mirror of
https://github.com/srid/nixos-config.git
synced 2026-02-22 21:05:22 +08:00
pureintent: reborn
This commit is contained in:
parent
0779884c9c
commit
7cc72327f6
13 changed files with 28 additions and 41 deletions
|
|
@ -58,9 +58,6 @@
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
description = "Sridhar Ratnakumar";
|
description = "Sridhar Ratnakumar";
|
||||||
extraGroups = [ "networkmanager" "wheel" ];
|
extraGroups = [ "networkmanager" "wheel" ];
|
||||||
packages = with pkgs; [
|
|
||||||
# thunderbird
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# Install firefox.
|
# Install firefox.
|
||||||
|
|
|
||||||
|
|
@ -6,8 +6,8 @@ let
|
||||||
homeMod = self + /modules/home;
|
homeMod = self + /modules/home;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
nixos-unified.sshTarget = "srid@pureintent";
|
# nixos-unified.sshTarget = "srid@pureintent";
|
||||||
# nixos-unified.sshTarget = "srid@192.168.2.244";
|
nixos-unified.sshTarget = "srid@192.168.2.134";
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
self.nixosModules.default
|
self.nixosModules.default
|
||||||
|
|
@ -20,8 +20,8 @@ in
|
||||||
"${homeMod}/work/juspay.nix"
|
"${homeMod}/work/juspay.nix"
|
||||||
"${homeMod}/services/vira.nix"
|
"${homeMod}/services/vira.nix"
|
||||||
|
|
||||||
"${homeMod}/services/dropbox.nix"
|
# "${homeMod}/services/dropbox.nix"
|
||||||
"${homeMod}/services/obsidian.nix"
|
# "${homeMod}/services/obsidian.nix"
|
||||||
|
|
||||||
# Remote builders
|
# Remote builders
|
||||||
"${homeMod}/nix/buildMachines"
|
"${homeMod}/nix/buildMachines"
|
||||||
|
|
|
||||||
|
|
@ -16,28 +16,19 @@
|
||||||
|
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{
|
{
|
||||||
device = "/dev/disk/by-uuid/7fc31294-d580-42c2-b23e-ddb46e4a2b39";
|
device = "/dev/disk/by-uuid/c2fe2413-786c-4c43-b143-9981e7e817ab";
|
||||||
fsType = "ext4";
|
fsType = "ext4";
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.initrd.luks.devices."luks-dc6e2287-6e40-48c8-ba65-7f33194ae034".device = "/dev/disk/by-uuid/dc6e2287-6e40-48c8-ba65-7f33194ae034";
|
|
||||||
|
|
||||||
fileSystems."/boot" =
|
fileSystems."/boot" =
|
||||||
{
|
{
|
||||||
device = "/dev/disk/by-uuid/3045-7CCA";
|
device = "/dev/disk/by-uuid/8C9E-8DA5";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
options = [ "fmask=0077" "dmask=0077" ];
|
options = [ "fmask=0077" "dmask=0077" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
swapDevices = [ ];
|
swapDevices =
|
||||||
|
[{ device = "/dev/disk/by-uuid/94175b4f-1ef4-4f96-8484-359592b8700f"; }];
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
|
||||||
networking.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
|
||||||
# networking.interfaces.wlp2s0.useDHCP = lib.mkDefault true;
|
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
|
|
||||||
|
|
@ -3,8 +3,8 @@
|
||||||
# Configure remote building to sincereintent (macOS builder)
|
# Configure remote building to sincereintent (macOS builder)
|
||||||
nix.buildMachines = [
|
nix.buildMachines = [
|
||||||
{
|
{
|
||||||
# hostName = "sincereintent"; TAILSCALE problem
|
hostName = "sincereintent";
|
||||||
hostName = "192.168.2.245"; # ethernet
|
# hostName = "192.168.2.137"; # wifi
|
||||||
sshUser = "srid";
|
sshUser = "srid";
|
||||||
systems = [ "aarch64-darwin" ];
|
systems = [ "aarch64-darwin" ];
|
||||||
protocol = "ssh-ng";
|
protocol = "ssh-ng";
|
||||||
|
|
|
||||||
BIN
secrets/beszel-agent-key.age
generated
BIN
secrets/beszel-agent-key.age
generated
Binary file not shown.
BIN
secrets/github-nix-ci/emaletter.token.age
generated
BIN
secrets/github-nix-ci/emaletter.token.age
generated
Binary file not shown.
BIN
secrets/github-nix-ci/srid.token.age
generated
BIN
secrets/github-nix-ci/srid.token.age
generated
Binary file not shown.
BIN
secrets/gmail-app-password.age
generated
BIN
secrets/gmail-app-password.age
generated
Binary file not shown.
17
secrets/hackage-password.age
generated
17
secrets/hackage-password.age
generated
|
|
@ -1,10 +1,9 @@
|
||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 96IXNQ HmkQjnB89LYi1B9uuKijjY+2rbasHwwjwCepD13ki1Y
|
-> ssh-ed25519 96IXNQ Y595dWBc6WuPd62Mi+5AbhQvKOBdRZ9Oy3+6Dlr+Rzc
|
||||||
79ieKetZcWLKMB7QpalExQ8JUksNM4TM/UzACoJzL88
|
cQEXFrTBhw3OjYXjPC05v69IcZ2WG0Si4VF/ZGXR61Q
|
||||||
-> ssh-ed25519 It7HZQ CpSuqMO/s9X2gBccHbWD4h40O2WSfaXlXRlZlUum6Uc
|
-> ssh-ed25519 It7HZQ VzFtalRJ223VJNMfN/ROJgbJYTS5Msm8mmfO2rOKzSg
|
||||||
TMhDOLjCz/UpOgMAtf0vBih2uEZnBz2VkGqaOD+4Xtk
|
4HgKuYanZMF5xj2U+NSOznZgVtoqLbx5lzli3pw0YR4
|
||||||
-> ssh-ed25519 96tIZg Op6i6DAXYghLEBDGR4VXmfPgnDoA7c96jE6jRv9GcWA
|
-> ssh-ed25519 0mMrRw /jdLb3C3IwDfiuNj5w64I2reJukDpxpbl1XW5Qor/AM
|
||||||
s/FbEOowcWHLuH/3mmONgADTsfU7b8gniLgvXkHQ+yg
|
BRRw80y0jD/AyHAPDKuzntITfXxBhbbV032VDXNWquc
|
||||||
--- xFxBJUQOZ88Z5f+vIPb0LGWDSyYjUWEk4faoVAob/x0
|
--- xYZt4xQXZwYUi/rgDC2t5DQY4uOYxocRSQ5TC4TAkX4
|
||||||
p_öœu‹R¦^`lÚÐK.
|
²<Ò@<40>Ô(©œhG´d¼öäÑi{¹ðœî]s2ã1úC<C3BA>1XH_ñ$À#ˆËÌD:
|
||||||
Í^:‚ñ‚.wt˜yÛ 9àði<C3B0>â$½ž<C2BD>*!;ÿ?Í
|
|
||||||
18
secrets/hedgedoc.env.age
generated
18
secrets/hedgedoc.env.age
generated
|
|
@ -1,10 +1,10 @@
|
||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 96IXNQ +6SotJQCX37NvPr2Sh6Pc0H250FhMiCqi3tbfgNBckU
|
-> ssh-ed25519 96IXNQ x8owtTcts7rCG3TlPR3lPAAFT11sY3eYVL2orCLuYTw
|
||||||
GkYcKhZZqXy11xew/KglBfZH52S46nwh0GFue/8f+6I
|
1vVZytuX/gsa8GWVASB7kz63STlqWLyRpzHV9S82nOc
|
||||||
-> ssh-ed25519 It7HZQ NiVK3C7F9KRzhrRKU1QKZDyH93Lr/o0lphg5WdlKlwc
|
-> ssh-ed25519 It7HZQ gvG68k2PMauXuaf/uM9uNDSh0sd6le3KN2diMsgFq0g
|
||||||
Oo/vMQiV3f9F8nI5LPuOLbWXCjK4bRhPSronLxKJHAc
|
p3sNlEUXFjUCxcFhZxSSdFsQ2Cu0haEusAFhnOe69gw
|
||||||
-> ssh-ed25519 96tIZg 2C9R58/lYjD/yK7bm1O1P7PujSOExAUcLySci51PLgk
|
-> ssh-ed25519 0mMrRw A7nVlyTozQa0vq8miGL10ee7QlgP5UOGIH29DWhB6WU
|
||||||
54fmarH5rT6ltYQWBH2WL94wngo/ddUySbuCCvh8oXA
|
m6GJmLyggY+FTDoKCRrEeBkercdIEklXXJNhgB7Gqzg
|
||||||
--- z5Mm++4Pmq4L18oDFg6P/z4ofUmf1PPwuxVFGGOdze4
|
--- HyiKHIlyxUJnGyIe2pp1Mp6voHSgHkYFIqQ7ev3JU5g
|
||||||
Ü·`®Č#ŠáëĆÔXĹk{ܬůćLť&@ąź×˙†*!Ybf~ ĆËCţ<19>DňŰřן™îa–vˇĺăX‚o• j„O|é<‰IÚ‡¤ďQjşÂµ<>Śt<Lkóyú®ľţ8aÁłPÉĆ®żjŚh†o
|
[›‰êÅ=[Hý½HJ É]åÕöÒp¢
|
||||||
ŕpłÁô5ů|žwYLD Ń´m·
|
œú”R"à,ä<01>†G› CÅy²ŸOàÓä:f†ª¤9R /V×|‘³<E28098>¾Ä‡Õ!<21>cÊ&¯(”_Š»ögÚ¯—tIÑ»ÿ“ˆ7gð%×LÃðÎ'ÀgÒÉ‹ò†Ÿc/a/©qÑÐÉŸ;r†i !Gsà
|
||||||
BIN
secrets/juspay-anthropic-api-key.age
generated
BIN
secrets/juspay-anthropic-api-key.age
generated
Binary file not shown.
BIN
secrets/pureintent-basic-auth.age
generated
BIN
secrets/pureintent-basic-auth.age
generated
Binary file not shown.
|
|
@ -6,7 +6,7 @@ let
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJYQQXPMHYBtRcPzSkjQ3oqyje8T4UlCpbr6XjrlzzlK srid@zest"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJYQQXPMHYBtRcPzSkjQ3oqyje8T4UlCpbr6XjrlzzlK srid@zest"
|
||||||
];
|
];
|
||||||
|
|
||||||
pureintent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJUzYd7ys2gzx0Zu7yZDjZaRdUHDZIVahyVgaU2w2Ms8 root@nixos";
|
pureintent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKfR7GnwrIVemP/1kna8jboNRegIsaVL6mTi3oXwMdU";
|
||||||
systems = [
|
systems = [
|
||||||
pureintent
|
pureintent
|
||||||
];
|
];
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue