mirror of
https://github.com/nmasur/dotfiles
synced 2025-04-24 09:12:23 +00:00
Compare commits
No commits in common. "251dce68bbb66c02b63194500672e03dd7f580b8" and "6cd22bc7ced508a61028189b2ffb55a91b418664" have entirely different histories.
251dce68bb
...
6cd22bc7ce
14
README.md
14
README.md
@ -63,7 +63,7 @@ the WSL configuration:
|
|||||||
|
|
||||||
```
|
```
|
||||||
nix-shell -p nixVersions.stable
|
nix-shell -p nixVersions.stable
|
||||||
sudo nixos-rebuild switch --flake github:nmasur/dotfiles#flame
|
sudo nixos-rebuild switch --flake github:nmasur/dotfiles#wsl
|
||||||
```
|
```
|
||||||
|
|
||||||
You should also download the
|
You should also download the
|
||||||
@ -90,7 +90,17 @@ nix-build https://github.com/LnL7/nix-darwin/archive/master.tar.gz -A installer
|
|||||||
Then switch to the macOS configuration:
|
Then switch to the macOS configuration:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
darwin-rebuild switch --flake github:nmasur/dotfiles#lookingglass
|
darwin-rebuild switch --flake github:nmasur/dotfiles#macbook
|
||||||
|
```
|
||||||
|
|
||||||
|
### Dealing with corporate MITM SSL certificates:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Get the certificates
|
||||||
|
openssl s_client -showcerts -verify 5 -connect cache.nixos.org:443 < /dev/null
|
||||||
|
|
||||||
|
# Paste them in here
|
||||||
|
sudo nvim $NIX_SSL_CERT_FILE
|
||||||
```
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
tmpfile=$(mktemp)
|
tmpfile=$(mktemp)
|
||||||
echo "''${secret}" > ''${tmpfile}
|
echo "''${secret}" > ''${tmpfile}
|
||||||
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
||||||
builtins.toString ../public-keys
|
builtins.toString ../hosts/public-keys
|
||||||
} $tmpfile
|
} $tmpfile
|
||||||
rm $tmpfile
|
rm $tmpfile
|
||||||
'');
|
'');
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
--identity ~/.ssh/id_ed25519 $encryptedfile > $tmpfile
|
--identity ~/.ssh/id_ed25519 $encryptedfile > $tmpfile
|
||||||
echo "Encrypting ''${encryptedfile}..."
|
echo "Encrypting ''${encryptedfile}..."
|
||||||
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
||||||
builtins.toString ../public-keys
|
builtins.toString ../hosts/public-keys
|
||||||
} $tmpfile > $encryptedfile
|
} $tmpfile > $encryptedfile
|
||||||
rm $tmpfile
|
rm $tmpfile
|
||||||
done
|
done
|
||||||
|
@ -112,8 +112,7 @@
|
|||||||
overlays = [
|
overlays = [
|
||||||
inputs.nur.overlay
|
inputs.nur.overlay
|
||||||
inputs.nix2vim.overlay
|
inputs.nix2vim.overlay
|
||||||
(import ./overlays/neovim-plugins.nix inputs)
|
(import ./modules/neovim/plugins-overlay.nix inputs)
|
||||||
(import ./overlays/calibre-web.nix)
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# System types to support.
|
# System types to support.
|
||||||
|
@ -20,6 +20,16 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Fix: https://github.com/janeczku/calibre-web/issues/2422
|
||||||
|
nixpkgs.overlays = [
|
||||||
|
(final: prev: {
|
||||||
|
calibre-web = prev.calibre-web.overrideAttrs (old: {
|
||||||
|
patches = (old.patches or [ ])
|
||||||
|
++ [ ../../patches/calibre-web-cloudflare.patch ];
|
||||||
|
});
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
caddy.routes = [{
|
caddy.routes = [{
|
||||||
match = [{ host = [ config.bookServer ]; }];
|
match = [{ host = [ config.bookServer ]; }];
|
||||||
handle = [{
|
handle = [{
|
||||||
|
@ -1,7 +0,0 @@
|
|||||||
# Fix: https://github.com/janeczku/calibre-web/issues/2422
|
|
||||||
|
|
||||||
final: prev: {
|
|
||||||
calibre-web = prev.calibre-web.overrideAttrs (old: {
|
|
||||||
patches = (old.patches or [ ]) ++ [ ./calibre-web-cloudflare.patch ];
|
|
||||||
});
|
|
||||||
}
|
|
Loading…
x
Reference in New Issue
Block a user