+1
.ignore
···
+3
-3
Justfile
···
+1
-1
README.md
···
+1
-1
apps/flash-installer.nix
+2
-1
configurations.nix
···
+183
-158
flake.lock
······················································"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"···················································
+15
-12
flake.nix
············
+4
home-manager/fragments/firefox.nix
+57
-53
home-manager/fragments/git.nix
···-{ assertion = config.local.fragment.agenix.enable; message = "`git` fragment depends on `agenix` fragment"; }············
-1
home-manager/fragments/helix.nix
+2
-2
home-manager/fragments/jujutsu.nix
······
+18
-14
home-manager/fragments/shell.nix
·········+RUST_LOG="''${ANGRR_DIRENV_LOG:-angrr=error}" ${lib.getExe upkgs.angrr} touch "$layout_dir" --silent·········
+5
-1
home-manager/fragments/stylix.nix
···
+9
-8
home-manager/fragments/sway.nix
······workspacesRange = lib.zipListsWith (key-idx: workspace-idx: { inherit key-idx workspace-idx; }) [ 1 2 3 4 5 6 7 8 9 0 ] (lib.range 1 10);······
+3
-2
home-manager/fragments/tools.nix
·········
+1
-1
home-manager/fragments/waybar.nix
+2
home-manager/fragments/xdg-mime.nix
+6
-1
home-manager/profiles/desktop.nix
·········
+163
hosts/weird-row-server/authelia.nix
···+age.secrets.authelia-jwt-secret = { file = secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-issuer-private-key = { file = secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-storage-key = { file = secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-ldap-password = { file = secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-smtp-password = { file = secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };+AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;+users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";+claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };+client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";+client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";+client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";+client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";
+143
hosts/weird-row-server/default.nix
···+boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];
+25
hosts/weird-row-server/goatcounter.nix
···
+85
hosts/weird-row-server/grafana.nix
···+age.secrets.grafana-oidc-secret = { file = secrets/grafana-oidc-secret.age; owner = "grafana"; };+static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];
+84
hosts/weird-row-server/headscale.nix
···+age.secrets.headscale-oidc-secret = { file = secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };
+42
hosts/weird-row-server/hypixel-bank-tracker.nix
···+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.main.port}+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.banana.port}
+39
hosts/weird-row-server/lldap.nix
···
+52
hosts/weird-row-server/miniflux.nix
···+age.secrets.miniflux-oidc-secret = { file = secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
+43
hosts/weird-row-server/pds.nix
···
hosts/weird-row-server/secrets/authelia-issuer-private-key.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/authelia-jwt-secret.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/authelia-ldap-password.age
This is a binary file and will not be displayed.
+9
hosts/weird-row-server/secrets/authelia-smtp-password.age
···
+11
hosts/weird-row-server/secrets/authelia-storage-key.age
···
hosts/weird-row-server/secrets/caddy-env.age
This is a binary file and will not be displayed.
+27
hosts/weird-row-server/secrets/default.nix
···+# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
+9
hosts/weird-row-server/secrets/grafana-oidc-secret.age
···
hosts/weird-row-server/secrets/headscale-oidc-secret.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/hypixel-bank-tracker-banana.age
This is a binary file and will not be displayed.
+12
hosts/weird-row-server/secrets/hypixel-bank-tracker-main.age
···+�LJu���k��_��%��|�J]��KN��?]��tR�<�]�|���ߟ��¾FzU��������:�Y��TX����p,9v6q�7�~�y�]X���͇ǷR5՚>[������#�#�-
hosts/weird-row-server/secrets/lldap-env.age
This is a binary file and will not be displayed.
+11
hosts/weird-row-server/secrets/lldap-user-pass.age
···
+9
hosts/weird-row-server/secrets/miniflux-oidc-secret.age
···
hosts/weird-row-server/secrets/pds-env.age
This is a binary file and will not be displayed.
+9
hosts/weird-row-server/secrets/tuwunel-registration-tokens.age
···
hosts/weird-row-server/secrets/vaultwarden-env.age
This is a binary file and will not be displayed.
+54
hosts/weird-row-server/tangled.nix
···
+31
hosts/weird-row-server/thelounge.nix
···
+45
hosts/weird-row-server/tuwunel.nix
···+age.secrets.tuwunel-registration-tokens = { file = secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };
+38
hosts/weird-row-server/vaultwarden.nix
···+ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";
+24
hosts/weird-row-server/warrior.nix
···
+77
hosts/weird-row-server/webfinger.nix
···
+12
-2
lib/flake/default.nix
······
+1
-1
lib/flake/managedDiskLayout.nix
···
+1
lib/flake/user.nix
+2
-3
modules/home-manager/default.nix
-99
modules/home-manager/wl-clip-persist.nix
···-description = "Only handle selection events where all offered MIME types have a match for the regex";-description = "Interrupt trying to send the old clipboard to other programs when the clipboard has been updated";-description = "Only handle selection events whose total data size does not exceed the size limit";
+1
-1
modules/home-manager/xcompose.nix
···Load the XCompose file by passing the `XCOMPOSEFILE` environment variable instead of linking to ~/.XCompose.That is nice to avoid cluttering the HOME directory, it's preferable to disable it when experimenting
-2
modules/nixos/default.nix
-324
modules/nixos/geoclue2.nix
···-package = pkgs.geoclue2.override { withDemoAgent = config.services.geoclue2.enableDemoAgent; };
-673
modules/nixos/headscale.nix
···-Check the [example config](https://github.com/juanfont/headscale/blob/main/config-example.yaml)-See [How Tailscale works](https://tailscale.com/blog/how-tailscale-works/) for more information on DERP maps.-See [How Tailscale works](https://tailscale.com/blog/how-tailscale-works/) for more information on DERP maps.-Please note that using Postgres is highly discouraged as it is only supported for legacy reasons.-Headscale no longer uses domain_map. If you're using an old version of headscale you can still set this option via services.headscale.settings.oidc.domain_map.-(assertRemovedOption [ "settings" "dns_config" "domains" ] "Use `dns.search_domains` instead.")-export HEADSCALE_DATABASE_POSTGRES_PASS="$(head -n1 ${lib.escapeShellArg cfg.settings.database.postgres.password_file})"-capabilityBoundingSet = [ "CAP_CHOWN" ] ++ lib.optional (cfg.port < 1024) "CAP_NET_BIND_SERVICE";
+5
-7
modules/nixos/logiops.nix
·········
+1
-1
nixos/fragments/kanata/arsenik.kbd.lisp
+2
-4
nixos/fragments/logiops.nix
······
+9
-1
nixos/fragments/nix.nix
·········extra-trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" ];
+7
-8
nixos/fragments/security.nix
······
+6
-19
nixos/profiles/laptop.nix
···············
-708
nixos/profiles/server.nix
···-boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];-age.secrets.grafana-oidc-secret = { file = ../../secrets/grafana-oidc-secret.age; owner = "grafana"; };-static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];-age.secrets.headscale-oidc-secret = { file = ../../secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };-age.secrets.authelia-jwt-secret = { file = ../../secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-issuer-private-key = { file = ../../secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-storage-key = { file = ../../secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-ldap-password = { file = ../../secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-smtp-password = { file = ../../secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };-AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;-users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";-claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };-client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";-client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";-client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";-client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";-age.secrets.tuwunel-registration-tokens = { file = ../../secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };-ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";-age.secrets.miniflux-oidc-secret = { file = ../../secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
+15
-6
pkgs/default.nix
···
secrets/authelia-issuer-private-key.age
This is a binary file and will not be displayed.
secrets/authelia-jwt-secret.age
This is a binary file and will not be displayed.
secrets/authelia-ldap-password.age
This is a binary file and will not be displayed.
-9
secrets/authelia-smtp-password.age
···
-11
secrets/authelia-storage-key.age
···
+22
secrets/default.nix
···
-9
secrets/grafana-oidc-secret.age
···
secrets/headscale-oidc-secret.age
This is a binary file and will not be displayed.
-13
secrets/hypixel-bank-tracker-banana.age
···
-13
secrets/hypixel-bank-tracker-main.age
···-�~���T�c������Ym��'>�"0q���������Z�����H}�ϛ'����� ��k/���t�v��Q�p,�ڝ�X� Ȉ6�g�'�̍ή�$}۷��\"،4F`�C�HŴ�@�q��D��k��~F=�n)�z
+10
-10
secrets/keys.nix
···+archaic-wiro-laptop = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJDuBHC0f7N0q1KRczJMoaBVdY0JFOtcpPy6WlYsoxUh";+neo-wiro-laptop = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINR1/9o1HLnSRkXt3xxAM5So1YCCNdJpBN1leSu7giuR";+weird-row-server = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII5sThvKuIj8yfeZzUPYfxWxnjTTdNtSID2OL4czE8AL";-milomoisson = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJdt7atyPTOfaBIsgDYYb0DG1yid2u78abaCDji6Uxgi";+milo-ed25519 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJdt7atyPTOfaBIsgDYYb0DG1yid2u78abaCDji6Uxgi";
secrets/lldap-env.age
This is a binary file and will not be displayed.
-9
secrets/miniflux-oidc-secret.age
···
secrets/pds-env.age
This is a binary file and will not be displayed.
-42
secrets/secrets.nix
···-# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
-9
secrets/tuwunel-registration-tokens.age
···
secrets/vaultwarden-env.age
This is a binary file and will not be displayed.
+9
-2
secrets.nix
···-# You can use agenix directly at repo top-level instead of having to change directory into `secrets/`-mapAttrs' (name: value: { name = ("secrets/" + name); inherit value; }) (import ./secrets/secrets.nix)