Compare commits

..

No commits in common. "cb33f4be44d8d7295543e486d33457d184325487" and "13ae39db7d4595ba337d69591976b9db9e1f8599" have entirely different histories.

6 changed files with 1 additions and 20 deletions

View File

@ -51,7 +51,6 @@ in {
"ManagedBookmarks" = [
{ "toplevel_name" = "Bookmarks"; }
{ "name" = "Daily"; "children" = [
{ "url" = "https://lc.tstarr.us"; name = "Chisme Mattermost"; }
{ "url" = "https://rss.tstarr.us"; name = "Miniflux"; }
{ "url" = "https://cloud.tstarr.us"; name = "Nextcloud"; }
{ "url" = "https://git.tstarr.us"; name = "Gitea"; }

View File

@ -5,14 +5,12 @@ in {
options.modules.services.peripherals.enable = lib.mkEnableOption "peripherals";
config = lib.mkIf cfg.enable {
services.usbmuxd.enable = true; # for iOS mounting as storage
environment.systemPackages = with pkgs; [
pulseaudio # Sound server for Linux and other Unix-like operating systems.
pavucontrol # Simple GTK based mixer for the PulseAudio sound server
libimobiledevice # Library to support iPhone, iPod Touch and iPad devices on Linux
ifuse # fuse filesystem implementation to access the contents of iOS devices
];
# rtkit is optional but recommended
security.rtkit.enable = true;
services.pipewire = {
enable = true;

View File

@ -15,8 +15,6 @@ in {
owner = "${user}";
group = "users";
};
# ssh secrets
age.secrets."ssh/kestrel/id_ed25519" = {
file = ../../secrets/ssh/kestrel/id_ed25519.age;
owner = "${user}";
@ -27,17 +25,5 @@ in {
owner = "${user}";
group = "users";
};
# emu secrets
age.secrets."emu/switch/prod.keys" = {
file = ../../secrets/emu/switch/prod.keys.age;
owner = "${user}";
group = "users";
};
age.secrets."emu/switch/title.keys" = {
file = ../../secrets/emu/switch/title.keys.age;
owner = "${user}";
group = "users";
};
};
}

View File

@ -10,8 +10,6 @@ let
in
{
"git/github_personal.age".publicKeys = users ++ systems;
"emu/switch/prod.keys.age".publicKeys = users ++ systems;
"emu/switch/title.keys.age".publicKeys = users ++ systems;
"wireguard/kestrel.age".publicKeys = users ++ systems;
"wireguard/torus.age".publicKeys = systems;
"wireguard/bulwark.age".publicKeys = systems;