Skip to content

Instantly share code, notes, and snippets.

with import <nixpkgs> {};
stdenv.mkDerivation {
name = "VulkanExamples";
buildDepends = [ cmake libxcb pkgconfig ];
}
{config,pkgs,...}:
let
myVim = pkgs.vim_configurable.customize {
name = "vim";
vimrcConfig = {
customRC = ''
syntax on
set nu
set foldmethod=syntax
system.extraSystemBuilderCmds = ''
ln -sv ${./.} $out/nixcfg
'';
{ pkgs, ... }:
let
script1 = pkgs.writeScript "brightnessscript" ''
#!/bin/sh
your script here
'';
script2 = pkgs.writeScriptBin "brightness" ''
#!/bin/sh
sudo ${script1}
@cleverca22
cleverca22 / default.nix
Last active April 21, 2017 17:28 — forked from Hodapp87/shell.nix
darktable shell.nix draft
{ pkgs ? import <nixpkgs> {} }:
# Based on nixpkgs/pkgs/applications/graphics/darktable/default.nix
let stdenv = pkgs.stdenv;
#assert stdenv ? glibc;
in stdenv.mkDerivation rec {
name = "darktable-git";
src = pkgs.lib.cleanSource ./.;
{ ... }:
let
pkgs-unstable = import (builtins.fetchurl https://github.com/NixOS/nixpkgs-channels/archive/nixos-unstable.tar.gz) { config = {}; };
secrets = import ./secrets.nix;
in {
environment.systemPackages = [ pkgs-unstable.hello ];
programs.ssh.knownHosts = [
{ hostNames = [ "github.com" ]; publicKey = "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ=="; }
] ++ secrets.knownHosts;
{ ... }:
{
services.nginx = {
enable = true;
virtualHosts = {
"example.com" = {
forceSSL = true;
enableACME = true;
locations = {
{ config, pkgs, ... }:
let
simgrid2 = pkgs.stdenv.mkDerivation {
name = "simgrid2";
buildInputs = with pkgs; [ simgrid ];
};
in {
imports = [
./hardware-configuration.nix
];
@cleverca22
cleverca22 / Makefile
Created March 23, 2017 23:07
nix lua
test-driver: test-driver.o locking.o funcs.o
${CXX} $^ -o $@ -g -lssl -lprotobuf -llua -levent_pthreads -levent -levent_openssl -lprotos
%.o: %.cpp
${CXX} -c -Wall -g -std=c++1z $< -o $@
%.o: %.cc
${CXX} -c -Wall -g -std=c++1z $< -o $@
test-driver.o: test-driver.cpp test-driver.h locking.h funcs.h
funcs.o: funcs.cpp funcs.h
install: test-driver
mkdir -p ${out}/bin
@cleverca22
cleverca22 / 16.09.nix
Last active March 19, 2017 16:52
wireshark no root
{ ... }:
{
security.setuidOwners = [
{
program = "dumpcap";
owner = "root";
group = "wireshark";
setuid = true;
setgid = false;