-1
machines/cola/configuration.nix
-1
machines/cola/configuration.nix
+1
modules/base/default.nix
+1
modules/base/default.nix
+23
modules/base/gpg.nix
+23
modules/base/gpg.nix
···
+6
-6
modules/base/linux.nix
+6
-6
modules/base/linux.nix
············
+4
-3
modules/default.nix
+4
-3
modules/default.nix
+39
-19
modules/desktop/default.nix
+39
-19
modules/desktop/default.nix
···
+36
modules/desktop/fonts.nix
+36
modules/desktop/fonts.nix
···
-67
modules/desktop/fonts/default.nix
-67
modules/desktop/fonts/default.nix
···
modules/desktop/fonts/encrypt/DankMono-Bold.otf.age
modules/fonts/encrypt/DankMono-Bold.otf.age
modules/desktop/fonts/encrypt/DankMono-Bold.otf.age
modules/fonts/encrypt/DankMono-Bold.otf.age
modules/desktop/fonts/encrypt/DankMono-Italic.otf.age
modules/fonts/encrypt/DankMono-Italic.otf.age
modules/desktop/fonts/encrypt/DankMono-Italic.otf.age
modules/fonts/encrypt/DankMono-Italic.otf.age
modules/desktop/fonts/encrypt/DankMono-Regular.otf.age
modules/fonts/encrypt/DankMono-Regular.otf.age
modules/desktop/fonts/encrypt/DankMono-Regular.otf.age
modules/fonts/encrypt/DankMono-Regular.otf.age
modules/desktop/fonts/encrypt/codicon.otf.age
modules/fonts/encrypt/codicon.otf.age
modules/desktop/fonts/encrypt/codicon.otf.age
modules/fonts/encrypt/codicon.otf.age
modules/desktop/fonts/encrypt/faicon.ttf.age
modules/fonts/encrypt/faicon.ttf.age
modules/desktop/fonts/encrypt/faicon.ttf.age
modules/fonts/encrypt/faicon.ttf.age
+21
-7
modules/desktop/services.nix
+21
-7
modules/desktop/services.nix
···
+46
-31
modules/desktop/session.nix
+46
-31
modules/desktop/session.nix
···
+34
-20
modules/desktop/xdg.nix
+34
-20
modules/desktop/xdg.nix
···
+23
-5
modules/development/cocoapods.nix
+23
-5
modules/development/cocoapods.nix
···
+12
-1
modules/development/default.nix
+12
-1
modules/development/default.nix
···
+28
-14
modules/development/js.nix
+28
-14
modules/development/js.nix
···
+53
modules/fonts/default.nix
+53
modules/fonts/default.nix
···
-7
modules/games/default.nix
-7
modules/games/default.nix
-51
modules/games/enshrouded-server.nix
-51
modules/games/enshrouded-server.nix
···
-14
modules/gpg.nix
-14
modules/gpg.nix
+19
-10
modules/nvim/default.nix
+19
-10
modules/nvim/default.nix
······
-9
modules/router/avahi.nix
-9
modules/router/avahi.nix
+40
-6
modules/router/default.nix
+40
-6
modules/router/default.nix
···
+47
modules/router/dnsOverTLS.nix
+47
modules/router/dnsOverTLS.nix
···
+104
-65
modules/router/dnsmasq.nix
+104
-65
modules/router/dnsmasq.nix
···-server = if config.services.stubby.enable then [ "127.0.0.1#53000" ] else [ "1.1.1.1" "1.0.0.1" ];+"tag:${cfg.interfaces.internal}, ::1, constructor:${cfg.interfaces.internal}, ra-names, slaac, 12h"
+65
modules/router/kernel.nix
+65
modules/router/kernel.nix
···
+22
modules/router/mdns.nix
+22
modules/router/mdns.nix
···
-20
modules/router/miniupnpd.nix
-20
modules/router/miniupnpd.nix
···
+141
-103
modules/router/nftables.nix
+141
-103
modules/router/nftables.nix
···-lib.strings.concatMapStringsSep ", " lib.strings.escapeNixIdentifier config.networking.firewall.trustedInterfaces;+strings.concatMapStringsSep ", " strings.escapeNixIdentifier config.networking.firewall.trustedInterfaces;+(builtins.map (port: " iifname { ${trustedInterfaces} } udp dport ${port} redirect to ${port}") cfg.nftables.capturePorts);+(builtins.map (mac: " iifname ${cfg.interfaces.internal} oifname != ${cfg.interfaces.internal} ether saddr = ${mac} drop"));-icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } \-iifname intern0 oifname != intern0 ether saddr == ec:e5:12:1d:23:40 drop # drop tado internet traffic+icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } \
-12
modules/router/ntp.nix
-12
modules/router/ntp.nix
-23
modules/router/stubby.nix
-23
modules/router/stubby.nix
···
+29
modules/router/timeserver.nix
+29
modules/router/timeserver.nix
···
+34
modules/router/upnp.nix
+34
modules/router/upnp.nix
···
+103
-46
modules/server/caddy.nix
+103
-46
modules/server/caddy.nix
···
+15
-2
modules/server/default.nix
+15
-2
modules/server/default.nix
···
+24
-9
modules/server/hd-idle.nix
+24
-9
modules/server/hd-idle.nix
···
+69
-41
modules/server/home-assistant.nix
+69
-41
modules/server/home-assistant.nix
···
+60
-43
modules/server/jellyfin.nix
+60
-43
modules/server/jellyfin.nix
···
+25
-8
modules/server/podman.nix
+25
-8
modules/server/podman.nix
···
+23
-8
modules/server/sshd.nix
+23
-8
modules/server/sshd.nix
···-"ssh-rsa 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"+"ssh-rsa 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"
+39
-19
modules/server/tailscale.nix
+39
-19
modules/server/tailscale.nix
···
+31
-16
modules/server/vaultwarden.nix
+31
-16
modules/server/vaultwarden.nix
···-ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$+5A5H6YiN6OxyrFggkrft8Mm+sxgh/tL3USbaYFZ/h8$qj8NjE+COL4WXjmjkPWSQk7iLfhaBfBtV6k06Bql3CQ";+ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$+5A5H6YiN6OxyrFggkrft8Mm+sxgh/tL3USbaYFZ/h8$qj8NjE+COL4WXjmjkPWSQk7iLfhaBfBtV6k06Bql3CQ";
+5
-5
secrets.nix
+5
-5
secrets.nix
···