calcite: remove unused packages

This commit is contained in:
xinyangli 2024-01-07 21:41:01 +08:00
parent 552cc4f144
commit b0facfa211
9 changed files with 114 additions and 102 deletions

View file

@ -84,11 +84,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1701728041, "lastModified": 1703657526,
"narHash": "sha256-x0pyrI1vC8evVDxCxyO6olOyr4wlFg9+VS3C3p4xFYQ=", "narHash": "sha256-C3fQG/tasnhtfJb0cvXthMDUJ/OLgCKNLqfMuR/M+0k=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "ac7216918cd65f3824ba7817dea8f22e61221eaf", "rev": "d1d950841d230490f308f5fcf8c0d4f2bd3f24a7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -104,11 +104,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1702177733, "lastModified": 1703387252,
"narHash": "sha256-lr3hkmmuqDFPj3i41cHpaALF3Txo3kxsJ3L6jZLujJ8=", "narHash": "sha256-XKJqGj0BaEn/zyctEnkgVIh6Ba1rgTRc+UBi9EU8Y54=",
"owner": "Mic92", "owner": "Mic92",
"repo": "nix-index-database", "repo": "nix-index-database",
"rev": "58ecd98e27e27fcbb27a51a588555c828b1ec56e", "rev": "f4340c1a42c38d79293ba69bfd839fbd6268a538",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -128,11 +128,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1701825722, "lastModified": 1703639874,
"narHash": "sha256-vpT4hY8DDu39b9AMKCJIEVgQSfm+QKDGUjpVPFxNhTs=", "narHash": "sha256-54bkJbvGRb9Wq4re5tbtbHaFSPg7wnQfgAjCvggEDZ4=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-vscode-extensions", "repo": "nix-vscode-extensions",
"rev": "8f5a362c9ea3824d70458485abf9d162b8765034", "rev": "52061beda00305b26445dc84ca7ab8a6036685c4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -166,11 +166,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1701656485, "lastModified": 1703545041,
"narHash": "sha256-xDFormrGCKKGqngHa2Bz1GTeKlFMMjLnHhTDRdMJ1hs=", "narHash": "sha256-nvQA+k1rSszrf4kA4eK2i/SGbzoXyoKHzzyzq/Jca1w=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "fa194fc484fd7270ab324bb985593f71102e84d1", "rev": "a15b6e525f5737a47b4ce28445c836996fb2ea8c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -182,11 +182,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1701718080, "lastModified": 1703438236,
"narHash": "sha256-6ovz0pG76dE0P170pmmZex1wWcQoeiomUZGggfH9XPs=", "narHash": "sha256-aqVBq1u09yFhL7bj1/xyUeJjzr92fXVvQSSEx6AdB1M=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "2c7f3c0fb7c08a0814627611d9d7d45ab6d75335", "rev": "5f64a12a728902226210bf01d25ec6cbb9d9265b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -198,11 +198,11 @@
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1701615100, "lastModified": 1703351344,
"narHash": "sha256-7VI84NGBvlCTduw2aHLVB62NvCiZUlALLqBe5v684Aw=", "narHash": "sha256-9FEelzftkE9UaJ5nqxidaJJPEhe9TPhbypLHmc2Mysc=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "e9f06adb793d1cca5384907b3b8a4071d5d7cb19", "rev": "7790e078f8979a9fcd543f9a47427eeaba38f268",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -214,11 +214,11 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1701568804, "lastModified": 1703351344,
"narHash": "sha256-iwr1fjOCvlirVL/xNvOTwY9kg3L/F3TC/7yh/QszaPI=", "narHash": "sha256-9FEelzftkE9UaJ5nqxidaJJPEhe9TPhbypLHmc2Mysc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "dc01248a9c946953ad4d438b0a626f5c987a93e4", "rev": "7790e078f8979a9fcd543f9a47427eeaba38f268",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -230,11 +230,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1701906331, "lastModified": 1703663873,
"narHash": "sha256-4dzaExoiung1HWn0nTp9xBHtB5rQMTsfOC2FtJuUoH4=", "narHash": "sha256-WHt475cqqOZp8+2FSZf3L6xVTQlIN8eAAVJzCeo8ydU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "b8ad2b1feccf3b75e2d7fabad6d97769318febf4", "rev": "e65636be64a336e7110fc82cf7aab577f1ed8233",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -266,11 +266,11 @@
"nixpkgs-stable": "nixpkgs-stable_2" "nixpkgs-stable": "nixpkgs-stable_2"
}, },
"locked": { "locked": {
"lastModified": 1701728052, "lastModified": 1703387502,
"narHash": "sha256-7lOMc3PtW5a55vFReBJLLLOnopsoi1W7MkjJ93jPV4E=", "narHash": "sha256-JnWuQmyanPtF8c5yAEFXVWzaIlMxA3EAZCh8XNvnVqE=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "e91ece6d2cf5a0ae729796b8f0dedceab5107c3d", "rev": "e523e89763ff45f0a6cf15bcb1092636b1da9ed3",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -81,7 +81,7 @@
modules = [ modules = [
self.homeManagerModules self.homeManagerModules
] ++ sharedModules; ] ++ sharedModules;
specialArgs = { extraSpecialArgs = {
inherit inputs; inherit inputs;
}; };
}; };
@ -100,7 +100,7 @@
nixosModules.default = import ./modules/nixos; nixosModules.default = import ./modules/nixos;
homeManagerModules = import ./modules/home-manager; homeManagerModules = import ./modules/home-manager;
homeConfigurations = listToAttrs [ (mkHomeConfiguration "xin" "calcite") ]; homeConfigurations = builtins.listToAttrs [ (mkHomeConfiguration "xin" "calcite") ];
colmenaHive = colmena.lib.makeHive { colmenaHive = colmena.lib.makeHive {
meta = { meta = {
@ -192,7 +192,7 @@
{ {
devShells = { devShells = {
default = pkgs.mkShell { default = pkgs.mkShell {
packages = with pkgs; [ git colmena ]; packages = with pkgs; [ git colmena nix-output-monitor ];
}; };
}; };
} }

View file

@ -28,6 +28,11 @@
networking.hostName = "calcite"; networking.hostName = "calcite";
programs.steam = {
enable = true;
gamescopeSession = { enable = true; };
};
programs.vim.defaultEditor = true; programs.vim.defaultEditor = true;
# Keep this even if enabled in home manager # Keep this even if enabled in home manager
@ -99,7 +104,7 @@
enable = true; enable = true;
wireplumber.enable = true; wireplumber.enable = true;
alsa.enable = true; alsa.enable = true;
#alsa.support32Bit = true; alsa.support32Bit = true;
pulse.enable = true; pulse.enable = true;
# If you want to use JACK applications, uncomment this # If you want to use JACK applications, uncomment this
jack.enable = true; jack.enable = true;
@ -112,6 +117,17 @@
extraGroups = [ "networkmanager" "wheel" "wireshark" "tss" ]; extraGroups = [ "networkmanager" "wheel" "wireshark" "tss" ];
}; };
services.kanidm = {
enableClient = true;
enablePam = true;
clientSettings = {
uri = "https://auth.xinyang.life";
};
unixSettings = {
pam_allowed_login_groups = [ "linux_users" "xin@auth.xinyang.life" "test" ];
};
};
# Enable automatic login for the user. # Enable automatic login for the user.
services.xserver.displayManager.autoLogin.enable = true; services.xserver.displayManager.autoLogin.enable = true;
services.xserver.displayManager.autoLogin.user = "xin"; services.xserver.displayManager.autoLogin.user = "xin";
@ -129,6 +145,7 @@
"openssl-1.1.1w" "openssl-1.1.1w"
# For wechat-uos # For wechat-uos
"electron-19.1.9" "electron-19.1.9"
"electron-25.9.0"
]; ];
# List packages installed in system profile. To search, run: # List packages installed in system profile. To search, run:
# $ nix search wget # $ nix search wget
@ -141,23 +158,10 @@
wineWowPackages.waylandFull wineWowPackages.waylandFull
faudio faudio
# ==== CLI tools ==== #
rust-analyzer
# tesseract5 # ocr # tesseract5 # ocr
ocrmypdf # pdfocr ocrmypdf # pdfocr
grc
sops
git-crypt
# ==== Development ==== # # ==== Development ==== #
# Language server
clang-tools
rnix-lsp
# Python # Python
# reference: https://nixos.wiki/wiki/Python # reference: https://nixos.wiki/wiki/Python
( (
@ -173,37 +177,28 @@
python-with-my-packages python-with-my-packages
) )
# Tex
texlive.combined.scheme-full
# ==== GUI Softwares ==== # # ==== GUI Softwares ==== #
# IDE
jetbrains.jdk # patch jetbrain runtime java
jetbrains.clion
jetbrains.pycharm-professional
jetbrains.idea-ultimate
android-studio
# Gnome tweaks # Gnome tweaks
gnomeExtensions.paperwm gnomeExtensions.paperwm
gnomeExtensions.search-light gnomeExtensions.search-light
gnomeExtensions.tray-icons-reloaded gnomeExtensions.tray-icons-reloaded
gnome.gnome-tweaks gnome.gnome-tweaks
gthumb gthumb
oculante
# Multimedia # Multimedia
vlc vlc
obs-studio obs-studio
spotify spotify
rawtherapee
digikam digikam
# IM # IM
element-desktop element-desktop
tdesktop tdesktop
qq qq
config.nur.repos.xddxdd.wechat-uos
# Password manager # Password manager
bitwarden bitwarden
@ -212,19 +207,16 @@
firefox firefox
chromium chromium
brave brave
microsoft-edge
# Writting # Writting
obsidian obsidian
zotero zotero
wpsoffice
onlyoffice-bin onlyoffice-bin
wpsoffice
config.nur.repos.linyinfeng.wemeet config.nur.repos.linyinfeng.wemeet
virt-manager virt-manager
ghidra
]; ];
system.stateVersion = "22.05"; system.stateVersion = "22.05";
@ -291,9 +283,10 @@
defaultFonts = { defaultFonts = {
serif = [ "Noto Serif CJK SC" "Ubuntu" ]; serif = [ "Noto Serif CJK SC" "Ubuntu" ];
sansSerif = [ "Noto Sans CJK SC" "Ubuntu" ]; sansSerif = [ "Noto Sans CJK SC" "Ubuntu" ];
monospace = [ "FiraCode NerdFont Mono" "Ubuntu" ]; monospace = [ "FiraCode NerdFont Mono" "Noto Sans Mono CJK SC" "Ubuntu" ];
}; };
}; };
enableDefaultPackages = true;
}; };
# Virtualization # Virtualization
virtualisation = { virtualisation = {

View file

@ -23,6 +23,12 @@
fsType = "vfat"; fsType = "vfat";
}; };
fileSystems."/media/data" =
{ device = "/dev/nvme0n1p7";
fsType = "ntfs-3g";
options = [ "rw" "uid=1000" "nofail" "x-systemd.device-timeout=2" ];
};
swapDevices = swapDevices =
[ { device = "/dev/disk/by-label/NIXSWAP"; } [ { device = "/dev/disk/by-label/NIXSWAP"; }
]; ];
@ -41,6 +47,6 @@
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
hardware.opengl = { hardware.opengl = {
enable = true; enable = true;
driSupport32Bit = false; driSupport32Bit = true;
}; };
} }

View file

@ -7,6 +7,7 @@ singbox_jp_server: ENC[AES256_GCM,data:xKTcxkcu1WIsT/wlMpEoqGJK,iv:nXetY339YuOi2
singbox_password: ENC[AES256_GCM,data:0tBIzwtNSQqbGlD+CDnQfJigbFVBChEL,iv:W2HaHeSkvmS6jHSnfOJ6tD2QXuUq1A+mfZf7sEXB++E=,tag:5BtYAv1NO70IL4m/uG8QKA==,type:str] singbox_password: ENC[AES256_GCM,data:0tBIzwtNSQqbGlD+CDnQfJigbFVBChEL,iv:W2HaHeSkvmS6jHSnfOJ6tD2QXuUq1A+mfZf7sEXB++E=,tag:5BtYAv1NO70IL4m/uG8QKA==,type:str]
singbox_uuid: ENC[AES256_GCM,data:ufN+vDl/rDASoQL23tHwlr3ybMyrlC/Kd7bT0c5+SP+bc6Zj,iv:+uwt/N9LpFaJK6MjoczyrZ039MDZn4kRmtEoq4OvdFU=,tag:6Yma9+yrISwQoSRDgUbuwA==,type:str] singbox_uuid: ENC[AES256_GCM,data:ufN+vDl/rDASoQL23tHwlr3ybMyrlC/Kd7bT0c5+SP+bc6Zj,iv:+uwt/N9LpFaJK6MjoczyrZ039MDZn4kRmtEoq4OvdFU=,tag:6Yma9+yrISwQoSRDgUbuwA==,type:str]
grafana_cloud_api: ENC[AES256_GCM,data:Pz+tE09dcJa+ZEWS3vtpOtitGCA9Cg/+gOd/0FsF8ooxzPyN9/UMuTcP02aIPW5v7yZCkGJOAXufIyechNf0crgAV/KmwGGwixH7I+1f3sDtGiFZEMnQgrysyfJo0KIrIZ8XP0SyXDs3vKjDU8cUI4+IyucHacWQ1kWdEtINjcPNHRPS2yaMUIvsRn0z8Cs2byMD3ghUHHHOz40CuO6r4A==,iv:cHvbeCmLFmJPNKsl1BBYx9WJP7ZJWi+8c9yHZWc6FTs=,tag:yWXtPokYE4frCmzzzyEqEg==,type:str] grafana_cloud_api: ENC[AES256_GCM,data:Pz+tE09dcJa+ZEWS3vtpOtitGCA9Cg/+gOd/0FsF8ooxzPyN9/UMuTcP02aIPW5v7yZCkGJOAXufIyechNf0crgAV/KmwGGwixH7I+1f3sDtGiFZEMnQgrysyfJo0KIrIZ8XP0SyXDs3vKjDU8cUI4+IyucHacWQ1kWdEtINjcPNHRPS2yaMUIvsRn0z8Cs2byMD3ghUHHHOz40CuO6r4A==,iv:cHvbeCmLFmJPNKsl1BBYx9WJP7ZJWi+8c9yHZWc6FTs=,tag:yWXtPokYE4frCmzzzyEqEg==,type:str]
private_dns_address: ENC[AES256_GCM,data:m/u3oc+6ef8dLa7Dpu+5T9TTSdXqJjS9ecA+sPj0r8qX06+QgiQnpmEW4w==,iv:8+qG5rQXAKfrykEjt9qrbtyNaBuKvi7EaIWouRqEipY=,tag:XlMccTKL239/NnAprtqYrg==,type:str]
sops: sops:
kms: [] kms: []
gcp_kms: [] gcp_kms: []
@ -67,8 +68,8 @@ sops:
c1E1Sld1ejZhTStKTU5teEJKT2JwVXcKuEQnA6b1WJ+RNqmrZ8t3joiEZ57Oq9M1 c1E1Sld1ejZhTStKTU5teEJKT2JwVXcKuEQnA6b1WJ+RNqmrZ8t3joiEZ57Oq9M1
P4tMGerB12A1myTJlt5Ss2OCTBUV7ooVRNsyPjyvJy/YTyjqZ5xmxg== P4tMGerB12A1myTJlt5Ss2OCTBUV7ooVRNsyPjyvJy/YTyjqZ5xmxg==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2023-12-20T01:34:00Z" lastmodified: "2024-01-07T13:13:50Z"
mac: ENC[AES256_GCM,data:6MLBRPA5g2r3yy/i7DSxjWaYhHH/4GiAqL/pRIvYyIrKQWYvfviWlTX9dqHVzzCXjueEXUM5dXFb2B+Sds68EGgBuBlZvBchtstHUOtMLE3pttC+xCzerQFyrPDrXbnpfdDYPHWxvhhhFpWu8G5RSfzSgkgp7+cx9iZHq/g1k/Q=,iv:8yFIOgHtBiCtbamufrXXHrjIq5DV3MIJbTJPtXlgpPg=,tag:CVOIojTN2KkXJsDVyiZjMQ==,type:str] mac: ENC[AES256_GCM,data:cAc3Wp5KjuaKWv0e2ciPVzvsK2L6BgupYS2+5Vlr+Wn0RBsuLA0OEW2pQbm5hpUJaWO65qQk5IeMvK/h8otYLgGHGzz23NiZTNeAknw6z2mL5y+GgP22mBOMzPU2PtaJKXkt624T1sZzW4QTMo8TqBlzy7D10odyjkVn6Wd+OGE=,iv:zucnHwHjY4DX3jIKuuIGpa2no9svOEordGN0LsPKDuc=,tag:JQZMyBO3yZIW+ZTIKDUPCQ==,type:str]
pgp: [] pgp: []
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.8.1 version: 3.8.1

View file

@ -1,6 +1,7 @@
{ inputs, ... }: { inputs, config, lib, ... }:
{ {
imports = [ inputs.sops-nix.nixosModules.sops ]; imports = [ inputs.sops-nix.nixosModules.sops ];
config = {
sops = { sops = {
defaultSopsFile = ./secrets.yaml; defaultSopsFile = ./secrets.yaml;
# TODO: How to generate this key when bootstrap? # TODO: How to generate this key when bootstrap?
@ -9,9 +10,6 @@
github_public_token = { github_public_token = {
owner = "root"; owner = "root";
}; };
clash_subscription_link = {
owner = "root";
};
singbox_sg_server = { singbox_sg_server = {
owner = "root"; owner = "root";
}; };
@ -24,7 +22,11 @@
singbox_uuid = { singbox_uuid = {
owner = "root"; owner = "root";
}; };
grafana_cloud_api = { private_dns_address = {
owner = "root";
};
};
secrets.grafana_cloud_api = lib.mkIf config.services.prometheus.enable {
owner = "prometheus"; owner = "prometheus";
}; };
}; };

View file

@ -1,4 +1,4 @@
{ config, lib, ... }: { config, pkgs, lib, ... }:
with lib; with lib;
let let
@ -25,7 +25,14 @@ in
resize_increments = true; resize_increments = true;
dynamic_padding = true; dynamic_padding = true;
}; };
import = [
"${config.xdg.configHome}/alacritty/catppuccin-macchiato.yml"
];
}; };
}; };
xdg.configFile."alacritty/catppuccin-macchiato.yml".source = builtins.fetchurl {
url = "https://raw.githubusercontent.com/catppuccin/alacritty/main/catppuccin-macchiato.yml";
sha256 = "sha256-+m8FyPStdh1A1xMVBOkHpfcaFPcyVL99tIxHuDZ2zXI=";
};
}; };
} }

View file

@ -10,7 +10,7 @@ in
enable = mkEnableOption "fish"; enable = mkEnableOption "fish";
plugins = mkOption { plugins = mkOption {
type = types.listOf types.str; type = types.listOf types.str;
default = [ "pisces" "done" "hydro" ]; default = [ "pisces" "done" "hydro" "grc" ];
}; };
functions = { functions = {
enable = mkOption { enable = mkOption {
@ -26,26 +26,27 @@ in
}; };
}; };
config = { config = mkIf cfg.enable {
programs.fish = mkIf cfg.enable { home.packages = [ pkgs.grc ];
programs.fish = {
enable = true; enable = true;
plugins = with pkgs; filter ( plugins = with pkgs; (filter (
e: hasAttr e.name (builtins.listToAttrs # { "xxx" = true; } e: hasAttr e.name (builtins.listToAttrs # { "xxx" = true; }
(map (p: { name = p; value = true; }) cfg.plugins) # { name = "xxx"; value = true; } (map (p: { name = p; value = true; }) cfg.plugins) # { name = "xxx"; value = true; }
)) [ )) [
{ { name = "pisces";
name = "pisces";
src = fishPlugins.pisces.src; src = fishPlugins.pisces.src;
} }
{ { name = "done";
name = "done";
src = fishPlugins.done.src; src = fishPlugins.done.src;
} }
{ { name = "hydro";
name = "hydro";
src = fishPlugins.hydro.src; src = fishPlugins.hydro.src;
} }
]; { name = "grc";
src = fishPlugins.grc.src;
}
]);
interactiveShellInit = let interactiveShellInit = let
extraInit = if cfg.functions.enable then '' extraInit = if cfg.functions.enable then ''
${pkgs.nix-your-shell}/bin/nix-your-shell fish | source ${pkgs.nix-your-shell}/bin/nix-your-shell fish | source
@ -61,7 +62,6 @@ in
end end
'' else ""; '' else "";
in '' in ''
fish_config theme choose 'ayu Dark'
fish_config prompt choose arrow fish_config prompt choose arrow
'' + extraInit; '' + extraInit;
functions = mkIf cfg.functions.enable { functions = mkIf cfg.functions.enable {

View file

@ -25,7 +25,6 @@ in
ms-vscode-remote.remote-ssh ms-vscode-remote.remote-ssh
vscodevim.vim vscodevim.vim
github.vscode-pull-request-github github.vscode-pull-request-github
eamodio.gitlens
gruntfuggly.todo-tree # todo highlight gruntfuggly.todo-tree # todo highlight
# Language support # Language support
@ -35,6 +34,7 @@ in
davidanson.vscode-markdownlint davidanson.vscode-markdownlint
# C/C++ # C/C++
ms-vscode.cmake-tools ms-vscode.cmake-tools
twxs.cmake
llvm-vs-code-extensions.vscode-clangd llvm-vs-code-extensions.vscode-clangd
# Nix # Nix
jnoortheen.nix-ide jnoortheen.nix-ide
@ -43,6 +43,7 @@ in
# Vue # Vue
vue.volar vue.volar
# Scale / chisel # Scale / chisel
scala-lang.scala
scalameta.metals scalameta.metals
sterben.fpga-support sterben.fpga-support
@ -50,6 +51,7 @@ in
ms-vscode-remote.remote-ssh-edit ms-vscode-remote.remote-ssh-edit
mushan.vscode-paste-image mushan.vscode-paste-image
]) ++ (with pkgs.vscode-extensions; [ ]) ++ (with pkgs.vscode-extensions; [
waderyan.gitblame
catppuccin.catppuccin-vsc catppuccin.catppuccin-vsc
# Rust # Rust
rust-lang.rust-analyzer rust-lang.rust-analyzer
@ -140,6 +142,7 @@ in
"editor.wordWrapColumn" = 80; "editor.wordWrapColumn" = 80;
"editor.unicodeHighlight.ambiguousCharacters" = false; "editor.unicodeHighlight.ambiguousCharacters" = false;
}; };
"cmake.configureOnEdit" = false;
}; };
}; };
}; };