diff --git a/modules/nixos/bundles/server.nix b/modules/nixos/bundles/server.nix index 235817b..5f3ca48 100644 --- a/modules/nixos/bundles/server.nix +++ b/modules/nixos/bundles/server.nix @@ -17,7 +17,6 @@ in paperless.enable = true; prowlarr.enable = true; radarr.enable = true; - radicale.enable = true; sonarr.enable = true; syncthing.enable = true; qbittorrent.enable = true; diff --git a/modules/nixos/features/homepage-dashboard.nix b/modules/nixos/features/homepage-dashboard.nix index a531e73..5fd9b2f 100644 --- a/modules/nixos/features/homepage-dashboard.nix +++ b/modules/nixos/features/homepage-dashboard.nix @@ -183,13 +183,6 @@ in "href" = "https://ntfy-sh.fi33.buzz/"; }; } - { - "Radicale" = { - "description" = "CalDAV/CardDav sync server"; - "icon" = "radicale.svg"; - "href" = "https://radicale.fi33.buzz/"; - }; - } { "Syncthing" = { "description" = "Decentralised file synchronisation"; diff --git a/modules/nixos/features/nixvim.nix b/modules/nixos/features/nixvim.nix index 862d6f6..b9b9e5f 100644 --- a/modules/nixos/features/nixvim.nix +++ b/modules/nixos/features/nixvim.nix @@ -33,6 +33,7 @@ in relativenumber = true; shiftwidth = 2; tabstop = 2; + colorcolumn = "80"; }; plugins = { # autoclose brackets @@ -77,6 +78,10 @@ in installCargo = true; installRustc = true; }; + hls = { + enable = true; + installGhc = true; + }; }; }; lsp-format.enable = true; diff --git a/modules/nixos/features/radicale.nix b/modules/nixos/features/radicale.nix deleted file mode 100644 index 34ff35f..0000000 --- a/modules/nixos/features/radicale.nix +++ /dev/null @@ -1,50 +0,0 @@ -{ config, lib, ... }: -let - feature = "radicale"; - port = "5003"; -in -{ - config = lib.mkIf config.${feature}.enable { - services = { - # service - radicale = { - enable = true; - settings = { - server = { - hosts = [ - "0.0.0.0:${port}" - "[::]:${port}" - ]; - }; - auth = { - type = "htpasswd"; - htpasswd_filename = config.age.secrets."radicale".path; - htpasswd_encryption = "plain"; - }; - storage = { - filesystem_folder = "/srv/radicale"; - }; - }; - }; - - # reverse proxy - nginx = { - virtualHosts."${feature}.fi33.buzz" = { - forceSSL = true; - useACMEHost = "fi33.buzz"; - locations."/" = { - proxyPass = "http://localhost:${port}"; - # proxyWebsockets = true; - }; - }; - }; - }; - - age.secrets."radicale" = { - file = ../../../secrets/radicale.age; - owner = "radicale"; - }; - }; - - options.${feature}.enable = lib.mkEnableOption "enables ${feature}"; -}