X-Git-Url: https://gitweb.ps.run/flake_thinkpad/blobdiff_plain/6d5e77492bd3b0032686f2351498726da5d98cd8..7d4be89983f22a94e36bf18bb21453b36aeee3ae:/configuration.nix?ds=sidebyside diff --git a/configuration.nix b/configuration.nix index e236758..cb526d1 100644 --- a/configuration.nix +++ b/configuration.nix @@ -193,34 +193,46 @@ in configDir = "/home/ps/.config/syncthing"; }; - services.tlp = { - enable = true; - settings = { - CPU_SCALING_GOVERNOR_ON_AC = "performance"; - CPU_SCALING_GOVERNOR_ON_BAT = "powersave"; - - CPU_ENERGY_PERF_POLICY_ON_AC = "balance_performance"; - CPU_ENERGY_PERF_POLICY_ON_BAT = "power"; - - PLATFORM_PROFILE_ON_AC = "balanced"; - PLATFORM_PROFILE_ON_BAT = "low-power"; - - CPU_BOOST_ON_AC = "1"; - CPU_BOOST_ON_BAT = "0"; - - AMDGPU_ABM_LEVEL_ON_AC = "0"; - AMDGPU_ABM_LEVEL_ON_BAT = "3"; - - CPU_MIN_PERF_ON_AC = 0; - CPU_MAX_PERF_ON_AC = 100; - CPU_MIN_PERF_ON_BAT = 0; - CPU_MAX_PERF_ON_BAT = 20; - - START_CHARGE_THRESH_BAT0 = 40; # 40 and below it starts to charge - STOP_CHARGE_THRESH_BAT0 = 85; # 85 and above it stops charging + services.auto-cpufreq.enable = true; + services.auto-cpufreq.settings = { + battery = { + governor = "powersave"; + turbo = "never"; + }; + charger = { + governor = "performance"; + turbo = "auto"; }; }; + # services.tlp = { + # enable = true; + # settings = { + # CPU_SCALING_GOVERNOR_ON_AC = "performance"; + # CPU_SCALING_GOVERNOR_ON_BAT = "powersave"; + # + # CPU_ENERGY_PERF_POLICY_ON_AC = "balance_performance"; + # CPU_ENERGY_PERF_POLICY_ON_BAT = "power"; + # + # PLATFORM_PROFILE_ON_AC = "balanced"; + # PLATFORM_PROFILE_ON_BAT = "low-power"; + # + # CPU_BOOST_ON_AC = "1"; + # CPU_BOOST_ON_BAT = "0"; + # + # AMDGPU_ABM_LEVEL_ON_AC = "0"; + # AMDGPU_ABM_LEVEL_ON_BAT = "3"; + # + # CPU_MIN_PERF_ON_AC = 0; + # CPU_MAX_PERF_ON_AC = 100; + # CPU_MIN_PERF_ON_BAT = 0; + # CPU_MAX_PERF_ON_BAT = 20; + # + # # START_CHARGE_THRESH_BAT0 = 40; # 40 and below it starts to charge + # STOP_CHARGE_THRESH_BAT0 = 90; # 85 and above it stops charging + # }; + # }; + services.udev.extraRules = '' KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{serial}=="*vial:f64c2b3c*", MODE="0660", GROUP="users", TAG+="uaccess", TAG+="udev-acl" ''; @@ -230,6 +242,11 @@ in graphics = { enable = true; enable32Bit = true; + extraPackages = with pkgs; [ + rocmPackages.clr.icd + mesa.opencl + amf + ]; }; amdgpu.amdvlk = { @@ -296,13 +313,13 @@ in shell = pkgs.bash; extraGroups = [ "networkmanager" "wheel" "dialout" "jackaudio" "lp" "incus-admin" ]; }; - sshd = { - isSystemUser = true; - packages = [ - pkgs.python3 - ]; - group = "ssh"; - }; + # sshd = { + # isSystemUser = true; + # packages = [ + # pkgs.python3 + # ]; + # group = "ssh"; + # }; chirp = { isSystemUser = true; packages = [ @@ -323,10 +340,9 @@ in inherit inputs; inherit wallpaper; }; - # users = { - # "ps" = import ./home.nix; - # }; - users.ps.imports = [ ./home.nix ]; + users = { + "ps" = import ./home.nix; + }; }; # Enable automatic login for the user. @@ -341,19 +357,32 @@ in # Allow unfree packages nixpkgs.config.allowUnfree = true; + + environment.variables = { + RUSTICL_ENABLE = "radeonsi"; + }; # List packages installed in system profile. To search, run: # $ nix search wget environment.systemPackages = with pkgs; [ - args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zig - args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zls + args.inputs.zls.inputs.zig-overlay.packages.${pkgs.system}.master + args.inputs.zls.packages.${pkgs.system}.zls args.inputs.psch-flakes.packages.${pkgs.system}.resetmsmice + args.inputs.nixpkgs-unstable.legacyPackages.${pkgs.system}.zuban vim wget file git kitty i3 gdb mosh cmake + entr + asciinema asciinema-agg + shellify scrcpy xsel + xcwd + + pinta + mupdf + davinci-resolve pavucontrol syncthingtray @@ -388,28 +417,28 @@ in # Enable the OpenSSH daemon. services.openssh = { - enable = false; + enable = true; ports = [ 22 ]; - settings = { - PasswordAuthentication = false; - PermitRootLogin = "no"; - }; - authorizedKeysCommand = - let keys = pkgs.writers.writePython3Bin "keys" {} '' - import sys - - args = sys.argv - - print(args) - ''; - in - "${keys}/bin/keys"; - authorizedKeysCommandUser = "ps"; + # settings = { + # PasswordAuthentication = false; + # PermitRootLogin = "no"; + # }; + # authorizedKeysCommand = + # let keys = pkgs.writers.writePython3Bin "keys" {} '' + # import sys + # + # args = sys.argv + # + # print(args) + # ''; + # in + # "${keys}/bin/keys"; + # authorizedKeysCommandUser = "ps"; }; # Open ports in the firewall. - networking.firewall.allowedTCPPorts = [ 22 1234 5900 6011 6021 6022 8080 53317 ]; - networking.firewall.allowedUDPPorts = [ 5901 53317 ]; + networking.firewall.allowedTCPPorts = [ 22 1234 5900 6011 6021 6022 8080 53317 7236 7250 ]; + networking.firewall.allowedUDPPorts = [ 5901 53317 7236 5353 ]; # Or disable the firewall altogether. # networking.firewall.enable = false;