diff options
-rw-r--r-- | flake.lock | 88 | ||||
-rw-r--r-- | flake.nix | 14 | ||||
-rw-r--r-- | hosts/larissa/configuration.nix | 127 | ||||
-rw-r--r-- | hosts/larissa/hardware-configuration.nix | 43 | ||||
-rw-r--r-- | modules/emacs/README.org | 7 | ||||
-rw-r--r-- | modules/gnome-config.nix | 11 | ||||
-rw-r--r-- | modules/gnome.nix | 1 | ||||
-rw-r--r-- | secrets/authinfo.age | bin | 1142 -> 1252 bytes | |||
-rw-r--r-- | secrets/personal-mail.age | 26 | ||||
-rw-r--r-- | secrets/secrets.nix | 5 | ||||
-rw-r--r-- | secrets/university-mail.age | 27 | ||||
-rw-r--r-- | secrets/work-mail.age | 26 | ||||
-rw-r--r-- | users/leonardo.nix | 4 |
13 files changed, 212 insertions, 167 deletions
@@ -103,24 +103,6 @@ "type": "github" } }, - "flake-utils_2": { - "inputs": { - "systems": "systems_3" - }, - "locked": { - "lastModified": 1709126324, - "narHash": "sha256-q6EQdSeUZOG26WelxqkmR7kArjgWCdw5sfJVHPH/7j8=", - "owner": "numtide", - "repo": "flake-utils", - "rev": "d465f4819400de7c8d874d50b982301f28a84605", - "type": "github" - }, - "original": { - "owner": "numtide", - "repo": "flake-utils", - "type": "github" - } - }, "from-elisp": { "flake": false, "locked": { @@ -157,27 +139,6 @@ "type": "github" } }, - "mixrank": { - "inputs": { - "flake-utils": "flake-utils_2", - "nixpkgs_latest": "nixpkgs_latest", - "nixpkgs_old": "nixpkgs_old" - }, - "locked": { - "lastModified": 1715264320, - "narHash": "sha256-1728gtHhlPQqGiyMtBaO7GYRKwg2O1SafDYbXzNRQXQ=", - "ref": "2024-05-06-hosts-in-nix", - "rev": "39cec387d9b3e665e384b23b38bb0fe714d5fcdb", - "revCount": 62072, - "type": "git", - "url": "ssh://[email protected]/mixrank/mixrank" - }, - "original": { - "ref": "2024-05-06-hosts-in-nix", - "type": "git", - "url": "ssh://[email protected]/mixrank/mixrank" - } - }, "nixpkgs": { "locked": { "lastModified": 1715266358, @@ -210,39 +171,6 @@ "type": "github" } }, - "nixpkgs_latest": { - "locked": { - "lastModified": 1677018132, - "narHash": "sha256-o1v+S9cn3M5wwBT7+5YdWPDRRkIpe2uAjzNGLnnJPm8=", - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "581e3f902954cbf7b6eec7b04deb41b23fcb6b7a", - "type": "github" - }, - "original": { - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "581e3f902954cbf7b6eec7b04deb41b23fcb6b7a", - "type": "github" - } - }, - "nixpkgs_old": { - "flake": false, - "locked": { - "lastModified": 1568853802, - "narHash": "sha256-eFyFVDVExwB1aGHVmemgh57EAcTs5rekWhlPnxAowu8=", - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "2c906666e54c9f050b4a25142b4ff0e73c9b7dcc", - "type": "github" - }, - "original": { - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "2c906666e54c9f050b4a25142b4ff0e73c9b7dcc", - "type": "github" - } - }, "root": { "inputs": { "agenix": "agenix", @@ -250,7 +178,6 @@ "firefox-gnome-theme": "firefox-gnome-theme", "from-elisp": "from-elisp", "home-manager": "home-manager", - "mixrank": "mixrank", "nixpkgs": "nixpkgs" } }, @@ -283,21 +210,6 @@ "repo": "default", "type": "github" } - }, - "systems_3": { - "locked": { - "lastModified": 1681028828, - "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", - "owner": "nix-systems", - "repo": "default", - "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", - "type": "github" - }, - "original": { - "owner": "nix-systems", - "repo": "default", - "type": "github" - } } }, "root": "root", @@ -35,16 +35,14 @@ url = "github:rafaelmardojai/firefox-gnome-theme"; flake = false; }; - mixrank.url = "git+ssh://[email protected]/mixrank/mixrank?ref=2024-05-06-hosts-in-nix"; + #mixrank.url = "git+ssh://[email protected]/mixrank/mixrank?ref=2024-05-06-hosts-in-nix"; }; - outputs = { self, nixpkgs, home-manager, agenix, mixrank, ... } @ inputs : + outputs = { self, nixpkgs, home-manager, agenix, ... } @ inputs : let + inherit (builtins) listToAttrs readDir attrNames; system = "x86_64-linux"; - hosts = [ - "hanekawa" # notebook - "kunagisa" # workstation - ]; + hosts = attrNames (readDir ./hosts); defaultNixosSystem = host: nixpkgs.lib.nixosSystem { inherit system; specialArgs = { inherit inputs; }; @@ -53,11 +51,11 @@ ./users/leonardo.nix home-manager.nixosModules.home-manager agenix.nixosModules.default - mixrank.nixosModules.${system}.dev-machine + # mixrank.nixosModules.${system}.dev-machine ]; }; in { - nixosConfigurations = builtins.listToAttrs + nixosConfigurations = listToAttrs (map (host: {name = host; value = defaultNixosSystem host; }) hosts); }; } diff --git a/hosts/larissa/configuration.nix b/hosts/larissa/configuration.nix index b007ebd..499d6ea 100644 --- a/hosts/larissa/configuration.nix +++ b/hosts/larissa/configuration.nix @@ -1,21 +1,120 @@ -{ config, pkgs, lib, ... }: +# Edit this configuration file to define what should be installed on +# your system. Help is available in the configuration.nix(5) man page +# and in the NixOS manual (accessible by running ‘nixos-help’). + +{ config, pkgs, ... }: + { imports = - [ - <nixos-hardware/raspberry-pi/4> + [ # Include the results of the hardware scan. ./hardware-configuration.nix ]; - hardware = { - raspberry-pi."4".apply-overlays-dtmerge.enable = true; - deviceTree = { - enable = true; - filter = "*rpi-4-*.dtb"; + + # this system has a fingerprint reader. + services.fprintd.enable = true; + + services.fwupd = { + enable = true; + package = (import (builtins.fetchTarball { + url = "https://github.com/NixOS/nixpkgs/archive/bb2009ca185d97813e75736c2b8d1d8bb81bde05.tar.gz"; + sha256 = "sha256:003qcrsq5g5lggfrpq31gcvj82lb065xvr7bpfa8ddsw8x4dnysk"; + }) { + inherit (pkgs) system; + }).fwupd; + + }; + + # Bootloader. + boot.loader.systemd-boot.enable = true; + boot.loader.efi.canTouchEfiVariables = true; + + networking.hostName = "larissa"; # Define your hostname. + # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. + + # Configure network proxy if necessary + # networking.proxy.default = "http://user:password@proxy:port/"; + # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain"; + + # Enable networking + networking.networkmanager.enable = true; + + # Set your time zone. + time.timeZone = "America/Sao_Paulo"; + + # Select internationalisation properties. + i18n.defaultLocale = "en_US.UTF-8"; + + i18n.extraLocaleSettings = { + LC_ADDRESS = "pt_BR.UTF-8"; + LC_IDENTIFICATION = "pt_BR.UTF-8"; + LC_MEASUREMENT = "pt_BR.UTF-8"; + LC_MONETARY = "pt_BR.UTF-8"; + LC_NAME = "pt_BR.UTF-8"; + LC_NUMERIC = "pt_BR.UTF-8"; + LC_PAPER = "pt_BR.UTF-8"; + LC_TELEPHONE = "pt_BR.UTF-8"; + LC_TIME = "pt_BR.UTF-8"; + }; + + services.touchegg.enable = true; + # Configure keymap in X11 + services.xserver = { + enable = true; + xkb = { + variant = "abnt2"; + layout = "br"; }; }; - console.enable = false; - environment.systemPackages = with pkgs; [ - libraspberrypi - raspberrypi-eeprom - ]; - system.stateVersion = "23.11"; + services.libinput = { + enable = true; + touchpad = { + tapping = true; + scrollMethod = "twofinger"; + clickMethod = "clickfinger"; + tappingButtonMap = "lrm"; + }; + }; + + console.keyMap = "br-abnt2"; + # Enable CUPS to print documents. + services.printing.enable = true; + + # Enable sound with pipewire. + sound.enable = true; + hardware.pulseaudio.enable = false; + security.rtkit.enable = true; + services.pipewire = { + enable = true; + alsa.enable = true; + alsa.support32Bit = true; + pulse.enable = true; + # If you want to use JACK applications, uncomment this + #jack.enable = true; + + # use the example session manager (no others are packaged yet so this is enabled by default, + # no need to redefine it in your config for now) + #media-session.enable = true; + }; + + # Enable touchpad support (enabled default in most desktopManager). + # services.xserver.libinput.enable = true; + # List services that you want to enable: + + # Enable the OpenSSH daemon. + # services.openssh.enable = true; + + # Open ports in the firewall. + # networking.firewall.allowedTCPPorts = [ ... ]; + # networking.firewall.allowedUDPPorts = [ ... ]; + # Or disable the firewall altogether. + # networking.firewall.enable = false; + + # This value determines the NixOS release from which the default + # settings for stateful data, like file locations and database versions + # on your system were taken. It‘s perfectly fine and recommended to leave + # this value at the release version of the first install of this system. + # Before changing this value read the documentation for this option + # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). + system.stateVersion = "23.11"; # Did you read the comment? + } diff --git a/hosts/larissa/hardware-configuration.nix b/hosts/larissa/hardware-configuration.nix new file mode 100644 index 0000000..177fcb5 --- /dev/null +++ b/hosts/larissa/hardware-configuration.nix @@ -0,0 +1,43 @@ +# Do not modify this file! It was generated by ‘nixos-generate-config’ +# and may be overwritten by future invocations. Please make changes +# to /etc/nixos/configuration.nix instead. +{ config, lib, pkgs, modulesPath, ... }: + +{ + imports = + [ (modulesPath + "/installer/scan/not-detected.nix") + ]; + + boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usb_storage" "sd_mod" ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ "kvm-amd" ]; + boot.kernelParams = lib.optionals (lib.versionOlder config.boot.kernelPackages.kernel.version "6.8") ["rtc_cmos.use_acpi_alarm=1"] ; + boot.extraModulePackages = [ ]; + + services.power-profiles-daemon.enable = lib.mkDefault true; + + fileSystems."/" = + { device = "/dev/disk/by-uuid/bd4da861-db3f-4efd-82e1-ca925f8ef873"; + fsType = "ext4"; + }; + + boot.initrd.luks.devices."luks-fc474bfb-2d0a-4a8a-99db-a55e15d8a836".device = "/dev/disk/by-uuid/fc474bfb-2d0a-4a8a-99db-a55e15d8a836"; + + fileSystems."/boot" = + { device = "/dev/disk/by-uuid/D40E-FE35"; + fsType = "vfat"; + options = [ "fmask=0022" "dmask=0022" ]; + }; + + swapDevices = [ ]; + + # Enables DHCP on each ethernet and wireless interface. In case of scripted networking + # (the default) this is the recommended approach. When using systemd-networkd it's + # still possible to use this option, but it's recommended to use it in conjunction + # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. + networking.useDHCP = lib.mkDefault true; + # networking.interfaces.wlp1s0.useDHCP = lib.mkDefault true; + + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; + hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; +} diff --git a/modules/emacs/README.org b/modules/emacs/README.org index 2f361dc..04fc1a7 100644 --- a/modules/emacs/README.org +++ b/modules/emacs/README.org @@ -56,8 +56,8 @@ Remove background on terminal, and add transparency on GUI (set-face-background 'default "unspecified-bg" (selected-frame)))) (add-hook 'window-setup-hook 'on-after-init) -(set-frame-parameter nil 'alpha-background 80) -(add-to-list 'default-frame-alist '(alpha-background . 80)) +(set-frame-parameter nil 'alpha-background 95) +(add-to-list 'default-frame-alist '(alpha-background . 95)) #+end_src * Utility @@ -287,8 +287,7 @@ Try to use the package. (org-confirm-babel-evaluate nil) (org-edit-src-content-indentation 0) (org-auto-align-tags nil) - (org-fontify-done-headline t) - (org-agenda-files '("~/agenda.org"))) + (org-fontify-done-headline t)) #+end_src *** Org Modern #+begin_src emacs-lisp :tangle yes diff --git a/modules/gnome-config.nix b/modules/gnome-config.nix index 7bf4f43..4d3af54 100644 --- a/modules/gnome-config.nix +++ b/modules/gnome-config.nix @@ -34,7 +34,6 @@ "org/gnome/shell" = { enabled-extensions = [ - "blur-my-shell@aunetx" @@ -46,16 +45,6 @@ ]; }; "org/gnome/shell/extensions/user-theme".name = "Graphite-Dark"; - "org/gnome/shell/extensions/blur-my-shell/applications" = { - blur=true; - blur-on-overview=false; - dynamic-opacity=false; - brightness=0.65; - enable-all=false; - opacity=255; - sigma=10; - whitelist = ["Emacs"]; - }; "org/honem/shell/extensions/vitals" = { hide-zeros = true; position-in-panel = "0"; diff --git a/modules/gnome.nix b/modules/gnome.nix index dad3fce..2142450 100644 --- a/modules/gnome.nix +++ b/modules/gnome.nix @@ -24,7 +24,6 @@ appindicator vitals user-themes - blur-my-shell graphite-gtk-theme x11-gestures ]); diff --git a/secrets/authinfo.age b/secrets/authinfo.age Binary files differindex 2dd0f17..ddba86b 100644 --- a/secrets/authinfo.age +++ b/secrets/authinfo.age diff --git a/secrets/personal-mail.age b/secrets/personal-mail.age index ff2716d..c865e70 100644 --- a/secrets/personal-mail.age +++ b/secrets/personal-mail.age @@ -1,13 +1,15 @@ age-encryption.org/v1 --> ssh-ed25519 JawxWA loXhNkycVVmd82TatvJHXK09EKBMt8l3HSsOVN4Wdxs -HnFv9JsiZD9RopGvSlCsbn+rrIDClTHxvID+m94hwV0 --> ssh-ed25519 F05xIw 894Zyt4cNe85UsTlI4JCo9W60tk0J95TrQAbBpTKAgM -Gc4ubKrSV3PQ6Ybawccf5Jvip9J99PEaAHg6Z+XwhZA --> ssh-ed25519 AcegYA jTFnpzwgctNW+bf2PxqRp0VV726xpgogfI4+KzUmiWs -5OBA8GCQ1NU6GRUYI2qI/GaA/fgap590LOIfyfiSe8Y --> ssh-ed25519 VsDKrw DKoPG3QVl73OTPacIDd8bst3TKFzXbRLxaxmQJpPTBs -+29wb7N+wHnw+bCNvMx17L6T4crPgL1Jn/pDWtRRM9k --> ssh-ed25519 9kXSug k3EzPayoQ6JAc2Rq17970ya2OrZ4W8ed+8RcLt5T71E -B5WcEDMWFVIfrw+BKt9l/IxU7vmAMz92Hlo6KuTsD38 ---- p0+kcDQjVJ/3BvN+2V9ebJvDH4/n17NGATzZEXkw/uo -&�(�t�M��`Z��d�D��2u"�\��x+fM���D��襌��/��
\ No newline at end of file +-> ssh-ed25519 JawxWA t3fEfbjyyDCNr6m1J+Do9sUZoTNPBzrczywHZaeDf0Y +/f4t9nzi+KvHdZVMjuSgM6LqVob+N9/kDagCyj/3Y4Q +-> ssh-ed25519 F05xIw hgImrfg5kgFHIly/BA7xuoUiqA76XgNEF3tMi6qF5Fc +ea5NaQTtRZbnYfxLmwI4s8aRV+KNXEKCelMhun9wW7E +-> ssh-ed25519 AcegYA hTOu/YScOcH0B1KRa5pWDo7mVpQinSjlLi9bakeX2x8 +mkbaaj/NJ2Ad/aR9l6Zmdsrf4RQ85uU0hpPPbH0PlbY +-> ssh-ed25519 VsDKrw NTNq+xTJwnaXpxfvT2HW7mAP/4a4gmPnYYITgg6lZV8 +XHOHfxs3yIUZNJnwoxa9DwZO1xVshXah6O7IJiVC3Yk +-> ssh-ed25519 HMNWnw +d8/zFjqgj8IuiiTzLhacz/imfJJ/OhwoqWSpricHVI +pLoZ/rhMp6x8s02EfOjrMwGz6FvolySkhDR8y/YaHcE +-> ssh-ed25519 9kXSug hMTtS5J+H20M4jT6VyxV/A+w/2vmzcHqcLzYI84tFxc +2taB3roWXajV5N9jinMepRTMjkeTyNdJSJWTXV/md4g +--- TkF/W1LoplvUq0um1MWMF49UWq7zahf5pe9wXqobXiU +�b�θPmtF>�s�ʧ��T�䞭֝7�Am��~Rᘹj�xfC�h�N1
\ No newline at end of file diff --git a/secrets/secrets.nix b/secrets/secrets.nix index 14e80a8..c8eb12f 100644 --- a/secrets/secrets.nix +++ b/secrets/secrets.nix @@ -3,8 +3,9 @@ let kunagisa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDrMCLu3VvQVmd2cqreAJsVKkrtKXqgzO8i8NDm06ysm"; hanekawa-user = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOafACtb4IgSczDrollTm/t/xIYcVdLlUxDz72TxsZJZ"; hanekawa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKuIjOE3xi/frXJHXQuIBntuXP8XyboCWRx48o3sYeub"; - larissa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFQN59YDFwwQt/1rb1dHZnxsNV2geWUvHyTKqjdSA52"; - keys = [ kunagisa-user hanekawa-user kunagisa hanekawa larissa]; + larissa-user = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFQN59YDFwwQt/1rb1dHZnxsNV2geWUvHyTKqjdSA52"; + larissa = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINKjyS7vbCxr7oDqBpnhHQQzolAW6Fqt1FTOo+hT+lSC"; + keys = [ kunagisa-user hanekawa-user kunagisa hanekawa larissa larissa-user]; in { "personal-mail.age".publicKeys = keys; diff --git a/secrets/university-mail.age b/secrets/university-mail.age index 87d6c40..13b9b09 100644 --- a/secrets/university-mail.age +++ b/secrets/university-mail.age @@ -1,14 +1,15 @@ age-encryption.org/v1 --> ssh-ed25519 JawxWA 99ra7FpYy01qs6P8Gmwo29Gy99feUTCeGkGu0lpi0Fs -03ir9qJyupV5SqveMMs/xJcwBTSE0zJdPAnlCDUUfH8 --> ssh-ed25519 F05xIw uUhW9Bo0KKNj9aPWfU0NhmIf8afI15Of+4V8mEAvwSM -ik3HqWeu2IzT7g9tMG5CjeK8RXYQubiXBr06SUJ9c5w --> ssh-ed25519 AcegYA e60rLKU/7l+w/mtM0b/jRJvcb3PwTOK/eaLrJeLcyWA -pJpJlAWmCMJ9Tjxont0RtDCsyJ5sKt1j14hZi5wizwc --> ssh-ed25519 VsDKrw 7TfQeOtd/NBFD3JshwQIiNCLE3kajVeAOzMTTogxOnI -b1cx44SVybmyEEq8bPl9+ursnjwAgUUv0yH+V1fJhSo --> ssh-ed25519 9kXSug lZ+Zn8cZ57Kr0IA1ket3TGG/ACYkTHM7WGtHKgGNZRo -qzRgTETAZrkT7X8D/GCZn1kWHsIWMK3HFmel98bmJrY ---- Djn7C6qaE36JaxG5iTwOYkgm3SHYCjADCpL6j9Xz8A4 -<�ڠ�\�M������+�z�ˊdF������E�W�k[QL�� -�/�rι
\ No newline at end of file +-> ssh-ed25519 JawxWA CauNKVYRXH0eX9u2X+yKHBCnjWtVH0nLxihO6/ruxw0 +SmsOteaLcJTQWf2soRQ0btpuBGPjk9Xn6a1FiVRYb3E +-> ssh-ed25519 F05xIw As6CnbJHFKhbWQ+ZdQ3r4FFuiLOKtj61vxUt4sEryRI +WC9hhW7ItwYdDWK693FfwNRDUeS6I573aLH7t0qz8Lw +-> ssh-ed25519 AcegYA ISAf0Wma0/7DH7lte4dpd6Qm3HFBGgDy7ZpQDRL3vT4 +C/fY0pnM9Su5kQ55wTetzsY98iQ8/uQFuNuhWglABgQ +-> ssh-ed25519 VsDKrw WAfqgqtMvPPDT5FRMe9vj4gfnBW7elpOdB+eA/jJ000 +tfmHB+oelGsSObmOdNhqCzaakohHfMMHnLJkFUeMHuQ +-> ssh-ed25519 HMNWnw suDaWIjaRsa+N1ByKRmCPPcMbEsQgee9H1zyxPRtJmE +HJ8HLucA2AohzR7jCoTywoAYYXC5asFB7+uOZICOVeI +-> ssh-ed25519 9kXSug p8jveeGFhMZ2txGvuY6dKhScid8eKdkEcFuC1WYsr3Y +hmMFP/srgGdKkh+s6eqS1ffs0G/LffGj+wYZBh/c4DY +--- tebDIUSP/0sj6PYeCLK/J3sXx7BWdcJ3XMVEME+EclA +�x1!���)$��\4:_<��_�H���ۈFvlUm]\�z�% mc��
\ No newline at end of file diff --git a/secrets/work-mail.age b/secrets/work-mail.age index 6668664..9056086 100644 --- a/secrets/work-mail.age +++ b/secrets/work-mail.age @@ -1,13 +1,15 @@ age-encryption.org/v1 --> ssh-ed25519 JawxWA RuJwbeeMw8obHoeSv52cbgbVjdVS4h4x4F7f6cDy/z4 -dNpsmpCMiUdF6PX6Holu8/X+0avBa4ZEAXWq8pQBo/k --> ssh-ed25519 F05xIw JwtfIYWasWAqo8JmQslvK1Eeqp0VeCJtKXq18A4KMBY -eUaHqXN+1gbIvzW6w2MEkZRqLMMP2XKIhMB3SB+rQJ8 --> ssh-ed25519 AcegYA Bx/OdsnSaHXGvuRgXs7O8BVsZFu4cf/uifzAiuCSvSA -MuCgU5B/dcQ8jK/cZSRp0jf47OubmaAI92Y+ji5dFtU --> ssh-ed25519 VsDKrw hgG7RyCR4qaBYi3RM6L0QiOYIBnR37R7jsAZRzpvgnU -ZjHZgkdo++ye08FwBNvoI4VvXVH7ih4fkuUCO2o/PJo --> ssh-ed25519 9kXSug 3KVkf0JU2dpDOI1ETY46P+PJKAlTQLMLiF4ZAhLF4jg -B7rUhHrSc0ILuYaNlMS78QzX2C+Y/sklkcagTcmFg1g ---- iK4s6bgZ6T3PfKlD703e1GSIafrW8J8n3gTduBWzDD0 -�ՂȃOpK~<�����c��{�HS�͞7 ':K�./x[�n��:>�'!�
\ No newline at end of file +-> ssh-ed25519 JawxWA 7hvKPYECUyIIxm5CVWQHwqmxqiqf6IU/lQCR7WnlwyI +mA6cu5cdFvI/qYCxp5px8X2y0TLXLASufo7XWcAi8XQ +-> ssh-ed25519 F05xIw wEwe86Wb+cQyHRgpYCj/w2fdzOB7k71plQ3bnCOp2VQ +TIBLPZW5C/eX3BUd8+HEqhzTaru/BugYfkWMnRHk7qU +-> ssh-ed25519 AcegYA w6/Wmm/Lhtv0U52IZdlF3XP7mEdBHYV+btROUIZ35jc +cU0dMYatbP0GmCu4/bnnrJHHuGodgfbS1zFHuh4zwH4 +-> ssh-ed25519 VsDKrw qvf1smC5iUuS7IE1zzqAfOdYUATiB7ZXGkSf4NX76H8 +EMqCZ/AhOEZqyKo5/OxivfAkqQzJuq0eARXmB4+xwY0 +-> ssh-ed25519 HMNWnw SeXmbeCK9ojTQbmmnUHL4jDY5Q3KfGUdfGBddPpPIDE +ilYRatgWQiH13e68QUnN1r9QrbsDzvDiG2sfNUYMrDs +-> ssh-ed25519 9kXSug NH8vl0tQFpYlayT4ymba4z8RxDGC1aBWgaE0hEyJQi8 +PkK7GMudN0h8slPs9cdxouNIgJ66GBCOFF11j9A8LFQ +--- SzE3UDNOvIbS36fqapn+CkbbKLUvNraqnVyd0OtrUjw +�;�|��L%�?B��/��DYB�]N�s
�~��Mk2_}���I�/mnlo
\ No newline at end of file diff --git a/users/leonardo.nix b/users/leonardo.nix index b36109b..e58a72a 100644 --- a/users/leonardo.nix +++ b/users/leonardo.nix @@ -89,8 +89,7 @@ }; }; services.openssh.enable = true; - # services.xserver.xkb.layout - # services.xserver.xkb.variant + users.mutableUsers = false; users.users.leonardo = { isNormalUser = true; description = "leonardo"; @@ -123,6 +122,7 @@ }; services.gnome.gnome-browser-connector.enable = true; home-manager = { + backupFileExtension = "backup"; useGlobalPkgs = true; useUserPackages = true; users.leonardo = { pkgs, ... } : { |