Fmt & fix inet for tether & add iso pkg

This commit is contained in:
Tristan D. 2025-03-26 00:20:18 +01:00
parent fa714901d0
commit 444de85266
Signed by: tristan
SSH key fingerprint: SHA256:9oFM1J63hYWJjCnLG6C0fxBS15rwNcWwdQNMOHYKJ/4
13 changed files with 72 additions and 74 deletions

View file

@ -238,7 +238,17 @@
in in
{ {
formatter."${system}" = pkgs.nixpkgs-fmt; formatter."${system}" = pkgs.nixpkgs-fmt;
packages."${system}" = import ./pkgs { inherit pkgs lib config; }; packages."${system}" =
import ./pkgs { inherit pkgs lib config; }
// {
rescue-iso =
let
mod = "${inputs.nixos-images}/nix/image-installer/module.nix";
os = nixpkgs.legacyPackages.${system}.nixos [ mod ];
iso = os.config.system.build.isoImage;
in
iso;
};
diskoConfigurations = { diskoConfigurations = {
nixos-desk = import ./systems/nixos-desk/disko.nix; nixos-desk = import ./systems/nixos-desk/disko.nix;
nixos-pulse = import ./systems/nixos-pulse/disko.nix; nixos-pulse = import ./systems/nixos-pulse/disko.nix;

View file

@ -17,13 +17,20 @@ let
ref = "main"; ref = "main";
rev = "c7392136bed264258c9b8788b14410e1ff06d602"; rev = "c7392136bed264258c9b8788b14410e1ff06d602";
}; };
myEmacs = (pkgs.emacsPackagesFor pkgs.emacs-unstable-pgtk).emacsWithPackages (epkgs: myEmacs = (pkgs.emacsPackagesFor pkgs.emacs).emacsWithPackages (epkgs:
with epkgs; [ with epkgs; [
vterm vterm
treesit-grammars.with-all-grammars treesit-grammars.with-all-grammars
inputs.nix-emacs-extra.packages."${system}".doom-dashboard inputs.nix-emacs-extra.packages."${system}".doom-dashboard
inputs.nix-emacs-extra.packages."${system}".ultra-scroll inputs.nix-emacs-extra.packages."${system}".ultra-scroll
]); ]);
# myEmacs = (pkgs.emacsPackagesFor pkgs.emacs-unstable-pgtk).emacsWithPackages (epkgs:
# with epkgs; [
# vterm
# treesit-grammars.with-all-grammars
# inputs.nix-emacs-extra.packages."${system}".doom-dashboard
# inputs.nix-emacs-extra.packages."${system}".ultra-scroll
# ]);
in in
{ {
programs = { programs = {

View file

@ -19,8 +19,9 @@
]; ];
systemd = systemd =
let let
tcl = "85"; tcl = "80";
coall = "1048561"; # 1048561 = 0x100000 - 15(mV) $ math "0x100000-15" # slight undervolt # coall = "1048561"; # 1048561 = 0x100000 - 15(mV) $ math "0x100000-15" # slight undervolt
coall = " 1048576"; # no oc?
defaults = "--tctl-temp=${tcl} --set-coall=${coall}"; defaults = "--tctl-temp=${tcl} --set-coall=${coall}";
in in
{ {

View file

@ -18,7 +18,6 @@
, relyUdev ? true , relyUdev ? true
, ,
}: }:
let let
gstreamerPluginPaths = lib.concatMapStrings (pth: pth + "/lib/gstreamer-1.0:") [ gstreamerPluginPaths = lib.concatMapStrings (pth: pth + "/lib/gstreamer-1.0:") [
(lib.getLib gst_all_1.gstreamer) (lib.getLib gst_all_1.gstreamer)

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 nA0mnQ WtsuBNNRDJ2qBqqfKPYBjsG5J8RA1FLG22V4rcpmIAs
+b/BJpaLA/TCIMwRg0c7eO8UqIa+KPgpaOTmpVeW60k
-> m-grease
RCMzLSoDYLRPgxDe1bS2EOXDAD19QYDO3UI/0tzYNOGvcEMnHw
--- WBgm8Vf3dtFoPsTbBIoS73fD824cOm5COYSz66dcvYQ
¢˜6æ…{šÑ;æà³
‰Ä ÷³üJm‡ <<WÐ’Ñǧ‚×É]øÎ/<2F>ú‰5YÅOò<4F> §¢ÝaÐ>Î÷ÒZ7ª†ó"y

View file

@ -1,9 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 MqgTQA kHKU7lp3SvhVlgDk8qBbQU+nrV8O84CLtR32ZGATDw4
1E9KyKzKwio7ltF1H36tSLWSao0TPNNlbwJAwxhw3CI
-> +&-grease
y1YrcXJ8+mGdSTrJywOZM/E8jbHPSX9rARC6uKOHgESGkH1NWsINbEk0/1fYHi62
6Y+k9Ig9oX7taekoNCU
--- lgK5w16T9LaMc6yoWW+h+zVNyuKuoEoeJi8p7lura1Q
X
¢ò&ÃbZ[IßC>ÊԘОWp¼²ˆŠŠ?èµ ä[˜š-]À) HY¦(u/ݰšÄû¹É–Ý÷Þ^摨à@„9öõýxVG.¾n £9»°‡Rr¡ŸàŽxzJf<4A>±Ûw K‡zbq÷ZÖ©ùf»FÎÓ ‹ê=†½¼Œ„P

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 MqgTQA 7y3on/Y6P89gncEtSzn6dak659D+C0jT0Lo711yQaQ0
bsILI8jRG8MFJ2xSowtYyNYHPbcZmS+OFBbTrn7vNgo
-> a-grease /3
faRjVzpKpTOBeDIZVd+uK9AGzVH7LYbIH3QiTZMHE+zE21fI6yjGEQyIE2jsVhTq
q/PxcbNtJ9fZ2JCU43lGX7DveIYT7Z84vX955I3BkIppgQ4
--- dNDrqjg89dlNEf3ZkyW0fU7OyETfVPtRAw7JcRJxQ1o
ŠâCد<11>“ DXo¤ØÁ?9±ÿ©u°iÉÝ”s„çrºÞ©wyB¶~umȹ¶3Dæ€MÓëÏÅbé2táì€j`zDñXù

View file

@ -27,7 +27,9 @@
./disks.nix ./disks.nix
]; ];
age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIRFEtmoq36QmvAwv/xIVdvaf+B9Scbm5cUFFkP/c1nS root@nixos-f16"; # age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIRFEtmoq36QmvAwv/xIVdvaf+B9Scbm5cUFFkP/c1nS root@nixos-f16";
age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANI+JugoOABEG49405FrbVwbTT/cbYamNZC5Tb01/xp root@nixos-fw16";
nix.settings.builders-use-substitutes = true; nix.settings.builders-use-substitutes = true;
nix.distributedBuilds = true; nix.distributedBuilds = true;
nix.buildMachines = [ ]; nix.buildMachines = [ ];
@ -127,17 +129,17 @@
}; };
}; };
specialisation = { # specialisation = {
linux-latest.configuration = { # linux-latest.configuration = {
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_latest; # boot.kernelPackages = lib.mkForce pkgs.linuxPackages_latest;
}; # };
linux-zen.configuration = { # linux-zen.configuration = {
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_zen; # boot.kernelPackages = lib.mkForce pkgs.linuxPackages_zen;
}; # };
linux-cachyos.configuration = { # linux-cachyos.configuration = {
boot.kernelPackages = lib.mkForce pkgs.linuxPackages_cachyos; # boot.kernelPackages = lib.mkForce pkgs.linuxPackages_cachyos;
}; # };
}; # };
boot = { boot = {
# kernelPackages = pkgs.linuxPackages_latest; # bootstrap # kernelPackages = pkgs.linuxPackages_latest; # bootstrap
# kernelPackages = pkgs.linuxPackages_zen; # bootstrap # kernelPackages = pkgs.linuxPackages_zen; # bootstrap
@ -165,7 +167,8 @@
loader = { loader = {
timeout = 0; timeout = 0;
systemd-boot = { systemd-boot = {
enable = false; # due to lanzaboote # enable = false; # due to lanzaboote
enable = true; # bootstrap
configurationLimit = 12; configurationLimit = 12;
memtest86.enable = true; memtest86.enable = true;
@ -175,7 +178,7 @@
}; };
lanzaboote = { lanzaboote = {
enable = true; # enable = true;
configurationLimit = 12; configurationLimit = 12;
# pkiBundle = "/etc/secureboot"; # pkiBundle = "/etc/secureboot";
pkiBundle = "/var/lib/sbctl"; pkiBundle = "/var/lib/sbctl";

View file

@ -16,8 +16,8 @@
config = { config = {
boot = { boot = {
supportedFilesystems = [ "bcachefs" "vfat" ]; supportedFilesystems = [ "btrfs" "vfat" ];
initrd.supportedFilesystems = [ "bcachefs" "vfat" ]; initrd.supportedFilesystems = [ "btrfs" "vfat" ];
initrd.luks.devices = initrd.luks.devices =
lib.attrsets.mergeAttrsList lib.attrsets.mergeAttrsList
( (
@ -38,27 +38,20 @@
); );
}; };
fileSystems = fileSystems = {
let
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
perm_opts = "uid=1001,gid=100";
smb_opts = [
"vers=3,credentials=/home/tristand/.smb-secrets"
perm_opts
automount_opts
];
sshfs_opts = [
"allow_other,_netdev,reconnect,ServerAliveInterval=15,IdentityFile=/var/secrets/id_ed25519"
perm_opts
automount_opts
];
in
{
"/" = { "/" = {
device = "/dev/mapper/crypt_ssd_4t_data"; device = "/dev/mapper/crypt_ssd_4t_data";
# device = "UUID=f89215ba-3313-42d3-8f68-051ad2453870"; # device = "UUID=f89215ba-3313-42d3-8f68-051ad2453870";
fsType = "bcachefs"; fsType = "btrfs";
options = [ "relatime" ]; options = [
"rw"
"autodefrag"
"compress=zstd"
"discard=async"
"relatime"
"space_cache=v2"
"ssd"
];
}; };
"/boot" = { "/boot" = {
@ -66,17 +59,11 @@
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0022" "dmask=0022" ]; options = [ "fmask=0022" "dmask=0022" ];
}; };
# "/mnt/media_v2" = {
# device = "root@23.88.68.113:/media_v2";
# fsType = "sshfs";
# options = sshfs_opts;
# };
}; };
swapDevices = [ swapDevices = [
{ device = "/dev/disk/by-uuid/a8f478f0-ad5e-47ae-8e18-63060f7e5706"; } # { device = "/dev/disk/by-uuid/a8f478f0-ad5e-47ae-8e18-63060f7e5706"; }
{ device = "/dev/disk/by-uuid/59987b2a-c5c5-4547-95ad-f0d1dcdf8458"; } # { device = "/dev/disk/by-uuid/59987b2a-c5c5-4547-95ad-f0d1dcdf8458"; }
]; ];
system.fsPackages = [ pkgs.sshfs ]; system.fsPackages = [ pkgs.sshfs ];

View file

@ -8,7 +8,7 @@
imports = [ imports = [
../home-mods/audio ../home-mods/audio
../home-mods/common ../home-mods/common
../home-mods/firefox ../home-mods/firefox/zen-browser.nix
# ../home-mods/plasma # ../home-mods/plasma
../home-mods/shell ../home-mods/shell
]; ];