9     ../nixos/profiles/appimage.nix
 
  10     ../nixos/profiles/bluetooth.nix
 
  11     ../nixos/profiles/builder.nix
 
  12     ../nixos/profiles/debug.nix
 
  13     ../nixos/profiles/dolphin.nix
 
  14     ../nixos/profiles/graphical.nix
 
  15     ../nixos/profiles/home.nix
 
  16     ../nixos/profiles/irssi.nix
 
  17     ../nixos/profiles/lang-fr.nix
 
  18     ../nixos/profiles/laptop.nix
 
  19     ../nixos/profiles/printing.nix
 
  20     ../nixos/profiles/radio.nix
 
  21     ../nixos/profiles/tor.nix
 
  26     nan2gua1/networking.nix
 
  27     nan2gua1/postgresql.nix
 
  31   # Lower kernel's security for better performances
 
  32   security.kernel.mitigations = "off";
 
  34   home-manager.users.julm = {
 
  35     imports = [ ../homes/julm.nix ];
 
  38     openssh.authorizedKeys.keys = map lib.readFile [
 
  39       # For nix -L run .#$(hostname).switch
 
  40       ../users/julm/ssh/nan2gua1.pub
 
  41       # SecurityToDo: remove
 
  42       ../users/julm/ssh/blackberry.pub
 
  48     # Put the hashedPassword in /nix/store,
 
  49     # though /etc/shadow is not world readable...
 
  50     # printf %s $(mkpasswd -m md5crypt)
 
  51     hashedPassword = lib.readFile pumpkin/users/julm/login/hashedPassword.clear;
 
  57       "plugdev" # For rtl-sdr
 
  65       config.services.davfs2.davGroup
 
  66       config.services.kubo.group
 
  69     # If created, zfs-mount.service would require:
 
  70     # zfs set overlay=yes ${hostName}/home
 
  72     openssh.authorizedKeys.keys = map lib.readFile [
 
  73       ../users/julm/ssh/losurdo.pub
 
  80         #"http://nix-localcache.losurdo.sp"
 
  81         #"file:///mnt/off4/julm/nix?priority=10&trusted=true"
 
  82         #"ssh://nix-ssh@losurdo.sp?priority=30"
 
  84       trusted-public-keys = map lib.readFile [
 
  85         #../users/nix/ssh/losurdo.pub
 
  89   #environment.etc."nixpkgs".source = pkgs.path;
 
  90   #environment.etc."nixpkgs-overlays".source = inputs.self + "/nixpkgs";
 
  92   nix.settings.allowed-users = [
 
  93     #config.users.users."nix-ssh".name
 
  97     keys = map lib.readFile [
 
  98       ../users/julm/ssh/losurdo.pub
 
  99       ../users/julm/ssh/pumpkin.pub
 
 100       ../users/julm/ssh/nan2gua1.pub
 
 101       ../users/sevy/ssh/patate.pub
 
 105   environment.systemPackages = [
 
 106     #pkgs.riseup-vpn # Can't be installed by home-manager because it needs to install policy-kit rules
 
 109   boot.extraModulePackages = [
 
 110     #config.boot.kernelPackages.v4l2loopback
 
 113   programs.adb.enable = true;
 
 115   programs.fuse.userAllowOther = true;
 
 117   services.davfs2.enable = true;
 
 119   systemd.automounts = [
 
 121       where = "/mnt/aubergine";
 
 122       automountConfig.TimeoutIdleSec = "5 min";
 
 127       # Use the user's gpg-agent session to query
 
 128       # for the password of the SSH key when auto-mounting.
 
 129       sshAsUser = pkgs.writeScript "sshAsUser" ''
 
 131         exec ${pkgs.sudo}/bin/sudo -i -u "$user" \
 
 132           ${pkgs.openssh}/bin/ssh "$@"
 
 139         "exec" # Override "user"'s noexec
 
 143         "ssh_command=${sshAsUser}\\040julm"
 
 146         "x-systemd.automount"
 
 147         #"Compression=yes" # YMMV
 
 148         # Disconnect approximately 2*15=30 seconds after a network failure
 
 149         "ServerAliveCountMax=1"
 
 150         "ServerAliveInterval=15"
 
 157         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@aubergine.sp:/";
 
 162         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@losurdo.sp:/";
 
 167         device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@mermet.sp:/";
 
 172         "/mnt/ilico/severine" = {
 
 173           device = "https://nuage.ilico.org/remote.php/dav/files/severine/";
 
 177               conf = pkgs.writeText "davfs2.conf" ''
 
 178                 backup_dir /home/julm/.local/share/davfs2/ilico/severine
 
 179                 secrets /home/julm/.davfs2/secrets
 
 191               "x-systemd.automount"
 
 192               "x-systemd.device-timeout=1m"
 
 193               "x-systemd.idle-timeout=1m"
 
 194               "x-systemd.mount-timeout=10s"
 
 200   services.udev.packages = [
 
 201     # Allow the console user access the Yubikey USB device node,
 
 202     # needed for challenge/response to work correctly.
 
 203     pkgs.yubikey-personalization
 
 208       layout = "fr,us(altgr-intl)";
 
 212         # Let the session be generated by home-manager
 
 214           name = "home-manager";
 
 216             ${pkgs.runtimeShell} $HOME/.hm-xsession &
 
 224   services.displayManager = {
 
 225     defaultSession = "home-manager";
 
 226     #defaultSession = "none+xmonad";
 
 227     #defaultSession = "mate";
 
 228     #defaultSession = "cinnamon";
 
 230       user = config.users.users.julm.name;
 
 234   nixpkgs.config.allowUnfreePredicate =
 
 236     builtins.elem (lib.getName pkg) [
 
 262   # This value determines the NixOS release with which your system is to be
 
 263   # compatible, in order to avoid breaking some software such as database
 
 264   # servers. You should change this only after NixOS release notes say you should.
 
 265   system.stateVersion = "25.05"; # Did you read the comment?