From 60d3c9041fed8344cd53e7de7f8553b300e7eead Mon Sep 17 00:00:00 2001 From: KaitoTLex Date: Fri, 7 Mar 2025 12:18:43 -0800 Subject: [PATCH] hotfix: intel CPU Hardware decoding --- flake.lock | 192 +++++++++++++++++++++++--------- hosts/shiroko/configuration.nix | 60 +++++++++- modules/stylix/default.nix | 2 +- users/kaitotlex/home.nix | 9 +- 4 files changed, 201 insertions(+), 62 deletions(-) diff --git a/flake.lock b/flake.lock index d96e054..4051202 100644 --- a/flake.lock +++ b/flake.lock @@ -70,44 +70,45 @@ "base16-vim": { "flake": false, "locked": { - "lastModified": 1735953590, - "narHash": "sha256-YbQwaApLFJobn/0lbpMKcJ8N5axKlW2QIGkDS5+xoSU=", + "lastModified": 1732806396, + "narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=", "owner": "tinted-theming", "repo": "base16-vim", - "rev": "c2a1232aa2c0ed27dcbf005779bcfe0e0ab5e85d", + "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", "type": "github" }, "original": { "owner": "tinted-theming", "repo": "base16-vim", + "rev": "577fe8125d74ff456cf942c733a85d769afe58b7", "type": "github" } }, "cpu-microcodes": { "flake": false, "locked": { - "lastModified": 1737223256, - "narHash": "sha256-aETUoryCkJSRWlxbgL8im40+2FfOm0u4X9aP5aZueME=", + "lastModified": 1740920267, + "narHash": "sha256-OzItboxMQdjBZGYgggTeUMlKD3u5egpQxs2zLZ+IPmM=", "owner": "platomav", "repo": "CPUMicrocodes", - "rev": "984b766433e99c7e945b5cc17519bb088084b3fd", + "rev": "f22581017de2d0a67b9fb4109ea04b5fda649966", "type": "github" }, "original": { "owner": "platomav", "repo": "CPUMicrocodes", - "rev": "984b766433e99c7e945b5cc17519bb088084b3fd", + "rev": "f22581017de2d0a67b9fb4109ea04b5fda649966", "type": "github" } }, "firefox-gnome-theme": { "flake": false, "locked": { - "lastModified": 1736899990, - "narHash": "sha256-S79Hqn2EtSxU4kp99t8tRschSifWD4p/51++0xNWUxw=", + "lastModified": 1739223196, + "narHash": "sha256-vAxN2f3rvl5q62gQQjZGVSvF93nAsOxntuFz+e/655w=", "owner": "rafaelmardojai", "repo": "firefox-gnome-theme", - "rev": "91ca1f82d717b02ceb03a3f423cbe8082ebbb26d", + "rev": "a89108e6272426f4eddd93ba17d0ea101c34fb21", "type": "github" }, "original": { @@ -117,7 +118,6 @@ } }, "flake-compat": { - "flake": false, "locked": { "lastModified": 1733328505, "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", @@ -132,19 +132,25 @@ "type": "github" } }, - "flake-compat_2": { - "flake": false, + "flake-parts": { + "inputs": { + "nixpkgs-lib": [ + "stylix", + "nur", + "nixpkgs" + ] + }, "locked": { - "lastModified": 1733328505, - "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", - "owner": "edolstra", - "repo": "flake-compat", - "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", + "lastModified": 1733312601, + "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=", + "owner": "hercules-ci", + "repo": "flake-parts", + "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9", "type": "github" }, "original": { - "owner": "edolstra", - "repo": "flake-compat", + "owner": "hercules-ci", + "repo": "flake-parts", "type": "github" } }, @@ -198,11 +204,11 @@ ] }, "locked": { - "lastModified": 1735882644, - "narHash": "sha256-3FZAG+pGt3OElQjesCAWeMkQ7C/nB1oTHLRQ8ceP110=", + "lastModified": 1737465171, + "narHash": "sha256-R10v2hoJRLq8jcL4syVFag7nIGE7m13qO48wRIukWNg=", "owner": "cachix", "repo": "git-hooks.nix", - "rev": "a5a961387e75ae44cc20f0a57ae463da5e959656", + "rev": "9364dc02281ce2d37a1f55b6e51f7c0f65a75f17", "type": "github" }, "original": { @@ -257,11 +263,11 @@ ] }, "locked": { - "lastModified": 1737188535, - "narHash": "sha256-O2ttwW1/dUc/Y+Rf48Njtr4tZpRJhy8FhafikekIjMY=", + "lastModified": 1741217763, + "narHash": "sha256-g/TrltIjFHIjtzKY5CJpoPANfHQWDD43G5U1a/v5oVg=", "owner": "nix-community", "repo": "home-manager", - "rev": "1e36429705f9af2d00a517ba46a4f21ef8a8194f", + "rev": "486b066025dccd8af7fbe5dd2cc79e46b88c80da", "type": "github" }, "original": { @@ -278,11 +284,11 @@ ] }, "locked": { - "lastModified": 1736785676, - "narHash": "sha256-TY0jUwR3EW0fnS0X5wXMAVy6h4Z7Y6a3m+Yq++C9AyE=", + "lastModified": 1740347597, + "narHash": "sha256-st5q9egkPGz8TUcVVlIQX7y6G3AzHob+6M963bwVq74=", "owner": "nix-community", "repo": "home-manager", - "rev": "fc52a210b60f2f52c74eac41a8647c1573d2071d", + "rev": "12e26a74e5eb1a31e13daaa08858689e25ebd449", "type": "github" }, "original": { @@ -308,11 +314,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1737062831, - "narHash": "sha256-Tbk1MZbtV2s5aG+iM99U8FqwxU/YNArMcWAv6clcsBc=", + "lastModified": 1741246872, + "narHash": "sha256-Q6pMP4a9ed636qilcYX8XUguvKl/0/LGXhHcRI91p0U=", "owner": "nixos", "repo": "nixpkgs", - "rev": "5df43628fdf08d642be8ba5b3625a6c70731c19c", + "rev": "10069ef4cf863633f57238f179a0297de84bd8d3", "type": "github" }, "original": { @@ -332,11 +338,11 @@ "plugins-pomo-nvim": "plugins-pomo-nvim" }, "locked": { - "lastModified": 1737164379, - "narHash": "sha256-/lERZhJCq+eXPUENu0a8MwVbO8CMMn2ooej3l3+jc1U=", + "lastModified": 1741330840, + "narHash": "sha256-wFdRuxHa2S+ThnISL/YRfNgHMgRH/4xCWxVzgYGDUS8=", "owner": "kaitotlex", "repo": "vix1", - "rev": "30506bcd245c0d44d8cfcda446ff7abb2b12ae1f", + "rev": "32526e16993656421d44d14222b559ca80849c96", "type": "github" }, "original": { @@ -345,6 +351,29 @@ "type": "github" } }, + "nur": { + "inputs": { + "flake-parts": "flake-parts", + "nixpkgs": [ + "stylix", + "nixpkgs" + ], + "treefmt-nix": "treefmt-nix" + }, + "locked": { + "lastModified": 1740408283, + "narHash": "sha256-2xECnhgF3MU9YjmvOkrRp8wRFo2OjjewgCtlfckhL5s=", + "owner": "nix-community", + "repo": "NUR", + "rev": "496a4a11162bdffb9a7b258942de138873f019f7", + "type": "github" + }, + "original": { + "owner": "nix-community", + "repo": "NUR", + "type": "github" + } + }, "plugins-blink-ripgrep": { "flake": false, "locked": { @@ -392,17 +421,17 @@ }, "spicetify": { "inputs": { - "flake-compat": "flake-compat", "nixpkgs": [ "nixpkgs" - ] + ], + "systems": "systems" }, "locked": { - "lastModified": 1737173687, - "narHash": "sha256-+WxaXc30KhTuCa9U8Nv2mJApIBq85CfA5fbcVsvdfxo=", + "lastModified": 1740889006, + "narHash": "sha256-A1iyKVvZrLdLwqWPC9OvPjC85ADQn2R1EGfCzJBl+wI=", "owner": "Gerg-L", "repo": "spicetify-nix", - "rev": "c68c2ac0814ab386d2cbd3b9178e729b4fc805f0", + "rev": "f8d3757d4ae3af2175a631fb9598a42d30ee75fc", "type": "github" }, "original": { @@ -418,7 +447,7 @@ "base16-helix": "base16-helix", "base16-vim": "base16-vim", "firefox-gnome-theme": "firefox-gnome-theme", - "flake-compat": "flake-compat_2", + "flake-compat": "flake-compat", "flake-utils": "flake-utils", "git-hooks": "git-hooks", "gnome-shell": "gnome-shell", @@ -426,18 +455,20 @@ "nixpkgs": [ "nixpkgs" ], - "systems": "systems", + "nur": "nur", + "systems": "systems_2", "tinted-foot": "tinted-foot", "tinted-kitty": "tinted-kitty", + "tinted-schemes": "tinted-schemes", "tinted-tmux": "tinted-tmux", "tinted-zed": "tinted-zed" }, "locked": { - "lastModified": 1737207873, - "narHash": "sha256-XTCuMv753lpm8DvdVf9q2mH3rhlfsKrCUYbaADPC/bA=", + "lastModified": 1741112087, + "narHash": "sha256-dBGwN4aHmX2QUXolZDhV+p06+WM5ZykL4wd9BD6bT7k=", "owner": "danth", "repo": "stylix", - "rev": "51ad2cec11e773a949bdbec88bed2524f098f49a", + "rev": "11780517948f214b9f93d1bf5a2d29bc181d3a33", "type": "github" }, "original": { @@ -461,6 +492,21 @@ "type": "github" } }, + "systems_2": { + "locked": { + "lastModified": 1681028828, + "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", + "owner": "nix-systems", + "repo": "default", + "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", + "type": "github" + }, + "original": { + "owner": "nix-systems", + "repo": "default", + "type": "github" + } + }, "tinted-foot": { "flake": false, "locked": { @@ -495,14 +541,30 @@ "type": "github" } }, + "tinted-schemes": { + "flake": false, + "locked": { + "lastModified": 1740351358, + "narHash": "sha256-Hdk850xgAd3DL8KX0AbyU7tC834d3Lej1jOo3duWiOA=", + "owner": "tinted-theming", + "repo": "schemes", + "rev": "a1bc2bd89e693e7e3f5764cfe8114e2ae150e184", + "type": "github" + }, + "original": { + "owner": "tinted-theming", + "repo": "schemes", + "type": "github" + } + }, "tinted-tmux": { "flake": false, "locked": { - "lastModified": 1735737224, - "narHash": "sha256-FO2hRBkZsjlIRqzNHCPc/52yxg11kHGA8MEtSun9RwE=", + "lastModified": 1740272597, + "narHash": "sha256-/etfUV3HzAaLW3RSJVwUaW8ULbMn3v6wbTlXSKbcoWQ=", "owner": "tinted-theming", "repo": "tinted-tmux", - "rev": "aead506a9930c717ebf81cc83a2126e9ca08fa64", + "rev": "b6c7f46c8718cc484f2db8b485b06e2a98304cd0", "type": "github" }, "original": { @@ -527,16 +589,38 @@ "type": "github" } }, + "treefmt-nix": { + "inputs": { + "nixpkgs": [ + "stylix", + "nur", + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1733222881, + "narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=", + "owner": "numtide", + "repo": "treefmt-nix", + "rev": "49717b5af6f80172275d47a418c9719a31a78b53", + "type": "github" + }, + "original": { + "owner": "numtide", + "repo": "treefmt-nix", + "type": "github" + } + }, "ucodenix": { "inputs": { "cpu-microcodes": "cpu-microcodes" }, "locked": { - "lastModified": 1737386190, - "narHash": "sha256-r9UOn9nMqDjY+ohnNCKs8SgN55UXTPI+RWhka2RcsXY=", + "lastModified": 1741024244, + "narHash": "sha256-nuyOvpKTqpE0dQjqtm17C/QEXhIXUpsmosuzDhSAe/c=", "owner": "e-tho", "repo": "ucodenix", - "rev": "4c7931fcf713c4ddf730d275f07d916c5f4c4e7a", + "rev": "2fb0f8ad462f3233ef91b471ee6f1f7c2689a4f9", "type": "github" }, "original": { @@ -568,11 +652,11 @@ ] }, "locked": { - "lastModified": 1737173095, - "narHash": "sha256-32xX3cAIQovRNtW5cHirLvSC87uoOfLcaYGUOrTyhx4=", + "lastModified": 1740729275, + "narHash": "sha256-/0dJi65+7oBpfEYWrg4jihkEzAf975TVeOk+FpxaW6o=", "owner": "youwen5", "repo": "zen-browser-flake", - "rev": "e91b2aa537c1492efd1c5f35f1f204c685e461ab", + "rev": "17bd241d6a5692848b01737f595824a707de855a", "type": "github" }, "original": { diff --git a/hosts/shiroko/configuration.nix b/hosts/shiroko/configuration.nix index 328aab5..b3ab013 100644 --- a/hosts/shiroko/configuration.nix +++ b/hosts/shiroko/configuration.nix @@ -13,13 +13,26 @@ ]; services.fprintd.enable = true; security.pam.services.login.fprintAuth = true; + hardware.graphics.extraPackages = with pkgs; [ vaapiIntel intel-media-driver ]; + hardware.opengl = { + enable = true; + extraPackages = with pkgs; [ + # your Open GL, Vulkan and VAAPI drivers + vpl-gpu-rt # for newer GPUs on NixOS >24.05 or unstable + # onevpl-intel-gpu # for newer GPUs on NixOS <= 24.05 + # intel-media-sdk # for older GPUs + ]; + }; hardware = { graphics.enable32Bit = true; pulseaudio.support32Bit = true; openrazer.enable = true; }; - + virtualisation.podman = { + enable = true; + dockerCompat = true; + }; boot = { # Bootloader. loader.systemd-boot.enable = true; @@ -113,6 +126,7 @@ }; environment.systemPackages = with pkgs; [ openrazer-daemon + distrobox ]; # Set your time zone. time.timeZone = "America/Los_Angeles"; # Asia/Taipei lib.mkDefault @@ -135,7 +149,47 @@ }; }; # Select internationalisation properties. - i18n.defaultLocale = "en_US.UTF-8"; + +networking.firewall = { + allowedUDPPorts = [ 51820 ]; # Clients and peers can use the same port, see listenport + }; + # Enable WireGuard + # networking.wireguard.interfaces = { + # # "wg0" is the network interface name. You can name the interface arbitrarily. + # wg0 = { + # # Determines the IP address and subnet of the client's end of the tunnel interface. + # ips = [ "10.100.0.2/24" ]; + # listenPort = 51820; # to match firewall allowedUDPPorts (without this wg uses random port numbers) + # + # # Path to the private key file. + # # + # # Note: The private key can also be included inline via the privateKey option, + # # but this makes the private key world-readable; thus, using privateKeyFile is + # # recommended. + # privateKeyFile = "path to private key file"; + # + # peers = [ + # # For a client configuration, one peer entry for the server will suffice. + # + # { + # # Public key of the server (not a file path). + # publicKey = "{server public key}"; + # + # # Forward all the traffic via VPN. + # allowedIPs = [ "0.0.0.0/0" ]; + # # Or forward only particular subnets + # #allowedIPs = [ "10.100.0.1" "91.108.12.0/22" ]; + # + # # Set this to the server IP and port. + # endpoint = "{server ip}:51820"; # ToDo: route to endpoint not automatically configured https://wiki.archlinux.org/index.php/WireGuard#Loop_routing https://discourse.nixos.org/t/solved-minimal-firewall-setup-for-wireguard-client/7577 + # + # # Send keepalives every 25 seconds. Important to keep NAT tables alive. + # persistentKeepalive = 25; + # } + # ]; + # }; + # }; +i18n.defaultLocale = "en_US.UTF-8"; i18n.extraLocaleSettings = { LC_ADDRESS = "en_US.UTF-8"; @@ -148,7 +202,7 @@ LC_TELEPHONE = "en_US.UTF-8"; LC_TIME = "en_US.UTF-8"; }; - + # Some programs need SUID wrappers, can be configured further or are # started in user sessions. # programs.mtr.enable = true; diff --git a/modules/stylix/default.nix b/modules/stylix/default.nix index 4c5fa61..802ccb8 100644 --- a/modules/stylix/default.nix +++ b/modules/stylix/default.nix @@ -6,7 +6,7 @@ stylix = { enable = true; - image = "${inputs.wallpapers}/vtubers/nordMachi-resized.png"; + image = "${inputs.wallpapers}/math/fastInversNord.png"; polarity = "dark"; base16Scheme = "${pkgs.base16-schemes}/share/themes/rose-pine.yaml"; diff --git a/users/kaitotlex/home.nix b/users/kaitotlex/home.nix index e13837c..87deeef 100644 --- a/users/kaitotlex/home.nix +++ b/users/kaitotlex/home.nix @@ -22,6 +22,9 @@ home.packages = with pkgs; [ # here is some command line tools I use frequently # feel free to add your own or remove some of them + gfortran + affine-bin + elmPackages.elm kicad android-tools wacomtablet @@ -80,7 +83,6 @@ sl piper nwg-displays - dolphin xfce.thunar tailwindcss @@ -166,7 +168,6 @@ texlivePackages.csquotes texlivePackages.csquotes-de texlivePackages.collection-latexextra - texpresso btop # replacement of htop/nmon iotop # io monitoring @@ -200,7 +201,7 @@ netcat nmap metasploit - john + #john lynis hydra-cli #ghidra @@ -230,7 +231,7 @@ userEmail = "wlin@kaitotlex.systems"; signing = { signByDefault = true; - key = "2AE6771F14386F9B85E48685A9209668BFA39C0E"; + key = "BC04C0C14AEDA705B8FBACE8C5F52A3C0F3B4A77"; }; };