Personal Nix setup

Update pepper/linux

+4 -4
flake.lock
···
"sqlite-lib-src": "sqlite-lib-src"
},
"locked": {
-
"lastModified": 1756753599,
-
"narHash": "sha256-yD8PMlRjUI2sN5PvkDJRfGz96zCp4gejaguDVmZ4utg=",
"ref": "refs/heads/master",
-
"rev": "da3540c0c134331c10f1a8d124ee0925e57f8112",
-
"revCount": 1279,
"type": "git",
"url": "ssh://git@tangled.sh/tangled.sh/core"
},
···
"sqlite-lib-src": "sqlite-lib-src"
},
"locked": {
+
"lastModified": 1757078979,
+
"narHash": "sha256-3ax8YuYp3MIUYIdov8l2cmXIwO/TSGsc1TUv3r1yIAg=",
"ref": "refs/heads/master",
+
"rev": "02b54de9c4f391f75eb8287e3857ecda30d483a4",
+
"revCount": 1291,
"type": "git",
"url": "ssh://git@tangled.sh/tangled.sh/core"
},
-1
flake.nix
···
inherit overlays;
system = "aarch64-linux";
hostname = "ramune";
-
modules = [ inputs.tangled.nixosModules.knot ];
};
overlays = {
···
inherit overlays;
system = "aarch64-linux";
hostname = "ramune";
};
overlays = {
home/base/encrypt/DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5.key.age

This is a binary file and will not be displayed.

+18 -11
home/base/gpg.nix
···
publicKeys = [
{ source = ./assets/pubring.asc; trust = "ultimate"; }
];
};
services.gpg-agent = {
enable = true;
enableSshSupport = true;
verbose = true;
-
sshKeys = [ "DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5" ];
-
defaultCacheTtl = 1;
-
defaultCacheTtlSsh = 1;
-
maxCacheTtl = 10;
-
maxCacheTtlSsh = 10;
noAllowExternalCache = true;
-
pinentry = helpers.mkIfDarwin {
-
package = pkgs.pinentry-touchid;
-
program = "pinentry-touchid";
-
};
};
systemd.user.services.gpg-agent.Service.Slice = "session.slice";
modules.git.signingKey = mkDefault "4EAF3D43CDBB01C9";
-
-
home.file."${home}/sshcontrol".text = "DDA4674BEB2FBE8A1EFB6F542FA66EDC2BFD54F5";
# ed25519 2025-09-06 [C]
age.secrets."147CBD801C5E0D0C27DD006653D3D96FF952F652.key" = {
···
publicKeys = [
{ source = ./assets/pubring.asc; trust = "ultimate"; }
];
+
scdaemonSettings = {
+
disable-ccid = true;
+
};
};
services.gpg-agent = {
enable = true;
enableSshSupport = true;
+
enableScDaemon = false;
verbose = true;
+
defaultCacheTtl = 20;
+
defaultCacheTtlSsh = 20;
+
maxCacheTtl = 60;
+
maxCacheTtlSsh = 60;
noAllowExternalCache = true;
+
pinentry = mkMerge [
+
(helpers.mkIfDarwin {
+
package = pkgs.pinentry-touchid;
+
program = "pinentry-touchid";
+
})
+
(helpers.mkIfLinux {
+
package = pkgs.pinentry-all;
+
program = "pinentry-qt";
+
})
+
];
};
systemd.user.services.gpg-agent.Service.Slice = "session.slice";
modules.git.signingKey = mkDefault "4EAF3D43CDBB01C9";
# ed25519 2025-09-06 [C]
age.secrets."147CBD801C5E0D0C27DD006653D3D96FF952F652.key" = {
+1
lib/system.nix
···
nixpkgs.lib.nixosSystem {
inherit system specialArgs lib;
modules = systemModules ++ [
inputs.yeetmouse.nixosModules.default
inputs.agenix.nixosModules.default
home-manager.nixosModules.home-manager {
···
nixpkgs.lib.nixosSystem {
inherit system specialArgs lib;
modules = systemModules ++ [
+
inputs.tangled.nixosModules.knot
inputs.yeetmouse.nixosModules.default
inputs.agenix.nixosModules.default
home-manager.nixosModules.home-manager {
+1 -1
modules/desktop/hyprland.nix
···
kb_model=${cfg.hyprland.input.kb_model}
kb_variant=${cfg.hyprland.input.kb_variant}
sensitivity=${toString cfg.hyprland.input.sensitivity}
}
misc {
···
}
render {
-
explicit_sync=0
direct_scanout=1
expand_undersized_textures=false
cm_fs_passthrough=1
···
kb_model=${cfg.hyprland.input.kb_model}
kb_variant=${cfg.hyprland.input.kb_variant}
sensitivity=${toString cfg.hyprland.input.sensitivity}
+
accel_profile = "flat"
}
misc {
···
}
render {
direct_scanout=1
expand_undersized_textures=false
cm_fs_passthrough=1
+1 -1
modules/desktop/session.nix
···
};
upower.enable = true;
gvfs.enable = true;
-
logind = {
powerKey = "suspend";
powerKeyLongPress = "poweroff";
lidSwitch = "suspend";
···
};
upower.enable = true;
gvfs.enable = true;
+
logind.settings.Login = {
powerKey = "suspend";
powerKeyLongPress = "poweroff";
lidSwitch = "suspend";