dev: cleanup unused stuff
This commit is contained in:
parent
5c336ecfa6
commit
7df09ad64a
@ -1,69 +0,0 @@
|
||||
-- This is the configuration file for the 'cabal' command line tool.
|
||||
|
||||
-- The available configuration options are listed below.
|
||||
-- Some of them have default values listed.
|
||||
|
||||
-- Lines (like this one) beginning with '--' are comments.
|
||||
-- Be careful with spaces and indentation because they are
|
||||
-- used to indicate layout for nested sections.
|
||||
|
||||
|
||||
remote-repo: hackage.haskell.org:http://hackage.haskell.org/packages/archive
|
||||
remote-repo-cache: /Users/jwall/.cabal/packages
|
||||
-- local-repo:
|
||||
-- verbose: 1
|
||||
-- compiler: ghc
|
||||
-- with-compiler:
|
||||
-- with-hc-pkg:
|
||||
-- scratchdir:
|
||||
-- program-prefix:
|
||||
-- program-suffix:
|
||||
-- library-vanilla: True
|
||||
-- library-profiling: True
|
||||
-- shared: False
|
||||
-- executable-profiling: True
|
||||
-- optimization: True
|
||||
-- library-for-ghci: True
|
||||
-- split-objs: False
|
||||
-- executable-stripping: True
|
||||
-- user-install: True
|
||||
-- package-db:
|
||||
-- flags:
|
||||
-- extra-include-dirs:
|
||||
-- extra-lib-dirs:
|
||||
-- constraint:
|
||||
-- cabal-lib-version:
|
||||
-- preference:
|
||||
-- documentation: False
|
||||
-- doc-index-file: $datadir/doc/index.html
|
||||
-- root-cmd:
|
||||
-- symlink-bindir:
|
||||
build-summary: /Users/jwall/.cabal/logs/build.log
|
||||
-- build-log:
|
||||
remote-build-reporting: anonymous
|
||||
-- username:
|
||||
-- password:
|
||||
|
||||
install-dirs user
|
||||
-- prefix: /Users/jwall/.cabal
|
||||
-- bindir: $prefix/bin
|
||||
-- libdir: $prefix/lib
|
||||
-- libsubdir: $pkgid/$compiler
|
||||
-- libexecdir: $prefix/libexec
|
||||
-- datadir: $prefix/share
|
||||
-- datasubdir: $pkgid
|
||||
-- docdir: $datadir/doc/$pkgid
|
||||
-- htmldir: $docdir/html
|
||||
-- haddockdir: $htmldir
|
||||
|
||||
install-dirs global
|
||||
-- prefix: /usr/local
|
||||
-- bindir: $prefix/bin
|
||||
-- libdir: $prefix/lib
|
||||
-- libsubdir: $pkgid/$compiler
|
||||
-- libexecdir: $prefix/libexec
|
||||
-- datadir: $prefix/share
|
||||
-- datasubdir: $pkgid
|
||||
-- docdir: $datadir/doc/$pkgid
|
||||
-- htmldir: $docdir/html
|
||||
-- haddockdir: $htmldir
|
12
.screenrc
12
.screenrc
@ -1,12 +0,0 @@
|
||||
startup_message off
|
||||
defscrollback 5000
|
||||
termcapinfo xterm ti@:te@
|
||||
termcapinfo xterm-color ti@:te@
|
||||
hardstatus alwayslastline
|
||||
hardstatus string '%{= kG}[ %{G}%H %{g}][%= %{= kw}%?%-Lw%?%{r}(%{W}%n*%f%t%?(%u)%?%{r})%{w}%?%+Lw%?%?%= %{g}][%{B} %m/%d/%Y %{W}%c %{g}]'
|
||||
vbell off
|
||||
shell /bin/bash
|
||||
logtstamp on
|
||||
logtstamp after 1
|
||||
logfile flush
|
||||
term screen-256color
|
Binary file not shown.
@ -1,47 +0,0 @@
|
||||
import Control.Monad
|
||||
|
||||
import XMonad
|
||||
import XMonad.Hooks.DynamicLog
|
||||
import XMonad.Hooks.ManageDocks
|
||||
import XMonad.Layout
|
||||
import XMonad.Layout.Column
|
||||
import XMonad.Layout.LayoutBuilder
|
||||
import XMonad.Config.Desktop
|
||||
import XMonad.Hooks.SetWMName
|
||||
import qualified XMonad.StackSet as W
|
||||
import XMonad.Util.EZConfig
|
||||
import XMonad.Util.Run(spawnPipe)
|
||||
|
||||
import System.IO
|
||||
|
||||
mkLayout n = layoutN n mainBox (Just overFlowBox) layout overflowLayout
|
||||
where
|
||||
mainHeight = 0.75 -- Main window height
|
||||
mainWidth = 0.68 -- Main window width
|
||||
row = Mirror $ Column 1 -- a row of windows
|
||||
layout = Tall 1 0.03 mainWidth -- Top row layout
|
||||
overflowLayout = layoutAll (relBox 0 mainHeight 1 1) row -- bottom row layout
|
||||
mainBox = relBox 0 0 1 mainHeight -- Main box
|
||||
overFlowBox = relBox 0 0 1 1 -- Bottom row
|
||||
|
||||
myLayout = ((mkLayout 2) ||| (mkLayout 1)) ||| Full
|
||||
|
||||
myGmRunCommand = "gmrun 'rxvt'"
|
||||
|
||||
main = do
|
||||
xmproc <- spawnPipe "xmobar"
|
||||
xmonad $ desktopConfig {
|
||||
terminal = "/usr/bin/rxvt"
|
||||
, focusFollowsMouse = False
|
||||
, layoutHook = avoidStruts myLayout
|
||||
, logHook = dynamicLogWithPP $ xmobarPP
|
||||
{ ppLayout = xmobarColor "grey" "black" . (\ x -> pad "")
|
||||
, ppOutput = hPutStrLn xmproc
|
||||
}
|
||||
, workspaces = ["code", "communication", "random", "configuration"]
|
||||
} `additionalKeys` [
|
||||
((mod1Mask, xK_w), kill)
|
||||
, ((controlMask .|. mod1Mask, xK_Delete), spawn "gnome-screensaver-command --lock")
|
||||
, ((mod1Mask .|. shiftMask, xK_p), spawn myGmRunCommand) -- %! Launch gmrun
|
||||
, ((mod1Mask , xK_p), spawn myGmRunCommand) -- %! Launch gmrun
|
||||
]
|
122
.yi/yi.hs
122
.yi/yi.hs
@ -1,122 +0,0 @@
|
||||
-- |
|
||||
-- Author : jeremy@marzhillstudios.com
|
||||
|
||||
-- Parts of this config were stolen from/inspired by
|
||||
-- yi/yi-contrib/src/Yi/Config/Michal.hs.
|
||||
|
||||
import Yi
|
||||
import qualified Yi.Keymap.Vim as Vim
|
||||
import qualified Yi.Keymap.Vim.Common as Vim
|
||||
import qualified Yi.Keymap.Vim.Utils as Vim
|
||||
import Yi.Keymap.Keys
|
||||
import Yi.Modes
|
||||
import Yi.Style
|
||||
import Yi.Style.Library
|
||||
import Yi.Config.Default (availableFrontends)
|
||||
import Yi.Config.Misc
|
||||
|
||||
import Data.Monoid
|
||||
|
||||
-- TODO(jwall): :<num> navigation
|
||||
-- TODO(jwall): handle file updates: checktime functionality
|
||||
-- TODO(jwall): Visual Mode is broken?
|
||||
|
||||
-- default color specifications
|
||||
fgColor = brightwhite
|
||||
bgColor = black
|
||||
bgSelectedColor = lightGrey
|
||||
|
||||
builtinColor = magenta
|
||||
commentColor = darkcyan
|
||||
typeColor = darkgreen
|
||||
keywordColor = yellow
|
||||
quoteColor = magenta
|
||||
|
||||
-- extended vim keymap
|
||||
myKeymap :: KeymapSet
|
||||
myKeymap = Vim.mkKeymapSet $ Vim.defVimConfig `override` \super self ->
|
||||
let eval = Vim.pureEval self
|
||||
in super {
|
||||
-- put our custom bindings first so they override default bindings
|
||||
Vim.vimBindings = myBindings eval <> Vim.vimBindings super
|
||||
}
|
||||
|
||||
-- custom keybindings
|
||||
myBindings :: (Vim.EventString -> EditorM ()) -> [Vim.VimBinding]
|
||||
myBindings eval =
|
||||
let nmap x y = Vim.mkStringBindingE Vim.Normal Vim.Drop (x, y, id)
|
||||
imap x y = Vim.VimBindingE (\evs state -> case Vim.vsMode state of
|
||||
Vim.Insert _ ->
|
||||
fmap (const (y >> return Vim.Continue))
|
||||
(evs `Vim.matchesString` x)
|
||||
_ -> Vim.NoMatch)
|
||||
nmap' x y = Vim.mkStringBindingY Vim.Normal (x, y, id)
|
||||
in [
|
||||
-- custom bindings here
|
||||
]
|
||||
|
||||
-- GUI enhanced colors
|
||||
guiBgColor = RGB 20 20 20
|
||||
|
||||
defaultVimTermTheme :: Theme
|
||||
defaultVimTermTheme = defaultTheme `override` \super self -> super {
|
||||
modelineAttributes = emptyAttributes {foreground = white,
|
||||
background = grey},
|
||||
modelineFocusStyle = withBg grey `mappend` withFg fgColor,
|
||||
baseAttributes = emptyAttributes { foreground = fgColor,
|
||||
background = bgColor},
|
||||
builtinStyle = withFg builtinColor,
|
||||
commentStyle = withFg commentColor,
|
||||
typeStyle = withFg typeColor,
|
||||
importStyle = withFg keywordColor,
|
||||
selectedStyle = withBg bgSelectedColor,
|
||||
stringStyle = withFg quoteColor,
|
||||
keywordStyle = withFg green
|
||||
}
|
||||
|
||||
defaultVimGuiTheme :: Theme
|
||||
defaultVimGuiTheme = defaultVimTermTheme `override` \super self -> super {
|
||||
baseAttributes = emptyAttributes { foreground = fgColor,
|
||||
background = guiBgColor}
|
||||
}
|
||||
|
||||
-- global indent preferences
|
||||
prefIndent :: Mode s -> Mode s
|
||||
prefIndent m = m {
|
||||
modeIndentSettings = IndentSettings
|
||||
{
|
||||
expandTabs = True
|
||||
, shiftWidth = 2
|
||||
, tabSize = 2
|
||||
}
|
||||
}
|
||||
|
||||
myDefaultUI = configUI defaultVimConfig
|
||||
|
||||
myConfigDefaultUI :: UIConfig
|
||||
myConfigDefaultUI = myDefaultUI {
|
||||
configFontSize = Just 9
|
||||
, configTheme = defaultVimGuiTheme
|
||||
, configWindowFill = '~'
|
||||
}
|
||||
|
||||
myConfigTermUI :: UIConfig -- reuse the above defaults here
|
||||
myConfigTermUI = myConfigDefaultUI {
|
||||
configTheme = defaultVimTermTheme
|
||||
}
|
||||
|
||||
myDefaultConfig = defaultVimConfig {
|
||||
configUI = myConfigDefaultUI
|
||||
, defaultKm = myKeymap
|
||||
, modeTable = fmap (onMode prefIndent) (modeTable defaultVimConfig)
|
||||
}
|
||||
|
||||
myConfig =
|
||||
case availableFrontends of
|
||||
(("vty", f):_) -> myDefaultConfig {
|
||||
configUI = myConfigTermUI
|
||||
}
|
||||
((_, f):_) -> myDefaultConfig
|
||||
|
||||
main :: IO ()
|
||||
main = yi myConfig
|
@ -1,283 +0,0 @@
|
||||
---
|
||||
version: "3.5"
|
||||
|
||||
networks:
|
||||
penpot:
|
||||
|
||||
volumes:
|
||||
penpot_postgres_v15:
|
||||
penpot_assets:
|
||||
# penpot_traefik:
|
||||
# penpot_minio:
|
||||
|
||||
services:
|
||||
## Traefik service declaration example. Consider using it if you are going to expose
|
||||
## penpot to the internet or different host than `localhost`.
|
||||
|
||||
# traefik:
|
||||
# image: traefik:v2.9
|
||||
# networks:
|
||||
# - penpot
|
||||
# command:
|
||||
# - "--api.insecure=true"
|
||||
# - "--entryPoints.web.address=:80"
|
||||
# - "--providers.docker=true"
|
||||
# - "--providers.docker.exposedbydefault=false"
|
||||
# - "--entryPoints.websecure.address=:443"
|
||||
# - "--certificatesresolvers.letsencrypt.acme.tlschallenge=true"
|
||||
# - "--certificatesresolvers.letsencrypt.acme.email=<EMAIL_ADDRESS>"
|
||||
# - "--certificatesresolvers.letsencrypt.acme.storage=/traefik/acme.json"
|
||||
# volumes:
|
||||
# - "penpot_traefik:/traefik"
|
||||
# - "/var/run/docker.sock:/var/run/docker.sock"
|
||||
# ports:
|
||||
# - "80:80"
|
||||
# - "443:443"
|
||||
|
||||
penpot-frontend:
|
||||
image: "penpotapp/frontend:latest"
|
||||
ports:
|
||||
- 9001:80
|
||||
|
||||
volumes:
|
||||
- penpot_assets:/opt/data/assets
|
||||
|
||||
depends_on:
|
||||
- penpot-backend
|
||||
- penpot-exporter
|
||||
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
labels:
|
||||
- "traefik.enable=true"
|
||||
|
||||
## HTTP: example of labels for the case if you are going to expose penpot to the
|
||||
## internet using only HTTP (without HTTPS) with traefik
|
||||
|
||||
# - "traefik.http.routers.penpot-http.entrypoints=web"
|
||||
# - "traefik.http.routers.penpot-http.rule=Host(`<DOMAIN_NAME>`)"
|
||||
# - "traefik.http.services.penpot-http.loadbalancer.server.port=80"
|
||||
|
||||
## HTTPS: example of labels for the case if you are going to expose penpot to the
|
||||
## internet using with HTTPS using traefik
|
||||
|
||||
# - "traefik.http.middlewares.http-redirect.redirectscheme.scheme=https"
|
||||
# - "traefik.http.middlewares.http-redirect.redirectscheme.permanent=true"
|
||||
# - "traefik.http.routers.penpot-http.entrypoints=web"
|
||||
# - "traefik.http.routers.penpot-http.rule=Host(`<DOMAIN_NAME>`)"
|
||||
# - "traefik.http.routers.penpot-http.middlewares=http-redirect"
|
||||
# - "traefik.http.routers.penpot-https.entrypoints=websecure"
|
||||
# - "traefik.http.routers.penpot-https.rule=Host(`<DOMAIN_NAME>`)"
|
||||
# - "traefik.http.services.penpot-https.loadbalancer.server.port=80"
|
||||
# - "traefik.http.routers.penpot-https.tls=true"
|
||||
# - "traefik.http.routers.penpot-https.tls.certresolver=letsencrypt"
|
||||
|
||||
## Configuration envronment variables for frontend the container. In this case this
|
||||
## container only needs the `PENPOT_FLAGS`. This environment variable is shared with
|
||||
## other services but not all flags are relevant to all services.
|
||||
|
||||
environment:
|
||||
## Relevant flags for frontend:
|
||||
## - demo-users
|
||||
## - login-with-github
|
||||
## - login-with-gitlab
|
||||
## - login-with-google
|
||||
## - login-with-ldap
|
||||
## - login-with-oidc
|
||||
## - login-with-password
|
||||
## - registration
|
||||
## - webhooks
|
||||
##
|
||||
## You can read more about all available flags on:
|
||||
## https://help.penpot.app/technical-guide/configuration/#advanced-configuration
|
||||
|
||||
- PENPOT_FLAGS=enable-registration enable-login-with-password
|
||||
|
||||
penpot-backend:
|
||||
image: "penpotapp/backend:latest"
|
||||
volumes:
|
||||
- penpot_assets:/opt/penpot/assets
|
||||
|
||||
depends_on:
|
||||
- penpot-postgres
|
||||
- penpot-redis
|
||||
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
## Configuration envronment variables for backend the
|
||||
## container.
|
||||
|
||||
environment:
|
||||
|
||||
## Relevant flags for backend:
|
||||
## - demo-users
|
||||
## - email-verification
|
||||
## - log-emails
|
||||
## - log-invitation-tokens
|
||||
## - login-with-github
|
||||
## - login-with-gitlab
|
||||
## - login-with-google
|
||||
## - login-with-ldap
|
||||
## - login-with-oidc
|
||||
## - login-with-password
|
||||
## - registration
|
||||
## - secure-session-cookies
|
||||
## - smtp
|
||||
## - smtp-debug
|
||||
## - telemetry
|
||||
## - webhooks
|
||||
## - prepl-server
|
||||
##
|
||||
## You can read more about all available flags and other
|
||||
## environment variables for the backend here:
|
||||
## https://help.penpot.app/technical-guide/configuration/#advanced-configuration
|
||||
|
||||
- PENPOT_FLAGS=enable-registration enable-login-with-password disable-email-verification enable-smtp enable-prepl-server
|
||||
|
||||
## Penpot SECRET KEY. It serves as a master key from which other keys for subsystems
|
||||
## (eg http sessions) are derived.
|
||||
##
|
||||
## Leave it comment if it is ok for you to have to login again after each backend
|
||||
## restart.
|
||||
##
|
||||
## If you going to uncomment this, we recommend use here a trully randomly generated
|
||||
## 512 bits base64 encoded string. You can generate one with:
|
||||
##
|
||||
## python3 -c "import secrets; print(secrets.token_urlsafe(64))"
|
||||
|
||||
# - PENPOT_SECRET_KEY=my-insecure-key
|
||||
|
||||
## The PREPL host. Mainly used for external programatic access to penpot backend
|
||||
## (example: admin). By default it listen on `localhost` but if you are going to use
|
||||
## the `admin`, you will need to uncomment this and set the host to `0.0.0.0`.
|
||||
|
||||
# - PENPOT_PREPL_HOST=0.0.0.0
|
||||
|
||||
## Public URI. If you are going to expose this instance to the internet and use it
|
||||
## under different domain than 'localhost', you will need to adjust it to the final
|
||||
## domain.
|
||||
##
|
||||
## Consider using traefik and set the 'disable-secure-session-cookies' if you are
|
||||
## not going to serve penpot under HTTPS.
|
||||
|
||||
- PENPOT_PUBLIC_URI=http://localhost:9001
|
||||
|
||||
## Database connection parameters. Don't touch them unless you are using custom
|
||||
## postgresql connection parameters.
|
||||
|
||||
- PENPOT_DATABASE_URI=postgresql://penpot-postgres/penpot
|
||||
- PENPOT_DATABASE_USERNAME=penpot
|
||||
- PENPOT_DATABASE_PASSWORD=penpot
|
||||
|
||||
## Redis is used for the websockets notifications. Don't touch unless the redis
|
||||
## container has different parameters or different name.
|
||||
|
||||
- PENPOT_REDIS_URI=redis://penpot-redis/0
|
||||
|
||||
## Default configuration for assets storage: using filesystem based with all files
|
||||
## stored in a docker volume.
|
||||
|
||||
- PENPOT_ASSETS_STORAGE_BACKEND=assets-fs
|
||||
- PENPOT_STORAGE_ASSETS_FS_DIRECTORY=/opt/data/assets
|
||||
|
||||
## Also can be configured to to use a S3 compatible storage
|
||||
## service like MiniIO. Look below for minio service setup.
|
||||
|
||||
# - AWS_ACCESS_KEY_ID=<KEY_ID>
|
||||
# - AWS_SECRET_ACCESS_KEY=<ACCESS_KEY>
|
||||
# - PENPOT_ASSETS_STORAGE_BACKEND=assets-s3
|
||||
# - PENPOT_STORAGE_ASSETS_S3_ENDPOINT=http://penpot-minio:9000
|
||||
# - PENPOT_STORAGE_ASSETS_S3_BUCKET=<BUKET_NAME>
|
||||
|
||||
## Telemetry. When enabled, a periodical process will send anonymous data about this
|
||||
## instance. Telemetry data will enable us to learn on how the application is used,
|
||||
## based on real scenarios. If you want to help us, please leave it enabled. You can
|
||||
## audit what data we send with the code available on github
|
||||
|
||||
- PENPOT_TELEMETRY_ENABLED=true
|
||||
|
||||
## Example SMTP/Email configuration. By default, emails are sent to the mailcatch
|
||||
## service, but for production usage is recommended to setup a real SMTP
|
||||
## provider. Emails are used to confirm user registrations & invitations. Look below
|
||||
## how mailcatch service is configured.
|
||||
|
||||
- PENPOT_SMTP_DEFAULT_FROM=no-reply@example.com
|
||||
- PENPOT_SMTP_DEFAULT_REPLY_TO=no-reply@example.com
|
||||
- PENPOT_SMTP_HOST=penpot-mailcatch
|
||||
- PENPOT_SMTP_PORT=1025
|
||||
- PENPOT_SMTP_USERNAME=
|
||||
- PENPOT_SMTP_PASSWORD=
|
||||
- PENPOT_SMTP_TLS=false
|
||||
- PENPOT_SMTP_SSL=false
|
||||
|
||||
penpot-exporter:
|
||||
image: "penpotapp/exporter:latest"
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
environment:
|
||||
# Don't touch it; this uses internal docker network to
|
||||
# communicate with the frontend.
|
||||
- PENPOT_PUBLIC_URI=http://penpot-frontend
|
||||
|
||||
## Redis is used for the websockets notifications.
|
||||
- PENPOT_REDIS_URI=redis://penpot-redis/0
|
||||
|
||||
penpot-postgres:
|
||||
image: "postgres:15"
|
||||
restart: always
|
||||
stop_signal: SIGINT
|
||||
|
||||
volumes:
|
||||
- penpot_postgres_v15:/var/lib/postgresql/data
|
||||
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
environment:
|
||||
- POSTGRES_INITDB_ARGS=--data-checksums
|
||||
- POSTGRES_DB=penpot
|
||||
- POSTGRES_USER=penpot
|
||||
- POSTGRES_PASSWORD=penpot
|
||||
|
||||
penpot-redis:
|
||||
image: redis:7
|
||||
restart: always
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
## A mailcatch service, used as temporal SMTP server. You can access via HTTP to the
|
||||
## port 1080 for read all emails the penpot platform has sent. Should be only used as a
|
||||
## temporal solution meanwhile you don't have a real SMTP provider configured.
|
||||
|
||||
penpot-mailcatch:
|
||||
image: sj26/mailcatcher:latest
|
||||
restart: always
|
||||
expose:
|
||||
- '1025'
|
||||
ports:
|
||||
- "1080:1080"
|
||||
networks:
|
||||
- penpot
|
||||
|
||||
## Example configuration of MiniIO (S3 compatible object storage service); If you don't
|
||||
## have preference, then just use filesystem, this is here just for the completeness.
|
||||
|
||||
# minio:
|
||||
# image: "minio/minio:latest"
|
||||
# command: minio server /mnt/data --console-address ":9001"
|
||||
#
|
||||
# volumes:
|
||||
# - "penpot_minio:/mnt/data"
|
||||
#
|
||||
# environment:
|
||||
# - MINIO_ROOT_USER=minioadmin
|
||||
# - MINIO_ROOT_PASSWORD=minioadmin
|
||||
#
|
||||
# ports:
|
||||
# - 9000:9000
|
||||
# - 9001:9001
|
||||
|
||||
|
@ -334,7 +334,6 @@ in
|
||||
};
|
||||
};
|
||||
|
||||
# TODO launchd.user.agents.prometheus;
|
||||
# Use a custom configuration.nix location.
|
||||
# $ darwin-rebuild switch -I darwin-config=$HOME/.config/nixpkgs/darwin/configuration.nix
|
||||
# environment.darwinConfig = "$HOME/.config/nixpkgs/darwin/configuration.nix";
|
||||
|
Loading…
x
Reference in New Issue
Block a user