Compare commits
2 Commits
f5b3a04378
...
1210a44ecc
| Author | SHA1 | Date | |
|---|---|---|---|
| 1210a44ecc | |||
| e2b040e5f0 |
@@ -2,7 +2,7 @@
|
|||||||
# your system. Help is available in the configuration.nix(5) man page, on
|
# your system. Help is available in the configuration.nix(5) man page, on
|
||||||
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
|
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
|
||||||
|
|
||||||
{ config, lib, pkgs, self, paths, keys, ... }:
|
{ config, lib, pkgs, paths, keys, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
# NAS Mounting
|
# NAS Mounting
|
||||||
@@ -16,7 +16,7 @@
|
|||||||
nix.gc = {
|
nix.gc = {
|
||||||
automatic = true;
|
automatic = true;
|
||||||
dates = "daily"; # You can also use "daily" or a cron-like spec
|
dates = "daily"; # You can also use "daily" or a cron-like spec
|
||||||
options = "--delete-older-than 7d"; # Keep only 7 days of unreferenced data
|
options = "--delete-older-than 30d";
|
||||||
};
|
};
|
||||||
|
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
@@ -162,18 +162,18 @@
|
|||||||
services.zfs.autoSnapshot.enable = true;
|
services.zfs.autoSnapshot.enable = true;
|
||||||
services.zfs.autoScrub.enable = true;
|
services.zfs.autoScrub.enable = true;
|
||||||
|
|
||||||
hardware.graphics = {
|
# hardware.graphics = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
enable32Bit = true;
|
# enable32Bit = true;
|
||||||
extraPackages = with pkgs; [
|
# extraPackages = with pkgs; [
|
||||||
rocmPackages.clr
|
# rocmPackages.clr
|
||||||
rocmPackages.rocblas
|
# rocmPackages.rocblas
|
||||||
rocmPackages.rocrand
|
# rocmPackages.rocrand
|
||||||
rocmPackages.rocminfo
|
# rocmPackages.rocminfo
|
||||||
rocmPackages.hipcc
|
# rocmPackages.hipcc
|
||||||
rocmPackages.hiprt
|
# rocmPackages.hiprt
|
||||||
];
|
# ];
|
||||||
};
|
# };
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
|
|||||||
@@ -1,14 +1,9 @@
|
|||||||
{ config, pkgs, self, ... }:
|
{ config, pkgs, self, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
network_compose_dir = pkgs.stdenv.mkDerivation {
|
network_compose_dir = builtins.path {
|
||||||
name = "network_compose_dir";
|
name = "network_compose_dir";
|
||||||
src = self + "/assets/compose/network";
|
path = self + "/assets/compose/network";
|
||||||
dontUnpack = true;
|
|
||||||
installPhase = ''
|
|
||||||
mkdir -p $out
|
|
||||||
cp -r $src/* $out/
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -1,14 +1,9 @@
|
|||||||
{ config, pkgs, self, ... }:
|
{ config, pkgs, self, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
passwordmanager_compose_dir = pkgs.stdenv.mkDerivation {
|
passwordmanager_compose_dir = builtins.path {
|
||||||
name = "passwordmanager_compose_dir";
|
name = "passwordmanager_compose_dir";
|
||||||
src = self + "/assets/compose/passwordmanager";
|
path = self + "/assets/compose/passwordmanager";
|
||||||
dontUnpack = true;
|
|
||||||
installPhase = ''
|
|
||||||
mkdir -p $out
|
|
||||||
cp -r $src/* $out/
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -1,14 +1,9 @@
|
|||||||
{ config, pkgs, self, ... }:
|
{ config, pkgs, self, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
versioncontrol_compose_dir = pkgs.stdenv.mkDerivation {
|
versioncontrol_compose_dir = builtins.path {
|
||||||
name = "versioncontrol_compose_dir";
|
name = "versioncontrol_compose_dir";
|
||||||
src = self + "/assets/compose/versioncontrol";
|
path = self + "/assets/compose/versioncontrol";
|
||||||
dontUnpack = true;
|
|
||||||
installPhase = ''
|
|
||||||
mkdir -p $out
|
|
||||||
cp -r $src/* $out/
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|||||||
Reference in New Issue
Block a user