-10
README.md
-10
README.md
···-**Notes**: Direct gigabit connection from router - looking to add more services to utilize bandwidth
+8
common/bluetooth.nix
+8
common/bluetooth.nix
+16
-2
common/desktop/core.nix
+16
-2
common/desktop/core.nix
···
+3
common/desktop/sway.nix
+3
common/desktop/sway.nix
+1
-1
common/nvidia.nix
+1
-1
common/nvidia.nix
+67
common/python-cuda-dev.nix
+67
common/python-cuda-dev.nix
···+python3 -c "import torch; print('CUDA available' if torch.cuda.is_available() else 'CPU only')"
+8
-1
common/services.nix
+8
-1
common/services.nix
······
+253
-45
flake.lock
+253
-45
flake.lock
·····················-"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/47aad376c87e2e65967f17099277428e4b3f8e5a.tar.gz?rev=47aad376c87e2e65967f17099277428e4b3f8e5a"+"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/7ac20fc47cf2f1b7469c7a2f379e5a3a51a6789a.tar.gz?rev=7ac20fc47cf2f1b7469c7a2f379e5a3a51a6789a"···-"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/cd2a9c028df820a83ca2807dc6c6e7abc3dfa7fc.tar.gz"+"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/46a9e8fcfe4be72b4c7c8082ee11d2c42da1e873.tar.gz?rev=46a9e8fcfe4be72b4c7c8082ee11d2c42da1e873"··················
+36
-34
flake.nix
+36
-34
flake.nix
··················
+76
-24
home/regent/home.nix
+76
-24
home/regent/home.nix
·····················
+7
host-secrets.nix
+7
host-secrets.nix
+58
hosts/baal/default.nix
+58
hosts/baal/default.nix
···
+55
hosts/baal/hardware.nix
+55
hosts/baal/hardware.nix
···
+105
-44
hosts/buer/default.nix
+105
-44
hosts/buer/default.nix
······
-46
hosts/focalor/backup.nix
-46
hosts/focalor/backup.nix
···-hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
+108
-32
hosts/focalor/default.nix
+108
-32
hosts/focalor/default.nix
···············
+2
-2
hosts/focalor/hardware.nix
+2
-2
hosts/focalor/hardware.nix
···
+1
hosts/focalor/scripts/vm-win11-hook.sh
+1
hosts/focalor/scripts/vm-win11-hook.sh
-7
hosts/focalor/vfio.nix
-7
hosts/focalor/vfio.nix
-45
hosts/morax/default.nix
-45
hosts/morax/default.nix
···-hardware.enableAllHardware = lib.mkForce false; #https://github.com/NixOS/nixpkgs/issues/154163#issuecomment-2868994145
-34
hosts/morax/hardware.nix
-34
hosts/morax/hardware.nix
···
+64
hosts/valefar/backup.nix
+64
hosts/valefar/backup.nix
···+hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
+256
-73
hosts/valefar/default.nix
+256
-73
hosts/valefar/default.nix
···-authorizedKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ0pU82lV9dSjkgYbdh9utZ5CDM2dPN70S5fBqN1m3Pb" ];
+12
-36
hosts/valefar/hardware.nix
+12
-36
hosts/valefar/hardware.nix
···+boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "mpt3sas" "nvme" "usbhid" "uas" "sd_mod" ];hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
+63
-4
modules/caddy/default.nix
+63
-4
modules/caddy/default.nix
···+description = "Attribute set of domain to upstream mappings for reverse proxying. Upstreams can be a single string or a list of strings for load balancing.";···
+3
-2
modules/forgejo/default.nix
+3
-2
modules/forgejo/default.nix
······
+4
-4
modules/garage/default.nix
+4
-4
modules/garage/default.nix
······-"d548d0c9ae9aec9e26fe0bd2ca3efe75f654fa350bad5cb02bc9aebc9850ba8f@[2a04:52c0:135:48d1::2]:3901" # buer-"5504cb25910dcef4a4312006691d651c099cde7c3a88df9ca79aa350571e6e65@[2601:5c2:8400:26c0:4ecc:6aff:fef7:98ca]:3901" #valefar
+12
-3
modules/github-runners/default.nix
+12
-3
modules/github-runners/default.nix
···
+229
modules/headscale/default.nix
+229
modules/headscale/default.nix
···+systemd.services.litestream = mkIf (cfg.litestream.enable && cfg.litestream.environmentFile != null) {
+28
modules/immich/default.nix
+28
modules/immich/default.nix
···
+42
modules/monero/default.nix
+42
modules/monero/default.nix
···+address = "46Ev6Vk4QeQZTr14tRjksTT2VPhi4jKB48mGz31rpUUci2Bvg9PHZj9GLK3VceWDc13tkUbzmqQz8eKR3hkD9bUKFKHLrzg";
+858
modules/seaweedfs/default.nix
+858
modules/seaweedfs/default.nix
···+optional (metrics.intervalSeconds != null) "-metrics.intervalSeconds=${toString metrics.intervalSeconds}" +++optional (mserver != []) ("-mserver=" + (concatStringsSep "," (map (mserver: mserver.text) mserver))) +++optional (defaultReplicaPlacement != null) ("-defaultReplicaPlacement=${defaultReplicaPlacement.code}") +++optional (master != []) ("-master=" + (concatStringsSep "," (map (master: master.text) master))) +++optional (filer."port.readonly" != null) "-port.readonly=${toString filer."port.readonly"}" +++optional (s3.enable && s3.domainName != []) "-s3.domainName=${concatStringsSep "," s3.domainName}";+default = [ "/var/lib/seaweedfs/${cluster._module.args.name}/volume-${volume.config._module.args.name}" ];+dir = "/var/lib/seaweedfs/${cluster._module.args.name}/filer-${filer.config._module.args.name}/filerldb2";+default = with replication.config; "${toString dataCenter}${toString rack}${toString server}";+in optionalString securityFile.enable "ln -s /etc/${securityFile.target} ${WorkingDirectory}/"+ExecStart = "${package}/bin/weed ${concatStringsSep " " logArgs} ${command} ${concatStringsSep " " args}";+(if msgBroker == null then {} else { "grpc.msg_broker" = { inherit (msgBroker) cert key; }; })
secrets/build-token.age
secrets/build-token.age
This is a binary file and will not be displayed.
secrets/garage-admin-token.age
secrets/garage-admin-token.age
This is a binary file and will not be displayed.
secrets/garage-metrics-token.age
secrets/garage-metrics-token.age
This is a binary file and will not be displayed.
secrets/garage-rpc-secret.age
secrets/garage-rpc-secret.age
This is a binary file and will not be displayed.
secrets/headscale-authkey.age
secrets/headscale-authkey.age
This is a binary file and will not be displayed.
+11
secrets/headscale-oidc-key.path
+11
secrets/headscale-oidc-key.path
···
+9
-3
secrets/secrets.nix
+9
-3
secrets/secrets.nix
···regent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ0pU82lV9dSjkgYbdh9utZ5CDM2dPN70S5fBqN1m3Pb regent@orobas.local";-buer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMVhjwDcO8eleSoR8a37ZGGPvkHEgV+c8SYcy07SayPB root@nixos";