+142
-155
flake.lock
+142
-155
flake.lock
················································+"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"+"url": "https://github.com/IBM/plex/releases/download/@ibm%2Fplex-mono@1.1.0/ibm-plex-mono.zip"··················-"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre877938.82c2e0d6dde5/nixexprs.tar.xz"+"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre896415.1d4c88323ac3/nixexprs.tar.xz"···-"url": "https://releases.nixos.org/nixos/unstable/nixos-25.11pre864002.8eaee1103447/nixexprs.tar.xz"···-"url": "https://releases.nixos.org/nixos/25.05/nixos-25.05.811874.daf6dc47aa4b/nixexprs.tar.xz"···························
+4
-4
flake.nix
+4
-4
flake.nix
·········
-2
global/gensokyo/presets/nginx.nix
-2
global/gensokyo/presets/nginx.nix
+1
-2
global/gui/browser.nix
+1
-2
global/gui/browser.nix
+7
-7
global/gui/dm.nix
+7
-7
global/gui/dm.nix
······
+11
-10
global/gui/fonts.nix
+11
-10
global/gui/fonts.nix
···
+4
global/gui/input.nix
+4
global/gui/input.nix
+6
-5
global/gui/packages.nix
+6
-5
global/gui/packages.nix
···
+2
global/gui/wine.nix
+2
global/gui/wine.nix
+5
-4
global/overlays/default.nix
+5
-4
global/overlays/default.nix
+1
-1
global/programs/misc.nix
+1
-1
global/programs/misc.nix
+8
global/programs/networking.nix
+8
global/programs/networking.nix
······
+2
global/programs/nix/config.nix
+2
global/programs/nix/config.nix
+1
global/programs/scm.nix
+1
global/programs/scm.nix
···
+2
-1
global/programs/security/crypto.nix
+2
-1
global/programs/security/crypto.nix
+1
-1
global/programs/security/kanidm.nix
+1
-1
global/programs/security/kanidm.nix
+7
-1
global/programs/shells.nix
+7
-1
global/programs/shells.nix
······
+3
global/programs/ssh.nix
+3
global/programs/ssh.nix
+2
-2
systems/koumakan/certificates/default.nix
+2
-2
systems/koumakan/certificates/default.nix
+10
systems/koumakan/certificates/garage-s3.nix
+10
systems/koumakan/certificates/garage-s3.nix
+2
systems/koumakan/certificates/postgresql.nix
+2
systems/koumakan/certificates/postgresql.nix
+20
systems/koumakan/networking/firewall.nix
+20
systems/koumakan/networking/firewall.nix
···
+16
-20
systems/koumakan/services/databases/postgresql.nix
+16
-20
systems/koumakan/services/databases/postgresql.nix
···
+1
-1
systems/koumakan/services/proxies/default.nix
+1
-1
systems/koumakan/services/proxies/default.nix
+44
systems/koumakan/services/proxies/nginx-stream.nix
+44
systems/koumakan/services/proxies/nginx-stream.nix
···
+2
-1
systems/koumakan/services/proxies/searxng.nix
+2
-1
systems/koumakan/services/proxies/searxng.nix
+3
-2
systems/koumakan/services/scm/forgejo.nix
+3
-2
systems/koumakan/services/scm/forgejo.nix
···+ENABLE_INTERNAL_SIGNIN = true; # we have gatekeeper setup now and working, this can be turned off.···
-7
systems/koumakan/services/scm/tangled-knot.nix
-7
systems/koumakan/services/scm/tangled-knot.nix
+20
-2
systems/koumakan/services/security/pocket-id.nix
+20
-2
systems/koumakan/services/security/pocket-id.nix
·········
+11
-9
systems/koumakan/services/storage/garage.nix
+11
-9
systems/koumakan/services/storage/garage.nix
······# this is needed because garage apparently still doesn't support anon access via path based api, so this is more like a hack than anything atm.···StateDirectory = lib.mkForce null; # this somehow breaks mounting dirs into /var/lib; systemd complains about id-mapped mount: device or resource busy······
+7
systems/koumakan/services/storage/zipline.nix
+7
systems/koumakan/services/storage/zipline.nix
······
+1
-19
systems/renko/configuration.nix
+1
-19
systems/renko/configuration.nix
···
+1
-1
systems/renko/services/forgejo-runner.nix
+1
-1
systems/renko/services/forgejo-runner.nix
+10
systems/satori/configuration.nix
+10
systems/satori/configuration.nix
···
+4
-2
users/cassie/default.nix
+4
-2
users/cassie/default.nix
+16
-14
users/cassie/home/dev/git.nix
+16
-14
users/cassie/home/dev/git.nix
···
+11
-2
users/cassie/home/dev/ssh.nix
+11
-2
users/cassie/home/dev/ssh.nix
······