+1
-3
overlays/pyronet-packages/default.nix
+1
-3
overlays/pyronet-packages/default.nix
+21
-22
packages/olympus/default.nix
+21
-22
packages/olympus/default.nix
·········
+18
-5
systems/x86_64-linux/marvin/firewall.nix
+18
-5
systems/x86_64-linux/marvin/firewall.nix
···
+5
-6
systems/x86_64-linux/marvin/networking.nix
+5
-6
systems/x86_64-linux/marvin/networking.nix
······
+73
-66
systems/x86_64-linux/marvin/services/authentik.nix
+73
-66
systems/x86_64-linux/marvin/services/authentik.nix
···
+5
-1
systems/x86_64-linux/marvin/services/bookstack.nix
+5
-1
systems/x86_64-linux/marvin/services/bookstack.nix
+39
-38
systems/x86_64-linux/marvin/services/bots.nix
+39
-38
systems/x86_64-linux/marvin/services/bots.nix
···
+30
-28
systems/x86_64-linux/marvin/services/buildbot.nix
+30
-28
systems/x86_64-linux/marvin/services/buildbot.nix
······
+9
-4
systems/x86_64-linux/marvin/services/deemix.nix
+9
-4
systems/x86_64-linux/marvin/services/deemix.nix
···
+4
-2
systems/x86_64-linux/marvin/services/grafana.nix
+4
-2
systems/x86_64-linux/marvin/services/grafana.nix
+7
-2
systems/x86_64-linux/marvin/services/jellyfin.nix
+7
-2
systems/x86_64-linux/marvin/services/jellyfin.nix
+2
-1
systems/x86_64-linux/marvin/services/minio.nix
+2
-1
systems/x86_64-linux/marvin/services/minio.nix
+4
-2
systems/x86_64-linux/marvin/services/nextcloud/imaginary.nix
+4
-2
systems/x86_64-linux/marvin/services/nextcloud/imaginary.nix
+15
-15
systems/x86_64-linux/marvin/services/nextcloud/office.nix
+15
-15
systems/x86_64-linux/marvin/services/nextcloud/office.nix
······
+10
-3
systems/x86_64-linux/marvin/services/nginx.nix
+10
-3
systems/x86_64-linux/marvin/services/nginx.nix
···
+9
-11
systems/x86_64-linux/marvin/services/planka.nix
+9
-11
systems/x86_64-linux/marvin/services/planka.nix
······
+14
-12
systems/x86_64-linux/marvin/services/podman.nix
+14
-12
systems/x86_64-linux/marvin/services/podman.nix
···
+7
-7
systems/x86_64-linux/marvin/services/postgres.nix
+7
-7
systems/x86_64-linux/marvin/services/postgres.nix
······
+8
-19
systems/x86_64-linux/marvin/services/prometheus.nix
+8
-19
systems/x86_64-linux/marvin/services/prometheus.nix
······
+6
-1
systems/x86_64-linux/marvin/services/prosody.nix
+6
-1
systems/x86_64-linux/marvin/services/prosody.nix
+4
-2
systems/x86_64-linux/marvin/services/redlib.nix
+4
-2
systems/x86_64-linux/marvin/services/redlib.nix
+8
-2
systems/x86_64-linux/marvin/services/syncthing.nix
+8
-2
systems/x86_64-linux/marvin/services/syncthing.nix
···
+4
-3
systems/x86_64-linux/marvin/services/tailscale.nix
+4
-3
systems/x86_64-linux/marvin/services/tailscale.nix
···
+15
-8
systems/x86_64-linux/marvin/services/vaultwarden.nix
+15
-8
systems/x86_64-linux/marvin/services/vaultwarden.nix
······systemd.services.vaultwarden.environment.PGPASSFILE = config.age.secrets.vaultwarden-pgpass.path;
+7
-9
systems/x86_64-linux/marvin/services/webmentiond.nix
+7
-9
systems/x86_64-linux/marvin/services/webmentiond.nix
···
+1
-1
systems/x86_64-linux/marvin/services/zfs.nix
+1
-1
systems/x86_64-linux/marvin/services/zfs.nix
+6
-2
systems/x86_64-linux/prefect/dn42/default.nix
+6
-2
systems/x86_64-linux/prefect/dn42/default.nix
+47
-44
systems/x86_64-linux/prefect/dn42/services.nix
+47
-44
systems/x86_64-linux/prefect/dn42/services.nix
···${pkgs.curl}/bin/curl -sfSLR {-o,-z}/etc/bird/roa_dn42_v6.conf https://dn42.burble.com/roa/dn42_roa_bird2_6.conf·········-then "\n ipv4 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "+"\n ipv4 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "-then "\n ipv6 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "+"\n ipv6 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "
+47
-47
systems/x86_64-linux/prefect/dn42/wireguard.nix
+47
-47
systems/x86_64-linux/prefect/dn42/wireguard.nix
···-customTunnel = listenPort: privKeyFile: peerPubKey: endpoint: name: peerIPv4: peerIPv6: localIPv4: localIPv6: isOspf: {+listenPort: privKeyFile: peerPubKey: endpoint: name: peerIPv4: peerIPv6: localIPv4: localIPv6: isOspf: {++ lib.optionalString isOspf "${pkgs.iproute2}/bin/ip -6 addr add ${defaultLocalIPv6} dev ${name}";-tunnel = listenPort: privKey: peerPubKey: localIPv4: localIPv6: endpoint: name: peerIPv4: peerIPv6:+customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 localIPv4 localIPv6+customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 defaultLocalIPv4
+20
-2
systems/x86_64-linux/prefect/firewall.nix
+20
-2
systems/x86_64-linux/prefect/firewall.nix
···
+1
-1
systems/x86_64-linux/prefect/hardware.nix
+1
-1
systems/x86_64-linux/prefect/hardware.nix
+1
-3
systems/x86_64-linux/prefect/networking.nix
+1
-3
systems/x86_64-linux/prefect/networking.nix
+4
-1
systems/x86_64-linux/prefect/packages.nix
+4
-1
systems/x86_64-linux/prefect/packages.nix
+28
-7
systems/x86_64-linux/prefect/secrets/secrets.nix
+28
-7
systems/x86_64-linux/prefect/secrets/secrets.nix
···backup = "ssh-rsa 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";
+5
-2
systems/x86_64-linux/prefect/services/acme.nix
+5
-2
systems/x86_64-linux/prefect/services/acme.nix
+5
-4
systems/x86_64-linux/prefect/services/blog-update.nix
+5
-4
systems/x86_64-linux/prefect/services/blog-update.nix
······
+14
-5
systems/x86_64-linux/prefect/services/headscale.nix
+14
-5
systems/x86_64-linux/prefect/services/headscale.nix
·········-systemd.services.headscale.serviceConfig.CapabilityBoundingSet = ["CAP_CHOWN" "CAP_NET_BIND_SERVICE"];-systemd.services.headscale.serviceConfig.AmbientCapabilities = ["CAP_CHOWN" "CAP_NET_BIND_SERVICE"];
+11
-6
systems/x86_64-linux/prefect/services/mailserver/default.nix
+11
-6
systems/x86_64-linux/prefect/services/mailserver/default.nix
······
+6
-1
systems/x86_64-linux/prefect/services/mailserver/logins.nix
+6
-1
systems/x86_64-linux/prefect/services/mailserver/logins.nix
···
+1
-5
systems/x86_64-linux/prefect/services/mailserver/monitoring.nix
+1
-5
systems/x86_64-linux/prefect/services/mailserver/monitoring.nix
+4
-2
systems/x86_64-linux/prefect/services/mailserver/overrides.nix
+4
-2
systems/x86_64-linux/prefect/services/mailserver/overrides.nix
···
+2
-3
systems/x86_64-linux/prefect/services/nginx/default.nix
+2
-3
systems/x86_64-linux/prefect/services/nginx/default.nix
+2
-5
systems/x86_64-linux/prefect/services/php.nix
+2
-5
systems/x86_64-linux/prefect/services/php.nix
······
+10
-13
systems/x86_64-linux/prefect/services/prometheus.nix
+10
-13
systems/x86_64-linux/prefect/services/prometheus.nix
···
+7
-4
systems/x86_64-linux/prefect/services/tailscale.nix
+7
-4
systems/x86_64-linux/prefect/services/tailscale.nix
···
+1
-1
systems/x86_64-linux/prefect/services/zerotier.nix
+1
-1
systems/x86_64-linux/prefect/services/zerotier.nix
+2
-2
systems/x86_64-linux/thought/firewall.nix
+2
-2
systems/x86_64-linux/thought/firewall.nix
+1
-1
systems/x86_64-linux/thought/hardware.nix
+1
-1
systems/x86_64-linux/thought/hardware.nix
+2
-4
systems/x86_64-linux/thought/networking.nix
+2
-4
systems/x86_64-linux/thought/networking.nix
+4
-1
systems/x86_64-linux/thought/packages.nix
+4
-1
systems/x86_64-linux/thought/packages.nix
+3
-2
systems/x86_64-linux/thought/secrets/secrets.nix
+3
-2
systems/x86_64-linux/thought/secrets/secrets.nix
···backup = "ssh-rsa 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";
+10
-13
systems/x86_64-linux/thought/services/prometheus.nix
+10
-13
systems/x86_64-linux/thought/services/prometheus.nix
···
+7
-4
systems/x86_64-linux/thought/services/tailscale.nix
+7
-4
systems/x86_64-linux/thought/services/tailscale.nix
···
+8
-8
systems/x86_64-linux/zaphod/fonts.nix
+8
-8
systems/x86_64-linux/zaphod/fonts.nix
···
+12
-11
systems/x86_64-linux/zaphod/kde.nix
+12
-11
systems/x86_64-linux/zaphod/kde.nix
···
+6
-7
systems/x86_64-linux/zaphod/networking.nix
+6
-7
systems/x86_64-linux/zaphod/networking.nix
······
+1
-1
systems/x86_64-linux/zaphod/power.nix
+1
-1
systems/x86_64-linux/zaphod/power.nix
+7
-2
systems/x86_64-linux/zaphod/programs/sway.nix
+7
-2
systems/x86_64-linux/zaphod/programs/sway.nix
···
+8
-1
systems/x86_64-linux/zaphod/secrets/secrets.nix
+8
-1
systems/x86_64-linux/zaphod/secrets/secrets.nix
···yubi-back = "ssh-rsa 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";backup = "ssh-rsa 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";
+4
-2
systems/x86_64-linux/zaphod/security/modules.nix
+4
-2
systems/x86_64-linux/zaphod/security/modules.nix
+9
-7
systems/x86_64-linux/zaphod/services/docker.nix
+9
-7
systems/x86_64-linux/zaphod/services/docker.nix
···
+2
-1
systems/x86_64-linux/zaphod/services/fprintd.nix
+2
-1
systems/x86_64-linux/zaphod/services/fprintd.nix
+1
-1
systems/x86_64-linux/zaphod/services/fwupd.nix
+1
-1
systems/x86_64-linux/zaphod/services/fwupd.nix
+2
-1
systems/x86_64-linux/zaphod/services/greetd.nix
+2
-1
systems/x86_64-linux/zaphod/services/greetd.nix
+3
-2
systems/x86_64-linux/zaphod/services/kmscon.nix
+3
-2
systems/x86_64-linux/zaphod/services/kmscon.nix
···
+5
-8
systems/x86_64-linux/zaphod/services/misc.nix
+5
-8
systems/x86_64-linux/zaphod/services/misc.nix
···
+5
-1
systems/x86_64-linux/zaphod/services/packagekit.nix
+5
-1
systems/x86_64-linux/zaphod/services/packagekit.nix
+5
-1
systems/x86_64-linux/zaphod/services/pcscd.nix
+5
-1
systems/x86_64-linux/zaphod/services/pcscd.nix