summaryrefslogtreecommitdiff
path: root/machines/helium.nix
AgeCommit message (Collapse)Author
2024-10-31add boronBen Sima
2023-09-05better day temperatureBen Sima
Change-Id: I93d1b38ac6a920a7dacbc4ae2d9646b5168b0cb6
2023-01-20trying to get coldcard to workBen Sima
Change-Id: Id0221bf2535a8b3d583242767b6747f5a9c2790a
2023-01-20some UI tweaksBen Sima
Change-Id: Id7b3099472c6e15154dc75d3614862f02be031d7
2023-01-03set default dpi to laptop screen, not external screenBen Sima
Change-Id: Iffb0fe016fdc55497db48ffc853a28444a7ba3dd
2022-11-07Fix size issue on laptop by setting dpiBen Sima
The other changes served to set fontSize centrally, and adjust it for urxvt which doesn't behave for some reason.
2022-11-07Support trackball thingBen Sima
2022-11-07Trying to fix font sizing problemsBen Sima
2022-11-07Disable locking for nowBen Sima
2022-11-07Fix supported features in remote builderBen Sima
2022-09-02lots of updates, idkBen Sima
2022-08-09lock with matrix screenBen Sima
2022-06-29add flipperBen Sima
2022-03-05try to fix laptop lockingBen Sima
2022-03-05add barrierBen Sima
2022-02-18updatesBen Sima
2022-02-04Disable yubilock for now - just manually lockBen Sima
2022-02-01Disable clamav, it never updates properlyBen Sima
2022-02-01lock when yubikey is removedBen Sima
Took me forever but I figured out how to use udev rules to give xautolock permission to see the yubi when unlocking. Also triggers a systemd service that locks the screen when yubi is removed. I couldn't do this directly in a udev RUN becaues udev sucks at running programs as different users and with environment variables and such. This is still a bit buggy, I seem to consistently need to authenticate twice when unlocking, but I think that would be fixed if I get rid of the serviceConfig.User thing with some fancy scripting. And as a backup, added Super+Shift+L for manual locking.
2022-01-31yubikey login on heliumBen Sima
This allows me to login and sudo with *either* a password or my yubikey. I also had to setup my yubikey with the instructions here: https://nixos.wiki/wiki/Yubikey#Logging-in Basically use ykman and ykpamcfg to generate a challenge-response setup on slot 2 of my yubikey. The pam config compares the key response with the ~/.yubico/challenge-* file in order to authenticate. I think pam uses the ~/.yubico/authorized_keys file to know to which yubikey to send the challenge, but I'm not sure on that one.
2022-01-31fix helium buildBen Sima
2021-09-16more work on machinesBen Sima
2021-09-15update machines, wip oxygenBen Sima
2020-11-30helium: fix remote buildsBen Sima
2020-11-30helium: use urxvt, fix xmonad, and pin nixpkgsBen Sima
2020-11-27helium: fix timezone and other random settingsBen Sima
2019-11-29enable all firmwareBen Sima
2019-11-08get remote builds working with lithiumBen Sima
2019-05-23set ssh timeoutBen Sima
2019-05-23setup distributed builds over sshBen Sima
2019-05-22enable bluetoothBen Sima
2019-05-13laptop: remove virtualization, add sound, light, xkbOptionsBen Sima
2019-05-13enable security stuff againBen Sima
2019-05-12enable virtualizationBen Sima
2019-05-07add helium and refactor lithiumBen Sima