Compare commits

..

3 Commits

Author SHA1 Message Date
572314fe46 flake.nix: PR that fixes nix/lix bug w/ sshServe
Signed-off-by: unexplrd <unexplrd@linerds.us>
2025-06-06 16:55:29 +03:00
854a3be744 hosts/dunamis: move nix.sshServe to misc
Signed-off-by: unexplrd <unexplrd@linerds.us>
2025-06-06 16:55:29 +03:00
a5a2e9ceac user/programs: remove devenv
Signed-off-by: unexplrd <unexplrd@linerds.us>
2025-06-06 16:55:29 +03:00
6 changed files with 24 additions and 18 deletions

8
flake.lock generated
View File

@ -966,16 +966,16 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1748929857,
"narHash": "sha256-lcZQ8RhsmhsK8u7LIFsJhsLh/pzR9yZ8yqpTzyGdj+Q=",
"lastModified": 1748962802,
"narHash": "sha256-PmLFTJD6sbGpeGSMcCk091dvygDMxzsSqg4CFm5gHaw=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "c2a03962b8e24e669fb37b7df10e7c79531ff1a4",
"rev": "e7d00ea9afa4b44c0dabfc43a83de1bad0bb71e0",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"ref": "pull/413627/head",
"repo": "nixpkgs",
"type": "github"
}

View File

@ -61,7 +61,9 @@
url = "github:nixos/nixpkgs/nixos-24.11";
};
nixpkgs = {
url = "github:NixOS/nixpkgs?ref=nixos-unstable";
# url = "github:NixOS/nixpkgs?ref=nixos-unstable";
# workaround for `unexpected Nix daemon error: error: serialised integer 7022364302122705765 is too large for type 'j'`
url = "github:NixOS/nixpkgs/pull/413627/head";
};
sops-nix = {
url = "github:mic92/sops-nix";

View File

@ -45,16 +45,4 @@
opentabletdriver.enable = false;
qmk-vial.enable = true;
virtual.libvirt.enable = true;
nix = let
inherit (builtins) readFile;
inherit (config.users.users) user;
in {
settings.trusted-users = ["nix-ssh"];
sshServe = {
enable = true;
write = true;
keys = map (f: readFile f) user.openssh.authorizedKeys.keyFiles;
};
};
}

View File

@ -1,5 +1,6 @@
{
imports = [
# ./minecraft.nix
./nix-ssh-serve.nix
];
}

View File

@ -0,0 +1,15 @@
{config, ...}: {
nix = let
inherit (builtins) readFile;
inherit (config.users.users) user;
in {
sshServe = {
enable = true;
keys = map (f: readFile f) user.openssh.authorizedKeys.keyFiles;
# protocol = "ssh-ng";
trusted = true;
write = true;
};
};
security.pam.enableSSHAgentAuth = true;
}

View File

@ -57,7 +57,7 @@
[
# development utils
alejandra # nix formatter in rust
devenv # programming deps in rust
# devenv # programming deps in rust
jj-fzf # fuzzy finder jujutsu tui
just # make in rust
silicon # create code pics in rust