11 ../nixos/profiles/debug.nix
12 ../nixos/profiles/graphical.nix
13 ../nixos/profiles/irssi.nix
14 ../nixos/profiles/lang-fr.nix
15 ../nixos/profiles/laptop.nix
16 ../nixos/profiles/printing.nix
17 ../nixos/profiles/radio.nix
18 ../nixos/profiles/tor.nix
19 ../nixos/profiles/bluetooth.nix
20 ../nixos/profiles/home.nix
25 pumpkin/networking.nix
28 # Lower kernel's security for better performances
29 security.kernel.mitigations = "off";
31 home-manager.users.julm = {
32 imports = [ ../homes/julm.nix ];
35 openssh.authorizedKeys.keys = map lib.readFile [
36 # For nix -L run .#pumpkin.switch
37 ../users/julm/ssh/pumpkin.pub
43 # Put the hashedPassword in /nix/store,
44 # though /etc/shadow is not world readable...
45 # printf %s $(mkpasswd -m md5crypt)
46 hashedPassword = lib.readFile pumpkin/users/julm/login/hashedPassword.clear;
52 "plugdev" # For rtl-sdr
59 config.services.davfs2.davGroup
60 config.services.kubo.group
63 # If created, zfs-mount.service would require:
64 # zfs set overlay=yes ${hostName}/home
66 openssh.authorizedKeys.keys = map lib.readFile [
67 ../users/julm/ssh/losurdo.pub
74 #"http://nix-localcache.losurdo.sp"
75 #"file:///mnt/off4/julm/nix?priority=10&trusted=true"
76 "ssh://nix-ssh@losurdo.sp?priority=30"
78 trusted-public-keys = map lib.readFile [
79 ../users/nix/ssh/losurdo.pub
82 nixPath = lib.mkForce [ "nixpkgs=${inputs.nixpkgs}" ];
84 #environment.etc."nixpkgs".source = pkgs.path;
85 #environment.etc."nixpkgs-overlays".source = inputs.self + "/nixpkgs";
87 nix.settings.allowed-users = [
88 #config.users.users."nix-ssh".name
92 keys = map lib.readFile [
93 ../users/julm/ssh/losurdo.pub
94 ../users/julm/ssh/pumpkin.pub
95 ../users/sevy/ssh/patate.pub
99 environment.systemPackages = [
100 #pkgs.riseup-vpn # Can't be installed by home-manager because it needs to install policy-kit rules
103 boot.extraModulePackages = [
104 #config.boot.kernelPackages.v4l2loopback
107 programs.adb.enable = true;
109 programs.fuse.userAllowOther = true;
111 services.davfs2.enable = true;
113 systemd.automounts = [
115 where = "/mnt/aubergine";
116 automountConfig.TimeoutIdleSec = "5 min";
121 # Use the user's gpg-agent session to query
122 # for the password of the SSH key when auto-mounting.
123 sshAsUser = pkgs.writeScript "sshAsUser" ''
125 exec ${pkgs.sudo}/bin/sudo -i -u "$user" \
126 ${pkgs.openssh}/bin/ssh "$@"
133 "exec" # Override "user"'s noexec
137 "ssh_command=${sshAsUser}\\040julm"
140 "x-systemd.automount"
141 #"Compression=yes" # YMMV
142 # Disconnect approximately 2*15=30 seconds after a network failure
143 "ServerAliveCountMax=1"
144 "ServerAliveInterval=15"
151 device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@aubergine.sp:/";
156 device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@losurdo.sp:/";
161 device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@mermet.sp:/";
166 "/mnt/ilico/severine" = {
167 device = "https://nuage.ilico.org/remote.php/dav/files/severine/";
171 conf = pkgs.writeText "davfs2.conf" ''
172 backup_dir /home/julm/.local/share/davfs2/ilico/severine
173 secrets /home/julm/.davfs2/secrets
185 "x-systemd.automount"
186 "x-systemd.device-timeout=1m"
187 "x-systemd.idle-timeout=1m"
188 "x-systemd.mount-timeout=10s"
194 services.udev.packages = [
195 # Allow the console user access the Yubikey USB device node,
196 # needed for challenge/response to work correctly.
197 pkgs.yubikey-personalization
202 layout = "fr,us(altgr-intl)";
206 # Let the session be generated by home-manager
208 name = "home-manager";
210 ${pkgs.runtimeShell} $HOME/.hm-xsession &
218 services.displayManager = {
219 defaultSession = "home-manager";
220 #defaultSession = "none+xmonad";
221 #defaultSession = "mate";
222 #defaultSession = "cinnamon";
224 user = config.users.users.julm.name;
228 nixpkgs.config.allowUnfreePredicate =
230 builtins.elem (lib.getName pkg) [
255 # This value determines the NixOS release with which your system is to be
256 # compatible, in order to avoid breaking some software such as database
257 # servers. You should change this only after NixOS release notes say you should.
258 system.stateVersion = "24.11"; # Did you read the comment?