This commit is contained in:
parent
c6cb14a14b
commit
635f5902aa
28 changed files with 515 additions and 443 deletions
33
flake.nix
33
flake.nix
|
@ -36,11 +36,13 @@
|
||||||
];
|
];
|
||||||
specialArgs = {inherit inputs system;};
|
specialArgs = {inherit inputs system;};
|
||||||
};
|
};
|
||||||
mkRaspi = pkgs: hostname:
|
mkRaspi = pkgs: hostname: let
|
||||||
pkgs.lib.nixosSystem {
|
|
||||||
system = "aarch64-linux";
|
system = "aarch64-linux";
|
||||||
|
in
|
||||||
|
pkgs.lib.nixosSystem {
|
||||||
|
inherit system;
|
||||||
modules = [(./. + "/nixos/boxes/${hostname}") sops.nixosModules.sops];
|
modules = [(./. + "/nixos/boxes/${hostname}") sops.nixosModules.sops];
|
||||||
specialArgs = {inherit inputs;};
|
specialArgs = {inherit inputs system;};
|
||||||
};
|
};
|
||||||
mkKiosk = pkgs: system: hostname:
|
mkKiosk = pkgs: system: hostname:
|
||||||
pkgs.lib.nixosSystem {
|
pkgs.lib.nixosSystem {
|
||||||
|
@ -52,13 +54,15 @@
|
||||||
|
|
||||||
home-manager.nixosModules.home-manager
|
home-manager.nixosModules.home-manager
|
||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager = {
|
||||||
home-manager.useUserPackages = true;
|
useGlobalPkgs = true;
|
||||||
home-manager.users.cyryl = {
|
useUserPackages = true;
|
||||||
|
users.cyryl = {
|
||||||
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
|
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
|
||||||
_module.args.inputs = inputs;
|
_module.args.inputs = inputs;
|
||||||
_module.args.system = system;
|
_module.args.system = system;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
|
@ -86,13 +90,15 @@
|
||||||
{programs.nix-ld.dev.enable = true;}
|
{programs.nix-ld.dev.enable = true;}
|
||||||
home-manager.nixosModules.home-manager
|
home-manager.nixosModules.home-manager
|
||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager = {
|
||||||
home-manager.useUserPackages = true;
|
useGlobalPkgs = true;
|
||||||
home-manager.users.cyryl = {
|
useUserPackages = true;
|
||||||
|
users.cyryl = {
|
||||||
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
|
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
|
||||||
_module.args.inputs = inputs;
|
_module.args.inputs = inputs;
|
||||||
_module.args.system = system;
|
_module.args.system = system;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
|
@ -138,13 +144,15 @@
|
||||||
(./. + "/nixos/boxes/form3")
|
(./. + "/nixos/boxes/form3")
|
||||||
home-manager.darwinModules.home-manager
|
home-manager.darwinModules.home-manager
|
||||||
{
|
{
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager = {
|
||||||
home-manager.useUserPackages = true;
|
useGlobalPkgs = true;
|
||||||
home-manager.users.cyryl = {
|
useUserPackages = true;
|
||||||
|
users.cyryl = {
|
||||||
imports = [./nixos/home-manager];
|
imports = [./nixos/home-manager];
|
||||||
_module.args.inputs = inputs;
|
_module.args.inputs = inputs;
|
||||||
_module.args.system = system;
|
_module.args.system = system;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
@ -154,7 +162,6 @@
|
||||||
foryog = mkWorkstation nixpkgs-nixos-unstable "x86_64-linux" "foryog";
|
foryog = mkWorkstation nixpkgs-nixos-unstable "x86_64-linux" "foryog";
|
||||||
thinky = mkWorkstation nixpkgs-stable "x86_64-linux" "thinky";
|
thinky = mkWorkstation nixpkgs-stable "x86_64-linux" "thinky";
|
||||||
bolty = mkServer nixpkgs-stable "x86_64-linux" "bolty";
|
bolty = mkServer nixpkgs-stable "x86_64-linux" "bolty";
|
||||||
vpsfree1 = mkServer nixpkgs-stable "x86_64-linux" "vpsfree1";
|
|
||||||
cupsnet = mkServer nixpkgs-stable "aarch64-linux" "cupsnet";
|
cupsnet = mkServer nixpkgs-stable "aarch64-linux" "cupsnet";
|
||||||
mb1 = mkServer nixpkgs-stable "x86_64-linux" "mb1";
|
mb1 = mkServer nixpkgs-stable "x86_64-linux" "mb1";
|
||||||
homescreen = mkRaspi nixpkgs-stable "homescreen";
|
homescreen = mkRaspi nixpkgs-stable "homescreen";
|
||||||
|
|
|
@ -15,10 +15,13 @@
|
||||||
zfs.forceImportRoot = false;
|
zfs.forceImportRoot = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.btrfs.autoScrub.enable = true;
|
services = {
|
||||||
services.zfs.autoScrub.enable = true;
|
btrfs.autoScrub.enable = true;
|
||||||
services.zfs.trim.enable = true;
|
zfs = {
|
||||||
|
autoScrub.enable = true;
|
||||||
|
trim.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
boot.kernelParams = ["zfs.zfs_arc_max=17179869184"];
|
boot.kernelParams = ["zfs.zfs_arc_max=17179869184"];
|
||||||
|
|
||||||
boot.zfs.extraPools = ["data"];
|
boot.zfs.extraPools = ["data"];
|
||||||
|
|
|
@ -7,13 +7,11 @@
|
||||||
../cli.nix
|
../cli.nix
|
||||||
../send-logs.nix
|
../send-logs.nix
|
||||||
./bolty-boot.nix
|
./bolty-boot.nix
|
||||||
./gitea-runner.nix
|
|
||||||
./grafana.nix
|
./grafana.nix
|
||||||
./home-assistant.nix
|
./home-assistant.nix
|
||||||
./home-security.nix
|
./home-security.nix
|
||||||
./influxdb.nix
|
./influxdb.nix
|
||||||
./logs.nix
|
./logs.nix
|
||||||
./mastodon.nix
|
|
||||||
./nas.nix
|
./nas.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./nix-store-server.nix
|
./nix-store-server.nix
|
||||||
|
|
|
@ -14,7 +14,9 @@ in {
|
||||||
imports = [../nginx.nix ./virtualisation.nix];
|
imports = [../nginx.nix ./virtualisation.nix];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [port 1883 8089];
|
networking.firewall.allowedTCPPorts = [port 1883 8089];
|
||||||
services.mosquitto = {
|
|
||||||
|
services = {
|
||||||
|
mosquitto = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = inputs.nixpkgs-nixos-unstable.legacyPackages."${system}".mosquitto;
|
package = inputs.nixpkgs-nixos-unstable.legacyPackages."${system}".mosquitto;
|
||||||
dataDir = "/data/mosquitto";
|
dataDir = "/data/mosquitto";
|
||||||
|
@ -30,7 +32,7 @@ in {
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
services.zigbee2mqtt = {
|
zigbee2mqtt = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = inputs.nixpkgs-master.legacyPackages."${system}".zigbee2mqtt;
|
package = inputs.nixpkgs-master.legacyPackages."${system}".zigbee2mqtt;
|
||||||
settings = {
|
settings = {
|
||||||
|
@ -46,7 +48,7 @@ in {
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
services.nginx = {
|
nginx = {
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"bolty.raptor-carp.ts.net" = {
|
"bolty.raptor-carp.ts.net" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
|
@ -60,6 +62,7 @@ in {
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
systemd.services.nginx-tailscale-certs = {
|
systemd.services.nginx-tailscale-certs = {
|
||||||
script = ''
|
script = ''
|
||||||
|
|
|
@ -6,23 +6,25 @@
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
networking.hostName = "bolty";
|
networking.hostName = "bolty";
|
||||||
systemd.network.enable = true;
|
|
||||||
networking.networkmanager.enable = false;
|
networking.networkmanager.enable = false;
|
||||||
systemd.network.netdevs."br0".netdevConfig = {
|
|
||||||
|
systemd.network = {
|
||||||
|
enable = true;
|
||||||
|
netdevs."br0".netdevConfig = {
|
||||||
Name = "br0";
|
Name = "br0";
|
||||||
Kind = "bridge";
|
Kind = "bridge";
|
||||||
};
|
};
|
||||||
systemd.network.networks."br0" = {
|
networks."br0" = {
|
||||||
name = "br0";
|
name = "br0";
|
||||||
address = ["10.0.0.8/24"];
|
address = ["10.0.0.8/24"];
|
||||||
gateway = ["10.0.0.1"];
|
gateway = ["10.0.0.1"];
|
||||||
DHCP = "no";
|
DHCP = "no";
|
||||||
dns = ["100.100.100.100" "9.9.9.9"];
|
dns = ["100.100.100.100" "9.9.9.9"];
|
||||||
};
|
};
|
||||||
|
networks."eth" = {
|
||||||
systemd.network.networks."eth" = {
|
|
||||||
name = "enp4s0";
|
name = "enp4s0";
|
||||||
networkConfig.Bridge = "br0";
|
networkConfig.Bridge = "br0";
|
||||||
DHCP = "no";
|
DHCP = "no";
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,10 +4,13 @@
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
networking.firewall.enable = true;
|
networking.firewall = {
|
||||||
networking.firewall.allowedTCPPorts = [631 6566];
|
enable = true;
|
||||||
networking.firewall.allowedUDPPorts = [631 6566];
|
allowedTCPPorts = [631 6566];
|
||||||
services.printing = {
|
allowedUDPPorts = [631 6566];
|
||||||
|
};
|
||||||
|
services = {
|
||||||
|
printing = {
|
||||||
enable = true;
|
enable = true;
|
||||||
drivers = with pkgs; [epson-escpr];
|
drivers = with pkgs; [epson-escpr];
|
||||||
listenAddresses = ["*:631"];
|
listenAddresses = ["*:631"];
|
||||||
|
@ -19,6 +22,19 @@
|
||||||
DefaultEncryption Never
|
DefaultEncryption Never
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
udev.packages = [];
|
||||||
|
|
||||||
|
saned = {
|
||||||
|
enable = true;
|
||||||
|
extraConfig = ''
|
||||||
|
100.69.222.80
|
||||||
|
10.0.24.0/24
|
||||||
|
10.0.0.1/24
|
||||||
|
foureighty
|
||||||
|
hagath
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
hardware.printers.ensurePrinters = [
|
hardware.printers.ensurePrinters = [
|
||||||
{
|
{
|
||||||
|
@ -37,17 +53,5 @@
|
||||||
snapshot = true;
|
snapshot = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.udev.packages = [];
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [gawk];
|
environment.systemPackages = with pkgs; [gawk];
|
||||||
services.saned = {
|
|
||||||
enable = true;
|
|
||||||
extraConfig = ''
|
|
||||||
100.69.222.80
|
|
||||||
10.0.24.0/24
|
|
||||||
10.0.0.1/24
|
|
||||||
foureighty
|
|
||||||
hagath
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,11 +4,13 @@
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
hardware.enableRedistributableFirmware = true;
|
|
||||||
services.smartd.enable = true;
|
|
||||||
services.fstrim.enable = true;
|
|
||||||
environment.systemPackages = with pkgs; [smartmontools];
|
environment.systemPackages = with pkgs; [smartmontools];
|
||||||
services.fwupd.enable = true;
|
hardware.enableRedistributableFirmware = true;
|
||||||
services.thermald.enable = true;
|
services = {
|
||||||
services.haveged.enable = true;
|
smartd.enable = true;
|
||||||
|
fstrim.enable = true;
|
||||||
|
fwupd.enable = true;
|
||||||
|
thermald.enable = true;
|
||||||
|
haveged.enable = true;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,7 +12,8 @@
|
||||||
in {
|
in {
|
||||||
imports = [];
|
imports = [];
|
||||||
|
|
||||||
systemd.services.tailscale-cert-make-path = {
|
systemd.services = {
|
||||||
|
tailscale-cert-make-path = {
|
||||||
script = ''
|
script = ''
|
||||||
mkdir -p ${basePath}
|
mkdir -p ${basePath}
|
||||||
'';
|
'';
|
||||||
|
@ -21,7 +22,7 @@ in {
|
||||||
wantedBy = ["multi-user.target"];
|
wantedBy = ["multi-user.target"];
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.tailscale-cert = {
|
tailscale-cert = {
|
||||||
after = ["network.target" "network-online.target" "tailscaled.service"];
|
after = ["network.target" "network-online.target" "tailscaled.service"];
|
||||||
wants = ["tailscaled.service"];
|
wants = ["tailscaled.service"];
|
||||||
wantedBy = ["multi-user.target"];
|
wantedBy = ["multi-user.target"];
|
||||||
|
@ -48,7 +49,7 @@ in {
|
||||||
tailscale cert --cert-file ${certPath} --key-file ${keyPath} ${fqdn}
|
tailscale cert --cert-file ${certPath} --key-file ${keyPath} ${fqdn}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
};
|
||||||
systemd.timers.tailscale-renew = {
|
systemd.timers.tailscale-renew = {
|
||||||
wantedBy = ["timers.target"];
|
wantedBy = ["timers.target"];
|
||||||
description = "Renew tailscale server cert";
|
description = "Renew tailscale server cert";
|
||||||
|
|
|
@ -5,12 +5,14 @@
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
boot = {
|
||||||
boot.initrd.availableKernelModules = ["xhci_pci" "virtio_pci" "virtio_scsi" "ahci" "usbhid" "sr_mod"];
|
kernelPackages = pkgs.linuxPackages_latest;
|
||||||
|
initrd.availableKernelModules = ["xhci_pci" "virtio_pci" "virtio_scsi" "ahci" "usbhid" "sr_mod"];
|
||||||
|
|
||||||
boot.loader.grub = {
|
loader.grub = {
|
||||||
devices = ["/dev/vda"];
|
devices = ["/dev/vda"];
|
||||||
efiSupport = true;
|
efiSupport = true;
|
||||||
efiInstallAsRemovable = true;
|
efiInstallAsRemovable = true;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -51,16 +51,18 @@ in {
|
||||||
home-manager.users.cyryl = {...}: {
|
home-manager.users.cyryl = {...}: {
|
||||||
imports = [];
|
imports = [];
|
||||||
home.packages = with pkgs; [awscli kubectl cargo-update];
|
home.packages = with pkgs; [awscli kubectl cargo-update];
|
||||||
programs.git.userEmail = lib.mkForce "cyryl.plotnicki@form3.tech";
|
programs = {
|
||||||
programs.git.extraConfig = {
|
git.userEmail = lib.mkForce "cyryl.plotnicki@form3.tech";
|
||||||
|
git.extraConfig = {
|
||||||
user.signingkey = "6441B1BC81F8FB1561C9AFF5534222210FE423ED";
|
user.signingkey = "6441B1BC81F8FB1561C9AFF5534222210FE423ED";
|
||||||
commit.gpgsign = true;
|
commit.gpgsign = true;
|
||||||
"url \"git@github.com:\"".insteadOf = "https://github.com/";
|
"url \"git@github.com:\"".insteadOf = "https://github.com/";
|
||||||
};
|
};
|
||||||
programs.gpg.enable = true;
|
gpg.enable = true;
|
||||||
programs.gpg.homedir = "/Users/cyryl/.gnupg";
|
gpg.homedir = "/Users/cyryl/.gnupg";
|
||||||
programs.zsh.loginExtra = ''
|
zsh.loginExtra = ''
|
||||||
eval "$(/opt/homebrew/bin/brew shellenv)"
|
eval "$(/opt/homebrew/bin/brew shellenv)"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,13 +26,16 @@
|
||||||
services.restic.backups.home-to-b2 = {
|
services.restic.backups.home-to-b2 = {
|
||||||
repository = lib.mkForce "b2:cyplo-restic-foureighty:/";
|
repository = lib.mkForce "b2:cyplo-restic-foureighty:/";
|
||||||
};
|
};
|
||||||
boot.kernelParams = ["initcall_debug" ''dyndbg="file suspend.c +p"'' "no_console_suspend"];
|
|
||||||
boot.tmp.cleanOnBoot = true;
|
boot = {
|
||||||
boot.binfmt.emulatedSystems = ["aarch64-linux"];
|
kernelParams = ["initcall_debug" ''dyndbg="file suspend.c +p"'' "no_console_suspend"];
|
||||||
boot.plymouth = {
|
tmp.cleanOnBoot = true;
|
||||||
|
binfmt.emulatedSystems = ["aarch64-linux"];
|
||||||
|
plymouth = {
|
||||||
enable = true;
|
enable = true;
|
||||||
logo = ./boot.png;
|
logo = ./boot.png;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
zramSwap = {
|
zramSwap = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -42,13 +45,15 @@
|
||||||
|
|
||||||
time.timeZone = "Europe/London";
|
time.timeZone = "Europe/London";
|
||||||
|
|
||||||
hardware.trackpoint.enable = true;
|
hardware = {
|
||||||
hardware.keyboard.qmk.enable = true;
|
trackpoint.enable = true;
|
||||||
|
keyboard.qmk.enable = true;
|
||||||
|
opengl.extraPackages = with pkgs; [libva];
|
||||||
|
};
|
||||||
|
|
||||||
services.udev.packages = [pkgs.qmk-udev-rules];
|
services.udev.packages = [pkgs.qmk-udev-rules];
|
||||||
programs.ccache.enable = true;
|
programs.ccache.enable = true;
|
||||||
hardware.opengl.extraPackages = with pkgs; [libva];
|
|
||||||
programs.steam.enable = true;
|
programs.steam.enable = true;
|
||||||
nixpkgs.config.allowUnfree = true;
|
|
||||||
|
|
||||||
home-manager.users.cyryl = {...}: {
|
home-manager.users.cyryl = {...}: {
|
||||||
imports = [
|
imports = [
|
||||||
|
|
|
@ -45,9 +45,10 @@
|
||||||
device = "0000:00:02.0";
|
device = "0000:00:02.0";
|
||||||
};
|
};
|
||||||
hardware.trackpoint.enable = true;
|
hardware.trackpoint.enable = true;
|
||||||
services.hardware.bolt.enable = true;
|
services = {
|
||||||
|
hardware.bolt.enable = true;
|
||||||
|
|
||||||
services.xserver = {
|
xserver = {
|
||||||
libinput = {
|
libinput = {
|
||||||
enable = true;
|
enable = true;
|
||||||
touchpad = {
|
touchpad = {
|
||||||
|
@ -63,7 +64,9 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
services.fprintd = {enable = true;};
|
fprintd = {enable = true;};
|
||||||
|
};
|
||||||
|
|
||||||
programs.ccache.enable = true;
|
programs.ccache.enable = true;
|
||||||
hardware.opengl.extraPackages = with pkgs; [libva];
|
hardware.opengl.extraPackages = with pkgs; [libva];
|
||||||
programs.steam.enable = true;
|
programs.steam.enable = true;
|
||||||
|
|
|
@ -13,9 +13,11 @@
|
||||||
availableKernelModules = ["xhci_pci" "nvme" "usbhid" "usb_storage" "sd_mod"];
|
availableKernelModules = ["xhci_pci" "nvme" "usbhid" "usb_storage" "sd_mod"];
|
||||||
};
|
};
|
||||||
|
|
||||||
loader.systemd-boot.enable = true;
|
loader = {
|
||||||
loader.efi.canTouchEfiVariables = true;
|
systemd-boot.enable = true;
|
||||||
loader.efi.efiSysMountPoint = "/boot/efi";
|
efi.canTouchEfiVariables = true;
|
||||||
|
efi.efiSysMountPoint = "/boot/efi";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.initrd.secrets = {"/crypto_keyfile.bin" = null;};
|
boot.initrd.secrets = {"/crypto_keyfile.bin" = null;};
|
||||||
|
|
|
@ -11,23 +11,24 @@
|
||||||
hostName = "homescreen";
|
hostName = "homescreen";
|
||||||
networkmanager = {enable = true;};
|
networkmanager = {enable = true;};
|
||||||
};
|
};
|
||||||
hardware.enableRedistributableFirmware = true;
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [neovim htop btop atop];
|
environment.systemPackages = with pkgs; [neovim htop btop atop];
|
||||||
|
|
||||||
services.fail2ban.enable = true;
|
hardware = {
|
||||||
|
raspberry-pi."4".fkms-3d.enable = true;
|
||||||
|
|
||||||
services.openssh = {
|
enableRedistributableFirmware = true;
|
||||||
|
deviceTree.filter = lib.mkForce "*rpi-*.dtb";
|
||||||
|
};
|
||||||
|
services = {
|
||||||
|
fail2ban.enable = true;
|
||||||
|
|
||||||
|
openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
permitRootLogin = "prohibit-password";
|
permitRootLogin = "prohibit-password";
|
||||||
passwordAuthentication = false;
|
passwordAuthentication = false;
|
||||||
};
|
};
|
||||||
|
xserver = {
|
||||||
hardware.raspberry-pi."4".fkms-3d.enable = true;
|
|
||||||
|
|
||||||
hardware.deviceTree.filter = lib.mkForce "*rpi-*.dtb";
|
|
||||||
|
|
||||||
services.xserver = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
displayManager = {
|
displayManager = {
|
||||||
lightdm.enable = true;
|
lightdm.enable = true;
|
||||||
|
@ -37,14 +38,16 @@
|
||||||
desktopManager.gnome.enable = true;
|
desktopManager.gnome.enable = true;
|
||||||
libinput.enable = true;
|
libinput.enable = true;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
users = {
|
users = {
|
||||||
mutableUsers = false;
|
mutableUsers = false;
|
||||||
users.kiosk = {isNormalUser = true;};
|
users.kiosk = {isNormalUser = true;};
|
||||||
};
|
extraUsers.root.openssh.authorizedKeys.keys = [
|
||||||
users.extraUsers.root.openssh.authorizedKeys.keys = [
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEo4R+6J3h6Ix3xWpOMdU7Es1/YxFchHw0c+kcCOJxFb cyryl@foureighty"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEo4R+6J3h6Ix3xWpOMdU7Es1/YxFchHw0c+kcCOJxFb cyryl@foureighty"
|
||||||
];
|
];
|
||||||
|
};
|
||||||
|
|
||||||
fileSystems = {
|
fileSystems = {
|
||||||
"/" = {
|
"/" = {
|
||||||
device = "/dev/disk/by-label/NIXOS_SD";
|
device = "/dev/disk/by-label/NIXOS_SD";
|
||||||
|
@ -57,6 +60,7 @@
|
||||||
options = ["nofail" "noauto"];
|
options = ["nofail" "noauto"];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||||
|
|
||||||
security.allowUserNamespaces = true;
|
security.allowUserNamespaces = true;
|
||||||
|
|
|
@ -19,11 +19,14 @@
|
||||||
../../zsh
|
../../zsh
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
boot = {
|
||||||
boot.loader.systemd-boot.enable = true;
|
kernelPackages = pkgs.linuxPackages_latest;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
loader = {
|
||||||
|
systemd-boot.enable = true;
|
||||||
|
efi.canTouchEfiVariables = true;
|
||||||
|
};
|
||||||
time.timeZone = "Europe/London";
|
time.timeZone = "Europe/London";
|
||||||
|
};
|
||||||
services.thermald.enable = true;
|
services.thermald.enable = true;
|
||||||
home-manager.users.cyryl = {...}: {
|
home-manager.users.cyryl = {...}: {
|
||||||
imports = [../../home-manager/programs/kitty.nix];
|
imports = [../../home-manager/programs/kitty.nix];
|
||||||
|
|
|
@ -1,12 +1,18 @@
|
||||||
{ config, pkgs, nixpkgs-nixos-unstable-and-unfree, lib, ... }: {
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
nixpkgs-nixos-unstable-and-unfree,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
boot.kernelModules = ["fuse"];
|
boot.kernelModules = ["fuse"];
|
||||||
services.smartd.enable = true;
|
|
||||||
|
|
||||||
sound.enable = true;
|
sound.enable = true;
|
||||||
|
|
||||||
networking.networkmanager = {
|
networking.networkmanager = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dispatcherScripts = [{
|
dispatcherScripts = [
|
||||||
|
{
|
||||||
source = pkgs.writeText "upHook" ''
|
source = pkgs.writeText "upHook" ''
|
||||||
enable_disable_wifi ()
|
enable_disable_wifi ()
|
||||||
{
|
{
|
||||||
|
@ -27,37 +33,21 @@
|
||||||
fi
|
fi
|
||||||
'';
|
'';
|
||||||
type = "basic";
|
type = "basic";
|
||||||
}];
|
}
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
hardware.enableRedistributableFirmware = true;
|
|
||||||
hardware.cpu.intel.updateMicrocode = true;
|
|
||||||
|
|
||||||
hardware.bluetooth = {
|
|
||||||
enable = true;
|
|
||||||
package = pkgs.bluez;
|
|
||||||
settings = { General = { Enable = "Source,Sink,Media,Socket"; }; };
|
|
||||||
};
|
|
||||||
|
|
||||||
hardware.pulseaudio.enable = false;
|
|
||||||
security.rtkit.enable = true;
|
security.rtkit.enable = true;
|
||||||
services.pipewire = {
|
|
||||||
|
services = {
|
||||||
|
smartd.enable = true;
|
||||||
|
pipewire = {
|
||||||
enable = true;
|
enable = true;
|
||||||
alsa.enable = true;
|
alsa.enable = true;
|
||||||
alsa.support32Bit = true;
|
alsa.support32Bit = true;
|
||||||
pulse.enable = true;
|
pulse.enable = true;
|
||||||
extraConfig.pipewire."92-low-latency" = {
|
|
||||||
context.properties = {
|
|
||||||
default.clock.rate = 48000;
|
|
||||||
default.clock.quantum = 32;
|
|
||||||
default.clock.min-quantum = 32;
|
|
||||||
default.clock.max-quantum = 32;
|
|
||||||
};
|
};
|
||||||
};
|
printing = {
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [ ghostscript poppler ];
|
|
||||||
services.printing = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
drivers = with pkgs; [
|
drivers = with pkgs; [
|
||||||
epson-escpr
|
epson-escpr
|
||||||
|
@ -69,13 +59,28 @@
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
hardware.printers.ensurePrinters = [
|
udev.packages = [];
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [ghostscript poppler];
|
||||||
|
|
||||||
|
hardware = {
|
||||||
|
enableRedistributableFirmware = true;
|
||||||
|
cpu.intel.updateMicrocode = true;
|
||||||
|
|
||||||
|
bluetooth = {
|
||||||
|
enable = true;
|
||||||
|
package = pkgs.bluez;
|
||||||
|
settings = {General = {Enable = "Source,Sink,Media,Socket";};};
|
||||||
|
};
|
||||||
|
|
||||||
|
pulseaudio.enable = false;
|
||||||
|
printers.ensurePrinters = [
|
||||||
{
|
{
|
||||||
description = "Epson XP-540 via bolty";
|
description = "Epson XP-540 via bolty";
|
||||||
name = "epson_xp540_via_bolty";
|
name = "epson_xp540_via_bolty";
|
||||||
deviceUri = "ipp://bolty:631/printers/epson_xp540";
|
deviceUri = "ipp://bolty:631/printers/epson_xp540";
|
||||||
model =
|
model = "epson-inkjet-printer-escpr/Epson-XP-540_Series-epson-escpr-en.ppd";
|
||||||
"epson-inkjet-printer-escpr/Epson-XP-540_Series-epson-escpr-en.ppd";
|
|
||||||
ppdOptions = {
|
ppdOptions = {
|
||||||
PageSize = "A4";
|
PageSize = "A4";
|
||||||
Duplex = "DuplexNoTumble";
|
Duplex = "DuplexNoTumble";
|
||||||
|
@ -84,8 +89,7 @@
|
||||||
{
|
{
|
||||||
description = "Samsung SCX-4623 Series";
|
description = "Samsung SCX-4623 Series";
|
||||||
name = "samsung-SCX-4623";
|
name = "samsung-SCX-4623";
|
||||||
deviceUri =
|
deviceUri = "usb://Samsung/SCX-4623%20Series?serial=Z2TYBFFZC01007W&interface=1";
|
||||||
"usb://Samsung/SCX-4623%20Series?serial=Z2TYBFFZC01007W&interface=1";
|
|
||||||
model = "samsung/SCX-4623FW.ppd";
|
model = "samsung/SCX-4623FW.ppd";
|
||||||
ppdOptions = {
|
ppdOptions = {
|
||||||
PageSize = "A4";
|
PageSize = "A4";
|
||||||
|
@ -94,8 +98,7 @@
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
services.udev.packages = [ ];
|
sane = {
|
||||||
hardware.sane = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
snapshot = true;
|
snapshot = true;
|
||||||
extraBackends = with pkgs; [
|
extraBackends = with pkgs; [
|
||||||
|
@ -104,7 +107,7 @@
|
||||||
gawk
|
gawk
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
powerManagement = {
|
powerManagement = {
|
||||||
enable = lib.mkForce true;
|
enable = lib.mkForce true;
|
||||||
resumeCommands = ''
|
resumeCommands = ''
|
||||||
|
|
|
@ -20,6 +20,7 @@ in {
|
||||||
boot.supportedFilesystems = ["ntfs"];
|
boot.supportedFilesystems = ["ntfs"];
|
||||||
environment.enableDebugInfo = true;
|
environment.enableDebugInfo = true;
|
||||||
|
|
||||||
|
nixpkgs.config.allowUnfree = true;
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
ccache
|
ccache
|
||||||
curl
|
curl
|
||||||
|
|
|
@ -3,7 +3,8 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
nix.buildMachines = [
|
nix = {
|
||||||
|
buildMachines = [
|
||||||
{
|
{
|
||||||
hostName = "bolty";
|
hostName = "bolty";
|
||||||
sshUser = "nix-builder";
|
sshUser = "nix-builder";
|
||||||
|
@ -16,10 +17,11 @@
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
nix.extraOptions = ''
|
extraOptions = ''
|
||||||
builders-use-substitutes = true
|
builders-use-substitutes = true
|
||||||
'';
|
'';
|
||||||
nix.distributedBuilds = true;
|
distributedBuilds = true;
|
||||||
nix.settings.substituters = ["https://cache.nixos.org/" "ssh://nix-ssh@bolty.raptor-carp.ts.net"];
|
settings.substituters = ["https://cache.nixos.org/" "ssh://nix-ssh@bolty.raptor-carp.ts.net"];
|
||||||
nix.settings.trusted-public-keys = ["cyplodev-store-key:a/+PEufePs7giWqYyRqy+TgUKLMbY+RQuJQu2aUjdl8="];
|
settings.trusted-public-keys = ["cyplodev-store-key:a/+PEufePs7giWqYyRqy+TgUKLMbY+RQuJQu2aUjdl8="];
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,9 +20,11 @@
|
||||||
colour.ui = true;
|
colour.ui = true;
|
||||||
core.fsmonitor = true;
|
core.fsmonitor = true;
|
||||||
credential = {helper = "cache";};
|
credential = {helper = "cache";};
|
||||||
diff.algorithm = "histogram";
|
diff = {
|
||||||
diff.renameLimit = 2048;
|
algorithm = "histogram";
|
||||||
diff.renames = "copy";
|
renameLimit = 2048;
|
||||||
|
renames = "copy";
|
||||||
|
};
|
||||||
help.autocorrect = 1;
|
help.autocorrect = 1;
|
||||||
init.defaultBranch = "main";
|
init.defaultBranch = "main";
|
||||||
merge.renamelimit = 8192;
|
merge.renamelimit = 8192;
|
||||||
|
|
|
@ -22,9 +22,11 @@
|
||||||
|
|
||||||
imports = [];
|
imports = [];
|
||||||
|
|
||||||
programs.chromium.enable = true;
|
programs = {
|
||||||
programs.firefox.enable = true;
|
chromium.enable = true;
|
||||||
programs.sioyek.enable = true;
|
firefox.enable = true;
|
||||||
|
sioyek.enable = true;
|
||||||
|
};
|
||||||
home.packages =
|
home.packages =
|
||||||
(with pkgs;
|
(with pkgs;
|
||||||
with pkgs.gnome3;
|
with pkgs.gnome3;
|
||||||
|
|
|
@ -7,9 +7,11 @@
|
||||||
programs.vscode = {
|
programs.vscode = {
|
||||||
enable = true;
|
enable = true;
|
||||||
userSettings = {
|
userSettings = {
|
||||||
editor.fontFamily = "'Berkeley Mono', 'Droid Sans Mono', 'monospace', monospace";
|
editr = {
|
||||||
editor.formatOnType = true;
|
fontFamily = "'Berkeley Mono', 'Droid Sans Mono', 'monospace', monospace";
|
||||||
editor.fontSize = 16;
|
formatOnType = true;
|
||||||
|
fontSize = 16;
|
||||||
|
};
|
||||||
files.autoSave = "onFocusChange";
|
files.autoSave = "onFocusChange";
|
||||||
rust-analyzer.checkOnSave.command = "clippy";
|
rust-analyzer.checkOnSave.command = "clippy";
|
||||||
platformio-ide = {
|
platformio-ide = {
|
||||||
|
|
|
@ -7,19 +7,20 @@
|
||||||
}: let
|
}: let
|
||||||
username = "cyryl";
|
username = "cyryl";
|
||||||
in {
|
in {
|
||||||
home.sessionVariables = {
|
home = {
|
||||||
|
inherit username;
|
||||||
|
sessionVariables = {
|
||||||
LC_ALL = "en_GB.UTF-8";
|
LC_ALL = "en_GB.UTF-8";
|
||||||
LANG = "en_GB.UTF-8";
|
LANG = "en_GB.UTF-8";
|
||||||
PASSWORD_STORE_ENABLE_EXTENSIONS = "true";
|
PASSWORD_STORE_ENABLE_EXTENSIONS = "true";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
packages = with pkgs; [];
|
||||||
|
|
||||||
|
homeDirectory = lib.mkDefault "/home/${username}";
|
||||||
|
stateVersion = "23.11";
|
||||||
|
};
|
||||||
news.display = "show";
|
news.display = "show";
|
||||||
|
|
||||||
home.packages = with pkgs; [];
|
|
||||||
|
|
||||||
home.username = username;
|
|
||||||
home.homeDirectory = lib.mkDefault "/home/${username}";
|
|
||||||
home.stateVersion = "23.11";
|
|
||||||
programs.home-manager.enable = true;
|
programs.home-manager.enable = true;
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
|
|
@ -3,18 +3,20 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
home.file.".config/nixpkgs/config.nix".source = ../shell-config.nix;
|
home.file = {
|
||||||
home.file.".gdbinit".text = ''
|
".config/nixpkgs/config.nix".source = ../shell-config.nix;
|
||||||
|
".gdbinit".text = ''
|
||||||
set auto-load python-scripts on
|
set auto-load python-scripts on
|
||||||
add-auto-load-safe-path /home/cyryl/dev/dotfiles/.gdbinit
|
add-auto-load-safe-path /home/cyryl/dev/dotfiles/.gdbinit
|
||||||
set auto-load safe-path /
|
set auto-load safe-path /
|
||||||
source /home/cyryl/dev/dotfiles/.gdbinit
|
source /home/cyryl/dev/dotfiles/.gdbinit
|
||||||
'';
|
'';
|
||||||
home.file.".gdbinit.d/dashboard".text = ''
|
".gdbinit.d/dashboard".text = ''
|
||||||
dashboard -layout breakpoints source expressions stack threads variables
|
dashboard -layout breakpoints source expressions stack threads variables
|
||||||
dashboard variables -style compact 0
|
dashboard variables -style compact 0
|
||||||
dashboard source -style height 24
|
dashboard source -style height 24
|
||||||
dashboard stack -style compact 1
|
dashboard stack -style compact 1
|
||||||
dashboard stack -style limit 3
|
dashboard stack -style limit 3
|
||||||
'';
|
'';
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -44,12 +44,15 @@
|
||||||
|
|
||||||
fractalart.enable = true;
|
fractalart.enable = true;
|
||||||
colord.enable = true;
|
colord.enable = true;
|
||||||
xserver.windowManager.i3.enable = true;
|
xserver = {
|
||||||
xserver.displayManager.sddm = {
|
enable = true;
|
||||||
|
windowManager.i3.enable = true;
|
||||||
|
displayManager.sddm = {
|
||||||
enable = true;
|
enable = true;
|
||||||
enableHidpi = true;
|
enableHidpi = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
home-manager.users.cyryl = {...}: {
|
home-manager.users.cyryl = {...}: {
|
||||||
imports = [./home.nix];
|
imports = [./home.nix];
|
||||||
home.packages = with pkgs; [];
|
home.packages = with pkgs; [];
|
||||||
|
|
|
@ -9,21 +9,24 @@
|
||||||
|
|
||||||
nix.settings.allowed-users = ["@users"];
|
nix.settings.allowed-users = ["@users"];
|
||||||
|
|
||||||
security.apparmor.enable = true;
|
security = {
|
||||||
security.apparmor.killUnconfinedConfinables = true;
|
apparmor.enable = true;
|
||||||
security.forcePageTableIsolation = true;
|
apparmor.killUnconfinedConfinables = true;
|
||||||
security.lockKernelModules = false;
|
forcePageTableIsolation = true;
|
||||||
security.protectKernelImage = true;
|
lockKernelModules = false;
|
||||||
security.virtualisation.flushL1DataCache = "always";
|
protectKernelImage = true;
|
||||||
|
virtualisation.flushL1DataCache = "always";
|
||||||
|
};
|
||||||
|
|
||||||
sops.age = {
|
sops.age = {
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
keyFile = "/var/lib/sops-nix/key.txt";
|
||||||
generateKey = true;
|
generateKey = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.kernelParams = ["slub_debug=FZP" "page_poison=1" "page_alloc.shuffle=1"];
|
boot = {
|
||||||
|
kernelParams = ["slub_debug=FZP" "page_poison=1" "page_alloc.shuffle=1"];
|
||||||
|
|
||||||
boot.blacklistedKernelModules = [
|
blacklistedKernelModules = [
|
||||||
# Obscure network protocols
|
# Obscure network protocols
|
||||||
"ax25"
|
"ax25"
|
||||||
"netrom"
|
"netrom"
|
||||||
|
@ -52,40 +55,43 @@
|
||||||
"ufs"
|
"ufs"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
kernel.sysctl = {
|
||||||
# Restrict ptrace() usage to processes with a pre-defined relationship
|
# Restrict ptrace() usage to processes with a pre-defined relationship
|
||||||
# (e.g., parent/child)
|
# (e.g., parent/child)
|
||||||
boot.kernel.sysctl."kernel.yama.ptrace_scope" = lib.mkOverride 500 1;
|
"kernel.yama.ptrace_scope" = lib.mkOverride 500 1;
|
||||||
|
|
||||||
# Hide kptrs even for processes with CAP_SYSLOG
|
# Hide kptrs even for processes with CAP_SYSLOG
|
||||||
boot.kernel.sysctl."kernel.kptr_restrict" = lib.mkOverride 500 2;
|
"kernel.kptr_restrict" = lib.mkOverride 500 2;
|
||||||
|
|
||||||
# Disable bpf() JIT (to eliminate spray attacks)
|
# Disable bpf() JIT (to eliminate spray attacks)
|
||||||
boot.kernel.sysctl."net.core.bpf_jit_enable" = false;
|
"net.core.bpf_jit_enable" = false;
|
||||||
|
|
||||||
# Disable ftrace debugging
|
# Disable ftrace debugging
|
||||||
boot.kernel.sysctl."kernel.ftrace_enabled" = false;
|
"kernel.ftrace_enabled" = false;
|
||||||
|
|
||||||
# Enable strict reverse path filtering (that is, do not attempt to route
|
# Enable strict reverse path filtering (that is, do not attempt to route
|
||||||
# packets that "obviously" do not belong to the iface's network; dropped
|
# packets that "obviously" do not belong to the iface's network; dropped
|
||||||
# packets are logged as martians).
|
# packets are logged as martians).
|
||||||
boot.kernel.sysctl."net.ipv4.conf.all.log_martians" = true;
|
"net.ipv4.conf.all.log_martians" = true;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.all.rp_filter" = "1";
|
"net.ipv4.conf.all.rp_filter" = "1";
|
||||||
boot.kernel.sysctl."net.ipv4.conf.default.log_martians" = true;
|
"net.ipv4.conf.default.log_martians" = true;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.default.rp_filter" = "1";
|
"net.ipv4.conf.default.rp_filter" = "1";
|
||||||
|
|
||||||
# Ignore broadcast ICMP (mitigate SMURF)
|
# Ignore broadcast ICMP (mitigate SMURF)
|
||||||
boot.kernel.sysctl."net.ipv4.icmp_echo_ignore_broadcasts" = true;
|
"net.ipv4.icmp_echo_ignore_broadcasts" = true;
|
||||||
|
|
||||||
# Ignore incoming ICMP redirects (note: default is needed to ensure that the
|
# Ignore incoming ICMP redirects (note: default is needed to ensure that the
|
||||||
# setting is applied to interfaces added after the sysctls are set)
|
# setting is applied to interfaces added after the sysctls are set)
|
||||||
boot.kernel.sysctl."net.ipv4.conf.all.accept_redirects" = false;
|
"net.ipv4.conf.all.accept_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.all.secure_redirects" = false;
|
"net.ipv4.conf.all.secure_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.default.accept_redirects" = false;
|
"net.ipv4.conf.default.accept_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.default.secure_redirects" = false;
|
"net.ipv4.conf.default.secure_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv6.conf.all.accept_redirects" = false;
|
"net.ipv6.conf.all.accept_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv6.conf.default.accept_redirects" = false;
|
"net.ipv6.conf.default.accept_redirects" = false;
|
||||||
|
|
||||||
# Ignore outgoing ICMP redirects (this is ipv4 only)
|
# Ignore outgoing ICMP redirects (this is ipv4 only)
|
||||||
boot.kernel.sysctl."net.ipv4.conf.all.send_redirects" = false;
|
"net.ipv4.conf.all.send_redirects" = false;
|
||||||
boot.kernel.sysctl."net.ipv4.conf.default.send_redirects" = false;
|
"net.ipv4.conf.default.send_redirects" = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -30,7 +30,9 @@ in {
|
||||||
openssh.authorizedKeys.keys = authorizedKeys;
|
openssh.authorizedKeys.keys = authorizedKeys;
|
||||||
};
|
};
|
||||||
|
|
||||||
nix.settings.trusted-users = ["root" "nix-builder"];
|
nix = {
|
||||||
nix.sshServe.enable = true;
|
settings.trusted-users = ["root" "nix-builder"];
|
||||||
nix.sshServe.keys = authorizedKeys;
|
sshServe.enable = true;
|
||||||
|
sshServe.keys = authorizedKeys;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -52,11 +52,13 @@ in {
|
||||||
gsettings-desktop-schemas
|
gsettings-desktop-schemas
|
||||||
lxappearance
|
lxappearance
|
||||||
];
|
];
|
||||||
file.".config/wofi/style.css".source = ../../.config/wofi/style.css;
|
file = {
|
||||||
file.".config/waybar/config".source = ../../.config/waybar/config;
|
".config/wofi/style.css".source = ../../.config/wofi/style.css;
|
||||||
file.".config/waybar/style.css".source =
|
".config/waybar/config".source = ../../.config/waybar/config;
|
||||||
|
".config/waybar/style.css".source =
|
||||||
../../.config/waybar/style.css;
|
../../.config/waybar/style.css;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
services.udiskie.enable = true;
|
services.udiskie.enable = true;
|
||||||
xsession.preferStatusNotifierItems = true;
|
xsession.preferStatusNotifierItems = true;
|
||||||
|
|
||||||
|
|
|
@ -11,12 +11,15 @@
|
||||||
cocPackage = unstablePackages.vimPlugins.coc-nvim;
|
cocPackage = unstablePackages.vimPlugins.coc-nvim;
|
||||||
nvimPackage = unstablePackages.neovim-unwrapped;
|
nvimPackage = unstablePackages.neovim-unwrapped;
|
||||||
in {
|
in {
|
||||||
home.file.".vimrc".source = ../../.vimrc;
|
home = {
|
||||||
home.packages = with pkgs; [ripgrep];
|
file.".vimrc".source = ../../.vimrc;
|
||||||
home.sessionVariables = {
|
packages = with pkgs; [ripgrep];
|
||||||
|
sessionVariables = {
|
||||||
EDITOR = "vim";
|
EDITOR = "vim";
|
||||||
VISUAL = "vim";
|
VISUAL = "vim";
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
programs.zsh.sessionVariables = {
|
programs.zsh.sessionVariables = {
|
||||||
EDITOR = "vim";
|
EDITOR = "vim";
|
||||||
VISUAL = "vim";
|
VISUAL = "vim";
|
||||||
|
|
Loading…
Reference in a new issue