Compare commits

..

12 Commits

Author SHA1 Message Date
25158bedf1 move more networking stuff to networking module; add ntsync to kernel for tuxedo; use unstable for wine 2025-10-10 14:15:24 +01:00
38f691cacd update flake.lock 2025-10-09 23:29:34 +01:00
6378246c2c update flake.lock 2025-10-08 22:00:33 +01:00
300c36245e update flake.lock 2025-10-07 22:03:10 +01:00
9ef91f7ab5 update flake.lock 2025-10-05 16:56:04 +01:00
249afa0b65 update flake.lock 2025-10-04 00:20:42 +01:00
730b115bf8 update flake.lock 2025-10-02 23:08:15 +01:00
499900014e update flake.lock 2025-10-02 00:20:16 +01:00
80c13f0ee3 update flake.lock 2025-09-30 22:27:46 +01:00
7049373384 update flake.lock 2025-09-29 23:49:31 +01:00
12cab79679 update flake.lock 2025-09-28 00:52:59 +01:00
cf9b2a0cdb update flake.lock 2025-09-27 01:03:16 +01:00
5 changed files with 72 additions and 53 deletions

View File

@@ -4,10 +4,15 @@
# networking.hostName = "nixos"; # Define your hostname.
# Pick only one of the below networking options.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
networking.networkmanager = {
# Easiest to use and most distros use this by default.
enable = true;
wifi.powersave = false;
networking = {
nftables = {
enable = true;
};
networkmanager = {
# Easiest to use and most distros use this by default.
enable = true;
wifi.powersave = false;
};
};
# Configure network proxy if necessary
@@ -17,10 +22,21 @@
# Enable CUPS to print documents.
# services.printing.enable = true;
# Open ports in the firewall.
networking.firewall.enable = true;
# 443 Helldivers crashes internet otherwise
# networking.firewall.allowedTCPPorts = [ 443 ];
# networking.firewall.allowedUDPPorts = [ 443 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# Block list
# networking.stevenblack.enable = true;
# services.resolved.enable = true;
services.mullvad-vpn = {
enable = true;
package = pkgs.mullvad-vpn;
};
# services.resolved.enable = true;
}

View File

@@ -37,16 +37,6 @@
# Enable the OpenSSH daemon.
# services.openssh.enable = true;
# Open ports in the firewall.
# 443 Helldivers crashes internet otherwise
# networking.firewall.allowedTCPPorts = [ 443 ];
# networking.firewall.allowedUDPPorts = [ 443 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# Block list
# networking.stevenblack.enable = true;
# Copy the NixOS configuration file and link it from the resulting system
# (/run/current-system/configuration.nix). This is useful in case you
# accidentally delete configuration.nix.
@@ -70,5 +60,4 @@
#
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
system.stateVersion = "24.05"; # Did you read the comment?
}

View File

@@ -20,9 +20,19 @@
networking.hostName = "tuxedo"; # Define your hostname.
# fairly sure this isnt needed anymore
# boot.extraModprobeConfig = ''
# options iwlwifi 11n_disable=8 power_save=0
# options iwlmvm power_scheme=1
# '';
# TODO remove ntsync if this becomes stable
# options iwlmvm power_scheme=1 https://wireless.docs.kernel.org/en/latest/en/users/drivers/iwlwifi.html#features
# options iwlwifi 11n_disable=4 https://wiki.gentoo.org/wiki/Iwlwifi#Network_crashes_under_heavy_load
boot.extraModprobeConfig = ''
options iwlwifi 11n_disable=8 power_save=0
ntsync
options iwlmvm power_scheme=1
options iwlwifi 11n_disable=4
'';
services.hardware.openrgb.enable = true;

42
flake.lock generated
View File

@@ -66,11 +66,11 @@
]
},
"locked": {
"lastModified": 1758427679,
"narHash": "sha256-xwjWRJTKDCjQ0iwfh7WhDhgcS0Wt3d1Yscg83mKBCn4=",
"lastModified": 1759637156,
"narHash": "sha256-8NI1SqntLfKl6Q0Luemc3aIboezSJElofUrqipF5g78=",
"owner": "nix-community",
"repo": "nix-index-database",
"rev": "fd2569ca2ef7d69f244cd9ffcb66a0540772ff85",
"rev": "0ca69684091aa3a6b1fe994c4afeff305b15e915",
"type": "github"
},
"original": {
@@ -105,11 +105,11 @@
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1758678836,
"narHash": "sha256-ewDKEXcKYF7L+EGVa+8E1nxK1pdwVrCHcj5UhuGA8V0=",
"lastModified": 1759974692,
"narHash": "sha256-8AN/Ps23Wx6CBEj7s5SKp8pVSA63BHlsAQICYF6Ac6E=",
"owner": "nix-community",
"repo": "nix-vscode-extensions",
"rev": "5007786714b3573b37cf3b8c4a33e2ddce86960d",
"rev": "6c39663c00cb3041d9567cfc103c29b46d0b3c98",
"type": "github"
},
"original": {
@@ -120,11 +120,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1758663926,
"narHash": "sha256-6CFdj7Xs616t1W4jLDH7IohAAvl5Dyib3qEv/Uqw1rk=",
"lastModified": 1759582739,
"narHash": "sha256-spZegilADH0q5OngM86u6NmXxduCNv5eX9vCiUPhOYc=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "170ff93c860b2a9868ed1e1102d4e52cb3d934e1",
"rev": "3441b5242af7577230a78ffb03542add264179ab",
"type": "github"
},
"original": {
@@ -136,27 +136,27 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1744868846,
"narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=",
"owner": "NixOS",
"lastModified": 1759770925,
"narHash": "sha256-CZwkCtzTNclqlhuwDsVtGoRumTpqCUK0xSnFIMgd8ls=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c",
"rev": "674c2b09c59a220204350ced584cadaacee30038",
"type": "github"
},
"original": {
"owner": "NixOS",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c",
"rev": "674c2b09c59a220204350ced584cadaacee30038",
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1758427187,
"narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=",
"lastModified": 1759831965,
"narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "554be6495561ff07b6c724047bdd7e0716aa7b46",
"rev": "c9b6fb798541223bbb396d287d16f43520250518",
"type": "github"
},
"original": {
@@ -168,11 +168,11 @@
},
"nixpkgs_2": {
"locked": {
"lastModified": 1758589230,
"narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=",
"lastModified": 1759735786,
"narHash": "sha256-a0+h02lyP2KwSNrZz4wLJTu9ikujNsTWIC874Bv7IJ0=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0",
"rev": "20c4598c84a671783f741e02bf05cbfaf4907cff",
"type": "github"
},
"original": {

View File

@@ -1,27 +1,31 @@
{ pkgs, ... }:
{ pkgs, inputs, ... }:
{
home.packages = with pkgs;[
# Wine / Proton
wineWowPackages.staging
winetricks
inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".wineWowPackages.stagingFull
inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".winetricks
inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".umu-launcher
# I'm not sure this actually accomplishes anything, even with PROTON_MEDIA_USE_GST=1
# (umu-launcher.override {
# extraPkgs = pkgs: with pkgs.gst_all_1; [
# gstreamer
# gst-plugins-base
# gst-plugins-good
# gst-plugins-bad
# gst-plugins-ugly
# gst-libav
# gst-vaapi
# ];
# })
bottles
(heroic.override {
extraPkgs = pkgs: [
pkgs.gamescope
];
})
(umu-launcher.override {
extraPkgs = pkgs: with pkgs.gst_all_1; [
gstreamer
gst-plugins-base
gst-plugins-good
gst-plugins-bad
gst-plugins-ugly
gst-libav
gst-vaapi
];
})
# Steam
steamguard-cli