Compare commits

...

4 commits

Author SHA1 Message Date
chayleaf a4235be2c4
disable qrtr 2024-08-15 02:46:49 +07:00
chayleaf 449f873faa
server: temporarily switch to newer kernel 2024-08-15 01:08:56 +07:00
chayleaf 8ac7a4c10a
use the binary cache on phone 2024-08-15 00:55:59 +07:00
chayleaf 206a5ce766
stuff 2024-08-14 20:46:31 +07:00
8 changed files with 46 additions and 22 deletions

View file

@ -574,6 +574,22 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-kernel2": {
"locked": {
"lastModified": 1723362943,
"narHash": "sha256-dFZRVSgmJkyM0bkPpaYRtG/kRMRTorUIDj8BxoOt1T4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "a58bc8ad779655e790115244571758e8de055e3d",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-lib": { "nixpkgs-lib": {
"locked": { "locked": {
"lastModified": 1717284937, "lastModified": 1717284937,
@ -773,6 +789,7 @@
"nixos-router": "nixos-router", "nixos-router": "nixos-router",
"nixpkgs": "nixpkgs_3", "nixpkgs": "nixpkgs_3",
"nixpkgs-kernel": "nixpkgs-kernel", "nixpkgs-kernel": "nixpkgs-kernel",
"nixpkgs-kernel2": "nixpkgs-kernel2",
"notlua": "notlua", "notlua": "notlua",
"notnft": "notnft", "notnft": "notnft",
"nur": "nur", "nur": "nur",
@ -937,17 +954,17 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1723550937, "lastModified": 1723583256,
"narHash": "sha256-5gEXPy9qIrNi0nPk3D1ctVxh5Ndfrhyu+02R6BIcnHQ=", "narHash": "sha256-EhgdkSGgEFZJsPhlq3tG9LvWBaix/ZoLUeqcAUPDWlk=",
"ref": "refs/heads/master", "owner": "chayleaf",
"rev": "e0f642180056f351fd712f2b4f3149fd9f02367f", "repo": "unbound-rust-mod",
"revCount": 24, "rev": "8a99f2ed1290addee2eabeb5963e6bfc4f825295",
"type": "git", "type": "github"
"url": "https://git.pavluk.org/chayleaf/unbound-rust-mod.git"
}, },
"original": { "original": {
"type": "git", "owner": "chayleaf",
"url": "https://git.pavluk.org/chayleaf/unbound-rust-mod.git" "repo": "unbound-rust-mod",
"type": "github"
} }
}, },
"utils": { "utils": {

View file

@ -4,6 +4,7 @@
inputs = { inputs = {
nix-community-infra.url = "github:nix-community/infra"; nix-community-infra.url = "github:nix-community/infra";
nixpkgs-kernel.url = "github:NixOS/nixpkgs/c7b821ba2e1e635ba5a76d299af62821cbcb09f3"; nixpkgs-kernel.url = "github:NixOS/nixpkgs/c7b821ba2e1e635ba5a76d299af62821cbcb09f3";
nixpkgs-kernel2.url = "github:NixOS/nixpkgs/nixos-unstable";
nixpkgs.url = "github:chayleaf/nixpkgs"; nixpkgs.url = "github:chayleaf/nixpkgs";
nixos-hardware.url = "github:NixOS/nixos-hardware"; nixos-hardware.url = "github:NixOS/nixos-hardware";
nix-index-database = { nix-index-database = {
@ -53,7 +54,7 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
unbound-rust-mod = { unbound-rust-mod = {
url = "git+https://git.pavluk.org/chayleaf/unbound-rust-mod.git"; url = "github:chayleaf/unbound-rust-mod";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
flake-compat = { flake-compat = {
@ -205,6 +206,7 @@
({ config, ... }: { ({ config, ... }: {
_module.args = { _module.args = {
pkgs-kernel = import inputs.nixpkgs-kernel { inherit (args) system; overlays = all-overlays ++ config.nixpkgs.overlays; }; pkgs-kernel = import inputs.nixpkgs-kernel { inherit (args) system; overlays = all-overlays ++ config.nixpkgs.overlays; };
pkgs-kernel2 = import inputs.nixpkgs-kernel2 { inherit (args) system; overlays = all-overlays ++ config.nixpkgs.overlays; };
}; };
}) })
(getPrivSys hostname) (getPrivSys hostname)

View file

@ -37,7 +37,6 @@ in
"net.ipv4.tcp_congestion_control" = "bbr"; "net.ipv4.tcp_congestion_control" = "bbr";
}; };
# as expected, systemd initrd didn't work well, and i really cba to debug it
networking.useDHCP = false; networking.useDHCP = false;
networking.useNetworkd = true; networking.useNetworkd = true;
systemd.network = { systemd.network = {

View file

@ -13,7 +13,7 @@ let
in in
{ {
imports = [ imports = [
"${inputs.mobile-nixos}/modules/quirks/qualcomm/sdm845-modem.nix" # "${inputs.mobile-nixos}/modules/quirks/qualcomm/sdm845-modem.nix"
"${inputs.mobile-nixos}/modules/quirks/audio.nix" "${inputs.mobile-nixos}/modules/quirks/audio.nix"
]; ];
@ -36,7 +36,7 @@ in
}) })
]; ];
hardware.enableRedistributableFirmware = true; hardware.enableRedistributableFirmware = true;
mobile.quirks.qualcomm.sdm845-modem.enable = true; # mobile.quirks.qualcomm.sdm845-modem.enable = true;
mobile.quirks.audio.alsa-ucm-meld = true; mobile.quirks.audio.alsa-ucm-meld = true;
environment.systemPackages = [ hw.alsa-ucm-conf ]; environment.systemPackages = [ hw.alsa-ucm-conf ];
systemd.services.q6voiced = { systemd.services.q6voiced = {

View file

@ -1,4 +1,4 @@
{ pkgs { pkgs-kernel2
, config , config
, ... }: , ... }:
@ -8,7 +8,7 @@
"phy-rockchip-naneng-combphy" "phy-rockchip-naneng-combphy"
]; ];
boot.kernelPackages = pkgs.linuxPackagesFor pkgs.linux_latest; boot.kernelPackages = pkgs-kernel2.linuxPackagesFor pkgs-kernel2.linux_latest;
boot.kernelParams = [ "dtb=/${config.hardware.deviceTree.name}" ]; boot.kernelParams = [ "dtb=/${config.hardware.deviceTree.name}" ];
hardware.deviceTree.enable = true; hardware.deviceTree.enable = true;

View file

@ -149,20 +149,13 @@
isNormalUser = true; isNormalUser = true;
}; };
nix.settings = { nix.settings = {
netrc-file = "/secrets/netrc";
trusted-users = [ "hydra-builder" ]; trusted-users = [ "hydra-builder" ];
substituters = [
"https://binarycache.pavluk.org"
"https://cache.nixos.org/"
];
trusted-substituters = [ trusted-substituters = [
"https://nix-community.cachix.org" "https://nix-community.cachix.org"
"https://nix-gaming.cachix.org" "https://nix-gaming.cachix.org"
"https://nixpkgs-wayland.cachix.org" "https://nixpkgs-wayland.cachix.org"
]; ];
trusted-public-keys = [ trusted-public-keys = [
"binarycache.pavluk.org:Vk0ms/vSqoOV2JXeNVOroc8EfilgVxCCUtpCShGIKsQ="
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4=" "nix-gaming.cachix.org-1:nbjlureqMbRAxR1gJ/f3hxemL9svXaZF/Ees8vCUUs4="
"nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA=" "nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA="

View file

@ -112,6 +112,7 @@ in {
"https://git.sr.ht/" "https://git.sr.ht/"
"https://api.github.com/repos/" "https://api.github.com/repos/"
"https://github.com/" "https://github.com/"
"https://git.pavluk.org/"
# for nginx CF-Connecting-IP config generation # for nginx CF-Connecting-IP config generation
"https://www.cloudflare.com/ips-v4" "https://www.cloudflare.com/ips-v4"
"https://www.cloudflare.com/ips-v6" "https://www.cloudflare.com/ips-v6"

View file

@ -205,6 +205,18 @@ in {
security.rtkit.enable = true; security.rtkit.enable = true;
services.dbus.enable = true; services.dbus.enable = true;
programs.dconf.enable = true; programs.dconf.enable = true;
nix.settings = {
netrc-file = "/secrets/netrc";
substituters = [
"https://binarycache.pavluk.org"
"https://cache.nixos.org/"
];
trusted-public-keys = [
"binarycache.pavluk.org:Vk0ms/vSqoOV2JXeNVOroc8EfilgVxCCUtpCShGIKsQ="
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
];
};
}) })
]; ];