+18
-18
flake.lock
+18
-18
flake.lock
··················
+6
-1
hosts/jezebel/default.nix
+6
-1
hosts/jezebel/default.nix
······
-39
hosts/jezebel/services.nix
-39
hosts/jezebel/services.nix
···-reverse_proxy ${config.mySnippets.tailnet.networkMap.uptime-kuma.hostName}:${toString config.mySnippets.tailnet.networkMap.uptime-kuma.port}-reverse_proxy ${config.mySnippets.aylac-top.networkMap.uptime-kuma.hostName}:${toString config.mySnippets.aylac-top.networkMap.uptime-kuma.port}
+1
hosts/morgana/default.nix
+1
hosts/morgana/default.nix
-1
hosts/morgana/secrets.nix
-1
hosts/morgana/secrets.nix
···
+22
-10
hosts/nanpi/default.nix
+22
-10
hosts/nanpi/default.nix
············
-166
hosts/nanpi/glance.nix
-166
hosts/nanpi/glance.nix
···-check-url = "http://${config.mySnippets.aylac-top.networkMap.forgejo.hostName}:${toString config.mySnippets.aylac-top.networkMap.forgejo.port}/";-check-url = "http://${config.mySnippets.aylac-top.networkMap.pds.hostName}:${toString config.mySnippets.aylac-top.networkMap.pds.port}/";-check-url = "http://${config.mySnippets.aylac-top.networkMap.vaultwarden.hostName}:${toString config.mySnippets.aylac-top.networkMap.vaultwarden.port}/";-check-url = "http://${config.mySnippets.aylac-top.networkMap.ntfy.hostName}:${toString config.mySnippets.aylac-top.networkMap.ntfy.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.karakeep.hostName}:${toString config.mySnippets.tailnet.networkMap.karakeep.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.jellyfin.hostName}:${toString config.mySnippets.tailnet.networkMap.jellyfin.port}/web/index.html";-check-url = "http://${config.mySnippets.tailnet.networkMap.jellyseerr.hostName}:${toString config.mySnippets.tailnet.networkMap.jellyseerr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.sonarr.hostName}:${toString config.mySnippets.tailnet.networkMap.sonarr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.radarr.hostName}:${toString config.mySnippets.tailnet.networkMap.radarr.port}/";-# check-url = "http://${config.mySnippets.tailnet.networkMap.lidarr.hostName}:${toString config.mySnippets.tailnet.networkMap.lidarr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.prowlarr.hostName}:${toString config.mySnippets.tailnet.networkMap.prowlarr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.bazarr.hostName}:${toString config.mySnippets.tailnet.networkMap.bazarr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.autobrr.hostName}:${toString config.mySnippets.tailnet.networkMap.autobrr.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.qbittorrent.hostName}:${toString config.mySnippets.tailnet.networkMap.qbittorrent.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.uptime-kuma.hostName}:${toString config.mySnippets.tailnet.networkMap.uptime-kuma.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.radicale.hostName}:${toString config.mySnippets.tailnet.networkMap.radicale.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.copyparty.hostName}:${toString config.mySnippets.tailnet.networkMap.copyparty.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.redlib.hostName}:${toString config.mySnippets.tailnet.networkMap.redlib.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.miniflux.hostName}:${toString config.mySnippets.tailnet.networkMap.miniflux.port}/";-check-url = "http://${config.mySnippets.tailnet.networkMap.audiobookshelf.hostName}:${toString config.mySnippets.tailnet.networkMap.audiobookshelf.port}/";
-12
hosts/nanpi/secrets.nix
-12
hosts/nanpi/secrets.nix
···
-352
hosts/nanpi/services.nix
-352
hosts/nanpi/services.nix
···-"${config.mySnippets.aylac-top.networkMap.pds.vHost}" = "http://${config.mySnippets.aylac-top.networkMap.pds.hostName}";-header access-control-allow-headers "authorization,dpop,atproto-accept-labelers,atproto-proxy"-reverse_proxy ${config.mySnippets.aylac-top.networkMap.pds.hostName}:${toString config.mySnippets.aylac-top.networkMap.pds.port}-hosts = ["0.0.0.0:${toString config.mySnippets.tailnet.networkMap.radicale.port}" "[::]:${toString config.mySnippets.tailnet.networkMap.radicale.port}"];-LISTEN_ADDR = "${config.mySnippets.tailnet.networkMap.miniflux.hostName}:${toString config.mySnippets.tailnet.networkMap.miniflux.port}";-p = [config.mySnippets.tailnet.networkMap.copyparty.port (config.mySnippets.tailnet.networkMap.copyparty.port + 1)];-server.listen = ["0.0.0.0:${toString config.mySnippets.tailnet.networkMap.webdav.port}" "[::]:${toString config.mySnippets.tailnet.networkMap.webdav.port}"];
+2
-1
modules/hardware/acer/aspire/A515-52G/default.nix
+2
-1
modules/hardware/acer/aspire/A515-52G/default.nix
+2
modules/home/desktop/gnome/default.nix
+2
modules/home/desktop/gnome/default.nix
-1
modules/nixos/desktop/gnome/default.nix
-1
modules/nixos/desktop/gnome/default.nix
+63
-17
modules/nixos/profiles/arr/default.nix
+63
-17
modules/nixos/profiles/arr/default.nix
······
+7
-1
modules/nixos/profiles/autoUpgrade/default.nix
+7
-1
modules/nixos/profiles/autoUpgrade/default.nix
······
+38
modules/nixos/services/audiobookshelf/default.nix
+38
modules/nixos/services/audiobookshelf/default.nix
···
+27
modules/nixos/services/cloudflared/default.nix
+27
modules/nixos/services/cloudflared/default.nix
···+options.myNixOS.services.cloudflared.enable = lib.mkEnableOption "Cloudflared for all your cloudflare tunnels needs";
+67
modules/nixos/services/copyparty/default.nix
+67
modules/nixos/services/copyparty/default.nix
···
+69
modules/nixos/services/couchdb/default.nix
+69
modules/nixos/services/couchdb/default.nix
···
+17
-1
modules/nixos/services/default.nix
+17
-1
modules/nixos/services/default.nix
···
+5
-1
modules/nixos/services/fail2ban/default.nix
+5
-1
modules/nixos/services/fail2ban/default.nix
···
+27
-12
modules/nixos/services/forgejo/default.nix
+27
-12
modules/nixos/services/forgejo/default.nix
·········
+203
modules/nixos/services/glance/default.nix
+203
modules/nixos/services/glance/default.nix
···+caddy.virtualHosts."${privateNetwork.networkMap.${name}.vHost}".extraConfig = lib.mkIf cfg.autoProxy ''+reverse_proxy ${privateNetwork.networkMap.${name}.hostName}:${toString privateNetwork.networkMap.${name}.port}+check-url = "http://${aylac-top.networkMap.forgejo.hostName}:${toString aylac-top.networkMap.forgejo.port}/";+check-url = "http://${aylac-top.networkMap.pds.hostName}:${toString aylac-top.networkMap.pds.port}/";+check-url = "http://${aylac-top.networkMap.vaultwarden.hostName}:${toString aylac-top.networkMap.vaultwarden.port}/";+check-url = "http://${aylac-top.networkMap.ntfy.hostName}:${toString aylac-top.networkMap.ntfy.port}/";+check-url = "http://${tailnet.networkMap.karakeep.hostName}:${toString tailnet.networkMap.karakeep.port}/";+check-url = "http://${tailnet.networkMap.jellyfin.hostName}:${toString tailnet.networkMap.jellyfin.port}/web/index.html";+check-url = "http://${tailnet.networkMap.jellyseerr.hostName}:${toString tailnet.networkMap.jellyseerr.port}/";+check-url = "http://${tailnet.networkMap.sonarr.hostName}:${toString tailnet.networkMap.sonarr.port}/";+check-url = "http://${tailnet.networkMap.radarr.hostName}:${toString tailnet.networkMap.radarr.port}/";+# check-url = "http://${tailnet.networkMap.lidarr.hostName}:${toString tailnet.networkMap.lidarr.port}/";+check-url = "http://${tailnet.networkMap.prowlarr.hostName}:${toString tailnet.networkMap.prowlarr.port}/";+check-url = "http://${tailnet.networkMap.bazarr.hostName}:${toString tailnet.networkMap.bazarr.port}/";+check-url = "http://${tailnet.networkMap.autobrr.hostName}:${toString tailnet.networkMap.autobrr.port}/";+check-url = "http://${tailnet.networkMap.qbittorrent.hostName}:${toString tailnet.networkMap.qbittorrent.port}/";+check-url = "http://${tailnet.networkMap.uptime-kuma.hostName}:${toString tailnet.networkMap.uptime-kuma.port}/";+check-url = "http://${tailnet.networkMap.radicale.hostName}:${toString tailnet.networkMap.radicale.port}/";+check-url = "http://${tailnet.networkMap.copyparty.hostName}:${toString tailnet.networkMap.copyparty.port}/";+check-url = "http://${tailnet.networkMap.redlib.hostName}:${toString tailnet.networkMap.redlib.port}/";+check-url = "http://${tailnet.networkMap.miniflux.hostName}:${toString tailnet.networkMap.miniflux.port}/";+check-url = "http://${tailnet.networkMap.audiobookshelf.hostName}:${toString tailnet.networkMap.audiobookshelf.port}/";
+41
modules/nixos/services/jellyfin/default.nix
+41
modules/nixos/services/jellyfin/default.nix
···
+37
modules/nixos/services/jellyseerr/default.nix
+37
modules/nixos/services/jellyseerr/default.nix
···
+53
modules/nixos/services/karakeep/default.nix
+53
modules/nixos/services/karakeep/default.nix
···
+46
modules/nixos/services/miniflux/default.nix
+46
modules/nixos/services/miniflux/default.nix
···
+56
modules/nixos/services/ntfy/default.nix
+56
modules/nixos/services/ntfy/default.nix
···
+67
modules/nixos/services/pds/default.nix
+67
modules/nixos/services/pds/default.nix
···
+18
-1
modules/nixos/services/qbittorrent/default.nix
+18
-1
modules/nixos/services/qbittorrent/default.nix
·········
+48
modules/nixos/services/radicale/default.nix
+48
modules/nixos/services/radicale/default.nix
···
+43
modules/nixos/services/redlib/default.nix
+43
modules/nixos/services/redlib/default.nix
···
+63
modules/nixos/services/uptime-kuma/default.nix
+63
modules/nixos/services/uptime-kuma/default.nix
···+reverse_proxy ${privateNetwork.networkMap.${name}.hostName}:${toString privateNetwork.networkMap.${name}.port}+reverse_proxy ${publicNetwork.networkMap.${name}.hostName}:${toString publicNetwork.networkMap.${name}.port}+cloudflared.tunnels."${publicNetwork.cloudflareTunnel}".ingress = lib.mkIf (cfg.publicProxy == "cf") {
+49
modules/nixos/services/vaultwarden/default.nix
+49
modules/nixos/services/vaultwarden/default.nix
···
+64
modules/nixos/services/webdav-server-rs/default.nix
+64
modules/nixos/services/webdav-server-rs/default.nix
···
+42
-34
modules/snippets/aylac-top/default.nix
+42
-34
modules/snippets/aylac-top/default.nix
···