Configuration for my NixOS based systems and Home Manager

Remove Agave-related config

+14 -49
+12 -12
flake.lock
··· 230 ] 231 }, 232 "locked": { 233 - "lastModified": 1765384171, 234 - "narHash": "sha256-FuFtkJrW1Z7u+3lhzPRau69E0CNjADku1mLQQflUORo=", 235 "owner": "nix-community", 236 "repo": "home-manager", 237 - "rev": "44777152652bc9eacf8876976fa72cc77ca8b9d8", 238 "type": "github" 239 }, 240 "original": { ··· 315 }, 316 "nixpkgs-unstable": { 317 "locked": { 318 - "lastModified": 1765186076, 319 - "narHash": "sha256-hM20uyap1a0M9d344I692r+ik4gTMyj60cQWO+hAYP8=", 320 "owner": "nixos", 321 "repo": "nixpkgs", 322 - "rev": "addf7cf5f383a3101ecfba091b98d0a1263dc9b8", 323 "type": "github" 324 }, 325 "original": { ··· 345 }, 346 "nixpkgs_3": { 347 "locked": { 348 - "lastModified": 1765311797, 349 - "narHash": "sha256-mSD5Ob7a+T2RNjvPvOA1dkJHGVrNVl8ZOrAwBjKBDQo=", 350 "owner": "nixos", 351 "repo": "nixpkgs", 352 - "rev": "09eb77e94fa25202af8f3e81ddc7353d9970ac1b", 353 "type": "github" 354 }, 355 "original": { ··· 382 "nixpkgs": "nixpkgs_4" 383 }, 384 "locked": { 385 - "lastModified": 1765464257, 386 - "narHash": "sha256-dixPWKiHzh80PtD0aLuxYNQ0xP+843dfXG/yM3OzaYQ=", 387 "owner": "cachix", 388 "repo": "git-hooks.nix", 389 - "rev": "09e45f2598e1a8499c3594fe11ec2943f34fe509", 390 "type": "github" 391 }, 392 "original": {
··· 230 ] 231 }, 232 "locked": { 233 + "lastModified": 1765979862, 234 + "narHash": "sha256-/r9/1KamvbHJx6I40H4HsSXnEcBAkj46ZwibhBx9kg0=", 235 "owner": "nix-community", 236 "repo": "home-manager", 237 + "rev": "d3135ab747fd9dac250ffb90b4a7e80634eacbe9", 238 "type": "github" 239 }, 240 "original": { ··· 315 }, 316 "nixpkgs-unstable": { 317 "locked": { 318 + "lastModified": 1765779637, 319 + "narHash": "sha256-KJ2wa/BLSrTqDjbfyNx70ov/HdgNBCBBSQP3BIzKnv4=", 320 "owner": "nixos", 321 "repo": "nixpkgs", 322 + "rev": "1306659b587dc277866c7b69eb97e5f07864d8c4", 323 "type": "github" 324 }, 325 "original": { ··· 345 }, 346 "nixpkgs_3": { 347 "locked": { 348 + "lastModified": 1765838191, 349 + "narHash": "sha256-m5KWt1nOm76ILk/JSCxBM4MfK3rYY7Wq9/TZIIeGnT8=", 350 "owner": "nixos", 351 "repo": "nixpkgs", 352 + "rev": "c6f52ebd45e5925c188d1a20119978aa4ffd5ef6", 353 "type": "github" 354 }, 355 "original": { ··· 382 "nixpkgs": "nixpkgs_4" 383 }, 384 "locked": { 385 + "lastModified": 1765911976, 386 + "narHash": "sha256-t3T/xm8zstHRLx+pIHxVpQTiySbKqcQbK+r+01XVKc0=", 387 "owner": "cachix", 388 "repo": "git-hooks.nix", 389 + "rev": "b68b780b69702a090c8bb1b973bab13756cc7a27", 390 "type": "github" 391 }, 392 "original": {
-8
hardware-configuration.nix
··· 74 } 75 ]; 76 77 - # sysctls for Agave 78 - boot.kernel.sysctl."net.core.rmem_default" = 134217728; 79 - boot.kernel.sysctl."net.core.rmem_max" = 134217728; 80 - boot.kernel.sysctl."net.core.wmem_default" = 134217728; 81 - boot.kernel.sysctl."net.core.wmem_max" = 134217728; 82 - boot.kernel.sysctl."vm.max_map_count" = 1000000; 83 - boot.kernel.sysctl."fs.nr_open" = 1000000; 84 - 85 # Enables DHCP on each ethernet and wireless interface. In case of scripted networking 86 # (the default) this is the recommended approach. When using systemd-networkd it's 87 # still possible to use this option, but it's recommended to use it in conjunction
··· 74 } 75 ]; 76 77 # Enables DHCP on each ethernet and wireless interface. In case of scripted networking 78 # (the default) this is the recommended approach. When using systemd-networkd it's 79 # still possible to use this option, but it's recommended to use it in conjunction
+1 -1
home.nix
··· 23 picocom 24 # Disabled because even unstable is too out-of-date 25 # unstable.logseq 26 - element-desktop 27 rsync 28 unzip 29 fd
··· 23 picocom 24 # Disabled because even unstable is too out-of-date 25 # unstable.logseq 26 + #element-desktop 27 rsync 28 unzip 29 fd
+1 -12
networking.nix
··· 29 enable = true; 30 allowPing = true; 31 allowedUDPPorts = [ ]; 32 - allowedUDPPortRanges = [ 33 - # Agave 34 - { 35 - from = 8000; 36 - to = 8020; 37 - } 38 - ]; 39 allowedTCPPorts = [ 40 2375 41 3000 42 - # Agave 43 - 8001 44 - 8899 45 - 8900 46 - 10000 47 ]; 48 }; 49
··· 29 enable = true; 30 allowPing = true; 31 allowedUDPPorts = [ ]; 32 + allowedUDPPortRanges = [ ]; 33 allowedTCPPorts = [ 34 2375 35 3000 36 ]; 37 }; 38
-16
users.nix
··· 5 }: 6 { 7 8 - # PAM configuration 9 - security.pam.loginLimits = [ 10 - { 11 - domain = "*"; 12 - type = "soft"; 13 - item = "nofile"; 14 - value = "100000"; 15 - } 16 - { 17 - domain = "*"; 18 - type = "hard"; 19 - item = "nofile"; 20 - value = "1000000"; 21 - } 22 - ]; 23 - 24 # Declarative only optoins. 25 # I don't want to allow ad-hoc modifying users on the system. 26 # Users must be declared either as part of a package or in this file.
··· 5 }: 6 { 7 8 # Declarative only optoins. 9 # I don't want to allow ad-hoc modifying users on the system. 10 # Users must be declared either as part of a package or in this file.