tangled
alpha
login
or
join now
koi.rip
/
dotfiles
0
fork
atom
my nixos dotfiles :3 (git.koi.rip mirror)
git.koi.rip/koi/dotfiles
linux
dotfiles
neovim
nixos
catppuccin
0
fork
atom
overview
issues
pulls
pipelines
aerc: init
koi.rip
1 week ago
f42b0dde
7f813e0f
+47
-9
6 changed files
expand all
collapse all
unified
split
home
modules
programs
aerc.nix
default.nix
jellyfin-rpc.nix
secrets
email-creds.age
secrets.nix
systems
miku
default.nix
+38
home/modules/programs/aerc.nix
···
1
1
+
{ config, ... }:
2
2
+
{
3
3
+
age.secrets.email-creds.file = ../../../secrets/email-creds.age;
4
4
+
5
5
+
evergarden.aerc.enable = true;
6
6
+
7
7
+
programs.aerc = {
8
8
+
enable = true;
9
9
+
extraConfig = {
10
10
+
general = {
11
11
+
pgp-provider = "gpg";
12
12
+
use-terminal-pinentry = true;
13
13
+
unsafe-accounts-conf = true;
14
14
+
};
15
15
+
viewer.pager = "less --tilde -c";
16
16
+
filters = {
17
17
+
"text/plain" = "colorize";
18
18
+
"text/html" = "html | colorize";
19
19
+
".headers" = "colorize";
20
20
+
"message/delivery-status" = "colorize";
21
21
+
};
22
22
+
};
23
23
+
extraAccounts = {
24
24
+
june = {
25
25
+
from = "june <me@koi.rip>";
26
26
+
copy-to = "Sent";
27
27
+
cache-headers = true;
28
28
+
pgp-auto-sign = true;
29
29
+
pgp-self-encrypt = true;
30
30
+
pgp-key-id = "00F61623FB56BC5BB7094E634CE6C1172DF6BE79";
31
31
+
source = "imaps://me%40koi.rip@imap.purelymail.com:993";
32
32
+
outgoing = "smtps://me%40koi.rip@smtp.purelymail.com:465";
33
33
+
source-cred-cmd = "cat ${config.age.secrets.email-creds.path}";
34
34
+
outgoing-cred-cmd = "cat ${config.age.secrets.email-creds.path}";
35
35
+
};
36
36
+
};
37
37
+
};
38
38
+
}
+1
home/modules/programs/default.nix
···
6
6
./eza.nix
7
7
./fzf.nix
8
8
./zsh.nix
9
9
+
./aerc.nix
9
10
./iamb.nix
10
11
./direnv.nix
11
12
./zoxide.nix
+1
-4
home/modules/programs/jellyfin-rpc.nix
···
3
3
{
4
4
home.packages = with pkgs; [ jellyfin-rpc ];
5
5
6
6
-
age.secrets.jellyfin-rpc = {
7
7
-
file = ../../../secrets/jellyfin-rpc.json.age;
8
8
-
mode = "0400";
9
9
-
};
6
6
+
age.secrets.jellyfin-rpc.file = ../../../secrets/jellyfin-rpc.json.age;
10
7
11
8
systemd.user.services.jellyfin-rpc = {
12
9
Unit = {
+5
secrets/email-creds.age
···
1
1
+
age-encryption.org/v1
2
2
+
-> ssh-ed25519 IU0gwQ 6DvxiTxj2MhKNLcjYPLXWL3w6JO1W5Ip2nZItmf/C3U
3
3
+
w0SeQQR0xa2gLdZ60zg3SIFogdG+EFa2+iVxAUQ6fiE
4
4
+
--- 0rfkjmVwKVVLBntk6ju8IVYc2o/9VoqWn4Jfp1r1bmE
5
5
+
��hW�/TC=B�����[)�V}���Mx�Q�tړ������o��Њk
+1
secrets/secrets.nix
···
5
5
{
6
6
"cloudflared.pem.age".publicKeys = [ koi ];
7
7
"jellyfin-rpc.json.age".publicKeys = [ koi ];
8
8
+
"email-creds.age".publicKeys = [ koi ];
8
9
9
10
"vaultwarden.env.age".publicKeys = [ seber ];
10
11
"ssl-koi.cert.pem.age".publicKeys = [ seber ];
+1
-5
systems/miku/default.nix
···
75
75
76
76
age = {
77
77
identityPaths = [ "${config.users.users.koi.home}/.ssh/id_ed25519" ];
78
78
-
79
79
-
secrets.cloudflared = {
80
80
-
file = ../../secrets/cloudflared.pem.age;
81
81
-
mode = "0400";
82
82
-
};
78
78
+
secrets.cloudflared.file = ../../secrets/cloudflared.pem.age;
83
79
};
84
80
85
81
systemd.services.cloudflared = {