Compare commits

..

24 Commits

Author SHA1 Message Date
3ea8a7ade9 lkjdsalkjlkjsa 2026-04-12 01:29:33 +02:00
8e4e251ba2 kjasdkjads 2026-04-12 01:29:04 +02:00
ae9dcd5b67 crosspipe is not on 25.11 2026-03-18 02:04:58 +01:00
63b4a12662 x-men gone wild 2026-03-18 02:04:38 +01:00
9aeea70eb7 flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager-2511':
    'github:nix-community/home-manager/a07a44a839eb036e950bf397d9b782916f8dcab3?narHash=sha256-8C%2By46xA9bxcchj9GeDPJaRUDApaA3sy2fhJr1bTbUw%3D' (2026-03-01)
  → 'github:nix-community/home-manager/0759e0e137305bc9d0c52c204c6d8dffe6f601a6?narHash=sha256-o8hrZrigP0JYcwnglCp8Zi8jQafWsxbDtRRPzuVwFxY%3D' (2026-03-16)
• Updated input 'home-manager-edge':
    'github:nix-community/home-manager/e5b1f87841810fc24772bf4389f9793702000c9b?narHash=sha256-BVVyAodLcAD8KOtR3yCStBHSE0WAH/xQWH9f0qsxbmk%3D' (2025-12-08)
  → 'github:nix-community/home-manager/57d5560ee92a424fb71fde800acd6ed2c725dfce?narHash=sha256-%2BbRqxoFCJFO9ZTFhcCkzNXbDT3b8AEk88fyjB7Is6eo%3D' (2026-03-16)
• Updated input 'nix-index-database':
    'github:Mic92/nix-index-database/82befcf7dc77c909b0f2a09f5da910ec95c5b78f?narHash=sha256-d3NBA9zEtBu2JFMnTBqWj7Tmi7R5OikoU2ycrdhQEws%3D' (2025-12-09)
  → 'github:Mic92/nix-index-database/8faeb68130df077450451b6734a221ba0d6cde42?narHash=sha256-mHSRNrT1rjeYBgkAlj07dW3%2B1nFEgAd8Gu6lgyfT9DU%3D' (2026-03-15)
• Updated input 'nixos-generators-2405':
    'github:nix-community/nixos-generators/032a1878682fafe829edfcf5fdfad635a2efe748?narHash=sha256-NHF7QWa0ZPT8hsJrvijREW3%2BnifmF2rTXgS2v0tpcEA%3D' (2025-11-27)
  → 'github:nix-community/nixos-generators/8946737ff703382fda7623b9fab071d037e897d5?narHash=sha256-nnVmNNKBi1YiBNPhKclNYDORoHkuKipoz7EtVnXO50A%3D' (2026-01-30)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/41c6b421bdc301b2624486e11905c9af7b8ec68e?narHash=sha256-qwcDBtrRvJbrrnv1lf/pREQi8t2hWZxVAyeMo7/E9sw%3D' (2026-02-24)
  → 'github:NixOS/nixos-hardware/f8e82243fd601afb9f59ad230958bd073795cbfe?narHash=sha256-qonGfS2lzCgCl59Zl63jF6dIRRpvW3AJooBGMaXjHiY%3D' (2026-03-15)
• Updated input 'nixpkgs-2511':
    'https://releases.nixos.org/nixos/25.11/nixos-25.11.6561.1267bb4920d0/nixexprs.tar.xz?narHash=sha256-8rDP2AfBFi0DI9idtlWeK73XWJScPvwgokuYkSnVY/Y%3D' (2026-02-25)
  → 'https://releases.nixos.org/nixos/25.11/nixos-25.11.7702.48652e9d5aea/nixexprs.tar.xz?narHash=sha256-HrGloA/j2MflqpYyyq2xeOYCQTk4eUIR7LfqXkW8bec%3D' (2026-03-16)
• Updated input 'nixpkgs-edge':
    'https://releases.nixos.org/nixos/unstable/nixos-26.05pre955442.dd9b079222d4/nixexprs.tar.xz?narHash=sha256-UCaQQ8zmHUocQIgCl%2B53Jj6NuwqrVKtmv7obE9r6wnw%3D' (2026-02-27)
  → 'https://releases.nixos.org/nixos/unstable/nixos-26.05pre963917.5b2c2d84341b/nixexprs.tar.xz?narHash=sha256-VZOCgpW2WxpWrw4ZNwgA%2B9MZ/QNTYM2iNTiBMxaTX00%3D' (2026-03-16)
• Updated input 'sops-nix-2305':
    'github:Mic92/sops-nix/7fd1416aba1865eddcdec5bb11339b7222c2363e?narHash=sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4%3D' (2025-12-08)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-2311':
    'github:Mic92/sops-nix/7fd1416aba1865eddcdec5bb11339b7222c2363e?narHash=sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4%3D' (2025-12-08)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-2405':
    'github:Mic92/sops-nix/7fd1416aba1865eddcdec5bb11339b7222c2363e?narHash=sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4%3D' (2025-12-08)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-2411':
    'github:Mic92/sops-nix/7fd1416aba1865eddcdec5bb11339b7222c2363e?narHash=sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4%3D' (2025-12-08)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-2505':
    'github:Mic92/sops-nix/d8be5ea4cd3bc363492ab5bc6e874ccdc5465fe4?narHash=sha256-YHykQg0h9hrlZGpMcywnaFzQ1Kn/5YNCCOSaaAl6z7Q%3D' (2026-03-01)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-2511':
    'github:Mic92/sops-nix/d8be5ea4cd3bc363492ab5bc6e874ccdc5465fe4?narHash=sha256-YHykQg0h9hrlZGpMcywnaFzQ1Kn/5YNCCOSaaAl6z7Q%3D' (2026-03-01)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'sops-nix-edge':
    'github:Mic92/sops-nix/7fd1416aba1865eddcdec5bb11339b7222c2363e?narHash=sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4%3D' (2025-12-08)
  → 'github:Mic92/sops-nix/8237de83e8200d16fe0c4467b02a1c608ff28044?narHash=sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968%3D' (2026-03-16)
• Updated input 'system-manager-edge':
    'github:numtide/system-manager/a0343ab10763fbbfcf8d3b69c8341c18b1b1f215?narHash=sha256-m6etiBLSMajunnbUvEI1Pc/jNu4naImalgQnctVJ1/k%3D' (2025-11-27)
  → 'github:numtide/system-manager/06c040b8712e78c417824af9a4d5b35d295c429b?narHash=sha256-gAlzRG8sNJpmgmnhE/yOQP4nn0Z2DkWYDFAwH9fexEg%3D' (2026-03-17)
• Added input 'system-manager-edge/flake-compat':
    'github:edolstra/flake-compat/5edf11c44bc78a0d334f6334cdaf7d60d732daab?narHash=sha256-vNpUSpF5Nuw8xvDLj2KCwwksIbjua2LZCqhV1LNRDns%3D' (2025-12-29)
• Added input 'system-manager-edge/userborn':
    'github:jfroche/userborn/55c2cd7952c207a62736a5bbd9499ea73da18d24?narHash=sha256-q2pnlX2IW0kg80GLFnwWd/GigIpkuZnyKPLhrgJql3E%3D' (2026-02-06)
• Added input 'system-manager-edge/userborn/flake-compat':
    follows 'system-manager-edge/flake-compat'
• Added input 'system-manager-edge/userborn/flake-parts':
    'github:hercules-ci/flake-parts/80daad04eddbbf5a4d883996a73f3f542fa437ac?narHash=sha256-PVvu7OqHBGWN16zSi6tEmPwwHQ4rLPU9Plvs8/1TUBY%3D' (2026-01-11)
• Added input 'system-manager-edge/userborn/flake-parts/nixpkgs-lib':
    follows 'system-manager-edge/userborn/nixpkgs'
• Added input 'system-manager-edge/userborn/nixpkgs':
    follows 'system-manager-edge/nixpkgs'
• Added input 'system-manager-edge/userborn/pre-commit-hooks-nix':
    'github:cachix/pre-commit-hooks.nix/a1ef738813b15cf8ec759bdff5761b027e3e1d23?narHash=sha256-Efs3VUPelRduf3PpfPP2ovEB4CXT7vHf8W%2Bxc49RL/U%3D' (2026-01-22)
• Added input 'system-manager-edge/userborn/pre-commit-hooks-nix/flake-compat':
    follows 'system-manager-edge/userborn/flake-compat'
• Added input 'system-manager-edge/userborn/pre-commit-hooks-nix/gitignore':
    'github:hercules-ci/gitignore.nix/637db329424fd7e46cf4185293b9cc8c88c95394?narHash=sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs%3D' (2024-02-28)
• Added input 'system-manager-edge/userborn/pre-commit-hooks-nix/gitignore/nixpkgs':
    follows 'system-manager-edge/userborn/pre-commit-hooks-nix/nixpkgs'
• Added input 'system-manager-edge/userborn/pre-commit-hooks-nix/nixpkgs':
    follows 'system-manager-edge/userborn/nixpkgs'
• Added input 'system-manager-edge/userborn/systems':
    'github:nix-systems/default/da67096a3b9bf56a91d16901293e51ba5b49a27e?narHash=sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768%3D' (2023-04-09)
2026-03-18 00:20:30 +01:00
9244be1000 xorg no more 2026-03-17 23:57:07 +01:00
f470ab0740 wineWow slooooow 2026-03-17 23:23:31 +01:00
b90021e245 weekly 2026-03-17 23:23:12 +01:00
51c454b252 lkajdslkajds 2026-03-17 22:00:13 +01:00
0b84c5dd81 løasdjkladljk 2026-03-08 12:14:06 +01:00
4a171162ac lasdjklasdjkl 2026-03-08 12:13:25 +01:00
f449492b3d dfhjlkø 2026-03-01 23:40:36 +01:00
6f5b29c29e lkjdsadsaljdsa 2026-02-19 12:37:31 +01:00
6d889acf93 pip 2026-02-16 14:56:13 +01:00
d0b56282a3 lkajsdlakjds 2026-02-11 00:20:11 +01:00
fae73cba53 ljsadljkasdljk 2026-02-07 19:17:02 +01:00
f96ed65c50 prep nord for gtx 1080 2026-02-07 19:17:02 +01:00
bc2398140d lkjdsalkjadslkj 2026-01-25 19:32:15 +01:00
4d86def5ff kjdsjkasdk 2026-01-19 03:23:40 +01:00
e9d84f5633 ljasdkljasdjl 2026-01-19 03:12:51 +01:00
b307921b52 ljasdkljadsljk 2026-01-19 03:12:18 +01:00
b6a9b02b85 ljasdljkasdljk 2026-01-19 03:02:20 +01:00
c198489f59 27;5;13~ljasdasdjkl 2026-01-19 01:38:08 +01:00
647f1754d0 ng gone 2026-01-19 01:38:07 +01:00
37 changed files with 474 additions and 197 deletions

3
.envrc
View File

@@ -19,7 +19,8 @@ fi
# ensure (dirty) updated flake lock
# TODO: cache this on gitea? Run in background?
now="$(date +%Y-%m-%d)"
# now="$(date +%Y-%m-%d)" # daily
now="$(date +%Y-%m--%V)" # weekly
if [[ ! -d .direnv/tmp ]]; then
mkdir -p .direnv/tmp
elif command -v find >/dev/null; then

239
flake.lock generated
View File

@@ -1,5 +1,66 @@
{
"nodes": {
"flake-compat": {
"flake": false,
"locked": {
"lastModified": 1767039857,
"narHash": "sha256-vNpUSpF5Nuw8xvDLj2KCwwksIbjua2LZCqhV1LNRDns=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "5edf11c44bc78a0d334f6334cdaf7d60d732daab",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": [
"system-manager-edge",
"userborn",
"nixpkgs"
]
},
"locked": {
"lastModified": 1768135262,
"narHash": "sha256-PVvu7OqHBGWN16zSi6tEmPwwHQ4rLPU9Plvs8/1TUBY=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "80daad04eddbbf5a4d883996a73f3f542fa437ac",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
"system-manager-edge",
"userborn",
"pre-commit-hooks-nix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
@@ -133,11 +194,11 @@
]
},
"locked": {
"lastModified": 1765170903,
"narHash": "sha256-O8VTGey1xxiRW+Fpb+Ps9zU7ShmxUA1a7cMTcENCVNg=",
"lastModified": 1773681845,
"narHash": "sha256-o8hrZrigP0JYcwnglCp8Zi8jQafWsxbDtRRPzuVwFxY=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "20561be440a11ec57a89715480717baf19fe6343",
"rev": "0759e0e137305bc9d0c52c204c6d8dffe6f601a6",
"type": "github"
},
"original": {
@@ -154,11 +215,11 @@
]
},
"locked": {
"lastModified": 1765217760,
"narHash": "sha256-BVVyAodLcAD8KOtR3yCStBHSE0WAH/xQWH9f0qsxbmk=",
"lastModified": 1773681856,
"narHash": "sha256-+bRqxoFCJFO9ZTFhcCkzNXbDT3b8AEk88fyjB7Is6eo=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "e5b1f87841810fc24772bf4389f9793702000c9b",
"rev": "57d5560ee92a424fb71fde800acd6ed2c725dfce",
"type": "github"
},
"original": {
@@ -289,11 +350,11 @@
]
},
"locked": {
"lastModified": 1765267181,
"narHash": "sha256-d3NBA9zEtBu2JFMnTBqWj7Tmi7R5OikoU2ycrdhQEws=",
"lastModified": 1773552174,
"narHash": "sha256-mHSRNrT1rjeYBgkAlj07dW3+1nFEgAd8Gu6lgyfT9DU=",
"owner": "Mic92",
"repo": "nix-index-database",
"rev": "82befcf7dc77c909b0f2a09f5da910ec95c5b78f",
"rev": "8faeb68130df077450451b6734a221ba0d6cde42",
"type": "github"
},
"original": {
@@ -423,11 +484,11 @@
]
},
"locked": {
"lastModified": 1764234087,
"narHash": "sha256-NHF7QWa0ZPT8hsJrvijREW3+nifmF2rTXgS2v0tpcEA=",
"lastModified": 1769813415,
"narHash": "sha256-nnVmNNKBi1YiBNPhKclNYDORoHkuKipoz7EtVnXO50A=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "032a1878682fafe829edfcf5fdfad635a2efe748",
"rev": "8946737ff703382fda7623b9fab071d037e897d5",
"type": "github"
},
"original": {
@@ -438,11 +499,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1764440730,
"narHash": "sha256-ZlJTNLUKQRANlLDomuRWLBCH5792x+6XUJ4YdFRjtO4=",
"lastModified": 1773533765,
"narHash": "sha256-qonGfS2lzCgCl59Zl63jF6dIRRpvW3AJooBGMaXjHiY=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "9154f4569b6cdfd3c595851a6ba51bfaa472d9f3",
"rev": "f8e82243fd601afb9f59ad230958bd073795cbfe",
"type": "github"
},
"original": {
@@ -603,11 +664,11 @@
},
"nixpkgs-2505": {
"locked": {
"lastModified": 1764939437,
"narHash": "sha256-Tg7LvvCBIZu3zlWj8wZBRwA3lQn97DAKqQxoCg8hUbY=",
"rev": "00d2457e2f608b4be6fe8b470b0a36816324b0ae",
"lastModified": 1767313136,
"narHash": "sha256-3zSML8xJhOT2kRBCNUpniZSCeCBCPA3KGsRYh+KdtbU=",
"rev": "ac62194c3917d5f474c1a844b6fd6da2db95077d",
"type": "tarball",
"url": "https://releases.nixos.org/nixos/25.05/nixos-25.05.813449.00d2457e2f60/nixexprs.tar.xz"
"url": "https://releases.nixos.org/nixos/25.05/nixos-25.05.813814.ac62194c3917/nixexprs.tar.xz"
},
"original": {
"type": "tarball",
@@ -616,11 +677,11 @@
},
"nixpkgs-2511": {
"locked": {
"lastModified": 1764983851,
"narHash": "sha256-pyyfJp6Q80D0YhEuuP/qzasUZjoK3C3PrCp8BPWcDZE=",
"rev": "d9bc5c7dceb30d8d6fafa10aeb6aa8a48c218454",
"lastModified": 1773705440,
"narHash": "sha256-HrGloA/j2MflqpYyyq2xeOYCQTk4eUIR7LfqXkW8bec=",
"rev": "48652e9d5aea46e555b3df87354280d4f29cd3a3",
"type": "tarball",
"url": "https://releases.nixos.org/nixos/25.11/nixos-25.11.1056.d9bc5c7dceb3/nixexprs.tar.xz"
"url": "https://releases.nixos.org/nixos/25.11/nixos-25.11.7702.48652e9d5aea/nixexprs.tar.xz"
},
"original": {
"type": "tarball",
@@ -677,11 +738,11 @@
},
"nixpkgs-edge": {
"locked": {
"lastModified": 1764950072,
"narHash": "sha256-lft4/rbh1nFSjHqQatxPEq3n68+iH7QmT5Tqr784e0Q=",
"rev": "f61125a668a320878494449750330ca58b78c557",
"lastModified": 1773646010,
"narHash": "sha256-VZOCgpW2WxpWrw4ZNwgA+9MZ/QNTYM2iNTiBMxaTX00=",
"rev": "5b2c2d84341b2afb5647081c1386a80d7a8d8605",
"type": "tarball",
"url": "https://releases.nixos.org/nixos/unstable/nixos-26.05pre907002.f61125a668a3/nixexprs.tar.xz"
"url": "https://releases.nixos.org/nixos/unstable/nixos-26.05pre963917.5b2c2d84341b/nixexprs.tar.xz"
},
"original": {
"type": "tarball",
@@ -898,6 +959,34 @@
"type": "gitlab"
}
},
"pre-commit-hooks-nix": {
"inputs": {
"flake-compat": [
"system-manager-edge",
"userborn",
"flake-compat"
],
"gitignore": "gitignore",
"nixpkgs": [
"system-manager-edge",
"userborn",
"nixpkgs"
]
},
"locked": {
"lastModified": 1769069492,
"narHash": "sha256-Efs3VUPelRduf3PpfPP2ovEB4CXT7vHf8W+xc49RL/U=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"rev": "a1ef738813b15cf8ec759bdff5761b027e3e1d23",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"type": "github"
}
},
"root": {
"inputs": {
"home-manager-2305": "home-manager-2305",
@@ -995,11 +1084,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1015,11 +1104,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1035,11 +1124,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1055,11 +1144,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1075,11 +1164,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1095,11 +1184,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1115,11 +1204,11 @@
]
},
"locked": {
"lastModified": 1765231718,
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
"lastModified": 1773698643,
"narHash": "sha256-VCiDjE8kNs8uCAK73Ezk1r3fFuc4JepvW07YFqaN968=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
"rev": "8237de83e8200d16fe0c4467b02a1c608ff28044",
"type": "github"
},
"original": {
@@ -1130,16 +1219,18 @@
},
"system-manager-edge": {
"inputs": {
"flake-compat": "flake-compat",
"nixpkgs": [
"nixpkgs-edge"
]
],
"userborn": "userborn"
},
"locked": {
"lastModified": 1764233885,
"narHash": "sha256-m6etiBLSMajunnbUvEI1Pc/jNu4naImalgQnctVJ1/k=",
"lastModified": 1773768987,
"narHash": "sha256-gAlzRG8sNJpmgmnhE/yOQP4nn0Z2DkWYDFAwH9fexEg=",
"owner": "numtide",
"repo": "system-manager",
"rev": "a0343ab10763fbbfcf8d3b69c8341c18b1b1f215",
"rev": "06c040b8712e78c417824af9a4d5b35d295c429b",
"type": "github"
},
"original": {
@@ -1147,6 +1238,50 @@
"repo": "system-manager",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"userborn": {
"inputs": {
"flake-compat": [
"system-manager-edge",
"flake-compat"
],
"flake-parts": "flake-parts",
"nixpkgs": [
"system-manager-edge",
"nixpkgs"
],
"pre-commit-hooks-nix": "pre-commit-hooks-nix",
"systems": "systems"
},
"locked": {
"lastModified": 1770377964,
"narHash": "sha256-q2pnlX2IW0kg80GLFnwWd/GigIpkuZnyKPLhrgJql3E=",
"owner": "jfroche",
"repo": "userborn",
"rev": "55c2cd7952c207a62736a5bbd9499ea73da18d24",
"type": "github"
},
"original": {
"owner": "jfroche",
"ref": "system-manager",
"repo": "userborn",
"type": "github"
}
}
},
"root": "root",

View File

@@ -5,6 +5,7 @@
# https://github.com/nixos/nixpkgs
nixpkgs-test.url = "github:NixOS/nixpkgs/refs/pull/379645/merge"; # for testing
nixpkgs-edge.url = "https://nixos.org/channels/nixos-unstable/nixexprs.tar.xz"; # len("edge") == 4
# remember to update ./profiles/auto-upgrade.nix
nixpkgs-2511.url = "https://nixos.org/channels/nixos-25.11/nixexprs.tar.xz";
nixpkgs-2505.url = "https://nixos.org/channels/nixos-25.05/nixexprs.tar.xz";
nixpkgs-2411.url = "https://nixos.org/channels/nixos-24.11/nixexprs.tar.xz"; # for old docs
@@ -231,6 +232,7 @@
{ pkgs, lib, ... }:
let
# TODO: by-name
# TODO: this filterAttrs seems to force the inputs to download
pbsdspkgs = lib.filterAttrs (_: lib.isDerivation) (
pkgs.appendOverlays
[
@@ -320,7 +322,7 @@
inherit (input-views.inputs-edge.system-manager-edge.packages.${system}) system-manager;
inherit (self.packages.${system}) nom-system-manager;
envrc-pkgs = [
self.packages.${system}.nom-nixos-rebuild
# self.packages.${system}.nom-nixos-rebuild
self.packages.${system}.nom-nixos-rebuild-ng
# self.packages.${system}.nom-home-manager
pkgs.nix-output-monitor
@@ -340,7 +342,7 @@
pkgs.rsync
]);
remoteenv = mkShell { } [
self.packages.${system}.nom-nixos-rebuild
# self.packages.${system}.nom-nixos-rebuild
self.packages.${system}.nom-nixos-rebuild-ng
# self.packages.${system}.nom-home-manager
pkgs.age

View File

@@ -28,7 +28,7 @@ let
inputs.sops-nix.homeManagerModules.sops
(
inputs.nix-index-database.homeModules.nix-index
or inputs.nix-index-database.hmModules.nix-index # TODO: old attrname
# or inputs.nix-index-database.hmModules.nix-index # TODO: old attrname, remove
)
];
@@ -86,9 +86,9 @@ let
in builtins.mapAttrs (hostname: curried: curried hostname) {
#hostname "domain" "system" inputs "state" [ modules ... ]
# asgaut = mk "pbsds.net" "riscv64-linux" input-views.inputs-2405 "24.05" [ hw.starfive-visionfive-2 ];
# noximilien = mk "pbsds.net" "x86_64-linux" input-views.inputs-250T "24.11" [ ts1 au tse ];
noximilien = mk "pbsds.net" "x86_64-linux" input-views.inputs-2505 "25.05" [ ts1 au tse ];
nord = mk "pbsds.net" "x86_64-linux" input-views.inputs-2505 "25.05" [ ts1 au ];
# noximilien = mk "pbsds.net" "x86_64-linux" input-views.inputs-251T "24.11" [ ts1 au tse ];
noximilien = mk "pbsds.net" "x86_64-linux" input-views.inputs-2511 "25.05" [ ts1 au tse ];
nord = mk "pbsds.net" "x86_64-linux" input-views.inputs-2511 "25.05" [ ts1 au ];
sopp = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "25.05" [ ts1 au ];
bjarte = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "25.05" [ ts1 ];
bolle = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "25.05" [ ts2 au tse ];

View File

@@ -10,15 +10,6 @@
# zramSwap.enable = true;
# zramSwap.memoryPercent = 20;
# amdgpu audio fix when at 4k@60fps
boot.kernelPackages = pkgs.linuxPackages_latest;
services.displayManager.autoLogin.enable = true;
services.displayManager.autoLogin.user = "pbsds";
# tmp: https://github.com/NixOS/nixpkgs/issues/103746#issuecomment-945091229
systemd.services."getty@tty1".enable = false;
systemd.services."autovt@tty1".enable = false;
# for testing only, not for building
# boot.binfmt.addEmulatedSystemsToNixSandbox = false;
# boot.binfmt.emulatedSystems = [
@@ -29,12 +20,36 @@
# "x86_64-windows"
# ];
services.displayManager.autoLogin.enable = true;
services.displayManager.autoLogin.user = "pbsds";
# tmp: https://github.com/NixOS/nixpkgs/issues/103746#issuecomment-945091229
systemd.services."getty@tty1".enable = false;
systemd.services."autovt@tty1".enable = false;
# amdgpu audio fix when at 4k@60fps
# boot.kernelPackages = pkgs.linuxPackages_latest;
#boot.kernelPackages = pkgs.linuxPackages_latest;
#hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.latest;
#hardware.nvidia.package = config.boot.kernelPackages.nvidiaPackages.beta;
#hardware.nvidia.modesetting.enable = false; # makes atom behave, but mpv refuses to start
# The open source driver does not support Pascal GPUs (1080)
# https://github.com/NixOS/nixos-hardware/blob/master/common/gpu/nvidia/pascal/default.nix
hardware.nvidia.open = false;
# PRIME: (lspci)
#hardware.nvidia.prime.intelBusId = "PCI:0:02:0";
#hardware.nvidia.prime.nvidiaBusId = "PCI:1:00:0";
imports = [
./hardware-configuration.nix
inputs.nixos-hardware.nixosModules.common-pc
inputs.nixos-hardware.nixosModules.common-pc-ssd
inputs.nixos-hardware.nixosModules.common-cpu-intel-cpu-only
inputs.nixos-hardware.nixosModules.common-gpu-intel-sandy-bridge
# ../../../hardware/gpu/intel.nix
# ../../../hardware/gpu/cuda.nix
../../../hardware/gpu/rocm.nix
../../../hardware/gpu/zluda.nix
../../../hardware/printer/discover.nix
@@ -68,8 +83,9 @@
# ../../../profiles/desktop/waydroid.nix
../../../profiles/known-hosts
#../../../profiles/domeneshop-dyndns.nix # handled by noximilien
#../../../profiles/domeneshop-dyndns.nix
];
# services.domeneshop-updater.targets = [ config.networking.fqdn ];
nix.settings.max-jobs = 1; # this host do be stinky

View File

@@ -110,7 +110,8 @@
];
services.domeneshop-updater.targets = [
#"pbsds.net" # github bby!! TODO: remove
"olavtr.pbsds.net"
#"olavtr.pbsds.net" # KISS
config.networking.fqdn
"kuklef.se"
];

View File

@@ -50,7 +50,9 @@
inputs.nixos-hardware.nixosModules.common-cpu-intel
../../../hardware/gpu/intel.nix
../../../hardware/gpu/cuda.nix
# ../../../hardware/gpu/rocm.nix
../../../hardware/gpu/zluda.nix
# ../../../hardware/printer/discover.nix
../../../hardware/printer/hp-laserjet-p1005.nix
../../../hardware/printer/share.nix
@@ -81,8 +83,9 @@
../../../profiles/desktop/flatpak.nix
../../../profiles/known-hosts
#../../../profiles/domeneshop-dyndns.nix # handled by noximilien
#../../../profiles/domeneshop-dyndns.nix
];
# services.domeneshop-updater.targets = [ config.networking.fqdn ];
networking.firewall.allowedTCPPorts = [ 57621 ]; # spotify local discovery

View File

@@ -19,7 +19,7 @@ export FZF_DEFAULT_OPTS := "--height 15 --cycle --bind 'ctrl-a:toggle-all' " + e
set -x; nix eval --log-format raw ".#nixosConfigurations.\"$hostname\".pkgs.$attrpath" --show-trace "${@:3}"
repl $hostname=`just _a_host`:
NIX_NO_NOM=1 nixos-rebuild-ng --flake .#"$hostname" repl
NIX_NO_NOM=1 nixos-rebuild --flake .#"$hostname" repl
why-depends $hostname $attrpath:
nix why-depends .#nixosConfigurations."$hostname".config.system.build.toplevel .#nixosConfigurations."$hostname".pkgs."$attrpath"
@@ -32,11 +32,12 @@ report hostname=`just _a_host`:
reports:
nix eval .#nixosReports --json --show-trace | yq . --yaml-output --width=999999 | bat --language yaml --style plain --paging never
update:
# --option access-tokens ""
update *_:
git reset flake.lock
git restore flake.lock
git pull --rebase --autostash
nix flake update --commit-lock-file
nix flake update --commit-lock-file "$@"
@mkdir -p .direnv/
@printf "%s\n" "$(date +%Y-%m-%d)" > .direnv/pull-date
@@ -44,12 +45,12 @@ update:
git reset flake.lock
git restore flake.lock
nix eval --file flake.nix --apply 'x: builtins.attrNames x.inputs' --json \
| (printf "%s\n" --commit-lock-file; jq '.[]' -r | tr '0123456789' '9876543210' | sort | tr '0123456789' '9876543210' | grep -v "^self$") \
| (printf "%s\n" --commit-lock-file '--option access-tokens ""'; jq '.[]' -r | tr '0123456789' '9876543210' | sort | tr '0123456789' '9876543210' | grep -v "^self$") \
| gum choose --no-limit \
| xargs nix flake update
git add flake.lock
pull-dconf:
dconf-pull:
./users/pbsds/home/profiles/desktop/gnome/dconf-pull.sh
git diff ./users/pbsds/home/profiles/desktop/gnome/
-gum confirm "git add --patch?" --default=no \
@@ -57,6 +58,8 @@ pull-dconf:
-gum confirm "git checkout --path?" --default=no \
&& git checkout --patch ./users/pbsds/home/profiles/desktop/gnome/
alias pull-dconf := dconf-pull
# todo: support system-manager?
# todo: support nix-darwin?
# todo: support nixbsd?
@@ -67,7 +70,7 @@ build $hostname="" *_:
echo >&2 "WARNING(just): 'hostname' starts with '-', moving it to nix args..."
set -- "" "$@"; hostname=""
fi
set -x; nixos-rebuild-ng build --accept-flake-config --show-trace --flake .#"$hostname" "${@:2}"
set -x; nixos-rebuild build --accept-flake-config --show-trace --flake .#"$hostname" "${@:2}"
build-vm hostname=`just _a_host` *_:
#!/usr/bin/env -S bash -euo pipefail
@@ -75,7 +78,7 @@ build-vm hostname=`just _a_host` *_:
echo >&2 "WARNING(just): 'hostname' starts with '-', moving it to nix args..."
set -- "" "$@"; hostname=""
fi
set -x; nixos-rebuild-ng build-vm --accept-flake-config --show-trace --flake .#"$hostname" "${@:2}"
set -x; nixos-rebuild build-vm --accept-flake-config --show-trace --flake .#"$hostname" "${@:2}"
build-vm-and-run $hostname=`just _a_host` *_:
#!/usr/bin/env -S bash -euo pipefail
@@ -109,7 +112,7 @@ test *_:
elif [[ $# -gt 0 && "${1::1}" != "-" ]]; then
echo >&2 "WARNING(just): first arg does not start with "-", is it a hostname?"
fi
set -x; sudo nixos-rebuild-ng test --accept-flake-config --show-trace --flake . "$@"
set -x; sudo nixos-rebuild test --accept-flake-config --show-trace --flake . "$@"
switch *_:
#!/usr/bin/env -S bash -euo pipefail
@@ -118,7 +121,7 @@ switch *_:
elif [[ $# -gt 0 && "${1::1}" != "-" ]]; then
echo >&2 "WARNING(just): first arg does not start with "-", is it a hostname?"
fi
set -x; sudo nixos-rebuild-ng switch --accept-flake-config --show-trace --flake . "$@"
set -x; sudo nixos-rebuild switch --accept-flake-config --show-trace --flake . "$@"
boot *_:
#!/usr/bin/env -S bash -euo pipefail
@@ -127,7 +130,7 @@ boot *_:
elif [[ $# -gt 0 && "${1::1}" != "-" ]]; then
echo >&2 "WARNING(just): first arg does not start with "-", is it a hostname?"
fi
set -x; sudo nixos-rebuild-ng boot --accept-flake-config --show-trace --flake . "$@"
set -x; sudo nixos-rebuild boot --accept-flake-config --show-trace --flake . "$@"
boot-and-reboot *_:
#!/usr/bin/env -S bash -euo pipefail
@@ -137,10 +140,10 @@ boot-and-reboot *_:
echo >&2 "WARNING(just): first arg does not start with "-", is it a hostname?"
fi
set -x
sudo nixos-rebuild-ng boot --accept-flake-config --show-trace --flake . "$@"
sudo nixos-rebuild boot --accept-flake-config --show-trace --flake . "$@"
sudo reboot # TODO: can i somehow ensure that the sudo hasn't timed out by this time?
# TODO: nixos-rebuild-ng
# TODO: does this support nixos-rebuild-ng?
push $hostname=`just _a_host` cmd=`gum choose test switch boot --header "Select mode..."`:
#!/usr/bin/env -S bash -euo pipefail
remote_sudo=1
@@ -316,7 +319,7 @@ alias switch-home := home-switch
# " end
# else
# if .recursive then
# "${lib.getExe pkgs.xorg.lndir} -silent ${cfg.\"\(.key)\".source} \(.target | @sh )\n"
# "${lib.getExe pkgs.lndir} -silent ${cfg.\"\(.key)\".source} \(.target | @sh )\n"
# else
# "ln -sfn ${cfg.\"\(.key)\".source} \(.target | @sh )\n"
# end

View File

@@ -20,7 +20,7 @@ let
in
pkgs.runCommandNoCC "nspawn-setup-${hostname}.sh" {
pkgs.runCommand "nspawn-setup-${hostname}.sh" {
nativeBuildInputs = with pkgs; [ makeself ];
} ''
mkdir -p archive/

View File

@@ -79,11 +79,16 @@ in
#"--update-input" "nixpkgs-edge" # deprecated in nix 2.22, removed in lix 2.90
# "--override-input" "nixpkgs-edge" "github:NixOS/nixpkgs/nixos-unstable"
] ++ (lib.pipe inputUrls [
# TODO: i keep forgetting to update this, perhaps use a blacklist instead?
(lib.filterAttrs (key: _: builtins.elem key [
"nixpkgs-edge"
"nixpkgs-2411"
"nixpkgs-2511"
"nixpkgs-2505"
# "nixpkgs-2411"
"home-manager-edge"
"home-manager-2411"
"home-manager-2511"
"home-manager-2505"
# "home-manager-2411"
"nix-index-database"
"nixos-hardware"
]))
@@ -92,8 +97,8 @@ in
]);
# lots of "empty" updates
boot.loader.grub.configurationLimit = 15;
boot.loader.systemd-boot.configurationLimit = 15;
boot.loader.generic-extlinux-compatible.configurationLimit = 15;
boot.loader.grub.configurationLimit = 10;
boot.loader.systemd-boot.configurationLimit = 10;
boot.loader.generic-extlinux-compatible.configurationLimit = 10;
}

View File

@@ -65,8 +65,10 @@ https://wiki.nixos.org/wiki/GNOME
pkgs.gnome-tweaks
pkgs.refine # Tweak various aspects of GNOME
# pkgs.thumbler # TODO?
pkgs.ffmpegthumbnailer
pkgs.libheif # HEIF thumbnails
pkgs.libheif.bin # provides heif-thumbnailer, the program that generates HEIF thumbnails
pkgs.libheif.out # provides heif.thumbnailer, allows for the viewing of HEIF thumbnails
pkgs.gnomeExtensions.appindicator
pkgs.decibels # audio player

View File

@@ -9,7 +9,8 @@ lib.mkMerge [
environment.systemPackages = [
(pkgs.lutris.override {
extraPkgs = pkgs: [
pkgs.wineWowPackages.staging
# pkgs.wineWowPackages.staging # slow to build
# pkgs.wineWowPackages.stable
pkgs.winetricks
pkgs.pixman
pkgs.libjpeg

View File

@@ -1,7 +1,7 @@
{ pkgs, ... }:
{
environment.systemPackages = [
pkgs.retroarchFull
pkgs.retroarch-full
/* pkgs.retroarch */
/* pkgs.retroarchBare */
/*

View File

@@ -17,10 +17,11 @@
};
environment.systemPackages = with pkgs; [
pavucontrol # volume and defaults
easyeffects # eq
helvum # patchbay
environment.systemPackages = [
pkgs.pavucontrol # volume and defaults
pkgs.easyeffects # eq
# helvum # patchbay - removed from nixpkgs
(pkgs.crosspipe or pkgs.helvum) # patchbay - helvum alternative
# carla # VST patchbay (TODO: move into a DAW profile? Can be used for midi) # TODO: build broken
];

View File

@@ -56,11 +56,11 @@
gtk3
gtk3-x11
xorg.libXcursor
xorg.libXi
xorg.libXinerama
xorg.libXScrnSaver
xorg.libxcb
libXcursor
libXi
libXinerama
libXScrnSaver
libxcb
stdenv.cc.cc.lib
#libkrb5

View File

@@ -52,12 +52,12 @@ noProxyJumpDomains = [ "tail9aac63.ts.net" ]
["bolle.tail9aac63.ts.net"]
aliases = [ "bolle.pbsds.net" ]
buildMachine.systems = ["x86_64-linux", "i686-linux", "riscv64-linux"]
buildMachine.maxJobs = 3 # 12 threads 32GB
# buildMachine.maxJobs = 3 # 12 threads 32GB
buildMachine.speedFactor = 4 # ???
buildMachine.supportedFeatures = ["kvm", "nixos-test" ] #, "ccache" ] # no ccache because we have yet to setup distributed ccache
buildMachine.protocol = "ssh-ng"
ssh.listenPublicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeOB/57N1fQPVorIUlkkJZaQduBo+4+km2Qbj4ebd/k"
ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.connectTimeout = 3
# wakeonlan e4:54:e8:51:8c:e9
@@ -70,7 +70,7 @@ buildMachine.supportedFeatures = ["kvm", "nixos-test", "ccache" ]
buildMachine.protocol = "ssh-ng"
# useAsSubstituter = true
ssh.listenPublicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH03MEINNnjBvtmvN2QsCDCLkvF9ow5FQJp9uiyQ1Iwi"
ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.connectTimeout = 3
# wakeonlan 4c:cc:6a:05:51:01
@@ -83,7 +83,7 @@ buildMachine.speedFactor = 4 # i7-6700
buildMachine.supportedFeatures = ["kvm", "nixos-test", "cuda" ] #, "ccache" ] # no ccache because we have yet to setup distributed ccache
buildMachine.protocol = "ssh-ng"
ssh.listenPublicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOkcZ3cUAKk8uUvZPsX7PDBInkb3Eps3Xh+xVrhPY+sx"
ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.connectTimeout = 3
# wakeonlan 4c:cc:6a:61:d0:20
@@ -110,6 +110,7 @@ ssh.userPublicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL6eTQkxO/1XflHpGf3478+
# wakeonlan 12:d2:be:e0:c5:f5 wireless
["nord"] # rx 580
# ["nord"] # gtk 1080
aliases = [ "nord.tail9aac63.ts.net" ] # "nord.pbsds.net",
# buildMachine.maxJobs = 1 # 4 threads 32GB
buildMachine.speedFactor = 1 # i5-2500
@@ -200,7 +201,9 @@ buildMachine.supportedFeatures = [ "big-parallel" ]
buildMachine.mandatoryFeatures = [ "big-parallel" ]
ssh.listenUser = "pederbs"
ssh.listenPublicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzLWPq7O9OiUXEDtwm/xfdBmLqEZXWlXDdRuJmb2Gou"
ssh.proxyJump = "login.stud.ntnu.no"
# ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.proxyJump = "bolle.tail9aac63.ts.net"
ssh.proxyJump = "eple.tail9aac63.ts.net"
# ["bob.pvv.ntnu.no"]
# buildMachine.maxJobs = 10 # 40 threads

View File

@@ -18,13 +18,14 @@
programs.nix-ld.enable = true;
# environment.sessionVariables = {
# NIX_LD_LIBRARY_PATH = lib.mkForce (lib.concatStringsSep ":" [
# "/run/opengl-driver/lib"
# "/run/opengl-driver-32/lib"
# "/run/current-system/sw/share/nix-ld/lib"
# ]);
# };
# Add graphical drivers to nix-ld
environment.sessionVariables = {
NIX_LD_LIBRARY_PATH = lib.mkForce (lib.concatStringsSep ":" [
"/run/current-system/sw/share/nix-ld/lib"
"/run/opengl-driver/lib"
"/run/opengl-driver-32/lib"
]);
};
programs.nix-ld.libraries = with pkgs; [
acl
@@ -73,20 +74,20 @@
pango
pipewire
vulkan-loader
xorg.libX11
xorg.libXScrnSaver
xorg.libXcomposite
xorg.libXcursor
xorg.libXdamage
xorg.libXext
xorg.libXfixes
xorg.libXi
xorg.libXrandr
xorg.libXrender
xorg.libXtst
xorg.libxcb
xorg.libxkbfile
xorg.libxshmfence
libx11
libxscrnsaver
libxcomposite
libxcursor
libxdamage
libxext
libxfixes
libxi
libxrandr
libxrender
libxtst
libxcb
libxkbfile
libxshmfence
];
environment.systemPackages = with pkgs; [

View File

@@ -3,7 +3,7 @@ nix-community-builders-ssh-key-pub: ENC[AES256_GCM,data:WvjdlG/k+Hm8ZRaIc+6KzJvP
nix-community-builders-ssh-key: ENC[AES256_GCM,data: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,iv:NTnnv0Hax/H7EoyHn0VRMG8sbb8tF23Ur2Ak4WYp8Bk=,tag:4hyGKetJ+I3zSqh1zOw/jg==,type:str]
pbsbot-gh-token: ENC[AES256_GCM,data:iPTIei8KLfHKeGey08CfSsyuTufvxO4WHG9qE1TqmWHv5/vqW8YyGQ==,iv:JOKI1aFsnqPFkkkZuCmcIFZAbXe7kANt3QEuD+3GyWs=,tag:quwvq3FBiXE1GrzzdWVQww==,type:str]
nix-access-tokens: ENC[AES256_GCM,data:klh25JXk9HDvBsydZOWcIb0eQc3XE7BzP9hDGb0ohGqmeAUsYiwdFpbGRXuVFEA9nP5NvJfleWiy1fd8ioMO,iv:3MHWN46pLeNe8gi37iotoWn4hyDKCrBGdWerJMixt0M=,tag:Jh1tCesc0EhRfhqw1jQFIQ==,type:str]
nix-access-tokens-all: ENC[AES256_GCM,data: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,iv:XWOV8agUOkl5wjDQxNXB7h2kHzh0CeJRUCp1U4DWjRk=,tag:nUA6ucLFeGTrFnrHTIDnlw==,type:str]
nix-access-tokens-all: ENC[AES256_GCM,data:d1XxCfhZmoHd7zmAofHnMSNELqoguVAFmE8vC3MpbM9g+NgiDF/yScF/kHgeb4PRAMSJzT5+mQUNyf8uZVw+LwfeE+GI2s+59Ohflmx7htDm2wlYCtrURoNI9AFSmXd+NShN/xRLEvv2c7iGviOou966KwHi2LsS6GZr0yw5J09O+rQ9HKBHib2/RU6UA/Re5k3v1YuI6dUU86QUsdE7lXAD82OPbhd8zWkOhal+k/IS83wFCy0Fwud1mN9ogNrkmNcYh8JbrkDIaQVafHUelRK1wOjWanSzAoLCOyi/YdbyUb/9b16z21Jyt7cGIFHgJcP3FX+S6bkZ3M3ZQ6jUlbWZJfHSzKx+Z6mP3TcYm8X0XP2fJlmQSrzdAFyfeCAf4x6is/i1REm86CcajmhTkkjoP2obUDOVFuhOtgIFGyNWwJ2WvTw/LGh358JTYHNe5NP9oA8uSTcu0cUa1yekl5ROuQRY/lT20NBw39FbWt7oEbiJc3G8qhlU3u2Wh/IROprNNAKqyV/n9t8R4ZtsB8dRFQhNE0u/3FRN3fqfQMrzKVXgmdNUFyue+yh9KcG68BDx39wexC/P8CUF81Ze+oyb9Q==,iv:cAvaJ6cJuG5NrRgva481KqcBG0/z9CaKTxWuc7ofZ1E=,tag:diymylgZ2vabFZlnbytYxQ==,type:str]
sops:
age:
- recipient: age1hmpdk4h69wxpwqk9tkud39f66hprhehxtzhgw97r6dvr7v0mx5jscsuhkn
@@ -105,7 +105,7 @@ sops:
SklPV3NUSkxwSk1rWHg5N2tiN0xHeVkKhUqu6rVayVeGi00YMRXF1npO7j9oXySX
rxVQgH6hYlLbeCIW4T6cP2eCbchWDi3Pear1DVknwEDa+DhHey7Bmg==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2025-10-29T11:00:51Z"
mac: ENC[AES256_GCM,data:TbJuLvFD5zYH0D0qddweUszDQbfCMmMrv1NFloqjeslNM0plOGv6MlWlYrHKzZjfHeJFEoPcrOJBO5VH1LiPKSX9ridK+9/FVRJnEIWtXKlJKlvaTijBmCIXwQgsmpVocf2maecvapBvl7KDrSwssbOp3K23yU+d0HemwJY7FmQ=,iv:6qyz/u6GZ8HVYiFYwnyXt85H/6Xoq8mRn4dM3BKiYFM=,tag:RpF35EvPU6dNbDh873QQ9Q==,type:str]
lastmodified: "2026-01-25T18:32:02Z"
mac: ENC[AES256_GCM,data:T/2Gp6qbxaD0qwL6tLWbH5w8vRYJtPgXDSK2fQLQaKswgVtosXJSacIzvuGnZfoSvvlEnDr2sRwiBOuaCveEdK1rrFcvYd/0DqjDDiYu8us3eNkDL03s37xumbUmyzmPuS/piYVYfAHTxHEdZfDLqDJxVTUv6kJSMNnHRAWDhac=,iv:mt1DzB5l2QXWwEgzSzRl+vS5owwkGjq0BI0EYCVbb3g=,tag:jmPVxss3f3pvANWkieSZ3A==,type:str]
unencrypted_suffix: _unencrypted
version: 3.11.0

View File

@@ -48,6 +48,11 @@
# selfhosting
* [ ] install extra ssd in nox, make it zfs and mount to /var/lib ?
* [ ] backup of nox:/var/lib
* rsync?
* kopia?
* borgbackup?
* zrepl?
* duplicity? no
* [ ] hydra - perfect for CUDA and RISCV
* [ ] [avahi](https://github.com/jakehamilton/config/blob/579827c699d9c78bd42e73f543eafb05a0d6c374/modules/services/avahi/default.nix)
* [ ] [kvm](https://github.com/jakehamilton/config/blob/579827c699d9c78bd42e73f543eafb05a0d6c374/modules/virtualisation/kvm/default.nix)

View File

@@ -35,7 +35,7 @@
# ./home/profiles/desktop (gnome)
home-manager.users.pbsds.imports = [
(
if config.services.xserver.desktopManager.gnome.enable then
if config.services.desktopManager.gnome.enable then
./home/profiles/desktop/gnome
else
./home/profiles/comfy

View File

@@ -1,4 +1,4 @@
#!/usb/bin/env python3
#!/usb/bin/env -S python3 -i
#run with:
#gnome-terminal --hide-menubar --window-with-profile=manjaro -x python -i $HOME/.local/opt/python-interactive-imports.py

View File

@@ -1,4 +1,4 @@
#!/usb/bin/env python3
#!/usb/bin/env -S python3 -i
#run with:
#gnome-terminal --hide-menubar --window-with-profile=manjaro -x python -i $HOME/.local/opt/sympy-interactive-imports.py

View File

@@ -19,7 +19,7 @@
unstable.deadnix
unstable.statix
# unstable.nixtract
unstable.nixfmt-rfc-style
unstable.nixfmt
nurl
# manix
# comma # collides with nix-index-database

View File

@@ -1,3 +1,17 @@
zeditor-here() (
for fqdn in $(printf "%q\n" $(hostname -f) $(hostname -A) | sort -u); do
printf "zeditor ssh://%q:%q\n" "${fqdn}" "$(realpath "${1:-.}")"
done
)
# zed-here() { zeditor-here "$@"; }
atom-here() { zeditor-here "$@"; }
if [[ -z "${SSH_CLIENT:-}" && -z "${SSH_TTY:-}" ]];
then
zeditor-remote() {
local statedir="${XDG_STATE_HOME:-"$HOME/.local/state/"}/zeditor-remote-sh"
@@ -182,3 +196,9 @@ zeditor-remote() {
fi
unset -f lru_push
}
# zed-remote() { zeditor-remote "$@"; }
atom-remote() { zeditor-remote "$@"; }
fi

View File

@@ -8,7 +8,7 @@
# onChange = ''
# ${lib.getExe pkgs.ghostty} +validate-config --config-file=${./ghosty.config}
# '';
source = pkgs.runCommandNoCC "validated-ghosty.config" {
source = pkgs.runCommand "validated-ghosty.config" {
preferLocalBuild = true;
nativeBuildInputs = [ pkgs.ghostty ];
} ''

View File

@@ -5,7 +5,11 @@ foreground = #d3d7cf
#palette = 0=#d3d7cf
#window-decoration = false
gtk-wide-tabs = false
#bell-features = "system,attention,title" # available from v1.2, i.e. nixos 25.11
# available from v1.2, i.e. nixos 25.11
# https://ghostty.org/docs/config/reference#bell-features
# bell-features = "system,attention,title"
bell-features = "system"
#font-synthetic-style = true
#font-style = false

View File

@@ -142,7 +142,7 @@ with lib.hm.gvariant;
"org/gnome/settings-daemon/plugins/media-keys/custom-keybindings/custom12" = {
binding = "";
command = "ghostty -e \"python3 -i $HOME/.local/opt/sympy-interactive-imports.py\"";
command = "ghostty -e \"$(command -v ptpython || echo python3)\" -i \"$HOME/.local/opt/sympy-interactive-imports.py\"";
name = "Open SymPy terminal";
};
@@ -178,7 +178,7 @@ with lib.hm.gvariant;
"org/gnome/settings-daemon/plugins/media-keys/custom-keybindings/custom5" = {
binding = "<Primary><Alt>space";
command = "ghostty -e \"`command -v ptpython || echo python3` -i $HOME/.local/opt/python-interactive-imports.py\"";
command = "ghostty -e \"$(command -v ptpython || echo python3)\" -i \"$HOME/.local/opt/python-interactive-imports.py\"";
name = "Open Python Terminal";
};

View File

@@ -107,5 +107,9 @@ with lib.hm.gvariant;
window-demands-attention-focus = false;
};
"org/gnome/shell/extensions/pip-on-top" = {
stick = true;
};
};
}

View File

@@ -1,5 +1,5 @@
#!/usr/bin/env nix-shell
#!nix-shell -i bash -p dconf2nix sd nixfmt-rfc-style
#!nix-shell -i bash -p dconf2nix sd nixfmt
set -euo pipefail
cd "$(dirname "${BASH_SOURCE[0]}")"
@@ -31,6 +31,7 @@ dump1() {
dump "org/gnome/shell/extensions/big-avatar"
dump "org/gnome/shell/extensions/gtile"
dump "org/gnome/shell/extensions/just-perfection"
dump "org/gnome/shell/extensions/pip-on-top"
} | dconf2nix > dconf-gnome-extensions.nix
{

View File

@@ -69,7 +69,7 @@ in
# notifications
"org/gnome/desktop/notifications" = {
# show-banners = false; # do not disturb mode
# "show-banners" = false; # do not disturb mode
show-in-lock-screen = false; # fucking matrix...
};

View File

@@ -6,12 +6,11 @@
home.shellAliases.atom = lib.mkDefault "pulsar";
home.packages = with pkgs; [
#atom
pulsar
#pkgs.atom
pkgs.pulsar
nodePackages.bash-language-server
(pkgs.bash-language-server or pkgs.nodePackages.bash-language-server)
# TODO: ensure python-lsp-server?
];
home.file.".pulsar/config.cson".source = ./config.cson;

View File

@@ -23,7 +23,7 @@
shfmt # bash
nixd # nix
nil # nix
unstable.nixfmt-rfc-style # nix
unstable.nixfmt # nix
harper # harper
# vale-ls vale # vale, will nag a lot if no vale config present in project
typos-lsp # typos

View File

@@ -26,8 +26,10 @@ in
# axel aria aria2 # brrr
# silver-searcher # 'ag'
# comby # ast-based source code rewrite
gron fastgron # grep-able json
xq gojq # faster jq alternatives
gron # grep-able json
fastgron # grep-able json
# xq # faster jq alternatives (borken build)
gojq # faster jq alternatives
# yq # jq wrapper with more formats, includes yq (yaml), xq (xml) and tomlq
(pkgs.linkFarm yq {
# jq wrapper with more formats, includes yq (yaml), xq (xml) and tomlq

View File

@@ -0,0 +1,44 @@
nix-store-from-here() (
paths=("$@")
if [[ "${#paths[@]}" -le 0 ]]; then
echo >&2 "ERROR: no paths provided!"
return 0
fi
# nix_store=$(nix config show TODO)
nix_store="/nix/store"
store_paths=()
# set -x
for path in "${paths[@]}"; do
if [[ ! -e "$path" ]]; then
echo >&2 "WARNING: not found: '$path'"
continue
fi
resolved="$( realpath --no-symlinks "$path" )" # we prefer the originally referenced file and not the path it points to if a in-store symlink
if [[ ! "$resolved" =~ ^"$nix_store"/*/ ]]; then
resolved="$( realpath "$path" )" # to resolve files in "result" symlinks
if [[ ! "$resolved" =~ ^"$nix_store"/*/ ]]; then
echo >&2 "WARNING: not in store: '$path'"
continue
fi
fi
# simple
# store_paths+=("$resolved")
# only reference top-level store path
resolved_base="${resolved#"$nix_store/"}"
resolved_base="${resolved_base%%+(/*)}"
store_paths+=("$nix_store/$resolved_base")
done
if [[ "${#store_paths[@]}" -gt 0 ]]; then
{
for fqdn in $(printf "%q\n" $(hostname -f) $(hostname -A) | sort -u); do
printf "nix copy --from ssh://%q %s --out-link result\n" "${fqdn}" "$(printf " %q" "${store_paths[@]}")"
done
} | column -t -s' ' -o' '
fi
)

View File

@@ -1,12 +1,13 @@
{ config, lib, ... }:
{
programs.git.enable = true;
#programs.git.userName = "pbsds"
programs.git.userName = "Peder Bergebakken Sundt";
programs.git.userEmail = "pbsds@hotmail.com";
#programs.git.settings.user.name = "pbsds"
programs.git.settings.user.name = "Peder Bergebakken Sundt";
programs.git.settings.user.email = "pbsds@hotmail.com";
programs.git.delta.enable = true;
programs.git.delta.options = {
programs.delta.enable = true;
programs.delta.enableGitIntegration = true;
programs.delta.options = {
# Delta uses ~/.gitconfig even when not invoked by git
tabs = 4;
max-line-length = 0;
@@ -14,22 +15,22 @@
};
# # sign commits with ssh key
# programs.git.extraConfig.gpg.format = "ssh";
# programs.git.settings.gpg.format = "ssh";
# programs.git.signing.key = "${config.home.homeDirectory}/.ssh/my-key.pub";
# programs.git.signing.signByDefault = true;
# https://jvns.ca/blog/2024/02/16/popular-git-config-options/
programs.git.extraConfig.rerere.enabled = true;
#programs.git.extraConfig.help.autocorrect = "prompt";
programs.git.extraConfig.transfer.fsckobjects = true;
programs.git.extraConfig.fetch.fsckobjects = true;
programs.git.extraConfig.receive.fsckObjects = true;
programs.git.extraConfig.branch.sort = "-committerdate";
programs.git.extraConfig.tag.sort = "taggerdate";
programs.git.extraConfig.fetch.prune = true;
programs.git.extraConfig.fetch.prunetags = true;
programs.git.extraConfig.log.date = "iso";
# programs.git.extraConfig.interactive.singleKey = true;
programs.git.settings.rerere.enabled = true;
#programs.git.settings.help.autocorrect = "prompt";
programs.git.settings.transfer.fsckobjects = true;
programs.git.settings.fetch.fsckobjects = true;
programs.git.settings.receive.fsckObjects = true;
programs.git.settings.branch.sort = "-committerdate";
programs.git.settings.tag.sort = "taggerdate";
programs.git.settings.fetch.prune = true;
programs.git.settings.fetch.prunetags = true;
programs.git.settings.log.date = "iso";
# programs.git.settings.interactive.singleKey = true;
programs.git.iniContent.init.defaultBranch = "main";
programs.git.ignores = [

View File

@@ -133,7 +133,7 @@ in
home.shellAliases.fda = "fd --no-ignore --hidden";
home.shellAliases.afd = "fd --no-ignore --hidden";
home.shellAliases.drg = lib.mkIf (config.programs.git.enable && config.programs.git.delta.enable) (
home.shellAliases.drg = lib.mkIf (config.programs.git.enable && config.programs.delta.enable) (
# mkArgsAlias ''rg "$@" --json | delta''
mkArgsAlias ''rg "$@" --json | jq -s 'sort_by(.data.path)|.[]' -c | delta''
);

View File

@@ -22,8 +22,21 @@
'';
programs.ssh.enable = true;
programs.ssh.controlMaster = "yes";
programs.ssh.compression = true;
programs.ssh.enableDefaultConfig = false;
# programs.ssh.matchBlocks."*".controlMaster = "yes";
# programs.ssh.matchBlocks."*".compression = true;
programs.ssh.matchBlocks."*" = {
# forwardAgent = false;
# addKeysToAgent = "no";
# serverAliveInterval = 0;
# serverAliveCountMax = 3;
# hashKnownHosts = false;
compression = true;
userKnownHostsFile = "~/.ssh/known_hosts";
controlMaster = "yes";
controlPath = "~/.ssh/master-%r@%n:%p";
controlPersist = "no";
};
programs.ssh.includes = [ "~/.ssh/config.d/*" ];
programs.ssh.matchBlocks = {
"*".serverAliveInterval = 10;
@@ -43,45 +56,55 @@
# TODO: add fingerprint to known hosts
"*.pvv.org !login.pvv.org".proxyJump = "login.pvv.ntnu.no";
"*.pvv.ntnu.no !login.pvv.ntnu.no".proxyJump = "login.pvv.ntnu.no";
"*.hpc.ntnu.no".proxyJump = "login.pvv.ntnu.no";
"*.idi.ntnu.no".proxyJump = "login.pvv.ntnu.no";
# "*.hpc.ntnu.no".proxyJump = "login.pvv.ntnu.no";
# "*.idi.ntnu.no".proxyJump = "login.pvv.ntnu.no";
# "*.hpc.ntnu.no".proxyJump = "bolle.pbsds.net";
# "*.idi.ntnu.no".proxyJump = "bolle.pbsds.net";
# "*.hpc.ntnu.no".proxyJump = "eple.pbsds.net";
# "*.idi.ntnu.no".proxyJump = "eple.pbsds.net";
"*.hpc.ntnu.no".proxyJump = "eple.tail9aac63.ts.net";
"*.idi.ntnu.no".proxyJump = "eple.tail9aac63.ts.net";
# me
"eple.pbsds.net".proxyJump = "login.pvv.ntnu.no";
"bolle.pbsds.net".proxyJump = "login.pvv.ntnu.no";
"bolle.pbsds.net".forwardX11Trusted = false;
"garp.pbsds.net".forwardX11Trusted = false;
#"knut.pbsds.net".port = 23;
#"nord.pbsds.net".port = 24;
#"sopp.pbsds.net".port = 26;
#"noximilien.pbsds.net" = {};
# "knut.pbsds.net".port = 23;
# "nord.pbsds.net".port = 24;
# "sopp.pbsds.net".port = 26;
# "noximilien.pbsds.net" = {};
# "eple.pbsds.net".proxyJump = "login.pvv.ntnu.no";
# "bolle.pbsds.net".proxyJump = "login.pvv.ntnu.no";
"bolle.pbsds.net".forwardX11Trusted = false; # others have access to it
# "garp.pbsds.net".forwardX11Trusted = false; # others have access to it
"eple.pbsds.net".host = "eple.tail9aac63.ts.net";
"garp.pbsds.net".host = "garp.tail9aac63.ts.net";
"knut.pbsds.net".host = "knut.tail9aac63.ts.net";
"nord.pbsds.net".host = "nord.tail9aac63.ts.net";
"sopp.pbsds.net".host = "sopp.tail9aac63.ts.net";
"noximilien.pbsds.net".host = "noximilien.tail9aac63.ts.net";
"rocm.pbsds.net".host = "rocm.tail9aac63.ts.net";
"noximilien.pbsds.net".host = "noximilien.tail9aac63.ts.net";
"furiphoneflx1.pbsds.net".user = "furios";
"furiphoneflx1.pbsds.net".host = "furiphoneflx1.tail9aac63.ts.net";
# nixos org
#"aarch64.nixos.community" = {};
# nix-community
#"darwin-build-box.nix-community.org" = {};
# ntnu
"garmr.idi.ntnu.no".forwardX11 = true;
"heid.idi.ntnu.no" = {}; #.forwardX11 = true;
"idun.hpc.ntnu.no" = {};
# "idun.hpc.ntnu.no" = {};
# "idun-login1.hpc.ntnu.no" = {};
"idun-login2.hpc.ntnu.no" = {};
"login.stud.ntnu.no" = {};
"malvik.idi.ntnu.no" = {};
"oppdal.idi.ntnu.no" = {};
"selbu.idi.ntnu.no" = {};
"snotra.idi.ntnu.no" = {};
"stud.ntnu.no".hostname = "login.stud.ntnu.no";
/* "idun-login1.hpc.ntnu.no" = {}; */
/* "idun-login2.hpc.ntnu.no" = {}; */
/* "snotra-login1.idi.ntnu.no" = {}; */
# "idun-login1.hpc.ntnu.no" = {};
# "idun-login2.hpc.ntnu.no" = {};
# "snotra-login1.idi.ntnu.no" = {};
"clab01.idi.ntnu.no".proxyJump = "snotra-login1.idi.ntnu.no";
"clab02.idi.ntnu.no".proxyJump = "snotra-login1.idi.ntnu.no";
"clab03.idi.ntnu.no".proxyJump = "snotra-login1.idi.ntnu.no";
@@ -140,23 +163,23 @@
"tallulah.pvv.ntnu.no" = {};
"tom.pvv.ntnu.no" = {};
"toriel.pvv.ntnu.no".user = "root";
/* "alphys.pvv.ntnu.no".user = "root"; */
/* "dash8.pvv.ntnu.no" = {}; */
/* "essendrop.pvv.ntnu.no" = {}; */
/* "fenris.pvv.ntnu.no".user = "root"; */
/* "hasub.pvv.ntnu.no" = {}; */
/* "knakelibrak.pvv.ntnu.no" = {}; */
/* "monty.pvv.ntnu.no" = {}; */
/* "nsa.pvv.ntnu.no" = {}; */
/* "skrotnisse.pvv.ntnu.no" = {}; */
/* "spikkjeposche.pvv.ntnu.no" = {}; */
/* "tim.pvv.ntnu.no" = {}; */
# "alphys.pvv.ntnu.no".user = "root";
# "dash8.pvv.ntnu.no" = {};
# "essendrop.pvv.ntnu.no" = {};
# "fenris.pvv.ntnu.no".user = "root";
# "hasub.pvv.ntnu.no" = {};
# "knakelibrak.pvv.ntnu.no" = {};
# "monty.pvv.ntnu.no" = {};
# "nsa.pvv.ntnu.no" = {};
# "skrotnisse.pvv.ntnu.no" = {};
# "spikkjeposche.pvv.ntnu.no" = {};
# "tim.pvv.ntnu.no" = {};
# fyrkat
#"fyrkat.no".hostname = "fridge.fyrkat.no";
#"*.fyrkat.no".proxyJump = "login.pvv.ntnu.no";
# "fyrkat.no".hostname = "fridge.fyrkat.no";
# "*.fyrkat.no".proxyJump = "login.pvv.ntnu.no";
"fridge.fyrkat.no".port = 222;
/* "fil.fyrkat.no" = {}; */
# "fil.fyrkat.no" = {};
};
}