+15
.github/workflows/tangled.yaml
+15
.github/workflows/tangled.yaml
+254
-108
flake.lock
+254
-108
flake.lock
··················+"url": "https://git.lix.systems/api/v1/repos/lix-project/flake-compat/archive/549f2762aebeff29a2e5ece7a7dc0f955281a1d1.tar.gz?rev=549f2762aebeff29a2e5ece7a7dc0f955281a1d1"······+"url": "https://api.flakehub.com/f/pinned/DeterminateSystems/flake-schemas/0.1.5/0190ef2f-61e0-794b-ba14-e82f225e55e6/source.tar.gz"·····················+"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"+"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"····································
+19
-8
flake.nix
+19
-8
flake.nix
·········
+30
-37
homes/ayla/default.nix
+30
-37
homes/ayla/default.nix
·····················
+1
-5
hosts/jezebel/default.nix
+1
-5
hosts/jezebel/default.nix
···
+1
hosts/jezebel/secrets.nix
+1
hosts/jezebel/secrets.nix
+73
-13
hosts/morgana/default.nix
+73
-13
hosts/morgana/default.nix
···············
+1
hosts/morgana/secrets.nix
+1
hosts/morgana/secrets.nix
···
+7
-13
hosts/nanpi/default.nix
+7
-13
hosts/nanpi/default.nix
·········
+1
hosts/nanpi/secrets.nix
+1
hosts/nanpi/secrets.nix
+5
-1
modules/flake/files/helix.nix
+5
-1
modules/flake/files/helix.nix
······
+56
-23
modules/flake/files/zed.nix
+56
-23
modules/flake/files/zed.nix
·········+exec ${lib.getExe pkgs.bun} ${pkgs.vscode-json-languageserver}/lib/node_modules/vscode-json-languageserver/./bin/vscode-json-languageserver "$@"
+6
-1
modules/flake/nixos.nix
+6
-1
modules/flake/nixos.nix
·········
+1
-1
modules/hardware/acer/aspire/A515-52G/default.nix
+1
-1
modules/hardware/acer/aspire/A515-52G/default.nix
+3
-3
modules/hardware/profiles/base/default.nix
+3
-3
modules/hardware/profiles/base/default.nix
···
+1
-2
modules/home/default.nix
+1
-2
modules/home/default.nix
+51
modules/home/desktop/cosmic/default.nix
+51
modules/home/desktop/cosmic/default.nix
···
+3
-1
modules/home/desktop/default.nix
+3
-1
modules/home/desktop/default.nix
···
+40
-35
modules/home/desktop/gnome/default.nix
+40
-35
modules/home/desktop/gnome/default.nix
············
+52
modules/home/desktop/plasma/default.nix
+52
modules/home/desktop/plasma/default.nix
···
+25
modules/home/profiles/betterLocations/default.nix
+25
modules/home/profiles/betterLocations/default.nix
···+options.myHome.profiles.betterLocations.enable = lib.mkEnableOption "for a slightly less cluttered home folder";
+3
-1
modules/home/profiles/default.nix
+3
-1
modules/home/profiles/default.nix
+100
-11
modules/home/profiles/defaultApps/default.nix
+100
-11
modules/home/profiles/defaultApps/default.nix
·································+mkDefaultEntry "Audio Player" cfg.audioPlayer.exec cfg.audioPlayer.terminal cfg.audioPlayer.icon;+mkDefaultEntry "File Manager" cfg.fileManager.exec cfg.fileManager.terminal cfg.fileManager.icon;
+30
-10
modules/home/profiles/defaultApps/mimeTypes.nix
+30
-10
modules/home/profiles/defaultApps/mimeTypes.nix
······
+47
modules/home/profiles/fixMimeTypes/default.nix
+47
modules/home/profiles/fixMimeTypes/default.nix
···+enable = lib.mkEnableOption "mimetypes are dumb and they don't always register the right formats";
+6
-1
modules/home/profiles/shell/default.nix
+6
-1
modules/home/profiles/shell/default.nix
···ytmusic = "yt-dlp -f 251 --remux-video opus --embed-metadata --embed-thumbnail -o \"%(album)s/%(disc_number>0)s%(disc_number)02d-%(track_number)02d %(title)s.%(ext)s\"";···
-55
modules/home/programs/chromium/default.nix
-55
modules/home/programs/chromium/default.nix
···-url = "https://github.com/libredirect/browser_extension/releases/download/v${version}/libredirect-${version}.crx";-url = "https://gitflic.ru/project/magnolia1234/bpc_uploads/blob/raw?file=bypass-paywalls-chrome-clean-${version}.crx";
+3
-2
modules/home/programs/default.nix
+3
-2
modules/home/programs/default.nix
+21
-21
modules/home/programs/firefox/default.nix
+21
-21
modules/home/programs/firefox/default.nix
······
+2
-3
modules/home/programs/git/default.nix
+2
-3
modules/home/programs/git/default.nix
···
+85
modules/home/programs/helium/default.nix
+85
modules/home/programs/helium/default.nix
···+# https://github.com/isabelroses/dotfiles/blob/ed6d3765ffb7dcfe67540f111f23d51a0d9617d5/modules/home/programs/chromium.nix#L16+url = "https://github.com/libredirect/browser_extension/releases/download/v${version}/libredirect-${version}.crx";+url = "https://gitflic.ru/project/magnolia1234/bpc_uploads/blob/raw?file=bypass-paywalls-chrome-clean-${version}.crx";+# https://github.com/secureblue/secureblue/blob/e500f078efc5748d5033a881bbbcdcd2de95a813/files/system/usr/etc/chromium/chromium.conf.md
+60
-115
modules/home/programs/helix/default.nix
+60
-115
modules/home/programs/helix/default.nix
······
+24
modules/home/programs/jujutsu/default.nix
+24
modules/home/programs/jujutsu/default.nix
···
+27
modules/home/programs/lutris/default.nix
+27
modules/home/programs/lutris/default.nix
···
+1
modules/home/programs/micro/default.nix
+1
modules/home/programs/micro/default.nix
+9
-1
modules/home/programs/ssh/default.nix
+9
-1
modules/home/programs/ssh/default.nix
······
+114
-64
modules/home/programs/zed-editor/default.nix
+114
-64
modules/home/programs/zed-editor/default.nix
············
-13
modules/home/programs/zen-browser/default.nix
-13
modules/home/programs/zen-browser/default.nix
···
+2
modules/home/snippets/default.nix
+2
modules/home/snippets/default.nix
+415
modules/home/snippets/editor/default.nix
+415
modules/home/snippets/editor/default.nix
···+inherit name full-name auto-format file-types language-servers zed-only-language-servers helix-only-language-servers formatter helix-formatter code-actions-on-format;+args = ["${pkgs.vscode-langservers-extracted}/lib/node_modules/vscode-langservers-extracted/bin/vscode-html-language-server" "--stdio"];+args = ["${pkgs.vscode-css-languageserver}/lib/node_modules/vscode-css-languageserver/out/node/cssServerMain.js" "--stdio"];+args = ["${pkgs.vscode-json-languageserver}/lib/node_modules/vscode-json-languageserver/bin/vscode-json-languageserver" "--stdio"];+args = ["${pkgs.svelte-language-server}/lib/node_modules/svelte-language-server/bin/server.js" "--stdio"];+args = ["${pkgs.vue-language-server}/lib/language-tools/packages/language-server/bin/vue-language-server.js" "--stdio"];+args = ["format" "--use-server" "--html-formatter-enabled=true" "--stdin-file-path" "{buffer_path}"];
+6
-2
modules/home/snippets/firefox-based/default.nix
+6
-2
modules/home/snippets/firefox-based/default.nix
············
+18
modules/home/snippets/firefox-based/engines.nix
+18
modules/home/snippets/firefox-based/engines.nix
···+icon = "https://cdn.search.brave.com/serp/v2/_app/immutable/assets/brave-search-icon.CsIFM2aN.svg";
+11
modules/home/snippets/git/default.nix
+11
modules/home/snippets/git/default.nix
+23
modules/locale/en-ca/default.nix
+23
modules/locale/en-ca/default.nix
···
+1
modules/nixos/default.nix
+1
modules/nixos/default.nix
+24
modules/nixos/desktop/cosmic/default.nix
+24
modules/nixos/desktop/cosmic/default.nix
···
+24
-3
modules/nixos/desktop/default.nix
+24
-3
modules/nixos/desktop/default.nix
·········+# have i told you how much i despise fontconfig. literally zero reason to pick bitmap fonts over noto fonts but it always does.
+9
-11
modules/nixos/desktop/gnome/default.nix
+9
-11
modules/nixos/desktop/gnome/default.nix
·········
+27
modules/nixos/desktop/plasma/default.nix
+27
modules/nixos/desktop/plasma/default.nix
···+options.myNixOS.desktop.plasma.enable = lib.mkEnableOption "use kde plasma desktop environment";
+18
-18
modules/nixos/profiles/arr/default.nix
+18
-18
modules/nixos/profiles/arr/default.nix
············
+15
-9
modules/nixos/profiles/backups/default.nix
+15
-9
modules/nixos/profiles/backups/default.nix
······-enable = config.services.forgejo.enable && config.services.forgejo.settings.storage.STORAGE_TYPE != "minio";···+paths = ["/var/lib/nixos-containers/pds${config.containers.pds.config.services.bluesky-pds.settings.PDS_DATA_DIRECTORY}"];······+paths = ["/var/lib/nixos-containers/tangled-knot${config.containers.tangled-knot.config.services.tangled-knot.stateDir}"];
-6
modules/nixos/profiles/base/default.nix
-6
modules/nixos/profiles/base/default.nix
+2
-1
modules/nixos/profiles/default.nix
+2
-1
modules/nixos/profiles/default.nix
+53
modules/nixos/profiles/hibernation/default.nix
+53
modules/nixos/profiles/hibernation/default.nix
···+config = lib.mkIf (config.myNixOS.profiles.hibernation.enable && config.myNixOS.profiles.hibernation.swap.size > 0) {
+24
-1
modules/nixos/profiles/swap/default.nix
+24
-1
modules/nixos/profiles/swap/default.nix
······
+1
-3
modules/nixos/profiles/workstation/default.nix
+1
-3
modules/nixos/profiles/workstation/default.nix
······
+16
-1
modules/nixos/programs/nix/default.nix
+16
-1
modules/nixos/programs/nix/default.nix
···+flakeInputs = lib.filterAttrs (name: value: (lib.isType "flake" value) && (name != "self")) inputs;···
+9
-1
modules/nixos/programs/nix-ld/default.nix
+9
-1
modules/nixos/programs/nix-ld/default.nix
···+url = "https://github.com/NixOS/nixpkgs/archive/c2c0373ae7abf25b7d69b2df05d3ef8014459ea3.tar.gz";···(pkgs.runCommand "steamrun-lib" {} "mkdir $out; ln -s ${pkgs.steam-run.fhsenv}/usr/lib64 $out/lib")
+55
modules/nixos/security/apparmor.nix
+55
modules/nixos/security/apparmor.nix
···+# https://github.com/isabelroses/dotfiles/blob/14a191bd583b34e242ad13a0164a3c32c506c655/modules/nixos/security/apparmor.nix
+67
modules/nixos/security/default.nix
+67
modules/nixos/security/default.nix
···
+7
modules/nixos/security/pam.nix
+7
modules/nixos/security/pam.nix
+13
modules/nixos/security/sudo.nix
+13
modules/nixos/security/sudo.nix
+22
modules/nixos/services/atproto-basic-notifications/default.nix
+22
modules/nixos/services/atproto-basic-notifications/default.nix
···
+6
-1
modules/nixos/services/caddy/default.nix
+6
-1
modules/nixos/services/caddy/default.nix
······
+4
-1
modules/nixos/services/default.nix
+4
-1
modules/nixos/services/default.nix
······
+7
-9
modules/nixos/services/fail2ban/default.nix
+7
-9
modules/nixos/services/fail2ban/default.nix
······+failregex = .*(Failed authentication attempt|invalid credentials|Attempted access of unknown user).* from <HOST>···-failregex = .*(Failed authentication attempt|invalid credentials|Attempted access of unknown user).* from <HOST>
+1
-1
modules/nixos/services/flatpak/default.nix
+1
-1
modules/nixos/services/flatpak/default.nix
+3
-33
modules/nixos/services/forgejo/default.nix
+3
-33
modules/nixos/services/forgejo/default.nix
·········
+52
-32
modules/nixos/services/glance/default.nix
+52
-32
modules/nixos/services/glance/default.nix
······-caddy.virtualHosts."${privateNetwork.networkMap.${name}.vHost}".extraConfig = lib.mkIf cfg.autoProxy ''-reverse_proxy ${privateNetwork.networkMap.${name}.hostName}:${toString privateNetwork.networkMap.${name}.port}···-check-url = "http://${aylac-top.networkMap.vaultwarden.hostName}:${toString aylac-top.networkMap.vaultwarden.port}/";check-url = "http://${aylac-top.networkMap.ntfy.hostName}:${toString aylac-top.networkMap.ntfy.port}/";···-check-url = "http://${tailnet.networkMap.karakeep.hostName}:${toString tailnet.networkMap.karakeep.port}/";+check-url = "http://${tailnet.networkMap.vaultwarden.hostName}:${toString tailnet.networkMap.vaultwarden.port}/";+# check-url = "http://${tailnet.networkMap.karakeep.hostName}:${toString tailnet.networkMap.karakeep.port}/";···check-url = "http://${tailnet.networkMap.radarr.hostName}:${toString tailnet.networkMap.radarr.port}/";-# check-url = "http://${tailnet.networkMap.lidarr.hostName}:${toString tailnet.networkMap.lidarr.port}/";check-url = "http://${tailnet.networkMap.prowlarr.hostName}:${toString tailnet.networkMap.prowlarr.port}/";-check-url = "http://${tailnet.networkMap.bazarr.hostName}:${toString tailnet.networkMap.bazarr.port}/";+# check-url = "http://${tailnet.networkMap.bazarr.hostName}:${toString tailnet.networkMap.bazarr.port}/";···check-url = "http://${tailnet.networkMap.audiobookshelf.hostName}:${toString tailnet.networkMap.audiobookshelf.port}/";
+3
-1
modules/nixos/services/miniflux/default.nix
+3
-1
modules/nixos/services/miniflux/default.nix
······
-43
modules/nixos/services/monitoring/default.nix
-43
modules/nixos/services/monitoring/default.nix
···
+33
-28
modules/nixos/services/ntfy/default.nix
+33
-28
modules/nixos/services/ntfy/default.nix
···
+67
-8
modules/nixos/services/pds/default.nix
+67
-8
modules/nixos/services/pds/default.nix
···+# for the pds-gatekeeper https://tangled.sh/@isabelroses.com/dotfiles/blob/61ad925dc8b4537b568784971589b137df5cb948/modules/nixos/services/pds.nix···header access-control-allow-headers "authorization,dpop,atproto-accept-labelers,atproto-proxy"
+34
modules/nixos/services/postgresql/default.nix
+34
modules/nixos/services/postgresql/default.nix
···
+94
modules/nixos/services/privatebin/default.nix
+94
modules/nixos/services/privatebin/default.nix
···
+2
modules/nixos/services/radicale/default.nix
+2
modules/nixos/services/radicale/default.nix
······+hook = ''${pkgs.git}/bin/git add -A && (${pkgs.git}/bin/git diff --cached --quiet || ${pkgs.git}/bin/git commit -m "Changes by \"%(user)s\"")'';
+1
-1
modules/nixos/services/redlib/default.nix
+1
-1
modules/nixos/services/redlib/default.nix
+40
modules/nixos/services/sddm/default.nix
+40
modules/nixos/services/sddm/default.nix
···
+38
-21
modules/nixos/services/tangled-knot/default.nix
+38
-21
modules/nixos/services/tangled-knot/default.nix
······+# right now this config is fine but if i ever get another machine i daily drive or a build server i need to do something else here
+7
-5
modules/nixos/services/vaultwarden/default.nix
+7
-5
modules/nixos/services/vaultwarden/default.nix
·········
+8
-8
modules/snippets/aylac-top/default.nix
+8
-8
modules/snippets/aylac-top/default.nix
······
+53
modules/snippets/nix/settings.nix
+53
modules/snippets/nix/settings.nix
·········+# maximum number of parallel TCP connections used to fetch imports and binary caches, 0 means no limit
+20
modules/snippets/syncthing/folders.nix
+20
modules/snippets/syncthing/folders.nix
···
+12
-6
modules/snippets/tailnet/default.nix
+12
-6
modules/snippets/tailnet/default.nix
·········
+1
-1
modules/users/ayla/default.nix
+1
-1
modules/users/ayla/default.nix
···
+6
modules/users/options.nix
+6
modules/users/options.nix
···