# Lower kernel's security for better performances
boot.kernelParams = [ "mitigations=off" ];
-# Setting the machine-id avoids to reencrypt all credentials
-# when reinstalling NixOS on a new drive.
-environment.etc.machine-id.source = aubergine/machine-id;
-
home-manager.users.julm = {
imports = [ ../homes/julm.nix ];
};
*.pem filter=git-crypt-aubergine diff=git-crypt-aubergine
*.pub filter=git-crypt-aubergine diff=git-crypt-aubergine
.gpg-id filter=git-crypt-aubergine diff=git-crypt-aubergine
-machine-id filter=git-crypt-aubergine diff=git-crypt-aubergine
../../nixos/profiles/zramSwap.nix
];
+# Setting the machine-id avoids to reencrypt all credentials
+# when reinstalling NixOS on a new drive.
+# Manually generated with : uuidgen | tr -d -
+environment.etc.machine-id.text = "be4a9e8cde1145c1bfcff894e36206d6";
+
+# The 32-bit host id of the host, formatted as 8 hexadecimal characters.
+# You should try to make this id unique among your hosts.
+# Manually generated with : uuidgen | head -c8
+networking.hostId = "408a404a";
+
/*
boot.loader.efi = {
canTouchEfiVariables = true;
];
*/
-# The 32-bit host id of the host, formatted as 8 hexadecimal characters.
-# You should try to make this id unique among your hosts.
-# Manually generated with : head -c4 /dev/urandom | od -A none -t x4 | cut -d ' ' -f 2
-networking.hostId = "408a404a";
-
boot.supportedFilesystems = [ /*"ntfs"*/ "vfat" ];
boot.extraModulePackages = [
#config.boot.kernelPackages.exfat-nofuse
];
};
-# Setting the machine-id avoids to reencrypt all credentials
-# when reinstalling NixOS on a new drive.
-environment.etc.machine-id.source = oignon/machine-id;
-
environment.systemPackages = [
pkgs.riseup-vpn # Can't be installed by home-manager because it needs to install policy-kit rules
];
*.pem filter=git-crypt-oignon diff=git-crypt-oignon
*.pub filter=git-crypt-oignon diff=git-crypt-oignon
.gpg-id filter=git-crypt-oignon diff=git-crypt-oignon
-machine-id filter=git-crypt-oignon diff=git-crypt-oignon
../../nixos/profiles/zramSwap.nix
];
+# Setting the machine-id avoids to reencrypt all credentials
+# when reinstalling NixOS on a new drive.
+# Manually generated with : uuidgen | tr -d -
+environment.etc.machine-id.text = "46e396e54c264a3594d21de5c519dccf";
+
+# The 32-bit host id of the host, formatted as 8 hexadecimal characters.
+# You should try to make this id unique among your hosts.
+# Manually generated with : uuidgen | head -c8
+networking.hostId = "ce53d0c3";
+
/*
boot.loader.efi = {
canTouchEfiVariables = true;
}
];
-# The 32-bit host id of the host, formatted as 8 hexadecimal characters.
-# You should try to make this id unique among your hosts.
-# Manually generated with : head -c4 /dev/urandom | od -A none -t x4 | cut -d ' ' -f 2
-networking.hostId = "ce53d0c3";
-
boot.supportedFilesystems = [ "ntfs" "vfat" ];
fileSystems."/" =
*.pub filter=git-crypt-patate diff=git-crypt-patate
*.pem filter=git-crypt-patate diff=git-crypt-patate
.gpg-id filter=git-crypt-patate diff=git-crypt-patate
-machine-id filter=git-crypt-patate diff=git-crypt-patate
(removeAttrs
(lib.filterAttrs (peerName: _: config.networking.wireguard.${wgIface}.peers.${peerName}.enable) peers)
[hostName]);
- privateKeyFile = "$CREDENTIALS_DIRECTORY/privateKey";
+ privateKeyFile = "\$CREDENTIALS_DIRECTORY/privateKey";
# Set the MTU to a minimum
# (IPv4 requires at least 68 but it's 1280 for IPv6).