diff options
author | Kjetil Orbekk <kj@orbekk.com> | 2021-07-13 06:40:15 -0400 |
---|---|---|
committer | Kjetil Orbekk <kj@orbekk.com> | 2021-07-13 06:40:15 -0400 |
commit | 4976aa8b1a3e621917dd0bfed9ce872724f47a4f (patch) | |
tree | 9620883268f2b1313bc4f641e470ab8b39e24016 | |
parent | a398adbe9ac0f183b175fa91d7e8002bf60d1c1b (diff) |
update
-rw-r--r-- | flake.lock | 18 | ||||
-rw-r--r-- | modules/common.nix | 31 |
2 files changed, 23 insertions, 26 deletions
@@ -7,11 +7,11 @@ ] }, "locked": { - "lastModified": 1625694413, - "narHash": "sha256-goRLk1I/OMclS9i17g932wyHyjiKI+htbuFIWIkzTbw=", + "lastModified": 1626073055, + "narHash": "sha256-vocByfpVu6m9zvtJugDvmd6/9iT2HJuG4tmDICKd0lI=", "owner": "rycee", "repo": "home-manager", - "rev": "06ee8ec8dfc4554c374052cd7b7083765748af99", + "rev": "775cb20bd4af7781fbf336fb201df02ee3d544bb", "type": "github" }, "original": { @@ -39,11 +39,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1625692408, - "narHash": "sha256-e9L3TLLDVIJpMnHtiNHJE62oOh6emRtSZ244bgYJUZs=", + "lastModified": 1626117186, + "narHash": "sha256-KSVWpb03y2QootRxAG4RwTI14RUn1vmz/yRgVlDJRpk=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "c06613c25df3fe1dd26243847a3c105cf6770627", + "rev": "a7512bb64b1dd693c97b1219c24032d28f20f9e8", "type": "github" }, "original": { @@ -55,11 +55,11 @@ }, "nixpkgs-unstable": { "locked": { - "lastModified": 1625598452, - "narHash": "sha256-Oqh7nuZfEk+nkspGN5MS5ZTJ3dSxsUudTRvY/iUFad8=", + "lastModified": 1626046891, + "narHash": "sha256-Zt8saH+hAehXskW0iFAzk+iMillYoFBxvLReYNqGT9E=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "00c86ad14639887ec495b92ada9cd93a75317686", + "rev": "d8f8f31af9d77a48220e4e8a301d1e79774cb7d2", "type": "github" }, "original": { diff --git a/modules/common.nix b/modules/common.nix index fc99648..28e9da1 100644 --- a/modules/common.nix +++ b/modules/common.nix @@ -1,5 +1,4 @@ -{ config, lib, pkgs, ... }: -{ +{ config, lib, pkgs, ... }: { programs.zsh.enable = true; programs.tmux.enable = true; @@ -8,7 +7,9 @@ keycloak = pkgs.callPackage ../pkgs/keycloak/default.nix { }; }; - users.users.root.openssh.authorizedKeys.keys = ["ssh-rsa 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 cardno:000605483586"]; + users.users.root.openssh.authorizedKeys.keys = [ + "ssh-rsa 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 cardno:000605483586" + ]; networking.networkmanager.unmanaged = [ "interface-name:wg*" ]; @@ -59,33 +60,29 @@ whois zoxide (rWrapper.override { - packages = with rPackages; [ - data_table - ggplot2 - hms - viridis - lubridate - ]; + packages = with rPackages; [ data_table ggplot2 hms viridis lubridate ]; }) ]; time.timeZone = "America/New_York"; services = { - postgresql = { - package = pkgs.postgresql_12; - }; + postgresql = { package = pkgs.postgresql_12; }; openssh.passwordAuthentication = false; openssh.challengeResponseAuthentication = false; }; + systemd.services.nix-gc.serviceConfig = { + Nice = 19; + IOSchedulingPriority = 7; + IOSchedulingClass = "best-effort"; + }; + nix = rec { useSandbox = lib.mkDefault true; maxJobs = lib.mkOverride 110 16; - buildCores = lib.mkDefault 0; # auto configure + buildCores = lib.mkDefault 0; # auto configure gc.automatic = lib.mkDefault true; - trustedBinaryCaches = [ - "https://cache.nixos.org" - ]; + trustedBinaryCaches = [ "https://cache.nixos.org" ]; binaryCaches = trustedBinaryCaches; daemonNiceLevel = 10; daemonIONiceLevel = 10; |