Skip to content

Commit

Permalink
Deploying to template from @ 87b31e6 🚀
Browse files Browse the repository at this point in the history
  • Loading branch information
dmadisetti committed Oct 22, 2023
1 parent ab2effc commit 98123c7
Show file tree
Hide file tree
Showing 6 changed files with 19 additions and 19 deletions.
2 changes: 1 addition & 1 deletion dot/vim/plugins.vim
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ Plug 'cybrown-zoox/vim-pbtxt'
Plug 'dag/vim-fish', {'for': 'fish'}

" Why no %
Plug 'chrisbra/matchit' ", {'for': ['fish', 'bash', 'shell', 'zsh']}
" Plug 'chrisbra/matchit' ", {'for': ['fish', 'bash', 'shell', 'zsh']}

" Sure, why not
" Plug 'neoclide/coc.nvim', {'branch': 'release'}
Expand Down
28 changes: 14 additions & 14 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion flake.nix
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@
grub2-themes.inputs.nixpkgs.follows = "nixpkgs";

# Hyprland is **such** eye candy
hyprland.url = github:hyprwm/Hyprland/v0.30.0;
hyprland.url = github:hyprwm/Hyprland/v0.31.0;
hyprland.inputs.nixpkgs.follows = "nixpkgs";
hyprland.inputs.systems.follows = "systems";

Expand Down
2 changes: 1 addition & 1 deletion nix/common/getty.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
pkgs_rev = self.inputs.nixpkgs.shortRev or "dirty";
dots_rev = self.shortRev or "dirty";
in
lib.mkForce ''${sensitive.lib.getty pkgs_rev dots_rev}
lib.mkForce ''${if (sensitive.lib ? getty) then (sensitive.lib.getty pkgs_rev dots_rev) else ""}
Run 'dots-help' or 'nixos-help' for more information.'';
}
3 changes: 2 additions & 1 deletion nix/common/harden.nix
Original file line number Diff line number Diff line change
Expand Up @@ -31,5 +31,6 @@
sudo.u2fAuth = true;
};

security.pki.certificateFiles = lib.catAttrs "cert" (lib.attrValues sensitive.lib.certificates);
security.pki.certificateFiles = (if (sensitive.lib ? "certificates") then
(lib.catAttrs "cert" (lib.attrValues sensitive.lib.certificates)) else []);
}
1 change: 0 additions & 1 deletion nix/machines/gce.nix
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,6 @@ rec {
users.users."${user}".initialHashedPassword = sensitive.lib.hashed;
environment.sessionVariables = { IS_GCE = "1"; };


# Great idea from cole-h/nixos-config, meaning we don't have to provide root
# to anyone, and can deploy remotely.
security.sudo.extraRules = [
Expand Down

0 comments on commit 98123c7

Please sign in to comment.