
packages = with pkgs; [
home-manager
];
};
# Select internationalisation properties.
i18n.defaultLocale = "en_GB.UTF-8";
console = {
# font = "Lat2-Terminus16";
useXkbConfig = true; # use xkbOptions in tty.
};
services.xserver = {
layout = "us";
xkbVariant = "altgr-intl";
};
home-manager.useGlobalPkgs = true;
home-manager.users.tdpeuter = { pkgs, ... }: {
home = {
username = "tdpeuter";
homeDirectory = "/home/tdpeuter";
stateVersion = "23.05";
packages = with pkgs; [
gnupg
icosystem
];
};
programs = {
home-manager.enable = true;
gpg.enable = true;
};
services = {
gpg-agent = {
enable = true;
pinentryFlavor = "qt";
};
};
xdg.mimeApps =
let
browser = "firefox.desktop";
image-viewer = "nsxiv.desktop";
in {
enable = true;
defaultApplications = {
"application/pdf" = "org.pwmt.zathura-pdf-mupdf.desktop";
"application/x-extension-htm" = browser;
"application/x-extension-html" = browser;
"application/x-extension-shtml" = browser;
"application/x-extension-xht" = browser;
"application/x-extension-xhtml" = browser;
"application/xhtml+xml" = browser;
"image/jpeg" = image-viewer;
"image/png" = image-viewer;
"image/webp" = image-viewer;
"text/html" = browser;
"x-scheme-handler/chrome" = browser;
"x-scheme-handler/http" = browser;
"x-scheme-handler/https" = browser;
};
};
};
}

View file

@ -1,76 +0,0 @@
{ config, lib, pkgs, ... }:
{
services.xserver = {
enable = true;
# Enable the GNOME Desktop Environment.
displayManager.gdm.enable = true;
desktopManager.gnome.enable = true;
excludePackages = with pkgs; [
xterm
];
};
environment.systemPackages = with pkgs; [
gnomeExtensions.launch-new-instance
];
# We do not want these packages automatically
environment.gnome.excludePackages = (with pkgs; [
baobab
epiphany # Web browser
evince # Document viewer
gnome-connections # Remote desktop client
gnome-console
gnome-photos
gnome-text-editor
gnome-tour
]) ++ (with pkgs.gnome; [
eog # Image viewer
file-roller # Archive manager
geary # Mail client
gedit
gnome-calculator
gnome-calendar
gnome-characters
gnome-clocks
gnome-contacts
gnome-disk-utility
gnome-maps
gnome-music
gnome-system-monitor
gnome-weather
simple-scan
totem # Movie player
yelp # Help viewer
]);
# GNOME ricing
# Browse available settings by running:
# gsettings list-schemas | xargs -I % sh -c 'echo %; gsettings list-keys %' | less
home-manager.users.tdpeuter.dconf.settings = {
"org/gnome/desktop/background" = {
picture-uri = "file:///home/tdpeuter/Nextcloud/Afbeeldingen/wallpapers/bg";
picture-uri-dark = "file:///home/tdpeuter/Nextcloud/Afbeeldingen/wallpapers/bg-dark";
};
"org/gnome/desktop/interface" = {
enable-animations = false;
enable-hot-corners = false;
};
"org/gnome/desktop/notifications" = {
show-in-lock-screen = false;
};
"org/gnome/desktop/peripherals.touchpad" = {
tap-to-click = true;
};
"org/gnome/mutter" = {
dynamic-workspaces = true;
workspaces-only-on-primary = false;
};
"org/gnome/shell/app-switcher" = {
current-workspace-only = true;
};
};
}

View file

@ -1,35 +0,0 @@
{ config, lib, pkgs, ... }:
{
services.xserver = {
enable = true;
displayManager = {
defaultSession = "plasmawayland";
sddm = {
enable = true;
# https://discourse.nixos.org/t/plasma-wayland-session-not-available-from-sddm/13447/2
settings.Wayland.SessionDir = "${pkgs.plasma5Packages.plasma-workspace}/share/wayland-sessions";
};
};
desktopManager.plasma5 = {
enable = true;
useQtScaling = true;
};
excludePackages = with pkgs; [
xterm
];
};
environment.plasma5.excludePackages = with pkgs.libsForQt5; [
elisa
okular
khelpcenter
konsole
print-manager
plasma-systemmonitor
gwenview
];
}

View file

@ -1,110 +0,0 @@
{ config, pkgs, lib, ... }:
let
# bash script to let dbus know about important env variables and
# propagate them to relevent services run at the end of sway config
# see
# https://github.com/emersion/xdg-desktop-portal-wlr/wiki/"It-doesn't-work"-Troubleshooting-Checklist
# note: this is pretty much the same as /etc/sway/config.d/nixos.conf but also restarts
# some user services to make sure they have the correct environment variables
dbus-sway-environment = pkgs.writeTextFile {
name = "dbus-sway-environment";
destination = "/bin/dbus-sway-environment";
executable = true;
text = ''
dbus-update-activation-environment --systemd WAYLAND_DISPLAY XDG_CURRENT_DESKTOP=sway
systemctl --user stop pipewire pipewire-media-session xdg-desktop-portal xdg-desktop-portal-wlr
systemctl --user start pipewire pipewire-media-session xdg-desktop-portal xdg-desktop-portal-wlr
'';
};
# currently, there is some friction between sway and gtk:
# https://github.com/swaywm/sway/wiki/GTK-3-settings-on-Wayland
# the suggested way to set gtk settings is with gsettings
# for gsettings to work, we need to tell it where the schemas are
# using the XDG_DATA_DIR environment variable
# run at the end of sway config
configure-gtk = pkgs.writeTextFile {
name = "configure-gtk";
destination = "/bin/configure-gtk";
executable = true;
text = let
schema = pkgs.gsettings-desktop-schemas;
datadir = "${schema}/share/gsettings-schemas/${schema.name}";
in ''
export XDG_DATA_DIRS=${datadir}:$XDG_DATA_DIRS
gnome_schema=org.gnome.desktop.interface
gsettings set $gnome_schema gtk-theme 'Dracula'
'';
};
in
{
services.xserver = {
enable = true;
displayManager.lightdm.enable = true;
excludePackages = with pkgs; [
xterm
];
};
security.polkit.enable = true;
services.pipewire = {
enable = true;
alsa.enable = true;
pulse.enable = true;
};
services.dbus.enable = true;
xdg.portal = {
enable = true;
wlr.enable = true;
extraPortals = [ pkgs.xdg-desktop-portal-gtk ];
};
programs.sway = {
enable = true;
wrapperFeatures.gtk = true;
};
home-manager.users.tdpeuter = { pkgs, ... }: {
home = {
username = "tdpeuter";
homeDirectory = "/home/tdpeuter";
file = {
".config/sway".source = ../../../../stow/sway/.config/sway;
".config/waybar".source = ../../../../stow/waybar/.config/waybar;
".config/dunst".source = ../../../../stow/dunst/.config/dunst;
# TODO Fix scripts, I don't like it this way
".scripts".source = ../../../../stow/_scripts/.scripts;
};
packages = with pkgs; [
brightnessctl
dunst
font-awesome
pamixer
pavucontrol
playerctl
swayidle
swaylock-effects
waybar
wmname
];
# };
#
# wayland.windowManager.sway = {
# enable = true;
# package = pkgs.sway-unwrapped;
# config = rec {
# terminal = "alacritty";
# startup = [
# {command = "alacritty";}
# ];
# };
};
};
}

View file

@ -1,9 +0,0 @@
{ config, pkgs, ... }:
{
services.hardware.openrgb = {
enable = true;
package = pkgs.openrgb-with-all-plugins;
motherboard = "intel";
};
}

View file

@ -1,33 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
let
nvidia-offload = pkgs.writeShellScriptBin "nvidia-offload" ''
export __NV_PRIME_RENDER_OFFLOAD=1
export __NV_PRIME_RENDER_OFFLOAD_PROVIDER=NVIDIA-G0
export __GLX_VENDOR_LIBRARY_NAME=nvidia
export __VK_LAYER_NV_optimus=NVIDIA_only
exec "$@"
'';
in
{
nixpkgs.config.allowUnfree = true;
services.xserver.videoDrivers = [ "nvidia" ];
hardware = {
opengl.enable = true;
nvidia = {
open = true;
package = config.boot.kernelPackages.nvidiaPackages.stable;
modesetting.enable = true;
};
};
# Offloading
# environment.systemPackages = [ nvidia-offload ];
# hardware.nvidia.prime = {
# offload.enable = true;
# intelBusId = "PCI::00:02:0";
# nvidiaBusId = "PCI:01:00:0";
# };
}

View file

@ -1,5 +0,0 @@
{
imports = [
./zsh
];
}

View file

@ -1,77 +0,0 @@
{ config, lib, pkgs, ... }:
{
programs.zsh.enable = true;
users.users.tdpeuter.shell = pkgs.zsh;
home-manager.users.tdpeuter = { pkgs, ... }: {
home = {
packages = with pkgs; [
font-awesome
fzf
];
file = {
".oh-my-zsh".source = ../../../../stow/zsh/.oh-my-zsh;
};
};
programs.zsh = {
enable = true;
enableAutosuggestions = true;
enableSyntaxHighlighting = true;
history = {
expireDuplicatesFirst = true;
extended = true;
};
initExtra = ''
eval "$(direnv hook zsh)"
# Add fzf
if [ -x "$(command -v fzf-share)" ]; then
source "$(fzf-share)/key-bindings.zsh"
source "$(fzf-share)/completion.zsh"
fi
'';
oh-my-zsh = {
enable = true;
custom = "$HOME/.oh-my-zsh";
plugins = [
"dirhistory"
"git"
"screen"
];
theme = "mrfortem";
};
plugins = [
{
name = "cmdtime";
src = pkgs.fetchFromGitHub {
owner = "tom-auger";
repo = "cmdtime";
rev = "ffc72641dcfa0ee6666ceb1dc712b61be30a1e8b";
hash = "sha256-v6wCfNoPXDD3sS6yUYE6lre8Ir1yJcLGoAW3O8sUOCg=";
};
}
];
shellAliases = {
cp = "cp -i"; # Confirm before overwriting something
df = "df -h";
free = "free -m";
ll = "ls -la";
np = "nano -w PKGBUILD";
more = "less";
hgrep = "history | grep";
gs = "git status";
update = ''
pushd ~/projects/sisyphus/nixos
nix flake update
sudo nixos-rebuild switch --flake .# --show-trace
popd
'';
};
};
};
}

View file

@ -1,31 +0,0 @@
{
imports = [
./git
./mpv
./sops
./ssh
./tea
./vifm
./vim
./zellij
];
home-manager.users.tdpeuter = { pkgs, ... }: {
home.packages = with pkgs; [
direnv
duf
lynx
nsxiv
w3m
wget
zenith-nvidia
];
programs = {
direnv = {
enable = true;
nix-direnv.enable = true;
};
};
};
}

View file

@ -1,26 +0,0 @@
{ config, lib, pkgs, ... }:
{
home-manager.users.tdpeuter = {
programs.git = {
enable = true;
userName = "Tibo De Peuter";
userEmail = "tibo.depeuter@gmail.com";
extraConfig = {
core.editor = "vim";
};
ignores = [
"*.swp"
];
includes = [
{
condition = "gitdir:~/university/"; # Trailing backslash is necessary!
contentSuffix = ".gitconfig";
contents = {
user.email = "tibo.depeuter@ugent.be";
};
}
];
};
};
}

View file

@ -1,11 +0,0 @@
{ config, system, lib, pkgs-unstable, ... }:
{
home-manager.users.tdpeuter.home = {
packages = with pkgs-unstable; [
mpv
];
file.".config/mpv".source = ../../../../stow/mpv/.config/mpv;
};
}

View file

@ -1,47 +0,0 @@
{ config, lib, pkgs, ... }:
{
environment.systemPackages = with pkgs; [
sops
];
sops = {
# Add secrets.yml to the nix store
defaultSopsFile = ../../../secrets/secrets.yaml;
age = {
# Automatically import SSH keys as age keys
sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
# Use an age key that is expected to already be in the filesystem
keyFile = "/var/lib/sops-nix/key.txt";
# Generate new keys if the key specified above does not exist
# generateKey = true;
};
secrets =
let
user = config.users.users.tdpeuter.name;
Hugo = {
format = "yaml";
sopsFile = ../../../secrets/Hugo.yaml;
owner = user;
};
UGent = {
format = "yaml";
sopsFile = ../../../secrets/UGent.yaml;
owner = user;
};
in {
"Hugo/ssh" = Hugo;
"UGent/HPC/ssh" = UGent;
"GitHub/ssh" = {
format = "yaml";
sopsFile = ../../../secrets/GitHub.yaml;
owner = user;
};
"Hugo/Gitea/ssh" = Hugo;
"UGent/GitHub/ssh" = UGent;
"UGent/SubGit/ssh" = UGent;
};
};
}

View file

@ -1,41 +0,0 @@
# Adding SSH keys
To incorporate SSH keys, for instance, to enable authentication with a Git server, follow these steps:
Step 0: If necessary, generate a keypair, for example using the command:
```bash
ssh-keygen -t ed25519
```
Please note that setting a password for the keypair is not yet tested.
Step 1: Create a new file named `yourservice.yaml` within the [secrets](../../../secrets/) directory by executing the following command:
```bash
sops secrets/yourservice.yaml
```
Within this file, create a value that contains your private key. For example:
```yaml
yourservice:
ssh: |
-----BEGIN OPENSSH PRIVATE KEY-----
<...>
-----END OPENSSH PRIVATE KEY-----
```
Step 2: Reference this value in [your sops configuration](../../utils/sops/default.nix) as follows:
```
sops.secrets."yourservice/ssh".format = "yaml";
sops.secrets."yourservice/sss".sopsFile = secrets/youservice.yaml;
```
Step 3: Finally, add the SSH key to your SSH configuration so that it is used correctly when connecting to your host. Add the following lines to your SSH configuraton file:
```
Host yourservice
IdentityFile /run/secrets/yourservice/ssh
```

View file

@ -1,54 +0,0 @@
{ config, lib, pkgs, ... }:
{
services.openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
home-manager.users.tdpeuter = {
programs.ssh = {
enable = true;
matchBlocks = {
"Hugo" = {
hostname = "192.168.0.11";
identitiesOnly = true;
identityFile = "/run/secrets/Hugo/ssh";
user = "admin";
};
"HPC" = {
hostname = "login.hpc.ugent.be";
identitiesOnly = true;
identityFile = "/run/secrets/UGent/HPC/ssh";
user = "vsc44995";
};
# Git authentication
"git.depeuter.dev" = {
hostname = "git.depeuter.dev";
identitiesOnly = true;
identityFile = "/run/secrets/Hugo/Gitea/ssh";
user = "git";
};
"github.com" = {
hostname = "github.com";
identitiesOnly = true;
identityFile = "/run/secrets/GitHub/ssh";
user = "git";
};
"github.ugent.be" = {
hostname = "github.ugent.be";
identitiesOnly = true;
identityFile = "/run/secrets/UGent/GitHub/ssh";
user = "git";
};
"subgit.ugent.be" = {
hostname = "subgit.ugent.be";
identitiesOnly = true;
identityFile = "/run/secrets/UGent/SubGit/ssh";
user = "git";
};
};
};
};
}

View file

@ -1,10 +0,0 @@
{ config, lib, pkgs, ... }:
{
home-manager.users.tdpeuter.home = {
packages = with pkgs; [
tea
];
};
}

View file

@ -1,22 +0,0 @@
{ config, lib, pkgs, ... }:
{
home-manager.users.tdpeuter.home = {
packages = with pkgs; [
vifm
chafa # Terminal image previewer
glow # Terminal Markdown renderer
font-awesome_5
];
# Put files separately so history still works
file = {
".config/vifm/colors".source = ../../../../stow/vifm/.config/vifm/colors;
".config/vifm/scripts".source = ../../../../stow/vifm/.config/vifm/scripts;
".config/vifm/vifmrc".source = ../../../../stow/vifm/.config/vifm/vifmrc;
};
};
}

View file

@ -1,81 +0,0 @@
{ inputs, lib, config, pkgs, ... }:
{
home-manager.users.tdpeuter = { pkgs, ... }: {
home.file = {
".vim".source = ../../../../stow/vim/.vim;
};
programs.vim = {
enable = true;
extraConfig = ''
colorscheme tdpeuter-light
" Tags
" pacman -S ctags
command! MakeTags !ctags -R . &
" Move to defintion using ^]
" Move to ambigious using g^]
" Move back using ^t
filetype on
filetype indent on
filetype plugin on
" File browsing
let g:netrw_browse_split=4 " open in the previous window
let g:netrw_altv=1 " split new windows to the right
let g:netrw_liststyle=3 " treeview
set autoindent
set conceallevel=2
set incsearch
set linebreak
set nocompatible
set path+=**
set scrolloff=3
set showcmd
set showmatch
set smartindent
set smarttab
set title
set wildignore=*.docx,*.jpg,*.png,*.gif,*.pdf,*.pyc,*.exe,*.flv,*.img,*.xlsx
set wildmenu
syntax enable
if $TERM == 'alacritty'
set ttymouse=sgr " Alacritty specific
endif
if $TERM == 'xterm-kitty'
" Fix <HOME> and <END> not working
set term=xterm-256color
endif
if has("autocmd")
au BufReadPost * if line("'\"") > 1 && line("'\"") <= line("$") | exe "normal! g'\"" | endif
" https://stackoverflow.com/a/37558470/19044747
augroup remember_folds
autocmd!
autocmd BufWinLeave * silent! mkview
autocmd BufWinEnter * silent! loadview
augroup END
endif
'';
plugins = with pkgs.vimPlugins; [
ale
catppuccin-vim
statix
vifm-vim
];
settings = {
expandtab = true;
mouse = "a";
number = true;
relativenumber = true;
shiftwidth = 4;
tabstop = 4;
};
};
};
}

View file

@ -1,16 +0,0 @@
{ config, pkgs, lib, ... }:
{
home-manager.users.tdpeuter.home = {
packages = with pkgs; [
zellij
];
file.".config/zellij".source = ../../../../stow/zellij/.config/zellij;
};
fonts.fonts = with pkgs; [
noto-fonts
noto-fonts-cjk
];
}