Compare commits
18 commits
fa1a99608f
...
12283a81c2
Author | SHA1 | Date | |
---|---|---|---|
12283a81c2 | |||
2b2326a65c | |||
e8e1f8e7ce | |||
cec92da687 | |||
4c6ecb05bd | |||
9191b17bff | |||
26187a521b | |||
984ba9267d | |||
017b19cd17 | |||
796ecadf90 | |||
8ee594e06b | |||
72461214d8 | |||
8efbd6f577 | |||
9dfb48ba0c | |||
73449da88f | |||
9dbc963840 | |||
4d8da4b646 | |||
b25018e39e |
21 changed files with 292 additions and 45 deletions
36
flake.lock
generated
36
flake.lock
generated
|
@ -119,11 +119,11 @@
|
||||||
"nixpkgs-stable": "nixpkgs-stable"
|
"nixpkgs-stable": "nixpkgs-stable"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733361773,
|
"lastModified": 1733473330,
|
||||||
"narHash": "sha256-b+cFO1MDGjkR6VnYfTiZTqWQtXbKKFIw0GzvEEzDEOs=",
|
"narHash": "sha256-u+omEO2O4TaUIxOCkCBbgYC9piLN4NEiq/nYwB8hCRY=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "emacs-overlay",
|
"repo": "emacs-overlay",
|
||||||
"rev": "2e6e7801a515f8dbece2d888244a6a2604e36e86",
|
"rev": "e3ac055c27f9268a294c911578c7cb04c087c7ab",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -485,11 +485,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733389730,
|
"lastModified": 1733484277,
|
||||||
"narHash": "sha256-KZMu4ddMll5khS0rYkJsVD0hVqjMNHlhTM3PCQar0Ag=",
|
"narHash": "sha256-i5ay20XsvpW91N4URET/nOc0VQWOAd4c4vbqYtcH8Rc=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "65912bc6841cf420eb8c0a20e03df7cbbff5963f",
|
"rev": "d00c6f6d0ad16d598bf7e2956f52c1d9d5de3c3a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -778,11 +778,11 @@
|
||||||
},
|
},
|
||||||
"nixosHardware": {
|
"nixosHardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733217105,
|
"lastModified": 1733481457,
|
||||||
"narHash": "sha256-fc6jTzIwCIVWTX50FtW6AZpuukuQWSEbPiyg6ZRGWFY=",
|
"narHash": "sha256-IS3bxa4N1VMSh3/P6vhEAHQZecQ3oAlKCDvzCQSO5Is=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "cceee0a31d2f01bcc98b2fbd591327c06a4ea4f9",
|
"rev": "e563803af3526852b6b1d77107a81908c66a9fcf",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -935,11 +935,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs_3": {
|
"nixpkgs_3": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733212471,
|
"lastModified": 1733392399,
|
||||||
"narHash": "sha256-M1+uCoV5igihRfcUKrr1riygbe73/dzNnzPsmaLCmpo=",
|
"narHash": "sha256-kEsTJTUQfQFIJOcLYFt/RvNxIK653ZkTBIs4DG+cBns=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "55d15ad12a74eb7d4646254e13638ad0c4128776",
|
"rev": "d0797a04b81caeae77bcff10a9dde78bc17f5661",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -996,11 +996,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs_7": {
|
"nixpkgs_7": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733212471,
|
"lastModified": 1733392399,
|
||||||
"narHash": "sha256-M1+uCoV5igihRfcUKrr1riygbe73/dzNnzPsmaLCmpo=",
|
"narHash": "sha256-kEsTJTUQfQFIJOcLYFt/RvNxIK653ZkTBIs4DG+cBns=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "55d15ad12a74eb7d4646254e13638ad0c4128776",
|
"rev": "d0797a04b81caeae77bcff10a9dde78bc17f5661",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -1325,11 +1325,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1733222881,
|
"lastModified": 1733440889,
|
||||||
"narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=",
|
"narHash": "sha256-qKL3vjO+IXFQ0nTinFDqNq/sbbnnS5bMI1y0xX215fU=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "treefmt-nix",
|
"repo": "treefmt-nix",
|
||||||
"rev": "49717b5af6f80172275d47a418c9719a31a78b53",
|
"rev": "50862ba6a8a0255b87377b9d2d4565e96f29b410",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
(
|
(
|
||||||
let
|
let
|
||||||
cura5 = pkgs.appimageTools.wrapType2 rec {
|
cura5 = pkgs.appimageTools.wrapType2 rec {
|
||||||
name = "cura5";
|
pname = "cura5";
|
||||||
version = "5.8.0";
|
version = "5.8.0";
|
||||||
src = pkgs.fetchurl {
|
src = pkgs.fetchurl {
|
||||||
url = "https://github.com/Ultimaker/Cura/releases/download/${version}/UltiMaker-Cura-${version}-linux-X64.AppImage";
|
url = "https://github.com/Ultimaker/Cura/releases/download/${version}/UltiMaker-Cura-${version}-linux-X64.AppImage";
|
||||||
|
|
|
@ -881,6 +881,8 @@ This is meant to be an helper to be called from the window manager."
|
||||||
:custom
|
:custom
|
||||||
(gptel-api-key (lambda () (require 'f) (f-read-text (getenv "OPENAI_API_KEY_PATH"))))
|
(gptel-api-key (lambda () (require 'f) (f-read-text (getenv "OPENAI_API_KEY_PATH"))))
|
||||||
(gptel-model 'gpt-4o)
|
(gptel-model 'gpt-4o)
|
||||||
|
(gptel-default-mode 'org-mode)
|
||||||
|
(gptel-org-branching-context 't)
|
||||||
:config
|
:config
|
||||||
(require 'gptel-curl)
|
(require 'gptel-curl)
|
||||||
|
|
||||||
|
@ -919,6 +921,9 @@ This is meant to be an helper to be called from the window manager."
|
||||||
) ;; destroy frame on exit
|
) ;; destroy frame on exit
|
||||||
)
|
)
|
||||||
|
|
||||||
|
(use-package mixed-pitch
|
||||||
|
:hook (text-mode . mixed-pitch-mode))
|
||||||
|
|
||||||
(use-package pass
|
(use-package pass
|
||||||
:config
|
:config
|
||||||
(require 'password-store-otp) ;; FIXME use `use-pacakge' idiomatic way
|
(require 'password-store-otp) ;; FIXME use `use-pacakge' idiomatic way
|
||||||
|
@ -967,5 +972,26 @@ This is meant to be an helper to be called from the window manager."
|
||||||
(:name "GitHub" :query "tag:github" :key "g")
|
(:name "GitHub" :query "tag:github" :key "g")
|
||||||
(:name "Trash" :query "tag:trash" :key "t"))))
|
(:name "Trash" :query "tag:trash" :key "t"))))
|
||||||
|
|
||||||
|
;;; Experiments, remove from here
|
||||||
|
|
||||||
|
(defun ccr/test ()
|
||||||
|
"test"
|
||||||
|
(interactive)
|
||||||
|
(with-selected-frame
|
||||||
|
(make-frame '((name . "emacs-run-launcher")
|
||||||
|
(minibuffer . only)
|
||||||
|
(fullscreen . 0) ; no fullscreen
|
||||||
|
(undecorated . t) ; remove title bar
|
||||||
|
;;(auto-raise . t) ; focus on this frame
|
||||||
|
;;(tool-bar-lines . 0)
|
||||||
|
;;(menu-bar-lines . 0)
|
||||||
|
(internal-border-width . 10)
|
||||||
|
(width . 80)
|
||||||
|
(height . 11)))
|
||||||
|
(unwind-protect
|
||||||
|
(completing-read "ciao " '("foo" "bar") nil t "")
|
||||||
|
(delete-frame))))
|
||||||
|
|
||||||
|
|
||||||
(provide 'init)
|
(provide 'init)
|
||||||
;;; init.el ends here
|
;;; init.el ends here
|
||||||
|
|
7
hmModules/sdrangel/default.nix
Normal file
7
hmModules/sdrangel/default.nix
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
home.packages = [
|
||||||
|
pkgs.sdrangel
|
||||||
|
pkgs.kdePackages.qtlocation
|
||||||
|
];
|
||||||
|
}
|
|
@ -4,6 +4,7 @@
|
||||||
age,
|
age,
|
||||||
hostname,
|
hostname,
|
||||||
config,
|
config,
|
||||||
|
username,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
@ -59,7 +60,7 @@
|
||||||
settings = {
|
settings = {
|
||||||
daemon = {
|
daemon = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
socket_path = "/home/ccr/.local/share/atuin/atuin.sock"; # FIXME using ~ or $HOME doesn't work: https://github.com/atuinsh/atuin/issues/2289
|
socket_path = "/home/${username}/.local/share/atuin/atuin.sock"; # FIXME using ~ or $HOME doesn't work: https://github.com/atuinsh/atuin/issues/2289
|
||||||
};
|
};
|
||||||
auto_sync = true;
|
auto_sync = true;
|
||||||
sync_frequency = "5m";
|
sync_frequency = "5m";
|
||||||
|
|
|
@ -119,6 +119,20 @@
|
||||||
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
tpol = {
|
||||||
|
extraModules = with inputs; [
|
||||||
|
lix-module.nixosModules.default
|
||||||
|
];
|
||||||
|
secrets = {
|
||||||
|
"tpol-wireguard-private-key" = { };
|
||||||
|
};
|
||||||
|
vpn = {
|
||||||
|
ip = "10.100.0.7";
|
||||||
|
publicKey = "b/Pi7koTFo5CMAAzcL2ulvQ/0dUjKzbmXpvh4Lb/Bgo=";
|
||||||
|
};
|
||||||
|
extraHmModulesUser = "mara";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
vpnExtra = {
|
vpnExtra = {
|
||||||
|
|
|
@ -40,7 +40,7 @@
|
||||||
|
|
||||||
ccr = {
|
ccr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
autologin = true;
|
autologin = false;
|
||||||
modules = [
|
modules = [
|
||||||
"git"
|
"git"
|
||||||
"git-workspace"
|
"git-workspace"
|
||||||
|
@ -72,6 +72,8 @@
|
||||||
"catppuccin"
|
"catppuccin"
|
||||||
"libreoffice"
|
"libreoffice"
|
||||||
"emacs"
|
"emacs"
|
||||||
|
"chirp"
|
||||||
|
"sdrangel"
|
||||||
];
|
];
|
||||||
extraGroups = [ ];
|
extraGroups = [ ];
|
||||||
backupPaths = [ ];
|
backupPaths = [ ];
|
||||||
|
@ -99,6 +101,7 @@
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
powerManagement.cpuFreqGovernor = lib.mkDefault "schedutil";
|
powerManagement.cpuFreqGovernor = lib.mkDefault "schedutil";
|
||||||
hardware.enableRedistributableFirmware = lib.mkDefault true;
|
hardware.enableRedistributableFirmware = lib.mkDefault true;
|
||||||
|
hardware.rtl-sdr.enable = true;
|
||||||
|
|
||||||
hardware.graphics = {
|
hardware.graphics = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -91,8 +91,9 @@
|
||||||
"emacs"
|
"emacs"
|
||||||
"vial"
|
"vial"
|
||||||
"chirp"
|
"chirp"
|
||||||
|
"sdrangel"
|
||||||
];
|
];
|
||||||
extraGroups = [ ];
|
extraGroups = [ "plugdev" ];
|
||||||
backupPaths = [ ];
|
backupPaths = [ ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -66,8 +66,11 @@ in
|
||||||
size = "100%";
|
size = "100%";
|
||||||
content = {
|
content = {
|
||||||
type = "filesystem";
|
type = "filesystem";
|
||||||
format = "bcachefs";
|
format = "xfs";
|
||||||
mountpoint = "/mnt/hd";
|
mountpoint = "/mnt/hd";
|
||||||
|
mountOptions = [
|
||||||
|
"nofail"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
48
hosts/spock/default.nix
Normal file
48
hosts/spock/default.nix
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
{
|
||||||
|
lib,
|
||||||
|
modulesPath,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
"${modulesPath}/installer/sd-card/sd-image-aarch64.nix"
|
||||||
|
];
|
||||||
|
|
||||||
|
sdImage.compressImage = false;
|
||||||
|
|
||||||
|
nixpkgs = {
|
||||||
|
# hostPlatform = lib.mkDefault "armv6-linux";
|
||||||
|
# config = {
|
||||||
|
# allowUnfree = true;
|
||||||
|
# };
|
||||||
|
# overlays = [
|
||||||
|
# # Workaround: https://github.com/NixOS/nixpkgs/issues/154163
|
||||||
|
# # modprobe: FATAL: Module sun4i-drm not found in directory
|
||||||
|
# (final: super: {
|
||||||
|
# makeModulesClosure = x:
|
||||||
|
# super.makeModulesClosure (x // {allowMissing = true;});
|
||||||
|
# })
|
||||||
|
# ];
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems = {
|
||||||
|
"/" = {
|
||||||
|
device = "/dev/disk/by-label/NIXOS_SD";
|
||||||
|
fsType = "ext4";
|
||||||
|
options = [ "noatime" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
networkmanager.enable = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Set your time zone.
|
||||||
|
time.timeZone = "Europe/Rome";
|
||||||
|
|
||||||
|
# Allow the user to log in as root without a password.
|
||||||
|
users.users.root.initialHashedPassword = "";
|
||||||
|
|
||||||
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
system.stateVersion = "24.11";
|
||||||
|
}
|
94
hosts/tpol/default.nix
Normal file
94
hosts/tpol/default.nix
Normal file
|
@ -0,0 +1,94 @@
|
||||||
|
{
|
||||||
|
modulesPath,
|
||||||
|
fleetModules,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
vpn,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
imports =
|
||||||
|
[ (modulesPath + "/installer/scan/not-detected.nix") ]
|
||||||
|
++ fleetModules [
|
||||||
|
"common"
|
||||||
|
"ssh"
|
||||||
|
"nix"
|
||||||
|
"networkmanager"
|
||||||
|
"dbus"
|
||||||
|
"udisks2"
|
||||||
|
"xdg"
|
||||||
|
"printing"
|
||||||
|
"mara"
|
||||||
|
"xfce"
|
||||||
|
"battery"
|
||||||
|
"printing"
|
||||||
|
"wireguard-client"
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = [
|
||||||
|
"xhci_pci"
|
||||||
|
"ehci_pci"
|
||||||
|
"ahci"
|
||||||
|
"usb_storage"
|
||||||
|
"sd_mod"
|
||||||
|
"sr_mod"
|
||||||
|
"rtsx_pci_sdmmc"
|
||||||
|
];
|
||||||
|
boot.initrd.kernelModules = [ ];
|
||||||
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
boot.loader.grub.device = "/dev/sda";
|
||||||
|
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/disk/by-uuid/1522f8d9-5251-408d-9b6e-ed6da7da916a";
|
||||||
|
fsType = "btrfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices = [
|
||||||
|
{ device = "/dev/disk/by-uuid/e111fbc7-8e5d-4fcb-95c9-249f53ab0adc"; }
|
||||||
|
];
|
||||||
|
|
||||||
|
mara = {
|
||||||
|
enable = true;
|
||||||
|
modules = [
|
||||||
|
"shell"
|
||||||
|
"mpv"
|
||||||
|
"firefox"
|
||||||
|
"git"
|
||||||
|
"chrome"
|
||||||
|
"udiskie"
|
||||||
|
"helix"
|
||||||
|
"remmina"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# nevertheless this is a laptop the battery is completely gone, so it works only attached to electrictiy
|
||||||
|
powerManagement.cpuFreqGovernor = lib.mkDefault "performance";
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ 1234 ];
|
||||||
|
|
||||||
|
hardware.rtl-sdr.enable = true;
|
||||||
|
|
||||||
|
systemd.services.rtl-tcp = {
|
||||||
|
description = "rtl_sdr over TCP";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = ''
|
||||||
|
${lib.getExe' pkgs.rtl-sdr "rtl_tcp"} -a ${vpn.${config.networking.hostName}}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.sdrangelsrv = {
|
||||||
|
description = "sdrangelsrv";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = ''
|
||||||
|
${lib.getExe' pkgs.sdrangel "sdrangelsrv"} --remote-tcp-hwtype RTLSDR --remote-tcp-port 1234 --remote-tcp-address ${
|
||||||
|
vpn.${config.networking.hostName}
|
||||||
|
} --remote-tcp
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -12,6 +12,7 @@
|
||||||
pbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFF05LScu9m5BXMlFAT1g+g/AkAi7kvq1dY6W3Rzqq3f";
|
pbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFF05LScu9m5BXMlFAT1g+g/AkAi7kvq1dY6W3Rzqq3f";
|
||||||
picard = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ1+1z1IsLVJ6aGarMgzw3NbmFKcpYVgdUjl7xDsewxT";
|
picard = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ1+1z1IsLVJ6aGarMgzw3NbmFKcpYVgdUjl7xDsewxT";
|
||||||
deltaflyer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPETMwELvGTnhKJbpK0oFs4lK8vm/kV9KdgL9wufYDDQ";
|
deltaflyer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPETMwELvGTnhKJbpK0oFs4lK8vm/kV9KdgL9wufYDDQ";
|
||||||
|
tpol = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIQxHSow2l0TDWTonBPPaGvTgVvMS/xsQOf1nHnvLSwV";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,9 +3,10 @@
|
||||||
"i686-linux"
|
"i686-linux"
|
||||||
"aarch64-linux"
|
"aarch64-linux"
|
||||||
"riscv64-linux"
|
"riscv64-linux"
|
||||||
|
"armv6l-linux"
|
||||||
];
|
];
|
||||||
nix.extraOptions = ''
|
nix.extraOptions = ''
|
||||||
extra-platforms = aarch64-linux arm-linux i686-linux riscv64-linux
|
extra-platforms = aarch64-linux arm-linux i686-linux riscv64-linux armv6l-linux
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# XXX For some reason `docker buildx` isn't aware of this:
|
# XXX For some reason `docker buildx` isn't aware of this:
|
||||||
|
|
|
@ -86,6 +86,7 @@ in
|
||||||
"dialout"
|
"dialout"
|
||||||
"systemd-journal"
|
"systemd-journal"
|
||||||
"camera"
|
"camera"
|
||||||
|
"networkmanager"
|
||||||
];
|
];
|
||||||
ccr.modules = [
|
ccr.modules = [
|
||||||
"shell"
|
"shell"
|
||||||
|
|
|
@ -1,19 +1,21 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
fonts = {
|
fonts = {
|
||||||
packages = with pkgs; [
|
packages =
|
||||||
powerline-fonts
|
with pkgs;
|
||||||
dejavu_fonts
|
[
|
||||||
fira-code
|
powerline-fonts
|
||||||
fira-code-symbols
|
dejavu_fonts
|
||||||
iosevka
|
fira-code
|
||||||
iosevka-comfy.comfy
|
fira-code-symbols
|
||||||
emacs-all-the-icons-fonts
|
iosevka
|
||||||
nerdfonts
|
iosevka-comfy.comfy
|
||||||
joypixels
|
emacs-all-the-icons-fonts
|
||||||
etBook
|
joypixels
|
||||||
vegur
|
etBook
|
||||||
];
|
vegur
|
||||||
|
]
|
||||||
|
++ (builtins.filter lib.attrsets.isDerivation (builtins.attrValues nerd-fonts));
|
||||||
fontconfig.defaultFonts = {
|
fontconfig.defaultFonts = {
|
||||||
monospace = [ "DejaVu Sans Mono for Powerline" ];
|
monospace = [ "DejaVu Sans Mono for Powerline" ];
|
||||||
sansSerif = [ "DejaVu Sans" ];
|
sansSerif = [ "DejaVu Sans" ];
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
fleetHmModules,
|
fleetHmModules,
|
||||||
fleetFlake,
|
fleetFlake,
|
||||||
|
vpn,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
@ -46,20 +47,33 @@
|
||||||
default = [
|
default = [
|
||||||
"wheel"
|
"wheel"
|
||||||
"fuse"
|
"fuse"
|
||||||
"networkmanager"
|
"video"
|
||||||
"dialout"
|
"dialout"
|
||||||
|
"systemd-journal"
|
||||||
|
"camera"
|
||||||
|
"networkmanager"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf config.mara.enable {
|
config = lib.mkIf config.mara.enable {
|
||||||
|
|
||||||
|
programs.fish.enable = true;
|
||||||
|
|
||||||
|
mara.modules = [
|
||||||
|
"shell"
|
||||||
|
"git"
|
||||||
|
"nix-index"
|
||||||
|
"btop"
|
||||||
|
];
|
||||||
|
|
||||||
users.users.mara = {
|
users.users.mara = {
|
||||||
uid = 1001;
|
uid = 1001;
|
||||||
inherit (config.mara) hashedPassword;
|
inherit (config.mara) hashedPassword;
|
||||||
description = "Mara Savastano";
|
description = "Mara Savastano";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
inherit (config.mara) extraGroups;
|
inherit (config.mara) extraGroups;
|
||||||
shell = pkgs.nushell;
|
shell = pkgs.fish;
|
||||||
openssh.authorizedKeys.keys = config.mara.authorizedKeys;
|
openssh.authorizedKeys.keys = config.mara.authorizedKeys;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -68,7 +82,16 @@
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.users.mara = {
|
home-manager.users.mara = {
|
||||||
imports = fleetHmModules config.mara.modules;
|
imports = fleetHmModules config.mara.modules ++ [
|
||||||
|
{
|
||||||
|
_module.args = {
|
||||||
|
inherit (config.age) secrets;
|
||||||
|
inherit vpn;
|
||||||
|
username = "mara";
|
||||||
|
hostname = config.networking.hostName;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
];
|
||||||
home.packages = config.mara.packages;
|
home.packages = config.mara.packages;
|
||||||
home.stateVersion = config.system.stateVersion;
|
home.stateVersion = config.system.stateVersion;
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
{ lib, ... }:
|
{ lib, ... }:
|
||||||
{
|
{
|
||||||
networking.networkmanager.enable = true;
|
networking.networkmanager.enable = true;
|
||||||
ccr.extraGroups = [ "networkmanager" ];
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
networking.useDHCP = lib.mkDefault true;
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,10 +5,11 @@
|
||||||
xterm.enable = false;
|
xterm.enable = false;
|
||||||
xfce.enable = true;
|
xfce.enable = true;
|
||||||
};
|
};
|
||||||
displayManager = {
|
};
|
||||||
defaultSession = "xfce";
|
|
||||||
autoLogin.user = "mara";
|
services.displayManager = {
|
||||||
};
|
defaultSession = "xfce";
|
||||||
|
autoLogin.user = "mara";
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.mara.home.file."background-image" = {
|
home-manager.users.mara.home.file."background-image" = {
|
||||||
|
|
|
@ -118,6 +118,7 @@ let
|
||||||
solidity-mode
|
solidity-mode
|
||||||
telega
|
telega
|
||||||
aggressive-indent
|
aggressive-indent
|
||||||
|
mixed-pitch
|
||||||
# org-re-reveal # FIXME very not nice hash mismatch when building
|
# org-re-reveal # FIXME very not nice hash mismatch when building
|
||||||
]
|
]
|
||||||
)
|
)
|
||||||
|
|
|
@ -182,4 +182,8 @@ with keys.users;
|
||||||
|
|
||||||
deltaflyer
|
deltaflyer
|
||||||
];
|
];
|
||||||
|
"tpol-wireguard-private-key.age".publicKeys = [
|
||||||
|
ccr-ssh
|
||||||
|
tpol
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|
17
secrets/tpol-wireguard-private-key.age
Normal file
17
secrets/tpol-wireguard-private-key.age
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-rsa /AagBw
|
||||||
|
qUiTcrs0L+daa9FAsa80rdJsZCKCJN76KREz7mU7FF3ZBGp4VvisP4hJSjNKheWW
|
||||||
|
pfVaefXfuIsw2GvGqUjNZMGHj650gGEqMtO6nLuetMuCIWF7uTdPpnNQMK6BB2ni
|
||||||
|
Wlfu2g4rul6aV+S6KNiVBqlKJn521TOkEutsXFjaAJpnRVOG50P/8k9fPzjXNZnj
|
||||||
|
NqmMhGjOE8tDs9TM1nWM4yYDX3KMDULvcBHycV3yQRzswEJc4jq9oLS8SbyE+4Hy
|
||||||
|
dH6hkWLiRMz06Xg4F0XifGY4lglcMiQqNdNe5xMZtuR33Z1GUiY9HGU5FvXmUbQx
|
||||||
|
HTWTklzH8q0vdEmb2tFftCM8AMeodI3CLBt+DNlQ3V0+izUmOJwTGz5OGfT6SiWY
|
||||||
|
epMF5kXmZipWu5KsEoY1hv1INvGR84LyicpOT2vPV7cakx9ahlCgV5vhdmcAZy5F
|
||||||
|
CRAhnvIsZZMHwGV9lmAMI93wgPyU0ybtwjSpPbHAqv0DQj+CBrEY5ict3+HhSe5J
|
||||||
|
QrfcLRsQRox3QuR/jQvixBX63qNaezYFmpBuWP7XI7PuPj7KdUgECNfMctcVmCSb
|
||||||
|
xHKmYkf8I8Si1doFOZbYOXheiI/zNk0xLAONPI+LQ6ZemUODhpcpRSSkhcDKQdtC
|
||||||
|
srxvyTvYOk4IFjmjuk2JyE1Vp6wg+aiySZlyfFA7WQY
|
||||||
|
-> ssh-ed25519 X7Q5KQ UoryJKCMOKeAkI1dbz8On5q0wSd+XIUCdWI31gyS6D4
|
||||||
|
exrVhh9tGzQyToDKcv5sspbeKhdTp1q0wKuHWo+onKQ
|
||||||
|
--- QkkySHHmaJFZu2BNT0ZZ9NZipUbFqyzxL32YZx5DRbQ
|
||||||
|
wc¿^«Ò[v$jªš”ž7Lmt´{<7B>øù`¾ü0©—]ÿ¸lè<6C>¾…–3¢ñ<C2A2>…ã
šð{C²\µ±ßXƒZ§Œ°¸)Z$¿4d›„/.L
|
Loading…
Add table
Reference in a new issue