Compare commits

..

No commits in common. "e75a5fc02e2da6b764b0952711dec2d72e282103" and "aee4da8b9ec473c170ac27e64bd2851c33187652" have entirely different histories.

3 changed files with 38 additions and 36 deletions

View file

@ -433,11 +433,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1704498488, "lastModified": 1704383912,
"narHash": "sha256-yINKdShHrtjdiJhov+q0s3Y3B830ujRoSbHduUNyKag=", "narHash": "sha256-Be7O73qoOj/z+4ZCgizdLlu+5BkVvO2KO299goZ9cW8=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "51e44a13acea71b36245e8bd8c7db53e0a3e61ee", "rev": "26b8adb300e50efceb51fff6859a1a6ba1ade4f7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -455,11 +455,11 @@
"xdph": "xdph" "xdph": "xdph"
}, },
"locked": { "locked": {
"lastModified": 1704649868, "lastModified": 1704401523,
"narHash": "sha256-PKVOCPV5i8prioWway5PjRMsICtrVONV3y5W69gQLWw=", "narHash": "sha256-NSomiVEOXMRYlYLkPtBfXmMEL73tvWDAinG6zRWeRPo=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "Hyprland", "repo": "Hyprland",
"rev": "d7d333d162da2d3fc852b2c7a3faa2709440cefa", "rev": "aeeeace102c14ea0ab4df6840ee225e1b14ea970",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -522,11 +522,11 @@
"rust-overlay": "rust-overlay_2" "rust-overlay": "rust-overlay_2"
}, },
"locked": { "locked": {
"lastModified": 1704497899, "lastModified": 1704230057,
"narHash": "sha256-eyImNjgTHaF+be2fnNFY+Lv73rWVj7yOGxrafZNB/gI=", "narHash": "sha256-YTkPHIM/RF1WtWqRAxlaE2lqvzEBa58SZzQZB2sx4PY=",
"owner": "nix-community", "owner": "nix-community",
"repo": "lanzaboote", "repo": "lanzaboote",
"rev": "a454a5894700db8b85d0e08ae1bb870c4b88ef77", "rev": "81f7a56f0ee6bb454284feeeb192df56e39d98d1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -549,11 +549,11 @@
"treefmt-nix": "treefmt-nix" "treefmt-nix": "treefmt-nix"
}, },
"locked": { "locked": {
"lastModified": 1704629536, "lastModified": 1704275368,
"narHash": "sha256-hCMBZ61Kpj54JD/miAhhoSHWMyP6NWrOmYOSHd0rB4E=", "narHash": "sha256-Ertx6H6k4UM61g/DjBS+mBUSUgtL6dEQWn0MgDLNbOg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixos-anywhere", "repo": "nixos-anywhere",
"rev": "4c94cecf3dd551adf1359fb06aa926330f44e5a6", "rev": "1d0b24b0a8b97643e51ed859793c92231807bb2a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -564,11 +564,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1704632650, "lastModified": 1704445197,
"narHash": "sha256-83J/nd/NoLqo3vj0S0Ppqe8L+ijIFiGL6HNDfCCUD/Q=", "narHash": "sha256-GGtUGSXlwWM3bNTlNgFtsM4TJ2xFMecLjKbfiqOgbZI=",
"owner": "nixos", "owner": "nixos",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "c478b3d56969006e015e55aaece4931f3600c1b2", "rev": "03e00336034c75e67609e953ded47c23de7f90f7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1079,11 +1079,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1704649711, "lastModified": 1704233915,
"narHash": "sha256-+qxqJrZwvZGilGiLQj3QbYssPdYCwl7ejwMImgH7VBQ=", "narHash": "sha256-GYDC4HjyVizxnyKRbkrh1GugGp8PP3+fJuh40RPCN7k=",
"owner": "numtide", "owner": "numtide",
"repo": "treefmt-nix", "repo": "treefmt-nix",
"rev": "04f25d7bec9fb29d2c3bacaa48a3304840000d36", "rev": "e434da615ef74187ba003b529cc72f425f5d941e",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -8,11 +8,5 @@
# domain name servers, use clouflare family # domain name servers, use clouflare family
nameservers = ["1.1.1.2" "1.0.0.2"]; nameservers = ["1.1.1.2" "1.0.0.2"];
# firewall
firewall.enable = true;
# https://github.com/StevenBlack/hosts
stevenblack.enable = true;
}; };
} }

View file

@ -1,18 +1,26 @@
{...}: { {lib, ...}: {
network = { # the name of the machine
# the name of the machine networking.hostName = "neodymium";
hostName = "neodymium";
# domain name servers, use clouflare family # domain name servers, use clouflare family
nameservers = ["1.1.1.2" "1.0.0.2"]; networking.nameservers = ["1.1.1.2" "1.0.0.2"];
# use networkManager, see nmcli # use networkManager, see nmcli
networkmanager.enable = true; networking.networkmanager.enable = true;
# firewall # firewall
firewall.enable = true; networking.firewall = {
enable = true;
# https://github.com/StevenBlack/hosts allowedTCPPorts = [];
stevenblack.enable = true; allowedUDPPorts = [];
}; };
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp4s0.useDHCP = lib.mkDefault true;
} }