This commit is contained in:
Grimmauld 2024-05-08 23:08:25 +02:00
parent a7734d312b
commit 5c4082c245
5 changed files with 15 additions and 7 deletions

View File

@ -104,7 +104,7 @@ in
# virtualisation.docker.enable = true; # virtualisation.docker.enable = true;
services.dbus.implementation = "broker"; # services.dbus.implementation = "broker";
grimmShared.tooling.nvim.plugins = with pkgs.vimPlugins; [ grimmShared.tooling.nvim.plugins = with pkgs.vimPlugins; [
vim-scala vim-scala

View File

@ -10,7 +10,6 @@
# Bootloader. # Bootloader.
boot = { boot = {
loader.efi.canTouchEfiVariables = true; loader.efi.canTouchEfiVariables = true;
kernelPackages = pkgs.linuxPackages_zen;
}; };
services.logrotate.checkConfig = false; # fixme: actually needed? services.logrotate.checkConfig = false; # fixme: actually needed?

View File

@ -43,7 +43,7 @@ let
{ {
# tlpui # tlpui
url = "https://patch-diff.githubusercontent.com/raw/NixOS/nixpkgs/pull/305278.patch"; url = "https://patch-diff.githubusercontent.com/raw/NixOS/nixpkgs/pull/305278.patch";
hash = "sha256-8RvPI8Id+Ttgv07IMBTAxkSc+K00WhiWgdgrCcULd7o="; hash = "sha256-vmzj7gF8jwHdqxN+dQiJ4MRxKpHvBTzbrUvFgt1DK8I=";
} }
]; ];
in in
@ -62,10 +62,10 @@ in
nixpkgs.hostPlatform = system; nixpkgs.hostPlatform = system;
system.nixos = { # system.nixos = {
distroId = "lixos"; # distroId = "lixos";
distroName = "LixOS"; # distroName = "LixOS";
}; # };
environment.sessionVariables = with config.system.nixos; { environment.sessionVariables = with config.system.nixos; {
distro = "${distroName} ${version} (${codeName}) ${system}"; distro = "${distroName} ${version} (${codeName}) ${system}";

View File

@ -9,6 +9,10 @@
age.identityPaths = [ "/home/grimmauld/.ssh/id_ed25519" ]; age.identityPaths = [ "/home/grimmauld/.ssh/id_ed25519" ];
boot = {
kernelPackages = pkgs.linuxPackages_zen;
};
grimmShared = { grimmShared = {
tooling = { tooling = {
pass = true; pass = true;

View File

@ -11,6 +11,10 @@ in
{ {
imports = [ ./hardware-configuration.nix ]; imports = [ ./hardware-configuration.nix ];
boot = {
kernelPackages = pkgs.linuxPackages_latest;
};
networking.firewall.allowedTCPPorts = [ networking.firewall.allowedTCPPorts = [
80 80
443 443
@ -19,6 +23,7 @@ in
networking.domain = "grimmauld.de"; networking.domain = "grimmauld.de";
services.openssh.enable = true; services.openssh.enable = true;
system.stateVersion = "23.11"; system.stateVersion = "23.11";
# networking.networkmanager.enable = lib.mkForce false;
services.nginx = { services.nginx = {
# package = pkgs.nginxStable.override { openssl = pkgs.libressl; }; # package = pkgs.nginxStable.override { openssl = pkgs.libressl; };