mirror of
https://gitlab.com/upRootNutrition/dotfiles.git
synced 2025-06-16 10:05:13 -05:00
feat: cleaned up some stuff
This commit is contained in:
parent
de63708b61
commit
85c14a33d1
18 changed files with 47 additions and 102 deletions
|
@ -2,7 +2,6 @@
|
||||||
home.packages = builtins.attrValues {
|
home.packages = builtins.attrValues {
|
||||||
inherit
|
inherit
|
||||||
(pkgs)
|
(pkgs)
|
||||||
lutris
|
|
||||||
prismlauncher
|
prismlauncher
|
||||||
;
|
;
|
||||||
};
|
};
|
||||||
|
|
0
home-manager/modules/steam/default.nix
Normal file → Executable file
0
home-manager/modules/steam/default.nix
Normal file → Executable file
|
@ -24,8 +24,11 @@ let
|
||||||
plasma = import ./modules/plasma.nix;
|
plasma = import ./modules/plasma.nix;
|
||||||
printing = import ./modules/printing.nix;
|
printing = import ./modules/printing.nix;
|
||||||
regreet = import ./modules/regreet.nix;
|
regreet = import ./modules/regreet.nix;
|
||||||
|
sddm = import ./modules/sddm.nix;
|
||||||
|
ssh = import ./modules/ssh.nix;
|
||||||
steam = import ./modules/steam.nix;
|
steam = import ./modules/steam.nix;
|
||||||
syncthing = import ./modules/syncthing.nix;
|
syncthing = import ./modules/syncthing.nix;
|
||||||
|
sops = import ./modules/sops.nix;
|
||||||
sysstat = import ./modules/sysstat.nix;
|
sysstat = import ./modules/sysstat.nix;
|
||||||
system = import ./modules/system.nix;
|
system = import ./modules/system.nix;
|
||||||
virtualization = import ./modules/virtualization.nix;
|
virtualization = import ./modules/virtualization.nix;
|
||||||
|
@ -53,10 +56,13 @@ in {
|
||||||
network
|
network
|
||||||
nix
|
nix
|
||||||
ollama
|
ollama
|
||||||
|
ssh
|
||||||
plasma
|
plasma
|
||||||
printing
|
printing
|
||||||
regreet
|
regreet
|
||||||
|
sddm
|
||||||
services
|
services
|
||||||
|
sops
|
||||||
steam
|
steam
|
||||||
syncthing
|
syncthing
|
||||||
sysstat
|
sysstat
|
||||||
|
@ -76,6 +82,8 @@ in {
|
||||||
fonts
|
fonts
|
||||||
plasma
|
plasma
|
||||||
printing
|
printing
|
||||||
|
regreet
|
||||||
|
sddm
|
||||||
steam
|
steam
|
||||||
sysstat
|
sysstat
|
||||||
virtualization
|
virtualization
|
||||||
|
@ -101,7 +109,9 @@ in {
|
||||||
home-manager
|
home-manager
|
||||||
locale
|
locale
|
||||||
nix
|
nix
|
||||||
|
ssh
|
||||||
system
|
system
|
||||||
|
sops
|
||||||
xserver
|
xserver
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,12 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
services = {
|
services = {
|
||||||
desktopManager.plasma6.enable = true;
|
desktopManager.plasma6.enable = true;
|
||||||
displayManager = {
|
|
||||||
sddm = {
|
|
||||||
enable = true;
|
|
||||||
wayland.enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
environment.plasma6.excludePackages = with pkgs.kdePackages; [
|
environment.plasma6.excludePackages = with pkgs.kdePackages; [
|
||||||
plasma-browser-integration
|
plasma-browser-integration
|
||||||
|
|
10
nixos/modules/sddm.nix
Executable file
10
nixos/modules/sddm.nix
Executable file
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
services = {
|
||||||
|
displayManager = {
|
||||||
|
sddm = {
|
||||||
|
enable = true;
|
||||||
|
wayland.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
26
nixos/modules/sops.nix
Executable file
26
nixos/modules/sops.nix
Executable file
|
@ -0,0 +1,26 @@
|
||||||
|
{flake, ...}: let
|
||||||
|
inherit (flake.config.people) user0;
|
||||||
|
in {
|
||||||
|
sops = {
|
||||||
|
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||||
|
validateSopsFiles = false;
|
||||||
|
age = {
|
||||||
|
keyFile = "/var/lib/sops-nix/key.txt";
|
||||||
|
generateKey = false;
|
||||||
|
};
|
||||||
|
secrets = {
|
||||||
|
"ssh/private" = {
|
||||||
|
path = "/home/${user0}/.ssh/id_ed25519";
|
||||||
|
owner = user0;
|
||||||
|
};
|
||||||
|
"ssh/public" = {
|
||||||
|
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
||||||
|
owner = user0;
|
||||||
|
};
|
||||||
|
"ssh/hosts" = {
|
||||||
|
path = "/home/${user0}/.ssh/known_hosts";
|
||||||
|
owner = user0;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -6,7 +6,6 @@
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./sops.nix
|
./sops.nix
|
||||||
./ssh.nix
|
|
||||||
];
|
];
|
||||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||||
system.stateVersion = lib.mkForce "24.05";
|
system.stateVersion = lib.mkForce "24.05";
|
||||||
|
|
|
@ -3,25 +3,7 @@
|
||||||
inherit (flake.config.people.user.${user0}) git;
|
inherit (flake.config.people.user.${user0}) git;
|
||||||
in {
|
in {
|
||||||
sops = {
|
sops = {
|
||||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
|
||||||
validateSopsFiles = false;
|
|
||||||
age = {
|
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
generateKey = false;
|
|
||||||
};
|
|
||||||
secrets = {
|
secrets = {
|
||||||
"ssh/private" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"ssh/public" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"ssh/hosts" = {
|
|
||||||
path = "/home/${user0}/.ssh/known_hosts";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"network/synology" = {
|
"network/synology" = {
|
||||||
path = "/var/lib/secrets/synology";
|
path = "/var/lib/secrets/synology";
|
||||||
owner = "root";
|
owner = "root";
|
||||||
|
|
|
@ -6,7 +6,6 @@
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./sops.nix
|
./sops.nix
|
||||||
./ssh.nix
|
|
||||||
];
|
];
|
||||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||||
system.stateVersion = lib.mkForce "24.05";
|
system.stateVersion = lib.mkForce "24.05";
|
||||||
|
|
|
@ -1,25 +1,6 @@
|
||||||
{flake, ...}: let
|
{
|
||||||
inherit
|
|
||||||
(flake.config.people)
|
|
||||||
user2
|
|
||||||
;
|
|
||||||
in {
|
|
||||||
sops = {
|
sops = {
|
||||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
|
||||||
validateSopsFiles = false;
|
|
||||||
age = {
|
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
generateKey = false;
|
|
||||||
};
|
|
||||||
secrets = {
|
secrets = {
|
||||||
"ssh/private" = {
|
|
||||||
path = "/home/${user2}/.ssh/id_ed25519";
|
|
||||||
owner = user2;
|
|
||||||
};
|
|
||||||
"ssh/public" = {
|
|
||||||
path = "/home/${user2}/.ssh/id_ed25519.pub";
|
|
||||||
owner = user2;
|
|
||||||
};
|
|
||||||
"network/fallaryn" = {
|
"network/fallaryn" = {
|
||||||
path = "/etc/fallaryn-synology";
|
path = "/etc/fallaryn-synology";
|
||||||
owner = "root";
|
owner = "root";
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
{flake, ...}: let
|
|
||||||
inherit (flake.config.people) user0;
|
|
||||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
|
||||||
in {
|
|
||||||
users.users.${user0} = {
|
|
||||||
openssh.authorizedKeys.keys = sshKeys;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -6,7 +6,6 @@
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./sops.nix
|
./sops.nix
|
||||||
./ssh.nix
|
|
||||||
];
|
];
|
||||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||||
system.stateVersion = lib.mkForce "24.05";
|
system.stateVersion = lib.mkForce "24.05";
|
||||||
|
|
|
@ -1,26 +1,11 @@
|
||||||
{flake, ...}: let
|
{flake, ...}: let
|
||||||
inherit
|
inherit
|
||||||
(flake.config.people)
|
(flake.config.people)
|
||||||
user0
|
|
||||||
user1
|
user1
|
||||||
;
|
;
|
||||||
in {
|
in {
|
||||||
sops = {
|
sops = {
|
||||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
|
||||||
validateSopsFiles = false;
|
|
||||||
age = {
|
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
generateKey = false;
|
|
||||||
};
|
|
||||||
secrets = {
|
secrets = {
|
||||||
"ssh/private" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"ssh/public" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"network/synology" = {
|
"network/synology" = {
|
||||||
path = "/var/lib/secrets/synology";
|
path = "/var/lib/secrets/synology";
|
||||||
owner = "root";
|
owner = "root";
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
{flake, ...}: let
|
|
||||||
inherit (flake.config.people) user0;
|
|
||||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
|
||||||
in {
|
|
||||||
users.users.${user0} = {
|
|
||||||
openssh.authorizedKeys.keys = sshKeys;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -6,7 +6,6 @@
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./sops.nix
|
./sops.nix
|
||||||
./ssh.nix
|
|
||||||
];
|
];
|
||||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||||
system.stateVersion = lib.mkForce "24.05";
|
system.stateVersion = lib.mkForce "24.05";
|
||||||
|
|
|
@ -2,21 +2,7 @@
|
||||||
inherit (flake.config.people) user0;
|
inherit (flake.config.people) user0;
|
||||||
in {
|
in {
|
||||||
sops = {
|
sops = {
|
||||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
|
||||||
validateSopsFiles = false;
|
|
||||||
age = {
|
|
||||||
keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
generateKey = false;
|
|
||||||
};
|
|
||||||
secrets = {
|
secrets = {
|
||||||
"ssh/private" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"ssh/public" = {
|
|
||||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
|
||||||
owner = user0;
|
|
||||||
};
|
|
||||||
"discord-token" = {
|
"discord-token" = {
|
||||||
path = "/home/${user0}/projects/zookeeper/.env";
|
path = "/home/${user0}/projects/zookeeper/.env";
|
||||||
owner = user0;
|
owner = user0;
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
{flake, ...}: let
|
|
||||||
inherit (flake.config.people) user0;
|
|
||||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
|
||||||
in {
|
|
||||||
users.users.${user0} = {
|
|
||||||
openssh.authorizedKeys.keys = sshKeys;
|
|
||||||
};
|
|
||||||
}
|
|
Loading…
Add table
Add a link
Reference in a new issue