this repo has no description
4
fork

Configure Feed

Select the types of activity you want to include in your feed.

ohhh ahhh stuff idk

dawn d883b5c1 682714c9

+110 -90
+32 -32
_sources/generated.json
··· 22 22 }, 23 23 "blog": { 24 24 "cargoLocks": null, 25 - "date": "2026-01-13", 25 + "date": "2026-01-15", 26 26 "extract": null, 27 27 "name": "blog", 28 28 "passthru": null, ··· 32 32 "fetchSubmodules": false, 33 33 "leaveDotGit": false, 34 34 "name": null, 35 - "rev": "61331b565e674acad615c98f11d1adca5e367b54", 36 - "sha256": "sha256-CllCqGh0dSdYCIKhLL4+qCMFbHVUgzL9mkPFL0MOBcY=", 35 + "rev": "9d55af51b568597aecfd03bfb85dfe6b219dd1d7", 36 + "sha256": "sha256-ao/UxHSC6gUeU8mA+hFvBsc/1/iIXKN297qZ+578J/0=", 37 37 "sparseCheckout": [], 38 38 "type": "git", 39 39 "url": "https://tangled.org/@ptr.pet/endpoint" 40 40 }, 41 - "version": "61331b565e674acad615c98f11d1adca5e367b54" 41 + "version": "9d55af51b568597aecfd03bfb85dfe6b219dd1d7" 42 42 }, 43 43 "clickee": { 44 44 "cargoLocks": null, ··· 144 144 }, 145 145 "gomod2nix": { 146 146 "cargoLocks": null, 147 - "date": "2025-11-24", 147 + "date": "2025-12-29", 148 148 "extract": null, 149 149 "name": "gomod2nix", 150 150 "passthru": null, ··· 156 156 "name": null, 157 157 "owner": "nix-community", 158 158 "repo": "gomod2nix", 159 - "rev": "02e63a239d6eabd595db56852535992c898eba72", 160 - "sha256": "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ=", 159 + "rev": "49662a44272806ff785df2990a420edaaca15db4", 160 + "sha256": "sha256-NodN+lhWTD59b44Q2bPjE1edINfjfRkQYdZsrxifCeU=", 161 161 "sparseCheckout": [], 162 162 "type": "github" 163 163 }, 164 - "version": "02e63a239d6eabd595db56852535992c898eba72" 164 + "version": "49662a44272806ff785df2990a420edaaca15db4" 165 165 }, 166 166 "home": { 167 167 "cargoLocks": null, 168 - "date": "2025-12-27", 168 + "date": "2026-01-13", 169 169 "extract": null, 170 170 "name": "home", 171 171 "passthru": null, ··· 177 177 "name": null, 178 178 "owner": "nix-community", 179 179 "repo": "home-manager", 180 - "rev": "4067ca1ffb6425b8597eafb63a84b171e0192d2b", 181 - "sha256": "sha256-Ok0jocJ82JriaMDtYEytR8oWcxADlX5WcWXULrN4czA=", 180 + "rev": "c5d67517bbcaf37e15c416219c965cc707a0ca24", 181 + "sha256": "sha256-dlWl/z/rdZmPGVexkYL1VLKBMU1e5Y1DZmQfiRf60cQ=", 182 182 "sparseCheckout": [], 183 183 "type": "github" 184 184 }, 185 - "version": "4067ca1ffb6425b8597eafb63a84b171e0192d2b" 185 + "version": "c5d67517bbcaf37e15c416219c965cc707a0ca24" 186 186 }, 187 187 "limbusart": { 188 188 "cargoLocks": null, ··· 247 247 }, 248 248 "nixos-hardware": { 249 249 "cargoLocks": null, 250 - "date": "2025-12-24", 250 + "date": "2025-12-31", 251 251 "extract": null, 252 252 "name": "nixos-hardware", 253 253 "passthru": null, ··· 259 259 "name": null, 260 260 "owner": "NixOS", 261 261 "repo": "nixos-hardware", 262 - "rev": "c5db9569ac9cc70929c268ac461f4003e3e5ca80", 263 - "sha256": "sha256-UXVtN77D7pzKmzOotFTStgZBqpOcf8cO95FcupWp4Zo=", 262 + "rev": "40b1a28dce561bea34858287fbb23052c3ee63fe", 263 + "sha256": "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q=", 264 264 "sparseCheckout": [], 265 265 "type": "github" 266 266 }, 267 - "version": "c5db9569ac9cc70929c268ac461f4003e3e5ca80" 267 + "version": "40b1a28dce561bea34858287fbb23052c3ee63fe" 268 268 }, 269 269 "nixpkgs-xr": { 270 270 "cargoLocks": null, 271 - "date": "2025-12-24", 271 + "date": "2026-01-09", 272 272 "extract": null, 273 273 "name": "nixpkgs-xr", 274 274 "passthru": null, ··· 280 280 "name": null, 281 281 "owner": "nix-community", 282 282 "repo": "nixpkgs-xr", 283 - "rev": "9e8efcd2c4ea906772dea99204a9819284a29b81", 284 - "sha256": "sha256-biwvZsCGC4vCXS6rzs3tUkELqqEXPko0E3R9IhYKavE=", 283 + "rev": "df098c5ff75e641d010c472d8321391db4e90eb9", 284 + "sha256": "sha256-phU4/JrtliPo7VznNgvVNVYNYzNodvdCfq5kBYQMAV4=", 285 285 "sparseCheckout": [], 286 286 "type": "github" 287 287 }, 288 - "version": "9e8efcd2c4ea906772dea99204a9819284a29b81" 288 + "version": "df098c5ff75e641d010c472d8321391db4e90eb9" 289 289 }, 290 290 "nsid-tracker": { 291 291 "cargoLocks": null, ··· 329 329 }, 330 330 "stylix": { 331 331 "cargoLocks": null, 332 - "date": "2025-12-24", 332 + "date": "2026-01-12", 333 333 "extract": null, 334 334 "name": "stylix", 335 335 "passthru": null, ··· 341 341 "name": null, 342 342 "owner": "nix-community", 343 343 "repo": "stylix", 344 - "rev": "551df12ee3ebac52c5712058bd97fd9faa4c3430", 345 - "sha256": "sha256-J2DDdRqSU4w9NNgkMfmMeaLIof5PXtS9RG7y6ckDvQE=", 344 + "rev": "a62840a9e95801969a03b91e49c1607b5322224c", 345 + "sha256": "sha256-li0Z2Tr5qpH+wyuCMpzXSsHYRleaTukcdLTpAsGcVzY=", 346 346 "sparseCheckout": [], 347 347 "type": "github" 348 348 }, 349 - "version": "551df12ee3ebac52c5712058bd97fd9faa4c3430" 349 + "version": "a62840a9e95801969a03b91e49c1607b5322224c" 350 350 }, 351 351 "tangled": { 352 352 "cargoLocks": null, 353 - "date": "2026-01-11", 353 + "date": "2026-01-13", 354 354 "extract": null, 355 355 "name": "tangled", 356 356 "passthru": null, ··· 360 360 "fetchSubmodules": false, 361 361 "leaveDotGit": false, 362 362 "name": null, 363 - "rev": "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b", 364 - "sha256": "sha256-JZgqPGYaNxFcj4gl4U4eXctDtPv6YHyu3KuHtMNEyZk=", 363 + "rev": "3638909db6c988eef717981ee3f4950937e92836", 364 + "sha256": "sha256-T87j98h4T2ux5LYc/R1KjisUfv1qck65MknhGJVMEA4=", 365 365 "sparseCheckout": [], 366 366 "type": "git", 367 367 "url": "https://tangled.org/tangled.org/core" 368 368 }, 369 - "version": "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b" 369 + "version": "3638909db6c988eef717981ee3f4950937e92836" 370 370 }, 371 371 "tangled-sqlite-lib": { 372 372 "cargoLocks": null, ··· 404 404 }, 405 405 "zen-browser": { 406 406 "cargoLocks": null, 407 - "date": "2025-12-25", 407 + "date": "2026-01-13", 408 408 "extract": null, 409 409 "name": "zen-browser", 410 410 "passthru": null, ··· 416 416 "name": null, 417 417 "owner": "0xc000022070", 418 418 "repo": "zen-browser-flake", 419 - "rev": "98d8f48ba80a4b6e3b56addad850d57132301075", 420 - "sha256": "sha256-mGZBEN67mxeOsBhplBRLm6L+y++8jU46EEUYgemG1aQ=", 419 + "rev": "2357b84ef617772c012397a7e8b4542bd5e4bab8", 420 + "sha256": "sha256-ASI9j+Fgj7TzB4mj+IBIBrV5mH9P/D/vjKLyVDZWZOw=", 421 421 "sparseCheckout": [], 422 422 "type": "github" 423 423 }, 424 - "version": "98d8f48ba80a4b6e3b56addad850d57132301075" 424 + "version": "2357b84ef617772c012397a7e8b4542bd5e4bab8" 425 425 } 426 426 }
+32 -32
_sources/generated.nix
··· 15 15 }; 16 16 blog = { 17 17 pname = "blog"; 18 - version = "61331b565e674acad615c98f11d1adca5e367b54"; 18 + version = "9d55af51b568597aecfd03bfb85dfe6b219dd1d7"; 19 19 src = fetchgit { 20 20 url = "https://tangled.org/@ptr.pet/endpoint"; 21 - rev = "61331b565e674acad615c98f11d1adca5e367b54"; 21 + rev = "9d55af51b568597aecfd03bfb85dfe6b219dd1d7"; 22 22 fetchSubmodules = false; 23 23 deepClone = false; 24 24 leaveDotGit = false; 25 25 sparseCheckout = [ ]; 26 - sha256 = "sha256-CllCqGh0dSdYCIKhLL4+qCMFbHVUgzL9mkPFL0MOBcY="; 26 + sha256 = "sha256-ao/UxHSC6gUeU8mA+hFvBsc/1/iIXKN297qZ+578J/0="; 27 27 }; 28 - date = "2026-01-13"; 28 + date = "2026-01-15"; 29 29 }; 30 30 clickee = { 31 31 pname = "clickee"; ··· 95 95 }; 96 96 gomod2nix = { 97 97 pname = "gomod2nix"; 98 - version = "02e63a239d6eabd595db56852535992c898eba72"; 98 + version = "49662a44272806ff785df2990a420edaaca15db4"; 99 99 src = fetchFromGitHub { 100 100 owner = "nix-community"; 101 101 repo = "gomod2nix"; 102 - rev = "02e63a239d6eabd595db56852535992c898eba72"; 102 + rev = "49662a44272806ff785df2990a420edaaca15db4"; 103 103 fetchSubmodules = false; 104 - sha256 = "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ="; 104 + sha256 = "sha256-NodN+lhWTD59b44Q2bPjE1edINfjfRkQYdZsrxifCeU="; 105 105 }; 106 - date = "2025-11-24"; 106 + date = "2025-12-29"; 107 107 }; 108 108 home = { 109 109 pname = "home"; 110 - version = "4067ca1ffb6425b8597eafb63a84b171e0192d2b"; 110 + version = "c5d67517bbcaf37e15c416219c965cc707a0ca24"; 111 111 src = fetchFromGitHub { 112 112 owner = "nix-community"; 113 113 repo = "home-manager"; 114 - rev = "4067ca1ffb6425b8597eafb63a84b171e0192d2b"; 114 + rev = "c5d67517bbcaf37e15c416219c965cc707a0ca24"; 115 115 fetchSubmodules = false; 116 - sha256 = "sha256-Ok0jocJ82JriaMDtYEytR8oWcxADlX5WcWXULrN4czA="; 116 + sha256 = "sha256-dlWl/z/rdZmPGVexkYL1VLKBMU1e5Y1DZmQfiRf60cQ="; 117 117 }; 118 - date = "2025-12-27"; 118 + date = "2026-01-13"; 119 119 }; 120 120 limbusart = { 121 121 pname = "limbusart"; ··· 159 159 }; 160 160 nixos-hardware = { 161 161 pname = "nixos-hardware"; 162 - version = "c5db9569ac9cc70929c268ac461f4003e3e5ca80"; 162 + version = "40b1a28dce561bea34858287fbb23052c3ee63fe"; 163 163 src = fetchFromGitHub { 164 164 owner = "NixOS"; 165 165 repo = "nixos-hardware"; 166 - rev = "c5db9569ac9cc70929c268ac461f4003e3e5ca80"; 166 + rev = "40b1a28dce561bea34858287fbb23052c3ee63fe"; 167 167 fetchSubmodules = false; 168 - sha256 = "sha256-UXVtN77D7pzKmzOotFTStgZBqpOcf8cO95FcupWp4Zo="; 168 + sha256 = "sha256-ljDBUDpD1Cg5n3mJI81Hz5qeZAwCGxon4kQW3Ho3+6Q="; 169 169 }; 170 - date = "2025-12-24"; 170 + date = "2025-12-31"; 171 171 }; 172 172 nixpkgs-xr = { 173 173 pname = "nixpkgs-xr"; 174 - version = "9e8efcd2c4ea906772dea99204a9819284a29b81"; 174 + version = "df098c5ff75e641d010c472d8321391db4e90eb9"; 175 175 src = fetchFromGitHub { 176 176 owner = "nix-community"; 177 177 repo = "nixpkgs-xr"; 178 - rev = "9e8efcd2c4ea906772dea99204a9819284a29b81"; 178 + rev = "df098c5ff75e641d010c472d8321391db4e90eb9"; 179 179 fetchSubmodules = false; 180 - sha256 = "sha256-biwvZsCGC4vCXS6rzs3tUkELqqEXPko0E3R9IhYKavE="; 180 + sha256 = "sha256-phU4/JrtliPo7VznNgvVNVYNYzNodvdCfq5kBYQMAV4="; 181 181 }; 182 - date = "2025-12-24"; 182 + date = "2026-01-09"; 183 183 }; 184 184 nsid-tracker = { 185 185 pname = "nsid-tracker"; ··· 211 211 }; 212 212 stylix = { 213 213 pname = "stylix"; 214 - version = "551df12ee3ebac52c5712058bd97fd9faa4c3430"; 214 + version = "a62840a9e95801969a03b91e49c1607b5322224c"; 215 215 src = fetchFromGitHub { 216 216 owner = "nix-community"; 217 217 repo = "stylix"; 218 - rev = "551df12ee3ebac52c5712058bd97fd9faa4c3430"; 218 + rev = "a62840a9e95801969a03b91e49c1607b5322224c"; 219 219 fetchSubmodules = false; 220 - sha256 = "sha256-J2DDdRqSU4w9NNgkMfmMeaLIof5PXtS9RG7y6ckDvQE="; 220 + sha256 = "sha256-li0Z2Tr5qpH+wyuCMpzXSsHYRleaTukcdLTpAsGcVzY="; 221 221 }; 222 - date = "2025-12-24"; 222 + date = "2026-01-12"; 223 223 }; 224 224 tangled = { 225 225 pname = "tangled"; 226 - version = "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b"; 226 + version = "3638909db6c988eef717981ee3f4950937e92836"; 227 227 src = fetchgit { 228 228 url = "https://tangled.org/tangled.org/core"; 229 - rev = "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b"; 229 + rev = "3638909db6c988eef717981ee3f4950937e92836"; 230 230 fetchSubmodules = false; 231 231 deepClone = false; 232 232 leaveDotGit = false; 233 233 sparseCheckout = [ ]; 234 - sha256 = "sha256-JZgqPGYaNxFcj4gl4U4eXctDtPv6YHyu3KuHtMNEyZk="; 234 + sha256 = "sha256-T87j98h4T2ux5LYc/R1KjisUfv1qck65MknhGJVMEA4="; 235 235 }; 236 - date = "2026-01-11"; 236 + date = "2026-01-13"; 237 237 }; 238 238 tangled-sqlite-lib = { 239 239 pname = "tangled-sqlite-lib"; ··· 259 259 }; 260 260 zen-browser = { 261 261 pname = "zen-browser"; 262 - version = "98d8f48ba80a4b6e3b56addad850d57132301075"; 262 + version = "2357b84ef617772c012397a7e8b4542bd5e4bab8"; 263 263 src = fetchFromGitHub { 264 264 owner = "0xc000022070"; 265 265 repo = "zen-browser-flake"; 266 - rev = "98d8f48ba80a4b6e3b56addad850d57132301075"; 266 + rev = "2357b84ef617772c012397a7e8b4542bd5e4bab8"; 267 267 fetchSubmodules = false; 268 - sha256 = "sha256-mGZBEN67mxeOsBhplBRLm6L+y++8jU46EEUYgemG1aQ="; 268 + sha256 = "sha256-ASI9j+Fgj7TzB4mj+IBIBrV5mH9P/D/vjKLyVDZWZOw="; 269 269 }; 270 - date = "2025-12-25"; 270 + date = "2026-01-13"; 271 271 }; 272 272 }
+1 -1
dns/dnsconfig.js
··· 124 124 "ptr.pet", 125 125 REG_NONE, 126 126 DnsProvider(DSP_PRIMARY), 127 - TRIMOUNTS(["@", "tunes", "x"], CF_PROXY_OFF), 127 + TRIMOUNTS(["@", "tunes", "corpus", "x"], CF_PROXY_OFF), 128 128 DZWONEK(["nucleus", "trill", "dysnomia"], CF_PROXY_OFF), 129 129 TXT("_kicya", "3b11cb74243eea1fc84e62ffefd7e246279c2f203e1cae42e19d0454dc8d2172"), 130 130 // atproto
+4 -4
flake.lock
··· 121 121 }, 122 122 "nixpkgs_2": { 123 123 "locked": { 124 - "lastModified": 1766651565, 125 - "narHash": "sha256-gtanTxYMENOVHWdS4QgxxKGPaSqvcNJVw0KBfaF5/Bo=", 126 - "rev": "3e2499d5539c16d0d173ba53552a4ff8547f4539", 124 + "lastModified": 1768127708, 125 + "narHash": "sha256-caCMFMAeeiexMCYzSb8okUJWy7uAoxAczPjrQkaFCqo=", 126 + "rev": "ffbc9f8cbaacfb331b6017d5a5abb21a492c9a38", 127 127 "type": "tarball", 128 - "url": "https://releases.nixos.org/nixos/unstable/nixos-26.05pre916364.3e2499d5539c/nixexprs.tar.xz?lastModified=1766651565&rev=3e2499d5539c16d0d173ba53552a4ff8547f4539" 128 + "url": "https://releases.nixos.org/nixos/unstable/nixos-26.05pre925861.ffbc9f8cbaac/nixexprs.tar.xz?lastModified=1768127708&rev=ffbc9f8cbaacfb331b6017d5a5abb21a492c9a38" 129 129 }, 130 130 "original": { 131 131 "type": "tarball",
-1
hosts/trimounts/modules/nginx.nix
··· 38 38 39 39 users.users.nginx.extraGroups = [ "acme" ]; 40 40 41 - age.secrets.bunnyApiKey.file = ../../../secrets/bunnyApiKey.age; 42 41 security.acme = { 43 42 acceptTerms = true; 44 43 defaults = {
hosts/trimounts/modules/perses.nix/dashboards/.gitignore hosts/trimounts/modules/perses.disabled/dashboards/.gitignore
hosts/trimounts/modules/perses.nix/dashboards/go.mod hosts/trimounts/modules/perses.disabled/dashboards/go.mod
hosts/trimounts/modules/perses.nix/dashboards/go.sum hosts/trimounts/modules/perses.disabled/dashboards/go.sum
hosts/trimounts/modules/perses.nix/dashboards/wolumonde.go hosts/trimounts/modules/perses.disabled/dashboards/wolumonde.go
hosts/trimounts/modules/perses.nix/default.nix hosts/trimounts/modules/perses.disabled/default.nix
hosts/trimounts/modules/perses.nix/provision/1-private-infra.yaml hosts/trimounts/modules/perses.disabled/provision/1-private-infra.yaml
hosts/trimounts/modules/perses.nix/provision/2-admin-role.yaml hosts/trimounts/modules/perses.disabled/provision/2-admin-role.yaml
hosts/trimounts/modules/perses.nix/provision/3-admin-bind-role.yaml hosts/trimounts/modules/perses.disabled/provision/3-admin-bind-role.yaml
hosts/trimounts/modules/perses.nix/provision/4-victoria.yaml hosts/trimounts/modules/perses.disabled/provision/4-victoria.yaml
hosts/trimounts/modules/perses.nix/provision/6-guest-role.yaml hosts/trimounts/modules/perses.disabled/provision/6-guest-role.yaml
hosts/trimounts/modules/perses.nix/provision/7-guest-role-bind.yaml hosts/trimounts/modules/perses.disabled/provision/7-guest-role-bind.yaml
hosts/trimounts/modules/perses.nix/provision/90-wolumonde.yaml hosts/trimounts/modules/perses.disabled/provision/90-wolumonde.yaml
hosts/trimounts/modules/pocket-id.nix hosts/trimounts/modules/pocket-id.disabled
+2 -2
hosts/trimounts/modules/tailscale.nix
··· 1 - { ... }: 1 + { lib, ... }: 2 2 { 3 3 imports = [ ../../../modules/network/tailscale.nix ]; 4 4 5 5 services.tailscale = { 6 6 extraSetFlags = [ "--advertise-exit-node" ]; 7 - useRoutingFeatures = "both"; 7 + useRoutingFeatures = lib.mkForce "both"; 8 8 }; 9 9 }
+24
hosts/trimounts/modules/trilium.disabled
··· 1 + {config, ...}: 2 + let 3 + rootDomain = "ptr.pet"; 4 + domain = "corpus.${rootDomain}"; 5 + cfg = config.services.trilium-server; 6 + in { 7 + services.trilium-server = { 8 + enable = true; 9 + instanceName = "corpus"; 10 + port = 7788; 11 + }; 12 + 13 + security.acme.certs.${rootDomain}.extraDomainNames = [domain]; 14 + services.nginx.virtualHosts.${domain} = { 15 + useACMEHost = "ptr.pet"; 16 + forceSSL = true; 17 + quic = true; 18 + kTLS = true; 19 + locations."/" = { 20 + proxyPass = "http://${cfg.host}:${toString cfg.port}"; 21 + proxyWebsockets = true; 22 + }; 23 + }; 24 + }
+1
hosts/volsinii/modules/hardware-configuration.nix
··· 32 32 address = [ "199.71.188.53/29" ]; 33 33 gateway = [ "199.71.188.49" ]; 34 34 }; 35 + networking.interfaces."enX0".mtu = 1370; 35 36 36 37 nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; 37 38 }
+3 -1
hosts/volsinii/modules/tailscale.nix
··· 1 - { config, ... }: 1 + { lib, ... }: 2 2 { 3 3 imports = [ ../../../modules/network/tailscale.nix ]; 4 + 5 + services.tailscale.useRoutingFeatures = lib.mkForce "server"; 4 6 5 7 # age.secrets.tailscaleAuthKey.file = ../../../secrets/tailscaleAuthKey.age; 6 8 # services.tailscale.authKeyFile = config.age.secrets.tailscaleAuthKey.path;
+1
modules/network/tailscale.nix
··· 6 6 # extraUpFlags = [ "--ssh" ]; 7 7 extraDaemonFlags = [ "--no-logs-no-support" ]; 8 8 openFirewall = true; 9 + useRoutingFeatures = "client"; 9 10 }; 10 11 11 12 networking.interfaces.tailscale0.useDHCP = lib.mkForce false;
+2 -2
pkgs-set/pkgs/helium.nix
··· 5 5 }: 6 6 pkgs.appimageTools.wrapType2 rec { 7 7 pname = "helium"; 8 - version = "0.7.10.1"; 8 + version = "0.8.1.1"; 9 9 10 10 src = let 11 11 platformMap = { ··· 16 16 platform = platformMap.${pkgs.system}; 17 17 18 18 hashes = { 19 - "x86_64-linux" = "sha256-11xSlHIqmyyVwjjwt5FmLhp72P3m07PppOo7a9DbTcE="; 19 + "x86_64-linux" = "sha256-n1wn80h9O7GpZz4AygNSKMcilX8lr6fJkiQBBPPQXok="; 20 20 "aarch64-linux" = "sha256-B63tvOtSRlMRJozvzC7lqG2LM0ZgLIq2G/AHABl+Qqg="; 21 21 }; 22 22
+3 -5
pkgs-set/pkgs/tangled-knot.nix
··· 7 7 }: 8 8 let 9 9 unwrapped = 10 - (callPackage "${inputs.tangled}/nix/pkgs/knot-unwrapped.nix" { 10 + callPackage "${inputs.tangled}/nix/pkgs/knot-unwrapped.nix" { 11 11 modules = tangled-modules; 12 12 sqlite-lib = tangled-sqlite-lib; 13 - }).overrideAttrs 14 - (_: { 15 - src = inputs.tangled; 16 - }); 13 + src = inputs.tangled; 14 + }; 17 15 in 18 16 callPackage "${inputs.tangled}/nix/pkgs/knot.nix" { 19 17 knot-unwrapped = unwrapped;
+3 -5
pkgs-set/pkgs/tangled-spindle.nix
··· 5 5 tangled-sqlite-lib, 6 6 ... 7 7 }: 8 - (callPackage "${inputs.tangled}/nix/pkgs/spindle.nix" { 8 + callPackage "${inputs.tangled}/nix/pkgs/spindle.nix" { 9 9 modules = tangled-modules; 10 10 sqlite-lib = tangled-sqlite-lib; 11 - }).overrideAttrs 12 - (_: { 13 - src = inputs.tangled; 14 - }) 11 + src = inputs.tangled; 12 + }
+1
secrets/roka.key.pub
··· 1 + ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHTE6VnzgLG+PbNMAcfmxYNJpvaevXKJg7mVY0bUkF+8
-5
secrets/secrets.nix
··· 30 30 dzwonek 31 31 trimounts 32 32 ]; 33 - "bunnyApiKey.age".publicKeys = [ 34 - yusdacra 35 - dzwonek 36 - trimounts 37 - ]; 38 33 "atfileCfg.age".publicKeys = [yusdacra]; 39 34 "ziplineCfg.age".publicKeys = [yusdacra trimounts]; 40 35 "callieMusic.age".publicKeys = [yusdacra trimounts];
+1
users/root/default.nix
··· 5 5 initialHashedPassword = "$6$XLWo1sPpgp63Zm$XHBbULH9q1gb/.yalPPU/I7EgTcW80bM.moCjIe/qGyOwE47VcXNVbTHloBZdIWQq0MfIG0IxInAu59.oJyos/"; 6 6 openssh.authorizedKeys.keys = [ 7 7 (builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub") 8 + (builtins.readFile "${inputs.self}/secrets/roka.key.pub") 8 9 ]; 9 10 }; 10 11