cd53c9bab8
feat(nixvim): install telescope-all-recent plugin
...
Configuration will be done in the next commit.
[1] https://github.com/prochri/telescope-all-recent.nvim
2024-08-16 15:37:14 +02:00
ea2cdf687f
chore: remove nonexistent input of flake-parts
2024-08-16 14:33:44 +02:00
67cd768b56
feat(zsh): install jujutsu completions
2024-08-15 17:07:49 +02:00
961d6a7293
feat(vcs): install jujutsu to user profile
2024-08-15 16:59:49 +02:00
37ad42b161
feat(nix-direnv): install nix-direnv
2024-08-14 13:48:04 +02:00
f9914e097d
feat(build tools): update build tools
2024-08-14 12:12:17 +02:00
c6f98edd88
chore: remove unused home-manager config
2024-08-14 12:11:37 +02:00
1c9ffc8fa0
fix(wm): include wm config
2024-08-14 12:10:46 +02:00
f4cb1f9690
fix(wm): move wm config
2024-08-14 12:03:26 +02:00
163ab6b3c0
fix(stylix): move wallpapers
2024-08-13 18:50:44 +02:00
14a4564a45
fix(home-manager): add colorscheme file
2024-08-13 18:50:21 +02:00
8ed040dd0e
fix(stylix): difference between nixos & home-manager options
2024-08-13 18:49:26 +02:00
48ad6caec9
wip(stylix): move stylix to nixos config
2024-08-13 17:20:02 +02:00
df92bdfe64
chore: remove files which were moved to nixos/
2024-08-13 16:57:48 +02:00
cc35787cab
fix(river-shifttags): forgot to change package install syntax
2024-08-13 13:40:44 +02:00
a499db635c
fix(river-shifttags): add missing river-shifttags input to nixos flake
2024-08-13 13:39:47 +02:00
f8931dc714
chore: update name of nixvim flake to be more consistent
2024-08-13 13:36:35 +02:00
f81036e0c6
chore(home-manager): remove unused input
2024-08-13 13:36:03 +02:00
390e3c6be4
fix(home-manager): argument was not in the correct place
2024-08-13 13:34:08 +02:00
10301e5d35
fix(nixvim): try to specify the package directly in flake.nix
2024-08-13 13:32:08 +02:00
098f6e9f62
update nixvim/flake.lock
2024-08-13 13:24:23 +02:00
ec8047a5ca
fix(nixvim): follow nixpkgs
2024-08-13 12:55:20 +02:00
e46d874e51
fix(home-manager): copy over nixvim configuration
2024-08-13 12:44:43 +02:00
64bc5aae14
feat(home-manager): slowly migrate home-manager to be installed as a nixos module
2024-08-13 12:41:45 +02:00
0dd923adaf
fix(home-manager): import only the homeConfiguration, not the whole flake
2024-08-13 09:29:44 +02:00
5eec06c38d
feat(home-manager): try managing home-manager configuration through configuration.nix
...
This will allow nixos-rebuild build-vm to already have a configured
system, simplifing testing.
2024-08-13 09:22:54 +02:00
6dd0a1f9c8
fix(fprintd): make nixos-06cb-009a-fingerprint-sensor follow nixpkgs
...
This may speed up evaluation times
2024-08-13 09:22:26 +02:00
87a8507834
feat(apply): update apply.sh
...
NIXOS_LABEL does not seem to work, so I'm removing it.
I'm also launching gitu, to encourage frequent commits.
2024-08-13 09:16:35 +02:00
2ba86baac8
feat(logs): install lnav
2024-08-13 09:01:04 +02:00
c0a1443ba9
feat(vm): configure initial password for users to allow login
2024-08-13 08:47:02 +02:00
e64cf18222
feat(backup): first borgbackup module test
...
https://xeiaso.net/blog/borg-backup-2021-01-09/
2024-08-12 16:58:39 +02:00
1c362fbf82
feat(openssh): enable openssh server
2024-08-12 14:42:14 +02:00
82fa9c473b
feat(apply.sh): launch gitu before rebuilding config, to encourage committing
2024-08-12 14:18:40 +02:00
dabd4298a6
fix(sourcehut): actually environment.variables do not affect systemd services, trying another way
2024-08-12 14:17:05 +02:00
b895943359
fix(sourcehut): make python's requests use global ca-certificates store
2024-08-12 13:50:42 +02:00
406d1cc6ca
chore(sourcehut): remove all traces of custom cacert package fuckery
...
I found out that you can set an env variable to make python's request
use the global cert store, this sidesteps the issue I have been having
with sourcehut.
2024-08-12 13:49:37 +02:00
57dacc328b
fix(sourcehut): try using patched cacert using a module?
...
Let's see if this works
2024-08-12 13:07:43 +02:00
38b50dd127
Revert "fix(remote build): set PATH environment variable required for nix acces on remote shell"
...
This reverts commit c37724ec6d .
Actually the config needs to be systemwide
2024-08-11 17:41:48 +02:00
9ed7765667
chore: remove ssh configuration
...
Actually, I misread the tutorial, this configuration should be done on
the remote machine.
2024-08-11 17:35:33 +02:00
332a0cc4c8
fix(ssh config): actually use the correct options
2024-08-11 17:18:50 +02:00
6327f0cdc0
fix: remove nonexistent option
2024-08-11 17:17:28 +02:00
9cc3b74f34
wip(overlays): temporarily disable the cacert overlay
...
I don't want it to rebuild 1000 packages again
2024-08-11 17:17:00 +02:00
687f517370
fix(remote build): actually the config needs to be systemwide
...
This makes some amount of sense, since it would probably be the nix
daemon that is connecting to the remote build machine.
2024-08-11 17:15:23 +02:00
c37724ec6d
fix(remote build): set PATH environment variable required for nix acces on remote shell
2024-08-11 17:11:11 +02:00
8d0a36614c
feat(certs): override the cacert package to always trust my own CA
2024-08-11 14:07:27 +02:00
c79262d95c
fix(sourcehut): try and make it use http for internal communication
...
None of my previous changes could have worked, because nginx
automatically redirects http to https. I think this is the setting I
need to change so that pure http works as well.
2024-08-11 12:24:38 +02:00
2dc710091d
fix(sourcehut): Maybe the onboarding-redirect needs to be http?
2024-08-11 12:23:23 +02:00
a5d00e6339
fix(sourcehut): try setting the origin string for each server
...
Same as before, I'm trying to force sourcehut to use http for internal
communication instead of https, to bypass the problem that the python
package used by sourcehut does not inherit my own CA
2024-08-11 12:21:54 +02:00
fc7c524e0b
fix(sourcehut): use http for origin
...
Maybe this will force sourcehut to use http instad of https, which will
allow me to sidestep the certificate problem?
2024-08-11 12:16:40 +02:00
933e10847f
fix(sourcehut): update oauth-client-id
...
This time I'm trying to sidestep the ssl certificate issue by accessing
internal services using http.
Using this as a redirect URL:
http://git.sourcehut.nixos.local/oauth/callback
2024-08-11 12:06:53 +02:00