11     ../nixos/profiles/builder.nix
 
  12     ../nixos/profiles/debug.nix
 
  13     ../nixos/profiles/graphical.nix
 
  14     ../nixos/profiles/irssi.nix
 
  15     ../nixos/profiles/lang-fr.nix
 
  16     ../nixos/profiles/laptop.nix
 
  17     ../nixos/profiles/printing.nix
 
  18     ../nixos/profiles/radio.nix
 
  19     ../nixos/profiles/tor.nix
 
  20     ../nixos/profiles/bluetooth.nix
 
  21     ../nixos/profiles/home.nix
 
  26     pumpkin/networking.nix
 
  29   # Lower kernel's security for better performances
 
  30   security.kernel.mitigations = "off";
 
  32   home-manager.users.julm = {
 
  33     imports = [ ../homes/julm.nix ];
 
  36     openssh.authorizedKeys.keys = map lib.readFile [
 
  37       # For nix -L run .#pumpkin.switch
 
  38       ../users/julm/ssh/pumpkin.pub
 
  44     # Put the hashedPassword in /nix/store,
 
  45     # though /etc/shadow is not world readable...
 
  46     # printf %s $(mkpasswd -m md5crypt)
 
  47     hashedPassword = lib.readFile pumpkin/users/julm/login/hashedPassword.clear;
 
  53       "plugdev" # For rtl-sdr
 
  60       config.services.davfs2.davGroup
 
  61       config.services.kubo.group
 
  64     # If created, zfs-mount.service would require:
 
  65     # zfs set overlay=yes ${hostName}/home
 
  67     openssh.authorizedKeys.keys = map lib.readFile [
 
  68       ../users/julm/ssh/losurdo.pub
 
  75         #"http://nix-localcache.losurdo.sp"
 
  76         #"file:///mnt/off4/julm/nix?priority=10&trusted=true"
 
  77         "ssh://nix-ssh@losurdo.sp?priority=30"
 
  79       trusted-public-keys = map lib.readFile [
 
  80         ../users/nix/ssh/losurdo.pub
 
  84   #environment.etc."nixpkgs".source = pkgs.path;
 
  85   #environment.etc."nixpkgs-overlays".source = inputs.self + "/nixpkgs";
 
  87   nix.settings.allowed-users = [
 
  88     #config.users.users."nix-ssh".name
 
  92     keys = map lib.readFile [
 
  93       ../users/julm/ssh/losurdo.pub
 
  94       ../users/julm/ssh/pumpkin.pub
 
  95       ../users/sevy/ssh/patate.pub
 
  99   environment.systemPackages = [
 
 100     #pkgs.riseup-vpn # Can't be installed by home-manager because it needs to install policy-kit rules
 
 103   boot.extraModulePackages = [
 
 104     #config.boot.kernelPackages.v4l2loopback
 
 107   programs.adb.enable = true;
 
 109   programs.fuse.userAllowOther = true;
 
 111   services.davfs2.enable = true;
 
 113   systemd.automounts = [
 
 115       where = "/mnt/aubergine";
 
 116       automountConfig.TimeoutIdleSec = "5 min";
 
 121       # Use the user's gpg-agent session to query
 
 122       # for the password of the SSH key when auto-mounting.
 
 123       sshAsUser = pkgs.writeScript "sshAsUser" ''
 
 125         exec ${pkgs.sudo}/bin/sudo -i -u "$user" \
 
 126           ${pkgs.openssh}/bin/ssh "$@"
 
 133         "exec" # Override "user"'s noexec
 
 137         "ssh_command=${sshAsUser}\\040julm"
 
 140         "x-systemd.automount"
 
 141         #"Compression=yes" # YMMV
 
 142         # Disconnect approximately 2*15=30 seconds after a network failure
 
 143         "ServerAliveCountMax=1"
 
 144         "ServerAliveInterval=15"
 
 151         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@aubergine.sp:/";
 
 156         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@losurdo.sp:/";
 
 161         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@mermet.sp:/";
 
 166         "/mnt/ilico/severine" = {
 
 167           device = "https://nuage.ilico.org/remote.php/dav/files/severine/";
 
 171               conf = pkgs.writeText "davfs2.conf" ''
 
 172                 backup_dir /home/julm/.local/share/davfs2/ilico/severine
 
 173                 secrets /home/julm/.davfs2/secrets
 
 185               "x-systemd.automount"
 
 186               "x-systemd.device-timeout=1m"
 
 187               "x-systemd.idle-timeout=1m"
 
 188               "x-systemd.mount-timeout=10s"
 
 194   services.udev.packages = [
 
 195     # Allow the console user access the Yubikey USB device node,
 
 196     # needed for challenge/response to work correctly.
 
 197     pkgs.yubikey-personalization
 
 202       layout = "fr,us(altgr-intl)";
 
 206         # Let the session be generated by home-manager
 
 208           name = "home-manager";
 
 210             ${pkgs.runtimeShell} $HOME/.hm-xsession &
 
 218   services.displayManager = {
 
 219     defaultSession = "home-manager";
 
 220     #defaultSession = "none+xmonad";
 
 221     #defaultSession = "mate";
 
 222     #defaultSession = "cinnamon";
 
 224       user = config.users.users.julm.name;
 
 228   nixpkgs.config.allowUnfreePredicate =
 
 230     builtins.elem (lib.getName pkg) [
 
 256   # This value determines the NixOS release with which your system is to be
 
 257   # compatible, in order to avoid breaking some software such as database
 
 258   # servers. You should change this only after NixOS release notes say you should.
 
 259   system.stateVersion = "24.11"; # Did you read the comment?