Skip to content

Commit

Permalink
update: lock
Browse files Browse the repository at this point in the history
  • Loading branch information
jz8132543 committed Jun 13, 2024
1 parent 790311a commit 4242959
Show file tree
Hide file tree
Showing 14 changed files with 374 additions and 475 deletions.
628 changes: 256 additions & 372 deletions flake.lock

Large diffs are not rendered by default.

1 change: 0 additions & 1 deletion flake.nix
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,6 @@
pre-commit-hooks-nix = {
url = "github:cachix/pre-commit-hooks.nix";
inputs.flake-compat.follows = "flake-compat";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
inputs.nixpkgs-stable.follows = "nixpkgs";
inputs.gitignore.follows = "gitignore-nix";
Expand Down
1 change: 1 addition & 0 deletions home-manager/modules/desktop/apps.nix
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
}: {
home.packages = with pkgs; [
tdesktop
ffmpeg
thunderbird
neovide
okular
Expand Down
2 changes: 1 addition & 1 deletion home-manager/modules/desktop/gnome.nix
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
toTitle = str: "${lib.toUpper (lib.substring 0 1 str)}${lib.substring 1 (lib.stringLength str) str}";
orchis-theme = pkgs.orchis-theme.override {
tweaks = [config.home.catppuccin.tweak];
withWallpapers = true;
# withWallpapers = true;
};
catppuccin-kvantum =
pkgs.catppuccin-kvantum.override
Expand Down
2 changes: 1 addition & 1 deletion home-manager/modules/tippy/nvim.nix
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
}: {
programs.neovim = {
enable = true;
package = pkgs.neovim-nightly;
# package = pkgs.neovim-nightly;
viAlias = false;
vimAlias = true;
vimdiffAlias = true;
Expand Down
3 changes: 2 additions & 1 deletion nixos/hosts/arx8/hardware-configuration.nix
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,8 @@ in {
device = lib.mkForce "nodev";
efiInstallAsRemovable = lib.mkForce false;
# useOSProber = true;
default = 0;
default = 1;
# default = "saved";
# gfxmodeEfi = lib.mkForce "1280x800";
extraEntries = ''
menuentry "Windows" {
Expand Down
1 change: 0 additions & 1 deletion nixos/modules/base/baseline-apps.nix
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,6 @@
};

environment.systemPackages = with pkgs; [
nixVersions.unstable
curlFull
wget
neofetch
Expand Down
34 changes: 24 additions & 10 deletions nixos/modules/base/dns-client.nix
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ in {
else [];
}
else {};
dnscrypt-proxy2 = {
dnscrypt-proxy2 = rec {
enable = lib.mkDefault false;
settings = {
listen_addresses = ["127.0.0.55:53"];
Expand All @@ -48,23 +48,37 @@ in {
# fallback_resolvers = ["1.1.1.1:53" "1.0.0.1:53" "119.29.29.29:53" "223.5.5.5:53"];
cache = true;

sources.public-resolvers = {
urls = [
"https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md"
"https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md"
];
cache_file = "/var/lib/dnscrypt-proxy/public-resolvers.md";
minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3";
sources = {};
# sources = {
# public-resolvers.urls = [];
# relays.urls = [];
# };

# sources.public-resolvers = {
# urls = [
# "https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md"
# "https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md"
# ];
# cache_file = "/var/lib/dnscrypt-proxy/public-resolvers.md";
# minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3";
# };
static = {
quad9-doh-ip4-port5053-filter-pri.stamp = "sdns://AgMAAAAAAAAABzkuOS45LjkgKhX11qy258CQGt5Ou8dDsszUiQMrRuFkLwaTaDABJYoTZG5zOS5xdWFkOS5uZXQ6NTA1MwovZG5zLXF1ZXJ5";
quad9-doh-ip4-port443-filter-pri.stamp = "sdns://AgMAAAAAAAAABzkuOS45LjkgKhX11qy258CQGt5Ou8dDsszUiQMrRuFkLwaTaDABJYoSZG5zOS5xdWFkOS5uZXQ6NDQzCi9kbnMtcXVlcnk";
quad9-doh-ip6-port5053-filter-pri.stamp = "sdns://AgMAAAAAAAAADVsyNjIwOmZlOjpmZV0gKhX11qy258CQGt5Ou8dDsszUiQMrRuFkLwaTaDABJYoSZG5zLnF1YWQ5Lm5ldDo1MDUzCi9kbnMtcXVlcnk";
quad9-doh-ip6-port443-filter-pri.stamp = "sdns://AgMAAAAAAAAADVsyNjIwOmZlOjpmZV0gKhX11qy258CQGt5Ou8dDsszUiQMrRuFkLwaTaDABJYoRZG5zLnF1YWQ5Lm5ldDo0NDMKL2Rucy1xdWVyeQ";
iij.stamp = "sdns://AgcAAAAAAAAACjEwMy4yLjU3LjYAEXB1YmxpYy5kbnMuaWlqLmpwCi9kbnMtcXVlcnk";
};

# You can choose a specific set of servers from https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v3/public-resolvers.md
server_names = [
"cloudflare"
"google"
# "cloudflare"
# "google"
"quad9-doh-ip4-port5053-filter-pri"
"quad9-doh-ip4-port443-filter-pri"
"quad9-doh-ip6-port5053-filter-pri"
"quad9-doh-ip6-port443-filter-pri"
"iij"
# "cloudflare-security-ipv6"
# "doh-crypto-sx"
# "alidns-doh"
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/base/nix.nix
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
};
settings = {
nix-path = ["nixpkgs=${inputs.nixpkgs}"];
experimental-features = ["nix-command" "flakes" "auto-allocate-uids" "cgroups" "repl-flake"];
experimental-features = ["nix-command" "flakes" "auto-allocate-uids" "cgroups"];
system-features = ["nixos-test" "benchmark" "big-parallel" "kvm"];
auto-allocate-uids = true;
use-cgroups = true;
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/base/nixpkgs.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
}: let
packages = [
inputs.sops-nix.overlays.default
inputs.neovim-nightly-overlay.overlay
# inputs.neovim-nightly-overlay.overlay
# inputs.nixd.overlays.default
# inputs.nvfetcher.overlays.default
(
Expand Down
1 change: 1 addition & 0 deletions nixos/modules/base/tailscale.nix
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,7 @@ in {

systemd.services.tailscaled = {
before = ["network.target"];
after = ["dnscrypt-proxy2.service" "systemd-resolved.service"];
serviceConfig = {
Restart = "always";
TimeoutStopSec = "5s";
Expand Down
File renamed without changes.
2 changes: 1 addition & 1 deletion nixos/modules/services/mail/postfix.nix
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ in {
prometheus.urls = ["http://localhost:11334/metrics"];
};

boot.kernel.sysctl."vm.overcommit_memory" = 1;
boot.kernel.sysctl."vm.overcommit_memory" = lib.mkForce 1;

services.redis.servers.rspamd = {
enable = true;
Expand Down
Loading

0 comments on commit 4242959

Please sign in to comment.