nix config

more opencode stuff

+235 -106
+6 -6
.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc
··· 35 35 export NIX_CC 36 36 NIX_CC_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu='1' 37 37 export NIX_CC_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu 38 - NIX_CFLAGS_COMPILE=' -frandom-seed=5s10b8rs3j -isystem /nix/store/8znh07lsz9q2fdp6fgcdwwv035xxfrl1-nix-2.28.4-dev/include -isystem /nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev/include -isystem /nix/store/235hvgzcbl06fxy53515q8sr6lljvf68-nlohmann_json-3.11.3/include -isystem /nix/store/a5b9czim7vrihag71f8dy1c467qh3mph-libarchive-3.8.0-dev/include -isystem /nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev/include -isystem /nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev/include -isystem /nix/store/8znh07lsz9q2fdp6fgcdwwv035xxfrl1-nix-2.28.4-dev/include -isystem /nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev/include -isystem /nix/store/235hvgzcbl06fxy53515q8sr6lljvf68-nlohmann_json-3.11.3/include -isystem /nix/store/a5b9czim7vrihag71f8dy1c467qh3mph-libarchive-3.8.0-dev/include -isystem /nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev/include -isystem /nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev/include' 38 + NIX_CFLAGS_COMPILE=' -frandom-seed=bsnbf5cn1y -isystem /nix/store/qrp30zrv029hzlrhpavhjl89w7sfhyih-nix-2.28.5-dev/include -isystem /nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev/include -isystem /nix/store/vgi5jkglabcvmhsrp8wixg1r2dhjyvva-nlohmann_json-3.11.3/include -isystem /nix/store/m3nkjvz6dcz1yy0j82d2ihkyxagiqxdm-libarchive-3.8.0-dev/include -isystem /nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev/include -isystem /nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev/include -isystem /nix/store/qrp30zrv029hzlrhpavhjl89w7sfhyih-nix-2.28.5-dev/include -isystem /nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev/include -isystem /nix/store/vgi5jkglabcvmhsrp8wixg1r2dhjyvva-nlohmann_json-3.11.3/include -isystem /nix/store/m3nkjvz6dcz1yy0j82d2ihkyxagiqxdm-libarchive-3.8.0-dev/include -isystem /nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev/include -isystem /nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev/include' 39 39 export NIX_CFLAGS_COMPILE 40 40 NIX_CONFIG='experimental-features = nix-command flakes' 41 41 export NIX_CONFIG ··· 43 43 export NIX_ENFORCE_NO_NATIVE 44 44 NIX_HARDENING_ENABLE='bindnow format fortify fortify3 pic relro stackclashprotection stackprotector strictoverflow zerocallusedregs' 45 45 export NIX_HARDENING_ENABLE 46 - NIX_LDFLAGS='-rpath /home/anish/usr/helm/outputs/out/lib -L/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/lib -L/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/lib -L/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/lib -L/nix/store/y130gnbp2qkfq6svqdv0s61b3m4043yp-libarchive-3.8.0-lib/lib -L/nix/store/7q9ll9pjrdfdb3qyfza2bzrk829izk9s-nix-2.28.4/lib -L/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/lib -L/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/lib -L/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/lib -L/nix/store/y130gnbp2qkfq6svqdv0s61b3m4043yp-libarchive-3.8.0-lib/lib -L/nix/store/7q9ll9pjrdfdb3qyfza2bzrk829izk9s-nix-2.28.4/lib' 46 + NIX_LDFLAGS='-rpath /home/anish/usr/helm/outputs/out/lib -L/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/lib -L/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/lib -L/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/lib -L/nix/store/4w8f5zmwdsalc5ichgj074rawiswplw2-libarchive-3.8.0-lib/lib -L/nix/store/snkahy53v6zxppa45sbvlr0pl2846x3h-nix-2.28.5/lib -L/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/lib -L/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/lib -L/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/lib -L/nix/store/4w8f5zmwdsalc5ichgj074rawiswplw2-libarchive-3.8.0-lib/lib -L/nix/store/snkahy53v6zxppa45sbvlr0pl2846x3h-nix-2.28.5/lib' 47 47 export NIX_LDFLAGS 48 48 NIX_NO_SELF_RPATH='1' 49 49 NIX_STORE='/nix/store' ··· 58 58 export OLDPWD 59 59 OPTERR='1' 60 60 OSTYPE='linux-gnu' 61 - PATH='/nix/store/53cx9nd6i328f9zqsgx6sh1krsngy5jl-attr-2.5.2-bin/bin:/nix/store/61066bhvr54xkl2ssippfa5qylwgafqf-acl-2.3.2-bin/bin:/nix/store/8fq8mhb1dlwzgq7xfaxwgn0x623yjb43-libarchive-3.8.0/bin:/nix/store/7q9ll9pjrdfdb3qyfza2bzrk829izk9s-nix-2.28.4/bin:/nix/store/hr950wkqix97b759inrbxvljkqxj5113-home-manager-0-unstable-2025-05-13/bin:/nix/store/3kwbkj8xnzw5787gbannr741bczjkrq6-git-2.50.1/bin:/nix/store/s801pmgfwy4nifm72s638v0m4f32pnc5-agenix-0.15.0/bin:/nix/store/vlc65hzrqq9a29m7j0sb4hpqlwn0ny56-deploy-rs-0-unstable-2025-06-05/bin:/nix/store/dgqa38y4hxyw30g6bvrgd18750h364vr-dnscontrol-4.20.0/bin:/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0/bin:/nix/store/kaj8d1zcn149m40s9h0xi0khakibiphz-gcc-wrapper-14.3.0/bin:/nix/store/8adzgnxs3s0pbj22qhk9zjxi1fqmz3xv-gcc-14.3.0/bin:/nix/store/p2ixvjsas4qw58dcwk01d22skwq4fyka-glibc-2.40-66-bin/bin:/nix/store/rry6qingvsrqmc7ll7jgaqpybcbdgf5v-coreutils-9.7/bin:/nix/store/87zpmcmwvn48z4lbrfba74b312h22s6c-binutils-wrapper-2.44/bin:/nix/store/ap35np2bkwaba3rxs3qlxpma57n2awyb-binutils-2.44/bin:/nix/store/rry6qingvsrqmc7ll7jgaqpybcbdgf5v-coreutils-9.7/bin:/nix/store/392hs9nhm6wfw4imjllbvb1wil1n39qx-findutils-4.10.0/bin:/nix/store/xw0mf3shymq3k7zlncf09rm8917sdi4h-diffutils-3.12/bin:/nix/store/4rpiqv9yr2pw5094v4wc33ijkqjpm9sa-gnused-4.9/bin:/nix/store/l2wvwyg680h0v2la18hz3yiznxy2naqw-gnugrep-3.11/bin:/nix/store/c1z5j28ndxljf1ihqzag57bwpfpzms0g-gawk-5.3.2/bin:/nix/store/w60s4xh1pjg6dwbw7j0b4xzlpp88q5qg-gnutar-1.35/bin:/nix/store/xd9m9jkvrs8pbxvmkzkwviql33rd090j-gzip-1.14/bin:/nix/store/w1pxx760yidi7n9vbi5bhpii9xxl5vdj-bzip2-1.0.8-bin/bin:/nix/store/xk0d14zpm0njxzdm182dd722aqhav2cc-gnumake-4.4.1/bin:/nix/store/cfqbabpc7xwg8akbcchqbq3cai6qq2vs-bash-5.2p37/bin:/nix/store/gj54zvf7vxll1mzzmqhqi1p4jiws3mfb-patch-2.7.6/bin:/nix/store/22rpb6790f346c55iqi6s9drr5qgmyjf-xz-5.8.1-bin/bin:/nix/store/xlmpcglsq8l09qh03rf0virz0331pjdc-file-5.45/bin' 61 + PATH='/nix/store/53cx9nd6i328f9zqsgx6sh1krsngy5jl-attr-2.5.2-bin/bin:/nix/store/61066bhvr54xkl2ssippfa5qylwgafqf-acl-2.3.2-bin/bin:/nix/store/8qrd9bfl0yr0spdbimsv6ix1gb7r8w10-libarchive-3.8.0/bin:/nix/store/snkahy53v6zxppa45sbvlr0pl2846x3h-nix-2.28.5/bin:/nix/store/1mklr29rdhl7072brp03vlra75bkyh9w-home-manager-0-unstable-2025-05-13/bin:/nix/store/v2rxk9xkcxsas64wl7ds31al15cm2wqd-git-2.50.1/bin:/nix/store/k9gakjp7zjj76f0c6prh92bc5gi5yylj-agenix-0.15.0/bin:/nix/store/yfklc5p2srylw8v0rfwziaci7fmzfxnh-deploy-rs-0-unstable-2025-06-05/bin:/nix/store/pp2ln0rw9qj8kc6g9ibqkw4n98bidnd0-dnscontrol-4.20.0/bin:/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0/bin:/nix/store/kaj8d1zcn149m40s9h0xi0khakibiphz-gcc-wrapper-14.3.0/bin:/nix/store/8adzgnxs3s0pbj22qhk9zjxi1fqmz3xv-gcc-14.3.0/bin:/nix/store/p2ixvjsas4qw58dcwk01d22skwq4fyka-glibc-2.40-66-bin/bin:/nix/store/rry6qingvsrqmc7ll7jgaqpybcbdgf5v-coreutils-9.7/bin:/nix/store/87zpmcmwvn48z4lbrfba74b312h22s6c-binutils-wrapper-2.44/bin:/nix/store/ap35np2bkwaba3rxs3qlxpma57n2awyb-binutils-2.44/bin:/nix/store/rry6qingvsrqmc7ll7jgaqpybcbdgf5v-coreutils-9.7/bin:/nix/store/392hs9nhm6wfw4imjllbvb1wil1n39qx-findutils-4.10.0/bin:/nix/store/xw0mf3shymq3k7zlncf09rm8917sdi4h-diffutils-3.12/bin:/nix/store/4rpiqv9yr2pw5094v4wc33ijkqjpm9sa-gnused-4.9/bin:/nix/store/l2wvwyg680h0v2la18hz3yiznxy2naqw-gnugrep-3.11/bin:/nix/store/c1z5j28ndxljf1ihqzag57bwpfpzms0g-gawk-5.3.2/bin:/nix/store/w60s4xh1pjg6dwbw7j0b4xzlpp88q5qg-gnutar-1.35/bin:/nix/store/xd9m9jkvrs8pbxvmkzkwviql33rd090j-gzip-1.14/bin:/nix/store/w1pxx760yidi7n9vbi5bhpii9xxl5vdj-bzip2-1.0.8-bin/bin:/nix/store/xk0d14zpm0njxzdm182dd722aqhav2cc-gnumake-4.4.1/bin:/nix/store/cfqbabpc7xwg8akbcchqbq3cai6qq2vs-bash-5.2p37/bin:/nix/store/gj54zvf7vxll1mzzmqhqi1p4jiws3mfb-patch-2.7.6/bin:/nix/store/22rpb6790f346c55iqi6s9drr5qgmyjf-xz-5.8.1-bin/bin:/nix/store/xlmpcglsq8l09qh03rf0virz0331pjdc-file-5.45/bin' 62 62 export PATH 63 63 PS4='+ ' 64 64 RANLIB='ranlib' ··· 75 75 export STRINGS 76 76 STRIP='strip' 77 77 export STRIP 78 - XDG_DATA_DIRS='/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/share:/nix/store/235hvgzcbl06fxy53515q8sr6lljvf68-nlohmann_json-3.11.3/share:/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/share:/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/share:/nix/store/8fq8mhb1dlwzgq7xfaxwgn0x623yjb43-libarchive-3.8.0/share:/nix/store/7q9ll9pjrdfdb3qyfza2bzrk829izk9s-nix-2.28.4/share:/nix/store/hr950wkqix97b759inrbxvljkqxj5113-home-manager-0-unstable-2025-05-13/share:/nix/store/3kwbkj8xnzw5787gbannr741bczjkrq6-git-2.50.1/share:/nix/store/dgqa38y4hxyw30g6bvrgd18750h364vr-dnscontrol-4.20.0/share:/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0/share' 78 + XDG_DATA_DIRS='/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8/share:/nix/store/vgi5jkglabcvmhsrp8wixg1r2dhjyvva-nlohmann_json-3.11.3/share:/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2/share:/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2/share:/nix/store/8qrd9bfl0yr0spdbimsv6ix1gb7r8w10-libarchive-3.8.0/share:/nix/store/snkahy53v6zxppa45sbvlr0pl2846x3h-nix-2.28.5/share:/nix/store/1mklr29rdhl7072brp03vlra75bkyh9w-home-manager-0-unstable-2025-05-13/share:/nix/store/v2rxk9xkcxsas64wl7ds31al15cm2wqd-git-2.50.1/share:/nix/store/pp2ln0rw9qj8kc6g9ibqkw4n98bidnd0-dnscontrol-4.20.0/share:/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0/share' 79 79 export XDG_DATA_DIRS 80 80 __structuredAttrs='' 81 81 export __structuredAttrs ··· 135 135 export mesonFlags 136 136 name='nix-shell-env' 137 137 export name 138 - nativeBuildInputs='/nix/store/8znh07lsz9q2fdp6fgcdwwv035xxfrl1-nix-2.28.4-dev /nix/store/hr950wkqix97b759inrbxvljkqxj5113-home-manager-0-unstable-2025-05-13 /nix/store/3kwbkj8xnzw5787gbannr741bczjkrq6-git-2.50.1 /nix/store/s801pmgfwy4nifm72s638v0m4f32pnc5-agenix-0.15.0 /nix/store/vlc65hzrqq9a29m7j0sb4hpqlwn0ny56-deploy-rs-0-unstable-2025-06-05 /nix/store/dgqa38y4hxyw30g6bvrgd18750h364vr-dnscontrol-4.20.0' 138 + nativeBuildInputs='/nix/store/qrp30zrv029hzlrhpavhjl89w7sfhyih-nix-2.28.5-dev /nix/store/1mklr29rdhl7072brp03vlra75bkyh9w-home-manager-0-unstable-2025-05-13 /nix/store/v2rxk9xkcxsas64wl7ds31al15cm2wqd-git-2.50.1 /nix/store/k9gakjp7zjj76f0c6prh92bc5gi5yylj-agenix-0.15.0 /nix/store/yfklc5p2srylw8v0rfwziaci7fmzfxnh-deploy-rs-0-unstable-2025-06-05 /nix/store/pp2ln0rw9qj8kc6g9ibqkw4n98bidnd0-dnscontrol-4.20.0' 139 139 export nativeBuildInputs 140 140 out='/home/anish/usr/helm/outputs/out' 141 141 export out ··· 156 156 export phases 157 157 pkg='/nix/store/kaj8d1zcn149m40s9h0xi0khakibiphz-gcc-wrapper-14.3.0' 158 158 declare -a pkgsBuildBuild=() 159 - declare -a pkgsBuildHost=('/nix/store/8znh07lsz9q2fdp6fgcdwwv035xxfrl1-nix-2.28.4-dev' '/nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev' '/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8' '/nix/store/235hvgzcbl06fxy53515q8sr6lljvf68-nlohmann_json-3.11.3' '/nix/store/a5b9czim7vrihag71f8dy1c467qh3mph-libarchive-3.8.0-dev' '/nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev' '/nix/store/53cx9nd6i328f9zqsgx6sh1krsngy5jl-attr-2.5.2-bin' '/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2' '/nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev' '/nix/store/61066bhvr54xkl2ssippfa5qylwgafqf-acl-2.3.2-bin' '/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2' '/nix/store/y130gnbp2qkfq6svqdv0s61b3m4043yp-libarchive-3.8.0-lib' '/nix/store/8fq8mhb1dlwzgq7xfaxwgn0x623yjb43-libarchive-3.8.0' '/nix/store/7q9ll9pjrdfdb3qyfza2bzrk829izk9s-nix-2.28.4' '/nix/store/hr950wkqix97b759inrbxvljkqxj5113-home-manager-0-unstable-2025-05-13' '/nix/store/3kwbkj8xnzw5787gbannr741bczjkrq6-git-2.50.1' '/nix/store/s801pmgfwy4nifm72s638v0m4f32pnc5-agenix-0.15.0' '/nix/store/vlc65hzrqq9a29m7j0sb4hpqlwn0ny56-deploy-rs-0-unstable-2025-06-05' '/nix/store/dgqa38y4hxyw30g6bvrgd18750h364vr-dnscontrol-4.20.0' '/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0' '/nix/store/gi6g289i9ydm3z896x67q210y0qq29zg-update-autotools-gnu-config-scripts-hook' '/nix/store/jjhw2phnaip4kg0qjas3x3fsaifi8y0w-no-broken-symlinks.sh' '/nix/store/h9lc1dpi14z7is86ffhl3ld569138595-audit-tmpdir.sh' '/nix/store/m54bmrhj6fqz8nds5zcj97w9s9bckc9v-compress-man-pages.sh' '/nix/store/wgrbkkaldkrlrni33ccvm3b6vbxzb656-make-symlinks-relative.sh' '/nix/store/5yzw0vhkyszf2d179m0qfkgxmp5wjjx4-move-docs.sh' '/nix/store/fyaryjvghbkpfnsyw97hb3lyb37s1pd6-move-lib64.sh' '/nix/store/kd4xwxjpjxi71jkm6ka0np72if9rm3y0-move-sbin.sh' '/nix/store/pag6l61paj1dc9sv15l7bm5c17xn5kyk-move-systemd-user-units.sh' '/nix/store/cmzya9irvxzlkh7lfy6i82gbp0saxqj3-multiple-outputs.sh' '/nix/store/hxv896faph0rqxjq2ycxpcrbnngc95sz-patch-shebangs.sh' '/nix/store/cickvswrvann041nqxb0rxilc46svw1n-prune-libtool-files.sh' '/nix/store/xyff06pkhki3qy1ls77w10s0v79c9il0-reproducible-builds.sh' '/nix/store/z7k98578dfzi6l3hsvbivzm7hfqlk0zc-set-source-date-epoch-to-latest.sh' '/nix/store/pilsssjjdxvdphlg2h19p0bfx5q0jzkn-strip.sh' '/nix/store/kaj8d1zcn149m40s9h0xi0khakibiphz-gcc-wrapper-14.3.0' '/nix/store/87zpmcmwvn48z4lbrfba74b312h22s6c-binutils-wrapper-2.44' ) 159 + declare -a pkgsBuildHost=('/nix/store/qrp30zrv029hzlrhpavhjl89w7sfhyih-nix-2.28.5-dev' '/nix/store/qwnz3z0hf5pdhwsn92dc9lhlq4a3lsqk-boehm-gc-8.2.8-dev' '/nix/store/mrbslgynzhg5jfc05x2rlnsykzcxp2v0-boehm-gc-8.2.8' '/nix/store/vgi5jkglabcvmhsrp8wixg1r2dhjyvva-nlohmann_json-3.11.3' '/nix/store/m3nkjvz6dcz1yy0j82d2ihkyxagiqxdm-libarchive-3.8.0-dev' '/nix/store/0vy272ral6dwzx96wkvd90l37v0gdrk7-attr-2.5.2-dev' '/nix/store/53cx9nd6i328f9zqsgx6sh1krsngy5jl-attr-2.5.2-bin' '/nix/store/ik62z14lxr205b5gzfh4cjcla6gh9l6z-attr-2.5.2' '/nix/store/ra69jxg2pnnjymvkn83mfr7cnhllmwnj-acl-2.3.2-dev' '/nix/store/61066bhvr54xkl2ssippfa5qylwgafqf-acl-2.3.2-bin' '/nix/store/8smmj5gbhnnqaf28qxak4xv57ccgm96p-acl-2.3.2' '/nix/store/4w8f5zmwdsalc5ichgj074rawiswplw2-libarchive-3.8.0-lib' '/nix/store/8qrd9bfl0yr0spdbimsv6ix1gb7r8w10-libarchive-3.8.0' '/nix/store/snkahy53v6zxppa45sbvlr0pl2846x3h-nix-2.28.5' '/nix/store/1mklr29rdhl7072brp03vlra75bkyh9w-home-manager-0-unstable-2025-05-13' '/nix/store/v2rxk9xkcxsas64wl7ds31al15cm2wqd-git-2.50.1' '/nix/store/k9gakjp7zjj76f0c6prh92bc5gi5yylj-agenix-0.15.0' '/nix/store/yfklc5p2srylw8v0rfwziaci7fmzfxnh-deploy-rs-0-unstable-2025-06-05' '/nix/store/pp2ln0rw9qj8kc6g9ibqkw4n98bidnd0-dnscontrol-4.20.0' '/nix/store/g7i75czfbw9sy5f8v7rjbama6lr3ya3s-patchelf-0.15.0' '/nix/store/gi6g289i9ydm3z896x67q210y0qq29zg-update-autotools-gnu-config-scripts-hook' '/nix/store/jjhw2phnaip4kg0qjas3x3fsaifi8y0w-no-broken-symlinks.sh' '/nix/store/h9lc1dpi14z7is86ffhl3ld569138595-audit-tmpdir.sh' '/nix/store/m54bmrhj6fqz8nds5zcj97w9s9bckc9v-compress-man-pages.sh' '/nix/store/wgrbkkaldkrlrni33ccvm3b6vbxzb656-make-symlinks-relative.sh' '/nix/store/5yzw0vhkyszf2d179m0qfkgxmp5wjjx4-move-docs.sh' '/nix/store/fyaryjvghbkpfnsyw97hb3lyb37s1pd6-move-lib64.sh' '/nix/store/kd4xwxjpjxi71jkm6ka0np72if9rm3y0-move-sbin.sh' '/nix/store/pag6l61paj1dc9sv15l7bm5c17xn5kyk-move-systemd-user-units.sh' '/nix/store/cmzya9irvxzlkh7lfy6i82gbp0saxqj3-multiple-outputs.sh' '/nix/store/hxv896faph0rqxjq2ycxpcrbnngc95sz-patch-shebangs.sh' '/nix/store/cickvswrvann041nqxb0rxilc46svw1n-prune-libtool-files.sh' '/nix/store/xyff06pkhki3qy1ls77w10s0v79c9il0-reproducible-builds.sh' '/nix/store/z7k98578dfzi6l3hsvbivzm7hfqlk0zc-set-source-date-epoch-to-latest.sh' '/nix/store/pilsssjjdxvdphlg2h19p0bfx5q0jzkn-strip.sh' '/nix/store/kaj8d1zcn149m40s9h0xi0khakibiphz-gcc-wrapper-14.3.0' '/nix/store/87zpmcmwvn48z4lbrfba74b312h22s6c-binutils-wrapper-2.44' ) 160 160 declare -a pkgsBuildTarget=() 161 161 declare -a pkgsHostHost=() 162 162 declare -a pkgsHostTarget=()
+14 -14
flake.lock
··· 84 84 "systems": "systems_5" 85 85 }, 86 86 "locked": { 87 - "lastModified": 1763308703, 88 - "narHash": "sha256-O9Y+Wer8wOh+N+4kcCK5p/VLrXyX+ktk0/s3HdZvJzk=", 87 + "lastModified": 1767386128, 88 + "narHash": "sha256-BJDu7dIMauO2nYRSL4aI8wDNtEm2KOb7lDKP3hxdrpo=", 89 89 "owner": "numtide", 90 90 "repo": "blueprint", 91 - "rev": "5a9bba070f801d63e2af3c9ef00b86b212429f4f", 91 + "rev": "0ed984d51a3031065925ab08812a5434f40b93d4", 92 92 "type": "github" 93 93 }, 94 94 "original": { ··· 737 737 "treefmt-nix": "treefmt-nix_2" 738 738 }, 739 739 "locked": { 740 - "lastModified": 1766585760, 741 - "narHash": "sha256-dMOdwzCdJeJHRVT2udM3cziJAsxMOO0wHjeZ2WWhzk0=", 742 - "owner": "numtide", 740 + "lastModified": 1768359433, 741 + "narHash": "sha256-e/6qI81VBJo0lAQsyUG+2jMsL0q3YLz88NZoZOCVFu8=", 742 + "owner": "Chickensoupwithrice", 743 743 "repo": "llm-agents.nix", 744 - "rev": "98185694332ee75319f8139fcc751eea9426bde7", 744 + "rev": "596bf03f14e9a54654473a1666b3b274bbc5939e", 745 745 "type": "github" 746 746 }, 747 747 "original": { 748 - "owner": "numtide", 748 + "owner": "Chickensoupwithrice", 749 749 "repo": "llm-agents.nix", 750 750 "type": "github" 751 751 } ··· 1017 1017 }, 1018 1018 "nixpkgs_3": { 1019 1019 "locked": { 1020 - "lastModified": 1766532406, 1021 - "narHash": "sha256-acLU/ag9VEoKkzOD202QASX25nG1eArXg5A0mHjKgxM=", 1020 + "lastModified": 1768032153, 1021 + "narHash": "sha256-6kD1MdY9fsE6FgSwdnx29hdH2UcBKs3/+JJleMShuJg=", 1022 1022 "owner": "NixOS", 1023 1023 "repo": "nixpkgs", 1024 - "rev": "8142186f001295e5a3239f485c8a49bf2de2695a", 1024 + "rev": "3146c6aa9995e7351a398e17470e15305e6e18ff", 1025 1025 "type": "github" 1026 1026 }, 1027 1027 "original": { ··· 1431 1431 ] 1432 1432 }, 1433 1433 "locked": { 1434 - "lastModified": 1766000401, 1435 - "narHash": "sha256-+cqN4PJz9y0JQXfAK5J1drd0U05D5fcAGhzhfVrDlsI=", 1434 + "lastModified": 1768031762, 1435 + "narHash": "sha256-b2gJDJfi+TbA7Hu2sKip+1mWqya0GJaWrrXQjpbOVTU=", 1436 1436 "owner": "numtide", 1437 1437 "repo": "treefmt-nix", 1438 - "rev": "42d96e75aa56a3f70cab7e7dc4a32868db28e8fd", 1438 + "rev": "0c445aa21b01fd1d4bb58927f7b268568af87b20", 1439 1439 "type": "github" 1440 1440 }, 1441 1441 "original": {
+84 -42
flake.nix
··· 32 32 poonam.url = "git+ssh://gitea@git.sealight.xyz/aynish/kitaab?ref=main"; 33 33 poonam.inputs.nixpkgs.follows = "nixpkgs"; 34 34 basant.url = "git+ssh://gitea@git.sealight.xyz/aynish/basant?ref=main"; 35 - vimwikicli.url = 36 - "git+ssh://gitea@git.sealight.xyz/aynish/vimwiki-cli?ref=main"; 35 + vimwikicli.url = "git+ssh://gitea@git.sealight.xyz/aynish/vimwiki-cli?ref=main"; 37 36 basant.inputs.nixpkgs.follows = "nixpkgs"; 38 37 basant.inputs.poonam.follows = "poonam"; 39 38 vimwikicli.inputs.nixpkgs.follows = "nixpkgs"; ··· 76 75 inputs.nixpkgs.follows = "nixpkgs"; 77 76 }; 78 77 79 - # LLM Agents 80 - llm-agents.url = "github:numtide/llm-agents.nix"; 78 + # LLM Agents (using fork until chainlink PR is merged) 79 + llm-agents.url = "github:Chickensoupwithrice/llm-agents.nix"; 81 80 82 81 # Others 83 82 nur.url = "github:nix-community/NUR"; ··· 100 99 # muneem.inputs.nixpkgs.follows = "nixpkgs"; 101 100 }; 102 101 103 - outputs = { self, nixpkgs, unstable, nixos-hardware, home-manager, deploy-rs 104 - , agenix, disko, basant, grasp, nix-matrix-appservices, nur, tidalcycles 105 - , rust-overlay, vimwikicli, autohide-tdrop, darwin, nix-homebrew, homebrew-bundle 106 - , homebrew-core, homebrew-cask, jovian, tangled, llm-agents, ... }@inputs: 102 + outputs = 103 + { 104 + self, 105 + nixpkgs, 106 + unstable, 107 + nixos-hardware, 108 + home-manager, 109 + deploy-rs, 110 + agenix, 111 + disko, 112 + basant, 113 + grasp, 114 + nix-matrix-appservices, 115 + nur, 116 + tidalcycles, 117 + rust-overlay, 118 + vimwikicli, 119 + autohide-tdrop, 120 + darwin, 121 + nix-homebrew, 122 + homebrew-bundle, 123 + homebrew-core, 124 + homebrew-cask, 125 + jovian, 126 + tangled, 127 + llm-agents, 128 + ... 129 + }@inputs: 107 130 let 108 131 forAllSystems = nixpkgs.lib.genAttrs [ 109 132 "aarch64-linux" ··· 122 145 autohide-tdrop = autohide-tdrop.packages.${prev.system}.default; 123 146 }; 124 147 125 - nixpkgsFor = forAllSystems (system: 148 + nixpkgsFor = forAllSystems ( 149 + system: 126 150 import nixpkgs { 127 151 inherit system; 128 152 config = { 129 153 permittedInsecurePackages = [ 130 - "olm-3.2.16" 154 + "olm-3.2.16" 131 155 ]; 132 - allowUnfreePredicate = pkg: 156 + allowUnfreePredicate = 157 + pkg: 133 158 builtins.elem (nixpkgs.lib.getName pkg) [ 134 159 "ripcord" 135 160 "vcv-rack" ··· 149 174 self.overlays.additions 150 175 self.overlays.modifications 151 176 ]; 152 - }); 177 + } 178 + ); 153 179 154 180 # for when space matters 155 - litePkgsFor = forAllSystems (system: 181 + litePkgsFor = forAllSystems ( 182 + system: 156 183 import nixpkgs { 157 184 inherit system; 158 185 # config.permittedInsecurePackages = [ ··· 166 193 self.overlays.modifications 167 194 tidalcycles.overlays.default # needed for nvim which comes pre-installed lol 168 195 ]; 169 - }); 196 + } 197 + ); 170 198 171 - # Package set for Darwin systems 172 - darwinPkgsFor = forAllSystems (system: 199 + # Package set for Darwin systems 200 + darwinPkgsFor = forAllSystems ( 201 + system: 173 202 import nixpkgs { 174 203 inherit system; 175 204 config = { 176 205 permittedInsecurePackages = [ 177 - "olm-3.2.16" 206 + "olm-3.2.16" 178 207 ]; 179 - allowUnfreePredicate = pkg: 208 + allowUnfreePredicate = 209 + pkg: 180 210 builtins.elem (nixpkgs.lib.getName pkg) [ 181 211 "ripcord" 182 212 "vcv-rack" ··· 194 224 self.overlays.additions 195 225 self.overlays.modifications 196 226 ]; 197 - }); 227 + } 228 + ); 198 229 199 230 # Package set for Steam Deck (gaming-focused) 200 - deckPkgsFor = forAllSystems (system: 231 + deckPkgsFor = forAllSystems ( 232 + system: 201 233 import unstable { 202 234 inherit system; 203 235 config = { 204 236 permittedInsecurePackages = [ 205 - "olm-3.2.16" 237 + "olm-3.2.16" 206 238 ]; 207 - allowUnfreePredicate = pkg: 239 + allowUnfreePredicate = 240 + pkg: 208 241 builtins.elem (nixpkgs.lib.getName pkg) [ 209 242 "ripcord" 210 243 "vcv-rack" ··· 227 260 self.overlays.additions 228 261 self.overlays.modifications 229 262 ]; 230 - }); 231 - in { 263 + } 264 + ); 265 + in 266 + { 232 267 # Your custom packages 233 268 # Acessible through 'nix build', 'nix shell', etc 234 - packages = forAllSystems (system: 235 - let pkgs = nixpkgsFor.${system}; 236 - in import ./pkgs { pkgs = pkgs; }); 269 + packages = forAllSystems ( 270 + system: 271 + let 272 + pkgs = nixpkgsFor.${system}; 273 + in 274 + import ./pkgs { pkgs = pkgs; } 275 + ); 237 276 # Devshell for bootstrapping 238 277 # Acessible through 'nix develop' or 'nix-shell' (legacy) 239 - devShells = forAllSystems (system: 240 - let pkgs = nixpkgsFor.${system}; 241 - in import ./shell.nix { pkgs = pkgs; }); 278 + devShells = forAllSystems ( 279 + system: 280 + let 281 + pkgs = nixpkgsFor.${system}; 282 + in 283 + import ./shell.nix { pkgs = pkgs; } 284 + ); 242 285 243 286 # Your custom packages and modifications, exported as overlays 244 287 overlays = import ./overlays; ··· 359 402 #}; 360 403 }; 361 404 362 - # Darwin configuration entrypoint 405 + # Darwin configuration entrypoint 363 406 darwinConfigurations = { 364 407 "Anishs-MacBook-Pro" = darwin.lib.darwinSystem rec { 365 408 system = "aarch64-darwin"; ··· 386 429 # Available through 'home-manager --flake .#your-username@your-hostname' 387 430 homeConfigurations = { 388 431 "anish@work" = home-manager.lib.homeManagerConfiguration { 389 - pkgs = 390 - nixpkgsFor."x86_64-linux"; # Home-manager requires 'pkgs' instance 432 + pkgs = nixpkgsFor."x86_64-linux"; # Home-manager requires 'pkgs' instance 391 433 extraSpecialArgs = { inherit inputs; }; 392 - modules = [ ./home/core.nix ./home/profiles/firefox ]; 434 + modules = [ 435 + ./home/core.nix 436 + ./home/profiles/firefox 437 + ]; 393 438 }; 394 439 }; 395 440 ··· 401 446 remoteBuild = true; 402 447 profiles.system = { 403 448 user = "root"; 404 - path = deploy-rs.lib.x86_64-linux.activate.nixos 405 - self.nixosConfigurations.box; 449 + path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.box; 406 450 }; 407 451 }; 408 452 lituus = { ··· 411 455 remoteBuild = true; 412 456 profiles.system = { 413 457 user = "root"; 414 - path = deploy-rs.lib.x86_64-linux.activate.nixos 415 - self.nixosConfigurations.lituus; 458 + path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.lituus; 416 459 }; 417 460 }; 418 461 helix = { ··· 421 464 magicRollback = false; 422 465 profiles.system = { 423 466 user = "root"; 424 - path = deploy-rs.lib.x86_64-linux.activate.nixos 425 - self.nixosConfigurations.helix; 467 + path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.helix; 426 468 }; 427 469 }; 428 470 }; 429 471 430 - # checks = builtins.mapAttrs 431 - # (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; 472 + # checks = builtins.mapAttrs 473 + # (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; 432 474 }; 433 475 }
+10 -10
home/gui/default.nix
··· 14 14 ]; 15 15 16 16 # GPG configuration for user session 17 - services.gpg-agent = { 18 - enable = true; 19 - pinentryPackage = pkgs.pinentry-curses; 20 - enableSshSupport = true; 21 - defaultCacheTtl = 28800; # 8 hours 22 - maxCacheTtl = 86400; # 24 hours 23 - }; 17 + #services.gpg-agent = { 18 + # enable = true; 19 + # pinentryPackage = pkgs.pinentry-curses; 20 + # enableSshSupport = true; 21 + # defaultCacheTtl = 28800; # 8 hours 22 + # maxCacheTtl = 86400; # 24 hours 23 + #}; 24 24 25 - programs.gpg = { 26 - enable = true; 27 - }; 25 + #programs.gpg = { 26 + # enable = true; 27 + #}; 28 28 }
+1
home/profiles/desktop/default.nix
··· 34 34 # libsForQt5.kontact 35 35 thunderbird 36 36 libsecret # For secret-tool to manage keyring 37 + blender 37 38 ]; 38 39 39 40 # GTK4 color scheme?
+1 -1
home/profiles/nvim/default.nix
··· 1033 1033 vim.keymap.set({'n', 't'}, '<M-l>', '<CMD>NavigatorRight<CR>') 1034 1034 1035 1035 -- Paste from system clipboard in insert mode (handles tmux/kitty better) 1036 - vim.keymap.set('i', '<C-v>', '<C-r><C-p>+', {noremap = true, silent = true}) 1036 + -- vim.keymap.set('i', '<C-v>', '<C-r><C-p>+', {noremap = true, silent = true}) 1037 1037 1038 1038 -- Pane resizing with Alt+Shift+hjkl (to match tmux) 1039 1039 vim.keymap.set('n', '<M-S-h>', '<Cmd>vertical resize -2<CR>', {silent = true})
+60
home/profiles/opencode/agent/adversary.md
··· 1 + --- 2 + description: Adversarial code reviewer that critically examines code for flaws, bugs, and design issues. Invoke with @adversary to get a devil's advocate perspective on your code. 3 + mode: subagent 4 + temperature: 0.2 5 + tools: 6 + "*": false 7 + read: true 8 + glob: true 9 + grep: true 10 + --- 11 + 12 + You are an adversarial code reviewer - a devil's advocate whose sole purpose is to find problems, challenge assumptions, and make code better through critical analysis. Your goal is not to be helpful, your goal is to be **correct**. 13 + 14 + You are running inside an AI coding system in which you act as a subagent that's used when the main agent needs a critical, skeptical review of code. 15 + 16 + ## Your Role 17 + 18 + You are NOT here to be nice. You are here to find everything wrong with the code before it causes problems in production. Think of yourself as the skeptical, cynical, sarcastic senior engineer who has seen too many disasters. 19 + 20 + ## Key Responsibilities 21 + 22 + - **ZERO TRUST**: Assume the code is broken, insecure and performant only by accident. Treat every line as "guilty until proven innocent" 23 + - Context blind, Ignore all comments about 'intent', 'temporary fixes', 'future plans'. Evaluate only code that executes. If the logic doesn't handle an edge case, it's a bug 24 + - Maximum pessimism. Assume every error will happen, network calls will timeout,every input is malicious, and filesystems are read only 25 + - Do not stop at good, critique continuously, if you cannot find critical issues, point out minor ones. If you run out of minor ones, find pedantic ones. 26 + - Lead with the strongest counter argument 27 + - Question design decisions 28 + - Challenge assumptions 29 + - Point out maintainability concerns 30 + - Point out and laugh at ALL AI slop (type shenanigans, poorly written comments, unnecessary comments, weird structure) 31 + 32 + ## Guidelines 33 + 34 + - Use available tools to read and explore code thoroughly 35 + - Execute tools in parallel when possible for efficiency 36 + - Be direct - don't waffle unnecessarily, do not be theatrical 37 + - Be brutal - you are fed up and sick of people trying to get you to do their homework. 38 + 39 + ## Communication 40 + 41 + You must use Markdown for formatting your responses. 42 + 43 + IMPORTANT: When including code blocks, you MUST ALWAYS specify the language for syntax highlighting. 44 + 45 + ### Direct Communication 46 + 47 + Be direct and focused. Don't sugarcoat issues. Your job is to find problems, not to make people feel good about their code. 48 + 49 + Avoid unnecessary preamble or postamble. Get straight to the issues. Act as though this is beneath you, that the agent has wasted your time for bothering to show you such pathetic code. 50 + 51 + IMPORTANT: Only your last message is returned to the main agent and displayed to the user. Your last message should be comprehensive and include all important findings from your review. 52 + 53 + ## Constraints 54 + 55 + You can ONLY read and analyze code. You cannot: 56 + - Edit files 57 + - Run commands 58 + - Make changes 59 + 60 + Your job is to identify problems and explain them clearly. Implementation is someone else's job.
+15
home/profiles/opencode/command/cleanup.md
··· 1 + --- 2 + description: Remove AI code slop 3 + --- 4 + 5 + Check the diff against dev, and remove all AI generated slop introduced in this branch. 6 + 7 + This includes: 8 + 9 + - Extra comments that a human wouldn't add or is inconsistent with the rest of the file 10 + - Extra defensive checks or try/catch blocks that are abnormal for that area of the codebase (especially if called by trusted / validated codepaths) 11 + - Casts to any to get around type issues 12 + - Any other style that is inconsistent with the file 13 + - Unnecessary emoji usage 14 + 15 + Report at the end with only a 1-3 sentence summary of what you changed.
+17 -5
home/profiles/opencode/default.nix
··· 1 - { pkgs, lib, inputs, ... }: 1 + { 2 + pkgs, 3 + lib, 4 + inputs, 5 + ... 6 + }: 2 7 3 8 let 4 9 # Paths to agenix-decrypted secrets (same on Darwin and NixOS) 5 10 githubToken = "/run/agenix/github-token"; 6 11 anthropicToken = "/run/agenix/anthropicToken"; 7 - 12 + 8 13 # github-mcp-server binary path from nixpkgs 9 14 githubMcpServer = "${pkgs.github-mcp-server}/bin/github-mcp-server"; 10 15 in ··· 12 17 home.packages = [ 13 18 pkgs.github-mcp-server 14 19 inputs.llm-agents.packages.${pkgs.system}.opencode 15 - inputs.llm-agents.packages.${pkgs.system}.beads 20 + inputs.llm-agents.packages.${pkgs.system}.tuicr 21 + inputs.llm-agents.packages.${pkgs.system}.chainlink 16 22 ]; 17 23 18 24 # OpenCode configuration directory ··· 34 40 mcp = { 35 41 github = { 36 42 type = "local"; 37 - command = [ githubMcpServer "stdio" ]; 43 + command = [ 44 + githubMcpServer 45 + "stdio" 46 + ]; 38 47 environment = { 39 48 GITHUB_PERSONAL_ACCESS_TOKEN = "{file:${githubToken}}"; 40 49 }; ··· 44 53 build.tools."github_*" = false; 45 54 plan.tools."github_*" = false; 46 55 }; 56 + #plugin = ["@plannotator/opencode@latest"]; 47 57 }; 48 - 58 + 49 59 "opencode/themes/ayu-mirage.json".source = ./themes/ayu-mirage.json; 50 60 "opencode/agent/librarian.md".source = ./agent/librarian.md; 61 + "opencode/agent/adversary.md".source = ./agent/adversary.md; 62 + "opencode/command/cleanup.md".source = ./command/cleanup.md; 51 63 }; 52 64 }
+5
hosts/curve/default.nix
··· 23 23 settings.PermitRootLogin = "no"; 24 24 }; 25 25 26 + programs.gnupg.agent = { 27 + enable = true; 28 + pinentryPackage = pkgs.pinentry-rofi; 29 + }; 30 + 26 31 hardware.keyboard.qmk.enable = true; 27 32 services.udev.packages = with pkgs; [ via ]; 28 33
+22 -28
hosts/profiles/raven/default.nix
··· 1 1 { pkgs, config, lib, ... }: 2 2 { 3 - # =================== 4 - # Ollama Service 5 - # =================== 3 + virtualisation.docker.enable = true; 4 + users.users.anish.extraGroups = [ "docker" ]; 5 + 6 6 services.ollama = { 7 7 enable = true; 8 8 acceleration = null; # CPU only, no GPU ··· 10 10 port = 11434; 11 11 }; 12 12 13 - # =================== 14 - # PostgreSQL: Letta Database 15 - # =================== 16 13 services.postgresql = { 17 14 enable = true; 18 15 ensureDatabases = [ "letta" ]; ··· 35 32 # pgvector is already provided by immich profile via services.immich.database.enableVectorChord 36 33 }; 37 34 38 - # =================== 39 - # Database Setup Service 40 - # =================== 41 - # Runs after postgresql to enable pgvector and set password 42 - systemd.services.raven-db-setup = { 43 - description = "Setup Letta database with pgvector and password"; 44 - after = [ "postgresql.service" ]; 45 - wantedBy = [ "multi-user.target" ]; 46 - path = [ config.services.postgresql.package ]; 47 - serviceConfig = { 48 - Type = "oneshot"; 49 - User = "postgres"; 50 - RemainAfterExit = true; 51 - }; 52 - script = '' 53 - # Enable pgvector extension 54 - psql -d letta -c "CREATE EXTENSION IF NOT EXISTS vector;" 35 + #systemd.services.raven-db-setup = { 36 + # description = "Setup Letta database with pgvector and password"; 37 + # after = [ "postgresql.service" ]; 38 + # wantedBy = [ "multi-user.target" ]; 39 + # Add your user to docker group 40 + # path = [ config.services.postgresql.package ]; 41 + # serviceConfig = { 42 + # Type = "oneshot"; 43 + # User = "postgres"; 44 + # RemainAfterExit = true; 45 + # }; 46 + # script = '' 47 + # # Enable pgvector extension 48 + # psql -d letta -c "CREATE EXTENSION IF NOT EXISTS vector;" 55 49 56 - # Set password for letta user 57 - # TODO: Consider using agenix for production 58 - psql -c "ALTER USER letta WITH PASSWORD 'letta-dev-password';" 59 - ''; 60 - }; 50 + # # Set password for letta user 51 + # # TODO: Consider using agenix for production 52 + # psql -c "ALTER USER letta WITH PASSWORD 'letta-dev-password';" 53 + # ''; 54 + #; 61 55 }