+15
-15
flake.lock
+15
-15
flake.lock
···············
···············
+2
-2
homes/ayla/default.nix
+2
-2
homes/ayla/default.nix
+56
-7
hosts/morgana/default.nix
+56
-7
hosts/morgana/default.nix
·········-luks.devices."luks-cc030211-13e5-4411-a906-94c6ef45a0c6".device = "/dev/disk/by-uuid/cc030211-13e5-4411-a906-94c6ef45a0c6";
·········
+2
hosts/morgana/disko.nix
+2
hosts/morgana/disko.nix
···+# this was kind of the config used for it, ended up not using it because i had gotten confused about something, but the end result was the same so who cares+# also if you're reading this never use nano to write a password file to use in one of these because luks counts the newline nano forces on you as a character
+4
hosts/nanpi/default.nix
+4
hosts/nanpi/default.nix
-1
hosts/nanpi/services.nix
-1
hosts/nanpi/services.nix
···"${config.mySnippets.aylac-top.networkMap.vaultwarden.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.vaultwarden.hostName}:${toString config.mySnippets.aylac-top.networkMap.vaultwarden.port}";"${config.mySnippets.aylac-top.networkMap.forgejo.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.forgejo.hostName}:${toString config.mySnippets.aylac-top.networkMap.forgejo.port}";-"${config.mySnippets.aylac-top.networkMap.forgejo.sshVHost}" = "ssh://${config.mySnippets.aylac-top.networkMap.forgejo.hostName}:2222";
···"${config.mySnippets.aylac-top.networkMap.vaultwarden.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.vaultwarden.hostName}:${toString config.mySnippets.aylac-top.networkMap.vaultwarden.port}";"${config.mySnippets.aylac-top.networkMap.forgejo.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.forgejo.hostName}:${toString config.mySnippets.aylac-top.networkMap.forgejo.port}";
+14
modules/hardware/acer/aspire/A515-52G/default.nix
+14
modules/hardware/acer/aspire/A515-52G/default.nix
···+# yeah i literally just got aly's t440p's config i have no idea if they're similar in how they suck but mine do suck
+648
modules/hardware/acer/aspire/A515-52G/easyeffects.json
+648
modules/hardware/acer/aspire/A515-52G/easyeffects.json
···
···
+1
modules/home/desktop/gnome/default.nix
+1
modules/home/desktop/gnome/default.nix
+2
modules/home/profiles/defaultApps/mimeTypes.nix
+2
modules/home/profiles/defaultApps/mimeTypes.nix
+9
-1
modules/nixos/profiles/btrfs/default.nix
+9
-1
modules/nixos/profiles/btrfs/default.nix
···+# basically it's like, if it's one /data and on morgana then for sure it's like a terabyte of data, if it's on nanpi then it's 512gb, anything else is my laptop's ssd, 128gb, so 16mb
+7
-1
modules/nixos/profiles/swap/default.nix
+7
-1
modules/nixos/profiles/swap/default.nix
···
+2
-2
modules/nixos/services/caddy/default.nix
+2
-2
modules/nixos/services/caddy/default.nix
+1
-1
modules/nixos/services/syncthing/default.nix
+1
-1
modules/nixos/services/syncthing/default.nix
+31
-30
modules/nixos/services/tailscale/default.nix
+31
-30
modules/nixos/services/tailscale/default.nix
······
······
+256
modules/nixos/services/tailscale/service.nix
+256
modules/nixos/services/tailscale/service.nix
···
···+description = ''The interface name for tunnel traffic. Use "userspace-networking" (beta) to not use TUN.'';+description = "Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.";+description = "They spam this every minute and I'm on the free tier of NextDNS so I can't let it happen.";+To use these these features, you will still need to call `sudo tailscale up` with the relevant flags like `--advertise-exit-node` and `--exit-node`.+after = lib.mkIf config.networking.networkmanager.enable ["NetworkManager-wait-online.service"];+(builtins.dirOf config.security.wrapperDir) # for `su` to use taildrive with correct access rights+''"FLAGS=--tun ${lib.escapeShellArg cfg.interfaceName} ${lib.concatStringsSep " " cfg.extraDaemonFlags}"''+# they spam this to hell and the other configs like the one above didn't work to disable it. i'm on the nextdns freetier dude!!+statusCommand = "${lib.getExe cfg.package} status --json --peers=false | ${lib.getExe pkgs.jq} -r '.BackendState'";+${lib.getExe cfg.package} up --auth-key "$(cat ${cfg.authKeyFile})${params}" ${escapeShellArgs cfg.extraUpFlags}+boot.kernel.sysctl = mkIf (cfg.useRoutingFeatures == "server" || cfg.useRoutingFeatures == "both") {
+1
-1
modules/snippets/syncthing/devices.nix
+1
-1
modules/snippets/syncthing/devices.nix
···"m23" = {id = "EXW2FQP-LLGZTF3-UJ7IQ6D-CZB4UWB-ZQHM4GG-T6D4E2Q-ZOWSTG4-HJOKPQK";}; # Samsung Galaxy M23"morgana" = {id = "IR327YY-QZD7HZX-F24BWPO-UXQAVGU-4M2WN3P-XCYPCGX-ZQKDLIV-BL6RNAR";}; # Acer Aspire A515-52G-"nanpi" = {id = "UBHN6T7-SLXLI4P-WVXQ35Q-OH4RPOI-RCVODK7-ASBJU6A-7BIEMYU-5ICYJAN";}; # The Red HP Laptop
···"m23" = {id = "EXW2FQP-LLGZTF3-UJ7IQ6D-CZB4UWB-ZQHM4GG-T6D4E2Q-ZOWSTG4-HJOKPQK";}; # Samsung Galaxy M23"morgana" = {id = "IR327YY-QZD7HZX-F24BWPO-UXQAVGU-4M2WN3P-XCYPCGX-ZQKDLIV-BL6RNAR";}; # Acer Aspire A515-52G+"nanpi" = {id = "3T56X4H-5RBU6HH-PKI4YAW-OZA27AA-M7AWUYP-HMNKCJJ-32WWOIB-TUGQ3AA";}; # Lenovo IdeaPad 3
+7
-6
modules/snippets/syncthing/folders.nix
+7
-6
modules/snippets/syncthing/folders.nix
···············
···············
+1
-1
modules/snippets/tailnet/default.nix
+1
-1
modules/snippets/tailnet/default.nix