nix.settings.experimental-features = [ "nix-command" "flakes" ];
nix.settings.download-buffer-size = 500000000;
+ nix.config.trusted-users = ["root" "ps"];
# Configure network proxy if necessary
# networking.proxy.default = "http://user:password@proxy:port/";
configDir = "/home/ps/.config/syncthing";
};
- services.tlp = {
- enable = true;
- settings = {
- CPU_SCALING_GOVERNOR_ON_AC = "performance";
- CPU_SCALING_GOVERNOR_ON_BAT = "powersave";
-
- CPU_ENERGY_PERF_POLICY_ON_AC = "balance_performance";
- CPU_ENERGY_PERF_POLICY_ON_BAT = "power";
-
- PLATFORM_PROFILE_ON_AC = "balanced";
- PLATFORM_PROFILE_ON_BAT = "low-power";
-
- CPU_BOOST_ON_AC = "1";
- CPU_BOOST_ON_BAT = "0";
-
- AMDGPU_ABM_LEVEL_ON_AC = "0";
- AMDGPU_ABM_LEVEL_ON_BAT = "3";
-
- CPU_MIN_PERF_ON_AC = 0;
- CPU_MAX_PERF_ON_AC = 100;
- CPU_MIN_PERF_ON_BAT = 0;
- CPU_MAX_PERF_ON_BAT = 20;
-
- START_CHARGE_THRESH_BAT0 = 40; # 40 and below it starts to charge
- STOP_CHARGE_THRESH_BAT0 = 85; # 85 and above it stops charging
+ services.auto-cpufreq.enable = true;
+ services.auto-cpufreq.settings = {
+ battery = {
+ governor = "powersave";
+ turbo = "never";
+ };
+ charger = {
+ governor = "performance";
+ turbo = "auto";
};
};
+ # services.tlp = {
+ # enable = true;
+ # settings = {
+ # CPU_SCALING_GOVERNOR_ON_AC = "performance";
+ # CPU_SCALING_GOVERNOR_ON_BAT = "powersave";
+ #
+ # CPU_ENERGY_PERF_POLICY_ON_AC = "balance_performance";
+ # CPU_ENERGY_PERF_POLICY_ON_BAT = "power";
+ #
+ # PLATFORM_PROFILE_ON_AC = "balanced";
+ # PLATFORM_PROFILE_ON_BAT = "low-power";
+ #
+ # CPU_BOOST_ON_AC = "1";
+ # CPU_BOOST_ON_BAT = "0";
+ #
+ # AMDGPU_ABM_LEVEL_ON_AC = "0";
+ # AMDGPU_ABM_LEVEL_ON_BAT = "3";
+ #
+ # CPU_MIN_PERF_ON_AC = 0;
+ # CPU_MAX_PERF_ON_AC = 100;
+ # CPU_MIN_PERF_ON_BAT = 0;
+ # CPU_MAX_PERF_ON_BAT = 20;
+ #
+ # # START_CHARGE_THRESH_BAT0 = 40; # 40 and below it starts to charge
+ # STOP_CHARGE_THRESH_BAT0 = 90; # 85 and above it stops charging
+ # };
+ # };
+
services.udev.extraRules = ''
KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{serial}=="*vial:f64c2b3c*", MODE="0660", GROUP="users", TAG+="uaccess", TAG+="udev-acl"
'';
graphics = {
enable = true;
enable32Bit = true;
+ extraPackages = with pkgs; [
+ rocmPackages.clr.icd
+ mesa.opencl
+ amf
+ ];
};
amdgpu.amdvlk = {
shell = pkgs.bash;
extraGroups = [ "networkmanager" "wheel" "dialout" "jackaudio" "lp" "incus-admin" ];
};
- sshd = {
- isSystemUser = true;
- packages = [
- pkgs.python3
- ];
- group = "ssh";
- };
+ # sshd = {
+ # isSystemUser = true;
+ # packages = [
+ # pkgs.python3
+ # ];
+ # group = "ssh";
+ # };
chirp = {
isSystemUser = true;
packages = [
inherit inputs;
inherit wallpaper;
};
- # users = {
- # "ps" = import ./home.nix;
- # };
- users.ps.imports = [ ./home.nix ];
+ users = {
+ "ps" = import ./home.nix;
+ };
};
# Enable automatic login for the user.
# Allow unfree packages
nixpkgs.config.allowUnfree = true;
+
+ environment.variables = {
+ RUSTICL_ENABLE = "radeonsi";
+ };
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
- args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zig
- args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zls
+ args.inputs.zls.inputs.zig-overlay.packages.${pkgs.system}.master
+ args.inputs.zls.packages.${pkgs.system}.zls
args.inputs.psch-flakes.packages.${pkgs.system}.resetmsmice
+ args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zuban
vim wget file git kitty i3 gdb
mosh
cmake
+ entr
+ asciinema asciinema-agg
+ shellify
scrcpy
xsel
+ xcwd
+
+ pinta
+ mupdf
+ davinci-resolve
pavucontrol
syncthingtray
# Enable the OpenSSH daemon.
services.openssh = {
- enable = false;
+ enable = true;
ports = [ 22 ];
- settings = {
- PasswordAuthentication = false;
- PermitRootLogin = "no";
- };
- authorizedKeysCommand =
- let keys = pkgs.writers.writePython3Bin "keys" {} ''
- import sys
-
- args = sys.argv
-
- print(args)
- '';
- in
- "${keys}/bin/keys";
- authorizedKeysCommandUser = "ps";
+ # settings = {
+ # PasswordAuthentication = false;
+ # PermitRootLogin = "no";
+ # };
+ # authorizedKeysCommand =
+ # let keys = pkgs.writers.writePython3Bin "keys" {} ''
+ # import sys
+ #
+ # args = sys.argv
+ #
+ # print(args)
+ # '';
+ # in
+ # "${keys}/bin/keys";
+ # authorizedKeysCommandUser = "ps";
};
# Open ports in the firewall.
- networking.firewall.allowedTCPPorts = [ 22 1234 5900 6011 6021 6022 8080 53317 ];
- networking.firewall.allowedUDPPorts = [ 5901 53317 ];
+ networking.firewall.allowedTCPPorts = [ 22 1234 5900 6011 6021 6022 8080 53317 7236 7250 ];
+ networking.firewall.allowedUDPPorts = [ 5901 53317 7236 5353 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;