my nixos dotfiles :3 (git.koi.rip mirror) git.koi.rip/koi/dotfiles
linux dotfiles neovim nixos catppuccin

aerc: init

+47 -9
+38
home/modules/programs/aerc.nix
··· 1 + { config, ... }: 2 + { 3 + age.secrets.email-creds.file = ../../../secrets/email-creds.age; 4 + 5 + evergarden.aerc.enable = true; 6 + 7 + programs.aerc = { 8 + enable = true; 9 + extraConfig = { 10 + general = { 11 + pgp-provider = "gpg"; 12 + use-terminal-pinentry = true; 13 + unsafe-accounts-conf = true; 14 + }; 15 + viewer.pager = "less --tilde -c"; 16 + filters = { 17 + "text/plain" = "colorize"; 18 + "text/html" = "html | colorize"; 19 + ".headers" = "colorize"; 20 + "message/delivery-status" = "colorize"; 21 + }; 22 + }; 23 + extraAccounts = { 24 + june = { 25 + from = "june <me@koi.rip>"; 26 + copy-to = "Sent"; 27 + cache-headers = true; 28 + pgp-auto-sign = true; 29 + pgp-self-encrypt = true; 30 + pgp-key-id = "00F61623FB56BC5BB7094E634CE6C1172DF6BE79"; 31 + source = "imaps://me%40koi.rip@imap.purelymail.com:993"; 32 + outgoing = "smtps://me%40koi.rip@smtp.purelymail.com:465"; 33 + source-cred-cmd = "cat ${config.age.secrets.email-creds.path}"; 34 + outgoing-cred-cmd = "cat ${config.age.secrets.email-creds.path}"; 35 + }; 36 + }; 37 + }; 38 + }
+1
home/modules/programs/default.nix
··· 6 6 ./eza.nix 7 7 ./fzf.nix 8 8 ./zsh.nix 9 + ./aerc.nix 9 10 ./iamb.nix 10 11 ./direnv.nix 11 12 ./zoxide.nix
+1 -4
home/modules/programs/jellyfin-rpc.nix
··· 3 3 { 4 4 home.packages = with pkgs; [ jellyfin-rpc ]; 5 5 6 - age.secrets.jellyfin-rpc = { 7 - file = ../../../secrets/jellyfin-rpc.json.age; 8 - mode = "0400"; 9 - }; 6 + age.secrets.jellyfin-rpc.file = ../../../secrets/jellyfin-rpc.json.age; 10 7 11 8 systemd.user.services.jellyfin-rpc = { 12 9 Unit = {
+5
secrets/email-creds.age
··· 1 + age-encryption.org/v1 2 + -> ssh-ed25519 IU0gwQ 6DvxiTxj2MhKNLcjYPLXWL3w6JO1W5Ip2nZItmf/C3U 3 + w0SeQQR0xa2gLdZ60zg3SIFogdG+EFa2+iVxAUQ6fiE 4 + --- 0rfkjmVwKVVLBntk6ju8IVYc2o/9VoqWn4Jfp1r1bmE 5 + ��hW�/TC=B�� ���[)�V}���Mx�Q�tړ������o��Њ k
+1
secrets/secrets.nix
··· 5 5 { 6 6 "cloudflared.pem.age".publicKeys = [ koi ]; 7 7 "jellyfin-rpc.json.age".publicKeys = [ koi ]; 8 + "email-creds.age".publicKeys = [ koi ]; 8 9 9 10 "vaultwarden.env.age".publicKeys = [ seber ]; 10 11 "ssl-koi.cert.pem.age".publicKeys = [ seber ];
+1 -5
systems/miku/default.nix
··· 75 75 76 76 age = { 77 77 identityPaths = [ "${config.users.users.koi.home}/.ssh/id_ed25519" ]; 78 - 79 - secrets.cloudflared = { 80 - file = ../../secrets/cloudflared.pem.age; 81 - mode = "0400"; 82 - }; 78 + secrets.cloudflared.file = ../../secrets/cloudflared.pem.age; 83 79 }; 84 80 85 81 systemd.services.cloudflared = {