Flake for my NixOS devices

Switch Aperture to Imperm + LUKS

bwc9876.dev fe8351b3 8cab442a

verified
+27 -3
+8
base/shell.nix
··· 46 46 # extraPackages = with pkgs.bat-extras; [batman batgrep batwatch]; 47 47 }; 48 48 }; 49 + 50 + home-manager.users.root.programs = { 51 + zoxide.enable = true; 52 + ripgrep.enable = true; 53 + command-not-found.enable = false; 54 + bat.enable = true; 55 + nix-index.enable = true; 56 + }; 49 57 }
+11
roles/black-mesa-cache.nix
··· 1 + {...}: { 2 + nix.settings = { 3 + substituters = [ 4 + "http://black-mesa:5000" 5 + "https://cache.nixos.org" 6 + ]; 7 + trusted-public-keys = [ 8 + "black-mesa:tAX++uOKyqP70gnwx5zHBMiZ0kee8WberjlPZmDuyxw=" 9 + ]; 10 + }; 11 + }
+1 -1
roles/imperm.nix
··· 5 5 }: let 6 6 persistRoot = "/nix/persist"; # Anything important we want backed up 7 7 secureRoot = "${persistRoot}/secure"; # Files and directories we want only root to access 8 - cacheRoot = "/nix/cache"; # Anything not as important that we can stand losing 8 + cacheRoot = "/nix/perist-cache"; # Anything not as important that we can stand losing 9 9 preWith = pre: paths: builtins.map (p: "${pre}/${p}") paths; 10 10 preShare = preWith ".local/share"; 11 11 preConf = preWith ".config";
-1
systems/aperture.nix
··· 72 72 ]; 73 73 }; 74 74 } 75 -
+6
systems/black-mesa.nix
··· 53 53 modesetting.enable = true; 54 54 powerManagement.finegrained = false; 55 55 }; 56 + 57 + services.nix-serve = { 58 + enable = true; 59 + secretKeyFile = "/etc/nix-serve-key"; 60 + openFirewall = true; 61 + }; 56 62 }) 57 63 ]; 58 64 };
+1 -1
systems/installer.nix
··· 8 8 9 9 includeBaseMods = true; 10 10 11 - roles = ["latest-linux"]; 11 + roles = ["latest-linux" "black-mesa-cache"]; 12 12 extraModules = [ 13 13 ({ 14 14 pkgs,