Compare commits

...

815 Commits

Author SHA1 Message Date
soraefir
94a27bb403 fix ssl ? 2026-05-15 16:37:40 +02:00
soraefir
1d656dc4ae add db creation 2026-05-15 16:31:14 +02:00
soraefir
b3014bce85 Fix keys 2026-05-15 16:26:27 +02:00
soraefir
ef845edd12 typo 2026-05-15 16:22:52 +02:00
soraefir
c456e4cad8 Fix env config path 2026-05-15 16:19:18 +02:00
soraefir
39b12966f1 Login rule 2026-05-15 16:06:25 +02:00
soraefir
cbef43ae83 missing end 2026-05-15 16:03:34 +02:00
soraefir
765f18d5a0 Add missing func 2026-05-15 16:02:31 +02:00
soraefir
76302840d0 fix typos 2026-05-15 15:59:52 +02:00
soraefir
e02aca85bd fix cr code 2026-05-15 15:55:17 +02:00
soraefir
0378ce7dff fix cr code 2026-05-15 15:51:34 +02:00
soraefir
0fd8286331 type fix 2026-05-15 15:47:30 +02:00
soraefir
e4aac05b6a fix 2026-05-15 15:44:50 +02:00
soraefir
fd7b95e12e Fix 2026-05-15 15:42:49 +02:00
soraefir
a94e8beb37 Fix invidious env 2026-05-15 15:41:37 +02:00
soraefir
3e05dfbc07 Override login page 2026-05-15 14:51:32 +02:00
soraefir
a94574a53d wip 2026-05-15 13:51:23 +02:00
soraefir
03bec133ba fix 2026-05-15 02:46:04 +02:00
soraefir
b6de2d2ccf fix scope 2026-05-15 02:39:27 +02:00
soraefir
334a484ad4 fix scope 2026-05-15 02:35:00 +02:00
soraefir
11f7e95d95 Authentik immich 2026-05-15 02:26:48 +02:00
soraefir
24a0fb6a93 disable IMMICH_IGNORE_MOUNT_CHECK_ERRORS 2026-05-15 02:15:05 +02:00
soraefir
892e271719 Fix typo 2026-05-15 02:12:49 +02:00
soraefir
8769b6da9d Fix immich setup 2026-05-15 02:12:14 +02:00
soraefir
00bdef4307 Fix 2026-05-15 01:31:57 +02:00
soraefir
6ed72c00ff mkdir missings 2026-05-15 01:22:43 +02:00
soraefir
6d5cd82e72 fix 2026-05-15 01:15:59 +02:00
soraefir
3e921ef2ab fix setup 2026-05-15 01:10:34 +02:00
soraefir
09cc16bc40 fix 2026-05-15 00:59:20 +02:00
soraefir
425722e2c6 Disable Setup 2026-05-15 00:55:53 +02:00
soraefir
0fb6aa0047 Fix env 2026-05-15 00:45:59 +02:00
soraefir
07283e1f26 Fix temp 2026-05-15 00:41:21 +02:00
soraefir
362afd3d4e temp override 2026-05-15 00:40:14 +02:00
soraefir
1154cbb3bd Fix dirs 2026-05-15 00:33:48 +02:00
soraefir
25c7823f38 add vchord 2026-05-15 00:26:32 +02:00
soraefir
d57fb32f67 Add missing extensions 2026-05-15 00:22:56 +02:00
soraefir
08a7ed2469 fix user 2026-05-15 00:15:40 +02:00
soraefir
45e375168e db setup immich 2026-05-15 00:12:30 +02:00
soraefir
56252474d9 add vector to dbs 2026-05-15 00:04:02 +02:00
soraefir
0ee26c817c add vector pgsql 2026-05-14 23:51:31 +02:00
soraefir
51bd495981 Fix immich 2026-05-14 23:34:32 +02:00
soraefir
d9a59e9593 fix image 2026-05-14 23:20:41 +02:00
soraefir
8557df0199 fix image 2026-05-14 23:14:12 +02:00
soraefir
84d9b0ade0 immich db setup 2026-05-14 23:12:56 +02:00
soraefir
7e3d86e37e Simplify 2026-05-14 23:10:11 +02:00
soraefir
f5c16775c4 sops immich 2026-05-14 23:07:38 +02:00
soraefir
83dec697d1 cleanup 2026-05-14 23:05:27 +02:00
soraefir
dd47977cbd ldap default app 2026-05-14 22:53:12 +02:00
soraefir
601999180b Fix token 2026-05-14 21:30:11 +02:00
soraefir
97004b4b75 Fix ldap 2026-05-14 21:11:19 +02:00
soraefir
d15895d8e3 fix ldap role 2026-05-14 20:59:07 +02:00
soraefir
983c19eaa5 Fix 2026-05-14 20:54:43 +02:00
soraefir
4e7a348461 Fix ldap 2026-05-14 20:41:28 +02:00
soraefir
4ccb941766 Fix 2026-05-14 20:31:14 +02:00
soraefir
e19fe6a973 remove usuported blueprint 2026-05-14 20:27:24 +02:00
soraefir
d9e07543ba fix ldap authentik 2026-05-14 20:19:25 +02:00
soraefir
5d4aaeb49f Fix escaping 2026-05-14 17:51:30 +02:00
soraefir
14540f043d fix script errors 2026-05-14 17:40:57 +02:00
soraefir
2c29f8a41b grep fix 2026-05-14 17:33:45 +02:00
soraefir
cd994d6359 check installed plugins 2026-05-14 17:32:48 +02:00
soraefir
a1da14f9fb Fix script health check 2026-05-14 17:27:04 +02:00
soraefir
143ea35dc1 Ldap setup jellyfin 2026-05-14 17:18:39 +02:00
soraefir
c23ad28f85 fix 2026-05-14 16:34:59 +02:00
soraefir
c60123ca3c fix 2026-05-14 16:29:30 +02:00
soraefir
c069079a3a fix setup gitea 2026-05-14 16:01:52 +02:00
soraefir
e777a56816 fix ldap 2026-05-14 15:57:01 +02:00
soraefir
9933d12183 Fix ldap password 2026-05-14 15:46:51 +02:00
soraefir
2e6c044b89 Ldap WIP 2026-05-14 15:43:52 +02:00
soraefir
252373f956 Fix 2026-05-14 14:46:55 +02:00
soraefir
511837f0a5 Fix JQ 2026-05-14 14:45:11 +02:00
soraefir
2882889eae Add LDAP 2026-05-14 14:43:59 +02:00
soraefir
c174fe20ae Fix script 2026-05-14 14:34:39 +02:00
soraefir
31a972d55b Fix 2026-05-14 13:37:41 +02:00
soraefir
9de6cedf33 Jellyfin nss 2026-05-14 13:00:30 +02:00
soraefir
f80107efab nss 2026-05-14 12:32:10 +02:00
soraefir
ea21907e5d add nss 2026-05-14 11:52:38 +02:00
soraefir
d86c3b76b5 perms 2026-05-14 01:35:26 +02:00
soraefir
66e878b902 user 2026-05-14 01:25:44 +02:00
soraefir
6a3327386f home&script 2026-05-14 00:59:26 +02:00
soraefir
860955f555 fix curl 2026-05-14 00:33:01 +02:00
soraefir
f5fd711636 fix ssl 2026-05-14 00:26:20 +02:00
soraefir
677c9bc7d4 fixes 2026-05-14 00:21:53 +02:00
soraefir
2cb8d6c24e test 2026-05-14 00:12:18 +02:00
soraefir
3b4e7d07a4 jellyfin setup script 2026-05-14 00:10:38 +02:00
soraefir
8ecef91c92 Authentik apps 2026-05-13 23:27:09 +02:00
soraefir
95c1bb126e typo 2026-05-13 22:48:10 +02:00
soraefir
de18ad8127 Try secure 2026-05-13 22:45:44 +02:00
soraefir
8e57822c10 Fix host 2026-05-13 22:45:28 +02:00
soraefir
f2883aa33d Fix ldap env 2026-05-13 22:43:17 +02:00
soraefir
7bd5ceacd9 fix name 2026-05-13 22:33:28 +02:00
soraefir
e940bd0ec1 Fix ldap 2026-05-13 22:28:55 +02:00
soraefir
44813226c2 ldap insecure 2026-05-13 22:26:34 +02:00
soraefir
7381a17f87 fix ldap 2026-05-13 22:26:18 +02:00
soraefir
19cec13a43 fix authentik token 2026-05-13 22:23:26 +02:00
soraefir
9117530393 Fix authentik 2026-05-13 22:18:16 +02:00
soraefir
868ba53208 move traefik rule 2026-05-13 22:00:34 +02:00
soraefir
f7c55f3a5a Fix Authentik LDAP 2026-05-13 21:48:57 +02:00
7cfd1bb245 Update modules/server/sops/example.server.yaml 2026-05-13 17:32:12 +02:00
85a6517609 Add modules/server/containers/data/authentik/ldap.yaml 2026-05-13 17:31:46 +02:00
d55756f8f8 Update modules/server/containers/apps/servarr.nix 2026-05-13 17:31:29 +02:00
18beb41cd8 Update modules/server/containers/apps/jellyfin.nix 2026-05-13 17:31:19 +02:00
78f01cf111 Update modules/server/containers/apps/invidious.nix 2026-05-13 17:31:07 +02:00
c582d89715 Add modules/server/containers/apps/influx.nix 2026-05-13 17:30:57 +02:00
4270b15f9d Update modules/server/containers/apps/immich.nix 2026-05-13 17:30:43 +02:00
a62bc660c5 Update modules/server/containers/apps/homeassistant.nix 2026-05-13 17:30:33 +02:00
973fd78c1b Update modules/server/containers/apps/frigate.nix 2026-05-13 17:30:24 +02:00
7e62883e66 Update modules/server/containers/apps/authentik.nix 2026-05-13 17:30:10 +02:00
feccc2c3e0 Update modules/server/containers/apps/.template.nix 2026-05-13 17:30:00 +02:00
0b02de0957 Update modules/server/containers/default.nix 2026-05-13 17:29:49 +02:00
721838df2b Update modules/server/containers/builder.nix 2026-05-13 17:29:33 +02:00
soraefir
8c800ad0d3 Jellyfin LDAP 2026-05-13 01:56:45 +02:00
soraefir
f7af832d8e fix jellyfin media path 2026-05-13 01:31:15 +02:00
soraefir
6ddf4a07cc fix umami db 2026-05-13 01:00:14 +02:00
soraefir
0df674647c sops 2026-05-13 00:50:22 +02:00
soraefir
7bead6b3ac fix umami 2026-05-13 00:41:36 +02:00
soraefir
f0befa87be test 2026-05-12 22:52:25 +02:00
soraefir
6d665ee59c add sops to servarr 2026-05-12 21:28:24 +02:00
soraefir
befe46c085 sops 2026-05-12 21:26:46 +02:00
soraefir
ba6d057600 Fix 2026-05-12 21:26:07 +02:00
soraefir
db5230bd69 typo 2026-05-12 21:25:01 +02:00
soraefir
e1a80bb7ce Add new modules 2026-05-12 21:24:02 +02:00
7d95ba04a9 Add modules/shared/syscfg/user.nix 2026-05-12 18:02:13 +02:00
9169205357 Add modules/shared/syscfg/make.nix 2026-05-12 18:02:01 +02:00
74721f6b09 Add modules/shared/syscfg/net.nix 2026-05-12 18:01:52 +02:00
668c0107f9 Add modules/shared/syscfg/server.nix 2026-05-12 18:01:44 +02:00
331291c54d Update modules/shared/syscfg/default.nix 2026-05-12 18:01:33 +02:00
d10f53e485 Add modules/server/containers/apps/immich.nix 2026-05-12 17:47:01 +02:00
82aea8268f Update modules/shared/syscfg/default.nix 2026-05-12 17:46:23 +02:00
050eaedca2 Update modules/server/sops/example.server.yaml 2026-05-12 17:46:11 +02:00
be9cb270aa Update modules/server/sops/default.nix 2026-05-12 17:45:59 +02:00
a5e0e96b52 Update modules/server/database/default.nix 2026-05-12 17:45:49 +02:00
4366232f18 Update modules/server/containers/apps/umami.nix 2026-05-12 17:45:34 +02:00
4398b1d888 Update modules/server/containers/apps/transmission.nix 2026-05-12 17:45:25 +02:00
c4b5c47aa4 Update modules/server/containers/apps/traefik.nix 2026-05-12 17:45:16 +02:00
ff64e6c231 Update modules/server/containers/apps/servarr.nix 2026-05-12 17:45:07 +02:00
e7d656141a Update modules/server/containers/apps/searxng.nix 2026-05-12 17:44:59 +02:00
cf3c2428fb Update modules/server/containers/apps/nextcloud.nix 2026-05-12 17:44:50 +02:00
a2dc050b1c Update modules/server/containers/apps/jellyfin.nix 2026-05-12 17:44:41 +02:00
8bf332caf2 Update modules/server/containers/apps/gitea.nix 2026-05-12 17:44:25 +02:00
20d3786547 Update modules/server/containers/apps/etherpad.nix 2026-05-12 17:44:18 +02:00
79422c180a Update modules/server/containers/apps/ethercalc.nix 2026-05-12 17:44:11 +02:00
65fc9c6df2 Update modules/server/containers/apps/collabora.nix 2026-05-12 17:44:03 +02:00
a59cbd13a3 Update modules/server/containers/apps/authentik.nix 2026-05-12 17:43:55 +02:00
5f04ef7ae5 Update modules/server/containers/apps/.todo.md 2026-05-12 17:43:48 +02:00
0aff508cda Add modules/server/containers/apps/.template.nix 2026-05-12 17:43:40 +02:00
30df106b94 Update modules/server/containers/default.nix 2026-05-12 17:43:28 +02:00
3abdb6d637 Update modules/server/containers/builder.nix 2026-05-12 17:43:18 +02:00
soraefir
cd4c727255 gitea runner 2026-05-12 01:06:14 +02:00
soraefir
26cb095014 Fix 2026-05-12 00:55:55 +02:00
soraefir
2a9113e07d fix calc 2026-05-12 00:50:25 +02:00
soraefir
42a170283d add sops 2026-05-12 00:45:07 +02:00
soraefir
3d4cdaf6e9 new stuff 2026-05-12 00:42:09 +02:00
soraefir
21d959b592 fix script admin 2026-05-11 23:00:07 +02:00
soraefir
0895d67489 fix gitea script 2026-05-11 22:57:43 +02:00
soraefir
86f1fc116c Fix gitea script 2026-05-11 22:55:03 +02:00
soraefir
b82033f857 gitea adminify 2026-05-11 22:45:34 +02:00
soraefir
fbe8399886 Fix 2026-05-11 22:11:26 +02:00
soraefir
036f1117be fix mkdir 2026-05-11 22:05:38 +02:00
soraefir
b3eb1de9e6 fix 2026-05-11 22:02:16 +02:00
soraefir
91c2928a56 Fix 2026-05-11 21:53:49 +02:00
soraefir
89ffc75db2 Fix sops APIKEY 2026-05-11 21:49:20 +02:00
soraefir
63fc0bde6e Fix port 2026-05-11 21:29:16 +02:00
soraefir
bc765ea0c6 Fix cloud port 2026-05-11 20:35:14 +02:00
soraefir
df236d4ec7 sh 2026-05-11 20:18:14 +02:00
soraefir
2f24725df4 add sh 2026-05-11 20:16:37 +02:00
soraefir
4708753085 Gitea 2026-05-11 19:22:06 +02:00
soraefir
370416edba Fix sops 2026-05-11 19:04:16 +02:00
soraefir
ee1dec3d44 rm port 2026-05-11 18:50:36 +02:00
b748db9550 Add modules/server/containers/apps/.todo.md 2026-05-11 18:47:46 +02:00
78381d15ff Update modules/server/containers/apps/authentik.nix 2026-05-11 18:47:46 +02:00
037d75af2a Update modules/server/containers/apps/collabora.nix 2026-05-11 18:47:46 +02:00
9e9338d136 Add modules/server/containers/apps/ethercalc.nix 2026-05-11 18:47:46 +02:00
cd19d8ac06 Update modules/server/containers/apps/etherpad.nix 2026-05-11 18:47:46 +02:00
6dda5f6bd5 Add modules/server/containers/apps/frigate.nix 2026-05-11 18:47:46 +02:00
836b890fab Add modules/server/containers/apps/gitea.nix 2026-05-11 18:47:46 +02:00
40ed44aa52 Add modules/server/containers/apps/handbrake.nix 2026-05-11 18:47:46 +02:00
2fcbf6adb3 Add modules/server/containers/apps/homeassistant.nix 2026-05-11 18:47:46 +02:00
f3fbf159b4 Add modules/server/containers/apps/invidious.nix 2026-05-11 18:47:46 +02:00
f3b8feb50d Update modules/server/containers/apps/nextcloud.nix 2026-05-11 18:47:46 +02:00
f6f51597cd Add modules/server/containers/apps/jellyfin.nix 2026-05-11 18:47:46 +02:00
5c7b5fcbfe Add modules/server/containers/apps/searxng.nix 2026-05-11 18:47:46 +02:00
07b6868d27 Add modules/server/containers/apps/servarr.nix 2026-05-11 18:47:46 +02:00
870b13ef36 Update modules/server/containers/apps/traefik.nix 2026-05-11 18:47:46 +02:00
4b8c8bdc51 Add modules/server/containers/apps/transmission.nix 2026-05-11 18:47:46 +02:00
c24628b574 Add modules/server/containers/apps/trmnl.nix 2026-05-11 18:47:46 +02:00
c1fb77a89f Add modules/server/containers/apps/umami.nix 2026-05-11 18:47:46 +02:00
94012aa44c Update modules/shared/sops/default.nix 2026-05-11 18:47:46 +02:00
5ff282e65c Update modules/shared/syscfg/default.nix 2026-05-11 18:47:46 +02:00
Renovate Bot
0bedb71d07 Lock file maintenance 2026-05-11 18:47:46 +02:00
Renovate Bot
47cbbc56cb Lock file maintenance 2026-05-11 18:47:46 +02:00
e116efd45c Update modules/server/containers/apps/etherpad.nix 2026-05-11 03:03:52 +02:00
soraefir
ff498d15a3 fix 2026-05-11 02:51:27 +02:00
soraefir
90c596270f Fix 2026-05-11 02:49:57 +02:00
soraefir
458a9091d4 fix 2026-05-11 02:32:08 +02:00
soraefir
123d18d1e8 fix 2026-05-11 02:29:11 +02:00
soraefir
f05f7b0147 fix 2026-05-11 02:23:54 +02:00
soraefir
a41390dcee Fix key 2026-05-11 02:19:31 +02:00
soraefir
29478e2aed Fix api 2026-05-11 02:11:15 +02:00
soraefir
82b422883e Fix api 2026-05-11 01:56:11 +02:00
soraefir
4151e50a42 fix 2026-05-11 01:36:08 +02:00
soraefir
5afaf859b9 fix 2026-05-11 00:55:20 +02:00
soraefir
0cd20319fe fix script 2026-05-11 00:54:02 +02:00
soraefir
468cd34fca fix 2026-05-11 00:46:52 +02:00
soraefir
882d36ff83 typo 2026-05-11 00:45:43 +02:00
soraefir
dc2682c829 fix 2026-05-11 00:44:26 +02:00
soraefir
f354a99d56 test new setup script 2026-05-11 00:42:34 +02:00
soraefir
bf1fbea959 chmod and fix 2026-05-11 00:38:02 +02:00
soraefir
31addeda66 Opt dir 2026-05-11 00:33:38 +02:00
soraefir
d0ca9761d7 fix 2026-05-11 00:24:31 +02:00
soraefir
bbbb5831a8 etherpad api 2026-05-11 00:15:54 +02:00
soraefir
46f4b5288b Admin 2026-05-10 22:39:33 +02:00
soraefir
8293df4974 Fix 2026-05-10 22:36:43 +02:00
soraefir
08866273cc fix 2026-05-10 22:31:31 +02:00
soraefir
e2772e51d9 Fix group 2026-05-10 22:27:29 +02:00
soraefir
6bf856b702 WIP 2026-05-10 22:21:02 +02:00
soraefir
93199b4359 tmp fix 2026-05-10 22:11:53 +02:00
soraefir
d3ffacf4ca Fix admin 2026-05-10 22:08:03 +02:00
soraefir
ac0e28b5ab fix authentic flow 2026-05-10 22:02:11 +02:00
soraefir
e76f53d887 test template 2026-05-10 21:47:49 +02:00
soraefir
f67e142f53 fix envfile 2026-05-10 21:43:48 +02:00
soraefir
8165bf6935 Add force exec 2026-05-10 21:40:49 +02:00
soraefir
09539b5866 Add user setup script 2026-05-10 21:39:12 +02:00
soraefir
1b2a724a26 Fix idp & co, add base ak setup 2026-05-10 20:42:19 +02:00
soraefir
e6e6e4af49 Fix saml url 2026-05-10 19:56:05 +02:00
soraefir
e999a5bf2c Fix 2026-05-10 19:49:32 +02:00
soraefir
a57818e37e Fix db 2026-05-10 19:43:19 +02:00
soraefir
0e61b2fad4 saml name 2026-05-10 19:41:58 +02:00
soraefir
9016657699 import cert 2026-05-10 19:34:46 +02:00
soraefir
5462434558 Fix 2026-05-10 19:19:15 +02:00
soraefir
aa36fa812c Foix blueprint 2026-05-10 19:14:37 +02:00
soraefir
f5f28968c6 test blueprint fix 2026-05-10 18:58:13 +02:00
soraefir
4c2ef6e264 Fix blueprints 2026-05-10 18:51:58 +02:00
soraefir
fa808f3eb2 Fix nix mkdata 2026-05-10 18:44:58 +02:00
soraefir
7bc9ae1f2d Fix mkData 2026-05-10 18:42:03 +02:00
soraefir
e53be27e96 Fix 2026-05-10 18:36:20 +02:00
soraefir
88ab6e2007 typo 2026-05-10 18:34:23 +02:00
soraefir
864e698272 fix 2026-05-10 18:33:22 +02:00
soraefir
8961706503 fix 2026-05-10 18:31:56 +02:00
soraefir
c637fea0d0 Add authentik blueprints 2026-05-10 18:29:53 +02:00
soraefir
9813e7d49a Longer timeout 2026-05-10 12:29:46 +02:00
soraefir
ea6db4b9bf fix 2026-05-10 12:26:34 +02:00
soraefir
2eff0969e0 fix 2026-05-10 12:21:46 +02:00
soraefir
cf5648122d fix 2026-05-10 12:21:01 +02:00
soraefir
b10e7a5a93 fix 2026-05-10 12:04:03 +02:00
soraefir
882a43b705 cfg 2026-05-10 12:03:05 +02:00
soraefir
e9868a2513 fix 2026-05-10 12:02:02 +02:00
soraefir
43a0f903b0 Fix 2026-05-10 12:01:28 +02:00
soraefir
1b76ec20b4 fix 2026-05-10 11:59:37 +02:00
soraefir
6a7fcf6152 fix 2026-05-10 11:58:29 +02:00
soraefir
b6bc6dd138 dbg 2026-05-10 11:57:59 +02:00
soraefir
90f8387192 tmp ignore 2026-05-10 11:56:13 +02:00
soraefir
25604d6c14 test 2026-05-10 11:55:53 +02:00
soraefir
51d60de5c0 fix 2026-05-10 11:54:37 +02:00
soraefir
5e8cd65785 fix 2026-05-10 11:52:32 +02:00
soraefir
fa5845808b fix 2026-05-10 11:50:34 +02:00
soraefir
28c17d9bb6 colors 2026-05-10 11:49:18 +02:00
soraefir
89d2f9a48e typo2 2026-05-10 11:42:53 +02:00
soraefir
e58d323ea0 typo 2026-05-10 11:41:59 +02:00
soraefir
7465b6b24c script omprovement 2026-05-10 11:38:19 +02:00
soraefir
59c6b68501 Add cron 2026-05-09 19:40:22 +02:00
soraefir
9273387170 Script improvements 2026-05-09 19:35:05 +02:00
soraefir
55a08673f0 fix caldav 2026-05-09 19:25:06 +02:00
soraefir
5dbb95603d silence script verbosity 2026-05-09 19:20:35 +02:00
soraefir
d60f8dd56f improve script 2026-05-09 19:18:27 +02:00
soraefir
7d35cb319f Fix 2026-05-09 19:12:36 +02:00
soraefir
8d4caac83b group for nextcloud 2026-05-09 18:47:38 +02:00
soraefir
ad2b492b51 Fix service 2026-05-09 18:42:22 +02:00
soraefir
4b68accf2f fix nextcloud 2026-05-09 17:52:39 +02:00
soraefir
0d9c8a2974 fix 2026-05-09 17:51:06 +02:00
soraefir
63d2dddd1e setup scripts 2026-05-09 17:50:23 +02:00
soraefir
55d678df19 bump nextcloud 2026-05-09 13:33:56 +02:00
soraefir
88a4ab069e registries 2026-05-09 13:28:48 +02:00
soraefir
c54ed4a712 Admin user 2026-05-09 12:54:13 +02:00
soraefir
3db4517a3b temps 2026-05-09 12:43:16 +02:00
soraefir
f3dfe561ad add plugin 2026-05-09 12:38:04 +02:00
soraefir
b58da2b2e1 port fix 2026-05-09 12:12:42 +02:00
soraefir
28fa63919f Fix env 2026-05-09 12:09:27 +02:00
soraefir
cb7e29bfe0 container settings 2026-05-09 11:58:38 +02:00
soraefir
ea58be6fdc fix typo 2026-05-09 11:57:21 +02:00
soraefir
da51e61c05 escape 2026-05-09 11:56:42 +02:00
soraefir
1ca61b70d2 fix env 2026-05-09 11:53:29 +02:00
soraefir
eafafe876f postgres 2026-05-09 11:03:58 +02:00
soraefir
21adca1fbc tmp perm 2026-05-09 10:50:25 +02:00
soraefir
57efc58bc2 Fix user etherpad 2026-05-09 10:46:04 +02:00
soraefir
cd5deea849 etherpad 2026-05-09 10:45:16 +02:00
soraefir
9f5f8751e5 fix ddos 2026-05-09 10:32:18 +02:00
soraefir
f02adc6d93 fix 2026-05-09 10:24:13 +02:00
soraefir
b2f6d8cc9e Fix 2026-05-09 10:19:21 +02:00
soraefir
c18ac097fa test 2026-05-09 10:17:27 +02:00
soraefir
1fc9017e7e fix 2026-05-09 10:12:01 +02:00
soraefir
8ff90e54b8 fix 2026-05-09 10:11:21 +02:00
soraefir
fba3a24f16 custom image 2026-05-09 10:09:51 +02:00
soraefir
fcb97828f4 test custom img 2026-05-09 10:04:47 +02:00
soraefir
e04382742f cleanup traefik 2026-05-09 10:03:09 +02:00
soraefir
48b40d819b fix typo 2026-05-09 09:56:28 +02:00
soraefir
8b75968f11 fix tls 2026-05-09 09:55:30 +02:00
soraefir
dda8409329 cert 2026-05-09 09:46:18 +02:00
soraefir
9a0b5171b1 fix dns 2026-05-09 09:42:33 +02:00
soraefir
9abb5b2f26 logs 2026-05-09 09:35:41 +02:00
soraefir
8362599b54 traefik 2026-05-09 09:34:07 +02:00
soraefir
c1b9c12281 fix 2026-05-09 09:26:40 +02:00
soraefir
e4dcb0bd39 api port 2026-05-09 00:20:27 +02:00
soraefir
a31991c507 typo 2026-05-08 23:58:53 +02:00
soraefir
e1651cba2a traefik docker 2026-05-08 23:57:19 +02:00
soraefir
bb5ecbba73 acme 2026-05-08 23:54:20 +02:00
soraefir
0c79617647 test acme 2026-05-08 23:48:37 +02:00
soraefir
a3bc8b80c5 fix acme 2026-05-08 23:39:48 +02:00
soraefir
55fcf8b71a fix 2026-05-08 23:32:25 +02:00
soraefir
5aabd9acce Fix 2026-05-08 23:31:56 +02:00
soraefir
e652c12bf2 fix traefik 2026-05-08 23:30:04 +02:00
soraefir
4c684cf9b1 Fix portfw traefik 2026-05-08 23:18:43 +02:00
soraefir
0c60bbbaa8 rm deprecated 2026-05-08 23:14:51 +02:00
soraefir
097334b483 fix statfs 2026-05-08 23:10:52 +02:00
soraefir
bfd099d201 container registry 2026-05-08 23:05:25 +02:00
soraefir
1fe6e43046 sops 2026-05-08 22:56:05 +02:00
soraefir
23b8ad480e fix subdomain 2026-05-08 22:55:21 +02:00
soraefir
3d1fc2a2c9 traefik 2026-05-08 22:53:41 +02:00
soraefir
aacca16eb2 fix tmpfs 2026-05-08 21:05:08 +02:00
soraefir
5de459c347 fix nulls 2026-05-08 21:01:46 +02:00
soraefir
d898116ff4 fix nulls 2026-05-08 20:59:40 +02:00
soraefir
e2b688c836 fix sops 2026-05-08 20:54:54 +02:00
soraefir
b5d57bf9c8 test 2026-05-08 20:52:08 +02:00
soraefir
236f9dbdc3 Sops 2026-05-08 20:50:13 +02:00
soraefir
9696ca9a6d ipfw 2026-05-08 20:47:00 +02:00
soraefir
df523c48e5 rename and fix 2026-05-08 20:46:23 +02:00
soraefir
4d398d5596 sops 2026-05-08 20:36:26 +02:00
soraefir
5045291097 sops 2026-05-08 20:35:43 +02:00
soraefir
2dc1632a40 sops 2026-05-08 20:32:37 +02:00
soraefir
744a2b8563 Secrets 2026-05-08 20:31:12 +02:00
soraefir
b722d349af fix cloud 2026-05-08 20:28:22 +02:00
soraefir
7438905618 WIP 2026-05-08 20:25:51 +02:00
soraefir
908c144c73 add cloud 2026-05-08 20:25:14 +02:00
soraefir
6d353df19f fix collabora 2026-05-08 20:23:40 +02:00
soraefir
7194d91b1c WIP 2026-05-08 20:22:04 +02:00
soraefir
d3c301db36 Fix 2026-05-08 02:52:56 +02:00
soraefir
135d48d78c test 2026-05-08 02:47:19 +02:00
soraefir
d4292cd46d test 2026-05-08 02:45:33 +02:00
soraefir
4a4d3e3604 typo 2026-05-08 02:37:06 +02:00
soraefir
d076538901 test 2026-05-08 02:35:32 +02:00
soraefir
8fedaf18cd firewall? 2026-05-08 02:20:28 +02:00
soraefir
4c1f9f0e78 nft 2026-05-08 02:17:10 +02:00
soraefir
1a8eb085df fix db ? 2026-05-08 02:13:44 +02:00
soraefir
8a619d9fc6 env 2026-05-08 02:00:10 +02:00
soraefir
a76f920297 Fix 2026-05-08 01:58:37 +02:00
soraefir
fe93cb708e accept podman traffic 2026-05-08 01:49:31 +02:00
soraefir
cb29056296 Sops 2026-05-08 01:37:57 +02:00
soraefir
4bc68eeeaf more fix 2026-05-08 01:34:17 +02:00
soraefir
9cf9937cb7 wg nft 2026-05-08 01:26:53 +02:00
soraefir
593514c100 fix ssh 2026-05-08 01:21:56 +02:00
soraefir
6ad9a0b34c Env 2026-05-08 01:19:04 +02:00
soraefir
65e3568072 Db 2026-05-08 01:18:02 +02:00
soraefir
c55b06cca9 fix nft 2026-05-08 01:15:56 +02:00
soraefir
40dba4b959 Fix nftable 2026-05-08 01:15:27 +02:00
soraefir
bc8a9d42f9 Fix nftable 2026-05-08 01:09:51 +02:00
soraefir
cd5a1aeed4 temp fix 2026-05-08 01:08:59 +02:00
soraefir
0f2081486d Wops 2026-05-08 01:08:07 +02:00
soraefir
1c022d7642 Fix secret 2026-05-08 00:53:00 +02:00
soraefir
379f6befb3 fix 2026-05-08 00:44:13 +02:00
soraefir
868d2ce116 fix 2026-05-08 00:29:12 +02:00
soraefir
94fdfa2b33 Test acme 2026-05-08 00:17:46 +02:00
soraefir
a73ad174ea Fix 2026-05-08 00:14:41 +02:00
soraefir
fba5a79ce6 Fix parenthesis 2026-05-08 00:12:17 +02:00
soraefir
e8c9fc52fb Update 2026-05-08 00:06:21 +02:00
soraefir
8092bac6b7 nginx 2026-05-07 00:03:43 +02:00
soraefir
7d80478e83 more fixes authentik 2026-05-06 23:47:09 +02:00
soraefir
2cab462db5 Fix authentik worker 2026-05-06 23:45:21 +02:00
soraefir
0bb796fbe8 Fix cfg 2026-05-06 23:42:29 +02:00
soraefir
1f2cc94a0a Fix builder 2026-05-06 23:39:28 +02:00
soraefir
3caf507905 Fix attempt 2026-05-06 23:35:03 +02:00
soraefir
27a5566ac6 Rename file 2026-05-06 23:31:12 +02:00
soraefir
b439888fa8 Fix naming 2026-05-06 23:30:08 +02:00
soraefir
093497367a container builder 2026-05-06 23:28:49 +02:00
soraefir
1c0cfd1afe change podman building 2026-05-06 22:59:11 +02:00
soraefir
c457867440 Improvements to server 2026-05-06 22:48:09 +02:00
soraefir
d73bbd8b18 fix dns on gw 2026-05-06 10:02:27 +02:00
soraefir
95c3c0290a removed restart, fix wg 2026-05-06 09:54:58 +02:00
soraefir
f80ba36c2a more db ip fix test 2026-05-06 03:22:55 +02:00
soraefir
e276df28b4 allow ip range db 2026-05-06 03:20:11 +02:00
soraefir
0782278a0c fix env 2026-05-06 03:10:25 +02:00
soraefir
e334d39f7d db url 2026-05-06 03:03:48 +02:00
soraefir
e05f6dd125 fix db 2026-05-06 03:01:12 +02:00
soraefir
158bee36f8 Allow nftabless db 2026-05-06 02:58:42 +02:00
soraefir
9600f7a370 postgres ip allow 2026-05-06 02:54:12 +02:00
soraefir
83b921afcc Fix env 2026-05-06 02:42:46 +02:00
soraefir
aaee4d9442 Fix passwords 2026-05-06 02:40:08 +02:00
soraefir
e3e535f527 Fix db 2026-05-06 02:37:23 +02:00
soraefir
865c12cacc update 2026-05-06 02:26:06 +02:00
soraefir
02a8ffeb10 Fix db password 2026-05-06 02:24:26 +02:00
soraefir
c57f19b18d Db host 2026-05-06 02:11:11 +02:00
soraefir
f81ba27e56 Fix race condition 2026-05-06 02:05:52 +02:00
soraefir
dd192d2983 Fix db init 2026-05-06 02:01:25 +02:00
soraefir
e7a414df5f Fix missing user 2026-05-06 01:58:07 +02:00
soraefir
f3fcb320be missing pacro 2026-05-06 01:55:25 +02:00
soraefir
710def3ea3 Fix naming 2026-05-06 01:51:25 +02:00
soraefir
b070f6f5e1 Update sops 2026-05-06 01:46:45 +02:00
soraefir
1ada287c8d Fix sops 2026-05-06 01:35:26 +02:00
soraefir
29a1702c39 Add sops 2026-05-06 01:33:48 +02:00
soraefir
226a1baaa1 indent 2026-05-06 01:29:31 +02:00
soraefir
2e0295163c Fix backup 2026-05-06 01:29:08 +02:00
soraefir
282d5206a6 typing 2026-05-06 01:26:02 +02:00
soraefir
7717d07ae8 Fix type 2026-05-06 01:25:45 +02:00
soraefir
4a86b856fb Fix db 2026-05-06 01:24:32 +02:00
soraefir
a8c8740b14 Fix db pointer 2026-05-06 01:21:01 +02:00
soraefir
a44dc8108d test 2026-05-06 01:11:28 +02:00
soraefir
626a88c8c8 Fixed 2026-05-06 01:07:48 +02:00
soraefir
fd7797c6e7 Wip Migrate podman 2026-05-06 01:05:32 +02:00
soraefir
b2d040d414 Add tmpfile rule 2026-05-05 00:27:24 +02:00
soraefir
cd05d939a8 Fix wireguard 2026-05-05 00:06:47 +02:00
soraefir
d626c13572 fix containers 2026-05-04 23:43:29 +02:00
soraefir
c779c1760b Fix opt 2026-05-04 23:19:33 +02:00
soraefir
8876b63c7b Fix2 2026-05-04 23:17:31 +02:00
soraefir
be0ccc9e79 Test fix 2026-05-04 23:17:12 +02:00
soraefir
662424f1d1 New server docker 2026-05-04 23:15:04 +02:00
soraefir
1566aca2b8 virt enable 2026-05-04 00:39:39 +02:00
soraefir
28fdc04c7b Fix types 2026-05-04 00:10:05 +02:00
soraefir
ce569f16e2 Fix srvcfg 2026-05-04 00:08:49 +02:00
soraefir
e53997093b fix server cfg 2026-05-04 00:01:52 +02:00
soraefir
66b594a1a2 Fix path 2026-05-03 23:17:18 +02:00
soraefir
7c91cd4733 docker sandbox 2026-05-03 23:13:27 +02:00
soraefir
da2aa4649e Fix mock sops 2026-05-03 17:47:50 +02:00
soraefir
90b7eb097f fix openssh 2026-05-03 17:45:27 +02:00
soraefir
4946fa999b Fix 2026-05-03 17:37:21 +02:00
soraefir
f1ce4b7b81 Fix sops 2026-05-03 17:10:19 +02:00
soraefir
e9eb4d9506 Cleanup and fixed 2026-05-03 15:34:10 +02:00
soraefir
c8cb980c15 Fix ports firewall 2026-05-03 13:45:16 +02:00
bot
38350b91e1 Merge pull request 'Lock file maintenance' (#272) from renovate/lock-file-maintenance into main 2026-05-03 04:05:59 +02:00
Renovate Bot
142d842886 Lock file maintenance 2026-05-03 02:05:52 +00:00
soraefir
c9e59a9a89 fix missing arg 2026-05-03 02:24:11 +02:00
soraefir
b1afbf6bbe missing lib 2026-05-03 02:23:41 +02:00
soraefir
4c2f368da3 fix sops 2026-05-03 02:23:16 +02:00
soraefir
9377d1ce45 Better Server cfg 2026-05-03 02:20:41 +02:00
soraefir
d3a3941591 keepalive 2026-05-03 01:47:38 +02:00
soraefir
b1bbb3ce86 SSH fix 2026-05-03 01:25:22 +02:00
soraefir
d8be8b72ab Fix ssh 2026-05-02 22:05:58 +02:00
soraefir
59709bcde9 Fix ssh 2026-05-02 21:40:06 +02:00
soraefir
b0f5ef7439 Fix Ssh 2026-05-02 21:39:40 +02:00
soraefir
301d8d1ea6 fixx 2026-05-02 21:12:43 +02:00
soraefir
5aa041ba27 ssh fix 2026-05-02 21:11:57 +02:00
soraefir
d2e35d3673 Fix ssh 2026-05-02 21:00:05 +02:00
soraefir
0baf9c1800 Fix SSH 2026-05-02 20:49:35 +02:00
soraefir
a7edc932a8 Fix VPS 2026-05-02 19:25:11 +02:00
soraefir
ae82eaa500 Fix 2026-05-02 10:32:08 +02:00
soraefir
e24e96f091 Fix VPS 2026-05-02 10:30:52 +02:00
soraefir
b42579f8cd Fix 2026-05-02 10:29:56 +02:00
soraefir
0192a1ace0 Fix boot 2026-05-02 10:29:21 +02:00
soraefir
dcc5c440f7 fix avalon 2026-05-02 10:12:36 +02:00
soraefir
1ceb440026 fix 2026-05-02 09:51:08 +02:00
bot
25b2e3e05f Merge pull request 'Lock file maintenance' (#271) from renovate/lock-file-maintenance into main 2026-05-02 04:03:53 +02:00
Renovate Bot
c823dbab4d Lock file maintenance 2026-05-02 02:03:51 +00:00
soraefir
32bbe70e2e fix 2026-05-02 00:26:53 +02:00
soraefir
1248c258df fix 2026-05-02 00:25:47 +02:00
soraefir
f852ed7662 Fix 2026-05-02 00:21:57 +02:00
soraefir
4729a82990 pkgs 2026-05-02 00:20:50 +02:00
soraefir
c9ebc6e512 wg sops 2026-05-02 00:20:20 +02:00
soraefir
d68c26a4eb test 2026-05-02 00:04:02 +02:00
soraefir
7b3d80c86e Fixing 2026-05-01 23:57:01 +02:00
soraefir
f98fee7988 wg fix 2026-05-01 23:52:10 +02:00
soraefir
401bb84bb0 temp ssh 2026-05-01 23:33:08 +02:00
soraefir
39ea963b7c Fix 2026-05-01 23:29:54 +02:00
soraefir
7cbb8ffae2 Fix 2026-05-01 23:26:23 +02:00
soraefir
9d9e99e462 fix 2026-05-01 23:22:21 +02:00
soraefir
3f5d05e076 Sops 2026-05-01 23:17:43 +02:00
soraefir
c1670a406c sops 2026-05-01 23:13:34 +02:00
soraefir
76b77b532c Boot 2026-05-01 23:03:39 +02:00
soraefir
16add98b0d boot fix 2026-05-01 22:57:34 +02:00
soraefir
f764e681c0 Gateway Boot 2026-05-01 22:49:06 +02:00
soraefir
f3c8020a85 Force 2026-05-01 22:40:19 +02:00
soraefir
376ac4a229 no bootloader on vps 2026-05-01 22:39:11 +02:00
soraefir
d4e599bd9b Fixes 2026-05-01 22:01:54 +02:00
soraefir
edc764461c Fix asguard name 2026-05-01 21:32:27 +02:00
soraefir
cf9c7f8b80 Fix 2026-05-01 18:55:03 +02:00
soraefir
0cdd18bec7 Fix 2026-05-01 18:53:18 +02:00
soraefir
5cbf1e8555 fix forwading 2026-05-01 18:51:45 +02:00
soraefir
735a9e2e0e Fix 2026-05-01 18:46:55 +02:00
soraefir
eba7f7bd74 fix 2026-05-01 18:46:22 +02:00
soraefir
beb6ef1b05 Fix 2026-05-01 18:44:33 +02:00
soraefir
e519f5c03c Fix sops 2026-05-01 18:43:49 +02:00
soraefir
d55fd5fc0e Fix sops 2026-05-01 18:42:47 +02:00
soraefir
b31f6cd331 Fix sops for wg peers 2026-05-01 18:38:13 +02:00
soraefir
9b0fc14795 Cleaner forwarding 2026-05-01 17:57:06 +02:00
soraefir
32c83bca98 Fix cfg 2026-05-01 17:48:43 +02:00
soraefir
a7ce1dc7ea Migrate gateway 2026-05-01 17:43:01 +02:00
bot
60bf451310 Merge pull request 'Lock file maintenance' (#270) from renovate/lock-file-maintenance into main 2026-04-26 04:04:29 +02:00
Renovate Bot
7f6e5879aa Lock file maintenance 2026-04-26 02:04:26 +00:00
bot
3fd400062d Merge pull request 'Lock file maintenance' (#269) from renovate/lock-file-maintenance into main 2026-04-25 04:16:05 +02:00
Renovate Bot
637297130f Lock file maintenance 2026-04-25 02:15:51 +00:00
9ab6a6b92b Update modules/home/gui/apps/develop/default.nix 2026-04-24 22:04:54 +02:00
bot
94c2956904 Merge pull request 'Lock file maintenance' (#268) from renovate/lock-file-maintenance into main 2026-04-19 04:04:43 +02:00
Renovate Bot
fadd1ca63e Lock file maintenance 2026-04-19 02:04:40 +00:00
bot
5f64431332 Merge pull request 'Lock file maintenance' (#267) from renovate/lock-file-maintenance into main 2026-04-18 04:07:43 +02:00
Renovate Bot
2f8284bf61 Lock file maintenance 2026-04-18 02:07:13 +00:00
bot
14436f4507 Merge pull request 'Lock file maintenance' (#266) from renovate/lock-file-maintenance into main 2026-04-12 04:04:18 +02:00
Renovate Bot
26641247ea Lock file maintenance 2026-04-12 02:04:16 +00:00
bot
030c938dfa Merge pull request 'Lock file maintenance' (#265) from renovate/lock-file-maintenance into main 2026-04-11 04:05:14 +02:00
Renovate Bot
b7f2be0337 Lock file maintenance 2026-04-11 02:05:07 +00:00
bot
3b3545e8a4 Merge pull request 'Lock file maintenance' (#264) from renovate/lock-file-maintenance into main 2026-04-05 04:04:31 +02:00
Renovate Bot
2f8a20e062 Lock file maintenance 2026-04-05 02:04:28 +00:00
bot
aa0845a3f8 Merge pull request 'Lock file maintenance' (#263) from renovate/lock-file-maintenance into main 2026-04-04 04:04:20 +02:00
Renovate Bot
8d27ca6dd1 Lock file maintenance 2026-04-04 02:04:16 +00:00
bot
1850124ec0 Merge pull request 'Update DeterminateSystems/nix-installer-action action to v22' (#262) from renovate/determinatesystems-nix-installer-action-22.x into main 2026-03-30 04:01:38 +02:00
Renovate Bot
10df7a2f87 Update DeterminateSystems/nix-installer-action action to v22 2026-03-30 02:01:34 +00:00
bot
11b391613a Merge pull request 'Lock file maintenance' (#261) from renovate/lock-file-maintenance into main 2026-03-29 04:03:30 +02:00
Renovate Bot
52d2ec52df Lock file maintenance 2026-03-29 02:03:28 +00:00
bot
41641b0e5c Merge pull request 'Lock file maintenance' (#260) from renovate/lock-file-maintenance into main 2026-03-28 03:03:48 +01:00
Renovate Bot
07f41fa629 Lock file maintenance 2026-03-28 02:03:45 +00:00
bot
604406eb87 Merge pull request 'Lock file maintenance' (#259) from renovate/lock-file-maintenance into main 2026-03-22 03:04:15 +01:00
Renovate Bot
dc88fbc36d Lock file maintenance 2026-03-22 02:04:10 +00:00
bot
2b5d3480d0 Merge pull request 'Lock file maintenance' (#258) from renovate/lock-file-maintenance into main 2026-03-21 03:05:45 +01:00
Renovate Bot
04696cccd7 Lock file maintenance 2026-03-21 02:05:43 +00:00
c00f1e597b Update modules/home/gui/games/wow.nix 2026-03-19 22:09:12 +01:00
bot
10d72aa61b Merge pull request 'Update cachix/cachix-action action to v17' (#257) from renovate/cachix-cachix-action-17.x into main 2026-03-19 03:03:02 +01:00
Renovate Bot
8e5359fc89 Update cachix/cachix-action action to v17 2026-03-19 02:02:58 +00:00
bot
ea24abd34b Merge pull request 'Lock file maintenance' (#256) from renovate/lock-file-maintenance into main 2026-03-15 03:04:21 +01:00
Renovate Bot
b8b04ea9a0 Lock file maintenance 2026-03-15 02:04:20 +00:00
bot
63e29a0ab9 Merge pull request 'Lock file maintenance' (#255) from renovate/lock-file-maintenance into main 2026-03-15 03:03:59 +01:00
Renovate Bot
86ce081499 Lock file maintenance 2026-03-15 02:03:57 +00:00
bot
35f5cc981a Merge pull request 'Lock file maintenance' (#254) from renovate/lock-file-maintenance into main 2026-03-14 03:04:02 +01:00
Renovate Bot
bd499b29fe Lock file maintenance 2026-03-14 02:03:59 +00:00
bot
883f50c541 Merge pull request 'Lock file maintenance' (#253) from renovate/lock-file-maintenance into main 2026-03-08 03:06:35 +01:00
Renovate Bot
9a17b81976 Lock file maintenance 2026-03-08 02:06:33 +00:00
bot
757022670b Merge pull request 'Lock file maintenance' (#252) from renovate/lock-file-maintenance into main 2026-03-07 03:03:50 +01:00
Renovate Bot
b67c36b2d5 Lock file maintenance 2026-03-07 02:03:46 +00:00
bot
ffdb7c29ae Merge pull request 'Lock file maintenance' (#251) from renovate/lock-file-maintenance into main 2026-03-01 03:04:15 +01:00
Renovate Bot
572df30c5d Lock file maintenance 2026-03-01 02:04:11 +00:00
bot
3194526625 Merge pull request 'Lock file maintenance' (#250) from renovate/lock-file-maintenance into main 2026-02-28 03:03:51 +01:00
Renovate Bot
332a4486cd Lock file maintenance 2026-02-28 02:03:47 +00:00
bot
5d46e20d50 Merge pull request 'Lock file maintenance' (#249) from renovate/lock-file-maintenance into main 2026-02-22 03:04:01 +01:00
Renovate Bot
ed7134202e Lock file maintenance 2026-02-22 02:03:59 +00:00
bot
3ff4e57848 Merge pull request 'Lock file maintenance' (#248) from renovate/lock-file-maintenance into main 2026-02-21 03:04:09 +01:00
Renovate Bot
5672681440 Lock file maintenance 2026-02-21 02:04:06 +00:00
soraefir
ef4bdb77f7 Update wow&co 2026-02-19 23:17:04 +01:00
bot
de7acbfca6 Merge pull request 'Lock file maintenance' (#247) from renovate/lock-file-maintenance into main 2026-02-15 03:03:45 +01:00
Renovate Bot
b50a2fffe3 Lock file maintenance 2026-02-15 02:03:42 +00:00
bot
c29571d1b8 Merge pull request 'Lock file maintenance' (#246) from renovate/lock-file-maintenance into main 2026-02-14 03:04:23 +01:00
Renovate Bot
c416ebd16a Lock file maintenance 2026-02-14 02:04:18 +00:00
bot
40041e9f8d Merge pull request 'Lock file maintenance' (#245) from renovate/lock-file-maintenance into main 2026-02-08 03:03:36 +01:00
Renovate Bot
b85e86099c Lock file maintenance 2026-02-08 02:03:33 +00:00
bot
cefacf4eb0 Merge pull request 'Lock file maintenance' (#244) from renovate/lock-file-maintenance into main 2026-02-07 03:11:40 +01:00
Renovate Bot
7a4aba4578 Lock file maintenance 2026-02-07 02:11:32 +00:00
bot
679044816f Merge pull request 'Lock file maintenance' (#243) from renovate/lock-file-maintenance into main 2026-02-01 03:05:31 +01:00
Renovate Bot
4104234334 Lock file maintenance 2026-02-01 02:05:20 +00:00
bot
8b5d4e241f Merge pull request 'Lock file maintenance' (#242) from renovate/lock-file-maintenance into main 2026-01-31 03:05:01 +01:00
Renovate Bot
7e24069870 Lock file maintenance 2026-01-31 02:04:56 +00:00
soraefir
9019ba84e3 Ollama 2026-01-27 23:41:15 +01:00
bot
4943b90476 Merge pull request 'Lock file maintenance' (#241) from renovate/lock-file-maintenance into main 2026-01-25 03:04:14 +01:00
Renovate Bot
05d276e392 Lock file maintenance 2026-01-25 02:04:04 +00:00
bot
5a4b2e815f Merge pull request 'Lock file maintenance' (#240) from renovate/lock-file-maintenance into main 2026-01-24 03:04:20 +01:00
Renovate Bot
c53da55394 Lock file maintenance 2026-01-24 02:04:14 +00:00
soraefir
ca8283f5a2 fix devsh 2026-01-21 11:26:27 +01:00
soraefir
dfa84137be fix devsh 2026-01-20 23:39:31 +01:00
soraefir
ffd6bf94cc fix devsh 2026-01-20 23:03:47 +01:00
soraefir
29b2cbb011 fix devsh 2026-01-20 23:03:12 +01:00
bot
1fb8aa1dcc Merge pull request 'Lock file maintenance' (#239) from renovate/lock-file-maintenance into main 2026-01-18 03:03:33 +01:00
Renovate Bot
341e743b1e Lock file maintenance 2026-01-18 02:03:30 +00:00
bot
db93fb0ad2 Merge pull request 'Lock file maintenance' (#238) from renovate/lock-file-maintenance into main 2026-01-17 03:06:10 +01:00
Renovate Bot
2299d7db62 Lock file maintenance 2026-01-17 02:06:08 +00:00
bot
31c1f97409 Merge pull request 'Lock file maintenance' (#237) from renovate/lock-file-maintenance into main 2026-01-11 03:03:42 +01:00
Renovate Bot
dbe97e6042 Lock file maintenance 2026-01-11 02:03:39 +00:00
bot
028e0ea7e2 Merge pull request 'Lock file maintenance' (#236) from renovate/lock-file-maintenance into main 2026-01-10 03:03:47 +01:00
Renovate Bot
81cf09ef29 Lock file maintenance 2026-01-10 02:03:44 +00:00
74e544a604 Update modules/home/gui/apps/pipewire/default.nix 2026-01-07 18:44:33 +01:00
bd44efc583 Update modules/home/gui/apps/pipewire/default.nix 2026-01-07 18:35:22 +01:00
soraefir
2d8ac1c47e fix gesture 2026-01-04 10:41:47 +01:00
soraefir
ba72106b7f fix 25.11 2026-01-04 10:21:31 +01:00
bot
57c94cd93e Merge pull request 'Lock file maintenance' (#235) from renovate/lock-file-maintenance into main 2026-01-04 03:03:23 +01:00
Renovate Bot
59b9fe2236 Lock file maintenance 2026-01-04 02:03:17 +00:00
bot
2662b4bb38 Merge pull request 'Lock file maintenance' (#234) from renovate/lock-file-maintenance into main 2026-01-03 13:25:53 +01:00
Renovate Bot
fc21a048a1 Lock file maintenance 2026-01-03 12:25:50 +00:00
5ceb7c8277 Update flake.nix 2025-12-31 16:07:44 +01:00
bot
47277e31e8 Merge pull request 'Lock file maintenance' (#233) from renovate/lock-file-maintenance into main 2025-12-28 03:03:27 +01:00
Renovate Bot
9ea7c20d1c Lock file maintenance 2025-12-28 02:03:24 +00:00
bot
b7b6b2ee5f Merge pull request 'Lock file maintenance' (#232) from renovate/lock-file-maintenance into main 2025-12-27 03:03:52 +01:00
Renovate Bot
aeb1690fab Lock file maintenance 2025-12-27 02:03:45 +00:00
bot
fc7b4874ef Merge pull request 'Lock file maintenance' (#231) from renovate/lock-file-maintenance into main 2025-12-21 03:03:21 +01:00
Renovate Bot
5bb84fafbb Lock file maintenance 2025-12-21 02:03:16 +00:00
bot
9116edc15b Merge pull request 'Lock file maintenance' (#230) from renovate/lock-file-maintenance into main 2025-12-20 03:03:44 +01:00
Renovate Bot
0cf8fe1b85 Lock file maintenance 2025-12-20 02:03:41 +00:00
bot
9f6444658a Merge pull request 'Lock file maintenance' (#229) from renovate/lock-file-maintenance into main 2025-12-14 03:03:32 +01:00
Renovate Bot
6e6a7a47ac Lock file maintenance 2025-12-14 02:03:29 +00:00
bot
b0527e55bf Merge pull request 'Lock file maintenance' (#228) from renovate/lock-file-maintenance into main 2025-12-13 03:03:45 +01:00
Renovate Bot
0d1d9f9cd8 Lock file maintenance 2025-12-13 02:03:42 +00:00
bot
aa14dde9df Merge pull request 'Lock file maintenance' (#227) from renovate/lock-file-maintenance into main 2025-12-07 03:07:22 +01:00
Renovate Bot
9a8577bb9d Lock file maintenance 2025-12-07 02:07:15 +00:00
bot
295f65a05e Merge pull request 'Lock file maintenance' (#226) from renovate/lock-file-maintenance into main 2025-12-06 03:04:07 +01:00
Renovate Bot
3364477ea4 Lock file maintenance 2025-12-06 02:04:05 +00:00
bot
ed758e5992 Merge pull request 'Lock file maintenance' (#225) from renovate/lock-file-maintenance into main 2025-11-30 03:03:22 +01:00
Renovate Bot
818950ce06 Lock file maintenance 2025-11-30 02:03:20 +00:00
bot
e2a2a39440 Merge pull request 'Lock file maintenance' (#224) from renovate/lock-file-maintenance into main 2025-11-29 03:04:15 +01:00
Renovate Bot
8cf955ee5f Lock file maintenance 2025-11-29 02:04:12 +00:00
bot
bb31ac82a5 Merge pull request 'Update DeterminateSystems/update-flake-lock action to v28' (#223) from renovate/determinatesystems-update-flake-lock-28.x into main 2025-11-27 03:02:51 +01:00
Renovate Bot
5ecb0ec6e1 Update DeterminateSystems/update-flake-lock action to v28 2025-11-27 02:02:47 +00:00
bot
9d42f74107 Merge pull request 'Lock file maintenance' (#222) from renovate/lock-file-maintenance into main 2025-11-23 03:04:05 +01:00
Renovate Bot
2c3da72e1c Lock file maintenance 2025-11-23 02:04:02 +00:00
bot
4dad4004e5 Merge pull request 'Lock file maintenance' (#221) from renovate/lock-file-maintenance into main 2025-11-22 03:04:43 +01:00
Renovate Bot
e323c019bc Lock file maintenance 2025-11-22 02:04:39 +00:00
bot
7bcadfa43c Merge pull request 'Update actions/checkout action to v6' (#220) from renovate/actions-checkout-6.x into main 2025-11-21 03:01:56 +01:00
Renovate Bot
ef14fb82b7 Update actions/checkout action to v6 2025-11-21 02:01:51 +00:00
bot
77cb7b14c7 Merge pull request 'Lock file maintenance' (#219) from renovate/lock-file-maintenance into main 2025-11-16 03:05:07 +01:00
Renovate Bot
6bafa68ae4 Lock file maintenance 2025-11-16 02:05:04 +00:00
bot
65d2405aac Merge pull request 'Lock file maintenance' (#218) from renovate/lock-file-maintenance into main 2025-11-15 03:04:53 +01:00
Renovate Bot
765a12b2be Lock file maintenance 2025-11-15 02:04:51 +00:00
bot
309c8b19a6 Merge pull request 'Update DeterminateSystems/nix-installer-action action to v21' (#217) from renovate/determinatesystems-nix-installer-action-21.x into main 2025-11-13 03:03:53 +01:00
Renovate Bot
1b5d14b90f Update DeterminateSystems/nix-installer-action action to v21 2025-11-13 02:03:43 +00:00
bot
9fb8d04ce7 Merge pull request 'Lock file maintenance' (#216) from renovate/lock-file-maintenance into main 2025-11-09 03:04:28 +01:00
Renovate Bot
54d25bbdab Lock file maintenance 2025-11-09 02:04:25 +00:00
bot
54b90463f3 Merge pull request 'Lock file maintenance' (#215) from renovate/lock-file-maintenance into main 2025-11-08 03:05:19 +01:00
Renovate Bot
921db78da0 Lock file maintenance 2025-11-08 02:05:10 +00:00
bot
3b9854a179 Merge pull request 'Lock file maintenance' (#214) from renovate/lock-file-maintenance into main 2025-11-02 03:05:19 +01:00
Renovate Bot
4075f1fef4 Lock file maintenance 2025-11-02 02:05:10 +00:00
bot
920e2cf33d Merge pull request 'Lock file maintenance' (#213) from renovate/lock-file-maintenance into main 2025-11-01 03:05:38 +01:00
Renovate Bot
74147ca952 Lock file maintenance 2025-11-01 02:05:36 +00:00
bot
1684a36b21 Merge pull request 'Lock file maintenance' (#212) from renovate/lock-file-maintenance into main 2025-10-26 03:05:48 +01:00
Renovate Bot
0ecf85a715 Lock file maintenance 2025-10-26 02:05:44 +00:00
bot
23303a9a9d Merge pull request 'Lock file maintenance' (#211) from renovate/lock-file-maintenance into main 2025-10-25 04:13:05 +02:00
Renovate Bot
29a3e6b1cd Lock file maintenance 2025-10-25 02:12:57 +00:00
bot
d3f825ccb3 Merge pull request 'Lock file maintenance' (#210) from renovate/lock-file-maintenance into main 2025-10-19 04:04:29 +02:00
Renovate Bot
d1ef3a5d69 Lock file maintenance 2025-10-19 02:04:25 +00:00
bot
b1b1f4959c Merge pull request 'Lock file maintenance' (#209) from renovate/lock-file-maintenance into main 2025-10-18 04:05:16 +02:00
Renovate Bot
6079c9d32e Lock file maintenance 2025-10-18 02:05:09 +00:00
bot
ae5002aacf Merge pull request 'Lock file maintenance' (#208) from renovate/lock-file-maintenance into main 2025-10-12 04:04:47 +02:00
Renovate Bot
931e3104f2 Lock file maintenance 2025-10-12 02:04:43 +00:00
bot
c1d7b717f2 Merge pull request 'Lock file maintenance' (#207) from renovate/lock-file-maintenance into main 2025-10-11 04:04:28 +02:00
Renovate Bot
d5f07f1b52 Lock file maintenance 2025-10-11 02:04:24 +00:00
soraefir
af1d183e5a Migrate new screen 2025-10-07 01:01:07 +02:00
bot
6c3c974812 Merge pull request 'Lock file maintenance' (#206) from renovate/lock-file-maintenance into main 2025-10-05 04:04:15 +02:00
Renovate Bot
25acea774a Lock file maintenance 2025-10-05 02:04:07 +00:00
Renovate Bot
f1cce84950 Lock file maintenance 2025-10-04 02:03:04 +00:00
Renovate Bot
abdc3d65af Lock file maintenance 2025-09-28 02:03:46 +00:00
Renovate Bot
0b1298c5cc Lock file maintenance 2025-09-27 02:04:03 +00:00
Renovate Bot
ab42b366da Lock file maintenance 2025-09-21 02:03:26 +00:00
Renovate Bot
a5622e5f55 Lock file maintenance 2025-09-20 02:03:29 +00:00
soraefir
d8cdfa4c54 kanshi & gamemode 2025-09-17 14:42:44 +02:00
Renovate Bot
211ef28e43 Lock file maintenance 2025-09-14 02:03:40 +00:00
Renovate Bot
66edf1fbfc Lock file maintenance 2025-09-13 02:04:01 +00:00
Renovate Bot
6239e08920 Update DeterminateSystems/nix-installer-action action to v20 2025-09-10 02:01:20 +00:00
Renovate Bot
ed3d676a9d Lock file maintenance 2025-09-07 02:12:41 +00:00
soraefir
1576181ed2 Sops & more 2025-09-06 15:39:03 +02:00
soraefir
165791bbdb fix steam & vcam 2025-09-06 15:39:03 +02:00
0650ff3933 Update systems/sandbox/default.nix 2025-09-06 15:07:13 +02:00
Renovate Bot
5423790903 Update actions/checkout action to v5 2025-08-12 02:01:58 +00:00
Renovate Bot
7925012c03 Lock file maintenance 2025-08-10 02:07:01 +00:00
Renovate Bot
7e4ef81aa1 Lock file maintenance 2025-08-09 02:07:51 +00:00
Renovate Bot
73a90212a3 Lock file maintenance 2025-08-03 02:03:46 +00:00
Renovate Bot
925c8a0b3f Lock file maintenance 2025-08-02 02:05:05 +00:00
Renovate Bot
30226099e7 Lock file maintenance 2025-07-27 02:07:00 +00:00
Renovate Bot
991898884d Lock file maintenance 2025-07-26 02:07:07 +00:00
Renovate Bot
38e24429ea Update DeterminateSystems/update-flake-lock action to v27 2025-07-20 04:02:49 +02:00
Renovate Bot
44aa8c7ec4 Update DeterminateSystems/magic-nix-cache-action action to v13 2025-07-20 02:02:44 +00:00
Renovate Bot
4f71551caa Update DeterminateSystems/nix-installer-action action to v19 2025-07-19 02:09:21 +00:00
Renovate Bot
ff13963b35 Update DeterminateSystems/flake-checker-action action to v12 2025-07-16 02:07:28 +00:00
Renovate Bot
7c9b43cafa Lock file maintenance 2025-07-13 02:09:23 +00:00
Renovate Bot
7369d9157b Lock file maintenance 2025-07-12 02:04:00 +00:00
soraefir
ce239b5530 scad 2025-07-08 23:08:11 +02:00
Renovate Bot
3760180d73 Update DeterminateSystems/update-flake-lock action to v26 2025-07-06 02:02:48 +00:00
Renovate Bot
1968a1d4f6 Update DeterminateSystems/magic-nix-cache-action action to v12 2025-07-06 02:02:41 +00:00
Renovate Bot
d98f06b0b0 Update DeterminateSystems/nix-installer-action action to v18 2025-07-05 02:10:18 +00:00
Renovate Bot
6639999e9a Update DeterminateSystems/flake-checker-action action to v11 2025-07-04 02:09:28 +00:00
soraefir
aa34956969 cgal 2025-06-29 23:41:04 +02:00
Renovate Bot
6a7af294dd Lock file maintenance 2025-06-29 02:10:31 +00:00
Renovate Bot
46a6bf1fe1 Lock file maintenance 2025-06-28 02:04:20 +00:00
Renovate Bot
c62d093b19 Lock file maintenance 2025-06-22 02:03:52 +00:00
Renovate Bot
4f9b1630cd Lock file maintenance 2025-06-21 02:04:46 +00:00
Renovate Bot
dc350cd669 Update DeterminateSystems/magic-nix-cache-action action to v11 2025-06-17 02:01:37 +00:00
Renovate Bot
07df68fc19 Lock file maintenance 2025-06-15 02:04:15 +00:00
Renovate Bot
1cd9d6ccbf Lock file maintenance 2025-06-14 02:03:38 +00:00
Renovate Bot
56ed6f2fa8 Update DeterminateSystems/magic-nix-cache-action action to v10 2025-06-11 02:03:40 +00:00
soraefir
4c1ef61375 added mimes 2025-06-09 08:43:28 +02:00
soraefir
139d33ae2d pastelle default 2025-06-09 08:30:31 +02:00
soraefir
71443cfbc1 updated colors 2025-06-08 20:10:56 +02:00
soraefir
db69b419b6 Upgrade to 25.05 2025-06-08 16:01:29 +02:00
soraefir
4346ec7232 new colors ? 2025-06-08 15:34:49 +02:00
soraefir
49469b4962 New power & no bamboo & sh3d 2025-06-08 15:34:49 +02:00
Renovate Bot
a2ef475040 Lock file maintenance 2025-06-08 02:04:44 +00:00
Renovate Bot
42952cc19b Lock file maintenance 2025-06-07 02:04:51 +00:00
Renovate Bot
110ff51e9e Lock file maintenance 2025-06-01 02:03:48 +00:00
Renovate Bot
712f263c6c Lock file maintenance 2025-05-31 02:04:59 +00:00
Renovate Bot
cc3cd50852 Update DeterminateSystems/flake-checker-action action to v10 2025-05-31 02:03:42 +00:00
Renovate Bot
56533cfeb1 Lock file maintenance 2025-05-25 02:03:18 +00:00
Renovate Bot
272587d9ab Lock file maintenance 2025-05-24 02:04:20 +00:00
Renovate Bot
2629e7c873 Lock file maintenance 2025-05-18 02:03:47 +00:00
Renovate Bot
71d1f30920 Lock file maintenance 2025-05-17 02:10:23 +00:00
Renovate Bot
29027c39d6 Update DeterminateSystems/update-flake-lock action to v25 2025-05-17 02:08:56 +00:00
Renovate Bot
fde8c67d5b Lock file maintenance 2025-05-11 02:06:53 +00:00
Renovate Bot
209bc82941 Lock file maintenance 2025-05-10 02:08:25 +00:00
Renovate Bot
06d3c576ff Lock file maintenance 2025-05-04 02:04:08 +00:00
Renovate Bot
d29d622b54 Lock file maintenance 2025-05-03 02:04:42 +00:00
Renovate Bot
b05c1c9261 Lock file maintenance 2025-04-27 02:05:07 +00:00
Renovate Bot
6227d69f5c Lock file maintenance 2025-04-26 02:05:13 +00:00
Renovate Bot
e99f5df33a Update DeterminateSystems/nix-installer-action action to v17 2025-04-25 02:01:53 +00:00
Renovate Bot
7fa3301ad7 Lock file maintenance 2025-04-20 02:04:09 +00:00
Renovate Bot
e31da30d09 Lock file maintenance 2025-04-19 02:04:35 +00:00
Renovate Bot
833b7b35b1 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Waiting to run
Nix Build / build-nixos (push) Failing after 5m31s
2025-04-13 02:04:40 +00:00
Renovate Bot
b94ce739b7 Lock file maintenance
Some checks failed
Nix Build / build-nixos (push) Has started running
Nix Build / build-nixos (pull_request) Failing after 4h46m56s
2025-04-12 02:04:11 +00:00
Renovate Bot
114831b04c Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1h11m39s
Nix Build / build-nixos (push) Has been cancelled
2025-04-11 02:03:58 +00:00
soraefir
e94516a8bc bambulab fix
Some checks failed
Nix Build / build-nixos (push) Failing after 1h10m40s
2025-04-10 19:37:04 +02:00
Renovate Bot
407f3833ab Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 22m33s
Nix Build / build-nixos (push) Successful in 7m26s
2025-04-05 02:05:09 +00:00
Renovate Bot
881d6ceacc Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 6m48s
Nix Build / build-nixos (push) Waiting to run
2025-03-30 02:04:56 +00:00
soraefir
ee4ce37d3f Fix Hypr & add 25.05 comments
All checks were successful
Nix Build / build-nixos (push) Successful in 10m2s
2025-03-29 21:50:36 +01:00
Renovate Bot
4a1bb88e6e Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m45s
Nix Build / build-nixos (push) Successful in 7m29s
2025-03-25 02:04:17 +00:00
07637d826d Update shells/devsh/default.nix
All checks were successful
Nix Build / build-nixos (push) Successful in 6m33s
2025-03-24 18:58:04 +01:00
Renovate Bot
6a69546fad Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 9m53s
Nix Build / build-nixos (push) Successful in 7m16s
2025-03-22 02:09:10 +00:00
Renovate Bot
ffb710a68f Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Waiting to run
Nix Build / build-nixos (push) Failing after 37m21s
2025-03-16 02:03:44 +00:00
Renovate Bot
770b3acddf Update cachix/install-nix-action action to v31
All checks were successful
Nix Build / build-nixos (push) Successful in 8m51s
2025-03-15 02:03:22 +00:00
Renovate Bot
6ee70b0d1f Update cachix/cachix-action action to v16
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 8m22s
Nix Build / build-nixos (push) Waiting to run
2025-03-11 02:01:17 +00:00
Renovate Bot
51e08f1cc7 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 8m41s
Nix Build / build-nixos (push) Successful in 8m18s
2025-03-08 02:05:05 +00:00
Renovate Bot
339404a312 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Successful in 8m54s
Nix Build / build-nixos (push) Failing after 2h6m16s
2025-03-02 02:05:39 +00:00
Renovate Bot
1c68ef2023 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 8m24s
Nix Build / build-nixos (push) Waiting to run
2025-03-01 02:04:48 +00:00
Renovate Bot
fd0bfcf00d Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 8m58s
Nix Build / build-nixos (push) Successful in 7m49s
2025-02-23 02:03:53 +00:00
Renovate Bot
fdcb0ede25 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 7m35s
Nix Build / build-nixos (push) Waiting to run
2025-02-22 02:04:23 +00:00
soraefir
74182b2a3e fix umu
All checks were successful
Nix Build / build-nixos (push) Successful in 24m26s
2025-02-21 23:53:13 +01:00
soraefir
12646765c2 Disabled user sops for now
Some checks failed
Nix Build / build-nixos (push) Failing after 2m9s
2025-02-21 21:48:43 +01:00
soraefir
495862c294 Removed umu input 2025-02-21 21:47:39 +01:00
Renovate Bot
c54376b937 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 2m35s
Nix Build / build-nixos (push) Failing after 2m31s
2025-02-15 02:08:21 +00:00
Renovate Bot
11a902d741 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 2m30s
Nix Build / build-nixos (push) Failing after 2m37s
2025-02-09 02:07:14 +00:00
Renovate Bot
7dbc9824ef Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 2m28s
Nix Build / build-nixos (push) Failing after 2m31s
2025-02-08 02:07:36 +00:00
Renovate Bot
06ece39078 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m43s
Nix Build / build-nixos (push) Failing after 1m45s
2025-02-02 02:04:48 +00:00
Renovate Bot
8cc274d4ab Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m40s
Nix Build / build-nixos (push) Waiting to run
2025-02-01 02:08:05 +00:00
Renovate Bot
5538d67bc9 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m44s
Nix Build / build-nixos (push) Failing after 1m46s
2025-01-26 02:05:12 +00:00
Renovate Bot
fd9e41cec3 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m40s
Nix Build / build-nixos (push) Waiting to run
2025-01-25 02:06:21 +00:00
Renovate Bot
2ea10a944a Update DeterminateSystems/magic-nix-cache-action action to v9
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m38s
Nix Build / build-nixos (push) Failing after 1m50s
2025-01-22 02:01:50 +00:00
Renovate Bot
b42ccab3d3 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1m2s
Nix Build / build-nixos (push) Failing after 57s
2025-01-19 01:03:55 +00:00
Renovate Bot
42ace39326 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 58s
Nix Build / build-nixos (push) Waiting to run
2025-01-18 01:05:14 +00:00
Renovate Bot
6433fe8a3a Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 49s
Nix Build / build-nixos (push) Failing after 57s
2025-01-12 01:03:56 +00:00
Renovate Bot
2affae6854 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 56s
Nix Build / build-nixos (push) Failing after 49s
2025-01-11 01:04:08 +00:00
Renovate Bot
95293dc629 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 49s
Nix Build / build-nixos (push) Failing after 49s
2025-01-05 01:04:04 +00:00
Renovate Bot
f291f13f33 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 49s
Nix Build / build-nixos (push) Failing after 49s
2025-01-04 01:03:56 +00:00
Renovate Bot
1b1caad2d1 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 49s
Nix Build / build-nixos (push) Waiting to run
2024-12-29 01:03:40 +00:00
Renovate Bot
9318aa095e Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 48s
Nix Build / build-nixos (push) Failing after 50s
2024-12-28 01:04:11 +00:00
soraefir
fd6a3151ce fix lock
Some checks failed
Nix Build / build-nixos (push) Failing after 53s
2024-12-24 16:21:39 +01:00
soraefir
40b827d4ca wow cfg 2024-12-23 20:26:31 +01:00
1410c0c39f Merge pull request 'Lock file maintenance' (#120) from renovate/lock-file-maintenance into main
All checks were successful
Nix Build / build-nixos (push) Successful in 5m43s
Reviewed-on: #120
2024-12-22 15:30:10 +01:00
Renovate Bot
8d68938abd Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 6m50s
Nix Build / build-nixos (pull_request) Successful in 6m44s
2024-12-22 01:04:08 +00:00
Renovate Bot
3d7d29934c Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m42s
Nix Build / build-nixos (push) Successful in 6m40s
2024-12-21 01:05:08 +00:00
Renovate Bot
877f516788 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 6m22s
Nix Build / build-nixos (push) Waiting to run
2024-12-15 01:04:00 +00:00
Renovate Bot
2ebd8c4fea Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 8m16s
Nix Build / build-nixos (push) Successful in 6m26s
2024-12-14 07:48:40 +00:00
Renovate Bot
bb0f40a755 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 8m32s
Nix Build / build-nixos (push) Waiting to run
2024-12-08 01:05:33 +00:00
Renovate Bot
e7e632fab4 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m48s
Nix Build / build-nixos (push) Successful in 9m16s
2024-12-07 01:03:35 +00:00
soraefir
c928fbd14b New flake.log
All checks were successful
Nix Build / build-nixos (push) Successful in 6m57s
2024-12-06 02:22:36 +01:00
soraefir
0d17b0650a Lock file maintenace
All checks were successful
Nix Build / build-nixos (push) Successful in 28m6s
2024-12-03 19:03:58 +01:00
soraefir
dbc2aee14b removed old hyprland config 2024-12-03 19:02:52 +01:00
Renovate Bot
95cbbf591f Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 5m51s
Nix Build / build-nixos (push) Failing after 6m22s
2024-12-01 01:03:52 +00:00
Renovate Bot
58cfdb4fd2 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 6m39s
Nix Build / build-nixos (push) Waiting to run
2024-11-30 01:03:30 +00:00
Renovate Bot
b77863f8f9 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 14m15s
Nix Build / build-nixos (push) Successful in 8m56s
2024-11-24 01:05:22 +00:00
Renovate Bot
ee3380b501 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 9m9s
Nix Build / build-nixos (push) Successful in 8m38s
2024-11-23 01:03:12 +00:00
soraefir
5d68b291ba Fix & Update versions
All checks were successful
Nix Build / build-nixos (push) Successful in 26m31s
2024-11-21 01:21:48 +01:00
Renovate Bot
1e89d5880b Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 7m41s
Nix Build / build-nixos (push) Failing after 8m0s
2024-11-17 01:03:06 +00:00
Renovate Bot
f733d9dbc4 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 9m53s
Nix Build / build-nixos (push) Waiting to run
2024-11-16 01:03:28 +00:00
Renovate Bot
f8816df0d2 Update DeterminateSystems/nix-installer-action action to v16
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 16m44s
Nix Build / build-nixos (push) Failing after 17m24s
2024-11-15 01:00:31 +00:00
Renovate Bot
4c09698f8d Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 13m44s
Nix Build / build-nixos (push) Failing after 12m44s
2024-11-10 01:03:19 +00:00
Renovate Bot
724ebb4d27 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 14m29s
Nix Build / build-nixos (push) Failing after 14m41s
2024-11-09 05:25:38 +00:00
Renovate Bot
cbe331644c Update DeterminateSystems/nix-installer-action action to v15
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 9m38s
Nix Build / build-nixos (push) Successful in 9m13s
2024-11-05 01:00:33 +00:00
Renovate Bot
121ea423b3 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 10m15s
Nix Build / build-nixos (push) Successful in 10m0s
2024-11-03 01:04:08 +00:00
Renovate Bot
47d87a9bec Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 9m14s
Nix Build / build-nixos (push) Waiting to run
2024-11-02 01:04:02 +00:00
soraefir
f84d4e696a Flakes stable
All checks were successful
Nix Build / build-nixos (push) Successful in 14m49s
2024-10-28 20:13:25 +01:00
soraefir
87f12a228a 24.11
Some checks failed
Nix Build / build-nixos (push) Failing after 56s
2024-10-28 19:56:06 +01:00
19c3f68543 Update modules/home/wayland/hyprland/config.nix
Some checks failed
Nix Build / build-nixos (push) Failing after 55s
2024-10-28 19:52:10 +01:00
Renovate Bot
36a44b9355 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 52s
Nix Build / build-nixos (push) Failing after 53s
2024-10-27 01:03:24 +00:00
Renovate Bot
adbabf4eea Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 53s
Nix Build / build-nixos (push) Waiting to run
2024-10-27 00:03:57 +00:00
Renovate Bot
ea9b423c9d Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 54s
Nix Build / build-nixos (push) Failing after 55s
2024-10-26 00:03:43 +00:00
551902a03e Merge pull request 'Lock file maintenance' (#99) from renovate/lock-file-maintenance into main
All checks were successful
Nix Build / build-nixos (push) Successful in 6m31s
Reviewed-on: #99
2024-10-20 13:38:54 +02:00
Renovate Bot
47880e6ab5 Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 8m58s
Nix Build / build-nixos (pull_request) Successful in 8m10s
2024-10-20 00:02:51 +00:00
Renovate Bot
5d929a23df Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 7m23s
Nix Build / build-nixos (push) Successful in 7m53s
2024-10-19 00:03:09 +00:00
Renovate Bot
4f91f0276a Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1h13m35s
Nix Build / build-nixos (push) Failing after 1h11m56s
2024-10-13 00:03:16 +00:00
Renovate Bot
3612103e2f Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 1h12m6s
Nix Build / build-nixos (push) Failing after 1h11m18s
2024-10-12 00:03:20 +00:00
Renovate Bot
7d10222740 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 20h35m44s
Nix Build / build-nixos (push) Failing after 12m12s
2024-10-06 00:03:51 +00:00
Renovate Bot
a1c7dc96da Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 7m33s
Nix Build / build-nixos (push) Successful in 7m55s
2024-10-05 00:04:06 +00:00
Renovate Bot
0eec6b6eef Update cachix/install-nix-action action to v30
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 7m15s
Nix Build / build-nixos (push) Waiting to run
2024-10-04 00:01:18 +00:00
Renovate Bot
83ea710f1c Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m56s
Nix Build / build-nixos (push) Successful in 7m18s
2024-09-29 00:03:35 +00:00
Renovate Bot
9cb14a2882 Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 7m2s
2024-09-28 00:03:37 +00:00
Renovate Bot
ab9074c324 Update cachix/install-nix-action action to v29
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m38s
Nix Build / build-nixos (push) Successful in 6m47s
2024-09-27 00:01:19 +00:00
soraefir
f682198e22 Discord & Wine
Some checks failed
Nix Build / build-nixos (push) Failing after 1h10m34s
2024-09-23 20:01:52 +02:00
soraefir
cb0859f228 added lutris 2024-09-23 18:52:39 +02:00
Renovate Bot
e4ee6c5d2e Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 5m43s
Nix Build / build-nixos (push) Failing after 5m7s
2024-09-21 00:03:50 +00:00
soraefir
221250699c Update & Umu & Wine
Some checks failed
Nix Build / build-nixos (push) Failing after 5m54s
2024-09-17 10:33:57 +02:00
b00983cd21 Merge pull request 'Lock file maintenance' (#88) from renovate/lock-file-maintenance into main
All checks were successful
Nix Build / build-nixos (push) Successful in 6m4s
Reviewed-on: #88
2024-09-15 22:36:43 +02:00
Renovate Bot
9232d9a0fb Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 5m44s
Nix Build / build-nixos (pull_request) Successful in 6m5s
2024-09-15 00:03:00 +00:00
Renovate Bot
08a6485a1c Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 7m16s
2024-09-14 00:03:09 +00:00
Renovate Bot
8b3efcfc59 Update DeterminateSystems/magic-nix-cache-action action to v8
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 5m55s
Nix Build / build-nixos (push) Waiting to run
2024-09-12 00:02:00 +00:00
Renovate Bot
bdcf625ebc Update DeterminateSystems/update-flake-lock action to v24
All checks were successful
Nix Build / build-nixos (push) Successful in 6m28s
2024-09-11 02:36:52 +02:00
Renovate Bot
0d4a2a774e Update DeterminateSystems/nix-installer-action action to v14
Some checks are pending
Nix Build / build-nixos (push) Waiting to run
Nix Build / build-nixos (pull_request) Successful in 6m25s
2024-09-11 00:01:32 +00:00
Renovate Bot
87f2dd4fd4 Update DeterminateSystems/flake-checker-action action to v9
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m48s
Nix Build / build-nixos (push) Successful in 7m16s
2024-09-10 00:02:04 +00:00
90d5038a3f Update flake.nix
All checks were successful
Nix Build / build-nixos (push) Successful in 5m35s
2024-09-08 13:51:06 +02:00
bc3ce8d5b4 Update flake.nix
All checks were successful
Nix Build / build-nixos (push) Successful in 5m53s
2024-09-08 13:35:56 +02:00
soraefir
e732429365 update
All checks were successful
Nix Build / build-nixos (push) Successful in 16m34s
2024-09-08 11:41:40 +02:00
soraefir
deabe42bb6 version bump
Some checks failed
Nix Build / build-nixos (push) Failing after 8m57s
2024-09-04 06:24:23 +02:00
soraefir
a62b2faa2a eww version 2024-09-04 06:20:55 +02:00
soraefir
9fd47e218d Dialout group 2024-09-03 23:24:43 +02:00
soraefir
75480a3373 update
Some checks failed
Nix Build / build-nixos (push) Failing after 19m27s
2024-08-29 07:36:01 +02:00
e4dfead658 Update overlays/yarn-berry/default.nix
All checks were successful
Nix Build / build-nixos (push) Successful in 6m10s
2024-08-19 23:10:55 +02:00
soraefir
692b613613 Updates
All checks were successful
Nix Build / build-nixos (push) Successful in 5m59s
2024-08-18 10:36:21 +02:00
soraefir
38fd971314 telegraf+influx monitoring 2024-08-11 11:39:35 +02:00
soraefir
0b25204147 Added pavu & alsa tools 2024-08-11 11:39:35 +02:00
soraefir
c8fe860b6e Removed deprecated sound 2024-08-11 11:39:34 +02:00
Renovate Bot
c88ba54f77 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 53s
Nix Build / build-nixos (push) Failing after 54s
2024-07-28 00:03:06 +00:00
Renovate Bot
3216ca2a1b Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 53s
Nix Build / build-nixos (push) Failing after 52s
2024-07-27 00:12:30 +00:00
Renovate Bot
019d38c4ba Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 57s
Nix Build / build-nixos (push) Failing after 52s
2024-07-27 00:02:20 +00:00
Renovate Bot
94bb01c319 Update DeterminateSystems/nix-installer-action action to v13
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 52s
Nix Build / build-nixos (push) Waiting to run
2024-07-23 00:01:08 +00:00
Renovate Bot
7f5f35b7ca Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 56s
Nix Build / build-nixos (push) Failing after 55s
2024-07-21 00:03:03 +00:00
Renovate Bot
68a75ad255 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 54s
Nix Build / build-nixos (push) Waiting to run
2024-07-20 00:03:20 +00:00
Renovate Bot
d19f8ea9e1 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 8m41s
Nix Build / build-nixos (push) Successful in 6m3s
2024-07-14 00:03:40 +00:00
Renovate Bot
df5fd60d6b Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 3m54s
Nix Build / build-nixos (push) Waiting to run
2024-07-13 00:03:32 +00:00
soraefir
803339c49e Fix Hyprland config & new wifi
All checks were successful
Nix Build / build-nixos (push) Successful in 5m43s
2024-07-10 23:12:59 +02:00
Renovate Bot
8f9b785468 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 8m8s
Nix Build / build-nixos (push) Successful in 5m42s
2024-07-07 00:03:41 +00:00
Renovate Bot
4d3b504446 Lock file maintenance
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 6m29s
Nix Build / build-nixos (push) Waiting to run
2024-07-06 00:03:43 +00:00
soraefir
9356deca2c Graphics
All checks were successful
Nix Build / build-nixos (push) Successful in 16m11s
2024-07-03 22:10:11 +02:00
Renovate Bot
92d0dad938 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 55s
Nix Build / build-nixos (push) Failing after 54s
2024-06-30 00:03:28 +00:00
Renovate Bot
fe61140415 Lock file maintenance
Some checks failed
Nix Build / build-nixos (pull_request) Failing after 55s
Nix Build / build-nixos (push) Waiting to run
2024-06-29 00:03:47 +00:00
Renovate Bot
d39d4ac640 Update DeterminateSystems/update-flake-lock action to v23
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 5m57s
Nix Build / build-nixos (push) Successful in 6m7s
2024-06-29 00:02:09 +00:00
Renovate Bot
36d51f01a3 Lock file maintenance
All checks were successful
Nix Build / build-nixos (push) Successful in 6m36s
Nix Build / build-nixos (pull_request) Successful in 5m50s
2024-06-15 00:03:04 +00:00
Renovate Bot
858b38200c Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 7m27s
Nix Build / build-nixos (push) Successful in 6m58s
2024-06-09 07:14:53 +00:00
Renovate Bot
81a600de00 Lock file maintenance
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m52s
Nix Build / build-nixos (push) Successful in 6m50s
2024-06-08 00:02:07 +00:00
Renovate Bot
8712d7a8d1 Update DeterminateSystems/update-flake-lock action to v22
Some checks are pending
Nix Build / build-nixos (pull_request) Successful in 5m39s
Nix Build / build-nixos (push) Waiting to run
2024-06-06 00:00:47 +00:00
Renovate Bot
367cd0b827 Update DeterminateSystems/nix-installer-action action to v12
All checks were successful
Nix Build / build-nixos (push) Successful in 8m10s
2024-06-05 02:23:52 +02:00
Renovate Bot
611d898b99 Update DeterminateSystems/magic-nix-cache-action action to v7
Some checks are pending
Nix Build / build-nixos (push) Waiting to run
Nix Build / build-nixos (pull_request) Successful in 6m29s
2024-06-05 00:01:22 +00:00
Renovate Bot
7efc00e324 Update DeterminateSystems/flake-checker-action action to v8
All checks were successful
Nix Build / build-nixos (pull_request) Successful in 6m26s
Nix Build / build-nixos (push) Successful in 6m39s
2024-06-04 00:01:18 +00:00
128 changed files with 5150 additions and 1981 deletions

View File

@@ -12,17 +12,17 @@ jobs:
build-nixos: build-nixos:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v6
- name: "Install Nix ❄️" - name: "Install Nix ❄️"
uses: cachix/install-nix-action@v27 uses: cachix/install-nix-action@v31
# - uses: DeterminateSystems/nix-installer-action@v4 # - uses: DeterminateSystems/nix-installer-action@v4
- uses: DeterminateSystems/magic-nix-cache-action@v6 - uses: DeterminateSystems/magic-nix-cache-action@v13
- uses: DeterminateSystems/flake-checker-action@v7 - uses: DeterminateSystems/flake-checker-action@v12
- name: "Install Cachix ❄️" - name: "Install Cachix ❄️"
uses: cachix/cachix-action@v15 uses: cachix/cachix-action@v17
with: with:
name: helcel name: helcel
authToken: "${{ secrets.CACHIX_AUTH_TOKEN }}" authToken: "${{ secrets.CACHIX_AUTH_TOKEN }}"

View File

@@ -13,15 +13,15 @@ jobs:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- name: Checkout repository - name: Checkout repository
uses: actions/checkout@v4 uses: actions/checkout@v6
- name: Install nix - name: Install nix
uses: DeterminateSystems/nix-installer-action@v11 uses: DeterminateSystems/nix-installer-action@v22
with: with:
github-token: ${{ secrets.GH_TOKEN_FOR_UPDATES }} github-token: ${{ secrets.GH_TOKEN_FOR_UPDATES }}
extra_nix_config: | extra_nix_config: |
experimental-features = nix-command flakes experimental-features = nix-command flakes
- name: Update flake.lock - name: Update flake.lock
uses: DeterminateSystems/update-flake-lock@v21 uses: DeterminateSystems/update-flake-lock@v28
with: with:
token: ${{ secrets.GT_TOKEN_FOR_UPDATES }} token: ${{ secrets.GT_TOKEN_FOR_UPDATES }}
pr-title: "[chore] Update flake.lock" pr-title: "[chore] Update flake.lock"

1
.gitignore vendored
View File

@@ -2,3 +2,4 @@ result
age-key.txt age-key.txt
.decrypted~common.yaml .decrypted~common.yaml
.decrypted* .decrypted*
.tmp

View File

@@ -9,6 +9,8 @@ keys:
- &avalon age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg - &avalon age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
- &valinor age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg - &valinor age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
- &asgard age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg - &asgard age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
- &gateway age1lqvnzlendlmtwgstzrj4xzrwpatwx56k5az5au78fyg99yecwfzs3s6xn6
- &sandbox age1pf4auk6u2tmefuqpuc6mntr26cp4wcsmlhnn98arzxsp3753ruqsj0jqk3
creation_rules: creation_rules:
- path_regex: modules/shared/sops/private/iriy.[a-z]+ - path_regex: modules/shared/sops/private/iriy.[a-z]+
@@ -43,6 +45,7 @@ creation_rules:
- *iriy - *iriy
- *avalon - *avalon
- *asgard - *asgard
- *gateway
pgp: pgp:
- *sora - *sora
@@ -50,14 +53,13 @@ creation_rules:
key_groups: key_groups:
- age: - age:
- *ci - *ci
- *sandbox
- path_regex: modules/server/sops/server.[a-z]+ - path_regex: modules/server/sops/server.[a-z]+
key_groups: key_groups:
- age: - age:
- *valinor
- *iriy
- *avalon - *avalon
- *asgard - *sandbox
pgp: pgp:
- *sora - *sora

311
flake.lock generated
View File

@@ -4,17 +4,16 @@
"inputs": { "inputs": {
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"haskell-flake": "haskell-flake", "haskell-flake": "haskell-flake",
"hercules-ci-effects": "hercules-ci-effects",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1714877287, "lastModified": 1770259557,
"narHash": "sha256-mf1/RfkyhzwLLeqU8AdosbBfRQuQzuVMX7XL7GejoRI=", "narHash": "sha256-EvZ09k9+mzXAngPzU2K7oLLUDlKoT1numb4bDb3Gtl4=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "arion", "repo": "arion",
"rev": "e9945eb6cdaf5c946bacd5a330e7b5ac7b3b2fdd", "rev": "9b24cf65c72cb0e9616e437d55e1ac8e5c6bc715",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -46,11 +45,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1716993688, "lastModified": 1777780666,
"narHash": "sha256-vo5k2wQekfeoq/2aleQkBN41dQiQHNTniZeVONWiWLs=", "narHash": "sha256-8wURyQMdDkGUarSTKOGdCuFfYiwa3HbzwscUfn3STDE=",
"owner": "lnl7", "owner": "lnl7",
"repo": "nix-darwin", "repo": "nix-darwin",
"rev": "c0d5b8c54d6828516c97f6be9f2d00c63a363df4", "rev": "8c62fba0854ba15c8917aed18894dbccb48a3777",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -68,11 +67,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1714641030, "lastModified": 1769996383,
"narHash": "sha256-yzcRNDoyVP7+SCNX0wmuDju1NUCt8Dz9+lyUXEI0dbI=", "narHash": "sha256-AnYjnFWgS49RlqX7LrC4uA+sCCDBj0Ry/WOJ5XWAsa0=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "e5d10a24b66c3ea8f150e47dfdb0416ab7c3390e", "rev": "57928607ea566b5db3ad13af0e57e921e6b12381",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -84,31 +83,31 @@
"flake-parts_2": { "flake-parts_2": {
"inputs": { "inputs": {
"nixpkgs-lib": [ "nixpkgs-lib": [
"arion", "nur",
"hercules-ci-effects",
"nixpkgs" "nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1712014858, "lastModified": 1733312601,
"narHash": "sha256-sB4SWl2lX95bExY2gMFG5HIzvva5AVMJd4Igm+GpZNw=", "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "9126214d0a59633752a136528f5f3b9aa8565b7d", "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
"id": "flake-parts", "owner": "hercules-ci",
"type": "indirect" "repo": "flake-parts",
"type": "github"
} }
}, },
"hardware": { "hardware": {
"locked": { "locked": {
"lastModified": 1717248095, "lastModified": 1778143761,
"narHash": "sha256-e8X2eWjAHJQT82AAN+mCI0B68cIDBJpqJ156+VRrFO0=", "narHash": "sha256-lkesY6x2X2qxlqLM7CT2iM/0rP2JB7fruPN3h8POXmI=",
"owner": "nixos", "owner": "nixos",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "7b49d3967613d9aacac5b340ef158d493906ba79", "rev": "3bcaa367d4c550d687a17ac792fd5cda214ee871",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -133,28 +132,6 @@
"type": "github" "type": "github"
} }
}, },
"hercules-ci-effects": {
"inputs": {
"flake-parts": "flake-parts_2",
"nixpkgs": [
"arion",
"nixpkgs"
]
},
"locked": {
"lastModified": 1713898448,
"narHash": "sha256-6q6ojsp/Z9P2goqnxyfCSzFOD92T3Uobmj8oVAicUOs=",
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"rev": "c0302ec12d569532a6b6bd218f698bc402e93adc",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"type": "github"
}
},
"home-manager": { "home-manager": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@@ -162,152 +139,20 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1717097707, "lastModified": 1777851538,
"narHash": "sha256-HC5vJ3oYsjwsCaSbkIPv80e4ebJpNvFKQTBOGlHvjLs=", "narHash": "sha256-Gp8qwTEYNoy2yvmErVGlvLOQvrtEECCAKbonW7VJef8=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "0eb314b4f0ba337e88123e0b1e57ef58346aafd9", "rev": "cc09c0f9b7eaa95c2d9827338a5eb03d32505ca5",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-25.11",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
}, },
"hyprcursor": {
"inputs": {
"hyprlang": [
"hyprland",
"hyprlang"
],
"nixpkgs": [
"hyprland",
"nixpkgs"
],
"systems": [
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1716576411,
"narHash": "sha256-FIN1wMoyePBTtibCbaeJaoKNLuAYIGwLCWAYC1DJanw=",
"owner": "hyprwm",
"repo": "hyprcursor",
"rev": "57298fc4f13c807e50ada2c986a3114b7fc2e621",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprcursor",
"type": "github"
}
},
"hyprland": {
"inputs": {
"hyprcursor": "hyprcursor",
"hyprlang": "hyprlang",
"hyprwayland-scanner": "hyprwayland-scanner",
"nixpkgs": [
"nixpkgs"
],
"systems": "systems",
"xdph": "xdph"
},
"locked": {
"lastModified": 1717267530,
"narHash": "sha256-hTpp0FFf2EcSsOqPxuOgZKYxyHhKRzjNrd4skt9rXRQ=",
"ref": "refs/heads/main",
"rev": "0ebb43c1a37e7321e5ed7223ea85ed555cc82735",
"revCount": 4753,
"submodules": true,
"type": "git",
"url": "https://github.com/hyprwm/Hyprland"
},
"original": {
"submodules": true,
"type": "git",
"url": "https://github.com/hyprwm/Hyprland"
}
},
"hyprland-protocols": {
"inputs": {
"nixpkgs": [
"hyprland",
"xdph",
"nixpkgs"
],
"systems": [
"hyprland",
"xdph",
"systems"
]
},
"locked": {
"lastModified": 1691753796,
"narHash": "sha256-zOEwiWoXk3j3+EoF3ySUJmberFewWlagvewDRuWYAso=",
"owner": "hyprwm",
"repo": "hyprland-protocols",
"rev": "0c2ce70625cb30aef199cb388f99e19a61a6ce03",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprland-protocols",
"type": "github"
}
},
"hyprlang": {
"inputs": {
"nixpkgs": [
"hyprland",
"nixpkgs"
],
"systems": [
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1716473782,
"narHash": "sha256-+qLn4lsHU6iL3+HTo1gTQ1tWzet8K9h+IfVemzEQZj8=",
"owner": "hyprwm",
"repo": "hyprlang",
"rev": "87d5d984109c839482b88b4795db073eb9ed446f",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprlang",
"type": "github"
}
},
"hyprwayland-scanner": {
"inputs": {
"nixpkgs": [
"hyprland",
"nixpkgs"
],
"systems": [
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1716058375,
"narHash": "sha256-CwjWoVnBZE5SBpRx9dgSQGCr4Goxyfcyv3zZbOhVqzk=",
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"rev": "3afed4364790aebe0426077631af1e164a9650cc",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "hyprwayland-scanner",
"type": "github"
}
},
"nix-colors": { "nix-colors": {
"inputs": { "inputs": {
"base16-schemes": "base16-schemes", "base16-schemes": "base16-schemes",
@@ -327,18 +172,34 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs": { "nixUnstable": {
"locked": { "locked": {
"lastModified": 1716948383, "lastModified": 1778274207,
"narHash": "sha256-SzDKxseEcHR5KzPXLwsemyTR/kaM9whxeiJohbL04rs=", "narHash": "sha256-I4puXmX1iovcCHZlRmztO3vW0mAbbRvq4F8wgIMQ1MM=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "ad57eef4ef0659193044870c731987a6df5cf56b", "rev": "b3da656039dc7a6240f27b2ef8cc6a3ef3bccae7",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "nixos-unstable", "ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1778003029,
"narHash": "sha256-q/nkKLDtHIyLjZpKhWk3cSK5IYsFqtMd6UtXF3ddjgA=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "0c88e1f2bdb93d5999019e99cb0e61e1fe2af4c5",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-25.11",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@@ -358,13 +219,33 @@
"type": "github" "type": "github"
} }
}, },
"nur": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1717274801, "lastModified": 1777954456,
"narHash": "sha256-S4pz7vSZ4M+rKtn8bPBx3RjkkYO66cBRsacpZJVTVCk=", "narHash": "sha256-hGdgeU2Nk87RAuZyYjyDjFL6LK7dAZN5RE9+hrDTkDU=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "549bd84d6279f9852cae6225e372cc67fb91a4c1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nur": {
"inputs": {
"flake-parts": "flake-parts_2",
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1778376280,
"narHash": "sha256-pL2F2FF2FN7zWr5o/vG7GiYOSjp+DUNyPIYqNaLQFFs=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nur", "repo": "nur",
"rev": "6e8ae8d6738d7f739baa91dbc0b48a0e16f04f55", "rev": "828688994167eb57628c98fd1d7e1223b079cda1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -379,8 +260,8 @@
"darwin": "darwin", "darwin": "darwin",
"hardware": "hardware", "hardware": "hardware",
"home-manager": "home-manager", "home-manager": "home-manager",
"hyprland": "hyprland",
"nix-colors": "nix-colors", "nix-colors": "nix-colors",
"nixUnstable": "nixUnstable",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nur": "nur", "nur": "nur",
"sops-nix": "sops-nix" "sops-nix": "sops-nix"
@@ -390,17 +271,14 @@
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
],
"nixpkgs-stable": [
"nixpkgs"
] ]
}, },
"locked": { "locked": {
"lastModified": 1716692524, "lastModified": 1777944972,
"narHash": "sha256-sALodaA7Zkp/JD6ehgwc0UCBrSBfB4cX66uFGTsqeFU=", "narHash": "sha256-VfGRo1qTBKOe3s2gOv8LSoA6Fk19PvBlwQ1ECN0Evn8=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "962797a8d7f15ed7033031731d0bb77244839960", "rev": "c591bf665727040c6cc5cb409079acb22dcce33c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -408,51 +286,6 @@
"repo": "sops-nix", "repo": "sops-nix",
"type": "github" "type": "github"
} }
},
"systems": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"xdph": {
"inputs": {
"hyprland-protocols": "hyprland-protocols",
"hyprlang": [
"hyprland",
"hyprlang"
],
"nixpkgs": [
"hyprland",
"nixpkgs"
],
"systems": [
"hyprland",
"systems"
]
},
"locked": {
"lastModified": 1716290197,
"narHash": "sha256-1u9Exrc7yx9qtES2brDh7/DDZ8w8ap1nboIOAtCgeuM=",
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"rev": "91e48d6acd8a5a611d26f925e51559ab743bc438",
"type": "github"
},
"original": {
"owner": "hyprwm",
"repo": "xdg-desktop-portal-hyprland",
"type": "github"
}
} }
}, },
"root": "root", "root": "root",

View File

@@ -1,13 +1,14 @@
{ {
description = "SoraFlake"; description = "SoraFlake";
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; # Trick renovate into working: "github:NixOS/nixpkgs/nixpkgs-unstable"
nixUnstable.url = "github:nixos/nixpkgs/nixpkgs-unstable";
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.11";
hardware.url = "github:nixos/nixos-hardware"; hardware.url = "github:nixos/nixos-hardware";
nur.url = "github:nix-community/nur"; nur.url = "github:nix-community/nur";
home-manager = { home-manager = {
url = "github:nix-community/home-manager"; url = "github:nix-community/home-manager/release-25.11";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
@@ -16,20 +17,11 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
hyprland = {
url = "git+https://github.com/hyprwm/Hyprland?submodules=1";
inputs.nixpkgs.follows = "nixpkgs";
};
sops-nix = { sops-nix = {
url = "github:Mic92/sops-nix"; url = "github:Mic92/sops-nix";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
inputs.nixpkgs-stable.follows = "nixpkgs";
}; };
nix-colors.url = "github:misterio77/nix-colors"; nix-colors.url = "github:misterio77/nix-colors";
arion.url = "github:hercules-ci/arion";
arion.inputs.nixpkgs.follows = "nixpkgs";
}; };
outputs = inputs: outputs = inputs:
@@ -44,6 +36,7 @@
avalon = gen.generate { host = "avalon"; }; avalon = gen.generate { host = "avalon"; };
ci = gen.generate { host = "ci"; }; ci = gen.generate { host = "ci"; };
sandbox = gen.generate { host = "sandbox"; }; sandbox = gen.generate { host = "sandbox"; };
gateway = gen.generate { host = "gateway"; };
}; };
darwinConfigurations = { asgard = gen.generate { host = "asgard"; }; }; darwinConfigurations = { asgard = gen.generate { host = "asgard"; }; };
homeConfigurations = { homeConfigurations = {

View File

@@ -6,13 +6,13 @@
in ({ in ({
"nixos" = inputs.nixpkgs.lib.nixosSystem { "nixos" = inputs.nixpkgs.lib.nixosSystem {
system = syscfg.syscfg.system; system = syscfg.syscfg.system;
specialArgs = { inherit inputs; };
modules = [ modules = [
./modules/shared/syscfg ./modules/shared/syscfg
./modules/shared/sops ./modules/shared/sops
./modules/nixos ./modules/nixos
syscfg syscfg
./systems/${host} ./systems/${host}
inputs.arion.nixosModules.arion
inputs.sops-nix.nixosModules.sops inputs.sops-nix.nixosModules.sops
inputs.home-manager.nixosModules.home-manager inputs.home-manager.nixosModules.home-manager
{ {
@@ -28,7 +28,8 @@
syscfg syscfg
{ usercfg = userConfig; } { usercfg = userConfig; }
inputs.nix-colors.homeManagerModule inputs.nix-colors.homeManagerModule
inputs.hyprland.homeManagerModules.default # inputs.hyprland.homeManagerModules.default
inputs.sops-nix.homeManagerModules.sops
]; ];
}) syscfg.syscfg.users); }) syscfg.syscfg.users);
} }
@@ -52,7 +53,7 @@
nameValuePair userConfig.username { nameValuePair userConfig.username {
imports = [ imports = [
inputs.nix-colors.homeManagerModule inputs.nix-colors.homeManagerModule
inputs.hyprland.homeManagerModules inputs.sops-nix.homeManagerModules.sops
]; ];
}) syscfg.syscfg.users); }) syscfg.syscfg.users);
} }

View File

@@ -1,5 +1,6 @@
{ lib, config, ... }: { { lib, config, ... }: {
#environment.sessionVariables.SOPS_AGE_KEY_FILE = keyFilePath;
systemd.user.startServices = "sd-switch"; systemd.user.startServices = "sd-switch";
programs.home-manager.enable = true; programs.home-manager.enable = true;
@@ -7,6 +8,14 @@
username = "${config.usercfg.username}"; username = "${config.usercfg.username}";
homeDirectory = "/home/${config.usercfg.username}"; homeDirectory = "/home/${config.usercfg.username}";
stateVersion = "23.11"; stateVersion = "24.11";
}; };
#SOPS
# sops.defaultSopsFile = ./sops/${config.usercfg.username}.yaml;
# sops.age.keyFile = "/var/lib/sops-nix/age-key.txt";
# sops.age.generateKey = true;
# sops.secrets."github_user_key" = { };
# sops.secrets."curse_forge_key" = { };
} }

View File

@@ -0,0 +1,69 @@
curse_forge_key: ENC[AES256_GCM,data:PhhwPhUys/WDzXb40iFlrUcwFEJVzi49vDlm5Hpc7IUwbBiQI1Zvi6115THMvarnGESDyouPfoZP0wha,iv:x//EzR4QwdD0UxqV97yUepc39DopoqiDT21unpF9R2E=,tag:5jM1EibWo0wI+PS70+kb/Q==,type:str]
github_user_key: ENC[AES256_GCM,data:RvBsQjWGd2qRCvBzcpMv8FIXGY/GiPd9o0x2Oq+NlbXxR2NMqNBNLw==,iv:99AcmOWFft7XQAn7YrGjZuCvz0M5wUkYeInsWwyeUFM=,tag:wkw2YQGi9j/8XtOFd8KhdQ==,type:str]
sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age:
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBraWFDRFUxQ2l5OWV1OXNK
UExEbWZkM0kzVk1rZG4yY3pBLzdMVWVJS0UwCnhlWFJ5T2lZUXJyNkg1ejQxaU1t
L3F2RUhldTY3N2xXL0hwczNKRzNjcncKLS0tIEkycHoxcDBGNyt2V3RDY29wNGVp
TGg5Rk05VkRsaXM1Q0NxMmtMajRORDAKqjFldiAYJKjmnkeDkwanjYvhL6645DZ5
dVXExjqO/DG733ge8HFyKzpfpkzRymV1giUwxBdII1dd0mJ2ncINeA==
-----END AGE ENCRYPTED FILE-----
- recipient: age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB3UkRjblIvYStZUzQyRHA1
ZGVXeHhrN0kyVkxZdms5U3gwVFlPMW12MVJjCjRkVURpZXBzb0tYenB4dGxKamh6
VXVBMmo1Ujkvd2VTRExyWE5MbVJaclUKLS0tIDVhRkYzZmEzUG00Q2IwOWZUMVVt
ODVIbytpcjN1cVMyaG1qVVdkRmtaMzQKNsvD9DpK/raDBob+IcuNk72tQDts36kJ
QhtoLy8MvUymi49PdEWrgyf68w5XwRO/U4iINhR0qzm0glg/XcyHjA==
-----END AGE ENCRYPTED FILE-----
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJc3hKWkk3ckNOY2UyTVhG
MmtLaEd0K04yaGxiOUoxMXkzOEFnYis4VkhnCktDRFM2bS8vb05OWDdwa0RwRlNO
cmlZemtxVGZ6S0tNTDV1cmE1N0pVWnMKLS0tIE9EZllycHJpcEY2R1pwOFhOZEU3
L01IcytDd3BPb0VOTW9DQ2lUdUVJS0kKiD+C+3mK1b/eIwCEFanFgYGLNk3JNPQ7
i1UqzbHVxSd0q/YVwdKAcj0jA6EezGm275tgq7IVsy2sHkvRMaEDtQ==
-----END AGE ENCRYPTED FILE-----
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAweVU3TkxFZzRnd2I2clN2
ZTlTWmhwQkhVc1hnOXFvZVVDSWpHMVh1TGtrCkc3M1pUTnZCMHpvYXB5ZVhreGxa
ZVY2cG5Ja2ltL3k2Q1VEalc5TTNFMXcKLS0tIGd5UWl0RGVXT211Zm51dlB6WFZ1
STRtTVpVTCtVZ1FUNENqWFFVNTNuaVUKN6HRiZjTdENeif8dJ29urBxPXDaosjjY
InN4Ko6YUaGfvB1DTrKIzrxOpsHS+XjisoGfT71tJwwEOoREklEO/A==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-12-23T18:05:22Z"
mac: ENC[AES256_GCM,data:YSi2xIwz50VxUDL3QzGVUwRWUgZhvudSLCKgwIbWm8gkuAJ/V2sVRhJNVQJ1YvLO44ob5hmrgR4wSnOdAbS7FrpbLcJuoYBjVUTDjy+j6otnIDxEcYeciHhZ1pV/OiydBmJC+lZ4+SRdWdokL2HaXRKgc9QT9e/MdAbFIzI1x90=,iv:8rj8yEqHTMgoGu31RVskYizmROB/5I0ajZJ/EcmlVfE=,tag:PILFCyXY8sXYGxCEHS7qCg==,type:str]
pgp:
- created_at: "2023-04-20T10:20:17Z"
enc: |-
-----BEGIN PGP MESSAGE-----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=pS8X
-----END PGP MESSAGE-----
fp: 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
unencrypted_suffix: _unencrypted
version: 3.9.2

View File

@@ -1,15 +1,17 @@
{ config, pkgs, ... }: { { config, lib, pkgs, ... }: {
programs.git = { programs.git = {
enable = true; enable = true;
userEmail = "${config.usercfg.git.email}"; signing = lib.mkIf (config.usercfg.git.key != null) {
userName = "${config.usercfg.git.username}"; key = config.usercfg.git.key;
signing = {
key = "${config.usercfg.git.key}";
signByDefault = true; signByDefault = true;
}; };
ignores = [ "*result*" ".direnv" "node_modules" ]; ignores = [ "*result*" ".direnv" "node_modules" ];
extraConfig = { core.hooksPath = "./.dev/hooks"; }; settings = {
core.hooksPath = "./.dev/hooks";
user.email = "${config.usercfg.git.email}";
user.name = "${config.usercfg.git.username}";
};
}; };
home.packages = with pkgs; [ tig ]; home.packages = with pkgs; [ tig ];

View File

@@ -12,7 +12,7 @@
cbonsai cbonsai
pipes-rs pipes-rs
cmatrix cmatrix
cava #cava
sl sl
]; ];
} }

View File

@@ -9,12 +9,14 @@ in {
"sudo" = "sudo "; "sudo" = "sudo ";
"devsh" = "devsh" =
"nix develop --profile /tmp/devsh-env ${nixflake_url}#devsh -c zsh"; "nix develop --profile /tmp/devsh-env ${nixflake_url}#devsh -c zsh";
"cdevsh" =
"nix develop --profile /tmp/devsh-env -c zsh";
"nixb" = "(sudo nixos-rebuild switch --flake ${nixflake_url})"; "nixb" = "(sudo nixos-rebuild switch --flake ${nixflake_url})";
"nixgc" = "sudo nix-collect-garbage -d && nix-collect-garbage -d"; "nixgc" = "sudo nix-collect-garbage -d && nix-collect-garbage -d";
"ssh" = "TERM=xterm-256color ${pkgs.openssh}/bin/ssh"; "ssh" = "TERM=xterm-256color ${pkgs.openssh}/bin/ssh";
"top" = "btop"; "top" = "btop";
}; };
initExtra = '' initContent = ''
sopsu() {nix-shell -p sops --run "sops updatekeys $1";} sopsu() {nix-shell -p sops --run "sops updatekeys $1";}
sopsn() {nix-shell -p sops --run "sops $1";} sopsn() {nix-shell -p sops --run "sops $1";}
''; '';

View File

@@ -2,6 +2,6 @@
imports = [ ./vscodium ]; imports = [ ./vscodium ];
config = lib.mkIf (config.syscfg.make.develop) { config = lib.mkIf (config.syscfg.make.develop) {
home.packages = with pkgs; [ blender godot_4 ]; home.packages = with pkgs; [ blender godot_4 openscad-unstable orca-slicer pandoc claude-code];
}; };
} }

View File

@@ -4,14 +4,17 @@
programs.vscode = { programs.vscode = {
enable = true; enable = true;
package = pkgs.vscodium; package = pkgs.vscodium;
extensions = with pkgs.vscode-extensions; [ #profiles.default = {
profiles.default.extensions = with pkgs.vscode-extensions; [
bbenoist.nix bbenoist.nix
esbenp.prettier-vscode esbenp.prettier-vscode
golang.go golang.go
ms-python.vscode-pylance ms-python.vscode-pylance
ms-vscode.cpptools ms-vscode.cpptools
dbaeumer.vscode-eslint dbaeumer.vscode-eslint
continue.continue
]; ];
#};
}; };
}; };
} }

View File

@@ -25,6 +25,20 @@
} }
} }
} }
{ name = "libpipewire-module-loopback"
args = {
node.description = "Virtual Loopback"
audio.position = [ FL FR ]
capture.props = {
media.class = "Audio/Sink"
node.name = "vloopback_sink"
}
playback.props = {
media.class = "Audio/Source"
node.name = "vloopback_source"
}
}
}
] ]
''; '';
}; };

View File

@@ -10,9 +10,11 @@
xfce.tumbler xfce.tumbler
telegram-desktop telegram-desktop
discord-canary
pavucontrol pavucontrol
keepassxc keepassxc
nextcloud-client nextcloud-client
gramps gramps
]; ];
}; };

View File

@@ -1,20 +1,22 @@
{ lib, config, pkgs, ... }: { { inputs, lib, config, pkgs, ... }: {
imports = [ ./openttd.nix ]; imports = [ ./openttd.nix ./wow.nix ];
config = lib.mkIf (config.syscfg.make.game) { config = lib.mkIf (config.syscfg.make.game) {
home.packages = with pkgs; [ home.packages = with pkgs; [
# custom.simc
#games #games
steam # steam
gamemode gamemode
gamescope #gamescope
mangohud #mangohud
prismlauncher prismlauncher
openttd-jgrpp openttd-jgrpp
bottles #bottles
lutris
unstable.umu-launcher
# wine
]; ];
}; };

View File

@@ -0,0 +1,23 @@
{ pkgs, lib, config, sops, ... }: {
config = lib.mkIf (config.syscfg.make.game) {
home.packages = with pkgs;
[
# custom.simc
unstable.instawow
];
# templates buggy currently
#xdg.configFile."instawow/config.json" = ''${config.sops.templates."instawow_config.json".path}'';
sops.templates."instawow_config.json".content = ''
{
"auto_update_check": true,
"access_tokens": {
"cfcore": "${config.sops.placeholder.curse_forge_key}",
"github": "${config.sops.placeholder.github_user_key}",
"wago_addons": null
}
}'';
};
}

View File

@@ -11,8 +11,8 @@ in pkgs.stdenv.mkDerivation rec {
src = pkgs.fetchFromGitHub { src = pkgs.fetchFromGitHub {
owner = "vinceliuice"; owner = "vinceliuice";
repo = "Orchis-theme"; repo = "Orchis-theme";
rev = "be8b0aff92ed0741174b74c2ee10c74b15be0474"; rev = "5b73376721cf307101e22d7031c1f4b1344d1f63";
sha256 = "sha256-m7xh/1uIDh2BM0hTPA5QymXQt6yV7mM7Ivg5VaF2PvM="; sha256 = "sha256-+2/CsgJ+rdDpCp+r5B/zys3PtFgtnu+ohTEUOtJNd1Y=";
}; };
nativeBuildInputs = with pkgs; [ gtk3 sassc ]; nativeBuildInputs = with pkgs; [ gtk3 sassc ];
@@ -22,43 +22,43 @@ in pkgs.stdenv.mkDerivation rec {
preInstall = '' preInstall = ''
mkdir -p $out/share/themes mkdir -p $out/share/themes
cat > src/_sass/_color-palette-${scheme.slug}.scss << 'EOF' cat > src/_sass/_color-palette-${scheme.slug}.scss << 'EOF'
$red-light: #${scheme.palette.base0F}; $red-light: #${scheme.palette.low0F};
$red-dark: #${scheme.palette.base0F}; $red-dark: #${scheme.palette.high0F};
$pink-light: #${scheme.palette.base0E}; $pink-light: #${scheme.palette.low0E};
$pink-dark: #${scheme.palette.base0E}; $pink-dark: #${scheme.palette.high0E};
$purple-light: #${scheme.palette.base0D}; $purple-light: #${scheme.palette.low0D};
$purple-dark: #${scheme.palette.base0D}; $purple-dark: #${scheme.palette.high0D};
$blue-light: #${scheme.palette.base0C}; $blue-light: #${scheme.palette.low0C};
$blue-dark: #${scheme.palette.base0C}; $blue-dark: #${scheme.palette.high0C};
$teal-light: #${scheme.palette.base0B}; $teal-light: #${scheme.palette.low0B};
$teal-dark: #${scheme.palette.base0B}; $teal-dark: #${scheme.palette.high0B};
$green-light: #${scheme.palette.base0A}; $green-light: #${scheme.palette.low0A};
$green-dark: #${scheme.palette.base0A}; $green-dark: #${scheme.palette.high0A};
$sea-light: #${scheme.palette.base0B}; $sea-light: #${scheme.palette.alt_low0B};
$sea-dark: #${scheme.palette.base0B}; $sea-dark: #${scheme.palette.alt_high0B};
$yellow-light: #${scheme.palette.base09}; $yellow-light: #${scheme.palette.low09};
$yellow-dark: #${scheme.palette.base09}; $yellow-dark: #${scheme.palette.low09};
$orange-light: #${scheme.palette.base08}; $orange-light: #${scheme.palette.low08};
$orange-dark: #${scheme.palette.base08}; $orange-dark: #${scheme.palette.high08};
$grey-050: #${scheme.palette.base07}; $grey-050: #${scheme.palette.base07};
$grey-100: #${scheme.palette.base07}; $grey-100: #${scheme.palette.base07};
$grey-150: #${scheme.palette.base07}; $grey-150: #${scheme.palette.base06};
$grey-200: #${scheme.palette.base06}; $grey-200: #${scheme.palette.base06};
$grey-250: #${scheme.palette.base06}; $grey-250: #${scheme.palette.base05};
$grey-300: #${scheme.palette.base05}; $grey-300: #${scheme.palette.base05};
$grey-350: #${scheme.palette.base05}; $grey-350: #${scheme.palette.base04};
$grey-400: #${scheme.palette.base04}; $grey-400: #${scheme.palette.base04};
$grey-450: #${scheme.palette.base04}; $grey-450: #${scheme.palette.base03};
$grey-500: #${scheme.palette.base03}; $grey-500: #${scheme.palette.base03};
$grey-550: #${scheme.palette.base03}; $grey-550: #${scheme.palette.base02};
$grey-600: #${scheme.palette.base02}; $grey-600: #${scheme.palette.base02};
$grey-650: #${scheme.palette.base02}; $grey-650: #${scheme.palette.base02};
$grey-700: #${scheme.palette.base01}; $grey-700: #${scheme.palette.base01};

View File

@@ -48,7 +48,7 @@
(defwindow bar (defwindow bar
:monitor 0 :monitor 1
:geometry (geometry :geometry (geometry
:x "0%" :x "0%"
:y "0%" :y "0%"

View File

@@ -1,5 +1,5 @@
(defwindow calendar (defwindow calendar
:monitor 0 :monitor 1
:geometry (geometry :geometry (geometry
:x "0%" :x "0%"
:y "0%" :y "0%"

View File

@@ -34,7 +34,7 @@
) )
(defwindow powermenu (defwindow powermenu
:monitor 0 :monitor 1
:stacking "overlay" :stacking "overlay"
:geometry (geometry :geometry (geometry
:anchor "center" :anchor "center"

View File

@@ -2,7 +2,7 @@
(defvar radio_rev false) (defvar radio_rev false)
(defwindow radio (defwindow radio
:monitor 0 :monitor 1
:geometry (geometry :geometry (geometry
:x "0%" :x "0%"
:y "0%" :y "0%"

View File

@@ -129,7 +129,7 @@
) )
(defwindow sys (defwindow sys
:monitor 0 :monitor 1
:stacking "overlay" :stacking "overlay"
:geometry (geometry :geometry (geometry
:x "0%" :x "0%"

View File

@@ -7,42 +7,51 @@
settings = [ settings = [
{ {
profile.name = "tower_0"; profile.name = "tower_0";
profile.outputs = [{ profile.outputs = [
criteria = "CEX CX133 0x00000001"; {
mode = "1920x1200@59.972"; criteria = "AOC 24E1W1 GNSKCHA086899";
mode = "1920x1080@60.000";
position = "0,0"; position = "0,0";
scale = 1.0;
status = "enable"; status = "enable";
}]; scale = 1.0;
adaptiveSync = true;
}
{
criteria = "AOC 24E1W1 GNSKBHA080346";
mode = "1920x1080@60.000";
position = "1920,0";
status = "enable";
scale = 1.0;
adaptiveSync = true;
}
];
} }
{ {
profile.name = "tower_1"; profile.name = "tower_1";
profile.outputs = [{
criteria = "AOC 16G3 1DDP7HA000348";
mode = "1920x1080@144.000";
position = "0,0";
status = "enable";
scale = 1.0;
adaptiveSync = true;
}];
}
{
profile.name = "tower_2";
profile.outputs = [ profile.outputs = [
{ {
criteria = "AOC 16G3 1DDP7HA000348"; criteria = "AOC 24E1W1 GNSKCHA086899";
mode = "1920x1080@144.000"; mode = "1920x1080@60.000";
position = "0,0"; position = "0,0";
status = "enable"; status = "enable";
scale = 1.0; scale = 1.0;
adaptiveSync = true; adaptiveSync = true;
} }
{ {
criteria = "CEX CX133 0x00000001"; criteria = "AOC 24E1W1 GNSKBHA080346";
mode = "1920x1200@59.972"; mode = "1920x1080@60.000";
position = "0,1080"; position = "0,0";
scale = 1.0;
status = "enable"; status = "enable";
scale = 1.0;
adaptiveSync = true;
}
{
criteria = "LG UNKNOWN_TBD";
mode = "1920x1080@144.000";
position = "0,0";
status = "enable";
scale = 1.0;
adaptiveSync = true;
} }
]; ];
} }

View File

@@ -5,6 +5,8 @@
xdg.configFile."swaylock/config".text = '' xdg.configFile."swaylock/config".text = ''
screenshots screenshots
grace-no-mouse
grace-no-touch
grace=5 grace=5
effect-pixelate=5 effect-pixelate=5
fade-in=0.2 fade-in=0.2

View File

@@ -17,8 +17,12 @@ in {
dbus-hyprland-environment dbus-hyprland-environment
wayland wayland
grim hyprpicker
hyprshot
slurp slurp
satty
swappy swappy
cliphist cliphist
wl-clipboard wl-clipboard
@@ -42,6 +46,8 @@ in {
[ "discord-402572971681644545.desktop" ]; [ "discord-402572971681644545.desktop" ];
"x-scheme-handler/discord-696343075731144724" = "x-scheme-handler/discord-696343075731144724" =
[ "discord-696343075731144724.desktop" ]; [ "discord-696343075731144724.desktop" ];
"x-scheme-handler/tg" = [ "org.telegram.desktop.desktop" ];
"x-scheme-handler/tonsite" = [ "org.telegram.desktop.desktop" ];
"x-scheme-handler/http" = [ "firefox.desktop" ]; "x-scheme-handler/http" = [ "firefox.desktop" ];
"x-scheme-handler/https" = [ "firefox.desktop" ]; "x-scheme-handler/https" = [ "firefox.desktop" ];
"x-scheme-handler/chrome" = [ "firefox.desktop" ]; "x-scheme-handler/chrome" = [ "firefox.desktop" ];

View File

@@ -6,7 +6,7 @@
xwayland.enable = true; xwayland.enable = true;
extraConfig = '' extraConfig = ''
monitor=,preferred,auto,auto monitor=,preferred,auto,auto
env=bitdepth,10
input { input {
kb_layout = us, ru kb_layout = us, ru
kb_variant = intl, phonetic kb_variant = intl, phonetic
@@ -14,7 +14,7 @@
follow_mouse = 1 follow_mouse = 1
sensitivity = 0 # -0.5 # -1.0 - 1.0, 0 means no modification. sensitivity = 0
touchpad { touchpad {
natural_scroll=no natural_scroll=no
@@ -61,10 +61,10 @@
fullscreen_opacity = 1.0 fullscreen_opacity = 1.0
# shadow # shadow
drop_shadow = no # drop_shadow = no
shadow_range = 60 # shadow_range = 60
shadow_offset = 0 5 # shadow_offset = 0 5
shadow_render_power = 4 # shadow_render_power = 4
#col.shadow = rgba(00000099) #col.shadow = rgba(00000099)
} }
@@ -86,12 +86,10 @@
} }
master { master {
new_is_master = true new_status = master
} }
gestures { gesture = 3, vertical, workspace
workspace_swipe = off
}
exec-once = eww open bar exec-once = eww open bar
#exec-once = waybar #exec-once = waybar
@@ -166,7 +164,7 @@
bind = SUPER SHIFT,D,exec, ~/.config/hypr/themes/apatheia/eww/launch_bar bind = SUPER SHIFT,D,exec, ~/.config/hypr/themes/apatheia/eww/launch_bar
bind = SUPER, V, exec, cliphist list | wofi -dmenu | cliphist decode | wl-copy bind = SUPER, V, exec, cliphist list | wofi -dmenu | cliphist decode | wl-copy
bind = , Print, exec, grim -g "$(slurp -d)" - | swappy -f - bind = , PRINT, exec, hyprshot -m region --raw | satty --filename - --early-exit --action-on-enter save-to-clipboard --copy-command 'wl-copy'
bind = SUPER, L, exec, swaylock bind = SUPER, L, exec, swaylock

View File

@@ -110,7 +110,7 @@
telegram-desktop & telegram-desktop &
nextcloud & nextcloud &
jellyfin-mpv-shim & jellyfin-mpv-shim &
flameshot & #flameshot &
sleep 2 sleep 2
@@ -265,7 +265,7 @@
# Screenshots # Screenshots
Print Print
flameshot gui hyprshot -m region
# Lock Desktop # Lock Desktop
super + l super + l

View File

@@ -5,7 +5,7 @@
config = lib.mkIf (config.usercfg.wm == "X11") { config = lib.mkIf (config.usercfg.wm == "X11") {
xsession.windowManager.bspwm = { enable = true; }; xsession.windowManager.bspwm = { enable = true; };
services.sxhkd = { enable = true; }; services.sxhkd = { enable = true; };
home.packages = with pkgs; [ xrandr arandr flameshot xtrlock i3lock ]; home.packages = with pkgs; [ xrandr arandr hyprshot xtrlock i3lock ];
}; };
} }

View File

@@ -2,9 +2,9 @@
let cfg = config.syscfg.make.gui; let cfg = config.syscfg.make.gui;
in { in {
config = lib.mkIf cfg { config = lib.mkIf cfg {
sound.enable = true; # sound.enable = true;
hardware.pulseaudio.enable = false;
security.rtkit.enable = true; security.rtkit.enable = true;
services.pulseaudio.enable = false; #25.05 change to services
services.pipewire = { services.pipewire = {
enable = true; enable = true;
alsa.enable = true; alsa.enable = true;
@@ -13,6 +13,6 @@ in {
# wireplumber.enable = true; # wireplumber.enable = true;
}; };
environment.systemPackages = with pkgs; [ easyeffects ]; environment.systemPackages = with pkgs; [ easyeffects alsa-utils ];
}; };
} }

View File

@@ -5,6 +5,9 @@ in {
programs.steam = { programs.steam = {
enable = true; enable = true;
remotePlay.openFirewall = true; remotePlay.openFirewall = true;
extraCompatPackages = with pkgs; [proton-ge-bin];
}; };
programs.gamemode.enable = true;
}; };
} }

View File

@@ -1,3 +1,9 @@
{ ... }: { { ... }: {
imports = [ ./dbus ./fonts ./hw ./locale ./network ./nix ./security ./xdg ]; imports = [ ./dbus ./fonts ./hw ./locale ./network ./nix ./security ./xdg ];
# services.journald.extraConfig = ''
# LineMax=128K
# SystemMaxUse=512M
# SystemMaxFileSize=128M
# '';
} }

View File

@@ -9,7 +9,7 @@ in {
}; };
efi = { efi = {
canTouchEfiVariables = true; canTouchEfiVariables = true;
efiSysMountPoint = "/boot/efi"; efiSysMountPoint = "/boot";
}; };
}; };
}; };

View File

@@ -1 +1 @@
{ ... }: { imports = [ ./base ./boot ./fs ./opengl ./power ./udev ./virt ]; } { ... }: { imports = [ ./base ./boot ./fs ./graphics ./power ./udev ./virt ]; }

View File

@@ -0,0 +1,4 @@
{ ... }: {
hardware.graphics.enable = true;
hardware.graphics.enable32Bit = true;
}

View File

@@ -1,5 +0,0 @@
{ ... }: {
hardware.opengl.enable = true;
hardware.opengl.driSupport = true;
hardware.opengl.driSupport32Bit = true;
}

View File

@@ -7,9 +7,24 @@
STOP_CHARGE_THRESH_BAT0 = 90; STOP_CHARGE_THRESH_BAT0 = 90;
CPU_SCALING_GOVERNOR_ON_AC = "performance"; CPU_SCALING_GOVERNOR_ON_AC = "performance";
CPU_SCALING_GOVERNOR_ON_BAT = "powersave"; CPU_SCALING_GOVERNOR_ON_BAT = "powersave";
MEM_SLEEP_ON_BAT = "deep";
}; };
}; };
powerManagement.enable = true;
# suspend to RAM (deep) rather than `s2idle`
boot.kernelParams = [ "mem_sleep_default=deep" ];
# suspend-then-hibernate
systemd.sleep.extraConfig = ''
HibernateDelaySec=30m
SuspendState=mem
'';
services.logind.settings.Login.HandleLidSwitch = "suspend-then-hibernate";
# Hibernate on power button pressed
services.logind.settings.Login.HandlePowerKey = "hibernate";
services.logind.settings.Login.HandlePowerKeyLongPress = "poweroff";
systemd.user.services.battery_monitor = { systemd.user.services.battery_monitor = {
wants = [ "display-manager.service" ]; wants = [ "display-manager.service" ];
wantedBy = [ "graphical-session.target" ]; wantedBy = [ "graphical-session.target" ];

View File

@@ -11,11 +11,13 @@
dockerSocket.enable = true; dockerSocket.enable = true;
dockerCompat = true; dockerCompat = true;
defaultNetwork.settings = { defaultNetwork.settings = {
dnsname.enable = true; #dnsname.enable = true;
internal = true; dns_enabled = true;
name = "internal"; #internal = true;
#name = "internal";
}; };
}; };
}; };
virtualisation.containers.registries.search = [ "quay.io" "docker.io" "ghcr.io" ];
}; };
} }

View File

@@ -4,6 +4,17 @@
useDHCP = true; useDHCP = true;
nameservers = [ "1.1.1.1" "9.9.9.9" ]; nameservers = [ "1.1.1.1" "9.9.9.9" ];
firewall = { enable = true; }; firewall = {
enable = true;
allowedUDPPorts =
(if (config.syscfg.server != false && config.syscfg.server.wireguard) then [ 1515 ] else [ ]) ++
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
[ ];
allowedTCPPorts =
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
(if (config.syscfg.server != false) then [ 5432 6379 ] else [ ]) ++
[ ];
};
}; };
} }

View File

@@ -1,4 +1,12 @@
{ config, lib, ... }: { { config, lib, pkgs, ... }: let
isValidPeer = p:
(p ? syscfg.net.wg.enable) &&
(p.syscfg.net.wg.enable == true) &&
(p.syscfg.net.wg.pubkey != config.syscfg.net.wg.pubkey);
activePeers = builtins.filter isValidPeer config.syscfg.peers;
in
{
config = lib.mkIf (config.syscfg.net.wg.enable) { config = lib.mkIf (config.syscfg.net.wg.enable) {
networking.wireguard = { networking.wireguard = {
enable = true; enable = true;
@@ -9,7 +17,15 @@
config.sops.secrets."${config.syscfg.hostname}_wg_priv".path; config.sops.secrets."${config.syscfg.hostname}_wg_priv".path;
listenPort = 1515; listenPort = 1515;
mtu = 1340; mtu = 1340;
peers = [{ peers =
if (config.syscfg.server ? wireguard && config.syscfg.server.wireguard) then
map (p: {
name = p.syscfg.hostname;
publicKey = p.syscfg.net.wg.pubkey;
allowedIPs = [ p.syscfg.net.wg.ip4 p.syscfg.net.wg.ip6 ];
}) activePeers
else
[{
allowedIPs = [ "10.10.1.0/24" "fd10:10:10::0/64" ]; allowedIPs = [ "10.10.1.0/24" "fd10:10:10::0/64" ];
endpoint = "vpn.helcel.net:1515"; endpoint = "vpn.helcel.net:1515";
publicKey = "NFBJvYXZC+bd62jhrKnM7/pugidWhgR6+C5qIiUiq3Q="; publicKey = "NFBJvYXZC+bd62jhrKnM7/pugidWhgR6+C5qIiUiq3Q=";
@@ -18,5 +34,9 @@
}; };
}; };
}; };
systemd.services."wireguard-wg0" = {
after = [ "network-online.target" "nss-lookup.target" ];
wants = [ "network-online.target" "nss-lookup.target" ];
};
}; };
} }

View File

@@ -1,4 +1,4 @@
{ pkgs, ... }: { { inputs, pkgs, ... }: {
nixpkgs.config = { nixpkgs.config = {
permittedInsecurePackages = [ ]; permittedInsecurePackages = [ ];
allowUnfree = true; allowUnfree = true;
@@ -8,9 +8,9 @@
}; };
}; };
nixpkgs.overlays = import ../../../../overlays { inherit pkgs; }; nixpkgs.overlays = import ../../../../overlays { inherit inputs pkgs; };
nix = { nix = {
package = pkgs.nixFlakes; package = pkgs.nixVersions.stable;
extraOptions = '' extraOptions = ''
experimental-features = nix-command flakes experimental-features = nix-command flakes
warn-dirty = false warn-dirty = false
@@ -37,5 +37,5 @@
]; ];
}; };
}; };
system.stateVersion = "24.05"; system.stateVersion = "24.11";
} }

View File

@@ -2,6 +2,9 @@
config = lib.mkIf (config.syscfg.make.develop) { config = lib.mkIf (config.syscfg.make.develop) {
programs.adb.enable = true; programs.adb.enable = true;
# services.udev.packages = [
# pkgs.android-udev-rules
# ];
programs.wireshark.enable = true; programs.wireshark.enable = true;
environment.systemPackages = with pkgs; [ wget dconf wireshark ]; environment.systemPackages = with pkgs; [ wget dconf wireshark ];

View File

@@ -1 +1,64 @@
{ ... }: { imports = [ ./debug ./develop ]; } { pkgs, ... }: {
imports = [ ./debug ./develop ];
# services.telegraf = {
# enable = true;
# extraConfig = {
# agent = {
# interval = "10s";
# round_interval = true;
# metric_batch_size = 1000;
# metric_buffer_limit = 10000;
# collection_jitter = "0s";
# flush_interval = "10s";
# flush_jitter = "0s";
# precision = "";
# hostname = "valinor";
# omit_hostname = false;
# };
# inputs.cpu = {
# percpu = true;
# totalcpu = true;
# collect_cpu_time = false;
# report_active = false;
# };
# inputs.mem = {};
# inputs.swap = {};
# inputs.system = {};
# inputs.disk = {
# ignore_fs = ["tmpfs" "devtmpfs" "devfs"];
# };
# inputs.net = {};
# inputs.netstat = {};
# inputs.ping = {
# urls = ["8.8.8.8" "8.8.4.4"];
# count = 4;
# interval = "60s";
# binary = "${pkgs.iputils.out}/bin/ping";
# };
# inputs.internet_speed = {
# interval = "2m";
# };
# inputs.net_response = {
# protocol = "tcp";
# address = "google.com:80";
# timeout = "5s";
# read_timeout = "5s";
# interval = "30s";
# };
# outputs.influxdb_v2 = {
# urls = [""];
# token = "";
# organization = "";
# bucket = "";
# };
# };
# };
}

View File

@@ -6,10 +6,13 @@ let
includeEmulator = false; includeEmulator = false;
}; };
in { in {
imports = [ ./ollama ];
config = lib.mkIf (config.syscfg.make.develop) { config = lib.mkIf (config.syscfg.make.develop) {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs;
android-tools [
androidStudioPackages.canary # android-tools
unstable.androidStudioPackages.canary
]; ];
}; };
} }

View File

@@ -0,0 +1,16 @@
{ lib, config, pkgs, ... }:
let
ollamaPkg = pkgs.ollama-rocm;
in{
config = lib.mkIf (config.syscfg.make.develop) {
services.ollama = {
enable = true;
package = ollamaPkg;
acceleration = "rocm";
loadModels = [ "deepseek-v2:lite" "qwen2.5-coder:7b" "qwen2.5-coder:1.5b" ];
syncModels = true;
};
environment.systemPackages = with pkgs; [ ollamaPkg ];
};
}

View File

@@ -11,6 +11,7 @@ in {
extraGroups = [ extraGroups = [
"networkmanager" "networkmanager"
"wheel" "wheel"
"dialout"
"vboxsf" "vboxsf"
"adbusers" "adbusers"
"libvirtd" "libvirtd"
@@ -21,6 +22,7 @@ in {
"docker" "docker"
"podman" "podman"
"wireshark" "wireshark"
"gamemode"
]; ];
}) config.syscfg.users); }) config.syscfg.users);
}; };

View File

@@ -0,0 +1,46 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
serverCfg = config.syscfg.server;
image = pkgs.dockerTools.streamLayeredImage {
name = "EXAMPLE";
tag = "0.0.0";
contents = [ pkgs.bashInteractive ];
config = {
Entrypoint = [ "echo 1" ];
ExposedPorts = { };
};
};
templateData = builder.mkData { name = "template"; dir = "template"; vars = {
_ARGUMENT = "template";
};
};
in {
sops = false;
db = false;
paths = [{
path="${serverCfg.configPath}/example/";
mode = "0444";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8080;
secret = name;
extraEnv = { };
overrides = {
cmd = [ ];
volumes = [ ];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."EXAMPLE".path;
script = pkgs.writeShellScript "setup" ''
...
'';
};
}

View File

@@ -0,0 +1,7 @@
# Missing
RSS: TTRSS / FreshRSS
Monitoring: Telegraf + InfluxDB
https://github.com/tarampampam/error-pages ?
- Transmission Cfg and API/Token handling

View File

@@ -0,0 +1,111 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
version = "2026.2.2";
serverCfg = config.syscfg.server;
authentikData = builder.mkData {
name = "authentik"; dir = "authentik"; vars = {
AUTHENTIK_DOMAIN = "${containerCfg.subdomain}.${serverCfg.domain}";
COOKIE_DOMAIN = "${serverCfg.domain}";
AUTHENTIK_LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
}
// (if serverCfg.containers?jellyfin then { JELLYFIN_DOMAIN = "${serverCfg.containers.jellyfin.subdomain}.${serverCfg.domain}";} else {})
// (if serverCfg.containers?gitea then { GITEA_DOMAIN = "${serverCfg.containers.gitea.subdomain}.${serverCfg.domain}";} else {})
// (if serverCfg.containers?immich then { IMMICH_DOMAIN = "${serverCfg.containers.immich.subdomain}.${serverCfg.domain}";} else {})
// (if serverCfg.containers?nextcloud then { NEXTCLOUD_DOMAIN = "${serverCfg.containers.nextcloud.subdomain}.${serverCfg.domain}";} else {});
};
in {
sops = true;
db = true;
paths = [{
path="${serverCfg.configPath}/authentik/media";
owner = "1000:1000";
mode = "0755";
}{
path="${serverCfg.configPath}/authentik/templates";
owner = "1000:1000";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "ghcr.io/goauthentik/server:${version}";
port = 9000;
secret = name;
extraEnv = {
AUTHENTIK_REDIS__HOST = builder.host;
AUTHENTIK_POSTGRESQL__HOST = builder.host;
AUTHENTIK_POSTGRESQL__USER = "authentik_user";
AUTHENTIK_POSTGRESQL__NAME = "authentik_db";
AUTHENTIK_POSAUTHENTIK_POSTGRESQL__SSLMODE = "false";
AUTHENTIK_EMAIL__HOST = serverCfg.mailDomain;
AUTHENTIK_EMAIL__PORT = "587";
AUTHENTIK_EMAIL__USERNAME = "noreply@${serverCfg.domain}";
AUTHENTIK_EMAIL__USE_TLS = "true";
AUTHENTIK_EMAIL__USE_SSL = "false";
AUTHENTIK_EMAIL__TIMEOUT = "10";
AUTHENTIK_EMAIL__FROM = "sso@noreply.${serverCfg.domain}";
AUTHENTIK_DISABLE_UPDATE_CHECK = "true";
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
};
overrides = {
cmd = [ "server" ];
volumes = [
"${serverCfg.configPath}/authentik/media:/media"
"${serverCfg.configPath}/authentik/templates:/templates"
"${authentikData}:/blueprints/custom:ro"
];
};
};
worker = builder.mkContainer {
image = "ghcr.io/goauthentik/server:${version}";
secret = name;
extraEnv = {
AUTHENTIK_REDIS__HOST = builder.host;
AUTHENTIK_POSTGRESQL__HOST = builder.host;
AUTHENTIK_POSTGRESQL__USER = "authentik_user";
AUTHENTIK_POSTGRESQL__NAME = "authentik_db";
AUTHENTIK_POSAUTHENTIK_POSTGRESQL__SSLMODE = "false";
AUTHENTIK_DISABLE_UPDATE_CHECK = "true";
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
};
overrides = {
cmd = [ "worker" ];
volumes = [
"${serverCfg.configPath}/authentik/media:/media"
"${serverCfg.configPath}/authentik/templates:/templates"
"${authentikData}:/blueprints/custom:ro"
];
};
};
ldap = builder.mkContainer {
image = "ghcr.io/goauthentik/ldap:${version}";
secret = name;
extraEnv = {
AUTHENTIK_HOST = "https://${containerCfg.subdomain}.${serverCfg.domain}";
AUTHENTIK_INSECURE = "false";
};
};
};
setup = {
trigger = "worker";
script = pkgs.writeShellScript "setup" ''
# Define the command wrapper
AK="${pkgs.podman}/bin/podman --events-backend=none exec --env-file ${config.sops.secrets."CUSTOM".path} -e DOMAIN=${serverCfg.domain} -u root authentik-worker ak"
$AK apply_blueprint /blueprints/custom/authentik.yaml
$AK apply_blueprint /blueprints/custom/traefik.yaml
$AK apply_blueprint /blueprints/custom/ldap.yaml
${lib.optionalString (serverCfg.containers ? gitea) ''$AK apply_blueprint /blueprints/custom/gitea.yaml''}
${lib.optionalString (serverCfg.containers ? jellyfin) ''$AK apply_blueprint /blueprints/custom/jellyfin.yaml''}
${lib.optionalString (serverCfg.containers ? nextcloud) ''$AK apply_blueprint /blueprints/custom/nextcloud.yaml''}
${lib.optionalString (serverCfg.containers ? immich) ''$AK apply_blueprint /blueprints/custom/immich.yaml''}
echo "Completed Authentik Setup"
'';
};
}

View File

@@ -0,0 +1,34 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
version = "latest";
serverCfg = config.syscfg.server;
in {
sops = true;
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "collabora/code:${version}";
port = 9980;
secret = name;
extraEnv = {
"aliasgroup1" = "https://${serverCfg.containers.nextcloud.subdomain}.${serverCfg.domain}";
"server_name" = "${containerCfg.subdomain}.${serverCfg.domain}";
"username" = "collabora_user";
"VIRTUAL_HOST" = "${containerCfg.subdomain}.${serverCfg.domain}";
"VIRTUAL_PORT" = "9980";
"VIRTUAL_PROTO" = "http";
"DONT_GEN_SSL_CERT" = "true";
"RESOLVE_TO_PROXY_IP" = "true";
"extra_params" = "--o:ssl.enable=false --o:ssl.termination=true";
"dictionaries" = "en fr de jp no";
};
overrides = {
volumes = [
"${pkgs.noto-fonts}/share/fonts/noto:/opt/collaboraoffice/share/fonts/truetype/noto:ro"
"${pkgs.ibm-plex}/share/fonts/opentype:/opt/collaboraoffice/share/fonts/opentype/plex:ro"
];
};
};
};
}

View File

@@ -0,0 +1,39 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
serverCfg = config.syscfg.server;
ethercalc_exe = pkgs.ethercalc;
image = pkgs.dockerTools.streamLayeredImage {
name = "ethercalc";
tag = ethercalc_exe.version;
contents = [ pkgs.bashInteractive ];
config = {
Entrypoint = [ "${ethercalc_exe}/bin/ethercalc" ];
ExposedPorts = { "8080/tcp" = {}; };
};
};
in {
sops = true;
paths = [{
path="${serverCfg.dataPath}/ethercalc/";
mode = "0666";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8080;
secret = name;
extraEnv = {
ETHERCALC_PORT = "8080";
#CONNECT TO REDIS
};
overrides = {
volumes = [
"${serverCfg.dataPath}/ethercalc:/data"
];
};
};
};
}

View File

@@ -0,0 +1,124 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
serverCfg = config.syscfg.server;
etherpad_exe = pkgs.etherpad-lite;
settings = pkgs.writeText"settings.json" (builtins.toJSON {
title= "\${TITLE:Etherpad}";
showRecentPads = "\${SHOW_RECENT_PADS:true}";
favicon = "\${FAVICON:null}";
publicURL = "\${PUBLIC_URL:null}";
skinName = "\${SKIN_NAME:colibris}";
skinVariants = "\${SKIN_VARIANTS:super-light-toolbar super-light-editor light-background}";
ip = "\${IP:0.0.0.0}";
port = "\${PORT:9001}";
showSettingsInAdminPage = "\${SHOW_SETTINGS_IN_ADMIN_PAGE:true}";
enableMetrics = "\${ENABLE_METRICS:true}";
updates.tier = "off";
cleanup.enabled = false;
gdprAuthorErasure.enabled = "\${GDPR_AUTHOR_ERASURE_ENABLED:false}";
authenticationMethod = "\${AUTHENTICATION_METHOD:apikey}";
enableDarkMode = "\${ENABLE_DARK_MODE:true}";
enablePadWideSettings = "\${ENABLE_PAD_WIDE_SETTINGS:true}";
dbType = "\${DB_TYPE:dirty}";
dbSettings = {
host = "\${DB_HOST:undefined}";
port = "\${DB_PORT:undefined}";
database = "\${DB_NAME:undefined}";
user = "\${DB_USER:undefined}";
password = "\${DB_PASS:undefined}";
charset = "\${DB_CHARSET:undefined}";
filename = "\${DB_FILENAME:var/dirty.db}";
collection = "\${DB_COLLECTION:undefined}";
url = "\${DB_URL:undefined}";
};
defaultPadText = "\${DEFAULT_PAD_TEXT:P A D}";
padOptions = {
noColors = "\${PAD_OPTIONS_NO_COLORS:false}";
showControls = "\${PAD_OPTIONS_SHOW_CONTROLS:true}";
showChat = "\${PAD_OPTIONS_SHOW_CHAT:true}";
showLineNumbers = "\${PAD_OPTIONS_SHOW_LINE_NUMBERS:true}";
useMonospaceFont = "\${PAD_OPTIONS_USE_MONOSPACE_FONT:false}";
userName = "\${PAD_OPTIONS_USER_NAME:null}";
userColor = "\${PAD_OPTIONS_USER_COLOR:null}";
rtl = "\${PAD_OPTIONS_RTL:false}";
alwaysShowChat = "\${PAD_OPTIONS_ALWAYS_SHOW_CHAT:false}";
chatAndUsers = "\${PAD_OPTIONS_CHAT_AND_USERS:false}";
lang = "\${PAD_OPTIONS_LANG:null}";
fadeInactiveAuthorColors = "\${PAD_OPTIONS_FADE_INACTIVE_AUTHOR_COLORS:true}";
enforceReadableAuthorColors = "\${PAD_OPTIONS_ENFORCE_READABLE_AUTHOR_COLORS:true}";
};
requireSession = "\${REQUIRE_SESSION:false}";
editOnly = "\${EDIT_ONLY:false}";
minify = "\${MINIFY:true}";
requireAuthentication = "\${REQUIRE_AUTHENTICATION:false}";
requireAuthorization = "\${REQUIRE_AUTHORIZATION:false}";
trustProxy = "\${TRUST_PROXY:true}";
ep_headerauth.username_header = "X-authentik-username";
users.admin = {
password = "\${ADMIN_PASSWORD:null}";
is_admin = true;
};
socketTransportProtocols = ["websocket" "polling"];
socketIo.maxHttpBufferSize = "\${SOCKETIO_MAX_HTTP_BUFFER_SIZE:1000000}";
indentationOnNewLine = true;
loglevel = "\${LOGLEVEL:INFO}";
lowerCasePadIds = "\${LOWER_CASE_PAD_IDS:true}";
});
image = pkgs.dockerTools.streamLayeredImage {
name = "etherpad";
tag = etherpad_exe.version;
contents = [ pkgs.bashInteractive ];
config = {
Entrypoint = [ "${etherpad_exe}/bin/etherpad-lite" ];
ExposedPorts = { "8080/tcp" = {}; };
};
};
in {
sops = true;
db = true;
paths = [{
path="${serverCfg.configPath}/etherpad/";
mode = "0444";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8080;
secret = name;
extraEnv = {
TITLE = "Pad";
PORT ="8080";
DB_TYPE = "postgres";
DB_HOST = builder.host;
DB_NAME = "etherpad_db";
DB_USER = "etherpad_user";
TRUST_PROXY = "true";
DB_CHARSET = "utf8mb4";
DEFAULT_PAD_TEXT = "";
PAD_OPTIONS_SHOW_LINE_NUMBERS = "true";
PAD_OPTIONS_USE_MONOSPACE_FONT = "true";
SKIN_VARIANTS = "super-dark-toolbar light-editor dark-background";
};
overrides = {
cmd = [ "--settings" "/etc/etherpad/settings.json" "--apikey" "/etc/etherpad/APIKEY.txt" ];
volumes = [
"${settings}:/etc/etherpad/settings.json"
"${serverCfg.configPath}/etherpad/APIKEY.txt:/etc/etherpad/APIKEY.txt:ro"
];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."ETHERPAD".path;
script = pkgs.writeShellScript "setup" ''
echo "$APIKEY" > ${serverCfg.configPath}/etherpad/APIKEY.txt
chmod 444 ${serverCfg.configPath}/etherpad/APIKEY.txt
'';
};
}

View File

@@ -0,0 +1,95 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
# Ensure the package is available (Nixpkgs includes frigate)
frigatePkg = pkgs.frigate;
image = pkgs.dockerTools.streamLayeredImage {
name = "frigate";
tag = frigatePkg.version;
contents = [
pkgs.bashInteractive
frigatePkg
pkgs.ffmpeg # Explicitly included for video stream processing
];
config = {
Entrypoint = [ "${frigatePkg}/bin/frigate" ];
Cmd = [ "start" ];
ExposedPorts = {
"5000/tcp" = {}; # Web UI / API
"8554/tcp" = {}; # RTSP Feeds
"8555/tcp" = {}; # WebRTC
};
Env = [
"FRIGATE_RTSP_PASSWORD=secret" # Base fallback, overridden by envFile/sops
];
};
};
in {
sops = true; # Enabled to safeguard sensitive camera RTSP stream credentials
db = false; # Internal SQLite is used by default in Frigate
paths = [
{
path = "${serverCfg.configPath}/frigate/";
mode = "0755";
}
{
path = "/var/lib/frigate/storage/";
mode = "0755"; # Dedicated path for heavy video recordings and media
}
];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 5000;
secret = name;
extraEnv = {
PLUS_API_KEY = ""; # Optional: For Frigate Plus users
};
overrides = {
cmd = [ ];
volumes = [
"${serverCfg.configPath}/frigate:/config"
"/var/lib/frigate/storage:/media/frigate"
"/dev/bus/usb:/dev/bus/usb" # Passes Google Coral USB TPU to the container
"/dev/dri:/dev/dri" # Passes Intel/AMD GPU for hardware video decoding
];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."FRIGATE_ENV".path;
script = pkgs.writeShellScript "setup-frigate" ''
mkdir -p "${serverCfg.configPath}/frigate"
mkdir -p "/var/lib/frigate/storage"
# Bootstrap a standard configuration layout if missing
if [ ! -f "${serverCfg.configPath}/frigate/config.yml" ]; then
cat <<EOF > "${serverCfg.configPath}/frigate/config.yml"
mqtt:
enabled: False # Set to True and define host if connecting to Home Assistant
database:
path: /config/frigate.db
cameras:
dummy_camera: # Replace with your actual RTSP stream details
enabled: false
ffmpeg:
inputs:
- path: rtsp://127.0.0.1:554/live
roles:
- detect
detect:
enabled: false
EOF
fi
'';
};
}

View File

@@ -0,0 +1,145 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
version = "latest";
serverCfg = config.syscfg.server;
LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
in {
sops = true;
db = true;
paths = [{
path="${serverCfg.dataPath}/gitea/data";
owner = "1000:1000";
mode = "0755";
}{
path="${serverCfg.dataPath}/gitea/data-runner";
owner = "1000:1000";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "gitea/gitea:${version}";
port = 8080;
secret = name;
extraEnv = { # app.ini -> GITEA__<section>__<KEY> = "<VALUE>";
GITEA__DEFAULT__APP_NAME = if(containerCfg.extra ? name) then containerCfg.extra.name else "Gitea";
GITEA__repository__DISABLED_REPO_UNITS = "repo.ext_issues,repo.ext_wiki";
GITEA__repository__DISABLE_STARS = "true";
GITEA__repository__DEFAULT_MERGE_STYLE = "squash";
# GITEA__ui__THEMES = "";
# GITEA__ui__DEFAULT_THEME = "";
# GITEA__security__SECRET_KEY = "SECRET_ENV";
# GITEA__security__INTERNAL_TOKEN = "SECRET_ENV";
# GITEA__database__PASSWD = "SECRET_ENV";
# GITEA__mailer__PASSWD="SECRET_ENV";
GITEA__database__DB_TYPE = "postgres";
GITEA__database__HOST = builder.host;
GITEA__database__NAME = "gitea_db";
GITEA__database__USER = "gitea_user";
GITEA__mailer__ENABLED = "true";
GITEA__mailer__FROM = "";
GITEA__mailer__PROTOCOL = "smtps";
GITEA__mailer__SMTP_ADDR = "";
GITEA__mailer__SMTP_PORT = "";
GITEA__mailer__USER= "";
GITEA__server__DOMAIN = "${containerCfg.subdomain}.${serverCfg.domain}";
GITEA__server__ROOT_URL = "https://${containerCfg.subdomain}.${serverCfg.domain}/";
GITEA__server__PROTOCOL = "http";
GITEA__server__HTTP_PORT = "8080";
GITEA__server__LFS_START_SERVER = "true";
GITEA__security__INSTALL_LOCK = "true";
} // ( if serverCfg.containers?authentik then {
GITEA__service__ENABLE_BASIC_AUTHENTICATION = "false";
GITEA__service__ENABLE_REVERSE_PROXY_AUTHENTICATION = "true";
GITEA__service__ENABLE_REVERSE_PROXY_AUTHENTICATION_API = "true";
GITEA__service__ENABLE_REVERSE_PROXY_AUTO_REGISTRATION = "true";
GITEA__service__ENABLE_REVERSE_PROXY_EMAIL = "true";
GITEA__service__ENABLE_REVERSE_PROXY_FULL_NAME = "true";
GITEA__service__ALLOW_ONLY_EXTERNAL_REGISTRATION = "true";
GITEA__security__REVERSE_PROXY_LOGOUT_REDIRECT = "https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/outpost.goauthentik.io/sign_out";
GITEA__security__REVERSE_PROXY_AUTHENTICATION_USER = "X-authentik-username";
GITEA__security__REVERSE_PROXY_AUTHENTICATION_EMAIL = "X-authentik-email";
GITEA__security__REVERSE_PROXY_AUTHENTICATION_FULL_NAME = "X-authentik-name";
GITEA__security__RREVERSE_PROXY_LIMIT = "1";
GITEA__security__REVERSE_PROXY_TRUSTED_PROXIES = "127.0.0.0/8,::1/128,10.0.0.0/8";
} else {});
extraLabels = {
"traefik.http.routers.${containerCfg.subdomain}-login.rule" = "Host(`${containerCfg.subdomain}.${serverCfg.domain}`) && Path(`/user/login`) ";
"traefik.http.routers.${containerCfg.subdomain}-login.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
"traefik.http.routers.${containerCfg.subdomain}-login.priority" = "100";
"traefik.http.routers.${containerCfg.subdomain}-login.entrypoints" = "web-secure";
"traefik.http.routers.${containerCfg.subdomain}-login.tls" = "true";
};
overrides = {
volumes = [
"${serverCfg.dataPath}/gitea/data:/data"
];
ports = [ "2222:22" ];
};
};
runner = builder.mkContainer {
image = "gitea/act_runner:${version}";
secret = name;
extraEnv = {
CONFIG_FILE="/data/config.yml";
GITEA_INSTANCE_URL="https://${containerCfg.subdomain}.${serverCfg.domain}";
GITHUB_INSTANCE_URL="https://${containerCfg.subdomain}.${serverCfg.domain}";
};
overrides = {
volumes = [
"${serverCfg.dataPath}/gitea/data-runner:/data"
"/var/run/podman/podman.sock:/var/run/docker.sock"
];
# ports = [ "8088:8088" ];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."CUSTOM".path;
script = pkgs.writeShellScript "setup" ''
# Define the command wrapper
GT="${pkgs.podman}/bin/podman --events-backend=none exec -u git gitea-server gitea"
GTR="${pkgs.podman}/bin/podman --events-backend=none exec -u git gitea-runner ./act_runner"
$GT admin user create --username "$DEFAULT_ADMIN_USERNAME" --password "$DEFAULT_ADMIN_PASSWORD" --email "$DEFAULT_ADMIN_EMAIL" --admin || true
touch ${serverCfg.dataPath}/gitea/data-runner/config.yml
RUNNER_TOKEN=$($GT actions generate-runner-token)
$GTR register \
--instance "https://${containerCfg.subdomain}.${serverCfg.domain}" \
--token "$RUNNER_TOKEN" \
--name "Runner" \
--labels "ubuntu-latest:docker://catthehacker/ubuntu:act-latest" \
--no-interactive
${lib.optionalString (serverCfg.containers ? authentik) ''
$GT admin auth add-ldap --name Authentik --host authentik-ldap --port 6636 --security-protocol ldaps --skip-tls-verify \
--bind-dn "cn=ldap-service,ou=users,${LDAP_DC_DOMAIN}" --bind-password $DEFAULT_LDAP_PASSWORD \
--user-search-base "ou=users,${LDAP_DC_DOMAIN}" \
--user-filter "(&(objectClass=user)(|(uid=%[1]s)(mail=%[1]s)))" \
--admin-filter "(memberOf=cn=admin,ou=groups,${LDAP_DC_DOMAIN})" \
--username-attribute "username" --firstname-attribute "givenName" --surname-attribute "sn" --email-attribute "mail" \
--synchronize-users
''}
echo "Completed Gitea Setup"
'';
};
}

View File

@@ -0,0 +1,3 @@
{...}:{
}

View File

@@ -0,0 +1,43 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
image = pkgs.dockerTools.streamLayeredImage {
name = pkgs.home-assistant.name;
tag = pkgs.home-assistant.version;
contents = [ ];
config = {
Entrypoint = [ "${pkgs.home-assistant}/bin/hass" ];
ExposedPorts = {
"8123/tcp" = {};
};
};
};
in {
sops = true;
db = false;
paths = [{
path = "${serverCfg.configPath}/homeassistant/";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8123;
secret = name;
extraEnv = {
TZ = config.time.timeZone or "UTC";
};
overrides = {
cmd = [ "--config" "/config" ];
volumes = [
"${serverCfg.configPath}/homeassistant/:/config"
"/run/dbus:/run/dbus:ro" # Required for Bluetooth/mDNS service discovery
];
};
};
};
}

View File

@@ -0,0 +1,97 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
version = "v2";
serverCfg = config.syscfg.server;
in {
sops = true;
db = true;
paths = [{
path = "${serverCfg.configPath}/immich/cache";
mode = "0750";
}{
path = "${serverCfg.dataPath}/immich/";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "ghcr.io/immich-app/immich-server:${version}";
port = 2283;
secret = name;
extraEnv = {
DB_HOSTNAME = builder.host;
REDIS_HOSTNAME = builder.host;
DB_USERNAME = "immich_user";
DB_DATABASE_NAME = "immich_db";
IMMICH_TRUSTED_PROXIES = "10.0.0.0/8";
IMMICH_MACHINE_LEARNING_URL = "http://immich-ml:3003";
# IMMICH_ALLOW_SETUP = "false";
# IMMICH_IGNORE_MOUNT_CHECK_ERRORS = "true";
};
overrides = {
volumes = [
"${serverCfg.dataPath}/immich:/data"
];
};
};
ml = builder.mkContainer {
image = "ghcr.io/immich-app/immich-machine-learning:${version}";
port = 3003;
overrides = {
volumes = [
"${serverCfg.configPath}/immich/cache:/cache"
];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."CUSTOM".path;
script = pkgs.writeShellScript "setup" ''
PSQL="${pkgs.postgresql}/bin/psql -U postgres"
$PSQL -d "immich_db" -tAc "CREATE EXTENSION IF NOT EXISTS vchord CASCADE;"
$PSQL -d "immich_db" -tAc "CREATE EXTENSION IF NOT EXISTS earthdistance CASCADE;"
mkdir -p ${serverCfg.dataPath}/immich/{upload,library,thumbs,encoded-video,profile,backups}
IMMICH_URL="https://${containerCfg.subdomain}.${serverCfg.domain}"
until [[ "$(${pkgs.curl}/bin/curl -s -o /dev/null -w "%{http_code}" "$IMMICH_URL")" =~ (200|301|302) ]]; do
sleep 5
done
${pkgs.curl}/bin/curl -X POST "$IMMICH_URL/api/auth/admin-sign-up" \
-H "Content-Type: application/json" -H "Accept: application/json" \
-d '{ "email": "'"$DEFAULT_ADMIN_EMAIL"'", "password": "'"$DEFAULT_ADMIN_PASSWORD"'", "name": "'"$DEFAULT_ADMIN_USERNAME"'" }'
IMMICH_TOKEN=$(${pkgs.curl}/bin/curl -sSf -X POST "$IMMICH_URL/api/auth/login" \
-H "Content-Type: application/json" \
-d '{ "email": "'"$DEFAULT_ADMIN_EMAIL"'", "password": "'"$DEFAULT_ADMIN_PASSWORD"'"}' \
| ${pkgs.jq}/bin/jq -r '.accessToken')
${lib.optionalString (serverCfg.containers ? authentik) ''
${pkgs.curl}/bin/curl -s -X GET "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" | \
${pkgs.jq}/bin/jq '.oauth.enabled = true |
.oauth.autoRegister = true |
.oauth.autoLaunch = true |
.oauth.signingAlgorithm = "RS256" |
.oauth.profileSigningAlgorithm = "RS256" |
.oauth.clientId = "immich" |
.oauth.clientSecret = "'"$IMMICH_OAUTH_SECRET"'" |
.oauth.issuerUrl = "https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/o/immich/" |
.oauth.scope = "openid profile email" |
.oauth.buttonText = "Login with SSO"' | \
${pkgs.curl}/bin/curl -s -X PUT "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" -H "Content-Type: application/json" -d @-
''}
${pkgs.curl}/bin/curl -s -X GET "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" | \
${pkgs.jq}/bin/jq '.storageTemplate.enable = true |
.storageTemplate.template = "{{y}}/{{#if album}}{{album}}{{else}}{{MM}}{{/if}}/{{filename}}"' | \
${pkgs.curl}/bin/curl -s -X PUT "$IMMICH_URL/api/system-config" -H "Cookie: immich_access_token=$IMMICH_TOKEN; immich_auth_type=password; immich_is_authenticated=true" -H "Content-Type: application/json" -d @-
'';
};
}

View File

@@ -0,0 +1,45 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
influxPkg = pkgs.influxdb2;
image = pkgs.dockerTools.streamLayeredImage {
name = influxPkg.name;
tag = influxPkg.version;
contents = [ ];
config = {
Entrypoint = [ "${influxPkg}/bin/influxd" ];
ExposedPorts = {
"8086/tcp" = {}; # Combined Engine and UI port
};
};
};
in {
sops = true; # Highly recommended for initial admin passwords and setup tokens
db = false; # Using InfluxDB directly as the primary database
paths = [{
path = "${serverCfg.configPath}/influxdb/";
mode = "0700"; # Strict database permissions
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8086;
secret = name;
extraEnv = {
INFLUXD_CONFIG_PATH = "var/lib/influxdb2/config";
INFLUXD_BOLT_PATH = "/var/lib/influxdb2/influxdb.bolt";
INFLUXD_ENGINE_PATH = "/var/lib/influxdb2/engine";
};
overrides = {
volumes = [
"${serverCfg.configPath}/influxdb/:/var/lib/influxdb2"
];
};
};
};
}

View File

@@ -0,0 +1,78 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
patchedInvidious = pkgs.invidious.overrideAttrs (oldAttrs: {
postPatch = (oldAttrs.postPatch or "") + ''
cp ${../data/invidious/login.cr} src/invidious/routes/login.cr
'';
});
image = pkgs.dockerTools.streamLayeredImage {
name = pkgs.invidious.name;
tag = pkgs.invidious.version;
contents = [ pkgs.cacert patchedInvidious ];
config = {
Entrypoint = [ "${patchedInvidious}/bin/invidious" ];
ExposedPorts = { "3000/tcp" = {}; };
Env = [
"SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
"NIX_SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
];
};
};
in {
sops = true;
db = true;
paths = [{
path="${serverCfg.configPath}/invidious";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 3000;
secret = name;
extraLabels = {
"traefik.http.routers.${containerCfg.subdomain}-login.rule" = "Host(`${containerCfg.subdomain}.${serverCfg.domain}`) && Path(`/login`) ";
"traefik.http.routers.${containerCfg.subdomain}-login.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
"traefik.http.routers.${containerCfg.subdomain}-login.priority" = "100";
"traefik.http.routers.${containerCfg.subdomain}-login.entrypoints" = "web-secure";
"traefik.http.routers.${containerCfg.subdomain}-login.tls" = "true";
};
extraEnv = {
INVIDIOUS_CONFIG_FILE = "/data/config.yml";
};
overrides = {
volumes = [
"${serverCfg.configPath}/invidious:/data:ro"
];
};
};
companion = builder.mkContainer {
image = "quay.io/invidious/invidious-companion:latest";
port = 8282;
secret = name; #SERVER_SECRET_KEY = INVIDIOUS_COMPANION_KEY
extraOptions = [
"--cap-drop=all"
"--security-opt=no-new-privileges"
];
};
};
setup = {
trigger = "server";
envFile = [ config.sops.secrets."INVIDIOUS".path config.sops.secrets."CUSTOM".path ];
script = pkgs.writeShellScript "setup" ''
export DB_HOST=${builder.host}
export INVIDIOUS_DOMAIN=${containerCfg.subdomain}.${serverCfg.domain}
${pkgs.gettext}/bin/envsubst < "${../data/invidious/config.yml}" > "${serverCfg.configPath}/invidious/config.yml"
'';
};
}

View File

@@ -0,0 +1,177 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
LDAP_DC_DOMAIN = "dc=ldap," + (lib.concatMapStringsSep "," (x: "dc=${x}") (lib.splitString "." serverCfg.domain));
nss = pkgs.dockerTools.fakeNss.override {
extraPasswdLines = [
"jellyfin:x:1000:1000:Jellyfin Daemon:/config/data:/bin/false"
];
extraGroupLines = [
"jellyfin:x:1000:"
];
};
image = pkgs.dockerTools.streamLayeredImage { # pkgs.dockerTools.buildImage{#
name = pkgs.jellyfin.name;
tag = pkgs.jellyfin.version;
contents = [ pkgs.cacert nss pkgs.jellyfin pkgs.bashInteractive ];
config = {
User = "jellyfin:jellyfin";
Entrypoint = [ "${pkgs.jellyfin}/bin/jellyfin" ];
ExposedPorts = { "8096/tcp" = { }; };
Env = [
"SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
"NIX_SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
];
};
};
in {
paths = [
{
path = "${serverCfg.dataPath}/media/";
owner = "1000:1000";
mode = "0755";
}
{
path = "${serverCfg.configPath}/jellyfin/";
owner = "1000:1000";
mode = "0755";
}
];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 8096;
extraEnv = {
HOME = "/config/data";
DOTNET_SYSTEM_GLOBALIZATION_INVARIANT = "1";
JELLYFIN_HttpListenerHost__BindAddress= "0.0.0.0"; #we can use settings.xml override
JELLYFIN_ServerName = if containerCfg.extra?name then containerCfg.extra.name else "Flix";
};
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides = {
cmd = [
"--datadir" "/config/data"
"--cachedir" "/config/cache"
"--configdir" "/config/config"
"--logdir" "/config/log"
];
volumes = [
"${serverCfg.dataPath}/media:/media:ro"
"${serverCfg.configPath}/jellyfin:/config"
];
# If you have an Intel/AMD GPU for transcoding, add the device:
devices = lib.optionals (builtins.pathExists "/dev/dri") [ "/dev/dri:/dev/dri" ];
};
};
};
setup = {
trigger = "server";
envFile = config.sops.secrets."CUSTOM".path;
script = pkgs.writeShellScript "setup" ''
JELLYFIN_URL="https://${containerCfg.subdomain}.${serverCfg.domain}"
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
sleep 5
done
echo "Jellyfin is up. Sleeping for 20 seconds..."
sleep 20
WIZARD_COMPLETE=$(${pkgs.curl}/bin/curl -sSf "$JELLYFIN_URL/System/Info/Public" 2>/dev/null | \
${pkgs.jq}/bin/jq -r '.StartupWizardCompleted // false')
if [ "$WIZARD_COMPLETE" = "false" ]; then
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/Configuration" \
-H "Content-Type: application/json" \
-d '{"ServerName":"Flix","UICulture":"en-US","MetadataCountryCode":"US","PreferredMetadataLanguage":"en"}'; then
echo "ERROR: Failed to set startup configuration."
exit 1
fi
if ! ${pkgs.curl}/bin/curl -sSf -X GET "$JELLYFIN_URL/Startup/User"; then
echo "ERROR: Failed to get base user."
exit 1
fi
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/User" \
-H 'accept: */*' -H "Content-Type: application/json" \
-d '{"Name": "'"$DEFAULT_ADMIN_USERNAME"'", "Password": "'"$DEFAULT_ADMIN_PASSWORD"'"}'; then
echo "ERROR: Failed to set admin user."
exit 1
fi
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Startup/RemoteAccess" \
-H "Content-Type: application/json" \
-d '{"EnableRemoteAccess":true,"EnableAutomaticPortMapping":false}'; then
echo "ERROR: Failed to configure remote access."
exit 1
fi
if ! ${pkgs.curl}/bin/curl -sSf -X POST "''$JELLYFIN_URL/Startup/Complete"; then
echo "ERROR: Failed to complete wizard."
exit 1
fi
echo "Jellyfin initialization successfully completed!"
fi
${lib.optionalString (serverCfg.containers ? authentik) ''
JELLYFIN_TOKEN=$(${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Users/AuthenticateByName" \
-H "Content-Type: application/json" \
-H "Authorization: MediaBrowser Client=\"Bash Script\", Device=\"Server Terminal\", DeviceId=\"script-12345\", Version=\"1.0.0\"" \
-d "{\"Username\": \"$DEFAULT_ADMIN_USERNAME\", \"Pw\": \"$DEFAULT_ADMIN_PASSWORD\"}" \
| ${pkgs.jq}/bin/jq -r '.AccessToken')
# Verify we got a token
if [ "$JELLYFIN_TOKEN" = "null" ] || [ -z "$JELLYFIN_TOKEN" ]; then
echo "ERROR: Authentication failed."
exit 1
fi
if ${pkgs.curl}/bin/curl -sSf -H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
"$JELLYFIN_URL/Plugins" | ${pkgs.gnugrep}/bin/grep -q "958aad6637844d2ab89aa7b6fab6e25c"; then
echo "LDAP Plugin is already installed. Skipping setup."
else
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Packages/Installed/LDAP%20Authentication?assemblyGuid=958aad6637844d2ab89aa7b6fab6e25c" \
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
-H "Content-Length: 0"; then
echo "ERROR: LDAP Plugin Setup Failed."
exit 1
fi
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/System/Restart" \
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
-H "Content-Length: 0"; then
echo "ERROR: Server failed to accept restart command."
exit 1
fi
sleep 1-
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
sleep 5
done
echo "Jellyfin is up. Sleeping for 20 seconds..."
sleep 20
fi
if ! ${pkgs.curl}/bin/curl -sSf -X POST "$JELLYFIN_URL/Plugins/958aad66-3784-4d2a-b89a-a7b6fab6e25c/Configuration" \
-H "Authorization: MediaBrowser Token=\"$JELLYFIN_TOKEN\"" \
-H "Content-Type: application/json" -H 'accept: */*' \
-d '{"LdapUsers":[],"LdapServer":"authentik-ldap","LdapPort":6636,"UseSsl":true,"UseStartTls":false,"SkipSslVerify":true,
"LdapBindUser":"cn=ldap-service,ou=users,${LDAP_DC_DOMAIN}","LdapBindPassword": "'"$DEFAULT_LDAP_PASSWORD"'",
"LdapBaseDn":"${LDAP_DC_DOMAIN}","LdapSearchFilter":"(memberOf=cn=flix,ou=groups,${LDAP_DC_DOMAIN})",
"LdapSearchAttributes":"uid, cn, mail, displayName",
"LdapAdminBaseDn":"","LdapAdminFilter":"(memberOf=cn=admin,ou=groups,${LDAP_DC_DOMAIN})",
"EnableLdapAdminFilterMemberUid":false,"LdapUidAttribute":"uid","LdapUsernameAttribute":"cn","LdapPasswordAttribute":"userPassword",
"EnableLdapProfileImageSync":false,"RemoveImagesNotInLdap":false,"LdapProfileImageAttribute":"jpegphoto","LdapProfileImageFormat":"Default",
"LdapClientCertPath":"","LdapClientKeyPath":"","LdapRootCaPath":"","CreateUsersFromLdap":true,"AllowPassChange":false,
"EnableAllFolders":true,"EnabledFolders":[],"PasswordResetUrl":""}'; then
echo "ERROR: LDAP Plugin Setup Failed."
exit 1
fi
''}
echo "Completed Setup"
'';
};
}

View File

@@ -0,0 +1,199 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
version = "31";
serverCfg = config.syscfg.server;
in {
sops = true;
db = true;
paths = [{
path="${serverCfg.dataPath}/nextcloud/www";
owner = "33:33";
mode = "0755";
}{
path="${serverCfg.dataPath}/nextcloud/data";
owner = "33:33";
mode = "0755";
backup = true;
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "nextcloud:${version}";
port = 80;
secret = name;
extraEnv = {
REDIS_HOST = builder.host;
POSTGRES_HOST = builder.host;
POSTGRES_USER = "nextcloud_user";
POSTGRES_DB = "nextcloud_db";
AUTHENTIK_POSTGRESQL__SSLMODE = "disable";
"NEXTCLOUD_TRUSTED_DOMAINS " = "${containerCfg.subdomain}.${serverCfg.domain}";
"SMTP_HOST" = serverCfg.mailServer;
"SMTP_NAME" = "mail_user";
"SMTP_PASSWORD" = "mail_password";
"MAIL_FROM_ADDRESS" = "${containerCfg.subdomain}@${serverCfg.domain}";
"MAIL_DOMAIN" = serverCfg.mailDomain;
"TRUSTED_PROXIES" = "10.10.0.0/16 192.168.0.0/16";
};
extraLabels = {
"traefik.http.routers.${containerCfg.subdomain}.middlewares" = "sts_headers,${containerCfg.subdomain}-caldav";
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.permanent" = "true";
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.regex" = "https://(.*)/.well-known/(?:card|cal)dav";
"traefik.http.middlewares.${containerCfg.subdomain}-caldav.redirectregex.replacement" = "https://$1/remote.php/dav";
"traefik.http.middlewares.sts_headers.headers.stsSeconds" = "15552000";
"traefik.http.middlewares.sts_headers.headers.stsIncludeSubdomains" = "true";
};
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides = {
ports = if containerCfg.port!=null then [ "${toString containerCfg.port}:80" ] else [];
volumes = [
"${serverCfg.dataPath}/nextcloud/www:/var/www/html"
"${serverCfg.dataPath}/nextcloud/data:/var/www/html/data"
];
};
};
};
setup = {
trigger = "server";
script = pkgs.writeShellScript "setup" ''
# Define the command wrapper
OCC="${pkgs.podman}/bin/podman --events-backend=none exec --env-file ${config.sops.secrets."CUSTOM".path} -e DOMAIN=${serverCfg.domain} -u www-data nextcloud-server php occ"
echo "Waiting for Nextcloud container to start..."
until $OCC status > /dev/null 2>&1; do
sleep 2
done
INSTALLED=$($OCC status --output=json | grep -o '"installed":true')
if [ -z "$INSTALLED" ]; then
echo "Running first-time setup..."
$OCC maintenance:install \
--admin-user "$DEFAULT_ADMIN_USERNAME" \
--admin-pass "$DEFAULT_ADMIN_PASSWORD"
fi
if [ -z "$INSTALLED" ] || [ -f "/tmp/force-nextcloud-setup" ]; then
rm -f "/tmp/force-nextcloud-setup"
echo "Applying Settings..."
$OCC config:system:set default_phone_region --value="CH"
$OCC config:system:set overwriteprotocol --value="https"
$OCC config:app:set core backgroundjobs_mode --value="cron"
$OCC config:system:set maintenance_window_start --type=integer --value=1
$OCC config:system:set default_language --value="en"
$OCC config:system:set default_locale --value="en_CH"
echo "Applying Apps..."
$OCC app:disable activity || true
$OCC app:disable app_api || true
$OCC app:disable comments || true
$OCC app:disable firstrunwizard || true
$OCC config:system:set show_first_run_wizard --type=bool --value=false
$OCC app:disable nextcloud_announcements || true
$OCC app:disable oauth2 || true
$OCC app:disable recommendations || true
$OCC app:disable sharebymail || true
$OCC app:disable support || true
$OCC app:disable survey_client || true
$OCC app:disable updatenotification || true
$OCC app:disable user_status || true
$OCC app:install calendar || true
$OCC app:install calendar || true
$OCC app:install contacts || true
$OCC app:install camerarawpreviews || true
$OCC app:install cospend || true
$OCC app:install deck || true
$OCC app:install files_markdown || true
$OCC app:install forms || true
$OCC app:install groupfolders || true
$OCC app:install ownpad || true
$OCC app:install previewgenerator || true
$OCC app:install richdocuments || true
${lib.optionalString (serverCfg.containers ? collabora == false) ''$OCC app:install richdocumentscode || true''}
# $OCC app:install side_menu || true
$OCC app:install spreed || true
$OCC app:install teamfolders || true
${lib.optionalString (serverCfg.containers ? authentik) ''$OCC app:install user_saml || true''}
echo "Applying Apps Settings..."
$OCC config:system:set enabledPreviewProviders --value='["OC\\Preview\\Movie", "OC\\Preview\\PNG", "OC\\Preview\\JPEG", "OC\\Preview\\GIF", "OC\\Preview\\HEIC", "OC\\Preview\\RAW"]' --type=json
$OCC config:app:set cospend allow_federation --value="yes"
${lib.optionalString (serverCfg.containers ? ethercalc) ''
$OCC config:app:set ownpad ownpad_ethercalc_enable --value="yes"
$OCC config:app:set ownpad ownpad_ethercalc_host --value="https://${serverCfg.containers.ethercalc.subdomain}.${serverCfg.domain}"
''}
${lib.optionalString (serverCfg.containers ? etherpad) ''
$OCC config:app:set ownpad ownpad_etherpad_enable --value="yes"
$OCC config:app:set ownpad ownpad_etherpad_host --value="https://${serverCfg.containers.etherpad.subdomain}.${serverCfg.domain}"
''}
${lib.optionalString (serverCfg.containers ? collabora) ''
$OCC config:app:set richdocuments wopi_url --value="https://${serverCfg.containers.collabora.subdomain}.${serverCfg.domain}/"
$OCC config:app:set richdocuments public_wopi_url --value="https://${serverCfg.containers.collabora.subdomain}.${serverCfg.domain}"
$OCC config:app:set richdocuments wopi_allowlist --value="10.0.0.0/8"
''}
${lib.optionalString (serverCfg.containers ? authentik) ''
$OCC saml:config:set 1 --general-idp0_display_name="authentik"
$OCC saml:config:set 1 --general-uid_mapping="http://schemas.goauthentik.io/2021/02/saml/username"
$OCC saml:config:set 1 --idp-entityId="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}"
$OCC saml:config:set 1 --idp-singleSignOnService.url="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/saml/nextcloud/sso/binding/redirect/"
$OCC saml:config:set 1 --idp-singleLogoutService.url="https://${serverCfg.containers.authentik.subdomain}.${serverCfg.domain}/application/saml/nextcloud/slo/binding/redirect/"
AUTHENTIK_CERT=$(${pkgs.postgresql}/bin/psql -h localhost -U authentik_user -d authentik_db -At -c "SELECT certificate_data FROM authentik_crypto_certificatekeypair WHERE name = 'authentik Self-signed Certificate';")
$OCC saml:config:set 1 --idp-x509cert="$AUTHENTIK_CERT"
$OCC saml:config:set 1 --saml-attribute-mapping-displayName_mapping="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
$OCC saml:config:set 1 --saml-attribute-mapping-email_mapping="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
$OCC saml:config:set 1 --saml-attribute-mapping-group_mapping="http://schemas.xmlsoap.org/claims/Group"
$OCC config:app:set user_saml general-allowed_groups --value="admin,cloud"
$OCC group:add admin || true
$OCC group:add cloud || true
$OCC config:app:set user_saml general-group_provisioning --value="0"
$OCC config:app:set user_saml general-require_provisioning_groups --value="1"
''}
# configure side_menu ...
FOLDERS=$($OCC teamfolders:list --format=json)
${builtins.concatStringsSep "\n" (map (name: ''
if ! echo "$FOLDERS" | grep -q '"name":"${name}"'; then
$OCC teamfolders:create "${name}"
fi
'') containerCfg.extra.teamFolders or [])}
SERVERS=$($OCC federation:list-servers --format=json)
${builtins.concatStringsSep "\n" (map (domain: ''
if ! echo "$SERVERS" | grep -q "${domain}"; then
$OCC federation:add-server "https://${domain}"
fi
'') containerCfg.extra.federatedServers or [])}
$OCC config:app:set systemtags allow_user_creating --value="no"
echo "Applying Theme..."
$OCC config:app:set theming url --value="https://${containerCfg.subdomain}.${serverCfg.domain}"
${lib.optionalString (containerCfg.extra ? name) ''$OCC config:app:set theming name --value="${containerCfg.extra.name}"''}
${lib.optionalString (containerCfg.extra ? slogan) ''$OCC config:app:set theming slogan --value="${containerCfg.extra.slogan}"''}
$OCC config:app:set theming background_color --value="${serverCfg.colorScheme.palette.base02}"
$OCC config:app:set theming primary_color --value="${serverCfg.colorScheme.palette.base0C}"
#$OCC theming:config logo {serverCfg.colorScheme.logo}
#$OCC theming:config logoheader {serverCfg.colorScheme.logo}
#$OCC theming:config background {serverCfg.colorScheme.bg}
else
echo "Nextcloud is already installed. Skipping setup."
fi
echo "Maintenance..."
$OCC app:update --all
$OCC maintenance:repair --include-expensive --no-interaction
$OCC db:add-missing-indices --no-interaction
echo "Completed Setup"
'';
};
cron = [ "*/5 * * * * root ${pkgs.podman}/bin/podman --events-backend=none exec -u www-data nextcloud-server php -f /var/www/html/cron.php" ];
}

View File

@@ -0,0 +1,92 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
version= "latest";
serverCfg = config.syscfg.server;
settings = pkgs.writeText"settings.yml" (pkgs.lib.generators.toYAML {}{
use_default_settings = true;
brand = {
issue_url = "";
docs_url = "";
public_instances = "";
wiki_url = "";
custom = {
links = {
"Home" = "https://${serverCfg.domain}";
# "Status" = "https://status.${serverCfg.domain}";
};
};
pwa_colors = {
theme_color_light = "${serverCfg.colorScheme.palette.base0C}";
background_color_light = "${serverCfg.colorScheme.palette.base07}";
theme_color_dark = "${serverCfg.colorScheme.palette.base0C}";
background_color_dark = "${serverCfg.colorScheme.palette.base02}";
theme_color_black = "${serverCfg.colorScheme.palette.base0C}";
background_color_black = "${serverCfg.colorScheme.palette.base01}";
};
};
general = {
debug = false;
instance_name = if containerCfg.extra ? instanceName then containerCfg.extra.instanceName else "SearXNG";
privacypolicy_url = false;
donation_url = false;
contact_url = false;
enable_metrics = false;
};
search = {
safe_search = 0;
autocomplete = if containerCfg.extra ? autocomplete then containerCfg.extra.autocomplete else "";
languages = [ "all" "en" "en-US" "ja" "de-CH" "fr-CH" "nb" ];
};
server = {
# secret_key = ""; SET BY ENV VAR
};
ui = {
default_locale = if containerCfg.extra ? defaultLocale then containerCfg.extra.defaultLocale else "en";
# query_in_title = "true";
#default_theme = "custom";
custom_css = "footer { display: none !important; }";
};
# categories_as_tabs = {
# general = {};
# images ={};
# videos = {};
# news = {};
# files = {};
# };
plugins = {
"searx.plugins.infinite_scroll.SXNGPlugin".active = true;
"searx.plugins.tracker_url_remover.SXNGPlugin".active = true;
};
});
in {
sops = true;
# paths = [{
# path="${serverCfg.dataPath}/searxng/";
# mode = "0444";
# }];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "searxng/searxng:${version}";
port = 8080;
secret = name;
extraEnv = {
SEARXNG_BASE_URL = "https://${containerCfg.subdomain}.${serverCfg.domain}";
SEARXNG_PORT = "8080";
SEARXNG_BIND_ADDRESS = "[::]";
SEARXNG_PUBLIC_INSTANCE = "false";
SEARXNG_SETTINGS_PATH = "/etc/searxng/settings.yml";
#SEARXNG_VALKEY_URL = "valkey://user:password@${builder.host}:6379/0}";
};
overrides = {
cmd = [ ];
volumes = [
"${settings}:/etc/searxng/settings.yml"
# "/path/to/your/logo.png:/usr/local/searxng/searx/static/themes/simple/img/searxng.png
# "${serverCfg.dataPath}/searxng:/var/cache/searxng/"
];
};
};
};
}

View File

@@ -0,0 +1,83 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
mkServarrImage = appName: appPkg: binaryPath: pkgs.dockerTools.streamLayeredImage {
name = appPkg.name;
tag = appPkg.version;
contents = with pkgs; [ cacert openssl ];
config = {
Cmd = [ "${appPkg}/${binaryPath}" "-nobrowser" "-data=/config" ];
Env = [ "DOTNET_SYSTEM_GLOBALIZATION_INVARIANT=1" "HOME=/tmp" ];
};
};
images = {
prowlarr = mkServarrImage "prowlarr" pkgs.prowlarr "bin/Prowlarr";
radarr = mkServarrImage "radarr" pkgs.radarr "bin/Radarr";
sonarr = mkServarrImage "sonarr" pkgs.sonarr "bin/Sonarr";
bazarr = mkServarrImage "bazarr" pkgs.bazarr "bin/bazarr";
lidarr = mkServarrImage "lidarr" pkgs.lidarr "bin/Lidarr";
readarr = mkServarrImage "readarr" pkgs.readarr "bin/Readarr";
};
sharedVolumes = [
"${serverCfg.dataPath}/media:/media" # Fast hardlinking requires a single shared root
"${serverCfg.configPath}/servarr:/config-root"
];
in {
sops = true;
paths = [
{ path = "${serverCfg.dataPath}/media/"; mode = "0755"; }
{ path = "${serverCfg.configPath}/servarr/prowlarr"; mode = "0755"; }
{ path = "${serverCfg.configPath}/servarr/radarr"; mode = "0755"; }
{ path = "${serverCfg.configPath}/servarr/sonarr"; mode = "0755"; }
];
containers = {
prowlarr = builder.mkContainer {
subdomain = containerCfg.subdomain;
subpath = "prowlarr";
imageStream = images.prowlarr;
port = 9696;
secret = name;
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides.volumes = sharedVolumes ++ [ "${serverCfg.configPath}/servarr/prowlarr:/config" ];
};
radarr = builder.mkContainer {
subdomain = containerCfg.subdomain;
subpath = "radarr";
imageStream = images.radarr;
port = 7878;
secret = name;
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides.volumes = sharedVolumes ++ [ "${serverCfg.configPath}/servarr/radarr:/config" ];
};
sonarr = builder.mkContainer {
subdomain = containerCfg.subdomain;
subpath = "sonarr";
imageStream = images.sonarr;
port = 8989;
secret = name;
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides.volumes = sharedVolumes ++ [ "${serverCfg.configPath}/servarr/sonarr:/config" ];
};
};
# setup = {
# trigger = "prowlarr"; # Triggers atomic environment verification on main controller
# envFile = config.sops.secrets."SERVARR".path;
# script = pkgs.writeShellScript "setup-servarr" ''
# echo "Validating multi-container path permission nodes..."
# # mkdir -p ${serverCfg.configPath}/servarr/{prowlarr,radarr,sonarr}
# '';
# };
}

View File

@@ -0,0 +1,87 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
serverCfg = config.syscfg.server;
image = pkgs.dockerTools.streamLayeredImage {
name = "traefik";
tag = pkgs.traefik.version;
contents = with pkgs;[ cacert tzdata ];
config = {
Entrypoint = [ "${pkgs.traefik}/bin/traefik" ];
WorkingDir = "/";
};
};
in {
sops = true;
paths = [{
path="${serverCfg.configPath}/traefik";
owner = "1000:1000";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
imageStream = image;
subdomain = containerCfg.subdomain;
port = 8080;
secret = name;
extraLabels = {
"traefik.http.routers.${containerCfg.subdomain}.priority" = "10";
"traefik.http.routers.${containerCfg.subdomain}.service" = "api@internal";
"traefik.http.routers.${containerCfg.subdomain}.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
} // (if serverCfg.containers?authentik then {
"traefik.http.middlewares.authentik.forwardauth.maxResponseBodySize" = "10485760";
"traefik.http.middlewares.authentik.forwardauth.address" = "http://authentik-server:9000/outpost.goauthentik.io/auth/traefik";
"traefik.http.middlewares.authentik.forwardauth.trustForwardHeader" = "true";
"traefik.http.middlewares.authentik.forwardauth.authResponseHeaders" = "X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid,X-authentik-jwt,X-authentik-meta-jwks,X-authentik-meta-outpost,X-authentik-meta-provider,X-authentik-meta-app,X-authentik-meta-version";
} else {}) // (if serverCfg.containers?umami then {
"traefik.http.middlewares.umami-global.plugin.umami-feeder.umamiHost" = "http://umami-server:3000";
"traefik.http.middlewares.umami-global.plugin.umami-feeder.umamiUsername" = "admin";
"traefik.http.middlewares.umami-global.plugin.umami-feeder.umamiPassword" = "umami";
"traefik.http.middlewares.umami-global.plugin.umami-feeder.createNewWebsites" = "true";
} else {}) // (if containerCfg.extra ? provider || serverCfg.domain != "localhost" then {
"traefik.http.routers.${containerCfg.subdomain}.tls.certresolver" = "default";
"traefik.http.routers.${containerCfg.subdomain}.tls.domains[0].main" = "${serverCfg.domain}";
"traefik.http.routers.${containerCfg.subdomain}.tls.domains[0].sans" = "*.${serverCfg.domain}";
} else {});
extraEnv = { };
overrides = {
cmd = [
"--api"
"--log.level=INFO"
"--providers.docker=true"
"--global.checknewversion=false"
"--global.sendanonymoususage=false"
"--api.insecure=true"
"--api.dashboard=true"
"--providers.docker.exposedByDefault=false"
"--entrypoints.web.address=:80"
"--entrypoints.web-secure.address=:443"
"--entrypoints.web.http.redirections.entrypoint.to=web-secure"
"--entrypoints.web.http.redirections.entrypoint.scheme=https"
"--entrypoints.web-secure.transport.respondingtimeouts.readtimeout=0s"
"--entrypoints.web-secure.proxyprotocol.trustedips=127.0.0.1/32,192.168.1.1/16,10.10.0.0/16"
] ++ (if serverCfg.containers ? umami then [
"--experimental.plugins.umami-feeder.moduleName=github.com/astappiev/traefik-umami-feeder"
"--experimental.plugins.umami-feeder.version=v1.4.1"
"--entrypoints.web-secure.http.middlewares=umami-global@docker"
] else []) ++ (if containerCfg.extra ? provider then [
"--certificatesresolvers.default.acme.email=acme@${serverCfg.domain}"
"--certificatesresolvers.default.acme.dnschallenge=true"
"--certificatesresolvers.default.acme.dnschallenge.provider=${containerCfg.extra.provider}"
"--certificatesresolvers.default.acme.storage=/custom/acme.json"
] else []) ++ (if serverCfg.domain != "localhost" then [
"--certificatesresolvers.default.acme.httpchallenge=false"
"--certificatesresolvers.default.acme.tlschallenge=true"
] else []);
ports = [ "443:443" "80:80" ] ++ (if containerCfg.port!=null then [ "${toString containerCfg.port}:8080" ] else []);
volumes = [
"/var/run/podman/podman.sock:/var/run/docker.sock"
# "${serverCfg.configPath}/traefik/access.log:/etc/traefik/access.log"
"${serverCfg.configPath}/traefik:/custom"
];
};
};
};
}

View File

@@ -0,0 +1,57 @@
{ config, containerCfg, pkgs, lib, builder, name, ... }:
let
serverCfg = config.syscfg.server;
image = pkgs.dockerTools.streamLayeredImage {
name = pkgs.transmission_4.name;
tag = pkgs.transmission_4.version;
contents = [ pkgs.cacert ];
config = {
Cmd = [ "${pkgs.transmission_4}/bin/transmission-daemon" "--foreground" "--config-dir" "/config" ];
ExposedPorts = {
"9091/tcp" = {};
"51413/tcp" = {}; "51413/udp" = {};
};
};
};
in {
paths = [{
path = "${serverCfg.dataPath}/transmission/complete";
owner = "1000:1000";
mode = "0755";
}{
path = "${serverCfg.dataPath}/transmission/incomplete";
owner = "1000:1000";
mode = "0755";
}{
path = "${serverCfg.dataPath}/transmission/config";
owner = "1000:1000";
mode = "0755";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
imageStream = image;
port = 9091;
extraEnv = {
PUID = "1000";
PGID = "1000";
TZ = "Europe/Zurich";
};
extraLabels = { } // (if serverCfg.containers ? authentik then {
"traefik.http.routers.${containerCfg.subdomain}.middlewares" = "authentik";
} else {});
overrides = {
cmd = [ ];
volumes = [
"${serverCfg.dataPath}/transmission/complete:/downloads/complete"
"${serverCfg.dataPath}/transmission/incomplete:/downloads/incomplete"
"${serverCfg.dataPath}/transmission/config:/config"
];
};
};
};
}

View File

@@ -0,0 +1,3 @@
{...}:{
}

View File

@@ -0,0 +1,54 @@
{ config, containerCfg, pkgs, lib, builder, name,... }:
let
serverCfg = config.syscfg.server;
# Umami image built from nixpkgs
image = pkgs.dockerTools.streamLayeredImage {
name = pkgs.umami.name;
tag = pkgs.umami.version;
contents = with pkgs; [ cacert openssl ];
config = {
# Umami in nixpkgs typically provides a binary or script to start the server
Entrypoint = [ "${pkgs.umami}/bin/umami-server" ];
ExposedPorts = { "3000/tcp" = {}; };
Env = [ "NODE_ENV=production" ];
};
};
in {
sops = true;
db = true;
paths = [{
path = "${serverCfg.configPath}/umami/";
mode = "0444";
}];
containers = {
server = builder.mkContainer {
subdomain = containerCfg.subdomain;
image = "${pkgs.umami.name}:${pkgs.umami.version}";
imageStream = image;
port = 3000;
secret = name;
extraEnv = {
PORT = "3000";
# HOSTNAME = "${containerCfg.subdomain}.${serverCfg.domain}";
DATABASE_TYPE = "postgresql";
REDIS_URL = "redis://${builder.host}";
CLIENT_IP_HEADER = "X-Forwarded-For";
BASE_PATH = lib.optionalString (containerCfg.subpath or null != null) "/${containerCfg.subpath}";
# DISABLE_LOGIN = "1";#(if serverCfg.containers?authentik then "1" else "0");
};
extraLabels = { } // ( if serverCfg.containers?authentik then {
"traefik.http.routers.${containerCfg.subdomain}.middlewares" = if serverCfg.containers?authentik then "authentik" else "";
} else {});
extraOptions = [
"--tmpfs=/tmp:rw,noexec,nosuid,size=512m"
];
overrides = {
cmd = [ "start" ]; # Specific command for the umami binary
};
};
};
}

View File

@@ -0,0 +1,53 @@
{ config, lib, pkgs, serverCfg }:
let
builder =
{ image ? null, imageStream ? null, imageFile ? null
, secret ? null
, subdomain ? null, subpath?null, port ? 0
, extraEnv ? { }, extraLabels ? { }, extraOptions ? [ ]
, overrides ? { }
}:
let
routerName = if subpath != null
then "${subdomain}-${lib.strings.sanitizeDerivationName subpath}"
else subdomain;
base = {
image = if imageStream != null then "${imageStream.imageName}:${imageStream.imageTag}"
else if imageFile != null then "${imageFile.imageName}:${imageFile.imageTag}" else image;
imageStream = imageStream;
imageFile = imageFile;
environmentFiles = if secret!=null then [ config.sops.secrets."${lib.toUpper secret}".path ] else [];
environment = {} // extraEnv;
labels = (if subdomain!=null then ({
"traefik.enable" = "true";
"traefik.http.routers.${routerName}.entrypoints" = "web-secure";
"traefik.http.routers.${routerName}.rule" = if subpath != null
then "Host(`${subdomain}.${serverCfg.domain}`) && PathPrefix(`/${subpath}`)"
else "Host(`${subdomain}.${serverCfg.domain}`)";
"traefik.http.routers.${routerName}.tls" = "true";
} // lib.optionalAttrs (port!=null) {
"traefik.http.services.${routerName}.loadbalancer.server.port" = toString port;
}) else {
"traefik.enable" = "false";
}) // extraLabels;
extraOptions = extraOptions ++ [
"--add-host=host.containers.internal:host-gateway"
];
};
in lib.recursiveUpdate base overrides;
in {
mkContainer = builder;
mkData = { name, dir, vars?{} }: pkgs.runCommand name vars ''
mkdir -p $out
cp -r ${./data + "/${dir}"}/. $out/
find $out -type f | while read file; do
${lib.concatStringsSep "\n" (lib.mapAttrsToList (n: v: ''
substituteInPlace "$file" --replace "@${n}@" "${toString v}"
'') vars)}
done
'';
host = "host.containers.internal";
}

View File

@@ -0,0 +1,70 @@
version: 1
metadata:
name: "Initial User Setup"
labels:
blueprint-type: core
entries:
# Optionally, disable the default enrollment flow entirely
- model: authentik_flows.flow
identifiers:
slug: "default-source-enrollment"
attrs:
designation: "enrollment"
enabled: false
# --- GROUPS ---
- model: authentik_core.group
identifiers:
name: "admin"
attrs:
is_superuser: true
- model: authentik_core.group
identifiers:
name: "cloud"
attrs:
is_superuser: false
- model: authentik_core.group
identifiers:
name: "dev"
attrs:
is_superuser: false
- model: authentik_core.group
identifiers:
name: "flix"
attrs:
is_superuser: false
- model: authentik_core.group
identifiers:
name: "family"
attrs:
is_superuser: false
# --- ADMIN USERS ---
- model: authentik_core.user
identifiers:
username: !Env DEFAULT_ADMIN_USERNAME
attrs:
name: !Env DEFAULT_ADMIN_USERNAME
email: !Env DEFAULT_ADMIN_EMAIL
password: !Env DEFAULT_ADMIN_PASSWORD
path: "users"
groups:
- !Find [authentik_core.group, [name, "admin"]]
# Disable the Initial Setup Flow
- model: authentik_flows.flow
identifiers:
slug: "initial-setup"
attrs:
authentication: "require_superuser"
enabled: false
# Disable the default 'akadmin' if it exists
- model: authentik_core.user
identifiers:
username: "akadmin"
attrs:
is_active: false

View File

@@ -0,0 +1,11 @@
version: 1
metadata:
name: gitea-ldap-setup
entries:
- model: authentik_core.application
id: gitea-app
identifiers:
slug: gitea
attrs:
name: Gitea
launch_url: "@GITEA_DOMAIN@"

View File

@@ -0,0 +1,62 @@
version: 1
metadata:
name: "Immich OAuth2 Provisioning"
labels:
app: immich
entries:
- model: authentik_providers_oauth2.oauth2provider
identifiers:
name: "Immich Provider"
attrs:
authorization_flow:
!Find [
authentik_flows.flow,
[slug, default-provider-authorization-implicit-consent],
]
authentication_flow:
!Find [authentik_flows.flow, [slug, default-authentication-flow]]
invalidation_flow:
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
client_type: "confidential"
client_id: "immich"
client_secret: !Env IMMICH_OAUTH_SECRET
access_code_validity: "minutes=5"
token_validity: "days=30"
signing_key:
!Find [
authentik_crypto.certificatekeypair,
[name, "authentik Self-signed Certificate"],
]
redirect_uris:
- url: "app.immich:///oauth-callback"
matching_mode: "strict"
- url: "https://@IMMICH_DOMAIN@/auth/login"
matching_mode: "regex"
- url: "https://@IMMICH_DOMAIN@/user-settings"
matching_mode: "regex"
property_mappings:
- !Find [
authentik_providers_oauth2.scopemapping,
[name, "authentik default OAuth Mapping: OpenID 'openid'"],
]
- !Find [
authentik_providers_oauth2.scopemapping,
[name, "authentik default OAuth Mapping: OpenID 'email'"],
]
- !Find [
authentik_providers_oauth2.scopemapping,
[name, "authentik default OAuth Mapping: OpenID 'profile'"],
]
- model: authentik_core.application
identifiers:
slug: "immich"
attrs:
name: "Immich"
launch_url: "@IMMICH_DOMAIN@"
provider:
!Find [
authentik_providers_oauth2.oauth2provider,
[name, "Immich Provider"],
]

View File

@@ -0,0 +1,11 @@
version: 1
metadata:
name: jellyfin-ldap-setup
entries:
- model: authentik_core.application
id: jellyfin-app
identifiers:
slug: jellyfin
attrs:
name: Jellyfin
launch_url: "@JELLYFIN_DOMAIN@"

View File

@@ -0,0 +1,78 @@
version: 1
metadata:
name: Pre-configured LDAP Outpost
entries:
- model: authentik_providers_ldap.ldapprovider
identifiers:
name: ldap-provider
attrs:
base_dn: "@AUTHENTIK_LDAP_DC_DOMAIN@"
search_group: null
authorization_flow:
!Find [authentik_flows.flow, [slug, default-authentication-flow]]
invalidation_flow:
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
- model: authentik_core.user
state: present
identifiers:
username: "ldap-service"
attrs:
name: "LDAP Bind Service Account"
type: "service_account"
path: "goauthentik.io"
is_active: true
password: !Env DEFAULT_LDAP_PASSWORD
attributes:
ak_recovery_immutable: true
- model: authentik_core.token
identifiers:
identifier: ldap-outpost-static-token
attrs:
intent: api
key: !Env AUTHENTIK_TOKEN
user: !Find [authentik_core.user, [username, "ldap-service"]]
- model: authentik_outposts.outpost
identifiers:
name: LDAP Outpost
attrs:
type: ldap
providers:
- !Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
token:
!Find [authentik_core.token, [identifier, ldap-outpost-static-token]]
config:
log_level: info
authentik_host: https://sso.test.helcel.net/
refresh_interval: minutes=5
authentik_host_insecure: false
- model: authentik_rbac.role
state: present
identifiers:
name: "LDAP Search Role"
attrs:
permissions:
- "authentik_providers_ldap.search_full_directory"
- model: authentik_core.group
state: present
identifiers:
name: "LDAP Search Group"
attrs:
users:
- !Find [authentik_core.user, [username, "ldap-service"]]
roles:
- !Find [authentik_rbac.role, [name, "LDAP Search Role"]]
- model: authentik_core.application
id: ldap-placeholder
identifiers:
slug: ldap
attrs:
name: ldap
group: _
provider:
!Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]

View File

@@ -0,0 +1,58 @@
version: 1
metadata:
name: nextcloud-saml-setup
entries:
- model: authentik_providers_saml.samlprovider
identifiers:
name: Nextcloud SAML
attrs:
authorization_flow:
!Find [
authentik_flows.flow,
[slug, default-provider-authorization-explicit-consent],
]
invalidation_flow:
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
acs_url: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/acs
audience: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/metadata
issuer: https://@AUTHENTIK_DOMAIN@
sp_binding: post
property_mappings:
- !Find [
authentik_core.propertymapping,
[name, "authentik default SAML Mapping: Name"],
]
- !Find [
authentik_core.propertymapping,
[name, "authentik default SAML Mapping: Email"],
]
- !Find [
authentik_core.propertymapping,
[name, "authentik default SAML Mapping: Groups"],
]
- !Find [
authentik_core.propertymapping,
[name, "authentik default SAML Mapping: Username"],
]
- !Find [
authentik_core.propertymapping,
[name, "authentik default SAML Mapping: User ID"],
]
signing_kp:
!Find [
authentik_crypto.certificatekeypair,
[name, "authentik Self-signed Certificate"],
]
sign_assertion: true
sign_response: false
- model: authentik_core.application
identifiers:
slug: nextcloud
attrs:
name: Nextcloud
provider:
!Find [authentik_providers_saml.samlprovider, [name, Nextcloud SAML]]
launch_url: "@NEXTCLOUD_DOMAIN@"

View File

@@ -0,0 +1,46 @@
version: 1
metadata:
name: domain-wide-proxy-setup
entries:
# 1. The Provider
- model: authentik_providers_proxy.proxyprovider
identifiers:
name: Domain Wide Proxy
attrs:
authorization_flow:
!Find [
authentik_flows.flow,
[slug, default-provider-authorization-implicit-consent],
]
invalidation_flow:
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
external_host: https://@AUTHENTIK_DOMAIN@
cookie_domain: "@COOKIE_DOMAIN@"
mode: forward_domain
intercept_header_auth: true
# 2. The Application (Required to link the provider)
- model: authentik_core.application
identifiers:
slug: authentik-proxy
attrs:
name: "Domain Auth Provider"
group: _
provider:
!Find [
authentik_providers_proxy.proxyprovider,
[name, Domain Wide Proxy],
]
# 3. Add to Outpost
- model: authentik_outposts.outpost
identifiers:
name: authentik Embedded Outpost
attrs:
providers:
- !Find [
authentik_providers_proxy.proxyprovider,
[name, Domain Wide Proxy],
]

View File

@@ -0,0 +1,137 @@
db:
user: invidious_user
password: $DB_PASSWORD
host: $DB_HOST
port: 5432
dbname: invidious_db
check_tables: true
invidious_companion:
- private_url: "http://immich-companion:8282/companion"
invidious_companion_key: $SERVER_SECRET_KEY
port: 3000
external_port: 443
host_binding: 0.0.0.0
domain: $INVIDIOUS_DOMAIN
https_only: false
#hsts: true
## Accepted values: true, false, dash, livestreams, downloads, local
#disable_proxy: false
# use_innertube_for_captions: false
# -----------------------------
# Features
# -----------------------------
popular_enabled: false
statistics_enabled: true
registration_enabled: true
login_enabled: true
captcha_enabled: false
admins: ["$DEFAULT_ADMIN_EMAIL"]
enable_user_notifications: false
# -----------------------------
# Background jobs
# -----------------------------
channel_threads: 1
#channel_refresh_interval: 30m
full_refresh: false
feed_threads: 1
jobs:
clear_expired_items:
enable: true
refresh_channels:
enable: true
refresh_feeds:
enable: true
# -----------------------------
# Miscellaneous
# -----------------------------
#banner:
# use_pubsub_feeds: true
hmac_key: $HMAC_KEY
#dmca_content:
#cache_annotations: false
#modified_source_code_url: ""
#playlist_length_limit: 500
#########################################
#
# Default user preferences
#
#########################################
default_user_preferences:
# -----------------------------
# Internationalization
# -----------------------------
#locale: en-US
#region: US
## Top 3 preferred languages for video captions.
#captions: ["", "", ""]
# -----------------------------
# Interface
# -----------------------------
dark_mode: "auto"
#thin_mode: false
feed_menu: ["Subscriptions", "Playlists"]
default_home: Subscriptions
#max_results: 40
#annotations: false
#annotations_subscribed: false
#comments: ["youtube", ""]
#player_style: invidious
#related_videos: true
# -----------------------------
# Video player behavior
# -----------------------------
#preload: true
#autoplay: false
#continue: false
#continue_autoplay: true
#listen: false
#video_loop: false
# -----------------------------
# Video playback settings
# -----------------------------
#quality: dash
#quality_dash: auto
#speed: 1.0
#volume: 100
#vr_mode: true
save_player_pos: true
# -----------------------------
# Subscription feed
# -----------------------------
#latest_only: false
#notifications_only: false
unseen_only: true
#sort: published
# -----------------------------
# Miscellaneous
# -----------------------------
#local: false
show_nick: false
#automatic_instance_redirect: false
#extend_desc: false

View File

@@ -0,0 +1,101 @@
{% skip_file if flag?(:api_only) %}
module Invidious::Routes::Login
def self.login_page(env)
locale = env.get("preferences").as(Preferences).locale
user = env.get? "user"
referer = get_referer(env, "/feed/subscriptions")
return env.redirect referer if user
return error_template(400, "Login has been disabled by administrator.") if !CONFIG.login_enabled
if forwarded_user = env.request.headers["X-authentik-email"]?
begin
email = forwarded_user.try &.downcase.byte_slice(0, 254)
return error_template(401, "User ID is a required field") if email.nil? || email.empty?
user = Invidious::Database::Users.select(email: email)
if user
sid = Base64.urlsafe_encode(Random::Secure.random_bytes(32))
Invidious::Database::SessionIDs.insert(sid, email)
env.response.cookies["SID"] = Invidious::User::Cookies.sid(CONFIG.domain, sid)
if env.request.cookies["PREFS"]?
cookie = env.request.cookies["PREFS"]
cookie.expires = Time.utc(1990, 1, 1)
env.response.cookies << cookie
end
else
return error_template(400, "Registration has been disabled by administrator.") if !CONFIG.registration_enabled
sid = Base64.urlsafe_encode(Random::Secure.random_bytes(32))
user, sid = create_user(sid, email, "")
if language_header = env.request.headers["Accept-Language"]?
if language = ANG.language_negotiator.best(language_header, LOCALES.keys)
user.preferences.locale = language.header
end
end
Invidious::Database::Users.insert(user)
Invidious::Database::SessionIDs.insert(sid, email)
view_name = "subscriptions_#{sha256(user.email)}"
PG_DB.exec("CREATE MATERIALIZED VIEW #{view_name} AS #{MATERIALIZED_VIEW_SQL.call(user.email)}")
env.response.cookies["SID"] = Invidious::User::Cookies.sid(CONFIG.domain, sid)
if env.request.cookies["PREFS"]?
user.preferences = env.get("preferences").as(Preferences)
Invidious::Database::Users.update_preferences(user)
cookie = env.request.cookies["PREFS"]
cookie.expires = Time.utc(1990, 1, 1)
env.response.cookies << cookie
end
end
return env.redirect referer
rescue ex
return error_template(500, "Authentication error: #{ex.message}")
end
end
env.redirect referer
end
def self.login(env)
referer = get_referer(env, "/feed/subscriptions")
env.redirect referer
return error_template(403, "Login post is not supported.")
end
def self.signout(env)
locale = env.get("preferences").as(Preferences).locale
user = env.get? "user"
sid = env.get? "sid"
referer = get_referer(env)
return env.redirect referer if !user
user = user.as(User)
sid = sid.as(String)
token = env.params.body["csrf_token"]?
begin
validate_request(token, sid, env.request, HMAC_KEY, locale)
rescue ex
return error_template(400, ex)
end
Invidious::Database::SessionIDs.delete(sid: sid)
env.request.cookies.each do |cookie|
cookie.expires = Time.utc(1990, 1, 1)
env.response.cookies << cookie
end
env.redirect referer
end
end

View File

@@ -0,0 +1,75 @@
{ config, pkgs, lib, ... }:
let
serverCfg = config.syscfg.server;
builder = import ./builder.nix { inherit config lib pkgs serverCfg; };
in{
config = lib.mkMerge [{
syscfg.server.loadedContainers = lib.mapAttrs (name: containerCfg:
(import (./apps + "/${name}.nix")) { inherit config pkgs lib containerCfg builder name; }
) config.syscfg.server.containers;
} (lib.mkIf ( serverCfg.containers != {} ) (
let
appsList = builtins.attrValues config.syscfg.server.loadedContainers;
mergedContainers = lib.concatMapAttrs (appName: app:
lib.mapAttrs' (cName: cCfg: lib.nameValuePair "${appName}-${cName}" cCfg) app.containers
) config.syscfg.server.loadedContainers;
allPathConfigs = lib.concatMap (app: app.paths) appsList;
allSetupConfigs = lib.concatMap (app: if app.setup?script then [({name = app.name; envFile="";} // app.setup)] else []) appsList;
allCronsConfigs = lib.concatMap (app: app.cron) appsList;
in{
virtualisation.oci-containers = {
backend = "podman";
containers = mergedContainers;
};
system.activationScripts.container-setup-dirs = {
deps = [ "users" "groups" ];
text = lib.concatStringsSep "\n" (map (cfg:
let
effectiveCfg = {
owner = "root:root";
mode = "0400";
} // cfg;
in ''
${pkgs.coreutils}/bin/mkdir -p "${effectiveCfg.path}"
${pkgs.coreutils}/bin/chown ${effectiveCfg.owner} "${effectiveCfg.path}"
${pkgs.coreutils}/bin/chmod ${effectiveCfg.mode} "${effectiveCfg.path}"
'') allPathConfigs);
};
systemd.services = {
podman-gc = {
description = "Podman garbage collection";
serviceConfig.Type = "oneshot";
script = ''
${pkgs.podman}/bin/podman container prune -f
${pkgs.podman}/bin/podman image prune -f
'';
startAt = "weekly";
};
} // lib.listToAttrs (lib.concatMap (e: [{
name = "${e.name}-setup";
value = {
description = "Run ${e.name} setup";
after = [ "podman-${e.name}-${e.trigger}.service" ];
wants = [ "podman-${e.name}-${e.trigger}.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "oneshot";
TimeoutStartSec = "360s";
EnvironmentFile = e.envFile;
ExecStart = e.script;
RemainAfterExit = true;
User = "root";
};
};
}]) allSetupConfigs );
services.cron = {
enable = true;
systemCronJobs = allCronsConfigs;
};
}))];
}

View File

@@ -0,0 +1,73 @@
{ config, lib, pkgs, ... }:
let
listNames = config.syscfg.server.db;
containerNames = builtins.attrNames (lib.filterAttrs (appName: app: app.db) config.syscfg.server.loadedContainers);
allApps = lib.unique (listNames ++ containerNames);
in {
config = lib.mkIf ( builtins.length allApps > 0) {
services.postgresql = {
enable = true;
enableTCPIP = true;
extensions = ps: with ps; [ vectorchord pgvector ];
settings = {
listen_addresses = lib.mkForce "*";
shared_preload_libraries = "vchord";
};
authentication = pkgs.lib.mkOverride 10 ''
# TYPE DATABASE USER ADDRESS METHOD
local all all trust
host all all 127.0.0.1/32 trust
host all all ::1/128 trust
host all all 10.0.0.0/8 scram-sha-256
host all all 169.254.0.0/16 scram-sha-256
'';
ensureDatabases = map (name: "${name}_db") allApps;
ensureUsers = map (name: { name = "${name}_user"; }) allApps;
};
services.postgresqlBackup = {
enable = true;
location = "/var/lib/postgresql/backups";
startAt = "*-*-* 04:00:00"; # Runs every day at 4 AM
backupAll = true; # Backs up all databases and roles
};
services.redis.servers."main" = {
enable = true;
port = 6379;
bind = "*";
settings.protected-mode = "no";
};
systemd.services.postgresql-init = {
description = "Custom Postgres Setup (Ownership & Passwords)";
after = [ "postgresql.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "oneshot";
User = "postgres";
RemainAfterExit = true;
};
script = ''
${pkgs.coreutils}/bin/sleep 20
PSQL="${pkgs.postgresql}/bin/psql"
${lib.concatMapStringsSep "\n" (name: ''
$PSQL -tAc "ALTER DATABASE ${name}_db OWNER TO ${name}_user;"
if [ -f "${config.sops.secrets."${lib.toUpper name}".path}" ]; then
PASS=$(grep "^DB_PASSWORD=" "${config.sops.secrets."${lib.toUpper name}".path}" | cut -d'=' -f2-)
if $PSQL -tAc "ALTER USER ${name}_user WITH PASSWORD '$PASS';" ; then
echo " Successfully set password for ${name}_user"
else
echo " FAILED to set password for ${name}_user"
fi
fi
'') allApps}
'';
};
};
}

View File

@@ -1,15 +1,3 @@
{ config, pkgs, lib, ... }: { config, pkgs, lib, ... }:{
let imports = [ ./containers ./database ./nftables ./openssh ./sops ];
in {
imports = [ ./sops ];
environment.systemPackages = with pkgs; [ arion ];
virtualisation.arion = {
backend = "podman-socket";
projects = {
cloud.settings = import ./docker/cloud.nix { inherit config pkgs lib; };
authentik.settings =
import ./docker/authentik.nix { inherit config pkgs lib; };
};
};
} }

View File

@@ -1,104 +0,0 @@
{ config, pkgs, lib, ... }:
let serverCfg = config.syscfg.server;
in {
project.name = "authentik";
networks = {
internal = {
name = lib.mkForce "internal";
internal = true;
};
external = {
name = lib.mkForce "external";
internal = false;
};
};
services = {
auth_postgresql.service = {
image = "postgres:14-alpine";
container_name = "auth_postgresql";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ ];
environment = {
POSTGRES_PASSWORD = "/run/secrets/AUTHENTIK_POSTGRESQL__PASSWORD";
POSTGRES_USER = "authentik";
POSTGRES_DB = "authentik";
};
};
auth_redis.service = {
image = "redis:alpine";
container_name = "auth_redis";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ ];
environment = { };
labels = { "traefik.enable" = "false"; };
};
auth_server.service = {
image = "ghcr.io/goauthentik/server:latest";
container_name = "auth_server";
restart = "unless-stopped";
networks = [ "internal" "external" ];
volumes = [
"${serverCfg.dataPath}/authentik/media:/media"
"${serverCfg.dataPath}/authentik/templates:/templates"
];
environment = {
"AUTHENTIK_REDIS__HOST" = "auth_redis";
"AUTHENTIK_POSTGRESQL__HOST" = "auth_postgresql";
"AUTHENTIK_POSTGRESQL__USER" = "authentik";
"AUTHENTIK_POSTGRESQL__NAME" = "authentik";
"AUTHENTIK_POSTGRESQL__PASSWORD" = "AUTHENTIK_DB_PASSWORD";
"AUTHENTIK_SECRET_KEY" = "AUTHENTIK_SECRET_KEY";
"AUTHENTIK_EMAIL__HOST" = "${serverCfg.mailDomain}";
"AUTHENTIK_EMAIL__PORT" = "587";
"AUTHENTIK_EMAIL__USERNAME" = "noreply@${serverCfg.hostDomain}";
"AUTHENTIK_EMAIL__PASSWORD" = "AUTHENTIK_EMAIL_PASSWORD";
"AUTHENTIK_EMAIL__USE_TLS" = "true";
"AUTHENTIK_EMAIL__USE_SSL" = "false";
"AUTHENTIK_EMAIL__TIMEOUT" = "10";
"AUTHENTIK_EMAIL__FROM" = "sso@noreply.${serverCfg.hostDomain}";
};
labels = {
"traefik.enable" = "true";
"traefik.http.routers.sso.entrypoints" = "web-secure";
"traefik.http.routers.sso.rule" = "Host(`sso.${serverCfg.hostDomain}`)";
"traefik.http.routers.sso.tls" = "true";
"traefik.http.services.sso.loadbalancer.server.port" = "9000";
"traefik.docker.network" = "external";
};
command = "server";
ports = [
"9999:9000" # host:container
];
};
auth_worker.service = {
image = "ghcr.io/goauthentik/server:latest";
container_name = "auth_worker";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [
"${serverCfg.dataPath}/authentik/media:/media"
"${serverCfg.dataPath}/authentik/templates:/templates"
"/var/run/docker.sock:/var/run/docker.sock"
];
environment = {
"AUTHENTIK_REDIS__HOST" = "auth_redis";
"AUTHENTIK_POSTGRESQL__HOST" = "auth_postgresql";
"AUTHENTIK_POSTGRESQL__USER" = "authentik";
"AUTHENTIK_POSTGRESQL__NAME" = "authentik";
"AUTHENTIK_POSTGRESQL__PASSWORD" = "AUTHENTIK_DB_PASSWORD";
"AUTHENTIK_SECRET_KEY" = "AUTHENTIK_SECRET_KEY";
};
labels = { "traefik.enable" = "false"; };
command = "worker";
user = "root";
};
};
}

View File

@@ -1,152 +0,0 @@
{ config, pkgs, lib, ... }:
let serverCfg = config.syscfg.server;
in {
project.name = "cloud";
networks = {
internal = {
name = lib.mkForce "internal";
internal = true;
};
external = {
name = lib.mkForce "external";
internal = false;
};
};
services = {
cloud_nextcloud.service = {
image = "nextcloud:27";
container_name = "cloud";
restart = "unless-stopped";
networks = [ "external" ];
volumes = [
"${serverCfg.configPath}/data/nextcloud:/var/www/html"
"${serverCfg.dataPath}/data/music:/media/music"
"${serverCfg.dataPath}/data/video:/media/video"
"${serverCfg.dataPath}/data/photo:/media/photo"
];
tmpfs = [ "/tmp" ];
labels = {
"traefik.enable" = "true";
"traefik.http.routers.nextcloud.entrypoints" = "web-secure";
"traefik.http.routers.nextcloud.rule" =
"Host(`cloud.${serverCfg.hostDomain}`)";
"traefik.http.routers.nextcloud.tls" = "true";
"traefik.http.routers.nextcloud.middlewares" =
"sts_headers,nextcloud-caldav";
"traefik.http.middlewares.nextcloud-caldav.redirectregex.permanent" =
"true";
"traefik.http.middlewares.nextcloud-caldav.redirectregex.regex" =
"^https://(.*)/.well-known/(card|cal)dav";
"traefik.http.middlewares.nextcloud-caldav.redirectregex.replacement" =
"https://$\${1}/remote.php/dav/";
"traefik.http.middlewares.sts_headers.headers.stsSeconds" = "15552000";
"traefik.http.middlewares.sts_headers.headers.stsIncludeSubdomains" =
"true";
};
};
cloud_office.service = {
image = "collabora/code:latest";
container_name = "cloud_office";
restart = "unless-stopped";
networks = [ "external" ];
volumes = [ ];
environment = {
username = "COLLABORA_USER";
password = "COLLABORA_PASSWORD";
aliasgroup1 = "https://cloud.${serverCfg.hostDomain}";
server_name = "office.${serverCfg.hostDomain}";
VIRTUAL_HOST = "office.${serverCfg.hostDomain}";
VIRTUAL_PORT = "9980";
VIRTUAL_PROTO = "http";
DONT_GEN_SSL_CERT = "true";
RESOLVE_TO_PROXY_IP = "true";
NETWORK_ACCESS = "internal";
extra_params = "--o:ssl.enable=false --o:ssl.termination=true";
dictionaries = "en fr de jp";
};
labels = {
"traefik.enable" = "true";
"traefik.http.routers.collabora.entrypoints" = "web-secure";
"traefik.http.routers.collabora.rule" =
"Host(`office.${serverCfg.hostDomain}`)";
"traefik.http.routers.collabora.tls" = "true";
};
};
cloud_etherpad.service = {
image = "etherpad/etherpad:latest";
container_name = "etherpad";
restart = "unless-stopped";
networks = [ "external" ];
volumes = [
"${serverCfg.dataPath}/ether/etherpad/data:/opt/etherpad-lite/var"
"${serverCfg.dataPath}/ether/etherpad/APIKEY.txt:/opt/etherpad-lite/APIKEY.txt"
];
environment = {
NODE_ENV = "production";
TITLE = "Helcel-Pad";
DB_TYPE = "mysql";
DB_HOST = serverCfg.dbHost;
DB_PORT = serverCfg.dbPort;
DB_NAME = "etherpad";
DB_USER = "ETHERPAD_DB_USER";
DB_PASS = "ETHERPAD_DB_PASSWORD";
DB_CHARSET = "utf8mb4";
DEFAULT_PAD_TEXT = "P A D";
PAD_OPTIONS_SHOW_LINE_NUMBERS = "true";
PAD_OPTIONS_USE_MONOSPACE_FONT = "true";
ADMIN_PASSWORD = "ETHERPAD_ADMIN_PASSWORD";
SKIN_VARIANTS = "super-dark-toolbar light-editor dark-background";
};
labels = {
"traefik.enable" = "true";
"traefik.http.routers.etherpad.entrypoints" = "web-secure";
"traefik.http.routers.etherpad.rule" =
"Host(`pad.${serverCfg.hostDomain}`)";
"traefik.http.routers.etherpad.tls" = "true";
};
};
cloud_ethercalc.service = {
image = "audreyt/ethercalc:latest";
container_name = "ethercalc";
restart = "unless-stopped";
networks = [ "external" "internal" ];
volumes = [
"${serverCfg.dataPath}/ether/etherpad/data:/opt/etherpad-lite/var"
"${serverCfg.dataPath}/ether/etherpad/APIKEY.txt:/opt/etherpad-lite/APIKEY.txt"
];
environment = {
NODE_ENV = "production";
TITLE = "Helcel-Calc";
REDIS_PORT_6379_TCP_ADDR = "ethercalc-redis";
REDIS_PORT_6379_TCP_PORT = "6379";
ADMIN_PASSWORD = "ETHERPAD_ADMIN_PASSWORD";
SKIN_VARIANTS = "super-dark-toolbar light-editor dark-background";
};
labels = {
"traefik.enable" = "true";
"traefik.http.routers.ethercalc.entrypoints" = "web-secure";
"traefik.http.routers.ethercalc.rule" =
"Host(`calc.${serverCfg.hostDomain}`)";
"traefik.http.routers.ethercalc.tls" = "true";
};
};
cloud_redis.service = {
image = "redis:latest";
container_name = "ethercalc-redis";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ "${serverCfg.dataPath}/ether/ethercalc/redis:/data" ];
environment = { };
labels = { "traefik.enable" = "false"; };
};
};
}

View File

@@ -1,30 +0,0 @@
{ config, pkgs, lib, ... }:
let serverCfg = config.syscfg.server;
in {
project.name = "name";
networks = {
internal = {
name = lib.mkForce "internal";
internal = true;
};
external = {
name = lib.mkForce "external";
internal = false;
};
};
services = {
NAME.service = {
image = "NAME:latest";
container_name = "NAME";
restart = "unless-stopped";
networks = [ "internal" ];
volumes = [ ];
environment = { };
labels = { "traefik.enable" = "false"; };
};
};
}

View File

@@ -1,81 +0,0 @@
{ config, pkgs, ... }: {
project.name = "traefik";
networks = {
internal = {
name = lib.mkForce "internal";
internal = true;
};
external = {
name = lib.mkForce "external";
internal = false;
};
};
services = {
traefik.service = {
image = "traefik:latest";
container_name = "traefik";
restart = "unless-stopped";
networks = [ "internal" "external" ];
command = [
"--api"
"--providers.docker=true"
"--entrypoints.web.address=:80"
"--entrypoints.web-secure.address=:443"
];
port = [ "443" "80" ];
volumes = [
"/var/run/docker.sock:/var/run/docker.sock:ro"
"${serverCfg.configPath}/traefik/traefik.yaml:/etc/traefik/traefik.yaml"
"${serverCfg.configPath}/traefik/access.log:/etc/traefik/access.log"
"${serverCfg.configPath}/traefik/acme.json:/acme.json"
];
environment = {
"INFOMANIAK_ACCESS_TOKEN" = config.sops.secrets.INFOMANIAK_API_KEY.path;
};
labels = { "traefik.enable" = "false"; };
};
matomo.service = {
image = "matomo:latest";
container_name = "matomo";
restart = "unless-stopped";
networks = [ "external" ];
volumes = [
"/etc/localtime:/etc/localtime:ro"
"${serverCfg.configPath}/matomo:/var/www/html/config:rw"
"${serverCfg.configPath}/traefik/access.log:/var/log/taccess.log:ro"
];
environment = { };
labels = {
"traefik.http.routers.matomo.rule" =
"Host(`matomo.${serverCfg.hostDomain}`)";
"traefik.http.routers.matomo.entrypoints" = "web-secure";
"traefik.http.routers.matomo.tls" = "true";
};
};
searx.service = {
image = "searxng/searxng:latest";
container_name = "searx";
restart = "unless-stopped";
networks = [ "external" ];
volumes = [ "/etc/localtime:/etc/localtime:ro" ];
environment = {
"BASE_URL" = "https://searx.${serverCfg.hostDomain}";
"AUTOCOMPLETE" = "true";
"INSTANCE_NAME" = "searx${serverCfg.shortName}";
};
labels = {
"traefik.http.routers.matomo.rule" =
"Host(`searx.${serverCfg.hostDomain}`)";
"traefik.http.routers.matomo.entrypoints" = "web-secure";
"traefik.http.routers.matomo.tls" = "true";
};
};
};
}

View File

@@ -0,0 +1,41 @@
{ config, lib, ... }:
let
cfg = config.syscfg.server;
in {
config = lib.mkIf (cfg.ipfw.enable) {
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = 1;
"net.ipv6.conf.all.forwarding" = 1;
};
networking.nftables.enable = true;
networking.nftables.ruleset = ''
table inet nat {
chain prerouting {
type nat hook prerouting priority dstnat; policy accept;
${lib.concatMapStringsSep "\n" (rule:
let
srcInt = builtins.elemAt rule 0;
dstAddr4 = builtins.elemAt rule 1;
dstAddr6 = builtins.elemAt rule 2;
srcPort = toString (builtins.elemAt rule 3);
dstPort = toString (builtins.elemAt rule 4);
in ''
iifname "${srcInt}" tcp dport ${srcPort} counter dnat ip to ${dstAddr4}:${dstPort}
iifname "${srcInt}" udp dport ${srcPort} counter dnat ip to ${dstAddr4}:${dstPort}
iifname "${srcInt}" tcp dport ${srcPort} counter dnat ip6 to [${dstAddr6}]:${dstPort}
iifname "${srcInt}" udp dport ${srcPort} counter dnat ip6 to [${dstAddr6}]:${dstPort}
''
) cfg.ipfw.ports}
}
chain postrouting {
type nat hook postrouting priority srcnat; policy accept;
oifname { ${lib.concatMapStringsSep ", " (iface: ''"${iface}"'') cfg.ipfw.ifs} } masquerade
}
}
'';
};
}

View File

@@ -0,0 +1,27 @@
{ config, lib, ... }:
let
allUsers = lib.concatMap (peer: if peer.syscfg ? users then peer.syscfg.users else []) config.syscfg.peers;
groupedUsers = lib.groupBy (u: u.username) allUsers;
allowedUsernames = map (u: u.username) config.syscfg.users;
activeUsers = lib.filterAttrs (name: _: lib.elem name allowedUsernames) groupedUsers;
in {
config = lib.mkIf (config.syscfg.server.openssh) {
services.openssh = {
enable = true;
ports = [ 422 ];
banner = "";
settings = {
PasswordAuthentication = false;
PermitRootLogin = "no";
ClientAliveInterval = 60;
ClientAliveCountMax = 3;
TCPKeepAlive = true;
};
};
users.users = lib.mapAttrs (name: userList: {
openssh.authorizedKeys.keys = lib.unique (
lib.concatMap (u: if u ? pubssh then [ u.pubssh ] else []) userList
);
}) activeUsers;
};
}

View File

@@ -1,10 +1,16 @@
{ config, pkgs, ... }: { { config, lib, pkgs, ... }:
sops.secrets.INFOMANIAK_API_KEY = { sopsFile = ./server.yaml; }; let
sops.secrets."${config.syscfg.hostname}_ssh_pub" = { listNames = config.syscfg.server.db;
mode = "0400"; containerNames = builtins.attrNames (lib.filterAttrs (appName: app: app.sops) config.syscfg.server.loadedContainers);
owner = config.users.users.${config.syscfg.defaultUser}.name; allApps = lib.unique (listNames ++ containerNames);
group = config.users.users.${config.syscfg.defaultUser}.group; in{
sops.secrets = {
CUSTOM = {
mode = "0444";
sopsFile = ./server.yaml;
}; };
sops.secrets."${config.syscfg.hostname}_wg_priv" = { }; } // (lib.genAttrs (map (name: lib.toUpper name) allApps) (name: {
sops.secrets."${config.syscfg.hostname}_wg_pub" = { }; mode = "0444";
sopsFile = ./server.yaml;
}));
} }

View File

@@ -0,0 +1,38 @@
CUSTOM: |
DEFAULT_ADMIN_USERNAME=...
DEFAULT_ADMIN_PASSWORD=...
DEFAULT_ADMIN_EMAIL=...
DEFAULT_LDAP_PASSWORD=...
TRAEFIK: |
INFOMANIAK_ACCESS_TOKEN=...
AUTHENTIK: |
DB_PASSWORD=...
POSTGRES_PASSWORD=...
AUTHENTIK_SECRET_KEY=...
AUTHENTIK_EMAIL__PASSWORD=...
AUTHENTIK_TOKEN=...
NEXTCLOUD: |
DB_PASSWORD=...
POSTGRES_PASSWORD=...
COLLABORA: |
password=...
ETHERPAD: |
DB_PASSWORD=...
DB_PASS=...
ADMIN_PASSWORD=...
APIKEY=...
ETHERCALC: |
ETHERCALC_KEY=...
GITEA: |
DB_PASSWORD=...
GITEA__database__PASSWD=...
GITEA__security__SECRET_KEY=...
GITEA__security__INTERNAL_TOKEN=...
SEARXNG: |
SEARXNG_SECRET=...
UMAMI: |
DB_PASSWORD=...
DATABASE_URL=postgresql://username:mypassword@localhost:5432/mydb
APP_SECRET=...
IMMICH: |
DB_URL = "postgresql://immich_user:...@localhost:5432/immich_db";

View File

@@ -1,68 +1,58 @@
INFOMANIAK_API_KEY: ENC[AES256_GCM,data:QhjQoCMxogXAPtvUbf/EWkqsFAndn73LBuTqj5essjruekynH287D/CYN/cwfcnDqZoh6Z4A9p08uUmXzqmTiralAhsCoc+Ljb/monmsruc=,iv:8rMGNc9398jnFXZm34fOht6fMNDAcDZ68B1jwoQPn2Q=,tag:ZlQnPaxkCktpwiC6HzmFVg==,type:str] CUSTOM: ENC[AES256_GCM,data:8+973kGKWFbxGHTSnc+UDKC1Q5KKiTeESY68XHX2e2BVw7zpl2oYLPYv7wQ3JA2u6q5rFXrokNvh3ti6JcvQ/302APloPrw6YfC8RofjX7h+WVS9cBaND+AlliQqf+vGWI0VQoEFmJKogxbliIN9nGiL9FLa1QJHRJb1X4P76daakh1+P1eJlE4pgPvblPygDezabC/Pa2k3qCaGAvyOOyZYFNj5ttufmB0FlNQZMVLLuyA3xe92z6I/zbFPBY9RNa10v1+Wm5GRdD8JZHsJfPD1bLqH61mt/ZtczVY7fXnX9n3vbYYGaHiF/ylunydXgmAsDXjSWKwq5r7TCDnQR5lPqDpNtbLpnD+aY22e8AOSRlKLOhVUH2CU3B3Ry8pIYbVZz983DHgMoymd8ZISoHE+,iv:8/DRKfCYp+IG/UgxxxN2PgFjdd24Rc4wNpcVHP9KsAo=,tag:/ikcKONeiE5BWVLYoaWaCw==,type:str]
TRAEFIK: ENC[AES256_GCM,data:Ei+/OL7xwNaOEg3rSaz95N78nvp51lC63XCplNzeD+bBMGcK9G7HoyQxfpaJ7S0MkuMW0ZXT2nJ4GES40GoJCZIrnEiSBm2tpjDfNjlS/rFwxx0wVfM1nsEuBf3pL5dqiCNa9+Lad2Cd,iv:d1MH0ive+E8xuUK0CIOXZeEigHJKVGlFaq0iH4KSbZA=,tag:VTARuNeotr2I0+fdOk+iqA==,type:str]
AUTHENTIK: ENC[AES256_GCM,data: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,iv:uXAyOIBl9lGYBvALMdvp2hf6cj6QGWRcyUvEsjIDr1I=,tag:iLxO/qYT2zafXhFGVVUYkA==,type:str]
NEXTCLOUD: ENC[AES256_GCM,data:IWitzubILQ5SrGdO3UQZboisqAECt5lXOqHVg4yAKxedG7ZLOgVp6jPV+4VVDC13KEkxIsiYjjNvjqnOXCdYWQIC13YZ+o2IBDI9PgavBB3nmjfi0Q7BVki6C8qCtbM5H9uFlQ3h7rkPyEbE3pHa3dY5uwgdtmvw3qKf2UAZGIJCU7dKamjuTCucGitOEG434jFQik9duHZs7EV3AZrkLXqOfdvftvdpciDb/4/K7h/4uEYSXJ94Lf0b16/NRUcR,iv:1UvcbqC3hJEHU9t6Z+N226DTJEcgM315ynYkxPKpYSM=,tag:FGkXlUw+7LRu1/cpMys7OA==,type:str]
COLLABORA: ENC[AES256_GCM,data:cLGEziks5dyxTF1jugfpQE0l0nSkDP7MpROzCxCM94jv49sguA+d/SnY1olE8ZP9iCBnlvbMZyNR7uYo88B92Pmv8wVWfeuhHiHFIXh5aaOxntpt80UMg3Jy,iv:gmFG7C893QPuZ4rEqllAlUpNIXMcGsf9+/QCPLhWLTM=,tag:WpKHCUk6zhQRfFX2d6OPbQ==,type:str]
ETHERPAD: ENC[AES256_GCM,data:PSr06GyOgY0HDNC4Hr2XUjbNUszGlfBjxDbrrKNQOqSMSVfZj4iFIGamrS72WO0un4U7IENx0T6CTBN/ELoq7J/+W9zf879uzKWuNaAulLVtBqrUbbqA7hTJpidnveZXzdwZRvlz/bU8kWAmXyhiDb2Q42Sz3BDb6duM3PO1AgG8Ko1pi2IemCPjO3uzudeT8FAlO8NnCUxKgwIKSz8CodOXFVGk66NX4xJd4ycfdNYXvKBNlzt1+WuWsZeZzeWmF7WD2dt4wWA9fWxB90fnth6ZV5LdeXjyYnzwkFOWoyNazgqV4jBv+aXKVwX4fYvspu13cVdrak3gc698bS2N1guDss4A/sfXMbtaYPGm98xXkqz1LP7sXQzKUdZf9sAS9gtOVv2tmg==,iv:uQ0Roe+XefzMjZCF3It+U2D1MWPMT5f6CPwlz0gQ5W0=,tag:wSgp0CVr6Y6M3eqcoTy8cw==,type:str]
ETHERCALC: ENC[AES256_GCM,data:0ScnDsUNBt6wYJC4hTXn8huuTptBTDKZV4yFVQ4fuBWc6auWNWhDQlTc0ImJoK6efr2uyp3sVu3o+KlCNvUGhDOJ1you6socyTgRP0q7oLPC+Ln+bFP8gWG8v2nyEFY=,iv:YqvVjBFG/WZg1l4aMAiioOruWZ9zcTMr74DVW+1+2DQ=,tag:ePBXd4ddipJtxhFE1amfMg==,type:str]
GITEA: ENC[AES256_GCM,data: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,iv:vo6l0QirLIUvwLN675LYkffkXejJecvBesLJvoW/bjY=,tag:zyLyiCskF84A3QVoq5X3iw==,type:str]
SEARXNG: ENC[AES256_GCM,data:gtKhEmMemzLRl4c3cYhMAQ+5vUth1IhWQeLvW1YtaG5TbhQHBR4PDREQOlGt+tlfGQrft+FeNhMSN/SKOp8gmScVWa+9qmltzxRGRpLm3m/VuBZvOlGdeUcKAX8zEH6A,iv:B2UEtjTRIjT6W+tH2gtcl6XMvZNgbvZUXTiBePGOu24=,tag:SHIF6eaWBLwy9RrEy1N9kg==,type:str]
UMAMI: ENC[AES256_GCM,data:onB/uXLajaRLmeQMGNHFsjREzPih9ha+cogGRw+nRomERSRrbBv+6gCqEr8F3Dcm818JB4jGRYKoIYG8Jl6gMDaz5QQiA4qAnbG19LuzVeVUgz4NGEgXBULoT/0sQacnyAPIfPEp+ESWRQH81nO6Qcs+rICpS2Xfeye5hb+8rSAxmLpY991AJ3+avGyMwPcpfNCkixWt68KuG5ZN/IGDksM/sSLGgyMisClbEdhigq4mwibOxpiWjcKk/17xYgY6Xz93h/yloHKZIZZpnyA+85YC6oNWgCPhkGIAVu3dGshp10a0nk1A2INm6vxNPbfUjYLkt3zDAPZtoBRCqUs+43Eh62hYgajgWCQJhjJkDgF4Y1ifGfDerIXs/cDpIKLt2+7VqM6/ouqIDPJ7khSAr+8bcHU4CKDtsDagob5PpCG4ABt44cg9cGw=,iv:HD450JZuWn2+V0pvOsDHy9oVAanFMf1el9LA1z0PULY=,tag:p7Vl7dtM8UdAUNgmdG+7cg==,type:str]
IMMICH: ENC[AES256_GCM,data:1y78yeawkRjUXLWPyFdMB5HCDQhb1PoxEMfHmKSZfv0CWloOrQWT735dlH+W9yC6ljZjqVD9Fwq/9GqqKQMTFMCpr8wVRwSHEuqmaG3UgKzbLA3aWZ1SIB0AiJi+eUunzHj2vikUJx9dMRjC+iNXrsVWh2HqMrOyFCWetZoIfxNiAgsgNKPgYYsHLv6OAZs9XT7V3veqe0zc0nyw7ghWSXne/yNhQESyyGlMAdagrJRNimvXIp/AoAUKl2WUJm2MBl7lb6K1YeJ1XW8OjAHzV8isBiUwU8ZD81VJog0fgTGjbUa+HO7jEo+9YwmDIMx3f5z9N4A=,iv:pboITW2rr7+w8VNZM6uYMMEFZ1S/JtqjNOVthpYJ2tQ=,tag:0dgrJ191sB4MLJHMoQBlCg==,type:str]
INVIDIOUS: ENC[AES256_GCM,data:ZfgU5UFMmG9Cx9UaR0xnKr9VPebG3kut0difTFZmoqOSs+stG6YJfV82OOhj1RQLVJlPr/scydYy1+3LytwvP1BT7tLe0jII7XupbkL0w3n79KBaiIzAPdicqLxeqjKH45I0NjHra4djdnO2Ff4T8CTiFDlPn1rMuiw=,iv:UaDmOKJ4bFPGCaIePLXkWot9E6sTu2nhaVs83sI38G0=,tag:spTjxWEmLfPc8BZl2GglBA==,type:str]
SERVARR: ENC[AES256_GCM,data:fukF7bejebMU7yp48fix,iv:CZkLyO8N8BqSk+0KDcMDrz1pbwaNH7Pg+NvNebdIdYM=,tag:AOMvnZOE0H6QDCmkPg3Kyw==,type:str]
sops: sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age: age:
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg - recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
enc: | enc: |
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBpZk1VY3NEZmRkS0J6dU03 YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA4Rzc3ak4vRVZiNWxNZEN3
OUtETWpHL2hLN09kRytNUEhmVnA5WW9yVXlNCmZaZnQ2YUlMMmlrZ2dEZDVFMHA5 N21rSjZqUm9XVWF5TUxNTXVybEMzNCtod0NnClNjODB6VWhzU1VHeVdlZ3hEaE5D
OUpqOTJJbHVVREtpSFUyaDJDbXltaTgKLS0tIFY0ZkF3Ym5oeHViN3J4eW4vSVYz MW9WWWYvYmt5TmNzMzNudDhLSW12RnMKLS0tIDdjc2ZOK3QxaTFJMFdpTHFzcklr
QkhuU0NLWElyVXpZd2ZpOHhwam04R28KFuaI35e8pB25M2dlP19gApso12ZYJ3ld clZnQXpPbWs5aXZJeUlxOWhJNmIrOFkKZfZ19Y4yfCJi1GrxLsv76JyBmuxW/glF
BpMnp97ShX0I8bZRIYxSHpSrB/J+tt1V4pfGdJq7uWZM7XacPy666A== BCJCvmdSSOJx5JW26Y3Y3LwiIuL8yboKR+8ZAwU2fG5OQfs+2czFdQ==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
- recipient: age1ms8f0ysv6vakxepvt69fejczs6tddexepesdv4rkgtheehj3nu4sc6290s - recipient: age1pf4auk6u2tmefuqpuc6mntr26cp4wcsmlhnn98arzxsp3753ruqsj0jqk3
enc: | enc: |
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBuZXNjRzJsdFpTdDZhSkRB YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA1cEpsb2gvbDJ0aG5BRWNS
eW1qSStnZHN5Tzh3bFA1azZIRk42V1RzSTJJCi9MV0k5ZXNQOWJFYnlXdnB3azBL WXgydFo3ZkF3SmVIU1EvaHVjb3RvK3BxVDJrCis2ME9zUEVGQURFdmJXS2lTSklk
NzNldkFLWlEyT01MeWlFU3RKODU4dWcKLS0tIFJXL1ZsNDgydTgxVGRMYWxyQTNT V3ZONHpTZVJqMUxOVkd5ZDlqVTRNdzgKLS0tIGwwR0k1Vll6bEdmZVZvVktzMTRN
K1M0TDd1eGd1V3pOcjl1M1VrdDUvbG8KpsWlrr14MOh/8mG+rXpswPPFE3VnpKGt S1NaTVFTL0FCdm1EQmRsUnlhclZNZlEKEgIe60qkvY8+UocjQU+WM2dTL/1y3Kqk
03DWUII3+MMEWLJPLxkNJ9BzCm4Kl1QNHSbJ7Ex6df0b7nB6Ed6Hvw== d4RrlLP9NSozwVsPYI4ntygvMSApbT4v0YvoO7gV90lkGWEvW1YDfA==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg lastmodified: "2026-05-15T14:26:21Z"
enc: | mac: ENC[AES256_GCM,data:fIG4gFNzgbyfkn1ofd23c45MzCCExrga47y9/2vtuzRU5xXmB9A9uA80JQHCoRTdu/2NlJIrGyOKoZK4RENo75s8s2ZK+HzcTNGWyZptLjrRBIiBQJyDHDaAE34Ghdm96m8YwOyBsnanbgz8LhR8gyIDxSMEcqx+OQcOHqPGd20=,iv:fa7ToxI8mWqc5NqPjITqzxLvtTNodj7yohLkP51b058=,tag:DhXrHxqFON5zjI3uNclnxw==,type:str]
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA5U1VjTjlIMTdLRFQ5R1Av
SVBLMFZtV3ppK2VXWjdYelNGTGFOZUJaMndBCjYyZ0IveXFiVDlSUEtNOXk2L3g3
UmFIRE1GMEs2QVhUcFJkTHpCWmhhbG8KLS0tIG94NStMUnFZRTRsK2w4cDd4Rms5
M1MwTEtJNEFDdjRLVFRseThxNGJUQ0kKKN7QX9qUojNQBknbInaXslaKsAAhEj5y
QMXAU6TxlHMv+wZy2RQwMe/zE7RP24TypnX894iV0usTHujyxvfk3w==
-----END AGE ENCRYPTED FILE-----
- recipient: age1sxzuhh2fcd4pmaz4mdqq95t683d32ft22w9t2r7pk258u0s8wymsqdj7lg
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBrUHFYMWdVczRPdEFSbFR5
VmcxeEU4YWxwRTlDUkRkNVY0dFh5cjVUNjNnCkRSblNaS214dkdrd3JnNE5rZnR3
S0JVeXova1h2VnB2ODY0SUYxZm45TjAKLS0tIFN1QXFyTkt3SmV0UVhGMlMxTmpN
VW83cnd2TnQwWlVCUnpzZ29NRE1SekUKBGVCaijugxR6eSxvk19nncR9X6bmSSUq
VoxtHBkJbz/4mcQ/SUb4Wv1Rt5875tLWygS7qKmh8jzoP7JI4E9qWQ==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-05-08T16:05:46Z"
mac: ENC[AES256_GCM,data:X6AUVWJRcwH45W9NoQxI8Lp6l+5RFpgCNB6cdUZZODHDdTUMt9a6wr9YfU56C7QkdlxXdj6xCOCscJtw/WY2Y+XchWXaUVZZsoZ9xUo28aksUtHSyE9WJBHCeSqss79IW6k/GeDPiDOfz4om+udDvtdpyKbtvbw2a+K5st+62d4=,iv:REGTavU8DkalUbfO1J2+VccYnRRrOqstSFq/RU7Co5Q=,tag:2t8mwqa76kVQyeWS85zXsA==,type:str]
pgp: pgp:
- created_at: "2024-05-08T15:46:52Z" - created_at: "2026-05-05T23:46:27Z"
enc: |- enc: |-
-----BEGIN PGP MESSAGE----- -----BEGIN PGP MESSAGE-----
hQIMA6R3Y9nD7qMBAQ//bYK5gdxv8fNvG6P4GrD27gQRQXhLGF2+hS54sqEqjeN8 hQIMA6R3Y9nD7qMBAQ/+JdTDmQhL1+iX7yeyGs1kt9yQeMYkJ+bQD3LqlQVh6Xea
NZpHVbNNRR3AggOkT7QY1JO8bOhWscefH1vvBmBuODzh5Fw42t4zNPEDjWZEetxa yPIdcMBjAf1CNlkJKeJ4QK3f8rsZkxHmUFVDz7yCXctsp81hNBMZ0sauBM50OU4W
rClbLEvo7Kz8UKCNb9JIeYx7cr8sPWCmg4GvV1wGjhjr+u5ovuheORnHl+qoLsqv gQsDailZHgG5qCqKx91qSyVLtzVy4zcoTXy8TWLrSwztCt9qqX9LFZTKyZzNTiHW
P12PV7VzwC52v92GWiu9LRJqfqZra5GjUXGVXzBcZ9i6CnUDejzssWjhO/fmzKum DHYSwaJdTteXY89pZjPAQ6UtIdoVWaVfvCgaSZAxr3K8IJmobvMhhk/Fgm3CoE6Y
GbGIi9sf3RmVYsUASDgRBmVAZC3KF7RLi0L6WY0etRocAaWSAgnU1lZ04E8ZtLjk mfQd4lQhoqxrn2M/FKc30vg0yKVsiW3qlfnJCVHCxYUtQLVs3cF05lmj7CYy+0Mu
DlCtIpreJ1H0Ym+5EXB94PG0KZjayxKc20YDQ+yYwwSmiCVaUCLlYX2BOoncUYFF 7eZlfVj84hCLmd4ccOITkrOTqcBKWKQ5EpE8DGvWlLPEZt407MjaphEJ7dYhkfr/
MxVgWYwn14R5jyGbh4NyiBxPGHvIUx5RCIo70pMgS6W5ALZYTcNDLF82mj1xTOTy x4HrahZoeVbYX2Va0++picut+cE/NL9F/QMfqP4QhdHQhe74FlQcxpGDtcUIQep5
bcuaa7FCuXJif457LCe5TcAa5WYDgKX8pUKzFRhWIckcGwgFCUB0Z7+L9L7F0yt/ 8MvbEAhUpGL4sErg6afmIapxXi3euIXcBDYPatgoAlsH7E8rUTX1Sd4VOgV89kEJ
YZd71cY0Lxlwi61CnWgZZMx2FFpHyBCEmF1A180KUtB1jSkS/AVmlM2z9I0QsR62 pkl4OOwcaiF+brqtDiTGZf5l6AOugiYTp2Rtq9KMcGEGEmXFLcFKVjNEkZIxNxt3
fTFIaqimPMjUzbuTs0QjUXf8OJZo0/cwo9XeGyCBtJTg7cLdsOFouqfvXhvkdCrR EtrXrNmOCVJm71yOn2ruD9n2EXzFULfeyOhup7eYVfynkEWYlCQNHeaqMy2q656m
xCLE2Ke5jwmoPKs1t+YpwMMzB57j/rluZCgiz45w7YDXKf4gEp2ra9siFiC/y9PS LWVd89AUzWLcsmY8naWpfekU9K//hLHxRLBzqfouYXJ+Ji/HOvfRj7NZBg6UtgfS
XgEPymUiDZY0w9S5oGr94cNc6LQId16Zgt1vWHLzgg8QZqkxLTBjUXXc7aoCISQp XgFOJg3EaLAZEyvEZKWpnWlf3gBTRK3ffaLzs+eddSgzYUutzlOYUZb7v3iEdjta
AwUE62KJucVvWjB3kcgDbNvaDWWC5O48zUavmzkmmP1sqKf0gO/XG52PDG/DF3Y= 4Ik4F1M+kOGieyVxxLHOHMrOn09+WMmFIiPpBtCIcZmtwOzXNdhbZdFWNx5qPhU=
=cs0r =wXdG
-----END PGP MESSAGE----- -----END PGP MESSAGE-----
fp: 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0 fp: 4E241635F8EDD2919D2FB44CA362EA0491E2EEA0
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.8.1 version: 3.12.1

View File

@@ -1,5 +1,5 @@
{ config, ... }: { { ... }: {
imports = [ ./sorahiro_soft.nix ]; imports = [ ./sorahiro.nix ];
colorScheme.palette.border-radius = "#8"; colorScheme.palette.border-radius = "#8";
colorScheme.palette.border-width = "#2"; colorScheme.palette.border-width = "#2";

View File

@@ -0,0 +1,67 @@
{ ... }:
let use_pastelle = true;
in{
# usage: a = "#${config.colorScheme.palette.base00}";
colorScheme = {
slug = "sorahiro";
name = "sorahiro";
author = "Soraefir @ Helcel";
variant = "dark";
palette = rec {
# Format: Name, Pantone, RAL
base00 = "#000000"; # Black / 419C / 9005
base01 = "#060a0f"; # Rich Black / 532C / 9005
base02 = "#212c38"; # Yankees Blue / 433C / 5011
base03 = "#3f5268"; # Police Blue / 432C / 5000
base04 = "#617b9a"; # Slate Gray / 5415C / 5014
base05 = "#90a7c1"; # Pewter Blue / 535C / 5024
base06 = "#c9d3df"; # Columbia Blue / 538C / 7047
base07 = "#fcfcfc"; # Lotion / 663C / 9016
alt00 = "#000000"; # Black / 419C / 9005
alt01 = "#0c0906"; # Vampire Black / 419C / 9005
alt02 = "#312920"; # Pine Tree / 440C / 6022
alt03 = "#5b4e3e"; # Olive Drab Camouflage / 411C / 7013
alt04 = "#887660"; # Shadow / 404C / 7002
alt05 = "#b8a083"; # Pale Taupe / 480C / 1019
alt06 = "#e1cfb9"; # Desert Sand / 482C / 1015
alt07 = "#fcfcfc"; # Lotion / 663C / 9016
base08 = if use_pastelle then low08 else high08;
base09 = if use_pastelle then low09 else high09;
base0A = if use_pastelle then low0A else high0A;
base0B = if use_pastelle then low0B else high0B;
base0C = if use_pastelle then low0C else high0C;
base0D = if use_pastelle then low0D else high0D;
base0E = if use_pastelle then low0E else high0E;
base0F = if use_pastelle then low0F else high0F;
high08 = "#f09732"; # Deep Saffron / 804C / 1033
high09 = "#f2d831"; # Dandelion / 114C / 1016
high0A = "#98f12f"; # Green Lizard / 375C / 6038
high0B = "#34f4f0"; # Fluorescent Blue / 3252C / 6027
high0C = "#3193f5"; # Brilliant Azure / 2727C / 5015
high0D = "#c156f6"; # Blue-Violet / 2592C / 4006
high0E = "#f62ac0"; # Royal Pink / 807C / 4010
high0F = "#f42060"; # Deep Carmine Pink / 1925C / 3018
alt_high08 = "#f66824"; # Orange-Red / 165C / 2008
alt_high0B = "#41f3a4"; # Eucalyptus / 3395C / 6037
alt_high0C = "#2abef8"; # Spiro Disco Ball / 298C / 5012
alt_high0D = "#837ff5"; # Violets Are Blue / 814C / 4005
low08 = "#ffac56"; # Rajah / 150C / 1017
low09 = "#feea74"; # Shandy / 127C / 1016
low0A = "#bffe8a"; # Menthol / 374C / 6018
low0B = "#4cfefa"; # Electric Blue / 3252C / 6027
low0C = "#62acfd"; # Blue Jeans / 279C / 5012
low0D = "#9b9bfd"; # Maximum Blue Purple / 2715C / 4005
low0E = "#fe9bda"; # Lavender Rose / 223C / 4003
low0F = "#fc8999"; # Tulip / 1775C / 3014
alt_low08 = "#fe946a"; # Atomic Tangerine / 811C / 1034
alt_low0B = "#87febf"; # Aquamarine / 353C / 6019
alt_low0C = "#38c3fd"; # Picton Blue / 298C / 5012
alt_low0D = "#dca2ff"; # Mauve / 2572C / 4005
};
};
}

View File

@@ -1,29 +0,0 @@
{ nix-colors, ... }: {
# usage: a = "#${config.colorScheme.palette.base00}";
colorScheme = {
slug = "sorahiro-hard";
name = "sorahiro-hard";
author = "Soraefir @ Helcel";
variant = "dark";
palette = {
# Format: Name, Pantone, RAL
base00 = "#030B12"; # Rich Black / 6C / 000-15-00
base01 = "#0C1D2E"; # Maastricht Blue / 5395C / 270-20-15
base02 = "#203A53"; # Japanese Indigo / 534C / 260-20-20
base03 = "#425F7C"; # Deep Space Sparkle / 7699C / 260-40-20
base04 = "#93A9BE"; # Pewter Blue / 535C / 260-70-15
base05 = "#B6C5D5"; # Pastel Blue / 5445C / 260-80-10
base06 = "#D6DFE8"; # Gainsboro / 642C / 260-90-05
base07 = "#F0F3F7"; # White / 656C / 290-92-05
base08 = "#F59331"; # Deep Saffron / 715C / 070-70-70
base09 = "#F5F531"; # Maximum Yellow / 394C / 100-80-80
base0A = "#93F531"; # French Lime / 7488C / 120-70-75
base0B = "#31F593"; # Eucalyptus / 3385C / 160-70-50
base0C = "#3193F5"; # Brilliant Azure / 2727C / 280-50-40
baseOD = "#9331F5"; # Blue-Violet / 7442C / 300-40-45
base0E = "#F53193"; # Royal Pink / 232C / 350-50-50
base0F = "#F53131"; # Deep Carmine Pink / 1788C / 040-50-70
};
};
}

View File

@@ -1,29 +0,0 @@
{ nix-colors, ... }: {
# usage: a = "#${config.colorScheme.palette.base00}";
colorScheme = {
slug = "sorahiro-soft";
name = "sorahiro-soft";
author = "Soraefir @ Helcel";
variant = "dark";
palette = {
# Format: Name, Pantone, RAL
base00 = "#030B12"; # Rich Black / 6C / 000-15-00
base01 = "#0C1D2E"; # Maastricht Blue / 5395C / 270-20-15
base02 = "#203A53"; # Japanese Indigo / 534C / 260-20-20
base03 = "#425F7C"; # Deep Space Sparkle / 7699C / 260-40-20
base04 = "#93A9BE"; # Pewter Blue / 535C / 260-70-15
base05 = "#B6C5D5"; # Pastel Blue / 5445C / 260-80-10
base06 = "#D6DFE8"; # Gainsboro / 642C / 260-90-05
base07 = "#F0F3F7"; # White / 656C / 290-92-05
base08 = "#F5B97D"; # Mellow Apricot / 156C / 070-80-40
base09 = "#F5F57D"; # Sunny / 393C / 100-90-50
base0A = "#B9F57D"; # Yellow-Green / 373C / 120-80-60
base0B = "#7DF5B9"; # Aquamarine / 3375C / 150-80-40
base0C = "#7DB9F5"; # Light Azure / 278C / 250-70-30
base0D = "#B97DF5"; # Lavender / 2572C / 310-60-35
base0E = "#F57DB9"; # Persian Pink / 211C / 350-60-45
base0F = "#F57D7D"; # Light Coral / 170C / 030-60-50
};
};
}

File diff suppressed because one or more lines are too long

View File

@@ -1,4 +1,4 @@
{ config, pkgs, ... }: { config, lib, pkgs, ... }:
let let
isCI = builtins.elem config.syscfg.hostname [ "ci" "sandbox" ]; isCI = builtins.elem config.syscfg.hostname [ "ci" "sandbox" ];
keyFilePath = (if isCI then keyFilePath = (if isCI then
@@ -14,19 +14,15 @@ in {
sops.age.keyFile = keyFilePath; sops.age.keyFile = keyFilePath;
sops.age.generateKey = true; sops.age.generateKey = true;
sops.secrets.wifi = { }; sops.secrets = lib.mkMerge [
{
sops.secrets."${config.syscfg.hostname}_ssh_priv" = { wifi = { };
"${config.syscfg.hostname}_ssh_priv" = {
mode = "0400"; mode = "0400";
owner = config.users.users.${config.syscfg.defaultUser}.name; owner = config.users.users.${config.syscfg.defaultUser}.name;
group = config.users.users.${config.syscfg.defaultUser}.group; group = config.users.users.${config.syscfg.defaultUser}.group;
}; };
sops.secrets."${config.syscfg.hostname}_ssh_pub" = { "${config.syscfg.hostname}_wg_priv" = { };
mode = "0400"; }
owner = config.users.users.${config.syscfg.defaultUser}.name; ];
group = config.users.users.${config.syscfg.defaultUser}.group;
};
sops.secrets."${config.syscfg.hostname}_wg_priv" = { };
sops.secrets."${config.syscfg.hostname}_wg_pub" = { };
} }

View File

@@ -1,30 +1,34 @@
ci_ssh_priv: ENC[AES256_GCM,data:3Fd7HtFzD+0Pm0qnmaNeivSrEJnH6A3CzLrSyYD4J1rpdHCYdFB2hbZAB5HF3yeCMlyqnApGHxi+9jN8FI54SzwqJQAgSZvKrkBhrs4JIQxPU0ZhOQHvneWYnA==,iv:NbLyzilDIH5cT3SC0SLaOn0alxXSIyZ/4Tr1zSBjIjI=,tag:xGfI8QRlkj4OZDVuV21Kcg==,type:str] ci_ssh_priv: ENC[AES256_GCM,data:OuWZVS+ul8ERoQHEH8Gq6GdHWY5E3spR0uRu7akTVHrr6vYPWZHdV/8fjqKvfHd+dAeymWXe2Li7NXfXQM+y4OH36r1z9DLstwD4ufUmoHZ/MIO6qlsugzYhMw==,iv:NbLyzilDIH5cT3SC0SLaOn0alxXSIyZ/4Tr1zSBjIjI=,tag:uOzoai0Rq6UthSkWHhw8Hg==,type:str]
ci_ssh_pub: ENC[AES256_GCM,data:6BVY3GS9lMLR/dYNxyldcBJe1DrjG/yHjqfCIw==,iv:VZOA/Q9zmbMnf9DsXN90er+tSnJ+syg3QabDuDal92Q=,tag:+xwHADgq22cV5ai9xd6ceQ==,type:str] ci_ssh_pub: ENC[AES256_GCM,data:Lu2Ec+HylJzt/IMu1b8AKgGsjpZT7X628pjOYQ==,iv:VZOA/Q9zmbMnf9DsXN90er+tSnJ+syg3QabDuDal92Q=,tag:lef6MRtvgyntMrxphatqmg==,type:str]
ci_wg_priv: ENC[AES256_GCM,data:uA4eiEhQbbhLkrTyhRX4Tg==,iv:uHbrAq/mSQ6TtMqGhJez3d13u9ZK1S92w49ntXvbA3g=,tag:KwjiYrnuQxrydVKKV4xN4A==,type:str] ci_wg_priv: ENC[AES256_GCM,data:IoCn7jrahiJBhKxPuGyexg==,iv:uHbrAq/mSQ6TtMqGhJez3d13u9ZK1S92w49ntXvbA3g=,tag:QrZghdiQbmC9pcjKtIuKug==,type:str]
ci_wg_pub: ENC[AES256_GCM,data:MBIdTEkyJBvbTtYrQYS8,iv:GD3xmJEyD9yZaV72GubGCBi8BW74zmSr2hOl123g0mM=,tag:ekUniuYPCSxwlmB1yUbo4w==,type:str] ci_wg_pub: ENC[AES256_GCM,data:FB+DBkwDizA3C/s1TCkn,iv:GD3xmJEyD9yZaV72GubGCBi8BW74zmSr2hOl123g0mM=,tag:v189CtpJV7OX0sB9OJaWLA==,type:str]
sandbox_ssh_priv: ENC[AES256_GCM,data:OG5ZsSQFEbUKLXtHF9MAHWYwnxBM0EyVyj54sPs9XEsFaRXq3WDa+ANnpVqBLtw6cPodLQHyJ5tY/Hr1rdINNGyLPEz/Zm3K7vz6iXUeThAKDhYaCH4vccFFtQ==,iv:2NbVjpKTyyiY4rtC/A6s2nABo5p0VAWtzC6b6TrHkvI=,tag:sO+SUMws8HncC9dmeiJPSg==,type:str] sandbox_ssh_priv: ENC[AES256_GCM,data:Wj/M/0VEfY7Ruix7nwi09obpX+w6G+gfGK4ZFTKkbpEEM2JyFnRHhWYQiBvBQOXahTGQ+zAnibCNcHSTCBa66XjMhtY865Hs6FovVCfgx0awTZcns26w5vqJdg==,iv:2NbVjpKTyyiY4rtC/A6s2nABo5p0VAWtzC6b6TrHkvI=,tag:CVi4i9MNi/cU64cn9s0DRA==,type:str]
sandbox_ssh_pub: ENC[AES256_GCM,data:6bwJAmLuN0dhC8OiBW8qL2Ejt70a2ar02YTAqimnhcez,iv:/QMFyKaa3nOq1GrLNydq+Q8kS52fK6wsB3MioZN/qVM=,tag:XxcTX/REbHl5MKtRecjM2g==,type:str] sandbox_ssh_pub: ENC[AES256_GCM,data:xbcGusta4qBO0hfmks+VCpN8N4dd/qGkGNREACVKxuSF,iv:/QMFyKaa3nOq1GrLNydq+Q8kS52fK6wsB3MioZN/qVM=,tag:WTZ2wlfBMmANw6EEWl5jew==,type:str]
sandbox_wg_priv: ENC[AES256_GCM,data:8d+WCtyGoEH3/4q1DZImUw==,iv:3efDzVFVCqv6yCNgBEXfQ19oh2bZLPO8my33uBgviW0=,tag:+WNPB7b6tVTzDlSVziDO2w==,type:str] sandbox_wg_priv: ENC[AES256_GCM,data:4trdnPhgjlUChATnNx9o3Q==,iv:3efDzVFVCqv6yCNgBEXfQ19oh2bZLPO8my33uBgviW0=,tag:Io1obSodHW/RWWIg8VS8Zg==,type:str]
sandbox_wg_pub: ENC[AES256_GCM,data:rpxkijFKzyKx3uhEa/+j,iv:UULKRJvU0lktwmKGcIP/sRAZb0j2e0iL40o3DkSv/+U=,tag:OWHbfFPbTY6l3Bu/og78Bg==,type:str] sandbox_wg_pub: ENC[AES256_GCM,data:7L4SJdDMi5DZHpLfR6cs,iv:UULKRJvU0lktwmKGcIP/sRAZb0j2e0iL40o3DkSv/+U=,tag:irsolwnnfOjhYfiyanjxjw==,type:str]
PGP_KEY: ENC[AES256_GCM,data:IVhL/l0JSPcefX1z,iv:/tOEukP7LiNhhdSw870vPeUGhN2lse2v1pZ5fJQglc0=,tag:++NUJeRhsDE9eRsbKu8Ldw==,type:str] PGP_KEY: ENC[AES256_GCM,data:lwwHWksY+ea8D3z9,iv:/tOEukP7LiNhhdSw870vPeUGhN2lse2v1pZ5fJQglc0=,tag:225sf9GjXc8/NZgcXJIxZA==,type:str]
wifi: ENC[AES256_GCM,data:SV3yNB/0dBqggh0kOKU98Nodd0VS4K8kTqg7aLyeAg==,iv:w4nspNxswHl2CZ7diPUzupzotfjskzp91NIq4f0v0UM=,tag:7nUHijRlEgyliWn2ZuZo/Q==,type:str] wifi: ENC[AES256_GCM,data:Z+pbGAekk26GD3zg4TXVacP4Nrh93HPEMNcT0I1YaA==,iv:oiWZvnKvWmF/6cRZpCLsuf1uPJig6toNla5uT3t2kyM=,tag:iS3sq8JZsNUby9pSxYPw5g==,type:str]
sops: sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age: age:
- recipient: age13qv9dn9806paqgpjwmmkwtdzvv4qpv0ulksq0epnn8ufaxeug5zskyas3z - recipient: age13qv9dn9806paqgpjwmmkwtdzvv4qpv0ulksq0epnn8ufaxeug5zskyas3z
enc: | enc: |
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBZd0c5ZjZCb0Z6ZXlKaFph YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBEbHNVZjRzQi9ram1xNHk3
S25LcnFaM3NueUdxOEkwQWRVYjZwNEx1TnpVCkJ1RnJsV2IwNWd5RVJBU2pOUnRa d3pTTStiMjBLZHgwL0cvUGRwRFFzWi9HS2dvCkQ0ZU5UK1owS0N5MHhxOXV1cGVy
UEcrdDVHUnZ3Zng4UVNWZjNhSzRmRGcKLS0tIEpMMGJCZmkrcnFwWjM4ZVF6VmJN RnFQbGlhVy9tSVZKYXBqbzZjZU9nd3cKLS0tIDdXdm1qVTYvdS9sQ0Z0aExpTzB1
aFplU05pYXpPQWZRY202bVhFd3pHdHcKfauUQhzuUwpoaSlky+PlsOTrVQjyCSxi WkNsWVpqaHRSWkl6YXVrN0NoemhiS1EKoDRocdztTLQ5LMwHdlszTFHy+rm+y4RE
NYlJ7ScbxzJsqTqJbZnD+lbSdWK2XVKXy1Vn4hR0C0WF7g2Y7CU7tg== f97a6Z2J87ZfObRbaap5adVD7qk/tTYHGshT/8G1JxjctsxRgdfsmA==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2024-04-14T21:03:55Z" - recipient: age1pf4auk6u2tmefuqpuc6mntr26cp4wcsmlhnn98arzxsp3753ruqsj0jqk3
mac: ENC[AES256_GCM,data:W9kM3AaHcZcqVtT4qRpMRYKgmA9pBikAPhdKiPR/Y+0MSjY4c9LPeTBeS1vZzUaTgRHmNh/ns6I9SBO36Hio5qI6m/pjNdr9GfFbBpbnY+5mer6YTitq47TVySC9v+BRkES4A34h1Ky5yvJSDlz2kJfO/WVWllaQd0dxq8rgAU8=,iv:cRxgGKhD6KqXKpK4E12lWIIj99hBFSmGzSIv9LmYEyg=,tag:QXcswnB7GavGrBy1dFpQlQ==,type:str] enc: |
pgp: [] -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBNSHBpZGg0TlVtMFhjY2Ry
NzUrd1pPZFZNdFdLSUxrUUROaVNCTzdGR0hrCkVGUmpGemtFSDErRDArS0Y0WGZu
YkYzL2NGMTlnNW1NdStHOGpRN3A1VXcKLS0tIGs0MDIxTmpzSGtRWHZESFhNWXlS
Y3N0a2VPUHdoRlpUZ3BPVXROdDRHekEK2YN9ZgCaBPt/8kAkZNgsHp61SYqiFFXX
2lF0R1GNmYWm6T0YVCp/2ZN3z4GC+monctg1zoo5QsHfhIOpqIVoTA==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2025-09-06T13:37:03Z"
mac: ENC[AES256_GCM,data:uI9yG3/jGNGn6yoN9W+9K/AUeSowe4Mb9vhh38pwkuKab9zXTFidCWyh1e0TEOsIHrhfK2GPc2fHwc309/la+CoiNxAIYtC4xmoCYxSGrDgbsZEONrusy9AEKpRCO8CqLYyLYaAG9sLqFyIz3GyEnS/j98V3LeemhFtS17J1VHI=,iv:x/7caaKnggoyEaCx5sf+zzSE+3d7atv+o9B1O3QX0Uc=,tag:Tzfs+ACx+4A6kxAZtVQ3KQ==,type:str]
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.8.1 version: 3.10.2

View File

@@ -1,102 +1,13 @@
{ inputs, lib, ... }: { inputs, lib, ... }:
let let
userOpt = with lib; { systemsDir = ../../../systems;
username = mkOption { type = types.str; }; systemNames = lib.attrNames (lib.filterAttrs
wm = mkOption { (name: type: type == "directory" && builtins.pathExists (systemsDir + "/${name}/cfg.nix"))
type = types.enum [ "Wayland" "X11" "-" ]; (builtins.readDir systemsDir));
default = "-";
};
git = {
username = mkOption { type = types.str; };
email = mkOption { type = types.str; };
key = mkOption { type = types.str; };
};
};
netOpt = with lib; {
ble = {
enable = mkOption {
type = types.bool;
default = false;
};
};
wlp = {
enable = mkOption {
type = types.bool;
default = false;
};
nif = mkOption {
type = types.str;
default = "";
};
};
wg = {
enable = mkOption {
type = types.bool;
default = false;
};
ip4 = mkOption {
type = types.str;
default = "";
};
ip6 = mkOption {
type = types.str;
default = "";
};
};
};
makeOpt = with lib; {
cli = mkOption {
type = types.bool;
default = true;
};
gui = mkOption {
type = types.bool;
default = false;
};
virt = mkOption {
type = types.bool;
default = true;
};
power = mkOption {
type = types.bool;
default = false;
};
game = mkOption {
type = types.bool;
default = false;
};
develop = mkOption {
type = types.bool;
default = false;
};
};
serverOpt = with lib; {
hostDomain = mkOption { type = types.str; };
shortName = mkOption { type = types.str; };
mailDomain = mkOption { type = types.str; };
mailServer = mkOption { type = types.str; };
dbHost = mkOption {
type = types.str;
default = "localhost";
};
dbPort = mkOption {
type = types.str;
default = "3306";
};
configPath = mkOption {
type = types.str;
default = "/media/config";
};
dataPath = mkOption {
type = types.str;
default = "/media/data";
};
};
in with lib; { in with lib; {
options.usercfg = userOpt; options.usercfg = import ./user.nix {inherit lib;};
options.syscfg = { options.syscfg = {
hostname = mkOption { type = types.str; }; hostname = mkOption { type = types.str; };
type = mkOption { type = mkOption {
@@ -108,18 +19,18 @@ in with lib; {
default = "x86_64-linux"; default = "x86_64-linux";
}; };
defaultUser = mkOption { type = types.str; }; defaultUser = mkOption { type = types.str; };
make = makeOpt; make = import ./make.nix {inherit lib;};
net = netOpt; net = import ./net.nix {inherit lib;};
users = mkOption { users = mkOption {
type = types.listOf (types.submodule { options = userOpt; }); type = types.listOf (types.submodule { options = import ./user.nix {inherit lib;}; });
default = [ ]; default = [ ];
}; };
peers = mkOption {
default = map (name: import (systemsDir + "/${name}/cfg.nix")) systemNames;
};
server = mkOption { server = mkOption {
type = types.oneOf [ type = types.oneOf [ types.bool (types.submodule { options = import ./server.nix {inherit lib;}; }) ];
(types.attrs) default = false;
(types.submodule { options = serverOpt; })
];
default = { };
}; };
}; };
} }

View File

@@ -0,0 +1,9 @@
{ lib,... }:
with lib; {
cli = mkOption { type = types.bool; default = true; };
gui = mkOption { type = types.bool; default = false; };
virt = mkOption { type = types.bool; default = false; };
power = mkOption { type = types.bool; default = false; };
game = mkOption { type = types.bool; default = false; };
develop = mkOption { type = types.bool; default = false; };
}

Some files were not shown because too many files have changed in this diff Show More