summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2022-03-14remove vim plug thingBen Sima
2022-03-14switch vim colors bc the package is broken on nixpkgsBen Sima
2022-03-14update nixpkgs versionBen Sima
2022-03-11tmux: better status lineBen Sima
2022-03-09add vim-fugitive and disable color theme for vimdiff usageBen Sima
2022-03-05add pvBen Sima
2022-03-05add gajimBen Sima
2022-03-05add barrierBen Sima
2022-02-18updatesBen Sima
2022-02-11back to fzf-down, it works betterBen Sima
2022-02-11allow insecure electron (don't know why i need it but w/e)Ben Sima
2022-02-10add ctrl-space command pallet thingBen Sima
2022-02-10fix showpathBen Sima
2022-02-09ssh: rename groq -> bsimaBen Sima
2022-02-09fix ssh: groq -> simatimeBen Sima
2022-02-09ssh: disable strict host key checking lineBen Sima
2022-02-09ImprovementsBen Sima
- using fzf-tmux wherever i can now - some more fzf integration tweaks - added some rofi plugins, idk if they work tho - fixed the polybar sound widget - added autorandr config, it mostly(?) works - added nix-direnv support by default
2022-02-04Disable keybase, it OOMed last night and killed my sessionBen Sima
2022-02-04Add org-contrib backBen Sima
2022-02-01lock when yubikey is removedBen Sima
Took me forever but I figured out how to use udev rules to give xautolock permission to see the yubi when unlocking. Also triggers a systemd service that locks the screen when yubi is removed. I couldn't do this directly in a udev RUN becaues udev sucks at running programs as different users and with environment variables and such. This is still a bit buggy, I seem to consistently need to authenticate twice when unlocking, but I think that would be fixed if I get rid of the serviceConfig.User thing with some fancy scripting. And as a backup, added Super+Shift+L for manual locking.
2022-02-01once again im updating emacs package namesBen Sima
2022-01-31yubikey login on heliumBen Sima
This allows me to login and sudo with *either* a password or my yubikey. I also had to setup my yubikey with the instructions here: https://nixos.wiki/wiki/Yubikey#Logging-in Basically use ykman and ykpamcfg to generate a challenge-response setup on slot 2 of my yubikey. The pam config compares the key response with the ~/.yubico/challenge-* file in order to authenticate. I think pam uses the ~/.yubico/authorized_keys file to know to which yubikey to send the challenge, but I'm not sure on that one.
2022-01-26disable gpg-refresh - doesnt workBen Sima
2022-01-26remove .hm-xsession thingBen Sima
2022-01-26add some packagesBen Sima
2022-01-05fix links on gwern.netBen Sima
2022-01-05Disable amforaBen Sima
2022-01-05disable LC_ALLBen Sima
2021-12-21git commit verbose by defaultBen Sima
2021-12-21Remove git show signature configBen Sima
2021-12-16add obsidian, common, emacs to laptopBen Sima
2021-12-16add howdoi and tutBen Sima
2021-12-16add zulip-termBen Sima
2021-12-16add fzf-vimBen Sima
2021-11-30disable random-background, and change monitor againBen Sima
2021-11-30add some packages, and sortBen Sima
2021-11-29Commenting sft thing bc it breaks stuffBen Sima
2021-11-04add org-drillBen Sima
2021-11-01extract programs.{ssh,emacs}Ben Sima
2021-11-01add sft configBen Sima
2021-10-14Add cmatrixBen Sima
2021-10-14get minimal mutt workingBen Sima
2021-10-14Cooler bash promptBen Sima
2021-10-14Add tmux fzf pluginBen Sima
2021-09-15update install, clean some packagesBen Sima
2021-08-31remove terminus (unmaintained)Ben Sima
2021-07-20add stgitBen Sima
2021-07-20git scripts: no-show-signatureBen Sima
2021-05-29remove get-calendars serviceBen Sima
2021-05-22Add dswitcher and cleanup xmonad a bitBen Sima