various things, e.g. add authorized keys
This commit is contained in:
parent
3b96abee0e
commit
a1fcb93507
17
flake.lock
generated
17
flake.lock
generated
@ -42,6 +42,22 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixos-hardware": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1664452918,
|
||||||
|
"narHash": "sha256-SfnQ2t5b9RTSIqO3PQBDlwrWn4l3t0F65sZtCKTl8eA=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixos-hardware",
|
||||||
|
"rev": "12f905b731494bc59010f05a7467df8abdcf8d63",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "master",
|
||||||
|
"repo": "nixos-hardware",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1663850217,
|
"lastModified": 1663850217,
|
||||||
@ -77,6 +93,7 @@
|
|||||||
"inputs": {
|
"inputs": {
|
||||||
"home-manager": "home-manager",
|
"home-manager": "home-manager",
|
||||||
"hyprland": "hyprland",
|
"hyprland": "hyprland",
|
||||||
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nur": "nur"
|
"nur": "nur"
|
||||||
}
|
}
|
||||||
|
@ -12,6 +12,7 @@
|
|||||||
inputs = # All flake references used to build my NixOS setup. These are dependencies.
|
inputs = # All flake references used to build my NixOS setup. These are dependencies.
|
||||||
{
|
{
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; # Nix Packages
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; # Nix Packages
|
||||||
|
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
||||||
|
|
||||||
home-manager = { # User Package Management
|
home-manager = { # User Package Management
|
||||||
url = "github:nix-community/home-manager";
|
url = "github:nix-community/home-manager";
|
||||||
@ -28,7 +29,7 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = inputs @ { self, nixpkgs, home-manager, nur, hyprland, ... }: # Function that tells my flake which to use and what do what to do with the dependencies.
|
outputs = inputs @ { self, nixpkgs, nixos-hardware, home-manager, nur, hyprland, ... }: # Function that tells my flake which to use and what do what to do with the dependencies.
|
||||||
let # Variables that can be used in the config files
|
let # Variables that can be used in the config files
|
||||||
user = "kabbone";
|
user = "kabbone";
|
||||||
location = "$HOME/.setup";
|
location = "$HOME/.setup";
|
||||||
@ -37,7 +38,7 @@
|
|||||||
nixosConfigurations = ( # NixOS configurations
|
nixosConfigurations = ( # NixOS configurations
|
||||||
import ./hosts { # Imports ./hosts/default.nix
|
import ./hosts { # Imports ./hosts/default.nix
|
||||||
inherit (nixpkgs) lib;
|
inherit (nixpkgs) lib;
|
||||||
inherit inputs nixpkgs home-manager nur user location hyprland; # Also inherit home-manager so it does not need to be defined here.
|
inherit inputs nixpkgs nixos-hardware home-manager nur user location hyprland; # Also inherit home-manager so it does not need to be defined here.
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
@ -24,12 +24,12 @@
|
|||||||
shell = pkgs.zsh; # Default shell
|
shell = pkgs.zsh; # Default shell
|
||||||
uid = 2000;
|
uid = 2000;
|
||||||
# initialPassword = "password95";
|
# initialPassword = "password95";
|
||||||
# openssh.authorizedKeys = [
|
openssh.authorizedKeys.keys = [
|
||||||
# "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIANmaraVJ/o20c4dqVnGLp/wGck9QNHFPvO9jcEbKS29AAAABHNzaDo= kabbone@kabc"
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIANmaraVJ/o20c4dqVnGLp/wGck9QNHFPvO9jcEbKS29AAAABHNzaDo= kabbone@kabc"
|
||||||
# "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIIgo4IP8ISUohyAMiDc3zEe6ESUE3un7eN5FhVtxZHmcAAAABHNzaDo= kabbone@kabc"
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIIgo4IP8ISUohyAMiDc3zEe6ESUE3un7eN5FhVtxZHmcAAAABHNzaDo= kabbone@kabc"
|
||||||
# "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIKVDApb3vZ+i97V4xLJh8rUF6z5OVYfORlXYbLhdQO15AAAABHNzaDo= kabbone@hades.home.opel-online.de"
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIKVDApb3vZ+i97V4xLJh8rUF6z5OVYfORlXYbLhdQO15AAAABHNzaDo= kabbone@hades.home.opel-online.de"
|
||||||
# "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIB0q++epdX7feQxvmC2m/CJEoJbkqtAJy6Ml6WKHxryZAAAABHNzaDo= kabbone@hades.home.opel-online.de"
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIB0q++epdX7feQxvmC2m/CJEoJbkqtAJy6Ml6WKHxryZAAAABHNzaDo= kabbone@hades.home.opel-online.de"
|
||||||
# ];
|
];
|
||||||
};
|
};
|
||||||
#security.sudo.wheelNeedsPassword = true; # User does not need to give password when using sudo.
|
#security.sudo.wheelNeedsPassword = true; # User does not need to give password when using sudo.
|
||||||
|
|
||||||
@ -119,14 +119,15 @@
|
|||||||
# generating a key:
|
# generating a key:
|
||||||
# - $ ssh-keygen | ssh-copy-id <ip/domain> | ssh-add
|
# - $ ssh-keygen | ssh-copy-id <ip/domain> | ssh-add
|
||||||
# - if ssh-add does not work: $ eval `ssh-agent -s`
|
# - if ssh-add does not work: $ eval `ssh-agent -s`
|
||||||
allowSFTP = true; # SFTP: secure file transfer protocol (send file to server)
|
# allowSFTP = true; # SFTP: secure file transfer protocol (send file to server)
|
||||||
# connect: $ sftp <user>@<ip/domain>
|
# connect: $ sftp <user>@<ip/domain>
|
||||||
# commands:
|
# commands:
|
||||||
# - lpwd & pwd = print (local) parent working directory
|
# - lpwd & pwd = print (local) parent working directory
|
||||||
# - put/get <filename> = send or receive file
|
# - put/get <filename> = send or receive file
|
||||||
extraConfig = ''
|
# extraConfig = ''
|
||||||
HostKeyAlgorithms +ssh-rsa
|
# HostKeyAlgorithms +ssh-rsa
|
||||||
''; # Temporary extra config so ssh will work in guacamole
|
# ''; # Temporary extra config so ssh will work in guacamole
|
||||||
|
passwordAuthentication = false;
|
||||||
};
|
};
|
||||||
#flatpak.enable = true; # download flatpak file from website - sudo flatpak install <path> - reboot if not showing up
|
#flatpak.enable = true; # download flatpak file from website - sudo flatpak install <path> - reboot if not showing up
|
||||||
# sudo flatpak uninstall --delete-data <app-id> (> flatpak list --app) - flatpak uninstall --unused
|
# sudo flatpak uninstall --delete-data <app-id> (> flatpak list --app) - flatpak uninstall --unused
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
# └─ ./home.nix
|
# └─ ./home.nix
|
||||||
#
|
#
|
||||||
|
|
||||||
{ lib, inputs, nixpkgs, home-manager, nur, user, location, hyprland, ... }:
|
{ lib, inputs, nixpkgs, nixos-hardware, home-manager, nur, user, location, hyprland, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
system = "x86_64-linux"; # System architecture
|
system = "x86_64-linux"; # System architecture
|
||||||
@ -46,18 +46,19 @@ in
|
|||||||
|
|
||||||
laptop = lib.nixosSystem { # Laptop profile
|
laptop = lib.nixosSystem { # Laptop profile
|
||||||
inherit system;
|
inherit system;
|
||||||
specialArgs = { inherit inputs user location hyprland; };
|
specialArgs = { inherit inputs user location hyprland nixos-hardware; };
|
||||||
modules = [
|
modules = [
|
||||||
hyprland.nixosModules.default
|
hyprland.nixosModules.default
|
||||||
./laptop
|
./laptop
|
||||||
./configuration.nix
|
./configuration.nix
|
||||||
|
nixos-hardware.nixosModules.common-cpu-intel
|
||||||
|
|
||||||
home-manager.nixosModules.home-manager {
|
home-manager.nixosModules.home-manager {
|
||||||
home-manager.useGlobalPkgs = true;
|
home-manager.useGlobalPkgs = true;
|
||||||
home-manager.useUserPackages = true;
|
home-manager.useUserPackages = true;
|
||||||
home-manager.extraSpecialArgs = { inherit user; };
|
home-manager.extraSpecialArgs = { inherit user; };
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
imports = [(import ./home.nix)] ++ [(import ./laptop/home.nix)];
|
imports = [(import ./home.nix)] ++ [(import ./laptop/home.nix)];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
@ -28,8 +28,13 @@
|
|||||||
options = [ "compress=zstd,space_cache=v2,ssd,noatime,subvol=@" ];
|
options = [ "compress=zstd,space_cache=v2,ssd,noatime,subvol=@" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.initrd.luks.devices."root".device = "/dev/disk/by-uuid/75eccc7f-30b0-4fe8-8f82-90edaf284cd5";
|
boot.initrd.luks = {
|
||||||
boot.initrd.luks.fido2Support = true;
|
fido2Support = true;
|
||||||
|
devices."root" = {
|
||||||
|
device = "/dev/disk/by-uuid/75eccc7f-30b0-4fe8-8f82-90edaf284cd5";
|
||||||
|
allowDiscards = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
fileSystems."/home" =
|
fileSystems."/home" =
|
||||||
{ device = "/dev/mapper/root";
|
{ device = "/dev/mapper/root";
|
||||||
|
@ -16,7 +16,15 @@
|
|||||||
{
|
{
|
||||||
imports = [ ../../programs/waybar.nix ];
|
imports = [ ../../programs/waybar.nix ];
|
||||||
|
|
||||||
hardware.opengl.enable = true;
|
hardware.opengl = {
|
||||||
|
enable = true;
|
||||||
|
extraPackages = with pkgs; [
|
||||||
|
intel-media-driver # LIBVA_DRIVER_NAME=iHD
|
||||||
|
vaapiIntel
|
||||||
|
libvdpau-va-gl
|
||||||
|
libva-utils
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
environment = {
|
environment = {
|
||||||
loginShellInit = ''
|
loginShellInit = ''
|
||||||
|
@ -51,17 +51,15 @@
|
|||||||
repeat_delay=250
|
repeat_delay=250
|
||||||
numlock_by_default=0
|
numlock_by_default=0
|
||||||
force_no_accel=1
|
force_no_accel=1
|
||||||
sensitivity=1
|
sensitivity=0
|
||||||
touchpad {
|
touchpad {
|
||||||
disable_while_typing=1
|
disable_while_typing=1
|
||||||
natural_scroll=0
|
natural_scroll=0
|
||||||
}
|
}
|
||||||
workspace_swipe=1
|
|
||||||
}
|
}
|
||||||
dwindle {
|
dwindle {
|
||||||
pseudotile=0
|
pseudotile=0
|
||||||
}
|
}
|
||||||
no_vfr=0
|
|
||||||
bind=SUPER,Return,exec,${pkgs.alacritty}/bin/alacritty
|
bind=SUPER,Return,exec,${pkgs.alacritty}/bin/alacritty
|
||||||
bind=SUPER,Q,killactive,
|
bind=SUPER,Q,killactive,
|
||||||
bind=SUPER,Escape,exit,
|
bind=SUPER,Escape,exit,
|
||||||
|
Loading…
Reference in New Issue
Block a user