WIP: Update & fix keybase

This commit is contained in:
Tristan D. 2023-12-14 19:13:03 +01:00
parent 292fc7dbe3
commit 6ce485ac86
Signed by: tristan
SSH key fingerprint: SHA256:U7y6eMb7CQDaTHv9XoX6/BaQnPqyxxKc+Xnfcefi6rY
5 changed files with 39 additions and 34 deletions

50
flake.lock generated
View file

@ -10,11 +10,11 @@
"yafas": "yafas" "yafas": "yafas"
}, },
"locked": { "locked": {
"lastModified": 1702410648, "lastModified": 1702495959,
"narHash": "sha256-U6vmxn1s0DhtBGJ57dBzDwtFVyu+P//lc9AXcXC7qv0=", "narHash": "sha256-xLYLHlF0wsBNQtC1FMYHhhu13lRUxFh8uEMkv5/427g=",
"owner": "chaotic-cx", "owner": "chaotic-cx",
"repo": "nyx", "repo": "nyx",
"rev": "e22c855e000c91e9f469bbd406e5e3ae125d47f8", "rev": "7369da9bf46df08ec2d4793f72e7000d511864e4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -45,11 +45,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1701905325, "lastModified": 1702479765,
"narHash": "sha256-lda63LmEIlDMeCgWfjr3/wb487XPllBByfrGRieyEk4=", "narHash": "sha256-wjNYsFhciYoJkZ/FBKvFj55k+vkLbu6C2qYQ7K+s8pI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "disko", "repo": "disko",
"rev": "1144887c6f4d2dcbb2316a24364ef53e25b0fcfe", "rev": "bd8fbc3f274288ac905bcea66bc2a5428abde458",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -69,11 +69,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1702399955, "lastModified": 1701334333,
"narHash": "sha256-FnB5O1RVFzj3h7Ayf7UxFnOL1gsJuG6gn1LCTd9dKFs=", "narHash": "sha256-rsJ11xznoc2JSmM57bstxyas8xq8ZaEqNhQuQWyoQ/A=",
"owner": "nix-community", "owner": "nix-community",
"repo": "emacs-overlay", "repo": "emacs-overlay",
"rev": "47798c4ab07d5f055bb2625010cf6d8e3f384923", "rev": "913e44a13636fd111139ee683a6741ccb4c28672",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -233,12 +233,12 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1702203126, "lastModified": 1702423270,
"narHash": "sha256-4BhN2Vji19MzRC7SUfPZGmtZ2WZydQeUk/ogfRBIZMs=", "narHash": "sha256-3ZA5E+b2XBP+c9qGhWpRApzPq/PZtIPgkeEDpTBV4g8=",
"rev": "defbb9c5857e157703e8fc7cf3c2ceb01cb95883", "rev": "d9297efd3a1c3ebb9027dc68f9da0ac002ae94db",
"revCount": 3178, "revCount": 3189,
"type": "tarball", "type": "tarball",
"url": "https://api.flakehub.com/f/pinned/nix-community/home-manager/0.1.3178%2Brev-defbb9c5857e157703e8fc7cf3c2ceb01cb95883/018c5337-b35a-70f9-ab26-b36c9064d16c/source.tar.gz" "url": "https://api.flakehub.com/f/pinned/nix-community/home-manager/0.1.3189%2Brev-d9297efd3a1c3ebb9027dc68f9da0ac002ae94db/018c6056-840b-7cf1-807e-7eba8b631300/source.tar.gz"
}, },
"original": { "original": {
"type": "tarball", "type": "tarball",
@ -364,12 +364,12 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1702151865, "lastModified": 1702312524,
"narHash": "sha256-9VAt19t6yQa7pHZLDbil/QctAgVsA66DLnzdRGqDisg=", "narHash": "sha256-gkZJRDBUCpTPBvQk25G0B7vfbpEYM5s5OZqghkjZsnE=",
"rev": "666fc80e7b2afb570462423cb0e1cf1a3a34fedd", "rev": "a9bf124c46ef298113270b1f84a164865987a91c",
"revCount": 557885, "revCount": 558881,
"type": "tarball", "type": "tarball",
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.1.557885%2Brev-666fc80e7b2afb570462423cb0e1cf1a3a34fedd/018c547a-1b6d-7b79-84fc-aab0c12f1b6e/source.tar.gz" "url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.1.558881%2Brev-a9bf124c46ef298113270b1f84a164865987a91c/018c5fba-8d93-798c-8bda-4b11a431ccba/source.tar.gz"
}, },
"original": { "original": {
"type": "tarball", "type": "tarball",
@ -444,11 +444,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1702233072, "lastModified": 1702346276,
"narHash": "sha256-H5G2wgbim2Ku6G6w+NSaQaauv6B6DlPhY9fMvArKqRo=", "narHash": "sha256-eAQgwIWApFQ40ipeOjVSoK4TEHVd6nbSd9fApiHIw5A=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "781e2a9797ecf0f146e81425c822dca69fe4a348", "rev": "cf28ee258fd5f9a52de6b9865cdb93a1f96d09b7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -513,11 +513,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1702417575, "lastModified": 1702547108,
"narHash": "sha256-89HhMpiU48+PrZW/nkYxl9A2uRt94ud/J/FIf6k0dW8=", "narHash": "sha256-1SZWYPXMaQdsDPrqWd4iTORb7ZnzUWPfEHACHdc+lRI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "55ff7c9e06b3dd19be193158fb39df1a4623ea70", "rev": "18310bf0ad74f04a57a89a70d52d78e719e46774",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -128,7 +128,7 @@
}; };
nixosConfigurations = { nixosConfigurations = {
nixos-pulse = nixpkgs.lib.nixosSystem { nixos-pulse = nixpkgs.lib.nixosSystem {
system = system; system = system;
specialArgs = args; specialArgs = args;
modules = modules =
[ [
@ -143,7 +143,7 @@
++ osModules; ++ osModules;
}; };
nixos-desk = nixpkgs.lib.nixosSystem { nixos-desk = nixpkgs.lib.nixosSystem {
system = system; system = system;
specialArgs = args; specialArgs = args;
modules = modules =
[ [
@ -167,7 +167,7 @@
++ osModules; ++ osModules;
}; };
nixos-karl-kvm-guest = nixpkgs.lib.nixosSystem { nixos-karl-kvm-guest = nixpkgs.lib.nixosSystem {
system = system; system = system;
specialArgs = args; specialArgs = args;
modules = modules =
[ [

View file

@ -197,6 +197,7 @@ in
cmake cmake
curl curl
direnv direnv
filezilla
fd fd
gnutls gnutls
gnumake gnumake

View file

@ -18,16 +18,19 @@
}; };
# security.wrappers.keybase-redirector = { # security.wrappers.keybase-redirector = {
# setuid = true; # setuid = true;
# owner = "root"; # owner = "root";
# group = "root"; # group = "root";
# source = "${pkgs.kbfs}/bin/redirector"; # source = "${pkgs.kbfs}/bin/redirector";
# }; # };
environment.systemPackages = with pkgs; [
keybase-gui
];
services = { services = {
keybase.enable = true; keybase.enable = true;
kbfs.enable = false; kbfs.enable = true;
kbfs.enableRedirector = false; # kbfs.enableRedirector = true;
resolved = { resolved = {
enable = true; enable = true;
dnssec = "true"; dnssec = "true";

View file

@ -78,6 +78,7 @@
192.168.0.245 cloud.oekonzept.net 192.168.0.245 cloud.oekonzept.net
192.168.0.245 office.oekonzept.net 192.168.0.245 office.oekonzept.net
192.168.0.245 llama.oekonzept.net 192.168.0.245 llama.oekonzept.net
192.168.0.245 netdata.oekonzept.net
192.168.0.245 nixos-karl-kvm-guest.oekonzept.de 192.168.0.245 nixos-karl-kvm-guest.oekonzept.de
''; '';
interfaces = { interfaces = {