summaryrefslogtreecommitdiff
path: root/kj-laptop01/configuration.nix
diff options
context:
space:
mode:
authorKj Tsanaktsidis <kjtsanaktsidis@groq.com>2026-01-09 11:58:31 +1100
committerKj Tsanaktsidis <kjtsanaktsidis@groq.com>2026-01-09 11:58:31 +1100
commit98e94297af73c583c9636c99772b2c1c34f98743 (patch)
tree1ac244e55b6d544d556b2327308d07708350e824 /kj-laptop01/configuration.nix
parentf5686b8e377ce3ecbf617783b4f2398423cb19fd (diff)
some refactor
Diffstat (limited to 'kj-laptop01/configuration.nix')
-rw-r--r--kj-laptop01/configuration.nix134
1 files changed, 0 insertions, 134 deletions
diff --git a/kj-laptop01/configuration.nix b/kj-laptop01/configuration.nix
deleted file mode 100644
index 610ecd3..0000000
--- a/kj-laptop01/configuration.nix
+++ /dev/null
@@ -1,134 +0,0 @@
-{
- modulesPath,
- lib,
- pkgs,
- sops,
- config,
- ...
-}@args:
-{
- imports = [
- ./disk-config.nix
- ];
-
- nix = {
- extraOptions = ''
- experimental-features = ca-derivations nix-command flakes
- '';
- settings = {
- substituters = [
- "https://cache.nixos.org"
- "https://cache.ngi0.nixos.org/"
- ];
- trusted-public-keys = [
- "cache.ngi0.nixos.org-1:KqH5CBLNSyX184S9BKZJo1LxrxJ9ltnY2uAs5c/f1MA="
- ];
- };
- };
-
- sops = {
- defaultSopsFile = ./secrets.yaml;
- age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
- age.generateKey = false;
-
- secrets = {
- luks_passphrase = { };
- kj_hashed_password = {
- neededForUsers = true;
- };
- ssh_host_key_ed25519 = { };
- ssh_host_key_rsa = { };
- };
- };
-
- boot.loader.systemd-boot.enable = true;
- system.stateVersion = "25.05";
- swapDevices = [
- {
- device = "/swap/swapfile";
- size = 32768;
- }
- ];
-
- security.sudo.enable = true;
- users.mutableUsers = false;
- users.groups.kjtsanaktsidis = { };
- users.users = {
- kjtsanaktsidis = {
- createHome = true;
- isNormalUser = true;
- description = "KJ Tsanaktsidis";
- group = "kjtsanaktsidis";
- extraGroups = [
- "wheel"
- "networkmanager"
- ];
- shell = pkgs.zsh;
- hashedPasswordFile = config.sops.secrets.kj_hashed_password.path;
- openssh.authorizedKeys.keys = [
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAC/BtvW1c1RbBI8eeGo7oOH2y9byBaxWVDHsErgaE+s kjtsanaktsidis@KJMacbookGroq.local"
- ];
- };
- };
-
- # Enable systemd-resolved for DNS
- services.resolved = {
- enable = true;
- llmnr = "true";
- extraConfig = ''
- MulticastDNS=yes
- '';
- };
- networking.hostName = "kj-laptop01";
- networking.nameservers = [ "127.0.0.53" ];
- networking.networkmanager = {
- enable = true;
- dns = "systemd-resolved";
- # Enable mDNS on NetworkManager connections
- connectionConfig = {
- "connection.mdns" = "2"; # 2 = yes (resolve & register)
- };
- };
-
- services.openssh = {
- enable = true;
- hostKeys = [
- {
- type = "ed25519";
- path = config.sops.secrets.ssh_host_key_ed25519.path;
- }
- {
- type = "rsa";
- path = config.sops.secrets.ssh_host_key_rsa.path;
- }
- ];
- };
-
- environment.systemPackages = with pkgs; [];
-
- # Enable zsh system-wide
- programs.zsh.enable = true;
-
- # Disable Alt+Left/Right virtual terminal switching
- console.keyMap = "us";
-
- # Create systemd service to disable only Alt+Arrow VT switching
- systemd.services.disable-alt-arrow-vt = {
- description = "Disable Alt+Arrow VT switching";
- wantedBy = [ "multi-user.target" ];
- after = [ "systemd-vconsole-setup.service" ];
- script = ''
- # Define string sequences for Alt+Arrow that generate proper terminal escape sequences
- cat << 'EOF' | ${pkgs.kbd}/bin/loadkeys
- string F200 = "\033[1;3D"
- string F201 = "\033[1;3C"
- alt keycode 105 = F200
- alt keycode 106 = F201
- EOF
- '';
- serviceConfig = {
- Type = "oneshot";
- RemainAfterExit = true;
- };
- };
-}