- lockfile updated
- Working with Hydra
- Emacs packages
- Workaround for nix/git
This commit is contained in:
Andrea Ciceri 2022-06-05 14:51:20 +02:00
parent 28f14cab2e
commit 3411b09ab0
No known key found for this signature in database
GPG key ID: A1FC89532D1C5654
5 changed files with 36 additions and 7 deletions

View file

@ -130,7 +130,6 @@
transmission = { transmission = {
enable = true; enable = true;
port = 9091;
# the following json is merged to this attrset, it must have `rpc-username` and `rpc-password` # the following json is merged to this attrset, it must have `rpc-username` and `rpc-password`
credentialsFile = "/mnt/archivio/transmission/credentials.json"; credentialsFile = "/mnt/archivio/transmission/credentials.json";
settings = { settings = {
@ -138,6 +137,7 @@
incomplete-dir = "/mnt/archivio/transmission/.incomplete"; incomplete-dir = "/mnt/archivio/transmission/.incomplete";
incomplete-dir-enabled = true; incomplete-dir-enabled = true;
rpc-port = 9091;
rpc-whitelist-enabled = false; rpc-whitelist-enabled = false;
rpc-host-whitelist-enabled = false; rpc-host-whitelist-enabled = false;
rpc-authentication-required = true; rpc-authentication-required = true;
@ -268,7 +268,7 @@
ydnsUpdater = pkgs.writeScriptBin "ydnsUpdater" '' ydnsUpdater = pkgs.writeScriptBin "ydnsUpdater" ''
#!${pkgs.stdenv.shell} #!${pkgs.stdenv.shell}
USER="andrea.ciceri@autistici.org" USER="andrea.ciceri@autistici.org"
PASSWORD=$(${pkgs.stdenv}/bin/cat /home/ccr/.ydns-password) PASSWORD=$(cat /home/ccr/.ydns-password)
DOMAIN="ccr.ydns.eu" DOMAIN="ccr.ydns.eu"
for SUBDOMAIN in "books" "music" "sync" "torrent" "gate" "cam" for SUBDOMAIN in "books" "music" "sync" "torrent" "gate" "cam"

View file

@ -68,11 +68,22 @@
}; };
systemd.services.nix-daemon.serviceConfig = { systemd.services.nix-daemon.serviceConfig = {
LimitNOFILE = lib.mkForce 131072; # should help with fds errors due to experimental feature `ca-derivations` LimitNOFILE = lib.mkForce "Infinity"; # 131072; # should help with fds errors due to experimental feature `ca-derivations`
}; };
networking.firewall = { networking.firewall = {
enable = true; enable = true;
allowPing = true; allowPing = true;
}; };
services.hydra = {
enable = true;
hydraURL = "http://localhost:3000"; # externally visible URL
notificationSender = "hydra@localhost"; # e-mail of hydra service
# a standalone hydra will require you to unset the buildMachinesFiles list to avoid using a nonexistant /etc/nix/machines
buildMachinesFiles = [ ];
# you will probably also want, otherwise *everything* will be built from scratch
useSubstitutes = true;
};
} }

View file

@ -9,6 +9,12 @@ emacsWithPackages (
) ++ ( ) ++ (
with epkgs.melpaPackages; [ with epkgs.melpaPackages; [
aggressive-indent aggressive-indent
pkgs.emacs28Packages.tree-sitter-langs
tree-sitter
# ts-fold
tree-edit
evil-tree-edit
pkgs.emacs28Packages.tsc
all-the-icons all-the-icons
company company
company-nixos-options company-nixos-options

View file

@ -8,27 +8,28 @@ in
environment = { environment = {
systemPackages = with pkgs; [ systemPackages = with pkgs; [
#skim
bat bat
bat-extras.batman bat-extras.batman
binutils binutils
bottom
coreutils coreutils
curl curl
dnsutils dnsutils
dosfstools dosfstools
fd fd
git git
htop
glances glances
bottom
gptfdisk gptfdisk
htop
iputils iputils
jq jq
lsof
manix manix
moreutils moreutils
nix-index nix-index
nmap nmap
ripgrep ripgrep
#skim
tealdeer tealdeer
tmux tmux
usbutils usbutils
@ -59,7 +60,7 @@ in
autoOptimiseStore = true; autoOptimiseStore = true;
useSandbox = true; useSandbox = true;
allowedUsers = [ "@wheel" ]; allowedUsers = [ "@wheel" ];
trustedUsers = [ "root" "@wheel" ]; trustedUsers = [ "root" "@wheel" "hydra" "hydra-www" ];
}; };
services.earlyoom.enable = true; services.earlyoom.enable = true;

View file

@ -5,4 +5,15 @@
password = "nixos"; password = "nixos";
shell = pkgs.zsh; shell = pkgs.zsh;
}; };
# FIXME: (temporary?) workaround for https://github.com/NixOS/nixpkgs/issues/169193
home-manager.users.ccr.programs.git = {
enable = true;
extraConfig.safe.directory = "/home/ccr/fleet";
};
home-manager.users.root.programs.git = {
enable = true;
extraConfig.safe.directory = "/home/ccr/fleet";
};
} }