Commit graph

1710 commits

Author SHA1 Message Date
Bruno BELANYI bf2671a162 home: git: add default ignores 2021-03-03 17:02:48 +00:00
Bruno BELANYI d5ec493b92 home: git: add EPITA identity
Make it conditional on the repositorie's path, as with the Arch
configuration.
2021-03-03 17:02:48 +00:00
Bruno BELANYI 12712f3f77 home: add git 2021-03-03 17:02:48 +00:00
Bruno BELANYI 7e4ae50282 home: zsh: add extra mappings
Once again, old habits die hard...
2021-03-03 17:02:48 +00:00
Bruno BELANYI 3787cf4da1 home: add direnv
This uses nixos-community's version of `use_nix` which allows for
persistent shells, and is now compatible with flakes.
2021-03-03 17:02:48 +00:00
Bruno BELANYI d76b708d19 home: zsh: add asynchronous prompt
And customize it so that it looks like the old one, because change is
*bad*.
2021-03-03 17:02:48 +00:00
Bruno BELANYI d4dd67fab4 home: zsh: put further customization in files
I like the editing experience better when using dedicated files for this
2021-03-03 17:02:48 +00:00
Bruno BELANYI 7c2430bb47 home: zsh: move into its own directory 2021-03-03 17:02:48 +00:00
Bruno BELANYI 91743635fc home: zsh: enable dircolors
This takes care of `LS_COlORS`.
2021-03-03 17:02:48 +00:00
Bruno BELANYI af33c2036e home: zsh: customize completion
Once again, making it closer to my usual setup.
2021-03-03 17:02:48 +00:00
Bruno BELANYI 1daff40891 home: zsh: add more customisation
This will make it closer to my usual shell setup in Arch.
2021-03-03 17:02:48 +00:00
Bruno BELANYI 58ad800e87 home: zsh: use emacs keymap 2021-03-03 17:02:48 +00:00
Bruno BELANYI e92ff24814 home: zsh: store history in XDG_DATA_HOME 2021-03-03 17:02:48 +00:00
Bruno BELANYI 90f2a7f274 home: zsh: add fzf integration 2021-03-03 17:02:48 +00:00
Bruno BELANYI 05c8cbc548 home: add zsh module 2021-03-03 17:02:48 +00:00
Bruno BELANYI 71dcd216f0 modules: users: use zsh as shell 2021-03-03 17:02:48 +00:00
Bruno BELANYI 01b6947cde modules: packages: enable zsh 2021-03-03 17:02:48 +00:00
Bruno BELANYI 28394efc2c machines: porthos: add installation script
This is mostly to reference the installation process when looking back,
rather than explicitly be able re-install this exect configuration.
2021-03-03 17:02:48 +00:00
Bruno BELANYI c0feb8a462 flake: add home-manager 2021-03-03 17:02:48 +00:00
Bruno BELANYI 5e8aac2a5e services: drone: start after DB 2021-03-03 17:02:48 +00:00
Bruno BELANYI b135646c28 machine: porthos: hardware: use disks by label 2021-03-03 17:02:48 +00:00
Bruno BELANYI 8d3d3521f3 flake: refactor host configuration 2021-03-03 17:02:48 +00:00
Bruno BELANYI 0114e7b668 services: calibre-web: backup library 2021-03-03 17:02:48 +00:00
Bruno BELANYI 4e073b8d02 machines: porthos: services: enable Calibre-web 2021-03-03 17:02:48 +00:00
Bruno BELANYI 798f75db12 services: add Calibre-web 2021-03-03 17:02:48 +00:00
Bruno BELANYI 51491b99a9 services: media: refactor logic
This makes it more DRY.
2021-02-25 15:29:07 +00:00
Bruno BELANYI b3aa8d94cb services: gitea: change default port
3000 interferes with the Drone runners, which leads to a race condition
at startup regarding who gets the port.
2021-02-25 15:29:07 +00:00
Bruno BELANYI 53b0e0a1c8 services: wireguard: do not hard-code 'eth0'
Instead make use of the newly introduce `networking.externalInterface`
option.
2021-02-25 15:29:07 +00:00
Bruno BELANYI e74e46a0e6 machines: porthos: networking: set externalInterface 2021-02-25 15:29:06 +00:00
Bruno BELANYI 9e9ef7b598 modules: add 'networking.externalInterface' option 2021-02-25 15:29:06 +00:00
Bruno BELANYI ecded82986 services: wireguard: use 'wg-quick'
Turns out the `wireguard` service isn't meant to be used for VPN-like
workflows (see [1]). and I'll probably have less trouble by using
`wg-quick` instead.

Nice bonus is that instead of having awfully named services running for
each peer, I only need the one service for `wg-quick` itself.

[1]: https://github.com/NixOS/nixpkgs/issues/51258
2021-02-25 15:29:06 +00:00
Bruno BELANYI a4da864981 machines: porthos: enable Wireguard 2021-02-25 15:29:06 +00:00
Bruno BELANYI c912c03668 services: add Wireguard
This allows connecting devices in a mesh as if they were all on the same
private local network.
2021-02-25 15:29:06 +00:00
Bruno BELANYI 2523b764bd secrets: add wireguard peers 2021-02-25 15:29:06 +00:00
Bruno BELANYI 8b069ab820 services: pirate: add Lidarr 2021-02-25 15:29:06 +00:00
Bruno BELANYI 7e5f661914 services: drone: mount 'resolv'-related files
Otherwise the pipelines will have a difficult time resolving
hostnames...
2021-02-25 15:29:06 +00:00
Bruno BELANYI 0482833ee8 services: drone: do not bind '/var/lib/drone' 2021-02-25 15:29:06 +00:00
Bruno BELANYI b972c0bef3 porthos: services: enable 'exec' Drone runner 2021-02-25 15:29:06 +00:00
Bruno BELANYI b0d3cb0e8e modules: move ssh keys into subdirectory 2021-02-25 15:29:06 +00:00
Bruno BELANYI 9992914ea6 project: readme: mention manual Jellyfin config 2021-02-25 15:29:06 +00:00
Bruno BELANYI 7cb208e1ea services: quassel: trust its pgsql connection 2021-02-25 15:29:06 +00:00
Bruno BELANYI a8f9dd9a02 services: quassel: create storage DB 2021-02-25 15:29:06 +00:00
Bruno BELANYI 91be5ad978 porthos: services: enable Miniflux 2021-02-25 15:29:06 +00:00
Bruno BELANYI 2199c1b10c services: add Miniflux 2021-02-25 15:29:06 +00:00
Bruno BELANYI 4423478019 secrets: do not encrypt 'default.nix' 2021-02-25 15:29:06 +00:00
Bruno BELANYI 0732b3a0bd modules: packages: make 'vim' default editor 2021-02-25 15:29:06 +00:00
Bruno BELANYI 340906d6b2 porthos: users: add 'ambroisie' to 'media'
This only done when the groups exists.
2021-02-25 15:29:06 +00:00
Bruno BELANYI 866225393b porthos: move files into 'machines' directory
But keep 'porthos.nix' at the root of the repository. I feel like it is
cleaner to keep device specific files at the root.
2021-02-25 15:29:06 +00:00
Bruno BELANYI f5d0118fab services: transmission: add permissive umask 2021-02-25 15:29:05 +00:00
Bruno BELANYI 69519c45a6 ci: add Drone CI 2021-02-25 15:29:05 +00:00