{ config, pkgs, lib, inputs, private, hostName, ... }:
{
imports = [
+ ../nixos/profiles/builder.nix
../nixos/profiles/debug.nix
- ../nixos/profiles/dnscrypt-proxy2.nix
../nixos/profiles/graphical.nix
../nixos/profiles/lang-fr.nix
- ../nixos/profiles/networking.nix
../nixos/profiles/printing.nix
../nixos/profiles/security.nix
../nixos/profiles/system.nix
../nixos/profiles/tor.nix
../nixos/profiles/irssi.nix
- ../nixos/profiles/wireguard/wg-intra.nix
oignon/backup.nix
oignon/hardware.nix
- oignon/wireguard.nix
+ oignon/networking.nix
];
+# Lower kernel's security for better performances
+boot.kernelParams = [ "mitigations=off" ];
+
home-manager.users.julm = {
imports = [ ../homes/julm.nix ];
host.hardware = [ "ThinkPad" "X201" ];
systemd.services.home-manager-julm.postStart = ''
${pkgs.nix}/bin/nix-env --delete-generations +1 --profile /nix/var/nix/profiles/per-user/julm/home-manager
'';
+users.users.root = {
+ openssh.authorizedKeys.keys = map lib.readFile [
+ ../private/shared/ssh/julm/oignon.pub
+ ];
+};
users.users.julm = {
isNormalUser = true;
uid = 1000;
hashedPassword = lib.readFile ../private/world/julm/hashedPassword;
extraGroups = [
"adbusers"
+ "dialout"
"lp"
"networkmanager"
"scanner"
nix = {
extraOptions = ''
+ #secret-key-files = /run/credentials/nix-daemon.service/secret-key-files.pem
secret-key-files = ${private}/${hostName}/nix/binary-cache/priv.pem
'';
settings = {