Skip to content

Commit

Permalink
feat: yet another huge commit
Browse files Browse the repository at this point in the history
  • Loading branch information
sioodmy committed Dec 31, 2023
1 parent 2bda47a commit edfa033
Show file tree
Hide file tree
Showing 15 changed files with 224 additions and 112 deletions.
6 changes: 3 additions & 3 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions home/cli/zsh/aliases.nix
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ with pkgs; {
agpl = "curl https://www.gnu.org/licenses/agpl-3.0.txt -o LICENSE";
webcam = "ffplay /dev/video0";
deploy = "nixos-rebuild --target-host root@192.168.21.69 --flake .#iapetus switch";
rebuild = "sudo nixos-rebuild switch --flake .#";
g = "git";
n = "nix";
mnt = "udisksctl mount -b";
Expand Down
1 change: 1 addition & 0 deletions home/misc/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
imports = [
./media.nix
./vencord
./khal.nix
./schizofox.nix
./rnnoise.nix
./swayidle.nix
Expand Down
41 changes: 41 additions & 0 deletions home/misc/khal.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{...}: {
programs.vdirsyncer.enable = true;
programs.khal = {
enable = true;

locale = {
timeformat = "%H:%M";
dateformat = "%d.%m";
longdateformat = "%d.%m.%Y";
datetimeformat = "%d.%m %H:%M";
longdatetimeformat = "%d.%m.%Y %H:%M";
};
};

accounts.calendar.basePath = "Calendars";
accounts.calendar.accounts.main = {
primary = true;
primaryCollection = "Grafik";
khal = {
enable = true;
color = "dark red";
type = "discover";
glob = "*";
};
local = {
type = "filesystem";
fileExt = ".ics";
};
remote = {
type = "caldav";
url = "http://192.168.21.69:5232/sioodmy/cba1abfe-7388-5310-02a3-9dd7a4e21e39/";
userName = "sioodmy";
passwordCommand = ["cat" "/run/agenix/radicale-pass"];
};
vdirsyncer = {
enable = true;
collections = ["Grafik"];
conflictResolution = "remote wins";
};
};
}
20 changes: 17 additions & 3 deletions home/misc/schizofox.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
{...}: {
programs.schizofox = {
enable = true;
security.sandbox = false;
security = {
wrapWithProxychains = false;
sandbox = false;
};
theme = {
colors = {
background-darker = "181825";
Expand All @@ -18,9 +21,20 @@
"webextension@metamask.io".install_url = "https://addons.mozilla.org/firefox/downloads/latest/ether-metamask/latest.xpi";
};
};
search = {
searxUrl = "search.notashelf.dev";
search = rec {
defaultSearchEngine = "Searx";
# removeEngines = ["Bing" "Amazon.com" "eBay" "Twitter" "Wikipedia" "LibRedirect" "DuckDuckGo"];
searxUrl = "https://search.notashelf.dev";
searxQuery = "${searxUrl}/search?q={searchTerms}&categories=general";
# addEngines = [
# {
# Name = "Searxng";
# Description = "Decentralized search engine";
# Alias = "sx";
# Method = "GET";
# URLTemplate = "${searxQuery}";
# }
# ];
};
};
}
1 change: 1 addition & 0 deletions home/packages.nix
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
home.packages = with pkgs; [
ledger-live-desktop
ledger_agent
calcurse
caprine-bin
pulseaudio
signal-desktop
Expand Down
1 change: 1 addition & 0 deletions hosts/iapetus/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
}: {
networking = {
hostName = "iapetus";
defaultGateway = "192.168.21.1";
interfaces.eth0.ipv4.addresses = [
{
address = "192.168.21.69";
Expand Down
21 changes: 21 additions & 0 deletions secrets/radicale-pass.age
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
age-encryption.org/v1
-> ssh-ed25519 naeoPA yP6blwsHEEamvoOiUL3aQB74L1qGxj3pjCRYlhW4kwM
MfqmmFzXG0CuY7PcjsGl1jw2rrtYkIIFTQyh7zRZK1M
-> ssh-ed25519 mUdfUg J8eRngBraeP3FHgJLK+36l0cHQ2id8SG8dxAdW02FRg
rsUIVUCXJUdgyX115J88GLKZqOqnTvecfPtIg1yROyw
-> ssh-ed25519 G6wImw Hpq7ZY8eH+pMd0vDQiTKwxI2hiRBTSv0ihuAW7w8Dxc
W4M1kelpMWorzgQBzin1TnvskYMJhC+nwCLZFeuGlFM
-> ssh-rsa 29b9iQ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--- JjYN3dlyr0490nJoZH406CEokam0+LG0w9o2heKdhJ0
�R���*>D�fY�;��U�>u�&�2q�]fZs��;V
Binary file added secrets/radicale.age
Binary file not shown.
7 changes: 7 additions & 0 deletions secrets/secrets.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,12 @@ let

calypso-host = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPhD+J2Iivt9mTVV2I79iGlqN+YQFb4PPkqle0brUKy4 root@calypso";

iapetus-host = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII6SEc5n1jdc9u9TLrpmZZ/3MqCrAxI/8enfkC2m/L4f root@iapetus";

anthe = [anthe-user anthe-host];
calypso = [calypso-user calypso-host];

iapetus = [anthe-user calypso-user iapetus-host];
in {
age.identityPaths = "/persist/home/sioodmy/.ssh/id_ed25519";
"spotify.age".publicKeys = anthe;
Expand All @@ -16,4 +20,7 @@ in {

"syncthing-calypso-key.age".publicKeys = calypso;
"syncthing-calypso-cert.age".publicKeys = calypso;

"radicale.age".publicKeys = iapetus;
"radicale-pass.age".publicKeys = calypso ++ anthe;
}
28 changes: 0 additions & 28 deletions system/core/bootloader.nix
Original file line number Diff line number Diff line change
Expand Up @@ -16,34 +16,6 @@ in {
useTmpfs = false;
};
# some kernel parameters, i dont remember what half of this shit does but who cares
kernelParams = [
# increase security of heap
"slab_nomerge"
# mitigate use-after-free vulnerabilities and erase sensitive information in memory
"init_on_alloc=1"
"init_on_free=1"
# make page allocations less predictable
"page_alloc.shuffle=1"
# prevent meltdown
"pti=on"
# CVE-2019-18683
"randomize_kstack_offset=on"
# disable obsolete vsyscalls
"vsyscall=none"

"vga=current"
"rd.systemd.show_status=false"
"rd.udev.log_level=3"
"udev.log_priority=3"
# security
"lsm=landlock,lockdown,yama,apparmor,bpf"
# disable noisy audit log
"audit=0"
# i dont use it
"ipv6.disable=1"
# passthrough
"iommu=pt"
];
consoleLogLevel = mkDefault 0;
initrd.verbose = false;
# switch from old ass lts kernel
Expand Down
Loading

0 comments on commit edfa033

Please sign in to comment.