Fix audio and gpg bugs
Signed-off-by: Nikolaos Karaolidis <nick@karaolidis.com>
This commit is contained in:
@@ -4,6 +4,7 @@
|
|||||||
imports = [
|
imports = [
|
||||||
inputs.impermanence.nixosModules.impermanence
|
inputs.impermanence.nixosModules.impermanence
|
||||||
inputs.sops-nix.nixosModules.sops
|
inputs.sops-nix.nixosModules.sops
|
||||||
|
./configs/pipewire
|
||||||
./configs/zsh
|
./configs/zsh
|
||||||
./configs/neovim
|
./configs/neovim
|
||||||
./configs/tmux
|
./configs/tmux
|
||||||
@@ -27,6 +28,7 @@
|
|||||||
postDeviceCommands = lib.mkAfter (builtins.readFile ./scripts/impermanence.sh);
|
postDeviceCommands = lib.mkAfter (builtins.readFile ./scripts/impermanence.sh);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
kernelPackages = pkgs.linuxPackages_latest;
|
||||||
supportedFilesystems = [ "btrfs" "ntfs" ];
|
supportedFilesystems = [ "btrfs" "ntfs" ];
|
||||||
kernelParams = [ "loglevel=3" "quiet" ];
|
kernelParams = [ "loglevel=3" "quiet" ];
|
||||||
consoleLogLevel = 0;
|
consoleLogLevel = 0;
|
||||||
|
@@ -4,7 +4,6 @@
|
|||||||
imports = [
|
imports = [
|
||||||
../common
|
../common
|
||||||
../../users/nick
|
../../users/nick
|
||||||
./configs/pipewire
|
|
||||||
];
|
];
|
||||||
|
|
||||||
time.timeZone = "Europe/Athens";
|
time.timeZone = "Europe/Athens";
|
||||||
|
@@ -10,7 +10,8 @@
|
|||||||
systemd.user.services.gpg-agent-import = {
|
systemd.user.services.gpg-agent-import = {
|
||||||
Unit = {
|
Unit = {
|
||||||
Description = "Auto-import GPG keys";
|
Description = "Auto-import GPG keys";
|
||||||
After = [ "gpg-agent.socket" "sops-nix.service" ];
|
Requires = [ "sops-nix.service" "gpg-agent.socket" ];
|
||||||
|
After = [ "sops-nix.service" "gpg-agent.socket" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
Service = {
|
Service = {
|
||||||
@@ -18,9 +19,6 @@
|
|||||||
ExecStart = pkgs.writeScript "import-gpg-keys" ''
|
ExecStart = pkgs.writeScript "import-gpg-keys" ''
|
||||||
#!${pkgs.runtimeShell}
|
#!${pkgs.runtimeShell}
|
||||||
|
|
||||||
find "$HOME"/.gnupg -type f -exec chmod 600 {} \;
|
|
||||||
find "$HOME"/.gnupg -type d -exec chmod 700 {} \;
|
|
||||||
|
|
||||||
for keyfile in "$HOME"/.config/sops-nix/secrets/gpg-agent/*.key; do
|
for keyfile in "$HOME"/.config/sops-nix/secrets/gpg-agent/*.key; do
|
||||||
passfile="''${keyfile%.key}.pass"
|
passfile="''${keyfile%.key}.pass"
|
||||||
|
|
||||||
|
@@ -43,6 +43,7 @@ in
|
|||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
rofi-wayland
|
rofi-wayland
|
||||||
swww
|
swww
|
||||||
|
pavucontrol
|
||||||
];
|
];
|
||||||
|
|
||||||
stateVersion = "24.05";
|
stateVersion = "24.05";
|
||||||
@@ -101,7 +102,7 @@ in
|
|||||||
) normalUsers;
|
) normalUsers;
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [ "d /persist/home/ 0755 root root -" ] ++ lib.attrsets.mapAttrsToList (user: config:
|
systemd.tmpfiles.rules = [ "d /persist/home/ 0755 root root -" ] ++
|
||||||
"d /persist${config.home} 0700 ${user} users -"
|
lib.attrsets.mapAttrsToList ( user: config: "d /persist${config.home} 0700 ${user} users -" ) normalUsers ++
|
||||||
) normalUsers;
|
lib.attrsets.mapAttrsToList ( user: config: "d ${config.home}/.gnupg 0700 ${user} users -" ) normalUsers;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user