Files
dendritic/modules/hosts/john-pc-ubuntu.nix
2026-03-09 22:08:38 -05:00

66 lines
1.8 KiB
Nix

{ inputs, ... }:
{
flake.homeModules."john-pc-ubuntu" = { pkgs, ... }: {
imports = with inputs.self.homeModules; [
john
desktop
resticprofile
sops
];
home.packages = with pkgs; [
nixos-rebuild
];
# TODO: Add host-specific settings here:
# - sops secret for `restic_password/john_ubuntu`
# - resticprofile profile definition
# - zsh RESTIC* session variables
};
flake.homeConfigurations."john-pc-ubuntu" = inputs.home-manager.lib.homeManagerConfiguration {
pkgs = import inputs.nixpkgs { system = "x86_64-linux"; };
modules = [
inputs.self.homeModules."john-pc-ubuntu"
# Include another inline module to set the options created through the jsl-home modules
({ config, ... }: {
# TODO: make this more restrictive, rather than allowing all unfree packages
nixpkgs.config.allowUnfree = true;
nixpkgs.config.permittedInsecurePackages = [ "openssl-1.1.1w" ];
homeManagerFlakeDir = "${config.xdg.configHome}/home-manager/jsl-dendritic";
docker.enable = true;
ssh.matchSets = {
certs = true;
appdaemon = true;
homelab = true;
dev = true;
};
shell.program = "zsh";
sops.secrets."restic_password/john_ubuntu" = {
path = "${config.xdg.configHome}/resticprofile/password.txt";
};
programs.resticprofile = {
enable= true;
profiles = {
default = {
"inherit" = "base";
repository = "rest:https://soteria.john-stream.com/john-ubuntu";
cacert = "${config.home.homeDirectory}/.step/certs/root_ca.crt";
tls-client-cert = "${config.home.homeDirectory}/.step/certs/mtls.pem";
backup = {
source = [
"${config.xdg.userDirs.documents}"
"/conf"
];
schedule = "*-*-* *:15,30,45:00";
};
};
};
};
})
];
};
}