From 4f015ecb455827a787003302ab3a785f2f6b8bd4 Mon Sep 17 00:00:00 2001 From: cy Date: Wed, 29 Jan 2025 21:48:31 -0500 Subject: [PATCH 1/9] vscode: overlay github codespaces extension Signed-off-by: cy --- home/vscode.nix | 6 ++++-- overlay/default.nix | 1 + overlay/vscode.nix | 14 ++++++++++++++ 3 files changed, 19 insertions(+), 2 deletions(-) create mode 100644 overlay/vscode.nix diff --git a/home/vscode.nix b/home/vscode.nix index 0c1bf95..214a060 100644 --- a/home/vscode.nix +++ b/home/vscode.nix @@ -11,6 +11,7 @@ jnoortheen.nix-ide editorconfig.editorconfig github.github-vscode-theme + github.codespaces ]; userSettings = { "workbench.colorTheme" = "GitHub Dark Default"; @@ -18,10 +19,10 @@ "nix.enableLanguageServer" = true; "nix.serverPath" = "nixd"; "editor.fontFamily" = "IBM Plex Mono"; - "editor.fontSize" = 15; + "editor.fontSize" = 16; "editor.wordWrap" = "on"; - # vim mode + # vim mode settings "vim.handleKeys" = { "" = false; # file tree toggle }; @@ -32,6 +33,7 @@ "silent" = true; } ]; + "workbench.startupEditor" = "none"; }; }; } diff --git a/overlay/default.nix b/overlay/default.nix index 99fc17b..5b6a9a8 100644 --- a/overlay/default.nix +++ b/overlay/default.nix @@ -2,6 +2,7 @@ let overlays = [ ./conduwuit ./attic + ./vscode.nix ]; importedOverlays = map (m: import m) overlays; in diff --git a/overlay/vscode.nix b/overlay/vscode.nix new file mode 100644 index 0000000..4de2d90 --- /dev/null +++ b/overlay/vscode.nix @@ -0,0 +1,14 @@ +final: prev: { + vscode-extensions = prev.vscode-extensions // { + github = prev.vscode-extensions.github // { + codespaces = prev.vscode-utils.buildVscodeMarketplaceExtension { + mktplcRef = { + publisher = "github"; + name = "codespaces"; + version = "1.17.3"; + hash = "sha256-idJFYHJ4yeqpFZBX55Y0v1yfzgqyhS0MrC4yIto7i7w="; + }; + }; + }; + }; +} From 4e0c1fbbb4e2ee46580e2ce7ac07380e541e2aff Mon Sep 17 00:00:00 2001 From: cy Date: Thu, 30 Jan 2025 12:33:03 -0500 Subject: [PATCH 2/9] caddy: use acme_dns for wildcard TLS to work use cloudflare dns plugin to update zone --- modules/caddy.nix | 13 +++++++++++++ secrets/services/caddy.yaml | 8 ++++---- 2 files changed, 17 insertions(+), 4 deletions(-) diff --git a/modules/caddy.nix b/modules/caddy.nix index 6d38b01..03d7a4a 100644 --- a/modules/caddy.nix +++ b/modules/caddy.nix @@ -1,6 +1,7 @@ { config, lib, + pkgs, ... }: let @@ -14,6 +15,14 @@ in config = lib.mkIf cfg.enable { services.caddy = { enable = true; + package = pkgs.caddy.withPlugins { + plugins = [ + # error message will tell you the correct version tag to use + # (still need the @ to pass nix config check) + "github.com/caddy-dns/cloudflare@v0.0.0-20240703190432-89f16b99c18e" + ]; + hash = "sha256-jCcSzenewQiW897GFHF9WAcVkGaS/oUu63crJu7AyyQ="; + }; logFormat = lib.mkForce "level INFO"; acmeCA = "https://acme-v02.api.letsencrypt.org/directory"; extraConfig = '' @@ -22,6 +31,10 @@ in header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" } ''; + globalConfig = '' + acme_dns cloudflare {$CLOUDFLARE_KEY} + ''; + environmentFile = config.sops.secrets."caddy/env".path; }; }; } diff --git a/secrets/services/caddy.yaml b/secrets/services/caddy.yaml index 9fea4c0..2ff8b4c 100644 --- a/secrets/services/caddy.yaml +++ b/secrets/services/caddy.yaml @@ -1,5 +1,5 @@ caddy: - env: ENC[AES256_GCM,data:uVCkVky5MRRhN+g4f634nBjvpcI5Ldy+eOKXg7eGu9foswTHA1SXDs67+Wuvo/jaPw7Zg67xKZRHnoTon1udQzyfu0T6pmVKfsUPewITYCd+qLTanFz6uVRUHzpUVwjCZNqB8gxNr/BiZ70NG4vQXRjgd3zKFrQYQBr4zSaP2vK1pRdbuQ==,iv:dQBfX4X8huUp2dqY3tEGW+BPZ/XADT10ptt85R7X+AY=,tag:cvMbFjkRHoxxnNfz8dGv5g==,type:str] + env: ENC[AES256_GCM,data:XyxcCVT+rwlS7A3xzUgGqpMoLwhfUJo2++zPTgoPt3q6Edt14bYQJsoSJXnKx/lGg/0ilNfEEg8AEnru/Mzx0bWedSdWuZ380l8wlLiucqQThhEBhEJlyd94BMNzhxFdj82w0ejp4oWb5By/WjkFNesvAyxPIo/Ir4S+fTgGpA1iO2Ms8Pdjp00qeXYsK1CfjaXOYlEP+8BxntN2JKLYb8Cgs7dLmHfUwP6gTFKlTukUTtQZYUw336q3TtGy,iv:Ab/E0ljUBxzWlXfAC2BXCYxlgo0ErvKFaubgVjFR3OU=,tag:Yr24/DofYS2lM6f2/1LQ3Q==,type:str] sops: kms: [] gcp_kms: [] @@ -33,8 +33,8 @@ sops: Q2hBZE1FOHJ3aW5rVmoyK045eG11cmsKFOmP5iWONREZvxu0rM+fKMPQKgnYq5LH AKMZFsP7nnUxjdCXEA18sDg4Rf0qp8i3uQK3D6P7417j9ye/YZA4BQ== -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-12-17T03:25:37Z" - mac: ENC[AES256_GCM,data:bhFBLkT2q6HGtTPtHLVZkKZn00Lbm11/u3qSR19lU2E1SsQ7mpukvCqcTxNWtJ+HHth6yJJfgM6XABKq/9/598L2MgGuF3C/GGS3xpjwHh5RyV8t1lV8cqDaZGjGOMGx35lFQ6DoXOreQrtP/f7MKzf+nVNFr1NbTR8YhqR1xDU=,iv:+fjYlbyIyM9nLagrvE+PUhC2pT7QTsTSQX7ELZ7Wuhs=,tag:GWQv6VmIsWwFzb4bUr5CLg==,type:str] + lastmodified: "2025-01-30T17:26:39Z" + mac: ENC[AES256_GCM,data:saoalvnwHsv0CTw/cRZqibnH9oGoZTNwGUT7RePKRa8OwNzbUEzQt+Z1WrmmWoqR+omQXLE+lpOPv6uNYxvAWnIelzCGeBBCMSBxtjlTUsjts7oFo7d9C5SdTIOkzotDxryvjRupb0P7hAmEqcSUKRZipJy5MVR7VXR1XZ4fIPM=,iv:VaP05zj8L2pygi1/M4BnOV3Inf0ssaWMu+aTBkdDMys=,tag:nuZT8GMB4F0T5dHnTvHOhA==,type:str] pgp: [] unencrypted_suffix: _unencrypted - version: 3.9.2 + version: 3.9.4 From d0ba9ca90b2c5447e018145c3427f221ebfd24fe Mon Sep 17 00:00:00 2001 From: cy Date: Thu, 30 Jan 2025 12:35:19 -0500 Subject: [PATCH 3/9] make garage better Signed-off-by: cy --- hosts/chunk/default.nix | 2 -- hosts/chunk/garage.nix | 27 +++++++++++++++++++++++---- 2 files changed, 23 insertions(+), 6 deletions(-) diff --git a/hosts/chunk/default.nix b/hosts/chunk/default.nix index 577e9b5..e149526 100644 --- a/hosts/chunk/default.nix +++ b/hosts/chunk/default.nix @@ -1,6 +1,4 @@ { - config, - lib, pkgs, ... }: diff --git a/hosts/chunk/garage.nix b/hosts/chunk/garage.nix index 75730a1..a6f39dd 100644 --- a/hosts/chunk/garage.nix +++ b/hosts/chunk/garage.nix @@ -8,6 +8,12 @@ s3_api = { s3_region = "earth"; api_bind_addr = "[::]:3900"; + root_domain = ".s3.cy7.sh"; + }; + s3_web = { + bind_addr = "[::]:3902"; + root_domain = ".web.s3.cy7.sh"; + index = "index.html"; }; admin.api_bind_addr = "[::]:3903"; rpc_bind_addr = "[::]:3901"; @@ -17,8 +23,21 @@ environmentFile = config.sops.secrets."garage/env".path; }; - services.caddy.virtualHosts."s3.cy7.sh".extraConfig = '' - import common - reverse_proxy localhost:3900 - ''; + services.caddy.virtualHosts = { + "s3.cy7.sh" = { + serverAliases = [ "*.s3.cy7.sh" ]; + extraConfig = '' + import common + reverse_proxy localhost:3900 + ''; + }; + "*.web.s3.cy7.sh".extraConfig = '' + import common + reverse_proxy localhost:3902 + ''; + "admin.s3.cy7.sh".extraConfig = '' + import common + reverse_proxy localhost:3903 + ''; + }; } From 30c82dcb4f92f028437e4645d0f40226d329eff5 Mon Sep 17 00:00:00 2001 From: cy Date: Thu, 30 Jan 2025 12:47:19 -0500 Subject: [PATCH 4/9] add sccache, some vscode changes, use kitten ssh --- .sops.yaml | 5 +++++ home/kitty.nix | 2 ++ home/niri/default.nix | 1 + home/vscode.nix | 3 ++- home/yt/ytnix.nix | 17 +++++++++++++++++ hosts/ytnix/default.nix | 8 ++++++++ secrets/yt/aws.yaml | 32 ++++++++++++++++++++++++++++++++ 7 files changed, 67 insertions(+), 1 deletion(-) create mode 100644 secrets/yt/aws.yaml diff --git a/.sops.yaml b/.sops.yaml index 810c6cb..e067ba9 100644 --- a/.sops.yaml +++ b/.sops.yaml @@ -108,3 +108,8 @@ creation_rules: - age: - *chunk - *cy + - path_regex: secrets/yt/(.*).yaml$ + key_groups: + - age: + - *yt + - *cy \ No newline at end of file diff --git a/home/kitty.nix b/home/kitty.nix index 7134390..da676cb 100644 --- a/home/kitty.nix +++ b/home/kitty.nix @@ -67,4 +67,6 @@ "kitty_mod+o>l" = "kitten hints --type linenum"; }; }; + + programs.zsh.shellAliases."ssh" = "kitten ssh"; } diff --git a/home/niri/default.nix b/home/niri/default.nix index 67720cb..f1c8172 100644 --- a/home/niri/default.nix +++ b/home/niri/default.nix @@ -102,6 +102,7 @@ in { app-id = "com.mitchellh.ghostt"; } { app-id = "org.kde.okular"; } { app-id = "kitty"; } + { app-id = "VSCodium"; } ]; default-column-width.proportion = .5; } diff --git a/home/vscode.nix b/home/vscode.nix index 214a060..2680ffe 100644 --- a/home/vscode.nix +++ b/home/vscode.nix @@ -11,7 +11,8 @@ jnoortheen.nix-ide editorconfig.editorconfig github.github-vscode-theme - github.codespaces + github.copilot + rust-lang.rust-analyzer ]; userSettings = { "workbench.colorTheme" = "GitHub Dark Default"; diff --git a/home/yt/ytnix.nix b/home/yt/ytnix.nix index e0ed53c..c047e8f 100644 --- a/home/yt/ytnix.nix +++ b/home/yt/ytnix.nix @@ -1,5 +1,6 @@ { pkgs, + lib, ... }: { @@ -108,6 +109,8 @@ hugo ghidra sequoia + sccache + awscli2 ]; programs.waybar.enable = true; @@ -164,5 +167,19 @@ home.sessionVariables = { # to make ghidra work on xwayland _JAVA_AWT_WM_NONREPARENTING = 1; + + # sccache stuff + RUSTC_WRAPPER = "${lib.getExe pkgs.sccache}"; + SCCACHE_BUCKET = "sccache"; + SCCACHE_REGION = "earth"; + SCCACHE_ENDPOINT = "https://sccache.s3.cy7.sh"; + SCCACHE_ALLOW_CORE_DUMPS = "true"; + SCCACHE_S3_USE_SSL = "true"; + SCCACHE_CACHE_MULTIARCH = "true"; + SCCACHE_LOG_LEVEL = "warn"; + AWS_DEFAULT_REGION = "earth"; + AWS_ENDPOINT_URL = "https://s3.cy7.sh"; + AWS_ACCESS_KEY_ID = "$(cat /run/secrets/aws/key_id)"; + AWS_SECRET_ACCESS_KEY = "$(cat /run/secrets/aws/key_secret)"; }; } diff --git a/hosts/ytnix/default.nix b/hosts/ytnix/default.nix index 6192e43..0bb554d 100644 --- a/hosts/ytnix/default.nix +++ b/hosts/ytnix/default.nix @@ -36,6 +36,14 @@ "tailscale/auth" = { sopsFile = ../../secrets/services/tailscale.yaml; }; + "aws/key_id" = { + sopsFile = ../../secrets/yt/aws.yaml; + owner = "yt"; + }; + "aws/key_secret" = { + sopsFile = ../../secrets/yt/aws.yaml; + owner = "yt"; + }; }; boot = { diff --git a/secrets/yt/aws.yaml b/secrets/yt/aws.yaml new file mode 100644 index 0000000..95bdf7a --- /dev/null +++ b/secrets/yt/aws.yaml @@ -0,0 +1,32 @@ +aws: + key_id: ENC[AES256_GCM,data:vxa8IS5zVOStsQaQNoPy36MeCw2KD2Th5tg=,iv:TrPukr/bpkGysf1YigBlXwaCu0H1FM6ivCVQEgnst6A=,tag:yrlcsDkLkH7U2i3JgjDaBA==,type:str] + key_secret: ENC[AES256_GCM,data:R9hFgtylEW1RphrP7/9Hi7HIb7gcQX1WDEVfnUTTzh+/0LM2Rb9CdkaleO8wNlcyYVE/jUKtqdqqrospAJ7+Zw==,iv:3+yCVqH441+oXFLI5usaQdhnE3GFhbJjMsYeRvk8xEw=,tag:STxA32cSdwPBikXyVEP5+Q==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1sy0at69err83qyml2vqu8xvwjccfws447aaadfvacj2qluw3p45s2mtrw8 + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBKaUZKbTVjZ1NEWlE5RzZT + T1dKdkRQajEva0tpRXhxYUlYWmw1b3MwSFZvCmhteVJ2VGhVNnZTZkJlem1OT3dL + dGlQTWdOUlo3TXNOS0wvNlpqVWpZSFEKLS0tIC9DNjY3OW1zWUlRQ1ZEOGlBRk9R + azQxMGhQejQ5M0N1YjFtSW5uVnRCQ3MKtt26G2PxIry/lppOT/NUX8jebEb5NgqO + HuHj7WT51Gtotfgb22VfGeOCaw9+pPYSjdk9WV4z57r7Z/lylALKRw== + -----END AGE ENCRYPTED FILE----- + - recipient: age10h6pg5qdpc4t0rpmksfv788a57f04n83zgqaezkjjn65nkhv547s0vxfdn + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPaVIwbExDUjJiVFpHOFJu + dk1SUHc5UDRFUENsbkg2RmQvazdEZ1NKeEhvCjVCNzdwRFN0aUZJL0pVSTI1RUxv + Ymhhc0tsSENVa1VUKzRBZk5IcjEvNFUKLS0tIFpPNlRXOVYyVnpyUmtLMTFqNlZ0 + UlYrTExEUVc0dURLR1czN3BnYzZ2VGMKCbAgM50jvs9VciA1Pb/VY+2I4x62LBGe + j7eHkfTFc8Gnk/rZA9/ZJDLFr/FUPMQWK/NVoz6oLjO6oVFXqN6OqA== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2025-01-30T17:45:09Z" + mac: ENC[AES256_GCM,data:uXnJ8DCs1ZZ72PFAmSQpqvVH2UYvRX8AeUC00A6WsgNL9sz6H0b7PwXBn4SucHACwLwilMVKYpFGE1pPMsIgpHxU5coNhvTfth/ChY1KS73LAwrJUAyUoFI3mumPkklj7b/u1CbBfhuhA2QoZVl+d9BGQn5CQu3+BySUmcT+P9k=,iv:H/hUTBDNcsGBP5TA/7U1QMZogZvuoPuEAg/tBCpbf9w=,tag:W7rH84Na/tHPuJlA9tRXEQ==,type:str] + pgp: [] + unencrypted_suffix: _unencrypted + version: 3.9.4 From 1c449848e29aa5c8c0fd6241bc82d530fe9e0007 Mon Sep 17 00:00:00 2001 From: cy Date: Fri, 31 Jan 2025 14:27:16 -0500 Subject: [PATCH 5/9] overlay cutter Signed-off-by: cy --- flake.lock | 17 +++++++++++++++++ flake.nix | 8 ++++++-- home/yt/ytnix.nix | 4 ++-- home/zsh/default.nix | 4 ++-- hosts/ytnix/default.nix | 2 ++ 5 files changed, 29 insertions(+), 6 deletions(-) diff --git a/flake.lock b/flake.lock index 6646c08..7bd5e59 100644 --- a/flake.lock +++ b/flake.lock @@ -915,6 +915,22 @@ "type": "github" } }, + "nixpkgs-cutter": { + "locked": { + "lastModified": 1738351607, + "narHash": "sha256-jJ9u1dLnhGeAeQdmziihaka33zEwBOIKmlB6YbFcIjs=", + "owner": "cything", + "repo": "nixpkgs", + "rev": "940b291c7c6ad8e999cb34d8d5de7913f6776c26", + "type": "github" + }, + "original": { + "owner": "cything", + "ref": "cutter-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, "nixpkgs-garage": { "locked": { "lastModified": 1736921030, @@ -1208,6 +1224,7 @@ "lix-module": "lix-module", "niri": "niri", "nixpkgs": "nixpkgs_5", + "nixpkgs-cutter": "nixpkgs-cutter", "nixpkgs-garage": "nixpkgs-garage", "nixvim": "nixvim", "nvim-github-theme": "nvim-github-theme", diff --git a/flake.nix b/flake.nix index 0f4e96a..9bf1fff 100644 --- a/flake.nix +++ b/flake.nix @@ -70,6 +70,7 @@ }; nixpkgs-garage.url = "github:cything/nixpkgs/garage-module"; # unmerged PR + nixpkgs-cutter.url = "github:cything/nixpkgs/cutter-unstable"; nvim-github-theme = { url = "github:projekt0n/github-nvim-theme"; @@ -136,7 +137,7 @@ settings.global.excludes = [ "secrets/*" - "**/*.png" # tries to format a png file?? + "**/*.png" # tries to format a png file ]; }; }; @@ -149,6 +150,9 @@ overlays = [ inputs.niri.overlays.niri inputs.rust-overlay.overlays.default + (final: prev: { + cutter = inputs.nixpkgs-cutter.legacyPackages.${prev.system}.cutter; + }) ] ++ import ./overlay; }; in @@ -169,7 +173,7 @@ ./modules inputs.lanzaboote.nixosModules.lanzaboote inputs.niri.nixosModules.niri - inputs.lix-module.nixosModules.default # broken + inputs.lix-module.nixosModules.default ]; }; chunk = lib.nixosSystem { diff --git a/home/yt/ytnix.nix b/home/yt/ytnix.nix index c047e8f..0aa8b30 100644 --- a/home/yt/ytnix.nix +++ b/home/yt/ytnix.nix @@ -111,6 +111,8 @@ sequoia sccache awscli2 + lldb + (cutter.withPlugins (plugins: [ plugins.rz-ghidra ])) ]; programs.waybar.enable = true; @@ -148,8 +150,6 @@ ''; }; - services.gnome-keyring.enable = true; - programs.direnv = { enable = true; nix-direnv.enable = true; diff --git a/home/zsh/default.nix b/home/zsh/default.nix index eb920d5..52fd38a 100644 --- a/home/zsh/default.nix +++ b/home/zsh/default.nix @@ -89,8 +89,8 @@ "ga" = "git add"; "gaa" = "git add --all"; "gb" = "git branch"; - "gc" = "git commit --verbose -s"; - "gcmsg" = "git commit -s --message"; + "gc" = "git commit --verbose"; + "gcmsg" = "git commit --message"; "gd" = "git diff"; "gdca" = "git diff --cached"; "gds" = "git diff --staged"; diff --git a/hosts/ytnix/default.nix b/hosts/ytnix/default.nix index 0bb554d..ecc2d7e 100644 --- a/hosts/ytnix/default.nix +++ b/hosts/ytnix/default.nix @@ -282,6 +282,8 @@ xdg.portal = { enable = true; wlr.enable = true; + xdgOpenUsePortal = true; + extraPortals = with pkgs; [ xdg-desktop-portal-gtk xdg-desktop-portal-gnome ]; }; programs.obs-studio = { From a31dbdaf0f02a93e781d5082ffebd110512c117f Mon Sep 17 00:00:00 2001 From: cy Date: Fri, 31 Jan 2025 21:55:47 -0500 Subject: [PATCH 6/9] don't overlay cutter Signed-off-by: cy --- flake.lock | 17 ----------------- flake.nix | 4 ---- home/yt/ytnix.nix | 2 +- 3 files changed, 1 insertion(+), 22 deletions(-) diff --git a/flake.lock b/flake.lock index 7bd5e59..6646c08 100644 --- a/flake.lock +++ b/flake.lock @@ -915,22 +915,6 @@ "type": "github" } }, - "nixpkgs-cutter": { - "locked": { - "lastModified": 1738351607, - "narHash": "sha256-jJ9u1dLnhGeAeQdmziihaka33zEwBOIKmlB6YbFcIjs=", - "owner": "cything", - "repo": "nixpkgs", - "rev": "940b291c7c6ad8e999cb34d8d5de7913f6776c26", - "type": "github" - }, - "original": { - "owner": "cything", - "ref": "cutter-unstable", - "repo": "nixpkgs", - "type": "github" - } - }, "nixpkgs-garage": { "locked": { "lastModified": 1736921030, @@ -1224,7 +1208,6 @@ "lix-module": "lix-module", "niri": "niri", "nixpkgs": "nixpkgs_5", - "nixpkgs-cutter": "nixpkgs-cutter", "nixpkgs-garage": "nixpkgs-garage", "nixvim": "nixvim", "nvim-github-theme": "nvim-github-theme", diff --git a/flake.nix b/flake.nix index 9bf1fff..38609a5 100644 --- a/flake.nix +++ b/flake.nix @@ -70,7 +70,6 @@ }; nixpkgs-garage.url = "github:cything/nixpkgs/garage-module"; # unmerged PR - nixpkgs-cutter.url = "github:cything/nixpkgs/cutter-unstable"; nvim-github-theme = { url = "github:projekt0n/github-nvim-theme"; @@ -150,9 +149,6 @@ overlays = [ inputs.niri.overlays.niri inputs.rust-overlay.overlays.default - (final: prev: { - cutter = inputs.nixpkgs-cutter.legacyPackages.${prev.system}.cutter; - }) ] ++ import ./overlay; }; in diff --git a/home/yt/ytnix.nix b/home/yt/ytnix.nix index 0aa8b30..c72ead1 100644 --- a/home/yt/ytnix.nix +++ b/home/yt/ytnix.nix @@ -112,7 +112,7 @@ sccache awscli2 lldb - (cutter.withPlugins (plugins: [ plugins.rz-ghidra ])) + (cutter.withPlugins (plugins: with plugins; [ rz-ghidra jsdec sigdb ])) ]; programs.waybar.enable = true; From 95ff04af253818ac633a7e32860fa920437f620c Mon Sep 17 00:00:00 2001 From: cy Date: Fri, 31 Jan 2025 23:44:15 -0500 Subject: [PATCH 7/9] nix-ld to make binaryninja work --- flake.lock | 21 +++++++++++++++++++++ flake.nix | 5 +++++ hosts/ytnix/default.nix | 39 ++++++++++++++++++++++++++++++++++++++- 3 files changed, 64 insertions(+), 1 deletion(-) diff --git a/flake.lock b/flake.lock index 6646c08..7b3064c 100644 --- a/flake.lock +++ b/flake.lock @@ -883,6 +883,26 @@ "type": "github" } }, + "nix-ld": { + "inputs": { + "nixpkgs": [ + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1737361468, + "narHash": "sha256-+CtIrQZ22MOAOHcpg1zbhX/fVkmEc8A8lYVpXAbXElQ=", + "owner": "nix-community", + "repo": "nix-ld", + "rev": "7f15f8622b63b907fef137689f4528a9447d9377", + "type": "github" + }, + "original": { + "owner": "nix-community", + "repo": "nix-ld", + "type": "github" + } + }, "nix2container": { "flake": false, "locked": { @@ -1207,6 +1227,7 @@ "lix": "lix", "lix-module": "lix-module", "niri": "niri", + "nix-ld": "nix-ld", "nixpkgs": "nixpkgs_5", "nixpkgs-garage": "nixpkgs-garage", "nixvim": "nixvim", diff --git a/flake.nix b/flake.nix index 38609a5..66dad85 100644 --- a/flake.nix +++ b/flake.nix @@ -68,6 +68,10 @@ inputs.nixpkgs.follows = "nixpkgs"; inputs.flake-compat.follows = "flake-compat"; }; + nix-ld = { + url = "github:nix-community/nix-ld"; + inputs.nixpkgs.follows = "nixpkgs"; + }; nixpkgs-garage.url = "github:cything/nixpkgs/garage-module"; # unmerged PR @@ -170,6 +174,7 @@ inputs.lanzaboote.nixosModules.lanzaboote inputs.niri.nixosModules.niri inputs.lix-module.nixosModules.default + inputs.nix-ld.nixosModules.nix-ld ]; }; chunk = lib.nixosSystem { diff --git a/hosts/ytnix/default.nix b/hosts/ytnix/default.nix index ecc2d7e..b748be0 100644 --- a/hosts/ytnix/default.nix +++ b/hosts/ytnix/default.nix @@ -276,7 +276,44 @@ programs.virt-manager.enable = true; services.usbmuxd.enable = true; - programs.nix-ld.enable = true; + programs.nix-ld.dev = { + enable = true; + # nix run github:thiagokokada/nix-alien#nix-alien-find-libs ./ + libraries = with pkgs; [ + mesa + extest + stdenv.cc.cc + libGL + fontconfig + libxkbcommon + zlib + libxml2 + dbus + freetype + egl-wayland + waylandpp + cairo + xcb-util-cursor + xorg.libX11 + xorg.libxcb + xorg.xcbutilwm + xorg.xcbutilimage + xorg.xcbutilkeysyms + xorg.xcbutilrenderutil + xorg.libXScrnSaver + xorg.libXcomposite + xorg.libXcursor + xorg.libXdamage + xorg.libXext + xorg.libXfixes + xorg.libXi + xorg.libXrandr + xorg.libXrender + xorg.libXtst + xorg.libxkbfile + xorg.libxshmfence + ]; + }; programs.evolution.enable = true; xdg.portal = { From 3510da965738ac5570d011cc58e439a43fef8764 Mon Sep 17 00:00:00 2001 From: cy Date: Sat, 1 Feb 2025 12:08:57 -0500 Subject: [PATCH 8/9] install ida-free --- home/yt/ytnix.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/home/yt/ytnix.nix b/home/yt/ytnix.nix index c72ead1..0e43354 100644 --- a/home/yt/ytnix.nix +++ b/home/yt/ytnix.nix @@ -113,6 +113,7 @@ awscli2 lldb (cutter.withPlugins (plugins: with plugins; [ rz-ghidra jsdec sigdb ])) + ida-free ]; programs.waybar.enable = true; From 258cce19fbf7d46086a8b517cc2c8ad67c700a84 Mon Sep 17 00:00:00 2001 From: cy Date: Sat, 1 Feb 2025 12:10:21 -0500 Subject: [PATCH 9/9] flake update Signed-off-by: cy --- flake.lock | 56 +++++++++++++++++++++++++++--------------------------- 1 file changed, 28 insertions(+), 28 deletions(-) diff --git a/flake.lock b/flake.lock index 7b3064c..6b42d56 100644 --- a/flake.lock +++ b/flake.lock @@ -562,11 +562,11 @@ ] }, "locked": { - "lastModified": 1738178313, - "narHash": "sha256-/8TLf6LkXGRGERzcWMNDeXjYaHSbexmfV+ofheo7K6k=", + "lastModified": 1738428726, + "narHash": "sha256-OUoEgorFHBVnqQ2lITqs6MGN7MH4t/8hLEO29OKu6CM=", "owner": "nix-community", "repo": "home-manager", - "rev": "420a0d9506b5dac4d86a68b9ef8e763624ad86c6", + "rev": "dae6d3460c8bab3ac9f38a86affe45b32818e764", "type": "github" }, "original": { @@ -683,11 +683,11 @@ "pre-commit-hooks": "pre-commit-hooks" }, "locked": { - "lastModified": 1738174211, - "narHash": "sha256-eYmp1mKM4kULV1W+EBtCPk6LmKWl2REivaYfGRl+AWo=", + "lastModified": 1738341980, + "narHash": "sha256-xOpkKwNkpbK6lL/V48xIsONnk8PBzbf7D98EqqGpGGs=", "ref": "refs/heads/main", - "rev": "64e33a7e09a0d1faacf2fd3f6ebd647fe4d8346a", - "revCount": 17329, + "rev": "083c6de22cb306b0f1f7bd8e062ecdd72133e4e2", + "revCount": 17337, "type": "git", "url": "https://git.lix.systems/lix-project/lix" }, @@ -737,11 +737,11 @@ "xwayland-satellite-unstable": "xwayland-satellite-unstable" }, "locked": { - "lastModified": 1738156024, - "narHash": "sha256-D3cox2cbtFauXz1skDTkJwSU0272wY6wRwiFNm5TV/c=", + "lastModified": 1738410471, + "narHash": "sha256-j0XZIViI4ZEFwhrEzVKz696/4DZ9pRiWtGfxJogA+MM=", "owner": "sodiboo", "repo": "niri-flake", - "rev": "541920ede8b5d48f110c94d858a1ddf283eac3b9", + "rev": "16f8e14385163479aca7231d8fab0091adac2e56", "type": "github" }, "original": { @@ -770,11 +770,11 @@ "niri-unstable": { "flake": false, "locked": { - "lastModified": 1738148186, - "narHash": "sha256-Yd2xKbZ8S4LC5sxPleuutlX0RbKnI93LhciVhneNBHQ=", + "lastModified": 1738404307, + "narHash": "sha256-BFtfL5kZbIsDAMgbVP5E0HbqDapYWw4NBw1xS0AOCCc=", "owner": "YaLTeR", "repo": "niri", - "rev": "1d3820a064f1f3b686eb6e8a1aab155681a96457", + "rev": "32ad545f842f4c176548e30d183d10e0a2bab752", "type": "github" }, "original": { @@ -832,11 +832,11 @@ ] }, "locked": { - "lastModified": 1738033138, - "narHash": "sha256-qlIM8A3bdL9c6PexhpS+QyZLO9y/8a3V75HVyJgDE5Q=", + "lastModified": 1738277753, + "narHash": "sha256-iyFcCOk0mmDiv4ut9mBEuMxMZIym3++0qN1rQBg8FW0=", "owner": "lnl7", "repo": "nix-darwin", - "rev": "349a74c66c596ef97ee97b4d80a3ca61227b6120", + "rev": "49b807fa7c37568d7fbe2aeaafb9255c185412f9", "type": "github" }, "original": { @@ -1065,11 +1065,11 @@ }, "nixpkgs_5": { "locked": { - "lastModified": 1738178544, - "narHash": "sha256-UbM+zJFlze877N5j2YMLKYFX7t05VvmuNX2M0vJ7RfI=", + "lastModified": 1738396600, + "narHash": "sha256-fWpw3MUUidq+GzuQdgpZwk4Vh4MF6MN2HEyyT2PguGI=", "owner": "nixos", "repo": "nixpkgs", - "rev": "975ac0ab33ee7fea64842047a96f5d679d90913c", + "rev": "6eec6bbb933a6dad6cf6afe3d51329f31d22e974", "type": "github" }, "original": { @@ -1102,11 +1102,11 @@ ] }, "locked": { - "lastModified": 1738184667, - "narHash": "sha256-+pG3UJVAdVCF3nGRpy5n/tbCzGa64DCWOC8hAxnssD0=", + "lastModified": 1738428106, + "narHash": "sha256-HpuE7jQnyOXJStEoP2AAsOTTqsdudn6xV1o+EbV8ssc=", "owner": "nix-community", "repo": "nixvim", - "rev": "2f5374c3dcd06c750c36798bce6bccdf8a25bc89", + "rev": "8f8f50243ea803304b1bd04aa56bd736fe2c28eb", "type": "github" }, "original": { @@ -1261,11 +1261,11 @@ ] }, "locked": { - "lastModified": 1738117527, - "narHash": "sha256-GFviGfaezjGLFUlxdv3zyC7rSZvTXqwcG/YsF6MDkOw=", + "lastModified": 1738376888, + "narHash": "sha256-S6ErHxkSm0iA7ZMsjjDaASWxbELYcdfv8BhOkkj1rHw=", "owner": "oxalica", "repo": "rust-overlay", - "rev": "6a3dc6ce4132bd57359214d986db376f2333c14d", + "rev": "83284068670d5ae4a43641c4afb150f3446be70d", "type": "github" }, "original": { @@ -1281,11 +1281,11 @@ ] }, "locked": { - "lastModified": 1737411508, - "narHash": "sha256-j9IdflJwRtqo9WpM0OfAZml47eBblUHGNQTe62OUqTw=", + "lastModified": 1738291974, + "narHash": "sha256-wkwYJc8cKmmQWUloyS9KwttBnja2ONRuJQDEsmef320=", "owner": "Mic92", "repo": "sops-nix", - "rev": "015d461c16678fc02a2f405eb453abb509d4e1d4", + "rev": "4c1251904d8a08c86ac6bc0d72cc09975e89aef7", "type": "github" }, "original": {