Compare commits

..

2 commits

Author SHA1 Message Date
HackerNCoder 232ec312d1 remove snapserver 2024-09-20 18:00:01 +02:00
HackerNCoder 47285cff49 Revert "flakes!"
This reverts commit c88ed8e5ed.
2024-09-20 17:58:18 +02:00
6 changed files with 0 additions and 99 deletions

View file

@ -139,18 +139,6 @@
localuser = null; localuser = null;
}; };
services.snapserver = {
enable = true;
codec = "flac";
openFirewall = true;
streams = {
mopidy = {
type = "pipe";
location = "/run/snapserver/mopidy";
};
};
};
# Allow unfree packages # Allow unfree packages
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;

View file

@ -1,27 +0,0 @@
{
"nodes": {
"nixpkgs": {
"locked": {
"lastModified": 1726447378,
"narHash": "sha256-2yV8nmYE1p9lfmLHhOCbYwQC/W8WYfGQABoGzJOb1JQ=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "086b448a5d54fd117f4dc2dee55c9f0ff461bdc1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-24.05",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"nixpkgs": "nixpkgs"
}
}
},
"root": "root",
"version": 7
}

View file

@ -1,19 +0,0 @@
{
description = "A simple NixOS flake";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05";
};
outputs = { self, nixpkgs, ... }@inputs: {
nixosConfigurations.ocean-princess = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
# Import old configuration.nix until fully moved to flakes
./configuration.nix
];
};
};
}

View file

@ -1,37 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/1f48be0f-3bc7-4aae-bf22-1e99dff778bd";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/46AF-0FD5";
fsType = "vfat";
};
swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp4s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View file

@ -5,9 +5,6 @@
enable = true; enable = true;
extensionPackages = with pkgs; [ mopidy-youtube mopidy-local mopidy-mpd mopidy-mpris mopidy-iris ]; extensionPackages = with pkgs; [ mopidy-youtube mopidy-local mopidy-mpd mopidy-mpris mopidy-iris ];
settings = { settings = {
audio = {
output = "tee name=t ! queue ! autoaudiosink t. ! audioresample ! audioconvert ! audio/x-raw,rate=48000,channels=2,format=S16LE ! filesink location=/run/snapserver/mopidy";
};
http = { http = {
hostname = "::"; hostname = "::";
}; };

View file

@ -10,7 +10,6 @@
history.path = "${config.xdg.dataHome}/zsh/history"; history.path = "${config.xdg.dataHome}/zsh/history";
initExtra = '' initExtra = ''
alias hsw='home-manager switch' alias hsw='home-manager switch'
alias pwConnect='pw-link Mopidy:output_FL Snapcast:playback_FL && pw-link Mopidy:output_FR Snapcast:playback_FR'
''; '';
oh-my-zsh = { oh-my-zsh = {
enable = true; enable = true;