Compare commits
17 commits
54d97e55d9
...
2b2326a65c
Author | SHA1 | Date | |
---|---|---|---|
2b2326a65c | |||
e8e1f8e7ce | |||
cec92da687 | |||
4c6ecb05bd | |||
9191b17bff | |||
26187a521b | |||
984ba9267d | |||
017b19cd17 | |||
796ecadf90 | |||
8ee594e06b | |||
72461214d8 | |||
8efbd6f577 | |||
9dfb48ba0c | |||
73449da88f | |||
9dbc963840 | |||
4d8da4b646 | |||
b25018e39e |
21 changed files with 300 additions and 54 deletions
53
flake.lock
generated
53
flake.lock
generated
|
@ -209,11 +209,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1727826117,
|
"lastModified": 1730504689,
|
||||||
"narHash": "sha256-K5ZLCyfO/Zj9mPFldf3iwS6oZStJcU4tSpiXTMYaaL0=",
|
"narHash": "sha256-hgmguH29K2fvs9szpq2r3pz2/8cJd2LPS+b4tfNFCwE=",
|
||||||
"owner": "hercules-ci",
|
"owner": "hercules-ci",
|
||||||
"repo": "flake-parts",
|
"repo": "flake-parts",
|
||||||
"rev": "3d04084d54bedc3d6b8b736c70ef449225c361b1",
|
"rev": "506278e768c2a08bec68eb62932193e341f55c90",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -287,11 +287,11 @@
|
||||||
"systems": "systems_2"
|
"systems": "systems_2"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1726560853,
|
"lastModified": 1731533236,
|
||||||
"narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
|
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "flake-utils",
|
"repo": "flake-utils",
|
||||||
"rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
|
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -485,11 +485,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1731535640,
|
"lastModified": 1733389730,
|
||||||
"narHash": "sha256-2EckCJn4wxran/TsRiCOFcmVpep2m9EBKl99NBh2GnM=",
|
"narHash": "sha256-KZMu4ddMll5khS0rYkJsVD0hVqjMNHlhTM3PCQar0Ag=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "35b055009afd0107b69c286fca34d2ad98940d57",
|
"rev": "65912bc6841cf420eb8c0a20e03df7cbbff5963f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -564,7 +564,6 @@
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1728951119,
|
"lastModified": 1728951119,
|
||||||
"narHash": "sha256-vUBgL8zJBDyj2serxdEVbNqe6pBN4YgWwhtg3XP8mpQ=",
|
"narHash": "sha256-vUBgL8zJBDyj2serxdEVbNqe6pBN4YgWwhtg3XP8mpQ=",
|
||||||
"ref": "refs/heads/main",
|
|
||||||
"rev": "f6077314fa6aff862758095bb55fe844e9162a1d",
|
"rev": "f6077314fa6aff862758095bb55fe844e9162a1d",
|
||||||
"revCount": 16344,
|
"revCount": 16344,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
|
@ -589,11 +588,11 @@
|
||||||
"treefmt-nix": "treefmt-nix"
|
"treefmt-nix": "treefmt-nix"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1731185443,
|
"lastModified": 1732351635,
|
||||||
"narHash": "sha256-9qkRZFTgbMonlBaLqL+OW6iiHLWXuBJlThISMhwQuGg=",
|
"narHash": "sha256-H94CcQ3yamG5+RMxtxXllR02YIlxQ5WD/8PcolO9yEA=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "57ddb99e781d19704f8a84036f9890e6ca554c41",
|
"rev": "dfc286ca3dc49118c30d8d6205d6d6af76c62b7a",
|
||||||
"revCount": 613,
|
"revCount": 617,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.lix.systems/lix-project/nix-eval-jobs"
|
"url": "https://git.lix.systems/lix-project/nix-eval-jobs"
|
||||||
},
|
},
|
||||||
|
@ -614,11 +613,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1731185731,
|
"lastModified": 1732603698,
|
||||||
"narHash": "sha256-RNaIu43b9PoXEhW4OqXUNZKY/jezQyCYWwdv1M0VjsA=",
|
"narHash": "sha256-Jw2MhzgCCrKV2MJytehG0cCLIAosBX71p8qmQ6XQlR4=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "691193879d96bdfd1e6ab5ebcca2fadc7604cf34",
|
"rev": "15b999f9c958c475f71fb8c543b9fc2f36ae8730",
|
||||||
"revCount": 117,
|
"revCount": 123,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.lix.systems/lix-project/nixos-module"
|
"url": "https://git.lix.systems/lix-project/nixos-module"
|
||||||
},
|
},
|
||||||
|
@ -699,11 +698,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729742964,
|
"lastModified": 1731952509,
|
||||||
"narHash": "sha256-B4mzTcQ0FZHdpeWcpDYPERtyjJd/NIuaQ9+BV1h+MpA=",
|
"narHash": "sha256-p4gB3Rhw8R6Ak4eMl8pqjCPOLCZRqaehZxdZ/mbFClM=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nix-github-actions",
|
"repo": "nix-github-actions",
|
||||||
"rev": "e04df33f62cdcf93d73e9a04142464753a16db67",
|
"rev": "7b5f051df789b6b20d259924d349a9ba3319b226",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -996,11 +995,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs_7": {
|
"nixpkgs_7": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1731319897,
|
"lastModified": 1733212471,
|
||||||
"narHash": "sha256-PbABj4tnbWFMfBp6OcUK5iGy1QY+/Z96ZcLpooIbuEI=",
|
"narHash": "sha256-M1+uCoV5igihRfcUKrr1riygbe73/dzNnzPsmaLCmpo=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "dc460ec76cbff0e66e269457d7b728432263166c",
|
"rev": "55d15ad12a74eb7d4646254e13638ad0c4128776",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -1284,11 +1283,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1729613947,
|
"lastModified": 1732292307,
|
||||||
"narHash": "sha256-XGOvuIPW1XRfPgHtGYXd5MAmJzZtOuwlfKDgxX5KT3s=",
|
"narHash": "sha256-5WSng844vXt8uytT5djmqBCkopyle6ciFgteuA9bJpw=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "treefmt-nix",
|
"repo": "treefmt-nix",
|
||||||
"rev": "aac86347fb5063960eccb19493e0cadcdb4205ca",
|
"rev": "705df92694af7093dfbb27109ce16d828a79155f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
(
|
(
|
||||||
let
|
let
|
||||||
cura5 = pkgs.appimageTools.wrapType2 rec {
|
cura5 = pkgs.appimageTools.wrapType2 rec {
|
||||||
name = "cura5";
|
pname = "cura5";
|
||||||
version = "5.8.0";
|
version = "5.8.0";
|
||||||
src = pkgs.fetchurl {
|
src = pkgs.fetchurl {
|
||||||
url = "https://github.com/Ultimaker/Cura/releases/download/${version}/UltiMaker-Cura-${version}-linux-X64.AppImage";
|
url = "https://github.com/Ultimaker/Cura/releases/download/${version}/UltiMaker-Cura-${version}-linux-X64.AppImage";
|
||||||
|
|
|
@ -881,6 +881,8 @@ This is meant to be an helper to be called from the window manager."
|
||||||
:custom
|
:custom
|
||||||
(gptel-api-key (lambda () (require 'f) (f-read-text (getenv "OPENAI_API_KEY_PATH"))))
|
(gptel-api-key (lambda () (require 'f) (f-read-text (getenv "OPENAI_API_KEY_PATH"))))
|
||||||
(gptel-model 'gpt-4o)
|
(gptel-model 'gpt-4o)
|
||||||
|
(gptel-default-mode 'org-mode)
|
||||||
|
(gptel-org-branching-context 't)
|
||||||
:config
|
:config
|
||||||
(require 'gptel-curl)
|
(require 'gptel-curl)
|
||||||
|
|
||||||
|
@ -919,6 +921,9 @@ This is meant to be an helper to be called from the window manager."
|
||||||
) ;; destroy frame on exit
|
) ;; destroy frame on exit
|
||||||
)
|
)
|
||||||
|
|
||||||
|
(use-package mixed-pitch
|
||||||
|
:hook (text-mode . mixed-pitch-mode))
|
||||||
|
|
||||||
(use-package pass
|
(use-package pass
|
||||||
:config
|
:config
|
||||||
(require 'password-store-otp) ;; FIXME use `use-pacakge' idiomatic way
|
(require 'password-store-otp) ;; FIXME use `use-pacakge' idiomatic way
|
||||||
|
@ -967,5 +972,26 @@ This is meant to be an helper to be called from the window manager."
|
||||||
(:name "GitHub" :query "tag:github" :key "g")
|
(:name "GitHub" :query "tag:github" :key "g")
|
||||||
(:name "Trash" :query "tag:trash" :key "t"))))
|
(:name "Trash" :query "tag:trash" :key "t"))))
|
||||||
|
|
||||||
|
;;; Experiments, remove from here
|
||||||
|
|
||||||
|
(defun ccr/test ()
|
||||||
|
"test"
|
||||||
|
(interactive)
|
||||||
|
(with-selected-frame
|
||||||
|
(make-frame '((name . "emacs-run-launcher")
|
||||||
|
(minibuffer . only)
|
||||||
|
(fullscreen . 0) ; no fullscreen
|
||||||
|
(undecorated . t) ; remove title bar
|
||||||
|
;;(auto-raise . t) ; focus on this frame
|
||||||
|
;;(tool-bar-lines . 0)
|
||||||
|
;;(menu-bar-lines . 0)
|
||||||
|
(internal-border-width . 10)
|
||||||
|
(width . 80)
|
||||||
|
(height . 11)))
|
||||||
|
(unwind-protect
|
||||||
|
(completing-read "ciao " '("foo" "bar") nil t "")
|
||||||
|
(delete-frame))))
|
||||||
|
|
||||||
|
|
||||||
(provide 'init)
|
(provide 'init)
|
||||||
;;; init.el ends here
|
;;; init.el ends here
|
||||||
|
|
7
hmModules/sdrangel/default.nix
Normal file
7
hmModules/sdrangel/default.nix
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
home.packages = [
|
||||||
|
pkgs.sdrangel
|
||||||
|
pkgs.kdePackages.qtlocation
|
||||||
|
];
|
||||||
|
}
|
|
@ -4,6 +4,7 @@
|
||||||
age,
|
age,
|
||||||
hostname,
|
hostname,
|
||||||
config,
|
config,
|
||||||
|
username,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
@ -59,7 +60,7 @@
|
||||||
settings = {
|
settings = {
|
||||||
daemon = {
|
daemon = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
socket_path = "/home/ccr/.local/share/atuin/atuin.sock"; # FIXME using ~ or $HOME doesn't work: https://github.com/atuinsh/atuin/issues/2289
|
socket_path = "/home/${username}/.local/share/atuin/atuin.sock"; # FIXME using ~ or $HOME doesn't work: https://github.com/atuinsh/atuin/issues/2289
|
||||||
};
|
};
|
||||||
auto_sync = true;
|
auto_sync = true;
|
||||||
sync_frequency = "5m";
|
sync_frequency = "5m";
|
||||||
|
|
|
@ -119,6 +119,20 @@
|
||||||
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
tpol = {
|
||||||
|
extraModules = with inputs; [
|
||||||
|
lix-module.nixosModules.default
|
||||||
|
];
|
||||||
|
secrets = {
|
||||||
|
"tpol-wireguard-private-key" = { };
|
||||||
|
};
|
||||||
|
vpn = {
|
||||||
|
ip = "10.100.0.7";
|
||||||
|
publicKey = "b/Pi7koTFo5CMAAzcL2ulvQ/0dUjKzbmXpvh4Lb/Bgo=";
|
||||||
|
};
|
||||||
|
extraHmModulesUser = "mara";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
vpnExtra = {
|
vpnExtra = {
|
||||||
|
|
|
@ -40,7 +40,7 @@
|
||||||
|
|
||||||
ccr = {
|
ccr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
autologin = true;
|
autologin = false;
|
||||||
modules = [
|
modules = [
|
||||||
"git"
|
"git"
|
||||||
"git-workspace"
|
"git-workspace"
|
||||||
|
@ -72,6 +72,8 @@
|
||||||
"catppuccin"
|
"catppuccin"
|
||||||
"libreoffice"
|
"libreoffice"
|
||||||
"emacs"
|
"emacs"
|
||||||
|
"chirp"
|
||||||
|
"sdrangel"
|
||||||
];
|
];
|
||||||
extraGroups = [ ];
|
extraGroups = [ ];
|
||||||
backupPaths = [ ];
|
backupPaths = [ ];
|
||||||
|
@ -99,6 +101,7 @@
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
powerManagement.cpuFreqGovernor = lib.mkDefault "schedutil";
|
powerManagement.cpuFreqGovernor = lib.mkDefault "schedutil";
|
||||||
hardware.enableRedistributableFirmware = lib.mkDefault true;
|
hardware.enableRedistributableFirmware = lib.mkDefault true;
|
||||||
|
hardware.rtl-sdr.enable = true;
|
||||||
|
|
||||||
hardware.graphics = {
|
hardware.graphics = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -91,8 +91,9 @@
|
||||||
"emacs"
|
"emacs"
|
||||||
"vial"
|
"vial"
|
||||||
"chirp"
|
"chirp"
|
||||||
|
"sdrangel"
|
||||||
];
|
];
|
||||||
extraGroups = [ ];
|
extraGroups = [ "plugdev" ];
|
||||||
backupPaths = [ ];
|
backupPaths = [ ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -66,8 +66,11 @@ in
|
||||||
size = "100%";
|
size = "100%";
|
||||||
content = {
|
content = {
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "bcachefs";
|
format = "xfs";
|
||||||
mountpoint = "/mnt/hd";
|
mountpoint = "/mnt/hd";
|
||||||
|
mountOptions = [
|
||||||
|
"nofail"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
48
hosts/spock/default.nix
Normal file
48
hosts/spock/default.nix
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
{
|
||||||
|
lib,
|
||||||
|
modulesPath,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
"${modulesPath}/installer/sd-card/sd-image-aarch64.nix"
|
||||||
|
];
|
||||||
|
|
||||||
|
sdImage.compressImage = false;
|
||||||
|
|
||||||
|
nixpkgs = {
|
||||||
|
# hostPlatform = lib.mkDefault "armv6-linux";
|
||||||
|
# config = {
|
||||||
|
# allowUnfree = true;
|
||||||
|
# };
|
||||||
|
# overlays = [
|
||||||
|
# # Workaround: https://github.com/NixOS/nixpkgs/issues/154163
|
||||||
|
# # modprobe: FATAL: Module sun4i-drm not found in directory
|
||||||
|
# (final: super: {
|
||||||
|
# makeModulesClosure = x:
|
||||||
|
# super.makeModulesClosure (x // {allowMissing = true;});
|
||||||
|
# })
|
||||||
|
# ];
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems = {
|
||||||
|
"/" = {
|
||||||
|
device = "/dev/disk/by-label/NIXOS_SD";
|
||||||
|
fsType = "ext4";
|
||||||
|
options = [ "noatime" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
networkmanager.enable = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Set your time zone.
|
||||||
|
time.timeZone = "Europe/Rome";
|
||||||
|
|
||||||
|
# Allow the user to log in as root without a password.
|
||||||
|
users.users.root.initialHashedPassword = "";
|
||||||
|
|
||||||
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
system.stateVersion = "24.11";
|
||||||
|
}
|
94
hosts/tpol/default.nix
Normal file
94
hosts/tpol/default.nix
Normal file
|
@ -0,0 +1,94 @@
|
||||||
|
{
|
||||||
|
modulesPath,
|
||||||
|
fleetModules,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
vpn,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
imports =
|
||||||
|
[ (modulesPath + "/installer/scan/not-detected.nix") ]
|
||||||
|
++ fleetModules [
|
||||||
|
"common"
|
||||||
|
"ssh"
|
||||||
|
"nix"
|
||||||
|
"networkmanager"
|
||||||
|
"dbus"
|
||||||
|
"udisks2"
|
||||||
|
"xdg"
|
||||||
|
"printing"
|
||||||
|
"mara"
|
||||||
|
"xfce"
|
||||||
|
"battery"
|
||||||
|
"printing"
|
||||||
|
"wireguard-client"
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = [
|
||||||
|
"xhci_pci"
|
||||||
|
"ehci_pci"
|
||||||
|
"ahci"
|
||||||
|
"usb_storage"
|
||||||
|
"sd_mod"
|
||||||
|
"sr_mod"
|
||||||
|
"rtsx_pci_sdmmc"
|
||||||
|
];
|
||||||
|
boot.initrd.kernelModules = [ ];
|
||||||
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
boot.loader.grub.device = "/dev/sda";
|
||||||
|
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/disk/by-uuid/1522f8d9-5251-408d-9b6e-ed6da7da916a";
|
||||||
|
fsType = "btrfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices = [
|
||||||
|
{ device = "/dev/disk/by-uuid/e111fbc7-8e5d-4fcb-95c9-249f53ab0adc"; }
|
||||||
|
];
|
||||||
|
|
||||||
|
mara = {
|
||||||
|
enable = true;
|
||||||
|
modules = [
|
||||||
|
"shell"
|
||||||
|
"mpv"
|
||||||
|
"firefox"
|
||||||
|
"git"
|
||||||
|
"chrome"
|
||||||
|
"udiskie"
|
||||||
|
"helix"
|
||||||
|
"remmina"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# nevertheless this is a laptop the battery is completely gone, so it works only attached to electrictiy
|
||||||
|
powerManagement.cpuFreqGovernor = lib.mkDefault "performance";
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ 1234 ];
|
||||||
|
|
||||||
|
hardware.rtl-sdr.enable = true;
|
||||||
|
|
||||||
|
systemd.services.rtl-tcp = {
|
||||||
|
description = "rtl_sdr over TCP";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = ''
|
||||||
|
${lib.getExe' pkgs.rtl-sdr "rtl_tcp"} -a ${vpn.${config.networking.hostName}}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.sdrangelsrv = {
|
||||||
|
description = "sdrangelsrv";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = ''
|
||||||
|
${lib.getExe' pkgs.sdrangel "sdrangelsrv"} --remote-tcp-hwtype RTLSDR --remote-tcp-port 1234 --remote-tcp-address ${
|
||||||
|
vpn.${config.networking.hostName}
|
||||||
|
} --remote-tcp
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -12,6 +12,7 @@
|
||||||
pbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFF05LScu9m5BXMlFAT1g+g/AkAi7kvq1dY6W3Rzqq3f";
|
pbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFF05LScu9m5BXMlFAT1g+g/AkAi7kvq1dY6W3Rzqq3f";
|
||||||
picard = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ1+1z1IsLVJ6aGarMgzw3NbmFKcpYVgdUjl7xDsewxT";
|
picard = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ1+1z1IsLVJ6aGarMgzw3NbmFKcpYVgdUjl7xDsewxT";
|
||||||
deltaflyer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPETMwELvGTnhKJbpK0oFs4lK8vm/kV9KdgL9wufYDDQ";
|
deltaflyer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPETMwELvGTnhKJbpK0oFs4lK8vm/kV9KdgL9wufYDDQ";
|
||||||
|
tpol = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIQxHSow2l0TDWTonBPPaGvTgVvMS/xsQOf1nHnvLSwV";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,9 +3,10 @@
|
||||||
"i686-linux"
|
"i686-linux"
|
||||||
"aarch64-linux"
|
"aarch64-linux"
|
||||||
"riscv64-linux"
|
"riscv64-linux"
|
||||||
|
"armv6l-linux"
|
||||||
];
|
];
|
||||||
nix.extraOptions = ''
|
nix.extraOptions = ''
|
||||||
extra-platforms = aarch64-linux arm-linux i686-linux riscv64-linux
|
extra-platforms = aarch64-linux arm-linux i686-linux riscv64-linux armv6l-linux
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# XXX For some reason `docker buildx` isn't aware of this:
|
# XXX For some reason `docker buildx` isn't aware of this:
|
||||||
|
|
|
@ -86,6 +86,7 @@ in
|
||||||
"dialout"
|
"dialout"
|
||||||
"systemd-journal"
|
"systemd-journal"
|
||||||
"camera"
|
"camera"
|
||||||
|
"networkmanager"
|
||||||
];
|
];
|
||||||
ccr.modules = [
|
ccr.modules = [
|
||||||
"shell"
|
"shell"
|
||||||
|
|
|
@ -1,19 +1,21 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
fonts = {
|
fonts = {
|
||||||
packages = with pkgs; [
|
packages =
|
||||||
powerline-fonts
|
with pkgs;
|
||||||
dejavu_fonts
|
[
|
||||||
fira-code
|
powerline-fonts
|
||||||
fira-code-symbols
|
dejavu_fonts
|
||||||
iosevka
|
fira-code
|
||||||
iosevka-comfy.comfy
|
fira-code-symbols
|
||||||
emacs-all-the-icons-fonts
|
iosevka
|
||||||
nerdfonts
|
iosevka-comfy.comfy
|
||||||
joypixels
|
emacs-all-the-icons-fonts
|
||||||
etBook
|
joypixels
|
||||||
vegur
|
etBook
|
||||||
];
|
vegur
|
||||||
|
]
|
||||||
|
++ (builtins.filter lib.attrsets.isDerivation (builtins.attrValues nerd-fonts));
|
||||||
fontconfig.defaultFonts = {
|
fontconfig.defaultFonts = {
|
||||||
monospace = [ "DejaVu Sans Mono for Powerline" ];
|
monospace = [ "DejaVu Sans Mono for Powerline" ];
|
||||||
sansSerif = [ "DejaVu Sans" ];
|
sansSerif = [ "DejaVu Sans" ];
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
fleetHmModules,
|
fleetHmModules,
|
||||||
fleetFlake,
|
fleetFlake,
|
||||||
|
vpn,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
@ -46,20 +47,33 @@
|
||||||
default = [
|
default = [
|
||||||
"wheel"
|
"wheel"
|
||||||
"fuse"
|
"fuse"
|
||||||
"networkmanager"
|
"video"
|
||||||
"dialout"
|
"dialout"
|
||||||
|
"systemd-journal"
|
||||||
|
"camera"
|
||||||
|
"networkmanager"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf config.mara.enable {
|
config = lib.mkIf config.mara.enable {
|
||||||
|
|
||||||
|
programs.fish.enable = true;
|
||||||
|
|
||||||
|
mara.modules = [
|
||||||
|
"shell"
|
||||||
|
"git"
|
||||||
|
"nix-index"
|
||||||
|
"btop"
|
||||||
|
];
|
||||||
|
|
||||||
users.users.mara = {
|
users.users.mara = {
|
||||||
uid = 1001;
|
uid = 1001;
|
||||||
inherit (config.mara) hashedPassword;
|
inherit (config.mara) hashedPassword;
|
||||||
description = "Mara Savastano";
|
description = "Mara Savastano";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
inherit (config.mara) extraGroups;
|
inherit (config.mara) extraGroups;
|
||||||
shell = pkgs.nushell;
|
shell = pkgs.fish;
|
||||||
openssh.authorizedKeys.keys = config.mara.authorizedKeys;
|
openssh.authorizedKeys.keys = config.mara.authorizedKeys;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -68,7 +82,16 @@
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.users.mara = {
|
home-manager.users.mara = {
|
||||||
imports = fleetHmModules config.mara.modules;
|
imports = fleetHmModules config.mara.modules ++ [
|
||||||
|
{
|
||||||
|
_module.args = {
|
||||||
|
inherit (config.age) secrets;
|
||||||
|
inherit vpn;
|
||||||
|
username = "mara";
|
||||||
|
hostname = config.networking.hostName;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
];
|
||||||
home.packages = config.mara.packages;
|
home.packages = config.mara.packages;
|
||||||
home.stateVersion = config.system.stateVersion;
|
home.stateVersion = config.system.stateVersion;
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
{ lib, ... }:
|
{ lib, ... }:
|
||||||
{
|
{
|
||||||
networking.networkmanager.enable = true;
|
networking.networkmanager.enable = true;
|
||||||
ccr.extraGroups = [ "networkmanager" ];
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
networking.useDHCP = lib.mkDefault true;
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,10 +5,11 @@
|
||||||
xterm.enable = false;
|
xterm.enable = false;
|
||||||
xfce.enable = true;
|
xfce.enable = true;
|
||||||
};
|
};
|
||||||
displayManager = {
|
};
|
||||||
defaultSession = "xfce";
|
|
||||||
autoLogin.user = "mara";
|
services.displayManager = {
|
||||||
};
|
defaultSession = "xfce";
|
||||||
|
autoLogin.user = "mara";
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.mara.home.file."background-image" = {
|
home-manager.users.mara.home.file."background-image" = {
|
||||||
|
|
|
@ -118,6 +118,7 @@ let
|
||||||
solidity-mode
|
solidity-mode
|
||||||
telega
|
telega
|
||||||
aggressive-indent
|
aggressive-indent
|
||||||
|
mixed-pitch
|
||||||
# org-re-reveal # FIXME very not nice hash mismatch when building
|
# org-re-reveal # FIXME very not nice hash mismatch when building
|
||||||
]
|
]
|
||||||
)
|
)
|
||||||
|
|
|
@ -182,4 +182,8 @@ with keys.users;
|
||||||
|
|
||||||
deltaflyer
|
deltaflyer
|
||||||
];
|
];
|
||||||
|
"tpol-wireguard-private-key.age".publicKeys = [
|
||||||
|
ccr-ssh
|
||||||
|
tpol
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|
17
secrets/tpol-wireguard-private-key.age
Normal file
17
secrets/tpol-wireguard-private-key.age
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-rsa /AagBw
|
||||||
|
qUiTcrs0L+daa9FAsa80rdJsZCKCJN76KREz7mU7FF3ZBGp4VvisP4hJSjNKheWW
|
||||||
|
pfVaefXfuIsw2GvGqUjNZMGHj650gGEqMtO6nLuetMuCIWF7uTdPpnNQMK6BB2ni
|
||||||
|
Wlfu2g4rul6aV+S6KNiVBqlKJn521TOkEutsXFjaAJpnRVOG50P/8k9fPzjXNZnj
|
||||||
|
NqmMhGjOE8tDs9TM1nWM4yYDX3KMDULvcBHycV3yQRzswEJc4jq9oLS8SbyE+4Hy
|
||||||
|
dH6hkWLiRMz06Xg4F0XifGY4lglcMiQqNdNe5xMZtuR33Z1GUiY9HGU5FvXmUbQx
|
||||||
|
HTWTklzH8q0vdEmb2tFftCM8AMeodI3CLBt+DNlQ3V0+izUmOJwTGz5OGfT6SiWY
|
||||||
|
epMF5kXmZipWu5KsEoY1hv1INvGR84LyicpOT2vPV7cakx9ahlCgV5vhdmcAZy5F
|
||||||
|
CRAhnvIsZZMHwGV9lmAMI93wgPyU0ybtwjSpPbHAqv0DQj+CBrEY5ict3+HhSe5J
|
||||||
|
QrfcLRsQRox3QuR/jQvixBX63qNaezYFmpBuWP7XI7PuPj7KdUgECNfMctcVmCSb
|
||||||
|
xHKmYkf8I8Si1doFOZbYOXheiI/zNk0xLAONPI+LQ6ZemUODhpcpRSSkhcDKQdtC
|
||||||
|
srxvyTvYOk4IFjmjuk2JyE1Vp6wg+aiySZlyfFA7WQY
|
||||||
|
-> ssh-ed25519 X7Q5KQ UoryJKCMOKeAkI1dbz8On5q0wSd+XIUCdWI31gyS6D4
|
||||||
|
exrVhh9tGzQyToDKcv5sspbeKhdTp1q0wKuHWo+onKQ
|
||||||
|
--- QkkySHHmaJFZu2BNT0ZZ9NZipUbFqyzxL32YZx5DRbQ
|
||||||
|
wc¿^«Ò[v$jªš”ž7Lmt´{<7B>øù`¾ü0©—]ÿ¸lè<6C>¾…–3¢ñ<C2A2>…ã
šð{C²\µ±ßXƒZ§Œ°¸)Z$¿4d›„/.L
|
Loading…
Add table
Reference in a new issue