summaryrefslogtreecommitdiff
path: root/labsrv01/home.nix
diff options
context:
space:
mode:
authorKJ Tsanaktsidis <kj@kjtsanaktsidis.id.au>2026-01-07 23:02:27 +1100
committerKJ Tsanaktsidis <kj@kjtsanaktsidis.id.au>2026-01-07 23:02:27 +1100
commit29cdd81138388af04004ad1bfef39dd45ac7ee8e (patch)
tree662ef708ad95031f57233a4709fbb795d9cf0ae8 /labsrv01/home.nix
parent6ccad007f2b451266367390d1d4ef28a15a8e82d (diff)
more twiddle
Diffstat (limited to 'labsrv01/home.nix')
-rw-r--r--labsrv01/home.nix103
1 files changed, 0 insertions, 103 deletions
diff --git a/labsrv01/home.nix b/labsrv01/home.nix
deleted file mode 100644
index c5b5989..0000000
--- a/labsrv01/home.nix
+++ /dev/null
@@ -1,103 +0,0 @@
-{
- config,
- pkgs,
- ...
-}:
-{
- home.username = "kjtsanaktsidis";
- home.homeDirectory = "/home/kjtsanaktsidis";
- home.stateVersion = "25.11";
-
- programs.home-manager.enable = true;
-
- # Install packages
- home.packages = with pkgs; [
- htop
- zellij
- tmux
- neovim
- git-absorb
- # LazyVim dependencies
- lazygit
- ripgrep
- fd
- nodejs
- python3
- ];
-
- # Configure sops for home-manager
- sops = {
- age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
- defaultSopsFile = ./secrets.yaml;
- secrets = {
- kj_id_ed25519 = {
- path = "${config.home.homeDirectory}/.ssh/id_ed25519";
- };
- kj_gpg_private_key = {
- path = "${config.home.homeDirectory}/.gnupg/private-key.asc";
- };
- };
- };
-
- # Git configuration
- programs.git = {
- enable = true;
- settings = {
- user.name = "KJ Tsanaktsidis";
- user.email = "kj@kjtsanaktsidis.id.au";
- pull.rebase = true;
- };
- signing = {
- key = "7F21FB211E24B02A5DEF86E227CD40EB9B81C726";
- signByDefault = true;
- };
- };
-
- # Zsh configuration
- programs.zsh = {
- enable = true;
- history = {
- size = 1000000;
- save = 1000000;
- append = true;
- extended = true;
- ignoreSpace = false;
- ignoreDups = false;
- };
-
- initContent = builtins.readFile ./zsh-config.zsh;
- };
-
- # FZF with standard keybindings
- programs.fzf = {
- enable = true;
- enableZshIntegration = true;
- };
-
- programs.gpg = {
- enable = true;
- homedir = "${config.home.homeDirectory}/.gnupg";
- };
- services.gpg-agent = {
- enable = true;
- };
- systemd.user.services.manage-secrets = {
- Unit = {
- Description = "Import GPG and SSH keys from sops secrets";
- After = [ "sops-nix.service" ];
- Requires = [ "sops-nix.service" ];
- };
- Service = {
- Type = "oneshot";
- RemainAfterExit = true;
- ExecStart = toString (pkgs.writeShellScript "manage-secrets" ''
- export GNUPGHOME="${config.programs.gpg.homedir}"
- ${pkgs.gnupg}/bin/gpg --batch --verbose --trust-model always --import "${config.sops.secrets.kj_gpg_private_key.path}"
- ${pkgs.openssh}/bin/ssh-keygen -y -f "${config.home.homeDirectory}/.ssh/id_ed25519" > "${config.home.homeDirectory}/.ssh/id_ed25519.pub"
- '');
- };
- Install = {
- WantedBy = [ "default.target" ];
- };
- };
-}