Add direnv and remove some unused stuff
Some checks failed
Nix: validate flake.lock / Check Lockfile (push) Has been cancelled
Nix: validate flake / Validate x86_64-linux (push) Has been cancelled
Trufflehog: check for exposed secrets / Run trufflehog (push) Has been cancelled
Nix: check for unused code / Run deadnix (push) Has been cancelled

This commit is contained in:
Jo 2025-10-15 11:07:39 +02:00
parent 92c9d47900
commit fad807fb47
9 changed files with 74 additions and 144 deletions

View file

@ -5,13 +5,11 @@
./hardware-generated.nix
];
# Todo: automate this globally for all workstation and server archetypes!
# Configure Sops
sops.defaultSopsFile = ./secrets/users.yaml;
sops.age.keyFile = "/var/lib/sops-nix/key.txt";
programs.steam.enable = true;
programs.steam.remotePlay.openFirewall = true;
puzzlevision = {
users.jo = {
@ -23,32 +21,8 @@
];
};
users.drfrontend = {
enable = true;
hashedPassword = "$6$mvK9bT756Aok54Vt$vBRnT66Vb3HL0Y5rEMJlHvKkvzVQ.KUciInTmW3FCBFT00IuFMpz3q9RhXPLTLMRPho65bTg9hMnFPb84I774.";
extraGroups = [
"wheel"
"docker"
];
};
archetypes.laptop.enable = true;
system.kernel.version = "linuxPackages_zen";
};
# Configure some last-resort aggressive nix-daemon OOM protection
systemd = {
# Create a separate slice for nix-daemon that is
# memory-managed by the userspace systemd-oomd killer
slices."nix-daemon".sliceConfig = {
ManagedOOMMemoryPressure = "kill";
ManagedOOMMemoryPressureLimit = "50%";
};
services."nix-daemon".serviceConfig.Slice = "nix-daemon.slice";
# If a kernel-level OOM event does occur anyway,
# strongly prefer killing nix-daemon child processes
services."nix-daemon".serviceConfig.OOMScoreAdjust = 1000;
system.kernel.version = "linuxPackages_6_16";
};
boot = {

View file

@ -77,7 +77,6 @@
# Kill processes before they can cause an OOM exception
earlyoom = {
enable = true;
enableNotifications = true;
};
# Enable Thermald for improved overheating protection