11     ../nixos/profiles/appimage.nix
 
  12     ../nixos/profiles/bluetooth.nix
 
  13     ../nixos/profiles/builder.nix
 
  14     ../nixos/profiles/debug.nix
 
  15     ../nixos/profiles/dolphin.nix
 
  16     ../nixos/profiles/firejail.nix
 
  17     ../nixos/profiles/graphical.nix
 
  18     ../nixos/profiles/home.nix
 
  19     ../nixos/profiles/irssi.nix
 
  20     ../nixos/profiles/lang-fr.nix
 
  21     ../nixos/profiles/laptop.nix
 
  22     ../nixos/profiles/printing.nix
 
  23     ../nixos/profiles/radio.nix
 
  24     ../nixos/profiles/tor.nix
 
  29     nan2gua1/networking.nix
 
  30     nan2gua1/postgresql.nix
 
  34   # Lower kernel's security for better performances
 
  35   security.kernel.mitigations = "off";
 
  37   home-manager.users.julm = {
 
  38     imports = [ ../homes/julm.nix ];
 
  41     openssh.authorizedKeys.keys = map lib.readFile [
 
  42       # For nix -L run .#$(hostname).switch
 
  43       ../users/julm/ssh/nan2gua1.pub
 
  44       # SecurityToDo: remove
 
  45       ../users/julm/ssh/blackberry.pub
 
  51     # Put the hashedPassword in /nix/store,
 
  52     # though /etc/shadow is not world readable...
 
  53     # printf %s $(mkpasswd -m md5crypt)
 
  54     hashedPassword = lib.readFile pumpkin/users/julm/login/hashedPassword.clear;
 
  60       "plugdev" # For rtl-sdr
 
  68       config.services.davfs2.davGroup
 
  69       config.services.kubo.group
 
  72     # If created, zfs-mount.service would require:
 
  73     # zfs set overlay=yes ${hostName}/home
 
  75     openssh.authorizedKeys.keys = map lib.readFile [
 
  76       ../users/julm/ssh/losurdo.pub
 
  83         #"http://nix-localcache.losurdo.sp"
 
  84         #"file:///mnt/off4/julm/nix?priority=10&trusted=true"
 
  85         #"ssh://nix-ssh@losurdo.sp?priority=30"
 
  87       trusted-public-keys = map lib.readFile [
 
  88         #../users/nix/ssh/losurdo.pub
 
  92   #environment.etc."nixpkgs".source = pkgs.path;
 
  93   #environment.etc."nixpkgs-overlays".source = inputs.self + "/nixpkgs";
 
  95   nix.settings.allowed-users = [
 
  96     #config.users.users."nix-ssh".name
 
 100     keys = map lib.readFile [
 
 101       ../users/julm/ssh/losurdo.pub
 
 102       ../users/julm/ssh/pumpkin.pub
 
 103       ../users/julm/ssh/nan2gua1.pub
 
 104       ../users/sevy/ssh/patate.pub
 
 108   environment.systemPackages = [
 
 109     #pkgs.riseup-vpn # Can't be installed by home-manager because it needs to install policy-kit rules
 
 112   boot.extraModulePackages = [
 
 113     #config.boot.kernelPackages.v4l2loopback
 
 116   programs.adb.enable = true;
 
 118   programs.fuse.userAllowOther = true;
 
 120   services.davfs2.enable = true;
 
 122   systemd.automounts = [
 
 124       where = "/mnt/aubergine";
 
 125       automountConfig.TimeoutIdleSec = "5 min";
 
 130       # Use the user's gpg-agent session to query
 
 131       # for the password of the SSH key when auto-mounting.
 
 132       sshAsUser = pkgs.writeScript "sshAsUser" ''
 
 134         exec ${pkgs.sudo}/bin/sudo -i -u "$user" \
 
 135           ${pkgs.openssh}/bin/ssh "$@"
 
 142         "exec" # Override "user"'s noexec
 
 146         "ssh_command=${sshAsUser}\\040julm"
 
 149         "x-systemd.automount"
 
 150         #"Compression=yes" # YMMV
 
 151         # Disconnect approximately 2*15=30 seconds after a network failure
 
 152         "ServerAliveCountMax=1"
 
 153         "ServerAliveInterval=15"
 
 160         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@aubergine.sp:/";
 
 165         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@losurdo.sp:/";
 
 170         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@mermet.sp:/";
 
 175         "/mnt/ilico/severine" = {
 
 176           device = "https://nuage.ilico.org/remote.php/dav/files/severine/";
 
 180               conf = pkgs.writeText "davfs2.conf" ''
 
 181                 backup_dir /home/julm/.local/share/davfs2/ilico/severine
 
 182                 secrets /home/julm/.davfs2/secrets
 
 194               "x-systemd.automount"
 
 195               "x-systemd.device-timeout=1m"
 
 196               "x-systemd.idle-timeout=1m"
 
 197               "x-systemd.mount-timeout=10s"
 
 203   services.udev.packages = [
 
 204     # Allow the console user access the Yubikey USB device node,
 
 205     # needed for challenge/response to work correctly.
 
 206     pkgs.yubikey-personalization
 
 211       layout = "fr,us(altgr-intl)";
 
 215         # Let the session be generated by home-manager
 
 217           name = "home-manager";
 
 219             ${pkgs.runtimeShell} $HOME/.hm-xsession &
 
 227   services.displayManager = {
 
 228     defaultSession = "home-manager";
 
 229     #defaultSession = "none+xmonad";
 
 230     #defaultSession = "mate";
 
 231     #defaultSession = "cinnamon";
 
 233       user = config.users.users.julm.name;
 
 237   nixpkgs.config.allowUnfreePredicate =
 
 239     builtins.elem (lib.getName pkg) [
 
 265   # This value determines the NixOS release with which your system is to be
 
 266   # compatible, in order to avoid breaking some software such as database
 
 267   # servers. You should change this only after NixOS release notes say you should.
 
 268   system.stateVersion = "25.05"; # Did you read the comment?