summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLeonardo Santiago <[email protected]>2024-05-12 11:33:54 -0300
committerLeonardo Santiago <[email protected]>2024-05-12 11:33:54 -0300
commit4f3efae46a91aae61e3d0d979670d388902d33a9 (patch)
tree7d8f2764934a76e6bc7527e7316f158c083fd9c3
parentfe3eda350da50bd8d7951adf915a78fbb444b0f2 (diff)
update stuff to make new framework laptop work.
-rw-r--r--flake.lock88
-rw-r--r--flake.nix14
-rw-r--r--hosts/larissa/configuration.nix127
-rw-r--r--hosts/larissa/hardware-configuration.nix43
-rw-r--r--modules/emacs/README.org7
-rw-r--r--modules/gnome-config.nix11
-rw-r--r--modules/gnome.nix1
-rw-r--r--secrets/authinfo.agebin1142 -> 1252 bytes
-rw-r--r--secrets/personal-mail.age26
-rw-r--r--secrets/secrets.nix5
-rw-r--r--secrets/university-mail.age27
-rw-r--r--secrets/work-mail.age26
-rw-r--r--users/leonardo.nix4
13 files changed, 212 insertions, 167 deletions
diff --git a/flake.lock b/flake.lock
index be441ec..ed925eb 100644
--- a/flake.lock
+++ b/flake.lock
@@ -103,24 +103,6 @@
"type": "github"
}
},
- "flake-utils_2": {
- "inputs": {
- "systems": "systems_3"
- },
- "locked": {
- "lastModified": 1709126324,
- "narHash": "sha256-q6EQdSeUZOG26WelxqkmR7kArjgWCdw5sfJVHPH/7j8=",
- "owner": "numtide",
- "repo": "flake-utils",
- "rev": "d465f4819400de7c8d874d50b982301f28a84605",
- "type": "github"
- },
- "original": {
- "owner": "numtide",
- "repo": "flake-utils",
- "type": "github"
- }
- },
"from-elisp": {
"flake": false,
"locked": {
@@ -157,27 +139,6 @@
"type": "github"
}
},
- "mixrank": {
- "inputs": {
- "flake-utils": "flake-utils_2",
- "nixpkgs_latest": "nixpkgs_latest",
- "nixpkgs_old": "nixpkgs_old"
- },
- "locked": {
- "lastModified": 1715264320,
- "narHash": "sha256-1728gtHhlPQqGiyMtBaO7GYRKwg2O1SafDYbXzNRQXQ=",
- "ref": "2024-05-06-hosts-in-nix",
- "rev": "39cec387d9b3e665e384b23b38bb0fe714d5fcdb",
- "revCount": 62072,
- "type": "git",
- "url": "ssh://[email protected]/mixrank/mixrank"
- },
- "original": {
- "ref": "2024-05-06-hosts-in-nix",
- "type": "git",
- "url": "ssh://[email protected]/mixrank/mixrank"
- }
- },
"nixpkgs": {
"locked": {
"lastModified": 1715266358,
@@ -210,39 +171,6 @@
"type": "github"
}
},
- "nixpkgs_latest": {
- "locked": {
- "lastModified": 1677018132,
- "narHash": "sha256-o1v+S9cn3M5wwBT7+5YdWPDRRkIpe2uAjzNGLnnJPm8=",
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "581e3f902954cbf7b6eec7b04deb41b23fcb6b7a",
- "type": "github"
- },
- "original": {
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "581e3f902954cbf7b6eec7b04deb41b23fcb6b7a",
- "type": "github"
- }
- },
- "nixpkgs_old": {
- "flake": false,
- "locked": {
- "lastModified": 1568853802,
- "narHash": "sha256-eFyFVDVExwB1aGHVmemgh57EAcTs5rekWhlPnxAowu8=",
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "2c906666e54c9f050b4a25142b4ff0e73c9b7dcc",
- "type": "github"
- },
- "original": {
- "owner": "NixOS",
- "repo": "nixpkgs",
- "rev": "2c906666e54c9f050b4a25142b4ff0e73c9b7dcc",
- "type": "github"
- }
- },
"root": {
"inputs": {
"agenix": "agenix",
@@ -250,7 +178,6 @@
"firefox-gnome-theme": "firefox-gnome-theme",
"from-elisp": "from-elisp",
"home-manager": "home-manager",
- "mixrank": "mixrank",
"nixpkgs": "nixpkgs"
}
},
@@ -283,21 +210,6 @@
"repo": "default",
"type": "github"
}
- },
- "systems_3": {
- "locked": {
- "lastModified": 1681028828,
- "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
- "owner": "nix-systems",
- "repo": "default",
- "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
- "type": "github"
- },
- "original": {
- "owner": "nix-systems",
- "repo": "default",
- "type": "github"
- }
}
},
"root": "root",
diff --git a/flake.nix b/flake.nix
index e42b86d..0ea81e5 100644
--- a/flake.nix
+++ b/flake.nix
@@ -35,16 +35,14 @@
url = "github:rafaelmardojai/firefox-gnome-theme";
flake = false;
};
- mixrank.url = "git+ssh://[email protected]/mixrank/mixrank?ref=2024-05-06-hosts-in-nix";
+ #mixrank.url = "git+ssh://[email protected]/mixrank/mixrank?ref=2024-05-06-hosts-in-nix";
};
- outputs = { self, nixpkgs, home-manager, agenix, mixrank, ... } @ inputs :
+ outputs = { self, nixpkgs, home-manager, agenix, ... } @ inputs :
let
+ inherit (builtins) listToAttrs readDir attrNames;
system = "x86_64-linux";
- hosts = [
- "hanekawa" # notebook
- "kunagisa" # workstation
- ];
+ hosts = attrNames (readDir ./hosts);
defaultNixosSystem = host: nixpkgs.lib.nixosSystem {
inherit system;
specialArgs = { inherit inputs; };
@@ -53,11 +51,11 @@
./users/leonardo.nix
home-manager.nixosModules.home-manager
agenix.nixosModules.default
- mixrank.nixosModules.${system}.dev-machine
+ # mixrank.nixosModules.${system}.dev-machine
];
};
in {
- nixosConfigurations = builtins.listToAttrs
+ nixosConfigurations = listToAttrs
(map (host: {name = host; value = defaultNixosSystem host; }) hosts);
};
}
diff --git a/hosts/larissa/configuration.nix b/hosts/larissa/configuration.nix
index b007ebd..499d6ea 100644
--- a/hosts/larissa/configuration.nix
+++ b/hosts/larissa/configuration.nix
@@ -1,21 +1,120 @@
-{ config, pkgs, lib, ... }:
+# Edit this configuration file to define what should be installed on
+# your system. Help is available in the configuration.nix(5) man page
+# and in the NixOS manual (accessible by running ‘nixos-help’).
+
+{ config, pkgs, ... }:
+
{
imports =
- [
- <nixos-hardware/raspberry-pi/4>
+ [ # Include the results of the hardware scan.
./hardware-configuration.nix
];
- hardware = {
- raspberry-pi."4".apply-overlays-dtmerge.enable = true;
- deviceTree = {
- enable = true;
- filter = "*rpi-4-*.dtb";
+
+ # this system has a fingerprint reader.
+ services.fprintd.enable = true;
+
+ services.fwupd = {
+ enable = true;
+ package = (import (builtins.fetchTarball {
+ url = "https://github.com/NixOS/nixpkgs/archive/bb2009ca185d97813e75736c2b8d1d8bb81bde05.tar.gz";
+ sha256 = "sha256:003qcrsq5g5lggfrpq31gcvj82lb065xvr7bpfa8ddsw8x4dnysk";
+ }) {
+ inherit (pkgs) system;
+ }).fwupd;
+
+ };
+
+ # Bootloader.
+ boot.loader.systemd-boot.enable = true;
+ boot.loader.efi.canTouchEfiVariables = true;
+
+ networking.hostName = "larissa"; # Define your hostname.
+ # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
+
+ # Configure network proxy if necessary
+ # networking.proxy.default = "http://user:password@proxy:port/";
+ # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
+
+ # Enable networking
+ networking.networkmanager.enable = true;
+
+ # Set your time zone.
+ time.timeZone = "America/Sao_Paulo";
+
+ # Select internationalisation properties.
+ i18n.defaultLocale = "en_US.UTF-8";
+
+ i18n.extraLocaleSettings = {
+ LC_ADDRESS = "pt_BR.UTF-8";
+ LC_IDENTIFICATION = "pt_BR.UTF-8";
+ LC_MEASUREMENT = "pt_BR.UTF-8";
+ LC_MONETARY = "pt_BR.UTF-8";
+ LC_NAME = "pt_BR.UTF-8";
+ LC_NUMERIC = "pt_BR.UTF-8";
+ LC_PAPER = "pt_BR.UTF-8";
+ LC_TELEPHONE = "pt_BR.UTF-8";
+ LC_TIME = "pt_BR.UTF-8";
+ };
+
+ services.touchegg.enable = true;
+ # Configure keymap in X11
+ services.xserver = {
+ enable = true;
+ xkb = {
+ variant = "abnt2";
+ layout = "br";
};
};
- console.enable = false;
- environment.systemPackages = with pkgs; [
- libraspberrypi
- raspberrypi-eeprom
- ];
- system.stateVersion = "23.11";
+ services.libinput = {
+ enable = true;
+ touchpad = {
+ tapping = true;
+ scrollMethod = "twofinger";
+ clickMethod = "clickfinger";
+ tappingButtonMap = "lrm";
+ };
+ };
+
+ console.keyMap = "br-abnt2";
+ # Enable CUPS to print documents.
+ services.printing.enable = true;
+
+ # Enable sound with pipewire.
+ sound.enable = true;
+ hardware.pulseaudio.enable = false;
+ security.rtkit.enable = true;
+ services.pipewire = {
+ enable = true;
+ alsa.enable = true;
+ alsa.support32Bit = true;
+ pulse.enable = true;
+ # If you want to use JACK applications, uncomment this
+ #jack.enable = true;
+
+ # use the example session manager (no others are packaged yet so this is enabled by default,
+ # no need to redefine it in your config for now)
+ #media-session.enable = true;
+ };
+
+ # Enable touchpad support (enabled default in most desktopManager).
+ # services.xserver.libinput.enable = true;
+ # List services that you want to enable:
+
+ # Enable the OpenSSH daemon.
+ # services.openssh.enable = true;
+
+ # Open ports in the firewall.
+ # networking.firewall.allowedTCPPorts = [ ... ];
+ # networking.firewall.allowedUDPPorts = [ ... ];
+ # Or disable the firewall altogether.
+ # networking.firewall.enable = false;
+
+ # This value determines the NixOS release from which the default
+ # settings for stateful data, like file locations and database versions
+ # on your system were taken. It‘s perfectly fine and recommended to leave
+ # this value at the release version of the first install of this system.
+ # Before changing this value read the documentation for this option
+ # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
+ system.stateVersion = "23.11"; # Did you read the comment?
+
}
diff --git a/hosts/larissa/hardware-configuration.nix b/hosts/larissa/hardware-configuration.nix
new file mode 100644
index 0000000..177fcb5
--- /dev/null
+++ b/hosts/larissa/hardware-configuration.nix
@@ -0,0 +1,43 @@
+# Do not modify this file! It was generated by ‘nixos-generate-config’
+# and may be overwritten by future invocations. Please make changes
+# to /etc/nixos/configuration.nix instead.
+{ config, lib, pkgs, modulesPath, ... }:
+
+{
+ imports =
+ [ (modulesPath + "/installer/scan/not-detected.nix")
+ ];
+
+ boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "sd_mod" ];
+ boot.initrd.kernelModules = [ ];
+ boot.kernelModules = [ "kvm-amd" ];
+ boot.kernelParams = lib.optionals (lib.versionOlder config.boot.kernelPackages.kernel.version "6.8") ["rtc_cmos.use_acpi_alarm=1"] ;
+ boot.extraModulePackages = [ ];
+
+ services.power-profiles-daemon.enable = lib.mkDefault true;
+
+ fileSystems."/" =
+ { device = "/dev/disk/by-uuid/bd4da861-db3f-4efd-82e1-ca925f8ef873";
+ fsType = "ext4";
+ };
+
+ boot.initrd.luks.devices."luks-fc474bfb-2d0a-4a8a-99db-a55e15d8a836".device = "/dev/disk/by-uuid/fc474bfb-2d0a-4a8a-99db-a55e15d8a836";
+
+ fileSystems."/boot" =
+ { device = "/dev/disk/by-uuid/D40E-FE35";
+ fsType = "vfat";
+ options = [ "fmask=0022" "dmask=0022" ];
+ };
+
+ swapDevices = [ ];
+
+ # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
+ # (the default) this is the recommended approach. When using systemd-networkd it's
+ # still possible to use this option, but it's recommended to use it in conjunction
+ # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
+ networking.useDHCP = lib.mkDefault true;
+ # networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true;
+
+ nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
+ hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
+}
diff --git a/modules/emacs/README.org b/modules/emacs/README.org
index 2f361dc..04fc1a7 100644
--- a/modules/emacs/README.org
+++ b/modules/emacs/README.org
@@ -56,8 +56,8 @@ Remove background on terminal, and add transparency on GUI
(set-face-background 'default "unspecified-bg" (selected-frame))))
(add-hook 'window-setup-hook 'on-after-init)
-(set-frame-parameter nil 'alpha-background 80)
-(add-to-list 'default-frame-alist '(alpha-background . 80))
+(set-frame-parameter nil 'alpha-background 95)
+(add-to-list 'default-frame-alist '(alpha-background . 95))
#+end_src
* Utility
@@ -287,8 +287,7 @@ Try to use the package.
(org-confirm-babel-evaluate nil)
(org-edit-src-content-indentation 0)
(org-auto-align-tags nil)
- (org-fontify-done-headline t)
- (org-agenda-files '("~/agenda.org")))
+ (org-fontify-done-headline t))
#+end_src
*** Org Modern
#+begin_src emacs-lisp :tangle yes
diff --git a/modules/gnome-config.nix b/modules/gnome-config.nix
index 7bf4f43..4d3af54 100644
--- a/modules/gnome-config.nix
+++ b/modules/gnome-config.nix
@@ -34,7 +34,6 @@
"org/gnome/shell" = {
enabled-extensions = [
- "blur-my-shell@aunetx"
@@ -46,16 +45,6 @@
];
};
"org/gnome/shell/extensions/user-theme".name = "Graphite-Dark";
- "org/gnome/shell/extensions/blur-my-shell/applications" = {
- blur=true;
- blur-on-overview=false;
- dynamic-opacity=false;
- brightness=0.65;
- enable-all=false;
- opacity=255;
- sigma=10;
- whitelist = ["Emacs"];
- };
"org/honem/shell/extensions/vitals" = {
hide-zeros = true;
position-in-panel = "0";
diff --git a/modules/gnome.nix b/modules/gnome.nix
index dad3fce..2142450 100644
--- a/modules/gnome.nix
+++ b/modules/gnome.nix
@@ -24,7 +24,6 @@
appindicator
vitals
user-themes
- blur-my-shell
graphite-gtk-theme
x11-gestures
]);
diff --git a/secrets/authinfo.age b/secrets/authinfo.age
index 2dd0f17..ddba86b 100644
--- a/secrets/authinfo.age
+++ b/secrets/authinfo.age
Binary files differ
diff --git a/secrets/personal-mail.age b/secrets/personal-mail.age
index ff2716d..c865e70 100644
--- a/secrets/personal-mail.age
+++ b/secrets/personal-mail.age
@@ -1,13 +1,15 @@
age-encryption.org/v1
--> ssh-ed25519 JawxWA loXhNkycVVmd82TatvJHXK09EKBMt8l3HSsOVN4Wdxs
-HnFv9JsiZD9RopGvSlCsbn+rrIDClTHxvID+m94hwV0
--> ssh-ed25519 F05xIw 894Zyt4cNe85UsTlI4JCo9W60tk0J95TrQAbBpTKAgM
-Gc4ubKrSV3PQ6Ybawccf5Jvip9J99PEaAHg6Z+XwhZA
--> ssh-ed25519 AcegYA jTFnpzwgctNW+bf2PxqRp0VV726xpgogfI4+KzUmiWs
-5OBA8GCQ1NU6GRUYI2qI/GaA/fgap590LOIfyfiSe8Y
--> ssh-ed25519 VsDKrw DKoPG3QVl73OTPacIDd8bst3TKFzXbRLxaxmQJpPTBs
-+29wb7N+wHnw+bCNvMx17L6T4crPgL1Jn/pDWtRRM9k
--> ssh-ed25519 9kXSug k3EzPayoQ6JAc2Rq17970ya2OrZ4W8ed+8RcLt5T71E
-B5WcEDMWFVIfrw+BKt9l/IxU7vmAMz92Hlo6KuTsD38
---- p0+kcDQjVJ/3BvN+2V9ebJvDH4/n17NGATzZEXkw/uo
-&�(�t�M��`Z��d�D��2u"�\��x+f M���D��襌��/�� \ No newline at end of file
+-> ssh-ed25519 JawxWA t3fEfbjyyDCNr6m1J+Do9sUZoTNPBzrczywHZaeDf0Y
+/f4t9nzi+KvHdZVMjuSgM6LqVob+N9/kDagCyj/3Y4Q
+-> ssh-ed25519 F05xIw hgImrfg5kgFHIly/BA7xuoUiqA76XgNEF3tMi6qF5Fc
+ea5NaQTtRZbnYfxLmwI4s8aRV+KNXEKCelMhun9wW7E
+-> ssh-ed25519 AcegYA hTOu/YScOcH0B1KRa5pWDo7mVpQinSjlLi9bakeX2x8
+mkbaaj/NJ2Ad/aR9l6Zmdsrf4RQ85uU0hpPPbH0PlbY
+-> ssh-ed25519 VsDKrw NTNq+xTJwnaXpxfvT2HW7mAP/4a4gmPnYYITgg6lZV8
+XHOHfxs3yIUZNJnwoxa9DwZO1xVshXah6O7IJiVC3Yk
+-> ssh-ed25519 HMNWnw +d8/zFjqgj8IuiiTzLhacz/imfJJ/OhwoqWSpricHVI
+pLoZ/rhMp6x8s02EfOjrMwGz6FvolySkhDR8y/YaHcE
+-> ssh-ed25519 9kXSug hMTtS5J+H20M4jT6VyxV/A+w/2vmzcHqcLzYI84tFxc
+2taB3roWXajV5N9jinMepRTMjkeTyNdJSJWTXV/md4g
+--- TkF/W1LoplvUq0um1MWMF49UWq7zahf5pe9wXqobXiU
+�b�θPmtF>�s�ʧ��T�䞭֝7�Am��~Rᘹj�xfC�h�N1 \ No newline at end of file
diff --git a/secrets/secrets.nix b/secrets/secrets.nix
index 14e80a8..c8eb12f 100644
--- a/secrets/secrets.nix
+++ b/secrets/secrets.nix
@@ -3,8 +3,9 @@ let
kunagisa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDrMCLu3VvQVmd2cqreAJsVKkrtKXqgzO8i8NDm06ysm";
hanekawa-user = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOafACtb4IgSczDrollTm/t/xIYcVdLlUxDz72TxsZJZ";
hanekawa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKuIjOE3xi/frXJHXQuIBntuXP8XyboCWRx48o3sYeub";
- larissa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFQN59YDFwwQt/1rb1dHZnxsNV2geWUvHyTKqjdSA52";
- keys = [ kunagisa-user hanekawa-user kunagisa hanekawa larissa];
+ larissa-user = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFQN59YDFwwQt/1rb1dHZnxsNV2geWUvHyTKqjdSA52";
+ larissa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINKjyS7vbCxr7oDqBpnhHQQzolAW6Fqt1FTOo+hT+lSC";
+ keys = [ kunagisa-user hanekawa-user kunagisa hanekawa larissa larissa-user];
in
{
"personal-mail.age".publicKeys = keys;
diff --git a/secrets/university-mail.age b/secrets/university-mail.age
index 87d6c40..13b9b09 100644
--- a/secrets/university-mail.age
+++ b/secrets/university-mail.age
@@ -1,14 +1,15 @@
age-encryption.org/v1
--> ssh-ed25519 JawxWA 99ra7FpYy01qs6P8Gmwo29Gy99feUTCeGkGu0lpi0Fs
-03ir9qJyupV5SqveMMs/xJcwBTSE0zJdPAnlCDUUfH8
--> ssh-ed25519 F05xIw uUhW9Bo0KKNj9aPWfU0NhmIf8afI15Of+4V8mEAvwSM
-ik3HqWeu2IzT7g9tMG5CjeK8RXYQubiXBr06SUJ9c5w
--> ssh-ed25519 AcegYA e60rLKU/7l+w/mtM0b/jRJvcb3PwTOK/eaLrJeLcyWA
-pJpJlAWmCMJ9Tjxont0RtDCsyJ5sKt1j14hZi5wizwc
--> ssh-ed25519 VsDKrw 7TfQeOtd/NBFD3JshwQIiNCLE3kajVeAOzMTTogxOnI
-b1cx44SVybmyEEq8bPl9+ursnjwAgUUv0yH+V1fJhSo
--> ssh-ed25519 9kXSug lZ+Zn8cZ57Kr0IA1ket3TGG/ACYkTHM7WGtHKgGNZRo
-qzRgTETAZrkT7X8D/GCZn1kWHsIWMK3HFmel98bmJrY
---- Djn7C6qaE36JaxG5iTwOYkgm3SHYCjADCpL6j9Xz8A4
-<�ڠ�\�M������+�z�ˊdF������E�W�k[QL��
-�/�rι \ No newline at end of file
+-> ssh-ed25519 JawxWA CauNKVYRXH0eX9u2X+yKHBCnjWtVH0nLxihO6/ruxw0
+SmsOteaLcJTQWf2soRQ0btpuBGPjk9Xn6a1FiVRYb3E
+-> ssh-ed25519 F05xIw As6CnbJHFKhbWQ+ZdQ3r4FFuiLOKtj61vxUt4sEryRI
+WC9hhW7ItwYdDWK693FfwNRDUeS6I573aLH7t0qz8Lw
+-> ssh-ed25519 AcegYA ISAf0Wma0/7DH7lte4dpd6Qm3HFBGgDy7ZpQDRL3vT4
+C/fY0pnM9Su5kQ55wTetzsY98iQ8/uQFuNuhWglABgQ
+-> ssh-ed25519 VsDKrw WAfqgqtMvPPDT5FRMe9vj4gfnBW7elpOdB+eA/jJ000
+tfmHB+oelGsSObmOdNhqCzaakohHfMMHnLJkFUeMHuQ
+-> ssh-ed25519 HMNWnw suDaWIjaRsa+N1ByKRmCPPcMbEsQgee9H1zyxPRtJmE
+HJ8HLucA2AohzR7jCoTywoAYYXC5asFB7+uOZICOVeI
+-> ssh-ed25519 9kXSug p8jveeGFhMZ2txGvuY6dKhScid8eKdkEcFuC1WYsr3Y
+hmMFP/srgGdKkh+s6eqS1ffs0G/LffGj+wYZBh/c4DY
+--- tebDIUSP/0sj6PYeCLK/J3sXx7BWdcJ3XMVEME+EclA
+�x1!���)$��\4:_<��_�H���ۈFvlUm]\�z�% mc�� \ No newline at end of file
diff --git a/secrets/work-mail.age b/secrets/work-mail.age
index 6668664..9056086 100644
--- a/secrets/work-mail.age
+++ b/secrets/work-mail.age
@@ -1,13 +1,15 @@
age-encryption.org/v1
--> ssh-ed25519 JawxWA RuJwbeeMw8obHoeSv52cbgbVjdVS4h4x4F7f6cDy/z4
-dNpsmpCMiUdF6PX6Holu8/X+0avBa4ZEAXWq8pQBo/k
--> ssh-ed25519 F05xIw JwtfIYWasWAqo8JmQslvK1Eeqp0VeCJtKXq18A4KMBY
-eUaHqXN+1gbIvzW6w2MEkZRqLMMP2XKIhMB3SB+rQJ8
--> ssh-ed25519 AcegYA Bx/OdsnSaHXGvuRgXs7O8BVsZFu4cf/uifzAiuCSvSA
-MuCgU5B/dcQ8jK/cZSRp0jf47OubmaAI92Y+ji5dFtU
--> ssh-ed25519 VsDKrw hgG7RyCR4qaBYi3RM6L0QiOYIBnR37R7jsAZRzpvgnU
-ZjHZgkdo++ye08FwBNvoI4VvXVH7ih4fkuUCO2o/PJo
--> ssh-ed25519 9kXSug 3KVkf0JU2dpDOI1ETY46P+PJKAlTQLMLiF4ZAhLF4jg
-B7rUhHrSc0ILuYaNlMS78QzX2C+Y/sklkcagTcmFg1g
---- iK4s6bgZ6T3PfKlD703e1GSIafrW8J8n3gTduBWzDD0
-�ՂȃOpK~<�����c��{�HS�͞7 ':K�./x[�n��:>�'!� \ No newline at end of file
+-> ssh-ed25519 JawxWA 7hvKPYECUyIIxm5CVWQHwqmxqiqf6IU/lQCR7WnlwyI
+mA6cu5cdFvI/qYCxp5px8X2y0TLXLASufo7XWcAi8XQ
+-> ssh-ed25519 F05xIw wEwe86Wb+cQyHRgpYCj/w2fdzOB7k71plQ3bnCOp2VQ
+TIBLPZW5C/eX3BUd8+HEqhzTaru/BugYfkWMnRHk7qU
+-> ssh-ed25519 AcegYA w6/Wmm/Lhtv0U52IZdlF3XP7mEdBHYV+btROUIZ35jc
+cU0dMYatbP0GmCu4/bnnrJHHuGodgfbS1zFHuh4zwH4
+-> ssh-ed25519 VsDKrw qvf1smC5iUuS7IE1zzqAfOdYUATiB7ZXGkSf4NX76H8
+EMqCZ/AhOEZqyKo5/OxivfAkqQzJuq0eARXmB4+xwY0
+-> ssh-ed25519 HMNWnw SeXmbeCK9ojTQbmmnUHL4jDY5Q3KfGUdfGBddPpPIDE
+ilYRatgWQiH13e68QUnN1r9QrbsDzvDiG2sfNUYMrDs
+-> ssh-ed25519 9kXSug NH8vl0tQFpYlayT4ymba4z8RxDGC1aBWgaE0hEyJQi8
+PkK7GMudN0h8slPs9cdxouNIgJ66GBCOFF11j9A8LFQ
+--- SzE3UDNOvIbS36fqapn+CkbbKLUvNraqnVyd0OtrUjw
+�;�|��L%�?B��/��DYB�]N�s �~��Mk2_}���I�/mnlo \ No newline at end of file
diff --git a/users/leonardo.nix b/users/leonardo.nix
index b36109b..e58a72a 100644
--- a/users/leonardo.nix
+++ b/users/leonardo.nix
@@ -89,8 +89,7 @@
};
};
services.openssh.enable = true;
- # services.xserver.xkb.layout
- # services.xserver.xkb.variant
+ users.mutableUsers = false;
users.users.leonardo = {
isNormalUser = true;
description = "leonardo";
@@ -123,6 +122,7 @@
};
services.gnome.gnome-browser-connector.enable = true;
home-manager = {
+ backupFileExtension = "backup";
useGlobalPkgs = true;
useUserPackages = true;
users.leonardo = { pkgs, ... } : {