Compare commits
No commits in common. "ffe353681c2c0fada2403d974f9d4caf56f8edcb" and "727400f4e9ac27a05127f852dc7e1cc044b044ce" have entirely different histories.
ffe353681c
...
727400f4e9
16
flake.lock
16
flake.lock
|
@ -273,6 +273,21 @@
|
|||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nix-flatpak": {
|
||||
"locked": {
|
||||
"lastModified": 1721549352,
|
||||
"narHash": "sha256-nlXJa8RSOX0kykrIYW33ukoHYq+FOSNztHLLgqKwOp8=",
|
||||
"owner": "gmodena",
|
||||
"repo": "nix-flatpak",
|
||||
"rev": "dbce39ea8664820ba9037caaf1e2fad365ed6b4b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "gmodena",
|
||||
"repo": "nix-flatpak",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nix-minecraft": {
|
||||
"inputs": {
|
||||
"flake-compat": "flake-compat_2",
|
||||
|
@ -408,6 +423,7 @@
|
|||
"crowdsec": "crowdsec",
|
||||
"home-manager": "home-manager_2",
|
||||
"impermanence": "impermanence",
|
||||
"nix-flatpak": "nix-flatpak",
|
||||
"nix-minecraft": "nix-minecraft",
|
||||
"nixpkgs": "nixpkgs_3",
|
||||
"nixpkgs-unstable": "nixpkgs-unstable"
|
||||
|
|
|
@ -28,6 +28,7 @@
|
|||
|
||||
# Add any other flake you might need.
|
||||
nix-minecraft.url = "github:Infinidoge/nix-minecraft";
|
||||
nix-flatpak.url = "github:gmodena/nix-flatpak";
|
||||
};
|
||||
|
||||
outputs = { self, nixpkgs, home-manager, ... }@inputs:
|
||||
|
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
./mangohud.nix
|
||||
./runescape.nix
|
||||
];
|
||||
|
||||
home = {
|
||||
|
|
20
home-manager/sajenim/features/games/runescape.nix
Normal file
20
home-manager/sajenim/features/games/runescape.nix
Normal file
|
@ -0,0 +1,20 @@
|
|||
{ inputs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
inputs.nix-flatpak.homeManagerModules.nix-flatpak
|
||||
];
|
||||
|
||||
services.flatpak.remotes = lib.mkOptionDefault [
|
||||
{ name = "flathub"; location = "https://dl.flathub.org/repo/flathub.flatpakrepo"; }
|
||||
{ name = "JagexLauncher"; location = "https://jagexlauncher.flatpak.mcswain.dev/JagexLauncher.flatpakrepo"; }
|
||||
];
|
||||
|
||||
services.flatpak.packages = [
|
||||
{ appId = "org.freedesktop.Platform.Compat.i386/x86_64/23.08"; origin = "flathub"; }
|
||||
{ appId = "org.freedesktop.Platform.GL32.default/x86_64/23.08"; origin = "flathub"; }
|
||||
{ appId = "com.jagex.Launcher"; origin = "JagexLauncher"; }
|
||||
{ appId = "com.jagex.Launcher.ThirdParty.RuneLite"; origin = "JagexLauncher"; }
|
||||
];
|
||||
}
|
||||
|
|
@ -16,13 +16,21 @@ in
|
|||
agenix-rekey
|
||||
];
|
||||
|
||||
age.rekey = {
|
||||
# Pubkey for rekeying
|
||||
hostPubkey = ../../${hostname}/ssh_host_ed25519_key.pub;
|
||||
age = {
|
||||
# Master identity used for decryption
|
||||
masterIdentities = [ ../users/sajenim/agenix-rekey.pub ];
|
||||
rekey.masterIdentities = [ ../users/sajenim/agenix-rekey.pub ];
|
||||
# Pubkey for rekeying
|
||||
rekey.hostPubkey = ../../${hostname}/ssh_host_ed25519_key.pub;
|
||||
# Where we store the rekeyed secrets
|
||||
storageMode = "local";
|
||||
localStorageDir = ./. + "/secrets/rekeyed/${config.networking.hostName}";
|
||||
rekey.cacheDir = "/var/tmp/agenix-rekey/\"$UID\"";
|
||||
# All rekeyed secrets for each host will be collected in a derivation which copies them to the nix store when it is built
|
||||
rekey.storageMode = "derivation";
|
||||
};
|
||||
# Required to persist `/var/tmp/agenix-rekey`
|
||||
environment.persistence."/persist".directories = [
|
||||
{ directory = "/var/tmp/agenix-rekey"; mode = "1777"; }
|
||||
];
|
||||
# As user not a trusted-users in our nix.conf
|
||||
# we must add age.rekey.cacheDir as a global extra sandbox path
|
||||
nix.settings.extra-sandbox-paths = [ "/var/tmp/agenix-rekey" ];
|
||||
}
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 jVljVA ILfVChFf5s9U6CODItB/TqS1tUaAEeoLAGiNKPbDclU
|
||||
MCyVqjOPexZm+is5JWG5zfbS26nJj/Z4mk6SJDufBPM
|
||||
-> R<DEa-grease +b`?*<b*
|
||||
/5YP7TzDWxztiGzrMKkUYSBzX9wcz6HSR2mFNX0JmfaTVcnJFrl3KcqfJeNf/z1w
|
||||
JIBgF+2wzeD5I7PCcNjmHGn0f+W9kAImbw8
|
||||
--- LZwgwtMUkIk4l/juYhY0i7kNFurvMAgcjhrYX4PsSEE
|
||||
7c5ÌñÀîÝ{¶>Œ¤Æ¥ãÕ<C3A3>“II¥9ôsÆç~³a–{³ê'¥æ<5›|±o;_§*T³'|yí¿sÇvt(ÊXŠ_J.ø`£ŠÈr`“"ÜÙ|ª*‘Æ[ê
|
|
@ -1,7 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 KTkZog wTpircyIN9PphOvX8FtFMU6Qir790QIhdWGGhp+NSS4
|
||||
NxK4uP2YyJXdhuixQVslEAEecvTu2HUM0JNYxN4uT9M
|
||||
-> Y"s_\v5`-grease [YNL^5 eKm) 9eS1} r
|
||||
BWWX7A4Jar3ojDWzyxayQ0Vi95RG2tE
|
||||
--- o0F6BEiHny57JBW9psAG7JgxoIO0jzbIJ9AG9cROdd4
|
||||
-s;'¸›/‘¯Gõ’ r»È‚Ià·w‡2ï–žèÐP‚ù*EˆÎÝÊ÷W»”~j#4ZwóVü
|
|
@ -1,8 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 KTkZog UtP8CzqqbmeIL6dRQ6UQFP4/ZZWQBPUxbzhqdMnPwSw
|
||||
EMkbY1yoyamLXQ3e8cFK+NW7NSgoWS3/zB0O2odXanI
|
||||
-> za72-grease
|
||||
kRZubf60Uy2ne30UxkeIsgOuKPfx44pvVyMHGxlaHXhC8InnJu8JFAiYuFsc8ky7
|
||||
e7c5
|
||||
--- 15mIrLf9zjT7wEgTsFaUcH5ADhBAf4drxiueUSd/gus
|
||||
Ëž—¸4ÕêçãÛbE#.]aÀ ½£à<ggó[)É¿òù
C‚]h=eêÃŪ·ÅˆEpT¯ã€Iß×{Âêûò¨´ÊB.ƒ0€¡¸rÚÃÀoÒ’W å“d'T¹\é™%´ƒ<1E>öeÃ_÷\•“Éœ5À+ú¹ýÝ,˜m0¹®JÛM¨WÓîCsWô=¸Dn);Z–&´X‹!çG!Â+§aW{e,ìM,±…ÊŠöol+6½Sþ
öÜ4¡<34>” &€î$Ké“üº\4sJùéØÕªÎë
|
|
@ -1,9 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 KTkZog eD/tQAdKjWDDg1sI5fYeLrVTsYA11Pqb+BvHKkbBIxk
|
||||
VHZXnKoyb4QhC6+ir/B+yfAdJ76d6koegb9LGS60Ik4
|
||||
-> m(_p-grease 9:63B,o
|
||||
GI8IPaOpdPBzOiUcj02Be+Ep54hnawoZ6ypt47k
|
||||
--- 8CrSHUUOTWZ11AKVsXHCfSfpcllFwv2Q6xJMHpPQYe0
|
||||
ê7ă~¡™ñM#„eꚶÿ0Š@T
|
||||
³Æ¾ñtáÎ$Ê<>öP›<50>ŽŒHzÜ6’ë
|
||||
ÂÙ<ȼ->:…üª]ÍøÊ™
|
Binary file not shown.
Loading…
Reference in a new issue