13 Commits

Author SHA1 Message Date
Daniel Olsen
5943dbccbc soryu: enable usb redirection 2024-12-07 02:48:05 +01:00
Daniel Olsen
c62872d94c osu bin 2024-12-07 02:47:35 +01:00
Daniel Olsen
ddc6897d80 update to 24.11 2024-12-07 02:47:16 +01:00
Daniel Olsen
44d9a9aa84 flake lock 2024-12-05 18:48:14 +01:00
Daniel Olsen
5b374ef972 soryu: more swap 2024-12-05 18:47:44 +01:00
Daniel Olsen
0fc6034632 home/base: fix ssh to pvv 2024-12-05 18:47:05 +01:00
Daniel Olsen
1243f93092 expose the set of overlays I use again 2024-11-01 12:20:53 +01:00
Daniel Olsen
7b85076c99 install wack tool 2024-11-01 10:20:53 +01:00
Daniel Olsen
da23016c32 ayanami: Add to repo 2024-10-21 04:46:57 +02:00
Daniel Olsen
caa71a5fb8 update flake.lock 2024-10-21 03:09:27 +02:00
Daniel Olsen
6f5c107301 enable activitywatch 2024-10-21 03:03:52 +02:00
Daniel Olsen
fd775a7765 enable nix-direnv 2024-10-21 03:03:52 +02:00
Daniel Olsen
22ba543e74 soryu: add more ram 2024-10-11 04:22:36 +02:00
10 changed files with 807 additions and 66 deletions

439
flake.lock generated
View File

@@ -42,17 +42,74 @@
"url": "https://git.dodsorf.as/Dandellion/NUR.git" "url": "https://git.dodsorf.as/Dandellion/NUR.git"
} }
}, },
"dan_3": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf",
"dandellion",
"unstable"
]
},
"locked": {
"lastModified": 1656687988,
"narHash": "sha256-2ywoy3wUvFAyxDTw7VPlz5TGh9mk/um2AWOjhJqJxNQ=",
"ref": "refs/heads/master",
"rev": "7e85f62e40cd585ce81fa1f3debd5385bb0cad03",
"revCount": 160,
"type": "git",
"url": "https://git.dodsorf.as/Dandellion/NUR.git"
},
"original": {
"type": "git",
"url": "https://git.dodsorf.as/Dandellion/NUR.git"
}
},
"dandellion": { "dandellion": {
"inputs": { "inputs": {
"dan": "dan_2", "dan": "dan_2",
"greg-clients": "greg-clients_2",
"home-manager": "home-manager_2", "home-manager": "home-manager_2",
"nixgl": "nixgl_2", "nixgl": "nixgl_2",
"nixos-hardware": "nixos-hardware_2",
"nixpkgs": [ "nixpkgs": [
"wack-server-conf", "wack-server-conf",
"nixpkgs" "nixpkgs"
], ],
"nur": "nur_2", "nur": "nur_2",
"unstable": "unstable_2" "unstable": "unstable_2",
"wack-ctf": "wack-ctf_2",
"wack-server-conf": "wack-server-conf_2"
},
"locked": {
"lastModified": 1730452853,
"narHash": "sha256-rTdzP+D3Xu0ld2aThcih7G0Qnvbi01Tx9aFPGS+sE2k=",
"ref": "master",
"rev": "7b85076c992eba955038f180d51b563c967175b7",
"revCount": 266,
"type": "git",
"url": "https://git.dodsorf.as/Dandellion/dotfiles.git"
},
"original": {
"ref": "master",
"type": "git",
"url": "https://git.dodsorf.as/Dandellion/dotfiles.git"
}
},
"dandellion_2": {
"inputs": {
"dan": "dan_3",
"home-manager": "home-manager_3",
"nixgl": "nixgl_3",
"nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf",
"nixpkgs"
],
"nur": "nur_3",
"unstable": "unstable_3"
}, },
"locked": { "locked": {
"lastModified": 1699137267, "lastModified": 1699137267,
@@ -99,6 +156,21 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils_3": {
"locked": {
"lastModified": 1659877975,
"narHash": "sha256-zllb8aq3YO3h8B/U0/J1WBgAL8EX5yWf5pMj3G0NAmc=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "c0e246b9b83f637f4681389ecabcb2681b4f3af0",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"greg-clients": { "greg-clients": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@@ -106,11 +178,33 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1722885417, "lastModified": 1726861934,
"narHash": "sha256-QTkl20cFfb5qWs8CN0HfsIp/67+N8pTTLfVaeu/i398=", "narHash": "sha256-lOzPDwktd+pwszUTbpUdQg6iCzInS11fHLfkjmnvJrM=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "cb292a56b1aa6fa0f220f91d8106fd978fe1e13a", "rev": "546d921ec46735dbf876e36f4af8df1064d09432",
"revCount": 77, "revCount": 78,
"type": "git",
"url": "https://git.pvv.ntnu.no/Projects/grzegorz-clients"
},
"original": {
"type": "git",
"url": "https://git.pvv.ntnu.no/Projects/grzegorz-clients"
}
},
"greg-clients_2": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"dandellion",
"unstable"
]
},
"locked": {
"lastModified": 1726861934,
"narHash": "sha256-lOzPDwktd+pwszUTbpUdQg6iCzInS11fHLfkjmnvJrM=",
"ref": "refs/heads/master",
"rev": "546d921ec46735dbf876e36f4af8df1064d09432",
"revCount": 78,
"type": "git", "type": "git",
"url": "https://git.pvv.ntnu.no/Projects/grzegorz-clients" "url": "https://git.pvv.ntnu.no/Projects/grzegorz-clients"
}, },
@@ -126,11 +220,34 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1720042825, "lastModified": 1733050161,
"narHash": "sha256-A0vrUB6x82/jvf17qPCpxaM+ulJnD8YZwH9Ci0BsAzE=", "narHash": "sha256-lYnT+EYE47f5yY3KS/Kd4pJ6CO9fhCqumkYYkQ3TK20=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "e1391fb22e18a36f57e6999c7a9f966dc80ac073", "rev": "62d536255879be574ebfe9b87c4ac194febf47c5",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-24.11",
"repo": "home-manager",
"type": "github"
}
},
"home-manager_2": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"dandellion",
"nixpkgs"
]
},
"locked": {
"lastModified": 1726989464,
"narHash": "sha256-Vl+WVTJwutXkimwGprnEtXc/s/s8sMuXzqXaspIGlwM=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "2f23fa308a7c067e52dfcc30a0758f47043ec176",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -140,9 +257,11 @@
"type": "github" "type": "github"
} }
}, },
"home-manager_2": { "home-manager_3": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf", "wack-server-conf",
"dandellion", "dandellion",
"nixpkgs" "nixpkgs"
@@ -163,9 +282,11 @@
"type": "github" "type": "github"
} }
}, },
"home-manager_3": { "home-manager_4": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf", "wack-server-conf",
"nixpkgs" "nixpkgs"
] ]
@@ -185,6 +306,28 @@
"type": "github" "type": "github"
} }
}, },
"home-manager_5": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"nixpkgs"
]
},
"locked": {
"lastModified": 1726989464,
"narHash": "sha256-Vl+WVTJwutXkimwGprnEtXc/s/s8sMuXzqXaspIGlwM=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "2f23fa308a7c067e52dfcc30a0758f47043ec176",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-24.05",
"repo": "home-manager",
"type": "github"
}
},
"nixgl": { "nixgl": {
"inputs": { "inputs": {
"flake-utils": "flake-utils", "flake-utils": "flake-utils",
@@ -215,6 +358,31 @@
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": {
"lastModified": 1713543440,
"narHash": "sha256-lnzZQYG0+EXl/6NkGpyIz+FEOc/DSEG57AP1VsdeNrM=",
"owner": "guibou",
"repo": "nixGL",
"rev": "310f8e49a149e4c9ea52f1adf70cdc768ec53f8a",
"type": "github"
},
"original": {
"owner": "guibou",
"repo": "nixGL",
"type": "github"
}
},
"nixgl_3": {
"inputs": {
"flake-utils": "flake-utils_3",
"nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf",
"dandellion",
"nixpkgs"
]
},
"locked": { "locked": {
"lastModified": 1685908677, "lastModified": 1685908677,
"narHash": "sha256-E4zUPEUFyVWjVm45zICaHRpfGepfkE9Z2OECV9HXfA4=", "narHash": "sha256-E4zUPEUFyVWjVm45zICaHRpfGepfkE9Z2OECV9HXfA4=",
@@ -229,18 +397,50 @@
"type": "github" "type": "github"
} }
}, },
"nixos-hardware": {
"locked": {
"lastModified": 1733217105,
"narHash": "sha256-fc6jTzIwCIVWTX50FtW6AZpuukuQWSEbPiyg6ZRGWFY=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "cceee0a31d2f01bcc98b2fbd591327c06a4ea4f9",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "master",
"repo": "nixos-hardware",
"type": "github"
}
},
"nixos-hardware_2": {
"locked": {
"lastModified": 1730368399,
"narHash": "sha256-F8vJtG389i9fp3k2/UDYHMed3PLCJYfxCqwiVP7b9ig=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "da14839ac5f38ee6adbdb4e6db09b5eef6d6ccdc",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "master",
"repo": "nixos-hardware",
"type": "github"
}
},
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1723688146, "lastModified": 1733261153,
"narHash": "sha256-sqLwJcHYeWLOeP/XoLwAtYjr01TISlkOfz+NG82pbdg=", "narHash": "sha256-eq51hyiaIwtWo19fPEeE0Zr2s83DYMKJoukNLgGGpek=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "c3d4ac725177c030b1e289015989da2ad9d56af0", "rev": "b681065d0919f7eb5309a93cea2cfa84dec9aa88",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "nixos-24.05", "ref": "nixos-24.11",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@@ -261,13 +461,59 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-stable_2": {
"locked": {
"lastModified": 1729973466,
"narHash": "sha256-knnVBGfTCZlQgxY1SgH0vn2OyehH9ykfF8geZgS95bk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "cd3e8833d70618c4eea8df06f95b364b016d4950",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "release-24.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1699099776,
"narHash": "sha256-X09iKJ27mGsGambGfkKzqvw5esP1L/Rf8H3u3fCqIiU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "85f1ba3e51676fa8cc604a3d863d729026a6b8eb",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-unstable",
"type": "indirect"
}
},
"nixpkgs-unstable_2": {
"locked": {
"lastModified": 1699099776,
"narHash": "sha256-X09iKJ27mGsGambGfkKzqvw5esP1L/Rf8H3u3fCqIiU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "85f1ba3e51676fa8cc604a3d863d729026a6b8eb",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-unstable",
"type": "indirect"
}
},
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1723859387, "lastModified": 1733417713,
"narHash": "sha256-1a4zDw0wIH/7Yg0tvIusrkBAZlcQkpQBkqZtPYnBsCw=", "narHash": "sha256-/3foD2ePFtms/swS2J77CbAepo1nQ4CHlRBpj1IR8t0=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "b43ecc46a848d0107b17091e2cd74cb442e28885", "rev": "6e671d63e6b1e29f31781b8dfef69b147b69ab77",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -277,6 +523,21 @@
} }
}, },
"nur_2": { "nur_2": {
"locked": {
"lastModified": 1730450711,
"narHash": "sha256-quBA0X4kODNac/4ZF/urYD99PFC789rDC4Vi8ASKn6s=",
"owner": "nix-community",
"repo": "NUR",
"rev": "1c95a10940bc0ce0d6b28dd092a3d6a1c45555cb",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "NUR",
"type": "github"
}
},
"nur_3": {
"locked": { "locked": {
"lastModified": 1699131694, "lastModified": 1699131694,
"narHash": "sha256-dKWORPD0ODREKihqCZqEqc1zJ3wACmoMmuf2BGg3DbE=", "narHash": "sha256-dKWORPD0ODREKihqCZqEqc1zJ3wACmoMmuf2BGg3DbE=",
@@ -297,15 +558,19 @@
"greg-clients": "greg-clients", "greg-clients": "greg-clients",
"home-manager": "home-manager", "home-manager": "home-manager",
"nixgl": "nixgl", "nixgl": "nixgl",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nur": "nur", "nur": "nur",
"unstable": "unstable", "unstable": "unstable",
"wack-ctf": "wack-ctf",
"wack-server-conf": "wack-server-conf" "wack-server-conf": "wack-server-conf"
} }
}, },
"sops-nix": { "sops-nix": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"wack-server-conf",
"dandellion",
"wack-server-conf", "wack-server-conf",
"nixpkgs" "nixpkgs"
], ],
@@ -325,13 +590,35 @@
"type": "github" "type": "github"
} }
}, },
"sops-nix_2": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"nixpkgs"
],
"nixpkgs-stable": "nixpkgs-stable_2"
},
"locked": {
"lastModified": 1729999681,
"narHash": "sha256-qm0uCtM9bg97LeJTKQ8dqV/FvqRN+ompyW4GIJruLuw=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "1666d16426abe79af5c47b7c0efa82fd31bf4c56",
"type": "github"
},
"original": {
"owner": "Mic92",
"repo": "sops-nix",
"type": "github"
}
},
"unstable": { "unstable": {
"locked": { "locked": {
"lastModified": 1723703277, "lastModified": 1733229606,
"narHash": "sha256-nk0RaUB5f68BwtXAYy3WAjqFhVKqIl9Z89RGycTa2vk=", "narHash": "sha256-FLYY5M0rpa5C2QAE3CKLYAM6TwbKicdRK6qNrSHlNrE=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "8b908192e64224420e2d59dfd9b2e4309e154c5d", "rev": "566e53c2ad750c84f6d31f9ccb9d00f823165550",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -342,6 +629,22 @@
} }
}, },
"unstable_2": { "unstable_2": {
"locked": {
"lastModified": 1730272153,
"narHash": "sha256-B5WRZYsRlJgwVHIV6DvidFN7VX7Fg9uuwkRW9Ha8z+w=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "2d2a9ddbe3f2c00747398f3dc9b05f7f2ebb0f53",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"unstable_3": {
"locked": { "locked": {
"lastModified": 1699094435, "lastModified": 1699094435,
"narHash": "sha256-YLZ5/KKZ1PyLrm2MO8UxRe4H3M0/oaYqNhSlq6FDeeA=", "narHash": "sha256-YLZ5/KKZ1PyLrm2MO8UxRe4H3M0/oaYqNhSlq6FDeeA=",
@@ -357,7 +660,7 @@
"type": "github" "type": "github"
} }
}, },
"unstable_3": { "unstable_4": {
"locked": { "locked": {
"lastModified": 1698924604, "lastModified": 1698924604,
"narHash": "sha256-GCFbkl2tj8fEZBZCw3Tc0AkGo0v+YrQlohhEGJ/X4s0=", "narHash": "sha256-GCFbkl2tj8fEZBZCw3Tc0AkGo0v+YrQlohhEGJ/X4s0=",
@@ -373,15 +676,101 @@
"type": "github" "type": "github"
} }
}, },
"wack-server-conf": { "unstable_5": {
"locked": {
"lastModified": 1730200266,
"narHash": "sha256-l253w0XMT8nWHGXuXqyiIC/bMvh1VRszGXgdpQlfhvU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "807e9154dcb16384b1b765ebe9cd2bba2ac287fd",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"wack-ctf": {
"inputs": { "inputs": {
"dandellion": "dandellion",
"home-manager": "home-manager_3",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ],
"nixpkgs-unstable": "nixpkgs-unstable"
},
"locked": {
"lastModified": 1730403744,
"narHash": "sha256-SSMFSlxl96mOYAFl/mzwmsmokTAglRhRqWIMCR5NPa0=",
"owner": "WackAttackCTF",
"repo": "wack-ctf-flake",
"rev": "0e9aa8f5962b90a5516ef6de4d0f1abdcc67f7d5",
"type": "github"
},
"original": {
"owner": "WackAttackCTF",
"repo": "wack-ctf-flake",
"type": "github"
}
},
"wack-ctf_2": {
"inputs": {
"nixpkgs": [
"wack-server-conf",
"dandellion",
"nixpkgs"
],
"nixpkgs-unstable": "nixpkgs-unstable_2"
},
"locked": {
"lastModified": 1730344946,
"narHash": "sha256-oc/0nVxNfOp+tIOj0F1SVvYVzFGFO3geKpDsD2cAGbE=",
"owner": "WackAttackCTF",
"repo": "wack-ctf-flake",
"rev": "7128fa8b1f7ae284ae093b5fc80df0da788efa6f",
"type": "github"
},
"original": {
"owner": "WackAttackCTF",
"repo": "wack-ctf-flake",
"type": "github"
}
},
"wack-server-conf": {
"inputs": {
"dandellion": "dandellion",
"home-manager": "home-manager_5",
"nixpkgs": [
"nixpkgs"
],
"sops-nix": "sops-nix_2",
"unstable": "unstable_5"
},
"locked": {
"lastModified": 1730460041,
"narHash": "sha256-03CwZdZVD4yLvi3wtbnyk6Ual3toeb4lQGfAVWlEEEY=",
"owner": "WackAttackCTF",
"repo": "wack-server-conf",
"rev": "aaf2f1dbf97d951d94b543a2518fa71ddc2d4296",
"type": "github"
},
"original": {
"owner": "WackAttackCTF",
"repo": "wack-server-conf",
"type": "github"
}
},
"wack-server-conf_2": {
"inputs": {
"dandellion": "dandellion_2",
"home-manager": "home-manager_4",
"nixpkgs": [
"wack-server-conf",
"dandellion",
"nixpkgs"
],
"sops-nix": "sops-nix", "sops-nix": "sops-nix",
"unstable": "unstable_3" "unstable": "unstable_4"
}, },
"locked": { "locked": {
"lastModified": 1699656973, "lastModified": 1699656973,

View File

@@ -5,13 +5,15 @@
# nixConfig.exta-trusted-public-keys = "cache.dodsorf.as:FYKGadXTyI2ax8mirBTOjEqS/8PZKAWxiJVOBjESQXc="; # nixConfig.exta-trusted-public-keys = "cache.dodsorf.as:FYKGadXTyI2ax8mirBTOjEqS/8PZKAWxiJVOBjESQXc=";
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05"; nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11";
home-manager.url = "github:nix-community/home-manager/release-24.05"; home-manager.url = "github:nix-community/home-manager/release-24.11";
home-manager.inputs.nixpkgs.follows = "nixpkgs"; home-manager.inputs.nixpkgs.follows = "nixpkgs";
unstable.url = "github:nixos/nixpkgs/nixpkgs-unstable"; unstable.url = "github:nixos/nixpkgs/nixpkgs-unstable";
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
nur.url = "github:nix-community/NUR"; nur.url = "github:nix-community/NUR";
dan.url = "git+https://git.dodsorf.as/Dandellion/NUR.git"; #"git+https://git.dodsorf.as/Dandellion/NUR"; dan.url = "git+https://git.dodsorf.as/Dandellion/NUR.git"; #"git+https://git.dodsorf.as/Dandellion/NUR";
@@ -20,6 +22,9 @@
wack-server-conf.url = "github:WackAttackCTF/wack-server-conf"; wack-server-conf.url = "github:WackAttackCTF/wack-server-conf";
wack-server-conf.inputs.nixpkgs.follows = "nixpkgs"; wack-server-conf.inputs.nixpkgs.follows = "nixpkgs";
wack-ctf.url = "github:WackAttackCTF/wack-ctf-flake";
wack-ctf.inputs.nixpkgs.follows = "nixpkgs";
greg-clients.url = "git+https://git.pvv.ntnu.no/Projects/grzegorz-clients"; greg-clients.url = "git+https://git.pvv.ntnu.no/Projects/grzegorz-clients";
greg-clients.inputs.nixpkgs.follows = "unstable"; greg-clients.inputs.nixpkgs.follows = "unstable";
@@ -30,10 +35,25 @@
nixgl.inputs.nixpkgs.follows = "nixpkgs"; nixgl.inputs.nixpkgs.follows = "nixpkgs";
}; };
outputs = {self, nixpkgs, home-manager, unstable, nur, dan, nixgl, ... }@inputs: outputs = {self, nixpkgs, home-manager, unstable, nixos-hardware, nur, dan, nixgl, ... }@inputs:
let let
nixlib = unstable.lib; nixlib = unstable.lib;
defaultOverlays = [
(final: prev: {
unstable = import unstable {
inherit (prev) system config;
};
dan = dan.packages.${prev.system};
grzegorz-clients = inputs.greg-clients.packages.${prev.system}.grzegorz-clients;
gregctl = inputs.greg-clients.packages.${prev.system}.grzegorzctl;
# helix = inputs.helix.packages.${prev.system}.helix;
wack = inputs.wack-ctf.packages.${prev.system}.wack;
})
nur.overlay
nixgl.overlay
];
mkHome = mkHome =
{ machine { machine
, configuration ? self.nixosModules.home-manager.${machine} , configuration ? self.nixosModules.home-manager.${machine}
@@ -41,7 +61,7 @@
, username ? "daniel" , username ? "daniel"
, homeDirectory ? "/home/${username}" , homeDirectory ? "/home/${username}"
, stateVersion ? "22.05" , stateVersion ? "22.05"
, extraSpecialArgs ? { inherit (self) overlays; } , extraSpecialArgs ? { overlays = defaultOverlays; }
}: }:
home-manager.lib.homeManagerConfiguration { home-manager.lib.homeManagerConfiguration {
pkgs = nixpkgs.legacyPackages.${system}; pkgs = nixpkgs.legacyPackages.${system};
@@ -67,6 +87,17 @@
// mkHomes [ "pvv-terminal" ] { username = "danio"; homeDirectory = "/home/pvv/d/danio"; }; // mkHomes [ "pvv-terminal" ] { username = "danio"; homeDirectory = "/home/pvv/d/danio"; };
nixosConfigurations = { nixosConfigurations = {
ayanami = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = {
inherit inputs;
};
modules = [
./hosts/ayanami/configuration.nix
nixos-hardware.nixosModules.lenovo-thinkpad-l480
];
};
soryu = nixpkgs.lib.nixosSystem { soryu = nixpkgs.lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
specialArgs = { specialArgs = {
@@ -82,30 +113,18 @@
home-manager = nixlib.genAttrs allMachines (machine: import ./home/machines/${machine}.nix); home-manager = nixlib.genAttrs allMachines (machine: import ./home/machines/${machine}.nix);
}; };
overlays = [
(final: prev: {
unstable = import unstable {
inherit (prev) system config;
};
dan = dan.packages.${prev.system};
grzegorz-clients = inputs.greg-clients.packages.${prev.system}.grzegorz-clients;
gregctl = inputs.greg-clients.packages.${prev.system}.grzegorzctl;
# helix = inputs.helix.packages.${prev.system}.helix;
})
nur.overlay
nixgl.overlay
];
homeActivations = nixlib.genAttrs allMachines (machine: self.homeConfigurations.${machine}.activationPackage); homeActivations = nixlib.genAttrs allMachines (machine: self.homeConfigurations.${machine}.activationPackage);
apps.x86_64-linux = nixlib.genAttrs allMachines (machine: { apps.x86_64-linux = nixlib.genAttrs allMachines (machine: {
type = "app"; type = "app";
program = "${self.homeActivations.${machine}}/activate"; program = "${self.homeActivations.${machine}}/activate";
}); });
inherit defaultOverlays;
hydraJobs = { # hydraJobs = {
laptop.x86_64-linux = self.homeActivations.laptop; # laptop.x86_64-linux = self.homeActivations.laptop;
desktop.x86_64-linux = self.homeActivations.desktop; # desktop.x86_64-linux = self.homeActivations.desktop;
}; # };
}; };
} }

View File

@@ -21,6 +21,6 @@
profiles.games.enable = true; profiles.games.enable = true;
home.packages = [ home.packages = [
pkgs.unstable.osu-lazer pkgs.unstable.osu-lazer-bin
]; ];
} }

View File

@@ -24,5 +24,25 @@
duskTime = "21:30-22:30"; duskTime = "21:30-22:30";
}; };
services.activitywatch = {
enable = true;
watchers = {
aw-watcher-afk = {
package = pkgs.activitywatch;
settings = {
timeout = 300;
poll_time = 2;
};
};
aw-watcher-window = {
package = pkgs.activitywatch;
settings = {
poll_time = 1;
# exclude_title = true;
};
};
};
};
profiles.games.enable = true; profiles.games.enable = true;
} }

View File

@@ -81,12 +81,13 @@ in
ripgrep ripgrep
gregctl gregctl
wack
] ++ lib.optionals cfg.plus [ ] ++ lib.optionals cfg.plus [
ffmpeg-full ffmpeg-full
] ++ lib.optionals config.profiles.gui.enable [ ] ++ lib.optionals config.profiles.gui.enable [
mpv mpv
sxiv sxiv
gnome3.eog eog
dolphin dolphin
plasma5Packages.dolphin-plugins plasma5Packages.dolphin-plugins
@@ -204,7 +205,7 @@ in
extensions = with pkgs.vscode-extensions; [ extensions = with pkgs.vscode-extensions; [
bbenoist.nix bbenoist.nix
matklad.rust-analyzer rust-lang.rust-analyzer
vadimcn.vscode-lldb vadimcn.vscode-lldb
] ++ lib.optionals config.nixpkgs.config.allowUnfree [ ] ++ lib.optionals config.nixpkgs.config.allowUnfree [
ms-vsliveshare.vsliveshare ms-vsliveshare.vsliveshare
@@ -261,27 +262,32 @@ in
enable = true; enable = true;
matchBlocks = { matchBlocks = {
"lilith" = { "lilith" = {
hostname = "lilith.daniel"; hostname = "lilith.tn.dodsorf.as";
user = "dandellion"; user = "dandellion";
}; };
"desktop" = { "desktop" = {
hostname = "desktop.daniel"; hostname = "soryu.tn.dodsorf.as";
user = "dan"; user = "dan";
}; };
"ubuntu-ai" = { "ubuntu-ai" = {
hostname = "100.64.0.2"; hostname = "soryu.tn.dodsorf.as";
port = 2222; port = 2222;
user = "daniel"; user = "daniel";
}; };
"laptop" = { "laptop" = {
hostname = "laptop.daniel"; hostname = "ayanami.tn.dodsorf.as";
user = "daniel"; user = "daniel";
}; };
"login.pvv.ntnu.no" = {
user = "danio";
};
"pvv.ntnu.no" = { "pvv.ntnu.no" = {
user = "danio"; user = "danio";
proxyJump = "login.pvv.ntnu.no";
}; };
"*.pvv.ntnu.no" = { "*.pvv.ntnu.no !login.pvv.ntnu.no" = {
user = "danio"; user = "danio";
proxyJump = "login.pvv.ntnu.no";
}; };
"pascal" = { "pascal" = {
hostname = "wiki.wackattack.eu"; hostname = "wiki.wackattack.eu";

View File

@@ -67,6 +67,7 @@ in
programs.direnv = { programs.direnv = {
enable = true; enable = true;
nix-direnv.enable = true;
}; };
programs.atuin = { programs.atuin = {

View File

@@ -0,0 +1,241 @@
#n Edit this configuration file to define what should be installed on your system.
# Help is available in the configuration.nix(5) man page and in the NixOS manual
# (accessible by running nixos-help).
{ config, pkgs, ... }:
{
imports =
[
./hardware-configuration.nix
];
networking.hosts = {
# "10.10.111.103" = [ "snowbell.htb" "legacy.snowbell.htb" "management.snowbell.htb" ];
};
boot.binfmt.emulatedSystems = [ "aarch64-linux" ];
virtualisation.podman.enable = true;
virtualisation.libvirtd.enable = true;
programs.dconf.enable = true;
programs.wireshark.enable = true;
programs.wireshark.package = pkgs.wireshark;
# services.mysql.enable = true;
# services.mysql.package = pkgs.mariadb;
# services.mysql.settings.mysqld = {
# bind-address = "127.0.0.1";
# port = 3306;
# };
# services.mysql.ensureUsers = [
# {
# name = "daniel";
# ensurePermissions = {
# "lab1.*" = "ALL PRIVILEGES";
# "lab2.*" = "ALL PRIVILEGES";
# "lab3.*" = "ALL PRIVILEGES";
# "lab4.*" = "ALL PRIVILEGES";
# "lab5.*" = "ALL PRIVILEGES";
# };
# }
# ];
# services.create_ap.enable = false;
# services.create_ap.settings = {
# INTERNET_IFACE = "enp0s31f6";
# PASSPHRASE = "12345678";
# SSID = "DOTA2ERBEST";
# WIFI_IFACE = "wlp5s0";
# MAC_FILTER = 0;
# HIDDEN = 0;
# };
boot.kernelModules = [ "v4l2loopback" ];
# Use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
networking.hostName = "ayanami"; # Define your hostname.
networking.networkmanager.enable = true;
hardware.bluetooth.enable = true;
services.blueman.enable = true;
# Set your time zone.
time.timeZone = "Europe/Oslo";
services.tailscale.enable = true;
# The global useDHCP flag is deprecated, therefore explicitly set to false here.
# Per-interface useDHCP will be mandatory in the future, so this generated config
# replicates the default behaviour.
networking.useDHCP = false;
networking.interfaces.enp0s31f6.useDHCP = false;
networking.interfaces.wlp5s0.useDHCP = false;
services.avahi.enable = false;
# services.atftpd = {
# enable = false;
# };
# Select internationalisation properties.
i18n.supportedLocales = [ "en_US.UTF-8/UTF-8" "nb_NO.UTF-8/UTF-8" ];
i18n.defaultLocale = "en_US.UTF-8";
i18n.extraLocaleSettings = {
LC_TIME = "nb_NO.UTF-8";
LC_PAPER = "nb_NO.UTF-8";
LC_NAME = "nb_NO.UTF-8";
LC_ADDRESS = "nb_NO.UTF-8";
LC_TELEPHONE = "nb_NO.UTF-8";
LC_MEASUREMENT = "nb_NO.UTF-8";
LC_IDENTIFICATION = "nb_NO.UTF-8";
};
console = {
font = "Lat2-Terminus16";
keyMap = "no-latin1";
};
services.xserver.displayManager.lightdm.enable = true;
services.displayManager.defaultSession = "xsession";
# Enable the X11 windowing system.
services.xserver.enable = true;
services.xserver.displayManager = {
session = [
{
manage = "desktop";
name = "xsession";
start = "exec $HOME/.xsession";
}
];
};
# Disable cups we will just not print anything :))
services.printing.enable = false;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
jack.enable = true;
};
hardware.opengl.driSupport32Bit = true;
hardware.opengl.extraPackages = with pkgs; [ libva ];
# Enable touchpad support (enabled default in most desktopManager).
services.libinput.enable = true;
services.xserver.xkb.layout = "no";
programs.zsh.enable = true;
# Define a user account. Don't forget to set a password with passwd.
users.users.daniel = {
isNormalUser = true;
shell = pkgs.zsh;
extraGroups = [ "wheel" "networkmanager" "wireshark" "libvirtd" ];
};
environment.systemPackages = with pkgs; [
vim
git
wget
virt-manager
podman-compose
];
services.dbus.packages = with pkgs; [ pkgs.dconf ];
services.openssh.enable = true;
services.openssh.openFirewall = false;
networking.firewall.interfaces."tailscale0" = let
all = { from = 0; to = 65535; };
in {
allowedUDPPortRanges = [ all ];
allowedTCPPortRanges = [ all ];
};
# Open ports in the firewall.
networking.firewall.allowedTCPPorts = [ 69 8010 9090 ];
networking.firewall.allowedUDPPorts = [ 69 8010 9090 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
nix.settings.trusted-users = [ "daniel" ];
nix.buildMachines = [
# { hostName = "bob.pvv.ntnu.no";
# system = "x86_64-linux";
# maxJobs = 12;
# supportedFeatures = [ "big-parallel" ];
# speedFactor = 129270;
# }
{ hostName = "bolle.pbsds.net";
system = "x86_64-linux";
maxJobs = 6;
speedFactor = 12857;
}
{ hostName = "garp.pbsds.net";
system = "x86_64-linux";
maxJobs = 4;
# i7-6700
speedFactor = 8088;
}
{ hostName = "lilith";
system = "x86_64-linux";
# if the builder supports building for multiple architectures,
# replace the previous line by, e.g.,
# systems = ["x86_64-linux" "aarch64-linux"];
maxJobs = 6;
#speedFactor = 13199;
speedFactor = 6000;
supportedFeatures = [ ];
mandatoryFeatures = [ ];
}
{ hostName = "desktop";
system = "x86_64-linux";
maxJobs = 4;
#speedFactor = 8066;
speedFactor = 4000;
supportedFeatures = [ ];
mandatoryFeatures = [ ];
}
# { hostName = "sachiel";
# system = "x86_64-linux";
# maxJobs = 1;
# #speedfactor =
# }
# {
# hostName = "isvegg.pvv.ntnu.no";
# system = "x86_64-linux";
# maxJobs = 4;
# speedFactor = 4961;
# supportedFeatures = [ "big-parallel" ];
# mandatoryFeatures = [ ];
# }
];
nix.distributedBuilds = true;
nix.extraOptions = ''
builders-use-substitutes = true
experimental-features = nix-command flakes impure-derivations ca-derivations
'';
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "23.11"; # Did you read the comment?
}

View File

@@ -0,0 +1,61 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sdhci_pci" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/276d0801-34f7-4d40-aa24-bfc43ea4ff51";
fsType = "btrfs";
options = [ "subvol=root" ];
};
boot.initrd.luks.devices."enc" = {
allowDiscards = true;
device = "/dev/disk/by-uuid/27c2e6ae-d9ec-4bbd-9ebe-6ec2e63dd139";
};
fileSystems."/home" =
{ device = "/dev/disk/by-uuid/276d0801-34f7-4d40-aa24-bfc43ea4ff51";
fsType = "btrfs";
options = [ "subvol=home" ];
};
fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/276d0801-34f7-4d40-aa24-bfc43ea4ff51";
fsType = "btrfs";
options = [ "subvol=nix" ];
};
fileSystems."/persist" =
{ device = "/dev/disk/by-uuid/276d0801-34f7-4d40-aa24-bfc43ea4ff51";
fsType = "btrfs";
options = [ "subvol=persist" ];
};
fileSystems."/var/log" =
{ device = "/dev/disk/by-uuid/276d0801-34f7-4d40-aa24-bfc43ea4ff51";
fsType = "btrfs";
options = [ "subvol=log" ];
neededForBoot = true;
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/503B-1BC9";
fsType = "vfat";
};
swapDevices =
[ { device = "/dev/disk/by-uuid/28c04c57-b026-471f-a7bf-366cbc102b78"; }
];
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -15,8 +15,8 @@
Bind = [ Bind = [
"/dev/dri:/dev/dri" "/dev/dri:/dev/dri"
"/dev/kfd:/dev/kfd" "/dev/kfd:/dev/kfd"
"/mnt/human/llama:/llama" "/mnt/human/llama:/llama:idmap"
"/mnt/human/sd:/sd" "/mnt/human/sd:/sd:idmap"
]; ];
}; };
}; };
@@ -27,9 +27,9 @@
}; };
serviceConfig = { serviceConfig = {
CPUQuota = "300%"; CPUQuota = "300%";
MemoryHigh = "14G"; MemoryHigh = "29G";
MemoryMax = "15G"; MemoryMax = "30G";
MemorySwapMax = "25G"; MemorySwapMax = "50G";
ExecStart = "systemd-nspawn --quiet --keep-unit --boot --link-journal=try-guest --network-veth -U --settings=override --machine=%i -D /mnt/human/machines/ubuntu-ai"; ExecStart = "systemd-nspawn --quiet --keep-unit --boot --link-journal=try-guest --network-veth -U --settings=override --machine=%i -D /mnt/human/machines/ubuntu-ai";
}; };
# overrideStrategy = "asDropin"; # overrideStrategy = "asDropin";

View File

@@ -29,6 +29,10 @@
"fs.file-max" = 524288; "fs.file-max" = 524288;
}; };
zramSwap = {
enable = true;
memoryMax = 32 * 1024 * 1024 * 1024; # 16 GB ZRAM
};
disabledModules = [ disabledModules = [
"services/network-filesystems/tahoe.nix" "services/network-filesystems/tahoe.nix"
@@ -174,17 +178,16 @@
# "L+ /opt/rocm/hip - - - - ${pkgs.hip}" # "L+ /opt/rocm/hip - - - - ${pkgs.hip}"
# ]; # ];
hardware.graphics.enable = true;
hardware.opengl.driSupport = true; hardware.graphics.enable32Bit = true;
hardware.opengl.driSupport32Bit = true; hardware.graphics.extraPackages = with pkgs; [
hardware.opengl.extraPackages = with pkgs; [
libva libva
rocmPackages.clr.icd
]; ];
hardware.amdgpu.opencl.enable = true;
# Enable the X11 windowing system. # Enable the X11 windowing system.
services.xserver.enable = true; services.xserver.enable = true;
services.xserver.layout = "no"; services.xserver.xkb.layout = "no";
# services.xserver.xkbOptions = "eurosign:e"; # services.xserver.xkbOptions = "eurosign:e";
services.xserver.displayManager.lightdm.enable = true; services.xserver.displayManager.lightdm.enable = true;
@@ -196,6 +199,7 @@
virtualisation.docker.enable = true; virtualisation.docker.enable = true;
virtualisation.libvirtd.enable = true; virtualisation.libvirtd.enable = true;
virtualisation.spiceUSBRedirection.enable = true;
# networking.nameservers = lib.mkForce [ "192.168.0.25" ]; # networking.nameservers = lib.mkForce [ "192.168.0.25" ];