Compare commits

..

48 Commits

Author SHA1 Message Date
4abb2bf1eb change ipv6 address for wake onlan 2026-04-02 13:13:47 +02:00
9a336f76dc add talos utilities 2026-03-02 00:24:34 +01:00
b0d8309d65 add talos utilities 2026-03-02 00:22:41 +01:00
d319db25bb Merge branch 'main' of git.unixyourbrain.org:beastie/dev 2026-02-10 18:19:23 +01:00
961e9c475e Reorganise sops. 2026-02-10 18:18:12 +01:00
Jérémie SALVI
27fb3915b6 add docker cli to work-nix 2026-02-04 14:33:07 +01:00
73de596c29 Add openldap to core packages 2026-02-04 13:13:36 +01:00
37a04ee295 after update 2026-02-04 00:55:04 +01:00
a175338e9d debug windowrules 2026-02-03 13:28:21 +01:00
Jérémie SALVI
90a2fcdc43 after uupdate 2026-01-28 13:57:25 +01:00
1ed75f156b debug windowrules 2026-01-23 15:50:41 +01:00
709f96436d remove clear password 2026-01-22 00:01:25 +01:00
367e86389a add CLAUDE.md 2026-01-21 22:13:08 +01:00
e30d2d5641 Add claude and debug waybar-update,sh 2026-01-21 21:53:17 +01:00
5ad6fa0f09 add samba 2026-01-21 21:06:53 +01:00
Jérémie SALVI
c18d5adbc3 add hosts 2026-01-20 11:56:45 +01:00
033dabbd17 add wireguard-tools 2026-01-19 12:49:36 +01:00
fcf06511d4 before update 2026-01-19 12:10:21 +01:00
f9bfcbac85 Update and debug hyprland due to new version 2026-01-09 05:52:10 +01:00
493f1bc25e Drnug gaming skils 2026-01-09 02:42:11 +01:00
eacb5795b6 Add gaming skills 2025-12-21 18:32:18 +01:00
bbda5534f4 add nextcloud to desktop 2025-12-21 17:47:38 +01:00
ee4185f519 Install nextcloud-client additions 2025-12-12 22:53:03 +01:00
0d693c6e11 Add /dev/sda luks partition to crypttab, and install nextcloud-client 2025-12-12 22:04:23 +01:00
f5e8be7432 configure remote wake on lan and ipv6 2025-12-12 07:50:43 +01:00
639dfb6276 Add wake online 2025-12-12 04:42:32 +01:00
a89996a6df Add wake online 2025-12-12 04:42:20 +01:00
ee4e8d6b1e restore qemu to kemu_full 2025-12-11 15:16:47 +01:00
9d061556ff revert flake to a working build 2025-12-09 01:46:47 +01:00
3b7e77e9d8 revert flake 2025-12-08 13:14:03 +01:00
e105020552 before flake update 2025-12-08 12:04:41 +01:00
Jérémie SALVI
933ebb980a flake update 2025-12-02 16:30:27 +01:00
Jérémie SALVI
bda184fc02 flake update 2025-12-02 16:25:57 +01:00
c2dc087510 Creating kvm test server 2025-11-22 13:05:42 +01:00
0c522ead1f before flake update 2025-11-21 10:17:59 +01:00
Jérémie SALVI
1cb02d2249 flake update 2025-11-08 15:14:53 +01:00
Jérémie SALVI
06b4c1b187 flake update 2025-11-08 15:10:23 +01:00
Jérémie SALVI
7286b93459 add libvirt and virt manager 2025-10-29 21:27:18 +01:00
Jérémie SALVI
7fa5f7e492 after flake update 2025-10-29 14:26:06 +01:00
Jérémie SALVI
f5f8476652 after flake update 2025-10-28 14:17:30 +01:00
e7dead2c9e Add aider 2025-10-20 12:51:18 +02:00
b68f3829b7 after flake update 2025-10-20 11:36:11 +02:00
a7fa0cefc7 add autosuggestions to zsh 2025-10-20 03:30:41 +02:00
115a7c334b use only nmcli with nmaplet 2025-10-16 00:29:12 +02:00
Jérémie SALVI
681759c8a7 use only nmcli 2025-10-16 00:19:15 +02:00
Jérémie SALVI
3211b0c84f some work improvments 2025-10-15 23:22:24 +02:00
0f0d4ca519 Change waybar colors 2025-10-13 20:29:02 +02:00
d7e1e8e018 Improve waybar and custom scripts 2025-10-13 20:23:43 +02:00
15 changed files with 129 additions and 90 deletions

18
flake.lock generated
View File

@@ -7,11 +7,11 @@
]
},
"locked": {
"lastModified": 1768923567,
"narHash": "sha256-GVJ0jKsyXLuBzRMXCDY6D5J8wVdwP1DuQmmvYL/Vw/Q=",
"lastModified": 1769524058,
"narHash": "sha256-zygdD6X1PcVNR2PsyK4ptzrVEiAdbMqLos7utrMDEWE=",
"owner": "nix-community",
"repo": "disko",
"rev": "00395d188e3594a1507f214a2f15d4ce5c07cb28",
"rev": "71a3fc97d80881e91710fe721f1158d3b96ae14d",
"type": "github"
},
"original": {
@@ -54,11 +54,11 @@
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1768886240,
"narHash": "sha256-C2TjvwYZ2VDxYWeqvvJ5XPPp6U7H66zeJlRaErJKoEM=",
"lastModified": 1770115704,
"narHash": "sha256-KHFT9UWOF2yRPlAnSXQJh6uVcgNcWlFqqiAZ7OVlHNc=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "80e4adbcf8992d3fd27ad4964fbb84907f9478b0",
"rev": "e6eae2ee2110f3d31110d5c222cd395303343b08",
"type": "github"
},
"original": {
@@ -84,11 +84,11 @@
]
},
"locked": {
"lastModified": 1768863606,
"narHash": "sha256-1IHAeS8WtBiEo5XiyJBHOXMzECD6aaIOJmpQKzRRl64=",
"lastModified": 1770145881,
"narHash": "sha256-ktjWTq+D5MTXQcL9N6cDZXUf9kX8JBLLBLT0ZyOTSYY=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "c7067be8db2c09ab1884de67ef6c4f693973f4a2",
"rev": "17eea6f3816ba6568b8c81db8a4e6ca438b30b7c",
"type": "github"
},
"original": {

View File

@@ -5,6 +5,7 @@
imports = [
./grub.nix
./packages.nix
./sops.nix
./ssh.nix
./system.nix
./tty.nix

View File

@@ -15,6 +15,7 @@
pkgs.unzip
pkgs.sops
pkgs.ssh-to-age
pkgs.age
pkgs.nixos-anywhere
pkgs.nixos-generators
pkgs.efibootmgr
@@ -25,7 +26,7 @@
pkgs.fzf
pkgs.bc
pkgs.wakeonlan
pkgs.samba
pkgs.openssl
];
services = {
locate = {

19
modules/core/sops.nix Normal file
View File

@@ -0,0 +1,19 @@
{
inputs,
...
}:
let
secretsPath = builtins.toString inputs.mysecrets;
in
{
sops = {
defaultSopsFile = "${secretsPath}/secrets.yaml";
age = {
sshKeyPaths = [
"/etc/ssh/ssh_host_ed25519_key"
];
keyFile = "/var/lib/sops-nix/key.txt";
generateKey = true;
};
};
}

View File

@@ -5,6 +5,11 @@
...
}:
{
sops.secrets = {
"users_password/beastie" = {
neededForUsers = true;
};
};
users = {
users = {
${username} = {
@@ -18,7 +23,7 @@
"video"
];
openssh.authorizedKeys.keys = [
config.sops.secrets."ssh_keys/beastie_priv".path
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAKMJ3TkEmRQcX7RQijNa2km6a2xXJk6M6FERh7C9nTJ"
];
shell = pkgs.zsh;
};

View File

@@ -95,5 +95,7 @@ in
pkgs.ansible
pkgs.python313
pkgs.claude-code
pkgs.nodejs
pkgs.php
];
}

View File

@@ -314,8 +314,11 @@ bindl = , XF86AudioPrev, exec, playerctl previous
# windowrule = nofocus,class:^$,title:^$,xwayland:1,floating:1,fullscreen:0,pinned:0
# Supprimer la transparence pour des applications spécifiques
windowrulev2 = opacity 1.0 override,class:^(firefox)$
windowrulev2 = opacity 1.0 override,class:^(chromium)$
windowrulev2 = opacity 1.0 override,class:^(mpv)$
# Opacity order : active, inactive, fullscreen
windowrule = match:class firefox, opacity 1.0 override 0.95 override 1.0 override
windowrule = match:class chromium, opacity 1.0 override 0.95 override 1.0 override
windowrule = match:class mpv, opacity 0.95 override 0.80 override 1.0 override
#windowrule = match:class mpv, fullscreen override
#windowrulev2 = fullscreen,class:^(mpv)$
windowrulev2 = fullscreen,class:^(mpv)$

View File

@@ -26,6 +26,11 @@
pkgs.catppuccin-cursors
pkgs.catppuccin-gtk
pkgs.postman
pkgs.samba
pkgs.openldap
pkgs.argocd
pkgs.talosctl
pkgs.talhelper
];
fonts.packages = [
pkgs.nerd-fonts.dejavu-sans-mono

View File

@@ -0,0 +1,8 @@
{
username,
...
}:
{
virtualisation.docker.enable = true;
users.users.${username}.extraGroups = [ "docker" ];
}

View File

@@ -7,6 +7,7 @@
imports = [
#../ai.nix
../autologin.nix
../docker.nix
../k8s.nix
../libvirt.nix
../openfortivpn.nix
@@ -80,6 +81,8 @@
#172.18.20.37 sso.grandbesancon.fr
#172.18.20.229 auth.grandbesancon.fr
#172.18.20.181 traefikauth.grandbesancon.fr
172.18.21.174 test-patchmon.grandbesancon.fr
172.18.229.240 test-mycarto-autonome.grandbesancon.fr
'';
wireguard = {
interfaces = {

View File

@@ -6,6 +6,7 @@
{
imports = [
../autologin.nix
../docker.nix
../k8s.nix
../libvirt.nix
../openfortivpn.nix
@@ -35,6 +36,7 @@
networkmanager.enable = true;
extraHosts = ''
carto-interavtive 172.18.20.134
test-patchmon.grandbesancon.fr 172.18.21.174
test-crowdsec.grandbesancon.fr 172.18.21.67
test-syslog.grandbesancon.fr 172.18.21.67
'';

View File

@@ -4,6 +4,9 @@
...
}:
{
users.users.${username} = {
extraGroups = [ "libvirtd" ];
};
virtualisation = {
libvirtd = {
enable = true;
@@ -12,11 +15,13 @@
#package = pkgs.qemu;
runAsRoot = true;
swtpm.enable = true;
vhostUserPackages = [
pkgs.virtiofsd
];
};
};
};
users.users.${username} = {
extraGroups = [ "libvirtd" ];
};
environment.systemPackages = with pkgs; [
virtiofsd
];
}

View File

@@ -1,23 +1,9 @@
{
inputs,
username,
...
}:
let
secretsPath = builtins.toString inputs.mysecrets;
in
{
sops = {
defaultSopsFile = "${secretsPath}/secrets.yaml";
age = {
sshKeyPaths = [
"/etc/ssh/ssh_host_ed25519_key"
];
keyFile = "/var/lib/sops-nix/key.txt";
generateKey = true;
};
secrets = {
sops.secrets = {
"users_password/beastie" = {
neededForUsers = true;
};
@@ -72,5 +58,4 @@ in
path = "/home/${username}/.ssh/id_ed25519_wol.priv";
};
};
};
}

View File

@@ -17,7 +17,7 @@
};
environment.systemPackages = [ pkgs.ethtool ];
my.wolipv6address = "2a01:e0a:9cc:99d0:8f3a:6b2c:41d7:e9f5";
my.wolipv6address = "2a01:e0a:f5d:3400:6b2c:41d7:e9f5";
boot.initrd = {
network = {
@@ -32,7 +32,7 @@
};
postCommands = ''
ip -6 addr add ${config.my.wolipv6address}/64 dev ${config.my.laninterface}
ip -6 route add default via fe80::224:d4ff:fea5:65bd dev ${config.my.laninterface}
ip -6 route add default via fe80::3a07:16ff:fe11:45a8 dev ${config.my.laninterface}
'';
};
availableKernelModules = [ "r8169" ];