mirror of
https://gitlab.com/upRootNutrition/dotfiles.git
synced 2025-06-16 10:05:13 -05:00
feat: cleaned up some stuff
This commit is contained in:
parent
de63708b61
commit
85c14a33d1
18 changed files with 47 additions and 102 deletions
|
@ -2,7 +2,6 @@
|
|||
home.packages = builtins.attrValues {
|
||||
inherit
|
||||
(pkgs)
|
||||
lutris
|
||||
prismlauncher
|
||||
;
|
||||
};
|
||||
|
|
0
home-manager/modules/steam/default.nix
Normal file → Executable file
0
home-manager/modules/steam/default.nix
Normal file → Executable file
|
@ -24,8 +24,11 @@ let
|
|||
plasma = import ./modules/plasma.nix;
|
||||
printing = import ./modules/printing.nix;
|
||||
regreet = import ./modules/regreet.nix;
|
||||
sddm = import ./modules/sddm.nix;
|
||||
ssh = import ./modules/ssh.nix;
|
||||
steam = import ./modules/steam.nix;
|
||||
syncthing = import ./modules/syncthing.nix;
|
||||
sops = import ./modules/sops.nix;
|
||||
sysstat = import ./modules/sysstat.nix;
|
||||
system = import ./modules/system.nix;
|
||||
virtualization = import ./modules/virtualization.nix;
|
||||
|
@ -53,10 +56,13 @@ in {
|
|||
network
|
||||
nix
|
||||
ollama
|
||||
ssh
|
||||
plasma
|
||||
printing
|
||||
regreet
|
||||
sddm
|
||||
services
|
||||
sops
|
||||
steam
|
||||
syncthing
|
||||
sysstat
|
||||
|
@ -76,6 +82,8 @@ in {
|
|||
fonts
|
||||
plasma
|
||||
printing
|
||||
regreet
|
||||
sddm
|
||||
steam
|
||||
sysstat
|
||||
virtualization
|
||||
|
@ -101,7 +109,9 @@ in {
|
|||
home-manager
|
||||
locale
|
||||
nix
|
||||
ssh
|
||||
system
|
||||
sops
|
||||
xserver
|
||||
];
|
||||
};
|
||||
|
|
|
@ -1,12 +1,6 @@
|
|||
{pkgs, ...}: {
|
||||
services = {
|
||||
desktopManager.plasma6.enable = true;
|
||||
displayManager = {
|
||||
sddm = {
|
||||
enable = true;
|
||||
wayland.enable = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
environment.plasma6.excludePackages = with pkgs.kdePackages; [
|
||||
plasma-browser-integration
|
||||
|
|
10
nixos/modules/sddm.nix
Executable file
10
nixos/modules/sddm.nix
Executable file
|
@ -0,0 +1,10 @@
|
|||
{
|
||||
services = {
|
||||
displayManager = {
|
||||
sddm = {
|
||||
enable = true;
|
||||
wayland.enable = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
26
nixos/modules/sops.nix
Executable file
26
nixos/modules/sops.nix
Executable file
|
@ -0,0 +1,26 @@
|
|||
{flake, ...}: let
|
||||
inherit (flake.config.people) user0;
|
||||
in {
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
validateSopsFiles = false;
|
||||
age = {
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = false;
|
||||
};
|
||||
secrets = {
|
||||
"ssh/private" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/public" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/hosts" = {
|
||||
path = "/home/${user0}/.ssh/known_hosts";
|
||||
owner = user0;
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
|
@ -6,7 +6,6 @@
|
|||
./hardware.nix
|
||||
./networking.nix
|
||||
./sops.nix
|
||||
./ssh.nix
|
||||
];
|
||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||
system.stateVersion = lib.mkForce "24.05";
|
||||
|
|
|
@ -3,25 +3,7 @@
|
|||
inherit (flake.config.people.user.${user0}) git;
|
||||
in {
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
validateSopsFiles = false;
|
||||
age = {
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = false;
|
||||
};
|
||||
secrets = {
|
||||
"ssh/private" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/public" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/hosts" = {
|
||||
path = "/home/${user0}/.ssh/known_hosts";
|
||||
owner = user0;
|
||||
};
|
||||
"network/synology" = {
|
||||
path = "/var/lib/secrets/synology";
|
||||
owner = "root";
|
||||
|
|
|
@ -6,7 +6,6 @@
|
|||
./hardware.nix
|
||||
./networking.nix
|
||||
./sops.nix
|
||||
./ssh.nix
|
||||
];
|
||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||
system.stateVersion = lib.mkForce "24.05";
|
||||
|
|
|
@ -1,25 +1,6 @@
|
|||
{flake, ...}: let
|
||||
inherit
|
||||
(flake.config.people)
|
||||
user2
|
||||
;
|
||||
in {
|
||||
{
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
validateSopsFiles = false;
|
||||
age = {
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = false;
|
||||
};
|
||||
secrets = {
|
||||
"ssh/private" = {
|
||||
path = "/home/${user2}/.ssh/id_ed25519";
|
||||
owner = user2;
|
||||
};
|
||||
"ssh/public" = {
|
||||
path = "/home/${user2}/.ssh/id_ed25519.pub";
|
||||
owner = user2;
|
||||
};
|
||||
"network/fallaryn" = {
|
||||
path = "/etc/fallaryn-synology";
|
||||
owner = "root";
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
{flake, ...}: let
|
||||
inherit (flake.config.people) user0;
|
||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
||||
in {
|
||||
users.users.${user0} = {
|
||||
openssh.authorizedKeys.keys = sshKeys;
|
||||
};
|
||||
}
|
|
@ -6,7 +6,6 @@
|
|||
./hardware.nix
|
||||
./networking.nix
|
||||
./sops.nix
|
||||
./ssh.nix
|
||||
];
|
||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||
system.stateVersion = lib.mkForce "24.05";
|
||||
|
|
|
@ -1,26 +1,11 @@
|
|||
{flake, ...}: let
|
||||
inherit
|
||||
(flake.config.people)
|
||||
user0
|
||||
user1
|
||||
;
|
||||
in {
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
validateSopsFiles = false;
|
||||
age = {
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = false;
|
||||
};
|
||||
secrets = {
|
||||
"ssh/private" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/public" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
||||
owner = user0;
|
||||
};
|
||||
"network/synology" = {
|
||||
path = "/var/lib/secrets/synology";
|
||||
owner = "root";
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
{flake, ...}: let
|
||||
inherit (flake.config.people) user0;
|
||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
||||
in {
|
||||
users.users.${user0} = {
|
||||
openssh.authorizedKeys.keys = sshKeys;
|
||||
};
|
||||
}
|
|
@ -6,7 +6,6 @@
|
|||
./hardware.nix
|
||||
./networking.nix
|
||||
./sops.nix
|
||||
./ssh.nix
|
||||
];
|
||||
nixpkgs.hostPlatform = lib.mkForce "x86_64-linux";
|
||||
system.stateVersion = lib.mkForce "24.05";
|
||||
|
|
|
@ -2,21 +2,7 @@
|
|||
inherit (flake.config.people) user0;
|
||||
in {
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
validateSopsFiles = false;
|
||||
age = {
|
||||
keyFile = "/var/lib/sops-nix/key.txt";
|
||||
generateKey = false;
|
||||
};
|
||||
secrets = {
|
||||
"ssh/private" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519";
|
||||
owner = user0;
|
||||
};
|
||||
"ssh/public" = {
|
||||
path = "/home/${user0}/.ssh/id_ed25519.pub";
|
||||
owner = user0;
|
||||
};
|
||||
"discord-token" = {
|
||||
path = "/home/${user0}/projects/zookeeper/.env";
|
||||
owner = user0;
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
{flake, ...}: let
|
||||
inherit (flake.config.people) user0;
|
||||
inherit (flake.config.people.user.${user0}) sshKeys;
|
||||
in {
|
||||
users.users.${user0} = {
|
||||
openssh.authorizedKeys.keys = sshKeys;
|
||||
};
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue