Skip to content

Instantly share code, notes, and snippets.

#!nix
{ pkgs, lib, ... }:
{
users.users.root.openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC9YAN+P0umXeSP/Cgd5ZvoD5gpmkdcrOjmHdonvBbptbMUbI/Zm0WahBDK0jO5vfJ/C6A1ci4quMGCRh98LRoFKFRoWdwlGFcFYcLkuG/AbE8ObNLHUxAwqrdNfIV6z0+zYi3XwVjxrEqyJ/auZRZ4JDDBha2y6Wpru8v9yg41ogeKDPgHwKOf/CKX77gCVnvkXiG5ltcEZAamEitSS8Mv8Rg/JfsUUwULb6yYGh+H6RECKriUAl9M+V11SOfv8MAdkXlYRrcqqwuDAheKxNGHEoGLBk+Fm+orRChckW1QcP89x6ioxpjN9VbJV0JARF+GgHObvvV+dGHZZL1N3jr8WtpHeJWxHPdBgTupDIA5HeL0OCoxgSyyfJncMl8odCyUqE+lqXVz+oURGeRxnIbgJ07dNnX6rFWRgQKrmdV4lt1i1F5Uux9IooYs/42sKKMUQZuBLTN4UzipPQM/DyDO01F0pdcaPEcIO+tp2U6gVytjHhZqEeqAMaUbq7a6ucAuYzczGZvkApc85nIo9jjW+4cfKZqV8BQfJM1YnflhAAplIq6b4Tzayvw1DLXd2c5rae+GlVCsVgpmOFyT6bftSon/HfxwBE4wKFYF7fo7/j6UbAeXwLafDhX+S5zSNR6so1epYlwcMLshXqyJePJNhtsRhpGLd9M3UqyGDAFoOQ=="
];
/*
nixpkgs = builtins.fetchTarball {
url = "https://github.com/johanot/nixpkgs/archive/f23157af7f3bb8c0887d73d0f6e7fbde7bd6bd86.tar.gz"
[cole@xeep:/tmp/adfadsf]$ nix-env --uninstall wlroots
[cole@xeep:/tmp/adfadsf]$ ls -al $(which rootston)
which: no rootston in (/home/cole/.local/bin:/home/cole/.local/bin:/home/cole/bin:/run/wrappers/bin:/home/cole/.local/share/flatpak/exports/bin:/var/lib/flatpak/exports/bin:/home/cole/.nix-profile/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin:/etc/profiles/per-user/cole/bin)
total 0
drwxr-xr-x 2 cole cole 40 Oct 24 15:08 .
drwxrwxrwt 16 root root 400 Oct 24 15:08 ..
[cole@xeep:/tmp/adfadsf]$ nix-env -f /etc/nixpkgs-pr-wlroots/ -iA 'wlroots.examples'
@colemickens
colemickens / AuthyToOtherAuthenticator.md
Last active February 16, 2021 18:33 — forked from louiszuckerman/AuthyToOtherAuthenticator.md
Export TOTP tokens from Authy

Generating Authy passwords on other authenticators


There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.

Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes (beware, through Google) for you to use on your favorite authenticator.

His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My gues

with import <nixpkgs> {};
let
in
stdenv.mkDerivation rec {
name = "exodus";
src = fetchzip {
url = "https://exodusbin.azureedge.net/releases/exodus-linux-x64-1.64.0.zip";
sha256 = "0k2v17wr08wx9nng2qxm81km9bnbrfl7rzxic6qcjl8wzhgvlxav";
};
with import <nixpkgs> {};
let
in
stdenv.mkDerivation rec {
name = "exodus";
src = fetchzip {
url = "https://exodusbin.azureedge.net/releases/exodus-linux-x64-1.64.0.zip";
sha256 = "0k2v17wr08wx9nng2qxm81km9bnbrfl7rzxic6qcjl8wzhgvlxav";
};
building Nix...
building the system configuration...
activating the configuration...
setting up /etc...
reloading user units for cole...
setting up tmpfiles
warning: the following units failed: acme-transmission.chimera.cluster.lol.service, acme-unifi.chimera.cluster.lol.service
● acme-transmission.chimera.cluster.lol.service - Renew ACME Certificate for transmission.chimera.cluster.lol
Loaded: loaded (/nix/store/0bpb38p565qabi0yq715mpykz8z0bl6f-unit-acme-transmission.chimera.cluster.lol.service/acme-transmission.chimera.cluster.lol.service; enabled; vendor preset: enabled)
diff --git a/pkgs/applications/networking/browsers/chromium/common.nix b/pkgs/applications/networking/browsers/chromium/common.nix
index 66198508..808dc1ad 100644
--- a/pkgs/applications/networking/browsers/chromium/common.nix
+++ b/pkgs/applications/networking/browsers/chromium/common.nix
@@ -18,10 +18,12 @@
# optional dependencies
, libgcrypt ? null # gnomeSupport || cupsSupport
+, libdrm ? null, wayland ? null # enableWayland
diff --git a/pkgs/applications/networking/browsers/chromium/common.nix b/pkgs/applications/networking/browsers/chromium/common.nix
index 66198508..6b6cb6bd 100644
--- a/pkgs/applications/networking/browsers/chromium/common.nix
+++ b/pkgs/applications/networking/browsers/chromium/common.nix
@@ -18,10 +18,12 @@
# optional dependencies
, libgcrypt ? null # gnomeSupport || cupsSupport
+, libdrm ? null, wayland ? null # enableWayland
[cole@xeep:~/code/packet-utils]$ nix copy --from file:///home/cole/kix_output --all --no-check-sigs
[28 copied (1 failed)]
error: path '/nix/store/p0mwxzyn2hjykv4v980hyaws55p4hc2v-chromium-dev-72.0.3608.4-sandbox' is not valid
[cole@xeep:~/code/packet-utils]$ nix copy --from file:///home/cole/kix_output /nix/store/p0mwxzyn2hjykv4v980hyaws55p4hc2v-chromium-dev-72.0.3608.4-sandbox --no-check-sigs
[1 copied]
[cole@xeep:~/code/packet-utils]$ nix copy --from file:///home/cole/kix_output --all --no-check-sigs
[141 copied]
#!/usr/bin/env bash
set -euo pipefail
set -x
CACHE_PTH="/tmp/localstore/"
CACHE_STORE="file://${CACHE_PTH}"
mkdir -p ${CACHE_PTH}
export NIX_REMOTE="ssh-ng://root@kix.cluster.lol"