-10
README.md
-10
README.md
···-**Notes**: Direct gigabit connection from router - looking to add more services to utilize bandwidth
+8
common/bluetooth.nix
+8
common/bluetooth.nix
+31
common/desktop/core.nix
+31
common/desktop/core.nix
···
···
+47
common/desktop/sway.nix
+47
common/desktop/sway.nix
···
···
+11
common/desktop/vnc.nix
+11
common/desktop/vnc.nix
···
···
+7
common/efi.nix
+7
common/efi.nix
+42
common/nvidia.nix
+42
common/nvidia.nix
···
···
+67
common/python-cuda-dev.nix
+67
common/python-cuda-dev.nix
···
···+python3 -c "import torch; print('CUDA available' if torch.cuda.is_available() else 'CPU only')"
+31
common/services.nix
+31
common/services.nix
···
···
+13
common/system.nix
+13
common/system.nix
···
···
+34
common/users.nix
+34
common/users.nix
···
···+"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS9VBRE13jojnqVjuUZWTcOK8GokDDlk2U0i61vEJizVzNowGnIAbwq0cOaFEBX4JBkOa4I8Ku2Pw7fODuoehSK/t7FrfXExk2PBT3k0mfzqQYxfq5bzae7AWr7n/sKUBTtvHSACfidxzQpV7VSgW68jqdOt6h7FHSeS2jac7wUNPobL0uCkFB4FiEQOnIqlRGSSabVemL7bC9H9lUyOODSTthiq9S3pPYknyHDRKUtSCSw4pfpasr4bxDVSW99h3GBcW0hZbpw5bwlxQlwbclxQDnn7XJhWpq6zL/2ScVGJgd94z7FshKoF5IFTk6e7a/Ouv4Ato4hRLxEe5u70CH ssh-key-2023-07-11"+"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS9VBRE13jojnqVjuUZWTcOK8GokDDlk2U0i61vEJizVzNowGnIAbwq0cOaFEBX4JBkOa4I8Ku2Pw7fODuoehSK/t7FrfXExk2PBT3k0mfzqQYxfq5bzae7AWr7n/sKUBTtvHSACfidxzQpV7VSgW68jqdOt6h7FHSeS2jac7wUNPobL0uCkFB4FiEQOnIqlRGSSabVemL7bC9H9lUyOODSTthiq9S3pPYknyHDRKUtSCSw4pfpasr4bxDVSW99h3GBcW0hZbpw5bwlxQlwbclxQDnn7XJhWpq6zL/2ScVGJgd94z7FshKoF5IFTk6e7a/Ouv4Ato4hRLxEe5u70CH ssh-key-2023-07-11"
+267
-42
flake.lock
+267
-42
flake.lock
·····················-"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/47aad376c87e2e65967f17099277428e4b3f8e5a.tar.gz?rev=47aad376c87e2e65967f17099277428e4b3f8e5a"···-"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/cd2a9c028df820a83ca2807dc6c6e7abc3dfa7fc.tar.gz"···············
·····················+"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/7ac20fc47cf2f1b7469c7a2f379e5a3a51a6789a.tar.gz?rev=7ac20fc47cf2f1b7469c7a2f379e5a3a51a6789a"···+"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/46a9e8fcfe4be72b4c7c8082ee11d2c42da1e873.tar.gz?rev=46a9e8fcfe4be72b4c7c8082ee11d2c42da1e873"···············
+110
-66
flake.nix
+110
-66
flake.nix
······-outputs = inputs@{ self, nixpkgs, lix-module, vscode-server, agenix, zen-browser, catppuccin, home-manager, ... }: {
······
+98
-14
home/regent/home.nix
+98
-14
home/regent/home.nix
··················
··················
+7
host-secrets.nix
+7
host-secrets.nix
+58
hosts/baal/default.nix
+58
hosts/baal/default.nix
···
···
+55
hosts/baal/hardware.nix
+55
hosts/baal/hardware.nix
···
···
+110
-48
hosts/buer/default.nix
+110
-48
hosts/buer/default.nix
···
···
hosts/buer/hardware.nix
hosts/buer/hardware.nix
hosts/buer/secrets.nix
hosts/buer/secrets.nix
+152
-45
hosts/focalor/default.nix
+152
-45
hosts/focalor/default.nix
···
···
+10
-8
hosts/focalor/hardware.nix
+10
-8
hosts/focalor/hardware.nix
···
···
+62
hosts/focalor/scripts/vm-win11-hook.sh
+62
hosts/focalor/scripts/vm-win11-hook.sh
···
···
hosts/focalor/secrets.nix
hosts/focalor/secrets.nix
+36
hosts/focalor/vfio.nix
+36
hosts/focalor/vfio.nix
···
···
+64
hosts/valefar/backup.nix
+64
hosts/valefar/backup.nix
···
···+hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
+265
-61
hosts/valefar/default.nix
+265
-61
hosts/valefar/default.nix
···
···
+14
-37
hosts/valefar/hardware.nix
+14
-37
hosts/valefar/hardware.nix
···
···+boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "mpt3sas" "nvme" "usbhid" "uas" "sd_mod" ];+hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
hosts/valefar/secrets.nix
hosts/valefar/secrets.nix
+105
modules/caddy/default.nix
+105
modules/caddy/default.nix
···
···+description = "Attribute set of domain to upstream mappings for reverse proxying. Upstreams can be a single string or a list of strings for load balancing.";
-7
modules/common/efi.nix
-7
modules/common/efi.nix
-40
modules/common/nvidia.nix
-40
modules/common/nvidia.nix
···
···
-24
modules/common/services.nix
-24
modules/common/services.nix
···
···
-17
modules/common/system.nix
-17
modules/common/system.nix
···
···
-27
modules/common/users.nix
-27
modules/common/users.nix
···-"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCS9VBRE13jojnqVjuUZWTcOK8GokDDlk2U0i61vEJizVzNowGnIAbwq0cOaFEBX4JBkOa4I8Ku2Pw7fODuoehSK/t7FrfXExk2PBT3k0mfzqQYxfq5bzae7AWr7n/sKUBTtvHSACfidxzQpV7VSgW68jqdOt6h7FHSeS2jac7wUNPobL0uCkFB4FiEQOnIqlRGSSabVemL7bC9H9lUyOODSTthiq9S3pPYknyHDRKUtSCSw4pfpasr4bxDVSW99h3GBcW0hZbpw5bwlxQlwbclxQDnn7XJhWpq6zL/2ScVGJgd94z7FshKoF5IFTk6e7a/Ouv4Ato4hRLxEe5u70CH ssh-key-2023-07-11"
···
-16
modules/desktop/core.nix
-16
modules/desktop/core.nix
···
···
-37
modules/desktop/sway.nix
-37
modules/desktop/sway.nix
···
···
+50
modules/forgejo/default.nix
+50
modules/forgejo/default.nix
···
···
+50
modules/garage/default.nix
+50
modules/garage/default.nix
···
···
+56
modules/github-runners/default.nix
+56
modules/github-runners/default.nix
···
···
+229
modules/headscale/default.nix
+229
modules/headscale/default.nix
···
···+systemd.services.litestream = mkIf (cfg.litestream.enable && cfg.litestream.environmentFile != null) {
+28
modules/immich/default.nix
+28
modules/immich/default.nix
···
···
+42
modules/monero/default.nix
+42
modules/monero/default.nix
···
···+address = "46Ev6Vk4QeQZTr14tRjksTT2VPhi4jKB48mGz31rpUUci2Bvg9PHZj9GLK3VceWDc13tkUbzmqQz8eKR3hkD9bUKFKHLrzg";
+858
modules/seaweedfs/default.nix
+858
modules/seaweedfs/default.nix
···
···+optional (metrics.intervalSeconds != null) "-metrics.intervalSeconds=${toString metrics.intervalSeconds}" +++optional (mserver != []) ("-mserver=" + (concatStringsSep "," (map (mserver: mserver.text) mserver))) +++optional (defaultReplicaPlacement != null) ("-defaultReplicaPlacement=${defaultReplicaPlacement.code}") +++optional (master != []) ("-master=" + (concatStringsSep "," (map (master: master.text) master))) +++optional (filer."port.readonly" != null) "-port.readonly=${toString filer."port.readonly"}" +++optional (s3.enable && s3.domainName != []) "-s3.domainName=${concatStringsSep "," s3.domainName}";+default = [ "/var/lib/seaweedfs/${cluster._module.args.name}/volume-${volume.config._module.args.name}" ];+dir = "/var/lib/seaweedfs/${cluster._module.args.name}/filer-${filer.config._module.args.name}/filerldb2";+default = with replication.config; "${toString dataCenter}${toString rack}${toString server}";+in optionalString securityFile.enable "ln -s /etc/${securityFile.target} ${WorkingDirectory}/"+ExecStart = "${package}/bin/weed ${concatStringsSep " " logArgs} ${command} ${concatStringsSep " " args}";+(if msgBroker == null then {} else { "grpc.msg_broker" = { inherit (msgBroker) cert key; }; })
secrets/build-token.age
secrets/build-token.age
This is a binary file and will not be displayed.
secrets/garage-admin-token.age
secrets/garage-admin-token.age
This is a binary file and will not be displayed.
secrets/garage-metrics-token.age
secrets/garage-metrics-token.age
This is a binary file and will not be displayed.
secrets/garage-rpc-secret.age
secrets/garage-rpc-secret.age
This is a binary file and will not be displayed.
secrets/headscale-authkey.age
secrets/headscale-authkey.age
This is a binary file and will not be displayed.
+11
secrets/headscale-oidc-key.path
+11
secrets/headscale-oidc-key.path
···
···+7๏ฟฝE๏ฟฝrY๏ฟฝ)๏ฟฝGI๏ฟฝ๏ฟฝ๏ฟฝG๏ฟฝ*K๏ฟฝb๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝb+๏ฟฝ๏ฟฝ>๏ฟฝm๏ฟฝ{๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝK๏ฟฝ!๏ฟฝ๏ฟฝm๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝJ:๏ฟฝ๏ฟฝ๏ฟฝ{๏ฟฝ๏ฟฝ2/๏ฟฝ๏ฟฝ
+9
-3
secrets/secrets.nix
+9
-3
secrets/secrets.nix
···regent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ0pU82lV9dSjkgYbdh9utZ5CDM2dPN70S5fBqN1m3Pb regent@orobas.local";-buer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMVhjwDcO8eleSoR8a37ZGGPvkHEgV+c8SYcy07SayPB root@nixos";
···regent = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ0pU82lV9dSjkgYbdh9utZ5CDM2dPN70S5fBqN1m3Pb regent@orobas.local";
-32
services/forgejo.nix
-32
services/forgejo.nix
···
···
-36
services/garage.nix
-36
services/garage.nix
···-"d548d0c9ae9aec9e26fe0bd2ca3efe75f654fa350bad5cb02bc9aebc9850ba8f@[2a04:52c0:135:48d1::2]:3901" # buer-"5504cb25910dcef4a4312006691d651c099cde7c3a88df9ca79aa350571e6e65@[2601:5c2:8400:26c0:4ecc:6aff:fef7:98ca]:3901" #valefar
···
-35
services/github-runners.nix
-35
services/github-runners.nix
···
···