Compare commits

..

12 Commits

Author SHA1 Message Date
25158bedf1 move more networking stuff to networking module; add ntsync to kernel for tuxedo; use unstable for wine 2025-10-10 14:15:24 +01:00
38f691cacd update flake.lock 2025-10-09 23:29:34 +01:00
6378246c2c update flake.lock 2025-10-08 22:00:33 +01:00
300c36245e update flake.lock 2025-10-07 22:03:10 +01:00
9ef91f7ab5 update flake.lock 2025-10-05 16:56:04 +01:00
249afa0b65 update flake.lock 2025-10-04 00:20:42 +01:00
730b115bf8 update flake.lock 2025-10-02 23:08:15 +01:00
499900014e update flake.lock 2025-10-02 00:20:16 +01:00
80c13f0ee3 update flake.lock 2025-09-30 22:27:46 +01:00
7049373384 update flake.lock 2025-09-29 23:49:31 +01:00
12cab79679 update flake.lock 2025-09-28 00:52:59 +01:00
cf9b2a0cdb update flake.lock 2025-09-27 01:03:16 +01:00
5 changed files with 72 additions and 53 deletions

View File

@@ -4,10 +4,15 @@
# networking.hostName = "nixos"; # Define your hostname. # networking.hostName = "nixos"; # Define your hostname.
# Pick only one of the below networking options. # Pick only one of the below networking options.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
networking.networkmanager = { networking = {
# Easiest to use and most distros use this by default. nftables = {
enable = true; enable = true;
wifi.powersave = false; };
networkmanager = {
# Easiest to use and most distros use this by default.
enable = true;
wifi.powersave = false;
};
}; };
# Configure network proxy if necessary # Configure network proxy if necessary
@@ -17,10 +22,21 @@
# Enable CUPS to print documents. # Enable CUPS to print documents.
# services.printing.enable = true; # services.printing.enable = true;
# Open ports in the firewall.
networking.firewall.enable = true;
# 443 Helldivers crashes internet otherwise
# networking.firewall.allowedTCPPorts = [ 443 ];
# networking.firewall.allowedUDPPorts = [ 443 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# Block list
# networking.stevenblack.enable = true;
# services.resolved.enable = true;
services.mullvad-vpn = { services.mullvad-vpn = {
enable = true; enable = true;
package = pkgs.mullvad-vpn; package = pkgs.mullvad-vpn;
}; };
# services.resolved.enable = true;
} }

View File

@@ -37,16 +37,6 @@
# Enable the OpenSSH daemon. # Enable the OpenSSH daemon.
# services.openssh.enable = true; # services.openssh.enable = true;
# Open ports in the firewall.
# 443 Helldivers crashes internet otherwise
# networking.firewall.allowedTCPPorts = [ 443 ];
# networking.firewall.allowedUDPPorts = [ 443 ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# Block list
# networking.stevenblack.enable = true;
# Copy the NixOS configuration file and link it from the resulting system # Copy the NixOS configuration file and link it from the resulting system
# (/run/current-system/configuration.nix). This is useful in case you # (/run/current-system/configuration.nix). This is useful in case you
# accidentally delete configuration.nix. # accidentally delete configuration.nix.
@@ -70,5 +60,4 @@
# #
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion . # For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
system.stateVersion = "24.05"; # Did you read the comment? system.stateVersion = "24.05"; # Did you read the comment?
} }

View File

@@ -20,9 +20,19 @@
networking.hostName = "tuxedo"; # Define your hostname. networking.hostName = "tuxedo"; # Define your hostname.
# fairly sure this isnt needed anymore
# boot.extraModprobeConfig = ''
# options iwlwifi 11n_disable=8 power_save=0
# options iwlmvm power_scheme=1
# '';
# TODO remove ntsync if this becomes stable
# options iwlmvm power_scheme=1 https://wireless.docs.kernel.org/en/latest/en/users/drivers/iwlwifi.html#features
# options iwlwifi 11n_disable=4 https://wiki.gentoo.org/wiki/Iwlwifi#Network_crashes_under_heavy_load
boot.extraModprobeConfig = '' boot.extraModprobeConfig = ''
options iwlwifi 11n_disable=8 power_save=0 ntsync
options iwlmvm power_scheme=1 options iwlmvm power_scheme=1
options iwlwifi 11n_disable=4
''; '';
services.hardware.openrgb.enable = true; services.hardware.openrgb.enable = true;

42
flake.lock generated
View File

@@ -66,11 +66,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1758427679, "lastModified": 1759637156,
"narHash": "sha256-xwjWRJTKDCjQ0iwfh7WhDhgcS0Wt3d1Yscg83mKBCn4=", "narHash": "sha256-8NI1SqntLfKl6Q0Luemc3aIboezSJElofUrqipF5g78=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-index-database", "repo": "nix-index-database",
"rev": "fd2569ca2ef7d69f244cd9ffcb66a0540772ff85", "rev": "0ca69684091aa3a6b1fe994c4afeff305b15e915",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -105,11 +105,11 @@
"nixpkgs": "nixpkgs" "nixpkgs": "nixpkgs"
}, },
"locked": { "locked": {
"lastModified": 1758678836, "lastModified": 1759974692,
"narHash": "sha256-ewDKEXcKYF7L+EGVa+8E1nxK1pdwVrCHcj5UhuGA8V0=", "narHash": "sha256-8AN/Ps23Wx6CBEj7s5SKp8pVSA63BHlsAQICYF6Ac6E=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-vscode-extensions", "repo": "nix-vscode-extensions",
"rev": "5007786714b3573b37cf3b8c4a33e2ddce86960d", "rev": "6c39663c00cb3041d9567cfc103c29b46d0b3c98",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -120,11 +120,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1758663926, "lastModified": 1759582739,
"narHash": "sha256-6CFdj7Xs616t1W4jLDH7IohAAvl5Dyib3qEv/Uqw1rk=", "narHash": "sha256-spZegilADH0q5OngM86u6NmXxduCNv5eX9vCiUPhOYc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "170ff93c860b2a9868ed1e1102d4e52cb3d934e1", "rev": "3441b5242af7577230a78ffb03542add264179ab",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -136,27 +136,27 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1744868846, "lastModified": 1759770925,
"narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=", "narHash": "sha256-CZwkCtzTNclqlhuwDsVtGoRumTpqCUK0xSnFIMgd8ls=",
"owner": "NixOS", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c", "rev": "674c2b09c59a220204350ced584cadaacee30038",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c", "rev": "674c2b09c59a220204350ced584cadaacee30038",
"type": "github" "type": "github"
} }
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1758427187, "lastModified": 1759831965,
"narHash": "sha256-pHpxZ/IyCwoTQPtFIAG2QaxuSm8jWzrzBGjwQZIttJc=", "narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "554be6495561ff07b6c724047bdd7e0716aa7b46", "rev": "c9b6fb798541223bbb396d287d16f43520250518",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -168,11 +168,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1758589230, "lastModified": 1759735786,
"narHash": "sha256-zMTCFGe8aVGTEr2RqUi/QzC1nOIQ0N1HRsbqB4f646k=", "narHash": "sha256-a0+h02lyP2KwSNrZz4wLJTu9ikujNsTWIC874Bv7IJ0=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d1d883129b193f0b495d75c148c2c3a7d95789a0", "rev": "20c4598c84a671783f741e02bf05cbfaf4907cff",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -1,27 +1,31 @@
{ pkgs, ... }: { pkgs, inputs, ... }:
{ {
home.packages = with pkgs;[ home.packages = with pkgs;[
# Wine / Proton # Wine / Proton
wineWowPackages.staging inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".wineWowPackages.stagingFull
winetricks inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".winetricks
inputs.nixpkgs-unstable.legacyPackages."${pkgs.system}".umu-launcher
# I'm not sure this actually accomplishes anything, even with PROTON_MEDIA_USE_GST=1
# (umu-launcher.override {
# extraPkgs = pkgs: with pkgs.gst_all_1; [
# gstreamer
# gst-plugins-base
# gst-plugins-good
# gst-plugins-bad
# gst-plugins-ugly
# gst-libav
# gst-vaapi
# ];
# })
bottles bottles
(heroic.override { (heroic.override {
extraPkgs = pkgs: [ extraPkgs = pkgs: [
pkgs.gamescope pkgs.gamescope
]; ];
}) })
(umu-launcher.override {
extraPkgs = pkgs: with pkgs.gst_all_1; [
gstreamer
gst-plugins-base
gst-plugins-good
gst-plugins-bad
gst-plugins-ugly
gst-libav
gst-vaapi
];
})
# Steam # Steam
steamguard-cli steamguard-cli