Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | Build(flake): Update | Soispha | 2023-05-13 |
| | |||
* | Build(flake): Move yambar binaries to codeberg | Soispha | 2023-05-09 |
| | |||
* | Style(treewide): Format | Soispha | 2023-05-09 |
| | |||
* | Build(flake): Update | Soispha | 2023-05-09 |
| | |||
* | Build(treewide): Update deps | Soispha | 2023-05-09 |
| | |||
* | Feat(hm/pkgs): Add flake_update | Soispha | 2023-05-09 |
| | |||
* | Refactor(treewide): Use separate shell library | Soispha | 2023-05-09 |
| | |||
* | Feat(flake): Modularize | Soispha | 2023-05-09 |
| | |||
* | Revert: "Fix(flake): Change to master for a firefox update"This reverts ↵ | Soispha | 2023-05-09 |
| | | | | commit 9dfd318fda1d80d49136cb304427c5acb3374516.Compiling Firefox from source is not worth it. | ||
* | Fix(flake): Change to master for a firefox update | Soispha | 2023-05-09 |
| | |||
* | Chore(flake): Update | Soispha | 2023-05-09 |
| | |||
* | Chore(flake): Update and only for x86_64-linux | Soispha | 2023-05-09 |
| | |||
* | Feat(hm/conf/firefox): Add my native host for video pausing | Soispha | 2023-05-09 |
| | |||
* | Fix(flake): Add ltex-ls to environment | Soispha | 2023-05-09 |
| | |||
* | Fix(flake): Deduplicate inputs | Soispha | 2023-05-09 |
| | |||
* | Feat(flake): Add shellcheck to the development env | Soispha | 2023-05-09 |
| | |||
* | Style(treewide): Format | Soispha | 2023-05-09 |
| | |||
* | Fix(system/services/nix): Add templates to the args | Soispha | 2023-05-09 |
| | |||
* | Fix(system/nixpkgs): Configure at a system level | Soispha | 2023-05-09 |
| | |||
* | Fix(treewide): Make system compile again | Soispha | 2023-05-09 |
| | |||
* | Fix(flake): Only activate ca-derivations after feature activate | Soispha | 2023-05-09 |
| | |||
* | Fix(treewide): Remove the reference to inputs | Soispha | 2023-05-09 |
| | |||
* | Feat(flake): Activate content-addressed derivations | Soispha | 2023-05-09 |
| | |||
* | Fix(secrets): Secrets now work | ene | 2023-04-09 |
| | |||
* | Feat(hm/pkgs): Add lutris | ene | 2023-04-07 |
| | | | | | Lutris requires Steam as a dependency, thus allowing steam is required. There seems to be no other way to do this, I'm afraid. | ||
* | Feat(Flake): Add nix develop support | ene | 2023-04-05 |
| | |||
* | Feat(system/services/nix): Add templates and short names | ene | 2023-03-25 |
| | |||
* | Fix(flake): Fully delete steam | ene | 2023-03-21 |
| | |||
* | Fix: Add grades to packages | ene | 2023-03-04 |
| | |||
* | Feat(hm/config/yambar): Update the scripts and better paths | ene | 2023-03-04 |
| | |||
* | Feat(packages): Add my scripts | ene | 2023-02-25 |
| | |||
* | Feat(bootstrap): Add nvim to the setup | ene | 2023-02-24 |
| | | | | | This is still not very nixy, but I would like to have it just work right now. But sure, this will (hopefully) get rewritten someday. | ||
* | Fix(river): Add further dependency for the init script | ene | 2023-02-22 |
| | |||
* | Feat(bootstrap): Add a setup script | ene | 2023-02-21 |
| | |||
* | Feat(flake): Move the nixosConfigurations to a file | ene | 2023-02-20 |
| | |||
* | Fix(flake): Rebase to a good base | ene | 2023-02-20 |
| | |||
* | Feat(flake): Move the in and outputs to separate files | ene | 2023-02-20 |
| | |||
* | Feat(bootstrap): Add a script for quick activation | ene | 2023-02-20 |
| | |||
* | Feat(flake): Reorder hosts | ene | 2023-02-20 |
| | |||
* | Feat(lib): Import my system library | ene | 2023-02-19 |
| | |||
* | Fix(bootstrap): Declare dependencies | ene | 2023-02-19 |
| | |||
* | Fix(bootstrap): Finish the nix side of things | ene | 2023-02-19 |
| | |||
* | Fix: Remove impure import | ene | 2023-02-19 |
| | |||
* | Fix(bootstrap): Use a derivation | ene | 2023-02-19 |
| | |||
* | Feat(bootstrap): Add a Script to make nix run with bootstrap viable | ene | 2023-02-19 |
| | |||
* | Feat: Add 'spawn' host, to simply create a bootable base | ene | 2023-02-19 |
| | |||
* | Fix: Add snap-sync through the nix flake | ene | 2023-02-18 |
| | |||
* | Feat: Add encryption through agenix | ene | 2023-02-18 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There are other alternatives: * [This blog post about NixOs secret encryption](https://xeiaso.net/blog/nixos-encrypted-secrets-2021-01-20) * Directly to agenix: * A [rewrite in rust](https://github.com/yaxitech/ragenix) * A dead (?) [rewrite in rust](https://github.com/cole-h/agenix-cli) * An implementation of Sops for nix: [Sops-nix](https://github.com/Mic92/sops-nix) * See the [NixOs wiki entry](https://nixos.wiki/wiki/Comparison_of_secret_managing_schemes) for further options. Reasons for agenix: I mostly just ruled other options out, until this was the only real thing: * The blog post was created in a time, where tools like agenix where not available, and it (very simplified) just shows, how to implement a basic version of agenix * The rewrite are both in itself interesting, but lack community support, this is however subject to change, and thus a migration to a rewrite might be feasible in the future. * Sops seems like a really nice thing, with support for nearly all relevant encryption options, but the documentation for sops-nix seems rather lack-luster for me, so I decided to stay with agenix, especially because I should not need the extra encryption options. * And lastly most of the option on the wiki page need excessive manual intervention on every reboot (maybe because the were written with servers in mind), but I would like to be able to deploy once and then never have to think about secret management. So you see, I mostly just used what seemed to be the easiest for my situation right now, and agenix works rather well. If there weren't one big downside, I would really like it: Encrypting a file with age — which is what agenix uses under the hood — requires a key, which in the case of agenix is the public ssh key. Being asymmetric encryption, the decryption requires the private key, which is in my case stored in an ssh-agent, feed directly from KeepassXC. And this is where the problem lives, I want to be able to decrypt the secrets (obviously), and this only works if I copy the private key to a file, which, whilst being a manual process, completely breaks the point behind using an ssh-agent with KeepassXC integration in the first place. There are however open Issues on both the rage an agenix issue trackers, so the hope of fixing this is still there. | ||
* | Feat: Add impersistent for persistent files and dirs | ene | 2023-02-16 |
| | |||
* | Fix(home-manager): Improve Firefox configuration | ene | 2023-02-12 |
| |