niksos/hosts/niks/configuration.nix
jacekpoz 7bde656c9f
ssh-agent (this shit is crazy read the whole commit message)
so first when I wanted to configure ssh to use the correct keys by
default I found some guide that used IdentitiesOnly yes so I used it
too without even knowing what it does

then later when I wanted to nix my ssh config I noticed that it's set to
true and didn't know what it does so I read the manpage

I wrote the description of the `indentitiesOnly` option of my wrapper
module based on that but I didn't really understand what it actually
does

well, as you can see in the commit history, a day or two ago (forgot) I
started using an ssh key to sign my commits and to make things even more
convenient I moved all of my private ssh keys to my keepassxc database
as attachments

I tested it on my main laptop and everything worked fine but on that
laptop all the keys were still in ~/.ssh as I didn't just want to
immediately delete them and risk losing any

well that's what hid this bug - on the main laptop when pushing, it just
used the keys in ~/.ssh, which I don't have on this laptop (the one I
take to classes) because, well, I did this not to have to copy both the
keepassxc database and ~/.ssh between machines - I only copied the
keepassxc database as it had all the keys in it

well turns out with the config before this commit, it would only try to
use keys in ~/.ssh which aren't - and won't - be here so it failed

this option makes it actually use keys supplied by ssh-agent, which
keepassxc acts as and is the only way to get them in the current setup
2024-03-05 17:43:10 +01:00

274 lines
9.2 KiB
Nix

{
config,
pkgs,
...
}: {
nixpkgs.config = {
permittedInsecurePackages = [
"python-2.7.18.6"
"electron-24.8.6"
"electron-25.9.0"
];
allowUnfree = true;
};
boot = {
kernelPackages = pkgs.linuxPackages_xanmod_latest;
extraModulePackages = with config.boot.kernelPackages; [ ddcci-driver ];
kernelModules = [ "ddcci" ];
kernelParams = [
"video=eDP-1:2560x1440@165"
"video=HDMI-A-1:2560x1440@144"
];
};
time.timeZone = "Europe/Warsaw";
nix = {
settings = {
max-jobs = 3;
cores = 4;
substituters = [
"https://nix-community.cachix.org"
"https://nixpkgs-wayland.cachix.org"
"https://viperml.cachix.org"
];
trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA="
"viperml.cachix.org-1:qZhKBMTfmcLL+OG6fj/hzsMEedgKvZVFRRAhq7j8Vh8="
];
};
};
programs.dconf.enable = true;
security.sudo.package = pkgs.sudo.override { withInsults = true; };
security.polkit.enable = true;
environment.sessionVariables = {
CHROME_EXECUTABLE = "${pkgs.ungoogled-chromium}/bin/chromium";
};
services = {
pcscd.enable = true;
udisks2.enable = true;
dbus.enable = true;
fwupd = {
enable = true;
};
ratbagd.enable = true;
};
programs.gnupg.agent = {
enable = true;
pinentryFlavor = "qt";
enableSSHSupport = true;
};
services.btrfs = {
autoScrub = {
enable = true;
interval = "weekly";
};
};
services.journald = {
extraConfig = ''
SystemMaxUse=100M
'';
};
services.udev = {
packages = with pkgs; [
yubikey-personalization
];
};
# this makes usb devices autosuspend
#powerManagement.powertop.enable = true;
programs.kdeconnect.enable = true;
programs.noisetorch.enable = true;
myOptions = {
other = {
system = {
hostname = "niks";
username = "jacek";
};
home-manager = {
enable = true;
enableDirenv = true;
};
};
programs = {
git = {
enable = true;
userName = "jacekpoz";
userEmail = "jacekpoz@cock.li";
signingKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHXD1EM4mQz99vJhmZX1r7kwMd8yewogOuoTUuv1xWZB";
defaultBranch = "master";
};
starship.enable = true;
zsh = {
enable = true;
extraAliases = {
#u = "nh os switch \"/home/jacek/niksos\" -H niks -- --use-remote-sudo";
#us = "NIX_SSHOPTS='-t' nh os switch \"/home/jacek/niksos\" -H chmura -- --use-remote-sudo --target-host chmura";
u = "nixos-rebuild switch --flake \"/home/jacek/niksos#niks\" -L --use-remote-sudo";
us = "NIX_SSHOPTS='-t' nixos-rebuild switch --flake \"/home/jacek/niksos#chmura\" -L --use-remote-sudo --target-host chmura";
};
profiling = false;
};
anyrun.enable = true;
armcord.enable = true;
vesktop.enable = true;
btop.enable = true;
firefox = {
enable = true;
defaultSearchEngine = "NotASearx";
searchEngines = {
"NotASearx" = {
url = "https://search.notashelf.dev/search?q={searchTerms}";
faviconUrl = "https://search.notashelf.dev/favicon.ico";
aliases = [ "!sx" ];
};
"NixOS Packages" = {
url = "https://search.nixos.org/packages?channel=unstable&query={searchTerms}";
faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
aliases = [ "!np" ];
};
"NixOS Options" = {
url = "https://search.nixos.org/options?channel=unstable&query={searchTerms}";
faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
aliases = [ "!no" ];
};
"NixOS Wiki" = {
url = "https://nixos.wiki/index.php?search={searchTerms}";
faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
aliases = [ "!nw" ];
};
"Home Manger Option Search" = {
url = "https://mipmip.github.io/home-manager-option-search?query={searchTerms}";
faviconPath = "${pkgs.nixos-icons}/share/icons/hicolor/scalable/apps/nix-snowflake.svg";
aliases = [ "!hm" ];
};
"Arch Wiki" = {
url = "https://wiki.archlinux.org/index.php?search={searchTerms}";
faviconUrl = "https://archlinux.org/favicon.ico";
aliases = [ "!aw" ];
};
"Gentoo Wiki" = {
url = "https://wiki.gentoo.org/index.php?search={searchTerms}";
faviconUrl = "https://www.gentoo.org/favicon.ico";
aliases = [ "!gw" ];
};
"Debian Wiki" = {
url = "https://wiki.debian.org/FrontPage?action=fullsearch&value={searchTerms}";
faviconUrl = "https://www.debian.org/favicon.ico";
aliases = [ "!dw" ];
};
};
};
foot.enable = true;
mpv.enable = true;
osu = {
enable = true;
enableStable = true;
};
neovim.enable = true;
swaylock.enable = true;
waybar.enable = true;
zathura.enable = true;
hyprland = {
enable = true;
startupSound = ./mathis.m4a;
};
helix.enable = true;
newsboat.enable = true;
};
themes = {
cursor = {
enable = true;
package = pkgs.bibata-cursors;
name = "Bibata-Modern-Classic";
size = 24;
};
gtk = {
enable = true;
package = pkgs.catppuccin-gtk;
name = "Catppuccin-Mocha-Standard-Green-Dark";
variant = "mocha";
accentColour = "green";
iconTheme = {
name = "Papirus-Dark";
package = pkgs.catppuccin-papirus-folders;
};
};
qt = {
enable = true;
package = pkgs.catppuccin-kde;
name = "Catppuccin-Mocha-Dark";
variant = "mocha";
accentColour = "green";
};
};
services = {
dunst.enable = true;
mpd.enable = true;
greetd = {
enable = true;
greeter = "gtkgreet";
launchOptions = [
"Hyprland"
"sway"
"zsh"
"reboot"
"shutdown now"
];
};
ssh = {
daemon.enable = false;
agent = {
enable = true;
hostAliases = {
"github".hostName = "github.com";
"git.dupa.edu.pl".hostName = "git.dupa.edu.pl";
"codeberg".hostName = "codeberg.org";
"gitlab".hostName = "gitlab.com";
"aur" = {
hostName = "aur.archlinux.org";
user = "aur";
};
"jacekpoz" = {
hostName = "git.jacekpoz.pl";
user = "forgejo";
};
"chmura" = {
hostName = "192.168.15.2";
user = "chmura";
};
"chmura2" = {
hostName = "jacekpoz.pl";
user = "chmura";
};
"malina" = {
hostName = "192.168.15.3";
user = "malina";
};
"outfoxxed".hostName = "git.outfoxxed.me";
};
};
};
pipewire.enable = true;
};
};
system.stateVersion = "23.11";
}