mirror of
https://github.com/nmasur/dotfiles
synced 2025-04-23 19:12:23 +00:00
Compare commits
3 Commits
6cd22bc7ce
...
251dce68bb
Author | SHA1 | Date | |
---|---|---|---|
|
251dce68bb | ||
|
448c97665b | ||
|
86aa02aae4 |
14
README.md
14
README.md
@ -63,7 +63,7 @@ the WSL configuration:
|
|||||||
|
|
||||||
```
|
```
|
||||||
nix-shell -p nixVersions.stable
|
nix-shell -p nixVersions.stable
|
||||||
sudo nixos-rebuild switch --flake github:nmasur/dotfiles#wsl
|
sudo nixos-rebuild switch --flake github:nmasur/dotfiles#flame
|
||||||
```
|
```
|
||||||
|
|
||||||
You should also download the
|
You should also download the
|
||||||
@ -90,17 +90,7 @@ nix-build https://github.com/LnL7/nix-darwin/archive/master.tar.gz -A installer
|
|||||||
Then switch to the macOS configuration:
|
Then switch to the macOS configuration:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
darwin-rebuild switch --flake github:nmasur/dotfiles#macbook
|
darwin-rebuild switch --flake github:nmasur/dotfiles#lookingglass
|
||||||
```
|
|
||||||
|
|
||||||
### Dealing with corporate MITM SSL certificates:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Get the certificates
|
|
||||||
openssl s_client -showcerts -verify 5 -connect cache.nixos.org:443 < /dev/null
|
|
||||||
|
|
||||||
# Paste them in here
|
|
||||||
sudo nvim $NIX_SSL_CERT_FILE
|
|
||||||
```
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
tmpfile=$(mktemp)
|
tmpfile=$(mktemp)
|
||||||
echo "''${secret}" > ''${tmpfile}
|
echo "''${secret}" > ''${tmpfile}
|
||||||
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
||||||
builtins.toString ../hosts/public-keys
|
builtins.toString ../public-keys
|
||||||
} $tmpfile
|
} $tmpfile
|
||||||
rm $tmpfile
|
rm $tmpfile
|
||||||
'');
|
'');
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
--identity ~/.ssh/id_ed25519 $encryptedfile > $tmpfile
|
--identity ~/.ssh/id_ed25519 $encryptedfile > $tmpfile
|
||||||
echo "Encrypting ''${encryptedfile}..."
|
echo "Encrypting ''${encryptedfile}..."
|
||||||
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
${pkgs.age}/bin/age --encrypt --armor --recipients-file ${
|
||||||
builtins.toString ../hosts/public-keys
|
builtins.toString ../public-keys
|
||||||
} $tmpfile > $encryptedfile
|
} $tmpfile > $encryptedfile
|
||||||
rm $tmpfile
|
rm $tmpfile
|
||||||
done
|
done
|
||||||
|
@ -112,7 +112,8 @@
|
|||||||
overlays = [
|
overlays = [
|
||||||
inputs.nur.overlay
|
inputs.nur.overlay
|
||||||
inputs.nix2vim.overlay
|
inputs.nix2vim.overlay
|
||||||
(import ./modules/neovim/plugins-overlay.nix inputs)
|
(import ./overlays/neovim-plugins.nix inputs)
|
||||||
|
(import ./overlays/calibre-web.nix)
|
||||||
];
|
];
|
||||||
|
|
||||||
# System types to support.
|
# System types to support.
|
||||||
|
@ -20,16 +20,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Fix: https://github.com/janeczku/calibre-web/issues/2422
|
|
||||||
nixpkgs.overlays = [
|
|
||||||
(final: prev: {
|
|
||||||
calibre-web = prev.calibre-web.overrideAttrs (old: {
|
|
||||||
patches = (old.patches or [ ])
|
|
||||||
++ [ ../../patches/calibre-web-cloudflare.patch ];
|
|
||||||
});
|
|
||||||
})
|
|
||||||
];
|
|
||||||
|
|
||||||
caddy.routes = [{
|
caddy.routes = [{
|
||||||
match = [{ host = [ config.bookServer ]; }];
|
match = [{ host = [ config.bookServer ]; }];
|
||||||
handle = [{
|
handle = [{
|
||||||
|
7
overlays/calibre-web.nix
Normal file
7
overlays/calibre-web.nix
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Fix: https://github.com/janeczku/calibre-web/issues/2422
|
||||||
|
|
||||||
|
final: prev: {
|
||||||
|
calibre-web = prev.calibre-web.overrideAttrs (old: {
|
||||||
|
patches = (old.patches or [ ]) ++ [ ./calibre-web-cloudflare.patch ];
|
||||||
|
});
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user