mirror of
https://github.com/srid/nixos-config.git
synced 2026-02-22 04:45:20 +08:00
pureintent: reborn
This commit is contained in:
parent
0779884c9c
commit
7cc72327f6
13 changed files with 28 additions and 41 deletions
|
|
@ -58,9 +58,6 @@
|
|||
isNormalUser = true;
|
||||
description = "Sridhar Ratnakumar";
|
||||
extraGroups = [ "networkmanager" "wheel" ];
|
||||
packages = with pkgs; [
|
||||
# thunderbird
|
||||
];
|
||||
};
|
||||
|
||||
# Install firefox.
|
||||
|
|
|
|||
|
|
@ -6,8 +6,8 @@ let
|
|||
homeMod = self + /modules/home;
|
||||
in
|
||||
{
|
||||
nixos-unified.sshTarget = "srid@pureintent";
|
||||
# nixos-unified.sshTarget = "srid@192.168.2.244";
|
||||
# nixos-unified.sshTarget = "srid@pureintent";
|
||||
nixos-unified.sshTarget = "srid@192.168.2.134";
|
||||
|
||||
imports = [
|
||||
self.nixosModules.default
|
||||
|
|
@ -20,8 +20,8 @@ in
|
|||
"${homeMod}/work/juspay.nix"
|
||||
"${homeMod}/services/vira.nix"
|
||||
|
||||
"${homeMod}/services/dropbox.nix"
|
||||
"${homeMod}/services/obsidian.nix"
|
||||
# "${homeMod}/services/dropbox.nix"
|
||||
# "${homeMod}/services/obsidian.nix"
|
||||
|
||||
# Remote builders
|
||||
"${homeMod}/nix/buildMachines"
|
||||
|
|
|
|||
|
|
@ -16,28 +16,19 @@
|
|||
|
||||
fileSystems."/" =
|
||||
{
|
||||
device = "/dev/disk/by-uuid/7fc31294-d580-42c2-b23e-ddb46e4a2b39";
|
||||
device = "/dev/disk/by-uuid/c2fe2413-786c-4c43-b143-9981e7e817ab";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
boot.initrd.luks.devices."luks-dc6e2287-6e40-48c8-ba65-7f33194ae034".device = "/dev/disk/by-uuid/dc6e2287-6e40-48c8-ba65-7f33194ae034";
|
||||
|
||||
fileSystems."/boot" =
|
||||
{
|
||||
device = "/dev/disk/by-uuid/3045-7CCA";
|
||||
device = "/dev/disk/by-uuid/8C9E-8DA5";
|
||||
fsType = "vfat";
|
||||
options = [ "fmask=0077" "dmask=0077" ];
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlp2s0.useDHCP = lib.mkDefault true;
|
||||
swapDevices =
|
||||
[{ device = "/dev/disk/by-uuid/94175b4f-1ef4-4f96-8484-359592b8700f"; }];
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
|
|
|
|||
|
|
@ -3,8 +3,8 @@
|
|||
# Configure remote building to sincereintent (macOS builder)
|
||||
nix.buildMachines = [
|
||||
{
|
||||
# hostName = "sincereintent"; TAILSCALE problem
|
||||
hostName = "192.168.2.245"; # ethernet
|
||||
hostName = "sincereintent";
|
||||
# hostName = "192.168.2.137"; # wifi
|
||||
sshUser = "srid";
|
||||
systems = [ "aarch64-darwin" ];
|
||||
protocol = "ssh-ng";
|
||||
|
|
|
|||
BIN
secrets/beszel-agent-key.age
generated
BIN
secrets/beszel-agent-key.age
generated
Binary file not shown.
BIN
secrets/github-nix-ci/emaletter.token.age
generated
BIN
secrets/github-nix-ci/emaletter.token.age
generated
Binary file not shown.
BIN
secrets/github-nix-ci/srid.token.age
generated
BIN
secrets/github-nix-ci/srid.token.age
generated
Binary file not shown.
BIN
secrets/gmail-app-password.age
generated
BIN
secrets/gmail-app-password.age
generated
Binary file not shown.
17
secrets/hackage-password.age
generated
17
secrets/hackage-password.age
generated
|
|
@ -1,10 +1,9 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 96IXNQ HmkQjnB89LYi1B9uuKijjY+2rbasHwwjwCepD13ki1Y
|
||||
79ieKetZcWLKMB7QpalExQ8JUksNM4TM/UzACoJzL88
|
||||
-> ssh-ed25519 It7HZQ CpSuqMO/s9X2gBccHbWD4h40O2WSfaXlXRlZlUum6Uc
|
||||
TMhDOLjCz/UpOgMAtf0vBih2uEZnBz2VkGqaOD+4Xtk
|
||||
-> ssh-ed25519 96tIZg Op6i6DAXYghLEBDGR4VXmfPgnDoA7c96jE6jRv9GcWA
|
||||
s/FbEOowcWHLuH/3mmONgADTsfU7b8gniLgvXkHQ+yg
|
||||
--- xFxBJUQOZ88Z5f+vIPb0LGWDSyYjUWEk4faoVAob/x0
|
||||
p_öœu‹R¦^`lÚÐK.
|
||||
Í^:‚ñ‚.wt˜yÛ 9àði<C3B0>â$½ž<C2BD>*!;ÿ?Í
|
||||
-> ssh-ed25519 96IXNQ Y595dWBc6WuPd62Mi+5AbhQvKOBdRZ9Oy3+6Dlr+Rzc
|
||||
cQEXFrTBhw3OjYXjPC05v69IcZ2WG0Si4VF/ZGXR61Q
|
||||
-> ssh-ed25519 It7HZQ VzFtalRJ223VJNMfN/ROJgbJYTS5Msm8mmfO2rOKzSg
|
||||
4HgKuYanZMF5xj2U+NSOznZgVtoqLbx5lzli3pw0YR4
|
||||
-> ssh-ed25519 0mMrRw /jdLb3C3IwDfiuNj5w64I2reJukDpxpbl1XW5Qor/AM
|
||||
BRRw80y0jD/AyHAPDKuzntITfXxBhbbV032VDXNWquc
|
||||
--- xYZt4xQXZwYUi/rgDC2t5DQY4uOYxocRSQ5TC4TAkX4
|
||||
²<Ò@<40>Ô(©œhG´d¼öäÑi{¹ðœî]s2ã1úC<C3BA>1XH_ñ$À#ˆËÌD:
|
||||
18
secrets/hedgedoc.env.age
generated
18
secrets/hedgedoc.env.age
generated
|
|
@ -1,10 +1,10 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 96IXNQ +6SotJQCX37NvPr2Sh6Pc0H250FhMiCqi3tbfgNBckU
|
||||
GkYcKhZZqXy11xew/KglBfZH52S46nwh0GFue/8f+6I
|
||||
-> ssh-ed25519 It7HZQ NiVK3C7F9KRzhrRKU1QKZDyH93Lr/o0lphg5WdlKlwc
|
||||
Oo/vMQiV3f9F8nI5LPuOLbWXCjK4bRhPSronLxKJHAc
|
||||
-> ssh-ed25519 96tIZg 2C9R58/lYjD/yK7bm1O1P7PujSOExAUcLySci51PLgk
|
||||
54fmarH5rT6ltYQWBH2WL94wngo/ddUySbuCCvh8oXA
|
||||
--- z5Mm++4Pmq4L18oDFg6P/z4ofUmf1PPwuxVFGGOdze4
|
||||
Ü·`®Č#ŠáëĆÔXĹk{ܬůćLť&@ąź×˙†*!Ybf~ ĆËCţ<19>DňŰřן™îa–vˇĺăX‚o• j„O|é<‰IÚ‡¤ďQjşÂµ<>Śt<Lkóyú®ľţ8aÁłPÉĆ®żjŚh†o
|
||||
ŕpłÁô5ů|žwYLD Ń´m·
|
||||
-> ssh-ed25519 96IXNQ x8owtTcts7rCG3TlPR3lPAAFT11sY3eYVL2orCLuYTw
|
||||
1vVZytuX/gsa8GWVASB7kz63STlqWLyRpzHV9S82nOc
|
||||
-> ssh-ed25519 It7HZQ gvG68k2PMauXuaf/uM9uNDSh0sd6le3KN2diMsgFq0g
|
||||
p3sNlEUXFjUCxcFhZxSSdFsQ2Cu0haEusAFhnOe69gw
|
||||
-> ssh-ed25519 0mMrRw A7nVlyTozQa0vq8miGL10ee7QlgP5UOGIH29DWhB6WU
|
||||
m6GJmLyggY+FTDoKCRrEeBkercdIEklXXJNhgB7Gqzg
|
||||
--- HyiKHIlyxUJnGyIe2pp1Mp6voHSgHkYFIqQ7ev3JU5g
|
||||
[›‰êÅ=[Hý½HJ É]åÕöÒp¢
|
||||
œú”R"à,ä<01>†G› CÅy²ŸOàÓä:f†ª¤9R /V×|‘³<E28098>¾Ä‡Õ!<21>cÊ&¯(”_Š»ögÚ¯—tIÑ»ÿ“ˆ7gð%×LÃðÎ'ÀgÒÉ‹ò†Ÿc/a/©qÑÐÉŸ;r†i !Gsà
|
||||
BIN
secrets/juspay-anthropic-api-key.age
generated
BIN
secrets/juspay-anthropic-api-key.age
generated
Binary file not shown.
BIN
secrets/pureintent-basic-auth.age
generated
BIN
secrets/pureintent-basic-auth.age
generated
Binary file not shown.
|
|
@ -6,7 +6,7 @@ let
|
|||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJYQQXPMHYBtRcPzSkjQ3oqyje8T4UlCpbr6XjrlzzlK srid@zest"
|
||||
];
|
||||
|
||||
pureintent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJUzYd7ys2gzx0Zu7yZDjZaRdUHDZIVahyVgaU2w2Ms8 root@nixos";
|
||||
pureintent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKfR7GnwrIVemP/1kna8jboNRegIsaVL6mTi3oXwMdU";
|
||||
systems = [
|
||||
pureintent
|
||||
];
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue