+1
-1
.pre-commit-config.yaml
+1
-1
.pre-commit-config.yaml
+12
-12
flake.lock
+12
-12
flake.lock
············
+1
hosts/nanpi/secrets.nix
+1
hosts/nanpi/secrets.nix
···
+18
-3
hosts/nanpi/services.nix
+18
-3
hosts/nanpi/services.nix
······+"${config.mySnippets.aylac-top.networkMap.pds.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.pds.hostName}:${toString config.mySnippets.aylac-top.networkMap.pds.port}";+"${config.mySnippets.aylac-top.networkMap.vaultwarden.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.vaultwarden.hostName}:${toString config.mySnippets.aylac-top.networkMap.vaultwarden.port}";···
+7
-7
modules/home/programs/firefox/betterfox/fastfox.nix
+7
-7
modules/home/programs/firefox/betterfox/fastfox.nix
···
+17
-5
modules/home/programs/firefox/default.nix
+17
-5
modules/home/programs/firefox/default.nix
···············
+7
-3
modules/home/programs/firefox/engines.nix
+7
-3
modules/home/programs/firefox/engines.nix
············
+8
modules/nixos/profiles/backups/default.nix
+8
modules/nixos/profiles/backups/default.nix
···+passwords = lib.mkIf (builtins.elem config.networking.hostName config.mySnippets.syncthing.folders."Passwords".devices) (
+19
modules/nixos/services/fail2ban/default.nix
+19
modules/nixos/services/fail2ban/default.nix
···
+20
modules/snippets/aylac-top/default.nix
+20
modules/snippets/aylac-top/default.nix
···
+1
modules/snippets/default.nix
+1
modules/snippets/default.nix
+1
-1
modules/snippets/restic/default.nix
+1
-1
modules/snippets/restic/default.nix
+9
-5
modules/snippets/syncthing/folders.nix
+9
-5
modules/snippets/syncthing/folders.nix
·········