nixpkgs-fmt
This commit is contained in:
parent
3924624e75
commit
f422ad701c
11 changed files with 61 additions and 32 deletions
6
flake.lock
generated
6
flake.lock
generated
|
@ -38,11 +38,11 @@
|
|||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1654593855,
|
||||
"narHash": "sha256-c+SyXvj7THre87OyIdZfRVR+HhI/g1ZDrQ3VUtTuHkU=",
|
||||
"lastModified": 1654682581,
|
||||
"narHash": "sha256-Jb1PQCwKgwdNAp907eR5zPzuxV+kRroA3UIxUxCMJ9s=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "033bd4fa9a8fbe0c68a88e925d9a884161044b25",
|
||||
"rev": "e0169d7a9d324afebf5679551407756c77af8930",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
services.fstrim.enable = true;
|
||||
|
||||
boot = {
|
||||
supportedFilesystems = ["btrfs"];
|
||||
supportedFilesystems = [ "btrfs" ];
|
||||
|
||||
# use systemd boot by default
|
||||
loader = {
|
||||
|
@ -62,8 +62,16 @@
|
|||
# Users
|
||||
users.users.grue = {
|
||||
createHome = true;
|
||||
extraGroups = [ "wheel" "networkmanager" "wireshark" "video"
|
||||
"libvirtd" "plugdev" "dialout" "bluetooth" ];
|
||||
extraGroups = [
|
||||
"wheel"
|
||||
"networkmanager"
|
||||
"wireshark"
|
||||
"video"
|
||||
"libvirtd"
|
||||
"plugdev"
|
||||
"dialout"
|
||||
"bluetooth"
|
||||
];
|
||||
group = "users";
|
||||
home = "/home/grue";
|
||||
isNormalUser = true;
|
||||
|
@ -75,6 +83,8 @@
|
|||
package = pkgs.wireshark;
|
||||
};
|
||||
|
||||
|
||||
programs.steam.enable = true;
|
||||
# This value determines the NixOS release from which the default
|
||||
# settings for stateful data, like file locations and database versions
|
||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||
|
|
|
@ -5,7 +5,8 @@
|
|||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
[
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||
|
@ -14,7 +15,8 @@
|
|||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
{
|
||||
device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
fsType = "btrfs";
|
||||
options = [ "subvol=root" "noatime" "compress=zstd" ];
|
||||
};
|
||||
|
@ -22,24 +24,28 @@
|
|||
boot.initrd.luks.devices."nixos-crypt".device = "/dev/disk/by-uuid/dbee4082-85ae-40f0-9c80-034f3574688f";
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/4B02-CE16";
|
||||
{
|
||||
device = "/dev/disk/by-uuid/4B02-CE16";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
fileSystems."/home" =
|
||||
{ device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
{
|
||||
device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
fsType = "btrfs";
|
||||
options = [ "subvol=home" "noatime" "compress=zstd" ];
|
||||
};
|
||||
|
||||
fileSystems."/nix" =
|
||||
{ device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
{
|
||||
device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
fsType = "btrfs";
|
||||
options = [ "subvol=nix" "noatime" "compress=zstd" ];
|
||||
};
|
||||
|
||||
fileSystems."/tmp" =
|
||||
{ device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
{
|
||||
device = "/dev/disk/by-uuid/f9edd500-f47b-42e5-9b88-7b6d86f76caa";
|
||||
fsType = "btrfs";
|
||||
options = [ "subvol=tmp" "noatime" "compress=zstd" ];
|
||||
};
|
||||
|
|
|
@ -62,8 +62,8 @@
|
|||
ls = "exa";
|
||||
ll = "exa -l";
|
||||
l = "exa -al";
|
||||
ssh="TERM=xterm-256color ssh";
|
||||
mutt="neomutt";
|
||||
ssh = "TERM=xterm-256color ssh";
|
||||
mutt = "neomutt";
|
||||
};
|
||||
|
||||
users.defaultUserShell = pkgs.zsh;
|
||||
|
@ -76,9 +76,9 @@
|
|||
'';
|
||||
promptInit = ''
|
||||
source /run/current-system/sw/share/zsh/plugins/liquidprompt/liquidprompt
|
||||
if [[ -n "$IN_NIX_SHELL" ]]; then
|
||||
if [[ -n "$IN_NIX_SHELL" ]]; then
|
||||
prompt_tag "(nix-shell)"
|
||||
fi
|
||||
fi
|
||||
'';
|
||||
};
|
||||
|
||||
|
|
|
@ -1,5 +1,9 @@
|
|||
{ pkgs, lib, ... }: {
|
||||
nix = {
|
||||
extraOptions = ''
|
||||
builders-use-substitutes = true
|
||||
'';
|
||||
|
||||
registry.microvm = {
|
||||
from = {
|
||||
type = "indirect";
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{config, pkgs, ... }:
|
||||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
systemd.automounts = [{
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
requires = [ "wg-quick-wg-dvb.service" ];
|
||||
automountConfig= {
|
||||
automountConfig = {
|
||||
TimeoutIdleSec = "600";
|
||||
};
|
||||
where = "/mnt/dvb";
|
||||
|
|
3
modules/entertainment.nix
Normal file
3
modules/entertainment.nix
Normal file
|
@ -0,0 +1,3 @@
|
|||
{ pkgs, ... }
|
||||
{
|
||||
}
|
|
@ -133,5 +133,11 @@
|
|||
programs.bash.vteIntegration = true;
|
||||
services.upower.enable = true;
|
||||
|
||||
services.udisks2.enable = true;
|
||||
environment.shellAliases = {
|
||||
mnt = "udisksctl mount -b";
|
||||
umnt = "udisksctl unmount -b";
|
||||
};
|
||||
|
||||
qt5.platformTheme = "gnome";
|
||||
}
|
||||
|
|
|
@ -3,10 +3,10 @@
|
|||
{
|
||||
powerManagement.cpuFreqGovernor = null;
|
||||
services.power-profiles-daemon.enable = false;
|
||||
services.tlp ={
|
||||
services.tlp = {
|
||||
enable = true;
|
||||
settings = {
|
||||
USB_BLACKLIST="1d50:604b 1d50:6089 1d50:cc15 1fc9:000c";
|
||||
USB_BLACKLIST = "1d50:604b 1d50:6089 1d50:cc15 1fc9:000c";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -3,8 +3,8 @@
|
|||
{
|
||||
networking.wg-quick.interfaces = {
|
||||
wg-zw = {
|
||||
privateKeyFile=config.sops.secrets."wg/wg-zw-seckey".path;
|
||||
address = ["172.20.76.226" ];
|
||||
privateKeyFile = config.sops.secrets."wg/wg-zw-seckey".path;
|
||||
address = [ "172.20.76.226" ];
|
||||
dns = [ "172.20.73.8" ];
|
||||
peers = [
|
||||
{
|
||||
|
@ -15,7 +15,7 @@
|
|||
];
|
||||
};
|
||||
wg-dvb = {
|
||||
privateKeyFile=config.sops.secrets."wg/wg-dvb-seckey".path;
|
||||
privateKeyFile = config.sops.secrets."wg/wg-dvb-seckey".path;
|
||||
address = [ "10.13.37.3/32" ];
|
||||
|
||||
peers = [
|
||||
|
@ -29,11 +29,11 @@
|
|||
};
|
||||
|
||||
mlwd-nl = {
|
||||
privateKeyFile=config.sops.secrets."wg/mlwd-nl-seckey".path;
|
||||
privateKeyFile = config.sops.secrets."wg/mlwd-nl-seckey".path;
|
||||
address = [ "10.65.79.164/32" "fc00:bbbb:bbbb:bb01::2:4fa3/128" ];
|
||||
dns = [ "193.138.218.74" ];
|
||||
|
||||
peers = [ {
|
||||
peers = [{
|
||||
publicKey = "StMPmol1+QQQQCJyAkm7t+l/QYTKe5CzXUhw0I6VX14=";
|
||||
allowedIPs = [ "0.0.0.0/0" "::0/0" ];
|
||||
endpoint = "92.60.40.194:51820";
|
||||
|
|
Loading…
Add table
Reference in a new issue