+2
-1
dandelion/config.nix
+2
-1
dandelion/config.nix
+31
-8
dandelion/hardware.nix
+31
-8
dandelion/hardware.nix
·········
+2
-1
dandelion/home.nix
+2
-1
dandelion/home.nix
+2
-1
dandelion/packages.nix
+2
-1
dandelion/packages.nix
+10
-7
dandelion/services/caddy.nix
+10
-7
dandelion/services/caddy.nix
···-cpCertsCommand = "${cpCerts}/bin/cpCerts {event.data.identifier} {event.data.certificate_path} "
+6
-6
flake.lock
+6
-6
flake.lock
······
+23
-5
flake.nix
+23
-5
flake.nix
······
+2
-1
fly-agaric/config.nix
+2
-1
fly-agaric/config.nix
+31
-8
fly-agaric/hardware.nix
+31
-8
fly-agaric/hardware.nix
·········
+2
-1
fly-agaric/home.nix
+2
-1
fly-agaric/home.nix
+2
-1
fly-agaric/packages.nix
+2
-1
fly-agaric/packages.nix
+12
-7
lily/config.nix
+12
-7
lily/config.nix
······
+38
-8
lily/hardware.nix
+38
-8
lily/hardware.nix
······
+2
-1
lily/home.nix
+2
-1
lily/home.nix
+2
-1
lily/packages.nix
+2
-1
lily/packages.nix
+2
-1
lily/services/fail2ban.nix
+2
-1
lily/services/fail2ban.nix
+2
-1
lutea/config.nix
+2
-1
lutea/config.nix
+15
-2
lutea/hardware.nix
+15
-2
lutea/hardware.nix
······
+2
-1
lutea/home.nix
+2
-1
lutea/home.nix
+2
-1
lutea/packages.nix
+2
-1
lutea/packages.nix
+2
-1
modules/audio.nix
+2
-1
modules/audio.nix
+21
-4
modules/basic.nix
+21
-4
modules/basic.nix
············
+2
-1
modules/binary-cache.nix
+2
-1
modules/binary-cache.nix
+2
-1
modules/browsers.nix
+2
-1
modules/browsers.nix
+3
-2
modules/cloud-storage.nix
+3
-2
modules/cloud-storage.nix
+2
-1
modules/creation.nix
+2
-1
modules/creation.nix
+7
-2
modules/development/c.nix
+7
-2
modules/development/c.nix
+2
-2
modules/development/default.nix
+2
-2
modules/development/default.nix
+2
-1
modules/development/go.nix
+2
-1
modules/development/go.nix
+6
-2
modules/development/nix.nix
+6
-2
modules/development/nix.nix
+2
-1
modules/development/python.nix
+2
-1
modules/development/python.nix
+6
-2
modules/development/roc.nix
+6
-2
modules/development/roc.nix
······
+2
-1
modules/development/sh.nix
+2
-1
modules/development/sh.nix
+2
-2
modules/development/sqlite.nix
+2
-2
modules/development/sqlite.nix
+2
-1
modules/development/typst.nix
+2
-1
modules/development/typst.nix
+2
-1
modules/development/zig.nix
+2
-1
modules/development/zig.nix
+6
-2
modules/dotfiles.nix
+6
-2
modules/dotfiles.nix
···
+16
-13
modules/editor.nix
+16
-13
modules/editor.nix
···-url = "https://github.com/yemouu/kakoune/commit/15d4f7585fdac03e460e59b0508aecd636bd2660.patch";+url = "https://github.com/yemouu/kakoune/commit/15d4f7585fdac03e460e59b0508aecd636bd2660.patch";
+5
-2
modules/email.nix
+5
-2
modules/email.nix
···-(final: prev: { sieve-editor-gui = prev.sieve-editor-gui.override { electron = final.electron-bin; }; })
+2
-1
modules/fail2ban.nix
+2
-1
modules/fail2ban.nix
+2
-1
modules/flatpak.nix
+2
-1
modules/flatpak.nix
+2
-1
modules/fonts.nix
+2
-1
modules/fonts.nix
+2
-1
modules/fwupd.nix
+2
-1
modules/fwupd.nix
+65
-55
modules/games.nix
+65
-55
modules/games.nix
·········
+31
-17
modules/gui.nix
+31
-17
modules/gui.nix
·········
+2
-1
modules/hardware-keys.nix
+2
-1
modules/hardware-keys.nix
+45
-9
modules/home-mounts.nix
+45
-9
modules/home-mounts.nix
···
+2
-2
modules/home.nix
+2
-2
modules/home.nix
+2
-1
modules/im.nix
+2
-1
modules/im.nix
+2
-1
modules/kde.nix
+2
-1
modules/kde.nix
+2
-1
modules/machine-id.nix
+2
-1
modules/machine-id.nix
+2
-1
modules/machineInfo.nix
+2
-1
modules/machineInfo.nix
+52
-28
modules/mounts.nix
+52
-28
modules/mounts.nix
···
+10
-7
modules/netbird.nix
+10
-7
modules/netbird.nix
···
+6
-2
modules/nix.nix
+6
-2
modules/nix.nix
······
+2
-1
modules/openssh.nix
+2
-1
modules/openssh.nix
+10
-8
modules/packages/buildConfig/default.nix
+10
-8
modules/packages/buildConfig/default.nix
···
+6
-1
modules/packages/nixos-rebuild-tmpdir.nix
+6
-1
modules/packages/nixos-rebuild-tmpdir.nix
···# This is fine, but TMPDIR environment variable isn't available at this point, so mktemp puts the
+2
-1
modules/printing.nix
+2
-1
modules/printing.nix
+18
-5
modules/remoteBuildMachines.nix
+18
-5
modules/remoteBuildMachines.nix
·········
+2
-1
modules/remoteBuilder.nix
+2
-1
modules/remoteBuilder.nix
+6
-2
modules/services/caddy.nix
+6
-2
modules/services/caddy.nix
+25
-12
modules/services/dendrite.nix
+25
-12
modules/services/dendrite.nix
······-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 8008 ];+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =···
+13
-6
modules/services/dufs.nix
+13
-6
modules/services/dufs.nix
···export DUFS_AUTH="mou:$(${pkgs.coreutils}/bin/cat ${config.sops.secrets."dufs/mouPW".path})@/:rw"
+2
-1
modules/services/esquid.nix
+2
-1
modules/services/esquid.nix
+10
-7
modules/services/i2pd.nix
+10
-7
modules/services/i2pd.nix
···
+6
-2
modules/services/libvirt.nix
+6
-2
modules/services/libvirt.nix
···
+11
-3
modules/services/nextcloud.nix
+11
-3
modules/services/nextcloud.nix
······-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 80 ];+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =···-systemd.services.nextcloud-notify_push.environment.NEXTCLOUD_URL = lib.mkForce "http://${config.mInfo.nb-ipv4}";
+2
-1
modules/services/openssh.nix
+2
-1
modules/services/openssh.nix
+2
-1
modules/services/postgresql.nix
+2
-1
modules/services/postgresql.nix
+2
-2
modules/services/vault.nix
+2
-2
modules/services/vault.nix
+7
-1
modules/sss-mount.nix
+7
-1
modules/sss-mount.nix
+2
-1
modules/sss.nix
+2
-1
modules/sss.nix
+2
-1
modules/tools.nix
+2
-1
modules/tools.nix
+4
-3
modules/unfree.nix
+4
-3
modules/unfree.nix
···
+12
-6
modules/vpn.nix
+12
-6
modules/vpn.nix
···